Network Security: Private Communications in a Public World

Автор: Igor1977 от 19-08-2022, 13:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Network Security: Private Communications in a Public World
Автор: Kaufman C., Perlman E., Speciner M., Perlner R.
Издательство: Addison-Wesley
Год: 2023
Формат: pdf, epub
Страниц: 678
Размер: 15 mb
Язык: Английский

Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the previous content, and added new topics that have become important.
 

Компьютерные сети. Часть 3. Стандарты и протоколы

Автор: SCART56 от 7-08-2022, 04:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Компьютерные сети. Часть 3. Стандарты и протоколы
Автор(ы): Бабаев С.И. и др.
Издательство: КУРС
Год: 2018
Страниц: 176
Формат: PDF
Размер: 11 Мб
Язык: русский

Данный учебник предназначен для студентов (бакалавров, магистров), аспирантов и специалистов, которым необходимо получить базовые практические навыки в проектировании и настройке компьютерных сетей, понять особенности традиционных и перспективных технологий локальных и глобальных сетей, изучить способы создания крупных коммутируемых сетей и управления такими сетями.



 

AWS Security

Автор: TRex от 4-08-2022, 11:22, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: AWS Security
Автор: Dylan Shields
Издательство: Manning Publications
Год: 2022
Формат: True PDF
Страниц: 311
Размер: 22 Mb
Язык: English

AWS Security covers best practices for access policies, data protection, auditing, continuous monitoring, and incident response.
To create secure applications and infrastructure on AWS, you need to understand the tools and features the platform provides and learn new approaches to configuring and managing them. AWS Security provides comprehensive coverage of the key tools and concepts you can use to defend AWS-based systems.
 

Coding Theory - Algorithms, Architectures, and Applications

Автор: koticvvik от 31-07-2022, 15:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Coding Theory - Algorithms, Architectures, and Applications
Автор: Andre Neubauer, Jurgen Freudenberger, Volker Kuhn
Издательство: Wiley-Interscience
Год: 2007
Формат: pdf
Страниц: 355
Размер: 10,6 МБ
Язык: English

One of the most important key technologies for digital communication systems as well as storage media is coding theory. It provides a means to transmit information across time and space over noisy and unreliable communication channels.
Coding Theory: Algorithms, Architectures and Applications provides a concise overview of channel coding theory and practice, as well as the accompanying signal processing architectures. The book is unique in presenting algorithms, architectures, and applications of coding theory in a unified framework. It covers the basics of coding theory before moving on to discuss algebraic linear block and cyclic codes, turbo codes and low density parity check codes and space-time codes. Coding Theory provides algorithms and architectures used for implementing coding and decoding strategies as well as coding schemes used in practice especially in communication systems.

 

Cyberpredators and Their Prey

Автор: TRex от 27-07-2022, 04:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyberpredators and Their Prey
Автор: Lauren R. Shapiro
Издательство: CRC Press
Год: 2023
Формат: True PDF
Страниц: 383
Размер: 10 Mb
Язык: English

The online environment has emerged as a continuous and unfettered source of interpersonal criminal activity beyond physical boundaries. Cyberpredators commit their crimes by employing the Internet and online services—social network platforms, online groups and organizations, smart phone apps, bulletin board systems, online forums, websites, internet relay chat channels—to locate and harm victims of all ages through attacking, exploiting, humiliating, bullying, harassing, threatening, defrauding, and exhorting.
 

Let's Get IoT-fied!: 30 IoT Projects for All Levels

Автор: TRex от 26-07-2022, 10:45, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Let's Get IoT-fied!: 30 IoT Projects for All Levels
Автор: Anudeep Juluru, Shriram K. Vasudevan, T. S. Murugesh
Издательство: CRC Press
Год: 2022
Формат: True PDF
Страниц: 553
Размер: 15,8 Mb
Язык: English

Internet of Things (IoT) stands acclaimed as a widespread area of research and has definitely enticed the interests of almost the entire globe. IoT appears to be the present as well as the future technology. This book attempts to inspire readers to explore and become accustomed to IoT. Presented in a lucid and eloquent way, this book adopts a clear and crisp approach to impart the basics as expeditiously as possible. It kicks off with the very fundamentals and then seamlessly advances in such a way that the step-by-step unique approach, connection layout, and the verified codes provided for every project can enhance the intuitive learning process and will get you onboard to the world of product building. We can assure that you will be definitely raring to start developing your own IoT solutions and to get yourself completely lost in the charm of IoT.
 

Осваиваем Ethereum. Создание смарт-контрактов и децентрализованных приложений

Автор: ekvator от 25-07-2022, 10:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Осваиваем Ethereum. Создание смарт-контрактов и децентрализованных приложений
Название: Осваиваем Ethereum. Создание смарт-контрактов и децентрализованных приложений
Автор: Андреас Антонопулос
Издательство: Эксмо
Год: 2021
Формат: pdf
Страниц: 514
Размер: 36,3 Мб
Язык: русский

Ethereum — окно в мир всемирных децентрализованных вычислений. Эта платформа позволяет реализовывать децентрализованные приложения (DApps) и смарт-контракты без центральных точек доступа или контроля, интегрироваться с платежной сетью и работать с открытым блокчейном. В этом практическом пособии Андреас Антонопулос и Гэвин Вуд дают всю информацию, необходимую для построения смарт-контрактов и децентрализованных приложений в Ethereum и других блокчейн системах.
 

Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources

Автор: TRex от 24-07-2022, 16:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cloud Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Cloud Resources
Автор: Morey J. Haber, Brian Chappell, Christopher Hills
Издательство: Apress
Год: 2022
Формат: True PDF
Страниц: 492
Размер: 10 Mb
Язык: English

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus―it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years, attackers have realigned their efforts, focusing on remaining undetected, monetization after exploitation, and publicly shaming organizations after a breach.
 

Wireless Communication Network Technology and Evolution

Автор: koticvvik от 22-07-2022, 09:20, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Wireless Communication Network Technology and Evolution
Автор: Shilin Wang, Yunfei Cai, Youyun Xu, Yuanyang Cai
Издательство: World Scientific Publishing Company
Год: 2022
Формат: epub
Страниц: 647
Размер: 18,3 МБ
Язык: English

This book provides a panoramic overview on wireless communication network technologies and its evolution, namely cellular mobile networks (especially 5G), Wireless Local Area Network (WLAN) and Narrow Band Internet of Things (NB-IoT).With rich experiences in teaching and scientific research, the renowned authors selectively analyze several key technologies that restrict the performance of wireless communication and computer networks.For easy reading, each chapter is illustrated in somewhat the style of lesson plan.The useful reference text will benefit both undergraduate and graduate students in the fields of wireless communication, computer networks, electronic engineering, automatic control, etc.

 

Integration of Unmanned Aerial Vehicles in Wireless Communication and Networks: UAVs and 5G

Автор: alex66 от 16-07-2022, 21:56, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Integration of Unmanned Aerial Vehicles in Wireless Communication and Networks: UAVs and 5G
Автор: Editors: Dushantha Nalin K Jayakody, P. Muthuchidambaranathan, Rui Dinis, Stefan Panic
Издательство: Springer
Год: 2023
Страниц: 167
Размер: 10.86 МБ
Формат: PDF
Язык: English

This book presents a comprehensive overview of Unmanned Arial Vehicles (UAV) and their integration of wireless communications and networks, including inherent challenges and open access concerns. The authors present the latest technologies associated with UAV-assisted wireless communications and networks by linking their association with 5G Wireless Networks.