Search Results - "virtual machine"

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Principles of computer organization and assembly language using the Java virtual machine by Juola, Patrick

    Published 2007
    Book
  2. 2

    Patterns in java by Grand, Mark

    Published 1999
    Book
  3. 3

    Patterns in Java a catalog of reusable design patterns illustrated with UML by Grand, Mark

    Published 1998
    Book
  4. 4

    Invitation to computer science Java version by Schneider, G. Michael

    Published 2007
    Table of Contents: “…An introduction to computer science -- Level 1: The algorithmic foundations of computer science -- Algorithm discovery and design -- The efficiency of algorithms -- Level 2: The hardware world -- The building blocks: binary numbers, Boolean logic, and gates -- Computer systems organization -- Level 3: The virtual machine -- An introduction to system software and virtual machines -- Computer networks, the Internet, and the World Wide Web -- Level 4: The software world -- Introduction to high-level language programming -- The Tower of Babel -- Compilers and language translation -- Models of computation -- Level 5: Applications -- Simulation and modeling -- Electronic commerce and information security -- Artificial intelligence -- Level 6: Social issues in computing -- Making decisions about computers, information, and society…”
    Book
  5. 5

    Invitation to computer science by Schneider, G. Michael, Gersting, Judith L.

    Published 2016
    Table of Contents: “…Computer Systems Organization. Level III: The Virtual Machine -- 6. An Introduction to System Software and Virtual Machines -- 7. …”
    Book
  6. 6

    Guide to Computer Forensics and Investigations by Nelson, Bill, Phillips, Amelia, Steuart, Christopher

    Published 2016
    Table of Contents: “…Understanding the digital forensics profession and investigations --The investigator's office and laboratory --Data acquisition --Processing crime and incident scenes --Working with Windows and CLI systems --Current digital forensics tools --Linux and Macintosh file systems --Recovering graphics files --Digital forensics analysis and validation --Virtual machine forensics, live acquisitions, and network forensics --E-mail and social media investigations --Mobile device forensics --Cloud forensics --Report writing for high-tech investigations --Expert testimony in digital investigations -- Ethics for the expert witness…”
    Book
  7. 7

    GSEC GIAC security essentials certification exam guide by Messier, Ric

    Table of Contents: “…Risk Management -- Ch 10. Virtual Machines -- Ch 11. Vulnerability Control -- Ch 12. …”
    Book
  8. 8

    Anti-hacker tool kit by Shema, Mike

    Published 2014
    Table of Contents: “…Command-Line Environments -- 3. Virtual Machines and Emulators -- pt. II. Systems -- 4. …”
    Book
  9. 9

    Invitation to computer science C++ version by Schneider, G. Michael

    Published 2004
    Book
  10. 10

    Hands-on ethical hacking and network defense by Simpson, Michael T. 1954-, Antill, Nicholas D., Wilson, Robert S.

    Published 2021
    Book
  11. 11

    Developing interoperable and federated cloud architecture /œcGabor Kecskemeti, Attila Kertes, and Zsolt Nemeth, editors

    Published 2016
    Table of Contents: “…Chandrasekaran -- Characterizing PaaS solutions enabling cloud federations / Tamas Pflanzner [and 3 others] -- Highly available fault-tolerant cloud database services / Chetan Jaiswal, Vijay Kumar -- Distributed multi-cloud based building data analytics / Ioan Petri [and 7 others] -- Decentralised repositories for transparent and efficient virtual machine operations: architecture of the ENTICE project / Simon Ostermann [and 5 others] -- EUBrazilCC federated cloud: a transatlantic multi-cloud infrastructure / José Luis Vivas [and 14 others] -- Federated IaaS resource brokerage / Bruno Veloso [and 3 others] -- GPGPU as a service: providing GPU-acceleration services to federated cloud systems / Javier Prades [and 3 others] -- Volunteer clouds: from volunteer computing to interconnected infrastructures / Attila Csaba Marosi, Péter Kacsuk…”
    Book
  12. 12

    Handbook of research on end-to-end cloud computing architecture design

    Published 2017
    Table of Contents: “…Enterprise mobility reference architecture: mobility services overview / Laura Richardson, Sougata Mukherjea -- Navigating your way to the hybrid cloud / John Easton, Rashik Parmar -- Community cloud: closing the gap between public and private / Karolina Marzantowicz, Łukasz Paciorkowski -- Cloud computing architectural patterns / Prashant Jain, Yan Pang -- Industrial patterns on cloud / Sreekrishnan Venkateswaran -- Cloud build methodology / Richard Ehrhardt -- Virtual machine placement in IaaS cloud / Prateek Khandelwal, Gaurav Somani -- Security and compliance: IaaS, PaaS, and hybrid cloud / Heather Hinton -- Cloud computing data storage security based on different encryption schemes / Hicham Hamidine, Ausif Mahmood -- Multi-aspect DDOS detection system for securing cloud network / Pourya Shamsolmoali, Masoumeh Zareapoor, M.Afshar Alam -- Transition and transformation into a cloud environment / Clea Zolotow [and 6 others] -- Workload migration to Cloud / Choong Thio, Jim Cook -- Establishing governance for hybrid cloud and the internet of things / Martin Wolfe -- Design and implementation of service management in devops enabled cloud computing models / Shelbee Eigenbrode, Suheil Nassar -- Enterprise IT transformation using cloud service broker / Rajesh Jaluka -- Risk and governance considerations in cloud era / Mohammad Ali Shalan -- A survey and taxonomy of energy efficient resource management techniques in platform as a service cloud / Sareh Fotuhi Piraghaj [and 3 others] -- Cost of using cloud computing: HaaS vs. …”
    Book
  13. 13

    Networking for big data

    Published 2016
    Table of Contents: “…Introduction of Big Data -- Chapter 1: Orchestrating Science DMZs for Big Data Acceleration: Challenges and Approaches -- Chapter 2: A Survey of Virtual Machine Placement in Cloud Computing for Big Data -- Chapter 3: Big Data Management Challenges, Approaches, Tools, and Their Limitations -- Chapter 4: Big Data Distributed Systems Management; II: Networking Theory and Design for Big Data -- Chapter 5: Moving Big Data to the Cloud: Online Cost-Minimizing Algorithms -- Chapter 6: Data Process and Analysis Technologies of Big Data-- Chapter 7: Network Configuration and Flow Scheduling for Big Data Applications -- Chapter 8: Speedup of Big Data Transfer on the Internet -- Chapter 9: Energy-Aware Survivable Routing in Ever-Escalating Data Environments; III: Networking Security for Big Data -- Chapter 10: A Review of Network Intrusion Detection in the Big Data Era: Challenges and Future Trend-- Chapter 11: Toward MapReduce-Based Machine-Learning Techniques for Processing Massive Network Threat Monitoring -- Chapter 12: Anonymous Communication for Big Data -- Chapter 13: Flow-Based Anomaly Detection in Big Data IV: Platforms and Systems for Big Data Applications -- Chapter 14: Mining Social Media with SDN-Enabled Big Data Platform to Transform TV Watching Experience -- Chapter 15: Trends in Cloud Infrastructures for Big Data -- Chapter 16: A User Data Profile-Aware Policy-Based Network Management Framework in the Era of Big Data -- Chapter 17: Circuit Emulation for Big Data Transfers in Clouds…”
    Book
  14. 14

    Mastering Windows Server 2016 Hyper-V by Savill, John 1975-

    Published 2017
    Book