Яндекс.Книга

Автор: Max148 от 1-05-2020, 08:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Яндекс.Книга
Автор: Дмитрий Соколов-Митрич
Издательство: Манн, Иванов и Фербер
Год: 2014
Формат: PDF/RTF
Страниц: 300
Размер: 10.1 Мб
Язык: русский

Это захватывающая и практически полная история крупнейшей IT-компании России, основанная на десятках авторских интервью с теми, кто строил главный поисковик Рунета начиная с 90-х и заканчивая сегодняшним днем.
 

Insider Secrets to Internet Safety: Advice From a Professional Hacker

Автор: buratino от 1-05-2020, 02:42, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Insider Secrets to Internet Safety: Advice From a Professional Hacker
Автор: Terry Cutler
Издательство: Smiling Eyes Press
Год: 2020
Формат: epub/pdf(conv.)
Страниц: 135
Размер: 12 Mb
Язык: English

In a world of digital technology, it’s easy to forget one sobering fact: our identity can be stolen from under our noses, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere and on any one of our darling gadgets. Cybercriminals, malware, botnets and all forms of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information. Terry Cutler, a Certified Ethical Hacker, reminds us of how vulnerable our data is, through chilling real-life stories, such as that of a simple USB key left purposefully behind, in a targeted enterprise’s lavatory, where an unsuspecting (albeit good-willed) employee can just pick it up, plug it in and thus, lead the criminals right into the company’s core data, or to your home computer.
 

Kali Linux for Beginners: A Practical Guide by Matt Foster

Автор: buratino от 29-04-2020, 19:04, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Kali Linux for Beginners: A Practical Guide to Learn the Operating System Installation and configuration, including Networks, Ethical Hacking and the Main Tools Explanation for an Easy Everyday Use
Автор: Matt Foster
Издательство: Amazon
Год: 2019
Формат: epub/pdf(conv.)
Страниц: 134
Размер: 2.8 Mb
Язык: English

Here’s what you’ll learn:
The top reasons why you should choose Linux as your operating system
How to install Linux without technical knowledge
Why Kali Linux is the best operating system for ethical hackers
The best beginner-friendly hacking tools in Kali Linux
The key principles of cybersecurity that every Internet user should know
And much more!
 

Hacking for Beginners: A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking

Автор: literator от 29-04-2020, 16:23, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Hacking for Beginners: A Step by Step Guide for you to Learn the Basics of CyberSecurity and HackingНазвание: Hacking for Beginners: A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking
Автор: Ramon Nastase
Издательство: Amazon.com Services LLC
Год: 2018
Страниц: 177
Язык: английский
Формат: pdf, epub
Размер: 15.1 MB

Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do in order to protect yourself from all kind of hacking techniques.
 

Behind and Beyond the Meter: Digitalization, Aggregation, Optimization, Monetization

Автор: buratino от 29-04-2020, 03:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Behind and Beyond the Meter: Digitalization, Aggregation, Optimization, Monetization
Автор: Fereidoon P. Sioshansi (Editor)
Издательство: Academic Press
Год: 2020
Формат: True PDF
Страниц: 460
Размер: 21.2 Mb
Язык: English

The historical ways in which electricity was generated in large central power plants and delivered to passive customers through a one-way transmission and distribution network – as everyone knows – is radically changing to one where consumers can generate, store and consume a significant portion of their energy needs energy locally. This, however, is only the first step, soon to be followed by the ability to share or trade with others using the distribution network. More exciting opportunities are possible with the increased digitalization of BTM assets, which in turn can be aggregated into large portfolios of flexible load and generation and optimized using artificial intelligence and machine learning.
 

Data Communication & Computer Networks

Автор: buratino от 28-04-2020, 14:12, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Data Communication & Computer Networks: Engineering Handbook
Автор: P.K. Ghosh
Издательство: Engineering Handbook
Год: 2019
Формат: True PDF
Страниц: 490
Размер: 11.1 Mb
Язык: English

Data Communication & Computer Networks : Engineering Handbook
 

CISSP: 2 Books in 1 by Robert Preston

Автор: buratino от 27-04-2020, 16:33, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: CISSP: 2 Books in 1: The Complete Beginner’s Guide to Learn the Fundamentals of Information System Security + Tips and Strategies to Pass the CISSP Exam on Your First Attempt
Автор: Robert Preston
Издательство: Amazon
Год: 2020
Формат: epub
Страниц: 237
Размер: 1.5 Mb
Язык: English

This book will give you all the information and tools you need to achieve your goal!
 

Building a Practical Information Security Program

Автор: buratino от 27-04-2020, 15:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Building a Practical Information Security Program
Автор: Jason Andress, Mark Leary
Издательство: Syngress
Год: 2017
Формат: True PDF
Страниц: 190
Размер: 11.5 Mb
Язык: English

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business.
 

Neural Networks Modeling and Control: Applications for Unknown Nonlinear Delayed Systems in Discrete Time

Автор: buratino от 27-04-2020, 01:29, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Neural Networks Modeling and Control: Applications for Unknown Nonlinear Delayed Systems in Discrete Time
Автор: Jorge D. Rios, Alma Y. Alanis, Nancy Arana-Daniel, Carlos Lopez-Franco
Издательство: Academic Press
Год: 2020
Формат: True PDF
Страниц: 150
Размер: 10.8 Mb
Язык: English

Neural Networks Modelling and Control: Applications for Unknown Nonlinear Delayed Systems in Discrete Time focuses on modeling and control of discrete-time unknown nonlinear delayed systems under uncertainties based on Artificial Neural Networks. First, a Recurrent High Order Neural Network (RHONN) is used to identify discrete-time unknown nonlinear delayed systems under uncertainties, then a RHONN is used to design neural observers for the same class of systems.
 

The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems

Автор: buratino от 27-04-2020, 00:05, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems (Intelligent Data-Centric Systems: Sensor Collected Intelligence)
Автор: Dinesh Peter (Editor), Amir H Alavi (Editor), Bahman Javadi (Editor), Steven L. Fernandes (Editor)
Издательство: Academic Press
Год: 2020
Формат: True PDF
Страниц: 202
Размер: 14 Mb
Язык: English

The Cognitive Approach in Cloud Computing and Internet of Things Technologies for Surveillance Tracking Systems discusses the recent, rapid development of Internet of things (IoT) and its focus on research in smart cities, especially on surveillance tracking systems in which computing devices are widely distributed and huge amounts of dynamic real-time data are collected and processed. Efficient surveillance tracking systems in the Big Data era require the capability of quickly abstracting useful information from the increasing amounts of data. Real-time information fusion is imperative and part of the challenge to mission critical surveillance tasks for various applications.