Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 31-05-2024, 21:26
  • Комментариев: 0
Название: Ultimate AWS Certified Cloud Practitioner's Exam Guide: Master the Concepts, Services, Security, and Architectural Best Practices of AWS, EC2, S3, and RDS, and Crack AWS CLF-C02 Certification
Автор: Gaurav H Kankaria
Издательство: Orange Education Pvt Ltd, AVA
Год: 2024
Страниц: 727
Язык: английский
Формат: pdf, epub
Размер: 13.1 MB

Embark on a journey into AWS cloud computing certification with the "Ultimate AWS Certified Cloud Practitioner’s Exam Guide". This book is your ultimate guide to mastering AWS CLF-C02 certification by simplifying cloud computing basics and giving you a strong grasp of its core principles and benefits. The book simplifies AWS services like EC2, S3, and RDS, with clear explanations and real-world examples. You'll master these services and learn industry best practices for cost optimization, security, and compliance, ensuring your deployments are efficient and secure. Additionally, it empowers you to navigate the ever-changing world of cloud computing with confidence. With exam readiness at the forefront, the book provides a meticulous preparation plan, complete with practice questions, exam strategies, and hands-on exercises to fortify your knowledge and boost your confidence. Whether you're gearing up for the AWS Cloud Practitioner exam or seeking to enhance your professional skill set, the practical approach ensures you're primed for success.
  • Добавил: literator
  • Дата: 31-05-2024, 04:22
  • Комментариев: 0
Название: Exam Ref AZ-104 Microsoft Azure Administrator, 2nd Edition
Автор: Charles Pluta
Издательство: Pearson Education, Inc.
Год: 2025
Страниц: 385
Язык: английский
Формат: pdf (true)
Размер: 21.0 MB

Prepare for Microsoft Exam AZ-104 and demonstrate your real-world mastery and knowledge of Microsoft Azure administration. Designed for working Azure administrators, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Solutions Associate level. Some books take a very low-level approach, teaching you how to use individual classes and accomplish fine-grained tasks. Like the Microsoft AZ-104 certification exam, this book takes a high-level approach, building on your foundational knowledge of Microsoft Azure and common administrative actions to take in an Azure environment. We provide walk-throughs using the Azure portal; however, the exam might also include questions that use PowerShell or the Azure Command Line Interface (CLI) to perform the same task. You might encounter questions on the exam focused on these additional areas that are not specifically included in this Exam Ref. Passing this exam fulfills your requirements for the Microsoft Certified: Azure Administrator Associate credential, demonstrating your readiness to implement, manage, and monitor identity, governance, storage, compute, and virtual networks in a cloud environment, and to provision, size, monitor, and adjust resources as appropriate.
  • Добавил: literator
  • Дата: 30-05-2024, 17:06
  • Комментариев: 0
Название: Network Slicing for Future Wireless Communication: Theory and Application
Автор: Wanqing Guan, Haijun Zhang
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 122
Язык: английский
Формат: pdf (true), epub
Размер: 17.3 MB

This book comprehensively discusses the development, application and challenges of network slicing technology in wireless communications. Starting with the basic concept and enabling technologies of network slicing, this book introduces how to integrate AI (Artificial Intelligence) technology into the end-to-end deployment, resource allocation and performance enhancement for multi-tenant slicing. An in-depth exploration of managing multi-domain slices deployed in the federated infrastructure networks is presented, including on-demand cooperation among multiple infrastructure networks, distinct slice deployment, hierarchical slice orchestration and fast slice adaption. As a guide to leveraging AI to enhance traffic performance of multi-tenant slicing and customize resource slicing for industrial scenarios, this book provides insights, modeling, applications and research issues. A holistic perspective on prominent role of network slicing in managing wireless network resources is provided as well. A network slice is defined by International Telecommunication Union (ITU) as a logically isolated network partition consisting of multiple VNFs, which is isolated and equipped with a programmable control plane and a data plane. The VNFs that constitute the network slice may vary greatly according to specific service requirements. The service types associated with the network slice determine the resources allocated to this network slice and the corresponding processing flow. The realization of network slicing is inseparable from software defined network (SDN) architecture and network function virtualization (NFV) technology.
  • Добавил: literator
  • Дата: 30-05-2024, 03:38
  • Комментариев: 0
Название: Recent Advances in Computational Intelligence and Cyber Security
Автор: Ashok Kumar Singh, Zeeshan Ali Siddiqui, Siddharth Singh, Amit Kumar Singh
Издательство: CRC Press
Год: 2024
Страниц: 400
Язык: английский
Формат: pdf (true)
Размер: 32.8 MB

In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress. The relentless pace of technological evolution and the ceaseless emergence of cyber threats demand not only adaptation but also an exploration of the forefronts of innovation and defence. Recent Advances in Computational Intelligence and Cyber security is a testament to the exhilarating journey undertaken by researchers, practitioners, and visionaries in these pivotal fields. Within the confines of this book, we embark on a captivating exploration of the cutting-edge developments that define the current state of computational intelligence and the intricate dance with the ever-evolving landscape of cyber security. Creating models and methods that will enable computer systems to replicate human intellect is the aim of the Computer Science field of Artificial Intelligence (AI). That’s why cybersecurity is getting more and more crucial. Preventing data breaches, financial losses, and privacy violations requires effective network security and information security. This clarifes the growing signifcance of cybersecurity.
  • Добавил: literator
  • Дата: 29-05-2024, 14:56
  • Комментариев: 0
Название: Improving Security, Privacy, and Trust in Cloud Computing
Автор: Pawan Kumar Goel, Hari Mohan Pandey, Amit Singhal, Sanyam Agarwal
Издательство: IGI Global
Год: 2024
Страниц: 319
Язык: английский
Формат: pdf (true), epub
Размер: 26.0 MB

Cloud computing adoption has revolutionized how businesses and individuals harness the power of technology. The cloud's scalability, accessibility, and cost-efficiency have propelled it to the forefront of modern computing paradigms. However, as organizations increasingly rely on cloud services to store, process, and manage their data and applications, an intricate web of challenges has emerged, casting shadows over the very foundations of cloud computing. This book's exploration into security, privacy, and trust in cloud computing takes a holistic approach. It recognizes that a resilient cloud strategy is built upon these three fundamental pillars, each reinforcing the other. Security forms the fortress that guards against external threats and internal vulnerabilities. Privacy ensures that individuals' personal information is respected and protected, even in the cloud. Trust is the bond that unites cloud service providers and consumers, fostering a relationship grounded in transparency, reliability, and accountability. Throughout the chapters of this book, readers will embark on a multidimensional expedition. This book will take them through real-world case studies of successful cloud security implementations and unfortunate breaches that underscore the urgency of robust defenses. From data encryption techniques to incident response protocols, this book offers practical insights and actionable strategies that can be implemented by IT professionals, security experts, and decision-makers alike.
  • Добавил: tatanavip
  • Дата: 29-05-2024, 12:18
  • Комментариев: 0

Название: Этичный хакер
Автор: Никита Шахулов
Издательство: Издательские решения
Год: 2022
Формат: pdf, fb2, rtf
Размер: 10 Мб
Качество: Хорошее
Язык: Русский

Этичный хакер (пентестер) — это специалист в сфере кибербезопасности, который профессионально занимается выискиванием «дыр» в коде и помогает устранить утечки данных. Название специальности происходит от англоязычного термина pentest (penetration test), то есть «тест на проникновение». Имеется в виду проникновение в систему через скрытые уязвимости.
  • Добавил: literator
  • Дата: 27-05-2024, 04:18
  • Комментариев: 0
Название: Performance Analysis of Cooperative Networking with Multi Channels
Автор: Praveen Kumar Devulapalli, Sushanth Babu Maganti, Pardhasaradhi Pokkunuri
Издательство: CRC Press
Год: 2025
Страниц: 123
Язык: английский
Формат: pdf (true)
Размер: 11.7 MB

