Добавить в закладки
Наш форум
Правила Litmy.ru
Мы в Вконтакте
Подписка на RSS
Для правообладателей
Поиск книг:
Разделы сайта
Авторизация
Регистрация



Реклама


Название: Towards Wireless Heterogeneity in 6G Networks
Автор: Abraham George, G. Ramana Murthy
Издательство: CRC Press
Год: 2024
Страниц: 253
Язык: английский
Формат: pdf (true)
Размер: 14.5 MB

The connected world paradigm effectuated through the proliferation of mobile devices, Internet of Things (IoT), and the metaverse will offer novel services in the coming years that need anytime, anywhere, high-speed access. The success of this paradigm will highly depend on the ability of the devices to always obtain the optimal network connectivity for an application and on the seamless mobility of the devices. This book will discuss 6G concepts and architectures to support next-generation applications such as IoT, multiband devices, and high-speed mobile applications. IoT applications put forth significant challenges on the network in terms of spectrum utilization, latency, energy efficiency, large number of users, and supporting different application characteristics in terms of reliability, data rate, and latency. While the 5G network developmentwas motivated by the need for larger bandwidth and higher quality of service (QoS), 6G considerations are supporting many users with a wide application requirement, lowering network operating cost, and enhanced network flexibility. Network generations beyond 5G are expected to accommodate massive number of devices with the proliferation of connected devices concept in connected cars, industrial automation, medical devices, and consumer devices.
Разместил: literator 31-01-2024, 04:14 | Комментарии: 0 | Подробнее
Название: Reconnoitering the Landscape of Edge Intelligence in Healthcare
Автор: Suneeta Satpathy, Sachi Nandan Mohanty, Sirisha Potluri
Издательство: CRC Press
Год: 2024
Страниц: 292
Язык: английский
Формат: pdf (true)
Размер: 10.9 MB

The revolution in healthcare as well as demand for efficient real-time healthcare services are driving the progression of edge computing, AI-mediated techniques, deep learning, and IoT applications for healthcare industries and cloud computing. Edge computing helps to meet the demand for newer and more sophisticated healthcare systems that are more personalized and that match the speed of modern life. With applications of edge computing, automated intelligence and intuitions are incorporated into existing healthcare analysis tools for identifying, forecasting, and preventing high-risk diseases. Reconnoitering the Landscape of Edge Intelligence in Healthcare provides comprehensive research on edge intelligence technology with the emphasis on application in the healthcare industry. It covers all the various areas of edge intelligence for data analysis in healthcare, looking at the emerging technologies such as AI-based techniques, machine learning, IoT, cloud computing, and deep learning with illustrations of the design, implementation, and management of smart and intelligent healthcare systems. This volume will be helpful to engineering students, research scholars, and manufacturing industry professionals in the fields of engineering applications initiatives on AI, Machine Learning, and Deep Learning techniques for edge computing.
Разместил: literator 29-01-2024, 21:34 | Комментарии: 0 | Подробнее
Название: Home Networking For Beginners - 5th Edition 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 104
Язык: английский
Формат: pdf
Размер: 44.1 MB

Книга "Домашняя сеть для начинающих" - это первый и единственный выбор для начинающих, который поможет им создать домашний сетевой центр и научиться всему, что необходимо знать для безопасного использования Интернета. Написанное простым английским языком, это отдельное руководство содержит множество полезных советов и пошаговых иллюстрированных инструкций. Это совершенно новое руководство пользователя расскажет вам все, что нужно знать о домашних сетях и интеллектуальных устройствах. С этим неофициальным руководством у вас не останется нерешенных проблем или вопросов без ответов, пока вы учитесь, изучаете и совершенствуете свои навыки работы с сетью.
Разместил: literator 28-01-2024, 05:28 | Комментарии: 0 | Подробнее
Название: Exploring Blockchain Applications: Management Perspectives
Автор: Sezer Bozkus Kahyaoglu, Vahap Tecim
Издательство: CRC Press
Год: 2024
Страниц: 304
Язык: английский
Формат: pdf (true)
Размер: 11.5 MB

In this book, the development process of blockchain algorithms and examples of their applications in different sectors are explored. The opportunities and challenges of blockchain implementations that arise in making technological innovations usable in corporate structures are discussed. In this respect, the book aims to deal with both the conceptual framework and the real challenges and opportunities encountered in practice regarding the blockchain applications. It is tried to contribute to the literature by presenting practical blockchain application suggestions to the readers on a scientific basis. It is a fact that blockchain technology is considered one of the most disruptive and revolutionary innovations after the invention of the internet. Blockchain technology, which was first used for cross-border payments, is coming up with a new application area in a different sector every day. The main purpose of Blockchain-based systems is to spread the "trust" service provided by a central intermediary to machines in transactions between two parties. Thus, it removes the need for this trust from the monopoly of a single intermediary. Blockchain implementation scenarios are to establish math-based trust in an untrusted environment.
Разместил: literator 27-01-2024, 06:02 | Комментарии: 0 | Подробнее
Название: The Complete Google Manual 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 146
Язык: английский
Формат: pdf
Размер: 57.1 MB

Узнайте, как овладеть бесплатными приложениями Google! Google - это гораздо больше, чем просто поиск в Интернете! Со скромного старта в качестве поисковой системы, сейчас Google предлагает электронную почту с бесплатным онлайн-хранилищем, управление фотографиями и их редактирование, социальную сеть с миллионами пользователей, управление и редактирование фотографий, один из лучших интернет-браузеров, крупнейший видеосайт в мире, ведущую на рынке операционную систему для смартфонов, интерактивные карты и навигация, бесплатная платформа для ведения блогов и многое, многое другое. 100% неофициально.
Разместил: literator 26-01-2024, 05:56 | Комментарии: 0 | Подробнее
Название: Enterprise Cyber Risk Management as a Value Creator: Leverage Cybersecurity for Competitive Advantage
Автор: Bob Chaput
Издательство: Apress
Год: 2024
Страниц: 333
Язык: английский
Формат: pdf
Размер: 37.1 MB

This book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities. ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy.
Разместил: literator 24-01-2024, 04:40 | Комментарии: 0 | Подробнее
Название: Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing
Автор: Roger A. Grimes, Dr. John N. Just
Издательство: Wiley
Год: 2024
Страниц: 450
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks. Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth strategy to defeat hackers and malware. Written by the lead data-driven defense evangelist at the world's number one anti-phishing company, KnowBe4, Inc., this guide shows you how to create an enduring, integrated cybersecurity culture. This book is for anyone interested in fighting social engineering and phishing attacks—from entire organizations to single individuals, from dedicated anti-phishing employees to IT managers, and for any IT security practitioner.
Разместил: literator 23-01-2024, 10:54 | Комментарии: 0 | Подробнее
Название: 5G Non-Terrestrial Networks: Technologies, Standards, and System Design
Автор: Alessandro Vanelli-Coralli, Nicolas Chuberre, Gino Masini
Издательство: Wiley-IEEE Press
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true), epub
Размер: 21.4 MB

Provides a complete and detailed description of the non-terrestrial component in the 5G ecosystem. 5G Non-Terrestrial Networksis the first multi-authored reference dedicated to the integration of non-terrestrial networks (NTN) into the 5G ecosystem. Written by leaders in the development of the 3GPP 5G NTN specification, this authoritative resource addresses all key aspects of non-terrestrial components of 5G systems, including standardization, architecture, protocols, and regulatory considerations. Drawing from their expertise in academic and industrial research and development, the authors introduce fundamental principles of non-terrestrial communications, define the NTN architecture and radio protocol stacks, describe applications to support mobility and radio resource management, and more. The book covers 5G New Radio-based technology for NTN as well as LTE NB-IoT/eMTC, providing a well-rounded understanding of the unique characteristics of 5G-NTN systems. Throughout the text, the authors offer insights on various design approaches, technical choices, and trade-off options. This book aims at providing an overview of this 3GPP-defined “NTN” standard. Aimed at easing the inclusion of NTN elements in the 5G ecosystem, the work was conducted within the 3GPP starting with the identification of the technical challenges and potential solutions to support New Radio (NR) protocols and features over satellite links.
Разместил: literator 22-01-2024, 23:14 | Комментарии: 0 | Подробнее
Название: Azure Security (Final Release)
Автор: Bojan Magušić
Издательство: Manning Publications
Год: 2024
Страниц: 336
Язык: английский
Формат: epub
Размер: 15.1 MB

Secure your Azure applications the right way with the expert DevSecOps techniques you'll learn in this essential handbook. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Attacks against cloud-based applications are increasingly common and sophisticated. It’s vital for any developer or resource owner to understand how to properly configure their Azure cloud environments and establish reliable security best practices. The Azure platform comes with dozens of built-in security tools to help keep your systems safe. This book will teach you exactly how to set them up for maximum effectiveness. Azure Security is a practical guide to the native security services of Microsoft Azure. You’ll learn how to use Azure tools to improve your systems security and get an insider’s perspective on establishing a DevSecOps program using the capabilities of Microsoft Defender for Cloud. Insightful analogies and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you’ve learned.
Разместил: literator 22-01-2024, 14:39 | Комментарии: 0 | Подробнее
Название: Cyber Forensics Up and Running: A hands-on guide to digital forensics tools and technique
Автор: Tarun Vashishth
Издательство: BPB Publications
Год: 2024
Страниц: 414
Язык: английский
Формат: epub (true)
Размер: 25.3 MB

Learn using Cloud data technologies for improving data analytics and decision-making capabilities for your organization. Digital forensics is the art and science of extracting the hidden truth and this book is your hands-on companion, bringing the world of digital forensics to life. Starting with the core principles of digital forensics, the book explores the significance of various case types, the interconnectedness of the field with cybersecurity, and the ever-expanding digital world's challenges. As you progress, you will explore data acquisition, image formats, digital evidence preservation, file carving, metadata extraction, and the practical use of essential forensic tools like HxD, The Sleuth Kit, Autopsy, Volatility, and PowerForensics. The book offers step-by-step instructions, real-world case studies, and practical examples, ensuring that beginners can confidently set up and use forensic tools. Experienced professionals, on the other hand, will find advanced insights into memory analysis, network forensics, anti-forensic techniques, and more. This book empowers you to become a digital detective, capable of uncovering data secrets, investigating networks, exploring volatile and non-volatile evidence, and understanding the intricacies of modern browsers and emails. Digital forensics analysts may be called upon to investigate crimes committed using a computer or other digital device. It could include hacking, identity theft, data exfiltration, sabotage, etc.
Разместил: literator 21-01-2024, 19:47 | Комментарии: 0 | Подробнее



 Litmy.ru  ©2020-2023     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности