krainaksiazek an approximation approach to network information theory 20096040

- znaleziono 18 produktów w 2 sklepach

Network Hardening, 1 - 2843499295

271,52 zł

Network Hardening, 1 Springer, Berlin

Książki / Literatura obcojęzyczna

This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering.

Sklep: Libristo.pl

Top-Down Network Design - 2840795127

269,29 zł

Top-Down Network Design CISCO

Książki / Literatura obcojęzyczna

Objectives The purpose of Top-Down Network Design, Third Edition, is to help you design networks that meet a customer's business and technical goals. Whether your customer is another department within your own company or an external client, this book provides you with tested processes and tools to help you understand traffic flow, protocol behavior, and internetworking technologies. After completing this book, you will be equipped to design enterprise networks that meet a customer's requirements for functionality, capacity, performance, availability, scalability, affordability, security, and manageability. Audience This book is for you if you are an internetworking professional responsible for designing and maintaining medium- to large-sized enterprise networks. If you are a network engineer, architect, or technician who has a working knowledge of network protocols and technologies, this book will provide you with practical advice on applying your knowledge to internetwork design. This book also includes useful information for consultants, systems engineers, and sales engineers who design corporate networks for clients. In the fast-paced presales environment of many systems engineers, it often is difficult to slow down and insist on a top-down, structured systems analysis approach. Wherever possible, this book includes shortcuts and assumptions that can be made to speed up the network design process. Finally, this book is useful for undergraduate and graduate students in computer science and information technology disciplines. Students who have taken one or two courses in networking theory will find Top-Down Network Design, Third Edition, an approachable introduction to the engineering and business issues related to developing real-world networks that solve typical business problems. Changes for the Third Edition Networks have changed in many ways since the second edition was published. Many legacy technologies have disappeared and are no longer covered in the book. In addition, modern networks have become multifaceted, providing support for numerous bandwidth-hungry applications and a variety of devices, ranging from smart phones to tablet PCs to high-end servers. Modern users expect the network to be available all the time, from any device, and to let them securely collaborate with coworkers, friends, and family. Networks today support voice, video, high-definition TV, desktop sharing, virtual meetings, online training, virtual reality, and applications that we can't even imagine that brilliant college students are busily creating in their dorm rooms. As applications rapidly change and put more demand on networks, the need to teach a systematic approach to network design is even more important than ever. With that need in mind, the third edition has been retooled to make it an ideal textbook for college students. The third edition features review questions and design scenarios at the end of each chapter to help students learn top-down network design. To address new demands on modern networks, the third edition of Top-Down Network Design also has updated material on the following topics: ' Network redundancy ' Modularity in network designs ' The Cisco SAFE security reference architecture ' The Rapid Spanning Tree Protocol (RSTP) ' Internet Protocol version 6 (IPv6) ' Ethernet scalability options, including 10-Gbps Ethernet and Metro Ethernet ' Network design and management tools

Sklep: Libristo.pl

IPSEC Virtual Private Network Fundamentals - 2835876583

251,28 zł

IPSEC Virtual Private Network Fundamentals CISCO

Książki / Literatura obcojęzyczna

An introduction to designing and configuring Cisco IPsec VPNs * Understand the basics of the IPsec protocol and learn implementation best practices * Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace * Learn how to avoid common pitfalls related to IPsec deployment * Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms. It provides the foundation necessary to understand the different components of Cisco IPsec implementation and how it can be successfully implemented in a variety of network topologies and markets (service provider, enterprise, financial, government). This book views IPsec as an emerging requirement in most major vertical markets, explaining the need for increased information authentication, confidentiality, and non-repudiation for secure transmission of confidential data. The book is written using a layered approach, starting with basic explanations of why IPsec was developed and the types of organizations relying on IPsec to secure data transmissions. It then outlines the basic IPsec/ISAKMP fundamentals that were developed to meet demand for secure data transmission. The book covers the design and implementation of IPsec VPN architectures using an array of Cisco products, starting with basic concepts and proceeding to more advanced topics including high availability solutions and public key infrastructure (PKI). Sample topology diagrams and configuration examples are provided in each chapter to reinforce the fundamentals expressed in text and to assist readers in translating concepts into practical deployment scenarios. Additionally, comprehensive case studies are incorporated throughout to map topics to real-world solutions.

