0 - 500
0
500

Authentication Technologies for Cloud Computing, IoT and Big Data (Security)

Authentication Technologies for Cloud Computing, IoT and Big Data (Security)

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for…

Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center

Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace. As it can deliver those services, efficiently and with quality, at compelling price levels, cloud computing is with us to stay. Ubiquitously and quite definitively, cloud computing is answering the demand…

Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges: ICBCC 2019, UMKC, Kansas City, USA (Smart Innovation, Systems and Technologies)

Proceedings of 6th International Conference on Big Data and Cloud Computing Challenges: ICBCC 2019, UMKC, Kansas City, USA (Smart Innovation, Systems and Technologies)

The book presents papers from the 6th International Conference on Big Data and Cloud Computing Challenges (ICBCC 2019), held at the University of Missouri, Kansas City, USA, on September 9 and 10, 2019 and organized in collaboration with VIT Chennai. The book includes high-quality, original research on various aspects of big data and cloud computing,…

IT Auditing Using Controls to Protect Information Assets, Third Edition

IT Auditing Using Controls to Protect Information Assets, Third Edition

Secure Your Systems Using the Latest IT Auditing TechniquesFully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Third Edition explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cybersecurity programs, big data and data repositories, and new technologies are included.…

Cloud Computing Using Oracle Application Express

Cloud Computing Using Oracle Application Express

Get the domain knowledge you need to develop real-world business apps for and in the cloud. You’ll see how Oracle APEX has made the life of web developers much easier and how it helps you create web-based data-centric applications easily and instantly without writing screeds of code.In Cloud Computing Using Oracle Application Express, you will…

The Crossroads of Cloud and HPC: OpenStack for Scientific Research: Exploring OpenStack cloud computing for scientific workloads

The Crossroads of Cloud and HPC: OpenStack for Scientific Research: Exploring OpenStack cloud computing for scientific workloads

OpenStack® is the leading open source IaaS platform, powering many of the world’s most notable science and research organisations. Research and science disciplines comprise some of the most prevalent use cases for OpenStack clouds. High-performance and high-throughput computing (HPC, HTC) require massive scaling and cluster networking; storage, compute and networking access to large volumes of…

Cloud Computing and ROI: A New Framework for IT Strategy (Management for Professionals)

Cloud Computing and ROI: A New Framework for IT Strategy (Management for Professionals)

This book develops an IT strategy for cloud computing that helps businesses evaluate their readiness for cloud services and calculate the ROI. The framework provided helps reduce risks involved in transitioning from traditional “on site” IT strategy to virtual “cloud computing.” Since the advent of cloud computing, many organizations have made substantial gains implementing this…

Blockchain Applications: A Hands-On Approach

Blockchain Applications: A Hands-On Approach

In the US, the services sector provides employment to about 100 million, while the manufacturing sector provides employment to about 20 million. These sectors are highly automated, and driven by sophisticated business processes forming an integral part of the digital economy. While the applications themselves may be distributed over the Internet in time and space,…