Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
Computer networks --- Cyberspace --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Space and time --- Computers --- Telematics --- Distributed processing
Choose an application
Business enterprises --- Intelligent agents (Computer software) --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Business organizations --- Businesses --- Companies --- Enterprises --- Firms --- Organizations, Business --- Business --- Data processing --- Distributed processing
Choose an application
Power resources --- Smart power grids --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Grids, Smart power --- Power grids, Smart --- Smart grids (Electric power distribution) --- Electric power distribution --- Distributed processing --- Automation
Choose an application
In the 2010s, America's adversaries conducted numerous damaging cyber operations inside the United States: the Office of Personnel Management breach, attacks on banks, persistent intellectual property theft by China, and the Russian intervention in the 2016 election. The US--possessor of the world's most powerful cyber arsenal--responded in 2018 by unveiling a new Defend Forward strategy. It is a large step in the direction of more aggressive action in cyberspace--albeit for defensive ends. The US has not attempted to hide this shift. To the contrary, it has telegraphed the change. But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defend Forward entails. While the US government has asserted that Defend Forward is consistent with domestic and international law, it has not explained how the new strategy overcomes the perceived legal constraints that previously tempered US responses to cyber intrusions andthreats. This volume, edited by Jack Goldsmith and featuring a cast of leading scholars in the field, provides an authoritative overview of the origins and operation of Defend Forward, and a comprehensive assessment of its legality. For anyone interested in the future of great power conflict and the cyber strategies that the US is deploying against its adversaries, The United States' Defend Forward Cyber Strategy is an essential read.
Computer security --- Cyberinfrastructure --- Law and legislation --- Government policy --- Security measures --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Law
Choose an application
Gain a foundational understanding of SRE and learn its basic concepts and architectural best practices for deploying Azure IaaS, PaaS, and microservices-based resilient architectures. The book starts with the base concepts of SRE operations and developer needs, followed by definitions and acronyms of Service Level Agreements in real-world scenarios. Moving forward, you will learn how to build resilient IaaS solutions, PaaS solutions, and microservices architecture in Azure. Here you will go through Azure reference architecture for high-available storage, networking and virtual machine computing, describing Availability Sets and Zones and Scale Sets as main scenarios. You will explore similar reference architectures for Platform Services such as App Services with Web Apps, and work with data solutions like Azure SQL and Azure Cosmos DB. Next, you will learn automation to enable SRE with Azure DevOps Pipelines and GitHub Actions. You'll also gain an understanding of how an open culture around post-mortems dramatically helps in optimizing SRE and the overall company culture around managing and running IT systems and application workloads. You'll be exposed to incent management and monitoring practices, by making use of Azure Monitor/Log Analytics/Grafana, which forms the foundation of monitoring Azure and Hybrid-running workloads. As an extra, the book covers two new testing solutions: Azure Chaos Studio and Azure Load Testing. These solutions will make it easier to test the resilience of your services. After reading this book, you will understand the underlying concepts of SRE and its implementation using Azure public cloud.
Reliability (Engineering) --- Microsoft Azure (Computing platform) --- Engineering --- Cyberinfrastructure --- Management. --- Reliability of equipment --- Systems reliability --- Maintainability (Engineering) --- Probabilities --- Systems engineering --- Plant performance --- Safety factor in engineering --- Structural failures --- Windows Azure (Computing platform) --- Computing platforms --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Civil engineering --- Structural engineering --- Distributed processing --- Management
Choose an application
Grids are a crucial enabling technology for scientific and industrial development. Grid and Services Evolution, the 11th edited volume of the CoreGRID series, was based on The CoreGRID Middleware Workshop, held in Barcelona, Spain , June 5-6, 2008. Grid and Services Evolution provides a bridge between the application community and the developers of middleware services, especially in terms of parallel computing. This edited volume brings together a critical mass of well-established researchers worldwide, from forty-two institutions active in the fields of distributed systems and middleware, programming models, algorithms, tools and environments. Grid and Services Evolution is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science. .
Information Technology --- Computer Science (Hardware & Networks) --- Computational grids (Computer systems) --- Cyberinfrastructure --- Cyber-based information systems --- Cyber-infrastructure --- Computer science. --- Computer organization. --- Microprocessors. --- Computer communication systems. --- Computer Science. --- Computer Communication Networks. --- Processor Architectures. --- Computer Systems Organization and Communication Networks. --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Distributed processing --- Computer network architectures. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Informatics --- Science --- Organization, Computer --- Electronic digital computers --- Minicomputers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers
Choose an application
In 'Israel and the Cyber Threat', Charles D. Freilich, Matthew S. Cohen, and Gabi Siboni provide a detailed and comprehensive overview of Israeli's cyber strategy, tracing it from its origins to the present. They analyze Israel's defensive and offensive capabilities, both of which are prodigious, to offer insights into what other countries can learn from Israel's experience and actions. This book provides an in-depth look at the major actions Israel has taken in cyberspace and places them in the broader context to help readers understand state behaviour in cyberspace.
Cyberspace operations (Military science) --- Cyber intelligence (Computer security) --- Cyberspace --- Cyberterrorism --- Cyberinfrastructure --- National security --- Warfare and Defence. --- Warfare & defence. --- Government policy --- Prevention. --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Space and time --- Computers --- Telematics --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Distributed processing
Choose an application
This book collects selected high-quality papers published in 2018–2020 to inaugurate the “Natural Hazards” Section of the Geosciences journal. The topics encompass: trends in publications at international level in the field of natural hazards research; the role of Big Data in natural disaster management; assessment of seismic risk through the understanding and quantification of its different components; climatic/hydro-meteorological hazards; and finally, the scientific analysis and disaster forensics of recent natural hazard events. The target audience includes not only specialists, but also graduate students who wish to approach the challenging, but also fascinating
Research & information: general --- big data --- disaster management --- review --- natural hazards --- disaster --- scientometrics --- bibliometrics --- citation analysis --- NatCatSERVICE --- Sigma Explorer --- Oroville Dam --- spillway --- incident --- flood control --- flood-frequency analysis --- dam operation --- drought --- impacts --- exposure --- vulnerability --- risk --- policy --- risk assessment --- earthquake risk --- energy security --- reliability of power supply --- Eurasian Economic Union (EAEU) --- integration process --- common electricity market --- masonry aggregates --- vulnerability assessment --- vulnerability curves --- damage scenarios --- local hazard effect --- psychological representation of earthquakes --- open-ended and closed-questions surveys --- children --- seismic hazard assessment --- emotions --- emotional prevention --- African easterly wave --- attractor coexistence --- chaos --- hurricane --- limit cycle --- Lorenz model --- predictability --- recurrence --- extended range weather prediction --- Jakarta basin --- site effects --- shear-wave velocity --- urban fabrics --- seismic vulnerability --- critic analysis --- cost modelling --- urban preservation programming --- building works programming --- natural hazard --- earthquake --- dam spillway --- psychology --- cyber-infrastructure --- big data --- disaster management --- review --- natural hazards --- disaster --- scientometrics --- bibliometrics --- citation analysis --- NatCatSERVICE --- Sigma Explorer --- Oroville Dam --- spillway --- incident --- flood control --- flood-frequency analysis --- dam operation --- drought --- impacts --- exposure --- vulnerability --- risk --- policy --- risk assessment --- earthquake risk --- energy security --- reliability of power supply --- Eurasian Economic Union (EAEU) --- integration process --- common electricity market --- masonry aggregates --- vulnerability assessment --- vulnerability curves --- damage scenarios --- local hazard effect --- psychological representation of earthquakes --- open-ended and closed-questions surveys --- children --- seismic hazard assessment --- emotions --- emotional prevention --- African easterly wave --- attractor coexistence --- chaos --- hurricane --- limit cycle --- Lorenz model --- predictability --- recurrence --- extended range weather prediction --- Jakarta basin --- site effects --- shear-wave velocity --- urban fabrics --- seismic vulnerability --- critic analysis --- cost modelling --- urban preservation programming --- building works programming --- natural hazard --- earthquake --- dam spillway --- psychology --- cyber-infrastructure
Choose an application
On various examples ranging from geosciences to environmental sciences, this book explains how to generate an adequate description of uncertainty, how to justify semiheuristic algorithms for processing uncertainty, and how to make these algorithms more computationally efficient. It explains in what sense the existing approach to uncertainty as a combination of random and systematic components is only an approximation, presents a more adequate three-component model with an additional periodic error component, and explains how uncertainty propagation techniques can be extended to this model. The book provides a justification for a practically efficient heuristic technique (based on fuzzy decision-making). It explains how the computational complexity of uncertainty processing can be reduced. The book also shows how to take into account that in real life, the information about uncertainty is often only partially known, and, on several practical examples, explains how to extract the missing information about uncertainty from the available data.
Engineering. --- Computational Intelligence. --- Data Mining and Knowledge Discovery. --- Statistics for Engineering, Physics, Computer Science, Chemistry and Earth Sciences. --- Data mining. --- Ingénierie --- Exploration de données (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Uncertainty (Information theory) --- Cyberinfrastructure. --- Cyber-based information systems --- Cyber-infrastructure --- Measure of uncertainty (Information theory) --- Shannon's measure of uncertainty --- System uncertainty --- Statistics. --- Computational intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Statistical analysis --- Statistical data --- Statistical methods --- Statistical science --- Mathematics --- Econometrics --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Construction --- Industrial arts --- Technology --- Electronic data processing --- Information technology --- Computer networks --- Computer systems --- Distributed databases --- High performance computing --- Information measurement --- Probabilities --- Questions and answers --- Distributed processing --- Statistics .
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International ICST Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2012, held in Yaounde, Cameroon, in November 2012. The 24 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics in the field of information and communication infrastructures and are grouped in topical sections on: e-Infrastructure, e-Services, e-Society, e-Health, and e-Security.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computers and civilization. --- Computer Science. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Computer networks --- Information technology --- Cyberinfrastructure --- Wireless communication systems --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Computer systems --- Distributed databases --- High performance computing --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Network computers --- Distributed processing --- Informatics --- Science --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization
Listing 1 - 10 of 18 | << page >> |
Sort by
|