Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Detektion von magnetischen Störungen der elektrischen Fahrzeugkomponenten auf Basis einer Mustererkennung am Beispiel eines automatisierten Fahrzeugpositionierungssystems

Detektion von magnetischen Störungen der elektrischen Fahrzeugkomponenten auf Basis einer Mustererkennung am Beispiel eines automatisierten Fahrzeugpositionierungssystems

Matthias Hisung stellt ein neuartiges Assistenzsystem zur automatisierten Fahrzeugpositionierung für das induktive Laden (APIC) vor. Darüber hinaus wird eine neue Methode zur Detektion von magnetischen Störungen (MDMS) durch elektrische Fahrzeugkomponenten auf Basis einer Mustererkennung eingeführt. Das Assistenzsystem lässt sich hierbei auf unterschiedliche Fahrzeugtypen anwenden und übernimmt für die fahrende Person die Aufgabe der Positionierung, um eine Komfortsteigerung zu erzielen. Durch die neuartige Methode wird eine deutliche Verbesserung der Positionsermittlung und damit einhergehend eine Erhöhung des Positionierungsradius für das induktive Laden ermöglicht. Fahrerassistenzsystem zur automatisierten Fahrzeugpositionierung.- Analyse der elektrischen Fahrzeugkomponenten.- Mustererkennung zur Detektion von magnetischen Störungen.- Ergebnisse der Detektion von magnetischen Störungen.

Regulärer Preis: 66,99 €
Produktbild für Secure Web Application Development

Secure Web Application Development

Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications.The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.Topics covered include:* A framework for deciding what needs to be protected and how strongly* Configuring services such as databases and web servers* Safe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPS* Safe REST APIs* Server-side attacks and defenses such as injection and cross-site scripting* Client-side attacks and defenses such as cross-site request forgery* Security techniques such as CORS, CSP* Password management, authentication and authorization, including OAuth2* Best practices for dangerous operations such as password change and reset* Use of third-party components and supply chain security (Git, CI/CD etc)WHAT YOU'LL LEARN** Review the defenses that can used to prevent attacks* Model risks to better understand what to defend and how* Choose appropriate techniques to defend against attacks* Implement defenses in Python/Django applicationsWHO THIS BOOK IS FOR* Developers who already know how to build web applications but need to know more about security* Non-professional software engineers, such as scientists, who must develop web tools and want to make their algorithms available to a wider audience.* Engineers and managers who are responsible for their product/company technical security policyMATTHEW BAKER is the Head of Scientific Software and Data Management at ETH Zurich, Switzerland’s leading science and technology university, He leads a team of engineers developing custom software to support STEM research projects, as well as teaches computer science short courses. Having over 25 years of experience developing software, he has worked as a developer, systems administrator, project manager and consultant in various sectors from banking and insurance, science and engineering, to military intelligence.1. Introduction2. The Hands-On Environment3. Threat Modelling4. Transport and Encryption5. Installing and Configuring Services6. APIs and Endpoints7. Cookies and User Input8. Cross-Site Requests9. Password Management10. Authentication and Authorization11. OAuth212. Logging and Monitoring13. Third-Party and Supply Chain Security14. Further Resources.

Regulärer Preis: 62,99 €
Produktbild für Third Generation Internet Revealed

Third Generation Internet Revealed

This book covers the inexorable exhaustion of the IPv4 address space, the interim fix to this based on Network Address Translation (NAT) and Private Addresses, and the differences between IPv4 and IPv6. It will help you understand the limitations and problems introduced by the use of NAT and introduce you to the far simpler network and software designs possible, using a larger, unified address space.IPv6, a mature and viable replacement for IPv4, is currently used by more than 36% of all global Internet traffic. Wireless telephone service providers in many countries have migrated their networks to IPv6 with great success. The elimination of NAT and Private Addresses has vastly simplified network design and implementation. Further, there are now enough public addresses allocated to accommodate all anticipated uses for the foreseeable future.Most networking products and software, especially open-source software, are already fully IPv6 compliant. Today, no businessshould purchase obsolete products that support only IPv4. The global IPv6 Forum estimates that there are millions of networking professionals still needing to learn the fundamentals of IPv6 technologies to move forward. This book is for them. With plans in place for a shutdown of IPv4 on global networks (“Sunset IPv4”) the time to learn is now. If you want a job in IT, especially network hardware or software, and you don’t know IPv6, you are already obsolete.WHAT YOU WILL LEARN* This book serves as a guide to all relevant Internet Engineering Task Force (IETF) standards Request for Comments (RFCs), organized by topic and discussed in plain language* Understand how IPv6 makes viable technologies such as multicast (for efficient global audio/video streaming), IPsec VPNs (for better security), and simpler VoIP* Take “edge computing” to the limit by eliminating intermediary servers made necessary by IPv4 NAT–for example, making connections directly from my node to yours* Discover how organizations can introduce IPv6 into existing IPv4 networks (“Dual Stack”), and then eliminate the legacy IPv4 aspects going forward (“Pure IPv6”) for the mandates going into place now (for example, US DoD requirements to move all networks to Pure IPv6)* Recognize that 5G networking (the Grand Convergence of conventional networks and wireless service) depends heavily on the advanced features IPv6 WHO THIS BOOK IS FORNetworking professionals. Readers should have at least some familiarity with the precursor protocol (IPv4) and legacy TCP/IP based networks. Some knowledge of network models, such as DoD four-layer model or OSI 7-layer model, is helpful to understand where the Internet Protocol fits into the larger picture. For network software developers using the Sockets API (in UNIX, Windows, etc.), this book will help you to understand the extensions to that API needed to work with IPv6.LAWRENCE E. HUGHES is a renowned expert in IPv6 and PKI. He has spoken at numerous IPv6 Summits worldwide. He created and ran one of the IPv6 Ready product certification centers for many years. He is an IPv6 Forum Gold Certified Trainer and was inducted into the IPv6 Hall of Fame in 2019. He co-founded Sixscape Communications in Singapore where he built their dual stack networks and was responsible for creating much of their technology. He is a security author and most recently published Pro Active Directory Certificate Services with Apress.Chapter 1: Introduction.- Chapter 2: History of Computer Networks up to IPv4.- Chapter 3: Review of IPv4.- Chapter 4: The Depletion of the IPv4 Address Space.- Chapter 5: IPv6 Deployment Progress.- Chapter 6: IPv6 Core Protocols.- Chapter 7: IPSec and IKEv2.- Chapter 8: Transition Mechanisms.- Chapter 9: IPv6 on Mobile Devices.- Chapter 10: DNS.- Chapter 11: The Future of Messaging with No NAT.- Chapter 12: IPv6 Related Organizations.- Chapter 13: IPv6 Projects.

Regulärer Preis: 52,99 €
Produktbild für How to Create a Web3 Startup

How to Create a Web3 Startup

Web3 is the next evolution for the World Wide Web based on Blockchain technology. This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by reviewing its core concepts such as DAOs, tokens, dApps, and Ethereum.With Web2, much of the valuable data and wealth has been concentrated with a handful of mega tech operators like Apple, Facebook, Google and Amazon. This has made it difficult for startups to get an edge. It has also meant that users have had little choice but to give up their value data for free. Web3 aims to upend this model using a decentralized approach that is on the blockchain and crypto. This allows for users to become stakeholders in the ecosystem.Along with exploring core concepts of Web3 like DAOs, tokens, dApps, and Ethereum, this book will also examine the main categories that are poised for enormous opportunities. They include infrastructure, consumer apps, enterpriseapps, and the metaverse. For each of these, I will have use cases of successful companies. How To Create a Web3 Startup covers the unique funding strategies, the toolsets needed, the talent required, the go-to-market approaches, and challenges faced.WHAT YOU'LL LEARN* Work with the dev stack components* Examine the success factors for infrastructure, consumer, enterprise, verticals, and the Metaverse* Understand the risks of Web3, like the regulatory structure and security breachesWHO THIS BOOK IS FORStartup entrepreneurs and those looking to work in the Web3 industry.Tom Taulli has been developing software since the 1980s. In college, he started his first company, which focused on the development of e-learning systems. He created other companies as well, including Hypermart.net that was sold to InfoSpace in 1996. Along the way, Tom has written columns for online publications such as BusinessWeek.com, TechWeb.com, and Bloomberg.com. He also writes posts on Artificial Intelligence for Forbes.com and is the advisor to various companies in the space. You can reach Tom on Twitter (@ttaulli) or through his website (Taulli.com) where he has an online course on AI.Chapter 1: Why Web3?.- Chapter 2: Core Technology.- Chapter 3: The Web3 Tech Stack.- Chapter 4: The Web3 Team.- Chapter 5: Decentralized Autonomous Organizations (DAOs).- Chapter 6: NFTs, Gaming and Social Networks.- Chapter 7: DeFi.- Chapter 8: The Metaverse.- Chapter 9: Taxes and Regulations. Glossary.

Regulärer Preis: 46,99 €
Produktbild für R 4 Data Science Quick Reference

R 4 Data Science Quick Reference

In this handy, quick reference book you'll be introduced to several R data science packages, with examples of how to use each of them. All concepts will be covered concisely, with many illustrative examples using the following APIs: readr, dibble, forecasts, lubridate, stringr, tidyr, magnittr, dplyr, purrr, ggplot2, modelr, and more.With R 4 Data Science Quick Reference, you'll have the code, APIs, and insights to write data science-based applications in the R programming language. You'll also be able to carry out data analysis. All source code used in the book is freely available on GitHub..WHAT YOU'LL LEARN* Implement applicable R 4 programming language specification features* Import data with readr* Work with categories using forcats, time and dates with lubridate, and strings with stringr* Format data using tidyr and then transform that data using magrittr and dplyr* Write functions with R for data science, data mining, and analytics-based applications* Visualize data with ggplot2 and fit data to models using modelrWHO THIS BOOK IS FORProgrammers new to R's data science, data mining, and analytics packages. Some prior coding experience with R in general is recommended. Thomas Mailund is an associate professor at Aarhus University, Denmark. He has a background in math and computer science. For the last decade, his main focus has been on genetics and evolutionary studies, particularly comparative genomics, speciation, and gene flow between emerging species. He has published Beginning Data Science in R, Functional Programming in R, and Metaprogramming in R with Apress as well as other books on R and C programming.1. Introduction2. Importing Data: readr3. Representing Tables: tibble4. Reformatting Tables: tidyr5. Pipelines: magrittr6. Functional Programming: purrr7. Manipulating Data Frames: dplyr8. Working with Strings: stringr9. Working with Factors: forcats10. Working with Dates: lubridate11. Working with Models: broom and modelr12. Plotting: ggplot213. Conclusions

Regulärer Preis: 36,99 €
Produktbild für Samsung Galaxy A23 5G

Samsung Galaxy A23 5G

Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen Tipps Mit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Samsung Galaxy A23 5G von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Samsung Galaxy A23 5G auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen- Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen- Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten- Updates, Datenschutz und Sicherheit

Regulärer Preis: 9,99 €
Produktbild für AI and Machine Learning for Network and Security Management

AI and Machine Learning for Network and Security Management

AI AND MACHINE LEARNING FOR NETWORK AND SECURITY MANAGEMENTEXTENSIVE RESOURCE FOR UNDERSTANDING KEY TASKS OF NETWORK AND SECURITY MANAGEMENTAI and Machine Learning for Network and Security Management covers a range of key topics of network automation for network and security management, including resource allocation and scheduling, network planning and routing, encrypted traffic classification, anomaly detection, and security operations. In addition, the authors introduce their large-scale intelligent network management and operation system and elaborate on how the aforementioned areas can be integrated into this system, plus how the network service can benefit. Sample ideas covered in this thought-provoking work include:* How cognitive means, e.g., knowledge transfer, can help with network and security management* How different advanced AI and machine learning techniques can be useful and helpful to facilitate network automation* How the introduced techniques can be applied to many other related network and security management tasksNetwork engineers, content service providers, and cybersecurity service providers can use AI and Machine Learning for Network and Security Management to make better and more informed decisions in their areas of specialization. Students in a variety of related study programs will also derive value from the work by gaining a base understanding of historical foundational knowledge and seeing the key recent developments that have been made in the field. YULEI WU, is a Senior Lecturer with the Department of Computer Science, Faculty of Environment, Science and Economy, University of Exeter, UK. His research focuses on networking, Internet of Things, edge intelligence, information security, and ethical AI. He serves as an Associate Editor for IEEE Transactions on Network and Service Management, and IEEE Transactions on Network Science and Engineering, as well as an Editorial Board Member of Computer Networks, Future Generation Computer Systems, and Nature Scientific Reports at Nature Portfolio. He is a Senior Member of the IEEE and the ACM, and a Fellow of the HEA (Higher Education Academy). JINGGUO GE, is currently a Professor of the Institute of Information Engineering, Chinese Academy of Sciences (CAS), and also a Professor of School of Cyber Security, University of Chinese Academy of Sciences. His research focuses on Future Network Architecture, 5G/6G, Software-defined networking (SDN), Cloud Native networking, Zero Trust Architecture. He has published more than 60 research papers and is the holder of 28 patents. He participated in the formulation of 3 ITU standards on IMT2020. TONG LI, is currently a Senior Engineer of Institute of Information Engineering at the Chinese Academy of Sciences (CAS). His research and engineering focus on Computer Networks, Cloud Computing, Software-Defined Networking (SDN), and Distributed Network and Security Management. He participated 2 ITU standards on IMT2020 and developed many large-scale software systems on SDN, network management and orchestration. Author Biographies xiiiPreface xvAcknowledgments xviiAcronyms xix1 INTRODUCTION 11.1 Introduction 11.2 Organization of the Book 31.3 Conclusion 6References 62 WHEN NETWORK AND SECURITY MANAGEMENT MEETS AI AND MACHINE LEARNING 92.1 Introduction 92.2 Architecture of Machine Learning-Empowered Network and Security Management 102.3 Supervised Learning 122.3.1 Classification 122.3.2 Regression 152.4 Semisupervised and Unsupervised Learning 152.4.1 Clustering 172.4.2 Dimension Reduction 172.4.3 Semisupervised Learning 182.5 Reinforcement Learning 182.5.1 Policy-Based 212.5.2 Value-Based 222.6 Industry Products on Network and Security Management 242.6.1 Network Management 242.6.1.1 Cisco DNA Center 242.6.1.2 Sophie 252.6.1.3 Juniper EX4400 Switch 252.6.1.4 Juniper SRX Series Services Gateway 252.6.1.5 H3C SeerAnalyzer 262.6.2 Security Management 272.6.2.1 SIEM, IBM QRadar Advisor with Watson 272.6.2.2 FortiSandbox 272.6.2.3 FortiSIEM 282.6.2.4 FortiEDR 282.6.2.5 FortiClient 292.6.2.6 H3C SecCenter CSAP 292.7 Standards on Network and Security Management 292.7.1 Network Management 292.7.1.1 Cognitive Network Management 302.7.1.2 End-to-End 5G and Beyond 302.7.1.3 Software-Defined Radio Access Network 322.7.1.4 Architectural Framework for ML in Future Networks 322.7.2 Security Management 332.7.2.1 Securing AI 332.8 Projects on Network and Security Management 342.8.1 Poseidon 342.8.2 NetworkML 352.8.3 Credential-Digger 362.8.4 Adversarial Robustness Toolbox 372.9 Proof-of-Concepts on Network and Security Management 382.9.1 Classification 382.9.1.1 Phishing URL Classification 382.9.1.2 Intrusion Detection 392.9.2 Active Learning 392.9.3 Concept Drift Detection 402.10 Conclusion 41References 423 LEARNING NETWORK INTENTS FOR AUTONOMOUS NETWORK MANAGEMENT 493.1 Introduction 493.2 Motivation 523.3 The Hierarchical Representation and Learning Framework for Intention Symbols Inference 533.3.1 Symbolic Semantic Learning (SSL) 533.3.1.1 Connectivity Intention 553.3.1.2 Deadlock Free Intention 563.3.1.3 Performance Intention 573.3.1.4 Discussion 573.3.2 Symbolic Structure Inferring (SSI) 573.4 Experiments 593.4.1 Datasets 593.4.2 Experiments on Symbolic Semantic Learning 603.4.3 Experiments on Symbolic Structure Inferring 623.4.4 Experiments on Symbolic Structure Transferring 643.5 Conclusion 66References 664 VIRTUAL NETWORK EMBEDDING VIA HIERARCHICAL REINFORCEMENT LEARNING 694.1 Introduction 694.2 Motivation 704.3 Preliminaries and Notations 724.3.1 Virtual Network Embedding 724.3.1.1 Substrate Network and Virtual Network 724.3.1.2 The VNE Problem 724.3.1.3 Evaluation Metrics 734.3.2 Reinforcement Learning 744.3.3 Hierarchical Reinforcement Learning 754.4 The Framework of VNE-HRL 754.4.1 Overview 754.4.2 The High-level Agent 774.4.2.1 State Encoder for HEA 774.4.2.2 Estimated Long-term Cumulative Reward 784.4.2.3 Short-term High-level Reward 784.4.3 The Low-level Agent 784.4.3.1 State Encoder for LEA 794.4.3.2 Estimated Long-term Cumulative Reward 794.4.3.3 Short-term Low-level Reward 804.4.4 The Training Method 804.5 Case Study 804.5.1 Experiment Setup 804.5.2 Comparison Methods 814.5.3 Evaluation Results 814.5.3.1 Performance Over Time 814.5.3.2 Performance of Various VNRs with Diverse Resource Requirements 824.6 Related Work 844.6.1 Traditional Methods 844.6.2 ML-based Algorithms 844.7 Conclusion 85References 855 CONCEPT DRIFT DETECTION FOR NETWORK TRAFFIC CLASSIFICATION 915.1 Related Concepts of Machine Learning in Data Stream Processing 915.1.1 Assumptions and Limitations 915.1.1.1 Availability of Learning Examples 915.1.1.2 Availability of the Model 925.1.1.3 Concept to be Learned 925.1.2 Concept Drift and Its Solution 925.2 Using an Active Approach to Solve Concept Drift in the Intrusion Detection Field 945.2.1 Application Background 945.2.2 System Workflow 955.3 Concept Drift Detector Based on CVAE 965.3.1 CVAE-based Drift Indicator 965.3.2 Drift Analyzer 975.3.3 The Performance of CVAE-based Concept Drift Detector 985.3.3.1 Comparison Drift Detectors 995.3.3.2 Experiment Settings 995.4 Deployment and Experiment in Real Networks 1015.4.1 Data Collection and Feature Extraction 1015.4.2 Data Analysis and Parameter Setting 1035.4.3 Result Analysis 1035.5 Future Research Challenges and Open Issues 1055.5.1 Adaptive Threshold m 1055.5.2 Computational Cost of Drift Detectors 1055.5.3 Active Learning 1055.6 Conclusion 105References 1066 ONLINE ENCRYPTED TRAFFIC CLASSIFICATION BASED ON LIGHTWEIGHT NEURAL NETWORKS 1096.1 Introduction 1096.2 Motivation 1096.3 Preliminaries 1106.3.1 Problem Definition 1106.3.2 Packet Interaction 1116.4 The Proposed Lightweight Model 1116.4.1 Preprocessing 1126.4.2 Feature Extraction 1126.4.2.1 Embedding 1126.4.2.2 Attention Encoder 1136.4.2.3 Fully Connected Layer 1156.5 Case Study 1156.5.1 Evaluation Metrics 1156.5.2 Baselines 1166.5.3 Datasets 1176.5.4 Evaluation on Datasets 1186.5.4.1 Evaluation on Dataset A 1186.5.4.2 Evaluation on Dataset B 1206.6 Related Work 1216.6.1 Encrypted Traffic Classification 1226.6.2 Packet-Based Methods 1226.6.3 Flow-Based Methods 1226.6.3.1 Traditional Machine Learning-Based Methods 1236.6.3.2 Deep Learning-Based Methods 1246.7 Conclusion 124References 1257 CONTEXT-AWARE LEARNING FOR ROBUST ANOMALY DETECTION 1297.1 Introduction 1297.2 Pronouns 1337.3 The Proposed Method – AllRobust 1357.3.1 Problem Statement 1357.3.2 Log Parsing 1357.3.3 Log Vectorization 1387.3.4 Anomaly Detection 1427.3.4.1 Implementation of SSL 1437.4 Experiments 1457.4.1 Datasets 1457.4.1.1 HDFS Dataset 1457.4.1.2 BGL Dataset 1467.4.1.3 Thunderbird Dataset 1467.4.2 Model Evaluation Indicators 1477.4.3 Supervised Deep Learning-based Log Anomaly Detection on Imbalanced Log Data 1487.4.3.1 Data Preprocessing 1487.4.3.2 Hyperparameters and Environmental Settings 1497.4.3.3 Training on Multiclass Imbalanced Log Data 1497.4.3.4 Training on Binary Imbalanced Log Data 1507.4.4 Semisupervised Deep Learning-based Log Anomaly Detection on Imbalanced Log Data 1527.4.4.1 The Methods of Enhancing Log Data 1527.4.4.2 Anomaly Detection with a Single Log 1537.4.4.3 Anomaly Detection with a Log-based Sequence 1567.5 Discussion 1577.6 Conclusion 158References 1598 ANOMALY CLASSIFICATION WITH UNKNOWN, IMBALANCED AND FEW LABELED LOG DATA 1658.1 Introduction 1658.2 Examples 1678.2.1 The Feature Extraction of Log Analysis 1678.2.1.1 Statistical Feature Extraction 1688.2.1.2 Semantic Feature Extraction 1708.2.2 Few-Shot Problem 1708.3 Methodology 1728.3.1 Data Preprocessing 1728.3.1.1 Log Parsing 1728.3.1.2 Log Enhancement 1738.3.1.3 Log Vectorization 1748.3.2 The Architecture of OpenLog 1748.3.2.1 Encoder Module 1748.3.2.2 Prototypical Module 1778.3.2.3 Relation Module 1788.3.3 Training Procedure 1798.3.4 Objective Function 1808.4 Experimental Results and Analysis 1808.4.1 Experimental Design 1818.4.1.1 Baseline 1818.4.1.2 Evaluation Metrics 1818.4.2 Datasets 1838.4.2.1 Data Processing 1848.4.3 Experiments on the Unknown Class Data 1858.4.4 Experiments on the Imbalanced Data 1888.4.5 Experiments on the Few-shot Data 1888.5 Discussion 1908.6 Conclusion 191References 1929 ZERO TRUST NETWORKS 1999.1 Introduction to Zero-Trust Networks 1999.1.1 Background 1999.1.2 Zero-Trust Networks 2009.2 Zero-Trust Network Solutions 2019.2.1 Zero-Trust Networks Based on Access Proxy 2019.2.2 Zero Trust Networks Based on SDP 2039.2.3 Zero-Trust Networks Based on Micro-Segmentation 2049.3 Machine Learning Powered Zero Trust Networks 2069.3.1 Information Fusion 2089.3.2 Decision Making 2109.4 Conclusion 212References 21210 INTELLIGENT NETWORK MANAGEMENT AND OPERATION SYSTEMS 21510.1 Introduction 21510.2 Traditional Operation and Maintenance Systems 21510.2.1 Development of Operation and Maintenance Systems 21510.2.1.1 Manual Operation and Maintenance 21610.2.1.2 Tool-Based Operation and Maintenance 21610.2.1.3 Platform Operation and Maintenance 21710.2.1.4 DevOps 21710.2.1.5 AIOps 21810.2.2 Open-Source Operation and Maintenance Systems 21810.2.2.1 Nagios 21910.2.2.2 Zabbix 22110.2.2.3 Prometheus 22310.2.3 Summary 22410.3 Security Operation and Maintenance 22510.3.1 Introduction 22510.3.2 Open-Source Security Tools 22610.3.2.1 Access Control 22610.3.2.2 Security Audit and Intrusion Detection 22710.3.2.3 Penetration Testing 22710.3.2.4 Vulnerability Scanning 23110.3.2.5 CI/CD Security 23410.3.2.6 Deception 23410.3.2.7 Data Security 23410.3.3 Summary 23710.4 AIOps 23810.4.1 Introduction 23810.4.2 Open-Source AIOps and Algorithms 23910.4.2.1 Research Progress of Anomaly Detection 23910.4.2.2 Metis 24210.4.2.3 UAVStack 24410.4.2.4 Skyline 24410.4.3 Summary 24710.5 Machine Learning-Based Network Security Monitoring and Management Systems 24810.5.1 Architecture 24810.5.2 Physical Facility Layer 24810.5.3 Virtual Resource Layer 24910.5.4 Orchestrate Layer 25010.5.5 Policy Layer 25010.5.6 Semantic Description Layer 25110.5.7 Application Layer 25110.5.8 Center for Intelligent Analytics of Big Data 25110.5.9 Programmable Measurement and Auditing 25210.5.10 Overall Process 25210.5.11 Summary 25310.6 Conclusion 253References 25411 CONCLUSIONS, AND RESEARCH CHALLENGES AND OPEN ISSUES 25711.1 Conclusions 25711.2 Research Challenges and Open Issues 25811.2.1 Autonomous Networks 25811.2.2 Reinforcement Learning Powered Solutions 25911.2.3 Traffic Classification 25911.2.4 Anomaly Detection 26011.2.5 Zero-Trust Networks 261References 262Index 263

Regulärer Preis: 96,99 €
Produktbild für Instagram For Dummies

Instagram For Dummies

ARE YOU ON INSTA? START SHARING PICTURES AND A LOT, LOT MOREInstagram For Dummies helps you navigate Instagram and all the updates coming to the platform. For new and experienced users, this book keeps you in the know, so you can post to your feed, create Reels and Stories, broadcast and watch live video, and so much more. This handy guide covers creating Reels to attract more followers, adding updates and stickers for stories, and the addition of multiple feeds so you can customize your experience. There are so many new features coming to this ever-more-popular social platform, you need a friend like Dummies to help you keep up. Create viral content, or just share cat pics with your close friends and family.* Learn the basics of the Instagram app and web interfaces* Get started with your first posts, Stories, and Reels* Discover the many new features that are making Instagram more fun than ever* Find out how to make your posts scroll-stopping and more popularThis is the perfect how-to guide for both newbie and experienced social media users who need a guide on setting up Instagram, expanding their audience, and doing more on the app. JENN HERMAN is a social media consultant and Instagram expert. COREY WALKER is a marketer and social media strategist with more than twenty years’ experience. ERIC BUTOW is the CEO of Butow Communications Group, a firm that specializes in online marketing. He is the author of more than 40 books on technology. Introduction 1PART 1: GETTING STARTED WITH INSTAGRAM 5Chapter 1: Setting Up Your Profile 7Chapter 2: Navigating Instagram 25PART 2: GETTING CREATIVE WITH INSTAGRAM CONTENT 37Chapter 3: Taking and Posting Great Photos 39Chapter 4: Recording and Posting Great Videos 61PART 3: CONNECTING WITH A COMMUNITY ON INSTAGRAM 75Chapter 5: Finding People to Follow 77Chapter 6: Direct Messaging with Others 91PART 4: TELLING TALES WITH INSTAGRAM STORIES 115Chapter 7: Creating Instagram Stories 117Chapter 8: Adding Style to Your Stories 143Chapter 9: Being Sneaky with Sharing Stories 165Chapter 10: Using Instagram Highlights to Keep Your Content Alive 175Chapter 11: Going Live on Instagram 185PART 5: BECOMING A PRO AT REELS 193Chapter 12: Understanding Reels 195Chapter 13: Creating a Reels Presence 201PART 6: THE PART OF TENS 221Chapter 14: Ten Things Not to Do on Instagram 223Chapter 15: Ten Types of Great Instagram Reels and Stories 231Index 243

Regulärer Preis: 12,99 €
Produktbild für Private Cloud und Home Server mit Synology NAS

Private Cloud und Home Server mit Synology NAS

* MUSIK, FOTOS, VIDEOS UND DOKUMENTE ZENTRAL SPEICHERN UND MIT ANDEREN TEILEN* BENUTZER VERWALTEN, BACKUPS ERSTELLEN UND DATEN VOR UNERLAUBTEN ZUGRIFFEN SCHÜTZEN* FORTGESCHRITTENE THEMEN WIE KONFIGURATION VON FIREWALL UND VPN, EINRICHTUNG EINES WEBSERVERS, EINSATZ VON NEXTCLOUD UND DOCKER* ZAHLREICHE SCHRITT-FÜR-SCHRITT-ANLEITUNGEN UND WERTVOLLE PRAXIS-TIPPSMit diesem Buch lernen Sie umfassend alles, was Sie brauchen, um Ihr Synology NAS an Ihre persönlichen Bedürfnisse anzupassen und das Potenzial Ihres Geräts voll auszuschöpfen. Dabei gibt der Autor Ihnen zahlreiche praktische Tipps an die Hand. So können Sie all Ihre Dateien wie Musik, Videos und Fotos zentral sichern und effektiv verwalten.Andreas Hofmann stellt die verschiedenen NAS-Modelle vor, so dass Sie wissen, welches für Sie am besten geeignet ist. In leicht nachvollziehbaren Schritten erläutert er detailliert, wie Sie Ihr NAS in Betrieb nehmen und mit dem DiskStation Manager (DSM 7) konfigurieren.Anhand einfacher Schritt-für-Schritt-Anleitungen zeigt er Ihnen, wie Sie Ihr NAS als Private Cloud und Home Server optimal einrichten: Dateien sichern, verwalten und mit anderen teilen, Benutzer verwalten, Fernzugriff einrichten, automatische Backups erstellen sowie Office-Dokumente und Multimedia-Dateien freigeben und mit dem SmartTV und anderen Geräten wiedergeben.Für alle, die noch mehr aus ihrem Synology NAS herausholen möchten, geht der Autor auf weiterführende Themen wie Datensicherheit und die Überwachung und Optimierung des Betriebs ein und zeigt Ihnen die Konfiguration abseits der grafischen Benutzeroberfläche für die Einrichtung eines eigenen Webservers und der beliebten Cloud-Lösung Nextcloud.AUS DEM INHALT:* Kaufberatung und Inbetriebnahme* DiskStation Manager (DSM) im Detail* Dateien zentral verwalten mit der File Station* RAID-Konfiguration und automatische Backups* Dateifreigabe und Fern-zugriff via App, FTP u.v.m.* Datensicherheit, Virenschutz und Firewall* Fotos organisieren und teilen mit Synology Photos* Musik zentral verwalten mit der Audio Station* Filme katalogisieren und streamen mit der Video Station und Plex* Office-Dokumente, Kalender, Adressbuch und Notizen verwalten* E-Mail-Server einrichten* Zentrales Download-Management* Videoüberwachung mit der Surveillance Station* Zugriff per Kommandozeile* Webserver und Datenbanken* Nextcloud* Anwendungsvirtualisierung mit DockerAKTUELL ZU DSM 7Andreas Hofmann ist Softwareentwickler für serverbasierte Multimedia-Anwendungen. Sein Blog blog.viking-studios.net ist eine der wichtigsten Anlaufstellen, wenn es um den Betrieb von Nextcloud auf NAS-Geräten von Synology geht.

Regulärer Preis: 19,99 €
Produktbild für Die Geheimnisse von Monkey Island

Die Geheimnisse von Monkey Island

Unterhaltsam, kurzweilig, informativ: „Die Geheimnisse von Monkey Island – Auf Kapertour mit Pixel-Piraten“ ist DAS Buch für Fans der legendären Point’n’Click-Adventure-Reihe „Monkey Island“. Das Buch erschien zeitgleich zum neuen Teil von Monkey Island, der erstmals nach 30 Jahren wieder vom ursprünglichen Entwickler Ron Gilbert kreiert wurde."Macht, was ihr wollt, aber macht coole Sachen!" - George Lucas am 1. Mai 1982. Das war das einzige Ziel, das George Lucas seinen zwanzig jungen, ehrgeizigen, lustigen und schlecht frisierten Game-Designern als Rahmen für die Entwicklung von eigenen Computerspielen setzte. Lucasfilm Games und später LucasArts wurde in der Folgezeit zu einer legendären Spieleschmiede, auch durch die Veröffentlichung von The Secret of Monkey Island™ im Jahr 1990. Das bekannteste Point‘n‘Click-Adventure verdankt seinen legendären Ruf seiner herrlich anachronistischen Welt voller bunter Piraten und seinem von Monty Python inspirierten Humor, aber auch schlicht und einfach der Tatsache, dass es ein komplettes Genre revolutioniert hat. Dieses Buch ist eine Hommage an die Abenteuer von Guybrush Threepwood, einem genialen Piraten. Aber es möchte Ihnen auch in vielen Details schildern, wie Monkey Island durch seine einzigartige Erzählkunst zum Meilenstein in der Videospielgeschichte wurde.Darüber hinaus bietet es die Gelegenheit, auf die turbulente Historie von LucasArts und Telltale Games zurückzublicken, Rezepte für Voodoo-Grog zu entdecken, interaktive Piratenreggae-Songs zu lernen, auf einer mondänen Party unter 40-jährigen Geeks zu glänzen und Sprüche zu erkunden, die so scharf wie ein Entermesser sind (nützlich für Duelle oder Geburtstagsfeiern). Inhalt:Vorwort von Larry Ahern: Mäandern auf der Affeninsel Prolog: Das Abenteuer laut LucasArts Einleitung Kapitel 1: Lucasfilm Games Kapitel 2: Von der interaktiven Erzählung zu Point&Click Kapitel 3: Spielmotor SCUMM Kapitel 4: Neuerfindung des Adventures Kapitel 5: The Secret of Monkey Island Kapitel 6: Von Lucasfilm Games zu LucasArts Kapitel 7: Monkey Island 2: LeChuck's Revenge Kapitel 8: iMUSE! Interaktive Reggae-Musik, Mann! Kapitel 9: Das Ende einer Ära Kapitel 10: The Curse of Monkey Island Kapitel 11: Curse of Monkey Island: Der Film Kapitel 12: Escape from Monkey Island Kapitel 13: Das Adventure-Game ist tot! Kapitel 14: Telltale Games Kapitel 15: Tales of Monkey Island Kapitel 16: Monkey Island Special Edition Kapitel 17: Leben und Sterben von LucasArts Kapitel 18: Die Geheimnisse von Monkey Island Kapitel 19: Das Erbe von Monkey Island Kapitel 20: Ron Gilbert vs. Disney Kapitel 21: Return to Monkey Island Kapitel 22: Ron Gilbert enthüllt das wahre Geheimnis von Monkey Island!!! Kapitel 23: Finale: So long... Anhang 1: Beleidigungsduell Anhang 2: Mojo-Credits Anhang 3: Plank of Love

Regulärer Preis: 24,90 €
Produktbild für Android für Senioren (5. Auflage)

Android für Senioren (5. Auflage)

Einrichten, Einstellungen, Updates - Ihr Einstieg in die Android WeltSie haben ein Smartphone oder Tablet mit Android-Betriebssystem gekauft oder geschenkt bekommen?Dann ist dieses Buch der ideale Begleiter dazu. Die inzwischen fünfte Auflage des beliebten Titels von Erfolgsautor Günter Born macht Sie in anschaulichen Schritt-für-Schritt-Anleitungen mit den Funktionen Ihres Android-Gerätes vertraut.Alle wichtigen Themen werden abgedeckt: Telefonieren, Surfen, Mailen, Fotografieren, Musik, Videos, Sicherheit von Gerät und Daten, WLAN einrichten, hilfreiche Apps – alles wird leicht nachvollziehbar erklärt, sodass Sie mühelos mit Ihrem Android-Smartphone oder Android-Tablet zurechtkommen.Aus dem Inhalt:Android-Einstieg: erste SchritteBedienung und AppsSurfen und MailenFoto-AppsUnterhaltung: Musik, Videos, E-BooksKommunikation, Kontakte und KalenderInteressante und nützliche Apps: Routenplanung, Reise-Apps, Gesundheit und Fitness, Einkaufen, Notizen, TextbearbeitungEinrichten, Einstellungen, UpdatesKleine Hilfen und LexikonLeseprobe (PDF-Link)

Regulärer Preis: 19,95 €
Produktbild für PowerPoint 2021, 2019 + Microsoft 365

PowerPoint 2021, 2019 + Microsoft 365

- Überzeugende Präsentationen professionell gestalten- Anschauliche Anleitungen und Beispiele- Von einer Dozentin geschrieben, mit praktischen Anwendertipps Überzeugen Sie durch eine professionelle und ansprechende Präsentation und nutzen Sie dafür das ganze Potenzial von PowerPoint! Wie Sie Ihre Folien optimal designen und warum weniger manchmal mehr ist, zeigt Ihnen die erfahrene Dozentin Inge Baumeister. Sie erklärt Ihnen, wie Sie – abgestimmt auf Ihre Firma oder Ihren Verein – individuelle Layouts und Farben zusammenstellen und Ihre Inhalte u. a. mit Diagrammen, SmartArt, grafischen Elementen, Videos und Animationen in Szene setzen. Präsentieren Sie Ihre Folien in der Referentenansicht, gestalten Sie den Ablauf flexibel, behalten Sie Ihre Notizen im Blick und zeichnen Sie Ihre Vorführung als Video auf.Ob Einsteiger oder Anwender mit Vorkenntnissen: Freuen Sie sich auf ein praktisches Arbeitsbuch sowie systematisches Nachschlagewerk voller gut nachvollziehbarer Anleitungen und hilfreicher Tipps! Ihr Bonus: Mit den Beispielen aus dem Buch, die als Download verfügbar sind, können Sie aktiv üben und Ihr Wissen festigen. Aus dem Inhalt:- Für die Office-Versionen 2021 und 2019 sowie für Microsoft 365- Folien mit Farben, Schriften und Textelementen gestalten- Eigene Vorlagen zusammenstellen und speichern- Gewusst wie: effizientes Arbeiten mit Folienmastern- Grafische Textlayouts (SmartArt) statt eintöniger Aufzählungen- Bilder, Formen und Diagramme gekonnt einsetzen- Folienübergänge und -objekte animieren- Die Folienabfolge mit Zoom steuern - Video und Sound einbinden- Notizen, zielgruppenorientierte Präsentationen u. v. m.- Bildschirmpräsentation vorführen, drucken und weitergeben- Ablauf aufzeichnen und Präsentation als Video speichern- Tipps und Hinweise für eine gelungene Präsentation 

Regulärer Preis: 14,99 €
Produktbild für Windows 11 Pannenhilfe XL

Windows 11 Pannenhilfe XL

Wichtige Werkzeuge für Wartung und Problemlösung Irgendwann passiert es: Was gestern noch ohne Komplikationen funktionierte, führt heute zu einer Fehlermeldung. Der Computer startet auf einmal langsam, die Internetanwendung ist nicht verfügbar, Anwendungen laufen nicht mehr richtig, Windows friert ein oder das System stürzt komplett ab. Hilfreiche Lösungsansätze für Windows-Störfälle, Werkzeuge zur Fehleranalyse und Sofortmaßnahmen bietet Ihnen der Windows-Experte Wolfram Gieseke. Mit praxisnahen Anleitungen zeigt er auf, wie Sie Ihr System wieder einwandfrei zum Laufen bringen und den Verlust wichtiger Daten verhindern. Tipps zu vorbeugenden Maßnahmen, Windows-Bordmitteln und frei verfügbaren Spezialtools unterstützen Sie dabei, dass Ihr Windows-Rechner schnell und stabil läuft.Aus dem InhaltAllgemeines Vorgehen im ProblemfallProbleme mit BIOS/UEFI korrigierenBremsen beim Windows-Start aufspürenWindows-Fehler oder -Abstürze behebenSchwierigkeiten mit Windows-Updates verhindernFehler auf der Windows-Oberfläche beseitigenProbleme mit USB-Geräten abstellenTreiberprobleme erkennen und beseitigenVerbindungsprobleme bei Netzwerk und WLANSchwierigkeiten mit Aktivierung, Lizenz und EchtheitsprüfungViren und Trojaner bekämpfenWichtige Werkzeuge für Wartung und ProblemlösungLeseprobe (PDF-Link)AutorWolfram Gieseke (* 1971 in Erfurt) ist ein international tätiger Sachbuchautor zu IT-Themen. Seine Anfang der 1990er Jahre gestartete schriftstellerische Tätigkeit umfasst mit über 50 Werken das gesamte Spektrum von Einstiegsliteratur zu den Themen Betriebssysteme und Anwendungen bis hin zu Fachliteratur in den Bereichen Netzwerksicherheit und Programmierung. Er veröffentlichte lange Jahre beim Verlag Data Becker. Seit dessen Schließung erscheinen seine Bücher bei Markt+Technik Verlag und O'Reilly Verlag. Er lebt in der Nähe von Osnabrück

Regulärer Preis: 19,95 €
Produktbild für Network Science

Network Science

NETWORK SCIENCENetwork Science offers comprehensive insight on network analysis and network optimization algorithms, with simple step-by-step guides and examples throughout, and a thorough introduction and history of network science, explaining the key concepts and the type of data needed for network analysis, ensuring a smooth learning experience for readers. It also includes a detailed introduction to multiple network optimization algorithms, including linear assignment, network flow and routing problems. The text is comprised of five chapters, focusing on subgraphs, network analysis, network optimization, and includes a list of case studies, those of which include influence factors in telecommunications, fraud detection in taxpayers, identifying the viral effect in purchasing, finding optimal routes considering public transportation systems, among many others. This insightful book shows how to apply algorithms to solve complex problems in real-life scenarios and shows the math behind these algorithms, enabling readers to learn how to develop them and scrutinize the results. Written by a highly qualified author with significant experience in the field, Network Science also includes information on:* Sub-networks, covering connected components, bi-connected components, community detection, k-core decomposition, reach network, projection, nodes similarity and pattern matching* Network centrality measures, covering degree, influence, clustering coefficient, closeness, betweenness, eigenvector, PageRank, hub and authority* Network optimization, covering clique, cycle, linear assignment, minimum-cost network flow, maximum network flow problem, minimum cut, minimum spanning tree, path, shortest path, transitive closure, traveling salesman problem, vehicle routing problem and topological sortWith in-depth and authoritative coverage of the subject and many case studies to convey concepts clearly, Network Science is a helpful training resource for professional and industry workers in, telecommunications, insurance, retail, banking, healthcare, public sector, among others, plus as a supplementary reading for an introductory Network Science course for undergraduate students. CARLOS ANDRE REIS PINHEIRO is a Distinguished Data Scientist at SAS, USA. Dr. Pinheiro received his DSc in Engineering from the Federal University of Rio de Janeiro and has published several papers in international journals and conferences. He is the author of Heuristics in Analytics and Social Network Analysis in Telecommunications, both published by Wiley. Preface xAcknowledgments xiiiAbout the Author xivAbout the Book xv1 CONCEPTS IN NETWORK SCIENCE 11.1 Introduction 11.2 The Connector 21.3 History 31.3.1 A History in Social Studies 41.4 Concepts 51.4.1 Characteristics of Networks 71.4.2 Properties of Networks 71.4.3 Small World 81.4.4 Random Graphs 111.5 Network Analytics 121.5.1 Data Structure for Network Analysis and Network Optimization 131.5.1.1 Multilink and Self-Link 141.5.1.2 Loading and Unloading the Graph 151.5.2 Options for Network Analysis and Network Optimization Procedures 151.5.3 Summary Statistics 161.5.3.1 Analyzing the Summary Statistics for the Les Misérables Network 171.6 Summary 212 SUBNETWORK ANALYSIS 232.1 Introduction 232.1.1 Isomorphism 252.2 Connected Components 262.2.1 Finding the Connected Components 272.3 Biconnected Components 352.3.1 Finding the Biconnected Components 362.4 Community 382.4.1 Finding Communities 452.5 Core 582.5.1 Finding k-Cores 592.6 Reach Network 622.6.1 Finding the Reach Network 652.7 Network Projection 702.7.1 Finding the Network Projection 722.8 Node Similarity 772.8.1 Computing Node Similarity 822.9 Pattern Matching 882.9.1 Searching for Subgraphs Matches 912.10 Summary 983 NETWORK CENTRALITIES 1013.1 Introduction 1013.2 Network Metrics of Power and Influence 1023.3 Degree Centrality 1033.3.1 Computing Degree Centrality 1033.3.2 Visualizing a Network 1103.4 Influence Centrality 1143.4.1 Computing the Influence Centrality 1153.5 Clustering Coefficient 1213.5.1 Computing the Clustering Coefficient Centrality 1213.6 Closeness Centrality 1243.6.1 Computing the Closeness Centrality 1243.7 Betweenness Centrality 1293.7.1 Computing the Between Centrality 1303.8 Eigenvector Centrality 1363.8.1 Computing the Eigenvector Centrality 1373.9 PageRank Centrality 1443.9.1 Computing the PageRank Centrality 1443.10 Hub and Authority 1513.10.1 Computing the Hub and Authority Centralities 1523.11 Network Centralities Calculation by Group 1573.11.1 By Group Network Centralities 1583.12 Summary 1644 NETWORK OPTIMIZATION 1674.1 Introduction 1674.1.1 History 1674.1.2 Network Optimization in SAS Viya 1704.2 Clique 1704.2.1 Finding Cliques 1724.3 Cycle 1764.3.1 Finding Cycles 1774.4 Linear Assignment 1794.4.1 Finding the Minimum Weight Matching in a Worker-Task Problem 1814.5 Minimum-Cost Network Flow 1854.5.1 Finding the Minimum-Cost Network Flow in a Demand–Supply Problem 1884.6 Maximum Network Flow Problem 1944.6.1 Finding the Maximum Network Flow in a Distribution Problem 1954.7 Minimum Cut 1994.7.1 Finding the Minimum Cuts 2014.8 Minimum Spanning Tree 2054.8.1 Finding the Minimum Spanning Tree 2064.9 Path 2084.9.1 Finding Paths 2114.10 Shortest Path 2204.10.1 Finding Shortest Paths 2234.11 Transitive Closure 2354.11.1 Finding the Transitive Closure 2364.12 Traveling Salesman Problem 2394.12.1 Finding the Optimal Tour 2434.13 Vehicle Routing Problem 2494.13.1 Finding the Optimal Vehicle Routes for a Delivery Problem 2534.14 Topological Sort 2654.14.1 Finding the Topological Sort in a Directed Graph 2664.15 Summary 2685 REAL-WORLD APPLICATIONS IN NETWORK SCIENCE 2715.1 Introduction 2715.2 An Optimal Tour Considering a Multimodal Transportation System – The Traveling Salesman Problem Example in Paris 2725.3 An Optimal Beer Kegs Distribution – The Vehicle Routing Problem Example in Asheville 2855.4 Network Analysis and Supervised Machine Learning Models to Predict COVID-19 Outbreaks 2985.5 Urban Mobility in Metropolitan Cities 3065.6 Fraud Detection in Auto Insurance Based on Network Analysis 3125.7 Customer Influence to Reduce Churn and Increase Product Adoption 3205.8 Community Detection to Identify Fraud Events in Telecommunications 3245.9 Summary 328Index 329

Regulärer Preis: 76,99 €
Produktbild für Photoshop Elements 2023 For Dummies

Photoshop Elements 2023 For Dummies

TRANSFORM YOUR IMAGES FROM ORDINARY TO EXTRAORDINARY IN PHOTOSHOP ELEMENTSGreat for non-professional photographers and designers, Adobe's Photoshop Elements is packed with all the photo editing tools you need to turn your images into showstoppers. And with the help of Photoshop Elements 2023 For Dummies, you'll discover the ins and outs of this affordable, beginner-friendly photo editing software. Learn all the tricks for simple, one-click fixes, before leaping into more advanced editing features. Work with layers, brighten colors, add filters, and make your images pop!* Learn the basics of Photoshop Elements and quickly improve your photos* Enhance color, boost contrast, and sharpen your images* Get to know more advanced Photoshop tools like layers* Create eye-catching images and improve your designsThis book is for you whether you’re new to Photoshop Elements or an experienced user needing a refresh on the latest features. You’re in good hands with Dummies. BARBARA OBERMEIER is principal of Obermeier Design and the Chair of the Visual Arts Department at California Lutheran University. TED PADOVA has written more than 70 computer applications aftermarket books primarily on Adobe Creative Cloud programs. INTRODUCTION 1About This Book 1Icons Used in This Book 2Beyond the Book 3Where to Go from Here 3PART 1: GETTING STARTED WITH PHOTOSHOP ELEMENTS 2023 5CHAPTER 1: GETTING STARTED WITH IMAGE EDITING 7Getting Familiar with the Home Screen 7Launching the Photo Editor 9Making Basic Edits in Quick Mode 10Sharing a Photo 12Retracing Your Steps 14Using the History panel 14Reverting to the last save 16Getting a Helping Hand 16Saving Files with Purpose 17Using the Save/Save As dialog box 17Saving files for the web 19CHAPTER 2: BASIC IMAGE-EDITING CONCEPTS 21Grappling with the Ubiquitous Pixels 22Understanding resolution 23Understanding image dimensions 25The Art of Resampling 25Choosing a Resolution for Print or Onscreen 28Working with File Formats 29JPEG (*.jpg, *.jpeg, *.jpe) 29PNG (*.png) 31TIFF (*.tif, *.tiff) 31Getting Familiar with Color 32Getting Color Right 33Color the easy way 34Calibrating your monitor 34Choosing a color workspace 35Understanding how profiles work 36CHAPTER 3: EXPLORING THE PHOTO EDITOR 37Examining the Photo Editor 37Examining the image window 41Uncovering the contextual menus 46Selecting the tools 46Selecting from the Tool Options 49Playing with panels 49Using the Photo Bin 53Creating different views of an image 53Viewing filenames 54Using Photo Bin Actions 54Using Some Creative Features 55Using Guided Edits 55Searching Guided Edits 56Controlling the Editing Environment 56Launching and navigating Preferences 57Checking out all the Preferences panes 58Perusing preset libraries 60PART 2: MANAGING MEDIA 63CHAPTER 4: NAVIGATING THE ORGANIZER 65Organizing Photos and Media on a Hard Drive 66Adding Images to the Organizer 68Adding files from folders and removable media 68Downloading camera images with the Elements Downloader 70Importing additional photos from folders 72Navigating the Media Browser 73Using a Scanner 74Understanding image requirements 75Using scanner plug-ins (Windows) 75Scanning on the Mac 77Scanning many photos at a time 77Phoning in Your Images 78Setting Organizer Preferences 80CHAPTER 5: ORGANIZING YOUR PICTURES 83Touring the Organizer 83Organizing Groups of Images with Tags 87Creating and viewing a tag 87Adding icons to tags 90Working with custom tags 91Working with default tags 92Working with sub-categories 93Sorting photos according to tags 94Auto Generating Tags 95Working with Auto Creations 95Adding new Events 96Rating Images with Stars 96Adding Images to an Album 98Creating an album 98Using albums for temporary work 100Editing an album 100Finding out more about sharing your albums 101Adding People in the Media Browser 101Placing Pictures on Maps 103Working with Events 105CHAPTER 6: VIEWING AND FINDING YOUR IMAGES 107Cataloging Files 107Using the Catalog Manager 108Working with catalogs 109Backing up your catalog 110Backing up photos and files 111Switching to a Different View 112Viewing Photos in Memories (Slideshow) 113Searching for Photos 115Using Search 115Searching for untagged items 117Searching captions and notes 117Searching by history 118Searching metadata 118Searching similarities 120Grouping Files That Get in the Way 121Marking files as hidden 121Stackin’ ’em up 122Creating versions 123PART 3: SELECTING AND CORRECTING PHOTOS 125CHAPTER 7: EDITING CAMERA RAW IMAGES 127Launching the Camera Raw Editor 127Understanding Camera Raw 128Learning Raw file format attributes 129Opening images in the Camera Raw Editor 130Getting Familiar with the Raw Editor 131Getting Familiar with the Panels 135Using the Basic panel 136Sharpening and reducing noise 139Using the Calibration panel 142Working with Filmstrips 142Working with Profiles 144Looking at the Adobe Camera Raw profiles 144Managing profiles 146Creating a Favorites list 147Opening Non-Raw Images in the Camera Raw Editor 147Changing Image Defaults 148Working with XML Files and Preferences 148Changing program defaults 149Using Save Options 150Using sidecar files 151CHAPTER 8: MAKING AND MODIFYING SELECTIONS 153Defining Selections 153Creating Rectangular and Elliptical Selections 154Perfecting squares and circles with Shift and Alt (Option on the Mac) 156Applying Marquee options 157Making Freeform Selections with the Lasso Tools 159Selecting with the Lasso tool 159Getting straight with the Polygonal Lasso tool 160Snapping with the Magnetic Lasso tool 162Working Wizardry with the Magic Wand 164Talking about Tolerance 165Wielding the Wand to select 165Modifying Your Selections 168Adding to, subtracting from, and intersecting a selection 168Avoiding key collisions 169Painting with the Selection Brush 169Painting with the Quick Selection Tool 171Selecting with the Auto Selection Tool 173Selecting Your Subject 175Fine-Tuning with the Refine Selection Brush 176Working with the Cookie Cutter Tool 178Eliminating with the Eraser Tools 180The Eraser tool 180The Background Eraser tool 181The Magic Eraser tool 183Using the Select Menu 183Selecting all or nothing 183Reselecting a selection 184Inversing a selection 184Feathering a selection 184Refining the edges of a selection 185Using the Modify commands 186Applying the Grow and Similar commands 187Saving and loading selections 187CHAPTER 9: WORKING WITH LAYERS 189Getting to Know Layers 189Converting a background to a layer 190Anatomy of the Layers panel 191Using the Layer and Select menus 194Working with Different Layer Types 196Image layers 196Adjustment layers 197Fill layers 200Shape layers 201Type layers 202Tackling Layer Basics 202Creating a new layer from scratch 202Using Layer via Copy and Layer via Cut 204Duplicating layers 204Dragging and dropping layers 204Using the Paste into Selection command 205Moving a Layer’s Content 206Transforming Layers 207Adding Layer Masks 208Flattening and Merging Layers 210Flattening layers 211Merging layers 212CHAPTER 10: SIMPLE IMAGE MAKEOVERS 213Cropping and Straightening Images 213Cutting away with the Crop tool 214Fixing distortion with the Perspective Crop tool 216Cropping with a selection border 218Straightening images 218Recomposing Images 219Employing One-Step Auto Fixes 222Auto Smart Fix 222Auto Smart Tone 222Auto Levels 224Auto Contrast 225Auto Haze Removal 225Auto Color Correction 225Auto Shake Reduction 226Auto Sharpen 226Auto Red Eye Fix 227Editing in Quick Mode 229Fixing Small Imperfections with Tools 233Cloning with the Clone Stamp tool 233Retouching with the Healing Brush 235Zeroing in with the Spot Healing Brush 237Repositioning with the Content-Aware Move tool 239Lightening and darkening with Dodge and Burn tools 241Smudging away rough spots 243Softening with the Blur tool 244Focusing with the Sharpen tool 245Sponging color on and off 246Replacing one color with another 248CHAPTER 11: CORRECTING CONTRAST, COLOR, AND CLARITY 251Editing Your Photos Using a Logical Workflow 252Adjusting Lighting 253Fixing lighting with Shadows/Highlights 253Using Brightness/Contrast 254Pinpointing proper contrast with Levels 255Adjusting Color 258Removing color casts automatically 258Adjusting with Hue/Saturation 260Eliminating color with Remove Color 261Switching colors with Replace Color 262Correcting with Color Curves 263Adjusting skin tones 266Defringing layers 267Eliminating haze 269Adjusting color temperature with photo filters 270Mapping your colors 271Adjusting Clarity 272Removing noise, artifacts, dust, and scratches 272Blurring when you need to 273Sharpening for better focus 276Opening closed eyes 278Colorizing a photo 279Smoothing skin 281Adjusting facial features 282Reducing shake 284Moving Overlays 284Moving Photos 286Moving Elements 287Working Intelligently with the Smart Brush Tools 289PART 4: EXPLORING YOUR INNER ARTIST 293CHAPTER 12: PLAYING WITH FILTERS, EFFECTS, STYLES, AND MORE 295Having Fun with Filters 295Applying filters 296Corrective or destructive filters 297One-step or multistep filters 297Fading a filter 298Selectively applying a filter 298Working in the Filter Gallery 299Distorting with the Liquify filter 301Correcting Camera Distortion 303Exploring Elements’ Unique Filters 305Creating a comic 305Getting graphic 306Using the Pen and Ink filter 308Dressing Up with Photo and Text Effects 308Adding Shadows, Glows, and More 311Applying styles 312Working with styles 313Using the Graphics panel 314Mixing It Up with Blend Modes 315General blend modes 315Darken blend modes 316Lighten blend modes 317Lighting blend modes 319Inverter blend modes 319HSL blend modes 321Using Photomerge 322Photomerge Panorama 322Photomerge Group Shot 324Photomerge Scene Cleaner 326Photomerge Exposure 327Photomerge Compose 330CHAPTER 13: DRAWING AND PAINTING 333Choosing Color 333Working with the Color Picker 334Dipping into the Color Swatches panel 335Sampling with the Eyedropper tool 337Getting Artsy with the Pencil and Brush Tools 339Drawing with the Pencil tool 339Painting with the Brush tool 341Using the Impressionist Brush 343Creating your own brush 345Filling and Outlining Selections 347Fill ’er up 347Outlining with the Stroke command 348Splashing on Color with the Paint Bucket Tool 349Working with Multicolored Gradients 350Applying a preset gradient 351Customizing gradients 353Working with Patterns 355Applying a preset pattern 356Creating a new pattern 356Creating Shapes of All Sorts 357Drawing a shape 358Drawing multiple shapes 360Specifying Geometry options 361Editing shapes 362CHAPTER 14: WORKING WITH TYPE 365Understanding Type Basics 365Tools 366Modes 366Formats 367Creating Point Type 367Creating Paragraph Type 369Creating Path Type 370Using the Text On Selection tool 370Using the Text On Shape tool 371Using the Text On Custom Path tool 373Specifying Type Options 374Editing Text 376Simplifying Type 377Masking with Type 378Stylizing and Warping Type 381Adjusting type opacity 381Applying filters to your type 381Painting your type with color and gradients 383Warping your type 384Using Text Overlay Templates 385PART 5: PRINTING, CREATING, AND SHARING 387CHAPTER 15: GETTING IT ON PAPER 389Getting Pictures Ready for Printing 390Working with Color Printer Profiles 391Printing a photo with the printer managing color 393Printing a photo with Elements managing color 395Printing a picture package or contact sheet 396Getting Familiar with the Print Dialog Box 396Using the Prints options 396Creating transfers, borders, and more with More Options 398Outsourcing Printing 399CHAPTER 16: SHARING YOUR WORK 401Getting Familiar with the Elements Sharing Options 401Planning ahead 402Understanding photo sharing in Elements 403Using the Share Panel 404Emailing photos 405Working with Adobe Premiere Elements 408Sharing your photos on social networks 408CHAPTER 17: MAKING CREATIONS 411Checking Out the Create Panel 411Grasping Creation-Assembly Basics 414Creating a Quote Graphic 418Creating a Memories Video 421Creating a PDF Slideshow 422Making Additional Creations 422CHAPTER 18: CREATING AND SHARING ON ELEMENTS WEB 423Launching Elements Web 423Uploading files from the Organizer 424Uploading files from the Share menu 425Uploading files from the Photo Editor 426Sharing Photos 427Sharing to Facebook 428Sharing on Elements Web 431Getting familiar with the Elements Web interface 432Managing images 433Making Creations 436Working with slideshows 436Viewing .mp4 video files 438Making photo collages 440PART 6: THE PART OF TENS 441CHAPTER 19: THE TEN BEST GUIDED EDITS 443Correct Skin Tone 443Sharpen 445Object Removal 446Perfect Portrait 448Replace Background 451Remove a Color Cast 453Levels 454Resize Your Photo 456Recompose 457Move & Scale Object 459CHAPTER 20: TEN (OR SO) MORE PROJECT IDEAS 463Screen Savers 463Flyers, Ads, and Online Auctions 464Clothes, Hats, and More 466Posters 467Household and Business Inventories 467Project Documentation 468School Reports and Projects 468Blogs 468Wait — There’s More 468Index 469

Regulärer Preis: 25,99 €
Produktbild für Building Quality Shaders for Unity®

Building Quality Shaders for Unity®

Understand what shaders are and what they’re used for: Shaders are often seen as mystical and difficult to develop, even by skilled programmers, artists, and developers from other game design disciplines. This book dispels that idea by building up your shader knowledge in stages, starting with fundamental shader mathematics and how shader development mindset differs from other types of art and programming, and slowly delves into topics such as vertex and fragment shaders, lighting, depth-based effects, texture mapping, and Shader Graph.This book presents each of these topics with a comprehensive breakdown, the required theory, and some practical applications for the techniques learned during each chapter. The HLSL (High Level Shading Language) code and Shader Graphs will be provided for each relevant section, as well as plenty of screenshots.By the end of this book, you will have a good understanding of the shader development pipeline and you will be fully equipped to start making your own aesthetic and performant shader effects for your own games!YOU WILL LEARN TO• Use shaders across Unity’s rendering pipelines• Write shaders and modify their behavior with C# scripting• Use Shader Graph for codeless development• Understand the important math behind shaders, particularly space transformations• Profile the performance of shaders to identify optimization targetsWHO IS THIS BOOK FORThis book is intended for beginners to shader development, or readers who may want to make the jump from shader code to Shader Graph. It will also include a section on shader examples for those who already know the fundamentals of shaders and are looking for specific use cases. Daniel Ilett is an ambitious and motivated PhD student at the University of Warwick. He is a passionate game developer, specialising in shaders and technical art. He publishes a range of educational and tutorial content, including videos and written work, aimed at beginners and intermediate developers. He also does freelance work on shaders and visual effects for games. Chapter 1: Introduction to Shaders in UnitySub-topics:• Brief overview of shader fundamentals• Unity’s built-in pipeline• URP (Universal Render Pipeline)• HDRP (High Definition Render Pipeline)Chapter 2: Maths for Shader DevelopmentSub-topics:• Vectors in 2D and 3D• Dot product, cross product, and other vector operations• Matrices• Multiplication, transpose, inverse, and common matrix operations• Important spaces in computer graphics• Homogeneous coordinate systems• Transformation between spacesChapter 3: Your Very First ShaderSub-topics:• The shader pipeline, and data flow• ShaderLab, SubShaders and Fallbacks• Shader Tags• The appdata struct: Input to the vertex shader• The vertex shader• The v2f struct: Data passed between the vertex and fragment shader• The fragment shaderChapter 4: Shader GraphSub-topics:• The argument for node-based editors• The vertex and fragment stages• Shader nodes & properties• Your first Shader GraphChapter 5: Textures, UV Coordinates & Normal MappingSub-topics:• What is texture mapping?• What are UV coordinates?• Scaling, rotating and offsetting UVs• Sampler states• Normal mapping & tangent spaceChapter 6: TransparencySub-topics:• Transparency vs opacity• Alpha-blended transparency• Sorting• Screen-door (“dithered”) transparencyChapter 7: The Depth Buffer• What is the depth buffer?• Depth-testing and culling• Depth-based shader effectsChapter 8: More Shader FundamentalsSub-topics:• Shader keywords and variants• Single- and multi-pass shaders• GrabPass and UsePass• Unity’s standard shader librariesChapter 9: Lighting & ShadowsSub-topics:• Lighting theory: Diffuse, specular, ambient, and Fresnel light• Phong shading• Physically based rendering• Shadow castingChapter 10: Image Effects & Post ProcessingSub-topics:• Post Processing in the Built-in pipeline, URP and HDRP• Convolution kernels, Gaussian blur and multi-pass effects.• Edge detection with a Sobel kernel• Better edge detection using the depth texture and normal textureChapter 11: Advanced ShadersSub-topics:• Geometry shaders: adding or modifying vertices• Tessellation shaders: subdividing a mesh• Building an LOD system with tessellation shaders• Compute shaders: arbitrary computation on the GPUChapter 12: Profiling & OptimizationSub-topics:• The Unity Profiler and Frame Debugger• Branching in shaders• Avoiding overdraw• Multi-material objects• BatchingChapter 13: Shader Recipes For Your GamesSub-topics:• World-space reconstruction in post processing shaders• Custom lighting: cel-shading (toon shading)• Vertex displacement – realistic water (Gerstner waves)• Refraction by modifying the framebuffer• Interactive snow layers (modifying the height of a mesh based on gameplay actions)• Holograms using emissive colour• Using Voronoi noise to make marble

Regulärer Preis: 62,99 €
Produktbild für Datenbasiert entscheiden

Datenbasiert entscheiden

Dieses Buch befasst sich mit der zielgerichteten Auswertung von vorhandenen Daten im Unternehmen. Während früher viele Entscheidungen aus dem Bauch heraus getroffen wurden, sind heute die resultierenden Erfolge durch das gestiegene Datenvolumen so gut messbar wie nie zuvor. Doch nicht jede Entscheidung wird durch Daten automatisch besser. Es gilt, Daten im Unternehmen zu identifizieren, Ziele zu definieren und die vorhandenen Daten sinnvoll auszuwerten. Damit dieser Schritt gelingt, zeigt dieses Buch anhand praktischer Tipps, wie auf Grundlage von Daten bessere Entscheidungen getroffen werden können. Neben den Grundlagen zur Datenanalyse werden Praxisbeispiele vorgestellt, aus denen anschließend Anregungen für Unternehmen abgeleitet werden.PAUL NIEBLER ist IT-Berater mit Schwerpunkt auf Data Science und unterstützt Kunden hauptsächlich in der Automobilbranche. Sein Ziel ist es, aus den bestehenden Daten neues Wissen zu extrahieren und diesen Erkenntnisgewinn verständlich an Fachabteilungen und Entscheidungsträger zu kommunizieren.DOMINIC LINDNER ist Associate Manager bei einem Rechenzentrumsprovider und promoviert im Bereich der Mittelstandsforschung an der FAU Erlangen-Nürnberg. Vor allem die Speicherung und schnelle Auswertung aus Sicht der Infrastruktur sind eine wichtige Herausforderung in seiner täglichen Arbeit.Vorbereitung der Daten im Unternehmen.- Daten im Unternehmen zielführend auswerten.- Objectives and Key Results (OKR).- Praxisbeispiele und Tipps für Entscheider.

