Vtome.ru - электронная библиотека

  • Добавил: TRex
  • Дата: 27-05-2020, 10:42
  • Комментариев: 0
Название: Take Control of Zoom
Автор: Glenn Fleishman
Издательство: Alt concepts inc.
Год: 2020
Формат: EPUB
Страниц: 148
Размер: 16,4 Mb
Язык: English

Many of us rarely touched a video chat or videoconferencing tool until the pandemic hit. Now, we videoconference daily (or more often) for work meetings, to talk to clients, to stay in touch with friends and family, and for school—we’ve gone from zero to Zoom!
  • Добавил: buratino
  • Дата: 27-05-2020, 06:40
  • Комментариев: 0
Название: Cryptocurrencies and Blockchain Technology Applications
Автор: Gulshan Shrivastava (Editor), Dac-Nhuong Le (Editor), Kavita Sharma (Editor)
Издательство: Wiley-Scrivener
Год: 2020
Формат: True PDF
Страниц: 316
Размер: 10.8 Mb
Язык: English

As we enter the Industrial Revolution 4.0, demands for an increasing degree of trust and privacy protection continue to be voiced. The development of blockchain technology is very important because it can help frictionless and transparent financial transactions and improve the business experience, which in turn has far-reaching effects for economic, psychological, educational and organizational improvements in the way we work, teach, learn and care for ourselves and each other.
  • Добавил: buratino
  • Дата: 26-05-2020, 02:16
  • Комментариев: 0
Название: Auction Theory for Computer Networks
Автор: Dusit Niyato, Nguyen Cong Luong, Ping Wang
Издательство: Cambridge University Press
Год: 2020
Формат: True PDF
Страниц: 290
Размер: 12.8 Mb
Язык: English

Do you have the tools to address recent challenges and problems in modern computer networks? Discover a unified view of auction theoretic applications and develop auction models, solution concepts, and algorithms with this multidisciplinary review. Devise distributed, dynamic, and adaptive algorithms for ensuring robust network operation over time-varying and heterogeneous environments, and for optimizing decisions about services, resource allocation, and usage of all network entities.
  • Добавил: buratino
  • Дата: 25-05-2020, 20:32
  • Комментариев: 0
Название: Internet of Things (IoT): Concepts and Applications (S.M.A.R.T. Environments)
Автор: Mansaf Alam (Editor), Kashish Ara Shakil (Editor), Samiya Khan (Editor)
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 549
Размер: 58.8 Mb
Язык: English

This books objective is to explore the concepts and applications related to Internet of Things with the vision to identify and address existing challenges. Additionally, the book provides future research directions in this domain, and explores the different applications of IoT and its associated technologies. Studies investigate applications for crowd sensing and sourcing, as well as smart applications to healthcare solutions, agriculture and intelligent disaster management.
  • Добавил: buratino
  • Дата: 25-05-2020, 13:06
  • Комментариев: 0
Название: From Visual Surveillance to Internet of Things: Technology and Applications
Автор: Lavanya Sharma (Editor), Pradeep K. Garg (Editor)
Издательство: Taylor & Francis Group
Год: 2020
Формат: True PDF
Страниц: 273
Размер: 10.5 Mb
Язык: English

From Visual Surveillance to Internet of Things: Technology and Applications is an invaluable resource for students, academicians and researchers to explore the utilization of Internet of Things with visual surveillance and its underlying technologies in different application areas. Using a series of present and future applications – business insights, indoor-outdoor securities, smart grids, human detection and tracking, intelligent traffic monitoring, e-health department and many more – this book will support readers to obtain a deeper knowledge in implementing IoT with visual surveillance.
  • Добавил: buratino
  • Дата: 23-05-2020, 19:46
  • Комментариев: 0
Название: SecureCSocial: Secure Cloud-Based Social Network (World Scientific Series in Digital Forensics and Cybersecurity Book 1)
Автор: Pradeep K Atrey, Kasun Senevirathna
Издательство: World Scientific Publishing Co
Год: 2020
Формат: True PDF
Страниц: 158
Размер: 18 Mb
Язык: English

The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how trustworthy the social network operators (SNOs) are.
This book presents a way to tackle the security and privacy issues in current OSNs through a new framework for online social networking, based on distributed cloud-based datacenters (CDCs) and using Shamir's secret sharing (SSS) as the method of encrypting user profile data.
  • Добавил: literator
  • Дата: 23-05-2020, 19:02
  • Комментариев: 0
Ethical Hacking: From Beginner to Advanced: Learn Ethical Hacking from A to ZНазвание: Ethical Hacking: From Beginner to Advanced: Learn Ethical Hacking from A to Z
Автор: Shubham Yadav
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 109
Язык: английский
Формат: pdf. azw3
Размер: 19.3 MB

If you want to learn about what is Ethical Hacking? And, How Hackers hack into the system. Then you have come to the right place. Ethical hacking is a profession that has gained popularity in the last few years. Network Security and Cyber Security have become important aspects of every business. Hackers have always hacked the network or server of an organization to obtain personal information that can derail the company. It is for this reason that organizations have begun to hire the professionals to help them maintain this security. These professionals are ethical hackers. An ethical hacker will run numerous tests and hacks that another cracker may use to obtain sensitive information about the system.
  • Добавил: buratino
  • Дата: 23-05-2020, 19:00
  • Комментариев: 0
Название: The Design of Rijndael: The Advanced Encryption Standard (AES) (Information Security and Cryptography) Second edition
Автор: Joan Daemen, Vincent Rijmen
Издательство: Springer
Год: 2020
Формат: true pdf/rtf/fb2
Страниц: 286
Размер: 10 Mb
Язык: English

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
  • Добавил: literator
  • Дата: 23-05-2020, 17:54
  • Комментариев: 0
Handbook of Research on Machine and Deep Learning Applications for Cyber SecurityНазвание: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Автор: Padmavathi Ganapathi, D. Shanmugapriya
Издательство: IGI Global
Год: 2020
Страниц: 507
Язык: английский
Формат: pdf (true)
Размер: 15.1 MB

As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security.
  • Добавил: buratino
  • Дата: 23-05-2020, 17:32
  • Комментариев: 0
Название: Security and Privacy Issues in Sensor Networks and IoT
Автор: Priyanka Ahlawat (Author, Editor), Mayank Dave (Editor)
Издательство: IGI Global
Год: 2020
Формат: true pdf/fb2
Страниц: 351
Размер: 17.9 Mb
Язык: English

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges.