ОС и Сети - скачать книги или читать онлайн. Страница 5

Купить книгу Windows IT Pro/RE №05/2018, автора Открытые системы
Pdf-книга
Windows IT Pro/RE №05/2018
Windows IT Pro/RE – профессиональное издание на русском языке, целиком и полностью посвященное вопросам работы с продуктами семейства Windows и технологиям компании Microsoft. Журнал предназначен для системных администраторов и разработчиков.
Купить книгу Windows IT Pro/RE №04/2018, автора Открытые системы
Pdf-книга
Windows IT Pro/RE №04/2018
Windows IT Pro/RE – профессиональное издание на русском языке, целиком и полностью посвященное вопросам работы с продуктами семейства Windows и технологиям компании Microsoft. Журнал предназначен для системных администраторов и разработчиков.
Купить книгу Открытые системы. СУБД №01/2018, автора Открытые системы
Pdf-книга
Открытые системы. СУБД №01/2018
Купить книгу Introduction to IP Address Management, автора Timothy  Rooney
Pdf-книга
Introduction to IP Address Management
A step-by-step guide to managing critical technologies of today's converged services IP networks Effective IP Address Management (IPAM) has become crucial to maintaining high-performing IP services such as data, video, and voice over IP. This book provides a concise introduction to the three core IPAM networking technologies—IPv4 and IPv6 addressing, Dynamic Host Configuration Protocol (DHCP), and Domain Name System (DNS)—as well as IPAM practice and techniques needed to manage them cohesively. The book begins with a basic overview of IP networking, including a discussion of protocol layering, addressing, and routing. After a review of the IPAM technologies, the book introduces the major components, motivation, benefits, and basic approaches of IPAM. Emphasizing the necessity of a disciplined «network management» approach to IPAM, the subsequent chapters enable you to: Understand IPAM practices, including managing your IP address inventory and tracking of address transactions (such as allocation and splitting address space, discovering network occupancy, and managing faults and performance) Weigh the costs and justifications for properly implementing an IPAM strategy Use various approaches to automating IPAM functions through workflow Learn about IPv4-IPv6 co-existence technologies and approaches Assess security issues with DHCP network access control approaches and DNS vulnerabilities and mitigation including DNSSEC Evaluate the business case for IPAM, which includes derivation of the business case cost basis, identification of savings when using an IP address management system, associated costs, and finally net results Introduction to IP Address Management concludes with a business case example, providing a real-world financial perspective of the costs and benefits of implementing an IP address management solution. No other book covers all these subjects cohesively from a network management perspective, which makes this volume imperative for manager-level networking professionals who need a broad understanding of both the technical and business aspects of IPAM. In addition, technologists interested in IP networking and address management will find this book valuable. To obtain a free copy of the IPAM Configuration Guide please send an email to: ieeeproposals@wiley.com
Купить книгу Self-Adaptive Systems for Machine Intelligence, автора Haibo  He
Pdf-книга
Self-Adaptive Systems for Machine Intelligence
This book will advance the understanding and application of self-adaptive intelligent systems; therefore it will potentially benefit the long-term goal of replicating certain levels of brain-like intelligence in complex and networked engineering systems. It will provide new approaches for adaptive systems within uncertain environments. This will provide an opportunity to evaluate the strengths and weaknesses of the current state-of-the-art of knowledge, give rise to new research directions, and educate future professionals in this domain. Self-adaptive intelligent systems have wide applications from military security systems to civilian daily life. In this book, different application problems, including pattern recognition, classification, image recovery, and sequence learning, will be presented to show the capability of the proposed systems in learning, memory, and prediction. Therefore, this book will also provide potential new solutions to many real-world applications.
Купить книгу Trustworthy Compilers, автора
Pdf-книга
Trustworthy Compilers
This unique guide book explains and teaches the concept of trustworthy compilers based on 50+ years of worldwide experience in the area of compilers, and on the author’s own 30+ years of expertise in development and teaching compilers. It covers the key topics related to compiler development as well as compiling methods not thoroughly covered in other books. The book also reveals many state-of-the-art compiler development tools and personal experience of their use in research projects by the author and his team. Software engineers of commercial companies and undergraduate/graduate students will benefit from this guide.
Купить книгу Algorithms and Parallel Computing, автора Fayez  Gebali
Pdf-книга
Algorithms and Parallel Computing
There is a software gap between the hardware potential and the performance that can be attained using today's software parallel program development tools. The tools need manual intervention by the programmer to parallelize the code. Programming a parallel computer requires closely studying the target algorithm or application, more so than in the traditional sequential programming we have all learned. The programmer must be aware of the communication and data dependencies of the algorithm or application. This book provides the techniques to explore the possible ways to program a parallel computer for a given application.
Купить книгу Information Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments, автора
Pdf-книга
Information Storage and Management. Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments
The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the «Cloud» as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and Security in physical and virtualized environment Includes an enhanced Appendix for additional information This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.
Купить книгу Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL, автора Zhuo  Xu
Pdf-книга
Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services. An Advanced Guide for VPLS and VLL
A guide to designing and implementing VPLS services over an IP/MPLS switched service provider backbone Today's communication providers are looking for convenience, simplicity, and flexible bandwidth across wide area networks-but with the quality of service and control that is critical for business networking applications like video, voice and data. Carrier Ethernet VPN services based on VPLS makes this a reality. Virtual Private LAN Service (VPLS) is a pseudowire (PW) based, multipoint-to-multipoint layer 2 Ethernet VPN service provided by services providers By deploying a VPLS service to customers, the operator can focus on providing high throughput, highly available Ethernet bridging services and leave the layer 3 routing decision up to the customer. Virtual Private LAN Services (VPLS) is quickly becoming the number one choice for many enterprises and service providers to deploy data communication networks. Alcatel-Lucent VPLS solution enables service providers to offer enterprise customers the operational cost benefits of Ethernet with the predictable QoS characteristics of MPLS. Items Covered: Building Converged Service Networks with IP/MPLS VPN Technology IP/MPLS VPN Multi-Service Network Overview Using MPLS Label Switched Paths as Service Transport Tunnels Routing Protocol Traffi c Engineering and CSPF RSVP-TE Protocol MPLS Resiliency – Secondary LSP MPLS Resiliency – RSVP-TE LSP Fast Reroute Label Distribution Protocol IP/MPLS VPN Service Routing Architecture Virtual Leased Line Services Virtual Private LAN Service Hierarchical VPLS High Availability in an IP/MPLS VPN Network VLL Service Resiliency VPLS Service Resiliency VPLS BGP Auto-Discovery PBB-VPLS OAM in a VPLS Service Network
Купить книгу Complex-Valued Neural Networks. Advances and Applications, автора Akira  Hirose
Pdf-книга
Complex-Valued Neural Networks. Advances and Applications
Presents the latest advances in complex-valued neural networks by demonstrating the theory in a wide range of applications Complex-valued neural networks is a rapidly developing neural network framework that utilizes complex arithmetic, exhibiting specific characteristics in its learning, self-organizing, and processing dynamics. They are highly suitable for processing complex amplitude, composed of amplitude and phase, which is one of the core concepts in physical systems to deal with electromagnetic, light, sonic/ultrasonic waves as well as quantum waves, namely, electron and superconducting waves. This fact is a critical advantage in practical applications in diverse fields of engineering, where signals are routinely analyzed and processed in time/space, frequency, and phase domains. Complex-Valued Neural Networks: Advances and Applications covers cutting-edge topics and applications surrounding this timely subject. Demonstrating advanced theories with a wide range of applications, including communication systems, image processing systems, and brain-computer interfaces, this text offers comprehensive coverage of: Conventional complex-valued neural networks Quaternionic neural networks Clifford-algebraic neural networks Presented by international experts in the field, Complex-Valued Neural Networks: Advances and Applications is ideal for advanced-level computational intelligence theorists, electromagnetic theorists, and mathematicians interested in computational intelligence, artificial intelligence, machine learning theories, and algorithms.
Купить книгу Защита от символьных стираний в случайных линейных сетях, автора Е. А. Поздняковой
Pdf-книга
Защита от символьных стираний в случайных линейных сетях
Авторами исследуется случайная линейная сеть, в которой при передаче помимо пакетных потерь происходят символьные стирания. Построена модель такой сети, базирующаяся на новых моделях узлов с расширенным сетевым алфавитом. Разработаны методы кодирования, основанные на использовании сетевых кодов Кеттера-Кшишанга-Силвы и канальных помехоустойчивых кодов. В статье отмечена возможность применимости этих методов в случае несанкционированного использования линейных сетей нелегальным пользователем.
Купить книгу Журнал сетевых решений / LAN №01/2018, автора Открытые системы
Pdf-книга
Журнал сетевых решений / LAN №01/2018
«Журнал сетевых решений / LAN» – издание для специалистов по проектированию, установке, эксплуатации и модернизации информационных систем о компьютерных сетях, системах передачи данных, управления сетями и проектами, средствах связи, системах безопасности разного уровня. Тематика охватывает весь круг вопросов, связанных с корпоративными сетями, их сопряжением с общедоступными сетями, вычислительной и телекоммуникационной инфраструктурой, включая центры данных, СКС, системы бесперебойного питания.