![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > General
Cloud Computing in Ocean and Atmospheric Sciences provides the latest information on this relatively new platform for scientific computing, which has great possibilities and challenges, including pricing and deployments costs and applications that are often presented as primarily business oriented. In addition, scientific users may be very familiar with these types of models and applications, but relatively unfamiliar with the intricacies of the hardware platforms they use. The book provides a range of practical examples of cloud applications that are written to be accessible to practitioners, researchers, and students in affiliated fields. By providing general information on the use of the cloud for oceanographic and atmospheric computing, as well as examples of specific applications, this book encourages and educates potential users of the cloud. The chapters provide an introduction to the practical aspects of deploying in the cloud, also providing examples of workflows and techniques that can be reused in new projects.
Sustainable Wireless Network-on-Chip Architectures focuses on developing novel Dynamic Thermal Management (DTM) and Dynamic Voltage and Frequency Scaling (DVFS) algorithms that exploit the advantages inherent in WiNoC architectures. The methodologies proposed-combined with extensive experimental validation-collectively represent efforts to create a sustainable NoC architecture for future many-core chips. Current research trends show a necessary paradigm shift towards green and sustainable computing. As implementing massively parallel energy-efficient CPUs and reducing resource consumption become standard, and their speed and power continuously increase, energy issues become a significant concern. The need for promoting research in sustainable computing is imperative. As hundreds of cores are integrated in a single chip, designing effective packages for dissipating maximum heat is infeasible. Moreover, technology scaling is pushing the limits of affordable cooling, thereby requiring suitable design techniques to reduce peak temperatures. Addressing thermal concerns at different design stages is critical to the success of future generation systems. DTM and DVFS appear as solutions to avoid high spatial and temporal temperature variations among NoC components, and thereby mitigate local network hotspots.
GPU-based Parallel Implementation of Swarm Intelligence Algorithms combines and covers two emerging areas attracting increased attention and applications: graphics processing units (GPUs) for general-purpose computing (GPGPU) and swarm intelligence. This book not only presents GPGPU in adequate detail, but also includes guidance on the appropriate implementation of swarm intelligence algorithms on the GPU platform. GPU-based implementations of several typical swarm intelligence algorithms such as PSO, FWA, GA, DE, and ACO are presented and having described the implementation details including parallel models, implementation considerations as well as performance metrics are discussed. Finally, several typical applications of GPU-based swarm intelligence algorithms are presented. This valuable reference book provides a unique perspective not possible by studying either GPGPU or swarm intelligence alone. This book gives a complete and whole picture for interested readers and new comers who will find many implementation algorithms in the book suitable for immediate use in their projects. Additionally, some algorithms can also be used as a starting point for further research.
A database management system (DBMS) is a collection of programs that enable users to create and maintain a database; it also consists of a collection of interrelated data and a set of programs to access that data. Hence, a DBMS is a general-purpose software system that facilitates the processes of defining, constructing, and manipulating databases for various applications. The primary goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving and storing database information. It is an interface between the user of application programs, on the one hand, and the database, on the other. The objective of Database Management System: An Evolutionary Approach, is to enable the learner to grasp a basic understanding of a DBMS, its need, and its terminologies discern the difference between the traditional file-based systems and a DBMS code while learning to grasp theory in a practical way study provided examples and case studies for better comprehension This book is intended to give under- and postgraduate students a fundamental background in DBMSs. The book follows an evolutionary learning approach that emphasizes the basic concepts and builds a strong foundation to learn more advanced topics including normalizations, normal forms, PL/SQL, transactions, concurrency control, etc. This book also gives detailed knowledge with a focus on entity-relationship (ER) diagrams and their reductions into tables, with sufficient SQL codes for a more practical understanding.
The Security Hippie is Barak Engel's second book. As the originator of the "Virtual CISO" (fractional security chief) concept, he has served as security leader in dozens of notable organizations, such as Mulesoft, Stubhub, Amplitude Analytics, and many others. The Security Hippie follows his previous book, Why CISOs Fail, which became a sleeper hit, earning a spot in the Cybercannon project as a leading text on the topic of information security management. In this new book, Barak looks at security purely through the lens of story-telling, sharing many and varied experiences from his long and accomplished career as organizational and thought leader, and visionary in the information security field. Instead of instructing, this book teaches by example, sharing many real situations in the field and actual events from real companies, as well as Barak's related takes and thought processes. An out-of-the-mainstream, counterculture thinker - Hippie - in the world of information security, Barak's rich background and unusual approach to the field come forth in this book in vivid color and detail, allowing the reader to sit back and enjoy these experiences, and perhaps gain insights when faced with similar issues themselves or within their organizations. The author works hard to avoid technical terms as much as possible, and instead focus on the human and behavioral side of security, finding the humor inherent in every anecdote and using it to demystify the field and connect with the reader. Importantly, these are not the stories that made the news; yet they are the ones that happen all the time. If you've ever wondered about the field of information security, but have been intimidated by it, or simply wished for more shared experiences, then The Security Hippie is the perfect way to open that window by accompanying Barak on some of his many travels into the land of security.
Digital transformation (DT) has become a buzzword. Every industry segment across the globe is consciously jumping toward digital innovation and disruption to get ahead of their competitors. In other words, every aspect of running a business is being digitally empowered to reap all the benefits of the digital paradigm. All kinds of digitally enabled businesses across the globe are intrinsically capable of achieving bigger and better things for their constituents. Their consumers, clients, and customers will realize immense benefits with real digital transformation initiatives and implementations. The much-awaited business transformation can be easily and elegantly accomplished with a workable and winnable digital transformation strategy, plan, and execution. There are several enablers and accelerators for realizing the much-discussed digital transformation. There are a lot of digitization and digitalization technologies available to streamline and speed up the process of the required transformation. Industrial Internet of Things (IIoT) technologies in close association with decisive advancements in the artificial intelligence (AI) space can bring forth the desired transitions. The other prominent and dominant technologies toward forming digital organizations include cloud IT, edge/fog computing, real-time data analytics platforms, blockchain technology, digital twin paradigm, virtual and augmented reality (VR/AR) techniques, enterprise mobility, and 5G communication. These technological innovations are intrinsically competent and versatile enough to fulfill the varying requirements for establishing and sustaining digital enterprises. Enterprise Digital Transformation: Technology, Tools, and Use Cases features chapters on the evolving aspects of digital transformation and intelligence. It covers the unique competencies of digitally transformed enterprises, IIoT use cases, and applications. It explains promising technological solutions widely associated with digital innovation and disruption. The book focuses on setting up and sustaining smart factories that are fulfilling the Industry 4.0 vision that is realized through the IIoT and allied technologies.
Communications, Signal Processing, and Systems is a collection of contributions coming out of the International Conference on Communications, Signal Processing, and Systems (CSPS) held August 2012. This book provides the state-of-art developments of Communications, Signal Processing, and Systems, and their interactions in multidisciplinary fields, such as audio and acoustic signal processing. The book also examines Radar Systems, Chaos Systems, Visual Signal Processing and Communications and VLSI Systems and Applications. Written by experts and students in the fields of Communications, Signal Processing, and Systems.
Assistive Technology Intervention in Healthcare focuses on various applications of intelligent techniques in biomedical engineering and health informatics. It aims to create awareness about disability reduction and recovery of accidental disability with the help of various rehabilitative systems. Novel technologies in disability treatment, management and assistance, including healthcare devices and their utility from home to hospital, are described. The book deals with simulation, modeling, measurement, control, analysis, information extraction and monitoring of physiological data in clinical medicine and biology. Features Covers the latest evolutionary approaches to solve optimization problems in the biomedical engineering field Explains machine learning-based approaches to improvement in health engineering areas Reviews the IoT, cloud computing and data analytics in healthcare informatics Discusses modeling and simulations in the design of biomedical equipment Explores monitoring of physiological data This book is aimed at researchers and graduate students in biomedical engineering, clinical engineering and bioinformatics.
Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, "UCLA, USA" This book discusses and explores the concept of "mobile cloud," creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A "mobile cloud "is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile users in very different ways and for various purposes. The book provides many stimulating examples of resource-sharing applications. Enabling technologies for "mobile clouds "are also discussed, highlighting the key role of network coding. "Mobile clouds "have the potential to enhance communications performance, improve utilization of resources and create flexible platforms to share resources in very novel ways. Energy efficient aspects of "mobile clouds "are discussed in detail, showing how being cooperative can bring mobile users significant energy saving. The book presents and discusses multiple examples of "mobile" "clouds "applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept of resource sharing takes a wider and deeper meaning, creating the foundations for a global real-time multidimensional resource pool, the underlying infrastructure for shareconomy. Above all, this is an inspiring book for anyone who is concerned about the future of wireless and mobile communications networks and their relationship with Social networks. Key Features: Provides fundamental ideas and promising concepts for exploiting opportunistic cooperation and cognition in wireless and mobile networksGives clear definitions of "mobile clouds "from different perspectivesAssociates mobile and wireless networks with social networks, creating a vast fertile ground for novel developments in both research and practical applicationsConsiders research directions, emerging trends and visions This book is an excellent resource for wireless/networking researchers in industry and academia, students and mobile phone programmers. Managers interested in new technology developments, service providers, network operators, and those working in the gaming industry will also find the book insightful.
This book offers a comprehensive overview of basic communication and networking technologies. It focuses on emerging technologies, such as Software-Defined Network (SDN)-based ad hoc networks, 5G, Machine Learning, and Deep Learning solutions for communication and networking, Cloud Computing, etc. It also includes discussions on practical and innovative applications, including Network Security, Smart Cities, e-health, and Intelligent Systems. Future Trends in 5G and 6G: Challenges, Architecture, and Applications addresses several key issues in SDN energy-efficient systems, the Internet of Things, Big Data, Cloud Computing and Virtualization, Machine Learning, Deep Learning, Cryptography, and 6G wireless technology and its future. It provides students, researchers, and practicing engineers with an expert guide to the fundamental concepts, challenges, architecture, applications, and state-of-the-art developments in communication and networking.
The agile transformation is an act of transforming an organization's form or nature gradually to one that can embrace and thrive in a flexible, collaborative, self-organizing, and fast-changing environment. It seems like most of the companies starting an agile transformation never reach the goal of agility, but there are those few that truly become agile and reap incredible benefits by utilizing DevOps as well. This book introduces the theory and practice of the "double-flywheels model" of Continuous Delivery 2.0: Discovery Loop, which allows information technology (IT) organizations to help businesses figure out the most efficacious ways to develop. Additionally, it explores applications of the Verification Loop that allows IT organizations to deliver value quickly and safely with high quality. Along the way, the book provides an array of insights and case studies that dive into all the aspects of software delivery, and how to implement Continuous Delivery in the most economical way for long-run business development. Features Organization culture and software architecture Business requirement management Pipeline and tooling Branching and releasing strategy Automation strategy Configuration and artefacts management Deployment and production healthy The case studies at the end of the book-scenarios in which the author was personally involved-are explored in depth and meticulously detailed in order to represent typical agile transition scenarios that will benefit all readers.
What debates have caused spectrum policy to change course and which will determine its future direction? This book examines these issues through a series of chapters from a range of notable experts. The backdrop is a period of turbulent change in what was once a quiet backwater. The past quarter century has seen wireless connectivity go from nice-to-have luxury to the cornerstone of success as nations battle for leadership of the digital economy. The change has been reflected in the crucial role now played by market's mechanisms in a field once dominated by administrative decisions. Spectrum policy's goals have moved far beyond the efficient use of the airwaves to include encouraging economic development, investment, innovation, sustainability and digital inclusivity. Are historic procedures still appropriate in the face of this multiplicity of demands? Are market mechanisms like auctions still the best way to deliver what has become essential infrastructure? Does the process of international coordination need to change? Is spectrum policy's effectiveness limited by the power of global economic forces? Can it reduce rather than add to global warming? Where does 6G and AI fit in? Is public perception the new spectrum policy battle ground? These are all issues examined in The Debates Shaping Spectrum Policy.
The future has already begin. The banking industry needs to adjust, or it will disappear in the next decade. With the help of 5G, next-generation intelligent ATM-like devices will have highly integrated functions and use technologies such as artificial intelligences-assisted self-service contactless interfaces with facial recognition and digital signatures. This book focuses on new experiences that clients can expect when connected to a 5G network with a 5G device. By 2022 we hope that 5G will: Drive accelerated mBanking growth Power augmented reality /virtual reality Make Video shopping experiences more widespread and compelling Enable banks to deploy highly personalized customer service experiences Support time-sensitive banking applications, like online stock trading where milliseconds can determine a gain or loss Improve security and fraud prevention bycomputing and exchanging more data traveling between parties in real-time Enhance mPOS transactions and utilization. 5G holds the potential to accelerate mobile point of sale (MPOS) transaction processing time and improve connectivity In order to explore these topics, this book covers: * Decentralization of the banks * Banking without banks * 5G will change the modern banking industry * Blockchain adoption by the banking industry
Whether you're taking the CPHIMS exam or simply want the most current and comprehensive overview in healthcare information and management systems today, this completely revised and updated fourth edition has it all. But for those preparing for the CPHIMS exam, this book is also an ideal study partner. The content reflects the outline of exam topics covering healthcare and technology environments; clinical informatics; analysis, design, selection, implementation, support, maintenance, testing, evaluation, privacy and security; and management and leadership. Candidates can challenge themselves with the sample multiple-choice questions given at the end of the book. The benefits of CPHIMS certification are broad and far-reaching. Certification is a process that is embraced in many industries, including healthcare information and technology. CPHIMS is recognized as the 'gold standard' in healthcare IT because it is developed by HIMSS, has a global focus and is valued by clinicians and non-clinicians, management and staff positions and technical and nontechnical individuals. Certification, specifically CPHIMS certification, provides a means by which employers can evaluate potential new hires, analyze job performance, evaluate employees, market IT services and motivate employees to enhance their skills and knowledge. Certification also provides employers with the evidence that the certificate holders have demonstrated an established level of job-related knowledge, skills and abilities and are competent practitioners of healthcare IT.
As transactions and other business functions move online and grow more popular every year, the finance and banking industries face increasingly complex data management and identity theft and fraud issues. AI can bring many financial and business functions to the next level, as systems using deep learning technologies are able to analyze patterns and spot suspicious behavior and potential fraud. In this volume, the focus is on the application of artificial intelligence in finance, business, and related areas. The book presents a selection of chapters presenting cutting-edge research on current business practices in finance and management. Topics cover the use of AI in e-commerce systems, financial services, fraud prevention, identifying loan-eligible customers, online business, Facebook social commerce, insurance industry, online marketing, and more.
In this book, first published in 1983, experts in US national, state, and regional network associations provide stimulating discussions of their experiences, problems, and successes. This volume is based on the symposium, 'Networking: Where From Here?'.
Features: A systematic and comprehensive understanding of the Block chain technology and the potential in Healthcare. How security and privacy concerns of healthcare data can be addressed using Blockchain Technology. Concept of smart contracts for performing advance level scripting to create a blockchain network for providing a platform for the development of decentralized applications is discussed Chapter on role of blockchain based insurance application using Ethereum/Hyperledger is included Use cases of blockchain for various aspects of drug manufacturing and pharma supply chain..
The Cloud is an advanced and fast-growing technology in the current era. The computing paradigm has changed drastically. It provided a new insight into the computing world with new characteristics including on-demand, virtualization, scalability and many more. Utility computing, virtualization and service-oriented architecture (SoA) are the key characteristics of Cloud computing. The Cloud provides distinct IT services over the web on a pay-as-you-go and on-demand basis. Cloud Computing Technologies for Smart Agriculture and Healthcare covers Cloud management and its framework. It also focuses how the Cloud computing framework can be integrated with applications based on agriculture and healthcare. Features: Contains a systematic overview of the state-of-the-art, basic theories, challenges, implementation, and case studies on Cloud technology Discusses of recent research results and future advancement in virtualization technology Focuses on core theories, architectures, and technologies necessary to develop and understand the computing models and its applications Includes a wide range of examples that uses Cloud technology for increasing farm profitability and sustainable production Presents the farming industry with Cloud technology that allows it toaggregate, analyze, and share data across farms and the world Includes Cloud-based electronic health records with privacy and security features Offers suitable IT solutions to the global issues in the domain of agriculture and health care for society This reference book is aimed at undergraduate and post-graduate programs. It will also help research scholars in their research work. This book also benefits like scientists, business innovators, entrepreneurs, professionals, and practitioners.
Digitalization of Higher Education using Cloud Computing: Implications, Risk, and Challenges provides an insight into the latest technology and tools being used to explore learning in Higher Educational Institutions (HEIs). Cloud computing, being an up-and-coming technology, integrates with academia and industry, thereby enhancing the quality of education. The opportunities and challenges faced by HEIs in recent times due to technological disruptions have forced both academia and industry to realign their strategies for survival and growth. With the acceleration of cloud computing in higher education, it has now become imperative for educators to constantly upskill and reskill in order to meet the requirements of the future of work, particularly in the digital age. Technological advancement is an unstoppable wave and the lack of relevant skills to handle the disruptions in higher education will become a huge challenge if not addressed promptly. This is the new phase of Education 4.0 where HEIs are aligning themselves using cloud computing implications, and thus are preparing both faculties and students to embrace the changes happening in the teaching and learning processes. This book focuses on multi-faceted strategies to be adopted by HEIs to deal with the emerging issues related to teaching-learning processes using cloud computing, technological interventions, curriculum overhaul, experiential learning, multi-disciplinary approaches, and continuous innovations and digitalization. The book offers comprehensive coverage of many academic areas, with the most essential topics including: * Pedagogies in digital education using a cloud environment * Risks and challenges in cloud platforms for teaching and learning * Collaborative and group learning in a cloud environment * Enhancing quality of education using e-learning methodologies The sections in this book are "Cloud Enabled Digitalization of Higher Education" and "Innovations and Applications of Digitalization of Higher Education: A Cloud Perspective". The book will be useful for undergraduates, graduates, academicians, scholars, and policy makers. It will help readers acquire skills for a smooth transition from face-to-face teaching to cloud-based teaching.
Incident response is critical for the active defense of any network, and incident responders need up-to-date, immediately applicable techniques with which to engage the adversary. Applied Incident Response details effective ways to respond to advanced attacks against local and remote network resources, providing proven response techniques and a framework through which to apply them. As a starting point for new incident handlers, or as a technical reference for hardened IR veterans, this book details the latest techniques for responding to threats against your network, including: Preparing your environment for effective incident response Leveraging MITRE ATT&CK and threat intelligence for active network defense Local and remote triage of systems using PowerShell, WMIC, and open-source tools Acquiring RAM and disk images locally and remotely Analyzing RAM with Volatility and Rekall Deep-dive forensic analysis of system drives using open-source or commercial tools Leveraging Security Onion and Elastic Stack for network security monitoring Techniques for log analysis and aggregating high-value logs Static and dynamic analysis of malware with YARA rules, FLARE VM, and Cuckoo Sandbox Detecting and responding to lateral movement techniques, including pass-the-hash, pass-the-ticket, Kerberoasting, malicious use of PowerShell, and many more Effective threat hunting techniques Adversary emulation with Atomic Red Team Improving preventive and detective controls
is the first book to set out a range of machine learning methods for efficient resource management in a large distributed network of clouds. predictive analytics is an integral part of efficient cloud resource management, and this book gives a future research direction to researchers in this domain. it is written by leading international researchers.
