Filter
(found 5806 products)
Book cover image
Learn quick and effective techniques to get up and running with building blockchain including Ethereum and Hyperledger Fabric. Key Features Understand the key concepts of decentralized applications and consensus algorithms Learn key concepts of Ethereum and Solidity programming Practical guide to get started with build efficient Blockchain applications with Ethereum ...
Blockchain Quick Start Guide: A beginner's guide to developing enterprise-grade decentralized applications
Learn quick and effective techniques to get up and running with building blockchain including Ethereum and Hyperledger Fabric. Key Features Understand the key concepts of decentralized applications and consensus algorithms Learn key concepts of Ethereum and Solidity programming Practical guide to get started with build efficient Blockchain applications with Ethereum and Hyperledger Book DescriptionBlockchain is a technology that powers the development of decentralized applications.This technology allows the construction of a network with no single control that enables participants to make contributions to and receive benefits from the network directly. This book will give you a thorough overview of blockchain and explain how a blockchain works.You will begin by going through various blockchain consensus mechanisms and cryptographic hash functions. You will then learn the fundamentals of programming in Solidity - the defacto language for developing decentralize, applications in Ethereum. After that, you will set up an Ethereum development environment and develop, package, build, and test campaign-decentralized applications.The book also shows you how to set up Hyperledger composer tools, analyze business scenarios, design business models, and write a chain code. Finally, you will get a glimpse of how blockchain is actually used in different real-world domains. By the end of this guide, you will be comfortable working with basic blockchain frameworks, and develop secure, decentralized applications in a hassle-free manner. What you will learn Understand how blockchain hashing works Write and test a smart contract using Solidity Develop and test a decentralized application Build and test your application using Hyperledger Fabric Implement business network using Hyperledger Composer Test and interact with business network applications Who this book is forThe book is for developers, analysts, or anyone looking to learn about Blockchain in a quick and easy manner.
https://magrudy-assets.storage.googleapis.com/9781789807974.jpg
31.490000 USD

Blockchain Quick Start Guide: A beginner's guide to developing enterprise-grade decentralized applications

by Weimin Sun, Xun (Brian) Wu
Paperback / softback
Book cover image
Getting Started for Internet of Things with Launch Pad and ESP8266 provides a platform to get started with the Ti launch pad and IoT modules for Internet of Things applications. The book provides the basic knowledge of Ti launch Pad and ESP8266 based customized modules with their interfacing, along with ...
Getting Started for Internet of Things with Launch Pad and ESP8266
Getting Started for Internet of Things with Launch Pad and ESP8266 provides a platform to get started with the Ti launch pad and IoT modules for Internet of Things applications. The book provides the basic knowledge of Ti launch Pad and ESP8266 based customized modules with their interfacing, along with the programming. The book discusses the application of Internet of Things in different areas. Several examples for rapid prototyping are included, this to make the readers understand the concept of IoT. The book comprises of twenty-seven chapters, which are divided into four sections and which focus on the design of various independent prototypes. Section-A gives a brief introduction to Ti launch pad (MSP430) and Internet of Things platforms like GPRS, NodeMCU and NuttyFi (ESP8266 customized board), and it shows steps to program these boards. Examples on how to interface these boards with display units, analog sensors, digital sensors and actuators are also included, this to make reader comfortable with the platforms. Section-B discusses the communication modes to relay the data like serial out, PWM and I2C. Section-C explores the IoT data loggers and shows certain steps to design and interact with the servers. Section-D includes few IoT based case studies in various fields. This book is based on the practical experience of the authors while undergoing projects with students and partners from various industries.
https://magrudy-assets.storage.googleapis.com/9788770220682.jpg
120.750000 USD

Getting Started for Internet of Things with Launch Pad and ESP8266

by Lovi Raj Gupta, Priyanka Tyagi, Bhupendra Singh, Anita Gehlot, Rajesh Singh
Hardback
Book cover image
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces ...
Security in IoT-Enabled Spaces
Security and smart spaces are among the most significant topics in IoT nowadays. The implementation of secured smart spaces is at the heart of this concept, and its development is a key issue in the next generation IoT. This book addresses major security aspects and challenges in realizing smart spaces and sensing platforms in critical Cloud and IoT applications. The book focuses on both the design and implementation aspects of security models and strategies in smart that are enabled by wireless sensor networks and RFID systems. It mainly examines seamless data access approaches and encryption and decryption aspects in reliable IoT systems.
https://magrudy-assets.storage.googleapis.com/9780367111236.jpg
127.95 USD

Security in IoT-Enabled Spaces

Hardback
Book cover image
Improve Manageability, Flexibility, Scalability, and Control with Hyperconverged Infrastructure Hyperconverged infrastructure (HCI) combines storage, compute, and networking in one unified system, managed locally or from the cloud. With HCI, you can leverage the cloud's simplicity, flexibility, and scalability without losing control or compromising your ability to scale. In Hyperconverged Infrastructure ...
Hyperconverged Infrastructure Data Centers: Demystifying HCI
Improve Manageability, Flexibility, Scalability, and Control with Hyperconverged Infrastructure Hyperconverged infrastructure (HCI) combines storage, compute, and networking in one unified system, managed locally or from the cloud. With HCI, you can leverage the cloud's simplicity, flexibility, and scalability without losing control or compromising your ability to scale. In Hyperconverged Infrastructure Data Centers, best-selling author Sam Halabi demystifies HCI technology, outlines its use cases, and compares solutions from a vendor-neutral perspective. He guides you through evaluation, planning, implementation, and management, helping you decide where HCI makes sense, and how to migrate legacy data centers without disrupting production systems. The author brings together all the HCI knowledge technical professionals and IT managers need, whether their background is in storage, compute, virtualization, switching/routing, automation, or public cloud platforms. He explores leading solutions including the Cisco HyperFlex platform, VMware vSAN, Nutanix Enterprise Cloud, Cisco Application-Centric Infrastructure (ACI), VMware's NSX, the open source OpenStack and Open vSwitch (OVS) / Open Virtual Network (OVN), and Cisco CloudCenter for multicloud management. As you explore discussions of automation, policy management, and other key HCI capabilities, you'll discover powerful new opportunities to improve control, security, agility, and performance. Understand and overcome key limits of traditional data center designs Discover improvements made possible by advances in compute, bus interconnect, virtualization, and software-defined storage Simplify rollouts, management, and integration with converged infrastructure (CI) based on the Cisco Unified Computing System (UCS) Explore HCI functionality, advanced capabilities, and benefits Evaluate key HCI applications, including DevOps, virtual desktops, ROBO, edge computing, Tier 1 enterprise applications, backup, and disaster recovery Simplify application deployment and policy setting by implementing a new model for provisioning, deployment, and management Plan, integrate, deploy, provision, manage, and optimize the Cisco HyperFlex hyperconverged infrastructure platform Assess alternatives such as VMware vSAN, Nutanix, open source OpenStack, and OVS/OVN, and compare architectural differences with HyperFlex Compare Cisco ACI (Application- Centric Infrastructure) and VMware NSX approaches to network automation, policies, and security This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
https://magrudy-assets.storage.googleapis.com/9781587145100.jpg
75.06 USD

Hyperconverged Infrastructure Data Centers: Demystifying HCI

by Sam Halabi
Paperback / softback
Book cover image
Become proficient in designing, developing and deploying effective software systems using the advanced constructs of Rust Key Features Improve your productivity using the latest version of Rust and write simpler and easier code Understand Rust's immutability and ownership principle, expressive type system, safe concurrency Deep dive into the new doamins ...
Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition
Become proficient in designing, developing and deploying effective software systems using the advanced constructs of Rust Key Features Improve your productivity using the latest version of Rust and write simpler and easier code Understand Rust's immutability and ownership principle, expressive type system, safe concurrency Deep dive into the new doamins of Rust like WebAssembly, Networking and Command line tools Book DescriptionRust is an empowering language that provides a rare combination of safety, speed, and zero-cost abstractions. Mastering Rust - Second Edition is filled with clear and simple explanations of the language features along with real-world examples, showing you how you can build robust, scalable, and reliable programs. This second edition of the book improves upon the previous one and touches on all aspects that make Rust a great language. We have included the features from latest Rust 2018 edition such as the new module system, the smarter compiler, helpful error messages, and the stable procedural macros. You'll learn how Rust can be used for systems programming, network programming, and even on the web. You'll also learn techniques such as writing memory-safe code, building idiomatic Rust libraries, writing efficient asynchronous networking code, and advanced macros. The book contains a mix of theory and hands-on tasks so you acquire the skills as well as the knowledge, and it also provides exercises to hammer the concepts in. After reading this book, you will be able to implement Rust for your enterprise projects, write better tests and documentation, design for performance, and write idiomatic Rust code. What you will learn Write generic and type-safe code by using Rust's powerful type system How memory safety works without garbage collection Know the different strategies in error handling and when to use them Learn how to use concurrency primitives such as threads and channels Use advanced macros to reduce boilerplate code Create efficient web applications with the Actix-web framework Use Diesel for type-safe database interactions in your web application Who this book is forThe book is aimed at beginner and intermediate programmers who already have familiarity with any imperative language and have only heard of Rust as a new language. If you are a developer who wants to write robust, efficient and maintainable software systems and want to become proficient with Rust, this book is for you. It starts by giving a whirlwind tour of the important concepts of Rust and covers advanced features of the language in subsequent chapters using code examples that readers will find useful to advance their knowledge.
https://magrudy-assets.storage.googleapis.com/9781789346572.jpg
52.490000 USD

Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition

by Vesa Kaihlavirta, Rahul Sharma
Paperback / softback
Book cover image
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain undetected and defeat modern infrastructures Explore red teaming techniques to exploit secured ...
Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 - the ultimate white hat hackers' toolkit, 3rd Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers Key Features Employ advanced pentesting techniques with Kali Linux to build highly secured systems Discover various stealth techniques to remain undetected and defeat modern infrastructures Explore red teaming techniques to exploit secured environment Book DescriptionThis book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters. To start with, you'll use a laboratory environment to validate tools and techniques, along with an application that supports a collaborative approach for pentesting. You'll then progress to passive reconnaissance with open source intelligence and active reconnaissance of the external and internal infrastructure. You'll also focus on how to select, use, customize, and interpret the results from different vulnerability scanners, followed by examining specific routes to the target, which include bypassing physical security and the exfiltration of data using a variety of techniques. You'll discover concepts such as social engineering, attacking wireless networks, web services, and embedded devices. Once you are confident with these topics, you'll learn the practical aspects of attacking user client systems by backdooring with fileless techniques, followed by focusing on the most vulnerable part of the network - directly attacking the end user. By the end of this book, you'll have explored approaches for carrying out advanced pentesting in tightly secured environments, understood pentesting and hacking techniques employed on embedded peripheral devices. What you will learn Configure the most effective Kali Linux tools to test infrastructure security Employ stealth to avoid detection in the infrastructure being tested Recognize when stealth attacks are being used against your infrastructure Exploit networks and data systems using wired and wireless networks as well as web services Identify and download valuable data from target systems Maintain access to compromised systems Use social engineering to compromise the weakest part of the network - the end users Who this book is forThis third edition of Mastering Kali Linux for Advanced Penetration Testing is for you if you are a security analyst, pentester, ethical hacker, IT professional, or security consultant wanting to maximize the success of your infrastructure testing using some of the advanced features of Kali Linux. Prior exposure of penetration testing and ethical hacking basics will be helpful in making the most out of this book.
https://magrudy-assets.storage.googleapis.com/9781789340563.jpg
52.490000 USD

Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 - the ultimate white hat hackers' toolkit, 3rd Edition

by Robert Beggs, Vijay Kumar Velu
Paperback / softback
Book cover image
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and ...
OSPF and IS-IS: From Link State Routing Principles to Technologies
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature.
https://magrudy-assets.storage.googleapis.com/9781138504554.jpg
92.13 USD

