|
|
|
|
|
|
|
| |
|
Название: Service Provider Networks: Design and Architecture Perspective Автор: Orhan Ergun Издательство: Leanpub Год: 2023-03-08 Страниц: 307 Язык: английский Формат: pdf (true) Размер: 14.49 MB
Service Provider Networks in many ways are unique networks. Many services might be serving millions of customers, so there might be many paths between different parts of the network as you will see in the book. There are many different types of Service Providers but there is very little information about some of them. This book will give you a High Level of an overview of the Service Provider Network Design and Architecture. It talks about the unique aspects of Service Provider networks, different types of Service Providers, and the business relationships between them. It covers the Service Providers' services, different access last mile offerings and transport networks, and their subscribers and services. Technical explanations about different types of Fixed and Mobile network services and the service provider's physical locations are also explained. You will see the Big Picture of Service Provider Networks.This book is organized in 9 Chapters: Chapter 1 will start with explaining different types of Service Providers. Without going into technical details, it will explain the business relationship between different types of Service Providers and their subscribers and services. Chapter 2 will be little bit more technical and will explain different types of Fixed and Mobile network services such as XDSL, FTTX, Cable Broadband, Fixed and Mobile Satellite, Wireless Internet Service and Mobile Broadband LTE (Long Term Evolution). |
Разместил: Ingvar16 11-03-2023, 12:56 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cyber Deception: Techniques, Strategies, and Human Aspects Автор: Tiffany Bao, Milind Tambe, Cliff Wang Издательство: Springer Серия: Advances in Information Security Год: 2023 Страниц: 252 Язык: английский Формат: pdf (true) Размер: 10.2 MB
This book introduces recent research results for cyber deception, a promising field for proactive cyber defense. The beauty and challenge of cyber deception is that it is an interdisciplinary research field requiring study from techniques and strategies to human aspects. This book covers a wide variety of cyber deception research, including game theory, Artificial Intelligence, cognitive science, and deception-related technology. We seek to create deceptive behaviors by leveraging evasion attacks against deep neural networks (DNNs). In particular, we propose to model an attacker as a DNN whose input is a trace of the observable behavior of a defended system. We then attempt evasion attacks that modify the observed behavior of the defended system such that the modified behavior obeys the above constraints: deceiving the attacker (into taking some action other than the action that would compromise the defended system), while remaining compatible with the original intended behavior of the system. |
Разместил: Ingvar16 11-03-2023, 03:54 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Understanding Search Engines Автор: Dirk Lewandowsk Издательство: Springer Год: 2023 Страниц: 297 Язык: английский Формат: pdf Размер: 26.7 MB
This book provides a broad introduction to search engines by integrating five different perspectives on Web search and search engines that are usually dealt with separately: the technical perspective, the user perspective, the internet-based research perspective, the economic perspective, and the societal perspective. After a general introduction to the topic, two foundational chapters present how search tools can cover the Web’s content and how search engines achieve this by crawling and processing the found documents. The next chapter on user behavior covers how people phrase their search queries and interact with search engines. This knowledge builds the foundation for describing how results are ranked and presented. The following three chapters then deal with the economic side of search engines, i.e., Google and the search engine market, search engine optimization (SEO), and the intermingling of organic and sponsored search results. Next, the chapter on search skills presents techniques for improving searches through advanced search interfaces and commands. Following that, the Deep Web and how its content can be accessed is explained. The two subsequent chapters cover ways to improve the quality of search results, while the next chapter describes how to access the Deep Web. |
Разместил: Ingvar16 10-03-2023, 20:22 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Security and Privacy Issues in Internet of Medical Things Автор: Rajkumar Buyya, Muhammad Imran Tariq, Valentina Emilia Balas Издательство: Academic Press/Elsevier Год: 2023 Страниц: 237 Язык: английский Формат: pdf Размер: 10.2 MB
Security and Privacy Issues in Internet of Medical Things addresses the security challenges faced by healthcare providers and patients. As IoMT devices are vulnerable to cyberattacks, and a security breach through IoMT devices may act as a pathway for hackers to enter hospital networks, the book covers a very timely topic. The incorporation of blockchain in the healthcare environment has given birth to the Internet of Medical Things (IoMT), which consists of a collection of healthcare systems that espouse groundbreaking technologies. Systems consist of inter-linked sensors, wearable technology devices and clinical frameworks that perform explicit, secure machine-to-machine and cloud platform communications. Artificial Intelligence (AI) technology has allowed the machine to discover, fit, and enhance based on the various datasets used to train AI. Artificial Intelligence (AI) has grown considerably in almost all fields of life in the recent past. To better the health-care sector and achieve a smart health ecosystem, the potential of existing technologies such as AI needs to be incorporated in giving better services. AI can serve as the major enabler for the IoMT domain assisting medical experts in all forms of health-care services ranging from clinical decisions to automated diagnosis and much more. |
Разместил: Ingvar16 10-03-2023, 13:44 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Internet of Things: Applications for Sustainable Development Автор: Niranjan Lal, Shamimul Qamar, Sanyam Agarwal, Ambuj Kumar Agarwal Издательство: CRC Press Серия: Internet of Things: Data-Centric Intelligent Computing, Informatics, and Communication Год: 2023 Страниц: 307 Язык: английский Формат: pdf (true) Размер: 18.1 MB
This book is a compendium of various applications and current progress in a powerful technology known as the Internet of Things (IoT). IoT provides a system of interconnecting things such as vehicles, electrical equipment, agriculture devices, etc. Such items are allocated with the computing device so that they can use a network to transfer data to one another and automate their actions on certain events. Internet of Things: Applications for Sustainable Development will throw light on recent developments in the latest field and will be of great interest to know various application areas for sustainable development. This book mainly focuses on the current state of the art, including protocol design and low-cost sensor design, for the sustainable development of society using IoT. |
Разместил: Ingvar16 10-03-2023, 03:41 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Vulnerability Assessment with Nessus and Wireshark: Identify, evaluate, treat, and report threats and vulnerabilities across your network Автор: Raphael Hungaro Moretti, Emerson E. Matsukawa Издательство: BPB Publications Год: 2023 Страниц: 216 Язык: английский Формат: epub (true) Размер: 10.2 MB
A practical guide that will help you map, shield, and harden your network perimeter using Nessus and Wireshark. Today, the world depends on services that run on the IT environments. These services, essentials for the modern world functioning constantly suffer attacks and invasions. This kind of preoccupation is true and must be a top priority for an IT security professional. This book will help you explore different techniques to locate, understand, and fix vulnerabilities that may exist in an IT infrastructure environment. The book starts by sharing the findings of professionals who are looking to create a secure IT environment. It then focuses on the building blocks of vulnerability assessment, tools, and frameworks that will help you find and map IT vulnerabilities. Moving on, the book deep dives into Network segregation and separation. It then shows you how to secure and harden your web servers using Apache and Nginx. Lastly, the book explains how to apply important hardening techniques to avoid operating system threats. This book is for Pentesters, Security analysts, Network administrators and also for any IT professionals who seek knowledge in security. |
Разместил: Ingvar16 9-03-2023, 11:09 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Искусственные нейронные сети: архитектуры, обучение, применения Автор: Бодянский Е.В., Руденко О.Г. Издательство: Телетех Год: 2004 Cтраниц: 370 Формат: pdf Размер: 15 мб Язык: русский
Рассмотрены основные типы нейронов, архитектур, алгоритмов обучения искусственных нейронных сетей. Особое внимание уделяется задачам обработки информации в реальном времени: классификации, эмуляции, прогнозирования, управления и т. п. в условиях структурной и параметрической неопределенности. Наряду с традиционными книга содержит оригинальные результаты, связанные с оптимизацией процессов обучения. |
Разместил: rivasss 7-03-2023, 10:38 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Complete Cloud Computing Manual - 17th Edition, 2023 Автор: Papercut Ltd Издательство: Papercut Ltd Год: 2023 Страниц: 154 Язык: английский Формат: pdf Размер: 93.9 MB
Learn how to make the most of the cloud for home & business! Cloud computing has been with us for a while now, giving home, small to medium business and enterprise users a new way in which to support and utilise their infrastructure and data. While the cloud may come with many concerns, chiefly that of security of data, it’s one of the fastest growing and interesting aspects of modern computing. With The Cloud Computing Guidebook we will show you how to implement and better utilise the cloud: personally or for your business. We also look at how to secure and even build your own cloud service. 100% unofficial. |
Разместил: Ingvar16 7-03-2023, 03:34 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: The Complete Google User Manual - 17th Edition 2023 Автор: Papercut Издательство: Papercut Limited Год: 2023 Страниц: 144 Язык: английский Формат: pdf Размер: 51,7 MB
Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Начав со скромной поисковой системы, Google теперь предоставляет электронную почту с бесплатным онлайн-хранилищем, управление и редактирование фотографий, социальные сети с миллионами пользователей, один из лучших интернет-браузеров, крупнейший в мире видеосайт, ведущую на рынке операционную систему для смартфонов Android, интерактивные карты и навигацию, бесплатную платформу для ведения блогов и многое, многое другое. 100% неофициальное руководство. |
Разместил: Ingvar16 4-03-2023, 11:36 | Комментарии: 0 | Подробнее
| | | |
|
| |
|
|
|
|
|
|
| |
|
Название: Cybertax: Managing the Risks and Results Автор: George K. Tsantes, James Ransome Издательство: CRC Press/Auerbach Publications Серия: IT Pro Practice Notes Год: 2023 Страниц: 139 Язык: английский Формат: pdf (true) Размер: 10.1 MB
Cybersecurity risk is a top-of-the-house issue for all organizations. Cybertax—Managing the Risks and Results is a must read for every current or aspiring executive seeking the best way to manage and mitigate cybersecurity risk. It examines cybersecurity as a tax on the organization and charts the best ways leadership can be cybertax efficient. Viewing cybersecurity through the cybertax lens provides an effective way for non–cybersecurity experts in leadership to manage and govern cybersecurity in their organizations. In a perfect world, we would not need cybersecurity. Technology would work without interference, there would be no malicious actors, and users would never make mistakes. There would be no holes or errors in the code that powers technology, and communications between technologies would be secure. Unfortunately, the opposite is true. Technology systems are open and invite malicious exploits, bad actors are multiplying in numbers and sophistication, and users constantly make errors that allow bad things to happen. The number of devices and apps connected to the Internet is growing exponentially. Cybersecurity is a necessary program for any organization or individual. It is a tax on the organization; we call this “cybertax.” |
Разместил: Ingvar16 3-03-2023, 15:31 | Комментарии: 0 | Подробнее
| | | |
|
| |
br>
|