Filteri
close
Tip rezultata
Svi rezultati uključeni
keyboard_arrow_down
Kategorija
Sve kategorije
keyboard_arrow_down
Opseg cena (RSD)
Prikaži sve
keyboard_arrow_down
Od
RSD
Do
RSD
Sortiraj po
keyboard_arrow_down
Objavljeno u proteklih
keyboard_arrow_down
Sajtovi uključeni u pretragu
Svi sajtovi uključeni
keyboard_arrow_down

Pratite promene cene putem maila

  • Da bi dobijali obaveštenja o promeni cene potrebno je da kliknete Prati oglas dugme koje se nalazi na dnu svakog oglasa i unesete Vašu mail adresu.
1-14 od 14 rezultata

Broj oglasa

Prikaz

format_list_bulleted
view_stream
1-14 od 14
1-14 od 14 rezultata

Prikaz

format_list_bulleted
view_stream

Režim promene aktivan!

Upravo ste u režimu promene sačuvane pretrage za frazu .
Možete da promenite frazu ili filtere i sačuvate trenutno stanje

Aktivni filteri

  • Tag

    Internet

Usavršite ASP.NET sa C# Razumljivo pokrivanje web programiranja na strani servera pomoću C# .NET Pristupanje podacima pomoću ASP.NET i ADO.NET Izgradnja moćnih C# web aplikacija, uključujući XML web servise Oslobodite moć distribuiranog razvoja aplikacija pomoću nove platforme spremne za web Knjiga obuhvata Upotrebu unutrašnjih ASP.NET objekata Upošljavanje ASP.NET Server kontrola Upotrebu HTML kontrola Snimanje podataka stanja pomoću kolačića Predavanje (uploading) fajlova Slanje e-mail poruka Dobijanje i prikazivanje podataka iz baza podataka Izgradnju User i Composite kontrola Izgradnju Custom kontrola Upravljanje sa više ASP.NET konfiguracionih fajlova Izgradnju procedura za obradu posebnih konfiguracionih odeljaka Kreiranje web servisa Upotrebu web servisa iz web formi, Windows formi i COM aplikacija Izvođenje transformacija pomoću XSLT i HTML O autoru: A. Russell Jones, Ph.D., priznati bivši čuvar u zoološkom vrtu i profesionalni muzičar, sada komponuje računarske aplikacije. On je izvršni urednik za DevX.com, vodećeg web sajta za profesionalne razvojne programere. Redovno piše članke i autor je Sybexovih izdanja “Mastering ASP.NET with VB.NET”, “Mastering Active Server Pages 3” i “Visual Basic Developer’s Guide to ASP and IIS”. Efektivan rad sa svim vrstama podataka Izgradnja User, Composite i Custom kontrola Upoznavanje sa zagonetnim izazovima konfigurisanja i stanja ASP.NET-a Kreiranje i upotreba web servisa pomoću SOAP i XML Sadržaj Uvod Deo 1: Osnovno Web programiranje Poglavlje 1. Iza scene:Kako rade web aplikacije Poglavlje 2. HTML osnove Poglavlje 3. Kratak vodič za dinamičke web aplikacije Deo 2: Web programiranje na strani servera pomoću Visual C# Poglavlje 4. Uvod u ASP.NET Poglavlje 5. Uvod u web forme Poglavlje 6. Uvod u imenski prostor System.Web Poglavlje 7. Objekat SessionState Poglvalje 8. Objekat HttpServerUtility Poglavlje 9. Debagovanje ASP.NET i obrada grešaka Poglavlje 10. Pristupanje fajlovima i beležnici događaja pomoću ASP.NET Poglavlje 11. Slanje i primanje poruka pomoću ASP.NET Deo 3: Pristup podacima pomoću ASP.NET Poglavlje 12. Uvod u relacione baze podataka i SQL Poglavlje 13. Uvod u ADO.NET Poglavlje 14. Pristupanje podacima Poglavlje 15. Upotreba XML u web aplikacijama Deo 4: C# web aplikacije Poglavlje 16. Uvod u C# web aplikacije Poglavlje 17. Održavanje stanja i keširanje Poglavlje 18. Kontrolisanje pristupa i nadgledanje Poglavlje 19. Planiranje aplikacija Deo 5: Napredne Visual C# web aplikacije Poglavlje 20. Unapređivanje klijent web pretraživača Poglavlje 21. Web servisi Poglavlje 22. Web servisi, COM komponente i SOAP Toolkit Poglavlje 23. Izgrađivanje vlastitih web kontrola Poglavlje 24. Efikasnost i skalabilnost Pogovor Deo 6: Dodaci Dodatak A. Brze HTML reference Dodatak B. Script 5.5 reference Indeks

Prikaži sve...
forward
Detaljnije

Želite da na svom sajtu imate više interakcije? Potreban Vam je sajt koji se ponaša kao desktop aplikacija? Knjiga Ajax - trikovi je knjiga koju ste tražili. Ajax se zasniva na postojećim tehnologijama i predstavlja skup novih, praktičnih saveta kako te tehnologije koristiti. On Vam može pomoći da promenite tradicionalni mentalitet, vezan za web strane, koji podrazumeva da u jednom trenutku postoji samo jedna strana. Vaši sajtovi i aplikacije će pomoću Ajaxa dobiti novu fleksibilnost, koju će korisnici dočekati sa zahvalnošću. Ajax kombinuje JavaScript i HTML, zajedno sa komunikacijom preko HTTP-a i XML-om. Na taj način web strane mogu da komuniciraju sa serverom bez kompletnog obnavljanja strane. Pomoću Ajaxa možete veliki deo obrade prebaciti u pretraživač, tako da ne morate vršiti razmenu informacija sa serverom, ako to nije neophodno. Ajax je postao popularan zahvaljujući Gmailu i Google Mapama, savršen je za velike projekte, a fleksibilnost koju poseduje omogućava primenu i na manjim projektima. U knjizi Ajax - trikovi ćete naučiti kako da: • Obogatite svoje HTML forme mogućnostima Ajaxa i da ih prilagodite onome što korisnici očekuju. • Istražite API koji postoji za Google Mape, Yahoo Mape i GeoURL i kasnije sve to povežete u jednu celinu. • Radite sa kolačićima u okruženju Ajaxa. • Rukujete dugmadima pretraživača za istoriju i vraćanja (History i Back). • Pravite Ajax aplikacije pomoću alata Direct Web Remoting for Java i Ruby. • Pravite aplikacije pomoću JavaScript biblioteka Prototype, Rico i script.aculo.us. • Rukujete vezama preko mreže i web servisima. Knjiga Ajax - trikovi sadrži alate koji su Vam potrebni za kreiranje sledeće generacije web aplikacija. Ona pokazuje kako da te alate uklopite na puno različitih načina. Bez obzira da li se pitate šta je Ajax ili tražite nove načine da ga primenite, ova knjiga će Vam koristiti u vremenu koje dolazi. Kratak sadržaj knjige: Predgovor ix Prilozi xi Predgovor xv 1 Osnove Ajaxa 1 2 Web forme 58 3 Provera ispravnosti podataka 126 4 Moćni trikovi za web programere 158 5 Direct Web remoting (DWR) za one koji se bave Javom 234 6 Ajax i biblioteke Prototype i Rico 260 7 Ajax i Ruby i Ruby on Rails 285 8 Uživanje sa JavaScript bibliotekom script.aculo.us 317 9 Opcije i efikasnost 334 Indeks 405

Prikaži sve...
1,590RSD
forward
forward
Detaljnije

What You Will Learn Overcome the challenges IoT data brings to analytics Understand the variety of transmission protocols for IoT along with their strengths and weaknesses Learn how data flows from the IoT device to the final data set Develop techniques to wring value from IoT data Apply geospatial analytics to IoT data Use machine learning as a predictive method on IoT data Implement best strategies to get the most from IoT analytics Master the economics of IoT analytics in order to optimize business value Book Description We start with the perplexing task of extracting value from huge amounts of barely intelligible data. The data takes a convoluted route just to be on the servers for analysis, but insights can emerge through visualization and statistical modeling techniques. You will learn to extract value from IoT big data using multiple analytic techniques. Next we review how IoT devices generate data and how the information travels over networks. You’ll get to know strategies to collect and store the data to optimize the potential for analytics, and strategies to handle data quality concerns. Cloud resources are a great match for IoT analytics, so Amazon Web Services, Microsoft Azure, and PTC ThingWorx are reviewed in detail next. Geospatial analytics is then introduced as a way to leverage location information. Combining IoT data with environmental data is also discussed as a way to enhance predictive capability. We’ll also review the economics of IoT analytics and you’ll discover ways to optimize business value. By the end of the book, you’ll know how to handle scale for both data storage and analytics, how Apache Spark can be leveraged to handle scalability, and how R and Python can be used for analytic modeling. Authors Andrew Minteer Andrew Minteer is currently the senior director, data science and research at a leading global retail company. Prior to that, he served as the director, IoT Analytics and Machine Learning at a Fortune 500 manufacturing company. He has an MBA from Indiana University with a background in statistics, software development, database design, cloud architecture, and has led analytics teams for over 10 years. He first taught himself to program on an Atari 800 computer at the age of 11 and fondly remembers the frustration of waiting through 20 minutes of beeps and static to load a 100-line program. He now thoroughly enjoys launching a 1 TB GPU-backed cloud instance in a few minutes and getting right to work. Andrew is a private pilot who looks forward to spending some time in the air sometime soon. He enjoys kayaking, camping, traveling the world, and playing around with his six-year-old son and three-year-old daughter. Table of Contents Chapter 1: Defining IoT Analytics and Challenges Chapter 2: IoT Devices and Networking Protocols Chapter 3: IoT Analytics for the Cloud Chapter 4: Creating an AWS Cloud Analytics Environment Chapter 5: Collecting All That Data - Strategies and Techniques Chapter 6: Getting to Know Your Data - Exploring IoT Data Chapter 7: Decorating Your Data - Adding External Datasets to Innovate Chapter 8: Communicating with Others - Visualization and Dashboarding Chapter 9: Applying Geospatial Analytics to IoT Data Chapter 10: Data Science for IoT Analytics Chapter 11: Strategies to Organize Data for Analytics Chapter 12: The Economics of IoT Analytics Chapter 13: Bringing It All Together

Prikaži sve...
forward
Detaljnije

U svakoj grupi ove knjige prikazane su lokacije koje su najpoznatije, najinformativnije, najbolje, najposećenije u Srbiji i Crnoj Gori, Republici Srpskoj i BIH, Hrvatskoj, Mekedoniji i Sloveniji. Date su i najlokacije na svetskom Internetu. Za svetske lokacije je najbolje znati engleski jezik. Svetsko bogatsvo će, nadamo se, uskoro imati pozitivnog uticaja na naše. Bogatsvo tema, klasifikacija, rešenja, ideja će pokrenuti naše stručnjake, entuzijaste i obrazovane mlade i stare korisnike Intreneta, da i na naše prostore donesu nešto novo, bolje i lepše. Hit knjiga – Prva knjiga na našem tržištu – Mesta na Internetu Osnovno o ediciji: Edicija U PRAKSI donosi gotova rešenja koja možete da koristite u svakodnevnom radu i životu. Osnovno o knjizi: Prva knjiga na našem tržištu posvećena osnovama pretraživanja na Internetu, hardveru i softveru za Internet, sa posebnim osvrtom na mesta koja bi svaki korisnik trebao da poseti. Knjigu sačinjava 6 osnovnih celina: Hardver za Internet Softver za Internet - Browseri Provajderi – Dobavljači Internet usluga Pretraživači Mesta na Internetu koja obavezno morate da posetite Rečnik Internet i WWW pojmova Dodatak: Spisak mesta na Internetu po abecedi Hardver za Internet je predložila poznata kompjuterska kuća Desk iz Beograda. Softver koji predlažemo najčešće se koristi u svakodnevnom životu i radu. Provajderi ili dobavljači Intrenet usluga su podeljeni po gradovima, uz navođenje osnovnih podataka u Srbiji i Crnoj Gori, Republici Srpskoj, BIH i Hrvatskoj. Pretraživači su predloženi za dobijanje opštih ili posebnih informacija u pretraživanju. Najveći deo knjige su mesta na Internetu koja morate ili treba da posetite. Mesta na Internetu su predlog i početna lokacija. Gde ćete se Vi zaustaviti, veoma je individualno. Mesta ćete posećivati svakodnevno ili povremeno. Mesta ćete preporučiti prijateljima. Mesta ćete čuvati od dece zaštitama. Mesta će Vas često upućivati na druga mesta. Nova mesta svakodnevno nastaju i zaslužuju Vašu pažnju. Dao sam i listu najposećenijih mesta po Alexi, po eutelnetu, kao i listu ovogodišnjih dobitnika Webby nagrade. Na kraju knjige je rečnik Internet i WWW termina sa kojima ćete se svakodnevno susretati u radu. Sva mesta na internetu su grupisana u veće i manje celine: Štamparije Alexa najposećeniji sajtovi Arhitektura i građevina Automobili i kamioni Banke i finansijske institucije Chat Deca i omladina Dizajn i fotografija Državne institucije Film Galerije Gradovi Humor Instituti i organizacije Internet download Internet marketing Internet trgovina Internet Web dizajn Izdavaštvo Književnost Kompjuterski časopisi Kompjuterski hardver Kompjuterski izdavači Kompjuterski softver Marketing Medicina, zdravstvo, bolnice i klinike Medicina, zdravstvo, bolnice i klinike Moda Muzej Muzika Nauka Nekretnine Neprofitne organizacije Noćni život Novine i časopisi Novinske agencije Obrazovanje Organizacije Političke partije Porodica i domaćinstvo Poslovne informacije Pozorište Pravo i advokatura Pretraživači Proizvodnja Rekreacija Religija Restorani Slikarstvo Softver za pretraživanje Sport Strip Tehnika i tehnologija Telekomunikacije Televizija i radio Transport Trgovina Turizam Usluge Video igre Vlada Webby nagrade za 2003 Zanimljivosti O autoru: Mihailo Šolajić je već 1986. godine napisao prvu knjigu za kućni računar: Amiga 128 – Priručnik za rad, koja je izašla u VI izdanja. Trenutno mu je najtraženije izdanje: Džepni kompjuterski rečnik, koji je izašao u VII izdanja. Mihailo Šolajić je vlasnik i urednik u KBČ.

Prikaži sve...
440RSD
forward
forward
Detaljnije

Flawless integration between these two wired/wireless networks will enable subscribers to not only roam worldwide, but also to solve the ever increasing demand for data/Internet services. In order to keep up with this noteworthy growth in the demand for wireless broadband, new technologies and structural architectures are needed to greatly improve system performance and network scalability while significantly reducing the cost of equipment and deployment. Dr. Rhee covers the technological development of wired/wireless internet communications in compliance with each iterative generation up to 4G systems, with emphasis on wireless security aspects. By progressing in a systematic matter, presenting the theory and practice of wired/wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile internet systems operate and how to address complex security issues. Features: Written by a top expert in information security Gives a clear understanding of wired/wireless mobile internet technologies Presents complete coverage of various cryptographic protocols and specifications needed for 3GPP: AES, KASUMI, Public-key and Elliptic curve cryptography Forecast new features and promising 4G packet-switched wireless internet technologies for voice and data communications Provides MIMO/OFDMA-based for 4G systems such as Long Term Evolution (LTE), Ultra Mobile Broadband (UMB), Mobile WiMax or Wireless Broadband (WiBro) Deals with Intrusion Detection System against worm/virus cyber attacks The book ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Access Networking, Mobile Internet Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of complex security issues.

Prikaži sve...
forward
Detaljnije

Otkrijte kako da: - Izaberete najpovoljnijeg davaoca Internet usluga - Pristupite Internetu bez gnjavaže - Šaljete i primate e-poštu - Bezbedno kupujete i plaćate preko Interneta - Posećujete prostorije za ćaskanje i šaljete trenutne poruke Sadržaj Uvod Poglavlje 1: Šta je Internet? Šta je Mreža? Poglavlje 2: Internet u kući, na poslu, u školi i u igri Poglavlje 3: Deca i Internet Poglavlje 4: Izbor Internet usluga Poglavlje 5: Na putu po Mreži Poglavlje 6: Taj divni, divlji i luckasti Web Poglavlje 7: Igle i plastovi: gde je šta na Mreži Poglavlje 8: Više kupovine uz manje šetanja Poglavlje 9: Moja prva Web strana Poglavlje 10: Stigla je pošta Poglavlje 11: Razvrstavanje, odlaganje i bacanje pošte Poglavlje 12: Širokopojasna manija Poglavlje 13: Mrežne zajednice: hajde da se družimo Poglavlje 14: Razmena trenutnih poruka: gotovo kao da ste tamo Poglavlje 15: Razgovoru nikad kraja Poglavlje 16: Skidanje datoteka sa Mreže Poglavlje 17: AOL: može li da se prevari 20 miliona korisnika? Poglavlje 18: Deset često postavljanih pitanja Poglavlje 19: Šta uraditi sa deset vrsta datoteka Poglavlje 20: Deset zanimljivih stvari koje možete raditi na Internetu Poglavlje 21: Deset saveta da ne ispadnete smešni Rečnik Spisak termina korišćenih u knjizi Indeks O autorima John Levine se bavi računarima više od 35 godina. U početku je najveći deo svog vremena posvećivao pisanju softvera, a sada uglavnom piše knjige. Diplomirao je i doktorirao u oblasti računarskih nauka na Univerzitetu Yale. Carol Baroudi se bavila održavanjem i razvojem programskih prevodilaca, pisala je softver i rukovodila njegovim razvojem. Profesionalno je posredovala pri izboru stručnjaka za visoke tehnologije. Trenutno pruža konsultantske usluge kompanijama koje uvode nove tehnologije na tržište. Margaret Levine Young je diplomirala na Yaleu i razvila se u jednog od prvih stručnjaka za mikroračunare osamdesetih godina. Učestvovala je u pisanju više od 25 računarskih knjiga o Internetu, Windowsu XP, UNIX-u, WordPerfectu i Microsoft Accessu.

Prikaži sve...
forward
Detaljnije

About This Book Set up your own wallet, buy and sell Bitcoin, and execute custom transactions on the Blockchain Leverage the power of Bitcoin to reduce transaction costs and eliminate fraud A practical step-by-step guide to break down the Bitcoin technology to ensure safe transactions Who This Book Is For If you are familiar with online banking and want to expand your finances into a resilient and transparent currency, this book is ideal for you. A basic understanding of online wallets and financial systems will be highly beneficial to unravel the mysteries of Bitcoin. What You Will Learn Set up your wallet and buy a Bitcoin in a flash while understanding the basics of addresses and transactions Acquire the knack of buying, selling, and trading Bitcoins with online marketplaces Secure and protect your Bitcoins from online theft using Brainwallets and cold storage Understand how Bitcoin’s underlying technology, the Blockchain, works with simple illustrations and explanations Configure your own Bitcoin node and execute common operations on the network Discover various aspects of mining Bitcoin and how to set up your own mining rig Dive deeper into Bitcoin and write scripts and multi-signature transactions on the network Explore the various alt-coins and get to know how to compare them and their value In Detail The financial crisis of 2008 raised attention to the need for transparency and accountability in the financial world. As banks and governments were scrambling to stay solvent while seeking a sustainable plan, a powerfully new and resilient technology emerged. Bitcoin, built on a fundamentally new technology called “The Blockchain,” offered the promise of a new financial system where transactions are sent directly between two parties without the need for central control. Bitcoin exists as an open and transparent financial system without banks, governments, or corporate support. Simply put, Bitcoin is “programmable money” that has the potential to change the world on the same scale as the Internet itself. This book arms you with immense knowledge of Bitcoin and helps you implement the technology in your money matters, enabling secure transactions. We first walk through the fundamentals of Bitcoin, illustrate how the technology works, and exemplify how to interact with this powerful and new financial technology. You will learn how to set up your online Bitcoin wallet, indulge in buying and selling of bitcoins, and manage their storage. We then get to grips with the most powerful algorithm of all times: the Blockchain, and learn how crypto-currencies can reduce the risk of fraud for e-commerce merchants and consumers. With a solid base of Blockchain, you will write and execute your own custom transactions. Most importantly, you will be able to protect and secure your Bitcoin with the help of effective solutions provided in the book. Packed with plenty of screenshots, Learning Bitcoin is a simple and painless guide to working with Bitcoin. Authors Richard Caetano Richard Caetano is an entrepreneur and software developer living in Paris, France, and was originally raised on a dairy farm in the middle of California. He discovered a strong interest in software development at an early age. Over the years, he has designed and developed systems ranging from agriculture process automation and government accounting to high-tech security, digital music, and mobile video games. In 2011, Richard found the Bitcoin whitepaper and experienced a paradigm shift. After realizing the potential of this new technology, he changed course, and since then has been evangelizing this powerful new technology to the world. He launched an early application called btcReport, which leverages good design to bring news and information to those interested in Bitcoin. Since then, he has been speaking at conferences and meetings to help spread the word about Bitcoin. In 2015, he launched Stratumn, a company focused on helping developers build transparent, easy-to-audit, and secure applications by using the blockchain, the technology that powers the Bitcoin currency. Table of Contents Chapter 1: Setting up a Wallet Chapter 2: Buying and Selling Bitcoins Chapter 3: Protecting Your Bitcoins Chapter 4: Understanding the Blockchain Chapter 5: Installing a Bitcoin Node Chapter 6: Understanding the Mining Process Chapter 7: Programming Bitcoin Chapter 8: Exploring Alternative Coins

Prikaži sve...
forward
Detaljnije

What You Will Learn Know the capabilities and limitations of the HTTP, UPnP, CoAP, MQTT, and XMPP protocols Use important communication patterns, such as the request/respond, publish/subscribe, event subscription, asynchronous messaging, and multicasting patterns Build a portable Wi-Fi signal strength sensor to give haptic feedback about signal strength to the user Measure the water flow speed and volume with liquid flow sensors and record real-time readings Secure your home with motion-activated Arduino security cameras and upload images to the cloud Implement real-time data logging of a solar panel voltage with Arduino cloud connectors Track locations with GPS and upload location data to the cloud Control infrared-enabled devices with IR remote and Arduino Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem Book Description The IoT: Building Arduino-Based Projects course will take you on a journey to become an expert in the use of IoT by developing a set of projects and finally guide you onto securing your IoT environment. The course begins with exploring the popular HTTP, UPnP, CoAP, MQTT, and XMPP protocols. In the first module Learning Internet of Things, you will learn how protocols and patterns can put limitations on network topology and how they affect the direction of communication and the use of firewalls. This module gives you a practical overview of the existing protocols, communication patterns, architectures, and security issues important to Internet of Things. The second module, Internet of Things with Arduino Blueprints provides you up to eight projects that will allow devices to communicate with each other, access information over the Internet, store and retrieve data, and interact with users―creating smart, pervasive, and always-connected environments. You can use these projects as blueprints for many other IoT projects and put them to good use. It has becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. Thus, our third module, Practical Internet of Things Security provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The aim is to showcase how the IoT is implemented in early adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Authors Peter Waher Peter Waher is the cofounder of Clayster, a company with its origin in Scandinavia but now operates in four continents. Clayster is dedicated to the development of Internet of Things applications and provides an IoT platform for rapid application development. Currently, Peter lives and works in Chile where he is the CEO of Clayster Laboratorios Chile S.A., a subsidiary of Clayster that provides development expertise to partner companies and promotes the Internet of Things technology to research institutions. Originally a mathematician, commercial pilot, and computer games developer, he has worked for 20 years with computers and device communication, including low-level development in assembler for resource-constrained devices to high-level system design and architecture. He's currently participating in various standardization efforts within IEEE, UPnP, and XSF, working on designing standards for Internet of Things. His work on smart applications for Internet of Things and the development of the IP-TV application "Energy Saving through Smart Applications" won the Urban Living Labs global showcase award in the Cultural and Societal Participation and Collaboration Tools category. Peter Waher can be found on LinkedIn at http://linkedin.com/in/peterwaher/. Pradeeka Seneviratne Pradeeka Seneviratne is a software engineer with over 10 years of experience in computer programming and systems designing. He loves programming embedded systems such as Arduino and Raspberry Pi. Pradeeka started learning about electronics when he was at primary college by reading and testing various electronic projects found in newspapers, magazines, and books. Pradeeka is currently a full-time software engineer who works with highly scalable technologies. Previously, he worked as a software engineer for several IT infrastructure and technology servicing companies, and he was also a teacher for information technology and Arduino development. He researches how to make Arduino-based unmanned aerial vehicles and Raspberry Pi-based security cameras. Continue reading Brian Russell Brian Russell is a chief engineer focused on cyber security solutions for Leidos (https://www.leidos.com/). He oversees the design and development of security solutions and the implementation of privacy and trust controls for customers, with a focus on securing Internet of Things (IoT). Brian leads efforts that include security engineering for Unmanned Aircraft Systems (UAS) and connected vehicles and development security systems, including high assurance cryptographic key management systems. He has 16 years of information security experience. He serves as chair of the Cloud Security Alliance (CSA) Internet of Things (IoT) Working Group, and as a member of the Federal Communications Commission (FCC) Technological Advisory Council (TAC) Cybersecurity Working Group. Brian also volunteers in support of the Center for Internet Security (CIS) 20 Critical Security Controls Editorial Panel and the Securing Smart Cities (SSC) Initiative (http://securingsmartcities.org/). Join the Cloud Security Alliance (CSA) IoT WG @ https://cloudsecurityalliance.org/group/internet-of-things/#_join. You can contact Brian at https://www.linkedin.com/in/brian-russell-65a4991. Drew Van Duren Drew Van Duren currently works at Leidos as a senior cryptographic and cybersecurity engineer, highlighting 15 years of support to commercial, US Department of Defense, and US Department of Transportation (USDOT) customers in their efforts to secure vital transportation and national security systems. Originally an aerospace engineer, his experience evolved into cyber-physical (transportation system) risk management, secure cryptographic communications engineering, and secure network protocol design for high assurance DoD systems. Drew has provided extensive security expertise to the Federal Aviation Administration's Unmanned Aircraft Systems (UAS) integration office and supported RTCA standards body in the development of cryptographic protections for unmanned aircraft flying in the US National Airspace System. He has additionally supported USDOT Federal Highway Administration (FHWA) and the automotive industry in threat modeling and security analysis of connected vehicle communications design, security systems, surface transportation systems, and cryptographic credentialing operations via the connected vehicle security credential management system (SCMS). Prior to his work in the transportation industry, Drew was a technical director, managing two of the largest (FIPS 140-2) cryptographic testing laboratories and frequently provided cryptographic key management and protocol expertise to various national security programs. He is a licensed pilot and flies drone systems commercially, and is also a co-founder of Responsible Robotics, LLC, which is dedicated to safe and responsible flight operations for unmanned aircraft. You can reach Drew at https://www.linkedin.com/in/drew-van-duren-33a7b54. Table of Contents Chapter 1: Preparing our IoT Projects Chapter 2: The HTTP Protocol Chapter 3: The UPnP Protocol Chapter 4: The CoAP Protocol Chapter 5: The MQTT Protocol Chapter 6: The XMPP Protocol Chapter 7: Using an IoT Service Platform Chapter 8: Creating Protocol Gateways Chapter 9: Security and Interoperability Chapter 10: Internet-Controlled PowerSwitch Chapter 11: Wi-Fi Signal Strength Reader and Haptic Feedback Chapter 12: Internet-Connected Smart Water Meter Chapter 13: Arduino Security Camera with Motion Detection Chapter 14: Solar Panel Voltage Logging with NearBus Cloud Connector and Xively Chapter 15: GPS Location Tracker with Temboo, Twilio, and Google Maps Chapter 16: Tweet-a-Light – Twitter-Enabled Electric Light Chapter 17: Controlling Infrared Devices Using IR Remote Chapter 18: A Brave New World Chapter 19: Vulnerabilities, Attacks, and Countermeasures Chapter 20: Security Engineering for IoT Development Chapter 21: The IoT Security Lifecycle Chapter 22: Cryptographic Fundamentals for IoT Security Engineering Chapter 23: Identity and Access Management Solutions for the IoT Chapter 24: Mitigating IoT Privacy Concerns Chapter 25: Setting Up a Compliance Monitoring Program for the IoT Chapter 26: Cloud Security for the IoT Chapter 27: IoT Incident Response

