LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 14-12-2022, 12:05
  • Комментариев: 0
IoT Edge Solutions for Cognitive BuildingsНазвание: IoT Edge Solutions for Cognitive Buildings
Автор: Franco Cicirelli, Antonio Guerrieri, Andrea Vinci
Издательство: Springer
Серия: Internet of Things
Год: 2023
Страниц: 354
Язык: английский
Формат: pdf (true)
Размер: 12.2 MB

This book outlines the promise of the field of the Cognitive Internet of Things when it is applied to cognitive buildings. After an introduction, the authors discuss the goals of cognitive buildings such as operation in a more efficient, flexible, interactive, intuitive, and sustainable way. They go on to outline the benefits that these technologies promise to building owners, occupants, and their environments that range from reducing energy consumption and carbon footprint to promoting health, well-being, and productivity. The authors outline technologies that provide buildings and equipment with the ability to collect, aggregate, and analyze data and how this information can be collected by sensors and related to internal conditions and settings, energy consumption, user requests, and preferences to maintain comfort and save energy. This book is of interest to practitioners, researchers, students, and professors in IoT and smart cities.
  • Добавил: literator
  • Дата: 14-12-2022, 11:46
  • Комментариев: 0
Mobile and Wireless Communications with Practical Use-Case ScenariosНазвание: Mobile and Wireless Communications with Practical Use-Case Scenarios
Автор: Ramona Trestian
Издательство: CRC Press
Год: 2023
Страниц: 346
Язык: английский
Формат: pdf (true)
Размер: 64.1 MB

The aim of this textbook is to provide the readers with a comprehensive technical foundation of the mobile communication systems and wireless network design, and operations and applications of various radio access technologies. Additionally, it also introduces the reader to the latest advancements in technologies in terms of Internet of Things ecosystems, Machine Learning and digital twins for IoT-enabled intelligent environments. Furthermore, this textbook also includes practical use-case scenarios using Altair WinProp Software as well as Python, TensorFlow and Jupyter as support for practice-based laboratory sessions. The book is structured in three parts: (1) the first part will cover all the fundamental aspects of signals, analogue and digital communication systems, covering topics related to antennas and radio propagation; (2) the second part is concerned with the evolution of mobile and wireless systems, starting with the concept of cellular systems and applications, covering the cellular systems evolution from 1G to 5G and beyond, as well as wireless evolution and satellite communications; (3) finally, the third part introduces the paradigms of intelligence-based networked systems and in particular Internet of Things (IoT), Machine Learning and more recently digital twins that enable intelligent habitation, intelligent building control, smart vehicle technology, industrial processes and so forth.
  • Добавил: literator
  • Дата: 13-12-2022, 14:40
  • Комментариев: 0
Multi-Fractal Traffic and Anomaly Detection in Computer CommunicationsНазвание: Multi-Fractal Traffic and Anomaly Detection in Computer Communications
Автор: Ming Li
Издательство: CRC Press
Год: 2023
Страниц: 297
Язык: английский
Формат: pdf (true)
Размер: 31.7 MB

This book provides a comprehensive theory of mono- and multi-fractal traffic, including the basics of long-range dependent time series and 1/f noise, ergodicity and predictability of traffic, traffic modeling and simulation, stationarity tests of traffic, traffic measurement and the anomaly detection of traffic in communications networks. In this monograph, we address the theory of multi-fractal traffic and its applications to anomaly detection of traffic under distributed denial-of-service (DDoS) attacking in computer communications. Scholars and graduates studying network traffic in computer science will find the book beneficial.
  • Добавил: literator
  • Дата: 12-12-2022, 19:19
  • Комментариев: 0
Artificial Intelligence and Cybersecurity: Theory and ApplicationsНазвание: Artificial Intelligence and Cybersecurity: Theory and Applications
Автор: Tuomo Sipola, Tero Kokkonen
Издательство: Springer
Год: 2023
Страниц: 300
Язык: английский
Формат: pdf (true), epub
Размер: 17.9 MB

This book discusses Artificial Intelligence (AI) and cybersecurity from multiple points of view. The diverse chapters reveal modern trends and challenges related to the use of Artificial Intelligence when considering privacy, cyber-attacks and defense as well as applications from malware detection to radio signal intelligence. The rapid development of technology is evident in our everyday lives. However, underneath it all lies the concern about cybersecurity. We have also witnessed the rise of artificial intelligence (AI) applications that surpass human intellect in specific tasks. The interplay of AI and cybersecurity is becoming increasingly relevant, as AI needs to be assessed from the cybersecurity point of view, and correspondingly, cybersecurity can benefit immensely from the advances in AI. This path will hopefully lead to less human work and more automated detection and classification in the world of cybersecurity.
  • Добавил: literator
  • Дата: 12-12-2022, 12:26
  • Комментариев: 0
Internet of Things and Cyber Physical Systems Security and ForensicsНазвание: Internet of Things and Cyber Physical Systems Security and Forensics
Автор: Keshav Kaushik, Susheela Dahiya, Akashdeep Bhardwaj
Издательство: CRC Press
Год: 2023
Страниц: 299
Язык: английский
Формат: pdf (true)
Размер: 14.3 MB

The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science. Such systems are becoming increasingly common in public locations, businesses, universities, residences, and other shared offices, producing enormous amounts of data at rapid speeds in a variety of forms. IoT devices can be used as suspects, digital witnesses, or instruments of crime and cyberattacks, posing new investigation problems, forensic issues, security threats, legal concerns, privacy concerns, and ethical dilemmas. A cyberattack on IoT devices might target the device itself or associated systems, particularly vital infrastructure. This book discusses the advancements in IoT and Cyber Physical Systems (CPS) forensics.
  • Добавил: literator
  • Дата: 12-12-2022, 03:14
  • Комментариев: 0
Cooperation and Integration in 6G Heterogeneous Networks: Resource Allocation and NetworkingНазвание: Cooperation and Integration in 6G Heterogeneous Networks: Resource Allocation and Networking
Автор: Jun Du, Chunxiao Jiang
Издательство: Springer
Серия: Wireless Networks
Год: 2023
Страниц: 461
Язык: английский
Формат: pdf (true)
Размер: 14.3 MB

The first book on the multi-dimensional resource management for heterogenous communication, computing and caching in 6G. To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an important factor that can improve 6G performance directly by configuring heterogeneous communication, computing and caching resources effectively and efficiently.
  • Добавил: literator
  • Дата: 10-12-2022, 07:30
  • Комментариев: 0
Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOSНазвание: Wireless Penetration Testing: Up and Running: Run Wireless Networks Vulnerability Assessment, Wi-Fi Pen Testing, Android and iOS Application Security, and Break WEP, WPA, and WPA2 Protocols
Автор: Dr. Ahmed Hashem El Fiky
Издательство: BPB Publications
Год: 2023
Страниц: 303
Язык: английский
Формат: epub (true)
Размер: 10.4 MB

Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks. This book satisfies any IT professional's desire to become a successful ethical hacker who is willing to be employed in identifying and exploiting flaws in the organization's network environment. This book explains in detail how to conduct wireless penetration tests using a wide variety of tools to simulate cyber attacks on both Android and iOS mobile devices and wireless networks. This book walks you through the steps of wireless penetration testing from start to finish. Once Kali Linux has been installed on your laptop, as demonstrated, you will check the system requirements and install the wireless adapter. The book then explores the wireless LAN reconnaissance phase, which outlines the WEP and WPA/WPA2 security protocols and shows real-world attacks against them using Kali Linux tools like Aircrack-ng.
  • Добавил: literator
  • Дата: 10-12-2022, 07:18
  • Комментариев: 0
Azure Security For Critical Workloads: Implementing Modern Security Controls for Authentication, Authorization and AuditingНазвание: Azure Security For Critical Workloads: Implementing Modern Security Controls for Authentication, Authorization and Auditing
Автор: Sagar Lad
Издательство: Apress
Год: 2023
Страниц: 221
Язык: английский
Формат: pdf, epub
Размер: 25.0 MB

This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. This book is intended for developers and IT consultants/architects who want practical insights into moving mission-critical workloads to Azure from technology and process aspects.
  • Добавил: literator
  • Дата: 10-12-2022, 04:28
  • Комментариев: 0
Deep Learning Approaches for Security Threats in IoT EnvironmentsНазвание: Deep Learning Approaches for Security Threats in IoT Environments
Автор: Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash
Издательство: Wiley-IEEE Press
Год: 2023
Страниц: 387
Язык: английский
Формат: pdf (true)
Размер: 19.1 MB

Deep Learning Approaches for Security Threats in IoT Environments An expert discussion of the application of deep learning methods in the IoT security environment. In Deep Learning Approaches for Security Threats in IoT Environments , a team of distinguished cybersecurity educators deliver an insightful and robust exploration of how to approach and measure the security of Internet-of-Things (IoT) systems and networks. In this book, readers will examine critical concepts in Artificial Intelligence (AI) and IoT, and apply effective strategies to help secure and protect IoT networks. The authors discuss supervised, semi-supervised, and unsupervised Deep Learning techniques, as well as reinforcement and Federated Learning methods for privacy preservation.
  • Добавил: literator
  • Дата: 10-12-2022, 03:07
  • Комментариев: 0
Overcoming It Complexity: Simplify Operations, Enable Innovation, And Cultivate Successful Cloud Outcomes (Final Release)Название: Overcoming It Complexity Simplify Operations, Enable Innovation, And Cultivate Successful Cloud Outcomes (Final Release)
Автор: Lee Atchison
Издательство: O’Reilly Media, Inc.
Год: 2023
Страниц: 100
Язык: английский
Формат: epub, mobi
Размер: 10.25 MB

The cloud promises cost savings, agility, and more. But the increasing complexity of modern IT systems often prevents businesses from realizing the outcomes they sought by moving to the cloud in the first place. At the core of this complexity is technical debt. Ad hoc decisions, traditional approaches, and "quick and dirty" solutions add up to fragile, more complex systems (and organizations)--reducing the pace of change, driving up costs, and degrading security. To succeed in the cloud, you first have to manage the problems IT complexity creates. This practical guide will help. If you're tasked with designing, delivering, or approving IT systems that support business growth, this book will teach you the principles and strategies you need to break out of silos, reassess traditional thinking, provide the business a better competitive position, and achieve cloud success across the company.