Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Khaled Salah Mohamed
    419,50 kr.

    This book covers various, leading-edge deep learning technologies. The author discusses new applications of deep learning and gives insight into the integration of deep learning with various application domains, such as autonomous driving, augmented reality, AIOT, 5G and beyond.

  • af Dong-Seong Kim
    1.990,95 kr.

    This informative text/reference presents a detailed review of the state of the art in fog computing paradigm. In particular, the book examines a broad range of important cooperative and distributed computation algorithms, along with their design objectives and technical challenges.The coverage includes the conceptual fundamental of fog computing, its practical applications, cooperative and distributed computation algorithms using optimization, swarm intelligence, matching theory, and reinforcement learning methods. Discussions are also provided on remaining challenges and open research issues for designing and developing the efficient distributed computation solutions in the next-generation of fog-enabled IoT systems.

  • af Joseph Migga Kizza
    630,95 kr.

  • af Dong Wang & Daniel 'Yue' Zhang
    1.793,95 kr.

    The rise of the Internet of Things (IoT) and Artificial Intelligence (AI) leads to the emergence of edge computing systems that push the training and deployment of AI models to the edge of networks for reduced bandwidth cost, improved responsiveness, and better privacy protection, allowing for the ubiquitous AI that can happen anywhere and anytime. Motivated by the above trend, this book introduces a new computing paradigm, the Social Edge Computing (SEC), that empowers human-centric edge intelligent applications by revolutionizing the computing, intelligence, and the training of the AI models at the edge. The SEC paradigm introduces a set of critical human-centric challenges such as the rational nature of edge device owners, pronounced heterogeneity of the edge devices, real-time AI at the edge, human and AI interaction, and the privacy of the edge users. The book addresses these challenges by presenting a series of principled models and systems that enable the confluence of the computing capabilities of devices and the domain knowledge of the people, while explicitly addressing the unique concerns and constraints from humans. Compared to existing books in the field of edge computing, the vision of this book is unique: we focus on the social edge computing (SEC), an emerging paradigm at the intersection of edge computing, AI, and social computing. This book discusses the unique vision, challenges and applications in SEC. To our knowledge, keeping humans in the loop of edge intelligence has not been systematically reviewed and studied in an existing book. The SEC vision generalizes the current machine-to-machine interactions in edge computing (e.g., mobile edge computing literature), and machine-to-AI interactions (e.g., edge intelligence literature) into a holistic human-machine-AI ecosystem.

  • af Hamid Jahankhani
    2.197,95 kr.

    This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning?The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education.The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.

  • af Neil Smyth
    383,95 kr.

    CentOS Stream 9 Essentials is intended to provide detailed information on the installation, use, and administration of the CentOS 9 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates using App Streams. Additional installation topics, such as dual booting with Microsoft Windows, are also covered, together with all important security topics, such as configuring a firewall and user and group administration.For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers, and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.

  • af Longbo Huang
    570,95 kr.

    This book introduces the Learning-Augmented Network Optimization (LANO) paradigm, which interconnects network optimization with the emerging AI theory and algorithms and has been receiving a growing attention in network research. The authors present the topic based on a general stochastic network optimization model, and review several important theoretical tools that are widely adopted in network research, including convex optimization, the drift method, and mean-field analysis. The book then covers several popular learning-based methods, i.e., learning-augmented drift, multi-armed bandit and reinforcement learning, along with applications in networks where the techniques have been successfully applied. The authors also provide a discussion on potential future directions and challenges.

  • af Klaus-Werner Schröder
    336,95 kr.

    Ein qualifiziertes Management der Informationssicherheit ist heutzutage für jede Organisation unverzichtbar. Die Normenreihe ISO 27000 ist dabei ein anerkannter ¿Wegweiser¿ zu diesem Ziel. Im internationalen Kontext ist ihre Erfüllung für viele Organisationen ein wichtiger Wettbewerbsfaktor. Auch in Deutschland hat diese Normenreihe Eingang in Vorgaben, Regelungen und Gesetze zum Thema Informationssicherheit gefunden.Das vorliegende Buch kommentiert vor diesem Hintergrund die aktuellen Normen ISO 27001 und ISO 27002 (Ausgabe 2022/2023): Nach einer Einführung in die Normenreihe und ihren Fachbegriffen werden die Anforderungen an das Managementsystem für Informationssicherheit (ISMS) detailliert erklärt und mit zahlreichen Hinweise zur Umsetzung versehen. Im Anhang der ISO 27001 sind die sog. Controls aufgeführt, die in der neuen Normfassung komplett umstrukturiert und an vielen Stellen geändert wurden. Das Buch behandelt ausführlich alle Controls und gibt viele Beispiele für ihre Anwendung.Mit dem Erscheinen der neuen Normfassungen müssen sich viele Organisationen entsprechend umstellen ¿ nicht zuletzt auch im Zusammenhang mit Zertifizierungen. Das Buch bietet hier einen ausführlichen Fahrplan zur Migration auf die neuen Normen.

  • af Xiao-Zhi Gao, Siba K. Udgata & Srinivas Sethi
    2.413,95 - 2.423,95 kr.

  • af Muneo Hori
    2.148,95 kr.

    With the continued improvements in computing power and digital information availability, we are witnessing the increasing use of high-performance computers to enhance simulations for the forecasting of hazards, disasters, and responses. This major reference work summarizes the theories, analysis methods, and computational results of various earthquake simulations by the use of supercomputers. It covers simulations in the fields of seismology, physical geology, earthquake engineering - specifically the seismic response of structures - and the socioeconomic impact of post-earthquake recovery on cities and societies. Individual chapters address phenomena such as earthquake cycles and plate boundary behavior, tsunamis, structural response to strong ground motion, and post-disaster traffic flow and economic activity. The methods used for these simulations include finite element methods, discrete element methods, smoothed particle hydrodynamics, and multi-agent models, among others.The simulations included in this book provide an effective bird's-eye view of cutting-edge simulations enhanced with high-performance computing for earthquake occurrence, earthquake damage, and recovery from the damage, combining three of the major fields of earthquake studies: earth science, earthquake engineering, and disaster-mitigation-related social science. The book is suitable for advanced undergraduates, graduates, and researchers in these fields.

  • af Jennifer Martin
    113,95 kr.

    "Unlock the full potential of Google Business Profile and skyrocket your website's visibility with 'How to Use Google Business Profile for SEO.' In the digital age, a solid online presence is crucial for any business to thrive, and with Google Business Profile becoming an indispensable tool, understanding its power is paramount.In this comprehensive guide, SEO expert Jennifer Martin reveals proven strategies and insider tips to leverage Google Business Profile effectively and boost your search engine rankings. Whether you're a small business owner, an aspiring entrepreneur, or a seasoned marketer, this book is your ultimate companion to harness the true potential of this invaluable platform.Inside 'How to Use Google Business Profile for SEO, ' you'll find step-by-step instructions on how to set up and optimize your profile, ensuring that it grabs the attention of potential customers. From crafting compelling descriptions, selecting the correct categories to manage reviews, and utilizing Google Posts, you'll discover the key elements that will make your business stand out.But this book continues beyond the basics. It delves deeper into advanced SEO techniques, providing invaluable insights on making the most of Google Business Profile's features. Learn how to enhance your local SEO by leveraging location data, optimizing your website for voice search, and leveraging Google Analytics to track and analyze your profile's performance.With 'How to Use Google Business Profile for SEO' as your guide, you'll be equipped to build a solid online presence, attract more customers, and drive targeted Traffic to your website. Packed with real-life examples, case studies, and practical advice, this book gives you the knowledge and tools you need to succeed in the competitive online landscape.Keep your business from getting lost in the vast ocean of search results. Take control of your online presence and harness the power of Google Business Profile to propel your business to new heights. Whether you're a local brick-and-mortar store or an e-commerce giant, this book is your ultimate roadmap to success in the digital age. *** Use Google Business Profile- it's Completely Free. Take advantage and leverage this Free Google tool to help you rank on Google and Drive more Traffic and business***How Google Business Profile helps local SEO: Increases online visibility for local searches.Improves local search rankings on Google.Enhances the chances of appearing in the Local Pack.Boosts organic search traffic to your website.Increases credibility and trust among potential customers.Helps customers find your business quickly and easily.Provides accurate and up-to-date business information.Allows customers to leave reviews and ratings.Allows you to publish regular updates and promotions.Provides insights into customer engagement and behavior.Increases click-through rates (CTRs) for local searches.Supports mobile optimization for local mobile searches.Builds trust through high-quality customer testimonials.Integrates with Google My Business Insights for data analysis.Helps to stand out from competitors in local searches.Improves local search results on Google Maps.Assists in managing multiple locations under one account.Supports optimization for voice searches.Increases the likelihood of being featured in Google's "Local Carousel."Google Business Profile can significantly impact your local SEO efforts and improve your online visibility to attract more customers.

  • af Sérgio Ivan Lopes
    714,95 kr.

    This book constitutes the jointly proceedings of the 3rd International Conference on Intelligent Edge Processing in the IoT Era, Edge-IoT 2022, and the 4th International Conference on Smart Governance for Sustainable Smart Cities, SmartGov 2022. Both conferences were held online due to COVID-19 pandemic in November 2022, held as virtual events, in November 16-18, 2022.The 12 full papers were selected from 31 submissions. SmartGov 2022 was to promote the development of secure and sustainable smart cities with smart governance, while the theme of Edge-IoT 2022 was to address the decentralization of contemporary processing paradigms, notably Edge processing, focusing on the increasing demand for intelligent processing at the edge of the network, which is paving the way to the Intelligent IoT Erä. Both the EAI SmartGov 2022 and EAI Edge-IoT 2022 conferences were co-located with EAI SmartCity360 international convention.The papers are organized in the following topical sections: Edge-IoT Applications; IoT Architectures, Forecasting and Adversarial Training; Artificial Intelligence and Machine Learning for smart governance; and Smart Transportation.

  • af Muhammad Moid Sandhu
    1.600,95 kr.

    This book covers cutting edge advancements on self-powered Internet of Things, where sensing devices can be energy-positive while capturing context from the physical world. It provides new mechanisms for activity recognition without the need of conventional inertial sensors, which demand significant energy during their operation and thus quickly deplete the batteries of internet-of-things (IoT) devices. The book offers new solutions by employing energy harvesters as activity sensors as well as power sources to enable the autonomous and self-powered operation of IoT devices without the need of human intervention. It provides useful content for graduate students as well as researchers to understand the nascent technologies of human activity, fitness and health monitoring using autonomous sensors. In particular, this book is very useful for people working on pervasive computing, activity recognition, wearable IoT, fitness/healthcare and autonomous systems.This book covers a broad range of topics related to self-powered activity recognition. The main topics of this book include wearables, IoT, energy harvesting, energy harvesters as sensors, activity recognition and self-powered operation of IoT devices. This book starts with the introduction of wearable IoT devices and activity recognition and then highlights the conventional activity recognition mechanisms. After that, it describes the use of energy harvesters to power the IoT devices. Later, it explores the use of various energy harvesters as activity sensors. It also proposes the use of energy harvesters as simultaneous source of energy and context information and defines the emerging concept of energy-positive sensing compared to conventional energy-negative sensing. Finally, it explores sensor/signal fusion to enhance the performance using multiple energy harvesters and charts a way forward for future research in this area. This book covers all important and emerging topics that have significance in the design and implementation of autonomous wearable IoT devices. We believe that this book will lay the foundation for designing self-powered IoT devices which can ultimately replace the conventional wearable IoT devices which need regular recharging and replacement.

  • - Building Cloud Native Applications
    af Sebastien Goasguen & Michael Hausenblas
    524,95 kr.

    Kubernetes is becoming the de-facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, youll learn hands-on recipes for automating the deployment, scaling, and operations of application containers across clusters of hosts.The book's easy-lookup problem-solution-discussion format helps you find the detailed answers you needquickly. Kubernetes lets you deploy your applications quickly and predictably, so you can efficiently respond to customer demand. This cookbook, ideal for developers and system administers alike, provides the essential knowledge you need to get there.Youll find recipes for:Kubernetes installationKubernetes API, API groupsApplication primitivesMonitoringTroubleshooting

  • af Bryan Christiansen & Festus Fatai Adedoyin
    2.153,95 - 2.828,95 kr.

  • af Pnina Soffer
    618,95 kr.

    This book constitutes the thoroughly refereed proceedings of the international workshops associated with the 35th International Conference on Advanced Information Systems Engineering, CAiSE 2023, which was held in Zaragoza, Spain, during June 12-16, 2023.The workshops included in this volume are:· 1st International Workshop on Hybrid Artificial Intelligence and Enterprise Modelling for Intelligent Information Systems (HybridAIMS)· 1st Workshop on Knowledge Graphs for Semantics-Driven Systems Engineering (KG4SDSE)· Blockchain and Decentralized Governance Design for Information Systems (BC4IS and DGD)They reflect a broad range of topics and trends ranging from blockchain technologies via digital factories, ethics, and ontologies, to the agile methods for business and information systems. The theme of this year¿s CAiSE was ¿Cyber-Human Systems¿.The 10 full papers and 9 short paper presented in this book were carefully reviewed and selected from 25 submissions.

  • af Anand Paul, Anand Nayyar & Sudeep Tanwar
    1.592,95 - 1.601,95 kr.

  • af Shyamapada Mukherjee
    1.300,95 - 1.796,95 kr.

    This book highlights the connections between two technologies: artificial intelligence (AI) and Internet of things (IoT). It presents the application of these two technologies to solve various societal problems related to healthcare, agriculture, green environment, renewable energies, smart cities, etc. Each chapter in this book presents novel solutions to these problems along with the challenges in the application of AI and IoT to solve them. It discusses the adverse attacks on machine Learning models and how to protect sensitive data over the IoT networks. It also includes the security issues in IoT and their possible solutions.

  • af O¿uzhan Kara
    643,95 kr.

    Learn 5G network design and implement advanced apps using standalone, non-standalone, and private 5G networks with expert guidance from industry leadersPurchase of the print or kindle book includes a free eBook in the PDF formatKey Features:Gain a comprehensive understanding of the 5G end-to-end network architectureBuild a foundation to successfully design, implement, manage, and monetize a 5G networkDesign and deploy innovative applications based on 5G networksBook Description:We are living in an era where ultra-fast internet speed is not a want, but a necessity. As applications continue to evolve, they demand a reliable network with low latency and high speed. With the widespread commercial adoption of driverless cars, robotic factory floors, and AR/VR-based immersive sporting events, speed and reliability are becoming more crucial than ever before. Fortunately, the power of 5G technology enables all this and much more.This book helps you understand the fundamental building blocks that enable 5G technology. You'll explore the unique aspects that make 5G capable of meeting high-quality demands, including technologies that back 5G, enhancements in the air interface, and packet core which come together to create a network with unparalleled performance. As you advance, you'll discover how to design and implement both 5G macro and private networks, while also learning about the various design and deployment options available and which option is best suited for specific use cases. After that, you'll check out the operational and maintenance aspects of such networks and how 5G works together with fixed wireline and satellite technologies.By the end of this book, you'll understand the theoretical and practical aspects of 5G, enabling you to use it as a handbook to establish a 5G network.What You Will Learn:Understand the key aspects and methodology of 5G New Radio and NG-RANGet to grips with Voice over New Radio (VoNR) networksGet started with 5G radio planning along with the 5G air interfaceTake a deep dive into the 5G core network and explore the overall 5G network architectureGain a clear understanding of various 5G deployment optionsExplore network slicing and the role it plays in 5GGet an overview of 5G fixed mobile convergence, autonomous vehicles, and satellite communicationsWho this book is for:If you are a telecom enthusiast or work in this domain and are looking to learn more about building a 5G network bottom-up or an application modernization strategy maker, then this book is for you. It provides a consumable understanding of the technology to network engineers, network architects, and infrastructure decision-makers, helping them excel in their day-to-day work involving 5G technology.

