Mostrando 2,401 - 2,420 Resultados de 2,723 Para Buscar '"Cloud computing"', tiempo de consulta: 0.15s Limitar resultados
  1. 2401
    Tabla de Contenidos: “…Numerical back analysis method for in-situ stress field distribution in deep river valley regionQuestionnaire generator: Web application using cloud computing; Safety analysis and risk aversion system structure for internet of things; A design of conceptual framework for persuasive multimedia learning application in enhancing children's awareness of child sexual abuse; Section 3: Computer science and technology; A review on recognition of traffic signs; Research on spatial characteristics of 60 GHz MIMO channel and multiplexing; An improved semantic similarity approach based on Cilin…”
    Libro electrónico
  2. 2402
    por Colisto, Nicholas R., 1966-
    Publicado 2012
    Tabla de Contenidos: “…The CIO Playbook; Contents; Preface; Acknowledgments; Chapter 1 Step 1: Partner; Partnership versus Alignment; Build Business Partnerships; Earning Trust; Setting Priorities; Creating Business Strategy; Develop an IT Strategic Plan; How to Get Started; The Sections of an IT Strategic Plan; Different Approaches to Strategic Planning; Differentiate Customers and Partners; Take on Responsibilities Outside of IT; Cloud Computing Is Changing the Role of IT; Network Engineering; Security; Relationship Management; Contract Law and Negotiation; Process Management; Chapter 2 Step 2: Organize…”
    Libro electrónico
  3. 2403
    Publicado 2012
    Tabla de Contenidos: “…User interface elementsRibbons, menus, and toolbars; Webpage controls, dialog boxes, and property sheets; Backstage view; Control Panel; Messages; Other user interface elements; Modes of interaction; Mouse terminology; Key names; Content for multiple platforms; User interface text; User interface formatting; Chapter 6: Procedures and technical content; Procedures; Document conventions; Cloud computing style; Reference documentation; Code examples; Security; Command syntax; File names and extensions; Version identifiers; Out-of-band release terminology; Protocols…”
    Libro electrónico
  4. 2404
    Publicado 2014
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Introduction; Chapter 1 Measuring and Weighing Risk; Risk Assessment; Computing Risk Assessment; Acting on Your Risk Assessment; Risks Associated with Cloud Computing; Risks Associated with Virtualization; Developing Policies, Standards, and Guidelines; Implementing Policies; Understanding Control Types and False Positives/Negatives; Risk Management Best Practices; Disaster Recovery; Tabletop Exercise; Summary; Exam Essentials; Review Questions; Chapter 2 Monitoring and Diagnosing Networks; Monitoring Networks; Network Monitors; Understanding Hardening…”
    Libro electrónico
  5. 2405
    por Cascarino, Richard
    Publicado 2012
    Tabla de Contenidos: “…Auditor's Guide to IT Auditing; Contents; Preface; PART I: IT AUDIT PROCESS; Chapter 1: Technology and Audit; Technology and Audit; Batch and Online Systems; Electronic Data Interchange; Electronic Business; Cloud Computing; Chapter 2: IT Audit Function Knowledge; Information Technology Auditing; What Is Management?…”
    Libro electrónico
  6. 2406
    por Gregg, Michael H.
    Publicado 2012
    Tabla de Contenidos: “…Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System…”
    Libro electrónico
  7. 2407
    Publicado 2015
    Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting Started; The cloud computing stack - SaaS, PaaS, and IaaS; Google Cloud Platform; Hosting + Compute; Storage; BigQuery; Services; What Google App Engine does; The runtime environment; The services; Making our first Python application; Download and installation; Installing on Windows; Installing on Mac OS X; Installing on Linux; App Engine Launcher; Creating the application; The app.yaml configuration file; The main.py application script…”
    Libro electrónico
  8. 2408
    por Rischpater, Ray. author
    Publicado 2013
    Tabla de Contenidos: “…""Why Windows Azure?"" ""Cloud Computing Services""; ""Virtual Machines (IaaS)""; ""Cloud Services (PaaS)""; ""Websites (SaaS)""; ""Windows Azure Data Management""; ""Blobs""; ""Tables""; ""SQL Databases""; ""Setting up Windows Azure""; ""Getting a Windows Azure Account""; ""Getting the Windows Azure SDK""; ""Hosting a Bing Map on Azure""; ""Obtaining a Bing Maps Account""; ""Obtaining a Bing Maps Key""; ""Building the Bing Map""; ""Hosting the Bing Map on Windows Azure""; ""Wrapping Up""; ""Chapter 3: Geospatial with Azure SQL Database""; ""SQL Database Overview""…”
    Libro electrónico
  9. 2409
    Publicado 2014
    Tabla de Contenidos: “…Application of intellectual control treatment for grinding process based on expert knowledge baseAlgorithm and implementation of digital PID based on MCGS-DDC; Modeling and control of solar powered HALE UAV; The greatest common factor about bivariate polynomials; Digital video communication platform based on cloud computing technology; The computational model of the airfield capability based on system dynamics; Business strategy for Shaw Communications Inc; Research on training modes of vocational values for maritime students based on online web technology…”
    Libro electrónico
  10. 2410
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Getting Started with Azure -- Technical requirements -- What is cloud computing? -- What problems does it solve? -- What is Azure? …”
    Libro electrónico
  11. 2411
    Publicado 2016
    “…The development of related technologies, such as the advent of the Internet, social networks, "cloud-computing" (digital factories), has increased the available volumes of data. …”
    Libro electrónico
  12. 2412
    por Liyanage, Madhusanka
    Publicado 2020
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; About the Editors; List of Contributors; Preface; Acknowledgments; Part I IoT Overview; Chapter 1 Introduction to IoT; 1.1 Introduction; 1.1.1 Evolution of IoT; 1.2 IoT Architecture and Taxonomy; 1.3 Standardization Efforts; 1.4 IoT Applications; 1.4.1 Smart Home; 1.4.2 Smart City; 1.4.3 Smart Energy; 1.4.4 Healthcare; 1.4.5 IoT Automotive; 1.4.6 Gaming, AR and VR; 1.4.7 Retail; 1.4.8 Wearable; 1.4.9 Smart Agriculture; 1.4.10 Industrial Internet; 1.4.11 Tactile Internet; 1.4.12 Conclusion; Acknowledgement; References; Chapter 2 Abstract; 2.1 Introduction2.2 Attacks and Countermeasures; 2.2.1 Perception Layer; 2.2.1.1 Perception Nodes; 2.2.1.2 Sensor Nodes; 2.2.1.3 Gateways; 2.2.2 Network Layer; 2.2.2.1 Mobile Communication; 2.2.2.2 Cloud Computing; 2.2.2.3 Internet; 2.2.3 Application Layer; 2.2.3.1 Smart Utilities -- Smart Grids and Smart Metering; 2.2.3.2 Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine; 2.2.3.3 Intelligent Transportation; 2.2.3.4 Smart Agriculture; 2.2.3.5 Industrial IoT (IIoT); 2.2.3.6 Smart Buildings, Environments, and Cities; 2.3 Authentication and Authorization; 2.3.1 Authentication; 2.3.2 Authorization2.3.3 Authentication at IoT Layers; 2.3.3.1 Perception Layer; 2.3.3.2 Network Layer; 2.3.3.3 Application Layer; 2.4 Other Security Features and Related Issues; 2.4.1 The Simplified Layer Structure; 2.4.2 The Idea of Middleware; 2.4.3 Cross-Layer Security Problem; 2.4.4 Privacy; 2.4.5 Risk Mitigation; 2.5 Discussion; 2.6 Future Research Directions; 2.6.1 Blockchain; 2.6.2 5G; 2.6.3 Fog and Edge Computing; 2.6.4 Quantum Security, AI, and Predictive Data Analytics; 2.6.5 Network Slicing; 2.7 Conclusions; References; Part II IoT Network and Communication Authentication; Chapter 3 Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks3.1 Introduction; 3.2 Related Work; 3.3 System Model and Assumptions; 3.3.1 Design Goals; 3.3.2 Setting; 3.3.3 Notations; 3.3.4 Attack Model; 3.4 Scheme in Normal Mode; 3.4.1 Installation Phase; 3.4.1.1 Installation of CH; 3.4.1.2 Installation of CN; 3.4.2 Group Node Key; 3.4.3 Individual Cluster Key; 3.4.3.1 CN to CH; 3.4.3.2 CH to CN; 3.4.4 Pairwise Key Derivation; 3.4.5 Multicast Key; 3.4.5.1 Initiation by CH; 3.4.5.2 Derivation by CNs; 3.4.6 Group Cluster Key; 3.5 Authentication; 3.5.1 Authentication by CN3.5.2 Authenticated Broadcast by the CH; 3.5.3 Authenticated Broadcast by the BS; 3.6 Scheme in Change Mode; 3.6.1 Capture of CN; 3.6.2 Capture of CH; 3.6.3 Changes for Honest Nodes; 3.6.3.1 Key Update for Honest Node Replacement; 3.6.3.2 Node Removal and Addition; 3.7 Security Analysis; 3.7.1 Resistance Against Impersonation Attack; 3.7.2 Resistance Against Node Capture; 3.7.3 Resistance Against Replay Attacks; 3.8 Efficiency; 3.8.1 Number of Communication Phases; 3.8.2 Storage Requirements; 3.8.3 Packet Fragmentation; 3.9 Conclusions; Acknowledgement; References; Chapter 4 Public Key Based Protocols -- EC Crypto…”
    Libro electrónico
  13. 2413
    Publicado 2024
    Tabla de Contenidos: “…3.2 Comparison to Other Studies -- 3.2.1 5G and IoNT -- 3.2.2 IoNT Characteristics and Architecture -- 3.2.2.1 IoNT Characteristics -- 3.2.2.2 IoNT Architecture -- 3.2.3 IoNT-Enabling Technologies -- 3.2.4 IoNT Applications -- 3.2.5 IoNT Network Architecture and Standards -- 3.2.5.1 Physical Layer -- 3.2.5.2 Link Layer -- 3.2.5.3 Network Layer -- 3.2.5.4 Upper Layers -- 3.2.5.5 Standards -- 3.2.6 Big Data Analytics, Cloud Computing, and Fog Computing in Support of the IoNT -- 3.2.6.1 Big Data Analytics in Support of the IoNT -- 3.2.6.2 Cloud Computing in Support of the IoNT -- 3.2.6.3 Fog Computing in Support of the IoNT -- 3.2.7 Deployment Aspects of the IoNT -- 3.2.7.1 Random vs. …”
    Libro electrónico
  14. 2414
    Publicado 2022
    Tabla de Contenidos: “…Conclusions -- Advantages of Cloud Computing -- Types of Cloud Computing Services -- Chapter 2: Planning for a Conversion to SAP S/4HANA -- SAP Readiness Check for SAP S/4HANA -- Handling Inconsistencies -- Generating the SAP Readiness Check 2.0 -- Tool 2: Process Discovery (Formerly Known as SAP Business Scenario Recommendations) -- An Overview of the Custom Code Analysis -- Custom Code Analysis and Adoption -- How Custom Code Analysis Is Performed -- Tools for Custom Code Analysis -- Tool for Identifying Unused Custom Code: SCMON -- Extended Program Check-SLIN -- Code Inspector -SCI -- Maintain System Group Information -- Custom Code Adaptation -- Conclusions -- Chapter 3: An Overview of SAP ECC System Conversion -- Overview of the Conversion Process -- The Preparation Phase -- 1. …”
    Libro electrónico
  15. 2415
    Tabla de Contenidos: “…Contents at a Glance; Contents; About the Authors; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Getting Started with Microsoft and Mapping; Mapping and Microsoft; Bing Maps for Developers; Microsoft SQL Server for Location Applications; Windows Azure to Host Your Application; Maps without Code: Microsoft Power Map; What You Need to Get Started; A Few Words on Terminology; Introducing the Sample Application; Developing Your Application; Wrapping Up; Chapter 2: Painless Hosting with Azure; Why Microsoft Azure?; Cloud-Computing Services…”
    Libro electrónico
  16. 2416
    Publicado 2010
    Tabla de Contenidos: “…; From Apprentice to Master; Conclusion; 2How Picnik Uses Cloud Computing: Lessons Learned; Justin Huff; Where the Cloud Fits (and Why!)…”
    Libro electrónico
  17. 2417
    por Sarkar, Debarchan. author
    Publicado 2014
    Tabla de Contenidos: “…; The Apache Hadoop Ecosystem; Microsoft HDInsight: Hadoop on Windows; Combining HDInsight with Your Business Processes; Summary; Chapter 2: Understanding Windows Azure HDInsight Service; Microsoft's Cloud-Computing Platform; Windows Azure HDInsight Service; HDInsight Versions; Cluster Version 2.1; Cluster Version 1.6; Storage Location Options…”
    Libro electrónico
  18. 2418
    por Ding, Qiang
    Publicado 2012
    Tabla de Contenidos: “…Batch monitoring and managementCross-time zone scheduling; Maintenance and troubleshooting; Reporting; Reacting to changes; From batch scheduling to workload automation; Batch scheduling: Static scheduling; The Workload Automation concept; Dynamic batch processing with virtualization technology and cloud computing; Integration with real-time system, workload reusability; Summary; Chapter 2:Exploring Control-M; Control-M overview; Control-M road map; Key features; Supported platforms; The Control-M way; Control-M job; Submitting jobs; Post processing…”
    Libro electrónico
  19. 2419
    por Franks, Bill, 1968-
    Publicado 2012
    Tabla de Contenidos: “…VIDEO GAMES: THE VALUE OF TELEMETRY DATA TELECOMMUNICATIONS AND OTHER INDUSTRIES: THE VALUE OF SOCIAL NETWORK DATA; WRAP-UP; PART TWO: Taming Big Data: The Technologies, Processes, and Methods; CHAPTER 4: The Evolution of Analytic Scalability; A HISTORY OF SCALABILITY; THE CONVERGENCE OF THE ANALYTIC AND DATA ENVIRONMENTS; MASSIVELY PARALLEL PROCESSING SYSTEMS; CLOUD COMPUTING; GRID COMPUTING; MAPREDUCE; IT ISN'T AN EITHER/OR CHOICE!…”
    Libro electrónico
  20. 2420
    por Portnoy, Matthew
    Publicado 2012
    Tabla de Contenidos: “…Virtualization: Essentials; Contents; Introduction; Chapter 1: Understanding Virtualization; Describing Virtualization; Microsoft Windows Drives Server Growth; Explaining Moore's Law; Understanding the Importance of Virtualization; Examining Today's Trends; Virtualization and Cloud Computing; Understanding Virtualization Software Operation; Virtualizing Servers; Virtualizing Desktops; Virtualizing Applications; Chapter 2: Understanding Hypervisors; Describing a Hypervisor; Exploring the History of Hypervisors; Understanding Type 1 Hypervisors; Understanding Type 2 Hypervisors…”
    Libro electrónico