Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 253
- Management 250
- Application software 237
- History 236
- Engineering & Applied Sciences 180
- Computer networks 151
- Data processing 140
- Computer Science 124
- Cloud computing 120
- Design 115
- Security measures 114
- Computer programs 107
- Computer programming 105
- Python (Computer program language) 104
- Leadership 103
- Artificial intelligence 98
- Microsoft .NET Framework 94
- Computer software 90
- Machine learning 88
- Database management 87
- Examinations 87
- Information technology 84
- Web sites 84
- Web site development 83
- Programming 82
- Computer security 79
- Software engineering 79
- Big data 77
- Philosophy 73
- Social aspects 71
-
5741
-
5742Publicado 2022Libro electrónico
-
5743
-
5744Publicado 2024Libro electrónico
-
5745Publicado 2024Libro electrónico
-
5746
-
5747
-
5748Publicado 2024Libro electrónico
-
5749
-
5750
-
5751
-
5752Publicado 2022Libro electrónico
-
5753Cryptocurrency All-in-One For DummiesCryptocurrency All–in–One For DummiesPublicado 2022Libro electrónico
-
5754Publicado 2023Libro electrónico
-
5755
-
5756Publicado 2017Libro electrónico
-
5757Publicado 2017Tabla de Contenidos: “…8.4.1 LTE Security 254 -- 8.4.2 Network Attack Types in LTE/SAE 255 -- 8.4.3 Preparation for the Attacks 256 -- 8.5 Errors in Equipment Manufacturing 259 -- 8.5.1 Equipment Ordering 259 -- 8.5.2 Early Testing 260 -- 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 -- 8.6.1 Principle 264 -- 8.6.2 Self‐configuration 265 -- 8.6.3 Self‐optimizing 266 -- 8.6.4 Self‐healing 266 -- 8.6.5 Technical Issues and Impact on Network Planning 266 -- 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 -- 8.6.7 SON and Security 268 -- References 268 -- 9 Monitoring and Protection Techniques 270 -- 9.1 Overview 270 -- 9.2 Personal Devices 271 -- 9.2.1 Wi‐Fi Connectivity 271 -- 9.2.2 Firewalls 271 -- 9.3 IP Core Protection Techniques 272 -- 9.3.1 General Principles 272 -- 9.3.2 LTE Packet Core Protection 272 -- 9.3.3 Protection against Roaming Threats 275 -- 9.4 HW Fault and Performance Monitoring 276 -- 9.4.1 Network Monitoring 277 -- 9.4.2 Protection against DoS/DDoS 277 -- 9.4.3 Memory Wearing 277 -- 9.5 Security Analysis 278 -- 9.5.1 Post‐processing 278 -- 9.5.2 Real‐time Security Analysis 278 -- 9.6 Virus Protection 279 -- 9.7 Legal Interception 281 -- 9.8 Personal Safety and Privacy 283 -- 9.8.1 CMAS 283 -- 9.8.2 Location Privacy 285 -- 9.8.3 Bio‐effects 286 -- References 287 -- 10 Future of Wireless Solutions and Security 288 -- 10.1 Overview 288 -- 10.2 IoT as a Driving Force 288 -- 10.3 Evolution of 4G 289 -- 10.4 Development of Devices 291 -- 10.4.1 Security Aspects of Smartcards 291 -- 10.4.2 Mobile Device Considerations 291 -- 10.4.3 IoT Device Considerations 292 -- 10.4.4 Sensor Networks and Big Data 293 -- 10.5 5G Mobile Communications 294 -- 10.5.1 Standardization 294 -- 10.5.2 Concept 295 -- 10.5.3 Industry and Investigation Initiatives 297 -- 10.5.4 Role of 5G in IoT 297 -- References 297 -- Index 299.…”
Libro electrónico -
5758Libro electrónico
-
5759Publicado 2018Libro electrónico
-
5760Publicado 2022Libro electrónico