Prikaži sve...
forward
Detaljnije

Nastavni plan za ECDL Modul 7 - Internet i komunikacija, podeljen je na dva dela. U prvom delu, Internet, od kandidata se zahteva poznavanje Interneta i čitača Weba. Kandidat bi trebalo da razume šta je Internet i poznaje uobičajene pojmove vezane za njega; obavlja svakodnevne zadatke pregledanja Web sadržaja, uključujući podešavanje čitača Weba; traži informacije, popuni i pošalje obrazac na Webu; snimi Web stranu i datoteke preuzete s Weba, te kopira sadržaj s Weba u dokument. U drugom delu, Komunikacija, od kandidata se traži da razume koncepte elektronske pošte i da poznaje druge mogućnosti komunikacije. Kandidat treba da nauči šta je elektronska pošta i poznaje njene prednosti i nedostatke; da bude upoznat s drugim opcijama komunikacije; primenjuje pravila primerenog ophođenja na mreži i bezbednosna pravila prilikom korišćenja elektronske pošte; sastavi elektronsku poruku, proveri pravopisnu ispravnost i pošalje poruku; odgovori na poruku, prosledi je dalje, radi s prilozima i odštampa poruku; poznaje načine za povećanje produktivnosti u radu s programom za e-poštu; organizuje e-poštu i upravlja njome. Pored toga što pomaže kandidatima da se lakše pripreme za polaganje ispita za sertifikat ECDL, ovo je odličan udžbenik za sve one koji hoće da savladaju i koriste Windows Internet Explorer 8 i Microsoft Office Outlook 2007, bez obzira na to pod kojim su operativnim sistemom instalirani. O autoru Mr Milorad Marković je dipl. mašinski inženjer i magistar tehničkih nauka u oblasti proizvodnih tehnologija i upravljanja projektima. Magistrirao je na Cranfield Institute of Technology, Engleska. Ima dvadesetogodišnje iskustvo u radu s računarima i korišćenju paketa Microsoft Office. Radio je preko šest godina u inostranstvu gde je stekao bogato iskustvo u korišćenju Office paketa, koji permanentno izučava i primenjuje u praksi.

