Menu

Operating systems (33)

Order by
idioma
5G Wireless Systems
5G Wireless Systems
Yang Yang; Jing...
publisher: Springer
year: 2018
description:This book focuses on key simulation and evaluation technologies for 5G systems. Based on the most recent research results from academia and industry, it describes the evaluation methodologies in depth for network and physical layer technologies. The ...
Become ITIL Foundation Certified in 7 Days
Become ITIL Foundation Certified in 7 Days
Abhinav Krishna...
publisher: Springer
year: 2017
description:Pass the ITIL Foundation examination by learning the basics of ITIL and working through real-life examples. This book breaks the course down for studying in 7 days with 3 hours a day, which means at the end of a week you are ready to pass the exam. Y...
Beschaffung unter Berücksichtigung der IT-Sicherheit
Beschaffung unter Berücksichtigung der IT-Sicherh...
Ernst Piller
publisher: Springer
year: 2017
description:Ernst Piller gibt praktische Hinweise zum Beschaffungsvorgang von IT-sicherer Soft- und Hardware für die eigene Infrastruktur bzw. die Produktion. Dabei beschränkt sich ‚Hardware‘ nicht nur auf IKT-Produkte, sondern impliziert auch alle Geräte, Masch...
Betriebssysteme kompakt
Betriebssysteme kompakt
Christian Baun
publisher: Springer
year: 2017
description:Speicherverwaltung, Hardwareverwaltung, Prozessadministration und Interprozesskommunikation sind zentrale Bereiche von Betriebssystemen. Die Konzepte und Prinzipien, auf denen klassische und moderne Betriebssysteme basieren, erläutert der Autor anhan...
Big Data Management
Big Data Management
Fausto Pedro García...
publisher: Springer
year: 2017
description:This book focuses on the analytic principles of business practice and big data. Specifically, it provides an interface between the main disciplines of engineering/technology and the organizational and administrative aspects of management, serving as ...
Cybersecurity for Hospitals and Healthcare Facilities
Cybersecurity for Hospitals and Healthcare Facili...
Luis Ayala
publisher: Springer
year: 2016
description:Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-gr...
DataFlow Supercomputing Essentials
DataFlow Supercomputing Essentials
Veljko Milutinovic...
publisher: Springer
year: 2017
description:This illuminating text/reference reviews the fundamentals of programming for effective DataFlow computing. The DataFlow paradigm enables considerable increases in speed and reductions in power consumption for supercomputing processes, yet the program...
Docker Management Design Patterns
Docker Management Design Patterns
Deepak Vohra
publisher: Springer
year: 2017
description:Master every aspect of orchestrating/managing Docker including creating a Swarm, creating services, using mounts, scheduling, scaling, resource management, rolling updates, load balancing, high availability, logging and monitoring, using multiple zon...
Essential PowerShell for Office 365
Essential PowerShell for Office 365
Vlad Catrinescu
publisher: Springer
year: 2018
description:Take your Office 365 skills to the next level. Master PowerShell for Office 365 to stay competitive in today’s world of highly sought after cloud management skills. With expert guidance, IT pros will learn how to leverage the muscle of PowerShell to ...
Harley Hahn's Emacs Field Guide
Harley Hahn's Emacs Field Guide
Harley Hahn
publisher: Springer
year: 2016
description:In this book, Harley Hahn demystifies Emacs for programmers, students, and everyday users. The first part of the book carefully creates a context for your work with Emacs. What exactly is Emacs? How does it relate to your personal need to work quickl...
Hesitant Fuzzy Decision Making Methodologies and Applications
Hesitant Fuzzy Decision Making Methodologies and Applications
Huchang Liao; Zeshui...
publisher: Springer
year: 2017
description:This book offers a comprehensive and systematic introduction to the latest research on hesitant fuzzy decision-making theory. It includes six parts: the hesitant fuzzy set and its extensions, novel hesitant fuzzy measures, hesitant fuzzy hybrid weigh...
Implementing DirectAccess with Windows Server 2016
Implementing DirectAccess with Windows Server 2016
Richard M. Hic...
publisher: Springer
year: 2016
description:Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new f...