Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Название: Magento 1 DIY
Автор: Viktor Khliupko
Издательство: Apress
Год: 2017
Формат: PDF, EPUB
Размер: 12 Мб
Язык: английский / English

Learn how Magento 1 works and how to manage it via easy and advanced techniques. Magento continues to be a top choice for eCommerce solutions in small and large businesses, and many systems are still running on Magento 1.x. This book is specifically designed for these versions. Aimed at entrepreneurs, marketers, and other experts interested in eCommerce, Magento 1 DIY shows you how to set up and configure Magento 1 for your own project. You will also learn how to use extensions, templates and enterprise features guided by easy-to-understand, real-world examples.
Разместил: black 14-02-2019, 16:39 | Комментарии: 0 | Подробнее
Название: Introducing Materialize
Автор: Anirudh Prabhu and Aravind Shenoy
Издательство: Apress
Год: 2017
Формат: PDF, EPUB
Размер: 10 Мб
Язык: английский / English

This concise step-by-step guide includes the best practices and patterns that help readers of all levels to unearth the potential of Materialize. A responsive framework based on Google’s innovative Material Design language, Materialize provides CSS and jаvascript features similar to other popular frameworks such as Bootstrap and Foundation.
Разместил: bomboane 14-02-2019, 16:13 | Комментарии: 0 | Подробнее
Название: Network Security (Networks and Telecommunications Series)
Автор: Andr? P?rez
Издательство: Wiley-ISTE
Год: 2014
Формат: PDF
Страниц: 262
Для сайта: mymirknig.ru
Размер: 5 Mb
Язык: English
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.
The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
Разместил: Ice Zero 14-02-2019, 13:00 | Комментарии: 0 | Подробнее
Название: Combinatorial Search: From Algorithms to Systems
Автор: Youssef Hamadi
Издательство: Springer
Год: 2013
Формат: PDF
Страниц: 139
Для сайта: mymirknig.ru
Размер: 2 Mb
Язык: English
Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to efficiently explore these regions. Various mathematical formalisms may be used to express and tackle combinatorial problems, among them the constraint satisfaction problem (CSP) and the propositional satisfiability problem (SAT). These algorithms, or constraint solvers, apply search space reduction through inference techniques, use activity-based heuristics to guide exploration, diversify the searches through frequent restarts, and often learn from their mistakes.
Разместил: Ice Zero 14-02-2019, 11:54 | Комментарии: 0 | Подробнее

Название : Circuits and Systems for Security and Privacy
Автор : Farhana Sheikh, Leonel Sousa
Издательство: CRC Press
Год издания : 2016
Страниц: 400
Формат : PDF
Размер файла: 12,1 Mб
Язык : English

This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.
Разместил: black 13-02-2019, 20:29 | Комментарии: 0 | Подробнее
Название: Media and Radio Signal Processing for Mobile Communications
Автор: Kyunghun Jung and Russell M. Mersereau
Издательство: Cambridge University Press
Год: 2018
Формат: PDF
Размер: 34 Мб
Язык: английский / English

Get to grips with the principles and practice of signal processing used in mobile communications systems. Focusing particularly on speech, video, and modem signal processing, pioneering experts employ a detailed, top-down analytical approach to outline the network architectures and protocol structures of multiple generations of mobile communications systems, identify the logical ranges where media and radio signal processing occur, and analyze the procedures for capturing, compressing, transmitting, and presenting media.
Разместил: black 13-02-2019, 17:50 | Комментарии: 0 | Подробнее
Название: CISO's Guide to Penetration Testing
Автор: James S. Tiller
Издательство: CRC Press
Год: 2011
Формат: PDF, EPUB
Размер: 12 Мб
Язык: английский / English

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used.
Разместил: black 13-02-2019, 17:19 | Комментарии: 0 | Подробнее
Название: Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance
Автор: Karm Veer Arya and Robin Singh Bhadoria
Издательство: Springer
Год: 2018
Формат: PDF
Размер: 11 Мб
Язык: английский / English

The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies.
Разместил: black 13-02-2019, 17:17 | Комментарии: 0 | Подробнее
Название: How to Do Everything: iCloud, Second Edition
Автор: Jason R. Rich
Издательство: McGraw-Hill Education
Год: 2014
Формат: PDF
Размер: 27 Мб
Язык: английский / English

This all-new edition of How To Do Everything: iCloud fully covers iCloud’s versatile features and offers step-by-step directions on how to use each one, including Shared Photo Streams, the iWork for iCloud apps, and iCloud Keychain. You’ll learn how to set up iCloud, transfer and sync app-specific data, documents, files, photos, music, and other content among your computers and iOS mobile devices.
Разместил: black 12-02-2019, 22:01 | Комментарии: 0 | Подробнее
Название: Architectures and Protocols for Secure Information Technology Infrastructures
Автор: Ruiz-Martinez
Издательство: Information Science Reference
Год: 2013
Формат: PDF
Размер: 25 Мб
Язык: английский / English

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.
Разместил: black 12-02-2019, 21:57 | Комментарии: 0 | Подробнее



 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности