Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 22-07-2024, 03:38
  • Комментариев: 0
Название: The Future of Mobile Computing
Автор: Sam Goundar, J. Avanija, K. Reddy Madhavi
Издательство: Nova Science Publishers
Год: 2024
Страниц: 343
Язык: английский
Формат: pdf (true)
Размер: 10.6 MB

The Future of Mobile Computing takes readers on a comprehensive journey through the rapidly evolving landscape of mobile technologies. Beginning with a detailed examination of foundational concepts in the field, the book provides insights into the transformative technology of edge computing. The subsequent chapters cover various aspects of mobile computing, addressing topics such as sustainable farming solutions, the latest trends in mobile hardware and design, and the significant role of Artificial Intelligence (AI) in mobile contexts. The book focuses on intelligent mobile assistants, emphasizing the impact of machine learning. Readers will find insights into eco-friendly innovations shaping sustainable mobile technologies and the practical application of mobile computing in smart cities. The book takes a close look at addressing privacy and security challenges, offering robust strategies to safeguard user data. Additional chapters provide information on the transformative potential of augmented reality and virtual reality in modern mobile computing environments. Innovative approaches, such as multimodal AI-embedded blockchain security for smart student monitoring is explored, as is a unique intersection of mobile computing and mental health analysis. The book concludes with a forward-looking exploration of transformative technologies and their integration with mobile computing, providing valuable insights into navigating the innovation frontier. Overall, the book serves as an accessible and essential resource for individuals seeking a comprehensive understanding of mobile technologies in the years ahead.
  • Добавил: literator
  • Дата: 21-07-2024, 18:38
  • Комментариев: 0
Название: Cybersecurity, Ethics, and Collective Responsibility
Автор: Seumas Miller, Terry Bossomaier
Издательство: Oxford University Press
Год: 2024
Страниц: 385
Язык: английский
Формат: pdf (true), epub
Размер: 21.8 MB

The advent of the Internet, exponential growth in computing power, and rapid developments in artificial intelligence have raised numerous cybersecurity-related ethical questions in various domains. The dual use character of cybertechnology-that it can be used to provide great benefits to humankind but can also do great harm-means that business (data security, data ownership and privacy), public communication (disinformation and computational propaganda), health (privacy, ransomware attacks), law enforcement (data security, predictive policing) and interstate conflict (cyberwar, autonomous weapons) are of vital interest to cybersecurity ethics. This work analyses the key ethical concepts in the field, such as privacy, freedom of communication, security, and the right to self-defence, and develops sets of ethical guidelines for the regulation of cyberspace in these various domains. From a liberal democratic perspective, Seumas Miller and Terry Bossomaier seek to protect individual rights while ensuring the collective good of cybersecurity. They also pay close attention to institutionally embedded collective moral responsibilities that function as 'webs of prevention' against cyberattacks. These webs, they argue, need new regulation and the redesign of institutional roles, as well as technical countermeasures to cyberattacks, such as passwords, encryption, firewalls, and 'patching.' At times, webs of prevention also involve offensive and defensive measures. In their expert analysis and guidance, Miller and Bossomaier reinforce just how much is at stake in the field of cybersecurity ethics.
  • Добавил: literator
  • Дата: 21-07-2024, 18:00
  • Комментариев: 0
Название: Cisco ThousandEyes: Digital Experience Monitoring and Troubleshooting (Early Release)
Автор: Aaron Trompeter, Robert Webb
Издательство: Cisco Press
Год: 2024
Страниц: 279
Язык: английский
Формат: epub
Размер: 21.7 MB

