Domain viri.de kaufen?

Produkt zum Begriff Computing:


  • Security in Computing
    Security in Computing

    The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risksExtensive new coverage of security issues associated with user—web interactionNew risks and techniques for safeguarding the Internet of ThingsA new primer on threats to privacy and how to guard itAn assessment of computers and cyberwarfare–recent attacks and emerging risksSecurity flaws and risks associated with electronic voting systems  

    Preis: 93.08 € | Versand*: 0 €
  • Quantum Computing Fundamentals
    Quantum Computing Fundamentals

    ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTINGClearly explains core concepts, terminology, and techniquesCovers the foundational physics, math, and information theory you needProvides hands-on practice with quantum programmingThe perfect beginner's guide for anyone interested in a quantum computing careerDr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started.Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge.Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too.Master the linear algebra and other mathematical skills you'll needExplore key physics ideas such as quantum states and uncertaintyReview data structures, algorithms, and computing complexityWork with probability and set theory in quantum computingFamiliarize yourself with basic quantum theory and formulaeUnderstand quantum entanglement and quantum key distributionDiscover how quantum computers are architected and builtExplore several leading quantum algorithmsCompare quantum and conventional asymmetric algorithmsSee how quantum computing might break traditional cryptographyDiscover several approaches to quantum-resistant cryptographyStart coding with Q#, Microsoft's quantum programming languageSimulate quantum gates and algorithms with QASM

    Preis: 51.35 € | Versand*: 0 €
  • Cloud Computing Design Patterns
    Cloud Computing Design Patterns

    “This book continues the very high standard we have come to expect from ServiceTech Press. The book provides well-explained vendor-agnostic patterns to the challenges of providing or using cloud solutions from PaaS to SaaS. The book is not only a great patterns reference, but also worth reading from cover to cover as the patterns are thought-provoking, drawing out points that you should consider and ask of a potential vendor if you’re adopting a cloud solution.”--Phil Wilkins, Enterprise Integration Architect, Specsavers“Thomas Erl’s text provides a unique and comprehensive perspective on cloud design patterns that is clearly and concisely explained for the technical professional and layman alike. It is an informative, knowledgeable, and powerful insight that may guide cloud experts in achieving extraordinary results based on extraordinary expertise identified in this text. I will use this text as a resource in future cloud designs and architectural considerations.”--Dr. Nancy M. Landreville, CEO/CISO, NML Computer ConsultingThe Definitive Guide to Cloud Architecture and DesignBest-selling service technology author Thomas Erl has brought together the de facto catalog of design patterns for modern cloud-based architecture and solution design. More than two years in development, this book’s 100+ patterns illustrate proven solutions to common cloud challenges and requirements. Its patterns are supported by rich, visual documentation, including 300+ diagrams.The authors address topics covering scalability, elasticity, reliability, resiliency, recovery, data management, storage, virtualization, monitoring, provisioning, administration, and much more. Readers will further find detailed coverage of cloud security, from networking and storage safeguards to identity systems, trust assurance, and auditing.This book’s unprecedented technical depth makes it a must-have resource for every cloud technology architect, solution designer, developer, administrator, and manager.Topic AreasEnabling ubiquitous, on-demand, scalable network access to shared pools of configurable IT resourcesOptimizing multitenant environments to efficiently serve multiple unpredictable consumersUsing elasticity best practices to scale IT resources transparently and automatically Ensuring runtime reliability, operational resiliency, and automated recovery from any failureEstablishing resilient cloud architectures that act as pillars for enterprise cloud solutionsRapidly provisioning cloud storage devices, resources, and data with minimal management effortEnabling customers to configure and operate custom virtual networks in SaaS, PaaS, or IaaS environmentsEfficiently provisioning resources, monitoring runtimes, and handling day-to-day administrationImplementing best-practice security controls for cloud service architectures and cloud storageSecuring on-premise Internet access, external cloud connections, and scaled VMsProtecting cloud services against denial-of-service attacks and traffic hijackingEstablishing cloud authentication gateways, federated cloud authentication, and cloud key managementProviding trust attestation services to customersMonitoring and independently auditing cloud securitySolving complex cloud design problems with compound super-patterns

    Preis: 29.95 € | Versand*: 0 €
  • Cloud Computing: Concepts, Technology & Architecture
    Cloud Computing: Concepts, Technology & Architecture

    Clouds are distributed technology platforms that leverage sophisticated technology innovations to provide highly scalable and resilient environments that can be remotely utilized by organizations in a multitude of powerful ways. To successfully build upon, integrate with, or even create a cloud environment requires an understanding of its common inner mechanics, architectural layers, and models, as well as an understanding of the business and economic factors that result from the adoption and real-world use of cloud-based services. In Cloud Computing: Concepts, Technology & Architecture, Thomas Erl, one of the world’s top-selling IT authors, teams up with cloud computing experts and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, models, technology mechanisms, and technology architectures, all from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing platforms and solutions.Subsequent to technology-centric coverage, the book proceeds to establish business-centric models and metrics that allow for the financial assessment of cloud-based IT resources and their comparison to those hosted on traditional IT enterprise premises. Also provided are templates and formulas for calculating SLA-related quality-of-service values and numerous explorations of the SaaS, PaaS, and IaaS delivery models.With more than 260 figures, 29 architectural models, and 20 mechanisms, this indispensable guide provides a comprehensive education of cloud computing essentials that will never leave your side.

    Preis: 25.67 € | Versand*: 0 €
  • Wie beeinflusst der Datentransfer die Effizienz und Sicherheit von Cloud Computing-Diensten?

    Der Datentransfer beeinflusst die Effizienz von Cloud Computing-Diensten, da eine schnelle und zuverlässige Übertragung von Daten die Leistung und Reaktionsfähigkeit der Dienste verbessert. Eine langsame oder instabile Datenübertragung kann zu Verzögerungen und Ausfällen führen, was die Effizienz beeinträchtigt. Darüber hinaus hat der Datentransfer auch Auswirkungen auf die Sicherheit von Cloud Computing-Diensten. Eine unverschlüsselte oder unsichere Übertragung von Daten kann zu Datenschutzverletzungen und Sicherheitsrisiken führen. Daher ist es wichtig, dass der Datentransfer in der Cloud sicher und geschützt ist, um die Vertraulichkeit und Integrität der Daten zu gewährleisten. Zusätzlich kann eine effiziente und

  • Wie hat sich Cloud-Computing auf die Effizienz und Flexibilität von Unternehmen in verschiedenen Branchen ausgewirkt?

    Cloud-Computing hat die Effizienz von Unternehmen in verschiedenen Branchen verbessert, indem es die Notwendigkeit von physischer Hardware reduziert und die Skalierbarkeit erhöht. Durch die Nutzung von Cloud-Services können Unternehmen Ressourcen schnell anpassen und flexibel auf sich ändernde Anforderungen reagieren. Dies hat zu einer verbesserten Flexibilität geführt, da Unternehmen nun in der Lage sind, ihre IT-Infrastruktur schnell und kosteneffizient anzupassen, um den sich ständig ändernden Marktbedingungen gerecht zu werden. Insgesamt hat Cloud-Computing dazu beigetragen, dass Unternehmen in verschiedenen Branchen agiler und wettbewerbsfähiger geworden sind.

  • Wie beeinflusst Cloud Computing die Effizienz und Flexibilität von Unternehmen in Bezug auf Datenmanagement, IT-Infrastruktur und Softwareentwicklung?

    Cloud Computing ermöglicht es Unternehmen, ihre Daten effizient zu verwalten, da sie auf eine skalierbare und flexible Infrastruktur zugreifen können, die es ihnen ermöglicht, Ressourcen nach Bedarf zu nutzen. Dies führt zu einer verbesserten Effizienz, da Unternehmen keine teuren physischen Server und Speichergeräte kaufen und warten müssen. Darüber hinaus ermöglicht Cloud Computing eine flexible IT-Infrastruktur, da Unternehmen schnell auf veränderte Anforderungen reagieren können, indem sie Ressourcen hinzufügen oder entfernen. In Bezug auf Softwareentwicklung ermöglicht Cloud Computing eine schnellere Bereitstellung von Anwendungen und eine verbesserte Zusammenarbeit, da Entwickler von überall auf der Welt auf die gleichen Tools und Ressourcen zugreifen können.

  • Wie kann die Virtualisierungsumgebung die Effizienz und Flexibilität in den Bereichen IT-Infrastruktur, Cloud Computing und Softwareentwicklung verbessern?

    Die Virtualisierungsumgebung ermöglicht es, mehrere virtuelle Maschinen auf einer physischen Hardware zu betreiben, was die Auslastung und Effizienz der IT-Infrastruktur erhöht. Durch die Virtualisierung können Ressourcen flexibel zugewiesen und skaliert werden, um den sich ändernden Anforderungen von Cloud Computing und Softwareentwicklung gerecht zu werden. Die Möglichkeit, virtuelle Umgebungen schnell bereitzustellen und zu verwalten, verbessert die Flexibilität und Agilität in der IT-Infrastruktur und ermöglicht eine schnellere Bereitstellung von Anwendungen und Diensten. Darüber hinaus ermöglicht die Virtualisierungsumgebung die Isolierung von Anwendungen und Betriebssystemen, was die Sicherheit und Zuverlässigkeit in den genannten Bereichen verbessert.

Ähnliche Suchbegriffe für Computing:


  • Practical Guide to Trusted Computing , A
    Practical Guide to Trusted Computing , A

    Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable   Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology.   Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today’s most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples.   Coverage includes What services and capabilities are provided by TPMs TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments Using TPM to enhance the security of a PC’s boot sequence Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more Linking PKCS#11 and TSS stacks to support applications with middleware services What you need to know about TPM and privacy--including how to avoid privacy problems Moving from TSS 1.1 to the new TSS 1.2 standard TPM and TSS command references and a complete function library  

    Preis: 22.46 € | Versand*: 0 €
  • An Insider’s Guide to Cloud Computing
    An Insider’s Guide to Cloud Computing

    Many cloud computing initiatives flat-out fail; others limp along, functioning tolerably without ever delivering what they promised. An Insider's Guide to Cloud Computing reveals why and shows how to do better. Cloud pioneer and long-time CTO David Linthicum explodes the industry's secrets and presents practical ways to optimize cloud for value and performance.Linthicum takes a hard look at aggressively marketed technologies such as cloud-based AI, containers, no-code, serverless computing, and multicloud. He illuminates what works, what absolutely does not work, and how to manage the difficult cost-complexity tradeoffs presented by many offerings. You'll learn why some workloads and datasets still don't belong on the cloud, and even discover "game changer" technology that has actually been undersold.Linthicum's seen it all: the tricks providers play to make their numbers at customers' expenserealities whispered about in conference rooms and spilled over drinks at conferencesfacts and techniques you simply must know to deliver value-optimized solutions.An Insider's Guide to Cloud Computing is for every technical and business decision-maker responsible for evaluating, planning, implementing, operating, or optimizing cloud systems. It offers exceptional value to professionals ranging from solution architects to cloud engineers, CTOs to enterprise consultants, or those just getting started on their cloud computing journey. What cloud providers don't tell you about their storage and compute services Cloud-based artificial intelligence and machine learning: What are you actually paying for? Containers, Kubernetes, and cloud-native development: truth versus hype Multicloud: Which approaches actually save you money? Real-world cloud security: beyond silos, black boxes, and out-of-control complexity Cloud computing, carbon footprints, and sustainability: reality versus fiction The crucial role of talent: how to identify, find, and keep the skills you need How cloud computing is changingand how to prepare for what's coming

    Preis: 22.46 € | Versand*: 0 €
  • Cloud Computing: Concepts, Technology, Security, and Architecture
    Cloud Computing: Concepts, Technology, Security, and Architecture

    Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part of information technology. The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources. To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls. It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services. In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures. Comprehensive coverage of containerization and cybersecurity topics is also included. All chapters are carefully authored from an industry-centric and vendor-neutral point of view. In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions. With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.

    Preis: 48.14 € | Versand*: 0 €
  • Security in Computing
    Security in Computing

    The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, userinternet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

    Preis: 70.61 € | Versand*: 0 €
  • Was sind die Vorteile von Mobile Computing in Bezug auf Flexibilität und Produktivität?

    Mobile Computing ermöglicht es den Benutzern, von überall aus auf ihre Daten und Anwendungen zuzugreifen, was die Flexibilität erhöht. Durch die Möglichkeit, auch unterwegs zu arbeiten, können Mitarbeiter produktiver sein und ihre Aufgaben effizienter erledigen. Zudem ermöglicht Mobile Computing eine nahtlose Zusammenarbeit zwischen Teammitgliedern, unabhhängig von ihrem Standort.

  • Wie kann die Virtualisierungsplattform die Effizienz und Flexibilität in verschiedenen Bereichen wie IT-Infrastruktur, Cloud-Computing und Software-Entwicklung verbessern?

    Die Virtualisierungsplattform ermöglicht es, physische Ressourcen wie Server, Speicher und Netzwerke effizient zu nutzen, indem sie mehrere virtuelle Maschinen auf einer einzigen physischen Hardware ausführt. Dadurch können Unternehmen ihre IT-Infrastruktur optimieren und Kosten sparen. Im Bereich des Cloud-Computing ermöglicht die Virtualisierungsplattform die schnelle Bereitstellung und Skalierung von virtuellen Ressourcen, um den sich ändernden Anforderungen gerecht zu werden. Dies erhöht die Flexibilität und Agilität in der Bereitstellung von IT-Services. Für Software-Entwicklungsteams bietet die Virtualisierungsplattform die Möglichkeit, verschiedene Betriebssysteme und Entwicklungsumgebungen in isolierten virtuellen Umgebungen zu betreiben, was die Flexibilität und Effizienz bei der Entwicklung und

  • Wie hat sich das Cloud-Computing auf die Effizienz und Flexibilität von Unternehmen in Bezug auf Datenverarbeitung, Speicherung und Anwendungsverwaltung ausgewirkt?

    Das Cloud-Computing hat die Effizienz von Unternehmen in Bezug auf Datenverarbeitung, Speicherung und Anwendungsverwaltung verbessert, da es ihnen ermöglicht, Ressourcen nach Bedarf zu skalieren, ohne große Investitionen in Hardware und Infrastruktur tätigen zu müssen. Durch die Nutzung von Cloud-Services können Unternehmen ihre IT-Ressourcen flexibler verwalten und schnell auf sich ändernde Anforderungen reagieren. Zudem ermöglicht die Cloud den Unternehmen den Zugriff auf leistungsstarke Anwendungen und Tools, die ihnen helfen, ihre Geschäftsprozesse zu optimieren und ihre Wettbewerbsfähigkeit zu steigern. Insgesamt hat das Cloud-Computing die Art und Weise, wie Unternehmen ihre Daten verarbeiten, speichern und verwalten, revolutioniert und zu einer erhöhten Effiz

  • Wie hat das Computing die Art und Weise verändert, wie wir arbeiten und kommunizieren? Welche neuen Entwicklungen im Computing haben das Potenzial, die Industrie in Zukunft zu revolutionieren?

    Computing hat die Art und Weise, wie wir arbeiten und kommunizieren, durch die Automatisierung von Prozessen, die Verbesserung der Effizienz und die Erweiterung der globalen Vernetzung transformiert. Künstliche Intelligenz, das Internet der Dinge und Blockchain-Technologie sind Entwicklungen im Computing, die das Potenzial haben, die Industrie in Zukunft zu revolutionieren, indem sie neue Möglichkeiten für Automatisierung, Datensicherheit und vernetzte Systeme bieten. Diese Technologien könnten die Art und Weise, wie Unternehmen arbeiten, grundlegend verändern und neue Geschäftsmodelle und Branchen hervorbringen.

* Alle Preise verstehen sich inklusive der gesetzlichen Mehrwertsteuer und ggf. zuzüglich Versandkosten. Die Angebotsinformationen basieren auf den Angaben des jeweiligen Shops und werden über automatisierte Prozesse aktualisiert. Eine Aktualisierung in Echtzeit findet nicht statt, so dass es im Einzelfall zu Abweichungen kommen kann.