OSPF and IS-IS: From Link State Routing Principles to Technologies

by Rui Valadas
Hardback
Book cover image
Work through exciting recipes to administer your AWS cloud Key Features Build secure environments using AWS components and services Explore core AWS features with real-world applications and best practices Design and build Lambda functions using real-world examples Book DescriptionWith this Learning Path, you'll explore techniques to easily manage applications on ...
Implementing AWS: Design, Build, and Manage your Infrastructure: Leverage AWS features to build highly secure, fault-tolerant, and scalable cloud environments
Work through exciting recipes to administer your AWS cloud Key Features Build secure environments using AWS components and services Explore core AWS features with real-world applications and best practices Design and build Lambda functions using real-world examples Book DescriptionWith this Learning Path, you'll explore techniques to easily manage applications on the AWS cloud. You'll begin with an introduction to serverless computing, its advantages, and the fundamentals of AWS. The following chapters will guide you on how to manage multiple accounts by setting up consolidated billing, enhancing your application delivery skills, with the latest AWS services such as CodeCommit, CodeDeploy, and CodePipeline to provide continuous delivery and deployment, while also securing and monitoring your environment's workflow. It'll also add to your understanding of the services AWS Lambda provides to developers. To refine your skills further, it demonstrates how to design, write, test, monitor, and troubleshoot Lambda functions. By the end of this Learning Path, you'll be able to create a highly secure, fault-tolerant, and scalable environment for your applications. This Learning Path includes content from the following Packt products: AWS Administration: The Definitive Guide, Second Edition by Yohan Wadia AWS Administration Cookbook by Rowan Udell, Lucas Chan Mastering AWS Lambda by Yohan Wadia, Udita Gupta What you will learn Explore the benefits of serverless computing and applications Deploy apps with AWS Elastic Beanstalk and Amazon Elastic File System Secure environments with AWS CloudTrail, AWSConfig, and AWS Shield Run big data analytics with Amazon EMR and Amazon Redshift Back up and safeguard data using AWS Data Pipeline Create monitoring and alerting dashboards using CloudWatch Effectively monitor and troubleshoot serverless applications with AWS Design serverless apps via AWS Lambda, DynamoDB, and API Gateway Who this book is forThis Learning Path is specifically designed for IT system and network administrators, AWS architects, and DevOps engineers who want to effectively implement AWS in their organization and easily manage daily activities. Familiarity with Linux, web services, cloud computing platforms, virtualization, networking, and other administration-related tasks will assist in understanding the concepts in the book. Prior hands-on experience with AWS core services such as EC2, IAM, S3, and programming languages, such as Node.Js, Java, and C#, will also prove beneficial.
https://magrudy-assets.storage.googleapis.com/9781788835770.jpg
52.490000 USD

Implementing AWS: Design, Build, and Manage your Infrastructure: Leverage AWS features to build highly secure, fault-tolerant, and scalable cloud environments

by Udita Gupta, Lucas Chan, Rowan Udell, Yohan Wadia
Paperback / softback
Book cover image
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilities Key Features Master the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intruder and much more Discover the best-way to penetrate and test web ...
Hands-On Application Penetration Testing with Burp Suite: Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications
Test, fuzz, and break web applications and services using Burp Suite's powerful capabilities Key Features Master the skills to perform various types of security tests on your web applications Get hands-on experience working with components like scanner, proxy, intruder and much more Discover the best-way to penetrate and test web applications Book DescriptionBurp suite is a set of graphic tools focused towards penetration testing of web applications. Burp suite is widely used for web penetration testing by many security professionals for performing different web-level security tasks. The book starts by setting up the environment to begin an application penetration test. You will be able to configure the client and apply target whitelisting. You will also learn to setup and configure Android and IOS devices to work with Burp Suite. The book will explain how various features of Burp Suite can be used to detect various vulnerabilities as part of an application penetration test. Once detection is completed and the vulnerability is confirmed, you will be able to exploit a detected vulnerability using Burp Suite. The book will also covers advanced concepts like writing extensions and macros for Burp suite. Finally, you will discover various steps that are taken to identify the target, discover weaknesses in the authentication mechanism, and finally break the authentication implementation to gain access to the administrative console of the application. By the end of this book, you will be able to effectively perform end-to-end penetration testing with Burp Suite. What you will learn Set up Burp Suite and its configurations for an application penetration test Proxy application traffic from browsers and mobile devices to the server Discover and identify application security issues in various scenarios Exploit discovered vulnerabilities to execute commands Exploit discovered vulnerabilities to gain access to data in various datastores Write your own Burp Suite plugin and explore the Infiltrator module Write macros to automate tasks in Burp Suite Who this book is forIf you are interested in learning how to test web applications and the web part of mobile applications using Burp, then this is the book for you. It is specifically designed to meet your needs if you have basic experience in using Burp and are now aiming to become a professional Burp user.
https://magrudy-assets.storage.googleapis.com/9781788994064.jpg
47.240000 USD

Hands-On Application Penetration Testing with Burp Suite: Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

by Riyaz Ahemed Walikar, Dhruv Shah, Carlos A. Lozano
Paperback / softback
Book cover image
Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that, besides its benefits, raises specific threats to user interests. Citizens and organizations must feel safe when using ...
Network Security and Its Impact on Business Strategy
Information and communication systems are an essential component of our society, forcing us to become dependent on these infrastructures. At the same time, these systems are undergoing a convergence and interconnection process that, besides its benefits, raises specific threats to user interests. Citizens and organizations must feel safe when using cyberspace facilities in order to benefit from its advantages. Network Security and Its Impact on Business Strategy provides innovative insights into the impact of m-commerce, m-learning, and m-knowledge management technologies and the risks their usage has on different organizations, such as online stores, higher education institutions, multinational corporations, health providers, and more. Highlighting topics including cyberterrorism, smart security, and cyber ethics, this book is designed for IT and security specialists and consultants, managers and risk managers, corporations, health providers, researchers, academicians, and students.
https://magrudy-assets.storage.googleapis.com/9781522584551.jpg
236.250000 USD

Network Security and Its Impact on Business Strategy

Hardback
Book cover image
Enhance and secure your datacenter with the newest Microsoft server platform Key Features Develop necessary skills to design and implement Microsoft Server 2019 in enterprise environment Provide support to your medium to large enterprise and leverage your experience in administering Microsoft Server 2019 Effectively administering Windows server 2019 with the ...
Mastering Windows Server 2019: The complete guide for IT professionals to install and manage Windows Server 2019 and deploy new capabilities, 2nd Edition
Enhance and secure your datacenter with the newest Microsoft server platform Key Features Develop necessary skills to design and implement Microsoft Server 2019 in enterprise environment Provide support to your medium to large enterprise and leverage your experience in administering Microsoft Server 2019 Effectively administering Windows server 2019 with the help of practical examples Book DescriptionMastering Windows Server 2019 - Second Edition covers all of the essential information needed to implement and utilize this latest-and-greatest platform as the core of your data center computing needs. You will begin by installing and managing Windows Server 2019, and by clearing up common points of confusion surrounding the versions and licensing of this new product. Centralized management, monitoring, and configuration of servers is key to an efficient IT department, and you will discover multiple methods for quickly managing all of your servers from a single pane of glass. To this end, you will spend time inside Server Manager, PowerShell, and even the new Windows Admin Center, formerly known as Project Honolulu. Even though this book is focused on Windows Server 2019 LTSC, we will still discuss containers and Nano Server, which are more commonly related to the SAC channel of the server platform, for a well-rounded exposition of all aspects of using Windows Server in your environment. We also discuss the various remote access technologies available in this operating system, as well as guidelines for virtualizing your data center with Hyper-V. By the end of this book, you will have all the ammunition required to start planning for, implementing, and managing Windows. What you will learn Work with the updated Windows Server 2019 interface, including Server Core and Windows Admin Center Secure your network and data with new technologies in Windows Server 2019 Learn about containers and understand the appropriate situations to use Nano Server Discover new ways to integrate your data center with Microsoft Azure Harden your Windows Servers to help keep the bad guys out Virtualize your data center with Hyper-V Who this book is forIf you are a System Administrator or an IT professional interested in designing and deploying Windows Server 2019 then this book is for you. Previous experience of Windows Server operating systems and familiarity with networking concepts is required.
https://magrudy-assets.storage.googleapis.com/9781789804539.jpg
62.990000 USD

Mastering Windows Server 2019: The complete guide for IT professionals to install and manage Windows Server 2019 and deploy new capabilities, 2nd Edition

by Jordan Krause
Paperback / softback
Book cover image
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book DescriptionThe overall world wide web is divided into ...
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it
Understanding the concept Dark Web and Dark Net to utilize it for effective cybersecurity Key Features Understand the concept of Dark Net and Deep Web Use Tor to extract data and maintain anonymity Develop a security framework using Deep web evidences Book DescriptionThe overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis What you will learn Access the Deep Web and the Dark Web Learn to search and find information in the Dark Web Protect yourself while browsing the Dark Web Understand what the Deep Web and Dark Web are Learn what information you can gather, and how Who this book is forThis book is targeted towards security professionals, security analyst, or any stakeholder interested in learning the concept of deep web and dark net. No prior knowledge on Deep Web and Dark Net is required
https://magrudy-assets.storage.googleapis.com/9781789133363.jpg
31.490000 USD

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

by Sion Retzkin
Paperback / softback
Book cover image
Gather detailed statistics and deploy impressive business solutions with Zabbix 4.0 Key Features Experience the full impact of Zabbix 4.0, a useful and increasingly popular tool Enhance your network's performance and manage hosts and systems A step-by-step guide to smarter network monitoring Book DescriptionZabbix 4 Network Monitoring is the perfect ...
Zabbix 4 Network Monitoring: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0, 3rd Edition
Gather detailed statistics and deploy impressive business solutions with Zabbix 4.0 Key Features Experience the full impact of Zabbix 4.0, a useful and increasingly popular tool Enhance your network's performance and manage hosts and systems A step-by-step guide to smarter network monitoring Book DescriptionZabbix 4 Network Monitoring is the perfect starting point for monitoring the performance of your network devices and applications with Zabbix. Even if you've never used a monitoring solution before, this book will get you up and running quickly. You'll learn to monitor more sophisticated operations with ease and soon feel in complete control of your network, ready to meet any challenges you might face. Starting with the installation, you will discover the new features in Zabbix 4.0. You will then get to grips with native Zabbix agents and Simple Network Management Protocol (SNMP) devices. You will also explore Zabbix's integrated functionality for monitoring Java application servers and VMware. This book also covers notifications, permission management, system maintenance, and troubleshooting, so you can be confident that every potential challenge and task is under your control. If you're working with larger environments, you'll also be able to find out more about distributed data collection using Zabbix proxies. Once you're confident and ready to put these concepts into practice, you will understand how to optimize and improve performance. Troubleshooting network issues is vital for anyone working with Zabbix, so the book also helps you work through any technical snags and glitches you might face. By the end of this book, you will have learned more advanced techniques to fine-tune your system and make sure it is in a healthy state. What you will learn Install Zabbix server and an agent from source Manage hosts, users, and permissions while acting upon monitored conditions Visualize data with the help of ad hoc graphs, custom graphs, and maps Simplify complex configurations and learn to automate them Monitor everything from web pages to IPMI devices and Java applications to VMware stats Configure Zabbix to send alerts including problem severity and time periods Troubleshoot any network issue Who this book is forIf you're new to Zabbix look no further than this book. Zabbix 4 Network Monitoring is for system and network administrators who are looking to put their knowledge to work with Zabbix 4.0.
https://magrudy-assets.storage.googleapis.com/9781789340266.jpg
52.490000 USD

Zabbix 4 Network Monitoring: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0, 3rd Edition

by Rihards Olups, Patrik Uytterhoeven
Paperback / softback
Book cover image
The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet ...
Next-Generation Wireless Networks Meet Advanced Machine Learning Applications
The ever-evolving wireless technology industry is demanding new technologies and standards to ensure a higher quality of experience for global end-users. This developing challenge has enabled researchers to identify the present trend of machine learning as a possible solution, but will it meet business velocity demand? Next-Generation Wireless Networks Meet Advanced Machine Learning Applications is a pivotal reference source that provides emerging trends and insights into various technologies of next-generation wireless networks to enable the dynamic optimization of system configuration and applications within the fields of wireless networks, broadband networks, and wireless communication. Featuring coverage on a broad range of topics such as machine learning, hybrid network environments, wireless communications, and the internet of things; this publication is ideally designed for industry experts, researchers, students, academicians, and practitioners seeking current research on various technologies of next-generation wireless networks.
https://magrudy-assets.storage.googleapis.com/9781522574583.jpg
204.750000 USD

Next-Generation Wireless Networks Meet Advanced Machine Learning Applications

Hardback
Book cover image
Formally Plunkett's InfoTech Industry Almanac, this book presents a complete analysis of the technology business, including hardware, software, networks, computers, peripherals, services and global trade. This market research tool includes our analysis of the major trends affecting the industry, from the global PC and server market, to consumer and enterprise ...
Plunkett's Computers, Hardware & Software Industry Almanac 2019
Formally Plunkett's InfoTech Industry Almanac, this book presents a complete analysis of the technology business, including hardware, software, networks, computers, peripherals, services and global trade. This market research tool includes our analysis of the major trends affecting the industry, from the global PC and server market, to consumer and enterprise software, to super computers, open systems such as Linux, web services and network equipment. In addition, we provide major statistical tables covering the industry, from computer sector revenues, to broadband subscribers, to semiconductor industry production. No other source provides this book's easy-to-understand comparisons of growth, expenditures, technologies, imports/exports, corporations, research and other vital subjects. You get our in-depth profiles on the top 500 global InfoTech companies-objective analysis of the largest and most exciting companies in: Computer Hardware, Computer Software, Internet Services, E-Commerce, Networking, Semiconductors, Memory, Storage, Information Management and Data Processing. Our research effort includes an exhaustive study of new technologies and discussions with experts at dozens of innovative tech companies. You'll find a complete overview, industry analysis and market research report in one superb, value-priced package.
https://magrudy-assets.storage.googleapis.com/9781628314847.jpg
398.990000 USD

Plunkett's Computers, Hardware & Software Industry Almanac 2019

by Jack W. Plunkett
Paperback / softback
Book cover image
Leverage the features and libraries of Python to administrate your environment efficiently. Key Features Learn how to solve problems of system administrators and automate routine activities Learn to handle regular expressions, network administration Building GUI, web-scraping and database administration including data analytics Book DescriptionPython has evolved over time and extended ...
Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python
Leverage the features and libraries of Python to administrate your environment efficiently. Key Features Learn how to solve problems of system administrators and automate routine activities Learn to handle regular expressions, network administration Building GUI, web-scraping and database administration including data analytics Book DescriptionPython has evolved over time and extended its features in relation to every possible IT operation. Python is simple to learn, yet has powerful libraries that can be used to build powerful Python scripts for solving real-world problems and automating administrators' routine activities. The objective of this book is to walk through a series of projects that will teach readers Python scripting with each project. This book will initially cover Python installation and quickly revise basic to advanced programming fundamentals. The book will then focus on the development process as a whole, from setup to planning to building different tools. It will include IT administrators' routine activities (text processing, regular expressions, file archiving, and encryption), network administration (socket programming, email handling, the remote controlling of devices using telnet/ssh, and protocols such as SNMP/DHCP), building graphical user interface, working with websites (Apache log file processing, SOAP and REST APIs communication, and web scraping), and database administration (MySQL and similar database data administration, data analytics, and reporting). By the end of this book, you will be able to use the latest features of Python and be able to build powerful tools that will solve challenging, real-world tasks What you will learn Understand how to install Python and debug Python scripts Understand and write scripts for automating testing and routine administrative activities Understand how to write scripts for text processing, encryption, decryption, and archiving Handle files, such as pdf, excel, csv, and txt files, and generate reports Write scripts for remote network administration, including handling emails Build interactive tools using a graphical user interface Handle Apache log files, SOAP and REST APIs communication Automate database administration and perform statistical analysis Who this book is forThis book would be ideal for users with some basic understanding of Python programming and who are interested in scaling their programming skills to command line scripting and system administration. Prior knowledge of Python would be necessary.
https://magrudy-assets.storage.googleapis.com/9781789133226.jpg
47.240000 USD

Mastering Python Scripting for System Administrators: Write scripts and automate them for real-world administration tasks using Python

by Ganesh Sanjiv Naik
Paperback / softback
Book cover image
Power up your network applications with Python programming Key Features Master Python skills to develop powerful network applications Grasp the fundamentals and functionalities of SDN Design multi-threaded, event-driven architectures for echo and chat servers Book DescriptionThis Learning Path highlights major aspects of Python network programming such as writing simple networking ...
Python Network Programming: Conquer all your networking challenges with the powerful Python language
Power up your network applications with Python programming Key Features Master Python skills to develop powerful network applications Grasp the fundamentals and functionalities of SDN Design multi-threaded, event-driven architectures for echo and chat servers Book DescriptionThis Learning Path highlights major aspects of Python network programming such as writing simple networking clients, creating and deploying SDN and NFV systems, and extending your network with Mininet. You'll also learn how to automate legacy and the latest network devices. As you progress through the chapters, you'll use Python for DevOps and open source tools to test, secure, and analyze your network. Toward the end, you'll develop client-side applications, such as web API clients, email clients, SSH, and FTP, using socket programming. By the end of this Learning Path, you will have learned how to analyze a network's security vulnerabilities using advanced network packet capture and analysis techniques. This Learning Path includes content from the following Packt products: Practical Network Automation by Abhishek Ratan Mastering Python Networking by Eric Chou Python Network Programming Cookbook, Second Edition by Pradeeban Kathiravelu, Dr. M. O. Faruque Sarker What you will learn Create socket-based networks with asynchronous models Develop client apps for web APIs, including S3 Amazon and Twitter Talk to email and remote network servers with different protocols Integrate Python with Cisco, Juniper, and Arista eAPI for automation Use Telnet and SSH connections for remote system monitoring Interact with websites via XML-RPC, SOAP, and REST APIs Build networks with Ryu, OpenDaylight, Floodlight, ONOS, and POX Configure virtual networks in different deployment environments Who this book is forIf you are a Python developer or a system administrator who wants to start network programming, this Learning Path gets you a step closer to your goal. IT professionals and DevOps engineers who are new to managing network devices or those with minimal experience looking to expand their knowledge and skills in Python will also find this Learning Path useful. Although prior knowledge of networking is not required, some experience in Python programming will be helpful for a better understanding of the concepts in the Learning Path.
https://magrudy-assets.storage.googleapis.com/9781788835466.jpg
52.490000 USD

Python Network Programming: Conquer all your networking challenges with the powerful Python language

by Pradeeban Kathiravelu, Eric Chou, Abhishek Ratan
Paperback / softback
Book cover image
Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch. You'll learn how to work with the basics, including the math, blocks, network, and transactions ...
Programming Bitcoin: Learn How to Program Bitcoin from Scratch
Dive into Bitcoin technology with this hands-on guide from one of the leading teachers on Bitcoin and Bitcoin programming. Author Jimmy Song shows Python programmers and developers how to program a Bitcoin library from scratch. You'll learn how to work with the basics, including the math, blocks, network, and transactions behind this popular cryptocurrency and its blockchain payment system. By the end of the book, you'll understand how this cryptocurrency works under the hood by coding all the components necessary for a Bitcoin library. Learn how to create transactions, get the data you need from peers, and send transactions over the network. Whether you're exploring Bitcoin applications for your company or considering a new career path, this practical book will get you started. Parse, validate, and create bitcoin transactions Learn how to use the Bitcoin Script smart contract language Work with exercises in each chapter to build a Bitcoin library from scratch Understand how to secure a blockchain by verifying proof of work Program Bitcoin using Python 3 and libraries including pycoin Understand how simplified payment verification and light wallets work Work with public-key cryptography and cryptographic primitives
https://magrudy-assets.storage.googleapis.com/9781492031499.jpg
73.490000 USD

Programming Bitcoin: Learn How to Program Bitcoin from Scratch

by Jimmy Song
Paperback / softback
Book cover image
Leverage the power of Python, Ansible and other network automation tools to make your network robust and more secure Key Features Get introduced to the concept of network automation with relevant use cases Apply Continuous Integration and DevOps to improve your network performance Implement effective automation using tools such as ...
Practical Network Automation: A beginner's guide to automating and optimizing networks using Python, Ansible, and more, 2nd Edition
Leverage the power of Python, Ansible and other network automation tools to make your network robust and more secure Key Features Get introduced to the concept of network automation with relevant use cases Apply Continuous Integration and DevOps to improve your network performance Implement effective automation using tools such as Python, Ansible, and more Book DescriptionNetwork automation is the use of IT controls to supervise and carry out everyday network management functions. It plays a key role in network virtualization technologies and network functions. The book starts by providing an introduction to network automation, and its applications, which include integrating DevOps tools to automate the network efficiently. It then guides you through different network automation tasks and covers various data digging and performing tasks such as ensuring golden state configurations using templates, interface parsing. This book also focuses on Intelligent Operations using Artificial Intelligence and troubleshooting using chatbots and voice commands. The book then moves on to the use of Python and the management of SSH keys for machine-to-machine (M2M) communication, all followed by practical use cases. The book also covers the importance of Ansible for network automation, including best practices in automation; ways to test automated networks using tools such as Puppet, SaltStack, and Chef; and other important techniques. Through practical use-cases and examples, this book will acquaint you with the various aspects of network automation. It will give you the solid foundation you need to automate your own network without any hassle. What you will learn Get started with the fundamental concepts of network automation Perform intelligent data mining and remediation based on triggers Understand how AIOps works in operations Trigger automation through data factors Improve your data center's robustness and security through data digging Get access infrastructure through API Framework for chatbot and voice interactive troubleshootings Set up communication with SSH-based devices using Netmiko Who this book is forIf you are a network engineer or a DevOps professional looking for an extensive guide to help you automate and manage your network efficiently, then this book is for you. No prior experience with network automation is required to get started, however you will need some exposure to Python programming to get the most out of this book.
https://magrudy-assets.storage.googleapis.com/9781789955651.jpg
41.990000 USD

Practical Network Automation: A beginner's guide to automating and optimizing networks using Python, Ansible, and more, 2nd Edition

by Abhishek Ratan
Paperback / softback
Book cover image
The lack of clear communication, especially internationally, plagues the modern world in a variety of fields. Researchers and practitioners within the modern networking and communication industries strive to discover new and innovative ways for humans to better contact one another. Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking provides ...
Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking
The lack of clear communication, especially internationally, plagues the modern world in a variety of fields. Researchers and practitioners within the modern networking and communication industries strive to discover new and innovative ways for humans to better contact one another. Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking provides emerging research exploring the theoretical and practical aspects of network management and security, as well as applications within computer science, mobile and wireless computing, and multimedia technology. Featuring coverage on a broad range of topics such as coding theory, mobile devices, and contextual advertising, this book is ideal for students, researchers, social media marketers, brand managers, networking professionals, and engineers seeking current research on cross-disciplinary applications of electrical engineering, computer science, and information technology.
https://magrudy-assets.storage.googleapis.com/9781522581888.jpg
204.750000 USD

Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking

Hardback
Book cover image
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data infrastructure (SDI), container as well as serverless along with infrastructure as a Service (IaaS), IT as a Service (ITaaS) along with related ...
Data Infrastructure Management: Insights and Strategies
This book looks at various application and data demand drivers, along with data infrastructure options from legacy on premise, public cloud, hybrid, software-defined data center (SDDC), software data infrastructure (SDI), container as well as serverless along with infrastructure as a Service (IaaS), IT as a Service (ITaaS) along with related technology, trends, tools, techniques and strategies. Filled with example scenarios, tips and strategy considerations, the book covers frequently asked questions and answers to aid strategy as well as decision-making.
https://magrudy-assets.storage.googleapis.com/9781138486423.jpg
80.18 USD

Data Infrastructure Management: Insights and Strategies

by Greg Schulz
Paperback / softback
Book cover image
Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book DescriptionKali NetHunter ...
Hands-On Penetration Testing with Kali NetHunter: Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
Convert Android to a powerful pentesting platform. Key Features Get up and running with Kali Linux NetHunter Connect your Android device and gain full control over Windows, OSX, or Linux devices Crack Wi-Fi passwords and gain access to devices connected over the same network collecting intellectual data Book DescriptionKali NetHunter is a version of the popular and powerful Kali Linux pentesting platform, designed to be installed on mobile devices. Hands-On Penetration Testing with Kali NetHunter will teach you the components of NetHunter and how to install the software. You'll also learn about the different tools included and how to optimize and use a package, obtain desired results, perform tests, and make your environment more secure. Starting with an introduction to Kali NetHunter, you will delve into different phases of the pentesting process. This book will show you how to build your penetration testing environment and set up your lab. You will gain insight into gathering intellectual data, exploiting vulnerable areas, and gaining control over target systems. As you progress through the book, you will explore the NetHunter tools available for exploiting wired and wireless devices. You will work through new ways to deploy existing tools designed to reduce the chances of detection. In the concluding chapters, you will discover tips and best practices for integrating security hardening into your Android ecosystem. By the end of this book, you will have learned to successfully use a mobile penetration testing device based on Kali NetHunter and Android to accomplish the same tasks you would traditionally, but in a smaller and more mobile form factor. What you will learn Choose and configure a hardware device to use Kali NetHunter Use various tools during pentests Understand NetHunter suite components Discover tips to effectively use a compact mobile platform Create your own Kali NetHunter-enabled device and configure it for optimal results Learn to scan and gather information from a target Explore hardware adapters for testing and auditing wireless networks and Bluetooth devices Who this book is forHands-On Penetration Testing with Kali NetHunter is for pentesters, ethical hackers, and security professionals who want to learn to use Kali NetHunter for complete mobile penetration testing and are interested in venturing into the mobile domain. Some prior understanding of networking assessment and Kali Linux will be helpful.
https://magrudy-assets.storage.googleapis.com/9781788995177.jpg
41.990000 USD

