Vtome.ru - электронная библиотека

  • Добавил: alex66
  • Дата: 30-11-2020, 17:10
  • Комментариев: 0

Название: Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks, Second Edition
Автор: Hossam Mahmoud Ahmad Fahmy
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 739
Размер: 37,47 МБ
Язык: English

The new edition of this popular book has been transformed into a hands-on textbook, focusing on the principles of wireless sensor networks (WSNs), their applications, their protocols and standards, and their analysis and test tools; a meticulous care has been accorded to the definitions and terminology. To make WSNs felt and seen, the adopted technologies as well as their manufacturers are presented in detail. In introductory computer networking books, chapters sequencing follows the bottom up or top down architecture of the seven layers protocol. This book starts some steps later, with chapters ordered based on a topic’s significance to the elaboration of wireless sensor networks (WSNs) concepts and issues.
  • Добавил: TRex
  • Дата: 30-11-2020, 13:28
  • Комментариев: 0
Название: The Art of Network Penetration Testing: How to take over any company in the world (Includes free practice environment)
Автор: Royce Davis
Издательство: Manning Publications
Год: 2020
Формат: True PDF + Code
Страниц: 307
Размер: 10 Mb
Язык: English

Network penetration testing is about more than just getting through a perimeter firewall. The biggest security threats facing a modern enterprise are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals,
  • Добавил: buratino
  • Дата: 29-11-2020, 01:53
  • Комментариев: 0
Название: 5G Radio Access Network Architecture The Dark Side of 5G
Автор: Sasha Sirotkin (Editor)
Издательство: Wiley
Год: 2021
Формат: True PDF
Страниц: 437
Размер: 12.2 Mb
Язык: English

Written by an industry insider with state of the art research at their fingertips, this book describes the Radio Access Network (RAN) architecture, starting with currently deployed 4G, followed by the description of 5G requirements and why re-thinking of the RAN architecture is needed to support these. Based on these considerations, it explains how 5G network architecture, which is currently being defined, is likely to evolve.
  • Добавил: literator
  • Дата: 28-11-2020, 17:36
  • Комментариев: 0
CompTIA Network+ Exam: N10-007: Technology workbook | Latest 2020 Edition with free quick reference sheet and practice questionsНазвание: CompTIA Network+ Exam: N10-007: Technology workbook | Latest 2020 Edition with free quick reference sheet and practice questions
Автор: IP Specialist
Издательство: IPSpecialist LTD
Год: 2020
Страниц: 460
Язык: английский
Формат: epub
Размер: 59.2 MB

IPSpecialist Technology workbooks are the ideal guides to developing the hands-on skills necessary to pass the exam. Our workbook covers official exam blueprint and explains the technology with real life case study based labs. The content covered in each workbook consists of individually focused technology topics presented in an easy-to-follow, goal-oriented, step-by-step approach. Every scenario features detailed breakdowns and thorough verifications to help you completely understand the task and associated technology. We extensively used mind maps in our workbooks to visually explain the technology. Our workbooks have become a widely used tool to learn and remember the information effectively.
  • Добавил: literator
  • Дата: 28-11-2020, 17:06
  • Комментариев: 0
Complete Ethical Hacking TutorialНазвание: Complete Ethical Hacking Tutorial
Автор: Sachin Rathore
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 116
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.1 MB

This Book Provide Guide on Ethical Hacking And All Tools Tutorial Used for Ethical Hacking. Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
  • Добавил: buratino
  • Дата: 27-11-2020, 11:35
  • Комментариев: 0
Название: Network Design Cookbook Seconnd Edition (version 2.0.4)
Автор: Michel Thomatis
Издательство: RouteHub Group, LLC
Год: 2017
Формат: True PDF
Страниц: 412
Размер: 21.3 Mb
Язык: English

The second edition of the Network Design Cookbook provides a new approach for building a network design by selecting design modules (or PODs) based on the business requirements, engineer's preferences, and recommendations. This new approach provides a structured process that you, as a network engineer or consultant, can use to meet the critical technical objectives while keeping within the parameters of industry best practices. In this book, you will find valuable resources and tools for constructing the topology and services you need for many solutions such as LAN, WAN, Data Center, Internet Edge, Firewall, to Collaboration.
  • Добавил: buratino
  • Дата: 26-11-2020, 08:56
  • Комментариев: 0
Название: Cyber Resilience (River Publishers Series in Security and Digital Forensics)
Автор: Sergei Petrenko
Издательство: River Publishers
Год: 2019
Формат: True PDF
Страниц: 494
Размер: 13 Mb
Язык: English

This monograph shows that modern Industry 4.0. cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and "sleep" hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery.
  • Добавил: TRex
  • Дата: 24-11-2020, 15:48
  • Комментариев: 0
Название: Автоматизация программируемых сетей
Автор: Мэтт Осуолт, Джейсон Эделман, Скотт Лоу
Издательство: ДМК
Год: 2019
Формат: PDF
Страниц: 616
Размер: 10 Mb
Язык: Русский

Постоянное появление новых протоколов, технологий, моделей доставки и ужесточение требований к интеллектуальности и гибкости бизнес-процессов сделали сетевую автоматизацию чрезвычайно важной. Это практическое руководство наглядно демонстрирует сетевым инженерам, как использовать широкий спектр технологий и инструментальных средств, в том числе Linux, Python, JSON и XML, для автоматизации систем с помощью написания программного кода.
  • Добавил: buratino
  • Дата: 23-11-2020, 16:10
  • Комментариев: 0
Название: Cybersecurity Analytics (Chapman & Hall/CRC Data Science Series)
Автор: Rakesh M. Verma, David J. Marchette
Издательство: Chapman & Hall/CRC
Год: 2020
Формат: true pdf/epub
Страниц: 356
Размер: 17.1 Mb
Язык: English

Cybersecurity Analytics is for the cybersecurity student and professional who wants to learn data science techniques critical for tackling cybersecurity challenges, and for the data science student and professional who wants to learn about cybersecurity adaptations. Trying to build a malware detector, a phishing email detector, or just interested in finding patterns in your datasets? This book can let you do it on your own. Numerous examples and datasets links are included so that the reader can "learn by doing." Anyone with a basic college-level calculus course and some probability knowledge can easily understand most of the material.
  • Добавил: literator
  • Дата: 20-11-2020, 21:30
  • Комментариев: 0
Фундаментальная теория облачных технологий: в 18 кн. Книги 1-2Название: Фундаментальная теория облачных технологий: в 18 кн. Книги 1-2
Автор: Кононюк А.Е.
Издательство: Освіта України
Год: 2018
Количество книг: 2
Страниц: 620+525
Язык: русский
Формат: pdf
Размер: 17.0 MB

Многотомная работа посвящена систематическому изложению общих формализмов, математических моделей и алгоритмических методов, которые могут быть использованы при моделировании и исследованиях математических моделей объектов облачных технологий. Развиваются представления и методы решения задач облачных технологий, основанные на теориях эвристического поиска и автоматизированного проектирования облачных управляющих систем, а также процедуральные методы, базирующиеся на классе проблемно-ориентированных языков, сочетающих свойства языков программирования и автоматических решателей задач отображения облачных технологий различными математическими средствами.