Mostrando 2,441 - 2,460 Resultados de 2,723 Para Buscar '"Cloud computing"', tiempo de consulta: 0.13s Limitar resultados
  1. 2441
    Publicado 2023
    Tabla de Contenidos: “…IPv6 -- Chapter 5 Ports and Protocols -- IP Protocol Types -- Application Layer Protocols -- Chapter 6 Network Services -- DHCP -- DNS -- NTP -- Chapter 7 Network Architecture -- Three-Tiered Architecture -- Software-Defined Networking -- Spine and Leaf Architecture -- Traffic Flows -- Data Center Locations -- Storage Area Networking -- Chapter 8 Cloud Computing -- Deployment Models -- Service Models -- Part II Domain 2.0: Network Implementations -- Chapter 9 Network Devices -- Networking Devices -- Networked Devices -- Chapter 10 Routing and Bandwidth Management -- Routing -- Bandwidth Management -- Chapter 11 Switching -- Ethernet Basics -- Switching -- Chapter 12 Wireless Standards -- Wireless Networking -- Cellular Technologies -- Part III Domain 3.0: Network Operations -- Chapter 13 Network Availability -- Performance Metrics -- SNMP -- Network Device Logs -- Interface Errors or Alerts -- Environmental Sensors -- Baselines -- Uptime/Downtime -- Chapter 14 Organizational Documents and Policies -- Plans and Procedures -- Hardening and Security Policies -- Common Documentation -- Common Agreements…”
    Libro electrónico
  2. 2442
    Publicado 2014
    Tabla de Contenidos: “…5.4 The CEFRIEL Experience5.5 Conclusions; Part III: Fusion of Technologies; 6: Fusion of Technologies; 6.1 Introduction; 6.2 Hardware-Software Fusion; 6.3 Computing and Communication; 6.4 Virtual and Physical Reality; 6.5 Service-Oriented Architecture; 6.6 Mashup; 6.7 Cloud Computing; 6.8 Concept-Oriented System Development; 6.9 Conclusion; 7: Fusion of Computer and Communication; 7.1 Introduction; 7.2 Historical Perspective; 7.3 System of Systems; 7.4 Problem Solving; 7.5 Role of Trust; 7.6 Example: ATM Application; 7.7 Conclusions; 8: Future of Railway Signaling and Train Control…”
    Libro electrónico
  3. 2443
    Publicado 2019
    Tabla de Contenidos: “…-- HTML -- Where are the HTML Files Stored? -- Cloud Computing -- Data Transfer Rates -- Internet Security -- Malware -- Virus -- Worm -- Trojan -- Rootkit -- Ransomware -- Social Engineering -- Phishing -- Pharming -- Pretexting -- Shouldering -- Threat Prevention -- Biometric Measures -- Strong Passwords -- 2-Factor Authentication -- Public Key Cryptography -- Firewalls -- Index -- Blank Page…”
    Libro electrónico
  4. 2444
    Publicado 2015
    “…This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora 21, and Ubuntu 10.04 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. …”
    Libro electrónico
  5. 2445
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credit -- Dedicated -- Contributors -- Table of Contents -- Preface -- Part 1: Persistence in Cloud Computing - Storing and Managing Data in Modern Software Architecture -- Chapter 1: The History of Data Storage - From the Caves to the Cloud -- Why do databases exist? …”
    Libro electrónico
  6. 2446
    por Schneier, Bruce
    Publicado 2014
    “…This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events t…”
    Libro electrónico
  7. 2447
    Publicado 2014
    “…Oracle 12c includes industry leading enhancements to enable cloud computing and empowers users to manage both Big Data and traditional data structures faster and cheaper than ever before. …”
    Libro electrónico
  8. 2448
    Publicado 2021
    Tabla de Contenidos: “…-- 9.3.3 Methodologies Used for Knowledge Representation in Cognitive Systems -- 9.4 Support of Cloud Computing for Cognitive Systems -- 9.4.1 Importance of Shared Resources of Distributed Computing in Developing Cognitive Systems -- 9.4.2 Fundamental Concepts of Cloud Used in Building Cognitive Systems -- 9.5 Cognitive Analytics for Automatic Fraud Detection Using Machine Learning and Fuzzy Systems -- 9.5.1 Role of Machine Learning Concepts in Building Cognitive Analytics -- 9.5.2 Building Automated Patterns for Cognitive Analytics Using Fuzzy Systems -- 9.6 Design of Cognitive System for Healthcare Monitoring in Detecting Diseases -- 9.6.1 Role of Cognitive System in Building Clinical Decision System…”
    Libro electrónico
  9. 2449
    por Zhang, Yan
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Preface -- Acknowledgements -- Contents -- Acronyms -- 1 Introduction -- 1.1 Mobile Cloud Computing (MCC) -- 1.2 Overview of MEC -- 1.3 Book Organization -- 2 Mobile Edge Computing -- 2.1 A Hierarchical Architecture of Mobile Edge Computing (MEC) -- 2.2 Computation Model -- 2.2.1 Computation Model of Local Execution -- 2.2.2 Computation Model of Full Offloading -- 2.2.3 A Computation Model for Partial Offloading -- 2.3 Offloading Policy -- 2.3.1 Binary Offloading -- 2.3.2 Partial Offloading -- 2.4 Challenges and Future Directions -- 3 Mobile Edge Caching -- 3.1 Introduction…”
    Libro electrónico
  10. 2450
    Publicado 2023
    Tabla de Contenidos: “…Bach -- Deep Work to Make a Great Coffee -- Audacious Questions -- ResMed's Big Questions -- Killer Questions at Space X -- Novelty, Gestation, and Safety -- Novelty and Surprise -- Quiescent Curiosity -- Safety and Creativity -- Building Curiosity in Your Organization -- Chapter 2 Dragonfly Eye -- A New Lens on Recidivism -- Seeing Like a Dragonfly -- Anchoring Outside -- Framing the Dragonfly Eye -- The Power of Changing Lenses -- Beer Kegs as Technology -- A Fresh Look at Braces -- Choosing the Wrong Lens: WeWork -- Widening the Aperture -- Amazon's Head Start in Cloud Computing -- Solving a Health Crisis -- A Multi-Lens Approach -- The Neurodiversity Lens and a Digital Twin for Kelp Forests -- Obesity and Wicked Problems -- Bringing a Dragonfly Eye into Your Organization -- Chapter 3 Occurrent Behavior -- Let's Weigh the Money -- Occurrent Behavior and Problem Solving -- Thinking Like a Bayesian -- Framing Occurrent Behavior -- Experiment to Create New Data -- Autonomous Vehicle Experiments -- Space X: Relentless Experimenting -- A/B Testing at Airtasker -- Education Perfect: What the Educators Learned -- New Tools and Approaches…”
    Libro electrónico
  11. 2451
    por Bernstein, Philip A.
    Publicado 2009
    Tabla de Contenidos: “…9.3 Synchronizing Updates to Replicated Data9.4 Single-Master Primary-Copy Replication; 9.5 Multimaster Replication; 9.6 Other Replication Techniques; 9.7 Data Sharing Systems; 9.8 Summary; CHAPTER 10 Transactional Middleware Products and Standards; 10.1 Introduction; 10.2 Web Browser Front-End Programs; 10.3 .NET Framework; 10.4 Java Enterprise Edition; 10.5 Service-Oriented Architecture; 10.6 Persistence Abstraction Mechanisms; 10.7 Legacy TP Monitors; 10.8 TP Standards; 10.9 Summary; CHAPTER 11 Future Trends; 11.1 Introduction; 11.2 Cloud Computing; 11.3 Scalable Distributed Computing…”
    Libro electrónico
  12. 2452
    por Scholz, James A.
    Publicado 2013
    Tabla de Contenidos: “…Objectives of the Business Impact Analysis Developing the Project Plan BIA Process Steps Performing the BIA Gathering Information Performing a Vulnerability Assessment Analyzing the Information Documenting the Results and Presenting the Recommendations Risk Risk Management Risk Framework Risk Assessment or Evaluation Risk Mitigation and Response Risk Monitoring Risk Assessment Secure Configuration Management Phases of Security-Focused Configuration Management Security Configuration Management Plan Coordination Configuration Control Change Control Board (CCB) or Technical Review Board (TRB) Configuration Items Baseline Identification Functional Baseline Design Baseline Development Baseline Product Baseline Roles and Responsibilities Change Control Process Change Classifications Change Control Forms Problem Resolution Tracking Measurements Configuration Status Accounting Configuration Management Libraries Release Management (RM) Configuration Audits Functional Configuration Audit Physical Configuration Audit Tools Training Training Approach Contingency Planning Types of Plans Business Continuity Plan (BCP) Continuity of Operations (COOP) Plan Cyber Incident Response Plan Disaster Recovery Plan (DRP) Contingency Plan (CP) Occupant Emergency Plan (OEP) Crisis Communications Plan Backup Methods and Off-Site Storage Cloud Computing Essential Characteristics Service Models Continuous Monitoring Continuous Monitoring Strategy Organization (Tier 1) and Mission/Business Processes (Tier 2) Continuous Monitoring Strategy Information System (Tier 3) Continuous Monitoring Strategy Process Roles and Responsibilities Define Sample Populations Continuous Monitoring Program Determine Metrics Monitoring and Assessment Frequencies Considerations in Determining Assessment and Monitoring Frequencies Physical Security History Security Level (SL) Determination Threat Factors/Criteria Building Security Level Matrix Building Security Level Scoring Criteria Mission/Business Public Impact Building Occupants Building Square Footage Impact on Tenants Other Factors Level E Facilities Campuses, Complexes, and Corporate or Commercial Centers Changes in the Building Security Level Building Security Illumination Lighting for CCTV Surveillance Building Security Levels Minimum Security Standards Entry Security Interior Security Security Planning The Certification and Accreditation Process Accreditation Decisions Continuous Monitoring General Process Phase I Security Categorization System Security Plans (SSPs) Risk Assessments (RAs) Contingency Plans (CPs) Security Control Compliance Matrix (SCCM) Standard Operating Procedures (SOPs) Privacy Impact Assessment (PIA) Configuration Management Plan (CMP) Service Level Agreements (SLAs) General Process Phase II: Security Test and Evaluation (ST&E) Develop the Security Test and Evaluation (ST&E) Plan Execute the ST&E Plan Create the ST&E Report and Recommend Countermeasures Update the Risk Assessment Update the Security Plan Document Certification Findings General Management and Methodologies Employed Methodologies Internal Review Procedures End-State Security Model Appendix A: List of References (NIST ) Appendix B: List of References (FIPS) Appendix C: Sample Certification Statement Appendix D: Sample Rules of Engagement…”
    Libro electrónico
  13. 2453
    por Peterson, Larry L.
    Publicado 2012
    Tabla de Contenidos:
    Libro electrónico
  14. 2454
    Publicado 2021
    Tabla de Contenidos: “…-- Resources available to digital forensic investigators -- Conclusion -- References -- 2 Digital forensic approaches and best practices -- Introduction -- First response -- Responding to a case -- Conclusion -- References -- Other useful resources -- 3 Digital forensics tool kit -- Introduction -- Computer forensics -- Write blockers -- Imaging -- Add-ons and other technologies -- Tools -- Mobile forensics tools -- Visual analysis -- Secured storage -- Damaged media -- Summary -- References -- 4 Internet and e-mail examinations -- Introduction -- E-mail -- Chat and messaging logs -- Peer-to-peer -- Search engine activity -- Internet history -- Social networking and gaming -- Malware and viruses -- Summary -- 5 Mobile forensics -- Introduction -- Mobile phone technology -- How a call is made -- Forensic challenges -- Forensic process -- Digital cell phone investigation -- Geographic positioning systems -- Cameras -- Common extraction types -- Information sources and location information -- Summary -- Cellular communications technology overview -- References -- 6 Cloud computing and digital forensics -- Introduction -- Infrastructure as a service -- Platform as a service -- Software as a service -- Service and deployment models -- Customer versus cloud provider responsibilities -- Other service models -- Multi-tenancy -- User access and provisioning -- Data protection and breaches…”
    Libro electrónico
  15. 2455
    por Vohra, Deepak. author
    Publicado 2015
    “…MongoDB along with Hadoop and Java are some of today's most important big data and cloud computing technologies…”
    Libro electrónico
  16. 2456
    por Pace, Larry. author
    Publicado 2014
    “…Whether you're in finance, cloud computing, big or small data analytics, or other applied computational and data science - R Recipes should be a staple for your code reference library…”
    Libro electrónico
  17. 2457
    Publicado 2016
    “…OpenStack is one of the fastest growing open source projects in history that unlocks cloud computing for everyone. With OpenStack, you are able to create public or private clouds on your own hardware. …”
    Libro electrónico
  18. 2458
    por Kuhn, Darl. author
    Publicado 2015
    “…Fast and easy provisioning of databases for developers and testers is a driving force in the move to cloud computing and virtualization. RMAN’s robust database duplication feature set plays right into this growing need for ease of provisioning, enabling easy duplication of known-good databases on demand, across operating systems such as between Linux and Solaris, and even across storage environments such as when duplicating from a RAC/ASM environment to a single-node instance using regular file system storage. …”
    Libro electrónico
  19. 2459
    Publicado 2011
    Tabla de Contenidos: “…Cover -- Contents -- Preface -- Acknowledgments -- About the Author -- 1 Developing Your Application -- Rich Internet Applications -- Web 2.0 -- Cloud Computing -- The "Death of the Desktop -- Advantages of GWT -- HTML Ubiquity and Browser Differences -- JavaScript Deficiencies -- Software Methodologies to Apply -- Classic Development Problems -- Agile Methodologies -- Forever Beta? …”
    Libro electrónico
  20. 2460
    Publicado 2013
    “…C# is a complex programming language for building .NET-connected software for Microsoft Windows, cloud computing, the Web, and a wide range of devices. …”
    Libro electrónico