Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 8-02-2020, 07:23
  • Комментариев: 0
Название: Blockchain Technology for Smart Cities
Автор: Dhananjay Singh, Navin Singh Rajput
Издательство: Springer
Серия: Blockchain Technologies
Год: 2020
Страниц: 183
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book provides a comprehensive overview of various aspects of the development of smart cities from a secure, trusted, and reliable data transmission perspective. It presents theoretical concepts and empirical studies, as well as examples of smart city programs and their capacity to create value for citizens. The contributions offer a panorama of the most important aspects of smart city evolution and implementation within various frameworks, such as healthcare, education, and transportation. Comparing current advanced applications and best practices, the book subsequently explores how smart environments and programs could help improve the quality of life in urban spaces and promote cultural and economic development.
  • Добавил: TRex
  • Дата: 8-02-2020, 06:50
  • Комментариев: 0
Название: 5G Verticals: Customizing Applications, Technologies and Deployment Techniques
Автор: Rath Vannithamby, Anthony Soong
Издательство: Wiley
Год: 2020
Формат: PDF
Страниц: 320
Размер: 11 Mb
Язык: English

A comprehensive text to an understanding the next generation mobile broadband and wireless Internet of Things (IoT) technologies
5G Verticals brings together in one comprehensive volume a group of visionaries and technical experts from academia and industry. The expert authors discuss the applications and technologies that comprise 5G verticals. The earlier network generations (2G to 4G) were designed as on-size-fits-all, general-purpose connectivity platforms with limited differentiation capabilities.
  • Добавил: buratino
  • Дата: 7-02-2020, 00:20
  • Комментариев: 0
Название: Design and Analysis of Security Protocol for Communication
Автор: Dinesh Goyal, S Balamurigan, Sheng-Lung Peng, O. P. Verma
Издательство: Wiley-Scrivener
Год: 2020
Формат: true pdf/rtf
Страниц: 368
Размер: 10 Mb
Язык: English

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
  • Добавил: buratino
  • Дата: 6-02-2020, 20:56
  • Комментариев: 0
Название: A First Course in Network Science
Автор: Filippo Menczer, Santo Fortunato, Clayton A. Davis
Издательство: Cambridge University Press
Год: 2020
Формат: azw3/pdf(conv.),HQ PDF
Страниц: 300
Размер: 11.8 Mb, 66 Mb
Язык: English

Networks are everywhere: networks of friends, transportation networks and the Web. Neurons in our brains and proteins within our bodies form networks that determine our intelligence and survival. This modern, accessible textbook introduces the basics of network science for a wide range of job sectors from management to marketing, from biology to engineering, and from neuroscience to the social sciences. Students will develop important, practical skills and learn to write code for using networks in their areas of interest - even as they are just learning to program with Python.
  • Добавил: TRex
  • Дата: 6-02-2020, 16:00
  • Комментариев: 0
Название: Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services
Автор: Silvano Gai
Издательство: Addison-Wesley Professional
Год: 2020
Формат: EPUB
Страниц: 272
Размер: 10 Mb
Язык: English

Prepare for the future of cloud infrastructure: Distributed Services Platforms
By moving service modules closer to applications, Distributed Services (DS) Platforms will future-proof cloud architectures–improving performance, responsiveness, observability, and troubleshooting. Network pioneer Silvano Gai demonstrates DS Platforms’ remarkable capabilities and guides you through implementing them in diverse hardware.
  • Добавил: literator
  • Дата: 5-02-2020, 19:01
  • Комментариев: 0
Название: Intrusion Detection: A Data Mining Approach
Автор: Nandita Sengupta, Jaya Sil
Издательство: Springer
Год: 2020
Страниц: 151
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents state-of-the-art research on intrusion detection using reinforcement learning, fuzzy and rough set theories, and genetic algorithm. Reinforcement learning is employed to incrementally learn the computer network behavior, while rough and fuzzy sets are utilized to handle the uncertainty involved in the detection of traffic anomaly to secure data resources from possible attack. Genetic algorithms make it possible to optimally select the network traffic parameters to reduce the risk of network intrusion. The book is unique in terms of its content, organization, and writing style.
  • Добавил: literator
  • Дата: 5-02-2020, 18:30
  • Комментариев: 0
Название: Data Science in Cybersecurity and Cyberthreat Intelligence
Автор: Leslie F. Sikos, Kim-Kwang Raymond Choo
Издательство: Springer
Год: 2020
Страниц: 140
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book presents a collection of state-of-the-art approaches to utilizing machine learning, formal knowledge bases and rule sets, and semantic reasoning to detect attacks on communication networks, including IoT infrastructures, to automate malicious code detection, to efficiently predict cyberattacks in enterprises, to identify malicious URLs and DGA-generated domain names, and to improve the security of mHealth wearables. This book details how analyzing the likelihood of vulnerability exploitation using machine learning classifiers can offer an alternative to traditional penetration testing solutions. In addition, the book describes a range of techniques that support data aggregation and data fusion to automate data-driven analytics in cyberthreat intelligence
  • Добавил: TRex
  • Дата: 5-02-2020, 04:31
  • Комментариев: 0
Название: Adaptive Autonomous Secure Cyber Systems
Автор: Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang , Michael Wellman
Издательство: Springer
Год: 2020
Формат: PDF
Страниц: 291
Размер: 12 Mb
Язык: English

This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:
Game and control theory-based moving target defenses (MTDs) and adaptive cyber defenses (ACDs) for fully autonomous cyber operations; The extent to which autonomous cyber systems can be designed and operated in a framework that is significantly different from the human-based systems we now operate;
  • Добавил: harun54
  • Дата: 4-02-2020, 19:26
  • Комментариев: 0
Название: Mobility Internet of Things 2018: Mobility IoT
Автор: Dagmar Cagáňová and Natália Horňáková
Издательство: Springer
Год: 2020
Формат: PDF
Размер: 11 Мб
Язык: английский / English

The scientific monograph Mobility IoT deals with innovative technologies influencing industry and connectivity sectors in the future industrial, urban, social and sustainable development. The mobility and Internet of Things are worldwide phenomena almost in everyday life. It is a challenge in many industries, not only in car manufacturing sector but additionally in e-mobility, smart cities, smart factories (Industry 4.0), smart logistics, social mobility, technological innovations, sustainability, multicultural development, Internet of Things sectors, etc., belonging to the topic of SMART Mobility IoT issue.
  • Добавил: buratino
  • Дата: 3-02-2020, 13:09
  • Комментариев: 0
Название: Applied Incident Response
Автор: Steve Anson
Издательство: Wiley
Год: 2020
Формат: True PDF
Страниц: 464
Размер: 17.5 Mb
Язык: English

Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network