Norges billigste bøker

Data og IT

Her finner du spennende bøker om Data og IT. Nedenfor er et flott utvalg på over 89.058 bøker om emnet.
Vis mer
Filter
Filter
Sorter etterSorter Populære
  • av Dmytro Kozhevin
    713,-

    Gain the knowledge and practical skills needed to deploy a fully functional, secure, and scalable application in AWS EKS. This book is a hands-on guide designed to help you navigate and manage infrastructure in the AWS EKS environment.The book starts by reviewing the concept of DevOps flexibility, emphasizing adaptability to manage changes effectively. It covers foundational elements like IAM basics, user management, and the use of Terraform for infrastructure as code, highlighting the importance of version stability and unique CIDR blocks. Moving forward, you'll explore Kubernetes, and its initial set-up steps, such as configuration management, access control, and storage. You'll also see how to bridge Kubernetes with AWS resources, touching upon service accounts, identity federation, and policy assignment. In the final chapters, the book guides you through the complete setup of a fully working application using Terraform. The book culminates with a step-by-step walkthrough of deploying a complete application environment where you'll generate and distribute access credentials, configure persistent storage, and manage RBAC for users, all using Terraform.Zero-Maintenance Strategies for AWS EKS will provide you with a solid foundation and a toolkit of proven strategies for managing cloud infrastructure.You will: Acquire foundational knowledge in IAM basics and user management. Manage external access to your applications while consolidating load balancing through a single, entry point. Securely configure DNS and SSL, ensuring your application is both accessible and protected.

  • av Manoj Kuppam
    539,-

    Gain a comprehensive understanding of digital reliability to ensure consistent, dependable user experiences that foster trust in technology. Part of author Saurav Bhattacharya's trilogy that covers the essential pillars of digital ecosystems-security, reliability, and usability-this book tackles the challenges of achieving high reliability in complex systems and provides strategies to overcome these obstacles.You'll start by reviewing the pivotal role of reliability in establishing the foundation of digital trust, essential for the sustainable growth of digital ecosystems. In today's digital landscape, characterized by rapid technological advancements and increasing cyber threats, understanding and addressing reliability issues are paramount. As transformative technologies like AI, blockchain, and quantum computing emerge, grasping these fundamental principles becomes crucial.Enterprise Digital Reliability advocates for collaborative efforts among technologists, policymakers, and society to create digital environments that are innovative, inclusive, safe, and respectful of human values.You will: Understand the multifaceted concept of reliability in technology and its significance in building digital trust Foster innovation and inclusivity in digital environments and large-scale enterprise and explore strategies to address them effectively Provide a framework for understanding and achieving digital equilibrium Examine operational uptime and consistent user experiences crucial successful digital platforms

  • av Anirudh Khanna
    539,-

    Dive into the world of digital security and navigate its intricate landscape. In an era where digital reliance is ubiquitous, the need for robust cybersecurity measures has never been more pressing. Part of author Saurav Bhattacharya's trilogy that covers the essential pillars of digital ecosystems-security, reliability, and usability-this book sheds light on the dynamic challenges posed by cyber threats, advocating for innovative security solutions that safeguard users while upholding their digital freedoms.Against the backdrop of rapid technological advancement and escalating cyber threats, this book addresses pressing security concerns at the forefront of our digital era. You'll learn that trust plays a pivotal role in fostering a secure digital environment, enabling individuals and organizations to flourish without fear of malicious exploits. With transformative technologies like AI, blockchain, and quantum computing on the horizon, understanding and addressing cybersecurity fundamentals is essential for traversing the evolving digital landscape. Securing an Enterprise is your roadmap towards a future where technology aligns with humanity, fostering a more equitable, secure, and interconnected world.You will: Explore advanced methodologies and innovative approaches to bolster cybersecurity Understand the potential impacts of the advancements on security Provide strategic guidance on adapting to security changes to ensure sustainably Take a holistic approach in reviewing security

  • av Hela Ben Khalfallah
    655,-

    Understand the guiding principles of "clean code" and how it applies to modern front-end development, accessibility (a11y), semantics, performance, and the Green Web. Highlighting key topics ranging from the foundations of JavaScript and HTML to popular frameworks like React, this book provides best practices to ensure code and applications are easier, more efficient and cost effective to run.Using a web-based application as an example, you'll begin by cleaning and improving its code base by dividing the JavaScript into smaller, reusable and composable functions without side effects. Then, you'll improve the HTML code base by applying "Disability Driven Design" patterns, focusing on semantics before moving on to improving the architecture with a functional style (immutable, modular and composable).Because the web today needs to be green with reduced loading time and energy consumption, you'll apply some tips and tricks to improve code performance and see how to best monitor it in a continuous and scalable way.You will: See how the JavaScript engine works and memory management. Explore in greater detail key focus areas of accessibility and green computing Make applications easier and more cost-effective to run Look closely at clean and sustainable development using JavaScript and React

  • av Iris Classon
    655,-

    In this second edition, you will be guided through the journey of migrating an ASP.NET Framework application to ASP.NET Core microservices. You will know how to master the following steps: Conduct an inventory, prepare the application, plan the migration, execute the migration, improve the deployment pipeline.For the detailed hands-on migration, the book uses a streamlined business application, derived from a real-world application that underwent the migration process a few years ago. In this second edition, the application has evolved to include more features relevant to the latest advancements in ASP.NET Core, such as minimal web APIs, Razor Pages, REST documentation, and enhanced authentication. The book also delves into the nuances of upgrading between ASP.NET Core versions, managing breaking changes, and incorporating significant new features.New in This Edition Enhanced sample application now showcases the application of gRPC, Minimal APIs, and OpenAI, reflecting the latest in ASP.NET Core technology Dedicated section focuses on upgrading ASP.NET Core applications, addressing both the challenges posed by breaking changes and the introduction of new features Deployment and CI/CD pipeline section has been expanded to include a minor section covering GitHub Actions, Docker containers, and other significant deployment improvements Maintenance chapter has been updated with a section on the ASP.NET Core release and support cycles, as well as an enhanced resources section now featuring AI developer tools What You Will Learn Effectively plan and execute a migration: Conduct an in-depth analysis, inventory and cleanup, decoupling logic, and break out new services, all while adhering to best practices such as the handler pattern, dependency injection, and more Use key ASP.NET Core features such as minimal Web API, Razor Pages, gRPC, and built-in authentication improvements Know other important features such as SignalR, EF Core, ASP.NET Core testing library for integration tests, Blazor and more

  • av Stephen Chin
    770,-

    Build enhanced visual experiences and design and deploy modern, easy-to-maintain, client applications across a variety of platforms. This book will show you how these applications can take advantage of JavaFX's latest user interface components, 3D technology, and cloud services to create immersive visualizations and allow high-value data manipulation. This book is a professional reference for building Java applications for desktop, mobile, and embedded in the Cloud age. It offers end-to-end coverage of the latest features in JavaFX 21 and 23.  This third edition has been updated to include new features introduced in JavaFX 21 and 23, including NEW APIs: Map, FlatMap, and OrElse fluent bindings for ObservableValue, along with the new Subscription API. Additionally, it's updated to account for new bug fixes and overall improvements to existing functionality in Java. After reading this book, you will be equipped to upgrade legacy client applications, develop cross-platform applications in Java, and build enhanced desktop and mobile native clients.What You Will Learn Create modern client applications in Java using the latest JavaFX 17 and Java 17 LTS Build enterprise clients that will enable integration with existing cloud services  Use advanced visualization and 3D features Deploy on desktop, mobile, and embedded devices

  • av Banu Parasuraman
    713,-

    Dive into the future of programming with this comprehensive guide for Java developers to integrate large language models (LLMs) and Generative AI using the Spring Framework. This book comes at a revolutionary time when AI technology is transforming how we implement solutions in various fields, including natural language processing, content generation, and predictive analytics. With its widespread use in the Java community, the Spring Framework is a logical choice for this integration. By focusing on integrating LLMs and GenAI with Spring, this book bridges a significant gap between cutting-edge AI technologies and traditional Java development practices. The author uses a hands-on approach, guiding you through practical implementation to effectively show how to apply theory in real-world situations. Basic introductions of topics-Spring AI, Spring Framework, and other related AI technologies-evolve into advanced integrations to ensure that you find valuable insights regardless of your starting level. Additionally, this book dedicates sections to security and ethical considerations, addressing the pressing issues associated with AI. With a look at emerging trends and future developments, this book prepares you for what's next, ensuring that you are not just catching up with the current state of technology but are also ready for future advancements. What You Will Learn¿ Master the integration of LLMs and GenAI with the Spring Framework¿ Develop practical skills in developing AI-driven applications using Java¿ Gain insights into handling data, security, and ethical considerations in AI applications¿ Apply strategies for optimizing performance and scalability in AI-enabled applications¿ Prepare for future AI trends and technologies

  • av Scott (Florida Institute of Technology) Tilley
    1 181,-

    Discover a practical, streamlined approach to systems development that focuses on the latest developments with Tilley's SYSTEMS ANALYSIS AND DESIGN, Cengage International Edition, 13th, and MindTap digital resources. Real examples clearly demonstrate both traditional and emerging approaches to systems analysis and design, including object-oriented and agile methods. You also study emerging technologies such as artificial intelligence (AI), machine learning (ML), cloud computing and cybersecurity. Meaningful projects, insightful assignments and both online and printed exercises emphasize the critical thinking and IT skills that are most important in today's dynamic, business-related environment.

  • av Jill (Georgia Northwestern Technical College) West
    1 167,-

    Master the technical skills and industry knowledge for an exciting career installing, configuring and troubleshooting computer networks with West's COMPTIA NETWORK+ GUIDE TO NETWORKS, CENGAGE INTERNATIONAL EDITION, 10th Edition, which prepares you for success on the CompTIA's Network+ N10-009 certification exam as content corresponds to all exam objectives, including protocols, topologies, hardware, cloud, network design, security and troubleshooting. Step-by-step instructions and cloud, virtualization and simulation projects give you experience working with hardware, software, operating systems and device interactions. Stories from professionals, discussion prompts, scenario-based practice exam questions, hands-on activities and projects help you explore key concepts. Gain problem-solving tools for any computing environment. MindTap digital resources are also available for additional practice and certification prep.

  •  
    1 422,-

    The investigation of phraseology through corpus-based and computational approaches holds significant relevance for various professionals, including translators, interpreters, terminologists, lexicographers, language instructors, and learners. Computational Phraseology, and in particular the computational analysis of multiword expressions (also known as multiword units), has gained prominence in recent years and is essential for a number of Natural Language Processing and Translation Technology applications. The failure to detect these units automatically could result in incorrect and problematic automatic translations and could hinder the performance of applications such as text summarisation and web search. Against this background, the volume offers 13 articles carefully selected and organised into two parts: 'Computational treatment of multiword units' and 'Corpus-based and linguistic studies in phraseology'. The contributions not only highlight the latest advancements in computational and corpus-based phraseology but also reiterate its vital role in all areas of language technologies, including basic and applied research.

  •  
    632,-

    Future Internet Services and Service Architectures presents state-of-the-art results in services and service architectures based on designs for the future Internet and related emerging networks. The discussions include technology issues, key services, business models, and security.

  • av N. Sudha Bhuvaneswari
    541 - 1 189,-

    This book highlights how to integrate and realize Service Oriented Architecture with web services which is one of the emerging technologies in IT. It also focuses on the latest technologies, such as Metadata Management, Security issues, Quality of Service and its commercialization. A chapter is also devoted to the study of Emerging standards and development tools for Enterprise Application Integration.

  • av Krishna K. Warhade, Shabbir N. Merchant & Uday B. Desai
    528 - 1 124,-

  • av Johnson I. Agbinya
    632 - 1 422,-

    Near field communication devices and the emerging field of Internet of things require efficient short range communication techniques. Classical telecommunication theory however has so far focused on radiating electromagnetic signals which is more suited to terrestrial communication systems. Over the last decade however considerable research and applications of inductive methods have emerged as innovative approaches for secure short range communications by changing the paradigm of an established model of electromagnetic communications. We have witnessed the emergence of embedded inductive medical devices, magneto-inductive waveguides, inductive pots and cooking devices, magneto-inductive sensors, wireless power transfer, inductive hearing aids and the emerging inductive point-to-point communication specifically termed near-field communication (NFC) as used in mobile phones and payment cards to name a few. While there exist a large set of distributed methods and algorithms detailing the design and performances of such applications, a significant gap is observed as a lack of detailed collection of the methods in one place which could be easily understood and used quickly by someone seeking to apply the methods. In this book this missing gap is filled with the required details and the theory of near field communication systems including both the radiating and reactive (energy coupling) near-field systems in addition to the well known far field radiation techniques. The book details the fundamental expressions and design methods which facilitate the creation of near field devices and equipment including embedded biomedical implants. The book contains recent advances in inductive communications, performance, limitations and a collection of applications. It also lays a strong foundation for the application of inductive methods for creating Internet of Things systems. The topics discussed in the book in great details include: Near field and far field methods Circuit models of inductive antennas; Inductive methods in embedded medical devices Range and capacity extension methods including multiple-input and multiple-output inductive systems; Coding and modulation techniques; Narrowband and broadband methods; Magnetic link budgets; Crosstalk Magnetic induction waveguide devices and a Near field Simulator in MatlabThe book is a compendium and design methods for inductive near field technologies and is ideal for design personnel in the wireless communication industries as well as academic staff and master/research students in computer science, wireless sensors, telecommunications systems research, electrical engineering and Internet of things. It is a useful guide for undergraduate student to appreciate the role of inductive circuits and magnetism in telecommunications and electronic devices in general.

  •  
    580,-

    The Semantic Interoperability model would improve common interoperability models introducing the interpretation of means of data. In practice, semantic technologies are partially inverting the common view at actor intelligence: intelligence is not implemented (only) by actors.

  •  
    619,-

    The book "Advanced distributed measuring systems - exhibits of application" offers 8 up-to-date examples of typical laboratory, industrial and biomedical applications of advanced measuring and information systems including virtual instrumentation.

  •  
    619,-

    This book provides an overview of advanced digital image and signal processing techniques that are currently being applied in the realm of measurement systems.

  • av Geir M. Koien
    632,-

    Aspects of Personal Privacy in Communications is mostly about understanding what privacy is and some of the technologies may help us to regain a bit of privacy. We discuss what privacy is about, what the different aspects of privacy may be and why privacy needs to be there by default.

  • av Sonali Agarwal
    632 - 1 422,-

    This book attempts to disseminate information about several E Governance projects and possible Data Mining benefits which are the future of good governance in India. Strategic Management of these projects through Data Mining would certainly encourage policy makers to understand better models of E Governance, thorough evaluation of projects, perceptive interrelations between projects, keeping track of the objectives and outcomes and to develop a more collaborative approach towards implementation of the National e- Governance Plan.

  • av Marcus Wong
    632 - 1 422,-

    With Femtocell popularities and deployments on the rise, a number of Femtocell security breach has been reported as a result of pre-standards versions of Femtocells that did not conform to published standards or implemented as a result of lack of understanding of basic security principles. A considerable amount of effort has been devoted, both in industry forums and standards developing organizations, towards creating technical specifications for the architecture, operational, and security of the Femtocells. Security remains on the minds of operators as the traditionally closed operator core network opens up with the Femtocells extending into the homes of users and potential hackers with more and more powerful tools. Technical topics discussed in the book include:* UMTS/LTE Femtocell security and threat analysis;* CDMA Femtocell security;* WiMAX Femtocell security;* LIPA and SIPTO security;* Small Cells;Femtocells: Secure Communication and Networking provides an in-depth analysis and research results on the security design of Femtocells based on UMTS, LTE, CDMA and WiMAX access technologies. Threat analysis, security requirements as well as security mechanisms used to counter the threats and potential attacks are provided in details covering every aspect of Femtocell security. Femtocells: Secure Communication and Networking is ideal for personnel in communication, networking and security industries as well as academic staff and master/research students in network security, computer science, operational research, electrical engineering and telecommunication systems and the Internet.

  •  
    580,-

    This book provides an overview of the current Internet of Things (IoT) landscape, ranging from the research, innovation and development priorities to enabling technologies in a global context.

  •  
    490,-

    5G Outlook - Innovations and Applications is a collection of the recent research and development in the area of the Fifth Generation Mobile Technology (5G), the future of wireless communications. Plenty of novel ideas and knowledge of the 5G are presented in this book as well as divers applications from health science to business modeling.

  • av Luigi Pomante
    490 - 1 059,-

    Provides models, methodologies and tools to support each step of the co-design flow of embedded systems implemented by exploiting heterogeneous multi-processor architectures mapped on distributed systems, as well as fully integrated onto a single chip.

  • av Udo Kebschull & Frederik Grull
    425 - 813,-

    Short computing times are crucial for timely diagnostics in biomedical applications, but lead to a high demand in computing for new and improved imaging techniques. In this book reconfigurable computing with FPGAs is discussed as an alternative to multi-core processing and graphics card accelerators.

  •  
    490,-

    The Building Blocks of IoT Analytics is devoted to the presentation the main technology building blocks that comprise advanced IoT analytics systems. Special emphasis is paid in the presentation of technologies for IoT streaming and semantic interoperability across diverse IoT streams.

  •  
    528,-

    Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.