Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

1000 tulosta hakusanalla Manish Kumar

Bilan de masse du glacier et calcul du débit du glacier de l'Himalaya

Bilan de masse du glacier et calcul du débit du glacier de l'Himalaya

Pratik Kumar Upadhyaya; Manish Mehta

Editions Notre Savoir
2023
pokkari
L' volution des glaciers et des calottes glaciaires est l'une des preuves les plus videntes du changement climatique et, ce titre, elle constitue une variable cl pour les strat gies de d tection pr coce dans le cadre des observations mondiales li es au climat. Ces changements ont des r percussions sur les fluctuations du niveau de la mer l' chelle mondiale, sur la situation des risques naturels au niveau r gional et local, ainsi que sur les soci t s qui d pendent de l'eau de fonte des glaciers. La collecte et la publication d'informations standardis es sur les changements en cours dans les glaciers, coordonn es au niveau international, ont t lanc es en 1894. Les ensembles de donn es compil es sur la r partition mondiale et les changements des glaciers (bilan de masse) et des calottes glaciaires constituent l' pine dorsale des nombreuses publications scientifiques sur les derni res d couvertes concernant la glace de surface sur terre. Depuis le tout d but, les donn es compil es ont t publi es par le Service mondial de surveillance des glaciers et les organisations qui l'ont pr c d . Toutefois, les tableaux de donn es, les formats et les m tadonn es correspondants sont principalement utilis s par les sp cialistes. Le d bit des glaciers joue galement un r le crucial pour les centrales hydro lectriques.
Mastering Orthodontics- Unraveling Clinical Cases

Mastering Orthodontics- Unraveling Clinical Cases

Manish Goyal; Mukesh Kumar

Lap Lambert Academic Publishing
2024
pokkari
This book covers a wide range of clinical cases in orthodontics. Throughout the book, simple approaches for dealing with complex, ethnic, and unusual clinical issues are discussed. It includes over 200 full-color images of both rare and routine Orthodontics cases, with all aesthetic issues thoroughly discussed. The presentation of pre and post-treatment images is basic and easy on the eyes. Each case includes pre-treatment photographic assessment, treatment planning, and post-treatment analysis in an easy-to-follow format so that images and texts may be seen and read at a glance. Intended as a quick and illustrative reference guide for postgraduate and undergraduate students, this book represents the most up-to-date, practice-oriented book in the field of Orthodontics and Dentofacial Orthopaedics.
Mitigating Flooding Attacks in Consumer IoT

Mitigating Flooding Attacks in Consumer IoT

Manish Singh; Girish Kumar

Lap Lambert Academic Publishing
2024
pokkari
This book begins by introducing the concept of embedded security, which involves protecting embedded systems from various threats and vulnerabilities. It highlights the importance of securing these systems, given their widespread usage and critical functions. The authors then delve into the emergence of IoT and its impact on the attack surface, making it challenging to maintain a consistent security posture. The book explores four common embedded system security challenges, including the lack of universally accepted standards or best practices, the use of wireless network connections, the incorporation of hardware and software components from various vendors, and the long life cycles of embedded systems. Target Audience: This book is intended for Cybersecurity professionals, embedded system designers, and IoT device manufacturers who want to learn about prevention techniques against IoT-based attacks and Cybersecurity strategies for embedded systems.
Cybersecurity Mastery

Cybersecurity Mastery

Manish Singh; Girish Kumar

Lap Lambert Academic Publishing
2024
pokkari
Cybersecurity Mastery from Fundamentals to Advanced Techniques is your comprehensive guide to mastering the ever-evolving field of cybersecurity. Designed for readers ranging from novices to seasoned professionals, this book offers a structured and engaging approach to understanding and implementing cybersecurity principles and practices. In a world where digital threats are increasingly sophisticated, securing information has never been more critical. This book provides a complete roadmap for anyone looking to gain a deep understanding of cybersecurity. It covers fundamental concepts, advanced techniques, and practical applications, ensuring that readers are well-equipped to protect themselves and their organizations from cyber threats.This book, is designed for a diverse audience, including beginners who need a solid introduction to cybersecurity basics and practical guidance, intermediate practitioners seeking to expand their knowledge and skills, advanced professionals aiming to stay current with cutting-edge techniques and emerging trends, and students and educators.
Padronanza della sicurezza informatica

Padronanza della sicurezza informatica

Manish Singh; Girish Kumar

Edizioni Sapienza
2024
pokkari
Padronanza della sicurezza informatica dai fondamenti alle tecniche avanzate una guida completa per padroneggiare il campo in continua evoluzione della sicurezza informatica. Pensato per lettori che vanno dai principianti ai professionisti esperti, questo libro offre un approccio strutturato e coinvolgente alla comprensione e all'implementazione dei principi e delle pratiche di cybersecurity. In un mondo in cui le minacce digitali sono sempre pi sofisticate, la sicurezza delle informazioni non mai stata cos critica. Questo libro fornisce una tabella di marcia completa per chiunque voglia acquisire una conoscenza approfondita della sicurezza informatica. Copre concetti fondamentali, tecniche avanzate e applicazioni pratiche, assicurando che i lettori siano ben equipaggiati per proteggere se stessi e le loro organizzazioni dalle minacce informatiche.Questo libro si rivolge a un pubblico eterogeneo: ai principianti che necessitano di una solida introduzione alle nozioni di base della sicurezza informatica e di una guida pratica, ai professionisti intermedi che desiderano ampliare le proprie conoscenze e competenze, ai professionisti avanzati che desiderano rimanere aggiornati sulle tecniche all'avanguardia e sulle tendenze emergenti, agli studenti e agli educatori.
Entschärfung von Flooding-Angriffen im Consumer IoT

Entschärfung von Flooding-Angriffen im Consumer IoT

Manish Singh; Girish Kumar

Verlag Unser Wissen
2024
pokkari
Dieses Buch beginnt mit einer Einf hrung in das Konzept der eingebetteten Sicherheit, das den Schutz eingebetteter Systeme vor verschiedenen Bedrohungen und Schwachstellen umfasst. Es wird hervorgehoben, wie wichtig die Sicherung dieser Systeme angesichts ihrer weiten Verbreitung und ihrer kritischen Funktionen ist. Anschlie end gehen die Autoren auf das Aufkommen des Internet der Dinge (IoT) und dessen Auswirkungen auf die Angriffsfl che ein, was die Aufrechterhaltung einer konsistenten Sicherheitslage zu einer Herausforderung macht. Das Buch befasst sich mit vier allgemeinen Herausforderungen f r die Sicherheit eingebetteter Systeme, darunter das Fehlen allgemein anerkannter Standards oder bew hrter Verfahren, die Verwendung drahtloser Netzwerkverbindungen, die Integration von Hardware- und Softwarekomponenten verschiedener Hersteller und die langen Lebenszyklen eingebetteter Systeme.Zielpublikum: Dieses Buch richtet sich an Cybersicherheitsexperten, Entwickler von eingebetteten Systemen und Hersteller von IoT-Ger ten, die sich ber Pr ventionstechniken gegen IoT-basierte Angriffe und Cybersicherheitsstrategien f r eingebettete Systeme informieren m chten.
Mitigazione degli attacchi di flooding nell'IoT dei consumatori

Mitigazione degli attacchi di flooding nell'IoT dei consumatori

Manish Singh; Girish Kumar

Edizioni Sapienza
2024
pokkari
Questo libro inizia introducendo il concetto di sicurezza embedded, che prevede la protezione dei sistemi embedded da varie minacce e vulnerabilit . Sottolinea l'importanza di proteggere questi sistemi, data la loro diffusione e le loro funzioni critiche. Gli autori approfondiscono poi l'emergere dell'IoT e il suo impatto sulla superficie di attacco, rendendo difficile mantenere una postura di sicurezza coerente. Il libro esplora quattro sfide comuni per la sicurezza dei sistemi embedded, tra cui la mancanza di standard o best practice universalmente accettati, l'uso di connessioni di rete wireless, l'incorporazione di componenti hardware e software di diversi fornitori e i lunghi cicli di vita dei sistemi embedded.Destinatari: Questo libro destinato ai professionisti della sicurezza informatica, ai progettisti di sistemi embedded e ai produttori di dispositivi IoT che desiderano conoscere le tecniche di prevenzione degli attacchi basati sull'IoT e le strategie di sicurezza informatica per i sistemi embedded.
Atenuação de ataques de inundação na IoT do consumidor

Atenuação de ataques de inundação na IoT do consumidor

Manish Singh; Girish Kumar

Edicoes Nosso Conhecimento
2024
pokkari
Este livro come a por introduzir o conceito de seguran a incorporada, que envolve a prote o de sistemas incorporados contra v rias amea as e vulnerabilidades. Destaca a import ncia de proteger estes sistemas, dada a sua utiliza o generalizada e fun es cr ticas. Em seguida, os autores debru am-se sobre o surgimento da IoT e o seu impacto na superf cie de ataque, o que torna dif cil manter uma postura de seguran a consistente. O livro explora quatro desafios comuns de seguran a de sistemas incorporados, incluindo a falta de normas universalmente aceites ou de melhores pr ticas, a utiliza o de liga es de rede sem fios, a incorpora o de componentes de hardware e software de v rios fornecedores e os longos ciclos de vida dos sistemas incorporados.P blico-alvo: Este livro destina-se a profissionais de ciberseguran a, projectistas de sistemas incorporados e fabricantes de dispositivos IoT que pretendam conhecer t cnicas de preven o contra ataques baseados na IoT e estrat gias de ciberseguran a para sistemas incorporados.
Atténuer les attaques par inondation dans l'IdO grand public

Atténuer les attaques par inondation dans l'IdO grand public

Manish Singh; Girish Kumar

Editions Notre Savoir
2024
pokkari
Cet ouvrage commence par pr senter le concept de s curit embarqu e, qui consiste prot ger les syst mes embarqu s contre diverses menaces et vuln rabilit s. Il souligne l'importance de la s curisation de ces syst mes, compte tenu de leur utilisation g n ralis e et de leurs fonctions critiques. Les auteurs se penchent ensuite sur l' mergence de l'IdO et son impact sur la surface d'attaque, ce qui rend difficile le maintien d'une posture de s curit coh rente. Le livre explore quatre d fis communs en mati re de s curit des syst mes embarqu s, notamment l'absence de normes universellement accept es ou de meilleures pratiques, l'utilisation de connexions r seau sans fil, l'incorporation de composants mat riels et logiciels provenant de divers fournisseurs et les longs cycles de vie des syst mes embarqu s.Public cible: Ce livre s'adresse aux professionnels de la cybers curit , aux concepteurs de syst mes embarqu s et aux fabricants d'appareils IoT qui souhaitent conna tre les techniques de pr vention contre les attaques bas es sur l'IoT et les strat gies de cybers curit pour les syst mes embarqu s.
MicroPython Programming

MicroPython Programming

Manish Singh; Balraj Kumar; Mohit Arora

Lap Lambert Academic Publishing
2025
pokkari
This book offers a comprehensive guide to MicroPython programming, covering both the fundamentals and advanced concepts. It begins with a solid foundation in MicroPython, enabling readers to understand its core principles, syntax, and structure. The book delves deep into the implementation of MicroPython on various IoT platforms such as the ESP8266/ESP32, Micro: bit, and Raspberry Pi. Each chapter provides step-by-step instructions for programming and integrating sensors and actuators, allowing readers to create real-world IoT applications. The book emphasizes the importance of hands-on learning, with practical examples and projects that demonstrate how to effectively use MicroPython for IoT solutions. Additionally, it covers the essentials of IoT, including networking, data exchange, and device communication. By the end, readers will be equipped with the skills necessary to build robust IoT projects using MicroPython.Target Audience: The book is targeted at beginner to intermediate programmers, electronics enthusiasts, and hobbyists who wish to learn MicroPython programming and IoT development.
Advanced Manufacturing Processes

Advanced Manufacturing Processes

Nagendra Kumar Maurya; Manish Maurya; Sachin Dhull

Lap Lambert Academic Publishing
2025
pokkari
The rapid advancement of technology has revolutionized manufacturing, driving industries toward precision, sustainability, automation, and digital integration. Advanced manufacturing processes now serve as the backbone of innovation and competitiveness, demanding effective design, development, and optimization. This book, Advanced Manufacturing Processes: Design, Development, and Optimization, provides a comprehensive perspective that blends theoretical principles with practical applications. It emphasizes experimental, analytical, and computational approaches to process improvement, ensuring efficiency, reliability, and sustainability. With balanced coverage of fundamentals, state-of-the-art techniques, challenges, and optimization strategies, the text highlights the interdisciplinary nature of modern manufacturing. It is intended as a valuable resource for students, researchers, and professionals, serving as both a reference for academic study and a guide for industrial practice. By fostering innovation and critical thinking, the book inspires advancements in manufacturing knowledge for the future.