Vtome.ru - электронная библиотека

  • Добавил: buratino
  • Дата: 25-09-2019, 12:24
  • Комментариев: 0
Название: Optical Wireless Communications: System and Channel Modelling with MATLAB®, 2nd Edition
Автор: Z. Ghassemlooy, W. Popoola, S. Rajbhandari
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 540
Размер: 35.7 Mb
Язык: English

The 2nd Edition of Optical Wireless Communications: System and Channel Modelling with MATLAB® with additional new materials, is a self-contained volume that provides a concise and comprehensive coverage of the theory and technology of optical wireless communication systems (OWC). The delivery method makes the book appropriate for students studying at undergraduate and graduate levels as well as researchers and professional engineers working in the field of OWC.
  • Добавил: buratino
  • Дата: 25-09-2019, 11:43
  • Комментариев: 0
Название: Emerging Security Algorithms and Techniques
Автор: Khaleel Ahmad (Editor), M. N. Doja (Editor), Nur Izura Udzir (Editor), Manu Pratap Singh (Editor)
Издательство: Chapman and Hall/CRC
Год: 2019
Формат: True PDF
Страниц: 330
Размер: 10.5 Mb
Язык: English

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.
  • Добавил: buratino
  • Дата: 25-09-2019, 10:40
  • Комментариев: 0
Название: Protecting Information Assets and IT Infrastructure in the Cloud
Автор: Ravi Das, de Guise, Preston
Издательство: Auerbach Publications
Год: 2019
Формат: True PDF
Страниц: 318
Размер: 4.8 Mb
Язык: English

Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
  • Добавил: buratino
  • Дата: 25-09-2019, 10:06
  • Комментариев: 0
Название: Zen of Cloud: Learning Cloud Computing by Examples, 2nd Edition
Автор: Haishi Bai
Издательство: CRC Press
Год: 2019
Формат: True PDF
Страниц: 316
Размер: 10.2 Mb
Язык: English

This book provides a comprehensive review of cloud philosophy, design principals, development trends as well as practical patterns to guide readers to understand, design and implement successful cloud-based solutions. This book provides both "hows" and "whys." It peers behind the buzz words such as machine learning, containers, and blockchains to help readers understand how to put those technologies into practical use. This unique book covers a broad spectrum of technologies of cloud computing.
  • Добавил: literator
  • Дата: 24-09-2019, 13:08
  • Комментариев: 0
Название: AWS Certified SysOps Administrator Associate (SOA-C01) Cert Guide (Rough Cuts)
Автор: Anthony Sequeira
Издательство: Pearson IT Certification
Год: 2019
Страниц: 127
Язык: английский
Формат: pdf
Размер: 10.1 MB

The AWS Certified Sysops Administrator Associate certification demonstrates your expertise in deploying, managing, securing, optimizing, and automating solutions on the world's leading cloud platform, Amazon Web Services. AWS Certified Sysops Administrator Associate Cert Guide is the comprehensive self-study resource for Amazon's valuable new exam.
  • Добавил: SCART56
  • Дата: 22-09-2019, 04:50
  • Комментариев: 0

Название: Искусство быть невидимым. Как сохранить приватность в эпоху Big Data
Автор(ы): Кевин Митник
Издательство: Эксмо
Год: 2019
Страниц: 464
Формат: PDF
Размер: 11 Мб
Язык: русский

Думаете, ваши данные в Интернете хорошо защищены? Так глубоко вы никогда не заблуждались! Кевин Митник — самый разыскиваемый хакер планеты в прошлом, а ныне один из ведущих специалистов по кибербезопасности — знает, насколько опасна неосведомленность в вопросах защиты данных в Сети.
  • Добавил: literator
  • Дата: 21-09-2019, 14:43
  • Комментариев: 0
Название: Ethical Hacking: A Comprehensive Beginner’s Guide to Learn and Master Ethical Hacking
Автор: Hein Smith, Hilary Morrison
Издательство: Amazon Digital Services LLC
Год: 2018
Страниц: 63
Язык: английский
Формат: epub (true), azw3, pdf (conv)
Размер: 10.1 MB

If you wish to enter the world of ethical hacking, this book is for you. Ethical Hacking: A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking will walk you through the processes, skills, and tools you need to succeed. If you want to master ethical hacking, then this is the book you have been looking for.
  • Добавил: buratino
  • Дата: 21-09-2019, 14:00
  • Комментариев: 0
Название: Cybercrime Investigators Handbook
Автор: Graeme Edwards
Издательство: Wiley
Год: 2019
Формат: True PDF
Страниц: 320
Размер: 2 Mb
Язык: English

The investigator’s practical guide for cybercrime evidence identification and collection
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. Many attacks are discovered only after the data has been exploited or sold on the criminal markets. Cyber attacks damage both the finances and reputations of businesses and cause damage to the ultimate victims of the crime. From the perspective of the criminal, the current state of inconsistent security policies and lax investigative procedures is a profitable and low-risk opportunity for cyber attacks. They can cause immense harm to individuals or businesses online and make large sums of money—safe in the knowledge that the victim will rarely report the matter to the police. For those tasked with probing such crimes in the field, information on investigative methodology is scarce. The Cybercrime Investigators Handbook is an innovative guide that approaches cybercrime investigation from the field-practitioner’s perspective.
  • Добавил: Igor1977
  • Дата: 19-09-2019, 17:22
  • Комментариев: 0

Название: Организация потоков в компьютерных сетях
Автор: Джанмурзаев А.А.
Издательство: М.: Парнас
Год: 2018
Формат: pdf
Страниц: 102
Размер: 13 mb
Язык: Русский

Сегодня IT-технологии входят в новое измерение, где на первый план выходит «большая» аналитика, что в свою очередь не может не сказаться на структурных подходах организации потоков в компьютерных сетях. Необходимы новые методы работы с потоками в сетях, которые позволят по-новому взглянуть на современные информационные ресурсы. Такие методы предлагаются в первой главе монографии, которые при более детальном анализе могут раскрыть новые возможности информационных технологий.
  • Добавил: buratino
  • Дата: 19-09-2019, 17:07
  • Комментариев: 0
Название: Computing and Communication Systems in Urban Development: A Detailed Perspective (Urban Computing)
Автор: Anandakumar Haldorai, Arulmurugan Ramu, Suriya Murugan
Издательство: Springer
Год: 2019
Формат: tru epdf/epub
Страниц: 233
Размер: 23.7 Mb
Язык: English

This book presents the most recent challenges and developments in sustainable computing systems with the objective of promoting awareness and best practices for the real world. It aims to present new directions for further research and technology improvements in this important area.