Internet of Things (IoT) : Systems and Applications

Автор: buratino от 29-12-2019, 02:57, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Internet of Things (IoT) : Systems and Applications
Автор: Jamil Y. Khan (Editor), Mehmet R. Yuce (Editor)
Издательство: Jenny Stanford Publishing
Год: 2019
Формат: True PDF
Страниц: 365
Размер: 17.9 Mb
Язык: English

The Internet of Things (IoT) is one of the core technologies of current and future information and communications technology (ICT) sectors. IoT technologies will be deployed in numerous industries, including health, transport, smart cities, utility sectors, environment, security, and many other areas. In a manner suitable to a broad range of readers, this book introduces various key IoT technologies focusing on algorithms, process algebra, network architecture, energy harvesting, wireless communications, and network security.
 

Learn Hacking in 1 Day: Complete Hacking Guide with Examples

Автор: literator от 28-12-2019, 18:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Learn Hacking in 1 Day: Complete Hacking Guide with Examples
Автор: Krishna Rungta, Jim Forris
Издательство: Amazon Digital Services LLC
Год: 2016
Страниц: 150
Язык: английский
Формат: pdf, rtf
Размер: 10.1 MB

If you are attracted to Hacking world, this book must be your first step. This book teaches you how to think like hackers and protect your computer system from malware, viruses, etc. It will give you insight on various techniques and tools used by hackers for hacking. The book demonstrates how easy it is to penetrate other system and breach cyber security. At the same time, you will also learn how to fight these viruses with minimum damage to the system. Irrespective of your background, you will easily understand all technical jargons of hacking covered in the book.
 

Hacking Internet of Things: Bluetooth Low Energy

Автор: buratino от 27-12-2019, 19:58, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking Internet of Things: Bluetooth Low Energy
Автор: Shashank Pandey
Издательство: Cytheon Ltd.
Год: 2018
Формат: pdf(conv.)
Страниц: 176
Размер: 2 Mb
Язык: English

According to IHS Markit, the number of IoT (Internet of Things) devices will grow to 30.7 billion in 2020, and to 75.4 billion by 2025! IDC Forecasts Worldwide spending on the IoT to reach $772 Billion in 2018! Whether it is connected automobiles, fitness watches, smart coffee machines, smart locks or even medical equipment such as insulin pumps, IoT is becoming all-pervasive. In the future, there will hardly be any aspect of our lives that IoT will not touch one way or the other.
 

Kali Linux: 2 books in 1: The Complete Beginner's Guide About Kali Linux For Beginners & Hacking With Kali Linux

Автор: buratino от 27-12-2019, 19:44, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Kali Linux: 2 books in 1: The Complete Beginner's Guide About Kali Linux For Beginners & Hacking With Kali Linux, Full of Practical Examples Of Wireless Networking & Penetration Testing
Автор: Learn Computer Hacking In Deep
Издательство: Learn Computer Hacking In Deep
Год: 2019
Формат: pdf(conv.)
Страниц: 223
Размер: 1 Mb
Язык: English

This unique book bundle focuses on the hacker’s most important tools: Kali Linux (the ultimate operating system for hackers) and some of the more beginner-friendly tools for scanning networks and websites.
 

Hacking with Kali Linux: A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking

Автор: literator от 27-12-2019, 19:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Hacking with Kali Linux: A Step by Step Guide for you to Learn the Basics of CyberSecurity and Hacking
Автор: Mr. Ramon Nastase
Издательство: Independently published
Год: 2018
Страниц: 177
Язык: английский
Формат: pdf, rtf
Размер: 11.7 MB

Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do in order to protect yourself from all kind of hacking techniques.
 

CISSP: A Comprehensive Beginner’s Guide to learn and understand the Realms of CISSP from A-Z

Автор: TRex от 27-12-2019, 11:22, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: CISSP: A Comprehensive Beginner’s Guide to learn and understand the Realms of CISSP from A-Z
Автор: Daniel Jones
Издательство: Independently published
Год: 2019
Формат: EPUB
Страниц: 197
Размер: 12,9 Mb
Язык: English

The Certified Information System Security Practitioner (CISSP) is the most dominant, most mature and vendor-neutral information security certification. The "CISSP: A Comprehensive Beginners Guide to Learn and Understand the Realms of CISSP from A-Z" is aligned to provide the reader a simplified, easy-to-understand, and concise learning pack to get started and prepared for the examination. This book covers A-Z on CISSP, in other words, all the 8 domains and nothing less. The content included in the book provides the latest information according to the most recent CISSP exam curriculum.
 

Big Data-Enabled Internet of Things

Автор: buratino от 26-12-2019, 20:46, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Big Data-Enabled Internet of Things (Computing and Networks)
Автор: Muhammad Usman Shahid Khan (Editor), Samee U. Khan (Editor), Albert Y. Zomaya (Editor)
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 488
Размер: 12.9 Mb
Язык: English

The fields of Big Data and the Internet of Things (IoT) have seen tremendous advances, developments, and growth in recent years. The IoT is the inter-networking of connected smart devices, buildings, vehicles and other items which are embedded with electronics, software, sensors and actuators, and network connectivity that enable these objects to collect and exchange data. The IoT produces a lot of data. Big data describes very large and complex data sets that traditional data processing application software is inadequate to deal with, and the use of analytical methods to extract value from data. This edited book covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures and platforms to security and privacy issues, applications, and challenges as well as future directions.
 

Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques

Автор: buratino от 26-12-2019, 20:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques (Materials, Circuits and Devices)
Автор: Anirban Sengupta
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 344
Размер: 13.8 Mb
Язык: English

This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.
The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security.
 

Low Electromagnetic Emission Wireless Network Technologies: 5G and beyond

Автор: buratino от 26-12-2019, 20:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Low Electromagnetic Emission Wireless Network Technologies: 5G and beyond (Telecommunications)
Автор: Muhammad Ali Imran (Editor), Fabien Héliot (Editor), Yusuf Abdulrahman Sambo (Editor)
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 304
Размер: 11.4 Mb
Язык: English

Mobile communication systems rely on radiofrequency waves to operate. Given the popularity and ubiquity of mobile communication devices as well as network densification, the level of Electromagnetic Field (EMF) exposure to the public is expected to rise significantly over the next few years. Although there is no clear evidence linking short-term exposure to EMF emission from wireless communication systems with adverse health effects, the International Agency for Research on Cancer (IARC) has concluded that EMF radiation is possibly carcinogenic.
 

Информационная безопасность (2010)

Автор: umkaS от 26-12-2019, 19:49, Коментариев: 2

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Информационная безопасность
Автор: Партыка Т.Л., Попов И.И.
Издательство: М.: Форум
Год: 2010 - 3-е изд., перераб. и доп.
Cтраниц: 432
Формат: pdf
Размер: 33 мб
Язык: русский

Рассмотрены вопросы информационной безопасности и защиты данных, в том числе в информационно-вычислительных системах и сетях. Дано введение в общие проблемы безопасности, определены роль и место информационной безопасности в системе обеспечения национальной безопасности государства.