Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Transport 612
- Transportation 522
- Transporte 430
- Business & Economics 369
- Transportation Economics 287
- Transportes 246
- Transporte acuático 230
- Historia 213
- Economic conditions 143
- Engineering & Applied Sciences 139
- Computer networks 126
- History 123
- Environmental aspects 116
- Economics 115
- Ferrocarriles 114
- Economic policy 112
- Technology: general issues 109
- History of engineering & technology 108
- Innovaciones tecnológicas 108
- European Conference of Ministers of Transport 106
- Research & information: general 104
- Investigación científica 102
- Management 99
- Derecho marítimo 98
- aspectos económicos 93
- Environment 91
- Transporte ferroviario 89
- Urbanismo 88
- Història 87
- Transportes urbanos 87
-
9381Publicado 2018Tabla de Contenidos: “…Using a Pilot Light architecture for DR -- Using a warm standby architecture for DR -- Using a Multi-Site architecture for DR -- Testing disaster recovery strategy -- Setting up high availability -- AWS high availability architecture -- HA support for Elastic Load Balancer -- HA support for the Relational Database Service -- Summary -- Chapter 6: Designing for and Implementing Security -- Defining security objectives -- Understanding the security responsibilities -- Best practices in implementing AWS security -- Security considerations while using CloudFront -- CloudFront and ACM integration -- Understanding access control options -- Web Application Firewall -- Securing the application -- Implementing Identity Lifecycle Management -- Tracking AWS API activity using CloudTrail -- Logging for security analysis -- Using third-party security solutions -- Reviewing and auditing security configuration -- Setting up security -- Using AWS IAM to secure an infrastructure -- Understanding IAM roles -- Using the AWS Key Management Service -- Creating KMS keys -- Using the KMS key -- Application security -- Implementing transport security -- Generating self-signed certificates -- Configuring ELB for SSL -- Securing data at rest -- Securing data on S3 -- Using the S3 console for server-side encryption -- Securing data on RDS -- Summary -- Chapter 7: Deploying to Production and Going Live -- Managing infrastructure, deployments, and support at scale -- Creating and managing AWS environments using CloudFormation -- Creating CloudFormation templates -- Building a DevOps pipeline with CloudFormation -- Updating stacks -- Extending CloudFormation -- Using CloudWatch for monitoring -- Using AWS solutions for backup and archiving -- Planning for production go-live activities -- Setting up for production -- AWS production deployment architecture -- VPC subnets…”
Libro electrónico -
9382por Ritchie, Kyle J.Tabla de Contenidos: “…Innovating to attract new customers -- The Drive to Be Healthier -- Lifestyles that foster health and sustainability -- Wellness as a priority -- The Drive to Be in Compliance -- Environmental, social, and corporate governance -- Corporate social responsibility (CSR) -- Climate and shareholders -- A Larger Drive Toward Deep Sustainability -- This has been brewing for a while -- Precedents -- Looking to the future -- Chapter 4 From Linear To Circular: What You Need To Know -- So Much Chaos: Understanding Entropy -- Externalized costs -- Linear versus circular: A hilarious- yet-depressing comparison -- Borrow from nature, not from the future -- Waste = Food: Redefining Disposal -- All materials have another use -- Product stewardship -- Building Resilience Through Diversity: Redefining Strength -- Responding to disruption -- Takes a lickin' and keeps on tickin' -- Durability and reparability policies -- Part 2 Rethinking Business for a Circular Economy -- Chapter 5 Identifying Your Business Opportunities -- Exploring the Benefits of Going Circular -- Exploiting the profit opportunities -- Reducing volatility and ensuring greater supply chain security -- Managing the new demand for business services -- Improving customer interaction and loyalty -- Rethinking the Business Model -- Building new types of capital -- Rethinking money as the only medium of exchange -- Reflecting the true cost of products -- Embracing diversity -- Rethinking your supply chain -- Designing for the future -- Examining Business from a Global Perspective -- Chapter 6 Rethinking the Conventional Business Model -- Rethinking How We Look at Cost -- The hidden cost of procurement -- The hidden impact of transportation -- The hidden burden of inventory -- The hidden secrets of quality -- Maximizing Your Value Proposition to Customers -- Becoming a mission-driven company…”
Publicado 2021
Libro electrónico -
9383Publicado 2023Tabla de Contenidos: “…Chapter 5 Quiz -- Answers to Chapter 5 Quiz -- Chapter 6 Getting the Picture: Graphing Categorical Data -- Take Another Little Piece of My Pie Chart -- Tallying personal expenses -- Bringing in a lotto revenue -- Ordering takeout -- Projecting age trends -- Raising the Bar on Bar Graphs -- Tracking transportation expenses -- Making a lotto profit -- Tipping the scales on a bar graph…”
Libro electrónico -
9384Publicado 2022Tabla de Contenidos: “…The Different Expectation of Your Customer-by-Customer Type -- The Cost of Not Paying Attention to Logistics -- The Benefits of Making Logistics a Strategic Competency -- Steps to Make Logistics Your Competitive Advantage -- Why Technology Is So Important to Logistics -- Area 1: Insight/Planning/Monitoring -- Area 1, Use Case 1: Logistics Insight via Data Analytics -- Area 1, Use Case 2: Advanced Forecasting via Machine Learning and AI-Based Prediction -- Area 1, Use Case 3: Dynamic Decision-Making via Machine Learning and AI-Based Prediction with Real-Time Data and Blockchain -- Area 2: Task Execution -- Area 2, Use Case 1: Automation for Information Processing via Robotics Process Automation -- Area 2, Use Case 2: Automation for Physical Tasks via Robotics -- Area 2, Use Case 3: Autonomous Transportation via Autonomous Technologies -- Area 3: Exchanges and Collaborations -- Area 3, Use Case 1: Digital Freight Brokerage via Cloud Technologies -- Area 3, Use Case 2: Supply Chain Collaboration via Cloud Technologies -- Area 4: Safety, Security, and Compliance -- Area 4, Use Case 1: Global Trade Compliance via Cloud Technologies -- Summary -- Sample Questions -- Notes -- Chapter 7 Big Data for Small, Midsize, and Large Operations -- Introduction -- Structured Data and Relational Databases -- Unstructured Data -- Why Manufacturing Needs Big Data Analytics -- The Four Levels of Data Analytics -- Descriptive Analytics - What Happened? …”
Libro electrónico -
9385por Organisation for Economic Co-operation and DevelopmentTabla de Contenidos: “…Quelques engagements concernant la qualité de l'air -- Tableau 21. Transport routier : normes d'émission et émissions -- Tableau 22. …”
Publicado 2003
Libro electrónico -
9386Publicado 2017Tabla de Contenidos: “…. -- There's more... -- Pino transports and prettifying -- Logging with Morgan -- Logging with Winston -- Adding logging to Koa -- Adding logging to Hapi -- Capturing debug logs with with Pino -- See also -- Implementing authentication -- Getting ready -- How to do it... -- How it works... -- There's more... -- Session authentication in Hapi -- Session authentication in Koa -- See also -- Chapter 8: Dealing with Security -- Introduction -- Detecting dependency vulnerabilities -- Getting ready -- How to do it... -- How it works... -- There's more... -- Module vetting…”
Libro electrónico -
9387por Tyson, EricTabla de Contenidos: “…Acknowledging what money can't buy -- Managing the balancing act -- Prioritizing Your Savings Goals -- Knowing what's most important to you -- Valuing retirement accounts -- Dealing with competing goals -- Building Emergency Reserves -- Saving to Buy a Home or Business -- Funding Kids' Educational Expenses -- Saving for Big Purchases -- Preparing for Retirement/Financial Independence -- Figuring out what you need for retirement/ financial independence -- Understanding retirement building blocks -- Crunching numbers for your retirement -- Making up for lost time -- Part 2 Spending Less, Saving More -- Chapter 5 Dealing with Debt -- Using Savings to Reduce Your Consumer Debt -- Understanding how you gain -- Finding the funds to pay down consumer debts -- Decreasing Debt When You Lack Savings -- Reducing your credit card's interest rate -- Understanding all credit-card terms and conditions -- Cutting up your credit cards -- Discovering debit cards: The best of both worlds -- Turning to Credit Counseling Agencies -- Beware biased advice at credit counseling agencies -- Ask questions and avoid debt management programs -- Filing Bankruptcy -- Understanding bankruptcy benefits -- Coming to terms with bankruptcy drawbacks -- Deciphering the bankruptcy laws -- Choosing between Chapter 7 and 13 -- Seeking bankruptcy advice -- Stopping the Spending/ Consumer Debt Cycle -- Resisting the credit temptation -- Identifying and treating a compulsion -- Chapter 6 Reducing Your Spending -- Unlocking the Keys to Successful Spending -- Living within your means -- Looking for the best values -- Eliminating the fat from your spending -- Turning your back on consumer credit -- Budgeting to Boost Your Savings -- Reducing Your Spending -- Managing food costs -- Saving on shelter -- Cutting transportation costs -- Lowering your energy costs -- Controlling clothing costs…”
Publicado 2019
Libro electrónico -
9388Publicado 2015Tabla de Contenidos: “…economic Aspects Driving the Paradigm Change 83 -- 3.2.1 Technology Dimension 84 -- 3.2.2 Network Dimension 87 -- 3.2.3 Spectrum Dimension 98 -- 3.3 System View of Future Mobile Broadband PPDR Communications 101 -- 3.3.1 LTE Dedicated Networks 103 -- 3.3.2 LTE Commercial Networks 104 -- 3.3.3 Legacy PMR/LMR Networks 104 -- 3.3.4 Transportable Systems and Satellite Communications 105 -- 3.3.5 IP?]…”
Libro electrónico -
9389Publicado 2024Tabla de Contenidos: “…Meters -- Gas Controls and Safety Features -- Gas Ignition Devices -- Purging and Testing -- Gas Appliances -- Balanced Flue Appliances -- Open Flue Appliances -- Flue Blocks -- Open Flue Terminals -- Stainless Steel Flue Lining -- Shared Flues -- Fan-Assisted Gas Flues -- Ventilation Requirements -- Combusted Gas Analysis -- Gas Laws -- Gas Consumption -- Gas Pipe and Flue Sizing -- Part Eleven-Electrical Supply and Installations -- Three-Phase Generation and Supply -- Electricity Distribution -- Electricity Intake to a Building -- Earthing Systems and Bonding -- Consumer Unit -- Power and Lighting Circuits -- Overload Protection -- Insulated Cable -- Testing Completed Installation -- Cable Rating -- Diversity -- Industrial Installations -- Electric Space Heating -- Controls for Electric Night Storage Space Heaters -- Construction Site Electricity -- Light Sources, Lamps and Luminaires -- Lighting Controls - Dwellings -- Extra-Low-Voltage Lighting -- Lighting Design -- Daylighting -- Telecommunications Installation -- Electric Vehicle Charger -- Part Twelve-Mechanical Conveyors - Lifts, Escalators and Travelators -- Planning Lift Installations -- Roping Systems for Electric Lifts -- Controls -- Lift Doors -- Lift Machine Room and Equipment -- Lift Safety Features -- Installation Details -- Typical Single Lift Dimensions -- Paternoster Lifts -- Oil-Hydraulic Lifts -- Lift Performance -- Estimating the Number of Lifts Required -- Firefighting Lifts -- Vertical Transportation for the Disabled -- Builders' and Electricians' Work -- Escalators -- Travelators -- Stair Lifts -- Ropeless Lifts -- Part Thirteen-Fire Prevention and Control Services -- Sprinklers -- Drenchers -- Hose Reel Installations -- Hydrants -- Foam Installations -- Gas Extinguishers -- Fire Alarms -- Smoke, Fire and Heat Detectors -- Fire Detection Electrical Circuits…”
Libro electrónico -
9390Publicado 2022Tabla de Contenidos: “…Membranes: Their Structure, Function, and Chemistry -- 7.1 The Functions of Membranes -- Membranes Define Boundaries and Serve as Permeability Barriers -- Membranes Contain Specific Proteins and Therefore Have Specific Functions -- Membrane Proteins Regulate the Transport of Solutes -- Membrane Proteins Detect and Transmit Electrical and Chemical Signals -- Membrane Proteins Mediate Cell Adhesion and Cell-to-Cell Communication -- 7.2 Models of Membrane Structure: An Experimental Perspective -- Overton and Langmuir: Lipids Are Important Components of Membranes -- Gorter and Grendel: The Basis of Membrane Structure Is a Lipid Bilayer -- Davson and Danielli: Membranes Also Contain Proteins -- Robertson: All Membranes Share a Common Underlying Structure -- Further Research Revealed Major Shortcomings of the Davson-Danielli Model -- Singer and Nicolson: A Membrane Consists of a Mosaic of Proteins in a Fluid Lipid Bilayer -- Unwin and Henderson: Most Membrane Proteins Contain Transmembrane Segments -- 7.3 Membrane Lipids: The "Fluid" Part of the Model -- Membranes Contain Several Major Classes of Lipids -- Fatty Acids Are Essential to Membrane Structure and Function -- Thin-Layer Chromatography Is an Important Technique for Lipid Analysis -- Membrane Asymmetry: Most Lipids Are Distributed Unequally Between the Two Monolayers -- The Lipid Bilayer Is Fluid -- Most Organisms Can Regulate Membrane Fluidity…”
Libro electrónico -
9391Publicado 2024Tabla de Contenidos: “…. -- The Company -- Position Description -- Job Requirements -- Interview Questions -- Author Tips -- Review Summary -- Key Terms -- Review Questions -- Discussion Questions -- Hands-On MIS Projects -- Management Decision Problem -- Improving Decision Making: Using a Spreadsheet to Create a Town Budget -- Achieving Operational Excellence: Using Internet Software to Plan Efficient Transportation Routes -- Collaboration and Teamwork Project -- Business Problem-Solving Case: How Much Does Technology Help Collaboration? …”
Libro electrónico -
9392Publicado 2017Tabla de Contenidos: “…Cover -- Copyright -- Credits -- About the Authors -- About the Reviewers -- www.Packtpub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: Anatomy of an Unsafe Application -- Security audit -- About the sample application -- The JBCP calendar application architecture -- Application technology -- Reviewing the audit results -- Authentication -- Authorization -- Database credential security -- Sensitive information -- Transport-level protection -- Using Spring Security 4.2 to address security concerns -- Why Spring Security? …”
Libro electrónico -
9393por Barton, RickTabla de Contenidos: “…Managing Context Variables -- Introduction -- Transportable code -- Context variables -- Common values in contexts -- Passing command line parameters -- Setting context variables in the code -- Database context variables -- Creating a context group -- How to do it... -- How it works... -- There's more... -- Context types -- Prompt for variable values using the tree mode -- Adding a context group to your job -- Getting ready -- How to do it... -- How it works... -- There's more... -- Adding contexts to a context group -- Getting ready -- How to do it... -- There's more... -- Using tContextLoad to load contexts -- Getting ready -- How to do it... -- How it works... -- There's more... -- Print operations -- Warnings -- Context file location -- Using implicit context loading to load contexts -- Getting ready -- How to do it... -- How it works... -- There's more... -- Turning implicit context loading on and off in a job -- Getting ready -- How to do it…”
Publicado 2013
Libro electrónico -
9394Publicado 2015Tabla de Contenidos: “…-- Construction, commissioning, and maintenance -- Materials storage and transport -- Emergency provision -- Security -- Central services -- Earthworks -- Conceptual layout methodology -- Detailed layout methodology -- For construction -- Further Reading -- 15 How to Make Sure Your Design Is Reasonably Safe and Sustainable -- Introduction -- Why only reasonably?…”
Libro electrónico -
9395Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Contents Forward Preface 1 -- INTRODUCTIONS AND MOTIVATION 1.1 Introduction 1.2 The book 1.2.1 Objectives 1.2.2 Benefits 1.2.3 Organization 1.2.4 Book Cover 1.2.5 Impact of C-IoT 1.2.6 Summary 1.3 C-IoT Terms of References 1.3.1 Introduction 1.3.2 Need for IoT Framework 1.3.3 C-IoT Domains and Business Apps Model 1.3.4 C-IoT Roadmap 1.3.5 C-IoT Platform and Developer Community 1.3.6 C-IoT Opportunities for Business apps, solutions and systems 1.4 The Future 1.4.1 General Trends 1.4.2 Point Solutions 1.4.3 Collaborative IoT 1.4.4 C-IoT and RFID 1.4.5 C-IoT and Nanotechnology 1.4.6 Cyber-Collaborative IoT (C2-IoT) 1.4.7 C2-IoT and EBOLA Case 1.4.8 Summary 2 -- APPLICATION REQUIREMENTS 2.1 C-IOT Landscape 2.1.1 C-IoT Model and Architecture Layers 2.1.2 C-IoT Model and Enabling Technologies 2.1.3 Definition of key elements 2.1.4 Requirement Considerations 2.1.5 C-IoT System Solution - Requirement Considerations 2.2 Applications Requirement - Use Cases 2.3 Health & Fitness (Lead Example) 2.3.1 Landscape 2.3.2 Health & Fitness - Sensing Requirements 2.3.3 Health & Fitness - Gateway Requirements 2.3.4 Health & Fitness - Service Requirements 2.3.5 Health & Fitness - Solution Considerations 2.3.6 Health & Fitness - System Considerations 2.3.7 Health & Fitness and Hospitals 2.4 Video Surveillance 2.4.1 Landscape 2.4.2 Video Surveillance - Across Home, Industry and Infrastructure 2.4.3 Video Surveillance - Sensing Requirements 2.4.4 Video Surveillance - Gateway Requirements 2.4.5 Video Surveillance - Services 2.4.6 Example: Red Light Camera - Photo Enforcement Camera 2.4.7 Conclusion 2.5 Smart Home & Building 2.5.1 Landscape 2.5.2 Requirement 2.5.3 Home - Sensing Requirements 2.5.4 Home - Gateway Requirements 2.5.5 Home - Services 2.6 Smart Energy 2.6.1 Landscape 2.6.2 Requirements 2.6.3 Smart Energy - Sensing Requirements 2.6.4 Smart Energy - Gateway Requirements 2.6.5 Smart Energy - Services 2.6.6 The Smart Energy App 2.6.7 Smart Energy and Network Security 2.7 Track & Monitor 2.7.1 Landscape 2.7.2 Track & Monitory - Sensing Requirements 2.7.3 Track & Monitor - Services 2.7.4 Track & Monitor - Solution Considerations 2.7.5 Track & Monitor - Examples 2.8 Smart Factory/Manufacturing 2.8.1 Factory Automation - Robot 2.8.2 Caregiver and Robot 2.8.3 Industrial Robot 2.9 Others: Smart Car, Smart Truck and Smart City 2.9.1 Smart Car 2.9.2 Smart Roadside 2.9.3 Drone 2.9.4 Machine Vision 2.9.5 Smart City 3 -- C-IOT APPLICATIONS AND SERVICES 3.1 Smart IoT Application Use Cases 3.1.1 Health monitoring - Individual level (Fitness/Health Tracking wearables) 3.1.2 Health Monitoring at Business level (used in clinic) 3.1.3 Home and Building Automation - Individual level (Smart Home) 3.1.3.1 Smart Thermostat (Smart Energy Management) 3.1.3.2 Smart Smoke Alarm (Safety) 3.1.3.3 Smart IP Camera for Video Surveillance (Security) 3.1.3.4 Smart Service Robots at Consumer level - Roombas iRobot 3.1.3.5 Smart Home Gateway (Scalable for Smart Building Automation) 3.1.3.6 Smart Building Automation 3.1.4 Smart Energy and Smart Grid 3.1.5 Smart Energy Gateways 3.1.6 Industrial and Factory Automation 3.1.7 Smart Transportation & Fleet Logistics (Connected Cars - V2X: V2V, V2I) 3.1.8 Smart City 3.2 Smart IoT Platform 3.2.2 Smart IoT Software Gateway Platform 3.2.3 Smart Sensor Fusion Platform 3.3 Secured C-IoT Software Platform 3.3.1 C-IoT Security - Example on Smart Energy 3.3.2 Securing NAN (Metrology-to-Concentrator) 3.3.3 Securing Home Area Network (HAN) 3.3.4 Securing WAN (Concentrator-to-Sub Station/Utility Servers) 3.3.5 Platform Solution for Concentrator 3.3.6 Platform Solution for Sub Station/Utility Servers 3.3.7 Network Topology and IP Addressing: WAN 3.3.8 Security on the Concentrator and Utility Servers 3.3.9 Summary on C-IoT Security 4 -- IOT REFERENCE DESIGN KIT 5 -- C-IOT CLOUD-BASED SERVICES AND END DEVICE DIVERSIITY 5.1 C-IoT Cloud Based Services 5.1.1 Introduction and Drivers to C-IoT Service Platform 5.1.2 Classes of C-IoT Cloud Computing 5.1.3 C-IoT Innovative and Collaborative Services 5.1.4 The Emerging Data Centre LAN 5.2 C-IoT User Device Diversity 5.2.1 Introduction 5.2.2 C-IoT Developers/Platform 5.2.3 Wearable Devices - Individual 5.2.4 Harvesting (Self-powered nodes) - Infrastructure Applications 5.2.5 Embedded Devices and Servers 5.2.6 Performing Sentiment Analysis Using Big Data 5.2.7 Far-Reaching Consequence 5.2.8 Collaboration 6 -- IMPACT OF C-IOT AND TIPS 6.1 Impact on Business Process Productivity and Smart of Digital Life 6.1.1 Individual 6.1.2 Industry 6.1.3 Infrastructure 6.2 Considerations of developing Differentiated C-IoT Solutions 6.2.1 Software Processes and Platform 6.2.3 Standardization 6.2.4 Advertising Ecosystem Value Exchange 6.2.5 Opportunity with Industry Supply Chain for Material Handling 6.3 Practical Tips in maintaining Digital Life Style 6.3.1 Mobile and Wearable Computing 6.3.2 Robotics and Automation 6.3.3 Sensors and C-IoT 6.3.4 BIG Data and Predictive Analysis 6.3.5 The Changing Workforce 6.3.6 Sustainability 7 -- CONCLUSION 7.1 Simple C-IoT Domains and Model 7.2 Disruptive Business Applications of C-IoT 7.3 A New LifeStyle 7.4 Development Platform 7.5 C-IoT emerging Standards, Consortiums and other Initiatives 7.5.1 C-IoT Emerging Standards 7.5.2 C-IoT Emerging Consortiums 7.5.3 Forums, Workshops, and other Initiatives 7.5.4 C-IoT and Radio Communications 7.5.5 C-IoT and Nanotechnology 7.5.6 C-IoT and Security 7.6 Final Note References About the Authors Index …”
Libro electrónico -
9396Publicado 2017Tabla de Contenidos: “…Communicating sequential processes -- PyCSP -- Processes in PyCSP -- Output -- Summary -- Chapter 9: Event-Driven Programming -- Event-driven programming -- The event loop -- Asyncio -- Getting started -- Event loops -- The run_forever() method -- The run_until_complete() method -- The stop() method -- The is_closed() method -- The close() function -- Tasks -- Example -- The all_tasks(loop=None) method -- The current_tasks() function -- The cancel() function -- Task functions -- The as_completed(fs, *, loop= -- The ensure_future(coro_or_future, *, loop= -- The wrap_future(future, *, loop= -- The gather(*coroes_or_futures, loop= -- The wait() function -- Futures -- Example -- Output -- Coroutines -- Chaining coroutines -- Output -- Transports -- Protocols -- Synchronization between coroutines -- Locks -- Queues -- Events and conditions -- Semaphores and BoundedSemaphores -- Sub-processes -- Debugging asyncio programs -- Debug mode -- Twisted -- A simple web server example -- Gevent -- Event loops -- Greenlets -- Simple example-hostnames -- Output -- Monkey patching -- Summary -- Chapter 10: Reactive Programming -- Basic reactive programming -- Maintaining purity -- ReactiveX, or RX -- Installing RxPY -- Observables -- Creating observers -- Example -- Example 2 -- Breaking it down -- Output -- Lambda functions -- Example -- Breaking it down -- On_next, on_completed, and on_error in lambda form -- Output -- Operators and chaining -- Filter example -- Breaking it down -- Chained operators -- The different operators -- Creating observables -- Transforming observables -- Filtering observables -- Error-handling observables -- Hot and cold observables -- Emitting events -- Example -- Breaking it down -- Output -- Multicasting -- Example -- Output -- Combining observables -- Zip() example -- Output -- The merge_all() operator -- Output -- Concurrency…”
Libro electrónico -
9397Publicado 2019Tabla de Contenidos: “…-- DevOps evolved from Agile -- DevOps focuses on people -- Company culture is the foundation of DevOps -- You learn by observing your process and collecting data -- Persuasion is key to DevOps adoption -- Small, incremental changes are priceless -- Benefitting from DevOps -- Keeping CALMS -- Solving the problem of conflicting interests -- Chapter 2 Designing Your Organization -- Assessing Your Culture's Health -- Integrating DevOps -- Establishing DevOps Values -- Encourage teamwork -- Reduce silos -- Practice systems thinking -- Embrace failure -- Communicate, communicate, communicate -- Accept feedback -- Automate processes (when appropriate) -- Modeling Company Culture -- Avoiding the worst of tech culture -- Crafting your vision -- Incentivizing Your Values -- Evaluations -- Rewards -- Chapter 3 Identifying Waste -- Digging into the Seven Types of Waste -- Unnecessary process -- Waiting -- Motion -- Costs of defects -- Overproduction -- Transportation -- Inventory -- Understanding waste in DevOps -- Rooting Out Waste -- Discovering bottlenecks -- Focusing on impact -- Chapter 4 Persuading Colleagues to Try DevOps -- Fearing Change -- Persuading Those around You to Shift to DevOps -- Earning executive support -- Creating a groundswell in the engineering group -- Managing the middle managers -- Persuading the stubborn -- Understanding the Adoption Curve -- Pushing for change -- Responding to pushback -- Navigating the chasm -- Asking "Why?" …”
Libro electrónico -
9398Publicado 2010Tabla de Contenidos: “…Suitable Operating Environments -- Storage Methods -- Transportation and Shipping -- Chapter 10 Security -- Do I Know This Already?" …”
Libro electrónico -
9399por Hébert, Fred, 1988-Tabla de Contenidos: “…Distribunomicon -- This Is My Boomstick -- Fallacies of Distributed Computing -- The Network Is Reliable -- There Is No Latency -- Bandwidth Is Infinite -- The Network Is Secure -- Topology Doesn't Change -- There Is Only One Administrator -- Transport Cost Is Zero -- The Network Is Homogeneous -- Fallacies in a Nutshell -- Dead or Dead-Alive -- My Other Cap Is a Theorem -- Consistency -- Availability -- Partition Tolerance -- Zombie Survivors and CAP -- Setting Up an Erlang Cluster -- Through the Desert on a Node with No Name -- Connecting Nodes -- More Tools -- Cookies -- Remote Shells -- Hidden Nodes -- The Walls Are Made of Fire, and the Goggles Do Nothing -- The Calls from Beyond -- The net_kernel Module -- The global Module -- The rpc Module -- Burying the Distribunomicon -- 27. …”
Publicado 2013
Libro electrónico -
9400Publicado 2022Tabla de Contenidos: “…Security monitoring and audit trails using Azure Monitor -- Best practices for using Azure Monitor -- Security monitoring and approval process using Customer Lockbox -- Best practices for using Customer Lockbox -- Security monitoring and audit trail using Google Cloud Logging -- Security monitoring using Google Security Command Center -- Security monitoring and approval process using Access Transparency and Access Approval -- Conducting threat detection and response -- Using Amazon Detective for threat detection -- Using Amazon GuardDuty for threat detection -- Security monitoring using Microsoft Defender for Cloud -- Using Azure Sentinel for threat detection -- Using Azure Defender for threat detection -- Using Google Security Command Center for threat detection and prevention -- Conducting incident response and digital forensics -- Conducting incident response in AWS -- Conducting incident response in Azure -- Conducting incident response in Google Cloud Platform -- Summary -- Chapter 7: Applying Encryption in Cloud Services -- Technical requirements -- Introduction to encryption -- Symmetric encryption -- Asymmetric encryption -- Best practices for deploying KMSes -- AWS Key Management Service (KMS) -- AWS CloudHSM -- Azure Key Vault -- Azure Dedicated/Managed HSM -- Google Cloud Key Management Service (KMS) -- Best practices for deploying secrets management services -- AWS Secrets Manager -- Google Secret Manager -- Best practices for using encryption in transit -- IPSec -- Transport Layer Security (TLS) -- Best practices for using encryption at rest -- Object storage encryption -- Block storage encryption -- Full database encryption -- Row-level security -- Encryption in use -- AWS Nitro Enclaves -- Azure Confidential Computing -- Google Confidential Computing -- Summary -- Section 3: Threats and Compliance Management…”
Libro electrónico