ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Quantum Computing and Other Transformative Technologies

دانلود کتاب محاسبات کوانتومی و سایر فناوری‌های تحول‌آفرین

Quantum Computing and Other Transformative Technologies

مشخصات کتاب

Quantum Computing and Other Transformative Technologies

ویرایش:  
نویسندگان:   
سری: River Publishers Series in Computing and Information Science and Technology 
ISBN (شابک) : 8770226849, 9788770226844 
ناشر: River Publishers 
سال نشر: 2023 
تعداد صفحات: 259
[260] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 20 Mb 

قیمت کتاب (تومان) : 33,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 3


در صورت تبدیل فایل کتاب Quantum Computing and Other Transformative Technologies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب محاسبات کوانتومی و سایر فناوری‌های تحول‌آفرین نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب محاسبات کوانتومی و سایر فناوری‌های تحول‌آفرین



این کتاب محاسبات کوانتومی را به‌عنوان یک فناوری دگرگون‌کننده و کاربردهای آن در ارتباطات، رمزنگاری، حمل‌ونقل از راه دور، اینترنت اشیا، هوش مصنوعی و بلاک چین، علاوه بر مفهوم انقلابی اینترنت کوانتومی بررسی می‌کند. همچنین مفهوم داده های تاریک، کوچک و غلیظ را توضیح می دهد و مفهوم دریاچه داده را روشن می کند. سایر فناوری‌های هیجان‌انگیز مانند محاسبات لبه/مه، CDN، SDN، فناوری پوشیدنی و موضوعات IoE به تفصیل در کتاب مورد بحث قرار گرفته‌اند. کاربردهای امنیت اطلاعات مانند مدل اعتماد صفر، آسیب‌پذیری روز صفر و تحلیل اکتشافی و استفاده از هوش مصنوعی در امنیت سایبری مورد بررسی قرار گرفته‌اند. دو مورد از جذاب‌ترین مفاهیم در محاسبات، "محاسبات عاطفی" و "محاسبات خودکار" توضیح داده شده و ساده شده‌اند. برنامه های بلاک چین ارائه شده شامل بلاک چین و زنجیره تامین، جمع سپاری، ارز دیجیتال و اینترنت اشیا است. کتاب با نگاهی به استفاده از فناوری برای مبارزه با کووید-19 و همه‌گیری‌های آینده به پایان می‌رسد.


توضیحاتی درمورد کتاب به خارجی

This book explores quantum computing as a transformative technology and its applications in communications, cryptography, teleportation, IoT, AI, and blockchain, in addition to the revolutionary concept of quantum internet. It also explains the concept of dark, small, thick data, and clarifies the concept of a data lake. Other exciting technologies like edge/fog computing, CDN, SDN, wearable technology and IoE topics are discussed in detail in the book. Information security applications like zero trust model, zero-day vulnerability and heuristic analysis, and use of AI in cybersecurity are explored. Two of the most intriguing concepts in computing, “affective computing” and “autonomic computing”, are explained and simplified. The blockchain applications presented include blockchain and supply chain, crowdsourcing, cryptocurrency, and IoT. The book ends with a look at using technology to fight COVID-19 and future pandemics.