Cisco ThousandEyes delivers expanded visibility, automated insights, and seamless workflows to assure digital experiences across any network―whether on premise, the Internet, or in the cloud. ThousandEyes is the authority when monitoring SaaS, Hybrid, and multi-cloud environments. ThousandEyes helps solve the common problem of network downtime and application performance by performing real time analytics and insights, allowing IT admins to quickly identify and resolve issues for a reduction of downtime and improved user experience. It works on Meraki devices, Webex, Cisco Catalyst 9300 and 9400 switches, Cisco SD-WAN routing platforms, and more. This is a detailed approach to deploying ThousandEyes from Day0 to Day2. With detailed use-cases for ThousandEyes, the book covers best practices with practical insights. This hands-on guide provides realistic details on planning and designing, and demonstrates how to improve performance, availability, and overall mean time. Along the way the author shows how ThousandEyes can be integrated into other Cisco platforms and tools as well as third party tools. It provides everything decision makers and IT professionals need to gain maximum value from ThousandEyes. Each chapter will have a post-test to ensure the reader has grasped each section. The goal of the book is to get you up to speed with the ThousandEyes platform quickly so that you can start creating value for your business.
  • Добавил: literator
  • Дата: 20-07-2024, 07:56
  • Комментариев: 0
Название: Acing the CCNA Exam, Volume 1: Fundamentals and Protocols (Final)
Автор: Jeremy McDowell
Издательство: Manning Publications
Год: 2024
Страниц: 850
Язык: английский
Формат: epub
Размер: 10.9 MB

Learn the essential skills you need to pass the Cisco Certified Network Associate (CCNA) from the creator of one of the web’s most popular CCNA video courses. Acing the CCNA Exam is a comprehensive, detailed guide to passing the Cisco Certified Network Associate (CCNA) exam and kickstarting your career in IT, networking, and systems administration. It’s written by Jeremy McDowell, a much-loved Cisco tutor who’s amazing courses have helped hundreds of thousands of students pass their exams. Inside you’ll find the secrets to nailing even the most perplexing exam topics. The Cisco Certified Network Associate (CCNA) is an entry-level networking certification by Cisco Systems, and it is also the name of the exam you have to pass to become CCNA certified. The CCNA exam tests a candidate on various aspects of networking, such as IP addressing, wired and wireless network connections, routing and switching packets across a network, network services, security fundamentals, network automation, and many more. Acing the CCNA Exam is full of must-know secrets that will help you ace one of the IT industry’s most important exams the first time. This comprehensive study guide is geared towards the areas exam takers often find the most challenging. There’s no assumption of knowledge and no high-level tech jargon. Handy network diagrams and illustrations fill every chapter to help learners easily understand the more complex topics. For absolute beginners. No networking skills required!
  • Добавил: literator
  • Дата: 20-07-2024, 05:48
  • Комментариев: 0
Название: CISSP For Dummies, 8th Edition
Автор: Lawrence C. Miller, Peter H. Gregory
Издательство: For Dummies
Год: 2024
Страниц: 608
Язык: английский
Формат: pdf, epub
Размер: 12.4 MB

Showcase your security expertise with the highly regarded CISSP certification. The CISSP (Certified Information Systems Security Professional) certification, held by more than 150,000 security professionals worldwide, is the gold standard of cybersecurity certifications. The CISSP Exam certifies cybersecurity professionals and opens doors for career advancement. Fully updated and revised to reflect the 2024 ISC2 CISSP Exam Outline, CISSP For Dummies is packed with helpful content for all eight security domains. This book includes access to online study tools such as practice questions and digital flashcards, boosting your likelihood of success on the exam. Plus, you'll feel prepared and ready for test day thanks to a 60-day study plan. Boost your security career with this Dummies study guide. Our goal in this book is simple: to help you prepare for and pass the CISSP examination so that you can join the ranks of respected certified security professionals who dutifully serve and protect organizations and industries around the world. Although we’ve stuffed this book chock-full of good information, we don’t expect it to be a weighty desktop reference on the shelf of every security professional — although we certainly wouldn’t object. With up-to-date content and valuable test prep features, this book is a one-and-done resource for any cybersecurity professional studying for the CISSP exam.
  • Добавил: literator
  • Дата: 19-07-2024, 19:14
  • Комментариев: 0
Название: Digital Twins for 6G: Fundamental theory, technology and applications
Автор: Hamed Ahmadi, Trung Q. Duong, Avishek Nag, Vishal Sharma, Berk Canberk, Octavia A. Dobre
Издательство: The Institution of Engineering and Technology
Год: 2024
Страниц: 341
Язык: английский
Формат: pdf (true)
Размер: 24.0 MB

