Mostrando 5,021 - 5,040 Resultados de 5,616 Para Buscar '"hardware"', tiempo de consulta: 0.14s Limitar resultados
  1. 5021
    Publicado 2024
    Tabla de Contenidos: “…4.3.1 Cost of Implementing Smart Farming Technologies -- 4.3.1.1 Hardware Costs -- 4.3.1.2 Data Management Costs -- 4.3.1.3 Training and Support Costs -- 4.3.1.4 Infrastructure Costs -- 4.3.1.5 Financing Costs -- 4.3.2 Financing and Investment Challenges -- 4.3.3 Economic Benefits and Returns on Investment -- 4.4 Social Obstacles to Smart Farming Adoption -- 4.4.1 Lack of Knowledge and Understanding Among Farmers -- 4.4.2 Behavioral and Cultural Barriers to Change -- 4.4.3 Role of Education and Awareness Raising -- 4.5 Environmental Considerations in Smart Farming -- 4.5.1 Sustainable Agricultural Practices and Smart Farming -- 4.5.2 Environmental Benefits and Concerns -- 4.5.3 Climate Change Mitigation and Adaptation -- 4.5.3.1 Mitigating Climate Change -- 4.5.3.2 Adapting to Climate Change -- 4.6 Future Prospects for Smart Farming -- 4.6.1 Emerging Trends and Innovations in Smart Farming -- 4.6.2 Prospects for Overcoming Challenges and Barriers -- 4.6.3 Future Outlook for Sustainable Agriculture -- 4.7 Conclusion and Recommendations -- 4.7.1 Summary of Key Points -- 4.7.2 Policy Recommendations for Promoting Smart Farming -- 4.7.3 Conclusion and Future Directions for Research -- References -- Chapter 5 Sustainable Development in Agriculture: Soil Management -- 5.1 Introduction -- 5.2 Reviewing the Need for Global Food Production to be Upgraded -- 5.2.1 Growing Population and Changing Dietary Preferences -- 5.2.2 Climate Change and Resource Limitations -- 5.2.3 Environmental Sustainability and Biodiversity Conservation -- 5.2.4 Food Loss and Waste -- 5.2.5 Technological Advancements and Digitalization -- 5.2.6 Socio-Economic Equity and Rural Development -- 5.2.7 Policy Interventions and Governance -- 5.3 Soil Quality and Its Impact -- 5.4 Emerging Technologies -- 5.4.1 AI Revolution -- 5.4.1.1 Precision Farming and Decision Support Systems…”
    Libro electrónico
  2. 5022
    por Tretau, Roland
    Publicado 2005
    Tabla de Contenidos: “…-- 8.3 HACMP concepts -- 8.3.1 HACMP terminology -- 8.4 Planning and design -- 8.4.1 Supported hardware and software -- 8.4.2 Planning for networking -- 8.4.3 Plan for cascading versus rotating -- 8.5 Lab setup -- 8.5.1 Pre-installation tasks -- 8.5.2 Serial network setup -- 8.5.3 External storage setup -- 8.6 Installation -- 8.6.1 Install the cluster code -- 8.7 HACMP configuration -- 8.7.1 Initial configuration of nodes -- 8.7.2 Resource discovery -- 8.7.3 Defining HACMP interfaces and devices -- 8.7.4 Persistent addresses -- 8.7.5 Further cluster customization tasks -- Chapter 9. …”
    Libro electrónico
  3. 5023
    Publicado 2003
    “…Storage growth continues to accelerate, and the cost of disk can approach 80% of total system hardware costs. Yet, the storage in most businesses is typically only about 50% used. …”
    Libro electrónico
  4. 5024
    Publicado 2004
    Tabla de Contenidos: “…11.9.1 Set heap size and nursery size for efficient garbage collection -- 11.9.2 Set AIX threading parameters -- 11.9.3 Use HotSpot server instead of client -- 11.9.4 Setting thread stack size if using many threads -- 11.9.5 Reduce or increase heap size if out-of-memory errors occur -- 11.10 Large objects -- 11.10.1 Factors affecting large object size processing -- 11.10.2 Mitigating large object issues -- 11.11 Tuning other WebSphere BI runtime components -- Appendix A. Hardware and software configuration -- Configuration of client machines -- Configuration of runtime servers -- Appendix B. …”