Sklep: Libristo.pl

Algorithmic Aspects in Information and Management - 2826886491

390,94 zł

Algorithmic Aspects in Information and Management Springer, Berlin

Książki / Literatura obcojęzyczna

This book constitutes the refereed proceedings of the 4th International Conference on Algorithmic Aspects in Information and Management, AAIM 2008, held in Shanghai, China, in June 2008.§The 30 revised full papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 53 submissions. The papers cover original algorithmic research on immediate applications and/or fundamental problems pertinent to information management and management science. Topics addressed are: approximation algorithms, geometric data management, biological data management, graph algorithms, computational finance, mechanism design, computational game theory, network optimization, data structures, operations research, discrete optimization, online algorithms, FPT algorithms, and scheduling algorithms.

Sklep: Libristo.pl

Source Coding Theory - 2836099237

636,80 zł

Source Coding Theory Springer, Berlin

Książki / Literatura obcojęzyczna

Source coding theory has as its goal the characterization of the optimal performance achievable in idealized communication systems which must code an information source for transmission over a digital communication or storage channel for transmission to a user. The user must decode the information into a form that is a good approximation to the original. A code is optimal within some class if it achieves the best possible fidelity given whatever constraints are imposed on the code by the available channel. In theory, the primary constraint imposed on a code by the channel is its rate or resolution, the number of bits per second or per input symbol that it can transmit from sender to receiver. In the real world, complexity may be as important as rate. The origins and the basic form of much of the theory date from Shan non's classical development of noiseless source coding and source coding subject to a fidelity criterion (also called rate-distortion theory) [73] [74]. Shannon combined a probabilistic notion of information with limit theo rems from ergodic theory and a random coding technique to describe the optimal performance of systems with a constrained rate but with uncon strained complexity and delay. An alternative approach called asymptotic or high rate quantization theory based on different techniques and approx imations was introduced by Bennett at approximately the same time [4]. This approach constrained the delay but allowed the rate to grow large.

Sklep: Libristo.pl

New Trends in Nanotechnology and Fractional Calculus - 2212846389

565,60 zł

New Trends in Nanotechnology and Fractional Calculus Springer Verlag

Dla dzieci

In recent years fractional calculus has played an important role in various fields such as mechanics, electricity, chemistry, biology, economics, modeling, identification, control theory and signal processing. The scope of this book is to present the state of the art in the study of fractional systems and the application of fractional differentiation. Furthermore, the manufacture of nanowires is important for the design of nanosensors and the development of high-yield thin films is vital in procuring clean solar energy. This wide range of applications is of interest to engineers, physicists and mathematicians.Table of contentsPreface;New trends in nanotechnology: Novel Molecular Diodes Developed by Chemial Conjugation of Carbon Nanotubes with Peptide Nucleic Acid, by Krishna V. Singh, Miroslav Penchev, Xiaoye Jing, Alfredo A. Martinez-Morales, Cengiz S. Ozkan and Mihri Ozkan;Hybrid Single Walled Carbon Nanotube FETs for High Fidelity DNA Detection, by Xu Wang, Mihri Ozkan, Gurer Budak, Ziya B. Guvenc and Cengiz S. Ozkan;Towards integrated nanoelectronic and photonic devices, by Alexander Quandt, Maurizio Ferrari and Giancarlo C. Righini;New noninvasive methods for

Sklep: Albertus.pl

Machine learning - 2826693139

218,11 zł

Machine learning Books on Demand

Książki / Literatura obcojęzyczna

Source: Wikipedia. Pages: 254. Chapters: Artificial neural network, Supervised learning, Hidden Markov model, Pattern recognition, Reinforcement learning, Principal component analysis, Self-organizing map, Overfitting, Cluster analysis, Granular computing, Rough set, Mixture model, Expectation-maximization algorithm, Radial basis function network, Types of artificial neural networks, Learning to rank, Forward-backward algorithm, Perceptron, Category utility, Neural modeling fields, Dominance-based rough set approach, Principle of maximum entropy, Non-negative matrix factorization, Concept learning, K-means clustering, Structure mapping engine, Viterbi algorithm, Cross-validation, Hierarchical temporal memory, Activity recognition, Algorithmic inference, Formal concept analysis, Gradient boosting, Information bottleneck method, Nearest neighbor search, Simultaneous localization and mapping, Markov decision process, Gittins index, K-nearest neighbor algorithm, General Architecture for Text Engineering, Reasoning system, Concept drift, Uniform convergence, Conceptual clustering, Multi-armed bandit, Multilinear subspace learning, Conditional random field, DBSCAN, Feature selection, Learning with errors, Weka, Evolutionary algorithm, Iris flower data set, Binary classification, OPTICS algorithm, Partially observable Markov decision process, Constrained Conditional Models, Group method of data handling, Learning classifier system, Random forest, Statistical classification, Analogical modeling, Bregman divergence, Backpropagation, Temporal difference learning, Loss function, Curse of dimensionality, Alternating decision tree, Evolutionary multi-modal optimization, Stochastic gradient descent, Kernel principal component analysis, Explanation-based learning, K-medoids, RapidMiner, Transduction, Variable-order Markov model, Kernel adaptive filter, Classification in machine learning, Grammar induction, Sense Networks, Glivenko Cantelli theorem, Cross-entropy method, Dimension reduction, Rand index, Spiking neural network, Feature Selection Toolbox, Co-training, Multinomial logit, Computational learning theory, Local Outlier Factor, Q-learning, Gaussian process, Evolvability, Universal Robotics, Crossover, Shattering, Cluster-weighted modeling, Version space, Variable kernel density estimation, Calibration, Randomized weighted majority algorithm, Leabra, Growing self-organizing map, TD-Gammon, Prior knowledge for pattern recognition, Generative topographic map, VC dimension, ID3 algorithm, String kernel, Prefrontal Cortex Basal Ganglia Working Memory, Meta learning, Inductive transfer, Margin classifier, Active learning, Feature extraction, Regularization, IDistance, Dynamic time warping, Latent variable, Layered hidden Markov model, Empirical risk minimization, Jabberwacky, Inductive bias, Shogun, Confusion matrix, Never-Ending Language Learning, Accuracy paradox, FLAME clustering, Smart variables, Probably approximately correct learning, Hierarchical hidden Markov model, Document classification, Adjusted mutual information, Generalization error, Knowledge discovery, Quadratic classifier, Ugly duckling theorem, Bongard problem, Online machine learning, Algorithmic learning theory, Information Fuzzy Networks, Knowledge integration, Bootstrap aggregating, Early stopping, Kernel methods, Bag of words model, CIML community portal, Sequence labeling, Semi-supervised learning, Minimum redundancy feature selection, Matthews correlation coefficient, Learn...

Sklep: Libristo.pl

Random Networks for Communication - 2826921751

319,83 zł

Random Networks for Communication Cambridge University Press

Książki / Literatura obcojęzyczna

When is a random network (almost) connected? How much information can it carry? How can you find a particular destination within the network? And how do you approach these questions - and others - when the network is random? The analysis of communication networks requires a fascinating synthesis of random graph theory, stochastic geometry and percolation theory to provide models for both structure and information flow. This book is the first comprehensive introduction for graduate students and scientists to techniques and problems in the field of spatial random networks. The selection of material is driven by applications arising in engineering, and the treatment is both readable and mathematically rigorous. Though mainly concerned with information-flow-related questions motivated by wireless data networks, the models developed are also of interest in a broader context, ranging from engineering to social networks, biology, and physics.

Sklep: Libristo.pl

Managing Security with Snort & IDS Tools - 2826838217

189,41 zł

Managing Security with Snort & IDS Tools O'Reilly Media, Inc, USA

Książki / Literatura obcojęzyczna

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you? Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools. This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices. Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.