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Audience
Acknowledgment
List of Figures
List of Abbreviations
Introduction
Part 1: Quantum Computing
	Chapter 1: What is Quantum Computing?
		1.1: A Comparison of Classical and Quantum Computing
		1.2: Quantum Superposition and Entanglement
		1.3: Difficulties with Quantum Computers
		1.4 The Future of Quantum Computing
		References
	Chapter 2: Quantum Cryptography
		2.1: Problems with using Quantum Cryptography
		References
	Chapter 3: Quantum Internet
		3.1: What is Quantum Internet?
		3.2: Quantum Communications
		References
	Chapter 4: Quantum Teleportation
		4.1: Quantum Teleportation: Paving the Way for a Quantum Internet
		References
	Chapter 5: Quantum Computing and IoT
		5.1: A Comparison of Classical and Quantum Computing
		5.2: Quantum Communications
		5.3: Quantum Computing and IoT
		5.4: The Road Ahead
		References
	Chapter 6: Quantum Computing and Blockchain: Myths and Facts
		6.1: Difficulties with Quantum Computers
		6.2: What Is Quantum Supremacy?
		6.3: What is Quantum Cryptography?
		References
	Chapter 7: Quantum Computing and AI: A Mega-Buzzword
		7.1: What is Quantum Computing?
		7.2: Difficulties with Quantum Computers
		7.3: Applications of Quantum Computing and AI
		7.4: Processing Large Sets of Data
		7.5: Solve Complex Problem Faster
		7.6: Better Business Insights and Models
		7.7: Integration of Multiple Sets of Data
		7.8: The Future
		References
	Chapter 8: Quantum Computing Trends
		8.1: A Comparison of Classical and Quantum Computing
		8.2: Physical vs. Logical Qubits
		8.3: Quantum Superposition and Entanglement
		8.4: Quantum Emulator/Simulator
		8.5: Quantum Annealer
		8.6: Noisy Intermediate-Scale Quantum (NISQ) Computers
		8.7: Universal Quantum Computers/Cryptographically Relevant Quantum Computers (CRQC)
		8.8: Post-Quantum/Quantum-Resistant Codes
		8.9: Difficulties with Quantum Computers
		References
Part 2: Other Computing Technologies
	Chapter 9: What is Deep Learning?
		9.1: Neural Network
		9.2: Deep Learning vs. Machine Learning
		9.3: The Deep Learning Game
		9.4: The Future
		References
	Chapter 10: Affective Computing
		10.1: Emotion in Machines
		10.2: The Future
		References
	Chapter 11: Autonomic Computing
		11.1: Benefits
		11.2: Future of Autonomic Computing
		References
Part 3: Big Data, Dark Data, Thick Data, and Small Data
	Chapter 12: Thick Data vs. Big Data
		12.1: Comparison of Big Data and Thick Data
		References
	Chapter 13: Understanding Dark Data
		13.1: Types of Dark Data
		13.2: Value of Dark Data
		13.3: Future of Dark Data
		References
	Chapter 14: Small Data vs. Big Data: Back to the Basics
		14.1: Why Small Data?
		14.2: The Future of Small Data
		References
	Chapter 15: What is a Data Lake?
		15.1: Data Lake vs. Data Warehouse
		15.2: Five Key Components of a Data Lake Architecture
		15.3: Data Lake Advantages
		15.4: Data Lake Disadvantages
		15.5: The Future
		References
Part 4: Cloud Computing
	Chapter 16: Edge Computing Paradigm
		16.1: Advantages of Edge Computing
		16.2: Benefits of Edge Computing
		16.3: Real-Life Example
		16.4: Future of Edge Computing
		References
	Chapter 17: The Internet of Everything
		17.1: What is the Internet of Everything (IoE)?
		17.2: Pillars of the Internet of Everything (IoE)
		17.3: The Internet of Things (IoT)
		17.4: The Difference Between IoE and IoT
		17.5: The Future
		References
	Chapter 18: Content Delivery Networks – CDNs
		18.1: Dynamics of CDNs
		18.2: Difference Between Serving Content without a CDN and with a CDN
		18.3: Types of Services
		18.4: Advantages of CDNs
		18.5: Disadvantages of CDNs
		18.6: The Future
		References
	Chapter 19: Network Functions Virtualization (NFV) or Software-Defined Networking (SDN)?
		19.1: What is Network Functions Virtualization (NFV)?
		19.2: The Benefits of NFV
		19.3: Types of NFV
		19.4: Which is Better – SDN or NFV?
		19.5: The Future of NFV
		References
	Chapter 20: What is Virtualization?
		20.1: What is Virtualization?
		20.2: Types of Virtualizations
		20.3: How is Virtualization Different from Cloud Computing?
		20.4: The Future of Virtualization
		References
	Chapter 21: Risks of Cloud Computing Explained (Both Sides)
		21.1: The Risks Will Never Diminish
		References
	Chapter 22: Cloud-of-Clouds or (Intercloud)
		22.1: The Future
		References
	Chapter 23: Myths and Facts About Cloud Computing
		23.1: Types of Cloud Computing
		23.2: The Promise of Cloud Computing
		23.3: What is Next for Cloud Computing?
Part 5: Security
	Chapter 24: Zero-Day Vulnerability and Heuristic Analysis
		24.1: What is a Zero-Day Vulnerability?
		24.2: Zero-Day Exploit
		24.3: Zero-Day Threat
		24.4: Defending Against Zero-Day Threats
		24.5: What are Heuristics?
		References
	Chapter 25: The Zero Trust Model
		25.1: “Outside-In” to “Inside-Out” Attacks
		25.2: Zero Trust Recommendations
		References
	Chapter 26: Cloud Computing Security
		26.1: Cloud Security Threats
		26.2: The Future
	Chapter 27: First Line of Defense for Cybersecurity: AI
		27.1: Four Fundamental Security Practices
			27.1.1: Identifying the patterns
			27.1.2: Educating the users
			27.1.3: Patching the holes
			27.1.4: Checking off the controls
		27.2: Challenges Faced by AI in Cybersecurity
			27.2.1: AI-powered attacks
			27.2.2: More sandbox-evading malware
			27.2.3: Ransomware and IoT
			27.2.4: A rise of state-sponsored attacks
			27.2.5: Shortage of skilled staff
			27.2.6: IT infrastructure
		27.3: The Future of Cybersecurity and AI
		References
	Chapter 28: Second Line of Defense for Cybersecurity: Blockchain
		28.1: Implementing Blockchain in Cybersecurity
		28.2: Advantages of using Blockchain in Cybersecurity
			28.2.1: Decentralization
			28.2.2: Tracking and tracing
			28.2.3: Confidentiality
			28.2.4: Fraud security
			28.2.5: Sustainability
			28.2.6: Integrity
			28.2.7: Resilience
			28.2.8: Data quality
			28.2.9: Smart contracts
			28.2.10: Availability
			28.2.11: Increased customer trust
		28.3: Disadvantages of using Blockchain in Cybersecurity
			28.3.1: Irreversibility
			28.3.2: Storage limits
			28.3.3: Risk of cyberattacks
			28.3.4: Adaptability challenges
			28.3.5: High operation costs
			28.3.6: Blockchain literacy
		28.4: Conclusion
		References
	Chapter 29: Network Security Needs Big Data
		29.1: Zero Trust Model (ZTM)
		29.2: Big Data and ZTM
Part 6: Blockchain
	Chapter 30: Blockchain Technology and COVID-19
		30.1: Major Challenges of COVID-19
		30.2: Can Blockchain Help in Preventing Pandemics?
		30.3: Tracking Infectious Disease Outbreaks
		30.4: Donations Tracking
		30.5: Crisis Management
		30.6: Securing Medical Supply Chains
		30.7: WHO and Blockchain Technology
		References
	Chapter 31: How Blockchain is Revolutionizing Crowdfunding
		31.1: Limitations of Current Crowdfunding Platforms
		31.2: How Blockchain Helps Crowdfunding
		References
	Chapter 32: Blockchain Technology and Supply Chain Management
		32.1: Blockchain and SCM
		32.2: Applications of Blockchain in SCM
		References
Part 7: IoT
	Chapter 33: IoT and COVID-19
		33.1: IoT and WFH
		33.2: IoT and Blockchain
		33.3: IoT and E-Commerce
		33.4: IoT and Telemedicine
		References
	Chapter 34: IoT and 5G Convergence
		34.1: Benefits of using 5G in IoT
			34.1.1: Higher transmission speed
			34.1.2: More devices connected
			34.1.3: Lower latency
		34.2: Challenges Faced by 5G and IoT Convergence
			34.2.1: Operating across multiple spectrum bands
			34.2.2: A gradual upgradation from 4G to 5G
			34.2.3: Data interoperability
			34.2.4: Establishing 5G business models
		34.3: Examples of Applications of 5G in IoT
			34.3.1: Automotive
			34.3.2: Industrial
			34.3.3: Healthcare
		References
Part 8: Wearable and Mobile Technology
	Chapter 35: The Smart Platform: Wearable Computing Devices (WCD)
		35.1: Concerns with Wearable Computing Devices
		35.2: Applications of Wearable Computing Devices
		35.3: The Future of Wearable Computing Devices
		References
	Chapter 36: Your Smart Device Will Feel Your Pain and Fear
		References
	Chapter 37: Technology Under Your Skin: Three Challenges of Microchip Implants
		References
Part 9: Future Trends in Technology
	Chapter 38: The Metaverse: A Different Perspective
		38.1: Different Perspective of the Metaverse
		38.2: Pillars of the Metaverse
		38.3: The Future
		References
	Chapter 39: The Metaverse: Myths and Facts
		39.1: Myths about the Metaverse
			39.1.1: Myth #1: No one knows what the metaverse is
			39.1.2: Myth #2: The metaverse is only gaming
			39.1.3: Myth #3: The metaverse is only virtual reality
			39.1.4: Myth #4: The metaverse will replace the real world
			39.1.5: Myth #5: The metaverse is a fad
			39.1.6: Myth #6: The metaverse will be a monopoly
			39.1.7: Myth #7: The speed of technology will set the pace for adoption
			39.1.8: Myth #8: The metaverse is already here
			39.1.9: Myth #9: The metaverse is inevitable
			39.1.10: Myth #10: The metaverse is suitable for everything
		39.2: What is the Future of the Metaverse?
		References
	Chapter 40: Eight Key Tech Trends in a Post-COVID-19 World
		40.1: Artificial Intelligence (AI)
		40.2: Cloud Computing
		40.3: VR/AR
		40.4: 5G Networks
		40.5: Voice User Interface (VUI)
		40.6: Internet of Things (IoT)
		40.7: Cybersecurity
		40.8: Blockchain Technology
		40.9: Tracking Infectious Disease Outbreaks
		40.10: Donations Tracking
		40.11: Crisis Management
		40.12: Securing Medical Supply Chains
		References
References
Index
About the Author




نظرات کاربران