Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Руководство по поиску неисправностей в объединенных сетях
Автор: Cisco Systems и др.
Издательство: Вильямс
Год: 2003
ISBN: 5-8459-0411-0
Формат: djvu
Страниц: 1041
Размер: 10,1 Mb
Язык: Русский

Данная книга предназначена для использования в качестве основного источника информации при решении задач, связанных с устранением нарушений в работе сети. Она может применяться в качестве пособия, позволяющего быстро находить решения проблем, возникающих в процессе функционирования сети.
При описании процесса поиска неисправностей в каждой конкретной сетевой среде приведены основные сведения о рассматриваемой сетевой технологии.
Разместил: oksanavalera 18-08-2019, 19:36 | Комментарии: 0 | Подробнее
Название: Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
Автор: Brian Walker
Издательство: Independently published
Год: 2019
Формат: epub/azw3/pdf(conv.)
Страниц: 148
Размер: 13.2 Mb
Язык: English

We live in a world where the kind of connections you have can make a big difference in your life. These connections are not just about personal and professional relationships, but also about networks. Computer networks must share connections to enable us access to useful information we need online. While these connections help us create a bustling life online, they have also become a cause for worry and concern, hence the need to understand cyber security.
In this book, you will learn about the fundamental concepts of cyber security. These are facts that form the foundation of your knowledge in cyber security. The knowledge you gain from this book will help you understand the need to enhance your security online. From office devices to your personal devices at home, you must be keen on securing your networks all the time.
Разместил: bomboane 18-08-2019, 14:43 | Комментарии: 0 | Подробнее
Название: Hacking: The Practical Guide to Become a Hacker
Автор: Jim Kou
Издательство: Amazon Digital Services LLC
Год: 2019
Страниц: 184
Язык: английский
Формат: epub
Размер: 10.1 MB

This book is different from the others. Critical point: Don't trust Only Theoretical Manuals that don't let you do any Practical Exercises: Practical Exercises are Essential! This is a Practical Guide. Step by Step. Not only Theory but You can do the Exercises and really understand the Ethical Hacking. An ethical hacker acts ethically against those who used the same tools and techniques to behave maliciously . This is the most important difference between ethical and unethical hackers. The former only works when commissioned by a client, who will be the only one informed of all the results achieved and the problems spotted by the ethical hacker. We should make a further distinction between the role of an ethical hacker and of a security engineer.
Разместил: Ingvar16 18-08-2019, 11:44 | Комментарии: 0 | Подробнее
Название: Network Modeling, Simulation and Analysis in MATLAB: Theory and Practices
Автор: Dac-Nhuong Le, Abhishek Kumar Pandey, T.V.M. Sairam
Издательство: Wiley-Scrivener
Год: 2019
Формат: True PDF
Страниц: 355
Размер: 10.3 Mb
Язык: English

The purpose of this book is first to study MATLAB programming concepts, then the basic concepts of modeling and simulation analysis, particularly focus on digital communication simulation. The book will cover the topics practically to describe network routing simulation using MATLAB tool. It will cover the dimensions’ like Wireless network and WSN simulation using MATLAB, then depict the modeling and simulation of vehicles power network in detail along with considering different case studies.
Разместил: bomboane 17-08-2019, 11:16 | Комментарии: 0 | Подробнее
Название: Security and Privacy Trends in the Industrial Internet of Things
Автор: Cristina Alcaraz
Издательство: Springer
Год: 2019
Страниц: 312
Язык: английский
Формат: pdf (true), epub
Размер: 23.8 MB

This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today’s industry, also known as the Industry Internet of Things (IIoT).
This book, therefore, comprises a detailed spectrum of research papers with highly analytical content and actuation procedures to cover the relevant security and privacy issues such as data protection, awareness, response and resilience, all of them working at optimal times. Readers will be able to comprehend the construction problems of the fourth industrial revolution and are introduced to effective, lightweight protection solutions which can be integrated as part of the new IIoT-based monitoring ecosystem.
Разместил: Ingvar16 17-08-2019, 04:25 | Комментарии: 0 | Подробнее
Название: Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment
Автор: Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
Издательство: Apress
Год: 2019
Формат: true pdf/epub
Страниц: 515
Размер: 39.9 Mb
Язык: English

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.
Разместил: bomboane 16-08-2019, 15:40 | Комментарии: 0 | Подробнее
Название: Deep Learning Applications for Cyber Security (Advanced Sciences and Technologies for Security Applications)
Автор: Mamoun Alazab (Editor), MingJian Tang (Editor)
Издательство: Springer
Год: 2019
Формат: True PDF/ePub
Страниц: 246
Размер: 25.2 Mb
Язык: English

Cybercrime remains a growing challenge in terms of security and privacy practices. Working together, deep learning and cyber security experts have recently made significant advances in the fields of intrusion detection, malicious code analysis and forensic identification. This book addresses questions of how deep learning methods can be used to advance cyber security objectives, including detection, modeling, monitoring and analysis of as well as defense against various threats to sensitive data and security systems.
Разместил: bomboane 16-08-2019, 01:14 | Комментарии: 0 | Подробнее
Название: Foundations of MIMO Communication
Автор: Heath Jr., Robert W., Angel Lozano
Издательство: Cambridge University Press
Год: 2019
Формат: True PDF
Страниц: 800
Размер: 10.2 Mb
Язык: English

Understand the fundamentals of wireless and MIMO communication with this accessible and comprehensive text. Viewing the subject through an information theory lens, but also drawing on other perspectives, it provides a sound treatment of the key concepts underpinning contemporary wireless communication and MIMO, all the way to massive MIMO. Authoritative and insightful, it includes over 330 worked examples and 450 homework problems, with solutions and MATLAB code and data available online. Altogether, this is an excellent resource for instructors and graduate students, as well as an outstanding reference for researchers and practicing engineers.

Разместил: bomboane 16-08-2019, 00:41 | Комментарии: 0 | Подробнее
Название: The Complete Google Guidebook – Vol 19, 2019
Автор: James Gale (Editor)
Издательство: Black Dog Media Limited
Год: 2019
Страниц: 171
Язык: английский
Формат: pdf
Размер: 101.5 MB

Learn how to master Google’s unmissable free apps! There is so much more to Google than just searching online! From humble beginnings as a search engine, Google now provides email with free online storage, photo management and editing, social networking with millions of users, one of the best Internet browsers around, the biggest video site in the world, the market-leading smartphone operating system, interactive maps and navigation, a free blogging platform and much, much more. 100% unofficial
Разместил: Ingvar16 14-08-2019, 05:36 | Комментарии: 0 | Подробнее
Название: Integrated Security Technologies and Solutions - Volume II: Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity, and Virtualization
Автор: Aaron Woland, Vivek Santuka
Издательство: Cisco Press
Год: 2019
Страниц: 607
Язык: английский
Формат: pdf
Размер: 29.4 MB

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization. Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint.
Разместил: Ingvar16 14-08-2019, 05:05 | Комментарии: 0 | Подробнее



 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности