intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Networking concepts

Xem 1-20 trên 563 kết quả Networking concepts
  • The article presents various approaches to the concept of "digital economy" and trends that put an effect on formation of competitiveness. It is concluded that the digital economy is a "digital" system of economic relations based on the use of information and communication technologies. Digital companies are becoming economic agents of the digital economy. The basic elements of a digital company are infrastructure (Internet access, SOFTWARE, telecommunications), e-business (conducting business through computer networks), e-Commerce (distribution of goods via the Internet).

    pdf5p longtimenosee09 08-04-2024 0 0   Download

  • This article seeks to provide research opportunities in supply chain networks. For manufacturing industries, materials supply is an essential input to the production process for a sustainability value creation for firms and stakeholders. However, due to several reasons have caused issues to material short supplies in the production process that caused additional cost leading to a negative impact to firm operating performance.

    pdf6p longtimenosee09 08-04-2024 1 1   Download

  • The paper discusses the concept and problem of identifying DDoS attacks for information management. The main starting mechanisms and types of DDoS attacks are analyzed. To identify them, signature and behavioral methods of analyzing network traffic are used. Analysis of the advantages and disadvantages of these methods actualized the need for their combined use. To detect and classify DDoS attacks, the need to develop and use a neural network model has been updated. The training and testing of the model were made on the initial data from the NSL-KDD set.

    pdf5p longtimenosee09 08-04-2024 1 1   Download

  • Part 1 of ebook "Optimization of logistics and supply chain systems: Theory and practice" includes the following main contents: Chapter 1 - The optimization concept; Chapter 2 - Typical base optimization problems; Chapter 3 - Algorithms; Chapter 4 - Reducing the Kullback-Leibler distance, the cross-entropy method for optimization; Chapter 5 - Logistics systems and optimization strategies under uncertain operational environment; Chapter 6 - Transportation network design by heuristic methods;...

    pdf184p khuynhlinhnguyet1009 05-04-2024 3 3   Download

  • This book is designed to provide information about the CCIE Routing and Switching written exam. The CCIE program is designed to help individuals, companies, industries, and countries succeed in an era of increasing network reliance by distinguishing the top echelon of internet working experts. If that sounds like a lofty mission, then our standards for excellence are equally high.

    pdf768p longtimenosee08 31-03-2024 0 0   Download

  • Ebook "CCNA Security - Official Certification Guide" presents the following content: Part I: Network security concepts, Part II: Constructing a secure infrastructure, Part III: Extending security and availability with cryptography and VPNs, Part IV: Final preparation, Part V: Appendixes.

    pdf672p longtimenosee08 31-03-2024 0 0   Download

  • CCNA Security Official Exam Certification Guide is an excellent self-study resource for the Cisco IINS (640-553) exam. Passing the IINS exam validates the knowledge and skills required to successfully secure Cisco network devices. Gaining certification in Cisco technology is key to the continuing educational development of today’s networking professional. Through certification programs, Cisco validates the skills and expertise required to effectively manage the modern enterprise network.

    pdf776p longtimenosee08 31-03-2024 0 0   Download

  • CCNP BCMSN Exam Certification Guide is a complete study tool for the CCNP BCMSN exam, allowing you to assess your knowledge, identify areas in which to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills to implement appropriate technologies to build scalable, multilayer switched networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCNP exam preparation.

    pdf633p longtimenosee08 31-03-2024 2 0   Download

  • Network security is a very complex business. The Cisco PIX Firewall performs some very specific functions as part of the security process. It is very important to be familiar with many networking and network security concepts before you undertake the CSPFA certification. This book is designed for security professionals or networking professionals who are interested in beginning the security certification process.

    pdf605p longtimenosee08 31-03-2024 3 0   Download

  • CCSP SECUR Exam Certification Guide is a complete study tool for the CCSP SECUR exam, enabling you to assess your knowledge, identify areas to concentrate your study, and master key concepts to help you succeed on the exams and in your daily job. The book is filled with features that help you master the skills needed to secure Cisco IOS Router networks. This book was developed in cooperation with the Cisco Internet Learning Solutions Group. Cisco Press books are the only self-study books authorized by Cisco for CCSP exam preparation.

    pdf505p longtimenosee08 31-03-2024 1 0   Download

  • Ebook Mission critical internet security: Part 1 includes contents: Chapter 1 securing your internetwork, Chapter 2 internetwork security concepts, Chapter 3 IPSec, Chapter 4 internet security applications, Chapter 5 attacks that await your network.

    pdf209p longtimenosee05 31-03-2024 0 0   Download

  • Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in privacy and security.

    pdf129p longtimenosee05 31-03-2024 0 0   Download

  • This book presents an overview and critique of online business security systems with emphasis on common electronic commerce activities and payment systems. It discusses legal, compliance and ethical issues that affect management and administration of online business systems. The book introduces the reader to concepts underlying online business systems, as well as technologies that drive online business processes.

    pdf231p longtimenosee05 31-03-2024 0 0   Download

  • This book covers most of the major areas of information security and the open source tools you can use to help secure them. The chapters are designed around the major disciplines of information security and key concepts are covered in each chapter. The tools included on the book’s CD-ROM allow for a lab-like environment that everyone can participate in. All you need is a PC and this book’s CD-ROM to start using the tools described herein.

    pdf600p longtimenosee05 31-03-2024 0 0   Download

  • This study attempts to examine the role and concept of policy of supply chain network, particularly dialectical model proposed by Marsh & Smith (2000) in explaining policy outcomes by taking a case study of communal land policymaking process.

    pdf9p longtimenosee07 29-03-2024 2 2   Download

  • In the paper "Urban characterization by the green supply chain management concept: A review" a new model is developed for the design of sustainable supply chains with a focus on cities that captures the frequency of network link operations, which is especially relevant to cities due to frequent freight deliveries. Descriptive interviews were reviewed thoroughly with the conceptualization of the substantiated philosophy as a sociological technique of examination.

    pdf10p longtimenosee07 29-03-2024 2 2   Download

  • The aim of the paper was to identify social networking portals, which are most often used by the representatives of Generation Z as an element of building relationships with companies. The study of Generation Z attitudes towards brands on social media is part of broader research conducted by the authors among students in Poland and Great Britain in 2020. The method used in the study was a survey, as part of which the CATI surveying technique was used.

    pdf14p longtimenosee07 29-03-2024 3 2   Download

  • Ebook "Impact of urbanization on water shortage in face of climatic aberrations" gives a brief introduction to the study. It introduces to the reader the need and importance of the present investigation and describes the methodology adopted and the tools and concepts utilized. Gives an overview of multi-criteria decision-making. The working procedure, two examples and their applications to solve real-life problems in water resources are discussed.

    pdf105p tudohanhtau1006 29-03-2024 1 1   Download

  • Ebook "Predictive microbiology in foods" presents the concepts, models, most significant advances, and future trends in predictive microbiology. It will discuss the history and basic concepts of predictive microbiology. The most frequently used models will be explained, and the most significant software and databases (e.g., Combase, Sym’Previus) will be reviewed.

    pdf132p coduathanh1122 27-03-2024 1 1   Download

  • Ebook "E-cell system: Basic concepts and applications" is to provide a comprehensive guide for the E‑Cell System version 3 in terms of the software features and its usage. While the publicly available E‑Cell Simulation Environment version 3 User's Manual provides the technical details of model building and scripting, it does not describe some of the underlying concepts of the E‑Cell System. The first part of the book addresses this issue by providing the basic concepts of modeling and simulation with the E‑Cell System.

    pdf185p cotieubac1004 15-03-2024 0 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2