Blockchain and Cryptocurrency: Management Systems and Technology Challenges

Автор: literator от 4-11-2024, 18:39, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Blockchain and Cryptocurrency: Management Systems and Technology Challenges
Автор: Asik Rahaman Jamader, Murugesan Selvam, Biswaranjan Acharya
Издательство: CRC Press
Серия: Big Data for Industry 4.0: Challenges and Applications
Год: 2025
Страниц: 237
Язык: английский
Формат: pdf (true), epub
Размер: 14.2 MB

Blockchain and cryptocurrency have become the most revolutionary technologies of the 21st century, potentially transforming how we conduct business, manage assets, and exchange value. The emergence of these technologies has challenged traditional systems of management and has presented new technology challenges for businesses and organizations. Blockchain and Cryptocurrency: Management Systems and Technology Challenges explores the latest developments in blockchain and cryptocurrency and how they are changing the way we manage systems and technologies. The book delves into the technical aspects of blockchain, including its underlying architecture and consensus mechanisms, and examines the various use cases for blockchain technology, such as supply chain management, digital identity, and smart contracts. It also discusses the challenges of managing and implementing blockchain and cryptocurrency systems, including regulatory compliance, security, and scalability. A comprehensive guide for professionals in engineering management, business leadership, and technology that provides a comprehensive understanding of blockchain and cryptocurrencies' potential impact on organizations.
 

AWS Cloud Engineer Guide: Building scalable cloud solutions with AWS

Автор: literator от 3-11-2024, 09:13, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: AWS Cloud Engineer Guide: Building scalable cloud solutions with AWS
Автор: Sizwe Molefe
Издательство: BPB Publications
Год: 2025
Страниц: 410
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Cloud computing provides a more efficient, reliable, secure, and cost-effective way to run applications. Cloud computing offers customers access to rapidly growing amounts of data storage and computation resources while centralizing IT operations in the cloud provider's datacenter or in colocation data centers. Understand AWS basics such as EC2, VPCs, S3, and IAM while learning to design secure and scalable cloud architectures. This book guides you through automating infrastructure with CloudFormation and exploring advanced topics like containers, continuous integration and continuous delivery (CI/CD) pipelines, and cloud migration. You will also discover serverless computing with Lambda, API Gateway, and DynamoDB, enabling you to build efficient, modern applications. With real-world examples and best practices, this resource helps you optimize your AWS environment for both performance and cost, ensuring you can build and maintain robust cloud solutions. By the end of this book, you will be able to confidently design, build, and operate scalable and secure cloud solutions on AWS. Gain the expertise to leverage the full potential of cloud computing and drive innovation in your organization.
 

The Web 3 Revolution: Building the Future of Blockchain, Defi, and the Metaverse

Автор: literator от 1-11-2024, 23:10, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Web 3 Revolution: Building the Future of Blockchain, Defi, and the Metaverse
Автор: Hui Gong
Издательство: Apress
Год: 2024
Страниц: 333
Язык: английский
Формат: pdf
Размер: 10.1 MB

We stand on the cusp of a digital revolution, with Web3 technologies gaining momentum and proving pivotal in shaping the future of finance, art, governance, and social interactions. This comprehensive guide is designed to navigate the intricate world of Web3. Organized in four parts, it offers insightful analysis and explanations on blockchain technology, decentralized finance (DeFi), and the burgeoning realm of the metaverse, providing readers with a holistic understanding of their current state and future potential. This book aims to serve both novices and seasoned professionals in the tech industry by providing a clear, contextual understanding of how each piece of the Web3 puzzle fits together and why it matters. Through a blend of technical descriptions, industry case studies and real-world scenarios, The Web3 Revolution offers readers not just knowledge but a vision of the potential impacts and opportunities that lie ahead in this new digital frontier. For tech enthusiasts, investors, entrepreneurs, and those interested in the future of the internet.
 

Physical Layer Security for 6G

Автор: literator от 1-11-2024, 02:52, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Physical Layer Security for 6G
Автор: Parthajit Mohapatra, Nikolaos Pappas, Arsenia Chorti, Stefano Tomasin
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 370
Язык: английский
Формат: pdf (true), epub
Размер: 31.6 MB

Meet the wireless security challenges of the future with this key volume. The 6th generation of wireless communication technology―known as 6G―promises to bring both revolutionary advances and unique challenges. Secure communications will be harder than ever to achieve under the new integrated ground, air, and space networking paradigm; increased connectivity creates the potential for increased vulnerability. Physical layer security, which draws upon the physical properties of the channel or network to secure information, has emerged as a promising solution to these challenges. Physical Layer Security for 6G provides a working introduction to these technologies and their burgeoning wireless applications. With particular attention to heterogeneous or distributed network scenarios, this book offers both the information-theory fundamentals and the most recent developments in physical layer security. It constitutes an essential resource for meeting the unique security challenges of 6G.
 

Building Digital Twin Metaverse Cities: Revolutionizing Cities With Emerging Technologies

Автор: literator от 1-11-2024, 02:20, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Building Digital Twin Metaverse Cities: Revolutionizing Cities With Emerging Technologies
Автор: Xiangming Samuel Li
Издательство: Apress
Год: 2024
Страниц: 435
Язык: английский
Формат: pdf
Размер: 19.8 MB

This book explains how to build digital twin metaverse cities aimed to accelerate urban digital transformation through emerging technologies. Why do we need to live in a smart city? The book presents a novel architectural design of digital twin metaverse cities and the digital twinning process. Let's dive into emerging technologies as building blocks to construct smart cities. We introduce the transformative concept of metaverse digital twins, bridging the digital-­physical divide with advanced ICTs like IoT, 5G, and AI.
 

