|
|
|
|
|
|
|
| |
|
Название: Learning Techniques for the Internet of Things Автор: Praveen Kumar Donta, Abhishek Hazra, Lauri Loven Издательство: Springer Год: 2024 Страниц: 334 Язык: английский Формат: pdf (true), epub Размер: 31.7 MB
Learning for the Internet of Things is a combination of advanced learning techniques for the Internet of Things (IoT) encompassing a range of cutting-edge approaches, including Deep Learning with CNNs, RNNs, and transformers, Federated Learning, edge AI for local data processing, reinforcement learning for autonomous decision-making, and their applications in real time. The book is structured into thirteen chapters; each comes with its own dedicated contributions and future research directions. Chapter 1 introduces IoT and the use of Edge computing, particularly cloud computing, and mobile edge computing. This chapter also mentions the use of edge computing in various real-time applications such as healthcare, manufacturing, agriculture, and transportation. Chapter 2 motivates mathematical modeling for Federated Learning systems with respect to IoT and its applications. Further Chapter 3 extends the discussion of Federated Learning for IoT, which has emerged as a privacy-preserving distributed Machine Learning approach. |
Разместил: Ingvar16 20-02-2024, 20:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Защита информации в компьютерных системах и сетях Автор: В. Ф. Шаньгин Издательство: ДМК Пресс Год: 2012 Cтраниц: 590 Формат: pdf/djvu Размер: 47 мб Язык: русский
Книга посвящена методам и средствам многоуровневой защиты информации в компьютерных системах и сетях. Формулируются основные понятия защиты информации, анализируются угрозы информационной безопасности в компьютерных информационных системах. Обсуждаются базовые понятия и принципы политики информационной безопасности. Анализируются международные и отечественные стандарты информационной безопасности. Описываются криптографические методы и алгоритмы защиты информации. Обсуждаются методы и средства идентификации, аутентификации и управления доступом в корпоративных информационных системах. Обосновывается комплексный многоуровневый подход к обеспечению информационной безопасности корпоративных систем. |
Разместил: rivasss 19-02-2024, 19:31 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Zero Trust Framework and Privileged Access Management (PAM) Автор: Ravindra Das Издательство: CRC Press Год: 2024 Страниц: 126 Язык: английский Формат: pdf (true) Размер: 10.1 MB
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure. However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society. |
Разместил: Ingvar16 18-02-2024, 05:54 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Artificial Intelligence for Cyber Defense and Smart Policing Автор: S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand Издательство: CRC Press Год: 2024 Страниц: 187 Язык: английский Формат: pdf (true) Размер: 27.8 MB
The future policing ought to cover identification of new assaults, disclosure of new ill-disposed patterns, and forecast of any future vindictive patterns from accessible authentic information. Such keen information will bring about building clever advanced proof handling frameworks that will help cops investigate violations. Artificial Intelligence for Cyber Defense and Smart Policing will describe the best way of practicing Artificial Intelligence for cyber defense and smart policing. Organizations share information about cyber attacks as a crucial component of cyber threat intelligence, in order to enhance their understanding of potential threats and proactively safeguard their systems and networks. Cyber-attacks and defenses both rely heavily on Machine Learning, but neither of them achieve their goals when they rely on it completely. A malware sniffer can detect malware in encrypted traffic based on an analysis of encrypted traffic elements in network telemetry. The algorithms of Machine Learning uncover threats hidden in encryption, instead of decrypting them. |
Разместил: Ingvar16 16-02-2024, 20:31 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CCNP and CCIE Enterprise Core ENCOR 350-401 (Official Cert Guide), 2nd Edition Автор: Brad Edgeworth, Ramiro Garza Rios, Dave Hucaby, Jason Gooley Издательство: Cisco Press Год: 2024 Страниц: 1149 Язык: английский Формат: pdf (true) Размер: 17.8 MB
Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE ENCOR 350-401 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert authors Brad Edgeworth, Ramiro Garza Rios, Jason Gooley, and Dave Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This fully updated second edition includes the latest topics and additional information covering changes to the latest ENCOR 350-401 exam. |
Разместил: Ingvar16 16-02-2024, 18:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Network Security and Cryptography: A Self-Teaching Introduction, 2nd Edition Автор: Sarhan M. Musa Издательство: Mercury Learning & Information Год: 2022 Страниц: 611 Язык: английский Формат: pdf (true) Размер: 20.3 MB
