Vi bøger
Levering: 1 - 2 hverdage

Netværksadministration

Her finder du spændende bøger om Netværksadministration. Nedenfor er et flot udvalg af over 69 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Susmita Bandyopadhyay
    1.648,95 kr.

    This book presents different tools and techniques used for Decision Support Systems (DSS) including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support and various case-based reasoning methods supported by examples and case studies.

  • af Ayman El-Baz
    1.709,95 kr.

    This work represents recent advancement in cloud-based medical imaging. It looks at the integration of AI, Cloud Computing, and medical imaging. Special focus is given to the intricacies of designing cloud-based imaging systems. The book also examines issues surrounding big data in medical imaging applications.

  • af Vahid Hajipour, Sajjad Jalali, Mohammad Amini & mfl.
    522,95 - 1.220,95 kr.

  • - Infrastructure and Application Performance Monitoring
    af Brian Brazil
    523,95 kr.

    Get up to speed with Prometheus, the metrics-based monitoring system used by tens of thousands of organizations in production. This practical guide provides application developers, sysadmins, and DevOps practitioners with a hands-on introduction to the most important aspects of Prometheus, including dashboarding and alerting, direct code instrumentation, and metric collection from third-party systems with exporters.This open source system has gained popularity over the past few years for good reason. With its simple yet powerful data model and query language, Prometheus does one thing, and it does it well. Author and Prometheus developer Brian Brazil guides you through Prometheus setup, the Node exporter, and the Alertmanager, then demonstrates how to use them for application and infrastructure monitoring.Know where and how much to apply instrumentation to your application codeIdentify metrics with labels using unique key-value pairsGet an introduction to Grafana, a popular tool for building dashboardsLearn how to use the Node Exporter to monitor your infrastructureUse service discovery to provide different views of your machines and servicesUse Prometheus with Kubernetes and examine exporters you can use with containersConvert data from other monitoring systems into the Prometheus format

  • af Raees Ahmad Khan
    1.464,95 kr.

    The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.

  • af Kapil (Westminster Univ.) Sharma
    384,95 - 1.097,95 kr.

  • af Leda Glyptis
    334,95 kr.

    This book looks at the human and structural obstacles to transformation in the banking industry. It examines the change in habits, mindsets and leadership needed for the next stage of the digital journey. It argues that this change will be brought about, not by external heroes and saviours, but by today's banking professionals.

  • af James (Global Compliance Associates Bone & Jessie H (Better Future Strategies Lee
    384,95 - 1.222,95 kr.

  • af Purutçuo&
    1.466,95 kr.

    Operations Research methods are used frequently in every field of modern life like industry, economy and medicine. This book brings together the latest advances of these methods.

  • af Krishna Pera
    524,95 - 1.344,95 kr.

  • af Anne Kohnke
    524,95 kr.

    The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk managemen

  • af Kim H. Pries & Robert Dunnigan
    547,95 kr.

  • af Ramon Adrian Nastase
    162,95 kr.

  • af Frank Rubin
    515,95 kr.

  • af Software Diagnostics Services & Vostokov Dmitry Vostokov
    1.672,95 kr.

  • af Shimon Brathwaite
    414,95 - 842,95 kr.

  • af Frank Einhorn
    644,95 - 1.464,95 kr.

  • af David X. Martin
    424,95 - 708,95 kr.

  • af Kyle Walker
    644,95 - 1.709,95 kr.

  • af Philip (President Weinzimer
    524,95 - 1.342,95 kr.

  • af Bob Tricker
    363,95 - 1.222,95 kr.

  • af James F. Ransome, Mark S. (Technical Security Strategy Merkow & Anmol
    914,95 - 2.199,95 kr.

  • af Punit Gupta
    1.099,95 kr.

    Focuses on fundamental concepts of gathering, processing, analyzing the dataset from rich healthcare and biomedical sources. Covers interdisciplinary techniques such as data science, deep learning, statistics, big data analytics, smart devices, computer vision and IoT.

  • af Laura Bright
    387,95 kr.

    This book highlights success stories and challenges to implementing health IT standards. The narrative of each chapter demonstrates how standards further interoperable health data exchange, especially in the service of advancing tools to monitor population health.

  • af David Moschella
    237,95 kr.

    Seeing Digital is like a GPS guide to the 2020s.The Post-Cloud era has already begun. A powerful wave of new technologies, including machine learning, smart products, software agents, wearables, blockchains, speech/facial recognition, robotics, augmented realities, algorithms, and 5G wireless bandwidth is creating a digital world that is pervasive, embedded, aware, and autonomous. It's less a cloud of services somewhere "out there," than a ubiquitous Matrix of intelligent capabilities.Seeing Digital shows how these exciting innovations will transform the industries, organizations, and careers of the 2020s. Insight-packed chapters assess next-generation industry disruptions, the realities of machine intelligence, emerging co-creation business models, and the challenges of digital transformation, leadership, and risk. This wide-ranging book also forecasts the coming battle between Silicon Valley and China, the increasing importance of the Human Platform, the future of the Enterprise IT function, and technology's overall impact on jobs, skills, and society.As the title suggests, Seeing Digital helps readers visualize the emerging technology landscape. Each and every page presents a compelling concept, framework, checklist, assessment or other graphical image, with the ebook optimized for today's full-color displays. Devoid of technical jargon, its provocative analysis, optimistic outlook and practical advice will challenge technology insiders, digital business enthusiasts, and the wider public alike.Throughout the 21st century, the Leading Edge Forum has anticipated major digital technology developments, including consumerization, cloud computing, and the patterns of disruptive innovation. But until now, the LEF's cutting-edge thinking has only been available to its proprietary clients. Seeing Digital makes the highlights of this important research publicly available for the first time. Consider it your roadmap for the 2020s, and beyond.

  • af Cloudstack Contributors
    297,95 kr.

  • af Oluwagbenga Afolabi
    100,95 kr.

    Academic Paper from the year 2017 in the subject Computer Science - IT-Security, grade: A, Saint Leo University, language: English, abstract: In this paper, the author will dive into the motivation behind "Defense in Depth" and a different layered approach to ensure the security of an information infrastructure. Furthermore, different counter measures to protect the integrity of the information system from both internal and external attacks will be analyzed. Considering the recent cyber-attacks around the world it is understandable that organizations are considering ways to prevent, mitigate and control their information infrastructure against both internal and external attacks. The concept of Defense in Depth (DiD) revolves around using various methods to protect information systems (layered Defense) that work together in a coordinated manner to protect a network from an attack. Although, it is difficult to guarantee the total protection of a system from eternal attacks, using different counter measures can mitigate these threats to the integrity of the information system. Defense in Depth entails the use of holistic strategies to analyze and identify potential attack surfaces to secure the information system from both internal and external threats.

  • af Abbas Kudrati & Binil A. Pillai
    547,95 - 1.281,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.