Domain alternative-technologien.de kaufen?

Produkt zum Begriff Computing:


  • Security in Computing
    Security in Computing

    The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now, the authors have thoroughly updated this classic to reflect today’s newest technologies, attacks, standards, and trends.   Security in Computing, Fifth Edition, offers complete, timely coverage of all aspects of computer security, including users, software, devices, operating systems, networks, and data. Reflecting rapidly evolving attacks, countermeasures, and computing environments, this new edition introduces best practices for authenticating users, preventing malicious code execution, using encryption, protecting privacy, implementing firewalls, detecting intrusions, and more. More than two hundred end-of-chapter exercises help the student to solidify lessons learned in each chapter.   Combining breadth, depth, and exceptional clarity, this comprehensive guide builds carefully from simple to complex topics, so you always understand all you need to know before you move forward.   You’ll start by mastering the field’s basic terms, principles, and concepts. Next, you’ll apply these basics in diverse situations and environments, learning to ”think like an attacker” and identify exploitable weaknesses. Then you will switch to defense, selecting the best available solutions and countermeasures. Finally, you’ll go beyond technology to understand crucial management issues in protecting infrastructure and data.   New coverage includes A full chapter on securing cloud environments and managing their unique risksExtensive new coverage of security issues associated with user—web interactionNew risks and techniques for safeguarding the Internet of ThingsA new primer on threats to privacy and how to guard itAn assessment of computers and cyberwarfare–recent attacks and emerging risksSecurity flaws and risks associated with electronic voting systems  

    Preis: 93.08 € | Versand*: 0 €
  • Quantum Computing Fundamentals
    Quantum Computing Fundamentals

    ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTINGClearly explains core concepts, terminology, and techniquesCovers the foundational physics, math, and information theory you needProvides hands-on practice with quantum programmingThe perfect beginner's guide for anyone interested in a quantum computing careerDr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started.Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge.Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too.Master the linear algebra and other mathematical skills you'll needExplore key physics ideas such as quantum states and uncertaintyReview data structures, algorithms, and computing complexityWork with probability and set theory in quantum computingFamiliarize yourself with basic quantum theory and formulaeUnderstand quantum entanglement and quantum key distributionDiscover how quantum computers are architected and builtExplore several leading quantum algorithmsCompare quantum and conventional asymmetric algorithmsSee how quantum computing might break traditional cryptographyDiscover several approaches to quantum-resistant cryptographyStart coding with Q#, Microsoft's quantum programming languageSimulate quantum gates and algorithms with QASM

    Preis: 51.35 € | Versand*: 0 €
  • Cloud Computing Design Patterns
    Cloud Computing Design Patterns

    “This book continues the very high standard we have come to expect from ServiceTech Press. The book provides well-explained vendor-agnostic patterns to the challenges of providing or using cloud solutions from PaaS to SaaS. The book is not only a great patterns reference, but also worth reading from cover to cover as the patterns are thought-provoking, drawing out points that you should consider and ask of a potential vendor if you’re adopting a cloud solution.”--Phil Wilkins, Enterprise Integration Architect, Specsavers“Thomas Erl’s text provides a unique and comprehensive perspective on cloud design patterns that is clearly and concisely explained for the technical professional and layman alike. It is an informative, knowledgeable, and powerful insight that may guide cloud experts in achieving extraordinary results based on extraordinary expertise identified in this text. I will use this text as a resource in future cloud designs and architectural considerations.”--Dr. Nancy M. Landreville, CEO/CISO, NML Computer ConsultingThe Definitive Guide to Cloud Architecture and DesignBest-selling service technology author Thomas Erl has brought together the de facto catalog of design patterns for modern cloud-based architecture and solution design. More than two years in development, this book’s 100+ patterns illustrate proven solutions to common cloud challenges and requirements. Its patterns are supported by rich, visual documentation, including 300+ diagrams.The authors address topics covering scalability, elasticity, reliability, resiliency, recovery, data management, storage, virtualization, monitoring, provisioning, administration, and much more. Readers will further find detailed coverage of cloud security, from networking and storage safeguards to identity systems, trust assurance, and auditing.This book’s unprecedented technical depth makes it a must-have resource for every cloud technology architect, solution designer, developer, administrator, and manager.Topic AreasEnabling ubiquitous, on-demand, scalable network access to shared pools of configurable IT resourcesOptimizing multitenant environments to efficiently serve multiple unpredictable consumersUsing elasticity best practices to scale IT resources transparently and automatically Ensuring runtime reliability, operational resiliency, and automated recovery from any failureEstablishing resilient cloud architectures that act as pillars for enterprise cloud solutionsRapidly provisioning cloud storage devices, resources, and data with minimal management effortEnabling customers to configure and operate custom virtual networks in SaaS, PaaS, or IaaS environmentsEfficiently provisioning resources, monitoring runtimes, and handling day-to-day administrationImplementing best-practice security controls for cloud service architectures and cloud storageSecuring on-premise Internet access, external cloud connections, and scaled VMsProtecting cloud services against denial-of-service attacks and traffic hijackingEstablishing cloud authentication gateways, federated cloud authentication, and cloud key managementProviding trust attestation services to customersMonitoring and independently auditing cloud securitySolving complex cloud design problems with compound super-patterns

    Preis: 29.95 € | Versand*: 0 €
  • Für nvidia p40 24g gpu computing grafikkarte ai deep learning ai computing karte
    Für nvidia p40 24g gpu computing grafikkarte ai deep learning ai computing karte

    Für nvidia p40 24g gpu computing grafikkarte ai deep learning ai computing karte

    Preis: 477.39 € | Versand*: 40.93 €
  • Wie beeinflusst der technologische Fortschritt die Effizienz und Nachhaltigkeit landwirtschaftlicher Betriebe?

    Der technologische Fortschritt ermöglicht den Einsatz von Präzisionslandwirtschaft, was die Effizienz der Produktion erhöht und Ressourcen wie Wasser und Dünger spart. Durch den Einsatz von digitalen Tools können Landwirte ihre Betriebe besser überwachen und optimieren, was zu einer nachhaltigeren Bewirtschaftung führt. Neue Technologien wie Drohnen und Sensoren helfen dabei, Umweltauswirkungen zu minimieren und die Produktivität zu steigern.

  • Was sind die wichtigsten Vorteile von Cloud Computing für kleine Unternehmen?

    Die wichtigsten Vorteile von Cloud Computing für kleine Unternehmen sind die Kostenersparnis durch den Verzicht auf teure Hardware und Wartungskosten, die Skalierbarkeit und Flexibilität der Ressourcen je nach Bedarf sowie die Möglichkeit, von überall und zu jeder Zeit auf die Daten und Anwendungen zuzugreifen. Außerdem ermöglicht Cloud Computing eine verbesserte Datensicherheit durch regelmäßige Backups und Verschlüsselungstechnologien.

  • Wie wirken sich neue Technologien auf die Effizienz und Umweltfreundlichkeit der Gummiverarbeitungsindustrie aus?

    Neue Technologien in der Gummiverarbeitungsindustrie können die Effizienz durch automatisierte Prozesse und verbesserte Maschinen steigern. Durch den Einsatz umweltfreundlicher Technologien wie Recycling-Verfahren und energieeffizienten Produktionsmethoden kann die Umweltbelastung reduziert werden. Insgesamt können neue Technologien dazu beitragen, die Gummiverarbeitungsindustrie nachhaltiger und effizienter zu gestalten.

  • Welche Auswirkungen hat die Nutzung von Cloud Computing auf die IT-Infrastruktur im Gesundheitswesen?

    Die Nutzung von Cloud Computing im Gesundheitswesen kann zu einer effizienteren Datenverwaltung und -speicherung führen. Es kann auch die Skalierbarkeit und Flexibilität der IT-Infrastruktur verbessern. Allerdings müssen Sicherheits- und Datenschutzbedenken sorgfältig berücksichtigt werden.

Ähnliche Suchbegriffe für Computing:


  • Security in Computing
    Security in Computing

    The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, userinternet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

    Preis: 70.61 € | Versand*: 0 €
  • Security in Computing
    Security in Computing

    The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity. It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice. Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types The security practitioner's toolbox: Identification and authentication, access control, and cryptography Areas of practice: Securing programs, userinternet interaction, operating systems, networks, data, databases, and cloud computing Cross-cutting disciplines: Privacy, management, law, and ethics Using cryptography: Formal and mathematical underpinnings, and applications of cryptography Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

    Preis: 93.08 € | Versand*: 0 €
  • Quantum Computing Fundamentals
    Quantum Computing Fundamentals

