Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Автор: Ziska Fields
Издательство: IGI Global
ISBN: 1522547630
Год: 2018
Страниц: 647
Язык: английский
Формат: pdf (true)
Размер: 22.9 MB

The prominence and growing dependency on information communication technologies in nearly every aspect of life has opened the door to threats in cyberspace. Criminal elements inside and outside organizations gain access to information that can cause financial and reputational damage. Criminals also target individuals daily with personal devices like smartphones and home security systems who are often unaware of the dangers and the privacy threats around them.
The book explores topics such as social engineering in information security, threats to cloud computing, and cybersecurity resilience during the time of the Fourth Industrial Revolution. As a source that builds on available literature and expertise in the field of information technology and security, this publication proves useful for academicians, educationalists, policy makers, government officials, students, researchers, and business leaders and managers.
Разместил: Ingvar16 15-02-2019, 14:01 | Комментарии: 0 | Подробнее
Название: Limitless Sky: No Man's Sky Unofficial Discovery Guide
Автор: Jeff Cork
Издательство: Triumph Books
Год: 2016
Формат: EPUB
Размер: 31 Мб
Язык: английский / English

A game of survival, exploration, and discovery, No Man's Sky is one of the fastest-growing phenomena in video game history, attracting and astounding players of all ages. The game's 18 quintillion planets are procedurally generated, meaning you could very well be the first person to ever set eyes on a planet that even the game developers never encountered—a true testament to the game's innovation.
Разместил: black 14-02-2019, 17:47 | Комментарии: 0 | Подробнее
Название: Building with Virtual LEGO
Автор: John Baichtal
Издательство: McGraw-Hill Education
Год: 2016
Формат: EPUB
Размер: 21 Мб
Язык: английский / English

This fun guide shows how to create just about anything from virtual LEGO blocks using free software. Learn how to install and customize LEGO Digital Designer, navigate the user interface, and get started on your own projects. LDraw and Mecabricks are also clearly explained. Building with Virtual LEGO: Getting Started with LEGO Digital Designer, LDraw, and Mecabricks features DIY projects that illustrate each technique and software tool. You will see how to upload and share your creations online?even modify projects that others have built!
Разместил: black 14-02-2019, 17:27 | Комментарии: 0 | Подробнее
Название: Designing for Wearables: Effective UX for Current and Future Devices
Автор: Scott Sullivan
Издательство: O'Reilly Media
Год: 2017
Формат: PDF, EPUB
Размер: 16 Мб
Язык: английский / English

Now may be the perfect time to enter the wearables industry. With the range of products that have appeared in recent years, you can determine which ideas resonate with users and which don’t before leaping into the market. In this practical guide, author Scott Sullivan examines the current wearables ecosystem and then demonstrates the impact that service design in particular will have on these types of devices going forward.
Разместил: black 14-02-2019, 17:13 | Комментарии: 0 | Подробнее
Название: Cloud as a Service: Understanding the Service Innovation Ecosystem
Автор: Enrique Castro-Leon and Robert Harmon
Издательство: Apress
Год: 2017
Формат: PDF, EPUB
Размер: 14 Мб
Язык: английский / English

Cloud as Service covers that evolution of enterprise computing platforms to application-specific cloud platforms or ASCPs aligned to business needs. This book also covers processes for developing and building ASCPs while also providing insight to executives, managers and technologists in corporations, large and small using or delivering cloud services, cloud service providers as well as equipment manufacturers and software and application vendors participating in cloud supply chains.
Разместил: black 14-02-2019, 16:56 | Комментарии: 0 | Подробнее
Название: Magento 1 DIY
Автор: Viktor Khliupko
Издательство: Apress
Год: 2017
Формат: PDF, EPUB
Размер: 12 Мб
Язык: английский / English

Learn how Magento 1 works and how to manage it via easy and advanced techniques. Magento continues to be a top choice for eCommerce solutions in small and large businesses, and many systems are still running on Magento 1.x. This book is specifically designed for these versions. Aimed at entrepreneurs, marketers, and other experts interested in eCommerce, Magento 1 DIY shows you how to set up and configure Magento 1 for your own project. You will also learn how to use extensions, templates and enterprise features guided by easy-to-understand, real-world examples.
Разместил: black 14-02-2019, 16:39 | Комментарии: 0 | Подробнее
Название: Introducing Materialize
Автор: Anirudh Prabhu and Aravind Shenoy
Издательство: Apress
Год: 2017
Формат: PDF, EPUB
Размер: 10 Мб
Язык: английский / English

This concise step-by-step guide includes the best practices and patterns that help readers of all levels to unearth the potential of Materialize. A responsive framework based on Google’s innovative Material Design language, Materialize provides CSS and jаvascript features similar to other popular frameworks such as Bootstrap and Foundation.
Разместил: bomboane 14-02-2019, 16:13 | Комментарии: 0 | Подробнее
Название: Network Security (Networks and Telecommunications Series)
Автор: Andr? P?rez
Издательство: Wiley-ISTE
Год: 2014
Формат: PDF
Страниц: 262
Для сайта: mymirknig.ru
Размер: 5 Mb
Язык: English
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.
The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
Разместил: Ice Zero 14-02-2019, 13:00 | Комментарии: 0 | Подробнее
Название: Combinatorial Search: From Algorithms to Systems
Автор: Youssef Hamadi
Издательство: Springer
Год: 2013
Формат: PDF
Страниц: 139
Для сайта: mymirknig.ru
Размер: 2 Mb
Язык: English
Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to efficiently explore these regions. Various mathematical formalisms may be used to express and tackle combinatorial problems, among them the constraint satisfaction problem (CSP) and the propositional satisfiability problem (SAT). These algorithms, or constraint solvers, apply search space reduction through inference techniques, use activity-based heuristics to guide exploration, diversify the searches through frequent restarts, and often learn from their mistakes.
Разместил: Ice Zero 14-02-2019, 11:54 | Комментарии: 0 | Подробнее

Название : Circuits and Systems for Security and Privacy
Автор : Farhana Sheikh, Leonel Sousa
Издательство: CRC Press
Год издания : 2016
Страниц: 400
Формат : PDF
Размер файла: 12,1 Mб
Язык : English

This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.
Разместил: black 13-02-2019, 20:29 | Комментарии: 0 | Подробнее



 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности