Search Results - "virtual machine"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Computer security 3
- Java (Computer program language) 3
- Cloud computing 2
- Computer networks 2
- Security measures 2
- Software patterns 2
- Uml (Computer science) 2
- Assembler language (computer program language) 1
- Big data 1
- C++ (computer program language) 1
- Certification 1
- Computer architecture 1
- Computer crimes 1
- Computer network architectures 1
- Computer organization 1
- Data protection 1
- Electronic data processing personnel 1
- Electronic evidence 1
- Examinations 1
- Hackers 1
- Information networks 1
- Information storage and retrieval systems 1
- Penetration testing (Computer security) 1
- Virtual computer systems 1
- investigation 1
-
1
-
2
-
3
-
4
Invitation to computer science Java version
Published 2007Table of Contents: “…An introduction to computer science -- Level 1: The algorithmic foundations of computer science -- Algorithm discovery and design -- The efficiency of algorithms -- Level 2: The hardware world -- The building blocks: binary numbers, Boolean logic, and gates -- Computer systems organization -- Level 3: The virtual machine -- An introduction to system software and virtual machines -- Computer networks, the Internet, and the World Wide Web -- Level 4: The software world -- Introduction to high-level language programming -- The Tower of Babel -- Compilers and language translation -- Models of computation -- Level 5: Applications -- Simulation and modeling -- Electronic commerce and information security -- Artificial intelligence -- Level 6: Social issues in computing -- Making decisions about computers, information, and society…”
Book -
5
Invitation to computer science
Published 2016Table of Contents: “…Computer Systems Organization. Level III: The Virtual Machine -- 6. An Introduction to System Software and Virtual Machines -- 7. …”
Book -
6
Guide to Computer Forensics and Investigations
Published 2016Table of Contents: “…Understanding the digital forensics profession and investigations --The investigator's office and laboratory --Data acquisition --Processing crime and incident scenes --Working with Windows and CLI systems --Current digital forensics tools --Linux and Macintosh file systems --Recovering graphics files --Digital forensics analysis and validation --Virtual machine forensics, live acquisitions, and network forensics --E-mail and social media investigations --Mobile device forensics --Cloud forensics --Report writing for high-tech investigations --Expert testimony in digital investigations -- Ethics for the expert witness…”
Book -
7
GSEC GIAC security essentials certification exam guide
Table of Contents: “…Risk Management -- Ch 10. Virtual Machines -- Ch 11. Vulnerability Control -- Ch 12. …”
Book -
8
Anti-hacker tool kit
Published 2014Table of Contents: “…Command-Line Environments -- 3. Virtual Machines and Emulators -- pt. II. Systems -- 4. …”
Book -
9
-
10
-
11
Developing interoperable and federated cloud architecture /cGabor Kecskemeti, Attila Kertes, and Zsolt Nemeth, editors
Published 2016Table of Contents: “…Chandrasekaran -- Characterizing PaaS solutions enabling cloud federations / Tamas Pflanzner [and 3 others] -- Highly available fault-tolerant cloud database services / Chetan Jaiswal, Vijay Kumar -- Distributed multi-cloud based building data analytics / Ioan Petri [and 7 others] -- Decentralised repositories for transparent and efficient virtual machine operations: architecture of the ENTICE project / Simon Ostermann [and 5 others] -- EUBrazilCC federated cloud: a transatlantic multi-cloud infrastructure / José Luis Vivas [and 14 others] -- Federated IaaS resource brokerage / Bruno Veloso [and 3 others] -- GPGPU as a service: providing GPU-acceleration services to federated cloud systems / Javier Prades [and 3 others] -- Volunteer clouds: from volunteer computing to interconnected infrastructures / Attila Csaba Marosi, Péter Kacsuk…”
Book -
12
Handbook of research on end-to-end cloud computing architecture design
Published 2017Table of Contents: “…Enterprise mobility reference architecture: mobility services overview / Laura Richardson, Sougata Mukherjea -- Navigating your way to the hybrid cloud / John Easton, Rashik Parmar -- Community cloud: closing the gap between public and private / Karolina Marzantowicz, Łukasz Paciorkowski -- Cloud computing architectural patterns / Prashant Jain, Yan Pang -- Industrial patterns on cloud / Sreekrishnan Venkateswaran -- Cloud build methodology / Richard Ehrhardt -- Virtual machine placement in IaaS cloud / Prateek Khandelwal, Gaurav Somani -- Security and compliance: IaaS, PaaS, and hybrid cloud / Heather Hinton -- Cloud computing data storage security based on different encryption schemes / Hicham Hamidine, Ausif Mahmood -- Multi-aspect DDOS detection system for securing cloud network / Pourya Shamsolmoali, Masoumeh Zareapoor, M.Afshar Alam -- Transition and transformation into a cloud environment / Clea Zolotow [and 6 others] -- Workload migration to Cloud / Choong Thio, Jim Cook -- Establishing governance for hybrid cloud and the internet of things / Martin Wolfe -- Design and implementation of service management in devops enabled cloud computing models / Shelbee Eigenbrode, Suheil Nassar -- Enterprise IT transformation using cloud service broker / Rajesh Jaluka -- Risk and governance considerations in cloud era / Mohammad Ali Shalan -- A survey and taxonomy of energy efficient resource management techniques in platform as a service cloud / Sareh Fotuhi Piraghaj [and 3 others] -- Cost of using cloud computing: HaaS vs. …”
Book -
13
Networking for big data
Published 2016Table of Contents: “…Introduction of Big Data -- Chapter 1: Orchestrating Science DMZs for Big Data Acceleration: Challenges and Approaches -- Chapter 2: A Survey of Virtual Machine Placement in Cloud Computing for Big Data -- Chapter 3: Big Data Management Challenges, Approaches, Tools, and Their Limitations -- Chapter 4: Big Data Distributed Systems Management; II: Networking Theory and Design for Big Data -- Chapter 5: Moving Big Data to the Cloud: Online Cost-Minimizing Algorithms -- Chapter 6: Data Process and Analysis Technologies of Big Data-- Chapter 7: Network Configuration and Flow Scheduling for Big Data Applications -- Chapter 8: Speedup of Big Data Transfer on the Internet -- Chapter 9: Energy-Aware Survivable Routing in Ever-Escalating Data Environments; III: Networking Security for Big Data -- Chapter 10: A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trend-- Chapter 11: Toward MapReduce-Based Machine-Learning Techniques for Processing Massive Network Threat Monitoring -- Chapter 12: Anonymous Communication for Big Data -- Chapter 13: Flow-Based Anomaly Detection in Big Data IV: Platforms and Systems for Big Data Applications -- Chapter 14: Mining Social Media with SDN-Enabled Big Data Platform to Transform TV Watching Experience -- Chapter 15: Trends in Cloud Infrastructures for Big Data -- Chapter 16: A User Data Profile-Aware Policy-Based Network Management Framework in the Era of Big Data -- Chapter 17: Circuit Emulation for Big Data Transfers in Clouds…”
Book -
14


