Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 12-12-2021, 15:10
  • Комментариев: 0
NB-IoT Use Cases and Devices: Design GuideНазвание: NB-IoT Use Cases and Devices: Design Guide
Автор: Kersten Heins
Издательство: Springer
Год: 2022
Страниц: 133
Язык: английский
Формат: pdf (true), epub
Размер: 22.8 MB

This book presents the cellular wireless network standard NB-IoT (Narrow Band-Internet of Things), which addresses many key requirements of the IoT. NB-IoT is a topic that is inspiring the industry to create new business cases and associated products. The author first introduces the technology and typical IoT use cases. He then explains NB-IoT extended network coverage and outstanding power saving features which are enabling the design of IoT devices (e.g. sensors) to work everywhere and for more than 10 years, in a maintenance-free way. The book explains to industrial users how to utilize NB-IoT features for their own IoT projects. Other system ingredients (e.g. IoT cloud services) and embedded security aspects are covered as well. The author takes an in-depth look at NB-IoT from an application engineering point of view, focusing on IoT device design. The target audience is technical-minded IoT project owners and system design engineers who are planning to develop an IoT application.
  • Добавил: literator
  • Дата: 12-12-2021, 13:19
  • Комментариев: 0
Extreme Privacy: What It Takes to Disappear, 3rd EditionНазвание: Extreme Privacy: What It Takes to Disappear, 3rd Edition
Автор: Michael Bazzell
Издательство: Independently published
Год: 2021
Страниц: 640
Язык: английский
Формат: pdf (true)
Размер: 106.6 MB

Completely rewritten Third Edition (2021) presents the definitive 640-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that “fixes” things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure. This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events. The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.
  • Добавил: TRex
  • Дата: 11-12-2021, 18:15
  • Комментариев: 0
Название: Building Reliable Services on the Cloud
Автор: Phillip Tischler, with Steve McGhee, and Shylaja Nukala
Издательство: O’Reilly Media
Год: 2022
Формат: ePUB
Страниц: 88
Размер: 10 Mb
Язык: English

For a product or service to be successful, it must be reliable. Users need to trust that a service will be available when needed and that it won't lose the data it's entrusted to store. Outages erode trust and motivate users to seek and adopt alternatives; data loss is likely to destroy trust altogether. Delivering reliable systems, while maintaining high velocity and scalability, requires systematic resilience.
  • Добавил: literator
  • Дата: 11-12-2021, 16:24
  • Комментариев: 0
Trust in Computer Systems and the CloudНазвание: Trust in Computer Systems and the Cloud
Автор: Mike Bursell
Издательство: Wiley
Год: 2022
Страниц: 355
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

Learn to analyze and measure risk by exploring the nature of trust and its application to cybersecurity. Trust in Computer Systems and the Cloud delivers an insightful and practical new take on what it means to trust in the context of computer and network security and the impact on the emerging field of Confidential Computing. Author Mike Bursell’s experience, ranging from Chief Security Architect at Red Hat to CEO at a Confidential Computing start-up grounds the reader in fundamental concepts of trust and related ideas before discussing the more sophisticated applications of these concepts to various areas in computing.
  • Добавил: TRex
  • Дата: 11-12-2021, 08:28
  • Комментариев: 0
Название: The Quantum Internet: The Second Quantum Revolution
Автор: Peter Rohde
Издательство: Cambridge University Press
Год: 2021
Формат: PDF
Страниц: 364
Размер: 10 Mb
Язык: English

Following the emergence of quantum computing, the subsequent quantum revolution will be that of interconnecting individual quantum computers at the global level. In the same way that classical computers only realised their full potential with the emergence of the internet, a fully-realised quantum internet is the next stage of evolution for quantum computation. This cutting-edge book examines in detail how the quantum internet would evolve in practise, focusing not only on the technology itself, but also the implications it will have economically and politically, with numerous non-technical sections throughout the text providing broader context to the discussion. The book begins with a description of classical networks before introducing the key concepts behind quantum networks, such as quantum internet protocols, quantum cryptography, and cloud quantum computing. Written in an engaging style and accessible to graduate students in physics, engineering, computer science and mathematics.
  • Добавил: literator
  • Дата: 10-12-2021, 19:41
  • Комментариев: 0
Information Security Management Principles, 3rd editionНазвание: Information Security Management Principles, 3rd edition
Автор: David Alexander, Amanda Finch, David Sutton
Издательство: BCS, The Chartered Institute for IT
Год: 2020
Страниц: 271
Язык: английский
Формат: pdf (true), epub (true)
Размер: 15.5 MB

Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A compromise has to be struck between security of information and its availability. This book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
  • Добавил: literator
  • Дата: 10-12-2021, 16:22
  • Комментариев: 0
Security Operations in PracticeНазвание: Security Operations in Practice
Автор: Mike Sheward
Издательство: BCS, The Chartered Institute for IT
Год: 2020
Страниц: 254
Язык: английский
Формат: pdf (true), epub
Размер: 11.3 MB

With this book, my aim has been to explore the most effective ways to perform the various functions of the security operations team, and provide real-world examples that should supplement the theory. Nothing is worse than a textbook that teaches the theoretical best way to achieve something, when there is absolutely no practical way for that to work in reality. Covers building and growing an effective security operations team- both the blue side (defensive) and the red side (simulating attack). Includes the human element of security operations - building trust etc. Contains real-life examples and industry case studies.
  • Добавил: literator
  • Дата: 9-12-2021, 16:48
  • Комментариев: 0
Digitalization of Higher Education using Cloud Computing: Implications, Risk, and ChallengesНазвание: Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges
Автор: S. L. Gupta, Nawal Kishor, Niraj Mishra
Издательство: CRC Press
Серия: Chapman & Hall/ CRC Cloud Computing for Society 5.0
Год: 2022
Страниц: 243
Язык: английский
Формат: pdf (true)
Размер: 17.8 MB

Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and tools being used to explore learning in Higher Educational Institutions (HEIs). Cloud computing, being an up-and-coming technology, integrates with academia and industry, thereby enhancing the quality of education. The opportunities and challenges faced by HEIs in recent times due to technological disruptions have forced both academia and industry to realign their strategies for survival and growth. With the acceleration of cloud computing in higher education, it has now become imperative for educators to constantly upskill and reskill in order to meet the requirements of the future of work, particularly in the digital age.
  • Добавил: literator
  • Дата: 9-12-2021, 15:39
  • Комментариев: 0
Vehicular Communications for Smart Cars: Protocols, Applications and Security ConcernsНазвание: Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns
Автор: Niaz Chowdhury, Lewis Mackenzie
Издательство: CRC Press
Год: 2022
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

This book comprehensively covers a wide range of topics from the smart transportation domain. It discusses protocols, applications, and security concerns in various vehicular networks using examples and easy-to-understand figures. The book's first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust, and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. A Vehicle to Vehicle (V2V) communication system can offer a wide range of powerful applications to improve the driving experience. The Internet of Things (IoT) is an outstanding evolution that enables communication between numerous devices through sensors, actuators, embedded systems, and various other technologies via the Internet.
  • Добавил: buratino
  • Дата: 9-12-2021, 03:00
  • Комментариев: 0
Название: Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Автор: Gunikhan Sonowal
Издательство: Apress
Год: 2022
Формат: true pdf/epub
Страниц: 230
Размер: 16.8 Mb
Язык: English

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.