Browse Results

Showing 1 through 25 of 53,255 results

Zwinna analiza danych. Apache Hadoop dla ka?dego

by Russell Jurney

Du?e zbiory danych dla ka?dego! W dobie Big Data klasyczne podej?cie do analizy danych nie przynosi ju? po??danych wyników. Skuteczna analiza gigantycznych zbiorów informacji, wyci?ganie interesuj?cych wniosków i prezentowanie ich w przejrzystej formie u?ytkownikowi wymagaj? mnóstwa czasu i ?rodków. Zastanawiasz si?, jak podej?? do tego problemu, by zminimalizowa? ryzyko niepowodzenia? Na to i wiele innych pyta? odpowiada ta fantastyczna ksi??ka.Dzi?ki niej dowiesz si?, jak zaprz?c platform? Hadoop do w?asnych celów. Skorzystasz z prostych narz?dzi, takich jak j?zyk Python, biblioteka D3.js oraz Apache Pig, i zastosujesz zwinne podej?cie do problemu, by osi?gn?? zaskakuj?ce efekty. Ponadto przekonasz si?, jak ?atwo mo?na publikowa? dane w MongoDB, stosowa? wyszukiwark? ElasticSearch oraz wykorzysta? potencja? chmur obliczeniowych. Nauczysz si? tak?e wizualizowa? dane na wykresach, prognozowa? oraz podejmowa? w?a?ciwe dzia?ania. Ksi??ka ta jest doskona?? lektur? dla wszystkich osób stoj?cych przed problemem skutecznej pracy z ogromnymi zbiorami danych.Dzi?ki tej ksi??ce: poznasz najlepsze narz?dzia do przetwarzania zbiorów danych wykorzystasz mo?liwo?ci j?zyka Python sprawdzisz mo?liwo?ci chmur obliczeniowych b?yskawicznie wyszukasz dane za pomoc? ElasticSearch zwizualizujesz dane z u?yciem D3.jsZwinnie rozwi?? problemy z du?ymi zbiorami danych!„Przy tak du?ej popularno?ci zagadnie? Big Data i Data Science, lektura praktycznego instrukta?u budowy aplikacji analitycznych jest mocno od?wie?aj?ca. Russel Jurney wprowadza nas, ma?ymi porcjami implementacji, w swoj? filozofi? zwinno?ci w dziedzinie analizy i aplikacyjnego wykorzystywania danych.”Mat Kelcey, matpalm.com

Zum Frühstück gibt's Apps: Mehr Durchblick in der digitalen Welt

by Gerald Lembke Ingo Leipner

Warum wir schon beim Frühstück Apps anstarren … Smartphone und Smart Home: Technik schaltet immer mehr unser Denken ab, weil wir ein bequemes Leben voller Spaß vorziehen. Dafür zahlen wir einen hohen Preis: Verlernen wir durch Lernprogramme das Lernen? Manipuliert uns Facebook, indem es unserer Eitelkeit schmeichelt? Gibt es Schutz vor Shitstorms und Cybermobbing? Wird Technik zum Heilsversprechen? Und das bereits beim Frühstück? Genau diese unbequemen Fragen stellt Zum Frühstück gibt´s Apps, um mehr Durchblick in der digitalen Welt zu schaffen. Das Buch liefert praktische Tipps, wie Sie digitale Medien bewusst einsetzen. Geschichten aus dem Alltag illustrieren, wo Fallen im Netz lauern und wie Sie ihnen ausweichen. So schaffen Sie Raum für echte Kommunikation zwischen Menschen – und landen nicht in jeder Marketingfalle der IT-Industrie. Handfeste Informationen in unterhaltsamer Form: Zum Frühstück gibt´s Apps schärft den Blick! Humorvoll, mit analytischer Tiefe!

Zum Frühstück gibt's Apps: Der tägliche Kampf mit der Digitalen Ambivalenz

by Gerald Lembke Ingo Leipner

Wie wir in der neuen digitalen Welt die Orientierung verlieren – und wiedergewinnen Smartphone, Smart Home, Social Media: Das Internet ist allgegenwärtig und voller Verheißungen – intelligente Kommunikation, höchste Bequemlichkeit, unendlicher Spaß. Doch gleichzeitig wächst das Gefühl: Wir werden immer mehr zu Sklaven unserer Handys, Tablets und PCs, die gierig unsere Zeit verschlingen. Beginnen wir die reale Welt aus den Augen zu verlieren? Wir pendeln zwischen Oberflächlichkeit und Tiefe, zwischen Freiheit und Versklavung, zwischen Lust und Frust. Wohin der Blick am Bildschirm schweift – wir begegnen täglich der Digitalen Ambivalenz: Informationen überall und jederzeit, Freundschaften rund um den Globus, laufend spannende Ideen, die Wirtschaft und Gesellschaft auf den Kopf stellen – welch ein Segen!E-Mail-Terror, Smartphones im Dauereinsatz, Geheimdienste und Konzerne, die alle Daten absaugen – welch ein Fluch! Gewinnen Sie Ihre Orientierung im digitalen Dschungel zurück! Dieses Buch liefert praktische Tipps, wie Sie die neuen Medien bewusster einsetzen. So nutzen Sie die Digitalität, um Ziele und Ideen in der realen Welt zu verwirklichen. Geschichten aus dem Alltag illustrieren, wo Fallen im Netz lauern – und wie Sie ihnen ausweichen. So schaffen Sie sogar mehr Freiraum für „echte“ Kommunikation. Handfeste Informationen in unterhaltsamer Form: Zum Frühstück gibt´s Apps ist der Kompass für die neue digitale Welt. -----E-Mail-Fluten, Handy-Wahn, Shopping-Glück und Basisdemokratie im Netz – so vielfältig die digitale Welt ist, so facettenreich sind auch die Themen in Zum Frühstück gibt´s Apps. Die 18 Kapitel sind ein spannender Streifzug durch unseren Alltag, den Smartphone und Co. immer mehr beherrschen. Der rote Faden ist die Frage nach der Digitalen Ambivalenz. Was bringt die „schöne neue Welt“? Segen oder Fluch? Gewinn oder Verlust? Aufbruch oder Absturz? Mit diesen Fragen im Gepäck reisen die Autoren durch digitale Landschaften: Sie überlegen, wie viel Multitasking eine Hausarbeit an der Uni verträgt, ob die digitale Transformation in Unternehmen zu mehr Demokratie führt oder warum 3-Jährige auch gut ohne Tablets spielen können. Verlernen wir durch IT im Unterricht das Lernen? Schmeichelt Facebook nur der eigenen Eitelkeit? Wie schützen wir uns vor Shitstorms und Cybermobbing? Wer in der Digitalen Ambivalenz Orientierung finden will, dem bietet dieses Buch: Geschichten aus dem digitalen Alltag, die uns über die eigene Naivität schmunzeln lassen.Quergedachtes zu den Verführungen der IT-Industrie, die allzu oft das Blaue vom Himmel verspricht.Sofort umsetzbare Tipps, die für Beruf und Familie Wege im digitalen Dschungel aufzeigen. Zum Frühstück gibt´s Apps ist ein Appell zum bewussten Handeln in der digitalen Welt. Ein Buch, das die Widersprüche des Daten-Zeitalters aufzeigt! Humorvoll und mit analytischer Tiefe!

Zucked: Waking Up to the Facebook Catastrophe

by Roger McNamee

The story of how a noted tech venture capitalist, an early mentor to Mark Zuckerberg and investor in his company, woke up to the serious damage Facebook was doing to our society and set out to try to stop it. <P><P>If you had told Roger McNamee even three years ago that he would soon be devoting himself to stopping Facebook from destroying our democracy, he would have howled with laughter. He had mentored many tech leaders in his illustrious career as an investor, but few things had made him prouder, or been better for his fund's bottom line, than his early service to Mark Zuckerberg. Still a large shareholder in Facebook, he had every good reason to stay on the bright side. Until he simply couldn't. <P><P>ZUCKED is McNamee's intimate reckoning with the catastrophic failure of the head of one of the world's most powerful companies to face up to the damage he is doing. It's a story that begins with a series of rude awakenings. First there is the author's dawning realization that the platform is being manipulated by some very bad actors. <P><P>Then there is the even more unsettling realization that Zuckerberg and Sheryl Sandberg are unable or unwilling to share his concerns, polite as they may be to his face. And then comes the election of Donald Trump, and the emergence of one horrific piece of news after another about the malign ends to which the Facebook platform has been put. To McNamee's shock, even still Facebook's leaders duck and dissemble, viewing the matter as a public relations problem. Now thoroughly alienated, McNamee digs into the issue, and fortuitously meets up with some fellow travelers who share his concern, and help him sharpen its focus. <P><P>Soon he and a dream team of Silicon Valley technologists are charging into the fray, to raise consciousness about the existential threat of Facebook, and the persuasion architecture of the attention economy more broadly -- to our public health and to our political order. Zucked is both an enthralling personal narrative and a masterful explication of the forces that have conspired to place us all on the horns of this dilemma. <P><P>This is the story of a company and its leadership, but it's also a larger tale of a business sector unmoored from normal constraints, just at a moment of political and cultural crisis, the worst possible time to be given new tools for summoning the darker angels of our nature and whipping them into a frenzy. <P><P>Like Jimmy Stewart in Rear Window, Roger McNamee happened to be in the right place to witness a crime, and it took him some time to make sense of what he was seeing and what we ought to do about it. The result of that effort is a wise, hard-hitting, and urgently necessary account that crystallizes the issue definitively for the rest of us. <P><b>A New York Times Bestseller</b>

Zscaler Cloud Security Essentials: Discover how to securely embrace cloud efficiency, intelligence, and agility with Zscaler

by Ravi Devarasetty

Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end usersKey FeaturesGet up to speed with Zscaler without the need for expensive trainingImplement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deploymentsFind out how to choose the right options and features to architect a customized solution with ZscalerBook DescriptionMany organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications. You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise. By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. What you will learnUnderstand the need for Zscaler in the modern enterpriseStudy the fundamental architecture of the Zscaler cloudGet to grips with the essential features of ZIA and ZPAFind out how to architect a Zscaler solutionDiscover best practices for deploying and implementing Zscaler solutionsFamiliarize yourself with the tasks involved in the operational maintenance of the Zscaler solutionWho this book is forThis book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.

Zoom für Dummies (Für Dummies)

by Phil Simon

Sie wollen oder müssen Zoom zur Kommunikation nutzen? Egal ob privat oder geschäftlich, es gibt viele Funktionen, Einstellungen und Tipps, die Ihnen das Leben leichter machen. Phil Simon erklärt Ihnen in diesem Buch alles, was Sie über Chat, Videokonferenzen und das Einbinden von Apps wissen müssen. Egal ob das Erstellen von Einladungen, das Aufzeichnen von Konferenzen oder die Nutzung von Zoom Phones, alles wird ausführlich und leicht verständlich anhand von Screenshots erklärt. So nutzen Sie Zoom entspannt und effizient.

Zoom For Dummies

by Phil Simon

Unlock the full potential of Zoom with this straightforward resource Zoom For Dummies shows readers how to stay connected to their friends, family, colleagues, and peers with this explosively popular communication platform. Written by business professional Phil Simon, Zoom For Dummies allows you to take full advantage of Zoom’s multi-faceted feature set, including: The "Meetings" feature Webinar capabilities Instant messaging functionality Zoom’s “Channel” features Zoom For Dummies goes beyond video conferencing and unlocks the full power of this service. You’ll be able to connect with people around the globe, record and replay video, share your screen with others, and use Zoom on your desktop, laptop, tablet, and mobile device. The book shows you how to follow best practices when it comes to Zoom’s enhanced security features, as well as how to keep Zoom up to date. Written in the friendly style the For Dummies series is famous for, Zoom For Dummies is perfect for anyone who uses Zoom for school, work, business, or personal reasons.

ZooKeeper: Distributed Process Coordination

by Flavio Junqueira Benjamin Reed

Building distributed applications is difficult enough without having to coordinate the actions that make them work. This practical guide shows how Apache ZooKeeper helps you manage distributed systems, so you can focus mainly on application logic. Even with ZooKeeper, implementing coordination tasks is not trivial, but this book provides good practices to give you a head start, and points out caveats that developers and administrators alike need to watch for along the way. In three separate sections, ZooKeeper contributors Flavio Junqueira and Benjamin Reed introduce the principles of distributed systems, provide ZooKeeper programming techniques, and include the information you need to administer this server. Learn how ZooKeeper solves common coordination tasks Explore the ZooKeeper API's Java and C implementations and how they differ Use methods to track and react to ZooKeeper state changes Handle failures of the network, application processes, and ZooKeeper itself Learn about ZooKeeper's trickier aspects dealing with concurrency, ordering, and configuration Use the Curator high-level interface for connection management Become familiar with ZooKeeper internals and administration tools

Zombies Attack!: The Rise of the Warlords Book One: An Unofficial Interactive Minecrafter's Adventure (Rise of the Warlords #1)

by Mark Cheverton

The Far Lands is a hidden area located at the very edge of Minecraft’s outer borders, unknown to normal users. There, the life of a young boy named Watcher is suddenly turned upside down when his village is destroyed by the vile zombie warlord Tu-Kar. Watcher and a handful of his friends vow to save those who were captured during the devastating battle and bring the zombie leader to justice. But along the way, they’ll uncover a terrifying secret about the monsters in the Far Lands, one that could change Minecraft forever.The Rise of the Warlords series is an interactive Minecraft adventure like never before, giving fans the option to play along in Minecraft as they read on custom Far Lands worlds exclusively designed by bestselling author Mark Cheverton.

Zombies Ate My Homework: An Unofficial Graphic Novel for Minecrafters (Redstone Junior High #1)

by Cara J. Stevens Fred Borcherdt

This story kicks off a new full-color series of unofficial graphic novels for Minecrafters! When quiet farm girl Pixel receives an acceptance letter from the prestigious academy for gifted students, Redstone Junior High, she is thrilled! And she works up the courage to leave her family and her beloved farm animals to become a Redstone student. The school prides itself on its safety record as much as its academics -- Mob-free for more than 100 years! boasts a sign on campus.Little does Pixel know that the school's long history of safety is about to take an unsettling turn. When zombies begin popping up on campus, the students begin to panic. Pixel, with the help of her new best friends, is the only one who can figure out why the zombies are invading -- but can she do it before the school becomes a battlefield?The adventure that unfolds will test Pixel's courage, reveal a unique and precious gift that she never knew she had, and change how she treats hostile mobs forever. <P><P> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. Benetech is actively working on projects to improve accessibility issues such as these.</i>

Zombie Wars: An Unofficial Graphic Novel for Minecrafters (Unofficial Battle Station Prime Series #5)

by Cara J. Stevens

Attention, Minecraft fans! Take a wild trip into the game you love with a new graphic novel from Cara J. Stevens. Over 700 color illustrations! The kids of Battle Station Prime continue to fight against the unknown villain who has been sending armies of skeletons, but Brooklyn&’s recent invention of an automatic Zombie spawner could change the face of this unending battle. With the zombies on their side, they just might have a chance to uncover the truth about the enemies of the Prime Knight and save their homes. As daily battles of skeletons against zombies are becoming routine, the kids are beginning to think about their place at the battle station and their true purpose. While some choose to return home to fight with their families on different battlefronts, others redouble their efforts to protect the station. Will Pell and Logan&’s lifelong friendship survive this test? Has Zoe&’s recent run-in with Herobrine&’s ghost changed her forever? Who will win the ultimate cook-off battle between Ned and the kids&’ ultimate automatic food machine? Learn all the answers and more in Book 5: The Zombie Wars!

Zoho One Essentials: Mastering Zoho CRM

by Karen S. Fredricks

Reap the competitive benefits of Zoho, one of the best customer relationship management (CRM) solutions on the market today.Learn How To:>Store complete contact information, including name, company, phone numbers, mailing addresses, and e-mail addresses.>Record dated notes for each of your contacts so that you can easily keep track of meaningful conversations and activities. This feature is handy for those of us who forget things on occasion.>Keep a calendar that is cross-referenced with the appropriate contact so that you have a complete record of all interactions that you’ve had—or will have—with a contact.>Access reports and dashboards so that you can glean insight into your business based on the information in your database.>Merge your contact information into templates you create for marketing campaigns and other purposes. You can send those merged documents via snail mail, fax, or e-mail.>Manage your sales pipeline with built-in forecasting tools.What Is Customer Relationship Management (CRM)?CRM stands for customer relationship management and typically refers to software, like Zoho, that helps you manage your customer relationships. From a sales perspective, it means things like inputting and tracking leads, checking up on those leads, converting leads to contacts, and ultimately to deals. From a management perspective, you can track the progress of your sales team, create and run reports, and gather insights into your sale cycles and forecasts. Simply stated, the goal of a capable CRM product, such as Zoho, is to run your business efficiently, effectively and to increase profitability.Contents:What in the World is Zoho?Working with Contact RecordsWorking with Contact RecordsFind And Change RecordsStay in TouchHave it Your Way (set up the system)Managing UsersE-mail BlastsPipelines and DealsManaging ProductsProjectsCasesReports and DashboardsHacks and ShortcutsAbout the Author:A full-time consultant and trainer since the 1980s, Karen Fredricks is the author of thirteen books on CRM and Contact Management Software, including eleven “For Dummies” titles. Her work includes titles on ACT, Outlook, SugarCRM, Outlook Business Contact Manager, and Microsoft Office Live. She created training videos on Outlook and ACT! for LinkedIn Learning. A true CRM fanatic, she is the Virtual CRM Users Group founder and holds frequent webinars focusing on CRM usage.Karen’s company, Tech Benders, provides consulting, support, and training services for a variety of CRM products. Her focus is on making companies more efficient and productive—and therefore more profitable. She has worked with numerous Fortune 500 companies and other well-known entities, including the PGA, the ATP, FPL, and Volvo of North America.

Zoho For Dummies

by Steven Holzner

A great way to get started on this new, FREE, Web-based productivity and collaboration toolZoho is a very cool-and free-alternative to Microsoft Office. Known as "cloud" computing because it's totally Web-based, Zoho provides 18 different applications to help you write documents, create spreadsheets, send e-mail, and much more. People love it, but what it doesn't offer are extensive help files, so that's where this practical book comes in.Zoho For Dummies shows you how to use Zoho's most widely used applications, including Zoho Writer, Zoho Notebook, Zoho Show, Zoho Sheet, Zoho DB, Zoho Mail, Zoho Planner, Zoho CRM, and Zoho Projects. You'll get thoroughly up to speed on all common tasks and discover enough tips and tricks to get you power-using Zoho in no time.Zoho is a free, Web-based alternative to Microsoft Office launched in 2007; it is considered to be "cloud computing" because it is categorized as Software as a Service (SaaS) and Web-basedThe book guides you through common tasks and provides tips and tricks to maximize your productivity and minimize hassleCovers Zoho Writer, Zoho Notebook, Zoho Show, Zoho Sheet, Zoho DB, Zoho Mail, Zoho Planner, Zoho CRM, and Zoho ProjectsAlso provides information about sharing content, scheduling, and moreGet your head in the clouds with this friendly guide to the exciting new Zoho "cloud" alternative to Microsoft Office.

