Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Advances in Computing Systems and Applications
  • Language: en
  • Pages: 334

Advances in Computing Systems and Applications

  • Type: Book
  • -
  • Published: 2018-08-09
  • -
  • Publisher: Springer

This book gathers selected papers presented at the 3rd Conference on Computing Systems and Applications (CSA’2018), held at the Ecole Militaire Polytechnique, Algiers, Algeria on April 24–25, 2018. The CSA’2018 constitutes a leading forum for exchanging, discussing and leveraging modern computer systems technology in such varied fields as: data science, computer networks and security, information systems and software engineering, and computer vision. The contributions presented here will help promote and advance the adoption of computer science technologies in industrial, entertainment, social, and everyday applications. Though primarily intended for students, researchers, engineers and practitioners working in the field, it will also benefit a wider audience interested in the latest developments in the computer sciences.

Advances in Computing Systems and Applications
  • Language: en
  • Pages: 373

Advances in Computing Systems and Applications

This proceedings book gathers selected papers presented at the 4th Conference on Computing Systems and Applications (CSA2020) held on December 14, 2020, at the Ecole Militaire Polytechnique, Algiers, Algeria. The proceedings provide a collection of new ideas, original research findings, and experimental results in the field of computer science covering: artificial intelligence, data science, computer networks and security, information systems, software engineering, and computer graphics. The proceedings are a valuable reference work for students, researchers, academics, and industry practitioners interested in the latest scientific and technological advances across the conference topics. Benefits: • Explores the latest research trends and their applications in a broad range of computer science disciplines • Presents a collection of contributions in emerging topics in computer science and information technology • Covers artificial intelligence, data science, computer networks and security, information systems, software engineering, and computer graphics

Electrical, Control Engineering and Computer Science
  • Language: en
  • Pages: 210

Electrical, Control Engineering and Computer Science

  • Type: Book
  • -
  • Published: 2015-12-30
  • -
  • Publisher: CRC Press

Electrical, Control Engineering and Computer Science includes the papers from ECECS2015 (Hong Kong, 30-31 May 2015), which was organized by the American Society of Science and Engineering (ASEE), a non-profit society for engineers and scientists. Presenting new theories, ideas, techniques and experiences related to all aspects of electrical enginee

Virtualization and Forensics
  • Language: en
  • Pages: 272

Virtualization and Forensics

  • Type: Book
  • -
  • Published: 2010-08-06
  • -
  • Publisher: Syngress

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the...

Demystifying Embedded Systems Middleware
  • Language: en
  • Pages: 409

Demystifying Embedded Systems Middleware

  • Type: Book
  • -
  • Published: 2010-11-04
  • -
  • Publisher: Elsevier

This practical technical guide to embedded middleware implementation offers a coherent framework that guides readers through all the key concepts necessary to gain an understanding of this broad topic. Big picture theoretical discussion is integrated with down-to-earth advice on successful real-world use via step-by-step examples of each type of middleware implementation. Technically detailed case studies bring it all together, by providing insight into typical engineering situations readers are likely to encounter. Expert author Tammy Noergaard keeps explanations as simple and readable as possible, eschewing jargon and carefully defining acronyms. The start of each chapter includes a "setti...

Deploying Wireless Sensor Networks
  • Language: en
  • Pages: 160

Deploying Wireless Sensor Networks

  • Type: Book
  • -
  • Published: 2016-04-07
  • -
  • Publisher: Elsevier

Wireless Sensor Networks: Theory and Practice for Deployment addresses WSNs deployment, a mandatory and critical step in the process of developing WSNs solutions for real-life applications. The authors address simple approaches to deploy static WSNs, then exploring more sophisticated approaches to deploy mobile WSNs. Featuring detailed investigations of deployment-related issues such as deployment cost, coverage, connectivity, sensors reliability, and harsh deployment environments, this book will equip you with the basics and an advanced view of both the theoretical and practical aspects, along with knowledge of the guidelines for WSNs deployment. Provides both the theoretical basis and practical applications Features an in-depth discussion of deployment-related issues Covers basic concepts and terminologies as well as highlighting open problems in the research areas to help you solve your deployment-related issues

UTM Security with Fortinet
  • Language: en
  • Pages: 452

UTM Security with Fortinet

  • Type: Book
  • -
  • Published: 2012-12-31
  • -
  • Publisher: Newnes

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area

Journal officiel de la République tunisienne
  • Language: fr
  • Pages: 800

Journal officiel de la République tunisienne

  • Type: Book
  • -
  • Published: 2012-03
  • -
  • Publisher: Unknown

None

Transactional Information Systems
  • Language: en
  • Pages: 881

Transactional Information Systems

This book describes the theory, algorithms, and practical implementation techniques behind transaction processing in information technology systems.

Network Function Virtualization
  • Language: en
  • Pages: 270

Network Function Virtualization

Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an ...