|
|
Books > Computing & IT > Social & legal aspects of computing > General
Explore the suite of apps that enhance productivity and promote
efficient collaboration in your business Key Features Set up your
own project in Google Workspace and improve your ability to
interact with different services Understand how a combination of
options can help businesses audit their data to be highly secure
Deploy Google Workspace, configure users, and migrate data using
Google Workspace Book DescriptionGoogle Workspace has evolved from
individual Google services to a suite of apps that improve
productivity and promote efficient collaboration in an enterprise
organization. This book takes you through the evolution of Google
Workspace, features included in each Workspace edition, and various
core services, such as Cloud Identity, Gmail, and Calendar. You'll
explore the functionality of each configuration, which will help
you make informed decisions for your organization. Later chapters
will show you how to implement security configurations that are
available at different layers of Workspace and also how Workspace
meets essential enterprise compliance needs. You'll gain a
high-level overview of the core services available in Google
Workspace, including Google Apps Script, AppSheet, and Google Cloud
Platform. Finally, you'll explore the different tools Google offers
when you're adopting Google Cloud and migrating your data from
legacy mail servers or on-premises applications over to cloud
servers. By the end of this Google Workspace book, you'll be able
to successfully deploy Google Workspace, configure users, and
migrate data, thereby helping with cloud adoption. What you will
learn Manage and configure users in your organization's Workspace
account Protect email messages from phishing attacks Explore how to
restrict or allow certain Marketplace apps for your users Manage
all endpoints connecting to Google Workspace Understand the
differences between Marketplace apps and add-ons that access Drive
data Manage devices to keep your organization's data secure Migrate
to Google Workspace from existing enterprise collaboration tools
Who this book is forThis book is for admins as well as home users,
business users, and power users looking to improve their efficiency
while using Google Workspace. Basic knowledge of using Google
Workspace services is assumed.
Master the technique of using ESP32 as an edge device in any IoT
application where wireless communication can make life easier Key
Features Gain practical experience in working with ESP32 Learn to
interface various electronic devices such as sensors, integrated
circuits (ICs), and displays Apply your knowledge to build
real-world automation projects Book DescriptionDeveloping IoT
Projects with ESP32 provides end-to-end coverage of secure data
communication techniques from sensors to cloud platforms that will
help you to develop production-grade IoT solutions by using the
ESP32 SoC. You'll learn how to employ ESP32 in your IoT projects by
interfacing with different sensors and actuators using different
types of serial protocols. This book will show you how some
projects require immediate output for end-users, and cover
different display technologies as well as examples of driving
different types of displays. The book features a dedicated chapter
on cybersecurity packed with hands-on examples. As you progress,
you'll get to grips with BLE technologies and BLE mesh networking
and work on a complete smart home project where all nodes
communicate over a BLE mesh. Later chapters will show you how IoT
requires cloud connectivity most of the time and remote access to
smart devices. You'll also see how cloud platforms and third-party
integrations enable endless possibilities for your end-users, such
as insights with big data analytics and predictive maintenance to
minimize costs. By the end of this book, you'll have developed the
skills you need to start using ESP32 in your next wireless IoT
project and meet the project's requirements by building effective,
efficient, and secure solutions. What you will learn Explore
advanced use cases like UART communication, sound and camera
features, low-energy scenarios, and scheduling with an RTOS Add
different types of displays in your projects where immediate output
to users is required Connect to Wi-Fi and Bluetooth for local
network communication Connect cloud platforms through different IoT
messaging protocols Integrate ESP32 with third-party services such
as voice assistants and IFTTT Discover best practices for
implementing IoT security features in a production-grade solution
Who this book is forIf you are an embedded software developer, an
IoT software architect or developer, a technologist, or anyone who
wants to learn how to use ESP32 and its applications, this book is
for you. A basic understanding of embedded systems, programming,
networking, and cloud computing concepts is necessary to get
started with the book.
Cryptocurrency & Social Media Have Married and This is What It
Looks Like Social media is a multi-billion-dollar industry where
the platforms profit from user-generated content. Cryptocurrencies
have arrived to end the exploitation. Cryptosocial: How
Cryptocurrencies Are Changing Social Media surveys the history of
social media and cryptocurrencies to show how these two unrelated
technologies had a chance meeting that is changing the world. If
you're one of the millions of people growing tired of legacy social
media and how they take advantage of their own users, this book
will open your eyes to the alternatives offering greater happiness,
more freedom, and better personal and financial security. Read this
book and you'll learn: What cryptosocial is all about. Which
platforms and protocols you should pay attention to. Why
cryptosocial media is the best alternative for Facebook, Twitter,
and Snapchat. How to start using cryptosocial media. What you need
to participate in decentralized social media platforms. And how you
can profit from your own content, gain more control over your
identity, and maintain security over your online data and personal
assets.
The lockdowns and shutdowns due to COVID-19 encouraged accelerated
experimental with new organization practices. The impacts of the
pandemic were very strong, both in times of containment, the
loosening of restrictions, and recovery periods. Whether in
collective and individual commitment, health, and the rapid
adoption of new working methods, companies were challenged to
adjust very quickly to cope with the emergency. With the
interconnection of health, economic, social, and environmental
crises, the situation changed the market and economy, and the
lasting impacts of this unprecedented and intense experience must
be examined. This book explores the digital ecosystem through a
historical, sociological, political, and economic approach. It
discusses new organizational practices such as remote work, digital
culture, and the implementation of transformation strategy using
appropriate technological tools. This book deciphers the new
paradigm proposed by the digital era and provides theoretical and
empirical frameworks in the field of economics and technology.
The shortcomings of modern cryptography and its weaknesses against
computers that are becoming more powerful necessitate serious
consideration of more robust security options. Quantum cryptography
is sound, and its practical implementations are becoming more
mature. Many applications can use quantum cryptography as a
backbone, including key distribution, secure direct communications,
large prime factorization, e-commerce, e-governance, quantum
internet, and more. For this reason, quantum cryptography is
gaining interest and importance among computer and security
professionals. Quantum Cryptography and the Future of Cyber
Security is an essential scholarly resource that provides the
latest research and advancements in cryptography and cyber security
through quantum applications. Highlighting a wide range of topics
such as e-commerce, machine learning, and privacy, this book is
ideal for security analysts, systems engineers, software security
engineers, data scientists, vulnerability analysts, professionals,
academicians, researchers, security professionals, policymakers,
and students.
|
You may like...
Facebook
Dana Kilroy
Fold-out book or chart
R229
Discovery Miles 2 290
|