The Quantum Internet: The Second Quantum Revolution

Автор: TRex от 11-12-2021, 08:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Quantum Internet: The Second Quantum Revolution
Автор: Peter Rohde
Издательство: Cambridge University Press
Год: 2021
Формат: PDF
Страниц: 364
Размер: 10 Mb
Язык: English

Following the emergence of quantum computing, the subsequent quantum revolution will be that of interconnecting individual quantum computers at the global level. In the same way that classical computers only realised their full potential with the emergence of the internet, a fully-realised quantum internet is the next stage of evolution for quantum computation. This cutting-edge book examines in detail how the quantum internet would evolve in practise, focusing not only on the technology itself, but also the implications it will have economically and politically, with numerous non-technical sections throughout the text providing broader context to the discussion. The book begins with a description of classical networks before introducing the key concepts behind quantum networks, such as quantum internet protocols, quantum cryptography, and cloud quantum computing. Written in an engaging style and accessible to graduate students in physics, engineering, computer science and mathematics.
 

Information Security Management Principles, 3rd edition

Автор: literator от 10-12-2021, 19:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Information Security Management Principles, 3rd editionНазвание: Information Security Management Principles, 3rd edition
Автор: David Alexander, Amanda Finch, David Sutton
Издательство: BCS, The Chartered Institute for IT
Год: 2020
Страниц: 271
Язык: английский
Формат: pdf (true), epub (true)
Размер: 15.5 MB

Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A compromise has to be struck between security of information and its availability. This book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner. The third edition has been updated to reflect changes in the IT security landscape and updates to the BCS Certification in Information Security Management Principles, which the book supports.
 

Security Operations in Practice

Автор: literator от 10-12-2021, 16:22, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security Operations in PracticeНазвание: Security Operations in Practice
Автор: Mike Sheward
Издательство: BCS, The Chartered Institute for IT
Год: 2020
Страниц: 254
Язык: английский
Формат: pdf (true), epub
Размер: 11.3 MB

With this book, my aim has been to explore the most effective ways to perform the various functions of the security operations team, and provide real-world examples that should supplement the theory. Nothing is worse than a textbook that teaches the theoretical best way to achieve something, when there is absolutely no practical way for that to work in reality. Covers building and growing an effective security operations team- both the blue side (defensive) and the red side (simulating attack). Includes the human element of security operations - building trust etc. Contains real-life examples and industry case studies.
 

Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges

Автор: literator от 9-12-2021, 16:48, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Digitalization of Higher Education using Cloud Computing: Implications, Risk, and ChallengesНазвание: Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges
Автор: S. L. Gupta, Nawal Kishor, Niraj Mishra
Издательство: CRC Press
Серия: Chapman & Hall/ CRC Cloud Computing for Society 5.0
Год: 2022
Страниц: 243
Язык: английский
Формат: pdf (true)
Размер: 17.8 MB

Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and tools being used to explore learning in Higher Educational Institutions (HEIs). Cloud computing, being an up-and-coming technology, integrates with academia and industry, thereby enhancing the quality of education. The opportunities and challenges faced by HEIs in recent times due to technological disruptions have forced both academia and industry to realign their strategies for survival and growth. With the acceleration of cloud computing in higher education, it has now become imperative for educators to constantly upskill and reskill in order to meet the requirements of the future of work, particularly in the digital age.
 

Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns

Автор: literator от 9-12-2021, 15:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Vehicular Communications for Smart Cars: Protocols, Applications and Security ConcernsНазвание: Vehicular Communications for Smart Cars: Protocols, Applications and Security Concerns
Автор: Niaz Chowdhury, Lewis Mackenzie
Издательство: CRC Press
Год: 2022
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 17.1 MB

This book comprehensively covers a wide range of topics from the smart transportation domain. It discusses protocols, applications, and security concerns in various vehicular networks using examples and easy-to-understand figures. The book's first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust, and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. A Vehicle to Vehicle (V2V) communication system can offer a wide range of powerful applications to improve the driving experience. The Internet of Things (IoT) is an outstanding evolution that enables communication between numerous devices through sensors, actuators, embedded systems, and various other technologies via the Internet.
 

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

Автор: buratino от 9-12-2021, 03:00, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks
Автор: Gunikhan Sonowal
Издательство: Apress
Год: 2022
Формат: true pdf/epub
Страниц: 230
Размер: 16.8 Mb
Язык: English

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.
The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.
 

Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2

Автор: literator от 8-12-2021, 17:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2Название: Artificial Intelligence, Cybersecurity and Cyber Defense, Volume 2
Автор: Daniel Ventre
Издательство: Wiley, ISTE
Год: 2020
Страниц: 272
Язык: английский
Формат: epub
Размер: 10.2 MB

The aim of the book is to analyse and understand the impacts of Artificial Intelligence (AI) in the fields of national security and defense; to identify the political, geopolitical, strategic issues of AI; to analyse its place in conflicts and cyberconflicts, and more generally in the various forms of violence; to explain the appropriation of Artificial Intelligence by military organizations, but also law enforcement agencies and the police; to discuss the questions that the development of Artificial Intelligence and its use raise in armies, police, intelligence agencies, at the tactical, operational and strategic levels.
 

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications

Автор: literator от 7-12-2021, 17:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security and Privacy in the Internet of Things: Architectures, Techniques, and ApplicationsНазвание: Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications
Автор: Ali Ismail Awad, Jemal Abawajy
Издательство: Wiley-IEEE Press
Год: 2022
Страниц: 339
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Provides the authoritative and up-to-date information required for securing IoT architecture and applications. The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers.
 

Kafka Up and Running for Network DevOps: Set Your Network Data in Motion

Автор: TRex от 7-12-2021, 06:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Kafka Up and Running for Network DevOps: Set Your Network Data in Motion
Автор: Eric Chou
Издательство: Leanpub
Год: 2021
Формат: ePUB, PDF
Страниц: 153
Размер: 10 Mb
Язык: English

Today's network is about agility, automation, and continuous improvement. In Kafka Up and Running for Network DevOps, we will be on a journey to learn and set up the hugely popular Apache Kafka data messaging system. Kafka is unique in its principle to treat network data as a continuous flow of information that can adapt to the ever-changing business requirements. Whether you need a system to aggregate log messages, collect metrics, or something else, Kafka can be the reliable, highly redundant system you want.
 

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition

Автор: literator от 6-12-2021, 20:20, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd EditionНазвание: Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access, 2nd Edition
Автор: Douglas H. Morais
Издательство: Springer
Год: 2022
Страниц: 337
Язык: английский
Формат: pdf (true), epub
Размер: 27.1 MB

This second edition is an update of the first publication. Material in the first edition addressed mainly the key physical layer technologies associated with 3GPP release 15, the first release to support 5G. This edition adds descriptions of some of the technological advancements supported in release 16, including integrated access and backhaul (IAB), sidelink communication, NR positioning, operation in unlicensed bands, and multiple transmission points transmission. It also expands upon some of the original material. Finally, to make the book more pedagogically applicable, problems have been added at the end of those chapters where the material lends itself to associated meaningful computational and/or descriptive problems.