Get the domain knowledge you need to develop real-world business apps for and in the cloud. You’ll see how Oracle APEX has made the life of web developers much easier and how it helps you create web-based data-centric applications easily and instantly without writing screeds of code.In Cloud Computing Using Oracle Application Express, you will develop a complete general ledger accounting system named the Cloud Accountant which will be accessible through a variety of devices including desktops, laptops, and the latest smartphones. This new edition also incorporates the new application page creation process, which differs from the previous version. You’ll cover other new areas, such as the updated UI elements and properties, and the interactive grid. Besides the development of a full application that you can deploy in your organization, the book teaches many new techniques to further enhance your APEX development skills.What You Will LearnDiscover new development techniques for APEX developersDevelop cloud-based ERP applicationsBuild a cloud-based application on Oracle APEXIntegrate the free JasperReports server and report designing tool with Oracle APEXWho This Book Is ForWeb developers who possess some working knowledge of Oracle Application Express, and developers who have been using Oracle Forms and now wish to use their existing SQL and PL/SQL expertise.
Автор: Xiaodong Lin; Jianbing Ni; Xuemin (Sherman) Shen Название: Privacy-Enhancing Fog Computing and Its Applications ISBN: 3030021122 ISBN-13(EAN): 9783030021122 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
Автор: Neha Kaul Название: Software Security: Building Secure Software Applications ISBN: 1774073714 ISBN-13(EAN): 9781774073711 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 23423.00 р. Наличие на складе: Нет в наличии.
Описание: Discusses the importance of security in software, and the vulnerability associated with the use of software. Considering the latest developments in technology, the book presents a detailed overview of guidelines and techniques to build secure software applications. It also explains the known security concerns, and how they can be overcome.
Описание: An Introduction Third Edition 2015. This book describes the principles of the blast furnace process and especially the control of the process. As a starting point, the blast furnace is seen as a simple iron ore smelter, while gradually the physical, chemical and metallurgical background of the blast furnace process is clarified. The book focuses on the control of the blast furnace process with respect to thermal control, gas flow control and casthouse operation. In this book, all essential process details are described and a special focus is on optimization of coal injection. The optimization of the blast furnace process is not only
Автор: Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani Название: Architecture and Security Issues in Fog Computing Applications ISBN: 1799801942 ISBN-13(EAN): 9781799801948 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 28967.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents research on the architectural complications of fog processing, focusing on security and privacy issues in intelligent fog applications. Highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning.
Автор: Sam Goundar, S. Bharath Bhushan, Praveen Kumar Rayani Название: Architecture and Security Issues in Fog Computing Applications ISBN: 1799801950 ISBN-13(EAN): 9781799801955 Издательство: Mare Nostrum (Eurospan) Цена: 24116.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As the progression of the internet continues, society is finding easier, quicker ways of simplifying their needs with the use of technology. With the growth of lightweight devices, such as smart phones and wearable devices, highly configured hardware is in heightened demand in order to process the large amounts of raw data that are acquired. Connecting these devices to fog computing can reduce bandwidth and latency for data transmission when associated with centralized cloud solutions and uses machine learning algorithms to handle large amounts of raw data. The risks that accompany this advancing technology, however, have yet to be explored. Architecture and Security Issues in Fog Computing Applications is a pivotal reference source that provides vital research on the architectural complications of fog processing and focuses on security and privacy issues in intelligent fog applications. While highlighting topics such as machine learning, cyber-physical systems, and security applications, this publication explores the architecture of intelligent fog applications enabled with machine learning. This book is ideally designed for IT specialists, software developers, security analysts, software engineers, academicians, students, and researchers seeking current research on network security and wireless systems.
Описание: This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services.
Описание: From cloud computing to big data to mobile technologies, there is a vast supply of information being mined and collected. With an abundant amount of information being accessed, stored, and saved, basic controls are needed to protect and prevent security incidents as well as ensure business continuity.Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management is a vital resource that discusses various research findings and innovations in the areas of big data analytics, mobile communication and mobile applications, distributed systems, and information security. With a focus on big data, the internet of things (IoT), mobile technologies, cloud computing, and information security, this book proves a vital resource for computer engineers, IT specialists, software developers, researchers, and graduate-level students seeking current research on SMAC technologies and information security management systems.
A practical guide to the design, implementation, evaluation, and deployment of emerging technologies for intelligent IoT applications
With the rapid development in artificially intelligent and hybrid technologies, IoT, edge, fog-driven, and pervasive computing techniques are becoming important parts of our daily lives. This book focuses on recent advances, roles, and benefits of these technologies, describing the latest intelligent systems from a practical point of view. Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications is also valuable for engineers and professionals trying to solve practical, economic, or technical problems. With a uniquely practical approach spanning multiple fields of interest, contributors cover theory, applications, and design methodologies for intelligent systems. These technologies are rapidly transforming engineering, industry, and agriculture by enabling real-time processing of data via computational, resource-oriented metaheuristics and machine learning algorithms. As edge/fog computing and associated technologies are implemented far and wide, we are now able to solve previously intractable problems. With chapters contributed by experts in the field, this book:
Describes Machine Learning frameworks and algorithms for edge, fog, and pervasive computing
Considers probabilistic storage systems and proven optimization techniques for intelligent IoT
Covers 5G edge network slicing and virtual network systems that utilize new networking capacity
Explores resource provisioning and bandwidth allocation for edge, fog, and pervasive mobile applications
Presents emerging applications of intelligent IoT, including smart farming, factory automation, marketing automation, medical diagnosis, and more
Researchers, graduate students, and practitioners working in the intelligent systems domain will appreciate this book's practical orientation and comprehensive coverage. Intelligent IoT is revolutionizing every industry and field today, and Fog, Edge, and Pervasive Computing in Intelligent IoT Driven Applications provides the background, orientation, and inspiration needed to begin.
Автор: Tamane Sharvari Chandrashekhar, Dey Nilanjan, Hassanien Aboul-Ella Название: Security and Privacy Applications for Smart City Development ISBN: 3030531481 ISBN-13(EAN): 9783030531485 Издательство: Springer Рейтинг: Цена: 32142.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book explores the fundamentals of smart cities along with issues, controversies, problems and applications concerning security and privacy in smart city development.
Автор: Sara Foresti; Sushil Jajodia Название: Data and Applications Security and Privacy XXIV ISBN: 3642137385 ISBN-13(EAN): 9783642137389 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru