Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 2-12-2022, 20:36
  • Комментариев: 0
Blockchain for Industry 4.0: Emergence, Challenges, and OpportunitiesНазвание: Blockchain for Industry 4.0: Emergence, Challenges, and Opportunities
Автор: Anoop V. S., Asharaf S., Justin Goldston
Издательство: CRC Press
Серия: Computational Methods for Industrial Applications
Год: 2023
Страниц: 325
Язык: английский
Формат: pdf (true)
Размер: 15.2 MB

This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain. It explains Blockchain concepts related to Industry 4.0, Smart Healthcare, and the Internet of Things (IoT) and explores Smart Contracts and Consensus algorithms. This book will serve as an ideal reference text for graduate students and academic researchers in electrical engineering, electronics and communication engineering, computer engineering, and information technology.
  • Добавил: literator
  • Дата: 1-12-2022, 08:55
  • Комментариев: 0
6G Frontiers: Towards Future Wireless SystemsНазвание: 6G Frontiers: Towards Future Wireless Systems
Автор: Chamitha de Alwis, Quoc-Viet Pham
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 339
Язык: английский
Формат: pdf (true)
Размер: 12.3 MB

6G Frontiers Enables readers to understand the exciting new technologies, architectural directions, technical aspects, and applications of 6G, plus legal and standardization approaches. 6G Frontiers offers intelligent insight into the ongoing research trends, use cases, and key developmental technologies powering the upcoming 6G framework. The authors cover a myriad of important topics that intersect with 6G, such as hyper-intelligent networking, security, privacy, and trust, harmonized mobile networks, legal views, and standards initiatives. The work also explores the more extreme and controversial predictions surrounding 6G, such as hyper-connected smart cities, space tourism, and deep-sea tourism.
  • Добавил: literator
  • Дата: 30-11-2022, 12:22
  • Комментариев: 0
Information Systems Security in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Times of TurbulenceНазвание: Information Systems Security in Small and Medium-Sized Enterprises: Emerging Cybersecurity Threats in Times of Turbulence
Автор: Kennedy Njenga
Издательство: Nova Science Publishers, Inc.
Год: 2022
Страниц: 116
Язык: английский
Формат: pdf (true)
Размер: 20.5 MB

This book is the outcome of a review of literature on the possible concerns and issues Small and Medium-Sized Enterprises (SMEs) would face when adopting the fourth industrial revolution (4IR) technologies. From a review of the current and past literature, this book disseminates insightful ideas and developments in the field of information and cybersecurity. It is intended that these ideas will shape how SMEs now and in the immediate future address information and cyber security risks. This book is also of particular interest to information security administrators managing SME information security, who may gather additional insights on the emergent information security threats facing SMEs that are discussed. A key consideration for this book is the innovative ways that SMEs have adopted 4IR technologies but, in doing so, have attracted unknown information and cyber security risks.
  • Добавил: literator
  • Дата: 29-11-2022, 08:51
  • Комментариев: 0
Guide to Internet Cryptography: Security Protocols and Real-World Attack ImplicationsНазвание: Guide to Internet Cryptography: Security Protocols and Real-World Attack Implications
Автор: Jorg Schwenk
Издательство: Springer
Год: 2022
Страниц: 535
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research. This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.
  • Добавил: literator
  • Дата: 26-11-2022, 17:35
  • Комментариев: 0
Cyber Security: The Complete Guide To Cyber Threats And Protection, 2nd EditionНазвание: Cyber Security: The Complete Guide To Cyber Threats And Protection, 2nd Edition
Автор: David Sutton
Издательство: BCS, The Chartered Institute for IT
Год: 2022
Страниц: 333
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Cyber security has never been more essential than it is today, it’s not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure. Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen. Written in an accessible manner, Cyber Security provides practical guidance and actionable steps to better prepare your workplace and your home alike. This second edition has been updated to reflect the latest threats and vulnerabilities in the IT security landscape, and updates to standards, good practice guides and legislation.
  • Добавил: literator
  • Дата: 26-11-2022, 04:22
  • Комментариев: 0
Principles and Practice of BlockchainsНазвание: Principles and Practice of Blockchains
Автор: Kevin Daimi, Ioanna Dionysiou
Издательство: Springer
Год: 2023
Страниц: 398
Язык: английский
Формат: pdf (true), epub
Размер: 33.8 MB

Blockchain is considered as distributed records or lists assigned to network nodes. They store information in blocks where each block is linked to the previous one. These blocks establish a chain (blockchain). Initially, blockchains were created for cryptocurrency systems to sustain a secure and decentralized collection of transactions. Soon after, many different applications of blockchains emerged. Principles and Practice of Blockchains provides an essential compilation of relevant and cutting-edge academic and industry work on key blockchain topics. Further, it introduces blockchains to the public at large to develop their blockchain knowledge and awareness. The book can be a valuable resource to blockchain experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
  • Добавил: literator
  • Дата: 25-11-2022, 17:55
  • Комментариев: 0
Introducing Cisco Unified Computing System: Learn Cisco UCS with Cisco UCSPEНазвание: Introducing Cisco Unified Computing System: Learn Cisco UCS with Cisco UCSPE
Автор: Stuart Fordham
Издательство: Apress
Год: 2023
Страниц: 153
Язык: английский
Формат: pdf (true), epub
Размер: 35.7 MB

The Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy. So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it.
  • Добавил: literator
  • Дата: 22-11-2022, 19:04
  • Комментариев: 0
Cyberwarfare: Threats to Critical InfrastructureНазвание: Cyberwarfare: Threats to Critical Infrastructure
Автор: Kristan Stoddart
Издательство: Palgrave Macmillan
Год: 2022
Страниц: 550
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members). This book concentrates not on military networks but on civilian critical infrastructure/critical national infrastructure (CI/CNI) attacks.
  • Добавил: literator
  • Дата: 22-11-2022, 18:42
  • Комментариев: 0
Advances in Cyber Security and Intelligent AnalyticsНазвание: Advances in Cyber Security and Intelligent Analytics
Автор: Abhishek Verma, Jitendra Kumar, Hari Mohan Gaur, Vrijendra Singh
Издательство: CRC Press
Год: 2023
Страниц: 310
Язык: английский
Формат: pdf (true)
Размер: 14.8 MB

We live in a digital world, where we use digital tools and smart devices to communicate over the Internet. In turn, an enormous amount of data gets generated. The traditional computing architectures are inefficient in storing and managing this massive amount of data. Unfortunately, the data cannot be ignored as it helps businesses to make better decisions, solve problems, understand performance, improve processes, and understand customers. Therefore, we need modern systems capable of handling and managing data efficiently. In the past few decades, many distributed computing paradigms have emerged, and we have noticed a substantial growth in the applications based on such emerging paradigms. Some well-known emerging computing paradigms include cloud computing, fog computing, and edge computing, which have leveraged the increase in the volume of data being generated every second. However, the distributed computing paradigms face critical challenges, including network management and cyber security. We have witnessed the development of various networking models―IoT, SDN, and ICN―to support modern systems requirements.
  • Добавил: literator
  • Дата: 22-11-2022, 16:50
  • Комментариев: 0
Emerging Trends in Cybersecurity ApplicationsНазвание: Emerging Trends in Cybersecurity Applications
Автор: Kevin Daimi, Abeer Alsadoon, Cathryn Peoples
Издательство: Springer
Год: 2023
Страниц: 464
Язык: английский
Формат: pdf (true)
Размер: 20.7 MB

This book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.