Products related to And:
-
Innovation in Energy Security and Long-Term Energy Efficiency
The sustainable development of our planet depends on the use of energy. The growing population of the world inevitably causes an increase in the demand for energy, which, on the one hand, threatens the potential for shortages of energy supply, and, on the other hand, causes the deterioration of the environment.Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play a role in affecting the behavior of households and companies, by causing behavioral change oriented to energy stewardship, and an overall switch to renewable energy resources. This book provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate the driving of societies to long-term energy efficiency.
Price: 36.30 £ | Shipping*: 0.00 £ -
Azure Cookbook : Essential recipes for cloud automation and secure cloud solutions
Price: 32.99 £ | Shipping*: 0.00 £ -
Cloud Computing : Concepts, Technology, Security, and Architecture
Cloud Computing: Concepts, Technology, Security & Architecture Cloud computing has become an integral and foundational part of information technology.The majority of digital business activity and technology innovation occurs with the involvement of contemporary cloud environments that provide highly sophisticated automated technology infrastructure and a vast range of technology resources.To successfully build upon, interact with, or create a cloud environment requires an understanding of its common inner mechanics, architectural layers, models, and security controls.It also requires an understanding of the business and economic factors that justify the adoption and real-world use of clouds and cloud-based products and services. In Cloud Computing: Concepts, Technology, Security & Architecture, Thomas Erl, one of the world's top-selling IT authors, teams up with cloud computing expert Eric Barceló Monroy and researchers to break down proven and mature cloud computing technologies and practices into a series of well-defined concepts, technology mechanisms, and technology architectures.Comprehensive coverage of containerization and cybersecurity topics is also included. All chapters are carefully authored from an industry-centric and vendor-neutral point of view.In doing so, the book establishes concrete, academic coverage with a focus on structure, clarity, and well-defined building blocks for mainstream cloud computing and containerization platforms and solutions.With nearly 370 figures, 40 architectural models, and 50 mechanisms, this indispensable guide provides a comprehensive education of contemporary cloud computing, containerization, and cybersecurity that will never leave your side.
Price: 44.99 £ | Shipping*: 0.00 £ -
Integrated Security Technologies and Solutions - Volume II : Cisco Security Solutions for Network Access Control, Segmentation, Context Sharing, Secure Connectivity and Virtualization
The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support.It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint.Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint.Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation
Price: 59.99 £ | Shipping*: 0.00 £
-
What are end-to-end software and cloud technology solutions?
End-to-end software and cloud technology solutions refer to comprehensive and integrated systems that cover the entire process or lifecycle of a particular software or technology need. This means that these solutions encompass everything from initial design and development to deployment, maintenance, and ongoing support. End-to-end solutions are designed to streamline and simplify the entire process, providing a seamless and cohesive experience for users. This can include cloud-based services that offer a complete package of tools and resources to meet a specific business or technological need.
-
What is the difference between automation technology and mechatronics?
Automation technology focuses on the use of control systems to operate equipment and processes with minimal human intervention. It involves the use of sensors, actuators, and controllers to automate tasks. Mechatronics, on the other hand, is a multidisciplinary field that combines elements of mechanical engineering, electrical engineering, and computer science to design and create intelligent systems. Mechatronics integrates mechanical systems with electronics and computer control to create advanced automated systems that can perform complex tasks. In summary, automation technology is a subset of mechatronics, which is a broader field encompassing a wider range of technologies and disciplines.
-
What is the difference between automation technology, PLC, and PCS7?
Automation technology refers to the use of control systems, such as PLC and PCS7, to automate industrial processes. PLC (Programmable Logic Controller) is a type of control system that uses a programmable memory to store instructions and execute specific functions, such as controlling machinery on a factory floor. PCS7 (Process Control System 7) is a specific type of automation technology developed by Siemens, which integrates various control systems and devices to monitor and control industrial processes in real-time. In summary, automation technology is the broader concept that encompasses the use of control systems like PLC and PCS7 to automate industrial processes, while PLC and PCS7 are specific types of control systems used in automation technology.
-
What are cloud solutions?
Cloud solutions refer to the delivery of computing services, including storage, processing power, and applications, over the internet. These services are provided by cloud service providers and can be accessed remotely from any location with an internet connection. Cloud solutions offer scalability, flexibility, and cost-effectiveness, allowing businesses to access the resources they need without having to invest in and maintain their own physical infrastructure. This technology has become increasingly popular as businesses seek to modernize their IT infrastructure and adapt to the demands of a digital economy.
Similar search terms for And:
-
Technology and Innovation Management
Technology and Innovation Management is one of the most sought-after courses offered like MBA or PGDM in Business Schools and various Technology Institutes, today.This book, written with deep ingrained practical insights and well-researched theoretical foundations integrates people, processes and technology to achieve maximum economic benefits to society.The book is designed to be a compendium for students and managers, who wish to understand technology and innovation management to the core.The book explains the relationship between technology innovation and strategy in a simplified manner.Keeping Indian education framework in mind, this book details on practices and principles that are easy to implement.The theories are simple to grasp, and anecdotal stories on Technology and Innovation implementations make it a student-friendly edition, to help achieve success in exams as well as in the professional front.It further explains the core principles of Technology and Innovation Management.S-Curve and the Segment Zero Principle, adopting industry 4.0 and innovation 4.0 to make India a smart and intelligent manufacturing hub in the era of fourth industrial revolution, design thinking for solving complex business problems along with the role and contribution of Government in Technology Development.
Price: 18.95 £ | Shipping*: 3.99 £ -
Robots, Automation and the Innovation Economy
Cascades of new technologies and innovations are entering our lives so fast that it is difficult for us to adapt to one innovation before the next becomes embedded into our everyday lives.What happens when the changes brought by technology are so profound that they affect all aspects of our lives?This book explores the potential impact of artificial intelligence (AI) and intelligent robots on individuals, organizations and society, specifically examining the impact on jobs and workplaces in the future.It provides an understanding of how we can adapt to changes that appear like flocks of black swans. Five key areas are unpacked in the book: automation, AI, (the significance of AI technology), innovation, competence transformation, and the fact that the pace of change is so rapid that it outstrips our ability to adapt to consecutive changes.The main objective is to show how AI will change society and how we as individuals and society must adapt in order to survive what the author terms ‘robot shock’, together with its consequences and after-effects.It offers a greater understanding of resistance to change and how we need to adopt strategies for adapting to major changes.Each of the book’s six chapters also contains policy inputs, framed as propositions, that are intended specifically for decision-makers.The book concludes by offering possible strategies for overcoming the negative effects of ‘robot shock’. The book intends to send a message to leaders of institutions, decision-makers and anyone attempting to understand and explain how we – as a social system – can succeed in tackling the many major challenges and crises faced by humanity.
Price: 135.00 £ | Shipping*: 0.00 £ -
Fashion Business and Digital Transformation : Technology and Innovation across the Fashion Industry
Fashion Business and Digital Transformation provides a practical and holistic overview of the fashion industry and the key technologies impacting the fashion supply chain.It covers product design and development, production, sales and customer experiences in physical, online and virtual environments.The key technologies impacting the ecosystem are explored, including artificial intelligence, virtual reality, augmented reality, digital fashion design, NFTs, 3D textiles, and blockchain.Strategic concepts such as ‘retail-tainment’, ‘phygital’, gamification and e-commerce, are analysed, alongside the effect of these key strategies for both the retailer and the customer. Theoretical foundations are supported by extensive use of examples, interviews and case studies drawn from a wide range of global fashion disrupters and cutting-edge brands.Engaging activities, exercises, and technical step-by-step guides are incorporated throughout, which will both consolidate how technology is driving change in the industry, but also equip the reader with the key skills and digital literacy capabilities required by future practitioners.Online resources include chapter-by-chapter PowerPoint slides, a test bank and links to further resources. This examination of the digital transformation of the fashion industry will be essential reading for advanced undergraduate and postgraduate students of Fashion Management, Fashion Business and Fashion Technology.
Price: 39.99 £ | Shipping*: 0.00 £ -
Security and Privacy Trends in Cloud Computing and Big Data
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.Big data and cloud computing are integrated together in practice.Cloud computing offers massive storage, high computation power, and distributed capability to support processing of big data.In such an integrated environment the security and privacy concerns involved in both technologies become combined. This book discusses these security and privacy issues in detail and provides necessary insights into cloud computing and big data integration.It will be useful in enhancing the body of knowledge concerning innovative technologies offered by the research community in the area of cloud computing and big data.Readers can get a better understanding of the basics of cloud computing, big data, and security mitigation techniques to deal with current challenges as well as future research opportunities.
Price: 77.99 £ | Shipping*: 0.00 £
-
What does a timing diagram for preamble and payload data look like in digital technology?
In digital technology, a timing diagram for preamble and payload data typically shows the timing relationship between the preamble and the payload data. The preamble is a sequence of known bits that helps the receiver synchronize with the transmitter and establish a communication link. In the timing diagram, the preamble will be shown as a series of pulses or bits occurring at specific time intervals, followed by the payload data which contains the actual information being transmitted. The timing diagram will illustrate how the preamble and payload data are synchronized and transmitted within the digital communication system.
-
What is data protection and security?
Data protection and security refer to the measures and practices put in place to safeguard data from unauthorized access, use, or disclosure. This includes protecting data from cyber threats such as hacking, malware, and phishing attacks, as well as ensuring compliance with privacy regulations and laws. Data protection and security also involve implementing encryption, access controls, and regular data backups to prevent data loss and maintain the integrity of sensitive information. Overall, data protection and security are essential for maintaining the confidentiality, integrity, and availability of data.
-
What is the question about data protection and data security?
The question about data protection and data security revolves around how organizations can safeguard sensitive information from unauthorized access, breaches, and cyber threats. It also involves ensuring compliance with data protection regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Additionally, the question may address best practices for data encryption, access controls, regular security audits, and incident response plans to mitigate risks and protect data integrity.
-
What is the difference between data protection and data security?
Data protection refers to the policies and procedures put in place to ensure that personal data is handled in compliance with privacy laws and regulations. This includes obtaining consent for data collection, limiting access to personal information, and ensuring data is accurate and up to date. On the other hand, data security focuses on protecting data from unauthorized access, use, or destruction. This includes measures such as encryption, firewalls, and access controls to prevent data breaches and cyber attacks. In summary, data protection is about the legal and ethical handling of personal data, while data security is about the technical measures used to protect that data from unauthorized access or misuse.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.