Добавить в избранное
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Найти книгу:
Вход на сайт


Converged Communications: Evolution from Telephony to 5G Mobile InternetНазвание: Converged Communications: Evolution from Telephony to 5G Mobile Internet
Автор: Erkki Koivusalo
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 479
Язык: английский
Формат: pdf (true)
Размер: 10.3 MB

A one-of-a-kind exploration of the past, present, and future of telecommunications. In Converged Communications: Evolution from Telephony to 5G Mobile Internet, telecommunications industry veteran Erkki Koivusalo delivers an essential reference describing how different communications systems work, how they have evolved from fixed telephone networks to the latest 5G mobile systems, and how the voice and data services converged. The central theme of the book is to build deeper understanding about incremental technological progress by introducing both state of the art and their predecessor technologies. The book explores four main areas, including fixed telephone systems, data communication systems, mobile cellular systems, and IP multimedia systems. It clearly explains architectures, protocols, and functional procedures, and discusses a variety of topics ranging from physical layer processes to system level interactions.
Разместил: Ingvar16 24-10-2022, 23:20 | Комментарии: 0 | Подробнее
Cisco SD-WAN : A Practical Guide to Understand the Basics of Cisco Viptela Based SD-WAN solutionНазвание: Cisco SD-WAN : A Practical Guide to Understand the Basics of Cisco Viptela Based SD-WAN solution
Автор: Toni Pasanen
Издательство: Leanpub
Серия: The Network Times
Год: 2021-05-23
Страниц: 305
Язык: английский
Формат: pdf (true)
Размер: 60.6 MB

A modern SD-WAN solution offers automated and secure device onboarding as well well as Centralized Management and Control Plane. It also supports multiple VPNs over a common underlay network as well as highly secure Direct Cloud/Internet Access and Application-Aware Routing. I wrote this book primarily for those of you who want to learn the basics of a Cisco SD-WAN solution. The first two chapters explain how to set up your local test environment. You will learn how to install certificates to vBond, vManage, vSmart, and vEdge and how to set up underlay and Out-of-Band management network connections. Chapter three introduces a centralized control plane with the Overlay Management Protocol (OMP) running between vEdges and vSmart. After reading this chapter, you should be familiar with how overlay tunnels between vEdges are built by using TLOC routes. Besides, you learn how Sevice VPN routing information is advertised by using OMP routes.
Разместил: Ingvar16 24-10-2022, 03:52 | Комментарии: 0 | Подробнее
Microsoft Defender for CloudНазвание: Microsoft Defender for Cloud
Автор: Yuri Diogenes, Tom Janetscheck
Издательство: Microsoft Press/Pearson Education
Год: 2023
Страниц: 510
Язык: английский
Формат: epub
Размер: 39.9 MB

The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management – all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors.
Разместил: Ingvar16 24-10-2022, 03:13 | Комментарии: 0 | Подробнее
Cross-Industry Applications of Cyber Security FrameworksНазвание: Cross-Industry Applications of Cyber Security Frameworks
Автор: Sukanta Kumar Baral, Richa Goel, Md Mashiur Rahman, Jahangir Sultan
Издательство: IGI Global
Год: 2022
Страниц: 265
Язык: английский
Формат: pdf (true), epub
Размер: 25.9 MB

Data is the most important commodity, which is why data protection has become a global priority. Data breaches and security flaws can jeopardize the global economy. Organizations face a greater risk of failing to achieve strategy and business goals as cyber threat behavior grows in frequency, sophistication, and destructiveness. A breach can result in data loss, business interruption, brand and reputation harm, as well as regulatory and legal consequences. A company needs a well-thought-out cybersecurity strategy to secure its critical infrastructure and information systems in order to overcome these challenges. Chapter 2 talks about the role of Artificial Intelligence (AI) on cybersecurity and its control. Nowadays, cyber security is paramount in all aspects of life, particularly in digital technology. Stories of Artificial Intelligence and data breaches, ID theft, cracking the security code, operating machines with remote sensors, and other such incidents abound, affecting millions of individuals and organizations. The problems in developing appropriate controls and processes and applying them with utmost precision to combat cyber-attacks & crimes have always been unending. With recent advances in Artificial Intelligence, the ever-increasing danger of cyber-attacks and crimes has grown tremendously.
Разместил: Ingvar16 21-10-2022, 15:23 | Комментарии: 0 | Подробнее
Security Awareness For DummiesНазвание: Security Awareness For Dummies
Автор: Ira Winkler CISSP, Tristan Morris
Издательство: For Dummies
Год: 2022
Страниц: 241
Язык: английский
Формат: pdf (true), epub
Размер: 10.7 MB

Make security a priority on your team. Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and protocols, it’s increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization. Cyberattacks aren’t going away anytime soon: get this smart, friendly guide on how to get a workgroup on board with their role in security and save your organization big money in the long run.
Разместил: Ingvar16 20-10-2022, 19:03 | Комментарии: 0 | Подробнее
5G New Radio Non-Orthogonal Multiple AccessНазвание: 5G New Radio Non-Orthogonal Multiple Access
Автор: Yifei Yuan, Zhifeng Yuan
Издательство: CRC Press
Год: 2023
Страниц: 352
Язык: английский
Формат: pdf (true)
Размер: 87.5 MB

This book provides detailed descriptions of downlink non-orthogonal multiple transmissions and uplink non-orthogonal multiple access (NOMA) from the aspects of majorly used 5G new radio scenarios and system performance. For the downlink, the discussion focuses on the candidate schemes in 3GPP standards which are not only applicable to unicast services but also to broadcast/multicast scenarios. For the uplink, the main target scenario is massive machine-type communications where grant-free transmission can reduce signaling overhead, power consumption of devices and access delays. The design principles of several uplink NOMA schemes are discussed in-depth, together with the analysis of their performances and receiver complexities. In the communications industry, greater interest is seen in the innovative upgrade of the systems by integrating advanced wireless and network technologies of 5G.
Разместил: Ingvar16 19-10-2022, 02:45 | Комментарии: 0 | Подробнее
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot (Early Release)Название: Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot (Early Release)
Автор: Mark Needham, Dunith Dhanushka
Издательство: O’Reilly Media, Inc.
Год: 2022-10-24
Язык: английский
Формат: epub (true), mobi
Размер: 10.1 MB

Gain deep insight into real-time analytics, including the features of these systems and the problems they solve. With this practical book, data engineers at organizations that use event-processing systems such as Kafka, Google Pub/Sub, and AWS Kinesis will learn how to analyze data streams in real time. The faster you derive insights, the quicker you can spot changes in your business and act accordingly. In the first part of this book, authors Mark Needham and Dunith Dhanushka from StarTree provide an overview of the real-time analytics space and an understanding of what goes into building real-time applications. The second part offers a series of hands-on tutorials that show you how to combine multiple software products to build real-time analytics applications for an imaginary pizza delivery service.
Разместил: Ingvar16 19-10-2022, 02:29 | Комментарии: 0 | Подробнее
Название: Network Science: Analysis and Optimization Algorithms for Real-World Application
Автор: Carlos Andre Reis Pinheiro
Издательство: Wiley
Год: 2022
Формат: True PDF
Страниц: 354
Размер: 41,4 Mb
Язык: English

Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems.
The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results.
Разместил: vitvikvas 18-10-2022, 12:53 | Комментарии: 0 | Подробнее
Energy Efficient Spectrum Resources Usage in WPANs: IEEE 82.15.4 MAC Sub-layer ProtocolsНазвание: Energy Efficient Spectrum Resources Usage in WPANs: IEEE 82.15.4 MAC Sub-layer Protocols
Автор: Fernando Jose Velez, Luis Miguel Borges
Издательство: River Publishers
Год: 2022
Страниц: 434
Язык: английский
Формат: pdf (true)
Размер: 10.28 MB

Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are open challenges that need to be tackled for the future generation of WSNs, and this book gives answers to some of the important questions that need to be answered. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet.
Разместил: Ingvar16 17-10-2022, 20:00 | Комментарии: 0 | Подробнее
Название: Computer Security Fundamentals, 5th Edition (Rough Cuts)
Автор: Dr. Chuck Easttom
Издательство: Pearson
Год: 2023
Формат: ePUB
Страниц: 868
Размер: 24 Mb
Язык: English

Drawing on more than 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore while addressing the realities of a world where billions of new devices are Internet-connected.
Разместил: vitvikvas 17-10-2022, 17:52 | Комментарии: 0 | Подробнее

 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности