Listing 1 - 10 of 5018 | << page >> |
Sort by
|
Choose an application
Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p
Choose an application
Network Storage: Tools and Technologies for Storing Your Company’s Data explains the changes occurring in storage, what they mean, and how to negotiate the minefields of conflicting technologies that litter the storage arena, all in an effort to help IT managers create a solid foundation for coming decades. The book begins with an overview of the current state of storage and its evolution from the network perspective, looking closely at the different protocols and connection schemes and how they differentiate in use case and operational behavior. The book explores the software changes that are motivating this evolution, ranging from data management, to in-stream processing and storage in virtual systems, and changes in the decades-old OS stack. It explores Software-Defined Storage as a way to construct storage networks, the impact of Big Data, high-performance computing, and the cloud on storage networking. As networks and data integrity are intertwined, the book looks at how data is split up and moved to the various appliances holding that dataset and its impact. Because data security is often neglected, users will find a comprehensive discussion on security issues that offers remedies that can be applied. The book concludes with a look at technologies on the horizon that will impact storage and its networks, such as NVDIMMs, The Hybrid Memory Cube, VSANs, and NAND Killers. Puts all the new developments in storage networking in a clear perspective for near-term and long-term planning Offers a complete overview of storage networking, serving as a go-to resource for creating a coherent implementation plan Provides the details needed to understand the area, and clears a path through the confusion and hype that surrounds such a radical revolution of the industry
Choose an application
This book presents a selective collection of papers from the 20th International Symposium on Computer and Information Sciences, held in Istanbul, Turkey. The selected papers span a wide spectrum of topics in computer networks, including internet and multimedia, security and cryptography, wireless networks, parallel and distributed computing, and performance evaluation. These papers represent the results of the latest research of academicians from more than 30 countries.
Choose an application
Choose an application
Nearly all business-to-business firms interact and have contractual relationships with upstream, downstream and parallel operating enterprises. How firms design and implement these relationships effectively, overcome poorly performing network linkages, and manage change in interfirm networks are the major topics that Volume 17 covers. The five papers in Volume 17 report new theory and in-depth descriptions of interfirm network behavior. Each paper includes extensive reviews of the relevant literature on interfirm network behavior as well as data analysis using empirical positivistic and/or case study research methods.More than 150 figures and tables support the discussion of findings.
Choose an application
Choose an application
Choose an application
This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questionsKey FeaturesBook DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.What you will learnUnderstand the information systems auditing processGet to grips with IT governance and managementGain knowledge of information systems acquisitionAssist your organization in protecting and controlling information systems with IT audit standardsUnderstand information systems operations and how to ensure business resilienceEvaluate your organization’s security policies, standards, and procedures to meet its objectivesWho this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.
Choose an application
Recent and increasing interest in art market studies—the dealers, mediators, advisors, taste makers, artists, etc.—indicate that the transaction of art and decorative art is anything but linear. Taking as its point of departure two of the most active agents of the late nineteenth century, Wilhelm von Bode and Stefano Bardini, the essays in this volume also look beyond, to other art market individuals and their vast and frequently interconnected, social and professional networks. Newly told history taken from rich business, epistolary and photographic archives, these essays examine the art market, within a broader and more complex context. In doing so, they offer new areas of inquiry for mapping of works of art as they were exchanged over time and place.
Choose an application
Listing 1 - 10 of 5018 | << page >> |
Sort by
|