Vi bøger
Levering: 1 - 2 hverdage
Filter
Filter
Sorter efterSorter Populære
  • - Design Patterns for Great Software
    af Elecia White
    453,95 kr.

    Interested in developing embedded systems? Since they dont tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements.Written by an expert whos created embedded systems ranging from urban surveillance and DNA scanners to childrens toys, this book is ideal for intermediate and experienced programmers, no matter what platform you use.Optimize your system to reduce cost and increase performanceDevelop an architecture that makes your software robust in resource-constrained environmentsExplore sensors, motors, and other I/O devicesDo more with less: reduce RAM consumption, code space, processor cycles, and power consumptionLearn how to update embedded code directly in the processorDiscover how to implement complex mathematics on small processorsUnderstand what interviewers look for when you apply for an embedded systems job"e;Making Embedded Systems is the book for a C programmer who wants to enter the fun (and lucrative) world of embedded systems. Its very well writtenentertaining, evenand filled with clear illustrations."e;Jack Ganssle, author and embedded system expert.

  • af Peter H. Gregory
    444,95 kr.

    Provides 100% coverage of every objective on the 2022 CISM examThis integrated self-study guide enables you to take the 2022 version of the challenging CISM exam with complete confidence. Written by an expert in the field, the book offers exam-focused coverage of information security governance, information risk management, information security program development and management, and information security incident management.CISM Certified Information Security Manager All-in-One Exam Guide, Second Edition features learning objectives, exam tips, practice questions, and in-depth explanations. All questions closely match those on the live test in tone, format, and content. Special design elements throughout provide real-world insight and call out potentially harmful situations. Beyond fully preparing you for the exam, the book also serves as a valuable on-the-job reference.Features complete coverage of all 2022 CISM exam domainsOnline content includes 300 practice questions in the customizable TotalTester(TM) exam engineWritten by a cybersecurity expert, author, and lecturer

  • af Joseph Steinberg
    298,95 kr.

    Over 700 pages of insight into all things cybersecurityCybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.* Explore the basics of cybersecurity at home and in business* Learn how to secure your devices, data, and cloud-based assets* Test your security to find holes and vulnerabilities before hackers do* Create a culture of cybersecurity throughout an entire organizationThis For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

  • af Gourab Mukherjee
    413,95 kr.

    Become a Salesforce Data Cloud implementation expert.Book DescriptionSurvival in today's business landscape hinges on delivering exceptional customer experiences, and Customer Data Platforms (CDPs) are pivotal in achieving this goal. The 'Ultimate Salesforce Data Cloud for Customer Experience' is your indispensable guide to unraveling the Salesforce ecosystem, illuminating its applications' significance in diverse business scenarios. Dive into the transformative potential of Customer Data Platforms, understanding their role in unlocking tremendous value for enterprises. Explore the prowess of Salesforce Data Cloud, a leading CDP platform, and gain practical insights into its seamless implementation.The book explores Salesforce Data Cloud architecture, gaining actionable insights for implementing both Customer Data Platforms and Salesforce Data Cloud. It will navigate the pivotal realms of data security and privacy, establishing a sturdy foundation for customer-centric strategies. The book also covers success stories that showcase the transformative outcomes achieved through the utilization of Salesforce Data Cloud. The end of the book serves as a roadmap for those aspiring to conquer the Salesforce Data Cloud Consultant exam.Table of Contents1. Introducing Salesforce Platform2. Introduction to Customer Data Platform3. Going beyond CDP: Salesforce Data Cloud4. Salesforce Data Cloud Architecture5. Implementing a Customer Data Platform6. Implementing Salesforce Customer Data Cloud7. Data Security and Privacy8. Success Stories with Salesforce Data Cloud9. The Way Forward for Creating Great Customer Experiences10. Preparation for the Salesforce Data Cloud Consultant Exam Index

  • af Mark Simos
    553,95 kr.

    Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry expertsKey FeaturesGet simple, clear, and practical advice for everyone from CEOs to security operationsOrganize your Zero Trust journey into role-by-role execution stagesIntegrate real-world implementation experience with global Zero Trust standardsPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionZero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats.The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards.The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality.This first book in the series helps you understand what Zero Trust is, why it's important for you, and what success looks like. You'll learn about the driving forces behind Zero Trust - security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success.By the end of this book, you'll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!What you will learnFind out what Zero Trust is and what it means to youUncover how Zero Trust helps with ransomware, breaches, and other attacksUnderstand which business assets to secure firstUse a standards-based approach for Zero TrustSee how Zero Trust links business, security, risk, and technologyUse the six-stage process to guide your Zero Trust journeyTransform roles and secure operations with Zero TrustDiscover how the playbook guides each role to successWho this book is forWhether you're a business leader, security practitioner, or technology executive, this comprehensive guide to Zero Trust has something for you. This book provides practical guidance for implementing and managing a Zero Trust strategy and its impact on every role (including yours!). This is the go-to guide for everyone including board members, CEOs, CIOs, CISOs, architects, engineers, IT admins, security analysts, program managers, product owners, developers, and managers. Don't miss out on this essential resource for securing your organization against cyber threats.Table of ContentsZero Trust - This Is the WayReading the Zero Trust Playbook SeriesZero Trust is Security for Today's WorldStandard Zero Trust CapabilitiesArtificial Intelligence (AI) and Zero TrustHow to Scope, Size, and Start Zero TrustWhat Zero Trust Success Looks LikeAdoption with the Three-Pillar ModelThe Zero Trust Six-Stage PlanZero Trust Playbook Roles

  • af James Forshaw
    564,95 kr.

    "In this hands-on guidebook, Windows security expert and bug hunter Forshaw distills his knowledge and describes the system in great depth. Readers learn the core components and features of the Microsoft Windows threat-mitigation system with in-depth technical discussions and real-world examples"--

  • af Ankush Chowdhary
    643,95 kr.

    Master the art of designing, developing, and operating secure infrastructures on Google CloudKey Features:Prepare for the certification exam with clear explanations, real-world examples, and self-assessment questionsReview Google Cloud security best practices for building a secure and compliant cloud environmentExplore advanced concepts like Security Command Center, BeyondCorp Zero Trust, and container securityBook Description:Google Cloud security offers powerful controls to assist organizations in establishing secure and compliant cloud environments. With this book, you'll gain in-depth knowledge of the Professional Cloud Security Engineer certification exam objectives, including Google Cloud security best practices, identity and access management (IAM), network security, data security, and security operations.The chapters go beyond the exam essentials, helping you explore advanced topics such as Google Cloud Security Command Center, the BeyondCorp Zero Trust architecture, and container security. With step-by-step explanations, practical examples, and practice exams to help you improve your skills for the exam, you'll be able to efficiently review and apply key concepts of the shared security responsibility model. Finally, you'll get to grips with securing access, organizing cloud resources, network and data security, and logging and monitoring.By the end of this book, you'll be proficient in designing, developing, and operating security controls on Google Cloud and gain insights into emerging concepts for future exams.What You Will Learn:Understand how Google secures infrastructure with shared responsibilityUse resource hierarchy for access segregation and implementing policiesUtilize Google Cloud Identity for authentication and authorizationsBuild secure networks with advanced network featuresEncrypt/decrypt data using Cloud KMS and secure sensitive dataGain visibility and extend security with Google's logging and monitoring capabilitiesWho this book is for:This book is for IT professionals, cybersecurity specialists, system administrators, and tech enthusiasts aspiring to strengthen their understanding of Google Cloud security and elevate their career trajectory. Earning this certification not only validates your expertise but also makes you part of an elite group of GCP security engineers, opening doors to opportunities that can significantly advance your career. Prior knowledge of the foundational concepts of Google Cloud or GCP Associate Engineer Certification is strongly recommended.

  • af Unmesh Joshi
    433,95 kr.

    A Patterns Approach to Designing Distributed Systems and Solving Common Implementation Problems More and more enterprises today are dependent on cloud services from providers like AWS, Microsoft Azure, and GCP. They also use products, such as Kafka and Kubernetes, or databases, such as YugabyteDB, Cassandra, MongoDB, and Neo4j, that are distributed by nature. Because these distributed systems are inherently stateful systems, enterprise architects and developers need to be prepared for all the things that can and will go wrong when data is stored on multiple servers--from process crashes to network delays and unsynchronized clocks. Patterns of Distributed Systems describes a set of patterns that have been observed in mainstream open-source distributed systems. Studying the common problems and the solutions that are embodied by the patterns in this guide will give you a better understanding of how these systems work, as well as a solid foundation in distributed system design principles. Featuring real-world code examples from systems like Kafka and Kubernetes, these patterns and solutions will prepare you to confidently traverse open-source codebases and understand implementations you encounter "in the wild." Review the building blocks of consensus algorithms, like Paxos and Raft, for ensuring replica consistency in distributed systems Understand the use of logical timestamps in databases, a fundamental concept for data versioning Explore commonly used partitioning schemes, with an in-depth look at intricacies of two-phase-commit protocol Analyze mechanisms used in implementing cluster coordination tasks, such as group membership, failure detection, and enabling robust cluster coordination Learn techniques for establishing effective network communication between cluster nodes. Along with enterprise architects and data architects, software developers working with cloud services such as Amazon S3, Amazon EKS, and Azure CosmosDB or GCP Cloud Spanner will find this set of patterns to be indispensable. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

