29 results (0,17146 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The Cloud in IoT-enabled Spaces

Securing the Cloud Security Strategies for the Ubiquitous Data Center

Cloud-Based Music Production Sampling Synthesis and Hip-Hop

The Introduction to Private Cloud using Oracle Exadata and Oracle Database

Business Model Transformation The AI & Cloud Technology Revolution

Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

Most biometric books are either extraordinarily technical for technophiles or extremely elementary for the lay person. Striking a balance between the two Biometric Technology: Authentication Biocryptography and Cloud-Based Architecture is ideal for business IT or security managers that are faced with the task of making purchasing migration or adoption decisions. It brings biometrics down to an understandable level so that you can immediately begin to implement the concepts discussed. Exploring the technological and social implications of widespread biometric use the book considers the science and technology behind biometrics as well as how it can be made more affordable for small and medium-sized business. It also presents the results of recent research on how the principles of cryptography can make biometrics more secure. Covering biometric technologies in the cloud including security and privacy concerns the book includes a chapter that serves as a how-to manual on procuring and deploying any type of biometric system. It also includes specific examples and case studies of actual biometric deployments of localized and national implementations in the U. S. and other countries. The book provides readers with a technical background on the various biometric technologies and how they work. Examining optimal application in various settings and their respective strengths and weaknesses it considers ease of use false positives and negatives and privacy and security issues. It also covers emerging applications such as biocryptography. Although the text can be understood by just about anybody it is an ideal resource for corporate-level executives who are considering implementing biometric technologies in their organizations. | Biometric Technology Authentication Biocryptography and Cloud-Based Architecture

GBP 31.99
1

Deploying the Zero Trust Framework in MSFT Azure

Handbook of e-Business Security

Computational Topology for Biomedical Image and Data Analysis Theory and Applications

Software Engineering with UML

Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT

Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT

The integration of technological innovations such as In-Memory Analytics Cloud Computing Mobile Connectivity and Social Media with business practice can enable significant competitive advantage. In order to embrace recent challenges and changes in the governance of IT strategies SAP and its think tank - the Business Transformation Academy (BTA) - have jointly developed the Digital Capability Framework (DCF). Digital Enterprise Transformation: A Business-Driven Approach to Leveraging Innovative IT by Axel Uhl and Lars Alexander Gollenia outlines the DCF which comprises six specific capabilities: Innovation Management Transformation Management IT Excellence Customer Centricity Effective Knowledge Worker and Operational Excellence. In cooperation with the University of Applied Sciences and Arts Northwestern Switzerland University of St. Gallen (Switzerland) Queensland University of Technology (Australia) University of Liechtenstein (Principality of Liechtenstein) and Karlsruhe Institute of Technology (Germany) SAP and the BTA have been validating each capability and the corresponding maturity models based on analyzing several ’lighthouse’ case studies comprising: SAMSUNG IBM Finanz Informatik The Walt Disney Company Google Inc. HILTI AG. Digital Enterprise Transformation presents how these companies take advantage of innovative IT and how they develop their digital capabilities. On top the authors also develop and present a range of novel yet hands-on Digital Use Cases for a number of different industries which have emerged from innovative technological trends such as: Big Data Cloud Computing 3D Printing and Internet of Things. | Digital Enterprise Transformation A Business-Driven Approach to Leveraging Innovative IT

GBP 31.99
1

Digital Transformation in Healthcare An Ecosystem Approach

AI in Health A Leader’s Guide to Winning in the New Age of Intelligent Health Systems

The Stage Manager's Toolkit Templates and Communication Techniques to Guide Your Theatre Production from First Meeting to Final Performance

Therapy and the Postpartum Woman Notes on Healing Postpartum Depression for Clinicians and the Women Who Seek their Help

Planning and Designing the IP Broadcast Facility A New Puzzle to Solve

Planning and Designing the IP Broadcast Facility A New Puzzle to Solve

This book provides a comprehensive understanding of the technology architecture physical facility changes and – most importantly – the new media management workflows and business processes to support the entire lifecycle of the IP broadcast facility from an engineering and workflow perspective. Fully updated this second edition covers the technological evolutions and changes in the media broadcast industry including the new standards and specifications for live IP production the SMPTE ST2110 suite of standards the necessity of protecting against cyber threats and the expansion of cloud services in opening new possibilities. It provides users with the necessary information for planning organizing producing and distributing media for the modern broadcast facility. Key features of this text include: Strategies to implement a cost-effective live and file-based production and distribution system. A cohesive big-picture viewpoint that helps you identify how to overcome the challenges of upgrading your plant. The impact live production is having on the evolution to IP. Case studies serve as recommendations and examples of use. New considerations in engineering and maintenance of IP and file-based systems. Those in the fields of TV cable IT engineering and broadcast engineering will find this book an invaluable resource as will students learning how to set up modern broadcast facilities and the workflows of contemporary broadcasting. | Planning and Designing the IP Broadcast Facility A New Puzzle to Solve

GBP 29.99
1

Architectures of Care From the Intimate to the Common

Architectures of Care From the Intimate to the Common

Drawing from a diverse range of interdisciplinary voices this book explores how spaces of care shape our affective material and social forms from the most intimate scale of the body to our planetary commons. Typical definitions of care center around the maintenance of a livable life encompassing everything from shelter and welfare to health and safety. Architecture plays a fundamental role in these definitions inscribed in institutional archetypes such as the home the hospital the school and the nursery. However these spaces often structure modes of care that prescribe gender roles bodily norms and labor practices. How can architecture instead engage with an expanded definition of care that questions such roles and norms producing more hybrid entanglements between our bodies our collective lives and our environments? Chapters in this book explore issues ranging from disabled domesticities and nursing unbuilding whiteness in the built environment practices and pedagogies of environmental care and the solidarity networks within ‘The Cloud’. Case studies include Floating University Berlin commoning initiatives by the Black Panther party and hospitals for the United Mine Workers of America among many other sites and scales of care. Exploring architecture through the lenses of gender studies labor theory environmental justice and the medical humanities this book will engage students and academics from a wide range of disciplines. | Architectures of Care From the Intimate to the Common

GBP 35.99
1

The Busy IT Manager’s Guide to Data Recovery

The Busy IT Manager’s Guide to Data Recovery

No IT manager or worker enjoys being woken up the middle of the night over a system fault. But arguably the worst way to be awakened is over a situation where data loss has occurred – and the recovery is going wrong. The Busy IT Manager’s Guide to Data Recovery takes a razor focus on the details IT managers (and their teams) responsible for data recovery and resiliency within their business need to be aware of in the design of robust data protection systems. This book covers key architectural requirements of a data resilient system and the types of technology a business can deploy for data protection that maximises the potential for a successful recovery. With cyber-attacks being a daily challenge for IT and business now the book also takes an in-depth look at the special considerations companies need to take in order to guarantee the recoverability of data after a destructive cyber event. Regardless of whether your IT infrastructure runs on-premises or in the public cloud this book gives you the information you need to plan and run a successful data recovery solution that meets your business needs. Preston de Guise has been working with data recovery products for his entire career – designing implementing and supporting solutions for governments universities and businesses ranging from SMEs to Fortune 500 companies. This broad exposure to industry verticals and business sizes has enabled Preston to understand not only the technical requirements of data protection and recovery but the management and procedural aspects too.

GBP 22.99
1

Supply Chain Analytics Using Data to Optimise Supply Chain Processes

Supply Chain Analytics Using Data to Optimise Supply Chain Processes

Supply Chain Analytics introduces the reader to data analytics and demonstrates the value of their effective use in supply chain management. By describing the key supply chain processes through worked examples and the descriptive predictive and prescriptive analytic methods that can be applied to bring about improvements to those processes the book presents a more comprehensive learning experience for the reader than has been offered previously. Key topics are addressed including optimisation big data data mining and cloud computing. The author identifies four core supply chain processes – strategy design execution and people – to which the analytic techniques explained can be applied to ensure continuous improvement. Pedagogy to aid learning is incorporated throughout including an opening section for each chapter explaining the learnings designed for the chapter; worked examples illustrating how each analytic technique works how it is applied and what to be careful of; tables diagrams and equations to help ‘visualise’ the concepts and methods covered; chapter case studies; and end-of-chapter review questions and assignment tasks. Providing both management expertise and technical skills which are essential to decision-makers in the supply chain this textbook should be essential reading for advanced undergraduate and postgraduate students of supply chain analytics supply chain leadership and supply chain and operations management. Its practice-based and applied approach also makes it valuable for operating supply chain practitioners and those studying for professional qualifications. Online resources include chapter-by-chapter PowerPoint slides tutorial exercises written assignments and a test bank of exam questions. | Supply Chain Analytics Using Data to Optimise Supply Chain Processes

GBP 42.99
1

Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures disrupt critical services and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats. The book first provides a historical reference detailing the emergence of viruses worms malware and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures the broad arsenal of cyber attack tools and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics recent examples of cyber conflict and warfare and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes such as virtualization social media cloud computing structured and unstructured data big data and data analytics. | Cybersecurity Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

GBP 38.99
1

Industrial IoT Application Architectures and Use Cases

Industrial IoT Application Architectures and Use Cases

As the number of Internet of Things (IoT) elements grows exponentially their interactions can generate a massive amount of raw and multi-structured data. The challenge with this data explosion is to transform any raw data into information and knowledge which can be used by people and systems to make intelligent decisions. Industrial IoT Application Architectures and Use Cases explores how artificial intelligence (AI) data analytics and IoT technology combine to promote intelligent decision-making and automation in a range of industries. With faster more stable AI algorithms and approaches knowledge discovery and dissemination from IoT-device data can be simplified and streamlined. An era of powerful cognitive technology is beginning due to cloud-based cognitive systems that are forming the foundation of game-changing intelligent applications. This book presents next-generation use cases of IoT and IoT data analytics for a variety of industrial verticals as given below: An Intelligent IoT framework for smart water managementAn IoT-enabled smart traffic control system for congestion control and smart traffic management An intelligent airport system for airport management and security surveillanceAn IoT framework for healthcare to integrate and report patient information Fuzzy scheduling with IoT for tracking and monitoring hotel assets An IoT system for designing drainage systems and monitoring drainage pipes Predictive maintenance of plant equipment to decide the actual mean time to malfunction Integrated neural networks and IoT systems for predictive equipment maintenance IoT integration in blockchain for smart waste management This book also includes a chapter on the IoT paradigm and an overview of uses cases for personal social and industrial applications.

GBP 42.99
1

101 Rules of Thumb for Low-Energy Architecture

101 Rules of Thumb for Low-Energy Architecture

Buildings and construction are a major contributor to the climate and biodiversity emergency. They account for nearly 40% of energy-related carbon dioxide (CO2) emissions. It is more important than ever for architects to design responsibly and create low-carbon low-energy buildings for a sustainable future. 101 Rules of Thumb sets out the essential elements of low-energy architecture in a fresh intuitive way. Where ever-changing technology and complex legislation can cloud the designer’s thought-process this book equips you with the fundamentals you need to minimise CO2 emissions design for low-energy use and work with not against the forces of nature. With reliable simple rules of thumb each page focuses on a single piece of guidance along with a clear hand-drawn illustration. The emphasis is on passive low-energy principles and the rules of thumb cover all the design fundamentals from site and location to orientation and form peppered with ideas to help the designer think outside the box drawing inspiration from traditional methods photoperiodic plants and the black-tailed prairie dog. An extended fully updated narrative bibliography explores the sources in detail and provides a valuable springboard for further study. Applicable throughout the world in any climate region 101 Rules of Thumb is a global primer to be dipped into at any time as a quick means of re-focusing on what’s important when designing a new or retrofitted low-energy building. The rules cover: Site and location Orientation and form The low-energy building envelope Carbon free heating cooling and lighting Passive low-energy principles. | 101 Rules of Thumb for Low-Energy Architecture

GBP 22.00
1

The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases

The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases

This book comprehensively conveys the theoretical and practical aspects of IoT and big data analytics with the solid contributions from practitioners as well as academicians. This book examines and expounds the unique capabilities of the big data analytics platforms in capturing cleansing and crunching IoT device/sensor data in order to extricate actionable insights. A number of experimental case studies and real-world scenarios are incorporated in this book in order to instigate our book readers. This bookAnalyzes current research and development in the domains of IoT and big data analyticsGives an overview of latest trends and transitions happening in the IoT data analytics spaceIllustrates the various platforms processes patterns and practices for simplifying and streamlining IoT data analytics The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases examines and accentuates how the multiple challenges at the cusp of IoT and big data can be fully met. The device ecosystem is growing steadily. It is forecast that there will be billions of connected devices in the years to come. When these IoT devices resource-constrained as well as resource-intensive interact with one another locally and remotely the amount of multi-structured data generated collected and stored is bound to grow exponentially. Another prominent trend is the integration of IoT devices with cloud-based applications services infrastructures middleware solutions and databases. This book examines the pioneering technologies and tools emerging and evolving in order to collect pre-process store process and analyze data heaps in order to disentangle actionable insights. | The Internet of Things and Big Data Analytics Integrated Platforms and Industry Use Cases

GBP 42.99
1

Cyber Resilience

Cyber Resilience

Modern cyber systems acquire more emergent system properties as far as their complexity increases: cyber resilience controllability self-organization proactive cyber security and adaptability. Each of the listed properties is the subject of the cybernetics research and each subsequent feature makes sense only if there is a previous one. Cyber resilience is the most important feature of any cyber system especially during the transition to the sixth technological stage and related Industry 4. 0 technologies: Artificial Intelligence (AI) Cloud and foggy computing 5G + IoT/IIoT Big Data and ETL Q-computing Blockchain VR/AR etc. We should even consider the cyber resilience as a primary one because the mentioned systems cannot exist without it. Indeed without the sustainable formation made of the interconnected components of the critical information infrastructure it does not make sense to discuss the existence of 4. 0 Industry cyber-systems. In case when the cyber security of these systems is mainly focused on the assessment of the incidents' probability and prevention of possible security threats the cyber resilience is mainly aimed at preserving the targeted behavior and cyber systems' performance under the conditions of known (about 45 %) as well as unknown (the remaining 55 %) cyber attacks. This monograph shows that modern Industry 4. 0. Cyber systems do not have the required cyber resilience for targeted performance under heterogeneous mass intruder cyber-attacks. The main reasons include a high cyber system structural and functional complexity a potential danger of existing vulnerabilities and “sleep” hardware and software tabs as well as an inadequate efficiency of modern models methods and tools to ensure cyber security reliability response and recovery.

GBP 39.99
1

Image Analysis Classification and Change Detection in Remote Sensing With Algorithms for Python Fourth Edition

Image Analysis Classification and Change Detection in Remote Sensing With Algorithms for Python Fourth Edition

Image Analysis Classification and Change Detection in Remote Sensing: With Algorithms for Python Fourth Edition is focused on the development and implementation of statistically motivated data-driven techniques for digital image analysis of remotely sensed imagery and it features a tight interweaving of statistical and machine learning theory of algorithms with computer codes. It develops statistical methods for the analysis of optical/infrared and synthetic aperture radar (SAR) imagery including wavelet transformations kernel methods for nonlinear classification as well as an introduction to deep learning in the context of feed forward neural networks. New in the Fourth Edition: An in-depth treatment of a recent sequential change detection algorithm for polarimetric SAR image time series. The accompanying software consists of Python (open source) versions of all of the main image analysis algorithms. Presents easy platform-independent software installation methods (Docker containerization). Utilizes freely accessible imagery via the Google Earth Engine and provides many examples of cloud programming (Google Earth Engine API). Examines deep learning examples including TensorFlow and a sound introduction to neural networks Based on the success and the reputation of the previous editions and compared to other textbooks in the market Professor Canty’s fourth edition differs in the depth and sophistication of the material treated as well as in its consistent use of computer codes to illustrate the methods and algorithms discussed. It is self-contained and illustrated with many programming examples all of which can be conveniently run in a web browser. Each chapter concludes with exercises complementing or extending the material in the text. | Image Analysis Classification and Change Detection in Remote Sensing With Algorithms for Python Fourth Edition

GBP 42.99
1