Auction Theory for Computer Networks

Автор: buratino от 26-05-2020, 02:16, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Auction Theory for Computer Networks
Автор: Dusit Niyato, Nguyen Cong Luong, Ping Wang
Издательство: Cambridge University Press
Год: 2020
Формат: True PDF
Страниц: 290
Размер: 12.8 Mb
Язык: English

Do you have the tools to address recent challenges and problems in modern computer networks? Discover a unified view of auction theoretic applications and develop auction models, solution concepts, and algorithms with this multidisciplinary review. Devise distributed, dynamic, and adaptive algorithms for ensuring robust network operation over time-varying and heterogeneous environments, and for optimizing decisions about services, resource allocation, and usage of all network entities.
 

Internet of Things (IoT): Concepts and Applications

Автор: buratino от 25-05-2020, 20:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Internet of Things (IoT): Concepts and Applications (S.M.A.R.T. Environments)
Автор: Mansaf Alam (Editor), Kashish Ara Shakil (Editor), Samiya Khan (Editor)
Издательство: Springer
Год: 2020
Формат: true pdf/epub
Страниц: 549
Размер: 58.8 Mb
Язык: English

This books objective is to explore the concepts and applications related to Internet of Things with the vision to identify and address existing challenges. Additionally, the book provides future research directions in this domain, and explores the different applications of IoT and its associated technologies. Studies investigate applications for crowd sensing and sourcing, as well as smart applications to healthcare solutions, agriculture and intelligent disaster management.
 

From Visual Surveillance to Internet of Things: Technology and Applications

Автор: buratino от 25-05-2020, 13:06, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: From Visual Surveillance to Internet of Things: Technology and Applications
Автор: Lavanya Sharma (Editor), Pradeep K. Garg (Editor)
Издательство: Taylor & Francis Group
Год: 2020
Формат: True PDF
Страниц: 273
Размер: 10.5 Mb
Язык: English

From Visual Surveillance to Internet of Things: Technology and Applications is an invaluable resource for students, academicians and researchers to explore the utilization of Internet of Things with visual surveillance and its underlying technologies in different application areas. Using a series of present and future applications – business insights, indoor-outdoor securities, smart grids, human detection and tracking, intelligent traffic monitoring, e-health department and many more – this book will support readers to obtain a deeper knowledge in implementing IoT with visual surveillance.
 

SecureCSocial: Secure Cloud-Based Social Network Vol.1

Автор: buratino от 23-05-2020, 19:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: SecureCSocial: Secure Cloud-Based Social Network (World Scientific Series in Digital Forensics and Cybersecurity Book 1)
Автор: Pradeep K Atrey, Kasun Senevirathna
Издательство: World Scientific Publishing Co
Год: 2020
Формат: True PDF
Страниц: 158
Размер: 18 Mb
Язык: English

The use of online social networks (OSNs) has grown exponentially in recent years, and these OSNs continue to have an ever-increasing impact on human lives. There are many concerns regarding the privacy of users in these environments, such as how trustworthy the social network operators (SNOs) are.
This book presents a way to tackle the security and privacy issues in current OSNs through a new framework for online social networking, based on distributed cloud-based datacenters (CDCs) and using Shamir's secret sharing (SSS) as the method of encrypting user profile data.
 

Ethical Hacking: From Beginner to Advanced: Learn Ethical Hacking from A to Z

Автор: literator от 23-05-2020, 19:02, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Ethical Hacking: From Beginner to Advanced: Learn Ethical Hacking from A to ZНазвание: Ethical Hacking: From Beginner to Advanced: Learn Ethical Hacking from A to Z
Автор: Shubham Yadav
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 109
Язык: английский
Формат: pdf. azw3
Размер: 19.3 MB

If you want to learn about what is Ethical Hacking? And, How Hackers hack into the system. Then you have come to the right place. Ethical hacking is a profession that has gained popularity in the last few years. Network Security and Cyber Security have become important aspects of every business. Hackers have always hacked the network or server of an organization to obtain personal information that can derail the company. It is for this reason that organizations have begun to hire the professionals to help them maintain this security. These professionals are ethical hackers. An ethical hacker will run numerous tests and hacks that another cracker may use to obtain sensitive information about the system.
 

The Design of Rijndael: The Advanced Encryption Standard 2nd edition

Автор: buratino от 23-05-2020, 19:00, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Design of Rijndael: The Advanced Encryption Standard (AES) (Information Security and Cryptography) Second edition
Автор: Joan Daemen, Vincent Rijmen
Издательство: Springer
Год: 2020
Формат: true pdf/rtf/fb2
Страниц: 286
Размер: 10 Mb
Язык: English

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.
 

Handbook of Research on Machine and Deep Learning Applications for Cyber Security

Автор: literator от 23-05-2020, 17:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Handbook of Research on Machine and Deep Learning Applications for Cyber SecurityНазвание: Handbook of Research on Machine and Deep Learning Applications for Cyber Security
Автор: Padmavathi Ganapathi, D. Shanmugapriya
Издательство: IGI Global
Год: 2020
Страниц: 507
Язык: английский
Формат: pdf (true)
Размер: 15.1 MB

As the advancement of technology continues, cyber security continues to play a significant role in today's world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security.
 

Security and Privacy Issues in Sensor Networks and IoT

Автор: buratino от 23-05-2020, 17:32, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy Issues in Sensor Networks and IoT
Автор: Priyanka Ahlawat (Author, Editor), Mayank Dave (Editor)
Издательство: IGI Global
Год: 2020
Формат: true pdf/fb2
Страниц: 351
Размер: 17.9 Mb
Язык: English

As technology continues to expand and develop, the internet of things (IoT) is playing a progressive role in the infrastructure of electronics. The increasing amount of IoT devices, however, has led to the emergence of significant privacy and security challenges.
 

Networking Games: Network Forming Games and Games on Networks

Автор: TRex от 23-05-2020, 02:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Networking Games: Network Forming Games and Games on Networks
Автор: Vladimir Mazalov, Julia V. Chirkova
Издательство: Academic Press
Год: 2019
Формат: PDF
Страниц: 312
Размер: 10 Mb
Язык: English

Networking Games: Network Forming Games and Games on Networks applies game theory methods to network analyses. Its concentration on rigorous mathematical techniques distinguishes it from other books on game theory. Developed by a mathematician and game theorist with extensive contributions to applied mathematics, game and probability theory, and written for graduate students and professionals, the book's illuminations on network games can be applied to problems in economics (in industrial organization, regulation and competition policy, for instance) and operations research.
 

Security and Privacy in Communication Networks: 12th International Conference, SecureComm 2016

Автор: harun54 от 22-05-2020, 18:03, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security and Privacy in Communication Networks: 12th International Conference, SecureComm 2016
Автор: Robert Deng, Jian Weng
Издательство: Springer
Год: 2017
Формат: PDF
Размер: 32 Мб
Язык: английский / English

This book constitutes the refereed conference proceedings of the 12th International Conference on Security and Privacy in Communications Networks, SecureComm 2016, held in Guangzhou, China, in October 2016. The 32 revised full papers and 18 poster papers were carefully reviewed and selected from 137 submissions. The papers are organized thematically starting with mobile and network security, followed by applied cryptography, web security and privacy, system security, hardware security. The volume also includes papers from the ATCS workshop and the poster session.