Hands-On Penetration Testing with Kali NetHunter: Spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go

by Sean Philip Oriyano, Glen D. Singh
Paperback / softback
Book cover image
This fully updated study guide delivers 100% coverage of every topic on the 2018 CompTIA IT Fundamentals+ exam Take the CompTIA IT Fundamentals+ exam with complete confidence using this effective self-study system. Written by three CompTIA certification and training experts, this authoritative guide explains foundational computer technologies in full detail. ...
CompTIA IT Fundamentals+ All-in-One Exam Guide, Second Edition (Exam FC0-U61)
This fully updated study guide delivers 100% coverage of every topic on the 2018 CompTIA IT Fundamentals+ exam Take the CompTIA IT Fundamentals+ exam with complete confidence using this effective self-study system. Written by three CompTIA certification and training experts, this authoritative guide explains foundational computer technologies in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations throughout. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam topics, including: - Computer basics- System hardware- I/O ports and peripherals- Data storage and sharing- PC setup and configuration- Understanding operating systems- Working with applications and files- Setting up and configuring a mobile device- Connecting to networks and the Internet- Handling local and online security threats- Computer maintenance and management- Troubleshooting and problem solving- Understanding databases- Software development and implementation Online content includes: - 130 practice exam questions in a customizable test engine- Link to over an hour of free video training from Mike Meyers
https://magrudy-assets.storage.googleapis.com/9781260441871.jpg
52.500000 USD

CompTIA IT Fundamentals+ All-in-One Exam Guide, Second Edition (Exam FC0-U61)

by Daniel Lachance, Scott Jernigan, Mike Meyers
Paperback / softback
Book cover image
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation. Key Features A step-by-step guide to give you a clear understanding of the Network+ Certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-007 ...
CompTIA Network+ Certification Guide: The ultimate guide to passing the N10-007 exam
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation. Key Features A step-by-step guide to give you a clear understanding of the Network+ Certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-007 exam with the help of practice tests Book DescriptionCompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to efficiently passing and achieving this certification. Learn from industry experts and implement their practices to resolve complex IT issues. This book revolves around networking concepts where readers will learn topics like network architecture, security, network monitoring, and troubleshooting. This book will not only prepare the readers conceptually but will also help them pass the N10-007 exam. This guide will also provide practice exercise after every chapter where readers can ensure their concepts are clear. By the end of this book, readers will leverage this guide and the included practice questions to boost their confidence in appearing for the actual certificate. What you will learn Explain the purpose of a variety of networking concepts and implement them appropriately Understand physical security and common attacks while securing wired and wireless networks Understand the fundamentals of IPv4 and IPv6 Determine and explain the appropriate cabling, device, and storage technologies Understand network troubleshooting methodology and appropriate tools to support connectivity and performance Use best practices to manage the network, determine policies, and ensure business continuity Who this book is forThis book is ideal for readers wanting to pass the CompTIA Network+ certificate. Rookie network engineers and system administrators interested in enhancing their networking skills would also benefit from this book. No Prior knowledge on networking would be needed.
https://magrudy-assets.storage.googleapis.com/9781789340501.jpg
41.990000 USD

CompTIA Network+ Certification Guide: The ultimate guide to passing the N10-007 exam

by Rishi Latchmepersad, Glen D. Singh
Paperback / softback
Book cover image
A practical, example-driven guide to configuring even the most advanced features of pfSense 2.x Key Features Build a high-availability fault-tolerant security system with pfSense 2.x Leverage the latest version of pfSense to secure your cloud environment A recipe-based guide that will help you enhance your on-premise and cloud security principles ...
pfSense 2.x Cookbook: Manage and maintain your network using pfSense, 2nd Edition
A practical, example-driven guide to configuring even the most advanced features of pfSense 2.x Key Features Build a high-availability fault-tolerant security system with pfSense 2.x Leverage the latest version of pfSense to secure your cloud environment A recipe-based guide that will help you enhance your on-premise and cloud security principles Book DescriptionpfSense is an open source distribution of the FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important compared to other offerings. pfSense 2.x Cookbook - Second Edition starts by providing you with an understanding of how to complete the basic steps needed to render a pfSense firewall operational. It starts by showing you how to set up different forms of NAT entries and firewall rules and use aliases and scheduling in firewall rules. Moving on, you will learn how to implement a captive portal set up in different ways (no authentication, user manager authentication, and RADIUS authentication), as well as NTP and SNMP configuration. You will then learn how to set up a VPN tunnel with pfSense. The book then focuses on setting up traffic shaping with pfSense, using either the built-in traffic shaping wizard, custom floating rules, or Snort. Toward the end, you will set up multiple WAN interfaces, load balancing and failover groups, and a CARP failover group. You will also learn how to bridge interfaces, add static routing entries, and use dynamic routing protocols via third-party packages. What you will learn Configure the essential pfSense services (namely, DHCP, DNS, and DDNS) Create aliases, firewall rules, NAT port-forward rules, and rule schedules Create multiple WAN interfaces in load-balanced or failover configurations Configure firewall redundancy with a CARP firewall failover Configure backup/restoration and automatic configuration-file backup Configure some services and perform diagnostics with command-line utilities Who this book is forThis book is intended for all levels of network administrators. If you are an advanced user of pfSense, then you can flip to a particular recipe and quickly accomplish the task at hand; if you are new to pfSense, on the other hand, you can work through the book chapter by chapter and learn all of the features of the system from the ground up.
https://magrudy-assets.storage.googleapis.com/9781789806427.jpg
47.240000 USD

