Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Реклама


Power Systems Cybersecurity: Methods, Concepts, and Best PracticesНазвание: Power Systems Cybersecurity: Methods, Concepts, and Best Practices
Автор: Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong
Издательство: Springer
Год: 2023
Страниц: 463
Язык: английский
Формат: pdf (true)
Размер: 11.8 MB

This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems. Three Machine Learning (ML) methods Random Forest (RF), Logistic Regression (LR), and K-nearest neighbors (KNN) - as well as one Deep Learning (DL) method-SDAE - are dynamically compared in terms of F1 - score and accuracy. After the completion of the retraining process, the best-performing model replaces the existing one and labels the incoming data.
Разместил: Ingvar16 11-02-2023, 20:27 | Комментарии: 0 | Подробнее

Название: Криптография. Как защитить свои данные в цифровом пространстве
Автор: Кит Мартин
Издательство: Эксмо
Год: 2023
Формат: pdf, rtf
Размер: 11 Мб
Качество: Хорошее
Язык: Русский

Криптография – ключ к цифровой безопасности. Имея базовое представление о ней, вы сможете не только защитить свои данные от угроз, кроющихся в киберпространстве, но и лучше понять природу интернет-технологий, все глубже внедряющихся в нашу повседневную жизнь. Каковы потенциальные последствия подключения к незащищенной сети Wi-Fi? Так ли уж важно иметь разные пароли для разных учетных записей? Если вы видите, что у веб-сайта нет действительного сертификата, стоит ли продолжать с ним работу? Ответы на эти и другие вопросы вы найдете внутри.
Разместил: tanyavip1 11-02-2023, 12:22 | Комментарии: 0 | Подробнее
Blockchain Technology Solutions for the Security of IoT-Based Healthcare SystemsНазвание: Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems
Автор: Bharat Bhushan, Sudhir Kumar Sharma
Издательство: Academic Press/Elsevier
Год: 2023
Страниц: 460
Язык: английский
Формат: pdf
Размер: 12.4 MB

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice.
Разместил: Ingvar16 10-02-2023, 20:05 | Комментарии: 0 | Подробнее
Google Certified Professional Cloud Network Engineer: Study Guide With Practice Questions & Labs - First EditionНазвание: Google Certified Professional Cloud Network Engineer: Study Guide With Practice Questions & Labs - First Edition - 2021
Автор: IPSpecialist
Издательство: IPSpecialist
Год: 2021
Страниц: 530
Язык: английский
Формат: pdf, epub
Размер: 29.1 MB

This is a highly practical, intensive, yet comprehensive book that will teach you to become a Google Cloud Network Engineer. The book is for anyone who would like to master the art of Google Cloud Networking. Its a perfect resource to pass the Google Professional Cloud Network Engineer Certification on the first attempt. Virtual Private Cloud (VPC) is an implemented private network on Google Cloud. The difference between a traditional and an on-premises network is that VPC is SDN. Software-Defined Network (SDN): We can see that the traditional network uses integrated software and hardware to direct traffic using routers and switches. SDN virtualizes the network by a smart controller that controls all network traffic and routers and switches that forward the traffic. Virtualizing networks can have certain advantages. With SDN, hardware management is abstracted away, which means it removes maintenance overhead and allows you to customize your services. If you do not have to worry about the number of ports on the switch, you do not have to worry about the number of virtual machines. SDN will handle that capacity.
Разместил: Ingvar16 10-02-2023, 16:35 | Комментарии: 0 | Подробнее
Driving 5G Mobile Communications with Artificial Intelligence towards 6GНазвание: Driving 5G Mobile Communications with Artificial Intelligence towards 6G
Автор: Dragorad A. Milovanovic, Zoran S. Bojkovic, Tulsi Pawan Fowdur
Издательство: CRC Press
Год: 2023
Страниц: 503
Язык: английский
Формат: pdf (true)
Размер: 19.3 MB

Driving 5G Mobile Communications with Artificial Intelligence towards 6G presents current work and directions of continuously innovation and development in multimedia communications with a focus on services and users. The fifth generation of mobile wireless networks achieved the first deployment by 2020, completed the first phase of evolution in 2022, and started transition phase of 5G-Advanced toward the sixth generation. Perhaps one of the most important innovations brought by 5G is the platform-approach to connectivity, i.e., a single standard that can adapt to the heterogeneous connectivity requirements of vastly different use cases. 5G networks contain a list of different requirements, standardized technical specifications and a range of implementation options with spectral efficiency, latency, and reliability as primary performance metrics. Towards 6G, Machine Learning (ML) and Artificial Intelligence (AI) methods have recently proposed new approaches to modeling, designing, optimizing and implementing systems. They are now matured technologies that improve many research fields significantly.
Разместил: Ingvar16 10-02-2023, 09:40 | Комментарии: 0 | Подробнее
Internet of Everything: Key Technologies, Practical Applications and Security of IoTНазвание: Internet of Everything: Key Technologies, Practical Applications and Security of IoT
Автор: Hang Song
Издательство: World Scientific Publishing
Год: 2023
Страниц: 838
Язык: английский
Формат: pdf (true)
Размер: 106.7 MB

This book provides comprehensive coverage on the concepts, frameworks, and underpinning technologies in most aspects of the Internet of Things (IoT), and presents them as the foundation on which more advanced topics, such as 5G and mMTC/M2M, Edge/cloud computing and the modalities of Tactile IoT, Industrial IoT (IIoT)/Industry 4.0, Satellite IoT, and Digital Twins (DT), could be built upon. A key feature of the book is the chapter that focuses on security and privacy for individuals and IoT/ Industry 4.0 are discussed. Cloud/Edge with virtualized storage media by way of IoT platforms, enables data storage, data analysis via machine learning and artificial intelligence techniques, and provides facilities for multiple stakeholders, including users/providers/integrators in the generalized or specific platforms. As for smart manufacturing and Industrial 4.0, the advances of IoT practice and application delivering real-time services further push forward the development in automation, management and super connectivity, which is essential for the evolution of industries, new commercial models, and in all aspects of everyday life. Now is it is the moment for us to get to know and go deeper into the IoT world.
Разместил: Ingvar16 8-02-2023, 18:23 | Комментарии: 0 | Подробнее
AIoT Technologies and Applications for Smart EnvironmentsНазвание: AIoT Technologies and Applications for Smart Environments
Автор: Mamoun Alazab, Meenu Gupta, Shakeel Ahmed
Издательство: The Institution of Engineering and Technology
Год: 2023
Страниц: 333
Язык: английский
Формат: pdf (true)
Размер: 19.2 MB

Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial Intelligence of Things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, Data Science, sensing, robotics, automation and smart technologies and smart environments.
Разместил: Ingvar16 8-02-2023, 06:35 | Комментарии: 0 | Подробнее
Название: Интерфейсы СОРМ. Справочник
Автор: Гольдштейн Б.С., Крюков Ю.С.
Издательство: БХВ-Петербург
Год: 2014
Страниц: 160
Формат: pdf
Размер: 10,6 мб
Качество: хорошее
Язык: русский

Рассматриваются интерфейсы коммутационных узлов и станций со средствами поддержки оперативно-розыскных мероприятий (СОРМ) в сетях связи, как традиционных, с коммутацией каналов и пакетов, так и перспективных сетях следующего поколения NGN. Излагаются задачи поддержки СОРМ в узлах коммутации и пути их решения в России и в других странах. Обсуждаются особенности решения этих задач в стационарных сетях – телефонных, передачи данных – и в сетях подвижной связи.
Разместил: rivasss 7-02-2023, 07:42 | Комментарии: 0 | Подробнее
Cyberattacks and Cybersecurity: What, Why, and How, 2nd EditionНазвание: Cyberattacks and Cybersecurity: What, Why, and How, 2nd Edition
Автор: Christina Liu
Издательство: bookboon.com
Год: 2022
Страниц: 297
Язык: английский
Формат: epub
Размер: 10.2 MB

Cyberspace touches practically everything and everyone when many everyday communications depend on information communication technologies. This new wave of connectivity is going beyond tablets and laptops; to connected cars and buildings; TVs and game consoles; and smart meters and traffic control. As we are critically dependent on cyberspace, it is inherently insecure and there will always be attempts to exploit weaknesses to launch cyberattacks. The cyber threat impacts the whole of our society, so everyone has a part to play in combating cybercrimes. This book is divided into five chapters, which explain how digital technology transforms societies, why cyberattacks escalate, what the challenges in cybersecurity are, how nations address global cyber risks, and how organizations defend against cyberattacks. Cybersecurity is a broad and complex topic that has a far-reaching impact on users, companies, governments, and other entities around the world. This book is divided into five chapters of discussion. These chapters, and the issues explored within them, may at first glance seem disparate, but closer examination reveals their interconnectedness.
Разместил: Ingvar16 4-02-2023, 04:58 | Комментарии: 0 | Подробнее
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, 5th EditionНазвание: Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, 5th Edition
Автор: Carey Parker
Издательство: Apress
Год: 2023
Страниц: 390
Язык: английский
Формат: pdf, epub
Размер: 37.2 MB

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort.
Разместил: Ingvar16 3-02-2023, 08:19 | Комментарии: 0 | Подробнее
 MyMirKnig.ru  ©2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности