Cloud Computing Concepts and Technologies Comprehensive and timely Cloud Computing: Concepts and Technologies offers a thorough and detailed description of cloud computing concepts architectures and technologies along with guidance on the best ways to understand and implement them. It covers the multi-core architectures distributed and parallel computing models virtualization cloud developments workload and Service-Level-Agreements (SLA) in cloud workload management. Further resource management issues in cloud with regard to resource provisioning resource allocation resource mapping and resource adaptation ethical non-ethical and security issues in cloud are followed by discussion of open challenges and future directions. This book gives students a comprehensive overview of the latest technologies and guidance on cloud computing and is ideal for those studying the subject in specific modules or advanced courses. It is designed in twelve chapters followed by laboratory setups and experiments. Each chapter has multiple choice questions with answers as well as review questions and critical thinking questions. The chapters are practically-focused meaning that the information will also be relevant and useful for professionals wanting an overview of the topic. | Cloud Computing Concepts and Technologies GBP 44.99 1
Cloud Reliability Engineering Technologies and Tools Coud reliability engineering is a leading issue of cloud services. Cloud service providers guarantee computation storage and applications through service-level agreements (SLAs) for promised levels of performance and uptime. Cloud Reliability Engineering: Technologies and Tools presents case studies examining cloud services their challenges and the reliability mechanisms used by cloud service providers. These case studies provide readers with techniques to harness cloud reliability and availability requirements in their own endeavors. Both conceptual and applied the book explains reliability theory and the best practices used by cloud service companies to provide high availability. It also examines load balancing and cloud security. Written by researchers and practitioners the book’s chapters are a comprehensive study of cloud reliability and availability issues and solutions. Various reliability class distributions and their effects on cloud reliability are discussed. An important aspect of reliability block diagrams is used to categorize poor reliability of cloud infrastructures where enhancement can be made to lower the failure rate of the system. This technique can be used in design and functional stages to determine poor reliability of a system and provide target improvements. Load balancing for reliability is examined as a migrating process or performed by using virtual machines. The approach employed to identify the lightly loaded destination node to which the processes/virtual machines migrate can be optimized by employing a genetic algorithm. To analyze security risk and reliability a novel technique for minimizing the number of keys and the security system is presented. The book also provides an overview of testing methods for the cloud and a case study discusses testing reliability installability and security. A comprehensive volume Cloud Reliability Engineering: Technologies and Tools combines research theory and best practices used to engineer reliable cloud availability and performance. | Cloud Reliability Engineering Technologies and Tools GBP 56.99 1
Cloud Security Concepts Applications and Perspectives Cloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However utilization of cloud also raises concerns such as security privacy latency and governance that keep it from turning into the predominant option for critical frameworks. As such there is an urgent need to identify these concerns and to address them. Cloud Security: Concepts Applications and Perspectives is a comprehensive work with substantial technical details for introducing the state-of-the-art research and development on various approaches for security and privacy of cloud services; novel attacks on cloud services; cloud forensics; novel defenses for cloud service attacks; and cloud security analysis. It discusses the present techniques and methodologies and provides a wide range of examples and illustrations to effectively show the concepts applications and perspectives of security in cloud computing. This highly informative book will prepare readers to exercise better protection by understanding the motivation of attackers and to deal with them to mitigate the situation. In addition it covers future research directions in the domain. This book is suitable for professionals in the field researchers students who are want to carry out research in the field of computer and cloud security faculty members across universities and software developers engaged in software development in the field. | Cloud Security Concepts Applications and Perspectives GBP 59.99 1
Advances in Mobile Cloud Computing Systems With recent advances in mobile communication technologies more and more people are accessing cloud computing systems using mobile devices such as smartphones and tablets. Unlike traditional mobile computing systems with limited capabilities mobile cloud computing uses the powerful computing and storage resources available in the cloud to provide cutting-edge multimedia and information services. This book discusses the major research advances in mobile cloud computing systems. Contributed chapters from leading experts in this field cover different aspects of modeling analysis design optimization and architecture of mobile cloud computing systems. Advances in Mobile Cloud Computing Systems begins by discussing the background features and available service models of mobile cloud computing. It goes on to describe a mobile cloud computing system with several third party cloud mobile media (CMM) services that offers its services to a telecom operator. In this scenario the telecom operator acts as broker that can mix and interchange the resources offered by the different CMM service providers. Subsequent contributed chapters discuss such key research areas asEnergy-efficient task execution that reduces the energy consumption in both mobile devices and the cloudDesign and architecture of a Proximity Cloud that delivers low-latency bandwidth-efficient end-user services with a global footprintVirtual mobile networks in clouds that enable resource sharing between multiple mobile network operatorsSoftware piracy control framework in mobile cloud computing systems designed to prevent mobile application piracyDynamic configuration of cloud radio access networks (C-RANs) to improve end-to-end TCP throughput performance in next generation wireless networksThe book includes many supporting illustrations and tables along with GBP 59.99 1
The Cloud in IoT-enabled Spaces The Cloud in IoT-enabled Spaces addresses major issues and challenges in IoT-based solutions proposed for the Cloud. It paves the way for IoT-enabled spaces in the next generation cloud computing paradigm and opens the door for further innovative ideas. Topics include Cloud-based optimization in the IoT era scheduling and routing medium access data caching secure access uncertainty home automation machine learning in wearable devices energy monitoring and plant phenotyping in farming. Smart spaces are solutions where Internet of Things (IoT)-enabling technologies have been employed towards further advances in the lifestyle. It tightly integrates with the existing Cloud infrastructure to impact several fields in academia and industry. The Cloud in IoT-enabled Spaces provides an overview of the issues around small spaces and proposes the most up-to-date alternatives and solutions. The objective is to pave the way for IoT-enabled spaces in the next-generation Cloud computing and open the door for further innovative ideas. GBP 42.99 1
Privacy and Security Challenges in Cloud Computing A Holistic Approach This reference text discusses various security techniques and challenges for cloud data protection from both software and hardware aspects. The text provides readers with an overview of cloud computing beginning with historical perspectives on mainframe computers and early networking protocols moving to current issues such as security of hardware and networks performance evolving IoT areas edge computing etc. It also deals with threat detection and incident response in cloud security. It covers important topics including operational security agitations in cloud computing cyber artificial intelligence (AI) platform for cloud security and security concerns of virtualization in cloud computing. The book will serve as a useful resource for graduate students and professionals in the fields of electrical engineering electronics engineering computer science and information technology. | Privacy and Security Challenges in Cloud Computing A Holistic Approach GBP 115.00 1
Practical Cloud Security A Cross-Industry View Melvin Greer and Kevin Jackson have assembled a comprehensive guide to industry-specific cybersecurity threats and provide a detailed risk management framework required to mitigate business risk associated with the adoption of cloud computing. This book can serve multiple purposes not the least of which is documenting the breadth and severity of the challenges that today’s enterprises face and the breadth of programmatic elements required to address these challenges. This has become a boardroom issue: Executives must not only exploit the potential of information technologies but manage their potential risks. Key Features• Provides a cross-industry view of contemporary cloud computing security challenges solutions and lessons learned• Offers clear guidance for the development and execution of industry-specific cloud computing business and cybersecurity strategies• Provides insight into the interaction and cross-dependencies between industry business models and industry-specific cloud computing security requirements | Practical Cloud Security A Cross-Industry View GBP 44.99 1
Security and Privacy Trends in Cloud Computing and Big Data It is essential for an organization to know before involving themselves in cloud computing and big data what are the key security requirements for applications and data processing. Big data and cloud computing are integrated together in practice. Cloud computing offers massive storage high computation power and distributed capability to support processing of big data. In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration. It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data. Readers can get a better understanding of the basics of cloud computing big data and security mitigation techniques to deal with current challenges as well as future research opportunities. | Security and Privacy Trends in Cloud Computing and Big Data GBP 77.99 1
Integration of Cloud Computing with Emerging Technologies Issues Challenges and Practices This book gives a complete overview of cloud computing: its importance its trends innovations and its amalgamation with other technologies. Key Features: 1 In-depth explanation of emerging technologies utilizing cloud computing 2 Supplemented with visuals flow charts and diagrams 3 Real-time examples included 4 Caters to beginners as well as advanced researchers by explaining implications innovations issues and challenges of cloud computing 5 Highlights the need for cloud computing and the true benefits derived by its application and integration in emerging technologies 6 Simple easy language | Integration of Cloud Computing with Emerging Technologies Issues Challenges and Practices GBP 90.00 1
Security and Risk Analysis for Intelligent Cloud Computing Methods Applications and Preventions This edited book is a compilation of scholarly articles on the latest developments in the field of AI Blockchain and ML/DL in cloud security. This book is designed for security and risk assessment professionals and to help undergraduate postgraduate students research scholars academicians and technology professionals who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of cloud infrastructure and applications and shows how to make cloud infrastructure secure to combat threats and attacks and prevent data breaches. The chapters are designed with a granular framework starting with the security concepts followed by hands-on assessment techniques based on real-world studies. Readers will gain detailed information on cloud computing security that—until now—has been difficult to access. This book: • Covers topics such as AI Blockchain and ML/DL in cloud security. • Presents several case studies revealing how threat actors abuse and exploit cloud environments to spread threats. • Explains the privacy aspects you need to consider in the cloud including how they compare with aspects considered in traditional computing models. • Examines security delivered as a service—a different facet of cloud security. | Security and Risk Analysis for Intelligent Cloud Computing Methods Applications and Preventions GBP 110.00 1
The Introduction to Private Cloud using Oracle Exadata and Oracle Database Private clouds allow for managing multiple databases under one roof avoiding unnecessary resource management. Private cloud solutions can be applied in sectors such as healthcare retail and software. The Introduction to Private Cloud using Oracle Exadata and Oracle Database will explore the general architecture of private cloud databases with a focus on Oracle’s Exadata database machine. The book describes the private cloud using fundamental-level Exadata and database. Exadata has been Oracle’s pioneer product for almost a decade. In the last few years Oracle has positioned Exadata for customers to consume as a cloud service. This book will provide a timely introduction to Exadata for current and potential Oracle customers and other IT professionals. GBP 18.99 1
Protecting Information Assets and IT Infrastructure in the Cloud This book is a second edition. The last one reviewed the evolution of the Cloud important Cloud concepts and terminology and the threats that are posed on a daily basis to it. A deep dive into the components of Microsoft Azure were also provided as well as risk mitigation strategies and protecting data that resides in a Cloud environment. In this second edition we extend this knowledge gained to discuss the concepts of Microsoft Azure. We also examine how Microsoft is playing a huge role in artificial intelligence and machine learning with its relationship with OpenAI. An overview into ChatGPT is also provided along with a very serious discussion of the social implications for artificial intelligence. | Protecting Information Assets and IT Infrastructure in the Cloud GBP 44.99 1
Cloud Data Center Network Architectures and Technologies Cloud Data Center Network Architectures and Technologies has been written with the support of Huawei's vast technical knowledge and experience in the data center network (DCN) field as well as its understanding of customer service requirements. This book describes in detail the architecture design technical implementation planning and design and deployment suggestions for cloud DCNs based on the service challenges DCNs encounter. It starts by describing the overall architecture and technical evolution of DCNs with the aim of helping readers understand the development of DCNs. It then proceeds to explain the design and implementation of cloud DCNs including the service model of a single data center (DC) construction of physical and logical networks of DCs construction of multiple DCNs and security solutions of DCs. Next this book dives deep into practices of cloud DCN deployment based on real-world cases to help readers better understand how to build cloud DCNs. Finally this book introduces DCN openness and some of the hottest forward-looking technologies. In summary you can use this book as a reference to help you to build secure reliable efficient and open cloud DCNs. It is intended for technical professionals of enterprises research institutes information departments and DCs as well as teachers and students of computer network-related majors in colleges and universities. Authors Lei Zhang Mr. Zhang is the Chief Architect of Huawei's DCN solution. He has more than 20 years' experience in network product and solution design as well as a wealth of expertise in product design and development network planning and design and network engineering project implementation. He has led the design and deployment of more than 10 large-scale DCNs for Fortune Global 500 companies worldwide. Le Chen Mr. Chen is a Huawei DCN Solution Documentation Engineer with eight years' experience in developing documents related to DCN products and solutions. He has participated in the design and delivery of multiple large-scale enterprise DCNs. Mr. Chen has written many popular technical document series such as DCN Handbook and BGP Topic. GBP 44.99 1
Smart Cities IoT Technologies Big Data Solutions Cloud Platforms and Cybersecurity Techniques This book discusses the basic principles of sustainable development in a smart city ecosystem to better serve the life of citizens. It examines smart city systems driven by emerging IoT-powered technologies and the other dependent platforms. Smart Cities: AI IoT Technologies Big Data Solutions Cloud Platforms and Cybersecurity Techniques discusses the design and implementation of the core components of the smart city ecosystem. The editors discuss the effective management and development of smart city infrastructures starting with planning and integrating complex models and diverse frameworks into an ecosystem. Specifically the chapters examine the core infrastructure elements including activities of the public and private services as well as innovative ICT solutions computer vision IoT technologies data tools cloud services AR/VR technologies cybersecurity techniques treatment solution of the environmental water pollution and other intelligent devices for supporting sustainable living in the smart environment. The chapters also discuss machine vision models and implementation as well as real-time robotic applications. Upon reading the book users will be able to handle the challenges and improvements of security for smart systems and will have the know-how to analyze and visualize data using big data tools and visualization applications. The book will provide the technologies solutions as well as designs of smart cities with advanced tools and techniques for students researchers engineers and academics. | Smart Cities IoT Technologies Big Data Solutions Cloud Platforms and Cybersecurity Techniques GBP 110.00 1
Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks This book discusses intelligent computing through the Internet of Things (IoT) and Big-Data in vehicular environments in a single volume. It covers important topics such as topology-based routing protocols heterogeneous wireless networks security risks software-defined vehicular ad-hoc networks vehicular delay tolerant networks and energy harvesting for WSNs using rectenna. FEATURES Covers applications of IoT in Vehicular Ad-hoc Networks (VANETs) Discusses use of machine learning and other computing techniques for enhancing performance of networks Explains game theory-based vertical handoffs in heterogeneous wireless networks Examines monitoring and surveillance of vehicles through the vehicular sensor network Investigates theoretical approaches on software-defined VANET The book is aimed at graduate students and academic researchers in the fields of electrical engineering electronics and communication engineering computer science and engineering. | Cloud Computing Enabled Big-Data Analytics in Wireless Ad-hoc Networks GBP 115.00 1
User-Centric and Information-Centric Networking and Services Access Networks Storage and Cloud Perspective User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency of content delivery and also content availability. In this new concept the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of UCN and ICN describes the main architecture proposals for these networks and discusses the main challenges to their development. The book also looks at the current challenges for this concept including naming routing and caching on the network-core elements several aspects of content security user privacy and practical issues in implementing UCN and ICN. | User-Centric and Information-Centric Networking and Services Access Networks Storage and Cloud Perspective GBP 44.99 1
LTE Cellular Narrowband Internet of Things (NB-IoT) Practical Projects for the Cloud and Data Visualization NB-IoT is the Internet of Things (IoT) technology used for cellular communication. NB-IoT devices deliver much better capability and performance such as: increased area coverage of up to one kilometer; a massive number of devices—up to 200 000—per a single base-station area; longer battery lifetime of ten years; and better indoor and outdoor coverage for areas with weak signal such as underground garages. The cellular NB-IoT technology is a challenging technology to use and understand. With more than 30 projects presented in this book covering many use cases and scenarios this book provides hands-on and practical experience of how to use the cellular NB-IoT for smart applications using Arduino™ Amazon Cloud Google Maps and charts. The book starts by explaining AT commands used to configure the NB-IoT modem; data serialization and deserialization; how to set up the cloud for connecting NB-IoT devices; setting up rules policy security certificates and a NoSQL database on the cloud; how to store and read data in the cloud; how to use Google Maps to visualize NB-IoT device geo-location; and how to use charts to visualize sensor datasets. Projects for Arduino are presented in four parts. The first part explains how to connect the device to the mobile operator and cellular network; perform communication using different network protocols such as TCP HTTP SSL or MQTT; how to use GPS for geo-location applications; and how to upgrade NB-IoT modem firmware over the air. The second part explains the microcontroller unit and how to build and run projects such as a 7-segment display or a real-time clock. The third part explains how NB-IoT can be used with sensor devices such as ultrasonic and environmental sensors. Finally the fourth part explains how NB-IoT can be used to control actuators such as stepper motors and relays. This book is a unique resource for understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology. The book can be used by engineers students researchers system integrators mobile operators’ technical staff and electronics enthusiasts. To download the software which can be used with the book go to: https://github. com/5ghub/NB-IoT About the Author: Hossam Fattah is a technology expert in 4G/5G wireless systems and networking. He received his Ph. D. in Electrical and Computer Engineering from University of British Columbia Vancouver Canada in 2003. He received his Master of Applied Science in Electrical and Computer Engineering from University of Victoria Victoria Canada in 2000. He completed his B. Sc. degree in Computers and Systems Engineering from Al-Azhar University Cairo Egypt in 1995. Between 2003 and 2011 he was in academia and industry including Texas A&M University. Between 2011 and 2013 he was with Spirent Communications NJ USA. Since 2013 he has been with Microsoft USA. He is also an affiliate associate professor at University of Washington Tacoma WA USA teaching graduate courses on IoT and distributed systems and collaborating on 5G research and innovations. He has had many patents and technical publications in conferences and journals. He is a registered professional Engineer with the Association of Professional Engineers British Columbia Canada. He is the author of the recent book 5G LTE Narrowband Internet of Things (NB-IoT). His research interest is in wireless communications and radio networks and protocols cellular quality of service radio resource management traffic and packet scheduling network analytics and mobility. | LTE Cellular Narrowband Internet of Things (NB-IoT) Practical Projects for the Cloud and Data Visualization GBP 44.99 1
Deploying the Zero Trust Framework in MSFT Azure The Cloud is fast becoming the de facto standard for businesses in Corporate America today with Microsoft Azure being one of the most widely used systems. However given its stature it has also become a prime target for the cyberattacker. Thus a Zero Trust Framework is strongly needed. Deploying the Zero Trust Framework in MSFT Azure takes a closer look at the Cloud the Zero Trust Framework and how to deploy from both the technical and psychological perspectives. GBP 29.99 1
Semantic Web Technologies Research and Applications Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and explicit semantics that are being extensively used in various domains and industries. This book provides a roadmap for semantic web technologies (SWTs) and highlights their role in a wide range of domains including cloud computing Internet of Things big data sensor network and so forth. It also explores the prospects of these technologies including different data interchange formats query languages ontologies Linked Data and notations. The role of SWTs in ‘epidemic Covid-19’ ‘e-learning platforms and systems’ ‘block chain’ ‘open online courses’ and ‘visual analytics in healthcare’ is described as well. This book: Explores all the critical aspects of semantic web technologies (SWTs) Discusses the impact of SWTs on cloud computing Internet of Things big data and sensor network Offers a comprehensive examination of the emerging research in the areas of SWTs and their related domains Provides a template to develop a wide range of smart and intelligent applications Includes latest applications and examples with real data This book is aimed at researchers and graduate students in computer science informatics web technology cloud computing and Internet of Things. | Semantic Web Technologies Research and Applications GBP 130.00 1
Workflow Scheduling on Computing Systems This book will serve as a guide in understanding workflow scheduling techniques on computing systems such as Cluster Supercomputers Grid computing Cloud computing Edge computing Fog computing and the practical realization of such methods. It offers a whole new perspective and holistic approach in understanding computing systems’ workflow scheduling. Expressing and exposing approaches for various process-centric cloud-based applications give a full coverage of most systems’ energy consumption reliability resource utilization cost and application stochastic computation. By combining theory with application and connecting mathematical concepts and models with their resource management targets this book will be equally accessible to readers with both Computer Science and Engineering backgrounds. It will be of great interest to students and professionals alike in the field of computing system design management and application. This book will also be beneficial to the general audience and technology enthusiasts who want to expand their knowledge on computer structure. | Workflow Scheduling on Computing Systems GBP 77.99 1
Textbook of Assisted Reproductive Techniques Volume 1: Laboratory Perspectives Established as the definitive reference for the IVF clinic the sixth edition has been extensively revised with the addition of several important new contributions on laboratory topics including KPIs for the IVF laboratory Quality control in the cloud Artificial Intelligence AI in gamete and embryo selection Demystifying vitrification Microfluidics Gene editing Disaster management and Early human embryo development revealed by static imaging. As previously methods protocols and techniques of choice are presented by IVF pioneers and eminent international experts. | Textbook of Assisted Reproductive Techniques Volume 1: Laboratory Perspectives GBP 175.00 1
Computational Topology for Biomedical Image and Data Analysis Theory and Applications This book provides an accessible yet rigorous introduction to topology and homology focused on the simplicial space. It presents a compact pipeline from the foundations of topology to biomedical applications. It will be of interest to medical physicists computer scientists and engineers as well as undergraduate and graduate students interested in this topic. Features:Presents a practical guide to algebraic topology as well as persistence homologyContains application examples in the field of biomedicine including the analysis of histological images and point cloud data | Computational Topology for Biomedical Image and Data Analysis Theory and Applications GBP 18.99 1
Emerging Internet-Based Technologies The author of this book has identified the seven key emerging Internet-related technologies: Internet of things smart everything big data cloud computing cybersecurity software-defined networking and online education. Together these technologies are transformational and disruptive. This book provides researchers students and professionals a comprehensive introduction applications benefits and challenges for each technology. It presents the impact of these cutting-edge technologies on our global economy and its future. The word technology refers to collection of techniques skills methods and processes used in the production of goods or services. | Emerging Internet-Based Technologies GBP 44.99 1
Predictive Analytics in Smart Agriculture Predictive Analysis in Smart Agricultureexplores computational engineering techniques and applications in agriculture development. Recent technologies such as cloud computing IoT big data and machine learning are focused on for smart agricultural engineering. The book also provides a case-oriented approach for IoT-based agricultural systems. This book deals with all aspects of smart agriculture with state-of-the-art predictive analysis in the complete 360-degree view spectrum. The book includes the concepts of urban and vertical farming using Agro IoT systems and renewable energy sources for modern agriculture trends. It discusses the real-world challenges complexities in Agro IoT and advantages of incorporating smart technology. It also presents the rapid advancement of the technologies in the existing Agri model by applying the various techniques. Novel architectural solutions in smart agricultural engineering are the core aspects of this book. Several predictive analysis tools and smart agriculture are also incorporated. This book can be used as a textbook for students in predictive analysis agriculture engineering precision farming and smart agriculture. It can also be a reference book for practicing professionals in cloud computing IoT big data machine learning and deep learning working on smart agriculture applications. | Predictive Analytics in Smart Agriculture GBP 110.00 1
Heterogeneous Computing Architectures Challenges and Vision Heterogeneous Computing Architectures: Challenges and Vision provides an updated vision of the state-of-the-art of heterogeneous computing systems covering all the aspects related to their design: from the architecture and programming models to hardware/software integration and orchestration to real-time and security requirements. The transitions from multicore processors GPU computing and Cloud computing are not separate trends but aspects of a single trend-mainstream; computers from desktop to smartphones are being permanently transformed into heterogeneous supercomputer clusters. The reader will get an organic perspective of modern heterogeneous systems and their future evolution. | Heterogeneous Computing Architectures Challenges and Vision GBP 69.99 1