LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 12-02-2023, 20:29
  • Комментариев: 0
Age of Information: Foundations and ApplicationsНазвание: Age of Information: Foundations and Applications
Автор: Nikolaos Pappas, Mohamed A. Abd-Elmagid, Bo Zhou
Издательство: Cambridge University Press
Год: 2023
Страниц: 495
Язык: английский
Формат: pdf
Размер: 49.5 MB

At the forefront of cutting-edge technologies, this text provides a comprehensive treatment of a crucial network performance metric, ushering in new opportunities for rethinking the whole design of communication systems. Detailed exposition of the communication and network theoretic foundations of Age of Information (AoI) gives the reader a solid background, and discussion of the implications on signal processing and control theory shed light on the important potential of recent research. The text includes extensive real-world applications of this vital metric, including caching, the Internet of Things (IoT), and energy harvesting networks. The far-reaching applications of AoI include networked monitoring systems, cyber-physical systems such as the IoT, and information-oriented systems and data analytics applications ranging from the stock market to social networks. The future of this exciting subject in 5G communication systems and beyond make this a vital resource for graduate students, researchers and professionals.
  • Добавил: literator
  • Дата: 11-02-2023, 20:27
  • Комментариев: 0
Power Systems Cybersecurity: Methods, Concepts, and Best PracticesНазвание: Power Systems Cybersecurity: Methods, Concepts, and Best Practices
Автор: Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong
Издательство: Springer
Год: 2023
Страниц: 463
Язык: английский
Формат: pdf (true)
Размер: 11.8 MB

This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems. Three Machine Learning (ML) methods Random Forest (RF), Logistic Regression (LR), and K-nearest neighbors (KNN) - as well as one Deep Learning (DL) method-SDAE - are dynamically compared in terms of F1 - score and accuracy. After the completion of the retraining process, the best-performing model replaces the existing one and labels the incoming data.
  • Добавил: literator
  • Дата: 10-02-2023, 20:05
  • Комментариев: 0
Blockchain Technology Solutions for the Security of IoT-Based Healthcare SystemsНазвание: Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems
Автор: Bharat Bhushan, Sudhir Kumar Sharma
Издательство: Academic Press/Elsevier
Год: 2023
Страниц: 460
Язык: английский
Формат: pdf
Размер: 12.4 MB

Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems explores the various benefits and challenges associated with the integration of blockchain with IoT healthcare systems, focusing on designing cognitive-embedded data technologies to aid better decision-making, processing and analysis of large amounts of data collected through IoT. This book series targets the adaptation of decision-making approaches under cognitive computing paradigms to demonstrate how the proposed procedures, as well as big data and Internet of Things (IoT) problems can be handled in practice.
  • Добавил: literator
  • Дата: 10-02-2023, 16:35
  • Комментариев: 0
Google Certified Professional Cloud Network Engineer: Study Guide With Practice Questions & Labs - First EditionНазвание: Google Certified Professional Cloud Network Engineer: Study Guide With Practice Questions & Labs - First Edition - 2021
Автор: IPSpecialist
Издательство: IPSpecialist
Год: 2021
Страниц: 530
Язык: английский
Формат: pdf, epub
Размер: 29.1 MB

This is a highly practical, intensive, yet comprehensive book that will teach you to become a Google Cloud Network Engineer. The book is for anyone who would like to master the art of Google Cloud Networking. Its a perfect resource to pass the Google Professional Cloud Network Engineer Certification on the first attempt. Virtual Private Cloud (VPC) is an implemented private network on Google Cloud. The difference between a traditional and an on-premises network is that VPC is SDN. Software-Defined Network (SDN): We can see that the traditional network uses integrated software and hardware to direct traffic using routers and switches. SDN virtualizes the network by a smart controller that controls all network traffic and routers and switches that forward the traffic. Virtualizing networks can have certain advantages. With SDN, hardware management is abstracted away, which means it removes maintenance overhead and allows you to customize your services. If you do not have to worry about the number of ports on the switch, you do not have to worry about the number of virtual machines. SDN will handle that capacity.
  • Добавил: literator
  • Дата: 10-02-2023, 09:40
  • Комментариев: 0
Driving 5G Mobile Communications with Artificial Intelligence towards 6GНазвание: Driving 5G Mobile Communications with Artificial Intelligence towards 6G
Автор: Dragorad A. Milovanovic, Zoran S. Bojkovic, Tulsi Pawan Fowdur
Издательство: CRC Press
Год: 2023
Страниц: 503
Язык: английский
Формат: pdf (true)
Размер: 19.3 MB

Driving 5G Mobile Communications with Artificial Intelligence towards 6G presents current work and directions of continuously innovation and development in multimedia communications with a focus on services and users. The fifth generation of mobile wireless networks achieved the first deployment by 2020, completed the first phase of evolution in 2022, and started transition phase of 5G-Advanced toward the sixth generation. Perhaps one of the most important innovations brought by 5G is the platform-approach to connectivity, i.e., a single standard that can adapt to the heterogeneous connectivity requirements of vastly different use cases. 5G networks contain a list of different requirements, standardized technical specifications and a range of implementation options with spectral efficiency, latency, and reliability as primary performance metrics. Towards 6G, Machine Learning (ML) and Artificial Intelligence (AI) methods have recently proposed new approaches to modeling, designing, optimizing and implementing systems. They are now matured technologies that improve many research fields significantly.
  • Добавил: literator
  • Дата: 8-02-2023, 18:23
  • Комментариев: 0
Internet of Everything: Key Technologies, Practical Applications and Security of IoTНазвание: Internet of Everything: Key Technologies, Practical Applications and Security of IoT
Автор: Hang Song
Издательство: World Scientific Publishing
Год: 2023
Страниц: 838
Язык: английский
Формат: pdf (true)
Размер: 106.7 MB

This book provides comprehensive coverage on the concepts, frameworks, and underpinning technologies in most aspects of the Internet of Things (IoT), and presents them as the foundation on which more advanced topics, such as 5G and mMTC/M2M, Edge/cloud computing and the modalities of Tactile IoT, Industrial IoT (IIoT)/Industry 4.0, Satellite IoT, and Digital Twins (DT), could be built upon. A key feature of the book is the chapter that focuses on security and privacy for individuals and IoT/ Industry 4.0 are discussed. Cloud/Edge with virtualized storage media by way of IoT platforms, enables data storage, data analysis via machine learning and artificial intelligence techniques, and provides facilities for multiple stakeholders, including users/providers/integrators in the generalized or specific platforms. As for smart manufacturing and Industrial 4.0, the advances of IoT practice and application delivering real-time services further push forward the development in automation, management and super connectivity, which is essential for the evolution of industries, new commercial models, and in all aspects of everyday life. Now is it is the moment for us to get to know and go deeper into the IoT world.
  • Добавил: literator
  • Дата: 8-02-2023, 06:35
  • Комментариев: 0
AIoT Technologies and Applications for Smart EnvironmentsНазвание: AIoT Technologies and Applications for Smart Environments
Автор: Mamoun Alazab, Meenu Gupta, Shakeel Ahmed
Издательство: The Institution of Engineering and Technology
Год: 2023
Страниц: 333
Язык: английский
Формат: pdf (true)
Размер: 19.2 MB

Although some IoT systems are built for simple event control where a sensor signal triggers a corresponding reaction, many events are far more complex, requiring applications to interpret the event using analytical techniques to initiate proper actions. Artificial Intelligence of Things (AIoT) applies intelligence to the edge and gives devices the ability to understand the data, observe the environment around them, and decide what to do best with minimum human intervention. With the power of AI, AIoT devices are not just messengers feeding information to control centers. They have evolved into intelligent machines capable of performing self-driven analytics and acting independently. This book is a valuable resource for industry and academic researchers, scientists, engineers and advanced students in the fields of ICTs and networking, IoT, AI and machine and deep learning, Data Science, sensing, robotics, automation and smart technologies and smart environments.
  • Добавил: literator
  • Дата: 4-02-2023, 04:58
  • Комментариев: 0
Cyberattacks and Cybersecurity: What, Why, and How, 2nd EditionНазвание: Cyberattacks and Cybersecurity: What, Why, and How, 2nd Edition
Автор: Christina Liu
Издательство: bookboon.com
Год: 2022
Страниц: 297
Язык: английский
Формат: epub
Размер: 10.2 MB

Cyberspace touches practically everything and everyone when many everyday communications depend on information communication technologies. This new wave of connectivity is going beyond tablets and laptops; to connected cars and buildings; TVs and game consoles; and smart meters and traffic control. As we are critically dependent on cyberspace, it is inherently insecure and there will always be attempts to exploit weaknesses to launch cyberattacks. The cyber threat impacts the whole of our society, so everyone has a part to play in combating cybercrimes. This book is divided into five chapters, which explain how digital technology transforms societies, why cyberattacks escalate, what the challenges in cybersecurity are, how nations address global cyber risks, and how organizations defend against cyberattacks. Cybersecurity is a broad and complex topic that has a far-reaching impact on users, companies, governments, and other entities around the world. This book is divided into five chapters of discussion. These chapters, and the issues explored within them, may at first glance seem disparate, but closer examination reveals their interconnectedness.
  • Добавил: literator
  • Дата: 3-02-2023, 08:19
  • Комментариев: 0
Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, 5th EditionНазвание: Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies, 5th Edition
Автор: Carey Parker
Издательство: Apress
Год: 2023
Страниц: 390
Язык: английский
Формат: pdf, epub
Размер: 37.2 MB

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort.
  • Добавил: literator
  • Дата: 1-02-2023, 10:19
  • Комментариев: 0
IAPP CIPM Certified Information Privacy Manager Study GuideНазвание: IAPP CIPM Certified Information Privacy Manager
Автор: Mike Chapple, Joe Shelley
Издательство: Sybex
Год: 2023
Страниц: 288
Язык: английский
Формат: pdf (true), epub
Размер: 14.5 MB

An essential resource for anyone preparing for the CIPM certification exam and a career in information privacy. As cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to IAPP’s trusted and recognized Certified Information Privacy Manager qualification as a tried-and-tested indicator of information privacy management expertise. In IAPP CIPM Certified Information Privacy Manager Study Guide , a team of dedicated IT and privacy management professionals delivers an intuitive roadmap to preparing for the CIPM certification exam and for a new career in the field of information privacy. Make use of pre-assessments, the Exam Essentials feature, and chapter review questions with detailed explanations to gauge your progress and determine where you’re proficient and where you need more practice.