Digital Twin (DT) technology is a real-time evolving digital duplicate of a physical object or process that contains all its history. It is enabled by massive real-time multi-source data collection and analysis. While 6G is considered as an enabler of digital twins, DT can also be a facilitator for integrating AI and 6G towards reliable, pervasive and efficient intelligent technologies. While the DT concept is familiar among aerospace and industrial engineers, it is a relatively new topic among electronic, electrical, computer, communications and networking engineers. For future massive-scale industrial internet-of-things (IoT) applications facilitated by DTs, a 6G network will be much more advantageous than its 5G counterpart. Digital Twins for 6G: Fundamental theory, technology and applications aims to bring together knowledge from industrial practitioners and researchers, and to introduce novel concepts that can help address the challenges associated with this interdisciplinary topic. The authors will cover fundamentals, enabling technologies, standards and advanced topics of DT and 6G to demystify the DT concept and its networking requirements and benefits, support a broader understanding of DT and its relationship with 6G to a larger audience, support learning and understanding for researchers and professionals working on 5G and 6G, and create a foundation on DT and 6G for the international research community. This book is intended to be both a tutorial of the important topics around digital twin and advanced wireless communications technologies, including 6G, as well as an advanced overview for technical professionals in the communications industry, technical managers, and researchers in both academia and industry.
  • Добавил: literator
  • Дата: 18-07-2024, 07:46
  • Комментариев: 0
Название: Cybersecurity for Space: A Guide to Foundations and Challenges (2nd Edition)
Автор: Jacob G. Oakley
Издательство: Apress
Год: 2024
Страниц: 299
Язык: английский
Формат: epub
Размер: 10.1 MB

Space is one of the fastest growing military, government and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure cybersecurity is addressed in the burgeoning field of space operations. This revised and expanded edition will prime the reader with the knowledge needed to understand the unique challenges to space operations which affect the implementation of cybersecurity. Further, the reader will have foundational knowledge on what impacts cyber threats can have on space systems and how cybersecurity must rise to meet them. The author, who spent years in the United States Marine Corps, originally involved in satellite communications is now a seasoned cyber security practitioner who has provided cyber security vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing the final frontier. This book is written for anyone curious about warfare in the era of cyber everything, those involved in cyber operations and cyber warfare, as well as security practitioners and policy or decision makers who are on the sending or receiving end of such activity.
  • Добавил: literator
  • Дата: 18-07-2024, 02:53
  • Комментариев: 0
Название: Cloud Security: Concepts, Applications and Practices
Автор: Jamuna S. Murthy, Siddesh G.M., Srinivasa K.G.
Издательство: CRC Press
Год: 2025
Страниц: 311
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This comprehensive work surveys the challenges, the best practices in the industry, and the latest developments and technologies. It covers the fundamentals of cloud computing, including deployment models, service models, and the benefits of cloud computing, followed by critical aspects of cloud security, including risk management, threat analysis, data protection, identity and access management, and compliance. Cloud Security explores the latest security technologies, such as encryption, multi‑factor authentication, and intrusion detection and prevention systems, and their roles in securing the cloud environment. Cloud computing has revolutionized the landscape of data sharing, serving as a transformative catalyst in the way organizations collaborate and exchange information. The hallmark of cloud computing is its scalable and on‑demand access to resources, fundamentally altering the traditional paradigms of data sharing. Unlike conventional methods, cloud‑based data sharing goes beyond geographical constraints, opening up avenues for real‑time collaboration and reducing latency. Platforms like Google Cloud and Amazon Web Services (AWS) stand as exemplars, showcasing the unprecedented efficiency gains achievable through cloud‑driven data sharing. This book is aimed at postgraduate students, professionals, and academic researchers working in the fields of Computer Science and cloud computing.
  • Добавил: literator
  • Дата: 18-07-2024, 02:24
  • Комментариев: 0
Название: 5G Networks: An Overview of Architecture, Design, Use Cases and Deployment
Автор: Atahar Khan, Satya Priyo Dhar, Ramakrishnan Shanmugasun­daram
Издательство: River Publishers
Год: 2024
Страниц: 241
Язык: английский
Формат: pdf (true)
Размер: 16.8 MB

