Добавить в закладки
Наш форум
Правила Litmy.ru
Мы в Вконтакте
Подписка на RSS
Для правообладателей
Поиск книг:
Разделы сайта
Авторизация
Регистрация



Реклама


Название: Network Security (Networks and Telecommunications Series)
Автор: Andr? P?rez
Издательство: Wiley-ISTE
Год: 2014
Формат: PDF
Страниц: 262
Для сайта: litmy.ru
Размер: 5 Mb
Язык: English
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying rules to data in order to authorize its transfer or detect attacks.
The chapters of the book cover cryptography, 802.1x mechanism, WPA mechanisms, IPSec mechanism, SSL/TLS/DTLS protocols, network management, MPLS technology, Ethernet VPN, firewalls and intrusion detection.
Разместил: Ice Zero 14-02-2019, 13:00 | Комментарии: 0 | Подробнее
Название: Combinatorial Search: From Algorithms to Systems
Автор: Youssef Hamadi
Издательство: Springer
Год: 2013
Формат: PDF
Страниц: 139
Для сайта: litmy.ru
Размер: 2 Mb
Язык: English
Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to efficiently explore these regions. Various mathematical formalisms may be used to express and tackle combinatorial problems, among them the constraint satisfaction problem (CSP) and the propositional satisfiability problem (SAT). These algorithms, or constraint solvers, apply search space reduction through inference techniques, use activity-based heuristics to guide exploration, diversify the searches through frequent restarts, and often learn from their mistakes.
Разместил: Ice Zero 14-02-2019, 11:54 | Комментарии: 0 | Подробнее

Название : Circuits and Systems for Security and Privacy
Автор : Farhana Sheikh, Leonel Sousa
Издательство: CRC Press
Год издания : 2016
Страниц: 400
Формат : PDF
Размер файла: 12,1 Mб
Язык : English

This book begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.
Разместил: harun54 13-02-2019, 20:29 | Комментарии: 0 | Подробнее
Название: Media and Radio Signal Processing for Mobile Communications
Автор: Kyunghun Jung and Russell M. Mersereau
Издательство: Cambridge University Press
Год: 2018
Формат: PDF
Размер: 34 Мб
Язык: английский / English

Get to grips with the principles and practice of signal processing used in mobile communications systems. Focusing particularly on speech, video, and modem signal processing, pioneering experts employ a detailed, top-down analytical approach to outline the network architectures and protocol structures of multiple generations of mobile communications systems, identify the logical ranges where media and radio signal processing occur, and analyze the procedures for capturing, compressing, transmitting, and presenting media.
Разместил: harun54 13-02-2019, 17:50 | Комментарии: 0 | Подробнее
Название: CISO's Guide to Penetration Testing
Автор: James S. Tiller
Издательство: CRC Press
Год: 2011
Формат: PDF, EPUB
Размер: 12 Мб
Язык: английский / English

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used.
Разместил: harun54 13-02-2019, 17:19 | Комментарии: 0 | Подробнее
Название: Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance
Автор: Karm Veer Arya and Robin Singh Bhadoria
Издательство: Springer
Год: 2018
Формат: PDF
Размер: 11 Мб
Язык: английский / English

The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g. healthcare, agriculture, building smart cities, forecasting and the manufacturing industry. The book begins by discussing advances in wireless communication, including emerging trends and research directions for network technologies. It also highlights the importance of and need to actively develop these technologies.
Разместил: harun54 13-02-2019, 17:17 | Комментарии: 0 | Подробнее
Название: How to Do Everything: iCloud, Second Edition
Автор: Jason R. Rich
Издательство: McGraw-Hill Education
Год: 2014
Формат: PDF
Размер: 27 Мб
Язык: английский / English

This all-new edition of How To Do Everything: iCloud fully covers iCloud’s versatile features and offers step-by-step directions on how to use each one, including Shared Photo Streams, the iWork for iCloud apps, and iCloud Keychain. You’ll learn how to set up iCloud, transfer and sync app-specific data, documents, files, photos, music, and other content among your computers and iOS mobile devices.
Разместил: harun54 12-02-2019, 22:01 | Комментарии: 0 | Подробнее
Название: Architectures and Protocols for Secure Information Technology Infrastructures
Автор: Ruiz-Martinez
Издательство: Information Science Reference
Год: 2013
Формат: PDF
Размер: 25 Мб
Язык: английский / English

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.
Разместил: harun54 12-02-2019, 21:57 | Комментарии: 0 | Подробнее
Название: Architectural Transformations in Network Services and Distributed Systems
Автор: Andriy Luntovskyy and Josef Spillner
Издательство: Springer
Год: 2017
Формат: PDF
Размер: 18 Мб
Язык: английский / English

With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed.
Разместил: harun54 12-02-2019, 21:35 | Комментарии: 0 | Подробнее
Название: Facebook for Seniors: Connect with Friends and Family in 12 Easy Lessons
Автор: Carrie Ewin and Chris Ewin
Издательство: No Starch Press
Год: 2016
Формат: EPUB
Размер: 15 Мб
Язык: английский / English

Facebook is the world's largest internet community. It's used by millions of people like you to connect with family and friends, share photos, and stay in touch. But if you're new to Facebook, getting started can be a little tricky.
Разместил: harun54 12-02-2019, 21:30 | Комментарии: 0 | Подробнее



 Litmy.ru  ©2020-2023     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности