Handbook of Research on Machine and Deep Learning Applications for Cyber Security

Автор: literator от 23-05-2020, 17:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Handbook of Research on Machine and Deep Learning Applications for Cyber SecurityНазвание: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Автор: Padmavathi Ganapathi, D. Shanmugapriya
Издательство: IGI Global
Год: 2020
Страниц: 507
Язык: английский
Формат: pdf (true)
Размер: 15.1 MB

As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security.
 

Security and Privacy Issues in Sensor Networks and IoT

Автор: buratino от 23-05-2020, 17:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy Issues in Sensor Networks and IoT
Автор: Priyanka Ahlawat (Author, Editor), Mayank Dave (Editor)
Издательство: IGI Global
Год: 2020
Формат: true pdf/fb2
Страниц: 351
Размер: 17.9 Mb
Язык: English

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges.
 

Networking Games: Network Forming Games and Games on Networks

Автор: TRex от 23-05-2020, 02:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Networking Games: Network Forming Games and Games on Networks
Автор: Vladimir Mazalov, Julia V. Chirkova
Издательство: Academic Press
Год: 2019
Формат: PDF
Страниц: 312
Размер: 10 Mb
Язык: English

Networking Games: Network Forming Games and Games on Networks applies game theory methods to network analyses. Its concentration on rigorous mathematical techniques distinguishes it from other books on game theory. Developed by a mathematician and game theorist with extensive contributions to applied mathematics, game and probability theory, and written for graduate students and professionals, the book's illuminations on network games can be applied to problems in economics (in industrial organization, regulation and competition policy, for instance) and operations research.
 

Security and Privacy in Communication Networks: 12th International Conference, SecureComm 2016

Автор: harun54 от 22-05-2020, 18:03, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy in Communication Networks: 12th International Conference, SecureComm 2016
Автор: Robert Deng, Jian Weng
Издательство: Springer
Год: 2017
Формат: PDF
Размер: 32 Мб
Язык: английский / English

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.
 

Wireless and Guided Wave Electromagnetics: Fundamentals and Applications

Автор: harun54 от 22-05-2020, 17:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Wireless and Guided Wave Electromagnetics: Fundamentals and Applications
Автор: Le Nguyen Binh
Издательство: CRC Press
Год: 2017
Формат: PDF
Размер: 36 Мб
Язык: английский / English

Wireless communications allow high-speed mobile access to a global Internet based on ultra-wideband backbone intercontinental and terrestrial networks. Both of these environments support the carrying of information via electromagnetic waves that are wireless (in free air) or guided through optical fibers. Wireless and Guided Wave Electromagnetics: Fundamentals and Applications explores the fundamental aspects of electromagnetic waves in wireless media and wired guided media. This is an essential subject for engineers and physicists working with communication technologies, mobile networks, and optical communications.
 

Smart Things & Femtocells: From Hype to Reality

Автор: harun54 от 22-05-2020, 15:53, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Smart Things & Femtocells: From Hype to Reality
Автор: Fadi Al-Turjman
Издательство: CRC Press
Год: 2018
Формат: PDF
Размер: 13 Мб
Язык: английский / English

This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications.
 

Industrial IoT Application Architectures and Use Cases

Автор: literator от 22-05-2020, 14:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Industrial IoT Application Architectures and Use CasesНазвание: Industrial IoT Application Architectures and Use Cases
Автор: A. Suresh, Malarvizhi Nandagopal
Издательство: Auerbach Publications / CRC Press
Год: 2020
Страниц: 204
Язык: английский
Формат: True PDF
Размер: 13.1 MB

As the number of Internet of Things (IoT) elements grows exponentially, their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge, which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI), data analytics, and IoT technology combine to promote intelligent decision-making and automation in a range of industries.
 

Cross-Site Scripting Attacks: Classification, Attack and Countermeasures

Автор: buratino от 22-05-2020, 09:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Cross-Site Scripting Attacks: Classification, Attack and Countermeasures (Security, Privacy and Trust in Mobile Communications)
Автор: B. B. Gupta, Pooja Chaudhary
Издательство: CRC Press
Год: 2020
Формат: true pdf/epub
Страниц: 170
Размер: 11.5 Mb
Язык: English

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions.
 

Администрирование сетей. Логическая организация и конфигурирование

Автор: Igor1977 от 22-05-2020, 09:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Администрирование сетей. Логическая организация и конфигурирование
Автор: Ларина Т.Б.
Издательство: М.: РУТ (МИИТ)
Год: 2017
Формат: pdf
Страниц: 171
Размер: 16 mb
Язык: русский

Учебное пособие посвящено основам логической организации и конфигурированию сетей на базе Microsoft Windows Server. Рассматриваются принципы структурной организации сети, конфигурирование контроллера сетевого домена, централизованное управление объектами сети с помощью службы каталогов Active Directory, сетевые протоколы и службы в сетях Windows, методы и службы разрешения символических имен узлов в сети.
 

Ensuring Network Security through the Use of the Honeypot Technique

Автор: buratino от 22-05-2020, 03:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ensuring Network Security through the Use of the Honeypot Technique
Автор: Kuthadi Venu Madhav Rajalakshmi Selvaraj
Издательство: Cambridge Scholars Publishing
Год: 2020
Формат: true pdf/rtf
Страниц: 162
Размер: 10 Mb
Язык: English

In modern technology networks, security plays an important role in safeguarding data. Detecting the threats posed by hackers, and capturing the data about such attacks are known as the virtual honeypot. This book details the process, highlighting how to confuse the attackers and to direct them onto the wrong path.