  • af Nearchos Nearchou
    393,95 kr.

    Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threatsKey Features:Get up to speed with the ins and outs of cybercriminal activity on the dark webBecome familiar with the tools and techniques that are used to fight serious crimeGain a keen understanding of the crime ecosystem on the dark web and the best practices to keep it in checkBook Description:In today's world, the crime-prevention landscape is impossible to navigate. The dark web means new frontiers of combat against bad actors that pop up daily. Everyone from narcotics dealers to human traffickers are exploiting the dark web to evade authorities. If you want to find your feet in this tricky terrain and fight crime on the dark web, take this comprehensive, easy-to-follow cyber security guide with you.Combating Crime on the Dark Web contains everything you need to be aware of when tackling the world of the dark web. Step by step, you'll gain acumen in the tactics that cybercriminals are adopting and be equipped with the arsenal of strategies that are available to you as a cybersecurity specialist.This cyber security book ensures that you are well acquainted with all the latest techniques to combat dark web criminality. After a primer on cybercrime and the history of the dark web, you'll dive right into the main domains of the dark web ecosystem, reaching a working understanding of how drug markets, child pornography, and human trafficking operate. Once well-versed with the functioning of criminal groups, you'll be briefed on the most effective tools and methods being employed by law enforcement, tech companies, and others to combat such crimes, developing both a toolkit and a mindset that can help you stay safe from such criminal activities and can be applied in any sector or domain. By the end of this book, you'll be well prepared to begin your pushback against the criminal elements of the dark web.What You Will Learn:Understand the history of cybercrime, the dark web, and the use of TorDiscover the ecosystem of dark web drug marketsBecome familiar with the methods law enforcement use to stop child abusersDive deep into real-life human trafficking cases and how they were tackledExplore sting operations, honeypots, and cybercrime prevention methodologiesGain expertise in Pipl Search, MEMEX, BITCRIME, and other anti-crime toolsInvestigate open-source intelligence and intelligence-led policingSet up a framework for disrupting organized crime on the dark webWho this book is for:This book is for aspiring cybercrime investigators, cybersecurity enthusiasts, and anyone else who is interested in learning about this dark side of the internet. The book mainly focuses on preventing crimes on the dark web and is written in a simple way so that you can understand it with ease.

  • af Piethein Strengholt
    777,95 kr.

    As data management and integration continue to evolve rapidly, storing all your data in one place, such as a data warehouse, is no longer scalable. In the very near future, data will need to be distributed and available for several technological solutions. With this practical book, youll learnhow to migrate your enterprise from a complex and tightly coupled data landscape to a more flexible architecture ready for the modern world of data consumption.Executives, data architects, analytics teams, and compliance and governance staff will learn how to build a modern scalable data landscape using the Scaled Architecture, which you can introduce incrementally without a large upfront investment. Author Piethein Strengholt provides blueprints, principles, observations, best practices, and patterns to get you up to speed.Examine data management trends, including technological developments, regulatory requirements, and privacy concernsGo deep into the Scaled Architecture and learn how the pieces fit togetherExplore data governance and data security, master data management, self-service data marketplaces, and the importance of metadata

  • af Katharine Jarmul
    524,95 kr.

    Between major privacy regulations like the GDPR and CCPA and expensive and notorious data breaches, there has never been so much pressure to ensure data privacy. Unfortunately, integrating privacy into data systems is still complicated. This essential guide will give you a fundamental understanding of modern privacy building blocks, like differential privacy, federated learning, and encrypted computation. Based on hard-won lessons, this book provides solid advice and best practices for integrating breakthrough privacy-enhancing technologies into production systems. Practical Data Privacy answers important questions such as: What do privacy regulations like GDPR and CCPA mean for my data workflows and data science use cases? What does "anonymized data" really mean? How do I actually anonymize data? How does federated learning and analysis work? Homomorphic encryption sounds great, but is it ready for use? How do I compare and choose the best privacy-preserving technologies and methods? Are there open-source libraries that can help? How do I ensure that my data science projects are secure by default and private by design? How do I work with governance and infosec teams to implement internal policies appropriately?

  • - Visual Presentation for the Web
    af Estelle Weyl & Eric A. Meyer
    713,95 kr.

    If youre a web designer or app developer interested in sophisticated page styling, improved accessibility, and saving time and effort, this book is for you. This revised edition provides a comprehensive guide to CSS implementation, along with a thorough review of the latest CSS specifications.CSS is a constantly evolving language for describing the presentation of web content on screen, printers, speech synthesizers, screen readers, and chat windows. It is used by all browsers on all screen sizes on all types of IoT devices, including phones, computers, video games, televisions, watches, kiosks, and auto consoles. Authors Eric Meyer and Estelle Weyl show you how to improve user experience, speed development, avoid potential bugs, and add life and depth to your applications through layout, transitions and animations, borders, backgrounds, text properties, and many other tools and techniques.This guide covers:Selectors, specificity, and the cascadeValues, units, fonts, and text propertiesPadding, borders, outlines, and marginsColors, backgrounds, and gradientsFloats and positioning tricksFlexible box layoutThe new Grid layout system2D and 3D transforms, transitions, and animationFilters, blending, clipping, and maskingMedia and feature queries

  • af Paul McFedries
    234,95 kr.

    A thorough and helpful reference for aspiring website buildersLooking to start an exciting new career in front-end web building and design? Or maybe you just want to develop a new skill and create websites for fun. Whatever your reasons, it's never been easier to start learning how to build websites from scratch than with help from HTML, CSS, & JavaScript All-in-One For Dummies. This book has the essentials you need to wrap your head around the key ingredients of website design and creation.You'll learn to build attractive, useful, and easy-to-navigate websites by combining HTML, CSS, and JavaScript into fun and practical creations. Using the 6 books compiled within this comprehensive collection, you'll discover how to make static and dynamic websites, complete with intuitive layouts and cool animations. The book also includes:* Incorporate the latest approaches to HTML, CSS, and JavaScript, including those involving new markup, page styles, interactivity, and more* Step-by-step instructions for new site creators explaining the very basics of page layouts and animations* Easy-to-follow advice for adjusting page color and background, adding widgets to a site, and getting rid of all the bugs that affect site performance* Bonus 6th book available at https://www.wiley.com/en-us/HTML%2C+CSS%2C+%26amp%3B+JavaScript+All+in+One+For+Dummies-p-9781394164721.Web development is a fun, interesting, and challenging skill that can lead to a lucrative career (if you're so inclined). And with the right help, almost anyone can learn to create engaging websites from scratch. So, grab a copy of HTML, CSS, & JavaScript All-in-One For Dummies and you'll be designing and building before you know it!

  • af Rod Stephens
    420,95 kr.

    A concise introduction to database design concepts, methods, and techniques in and out of the cloudIn the newly revised second edition of Beginning Database Design Solutions: Understanding and Implementing Database Design Concepts for the Cloud and Beyond, Second Edition, award-winning programming instructor and mathematician Rod Stephens delivers an easy-to-understand guide to designing and implementing databases both in and out of the cloud. Without assuming any prior database design knowledge, the author walks you through the steps you'll need to take to understand, analyze, design, and build databases.In the book, you'll find clear coverage of foundational database concepts along with hands-on examples that help you practice important techniques so you can apply them to your own database designs, as well as:* Downloadable source code that illustrates the concepts discussed in the book* Best practices for reliable, platform-agnostic database design* Strategies for digital transformation driven by universally accessible database designAn essential resource for database administrators, data management specialists, and database developers seeking expertise in relational, NoSQL, and hybrid database design both in and out of the cloud, Beginning Database Design Solutions is a hands-on guide ideal for students and practicing professionals alike.

  • af Alexander Loth
    226,95 kr.

  • - Powerful tools and techniques for collaborative software development
    af Jon Loeliger & Matthew McCullough
    524,95 kr.

    Get up to speed on Git for tracking, branching, merging, and managing code revisions. Through a series of step-by-step tutorials, this practical guide takes you quickly from Git fundamentals to advanced techniques, and provides friendly yet rigorous advice for navigating the many functions of this open source version control system.This thoroughly revised edition also includes tips for manipulating trees, extended coverage of the reflog and stash, and a complete introduction to the GitHub repository. Git lets you manage code development in a virtually endless variety of ways, once you understand how to harness the systems flexibility. This book shows you how.Learn how to use Git for several real-world development scenariosGain insight into Gits common-use cases, initial tasks, and basic functionsUse the system for both centralized and distributed version controlLearn how to manage merges, conflicts, patches, and diffsApply advanced techniques such as rebasing, hooks, and ways to handle submodulesInteract with Subversion (SVN) repositoriesincluding SVN to Git conversionsNavigate, use, and contribute to open source projects though GitHub

  • af Dan Sullivan
    333,95 kr.

    Quickly and efficiently prepare for the Google Associate Cloud Engineer certification with the proven Sybex methodIn the newly updated Second Edition of Google Cloud Certified Associate Cloud Engineer Study Guide, expert engineer and tech educator Dan Sullivan delivers an essential handbook for anyone preparing for the challenging Associate Cloud Engineer exam offered by Google and for those seeking to upgrade their Google Cloud engineering skillset.The book provides readers with coverage of every domain and competency tested by the Associate Cloud Engineer exam, including how to select the right Google compute service from the wide variety of choices, how to choose the best storage option for your services, and how to implement appropriate security controls and network functionality.This guide also offers:* A strong emphasis on transforming readers into competent, job-ready applicants, with a focus on building skills in high demand by contemporary employers* Concrete test-taking strategies, techniques, and tips to help readers conquer exam anxiety* Complimentary access to a comprehensive online learning environment, complete with practice testsA must-have resource for practicing and aspiring Google Cloud engineers, Google Cloud Certified Associate Cloud Engineer Study Guide allows you to prepare for this challenging certification efficiently and completely.

  • af Ashish Agrawal
    388,95 kr.

    Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-...

  • af Gaurav Mahajan
    396,95 kr.

    Unlock over 100 recipes for mastering Microsoft 365. Boost productivity with Copilot, collaborate with SharePoint and Teams, automate tasks, create apps and reports using Power Automate (with RPA), Power Apps, Power BI, and more.Print or Kindle book purchase includes a free PDF eBook.Key Features- Enhance collaboration and productivity using SharePoint, Teams, OneDrive, Viva, Planner, and Microsoft Forms- Automate processes, build apps, bots, and dashboards with Power Automate (with RPA), Power Apps, Copilot Studio, and Power BI- Harness Copilot, the new AI virtual assistant, for seamless support in your everyday tasksBook DescriptionMicrosoft 365 offers tools for content management, communication, process automation, and report creation. Microsoft 365 and SharePoint Online Cookbook maximizes workplace collaboration and productivity using SharePoint Online, Teams, OneDrive, Delve, M365 Search, Copilot, Power Platform, Viva, Planner, and Microsoft Forms.You will find thoroughly updated recipes for SharePoint Online, covering sites, lists, libraries, pages, web parts, and learn SharePoint Framework (SPFx) basics for building solutions. You will explore many Microsoft Teams recipes to prepare it to be your organization's central collaboration hub. You will be able to unlock Power Platform potential with recipes for Power Apps to enable low-code/no-code app development and learn to automate tasks with Power Automate and Power Automate Desktop. The book teaches you data visualization with Power BI, and chatbot creation with Power Virtual Agents (Copilot Studio). Finally, you will also learn about the cutting-edge Copilot and Gen AI functionality in Microsoft 365 and Power Platform. By the end, you will be equipped with skills to effectively use Microsoft 365, SharePoint Online, and the Power Platform.Whether it's enhancing career prospects or improving business operations, this book is a perfect companion on your journey through the Microsoft Office 365 suite.What you will learn- Collaborate effectively with SharePoint, Teams, OneDrive, Delve, Search, and Viva- Boost creativity and productivity with Microsoft Copilot- Develop and deploy custom applications using Power Apps- Create custom bots using Power Virtual Agents (Copilot Studio)- Integrate with other apps, automate workflows and repetitive processes with Power Automate/Desktop (RPA)- Design reports and engaging dashboards with Power BI- Utilize Planner, To Do, and gather feedback with polls and surveys in Microsoft Forms- Experience seamless integration in the mobile platforWho this book is forThis cookbook caters to professionals stepping into the world of Microsoft 365 and SharePoint Online. It is tailored for a broad spectrum of skillsets including general business professionals, IT administrators, and enterprise architects who are newcomers to Microsoft 365, offering valuable insights for establishing a contemporary, digital workplace effectively.Table of Contents- Overview of Microsoft 365- Introduction to SharePoint Online- Modern Sites in SharePoint Online- Lists and Libraries in SharePoint Online- Document Management in SharePoint Online- OneDrive- Microsoft Teams- Power Automate (Microsoft Flow)- Creating Power Apps- Applying Power Apps- Power BI- Overview of Copilot in Microsoft 365 and Power Platform- Term Store and Content Types in SharePoint Online- Search in Microsoft 365- Microsoft Delve(N.B. Please use the Read Sample option to see further chapters)

  • af Veena Grover
    441,95 kr.

    Examine the synergistic possibilities of combining blockchain, IoT, and AI technologies in supply chain management. This book will address the difficulties and possibilities of integrating these technologies and offer helpful implementation advice.The current state of supply chain management involves several challenges, including lack of transparency, limited visibility into product movements, inefficient inventory management, and difficulty in tracking and tracing products. Blockchain, IoT, and AI can potentially address some of these challenges and improve supply chain management.To help illustrate this, case studies and actual instances of businesses implementing or experimenting with blockchain, IoT, and AI technology in their supply chains are included in the book. Yoüll review helpful advice on implementation and highlight successful deployments, lessons learned, and the impact of these technologies on supply chain visibility, agility, sustainability, and customer experience. This book further elaborates the fundamental concepts of AI and ML algorithms and demonstrates how AI can process enormous volumes of supply chain data to produce actionable insights, improve inventory control, forecast demand, and increase forecasting precision.This collective work will serve as a comprehensive guide for supply chain professionals, researchers, and technology enthusiasts interested in understanding the potential of blockchain, IoT, and AI technologies in revolutionizing supply chain management practices.What You Will LearnDiscuss the evolving landscape of technology, potential advancements, and how Blockchain, IoT, and AI can shape the future of supply chainsGain Insight into upcoming developments and prepare for changing dynamics of the industryUnderstand intricate details of blockchain, IoT, and AI Technologies in real-life scenariosWho Is This Book ForIndustry Professionals working in the domain of supply chain management who would be interested in understanding how these technologies can enhance efficiency, transparency, and optimization in their supply chains.

  • af Shui Yu
    1.318,95 kr.

    In this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. The book offers an essential overview for researchers who are new to the field, while also equipping them to explore this ¿uncharted territory.¿ For each topic, the authors first present the key concepts, followed by the most important issues and solutions, with appropriate references for further reading. The book is self-contained, and all chapters can be read independently. It offers a valuable resource for master¿s students, upper undergraduates, Ph.D. students, and practicing engineers alike.

  • af Raghu Boddu
    580,95 kr.

    A practical guide to deploying, managing, and leveraging the power of Microsoft's unified security solutionKey Features- Learn how to leverage Microsoft's XDR and SIEM for long-term resilience- Explore ways to elevate your security posture using Microsoft Defender tools such as MDI, MDE, MDO, MDA, and MDC- Discover strategies for proactive threat hunting and rapid incident response- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionTired of dealing with fragmented security tools and navigating endless threat escalations? Take charge of your cyber defenses with the power of Microsoft's unified XDR and SIEM solution.This comprehensive guide offers an actionable roadmap to implementing, managing, and leveraging the full potential of the powerful unified XDR + SIEM solution, starting with an overview of Zero Trust principles and the necessity of XDR + SIEM solutions in modern cybersecurity. From understanding concepts like EDR, MDR, and NDR and the benefits of the unified XDR + SIEM solution for SOC modernization to threat scenarios and response, you'll gain real-world insights and strategies for addressing security vulnerabilities. Additionally, the book will show you how to enhance Secure Score, outline implementation strategies and best practices, and emphasize the value of managed XDR and SIEM solutions. That's not all; you'll also find resources for staying updated in the dynamic cybersecurity landscape.By the end of this insightful guide, you'll have a comprehensive understanding of XDR, SIEM, and Microsoft's unified solution to elevate your overall security posture and protect your organization more effectively.What You Will Learn- Optimize your security posture by mastering Microsoft's robust and unified solution- Understand the synergy between Microsoft Defender's integrated tools and Sentinel SIEM and SOAR- Explore practical use cases and case studies to improve your security posture- See how Microsoft's XDR and SIEM proactively disrupt attacks, with examples- Implement XDR and SIEM, incorporating assessments and best practices- Discover the benefits of managed XDR and SOC services for enhanced protectionWho this book is forThis comprehensive guide is your key to unlocking the power of Microsoft's unified XDR and SIEM offering. Whether you're a cybersecurity pro, incident responder, SOC analyst, or simply curious about these technologies, this book has you covered.CISOs, IT leaders, and security professionals will gain actionable insights to evaluate and optimize their security architecture with Microsoft's integrated solution. This book will also assist modernization-minded organizations to maximize existing licenses for a more robust security posture.Table of Contents- Introduction to Zero Trust- Introduction to XDR & SIEM- Microsoft Unified XDR and SIEM Solution- Power of Investigation and SOC Experience with Microsoft XDR + SIEM- Defend attacks with Microsoft XDR + SIEM- Security Misconfigurations & Vulnerability Management- Assess and Improve Secure Score- XDR implementation Strategy, Roadmap and Best Practices- Managed XDR & SIEM- Useful Resources & References

  • af Sharmin Rashid
    408,95 kr.

    O encaminhamento em redes de sensores multimédia sem fios é uma tarefa muito difícil. Neste artigo, propusemos uma técnica EETMRP (An Energy Efficient Tree Based Multipath Routing for WMSN's) que pretende fornecer uma transmissão fiável de dados para sincronização de dados no nó de destino com baixo consumo de energia. A EETMRP considera que todos os pacotes de áudio, imagem e dados escalares são distribuídos pelos nós que se encontram em diferentes caminhos possíveis entre a fonte e o sumidouro, proporcionalmente à sua energia residual e à intensidade do sinal recebido. O objetivo do EETMRP é atribuir mais cargas aos caminhos com maior energia e menos cargas aos caminhos com menor energia, de modo a garantir uma utilização uniforme dos recursos de todos os caminhos disponíveis. O objetivo do EETMRP é atribuir mais cargas às vias de maior energia e menos cargas às vias de menor energia, de modo a garantir uma utilização uniforme dos recursos de todas as vias disponíveis. Também nos concentrámos na falha do nó e no seu processo de recuperação durante a transmissão de pacotes e durante o início da transmissão de pacotes. Finalmente, propusemos um algoritmo baseado na nossa proposta para simular e analisar o protocolo de encaminhamento proposto.

  • af Rabiya Hanfi
    494,95 kr.

    Great amount of data is being accumulated very rapidly in the Internet era. Consequently, it takes a lot of time and effort to process these data for knowledge discovery and decision making. Compressed transaction data set methods is much better as compare to the other methods a more efficient approach, called Mining Merged Transactions with the Quantification Table (MMTQT) is proposed, which can compress the original database into a smaller one and perform the data mining process without the above problems.

  • af Sharmin Rashid
    408,95 kr.

    L'instradamento nelle reti di sensori multimediali wireless è un compito molto impegnativo. In questo lavoro abbiamo proposto una tecnica di Energy Efficient Tree Based Multipath Routing for WMSN's (EETMRP) che intende fornire una trasmissione affidabile dei dati per la sincronizzazione dei dati al nodo di destinazione con un basso consumo energetico. EETMRP prevede che tutti i pacchetti di dati audio, immagini e scalari vengano distribuiti sui nodi che si trovano su diversi percorsi possibili tra la sorgente e il sink, in proporzione alla loro energia residua e alla potenza del segnale ricevuto. L'obiettivo di EETMRP è quello di assegnare un maggior numero di carichi ai percorsi a più alta energia e un minor numero di carichi ai percorsi a più bassa energia, in modo da garantire un utilizzo uniforme delle risorse di tutti i percorsi disponibili. L'obiettivo di EETMRP è assegnare più carichi ai percorsi a più alta energia e meno carichi ai percorsi a più bassa energia, in modo da garantire un utilizzo uniforme delle risorse di tutti i percorsi disponibili. Ci siamo anche concentrati sul guasto del nodo e sul suo processo di recupero durante la trasmissione dei pacchetti e durante l'inizio della trasmissione dei pacchetti. Infine, abbiamo proposto un algoritmo basato sulla nostra proposta per simulare e analizzare il protocollo di routing proposto.

  • af Sharmin Rashid
    408,95 kr.

    Marshrutizaciq w besprowodnyh mul'timedijnyh sensornyh setqh qwlqetsq ochen' slozhnoj zadachej. V dannoj rabote my predlozhili änergoäffektiwnuü mnogoputewuü marshrutizaciü na osnowe derew'ew dlq WMSN (EETMRP), kotoraq dolzhna obespechit' nadezhnuü peredachu dannyh dlq sinhronizacii dannyh na uzle naznacheniq s nizkim potrebleniem änergii. EETMRP predpolagaet, chto wse pakety audio, izobrazhenij i skalqrnyh dannyh raspredelqütsq po uzlam, lezhaschim na razlichnyh wozmozhnyh putqh mezhdu istochnikom i stokom, proporcional'no ih ostatochnoj änergii i urownü prinimaemogo signala. Cel' EETMRP - raspredelit' bol'she nagruzki na puti s naibol'shej änergiej i men'she nagruzki na puti s men'shej änergiej, chtoby obespechit' rawnomernoe ispol'zowanie resursow wseh dostupnyh putej. Cel' EETMRP - raspredelit' bol'she nagruzki mezhdu naibolee änergichnymi putqmi i men'she nagruzki mezhdu menee änergichnymi putqmi, chtoby obespechit' rawnomernoe ispol'zowanie resursow wseh dostupnyh putej. My takzhe udelili wnimanie sboü uzla i processu ego wosstanowleniq wo wremq peredachi paketow i wo wremq nachala peredachi paketow.

  • af Sharmin Rashid
    408,95 kr.

    Le routage dans les réseaux de capteurs multimédias sans fil est une tâche très difficile. Dans cet article, nous avons proposé une technique de routage multivoies basée sur un arbre et économe en énergie pour les réseaux de capteurs multimédias sans fil (EETMRP) qui vise à fournir une transmission fiable des données pour la synchronisation des données au n¿ud de destination avec une faible consommation d'énergie. L'EETMRP prévoit que tous les paquets de données audio, d'images et de données scalaires sont répartis entre les n¿uds situés sur les différents chemins possibles entre la source et le puits, proportionnellement à leur énergie résiduelle et à l'intensité du signal reçu. L'objectif de l'EETMRP est d'attribuer plus de charges aux chemins les plus énergétiques et moins de charges aux chemins les moins énergétiques afin de garantir une utilisation uniforme des ressources sur tous les chemins disponibles. L'objectif de l'EETMRP est d'attribuer plus de charges aux chemins les plus énergétiques et moins de charges aux chemins les moins énergétiques afin d'assurer une utilisation uniforme des ressources de tous les chemins disponibles.

  • af Sharmin Rashid
    408,95 kr.

    Das Routing in drahtlosen Multimedia-Sensornetzwerken ist eine sehr anspruchsvolle Aufgabe. In diesem Papier schlagen wir eine energieeffiziente, baumbasierte Mehrweg-Routing-Technik für WMSNs (EETMRP) vor, die eine zuverlässige Übertragung von Daten für die Datensynchronisation am Zielknoten mit geringem Energieverbrauch ermöglichen soll. EETMRP sieht vor, dass alle Pakete mit Audio-, Bild- und Skalardaten auf die Knoten verteilt werden, die auf verschiedenen möglichen Pfaden zwischen der Quelle und der Senke liegen, und zwar im Verhältnis zu ihrer Restenergie und der empfangenen Signalstärke. Das Ziel von EETMRP ist es, den Pfaden mit der höchsten Energie mehr und den Pfaden mit der niedrigsten Energie weniger Last zuzuweisen, so dass eine gleichmäßige Auslastung aller verfügbaren Pfade gewährleistet werden kann. Das Ziel von EETMRP ist es, mehr Lasten den Pfaden mit der höchsten Energie und weniger Lasten den Pfaden mit der niedrigsten Energie zuzuweisen, so dass eine gleichmäßige Auslastung aller verfügbaren Pfade gewährleistet werden kann. Wir haben uns auch mit Knotenausfällen und deren Wiederherstellungsprozess während der Paketübertragung und beim Start der Paketübertragung beschäftigt. Schließlich haben wir einen Algorithmus vorgeschlagen, der auf unserem Vorschlag basiert, um unser vorgeschlagenes Routing-Protokoll zu simulieren und zu analysieren.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.