Autonomic Computing in Cloud Resource Management in Industry 4.0

Автор: literator от 12-08-2021, 01:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Autonomic Computing in Cloud Resource Management in Industry 4.0Название: Autonomic Computing in Cloud Resource Management in Industry 4.0
Автор: Tanupriya Choudhury, Bhupesh Kumar
Издательство: Springer
Год: 2021
Страниц: 411
Язык: английский
Формат: pdf (true), epub
Размер: 56.8 MB

This book describes the next generation of industry - Industry 4.0 - and how it holds the promise of increased flexibility in manufacturing, along with automation, better quality, and improved productivity. The authors discuss how it thus enables companies to cope with the challenges of producing increasingly individualized products with a short lead-time to market and higher quality. The authors posit that intelligent cloud services and resource sharing play an important role in Industry 4.0 anticipated Fourth Industrial Revolution. This book serves the different issues and challenges in cloud resource management (CRM) techniques with proper propped solution for IT organizations. The book has 21 chapters based on the characteristics of autonomic computing with its applicability in CRM. Each chapter features the techniques and analysis of each mechanism to make better resource management in cloud.
 

Design and Development of Efficient Energy Systems

Автор: literator от 10-08-2021, 18:00, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Design and Development of Efficient Energy SystemsНазвание: Design and Development of Efficient Energy Systems
Автор: Suman Lata Tripathi, Dushyant Kumar Singh
Издательство: ‎Wiley-Scrivener
Год: 2021
Страниц: 384
Язык: английский
Формат: pdf (true), epub
Размер: 48.4 MB

There is not a single industry which will not be transformed by Machine Learning (ML) and Internet of Things (IoT). IoT and Machine Learning have altogether changed the technological scenario by letting the user monitor and control things based on the prediction made by Machine Learning algorithms. There has been substantial progress in the usage of platforms, technologies and applications that are based on these technologies. These breakthrough technologies affect not just the software perspective of the industry, but they cut across areas like smart cities, smart healthcare, smart retail, smart monitoring, control, and others. Because of these “game changers,” governments, along with top companies around the world, are investing heavily in its research and development.
 

Cryptography In The Information Society

Автор: TRex от 10-08-2021, 11:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cryptography In The Information Society
Автор: Ryabko Boris, Fionov Andrey
Издательство: World Scientific
Год: 2021
Формат: ePUB, PDF
Страниц: 286
Размер: 17,6 Mb
Язык: English

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.
 

Salt Open: Automating Your Enterprise and Your Network

Автор: TRex от 10-08-2021, 10:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Salt Open: Automating Your Enterprise and Your Network
Автор: Andrew Mallett
Издательство: Apress
Год: 2021
Формат: ePUB, PDF
Страниц: 234
Размер: 10 Mb
Язык: English

There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions.
 

Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers

Автор: TRex от 9-08-2021, 19:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers
Автор: Aaron Roberts
Издательство: Apress
Год: 2021
Формат: ePUB, PDF
Страниц: 221
Размер: 10 Mb
Язык: English

Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization’s resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied as soon as they become available, enabling prevention rather than response.
 

Нейронные сети. Распознавание, управление, принятие решений

Автор: kotmatros255 от 9-08-2021, 18:38, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Нейронные сети. Распознавание, управление, принятие решений
Автор: Барский А.Б.
Издательство: Финансы и статистика
Год: 2004
ISBN: 5-279-02757-X
Формат: pdf
Страниц: 179
Размер: 12,7 Мб
Язык: русский

В книге рассматривается применение нейросетевых технологий при построении информационных и управляющих систем в науке, экономике, финансах и искусстве. Исследуются вопросы разработки нейросетей, представления исходной и обработки выходной информации. Предлагаются простые методы обучения в статическом и динамическом режимах.
 

97 Things Every Cloud Engineer Should Know: Collective Wisdom from the Experts

Автор: literator от 8-08-2021, 15:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

97 Things Every Cloud Engineer Should Know: Collective Wisdom from the ExpertsНазвание: 97 Things Every Cloud Engineer Should Know: Collective Wisdom from the Experts
Автор: Emily Freeman, Nathen Harvey
Издательство: O’Reilly Media, Inc.
Год: 2021
Страниц: 311
Язык: английский
Формат: pdf (true), epub
Размер: 72.9 MB, 10.1 MB

If you create, manage, operate, or configure systems running in the cloud, you're a cloud engineer--even if you work as a system administrator, software developer, data scientist, or site reliability engineer. With this book, professionals from around the world provide valuable insight into today's cloud engineering role. These concise articles explore the entire cloud computing experience, including fundamentals, architecture, and migration. You'll delve into security and compliance, operations and reliability, and software development. And examine networking, organizational culture, and more. You're sure to find 1, 2, or 97 things that inspire you to dig deeper and expand your own career.
 

Auditing Information and Cyber Security Governance; A Controls-Based Approach

Автор: literator от 8-08-2021, 12:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Auditing Information and Cyber Security Governance; A Controls-Based ApproachНазвание: Auditing Information and Cyber Security Governance; A Controls-Based Approach
Автор: Robert E. Davis
Издательство: CRC Press
Год: 2021
Страниц: 299
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

A comprehensive entity security program deploys information asset protection through stratified technological and non-technological controls. Controls are necessary for counteracting threats, opportunities, and vulnerabilities risks in a manner that reduces potential adverse effects to defined, acceptable levels. This book presents a methodological approach in the context of normative decision theory constructs and concepts with appropriate reference to standards and the respective guidelines. Normative decision theory attempts to establish a rational framework for choosing between alternative courses of action when the outcomes resulting from the selection are uncertain. Through the methodological application, decision theory techniques can provide objectives determination, interaction assessments, performance estimates, and organizational analysis. A normative model prescribes what should exist according to an assumption or rule.
 

Software-Defined Networking for Future Internet Technology: Concepts and Applications

Автор: literator от 7-08-2021, 15:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Software-Defined Networking for Future Internet Technology: Concepts and ApplicationsНазвание: Software-Defined Networking for Future Internet Technology: Concepts and Applications
Автор: Kshira Sagar Sahoo, Bibhudatta Sahoo, Brojo Kishore Mishra
Издательство: CRC Press, Apple Academic Press Inc.
Год: 2022
Страниц: 308
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Network infrastructures are growing rapidly to meet the needs of business, but the required repolicing and reconfiguration provide challenges that need to be addressed. The software-defined network (SDN) is the future generation of Internet technology that can help meet these challenges of network management. This book includes quantitative research, case studies, conceptual papers, model papers, review papers, and theoretical backing on SDN. This book investigates areas where SDN can help other emerging technologies deliver more efficient services, such as IoT, industrial IoT, NFV, big data, blockchain, cloud computing, and edge computing. The book demonstrates the many benefits of SDNs, such as reduced costs, ease of deployment and management, better scalability, availability, flexibility and fine-grained control of traffic, and security.
 

Active Directory глазами хакера

Автор: literator от 7-08-2021, 14:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Active Directory глазами хакераНазвание: Active Directory глазами хакера
Автор: Ralf Hacker
Издательство: БХВ-Петербург
Год: 2021
Страниц: 178
Язык: русский
Формат: pdf
Размер: 65.7 MB

Рассмотрена архитектура системы безопасности Active Directory. Приведены сведения об используемом хакерами инструментарии. Последовательно и подробно описываются все этапы атаки на домен глазами злоумышленника: поиск уязвимостей и разведка в атакуемой сети, повышение привилегий, боковое перемещение, поиск и сбор критически важных данных. Описаны способы противодействия обнаружению атаки с применением различных инструментальных средств. Рассматриваются методы сохранения доступа к скомпрометированной сети как с помощью сторонних инструментов, так и с использованием групповых политик домена.