Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 267
- Application software 238
- Java (Computer program language) 185
- Big data 162
- Cloud computing 155
- Streaming video 152
- Engineering & Applied Sciences 129
- Management 128
- Data mining 126
- Electronic data processing 117
- Computer networks 111
- Database management 98
- Data processing 90
- Computer Science 86
- Machine learning 83
- Computer programming 82
- Computer programs 82
- Python (Computer program language) 75
- Computer software 70
- Examinations 68
- Artificial intelligence 67
- Distributed processing 64
- Security measures 61
- Computer security 58
- Information technology 58
- Operating systems (Computers) 57
- Programming 56
- Microsoft .NET Framework 55
- Design 54
- Software engineering 53
-
2301Publicado 2018“…You will also learn about reactive stream specifications, event sourcing techniques, and different methods to integrate Akka Streams into the Play Framework. …”
Libro electrónico -
2302por Sobel, Ron“…Publishing in the music business goes far beyond the physical sheet--it includes live performance and mechanical (recording) rights, and income streams from licensing deals of various kinds. A single song can generate over thirty different royalty streams, and a writer must know how these royalties are calculated and who controls the flow of the money.Taking a practical approach, the authors -- one a successful music publisher and attorney, the other a songwriter and music busine…”
Publicado 2008
Libro electrónico -
2303por Tribble, Ty, 1970-“…Get a second stream of income without getting a second job! For anyone looking for a practical blueprint in creating an additional stream of home-based income, Double Your Income with Network Marketing is for you. …”
Publicado 2012
Libro electrónico -
2304
-
2305
-
2306Publicado 2010“…Fill your iPad with music, movies, TV shows, eBooks, photos, and more.Share with others. Stream music, HD movies, TV shows, and more, to and from…”
Libro electrónico -
2307por Mortensen, Kurt W.“…Allen, author, ""Nothing Down"" and ""Multiple Streams of Income""…”
Publicado 2004
Libro electrónico -
2308
-
2309Publicado 2002Tabla de Contenidos: “…Sametime toolkit services -- 2.1 Sametime architecture basics -- 2.1.1 Proxy objects -- 2.1.2 The Model-View-Controller paradigm -- 2.1.3 Sametime events -- 2.2 Interfaces and other funny words -- 2.2.1 Event -- 2.2.2 Interface -- 2.2.3 Listener -- 2.2.4 Adapter -- 2.2.5 Extend and implement -- 2.3 Sametime services: What can I do with them -- 2.3.1 General features -- 2.3.2 Community service -- 2.3.3 Awareness service -- 2.3.4 Places service -- 2.3.5 Lookup service -- 2.3.6 Instant messaging service -- 2.3.7 Token service -- 2.3.8 Storage service -- 2.3.9 Names service -- 2.3.10 Directory service -- 2.3.11 Post service -- 2.3.12 Meeting services -- 2.3.13 Streamed media -- 2.4 The bare necessities for a client program -- 2.4.1 Create a Sametime session and load components -- 2.4.2 Login to the Sametime community -- 2.5 Core types -- 2.5.1 Importing the core types -- 2.5.2 Sametime ID types -- 2.5.3 Sametime object types -- 2.5.4 Sametime attribute types -- 2.6 Summary -- Chapter 3. …”
Libro electrónico -
2310Publicado 2017Tabla de Contenidos: “…1.4.1.7 Brief Economic Comparison of Some Processing Costs -- 1.4.1.8 Repair Possibilities: A Significant Thermoplastic Advantage for Large Parts -- 1.4.2 Thermoset Processing -- 1.4.2.1 Molding Solid Thermosets -- 1.4.2.2 Molding the Liquid Thermosets -- 1.4.2.3 Secondary Processing -- 1.4.3 Composite Processing -- 1.4.3.1 Primary Processes -- 1.4.3.2 Secondary Processing -- 1.4.3.3 Repair Possibilities: A Significant Composite Advantage -- 1.4.4 Hybrid Processing -- 1.4.5 Additive Manufacturing Techniques for Prototyping and e-Manufacturing -- 1.5 The Final Material/Process/Cost Compromise -- 1.6 Useful Source Examples for Initiation of In-Depth Studies -- Further Reading -- Websites -- Papers -- 2 - Genesis of Renewable Plastics and Integration in the Plastics Stream -- 2.1 Inescapable Strengthening of Environmental Concerns -- 2.1.1 Toxicity and Pollution -- 2.1.2 The Recycling of Polymers -- 2.2 Development of Bioplastics From Renewable Sources -- 2.2.1 Development of Biothermoplastics From Renewable Sources -- 2.2.2 Development of Biothermosets From Renewable Sources -- 2.3 Pros and Cons of Renewable and Oil-Sourced Plastics -- 2.3.1 Renewable Plastics Derived From Natural Polymers -- 2.3.2 Traditional Plastics From Bioblocks: Drop-In Solutions -- 2.3.3 Traditional Plastics From Plastics Waste Recycling -- 2.4 Brief Remarks on Processing and Recycling of Renewable Plastics -- 2.5 Pay Close Attention to Carbon Biobased Content, Testing and Certification -- 2.6 List of Commercial Offer Examples -- 2.7 Examples of Useful Sources for Initiation of In-Depth Studies -- Further Reading -- Websites -- 3 - Recycling: The First Source of Renewable Plastics -- 3.1 Outline -- 3.1.1 Environmental Benefits -- 3.1.2 Economy -- 3.1.2.1 Overview of Plastic Wastes in USA -- 3.1.2.2 Overview of Plastic Wastes in Europe…”
Libro electrónico -
2311Publicado 2016Tabla de Contenidos: “…Introduction -- 6.2. Social Media Streams: Characteristics, Challenges and Opportunities -- 6.3. …”
Libro electrónico -
2312Publicado 2024Tabla de Contenidos: “…4.4.2 Big Data and Analytics in Smart Manufacturing -- 4.4.3 Robotics and Automation in Smart Manufacturing -- 4.4.4 AI-IoT-Cloud in Smart Manufacturing -- 4.4.5 AI Blockchain-Based Smart Manufacturing -- 4.5 AI-Driven Smart Manufacturing -- 4.5.1 Predictive Maintenance and Quality Control in Smart Manufacturing -- 4.5.2 Humanâ€"Machine Collaboration -- 4.6 Popular Challenges and Issues Towards AI-Based Smart Manufacturing Systems -- 4.7 AI-Based Smart Manufacturing Systems for the Future -- 4.7.1 AI-Enhanced Supply Chain Management for the Future -- 4.7.2 Smart Factory Concepts for Next Generation -- 4.7.3 Quality Assurance and Inspection in Real Time -- 4.8 Improving Operational Efficiency and Environmental Sustainability in AI Based Smart Manufacturing -- 4.8.1 Cost Reduction and Resource Optimization in AI-Based Smart Manufacturing -- 4.9 Future Research Opportunities and Research Gaps Towards AI-Empowered Smart Manufacturing -- 4.10 The Evolution of Industry 5.0 and Industry 6.0 -- 4.11 Conclusion -- References -- Chapter 5: Use Cases of Digital Twin in Smart Manufacturing -- 5.1 Introduction -- 5.1.1 Smart Manufacturing Streams Utilizing Digital Twin Technology -- 5.1.2 Technological Advancement That Makes Digital Twins Ideal for Smart Manufacturing System Design -- 5.2 Review of Relevant Literature -- 5.3 Various Use Cases of Digital Twin in Smart Manufacturing -- 5.3.1 Data-Driven Smart Factory -- 5.3.2 Cyber-Physical System (CPS) Integration -- 5.3.3 Human-Robot Collaboration -- 5.3.4 Adaptive Federated Learning for Industrial IoT -- 5.4 Information Management System-Based Digital Twins and Big Data for Sustainable Smart Manufacturing -- 5.5 Challenges and Future Avenues -- 5.6 Conclusion -- References -- Part 2: Methods and Applications -- Chapter 6: Distributed Systems and Distributed Ledger Technology - An Introduction…”
Libro electrónico -
2313por Nartovich, AleksandrTabla de Contenidos: “…Advanced configuration -- 4.1 Configuring an extended portal instance with the wizard -- 4.1.1 Basic configuration -- 4.1.2 Proxy configuration -- 4.1.3 Securing a portal instance with LDAP -- 4.1.4 Deploying default portlets -- 4.2 Manual configuration -- 4.2.1 Configuration tasks environment -- 4.2.2 Configuration tasks -- 4.2.3 Configuration properties -- 4.2.4 Parent properties files -- 4.2.5 Configuration templates -- 4.2.6 Creating stream files -- 4.3 Configuration tasks reference -- 4.3.1 Overview of configuration tasks -- 4.3.2 Startup tasks -- 4.3.3 HTTP server tasks -- 4.3.4 General purpose tasks -- 4.3.5 Portlet tasks -- 4.3.6 Security tasks -- 4.3.7 Setup tasks -- 4.3.8 Database tasks -- 4.3.9 Validation tasks -- 4.3.10 Lotus configuration tasks -- 4.4 Configuration scenarios -- 4.4.1 Scenario 1: Configuring a manual instance -- 4.4.2 Scenario 2: Configuring an external HTTP server -- 4.4.3 Scenario 3: Configuring security using LDAP for authentication -- Chapter 5. …”
Publicado 2004
Libro electrónico -
2314Publicado 2012Tabla de Contenidos: “…Exercises -- Chapter 11: Input/Output -- 11.1 Introduction -- 11.2 Stream I/O Classes -- 11.3 Format-free Input -- 11.4 Formatted Input -- 11.5 Format-free Output -- 11.6 Formatted Output -- 11.6.1 Writing integers -- 11.6.2 Writing float -- 11.6.3 Writing structures and objects -- 11.7 The Manipulators -- 11.7.1 Manipulators for reading integers -- 11.7.2 Manipulators for writing integers -- 11.7.3 Manipulators for writing floats -- 11.8 Summary of Manipulators -- 11.9 Our Own Manipulators -- 11.10 Miscellaneous Functions -- For Advanced Readers -- Summary -- Multiple Choice Questions and Answers -- Exercises -- Chapter 12: Pointers -- 12.1 Introduction -- 12.2 The & (AND) Operator -- 12.3 The * Operator -- 12.4 Pointers and Arrays -- 12.5 Pointer Arithmetic -- 12.6 Pointer to Void -- 12.7 Pointer to Function -- 12.8 Dynamic Memory Allocation -- 12.8.1 Free Store -- 12.9 Operators new and delete -- 12.9.1 Operator new -- 12.9.2 Operator delete -- 12.10 One Dimensional Arrays Using Pointers -- 12.11 Two Dimensional Arrays Using Pointers -- 12.12 Pointers to User Defined Data Types -- 12.12.1 Array of pointers (to objects) -- 12.13 Advantages and Disadvantages of Pointers -- 12.14 End of Chapter Programs -- 12.14.1 Class Vector -- 12.14.2 Comparison of pointers -- 12.14.3 Study of NULL -- For Advanced Readers -- Summary -- Multiple Choice Questions and Answers -- Exercises -- Chapter 13: Polymorphism -- 13.1 Introduction -- 13.2 Compile Time Polymorphism -- 13.2.1 Polymorphism with ordinary1 objects -- 13.2.2 Polymorphism with dynamic objects2 -- 13.2.3 Early binding -- 13.2.4 Function overriding -- 13.3 Pointing to Derived Class Objects -- 13.3.1 Demo program: The Twist -- 13.4 Virtual Functions -- 13.4.1 Need for virtual functions -- 13.4.2 Declaring function virtual -- 13.5 Run Time Polymorphism -- 13.5.1 Run time polymorphism in action…”
Libro electrónico -
2315por Ebel, NadinTabla de Contenidos: “…3.5.4 Warranty und Utility -- 3.6 Zusammenfassung -- 3.7 Beispielfragen -- 4 Die vier Dimensionen des Service Management in ITIL 4 -- 4.1 Das Vier-Dimensionen-Modell -- 4.2 Organizations and people/Organisationen und Menschen -- 4.2.1 Menschen und Kultur -- 4.2.2 Kommunikation und Kompetenzen -- 4.3 Information and technology/Informationen und Technologie -- 4.3.1 Einsatz von Technologien -- 4.3.2 Informationsmanagement -- 4.3.3 Zusammenwirken der Dimensionen -- 4.4 Partners and suppliers/Partner und Lieferanten -- 4.4.1 Cloud Computing -- 4.4.2 Service Integration and Management (SIAM) -- 4.5 Value streams and processes/Wertströme und Prozesse -- 4.5.1 Wertströme für das Service Management -- 4.5.1.1 Wertstromanalyse und Lean Management -- 4.5.2 Prozesse -- 4.5.3 Wertströme und Prozesse -- 4.6 Externe Faktoren -- 4.7 Zusammenfassung -- 4.8 Beispielfragen -- 5 Das Service Value System in ITIL 4 -- 5.1 Service Value System -- 5.2 Überblick über das SVS und seine Bestandteile -- 5.2.1 Förderung der Zusammenarbeit -- 5.2.2 Organisatorische Agilität und Resilienz -- 5.2.2.1 Agile Softwareentwicklung in Abgrenzung zur agilen Organisation -- 5.2.2.2 Organisatorische Agilität und Resilienz als Erfolgsfaktoren -- 5.2.2.3 ITIL, Agile und DevOps -- 5.3 Inputs und Outcome des SVS: Opportunity, Demand, Value -- 5.4 Governance -- 5.4.1 Governance und IT Governance -- 5.4.2 Governance im ITIL Service Value System -- 5.5 Service Value Chain -- 5.5.1 Plan -- 5.5.2 Improve -- 5.5.3 Engage -- 5.5.4 Design & -- Transition -- 5.5.5 Obtain/Build -- 5.5.6 Deliver & -- Support -- 5.6 Continual Improvement -- 5.6.1 Das Continual-Improvement-Modell -- 5.6.1.1 Schritt 1: Wie lautet die Vision? …”
Publicado 2021
Libro electrónico -
2316Publicado 2023Tabla de Contenidos: “…3 Assessing the Accuracy of Digital Elevation Models for Darjeeling-Sikkim Himalayas -- 3.1 Introduction -- 3.2 Study Area -- 3.3 Materials and Methods -- 3.3.1 Generation of Cartosat-1 DEM and Orthoimage -- 3.3.2 TanDEM-X -- 3.3.3 ALOS PALSAR -- 3.3.4 DGPS Survey for Obtaining Ground Control Points (GCPs) -- 3.3.5 Datum Transformation -- 3.3.6 Accuracy Assessment Methods -- 3.3.6.1 Vertical Accuracy -- 3.3.6.2 Spatial Accuracy -- 3.4 Results and Discussion -- 3.4.1 Vertical Accuracy Assessment: Comparison of DEMs With Reference to GCPs -- 3.4.2 Vertical Accuracy of DEMs for Different Land Use Classes -- 3.4.2.1 Dense Forest -- 3.4.2.2 Open Forest -- 3.4.2.3 Tea Garden -- 3.4.2.4 Built-up Area -- 3.4.3 Spatial Accuracy Assessment: Comparison of DEMs With Reference to Stream Networks -- 3.5 