LitMy.ru - литература в один клик

  • Добавил: literator
  • Дата: 23-01-2022, 16:02
  • Комментариев: 0
5G Physical Layer TechnologiesНазвание: 5G Physical Layer Technologies
Автор: Mosa Ali Abu-Rgheff
Издательство: Wiley-IEEE Press
Год: 2020
Страниц: 578
Язык: английский
Формат: pdf (true)
Размер: 15.1 MB

Written in a clear and concise manner, this book presents readers with an in-depth discussion of the 5G technologies that will help move society beyond its current capabilities. It perfectly illustrates how the technology itself will benefit both individual consumers and industry as the world heads towards a more connected state of being. Every technological application presented is modeled in a schematic diagram and is considered in depth through mathematical analysis and performance assessment. Furthermore, published simulation data and measurements are checked. Each chapter of 5G Physical Layer Technologies contains texts, mathematical analysis, and applications supported by figures, graphs, data tables, appendices, and a list of up to date references, along with an executive summary of the key issues.
  • Добавил: literator
  • Дата: 22-01-2022, 19:02
  • Комментариев: 0
Principles of Incident Response & Disaster Recovery, 3rd EditionНазвание: Principles of Incident Response and Disaster Recovery, 3rd Edition
Автор: Michael E. Whitman, Herbert J. Mattord
Издательство: Cengage Learning
Год: 2021
Страниц: 418
Язык: английский
Формат: pdf (true)
Размер: 10.2 MB

Learn how to identify vulnerabilities within computer networks and implement countermeasures that mitigate risks and damage with Whitman/Mattord's PRINCIPLES OF INCIDENT RESPONSE & DISASTER RECOVERY, 3rd Edition. This edition offers the knowledge you need to help organizations prepare for and avert system interruptions and natural disasters. Comprehensive coverage addresses information security and IT in contingency planning today. Updated content focuses on incident response and disaster recovery. You examine the complexities of organizational readiness from an IT and business perspective with emphasis on management practices and policy requirements. You review industry's best practices for minimizing downtime in emergencies and curbing losses during and after system service interruptions. This edition includes the latest NIST knowledge, expanded coverage of security information and event management (SIEM) and unified threat management, and more explanation of cloud-based systems and Web-accessible tools to prepare you for success.
  • Добавил: buratino
  • Дата: 22-01-2022, 10:11
  • Комментариев: 0
Название: Discrete Networked Dynamic Systems: Analysis and Performance
Автор: Magdi S. Mahmoud, Yuanqing Xia
Издательство: Elsevier
Год: 2021
Формат: true pdf/epub
Страниц: 486
Размер: 35.5 Mb
Язык: English

Discrete Networked Dynamic Systems: Analysis and Performance provides a high-level treatment of a general class of linear discrete-time dynamic systems interconnected over an information network, exchanging relative state measurements or output measurements. It presents a systematic analysis of the material and provides an account to the math development in a unified way.
  • Добавил: literator
  • Дата: 22-01-2022, 05:22
  • Комментариев: 0
Advanced Cybersecurity TechnologiesНазвание: Advanced Cybersecurity Technologies
Автор: Ralph Moseley
Издательство: CRC Press
Год: 2022
Страниц: 225
Язык: английский
Формат: pdf (true), epub
Размер: 11.5 MB

Cybersecurity is an extremely important area which is rapidly evolving, necessarily, to meet current and future threats. Anyone who studies within this domain requires a particular skillset and way of thinking, balancing technical knowledge and human insight. It is vital to recognize both sides of this complex area and integrate the two. This book looks at the technical fields progressively, building up in layers before expanding into more advanced topics. Each area is looked at succinctly, describing the main elements and problems in each area and reinforcing these concepts with practical coding examples, questions and ideas for further research. The book builds on an overview of basic architecture of systems and networks, setting a context for how information is vulnerable.
  • Добавил: literator
  • Дата: 19-01-2022, 19:12
  • Комментариев: 0
Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual (Exam N10-008), 6th EditionНазвание: Mike Meyers CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual (Exam N10-008), 6th Edition
Автор: Jonathan S. Weissman, Mike Meyers
Издательство: McGraw Hill
Год: 2022
Страниц: 416
Язык: английский
Формат: epub
Размер: 10.18 MB

Practice essential IT skills and prepare for the 2021 version of the CompTIA Network+ exam. This thoroughly revised lab manual challenges you to solve real-world problems by learning to successfully apply the techniques contained inMike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition. Clear, measurable lab objectives map directly to every topic on the test, enabling readers to pass the challenging exam with ease. Mike Meyers’ CompTIA Network+ Guide to Managing and Troubleshooting Networks Lab Manual, Sixth Edition (Exam N10-008) contains more than 90 hands-on labs along with materials lists, lab setup details, and step-by-step instructions that require you to think critically. The book features special design elements that teach and reinforce retention.
  • Добавил: literator
  • Дата: 13-01-2022, 20:32
  • Комментариев: 0
Efficient and Provably Secure Schemes for Vehicular Ad-Hoc NetworksНазвание: Efficient and Provably Secure Schemes for Vehicular Ad-Hoc Networks
Автор: Ikram Ali, Yong Chen, Mohammad Faisal
Издательство: Springer
Год: 2022
Страниц: 237
Язык: английский
Формат: pdf (true), epub
Размер: 21.6 MB

This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. The signature schemes ensure the authenticity of source and integrity of a safety message. While signcryption schemes ensure authentication and confidentiality of the safety message in a single logical step. To provide readers to study the schemes that securely and efficiently process a message and multiple messages in vehicle to vehicle and vehicle to infrastructure communications is the main benefit of this book. In addition, it can benefit researchers, engineers, and graduate students in the fields of security and privacy of VANETs, Internet of vehicles securty, wireless body area networks security, etc.
  • Добавил: literator
  • Дата: 12-01-2022, 05:15
  • Комментариев: 0
Securing Systems: Applied Security Architecture and Threat ModelsНазвание: Securing Systems: Applied Security Architecture and Threat Models
Автор: Brook S. E. Schoenfield
Издательство: CRC Press
Год: 2015
Страниц: 416
Язык: английский
Формат: pdf (true)
Размер: 14.5 MB

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completely compromised. It is the information security architect’s job to prevent attacks by securing computer systems. This book describes both the process and the practice of assessing a computer system’s existing information security posture. Detailing the time-tested practices of experienced security architects, it explains how to deliver the right security at the right time in the implementation lifecycle. Securing Systems: Applied Security Architecture and Threat Models covers all types of systems, from the simplest applications to complex, enterprise-grade, hybrid cloud architectures. It describes the many factors and prerequisite information that can influence an assessment. The book covers the following key aspects of security analysis.
  • Добавил: literator
  • Дата: 9-01-2022, 17:35
  • Комментариев: 0
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity FrameworkНазвание: Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
Автор: Cynthia Brumfield and Brian Haugli
Издательство: Wiley
Год: 2022
Страниц: 224
Язык: английский
Формат: epub
Размер: 10.2 MB

Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack.
  • Добавил: literator
  • Дата: 9-01-2022, 06:47
  • Комментариев: 0
Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis CommunicationНазвание: Cyber Crisis Management: The Practical Handbook on Crisis Management and Crisis Communication
Автор: Holger Kaschner
Издательство: Springer
Год: 2021
Страниц: 230
Язык: английский
Формат: pdf (true), epub
Размер: 10.2 MB

Cyber attacks and IT outages threaten every organization. The incidents accumulate and often form the prelude to complex, existence-threatening crises. This book helps not only to manage them, but also to prepare for and prevent cyber crises. With its practical structure, it is ideally suited to day-to-day business for crisis team members, communicators, security, IT and data protection experts. With numerous illustrations and checklists. A cyber crisis is therefore a crisis in which IT systems and the data processed on them play a central role. This involves the classic protection goals of information security: confidentiality, integrity, and availability of the data as well as authenticity of the communication participants and contents of the communication (technically as well as organizationally). We are therefore dealing with a cyber crisis whenever a breach of the protection goals (can) result in real dangers to the life and limb of people or to the strategic goals, reputation, or survivability of our organization.
  • Добавил: literator
  • Дата: 8-01-2022, 05:37
  • Комментариев: 0
Social Networks: Modelling and AnalysisНазвание: Social Networks: Modelling and Analysis
Автор: Niyati Aggrawal, Adarsh Anand
Издательство: CRC Press
Год: 2022
Страниц: 254
Язык: английский
Формат: pdf (true)
Размер: 12.8 MB

The goal of this book is to provide a reference for applications of mathematical modeling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making. Social Networks: Modeling and Analysis provide the essential knowledge of network analysis applicable to real-world data, with examples from today's most popular social networks such as Facebook, Twitter, Instagram, YouTube, etc. Chapter 1 discusses the basic concepts and terminologies related to network analysis applicable to real-world data, with examples from today's most popular social networks. Chapter 2 discusses the need for scientific analysis wherein the representation of a network as a graph (various kind of graphs). Chapter 10 gives an overview of the information diffusion process on social networking platforms and various mathematical modelling frameworks. Chapter 11 gives a brief overview about security and privacy issues on social networks, and Chapter 12 provides an overview of the various social networking tools such as Gephi, UCINET, NetworkX, Pajek and many more.