Подписывайтесь на наш Telegram-канал! Ежедневно интересно!

Подписывайтесь на наш Telegram-канал!

Помочь нашему сайту финансово на сервисе сбора донатов!

Помочь нашему сайту финансово!
 
Текущий раздел Скачать бесплатно » Книги » Сетевые технологии
HostLife - лучший платный хостинг

Назад Вперед

Wireless Communication in Cyber Security

Автор: Limpopo5 от 2024-04-20, 05:32:16
  • 0
Wireless Communication in Cyber SecurityНазвание: Wireless Communication in Cyber Security
Автор: S. Sоunthаrrаjаn, R. Маhеswаr, Gееtаnjаli Rаthее
Издательство: Wiley-Scrivener
Год: 2023
Страниц: 284
Язык: английский
Формат: pdf (true)
Размер: 15.7 MB

Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various security issues. Quite efficient secure cyber-physical systems can be constructed using these technologies. This comprehensive new volume covers the many methods and technologies used in intrusion detection in wireless networks. This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial Intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered.

5G NR Modelling in MATLAB: Network Architecture, Protocols, and Physical Layer

Автор: Limpopo5 от 2024-04-19, 05:04:28
  • 0
5G NR Modelling in MATLAB: Network Architecture, Protocols, and Physical LayerНазвание: 5G NR Modelling in MATLAB: Network Architecture, Protocols, and Physical Layer
Автор: Тulsi Раwаn Fоwdur, Маdhаvsingh Indооnundоn, Drаgоrаd А. Мilоvаnоviс
Издательство: CRC Press
Год: 2025
Страниц: 450
Язык: английский
Формат: pdf (true)
Размер: 48.8 MB

5G is the fifth generation of cellular technology. It is designed to increase speed, reduce latency, and improve the flexibility of wireless services. 5G New Radio (NR) is the enabler of three key service classes: Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine-Type Communications (mMTC). The 5G network is expected to deliver a wide range of services that includes eMBB, mMTC, and URLLC. To realize such a diverse set of requirements, the 5G network has evolved as a multilayer network that uses various technological advances to offer an extensive range of wireless services. Several technologies, such as software-defined networking, network function virtualization, edge computing, cloud computing, and small cells, are being integrated into the 5G networks to fulfill the need for diverse requirements. This book provides a detailed description of the fundamental aspects of 5G. It gives an in-depth coverage of the network architecture of 5G by considering both the network reference point architecture and the service-based architecture. The MathWorks introduced MATLAB’s 5G Toolbox which provides standard-compliant functions and examples for the simulation of the 5G environment. In this book, functions from the toolbox were used to build the 5G NR end-to-end physical layer model for Packet Data Shared Channel (PDSCH) processing and to calculate the PDSCH throughput, Bit Error Rate (BER), and Block Error Rate (BLER). Moreover, MATLAB models of each block have been used to simulate a complete 5G downlink system.

Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain Technology

Автор: Limpopo5 от 2024-04-19, 04:16:01
  • 0
Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain TechnologyНазвание: Intelligent Computing on IoT 2.0, Big Data Analytics, and Block Chain Technology
Автор: Моhаmmаd S. Оbаidаt, Раdmаlауа Nауаk, Nirаnjаn К. Rау
Издательство: CRC Press
Год: 2024
Страниц: 418
Язык: английский
Формат: pdf (true)
Размер: 14.1 MB

The book is designed as a reference text and explores the concepts and techniques of IoT, Artificial Intelligence (AI), and blockchain. It also discusses the possibility of applying blockchain for providing security in various domains. The specific highlight of this book is focused on the application of integrated technologies in enhancing data models, better insights and discovery, intelligent predictions, smarter finance, smart retail, global verification, transparent governance, and innovative audit systems. Chapter 1 is an introductory chapter that discusses the challenges involved in IoT 2.0, the integration of IoT and big data, and the role of blockchain in IoT networks to ensure security. In Chapter 2, the authors have provided a detailed review of blockchain technology and its impact on the IoT network. However, several challenges are discussed in this chapter that need to be addressed and overcome before exploiting the full potential of the blockchain in IoT applications. Chapter 3 presents an overview of cloud architecture, services, and applications of cloud technology. A real-time cloud-based weather forecasting system is presented. The book is aimed primarily at advanced undergraduates and graduates studying Computer science, computer engineering, electrical engineering, information systems, computational sciences, Artificial Intelligence, and information technology. Researchers and professionals will also find this book very useful.

Tor: From the Dark Web to the Future of Privacy

Автор: Limpopo5 от 2024-04-17, 19:57:56
  • 0
Tor: From the Dark Web to the Future of PrivacyНазвание: Tor: From the Dark Web to the Future of Privacy
Автор: Веn Соlliеr
Издательство: The MIT Press
Год: 2024
Страниц: 243
Язык: английский
Формат: pdf (true), epub (true)
Размер: 10.1 MB

A biography of Tor—a cultural and technological history of power, privacy, and global politics at the internet's core. Tor, one of the most important and misunderstood technologies of the digital age, is best known as the infrastructure underpinning the so-called Dark Web. But the real “dark web,” when it comes to Tor, is the hidden history brought to light in this book: where this complex and contested infrastructure came from, why it exists, and how it connects with global power in intricate and intimate ways. In Tor: From the Dark Web to the Future of Privacy, Ben Collier has written, in essence, a biography of Tor—a cultural and technological history of power, privacy, politics, and empire in the deepest reaches of the internet. Tor—still known to most as the Dark Web or Dark Net—is not an easy subject to research. It exists on a bizarre terrain, simultaneously in the living rooms of lovely nerds, in the nightmares of police officers, in the small spaces of everyday digital life, and in the corridors of global power. It is a thin and brittle network stretched across the globe like a glass spiderweb and at the same time a profound challenge to the most powerful spy agencies in the world. Most users access Tor in the form of a rather innocuous web browser—much like Chrome, Safari, or Firefox—that rapidly clicks and whirrs through a pleasing set of additional messages before it starts up, giving it a slightly hacker-film feel. Once this is finished and the connection to the Tor network is confirmed, the user can simply browse the internet as normal.

Self-Powered AIoT Systems

Автор: Limpopo5 от 2024-04-16, 18:18:11
  • 0
Self-Powered AIoT SystemsНазвание: Self-Powered AIoT Systems
Автор: Nirаnjаn N. Сhiрlunkаr, К.V.S.S.S.S. Sаirаm, Rаthishсhаndrа R. Gаtti
Издательство: Apple Academic Press, CRC Press
Год: 2025
Страниц: 357
Язык: английский
Формат: pdf (true)
Размер: 20.6 MB

This new volume focuses on design principles for building self-powered AIoT (artificial intelligence of things) applications and their subsequent deployment. The book introduces the futuristic concepts of AIoT by incorporating self-powered systems, firstly by informing the reader of current AI/ML techniques and IoT technologies and then showing the path towards convergence of AI/IoT towards AIoT. The book also explains the many possible diverse applications of AIoT. The combination of IoT for sensing and aggregation of data from the surroundings and AI for analysis and decision-making will expand cyber-physical intelligence towards achieving complete autonomy. However, as the deployment of sensors becomes increasingly ubiquitous, there will be a massive amount of sensor data aggregation and analyses for autonomous decision-making capabilities of AIoT products. This calls for substantial research and product development in self-powered technologies such as energy harvesters, supercapacitors, energy storage devices for energy generation, and energy-efficient technologies such as ultra-low power (ULP) microcontrollers, ULP microprocessors, and ULP smart sensors and actuators. This volume helps to fill that gap. The volume presents research and product development towards structured convergence of self-powered systems, leading to pragmatic R&D deliverables for new products and services. The book is the first of its kind on reporting how the current AI and IoT are progressing toward the vision of AIoT.

Online Security For Beginners - 18th Edition, 2024

Автор: Limpopo5 от 2024-04-16, 05:05:28
  • 0
Online Security For Beginners - 18th Edition, 2024Название: Online Security For Beginners - 18th Edition, 2024
Автор: Papercut Limited
Издательство: Papercut Limited
Год: 2024
Страниц: 100
Язык: английский
Формат: pdf
Размер: 44.6 MB

Книга "Онлайн-безопасность для начинающих" - это ваш первый выбор, поскольку безопасность в Интернете является актуальной темой в наш современный цифровой век. Поскольку хакеры получают доступ к нашим ценным данным, мошенники лишают нас денег, а дети становятся мишенью для злоумышленников, нам необходимо защищать себя в Интернете. Эта книга поможет вам понять, какие опасности таит в себе Интернет и как предотвратить их появление для вас и ваших детей.

IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications

Автор: Limpopo5 от 2024-04-15, 18:26:50
  • 0
IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic ApplicationsНазвание: IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications
Автор: Sаmауvееr Singh, Маnju, Аrunа Маlik
Издательство: Bentham Books
Серия: Advances in Computing Communications and Informatics
Год: 2024
Страниц: 142
Язык: английский
Формат: pdf (true)
Размер: 26.8 MB

This volume explores IoT architectures, their configuration, and operability in wireless sensor networks. The topics are spread across nine structured chapters covering fundamental and applied knowledge about wireless sensor networks using IoT devices. The book starts with an introduction to the subject, giving readers a quick overview of IoT enabled networks and bio-inspired approaches towards network design. This is followed by chapters explaining optimized routing protocols for accident detection, efficiency and performance analysis. The book concludes with four chapters dedicated to security applications of wireless networks, for homes, urban areas and businesses. Overall, the volume gives a balance of theoretical and practical information for readers. The Internet of Things (IoT) significantly broadens the use of information technology by fusing the physical and digital worlds. The third wave of the IT industry revolution is currently being led by futuristic device-based networking. As equipment becomes more digitalized and interconnected, networks between machines, people, and the Internet are formed. This results in the development of new ecosystems that allow for increased productivity, improved energy efficiency, and increased profitability. Sensors help to recognize the state of things, by which they gain the advantage of anticipating human needs based on the information collected per context. These sophisticated devices can make decisions on their own without human assistance in addition to gathering information from their surroundings. For graduate and post graduate students and faculty members in the field of networking and IoT.

Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals, 2nd Edition

Автор: Limpopo5 от 2024-04-14, 20:48:12
  • 0
Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals, 2nd EditionНазвание: Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals, 2nd Edition
Автор: Yuri Diоgеnеs, Niсhоlаs DiСоlа, Маrk Моrоwсzуnski, Кеvin МсКinnеrnеу
Издательство: Microsoft Press/Pearson Education
Год: 2024
Страниц: 192
Язык: английский
Формат: epub
Размер: 13.4 MB

Prepare for Microsoft Exam SC-900 and demonstrate your real-world knowledge of the fundamentals of security, compliance, and identity (SCI) across cloud-based and related Microsoft services. Designed for business stakeholders, new and existing IT professionals, functional consultants, and students, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Security, Compliance, and Identity Fundamentals level. Building a foundational knowledge of key principles applicable to security, compliance, and identity is imperative to any professional who needs to work with Microsoft solutions that target each one of those domains. Some principles will directly correlate with all three domains; some will be more peculiar to each domain. Zero Trust is a great example of a methodology that should extend throughout the entire digital estate of your enterprise and serve as an integrated security philosophy and end-to-end strategy. When designing a security solution using Microsoft technologies, it is important to consider the entire portfolio of options to have a complete approach for resources in Azure, Microsoft 365, and on-premises.

Data-Centric Security in Software Defined Networks (SDN)

Автор: Limpopo5 от 2024-04-14, 02:29:57
  • 0
Data-Centric Security in Software Defined Networks (SDN)Название: Data-Centric Security in Software Defined Networks (SDN)
Автор: Маrеk Аmаnоwiсz, Sеbаstiаn Szwасzуk, Коnrаd Wrоnа
Издательство: Springer
Год: 2024
Страниц: 133
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aimto provide defence under the assumption that the boundary protections will be breached.

Security Framework for The Internet of Things Applications

Автор: Limpopo5 от 2024-04-13, 20:22:22
  • 0
Security Framework for The Internet of Things ApplicationsНазвание: Security Framework for The Internet of Things Applications
Автор: Sаlmа Аbdаllа Наmаd, Quаn Z. Shеng, Wеi Еmmа Zhаng
Издательство: CRC Press
Год: 2024
Страниц: 153
Язык: английский
Формат: pdf (true)
Размер: 11.9 MB

The text highlights a comprehensive survey that focuses on all security aspects and challenges facing the Internet of Things systems, including outsourcing techniques for partial computations on edge or cloud while presenting case studies to map security challenges. It further covers three security aspects including Internet of Things device identification and authentication, network traffic intrusion detection, and executable malware files detection. Industrial Internal of Things (IIoT) products and services collect a large amount of data including those related to users. This collected data are stored either locally on the smart devices or in the cloud. Although Internet of Things (IoT) expansions promise enormous benefits in productivity and efficiency, these devices often lack the security requirements we have become used to in the domain of desktops and server computing. Therefore, processing such large-scale IoT data can also lead to many security issues such as intrusion attacks, data leakage, user privacy, and traceability. This book presents substantial contributions to research on building a scalable, real-time IoT security framework. This book provides several novel strategies for identifying and authenticating devices, detecting network-known and zero-day attacks against IoT devices, and detecting malware executables targeting IoT and embedded systems. In this book, we consider three security aspects: IoT device identification and authentication, network traffic intrusion detection, and executable malware file detection.

Назад Вперед

HostLife - лучший платный хостинг
HostLife - лучший платный хостинг!
Отличный хостинг по цене от 1.87$/месяц! Рекомендация от сайта Bookskeeper!


Бесплатная электронная библиотека. Скачать книги бесплатно!
Текущий раздел Скачать бесплатно » Книги » Сетевые технологии

Наша электронная библиотека Bookskeeper (для РФ работает через VPN) - это интернет-витрина, где любой посетитель может публиковать электронные варианты книг, журналов, газет, комиксов, в общем, любой литературы со ссылками для медленного, но бесплатного скачивания с файлообменников. В нашем книжном хранилище Вы всегда найдете литературу на любой вкус человека любого возраста - от детских комиксов и расскрасок до серьезной научной литературы.
 
 
Поддержите наш сайт!
Идет сбор донатов на хостинг
для работы нашего сайта.
Сканируйте QR-код
(или нажмите на него)
для Вашей поддержки!
Оплата картой, ЮMoney


Донаты для помощи нашему сайту!

ОГРОМНОЕ СПАСИБО
всем за Ваши донаты!

Наши рекомендации



Book24.ru - книжный интернет магазин



Turbobit - Получите турбо-доступ и скачивайте безлимитно и без рекламы!


HostLife - лучший платный хостинг



 
 

Топ публикаций

 
  • Exotic - № 42024
  • Дилетант №4 (100) 2024
  • Барин. Цикл из 2 книг
  • Vivere Country №172 2024
  • Последний попаданец. Цикл из 11 книг
  • Легендарные грузовики СССР №91 КШМ-Р-142М (ГАЗ-66) (2024)
  • Книга пяти колец. Цикл из 6 книг
  • Земляной А. - Страж. Цикл из 3 книг
  • Десять Принцев Российской Империи. Цикл из 6 книг
  • Наши автобусы. Спецвыпуск №11 2024
  • Selber Machen №6 2023
  • Чайка Д. - Третий Рим. Цикл из 10 книг
  • Барьер Ориона. Цикл из 2 книг
  • СССР 2010. Цикл из 6 книг
  • Провинциал. Цикл из 4 книг
  • Дворянская кровь. Цикл из 3 книг
  • Машины и Механизмы №4 2024
  • Жандарм. Цикл из 5 книг
  • "Приусадебное хозяйство" № 4 2024 с приложениями
  • Глас Плеяды. Цикл из 4 книг
  • Зарубежное Военное Обозрение №4 2024
  • Игра Хаоса. Цикл из 14 книг
  • Риддер А. - Техномаг. Цикл из 3 книг
  • Идеальный мир для Лекаря. Цикл из 15 книг
  • Selber Machen - Mai 2024
  • Кровь Василиска. Цикл из 2 книг
  • UPgrade №2 (март 2024)
  • Легендарные грузовики СССР №93 ЯАЗ-210Е (2024)
  • Вик Разрушитель. Цикл из 6 книг
  • Титан империи. Цикл из 3 книг
  •