Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Information Technology 1,261
- Computer Science (Hardware & Networks) 1,254
- Engineering & Applied Sciences 420
- Computer Science 293
- Operating systems (Computers) 292
- Computer networks 279
- Programming 214
- Application software 182
- Development 173
- Computer security 168
- Security measures 163
- Examinations 162
- Linux 160
- Certification 153
- Computer input-output equipment 142
- Database management 137
- Electronic data processing personnel 124
- Management 120
- Computers 115
- Electrical & Computer Engineering 114
- Electronic data processing 112
- Embedded computer systems 111
- Microcomputers 111
- Microsoft Windows (Computer file) 111
- Data processing 110
- Hardware and Maker 107
- Artificial intelligence 104
- Design and construction 102
- Cloud computing 100
- Client/server computing 98
-
5021Publicado 2024Tabla de Contenidos: “…4.3.1 Cost of Implementing Smart Farming Technologies -- 4.3.1.1 Hardware Costs -- 4.3.1.2 Data Management Costs -- 4.3.1.3 Training and Support Costs -- 4.3.1.4 Infrastructure Costs -- 4.3.1.5 Financing Costs -- 4.3.2 Financing and Investment Challenges -- 4.3.3 Economic Benefits and Returns on Investment -- 4.4 Social Obstacles to Smart Farming Adoption -- 4.4.1 Lack of Knowledge and Understanding Among Farmers -- 4.4.2 Behavioral and Cultural Barriers to Change -- 4.4.3 Role of Education and Awareness Raising -- 4.5 Environmental Considerations in Smart Farming -- 4.5.1 Sustainable Agricultural Practices and Smart Farming -- 4.5.2 Environmental Benefits and Concerns -- 4.5.3 Climate Change Mitigation and Adaptation -- 4.5.3.1 Mitigating Climate Change -- 4.5.3.2 Adapting to Climate Change -- 4.6 Future Prospects for Smart Farming -- 4.6.1 Emerging Trends and Innovations in Smart Farming -- 4.6.2 Prospects for Overcoming Challenges and Barriers -- 4.6.3 Future Outlook for Sustainable Agriculture -- 4.7 Conclusion and Recommendations -- 4.7.1 Summary of Key Points -- 4.7.2 Policy Recommendations for Promoting Smart Farming -- 4.7.3 Conclusion and Future Directions for Research -- References -- Chapter 5 Sustainable Development in Agriculture: Soil Management -- 5.1 Introduction -- 5.2 Reviewing the Need for Global Food Production to be Upgraded -- 5.2.1 Growing Population and Changing Dietary Preferences -- 5.2.2 Climate Change and Resource Limitations -- 5.2.3 Environmental Sustainability and Biodiversity Conservation -- 5.2.4 Food Loss and Waste -- 5.2.5 Technological Advancements and Digitalization -- 5.2.6 Socio-Economic Equity and Rural Development -- 5.2.7 Policy Interventions and Governance -- 5.3 Soil Quality and Its Impact -- 5.4 Emerging Technologies -- 5.4.1 AI Revolution -- 5.4.1.1 Precision Farming and Decision Support Systems…”
Libro electrónico -
5022por Tretau, RolandTabla de Contenidos: “…-- 8.3 HACMP concepts -- 8.3.1 HACMP terminology -- 8.4 Planning and design -- 8.4.1 Supported hardware and software -- 8.4.2 Planning for networking -- 8.4.3 Plan for cascading versus rotating -- 8.5 Lab setup -- 8.5.1 Pre-installation tasks -- 8.5.2 Serial network setup -- 8.5.3 External storage setup -- 8.6 Installation -- 8.6.1 Install the cluster code -- 8.7 HACMP configuration -- 8.7.1 Initial configuration of nodes -- 8.7.2 Resource discovery -- 8.7.3 Defining HACMP interfaces and devices -- 8.7.4 Persistent addresses -- 8.7.5 Further cluster customization tasks -- Chapter 9. …”
Publicado 2005
Libro electrónico -
5023Publicado 2003“…Storage growth continues to accelerate, and the cost of disk can approach 80% of total system hardware costs. Yet, the storage in most businesses is typically only about 50% used. …”
Libro electrónico -
5024Publicado 2004Tabla de Contenidos: “…11.9.1 Set heap size and nursery size for efficient garbage collection -- 11.9.2 Set AIX threading parameters -- 11.9.3 Use HotSpot server instead of client -- 11.9.4 Setting thread stack size if using many threads -- 11.9.5 Reduce or increase heap size if out-of-memory errors occur -- 11.10 Large objects -- 11.10.1 Factors affecting large object size processing -- 11.10.2 Mitigating large object issues -- 11.11 Tuning other WebSphere BI runtime components -- Appendix A. Hardware and software configuration -- Configuration of client machines -- Configuration of runtime servers -- Appendix B. …”
Libro electrónico -
5025por Gucer, Vasfi“…The beginning of the new century sees the data center with a mix of work, hardware, and operating systems previously undreamed of. …”
Publicado 2004
Libro electrónico -
5026por Bergland, JohnTabla de Contenidos: “…Specifying Server configuration settings for LDAP -- A.0.1 Adding portal administrators to the Domino Directory -- Updating the Access Control List of the Domino Directory -- Configuring WebSphere Portal for Domino Directory -- Security is enabled -- Verifying LDAP -- WebSphere Portal Server hardware requirements for Linux Intel systems -- Appendix B. …”
Publicado 2004
Libro electrónico -
5027por Dubois, FlorenceTabla de Contenidos: “…4.1.3 Tools we used -- 4.2 Planning considerations -- 4.2.1 Decide on source and target DB2 subsystem -- 4.2.2 Decide on naming conventions for merged system -- 4.2.3 System availability issues -- 4.2.4 System backup and recovery issues -- 4.2.5 Hardware-based backup options -- 4.2.6 Merge in place procedure checklist -- 4.3 Merge in place scenario -- 4.4 Preparation steps -- 4.4.1 Source: Create full backup of source system -- 4.4.2 Target: Create full backup of catalog and directory of target -- 4.4.3 Source: Redefine empty tablespaces as DEFINE NO in source -- 4.4.4 Source: Reorganize tablespaces -- 4.4.5 Source and Target: Create and populate metadata tables -- 4.4.6 Source and Target: Define source objects in target system -- 4.4.7 Target: Update metadata tables -- 4.4.8 Target: Stop newly created databases -- 4.4.9 Target: Prepare RUNSTATS JCL -- 4.5 Migration steps -- 4.5.1 Source: Stop all update activity on source system -- 4.5.2 Source: Perform full backup of source DB2 subsystem -- 4.5.3 Source: Start source databases for UT access -- 4.5.4 Source: Execute REPAIR on page set header pages -- 4.5.5 Source: Stop source DB2 subsystem -- 4.5.6 Target: Delete target data sets and rename source data sets -- 4.5.7 Target: Start target databases in target system -- 4.5.8 Target: Execute REPAIR LEVELID on tablespaces and indexes -- 4.5.9 Cold start target system (optional) -- 4.5.10 Target: Execute RUNSTATS -- 4.5.11 Target: Perform IMAGE COPY -- 4.5.12 Configure SAP application server -- 4.6 Post-migration steps -- 4.6.1 Target: Verify access to objects using RSDB2MAS (optional) -- 4.6.2 Target: Alter the space allocations for TS and IX (optional) -- Chapter 5. …”
Publicado 2003
Libro electrónico -
5028por Baumgartner, ManfredTabla de Contenidos: “…4.4 Exkurs: Einsatzgebiet nach Systemarten -- 4.4.1 Desktop-Applikationen -- Hilfsfunktionen in der getesteten Applikation -- 4.4.2 Client-Server-Systeme -- Parallele Verwendung durch mehrere User -- Virtualisierung -- 4.4.3 Webapplikationen -- Teilautomatisierte Tests -- 4.4.4 Mobile Applikationen -- Herausforderungen bei der Automatisierung mobiler Applikationen -- Auswahl der Testplattformen -- Besonderheiten/spezielle Probleme bei der GUI-Testautomatisierung von mobilen Applikationen -- Umgang mit Interrupts -- Unterschiedliche Hardware der Endgeräte -- Netzwerkperformanz und unterschiedliche Typen von Netzwerkanbindungen -- Lösungsansätze -- Multi-Layer-Test -- Einsatz von Simulatoren und Emulatoren -- Risikobasierte Auswahl der Zielplattformen -- Einsatz von Cloud-Services -- 4.4.5 Webservices -- 4.4.6 Data Warehouse -- Plausibilitätschecks -- Nachimplementierung -- Definierte Eingabe-Ausgabe-Paare -- 4.4.7 Dynamische GUIs: Formularlösungen -- 4.4.8 Cloud Based Systems -- 4.4.9 Künstliche Intelligenz und Machine Learning -- Cross-Validation Test -- Hypothesis Testing -- Metamorphic Testing -- Adversarial Testing -- Sensitivity Testing -- Evolution Testing -- Intuitive Testfallermittlung und exploratives Testen -- Nutzung von KI und ML für Test und Testautomatisierung -- 5 Berichte und Metriken -- 5.1 Exkurs: Metriken und Validität -- 5.2 Beispiele für Metriken -- Nutzwert der TAS -- Aufwand für die Erstellung automatisierter Tests -- Anzahl von falsch negativen und falsch positiven Ergebnissen -- Testüberdeckung (Codeüberdeckung, Anforderungsüberdeckung) -- 5.3 Konkrete Implementierung und Realisierbarkeit in einer TAS -- 5.3.1 Exkurs: TAS und SUT als Quellen für Protokolle -- 5.3.2 Exkurs: Zentralisierte Verwaltung und Auswertung von Protokollen -- 5.3.3 Implementierung der Protokollierung in einer TAS…”
Publicado 2021
Libro electrónico -
5029Publicado 2020“…The only thing you need to get started is standard hardware and open source software…”
Libro electrónico -
5030Publicado 2003Tabla de Contenidos: “…Front cover -- Contents -- Figures -- Tables -- Examples -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. e-Business Intelligence and DB2 UDB ESE -- 1.1 Business issues and challenges -- 1.1.1 Build larger and larger data warehouses -- 1.1.2 Load and populate the data warehouse as fast as possible -- 1.1.3 Perform queries with performances -- 1.1.4 Operate in a 24 hours/7 days mode -- 1.1.5 Manage the data warehouse -- 1.1.6 Upgrade the data warehouse -- 1.1.7 Summary -- 1.2 DB2 UDB V8.1 functions for e-Business Intelligence -- 1.2.1 Performance enhancements -- 1.2.2 Availability enhancements -- 1.2.3 Manageability enhancements -- 1.2.4 UNION ALL views -- 1.3 New functionalities of IBM e-server p690 -- 1.3.1 Hardware overview -- 1.3.2 Logical partitioning for OLTP-aware e-BI -- 1.3.3 Cluster 1600 -- 1.3.4 Enhancements with AIX V5.2 -- 1.3.5 Workload management -- 1.4 Case study and technical environment -- 1.4.1 The case study based on TPC-H -- 1.4.2 Technical environment -- Chapter 2. …”
Libro electrónico -
5031Publicado 2023Tabla de Contenidos: “…12.9 Chief Information Security Officer (CISO) -- Summary -- Checklist -- 13 Housekeeping -- 13.1 Managing hardware -- 13.2 Support contracts -- 13.2.1 Providing support -- 13.3 Monitoring -- 13.3.1 Outside looking in -- 13.3.2 Inside looking in -- 13.4 Backup and restoration -- 13.4.1 Frequency/retention -- 13.4.2 Archive security -- 13.5 Budget oversight -- Summary -- Checklist -- 14 Company growth -- 14.1 Investment groups -- 14.2 Impromptu pitch -- 14.3 Investment cadence -- 14.4 Preparing for integration -- 14.5 Due diligence -- 14.5.1 Performing due diligence -- 14.5.2 Conducting due diligence -- 14.5.3 Presenting your findings -- 14.5.4 Answering due diligence -- 14.6 Handing over the reins -- 14.7 Taking the reins -- Summary -- Checklist -- 15 You, Inc. -- 15.1 Reviewing yourself -- 15.2 Mentor -- 15.3 Keeping pace -- 15.4 Monitoring change -- 15.5 Succession planning -- 15.6 Career success -- 15.7 Stepping up -- Summary -- Checklist -- index…”
Libro electrónico -
5032Publicado 2022Tabla de Contenidos: “…Interrelationship between AR and VR -- 3.2. Software and hardware components of AR/VR applications -- 4. Demand escalation of AR/VR due to COVID-19 pandemic -- 4.1. …”
Libro electrónico -
5033por Kamthane, Ashok N.Tabla de Contenidos: “…-- 1.3 Computer Organization and Architecture -- 1.4 Central Processing Unit (CPU) -- 1.4.1 Arithmetic/Logic Unit (ALU) -- 1.4.2 Registers -- 1.4.3 Control Unit (CU) -- 1.4.4 System Bus -- 1.4.5 Main Memory Unit -- 1.4.6 Cache Memory -- 1.5 Software -- 1.5.1 Relationship between Software and Hardware -- 1.6 Types of Software -- 1.6.1 System Software -- 1.6.2 Application Software -- Summary -- Exercises -- Chapter 2: Computer Memory and Storage -- 2.1 Introduction -- 2.1.1 Memory Representation -- 2.2 Memory Hierarchy -- 2.3 Random Access Memory (RAM) -- 2.3.1 Types of RAM -- 2.4 Read Only Memory (ROM) -- 2.4.1 Types of ROM -- 2.5 Types of Secondary Storage Devices -- 2.6 Magnetic Tape -- 2.6.1 Magnetic Tape Organisation -- 2.6.2 Advantages of Magnetic Tapes -- 2.6.3 Disadvantages of Magnetic Tapes -- 2.7 Magnetic Disk -- 2.7.1 Storage Organization of a Magnetic Disk -- 2.7.2 Accessing Data from Magnetic Disk -- 2.8 Types of Magnetic Disk -- 2.8.1 Floppy Disk -- 2.8.2 Hard Disk -- 2.8.3 Zip Disk -- 2.8.4 Advantages of Magnetic Disks -- 2.8.5 Disadvantages of Magnetic Disks -- 2.9 Optical Disk -- 2.9.1 Storage Organization of Optical Disk -- 2.9.2 Access Mechanism of Optical Disk -- 2.10 Types of Optical Disks -- 2.10.1 Compact Disk -- 2.10.2 Digital Versatile Disk -- 2.10.3 Blu-ray Disk -- 2.10.4 Advantages of Optical Disks -- 2.10.5 Disadvantages of Optical Disks -- 2.11 Magneto-optical Storage Devices -- 2.12 Universal Serial Bus (USB) -- 2.12.1 Pen Drive -- 2.12.2 External Hard Disk Drive -- 2.13 Memory Stick -- 2.14 Mass Storage Devices -- Summary…”
Publicado 2011
Libro electrónico -
5034por Goel, AnitaTabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Preface -- Roadmap to the Syllabus -- Unit I: Basics of Computers -- Chapter 1: Fundamentals of Computers -- 1.1 Introduction -- 1.1.1 The Computer System -- 1.1.2 Characteristics of Computers -- 1.1.3 The Input-Process-Output Concept -- 1.2 Classification of Computers -- 1.2.1 Microcomputers -- 1.2.2 Minicomputers -- 1.2.3 Mainframe Computers -- 1.2.4 Supercomputers -- 1.3 Computer Organization -- 1.3.1 Components of Computer Hardware -- 1.4 Central Processing Unit -- 1.4.1 Arithmetic Logic Unit -- 1.4.2 Registers -- 1.4.3 Control Unit -- 1.5 The System Bus -- 1.5.1 Data Bus -- 1.5.2 Address Bus -- 1.5.3 Control Bus -- 1.6 Instruction Set -- 1.6.1 Instruction Format -- 1.6.2 Instruction Cycle -- 1.7 Memory and Storage Systems -- 1.7.1 Memory Representation -- 1.7.2 Memory Hierarchy -- 1.7.3 CPU Registers -- 1.7.4 Cache Memory -- 1.7.5 Primary Memory -- 1.7.5.1 Random Access Memory -- 1.7.5.2 Read Only Memory -- 1.7.6 Secondary Memory -- 1.7.7 Using the Computer Memory -- 1.8 Input-Output Devices -- 1.8.1 Input Unit -- 1.8.2 Output Unit -- 1.8.3 Input Devices -- 1.8.3.1 Human Data Entry Devices -- 1.8.3.2 Pointing Devices -- 1.8.3.3 Pick Devices -- 1.8.3.4 Source Data Entry Devices -- 1.8.3.5 Optical Input Devices -- 1.8.4 Output Devices -- 1.8.4.1 Hard Copy Devices -- 1.8.4.2 Soft Copy Devices -- 1.9 System and Application Software -- 1.9.1 System Software -- 1.9.1.1 Operating System -- 1.9.1.2 Device Driver -- 1.9.1.3 System Utilities -- 1.9.1.4 Translator Software -- 1.9.2 Application Software -- Summary -- Key Words -- Questions -- Chapter 2: Computers: Ethics and Applications -- 2.1 Introduction -- 2.1.1 Definition -- 2.1.2 Computer Crime -- 2.1.3 Privacy and Secrecy -- 2.1.4 Intellectual Property -- 2.1.5 Professional Responsibility -- 2.2 Application Areas of Computers -- 2.2.1 E-business…”
Publicado 2012
Libro electrónico -
5035por Lázaro Domínguez, FranciscoTabla de Contenidos: “…INTRODUCCIÓN A LA INFORMÁTICA FORENSE -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 SE HA ESCRITO UN CRIMEN DIGITAL -- 1.1 UN DÍA COMO OTRO CUALQUIERA -- 1.2 INTERVENCIÓN -- 1.2.1 Los primeros en llegar -- 1.2.2 Apagado sin más -- 1.2.3 Objetos intervenidos -- 1.3 LA AMENAZA DIGITAL -- 1.3.1 El delito informático -- 1.3.2 Evaluación del riesgo -- 1.3.3 Los motivos del agresor -- 1.3.4 Amenazas internas y externas -- 1.4 DINÁMICA DE UNA INTRUSIÓN -- 1.4.1 Footprinting -- 1.4.2 Escaneo de puertos y protocolos -- 1.4.3 Enumeración -- 1.4.4 Penetración y despliegue de exploits -- 1.4.5 Puertas traseras -- 1.4.6 Borrando huellas -- 2 LA INVESTIGACIÓN FORENSE -- 2.1 ETAPAS DE UNA INVESTIGACIÓN FORENSE -- 2.1.1 Adquisición (Imaging) -- 2.1.2 Análisis -- 2.1.3 Presentación -- 2.1.4 La línea de tiempo -- 2.2 REQUISITOS DE LA INVESTIGACIÓN FORENSE -- 2.2.1 Aceptabilidad -- 2.2.2 Integridad -- 2.2.3 Credibilidad -- 2.2.4 Relación causa-efecto -- 2.2.5 Carácter repetible -- 2.2.6 Documentación -- 2.3 VALORACIÓN JURÍDICA DE LA PRUEBA DIGITAL -- 2.3.1 Interés legal de la prueba -- 2.3.2 Prueba física y prueba personal -- 2.3.3 Cualificación del investigador forense -- 2.3.4 La adquisición: fase crucial -- 3 SOPORTES DE DATOS -- 3.1 PROCEDIMIENTOS DE ADQUISICIÓN -- 3.1.1 EnCase & -- Linen -- 3.1.2 dd -- 3.1.3 dcfldd, dc3dd y ddrescue -- 3.1.4 AIR -- 3.1.5 Adquisición por hardware -- 3.1.6 MD5 y SHA -- 3.1.7 Cálculo de MD5 con Linux -- 3.2 DISCOS, PARTICIONES Y SISTEMAS DE ARCHIVOS -- 3.2.1 NTFS -- 3.2.2 FAT -- 3.2.3 ext2, ext3, ext4 -- 3.2.4 HFS, HFS+, JFS, ReiserFS, etc. -- 3.3 MODELO DE CAPAS -- 3.3.1 Nivel 1 -- 3.3.2 Nivel 2 -- 3.3.3 Nivel 3 -- 3.3.4 Nivel 4 -- 3.3.5 Nivel 5 -- 3.3.6 Nivel 6 -- 3.3.7 Nivel 7 -- 3.4 RECUPERACIÓN DE ARCHIVOS BORRADOS -- 3.4.1 Dinámica del borrado de archivos -- 3.4.2 Sector/, cluster/ y file slack…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
5036Publicado 2003Tabla de Contenidos: “…-- 3.2 Some common VSAM problems -- 3.2.1 Lack of virtual storage -- 3.2.2 Initial loading problems -- 3.2.3 Mismatch between catalog and data set -- 3.2.4 Hardware errors -- 3.2.5 Bad data or bad channel program -- 3.2.6 Structural damage -- 3.2.7 Improper sharing -- 3.2.8 Mismatch between catalog and VTOC -- 3.2.9 VSAM does not produce expected output -- 3.2.10 VSAM RLS problems -- 3.2.11 VSAM and DFSMStvs considerations -- 3.2.12 OEM problems -- 3.2.13 Enqueue issues -- 3.2.14 Migration issues -- 3.2.15 Performance considerations -- 3.2.16 Deadlocks -- 3.2.17 Beware of some VSAM restrictions -- 3.3 What documentation to collect…”
Libro electrónico -
5037Publicado 2021Tabla de Contenidos: “…-- 1.5 Combining IoT and Blockchain -- 1.5.1 Agriculture Industry -- 1.5.2 Manufacturing Industry -- 1.5.3 Food Processing Industry -- 1.5.4 Healthcare Industry -- 1.5.5 Military -- 1.5.6 Information Technology Industry -- 1.6 Observing Economic Growth and Technology's Impact -- 1.7 Applications of IoT and Blockchain Beyond Industries -- 1.8 Conclusion -- References -- 2 Layered Safety Model for IoT Services Through Blockchain -- 2.1 Introduction -- 2.1.1 IoT Factors Impacting Security -- 2.2 IoT Applications -- 2.3 IoT Model With Communication Parameters -- 2.3.1 RFID (Radio Frequency Identification) -- 2.3.2 WSH (Wireless Sensor Network) -- 2.3.3 Middleware (Software and Hardware) -- 2.3.4 Computing Service (Cloud) -- 2.3.5 IoT Software -- 2.4 Security and Privacy in IoT Services -- 2.5 Blockchain Usages in IoT -- 2.6 Blockchain Model With Cryptography -- 2.6.1 Variations of Blockchain -- 2.7 Solution to IoT Through Blockchain -- 2.8 Conclusion -- References -- 3 Internet of Things Security Using AI and Blockchain -- 3.1 Introduction -- 3.2 IoT and Its Application -- 3.3 Most Popular IoT and Their Uses -- 3.4 Use of IoT in Security -- 3.5 What is AI? …”
Libro electrónico -
5038Publicado 2021Tabla de Contenidos: “…Intro -- Contents -- About the Authors -- Forewords -- Acknowledgments -- Introduction -- Part I: Getting Started -- Chapter 1: Welcome to the World -- Top Ten Experiences -- The Heart of Agile Teams at 10Pines (Page 32) -- Glad, Mad, Sad in Japan (Page 157) -- Building Trust, Learning, and Understanding: An Agile Approach to Project Discovery (Page 81) -- Agile Organizations Set the Stage for Emergent Leaders (Page 252) -- Finding My Voice (Page 308) -- Trust: The Basic Building Block of Agile Teams (Page 115) -- Forced Fun (Page 278) -- Accelerating the Supply Chain of Goods and Services (Page 62) -- Retrospectives at Every Level (Page 51) -- Learntor: On a Mission to Create a Level Playing Field for Africa (Page 325) -- Understanding Culture -- When Cultures Collide -- At the Risk of Stereotyping -- Categorizing Behaviors -- The Hofstede Model -- The Lewis Model -- A Basis for Study: Cultural Behaviors and the Agile Values -- On the Road -- Part II: South America -- Agile Community Events and Meetups -- Chapter 2: Argentina -- History -- Insights -- Heart of Agile Teams at 10Pines -- People -- Great Environment -- Vision -- Self-Organization -- Communication -- Conclusion -- Getting On and Around -- Agile Community Events and Meetups -- Chapter 3: Chile -- History -- Insights -- The Accountant That Automated Himself Out of a Job and Into Development -- Getting On and Around -- Retrospectives at Every Level -- Agile Community Events and Meetups -- Chapter 4: Colombia -- History -- Insights -- Lean Change Management at a Hardware Retailer4 -- Accelerating the Supply Chain of Goods and Services -- Hypothesis 1 - Increased collaboration and shared responsibility -- Hypothesis 2 - Improved quality as perceived by the internal client -- Hypothesis 3 - Reduced delivery times of contract completion -- Geniio: Generating Integral and Timely Information…”
Libro electrónico -
5039Publicado 2023Tabla de Contenidos: “…Volume Storage: File-Based Storage and Block Storage -- Object-Based Storage -- Databases -- Threats to Cloud Storage -- Designing and Applying Security Strategies for Storage -- Encryption -- Certificate Management -- Hashing -- Masking, Obfuscation, Anonymization, and Tokenization -- Data Loss Prevention -- Log Capture and Analysis -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Security in the Cloud -- Shared Cloud Platform Risks and Responsibilities -- Cloud Customers, Providers, and Similar Terms -- Cloud Computing Risks by Deployment Model -- Private Cloud -- Community Cloud -- Public Cloud -- Hybrid Cloud -- Cloud Computing Risks by Service Model -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Software as a Service (SaaS) -- Virtualization -- Threats -- Risk Mitigation Strategies -- Disaster Recovery (DR) and Business Continuity (BC) -- Cloud-Specific BIA Concerns -- Customer/Provider Shared BC/DR Responsibilities -- Cloud Design Patterns -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Cloud Platform, Infrastructure, and Operational Security -- Foundations of Managed Services -- Cloud Provider Responsibilities -- Shared Responsibilities by Service Type -- IaaS -- PaaS -- SaaS -- Securing Communications and Infrastructure -- Firewalls -- Intrusion Detection/Intrusion Prevention Systems -- Honeypots -- Vulnerability Assessment Tools -- Bastion Hosts -- Identity Assurance in Cloud and Virtual Environments -- Securing Hardware and Compute -- Securing Software -- Third-Party Software Management -- Validating Open-Source Software -- OS Hardening, Monitoring, and Remediation -- Managing Virtual Systems -- Assessing Vulnerabilities -- Securing the Management Plane -- Auditing Your Environment and Provider -- Adapting Processes for the Cloud -- Planning for Cloud Audits -- Summary…”
Libro electrónico -
5040Publicado 2023Tabla de Contenidos: “…-- Making digital resources available to students and learners -- Going from availability to use -- Going from digital to smart resources -- Monitoring use and conditions of use -- References -- 6 Hardware: the provision of connectivity and digital devices -- Introduction -- High-quality connectivity to fully leverage digital education -- Access and quality of connectivity at schools -- The last mile problem for connectivity in digital education…”
Libro electrónico