This book covers wireless cooperative communication and advanced communication techniques for research scholars and post-graduate students. First, in Chapter 1, we discuss cooperative communication by highlighting wireless channel impairments and addressing cooperative architecture gains. We offer a systematic guide to understanding fundamental principles and implementing valuable taxonomies. The literature review supports the need for a thorough investigation into existing cooperative protocols, and the proposal for a design for developing a cooperative communication model is presented in Chapter 2. Furthermore, the central hypothesis presented in the literature review indicates that meaningful results may be obtained by efficiently selecting relays with correct channel estimation. The rest of this book, which is characterized by its focus on how and when to select relays, will seek to address the lack of studies on successful relay selection in the form of a cooperative communication model under such channel conditions. In Chapter 3, two sophisticated routing algorithms based on MACC and distance parameters are implemented to maximize the benefits of CR in a multi-​radio-​multi-​channel large-​scale wireless network. The combined throughput and transmission time of the proposed algorithms are similar to the IACR algorithm.
  • Добавил: SCART56
  • Дата: 26-05-2024, 18:25
  • Комментариев: 0

Название: Логические нейронные сети
Автор: Барский А.Б.
Издательство: М.: НОУ "Интуит"
Год: 2016
Страниц: 492
Формат: PDF
Размер: 58 Мб
Язык: русский


На основе положений математической логики событий исследуется возможность построения логических нейронных сетей, выполняющих операции вывода в составе систем искусственного интеллекта, имитирующих механизмы работы мозга. Такие операции лежат в основе систем распознавания, управления и принятия решений.
  • Добавил: literator
  • Дата: 26-05-2024, 04:49
  • Комментариев: 0
Название: Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI
Автор: Toni Janevski
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 345
Язык: английский
Формат: pdf (true), epub
Размер: 26.7 MB

All-in-one resource on the development of Internet and telecoms worldwide, based on the technological frameworks as defined by the ITU. Future Fixed and Mobile Broadband Internet, Clouds, and IoT/AI is a highly comprehensive resource that provides full coverage of existing and future fixed and mobile broadband networks, internet, and telecom and OTT services. This book explains how to perform technical, business, and regulatory analysis for future 5G-Advanced, 6G, WiFi, and optical access. This book also covers optical transport, submarine cable, future satellite broadband, cloud computing, massive and critical IoT and frameworks and use of AI / ML in telecommunications. The main “form” of AI at the present time is Machine Learning (ML). ITU has defined architecture for ML in future networks including 5G/IMT‐2020 and beyond. What is ML? According to the ITU’s definition: Machine Learning refers to processes that enable computational systems to understand data and gain knowledge from it without necessarily being explicitly programmed. However, ML is based on mathematics and it is commonly implemented via software tools which are programmed (either by humans or by software tools developed by humans).
  • Добавил: literator
  • Дата: 25-05-2024, 13:59
  • Комментариев: 0
Название: Home Networking Tricks and Tips - 4th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Язык: английский
Формат: pdf
Размер: 37.8 MB

"Советы и рекомендации по созданию домашних сетей" - это совершенная цифровая публикация для пользователей, которые хотят поднять свои знания и навыки на новый уровень. Хотите улучшить навыки пользователя или получить новые знания? Вы хотите учиться непосредственно у экспертов в этой области? Хотите узнать больше о технологиях, используемых профессионалами? На этих страницах для продвинутых пользователей вы узнаете все, что вам нужно знать, чтобы стать более уверенным, способным и опытным пользователем. Пользователи, которые могут в полной мере использовать свои устройства и, следовательно, в полной мере использовать их из всего "умного дома". Мы поддержим и обучим вас навыкам, которыми вы овладевали десятилетиями, с учетом ваших пожеланий.