Vtome.ru - электронная библиотека

  • Добавил: TRex
  • Дата: 5-12-2021, 10:12
  • Комментариев: 0
Название: Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity
Автор: Gregory Falco and Eric Rosenbach
Издательство: Oxford University Press
Год: 2022
Формат: ePUB, PDF
Страниц: 225
Размер: 10 Mb
Язык: English

Cyberattacks continue to grow in number, intensity, and sophistication. While attackers persistently adapt, business leaders have suffered from employing the same cyber risk management strategies for decades. Organizations must learn how to move past temporary solutions and invest in long-term resiliency measures to thrive in the future cyber economy.
  • Добавил: literator
  • Дата: 4-12-2021, 13:18
  • Комментариев: 0
5G Technology: 3GPP New RadioНазвание: 5G Technology: 3GPP New Radio
Автор: Harri Holma, Antti Toskala
Издательство: Wiley
Год: 2020
Страниц: 516
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

A comprehensive guide to 5G technology, applications and potential for the future. 5G brings new technology solutions to the 5G mobile networks including new spectrum options, new antenna structures, new physical layer and protocols designs and new network architectures. 5G Technology: 3GPP New Radio is a comprehensive resource that offers explanations of 5G specifications, performance evaluations, aspects of device design, practical deployment considerations and illustrative examples from field experiences.
  • Добавил: TRex
  • Дата: 3-12-2021, 17:15
  • Комментариев: 0
Название: 5G Second Phase Explained: The 3GPP Release 16 Enhancements
Автор: Jyrki TJ. Penttinen
Издательство: Wiley
Год: 2021
Формат: True ePUB
Страниц: 486
Размер: 10 Mb
Язык: English

5G SECOND PHASE EXPLAINED
A one-stop reference that offers an accessible guide to an understanding of the enhanced core technologies of 5G
5G Second Phase Explained – The 3GPP Release 16 Enhancements offers an authoritative and essential guide to the new functionalities of the Release 16 that complement the first phase of the 5G. From the author of 5G Explained comes the next step resource that includes detailed descriptions that provide a clear understanding to the full version of the 5G technologies and their impacts on the Phase 1 networks.
  • Добавил: literator
  • Дата: 3-12-2021, 16:04
  • Комментариев: 0
Industry 5.0: The Future of the Industrial EconomyНазвание: Industry 5.0: The Future of the Industrial Economy
Автор: Uthayan Elangovan
Издательство: CRC Press
Год: 2022
Страниц: 151
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Technology has created innovative new prospects for manufacturing industries with Industry 4.0 and has helped further the growth of the manufacturing sector. This book focuses on the next stage which is Industry 5.0 and the steps in taking automation to that next level by increasing processes, operational efficiency, and reducing workforce size. Industry 5.0: The Future of the Industrial Economy discusses the integration of product, process, machine, software, and industrial robots in realizing Industrial 5.0. It covers the dual integration of human intelligence with machine intelligence and talks about the results of making use of Industrial Internet of Things (IIoT) and Artificial Intelligence (AI). The creation of a new category of robots named Collaborative Robots (Cobots) specifically designed to speed up the manufacturing process and profitability is explored.
  • Добавил: literator
  • Дата: 3-12-2021, 15:28
  • Комментариев: 0
Industry 4.0 Technologies for Business Excellence: Frameworks, Practices, and ApplicationsНазвание: Industry 4.0 Technologies for Business Excellence: Frameworks, Practices, and Applications
Автор: Shivani Bali, Sugandha Aggarwal, Sunil Sharma
Издательство: CRC Press
Год: 2022
Страниц: 289
Язык: английский
Формат: pdf (true)
Размер: 13.6 MB

This book captures deploying Industry 4.0 technologies for business excellence and moving towards society 5.0. The book addresses applications of Industry 4.0 in the areas of Marketing, Operations, Supply Chain, Finance, and HR to achieve business excellence. Industry 4.0 Technologies for Business Excellence: Frameworks, Practices, and Applications focuses on the use of Artificial Intelligence (AI) in management across different sectors. Since the advent of World Wide Web in the 1990s, the Internet has witnessed exponential growth in diversified field. One of these fields is IoT or the Internet of Things. In today’s world, our life is simplified by diverse availability of various gadgets or equipment. We can say that when physical objects are embedded with communication technology and able to sense and interact with external or internal environment, it is IoT. In other words, Internet of Things is a system of interconnected device platform that collects data and transfer data automatically using wireless technology, where devices can be any anything having the ability to collect data and transfer them on Internet like connected medical devices, biochips, sensors, smartphones, gadgets, etc.
  • Добавил: literator
  • Дата: 3-12-2021, 14:57
  • Комментариев: 0
IT Governance and Information Security: Guides, Standards and FrameworksНазвание: IT Governance and Information Security: Guides, Standards and Frameworks
Автор: Yassine Maleh, Abdelkebir Sahid
Издательство: CRC Press
Год: 2022
Страниц: 340
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes organizations to ever-growing risks. Understanding the threats, assessing the risks, adapting the organization, selecting and implementing the appropriate controls, and implementing a management system are the activities required to establish proactive security governance that will provide management and customers the assurance of an effective mechanism to manage risks. IT Governance and Information Security: Guides, Standards, and Frameworks is a fundamental resource to discover IT governance and information security. This book focuses on the guides, standards, and maturity frameworks for adopting an efficient IT governance and information security strategy in the organization.
  • Добавил: literator
  • Дата: 3-12-2021, 12:04
  • Комментариев: 0
Future Trends in 5G and 6G: Challenges, Architecture, and ApplicationsНазвание: Future Trends in 5G and 6G: Challenges, Architecture, and Applications
Автор: Mangesh M. Ghonge, Ramchandra S. Mangrulkar, Pradip M. Jawandhiya
Издательство: CRC Press
Год: 2022
Страниц: 357
Язык: английский
Формат: pdf (true)
Размер: 40.2 MB

Future Trends in 5G and 6G: Challenges, Architecture, and Applications offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. The book addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future.
  • Добавил: literator
  • Дата: 3-12-2021, 11:40
  • Комментариев: 0
Cloud Security: Attacks, Techniques, Tools, and ChallengesНазвание: Cloud Security: Attacks, Techniques, Tools, and Challenges
Автор: Preeti Mishra, Emmanuel S Pilli, R C Joshi
Издательство: CRC Press
Год: 2022
Страниц: 243
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm, it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks, Techniques, Tools, and Challenges, provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures, and all those who are curious in the field of cloud security.
  • Добавил: literator
  • Дата: 2-12-2021, 20:05
  • Комментариев: 0
Modeling and Optimization in Software-Defined NetworksНазвание: Modeling and Optimization in Software-Defined Networks
Автор: Konstantinos Poularakis, Leandros Tassiulas
Издательство: Morgan & Claypool
Год: 2021
Страниц: 176
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book provides a quick reference and insights into modeling and optimization of software-defined networks (SDNs). It covers various algorithms and approaches that have been developed for optimizations related to the control plane, the considerable research related to data plane optimization, and topics that have significant potential for research and advances to the state-of-the-art in SDN. Over the past ten years, network programmability has transitioned from research concepts to more mainstream technology through the advent of technologies amenable to programmability such as service chaining, virtual network functions, and programmability of the data plane. However, the rapid development in SDN technologies has been the key driver behind its evolution.
  • Добавил: TRex
  • Дата: 2-12-2021, 17:25
  • Комментариев: 0
Название: Azure Cloud Security for Absolute Beginners
Автор: Pushpa Herath
Издательство: Apress
Год: 2022
Формат: PDF
Страниц: 251
Размер: 11,7 Mb
Язык: English

Implement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure.