Products related to Monitoring:
-
Workplace Monitoring and Technology
Workplace Monitoring and Technology aims to showcase results of research and explanatory theories that influence employees' acceptance of the fact that work is monitored using ICT-based monitoring tools.Work monitoring, understood as obtaining, storing and reporting the results of collected observations, has always been a managerial task.Traditionally it was carried out by supervisors who, while overseeing the work of employees, would draw conclusions from their observations and implement corrective actions.The use of information and communication technologies (ICT) to monitor the working employee and their performance has changed the methods of monitoring, and the popularization of remote work has increased interest in searching for new monitoring systems using the full potential of new ICT solutions.The new developments in ICT have caused smart monitoring systems and new solutions to evolve in electronic work monitoring based on the Internet of Things and Artificial Intelligence, which enables nearly cost-free monitoring.However, scientific knowledge about them is limited, and above all, so is managerial knowledge about the reception of these tools by employees, while their misuse can cause considerable damage.Presenting a broad overview of the current state of different areas of scientific knowledge regarding smart and electronic monitoring systems of work performance, this book will be of relevance for academics within the fields of human resource management and performance management, and for similar groups of researchers in psychology and sociology.
Price: 135.00 £ | Shipping*: 0.00 £ -
The Practice Of Network Security Monitoring
Network security is not simply about building impenetrable walls determined attackers will eventually overcome traditional defenses.The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks no prior experience required.To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to: Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There s no foolproof way to keep attackers out of your network.But when they get in, you ll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them.Attacks are inevitable, but losing sensitive data shouldn't be.
Price: 53.99 £ | Shipping*: 0.00 £ -
The Practice of Network Security Monitoring
The Practice of Network Security Monitoring
Price: 51.29 € | Shipping*: 0.00 € -
Global Digital Technology Convergence : Driving Diffusion via Network Effects
Since the 1970s, we have witnessed unprecedented diff usion of digital technologies in both speed and geographic coverage.These technologies are pervasive and disruptive, and lead to profound shifts and transformations in societies and economies.Many claim that emerging network externalities are the principal phenomenon driving the process of technology diff usion and determining its in-time dynamics. This book analyzes the unique role network eff ects play in the process of digital technology diff usion.Using the time span of 1980–2022 and data from over 180 countries, the authors examines the strength and determinants of emerging network externalities in the process of digital technology diffusion across the world.Moreover, using international case studies it traces the process of technology convergence and technology convergence club formation, intending to answer whether cross-country gaps are diminishing or rather growing, and if countries form unique ‘clubs’ within which a rapid convergence occurs. Global Digital Technology Convergence is written for scholars and researchers in the fi elds of technology and innovation management, information and communication technology, economic development and the economics of innovation.
Price: 49.99 £ | Shipping*: 0.00 £
-
Is digital traffic monitoring for parking violations legal?
Digital traffic monitoring for parking violations is legal in many jurisdictions, as long as it complies with local laws and regulations. However, it is important to ensure that the monitoring is conducted in accordance with privacy laws and that any data collected is handled and stored in a secure and compliant manner. Additionally, it is essential to clearly communicate to the public that digital monitoring is being used for parking enforcement purposes. Overall, digital traffic monitoring for parking violations can be legal and effective when implemented responsibly and in accordance with the law.
-
What are the data of the Mauna Loa monitoring station?
The Mauna Loa monitoring station collects data on atmospheric carbon dioxide levels. This data is crucial for understanding the impact of human activities on the Earth's climate. The station has been collecting data since the late 1950s, providing one of the longest continuous records of carbon dioxide levels in the world. The data collected at Mauna Loa has been instrumental in shaping our understanding of climate change and informing policy decisions.
-
What are the data from the Mauna Loa monitoring station?
The Mauna Loa monitoring station collects data on atmospheric carbon dioxide levels. This data is crucial for understanding the impact of human activities on climate change. The continuous measurements taken at Mauna Loa have shown a steady increase in carbon dioxide levels over the years, providing valuable information for climate scientists and policymakers. The data from Mauna Loa has been instrumental in shaping our understanding of global carbon cycles and the need for action to mitigate climate change.
-
How can the monitoring of VPN data be carried out?
The monitoring of VPN data can be carried out through various methods. One common approach is to use network monitoring tools that can track and analyze the traffic passing through the VPN connection. These tools can provide insights into the volume, type, and source/destination of the data being transmitted. Additionally, organizations can implement logging and auditing mechanisms within the VPN infrastructure to track user activity and access to specific resources. Finally, some VPN providers offer built-in monitoring and reporting features that allow administrators to track usage and performance metrics.
Similar search terms for Monitoring:
-
Chinese Internet Buzzwords : Research on Network Languages in Internet Group Communication
As the Internet has reshaped the way we communicate, people’s reading has become more fragmented and attention has been directed to a more concise and general form of language that outlines the most important information.This language of the internet, a language system that concentrates on the content of events and public emotions, has emerged and received wide currency. This monograph is one of the first books to examine the language of the internet in the Chinese context.By analysing content and discourse, the author examines Chinese website buzzwords since 2010.She reveals the mechanisms of generation, the cultural nature and political characteristics of the network language, analyzes the causes of its emergence and popularity, and highlights its social and academic significance.Meanwhile, she argues that research in the area is essentially interdisciplinary, involving not only perspectives from Journalism and Communication Studies, but also Philosophy, Culture, Linguistics and Sociology. Students and scholars of Communication Studies and Journalism, as well as Culture Studies should be greatly interested in this title.
Price: 150.00 £ | Shipping*: 0.00 £ -
Architecting Enterprise : Managing Innovation, Technology, and Global Competitiveness
The discussion in this book provides an introduction to the concept of entrepreneurship and entrepreneurial business management.The author covers many elements of the entrepreneurial management discipline including choosing a business, organizing, financing, marketing, developing an offering that the market will value, and growing a business.
Price: 78.00 £ | Shipping*: 0.00 £ -
Design Innovation and Network Architecture for the Future Internet
For the past couple of years, network automation techniques that include software-defined networking (SDN) and dynamic resource allocation schemes have been the subject of a significant research and development effort.Likewise, network functions virtualization (NFV) and the foreseeable usage of a set of artificial intelligence techniques to facilitate the processing of customers' requirements and the subsequent design, delivery, and operation of the corresponding services are very likely to dramatically distort the conception and the management of networking infrastructures.Some of these techniques are being specified within standards developing organizations while others remain perceived as a "buzz" without any concrete deployment plans disclosed by service providers.An in-depth understanding and analysis of these approaches should be conducted to help internet players in making appropriate design choices that would meet their requirements as well as their customers.This is an important area of research as these new developments and approaches will inevitably reshape the internet and the future of technology.Design Innovation and Network Architecture for the Future Internet sheds light on the foreseeable yet dramatic evolution of internet design principles and offers a comprehensive overview on the recent advances in networking techniques that are likely to shape the future internet.The chapters provide a rigorous in-depth analysis of the promises, pitfalls, and other challenges raised by these initiatives, while avoiding any speculation on their expected outcomes and technical benefits.This book covers essential topics such as content delivery networks, network functions virtualization, security, cloud computing, automation, and more.This book will be useful for network engineers, software designers, computer networking professionals, practitioners, researchers, academicians, and students looking for a comprehensive research book on the latest advancements in internet design principles and networking techniques.
Price: 250.00 £ | Shipping*: 0.00 £ -
Global Navigation Satellite System Monitoring of the Atmosphere
Global Navigation Satellite System (GNSS) monitoring of the atmosphere is an interdisciplinary topic: a collaboration between geodetic and atmospheric communities.As such, this topic requires sufficient basic knowledge about both GNSS and the atmosphere.Global Navigation Satellite System Monitoring of the Atmosphere begins by introducing GNSS, its components, and signals.It then explains the basics of the atmosphere, starting from the ionosphere to the troposphere.The GNSS tropospheric monitoring is separated for application in numerical weather prediction and nowcasting.Further chapters focus on the application of GNSS for monitoring the climate as well as soil moisture.Finally, the book concludes by discussing GNSS processing along with introducing the latest developments and applications for using atmospheric data to provide precise real-time GNSS products.
Price: 99.95 £ | Shipping*: 0.00 £
-
Who is monitoring the toilets?
The toilets are typically monitored by building maintenance staff or custodial workers. They are responsible for ensuring that the toilets are clean, well-stocked with supplies, and in proper working condition. In some cases, there may also be automated monitoring systems in place to track usage and alert staff when maintenance is needed. Overall, the goal is to provide a clean and functional restroom environment for users.
-
Are child monitoring apps illegal?
Child monitoring apps are not inherently illegal, but their use can raise privacy concerns and legal issues depending on how they are used. It is important to consider the laws and regulations in your jurisdiction regarding the monitoring of children, as well as the terms of service of the specific app being used. It is recommended to have open communication with your child about the use of monitoring apps and to use them responsibly and ethically.
-
How does iCloud monitoring work?
iCloud monitoring works by continuously tracking and analyzing the activity on a user's iCloud account. This includes monitoring for any unauthorized access, unusual login locations, or suspicious activity. If any concerning activity is detected, the monitoring system will alert the user or administrator so they can take action to secure their account. Additionally, iCloud monitoring can also track data usage, storage capacity, and device synchronization to ensure everything is functioning properly.
-
How does WLAN monitoring work?
WLAN monitoring works by continuously monitoring the wireless network to gather data on the performance, usage, and security of the network. This is done using specialized software and hardware that can capture and analyze the traffic on the network. The monitoring tools can track the number of connected devices, signal strength, data transfer rates, and any potential security threats. This data is then used to optimize the network performance, troubleshoot issues, and ensure the security of the WLAN.
* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.