    ONE-VOLUME INTRODUCTION TO QUANTUM COMPUTINGClearly explains core concepts, terminology, and techniquesCovers the foundational physics, math, and information theory you needProvides hands-on practice with quantum programmingThe perfect beginner's guide for anyone interested in a quantum computing careerDr. Chuck Easttom brings together complete coverage of basic quantum computing concepts, terminology, and issues, along with key skills to get you started.Drawing on 30+ years as a computer science instructor, consultant, and researcher, Easttom demystifies the field's underlying technical concepts and math, shows how quantum computing systems are designed and built, explains their implications for cyber security, and previews advances in quantum-resistant cryptography. Writing clearly and simply, he introduces two of today's leading quantum programming languages, Microsoft Q# and QASM, and guides you through sample projects. Throughout, tests, projects, and review questions help you deepen and apply your knowledge.Whether you're a student, professional, or manager, this guide will prepare you for the quantum computing revolution--and expand your career options, too.Master the linear algebra and other mathematical skills you'll needExplore key physics ideas such as quantum states and uncertaintyReview data structures, algorithms, and computing complexityWork with probability and set theory in quantum computingFamiliarize yourself with basic quantum theory and formulaeUnderstand quantum entanglement and quantum key distributionDiscover how quantum computers are architected and builtExplore several leading quantum algorithmsCompare quantum and conventional asymmetric algorithmsSee how quantum computing might break traditional cryptographyDiscover several approaches to quantum-resistant cryptographyStart coding with Q#, Microsoft's quantum programming languageSimulate quantum gates and algorithms with QASM

    Preis: 51.35 € | Versand*: 0 €
  • Für nvidia p40 24g gpu computing grafikkarte ai deep learning ai computing karte
    Für nvidia p40 24g gpu computing grafikkarte ai deep learning ai computing karte

    Für nvidia p40 24g gpu computing grafikkarte ai deep learning ai computing karte

    Preis: 176.39 € | Versand*: 40.93 €
  • Wie verändert Cloud Computing die aktuelle Arbeitsweise von Unternehmen und welche Vorteile bietet diese Technologie?

    Cloud Computing ermöglicht es Unternehmen, flexibler und effizienter zu arbeiten, da Daten und Anwendungen jederzeit und von überall aus zugänglich sind. Durch die Nutzung von Cloud-Diensten können Unternehmen Kosten sparen, da sie keine teure Hardware oder IT-Infrastruktur mehr benötigen. Zudem ermöglicht die Cloud Skalierbarkeit, Sicherheit und automatische Updates, was die Produktivität und Wettbewerbsfähigkeit steigert.

  • Welche Bedeutung hat der Suchbegriff "Nachhaltigkeit" in Bezug auf Umweltschutz und Ressourcenschonung?

    Der Begriff "Nachhaltigkeit" bezieht sich darauf, dass natürliche Ressourcen so genutzt werden sollen, dass sie auch für zukünftige Generationen erhalten bleiben. Dies bedeutet, dass Umweltschutz und Ressourcenschonung im Einklang mit wirtschaftlicher und sozialer Entwicklung stehen sollten. Nachhaltigkeit zielt darauf ab, die Umweltbelastung zu reduzieren und die natürlichen Ressourcen effizienter zu nutzen, um eine langfristige Lebensgrundlage für Mensch und Natur zu gewährleisten.

  • Was sind die Hauptvorteile von VNC (Virtual Network Computing) im Vergleich zu anderen Remote-Desktop-Lösungen?

    Die Hauptvorteile von VNC im Vergleich zu anderen Remote-Desktop-Lösungen sind die plattformübergreifende Kompatibilität, die Möglichkeit, auf entfernte Computer zuzugreifen, ohne zusätzliche Software zu installieren, und die einfache Konfiguration und Verwendung ohne komplexe Einstellungen.

  • Ist die Oxidation oder Reduktion von CaCO3 zu CaO und CO2?

    Die Oxidation von CaCO3 zu CaO und CO2 ist eine Redoxreaktion, bei der CaCO3 oxidiert wird, um CaO zu bilden, während CO2 als Nebenprodukt freigesetzt wird. In dieser Reaktion verliert das Calcium (Ca) Elektronen und wird oxidiert, während das Kohlenstoffatom (C) Elektronen aufnimmt und reduziert wird.

* Alle Preise verstehen sich inklusive der gesetzlichen Mehrwertsteuer und ggf. zuzüglich Versandkosten. Die Angebotsinformationen basieren auf den Angaben des jeweiligen Shops und werden über automatisierte Prozesse aktualisiert. Eine Aktualisierung in Echtzeit findet nicht statt, so dass es im Einzelfall zu Abweichungen kommen kann.