    Libro electrónico
  5. 5025
    por Gucer, Vasfi
    Publicado 2004
    “…The beginning of the new century sees the data center with a mix of work, hardware, and operating systems previously undreamed of. …”
    Libro electrónico
  6. 5026
    por Bergland, John
    Publicado 2004
    Tabla de Contenidos: “…Specifying Server configuration settings for LDAP -- A.0.1 Adding portal administrators to the Domino Directory -- Updating the Access Control List of the Domino Directory -- Configuring WebSphere Portal for Domino Directory -- Security is enabled -- Verifying LDAP -- WebSphere Portal Server hardware requirements for Linux Intel systems -- Appendix B. …”
    Libro electrónico
  7. 5027
    por Dubois, Florence
    Publicado 2003
    Tabla de Contenidos: “…4.1.3 Tools we used -- 4.2 Planning considerations -- 4.2.1 Decide on source and target DB2 subsystem -- 4.2.2 Decide on naming conventions for merged system -- 4.2.3 System availability issues -- 4.2.4 System backup and recovery issues -- 4.2.5 Hardware-based backup options -- 4.2.6 Merge in place procedure checklist -- 4.3 Merge in place scenario -- 4.4 Preparation steps -- 4.4.1 Source: Create full backup of source system -- 4.4.2 Target: Create full backup of catalog and directory of target -- 4.4.3 Source: Redefine empty tablespaces as DEFINE NO in source -- 4.4.4 Source: Reorganize tablespaces -- 4.4.5 Source and Target: Create and populate metadata tables -- 4.4.6 Source and Target: Define source objects in target system -- 4.4.7 Target: Update metadata tables -- 4.4.8 Target: Stop newly created databases -- 4.4.9 Target: Prepare RUNSTATS JCL -- 4.5 Migration steps -- 4.5.1 Source: Stop all update activity on source system -- 4.5.2 Source: Perform full backup of source DB2 subsystem -- 4.5.3 Source: Start source databases for UT access -- 4.5.4 Source: Execute REPAIR on page set header pages -- 4.5.5 Source: Stop source DB2 subsystem -- 4.5.6 Target: Delete target data sets and rename source data sets -- 4.5.7 Target: Start target databases in target system -- 4.5.8 Target: Execute REPAIR LEVELID on tablespaces and indexes -- 4.5.9 Cold start target system (optional) -- 4.5.10 Target: Execute RUNSTATS -- 4.5.11 Target: Perform IMAGE COPY -- 4.5.12 Configure SAP application server -- 4.6 Post-migration steps -- 4.6.1 Target: Verify access to objects using RSDB2MAS (optional) -- 4.6.2 Target: Alter the space allocations for TS and IX (optional) -- Chapter 5. …”
    Libro electrónico
  8. 5028
    por Baumgartner, Manfred
    Publicado 2021
    Tabla de Contenidos: “…4.4 Exkurs: Einsatzgebiet nach Systemarten -- 4.4.1 Desktop-Applikationen -- Hilfsfunktionen in der getesteten Applikation -- 4.4.2 Client-Server-Systeme -- Parallele Verwendung durch mehrere User -- Virtualisierung -- 4.4.3 Webapplikationen -- Teilautomatisierte Tests -- 4.4.4 Mobile Applikationen -- Herausforderungen bei der Automatisierung mobiler Applikationen -- Auswahl der Testplattformen -- Besonderheiten/spezielle Probleme bei der GUI-Testautomatisierung von mobilen Applikationen -- Umgang mit Interrupts -- Unterschiedliche Hardware der Endgeräte -- Netzwerkperformanz und unterschiedliche Typen von Netzwerkanbindungen -- Lösungsansätze -- Multi-Layer-Test -- Einsatz von Simulatoren und Emulatoren -- Risikobasierte Auswahl der Zielplattformen -- Einsatz von Cloud-Services -- 4.4.5 Webservices -- 4.4.6 Data Warehouse -- Plausibilitätschecks -- Nachimplementierung -- Definierte Eingabe-Ausgabe-Paare -- 4.4.7 Dynamische GUIs: Formularlösungen -- 4.4.8 Cloud Based Systems -- 4.4.9 Künstliche Intelligenz und Machine Learning -- Cross-Validation Test -- Hypothesis Testing -- Metamorphic Testing -- Adversarial Testing -- Sensitivity Testing -- Evolution Testing -- Intuitive Testfallermittlung und exploratives Testen -- Nutzung von KI und ML für Test und Testautomatisierung -- 5 Berichte und Metriken -- 5.1 Exkurs: Metriken und Validität -- 5.2 Beispiele für Metriken -- Nutzwert der TAS -- Aufwand für die Erstellung automatisierter Tests -- Anzahl von falsch negativen und falsch positiven Ergebnissen -- Testüberdeckung (Codeüberdeckung, Anforderungsüberdeckung) -- 5.3 Konkrete Implementierung und Realisierbarkeit in einer TAS -- 5.3.1 Exkurs: TAS und SUT als Quellen für Protokolle -- 5.3.2 Exkurs: Zentralisierte Verwaltung und Auswertung von Protokollen -- 5.3.3 Implementierung der Protokollierung in einer TAS…”
    Libro electrónico
  9. 5029
    Publicado 2020
    “…The only thing you need to get started is standard hardware and open source software…”
    Libro electrónico
  10. 5030
    Publicado 2003
    Tabla de Contenidos: “…Front cover -- Contents -- Figures -- Tables -- Examples -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. e-Business Intelligence and DB2 UDB ESE -- 1.1 Business issues and challenges -- 1.1.1 Build larger and larger data warehouses -- 1.1.2 Load and populate the data warehouse as fast as possible -- 1.1.3 Perform queries with performances -- 1.1.4 Operate in a 24 hours/7 days mode -- 1.1.5 Manage the data warehouse -- 1.1.6 Upgrade the data warehouse -- 1.1.7 Summary -- 1.2 DB2 UDB V8.1 functions for e-Business Intelligence -- 1.2.1 Performance enhancements -- 1.2.2 Availability enhancements -- 1.2.3 Manageability enhancements -- 1.2.4 UNION ALL views -- 1.3 New functionalities of IBM e-server p690 -- 1.3.1 Hardware overview -- 1.3.2 Logical partitioning for OLTP-aware e-BI -- 1.3.3 Cluster 1600 -- 1.3.4 Enhancements with AIX V5.2 -- 1.3.5 Workload management -- 1.4 Case study and technical environment -- 1.4.1 The case study based on TPC-H -- 1.4.2 Technical environment -- Chapter 2. …”
    Libro electrónico
  11. 5031
    Publicado 2023
    Tabla de Contenidos: “…12.9 Chief Information Security Officer (CISO) -- Summary -- Checklist -- 13 Housekeeping -- 13.1 Managing hardware -- 13.2 Support contracts -- 13.2.1 Providing support -- 13.3 Monitoring -- 13.3.1 Outside looking in -- 13.3.2 Inside looking in -- 13.4 Backup and restoration -- 13.4.1 Frequency/retention -- 13.4.2 Archive security -- 13.5 Budget oversight -- Summary -- Checklist -- 14 Company growth -- 14.1 Investment groups -- 14.2 Impromptu pitch -- 14.3 Investment cadence -- 14.4 Preparing for integration -- 14.5 Due diligence -- 14.5.1 Performing due diligence -- 14.5.2 Conducting due diligence -- 14.5.3 Presenting your findings -- 14.5.4 Answering due diligence -- 14.6 Handing over the reins -- 14.7 Taking the reins -- Summary -- Checklist -- 15 You, Inc. -- 15.1 Reviewing yourself -- 15.2 Mentor -- 15.3 Keeping pace -- 15.4 Monitoring change -- 15.5 Succession planning -- 15.6 Career success -- 15.7 Stepping up -- Summary -- Checklist -- index…”
    Libro electrónico
  12. 5032
    Publicado 2022
    Tabla de Contenidos: “…Interrelationship between AR and VR -- 3.2. Software and hardware components of AR/VR applications -- 4. Demand escalation of AR/VR due to COVID-19 pandemic -- 4.1. …”
    Libro electrónico
  13. 5033
    por Kamthane, Ashok N.
    Publicado 2011
    Tabla de Contenidos: “…-- 1.3 Computer Organization and Architecture -- 1.4 Central Processing Unit (CPU) -- 1.4.1 Arithmetic/Logic Unit (ALU) -- 1.4.2 Registers -- 1.4.3 Control Unit (CU) -- 1.4.4 System Bus -- 1.4.5 Main Memory Unit -- 1.4.6 Cache Memory -- 1.5 Software -- 1.5.1 Relationship between Software and Hardware -- 1.6 Types of Software -- 1.6.1 System Software -- 1.6.2 Application Software -- Summary -- Exercises -- Chapter 2: Computer Memory and Storage -- 2.1 Introduction -- 2.1.1 Memory Representation -- 2.2 Memory Hierarchy -- 2.3 Random Access Memory (RAM) -- 2.3.1 Types of RAM -- 2.4 Read Only Memory (ROM) -- 2.4.1 Types of ROM -- 2.5 Types of Secondary Storage Devices -- 2.6 Magnetic Tape -- 2.6.1 Magnetic Tape Organisation -- 2.6.2 Advantages of Magnetic Tapes -- 2.6.3 Disadvantages of Magnetic Tapes -- 2.7 Magnetic Disk -- 2.7.1 Storage Organization of a Magnetic Disk -- 2.7.2 Accessing Data from Magnetic Disk -- 2.8 Types of Magnetic Disk -- 2.8.1 Floppy Disk -- 2.8.2 Hard Disk -- 2.8.3 Zip Disk -- 2.8.4 Advantages of Magnetic Disks -- 2.8.5 Disadvantages of Magnetic Disks -- 2.9 Optical Disk -- 2.9.1 Storage Organization of Optical Disk -- 2.9.2 Access Mechanism of Optical Disk -- 2.10 Types of Optical Disks -- 2.10.1 Compact Disk -- 2.10.2 Digital Versatile Disk -- 2.10.3 Blu-ray Disk -- 2.10.4 Advantages of Optical Disks -- 2.10.5 Disadvantages of Optical Disks -- 2.11 Magneto-optical Storage Devices -- 2.12 Universal Serial Bus (USB) -- 2.12.1 Pen Drive -- 2.12.2 External Hard Disk Drive -- 2.13 Memory Stick -- 2.14 Mass Storage Devices -- Summary…”
    Libro electrónico
  14. 5034
    por Goel, Anita
    Publicado 2012
    Tabla de Contenidos: “…Cover -- Brief Contents -- Contents -- Preface -- Roadmap to the Syllabus -- Unit I: Basics of Computers -- Chapter 1: Fundamentals of Computers -- 1.1 Introduction -- 1.1.1 The Computer System -- 1.1.2 Characteristics of Computers -- 1.1.3 The Input-Process-Output Concept -- 1.2 Classification of Computers -- 1.2.1 Microcomputers -- 1.2.2 Minicomputers -- 1.2.3 Mainframe Computers -- 1.2.4 Supercomputers -- 1.3 Computer Organization -- 1.3.1 Components of Computer Hardware -- 1.4 Central Processing Unit -- 1.4.1 Arithmetic Logic Unit -- 1.4.2 Registers -- 1.4.3 Control Unit -- 1.5 The System Bus -- 1.5.1 Data Bus -- 1.5.2 Address Bus -- 1.5.3 Control Bus -- 1.6 Instruction Set -- 1.6.1 Instruction Format -- 1.6.2 Instruction Cycle -- 1.7 Memory and Storage Systems -- 1.7.1 Memory Representation -- 1.7.2 Memory Hierarchy -- 1.7.3 CPU Registers -- 1.7.4 Cache Memory -- 1.7.5 Primary Memory -- 1.7.5.1 Random Access Memory -- 1.7.5.2 Read Only Memory -- 1.7.6 Secondary Memory -- 1.7.7 Using the Computer Memory -- 1.8 Input-Output Devices -- 1.8.1 Input Unit -- 1.8.2 Output Unit -- 1.8.3 Input Devices -- 1.8.3.1 Human Data Entry Devices -- 1.8.3.2 Pointing Devices -- 1.8.3.3 Pick Devices -- 1.8.3.4 Source Data Entry Devices -- 1.8.3.5 Optical Input Devices -- 1.8.4 Output Devices -- 1.8.4.1 Hard Copy Devices -- 1.8.4.2 Soft Copy Devices -- 1.9 System and Application Software -- 1.9.1 System Software -- 1.9.1.1 Operating System -- 1.9.1.2 Device Driver -- 1.9.1.3 System Utilities -- 1.9.1.4 Translator Software -- 1.9.2 Application Software -- Summary -- Key Words -- Questions -- Chapter 2: Computers: Ethics and Applications -- 2.1 Introduction -- 2.1.1 Definition -- 2.1.2 Computer Crime -- 2.1.3 Privacy and Secrecy -- 2.1.4 Intellectual Property -- 2.1.5 Professional Responsibility -- 2.2 Application Areas of Computers -- 2.2.1 E-business…”
    Libro electrónico
  15. 5035
    por Lázaro Domínguez, Francisco
    Publicado 2014
    Tabla de Contenidos: “…INTRODUCCIÓN A LA INFORMÁTICA FORENSE -- PÁGINA LEGAL -- ÍNDICE -- INTRODUCCIÓN -- 1 SE HA ESCRITO UN CRIMEN DIGITAL -- 1.1 UN DÍA COMO OTRO CUALQUIERA -- 1.2 INTERVENCIÓN -- 1.2.1 Los primeros en llegar -- 1.2.2 Apagado sin más -- 1.2.3 Objetos intervenidos -- 1.3 LA AMENAZA DIGITAL -- 1.3.1 El delito informático -- 1.3.2 Evaluación del riesgo -- 1.3.3 Los motivos del agresor -- 1.3.4 Amenazas internas y externas -- 1.4 DINÁMICA DE UNA INTRUSIÓN -- 1.4.1 Footprinting -- 1.4.2 Escaneo de puertos y protocolos -- 1.4.3 Enumeración -- 1.4.4 Penetración y despliegue de exploits -- 1.4.5 Puertas traseras -- 1.4.6 Borrando huellas -- 2 LA INVESTIGACIÓN FORENSE -- 2.1 ETAPAS DE UNA INVESTIGACIÓN FORENSE -- 2.1.1 Adquisición (Imaging) -- 2.1.2 Análisis -- 2.1.3 Presentación -- 2.1.4 La línea de tiempo -- 2.2 REQUISITOS DE LA INVESTIGACIÓN FORENSE -- 2.2.1 Aceptabilidad -- 2.2.2 Integridad -- 2.2.3 Credibilidad -- 2.2.4 Relación causa-efecto -- 2.2.5 Carácter repetible -- 2.2.6 Documentación -- 2.3 VALORACIÓN JURÍDICA DE LA PRUEBA DIGITAL -- 2.3.1 Interés legal de la prueba -- 2.3.2 Prueba física y prueba personal -- 2.3.3 Cualificación del investigador forense -- 2.3.4 La adquisición: fase crucial -- 3 SOPORTES DE DATOS -- 3.1 PROCEDIMIENTOS DE ADQUISICIÓN -- 3.1.1 EnCase &amp -- Linen -- 3.1.2 dd -- 3.1.3 dcfldd, dc3dd y ddrescue -- 3.1.4 AIR -- 3.1.5 Adquisición por hardware -- 3.1.6 MD5 y SHA -- 3.1.7 Cálculo de MD5 con Linux -- 3.2 DISCOS, PARTICIONES Y SISTEMAS DE ARCHIVOS -- 3.2.1 NTFS -- 3.2.2 FAT -- 3.2.3 ext2, ext3, ext4 -- 3.2.4 HFS, HFS+, JFS, ReiserFS, etc. -- 3.3 MODELO DE CAPAS -- 3.3.1 Nivel 1 -- 3.3.2 Nivel 2 -- 3.3.3 Nivel 3 -- 3.3.4 Nivel 4 -- 3.3.5 Nivel 5 -- 3.3.6 Nivel 6 -- 3.3.7 Nivel 7 -- 3.4 RECUPERACIÓN DE ARCHIVOS BORRADOS -- 3.4.1 Dinámica del borrado de archivos -- 3.4.2 Sector/, cluster/ y file slack…”
    Libro electrónico
  16. 5036
    Publicado 2003
    Tabla de Contenidos: “…-- 3.2 Some common VSAM problems -- 3.2.1 Lack of virtual storage -- 3.2.2 Initial loading problems -- 3.2.3 Mismatch between catalog and data set -- 3.2.4 Hardware errors -- 3.2.5 Bad data or bad channel program -- 3.2.6 Structural damage -- 3.2.7 Improper sharing -- 3.2.8 Mismatch between catalog and VTOC -- 3.2.9 VSAM does not produce expected output -- 3.2.10 VSAM RLS problems -- 3.2.11 VSAM and DFSMStvs considerations -- 3.2.12 OEM problems -- 3.2.13 Enqueue issues -- 3.2.14 Migration issues -- 3.2.15 Performance considerations -- 3.2.16 Deadlocks -- 3.2.17 Beware of some VSAM restrictions -- 3.3 What documentation to collect…”
    Libro electrónico
  17. 5037
    Publicado 2021
    Tabla de Contenidos: “…-- 1.5 Combining IoT and Blockchain -- 1.5.1 Agriculture Industry -- 1.5.2 Manufacturing Industry -- 1.5.3 Food Processing Industry -- 1.5.4 Healthcare Industry -- 1.5.5 Military -- 1.5.6 Information Technology Industry -- 1.6 Observing Economic Growth and Technology's Impact -- 1.7 Applications of IoT and Blockchain Beyond Industries -- 1.8 Conclusion -- References -- 2 Layered Safety Model for IoT Services Through Blockchain -- 2.1 Introduction -- 2.1.1 IoT Factors Impacting Security -- 2.2 IoT Applications -- 2.3 IoT Model With Communication Parameters -- 2.3.1 RFID (Radio Frequency Identification) -- 2.3.2 WSH (Wireless Sensor Network) -- 2.3.3 Middleware (Software and Hardware) -- 2.3.4 Computing Service (Cloud) -- 2.3.5 IoT Software -- 2.4 Security and Privacy in IoT Services -- 2.5 Blockchain Usages in IoT -- 2.6 Blockchain Model With Cryptography -- 2.6.1 Variations of Blockchain -- 2.7 Solution to IoT Through Blockchain -- 2.8 Conclusion -- References -- 3 Internet of Things Security Using AI and Blockchain -- 3.1 Introduction -- 3.2 IoT and Its Application -- 3.3 Most Popular IoT and Their Uses -- 3.4 Use of IoT in Security -- 3.5 What is AI? …”
    Libro electrónico
  18. 5038
    Publicado 2021
    Tabla de Contenidos: “…Intro -- Contents -- About the Authors -- Forewords -- Acknowledgments -- Introduction -- Part I: Getting Started -- Chapter 1: Welcome to the World -- Top Ten Experiences -- The Heart of Agile Teams at 10Pines (Page 32) -- Glad, Mad, Sad in Japan (Page 157) -- Building Trust, Learning, and Understanding: An Agile Approach to Project Discovery (Page 81) -- Agile Organizations Set the Stage for Emergent Leaders (Page 252) -- Finding My Voice (Page 308) -- Trust: The Basic Building Block of Agile Teams (Page 115) -- Forced Fun (Page 278) -- Accelerating the Supply Chain of Goods and Services (Page 62) -- Retrospectives at Every Level (Page 51) -- Learntor: On a Mission to Create a Level Playing Field for Africa (Page 325) -- Understanding Culture -- When Cultures Collide -- At the Risk of Stereotyping -- Categorizing Behaviors -- The Hofstede Model -- The Lewis Model -- A Basis for Study: Cultural Behaviors and the Agile Values -- On the Road -- Part II: South America -- Agile Community Events and Meetups -- Chapter 2: Argentina -- History -- Insights -- Heart of Agile Teams at 10Pines -- People -- Great Environment -- Vision -- Self-Organization -- Communication -- Conclusion -- Getting On and Around -- Agile Community Events and Meetups -- Chapter 3: Chile -- History -- Insights -- The Accountant That Automated Himself Out of a Job and Into Development -- Getting On and Around -- Retrospectives at Every Level -- Agile Community Events and Meetups -- Chapter 4: Colombia -- History -- Insights -- Lean Change Management at a Hardware Retailer4 -- Accelerating the Supply Chain of Goods and Services -- Hypothesis 1 - Increased collaboration and shared responsibility -- Hypothesis 2 - Improved quality as perceived by the internal client -- Hypothesis 3 - Reduced delivery times of contract completion -- Geniio: Generating Integral and Timely Information…”
    Libro electrónico
  19. 5039
    Publicado 2023
    Tabla de Contenidos: “…Volume Storage: File-Based Storage and Block Storage -- Object-Based Storage -- Databases -- Threats to Cloud Storage -- Designing and Applying Security Strategies for Storage -- Encryption -- Certificate Management -- Hashing -- Masking, Obfuscation, Anonymization, and Tokenization -- Data Loss Prevention -- Log Capture and Analysis -- Summary -- Exam Essentials -- Review Questions -- Chapter 4 Security in the Cloud -- Shared Cloud Platform Risks and Responsibilities -- Cloud Customers, Providers, and Similar Terms -- Cloud Computing Risks by Deployment Model -- Private Cloud -- Community Cloud -- Public Cloud -- Hybrid Cloud -- Cloud Computing Risks by Service Model -- Infrastructure as a Service (IaaS) -- Platform as a Service (PaaS) -- Software as a Service (SaaS) -- Virtualization -- Threats -- Risk Mitigation Strategies -- Disaster Recovery (DR) and Business Continuity (BC) -- Cloud-Specific BIA Concerns -- Customer/Provider Shared BC/DR Responsibilities -- Cloud Design Patterns -- Summary -- Exam Essentials -- Review Questions -- Chapter 5 Cloud Platform, Infrastructure, and Operational Security -- Foundations of Managed Services -- Cloud Provider Responsibilities -- Shared Responsibilities by Service Type -- IaaS -- PaaS -- SaaS -- Securing Communications and Infrastructure -- Firewalls -- Intrusion Detection/Intrusion Prevention Systems -- Honeypots -- Vulnerability Assessment Tools -- Bastion Hosts -- Identity Assurance in Cloud and Virtual Environments -- Securing Hardware and Compute -- Securing Software -- Third-Party Software Management -- Validating Open-Source Software -- OS Hardening, Monitoring, and Remediation -- Managing Virtual Systems -- Assessing Vulnerabilities -- Securing the Management Plane -- Auditing Your Environment and Provider -- Adapting Processes for the Cloud -- Planning for Cloud Audits -- Summary…”
    Libro electrónico
  20. 5040
    Publicado 2023
    Tabla de Contenidos: “…-- Making digital resources available to students and learners -- Going from availability to use -- Going from digital to smart resources -- Monitoring use and conditions of use -- References -- 6 Hardware: the provision of connectivity and digital devices -- Introduction -- High-quality connectivity to fully leverage digital education -- Access and quality of connectivity at schools -- The last mile problem for connectivity in digital education…”
    Libro electrónico