Добавить в закладки
Наш форум
Правила Litmy.ru
Мы в Вконтакте
Подписка на RSS
Для правообладателей
Поиск книг:
Разделы сайта
Авторизация
Регистрация



Реклама


Название: 802.11 Wireless Networks: The Definitive Guide, Second Edition
Автор: Matthew S. Gast
Издательство: O'Reilly Media
Год: 2005
Формат: ebup
Страниц: 672
Для сайта: litmy.ru
Размер: 7 Mb
Язык: English

As we all know by now, wireless networks offer many advantages over fixed (or wired) networks. Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network.
Разместил: Ice Zero 16-11-2018, 18:30 | Комментарии: 0 | Подробнее
Название: 4G: Deployment Strategies and Operational Implications: Managing Critical Decisions in Deployment of 4G/LTE Networks and their Effects on Network Operations and Business
Автор: Trichy Venkataraman Krishnamurthy, Rajaneesh Shetty
Издательство: Apress
Год: 2014
Формат: PDF
Страниц: 188
Для сайта: litmy.ru
Размер: 3 Mb
Язык: English

As telecommunications operators and network engineers understand, specific operational requirements drive early network architectural and design decisions for 4G networks. But they also know that because technology, standards, usage practices, and regulatory regimes change on a continuous basis, so do best practices. 4G: Deployment Strategies and Operational Implications helps you stay up to date by providing the latest innovative and strategic thinking on 4G and LTE deployments. It evaluates specific design and deployment options in depth and offers roadmap evolution strategies for LTE network business development.
Разместил: Ice Zero 16-11-2018, 16:24 | Комментарии: 0 | Подробнее
Название: Metasploit Bootcamp
Автор: Mike Schiller
Издательство: Amazon Digital Services LLC
ASIN: B07F9LG66Q
Год: 2018
Страниц: 482
Язык: английский
Формат: epub
Размер: 14.17 MB

The book begins with a hands-on Day 1 section, protecting basic principles of the Metasploit structure and planning visitors for a self-completion exercise at the end of every section. The Day 2 section delves deep into the use of checking and fingerprinting solutions with Metasploit while helping visitors to alter current segments according to their needs. Following on from the first section, Day 3 will concentrate on taking advantage of various types of service and client-side exploitation while Day 4 will concentrate on post-exploitation, and writing quick programs that helps with collecting the required information from the utilized systems. The Day 5 section provides your audience with the techniques involved in checking and taking advantage of various solutions, such as data source, cellular phones, and VOIP. The Day 6 section makes your audience to speed up and incorporate Metasploit with major industry resources for transmission examining.
Разместил: literator 16-11-2018, 15:49 | Комментарии: 0 | Подробнее
Цифровая грамотность. Секреты успешного поиска и обработки информацииНазвание: Цифровая грамотность. Секреты успешного поиска и обработки информации
Автор: Владимир Лавров
Издательство: Издательские решения
Год: 2018
Страниц: 50, 21 цв. ил.
Язык: Русский
Формат: rtf, pdf
Размер: 10,3 Mb

В данной книге содержатся базовые сведения о том, что такое информация, какой она бывает, как её грамотно искать, просеивать, проверять и хранить. С пользой для своего интеллекта и кошелька, а не во вред им. Для тех, кто желает научиться отделять зёрна от плевел и всегда быть на высоте в плане понимания того, что происходит вокруг.
Разместил: yuriy44 16-11-2018, 11:03 | Комментарии: 0 | Подробнее
Название: Implementing Microsoft Azure Privileged Identity Management (Видеокурс)
Автор: Ammar Hasayen
Издательство: Pluralsight
Год: 2018
Видео: H264 MP4 AVC, 1280x720
Аудио: AAC 44100 KHz 2 Ch
Продолжительность: 01:30:00
Размер: 196 mb
Язык: English

