Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 23-11-2021, 15:22
  • Комментариев: 0
Security in Wireless Communication NetworksНазвание: Security in Wireless Communication Networks
Автор: Yi Qian, Feng Ye, Hsiao-Hwa Chen
Издательство: Wiley-IEEE Press
Год: 2022
Страниц: 387
Язык: английский
Формат: pdf (true)
Размер: 10.9 MB

Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field. Security in Wireless Communication Networks delivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks, encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn:
  • Добавил: literator
  • Дата: 22-11-2021, 18:49
  • Комментариев: 0
CompTIA Security+ Get Certified Get Ahead: SY0-601 Study GuideНазвание: CompTIA Security+ Get Certified Get Ahead: SY0-601 Study Guide
Автор: Darril Gibson
Издательство: ‎YCDA, LLC
Год: 2021
Страниц: 1119
Язык: английский
Формат: epub
Размер: 10.2 MB

The CompTIA Security+ Get Certified Get Ahead SY0-601 Study Guide is an update to the top-selling SY0-201, SY0-301, SY0-401, and SY0-501 study guides, which have helped thousands of readers pass the exam the first time they took it. With this study guide, you’ll understand the important and relevant security topics for the Security+ exam without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive Exam Topic Review section to help you focus on what’s important.
  • Добавил: literator
  • Дата: 22-11-2021, 17:18
  • Комментариев: 0
CyRM: Mastering the Management of CybersecurityНазвание: CyRM: Mastering the Management of Cybersecurity
Автор: David X Martin
Издательство: CRC Press
Год: 2021
Страниц: 147
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Is your enterprise’s strategy for cybersecurity just crossing its fingers and hoping nothing bad ever happens? If so…you’re not alone. Getting cybersecurity right is all too often an afterthought for Fortune 500 firms, bolted on and hopefully creating a secure environment. We all know this approach doesn’t work, but what should a smart enterprise do to stay safe? Today, cybersecurity is no longer just a tech issue. In reality, it never was. It’s a management issue, a leadership issue, a strategy issue: It’s a "must have right"…a survival issue. Business leaders and IT managers alike need a new paradigm to work together and succeed.
  • Добавил: literator
  • Дата: 22-11-2021, 16:00
  • Комментариев: 0
Cyber Safety for Everyone, 2nd EditionНазвание: Cyber Safety for Everyone, 2nd Edition
Автор: JaagoTeens
Издательство: BPB Publications
Год: 2022
Страниц: 424
Язык: английский
Формат: pdf, epub (true)
Размер: 10,19 MB

Techniques and Effective tips to get protected from Cyber Criminals. Book is a step-by-step guide that handholds you through all the essential aspects of internet safety. The content is presented in a simple and easy-to-understand manner. True incidents, practical tips, survey results, conversation starters and teaching ideas given in the book, make the reading experience truly enriching.
  • Добавил: literator
  • Дата: 21-11-2021, 20:38
  • Комментариев: 0
Optimal Localization of Internet of Things NodesНазвание: Optimal Localization of Internet of Things Nodes
Автор: Sheetal N Ghorpade, Marco Zennaro
Издательство: Springer
Год: 2022
Страниц: 129
Язык: английский
Формат: pdf (true), epub
Размер: 15.7 MB

This book is a practical resource for designing Internet of Things (IoT) networks and implementing IoT applications from the localization perspective. With the emergence of IoT, machine to machine communication, Industrial IoT, and other societal applications, many applications require knowledge of the exact location of mobile IoT nodes in real-time. As the IoT nodes have computational and energy limitations, it is a crucial research challenge to optimize the network's performance with the highest localization accuracy. Many researchers are working towards such localization problems. However, there is no single book available for the detailed study on IoT node localization. This book provides one-stop multidisciplinary solutions for IoT node localization, design requirements, challenges, constraints, available techniques, comparison, related applications, and future directions.
  • Добавил: literator
  • Дата: 20-11-2021, 18:28
  • Комментариев: 0
IT Necessities for a Distributed World: Building a Modern IT Infrastructure for Hybrid-Remote WorkНазвание: IT Necessities for a Distributed World: Building a Modern IT Infrastructure for Hybrid-Remote Work
Автор: Ryan Bacon, Kim Crawley
Издательство: O’Reilly Media, Inc.
Год: 2021-11-16
Язык: английский
Формат: epub
Размер: 10.1 MB

