Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Computer & IT

Hier finden Sie eine Auswahl von über Computer & IT spannenden Büchern zum Thema 121.809.
Mehr anzeigen
Filter
Filter
Ordnen nachSortieren Beliebt
  • 15% sparen
    von Shah Sarfaraz
    34,00 €

    Konechno, prekraschenie ispol'zowaniq produktow i uslug ne qwlqetsq chem-to nowym, no s prihodom oblachnyh tehnologij prekraschaetsq ispol'zowanie serwisow, kotorym lüdi dowerili mnozhestwo lichnyh ili inyh wazhnyh dannyh i wo mnogih sluchaqh potratili mnogo wremeni na ih sozdanie i organizaciü. Po mere rasshireniq ispol'zowaniq oblachnyh serwisow predpriqtiq budut stalkiwat'sq s analogichnymi problemami, inogda w gorazdo bol'shih masshtabah.

  • von Shah Sarfaraz
    39,90 €

    Die Einstellung von Produkten und Diensten ist natürlich nichts Neues, neu ist jedoch die Einstellung von Diensten, denen Menschen viele persönliche oder anderweitig wichtige Daten anvertraut haben und in vielen Fällen viel Zeit in die Erstellung und Organisation dieser Daten investiert haben. Wenn Unternehmen verstärkt Cloud-Dienste nutzen, werden sie mit ähnlichen Problemen zu kämpfen haben, manchmal sogar in viel größerem Umfang.

  • 15% sparen
    von Shah Sarfaraz
    34,00 €

    La discontinuidad de productos y servicios no es nada nuevo, por supuesto, pero lo que sí es nuevo con la llegada de la nube es la discontinuidad de servicios a los que la gente ha confiado muchos datos personales o importantes y, en muchos casos, ha dedicado mucho tiempo a crear y organizar esos datos. A medida que las empresas aumenten el uso de los servicios en la nube, se enfrentarán a problemas similares, a veces a una escala mucho mayor.

  • 16% sparen
    von Venkata Karthik Penikalapati
    37,00 €

    In a world where data is generated at an unprecedented rate, organizations face the challenge of moving beyond conventional databases to store, manage, and derive valuable insights from their data. Data lakes, with their dynamic capabilities, provide a scalable, flexible, and cost-effective solution for the storage and processing of extensive and diverse datasets. They form the cornerstone for AI and machine learning initiatives, serving as the fertile ground for the development, training, and deployment of advanced AI models. We will delve into the monumental importance of data lakes in the AI era and elucidate how they act as enablers for the transformation of raw data into actionable insights.

  • 15% sparen
    von Shah Sarfaraz
    34,00 €

    Produtos e serviços descontinuados não são novidade, é claro, mas o que é novo com a chegada da nuvem é a descontinuação de serviços aos quais as pessoas confiaram muitos dados pessoais ou importantes e, em muitos casos, dedicaram muito tempo à criação e organização desses dados. À medida que as empresas aumentam a sua utilização de serviços na nuvem, vão-se debater com problemas semelhantes, por vezes numa escala muito maior.

  • von Urs Niederhauser
    49,90 €

    ===========================Relationale Datenmodellierung ===========================Eine Modellierungshilfe für DB-DesignerVon einem Praktiker für Studierende===========================Das Heft erklärt von der Sequentiellen über die Direktzugriffsmethoden bis zum Relationalen Datenbankdesign die Schritte zur erfolgreichen eigenen DB-Modellierung.Viel Spass dabei!! Urs Niederhauser

  • von Erol Giraudy
    11,00 €

    Ce Tome 2 : OpenAI et Microsoft des solutions et outils, pour une gouvernance de l'IA par des experts. Il expose les dernières avancées de Microsoft et OpenAI tout en illustrant comment ces deux acteurs de l'intelligence artificielle collaborent de manière complémentaire. Notamment dans le vaste domaine de l'IA et d'Azure avec ChatGPT, DALL·E et Copilot.La création de ce livre sur l'Intelligence Artificielle (IA) a été inspirée par la convergence entre des MVP, des anciens MVP et un MVP Alumni, ils sont à l'origine du tome1 : OpenAI© et Microsoft© des solutions, une gouvernance par des experts.Il explore également en détail la gouvernance, l'audit et le contrôle de l'IA. Il présente les outils adaptés, notamment à travers un "tableau interactif" qui fournit des liens directs vers ces ressources et applications. Il aborde les sujets de la gouvernance, l'audit, la sécurité et le pilotage de l'IA avec des outils spécifiques et des recommandations, ainsi que la formation à l'IA.Ce livre détaille aussi ces solutions et montre comment les mettre oeuvre. Notre Tome 1 était plus ciblé sur OpenAI et Microsoft et leurs solutions.

  • von Tom Taulli
    49,00 €

    This book will show how generative technology works and the drivers. It will also look at the applications - showing what various startups and large companies are doing in the space. There will also be a look at the challenges and risk factors. During the past decade, companies have spent billions on AI.  But the focus has been on applying the technology to predictions - which is known as analytical AI.  It can mean that you receive TikTok videos that you cannot resist. Or analytical AI can fend against spam or fraud or forecast when a package will be delivered. While such things are beneficial, there is much more to AI.  The next megatrend will be leveraging the technology to be creative. For example, you could take a book and an AI model will turn it into a movie - at very little cost. This is all part of generative AI. It's still in the nascent stages but it is progressing quickly. Generative AI can already create engaging blog posts, social media messages, beautiful artwork and compelling videos. The potential for this technology is enormous.  It will be useful for many categories like sales, marketing, legal, product design, code generation, and even pharmaceutical creation. What You Will Learn The importance of understanding generative AI The fundamentals of the technology, like the foundation and diffusion models How generative AI apps work How generative AI will impact various categories like the law, marketing/sales, gaming, product development, and code generation. The risks, downsides and challenges. Who This Book is For Professionals that do not have a technical background. Rather, the audience will be mostly those in Corporate America (such as managers) as well as people in tech startups, who will need an understanding of generative AI to evaluate the solutions.

  • von Rafeal Mechlore
    31,00 €

    Finance 2.0 addresses the following developmental move toward the universe of banking and money, a groundbreaking excursion filled by innovation, advancement, and changing client assumptions. This new period isn't simply a redesign yet a total reconsidering of how monetary administrations are conveyed, experienced, and made due. At the center of Money 2.0 is the use of state of the art advancements, for example, blockchain, computerized reasoning, and information investigation. These advancements have proactively started to alter customary financial activities, prompting further developed proficiency and security. Blockchain, for example, is introducing another time of straightforwardness and confidence in monetary exchanges. Shrewd agreements, empowered by blockchain, computerize complex monetary cycles with unparalleled accuracy. Man-made brainpower, one more foundation of Money 2.0, is changing client cooperations. Chatbots and menial helpers give every minute of every day customized help, while man-made intelligence driven calculations empower banks to offer modified monetary arrangements, survey credit risk, and distinguish misrepresentation continuously. These headways guarantee improved client encounters, quicker direction, and better gamble the board. Finance 2.0 additionally implies the ascent of decentralized finance (DeFi) and computerized monetary standards. DeFi stages are reshaping loaning, acquiring, and exchanging by killing middle people and offering clients more prominent command over their resources. In the interim, digital currencies like Bitcoin and Ethereum are testing the customary idea of cash and empowering cross-line exchanges with uncommon speed and cost-productivity. The fate of banking in the Money 2.0 period is additionally about monetary consideration. Innovation is spanning holes by giving financial administrations to unbanked populaces through versatile banking and computerized wallets. These arrangements engage people to get to monetary assets, construct credit, and partake in the worldwide economy. Be that as it may, this new scene accompanies its own arrangement of difficulties, including expanded online protection gambles and the requirement for powerful administrative structures to guarantee the security and trustworthiness of monetary frameworks

  • von Ethan Calderwood
    30,00 €

    The tools we use in software development are constantly changing to allow for more productivity, enhanced functionality, and more seamless workflows. Among these tools, Docker is particularly noteworthy for being a game-changer, altering how we develop, construct, and use applications.Welcome to " Navigating Docker: From Setup to Deployment - A Developer's Companion". This e-book will serve as your map to helpyou navigate the vast sea of containerization. This e-book is designed with you in mind, regardless of your level of experience-from atotal novice who has never heard the term "Docker" to an intermediate developer looking to strengthen your knowledge andabilities.We shall go on a journey through the pages of this e-book that begins at the very core of Docker, explaining its design and the main waysit differs from conventional virtual machines. We'll delve into every detail of this potent platform, from configuring Docker on your local computer to learning about Docker files, container management, networking, and more.

  • von William Drake
    30,00 €

    There has never been a more critical demand for speed, consistency, and scalability in the dynamic field of software development. While helpful, traditional approaches may fail when faced with the demands of contemporary applications, leading developers on a never-ending search for improved tools and practices. Presenting Docker: an application packaging, shipping, and running platform that efficiently runs apps as lightweight containers. With its ability to simplify and revolutionize software development and deployment processes, Docker has risen to prominence in the computer sector and is now a vital tool for developers everywhere. With regard to this innovative technology, "Docker Unveiled: The Comprehensive Handbook to Streamlined Development" seeks to be your go-to resource. This book is designed with developers curious about containerization in mind, as well as newcomers starting their Docker journey. We will examine the fundamental ideas behind containerization, comprehend the basic architecture of Docker, and delve deeply into its extensive feature set. ¿Come along on this in-depth exploration of the Docker universe, where applications expand effortlessly, deployments are reliable, and development is effective. Welcome to "Docker Unveiled: The Comprehensive Handbook to Streamlined Development."

  • von Oscar Moses
    27,00 €

    In the rapidly evolving landscape of digital entrepreneurship, 'TikTok Triumph' stands as the definitive guide to navigating the vibrant world of TikTok with finesse and purpose. Authored by seasoned experts in social media strategy, this book goes beyond the trends and viral dances, providing a comprehensive roadmap for individuals and businesses looking to leverage TikTok for entrepreneurial success.Chapter 1: Introduction to TikTok EntrepreneurshipEmbark on your TikTok journey with a solid foundation. This chapter lays the groundwork, introducing you to the principles that will shape your entrepreneurial endeavors on the platform.Chapter 2: Crafting Your TikTok IdentityDive deep into the art of self-expression on TikTok. Learn how to carve out a unique identity that resonates with your target audience, setting the stage for authentic and compelling content creation.Chapter 3: Essential Tools and Features for TikTok SuccessEquip yourself with the tools and features that will amplify your TikTok presence. Uncover the hidden gems and functionalities that can make a significant difference in your content strategy.Chapter 4: Building a Captivated AudienceMaster the art of audience engagement. Explore proven techniques for building and maintaining a captivated audience that will eagerly anticipate your next TikTok creation.Chapter 5: Monetizing Your TikTok PresenceTurn your passion into profit. This chapter delves into various monetization strategies, offering practical insights on how to capitalize on your TikTok presence.Chapter 6: Navigating TikTok ChallengesEvery platform has its challenges, and TikTok is no exception. Discover how to navigate obstacles and setbacks, turning challenges into opportunities for growth.Chapter 7: TikTok Analytics and MetricsNumbers tell a story. Learn how to decipher TikTok analytics and metrics, gaining valuable insights into the performance of your content and audience engagement.Chapter 8: Expanding Your TikTok Presence Beyond the AppUnlock the potential of cross-platform presence. Explore strategies for extending your influence beyond TikTok, creating a cohesive brand identity across various digital platforms.Chapter 9: Collaborations and PartnershipsForge meaningful collaborations. This chapter guides you through the process of establishing partnerships on TikTok, amplifying your reach through strategic alliances.Chapter 10: TikTok as a Marketing ChannelExplore the nuances of TikTok as a marketing powerhouse. Uncover innovative marketing strategies tailored to the dynamic nature of the platform.Chapter 11: Legal and Ethical Considerations on TikTokNavigate the legal landscape with confidence. Understand the ethical considerations surrounding TikTok content creation and promotion, ensuring a responsible and sustainable approach.Chapter 12: Overcoming Entrepreneurial Challenges on TikTokEntrepreneurship is a journey filled with challenges. Discover practical solutions and resilience strategies specific to TikTok, empowering you to overcome obstacles on your path to success.Chapter 13: Scaling Your Business through TikTokElevate your entrepreneurial journey. This chapter provides a roadmap for scaling your business, leveraging TikTok as a catalyst for sustainable growth.Chapter 14: TikTok Trends and Future InsightsStay ahead of the curve. Gain valuable insights into emerging TikTok trends and future developments, positioning yourself at the forefront of the platform's evolution.

  • 14% sparen
    von Singaravelan Shanmugasundaram
    31,00 €

    A segurança da rede ajuda a prevenir a rede contra os intrusos que realizam actividades maliciosas. A segurança pode ser fornecida às redes através de firewalls, software antivírus e scanners, sistemas criptográficos, Secure Socket Layer (SSL) e Intrusion Detection Systems (IDS). A autenticação é a técnica normalmente utilizada para proteger os utilizadores não autorizados da rede. No entanto, é fácil comprometer as palavras-passe de início de sessão através de ataques de força bruta. Os IDS e as firewalls concentram-se nos ataques externos, enquanto os ataques internos não são tidos em conta. Para resolver estes problemas, este documento propõe um Sistema de Descoberta e Defesa contra Interrupções Internas (IIDDS) ao nível da Chamada de Sistema (SC) utilizando técnicas de extração de dados e forenses. Os perfis dos utilizadores são mantidos e comparados com o conjunto de dados real utilizando a distância de Hellinger. É aplicada uma função de hash às mensagens recebidas e estas são resumidas no conjunto de dados de esboço. Os resultados experimentais avaliam o sistema proposto em termos de exatidão e tempo de resposta.

  • 16% sparen
    von Luis Fernando Aguas Bucheli
    37,00 €

    "Manos a la Obra: Prácticas de Laboratorio en Estructuras de Datos" es un libro que sumerge a los lectores en el emocionante mundo de las estructuras de datos a través de una experiencia práctica. El libro aborda de manera exhaustiva y accesible una amplia gama de estructuras de datos esenciales, desde listas enlazadas y pilas hasta árboles y grafos, y guía a los lectores a través de su implementación en el laboratorio.A través de ejemplos detallados, ejercicios prácticos y proyectos, los lectores adquieren una comprensión profunda de cómo funcionan estas estructuras y cómo se aplican en situaciones del mundo real. El enfoque del libro se centra en la resolución de problemas y en la escritura de código eficiente, lo que permite a los estudiantes y profesionales de la informática desarrollar habilidades prácticas sólidas en el manejo de datos.Además de la programación, el libro también explora estrategias de optimización y mejores prácticas para el uso de estructuras de datos, lo que lo convierte en una guía integral para aquellos que desean mejorar sus habilidades en este campo.

  • von Rob Botwright
    54,00 €

    Introducing the "RECONNAISSANCE 101" Book Bundle: Unleash Your Ethical Hacking Potential!Are you ready to embark on a thrilling journey into the world of ethical hacking and information gathering? Look no further, because the "RECONNAISSANCE 101" Book Bundle is here to equip you with the essential knowledge and skills you need to excel in this exciting field.¿¿¿¿ BOOK 1: RECONNAISSANCE 101: A BEGINNER'S GUIDE TO FOOTPRINTING & INFORMATION GATHERINGIf you're new to ethical hacking, this beginner's guide is your perfect starting point. Dive into the fundamentals of reconnaissance and information gathering, learning the ropes of footprinting in a clear and approachable manner. Lay a solid foundation for your ethical hacking journey.¿¿¿¿ BOOK 2: MASTERING FOOTPRINTING: ADVANCED INFORMATION GATHERING STRATEGIES FOR ETHICAL HACKERSReady to take your skills to the next level? In this volume, you'll explore advanced information gathering techniques used by ethical hackers worldwide. Discover how to navigate the digital landscape with precision and uncover hidden insights to enhance your cybersecurity prowess.¿¿¿¿ BOOK 3: THE ETHICAL HACKER'S FIELD GUIDE TO TARGET DATA ACQUISITIONEthical hacking isn't just about collecting data-it's about doing so responsibly and ethically. Book 3 delves into the principles of responsible data acquisition, ensuring you gather valuable information while maintaining the highest ethical standards. Learn how to identify vulnerabilities and strengthen security.¿¿¿¿ BOOK 4: RECONNAISSANCE PRO: THE ULTIMATE HANDBOOK FOR ELITE INFORMATION GATHERERSAre you ready to become an elite information gatherer? This ultimate handbook will elevate your skills to the highest echelons of the field. Uncover the secrets and tactics employed by the best ethical hackers, propelling you into the realm of elite information gatherers.¿¿¿¿ Why Choose the "RECONNAISSANCE 101" Book Bundle?· Comprehensive Knowledge: Covering everything from the basics to elite strategies, this bundle provides a complete understanding of reconnaissance and ethical hacking.· Responsible Hacking: Embrace ethical principles, responsible disclosure, and legal compliance in your journey to become an ethical hacker.· Expert Guidance: Benefit from the expertise of seasoned professionals who have distilled their knowledge into these invaluable books.· Stay Ahead: In the ever-evolving world of cybersecurity, staying updated is crucial. This bundle equips you with the latest insights and strategies.Don't miss this opportunity to become a master of reconnaissance and ethical hacking. Whether you're a beginner or looking to sharpen your skills, the "RECONNAISSANCE 101" Book Bundle is your ticket to success in the exciting world of ethical hacking. Secure your copy today and unlock the doors to a promising cybersecurity career!

  • von Ron Veen
    49,00 €

    A pragmatic guide for modernizing your Java EE App with Jakarta EE for cloud-native, serverless excellenceKey FeaturesExplore the cargo tracker application, an industry-relevant example that illustrates key Jakarta EE concepts and practicesLearn how to transition from Java EE to Jakarta EE to modernize your existing applicationsUnderstand the benefits of cloud technologies and how to deploy a Jakarta EE application to the cloudPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionCloud-Native Development and Migration to Jakarta EE will help you unlock the secrets of Jakarta EE's evolution as you explore the migration and modernization of your applications. You'll discover how to make your code compatible with the latest Jakarta EE version and how to leverage its modern features effectively.First, you'll navigate the realm of cloud-native development as you demystify containers and get introduced to the Eclipse MicroProfile, a powerful tool in your toolkit. Next, you'll take the bold step of transitioning your applications from local hardware to the limitless possibilities of the cloud. By following the author's expert guidance to deploy your Jakarta EE applications on Microsoft Azure, you'll gain hands-on experience in managing cloud resources.In the final leg of your journey, you'll explore the world of serverless architecture. You'll learn to design and run services that are truly serverless, harnessing the potential of the event-driven paradigm for scalability and cost-efficiency.By the end of this book, you'll have mastered Jakarta EE and become a proficient cloud-native developer. Join us on this exciting journey of transformation and innovation as you pave the way for the future of Jakarta EE and cloud-native development.What you will learnExplore the latest advancements in Jakarta EE and gain a thorough understanding of its core features and capabilitiesUnderstand the principles and practices of designing and building cloud-native applicationsGain a detailed understanding of containers and DockerUncover how to embrace containers in your IT landscapeMove from your own hardware to managed hardware in the cloudDiscover how Kubernetes enhances scalability, resilience, and portabilityWho this book is forThis book is for developers working in small or large companies developing applications in Jakarta EE. If you're looking for a comprehensive guide that will provide you with all the tools and guidance needed to upgrade your existing applications, then this is the book for you. Intermediate-level knowledge and experience with Java EE 5/6/7/8 will help you get the most out of this book.Table of ContentsThe History of Enterprise JavaIntroducing the Cargo Tracker ApplicationMoving from Java EE to Jakarta EEModernizing Your Application with the Latest FeaturesMaking Your Application TestableIntroduction to Containers and DockerMeet KubernetesWhat Is Cloud Native?Deploying Jakarta EE Applications in the CloudIntroducing MicroProfileAppendix AAppendix B

  • von Ian Neil
    52,00 €

    Efficiently prepare for both CompTIA A+ Core 1 and Core 2 exams with a variety of exam-oriented practice questions to ensure that your knowledge is tested thoroughlyKey Features:Ensure a comprehensive understanding of each exam domain with in-depth practiceEnhance your problem-solving skills by working with real-world scenariosAssess your exam readiness with mock exams for both Core 1 and Core 2Purchase of this book unlocks access to web-based exam prep resources including practice questions, flashcards, and exam tipsBook Description:The CompTIA A+ exam is not only a valuable foundational certification, but also the key to unlocking a world of exciting career possibilities in the ever-dynamic IT landscape. This book combines the best-in-class practice tests for the exam, offering a substantial volume of exam-oriented practice material and mirroring the A+ exam's level of difficulty to ensure that you are not just prepared, but brimming with confidence when you sit for the A+ exam.The book begins with Core 1, delving into mobile devices, networking, hardware, virtualization, cloud computing, and troubleshooting. The chapters help you consolidate foundational knowledge essential for supporting computer software and hardware. As you progress to Core 2, you'll review the knowledge you need to support common operating systems and software installations. This book grants you lifelong access to valuable supplementary resources available on an online platform, which include A+ flashcards and invaluable exam insights. With unlimited website access, you'll have the freedom to practice as often as you wish, optimizing your readiness for the exam.By the end of this book, you'll be fully prepared to confidently take both the CompTIA A+ Core 1 and Core 2 exams.What You Will Learn:Expertly diagnose and resolve hardware, software, and networking issuesNavigate Microsoft Windows, macOS, Linux, and more with confidenceSecure wireless networks and protect against threatsTroubleshoot problems related to motherboards, RAM, CPU, and powerSkillfully use Microsoft command-line toolsImplement workstation backup and recovery methodsUtilize remote access technologies with easeAssess your proficiency in communication techniques and professional conductWho this book is for:Whether you're a student or a professional, if you're on a mission to ace the CompTIA A+ exam, this book is for you. This book isn't meant for teaching theory; instead, it will evaluate your retention of studied information and your exam readiness.

  • von Rafeal Mechlore
    30,00 €

    In the fast-paced world of telecommunications, two technologies have emerged as the unrivaled powerhouses transforming the industry - 5G and cloud computing. "5G and Cloud: Telecom's Dynamic Duo" delves deep into the remarkable synergy between 5G technology and cloud computing, illuminating the dynamic forces shaping the future of global communication networks. The telecommunications landscape has evolved dramatically in recent years. From the early days of voice calls and SMS to the era of high-speed mobile data, we are now on the cusp of a revolution that promises lightning-fast speeds, unparalleled connectivity, and innovative applications that were once thought to be mere science fiction. This transformation is primarily driven by two key factors: 5G technology and cloud computing. "5G and Cloud" begins by providing a thorough understanding of 5G technology. It traces the evolution of mobile networks from 1G to 4G and sheds light on what makes 5G the game-changer it is. With its promise of reduced latency, increased bandwidth, and massive device connectivity, 5G has the potential to unleash a new wave of possibilities across industries. The book then delves into cloud computing, elucidating its historical progression and the various cloud service models, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Readers will gain a comprehensive view of the benefits cloud computing brings to the telecom sector, from scalability and cost-efficiency to data management and agility. One of the key highlights of this book is its exploration of the convergence of 5G and cloud. It explains how these two technologies are mutually reinforcing, leading to more scalable, flexible, and efficient networks. Real-world examples showcase how companies are successfully integrating 5G and cloud to deliver innovative services and experiences. The transformation of network infrastructure is another critical area discussed in the book. The rise of virtualized network functions, software-defined networking, and edge computing is reshaping the way telecommunications operate, and readers will gain insights into it. This dynamic duo also faces its fair share of challenges, from regulatory and ethical concerns to environmental implications. The book provides an in-depth look at how governments and organizations are addressing these issues. In the concluding chapters, "5G and Cloud" peers into the future of this dynamic duo, offering predictions for the next decade and discussing emerging technologies like AI and blockchain in the telecom sector. With its comprehensive, insightful, and forward-looking content, "5G and Cloud: Telecom's Dynamic Duo" is an indispensable guide for anyone interested in the world of telecommunications, from industry professionals and tech enthusiasts to business leaders and policymakers. This book promises to be a beacon for navigating the transformative journey that 5G and cloud computing are leading us through in the digital age.

  • von Refeal Mechlore
    33,00 €

    "Cloud-First Techniques: The Fate of IT Foundation in India" is a canny and forward-looking investigation into the groundbreaking force of distributed computing in the Indian setting. This exhaustive book analyzes how cloud-first methodologies are reshaping the scene of IT foundation, upsetting enterprises, and speeding up advanced change drives the country over.In this present reality where the speed of mechanical change is tireless, the book resolves a basic inquiry: How could Indian organizations and associations saddle the maximum capacity of distributed computing to flourish in the computerized age? The book starts by setting the stage, offering a profound comprehension of the computerized change basic. It investigates how the combination of elements, including the multiplication of cell phones, information examination, and remote work, has shot India into a computerized period where IT framework assumes a focal part.One of the center topics of "Cloud-First Methodologies" is the idea of embracing cloud-first methodologies. Perusers will acquire important experiences into adopting a cloud-first outlook and why it is pivotal for associations of all sizes and ventures. The advantages of cloud-first systems are enlightened, going from expanded spryness and versatility to cost-proficiency and the capacity to improve at phenomenal rates. The book dives into the complexities of distributed computing, demystifying cloud administration models (IaaS, PaaS, SaaS) and sending models (public, private, crossover, multi-cloud). It furnishes perusers with the information expected to arrive at educated conclusions about the right blend regarding cloud administrations and organization models to meet their particular requirements."Cloud-First Techniques" perceives the foremost significance of safety and consistence in the Indian IT scene. With an emphasis on information protection and administrative moves one of a kind to India, the book outfits perusers with best practices and contextual investigations to effectively explore the complicated landscape of cloud security and consistence.As a pragmatic aide, the book gives suggestions and noteworthy bits of knowledge on building a cloud-first guide, fostering a business case for cloud reception, guaranteeing information security, and supporting a cloud-driven culture inside associations. "Cloud-First Techniques: The Eventual fate of IT Foundation in India" is a fundamental asset for business pioneers, IT experts, and anybody trying to comprehend the advancing scene of distributed computing in India. It offers a guide for utilizing cloud-first methodologies to remain serious, enhance, and prevail in the computerized future that anticipates India.

  • von Woldemariam
    25,00 €

    The All-Seeing Eyes of AI: Unveiling the Potential and Challenges of Artificial Intelligence in Unveiling DeceptionCONVERSATIONAL CHAT INFORMATIVE BOOK The rapid advancement of artificial intelligence (AI) has brought about a paradigm shift in our world, introducing a new era of automation, data analysis, and decision-making. AI's capabilities have extended far beyond traditional computing, enabling it to perceive, interpret, and interact with the world around us in ways that were once unimaginable. This transformative power has instilled in AI a ubiquitous presence, often referred to as its "all-seeing eyes."AI's pervasive surveillance, while raising privacy concerns, has also opened up a world of possibilities for combating deception and safeguarding our digital interactions. AI algorithms can analyze vast amounts of data, identify patterns and anomalies, and adapt to evolving tactics, making them invaluable tools in detecting and preventing deception.The all-seeing eyes of AI, while raising valid privacy concerns, hold immense potential for combating deception and safeguarding our digital interactions. By harnessing AI's capabilities responsibly and ethically, we can create a more trustworthy and secure online environment, protecting individuals, organizations, and society from the harmful effects of deception.

  • von Rafeal Mechlore
    30,00 €

    The convergence of fifth-generation wireless (5G) technology and cloud computing heralds the advent of a revolutionary new age in the rapidly developing field of telecommunications. This exciting confluence of cutting-edge technology is altering the ways in which we interact with one another, communicate with one another, and conduct business. The article "5G and Cloud Synergy Transforms Telecommunications" dives into this convergence, illuminating the significant effect that it has on the world. The introduction of 5G, also known as the fifth generation of wireless technology, has caused a significant upheaval in the field of telecommunications. The foundation of the digital ecosystem of the next generation is comprised of its characteristics, which include vastly improved data transfer rates, decreased latency, and massively enhanced device connectivity. The first part of the book is dedicated to demystifying 5G by elucidating its theoretical foundations and demonstrating the numerous opportunities that will become available as a result of its implementation. Readers will learn that 5G technology isn't only about quicker cellphones; rather, it is a catalyst for innovation across a wide variety of industries, including healthcare, manufacturing, transportation, and entertainment. On the other side, cloud computing, a technology that has been around for a while, has emerged as the technology that drives our data-driven world. It provides scalable services that can be used on demand, making it possible for enterprises to store and analyze data with a level of flexibility and efficiency not seen before. This book delves into the fundamentals of cloud computing, elaborating on its various services and deployment types, and shedding light on the crucial role that cloud computing plays in the overall journey toward digital transformation. The combination of fifth-generation wireless (5G) networks with cloud computing forms the core of the story. Readers will develop a deeper understanding, chapter by chapter, of the ways in which these various technologies complement one another. The infrastructure that is produced as a result of the combination of the high-speed and low-latency connections provided by 5G and the massive computational capabilities of the cloud is capable of supporting a wide variety of cutting-edge software programs. The authors dig into real-world case studies, illuminating the triumphs achieved and the difficulties encountered by pioneers who have successfully exploited this synergy. Industries across the board, from telemedicine to smart cities to entertainment and agriculture, are discovering new methods to harness this potential, thereby ushering in a new digital era. In the same way as with any other technical advancement, protecting one's privacy and security is of the utmost importance. This book analyzes the difficulties posed by data protection in 5G and cloud contexts and investigates several methods for ensuring data safety. In addition to this, it guides readers through the complicated world of regulatory frameworks and compliance, so ensuring that they are prepared to handle an environment that is both complex and always changing. In addition, the article "5G and Cloud Synergy Transforms Telecommunications" investigates the consequences for the entire world. In addition to delving into the geopolitical climate of the telecommunications industry, this article investigates the potential for these technologies to close the digital divide by opening up new doors for less developed countries.

  • von Enrico Wallet
    16,00 €

    Ever wonder why some people seem to have no trouble realising their aspirations while others find it difficult to advance? Unlocking your latent potential and enabling you to materialise your desires and change your life is what "The Art of Creative Visualisation: Manifesting Your Dreams" is all about.The Ability to Visualise See how visualisation may change your world and its transforming power. Find out how your inner flame of manifestation can be sparked by creative visualisation.How to Interpret Creative Visualisation Learn the fundamentals and methods of creative visualisation and discover how your goals and thoughts can come to pass in the actual world.Clarifying One's Intentions Learn how to create clear, motivating intentions that form the cornerstone of your ambitions. The secret to focused manifestation is having clear intentions.How to Make a Bright Vision Board Make a vivid and captivating vision board to help you visualise your dreams. You can use your vision board as a daily reminder of your ambitions and goals.Using the Law of Attraction in Your Favour Explore the Law of Attraction and discover how to bring your desires into your life by bringing your thoughts, feelings, and behaviours into alignment with them.Developing a Robust Belief Framework Develop a steadfast faith in your capacity to bring your dreams to life. Examine methods for boosting your confidence and eradicating self-doubt.Developing an Upbeat Attitude Develop a powerful, upbeat mindset that aligns with your goals. Modify your attitudes, ideas, and beliefs to aid in your manifesting process.Making Use of Daily Affirmations See how daily affirmations can help you rewire your subconscious. Make use of these inspiring quotes to help you stay committed to your dreams.Making Use of Guided Imagery Methods Learn how to use guided imagery to increase the likelihood that your intended outcomes will materialise by developing a vivid sense of vision and sensation.

  • von David Ingram
    131,00 - 146,00 €

  • von David Ingram
    152,00 - 167,00 €

  • von Horst Schulte
    45,00 €

    Dieser Tagungsband enthält die Beiträge des 33. Workshops ¿Computational Intelligence¿ der vom 23.11. ¿ 24.11.2023 in Berlin stattfindet. Die Schwerpunkte sind Methoden, Anwendungen und Tools für Fuzzy-Systeme, Künstliche Neuronale Netze, Evolutionäre Algorithmen und Data-Mining-Verfahren sowie der Methodenvergleich anhand von industriellen und Benchmark-Problemen. The workshop proceedings contain the contributions of the 33rd workshop "Computational Intelligence" which will take place from 23.11. - 24.11.2023 in Berlin. The focus is on methods, applications and tools for Fuzzy systems, Artificial Neural Networks, Evolutionary algorithms and Data mining methods as well as the comparison of methods on the basis of industrial and benchmark problems.

  • von Peter J. Bentley
    12,00 €

  • von Kevin Wilson
    44,00 €

    Unlock the full potential of Microsoft Publisher with this comprehensive guide written by best-selling technology author and trainer Kevin Wilson. Whether you're beginning with the basics or an experienced user aspiring to enhance your skills, Using Microsoft Publisher is your indispensable guide to navigating and mastering Microsoft Publisher.Using Microsoft Publisher is packed with easy-to-follow instructions, full color illustrative photos, screenshots, and helpful tips, including video demos for a hands-on learning experience. In this guide you'll learn:Getting Started with Publisher: Learn how to navigate around the main user interface, customize your workspace, and create shortcuts for quick access.The Ribbon Menu: Learn how to use the ribbon menu's functionalities and explore the Home, Insert, Page Design, and other crucial tabs.Building a New Design: Discover the fundamentals of good design, using contrast, repetition, alignment, and proportion. Understand how these principles can improve your publications.Creating Publications: Learn how to create new publications, page sizes, orientations, and understanding margins.Enhancing with Graphics: Master the art of adding and editing images, clip art, and shapes. Learn text wrapping techniques and image adjustments for a professional look.Managing Publications: Learn how to save documents in various formats such as PDF, as well as opening saved projects, and setting up page layouts effectively.Advanced Publisher Features: Explore advanced topics such as creating multipage spreads, using mail merges, and designing with tables and guides.Exercises and Real-World Applications: Practice with hands-on exercises and practical examples to apply your skills effectively.This guide is an indispensable resource for learning the intricacies of Microsoft Publisher, designed to enhance your abilities and provide you with the expertise necessary to craft professional-quality publications with ease. So scroll up and get your copy of Using Microsoft Publisher today!

  • 14% sparen
    von Singaravelan Shanmugasundaram
    31,00 €

    La sicurezza di una rete aiuta a impedire che gli intrusi svolgano attività dannose. La sicurezza può essere fornita alle reti utilizzando firewall, software antivirus e scanner, sistemi crittografici, Secure Socket Layer (SSL) e sistemi di rilevamento delle intrusioni (IDS). L'autenticazione è la tecnica comunemente utilizzata per proteggere gli utenti non autorizzati dalla rete. Ma è facile compromettere le password di accesso con attacchi di forza bruta. Gli IDS e i firewall si concentrano sugli attacchi esterni, mentre quelli interni non vengono presi in considerazione. Per risolvere questi problemi, il presente documento propone un sistema di scoperta e difesa delle interruzioni interne (IIDDS) a livello di chiamata di sistema (SC), utilizzando tecniche di data mining e forensi. I profili degli utenti vengono mantenuti e confrontati con il set di dati reali utilizzando la distanza di Hellinger. Ai messaggi in arrivo viene applicata una funzione di hash, che viene riassunta nel dataset degli schizzi. I risultati sperimentali valutano il sistema proposto in termini di accuratezza e tempo di risposta.

  • 14% sparen
    von Singaravelan Shanmugasundaram
    31,00 €

    La sécurité d'un réseau permet d'empêcher les intrus d'effectuer des activités malveillantes. La sécurité peut être assurée par des pare-feu, des logiciels antivirus et des scanners, des systèmes cryptographiques, Secure Socket Layer (SSL) et des systèmes de détection d'intrusion (IDS).L'authentification est la technique couramment utilisée pour protéger les utilisateurs non autorisés du réseau. L'authentification est une technique couramment utilisée pour protéger les utilisateurs non autorisés du réseau. Mais il est facile de compromettre les mots de passe de connexion en utilisant des attaques par force brute. Les IDS et les pare-feu se concentrent sur les attaques externes, alors que les attaques internes ne sont pas prises en compte. Afin de résoudre ces problèmes, cet article propose un système de découverte et de défense des interruptions internes (IIDDS) au niveau de l'appel système (SC) en utilisant des techniques d'exploration de données et de criminalistique. Les profils des utilisateurs sont conservés et comparés à l'ensemble des données réelles à l'aide de la distance de Hellinger. Une fonction de hachage est appliquée aux messages entrants et ceux-ci sont résumés dans l'ensemble de données de l'esquisse. Les résultats expérimentaux évaluent le système proposé en termes de précision et de temps de réponse.

  • 18% sparen
    von Abdullah Hamidi
    50,00 €

    Una delle tendenze recenti nell'uso delle TIC nei Paesi sviluppati e in via di sviluppo è l'E-Government, che si riferisce all'uso delle TIC da parte dei governi per fornire servizi governativi online ai cittadini e alle industrie. Utilizzando l'E-Government, i cittadini possono avere accesso ai servizi governativi 24 ore su 24, 7 giorni su 7, il che rende i servizi governativi più trasparenti, con costi più bassi, qualità più elevata e maggiore efficienza in termini di tempo. Inoltre, i cittadini possono avere una maggiore influenza sui processi decisionali governativi votando online, fornendo le loro opinioni nei forum o contattando direttamente le organizzazioni governative tramite e-mail o moduli di contatto. Esistono sfide per l'implementazione dell'E-Government, come la sicurezza, la volontà dei governi, la mancanza di conoscenza delle TIC nelle società e così via, che saranno discusse in dettaglio in questa tesi. Lo scopo di questa ricerca è stato quello di fornire una migliore comprensione dell'E-Government e delle sue problematiche, del suo impatto nei Paesi in via di sviluppo e di fornire un modello di implementazione per i progetti di E-Government in Afghanistan.

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.