|
|
|
|
|
|
|
| |
|
Название: Film and Video Production in the Cloud: Concepts, Workflows, and Best Practices Автор: Jack James Издательство: Focal Press Год: 2016 Формат: AZW3, EPUB, PDF Размер: 5 Мб Язык: английский / English
With cloud applications and services now widely available, film and video professionals have all the tools they need to work together on centralized platforms and effectively collaborate across separate desktop, web, and mobile devices. In Film and Video Production in the Cloud, veteran video production consultant Jack James provides a practical guide to cloud processes, concepts, and workflows as they relate to the most widely used cloud applications in the industry. |
Разместил: black 10-12-2017, 14:39 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Network Function Virtualization: Concepts and Applicability in 5G Networks Автор: Ying Zhang Издательство: Wiley-IEEE Press ISBN: 1119390605 Год: 2017 Страниц: 192 Язык: английский Формат: pdf, djvu Размер: 10.56 MB
A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. |
Разместил: Ingvar16 9-12-2017, 13:21 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Автор: Morey J. Haber,? Brad Hibbert Издательство: Apress Год: 2018 Страниц: 247 Формат: PDF, EPUB Размер: 10 Mb Язык: English
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges. |
Разместил: bhaer 9-12-2017, 12:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Основы теории информации Автор: Хохлов Г.И. Издательство: Академия Год: 2008 Страниц: 172 ISBN: 978-5-7695-4576-4 Формат: PDF Размер: 10 Мб Язык: русский
Дано современное определение информации, рассмотрены формы ее существования, виды преобразований. Изложены основные положения теории вероятностей К.Шеннона. Рассмотрена комбинаторная теория информации автора книги с учетом двойственности материального мира. |
Разместил: MIHAIL62 8-12-2017, 22:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Fog Computing in the Internet of Things: Intelligence at the Edge Автор: Pasi Liljeberg and J?rgo-S?ren Preden Издательство: Springer Год: 2017 Формат: AZW3, EPUB, PDF Размер: 11 Мб Язык: английский / English
This book describes state-of-the-art approaches to Fog Computing, including the background of innovations achieved in recent years. Coverage includes various aspects of fog computing architectures for Internet of Things, driving reasons, variations and case studies. |
Разместил: black 8-12-2017, 15:37 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control Автор: Daniel V. Hoffman Издательство: Wiley Год: 2008 Формат: EPUB, PDF Размер: 12 Мб Язык: английский / English
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. |
Разместил: black 8-12-2017, 15:15 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation Автор: Michelle Malcher Издательство: Apress Год: 2018 Страниц: 125 Формат: PDF, EPUB Размер: 10 Mb Язык: English
Adapt your career as a database administrator to the changing industry. Learn where the growth and demand for DBA talent are occurring and how to enhance your skill set. Creating databases, providing access, and controlling data are no longer the focus. What matters now is managing and monitoring the systems that provide access to users of the data. |
Разместил: bhaer 8-12-2017, 10:04 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management Автор: Neelesh Ajmani,? Dinesh Kumar Издательство: Apress Год: 2018 Страниц: 168 Формат: PDF, EPUB Размер: 10 Mb Язык: English
Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets. |
Разместил: bhaer 8-12-2017, 09:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Internet Technologies for Fixed and Mobile Networks Автор: Toni Janevski Издательство: Artech House Серия: Mobile Communications ISBN: 160807921X Год: 2017 Страниц: 389 Язык: английский Формат: pdf Размер: 10.4 MB
Сближение устаревших телекоммуникаций с Интернет и интернет-технологиями - это непрерывный процесс, в результате которого сходятся телекоммуникационные и интернет-миры. Основываясь на текущей и развивающейся отраслевой практике, эта книга посвящена интернет-технологиям, в частности принципам, протоколам (IP, IPv4, IPv6, DHCP, UDP, TCP) и службам Интернета для фиксированных и мобильных сетей, включая технологии, регулирование и бизнес-аспекты. |
Разместил: Ingvar16 7-12-2017, 22:01 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Antisocial Media: Crime-watching in the Internet Age Автор: Mark A. Wood Издательство: Palgrave Macmillan Год: 2017 Формат: AZW3, EPUB, PDF Размер: 5 Мб Язык: английский / English
This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment. |
Разместил: black 7-12-2017, 20:28 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|