This book provides comprehensive coverage of building an end-to-end view on how to architect, design, and orchestrate a 5G capable network that will integrate with 5G RAN, IP transport, datacenters, Telco Cloud, and 5G packet networks. It contains real-world examples with challenges and success strategies for deploying 5G Transport with closed-loop automation. It also focuses on aspects like scale, performance, latency, security, and manageability while building 5G transport for some of the world's largest 5G networks as well as migration approaches from 4G to 5G transport and core network. 5G is an emerging technology that mobile service providers (MNO/MVNO) across the world are embracing. They are willing to invest in enabling their infrastructure for 5G and explore new business opportunities with their enterprise/mobile customers. As per the Gartner survey, the majority of communication service provider (CSP) revenue will come from 5G. 5G is going to open the door to new applications such as wireless virtual reality, low latency machine-to-machine communication, smart city infrastructure, autonomous vehicles, IoT deployment, artificial intelligence-based applications, industrial automation and so much more. 5G is not merely mobile technology evolution, but the breadth is extended beyond mobile communication to address all forms of communication and its enabling new services and enhancing existing services like enhanced mobile broadband (eMBB), critical communications (CC) and ultra reliable and low latency communications (URLLC), massive Internet of Things (mIoT) and flexible network operations. 5G architecture brings a drastic change from radio network to IP transport and mobile packets core for mobile network operators (MNOs) and mobile virtual network operators (MVNOs).
  • Добавил: literator
  • Дата: 17-07-2024, 17:34
  • Комментариев: 0
Название: Cybersecurity of Discrete Event Systems: From Smart Attacks to Resilient Defence
Автор: Rong Su
Издательство: CRC Press
Год: 2025
Страниц: 283
Язык: английский
Формат: pdf (true)
Размер: 26.2 MB

This book describes analysis and control against smart cyberattacks in discrete event systems (DES). This is the first technical DES book to provide a thorough introduction to smart cyberattacks on supervisory control systems modelled by regular languages or finite-state automata and possible resilient defence methods against smart cyberattacks. "Smart attacks" cannot be detected by the supervisor until an irreversible process toward ensured damage occurs. An attack may be conducted either in the observation channel (i.e., the supervisor’s input of the supervisor) or in the command channel (i.e., the supervisor’s output) or both simultaneously. Therefore, defence strategies against these attacks are urgently needed. Rong Su provides a comprehensive overview of the latest theories and includes empirical examples to illustrate concepts and methods. By centering on what information is available and how such information is used, the readers are provided with methods to evaluate the cyber vulnerability of a given system and design a resilient supervisor against relevant smart attacks. This book comprises two sections. Firstly, Su introduces the required concepts and techniques related to DES and supervisory control. Then he introduces different types of smart attacks that intercept and manipulate information in sensor and command channels in a standard closed-loop control system. Secondly, he presents resilient defence strategies against relevant types of attacks. By focusing on a conceptual introduction and systematic analysis, this book provides a solid theoretical foundation for future exploration by researchers and graduate students who are interested in cybersecurity research, not necessarily limited to those in the DES community. To illustrate the practical relevance of this research, realistic examples are used throughout this book. Readers are recommended to have a background in formal language theory.