CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator

Автор: literator от 20-08-2024, 03:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator
Автор: Eithne Hogan
Издательство: BPB Publications
Год: 2023
Страниц: 654
Язык: английский
Формат: pdf (true)
Размер: 31.3 MB

A step-by-step guide to acing the CompTIA Network+ certification (Exam N10-008). The CompTIA Network+ Certification Guide (Exam N10-008) is designed to assist you in learning and mastering the content of the Network+ exam while preparing for CompTIA's valuable network certification. The main focus of this book revolves around the duties and responsibilities associated with being an entry-level network administrator. It provides you with the essential set of skills required to proficiently handle tasks such as installing, configuring, maintaining, and monitoring network hardware and software. Additionally, it effectively teaches you how to utilize troubleshooting tools to resolve network issues. The book also places significant emphasis on the importance of network security within the broader context of network operations. By the end of the book, you will have acquired a comprehensive understanding of the Network+ exam content and will be well-prepared to obtain CompTIA's valuable network certification.
 

Интернет без страха для начинающих. Самый наглядный самоучитель

Автор: SCART56 от 18-08-2024, 22:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Интернет без страха для начинающих. Самый наглядный самоучитель
Автор(ы): Дмитрий Миронов
Издательство: Эксмо
Год: 2012
Страниц: 192
Формат: PDF
Размер: 44 Мб
Язык: русский

Интернет давно и прочно вошел в нашу жизнь, сделав ее намного разнообразнее и интереснее. На просторах Глобальной Сети можно работать и учиться, заниматься любимым делом, общаться с друзьями и родственниками по всему миру. Во Всемирной паутине есть практически любая нужная и интересная информация: фильмы, музыка, программы. Все это можно скачать на свой компьютер, не выходя из дома.
 

Архитектура ЭВМ и систем

Автор: gol8425 от 16-08-2024, 11:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Архитектура ЭВМ и систем
Автор: Бройдо В., Ильина О.
Издательство: Питер
Год: 2009
Формат: pdf
ISBN: 978-5-388-00384-3
Размер: 13,6 мб
Качество: хорошее
Язык: русский

Книга будет весьма полезна и для специалистов, связанных с современными информационными технологиями, и для широкого круга пользователей компьютеров. Большое внимание уделено компьютерным сетям. Во второе издание учебника внесен ряд существенных изменений, связанных с бурным развитием отрасли информационных технологий.
 

Online Security Tricks and Tips - 19th Edition, 2024

Автор: literator от 16-08-2024, 06:01, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Online Security Tricks and Tips - 19th Edition, 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 108
Язык: английский
Формат: pdf
Размер: 59.9 MB

"Online Security Tricks and Tips" - это новое цифровое издание для тех пользователей, которые мечтают поднять свои навыки на новый уровень. Вы хотите улучшить свои пользовательские навыки? Вы хотите получить инсайдерские знания? Вы хотите учиться непосредственно у экспертов в этой области? На страницах этого нового руководства по безопасности в Интернете вы узнаете все, что вам нужно знать, чтобы стать более уверенным, более компетентным и более опытным пользователем. Пользователем, который знает, как использовать свои устройства и получать от них максимальную отдачу. Мы можем сделать это, передавая свои навыки, выработанные десятилетиями, и предоставляя индивидуальную поддержку каждому из наших клиентов.
 

Research Advances in Network Technologies, Volume 2

Автор: literator от 15-08-2024, 21:36, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Research Advances in Network Technologies, Volume 2
Автор: Anshul Verma, Pradeepika Verma
Издательство: CRC Press
Год: 2025
Страниц: 284
Язык: английский
Формат: pdf (true)
Размер: 16.6 MB

In the present technological age, information is a valuable resource for both small and large enterprises as well as for our daily lives. The key enablers that link computer resources and devices together to gather, process, and distribute crucial data both locally and worldwide are network technologies. For our daily lives and commercial operations, network technologies offer effective, adaptable, and seamless communication while maximizing productivity and resources. Due to its significance, this field has undergone a significant evolution in the past few decades, moving away from traditional wired networks and toward Bluetooth, infrared, microwave, radio, and satellite networks. These days, network technologies are not employed only in computer labs, businesses, or homes; a wide range of domains, such as vehicular ad hoc networks, mobile ad hoc networks, and the Internet of Things, have been seen using network technologies. Researchers from academia and industry have worked hard to build and develop software-based network technologies, such as middleware, protocol stacks, and network software architectures, in addition to hardware-based and physical network technologies. The paradigm shift in this field is being driven primarily by software-based network technologies, which have also given rise to numerous new network innovations, including grid computing, cloud computing, fog computing, edge computing, software-defined networks, and content-centric networks. Significant efforts have been made in cellular network technologies to boost the user experience, and as a result, new cellular network technologies, including LTE, VoLTE, and 5G, have also been developed. This book will present the most recent and leading research in the field of network technologies in order to achieve solutions for various problems that exist in this domain.
 

Convergence of Artificial Intelligence and Internet of Things for Industrial Automation

Автор: literator от 15-08-2024, 20:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Convergence of Artificial Intelligence and Internet of Things for Industrial Automation
Автор: Divya Mishra, Alok Kumar Verma, Shanu Sharma
Издательство: CRC Press
Год: 2025
Страниц: 222
Язык: английский
Формат: pdf (true)
Размер: 17.4 MB

This book begins by discussing the fundamentals of Artificial Intelligence, the Internet of Things, and their convergence. It then covers techniques, algorithms, and methods of analysing and processing data over the Artificial Intelligence of Things. The text elaborates on important concepts such as body sensor networks for safety in smart factories, smart energy management, smart robotic assistive systems, and service-oriented smart manufacturing. In an era where technological innovation defines the pace of human progress, integrating Artificial Intelligence (AI) and the Internet of Things (IoT) is a beacon of transformative change. This book, Convergence of Artificial Intelligence and Internet of Things for Industrial Automation, is a testament to this evolving landscape, offering a panoramic view of the burgeoning field of AIoT – a symbiotic blend of AI and IoT. It presents a rich tapestry of research, insights, and forward-­thinking perspectives, converging to illuminate the profound implications of AIoT in reshaping industries and daily life. The chapters of this book are carefully curated to provide a comprehensive understanding of the multifaceted impact of AIoT. They delve into myriad applications, ranging from the nuts and bolts of industrial automation to the nuanced complexities of healthcare systems, painting a vivid picture of a future where intelligent machines and interconnected devices redefine efficiency and innovation.
 

An Insider's Guide to Cloud Computing (Final)

Автор: literator от 13-08-2024, 17:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

An Insider's Guide to Cloud Computing (Final)Название: An Insider's Guide to Cloud Computing (Final)
Автор: David Linthicum
Издательство: Pearson Education/Addison-Wesley
Год: 2023
Страниц: 282
Язык: английский
Формат: pdf (true), epub (true)
Размер: 15.7 MB

Many cloud computing initiatives flat-out fail; others limp along, functioning tolerably without ever delivering what they promised. An Insider’s Guide to Cloud Computing reveals why, and shows how to do better. Cloud pioneer and long-time CTO David Linthicum explodes the industry’s secrets, and presents practical ways to optimize cloud for value and performance. This book reveals many secrets in the cloud computing, as well as the secrets that swirl around the hidden values of emerging technologies such as Artificial Intelligence, containers, no-code, and serverless computing. There is information about what works, what doesn’t, and how to pick your best resources for migration or net-new cloud-based application development. Finally, and most important, this book reveals why some workloads and data sets don’t belong in the cloud…for now. We also review the true value of cloud computing in general.
 

