Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 19-10-2022, 02:29
  • Комментариев: 0
Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot (Early Release)Название: Building Real-Time Analytics Systems: From Events to Insights with Apache Kafka and Apache Pinot (Early Release)
Автор: Mark Needham, Dunith Dhanushka
Издательство: O’Reilly Media, Inc.
Год: 2022-10-24
Язык: английский
Формат: epub (true), mobi
Размер: 10.1 MB

Gain deep insight into real-time analytics, including the features of these systems and the problems they solve. With this practical book, data engineers at organizations that use event-processing systems such as Kafka, Google Pub/Sub, and AWS Kinesis will learn how to analyze data streams in real time. The faster you derive insights, the quicker you can spot changes in your business and act accordingly. In the first part of this book, authors Mark Needham and Dunith Dhanushka from StarTree provide an overview of the real-time analytics space and an understanding of what goes into building real-time applications. The second part offers a series of hands-on tutorials that show you how to combine multiple software products to build real-time analytics applications for an imaginary pizza delivery service.
  • Добавил: TRex
  • Дата: 18-10-2022, 12:52
  • Комментариев: 0
Название: Network Science: Analysis and Optimization Algorithms for Real-World Application
Автор: Carlos Andre Reis Pinheiro
Издательство: Wiley
Год: 2022
Формат: True PDF
Страниц: 354
Размер: 41,4 Mb
Язык: English

Network Science Network Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems.
  • Добавил: literator
  • Дата: 17-10-2022, 20:00
  • Комментариев: 0
Energy Efficient Spectrum Resources Usage in WPANs: IEEE 82.15.4 MAC Sub-layer ProtocolsНазвание: Energy Efficient Spectrum Resources Usage in WPANs: IEEE 82.15.4 MAC Sub-layer Protocols
Автор: Fernando Jose Velez, Luis Miguel Borges
Издательство: River Publishers
Год: 2022
Страниц: 434
Язык: английский
Формат: pdf (true)
Размер: 10.28 MB

Wireless Sensor Networks (WSNs) and the Internet of Things (IoT) are facing tremendous advances both in terms of energy-efficiency as well as in the number of available applications. Consequently, there are open challenges that need to be tackled for the future generation of WSNs, and this book gives answers to some of the important questions that need to be answered. After giving an overview of the WSN protocols and IEEE 802.15.4 standard, this book proposes IEEE 802.15.4 Medium Access Control (MAC) sub-layer performance enhancements by employing not only RTS/CTS combined with packet concatenation but also scheduled channel poling (MC-SCP). Results have shown that the use of the RTS/CTS mechanism improves channel efficiency by decreasing the deferral time before transmitting a data packet. Furthermore, the Sensor Block Acknowledgment MAC (SBACK-MAC) protocol enables more efficiency as it allows the aggregation of several acknowledgement responses in one special Block Acknowledgment (BACK) Response packet.
  • Добавил: TRex
  • Дата: 17-10-2022, 17:51
  • Комментариев: 0
Название: Computer Security Fundamentals, 5th Edition (Rough Cuts)
Автор: Dr. Chuck Easttom
Издательство: Pearson
Год: 2023
Формат: ePUB
Страниц: 868
Размер: 24 Mb
Язык: English

Drawing on more than 30 years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore while addressing the realities of a world where billions of new devices are Internet-connected.

  • Добавил: literator
  • Дата: 17-10-2022, 02:48
  • Комментариев: 0
Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition (Third Early Release)Название: Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition (Third Early Release)
Автор: Lee Brotherston, Amanda Berlin
Издательство: O’Reilly Media, Inc.
Год: 2022-10-14
Язык: английский
Формат: epub (true), mobi, pdf
Размер: 10.2 MB

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.
  • Добавил: TRex
  • Дата: 16-10-2022, 09:19
  • Комментариев: 0
Название: Ransomware and Cyber Extortion: Response and Prevention
Автор: Sherri Davidoff, Matt Durrin, Karen Sprenger
Издательство: Pearson
Год: 2023
Формат: True ePUB, MOBI
Страниц: 419
Размер: 10 Mb
Язык: English

