Mostrando 2,541 - 2,560 Resultados de 2,723 Para Buscar '"Cloud computing"', tiempo de consulta: 0.14s Limitar resultados
  1. 2541
    Publicado 2018
    Tabla de Contenidos: “…6.1 Science Can Help Inform Virtual Reality Development -- 6.2 Virtual Reality Can Help Inform Psychology and Science -- 6.3 Types of Psychophysiological Measures and Tools -- 6.4 Outcome of the Evaluation -- 6.5 Conclusions -- References -- Part II: Artificial Intelligence Technologies and Applications for Health and Medicine -- Chapter 7: State of The Art: Artificial Intelligent Technologies for Mobile Health of Stroke Monitoring and Rehabilitation Robotics Control -- 7.1 Introduction -- 7.2 Research Chapter Objectives -- 7.3 Literature Review -- 7.4 Description of the Research Telemedicine Platform -- 7.5 A proposed intelligent adaptive behavior control to rehabilitation robotics -- 7.6 Materials and Methods -- 7.7 Conclusion Summary: Artificial Intelligence Technologies -- References -- Chapter 8: Artificial Intelligence for Smart Cancer Diagnosis: A New Telemedicine System Based on Fuzzy Image Segmentation -- 8.1 Introduction -- 8.2 Background and Related work -- 8.3 Proposed System Architecture -- 8.4 Telemedicine System Modules -- 8.5 Results and discussion -- 8.6 Conclusion and Future Work -- References -- Chapter 9: Mobile Doctor Brain AI App: Artificial Intelligence for Iot Healthcare -- 9.1 Introduction -- 9.2 State of the Art -- 9.3 Proposed System Design -- 9.4 Proposed Artificial Intelligence Techniques for New AI loT Health-Care Solutions for Stroke Monitoring -- 9.5 Conclusion -- References -- Chapter 10: An Artificial Intelligence Mobile-Cloud Computing Tool: Experimental Results Based on Physicians' and Patients' Views of Cancer Care by Family Medicine -- 10.1 Introduction -- 10.2 Background and State-of-the-Art -- 10.3 Development and Proposing a New Intelligent case-based Reasoning Decision Engine for Cacer Diagnosis -- 10.4 Experimental Results of The Proposed System -- 10.5 Conclusion -- References…”
    Libro electrónico
  2. 2542
    Publicado 2019
    Tabla de Contenidos: “…8.3.2 Distributed BMS -- 8.4 Representative Products -- 8.4.1 E‐Power BMS -- 8.4.2 Klclear BMS -- 8.4.3 Tesla BMS -- 8.4.4 ICs for BMS Design -- 8.5 Key Points of BMSs in Future Generation -- 8.5.1 Self‐Heating Management -- 8.5.2 Safety Management -- 8.5.3 Cloud Computing -- 8.6 Summary -- References -- Index -- EULA…”
    Libro electrónico
  3. 2543
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part I: Artificial Intelligence Applications -- Chapter 1 Artificial Intelligence Overview: Architecture, Applications and Challenges -- 1.1 Introduction -- 1.1.1 History of Artificial Intelligence -- 1.1.2 Components of Artificial Intelligence -- 1.1.3 Levels of Artificial Intelligence -- 1.2 Artificial Intelligence Agents -- 1.3 Artificial Intelligence Algorithms -- 1.4 Applications of Artificial Intelligence -- 1.4.1 Agriculture -- 1.4.2 Healthcare -- 1.4.3 Education -- 1.4.4 Banking -- 1.4.5 Opportunities and Challenges -- 1.5 Conclusion -- References -- Chapter 2 Video Analytics Using Deep Learning Models -- 2.1 Introduction -- 2.1.1 Artificial Intelligence -- 2.1.2 Deep Learning Overview and Evolution -- 2.1.3 Edge Computing -- 2.1.4 Cloud Computing -- 2.2 Video Analytics -- 2.2.1 Video Surveillance -- 2.2.2 Real-Time Video Mining and Video Monitoring -- 2.2.3 Video Analytics Functional Model -- 2.3 Object Detection and Object Tracking -- 2.3.1 Object Detection -- 2.3.2 Object Tracking -- 2.3.3 Role of Deep Learning in Object Tracking -- 2.3.4 Functional Model -- 2.4 Industrial Application -- 2.4.1 Healthcare -- 2.4.2 Smart City -- 2.4.3 Connected Home -- 2.4.4 Security -- 2.4.5 Sports -- 2.5 Conclusion -- References -- Chapter 3 Optimizing Search Engine for Enhancing Computing and Communication in Real-Time Systems -- 3.1 Introduction -- 3.1.1 Existing System -- 3.1.2 Problem Definition -- 3.1.3 Feasibility Study -- 3.1.4 Experimental Work -- 3.2 Literature Review -- 3.3 Requirement Specification -- 3.3.1 Search Engine Optimization -- 3.3.2 Web Analytics -- 3.3.3 Web Architecture Diagram -- 3.4 Testing and Validation -- 3.4.1 SEO Testing…”
    Libro electrónico
  4. 2544
    Publicado 2024
    Tabla de Contenidos: “…References -- Chapter 3 Safe and Reliable Smart City Design Based on Blockchain Technology -- 3.1 Introduction -- 3.1.1 Blockchain Technology -- 3.1.2 Use of Blockchain in Smart City -- 3.1.3 Objective of Work -- 3.2 Related Work -- 3.2.1 Problem Statement -- 3.3 Blockchain Technology for Smart Cities -- 3.3.1 Application of the System -- 3.3.2 Blockchain Technology's Many Advantages in the Modern Smart City -- 3.4 Methods -- 3.4.1 Blockchain-Based Smart City Infrastructure -- 3.5 Conclusion -- References -- Chapter 4 Blockchain and Digital Twin for Enhancing Personal Security in Modern Cities -- 4.1 Introduction -- 4.2 Digital Twin -- 4.2.1 Digital Twins in Manufacturing Industry -- 4.2.2 Integration with Emerging Technologies -- 4.2.3 Real-World Reflection Through Sensors -- 4.2.4 Land Management and Global Concerns -- 4.2.5 Increasing Importance of Information Technologies -- 4.2.6 Advancements in IoT and Connectivity -- 4.2.7 Role of Artificial Intelligence (AI) in Digital Twins -- 4.2.8 Cloud Computing Empowering Digital Twins -- 4.2.9 Impact of 5G Technology -- 4.2.10 Smart Cities and the Growing Application Field -- 4.2.11 Big Data's Role in Informed Decision Making -- 4.3 Digital Twin and Metaverse -- 4.3.1 Virtual Prototyping and Design Optimization -- 4.3.2 Healthcare Integration for Personalized Medicine -- 4.3.3 The Intersection of Digital Twins and the Metaverse -- 4.3.4 Immersive Collaborative Environments -- 4.3.5 Enhanced Virtual Experiences Through Data Fusion -- 4.3.6 Challenges and Future Developments -- 4.3.7 Data Privacy and Security Concerns -- 4.3.8 Standardization and Interoperability -- 4.4 Blockchain Technology -- 4.4.1 Overview of Blockchain Technology -- 4.4.2 Data Checking and Analysis -- 4.4.3 Immutable History -- 4.4.4 Potential Problem Solving -- 4.4.5 Rapid Adoption by Major Companies…”
    Libro electrónico
  5. 2545
    por Foltz, Kevin
    Publicado 2020
    Tabla de Contenidos: “…5.15 Data at Rest -- 5.16 Data in Motion -- 6 The Cloud -- 6.1 The Promise of Cloud Computing -- 6.2 Benefits of the Cloud -- 6.3 Drawbacks of Cloud Usage -- 6.3.1 Differences from Traditional Data Centers -- 6.3.2 Some Changes in the Threat Scenario -- 6.4 Challenges for the Cloud and High Assurance -- 6.5 Cloud Accountability, Monitoring, and Forensics -- 6.5.1 Accountability -- 6.5.2 Monitoring -- 6.5.3 Knowledge Repository -- 6.5.4 Forensic Tools -- 6.6 Standard Requirements for Cloud Forensics -- 7 The Network -- 7.1 The Network Entities -- 7.1.1 Most Passive Elements -- 7.1.2 Issues of the Most Passive Devices -- 7.1.3 The Convenience Functions -- 7.1.4 Issues for the Convenience Functions -- 7.1.5 Content Analyzers -- 7.1.6 Issues for Content Analyzers -- Section II Technical Details -- 8 Claims-Based Authentication -- 8.1 Authentication and Identity -- 8.2 Credentials in the Enterprise -- 8.3 Authentication in the Enterprise -- 8.3.1 Certificate Credentials -- 8.3.2 Registration -- 8.3.3 Authentication -- 8.4 Infrastructure Security Component Interactions -- 8.4.1 Interactions Triggered by a User Request for Service -- 8.4.2 Interaction Triggered by a Service Request -- 8.5 Compliance Testing -- 8.6 Federated Authentication -- 8.6.1 Naming and Identity -- 8.6.2 Translation of Claims or Identities -- 8.6.3 Data Requirements -- 8.6.4 Other Issues -- 9 Credentials for Access Claims -- 9.1 Security Assertion Markup Language -- 9.2 Access Control Implemented in the Web Service -- 9.3 Establishing Least Privilege -- 9.4 Default Values -- 9.5 Creating an SAML Token -- 9.6 Scaling of the STS for High Assurance Architectures -- 9.7 Rules for Maintaining High Assurance during Scale-Up -- 10 Claims Creation -- 10.1 Access Control Requirements at the Services -- 10.1.1 Discretionary Access Control List -- 10.1.2 Mandatory Access Control…”
    Libro electrónico
  6. 2546
    Publicado 2022
    Tabla de Contenidos: “…Virtual reality -- 5.7. Cloud computing -- 6. Databases related to classification of diseases, digital image code, and viruses taxonomy -- 6.1. …”
    Libro electrónico
  7. 2547
    Publicado 2015
    Tabla de Contenidos: “…7.4 Incorporating Mobile Services into Cross-Domain Orchestration with SP-SDN 7.5 Summary and Conclusions 8 The Controller Placement Problem in Software-Defined Mobile Networks (SDMN) Hakan Selvi, Selcan Guner, Gurkan Gur, Fatih Alagoz 8.1 Introduction 8.2 SDN and Mobile Networks 8.3 Performance Objectives for SDMN Controller Placement 8.4 Controller Placement Problem (CPP) 8.5 Conclusion 9 Technology Evolution in Mobile Networks - Case of Open IaaS-cloud Platforms Antti Tolonen, Sakari Luukkainen 9.1 Introduction 9.2 Generic Technology Evolution 9.3 Study Framework 9.4 Overview on Cloud Computing 9.5 Example Platform: OpenStack 9.6 Case Analysis 9.7 Discussion 9.8 Chapter Summary Part III : Traffic Transport and Network Management 10 Mobile Network Function and Service Delivery Virtualization and Orchestration Peter Bosch, Alessandro Duminuco, Jeff Napper, Louis (Sam) Samuel, Paul Polakos 10.1 Introduction 10.2 Network Function Virtualization (NFV) 10.3 Software Defined Networking (SDN) 10.4 The Mobility use case 10.5 Virtual networking in data centers 10.6 Summary 11 Survey of Traffic Management in Software-Defined Mobile Networks Zoltan Faigl, Laszlo Bokor 11.1 Chapter Overview 11.2 Traffic management in mobile networks 11.3 QoS enforcement and policy control in 3G/4G networks 11.4 Traffic management in software-defined mobile networks 11.5 Application-layer traffic optimization in software-defined mobile networks 11.6 Conclusions 12 Software Defined Networks for mobile application services Ram Gopal Lakshmi Narayanan 12.1 Chapter Overview 12.2 Overview of 3GPP Network Architecture 12.3 Wireless network architecture evolution towards NFV and SDN 12.4 NFV/SDN Service Chaining 12.5 Open research and further study 13 Load Balancing in Software Defined Mobile Networks Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei Gurtov 13.1 Introduction 13.2 Load Balancing in SDMN 13.3 Future Directions and Challenges for Load-Balancing Technologies Part IV : Resource and Mobility Management 14 QoE Management Framework for Internet Services in SDN enabled mobile networks Dipl.…”
    Libro electrónico
  8. 2548
    Publicado 2011
    Tabla de Contenidos: “…What Is the Role of Cloud Computing in an SOA Infrastructure? -- 93. What Are the Common Pitfalls in Creating an SOA Infrastructure? …”
    Libro electrónico
  9. 2549
    Publicado 2023
    Tabla de Contenidos: “…The Forgotten Asset Turnover -- The Neglected Return on Assets -- The Incomprehensible Equity Multiplier Ratio -- The Unthinkable Return on Equity -- Understanding Cash Flow and Market Value -- Step 1: Industry Potential and Economic Risks Analysis -- Step 2: In-Depth Company Analysis -- Step 3: Historical Financial Performance Evaluation -- Step 4: Financial Projection Development -- Step 5: Investment Decision-Making -- Anticipating Investors -- Cash Flow and Market Value Loop -- Key Takeaways -- Chapter 14 Uniting Marketing and Finance: From Separation to Integration -- Historically Important but Separate Pillars -- Efficiency, Effectiveness, and Productivity Revisited -- Standard Financial Statements Are Not Enough -- Stages of Unification -- Stage 0: Entirely Separated -- Stage 1: Basic Communication -- Stage 2: Limited Coordination -- Stage 3: Comprehensive Alignment -- Stage 4: Fully Integrated -- The Finance-Marketing Loop -- Key Takeaways -- Chapter 15 Technology for Humanity: High Tech, Higher Touch1 -- The New Level of Touch -- Implications of Tech-Driven Marketing -- Customer Management -- More Attention on Community -- More Contextual Approach -- More Realistic Positioning -- Product Management -- Codify Authentic Differentiation -- Reinvent Marketing Mix -- Redesign Sales Channel -- Brand Management -- Build Strong Character -- Instill a Sense of Caring -- Open Up Collaboration -- Key Takeaways -- Chapter 16 Technology and Stakeholders: Leveraging Tools to Increase Value -- Technology for People -- Compensation Management Software -- Cloud Computing -- Collaboration Platforms -- Data Analytics -- Augmented Reality and Virtual Reality -- 3D Printing -- Robotics/Automation -- Industrial Internet of Things -- Technology for Customers -- Customer Data Platforms (CDPs) -- Online Payment Systems -- Chatbots and Virtual Assistants…”
    Libro electrónico
  10. 2550
    Publicado 2022
    Tabla de Contenidos: “…-- Types of cloud services -- Distribution models -- Cloud security - examples of measures that can prevent risks -- The seven pain points of cloud computing -- Reduced visibility -- Compliance violations -- Absence of a strategy and architecture for cloud security -- Internal threats -- Contractual violations -- Unprotected user interface (API) -- Errors in the configuration of cloud services -- Cloud and GDPR concerns -- Security concerns specific to the cloud -- What effect is GDPR having on the cloud industry? …”
    Libro electrónico
  11. 2551
    por Kammermann, Markus
    Publicado 2022
    Tabla de Contenidos: “…11.2 Dynamic Host Configuration Protocol -- 11.3 DNS (Domain Name System) -- 11.3.1 hosts -- 11.3.2 Der Windows Internet Naming Service (WINS) -- 11.3.3 Das Domain Name System -- 11.3.4 Der Aufbau von DNS -- 11.3.5 Das Konzept des dynamischen DNS -- 11.4 Web- und Mail-Protokolle -- 11.4.1 HTTP -- 11.4.2 FTP -- 11.4.3 TFTP -- 11.4.4 NNTP -- 11.4.5 SMTP -- 11.4.6 POP3 und IMAP4 -- 11.5 Weitere Dienstprotokolle -- 11.5.1 NTP -- 11.5.2 SSH -- 11.5.3 Telnet -- 11.6 Fragen zu diesem Kapitel -- Kapitel 12: Netzwerke betreiben -- 12.1 Grundlagen der Verwaltung -- 12.1.1 Arbeitsgruppen und Domänen -- 12.1.2 Der Client/Server-Ansatz -- 12.1.3 Client/Server-Bausteine -- 12.1.4 Wichtige Fragen zum Einsatz eines NOS -- 12.2 Verschiedene Systeme kurz vorgestellt -- 12.2.1 Apple -- 12.2.2 Unix -- 12.2.3 Linux -- 12.2.4 Von Windows NT bis Windows 2022 -- 12.2.5 Citrix und VMWare -- 12.2.6 Die Bedeutung von SMB über Betriebssysteme hinweg -- 12.3 Die Virtualisierung -- 12.4 Cloud Computing -- 12.4.1 Servicemodelle in der Cloud -- 12.4.2 Betriebsmodelle -- 12.4.3 Angebote aus der Cloud -- 12.5 Ein Wort zum Thema Speicher -- 12.6 Sicherheitsfragen zu Cloud-Modellen und Rechenzentren -- 12.7 Die Administration des Netzwerks -- 12.8 Ressourcen im Netzwerk teilen -- 12.9 Identifikation und Rechte im Netzwerk -- 12.9.1 Benutzer einrichten -- 12.9.2 Das Erstellen von Gruppen -- 12.9.3 Datei- und Ordnerrechte -- 12.9.4 Drucken im Netzwerk -- 12.10 Fragen zu diesem Kapitel -- Kapitel 13: Sicherheitsverfahren im Netzwerkverkehr -- 13.1 Identifikation und Authentifikation -- 13.1.1 Aller Anfang ist ... das Passwort -- 13.1.2 Das Zero Trust-Konzept -- 13.2 Authentifikationsverfahren -- 13.2.1 Single Sign On und Mehr-Faktor-Authentifizierung -- 13.2.2 PAP und CHAP -- 13.2.3 EAP -- 13.2.4 Kerberos -- 13.2.5 RADIUS -- 13.3 Die Hash-Funktion -- 13.4 Verschlüsselung…”
    Libro electrónico
  12. 2552
    Publicado 2014
    “…Damit folgt Oracle dem allgemeinen IT-Trend und setzt die Idee des Cloud Computing im Datenbankbereich konsequent um. Die Umsetzung wurde, wie nicht anders zu erwarten, wesentlich durch den Enterprise Manager, der auch den Namen Cloud Control erhalten hat, vorgenommen. …”
    Libro electrónico
  13. 2553
    Publicado 2016
    Tabla de Contenidos: “…6.3.1 - No-History Reference Tables -- 6.3.2 - History-Based Reference Tables -- 6.3.3 - Code and Descriptions -- 6.3.3.1 - Code and Descriptions with History -- Reference -- Chapter 7 - Dimensional Modeling -- 7.1 - Introduction -- 7.2 - Star Schemas -- 7.2.1 - Fact Tables -- 7.2.1.1 - The Grain of a Fact Table -- 7.2.2 - Dimension Tables -- 7.2.3 - Querying Star Schemas -- 7.3 - Multiple Stars -- 7.3.1 - Conformed Dimensions -- 7.4 - Dimension Design -- 7.4.1 - Slowly Changing Dimensions -- 7.4.2 - Hierarchies -- 7.4.3 - Snowflake Design -- References -- Chapter 8 - Physical Data Warehouse Design -- 8.1 - Database Workloads -- 8.1.1 - Workload Characteristics -- 8.2 - Separate Environments for Development, Testing, and Production -- 8.2.1 - Blue-Green Deployment -- 8.3 - Microsoft Azure Cloud Computing Platform -- 8.4 - Physical Data Warehouse Architecture on Premise -- 8.4.1 - Hardware Architectures and Databases -- 8.4.2 - Processor Options -- 8.4.3 - Memory Options -- 8.4.4 - Storage Options -- 8.4.5 - Network Options -- 8.5 - Database Options -- 8.5.1 - tempdb Options -- 8.5.2 - Partitioning -- 8.5.3 - Filegroups -- 8.5.4 - Data Compression -- 8.6 - Setting up the Data Warehouse -- 8.6.1 - Setting up the Stage Area -- 8.6.1.1 - Hardware Considerations for Stage Area -- 8.6.1.2 - Stage Database Setup -- 8.6.2 - Setting up the Data Vault -- 8.6.2.1 - Hardware Considerations for Data Vault Layer -- 8.6.2.2 - Backing Up the Data Vault -- 8.6.2.3 - Data Vault Database Setup -- 8.6.3 - Setting up Information Marts -- 8.6.3.1 - Hardware Considerations for Information Marts -- 8.6.3.2 - Information Mart Database Setup -- 8.6.4 - Setting up the Meta, Metrics, and Error Marts -- 8.6.4.1 - Hardware Considerations for Meta, Metrics, and Error Marts -- 8.6.4.2 - Meta, Metrics, and Error Marts Database Setup -- References…”
    Libro electrónico
  14. 2554
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Evolution of Internet of Things (IoT): Past, Present and Future for Manufacturing Systems -- 1.1 Introduction -- 1.2 IoT Revolution -- 1.3 IoT -- 1.4 Fundamental Technologies -- 1.4.1 RFID and NFC -- 1.4.2 WSN -- 1.4.3 Data Storage and Analytics (DSA) -- 1.5 IoT Architecture -- 1.6 Cloud Computing (CC) and IoT -- 1.6.1 Service of CC -- 1.6.2 Integration of IoT With CC -- 1.7 Edge Computing (EC) and IoT -- 1.7.1 EC with IoT Architecture -- 1.8 Applications of IoT -- 1.8.1 Smart Mobility -- 1.8.2 Smart Grid -- 1.8.3 Smart Home System -- 1.8.4 Public Safety and Environment Monitoring -- 1.8.5 Smart Healthcare Systems -- 1.8.6 Smart Agriculture System -- 1.9 Industry 4.0 Integrated With IoT Architecture for Incorporation of Designing and Enhanced Production Systems -- 1.9.1 Five-Stage Process of IoT for Design and Manufacturing System -- 1.9.2 IoT Architecture for Advanced Manufacturing Technologies -- 1.9.3 Architecture Development -- 1.10 Current Issues and Challenges in IoT -- 1.10.1 Scalability -- 1.10.2 Issue of Trust -- 1.10.3 Service Availability -- 1.10.4 Security Challenges -- 1.10.5 Mobility Issues -- 1.10.6 Architecture for IoT -- 1.11 Conclusion -- References -- Chapter 2 Fourth Industrial Revolution: Industry 4.0 -- 2.1 Introduction -- 2.1.1 Global Level Adaption -- 2.2 Evolution of Industry -- 2.2.1 Industry 1.0 -- 2.2.2 Industry 2.0 -- 2.2.3 Industry 3.0 -- 2.2.4 Industry 4.0 (or) I4.0 -- 2.3 Basic IoT Concepts and the Term Glossary -- 2.4 Industrial Revolution -- 2.4.1 I4.0 Core Idea -- 2.4.2 Origin of I4.0 Concept -- 2.5 Industry -- 2.5.1 Manufacturing Phases -- 2.5.2 Existing Process Planning vs. …”
    Libro electrónico
  15. 2555
    Publicado 2018
    Tabla de Contenidos: “…Boundary defense with firewalls and filtering -- Comprehensive access control -- Core and edge gateways -- Unidirectional gateway protection -- Asset discovery, visibility, and monitoring -- Physical security - the first line of defense -- Security assessment of IIoT connectivity standards and protocols -- Fieldbus protocols -- Connectivity framework standards -- Data Distribution Service -- DDS security -- oneM2M -- oneM2M security -- Open Platform Communications Unified Architecture (OPC UA) -- OPC UA security -- Web services and HTTP -- Web services and HTTP security -- Connectivity transport standards -- Transmission Control Protocol (TCP) -- TCP security -- User Datagram Protocol (UDP) -- UDP security -- MQTT and MQTT-SN -- MQTT security -- Constrained Application Protocol (CoAP) -- CoAP security -- Advanced Message Queuing Protocol (AMQP) -- Connectivity network standards -- Data link and physical access standards -- IEEE 802.15.4 WPAN -- IEEE 802.11 wireless LAN -- Cellular communications -- Wireless wide area network standards -- IEEE 802.16 (WiMAX) -- LoRaWAN -- Summary -- Chapter 6: Securing IIoT Edge, Cloud, and Apps -- Defining edge, fog, and cloud computing -- IIoT cloud security architecture -- Secured industrial site -- Secured edge intelligence -- Secure edge cloud transport -- Secure cloud services -- Cloud security - shared responsibility model -- Defense-in-depth cloud security strategy -- Infrastructure security -- Identity and access management -- Application security -- Microservice architecture -- Container security -- Credential store and vault -- Data protection -- Data governance -- Data encryption -- Key and digital certificate management -- Securing the data life cycle -- Cloud security operations life cycle -- Business continuity plan and disaster recovery -- Secure patch management -- Security monitoring…”
    Libro electrónico
  16. 2556
    Publicado 2023
    Tabla de Contenidos: “…Attack phase - Delivery -- Example controls for Delivery -- Insights from ATT&amp -- CK -- Attack phase - Exploitation -- Example controls for Exploitation -- Insights from ATT&amp -- CK -- Attack phase - Installation -- Example controls for Installation -- Insights from ATT&amp -- CK -- Attack phase - Command and Control (C2) -- Example controls for C2 -- Insights from ATT&amp -- CK -- Attack phase - Reconnaissance II -- Example controls for Reconnaissance II -- Insights from ATT&amp -- CK -- Attack phase - Actions on Objectives -- Example controls for Actions on Objectives -- Insights from ATT&amp -- CK -- Conclusion -- Summary -- References -- Chapter 11: Measuring Performance and Effectiveness -- Introduction -- Using vulnerability management data -- Assets under management versus total assets -- Known unpatched vulnerabilities -- Unpatched vulnerabilities by severity -- Vulnerabilities by product type -- Measuring the performance and efficacy of an Attack-Centric Strategy -- Performing intrusion reconstructions -- Using intrusion reconstruction results -- Identifying lame controls -- Learning from failure -- Identifying helpful vendors -- Informing internal assessments -- Adversary emulations leveraging ATT&amp -- CK -- Summary -- References -- Chapter 12: Modern Approaches to Security and Compliance -- Introduction -- How is cloud computing different? -- Cloud Service Providers versus Managed Service Providers -- Migrating to the cloud -- Cybersecurity assessment questionnaires -- Security and compliance game changers -- The power of APIs -- The advantages of automation -- Mitigating insider threat and social engineering -- Mitigating unpatched vulnerabilities -- Mitigating security misconfigurations -- Mitigating weak, leaked and stolen credentials -- Security and compliance game changers - summary…”
    Libro electrónico
  17. 2557
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Contents -- Acknowledgments -- Introduction -- Chapter 1 Security Fundamentals -- Reviewing the Requirements for SSCP -- Registering for the Exam -- Have One Year of Experience -- Passing the Exam -- Maintaining Your SSCP Certification -- Understanding the Main Goals of Information Security -- Availability -- Integrity -- Confidentiality -- Exploring Fundamentals of Security -- Defense in Depth -- AAAs of Security -- Accountability -- Nonrepudiation -- Least Privilege -- Separation of Duties -- Due Diligence -- Due Care -- Questions -- Answers -- Chapter 2 Access Controls -- Comparing Identification and Authentication -- Authentication -- Three Factors of Authentication -- Single Sign-on Authentication -- Centralized Verse Decentralized Authentication -- Offline Authentication -- One-Time Passwords -- Implementing Access Controls -- Comparing Subjects and Objects -- Logical Access Control -- Physical Access Control -- Access Control Models -- DAC -- Non-DAC -- MAC -- RBAC -- Implementing Identity Management -- Provisioning -- Maintenance -- De-provisioning -- Entitlement -- Understanding Cloud Computing -- Virtualization -- Storage -- Privacy and Data Control -- Compliance -- Questions -- Answers -- Chapter 3 Basic Networking and Communications -- The OSI Model -- The Physical Layer (Layer 1) -- The Data Link Layer (Layer 2) -- The Network Layer (Layer 3) -- The Transport Layer (Layer 4) -- The Session Layer (Layer 5) -- The Presentation Layer (Layer 6) -- The Application Layer (Layer 7) -- Comparing the OSI and TCP/IP Models -- Network Topographies -- Ethernet -- Bus -- Star -- Token Ring -- Reviewing Basic Protocols and Ports -- Address Resolution Protocol -- Internet Control Message Protocol -- Internet Group Message Protocol -- Dynamic Host Configuration Protocol -- Simple Network Management Protocol…”
    Libro electrónico
  18. 2558
    Publicado 2017
    Tabla de Contenidos: “…-- Practical parallelization with R -- Using C++ and Fortran to accelerate calculations -- Using an old-school approach with Fortran -- Using a modern approach with C++ -- Looking back at what we have achieved -- Other topics of interest to enhance performance -- Preallocating memory to avoid duplication -- Making R code a bit faster with byte code compilation -- Just-in-time (JIT) compilation of R code -- Using memoization or cache layers -- Improving our data and memory management -- Using specialized packages for performance -- Flexibility and power with cloud computing -- Specialized R distributions -- Summary -- Chapter 10: Adding Interactivity with Dashboards -- Required packages…”
    Libro electrónico
  19. 2559
    Publicado 2024
    Tabla de Contenidos: “…-- Data quantity -- Data velocity -- Data variety -- Data quality -- First-, second-, and third-party data -- First-party data - the treasure trove within -- Second-party data - building bridges through collaboration -- Third-party data - broadening horizons with external expertise -- Structured, unstructured, and semi-structured data -- Structured data -- Unstructured data -- Semi-structured data -- Methods for collecting data -- Storing and processing data -- Cloud, on-premises, and hybrid solutions - navigating the data storage and analysis landscape -- Cloud computing - scalable services in the cloud -- On-premises - maintaining control within your walls -- Hybrid - the best of both worlds? …”
    Libro electrónico
  20. 2560
    Publicado 2024
    Tabla de Contenidos: “…-- Understanding IoT communication -- IoT communication layers -- IoT communication models -- IoT communication protocols -- Attack vectors for IoT devices -- Access control -- Firmware attacks -- Web attacks -- Network service/communication protocol attacks -- Unencrypted local data storage -- Confidentiality and integrity issues -- Cloud computing attacks -- Malicious updates -- Insecure APIs -- Mobile application threats -- Other attacks -- An IoT hacking methodology -- Understanding OT -- An OT hacking methodology -- Best practices for securing IoT/OT -- Lab - discovering IoT devices -- Summary -- Assessment…”
    Libro electrónico