LitMy.ru - литература в один клик

  • Добавил: Knizhka01
  • Дата: 13-06-2025, 14:10
  • Комментариев: 0

Название: Информация и сети связи
Автор: Давыдов Г.Б.
Издательство: Наука
Год издания: 1984
Количество страниц: 130
Язык: русский
Формат: DJVU, PDF
Размер: 20 Мб

Сеть электросвязи, посредством которой осуществляется передача и распределение информации, справедливо считается одним из самых сложных сооружений, когда-либо создававшихся человечеством.
В книге рассказывается о том, как действует система электросвязи в целом, какие процессы в ней происходят, как устроены ее компоненты, как они взаимосвязаны, какие проблемы возникают в процессе развития этой системы. Особое внимание уделено новым тенденциям ее развития - внедрению прогрессивной технологии и слиянию сети электросвязи с ЭВМ.
Доктор технических наук Г.Б. Давыдов - ведущий ученый в области систем передачи информации и сетей электросвязи, автор более 50 работ по вопросам электросвязи.
  • Добавил: literator
  • Дата: 12-06-2025, 02:00
  • Комментариев: 0
Название: Acing the ISC2 Cybersecurity Certification Exam (MEAP v1)
Автор: Paulo Carreira, Andrée Miranda Louraço
Издательство: Manning Publications
Год: 2025
Страниц: 147
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.1 MB

Jump start your career in cybersecurity by acing the ISC2 Certified in Cybersecurity (CC) exam! ISC2 certifications like CISSP have always signaled job-ready skills to employers. The new Certified in Cybersecurity (CC) exam is your first step toward an exciting—and lucrative—career in cybersecurity. In Acing the ISC2 Cybersecurity Certification Exam, you’ll learn from expert tutors Paulo Carreira and Andrée Miranda how to pass on the very first try! Acing the ISC2 Cybersecurity Certification Exam is expertly written to match the tone, structure, and challenges you’ll face when you sit for the real ISC2 CC. It breaks down complex cybersecurity concepts into real-world examples that are easy to understand and to put into practice. You’ll learn how to handle everyday security issues, including responding to an insider threat, managing access after a staff member leaves, and identifying a misconfigured firewall rule. For both technical and non-technical professionals starting out or transitioning into cybersecurity.
  • Добавил: literator
  • Дата: 10-06-2025, 08:13
  • Комментариев: 0
Название: The Smart Life Revolution: Embracing AI and IoT in Society
Автор: Connie Tee, Thian Song Ong, Md Shohel Sayeed
Издательство: CRC Press
Год: 2025
Страниц: 293
Язык: английский
Формат: pdf (true), epub
Размер: 25.8 MB

This book explores the integration of Artificial Intelligence (AI) across areas such as IoT, Big Data, healthcare, business, economics, and security, and improving the quality of life (QoL) in smart cities today. By looking in depth at the different application areas of AI, the reader learns about the broad and impactful ways AI is transforming our world, its profound influence in enhancing service efficiency, personalization, accessibility, and fostering both scientific and social advancement. The editors consider the importance of bridging theory and practice by offering a practical understanding of how key AI technologies can be applied in real-world scenarios for QoL. By covering both foundational concepts and advanced applications with case studies and practical examples, this approach ensures the reader obtains a comprehensive understanding of the technologies and their impact. Biometric authentication has gained popularity in recent years as the demand for reliable and simple identification methods has increased across a wide range of applications. Biometric technologies have become an essential part of modern security solutions due to their improved security, resilience and ease of use achieved through rapid technological development compared to traditional methods using passwords or PINs.
  • Добавил: literator
  • Дата: 8-06-2025, 03:31
  • Комментариев: 0
Название: Multimedia Security: Tools, Techniques, and Applications
Автор: Bhaskar Mondal, Shyam Singh Rajput
Издательство: Apple Academic Press/CRC Press
Год: 2025
Страниц: 370
Язык: английский
Формат: epub (true)
Размер: 24.2 MB

Multimedia security has become one of the most important topics for organizations and individuals. Presenting important state-of-the art multimedia security techniques and algorithms, this book focuses on data encryption, steganography, watermarking, authentication, data hiding, biometric template security, quantum-based video cryptosystems, pan sharpening, and digital signatures to help in protecting the unauthorized access/alteration of multimedia over the Internet and cloud. It also covers the application of machine learning, blockchain, and AI-based methods for multimedia security. Mathematical models used in data hiding and data evaluation techniques are discussed thoroughly to provide a good understanding of the principles of multimedia security.
  • Добавил: literator
  • Дата: 5-06-2025, 23:12
  • Комментариев: 0
Название: The Effects of Cyber Supply Chain Attacks and Mitigation Strategies
Автор: Ravi Das
Издательство: CRC Press
Год: 2026
Страниц: 200
Язык: английский
Формат: pdf, epub (true)
Размер: 14.4 MB

