Defying Reality: The Inside Story of the Virtual Reality Revolution

Автор: harun54 от 19-07-2018, 09:17, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Defying Reality: The Inside Story of the Virtual Reality Revolution
Автор: David M. Ewalt
Издательство: Blue Rider Press
Год: 2018
Формат: EPUB
Размер: 1 Мб
Язык: английский / English

A fascinating exploration of the history, development, and future of virtual reality, a technology with world-changing potential, written by award-winning journalist and author David Ewalt, stemming from his 2015 Forbes cover story about the Oculus Rift and its creator Palmer Luckey.
 

Системы мобильной связи. Термины и определения

Автор: SCART56 от 19-07-2018, 08:28, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Системы мобильной связи. Термины и определения
Автор: Бабков В.Ю., Голант Г.З., Русаков А.В.
Издательство: Горячая линия-Телеком
Год: 2011
Страниц: 160
ISBN: 978-5-9912-0066-0
Формат: PDF
Размер: 10 Мб
Язык: русский

Собраны основные международные аббревиатуры, обозначения и технические термины, используемые в современных системах мобильной связи, их перевод и краткое толкование. Приведены основные международные организации стандартизации, тенденции развития систем сотовой подвижной связи, дается представление о современных технологиях, касающихся принципов построения, аспектах безопасности, режимах работы и используемых протоколах систем GSM, GPRS, EDGE, CDMA и UMTS; перечень документов, регламентирующих отношения в области телекоммуникаций; ссылки на интернет-ресурсы разработчиков, производителей и операторов соответствующих систем.
 

Encyclopedia of multimedia technology and networking

Автор: alex66 от 18-07-2018, 07:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Encyclopedia of multimedia technology and networking
Автор: Margherita Pagani, editor
Издательство: Idea Group Inc.
Год: 2005
Формат: PDF
Страниц: 1167
Размер: 20,45 МБ
Язык: English

The Encyclopedia of Multimedia Technology and Networking captures a vast array of the components and dimensions of this dynamic sector of the world economy. Professor Margherita Pagani and her editorial board have done a remarkable job at compiling such a rich collection of perspectives on this fast moving domain. The encyclopaedia’s scope and content will provide scholars, researchers and professionals with much current information about concepts, issues, trends and technologies in this rapid evolving industrial sector.

Изменил: alex66 по причине: обновлена ссылка

 

Practical Intrusion Analysis: prevention and detection for the twenty-first century

Автор: alex66 от 18-07-2018, 07:15, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Practical Intrusion Analysis: prevention and detection for the twenty-first century
Автор: Ryan Trost
Издательство: Pearson Education, Inc.
Год: 2010
Формат: PDF
Страниц: 480
Размер: 13,93 МБ
Язык: English

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies.

Изменил: alex66 по причине: обновлена ссылка

 

Metasploit Penetration Testing Cookbook, Third Edition

Автор: literator от 17-07-2018, 16:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Metasploit Penetration Testing Cookbook, Third Edition
Автор: Daniel Teixeira
Издательство: Packt Publishing
ISBN: 1788623177
Год: 2018
Страниц: 426
Язык: английский
Формат: epub
Размер: 12.0 MB

Over 100 recipes for penetration testing using Metasploit and virtual machines. Metasploit is the world's leading penetration testing tool and helps security and IT professionals find, exploit, and validate vulnerabilities. Metasploit allows penetration testing automation, password auditing, web application scanning, social engineering, post exploitation, evidence collection, and reporting. Metasploit's integration with InsightVM (or Nexpose), Nessus, OpenVas, and other vulnerability scanners provides a validation solution that simplifies vulnerability prioritization and remediation reporting. Teams can collaborate in Metasploit and present their findings in consolidated reports.
 

Ansible 2 Cloud Automation Cookbook

Автор: harun54 от 17-07-2018, 14:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Ansible 2 Cloud Automation Cookbook
Автор: Aditya Patawari and Vikas Aggarwal
Издательство: Packt Publishing
Год: 2018
Формат: EPUB
Размер: 1 Мб
Язык: английский / English

Ansible has a large collection of inbuilt modules to manage various cloud resources. The book begins with the concepts needed to safeguard your credentials and explain how you interact with cloud providers to manage resources. Each chapter begins with an introduction and prerequisites to use the right modules to manage a given cloud provider. Learn about Amazon Web Services, Google Cloud, Microsoft Azure, and other providers. Each chapter shows you how to create basic computing resources, which you can then use to deploy an application. Finally, you will be able to deploy a sample application to demonstrate various usage patterns and utilities of resources.
 

Implementing Azure Cloud Design Patterns

Автор: literator от 17-07-2018, 14:29, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Implementing Azure Cloud Design Patterns
Автор: Oliver Michalski, Stefano Demiliani
Издательство: Packt Publishing
ISBN: 1788393368
Год: 2018
Страниц: 300
Язык: английский
Формат: epub, pdf (conv)
Размер: 12.56 MB

A hands-on guide to mastering Azure cloud design patterns and best practices. A well designed cloud infrastructure covers factors such as consistency, maintenance, simplified administration and development, and reusability. Hence it is important to choose the right architectural pattern as it has a huge impact on the quality of cloud-hosted services. This book covers all Azure design patterns and functionalities to help you build your cloud infrastructure so it fits your system requirements.
 

Extending OpenStack: Leverage extended OpenStack projects to implement containerization, deployment, and architecting robust cloud solutions

Автор: literator от 17-07-2018, 13:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Extending OpenStack: Leverage extended OpenStack projects to implement containerization, deployment, and architecting robust cloud solutions
Автор: Omar Khedher
Издательство: Packt Publishing
ISBN: 1786465531
Год: 2018
Страниц: 300
Язык: английский
Формат: epub, pdf (conv)
Размер: 12.4 MB

Discover new opportunities to empower your private cloud by making the most of the OpenStack universe.
OpenStack is a very popular cloud computing platform that has enabled several organizations during the last few years to successfully implement their Infrastructure as a Service (IaaS) platforms. This book will guide you through new features of the latest OpenStack releases and how to bring them into production straightaway in an agile way.
 

Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third Edition

Автор: alex66 от 17-07-2018, 13:54, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Hacking Exposed Web Applications: Web Application Security Secrets and Solutions, Third Edition
Автор: Joel Scambray, Vincent Liu, Caleb Sima
Издательство: McGraw Hill Professional
Год: 2011
Формат: PDF
Страниц: 481
Размер: 11,83 МБ
Язык: English

The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures.
 

Hacking Exposed Wireless, Second Edition

Автор: alex66 от 17-07-2018, 13:11, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ


Название: Hacking Exposed Wireless
Автор: Johnny Cache, Joshua Wright, Vincent Liu
Издательство: McGraw Hill
Год: 2010
Формат: PDF
Страниц: 513
Размер: 11,24 МБ
Язык: English

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems.

Изменил: alex66 по причине: обновлена ссылка