|
|
|
|
|
|
|
| |
|
Название: CCNP Enterprise Design ENSLD 300-420 Official Cert Guide, 2nd Edition Автор: Anthony Bruno, Steve Jordan Издательство: Cisco Press Год: 2024 Страниц: 714 Язык: английский Формат: pdf, epub Размер: 62.6 MB
CCNP Enterprise Design ENSLD 300-420 Official Cert Guide: Designing Cisco Enterprise Networks from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Expert authors Anthony Bruno and Steve Jordan share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success This official study guide helps you master all the topics on the CCNP Designing Cisco Enterprise Networks (300-420 ENSLD) exam. |
Разместил: Ingvar16 20-10-2023, 03:16 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Practical Cloud Security: A Guide for Secure Design and Deployment, 2nd Edition (Final) Автор: Chris Dotson Издательство: O’Reilly Media, Inc. Год: 2024 Страниц: 228 Язык: английский Формат: pdf, epub (true) Размер: 10.1 MB
With rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. In this updated second edition, you'll examine security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques for securing popular cloud platforms such as Amazon Web Services, Microsoft Azure, and IBM Cloud. IBM Distinguished Engineer Chris Dotson shows you how to establish data asset management, identity and access management (IAM), vulnerability management, network security, and incident response in your cloud environment. |
Разместил: Ingvar16 19-10-2023, 21:46 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Integration of Cloud Computing with Emerging Technologies: Issues, Challenges, and Practices Автор: Sapna Sinha, Vishal Bhatnagar, Prateek Agrawal, Vikram Bali Издательство: CRC Press Год: 2024 Страниц: 271 Язык: английский Формат: pdf (true), epub Размер: 32.3 MB
This book gives a complete overview of cloud computing, its importance, its trends, innovations, and its amalgamation with other technologies. It provides content for reference. Cloud computing practice using a network of remote server hosted on the Internet to store, manage, and process data, while AI has to struggle to gain footholds in other niches, it is finding its place in the world of cloud computing. The revolution is that it could rapidly change the face of businesses using cloud computing solutions over the next few years. The three areas of cloud computing AI that have taken long strides are parallel processing, ML and ML algorithm, and big data. This convergence also allowed IoT application to leverage the benefits of the cloud challenges’ conflicting properties. In integration of cloud computing with mobile or mobile cloud computing, the brain of services in the cloud are easier to share content and assets are easier to maintain the data and are more immune to crashes and deletion. The book aims to include different case studies or real-life scenario, where this integration of cloud and other technologies has made the huge difference. This book, Integration of Cloud Computing with Emerging Technologies: Issues, Challenges, and Practices, includes a chapter on technological advancement of cloud computing, its trends, and ongoing status of each as per perception of the contributors to help in its easier adoption in the areas where it is yet to be implemented. |
Разместил: Ingvar16 17-10-2023, 08:32 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Online Security For Beginners 16th Edition 2023 Автор: Papercut Limited Издательство: Papercut Limited Год: 2023 Страниц: 98 Язык: английский Формат: PDF Размер: 57,9 MB
Кибербезопасность - одна из самых современных и актуальных профессиональных областей. Этот курс предоставляет широкий обзор концепций и практик кибербезопасности. Начиная с фундаментальных основ кибербезопасности, дополнительные уроки знакомят с центральными технологиями, такими как шифрование, "песочница" и антивирусы. Также рассматриваются вопросы защиты вашего сайта Wordpress и вашей личности в Интернете, безопасные онлайн-транзакции, безопасность электронной почты и способы ведения кибердеятельности. |
Разместил: Dovegone 16-10-2023, 15:27 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Metaverse Communication and Computing Networks: Applications, Technologies, and Approaches Автор: Dinh Thai Hoang, Diep N. Nguyen, Cong T. Nguyen Издательство: Wiley-IEEE Press Год: 2024 Страниц: 355 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Understand the future of the Internet with this wide-ranging analysis. “Metaverse” is the term for applications that allow users to assume digital avatars to interact with other humans and software functions in a three-dimensional virtual space. These applications and the spaces they create constitute an exciting and challenging new frontier in digital communication. Surmounting the technological and conceptual barriers to creating the Metaverse will require researchers and engineers familiar with its underlying theories and a wide range of technologies and techniques. Metaverse Communication and Computing Networks provides a comprehensive treatment of Metaverse theory and the technologies that can be brought to bear on this new pursuit. It begins by describing the Metaverse’s underlying architecture and infrastructure, physical and digital, before addressing how existing technologies are being adapted to its use. It concludes with an overview of the challenges facing the Metaverse. The result is a thorough introduction to a subject that may define the future of the Internet. Edge-computing technologies are considered to be one of the fundamental infrastructures for the realization of the full-dive Metaverse. Edge computing refers to the deployment of edge servers with cloud computing capabilities at the edge of networks that can be accessed by end devices via wireless connections. |
Разместил: Ingvar16 14-10-2023, 03:06 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Ultimate Blockchain Security Handbook: Advanced Cybersecurity Techniques and Strategies for Risk Management, Threat Modeling, Pen Testing, and Smart Contract Defense for Blockchain Автор: Taha Sajid Издательство: Orange Education Pvt Ltd, AVA Год: October 2023 Страниц: 204 Язык: английский Формат: pdf, epub (true) Размер: 11.5 MB
Blockchain Security is not an option, it's a necessity. The Ultimate Blockchain Security Handbook will help you identify and remediate your Blockchain solution bugs before others do. Covering the latest threats and vulnerabilities, as well as effective mitigation strategies, it takes you on a journey from the security foundations of blockchain technology to implementing advanced security solutions for blockchain applications. It helps you identify, assess, and mitigate risks using a variety of tools and techniques, including threat modeling, penetration testing, vulnerability scanning, attack analysis, and security audits. It covers formal verification methods for testing smart contract code, with an application of the K semantic framework. It then explores a range of blockchain security solutions, including zero-knowledge proof architecture, access control design, establishment of robust public key infrastructures, and the implementation of security logging and monitoring tools to track activities effectively. This book is tailored for blockchain developers, architects, security experts, software professionals, and researchers/cryptographers seeking in-depth knowledge of blockchain security. |
Разместил: Ingvar16 13-10-2023, 21:11 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Intelligent Reflecting Surface-Aided Physical-Layer Security Автор: Feng Shu, Jiangzhou Wang Издательство: Springer Серия: Wireless Networks Год: 2023 Страниц: 250 Язык: английский Формат: pdf (true), epub Размер: 26.6 MB
This book discusses the problems of Physical Layer Security (PLS) in Intelligent Reflecting Surface (IRS)-assisted wireless networks. It also discusses the corresponding methods to solve these problems in a comprehensive style. Furthermore, some potential challenges are well analyzed. This book is divided into 11 chapters. Chapter 1 introduces the propagation characteristics of IRS-aided PLS communications. From Chapter 2 to Chapter 10, The authors mainly provide deep investigations of different PLS problems of IRS-aided wireless networks, namely, directional modulation (DM) networks. Chapter 11 draws a conclusion and includes the future research directions. Researchers working in wireless communications, or advanced-level computer science or electrical engineering students, can learn about secure communication in the physical layer through our book. Professionals or engineers working in this field will also benefit from this book. |
Разместил: Ingvar16 13-10-2023, 18:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Attribute-based Encryption (ABE): Foundations and Applications within Blockchain and Cloud Environments Автор: Qi Xia, Jianbin Gao, Isaac Amankona Obiri Издательство: Wiley-IEEE Press Год: 2024 Страниц: 275 Язык: английский Формат: pdf (true), epub Размер: 17.2 MB
Enables readers to understand applications of attribute-based encryption schemes in cloud computing with the support of blockchain technology. With a focus on blockchain technology, Attribute-based Encryption (ABE) provides insight into the application of attribute-based encryption (ABE) schemes, discussing types of blockchains, fundamentals of blockchain, and how blockchains are constructed. Comprised of 16 chapters, the text provides an overview of the components that go into creating a dual ABE system of encryption proofs within the following: composite bilinear groups, dual pairing vector space framework, matrix pairing framework, framework for matrix pairing, and the application of cryptographic scheme on blockchain. The team of authors discuss the basic construction components of ABE and share the security models, including the selective and semi- adaptive security models, applying these to either prime order or composite order groups. Attribute-based Encryption (ABE) is an essential resource for professionals working in the field of design and cybersecurity who wish to understand how to use blockchain and the ABE scheme to provide fine-grained access control in outsourced data on third-party cloud servers. |
Разместил: Ingvar16 13-10-2023, 14:00 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Analysis and Synthesis for Networked Multi-Rate Systems Автор: Yuxuan Shen, Zidong Wang, Hongli Dong Издательство: CRC Press Год: 2024 Страниц: 260 Язык: английский Формат: pdf (true) Размер: 10.2 MB
In this book, we present the novel state estimation methods for several classes of networked multi-rate systems. The content of this book can be divided into two parts. In the first part, we show the state estimation methods for networked multi-rate systems with various complex network-induced phenomena. The state estimation methods for networked multi-rate systems under the communication protocols are presented in the second part. The systems we investigated include stochastic non-linear systems, time-delay systems, linear repetitive processes, and Artificial Neural Networks (ANNs). The complex networkinduced phenomena considered are time-delays, integral measurements, sensor resolutions, and dynamical bias. The communication protocols included are the Round-Robin protocol, the weighted Try-Once-Discard protocol, the p-persistent carrier sense multiple access protocol, and the dynamic event-triggered protocol. The techniques used are mainly the Lyapunov stability theory, the optimal estimation theory, the lifting technique, and certain convex optimization methods. This book provides valuable reference materials for researchers who wish to explore the state estimation for multi-rate systems. With the rapid development of wireless communication technology and digital technology, networked systems have been widely applied in practical applications such as process monitoring, power grids, industrial control systems, and traffic systems. In networked systems, the signals generated by system components, including the sensors, underlying plant, and controllers, are first sampled and then transmitted through communication networks. |
Разместил: Ingvar16 13-10-2023, 11:59 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Confident Cyber Security: The Essential Insights and How to Protect from Threats, 2nd Edition Автор: Jessica Barker Издательство: Kogan Page Серия: Confident Series Год: 2023 Страниц: 265 Язык: английский Формат: pdf (true), epub Размер: 10.9 MB
The world is more digitally connected than ever before and, with this connectivity, comes vulnerability. This book will equip you with all the skills and insights you need to understand cyber security and kickstart a prosperous career. Confident Cyber Security is here to help. From the human side to the technical and physical implications, this book takes you through the fundamentals: how to keep secrets safe, how to stop people being manipulated and how to protect people, businesses and countries from those who wish to do harm. Featuring real-world case studies including Disney, the NHS, Taylor Swift and Frank Abagnale, this book is packed with clear explanations, sound advice and practical exercises to help you understand and apply the principles of cyber security. This new edition covers increasingly important topics such as deepfakes, AI and blockchain technology. |
Разместил: Ingvar16 11-10-2023, 09:39 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|