Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 21-02-2024, 05:34
  • Комментариев: 0
Название: Federated Learning for Future Intelligent Wireless Networks
Автор: Yao Sun, Chaoqun You, Gang Feng
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 306
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Explore the concepts, algorithms, and applications underlying Federated Learning. In Federated Learning for Future Intelligent Wireless Networks, a team of distinguished researchers deliver a robust and insightful collection of resources covering the foundational concepts and algorithms powering Federated Learning, as well as explanations of how they can be used in wireless communication systems. The editors have included works that examine how communication resource provision affects Federated Learning performance, accuracy, convergence, scalability, and security and privacy. Federated Learning (FL) has been widely acknowledged as one of the most essential enablers to bring network edge intelligence into reality, as it can enable collaborative training of ML models while enhancing individual user privacy and data security. Empowered by the growing computing capabilities of UEs, FL trains ML models locally on each device where the raw data never leaves the device. Specifically, FL uses an iterative approach that requires a number of global iterations to achieve a global model accuracy. In each global iteration, UEs take a number of local iterations up to a local model accuracy. This book would explore recent advances in the theory and practice of FL, especially when it is applied to wireless communication systems.
  • Добавил: literator
  • Дата: 21-02-2024, 04:43
  • Комментариев: 0
Название: Communication Efficient Federated Learning for Wireless Networks
Автор: Mingzhe Chen, Shuguang Cui
Издательство: Springer
Серия: Wireless Networks
Год: 2024
Страниц: 189
Язык: английский
Формат: pdf (true), epub
Размер: 24.2 MB

This book provides a comprehensive study of Federated Learning (FL) over wireless networks. It consists of three main parts: (a) Fundamentals and preliminaries of FL, (b) analysis and optimization of FL over wireless networks, and © applications of wireless FL for Internet-of-Things systems. In particular, in the first part, the authors provide a detailed overview on widely-studied FL framework. In the second part of this book, the authors comprehensively discuss three key wireless techniques including wireless resource management, quantization, and over-the-air computation to support the deployment of FL over realistic wireless networks. It also presents several solutions based on optimization theory, graph theory and machine learning to optimize the performance of FL over wireless networks. In the third part of this book, the authors introduce the use of wireless FL algorithms for autonomous vehicle control and mobile edge computing optimization. Machine Learning and data-driven approaches have recently received considerable attention as key enablers for next-generation intelligent networks. Currently, most existing learning solutions for wireless networks rely on centralizing the training and inference processes by uploading data generated at edge devices to data centers.
  • Добавил: literator
  • Дата: 20-02-2024, 19:59
  • Комментариев: 0
Название: Learning Techniques for the Internet of Things
Автор: Praveen Kumar Donta, Abhishek Hazra, Lauri Loven
Издательство: Springer
Год: 2024
Страниц: 334
Язык: английский
Формат: pdf (true), epub
Размер: 31.7 MB

Learning for the Internet of Things is a combination of advanced learning techniques for the Internet of Things (IoT) encompassing a range of cutting-edge approaches, including Deep Learning with CNNs, RNNs, and transformers, Federated Learning, edge AI for local data processing, reinforcement learning for autonomous decision-making, and their applications in real time. The book is structured into thirteen chapters; each comes with its own dedicated contributions and future research directions. Chapter 1 introduces IoT and the use of Edge computing, particularly cloud computing, and mobile edge computing. This chapter also mentions the use of edge computing in various real-time applications such as healthcare, manufacturing, agriculture, and transportation. Chapter 2 motivates mathematical modeling for Federated Learning systems with respect to IoT and its applications. Further Chapter 3 extends the discussion of Federated Learning for IoT, which has emerged as a privacy-preserving distributed Machine Learning approach.
  • Добавил: umkaS
  • Дата: 19-02-2024, 19:32
  • Комментариев: 0
Название: Защита информации в компьютерных системах и сетях
Автор: В. Ф. Шаньгин
Издательство: Москва
Год: 2012
Cтраниц: 590
Формат: pdf/djvu
Размер: 47 мб
Язык: русский