However, distributed infrastructure models, which power remote and hybrid-remote work, are distinctly different from traditional business models. They require the right configurations, tools, security, and processes to succeed. IT professionals need to pivot to meet these new needs. This report is intended for cloud-based or partially cloud-based organizations—particularly small and medium-sized enterprises (SMEs) working with lean teams and tight budgets—looking to build or mature their distributed infrastructure. For those that went remote in 2020, it’s time to reconfigure your temporary remote solutions to more mature, long-standing ones; for new businesses looking to pivot to remote work or build from the ground up, take your clean slate as an opportunity to build strategically, holistically, and purposefully.
  • Добавил: literator
  • Дата: 19-11-2021, 20:39
  • Комментариев: 0
Internet Access in Vehicular NetworksНазвание: Internet Access in Vehicular Networks
Автор: Wenchao Xu, Haibo Zhou
Издательство: Springer
Год: 2021
Страниц: 176
Язык: английский
Формат: pdf (true), epub
Размер: 26.4 MB

This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a Machine Learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme.
  • Добавил: literator
  • Дата: 19-11-2021, 18:57
  • Комментариев: 0
Mobile Edge Computing by Anwesha MukherjeeНазвание: Mobile Edge Computing
Автор: Anwesha Mukherjee, Debashis De
Издательство: Springer
Год: 2021
Страниц: 598
Язык: английский
Формат: pdf (true)
Размер: 14.7 MB

Mobile Edge Computing (MEC) provides cloud-like subscription-oriented services at the edge of mobile network. For low latency and high bandwidth services, edge computing assisted IoT (Internet of Things) has become the pillar for the development of smart environments and their applications such as smart home, smart health, smart traffic management, smart agriculture, and smart city. This book covers the fundamental concept of the MEC and its real-time applications. The book content is organized into three parts: Part A covers the architecture and working model of MEC, Part B focuses on the systems, platforms, services and issues of MEC, and Part C emphases on various applications of MEC.
  • Добавил: literator
  • Дата: 19-11-2021, 15:30
  • Комментариев: 0
Securing Microsoft 365Название: Securing Microsoft 365
Автор: Joe Stocker
Издательство: Publishing Xpert
Год: 2021
Страниц: 270
Язык: английский
Формат: pdf, epub
Размер: 12.6 MB

Learn how to defend against the top cybersecurity threats targeting Microsoft 365 including attacks on Identity, Email and Devices. Network Firewalls have been the de facto security perimeter since they were invented in the late 1980s. If a firewall blocked all incoming traffic from the internet, then the level of difficulty for the hacker was significant. So, what changed? As organizations began adopting Cloud Computing in general, or Software as a Service (SaaS) in particular, the security perimeter shifted to the credentials used to authenticate to internet-connected systems. More than 80% of breaches in the present era can be traced to a guessed or stolen password. For Microsoft 365, the username is the email address, and for 90 percent of all M365 users, it is protected by a single factor (a password). This is a HUGE problem because anyone with an internet connection can attempt to guess the password of nearly any account.
  • Добавил: literator
  • Дата: 19-11-2021, 15:08
  • Комментариев: 0
Hacking Exposed: Know the secrets of Network SecurityНазвание: Hacking Exposed: Know the secrets of Network Security
Автор: Soumya Ranjan Behera
Издательство: BPB Publications
Год: 2018
Страниц: 206
Язык: английский
Формат: pdf (true)
Размер: 37.4 MB

Basic Guide learn to save yourself from hacking. Book teaches anyone interested to an in-depth discussion of what hacking is all about and to save yourself. Book provides techniques and tools which are used by both criminals and ethical hackers, all the things that you will find here will show you how information security is compromised and how you can identify an attack in a system that you are trying to protect. Furthermore, you will also learn how you can minimise any damage in your system or stop an ongoing attack. This book is written for the benefits of user to save himself from hacking. This book is intended for those who want to know more about information security. This book helps both beginners and intermediates by allowing them to gain in-depth knowledge.