Conclusions -- Acknowledgments -- References -- 4 An Overview of Morphometry Software Packages, Tools, and Add-ons -- 4.1 Introduction -- 4.2 Overview of Morphometry Tools and Toolboxes -- 4.3 Stand-Alone Tools -- 4.4 Tools that Run within Coding Bases -- 4.5 Conclusion -- References -- 5 Landscape Modeling, Glacier and Ice Sheet Dynamics, and the Three Poles: A Review of Models, Softwares, and Tools -- 5.1 Introduction -- 5.2 Taxonomy -- 5.2.1 Geomorphic Process-Based Models -- 5.2.2 Classification Based on Process of Modeling -- 5.2.2.1 Based on Geomorphic Processes -- 5.2.2.2 Based on Modeling Process -- 5.3 Working Principles for Geomorphological Models -- 5.3.1 Soil Production -- 5.3.2 Hillslope Transport -- 5.3.3 Land Sliding -- 5.3.4 Fluvial Incision and Transport -- 5.3.5 Glacial Erosion -- 5.4 Landscape Evolution Models -- 5.4.1 DEM-Based Models -- 5.4.2 SIBERIA -- 5.4.3 GOLEM -- 5.4.4 CASCADE -- 5.4.5 ZScape -- 5.4.6 CHILD -- 5.4.7 CAESAR -- 5.4.8 APERO -- 5.4.9 SIGNUM (Simple Integrated Geomorphological Numerical Model)…”
Libro electrónico -
2317Publicado 2023Tabla de Contenidos: “…Cover -- Half Title -- Title Page -- Copyright Page -- Dedication -- Table of Contents -- List of Acronyms -- Preface -- Author -- Chapter 1 Introduction to Flight Vehicles -- 1.1 Introduction -- 1.2 Components of an Aeroplane -- 1.2.1 Fuselage -- 1.2.2 Wings -- 1.2.3 Tail Surfaces or Empennage -- 1.2.4 Landing Gear -- 1.3 Basic Principles of Flight -- 1.3.1 Forces Acting on an Aeroplane -- 1.3.2 Drag and Its Reduction -- 1.3.3 Aerodynamically Conforming Shapes: Streamlining -- 1.3.4 Stability and Balance -- 1.4 Flying Control Surfaces: Elevator, Ailerons and Rudder -- 1.4.1 Flaps, High-Lift and Flow Control Devices -- 1.4.2 Introducing Boundary Layers -- 1.4.3 Spoilers -- 1.5 Pilot's Controls: The Throttle, the Control Column and Yoke, the Rudder Pedals and the Toe Brakes -- 1.6 Modes of Flight -- 1.6.1 Static and In-Flight Stability Margins -- 1.7 Power Plant -- 1.7.1 Propeller-Driven Aircraft -- 1.7.2 Jet Propulsion -- 1.8 Avionics, Instrumentation and Systems -- 1.8.1 Autonomous Navigation -- 1.9 Geometry of Aerofoils and Wings -- 1.9.1 Aerofoil Geometry -- 1.9.2 Chord Line -- 1.9.3 Camber -- 1.9.4 Leading and Trailing Edges -- 1.9.5 Specifying Aerofoils -- 1.9.6 Equations Defining Mean Camber Line -- 1.9.7 Aerofoil Thickness Distributions -- 1.9.8 Wing Geometry -- Chapter Highlights -- Exercises -- Answers to Selected Exercises -- References -- Chapter 2 Basic Principles Governing Aerodynamic Flows -- 2.1 Introduction -- 2.2 Continuity Principle -- 2.2.1 Streamlines and Stream Tubes -- 2.3 Bernoulli's Principle -- 2.4 Laminar Flows and Boundary Layers -- 2.5 Turbulent Flows -- 2.6 Aerodynamics of Aerofoils and Wings -- 2.6.1 Flow Around an Aerofoil -- 2.6.2 Mach Number and Subsonic and Supersonic Flows -- 2.7 Properties of Air in the Atmosphere…”
Libro electrónico -
2318por Foltz, KevinTabla de Contenidos: “…3.3.4 Secure Data Acquisition -- 3.3.5 Integrity at the Source -- 3.4 Temporal Data -- 3.5 Credential Data -- 3.6 Distributed Stores -- 4 Access and Privilege -- 4.1 Access Control -- 4.2 Authorization and Access in General -- 4.3 Access Control List -- 4.3.1 Group Requirements -- 4.3.2 Role Requirements -- 4.3.3 ACRs and ACLs -- 4.3.4 Discretionary Access Control and Mandatory Access Control -- 4.4 Complex Access Control Schemas -- 4.5 Privilege -- 4.6 Concept of Least Privilege -- 4.6.1 Least Privilege Case Study -- 5 Cryptography -- 5.1 Introduction -- 5.2 Cryptographic Keys and Key Management -- 5.2.1 Asymmetric Key Pairs -- 5.2.1.1 RSA Key Generation -- 5.3 Symmetric Keys -- 5.3.1 TLS Mutual Authentication Key Production -- 5.3.2 Other Key Production -- 5.4 Store Keys -- 5.5 Delete Keys -- 5.6 Encryption -- 5.7 Symmetric versus Asymmetric Encryption Algorithms -- 5.7.1 Asymmetric Encryption -- 5.7.2 RSA Asymmetric Encryption -- 5.7.3 Combination of Symmetric and Asymmetric Encryption -- 5.7.4 Symmetric Encryption -- 5.7.4.1 Stream Ciphers -- 5.7.4.2 Block Ciphers -- 5.7.5 AES/Rijndael Encryption -- 5.7.5.1 Description of the AES Cipher -- 5.7.6 Data Encryption Standard -- 5.7.6.1 Triple DES -- 5.7.6.2 Description of the Triple DES Cipher -- 5.8 Decryption -- 5.8.1 Asymmetric Decryption -- 5.8.2 Symmetric Decryption -- 5.9 Hash Function -- 5.9.1 Hash Function Algorithms -- 5.9.2 Hashing with Cryptographic Hash Function -- 5.9.2.1 MD-5 -- 5.9.2.2 SHA-3-Defined SHA-512 -- 5.10 Signatures -- 5.10.1 XML Signature -- 5.10.2 S/MIME Signature -- 5.10.3 E-Content Signature -- 5.11 A Note on Cryptographic Key Lengths -- 5.11.1 Encryption Key Discovery -- 5.11.2 The High-Performance Dilemma -- 5.11.3 Parallel Decomposition of Key Discovery -- 5.12 Internet Protocol Security -- 5.13 Other Cryptographic Services -- 5.14 The Java Cryptography Extension…”
Publicado 2020
Libro electrónico -
2319Publicado 2017Tabla de Contenidos: “…II Engineering IoT Networks -- ch. 3 Smart Objects: The "Things" in IoT -- Sensors, Actuators, and Smart Objects -- Sensors -- Actuators -- Micro-Electro-Mechanical Systems (MEMS) -- Smart Objects -- Smart Objects: A Definition -- Trends in Smart Objects -- Sensor Networks -- Wireless Sensor Networks (WSNs) -- Communication Protocols for Wireless Sensor Networks -- Summary -- ch. 4 Connecting Smart Objects -- Communications Criteria -- Range -- Frequency Bands -- Power Consumption -- Topology -- Constrained Devices -- Constrained-Node Networks -- Data Rate and Throughput -- Latency and Determinism -- Overhead and Payload -- IoT Access Technologies -- IEEE 802.15.4 -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4 Conclusions -- IEEE 802.15.4g and 802.15.4e -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.15.4g and 802.15.4e Conclusions -- IEEE 1901.2a -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 1901.2a Conclusions -- IEEE 802.1 lah -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- IEEE 802.1 lah Conclusions -- LoRaWAN -- Standardization and Alliances -- Physical Layer -- MAC Layer -- Topology -- Security -- Competitive Technologies -- LoRaWAN Conclusions -- NB-IoT and Other LTE Variations -- Standardization and Alliances -- LTE Cat 0 -- LTE-M -- NB-IoT -- Topology -- Competitive Technologies -- NB-IoT and Other LTE Variations Conclusions -- Summary -- ch. 5 IP as the IoT Network Layer -- The Business Case for IP -- The Key Advantages of Internet Protocol -- Adoption or Adaptation of the Internet Protocol -- The Need for Optimization -- Constrained Nodes -- Constrained Networks -- IP Versions -- Optimizing IP for IoT -- From 6LoWPAN to 6Lo -- Header Compression -- Fragmentation -- Mesh Addressing -- Mesh-Under Versus Mesh-Over Routing -- 6L0 Working Group -- 6TiSCH -- RPL -- Objective Function (OF) -- Rank -- RPL Headers -- Metrics -- Authentication and Encryption on Constrained Nodes -- ACE -- DICE -- Profiles and Compliances -- Internet Protocol for Smart Objects (IPSO) Alliance -- Wi-SUN Alliance -- Thread -- IPv6 Ready Logo -- Summary -- ch. 6 Application Protocols for IoT -- The Transport Layer -- IoT Application Transport Methods -- Application Layer Protocol Not Present -- SCADA -- A Little Background on SCADA -- Adapting SCADA for IP -- Tunneling Legacy SCADA over IP Networks -- SCADA Protocol Translation -- SCADA Transport over LLNs with MAP-T -- Generic Web-Based Protocols -- IoT Application Layer Protocols -- CoAP -- Message Queuing Telemetry Transport (MQTT) -- Summary -- ch. 7 Data and Analytics for IoT -- An Introduction to Data Analytics for IoT -- Structured Versus Unstructured Data -- Data in Motion Versus Data at Rest -- IoT Data Analytics Overview -- IoT Data Analytics Challenges -- Machine Learning -- Machine Learning Overview -- Supervised Learning -- Unsupervised Learning -- Neural Networks -- Machine Learning and Getting Intelligence from Big Data -- Predictive Analytics -- Big Data Analytics Tools and Technology -- Massively Parallel Processing Databases -- NoSQL Databases -- Hadoop -- YARN -- The Hadoop Ecosystem -- Apache Kafka -- Lambda Architecture -- Edge Streaming Analytics -- Comparing Big Data and Edge Analytics -- Edge Analytics Core Functions -- Distributed Analytics Systems -- Network Analytics -- Flexible NetFlow Architecture -- FNF Components -- Flexible NetFlow in Multiservice IoT Networks -- Summary -- References -- ch. 8 Securing IoT -- A Brief History of OT Security -- Common Challenges in OT Security -- Erosion of Network Architecture -- Pervasive Legacy Systems -- Insecure Operational Protocols -- Modbus -- DNP3 (Distributed Network Protocol) -- ICCP (Inter-Control Center Communications Protocol) -- OPC (OLE for Process Control) -- International Electrotechnical Commission (IEC) Protocols -- Other Protocols -- Device Insecurity -- Dependence on External Vendors -- Security Knowledge -- How IT and OT Security Practices and Systems Vary -- The Purdue Model for Control Hierarchy -- OT Network Characteristics Impacting Security -- Security Priorities: Integrity, Availability, and Confidentiality -- Security Focus -- Formal Risk Analysis Structures: OCTAVE and FAIR -- OCTAVE -- FAIR -- The Phased Application of Security in an Operational Environment -- Secured Network Infrastructure and Assets -- Deploying Dedicated Security Appliances -- Higher-Order Policy Convergence and Network Monitoring -- Summary -- pt. …”
Libro -
2320Publicado 1993“…The author then presents the programming interfaces most important to building communication software in System V, including STREAMS, the Transport Layer Interface library, Sockets, and Remote Procedure Calls. …”
Libro electrónico