|
|
|
|
|
|
|
| |
|
Название: Introducing Materialize Автор: Anirudh Prabhu and Aravind Shenoy Издательство: Apress Год: 2017 Формат: PDF, EPUB Размер: 10 Мб Язык: английский / English
This concise step-by-step guide includes the best practices and patterns that help readers of all levels to unearth the potential of Materialize. A responsive framework based on Google’s innovative Material Design language, Materialize provides CSS and jаvascript features similar to other popular frameworks such as Bootstrap and Foundation. |
Разместил: bomboane 14-02-2019, 16:13 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Network Security (Networks and Telecommunications Series) Автор: Andr? P?rez Издательство: Wiley-ISTE Год: 2014 Формат: PDF Страниц: 262 Для сайта: mymirknig.ru Размер: 5 Mb Язык: English This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks. The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection. |
Разместил: Ice Zero 14-02-2019, 13:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Combinatorial Search: From Algorithms to Systems Автор: Youssef Hamadi Издательство: Springer Год: 2013 Формат: PDF Страниц: 139 Для сайта: mymirknig.ru Размер: 2 Mb Язык: English Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to efficiently explore these regions. Various mathematical formalisms may be used to express and tackle combinatorial problems, among them the constraint satisfaction problem (CSP) and the propositional satisfiability problem (SAT). These algorithms, or constraint solvers, apply search space reduction through inference techniques, use activity-based heuristics to guide exploration, diversify the searches through frequent restarts, and often learn from their mistakes. |
Разместил: Ice Zero 14-02-2019, 11:54 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название : Circuits and Systems for Security and Privacy Автор : Farhana Sheikh, Leonel Sousa Издательство: CRC Press Год издания : 2016 Страниц: 400 Формат : PDF Размер файла: 12,1 Mб Язык : English
This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications. |
Разместил: black 13-02-2019, 20:29 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Media and Radio Signal Processing for Mobile Communications Автор: Kyunghun Jung and Russell M. Mersereau Издательство: Cambridge University Press Год: 2018 Формат: PDF Размер: 34 Мб Язык: английский / English
Get to grips with the principles and practice of signal processing used in mobile communications systems. Focusing particularly on speech, video, and modem signal processing, pioneering experts employ a detailed, top-down analytical approach to outline the network architectures and protocol structures of multiple generations of mobile communications systems, identify the logical ranges where media and radio signal processing occur, and analyze the procedures for capturing, compressing, transmitting, and presenting media. |
Разместил: black 13-02-2019, 17:50 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: CISO's Guide to Penetration Testing Автор: James S. Tiller Издательство: CRC Press Год: 2011 Формат: PDF, EPUB Размер: 12 Мб Язык: английский / English
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. |
Разместил: black 13-02-2019, 17:19 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance Автор: Karm Veer Arya and Robin Singh Bhadoria Издательство: Springer Год: 2018 Формат: PDF Размер: 11 Мб Язык: английский / English
The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies. |
Разместил: black 13-02-2019, 17:17 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: How to Do Everything: iCloud, Second Edition Автор: Jason R. Rich Издательство: McGraw-Hill Education Год: 2014 Формат: PDF Размер: 27 Мб Язык: английский / English
This all-new edition of How To Do Everything: iCloud fully covers iCloud’s versatile features and offers step-by-step directions on how to use each one, including Shared Photo Streams, the iWork for iCloud apps, and iCloud Keychain. You’ll learn how to set up iCloud, transfer and sync app-specific data, documents, files, photos, music, and other content among your computers and iOS mobile devices. |
Разместил: black 12-02-2019, 22:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Architectures and Protocols for Secure Information Technology Infrastructures Автор: Ruiz-Martinez Издательство: Information Science Reference Год: 2013 Формат: PDF Размер: 25 Мб Язык: английский / English
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security. |
Разместил: black 12-02-2019, 21:57 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Architectural Transformations in Network Services and Distributed Systems Автор: Andriy Luntovskyy and Josef Spillner Издательство: Springer Год: 2017 Формат: PDF Размер: 18 Мб Язык: английский / English
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed. |
Разместил: black 12-02-2019, 21:35 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|