Sklep: Libristo.pl

The Telecommunications Handbook - 2826768525

880,42 zł

The Telecommunications Handbook Wiley & Sons

Książki / Literatura obcojęzyczna

This practical handbook and reference provides a complete understanding of the telecommunications field supported by descriptions and case examples throughout§Taking a practical approach, The Telecommunications Handbook examines the principles and details of all of the major and modern telecommunications systems currently available to industry and to end-users. It gives essential information about usage, architectures, functioning, planning, construction, measurements and optimisation. The structure of the book is modular, giving both overall descriptions of the architectures and functionality of typical use cases, as well as deeper and practical guidelines for telecom professionals.§The focus of the book is on current and future networks, and the most up-to-date functionalities of each network are described in sufficient detail for deployment purposes. The contents include an introduction to each technology, its evolution path, feasibility and utilization, solution and network architecture, and technical functioning of the systems (signalling, coding, different modes for channel delivery and security of core and radio system). The planning of the core and radio networks (system-specific field test measurement guidelines, hands-on network planning advices and suggestions for the parameter adjustments) and future systems are also described.§Each chapter covers aspects individually for easy reference, including approaches such as: functional blocks, protocol layers, hardware and software, planning, optimization, use cases, challenges, solutions to potential problems§Provides very practical detail on the planning and operation of networks to enable readers to apply the content in real-world deployments§Bridges the gap between the communications in the academic context and the practical knowledge and skills needed to work in the telecommunications industry§Section divisions include: General theory; Fixed telecommunications; Mobile communications; Space communications; Other and special communications; and Planning and management of telecommunication networks§Covers new commercial and enhanced systems deployed, such as IPv6 based networks, LTE-Advanced and GALILEO§An essential reference for Technical personnel at telecom operators; equipment and terminal manufacturers; Engineers working for network operators.

Sklep: Libristo.pl

Migrating to Ipv6 - 2826696291

387,76 zł

Migrating to Ipv6 BLACKWELL PUBLISHERS

Książki / Literatura obcojęzyczna

This book helps readers to understand IPv6, the protocol essential to future Internet growth. Exhaustion of address space and global routing table growth necessitate important revisions to the current version of the Internet Protocol, IPv4. IP version 6 offers greater address space and additional features to support the evolving requirements of Internet applications. Deployed alongside current IPv4 networks, IPv6 will restore the full-fledge network necessary for Internet growth. Migrating to IPv6 gives a comprehensive overview of IPv6 and related protocols, the layers below IPv6 to the application and end-user layers.Author Marc Blanchet offers a direct and clear route to understanding the topic, taking a top-down approach and ordering topics by relevance. Tried and tested practical techniques and advice on implementation, applications and deployment provide 'how-to' information on everything you need to know to put the technology to work. "Migrating to IPv6" provides a complete, up-to-date, in-depth, and accessible practical guide to IPv6. It demonstrates the theory with practical and generic examples and major implementation configurations, such as Windows, FreeBSD, Linux, Solaris, Cisco, Juniper and Hexago. It provides a comprehensive reference to key data structures and packet formats.It summarizes topics in table and graphical form to give fast access to information, including over 200 figures. It offers an accompanying website with extra coverage of specific topics, information on additional protocols and specifications, and updates on new features. This text will give network engineers, managers and operators, software engineers and IT professionals and analysts a thorough understanding of IPv6.

Sklep: Libristo.pl

Basics of Web Hacking - 2826859801

100,13 zł

Basics of Web Hacking SYNGRESS MEDIA

Książki / Literatura obcojęzyczna

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli's approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known - vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge. It provides a simple and clean approach to Web hacking, including hands-on examples and exercises that are designed to teach you how to hack the server, hack the Web app, and hack the Web user. It covers the most significant new tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more! It is written by an author who works in the field as a penetration tester and who teaches Web security classes at Dakota State University.

Sklep: Libristo.pl

Isospectral Transformations - 2844165786

538,11 zł

Isospectral Transformations Springer, Berlin

Książki / Literatura obcojęzyczna

This book presents a new approach to the analysis of networks, which emphasizes how one can compress a network while preserving all information relative to the network's spectrum. Besides these compression techniques, the authors introduce a number of other isospectral transformations and demonstrate how, together, these methods can be applied to gain new results in a number of areas. This includes the stability of time-delayed and non time-delayed dynamical networks, eigenvalue estimation, pseudospectra analysis and the estimation of survival probabilities in open dynamical systems. The theory of isospectral transformations, developed in this text, can be readily applied in any area that involves the analysis of multidimensional systems and is especially applicable to the analysis of network dynamics. This book will be of interest to Mathematicians, Physicists, Biologists, Engineers and to anyone who has an interest in the dynamics of networks.

Sklep: Libristo.pl

Usage-Based Models of Language - 2842736748

148,12 zł

Usage-Based Models of Language Centre for the Study of Language & Information

Książki / Literatura obcojęzyczna

This book brings together papers by the foremost representatives of a range of theoretical and empirical approaches converging on a common goal: to account for language use, or how speakers actually speak and understand language. Crucial to a usage-based approach are frequency, statistical patterns, and, most generally, linguistic experience. Linguistic competence is not seen as cognitively-encapsulated and divorced from performance, but as a system continually shaped, from inception, by linguistic usage events. The authors represented here were among the first to leave behind rule-based linguistic representations in favour of constraint-based systems whose structural properties actually emerge from usage. Such emergentist systems evince far greater cognitive and neurological plausibility than algorithmic, generative models. Approaches represented here include Cognitive Grammar, the Lexical Network Model, Competition Model, Relational Network Model, and accessibility Theory. The empirical data come from phonological variation, syntactic change, psycholinguistic experiments, discourse, connectionist modelling of language acquisition, and linguistic corpora.

Sklep: Libristo.pl

Essential Business Process Modeling - 2826759917

246,81 zł

Essential Business Process Modeling O´REILLY

Książki / Literatura obcojęzyczna

Ten years ago, groupware bundled with email and calendar applications helped track the flow of work from person to person within an organization. Workflow in today's enterprise means more monitoring and orchestrating massive systems. A new technology called Business Process Management, or BPM, helps software architects and developers design, code, run, administer, and monitor complex network-based business processes BPM replaces those sketchy flowchart diagrams that business analysts draw on whiteboards with a precise model that uses standard graphical and XML representations, and an architecture that allows it converse with other services, systems, and users. Sound complicated? It is. But it's downright frustrating when you have to search the Web for every little piece of information vital to the process. Essential Business Process Modeling gathers all the concepts, design, architecture, and standard specifications of BPM into one concise book, and offers hands-on examples that illustrate BPM's approach to process notation, execution, administration and monitoring. Author Mike Havey demonstrates standard ways to code rigorous processes that are centerpieces of a service-oriented architecture (SOA), which defines how networks interact so that one can perform a service for the other. His book also shows how BPM complements enterprise application integration (EAI), a method for moving from older applications to new ones, and Enterprise Service BUS for integrating different web services, messaging, and XML technologies into a single network. BPM, he says, is to this collection of services what a conductor is to musicians in an orchestra: it coordinates their actions in the performance of a larger composition. Essential Business Process Modeling teaches you how to develop examples of process-oriented applications using free tools that can be run on an average PC or laptop. You'll also learn about BPM design patterns and best practices, as well as some underlying theory. The best way to monitor processes within an enterprise is with BPM, and the best way to navigate BPM is with this valuable book.

Sklep: Libristo.pl

szukaj w Kangoo krainaksiazek an approximation approach to network information theory 20096040

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z krainaksiazek pl an approximation approach to network information theory 20096040

2. Szukaj na wszystkich stronach serwisu

t1=0.059, t2=0, t3=0, t4=0.023, t=0.06

Dla sprzedawców

copyright © 2005-2017 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER