Интернет. Полное руководство

Автор: gol8425 от 6-07-2021, 09:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Интернет. Полное руководство
Автор: М.В. Антоненко, А.П. Томашевский, Р.Г. Прокди
Издательство: Наука и Техника
Год: 2012
Страниц: 562
ISBN: 978-5-94387-680-6
Формат: PDF
Размер: 64 Mб
Язык: русский

Данная книга является наиболее полным руководством по работе в Интернете, в которой рассмотрено огромное количество вопросов, тем и сервисов, связанных с Интернетом. Текст книги сопровождается огромным количеством полезных ссылок на лучшие интернет-ресурсы самой разной тематики. В конце книги вы найдёте словарик интернет-терминов.
 

Архитектура и стратегия. "Инь" и "янь" информационных технологий предприятия

Автор: kotmatros255 от 6-07-2021, 06:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Архитектура и стратегия. "Инь" и "янь" информационных технологий предприятия
Автор: Данилин А., Слюсаренко А.
Издательство: Интернет-университет информационных технологий
Год: 2005
ISBN: 5-9556-0045-0
Формат: pdf
Страниц: 504
Размер: 22,1 Мб
Язык: русский

В книге на основе обширногo материала и опыта зарубежных компаний поставщиков информационных технологий, аналитических и консалтинговых компаний, а также публичных материалов Интернета дается систематичное введение и описание cовpeмeннoгo состояния вопросов разработки и использования архитектуры и стратегии информационных технологий предприятий.
 

Security of Cloud-based Systems

Автор: literator от 4-07-2021, 17:08, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Security of Cloud-based SystemsНазвание: Security of Cloud-based Systems
Автор: Jovan Pehcevski
Издательство: Arcler Press
Год: 2021
Страниц: 434
Язык: английский
Формат: pdf (true)
Размер: 18.7 MB

‎The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. This edition covers different topics from security of cloud-based systems, including: threats detection in cloud environments, frameworks for cloud security, enhancing the security in the cloud systems, and the case studies.
 

Computer Networks and Communications (2021)

Автор: literator от 3-07-2021, 18:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Computer Networks and Communications (2021)Название: Computer Networks and Communications
Автор: Adele Kuzmiakova
Издательство: Arcler Press
Год: 2021
Страниц: 292
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book describes computer networks from the perspective of administrators, pointing out that the network is fundamentally a private network consisting of a single independent system that cannot be accessed away from its physical and logical domains. The network may be a public network, it can be all-access, or a private network that only a few individuals can access. The book introduces computer networks and data communication, which is a system composed of interconnected computers and computer peripherals (such as printers and multimedia devices). This interconnection between computers facilitates information distribution between them. Wired and wireless multimedia communications are deliberated in the book. Similarly, there are topics about the physical and logical features of a network.
 

Cyber Security Meets Machine Learning

Автор: TRex от 3-07-2021, 13:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cyber Security Meets Machine Learning
Автор: Xiaofeng Chen, Willy Susilo, Elisa Bertino
Издательство: Springer
Год: 2021
Формат: ePUB, PDF
Страниц: 168
Размер: 15 Mb
Язык: English

Have you ever received a phone call informing you that you have a virus on your computer, or a slow Internet connection? Have you ever wondered why you get so much SPAM? Are you concerned your computer might end up with a virus and you'll lose all your files? Does anyone know what the Cloud actually is?
 

The Ultimate Guide to Outsourcing Your Auth

Автор: TRex от 3-07-2021, 10:41, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Ultimate Guide to Outsourcing Your Auth
Автор: Dan Moore
Издательство: Leanpub
Год: 2021
Формат: PDF, ePUB, MOBI
Страниц: 161
Размер: 10 Mb
Язык: English

Curious about using a SaaS or open source solution for your auth, identity and access management needs? This book will cover how to evaluate an auth system, risks you might encounter and how to mitigate them, and migration and implementation details. Almost every software application has users. In the online world, applications may have one or few users, if internal, or billions of users, if Facebook (hi Zuck!). Most applications customize functionality and the user interface for each user because of business rules or customer expectations.
 

Multimedia Sensor Networks (Advances in Computer Science and Technology)

Автор: literator от 2-07-2021, 21:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Multimedia Sensor Networks (Advances in Computer Science and Technology)Название: Multimedia Sensor Networks
Автор: Huadong Ma, Liang Liu
Издательство: Springer
Год: 2021
Страниц: 258
Язык: английский
Формат: pdf (true)
Размер: 13.2 MB

Sensor networks are an essential component of the Internet of Things (IoT), and Multimedia Sensor Networks (MSNs) are the most important emerging area in sensor networks. However, multimedia sensing is characterized by diversified modes, large volumes of data, considerable heterogeneity, and complex computing, as a result of which the theory and methods for traditional sensor networks can’t be applied to MSNs.
 

The Past Web: Exploring Web Archives

Автор: TRex от 1-07-2021, 10:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Past Web: Exploring Web Archives
Автор: Daniel Gomes, Elena Demidova, Jane Winters, Thomas Risse
Издательство: Springer
Год: 2021
Формат: PDF
Страниц: 301
Размер: 10 Mb
Язык: English

This book provides practical information about web archives, offers inspiring examples for web archivists, raises new challenges, and shares recent research results about access methods to explore information from the past preserved by web archives.
 

New Media and Visual Communication in Social Networks

Автор: harun54 от 1-07-2021, 10:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: New Media and Visual Communication in Social Networks
Автор: Serpil Kir
Издательство: IGI Global
Год: 2019
Формат: EPUB
Размер: 16 Мб
Язык: английский / English

Social media and new social facilities have made it necessary to develop new media design processes with different communication strategies in order to promote sustainable communication. Visual communication emphasizes messages that are transmitted through visual materials in order to effectively communicate emotions, thoughts, and concepts using symbols instead of words. Social networks present an ideal environment for utilizing this communication technique. New Media and Visual Communication in Social Networks is a pivotal scholarly publication that examines communication strategies in the context of social media and new digital media platforms and explores the effects of visual communication on social networks, visual identity, television, magazines, newspapers, and more. Highlighting a range of topics such as consumer behavior, visual identity, and digital pollution, this book is essential for researchers, practitioners, entrepreneurs, policymakers, and educators.
 

CISSP Exam Cram, 5th Edition (Final)

Автор: literator от 1-07-2021, 03:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

CISSP Exam Cram, 5th Edition (Final)Название: CISSP Exam Cram, 5th Edition (Final)
Автор: Michael Gregg
Издательство: Pearson
Год: 2021
Страниц: 800
Язык: английский
Формат: epub
Размер: 10.1 MB

CISSP Exam Cram, Fifth Edition is the perfect study guide to help you pass the latest update to the eight-domain version of the CISSP exam. It offers knowledge and practice questions for every exam topic, with new coverage of asset retention, secure provisioning, crypto attacks, machine learning tools, threat hunting, risk-based access control, zero trust, SAML, SOAR, CASB, securing microservices, containers, managed services, and more.