The widespread adoption of smartphones has led to an explosion of mobile social media data, more than a billion messages per day that continuously track location, content, and time. Social Media in the Contemporary City focuses on the effects of social media on local communities and urban space in a variety of political and economic settings related to social activism, informal economic activity, public art, and global extremism. The book covers events ranging from Banksy art installations, mobile food trucks, and underground restaurants, to a Black Lives Matter protest, the Christchurch mosque shootings, and the Pulse nightclub shooting. The interplay between urban space, local community, and social media in each case study requires diverse methodologies that are both computational (i.e. machine learning, social network analysis, and natural language processing) and ethnographic (i.e. semi-structured interviews, thematic analysis, and site analysis). The book views social media not as a replacement for the local community or urban space but rather as a translation of the uses and meanings of all three realms. The book will be of interest to students, researchers, and instructors in a number of disciplines including urban design/planning, media studies, geography, and communications.
In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future. Amidst the ongoing digital revolution, widespread educational reform, and the most significant global pandemic of our lifetimes, we are at a pivotal time in history. Transformative Digital Technology for Effective Workplace Learning explores the technological developments that are rapidly unfolding in the workplace and those that support workplace training. What emerges is that the rate of change and the possibilities for improvement are more extensive than many of us might have suspected. From artificial intelligence to virtual reality, from data analytics, to adaptive learning, there is the capacity for significant innovation and opportunity if harnessed in the right ways. The book offers an overview of several critical issues that face the future of the workplace and examines them through the lens of lifelong learning. The book begins by conveying the current impacts on the workplace and how the internal function of learning and development has evolved. It then considers the eight learning imperatives that drive workplace learning and then looks at the future workplace. Exploring technological frameworks for digitally enhanced workplace learning, the book takes a deep dive into the capabilities of immersive technologies, as well as into the insights enabled through learning analytics. The goal of this book is not to merely describe technological advancements in the workplace but instead, to challenge the status quo and think critically about the future that lies ahead. One aim is to have business leaders understand the necessity for ongoing workplace learning. Another is that individuals appreciate that lifelong learning is the new social norm. Ongoing education allows people to become more open to change and less anxious about new experiences. Developing a growth mindset and adopting a company culture that says everyone can learn new things and continue to improve their performance will become the standard. Most importantly, as the business world is reconfigured before our very eyes, ongoing learning must become an economic imperative.
In a world bursting with new information, ideas, opportunities, and technological advancements, it is time to rethink how continuous learning shapes our future. Amidst the ongoing digital revolution, widespread educational reform, and the most significant global pandemic of our lifetimes, we are at a pivotal time in history. Transformative Digital Technology for Effective Workplace Learning explores the technological developments that are rapidly unfolding in the workplace and those that support workplace training. What emerges is that the rate of change and the possibilities for improvement are more extensive than many of us might have suspected. From artificial intelligence to virtual reality, from data analytics, to adaptive learning, there is the capacity for significant innovation and opportunity if harnessed in the right ways. The book offers an overview of several critical issues that face the future of the workplace and examines them through the lens of lifelong learning. The book begins by conveying the current impacts on the workplace and how the internal function of learning and development has evolved. It then considers the eight learning imperatives that drive workplace learning and then looks at the future workplace. Exploring technological frameworks for digitally enhanced workplace learning, the book takes a deep dive into the capabilities of immersive technologies, as well as into the insights enabled through learning analytics. The goal of this book is not to merely describe technological advancements in the workplace but instead, to challenge the status quo and think critically about the future that lies ahead. One aim is to have business leaders understand the necessity for ongoing workplace learning. Another is that individuals appreciate that lifelong learning is the new social norm. Ongoing education allows people to become more open to change and less anxious about new experiences. Developing a growth mindset and adopting a company culture that says everyone can learn new things and continue to improve their performance will become the standard. Most importantly, as the business world is reconfigured before our very eyes, ongoing learning must become an economic imperative. |
![]() ![]() You may like...
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,491
Discovery Miles 14 910
The Host in the Machine - Examining the…
Angela Thomas-Jones
Paperback
R1,351
Discovery Miles 13 510
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,490
Discovery Miles 14 900
Opinion Mining and Text Analytics on…
Pantea Keikhosrokiani, Moussa Pourya Asl
Hardcover
R10,307
Discovery Miles 103 070
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|