Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Society & social sciences 164
- Cloud computing 121
- Educación pedagogía 93
- Amazon Web Services (Firm) 86
- Descripción y viajes 72
- Historia 71
- Development 60
- Web services 58
- Humanities 51
- Application software 47
- Historia / General 43
- Computer networks 36
- Ciencias Políticas / General 33
- Derecho comunitario 31
- Examinations 31
- Certification 29
- Usos y costumbres 29
- Electronic data processing personnel 28
- Història 28
- Computer security 27
- Economics, finance, business & management 27
- Comunidad Económica Europea 25
- Governance 25
- Security measures 24
- Competencia económica 23
- Computer software 22
- Business & Economics 20
- Management 20
- Engineering & Applied Sciences 18
- Amazon.com (Firm) 17
-
2781Publicado 2022Tabla de Contenidos: “…Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- 1 A Look at IIoT: The Perspective of IoT Technology Applied in the Industrial Field -- 1.1 Introduction -- 1.2 Relationship Between Artificial Intelligence and IoT -- 1.2.1 AI Concept -- 1.2.2 IoT Concept -- 1.3 IoT Ecosystem -- 1.3.1 Industry 4.0 Concept -- 1.3.2 Industrial Internet of Things -- 1.4 Discussion -- 1.5 Trends -- 1.6 Conclusions -- References -- 2 Analysis on Security in IoT Devices- An Overview -- 2.1 Introduction -- 2.2 Security Properties -- 2.3 Security Challenges of IoT -- 2.3.1 Classification of Security Levels -- 2.3.1.1 At Information Level -- 2.3.1.2 At Access Level -- 2.3.1.3 At Functional Level -- 2.3.2 Classification of IoT Layered Architecture -- 2.3.2.1 Edge Layer -- 2.3.2.2 Access Layer -- 2.3.2.3 Application Layer -- 2.4 IoT Security Threats -- 2.4.1 Physical Device Threats -- 2.4.1.1 Device-Threats -- 2.4.1.2 Resource Led Constraints -- 2.4.2 Network-Oriented Communication Assaults -- 2.4.2.1 Structure -- 2.4.2.2 Protocol -- 2.4.3 Data-Based Threats -- 2.4.3.1 Confidentiality -- 2.4.3.2 Availability -- 2.4.3.3 Integrity -- 2.5 Assaults in IoT Devices -- 2.5.1 Devices of IoT -- 2.5.2 Gateways and Networking Devices -- 2.5.3 Cloud Servers and Control Devices -- 2.6 Security Analysis of IoT Platforms -- 2.6.1 ARTIK -- 2.6.2 GiGA IoT Makers -- 2.6.3 AWS IoT -- 2.6.4 Azure IoT -- 2.6.5 Google Cloud IoT (GC IoT) -- 2.7 Future Research Approaches -- 2.7.1 Blockchain Technology -- 2.7.2 5G Technology -- 2.7.3 Fog Computing (FC) and Edge Computing (EC) -- References -- 3 Smart Automation, Smart Energy, and Grid Management Challenges -- 3.1 Introduction -- 3.2 Internet of Things and Smart Grids -- 3.2.1 Smart Grid in IoT -- 3.2.2 IoT Application -- 3.2.3 Trials and Imminent Investigation Guidelines…”
Libro electrónico -
2782
-
2783
-
2784por Organisation for Economic Co-operation and Development.“…The fecundity of the mites exposed to the test substance is compared to that of controls in order to determine the ECx (e.g. EC10, EC50) or the No Observed Effect Concentration (NOEC). …”
Publicado 2016
Libro electrónico -
2785por Organisation for Economic Co-operation and Development.“…The fecundity of the mites exposed to the test substance is compared to that of controls in order to determine the ECx (e.g. EC10, EC50) or the No Observed Effect Concentration (NOEC). …”
Publicado 2008
Libro electrónico -
2786
-
2787
-
2788Publicado 2004Tabla de Contenidos: “…3.17.2 Hot standby (Secondary Host promotion) -- 3.17.3 Use of record level sharing (RLS) for CDSs -- 3.17.4 DFSMShsm recommendations -- 3.18 Catalog -- 3.18.1 VVDS mode catalog sharing -- 3.18.2 Enhanced catalog sharing (ECS) -- 3.18.3 Catalog integrity -- 3.18.4 Catalog performance -- 3.18.5 Catalog sizing -- 3.18.6 Catalog backup and recovery -- 3.18.7 Catalog security -- 3.18.8 Catalog recommendations -- 3.19 Software maintenance -- 3.19.1 Types of maintenance -- 3.19.2 Classification of maintenance -- 3.19.3 Sources of maintenance -- 3.19.4 Consolidated Service Test (CST) -- 3.19.5 Enhanced Holddata -- 3.19.6 Software maintenance recommendations -- 3.20 Testing the sysplex -- 3.20.1 Test Sysplex -- 3.20.2 Sysplex testing recommendations -- 3.21 Planned outages -- 3.21.1 APPC/MVS configuration -- 3.21.2 APPC/MVS Transaction Scheduler -- 3.21.3 Authorized Program Facility (APF) -- 3.21.4 Diagnostics -- 3.21.5 Dump options -- 3.21.6 Dump Analysis and Elimination (DAE) -- 3.21.7 Console management -- 3.21.8 Console group management -- 3.21.9 Exits -- 3.21.10 Global Resource Serialization (GRS) -- 3.21.11 IODF management -- 3.21.12 IOS -- 3.21.13 LNKLST -- 3.21.14 LOGREC error recording -- 3.21.15 LPALST -- 3.21.16 Message Processing Facility (MPF) -- 3.21.17 MVS Message Service (MMS) -- 3.21.18 Local Page Data Sets -- 3.21.19 Parmlib concatenation -- 3.21.20 Products -- 3.21.21 Program properties table -- 3.21.22 Run-time library services (RTLS) -- 3.21.23 SLIP -- 3.21.24 System Measurement Facility (SMF) -- 3.21.25 Storage Management Subsystem (SMS) -- 3.21.26 Subsystem Names (SSN) -- 3.21.27 System Resources Manager (SRM) -- 3.21.28 Time Sharing Option (TSO) -- 3.21.29 UNIX System Services (USS) -- 3.21.30 XCF -- 3.21.31 Planned outages recommendations -- 3.22 Unplanned outages -- 3.22.1 Dump options -- 3.22.2 ABEND dumps -- 3.22.3 SVC dumps…”
Libro electrónico -
2789Publicado 2013“…He holds 28 industry certifications, including CISSP, ISSAP, Certified Ethical Hacker, Certified Hacking Forensics Investigator, EC Council Certified Security Administrator, and EC Council Certified Instructor. …”
Libro electrónico -
2790Publicado 2022“…This book shows you how to set up microservices that are robust, scalable, and capable of running on GKE (Google Kubernetes Service), AKS (Azure Kubernetes Service), ECS (Elastic Container Service), or even on a vanilla K8S cluster. …”
Libro electrónico -
2791Publicado 2021“…Once the book has helped you develop your foundational knowledge of CloudWatch, you’ll be able to build your practical skills in monitoring and alerting various Amazon Web Services, such as EC2, EBS, RDS, ECS, EKS, DynamoDB, AWS Lambda, and ELB, with the help of real-world use cases. …”
Libro electrónico -
2792
-
2793por Organisation de coopération et de développement économiques.“…La fécondité des acariens exposés à la substance d’essai est comparée à celle des femelles témoins afin de déterminer la ECx (p.ex. EC10, EC50) ou la concentration pour laquelle aucun effet n’est observé (NOEC). …”
Publicado 2016
Libro electrónico -
2794por Organisation de coopération et de développement économiques.“…La fécondité des acariens exposés à la substance d’essai est comparée à celle des femelles témoins afin de déterminer la ECx (p.ex. EC10, EC50) ou la concentration pour laquelle aucun effet n’est observé (NOEC). …”
Publicado 2008
Libro electrónico -
2795Publicado 2015“…The IBM z13 Model NE1 is estimated to provide up to 40% more total system capacity than the IBM zEnterprise® EC12 (zEC1) Model HA1. This book provides information about the IBM z13 and its functions, features, and associated software support. …”
Libro electrónico -
2796Publicado 2016“…The IBM z13 Model NE1 is estimated to provide up to 40% more total system capacity than the IBM zEnterprise® EC12 (zEC1) Model HA1. This book provides information about the IBM z13 and its functions, features, and associated software support. …”
Libro electrónico -
2797Publicado 2007“…In addition to solutions facilitated by EC, this short cut also illustrates two known approximations to AHP solutions using manual calculations. …”
Libro electrónico -
2798Publicado 2021“…The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. …”
Libro electrónico -
2799
-
2800