The world of Cybersecurity today is becoming increasingly complex. There are many new Threat Variants that are coming out, but many of them are just tweaked versions of some of the oldest ones, such as Phishing and Social Engineering. In today’s world, Threat Variants are becoming more complex, more covert, and stealthier. Thus, it makes it almost impossible to detect them on time before the actual damage is done. One such example of this is what is known as Supply Chain Attacks. What makes this different from the other Threat Variants is that through just one point of entry, the Cyberattacker can deploy a Malicious Payload and impact thousands of victims. A penetration test, or “pen test,” is a security test that launches a mock cyberattack to find vulnerabilities in a computer system. Penetration testers are security professionals skilled in the art of ethical hacking, which is the use of hacking tools and techniques to fix security weaknesses rather than cause harm. Companies hire pen testers to launch simulated attacks against their apps, networks, and other assets.
  • Добавил: literator
  • Дата: 5-06-2025, 20:30
  • Комментариев: 0
Название: Advances in AI for Cloud, Edge, and Mobile Computing Applications
Автор: Shrikaant Kulkarni, P. William
Издательство: CRC Press
Год: 2026
Страниц: 364
Язык: английский
Формат: epub (true)
Размер: 12.2 MB

This new book presents some exciting advances in AI applications, highlighting trends and innovations in edge, cloud, and mobile computing and how they can be integrated with advanced AI for enhancing services, privacy, and security. It explores algorithms, architectures, reliable AI-powered IoTs, and other aspects in networking and applications in diverse frontier areas. These state-of-the-art technologies have a comparative advantage in terms of very low latency, fast response time, low bandwidth cost, and improved resilience. First focusing on advanced cloud AI services, the authors look at a power trading framework of cloud-edge computing in an AI bazaar, the use of anomaly detection in AI in a cloud-fuzzy environment, holistic resource management based on AI and sustainable cloud computing, the application of AI for enhanced privacy and security in smart environments, AI in wireless sensor networks, and more. The volume also presents advances in state-of-the-art edge AI services, along with problems that may be confronted during the application and execution of computing services.
  • Добавил: literator
  • Дата: 5-06-2025, 19:17
  • Комментариев: 0
Название: Cybersecurity of Industrial Internet of Things (IIoT)
Автор: Atdhe Buja
Издательство: CRC Press
Год: 2026
Страниц: 160
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

While the Industrial Internet of Things (IIoT) continues to redefine industrial infrastructure, the need for thriving Cybersecurity measures has never been more pressing. Cybersecurity of Industrial Internet of Things (IIoT) contends with the critical question of how to secure IIoT systems against the intensifying risks posed by cyber threats and attacks. This book is a fundamental guide for industrial leaders and professionals pursuing to understand and implement effective Cybersecurity solutions. It covers the fundamentals of cyber-physical systems (CPS), Internet of Things (IoT), and IT systems, while handing insights into prevailing and emerging cyber threats targeting industrial environments. This book is thoughtful for cybersecurity professionals working in cyber-physical systems and critical infrastructure domains, including smart cities, aerospace, manufacturing, etc. It is also a valuable resource for Chief Information Officers (CIOs), industrial engineers, and researchers engaged in industrial engineering. Whether you are a practitioner, a professional, or a student casting to upskill, this book provides the essential tools and insights to navigate the emerging perspective of industrial cybersecurity.
  • Добавил: literator
  • Дата: 5-06-2025, 18:32
  • Комментариев: 0
Название: Systematic Security: A CISO's Playbook
Автор: Timur Qader
Издательство: CRC Press
Год: 2026
Страниц: 204
Язык: английский
Формат: epub (true)
Размер: 10.1 MB

In today’s rapidly evolving digital landscape, safeguarding critical data and systems has never been more vital—or more challenging. Systematic Security: A CISO’s Playbook by Timur Qader offers a groundbreaking guide to building a resilient and scalable security practice from the ground up. Blending real-world experience with practical insights, this book lays out a phased approach to security implementation. Timur begins with describing the current state of security and the landscape security professionals find themselves in that offer both opportunity and risk. He goes on to systematically address strategic design, operational efficiency, risk-based modeling, and a rapidly growing regulatory landscape. This essential resource provides step-by-step strategies for implementing a comprehensive security framework. Whether you're launching a new security program or transforming an existing one, this book delivers actionable insights on governance, compliance, and advanced security operations. Whether you’re an aspiring CISO, a security professional, or a business leader looking to fortify your organization’s defenses, Systematic Security delivers the strategies and tools to create lasting security excellence.
  • Добавил: Chipa
  • Дата: 5-06-2025, 14:53
  • Комментариев: 0

Название: Создавайте уникальные фотографии с помощью искусственного интеллекта
Автор: Анастасия Мизгир
Издательство: Интернет-издание
Год: 2025
Формат: Docx/jpg
Страниц: много
Размер: 846 Mb
Язык: Русский

Это полный гайд по работе с нейросетями, где ты научишься создавать крутой контент: оживлять фото, генерировать видео, делать профессиональные нейрофотосессии и даже продвигать свои услуги с помощью ИИ.

  • Добавил: gol8425
  • Дата: 4-06-2025, 17:39
  • Комментариев: 0
Название: Надежность компьютерных сетей
Автор: Цвитун А.А., Корнейчук В.И.
Издательство: Корнійчук
Год: 2010
Страниц: 116
Формат: pdf
Размер: 52 мб
Качество: хорошее
Язык: русский

Описана методика расчета локальных и корпоративных компьютерных сетей на основе собранных и обобщенных справочных данных по интенсивности отказов и ремонтопригодности электронных компонент сетей. На конкретных примерах рассмотрены методы повышения надежности компьютерных сетей с математическим анализом их эффективности и целесообразности применения.