Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 10-05-2020, 12:23
  • Комментариев: 0
Название: Information Literacy in the Digital Age
Автор: Laura Perdew
Издательство: Essential Library
Год: 2016
Страниц: 115
Язык: английский
Формат: pdf (true)
Размер: 18.4 MB

The flow of information through our modern digital world has led to many new issues and controversies. Information Literacy in the Digital Age examines the challenges involved in seeking and evaluating information from the vast array of sources available through digital technology. Compelling text, well-chosen photographs, and extensive back matter give readers a clear look at these complex issues. Features include essential facts, a glossary, additional resources, source notes, and an index.
  • Добавил: buratino
  • Дата: 9-05-2020, 23:49
  • Комментариев: 0
Название: Ambient Backscatter Communication Networks
Автор: Dinh Thai Hoang, Dusit Niyato, Dong In Kim
Издательство: Cambridge University Press
Год: 2020
Формат: True PDF
Страниц: 314
Размер: 12.8 Mb
Язык: English

Understand the fundamental principles and applications of ambient backscatter technology with this authoritative review. Covering both theory and practical engineering, leading researchers describe and explain hardware design, network design, and signal processing, and discuss architectures, protocols, communication methods, open research issues, emerging applications, and advanced system models with innovative solutions. This is an essential tool for graduate students, researchers, engineers, developers, and entrepreneurs.

  • Добавил: buratino
  • Дата: 9-05-2020, 13:44
  • Комментариев: 0
Название: CISSP: A Comprehensive Guide of Advanced Methods to Learn the CISSP CBK Reference
Автор: Daniel Jones
Издательство: Amazon
Год: 2020
Формат: azw3/pdf(conv.)
Страниц: 195
Размер: 6.8 Mb
Язык: English

CISSP is one of the most comprehensive, widely accepted, dominant, mature and vendor-neutral professional certifications. Such a place has its perks and challenges. Your responsibility to keep your commitment, dedication, and practices to conquer it. Other vendor-neutral certification paths lead to the same goal. If the selection is CISSP, you have already accepted it and it is a great choice.
  • Добавил: literator
  • Дата: 8-05-2020, 19:42
  • Комментариев: 0
Unmanned Aerial Vehicle Applications over Cellular Networks for 5G and BeyondНазвание: Unmanned Aerial Vehicle Applications over Cellular Networks for 5G and Beyond
Автор: Hongliang Zhang, Lingyang Song
Издательство: Springer
Серия: Wireless Networks
Год: 2019 (2020 edition)
Страниц: 231
Язык: английский
Формат: pdf (true), epub
Размер: 36.8 MB

This book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications.
  • Добавил: literator
  • Дата: 8-05-2020, 14:14
  • Комментариев: 0
Computer Networks: by Ques10Название: Computer Networks
Автор: Snehal Bailmare
Издательство: Ques10
Год: 2020
Страниц: 189
Язык: английский
Формат: pdf, azw3
Размер: 10.1 MB

Computer can communicate with another computer down the street, across town, across the country and across the world, thanks to a vast array of networks. The World Wide Web is a system of interconnected information sources, however, it would be meaningless without networks that allow computers to access information and communicate with each other. A local area network, or LAN, is a connection of computers within a small area, such as an office, a building or multiple buildings located close together. Local area networks can be as broad as connecting computers within a college campus, or as simple as linking two computers in a household. A LAN is relatively inexpensive compared to other types of network applications, and can be built with wired or wireless connections.
  • Добавил: literator
  • Дата: 8-05-2020, 02:40
  • Комментариев: 0
Computer Networking: This Book Includes: Computer Networking for Beginners and Beginners Guide (All in One)Название: Computer Networking: This Book Includes: Computer Networking for Beginners and Beginners Guide (All in One)
Автор: Russell Scott
Издательство: Amazon.com Services LLC
Год: 2019
Страниц: 363
Язык: английский
Формат: pdf, azw
Размер: 10.1 MB

Do you want to find out how a computer network works? Do you want to know how to keep your network safe? This book is all you need! Computers and the internet have changed this world and our lifestyle forever. We just need to touch a small button and within a fraction of a second, we can do almost anything! The major factor that lies behind this advanced technology is none other than computer network. That's why it's important to know how it works!
  • Добавил: literator
  • Дата: 7-05-2020, 20:42
  • Комментариев: 0
Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network SecurityНазвание: Networking for Beginners: The Complete Guide to Computer Network Basics, Wireless Technology and Network Security
Автор: John Medicine
Издательство: Amazon.com Services LLC
Год: 2019
Страниц: 152
Язык: английский
Формат: pdf, azw
Размер: 21.4 MB

Do you want to learn how to set up a new network for your home or business place and get the best performance of your network? Do you want to learn about Network Mode Security? If so then keep reading. In this tech-savvy world of today, everyone is looking out for speed in their life. There were days when a single message used to take many days to get delivered to the recipient. Today, with the advent of networking and the internet, people can easily send out data packets of their need. The various forms of internet communication have also changed the whole concept of communication across a long distance. Networking has adapted the concepts of wireless functioning which have helped in wiping out various redundancies.
  • Добавил: literator
  • Дата: 5-05-2020, 19:54
  • Комментариев: 0
Kali Linux: The Beginner’s Guide on Ethical Hacking with Kali. Basic Security Testing Concepts Explained to Prevent Cyber Terrorism and Understand the Basics of Cybersecurity and Hacking in GeneralНазвание: Kali Linux: The Beginner’s Guide on Ethical Hacking with Kali. Basic Security Testing Concepts Explained to Prevent Cyber Terrorism and Understand the Basics of Cybersecurity and Hacking in General
Автор: Raymond Deep
Издательство: Amazon.com Services LLC
Год: 2019
Язык: английский
Формат: pdf, azw
Размер: 11.1 MB

If you want to learn about Kali Linux but aren’t sure where to start then keep reading… Does the world of cybersecurity seem exciting, but a little overwhelming to grasp? Do you want to learn about ethical hacking?
IF YES, then this is the perfect book for you. Our dependence on technology is increasing by the day. Gone are the days when a crime was restricted to the physical realm alone! These days, crime has seeped into the virtual world too! Cybercrimes have become rampant, and with it, the need for cybersecurity is ever increasing. A single attack on an organization’s network can cause irreparable harm to the company’s assets as well as reputation. Learning about cybersecurity, along with ethical hacking using Kali Linux gives you all the practical information you require for developing your skills as a professional in the industry of information security.
  • Добавил: literator
  • Дата: 4-05-2020, 07:12
  • Комментариев: 0
Fog Computing: Theory and PracticeНазвание: Fog Computing: Theory and Practice
Автор: Assad Abbas, Samee U. Khan
Издательство: Wiley
Год: 2020
Страниц: 582
Язык: английский
Формат: pdf (true)
Размер: 12.2 MB

Summarizes the current state and upcoming trends within the area of fog computing. Written by some of the leading experts in the field, Fog Computing: Theory and Practice focuses on the technological aspects of employing fog computing in various application domains, such as smart healthcare, industrial process control and improvement, smart cities, and virtual learning environments. In addition, the Machine-to-Machine (M2M) communication methods for fog computing environments are covered in depth.