Vtome.ru - электронная библиотека

  • Добавил: harun54
  • Дата: 10-12-2017, 14:39
  • Комментариев: 0
Название: Film and Video Production in the Cloud: Concepts, Workflows, and Best Practices
Автор: Jack James
Издательство: Focal Press
Год: 2016
Формат: AZW3, EPUB, PDF
Размер: 5 Мб
Язык: английский / English

With cloud applications and services now widely available, film and video professionals have all the tools they need to work together on centralized platforms and effectively collaborate across separate desktop, web, and mobile devices. In Film and Video Production in the Cloud, veteran video production consultant Jack James provides a practical guide to cloud processes, concepts, and workflows as they relate to the most widely used cloud applications in the industry.
  • Добавил: literator
  • Дата: 9-12-2017, 13:21
  • Комментариев: 0
Network Function Virtualization: Concepts and Applicability in 5G NetworksНазвание: Network Function Virtualization: Concepts and Applicability in 5G Networks
Автор: Ying Zhang
Издательство: Wiley-IEEE Press
ISBN: 1119390605
Год: 2017
Страниц: 192
Язык: английский
Формат: pdf, djvu
Размер: 10.56 MB

A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality
This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network.
  • Добавил: bhaer
  • Дата: 9-12-2017, 12:36
  • Комментариев: 0

Название: Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Автор: Morey J. Haber,? Brad Hibbert
Издательство: Apress
Год: 2018
Страниц: 247
Формат: PDF, EPUB
Размер: 10 Mb
Язык: English

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.
  • Добавил: SCART56
  • Дата: 8-12-2017, 22:37
  • Комментариев: 0

Название: Основы теории информации
Автор: Хохлов Г.И.
Издательство: Академия
Год: 2008
Страниц: 172
ISBN: 978-5-7695-4576-4
Формат: PDF
Размер: 10 Мб
Язык: русский

Дано современное определение информации, рассмотрены формы ее существования, виды преобразований. Изложены основные положения теории вероятностей К.Шеннона. Рассмотрена комбинаторная теория информации автора книги с учетом двойственности материального мира.
  • Добавил: harun54
  • Дата: 8-12-2017, 15:15
  • Комментариев: 0
Название: Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Автор: Daniel V. Hoffman
Издательство: Wiley
Год: 2008
Формат: EPUB, PDF
Размер: 12 Мб
Язык: английский / English

This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution.
  • Добавил: bhaer
  • Дата: 8-12-2017, 10:04
  • Комментариев: 0

Название: DBA Transformations: Building Your Career in the Transition to On-Demand Cloud Computing and Extreme Automation
Автор: Michelle Malcher
Издательство: Apress
Год: 2018
Страниц: 125
Формат: PDF, EPUB
Размер: 10 Mb
Язык: English

Adapt your career as a database administrator to the changing industry. Learn where the growth and demand for DBA talent are occurring and how to enhance your skill set. Creating databases, providing access, and controlling data are no longer the focus. What matters now is managing and monitoring the systems that provide access to users of the data.
  • Добавил: bhaer
  • Дата: 8-12-2017, 09:44
  • Комментариев: 0

Название: Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
Автор: Neelesh Ajmani,? Dinesh Kumar
Издательство: Apress
Год: 2018
Страниц: 168
Формат: PDF, EPUB
Размер: 10 Mb
Язык: English

Proactively plan and manage innovation in your business while keeping operations safe and secure. This book provides a framework and practices to help you safeguard customer information, prevent unauthorized access, and protect your brand and assets.
  • Добавил: literator
  • Дата: 7-12-2017, 22:01
  • Комментариев: 0
Internet Technologies for Fixed and Mobile NetworksНазвание: Internet Technologies for Fixed and Mobile Networks
Автор: Toni Janevski
Издательство: Artech House
Серия: Mobile Communications
ISBN: 160807921X
Год: 2017
Страниц: 389
Язык: английский
Формат: pdf
Размер: 10.4 MB

Сближение устаревших телекоммуникаций с Интернет и интернет-технологиями - это непрерывный процесс, в результате которого сходятся телекоммуникационные и интернет-миры. Основываясь на текущей и развивающейся отраслевой практике, эта книга посвящена интернет-технологиям, в частности принципам, протоколам (IP, IPv4, IPv6, DHCP, UDP, TCP) и службам Интернета для фиксированных и мобильных сетей, включая технологии, регулирование и бизнес-аспекты.
  • Добавил: harun54
  • Дата: 7-12-2017, 20:28
  • Комментариев: 0
Название: Antisocial Media: Crime-watching in the Internet Age
Автор: Mark A. Wood
Издательство: Palgrave Macmillan
Год: 2017
Формат: AZW3, EPUB, PDF
Размер: 5 Мб
Язык: английский / English

This book provides a cutting-edge introduction to Internet-facilitated crime-watching and examines how social media have shifted the landscape for producing, distributing, and consuming footage of crime. In this thought-provoking work, Mark Wood examines the phenomenon of antisocial media: participatory online domains where footage of crime is aggregated, sympathetically curated, and consumed as entertainment.
  • Добавил: harun54
  • Дата: 7-12-2017, 20:05
  • Комментариев: 0
Название: Women in Security: Changing the Face of Technology and Innovation
Автор: Debra A. Christofferson
Издательство: Springer
Год: 2017
Формат: AZW3, EPUB, PDF
Размер: 9 Мб
Язык: английский / English

This volume examines core areas of development in security, emphasizing the pivotal contributions of women to the field’s evolution. The author first covers a broad spectrum of key topics, including how security is created, where innovation occurs, what the underpinnings are, and who supports it and how.