Название: Internet of Nano-Things and Wireless Body Area Networks (WBAN) Автор: Fadi Al-Turjman Издательство: Auerbach Publications Год: 2019 Формат: True PDF Страниц: 255 Размер: 11.1 Mb Язык: English
The Internet of Nano-Things (IoNT) is a system of nano-connected devices, objects, or organisms that have unique identifiers to transfer data over a computer or cellular network wirelessly to the Cloud. Data delivery, caching, and energy consumption are among the most significant topics in the IoNT nowadays. The book addresses data routing and energy consumption challenges and proposes nano-sensing platforms in critical Wireless Body Area Networks (WBAN). This book covers both design and implementation aspects of data delivery models and strategies in a smart application enabled by the WBAN. It focuses on smart data delivery approaches and energy savings aspects in a reliable IoNT systems.
Название: Cryptographic Security Solutions for the Internet of Things Автор: Mohammad Tariq Banday Издательство: IGI Global ISBN: 1522557423 Год: 2019 Страниц: 393 Язык: английский Формат: pdf (true) Размер: 10.1 MB
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things.
This book provides knowledge into the intelligence and security areas of smart-city paradigms. It focuses on connected computing devices, mechanical and digital machines, objects, and/or people that are provided with unique identifiers. The authors discuss the ability to transmit data over a wireless network without requiring human-to-human or human-to-computer interaction via secure/intelligent methods. The authors also provide a strong foundation for researchers to advance further in the assessment domain of these topics in the IoT era. The aim of this book is hence to focus on both the design and implementation aspects of the intelligence and security approaches in smart city applications that are enabled and supported by the IoT paradigms.
Название: Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations Автор: John Bair Издательство: Academic Press Год: 2018 Страниц: 526 Язык: английский Формат: True PDF Размер: 13.1 MB
Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations will assist those who have never collected mobile evidence and augment the work of professionals who are not currently performing advanced destructive techniques. This book is intended for any professional that is interested in pursuing work that involves mobile forensics, and is designed around the outcomes of criminal investigations that involve mobile digital evidence. Author John Bair brings to life the techniques and concepts that can assist those in the private or corporate sector.
Название: CISM Certified Information Security Manager Practice Exams Автор: Peter H. Gregory Издательство: McGraw-Hill Education Год: 2019 Страниц: 240 Язык: английский Формат: epub, pdf (conv) Размер: 10.1 MB
Don’t Let the Real Test Be Your First Test! Take the current version of the challenging CISM exam with complete confidence using relevant practice questions contained in this effective self-study guide. Each chapter of the book contains a battery of questions that closely match those on the live test in content, format, tone, and feel. To reinforce salient points and facilitate retention, in-depth explanations are provided for both the correct and incorrect answer choices. Written by an InfoSec expert and experienced author, CISM Certified Information Security Manager Practice Exams thoroughly covers every subject on the exam. Designed to help you pass the test with greater ease, this book is also an ideal companion to the CISM Certified Information Security Manager All-in-One Exam Guide.
Название: GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition Автор: Ric Messier Издательство: McGraw-Hill Education Год: 2019 Страниц: 608 Язык: английский Формат: epub Размер: 76.9 MB
Fully updated coverage of every topic on the current version of the GSEC exam. Get complete coverage of all the objectives on Global Information Assurance Certification’s Security Essentials (GSEC) exam inside this comprehensive resource. GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference.
Название: Internet of Things Security: Challenges, Advances, and Analytics Автор: Chintan Patel, Nishant Doshi Издательство: Auerbach Publications ISBN: 1138318639 Год: 2018 Страниц: 261 Язык: английский Формат: pdf (true) Размер: 40.4 MB
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
Название: Система электронной почты на основе Linux Автор: Блам, Ричард Издательство: М.: Издательский дом “Вильямс” Год: 2001 Формат: PDF Страниц: 448 Размер: 35,5 MB Язык: русский
Основной целью создания этой книги является оказание помощи сетевым администраторам небольших учреждений в организации высокопроизводительной и качественной системы электронной почты, которая бы не уступала коммерческим аналогам. Кроме того, если предполагается подключение вашей системы электронной почты к сети Internet, то здесь вы найдете подробные материалы по этой теме. Вся информация, представленная в книге, может использоваться либо в учебных целях, либо в качестве справочника (или и в том, и другом качестве).
Название: Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations Автор: Niranjan Reddy Издательство: Apress Год: 2019 Формат: True PDF, ePub Страниц: 507 Размер: 26.7 Mb, 61.2 Mb Язык: English
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following this, you will work with cloud and mobile forensic techniques by considering the concept of forensics as a service (FaSS), giving you cutting-edge skills that will future-proof your career.
Название: Multimedia Networking Technologies, Protocols, & Architectures Автор: Ivan Vidal, Ignacio Soto, Albert Banchs Издательство: Artech House ISBN: 1630813788 Год: 2019 Страниц: 352 Язык: английский Формат: pdf (true) Размер: 10.15 MB
This practical resource provides a survey on the technologies, protocols, and architectures that are widely used in practice to implement networked multimedia services. The book presents the background and basic concepts behind multimedia networking, and provides a detailed analysis of how multimedia services work, reviewing the diverse network protocols that are of common use to implement them. To guide the explanation of concepts, the book focuses on a representative set of networked multimedia services with proven success and high penetration in the telecommunication market, namely Internet telephony (VoIP), Video-on-Demand (VoD), and live IP television (IPTV). Contents are presented following a stepwise approach, describing each network protocol in the context of a networked multimedia service and making appropriate references to the protocol as needed in the description of other multimedia services.