Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer communications & networking
Get ready to configure and operate modern data centers-and move up to high-value CCNP Data Center (DC) certification Cisco Data Center Fundamentals is the complete guide for network engineers and other professionals who need a solid understanding of modern data center technologies. Especially useful for those preparing for the Cisco DCCOR exam and Cisco Certified Network Professional (CCNP) Data Center certification, it fully addresses the essentials of networking, storage, compute, and automation in today's data center environments. Authored by two long-time experts in operating Cisco data centers and developing official Learning@Cisco training for them, this guide explains each concept step by step, balancing depth and breadth, and maximizing clarity throughout. The authors go far beyond introducing relevant products, protocols, and features. They illuminate underlying technologies, identify key interdependencies, walk through configuring working solutions, and truly help prepare you to set up and operate a modern data center. Gain a holistic, unified understanding of the data center and its core components Walk through installation and deployment of key data center technologies Explore potential applications to see what's possible in your environment Learn how Cisco switches and software implement data center networking and virtualization Discover and apply data center network design and security best practices Review Cisco data center storage technologies and concepts, including Fibre Channel, VSANs, storage virtualization, and FCoE Explore the building blocks of the Cisco UCS data center compute solution, and how UCS uses hardware abstraction and server virtualization Use automation and APIs to improve data center productivity and agility Create and customize scripts for rapid troubleshooting Understand cloud computing for the data center: services, deployment models, and the Cisco Intersight hybrid cloud operations platform
A staggering 70% of digital transformations have failed as per McKinsey. The key reason why enterprises are failing in their digital transformation journey is because there is no standard framework existing in the industry that enterprises can use to transform themselves to digital. There are several books that speak about technologies such as Cloud, Artificial Intelligence and Data Analytics in silos, but none of these provides a holistic view on how enterprises can embark on a digital transformation journey and be successful using a combination of these technologies. FORMULA 4.0 is a methodology that provides clear guidance for enterprises aspiring to transform their traditional operating model to digital. Enterprises can use this framework as a readymade guide and plan their digital transformation journey. This book is intended for all chief executives, software managers, and leaders who intend to successfully lead this digital transformation journey. An enterprise can achieve success in digital transformation only of it can create an IT Platform that will enable them to adopt any new technology seamlessly into existing IT estate; deliver new products and services to the market in shorter durations; make business decisions with IT as an enabler and utilize automation in all its major business and IT processes. Achieving these goals is what defines a digital enterprise -- Formula 4.0 is a methodology for enterprises to achieve these goals and become digital. Essentially, there is no existing framework in the market that provides a step-by-step guide to enterprises on how to embark on their successful digital transformation journey. This book enables such transformations. Overall, the Formula 4.0 is an enterprise digital transformation framework that enables organizations to become truly digital.
The Internet of Energy (IoE), with the integration of advanced information and communication technologies (ICT), has led to a transformation of traditional networks to smart systems. Internet of Energy Handbook provides updated knowledge in the field of energy management with an Internet of Things (IoT) perspective. Features Explains the technological developments for energy management leading to a reduction in energy consumption through topics like smart energy systems, smart sensors, communication, techniques, and utilization Includes dedicated sections covering varied aspects related to renewable sources of energy, power distribution, and generation Incorporates energy efficiency, optimization, and sensor technologies Covers multidisciplinary aspects in computational intelligence and IoT Discusses building energy management aspects including temperature, humidity, the number of persons involved, and light intensity This handbook is aimed at graduate students, researchers, and professionals interested in power systems, IoT, smart grids, electrical engineering, and transmission.
This book discusses link-state routing protocols (OSPF and IS-IS), and the path-vector routing protocol (BGP). It covers their most identifying characteristics, operations, and the databases they maintain. Material is presented from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and real-world examples. Every aspect of the book is written to reflect current best practices using real-world examples. The book begins with a detailed description of the OSPF area types and hierarchical routing, and the different types of routers used in an OSPF autonomous system. The author goes on to describe in detail the different OSPF packet types, and inbound and outbound processing of OSPF link-state advertisements (LSAs). Next, the book gives an overview of the main features of IS-IS. The author then discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. He then describes in detail IS-IS network address formats, IS-IS routing metrics, IS-IS packet types, IS-IS network types and adjacency formation, IS-IS LSDB and synchronization, and IS-IS authentication. The book then reviews the main concepts of path-vector routing protocols, and describes BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP Autonomous System Numbers (ASNs). Focuses solely on link-state routing protocols (OSPF and IS-IS), and the only path-vector routing protocol in use today (BGP). Reviews the basic concepts underlying the design of IS-IS and provides a detailed description of IS-IS area types and hierarchical routing, and the different types of routers used by IS-IS. Discusses the two-level routing hierarchy for controlling the distribution of intra-domain (Level 1) and inter-domain (Level 2) routing information within an IS-IS routing domain. Describes in detail BGP packet types, BGP session states and Finite State Machine, BGP path attributes types, and BGP ASNs, includes a high-level view of the typical BGP router and its components, and inbound and outbound message processing. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
This book focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). It discusses routing protocols from a practicing engineer's perspective, linking theory and fundamental concepts to common practices and everyday examples. The book benefits and reflects the author's more than 22 years of designing and working with IP routing devices and protocols (and Telecoms systems, in general). Every aspect of the book is written to reflect current best practices using real-world examples. This book describes the various methods used by routers to learn routing information. The author includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. He explains the processing steps involved in forwarding IP packets through an IP router to their destination and discusses the various mechanisms IP routers use for controlling routing in networks. The discussion is presented in a simple style to make it comprehensible and appealing to undergraduate and graduate level students, research and practicing engineers, scientists, IT personnel, and network engineers. It is geared toward readers who want to understand the concepts and theory of IP routing protocols, through real-world example systems and networks. Focuses on the fundamental concepts of IP routing and distance-vector routing protocols (RIPv2 and EIGRP). Describes the various methods used by routers to learn routing information. Includes discussion of the characteristics of the different dynamic routing protocols, and how they differ in design and operation. Provides detailed descriptions of the most common distance-vector routing protocols RIPv2 and EIGRP. Discusses the various mechanisms IP routers use for controlling routing in networks. James Aweya, PhD, is a chief research scientist at the Etisalat British Telecom Innovation Center (EBTIC), Khalifa University, Abu Dhabi, UAE. He has authored four books including this book and is a senior member of the Institute of Electrical and Electronics Engineers (IEEE).
How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .
Starting with problems and challenges faced by enterprise WANs, Software-Defined Wide Area Network Architectures and Technologies provides a detailed description of SD-WAN's background and basic features, as well as the system architecture, operating mechanism, and application scenarios of the SD-WAN solution based on the implementation of Huawei SD-WAN Solution. It also explains key SD-WAN technologies and analyzes real SD-WAN deployment cases, affording readers with design methods and deployment suggestions for the SD-WAN solution. The information presented in this book is easy to understand and very practical. It enables you to become adept in the SD-WAN solution's implementation and design principles. The book is intended for ICT practitioners, such as network technical support engineers, network administrators, and network planning engineers, to use in studying theory. Furthermore, it serves as reference material for network technology enthusiasts. Authors Cheng Sheng is the Chief Architect of Huawei's SD-WAN Solution. He has nearly 20 years of experience in network product and solution design, as well as extensive expertise in product design and development, network planning and design, and network engineering project implementation. Jie Bai is an Architect of Huawei's SD-WAN Solution. He is well versed in Huawei security products and SD-WAN Solution and has written books such as Huawei Firewall Technology Talk as well as Huawei Anti-DDoS Technology Talk. Qi Sun is a Senior Information Architect of Huawei, and he is knowledgeable in Huawei SD-WAN Solution, CloudVPN Solution, and Cloud Management Solution. He also participated in the information architecture design and delivery of multiple solutions.
How can we recruit out of your program? We have a project - how do we reach out to your students? If we do research together who owns it? We have employees who need to "upskill" in analytics - can you help me with that? How much does all of this cost? Managers and executives are increasingly asking university professors such questions as they deal with a critical shortage of skilled data analysts. At the same time, academics are asking such questions as: How can I bring a "real" analytical project in the classroom? How can I get "real" data to help my students develop the skills necessary to be a "data scientist? Is what I am teaching in the classroom aligned with the demands of the market for analytical talent? After spending several years answering almost daily e-mails and telephone calls from business managers asking for staffing help and aiding fellow academics with their analytics teaching needs, Dr. Jennifer Priestley of Kennesaw State University and Dr. Robert McGrath of the University of New Hampshire wrote Closing the Analytics Talent Gap: An Executive's Guide to Working with Universities. The book builds a bridge between university analytics programs and business organizations. It promotes a dialog that enables executives to learn how universities can help them find strategically important personnel and universities to learn how they can develop and educate this personnel. Organizations are facing previously unforeseen challenges related to the translation of massive amounts of data - structured and unstructured, static and in-motion, voice, text, and image - into information to solve current challenges and anticipate new ones. The advent of analytics and data science also presents universities with unforeseen challenges of providing learning through application. This book helps both organizations with finding "data natives" and universities with educating students to develop the facility to work in a multi-faceted and complex data environment. .
This book has been written with the support of Huawei's large accumulation of technical knowledge and experience in the WLAN field, as well as its understanding of customer service requirements. First, the book covers service challenges facing enterprise wireless networks, along with detailing the latest evolution of Wi-Fi standards, air interface performance, and methods for improving user experience in enterprise scenarios. Furthermore, it illustrates typical networking, planning, and scenario-specific design for enterprise WLANs, and provides readers with a comprehensive understanding of enterprise WLAN planning, design, and technical implementation, as well as suggestions for deployment. This is a practical and easy-to-understand guide to WLAN design, and is written for WLAN technical support and planning engineers, network administrators, and enthusiasts of network technology. Authors Rihai Wu is Chief Architect of Huawei's campus network WLAN solution with 16 years of experience in wireless communications product design and a wealth of expertise in network design and product development. He previously served as a designer and developer of products for Wideband Code Division Multiple Access (WCDMA), LTE indoor small cells, and WLAN. Xun Yang is a WLAN standard expert from Huawei. He has nine years of experience in formulating WLAN standards, and previously served as 802.11ac Secretary, 802.11ah PHY Ad-hoc Co-chair, and 802.11ax MU Ad Hoc Sub Group Co-chair. Mr. Yang oversees technical research, the promotion of standards, and industrialization in the WLAN field, and has filed more than 100 patents. Xia Zhou is a documentation engineer of Huawei's campus network WLAN solution. She has 10 years of experience in creating documents for campus network products. Ms. Zhou was previously in charge of writing manuals for Huawei data center switches, WLAN products, and campus network solutions. She is also the author of Campus Network Solution Deployment Guide and was a co-sponsor of technical sessions such as WLAN from Basics to Proficiency. Yibo Wang is a documentation engineer of Huawei's campus network WLAN solution. He has nine years of experience in creating documents for campus network products. Mr. Wang was previously in charge of writing manuals for Huawei switches, WLAN products, and routers. He was also a co-sponsor of technical sessions such as WLAN from Basics to Proficiency and HCIA-WLAN certification training courses.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc. This text highlights a showcase of cutting-edge research on the use of convolution neural networks, autoencoders, recurrent convolutional neural networks in face, hand, iris, gait, fingerprint, vein, and medical biometric traits. It also provides a step-by-step guide to understanding deep learning concepts for biometrics authentication approaches and presents an analysis of biometric images under various environmental conditions. This book is sure to catch the attention of scholars, researchers, practitioners, and technology aspirants who are willing to research in the field of AI and biometric security.
Campus Network Architectures and Technologies begins by describing the service challenges facing campus networks, and then details the intent-driven campus network architectures and technologies of Huawei Cloud Campus Solution. After reading this book, you will have a comprehensive understanding of next-generation campus network solutions, technical implementations, planning, design, and other know-how. Leveraging Huawei's years of technical expertise and practices in the campus network field, this book systematically describes the use of technical solutions such as virtualization, big data, AI, and SDN in campus networks. You will be able to reconstruct campus networks quickly and efficiently utilizing this informative description. Additionally, this book provides detailed suggestions for campus network design and deployment based on Huawei's extensive project implementation experience, assisting with the construction of automated and intelligent campus networks required to cope with challenges. This is a practical, informative, and easy-to-understand guide for learning about and designing campus networks. It is intended for network planning engineers, network technical support engineers, network administrators, and enthusiasts of campus network technologies. Authors Ningguo Shen is Chief Architect for Huawei's campus network solutions. He has approximately 20 years' experience in campus network product and solution design, as well as a wealth of expertise in network planning and design. Mr. Shen previously served as a system engineer for the campus switch, data center switch, and WLAN product lines, and led the design of Huawei's intent-driven campus network solution. Bin Yu is an Architect for Huawei's campus network solutions. He has 12 years' experience in campus network product and solution design, as well as extensive expertise in network planning and design and network engineering project implementation. Mr. Yu once led the design of multiple features across various campus network solutions. Mingxiang Huang is a Documentation Engineer for Huawei's campus network solutions. He has three years of technical service experience, and four years of expertise in developing campus network product documentation. Mr. Huang was previously in charge of writing manuals for Huawei router and switch products. He has authored many popular technical series, including Be an OSPF Expert, Insight into Routing Policies, and Story behind Default Routes. Hailin Xu is a Documentation Engineer for Huawei's campus network solutions. He has two years of marketing experience in smart campus solutions, and six years of expertise in developing network products and solution documentation. Extremely familiar with Huawei's campus network products and solutions, Mr. Xu was previously in charge of writing manuals for Huawei routers, switches, and campus network solutions. In addition, he has participated in smart campus marketing projects within such sectors as education, government, and real estate.
Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field, as well as its understanding of customer service requirements. This book describes in detail the architecture design, technical implementation, planning and design, and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs, with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs, including the service model of a single data center (DC), construction of physical and logical networks of DCs, construction of multiple DCNs, and security solutions of DCs. Next, this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally, this book introduces DCN openness and some of the hottest forward-looking technologies. In summary, you can use this book as a reference to help you to build secure, reliable, efficient, and open cloud DCNs. It is intended for technical professionals of enterprises, research institutes, information departments, and DCs, as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design, as well as a wealth of expertise in product design and development, network planning and design, and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series, such as DCN Handbook and BGP Topic.
Assisting organizations in improving their project management processes, the Project Management Maturity Model defines the industry standard for measuring project management maturity and agile and adaptive capabilities. Project Management Maturity Model, Fourth Edition provides a roadmap showing organizations how to move to higher levels of organizational behavior, improving project success and organizational performance. It's a comprehensive tool for enhancing project management practices, covering areas critical to organizational improvement, such as the project management office, management oversight, and professional development. It also provides methods for optimizing project management processes and suggestions for deploying the model as a strategic tool in improving business outcomes. New material in each chapter also outlines good practices for implementing adaptive an agile processes. The book also includes the Project Portfolio Management Maturity Model, which covers best practices for determining portfolio maturity, setting short-term priorities, implementing benefits realization management, improving portfolio management processes and tracking progress. The author, J. Kent Crawford, CEO of PM Solutions, describes the basics of project management maturity, including the benefits of assessing maturity, and presents a comprehensive framework for improving organization's processes. Chapters are based on the ten project management knowledge areas specified in the Project Management Institute's standard, the PMBOK (R) Guide. This edition provides new and revised materials based on the PMBOK (R) Guide including a fresh focus on agile and adaptive methods, benefits realization, and organizational change management. Organizations can use this book to: Determine the maturity of your organization's project management processes Gauge readiness for agile transformation Map out a logical path to improve your organization's processes Set priorities for short-term process improvement Track and visualize improvements in project management over time Learn to translate process maturity into business results After an objective assessment, an organization can set its goals for increasing the capability of its processes and develop a plan for reaching those goals. This book is ideal for anyone involved with improving the capability of an organization's project and portfolio management processes.
Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation, storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services, their challenges, and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied, the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing, and cloud security. Written by researchers and practitioners, the book's chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures, where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability, a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud, and a case study discusses testing reliability, installability, and security. A comprehensive volume, Cloud Reliability Engineering: Technologies and Tools combines research, theory, and best practices used to engineer reliable cloud availability and performance.
Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain. You also have access to four unique 125-question practice exams to help you master the material. As the only official practice tests endorsed by (ISC)2, this book gives you the advantage of full and complete preparation. These practice tests align with the 2021 version of the exam to ensure up-to-date preparation, and are designed to cover what you will see on exam day. Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. The CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace. This book is your ticket to achieving this prestigious certification, by helping you test what you know against what you need to know. Test your knowledge of the 2021 exam domains Identify areas in need of further study Gauge your progress throughout your exam preparation Practice test taking with Sybex's online test environment containing the questions from the book The CISSP exam is refreshed every few years to ensure that candidates are up-to-date on the latest security topics and trends. Currently-aligned preparation resources are critical, and periodic practice tests are one of the best ways to truly measure your level of understanding.
Master CEH v11 and identify your weak spots CEH: Certified Ethical Hacker Version 11 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain the confidence--and skills--you need to pass. These tests cover all section sections of the exam blueprint, allowing you to test your knowledge of Background, Analysis/Assessment, Security, Tools/Systems/Programs, Procedures/Methodology, Regulation/Policy, and Ethics. Coverage aligns with CEH version 11, including material to test your knowledge of reconnaissance and scanning, cloud, tablet, and mobile and wireless security and attacks, the latest vulnerabilities, and the new emphasis on Internet of Things (IoT). The exams are designed to familiarize CEH candidates with the test format, allowing them to become more comfortable apply their knowledge and skills in a high-pressure test setting. The ideal companion for the Sybex CEH v11 Study Guide, this book is an invaluable tool for anyone aspiring to this highly-regarded certification. Offered by the International Council of Electronic Commerce Consultants, the Certified Ethical Hacker certification is unique in the penetration testing sphere, and requires preparation specific to the CEH exam more than general IT security knowledge. This book of practice tests help you steer your study where it needs to go by giving you a glimpse of exam day while there's still time to prepare. Practice all seven sections of the CEH v11 exam Test your knowledge of security, tools, procedures, and regulations Gauge your understanding of vulnerabilities and threats Master the material well in advance of exam day By getting inside the mind of an attacker, you gain a one-of-a-kind perspective that dramatically boosts your marketability and advancement potential. If you're ready to attempt this unique certification, the CEH: Certified Ethical Hacker Version 11 Practice Tests are the major preparation tool you should not be without.
The wave of data breaches raises two pressing questions: Why don't we defend our networks better? And, what practical incentives can we create to improve our defenses? Why Don't We Defend Better?: Data Breaches, Risk Management, and Public Policy answers those questions. It distinguishes three technical sources of data breaches corresponding to three types of vulnerabilities: software, human, and network. It discusses two risk management goals: business and consumer. The authors propose mandatory anonymous reporting of information as an essential step toward better defense, as well as a general reporting requirement. They also provide a systematic overview of data breach defense, combining technological and public policy considerations. Features Explains why data breach defense is currently often ineffective Shows how to respond to the increasing frequency of data breaches Combines the issues of technology, business and risk management, and legal liability Discusses the different issues faced by large versus small and medium-sized businesses (SMBs) Provides a practical framework in which public policy issues about data breaches can be effectively addressed
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.