Cybersecurity in Context: Technology, Policy, and Law

Автор: literator от 13-08-2024, 04:45, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cybersecurity in Context: Technology, Policy, and Law
Автор: Chris Jay Hoofnagle, Golden G. Richard III
Издательство: Wiley
Год: 2025
Страниц: 544
Язык: английский
Формат: epub
Размер: 100.6 MB

The first-ever introduction to the full range of cybersecurity challenges. Cybersecurity is crucial for preserving freedom in a connected world. Securing customer and business data, preventing election interference and the spread of disinformation, and understanding the vulnerabilities of key infrastructural systems are just a few of the areas in which cybersecurity professionals are indispensable. This textbook provides a comprehensive, student-oriented introduction to this capacious, interdisciplinary subject. Cybersecurity in Context covers both the policy and practical dimensions of the field. Beginning with an introduction to cybersecurity and its major challenges, it proceeds to discuss the key technologies which have brought cybersecurity to the fore, its theoretical and methodological frameworks and the legal and enforcement dimensions of the subject. The result is a cutting-edge guide to all key aspects of one of this century’s most important fields. Because cybersecurity changes so rapidly, we have attempted to set down the basics here. The textbook sets up instructors to discuss the controversies of the day in the classroom. Our goal is to explain both the technological realities of the Internet and how those realities interact with cybersecurity policy and regulation. Cybersecurity in Context is ideal for students in introductory cybersecurity classes, and for IT professionals looking to ground themselves in this essential field.
 

Ultimate Cisco Collaboration Infrastructure for Enterprise Solutions: Unlock the True Potential of Cisco Collaboration

Автор: literator от 11-08-2024, 02:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ultimate Cisco Collaboration Infrastructure for Enterprise Solutions: Unlock the True Potential of Cisco Collaboration Infrastructure for Deploying and Managing Solutions for Enterprises
Автор: Lalit Pamnani
Издательство:
Год: 2024
Страниц: 402
Язык: английский
Формат: epub (true)
Размер: 52.2 MB

Master Cisco Collaboration Infrastructure, One Chapter at a Time. This comprehensive book is designed to help IT professionals master the complex landscape of Cisco Collaboration Infrastructure. It covers a wide range of topics, from the basics of collaboration technologies and deployment models to advanced concepts like dial plan configuration, media resources, and conferencing. The book also explores the Cisco Webex suite, hybrid solutions, and edge servers, providing readers with a holistic understanding of Cisco’s collaboration offerings. Readers will gain a deep understanding of signaling and media protocols, including SIP, RTP, and RTCP, as well as essential protocols like DTMF and fax over IP. The book also addresses security, compliance, and recovery strategies, ensuring that readers are well-equipped to handle the challenges of managing Cisco Collaboration Infrastructure in real-world scenarios. Throughout the book, practical examples and real-world insights are provided, along with an introduction to automation and APIs in the context of Cisco Collaboration solutions. By the end of this book, readers will have a comprehensive toolkit to excel in managing Cisco Collaboration Infrastructure.
 

Certified Ethical Hacker Study Guide (Early Release)

Автор: literator от 10-08-2024, 17:25, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Certified Ethical Hacker Study Guide: In-Depth Guidance and Practice (Early Release)
Автор: Matt Walker
Издательство: O’Reilly Media, Inc.
Год: 2024-08-09
Страниц: 147
Язык: английский
Формат: pdf, epub
Размер: 10.1 MB

The Certified Ethical Hacker (CEH) exam is not an enjoyable undertaking. This grueling, exhaustive, challenging, and taxing exam will either leave you better prepared to be the best cyber security professional you can be, or leave you wondering if barber college is a better option. But preparing for the exam itself needn't be that way. In this book, IT security and education professional Matt Walker will not only guide you through everything you need to pass the exam, but do so in a way that is actually enjoyable. The subject matter need not be dry and exhausting, and we won't make it that way. You should finish this book looking forward to your exam and your future. Whether it’s done for noble or bad purposes, the art of hacking remains the same. Using a specialized set of tools, techniques, knowledge, and skills to bypass computer security measures allows someone to hack into a computer or network. The purpose behind their use of these tools and techniques is really the only thing in question. Whereas some use these tools and techniques for personal gain or profit, the good guys practice them in order to better defend their systems and, in the process, provide insight on how to catch the bad guys. As a matter of fact, that differentiation defines the ‘ethical’ hacker from the bad guys; the ethical hacker proceeds only with the permission of the target organization and operates with a written, agreed upon contract and rules of engagement before attempting any attacks.