pfSense 2.x Cookbook: Manage and maintain your network using pfSense, 2nd Edition

by David Zientara
Paperback / softback
Book cover image
This book introduces electrical machine modeling and control for electrical engineering and science to graduate, undergraduate students as well as researchers, who are working on modeling and control of electrical machines. It targets electrical engineering students who have no time to derive mathematical equations for electrical machines in particular induction ...
Modeling and Control of AC Machine using MATLAB (R)/SIMULINK
This book introduces electrical machine modeling and control for electrical engineering and science to graduate, undergraduate students as well as researchers, who are working on modeling and control of electrical machines. It targets electrical engineering students who have no time to derive mathematical equations for electrical machines in particular induction machine (IM) and doubly fed induction machines (DFIM). The main focus is on the application of field oriented control technique to induction motor (IM) and doubly fed induction motor (DFIM) in details, and since the induction motors have many drawback using this technique, therefore the application of a nonlinear control technique (feedback linearization) is applied to a reduced order model of DFIM to enhance the performance of doubly fed induction motor. Features Serves as text book for electrical motor modeling, simulation and control; especially modeling of induction motor and doubly fed induction motor using different frame of references. Vector control (field oriented control) is given in more detailed, and is applied to induction motor. A nonlinear controller is applied to a reduced model of an doubly induction motor associated with a linear observer to estimate the unmeasured load torque, which is used to enhance the performance of the vector control to doubly fed induction motor. Access to the full MATLAB/SIMULINK blocks for simulation and control.
https://magrudy-assets.storage.googleapis.com/9780367023027.jpg
92.14 USD

Modeling and Control of AC Machine using MATLAB (R)/SIMULINK

by Mourad Boufadene
Hardback
Book cover image
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents ...
Software-Defined Networking and Security: From Theory to Practice
This book provides readers insights into cyber maneuvering or adaptive and intelligent cyber defense. It describes the required models and security supporting functions that enable the analysis of potential threats, detection of attacks, and implementation of countermeasures while expending attacker resources and preserving user experience. This book not only presents significant education-oriented content, but uses advanced content to reveal a blueprint for helping network security professionals design and implement a secure Software-Defined Infrastructure (SDI) for cloud networking environments. These solutions are a less intrusive alternative to security countermeasures taken at the host level and offer centralized control of the distributed network. The concepts, techniques, and strategies discussed in this book are ideal for students, educators, and security practitioners looking for a clear and concise text to avant-garde cyber security installations or simply to use as a reference. Hand-on labs and lecture slides are located at http://virtualnetworksecurity.thothlab.com/. Features Discusses virtual network security concepts Considers proactive security using moving target defense Reviews attack representation models based on attack graphs and attack trees Examines service function chaining in virtual networks with security considerations Recognizes machine learning and AI in network security
https://magrudy-assets.storage.googleapis.com/9780815381143.jpg
163.80 USD

Software-Defined Networking and Security: From Theory to Practice

by Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang
Hardback
Book cover image
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors ...
Mobile Apps Engineering: Design, Development, Security, and Testing
The objective of this edited book is to gather best practices in the development and management of mobile apps projects. Mobile Apps Engineering aims to provide software engineering lecturers, students and researchers of mobile computing a starting point for developing successful mobile apps. To achieve these objectives, the book's contributors emphasize the essential concepts of the field, such as apps design, testing and security, with the intention of offering a compact, self-contained book which shall stimulate further research interest in the topic. The editors hope and believe that their efforts in bringing this book together can make mobile apps engineering an independent discipline inspired by traditional software engineering, but taking into account the new challenges posed by mobile computing.
https://magrudy-assets.storage.googleapis.com/9781138054356.jpg
131.39 USD

Mobile Apps Engineering: Design, Development, Security, and Testing

Hardback
Book cover image
With a mixture of theory, examples, and well-integrated figures, Embedded Software for the IoT helps the reader understand the details in the technologies behind the devices used in the Internet of Things. It provides an overview of IoT, parameters of designing an embedded system, and good practice concerning code, version ...
Embedded Software for the IoT
With a mixture of theory, examples, and well-integrated figures, Embedded Software for the IoT helps the reader understand the details in the technologies behind the devices used in the Internet of Things. It provides an overview of IoT, parameters of designing an embedded system, and good practice concerning code, version control and defect-tracking needed to build and maintain a connected embedded system. After presenting a discussion on the history of the internet and the word wide web the book introduces modern CPUs and operating systems. The author then delves into an in-depth view of core IoT domains including: Wired and wireless networking Digital filters Security in embedded and networked systems Statistical Process Control for Industry 4.0 This book will benefit software developers moving into the embedded realm as well as developers already working with embedded systems.
https://magrudy-assets.storage.googleapis.com/9781547417155.jpg
46.92 USD

Embedded Software for the IoT

by Klaus Elk
Paperback / softback
Book cover image
The 5G Myth explains why the vision of 5G, the next generation in mobile telephony, heralded as a huge advance in global connectivity, is flawed and sets out a better vision for a connected future. It explains why insufficient technological advances and inadequate profitability will be problems in the widespread ...
The 5g Myth: When Vision Decoupled from Reality
The 5G Myth explains why the vision of 5G, the next generation in mobile telephony, heralded as a huge advance in global connectivity, is flawed and sets out a better vision for a connected future. It explains why insufficient technological advances and inadequate profitability will be problems in the widespread implementation of 5G. The book advocates a focus on consistent connectivity everywhere rather than fast speeds in city centers. William Webb looks back at the transitions through previous generations of mobile telephony and shows what simple extrapolations of trends would predict for 5G. He discusses whether the increases in speed and capacity promised by 5G are needed; if the required technology is available; whether a sound business case can be made for the deployment; and asks why, given this, the industry appears so supportive of 5G. He then puts forth the argument in favor of consistent connectivity of around 10Mbits/s everywhere as a more compelling vision and shows how it can be delivered via a mix of 4G and Wi-Fi.
https://magrudy-assets.storage.googleapis.com/9781547417285.jpg
36.740000 USD

The 5g Myth: When Vision Decoupled from Reality

by William Webb
Paperback / softback
Page 1 of 40