Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 24-01-2023, 19:48
  • Комментариев: 0
Research Advances in Network TechnologiesНазвание: Research Advances in Network Technologies
Автор: Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg
Издательство: CRC Press
Год: 2023
Страниц: 311
Язык: английский
Формат: pdf (true)
Размер: 22.1 MB

The network technologies are the main enablers that connect the computing devices and resources together to collect, process and share vital information locally as well as globally. The network technologies provide efficient, flexible and seamless communication while maximizing productivity and resources for our day-to-day lives and business operations. For all its importance, this domain has evolved drastically, from the traditional wired networks to Bluetooth, infrared-waves, micro-waves, radio-waves and satellite networks. Nowadays, network technologies are not only restricted to computer laboratories, offices or homes; many other diverse areas have been witnessed where network technologies are being used based on the applications and needs, such as vehicular ad-hoc networks, underwater networks, and the Internet of Things. This book will be beneficial for academicians, researchers, developers, engineers, and practitioners working in or interested in the research trends and applications of network technologies.
  • Добавил: literator
  • Дата: 24-01-2023, 03:25
  • Комментариев: 0
Edge Computing Technology and Applications (MEAP v2)Название: Edge Computing Technology and Applications (MEAP V02)
Автор: Perry Lea
Издательство: Manning Publications
Год: 2023
Страниц: 180
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

Get the business and technical foundation you need to create your edge computing strategy. Edge devices" include everything from smart phones to the countless internet connected appliances we interact with everywhere, every day. And to remain competitive, every business must have an edge computing strategy. Edge Computing Technology and Applications is the first step. This no-nonsense guide from veteran technologist Perry Lea slices through the buzzwords and reveals how edge computing affects your business and IT decisions, from hardware and software systems to the way you interact with customers, clients, and employees. Edge computing brings computing power and data storage closer to the devices and systems that need it. Edge devices perform tasks ranging from simple data retrieval to complex AI at the point of usage to deliver faster and more responsive applications. This insightful, experience-driven guide will help you get to the core of what you need to know about this groundbreaking technology. Edge computing has extensions to the Internet of Things (IoT), 5G and cellular communication, Machine Learning, and Industry 4.0 (all buzzwords to their own extent).
  • Добавил: literator
  • Дата: 23-01-2023, 10:03
  • Комментариев: 0
Google Certified Professional Cloud Security Engineer: Study Guide with Practice Questions and Labs: Second EditionНазвание: Google Certified Professional Cloud Security Engineer: Study Guide with Practice Questions and Labs: Second Edition
Автор: IP Specialist
Издательство: IPSpecialist
Год: 2022
Страниц: 381
Язык: английский
Формат: epub (true)
Размер: 10.2 MB

PASS THE LATEST Professional Cloud Security Engineer EXAM with Confidence in just 4 Weeks!!! Preparing for google cloud professional cloud security engineer certification to become a professional cloud security engineer Certified by Google Cloud? This is a highly practical, intensive, yet comprehensive book that will teach you to become a Google Cloud Security Engineer. The book is for anyone who would like to master the art of Google Cloud Networking. Its a perfect resource to pass the Google Professional Cloud Security Engineer Certification on the first attempt. Google considers that in the future, every company—irrespective of size or industry—will differentiate itself from its opponents through technology. Google Cloud offers a wide range of services for managing and getting value from data at scale. To successfully comprehend this course, you must be familiar with IT concepts such as operating systems and networks. It will also help to be familiar with the Linux command line, web servers, and text editors. The hands-on lab activities performed in this course require using a desktop or laptop computer, a recent web browser, and an Internet connection.
  • Добавил: literator
  • Дата: 22-01-2023, 20:42
  • Комментариев: 0
Advances in Applications of Computational Intelligence and the Internet of ThingsНазвание: Advances in Applications of Computational Intelligence and the Internet of Things: Cryptography and Network Security in IoT
Автор: Rajdeep Chowdhury, S.K. Niranjan
Издательство: Apple Academic Press, CRC Press
Год: 2022
Страниц: 179
Язык: английский
Формат: pdf (true), epub
Размер: 25.5 MB

This new volume illustrates the diverse applications of IoT. The volume addresses the crucial issue of data safekeeping along with the development of a new cryptographic and security technology as well as a range of other advances in IoT. The volume looks at the application of IoT in medical technology and healthcare, including the design of IoT-based mobile healthcare units and a blockchain technique based smart health record system. Other topics include a blended IoT-enabled learning approach through a study employing clustering techniques, an IoT-enabled garbage disposal system with an advanced message notification system through an Android application, IoT-based self-healing concrete that uses bacteria and environmental waste, an IoT-enabled trash-the-ash application that regulates flow, and more. The Chapter 2 "Application of Cryptography and Network Security in the Internet of Things (IoT)" discusses the importance of cybersecurity, its origin, and various aspects. Basic concepts related to cryptography are given for the reader to understand the importance of cryptography for cybersecurity, and then the concept of the cybersecurity and network security is also explained and clarified the meaning of both.
  • Добавил: koticvvik
  • Дата: 22-01-2023, 18:37
  • Комментариев: 0

