Angebote zu "Smith" (6 Treffer)

Kategorien

Shops

Why Leadership Sucks(tm), Volume 2: The Pain, P...
9,95 € *
ggf. zzgl. Versand

Leadership is a hot topic, as more and more books are available on the subject than ever before. The single keyword leadership offers up more than 640 million search results on Google alone, and via the Internet we can access leadership courses (like mine on Udemy.com) and online information more quickly and easily than ever before. Yet we have a severe lack of leadership in most areas of government, business, and even nonprofit organizations. So why is that? It is a lack of follow-through, plain and simple. This book is about putting what we learn into practice, and that is a hallmark of leadership fundamentals. Whenever we feel frustrated or life seems to be spinning out of control, we need to get back to the basics of why we're living. Is it based on the fundamentals of living a selfless life as a service-minded person? "Life and people aren't out to get you, but your approach to life and approach to people are." We can get so distracted by things in life that we forget about what is seminally true. It is always about the fundamentals in work, life, sports, faith, and relationships. We can easily allow ourselves to become distracted by all kinds of things that really don't matter, and most of the time a return to the fundamentals brings us back into balance and peace in our lives. The book is divided into four parts: Part 1: To serve or not to serve. The choice is indeed a tough one. Part 2: Leggo my ego. Addresses the challenge of needing an ego to lead but having that harnessed so it is not unwieldy. Part 3: The danger of persona non grata. You don't want to be the unwelcome person, do you? Part 4: Fierce competition steamrolls ahead. Organization competition is heating up and shows no signs of slowing. Will you ride the wave or be pulled under by the currents? To discover why servant leadership is frustrating and learn practical principles for your leadership journey, listen t 1. Language: English. Narrator: Miles Anthony Smith. Audio sample: http://samples.audible.de/bk/acx0/071539/bk_acx0_071539_sample.mp3. Digital audiobook in aax.

Anbieter: Audible
Stand: 28.05.2020
Zum Angebot
Secure Cloud Computing
149,79 € *
ggf. zzgl. Versand

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine's memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission's exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system's state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Anbieter: Dodax
Stand: 28.05.2020
Zum Angebot
Secure Cloud Computing
194,00 CHF *
ggf. zzgl. Versand

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission’s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system’s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Anbieter: Orell Fuessli CH
Stand: 28.05.2020
Zum Angebot
The Chambers Dictionary of Great Quotations
66,90 CHF *
ggf. zzgl. Versand

@2@@20@With over 25,000 quotations from over 4,000 sources, @18@The Chambers Dictionary of Great Quotations @19@is the category-leading quotations dictionary@21@@16@Welcome to a treasure trove of the wittiest, most insightful, most famous and most important words uttered in history. With more quotes than any other quotations dictionary, from more sources, with better international coverage and full author biographies rather than just a brief line, @18@The Chambers Dictionary of Great Quotations @19@is the only book you need.@3@@2@This new edition brings things right up to date with thousands of new quotations right up to 2015, mixing old favourites and new sources such as Barack Obama, Bradley Wiggins, Kurt Vonnegut, Arsene Wenger, Richard Dawkins, Seamus Heaney, Pope Francis and of course, 50 Cent.@3@@2@This is a browser's paradise stretching from ancient times to the present day. Entries are arranged alphabetically by author, starting with Diane Abbot's description of the United Kingdom's Parliament as 'a nightmare of elderly white males' and finishing with Facebook's Mark Zuckerberg telling us to 'move fast and break things'. Between those two extremes are just under 1000 pages of quotations, followed by a 350 page keyword index, so you can locate a quote even if you can only remember a single word or phrase.@3@@2@As well as literary quotations from important authors past and present this collection contains quotations from writers, critics, politicians and journalists. We have sought out memorable phrases from scientists, industrialists, entertainers, sportspeople, and many more, to reflect the diversity of modern life. And just as the world has changed since the last edition of this dictionary, so many of the hundreds of new quotations reflect these changes, and important global and local events.@3@@2@@18@The Chambers Dictionary of Great Quotations@19@ includes quotations from over 4,000 sources, including: Jonathan Aitken, Woody Allen, Giorgio Armani, David Beckham, The Bible, Tony Blair, Don Bradman, Robert Burns, George W Bush, Catullus, Bill Clinton, Hillary Clinton, Brian Clough, Jarvis Cocker, Simone de Beauvoir, Charles Dickens, Tracey Emin, E M Forster, Stephen Fry, Joseph Heller, Charlton Heston, John Humphrys, Joan of Arc, Elton John, The Koran, Mao Zedong, George Melly, George Michael, Jo Moore, Andrew Motion, Friedrich Nietzsche, Sylvia Plath, Plato, Will Self, William Shakespeare, Stevie Smith, Kevin Spacey, Quentin Tarantino, Margaret Thatcher, Queen Victoria, Gore Vidal, Oscar Wilde, Michael Winner, Emile Zola and many more.@3@@2@If you've ever struggled with a half-remembered line or you've got a quote in your head and don't know where it comes from, this is the book for you. @3@@2@'A fresh and lively collection... first-class' @18@Sunday Times@19@@3@@2@'A wonderful volume... full of goodies' @18@Irish Independent@19@@3@@2@'Chambers is the one I keep at my right hand' @18@Philip Pullman@19@@3@

Anbieter: Orell Fuessli CH
Stand: 28.05.2020
Zum Angebot
Secure Cloud Computing
141,99 € *
ggf. zzgl. Versand

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission’s exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system’s state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Anbieter: Thalia AT
Stand: 28.05.2020
Zum Angebot