Buy rnx.eu ?

Products related to Computing:


  • Cloud Computing : Concepts, Technology, Security, and Architecture
    Cloud Computing : Concepts, Technology, Security, and Architecture

    Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part of information technology.The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources.To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls.It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services. In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures.Comprehensive coverage of containerization and cybersecurity topics is also included. All chapters are carefully authored from an industry-centric and vendor-neutral point of view.In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions.With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Cloud Computing Technology
    Cloud Computing Technology

    This open access book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, big data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence.

    Price: 44.99 £ | Shipping*: 0.00 £
  • Security in Computing
    Security in Computing

    The Art of Computer and Information Security: From Apps and Networks to Cloud and Crypto Security in Computing, Sixth Edition, is today's essential text for anyone teaching, learning, and practicing cybersecurity.It defines core principles underlying modern security policies, processes, and protection; illustrates them with up-to-date examples; and shows how to apply them in practice.Modular and flexibly organized, this book supports a wide array of courses, strengthens professionals' knowledge of foundational principles, and imparts a more expansive understanding of modern security. This extensively updated edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; cyberwarfare; post-quantum computing; and more.It contains many new diagrams, exercises, sidebars, and examples, and is suitable for use with two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Security Body of Knowledge (CyBOK). Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack typesThe security practitioner's toolbox: Identification and authentication, access control, and cryptographyAreas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computingCross-cutting disciplines: Privacy, management, law, and ethicsUsing cryptography: Formal and mathematical underpinnings, and applications of cryptographyEmerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, cyberwarfare, and quantum computing Register your book for convenient access to downloads, updates, and/or corrections as they become available.See inside book for details.

    Price: 95.24 £ | Shipping*: 0.00 £
  • Computing and Technology Ethics
    Computing and Technology Ethics


    Price: 80.00 £ | Shipping*: 0.00 £
  • How can I outsource computing power?

    You can outsource computing power by utilizing cloud computing services offered by companies such as Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform. These services allow you to rent computing resources on a pay-as-you-go basis, giving you access to scalable computing power without the need to invest in expensive hardware. By leveraging these cloud services, you can easily scale your computing resources up or down based on your needs, making it a cost-effective and flexible solution for outsourcing computing power.

  • What is a brief definition of computing technology and could you provide an example?

    Computing technology refers to the use of computers and software to process, store, and manage information. It involves the use of hardware, software, and networks to perform various tasks such as data analysis, communication, and automation. An example of computing technology is cloud computing, which allows users to access and store data and applications over the internet instead of on their local computer.

  • How can the computing power be improved?

    Computing power can be improved through advancements in hardware and software technologies. This includes the development of faster and more efficient processors, increased memory and storage capacities, and improved cooling systems to prevent overheating. Additionally, optimizing software algorithms and programming techniques can also enhance computing power by making better use of available resources. Furthermore, advancements in parallel processing and distributed computing can also contribute to improved computing power by allowing tasks to be divided and processed simultaneously across multiple processors or systems.

  • How can one earn money with computing power?

    One way to earn money with computing power is through cryptocurrency mining. By using your computer's processing power to solve complex mathematical equations, you can earn cryptocurrency as a reward. Another way is by participating in distributed computing projects, where you can lend your computing power to help solve scientific research problems in exchange for payment. Additionally, you can offer your computing skills and services on freelance platforms or by starting your own tech consulting business to earn money.

Similar search terms for Computing:


  • Cloud Computing Security Knowledge CCSK Online Course
    Cloud Computing Security Knowledge CCSK Online Course

