11.142 results (0,24597 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Cloud Reliability Engineering Technologies and Tools

Cloud Reliability Engineering Technologies and Tools

Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services their challenges and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing and cloud security. Written by researchers and practitioners the book’s chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud and a case study discusses testing reliability installability and security. A comprehensive volume Cloud Reliability Engineering: Technologies and Tools combines research theory and best practices used to engineer reliable cloud availability and performance. | Cloud Reliability Engineering Technologies and Tools

GBP 56.99
1

Future Journalism Where We Are and Where We’re Going

Cloud Enterprise Architecture

Cloud Enterprise Architecture

Cloud Enterprise Architecture examines enterprise architecture (EA) in the context of the surging popularity of Cloud computing. It explains the different kinds of desired transformations the architectural blocks of EA undergo in light of this strategically significant convergence. Chapters cover each of the contributing architectures of EA—business information application integration security and technology—illustrating the current and impending implications of the Cloud on each. Discussing the implications of the Cloud paradigm on EA the book details the perceptible and positive changes that will affect EA design governance strategy management and sustenance. The author ties these topics together with chapters on Cloud integration and composition architecture. He also examines the Enterprise Cloud Federated Clouds and the vision to establish the InterCloud. Laying out a comprehensive strategy for planning and executing Cloud-inspired transformations the book: Explains how the Cloud changes and affects enterprise architecture design governance strategy management and sustenance Presents helpful information on next-generation Cloud computing Describes additional architectural types such as enterprise-scale integration security management and governance architectures This book is an ideal resource for enterprise architects Cloud evangelists and enthusiasts and Cloud application and service architects. Cloud center administrators Cloud business executives managers and analysts will also find the book helpful and inspirational while formulating appropriate mechanisms and schemes for sound modernization and migration of traditional applications to Cloud infrastructures and platforms.

GBP 54.99
1

The Cloud in IoT-enabled Spaces

Securing the Cloud Security Strategies for the Ubiquitous Data Center

The Psychology of Insecurity Seeking Certainty Where None Can Be Found

The Psychology of Insecurity Seeking Certainty Where None Can Be Found

Insecurity is an inevitable part of being human. Although life is insecure for every organism humans alone are burdened by knowing that this is so. This ground-breaking volume features contributions by leading international researchers exploring the social psychology of insecurity and how existential metaphysical and social uncertainty influence human social behaviour. Chapters in the book investigate the psychological origins of insecurity evolutionary theorizing about the functions of insecurity the motivational strategies people adopt to manage insecurity self-regulation strategies the role of insecurity in the formation and maintenance of social relationships and the influence of insecurity and uncertainty on the organization of larger social systems and public affairs. The chapters also discuss how insecurity influences many areas of contemporary social life highlighting the applied implications of this line of research. Topics covered include the role of insecurity in social communication social judgments decision-making group identification morality interpersonal behaviour relationships attitudes and many applied aspects of social life and politics where understanding the psychology of insecurity is of critical importance. This accessible and engaging book will be of interest to students researchers and practitioners as a textbook or reference book in behavioural and social science fields as well as to a broad spectrum of intelligent lay audiences seeking to understand one of the most intriguing issues that shapes human social life. | The Psychology of Insecurity Seeking Certainty Where None Can Be Found

GBP 42.99
1

Advances in Mobile Cloud Computing Systems

Advances in Mobile Cloud Computing Systems

With recent advances in mobile communication technologies more and more people are accessing cloud computing systems using mobile devices such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chapters from leading experts in this field cover different aspects of modeling analysis design optimization and architecture of mobile cloud computing systems. Advances in Mobile Cloud Computing Systems begins by discussing the background features and available service models of mobile cloud computing. It goes on to describe a mobile cloud computing system with several third party cloud mobile media (CMM) services that offers its services to a telecom operator. In this scenario the telecom operator acts as broker that can mix and interchange the resources offered by the different CMM service providers. Subsequent contributed chapters discuss such key research areas asEnergy-efficient task execution that reduces the energy consumption in both mobile devices and the cloudDesign and architecture of a Proximity Cloud that delivers low-latency bandwidth-efficient end-user services with a global footprintVirtual mobile networks in clouds that enable resource sharing between multiple mobile network operatorsSoftware piracy control framework in mobile cloud computing systems designed to prevent mobile application piracyDynamic configuration of cloud radio access networks (C-RANs) to improve end-to-end TCP throughput performance in next generation wireless networksThe book includes many supporting illustrations and tables along with

GBP 59.99
1

Cloud Computing Concepts and Technologies

Cloud Network Management An IoT Based Framework

Cloud Network Management An IoT Based Framework

Data storage processing and management at remote location over dynamic networks is the most challenging task in cloud networks. Users’ expectations are very high for data accuracy reliability accessibility and availability in pervasive cloud environment. It was the core motivation for the Cloud Networks Internet of Things (CNIoT). The exponential growth of the networks and data management in CNIoT must be implemented in fast growing service sectors such as logistic and enterprise management. The network based IoT works as a bridge to fill the gap between IT and cloud networks where data is easily accessible and available. This book provides a framework for the next generation of cloud networks which is the emerging part of 5G partnership projects. This contributed book has following salient features A cloud-based next generation networking technologies. Cloud-based IoT and mobility management technology. The proposed book is a reference for research scholars and course supplement for cloud-IoT related subjects such as distributed networks in computer/ electrical engineering. Sanjay Kumar Biswash is working as an Assistant professor in NIIT University India. He held Research Scientist position Institute of Cybernetics National Research Tomsk Polytechnic University Russia. He was PDF at LNCC Brazil and SDSU USA. He was a visiting researcher to the UC Portugal. Sourav Kanti Addya is working as an Assistant professor in NITK Surathkal India. He was a PDF at IIT Kharagpur India. He was a visiting scholar at SDSU USA. He obtained national level GATE scholarship. He is a member of IEEE ACM. | Cloud Network Management An IoT Based Framework

GBP 115.00
1

Cloud Security Concepts Applications and Perspectives

Cloud Security Concepts Applications and Perspectives

Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However utilization of cloud also raises concerns such as security privacy latency and governance that keep it from turning into the predominant option for critical frameworks. As such there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies and provides a wide range of examples and illustrations to effectively show the concepts applications and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition it covers future research directions in the domain. This book is suitable for professionals in the field researchers students who are want to carry out research in the field of computer and cloud security faculty members across universities and software developers engaged in software development in the field. | Cloud Security Concepts Applications and Perspectives

GBP 59.99
1

Cloud Security Attacks Techniques Tools and Challenges

Cloud Security Attacks Techniques Tools and Challenges

Cloud computing has gained paramount attention and most of the companies are adopting this new paradigm and gaining significant benefits. As number of applications and business operations are being facilitated by the cloud computing paradigm it has become the potential target to attackers. The importance of well-organized architecture and security roles have become greater with the growing popularity. Cloud Security: Attacks Techniques Tools and Challenges provides an in-depth technical description about various key essential aspects of cloud security. We have endeavored to provide a technical foundation that will be practically useful not just for students and independent researchers but also for professional cloud security analysts for conducting security procedures and all those who are curious in the field of cloud security The book offers comprehensive coverage of the most essential topics including: Basic fundamentals of Cloud Computing Cloud security concepts vulnerabilities security standards and reference models Cloud security goals key issues and privacy requirements Threat model detailed taxonomy of cloud attacks Attack feature analysis – case study A detailed taxonomy of IDS techniques and Cloud Intrusion Detection Systems (IDS) Attack and security tools LibVMI – case study Advanced approaches: Virtual Machine Introspection (VMI) and Hypervisor Introspection (HVI) Container security: threat model attacks and defense systems This book is intended for both academic and professional audience. It could also be used as a textbook for a semester course at undergraduate and post graduate level in Computer Science Information Technology Information Security and Information Science & Management. The book serves as basic reference volume for researchers in cloud security. It will be useful to practitioners cloud security team and the cloud security auditor as well. To get the most out of this book the reader should have a working knowledge of various operating system environments hypervisors cloud computing fundamentals programming languages like Python and a working knowledge of security tools. | Cloud Security Attacks Techniques Tools and Challenges

GBP 130.00
1

Practical Cloud Security A Cross-Industry View

Security and Privacy Trends in Cloud Computing and Big Data

The Extraordinary Gift of Being Ordinary Finding Happiness Right Where You Are

The Introduction to Private Cloud using Oracle Exadata and Oracle Database

The Cloud Computing Book The Future of Computing Explained

The Cloud Computing Book The Future of Computing Explained

This latest textbook from bestselling author Douglas E. Comer is a class-tested book providing a comprehensive introduction to cloud computing. Focusing on concepts and principles rather than commercial offerings by cloud providers and vendors The Cloud Computing Book: The Future of Computing Explained gives readers a complete picture of the advantages and growth of cloud computing cloud infrastructure virtualization automation and orchestration and cloud-native software design. The book explains real and virtual data center facilities including computation (e. g. servers hypervisors Virtual Machines and containers) networks (e. g. leaf-spine architecture VLANs and VxLAN) and storage mechanisms (e. g. SAN NAS and object storage). Chapters on automation and orchestration cover the conceptual organization of systems that automate software deployment and scaling. Chapters on cloud-native software cover parallelism microservices MapReduce controller-based designs and serverless computing. Although it focuses on concepts and principles the book uses popular technologies in examples including Docker containers and Kubernetes. Final chapters explain security in a cloud environment and the use of models to help control the complexity involved in designing software for the cloud. The text is suitable for a one-semester course for software engineers who want to understand cloud and for IT managers moving an organization’s computing to the cloud. | The Cloud Computing Book The Future of Computing Explained

GBP 44.99
1

Integration of IoT with Cloud Computing for Smart Applications

Cloud Native Networking Deep-Dive

Privacy and Security Challenges in Cloud Computing A Holistic Approach

Guiding Kids Through the Tough Moments Techniques to Build a Space Where Children Can Thrive

Guiding Kids Through the Tough Moments Techniques to Build a Space Where Children Can Thrive

Families classrooms all kinds of human groups are intricate evolving social and emotional worlds. They exist to protect and nourish but living in them is not always easy. And when one of us is not doing well none of us are. This makes them a delicate dynamic messy and endless work in progress. This book centres around those moments when we must get involved or call a child out on an unsafe careless or selfish action. Pitched well beyond the superficiality of making happy families or obedient classes this book dives into the colour and chaos of life. It provides guidance for navigating the commotion and the processes as well as the grit required in the tougher moments. It’s these moments that reveal what is really happening between children and their parents educators or carers. The book outlines a special set of attitudes and skills described as using our soft eyes and warm hearts. In this space we hold a child or teen accountable using an almost counterculture mindset. One that connects leadership and strength directly with kindness. This humane approach is more likely to leave young people in a position where they might want to feel responsible make amends and changes rather than being forced to. If we are to improve our relationships outcomes and futures with this generation of kids we must commit to truthful conversation reflection and preparation. Written by trusted author Mark Le Messurier an experienced teacher counsellor and public speaker this is an essential guide for parents carers teachers educational leaders and allied health professionals responsible for the wellbeing of young people. | Guiding Kids Through the Tough Moments Techniques to Build a Space Where Children Can Thrive

GBP 22.99
1

Integration of Cloud Computing with Emerging Technologies Issues Challenges and Practices

Security and Risk Analysis for Intelligent Cloud Computing Methods Applications and Preventions

Security and Risk Analysis for Intelligent Cloud Computing Methods Applications and Preventions

This edited book is a compilation of scholarly articles on the latest developments in the field of AI Blockchain and ML/DL in cloud security. This book is designed for security and risk assessment professionals and to help undergraduate postgraduate students research scholars academicians and technology professionals who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of cloud infrastructure and applications and shows how to make cloud infrastructure secure to combat threats and attacks and prevent data breaches. The chapters are designed with a granular framework starting with the security concepts followed by hands-on assessment techniques based on real-world studies. Readers will gain detailed information on cloud computing security that—until now—has been difficult to access. This book: • Covers topics such as AI Blockchain and ML/DL in cloud security. • Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread threats. • Explains the privacy aspects you need to consider in the cloud including how they compare with aspects considered in traditional computing models. • Examines security delivered as a service—a different facet of cloud security. | Security and Risk Analysis for Intelligent Cloud Computing Methods Applications and Preventions

GBP 110.00
1

Cloud-Based Music Production Sampling Synthesis and Hip-Hop

NoSQL Database for Storage and Retrieval of Data in Cloud

Protecting Information Assets and IT Infrastructure in the Cloud