Название: Cisco Cloud Infrastructure: Application, Security, and Data Center Architecture
Автор: Patel J., Shukla A., Sardana H., Panzade R.
Издательство:Cisco Systems
Год: 2023
Формат: PDF
Страниц:691
Размер: 66,9 МБ
Язык: English

Hybrid cloud adoption is accelerating, as companies discover that hybrid cloud architectures can reduce hosting costs, improve agility, promote scalability, accelerate deployment, and enhance security. Cisco Cloud Infrastructure is the definitive reference for every professional who needs to understand, implement, or manage Cisco hybrid cloud solutions for networking, compute, storage, applications, and/or security.
  • Добавил: literator
  • Дата: 22-01-2023, 05:58
  • Комментариев: 0
Resistance to the Current: The Dialectics of HackingНазвание: Resistance to the Current: The Dialectics of Hacking
Автор: Johan Soderberg and Maxigas
Издательство: MIT Press
Серия: Information Policy
Год: 2022
Страниц: 265
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

How hacking cultures drive contemporary capitalism and the future of innovation. In Resistance to the Current, Johan Söderberg and Maxigas examine four historical case studies of hacker movements and their roles in shaping the twenty-first-century’s network society. Based on decades of field work and analysis, this intervention into current debates situates an exploding variety of hacking practices within the contradictions of capitalism. Depoliticized accounts of computing cultures and collaborative production miss their core driver, write Söderberg and Maxigas: the articulation of critique and its recuperation into innovations. Drawing on accounts of building, developing, and running community wireless networks, 3D printers, hackerspaces, and chat protocols, the authors develop a theoretical framework of critique and recuperation to examine how hackers—who have long held a reputation for being underground rebels—transform their outputs from communal, underground experiments to commercial products that benefit the state and capital.
  • Добавил: literator
  • Дата: 20-01-2023, 19:11
  • Комментариев: 0
Security in Smart Home NetworksНазвание: Security in Smart Home Networks
Автор: Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
Издательство: Springer
Год: 2023
Страниц: 177
Язык: английский
Формат: pdf (true), epub
Размер: 29.9 MB

This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
  • Добавил: literator
  • Дата: 20-01-2023, 07:49
  • Комментариев: 0
CISM Certified Information Security Manager Practice Exams, Second EditionНазвание: CISM Certified Information Security Manager Practice Exams, Second Edition
Автор: Peter H. Gregory
Издательство: McGraw-Hill
Год: 2023
Страниц: 340
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Up-to-date practice questions that cover every topic on the 2022 version of the CISM exam. Take the current version of the challenging CISM exam with complete confidence using the detailed information contained in this fully updated self-study guide. Written by an expert in the field, the book features hundreds of practice exam questions that match those on the live test in content, format, tone, and feel. In-depth answer explanations are provided for both the correct and incorrect answer choices.
  • Добавил: literator
  • Дата: 20-01-2023, 07:27
  • Комментариев: 0
Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)Название: Cloud FinOps: Collaborative, Real-Time Cloud Value Decision Making 2nd Edition (Final)
Автор: J.R. Storment, Mike Fuller
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 483
Язык: английский
Формат: epub
Размер: 10.2 MB

FinOps brings financial accountability to the variable spend model of cloud. Used by the majority of global enterprises, this management practice has grown from a fringe activity to the de facto discipline managing cloud spend. In this book, authors J.R. Storment and Mike Fuller outline the process of building a culture of cloud FinOps by drawing on real-world successes and failures of large-scale cloud spenders. At the time of writing, we assume readers will have a base level of knowledge of at least one of the three main public cloud providers (Amazon Web Services [AWS], Azure, and Google Cloud Platform [GCP]). Readers should understand how the cloud works and charges for resources. They should also be familiar with the major resource types like compute and storage, and higher-level service offerings like managed databases, queues, and object storage. A good starting place for the level of AWS knowledge needed is the AWS Business Professional training, or better, the AWS Cloud Practitioner certification.
  • Добавил: literator
  • Дата: 20-01-2023, 07:09
  • Комментариев: 0
Computer Security Fundamentals, Fifth Edition (Final)Название: Computer Security Fundamentals, Fifth Edition
Автор: Dr. Chuck Easttom
Издательство: Pearson Education
Год: 2023
Страниц: 576
Язык: английский
Формат: epub
Размер: 29.3 MB

One-volume introduction to computer security. This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples refl ect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all youve learned. This book is a guide for any computer-savvy person. This means system administrators who are not security experts and anyone who has a working knowledge of computers and wishes to know more about cybercrime and cyber terrorism could find this book useful. However, the core audience will be students who wish to take a first course in security but may not have a thorough background in computer networks. The book is in textbook format, making it ideal for introductory computer security courses that have no specific prerequisites. That lack of prerequisites means that people outside the normal computer science and computer information systems departments could also avail themselves of a course based on this book. This might be of particular interest to law enforcement officers, criminal justice majors, and even business majors with an interest in computer security.