|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
A thorough treatment of UAV wireless communications and networking
research challenges and opportunities. Detailed, step-by-step
development of carefully selected research problems that pertain to
UAV network performance analysis and optimization, physical layer
design, trajectory path planning, resource management, multiple
access, cooperative communications, standardization, control, and
security is provided. Featuring discussion of practical
applications including drone delivery systems, public safety, IoT,
virtual reality, and smart cities, this is an essential tool for
researchers, students, and engineers interested in broadening their
knowledge of the deployment and operation of communication systems
that integrate or rely on unmanned aerial vehicles.
Get to grips with the most common as well as complex Linux
networking configurations, tools, and services to enhance your
professional skills Key Features Learn how to solve critical
networking problems using real-world examples Configure common
networking services step by step in an enterprise environment
Discover how to build infrastructure with an eye toward defense
against common attacks Book DescriptionAs Linux continues to gain
prominence, there has been a rise in network services being
deployed on Linux for cost and flexibility reasons. If you are a
networking professional or an infrastructure engineer involved with
networks, extensive knowledge of Linux networking is a must. This
book will guide you in building a strong foundation of Linux
networking concepts. The book begins by covering various major
distributions, how to pick the right distro, and basic Linux
network configurations. You'll then move on to Linux network
diagnostics, setting up a Linux firewall, and using Linux as a host
for network services. You'll discover a wide range of network
services, why they're important, and how to configure them in an
enterprise environment. Finally, as you work with the example
builds in this Linux book, you'll learn to configure various
services to defend against common attacks. As you advance to the
final chapters, you'll be well on your way towards building the
underpinnings for an all-Linux datacenter. By the end of this book,
you'll be able to not only configure common Linux network services
confidently, but also use tried-and-tested methodologies for future
Linux installations. What you will learn Use Linux as a
troubleshooting and diagnostics platform Explore Linux-based
network services Configure a Linux firewall and set it up for
network services Deploy and configure Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP) services securely
Configure Linux for load balancing, authentication, and
authorization services Use Linux as a logging platform for network
monitoring Deploy and configure Intrusion Prevention Services (IPS)
Set up Honeypot solutions to detect and foil attacks Who this book
is forThis book is for IT and Windows professionals and admins
looking for guidance in managing Linux-based networks. Basic
knowledge of networking is necessary to get started with this book.
Discover how to write high-quality character driver code, interface
with userspace, work with chip memory, and gain an in-depth
understanding of working with hardware interrupts and kernel
synchronization Key Features Delve into hardware interrupt
handling, threaded IRQs, tasklets, softirqs, and understand which
to use when Explore powerful techniques to perform user-kernel
interfacing, peripheral I/O and use kernel mechanisms Work with key
kernel synchronization primitives to solve kernel concurrency
issues Book DescriptionLinux Kernel Programming Part 2 - Char
Device Drivers and Kernel Synchronization is an ideal companion
guide to the Linux Kernel Programming book. This book provides a
comprehensive introduction for those new to Linux device driver
development and will have you up and running with writing misc
class character device driver code (on the 5.4 LTS Linux kernel) in
next to no time. You'll begin by learning how to write a simple and
complete misc class character driver before interfacing your driver
with user-mode processes via procfs, sysfs, debugfs, netlink
sockets, and ioctl. You'll then find out how to work with hardware
I/O memory. The book covers working with hardware interrupts in
depth and helps you understand interrupt request (IRQ) allocation,
threaded IRQ handlers, tasklets, and softirqs. You'll also explore
the practical usage of useful kernel mechanisms, setting up delays,
timers, kernel threads, and workqueues. Finally, you'll discover
how to deal with the complexity of kernel synchronization with
locking technologies (mutexes, spinlocks, and atomic/refcount
operators), including more advanced topics such as cache effects, a
primer on lock-free techniques, deadlock avoidance (with lockdep),
and kernel lock debugging techniques. By the end of this Linux
kernel book, you'll have learned the fundamentals of writing Linux
character device driver code for real-world projects and products.
What you will learn Get to grips with the basics of the modern
Linux Device Model (LDM) Write a simple yet complete misc class
character device driver Perform user-kernel interfacing using
popular methods Understand and handle hardware interrupts
confidently Perform I/O on peripheral hardware chip memory Explore
kernel APIs to work with delays, timers, kthreads, and workqueues
Understand kernel concurrency issues Work with key kernel
synchronization primitives and discover how to detect and avoid
deadlock Who this book is forAn understanding of the topics covered
in the Linux Kernel Programming book is highly recommended to make
the most of this book. This book is for Linux programmers beginning
to find their way with device driver development. Linux device
driver developers looking to overcome frequent and common
kernel/driver development issues, as well as perform common driver
tasks such as user-kernel interfaces, performing peripheral I/O,
handling hardware interrupts, and dealing with concurrency will
benefit from this book. A basic understanding of Linux kernel
internals (and common APIs), kernel module development, and C
programming is required.
Embedded vision is the integration of "computer vision" into
machines that use algorithms to decode meaning from observed images
or video.It has a wide range of applications to machine learning,
artificial intelligence, industrial, medical, driverless cars,
drones, smart phones,aerospace, defense, agriculture, consumer,
surveillance, robotics and security.This book is an introductory
guide for anyone who is interested in designing machines that have
vision-enabled, embedded products. It covers a large number of
topics encountered in hardware architecture, software algorithms,
applications,advancements in camera, processors, and sensors in the
field of embedded vision. Features: Includes a wide range of
applications to artificialintelligence, machine learning,
industry,science, medicine, transportation, civil infrastructure,
and security Covers a large number of topics encountered in
hardwarearchitecture, software algorithms, applications,
advancements in processors andsensors.
Our coverage includes business trends analysis and industry
statistics. We also include a wireless and cellular business
glossary and a listing of industry contacts, such as industry
associations and government agencies. Next, we profile hundreds of
leading companies. Our 330 company profiles include complete
business descriptions and up to 27 executives by name and title.
You'll find a complete overview, industry analysis and market
research report in one superb, value-priced package.
Harness the capabilities of Zscaler to deliver a secure,
cloud-based, scalable web proxy and provide a zero-trust network
access solution for private enterprise application access to end
users Key Features Get up to speed with Zscaler without the need
for expensive training Implement Zscaler Internet Access (ZIA) and
Zscaler Private Access (ZPA) security solutions with real-world
deployments Find out how to choose the right options and features
to architect a customized solution with Zscaler Book
DescriptionMany organizations are moving away from on-premises
solutions to simplify administration and reduce expensive hardware
upgrades. This book uses real-world examples of deployments to help
you explore Zscaler, an information security platform that offers
cloud-based security for both web traffic and private enterprise
applications. You'll start by understanding how Zscaler was born in
the cloud, how it evolved into a mature product, and how it
continues to do so with the addition of sophisticated features that
are necessary to stay ahead in today's corporate environment. The
book then covers Zscaler Internet Access and Zscaler Private Access
architectures in detail, before moving on to show you how to map
future security requirements to ZIA features and transition your
business applications to ZPA. As you make progress, you'll get to
grips with all the essential features needed to architect a
customized security solution and support it. Finally, you'll find
out how to troubleshoot the newly implemented ZIA and ZPA solutions
and make them work efficiently for your enterprise. By the end of
this Zscaler book, you'll have developed the skills to design,
deploy, implement, and support a customized Zscaler security
solution. What you will learn Understand the need for Zscaler in
the modern enterprise Study the fundamental architecture of the
Zscaler cloud Get to grips with the essential features of ZIA and
ZPA Find out how to architect a Zscaler solution Discover best
practices for deploying and implementing Zscaler solutions
Familiarize yourself with the tasks involved in the operational
maintenance of the Zscaler solution Who this book is forThis book
is for security engineers, security architects, security managers,
and security operations specialists who may be involved in
transitioning to or from Zscaler or want to learn about deployment,
implementation, and support of a Zscaler solution. Anyone looking
to step into the ever-expanding world of zero-trust network access
using the Zscaler solution will also find this book useful.
Get ready to create distributed sensor systems and intelligent
interactive devices using the ZigBee wireless networking protocol
and Series 2 XBee radios. By the time you're halfway through this
fast-paced, hands-on guide, you'll have built a series of useful
projects, including a complete ZigBee wireless network that
delivers remotely sensed data. Radio networking is creating
revolutions in volcano monitoring, performance art, clean energy,
and consumer electronics. As you follow the examples in each
chapter, you'll learn how to tackle inspiring projects of your own.
