LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 5-10-2022, 14:06
  • Комментариев: 0
Cloud Computing TechnologyНазвание: Cloud Computing Technology
Автор: Huawei Technologies Co., Ltd.
Издательство: Springer
Год: 2023
Страниц: 389
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

This book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, Big Data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and Artificial Intelligence (AI).
  • Добавил: literator
  • Дата: 5-10-2022, 12:52
  • Комментариев: 0
Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably ParanoidНазвание: Cybersecurity for Small Networks: A No-Nonsense Guide for the Reasonably Paranoid
Автор: Seth Enoka
Издательство: No Starch Press
Год: 2022
Страниц: 226
Язык: английский
Формат: pdf (true), epub (true), mobi
Размер: 21.9 MB

A guide to implementing DIY security solutions and readily available technologies to protect home and small-office networks from attack. This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You’ll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of traffic, block ads, install and configure an antivirus, back up your data securely, and even how to monitor your network for unauthorized activity and alert you to intrusion. For our purposes, a small network consists of 100 or fewer endpoints. An endpoint, or host, is any system or device that connects to or is part of a network, such as a desktop or laptop computer or a mobile device like a phone or tablet. Larger networks, approaching the size of an enterprise network, use similar tools and techniques that are covered in this book to provide security to their users and systems, just on a much larger scale and often at a much higher cost.
  • Добавил: literator
  • Дата: 5-10-2022, 12:23
  • Комментариев: 0
How to Hack Like a Legend: Breaking WindowsНазвание: How to Hack Like a Legend: Breaking Windows
Автор: Sparc Flow
Издательство: No Starch Press
Год: 2022
Страниц: 218
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Tag along with a master hacker on a truly memorable attack. From reconnaissance to infiltration, you’ll experience their every thought, frustration, and strategic decision-making first-hand in this exhilarating narrative journey into a highly defended Windows environment driven by AI. Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You’ll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation’s vulnerabilities are based on real-life weaknesses in today’s advanced Windows defense systems.
  • Добавил: literator
  • Дата: 4-10-2022, 13:36
  • Комментариев: 0
Cybersecurity: A Practical Engineering ApproachНазвание: Cybersecurity: A Practical Engineering Approach
Автор: Henrique M. D. Santos
Издательство: CRC Press
Серия: Chapman & Hall/CRC Textbooks in Computing
Год: 2022
Страниц: 341
Язык: английский
Формат: pdf (true), epub
Размер: 16.9 MB

Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks. It then builds solutions to mitigate risks by considering the technological justification of the solutions as well as their efficiency. The process follows an engineering process model. Each module builds on a subset of the risks, discussing the knowledge necessary to approach a solution, followed by the security control architecture design and the implementation. Kerberos is a network authentication protocol, aiming to achieve strong authentication using secret-key cryptography, in a local network environment with shared services. In fact, it embraces several sub protocols to accomplish that goal. Pentest (short for Penetration Test, and also referred to by Ethical Hacking) is a fundamental activity in Cybersecurity, aiming to test a computerized system against possible failures resulting from simulated malicious activity.
  • Добавил: literator
  • Дата: 3-10-2022, 12:51
  • Комментариев: 0
Semantic Models in IoT and eHealth ApplicationsНазвание: Semantic Models in IoT and eHealth Applications
Автор: Sanju Tiwari, Fernando Ortiz Rodriguez
Издательство: Academic Press, Elsevier
Серия: Intelligent Data-Centric Systems
Год: 2022
Страниц: 292
Язык: английский
Формат: pdf (true)
Размер: 12.8 MB

Semantic Models in IoT and eHealth Applications explores the key role of semantic web modeling in eHealth technologies, including remote monitoring, mobile health, cloud data and biomedical ontologies. The book explores different challenges and issues through the lens of various case studies of healthcare systems currently adopting these technologies. Chapters introduce the concepts of semantic interoperability within a healthcare model setting and explore how semantic representation is key to classifying, analyzing and understanding the massive amounts of biomedical data being generated by connected medical devices.
  • Добавил: literator
  • Дата: 2-10-2022, 17:52
  • Комментариев: 0
Design of Internet of ThingsНазвание: Design of Internet of Things
Автор: Gunneswara VSSS Kalaga Rao
Издательство: CRC Press
Год: 2023
Страниц: 147
Язык: английский
Формат: pdf (true), epub
Размер: 28.0 MB

This book provides a comprehensive overview of the design aspects of the Internet of Things devices and covers the fundamentals of Big Data and Embedded Programming. Various changing technologies, like sensors, RFID, etc., that are promoting IoT solutions are discussed. The core technologies like GSM Communication, Machine to Machine (M2M) Interfaces that are supposed to be the foundations for IoT are explained to prepare the designer. Definitions of IoT, different architectures of IoT, possible models of IOT, along with different market needs and Industry requirements are detailed, so that designers can finalize their choices that enable them to prepare PERT like basics. IEEE Standards useful to IoT design and a few Network Protocol Stacks are explored in detail that will give confidence to any designer. Embedded Operating Systems (FreeRTOS and Contiki) and various Middleware frameworks useful to IoT are discussed.
  • Добавил: literator
  • Дата: 1-10-2022, 12:04
  • Комментариев: 0
IoT Based Smart ApplicationsНазвание: IoT Based Smart Applications
Автор: Nidhi Sindhwani, Rohit Anand, M. Niranjanamurthy
Издательство: Springer, EAI
Год: 2023
Страниц: 406
Язык: английский
Формат: pdf (true)
Размер: 14.1 MB

This book provides insights into IoT, its applications, and various implementation techniques. The authors first discuss the IoT design methodology to define the domain model. They then cover various connection methodologies used in IoT such as Ethernet, Wi-Fi, low powered wide area network (LPWAN), Bluetooth, RFID, cellular, and satellite, and more, along with their challenges. An example is made on the designing process using Arduino, which offers smart, connected, and secure elements; they also illustrate the integration of IoT with Blockchain, cloud, machine learning, big data, embedded software, sensors, etc. The book going on to cover the future of IoT in various sectors and how IoT will continue to be game-changing technology.
  • Добавил: literator
  • Дата: 30-09-2022, 15:26
  • Комментариев: 0
Multiple Access Technology Towards Ubiquitous Networks: Overview and Efficient DesignsНазвание: Multiple Access Technology Towards Ubiquitous Networks: Overview and Efficient Designs
Автор: Neng Ye, Xiangming Li, Kai Yang, Jianping An
Издательство: Springer
Год: 2023
Страниц: 194
Язык: английский
Формат: pdf
Размер: 10.2 MB

This book investigates the multiuser communication and its key technology—multiple access technology, as well as transceiving design methods. The future wireless communication networks are expected to provide ubiquitous massive coverage to meet the requirements of diversified applications. With an exponential increase of the number of users and devices, it is challenging to establish fast and reliable connections in the ubiquitous network. As the core technology in the evolution of wireless communication systems, multiple access technology can enable effective massive connections and has become the prominent research trend for ubiquitous networks. The goal of this book is to provide readers with a comprehensive overview of the state-of-the-art multiple access technologies for ubiquitous network, with a focus on the novel ubiquitous multiple access technologies, the signal construction techniques of multiple access and the enhanced multiple access transceivers using Artificial Intelligence (AI). For each of these topics, this book has tried to provide an advanced introduction, blending the basic multi-user information principles with the advanced multiple access models and novel application scenarios. In addition, this book has provided elaborate simulation results for each topic to verify the feasibility of the corresponding schemes.
  • Добавил: literator
  • Дата: 30-09-2022, 15:09
  • Комментариев: 0
Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean ApproachНазвание: Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach
Автор: Behrouz Zolfaghari, Khodakhast Bibak
Издательство: Springer
Год: 2022
Страниц: 121
Язык: английский
Формат: pdf
Размер: 10.2 MB

Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.
  • Добавил: literator
  • Дата: 29-09-2022, 13:27
  • Комментариев: 0
IoT-enabled Unobtrusive Surveillance Systems for Smart Campus SafetyНазвание: IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety
Автор: Theodoros Anagnostopoulos
Издательство: Wiley-ISTE
Год: 2023
Страниц: 163
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety Enables readers to understand a broad area of state-of-the-art research in physical IoT-enabled security. IoT-enabled Unobtrusive Surveillance Systems for Smart Campus Safety describes new techniques in unobtrusive surveillance that enable people to act and communicate freely, while at the same time protecting them from malevolent behavior. It begins by characterizing the latest on surveillance systems deployed at smart campuses, miniatures of smart cities with more demanding frameworks that enable learning, social interaction, and creativity, and by performing a comparative assessment in the area of unobtrusive surveillance systems for smart campuses.