  • af Safeer Cm
    488,95 kr.

    Get up and running with serverless workloads across AWS, Azure, GCP, Kubernetes, and virtual machines with real-life examples and best practices for design, development, and security of serverless applicationsPurchase of the print or Kindle book includes a free PDF eBookKey Features:Learn with DIY projects and step-by-step instructions for different serverless technologies and vendorsExplore detailed sections on running serverless workloads across Kubernetes and virtual machinesDiscover Cloudflare Serverless Solutions to modernize your web applicationsBook Description:Serverless computing has emerged as a mainstream paradigm in both cloud and on-premises computing, with AWS Lambda playing a pivotal role in shaping the Function-as-a-Service (FaaS) landscape. However, with the explosion of serverless technologies and vendors, it has become increasingly challenging to comprehend the foundational services and their offerings.Architecting Cloud Native Serverless Solutions lays a strong foundation for understanding the serverless landscape and technologies in a vendor-agnostic manner. You'll learn how to select the appropriate cloud vendors and technologies based on your specific needs. In addition, you'll dive deep into the serverless services across AWS, GCP, Azure, and Cloudflare followed by open source serverless tools such as Knative, OpenFaaS, and OpenWhisk, along with examples. You'll explore serverless solutions on Kubernetes that can be deployed on both cloud-hosted clusters and on-premises environments, with real-world use cases. Furthermore, you'll explore development frameworks, DevOps approaches, best practices, security considerations, and design principles associated with serverless computing.By the end of this serverless book, you'll be well equipped to solve your business problems by using the appropriate serverless vendors and technologies to build efficient and cost-effective serverless systems independently.What You Will Learn:Understand the serverless landscape and its potentialBuild serverless solutions across AWS, Azure, and GCPDevelop and run serverless applications on KubernetesImplement open source FaaS with Knative, OpenFaaS, and OpenWhiskModernize web architecture with Cloudflare ServerlessDiscover popular serverless frameworks and DevOps for serverlessExplore software design and serverless architecture patternsAcquire an understanding of serverless development and security best practicesWho this book is for:This book is for DevOps, platform, cloud, site reliability engineers, or application developers looking to build serverless solutions. It's a valuable reference for solution architects trying to modernize a legacy application or working on a greenfield project. It's also helpful for anyone trying to solve business or operational problems without wanting to manage complicated technology infrastructure using serverless technologies. A basic understanding of cloud computing and some familiarity with at least one cloud vendor, Python programming language, and working with CLI will be helpful when reading this book.

  • af Marco Fanti
    388,95 kr.

    Avoid MFA pitfalls-learn how to choose, implement, and troubleshoot MFA in your companyPurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain proficiency in using solutions like Okta, Ping Identity, and ForgeRock within the IAM domainThwart authentication breaches using pragmatic strategies and lessons derived from real-world scenariosChoose the right MFA solutions to enhance your organization's securityBook Description:MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience.You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with how MFA works and the various types of solutions currently available. As you progress through the chapters, you'll learn how to choose the proper MFA setup to provide the right combination of security and user experience. The book then takes you through methods hackers use to bypass MFA and measures to safeguard your applications. After familiarizing yourself with enabling and managing leading cloud and on-premise MFA solutions, you'll see how MFA efficiently curbs cyber threats, aided by insights from industry best practices and lessons from real-world experiences. Finally, you'll explore the significance of innovative advancements in this domain, including behavioral biometrics and passkeys.By the end of the book, you'll have the knowledge to secure your workforce and customers, empowering your organization to combat authentication fraud.What You Will Learn:Evaluate advantages and limitations of MFA methodsWork with advanced authentication methods including passkeys and WebAuthnImplement and fine-tune popular cloud-based and on-premises solutionsChoose the best MFA solution for your security needsReduce UX friction with behavioral biometricsStay informed about technologies and future trends in the fieldWho this book is for:This book is for developers, system administrators, security professionals, white-hat hackers, CISOs, and anyone interested in understanding and enhancing their access management infrastructure. While basic knowledge of authentication and IAM is helpful, it is not a prerequisite.

  • af Anders Lisdorf
    493,95 kr.

    We are at the threshold of a new area of the internet that promises to transform the way we engage financially and take the power of data and privacy back from big corporations and give it to the individual through decentralization. This is sometimes called Web 3.0. While Web 1.0 transformed information sharing and commerce and brought us giants like Google and Amazon and Web 2.0 unlocked the social potential of the internet and created Facebook, Twitter, and Snapchat, exactly what will come of Web 3.0 remains to be seen.It is indisputable that the seed of Web 3.0 is the technological, social, and economic innovations that came together in Bitcoin and the blockchain technology it created. But where the first web iterations were relatively straightforward to understand, the inner workings of Web 3.0 remain more opaque and shrouded in mystique. Current voices on Bitcoin and the blockchain revolution fall squarely into one of two camps; either technological ¿experts¿ who are all also invariably personally invested in the success of Bitcoin and the blockchain or ¿critics¿ who are typically deeply invested in the status quo and the failure of Bitcoin and blockchain. It seems like there is a need for a middle ground to provide the public with a more unbiased view of this important technology. This book therefore aims to unveil some of the mystique and show how to unlock the potential of the blockchain revolution in a manner that does not dismiss out of hand even radical and outlandish ideas nor jumps on the bandwagon of hailing Bitcoin and the blockchain as the answer to all problems.What yoüll learnThe nature of blockchain technology, how it works and what it does.The history of the technological developments that lead to the blockchain.A historical analysis of who the likely creator of Bitcoin is.How bitcoin and cryptocurrencies fit in the history of human exchange.The nature and history of electronic money.How blockchain technology solves problems in a novel way and what it cannot be used for.What web 3.0 could be.Who This Book Is ForThis book is for a general non-technical audience trying to understand the difficult and complex nature of blockchain and cryptocurrencies and the contours of the Web 3.0 revolution.

  • af Jaspreet Bagga
    493,95 kr.

    Discover the power of SAP Integration Suite's capabilities with this hands-on guide. Learn how this integration platform (iPaaS) can help you connect and automate your business processes with integrations, connectors, APIs, and best practices for a faster ROI. Over the course of this book, you will explore the powerful capabilities of SAP Integration Suite, including API Management, Open Connectors, Integration Advisor, Trading Partner Management, Migration Assessment, and Integration Assessment. With detailed explanations and real-world examples, this book is the perfect resource for anyone looking to unlock the full potential of SAP Integration Suite. With each chapter, you'll gain a greater understanding of why SAP Integration Suite can be the proverbial swiss army knife in your toolkit to design and develop enterprise integration scenarios, offering simplified integration, security, and governance for your applications. Author Jaspreet Bagga demonstrates howto create, publish, and monitor APIs with SAP API Management, and how to use its features to enhance your API lifecycle. He also provides a detailed walkthrough of how other capabilities of SAP Integration Suite can streamline your connectivity, design, development, and architecture methodology with a tool-based approach completely managed by SAP. Whether you are a developer, an architect, or a business user, this book will help you unlock the potential of SAP's Integration Suite platform, API Management, and accelerate your digital transformation. What You Will Learn Understand what APIs are, what they are used for, and why they are crucial for building effective and reliable applicationsGain an understanding of SAP Integration Suite's features and benefits Study SAP Integration assessment process, patterns, and much moreExplore tools and capabilities other than the Cloud Integration that address the full value chain of the enterprise integration components Who This Book Is ForWeb developers and application leads who want to learn SAP API Management.

  • af Dominika Duziak
    337,95 kr.

    Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality. This book showcases examples of blockchain-based solutions implemented in different industries and connects them to use cases in hospitality and tourism (disintermediation, payments, loyalty programs, supply chain management, identity management etc.). Blockchain is one of the disruptive technologies that lays foundations for Web3.0, NFTs, Metaverse and other innovations. Despite many benefits, its adoption in the hospitality industry is very slow. Lack of awareness and connection to clear return-on-investment, coupled with many misconceptions and general perception of complexity is one of the main reasons why hospitality managers are reluctant to embark on the blockchain train.Blockchain for Hospitality and Tourism serves as a practical guide to the world of innovations, from the basics of blockchain to ¿how to start a project¿ with brief explanations of different technologies and capabilities. You'll review NFTs and Metaverse, along with current developments, tools, and platforms. After reading this book, you'll be equipped with enough knowledge to make strategic business decisions and able to discuss these topics within your organization and with vendors and suppliers in a comfortable way. As blockchain enters the next phase of its evolution, with more user-friendly interfaces and interoperability, see how it opens a world of opportunities in the space of tourism and hospitality. What You'll LearnBlockchain-based innovations ¿ cryptocurrencies and digital asset management, NFTs, Web3.0, Metaverse)Review applications of blockchain in selected industries Start a blockchain project Who This Book is ForHospitality professionals, including hotel managers and general managers, revenue management directors, operations directors, hotel IT managers, asset managers, brand strategy managers, marketing managers. Hospitality students will benefit as well. ·

  • af Erwin Medina
    529,95 kr.

    This book provides a comprehensive learning journey aimed at helping you master Ansible and efficiently automate a range of enterprise network devices, such as routers, switches, firewalls, Wireless LAN Controller (WLC), and Linux servers. Introduction to Ansible Network Automation combines the fundamentals of three books into one, covering basics of Linux administration, Ansible concepts, and Ansible network automation.Authors Brendan Choi and Erwin Medina have created a structured learning path that starts with the fundamentals and allows you to progressively enhance your skill sets with each chapter. Part I serves as an Ansible primer, guiding you through Linux basics using WSL on Windows 11 and assisting in the setup of your learning environment. Part II covers essential Ansible concepts through practical lab activities involving four Linux servers. In Part III, you will learn how to apply your Linux skills from Part I and the concepts from Part II to real-world scenarios by creating Ansible automation YAML scripts.What sets this book apart is its unique focus on Ansible and Network Automation, combined with a strong emphasis on understanding Linux. It is specifically designed for novice network automation engineers and students, assuming no prior Linux expertise, and provides first-hand experience starting from scratch. It also offers practical insights by sharing real-life examples of Ansible playbooks derived from production enterprise infrastructure, allowing you to gain an understanding of how Ansible can be effectively applied in real-world enterprise network environments. Upon completion of this book, you will have developed foundational skills in Ansible network automation and general Linux administration, and will understand how to apply this newly acquired knowledge to real-life scenarios. What You Will LearnDevelop a comprehensive understanding of Ansible and its essentialconcepts for automating enterprise network devices and applying them to real-world scenariosMaster the basics of Ansible operations within Linux automation and progress to applying Ansible concepts specifically to network device automationExecute Ansible ad-hoc commands and playbooks for a range of network operational tasks, including configuration management, software and system updates, and upgradesWork with real-life examples of Ansible playbooks derived from actual enterprise infrastructure, gaining practical experience in writing Ansible YAML scriptsAcquire the skills to automate network operations using Ansible, streamline network management processes, and replace manual-driven tasks with directives in Ansible playbooks Who is This Book ForNetwork, security, UC and systems engineers, as well as technical leaders, IT managers and network students.

  • af Klaas Jung
    217,95 kr.

    Crypto is going to change the world, and for those tired of confusing financial jargon and complicated technical terminology, look no further. This book demystifies the world of cryptocurrencies and blockchain technology and explains in accessible language how it will affect your daily life. In The Quiet Crypto Revolution, Klaas Jung dives beneath the surface of Bitcoin to explore the engine that powers it - blockchain. Far surpassing the confines of cryptocurrencies, blockchain's potential for wide-ranging applications is enormous. It's crucial to understand that cryptocurrencies are merely a single manifestation of blockchain's capabilities. This book casts light on the broader spectrum of blockchain applications and the exciting future of this groundbreaking technology. With a focus on real-world applications, you'll gain a deeper understanding of the key concepts behind the innovative technology of blockchain, equipping you to make informed decisions. Whether you're a tech-savvy individual or a complete newcomer to the world of crypto and finance, this book will arm you with the knowledge and insights you need to understand the impact cryptocurrency and blockchain will have on your future.You WillLook at the future of blockchain technologyReview potential use cases for blockchain beyond cryptocurrencyStudy security strategies to avoid scams in the crypto spaceWho This Book Is ForBeginners who would like to gain a better understanding of cryptocurrency and the technology that supports it.

  • af Maurice Naftalin & Philip Wadler
    367,95 - 598,95 kr.

    This comprehensive guide shows you how to master the most importantchanges to Java since it was first released. Generics and the greatlyexpanded collection libraries have tremendously increased the power ofJava 5 and Java 6. But they have also confused many developers whohaven't known how to take advantage of these new features.Java Generics and Collections covers everything from the mostbasic uses of generics to the strangest corner cases. It teaches youeverything you need to know about the collections libraries, so you'llalways know which collection is appropriate for any given task, andhow to use it.Topics covered include:Fundamentals of generics: type parameters and generic methodsOther new features: boxing and unboxing, foreach loops, varargsSubtyping and wildcardsEvolution not revolution: generic libraries with legacy clients andgeneric clients with legacy librariesGenerics and reflectionDesign patterns for genericsSets, Queues, Lists, Maps, and their implementationsConcurrent programming and thread safety with collectionsPerformance implications of different collectionsGenerics and the new collection libraries they inspired take Java to anew level. If you want to take your software development practice toa new level, this book is essential reading.Philip Wadler is Professor of Theoretical Computer Science at theUniversity of Edinburgh, where his research focuses on the design ofprogramming languages. He is a co-designer of GJ, work thatbecame the basis for generics in Sun's Java 5.0.Maurice Naftalin is Technical Director at Morningside Light Ltd., a software consultancy in the United Kingdom. He has most recently served as an architect and mentor at NSB Retail Systems plc, and as the leader of the client development team of a major UK government social service system."e;A brilliant exposition of generics. By far the best book on thetopic, it provides a crystal clear tutorial that starts with thebasics and ends leaving the reader with a deep understanding of boththe use and design of generics."e;Gilad Bracha, Java Generics Lead, Sun Microsystems

  • af Joel Marsh
    395,95 kr.

    Many UX designers are surprised to learn that much of the job isn't about drawing things. It's about knowing what to draw and how to convince people to build it. Whether you're a one-person design team making products from scratch or a C-level product leader managing many products and strategies, UX for Business is your missing guide to real-world business design. You'll not only learn how to think about design as a professional but also discover how design can move the needle for your entire company. Author Joel Marsh helps you understand stakeholders, business models, the process of designing valuable solutions, dangerous choices that can ruin a product, and how to gain the attention your work deserves. You'll also explore the principles of designing common types of digital products and services, from portfolio sites to social networks to ecosystems. With this book, you'll learn: How to design the right things by understanding value, diagnostics, and probability How to conduct UX research and analysis without the luxury of time or money The most important aspects of common digital business models Methods for getting things done under less-than-ideal circumstances How to avoid common pitfalls caused by inexperience

  • - Best Practices for Securing Infrastructure
    af Lee Brotherston & Amanda Berlin
    598,95 kr.

    Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations dont have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

  • af Ev Kontsevoy
    365,95 kr.

    "Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider."--

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.