Subcategories

MAC Protocols for Cyber-Physical Systems (Repost)

Posted By: AvaxGenius
MAC Protocols for Cyber-Physical Systems (Repost)

MAC Protocols for Cyber-Physical Systems by Feng Xia
English | PDF,EPUB | 2015 | 98 Pages | ISBN : 3662463601 | 6.2 MB

This book provides a literature review of various wireless MAC protocols and techniques for achieving real-time and reliable communications in the context of cyber-physical systems (CPS). The evaluation analysis of IEEE 802.15.4 for CPS therein will give insights into configuration and optimization of critical design parameters of MAC protocols. In addition, this book also presents the design and evaluation of an adaptive MAC protocol for medical CPS, which exemplifies how to facilitate real-time and reliable communications in CPS by exploiting IEEE 802.15.4 based MAC protocols. This book will be of interest to researchers, practitioners, and students to better understand the QoS requirements of CPS, especially for healthcare applications.

Warrior Workouts, Volume 1-3

Posted By: tanas.olesya
Warrior Workouts, Volume 1-3

Warrior Workouts, Volume 1-3 by Stewart Smith
ISBN: 1578267102, 1578267404, 1578267641 | 208 pages | PDF | September 20, 2018 | English | 8 Mb

Distributed Computing for Emerging Smart Networks

Posted By: AvaxGenius
Distributed Computing for Emerging Smart Networks

Distributed Computing for Emerging Smart Networks: First International Workshop, DiCES-N 2019, Hammamet, Tunisia, October 30, 2019, Revised Selected Papers by Imen Jemili
English | PDF | 2020 | 153 Pages | ISBN : 3030401308 | 12.31 MB

This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019.

Information Security Applications

Posted By: AvaxGenius
Information Security Applications

Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers by Ilsun You
English | PDF | 2020 | 387 Pages | ISBN : 303039302X | 21.02 MB

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions.

Intrusion Detection: A Data Mining Approach

Posted By: roxul
Intrusion Detection: A Data Mining Approach

Nandita Sengupta, "Intrusion Detection: A Data Mining Approach "
English | ISBN: 9811527156 | 2020 | 136 pages | PDF | 5 MB

Shaolin Chin Na Fa: Art of Seizing and Grappling. Instructor's Manual for Police Academy of Zhejiang Province

Posted By: tanas.olesya
Shaolin Chin Na Fa: Art of Seizing and Grappling. Instructor's Manual for Police Academy of Zhejiang Province

Shaolin Chin Na Fa: Art of Seizing and Grappling. Instructor's Manual for Police Academy of Zhejiang Province by Andrew Timofeevich
English | December 15, 2008 | ISBN: 1440474249 | 142 pages | PDF | 5.03 Mb

Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain (Repost)

Posted By: AvaxGenius
Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain (Repost)

Cybernetics, Warfare and Discourse: The Cybernetisation of Warfare in Britain By Anthimos Alexandros Tsirigotis
English | PDF,EPUB | 2017 | 184 Pages | ISBN : 3319508466 | 10.79 MB

This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested itself in Britain's approach to national defense and security.

Automation, Communication and Cybernetics in Science and Engineering 2015/2016 (Repost)

Posted By: AvaxGenius
Automation, Communication and Cybernetics in Science and Engineering 2015/2016 (Repost)

Automation, Communication and Cybernetics in Science and Engineering 2015/2016 by Sabina Jeschke
English/Deutsch | EPUB | 2016 | 975 Pages | ISBN : 3319426192 | 16.93 MB

This book continues the tradition of its predecessors Automation, Communication and Cybernetics in Science and Engineering 2009/2010 and 2011/2012 and includes a representative selection of scientific publications from researchers at the institute cluster IMA/ZLW & IfU.

Emerging Security Algorithms and Techniques

Posted By: tarantoga
Emerging Security Algorithms and Techniques

Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, "Emerging Security Algorithms and Techniques"
ISBN: 0815361459 | 2019 | EPUB | 330 pages | 11 MB

The Mossad: Six Landmark Missions of the Israeli Intelligence Agency, 1960-1990

Posted By: tanas.olesya
The Mossad: Six Landmark Missions of the Israeli Intelligence Agency, 1960-1990

The Mossad: Six Landmark Missions of the Israeli Intelligence Agency, 1960-1990 by Marc E. Vargo
English | December 31, 2014 | ISBN: 0786479140 | 308 pages | PDF | 1.77 Mb

Privatsphäre 4.0: Eine Neuverortung des Privaten im Zeitalter der Digitalisierung (Repost)

Posted By: AvaxGenius
Privatsphäre 4.0: Eine Neuverortung des Privaten im Zeitalter der Digitalisierung (Repost)

Privatsphäre 4.0: Eine Neuverortung des Privaten im Zeitalter der Digitalisierung by Hauke Behrendt
Deutsch | EPUB | 2019 | 244 Pages | ISBN : 3476048594 | 4.7 MB / 1.12 MB

Wie lässt sich der Bereich des Privaten heute genau beschreiben? Welchen Wert besitzt Privatheit in digitalisierten Gesellschaften für den Einzelnen und die Gesellschaft als Ganzes? Welche Werte und Lebensformen werden durch Privatheit geschützt, welche eingeschränkt? Entstehen durch die Informationsasymmetrie zwischen Technologieunternehmen, staatlichen Verdatungsinstitutionen und Verbrauchern/Bürgern möglicherweise neue Machtstrukturen? Welche rechtlichen Implikationen ergeben sich hieraus? Dieser Band geht diesen und anderen Fragen, die sich im Hinblick auf die etablierte Gleichung von Freiheit und Privatheit stellen, nach und versucht Antworten zu finden.

UnBlock the Blockchain (Repost)

Posted By: AvaxGenius
UnBlock the Blockchain (Repost)

UnBlock the Blockchain by Nitin Upadhyay
English | EPUB | 2019 | 125 Pages | ISBN : 9811501769 | 4.8 MB

This book presents a state-of-the-art overview of blockchains, a significant innovation that has already started to redesign business, social and political interactions. The technology is attracting considerable interest among researchers in industry and academia wanting to study and leverage the potential of blockchains to provide a decentralized and distributed public ledger for all the participating parties.

Verifying Nuclear Disarmament

Posted By: readerXXI
Verifying Nuclear Disarmament

Verifying Nuclear Disarmament
by Thomas Shea
English | 2019 | ISBN: 1138103888 | 241 Pages | PDF | 16 MB

Computer Safety, Reliability, and Security (Repost)

Posted By: step778
Computer Safety, Reliability, and Security (Repost)

Stefano Tonetta, Erwin Schoitsch, Friedemann Bitsch, "Computer Safety, Reliability, and Security"
2017 | pages: 488 | ISBN: 331966283X | PDF | 30,0 mb

Bug Bounty: Android Hacking (Updated)

Posted By: Sigha
Bug Bounty: Android Hacking (Updated)

Bug Bounty: Android Hacking (Updated)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 632 MB
Genre: eLearning Video | Duration: 59 lectures (2h 42m) | Language: English

Earn by hacking legally