Vi bøger
Levering: 1 - 2 hverdage

Servere

Her finder du spændende bøger om Servere. Nedenfor er et flot udvalg af over 98 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Marco Forestier
    495,95 kr.

    Die zunehmende Datenflut und der Bedarf an zentralisierten, zugänglichen Speicherlösungen hat die Bedeutung von Netzwerkspeicherlösungen (NAS) in den Vordergrund gerückt. Das Herzstück des Buches bildet die umfassende Anleitung für die Implementierung eines NAS als Web- und Datenbankserver. Es behandelt eingehend die Integration und Verwaltung von NAS in Netzwerkumgebungen. Dabei werden essenzielle Themen wie IP-Konfigurationen, Routing und Switching sowie die Einrichtung von Nutzerkonten und Zugriffsrechten detailliert beleuchtet, um eine sichere und erweiterbare Netzwerkinfrastruktur zu schaffen.Der Bereich Sicherheit erhält eine besondere Betonung. Leserinnen und Leser erhalten Einblick in Firewall-Konfigurationen, den Umgang mit SSL-Zertifikaten, die Einrichtung von VPNs und Strategien zur Abwehr von DDoS-Angriffen. Zudem werden präventive Maßnahmen und Methoden zur Überwachung und Alarmierung, die die Integrität und Sicherheit des NAS gewährleisten, eingehend besprochen.Speicherstrategien sind ein weiterer zentraler Punkt des Buches, wo verschiedene RAID-Konfigurationen und -Level unter die Lupe genommen werden, um ein umfassendes Verständnis ihrer Vor- und Nachteile zu vermitteln. Ergänzt wird dieser Teil durch praxisnahe Erläuterungen zu Methoden der Speichereffizienz, einschließlich Thin Provisioning und Daten Deduplizierung.Das Buch wendet sich an IT-Professionals und technikaffine Heimanwender gleichermaßen, die das volle Potenzial eines NAS-Systems ausschöpfen möchten. Es dient als Wegweiser, um die technischen Möglichkeiten moderner Netzwerkspeicher voll auszunutzen und in anspruchsvollen Anwendungen effektiv zu nutzen.

  • af Mitch Seymour
    169,95 kr.

    Learn about different storage technologies, including OpenSearch, Redshift, Kinesis, and S3, through the eyes of cute woodland creatures.A young fox family copes with the increasing pickiness of their kits' eating habits. In the process, they discover a clever approach to searching for food.Using an art style inspired by Winnie the Pooh, readers of all ages will learn about the following OpenSearch concepts:AnalyzersAnalyzer chainsColumnsData lakesData warehousesDistributed systemsFull table scansIndexesInverted IndexesOpenSearchRelational storageRowsStemmingStop wordsStreamsStructured dataTablesTermsTokensUnstructured data

  • af Elangovan G
    122,95 kr.

    Drawing on case studies like Amazon, Facebook, the FIFA World Cup and the Aadhaar scheme, this book looks at how Big Data is changing the way we behave, consume and respond to situations in the digital age. It looks at how Big Data has the potential to transform disaster management and healthcare, as well as prove to be authoritarian and exploitative in the wrong hands.The latest offering from the authors of Artificial Intelligence: Evolution, Ethics and Public Policy, this accessibly written volume is essential for the researcher in science and technology studies, media and culture studies, public policy and digital humanities, as well as being a beacon for the general reader to make sense of the digital age.

  • af Thomas Smart
    547,95 kr.

  • af Derek Pearson
    152,95 kr.

    This guide is a semi-auto bio account that provides technical insight into a tried and true method to get into IT without a college degree and how to navigate some of the stressful and dark shadows of the enterprise world. It covers tools, soft skills, and stories of real-life professionals.

  • af Luca Ferrari
    467,95 kr.

  • af Wanlei Zhou, Ivan Stojmenovic, Xiang-He Sun, mfl.
    594,95 kr.

    This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.

  • af Debdeep Mukhopadhyay, Marc Joye & Michael Tunstall
    692,95 kr.

    This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.

  • af Xiaofeng Chen & Xavier Boyen
    568,95 kr.

    This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement.

  • af Kyung-Hyune Rhee & DaeHun Nyang
    571,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.

  • af Christian Schlegel, Yan Zhang, Alexey Vinel, mfl.
    698,95 kr.

    This book constitutes the refereed proceedings of the 4th International Workshop on Multiple Access Communications, MACOM 2011, held in Trento, Italy, in September 2011. The 21 full papers presented were carefully reviewed and selected from more than 40 submissions. They are divided in topical sections on cognitive radio; MAC protocols; communications theory; special session on MAC protocols for WSNs; system analysis and scheduling; and queuing systems.

  • af Hartmut Wittig
    550,95 kr.

    Intelligent agents are rescuer in the information glut. They help users to find information which better corresponds to their interests and needs. This book describes the architecture and basic modules of an intelligent media agent. A personal television guide is described as an example of intelligent help, addressing the problem of managing TV channels by using an intelligent agent.

  • af Werner Schindler & Sorin Huss
    559,95 kr.

    This book constitutes the refereed proceedings of the Third International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2012, held in Darmstadt, Germany, May 2012.The 16 revised full papers presented together with two invited talks were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on practical side-channel analysis; secure design; side-channel attacks on RSA; fault attacks; side-channel attacks on ECC; different methods in side-channel analysis.

  • af Matthew Wright & Simone Fischer-Hübner
    452,95 - 559,95 kr.

  • af Joaquin Miguez, Javier Del Ser, Eduard Axel Jorswieck, mfl.
    566,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference Mobile Lightweight Wireless Systems (MOBILIGHT 2011) held in Bilbao, Spain on May 9-10. 2011. In numbers, MOBILIGHT 2011 was organized as a 2-day single-track event with 18 technical presentations, and 3 specialized workshops focused on opportunistic sensing and processing in mobile wireless sensor and cellular networks (MOBISENSE), multimode wireless access networks (MOWAN) and strategic network planning applied to market regulation (NETSTRAT), totaling to 34 papers presented during the conference and included in the proceedings

  • af Alex Galis, Ana García, John Domingue, mfl.
    606,95 kr.

    Irrespective of whether we use economic or societal metrics, the Internet is one of the most important technical infrastructures in existence today. It will serve as a catalyst for much of our innovation and prosperity in the future. A competitive Europe will require Internet connectivity and services beyond the capabilities offered by current technologies. Future Internet research is therefore a must.The Future Internet Assembly (FIA) is a successful and unique bi-annual conference that brings together participants of over 150 projects from several distinct but interrelated areas in the EU Framework Programme 7. The 20 full papers included in this volume were selected from 40 submissions, and are preceded by a vision paper describing the FIA Roadmap. The papers have been organized into topical sections on the foundations of Future Internet, the applications of Future Internet, Smart Cities, and Future Internet infrastructures.

  • af Hao Yin, Robert Bestak, Lukas Kencl, mfl.
    571,95 - 572,95 kr.

  • af Catherine A. Meadows & Carmen Fernandez-Gago
    692,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.

  • af Burkhard Stiller & Antonis M. Hadjiantonis
    603,95 kr.

    This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics. Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed: - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms.

  • af Max Ott, Patrick Senac & Aruna Seneviratne
    574,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems, MobiQuitous 2010, held in Sydney, Australia, in December 2010. The 24 revised full papers presented were carefully reviewed and selected from 105 submissions. They cover a wide range of topics ranging from papers architectures to toolkits and mechanisms for privacy, energy efficiency and content awareness. In addition there are 11 work in progress papers and a selection of the best poster and workshop papers.

  • af Mark D. Ryan, Guilin Wang & Ben Smyth
    452,95 - 569,95 kr.

  • af Moti Yung & Souhwan Jung
    569,95 - 699,95 kr.

  • af Pierpaolo Degano & Joshua D. Guttman
    570,95 kr.

    This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.

  • af Jack Dongarra, Yiannis Cotronis, Anthony Danalis & mfl.
    565,95 kr.

    This book constitutes the refereed proceedings of the 18th European MPI Users' Group Meeting on Recent Advances in the Message Passing Interface, EuroMPI 2011, held in Santorini, Greece, in September 2011. The 28 revised full papers presented together with 10 posters were carefully reviewed and selected from 66 submissions. Topics covered are communication; I/O; networking, and implementation issues and improvements; algorithms and tools; interaction with hardware; applications and performance evaluation; fault and tolerance.

  • af Kay Romer, Uwe Brinkschulte & Andreas Herkersdorf
    557,95 kr.

    This book constitutes the refereed proceedings of the 25th International Conference on Architecture of Computing Systems, ARCS 2012, held in Munich, Germany, in February/March 2012.The 20 revised full papers presented in 7 technical sessions were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on robustness and fault tolerance, power-aware processing, parallel processing, processor cores, optimization, and communication and memory.

  • af Wendi Heinzelman & Gian Pietro Picco
    698,95 kr.

    This book constitutes the refereed proceedings of the 9th European Conference on Wireless Sensor Networks, EWSN 2012, held in Trento, Italy, in Februar 2012. The 16 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers are organized in topical sections on communication and security, system issues, reliability, localization and smart cameras, and hardware and sensing.

  • af Stéphane Devismes, Luciano Bononi, Ajoy Datta & mfl.
    581,95 kr.

    This book constitutes the refereed proceedings of the 13th International Conference on Distributed Computing and Networking, ICDCN 2012, held in Hong Kong, China, during January 3-6, 2012.The 36 revised full papers and 1 short paper presented together with 4 poster papers were carefully reviewed and selected from 100 submissions. The papers address all current issues in the field of distributed computing and networking. Being a leading forum for researchers and practitioners to exchange ideas and share best practices, ICDCN also hosts as a forum for PhD students to discuss their research ideas and get quality feedback from the well-renowned experts in the field of distributed computing and computer networking.

  • af George Danezis
    563,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC 2011, held in Gros Islet, St. Lucia, in February/March 2011.The 16 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 65 initial submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on fundamental and applied real-world deployments on all aspects surrounding commerce security; as well as on systems security and inter-disciplinary efforts.

  • af Emmanuel Prouff
    564,95 kr.

    This book constitutes the thoroughly refereed post-conference proceedings of the 10th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, CARDIS 2011, held in Leuven, Belgium, in September 2011. The 20 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on smart cards system security, invasive attacks, new algorithms and protocols, implementations and hardware security, non-invasive attacks, and Java card security.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.