Аннотация

Mit der zunehmenden Nutzung von Cloud Computing häufen sich Cyberangriffe. Und auch andere Faktoren stellen ein Sicherheitsrisiko für das Cloud Computing dar – angefangen von technischen Störungen über Fehlkonfigurationen, Datenverlust, mangelnde Awareness der Mitarbeiter bis hin zu Compliance-Verletzungen. Mit Veränderung der Bedrohungslage lassen sich klassische Sicherheitskonzepte und -lösungen nicht kurzerhand auf das Cloud-Umfeld übertragen bzw. bieten nicht mehr ausreichenden Schutz. Cloud-Sicherheit erfordert neue Konzepte und hochentwickelte Technologien.
Das sind die Themen des Buches:

– Technologischer und organisatorischer Wandel durch Cloud Computing – Veränderte Bedrohungslage durch Cloud-Nutzung – Verantwortlichkeiten in der Cloud-Nutzung – das Shared-Responsibility-Modell – Vorgehensweise zur Cloud-Migration unter sicherheitsrelevanten Aspekten – Vorgehensmodelle und Umsetzungskonzepte für sichere Hybrid, Public und Multi Clouds – Sicherheitskonzepte und -maßnahmen der Cloud-Anbieter – Datenschutz und DSGVO-konforme Datenverschlüsselung – Umsetzung von Zero-Trust-Architekturen – Kritische Infrastrukturen: Grundlagen, Anforderungen und sicherheitsrelevante Umsetzungskonzepte – Best Practices zur automatischen Identifizierung und Behebung von Sicherheitslücken in AWS und in Microsoft Azure – Branchen- und anwendungsbezogene Beispiele aus der Praxis

Аннотация

This book covers the most essential techniques for designing and building dependable distributed systems, from traditional fault tolerance to the blockchain technology. Topics include checkpointing and logging, recovery-orientated computing, replication, distributed consensus, Byzantine fault tolerance, as well as blockchain. This book intentionally includes traditional fault tolerance techniques so that readers can appreciate better the huge benefits brought by the blockchain technology and why it has been touted as a disruptive technology, some even regard it at the same level of the Internet. This book also expresses a grave concern on using traditional consensus algorithms in blockchain because with the limited scalability of such algorithms, the primary benefits of using blockchain in the first place, such as decentralization and immutability, could be easily lost under cyberattacks.

Аннотация

MCA Microsoft Office Specialist Study Guide:  PowerPoint Associate Exam MO-300   is your roadmap to preparing for taking the MO-300 exam and earning the PowerPoint Associate (PowerPoint and PowerPoint 2019) certification. The following objectives are covered: Manage presentations Manage slides Insert and format text, shapes, and images Insert tables, charts, smartArt, 3D models, and media Apply transitions and animations Major topics include creating, editing, and enhancing presentations and slideshows, including the ability to create and manage presentations, insert and format shapes and slides, create slide content, apply transitions and animations, and manage multiple presentations. This Study Guide also covers creating professional-grade sales presentations, employee training, instructional materials, and kiosk slideshows.Readers will also have access to Sybex's superior online test bank, includng hundreds of practice questions, flashcards, and a glossary of important terms.

Аннотация

In this book, the Chief Architect of the Cloud Native Competence Architecture Department at Sberbank shares his knowledge and experience with the reader on the creation and transition to the cloud ecosystem, as well as the creation and adaptation of applications for it. In the book, the author tries to lead the reader along the path, bypassing mistakes and difficulties. To do this, practical applications are demonstrated and explained so that the reader can use them as instructions for educational and work purposes. The reader can be both developers of different levels and ecosystem specialists who wish not to lose the relevance of their skills in an already changed world.

Аннотация

Archiving has become an increasingly complex process. The challenge is no longer how to store the data but how to store it intelligently, in order to exploit it over time, while maintaining its integrity and authenticity. <p>Digital technologies bring about major transformations, not only in terms of the types of documents that are transferred to and stored in archives, in the behaviors and practices of the humanities and social sciences (digital humanities), but also in terms of the volume of data and the technological capacity for managing and preserving archives (Big Data). <p><i>Archives in The Digital Age</i> focuses on the impact of these various digital transformations on archives, and examines how the right to memory and the information of future generations is confronted with the right to be forgotten; a digital prerogative that guarantees individuals their private lives and freedoms.

Аннотация

Аннотация

A bundle of Apple services, all in one place  All your favorite Apple services are available in one convenient bundle, and  Apple One For Dummies  helps you get the full value out of your subscription. What’s in this Apple barrel? Everything you need to stream music and TV, keep up with the news, play games, store files online, and even stay in shape. This book gives you a bundle of insight on how to choose the subscription level that’s right for you, access and link all the services across your Apple and non-Apple devices, and use all the fun features of each service. This book takes you inside Apple Music, Apple TV+, Apple News+, Apple Arcade, iCloud, and Apple Fitness+, showing you how to make the most of each one.  Apple One For Dummies  also shows you how to make changes at any time, so you get all the juice out of your subscription! Get access to 50 million songs on Apple Plus Discover how the all-new Apple Fitness+ can transform your workout routine Use iCloud to store your photos and videos Understand Apple One’s subscription options and get the biggest bang for your buck For Dummies welcomes you to the Apple One-stop-shop that will make your digital life that much simpler.

Аннотация

Аннотация

A Multi-Processor System-on-Chip (MPSoC) is the key component for complex applications. These applications put huge pressure on memory, communication devices and computing units. This book, presented in two volumes – Architectures and Applications – therefore celebrates the 20th anniversary of MPSoC, an interdisciplinary forum that focuses on multi-core and multi-processor hardware and software systems. It is this interdisciplinarity which has led to MPSoC bringing together experts in these fields from around the world, over the last two decades. <p><i>Multi-Processor System-on-Chip 2</i> covers application-specific MPSoC design, including compilers and architecture exploration. This second volume describes optimization methods, tools to optimize and port specific applications on MPSoC architectures. Details on compilation, power consumption and wireless communication are also presented, as well as examples of modeling frameworks and CAD tools. Explanations of specific platforms for automotive and real-time computing are also included.