Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Computer & IT

Hier finden Sie eine Auswahl von über Computer & IT spannenden Büchern zum Thema 121.809.
Mehr anzeigen
Filter
Filter
Ordnen nachSortieren Beliebt
  • 13% sparen
    von Vivek Shrivastava
    213,00 - 258,00 €

    The book presents a collection of the high-quality research articles in the field of power engineering, grid integration, energy management, soft computing, artificial intelligence, signal and image processing, data science techniques, and their real-world applications. The papers are presented at International Conference on Power Engineering and Intelligent Systems (PEIS 2023), held during June 24 ¿ ¿25, 2023, at National Institute of Technology, Delhi, India.

  • 13% sparen
    von Abhishek Swaroop
    168,00 - 213,00 €

    This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students. The book is divided into four volumes.

  • von Tobias López
    76,90 €

    Mit dem Vorhandensein von Habeas Data in der ecuadorianischen Verfassung und dem Gesetz über den elektronischen Geschäftsverkehr ist die ecuadorianische Zentralbank für die Ausstellung und Validierung elektronischer Signaturen für jeden Datenaustausch zuständig, der Rechtsgültigkeit erfordert. Die Universidad Tecnica del Norte (UTN) setzt neue Kommunikations- und Informationstechnologien ein, um ihre institutionellen Prozesse weiterzuentwickeln und ihren Studenten einen angemessenen Service zu bieten. QUIPUX ist eine Dokumentenverwaltungssoftware, die nicht die Anforderungen für die Integration mit dem Integrierten Universitätsinformationssystem der UTN, dessen Akronym SIIU lautet, erfüllt. Implementierung einer Software für digitale Signaturen, um mindestens einen Prozess der Verwaltung der institutionellen Verfahren positiv zu beeinflussen: AUSSTELLUNG VON DIGITAL UNTERSCHRIEBENEN EINSCHREIBUNGSBESCHEINIGUNGEN in UTN. Dokumentation des SRS gemäß der Norm ISO/IEC 29148.

  • 18% sparen
    von Tobias López
    63,00 €

    With the existence of Habeas Data in the Ecuadorian Constitution and the Electronic Commerce Law, the Central Bank of Ecuador is responsible for issuing and validating Electronic Signatures for any data exchange that requires legal validity. The Universidad Tecnica del Norte, hereinafter UTN, is implementing new communication and information technologies through the evolution of its institutional processes to adequately serve its students. QUIPUX is a document management software that does not meet the requirements to be integrated to the Integrated University Information System of the UTN, whose acronym is SIIU. Implement a digital signature service software to positively impact at least one process of the management of institutional procedures: ISSUANCE OF REGISTRATION CERTIFICATES SIGNED DIGITALLY AT UTN. Document the SRS according to the ISO / IEC 29148 standard.

  • 18% sparen
    von Tobias López
    63,00 €

    Compte tenu de l'existence de l'Habeas Data dans la Constitution équatorienne et de la loi sur le commerce électronique, la Banque centrale de l'Équateur est responsable de l'émission et de la validation des signatures électroniques pour tout échange de données nécessitant une validité juridique. L'Universidad Tecnica del Norte, ci-après UTN, met en ¿uvre de nouvelles technologies de communication et d'information dans le cadre de l'évolution de ses processus institutionnels afin de servir ses étudiants de manière adéquate. QUIPUX est un logiciel de gestion de documents qui ne répond pas aux exigences d'intégration au système d'information universitaire intégré de l'UTN, dont l'acronyme est SIIU. Mettre en ¿uvre un logiciel de service de signature numérique pour affecter positivement au moins un processus de la gestion des procédures institutionnelles : ÉMISSION DES CERTIFICATS D'INSCRIPTION SIGNÉS NUMÉRIQUEMENT DANS L'UTN. Documenter le SRS conformément à la norme ISO/CEI 29148.

  • 18% sparen
    von Tobias Lopes
    63,00 €

    Uchitywaq nalichie Habeas Data w Konstitucii Jekwadora i Zakone ob älektronnoj torgowle, Central'nyj bank Jekwadora otwechaet za wydachu i prowerku älektronnyh podpisej dlq lübogo obmena dannymi, trebuüschego üridicheskoj sily. Uniwersitet Tecnica del Norte, dalee UTN, wnedrqet nowye kommunikacionnye i informacionnye tehnologii w ramkah äwolücii swoih institucional'nyh processow dlq adekwatnogo obsluzhiwaniq swoih studentow. QUIPUX - programmnoe obespechenie dlq uprawleniq dokumentooborotom, kotoroe ne otwechaet trebowaniqm integracii s integrirowannoj uniwersitetskoj informacionnoj sistemoj UTN, sokraschenno SIIU. Vnedrit' programmnoe obespechenie sluzhby cifrowoj podpisi, chtoby polozhitel'no powliqt' hotq by na odin process uprawleniq institucional'nymi procedurami: ISSUANCE OF CERTIFICATES OF REGISTRATION DIGITALLY SIGNED IN UTN. Dokumentirowat' SGD w sootwetstwii so standartom ISO / IEC 29148.

  • 18% sparen
    von Tobias López
    63,00 €

    Con l'esistenza dell'Habeas Data nella Costituzione ecuadoriana e nella Legge sul Commercio Elettronico, la Banca Centrale dell'Ecuador è responsabile dell'emissione e della convalida delle Firme Elettroniche per qualsiasi scambio di dati che richieda validità legale. L'Universidad Tecnica del Norte, di seguito UTN, sta implementando nuove tecnologie di comunicazione e informazione attraverso l'evoluzione dei suoi processi istituzionali per servire adeguatamente i suoi studenti. QUIPUX è un software di gestione documentale che non soddisfa i requisiti di integrazione con il Sistema Informativo Universitario Integrato dell'UTN, il cui acronimo è SIIU. Implementare un software di servizio di firma digitale per incidere positivamente su almeno un processo di gestione delle procedure istituzionali: il rilascio dei certificati di iscrizione firmati digitalmente in UTN. Documentare il SRS secondo lo standard ISO/IEC 29148.

  • 18% sparen
    von Tobias López
    63,00 €

    Com a existência do Habeas Data na Constituição Equatoriana e na Lei do Comércio Eletrónico, o Banco Central do Equador é responsável pela emissão e validação de Assinaturas Electrónicas para qualquer troca de dados que exija validade legal. A Universidad Tecnica del Norte, doravante UTN, está a implementar novas tecnologias de comunicação e informação através da evolução dos seus processos institucionais para servir adequadamente os seus estudantes. O QUIPUX é um software de gestão documental que não cumpre os requisitos de integração com o Sistema Integrado de Informação Universitária da UTN, cujo acrónimo é SIIU. Implementar um software de serviço de assinatura digital para afetar positivamente pelo menos um processo da gestão de procedimentos institucionais: EMISSÃO DE CERTIFICADOS DE REGISTO ASSINADOS DIGITALMENTE NA UTN. Documentar o SRS de acordo com a norma ISO/IEC 29148.

  • von Ivan Vasilev
    68,00 €

    Master effective navigation of neural networks, including convolutions and transformers, to tackle computer vision and NLP tasks using PythonKey FeaturesUnderstand the theory, mathematical foundations and the structure of deep neural networksBecome familiar with transformers, large language models, and convolutional networksLearn how to apply them on various computer vision and natural language processing problems Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe field of deep learning has developed rapidly in the past years and today covers broad range of applications. This makes it challenging to navigate and hard to understand without solid foundations. This book will guide you from the basics of neural networks to the state-of-the-art large language models in use today.The first part of the book introduces the main machine learning concepts and paradigms. It covers the mathematical foundations, the structure, and the training algorithms of neural networks and dives into the essence of deep learning.The second part of the book introduces convolutional networks for computer vision. We'll learn how to solve image classification, object detection, instance segmentation, and image generation tasks. The third part focuses on the attention mechanism and transformers - the core network architecture of large language models. We'll discuss new types of advanced tasks, they can solve, such as chat bots and text-to-image generation.By the end of this book, you'll have a thorough understanding of the inner workings of deep neural networks. You'll have the ability to develop new models or adapt existing ones to solve your tasks. You'll also have sufficient understanding to continue your research and stay up to date with the latest advancements in the field.What you will learnEstablish theoretical foundations of deep neural networksUnderstand convolutional networks and apply them in computer vision applicationsBecome well versed with natural language processing and recurrent networksExplore the attention mechanism and transformersApply transformers and large language models for natural language and computer visionImplement coding examples with PyTorch, Keras, and Hugging Face TransformersUse MLOps to develop and deploy neural network modelsWho this book is forThis book is for software developers/engineers, students, data scientists, data analysts, machine learning engineers, statisticians, and anyone interested in deep learning. Prior experience with Python programming is a prerequisite.Table of ContentsMachine Learning - an IntroductionNeural NetworksDeep Learning FundamentalsComputer Vision with Convolutional NetworksAdvanced Computer Vision ApplicationsNatural Language Processing and Recurrent Neural NetworksThe Attention Mechanism and TransformersExploring Large Language Models in DepthAdvanced Applications of Large Language ModelsMachine Learning Operations (ML Ops)

  • 11% sparen
    von Aaron Guilmette
    62,00 €

    Get a clear understanding of the Microsoft 365 platform from concept through to execution to confidently prepare for exam, and benefit from having a handy, on-the-job desktop reference guideKey FeaturesPractice with exam-style questions based on the latest certification exam syllabusReview the security considerations and benefits of adopting different types of cloud servicesVerify your knowledge of key concepts through chapter assessments, insider tips, and practice questionsPurchase of this book unlocks access to web-based exam prep resources including practice questions, flashcards, and exam tipsBook DescriptionThe MS-900 exam tests your understanding of Microsoft 365 services and components, along with their implementation, security, licensing, and general cloud concepts. This revised third edition helps you gain detailed actionable insights into the topics included in the latest syllabus, covering each topic according to its weight in the exam.You'll begin by reviewing key cloud concepts, including cloud computing, services, and development models, and then explore different cloud architectures and learn what Microsoft offers as a service in the form of SaaS, IaaS, and PaaS. As you advance, you'll get to grips with core Microsoft 365 components as well as the processes and tools used for managing Windows 10, Windows 11, and Microsoft 365 apps. This edition also includes expanded information on the Microsoft Viva Suite, formerly Workplace Analytics. The chapters shed light on security, compliance, privacy, and trust in Microsoft 365, and provide additional guidance regarding the pricing and support offered by Microsoft for different services and apps.By the end of this MS-900 book, you'll have gained all the knowledge and skills needed to confidently appear for the exam.What you will learnGain insight into the exam objectives and knowledge needed to take the MS-900 examDiscover and implement best practices for licensing options available in Microsoft 365Understand the different Microsoft 365 Defender servicesPrepare to address the most common types of threats against an environmentIdentify and unblock the most common cloud adoption challengesArticulate key productivity, collaboration, security, and compliance selling points of M365Explore licensing and payment models available for M365Who this book is forThis book is for entry as well as mid-level experienced administrators and individuals aspiring to pass the latest MS-900 exam and achieve Microsoft 365 certification. Basic knowledge of Microsoft services and cloud concepts is necessary to get the most out of this book.Table of ContentsDescribe the Different Types of Cloud Services AvailableDescribe the Benefits and Considerations for Using Cloud, Hybrid, or On-Premises ServicesDescribe the Productivity Solutions of Microsoft 365Describe the Collaborative Solutions of Microsoft 365Describe Endpoint Modernization, Management Concepts, and Deployment Options in Microsoft 365Describe the Analytics Capabilities of Microsoft 365Describe Zero Trust Principles for Microsoft 365Understanding Identity and Access Management SolutionsDescribe the Threat Protection Solutions of Microsoft 365Describe the Trust, Privacy, Risk, and Compliance Solutions of Microsoft 365Identify Microsoft 365 Pricing and Billing Management OptionsIdentify Licensing Options Available in Microsoft 365Identify Support Options for Microsoft 365 Services

  • von Edgardo Peregrino
    50,00 €

    Learn how to use cloud native tools for robotics¿DESCRIPTION Embrace the transformative power of cloud robotics with Cloud-Powered Robotics with Raspberry Pi, your ultimate guide to building and deploying intelligent robotic applications using cutting-edge DevOps and cloud native tools. Immerse yourself in the fundamentals of DevOps, mastering the principles and practices that streamline software development and deployment. Uncover the intricacies of cloud native tools like Docker and Kubernetes, learning how to containerize, orchestrate, and manage your robotic applications with unparalleled efficiency.Transform your knowledge into action by constructing a comprehensive robot monitoring system step by step. Through this hands-on project, you will gain practical experience with cloud native tools, solidifying your understanding of their applications and empowering you to leverage their capabilities for your own projects.Explore the boundless potential of cloud native computing in robotics, discovering how these tools are revolutionizing industries like assembly, farming, and medicine. Gain insights from real-world case studies, witnessing how small companies are harnessing the power of cloud native tools to create innovative robotic solutions.Join the forefront of cloud robotics and empower yourself to build, deploy, and monitor intelligent robotic applications that transform industries and shape the future.WHAT YOU WILL LEARN¿ Learn the basics of DevOps and Cloud Native Computing.¿ Learn how to use cloud native tools by building a robot monitoring application.¿ Learn how each tool works and understand the concepts of cloud native computing along the way. ¿ Specific examples of how to use cloud native tools in other fields such as assembly, farming and medicine.WHO THIS BOOK IS FORThis book is for DevOps engineers who are already familiar with these tools and want to apply them to other projects, software developers who want to learn cloud native tools for the first time, robotics and IoT enthusiasts and engineers who want to learn cloud native tools to apply them to their projects. The only requirements are knowing the basics of Python, Node.js or Java.

  • von Woldemariam
    43,00 €

    AI-Powered Data Revolution: Unveiling the Potential of MARSCONVERSATIONAL CHAT INFORMATIVE BOOKAuthors: Google Bard AI and Abebe Gebre Woldemariam (Abe) In the era of big data, organizations are struggling to keep pace with the ever-increasing volume, complexity, and velocity of information. Traditional data management systems are failing to meet the demands of this new data-driven world, leading to inefficiencies, inaccuracies, and security vulnerabilities.The Machine-Assisted Analytic Rapid-Repository System (MARS) is a groundbreaking innovation that harnesses the power of artificial intelligence (AI) to revolutionize data storage and analysis. MARS represents a paradigm shift in data management, offering a comprehensive and intelligent solution that addresses the limitations of traditional systems.This book showcases real-world applications of MARS across various industries, including healthcare, finance, manufacturing, and retail, demonstrating its ability to transform data management practices and drive innovation in diverse domains.As MARS continues to evolve, its impact on data management and analytics is poised to grow exponentially, ushering in a new era of data-driven decision-making and unlocking the full potential of information for the betterment of society. Key Features:Provides a comprehensive overview of the MARS system and its capabilitiesExplores the real-world applications of MARS across various industriesDiscusses the potential impact of MARS on the future of data management and analyticsIncludes case studies and examples of how MARS is being used to solve real-world problems Target Audience:Data professionalsBusiness leadersTechnology enthusiastsAnyone interested in the future of data and AI About the Authors:Google Bard AI is an experimental conversational AI chatbot developed by Google that learns from its encounters with humans to improve its performance and based initially on the LaMDA family of large language models (LLMs) and later the PaLM LLM.Abebe Gebre Woldemariam is a human, Enigeer that made conversational chats with Bard as per his experiences of exposure to convert stalking. Call to Action:Learn more about MARS and its potential to transform your organization's data management practicesExplore the resources available for implementing MARS in your organizationJoin the conversation about the future of data and AI

  • von Zemelak Goraga
    43,00 €

    " Data and Analytics in Action: Project Ideas and Basic Code Skeleton in Python " is an indispensable guide for students navigating the dynamic realm of data science. This comprehensive book offers a diverse array of researchable project ideas spanning industries from finance to healthcare, e-commerce to environmental analysis. Each project is meticulously designed to bridge theory with practice, fostering critical thinking and problem-solving skills. With a forward-looking approach, the book explores cutting-edge concepts such as artificial intelligence, blockchain, and cybersecurity. It emphasizes not only technical proficiency but also ethical considerations, instilling a sense of responsibility in the use of data. Aspiring minds will find inspiration in the collaborative and interdisciplinary nature of the projects, preparing them for the multifaceted challenges of the evolving data science landscape. "Data and Analytics in Action" is more than a guide; it is a transformative tool shaping the next generation of data professionals.

  • von Matt Eland
    101,00 €

    Learn how to improve the maintainability of C# code using modern tools and techniques to resolve technical debt while working safely and efficiently with legacy codeKey Features:- Apply a wide range of refactoring techniques using the latest tools and features of C#- Discover ways to safely improve your code using tests, Roslyn analyzers, and AI assistance- Find ways of communicating technical debt and improving your code in agile and enterprise settings- Purchase of the print or Kindle book includes a free PDF eBookBook Description:Software projects start as brand-new greenfield projects, but invariably become muddied in technical debt far sooner than you'd expect. In Refactoring with C#, you'll explore what technical debt is and how it arises before walking through the process of safely refactoring C# code using modern tooling in Visual Studio and more recent C# language features using C# 12 and .NET 8. This book, written by a Microsoft MVP, will guide you through the process of refactoring safely through advanced unit testing with XUnit and libraries like Moq, Snapper, and Scientist .NET. You'll explore maintainable code through SOLID principles and defensive coding techniques made possible in newer versions of C#. You'll also find out how to run code analysis and write custom Roslyn analyzers to detect and resolve issues unique to your code.The nature of coding is changing, and you'll explore how to use AI with the GitHub Copilot Chat to refactor, test, document, and generate code before ending with a discussion about communicating technical debt to leadership and getting organizational buy-in to refactor your code in enterprise organizations and in agile teams.By the end of this book, you'll understand the nature of refactoring and see how you can safely, effectively, and repeatably pay down the technical debt in your application while adding value to your business.What You Will Learn:- Understand technical debt, its causes and effects, and ways to prevent it- Explore different ways of refactoring classes, methods, and lines of code- Discover how to write effective unit tests supported by libraries such as Moq- Understand SOLID principles and factors that lead to maintainable code- Use AI to analyze, improve, and test code with the GitHub Copilot Chat- Apply code analysis and custom Roslyn analyzers to ensure that code stays clean- Communicate tech debt and code standards successfully in agile teamsWho this book is for:This book is for any developer familiar with C# who wants to improve the code they work with on a day-to-day basis. While this book will be most beneficial to new developers with only a year or two of experience, even senior engineers and engineering managers can make the most of this book by exploring not just the process of refactoring, but advanced techniques with libraries like Moq, Snapper, Scientist .NET, and writing custom Roslyn analyzers.Table of Contents- Technical Debt, Code Smells, and Refactoring- Introduction to Refactoring- Method-Level Refactorings- Class-Level Refactorings- Code-Level Refactorings- Unit Testing- Test Driven Development- Avoiding Code Anti-Patterns with SOLID- Advanced Unit Testing- Defensive Coding Techniques- AI-Assisted Refactoring with GitHub Copilot- Code Analysis in Visual Studio- Creating a Roslyn Analyzer- Refactoring Code with Roslyn Analyzers- Communicating Technical Debt- Adopting Code Standards- Agile Refactoring

  • von Debu Sinha
    60,00 €

    Take your machine learning skills to the next level by mastering databricks and building robust ML pipeline solutions for future ML innovationsKey FeaturesLearn to build robust ML pipeline solutions for databricks transitionMaster commonly available features like AutoML and MLflowLeverage data governance and model deployment using MLflow model registryPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionUnleash the potential of databricks for end-to-end machine learning with this comprehensive guide, tailored for experienced data scientists and developers transitioning from DIY or other cloud platforms. Building on a strong foundation in Python, Practical Machine Learning on Databricks serves as your roadmap from development to production, covering all intermediary steps using the databricks platform.You'll start with an overview of machine learning applications, databricks platform features, and MLflow. Next, you'll dive into data preparation, model selection, and training essentials and discover the power of databricks feature store for precomputing feature tables. You'll also learn to kickstart your projects using databricks AutoML and automate retraining and deployment through databricks workflows.By the end of this book, you'll have mastered MLflow for experiment tracking, collaboration, and advanced use cases like model interpretability and governance. The book is enriched with hands-on example code at every step. While primarily focused on generally available features, the book equips you to easily adapt to future innovations in machine learning, databricks, and MLflow.What you will learnTransition smoothly from DIY setups to databricksMaster AutoML for quick ML experiment setupAutomate model retraining and deploymentLeverage databricks feature store for data prepUse MLflow for effective experiment trackingGain practical insights for scalable ML solutionsFind out how to handle model drifts in production environmentsWho this book is forThis book is for experienced data scientists, engineers, and developers proficient in Python, statistics, and ML lifecycle looking to transition to databricks from DIY clouds. Introductory Spark knowledge is a must to make the most out of this book, however, end-to-end ML workflows will be covered. If you aim to accelerate your machine learning workflows and deploy scalable, robust solutions, this book is an indispensable resource.Table of ContentsML Process and ChallengesOverview of ML on DatabricksUtilizing Feature Store Understanding MLflow ComponentsCreate a Baseline Model for Bank Customer Churn Prediction Using AutoMLModel Versioning and WebhooksModel Deployment ApproachesAutomating ML Workflows Using the Databricks JobsModel Drift Detection for Our Churn Prediction Model and RetrainingCI/CD to Automate Model Retraining and Re-Deployment.

  • von Alex Callejas
    133,00 €

    Configure your Fedora Linux environment as a professional system administration workstation with this comprehensive guideKey FeaturesLeverage best practices and post-installation techniques to optimize your Fedora Linux workstationLearn how to optimize operating system tuning to enhance system administrationExplore Fedora Linux's virtualization resources using QEMU, KVM, and libvirt technologiesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionFedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administrator.The book begins by introducing you to the philosophy underlying the open-source movement, along with the unique attributes of the Fedora Project that set it apart from other Linux distributions. The chapters outline best practices and strategies for essential system administration tasks, including operating system installation, first-boot configuration, storage, and network setup. As you make progress, you'll get to grips with the selection and usage of top applications and tools in the tech environment. The concluding chapters help you get a clear understanding of the basics of version control systems, enhanced Linux security, automation, virtualization, and containers, which are integral to modern system administration.By the end of this book, you'll have gained the knowledge needed to optimize day-to-day tasks related to Linux-based system administration.What you will learnDiscover how to configure a Linux environment from scratchReview the basics of Linux resources and componentsFamiliarize yourself with enhancements and updates made to common Linux desktop toolsOptimize the resources of the Linux operating systemFind out how to bolster security with the SELinux moduleImprove system administration using the tools provided by FedoraGet up and running with open container creation using PodmanWho this book is forThis book is for individuals who want to use Fedora Linux as a workstation for daily system administration tasks and learn how to optimize the distribution's tools for these functions. Although you should have a basic understanding of Linux and system administration, extensive knowledge of it is not necessary.Table of ContentsLinux and Open Source ProjectsBest practices for installationTuning the desktop environmentOptimizing storage usageNetwork and connectivityText editorsLibreOffice SuiteMail clients and browsersSandboxed applicationsSystem AdministrationPerformance tuning best practicesSELinuxVirtualization and containers

  • von Kim Crawley
    56,00 €

    Get to grips with cloud exploits, learn the fundamentals of cloud security, and secure your organization's network by pentesting AWS, Azure, and GCP effectivelyKey Features:- Discover how enterprises use AWS, Azure, and GCP as well as the applications and services unique to each platform- Understand the key principles of successful pentesting and its application to cloud networks, DevOps, and containerized networks (Docker and Kubernetes)- Get acquainted with the penetration testing tools and security measures specific to each platform- Purchase of the print or Kindle book includes a free PDF eBookBook Description:With AWS, Azure, and GCP gaining prominence, understanding their unique features, ecosystems, and penetration testing protocols has become an indispensable skill, which is precisely what this pentesting guide for cloud platforms will help you achieve. As you navigate through the chapters, you'll explore the intricacies of cloud security testing and gain valuable insights into how pentesters evaluate cloud environments effectively.In addition to its coverage of these cloud platforms, the book also guides you through modern methodologies for testing containerization technologies such as Docker and Kubernetes, which are fast becoming staples in the cloud ecosystem. Additionally, it places extended focus on penetration testing AWS, Azure, and GCP through serverless applications and specialized tools. These sections will equip you with the tactics and tools necessary to exploit vulnerabilities specific to serverless architecture, thus providing a more rounded skill set.By the end of this cloud security book, you'll not only have a comprehensive understanding of the standard approaches to cloud penetration testing but will also be proficient in identifying and mitigating vulnerabilities that are unique to cloud environments.What You Will Learn:- Familiarize yourself with the evolution of cloud networks- Navigate and secure complex environments that use more than one cloud service- Conduct vulnerability assessments to identify weak points in cloud configurations- Secure your cloud infrastructure by learning about common cyber attack techniques- Explore various strategies to successfully counter complex cloud attacks- Delve into the most common AWS, Azure, and GCP services and their applications for businesses- Understand the collaboration between red teamers, cloud administrators, and other stakeholders for cloud pentestingWho this book is for:This book is for aspiring Penetration Testers, and the Penetration Testers seeking specialized skills for leading cloud platforms-AWS, Azure, and GCP. Those working in defensive security roles will also find this book useful to extend their cloud security skills.Table of Contents- How Do Enterprises Utilize and Implement Cloud Networks?- How Are Cloud Networks Cyber Attacked?- Key Concepts for Pentesting Today's Cloud Networks- Security Features in AWS- Pentesting AWS Features through Serverless Applications and Tools- Pentesting Containerized Applications in AWS- Security Features in Azure- Pentesting Azure Features through Serverless Applications and Tools- Pentesting Containerized Applications in Azure- Security Features in GCP- Pentesting GCP Features through Serverless Applications and Tools- Pentesting Containerized Applications in GCP- Best Practices and Summary

  • 15% sparen
    von Bruno André Dotta
    34,00 €

    Questo lavoro illustra i fondamenti del cablaggio strutturato, il supporto fisico utilizzato per l'installazione di sistemi di Televisione a Circuito Chiuso. In questo particolare lavoro, sarà utilizzato per l'installazione di una Piccola Centrale Idroelettrica situata tra le città di Pinhal da Serra e Barracão, nel nord del Rio Grande do Sul, Brasile. Il cablaggio strutturato è già comunemente utilizzato negli uffici e nelle piccole imprese, con l'obiettivo di stabilire un'installazione standard, indipendentemente dal produttore, e di offrire all'utente la possibilità di espansione e la facilità di modifiche fisiche senza perdita di velocità e dati, Sulla base di questo concetto, possiamo utilizzare il cablaggio strutturato per l'installazione di un sistema di televisione a circuito chiuso, in quanto offrirà all'utente la sicurezza dei dati trasmessi, in questo caso le immagini, con la possibilità di aggiungere nuovi punti, ad esempio le telecamere, senza la necessità di un nuovo cablaggio. Per collegare i componenti si utilizzeranno cavi metallici a coppia ritorta e fibre ottiche, che raggiungono entrambi gli stessi obiettivi.

  • 16% sparen
    von Sarhang Ibrahim
    42,00 €

    La seguridad de la capa dos es muy importante para toda la red local. Las LANs o VLANs tienen problemas cuando los atacantes consiguen comprometer uno de los hosts en la misma VLAN o LANs. Entonces todos los hosts de la misma red estarán en peligro. A veces, la capa dos de la OSI tiene problemas de seguridad, especialmente en el entorno DMZ, porque la DMZ sólo protege la capa tres y sólo filtra el tráfico entrante y saliente. Además, si se utiliza un cortafuegos para proteger la capa dos, el cortafuegos no puede filtrar el tráfico local dentro de una VLAN; el tráfico local de una subred no pasa por el nivel superior ni por el cortafuegos. Para resolver este problema con la capa dos de seguridad VLAN privada es la mejor opción para filtrar el tráfico local y aislar los hosts en la VLAN de venta. Esta investigación describe una característica para aislar hosts en la capa dos de un switch.

  • 14% sparen
    von Saida Safibullaevna Beknazarova
    31,00 €

    La monografía presenta un estudio exhaustivo de los métodos de descripción de objetos geométricos complejos aplicables a la resolución de problemas de modelización matemática en diversos campos, la visualización de objetos tridimensionales y los aspectos geométricos de la identificación de sus características, así como el modelo de un edificio de gran altura. La modelización de procesos físicos y mecánicos y de estructuras de ingeniería suele ir asociada a la necesidad de crear modelos geométricos. Con su ayuda es posible definir una imagen de un objeto existente o diseñado, realizar un experimento numérico correspondiente al planteamiento del problema y efectuar las correcciones necesarias. La descripción formal en relación con el desarrollo de métodos modernos de modelización por ordenador consiste principalmente en la simulación numérica de objetos geométricos del mundo circundante. En este caso, su diversidad se crea utilizando elementos geométricos básicos: puntos, líneas y superficies.

  • von Sarhang Ibrahim
    49,90 €

    Die Sicherheit der zweiten Schicht ist für das gesamte lokale Netzwerk sehr wichtig. LANs oder VLANs haben Probleme, wenn Angreifer einen der Hosts im selben VLAN oder LANs kompromittieren können. Dann sind alle Hosts im selben Netzwerk in Gefahr. Manchmal hat die Schicht zwei des OSI ein Sicherheitsproblem, vor allem in der DMZ-Umgebung, weil die DMZ nur die Schicht drei schützt, die den ein- und ausgehenden Verkehr filtert. Außerdem kann die Firewall bei Verwendung einer Firewall zum Schutz der Schicht zwei den lokalen Datenverkehr innerhalb eines VLANs nicht filtern; der lokale Datenverkehr in einem Subnetz geht nicht durch die obere Ebene oder die Firewall. Um dieses Problem mit der Sicherheit der zweiten Schicht zu lösen, ist ein privates VLAN die beste Wahl, um den lokalen Datenverkehr zu filtern und die Hosts im Verkaufs-VLAN zu isolieren. Diese Forschungsarbeit beschreibt eine Funktion zur Isolierung von Hosts in der zweiten Schicht auf einem Switch.

  • 15% sparen
    von Bruno André Dotta
    34,00 €

    Este trabajo mostrará los fundamentos del cableado estructurado, medio físico utilizado para la instalación de sistemas de Circuito Cerrado de Televisión. En este trabajo en particular, será utilizado para la instalación de una Pequeña Central Hidroeléctrica localizada entre las ciudades de Pinhal da Serra y Barracão, en el norte de Rio Grande do Sul, Brasil. El cableado estructurado ya es comúnmente utilizado en oficinas y pequeñas empresas. Su objetivo es establecer una instalación estándar, independientemente del fabricante, y ofrecer al usuario la posibilidad de expansión, así como la facilidad de cambios físicos sin pérdida de velocidad y datos, Basándonos en este concepto, podemos utilizar el cableado estructurado para la instalación de un sistema de Circuito Cerrado de Televisión, ya que ofrecerá al usuario seguridad en los datos que se transmiten, en este caso imágenes, con la posibilidad de añadir nuevos puntos, es decir, cámaras, sin necesidad de nuevo cableado. Para conectar los componentes se utilizarán cables metálicos de par trenzado y fibra óptica, ambos con los mismos objetivos.

  • von Saida Safibullaevna Beknazarova
    35,90 €

    Die Monographie stellt eine umfassende Studie über Methoden zur Beschreibung komplexer geometrischer Objekte vor, die zur Lösung von Problemen der mathematischen Modellierung in verschiedenen Bereichen, der Visualisierung dreidimensionaler Objekte und geometrischer Aspekte der Identifizierung ihrer Merkmale sowie eines Modells eines Hochhauses anwendbar sind. Die Modellierung physikalischer und mechanischer Prozesse und technischer Strukturen ist häufig mit der Notwendigkeit verbunden, geometrische Modelle zu erstellen. Mit ihrer Hilfe ist es möglich, ein Abbild eines bestehenden oder geplanten Objekts zu definieren, ein der Problemstellung entsprechendes numerisches Experiment durchzuführen und die notwendigen Korrekturen vorzunehmen. Die formale Beschreibung im Zusammenhang mit der Entwicklung moderner Methoden der Computermodellierung ist in erster Linie die numerische Simulation von geometrischen Objekten der umgebenden Welt. In diesem Fall wird ihre Vielfalt mit Hilfe geometrischer Grundelemente erzeugt: Punkte, Linien und Flächen.

  • von Bruno André Dotta
    39,90 €

    In dieser Arbeit werden die Grundlagen der strukturierten Verkabelung, dem physikalischen Medium für die Installation von Closed Circuit Television-Systemen, dargestellt. In dieser speziellen Arbeit wird sie für die Installation eines kleinen Wasserkraftwerks zwischen den Städten Pinhal da Serra und Barracão im Norden von Rio Grande do Sul, Brasilien, verwendet. Die strukturierte Verkabelung wird bereits häufig in Büros und kleinen Unternehmen eingesetzt. Ihr Ziel ist es, eine Standardinstallation unabhängig vom Hersteller zu etablieren und dem Benutzer die Möglichkeit der Erweiterung sowie einfache physikalische Änderungen ohne Geschwindigkeits- und Datenverlust zu bieten, Auf der Grundlage dieses Konzepts können wir die strukturierte Verkabelung für die Installation eines Closed Circuit Television-Systems verwenden, da sie dem Benutzer Sicherheit für die übertragenen Daten, in diesem Fall Bilder, bietet und die Möglichkeit bietet, neue Punkte, d. h. Kameras, hinzuzufügen, ohne dass eine neue Verkabelung erforderlich ist. Für die Verbindung der Komponenten werden verdrillte Metallkabel und Glasfaserkabel verwendet, die beide die gleichen Ziele erreichen.

  • 16% sparen
    von Sarhang Ibragim
    42,00 €

    Bezopasnost' wtorogo urownq ochen' wazhna dlq wsej lokal'noj seti. V lokal'nyh setqh ili VLAN woznikaüt problemy, kogda zloumyshlennikam udaetsq skomprometirowat' odin iz hostow w toj zhe VLAN ili LAN. Togda pod ugrozoj okazywaütsq wse uzly odnoj seti. Inogda wtoroj urowen' OSI imeet problemy s bezopasnost'ü, osobenno w srede DMZ, poskol'ku DMZ zaschischaet tol'ko tretij urowen', fil'truq whodqschij i ishodqschij trafik. Krome togo, w sluchae ispol'zowaniq mezhsetewogo äkrana dlq zaschity wtorogo urownq brandmauär ne mozhet fil'trowat' lokal'nyj trafik wnutri VLAN; lokal'nyj trafik w odnoj podseti ne prohodit cherez werhnij urowen' ili mezhsetewoj äkran. Dlq resheniq ätoj problemy s zaschitoj wtorogo urownq chastnaq VLAN qwlqetsq luchshim wyborom dlq fil'tracii lokal'nyh trafikow i izolqcii hostow w prodawaemoj VLAN. V dannom issledowanii opisywaetsq funkciq izolqcii hostow na wtorom urowne na kommutatore.

  • 16% sparen
    von Sarhang Ibrahim
    42,00 €

    A segurança do nível dois é muito importante para toda a rede local. As LANs ou VLANs têm problemas quando os atacantes comprometem um dos anfitriões da mesma VLAN ou LAN. Nesse caso, todos os anfitriões da mesma rede estarão em risco. Por vezes, a camada dois do OSI tem problemas de segurança, especialmente no ambiente DMZ, porque a DMZ apenas protege a camada três, filtrando o tráfego de entrada e de saída. Além disso, no caso de se utilizar uma firewall para proteger o nível dois, esta não pode filtrar o tráfego local no interior de uma VLAN; o tráfego local numa sub-rede não passa pelo nível superior nem pela firewall. Para resolver este problema com a segurança da camada dois, a VLAN privada é a melhor opção para filtrar os tráfegos locais e isolar os anfitriões na VLAN de venda. Esta investigação descreve uma funcionalidade para isolar os anfitriões na camada dois num comutador.

  • 15% sparen
    von Bruno André Dotta
    34,00 €

    V dannoj rabote budut rassmotreny osnowy strukturirowannoj kabel'noj sistemy - fizicheskoj sredy, ispol'zuemoj dlq ustanowki sistem ohrannogo telewideniq. V dannoj konkretnoj rabote ona budet ispol'zowana dlq ustanowki maloj gidroälektrostancii, raspolozhennoj mezhdu gorodami Pin'ql-da-Serra i Barrakan na sewere shtata Riu-Grandi-du-Sul, Braziliq. Strukturirowannaq kabel'naq sistema uzhe shiroko ispol'zuetsq w ofisah i na malyh predpriqtiqh. Ee cel' - sozdat' standartnuü ustanowku, nezawisimo ot proizwoditelq, i predlozhit' pol'zowatelü wozmozhnost' rasshireniq, a takzhe prostotu fizicheskih izmenenij bez poteri skorosti i dannyh, Ishodq iz ätoj koncepcii, my mozhem ispol'zowat' strukturirowannuü kabel'nuü set' dlq ustanowki sistemy wideonablüdeniq, poskol'ku ona obespechiwaet bezopasnost' peredawaemyh dannyh, w dannom sluchae izobrazhenij, i wozmozhnost' dobawleniq nowyh tochek, t.e. kamer, bez neobhodimosti prokladki nowyh kabelej. Dlq soedineniq komponentow budut ispol'zowat'sq metallicheskie kabeli tipa "witaq para" i optowolokno, kotorye dostigaüt odnih i teh zhe celej.

  • 14% sparen
    von Saida Safibullaevna Beknazarova
    31,00 €

    A monografia apresenta um estudo exaustivo dos métodos de descrição de objectos geométricos complexos aplicáveis à resolução de problemas de modelação matemática em vários domínios, à visualização de objectos tridimensionais e aos aspectos geométricos da identificação das suas características, bem como a um modelo de um edifício alto. A modelação de processos físicos e mecânicos e de estruturas de engenharia está frequentemente associada à necessidade de criar modelos geométricos. Com a sua ajuda, é possível definir uma imagem de um objeto existente ou concebido, realizar uma experiência numérica correspondente ao enunciado do problema e efetuar as correcções necessárias. A descrição formal relacionada com o desenvolvimento de métodos modernos de modelação computacional é, antes de mais, a simulação numérica de objectos geométricos do mundo circundante. Neste caso, a sua diversidade é criada utilizando elementos geométricos básicos: pontos, linhas e superfícies.

  • 14% sparen
    von Saida Safibullaevna Beknazarova
    31,00 €

    The monograph presents a comprehensive study of methods for describing complex geometric objects applicable to solving problems of mathematical modeling in various fields, visualization of three-dimensional objects and geometric aspects of identifying their features, and a model of a high-rise building. Modeling of physical and mechanical processes and engineering structures is often associated with the need to create geometric models. With their help it is possible to define an image of an existing or designed object, to conduct a numerical experiment corresponding to the problem statement and to carry out the necessary corrections. The formal description in connection with the development of modern methods of computer modeling is primarily the numerical modeling of geometric objects of the surrounding world. In this case, their variety is created using basic geometric elements: points, lines and surfaces.

  • 16% sparen
    von Sarhang Ibrahim
    42,00 €

    La sécurité de la couche deux est très importante pour l'ensemble du réseau local. Les réseaux locaux (LAN) ou les réseaux locaux virtuels (VLAN) rencontrent des problèmes lorsque des attaquants compromettent l'un des hôtes du même réseau local virtuel (VLAN) ou local (LAN). Tous les hôtes du même réseau sont alors menacés. Parfois, la couche 2 de l'OSI pose des problèmes de sécurité, en particulier dans l'environnement DMZ, car la DMZ ne protège que la couche 3, qui ne fait que filtrer le trafic entrant et sortant. En outre, si l'on utilise un pare-feu pour protéger la couche deux, le pare-feu ne peut pas filtrer le trafic local à l'intérieur d'un VLAN ; le trafic local d'un sous-réseau ne passe pas par le niveau supérieur ou le pare-feu. Pour résoudre ce problème avec la sécurité de la couche deux, le VLAN privé est le meilleur choix pour filtrer le trafic local et isoler les hôtes dans le VLAN de vente. Cette recherche décrit une fonction permettant d'isoler les hôtes dans la couche deux sur un commutateur.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.