This practical guide is ideal for inventors, hackers, crafters,
students, hobbyists, and scientists. * Investigate an assortment of
practical and intriguing project ideas * Prep your ZigBee toolbox
with an extensive shopping list of parts and programs * Create a
simple, working ZigBee network with XBee radios in less than two
hours -- for under $100 * Use the Arduino open source electronics
prototyping platform to build a series of increasingly complex
projects * Get familiar with XBee's API mode for creating sensor
networks * Build fully scalable sensing and actuation systems with
inexpensive components * Learn about power management, source
routing, and other XBee technical nuances * Make gateways that
connect with neighboring networks, including the Internet
With the internet of things (IoT), it is proven that enormous
networks can be created to interconnect objects and facilitate
daily life in a variety of domains. Research is needed to study how
these improvements can be applied in different ways, using
different technologies, and through the creation of different
applications. IoT Protocols and Applications for Improving
Industry, Environment, and Society contains the latest research on
the most important areas and challenges in the internet of things
and its intersection with technologies and tools such as artificial
intelligence, blockchain, model-driven engineering, and cloud
computing. The book covers subfields that examine smart homes,
smart towns, smart earth, and the industrial internet of things in
order to improve daily life, protect the environment, and create
safer and easier jobs. While covering a range of topics within IoT
including Industry 4.0, security, and privacy, this book is ideal
for computer scientists, engineers, practitioners, stakeholders,
researchers, academicians, and students who are interested in the
latest applications of IoT.
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Understand the constructs of the Python programming language and
use them to build data science projects Key Features Learn the
basics of developing applications with Python and deploy your first
data application Take your first steps in Python programming by
understanding and using data structures, variables, and loops Delve
into Jupyter, NumPy, Pandas, SciPy, and sklearn to explore the data
science ecosystem in Python Book DescriptionPython is the most
widely used programming language for building data science
applications. Complete with step-by-step instructions, this book
contains easy-to-follow tutorials to help you learn Python and
develop real-world data science projects. The "secret sauce" of the
book is its curated list of topics and solutions, put together
using a range of real-world projects, covering initial data
collection, data analysis, and production. This Python book starts
by taking you through the basics of programming, right from
variables and data types to classes and functions. You'll learn how
to write idiomatic code and test and debug it, and discover how you
can create packages or use the range of built-in ones. You'll also
be introduced to the extensive ecosystem of Python data science
packages, including NumPy, Pandas, scikit-learn, Altair, and
Datashader. Furthermore, you'll be able to perform data analysis,
train models, and interpret and communicate the results. Finally,
you'll get to grips with structuring and scheduling scripts using
Luigi and sharing your machine learning models with the world as a
microservice. By the end of the book, you'll have learned not only
how to implement Python in data science projects, but also how to
maintain and design them to meet high programming standards. What
you will learn Code in Python using Jupyter and VS Code Explore the
basics of coding - loops, variables, functions, and classes Deploy
continuous integration with Git, Bash, and DVC Get to grips with
Pandas, NumPy, and scikit-learn Perform data visualization with
Matplotlib, Altair, and Datashader Create a package out of your
code using poetry and test it with PyTest Make your machine
learning model accessible to anyone with the web API Who this book
is forIf you want to learn Python or data science in a fun and
engaging way, this book is for you. You'll also find this book
useful if you're a high school student, researcher, analyst, or
anyone with little or no coding experience with an interest in the
subject and courage to learn, fail, and learn from failing. A basic
understanding of how computers work will be useful.
Become well-versed with basic networking concepts such as routing,
switching, and subnetting, and prepare for the Microsoft 98-366
exam Key Features Build a strong foundation in networking concepts
Explore both the hardware and software aspects of networking
Prepare by taking mock tests with up-to-date exam questions Book
DescriptionA network is a collection of computers, servers, mobile
devices, or other computing devices connected for sharing data.
This book will help you become well versed in basic networking
concepts and prepare to pass Microsoft's MTA Networking
Fundamentals Exam 98-366. Following Microsoft's official syllabus,
the book starts by covering network infrastructures to help you
differentiate intranets, internets, and extranets, and learn about
network topologies. You'll then get up to date with common network
hardware devices such as routers and switches and the media types
used to connect them together. As you advance, the book will take
you through different protocols and services and the requirements
to follow a standardized approach to networking. You'll get to
grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The
book also shows you how to recall IP addresses through name
resolution. Finally, you'll be able to practice everything you've
learned and take the exam confidently with the help of mock tests.
By the end of this networking book, you'll have developed a strong
foundation in the essential networking concepts needed to pass Exam
98-366. What you will learnThings you will learn: Become well
versed in networking topologies and concepts Understand network
infrastructures such as intranets, extranets, and more Explore
network switches, routers, and other network hardware devices Get
to grips with different network protocols and models such as OSI
and TCP/IP Work with a variety of network services such as DHCP,
NAT, firewalls, and remote access Apply networking concepts in
different real-world scenarios Who this book is forIf you're new to
the IT industry or simply want to gain a thorough understanding of
networking, this book is for you. A basic understanding of the
Windows operating system and your network environment will be
helpful.
|
|