|
Books > Computing & IT
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Harden your business against internal and external cybersecurity
threats with a single accessible resource. In 8 Steps to Better
Security: A Simple Cyber Resilience Guide for Business,
cybersecurity researcher and writer Kim Crawley delivers a grounded
and practical roadmap to cyber resilience in any organization.
Offering you the lessons she learned while working for major tech
companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and
Venafi, Crawley condenses the essence of business cybersecurity
into eight steps. Written to be accessible to non-technical
businesspeople as well as security professionals, and with insights
from other security industry leaders, this important book will walk
you through how to: Foster a strong security culture that extends
from the custodial team to the C-suite Build an effective security
team, regardless of the size or nature of your business Comply with
regulatory requirements, including general data privacy rules and
industry-specific legislation Test your cybersecurity, including
third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople,
and managers at any level, 8 Steps to Better Security is also a
must-have resource for companies of all sizes, and in all
industries.
As digital technology continues to revolutionize the world,
businesses are also evolving by adopting digital technologies such
as artificial intelligence, digital marketing, and analytical
methods into their daily practices. Due to this growing adoption,
further study on the potential solutions modern technology provides
to businesses is required to successfully apply it across
industries. AI-Driven Intelligent Models for Business Excellence
explores various artificial intelligence models and methods for
business applications and considers algorithmic approaches for
business excellence across numerous fields and applications.
Covering topics such as business analysis, deep learning, machine
learning, and analytical methods, this reference work is ideal for
managers, business owners, computer scientists, industry
professionals, researchers, scholars, practitioners, academicians,
instructors, and students.
While plenty of educational material exists for beginning and
advanced JavaScript developers, resources for intermediate-level
engineers are scarce. Yet this is the career step where many
developers often get stuck. With this practical book, you'll learn
how to apply JavaScript theory in real projects, manage every stage
of the software development lifecycle, and move your career
forward. Author Milecia McGregor takes frontend, backend, and full
stack engineers through all of the steps and considerations of
senior JavaScript engineers, including making decisions based on
product and user feedback. By the time you finish this book, you'll
know how to create a production-level app for any size system you
face. Understand how JavaScript works under the hood, including how
a real software development lifecycle works Learn how to make
decisions when building a long-term maintainable JavaScript project
Explore the software development lifecycle from project ideation to
production deployment with JavaScript code Gain a better
understanding of complex JavaScript issues such as closures,
generators, and the event loop Learn when you should take specific
approaches to keep a project moving on the technical side
Because it continually implements entrepreneurial creativity and
innovative business models, the economic landscape is ever-changing
in today's globalized world. As consumers become more willing to
accept new strategic trends, this has led to the emergence of
disruptive technologies. Since this equipment has an insufficient
amount of information and high risks, it is necessary to assess the
potential of disruptive technologies in the commercial environment.
Impact of Disruptive Technologies on the Sharing Economy provides
emerging research exploring the theoretical and practical aspects
of disruptive technologies and knowledge-based entrepreneurial
efforts and applications within management, business, and
economics. Featuring coverage on a broad range of topics such as
consumer ethics, corporate governance, and insurance issues, this
book is ideally designed for IT specialists, IT consultants,
software developers, computer engineers, managers, executives,
managing directors, students, professors, scientists,
professionals, industry practitioners, academicians, and
researchers seeking current research on the consequences of
disruptive technologies.
Recent years have witnessed the rise of analysis of real-world
massive and complex phenomena in graphs; to efficiently solve these
large-scale graph problems, it is necessary to exploit high
performance computing (HPC), which accelerates the innovation
process for discovery and invention of new products and procedures
in network science. Creativity in Load-Balance Schemes for
Multi/Many-Core Heterogeneous Graph Computing: Emerging Research
and Opportunities is a critical scholarly resource that examines
trends, challenges, and collaborative processes in emerging fields
within complex network analysis. Featuring coverage on a broad
range of topics such as high-performance computing, big data,
network science, and accelerated network traversal, this book is
geared towards data analysts, researchers, students in information
communication technology (ICT), program developers, and academics.
A fully updated version of Pearson's bestselling Brilliant Windows
titles, covering Windows 10 - the latest release of the widely-used
Microsoft operating system. Brilliant Windows 10 gives you the
information you need easily and without fuss. It guides you through
all tasks and applications using a highly visual, full-colour,
step-by-step approach and tells you exactly what you need to know,
when you need to know it. For the first time, this book comes with
FREE downloadable bonus material. An extra 140 pages, which cover
chapters on advanced subjects like customising Windows, maintaining
your computer and managing your hardware as well as the key, new
features of Office 2016. Spend less time reading and more time
doing with a simple step-by-step approach to beginner and
intermediate level tasks. Brilliant guides provide the quick,
easy-to-access information that you need: Numbered steps guide you
through each task or problem Numerous colour screenshots illustrate
each step Cross reference boxes point you to related tasks and
information in the book "Did you know ?..." sections alert you to
relevant expert tips, tricks and advice
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
Because trainees need to learn about the underlying technologies to
use automation safely and efficiently, the development of automated
aviation systems training is a growing challenge. Task analysis has
been singled out as the basis of the training, but it can be more
time-consuming than traditional development techniques. Cases on
Modern Computer Systems in Aviation is an essential reference
source that covers new information technology use in aviation
systems to streamline the cybersecurity, decision-making, planning,
and design processes within the aviation industry. Featuring
coverage on a broad range of topics such as computer systems in
aviation, artificial intelligence, software-defined networking
(SDN), air navigation systems, decision support systems (DSS), and
more, this publication is ideally designed for aviation specialists
and industry professionals, technicians, practitioners,
researchers, and academicians seeking current research on modern
modeling approaches to streamline management in aviation.
|
You may like...
Rail Journeys
David Ross
Paperback
R302
R277
Discovery Miles 2 770
Homecoming
Kate Morton
Paperback
R385
R349
Discovery Miles 3 490
|