Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 2-02-2022, 04:16
  • Комментариев: 0
Dynamic Resource Management in Service-Oriented Core NetworksНазвание: Dynamic Resource Management in Service-Oriented Core Networks
Автор: Weihua Zhuang, Kaige Qu
Издательство: Springer
Серия: Wireless Networks
Год: 2021
Страниц: 182
Язык: английский
Формат: pdf (true), epub
Размер: 34.1 MB

The service-oriented fifth-generation (5G) and beyond core networks are featured by customized network services with differentiated quality-of-service (QoS) requirements, which can be provisioned through network slicing enabled by the software-defined networking (SDN) and network function virtualization (NFV) paradigms. Multiple network services are embedded in a common physical infrastructure, generating service-customized network slices (also referred to as virtual networks). Each network slice supports a composite service via virtual network function (VNF) chaining, with dedicated packet processing functionality at each VNF. For a network slice with a target traffic load, the end-to-end (E2E) service delivery is enabled by VNF placement at NFV nodes (e.g., data centers and commodity servers) and traffic routing among corresponding NFV nodes, with static resource allocations. When data traffic actually enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion.
  • Добавил: literator
  • Дата: 1-02-2022, 19:39
  • Комментариев: 0
The Security HippieНазвание: The Security Hippie
Автор: Barak Engel
Издательство: CRC Press
Год: 2022
Страниц: 197
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

The Security Hippie is Barak Engel’s second book. As the originator of the “Virtual CISO” (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak’s related takes and thought processes.
  • Добавил: literator
  • Дата: 1-02-2022, 19:12
  • Комментариев: 0
Cybersecurity: Ethics, Legal, Risks, and PoliciesНазвание: Cybersecurity: Ethics, Legal, Risks, and Policies
Автор: Ishaani Priyadarshini (PhD), Chase Cotton (PhD, CISSP)
Издательство: Apple Academic Press, CRC Press
Год: 2022
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 10.07 MB

This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.
  • Добавил: literator
  • Дата: 1-02-2022, 17:55
  • Комментариев: 0
The Role of IoT and Blockchain: Techniques and ApplicationsНазвание: The Role of IoT and Blockchain: Techniques and Applications
Автор: Sanjay K. Kuanar (PhD), Brojo Kishore Mishra (PhD), Sheng-Lung Peng (PhD)
Издательство: Apple Academic Press, CRC Press
Год: 2022
Страниц: 501
Язык: английский
Формат: pdf (true)
Размер: 25.5 MB

This volume provides informative chapters on the emerging issues, challenges, and new methods and state-of-the-art technologies on the Internet of Things and blockchain technology. It presents case studies and solutions that can be applied in the current business scenario, resolving challenges and providing solutions by integrating IoT with blockchain technology. The book addresses the growing attention that blockchain technology is receiving from industry and research because of its ability to provide “magical solutions” to problems associated with classical centralized architecture. The chapters discuss how the Internet of Things (IoT) represents a revolution of the Internet that can connect nearly all environment devices over the Internet to share data to create novel services and applications for improving quality of life. Although the centralized IoT system provides countless benefits, it raises several challenges. The volume presents IoT techniques and methodologies, blockchain techniques and methodologies, and case studies and applications for data mining algorithms, heart rate monitoring, climate prediction, disease prediction, security issues, automotive supply chains, voting prediction, forecasting particulate matter pollution, customer relationship management, and more.
  • Добавил: TRex
  • Дата: 1-02-2022, 10:41
  • Комментариев: 0
Название: The Internet of Mechanical Things: The IoT Framework for Mechanical Engineers
Автор: Sami Salama Hussen Hajjaj and Kisheen Rao Gsangaya
Издательство: CRC Press
Год: 2022
Формат: True PDF
Страниц: 253
Размер: 11,8 Mb
Язык: Русский

This book provides knowledge, skills, and strategies an engineer requires to effectively integrate Internet of Things (IoT) into the field of mechanical engineering. Divided into three sections named IoT Strategies, IoT Foundation topics, and IoT system development, the volume covers introduction to IoT framework, its components, advantages, challenges, and practical process for effective implementation of IoT from mechanical engineering perspective. Further, it explains IoT systems and hands-on training modules, implementation, and execution of IoT Systems.

  • Добавил: TRex
  • Дата: 31-01-2022, 19:04
  • Комментариев: 0
Название: Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense
Автор: Ericsson Marin, Mohammed Almukaynizi, Soumajyoti Sarkar, Eric Nunes, Jana Shakarian, Paulo Shakarian, Edward G. Amoroso
Издательство: Cambridge University Press
Год: 2021
Формат: PDF
Страниц: 225
Размер: 10 Mb
Язык: English

Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits.
  • Добавил: literator
  • Дата: 31-01-2022, 08:00
  • Комментариев: 0
Machine Learning for Cyber Agents: Attack and DefenceНазвание: Machine Learning for Cyber Agents: Attack and Defence
Автор: Stanislav Abaimov, Maurizio Martellini
Издательство: Springer
Год: 2022
Страниц: 235
Язык: английский
Формат: pdf (true), epub
Размер: 11.5 MB

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences.
  • Добавил: literator
  • Дата: 30-01-2022, 18:25
  • Комментариев: 0
The Development of Blockchain TechnologyНазвание: The Development of Blockchain Technology: Research on the Development of Electronic Information Engineering Technology in China
Автор: Center for Electronics and Information Studies Chinese Academy of Engineering
Издательство: Springer, Science Press
Год: 2022
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

The research objects of blockchain are the concept, development process, core value of blockchain, and focuses on the core technology and classification of blockchain technology. And summarizes the development situation of the global and Chinese blockchain industry, including the status quo of policy measures, standard construction, and application development. Finally, summarize the main innovation points of blockchain technology, including its development in China, and prospects the future development of blockchain technology. The book is divided into six chapters. The first chapter introduces the concept, development process, and core value of blockchain. Chapter 2 focuses on the core technology and classification of blockchain technology. Chapter 3 summarizes the development situation of the global and Chinese blockchain industry, including the status quo of policy measures, standard construction, and application development.
  • Добавил: literator
  • Дата: 30-01-2022, 17:53
  • Комментариев: 0
Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the FutureНазвание: Blockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future
Автор: Sudhir K. Sharma, Bharat Bhushan, Narayan C. Debnath
Издательство: Bentham Science Publishers
Год: 2022
Страниц: 294
Язык: английский
Формат: pdf, epub
Размер: 10.2 MB

This reference presents information about different facets of IoT and blockchain systems that have been recently proposed for practical situations. Chapters provide knowledge about how these technologies are applied in functions related to trust management, identity management, security threats, access control and privacy. The Internet of Things (IoT) is an emerging technology that has enabled connection and communication between both virtual and physical objects, thereby improving our quality of life. The definition of IoT has evolved because of the convergence of numerous technologies such as embedded systems, commodity sensors, machine learning, and real-time analytics. IoT contributes towards the concept of connected vehicles, connected health, wearable technology, home automation, and appliances having remote monitoring capabilities. Even though these systems provide numerous advantages, the current centralized architecture brings forth numerous issues related to privacy, security, transparency, data integrity, and single point of failure. This, in turn, inhibits the future development of these IoT-based applications.
  • Добавил: literator
  • Дата: 30-01-2022, 17:36
  • Комментариев: 0
Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc NetworksНазвание: Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks
Автор: Sanjoy Das, Ram Shringar Rao, Indrani Das
Издательство: CRC Press
Серия: Wireless Communications and Networking Technologies: Classifications, Advancement and Applications
Год: 2022
Страниц: 291
Язык: английский
Формат: pdf (true)
Размер: 13.7 MB

This reference text covers intelligent computing through Internet of Things (IoT) and Big Data in Vehicular Environment in a single volume. The text covers important topics including topology-based routing protocols, heterogeneous wireless networks, security risks, software-defined vehicular Ad-hoc network, vehicular delay tolerant networks, and energy harvesting for WSNs using rectenna. In recent times, tremendous growth and usage of various wireless ad-hoc networks such as Mobile Ad-hoc Networks (MANETs), Vehicular Ad-hoc Networks (VANETs), Wireless Sensor Networks (WSNs), and IoT-based Cloud Networks (ICN) has emerged. These emerging networks open lots of opportunities for researchers to explore these areas and enhance their efficacy. Advanced technologies like cloud computing, Big-data, and Internet of Things (IoT)-based services have been well incorporated in wireless networks. Day by day, wireless devices and their uses are increasing very rapidly. Many industries are developing huge numbers of applications of wireless networks to ease our day-to-day works; simultaneously, these applications generate a large volume of data. To better manage these data and optimize network performance, IoT, cloud, and Big-data techniques play a vital role.