The threat against the homeland continues and the private investigator plays a critical part in this effort. This includes in providing criminal, civil and background investigation, protective service, security consulting and electronic sweeps. The text will provide an overview of the role of private investigation in protection of the homeland and show how such skill can be utilized by business and government in this effort.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
The book comprises a new method of solving the integral equation of Leontovich, the most rigorous and most effective equation for the current in thin linear antennas. The book describes the features of the new method in its application in various types of antennas. It considers new ways of analyzing antennas, in particular in the calculation of an antenna gain based on main radiation patterns and the calculation of the directional characteristics of radiators with known distribution of current amplitude. The method of electrostatic analogy proposed by the author, provides the base for comparison of electromagnetic fields of high-frequency currents and electrostatic charges located on linear conductors to improve the directional characteristics of log-periodic and director-type antennas. A new approach to the analysis of the electrical characteristics of a microstrip antenna, which allows expansion of its operation range, is substantiated and developed. New results of antenna synthesis are obtained. The second part of the book is devoted to specific types of antennas (the author had a significant role in their creation). Particular attention is given to ship antennas for different frequency ranges. The book is intended for professionals, working in electrodynamics and those working on development, placement and exploitation of antennas. It will be useful for lecturers (university-level professors), teachers, students of radio engineering and researchers working in various fields of radio electronics and interested in an in-depth study of theoretical problems and designs f antennas. It can also be used for short university courses.
The American legal profession and judicial system bear a unique responsibility to set and maintain the balance between defending homeland security and protecting the civil liberties outlined in the Bill of Rights. These competing interests will continue to collide as the threats to our safety grow. Exploring the most significant terrorist cases of the past two decades, Counter Terrorism Issues: Case Studies in the Courtroom presents a panoramic view of the American judiciary's handling of domestic terrorism in the last 20 years. Drawing extensively upon trial transcripts, witness statements, and judicial opinions, the book brings the underlying events back to life and demonstrates how the criminal justice system has sought to grapple with conflicting facts and countervailing legal rights and responsibilities. The book examines some of the most notorious recent cases-the two attacks on the World Trade Center, the Oklahoma City bombing, and the Fort Hood massacre. It also looks at lesser-known but equally important incidents, including those involving animal-rights radicals who harass university researchers and corporate executives, as well as the actions of terrorist "wannabes" who threaten our security. Also discussed are attempts by victims of terrorist attacks to sue state sponsors of terrorism. Through the words of witnesses, judges, and the attorneys who tried these cases in America's courtrooms, the book provides important commentary on the related back-stories and historical/political contexts of these events, enabling readers to understand the significance of these often-infamous attacks on U.S. soil.
Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consistent despite the evolution of technology, and, ultimately, it and can be applied to any form of digital data. However, within a corporate environment, digital forensic professionals are particularly challenged. They must maintain the legal admissibility and forensic viability of digital evidence in support of a broad range of different business functions that include incident response, electronic discovery (ediscovery), and ensuring the controls and accountability of such information across networks. Digital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise provides the methodologies and strategies necessary for these key business functions to seamlessly integrate digital forensic capabilities to guarantee the admissibility and integrity of digital evidence. In many books, the focus on digital evidence is primarily in the technical, software, and investigative elements, of which there are numerous publications. What tends to get overlooked are the people and process elements within the organization. Taking a step back, the book outlines the importance of integrating and accounting for the people, process, and technology components of digital forensics. In essence, to establish a holistic paradigm-and best-practice procedure and policy approach-to defending the enterprise. This book serves as a roadmap for professionals to successfully integrate an organization's people, process, and technology with other key business functions in an enterprise's digital forensic capabilities.
Every day, millions of people are unaware of the amazing processes that take place when using their phones, connecting to broadband internet, watching television, or even the most basic action of flipping on a light switch. Advances are being continually made in not only the transmission of this data but also in the new methods of receiving it. These advancements come from many different sources and from engineers who have engaged in research, design, development, and implementation of electronic equipment used in communications systems. This volume addresses a selection of important current advancements in the electronics and communications engineering fields, focusing on signal processing, chip design, and networking technology. The sections in the book cover: Microwave and antennas Communications systems Very large-scale integration Embedded systems Intelligent control and signal processing systems |
You may like...
Energy Efficient Spectrum Resources…
Luis Miguel Borges, Norberto Barroca, …
Hardcover
R2,949
Discovery Miles 29 490
CompTIA Security+ Study Guide - Exam…
Mike Chapple, David Seidl
Paperback
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|