ZK Developer's Guide

by Jurgen Schumacher Markus Stäuble

ZK is an open-source web development framework that enables web applications to have the rich user experiences and low development costs that desktop applications have had for years. ZK includes an Ajax-based event-driven engine, rich sets of XML User Interface Language (XUL) and XHTML components, and a markup language. The ZK rich client framework takes the so-called server-centric approach: the content synchronization of components and the event pipelining between clients and servers are automatically done by the engine and Ajax plumbing codes are completely transparent to web application developers. Therefore, the end users get rich user interfaces with similar engaged interactivity and responsiveness to that of desktop applications, while for programmers, development remains similar in simplicity to that of desktop applications. This book is a Developer's Guide that steps you through the ZK framework with examples. It starts with installing and configuring ZK and takes you on to integrate it with other frameworks. By the time you are through the book you will be able to build an application on your own.

Zimbra Implement, Administer and Manage

by David Touitou Marty Resnick

This is a compact Administrators Guide. It is friendly, and contains plenty of step-by-step instructions for installation and configuration of Zimbra as well as useful references and checklists. Administrators working with Zimbra on Linux or Mac OS X. Administrators who want to set up Zimbra for use in small/medium businesses.

The Zimbabwean Crisis after Mugabe: Multidisciplinary Perspectives (Routledge Contemporary Africa)

by Tendai Mangena

This book examines the ways in which political discourses of crisis and ‘newness’ are (re)produced, circulated, naturalised, received and contested in Post-Mugabe Zimbabwe. Going beyond the ordinariness of conventional political, human and social science methods, the book offers new and engaging multi-disciplinary approaches that treat discourse and language as important sites to encounter the politics of contested representations of the Zimbabwean crisis in the wake of the 2017 coup. The book centres discourse on new approaches to contestations around the discursive framing of various aspects of the socio-economic and political crisis related to significant political changes in Zimbabwe post-2017. Contributors in this volume, most of whom experienced the complex transition first-hand, examine some of the ways in which language functions as a socio-cultural and political mechanism for creating imaginaries, circulating, defending and contesting conceptions, visions, perceptions and knowledges of the post-Mugabe turn in the Zimbabwean crisis and its management by the "New Dispensation". This book will be of interest to scholars of African studies, postcolonial studies, language/discourse studies, African politics and culture.

Zhang Functions and Various Models

by Yunong Zhang Dongsheng Guo

This book focuses on solving different types of time-varying problems. It presents various Zhang dynamics (ZD) models by defining various Zhang functions (ZFs) in real and complex domains. It then provides theoretical analyses of such ZD models and illustrates their results. It also uses simulations to substantiate their efficacy and show the feasibility of the presented ZD approach (i. e. , different ZFs leading to different ZD models), which is further applied to the repetitive motion planning (RMP) of redundant robots, showing its application potential.

ZeroMQ

by Faruk Akgul

A practical, step-by-step example-rich tutorial.If you are a C developer who wants to learn about ZeroMQ, this book is for you. It is assumed that the reader has C experience at some level but prior ZeroMQ knowledge is not expected.

ZeroMQ: Messaging for Many Applications

by Pieter Hintjens

<p>Discover why ZeroMQ is rapidly becoming the programming framework of choice for exchanging messages between systems. With this practical, fast-paced guide, you&#8217;ll learn how to use this lightweight and highly flexible networking tool for message passing in clusters, the cloud, and other multi-system environments. Created by ZeroMQ maintainer Pieter Hintjens and volunteers from the framework&#8217;s community, this book takes you on a tour of different real-world applications, with extended examples in C.</p>

Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications

by Lin Xiao Lei Jia

Zeroing Neural Networks Describes the theoretical and practical aspects of finite-time ZNN methods for solving an array of computational problems Zeroing Neural Networks (ZNN) have become essential tools for solving discretized sensor-driven time-varying matrix problems in engineering, control theory, and on-chip applications for robots. Building on the original ZNN model, finite-time zeroing neural networks (FTZNN) enable efficient, accurate, and predictive real-time computations. Setting up discretized FTZNN algorithms for different time-varying matrix problems requires distinct steps. Zeroing Neural Networks provides in-depth information on the finite-time convergence of ZNN models in solving computational problems. Divided into eight parts, this comprehensive resource covers modeling methods, theoretical analysis, computer simulations, nonlinear activation functions, and more. Each part focuses on a specific type of time-varying computational problem, such as the application of FTZNN to the Lyapunov equation, linear matrix equation, and matrix inversion. Throughout the book, tables explain the performance of different models, while numerous illustrative examples clarify the advantages of each FTZNN method. In addition, the book: Describes how to design, analyze, and apply FTZNN models for solving computational problems Presents multiple FTZNN models for solving time-varying computational problems Details the noise-tolerance of FTZNN models to maximize the adaptability of FTZNN models to complex environments Includes an introduction, problem description, design scheme, theoretical analysis, illustrative verification, application, and summary in every chapter Zeroing Neural Networks: Finite-time Convergence Design, Analysis and Applications is an essential resource for scientists, researchers, academic lecturers, and postgraduates in the field, as well as a valuable reference for engineers and other practitioners working in neurocomputing and intelligent control.

Zero Trust Security: An Enterprise Guide

by Jason Garbis Jerry W. Chapman

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security—moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. Zero Trust Security uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization‘s journey to Zero Trust. What You Will Learn Understand Zero Trust security principles and why it is critical to adopt themSee the security and operational benefits of Zero TrustMake informed decisions about where, when, and how to apply Zero Trust security architecturesDiscover how the journey to Zero Trust will impact your enterprise and security architectureBe ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organization Who This Book Is ForSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategists

Zero Trust Networks with VMware NSX: Build Highly Secure Network Architectures for Your Data Centers

by Sreejith Keeriyattil

Secure your VMware infrastructure against distrusted networks using VMware NSX. This book shows you why current security firewall architecture cannot protect against new threats to your network and how to build a secure architecture for your data center.Author Sreerjith Keeriyattil teaches you how micro-segmentation can be used to protect east-west traffic. Insight is provided into working with Service Composer and using NSX REST API to automate firewalls. You will analyze flow and security threats to monitor firewalls using VMware Log and see how Packet Flow works with VMware NSX micro-segmentation. The information presented in Zero Trust Networks with VMware NSX allows you to study numerous attack scenarios and strategies to stop these attacks, and know how VMware Air Watch can further improve your architecture.What You Will LearnKnow how micro-segmentation works and its benefitsImplement VMware-distributed firewallsAutomate security policies Integrate IPS/IDS with VMware NSXAnalyze your firewall's configurations, rules, and policiesWho This Book Is ForExperienced VMware administrators and security administrators who have an understanding of data center architecture and operations

Zero Trust Networks: Building Secure Systems in Untrusted Networks

by Doug Barth Evan Gilman

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it.The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.Understand how perimeter-based defenses have evolved to become the broken model we use todayExplore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty)Get example configuration for open source tools that you can use to build a zero trust networkLearn how to migrate from a perimeter-based network to a zero trust network in production

Zero Trust Networks

by Razi Rais Christina Morillo Evan Gilman Doug Barth

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agentsUnderstand how this model embeds security within the system's operation, with guided scenarios at the end of each chapterMigrate from a perimeter-based network to a zero trust network in productionExplore case studies that provide insights into organizations' zero trust journeysLearn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA, DoD, and others

Zero Trust Journey Across the Digital Estate

by Abbas Kudrati Binil A. Pillai

"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that show us that our past approaches, while earnest in their efforts have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, it's history, and to gain prescriptive knowledge that will help you and your business finally begin beating the adversaries in the chess match that is cyber security strategy." Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust. This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance. The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.

Refine Search

Showing 1 through 25 of 53,255 results