|
|
|
|
|
|
|
| |
|
Название: The Spatial Web: How web 3.0 will connect humans, machines and AI to transform the world Автор: Gabriel Rene, Dan Mapes Издательство: Amazon Digital Services LLC Год: 2019 Страниц: 216 Язык: английский Формат: epub, pdf (conv) Размер: 10.1 MB
Have you ever wondered what the future holds? Blade Runner, The Matrix, Star Wars, Avatar, Star Trek, Ready Player One, The Avengers, and many other popular films show us futuristic worlds where holograms, robots, smart devices, virtual avatars, digital transactions, and universe-scale teleportation all work together in sync, combining the virtual and the physical with the mechanical and the biological. It won't be fiction much longer. The Spatial Web paints the same picture of an inevitable future—in the real world. But more importantly, it teaches you how to prepare for it, and leverage it. |
Разместил: Ingvar16 29-09-2019, 19:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Внутренний мир Microsoft TCP/IP Автор: Хейвуд Дрю Издательство: ДиаСофт Год: 2000 Cтраниц: 435 Формат: pdf Размер: 26 мб Язык: русский
Книга Внутренний мир Microsoft TCP/IP написана экспертом в области сетевых технологий Дрю Хейвудом. Здесь вы найдете исчерпывающее изложение теоретических и практических сведений о работе протоколов TCP/IP. Уделяется большое внимание построению и эксплуатации сетей Microsoft TCP/IP. |
Разместил: rivasss 29-09-2019, 13:51 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Security: Ultimate Beginners Guide to Learn the Basics and Effective Methods of Cyber Security Автор: Michael Steven Издательство: Amazon Digital Services LLC Год: 2019 Страниц: 108 Язык: английский Формат: epub, pdf (conv) Размер: 10.18 MB
The Principles of Cybersecurity and Hacking series aims to provide you exactly with that knowledge, and with that power. This comprehensive, in-depth guide on the fundamentals, concepts and strategies of Cybersecurity and Hacking will take you to another level of protection in this digital world. It provides you with everything you need to know starting as a Beginner |
Разместил: Ingvar16 27-09-2019, 13:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Malicious Attack Propagation and Source Identification Автор: Jiaojiao Jiang, Sheng Wen Издательство: Springer Год: 2019 Страниц: 192 Язык: английский Формат: pdf (true) Размер: 13.5 MB
In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. |
Разместил: Ingvar16 26-09-2019, 19:27 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Role of Blockchain Technology in IoT Applications Автор: Shiho Kim, Ganesh Chandra Deka Издательство: Academic Press Серия: Advances in Computers, Volume 115 Год: 2019 Страниц: 348 Язык: английский Формат: pdf Размер: 26.0 MB
Role of Blockchain Technology in IoT Applications, Volume 115 in the Advances in Computers series, reviews the latest information on this topic that promises many applications in human life. According to forecasts made by various market research/survey agencies, there will be around 50 Billion connected devices (IoT) by 2020. Updates in this new release include chapters on the Technical Aspects of Blockchain and IoT, Integrated Platforms for Blockchain-Enablement, Intersections Between IoT and Distributed Ledger, Blockchain and Artificial Intelligence: How and Why Combining These Two Groundbreaking Technologies, Blockchain Applications in Health Care and Opportunities and Advancements Due to New Information Technology Frameworks, and more. |
Разместил: Ingvar16 26-09-2019, 12:25 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Элементарное введение в эллиптическую криптографию. Протоколы криптографии на эллиптических кривых Автор: А.А. Болотов, С.Б. Гашков Жанр: Учебное пособие Издательство: КомКнига Год: 2006 Страниц: 280 Язык: Русский Формат: djvu Размер: 12,38 Mb
Настоящая книга содержит описание и сравнительный анализ алгоритмов на эллиптических кривых. Изучаются протоколы эллиптической криптографии, имеющие аналоги — протоколы на основе алгебраических свойств мультипликативной группы конечного поля и протоколы, для которых таких аналогов нет — протоколы, основанные на спаривании Вейля и Тейта. |
Разместил: rogas86 26-09-2019, 11:46 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Mathematical Principles of the Internet, Volume 2: Mathematics (Chapman & Hall/CRC Computer and Information Science Series) Автор: Nirdosh Bhatnagar Издательство: Chapman and Hall/CRC Год: 2018 Формат: True PDF Страниц: 728 Размер: 10.5 Mb Язык: English
This two-volume set on Mathematical Principles of the Internet provides a comprehensive overview of the mathematical principles of Internet engineering. The books do not aim to provide all of the mathematical foundations upon which the Internet is based. Instead, they cover a partial panorama and the key principles. Volume 1 explores Internet engineering, while the supporting mathematics is covered in Volume 2. The chapters on mathematics complement those on the engineering episodes, and an effort has been made to make this work succinct, yet self-contained. Elements of information theory, algebraic coding theory, cryptography, Internet traffic, dynamics and control of Internet congestion, and queueing theory are discussed. In addition, stochastic networks, graph-theoretic algorithms, application of game theory to the Internet, Internet economics, data mining and knowledge discovery, and quantum computation, communication, and cryptography are also discussed. |
Разместил: bomboane 26-09-2019, 09:18 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Behavioral Cybersecurity: Applications of Personality Psychology and Computer Science Автор: Wayne Patterson, Cynthia E. Winston-Proctor Издательство: CRC Press Год: 2019 Формат: true pdf/rtf Страниц: 290 Размер: 12.8 Mb Язык: English
Since the introduction and proliferation of the Internet, problems involved with maintaining cybersecurity has grown exponentially, and have evolved into many forms of exploitation. Yet, Cybersecurity has had far too little study and research. Virtually all of the Research that has taken place in cybersecurity over many years, has been done by those with computer science, electrical engineering, and mathematics backgrounds. |
Разместил: bomboane 25-09-2019, 22:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybersecurity and Privacy in Cyber Physical Systems Автор: Yassine Maleh (Editor), Shojafar Mohammad (Editor), Darwish Ashraf (Editor), Haqiq Abdelkrim (Editor) Издательство: CRC Press Год: 2019 Формат: True PDF Страниц: 454 Размер: 20.5 Mb Язык: English
Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader’s awareness of cybersecurity and privacy in CPSs... |
Разместил: bomboane 25-09-2019, 21:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Элементарное введение в эллиптическую криптографию. Алгебраические и алгоритмические основы Автор: А.А. Болотов, С.Б. Гашков Жанр: Криптография Издательство: КомКнига Год: 2006 Страниц: 328 Язык: Русский Формат: djvu Размер: 14,61 Mb
Настоящая книга посвящена перспективному направлению в области защиты информации, математическую основу которого составляет теория эллиптических кривых. |
Разместил: rogas86 25-09-2019, 13:19 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|