Privileged identity management is emerging as one of the hottest topics in cybersecurity. In this course, you’ll learn how to use Microsoft PIM to manage, control, and monitor access within Azure AD, Azure resources, and Microsoft Online Services.
Разместил: daromir 14-11-2018, 21:02 | Комментарии: 0 | Подробнее
Название: Energy Efficient Servers: Blueprints for Data Center Optimization
Автор: Corey Gough
Издательство: Apress
Год: 2015
Формат: PDF
Страниц: 360
Для сайта: litmy.ru
Размер: 5 Mb
Язык: English

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outlines the power and performance impact of these features and the role firmware and software play in initialization and control. Using examples from cloud, HPC, and enterprise environments, the book demonstrates how various power management technologies are utilized across a range of server utilization. It teaches the reader how to monitor, analyze, and optimize their environment to best suit their needs. It shares optimization techniques used by data center administrators and system optimization experts at the world’s most advanced data centers.
Разместил: Ice Zero 14-11-2018, 18:23 | Комментарии: 0 | Подробнее
Название: Security and Data Reliability in Cooperative Wireless Networks
Автор: Emad S. Hassan
Издательство: CRC Press
ISBN: 1138092797
Год: 2018
Страниц: 530
Язык: английский
Формат: pdf (true)
Размер: 15.9 MB

Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.
Разместил: literator 14-11-2018, 18:13 | Комментарии: 0 | Подробнее

Название: Cellular Internet of Things: Technologies, Standards, and Performance
Автор: Olof Liberg, Marten Sundberg, Eric Wang, Johan Bergman, Joachim Sachs
Издательство: Academic Press
Год: 2018
Формат: PDF
Страниц: 390
Размер: 21 МБ
Язык: English

Cellular Internet of Things: Technologies, Standards and Performance gives insight into the recent work performed by the 3rd Generation Partnership Project (3GPP) to develop systems for the Cellular Internet of Things. It presents both the design of the new Narrowband Internet of Things (NB-IoT) technology and how GSM and LTE have evolved to provide Cellular Internet of Things services. The criteria used for the design and objectives of the standardization work are explained, and the technical details and performance of each technology is presented.
Разместил: alexcat 14-11-2018, 16:42 | Комментарии: 0 | Подробнее
Название: End-to-End Network Security: Defense-in-Depth
Автор: Omar Santos
Издательство: Cisco Press
Год: 2007
Формат: PDF
Страниц: 480
Для сайта: litmy.ru
Размер: 11 Mb
Язык: English

Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple countermeasures are layered throughout the infrastructure to address vulnerabilities and attacks. This is necessary due to increased attack frequency, diverse attack sophistication, and the rapid nature of attack velocity—all blurring the boundaries between the network and perimeter.

End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highly sophisticated attacks that can occur at multiple locations in your network. The ultimate goal is to deploy a set of security capabilities that together create an intelligent, self-defending network that identifies attacks as they occur, generates alerts as appropriate, and then automatically responds.
Разместил: Ice Zero 14-11-2018, 13:57 | Комментарии: 0 | Подробнее
Название: Cisco A Beginner's Guide, Fifth Edition
Автор: Toby Velte and Anthony Velte
Издательство: McGraw-Hill Education
Год: 2013
Формат: PDF
Размер: 41,4 Мб
Язык: английский / English

Get a solid foundation in Cisco products and technologies from this fully updated bestseller. Covering the latest solutions, Cisco: A Beginner’s Guide, Fifth Edition shows you, step-by-step, how to design, build, and manage custom networks. Learn how to configure hardware, use IOS commands, set up wireless networks, and secure your systems. You’ll also get tips on preparing for Cisco certification exams. Brand-new voice and social networking features, Cisco TelePresence, the cloud-based Cisco Unified Computing System, and more are fully covered in this practical resource.
Разместил: buratino 14-11-2018, 11:56 | Комментарии: 0 | Подробнее



 Litmy.ru  ©2020-2023     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности