|
|
Showing 1 - 5 of
5 matches in All Departments
The next big area within the information and communication
technology field is Artificial Intelligence (AI). The industry is
moving to automate networks, cloud-based systems (e.g.,
Salesforce), databases (e.g., Oracle), AWS machine learning (e.g.,
Amazon Lex), and creating infrastructure that has the ability to
adapt in real-time to changes and learn what to anticipate in the
future. It is an area of technology that is coming faster and
penetrating more areas of business than any other in our history.
AI will be used from the C-suite to the distribution warehouse
floor. Replete with case studies, this book provides a working
knowledge of AI's current and future capabilities and the impact it
will have on every business. It covers everything from healthcare
to warehousing, banking, finance and education. It is essential
reading for anyone involved in industry.
This book provides a technical description of cloud computing
technologies, covering cloud infrastructure and platform services.
It then addresses the basics of operating a Cloud computing data
center, the services offered from Cloud providers, the carrier role
in connecting users to data centers, and the process of
interconnecting Cloud data centers to form a flexible processing
unit. It also describes how cloud computing has made an impact in
various industries and provides emerging technologies that are
critical within each industry. Lastly, this book will address
security requirements and provide the best practices in securing
data.
Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
This book provides a technical description of cloud computing
technologies, covering cloud infrastructure and platform services.
It then addresses the basics of operating a Cloud computing data
center, the services offered from Cloud providers, the carrier role
in connecting users to data centers, and the process of
interconnecting Cloud data centers to form a flexible processing
unit. It also describes how cloud computing has made an impact in
various industries and provides emerging technologies that are
critical within each industry. Lastly, this book will address
security requirements and provide the best practices in securing
data.
|
You may like...
Law@Work
A. Van Niekerk, N. Smit
Paperback
R1,367
R1,195
Discovery Miles 11 950
Miss Behave
Malebo Sephodi
Paperback
(12)
R302
Discovery Miles 3 020
Daydream
Hannah Grace
Paperback
R300
R268
Discovery Miles 2 680
|