Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 13 dokumen yang sesuai dengan query
cover
Goralski, Walter J.
New York, NY: McGraw-Hill, 2000
004.678 GOR i
Buku Teks SO  Universitas Indonesia Library
cover
Abstrak :
Cloud computing : theory and practice provides students and IT professionals with an in-depth analysis of the cloud from the ground up. Beginning with a discussion of parallel computing and architectures and distributed systems, the book turns to contemporary cloud infrastructures, how they are being deployed at leading companies such as Amazon, Google and Apple, and how they can be applied in fields such as healthcare, banking and science. The volume also examines how to successfully deploy a cloud application across the enterprise using virtualization, resource management and the right amount of networking support, including content delivery networks and storage area networks. Developers will find a complete introduction to application development provided on a variety of platforms.
Waltham, MA: Morgan Kaufmann, 2013
e20426874
eBooks  Universitas Indonesia Library
cover
Abstrak :
Mastering cloud computing is designed for undergraduate students learning to develop cloud computing applications. Tomorrow's applications won?t live on a single computer but will be deployed from and reside on a virtual server, accessible anywhere, any time. Tomorrow's application developers need to understand the requirements of building apps for these virtual systems, including concurrent programming, high-performance computing, and data-intensive systems. The book introduces the principles of distributed and parallel computing underlying cloud architectures and specifically focuses on virtualization, thread programming, task programming, and map-reduce programming. There are examples demonstrating all of these and more, with exercises and labs throughout.
Waltham, MA: Morgan Kaufmann, 2013
e20427251
eBooks  Universitas Indonesia Library
cover
Abstrak :
Security measures can be used by management, IT staff, and users in participatory/collaborative service provision within the public sector. Security Risks in Social Media Technologies explores this use. Topics are targeted, and issues raised and lessons learnt are analyzed. The book helps the reader understand the risks posed by relevant Web 2.0 applications and gives clear guidance on how to mitigate those risks. The body of the book is concerned with social media, the dominant Web 2.0 technology associated with security in the public sector, and is structured into eight chapters. The first chapter introduces the background for the work; the second covers uses of social media; the third covers relevant security threats; the fourth chapter concerns the security controls applied to the participation-collaboration pattern; the fifth chapter then considers acceptable use practices; the sixth chapter covers participation-collaboration in the context of schools; the seventh chapter shows an alternative way of classifying controls to that given in the fourth chapter; and the final chapter offers a conclusion.
Oxford : Chandos , 2013
e20427966
eBooks  Universitas Indonesia Library
cover
Abstrak :
Contents : - Table of Contents by Author - Acronym Guide - Making DSL Profitable: A Financial Analysis - Wholesale versus Retail: A Comparison of CLEC-DSL Business Models - International Telecom Market Opportunities and Trends - Using a Strong Brand through Retail and E-Commerce to Expand the DSL Market - The ISP Experience in Today's DSL Marketplace - Wholesale versus Retail Model for CLECs - VoDSL: Challenges in the Partnership Model - Automating Loop Management - Mass-Market Solutions for DSL Deployment - Driven Deployment in the New Millennium - ADSL Welcome to the Suburbs! - Enabling Effective DSL Deployment - The Building Blocks of Broadband - Managing for Explosive Digital Subscriber Line Growth - Delivery of ADSL Services in DLC Environments - The Future of Digital Subscriber Line - Lessons learned in Deploying Voice over DSL - DSL Mass Deployment: What You Don't Know Can Hurt You - Deployment Challenges and Solutions - loop-Management Processes for Efficient Customer Activation - DSL Deployment: The ISP Perspective - The Future Broadband Home - Challenges of the Digital loop Carrier - Practical Issues of Delivering Services inside the Customer Premises - Provisioning Broadband Services over DSL - Automated, End-to-End DSL Provisioning: From Loop Qualification to the Backhaul Network - DSL's Effect on ILEC Network Architecture - Connecting to the Network - DSL: A Last-Mile Technology - Access Issues in the Local Loop - Internet via Satellite - Integrated Software-on-Silicon Solutions for Next-Generation DSL CPE - Digital Subscriber Line Fault Localization - i-SLAM: The Next-Generation, IP-Aware, IP-Smart, Intelligent DSLAM - Fiber-to-the-Home Market Trial - Traffic Aggregation and Multiple Application Selection - Residential Broadband: The Move from How It Gets There to What Gets There - Plug-and-Play DSL - Internet Age: Going from Plug and Pray to Plug and Play - Residential Gateways: New Applications for High-Speed Premises Networking - Getting to Plug-and-Play DSL An SBC Perspective - SelectPlay: Software over Broadband on Demand - Moving toward Plug-and-Play DSL - Always-On DSL Requires Always-On Provisioning - G.shdsl and ETSI SDSL Multirate Symmetric DSLs - HDSL2 Standards Compliance and Interoperability - DSL Spectrum Management - The Interoperability Problem
