Vi bøger
Levering: 1 - 2 hverdage
Filter
Filter
Sorter efterSorter Populære
  • af Tom Uoll
    625,95 kr.

    Po mere togo kak IKT i sistemy obrabotki dannyh stanowilis' wse bolee obshirnymi i powsemestnymi, shiroko rasprostranilas' topologiq raspredelennogo klienta/serwera dlq udowletworeniq potrebnostej biznesa i personal'nyh wychislenij. Standartnoe podklüchenie tipichnoj rabochej stancii stroitsq na baze personal'nogo komp'ütera, swqzannogo s gruppoj lokal'nyh uzlow i serwerow (lokal'naq wychislitel'naq set'), a takzhe cherez wneshnee podklüchenie k mnogochislennym resursam Interneta po wsemu miru. Jeta model' obespechiwaet rabotnikam sfery znanij i chastnym pol'zowatelqm IKT-sistem bystryj i äffektiwnyj dostup ko wsemu spektru IKT-uslug, sozdawaq global'nyj uzel pol'zowatelej komp'üterow w rezhime onlajn i wybrannyh imi IKT-reshenij i uslug. Odnako nekotorye komponenty IKT-reshenij (wklüchaq kriticheski wazhnye dannye i wychislitel'nuü moschnost') podwerzheny sluchajnym kontaktam i risku wmeshatel'stwa, neprawil'nogo ispol'zowaniq i krazhi iz-za nizkih standartow bezopasnosti. Krome togo, ustrojstwa "klient-serwer" potreblqüt chrezmernoe kolichestwo änergii, chto priwodit k uhudsheniü äkologicheskih harakteristik do milliarda rabochih stancij po wsemu miru. Nadezhnaq sinergiq nowyh tehnologij - wirtualizacii, tonkogo klienta i usowershenstwowannogo soedineniq Remote (RCP) - teper' mozhet znachitel'no uluchshit' ätu model'.

  • af Tom Wall
    625,95 kr.

    Les TIC et les systèmes de traitement des données étant devenus de plus en plus étendus et omniprésents, l'adoption d'une topologie client/serveur distribuée s'est généralisée pour répondre aux besoins informatiques des entreprises et des particuliers. La connectivité standard d'un poste de travail typique s'articule autour d'un ordinateur personnel relié à un groupe désigné de n¿uds et de serveurs locaux (réseau local) et, via une connexion externe, à une myriade de ressources Internet dans le monde entier. Ce modèle permet au travailleur du savoir et à l'utilisateur privé de systèmes TIC d'accéder facilement et efficacement à une gamme complète de services TIC, créant ainsi un lien mondial entre les utilisateurs d'ordinateurs en ligne et les solutions et services TIC qu'ils ont choisis. Cependant, certains composants de la solution TIC (y compris les données critiques et la puissance de traitement) sont exposés à des contacts fortuits et à des risques d'interférence, d'utilisation abusive et de vol en raison de normes de sécurité insuffisantes. En outre, les unités client/serveur consomment trop d'énergie, ce qui nuit aux performances écologiques de près d'un milliard de postes de travail dans le monde. Une synergie fiable de technologies nouvellement disponibles - virtualisation, client léger et interconnexion à distance améliorée (RCP) - peut désormais améliorer ce modèle de manière significative.

  • af Rob Botwright
    385,95 kr.

    ¿¿¿¿ ACTIVE DIRECTORY NETWORK MANAGEMENT BUNDLE ¿¿¿¿Are you ready to become a master of Active Directory? Look no further! Our comprehensive book bundle has everything you need to excel in managing, securing, troubleshooting, and optimizing your Windows network environment. ¿¿¿¿¿¿¿¿¿¿¿¿¿ BOOK 1: ACTIVE DIRECTORY ESSENTIALS Perfect for beginners, this guide provides a solid foundation in Windows network management. Learn the basics of Active Directory and gain essential skills for effective network administration.¿¿¿¿ BOOK 2: MASTERING ACTIVE DIRECTORY Take your skills to the next level with advanced techniques for system administrators. From complex group policy management to designing multi-domain architectures, this book covers it all.¿¿¿¿ BOOK 3: SECURING ACTIVE DIRECTORY Protect your network assets with proven strategies and best practices for IT security professionals. Discover authentication mechanisms, access control strategies, and audit policies to safeguard your organization's data.¿¿¿¿ BOOK 4: ACTIVE DIRECTORY TROUBLESHOOTING AND OPTIMIZATION Troubleshoot issues and optimize performance like a pro with expert tips for peak performance and resilience. Keep your Active Directory environment running smoothly with this invaluable resource.¿¿¿¿ Don't leave your network vulnerable to cyber threats! Secure, optimize, and troubleshoot with confidence using our Active Directory Network Management Bundle. Get your copy today and unlock the full potential of your Windows network infrastructure! ¿¿¿¿¿¿¿¿

  • af Charles Spurgeon
    349,95 - 394,95 kr.

  • af Amin Shokri Gazafroudi
    983,95 - 1.428,95 kr.

  • af Mayank Malhotra
    372,95 kr.

    Navigating Databricks with Ease for Unparalleled Data Engineering Insights.Book DescriptionUltimate Data Engineering with Databricks is a comprehensive handbook meticulously designed for professionals aiming to enhance their data engineering skills through Databricks. Bridging the gap between foundational and advanced knowledge, this book employs a step-by-step approach with detailed explanations suitable for beginners and experienced practitioners alike.Focused on practical applications, the book employs real-world examples and scenarios to teach how to construct, optimize, and maintain robust data pipelines. Emphasizing immediate applicability, it equips readers to address real data challenges using Databricks effectively. The goal is not just understanding Databricks but mastering it to offer tangible solutions.Beyond technical skills, the book imparts best practices and expert tips derived from industry experience, aiding readers in avoiding common pitfalls and adopting strategies for optimal data engineering solutions. This book will help you develop the skills needed to make impactful contributions to organizations, enhancing your value as a data engineering professional in today's competitive job market.What you will learn¿ Acquire proficiency in Databricks fundamentals, enabling the construction of efficient data pipelines.¿ Design and implement high-performance data solutions for scalability.¿ Apply essential best practices for ensuring data integrity in pipelines.¿ Explore advanced Databricks features for tackling complex data tasks.¿ Learn to optimize data pipelines for streamlined workflows.Table of Contents1. Fundamentals of Data Engineering2. Mastering Delta Tables in Databricks3. Data Ingestion and Extraction4. Data Transformation and ETL Processes5. Data Quality and Validation6. Data Modeling and Storage7. Data Orchestration and Workflow Management8. Performance Tuning and Optimization9. Scalability and Deployment Considerations10. Data Security and Governance Last Words Index

  • af Rob Botwright
    385,95 kr.

    Introducing the Ultimate Guide to Azure DevOps Mastery!Are you ready to take your DevOps skills to the next level and become a certified Azure DevOps Engineer? Look no further! Our comprehensive book bundle, "Azure DevOps Engineer: Exam AZ-400 - Designing and Implementing Microsoft DevOps Solutions," is your ticket to success in the world of DevOps.This bundle includes four essential books tailored to help you ace the AZ-400 exam and excel in your DevOps career:Book 1 - Azure DevOps Fundamentals: A Beginner's Guide to Exam AZ-400: Kickstart your journey with this beginner-friendly guide that covers the core concepts of Azure DevOps. From understanding the basics to navigating through the Azure DevOps ecosystem, this book sets the foundation for your success.Book 2 - Mastering Continuous Integration and Continuous Deployment with Azure DevOps: Exam AZ-400: Dive deep into the world of CI/CD pipelines with this comprehensive guide. Learn how to automate software delivery, improve collaboration, and accelerate deployment cycles using Azure DevOps.Book 3 - Advanced Azure DevOps Techniques: Architecting for Scalability and Resilience - Exam AZ-400: Take your skills to new heights with advanced techniques for designing scalable and resilient DevOps solutions. Explore architectural patterns, scalability strategies, and resilience best practices to tackle complex challenges head-on.Book 4 - DevOps Expert: Achieving Mastery in Azure DevOps and Beyond - Exam AZ-400: Become a true DevOps expert with this ultimate guide. Covering a wide range of advanced topics, including security, compliance, and optimization techniques, this book empowers you to overcome any obstacle and excel in your DevOps journey.Whether you're a beginner looking to get started in DevOps or an experienced professional aiming for mastery, this book bundle has something for everyone. Packed with real-world examples, practical exercises, and expert insights, it's the perfect companion for your journey to becoming a certified Azure DevOps Engineer.Don't miss out on this opportunity to level up your DevOps skills and achieve success in your career. Get your copy of "Azure DevOps Engineer: Exam AZ-400 - Designing and Implementing Microsoft DevOps Solutions" today!

  • af Sandeep Kumar Panda
    1.392,95 - 1.428,95 kr.

  • af Mohammed Usman
    1.103,95 kr.

    This book sheds light on systems that learn extensively, with purpose and naturally interact with humans. Improving operations and increasing competitive differentiation among manufacturing organizations by harnessing the power of cognitive abilities, IoT can help build and influence the flow of information¿making the shop floor more cognitive through effective processing, analysis, and operational optimization. Now we are seeing the first-hand potential of cognitive computing¿its ability to transform businesses, governments, and society. The real potential of the cognitive age can be realized by combining data analysis and statistical reasoning of machines with uniquely human qualities, such as self-directed goals, common sense, and moral values, improving operations and increasing competitive differentiation among manufacturing organizations. By harnessing the power of cognitive abilities, IoT can help build and influence the flow of information¿making the shop floor more cognitive through effective processing, analysis, and operational optimization. Cognitive initiatives come in all shapes and sizes, from change to strategy and everything in between. What most successful projects have in common, no matter how ambitious, is they start with a clear view of what technology can do. Therefore, the first job of a cognitive scientists is to gain a firm understanding of cognitive abilities, as presented in this book.

  • af Ian Wild
    482,95 kr.

    Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey FeaturesDemonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionOnline learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What you will learnMeasure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is forIf you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.Table of ContentsMoodle Security - First StepsMoodle Threat ModelingSecurity Industry StandardsBuilding a Secure Linux ServerEndpoint ProtectionDenial of Service ProtectionBackup And Disaster RecoveryMeeting Data Protection RequirementsMoodle Security AuditUnderstanding VulnerabilitiesInfrastructure Monitoring

  • af Rob Botwright
    452,95 kr.

    Introducing the NIST Cloud Security Book Bundle!Are you ready to take your cloud security knowledge to the next level? Look no further than our comprehensive book bundle, NIST Cloud Security: Cyber Threats, Policies, and Best Practices. This bundle includes four essential volumes designed to equip you with the skills and insights needed to navigate the complex world of cloud security.Book 1: NIST Cloud Security 101: A Beginner's Guide to Securing Cloud Environments Perfect for those new to cloud security, this book provides a solid foundation in the basics of cloud computing and essential security principles. Learn how to identify common threats, implement basic security measures, and protect your organization's cloud infrastructure from potential risks.Book 2: Navigating NIST Guidelines: Implementing Cloud Security Best Practices for Intermediate Users Ready to dive deeper into NIST guidelines? This volume is tailored for intermediate users looking to implement cloud security best practices that align with NIST standards. Explore practical insights and strategies for implementing robust security measures in your cloud environment.Book 3: Advanced Cloud Security Strategies: Expert Insights into NIST Compliance and Beyond Take your cloud security expertise to the next level with this advanced guide. Delve into expert insights, cutting-edge techniques, and emerging threats to enhance your security posture and achieve NIST compliance. Discover how to go beyond the basics and stay ahead of evolving cyber risks.Book 4: Mastering NIST Cloud Security: Cutting-Edge Techniques and Case Studies for Security Professionals For security professionals seeking mastery in NIST compliance and cloud security, this book is a must-read. Gain access to cutting-edge techniques, real-world case studies, and expert analysis to safeguard your organization against the most sophisticated cyber threats. Elevate your skills and become a leader in cloud security.This book bundle is your go-to resource for understanding, implementing, and mastering NIST compliance in the cloud. Whether you're a beginner, intermediate user, or seasoned security professional, the NIST Cloud Security Book Bundle has something for everyone. Don't miss out on this opportunity to enhance your skills and protect your organization's assets in the cloud. Order your copy today!

  • af Rob Botwright
    452,95 kr.

    Introducing "Edge Computing 101: Novice to Pro" - your ultimate guide to mastering edge computing from beginner to expert level. This comprehensive book bundle includes four essential volumes packed with expert techniques and practical applications to propel your understanding and proficiency in edge computing.Book 1, "Edge Computing Fundamentals: A Beginner's Guide to Distributed Systems," provides a solid foundation for understanding the core principles of distributed systems. Whether you're new to the field or seeking to reinforce your knowledge, this book equips you with the fundamental concepts necessary to embark on your journey into the world of edge computing.In Book 2, "Edge Computing Architectures: Design Principles and Best Practices," you'll delve deeper into the intricacies of designing effective edge computing architectures. From deployment models to optimization techniques, this volume offers invaluable insights and best practices to help you build robust and scalable edge systems.For those looking to advance their skills, Book 3, "Advanced Edge Computing: Scalability, Security, and Optimization Strategies," explores advanced techniques and strategies for overcoming scalability challenges, enhancing security measures, and optimizing performance in edge environments. With real-world examples and case studies, you'll gain practical expertise to tackle complex issues and achieve optimal outcomes.Finally, Book 4, "Edge Computing in Industry 4.0: Practical Applications and Future Trends," focuses on the practical applications of edge computing across various industries, with a special emphasis on Industry 4.0. Discover how edge computing is transforming manufacturing, healthcare, smart cities, and more, and gain insights into future trends shaping the industry.Whether you're a novice looking to build a strong foundation or a seasoned professional aiming to stay ahead of the curve, "Edge Computing 101: Novice to Pro" has you covered. With its comprehensive coverage, expert guidance, and practical insights, this book bundle is your essential companion for mastering the dynamic world of edge computing. Get your copy today and take your edge computing skills to the next level!

  • af Anand Nayyar
    1.125,95 - 1.758,95 kr.

  • af Sean Howard
    607,95 kr.

    Build scalable, cost-effective, high-performance, and secure architectures using AWS Outposts, AWS Local Zones, AWS Wavelength, and AWS Snow services along guided by best practices and practical examplesKey FeaturesTake advantage of the opportunities and challenges arising from the exponential growth of connected devicesUse AWS edge compute services to extend your applications to wherever they are neededFollow guided tutorials for building an IIoT gateway and a distributed edge application with AWS servicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures.This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You'll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you'll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you'll delve into essential security and operational considerations to maximize the value delivered by AWS services.By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.What you will learnOvercome network challenges faced at the near and far edgeLeverage services in over 450 points of presence at the edge of the AWS global backboneDeploy edge solutions in disconnected scenarios using AWS Snow FamilyBuild multi-access edge (MEC) solutions with 5G and AWS WavelengthReduce latency for your users with AWS Local ZonesConfigure AWS Snowcone as an IIoT gateway with AWS IoT GreengrassExtend your AWS VPC into your on-premise data center with AWS OutpostsDeploy distributed applications for core, near, and far edge cloud servicesWho this book is forThis book is designed for cloud architects, cloud engineers, solutions architects, and IoT architects tasked with building edge compute solutions using AWS. If you want to master the full range of edge computing services offered by AWS, this book is for you. A basic understanding of AWS services and networking is assumed.Table of ContentsGetting Started with Edge Computing on AWSUnderstanding Network and Security for Near Edge ComputingUnderstanding Network and Security for Far Edge ComputingAddressing Disconnected Scenarios with AWS Snow FamilyIncorporating AWS Outposts into Your On Premises DatacenterLowering First-Hop Latency with AWS Local ZonesUsing AWS Wavelength Zones on Public 5G NetworksUtilizing the Capabilities of the AWS Global NetworkArchitecting for Disconnected Edge Computing ScenariosBuilding Multi-Access Edge Architectures (MEC)Addressing the Requirements of Immersive Experiences with AWSConfiguring an AWS Snowcone to be an IoT GatewayDeploying a Distributed OpenRAN NFV to the AWS CloudExploring the Future of AWS Edge Computing Services

  • af Clark Barrett
    622,95 kr.

    This monograph reports the findings of a workshop held at Google (co-organized by Stanford University and the University of Wisconsin-Madison) on the dual-use dilemma posed by GenAI.

  • af Hassan Haes Alhelou
    1.477,95 kr.

  • af Brad Riapolov
    842,95 kr.

  • af Steven Shepard
    567,95 kr.

    THE HOW'S AND WHY'S AND APPLICATIONS ON SONET/SDH--MINUS THE JARGON Intended for use in broadband ISDN and ATM networks, SONET (Synchronous Optical Network) and SDH (Synchronous Digital Hierarchy) have taken on a life of their own. As fiber optic cable becomes the standard for data transmission, telcos and other carriers are deploying more high-speed SONET/SDH technologies to support leased-line services such as DS-1 and DS-3. In search of ever-faster data speeds, leading corporations such as Boeing, AT&T, and Disney are moving their private global networks to a SONET/SDH infrastructure. THIS BOOK IS A MUST-READ IF-- * Your're at the point where technology turns to business and shoot-or-pass decisions get made * Staying on top of what's hot in communications is your jo * You need to understand the growth and workings of SONET/SDH, but don't have time for MIT * You want to compare cots, potentials, and performance of SONET/SDH with other technologies * You'd like business-model case studies of DWDM (Dense Wavelength Division Multiplexing) and WDM (Wavelength Division Multiplexing) that make sense * You sell, market, or manage for a firm that develops SONET/SDH systems * You make career choices in telecom, Internet service, networking, or the upper echelons of any large business * You invest in communications equipment makers, service providers, or applications creators * You're a curious technophile who can't get enough insider details on new communications strategies, methods, and trends * You see that there's more sun in the winner's circle than in the also-ran column The easiest way to size up SONET/SDH for your network--or simply tobetter understand these rapidly expanding technologies--SONET/SDH DEMYSTIFIED is the ideal shortcut to the front edge of high-speed networking.

  • af Justine Nakirijja
    643,95 kr.

    This book, Scope Complexity Management in Planning Public Software Projects, contains a rich Abstract on (Page 7), Introduction Chapter One on (Pages 8 - 22), Chapter Two Overview Of Problem Awareness from (Pages 23 - 49 ), Chapter Three Methodology on (Pages 50 - 65 ), Chapter Four Predictor Model For Requirement Classification Using Recurrent Neural Network on (Pages 66 - 83), Chapter Five A Model For Mapping Dependencies For High-Level Requirements on (Pages 84- 107), Chapter Six Requirements Engineering Architecture on (Pages 108 - 130), Chapter Seven Adaptive Scope Complexity Clarification Framework on (Pages 131 - 145), Chapter Eight AFSCOP Framework Empirical Validation on (Pages 146 - 159), Chapter Nine Summary, Conclusion, And Recommendations on (Pages 160 - 174), and References/Bibliography on (Pages 175 - 203). This book is recommended for all policy, project, training, and research institutions.

  • af L. D. Knowings
    232,95 - 297,95 kr.

  • af Eugene J. Lewis
    3.497,95 kr.

    In today's digital age, cyber threats have become an ever-increasing risk to businesses, governments, and individuals worldwide. The deep integration of technology into every facet of modern life has given rise to a complex and interconnected web of vulnerabilities. As a result, traditional, sector-specific approaches to cybersecurity have proven insufficient in the face of these sophisticated and relentless adversaries. The need for a transformative solution that transcends organizational silos and fosters cross-sector collaboration, information sharing, and intelligence-driven defense strategies is now more critical than ever. Evolution of Cross-Sector Cyber Intelligent Markets explores the changes occurring within the field of intelligent markets, noting a significant paradigm shift that redefines cybersecurity. Through engaging narratives, real-world examples, and in-depth analysis, the book illuminates the key principles and objectives driving this evolution, shedding light on innovative solutions and collaborative efforts aimed at securing our digital future.

  • af Maki K. Habib
    1.737,95 kr.

    Embark on a journey through the dynamic world of the Internet of Things (IoT) with Internet of Things - New Insight. This innovative book offers a concise yet comprehensive exploration of IoT¿s technological evolution, diverse applications, and prospects. From its roots in ubiquitous computing to real-world applications in health care, agriculture, and smart cities, each chapter unveils the transformative impact of IoT on our interconnected world.Key Features:Applications across Domains: Explore real-world examples showcasing how IoT enhances efficiency and quality of life.Challenges and Solutions: Confront the hurdles of rapid IoT proliferation and discover insightful perspectives and solutions.Future Prospects: Peer into the future, exploring potential advancements in AI integration, edge computing, and 6G connectivity.Whether you are a professional seeking deeper insights or an enthusiast eager to understand the complexities of IoT, this book is your gateway to a revolutionary technological landscape that continues to redefine connectivity and innovation.

  • af Shivakumar R Goniwada
    431,95 kr.

    Explore the dynamics of digital identity, a crucial component in today¿s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it¿s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure decentralized digital identity features effectively. It¿s a must-read for those aiming to grasp the intricacies of digital identity and leverage it for future innovation and security.The book begins by redefining digital identity, examining its evolution and the profound impact it has on both individuals and organizations. It then delves into the development of digital identity strategies, laying the foundation for future digital transformations. Covering a wide range of topics, the book discusses the innovation, challenges, and technological exploration in digital identity. A special focus is given to biometric technologies and the implementation of decentralized digital identities, addressing critical areas such as identity governance, blockchain, AI and advanced biometrics. The book also investigates the implications of digital identity across various industries, including cross border travel, healthcare, social media, finance, metaverse, IoT etc. finally the book provides not only emerging trends but offers a glimpse into the future digital identity. Whether yoüre a tech professional, business leader, student or simply keen on understanding the impact of digital advancements, this book promises to offer insightful perspectives and practical solutions for navigating the complex world of digital identity. It underscores the importance of identity in spearheading digital innovation, making it a key resource for anyone looking to stay ahead in the digital landscape. As you reach its conclusion, yoüll be equipped with a wealth of knowledge and insights that are crucial in today¿s digital era.What You'll LearnDigital identity strategies and their role in shaping the future of digital identityDifferent facets of digital identitySpecifics of biometric technologies and decentralized digital identity Industry specific digital identity and its implementationCrucial aspects of privacy, ethics, and secure in the context of digital identityWho This Book Is ForSoftware professionals, security practitioners, architects, senior managers, executives, and students who are interested in digital identity.

  • af Swati Raut
    346,95 kr.

    People of different linguistic background could not able to interact with each other. This concept of translation will help people to communicate comfortably. Also it will help to fill communication gap between two linguistically different back-grounds. It will help to the people in the villages, who have taken education of English. Majority of the Indian population is not familiar with English while most of the information available on web or electronic information is in English. So, to reach out to the common man across various sections and field, an automatic language translator is important. So the main objective of Machine Translation (MT) is to break the language barriering a multilingual nation like India.MT The term machine translation (MT) is used in the sense of translation of one language to another. The ideal aim of machine translation systems is to produce the best possible translation without human assistance. Basically every machine translation system requires programs for translation and automated dictionaries and grammars to support translation. Generally, MT is classified into seven broad categories: rule-based, statistical-based,hybrid-based, example-based etc.

  • af S. Gayathri
    527,95 kr.

    Data Mining refers to things get done only if the data we gather can inform and inspire those in a position to make a difference. It is a process used by a company to turn raw data into useful information. Data Warehousing refers to the Without big data, you are blind and deaf and in the middle of a freeway. It storing digital information in a manner that is secure reliable, easy to retrive and easy to manage.

  • af Ioannis K. Hatzilygeroudis
    1.307,95 kr.

  • af Alfonso San Miguel Sánchez
    607,95 kr.

    Explore cloud economics and cost optimization for Azure, AWS, and GCP with this practical guide covering methods, strategies, best practices, and real-world examples, bridging theory and applicationKey FeaturesLearn cost optimization best practices on different cloud services using FinOps principles and examplesGain hands-on expertise in improving cost estimations and devising cost reduction plans for Azure, AWS, and GCPAnalyze case studies that illustrate the application of FinOps in diverse real-world scenariosPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIn response to the escalating challenges of cloud adoption, where balancing costs and maximizing cloud values is paramount, FinOps practices have emerged as the cornerstone of fi nancial optimization. This book serves as your comprehensive guide to understanding how FinOps is implemented in organizations worldwide through team collaboration and proper cloud governance.Presenting FinOps from a practical point of view, covering the three phases-inform, optimize, and operate-this book demonstrates an end-to-end methodology for optimizing costs and performing financial management in the cloud. You'll learn how to design KPIs and dashboards for judicious cost allocation, covering key features of cloud services such as reserved instances, rightsizing, scaling, and automation for cost optimization. This book further simplifi es architectural concepts and best practices, enabling you to design superior and more optimized solutions. Finally, you'll discover potential synergies and future challenges, from the integration of artifi cial intelligence to cloud sustainability considerations, to prepare for the future of cloud FinOps.By the end of this book, you'll have built the expertise to seamlessly implement FinOps practices across major public clouds, armed with insights and ideas to propel your organization toward business growth.What you will learnExamine challenges in cloud adoption and cost optimizationGain insight into the integration of FinOps within organizationsExplore the synergies between FinOps and DevOps, IaC, and change managementLeverage tools such as Azure Advisor, AWS CUDOS, and GCP cost reportsEstimate and optimize costs using cloud services key features and best practicesImplement cost dashboards and reports to improve visibility and controlUnderstand FinOps roles and processes crucial for organizational successApply FinOps through real-life examples and multicloud architecturesWho this book is forThis book is for cloud engineers, cloud and solutions architects, as well as DevOps and SysOps engineers interested in learning more about FinOps and cloud financial management for efficiently architecting, designing, and operating software solutions and infrastructure using the public clouds. Additionally, team leads, project managers, and financial teams aiming to optimize cloud resources will also find this book useful. Prior knowledge of cloud computing and major public clouds is assumed.Table of ContentsIntroduction to FinOps PrinciplesUnderstanding How FinOps Fits in Cloud GovernanceDesigning and Executing the Tagging and Naming Convention StrategiesEstimating Cloud Solutions Costs and Initiative SavingsImproving Cost visibility with Dashboards and ReportsImplementing IaaS Compute OptimizationImplementing PaaS and Other Compute Optimization InitiativesImplementing Databases OptimizationImplementing Storage Optimization(N.B. Please use the Look Inside option to see further chapters)

  • af Oleg Ulyanov
    547,95 kr.

    Explore use cases and best practices to seamlessly migrate and scale legacy enterprise-grade applications running on on-premises vSphere environments to VMware Cloud SDDCs running on AWS infrastructureKey FeaturesUnderstand data center extension, migration, disaster recovery, and app modernization through a variety of use casesBecome an expert at configuring, automating, and troubleshooting VMC on AWS SDDCImplement design considerations, best practices, and onboarding preflight checklist for optimal performance on VMC on AWSPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIf you're looking to effortlessly transition from on-premises VMware vSphere environments or capital expenditure (CAPEX) to an agile operational expenditure (OPEX) model, trust the VMware Cloud (VMC) on AWS platform for swift re-platforming of legacy applications into cloud-native framework. This comprehensive guide addresses hybrid cloud challenges, offering detailed solutions within the VMware Cloud on AWS ecosystem.Covering the foundational architecture, software-defined data center (SDDC) components of VMware Cloud on AWS, network and security configurations, and AWS service integrations, this book lays the foundation for you to advance to vCenter management, vSAN storage policies, NSX architecture, compute policies, SDDC console management, and the EDRS mechanism for cluster scaling. You'll also explore integrated services such as VMware HCX for migration, VMware Aria suite, Tanzu Managed Kubernetes, and disaster recovery.Further, the book takes you through VMware Cloud APIs and guides you in managing workloads with VMware Cloud on AWS Outposts. With the help of practical insights, configuration tips, and best practices, you'll unlock the full potential of VMC on AWS.By the end of this book, you'll be equipped to successfully architect and manage VMware Cloud on AWS SDDCs, handling day-to-day operations expertly.What you will learnExamine the foundational architecture components of VMware Cloud on AWS, including vSphere, vSAN, and NSXExplore the various integrated services available within VMware Cloud on AWSDelve into VMware Cloud on AWS SDDC, vCenter, and vSAN optimizationsBuild applications and apply best practices within the VMware Cloud on AWS to manage day-to-day operationsStreamline infrastructure management for VMware Cloud on AWS with Infrastructure as Code (IaC)Extend cloud capabilities to on-premises environments using VMware Cloud on AWS OutpostsWho this book is forThe book is intended for cloud and solutions architects, DevOps engineers, site reliability engineers (SREs), system and network admins, and cloud engineers with experience in on-premises VMware or AWS administration, facilitating the seamless integration of VMware cloud technologies. Prior understanding of cloud computing, virtualization principles, VMware vSphere administration, vSAN, and NSX along with AWS cloud basics will be helpful.Table of ContentsUnderstanding the architecture of VMC on AWS componentsExploring networking, security, and AWS integrations Discovering migration services for VMC on AWS Configuring your first SDDC from scratchConfiguring vCenter, vSAN, and VMC console Understanding Networking and security configurationsExploring add-on services configurationBuilding applications and managing operationsUsing infrastructure as code on VMC on AWSManaging workload sizing and Cloud costsKnowing the best practices, FAQs, and Common pitfallsAppendix- Preflight checklist before onboarding

  • af Enterprise Solution Architect
    382,95 kr.

    This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author's approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable direction

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.