Mostrando 2,481 - 2,500 Resultados de 2,723 Para Buscar '"Cloud computing"', tiempo de consulta: 0.17s Limitar resultados
  1. 2481
    Publicado 2018
    Tabla de Contenidos: “…1.5 Information and Communication Technology Infrastructure1.5.1 Architecture and Reference Models; 1.5.2 Networks and Connectivity; 1.5.3 Embedding; 1.5.4 Sensors; 1.5.5 Actuators; 1.5.6 Power Supply; 1.5.7 Identification; 1.5.7.1 Radio Frequency Identification; 1.5.7.2 Addressing Schemes Based on IPv6 and Electronic Product Code; 1.5.8 Localization; 1.5.9 Cloud Computing and Fog Computing; 1.6 Derived Qualities of Modern ICT; 1.6.1 Context Awareness, Adaptability, and Proactivity; 1.6.2 Increased Data Quality; 1.6.2.1 Dimensions of Data Quality; 1.6.2.2 Effects of Increased Data Quality…”
    Libro electrónico
  2. 2482
    por Sabella, Dario
    Publicado 2019
    Tabla de Contenidos: “…Cover; Half Title; Title Page; Copyright Page; Contents; FOREWORD; ACKNOWLEDGMENTS; AUTHORS; INTRODUCTION; PART 1 MEC AND THE NETWORK; CHAPTER 1 FROM CLOUD COMPUTING TO MULTI -ACCESS EDGE COMPUTING; 1.1 To Edge or Not to Edge; 1.2 The Cloud Part of MEC; 1.3 The Edge Part of MEC; 1.4 The Access Part of MEC; 1.4.1 Real-Time Data Processing; 1.4.2 SLAs and Regulatory Requirements and Critical Infrastructure; 1.4.3 Network Function Virtualization; 1.4.4 Not Your Brother's IT Cloud; 1.5 Who Needs Standards Anyway?…”
    Libro electrónico
  3. 2483
    Publicado 2018
    Tabla de Contenidos: “…Mesh topology -- Hybrid topology -- Transmission modes -- Communication networks -- Local area network -- Metropolitan area network -- Wide area network -- Wireless network -- Data center multi-tier model design -- Open Systems Interconnection model -- In-depth network scanning -- TCP communication -- ICMP scanning -- SSDP scanning -- UDP Scanning -- Intrusion detection systems -- Machine learning for intrusion detection -- Supervised learning -- Unsupervised learning -- Semi-supervised learning -- Reinforcement -- Machine learning systems' workflow -- Machine learning model evaluation metrics -- Services enumeration -- Insecure SNMP configuration -- DNS security -- DNS attacks -- Sniffing attacks -- DDoS attacks -- Types of DDoS attacks -- Defending against DDoS attacks -- DDoS scrubbing centers -- Software-Defined Network penetration testing -- SDN attacks -- SDNs penetration testing -- DELTA: SDN security evaluation framework -- SDNPWN -- Attacks on database servers -- Summary -- Chapter 4: Active Directory Exploitation -- Active Directory -- Single Sign-On -- Kerberos authentication -- Lightweight Directory Access Protocol -- PowerShell and Active Directory -- Active Directory attacks -- PowerView -- Kerberos attacks -- Kerberos TGS service ticket offline cracking (Kerberoast) -- SPN scanning -- Passwords in SYSVOL and group policy preferences -- 14-068 Kerberos vulnerability on a domain controller -- Dumping all domain credentials with Mimikatz -- Pass the credential -- Dumping LSASS memory with Task Manager (get domain admin credentials) -- Dumping Active Directory domain credentials from an NTDS.dit file -- Summary -- Chapter 5: Docker Exploitation -- Docker fundamentals -- Virtualization -- Cloud computing -- Cloud computing security challenges -- Docker containers -- Docker exploitation -- Kernel exploits -- DoS and resource abuse…”
    Libro electrónico
  4. 2484
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Cloud 101 - Understanding the Basics -- Defining cloud computing -- Introducing public, private, and hybrid clouds -- Introducing cloud service models - IaaS, PaaS, and SaaS -- Introducing multi-tenancy models -- Understanding cloud-based workloads -- Migrating on-premise applications to the cloud -- Building cloud-native applications -- Setting up your AWS account -- Creating a new AWS account -- Exploring the AWS management console -- Summary -- Chapter 2: Designing Cloud Applications -- Introducing cloud-based multitier architecture -- Designing for multi-tenancy -- Addressing data-at-rest security requirements -- Addressing data extensibility requirements -- Understanding cloud applications design principles -- Designing for scale -- Automating cloud infrastructure -- Designing for failure -- Designing for parallel processing -- Designing for performance -- Designing for eventual consistency -- Understanding emerging cloud-based application architectures -- Understanding polyglot persistence -- Understanding Lambda architecture -- Understanding Kappa architecture -- Deploying cloud-based machine learning pipelines -- Deploying cloud-based machine learning models -- Estimating your cloud computing costs -- A typical e-commerce web application -- Setting up your development environment -- Running the application -- Building a war file for deployment -- Application structure -- Summary -- Chapter 3: Introducing AWS Components -- AWS components -- Amazon compute-related services -- Amazon EC2 -- Amazon EC2 container service -- AWS Lambda -- Amazon storage-related services -- Amazon S3 -- Amazon EBS -- Amazon Glacier -- Amazon database-related services -- Amazon Relational Database Service (RDS) -- Amazon DynamoDB -- Amazon Redshift…”
    Libro electrónico
  5. 2485
    Publicado 2025
    Tabla de Contenidos: “…Firmware -- Memory -- Disk Drives -- Network Interface Cards -- GPU -- Power and Cooling -- Chapter 7 Storage: Objective 2.3: Compare and contrast storage types -- Volatile Storage -- Nonvolatile Storage -- Magnetic Hard Drives -- Solid-State Drives -- Optical Drives -- Enterprise Storage Services -- Chapter 8 Installing Peripherals: Objective 2.4: Given a scenario, install and configure common peripheral devices -- Peripheral Types -- Keyboards and Mice -- Display -- Speakers -- Printers and Scanners -- Web Cameras -- External Hard Drives -- Uninterruptible Power Supply -- Installing and Configuring Peripherals -- Chapter 9 Input/Output Device Interfaces: Objective 2.5: Compare and contrast common types of input/output device interfaces -- Network Interfaces -- Wired Networks -- Wireless Networks -- Peripheral Interfaces -- USB -- Lightning -- Serial ATA -- Display Ports -- VGA -- DVI -- HDMI -- DisplayPort -- USB and Thunderbolt -- Wireless Display Technology -- Chapter 10 Virtualization and Cloud Technologies: Objective 2.6: Compare and contrast virtualization and cloud technologies -- Virtualization -- Virtual Servers -- Hypervisors -- Cloud Computing -- Drivers for Cloud Computing -- Cloud Service Concepts -- Software as a Service (SaaS) -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Desktop as a Service (DaaS) -- Cloud Deployment Models -- On-Premises/Private Cloud -- Public Cloud -- Hybrid Cloud -- Chapter 11 Internet Service Types: Objective 2.7: Compare and contrast common Internet service types -- Service Types -- Dial-Up Modems -- Digital Subscriber Line (DSL) -- Cable -- Fiber Optic -- Wireless Connections -- Chapter 12 TCP/IP Networking: Objective 2.8: Identify basic networking concepts -- Network Types -- Client/Server Model -- TCP/IP Networking -- Internet Protocol -- Transmission Control Protocol…”
    Libro electrónico
  6. 2486
    Publicado 2016
    Tabla de Contenidos: “…12.5.1 Das SMB-Protokoll -- 12.5.2 Samba -- 12.6 Fragen zu diesem Kapitel -- Kapitel 13: Servermanagement -- 13.1 Remoteverbindungen -- 13.1.1 Telnet -- 13.1.2 SSH -- 13.1.3 VNC -- 13.1.4 RDP (Remote Desktop Protocol) -- 13.1.5 MSTSC (Remote Desktop-Client) -- 13.1.6 rdesktop (Linux) -- 13.2 Ereignisanzeige und Ereignisprotokoll -- 13.2.1 Das Ereignisprotokoll -- 13.2.2 Die Windows-Ereignisanzeige -- 13.3 Hardware-Monitoring -- 13.4 Baseline-Management -- 13.5 Leistungsüberwachung -- 13.5.1 Schlüsselwerte -- 13.5.2 Microsoft Performance-Monitor -- 13.5.3 Data Collector Sets/Performance-Logs -- 13.5.4 MRTG und RRDtool -- 13.6 SNMP -- 13.7 Web-Base Enterprise Management (WBEM) -- 13.8 Windows-Verwaltungsmechanismen -- 13.8.1 Windows Management Instrumentarium (WMI) -- 13.8.2 PowerShell -- 13.9 Hilfen -- 13.9.1 Manpages -- 13.9.2 GNU info und How-tos -- 13.9.3 Windows-Hilfe -- 13.9.4 Microsoft Knowledge Base -- 13.10 Fragen zu diesem Kapitel -- Kapitel 14: Ein Server, viele Server, Wolke -- 14.1 Deployment-Szenarien -- 14.2 Virtualisierung -- 14.2.1 Hardwarevirtualisierung -- 14.2.2 Desktop-Virtualisierung -- 14.2.3 Anwendungsvirtualisierung -- 14.2.4 Storage-Virtualisierung -- 14.3 Cloud Computing -- 14.3.1 Cloud-Computing-Servicemodelle -- 14.3.2 Cloud-Computing-Betriebsmodelle -- 14.3.3 Beispiele von Clouds -- 14.3.4 SaaS ohne Ende -- 14.3.5 Es ist Ihre Wahl -- 14.4 Fragen zu diesem Kapitel -- Kapitel 15: Physische Sicherheit für Ihre Server -- 15.1 Der sichere Serverraum -- 15.1.1 Wo kommt der Server hin -- 15.1.2 Rack oder Tower? …”
    Libro electrónico
  7. 2487
    por Cattini, Roland
    Publicado 2022
    Tabla de Contenidos: “…11.3 Hardware-Monitoring -- 11.4 Baseline-Management -- 11.5 Leistungsüberwachung -- 11.5.1 Schlüsselwerte -- 11.5.2 Microsoft Performance-Monitor -- 11.5.3 Data Collector Sets/Performance-Logs -- 11.5.4 Der Ressourcenmonitor -- 11.5.5 MRTG und RRDtool -- 11.6 SNMP -- 11.7 Web-Based Enterprise Management (WBEM) -- 11.8 Windows-Verwaltungsmechanismen -- 11.8.1 Windows Management Instrumentarium (WMI) -- 11.8.2 PowerShell -- 11.9 Hilfen -- 11.9.1 Offlinehilfen -- 11.9.2 Onlinehilfen der Hersteller -- 11.9.3 Herstellerfremde Onlinehilfen -- 11.9.4 Manpages -- 11.9.5 GNU info und How-tos -- 11.9.6 Windows-Hilfe -- 11.9.7 Microsoft Knowledge Base -- 11.10 Fragen zu diesem Kapitel -- Kapitel 12: Ein Server, viele Server, Wolke -- 12.1 Deployment-Szenarien -- 12.1.1 Datenorganisation -- 12.1.2 Namenskonzepte -- 12.1.3 Berechtigungskonzepte -- 12.1.4 Lizenzierung -- 12.1.5 Serverrollen -- 12.1.6 Anwendungen -- 12.1.7 Netzwerklayout -- 12.2 Virtualisierung -- 12.2.1 Hardware-Virtualisierung -- 12.2.2 Produkte -- 12.2.3 Virtuelle Lizenzierung -- 12.2.4 Einsatzszenarien -- 12.2.5 Desktop-Virtualisierung -- 12.2.6 Anwendungsvirtualisierung -- 12.2.7 Storage-Virtualisierung -- 12.3 Cloud Computing -- 12.3.1 Cloud-Computing-Servicemodelle -- 12.3.2 Cloud-Computing-Betriebsmodelle -- 12.3.3 Beispiele von Clouds -- 12.3.4 SaaS ohne Ende -- 12.3.5 Es ist Ihre Wahl -- 12.4 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheit für Ihre Server‌ -- 13.1 Der sichere Serverraum -- 13.1.1 Wo kommt der Server hin? …”
    Libro electrónico
  8. 2488
    Publicado 2017
    Tabla de Contenidos: “…3 Handling Evidence 4 Cryptographic Hashes 5 Chain of Custody 8 Incident Response 8 The Need for Network Forensic Practitioners 10 Summary 11 References 12 2 Networking Basics 13 Protocols 14 Open Systems Interconnection (OSI) Model 16 TCP/IP Protocol Suite 18 Protocol Data Units 19 Request for Comments 20 Internet Registries 23 Internet Protocol and Addressing 25 Internet Protocol Addresses 28 Internet Control Message Protocol (ICMP) 31 Internet Protocol Version 6 (IPv6) 31 Transmission Control Protocol (TCP) 33 Connection-Oriented Transport 36 User Datagram Protocol (UDP) 38 Connectionless Transport 39 Ports 40 Domain Name System 42 Support Protocols (DHCP) 46 Support Protocols (ARP) 48 Summary 49 References 51 3 Host-Side Artifacts 53 Services 54 Connections 60 Tools 62 netstat 63 nbstat 66 ifconfi g/ipconfi g 68 Sysinternals 69 ntop 73 Task Manager/Resource Monitor 75 ARP 77 /proc Filesystem 78 Summary 79 4 Packet Capture and Analysis 81 Capturing Packets 82 Tcpdump/Tshark 84 Wireshark 89 Taps 91 Port Spanning 93 ARP Spoofi ng 94 Passive Scanning 96 Packet Analysis with Wireshark 98 Packet Decoding 98 Filtering 101 Statistics 102 Following Streams 105 Gathering Files 106 Network Miner 108 Summary 110 5 Attack Types 113 Denial of Service Attacks 114 SYN Floods 115 Malformed Packets 118 UDP Floods 122 Amplifi cation Attacks 124 Distributed Attacks 126 Backscatter 128 Vulnerability Exploits 130 Insider Threats 132 Evasion 134 Application Attacks 136 Summary 140 6 Location Awareness 143 Time Zones 144 Using whois 147 Traceroute 150 Geolocation 153 Location-Based Services 156 WiFi Positioning 157 Summary 158 7 Preparing for Attacks 159 NetFlow 160 Logging 165 Syslog 166 Windows Event Logs 171 Firewall Logs 173 Router and Switch Logs 177 Log Servers and Monitors 178 Antivirus 180 Incident Response Preparation 181 Google Rapid Response 182 Commercial Offerings 182 Security Information and Event Management 183 Summary 185 8 Intrusion Detection Systems 187 Detection Styles 188 Signature-Based 188 Heuristic 189 Host-Based versus Network-Based 190 Snort 191 Suricata and Sagan 201 Bro 203 Tripwire 205 OSSEC 206 Architecture 206 Alerting 207 Summary 208 9 Using Firewall and Application Logs 211 Syslog 212 Centralized Logging 216 Reading Log Messages 220 LogWatch 222 Event Viewer 224 Querying Event Logs 227 Clearing Event Logs 231 Firewall Logs 233 Proxy Logs 236 Web Application Firewall Logs 238 Common Log Format 240 Summary 243 10 Correlating Attacks 245 Time Synchronization 246 Time Zones 246 Network Time Protocol 247 Packet Capture Times 249 Log Aggregation and Management 251 Windows Event Forwarding 251 Syslog 252 Log Management Offerings 254 Timelines 257 Plaso 258 PacketTotal 259 Wireshark 261 Security Information and Event Management 262 Summary 263 11 Network Scanning 265 Port Scanning 266 Operating System Analysis 271 Scripts 273 Banner Grabbing 275 Ping Sweeps 278 Vulnerability Scanning 280 Port Knocking 285 Tunneling 286 Passive Data Gathering 287 Summary 289 12 Final Considerations 291 Encryption 292 Keys 293 Symmetric 294 Asymmetric 295 Hybrid 296 SSL/TLS 297 Cloud Computing 306 Infrastructure as a Service 306 Storage as a Service 309 Software as a Service 310 Other Factors 311 The Onion Router (TOR) 314 Summary 317 Index 319.…”
    Libro electrónico
  9. 2489
    Publicado 2022
    Tabla de Contenidos: “…INTEGRATING DATA AND WEB TECHNOLOGY -- The World Wide Web -- XML and databases -- Other ways to link databases into web technology -- Cloud computing…”
    Libro electrónico
  10. 2490
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  11. 2491
    Publicado 2017
    Tabla de Contenidos: “…-- Automation: Still the Exception That Proves the Rule -- Book Scope, Approach, and Style -- Breadth over Depth -- Methodology: Guidelines &gt -- Rules -- Technical Sophistication -- Vendor Agnosticism -- Intended Audience -- Plan of Attack -- Next -- Notes -- Part ONE Background and Trends -- Chapter 1: Signs of the Times: Why Data and Analytics Are Dominating Our World -- The Moneyball Effect -- Digitization and the Great Unbundling -- Amazon Web Services and Cloud Computing -- Not Your Father's Data Storage -- How? …”
    Libro electrónico
  12. 2492
    Publicado 2023
    Tabla de Contenidos: “…Chapter 4: How to Make Buildings Smarter with Smart Location -- Location data sources -- Indoor positioning -- Navigation, maps, and way-finders -- Asset location and tracking -- Asset-tracking technologies -- Real-time occupancy -- Occupancy sensing applications -- Occupancy-sensing technologies -- Summary -- Chapter 5: Tenant Services and Smart Building Amenities -- Work orders and tenant requests -- Space occupancy, utilization, and booking -- Financial interactions -- Data analytics -- Workforce applications -- Concierge services and the amenity marketplace -- Customized applications -- Gamification -- Custom experiences -- Summary -- Part 2: Smart Building Architecture -- Chapter 6: The Smart Building Ecosystem -- IoT sensors and devices -- Connectivity -- Transmission methods -- Traditional building communications protocols -- Common wireless IoT building communications protocols -- Three layers of computing -- Edge and fog computing -- Cloud computing -- Software and APIs -- Data management -- User interface and single pane of glass (SPOG) -- SPOG -- Summary -- Chapter 7: Smart Building Architecture and Use Cases -- Smart building architecture to pull components together -- Smart building architecture challenges -- IT/OT convergence -- Use case - IAQ monitoring -- Unexpected benefits -- Use case - smart IoT-connected restrooms -- Use case - PoE at the Sinclair Hotel -- How it works -- Solving for the smart building architecture -- Use case - energy reduction at an Australian shopping mall -- Cybersecurity for smart buildings -- NIST cybersecurity best practices -- Smart building IoT and privacy -- Summary -- Chapter 8: Digital Twins - a Virtual Representation -- Smart building digital twin defined -- History and use in smart buildings -- Monetization opportunities -- Types of digital twins -- Layers and components -- Creating a digital twin…”
    Libro electrónico
  13. 2493
    Publicado 2024
    “…Integrate Jenkins, Kubernetes, and more on cloud into a robust, GitOps-driven CI/CD system, leveraging JCasC, IaC, and AI for a streamlined software delivery process Key Features Follow the construction of a Jenkins CI/CD pipeline start to finish through a real-world example Construct a continuous deployment (CD) pipeline in Jenkins using GitOps principles and integration with Argo CD Craft and optimize your CI pipeline code with ChatGPT and GitHub Copilot Purchase of the print or Kindle book includes a free PDF eBook Book Description This updated edition of Learning Continuous Integration with Jenkins is your one-stop guide to implementing CI/CD with Jenkins, addressing crucial technologies such as cloud computing, containerization, Infrastructure as Code, and GitOps. …”
    Libro electrónico
  14. 2494
    Publicado 2015
    Tabla de Contenidos: “…The View Models -- Completing the Game -- Part III: Cloud Programming -- Chapter 16: Basic Cloud Programming -- The Cloud, Cloud Computing, and the Cloud Optimized Stack -- Cloud Patterns and Best Practices -- Using Microsoft Azure C# Libraries to Create a Storage Container -- Creating an ASP.NET 4.6 Web Site That Uses the Storage Container -- Chapter 17: Advanced Cloud Programing and Deployment -- Creating an ASP.NET Web API -- Deploying and Consuming an ASP.NET Web API on Microsoft Azure -- Scaling an ASP.NET Web API on Microsoft Azure -- Part IV: Data Access -- Chapter 18: Files -- File Classes for Input and Output -- The File and Directory Classes -- The FileInfo Class -- The DirectoryInfo Class -- Path Names and Relative Paths -- Streams -- Classes for Using Streams -- The FileStream Object -- The StreamWriter Object -- The StreamReader Object -- Asynchronous File Access -- Reading and Writing Compressed Files -- Monitoring the File System -- Chapter 19: XML and JSON -- XML Basics -- JSON Basics -- XML Schemas -- XML Document Object Model -- The XmlDocument Class -- The XmlElement Class -- Changing the Values of Nodes -- Converting XML to JSON -- Searching XML with XPath -- Chapter 20: LINQ -- LINQ to XML -- LINQ to XML Functional Constructors -- Working with XML Fragments -- LINQ Providers -- LINQ Query Syntax -- Declaring a Variable for Results Using the var Keyword -- Specifying the Data Source: from Clause -- Specify Condition: where Clause -- Selecting Items: select Clause -- Finishing Up: Using the foreach Loop -- Deferred Query Execution -- LINQ Method Syntax -- LINQ Extension Methods -- Query Syntax versus Method Syntax -- Lambda Expressions -- Ordering Query Results -- Understanding the orderby Clause -- Querying a Large Data Set -- Using Aggregate Operators -- Using the Select Distinct Query -- Ordering by Multiple Levels…”
    Libro electrónico
  15. 2495
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Copyright -- Credits -- Foreword -- About the Author -- About the Reviewers -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Introducing Cloud Native Architecture and Microservices -- Introduction to cloud computing -- Software as a Service -- Platform as a Service -- Infrastructure as a Service -- The cloud native concepts -- Cloud native - what it means and why it matters? …”
    Libro electrónico
  16. 2496
    Publicado 2018
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Exploring the Azure Cloud -- Fundamentals of cloud computing -- Virtualization -- Software-Defined Datacenter -- SOA -- Cloud services -- Cloud types -- Understanding the Azure Cloud -- A small history of the Azure Cloud -- Azure architecture -- Azure in your organization -- Azure and open source -- Summary -- Questions -- Further reading -- Chapter 2: Getting Started with the Azure Cloud -- Technical requirements -- Getting access to Azure -- Logging in using the Azure portal -- Getting command-line access to Azure -- Installing the Azure command-line interface -- Logging in with the Azure CLI -- PowerShell -- Logging in with PowerShell -- Azure Resource Manager -- Linux and Azure -- Linux distributions -- Microsoft-endorsed Linux distributions -- Deploying a Linux virtual machine -- Your first virtual machine -- Images -- Image sizing -- Virtual machine networking -- Virtual machine information -- Connecting to Linux -- Logging in to your Linux VM using password authentication -- Logging in to your Linux VM with an SSH private key -- Summary -- Questions -- Further reading -- Chapter 3: Basic Linux Administration -- The Linux shell -- Executing commands -- Command-line editing -- Working with history -- Auto-completion -- Globbing -- Redirections -- Working with variables -- Bash configuration files -- Getting help -- Using the man-pages -- Using info documents -- Other documentation -- Working with text files -- Reading text -- Searching in text files -- Editing text files -- Finding your way in the filesystem -- File hierarchy system -- Mounting filesystems -- Finding files on the filesystem -- Process management -- View processes -- Sending signals to a process -- Discretionary Access Control -- User management…”
    Libro electrónico
  17. 2497
    por Ramanujan, Madhu
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and Credits -- Contributors -- About Reviewers -- Table of Contents -- Preface -- Section 1: Getting Started with Salesforce CPQ Implementation -- Chapter 1: Getting Started with Salesforce CPQ Implementation -- The relationship between the sales process and cloud computing -- Understanding the quote-to-cash process -- Introducing Salesforce CPQ -- Configure -- Price -- Quote -- CPQ high-level object flow -- Salesforce CPQ advantages -- Salesforce CPQ versus Industries CPQ -- Installing Salesforce CPQ -- Summary -- Chapter 2: Configuring Opportunities and Quotes -- Salesforce opportunities, quotes, and products -- Opportunities -- Quotes -- Products -- Introducing CPQ quotes -- Enabling CPQ permission set licenses -- Creating a quote -- The Quote Line Editor -- Field sets -- Quote line drawers -- Sorting QLE line columns -- Default buttons on the QLE -- Custom buttons in the QLE -- Cloning a quote line -- Customizing the QLE column width -- CPQ approvals -- Standard approvals -- Advanced Approvals -- AA objects -- Advantages of creating orders from a quote -- Enabling orders -- Summary -- Chapter 3: Configuring CPQ Products -- Products overview -- Types of products -- Configuring products -- Creating custom actions and search filters -- Creating custom actions -- Creating a search filter -- Verifying custom actions in the QLE -- Creating dynamic search filters -- Configuring product bundles -- Creating a product bundle in a Salesforce instance -- Creating a product option in a Salesforce instance -- Creating a product feature in a Salesforce instance -- Adding a bundle to the QLE -- Creating product rules -- Creating a validation product rule -- Creating a summary variable and an error condition -- Associating a product rule with a product bundle -- Testing the validation product rule in the QLE…”
    Libro electrónico
  18. 2498
    Publicado 2023
    Tabla de Contenidos: “…-- Summary -- Chapter 11: Predicting the Future of Mobile DevOps -- Mobile app development trends -- Cross-platform mobile development is on the rise -- Developing mobile apps with low code -- Security is getting more important -- Increase in the impact of AI and ML -- Increase in the usage of cloud computing -- The growing importance of UX -- The growing impact of AR and VR -- Increasing use of voice apps -- The growth of IoT integration -- Mobile DevOps trends -- Automating orchestrating of mobile releases will grow -- The rise in cloud-based infrastructure -- A growing need for automation -- The shift-left will become more prevalent -- Increasing the importance of security and data protection -- Keeping an eye on the performance of mobile apps -- The rise of AI testing and codeless testing tools -- A rise in platform engineering and developer productivity -- Summary -- Index -- Other Books You May Enjoy…”
    Libro electrónico
  19. 2499
    por Pradeep, ashyap
    Publicado 2016
    Tabla de Contenidos: “…Rural Marketing Insight: Cloud Computing for Rural Banking…”
    Libro electrónico
  20. 2500
    Publicado 2018
    Tabla de Contenidos: “…-- Strategies for implementing blockchain interoperability -- Single custodian -- Multisignature federation -- Sidechains or relays -- Hash locking -- Building a FedCoin -- Smart contracts to digitalize fiat currency -- Atomic swap smart contracts -- Testing -- Summary -- Chapter 6: Building Quorum as a Service Platform -- Introduction to cloud computing -- Private versus public versus hybrid cloud -- IaaS versus PaaS and SaaS -- What are containers? …”
    Libro electrónico