Vtome.ru - электронная библиотека

  • Добавил: kotmatros255
  • Дата: 9-07-2020, 06:13
  • Комментариев: 0
Название: Сетевые средства Linux
Автор: Родерик В. Смит
Издательство: Вильямс
Год: 2003
ISBN: 5-8459-0426-9
Формат: pdf
Страниц: 672
Размер: 12,8 Mb
Язык: Русский

В этой книге описаны принципы действия и область применения многих серверов, выполняющихся в системе Linux. Здесь рассматриваются DHCP-сервер, серверы Samba и NFS, серверы печати, NTP-сервер, средства удаленной регистрации и система X Window. He забыты и средства, традиционно используемые для обеспечения работы Internet-служб: серверы DNS, SMTP, HTTP и FTP. Большое внимание уделено вопросам безопасности сети.
  • Добавил: buratino
  • Дата: 8-07-2020, 10:06
  • Комментариев: 0
Название: Propagation Engineering in Wireless Communications, 2nd Edition
Автор: Abdollah Ghasemi and Ali Abedi
Издательство: Springer
Год: 2016
Формат: PDF
Размер: 11 Мб
Язык: английский / English

This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner.
  • Добавил: harun54
  • Дата: 8-07-2020, 08:26
  • Комментариев: 0
Название: Cognitive Sensors and IoT: Architecture, Deployment, and Data Delivery
Автор: Fadi Al-Turjman
Издательство: CRC Press
Год: 2017
Формат: PDF
Размер: 20 Мб
Язык: английский / English

This book presents the Cognitive Information Centric Sensor Network (CICSN) framework for the IoT. This framework is built on top of cognitive nodes, capable of knowledge representation, learning, and reasoning, along with an information-centric approach for data delivery. It also discusses the most appropriate deployment strategy for these cognitive nodes under realistic assumptions that cares about the Quality of Information (QoI). In addition, it uses a QoI aware data delivery strategy, with Analytic Hierarchy Process (AHP) as the reasoning technique to identify data delivery paths that dynamically adapt to changing network conditions and user requirements.
  • Добавил: kotmatros255
  • Дата: 8-07-2020, 07:10
  • Комментариев: 0
Название: Разработка XML Web-сервисов средствами Microsoft. NET
Автор: Скотт Шорт
Издательство: БХВ-Петербург
Год: 2003
Серия: Мастер программ
ISBN: 5-94157-251-4
Формат: pdf
Страниц: 479
Размер: 12,6 Mb
Язык: Русский

Книга Скотта Шорта посвящена построению и применению Web-сервисов средствами платформы Microsoft .NET. Подробно рассматриваются интернет-технологии ASP.NET и Remoting, DISCO, UDDI, протокол SOAP, языки XML, WSDL, и их роль в разработке Web-сервисов. Приводятся сведения о новейших разработках корпорации Microsoft, облегчающих создание и распространение Web-сервисов.
  • Добавил: buratino
  • Дата: 7-07-2020, 12:37
  • Комментариев: 0
Название: The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing (Palgrave Studies in Digital Business & Enabling Technologies)
Автор: Theo Lynn (Editor), John G. Mooney (Editor), Brian Lee (Editor), Patricia Takako Endo (Editor)
Издательство: Palgrave Macmillan
Год: 2020
Формат: true pdf/epub
Страниц: 183
Размер: 10.2 Mb
Язык: English

The Internet of Things offers massive societal and economic opportunities while at the same time significant challenges, not least the delivery and management of the technical infrastructure underpinning it, the deluge of data generated from it, ensuring privacy and security, and capturing value from it.
This Open Access Pivot explores these challenges, presenting the state of the art and future directions for research but also frameworks for making sense of this complex area.
  • Добавил: harun54
  • Дата: 6-07-2020, 12:51
  • Комментариев: 0
Название: Game Theoretic Analysis of Congestion, Safety and Security: Traffic and Transportation Theory
Автор: Kjell Hausken and Jun Zhuang
Издательство: Springer
Год: 2014
Формат: PDF
Размер: 16 Мб
Язык: английский / English

Maximizing reader insights into the interactions between game theory, excessive crowding and safety and security elements, this book establishes a new research angle by illustrating linkages between different research approaches and through laying the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analysing systems where congestion occurs – which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways – this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security into proceedings.
  • Добавил: harun54
  • Дата: 6-07-2020, 12:12
  • Комментариев: 0
Название: Smart Secure Systems – IoT and Analytics Perspective: Second International Conference on Intelligent Information Technologies. ICIIT 2017
Автор: Guru Prasadh Venkataramani and Karthik Sankaranarayanan
Издательство: Springer
Год: 2018
Формат: PDF
Размер: 30 Мб
Язык: английский / English

This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017. The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.
  • Добавил: literator
  • Дата: 5-07-2020, 18:51
  • Комментариев: 0
Название: The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Автор: Ben Buchanan
Издательство: Harvard University Press
Год: 2020
Страниц: 433
Язык: английский
Формат: True PDF; pdf (conv), azw3, epub
Размер: 20.6 MB, 10.1 MB

Few national-security threats are as potent - or as nebulous - as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not. Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don’t look anything like we thought they would.
  • Добавил: literator
  • Дата: 5-07-2020, 17:56
  • Комментариев: 0
Blockchain and Web 3.0: Social, Economic, and Technological ChallengesНазвание: Blockchain and Web 3.0: Social, Economic, and Technological Challenges
Автор: Massimo Ragnedda, Giuseppe Destefanis
Издательство: Routledge
Год: 2020
Страниц: 334
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Blockchain is no longer just about bitcoin or cryptocurrencies in general. Instead, it can be seen as a disruptive, revolutionary technology which will have major impacts on multiple aspects of our lives. The revolutionary power of such technology compares with the revolution sparked by the World Wide Web and the Internet in general. Just as the Internet is a means of sharing information, so blockchain technologies can be seen as a way to introduce the next level: sharing value. The problem solved by a blockchain is “consensus”. It revolutionizes the concept of trust, introducing elements for generating disruption in the financial sector.
  • Добавил: buratino
  • Дата: 5-07-2020, 13:53
  • Комментариев: 0
Название: Drones in IoT-enabled Spaces
Автор: Fadi Al-Turjman
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 227
Размер: 10 Mb
Язык: English

The Internet of Things (IoT) is a system of inter-connected devices, objects, and organisms. Among these devices, drones are gaining lots of interest. Drones are expected to communicate with cellular networks in the next generation networks (5G and beyond) which opens the door for another exciting research area. This book considers very important research areas in drone and cellular networks. It addresses major issues and challenges in drone-based solutions proposed for IoT-enabled cellular/computer networks, routing/communication protocols, surveillances applications, secured data management, and positioning approaches. It focuses mainly on smart and context-aware implementations.