В мире, где каждый клик может стать угрозой, книга "Кибербезопасность: Как защитить свои данные" предлагает уникальный взгляд на защиту личной и корпоративной информации в цифровую эпоху. Исследуя глубины современных киберугроз — от вирусов и фишинга до сложных DDoS-атак — она раскрывает эволюцию угроз и их влияние на нашу повседневную жизнь. От понятия кибербезопасности до внедрения новейших тен…
Изложены подходы к построению и исследованию моделей беспроводных сетей простейшей структурной организации. Дается общее представление о методах и приемах работы в среде OMNeT++ фреймворка INET для решения этих задач. Рассмотрены примеры моделей сетей с учетом мобильности узлов сети, их способности к динамической маршрутизации, а также возможности учета энергопотребления каждым из узлов сети в зав…
В учебном пособии рассмотрены этапы проектирования и документирования подсистем СКС для малых офисов и систем умного дома. Приведены основные положения в части особенностей построения и проектирования вычислительной сети от технического задания до реализации проекта. Приведены этапы и методы расчета вычислительной сети. Приведен пример проектирования для защиты курсовой работы и курсового проекта.…
В учебном пособии рассмотрены этапы проектирования и документирования подсистем СКС для малых офисов и систем умного дома. Приведены основные положения в части особенностей построения и проектирования вычислительной сети от технического задания до реализации проекта. Приведены этапы и методы расчета вычислительной сети. Приведен пример проектирования для защиты курсовой работы и курсового проекта.…
The ultimate reference guide for network administrators Network administrators now have a single, convenient place to turn for all the information they need. Networking All-in-One For Dummies, 4th Edition is like ten books in one, covering such topics as networking basics, network security, setting up TCP/IP and connecting to the Internet, handling mobile devices, and much more. This valuable book…
IT professionals who want to move into the networking side in a corporate or enterprise setting will find the detailed content they need to get up to speed on the very latest networking technologies; plus, current networking professionals will find this a valuable and up-to-date resource. This hands-on guide is designed so that you can select, design, and implement an actual network using the tuto…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
The only guide for developers and power users on how to build PC connectivity applications for Symbian OS. This unique handbook provides all the information that is needed for the job. Fully worked examples and a do's and don'ts section provide design recommendations and expose common pitfalls giving a highly practical focus. Explains the relevant parts of the protocols that need to be used Demons…
After September 11th, the Department of Defense (DoD) undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacks Written in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and te…
Richard Harrison’s existing books are the bestsellers in the Symbian Press Portfolio. His latest book, co-written with Mark Shackman is the successor to «Symbian OS C++ for Mobile Phones» Volumes One and Two. Written in the same style as the two previous volumes, this is set to be another gem in the series. The existing material from the volumes will be combined, with explanations and example code…
Get up to speed on Symbian OS v7.0s with this new, from the source reference guide. After a brief introduction to Symbian OS fundamentals the book focuses on describing the interaction between the OS and the application, broadly following the lifecycle of an application. It describes the new features particular to v7.0s and provides conceptual and theoretical underpinnings to give the reader a tho…
Get up to speed on Symbian OS v7.0s with this new, from the source reference guide. After a brief introduction to Symbian OS fundamentals the book focuses on describing the interaction between the OS and the application, broadly following the lifecycle of an application. It describes the new features particular to v7.0s and provides conceptual and theoretical underpinnings to give the reader a tho…
Get up to speed on Symbian OS v7.0s with this new, from the source reference guide. After a brief introduction to Symbian OS fundamentals the book focuses on describing the interaction between the OS and the application, broadly following the lifecycle of an application. It describes the new features particular to v7.0s and provides conceptual and theoretical underpinnings to give the reader a tho…