Книга посвящена методам и средствам многоуровневой защиты информации в компьютерных системах и сетях. Формулируются основные понятия защиты информации, анализируются угрозы информационной безопасности в компьютерных информационных системах. Обсуждаются базовые понятия и принципы политики информационной безопасности. Анализируются международные и отечественные стандарты информационной безопасности.
  • Добавил: literator
  • Дата: 18-02-2024, 05:52
  • Комментариев: 0
Название: The Zero Trust Framework and Privileged Access Management (PAM)
Автор: Ravindra Das
Издательство: CRC Press
Год: 2024
Страниц: 126
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure. However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.
  • Добавил: umkaS
  • Дата: 17-02-2024, 15:10
  • Комментариев: 0
Название: Информационная безопасность и защита информации
Автор: В. Ф. Шаньгин
Издательство: Москва
Год: 2014
Cтраниц: 700, цвет.ил.
Формат: pdf
Размер: 21 мб
Язык: русский

Книга посвящена методам комплексного обеспечения информационной безопасности, технологиям и средствам многоуровневой защиты информации в компьютерных системах и сетях. Анализируются угрозы информационной безопасности в информационных системах и сетях. Обсуждаются принципы политики информационной безопасности. Рассмотрены стандарты информационной безопасности. Анализируются особенности и инфраструктура «облачных» вычислений.
  • Добавил: literator
  • Дата: 16-02-2024, 20:29
  • Комментариев: 0
Название: Artificial Intelligence for Cyber Defense and Smart Policing
Автор: S. Vijayalakshmi, P. Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand
Издательство: CRC Press
Год: 2024
Страниц: 187
Язык: английский
Формат: pdf (true)
Размер: 27.8 MB

The future policing ought to cover identification of new assaults, disclosure of new ill-disposed patterns, and forecast of any future vindictive patterns from accessible authentic information. Such keen information will bring about building clever advanced proof handling frameworks that will help cops investigate violations. Artificial Intelligence for Cyber Defense and Smart Policing will describe the best way of practicing Artificial Intelligence for cyber defense and smart policing. Organizations share information about cyber attacks as a crucial component of cyber threat intelligence, in order to enhance their understanding of potential threats and proactively safeguard their systems and networks. Cyber-attacks and defenses both rely heavily on Machine Learning, but neither of them achieve their goals when they rely on it completely. A malware sniffer can detect malware in encrypted traffic based on an analysis of encrypted traffic elements in network telemetry. The algorithms of Machine Learning uncover threats hidden in encryption, instead of decrypting them.
  • Добавил: literator
  • Дата: 16-02-2024, 18:34
  • Комментариев: 0
Название: CCNP and CCIE Enterprise Core ENCOR 350-401 (Official Cert Guide), 2nd Edition
Автор: Brad Edgeworth, Ramiro Garza Rios, Dave Hucaby, Jason Gooley
Издательство: Cisco Press
Год: 2024
Страниц: 1149
Язык: английский
Формат: pdf (true)
Размер: 17.8 MB

Trust the best-selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for the CCNP and CCIE ENCOR 350-401 exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide, Second Edition helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert authors Brad Edgeworth, Ramiro Garza Rios, Jason Gooley, and Dave Hucaby share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This fully updated second edition includes the latest topics and additional information covering changes to the latest ENCOR 350-401 exam.
  • Добавил: literator
  • Дата: 15-02-2024, 17:44
  • Комментариев: 0
Название: Network Security and Cryptography: A Self-Teaching Introduction, 2nd Edition
Автор: Sarhan M. Musa
Издательство: Mercury Learning & Information
Год: 2022
Страниц: 611
Язык: английский
Формат: pdf (true)
Размер: 20.3 MB

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on Artificial Intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, Big Data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.
  • Добавил: literator
  • Дата: 15-02-2024, 05:02
  • Комментариев: 0
Название: Online Security Tricks & Tips - 17th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 110
Язык: английский
Формат: pdf
Размер: 46.3 MB

"Советы и рекомендации по безопасности в Интернете" - это идеальное цифровое издание для пользователей, которые хотят поднять свои навыки на новый уровень. Хотите ли вы улучшить свои пользовательские навыки? Хотите ли вы получить инсайдерские знания? Хотите ли вы учиться непосредственно у экспертов в этой области? На страницах нового руководства для продвинутых пользователей вы узнаете все, что нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как пользоваться устройством, и поэтому получает от него максимальную отдачу. Этого мы можем достичь, передавая вам навыки, которые мы вырабатывали десятилетиями, и предоставляя вам индивидуальную поддержку.