Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 239
- Application software 202
- Artificial intelligence 200
- Management 191
- Engineering & Applied Sciences 170
- Computer networks 160
- Cloud computing 157
- Computer programs 127
- Machine learning 123
- Computer security 116
- Computer graphics 102
- Data processing 101
- Python (Computer program language) 101
- Security measures 101
- Digital techniques 98
- Computer Science 94
- Photography 85
- Web site development 82
- Technological innovations 81
- Design 80
- Internet of things 78
- Image processing 77
- Computer software 76
- History 71
- Programming 71
- Examinations 68
- Information technology 67
- Leadership 65
- Computer programming 59
- Electrical & Computer Engineering 59
-
101
-
102
-
103
-
104
-
105
-
106
-
107
-
108
-
109
-
110
-
111
-
112
-
113
-
114
-
115
-
116Publicado 2008“…In doing so, Crossing Empire's Edge inspires new ways of thinking about both modern Japanese history and the modern history of Japan in East Asia…”
Libro electrónico -
117
-
118Publicado 2021Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- Preface -- Acknowledgments -- Editors -- Contributors -- Section I -- Chapter 1: Secure Fog-Cloud of Things: Architectures, Opportunities and Challenges -- 1.1 Introduction -- 1.1.1 Chapter Road Map -- 1.2 Secure Fog-Cloud of Things -- 1.2.1 Environment -- 1.2.2 Architecture -- 1.3 Threats, Vulnerabilities and Exploits in Fog-Cloud of Things Ecosystems -- 1.4 Key Machine Learning Kits for Secure Fog-Cloud of Things Architecture -- 1.5 Applications -- 1.6 Opportunities and Challenges in Improving Security in Fog-Cloud of Things -- 1.6.1 Opportunities -- 1.6.2 Challenges -- 1.7 Future Trends -- 1.8 Conclusion -- References -- Chapter 2: Collaborative and Integrated Edge Security Architecture -- 2.1 Background -- 2.2 Edge Security Challenges -- 2.3 Perspectives of Edge Security Architecture -- 2.4 Emerging Trends and Enablers for Edge Security Architecture -- 2.4.1 The Edge Computing Architecture -- 2.4.2 Leveraging Fog-Based Security Architecture for Edge Networks -- 2.5 Collaborative and Integrated Security Architecture for Edge Computing -- 2.5.1 Overview -- 2.5.2 Distributed Virtual Firewall (DFWs) -- 2.5.3 Distributed Intrusion Detection Systems (IDSs) -- 2.6 Conclusion and Future Research -- References -- Chapter 3: A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing -- 3.1 Introduction -- 3.2 Fog Computing Systems -- 3.2.1 Description of Fog -- 3.2.2 Characteristics of Fog -- 3.2.3 Systemic Architecture of IoT-Fog-Cloud -- 3.2.4 Applications of IoT, Fog and Cloud Systems -- 3.3 Cyber Security Challenges -- 3.4 Security Solutions and Future Directions -- 3.5 Conclusion -- References -- Chapter 4: Security and Organizational Strategy: A Cloud and Edge Computing Perspective -- 4.1 Introduction…”
Libro electrónico -
119por Mitra, IndraneelTabla de Contenidos: “…Table of Contents Introduction to the Data-Driven Edge with Machine Learning Foundations of Edge Workloads Building the Edge Extending the Cloud to the Edge Ingesting and Streaming Data from the Edge Processing and Consuming Data on the Cloud Machine Learning Workloads at the Edge DevOps and MLOps for the Edge Fleet Management at Scale Reviewing the Solution with AWS Well-Architected Framework…”
Publicado 2022
Libro electrónico -
120Publicado 2020“…Remarkably, however, this police force remains largely unknown. Crossing Empire's Edge is the first book in English to reveal its complex history. …”
Libro electrónico