Название: Wireless Sensor and Actuator Networks for Smart Cities Автор: Burak Kantarci, Sema Oktug Издательство: Mdpi AG ISBN: 3038974234 Год: 2018 Страниц: 170 Язык: английский Формат: pdf (true), djvu Размер: 10.1 MB
Our lives are being transformed by the interplay between mobile networks, wireless communications, and artificial intelligence. This transformation is an outcome of the emerging Internet of Things (IoT) concept and advancements in computer architecture that translate into high computing power, high-performance processing, and huge memory capacities. In addition to the IoT, cyber-physical systems aim for the seamless integration of physical systems with computing and communication resources. Furthermore, in urban areas, the integration of "software-defined sensor networks" and "sensing as a service" concepts with legacy WSN-based systems is leading to the transformation of conventional city services towards smart cities. Smart energy, smart driving, smart homes, smart living, smart governance, and smart health are just a few services that smart cities can offer.
Название: Learning Amazon Web Services (AWS): A Hands-On Guide to the Fundamentals of AWS Cloud Автор: Mark Wilkins Издательство: Addison-Wesley Professional Год: 2019 Формат: epub Страниц: 448 Размер: 28.1 Mb Язык: English
The Practical, Foundational Technical Introduction to the World’s #1 Cloud Platform Includes access to several hours of online training video: Mark Wilkins’ expert training video library guides you through setting up core services and prepares you to deploy your own apps and resources. Learning Amazon Web Services (AWS) is the perfect foundational resource for all administrators, developers, project managers, and other IT professionals who want to plan and deploy AWS services and/or earn AWS certification.
Название: The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things Автор: Aditya Gupta Издательство: Apress ISBN: 1484242998 Год: 2019 Страниц: 330 Язык: английский Формат: pdf (true) Размер: 18.5 MB
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware.
Название: Hands-on Incident Response and Digital Forensics Автор: Mike Sheward Издательство: BCS, The Chartered Institute for IT Год: 2018 Страниц: 238 Язык: английский Формат: epub, pdf (conv) Размер: 10.1 MB
Incident response and digital forensics require a balancing act to get right, but both are essential when an information security incident occurs. In this practical guide, the relationship between incident response and digital forensics is explored and you will learn how to undertake each and balance them to meet the needs of an organisation in the event of an information security incident. Best practice tips and real-life examples are included throughout. There are countless books on information security theory, and many of them are dedicated to incident response (IR). So, what makes this one any different? The aim of this book is to take the theory and show how it applies to various real-life incidents and investigations, in a hands-on fashion.
Название: Cognitive Radio Networks: Performance, Applications and Technology Автор: Chee Wei Tan Издательство: Nova Science Pub Inc Series: Electronics and Telecommunications Research ISBN: 1536130680 Год: 2018 Страниц: 318 Язык: английский Формат: True PDF Размер: 10.1 MB
Over the past two decades, there have been rapid and significant developments in the field of wireless networking, especially with the emergence of wireless cognitive radio network technologies. There are, however, fundamental limits to communications and radio resource is scarce in the face of demand. This gives rise to new challenges in jointly managing resource allocation and interference management in a cognitive manner. The first cognitive radio wireless standard, IEEE 802.22, was only published in 2011, whereby white space - referring to the unused frequency spectrums that are location-specific - in television channels can be identified for use by other devices in a cognitive radio network.
Название: Internet Safety For Seniors Автор: James Gale (Editor) Издательство: Papercut Limited ISBN: 1907306129 Год: 2019 Страниц: 133 Язык: английский Формат: pdf Размер: 93.1 MB
Exclusively for seniors. This specifically written publication is packed with jargon-free, easy-to-follow guides and tutorials that really help you avoid the many pitfalls that await you online. If you want to get more from your photography, this is the book for you. With crystal clear guides written in plain English - displayed in large format text - and illustrated with informative full colour screenshots, you will discover everything you need to know to help you build your understanding and your confidence when it comes to dealing with Hackers, Viruses, Malware, Spyware, keeping your personal details secure and that's just the beginning. 100% unofficial.
Название: Exam Ref MS-100 Microsoft 365 Identity and Services Автор: Orin Thomas Издательство: Microsoft Press Год: 2019 Формат: epub Страниц: 272 Размер: 21.6 Mb Язык: English
Prepare for Microsoft Exam MS-100–and help demonstrate your real-world mastery of skills and knowledge needed to effectively design, deploy, manage, and secure Microsoft 365 services. Designed for experienced IT professionals, Exam Ref focuses on critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level.
Название: Security, Privacy, and Digital Forensics in the Cloud Автор: Lei Chen, Hassan Takabi Издательство: Wiley ISBN: 1119053285 Год: 2019 Страниц: 355 Язык: английский Формат: pdf (true), djvu Размер: 10.17 MB
In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book.
Название: Network and Data Security for Non-Engineers Автор: Frank M. Groom, Kevin Groom Издательство: Auerbach Publications ISBN: 1498767869 Год: 2017 Страниц: 274 Язык: английский Формат: True PDF Размер: 10.5 MB
Изучите безопасность сети и данных, проанализировав взлом компании Anthem и шаг за шагом, как хакеры получают доступ, размещают скрытое программное обеспечение, загружают информацию и скрывают доказательства их взлома. Препарируйте формы инфекций, включая вирусы, черви, боты и трояны; и шифруйте данные с помощью алгоритма RSA в качестве рабочего примера.
Название: Security Solutions for Hyperconnectivity and the Internet of Things Автор: Maurice Dawson, Mohamed Eltayeb Издательство: IGI Global Серия: Advances in Information Security, Privacy, and Ethics ISBN: 1522507418 Год: 2017 Страниц: 369 Язык: английский Формат: pdf, djvu Размер: 10.87 MB
Интернет вещей предлагает мир, в котором интеллектуальные технологии позволяют объектам с сетью взаимодействовать друг с другом и легко взаимодействовать с людьми. Этот связанный мир удобства и технологии не может не иметь своих недостатков, поскольку межсетевое взаимодействие подразумевает возможность взлома. Книга "Решения безопасности для гиперподключенности и Интернета вещей" предлагает информацию о новейших исследованиях в стратегиях и методах, которые могут быть реализованы для защиты от кибератак. Призывая к стратегиям передовой защиты для пересмотра безопасности, эта книга - важный ресурс для программистов, инженеров, бизнес-профессионалов, исследователей и продвинутых студентов в соответствующих областях.