Нечеткие модели и сети (2018)

Автор: umkaS от 27-02-2021, 10:00, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Нечеткие модели и сети
Автор: Борисов В.В., Круглов В.В., Федулов А.С.
Издательство: Горячая линия-Телеком
Год: 2018 - 2-е изд.
Cтраниц: 284
Формат: pdf (ocr)
Размер: 41 мб
Язык: русский

Книга посвящена исследованию нечетких моделей, используемых для описания, анализа и моделирования сложных слабо формализуемых систем и процессов, а также вопросам построения, обучения и использования, во-первых, нечетких нейронных сетей, реализующих нечеткие продукционные, реляционные и функциональные модели, во-вторых, нейронных нечетких сетей, характеризующихся введением нечеткости в различные компоненты традиционных нейронных сетей.
 

Zero Trust Security: An Enterprise Guide

Автор: buratino от 26-02-2021, 23:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Zero Trust Security: An Enterprise Guide
Автор: Jason Garbis, Jerry W. Chapman
Издательство: Apress
Год: 2021
Формат: true pdf/epub
Страниц: 306
Размер: 11.4 Mb
Язык: English

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.
 

Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

Автор: TRex от 26-02-2021, 11:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures
Автор: Brij B. Gupta, Amrita Dahiya
Издательство: CRC Press
Год: 2021
Формат: PDF
Страниц: 140
Размер: 10 Mb
Язык: English

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.
 

Synchronizing 5G Mobile Networks (Rough Cuts)

Автор: buratino от 25-02-2021, 23:49, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Synchronizing 5G Mobile Networks (Rough Cuts)
Автор: Anshul Tanwar, Dennis Hagarty & Shahid Ajmeri
Издательство: Cisco Press
Год: 2021
Формат: epub
Размер: 27.1 Mb
Язык: English

Failure to properly design, implement, and manage it can dramatically reduce mobile network efficiency, reliability and capacity. In 5G environments, time synchronization is even more important to mobile network service providers, and its also increasingly important to a wide array of emerging applications, from finance to IoT to media.
 

Network Programmability and Automation Fundamentals (Rough Cuts)

Автор: buratino от 25-02-2021, 23:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Network Programmability and Automation Fundamentals (Rough Cuts)
Автор: Khaled Abuelenain, Jeff Doyle, Anton Karneliuk & Vinit Jain
Издательство: Cisco Systems, Inc.
Год: 2021
Формат: epub
Страниц: 714
Размер: 19.4 Mb
Язык: English

Network Programmability and Automation, Volume 1, covers designing, implementing, monitoring and operating networks using programmable interfaces on network devices versus the legacy (and soon-to-be obsolete) methods and protocols such as the Command Line Interface (CLI) and Simple Network Management Protocol (SNMP).
 

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership

Автор: buratino от 25-02-2021, 11:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
Автор: Marcus J. Carey, Jennifer Jin
Издательство: Wiley
Год: 2020
Формат: True PDF
Страниц: 313
Размер: 10.5 Mb
Язык: English

The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations.
 

CCNP Enterprise Certification Study Guide: Exam 350-401

Автор: buratino от 25-02-2021, 10:43, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: CCNP Enterprise Certification Study Guide: Exam 350-401
Автор: Ben Piper
Издательство: Sybex
Год: 2020
Формат: true pdf/epub
Страниц: 512
Размер: 11.3 Mb
Язык: English

The practical and conceptual knowledge you need to attain CCNP Enterprise certification
From one of the most trusted study guide publishers comes CCNP Enterprise Certification Study Guide: Exam 350-401. This guide helps you develop practical knowledge and best practices for critical aspects of enterprise infrastructure so you can gain your CCNP Enterprise certification. If you’re hoping to attain a broader range of skills and a solid understanding of Cisco technology, this guide will also provide fundamental concepts for learning how to implement and operate Cisco enterprise network core technologies.

Изменил: buratino по причине: True PDF has been added - https://drive.google.com/file/d/1XrYLiWBn1x9HiN2cd87hvWZ-V_G6buj7/view?usp=sharing

 

AWS Certified Solutions Architect Study Guide: Associate (SAA-C02) Exam Third Edition

Автор: buratino от 25-02-2021, 10:19, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: AWS Certified Solutions Architect Study Guide: Associate (SAA-C02) Exam, Third Edition
Автор: Ben Piper
Издательство: Sybex
Год: 2021
Формат: true pdf/epub
Страниц: 466
Размер: 10.2 Mb
Язык: English

Master the intricacies of Amazon Web Services and efficiently prepare for the SAA-C02 Exam with this comprehensive study guide
 

Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements

Автор: buratino от 24-02-2021, 23:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements (Internet of Everything (IoE))
Автор: Brojo Kishore Mishra (Editor), Sanjay Kumar Kuanar (Editor), Sheng-Lung Peng (Editor), Daniel D. Dasig, Jr. (Editor)
Издательство: CRC Press
Год: 2021
Формат: True PDF
Страниц: 204
Размер: 10 Mb
Язык: English

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development.
 

Ransomware Revolution: The Rise of a Prodigious Cyber Threat

Автор: TRex от 24-02-2021, 18:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ransomware Revolution: The Rise of a Prodigious Cyber Threat
Автор: Matthew Ryan
Издательство: Springer
Год: 2021
Формат: EPUB, PDF
Страниц: 164
Размер: 13,5 Mb
Язык: English

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks.