Vtome.ru - электронная библиотека

  • Добавил: alex66
  • Дата: 30-09-2020, 19:37
  • Комментариев: 0

Название: Wireless Sensor Networks: Evolutionary Algorithms for Optimizing Performance
Автор: Damodar Reddy Edla, Mahesh Chowdary Kongara, Amruta Lipare, Venkatanareshbabu Kuppili, Kannadasan K
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 147
Размер: 10.32 МБ
Язык: English

Wireless Sensor Networks: Evolutionary Algorithms for Optimizing Performance provides an integrative overview of bio-inspired algorithms and their applications in the area of Wireless Sensor Networks (WSN). Along with the usage of the WSN, the number of risks and challenges occurs while deploying any WSN. Therefore, to defeat these challenges some of the bio-inspired algorithms are applied and discussed in this book.
  • Добавил: literator
  • Дата: 29-09-2020, 19:51
  • Комментариев: 0
GPEN GIAC Certified Penetration Tester All-in-One Exam GuideНазвание: GPEN GIAC Certified Penetration Tester All-in-One Exam Guide
Автор: Raymond Nutting, William MacCormack
Издательство: McGraw-Hill Education
Год: 2020
Страниц: 480
Язык: английский
Формат: epub
Размер: 35.4 MB

This effective study guide provides 100% coverage of every topic on the GPEN GIAC Penetration Tester exam. This effective self-study guide fully prepares you for the Global Information Assurance Certification’s challenging Penetration Tester exam, which validates advanced IT security skills. The book features exam-focused coverage of penetration testing methodologies, legal issues, and best practices. GPEN GIAC Certified Penetration Tester All-in-One Exam Guide contains useful tips and tricks, real-world examples, and case studies drawn from authors’ extensive experience. Beyond exam preparation, the book also serves as a valuable on-the-job reference.
  • Добавил: buratino
  • Дата: 29-09-2020, 12:02
  • Комментариев: 0
Название: Applications of Cloud Computing: Approaches and Practices (Chapman & Hall/CRC Distributed Sensing and Intelligent Systems Series)
Автор: Prerna Sharma, Moolchand Sharma, Mohamed Elhoseny
Издательство: Chapman and Hall/CRC
Год: 2021
Формат: True PDF
Страниц: 210
Размер: 13.1 Mb
Язык: English

In the era of the Internet of Things and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such a humongous amount of data, it has now become mandatory to exploit the power of massively parallel architecture for fast computation. Cloud computing provides a cheap source of such a computing framework for a large volume of data for real-time applications. It is, therefore, not surprising to see that cloud computing has become a buzzword in the computing fraternity over the last decade.
  • Добавил: TRex
  • Дата: 29-09-2020, 11:53
  • Комментариев: 0
Название: Cloud VR: Technology and Application
Автор: by Huaping Xiong, Dawei Li, Kun Huang, Mu Xu, Yin Huang, Lingling Xu , Jianfei Lai, Shengjun Qian
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 259
Размер: 10 Mb
Язык: English

Based on the technical accumulation and practice of Huawei iLab in the Cloud VR field, this book systematically describes the advantages of Cloud VR technologies; technical requirements on clouds, networks, and terminals as well as solution implementation; Cloud VR experience evaluation baselines and methods; and current business practices
  • Добавил: buratino
  • Дата: 29-09-2020, 11:52
  • Комментариев: 0
Название: Blockchain Technology: Fundamentals, Applications, and Case Studies (Internet of Everything (IoE))
Автор: E. Golden Julie (Editor), J. Jesu Vedha Nayahi (Editor), Noor Zaman Jhanjhi (Editor)
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 254
Размер: 17.9 Mb
Язык: English

This book presents a detailed exploration of adaption and implementation, as well as a 360-degree view spectrum of blockchain technologies in real-world business applications. Blockchain is gaining momentum in all sectors. This book offers a collection of?protocol standards, issues, security improvements, applicability, features, and types of cryptocurrency in processing and through 5G technology.
  • Добавил: buratino
  • Дата: 28-09-2020, 14:37
  • Комментариев: 0
Название: Empower Decision Makers with SAP Analytics Cloud: Modernize BI with SAP's Single Platform for Analytics
Автор: Vinayak Gole, Shreekant Shiralkar
Издательство: Apress
Год: 2020
Формат: true pdf/epub
Страниц: 357
Размер: 27 Mb
Язык: English

Discover the capabilities and features of SAP Analytics Cloud to draw actionable insights from a variety of data, as well as the functionality that enables you to meet typical business challenges. With this book, you will work with SAC and enable key decision makers within your enterprise to deliver crucial business decisions driven by data and key performance indicators.
  • Добавил: TRex
  • Дата: 28-09-2020, 11:07
  • Комментариев: 0
Название: Data Plane Development Kit (DPDK): A Software Optimization Guide to the User Space-Based Network Applications
Автор: Heqing Zhu
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 336
Размер: 10 Mb
Язык: English

This book brings together the insights and practical experience of some of the most experienced Data Plane Development Kit (DPDK) technical experts, detailing the trend of DPDK, data packet processing, hardware acceleration, packet processing and virtualization, as well as the practical application of DPDK in the fields of SDN, NFV, and network storage. The book also devotes many chunks to exploring various core software algorithms, the advanced optimization methods adopted in DPDK, detailed practical experience, and the guides on how to use DPDK.
  • Добавил: TRex
  • Дата: 28-09-2020, 10:28
  • Комментариев: 0
Название: Cloud Network Management: An IoT Based Framework
Автор: Sanjay Kumar Biswash, Sourav Kanti Addya
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 291
Размер: 17,6 Mb
Язык: English

Data storage, processing, and management at remote location over dynamic networks is the most challenging task in cloud networks. Users’ expectations are very high for data accuracy, reliability, accessibility, and availability in pervasive cloud environment. It was the core motivation for the Cloud Networks Internet of Things (CNIoT). The exponential growth of the networks and data management in CNIoT must be implemented in fast growing service sectors such as logistic and enterprise management. The network based IoT works as a bridge to fill the gap between IT and cloud networks, where data is easily accessible and available.
  • Добавил: buratino
  • Дата: 27-09-2020, 11:40
  • Комментариев: 0
Название: Cybersecurity For Dummies (For Dummies (Computer/Tech))
Автор: Joseph Steinberg
Издательство: For Dummies
Год: 2019
Формат: true pdf/epub
Страниц: 368
Размер: 15.2 Mb
Язык: English

Protect your business and family against cyber attacks
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.
  • Добавил: TRex
  • Дата: 26-09-2020, 08:14
  • Комментариев: 0
Название: The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer
Автор: Jeremy Martin, Richard Medlin, Nitin Sharma, LaShanda Edwards, Justin Casey, Mossaraf Khan, Ambadi M.P, Vishal Belbase
Издательство: Information Warfare Center
Год: 2020
Формат: PDF
Страниц: 265
Размер: 24 Mb
Язык: English

Do you do some form of Cyber Forensics or want to learn how or where to start? Whether you are specializing on dead box forensics, doing OSINT investigations, or working at a SOC, this publication has something for you.Inside, there are articles and hands on walkthroughs written by different authors covering the basics of the "8" layers of the OSI model("Cake") along with cyber forensics methods that fall into different areas of the stack. Included is information about the Dark Web, Forensic Imaging of drives, Data Recovery, Network Analysis (Ripping apart Trickbot traffic), Email Investigations, Visualizing threats and more...