You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Create, deploy, and manage applications at scale using SRE principles Key FeaturesBuild and run highly available, scalable, and secure softwareExplore abstract SRE in a simplified and streamlined wayEnhance the reliability of cloud environments through SRE enhancementsBook Description Site reliability engineering (SRE) is being touted as the most competent paradigm in establishing and ensuring next-generation high-quality software solutions. This book starts by introducing you to the SRE paradigm and covers the need for highly reliable IT platforms and infrastructures. As you make your way through the next set of chapters, you will learn to develop microservices using Spring Boot and make us...
This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2022. The volume covers topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. This book will emerge as a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners across the globe.
ADVANCES IN FUZZY-BASED INTERNET OF MEDICAL THINGS (IOMT) This book explores the latest trends, transitions, and advancements of the Internet of Medical Things whose integration through cloud-hosted software applications adds required intelligence from tools such as medical instruments, scanners, and appliances, enabling fuzzy logic to help medical professionals establish linguistic concepts in deciding diagnosis and prognosis. The main goal of the book is to strengthen medical professionals and caregivers by providing methods for achieving fuzzy logic-based health diagnosis and medication. The health condition and various physical parameters of humans, such as heartbeat rate, sugar level, b...
The emergence of cloud computing, internet of things, mobile technologies, and social networking have created better-connected members of the public who are digitally linked with each other in real time. Establishing this two-way interaction between citizens and governments has thus become attractive and an expected feature of governments worldwide. Previously, federal and local governments relied on first-generation technologies to provide basic levels of automation and digitization. Now, because of their desire to become more open, transparent, accountable, and connected, newer technologies including cloud computing, mobile networking, big data analytics, Web 2.0, and social media must be ...
This comprehensive text/reference presents a broad-ranging overview of device connectivity in distributed computing environments, supporting the vision of an Internet of Things (IoT). Expert perspectives are provided by an international selection of researchers from both industry and academia, covering issues of communication, security, privacy, interoperability, networking, access control, and authentication. In addition to discussing state-of-the-art research and practice, the book includes corporate analyses offering a balanced view of benefits and limitations, and numerous case studies illustrating the challenges and practical solutions. Topics and features: discusses issues of security ...
This book is a collection of peer-reviewed best selected research papers presented at the First International Conference on Machine Intelligence and Smart Systems 2020 (MISS 2020), organized during September 24–25, 2020, in Gwalior, India. The book presents new advances and research results in the fields of machine intelligence, artificial intelligence and smart systems. It includes main paradigms of machine intelligence algorithms, namely (1) neural networks, (2) evolutionary computation, (3) swarm intelligence, (4) fuzzy systems and (5) immunological computation.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis for cooper
Green Technologies: Concepts, Methodologies, Tools and Applications assembles the most up-to-date collection of research results and recent discoveries in environmental and green technology. This comprehensive anthology covers a wide range of topics, i