Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Cloud computing 1,800
- Development 393
- Application software 370
- Amazon Web Services (Firm) 252
- Computer networks 236
- Management 230
- Web services 228
- Examinations 220
- Security measures 216
- Information technology 166
- Certification 159
- Computer security 150
- Electronic data processing personnel 144
- Windows Azure 139
- Database management 111
- Artificial intelligence 107
- Microsoft Azure (Computing platform) 107
- Big data 103
- Electronic data processing 103
- Machine learning 100
- Web applications 100
- Data processing 97
- Engineering & Applied Sciences 96
- Computer Science 83
- Computer programs 82
- Computer software 82
- Open source software 76
- Internet of things 66
- Application program interfaces (Computer software) 62
- Distributed processing 61
-
2341por Joseph, Vinod“…It moves on to cover next-generation networks and mobile architectures, as well as cloud computing. The book also addresses the convergence of optical, Ethernet and IP…”
Publicado 2014
Libro electrónico -
2342Publicado 2020“…These are illustrated through a series of case studies in cloud computing, telecommunications, big data analytics, and smart cities. …”
Libro electrónico -
2343Publicado 2017“…Sales growth starts with planning Sales accounts are harder than ever to win, let alone keep. Globalization, cloud computing, and crowdsourcing create a marketplace where any account can be lured away by a hungry startup. …”
Libro electrónico -
2344Publicado 2015“…The bestselling second edition of Uptime has been used as a textbook on maintenance management in several postsecondary institutions and by many companies as the model framework for their maintenance management programs.Following in the tradition of its bestselling predecessors, Uptime: Strategies for Excellence in Maintenance Management, Third Edition explains how to deal with increasingly complex technologies, such as mobile and cloud computing, to support maintenance departments and set the stage for compliance with international standards for asset management.This updated edition reflects a far broader and deeper wealth of experience and knowledge. …”
Libro electrónico -
2345Publicado 2022Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Introduction -- Chapter 1: What Is Cloud Computing? -- What Is Kubernetes? -- Kubernetes Flavors -- A Bird's-eye View of the Kubernetes Architecture -- Setting up a K8s Cluster -- Common CLI Commands -- Case 1 -- Case 2 -- Case 3 -- Summary -- Chapter 2: Creating Applications on Kubernetes -- Create an Apache HTTP Server -- Create a Java Tomcat WAR-based Server -- Create a gRPC Server -- Differences in Creating Applications for Kubernetes -- State of a Pod -- Ingress Controller -- Installation Steps -- Access an Application via Ingress Controller -- Summary -- Chapter 3: CI/CD Systems -- Overview -- Under the Hood -- Continuous Integration (CI) -- Continuous Delivery (CD) -- Continuous Deployment (CD) -- Designing Continuous Delivery vs. …”
Libro electrónico -
2346Publicado 2021Tabla de Contenidos: “…Cover -- FM -- Table of Contents -- Preface -- Chapter 1: Linux: History and future in the cloud -- A brief history of Linux -- Unix -- Linux -- Linux version history -- Linux evolution and distributions -- Typical Linux use cases in IT infrastructure -- Workstations -- Application servers -- Database servers -- Virtualization -- Containers -- Cloud computing -- Container orchestration -- Big data -- Challenges in on-premises infrastructure -- Cloud economics -- Scale comes with benefits -- Many services available -- Benefits of migrating to Azure -- The journey from Linux to Azure -- Clustering -- Subscription portability -- Summary -- Chapter 2: Understanding Linux distributions -- Linux licensing and open-source business models -- Open-source licenses -- Enterprise agreements -- Linux subscriptions -- Popular Linux distributions -- Linux on Azure -- Benefits of Linux on Azure -- Linux support scope -- Licensing on Azure -- Available distros -- Summary -- Chapter 3: Assessment and migration planning -- Popular workloads on Linux -- LAMP -- Database servers -- HPC, clustering, and SAP -- Shared storage -- Pre-project preparations -- Identifying relevant roles and responsibilities -- Cloud governance and operations -- Migration assessment -- Preparing a cloud migration plan -- Discovery and evaluation -- Involving key stakeholders -- Estimating the savings -- Identifying tools -- Assessing tooling -- Azure Migrate -- Service Map -- Azure TCO calculator -- Hands-on assess lab -- Prerequisites -- Setting up the Azure Migrate project -- Setting up and registering the Azure Migrate appliance -- Verifying discovered VMs in the portal -- Running an assessment -- Reviewing the assessment -- Dependency analysis -- Summary -- Chapter 4: Performing migration to Azure -- Hands-on migration lab -- Migrating servers to Azure -- Migrating databases -- Summary…”
Libro electrónico -
2347Publicado 2015Tabla de Contenidos: “…Chapter 7: Security Attacks and Countermeasures in Cloud ComputingChapter 8: Optimizing Ant-Based Internet Protocol Traceback; Chapter 9: A Case Study on Security Issues in LTE Backhaul and Core Networks; Chapter 10: A Case Study of Intelligent IDS False Alarm Reduction in Cloud Environments: Challenges and Trends; Chapter 11: Attacks in Wireless Sensor Networks and Their Countermeasures; Chapter 12: Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; Chapter 13: The Impact of Application-Layer Denial-of- Service Attacks…”
Libro electrónico -
2348por Cordón García, José AntonioTabla de Contenidos: “…3New business models for reading in the cloudWhat are 'cloud computing' and cloud hosting?; Books and cloud services for the eBook; Cloud business models; Cloud user rights; Conclusion; Notes; 4Open access eBooks; Introduction; What is open access?…”
Publicado 2013
Libro electrónico -
2349Publicado 2022Tabla de Contenidos: “…Front Matter -- In Silico Molecular Modeling and Docking Analysis in Lung Cancer Cell Proteins / Manisha Sritharan, Asita Elengoe -- Medical Data Classification in Cloud Computing Using Soft Computing With Voting Classifier: A Review / Saurabh Sharma, Harish K Shakya, Ashish Mishra -- Research Challenges in Pre-Copy Virtual Machine Migration in Cloud Environment / Devi N Nirmala, Kumar S Vengatesh -- Estimation and Analysis of Prediction Rate of Pre-Trained Deep Learning Network in Classification of Brain Tumor MRI Images / Krishnamoorthy Raghavan Narasu, Anima Nanda, D Marshiana, Bestley Joe, Vinoth Kumar -- An Intelligent Healthcare Monitoring System for Coma Patients / Janney J Bethanney, T Sudhakar, Sindu Divakaran, H Chandana, Chriselda L Caroline -- Deep Learning Interpretation of Biomedical Data / TR Thamizhvani, R Chandrasekaran, TR Ineyathendral -- Evolution of Electronic Health Records / G Umashankar, P Abinaya, J Premkumar, T Sudhakar, S Krishnakumar -- Architecture of IoMT in Healthcare / A Josephin Arockia Dhiyya -- Performance Assessment of IoMT Services and Protocols / A Keerthana, Karthiga -- Performance Evaluation of Wearable IoT-Enabled Mesh Network for Rural Health Monitoring / G Merlin Sheeba, Y Bevish Jinila -- Management of Diabetes Mellitus (DM) for Children and Adults Based on Internet of Things (IoT) / S Krishnakumar, G Umashankar, Christy V Lumen, Vikas, RJ Hemalatha -- Wearable Health Monitoring Systems Using IoMT / Jaya Rubi, A Josephin Arockia Dhivya -- Future of Healthcare: Biomedical Big Data Analysis and IoMT / G Tamiziniyan, A Keerthana -- Medical Data Security Using Blockchain With Soft Computing Techniques: A Review / Saurabh Sharma, Harish K Shakya, Ashish Mishra -- Electronic Health Records: A Transitional View / G Srividhya -- Index -- Also of Interest…”
Libro electrónico -
2350Publicado 2015Tabla de Contenidos: “…Chapter 7: Tutorial on Random Number Generators in Discrete Event SimulatorsChapter 8: Accurate and Reliable Simulation Framework for Mobile Computing Systems Using Stochastic Differential Equations; Chapter 9: How to Simulate and Evaluate Multicast Routing Algorithms; Chapter 10: Statistical Simulation of Multipath Fading Channels for Mobile Wireless Digital Communication Systems; Chapter 11: Simulation Tools for Cloud Computing; Chapter 12: Simulation Tools for Broadband Passive Optical Networks…”
Libro electrónico -
2351Publicado 2019Tabla de Contenidos: “…9 Organization Assignment in Federated Cloud Environments based onMulti-Target Optimization of Security -- 9.1 Introduction -- 9.2 Background Work Related to Domain -- 9.2.1 Basics on Cloud computing -- 9.2.2 Clouds Which are Federated -- 9.2.3 Cloud Resource Management -- 9.3 Architectural-Based Cloud Security Implementation -- 9.4 Expected Results of the Process -- 9.5 Conclusion -- References -- 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee -- 10.1 Introduction -- 10.1.1 Key Research Problems in This Area -- 10.1.2 Problems with Interoperability -- 10.2 Difficulties from a Cloud Adoption Perspective -- 10.3 Security and Privacy -- 10.3.1 Resource Provisioning -- 10.3.1.1 Unwavering Quality -- 10.3.1.2 Interoperability -- 10.3.2 How Do We Define Cloud? …”
Libro electrónico -
2352por Bijalwan, AnchitTabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: Emerging Research in Next Generation Computing Like Cloud Computing, Cybersecurity, and Gaming -- Chapter 1 Deploying Virtual Desktop Infrastructure with Open-Source Platform for Higher Education -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Cloud Computing -- 1.2.2 Virtualization -- 1.3 VDI Deployment Using CloudStack as a Private Cloud -- 1.4 Deploy at Information Technology Laboratories -- 1.5 Conclusion -- References -- Chapter 2 Enhancing Intrusion Detection Effectiveness Through an Enhanced Hierarchical Communication Architecture -- 2.1 Introduction -- 2.2 Related Works -- 2.3 Proposed Model -- 2.4 Analysis -- 2.5 Conclusion -- References -- Chapter 3 Enhanced SDN Security Using Mobile Agent -- 3.1 Introduction -- 3.1.1 Introduction to SDN -- 3.1.2 SDN Compared to Conventional Networking -- 3.2 Network Security in SDN -- 3.2.1 Vulnerabilities in SDN -- 3.2.2 Threats on SDN -- 3.3 Enhanced SDN Network Security Using Mobile Agent -- 3.3.1 Cloud Network Management Mobile Agent (CNMMA) Architecture Model -- 3.3.2 Mobile Agent Platform (MAP) -- 3.3.3 Network Management Mobile Agent -- 3.3.4 Mobile Agent Distributed Intrusion Detection System Framework (MA-DIDS) -- 3.3.4.1 IDS-Control Center -- 3.3.4.2 Mobile Agent SDN Control App -- 3.3.5 SDN Network Simulator -- 3.4 Conclusions -- References -- Chapter 4 Understanding the Impact and Implications of Emagnet and Pastebin in Cybersecurity -- 4.1 Introduction -- 4.1.1 Background of Emagnet and Pastebin -- 4.1.2 Importance of the Research -- 4.1.2.1 Research Questions -- 4.2 Literature Review -- 4.2.1 Evolution of Pastebin as a Platform for Hacker Exploits -- 4.2.1.1 Emagnet's Capabilities and Functionalities -- 4.3 Leaked Databases -- 4.4 Methodology -- 4.4.1 Emagnet -- 4.4.2 Key Features and Known Issues…”
Publicado 2024
Libro electrónico -
2353Publicado 2025Tabla de Contenidos: “…2.2.2 Catalog and Clearinghouse Based on Service-Oriented Architecture and Standard Services -- 2.2.3 Semantic-Based Metadata Sharing and Data Discovery -- 2.3 Technological Issues and Solutions -- 2.3.1 Interoperability -- 2.3.2 Provenance and Updating -- 2.3.3 System Performance -- 2.3.4 Timely Updating -- 2.4 Design and Implementation of CLH -- 2.4.1 Architecture -- 2.4.2 Administration, User, and Group Management -- 2.4.3 Harvesting -- 2.4.4 Metadata Standards and Transformation -- 2.4.5 User Interface and Programming APIs -- 2.4.5.1 Search through Web Graphics User Interface -- 2.4.5.2 Remote Search -- 2.5 Usage and Operational Status -- 2.5.1 System Operations -- 2.5.2 System Metadata Status -- 2.5.3 Usage -- 2.6 Big Geospatial Data Challenges and Solutions -- 2.6.1 Data and Database -- 2.6.2 Distribution and Cloud Computing -- 2.6.3 Searching Performance and Index -- 2.7 Summary and Future Research -- Acknowledgments -- Notes -- References -- Chapter 3: Using a Cloud Computing Environment to Process Large 3D Spatial Datasets -- 3.1 Introduction -- 3.1.1 Big Spatial Data -- 3.1.2 Need for Cloud Computing Environment -- 3.2 Methodology -- 3.2.1 Iowa LiDAR Database -- 3.2.2 CLiPS Design and Implementation -- 3.3 Results -- 3.3.1 Application Example: DEM Generation Using Large LiDAR Datasets -- 3.3.2 Heuristic Models Development -- 3.4 Conclusions -- Acknowledgment -- References -- Chapter 4: Building Open Environments to Meet Big Data Challenges in Earth Sciences -- 4.1 Introduction -- 4.2 Technology Foundation and Methodology -- 4.2.1 Interoperability -- 4.2.2 Serviceability -- 4.2.3 Infrastructure -- 4.3 Discussions -- 4.4 Summary -- References -- Chapter 5: Developing Online Visualization and Analysis Services for NASA Satellite-Derived Global Precipitation Products during the Big Geospatial Data Era -- 5.1 Introduction…”
Libro electrónico -
2354Publicado 2024Tabla de Contenidos: “…Models of delivery -- A case study -- Practical scenario - step-by-step smart energy monitoring and management system -- Requirements -- Connection diagram -- Setting up and connecting the hardware -- Configuring the connection for the access point -- Summary -- Further reading -- Chapter 6: Creating Applications on the Edge -- Technical requirements -- TensorFlow -- Edge computing fundamentals and its benefits for IoT -- Edge computing architecture -- Benefits of edge computing -- A sample edge computing exercise -- Requirements of IoT for edge computing -- Resource management -- The three laws of IoT -- Optimizing edge computing on networks -- Strategies for optimizing edge computing workloads -- Evaluating edge networks -- Smart city case study -- Practical - smart traffic control with edge computing -- Assembling the circuit -- Writing the code -- Testing the system -- Summary -- Further reading -- Chapter 7: Working with Cloud Computing to Power IoT Solutions -- Technical requirements -- Setting up your AWS account -- Fundamentals of cloud computing with IoT -- The main advantages of cloud computing -- Cloud computing deployment models -- Services to work with for IoT -- Identity Access Manager (IAM) -- Amazon Elastic Compute Cloud (Amazon EC2) -- AWS IoT Core -- AWS IoT Greengrass -- AWS IoT SiteWise -- AWS Lambda -- Amazon Simple Queue Service (SQS) -- Amazon Simple Notification Service (SNS) -- Other notable AWS services for IoT -- A practical exercise utilizing the services -- Optimizing for resilience and low latency -- A simple architecture -- Evaluating your solution -- Practical-creating a cloud proximity detector -- Assembling the circuit -- Writing the code -- Testing the installation -- Troubleshooting and optimization -- Summary -- Further reading -- Chapter 8: Designing for Interoperability -- Technical requirements…”
Libro electrónico -
2355Publicado 2016“…Ya que hoy en día el sistema de información se extiende en gran medida fuera de las fronteras de la empresa, el libro tiene en cuenta los nuevos modelos tecnológicos como son el uso de terminales móviles tipo Smartphone, el Cloud Computing y los objetos que imponen la aplicación de nuevas estrategias de protección. …”
Acceso con credenciales UPSA.
Libro electrónico -
2356Publicado 2021“…It includes real case studies of various applications related to different fields, such as Cyber Physical Systems (CPS), Internet of Things (IoT), Cloud Computing, Machine Learning, Virtualization, Decentralization, Blockchain, Fog Computing, and many other related areas. …”
Libro electrónico -
2357Publicado 2015“…Companies can develop a competitive edge through four digital disciplines--information excellence, solution leadership, collective intimacy, and accelerated innovation--that exploit cloud computing, big data and analytics, mobile and wireline networks, social media, and the Internet of Things. …”
Libro electrónico -
2358Publicado 2017Tabla de Contenidos: “…-- Everyone Is into Fintech -- The Current State of Big Data Finance -- The Millennials Are Coming -- Social Media -- Mobile -- Cheaper and Faster Technology -- Cloud Computing -- Blockchain -- Fast Analytics -- In the End, It's All About Real-Time Data Analytics -- End of Chapter Questions -- Chapter 2: This Ain't Your Grandma's Data -- Data -- The Risk of Data -- Data Storage -- Technology -- Blockchain -- What Elements Are Common to All Blockchains? …”
Libro electrónico -
2359Publicado 2020“…The presented applications are focused on data management with cloud computing, power quality assessment, photovoltaic power plant control, and electrical vehicle charge stations, all supported by modern AI-based optimization methods…”
Libro electrónico -
2360“…In fact, mobile, analytics, social media, sensors, and cloud computing have already fundamentally changed the entire business landscape as we know it-including your industry. …”
Libro electrónico