    Course Description The Cloud Computing Security Knowledge class provides students thorough coverage of cloud security fundamentals and prepares them to take the Cloud Security Alliance CCSK certification exam. The course begins with a detailed description of cloud computing and then expands into all major domains such as; Governance and Risk Management, the Cloud Architectural Framework and Business Continuity/Disaster Recovery Upon completing this course, the students will be experts in the following topics: Pass the CCSK Exam Understanding cloud computing security challenges Cloud computing security controls recommendation Elasticity, Resiliency and Measured Usage Understand the cloud computing architectural framework Example Training Video LEARN365 Courses Include 12 Months Unlimited Online Access to: Expert Instructor-Led Training: Learn 365 uses only the industry's finest instructors in the IT industry. They have a minimum of 15 years real-world experience and are subject matter experts in their fields. Unlike a live class, you can fast-forward, repeat or rewind all your lectures. This creates a personal learning experience and gives you all the benefit of hands-on training with the flexibility of doing it around your schedule 24/7. Visual Demonstrations andamp; Multimedia Presentations: Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. Learn 365 always focuses on real world scenarios and skill-set development. Quizzes andamp; Exam Simulators: Learn 365's custom practice exams prepare you for your exams differently and more effectively than the traditional exam preps on the market. You will have practice quizzes after each module to ensure you are confident on the topic you have completed before proceeding. This will allow you to gauge your effectiveness before moving to the next module in your course. Learn 365 courses also include practice exams designed to replicate and mirror the environment in the testing center. These exams are on average 100 questions to ensure you are 100% prepared before taking your certification exam. Social Learning andamp; Networking: Learn 365 has designed a world class Learning Management System (LMS). This system allows you to interact and collaborate with other students and Learn 365 employees, form study groups, engage in discussions in our NOW@ Forums, rate and like different courses and stay up to date with all the latest industry knowledge through our forums, student contributions and announcement features. Flash Cards andamp; Educational Games: IT online learning knows that education is not a one size fits all approach. Students learn in different ways through different tools. That is why we provide Flash Cards and Education Games throughout our courses. This will allow you to train in ways that keep you engaged and focused. Each course will have dozens of Flash Cards so you can sharpen your skill-sets throughout your training as well as educational games designed to make sure your retention level of the materials is extremely high. Navigation and Controls: Learn 365's self-paced training programs are designed in a modular fashion to allow you the flexibility to work with expert level instruction anytime 24/7. All courses are arranged in defined sections with navigation controls allowing you to control the pace of your training. This allows students to learn at their own pace around their schedule. Certificate of Completion: Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment. Course Outline 1: Architecture NIST Definitions Essential Characteristics Service Models Deployment Models Multi-Tenancy CSA Cloud Reference Model Jericho Cloud Cube Model Cloud Security Reference Model Cloud Service Brokers Service Level Agreements 2: Governance and Enterprise Risk Management Contractual Security Requirements Enterprise and Information Risk Management Third Party Management Recommendations Supply chain examination Use of Cost Savings for Cloud 3: Legal Issues: Contracts and Electronic Discovery Consideration of cloud-related issues in three dimensions eDiscovery considerations Jurisdictions and data locations Liability for activities of subcontractors Due diligence responsibility Federal Rules of Civil Procedure and electronically stored information Metadata Litigation hold 4: Compliance and Audit Management Definition of Compliance Right to audit Compliance impact on cloud contracts Audit scope and compliance scope Compliance analysis requirements Auditor requirements 5: Information Management and Data Security Six phases of the Data Security Lifecycle and their key elements Volume storage Object storage Logical vs physical locations of data Three valid options for protecting data Data Loss Prevention Course Syllabus Detection Data Migration to the Cloud Encryption in IaaS, PaaS andamp; SaaS Database Activity Monitoring and File Activity Monitoring Data Backup Data Dispersion Data Fragmentation 6: Interoperability and Portability Definitions of Portability and Interoperability Virtualization impacts on Portability and Interoperability SAML and WS-Security Size of Data Sets Lock-In considerations by IaaS, PaaS andamp; SaaS delivery models Mitigating hardware compatibility issues 7: Traditional Security, Business Continuity, and Disaster Recovery Four D's of perimeter security Cloud backup and disaster recovery services Customer due diligence related to BCM/DR Business Continuity Management/Disaster Recovery due diligence Restoration Plan Physical location of cloud provider 8: Data Center Operations Relation to Cloud Controls Matrix Queries run by data center operators Technical aspects of a Provider's data center operations for customers Logging and report generation in multi-site clouds 9: Incident Response Factor allowing for more efficient and effective containment and recovery in a cloud Main data source for detection and analysis of an incident Investigating and containing an incident in an Infrastructure as a Service environment Reducing the occurrence of application level incidents How often should incident response testing occur Offline analysis of potential incidents 10: Application Security Identity, entitlement, and access management (IdEA) SDLC impact and implications Differences in S-P-I models Consideration when performing a remote vulnerability test of a cloud-based application Categories of security monitoring for applications Entitlement matrix 11: Encryption and Key Management Adequate encryption protection of data in the cloud Key management best practices, location of keys, keys per user Relationship to tokenization, masking, anonymization and cloud database controls 12: Identity, Entitlement, and Access Management Relationship between identities and attributes Identity Federation Relationship between Policy Decision Point (PDP) and Policy Enforcement Point (PEP) SAML and WS-Federation Provisioning and authoritative sources 13: Virtualization Security concerns for hypervisor architecture VM guest hardening, blind spots, VM Sprawl, data comingling, instant-on gaps In-Motion VM characteristics that can create a serious complexity for audits How can virtual machine communications bypass network security controls VM attack surfaces Compartmentalization of VMs 14: Security as a Service 10 categories Barriers to developing full confidence in security as a service (SECaaS) Deployment of Security as a Service in a regulated industry prior SLA Logging and reporting implications How can web security as a service be deployed What measures do Security as a Service providers take to earn the trust of their customers ENISA Cloud Computing: Benefits, Risks and Recommendations for Information Security Isolation failure Economic Denial of Service Licensing Risks VM hopping Five key legal issues common across all scenarios Top security risks in ENISA research OVF Underlying vulnerability in Loss of Governance User provisioning vulnerability Risk concerns of a cloud provider being acquired Security benefits of cloud Risks Data controller vs data processor definitions in Infrastructure as a Service (IaaS), who is responsible for guest systems monitor Need to train your Team? Contact Us for Discounts on Multiple Subscription Purchases.

    Price: 59.00 £ | Shipping*: £
  • Cloud Computing
    Cloud Computing

    A concise and useful analysis of the legal issues facing both cloud providers and their customers.The technical awareness of the legal system with regards to cloud technologies is increasing.The courts are beginning to take a useful, pragmatic and well balanced approach to evaluating the fairness and effectiveness of service provider T&C's in meeting customer information security requirements and obligations.The concept of what is reasonable is central to this balance.It is also nothing new. This after all is what corporate diligence is all about.However, achieving this reasonableness requires real understanding of well known terms such as: vulnerability, threat, risk and exposure within a new technical landscape.

    Price: 23.99 £ | Shipping*: 3.99 £
  • Humanities Computing
    Humanities Computing

    Humanities Computing provides a rationale for a computing practice that is of and for as well as in the humanities and the interpretative social sciences.It engages philosophical, historical, ethnographic and critical perspectives to show how computing helps us fulfil the basic mandate of the humane sciences to ask ever better questions of the most challenging kind.It strengthens current practice by stimulating debate on the role of the computer in our intellectual life, and outlines an agenda for the field to which individual scholars across the humanities can contribute.

    Price: 49.99 £ | Shipping*: 0.00 £
  • Security and Risk Analysis for Intelligent Edge Computing
    Security and Risk Analysis for Intelligent Edge Computing

    This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems.It presents state-of-the art content and provides an in-depth overview of the basic background in this related field.Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms.This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures.It guides the reader through the core ideas with relevant ease. Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks.As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge.This book includes various case studies and applications on Edge Computing.It includes the Internet of Things related areas, such as smart cities, blockchain, mobile networks, federated learning, cryptography and cybersecurity. This book is one of the first reference books covering security and risk analysis in Edge Computing Systems.Researchers and advanced-level students studying or working in Edge Computing and related security fields will find this book useful as a reference.Decision makers, managers and professionals working within these fields will want to purchase this book as well.

    Price: 149.99 £ | Shipping*: 0.00 £
  • What is the computing power of the blender?

    The computing power of a blender is not typically measured in the same way as a computer or other electronic device. Instead, the performance of a blender is often evaluated based on its motor power, which is measured in watts. The higher the wattage, the more powerful the blender is likely to be, and the more efficiently it can blend ingredients. Additionally, some blenders may also have advanced features such as variable speed settings and preset programs that can affect their overall performance.

  • Why does OMSI 2 require so much computing power?

    OMSI 2 requires a lot of computing power because it is a highly detailed and realistic simulation game. The game features complex and detailed 3D models of buses, cities, and landscapes, as well as realistic physics and AI behaviors. Additionally, OMSI 2 simulates a large open world environment with dynamic weather and traffic conditions, which requires significant processing power to render and simulate in real-time. Overall, the game's high level of detail and realism demands a lot of computing power to provide a smooth and immersive gaming experience.

  • How does the computing architecture of stack frames work?

    Stack frames are used in computing to store information about function calls and local variables. Each time a function is called, a new stack frame is created and pushed onto the call stack. This stack frame contains information such as the function's parameters, return address, and local variables. When the function finishes executing, its stack frame is popped off the call stack, allowing the program to return to the previous function. This process ensures that each function call has its own isolated space for storing data, preventing interference between different function calls.

  • Can the computing power be shared or distributed between computers?

    Yes, computing power can be shared or distributed between computers through a process known as distributed computing. This involves breaking down a complex computing task into smaller parts and assigning each part to different computers to work on simultaneously. By distributing the workload in this way, the overall computing power is effectively shared among multiple machines, allowing for faster processing and increased efficiency. This approach is commonly used in tasks such as data processing, scientific research, and networked applications.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.