The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosystem

Автор: literator от 31-10-2024, 07:29, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: The Cybersecurity Mesh Architecture: Composable, flexible, and scalable security approach for a resilient security ecosystem
Автор: Tarun Kumar
Издательство: BPB Publications
Год: 2025
Страниц: 210
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

Cybersecurity mesh architecture (CSMA) is a new way to protect your data. It connects all your security tools together, making them work better as a team. This book will teach you everything you need to know about CSMA, from how it works to how to use it to protect your business. The book introduces the current cybersecurity landscape, explaining CSMA and its key components, benefits, and adoption strategies. It covers best practices, implementation challenges, and key performance indicators (KPIs) for evaluating CSMA effectiveness. Additionally, it compares CSMA with traditional defense methods, detailing its advantages. The book also explores its specific applications in the healthcare sector. It provides valuable insights into the CSMA market, including growth factors, dynamics, and emerging opportunities for businesses looking to enhance their cybersecurity posture. This book is for CIOs, CISOs, security architects, engineers, and operations professionals working in enterprise security or networking teams. It is also ideal for threat hunters, endpoint security specialists, and students studying cybersecurity who have a basic knowledge of cybersecurity, cloud, and networking challenges.
 

Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition

Автор: literator от 28-10-2024, 16:51, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Inside Cyber Warfare: Mapping the Cyber Underworld, 3rd Edition
Автор: Jeffrey Caruso
Издательство: O’Reilly Media, Inc.
Год: 2024
Страниц: 161
Язык: английский
Формат: True/Retail PDF, True EPUB
Размер: 58.7 MB, 12.4 MB

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East, including cyber attacks that result in the physical destruction of the target and the pairing of cognitive with maneuver warfare.
 

Quantum Networks: Introduction and Applications

Автор: literator от 28-10-2024, 11:35, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Quantum Networks: Introduction and Applications
Автор: Ming-Xing Luo
Издательство: Springer
Год: 2024
Страниц: 387
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book provides a comprehensive overview of the rapidly advancing research in quantum networks, both in theory and application. While the classical internet has become essential in our daily lives, its communication techniques have limitations, such as vulnerability to interception and eavesdropping. Quantum networks, by transmitting quantum qubits, address these security concerns using the principles of quantum mechanics, such as superposition, no-cloning, and Heisenberg uncertainty. Kimble first proposed the concept of a quantum internet in 2008, envisioning a network that harnesses quantum devices and laws to transmit information. Wehner and colleagues reviewed the steps necessary to achieve a quantum internet in 2018, outlining development stages leading to increasingly powerful applications. While a fully functional quantum internet is still in progress, significant advances have been made through experiments, such as satellite-based quantum key distribution networks and quantum metropolitan area networks. This book aims to provide a unified theoretical framework for students and researchers interested in the quantum Internet, offering insights into topics like network communication theory, secure communication, distributed computation, nonlocality, and quantum configuration. By presenting cutting-edge research and potential applications in the field of quantum information processing, including the quantum Internet, this book stands out as a valuable resource for beginners, undergraduate students, graduate students, and researchers in physics, computer science, and information science. It bridges the gap between theoretical perspectives and practical applications, offering a comprehensive guide to the exciting possibilities of quantum networks.
 

Principles of Cybersecurity

Автор: literator от 27-10-2024, 11:50, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Principles of Cybersecurity
Автор: Joy Crelin
Издательство: Salem Press/Grey House Publishing, Inc.
Год: 2024
Страниц: 435
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This volume introduces students to the technologies and controls that protect our hardware, software, and data from cyberthreats. With everything from schools to financial accounts to vital infrastructure under threat from various bad actors, technological advances require constant new approaches to keep our businesses running, our sensitive information out of the hands of cybercriminals, and our data safe. The recent shift to remote work has increased vulnerability to cyber disruptions. Although newer tools like Artificial Intelligence (AI) can help with predicting cyberattacks before they occur—something traditional security professionals find challenging—these methods can also be used by hackers to learn about and exploit weaknesses in a system. Students and researchers wishing to gain a solid background in cybersecurity and related fields will find this volume an invaluable resource to developing a deeper and meaningful understanding of this important and evolving topic. Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, cloud services, and other computer and internet-connected technologies from a wide range of cyberattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism. This volume will be an important resource for students at the high school and undergraduate levels, especially those considering careers in cybersecurity.
 

Fusion and Integration of Clouds, Edges, and Devices

Автор: literator от 27-10-2024, 01:14, Коментариев: 0

Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ

Название: Fusion and Integration of Clouds, Edges, and Devices
Автор: Junlong Zhou, Kun Cao, Jin Sun, Keqin Li
Издательство: CRC Press
Год: 2025
Страниц: 228
Язык: английский
Формат: pdf (true), epub
Размер: 31.8 MB

This book provides an in-depth examination of recent research advances in cloud-edge-end computing, covering theory, technologies, architectures, methods, applications, and future research directions. It aims to present state-of-the-art models and optimization methods for fusing and integrating clouds, edges, and devices. Cloud-edge-end computing provides users with low-latency, high-reliability, and cost-effective services through the fusion and integration of clouds, edges, and devices. As a result, it is now widely used in various application scenarios. The book introduces the background and fundamental concepts of clouds, edges, and devices, and details the evolution, concepts, enabling technologies, architectures, and implementations of cloud-edge-end computing. It also examines different types of cloud-edge-end orchestrated systems and applications and discusses advanced performance modeling approaches, as well as the latest research on offloading and scheduling policies. It also covers resource management methods for optimizing application performance on cloud-edge-end orchestrated systems. The intended readers of this book are researchers, undergraduate and graduate students, and engineers interested in cloud computing, edge computing, and the Internet of Things (IoT). The knowledge of this book will enrich our readers to be at the forefront of cloud-edge-end computing.