LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 23-06-2023, 06:47
  • Комментариев: 0
Automation and ComputationНазвание: Automation and Computation
Автор: Satvik Vats, Vikrant Sharma, Karan Singh, Amit Gupta
Издательство: CRC Press
Год: 2023
Страниц: 509
Язык: английский
Формат: pdf (true)
Размер: 19.3 MB

The Wireless sensor networks (WSNs) are made up of spatially dispersed autonomous sensors that monitor environmental or physical elements like temperature, sound, and pressure. These sensors’ data is collectively transmitted to a destination via network infrastructure. Because sensor nodes are energy-constrained devices, energy-efficient routing techniques have become more important. Regardless of how far wireless sensor networks (WSN) have progressed, efficient energy utilization is still required to extend the lifetime of the network. The network lifetime depreciates in real-time applications due to sensor node battery limits. Different routing techniques exist, and we have examined and interpreted the results of two hierarchical algorithms, Low Energy Adaptive Clustering Hierarchy (LEACH) and Power Efficient Gathering in Sensor Information Systems (PEGASIS). The comparison is based on the amount of energy used each transmission and the WSN’s overall lifetime, with simulations performed in MATLAB.

  • Добавил: literator
  • Дата: 23-06-2023, 04:16
  • Комментариев: 0
Azure Cookbook: Recipes to Create and Maintain Cloud Solutions in Azure (Final)Название: Azure Cookbook: Recipes to Create and Maintain Cloud Solutions in Azure (Final)
Автор: Reza Salehi
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 416
Язык: английский
Формат: epub (true), mobi
Размер: 28.4 MB

How do you deal with the problems you face when using Azure? This practical guide provides over 75 recipes to help you to work with common Azure issues in everyday scenarios. That includes key tasks like setting up permissions for a storage account, working with Cosmos DB APIs, managing Azure role-based access control, governing your Azure subscriptions using Azure Policy, and much more. Author Reza Salehi has assembled real-world recipes that enable you to grasp key Azure services and concepts quickly. Each recipe includes CLI scripts that you can execute in your own Azure account. Recipes also explain the approach and provide meaningful context. The solutions in this cookbook will take you beyond theory and help you understand Azure services in practice.

  • Добавил: literator
  • Дата: 22-06-2023, 20:32
  • Комментариев: 0
Hacker Culture A to Z A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release)Название: Hacker Culture A to Z: A Fun Guide to the Fundamentals of Cybersecurity and Hacking (3rd Early Release)
Автор: Kim Crawley
Издательство: O’Reilly Media, Inc.
Год: 2023-06-21
Страниц: 174
Язык: английский
Формат: pdf, epub, mobi
Размер: 10.2 MB

Hacker culture can be esoteric, but this entertaining reference is here to help. Organized from A to Z and written by a longtime hacker, this fun, conversational reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines. From phreaking to deepfakes, from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. Computer programming languages can be classified according to how much abstraction they have from a CPU’s instruction set. The most abstracted high-level programming languages are the most human readable and intuitive, such as Perl and Python.

  • Добавил: umkaS
  • Дата: 22-06-2023, 10:51
  • Комментариев: 0
Название: Криптография с открытым ключом
Автор: Саломаа А.
Издательство: Мир
Год: 1995
Cтраниц: 320
Формат: pdf
Размер: 12 мб
Язык: русский

Предлагаемая вниманию читателя книга является практически первым изданием на русском языке, посвященным математическим вопросам криптографии, и написана известным финским ученым, автором нескольких монографий и учебников А. Саломаа. В ней обобщаются последние достижения в области криптографии, особое внимание при этом уделяется криптосистемам с открытым ключом.
  • Добавил: literator
  • Дата: 22-06-2023, 03:59
  • Комментариев: 0
Integration of IoT with Cloud Computing for Smart ApplicationsНазвание: Integration of IoT with Cloud Computing for Smart Applications
Автор: Rohit Anand, Sapna Juneja, Abhinav Juneja, Ramani Kannan
Издательство: CRC Press
Серия: Chapman & Hall/CRC Cloud Computing for Society 5.0
Год: 2023
Страниц: 267
Язык: английский
Формат: pdf (true)
Размер: 23.8 MB

Integration of IoT with Cloud Computing for Smart Applications provides an integrative overview of the Internet of Things (IoT) and cloud computing to be used for the various futuristic and intelligent applications. The aim of this book is to integrate IoT and cloud computing to translate ordinary resources into smart things. Discussions in this book include a broad and integrated perspective on the collaboration, security, growth of cloud infrastructure, and real-time data monitoring.

