Vtome.ru - электронная библиотека

  • Добавил: buratino
  • Дата: 13-04-2020, 21:45
  • Комментариев: 0
Название: Convergence of Energy, Communication and Computation in B5G Cellular Internet of Things
Автор: Chen, Xiaoming, Qi, Qiao
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 135
Размер: 16.2 Mb
Язык: English

Addresses the convergence of energy, communication and computation in the B5G cellular IoT both in terms of both theory and techniques
Comprehensively covers the design, analysis, and optimization of the B5G cellular IoT
Provides in-depth studies on four typical convergence scenarios
Studies key methods and techniques in the convergence of energy, communication and computation in the B5G cellular IoT
  • Добавил: literator
  • Дата: 13-04-2020, 20:27
  • Комментариев: 0
200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and OfflineНазвание: 200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline
Автор: Jeni Rogers
Издательство: Adams Media
Год: 2019
Страниц: 256
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Discover simple strategies for protecting your personal and confidential information on and offline with this essential and easy-to-understand guide. We all know that the internet can serve as a hotbed for identity theft. But it isn’t the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store—and even you have the ability to unknowingly reveal your private information to everyone from thieves to busybodies. But you don’t need to hire a specialist to keep your information safe—you can do it yourself with these 200+ easy-to-implement tactics
  • Добавил: literator
  • Дата: 13-04-2020, 16:39
  • Комментариев: 0
Название: Developing Cybersecurity Programs and Policies, 3rd Edition
Автор: Omar Santos
Издательство: Pearson IT Certification
Год: 2018
Страниц: 673
Язык: английский
Формат: pdf (true), epub
Размер: 13.7 MB

All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work. Clearly presents best practices, governance frameworks, and key standards. Includes focused coverage of healthcare, finance, and PCI DSS compliance. An essential and invaluable guide for leaders, managers, and technical professionals.
  • Добавил: literator
  • Дата: 13-04-2020, 05:37
  • Комментариев: 0
CCNA: Start CCNA: The Ultimate Beginner’s Guide to Cisco Certified Network AssociateНазвание: CCNA: Start CCNA: The Ultimate Beginner’s Guide to Cisco Certified Network Associate
Автор: Michaelle Conrrede
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 101
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

If you want to jumpstart your career in IT and networking by acing the Cisco Certified Network Associate CCNA exam, then this book is for you! It gives you a full understanding of all the concepts and topics you need to earn the most in-demand networking certification today by passing the Cisco CCNA exam.
  • Добавил: TRex
  • Дата: 11-04-2020, 17:52
  • Комментариев: 0
Название: Cloud Debugging and Profiling in Microsoft Azure: Application Performance Management in the Cloud
Автор: Jeffrey Chilberto, Sjoukje Zaal, Gaurav Aroraa, Ed Price
Издательство: Apress
Год: 2020
Формат: PDF
Страниц: 393
Размер: 20,4 Mb
Язык: English

Use this collection of best practices and tips for assessing the health of a solution. This book provides detailed techniques and instructions to quickly diagnose aspects of your Azure cloud solutions.
  • Добавил: literator
  • Дата: 11-04-2020, 17:05
  • Комментариев: 0
Название: A Synergistic Framework for Hardware IP Privacy and Integrity Protection
Автор: Meng Li, David Z. Pan
Издательство: Springer
Год: 2020
Страниц: 147
Язык: английский
Формат: pdf (true), epub
Размер: 20.0 MB

This book proposes a synergistic framework to help IP vendors to protect hardware IP privacy and integrity from design, optimization, and evaluation perspectives. The proposed framework consists of five interacting components that directly target at the primary IP violations. All the five algorithms are developed based on rigorous mathematical modeling for primary IP violations and focus on different stages of IC design, which can be combined to provide a formal security guarantee.
  • Добавил: buratino
  • Дата: 10-04-2020, 07:47
  • Комментариев: 0
Название: Mastering VMware NSX for vSphere
Автор: Elver Sena Sosa
Издательство: Sybex & Wiley
Год: 2020
Формат: True PDF
Страниц: 308
Размер: 12.8 Mb
Язык: English

A clear, comprehensive guide to VMware’s latest virtualization solution
Mastering VMware NSX for vSphere is the ultimate guide to VMware’s network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform’s many features.
  • Добавил: buratino
  • Дата: 10-04-2020, 07:20
  • Комментариев: 0
Название: Hacking Connected Cars: Tactics, Techniques, and Procedures
Автор: Alissa Knight
Издательство: Wiley
Год: 2020
Формат: epub
Страниц: 272
Размер: 23.8 Mb
Язык: English

A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.
  • Добавил: literator
  • Дата: 10-04-2020, 05:43
  • Комментариев: 0
Название: Internet of Things for Sustainable Community Development: Wireless Communications, Sensing, and Systems
Автор: Abdul Salam
Издательство: Springer
Серия: Internet of Things
Год: 2020
Страниц: 347
Язык: английский
Формат: pdf (true)
Размер: 10,1 MB

The Internet of Things for Sustainable Community Development addresses the key inter-related environmental, climate change, energy, water, health, mining, agroeconomic, and cybersecurity challenges that limit the development of sustainable and resilient society. The aim of this book is to present an integrated depiction of how the Internet of Things (IoT) can stimulate the sustainable community development. The expertise across multiple domains including engineering and technology, ecosystems and natural resource management, environmental toxicology, human health, agriculture, mining, and urban underground infrastructure monitoring is introduced to examine important environmental challenges that can be solved with applications of recent advancements in Internet of Things.
  • Добавил: literator
  • Дата: 9-04-2020, 15:28
  • Комментариев: 0
Название: Cryptography and Network Security
Автор: Dr S.Bose, P. Vijayakumar
Издательство: Pearson
Год: 2017
Страниц: 545
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications.