- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Securing IM and P2P applications for the enterprise: Part 2
Ebook Securing IM and P2P applications for the enterprise: Part 2 includes contents: Chapter 9 Gnutella Architecture; Chapter 10 eDonkey and eMule; Chapter 11 BitTorrent; Chapter 12 FastTrack; Chapter 13 Internet Relay Chat—Major Players of IRC; Chapter 14 IRC Networks and Security; Chapter 15 Global IRC Security; Chapter 16 Common IRC Clients by OS.
218 p actvn 27/02/2024 9 0
Từ khóa: Securing IM, Securing IM and P2P applications, Network security, Computer security, Information security, IRC Networks, Global IRC security
Ebook Algorithms in a Nutshell
Ebook "Algorithms in a Nutshell" includes contents: Chapter I Algorithms matter, Chapter II The mathematics of algorithms, Chapter III Patterns and Domains, Chapter VI Sorting algorithms, Chapter V Searching, Chapter VI Graph algorithms, Chapter VII Path finding in AI, Chapter VIII Network flow algorithms, Chapter IX Computational geometry, Chapter X When all else fails, Chapter XI Epilogue, Chapter XII Benchmarking.
344 p actvn 29/11/2023 37 0
Từ khóa: Ebook Algorithms in a Nutshell, Algorithms in a Nutshell, Algorithms matter, Sorting algorithms, Network flow algorithms, Computational geometry
Ebook "Natural language processing with PyTorch: Build intelligent language applications using deep learning" aims to bring newcomers to natural language processing (NLP) and deep learning to a tasting table covering important topics in both areas. Both of these subject areas are growing exponentially. As it introduces both deep learning and NLP with an emphasis on implementation, this book occupies an important middle ground.
210 p actvn 29/11/2023 22 0
Từ khóa: Natural language processing with PyTorch, Build intelligent language applications, Deep learning, The supervised learning paradigm, TF-IDF representation, Computational graphs, Computational linguistics, Neural network models
Ebook Data mining with computational intelligence
Ebook "Data mining with computational intelligence" includes content: Introduction, MLP neural networks for time series prediction and classification, fuzzy neural networks for bioinformatics, an improved RBF neural network classifier, an improved RBF neural network classifier, attribute importance ranking for data dimensionality reduction,...and other contents.
280 p actvn 25/10/2023 53 0
Từ khóa: Data mining, Computational intelligence, MLP neural networks, Time series prediction, Fuzzy neural networks, RBF neural network classifier
Ebook AAA and network security for mobile access: radius, diameter, EAP, PKI, and IP mobility
The book is geared towards people who have a basic understanding of Internet Protocol (IP) and TCP/IP stack layering concepts. Except for the above, most of the other IP-related concepts are explained in the text. Thus, the book is suitable for managers, engineers, researchers and students who are interested in the topic of network security and AAA but do not possess in-depth IP routing and security knowledge. We aimed at providing an overview...
318 p actvn 26/09/2023 57 0
Từ khóa: Wireless Internet, Security measures, Mobile computing, Wireless internet security measures, Mobile computing security, Network security for mobile access
Ebook Security in wireless LANs & MANs
This book discusses the security threats and requirements in wireless LANs and wireless MANs, with a discussion on what the original designs missed and how they were corrected in the new protocols. It highlights the features of the current wireless LAN and MAN security protocols and explains the caveats and discusses open issues. This book is divided into four parts. The first part discusses authentication technologies common to security in...
262 p actvn 26/09/2023 48 0
Từ khóa: Wireless LANs, Security in wireless LANs, Security in wireless MANs, Wireless communication systems, Metropolitan area networks, Computer networks
Ebook Computer security, privacy, and politics: Current issues, challenges and solutions
"Computer Security, Privacy, & Politics " offers a review of recent developments of computer security, focusing on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations.It compiles timely content on such topics as reverse engineering of software, understanding emerging computer exploits, emerging lawsuits and cases, global and societal implications, and protection from attacks on privacy.
333 p actvn 26/09/2023 58 0
Từ khóa: Computer security, Computer networks security measures, Computer networks, Computer security government polic, Reverse engineering of software
Ebook Cyber threat: How to manage the growing risk of cyber attacks
This book is an attempt to raise the level of awareness about the cyber threat and what to do about it. The cyber threat is a board of directors’ issue. Yet when some senior executives and board members hear the word “security” or “technology,” there’s a disconnect. They think it’s not their issue. Let the technology people deal with it. Let the security people deal with it. Although there is evidence that this perception is...
224 p actvn 26/09/2023 53 0
Từ khóa: Cyber threat, Computer security, Cyber attacks, The risk of cyber attacks, Corporations security measures, Business enterprises, Computer networks security measures
Ebook Implementing NAP and NAC security technologies: The complete guide to network access control includes contents: Chapter 1: Understanding terms and technologies, Chapter 2: The technical components of NAC/NAP solutions, Chapter 3: What are you trying to protect? Chapter 4: Understanding the need for LAN-based NAC/NAP, Chapter 5: Understanding the need for mobile NAC, Chapter 6: Understanding Cisco clean access, Chapter 7: Understanding...
291 p actvn 26/09/2023 32 0
Từ khóa: NAC security technologies, NAP security technologies, Network access control, Computer networks, Access control, Security measures, Computer network protocols
Ebook Wireless security handbook: Part 1
Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.
138 p actvn 26/09/2023 28 0
Từ khóa: Wireless security handbook, Wireless security, Wireless network, The legality of computer crime, Wireless physical layer technologies, Personal area networks
Ebook Computer networking: A top-down approach (6th edition): Part 2
Part 2 book "Computer networking - A top down approach" has contents: The link layer links, access networks, and LANs; wireless and mobile networks, multimedia networking, security in computer networks, network management.
430 p actvn 21/07/2023 73 0
Từ khóa: Computer networking, A top down approach, The link layer links, Access networks, The end-to-end communication path, The link-layer addressing operate
Ebook Computer network - A systems approach (3rd edition): Part 1
Part 1 book "Computer network - A systems approach" has contents: Applications, implementing network software, performance, hardware building blocks, reliable transmission, network adaptors, switching and forwarding, switching and forwarding, bridges and LAN switches,...and other contents.
401 p actvn 21/07/2023 34 0
Từ khóa: Computer network, Implementing network software, Hardware building blocks, Reliable transmission, Network adaptors, Switching and forwarding
Đăng nhập
Bộ sưu tập nổi bật
Bộ sưu tập Tài liệu học tiếng Anh
14 82978
12 23568
Bộ sưu tập Kỹ thuật viễn thông
11 16531
10 19596