Cloud Native Data Center Networking: Architecture, Protocols, and Tools, 1st Edition

Автор: literator от 15-09-2021, 18:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cloud Native Data Center Networking: Architecture, Protocols, and Tools, 1st Edition
Автор: Dinesh G. Dutt
Издательство: O’Reilly Media, Inc.
Год: 2020
Страниц: 486
Язык: английский
Формат: pdf (true), epub
Размер: 10.27 MB, 10.07 MB

If you want to study, build, or simply validate your thinking about modern cloud native data center, networks, this is your book. Whether you’re pursuing a multitenant private cloud, a network for running machine learning, or an enterprise data center, author Dinesh Dutt takes you through the steps necessary to design a data center that’s affordable, high capacity, easy to manage, agile, and reliable.
 

Exam Ref SC-200 Microsoft Security Operations Analyst

Автор: TRex от 15-09-2021, 14:09, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Exam Ref SC-200 Microsoft Security Operations Analyst
Автор: Yuri Diogenes, Jake Mowrer, Sarah Young
Издательство: Pearson
Год: 2022
Формат: ePUB
Страниц: 336
Размер: 27,1 Mb
Язык: English

Prepare for Microsoft Exam SC-200―and help demonstrate your real-world mastery of skills and knowledge required to work with stakeholders to secure IT systems, and to rapidly remediate active attacks. Designed for Windows administrators, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Associate level.
 

Implementing VMware Dynamic Environment Manager

Автор: TRex от 15-09-2021, 12:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Implementing VMware Dynamic Environment Manager: Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies and Complete Troubleshooting
Автор: Peter von Oven
Издательство: BPB Publications
Год: 2022
Формат: ePUB, PDF
Страниц: 1239
Размер: 56,8 Mb
Язык: English

Implementing VMware Dynamic Environment Manager is the definitive guide to installing and managing end-user desktop environments using the VMware Dynamic Environment Manager solution and tools.
To begin with, you will be able to explore what environment management is, and why you need it in your business infrastructure before discussing the VMware solutions. You will quickly get speedy with installing and configuring the DEM in real-time, using screenshots, and step-by-step directions. You will then be able to explore how to manage end-user environments, wherein you can focus on personalization, configuring the end-user environment, and creating condition sets for triggering when certain policies get applied.
 

Internet of Things (IoT): Principles, Paradigms and Applications of IoT

Автор: harun54 от 15-09-2021, 11:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Internet of Things (IoT): Principles, Paradigms and Applications of IoT
Автор: Dr Kamlesh Lakhwani, Dr Hemant Kumar Gianey
Издательство: BPB Publications
Год: 2020
Формат: PDF, EPUB
Размер: 10 Мб
Язык: английский / English

In this book, Principles, Paradigm frameworks, and Applications of IoT (Internet of Things) in the modern era are presented. It also provides a sound understanding of the IoT concepts, architecture, and applications, and improves the awareness of readers about IoT technologies and application areas. A key objective of this book is to provide a systematic source of reference for all aspects of IoT. This book comprises nine chapters with close co-operation and contributions from four different authors, spanning across four countries and providing a global, broad perspective on major topics on the Internet of Things.
 

Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing

Автор: literator от 12-09-2021, 18:25, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
Автор: Surbhi Rastogi
Издательство: BPB Publications
Год: 2021
Страниц: 584
Язык: английский
Формат: pdf, epub
Размер: 10.19 MB

Getting familiar with cloud computing features from scratch to advanced. Cloud computing is a technology that allows you to store, access data and programs over the internet instead of the hard drive or a server. In this book, you will gain knowledge about the fundamentals of cloud computing. This book includes a detailed description of the features of the cloud, the importance of cloud in today's era, and uses of cloud computing. This book provides you with a deep knowledge of the basics of cloud computing. You will learn about the characteristics, architecture, and uses and importance of cloud computing. This book also explores the concept of scalability and redundancy regarding cloud computing. You will learn about the various cloud deployment and service models. You will also gain knowledge of virtualization technology. You will also have a guided tour of concepts related to cloud management, data storage and security, and cloud operations and technologies. At the end of the book, you will learn about the advanced concepts of cloud computing and also learn about mobile cloud computing.
 

Networked Control Systems: Theory, Applications and Analysis

Автор: literator от 12-09-2021, 16:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Networked Control Systems: Theory, Applications and Analysis
Автор: Shiwen Tong, Dianwei Qian
Издательство: Nova Science Pub Inc
Год: 2021
Страниц: 172
Язык: английский
Формат: pdf (true)
Размер: 11.45 MB

Networked Control System (NCS) can be regarded as a special type of control system in which sensors, controllers and actuators are connected to a closed loop. Media-sharing characteristics, time-delay, data packet dropout and data displacement are inevitable phenomena in such a control system, which can greatly degrade the control performance, and even make the control system unstable. Alleviating these effects has become one of the most attractive research hotspots in the last two decades. All the above three problems can be summarized as the time-delay issue. In this book, different aspects of networked control are explored. Chapters includes some new tendencies and developments in research on Networked Predictive Fuzzy Control (NPFC), Data-based Networked Tracking Control (DNTC), Data-based Adaptive Networked Tracking Control (DNATC), Controller Parameters Tuning through Network, Event-Triggered Control of Networked System and Multi-Agent Systems (MAS).
 

The Smart Cyber Ecosystem for Sustainable Development

Автор: literator от 12-09-2021, 16:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Smart Cyber Ecosystem for Sustainable Development
Автор: Pardeep Kumar, Vishal Jain, Vasaki Ponnusamy
Издательство: Wiley-Scrivener
Год: 2021
Страниц: 480
Язык: английский
Формат: pdf (true), epub
Размер: 65.9 MB

The Cyber Ecosystem can be a replica of our natural ecosystem where different living and non-living things interact with each other to perform specific tasks. Similarly, the different entities of the cyber ecosystem collaborate digitally with each other to revolutionize our lifestyle by creating smart, intelligent, and automated systems/processes. The main actors of the cyber ecosystem, among others, are the Internet of Things (IoT), Artificial Intelligence (AI), and the mechanisms providing cybersecurity.
 

VoIP Telephony and You: A Guide to Design and Build a Resilient Infrastructure for Enterprise Communications Using the VoIP Technology

Автор: literator от 12-09-2021, 15:25, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: VoIP Telephony and You: A Guide to Design and Build a Resilient Infrastructure for Enterprise Communications Using the VoIP Technology
Автор: Rashmi Nanda
Издательство: BPB Publications
Год: 2021
Страниц: 646
Язык: английский
Формат: pdf, epub
Размер: 17.3 MB

A Game Changer for WFH Practitioners. "VoIP Telephony and You" introduces you to new and advanced ways of communicating over traditional telephony realms. Telcos use public internet private IPs for this long-distance voice communication. This book describes how VoIP encompasses the capability to encode and deliver content in real-time across digitized networks. In this book, you will learn about VoIP regulations, VoIP hardware and software, video conferencing servers, SWOT analysis of Telcos, switching technology. You will also learn about the TCP/IP, market, Economics model, business model, and technology models. You will learn how to eliminate echo by understanding the various interfaces of VoIP and a number of digital protocols. This book will also provide you with a solution to design and maintain communication systems that can be used reliably. This book includes several best practices and security measures to secure conversations by use of surveillance methods and VoIP security provisions.
 

Blockchain and IoT Integration: Approaches and Applications

Автор: TRex от 12-09-2021, 10:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Blockchain and IoT Integration: Approaches and Applications
Автор: Kavita Saini
Издательство: CRC Press
Год: 2022
Формат: True PDF
Страниц: 208
Размер: 18,3 Mb
Язык: English

As technology continues to advance and the interconnection of various devices makes our lives easier, it also puts us at further risk of privacy and security threats. Phones can connect to household devices to help set alarms, turn on or off the lights, and even preheat ovens. The Internet of Things (IoT) is this symbiotic interplay of smart devices that collect data and make intelligent decisions.
 

Cybersecurity and Third-Party Risk: Third Party Threat Hunting

Автор: literator от 11-09-2021, 22:24, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Cybersecurity and Third-Party Risk: Third Party Threat HuntingНазвание: Cybersecurity and Third-Party Risk: Third Party Threat Hunting
Автор: Gregory C. Rasner
Издательство: Wiley
Год: 2021
Страниц: 483
Язык: английский
Формат: pdf (true) + pdf (conv), epub
Размер: 10.16 MB, 10.1 MB

Strengthen the weakest links in your cybersecurity chain. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation.