Vtome.ru - электронная библиотека

  • Добавил: Ice Zero
  • Дата: 16-11-2018, 19:52
  • Комментариев: 0
Название: 802.11ac: A Survival Guide: Wi-Fi at Gigabit and Beyond
Автор: Matthew S. Gast
Издательство: O'Reilly Media
Год: 2013
Формат: PDF
Страниц: 154
Для сайта: vtome.ru
Размер: 10 Mb
Язык: English

The next frontier for wireless LANs is 802.11ac, a standard that increases throughput beyond one gigabit per second. This concise guide provides in-depth information to help you plan for 802.11ac, with technical details on design, network operations, deployment, and monitoring.
Author Matthew Gast—an industry expert who led the development of 802.11-2012 and security task groups at the Wi-Fi Alliance—explains how 802.11ac will not only increase the speed of your network, but its capacity as well. Whether you need to serve more clients with your current level of throughput, or serve your existing client load with higher throughput, 802.11ac is the solution. This book gets you started.
  • Добавил: Ice Zero
  • Дата: 16-11-2018, 18:30
  • Комментариев: 0
Название: 802.11 Wireless Networks: The Definitive Guide, Second Edition
Автор: Matthew S. Gast
Издательство: O'Reilly Media
Год: 2005
Формат: ebup
Страниц: 672
Для сайта: vtome.ru
Размер: 7 Mb
Язык: English

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network.
  • Добавил: Ice Zero
  • Дата: 16-11-2018, 16:24
  • Комментариев: 0
Название: 4G: Deployment Strategies and Operational Implications: Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business
Автор: Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
Издательство: Apress
Год: 2014
Формат: PDF
Страниц: 188
Для сайта: vtome.ru
Размер: 3 Mb
Язык: English

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development.
  • Добавил: literator
  • Дата: 16-11-2018, 15:49
  • Комментариев: 0
Название: Metasploit Bootcamp
Автор: Mike Schiller
Издательство: Amazon Digital Services LLC
ASIN: B07F9LG66Q
Год: 2018
Страниц: 482
Язык: английский
Формат: epub
Размер: 14.17 MB

The book begins with a hands-on Day 1 section, protecting basic principles of the Metasploit structure and planning visitors for a self-completion exercise at the end of every section. The Day 2 section delves deep into the use of checking and fingerprinting solutions with Metasploit while helping visitors to alter current segments according to their needs. Following on from the first section, Day 3 will concentrate on taking advantage of various types of service and client-side exploitation while Day 4 will concentrate on post-exploitation, and writing quick programs that helps with collecting the required information from the utilized systems. The Day 5 section provides your audience with the techniques involved in checking and taking advantage of various solutions, such as data source, cellular phones, and VOIP. The Day 6 section makes your audience to speed up and incorporate Metasploit with major industry resources for transmission examining.
  • Добавил: yuriy44
  • Дата: 16-11-2018, 11:03
  • Комментариев: 0
Цифровая грамотность. Секреты успешного поиска и обработки информацииНазвание: Цифровая грамотность. Секреты успешного поиска и обработки информации
Автор: Владимир Лавров
Издательство: Издательские решения
Год: 2018
Страниц: 50, 21 цв. ил.
Язык: Русский
Формат: rtf, pdf
Размер: 10,3 Mb

В данной книге содержатся базовые сведения о том, что такое информация, какой она бывает, как её грамотно искать, просеивать, проверять и хранить. С пользой для своего интеллекта и кошелька, а не во вред им. Для тех, кто желает научиться отделять зёрна от плевел и всегда быть на высоте в плане понимания того, что происходит вокруг.
  • Добавил: daromir
  • Дата: 14-11-2018, 21:02
  • Комментариев: 0
Название: Implementing Microsoft Azure Privileged Identity Management (Видеокурс)
Автор: Ammar Hasayen
Издательство: Pluralsight
Год: 2018
Видео: H264 MP4 AVC, 1280x720
Аудио: AAC 44100 KHz 2 Ch
Продолжительность: 01:30:00
Размер: 196 mb
Язык: English

Privileged identity management is emerging as one of the hottest topics in cybersecurity. In this course, you’ll learn how to use Microsoft PIM to manage, control, and monitor access within Azure AD, Azure resources, and Microsoft Online Services.
  • Добавил: Ice Zero
  • Дата: 14-11-2018, 18:23
  • Комментариев: 0
Название: Energy Efficient Servers: Blueprints for Data Center Optimization
Автор: Corey Gough
Издательство: Apress
Год: 2015
Формат: PDF
Страниц: 360
Для сайта: vtome.ru
Размер: 5 Mb
Язык: English

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers.
  • Добавил: literator
  • Дата: 14-11-2018, 18:13
  • Комментариев: 0
Название: Security and Data Reliability in Cooperative Wireless Networks
Автор: Emad S. Hassan
Издательство: CRC Press
ISBN: 1138092797
Год: 2018
Страниц: 530
Язык: английский
Формат: pdf (true)
Размер: 15.9 MB

Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.
  • Добавил: alex66
  • Дата: 14-11-2018, 16:42
  • Комментариев: 0

Название: Cellular Internet of Things: Technologies, Standards, and Performance
Автор: Olof Liberg, Marten Sundberg, Eric Wang, Johan Bergman, Joachim Sachs
Издательство: Academic Press
Год: 2018
Формат: PDF
Страниц: 390
Размер: 21 МБ
Язык: English

Cellular Internet of Things: Technologies, Standards and Performance gives insight into the recent work performed by the 3rd Generation Partnership Project (3GPP) to develop systems for the Cellular Internet of Things. It presents both the design of the new Narrowband Internet of Things (NB-IoT) technology and how GSM and LTE have evolved to provide Cellular Internet of Things services. The criteria used for the design and objectives of the standardization work are explained, and the technical details and performance of each technology is presented.
  • Добавил: Ice Zero
  • Дата: 14-11-2018, 13:57
  • Комментариев: 0
Название: End-to-End Network Security: Defense-in-Depth
Автор: Omar Santos
Издательство: Cisco Press
Год: 2007
Формат: PDF
Страниц: 480
Для сайта: vtome.ru
Размер: 11 Mb
Язык: English

Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity—all blurring the boundaries between the network and perimeter.

End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds.