Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques

Автор: buratino от 26-12-2019, 20:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Frontiers in Securing IP Cores: Forensic detective control and obfuscation techniques (Materials, Circuits and Devices)
Автор: Anirban Sengupta
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 344
Размер: 13.8 Mb
Язык: English

This book presents advanced forensic detective control and obfuscation techniques for securing hardware IP cores by exploring beyond conventional technologies. The theme is important to researchers in various areas of specialization, because it encompasses the overlapping topics of EDA-CAD, hardware design security, VLSI design, IP core protection, optimization using evolutionary computing, system-on-chip design and finally application specific processor/hardware accelerator design for consumer electronics applications.
The book begins by introducing forensic detective control and obfuscation mechanisms for hardware and IP core security.
 

Low Electromagnetic Emission Wireless Network Technologies: 5G and beyond

Автор: buratino от 26-12-2019, 20:31, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Low Electromagnetic Emission Wireless Network Technologies: 5G and beyond (Telecommunications)
Автор: Muhammad Ali Imran (Editor), Fabien Héliot (Editor), Yusuf Abdulrahman Sambo (Editor)
Издательство: The Institution of Engineering and Technology
Год: 2020
Формат: True PDF
Страниц: 304
Размер: 11.4 Mb
Язык: English

Mobile communication systems rely on radiofrequency waves to operate. Given the popularity and ubiquity of mobile communication devices as well as network densification, the level of Electromagnetic Field (EMF) exposure to the public is expected to rise significantly over the next few years. Although there is no clear evidence linking short-term exposure to EMF emission from wireless communication systems with adverse health effects, the International Agency for Research on Cancer (IARC) has concluded that EMF radiation is possibly carcinogenic.
 

Информационная безопасность (2010)

Автор: umkaS от 26-12-2019, 19:49, Коментариев: 2

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Информационная безопасность
Автор: Партыка Т.Л., Попов И.И.
Издательство: М.: Форум
Год: 2010 - 3-е изд., перераб. и доп.
Cтраниц: 432
Формат: pdf
Размер: 33 мб
Язык: русский

Рассмотрены вопросы информационной безопасности и защиты данных, в том числе в информационно-вычислительных системах и сетях. Дано введение в общие проблемы безопасности, определены роль и место информационной безопасности в системе обеспечения национальной безопасности государства.
 

Computer Science: Quick Web Links to FREE 250+ Textbooks, 300+ Lecture notes, 200+ Solved quizzes, 200+ Solved Past exams papers, Dictionaries

Автор: TRex от 26-12-2019, 10:27, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Computer Science: Quick Web Links to FREE 250+ Textbooks, 300+ Lecture notes, 200+ Solved quizzes, 200+ Solved Past exams papers, Dictionaries, Encyclopedias, Glossaries and Many more...
Автор: Dr. Web Links
Издательство: Amazon Digital Services LLC
Год: 2019
Формат: PDF, DOC
Страниц: 192
Размер: 16,3 Mb
Язык: English

A perfect book to stock your personal e-library. Accelerate your understanding of COMPUTER SCIENCE with this must have reference book!!!
DOWNLOAD FREE TEXTBOOKS, LECTURE NOTES, SOLVED PAST EXAMS PAPERS, ETC....
 

Компьютерные сети (2010)

Автор: umkaS от 25-12-2019, 23:45, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Компьютерные сети
Автор: Максимов Н.В., Попов И.И.
Издательство: М.: Форум
Год: 2010 - 4-е изд., перераб. и доп.
Cтраниц: 464
Формат: pdf
Размер: 11 мб
Язык: русский

Рассматриваются вопросы организации сетевых архитектур, типы, топология, методы доступа, среда передачи, аппаратные компоненты компьютерных сетей, а также методы пакетной передачи данных, модель OSI, задачи и функции по уровням модели OSI. Описываются локальные сети, технологии доступа к глобальным информационным ресурсам, адресация в сетях, способы проверки правильности передачи данных, межсетевое взаимодействие, принципы маршрутизации пакетов.
 

