|
|
Books > Computing & IT > Computer hardware & operating systems
This uniquely comprehensive book brings together the vast amount of
technical, economic, and political information and the analyses of
supercomputing that have hitherto been buried in the frequently
inaccessible "gray literature." Seventy-nine distinguished
participants in the second Frontiers of Supercomputing conference
offer perceptive and often controversial views on the emerging
computing environment in the United States. This title is part of
UC Press's Voices Revived program, which commemorates University of
California Press's mission to seek out and cultivate the brightest
minds and give them voice, reach, and impact. Drawing on a backlist
dating to 1893, Voices Revived makes high-quality, peer-reviewed
scholarship accessible once again using print-on-demand technology.
This title was originally published in 1994.
Data is an intrinsic part of our daily lives. Everything we do is a
data point. Many of these data points are recorded with the intent
to help us lead more efficient lives. We have apps that track our
workouts, sleep, food intake, and personal finance. We use the data
to make changes to our lives based on goals we have set for
ourselves. Businesses use vast collections of data to determine
strategy and marketing. Data scientists take data, analyze it, and
create models to help solve problems. You may have heard of
companies having data management teams or chief information
officers (CIOs) or chief data officers (CDOs), etc. They are all
people who work with data, but their function is more related to
vetting data and preparing it for use by data scientists. The jump
from personal data usage for self-betterment to mass data analysis
for business process improvement often feels bigger to us than it
is. In turn, we often think big data analysis requires tools held
only by advanced degree holders. Although advanced degrees are
certainly valuable, this book illustrates how it is not a
requirement to adequately run a data science project. Because we
are all already data users, with some simple strategies and
exposure to basic analytical software programs, anyone who has the
proper tools and determination can solve data science problems. The
process presented in this book will help empower individuals to
work on and solve data-related challenges. The goal of this book is
to provide a step-by-step guide to the data science process so that
you can feel confident in leading your own data science project. To
aid with clarity and understanding, the author presents a fictional
restaurant chain to use as a case study, illustrating how the
various topics discussed can be applied. Essentially, this book
helps traditional businesspeople solve data-related problems on
their own without any hesitation or fear. The powerful methods are
presented in the form of conversations, examples, and case studies.
The conversational style is engaging and provides clarity.
Intelligent systems are rapidly becoming a central focus of study
for researchers as they have the ability to learn and adapt during
their existence in order to achieve certain goals and objectives.
Intelligent Systems for Automated Learning and Adaptation: Emerging
Trends and Applications presents methodologies, architectures, and
approaches on experiential automated learning. This critical mass
of sought after research assembles the most intriguing and
innovative applications, advancements, and leading studies on the
methodology of intellectual computing.
Despite their widespread impact, computer networks that provide the
foundation for the World Wide Web and Internet have many
limitations. These networks are vulnerable to security threats,
break easily, and have a limited ability to respond to changing
conditions. Recent research on overcoming these limitations has
used biological systems for inspiration, resulting in the
development of biologically-inspired computer networks. These
networks are designed and developed using principles that are
commonly found in natural and biological systems. Biologically
Inspired Networking and Sensing: Algorithms and Architectures
offers current perspectives and trends in biologically-inspired
networking, exploring various approaches aimed at improving network
paradigms. Research contained within this compendium of papers and
surveys introduces studies in the fields of communication networks,
performance modeling, and distributed computing, as well as new
advances in networking.
As the future of software development in a global environment
continues to be influenced by the areas of service oriented
architecture (SOA) and cloud computing, many legacy applications
will need to migrate these environments to take advantage of the
benefits offered by the service environment. Migrating Legacy
Applications: Challenges in Service Oriented Architecture and Cloud
Computing Environments presents a closer look at the partnership
between service oriented architecture and cloud computing
environments while analyzing potential solutions to challenges
related to the migration of legacy applications. This reference is
essential for students and university scholars alike.
As the volume of global Internet traffic increases, the Internet is
beginning to suffer from a broad spectrum of performance-degrading
infrastructural limitations that threaten to jeopardize the
continued growth of new, innovative services. In answer to this
challenge, computer scientists seek to maintain the original design
principles of the Internet while allowing for a more dynamic
approach to the manner in which networks are designed and operated.
The Handbook of Research on Redesigning the Future of Internet
Architectures covers some of the hottest topics currently being
debated by the Internet community at large, including Internet
governance, privacy issues, service delivery automation, advanced
networking schemes, and new approaches to Internet
traffic-forwarding and path-computation mechanics. Targeting
students, network-engineers, and technical strategists, this book
seeks to provide a broad and comprehensive look at the next wave of
revolutionary ideas poised to reshape the very foundation of the
Internet as we know it.
Enterprise Architecture (EA) is the organizing logic for a firm's
core business processes and IT capabilities captured in a set of
policies and technical choices. ""Handbook of Enterprise Systems
Architecture in Practice"" provides a comprehensive and unified
reference overview of practical aspects of enterprise architecture.
This premier reference source includes a complete analysis of EA
theory, concepts, strategies, implementation challenges, and case
studies. The impact of effective enterprise architecture on IT
governance, IT portfolio management, IT risks, and IT outsourcing
are described in this authoritative reference tool. Researchers and
IT professionals will gain insights into how firms can maximize the
business value of IT and increase competitiveness.
As technology expands and evolves, one-dimensional, graphical user
interface (GUI) design becomes increasingly limiting and
simplistic. Designers must meet the challenge of developing new and
creative interfaces that adapt to meet human needs and
technological trends. HCI Beyond the GUI provides designers with
this know how by exploring new ways to reach users that involve all
of the human senses. Dr. Kortum gathers contributions from leading
human factors designers to present a single reference for
professionals, researchers, and students.
Explores the human factors involved in the design and
implementation of the nontraditional interfaces, detailing design
strategies, testing methodologies, and implementation techniques
Provides an invaluable resource for practitioners who design
interfaces for children, gamers and users with accessibility needs
Offers extensive case studies, examples and design guidelines
Society's growing dependence on information technology for survival
has elevated the importance of controlling and evaluating
information systems. A sound plan for auditing information systems
and the technology that supports them is a necessity for
organizations to improve the IS benefits and allow the organization
to manage the risks associated with technology. Auditing
Information Systems gives a global vision of auditing and control,
exposing the major techniques and methods. It provides guidelines
for auditing the crucial areas of IT--databases, security,
maintenance, quality, and communications.
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
* First book to address securing an entire Microsoft network from
Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for
securing Microsoft operating systems, applications, servers, and
databases.
* Companion Web site provides special chapter on designing and
implementing a disaster recover plan for a Microsoft network.
The Second Edition of the Best Damn Windows Server Book Period is
completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and
flexibility of your server infrastructure with built-in Web and
virtualization technologies; have more control over your servers
and web sites using new tools like IIS7, Windows Server Manager,
and Windows PowerShell; and secure your network with Network Access
Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services
7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection,
Federated Rights Management, and Read-Only Domain Controller
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power,
all the tools, and all the geekery of Linux is present in Mac OS X.
Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX
platform....Now, you can master the boot process, and Macintosh
forensic software.
* Look Back Before the Flood and Forward Through the 21st Century
Threatscape Back in the day, a misunderstanding of Macintosh
security was more or less industry-wide. Neither the administrators
nor the attackers knew much about the platform. Learn from Kevin
Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from
desktops, laptops, and servers into the world of consumer
technology (iPhones, iPods, and so on), what are the implications
for the further spread of malware and other security breaches? Find
out from David Harley.
* Malware Detection and the Mac Understand why the continuing
insistence of vociferous Mac zealots that it "can't happen here" is
likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick
graphical interface, and near-bulletproof reliability, Apple's Mac
OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure
and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use
the information obtained during a WarDrive, to successfully
penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through
exploitation techniques, tricks, and features of both OS X Tiger
and Leopard, using real-world scenarios for explaining and
demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from
the bleak days of OS9. THere is now a wide array of encryption
choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the
security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends
|
|