This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on Artificial Intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, Big Data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. |
Разместил: Ingvar16 15-02-2024, 17:47 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Online Security Tricks & Tips - 17th Edition 2024 Автор: Papercut Limited Издательство: Papercut Limited Год: 2024 Страниц: 110 Язык: английский Формат: pdf Размер: 46.3 MB
"Советы и рекомендации по безопасности в Интернете" - это идеальное цифровое издание для пользователей, которые хотят поднять свои навыки на новый уровень. Хотите ли вы улучшить свои пользовательские навыки? Хотите ли вы получить инсайдерские знания? Хотите ли вы учиться непосредственно у экспертов в этой области? На страницах нового руководства для продвинутых пользователей вы узнаете все, что нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как пользоваться устройством, и поэтому получает от него максимальную отдачу. Этого мы можем достичь, передавая вам навыки, которые мы вырабатывали десятилетиями, и предоставляя вам индивидуальную поддержку. |
Разместил: Ingvar16 15-02-2024, 05:03 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: 5G Technology: 3GPP Evolution to 5G-Advanced, 2nd Edition Автор: Harri Holma, Antti Toskala, Takehiro Nakamura Издательство: CRC Press Год: 2024 Страниц: 650 Язык: английский Формат: pdf (true) Размер: 11.7 MB
An Essential Insider’s View of the Development Work of 5G Technology Up to Release 18. 5G brings new technology solutions to the 5G mobile networks, including new spectrum options, antenna structures, physical layer and protocols designs, and network architectures. 5G Technology: 3GPP Evolution to 5G-Advanced is an accessible and comprehensive resource that offers explanations of 5G specifications and performance evaluations, aspects of device design, practical deployment considerations and illustrative examples from field experiences. With contributions from a panel of international experts on the topic (industry insiders working at the forefront of development), the book presents the main new technology components in 5G and describes the physical layer, radio protocols, and network performance indicators associated with them. It has intentionally been written to cater to individuals at all levels of 5G expertise. 5G Technology: 3GPP Evolution to 5G-Advanced serves as a complete resource for wireless researchers, network planners, lecturers in universities, technology analysts, R&D engineers, application developers, and spectrum regulators who wish to thoroughly understand the latest in 5G technology and get ahead of the curve with regards to its potential applications in a wide variety of industries. |
Разместил: Ingvar16 15-02-2024, 03:07 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Администрирование в информационных системах Автор: Беленькая М. Н., Малиновский С. Т., Яковенко Н. В. Издательство: Горячая линия-Телеком Год: 2018 - 2-е изд., испр. и доп. Cтраниц: 408 Формат: pdf Размер: 15 мб Язык: русский
Систематизированы основные сведения, необходимые администратору информационных систем (ИС). Приведена информация о функциях и задачах специалистов по управлению и сопровождению ИС, стандартах работы, организации и функциях служб администрирования ИС. Описаны стандарты работы ИС и стандартизирующие организации. Рассмотрены объекты управления ИС, модели и протоколы управления. Особое внимание уделено моделям управления, в том числе ITIL, FCAPS, ONC. Рассмотрены вопросы администрирования кабельных систем и приведены примеры их администрирования. |
Разместил: rivasss 13-02-2024, 21:39 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Blockchain-Based Data Security in Heterogeneous Communications Networks Автор: Dongxiao Liu, Xuemin (Sherman) Shen Издательство: Springer Серия: Wireless Networks Год: 2024 Страниц: 200 Язык: английский Формат: pdf (true), epub Размер: 12.5 MB
This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions. Blockchain is a ledger that is maintained by distributed network nodes. More specifically, it consists of blocks of peer-to-peer transactions. With consensus protocols, such as Proof-of-Work (PoW), the blockchain helps ensure a consistent view of ledger storage among mutually distrusted network nodes. Using the blockchain as a trusted machine for program execution, smart contract can be deployed for managing shared business logic. Specifically, smart contract can define terms and conditions for participants to change ledger storage. For DM in future networks, smart contract can help network stakeholders to collaboratively manage data lifecycle events over the blockchain for data sharing and processing. |
Разместил: Ingvar16 12-02-2024, 19:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|