Prikaži sve...
forward
Detaljnije

Obučite se sami. Naučite veštine i koncepte pomoću kojih ćete ovladati ColdFusionom za samo 21 dan. Primenite svoja znanja u stvarnom životu. Podignite svoje veštine na viši nivo. Za samo 21 dan, možete da naučite kako da razvijate sofisticirane Web aplikacije pomoću Macromedia alatke ColdFusion MX. Nije neophodno prethodno iskustvo u programiranju. Prateći 21 pažljivo isplanirane i organizovane lekcije ove knjige, svako može da nauči osnove ColdFusiona. Izaberite ritam učenja koji Vam najviše odgovara. Možete redom prelaziti kroz sva poglavlja, kako biste bili sigurni da ste razumeli sve koncepte i metodologije. Ili, možete da se fokusirate na određene lekcije kako biste naučili tehnike koje Vas najviše interesuju. Testirajte svoje znanje. Svako poglavlje se završava radionicom koja sadrži pitanja, odgovre i vežbanja za dalje proučavanje. Programirajte pomoću boljeg metoda. U nekim slučajevima, postoji nekoliko načina za postizanje istog cilja. Primeri navedeni u ovoj knjizi mogu da Vam olakšaju život jer koriste bolje tehnike—čak i ako ste iskusan programer. O autoru Charles Mohnike je iskusni ColdFusion developer i konsultant koji je nagrađivan za svoje dinamičke sajtove za biznis, još od 1996. Uz poznavanje štampanog izdavaštva, na čelu je konsultantske firme u Severnoj Kaliforniji koja je specijalizovana za objavljivanje na Webu pomoću ColdFusiona. Pisao je o objavljivanju na Webu kao što je Wired Digital, The Microsoft Bookshelf Internet Guide, Smart TV, i Videomaker. Naučite osnove i anatomiju ColdFusion aplikacija Kreirajte spremne poslovne baze podataka i pristupajte im pomoću Structured Query Language (SQL) i ColdFusion Markup Language (CFML) jezika Kreirajte i razvijte ColdFusion templejte kako svoj rad učini dinamičnijim Proučite karakteristike ColdFusiona za e-komerc Naučite kako da posetiocima Vašeg Web sajta omogućite slanje i primanje e-maila Naučite sve o ColdFusion promenljivima i načinu na koji se koriste za smeštanje podataka Kratak sadržaj Uvod 1. nedelja: Početak rada u ColdFusionu 1. Dan Uvod u ColdFusion 2. Anatomija ColdFusion aplikacija 3. Postavljanje ColdFusiona i definisanje izvora podataka 4. Formiranje baze podataka i organizovanje podataka 5. Pronalaženje potrebnih podataka 6. Kreiranje Vaše prve Web aplikacije 7. Promena sadržaja baze podataka pomoću ColdFusiona 2. nedelja: Kreiranje ColdFusion aplikacija pomoću naprednih alatki 8. Unapređivanje aplikacija pomoću promenljivih i toka programa 9. Korišćenje ColdFusion funkcija 10. Unapređivanje izlaza pomoću tabela i grupa 11. Unapređivanje ulaznih stranica pomoću taga 12. Korišćenje naprednih SQL tehnika 13. Korišćenje ColdFusiona za upravljanje e-mailom 14. Korišćenje listi, struktura i nizova 3. nedelj: Maksimiziranje i prilagođavanje ColdFusion aplikacija 15. Korišćenje ColdFusion Clienta i Session Managementa 16. Pronalaženje teksta pomoću Verity-ja 17. Rad sa fajlovima i direktorijumima 18. Razumevanje Custom Tagova 19. Korišćenje ColdFusiona za e-komerc aplikacije 20. Korišćenje ColdFusiona sa Flashom i XML-om 21. Korišćenje ColdFusionovih alatki za debagiranje za pronalaženje grešaka u kodu Dodatak A: Reference izabranih ColdFusion tagova Indeks

Prikaži sve...
400RSD
forward
forward
Detaljnije

Knjiga u potpunosti pokriva oblast Interneta. - Uporedite različite dobavljače usluga Interneta i programe za pristup Webu - Otvorite lični nalog za elektronsku poštu - Pronađite na Internetu ono što vam treba od odlične grafike do prijatelja o kojima odavno niste nista čuli - Sačuvajte privatnost na Internetu - Napravite potpunu Web lokaciju s grafikom, obrascima, čak i Java apletima - Poboljšajte svoju Web lokaciju korišćenjem naprednijih aplikacija i alatki U knjizi se nalazi i vodič kroz preko 800 Web lokacija koje preporučuju autori i urednici knjige. Prateći CD sadrži 30 moćnih alatki za Internet i demonstracione programe. Sadržaj Predgovor Poglavlje 1: Uspostavite vezu odmah! Poglavlje 2: Brz obilazak Interneta Poglavlje 3: Prvi koraci sa elektronskom poštom Poglavlje 4: Izrada Web strane za deset minuta Poglavlje 5: Kratak uvod u Internet Poglavlje 6: Izbor dobavljača usluga Interneta Poglavlje 7: Što brze to bolje Poglavlje 8: Izbor i instaliranje softvera za Internet Poglavlje 9: Korišćenje Internet Explorera 4 Poglavlje 10: Najbolji dodaci za Internet Explorer Poglavlje 11: Korišćenje Netscape Communicatora Poglavlje 12: Najbolji dodaci za Netscape Communicator Poglavlje 13: Alternativni čitači Weba Poglavlje 14: Upravljanje pretraživanjem Weba Poglavlje 15: Zaštita privatnosti i mere bezbednosti dok ste na vezi Poglavlje 16: Izbor programa za elektronsku poštu i korišćenje elektronske pošte Poglavlje 17: Korišćenje besplatnih usluga elektronske pošte i prosleđivanja poruka Poglavlje 18: Slanje i primanje datoteka Poglavlje 19: Organizovanje poruka elektronske pošte Poglavlje 20: Upravljanje elektronskom poštom Poglavlje 21: Pronalaženje odličnih programa na Webu Poglavlje 22: Zaštita dece od zloupotreba na Internetu Poglavlje 23: Korišćenje mašina za pretraživanje Poglavlje 24: Pronalaženje najboljih lokacija sa audio i video datotekama Poglavlje 25: Pronalaženje najbolje grafike na Webu Poglavlje 26: Pronalaženje ljudi na Internetu Poglavlje 27: Istraživanje na Mreži Poglavlje 28: Povezivanje sa svetom Poglavlje 29: Vreme je za ćaskanje Poglavlje 30: Pronalaženje i korišćenje diskusionih grupa Poglavlje 31: Izrada Web strana - osnove Poglavlje 32: Izrada Web strana - viši kurs Poglavlje 33: Izrada Web strana - kurs za majstore Poglavlje 34: Složenije Web komponente i dodaci Poglavlje 35: Digitalne slike na Webu Poglavlje 36: Lični Web serveri Poglavlje 37: Popularizovanje vaše Web lokacije Poglavlje 38: Bezbedno trošenje novca na Mreži Poglavlje 39: Najbolji načini za kupovinu na Webu Poglavlje 40: Kanali i aktivan sadržaj Poglavlje 41: Automatizacija Interneta Poglavlje 42: Konferencije na Internetu Poglavlje 43: Telefoniranje i slanje faksova na Internetu Poglavlje 44: Korišćenje videa na Internetu Poglavlje 45: Virtuelni svetovi Poglavlje 46: Internet igre Dodatak A: Šta su to URL-ovi? Dodatak B: Gopheri i drugi relikti Interneta Dodatak C: Kompakt disk Internet Biblija O autorima Brian Underdahl živi i radi u Nevadi, SAD. Računarske knjige počeo je da objavljuje 80-ih godina. Autor je i koautor preko 40 knjiga iz oblasti računarstva, među kojima su i Small Business Computing for Dummies i Windows 98 One Step at a Time. Edward Willett objavljuje knjige o računarima, zatim o raznim pitanjima iz oblasti prirodnih nauka, ali i naučnu fantastiku. Živi u Kanadi, gde piše za nekoliko časopisa i takođe je domaćin televizijskog programa koji se bavi temama u vezi s Internetom. Autor je više knjiga o Microsoftovom programu Publisher i knjige Creating Cool America Online Web Pages, koju je izdao IDG Books Worldwide.

Prikaži sve...
forward
Detaljnije

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions. What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

Prikaži sve...
forward
Detaljnije

Today, billions of devices are Internet-connected, IoT standards and protocols are stabilizing, and technical professionals must increasingly solve real problems with IoT technologies. Now, five leading Cisco IoT experts present the first comprehensive, practical reference for making IoT work. IoT Fundamentals brings together knowledge previously available only in white papers, standards documents, and other hard-to-find sources—or nowhere at all. The authors begin with a high-level overview of IoT and introduce key concepts needed to successfully design IoT solutions. Next, they walk through each key technology, protocol, and technical building block that combine into complete IoT solutions. Building on these essentials, they present several detailed use cases, including manufacturing, energy, utilities, smart+connected cities, transportation, mining, and public safety. Whatever your role or existing infrastructure, you’ll gain deep insight what IoT applications can do, and what it takes to deliver them. Fully covers the principles and components of next-generation wireless networks built with Cisco IOT solutions such as IEEE 802.11 (Wi-Fi), IEEE 802.15.4-2015 (Mesh), and LoRaWAN Brings together real-world tips, insights, and best practices for designing and implementing next-generation wireless networks Presents start-to-finish configuration examples for common deployment scenarios Reflects the extensive first-hand experience of Cisco experts Foreword xxvi Introduction xxviii Part I Introduction to IoT 1 Chapter 1 What Is IoT? 3 Genesis of IoT 4 IoT and Digitization 6 IoT Impact 7 Connected Roadways 8 Connected Factory 12 Smart Connected Buildings 15 Smart Creatures 19 Convergence of IT and OT 21 IoT Challenges 23 Summary 24 References 24 Chapter 2 IoT Network Architecture and Design 27 Drivers Behind New Network Architectures 28 Scale 30 Security 31 Constrained Devices and Networks 32 Data 32 Legacy Device Support 32 Comparing IoT Architectures 33 The oneM2M IoT Standardized Architecture 33 The IoT World Forum (IoTWF) Standardized Architecture 35 Additional IoT Reference Models 39 A Simplified IoT Architecture 40 The Core IoT Functional Stack 43 Layer 1: Things: Sensors and Actuators Layer 44 Layer 2: Communications Network Layer 46 Layer 3: Applications and Analytics Layer 59 IoT Data Management and Compute Stack 63 Fog Computing 65 Edge Computing 68 The Hierarchy of Edge, Fog, and Cloud 68 Summary 70 References 71 Part II Engineering IoT Networks 73 Chapter 3 Smart Objects: The “Things” in IoT 75 Sensors, Actuators, and Smart Objects 76 Sensors 76 Actuators 81 Micro-Electro-Mechanical Systems (MEMS) 83 Smart Objects 84 Sensor Networks 87 Wireless Sensor Networks (WSNs) 88 Communication Protocols for Wireless Sensor Networks 92 Summary 93 Chapter 4 Connecting Smart Objects 95 Communications Criteria 96 Range 96 Frequency Bands 98 Power Consumption 101 Topology 102 Constrained Devices 103 Constrained-Node Networks 104 IoT Access Technologies 107 IEEE 802.15.4 108 IEEE 802.15.4g and 802.15.4e 118 IEEE 1901.2a 124 IEEE 802.11ah 130 LoRaWAN 134 NB-IoT and Other LTE Variations 142 Summary 146 Chapter 5 IP as the IoT Network Layer 149 The Business Case for IP 150 The Key Advantages of Internet Protocol 150 Adoption or Adaptation of the Internet Protocol 152 The Need for Optimization 154 Constrained Nodes 155 Constrained Networks 156 IP Versions 157 Optimizing IP for IoT 159 From 6LoWPAN to 6Lo 159 Header Compression 161 Fragmentation 162 Mesh Addressing 163 6TiSCH 165 RPL 167 Authentication and Encryption on Constrained Nodes 173 Profiles and Compliances 174 Internet Protocol for Smart Objects (IPSO) Alliance 174 Wi-SUN Alliance 174 Thread 174 IPv6 Ready Logo 175 Summary 175 Chapter 6 Application Protocols for IoT 177 The Transport Layer 178 IoT Application Transport Methods 180 Application Layer Protocol Not Present 180 SCADA 182 Generic Web-Based Protocols 189 IoT Application Layer Protocols 191 Summary 204 Chapter 7 Data and Analytics for IoT 205 An Introduction to Data Analytics for IoT 206 Structured Versus Unstructured Data 207 Data in Motion Versus Data at Rest 209 IoT Data Analytics Overview 209 IoT Data Analytics Challenges 211 Machine Learning 212 Machine Learning Overview 212 Machine Learning and Getting Intelligence from Big Data 218 Predictive Analytics 220 Big Data Analytics Tools and Technology 220 Massively Parallel Processing Databases 222 NoSQL Databases 223 Hadoop 224 The Hadoop Ecosystem 227 Edge Streaming Analytics 230 Comparing Big Data and Edge Analytics 231 Edge Analytics Core Functions 232 Distributed Analytics Systems 235 Network Analytics 236 Flexible NetFlow Architecture 238 Summary 242 References 243 Chapter 8 Securing IoT 245 A Brief History of OT Security 246 Common Challenges in OT Security 249 Erosion of Network Architecture 249 Pervasive Legacy Systems 250 Insecure Operational Protocols 250 Other Protocols 253 Device Insecurity 254 Dependence on External Vendors 255 Security Knowledge 256 How IT and OT Security Practices and Systems Vary 256 The Purdue Model for Control Hierarchy 257 OT Network Characteristics Impacting Security 259 Security Priorities: Integrity, Availability, and Confidentiality 261 Security Focus 261 Formal Risk Analysis Structures: OCTAVE and FAIR 262 OCTAVE 262 FAIR 265 The Phased Application of Security in an Operational Environment 266 Secured Network Infrastructure and Assets 266 Deploying Dedicated Security Appliances 269 Higher-Order Policy Convergence and Network Monitoring 272 Summary 274 Part III IoT in Industry 275 Chapter 9 Manufacturing 277 An Introduction to Connected Manufacturing 278 An IoT Strategy for Connected Manufacturing 279 Business Improvements Driven Through IoT 281 An Architecture for the Connected Factory 282 Industrial Automation and Control Systems Reference Model 282 The CPwE Reference Model 284 CPwE Resilient Network Design 286 CPwE Wireless 289 Industrial Automation Control Protocols 293 EtherNet/IP and CIP 293 PROFINET 294 The PROFINET Architecture 296 Media Redundancy Protocol (MRP) 297 Modbus/TCP 298 Connected Factory Security 299 A Holistic Approach to Industrial Security 299 Edge Computing in the Connected Factory 304 Connected Machines and Edge Computing 304 Summary 307 References 307 Chapter 10 Oil and Gas 309 An Introduction to the Oil and Gas Industry 310 Defining Oil and Gas 310 The Oil and Gas Value Chain 313 Current Trends in the Oil and Gas Industry 314 Industry Key Challenges as Digitization Drivers 316 IoT and the Oil and Gas Industry 319 Improving Operational Efficiency 321 The Purdue Model for Control Hierarchy in Oil and Gas Networks 321 Oil and Gas Use Cases for IoT 323 IoT Architectures for Oil and Gas 326 Control Room Networks for Oil and Gas 327 Wired Networks for Oil and Gas 328 Wireless Networks for Oil and Gas 328 Wireless Use Cases in the Oil and Gas Industry 332 The Risk Control Framework for Cybersecurity in IoT 335 Securing the Oil and Gas PCN: Background 337 Securing the Oil and Gas PCN: Use Cases and Requirements 338 Data Analytics for Predictive Asset Monitoring 341 Summary 342 References 343 Chapter 11 Utilities 345 An Introduction to the Power Utility Industry 347 The IT/OT Divide in Utilities 348 The GridBlocks Reference Model 350 GridBlocks: An 11-Tiered Reference Architecture 352 The Primary Substation GridBlock and Substation Automation 356 SCADA 357 IEC 61850: The Modernization of Substation Communication Standards 358 Network Resiliency Protocols in the Substation 362 System Control GridBlock: The Substation WAN 364 Defining Teleprotection 364 Designing a WAN for Teleprotection 367 The Field Area Network (FAN) GridBlock 369 Advanced Metering Infrastructure 371 Other Use Cases 373 Securing the Smart Grid 377 NERC CIP 378 Smart Grid Security Considerations 380 The Future of the Smart Grid 381 Summary 382 References 383 Chapter 12 Smart and Connected Cities 385 An IoT Strategy for Smarter Cities 386 Vertical IoT Needs for Smarter Cities 386 Global vs. Siloed Strategies 389 Smart City IoT Architecture 390 Street Layer 391 City Layer 394 Data Center Layer 395 Services Layer 397 On-Premises vs. Cloud 398 Smart City Security Architecture 398 Smart City Use-Case Examples 401 Connected Street Lighting 401 Connected Environment 409 Summary 411 References 412 Chapter 13 Transportation 413 Transportation and Transports 413 Transportation Challenges 415 Roadways 415 Mass Transit 416 Rail 417 Challenges for Transportation Operators and Users 418 IoT Use Cases for Transportation 420 Connected Cars 421 Connected Fleets 422 Infrastructure and Mass Transit 422 An IoT Architecture for Transportation 427 IoT Technologies for Roadways 427 Connected Roadways Network Architecture 434 Extending the Roadways IoT Architecture to Bus Mass Transit 440 Extending Bus IoT Architecture to Railways 442 Summary 447 References 448 Chapter 14 Mining 449 Mining Today and Its Challenges 451 Scale 451 Safety 455 Environment 455 Security 456 Volatile Markets 456 Challenges for IoT in Modern Mining 456 The OT Roles in Mining 456 Connectivity 457 An IoT Strategy for Mining 459 Improved Safety and Location Services 459 Location Services 461 Improved Efficiencies 464 Improved Collaboration 465 IoT Security for Mining 466 An Architecture for IoT in Mining 467 IEEE 802.11 as the IoT Access Layer 468 802.11 Outdoor Wireless Mesh 468 4G/LTE 474 Wireless in Underground Mining 475 Industrial Wireless 476 Isolated vs. Connected Mine Networks 476 Core Network Connectivity 478 Network Design Consideration for Mining Applications 479 Data Processing 480 Summary 481 Chapter 15 Public Safety 483 Overview of Public Safety 484 Public Safety Objects and Exchanges 484 Public and Private Partnership for Public Safety IoT 486 Public Safety Adoption of Technology and the IoT 488 An IoT Blueprint for Public Safety 489 Mission Continuum 489 Mission Fabric 490 Inter-agency Collaboration 491 Emergency Response IoT Architecture 493 Mobile Command Center 494 Mobile Vehicles: Land, Air, and Sea 501 IoT Public Safety Information Processing 506 School Bus Safety 508 Bus Location and Student Onboarding/Offboarding 508 Driver Behavior Reporting 510 Diagnostic Reporting 511 Video Surveillance 511 Student Wi-Fi 513 Push-to-Talk Communication 513 School Bus Safety Network Architecture 513 Summary 514 Reference 515A Brief History of OT Security 246

Prikaži sve...
forward
Detaljnije

Description Knjiga godine po izboru listova Independent i New Statesman. Knjiga Darknet vodi nas duboko u digitalno podzemlje i pruža nam izuzetan uvid u internet kakav ne poznajemo. U njoj Džejmi Bartlet prelazi s one strane ekrana i iz digitalnog mraka izvlači hakere, dilere drogom, trolove, kam-devojke, političke ekstremiste i daje ljudsko lice onima koji imaju mnogo razloga da budu anonimni. Darknet je prosvetljujuće i živopisno istraživanje interneta danas i njegovih najinovativnijih i najbizarnijih supkultura, koje se prostire od popularnih društvenih mreža i tajnih grupa na Fejsbuku do kriptovanih delova mreže Tor i najzabačenijih odaja Deep Weba. To je svet koji se često pominje u medijskim izveštajima, ali je ipak nedovoljno poznat, gotovo neistražen i nama bliži nego što mislimo. To je svet bitkoina i Silk Rouda, terorista i pornografije. To je – darknet.

Prikaži sve...
899RSD
forward
forward
Detaljnije
Nazad
Sačuvaj