Security Within CONASENSE Paragon

Автор: literator от 25-12-2019, 21:07, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security Within CONASENSE Paragon
Автор: Ramjee Prasad, Leo P. Ligthart
Издательство: River Publishers
Год: 2019
Страниц: 230
Язык: английский
Формат: pdf (true)
Размер: 23.1 MB

Security within CONASENSE Paragon describes in particular the cyber security issues in the field of Communication, Navigation, Sensing and Services within the broad platform of CTIF Global Capsule (CGC). This covers future technologies and its enablers, smart cities, crowd computing, reliable and secure communication interface, satellite unnamed air vehicles, wireless sensor networks, data analytics and deep learning, remotely piloted aircraft system and public safety, network neutrality, business ecosystem innovation and so on.
 

Wireless AI : Wireless Sensing, Positioning, IoT, and Communications

Автор: literator от 25-12-2019, 18:56, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Wireless AI : Wireless Sensing, Positioning, IoT, and Communications
Автор: K. J. Ray Liu, Beibei Wang
Издательство: Cambridge University Press
Год: 2019
Страниц: 623
Язык: английский
Формат: pdf (true)
Размер: 34.4 MB

With this groundbreaking text, discover how wireless artificial intelligence (AI) can be used to determine position at centimeter level, sense motion and vital signs, and identify events and people. Using a highly innovative approach that employs existing wireless equipment and signal processing techniques to turn multipaths into virtual antennas, combined with the physical principle of time reversal and machine learning, it covers fundamental theory, extensive experimental results, and real practical use cases developed for products and applications. Topics explored include indoor positioning and tracking, wireless sensing and analytics, wireless power transfer and energy efficiency, 5G and next-generation communications, and the connection of large numbers of heterogeneous IoT devices of various bandwidths and capabilities.
 

Adaptive Middleware for the Internet of Things: The GAMBAS Approach

Автор: literator от 25-12-2019, 18:40, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Adaptive Middleware for the Internet of Things: The GAMBAS Approach
Автор: Marcus Handte, Pedro Jose Marron
Издательство: River Publishers
Год: 2019
Страниц: 244
Язык: английский
Формат: pdf (true)
Размер: 94.9 MB

Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users.
 

Understanding UMTS Radio Network Modelling, Planning and Automated Optimisation: Theory and Practice

Автор: alex66 от 24-12-2019, 17:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Understanding UMTS Radio Network Modelling, Planning and Automated Optimisation: Theory and Practice
Автор: Edited by Maciej J. Nawrocki, Mischa Dohler, A. Hamid Aghvami
Издательство: John Wiley & Sons
Год: 2006
Формат: PDF
Страниц: 547
Размер: 10,15 МБ
Язык: English

This book sets out to provide the theoretical foundations that will enable radio network planners to plan model and optimize radio networks using state-of-the-art findings from around the globe. It adopts a logical approach, beginning with the background to the present status of UMTS radio network technology, before devoting equal coverage to planning, modelling and optimization issues. All key planning areas are covered, including the technical and legal implications of network infrastructure sharing, hierarchical cell structure (HCS) deployment, ultra-high-site deployment and the benefits and limitations of using computer-aided design (CAD) software.
 

Security Controls Evaluation, Testing, and Assessment Handbook, 2nd Edition

Автор: literator от 24-12-2019, 07:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Security Controls Evaluation, Testing, and Assessment Handbook, 2nd Edition
Автор: Leighton Johnson
Издательство: Academic Press
Год: 2019
Страниц: 770
Язык: английский
Формат: pdf (true)
Размер: 20.7 MB

Security Controls Evaluation, Testing, and Assessment Handbook, Second Edition, provides a current and well-developed approach to evaluate and test IT security controls to prove they are functioning correctly. This handbook discusses the world of threats and potential breach actions surrounding all industries and systems. Sections cover how to take FISMA, NIST Guidance, and DOD actions, while also providing a detailed, hands-on guide to performing assessment events for information security professionals in US federal agencies.