LitMy.ru - литература в один клик

  • Добавил: buratino
  • Дата: Вчера, 01:53
  • Комментариев: 0
Название: 5G Radio Access Network Architecture The Dark Side of 5G
Автор: Sasha Sirotkin (Editor)
Издательство: Wiley
Год: 2021
Формат: True PDF
Страниц: 437
Размер: 12.2 Mb
Язык: English

Written by an industry insider with state of the art research at their fingertips, this book describes the Radio Access Network (RAN) architecture, starting with currently deployed 4G, followed by the description of 5G requirements and why re-thinking of the RAN architecture is needed to support these. Based on these considerations, it explains how 5G network architecture, which is currently being defined, is likely to evolve.
  • Добавил: literator
  • Дата: 28-11-2020, 17:36
  • Комментариев: 0
CompTIA Network+ Exam: N10-007: Technology workbook | Latest 2020 Edition with free quick reference sheet and practice questionsНазвание: CompTIA Network+ Exam: N10-007: Technology workbook | Latest 2020 Edition with free quick reference sheet and practice questions
Автор: IP Specialist
Издательство: IPSpecialist LTD
Год: 2020
Страниц: 460
Язык: английский
Формат: epub
Размер: 59.2 MB

IPSpecialist Technology workbooks are the ideal guides to developing the hands-on skills necessary to pass the exam. Our workbook covers official exam blueprint and explains the technology with real life case study based labs. The content covered in each workbook consists of individually focused technology topics presented in an easy-to-follow, goal-oriented, step-by-step approach. Every scenario features detailed breakdowns and thorough verifications to help you completely understand the task and associated technology. We extensively used mind maps in our workbooks to visually explain the technology. Our workbooks have become a widely used tool to learn and remember the information effectively.
  • Добавил: literator
  • Дата: 28-11-2020, 17:06
  • Комментариев: 0
Complete Ethical Hacking TutorialНазвание: Complete Ethical Hacking Tutorial
Автор: Sachin Rathore
Издательство: Amazon.com Services LLC
Год: 2020
Страниц: 116
Язык: английский
Формат: pdf, azw3, epub
Размер: 10.1 MB

This Book Provide Guide on Ethical Hacking And All Tools Tutorial Used for Ethical Hacking. Hacking is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. Hacking is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer. Hacking is usually legal as long as it is being done to find weaknesses in a computer or network system for testing purpose. This sort of hacking is what we call Ethical Hacking.
  • Добавил: buratino
  • Дата: 27-11-2020, 11:35
  • Комментариев: 0
Название: Network Design Cookbook Seconnd Edition (version 2.0.4)
Автор: Michel Thomatis
Издательство: RouteHub Group, LLC
Год: 2017
Формат: True PDF
Страниц: 412
Размер: 21.3 Mb
Язык: English

The second edition of the Network Design Cookbook provides a new approach for building a network design by selecting design modules (or PODs) based on the business requirements, engineer's preferences, and recommendations. This new approach provides a structured process that you, as a network engineer or consultant, can use to meet the critical technical objectives while keeping within the parameters of industry best practices. In this book, you will find valuable resources and tools for constructing the topology and services you need for many solutions such as LAN, WAN, Data Center, Internet Edge, Firewall, to Collaboration.
  • Добавил: buratino
  • Дата: 26-11-2020, 08:56
  • Комментариев: 0
Название: Cyber Resilience (River Publishers Series in Security and Digital Forensics)
Автор: Sergei Petrenko
Издательство: River Publishers
Год: 2019
Формат: True PDF
Страниц: 494
Размер: 13 Mb
Язык: English

This monograph shows that modern Industry 4.0. cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity, a potential danger of existing vulnerabilities and "sleep" hardware and software tabs, as well as an inadequate efficiency of modern models, methods, and tools to ensure cyber security, reliability, response and recovery.
  • Добавил: literator
  • Дата: 25-11-2020, 23:50
  • Комментариев: 0
Accelerating Cloud Adoption: Optimizing the Enterprise for Speed and Agility (Final)Название: Accelerating Cloud Adoption: Optimizing the Enterprise for Speed and Agility, First Edition
Автор: Michael Kavis
Издательство: O'Reilly Media
Год: 2020
Страниц: 172
Язык: английский
Формат: epub
Размер: 10.1 MB

Many companies move workloads to the cloud only to encounter issues with legacy processes and organizational structures. How do you design new operating models for this environment? This practical book shows IT managers, CIOs, and CTOs how to address the hardest part of any cloud transformation: the people and the processes. Author Mike Kavis (Architecting the Cloud) explores lessons learned from enterprises in the midst of cloud transformations. You’ll learn how to rethink your approach from a technology, process, and organizational standpoint to realize the promise of cost optimization, agility, and innovation that public cloud platforms provide.
  • Добавил: literator
  • Дата: 25-11-2020, 15:08
  • Комментариев: 0
Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition (Final)Название: Infrastructure as Code: Dynamic Systems for the Cloud Age, Second Edition
Автор: Kief Morris
Издательство: O’Reilly Media, Inc.
Год: 2021
Страниц: 350
Язык: английский
Формат: epub
Размер: 10.1 MB

Just five years ago, infrastructure as code was a new concept for many companies. Today, even banks, governments, and other highly regulated organizations are moving to the cloud, leading teams everywhere to build up large, complex infrastructure codebases. With this practical book, Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered by infrastructure and development teams to manage cloud age infrastructure. Ideal for system administrators, infrastructure engineers, software developers, team leads, and architects, this insightful second edition demonstrates the tools you need for implementing infrastructure as code.
  • Добавил: Maurix
  • Дата: 24-11-2020, 15:48
  • Комментариев: 0
Название: Автоматизация программируемых сетей
Автор: Мэтт Осуолт, Джейсон Эделман, Скотт Лоу
Издательство: ДМК
Год: 2019
Формат: PDF
Страниц: 616
Размер: 10 Mb
Язык: Русский

Постоянное появление новых протоколов, технологий, моделей доставки и ужесточение требований к интеллектуальности и гибкости бизнес-процессов сделали сетевую автоматизацию чрезвычайно важной. Это практическое руководство наглядно демонстрирует сетевым инженерам, как использовать широкий спектр технологий и инструментальных средств, в том числе Linux, Python, JSON и XML, для автоматизации систем с помощью написания программного кода.
  • Добавил: umkaS
  • Дата: 24-11-2020, 11:46
  • Комментариев: 0
Название: Основы локальных компьютерных сетей
Автор: Сергеев А. Н.
Издательство: Лань
Год: 2021 - 3-е изд.
Cтраниц: 184
Формат: pdf (ocr)
Размер: 24 мб
Язык: русский

В учебном пособии рассматриваются теоретические основы и технологии построения локальных компьютерных сетей. Излагаются вопросы базовых понятий, моделей и способов построения компьютерных сетей, организации стека протоколов TCP/IP (IPv4 и IPv6), создания серверов общего доступа и служб для IP-сетей (DNS, электронная почта, веб и др.).
  • Добавил: Maurix
  • Дата: 24-11-2020, 10:36
  • Комментариев: 0
Название: Технологии обеспечения безопасности информационных систем
Автор: А.Л. Марухленко, Л.О. Марухленко, М.А. Ефремов
Издательство: Директ-Медиа
Год: 2021
Формат: PDF
Страниц: 210
Размер: 12 Mb
Язык: Русский

Рассматриваются основы информационной безопасности, особенности защиты авторских прав, технические и криптографические методы защиты, показан способ интеграции механизмов защиты ПО с использованием современных программных и аппаратных средств