You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Siber Güvenlik ve Savunma Kitapları Serisi, ülkemizin bilgi ve siber güvenliği ile savunmasının gelişimine katkı sağlamak amacıyla hazırlanan açık kaynak bir kitap serisidir. Tehditlerin, saldırıların veya açıklıkların artması, boyut ve yön değiştirmesi, farklılaşması, siber tehdit ekosisteminin gittikçe güçlenmesi, kritik altyapıların daha çok hedef haline gelmesi, bilgi ve kaynak hırsızlıklarının çoğalması, yeraltı yapıların etkinleşmesi, siber tehditlerin artık savaşa dönüşmesi, siber suç ve suçlularının çoğalması, siber terörün yaygınlaşması vb. olumsuzlukların hızla artması, yapılacak mücadele, alınacak önlem ve karş...
This book considers all aspects of performability engineering, providing a holistic view of the activities associated with a product throughout its entire life cycle of the product, as well as the cost of minimizing the environmental impact at each stage, while maximizing the performance. Building on the editor's previous Handbook of Performability Engineering, it explains how performability engineering provides us with a framework to consider both dependability and sustainability in the optimal design of products, systems and services, and explores the role of performability in energy and waste minimization, raw material selection, increased production volume, and many other areas of engineering and production. The book discusses a range of new ideas, concepts, disciplines, and applications in performability, including smart manufacturing and Industry 4.0; cyber-physical systems and artificial intelligence; digital transformation of railways; and asset management. Given its broad scope, it will appeal to researchers, academics, industrial practitioners and postgraduate students involved in manufacturing, engineering, and system and product development.
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment,...
The best-selling Distributed Sensor Networks became the definitive guide to understanding this far-reaching technology. Preserving the excellence and accessibility of its predecessor, Distributed Sensor Networks, Second Edition once again provides all the fundamentals and applications in one complete, self-contained source. Ideal as a tutorial for
This book features selected papers from the 7th International Conference on Mathematics and Computing (ICMC 2021), organized by Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India, during March 2021. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry.
Here are the winners of the World Press Photo contest for each year--the most striking, compelling, and sometimes disturbing stories of that year.
Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment,...
None