  • Добавил: literator
  • Дата: 21-06-2023, 05:11
  • Комментариев: 0
How to Catch a Phish: A Practical Guide to Detecting Phishing EmailsНазвание: How to Catch a Phish: A Practical Guide to Detecting Phishing Emails
Автор: Nicholas Oles
Издательство: Apress
Год: 2023
Страниц: 153
Язык: английский
Формат: pdf, epub
Размер: 26.1 MB

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. For cybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.

  • Добавил: umkaS
  • Дата: 20-06-2023, 09:26
  • Комментариев: 0
Название: Компьютерная безопасность. Криптографические методы защиты
Автор: Петров А.А.
Издательство: Профобразование
Год: 2019
Cтраниц: 445
Формат: pdf
Размер: 54 мб
Язык: русский

В книге рассматриваются актуальные вопросы защиты данных при создании распределенных информационных систем масштаба предприятия, приводятся подробные описания принципов применения современных криптографических средств, имеющихся на рынке («Криптон», «Верба», «Шип», «Игла» и др.). Значительное место уделяется проблемам сохранения тайны при финансовых обменах через Internet, а также электронной коммерции. Завершают книгу приложения, посвященные практическим рекомендациям по самым острым вопросам обеспечения защиты информации.
  • Добавил: literator
  • Дата: 19-06-2023, 17:14
  • Комментариев: 0
Evolving Networking Technologies: Developments and Future DirectionsНазвание: Evolving Networking Technologies: Developments and Future Directions
Автор: Kanta Prasad Sharma, Shaurya Gupta, Ashish Sharma
Издательство: Wiley-Scrivener
Год: 2023
Страниц: 269
Язык: английский
Формат: pdf (true)
Размер: 16.2 MB

This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. This book discusses some of the critical security challenges facing the ever-evolving networking technologies of today. Chapter 1, 5G Technologies, Architecture and Protocols, presents the main elements in 5G core networks, security in 5G mobile networks, 5G radio access technology, frame structure, network virtualization, and slicing in 5G, which are the key areas of study in 5G technology. Chapter 2, Scope and Challenges of IoT and Blockchain Integration, focuses on the pros and cons of the integration of both the technology and existing platforms that are based on the alliance of IoT and blockchain platforms like Ethereum, Hyperledger, Lisk, and Slock.it, which are also explained along with their full functionality.

  • Добавил: literator
  • Дата: 19-06-2023, 07:36
  • Комментариев: 0
Cloud Adoption for Mission-Critical WorkloadsНазвание: Cloud Adoption for Mission-Critical Workloads: Principles for Designing Always On Applications
Автор: Haytham Elkhoja
Издательство: O’Reilly Media, Inc.
Год: 2023-06-15
Язык: английский
Формат: epub
Размер: 36.4 MB

The cloud is busy transforming the world of information technology and accelerating business innovation, but analysts estimate that only 20% of enterprise workloads are currently located in the cloud. The unavailability of mission-critical, cloud-based applications for financial transactions, traffic control coordination, and emergency response can have serious consequences. Cloud adoption has been increasingly important for organizations, as it gives them access to a comprehensive catalog of on-demand and scalable services, platforms, and infrastructures without having to invest in hardware and software. The cloud offers many advantages to help accelerate time to value and innovate in a more flexible, agile, and efficient way (which, in turn, helps reduce costs, increase operational efficiency, and enable businesses to respond quickly to changing market conditions). Cloud providers like Amazon Web Services (AWS), Google Cloud Platform (GCP), and Microsoft Azure are revolutionizing this adoption.

  • Добавил: literator
  • Дата: 19-06-2023, 05:04
  • Комментариев: 0
Security-First Compliance for Small BusinessesНазвание: Security-First Compliance for Small Businesses
Автор: Karen Walsh
Издательство: CRC Press
Год: 2024
Страниц: 221
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements. This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.