Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 26-09-2023, 07:30
  • Комментариев: 0
Название: Testing in Metaverse: A practical guide to applying quality engineering principles to the metaverse
Автор: Ajay Pandey
Издательство: BPB Publications
Год: 2024
Страниц: 673
Язык: английский
Формат: pdf, epub
Размер: 26.6 MB

A complete resource for testing metaverse platforms and products. The metaverse is an emerging technology that is growing exponentially. As the market for metaverse products and platforms continues to grow, it is important to ensure their quality. This book provides a practitioner's view of quality engineering techniques and best practices that can be leveraged in the metaverse. “Testing in Metaverse” is a comprehensive and engaging exploration of the metaverse, a vast and ever-evolving digital realm. It covers all aspects of the metaverse, from its platforms and technical complexities to its impact on different industries and sectors. It also discusses the importance of compliance and ethical considerations in the metaverse, as well as the allure of virtual worlds within this vast digital space. By the end of the book, you will have a comprehensive understanding of the metaverse and its potential for quality assurance. This book is for Quality Engineering/Testing professionals seeking to grasp the testing imperatives in the Metaverse and to readers who desire an overview and understanding of this transformative digital frontier.
  • Добавил: literator
  • Дата: 25-09-2023, 20:17
  • Комментариев: 0
Название: Computer Security Principles and Practice 5th Edition
Автор: William Stallings, Lawrie Brown
Издательство: Pearson Education
Год: 2024
Страниц: 1641
Язык: английский
Формат: pdf
Размер: 33.5 MB

Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of computer and network security with current developments and topics in the field. Principles, design approaches, standards, and real-world examples give you an understanding of both the theory and application of important concepts. Hands-on security education, research, programming and firewall projects give you practice applying the material. Hacking and lab exercises, real-world case studies, and security assessments further your understanding of text concepts. The objective of this book is to provide an up-to-date survey of developments in computer security. Central problems that confront security designers and security administrators include defining the threats to computer and network systems, evaluating the relative risks of these threats, and developing cost-effective and user friendly countermeasures. The book is intended for both an academic and a professional audience. As a textbook, it is intended as a one- or two-semester undergraduate course for Computer Science, computer engineering, and electrical engineering majors.
  • Добавил: literator
  • Дата: 24-09-2023, 02:26
  • Комментариев: 0
Название: Wireless Mesh Networks
Автор: Alvin Albuero De Luna
Издательство: Arcler Press
Год: 2022
Страниц: 258
Язык: английский
Формат: pdf (true)
Размер: 19.6 MB

Wireless mesh networks (WMNs) will dominate in the coming decade as they are one of the primary technologies. They will assist in understanding the awaited dream of network connectivity anywhere, at any time, at a low cost. As a result, in the next-generation Internet, they will play a significant part. Their ability to self-organize greatly minimizes the complexity of network implementation and maintenance, necessitating a low initial investment. Simple mesh clients and mesh routers make up these networks, which make the backbone of WMNs. Mesh routers have limited mobility. They connect mesh and traditional clients to the network. The bridge functionalities and the gateway in mesh routers can be used to connect WMNs to other networks like the cellular, Internet, IEEE 802.16, IEEE 802.15, IEEE 802.11, sensor networks, etc. Mesh clients can be mobile or motionless, and they can establish a client mesh network with mesh routers and other mesh clients. Wireless personal area networks (WPANs), wireless metropolitan area networks (MAN), Ad hoc networks, and wireless local area networks (WLANs) are expected to benefit from WMNs, which are expected to overcome restrictions and considerably increase performance. These networks provide wireless services to various applications in metropolitan locations, local, campus, and personal.
  • Добавил: literator
  • Дата: 24-09-2023, 01:32
  • Комментариев: 0
Название: CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, 2nd Edition (Early Release)
Автор: Jason Ball
Издательство: Cisco Press
Год: 2023
Страниц: 1310
Язык: английский
Формат: epub
Размер: 37.0 MB

Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CCNP and CCIE Collaboration Core CLCOR 350-801 Official Cert Guide, Second Edition, helps you master the concepts and techniques that ensure your exam success and is the only self-study resource approved by Cisco. Expert author Jason Ball shares preparation hints and test-taking tips, helping you identify areas of weakness, and improve both your conceptual knowledge and hands-on skills. The Implementing Cisco Collaboration Core Technologies (CLCOR 350-801) exam is the required “core” exam for the CCNP Collaboration and CCIE Collaboration certifications. If you pass the CLCOR 350-801 exam, you also obtain the Cisco Certified Specialist–Collaboration Core certification. This exam covers core Collaboration technologies, including infrastructure and design; protocols, codecs, and endpoints; Cisco IOS XE gateways and media resources; call control; QoS; and Collaboration applications.
  • Добавил: literator
  • Дата: 23-09-2023, 17:14
  • Комментариев: 0
Название: Security Designs for the Cloud, IoT, and Social Networking
Автор: Adele Kuzmiakova
Издательство: Arcler Press
Год: 2022
Страниц: 264
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Along with providing an overview of cloud computing, this book talks about the various other dimensions involved in it such as the risk issues and security challenges in cloud computing. It highlights the appplication safety and service vulnerability in cloud network. It also gives an introduction to IoT security and its open challenges, IoT architecture security and the introduction into the social network and its security issues, as well as the cyberspace security in the digital age. Currently, the world is facing rapid technological advancement in every field. Unarguably, the most affected area is digital technology. The use of digital devices has increased to a much greater extent in the last decade. In this book three major aspects of digital technology data, social media, cloud computing, and Internet of Things (IoT) are discussed. This book thoroughly examines the issues and vulnerabilities of IoT services. Due to the low cost of cloud services, almost every organization is storing their data in the cloud. This causes a big chunk of users’ personal data to be saved in the cloud, which can be a target for hackers who are always trying to get access to cloud storage. This book thoroughly examines the issues and vulnerabilities of IoT services.
  • Добавил: literator
  • Дата: 23-09-2023, 03:13
  • Комментариев: 0
Название: Information Assurance and Risk Management Strategies: Manage Your Information Systems and Tools in the Cloud
Автор: Bradley Fowler
Издательство: Apress
Год: 2023
Страниц: 158
Язык: английский
Формат: pdf
Размер: 20.7 MB

Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology’s recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you’ll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization.
  • Добавил: literator
  • Дата: 22-09-2023, 15:14
  • Комментариев: 0
Название: Информационная безопасность: защита и нападение, 3-е издание
Автор: А.А. Бирюков
Издательство: ДМК Пресс
Год: 2023
Страниц: 442
Язык: русский
Формат: pdf
Размер: 23.1 MB

Книги по информационной безопасности (ИБ) преимущественно делятся на две группы: в одних большей частью присутствует нормативная информация и мало сведений о технической реализации угроз и защите от них, в других описываются только технические аспекты (серии «...глазами хакера»). Данная книга выдерживает уже третье издание, предлагая читателю глубокое погружение в практические аспекты реализации конкретных атак и средств защиты. Представлены как актуальная техническая информация, так и советы по организации процесса обеспечения информационной безопасности с соответствующими примерами. В числе рассматриваемых тем: атаки на беспроводные устройства; безопасность облачных систем; выявление уязвимостей; средства обнаружения и предотвращения вторжений; борьба с утечками; обзор методов шифрования; описание пакета Kali Linux; и многое другое.
  • Добавил: literator
  • Дата: 21-09-2023, 22:02
  • Комментариев: 0
Название: Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust (Final)
Автор: Ev Kontsevoy, Sakshyam Shah, Peter Conrad
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 163
Язык: английский
Формат: True EPUB (Retail Copy), PDF (conv), MOBI (conv)
Размер: 10.1 MB

Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider. How can you secure access to diverse infrastructure components, from bare metal to ephemeral containers, consistently and simply? In this practical book, authors Ev Kontsevoy, Sakshyam Shah, and Peter Conrad break this topic down into manageable pieces. You'll discover how different parts of the approach fit together in a way that enables engineering teams to build more secure applications without slowing down productivity. This book is for anyone facing the challenges of defending an ever-growing infrastructure, whether on-premises, in the cloud, or both. The book is accessible to a reader with a modicum of technical skill and a passing familiarity with IT, networking, and the Linux command line. Whether you’re an executive, an IT policymaker, or a DevOps engineer, if you have responsibility for helping secure heterogeneous computing infrastructure, this book is for you.
  • Добавил: literator
  • Дата: 21-09-2023, 07:11
  • Комментариев: 0
Название: Data Analytics for Internet of Things Infrastructure
Автор: Rohit Sharma, Gwanggil Jeon, Yan Zhang
Издательство: Springer
Серия: Internet of Things
Год: 2023
Страниц: 330
Язык: английский
Формат: pdf (true), epub
Размер: 50.0 MB

This book provides techniques for the deployment of semantic technologies in data analysis along with the latest applications across the field such as Internet of Things (IoT). The authors focus on the use of the IoT and big data in business intelligence, data management, Hadoop, Machine Learning, cloud, smart cities, etc. They discuss how the generation of Big Data by IoT has ruptured the existing data processing capacity of IoT and recommends the adoption of data analytics to strengthen solutions. The book addresses the challenges in designing the web based IoT system, provides a comparative analysis of different advanced approaches in industries, and contains an analysis of databases to provide expert systems. The book aims to bring together leading academic scientists, researchers, and research scholars to exchange and share their experiences and research results on all aspects of IoT and Big Data analytics.
  • Добавил: umkaS
  • Дата: 21-09-2023, 07:05
  • Комментариев: 0
Название: Алгоритмы интеллектуального Интернета. Передовые методики сбора, анализа и обработки данных
Автор: Хараламбос Марманис, Дмитрий Бабенко
Издательство: Символ-Плюс
Год: 2011
Формат: PDF
Страниц: 470
Размер: 18 MB

Важный аспект современных коммерчески успешных приложений - применение методик, позволяющих осуществлять обработку информации и добавлять средства интеллектуальной поддержки. Многочисленные примеры успешных проектов, основанных на применении таких методик, включают такие широко известные бренды, как Google, Netflix и Amazon. Эта книга о том, как построить алгоритмы, формирующие интеллектуальное ядро таких веб-приложений.