Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 19-03-2024, 21:13
  • Комментариев: 0
Название: Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives
Автор: Randhir Kumar, Prabhat Kumar, Sobin C.C.
Издательство: CRC Press
Год: 2025
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book reviews research works in recent trends in blockchain, AI, and Digital Twin based IoT data analytics approaches for providing the privacy and security solutions for Fog-enabled IoT networks. Due to the large number of deployments of IoT devices, an IoT is the main source of data and a very high volume of sensing data is generated by IoT systems such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT systems is a fundamental research issue. For the deployment of the Fog-enabled-IoT system in different applications such as healthcare systems, smart cities and smart grid systems, security, and privacy of big IoT data and IoT networks are key issues. The current centralized IoT architecture is heavily restricted with various challenges such as single points of failure, data privacy, security, robustness, etc. This book emphasizes and facilitates a greater understanding of various security and privacy approaches using the advances in Digital Twin and Blockchain for data analysis using machine/deep learning, federated learning, edge computing and the countermeasures to overcome these vulnerabilities.
  • Добавил: literator
  • Дата: 19-03-2024, 14:11
  • Комментариев: 0
Название: Toward Connected, Cooperative and Intelligent IoV: Frontier Technologies and Applications
Автор: Kai Liu, Penglin Dai, Victor C. S. Lee, Joseph Kee-Yin Ng, Sang Hyuk Son
Издательство: Springer
Год: 2024
Страниц: 327
Язык: английский
Формат: pdf (true)
Размер: 23.5 MB

This book offers a comprehensive introduction to technological advances in Internet of Vehicles (IoV), including vehicular communications, vehicular system architectures, data dissemination algorithms, resource allocation schemes, and AI-enabled applications. It focuses on the state-of-the-art IoV with regard to three major directions, namely networking, cooperation, and intelligence, including advanced wireless communication technologies, algorithm theory, optimization mechanisms, and AI technologies. In addition, the book includes a number of case studies with system prototype implementation and hands-on experiments in IoV, making it suitable both as a technical reference work for professionals and as a textbook for graduate students. Driven by cutting-edge technologies on wireless communication, mobile computing, and Artificial Intelligence (AI), Internet of Vehicles (IoV) is thriving in an era of unprecedented development and innovation. On the other hand, the global automobile industry is accelerating its transformation towards electrification, networking, intelligence, and sharing, where IoV is emerging as the most fundamental platform for realizing future Intelligent Transportation Systems (ITSs) and smart cities.
  • Добавил: literator
  • Дата: 19-03-2024, 03:32
  • Комментариев: 0
Название: Emerging Technologies and the Application of WSN and IoT: Smart Surveillance, Public Security, and Safety Challenges
Автор: Shalli Rani
Издательство: CRC Press
Год: 2024
Страниц: 281
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

The Internet of Things (IoT) has numerous applications, including smart cities, industries, cloud-based apps, smart homes, and surveillance. The Internet of Things (IoT) enables smarter living by connecting devices, people, and objects. As networking became a crucial aspect of the Internet, rigorous design analysis led to the development of new research areas. The Internet of Things has revolutionized daily living in countless ways. It enables communication between buildings, people, portable gadgets, and vehicles, facilitating mobility. Smart cities and cloud-based data have transformed corporate practices. With billions of connected gadgets, everything will soon be able to communicate remotely. IoT networks, whether public or private, rely significantly on machine learning and software-defined networking. Indian and other governments have approved various research projects on IoT-based networking technologies. This field of study will significantly impact society in the future. This resource includes real-world applications and case studies for smart city technology, enormous data management, and Machine Learning prediction, all with confidentiality and safety problems.
  • Добавил: umkaS
  • Дата: 15-03-2024, 12:37
  • Комментариев: 0
Название: Защита компьютерной информации. Эффективные методы и средства
Автор: В. Ф. Шаньгин
Издательство: Москва
Год: 2010
Cтраниц: 545
Формат: pdf/djvu
Размер: 28 мб
Язык: русский

Формулируются основные понятия и определения защиты информации, анализируются угрозы информационной безопасности в компьютерных системах и сетях. Обсуждаются базовые понятия и принципы политики безопасности. Анализируются международные и отечественные стандарты информационной безопасности.
  • Добавил: SCART56
  • Дата: 14-03-2024, 20:05
  • Комментариев: 0

Название: Записная книжка шифропанка. Сборник в 10 книгах
Автор(ы): разные
Издательство: Самиздат
Год: 2019
Страниц: 1000+
Формат: FB2
Размер: 19 Мб
Язык: русский

Движение шифропанков, сформировавшееся в начале девяностых, активно прибегало к «криптографическому оружию», с целью провокации социальных и политических изменений. Термин «шифропанки» впервые употребила Джуд Милхон (хакер, программист и редактор) в качестве игры слов, в адрес группы криптоанархистов.
  • Добавил: tatanavip
  • Дата: 14-03-2024, 13:11
  • Комментариев: 0

Название: ChatGPT. Мастер подсказок, или Как создавать сильные промты для нейросети
Автор: Петр Панда
Издательство: Питер
Год: 2024
Формат: pdf, rtf
Размер: 10 Мб
Качество: Хорошее
Язык: Русский

