Добавить в закладки
Наш форум
Правила KnigMir.ru
Мы в Вконтакте
Подписка на RSS
Для правообладателей
Поиск книг:
Разделы сайта
Авторизация
Регистрация



Реклама


« Назад.. 1 2 3 4 5 6 7 8 9 10 ... 365 Вперёд »

Securing 5G and Evolving Architectures (Final)Название: Securing 5G and Evolving Architectures (Final)
Автор: Pramod Nair
Издательство: Addison-Wesley Professional/Pearson Education
Год: 2022
Страниц: 624
Язык: английский
Формат: epub
Размер: 41.4 MB

5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G’s openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments.
Разместил: Ingvar16 Сегодня, 04:09 | Комментарии: 0 | Подробнее
Guidebook To Computer and Smartphone Security: Security Information For EveryoneНазвание: Guidebook To Computer and Smartphone Security: Security Information For Everyone
Автор: Brandon Lipani
Издательство: Leanpub
Год: 2021-01-10
Страниц: 156
Язык: английский
Формат: pdf (true), epub
Размер: 19.3 MB

I am a Certified Comptia Security + professional helping users and companies secure their computers, networks and smartphones across the country. The purpose of this book is to educate and teach computer and smartphone users about safety and security online. What is the goal of this book? My goal with this book is to provide security knowledge that everyone should have to keep themselves safe in the technology age. The purpose of this book is to educate and teach computer and smartphone users about safety and security online.
Разместил: Ingvar16 Вчера, 21:24 | Комментарии: 0 | Подробнее
Название: Принципы построения, применения и проектирования коммуникационной платформы U-SYS
Автор: Росляков А.В., Крылов П.С.
Издательство: СОЛОН-Пресс
Год: 2016
Формат: pdf
Размер: 19 мб
Язык: русский

В учебном пособии рассмотрены принципы построения, применения и проектирования оборудования коммуникационной платформы U-SYS компании Huawei (Китай), используемой для построения сетей связи следующего поколения NGN.
Разместил: rivasss Вчера, 10:56 | Комментарии: 0 | Подробнее
Information Risk Management: A practitioner's guide, 2nd EditionНазвание: Information Risk Management: A practitioner's guide, 2nd Edition
Автор: David Sutton
Издательство: BCS, The Chartered Institute for IT
Год: 2021
Страниц: 240
Язык: английский
Формат: pdf (true), epub
Размер: 22.2 MB

Information risk management (IRM) is about identifying, assessing, prioritising and treating risks to keep information secure and available. This accessible book is a practical guide to understanding the principles of IRM and developing a strategic approach to an IRM programme. It is the only textbook for the BCS Practitioner Certificate in Information Risk Management and this new edition reflects recent changes to the syllabus and to the wider discipline. Some experts believe that the threat and vulnerability assessments should be carried out ahead of the impact assessments; others disagree and opt for the reverse arrangement. I believe that, in practice, either method will suffice as long as the information assets have been clearly identified, but that it can be extremely helpful if the threat and vulnerability assessments can be performed at the same time as impact assessments, since many of the threats and vulnerabilities will be apparent to the information asset owners.
Разместил: Ingvar16 28-11-2021, 17:03 | Комментарии: 0 | Подробнее
Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd EditionНазвание: Exam Ref MS-100 Microsoft 365 Identity and Services, 2nd Edition
Автор: Orin Thomas
Издательство: Microsoft Press/Pearson Education
Год: 2022
Страниц: 368
Язык: английский
Формат: epub
Размер: 45.3 MB

Prepare for the updated version of Microsoft Exam MS-100 and help demonstrate your real-world mastery of skills and knowledge needed to effectively design, deploy, manage, and secure Microsoft 365 services. Designed for experienced IT professionals, Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. The MS-100 exam deals with advanced topics that require candidates to have an excellent working knowledge of Microsoft 365 identity and services functionality. Some of the exam relates to topics that even experienced Microsoft 365 administrators may rarely encounter unless they are consultants who deploy new Microsoft 365 tenancies on a regular basis.
Разместил: Ingvar16 27-11-2021, 19:23 | Комментарии: 0 | Подробнее
Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum ComputingНазвание: Future Networks, Services and Management: Underlay and Overlay, Edge, Applications, Slicing, Cloud, Space, AI/ML, and Quantum Computing
Автор: Mehmet Toy
Издательство: Springer
Год: 2021
Страниц: 461
Язык: английский
Формат: pdf (true)
Размер: 15.3 MB

Future networks will be heterogonous as the current networks. The main difference would be that the future networks will include hyperscalers and space networks and end-to-end automation. Perhaps the transaction-based usage billing for services is highly likely. In this book, we describe future applications and services, current and future underlay and overlay networks, an overall service architecture, an overall management architecture, and various techniques in building future networks and services such as routing, security, quality of service (QoS), burst switching, 5G and 6G, MEC, AI/ML, Application Programming Interfaces (APIs), Network Slicing, and Quantum Computing.
Разместил: Ingvar16 26-11-2021, 18:22 | Комментарии: 0 | Подробнее
Connectivity and Edge Computing in IoT: Customized Designs and AI-based SolutionsНазвание: Connectivity and Edge Computing in IoT: Customized Designs and AI-based Solutions
Автор: Jie Gao, Mushu Li, Weihua Zhuang
Издательство: Springer
Серия: Wireless Networks
Год: 2021
Страниц: 177
Язык: английский
Формат: pdf (true), epub
Размер: 21.1 MB

This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions.
Разместил: Ingvar16 26-11-2021, 15:32 | Комментарии: 0 | Подробнее
IoT and Cloud Computing for Societal GoodНазвание: IoT and Cloud Computing for Societal Good
Автор: Jitendra Kumar Verma, Deepak Saxena
Издательство: Springer
Серия: EAI/Springer Innovations in Communication and Computing
Год: 2022
Страниц: 331
Язык: английский
Формат: pdf (true), epub
Размер: 35.9 MB

Internet of Things (IoT) and Cloud Computing are two recent innovations that have transformed business and industry. This book gathers the state-of-the-art for industrial application of scientific and practical research in the Cloud and IoT paradigms to benefit society. The book is organized into four parts focusing on different aspects of IoT and cloud computing: Part III deals with the optimization of existing IoT and cloud technology. Chapter 12 discusses multi-modal feature analysis for precise human hand gesture recognition. This would find useful application particularly in the domain of virtual reality. Finally, Part IV of the book deals with the security and privacy in IoT and cloud computing. Chapter 16 discusses the application of artificial intelligence for enhancing security of IoT devices. Chapter 17 takes an outward perspective by focusing on cyber-attacks, attack vectors, and remedies in the context of IoT devices. Chapter 18 proposes a privacy-secure link utilization routing algorithm for improving performance in IoT and cloud computing.
Разместил: Ingvar16 25-11-2021, 20:07 | Комментарии: 0 | Подробнее
Smart Healthcare Monitoring Using IoT with 5GНазвание: Smart Healthcare Monitoring Using IoT with 5G
Автор: Meenu Gupta, Gopal Chaudhary, Victor Hugo C. de Albuquerque
Издательство: CRC Press
Год: 2022
Страниц: 273
Язык: английский
Формат: pdf (true)
Размер: 13.2 MB

Focusing on the challenges, directions, and future predictions with the role of 5G in smart healthcare monitoring, this book offers the fundamental concepts and analysis on methods to apply IoT in monitoring devices for diagnosing and transferring data. It also discusses self-managing to help providers improve their experience of care. Smart Healthcare Monitoring Using IoT with 5G: Challenges, Directions, and Future Predictions illustrates user-focused wearable devices such as Fitbit health monitors and smartwatches where consumers are self-managing and self-monitoring their own health and providers can improve the experience of care. The book goes on to cover new points of security and privacy concerns with the expectation of IoT devices gaining more popularity within the next 10 years. Case studies depicting applications, best practices, as well as future predictions of smart healthcare monitoring by way of a 5G network are also included.
Разместил: Ingvar16 24-11-2021, 14:35 | Комментарии: 0 | Подробнее
Security in Wireless Communication NetworksНазвание: Security in Wireless Communication Networks
Автор: Yi Qian, Feng Ye, Hsiao-Hwa Chen
Издательство: Wiley-IEEE Press
Год: 2022
Страниц: 387
Язык: английский
Формат: pdf (true)
Размер: 10.9 MB

Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field. Security in Wireless Communication Networks delivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks, encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn:
Разместил: Ingvar16 23-11-2021, 15:22 | Комментарии: 0 | Подробнее

« Назад.. 1 2 3 4 5 6 7 8 9 10 ... 365 Вперёд »




 KnigMir.ru  ©2010-2019     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности