Browsing by Subject Mạng máy tính

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 7 of 7
  • TVS.005240_TT_Zahir Tari, Nasrin Sohrabi, Yasaman Samadi, Jakapan Suaboot - Data Exfiltration Threats and Prevention Techniques_ Machine Learning and.pdf.jpg
  • Sách/Book


  • Authors: Tari, Zahir (2023)

  • Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recent advances in data exfiltration detection methods and technologies, the authors discuss details of data breach countermeasures and attack scenarios to show how the reader may identify a potential cyber attack in the real world. Aimed at professionals and students alike, this book highlights a range of machine learning methods that can be used to detect potential data theft, identifying research gaps and the potential to make change in the f...

  • TVS.005106_TT_(The Elsevier And Miccai Society Book Series) Haofu Liao, S. Kevin Zhou, Jiebo Luo - Deep Network Design for Medical Image Computing. Pr.pdf.jpg
  • Sách/Book


  • Authors: Liao, Haofu (2022)

  • Deep Network Design for Medical Image Computing: Principles and Applications covers a range of MIC tasks and discusses design principles of these tasks for deep learning approaches in medicine. These include skin disease classification, vertebrae identification and localization, cardiac ultrasound image segmentation, 2D/3D medical image registration for intervention, metal artifact reduction, sparse-view artifact reduction, etc.

  • TVS.005248_TT_Shaurya Gupta, Kanta Prasad Sharma, Ashish Sharma, Dac-Nhuong Le - Evolving Networking Technologies_ Developments and Future Directions-.pdf.jpg
  • Sách/Book


  • Authors: - (2023)

  • This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication

  • TVS.000572_TT_ Rebekah Brown and Scott J. Roberts - Intelligence-Driven Incident Response, 2nd Edition (5th Early Release)-O_Reilly Media, Inc. (2023).pdf.jpg
  • Sách/Book


  • Authors: Rebekah Brown (2023)

  • The fundamentals: Get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together Practical application: Walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate The way forward: Explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building

  • TVS.005101_TT_Ting He, Liang Ma, Ananthram Swami, Don Towsley - Network Tomography_ Identifiability, Measurement Design, and Network State Inference-C.pdf.jpg
  • Sách/Book


  • Authors: He, Ting (2021)

  • It describes the main types of mathematical problems, along with their solutions and properties, and emphasizes the actions that can be taken to improve the accuracy of network tomography. With proofs and derivations introduced in an accessible language for easy understanding, this is an essential resource for professional engineers, academic researchers, and graduate students in network management and network science.

  • TVS.005102_TT_Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Lalit Garg - Research Advances in Network Technologies-CRC Press (2023).pdf.jpg
  • Sách/Book


  • Authors: Verma, Anshul (2023)

  • In current digital era, information is an important asset for our daily life as well as for small and large-scale businesses. The network technologies are the main enablers that connect the computing devices and resources together to collect, process and share the vital information locally as well as globally. The network technologies provide efficient, flexible and seamless communication while maximizing productivity and resources for our day-to-day life and business operations