Mostrando 5,741 - 5,760 Resultados de 5,832 Para Buscar 'Index Foundation', tiempo de consulta: 0.21s Limitar resultados
  1. 5741
    Publicado 2022
    Libro electrónico
  2. 5742
    Publicado 2022
    Libro electrónico
  3. 5743
  4. 5744
    Publicado 2024
    Libro electrónico
  5. 5745
    Publicado 2024
    Libro electrónico
  6. 5746
    Libro electrónico
  7. 5747
    Publicado 2023
    Libro electrónico
  8. 5748
    Publicado 2024
    Libro electrónico
  9. 5749
    por Waaijman, Kees
    Publicado 2011
    991007022899706719
  10. 5750
    Publicado 2015
    Libro electrónico
  11. 5751
    Publicado 2018
    Libro electrónico
  12. 5752
    Publicado 2022
    Libro electrónico
  13. 5753
    Cryptocurrency All-in-One For Dummies
    Cryptocurrency All–in–One For Dummies
    Publicado 2022
    Libro electrónico
  14. 5754
    Publicado 2023
    Libro electrónico
  15. 5755
    Publicado 2017
    Libro electrónico
  16. 5756
    Publicado 2017
    Libro electrónico
  17. 5757
    Publicado 2017
    Tabla de Contenidos: “…8.4.1 LTE Security 254 -- 8.4.2 Network Attack Types in LTE/SAE 255 -- 8.4.3 Preparation for the Attacks 256 -- 8.5 Errors in Equipment Manufacturing 259 -- 8.5.1 Equipment Ordering 259 -- 8.5.2 Early Testing 260 -- 8.6 Self‐Organizing Network Techniques for Test and Measurement 264 -- 8.6.1 Principle 264 -- 8.6.2 Self‐configuration 265 -- 8.6.3 Self‐optimizing 266 -- 8.6.4 Self‐healing 266 -- 8.6.5 Technical Issues and Impact on Network Planning 266 -- 8.6.6 Effects on Network Installation, Commissioning and Optimization 267 -- 8.6.7 SON and Security 268 -- References 268 -- 9 Monitoring and Protection Techniques 270 -- 9.1 Overview 270 -- 9.2 Personal Devices 271 -- 9.2.1 Wi‐Fi Connectivity 271 -- 9.2.2 Firewalls 271 -- 9.3 IP Core Protection Techniques 272 -- 9.3.1 General Principles 272 -- 9.3.2 LTE Packet Core Protection 272 -- 9.3.3 Protection against Roaming Threats 275 -- 9.4 HW Fault and Performance Monitoring 276 -- 9.4.1 Network Monitoring 277 -- 9.4.2 Protection against DoS/DDoS 277 -- 9.4.3 Memory Wearing 277 -- 9.5 Security Analysis 278 -- 9.5.1 Post‐processing 278 -- 9.5.2 Real‐time Security Analysis 278 -- 9.6 Virus Protection 279 -- 9.7 Legal Interception 281 -- 9.8 Personal Safety and Privacy 283 -- 9.8.1 CMAS 283 -- 9.8.2 Location Privacy 285 -- 9.8.3 Bio‐effects 286 -- References 287 -- 10 Future of Wireless Solutions and Security 288 -- 10.1 Overview 288 -- 10.2 IoT as a Driving Force 288 -- 10.3 Evolution of 4G 289 -- 10.4 Development of Devices 291 -- 10.4.1 Security Aspects of Smartcards 291 -- 10.4.2 Mobile Device Considerations 291 -- 10.4.3 IoT Device Considerations 292 -- 10.4.4 Sensor Networks and Big Data 293 -- 10.5 5G Mobile Communications 294 -- 10.5.1 Standardization 294 -- 10.5.2 Concept 295 -- 10.5.3 Industry and Investigation Initiatives 297 -- 10.5.4 Role of 5G in IoT 297 -- References 297 -- Index 299.…”
    Libro electrónico
  18. 5758
    Libro electrónico
  19. 5759
    Publicado 2018
    Libro electrónico
  20. 5760
    Publicado 2022
    Libro electrónico