Vtome.ru - электронная библиотека

  • Добавил: umkaS
  • Дата: 31-12-2019, 08:49
  • Комментариев: 0
Название: Великий переход: что готовит революция облачных технологий
Автор: Карр Н.
Издательство: М.: Манн, Иванов и Фербер
Год: 2014
Cтраниц: 247
Формат: pdf
Размер: 18 мб
Язык: русский

«Прощайте, мистер Гейтс» – по мнению всемирно известного писателя и публичного деятеля Николаса Карра, сегодня IT-системы уходят в прошлое: конкурентная значимость IT неминуемо снижается, программное обеспечение, как когда-то электричество, становится… коммунальной услугой! И как столетие назад создание мощных электростанций обозначило новую эпоху в жизни человечества, так и сегодня мы переживаем подобную технологическую революцию, кардинально меняющую нашу жизнь.
  • Добавил: TRex
  • Дата: 29-12-2019, 09:49
  • Комментариев: 0

Название: Internet of Things for Industry 4.0: Design, Challenges and Solutions
Автор: G. R. Kanagachidambaresan, R. Anand, E. Balasubramanian, V. Mahima
Издательство: Springer
Год: 2020
Формат: PDF
Страниц: 258
Размер: 15,4 Mb
Язык: English

This book covers challenges and solutions in establishing Industry 4.0 standards for Internet of Things. It proposes a clear view about the role of Internet of Things in establishing standards. The sensor design for industrial problem, challenges faced, and solutions are all addressed. The concept of digital twin and complexity in data analytics for predictive maintenance and fault prediction is also covered. The book is aimed at existing problems faced by the industry at present, with the goal of cost-efficiency and unmanned automation. It also concentrates on predictive maintenance and predictive failures. In addition, it includes design challenges and a survey of literature.
  • Добавил: buratino
  • Дата: 29-12-2019, 02:57
  • Комментариев: 0
Название: Internet of Things (IoT) : Systems and Applications
Автор: Jamil Y. Khan (Editor), Mehmet R. Yuce (Editor)
Издательство: Jenny Stanford Publishing
Год: 2019
Формат: True PDF
Страниц: 365
Размер: 17.9 Mb
Язык: English

The Internet of Things (IoT) is one of the core technologies of current and future information and communications technology (ICT) sectors. IoT technologies will be deployed in numerous industries, including health, transport, smart cities, utility sectors, environment, security, and many other areas. In a manner suitable to a broad range of readers, this book introduces various key IoT technologies focusing on algorithms, process algebra, network architecture, energy harvesting, wireless communications, and network security.
  • Добавил: literator
  • Дата: 28-12-2019, 18:17
  • Комментариев: 0
Название: Learn Hacking in 1 Day: Complete Hacking Guide with Examples
Автор: Krishna Rungta, Jim Forris
Издательство: Amazon Digital Services LLC
Год: 2016
Страниц: 150
Язык: английский
Формат: pdf, rtf
Размер: 10.1 MB

If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.
  • Добавил: buratino
  • Дата: 27-12-2019, 19:58
  • Комментариев: 0
Название: Hacking Internet of Things: Bluetooth Low Energy
Автор: Shashank Pandey
Издательство: Cytheon Ltd.
Год: 2018
Формат: pdf(conv.)
Страниц: 176
Размер: 2 Mb
Язык: English

According to IHS Markit, the number of IoT (Internet of Things) devices will grow to 30.7 billion in 2020, and to 75.4 billion by 2025! IDC Forecasts Worldwide spending on the IoT to reach $772 Billion in 2018! Whether it is connected automobiles, fitness watches, smart coffee machines, smart locks or even medical equipment such as insulin pumps, IoT is becoming all-pervasive. In the future, there will hardly be any aspect of our lives that IoT will not touch one way or the other.
  • Добавил: buratino
  • Дата: 27-12-2019, 19:44
  • Комментариев: 0
Название: Kali Linux: 2 books in 1: The Complete Beginner's Guide About Kali Linux For Beginners & Hacking With Kali Linux, Full of Practical Examples Of Wireless Networking & Penetration Testing
Автор: Learn Computer Hacking In Deep
Издательство: Learn Computer Hacking In Deep
Год: 2019
Формат: pdf(conv.)
Страниц: 223
Размер: 1 Mb
Язык: English

This unique book bundle focuses on the hacker’s most important tools: Kali Linux (the ultimate operating system for hackers) and some of the more beginner-friendly tools for scanning networks and websites.
  • Добавил: literator
  • Дата: 27-12-2019, 19:31
  • Комментариев: 0
Название: Hacking with Kali Linux: A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking
Автор: Mr. Ramon Nastase
Издательство: Independently published
Год: 2018
Страниц: 177
Язык: английский
Формат: pdf, rtf
Размер: 11.7 MB

Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do in order to protect yourself from all kind of hacking techniques.
  • Добавил: TRex
  • Дата: 27-12-2019, 11:22
  • Комментариев: 0

Название: CISSP: A Comprehensive Beginner’s Guide to learn and understand the Realms of CISSP from A-Z
Автор: Daniel Jones
Издательство: Independently published
Год: 2019
Формат: EPUB
Страниц: 197
Размер: 12,9 Mb
Язык: English

The Certified Information System Security Practitioner (CISSP) is the most dominant, most mature and vendor-neutral information security certification. The "CISSP: A Comprehensive Beginners Guide to Learn and Understand the Realms of CISSP from A-Z" is aligned to provide the reader a simplified, easy-to-understand, and concise learning pack to get started and prepared for the examination. This book covers A-Z on CISSP, in other words, all the 8 domains and nothing less. The content included in the book provides the latest information according to the most recent CISSP exam curriculum.
  • Добавил: buratino
  • Дата: 26-12-2019, 20:46
  • Комментариев: 0
Название: Big Data-Enabled Internet of Things (Computing and Networks)
Автор: Muhammad Usman Shahid Khan (Editor), Samee U. Khan (Editor), Albert Y. Zomaya (Editor)
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 488
Размер: 12.9 Mb
Язык: English

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.
  • Добавил: buratino
  • Дата: 26-12-2019, 20:39
  • Комментариев: 0
Название: Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques (Materials, Circuits and Devices)
Автор: Anirban Sengupta
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 344
Размер: 13.8 Mb
Язык: English

This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.
The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security.