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks
Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. But your actions in the minutes, hours, days, and months after an attack may determine whether youll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place.
  • Добавил: literator
  • Дата: 15-10-2022, 20:10
  • Комментариев: 0
Emerging Technologies and Applications for a Smart and Sustainable WorldНазвание: Emerging Technologies and Applications for a Smart and Sustainable World
Автор: Akhil Jabbar Meerja, Mamun Bin Ibne Reaz
Издательство: Bentham Books
Год: 2022
Страниц: 240
Язык: английский
Формат: pdf (true), epub
Размер: 13.9 MB

This reference distills information about emerging technologies and applications for smart city design and sustainable urban planning. Chapters present technology use-cases that have radical novelty and high scalability with a prominent impact on community living standards. These technologies prepare urban and rural dwellings for the transformation to the smart world. Applications and techniques highlighted in the book use a combination of Artificial Intelligence (AI) and IoT technologies in areas like transportation, energy, healthcare, education, governance, and manufacturing, to name a few. Machine Learning Process of smart building (SB). ML techniques are successfully trained to solve computer vision problems like speech recognition, gesture recognition, compression, etc which gives greater scope for such models to be applied in smart building context as smart building problems cannot be solved by conventional methods but the appropriate solution could be learned only from data.
  • Добавил: literator
  • Дата: 15-10-2022, 13:59
  • Комментариев: 0
Recent Advances in IoT and Blockchain TechnologyНазвание: Recent Advances in IoT and Blockchain Technology
Автор: Koyel Datta Gupta, Deepak Kumar Sharma, Rinky Dwivedi
Издательство: Bentham Books
Год: 2022
Страниц: 192
Язык: английский
Формат: pdf (true)
Размер: 11.8 MB

Blockchain, whether public or private, is capable enough to maintain the integrity of transactions by decentralizing the records for users. Many IoT companies are using blockchain technology to make the world a better-connected place. Businesses and researchers are exploring ways to make this technology increasingly efficient for IoT services. This volume presents the recent advances in these two technologies. Chapters explain the fundamentals of Blockchain and IoT, before explaining how these technologies, when merged together, provide a transparent, reliable, and secure model for data processing by intelligent devices in various domains.
  • Добавил: literator
  • Дата: 13-10-2022, 20:49
  • Комментариев: 0
Network Programmability and Automation: Skills for the Next-Generation Network Engineer, 2nd Edition (Third Early Release)Название: Network Programmability and Automation: Skills for the Next-Generation Network Engineer, 2nd Edition (Third Early Release)
Автор: Matt Oswalt, Christian Adell, Scott S. Lowe, Jason Edelman
Издательство: O’Reilly Media, Inc.
Год: 2022-10-12
Страниц: 215
Язык: английский
Формат: epub (true), mobi
Размер: 10.2 MB

Network engineers are finding it harder than ever to rely solely on manual processes to get their jobs done. New protocols, technologies, delivery models, and the need for businesses to become more agile and flexible have made network automation essential. The updated second edition of this practical guide shows network engineers how to use a range of technologies and tools, including Linux, Python, APIs, and Git, to automate systems through code. This edition also includes brand new topics such as network development environments, cloud, and programming with Go.
  • Добавил: literator
  • Дата: 12-10-2022, 11:47
  • Комментариев: 0
Cyber InvestigationsНазвание: Cyber Investigations
Автор: André Arnes
Издательство: Wiley
Год: 2023
Страниц: 272
Язык: английский
Формат: pdf (true), epub
Размер: 15.8 MB

A classroom tested introduction to cyber investigations with real-life examples included. Cyber Investigations provides an introduction to the topic, an overview of the investigation process applied to cyber investigations, a review of legal aspects of cyber investigations, a review of Internet forensics and open-source intelligence, a research-based chapter on anonymization, and a deep-dive in to multimedia forensics. The content is structured in a consistent manner, with an emphasis on accessibility for students of computer science, information security, law enforcement, and military disciplines. To aid in reader comprehension and seamless assimilation of the material, real-life examples and student exercises are provided throughout, as well as an Educational Guide for both teachers and students. The material has been classroom-tested and is a perfect fit for most learning environments.