Уже сейчас нейросети выполняют тысячи контент-задач в разных сферах. От слоганов, статей и постов до учебных программ, выступлений и подбора креативных идей. Умение грамотно «общаться» с ИИ все чаще становится серьезным и порой даже главным карьерным или личным бонусом.
Именно развитию навыков работы с ChatGPT и другими контентными ИИ (промт-инжиниринг) и посвящена эта книга. В ней даны правила и «фишки», показаны схемы и неочевидные моменты, которые должен знать сильный промтер. Также добавлены пошаговые мастер-классы создания промтов (подсказок) на основе некоторых маркетинговых и информационных типов контента.
  • Добавил: literator
  • Дата: 14-03-2024, 04:53
  • Комментариев: 0
Название: Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures
Автор: Madhusudhan H.S., Satish Kumar T., Punit Gupta
Издательство: CRC Press
Год: 2024
Страниц: 224
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

One of the major developments in the computing field is Cloud Computing, which enables users to do complicated computations that local devices are unable to handle. The finest feature of cloud computing is the pay-per-use model, which requires customers to pay only for the resources they use for a specified amount of time rather than receiving payment for the entire year or month. A collaborative environment is provided by multi-layered cloud computing, where diverse resources in the form of data centers support various services. Data centers are a diverse group of resources that are deployed across multiple geographic locations in multi-layered cloud computing and have varied computational capacity, architecture, and performance. Reliable and Intelligent Optimization in Multi-Layered Cloud Computing Architectures examines ways to meet these challenges. It discusses virtual machine placement techniques and task scheduling techniques that optimize resource utilization and minimize energy consumption of cloud data centers. Placement techniques presented can provide an optimal solution to the optimization problem using multiple objectives. The book focuses on basic design principles and analysis of virtual machine placement techniques and task allocation techniques.
  • Добавил: literator
  • Дата: 14-03-2024, 03:53
  • Комментариев: 0
Название: Understand the Cyber Attacker Mindset: Build a Strategic Security Programme to Counteract Threats
Автор: Sarah Armstrong-Smith
Издательство: Kogan Page Limited
Год: 2024
Страниц: 305
Язык: английский
Формат: pdf (true), epub
Размер: 17.3 MB

To counteract a cyber attacker, organizations need to learn to think like one.Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and presents a set of strategies that organizations can deploy to counteract them. With technological advancements in cybersecurity, attackers are increasingly falling back to social engineering and preying on people's vulnerabilities. This book examines different types of cyber attackers, explores their motivations, and examines the methods used. It also reviews key industry developments such as cybercrime as a service, brokers and syndicates, nation-sponsored actors, insider sabotage and the challenges faced by law enforcement in tracking and apprehending attackers.
  • Добавил: literator
  • Дата: 13-03-2024, 05:13
  • Комментариев: 0
Название: The Complete Internet Security Manual - 21th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 196
Язык: английский
Формат: pdf
Размер: 83.6 MB

Вирусы, вредоносное ПО, ransomware, фишинг, мошенничество, фишинг и социальная инженерия... Необычные цифровые угрозы растут с каждым днем, и не проходит и дня, чтобы какая-нибудь атака не попала в новости. Данные стоят дороже нефти или золота, и ваши личные данные становятся мишенью для киберпреступников, мошенников и хакеров. Готовы ли вы встретить эту новую эру цифровых диверсий и краж? Сможет ли ваш компьютер с Windows выдержать неумолимый натиск современного кибермира? Мы поможем вам защитить ваш компьютер, сеть и устройства от подобных угроз и обезопасить вас от потенциальных угроз и атак с помощью нашего простого руководства. Родители и опекуны также могут узнать, как защитить своих детей в Интернете, а также получить советы от экспертов отрасли. Оставайтесь в безопасности и будьте готовы к предстоящим цифровым угрозам.
  • Добавил: literator
  • Дата: 12-03-2024, 18:38
  • Комментариев: 0
Название: Software-Defined Network Frameworks: Security Issues and Use Cases
Автор: Mandeep Kaur, Vishal Jain, Parma Nand
Издательство: CRC Press
Серия: Computational Intelligence Techniques
Год: 2024
Страниц: 325
Язык: английский
Формат: pdf (true)
Размер: 13.8 MB

Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN. Partial deployment of SDN along with traditional networking devices forms a Hybrid Software-Defined Network (HSDN). Software-Defined Network Frameworks: Security Issues and Use Cases consolidates the research relating to the security in SDN, CSDN, and Hybrid SDNs. The security enhancements derived from the use of various SDN frameworks and the security challenges thus introduced, are also discussed. Overall, this book explains the different architectures of SDNs and the security challenges needed for implementing them. Software‑Defined Network (SDN) is an emerging approach as a new network innovation architecture that has overcome the limitations of traditional network architecture to adapt to dynamic environments. With SDN, the data plane can be separated from control plane and hence the system abstraction has increased. Defining and understanding the control and management software stack for SDN is indeed important. In addition to centralized network control, the current state of the OpenFlow model which is the well‑known SDN protocol can also be explored. Network Function Virtualization (NFV) is another promising technology with many benefits like easy management and utilization of resources, reduction of the operational cost, and migration of network functions from a dedicated hardware scenario to virtual machines.