Chicago: International Engineering Consortium, 2001
e20448065
eBooks  Universitas Indonesia Library
cover
Abstrak :
Contents : - Contents by Author - Network Management - QoS Management in Multiservice Packet Networks - End-to-End Service Monitoring through Active Call Testing - The Role of BPO in the MVNO Marketplace - Recognizing User Perception in the Design of Telecommunications Networks - Learning to Be Lean - Network Technologies and Applications - Billing: Beyond Feeds and Speeds - Management in the Technical Environment - The ACCESS Precept: Road Map to Outsourcing Success - Advances in Network Emulation - Building Trust in Unpredictable Systems: The Case for Resilience - An Introduction to UMTS and the Implications on OSS - Internet Tomography in 4G System Architecture - Strategic Management in the Telecommunications Industry - Handoff Management in Wireless Data Networks Using Topography-Aware Mobility Prediction - The Design of a Dynamic Emergency Response Management Information System (DERMIS)* - Information Management: The Key to Compliance - A Comprehensive Study of Price and Performance of Video over Next-Generation Optical Access Networks - Network Inventory Redefined - Predicting Internet End-to-End Delay: A Statistical Study - Security - Toward End-to-End Security - Security Policy Compliance Management - Security Equals Quality: The Future of Software - Maintaining Normal Communication Operations by Reducing Denial of Service Effects by Worms and Viruses: A Case Study - A Real-Time Intrusion-Prevention System for Commercial Enterprise Databases and File Systems - The Elements of Effective Internal Network Security - Mobile Ad Hoc Networks Security - Security Challenges for CALEA in Voice over Packet Networks - Dynamic Steganography Provides Additional Data Security for Network-Based Transactions - Acronym Guide
Chicago: International Engineering Consortium, 2005
e20448095
eBooks  Universitas Indonesia Library
cover
Abstrak :
Contents : - Contents by Author - University Program Sponsors - Executive Perspectives - The RBOCs Are Going to Win the High-Speed Access Wars - GPON: The Next Big Thing in Optical Access Networks - Conceptual Barriers for Effective Network Design - Adaptive COTS OSSs:Introduction and Technologies - Making Innovation Happen - Life Organization, or How Communication Providers Can Become Co-Managers with the Customer - Original Design and Manufacturing Services:Selecting the Right Partner - Assurance: A Past, Present,and Future Perspective - Network Management - Beyond Access: Raising the Volume of Information in a Cluttered Environment - Performance Evaluation of Analog Fiber-Optic Links - Equivalence of Fast Circuit Switching and Connection-Oriented Packet Switching - Strategy Development for the Information Economy - Evolution Toward Converged Services and Networks - The Seventh Strategy for Fixed-Line Carriers - Transforming Access Networks for Success and Profitability in the 21 st Century - Czech DWDM National Research Network: A Case Study - Important Mechanisms Available Today for Bridging the Digital Divide by Bringing Connectivity to Underserved Areas of the World - Building Networks that Create Value - Next-Generation Services - Road Maps for Next-Generation Data Transport Networks - Information Revolution:The Next Generation - Advanced Video Encoders in Next-Generation Television - Next-Generation Residential Gateway - Security - Review and Analysis of WLAN Security Attacks and Solutions - An Architecture for Enhancing Internet Control-Plane Security - Telecommunications - The Open Telecommunications Services Model - How Telecom Providers Are Using Advanced Technologies Today - The Greening of Telecom - Development Trends of Telecom Bearer Networks - A Policy-Driven Methodology for Managing Telecommunication Networks - Application of the Systems Approach to Telecommunications Strategic Management - Acronym Guide
Chicago: International Engineering Consortium, 2007
e20448096
eBooks  Universitas Indonesia Library
cover
Wittenburg, Georg
Abstrak :
Service placement in ad hoc networks proposes the SPi service placement framework as a novel approach to service placement in ad hoc networks. The SPi framework takes advantage of the interdependencies between service placement, service discovery and the routing of service requests to minimize signaling overhead. The work also proposes the graph cost / single Instance and the graph cost / multiple Instances placement algorithms.
London: Springer, 2012
e20407462
eBooks  Universitas Indonesia Library
cover
Abstrak :
Cloud networking : understanding cloud-based data center networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures, fabric technology, interconnections, and more. By the end of the book, readers will understand core networking technologies and how they’re used in a cloud data center.
Waltham, MA: Morgan Kaufmann, 2014
e20426875
eBooks  Universitas Indonesia Library
cover
Abstrak :
Network and system security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors? respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area.
Waltham, MA: Syngress, 2014
e20427443
eBooks  Universitas Indonesia Library
<<   1 2   >>