Udsalget slutter om
Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Basant Agarwal, Azizur Rahman, Ramesh Chandra Poonia & mfl.
    1.705,95 kr.

  • af Anisur Rahaman Molla
    878,95 kr.

    This book constitutes the proceedings of the 19th International Conference on Distributed Computing and Intelligent Technology, ICDCIT 2023, which was held in Bhubaneswar, India, in January 2023.The 20 full papers and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The papers are organized in the following topical sections: Invited Talks; Distributed Computing; Intelligent Technology.

  • af Dietbert Gütter
    513,95 kr.

    Das Buch mit einem stark ausgeprägten modularen Aufbau, wird als ein vorlesungsbegleitendes Lehrbuch zum Modul Computernetzwerke im ET- und IT-Fachstudium an technischen Hochschulen empfohlen und enthält drei Teile sowie Zwischenfragen mit dazugehörigen Lösungen und weitere Übungsaufgaben. Teil I beinhaltet eine Einführung in das Gebiet der Rechnernetze. Die weiterführenden Teile II und III behandeln aktuelle Rechnernetztechnologien, Kopplungselemente und Verkabelungskonzepte. Die Leser werden dabei mit verteilten Softwaresystemen und Rechnernetzanwendungen vertraut gemacht.

  • af Sujeet Shenoi & Jason Staggs
    1.012,95 kr.

  • af Jiageng Chen
    864,95 kr.

    This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.

  • af Anand Seetharaju
    1.163,95 kr.

    The general ledger is the backbone of your financials system. Learn everything you need for configuring and using the general ledger in SAP S/4HANA. Walk step by step through setting up fiscal years, posting periods, parallel ledgers, and more. See routine processes like posting, document control, and year-end closing in action. Whether you're planning a new implementation or a system conversion, this is your complete guide to general ledger accounting in SAP S/4HANA! Highlights include:1) Posting periods2) Parallel reporting3) Currencies4) Master data5) Profit center accounting6) Document splitting, posting, and clearing7) Cost of sales accounting8) Financial close9) Accruals management10) Reporting and analytics11) Central Finance

  • af Matt Walker
    449,95 kr.

    Thoroughly revised to cover 100% of the EC Council's Certified Ethical Hacker Version 11 exam objectives, this bundle includes two books and online practice exams featuring hundreds of realistic questions.This fully updated, money-saving self-study set prepares certification candidates for the CEH v11 exam. Examinees can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition to learn about every topic included in the v11 exam objectives. Next, they can reinforce what they've learned with the 600+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fifth Edition and online practice exams.This edition features up-to-date coverage of all nine domains of the CEH v11 exam and the five phases of ethical hacking: reconnaissance, scanning, gaining access, maintaingin access and clearing tracks.In all, the bundle includes more than 900 accurate questions with detailed answer explanationsOnline content includes test engine that provides full-length practice exams and customizable quizzes by chapter or exam domainThis bundle is 33% cheaper than buying the two books separately

  • af Marcel Kyas
    878,95 kr.

  • af Karim Zkik
    709,95 kr.

  • af Bedir Tekinerdogan
    613,95 kr.

  • af Arif Ahmed Sk
    922,95 kr.

  • af Shinesa Cambric
    488,95 kr.

    Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risksKey Features:Leverage best practices and emerging technologies to effectively audit a cloud environmentGet better at auditing and unlock career opportunities in cloud audits and complianceExplore multiple assessments of various features in a cloud environment to see how it's doneBook Description:As more and more companies are moving to cloud and multi-cloud environments, being able to assess the compliance of these environments properly is becoming more important. But in this fast-moving domain, getting the most up-to-date information is a challenge-so where do you turn?Cloud Auditing Best Practices has all the information you'll need. With an explanation of the fundamental concepts and hands-on walk-throughs of the three big cloud players, this book will get you up to speed with cloud auditing before you know it.After a quick introduction to cloud architecture and an understanding of the importance of performing cloud control assessments, you'll quickly get to grips with navigating AWS, Azure, and GCP cloud environments. As you explore the vital role an IT auditor plays in any company's network, you'll learn how to successfully build cloud IT auditing programs, including using standard tools such as Terraform, Azure Automation, AWS Policy Sentry, and many more.You'll also get plenty of tips and tricks for preparing an effective and advanced audit and understanding how to monitor and assess cloud environments using standard tools.By the end of this book, you will be able to confidently apply and assess security controls for AWS, Azure, and GCP, allowing you to independently and effectively confirm compliance in the cloud.What You Will Learn:Understand the cloud shared responsibility and role of an IT auditorExplore change management and integrate it with DevSecOps processesUnderstand the value of performing cloud control assessmentsLearn tips and tricks to perform an advanced and effective auditing programEnhance visibility by monitoring and assessing cloud environmentsExamine IAM, network, infrastructure, and logging controlsUse policy and compliance automation with tools such as TerraformWho this book is for:This book is for IT auditors looking to learn more about assessing cloud environments for compliance, as well as those looking for practical tips on how to audit them and what security controls are available to map to IT general computing controls. Other IT professionals whose job includes assessing compliance, such as DevSecOps teams, identity, and access management analysts, cloud engineers, and cloud security architects, will also find plenty of useful information in this book. Before you get started, you'll need a basic understanding of IT systems and a solid grasp of cybersecurity basics.

  • af Joey Bernal
    488,95 kr.

    Go beyond connecting services to understand the unique challenges encountered in industrial environments by building Industrial IoT architectures using AWSPurchase of the print or kindle book includes a free eBook in the PDF formatKey Features:Understand the key components of IoT Architecture and how it applies to Industry 4.0Walk through extensive examples and solutions across multiple IndustriesLearn how to collect, process, store, and analyse Industrial IoT dataBook Description:When it comes to using the core and managed services available on AWS for making decisions about architectural environments for an enterprise, there are as many challenges as there are advantages. This Industrial IoT book follows the journey of data from the shop floor to the boardroom, identifying goals and aiding in strong architectural decision-making.You'll begin from the ground up, analyzing environment needs and understanding what is required from the captured data, applying industry standards and conventions throughout the process. This will help you realize why digital integration is crucial and how to approach an Industrial IoT project from a holistic perspective. As you advance, you'll delve into the operational technology realm and consider integration patterns with common industrial protocols for data gathering and analysis with direct connectivity to data through sensors or systems. The book will equip you with the essentials for designing industrial IoT architectures while also covering intelligence at the edge and creating a greater awareness of the role of machine learning and artificial intelligence in overcoming architectural challenges.By the end of this book, you'll be ready to apply IoT directly to the industry while adapting the concepts covered to implement AWS IoT technologies.What You Will Learn:Discover Industrial IoT best practices and conventionsUnderstand how to get started with edge computingDefine and build IoT solution architectures from scratchUse AWS as the core of your solution platformApply advanced analytics and machine learning to your dataDeploy edge processing to react in near real time to events within your environmentWho this book is for:This book is for architects, engineers, developers, and technical professionals interested in building an edge and cloud-based Internet of Things ecosystem with a focus on industry solutions. Since the focus of this book is specifically on IoT, a solid understanding of core IoT technologies and how they work is necessary to get started. If you are someone with no hands-on experience, but are familiar with the subject, you'll find the use cases useful to learn how architectural decisions are made.

  • af Parth Pandit
    433,95 kr.

    Modernize your apps, run them in containers on Kubernetes, and understand the business value and the nitty-gritty of the VMware Tanzu portfolio with hands-on instructionsPurchase of the print or kindle book includes a free eBook in the PDF formatKey Features:Gain insights into the key features and capabilities of distinct VMWare Tanzu productsLearn how and when to use the different Tanzu products for common day-1 and day-2 operationsModernize applications deployed on multi-cloud platforms using DevSecOps best practicesBook Description:As Kubernetes (or K8s) becomes more prolific, managing large clusters at scale in a multi-cloud environment becomes more challenging - especially from a developer productivity and operational efficiency point of view. DevSecOps in Practice with VMware Tanzu addresses these challenges by automating the delivery of containerized workloads and controlling multi-cloud Kubernetes operations using Tanzu tools.This comprehensive guide begins with an overview of the VMWare Tanzu platform and discusses its tools for building useful and secure applications using the App Accelerator, Build Service, Catalog service, and API portal. Next, you'll delve into running those applications efficiently at scale with Tanzu Kubernetes Grid and Tanzu Application Platform. As you advance, you'll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you'll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples.By the end of this VMware book, you'll have gained a thorough understanding of the VMWare Tanzu platform and be able to efficiently articulate and solve real-world business problems.What You Will Learn:Build apps to run as containers using predefined templatesGenerate secure container images from application source codeBuild secure open source backend services container imagesDeploy and manage a Kubernetes-based private container registryManage a multi-cloud deployable Kubernetes platformDefine a secure path to production for Kubernetes-based applicationsStreamline multi-cloud Kubernetes operations and observabilityConnect containerized apps securely using service meshWho this book is for:This book is for cloud platform engineers and DevOps engineers who want to learn about the operations of tools under the VMware Tanzu umbrella. The book also serves as a useful reference for application developers and solutions architects as well as IT leaders who want to understand how business and security outcomes can be achieved using the tools covered in this book. Prior knowledge of containers and Kubernetes will help you get the most out of this book.

  • af Gautam Bhattacharya
    813,95 kr.

    Working with external partners for logistics operations? Set up seamless communication between your systems using this all-in-one handbook! Start with an overview of third-party logistics and learn how to design the best landscape for your business model. Then follow click-by-click instructions for connecting SAP S/4HANA with your 3PL vendors. Configure settings for goods movement, inventory management, shipping, delivery, and batch management. Learn how to set up relevant master data, map warehousing in your system, exchange data through middleware, and more!Highlights include:1) Master data2) Packaging and traceability3) Shipping and delivery4) Inventory management5) Warehousing6) Transportation7) Application link enabling (ALE)8) IDocs9) Business Rules Framework plus (BRFplus)10) Data monitoring11) Direct connectivity and middleware

  • af Jonas Tritschler
    1.033,95 kr.

    Running accounting in SAP S/4HANA Finance? This is your hands-on guide! Learn how financial accounting works with the Universal Journal and understand key organizational structures. Get step-by-step instructions to perform your finance tasks for the general ledger, accounts payable, accounts receivable, fixed assets, and customer projects and billing. With details on both classic SAP GUI transactions and modern SAP Fiori apps, as well as coverage of new event-based revenue recognition, you'll find everything you need in these pages!In this book, you'll learn about:a. Finance Fundamentals Explore the processes that make up financial accounting: order to cash, purchase to pay, acquire to retire, and record to report. Understand the organizational structures and general ledger master data that provide the foundation to FI. b. Tasks and Transactions Walk through your core accounting activities, click by click. Post journal entries in the general ledger, create customer and vendor invoices, make payments, process bank statements, manage assets, set up customer projects, and more. c. Period-End Close and ReportingClose your books and report on your data. In each finance subarea, perform key tasks such as reconciliation, foreign currency valuation, and reclassifications. Learn about key transactions and apps that are available for reporting. Highlights include:1) General ledger accounting2) Accounts payable3) Accounts receivable4) Fixed assets5) Customer projects6) Event-based revenue recognition7) Organizational structure8) Period-end close9) Reporting10) SAP GUI transactions11) SAP Fiori applications

  • af Sreten Milosavljevic
    1.288,95 kr.

    Does your business provide contract-based sales or services? Then you need this comprehensive guide to recognizing your revenue in SAP S/4HANA! Whether you're using classic revenue accounting and reporting (RAR) or optimized contract management (OCM), get step-by-step instructions to configure RAIs and contracts. Then post, reconcile, and report your revenue. Learn about administration and troubleshooting activities, see how to migrate from classic RAR to OCM, and take your first look at event-based revenue recognition. Everything you need for "rev rec" is here! In this book, you'll learn about:a. Revenue and Contracts Get inbound processing up and running with classic and optimized revenue recognition. Set up, process, and extend RAI classes using tools like BRFplus and APIs. Then configure contract management and performance obligations to suit the needs of your business. b. Posting and ReportingLearn about revenue reporting options in SAP S/4HANA. Post revenue using ABC jobs, reconcile revenue through the Universal Journal, and integrate revenue with profitability analysis. Extend your reports using new tools like CDS views. c. Administration and ImplementationManage your revenue recognition implementation. Learn how to handle performance issues, perform reclassifications, and clean up data. Get troubleshooting tips and insight into the migration from classic RAR to OCM in SAP S/4HANA. Highlights include:1) Classic revenue recognition 2) Optimized contract management 3) Revenue accounting item (RAI) classes 4) Inbound processing 5) Contract management 6) Performance obligations 7) Revenue posting 8) Revenue reporting9) Administration 10) Troubleshooting 11) Migration

  • af Michael Kofler
    568,95 kr.

    Uncover security vulnerabilities and harden your system against attacks! With this guide you'll learn to set up a virtual learning environment where you can test out hacking tools, from Kali Linux to hydra and Wireshark. Then expand your understanding of offline hacking, external safety checks, penetration testing in networks, and other essential security techniques, with step-by-step instructions. With information on mobile, cloud, and IoT security you can fortify your system against any threat!

  • af Abdullah Galal
    1.163,95 kr.

    Ready to streamline your SAP S/4HANA Finance system? Learn how to determine accounts for your core business areas, including materials management, sales and distribution, accounts receivable and payable, cash and banking, and fixed assets. Follow step-by-step instructions to configure automatic account determination for each process in your system. Your journey to simplified accounting starts here! Highlights include: 1) Determination logic 2) Master data 3) Materials management 4) Sales and distribution 5) Plant maintenance 6) Production planning 7) Accounts receivable 8) Accounts payable 9) Cash and banking 10) Fixed assets

  • af Arthur Edwin Kennelly
    243,95 - 363,95 kr.

  • af Harry B. McMeal
    308,95 - 413,95 kr.

  • af Francis Marion Crawford
    258,95 - 363,95 kr.

  • af Shiping Chen
    614,95 kr.

  • - Proceedings of AICTC 2019
    af Vishal Goar
    2.020,95 - 2.219,95 kr.

    This book features selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing (AICTC 2019), held at the Government Engineering College Bikaner, Bikaner, India, on 8-9 November 2019. It covers ICT-based approaches in the areas ICT for energy efficiency, life cycle assessment of ICT, green IT, green information systems, environmental informatics, energy informatics, sustainable HCI and computational sustainability.

  • af Yong Chen, Mohammad Faisal, Meng Li & mfl.
    1.691,95 kr.

  • af Gunasekaran Manogaran, Bharat S. Rawal & M. Poongodi
    1.300,95 kr.

  • af Vinod Vaikuntanathan & Eike Kiltz
    720,95 - 2.033,95 kr.

  • af Liang-Jie Zhang
    613,95 kr.

  • af Khurana
    1.135,95 kr.

    Comprehensive resource providing strategic defense mechanisms for malware, handling cybercrime, and identifying loopholes using artificial intelligence (AI) and machine learning (ML) Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is a comprehensive look at state-of-the-art theory and practical guidelines pertaining to the subject, showcasing recent innovations, emerging trends, and concerns as well as applied challenges encountered, and solutions adopted in the fields of cybersecurity using analytics and machine learning. The text clearly explains theoretical aspects, framework, system architecture, analysis and design, implementation, validation, and tools and techniques of data science and machine learning to detect and prevent cyber threats. Using AI and ML approaches, the book offers strategic defense mechanisms for addressing malware, cybercrime, and system vulnerabilities. It also provides tools and techniques that can be applied by professional analysts to safely analyze, debug, and disassemble any malicious software they encounter. With contributions from qualified authors with significant experience in the field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection explores topics such as: Cybersecurity tools originating from computational statistics literature and pure mathematics, such as nonparametric probability density estimation, graph-based manifold learning, and topological data analysisApplications of AI to penetration testing, malware, data privacy, intrusion detection system (IDS), and social engineeringHow AI automation addresses various security challenges in daily workflows and how to perform automated analyses to proactively mitigate threatsOffensive technologies grouped together and analyzed at a higher level from both an offensive and defensive standpoint Providing detailed coverage of a rapidly expanding field, Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection is an essential resource for a wide variety of researchers, scientists, and professionals involved in fields that intersect with cybersecurity, artificial intelligence, and machine learning.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.