Regulärer Preis: 9,99 €
Produktbild für Beginning Software Engineering

Beginning Software Engineering

DISCOVER THE FOUNDATIONS OF SOFTWARE ENGINEERING WITH THIS EASY AND INTUITIVE GUIDEIn the newly updated second edition of Beginning Software Engineering, expert programmer and tech educator Rod Stephens delivers an instructive and intuitive introduction to the fundamentals of software engineering. In the book, you’ll learn to create well-constructed software applications that meet the needs of users while developing the practical, hands-on skills needed to build robust, efficient, and reliable software. The author skips the unnecessary jargon and sticks to simple and straightforward English to help you understand the concepts and ideas discussed within. He also offers you real-world tested methods you can apply to any programming language. You’ll also get:* Practical tips for preparing for programming job interviews, which often include questions about software engineering practices* A no-nonsense guide to requirements gathering, system modeling, design, implementation, testing, and debugging* Brand-new coverage of user interface design, algorithms, and programming language choicesBeginning Software Engineering doesn’t assume any experience with programming, development, or management. It’s plentiful figures and graphics help to explain the foundational concepts and every chapter offers several case examples, Try It Out, and How It Works explanatory sections. For anyone interested in a new career in software development, or simply curious about the software engineering process, Beginning Software Engineering, Second Edition is the handbook you’ve been waiting for. ROD STEPHENS is a former Microsoft MVP, programmer, and award-winning instructor who speaks regularly at programming conferences and users’ group meetings. He has written more than 250 magazine articles as well as 37 books that have been translated into at least ten different languages on topics including C#, Python, and other languages. He runs the popular C# Helper and VB Helper web sites. Introduction xxviiPART I: SOFTWARE ENGINEERING STEP- BY- STEPChapter 1: Software Engineering From 20,000 Feet 3Chapter 2: Before the Beginning 15Chapter 3: the Team 29Chapter 4: Project Management 53Chapter 5: Requirements Gathering 81Chapter 6: High- Level Design 117Chapter 7: Low- Level Design 155Chapter 8: Security Design 185Chapter 9: User Experience Design 209Chapter 10: Programming 245Chapter 11: Algorithms 273Chapter 12: Programming Languages 307Chapter 13: Testing 327Chapter 14: Deployment 359Chapter 15: Metrics 371Chapter 16: Maintenance 401PART II: PROCESS MODELSChapter 17: Predictive Models 427Chapter 18: Iterative Models 445Chapter 19: Rad 465PART III: ADVANCED TOPICSChapter 20: Software Ethics 523Chapter 21: Future Trends 547Appendix: Solutions to Exercises 559Glossary 631Index 663

Regulärer Preis: 35,99 €
Produktbild für Blockchain Technology in Corporate Governance

Blockchain Technology in Corporate Governance

BLOCKCHAIN TECHNOLOGY IN CORPORATE GOVERANCETHIS BOOK INVESTIGATES THE RECENT APPLICATIONS OF BLOCKCHAIN TECHNOLOGY IN FINANCIAL SERVICES, ENERGY SECTOR, AND SUMMARIZES REGULATORY RESPONSES, TO SET THE SCENE FOR FUTURE WORK ON CORPORATE GOVERNANCE.This edited book highlights the current governance framework for the blockchain and its development as a self-governing framework. It discusses blockchain technology’s effectiveness in developing solutions for supply chains, trade finance, and banking. Moreover, it shows how banking and financial institutions are the major beneficiaries of this decentralized technology. Furthermore, the book outlines the link between company governance theories, regulatory, ethical, and social controls, and blockchain adoption. It also investigates the recent applications of blockchain technology in financial services, the health sector, and the energy sector. AUDIENCEThe book is specially designed for researchers, industrialists, engineers, graduate students, and policymakers, who aspire to learn, discuss, and carry out further research into the opportunities offered by blockchain and the possible ways of regulating it. KIRAN SOOD, PHD, is an associate professor in the Business School, Chitkara University, Punjab, India. She earned her doctorate in Commerce with a concentration on Product Portfolio Performance of general insurance companies in India in 2017 from Panjabi University, Patiala. Before joining Chitkara University in 2019, she worked in four organizations with a total experience of 16 years. She serves as an Editor of the International Journal of BioSciences and Technology and the International Journal of Research Culture Society. RAJESH KUMAR DHANARAJ, PHD, is an associate professor in the School of Computing Science and Engineering at Galgotias University, Greater Noida, U. P, India. He has published 35+ articles in various journals and conference proceedings and contributed chapters to various books. His research and publication interests include cyber-physical systems, wireless sensor networks, and cloud computing. He is an Expert Advisory Panel Member of Texas Instruments Inc USA. BALAMURUGAN BALUSAMY, PHD, is an associate professor at VIT University, Vellore, India. He has authored/edited about 30 books on various technologies. He has published more than 150 publications in quality journals, conferences, and book chapters. He serves on the advisory committees for several startups and forums and does consultancy work for the industry on Industrial IoT. SEIFEDINE KADRY, PHD, is a professor in theDepartment of Applied Data Science, Noroff University College, Kristinasnad, Norway, and the Department of Electrical and Computer Engineering, Lebanese American University, Byblos, Lebanon. He is also an ABET Program Evaluator of computing and an ABET Program Evaluator of engineering technology. His current research interests include data science, education using technology, system prognostics, stochastic systems, and probability and reliability analysis. Foreword xviiPreface xixAcknowledgment xxi1 Role of Blockchain Technology in the Modern Era 1Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Kiran Sood and Balamurugan BalusamyPART 1: BLOCKCHAIN: OPPORTUNITIES FOR HEALTHCARE 4.0 292 BTCG4: Blockchain Technology in Electronic Healthcare Systems 31Amrinder Singh and Geetika Madaan3 Blockchain Technology and Healthcare: Towards Combating COVID-19 57Reena Malik and Sonal Trivedi4 Blockchain-Based Energy-Efficient Heterogeneous Sensor Networks in Healthcare System 75R. Janarthanan and J. Venkatesh5 Development of a Safe Health Framework Using a Temporary Blockchain Technique 99J. Venkatesh and R. Janarthanan6 Data Consistency, Transparency, and Privacy in Healthcare Systems Using Blockchain Technology 125Kalaiselvi Rajendiran, Akshaya Sridhar and Ananda Vayaravel CassinadanePART 2: BLOCKCHAIN IN THE ENERGY@SECTOR 1437 Application of Blockchain Technology in Sustainable Energy@Systems 145Navdeep Kaur, Suman Bhullar and Navneet Seth8 Revamping Energy Sector with a Trusted Network: Blockchain@Technology 163Alain Aoun, Mazen Ghandour, Adrian Ilinca and Hussein IbrahimPART 3: THE IMPACT OF BLOCKCHAIN ON THE FINANCIAL INDUSTRY 1979 Process Innovation and Unification of KYC Document Management System with Blockchain in Banking 199Priya Jindal, Jasmine Kaur and Kiran Sood10 Applying Blockchain Technology to Address NPA Issues During the COVID-19 Pandemic 217Jasmine Kaur, Priya Jindal and Kiran Sood11 Blockchain and Smart Contracts for Insurance Industry 239Rupa Khanna Malhotra, Chandan Gupta and Priya Jindal12 How Blockchain Can Transform the Financial Services Industry 253Aashima and Birajit Mohanty13 The Impact of Blockchain Technology and COVID-19 on the Global Banking Industry 283Jyoti Verma and Gagandeep14 Blockchain-Based Framework -- A Scientific Tool for Developing a Robust Banking System 303Minakshi ThamanPART 4: BLOCKCHAIN APPLICATIONS AND SUSTAINABILITY ISSUES 32515 Advanced Cryptographic Technologies in Blockchain 327Osheen Oberoi and Sahil Raj16 Network Security Issues in Blockchain Architectures 353Keshav Kaushik17 A Comprehensive Report on Blockchain Technology, Its Applications, and Open Research Challenges 369Shilpi Garg, Rajesh Kumar Kaushal and Naveen Kumar18 New Blockchain Taxonomies and Trust Models Impacting Business@Performance 387Hani El Chaarani, Zouhour EL Abiad and Hebatallah Abd El Salam BadawyReferences 408Index 413

Regulärer Preis: 150,99 €
Produktbild für Introducing Micronaut

Introducing Micronaut

The microservice architecture has been adopted by many developer teams around the world. To be successful, it's crucial that you understand how to program a microservice and get it running in the cloud. This book will walk you through the process of how to build, test, and deploy a Java-based Micronaut microservice to the Oracle Cloud with GitHub Actions.You'll learn how to create a Virtual Machine (with both the Oracle Cloud Infrastructure (OCI) CLI and the OCI Gradle Plugin), as well as create and deploy the microservice as a Docker container that can be stored in Oracle Container Infrastructure Registry (OCIR) and deployed to an Oracle Kubernetes Engine (OKE) cluster. The microservice will use Micronaut Data for persistence, Testcontainers for testing, and Liquibase to manage your Oracle DB production schema.After reading or using this book, you'll be able to build, test and deploy your first microservices using the Micronaut framework, Oracle Cloud and more.WHAT YOU'LL LEARN* Build and deploy Java-based microservices using Micronaut and Oracle Cloud* Run tests and publishing reports* Deploy to Oracle Cloud using OCI CLI and the OCI Gradle plug-in* Add a persistence tier to the microservice* Distribute a microservice with persistenceWHO THIS BOOK IS FORProgrammers and software developers with experience in Java and microservices programming who are new to Micronaut.Todd Sharp is a software/web developer advocate for Oracle focusing on Oracle Cloud. He works with Micronaut and other Java frameworks to build, test and deploy microservices, web services and other web applications. He has worked with dynamic Java scripting languages, JVMs and various JavaScript frameworks for more than 14 years, originally with ColdFusion and more recently with Java/Groovy/Grails on the server side.1. Creating a Micronaut Application & Getting Started with GitHub Actions2. Building & Publishing a JAR3. Running Tests and Publishing Test Reports4. Deploying a Microservice to the Oracle Cloud with GitHub Actions and the OCI CLI5. Deploying a Microservice to the Oracle Cloud with GitHub Actions and the OCI Gradle Plugin6. Adding a Persistence Tier to the Microservice7. Testing the Persistence Tier with Testcontainers8. Deploying the Microservice with a Tested Persistence Tier in Place9. Deploying the Microservice as a Docker Container10. Deploying the Microservice Docker Container to Kubernetes.

Regulärer Preis: 56,99 €
Produktbild für Office für Senioren

Office für Senioren

Die Highlights von Office 2021 und Microsoft 365: Was ist neu, was ist anders?Dieses Buch mit großer, gut lesbarer Schrift führt Sie in das Office-Paket bzw. Microsoft 365 ein. In einfachen Schritt-für-Schritt-Anleitungen nimmt Sie Erfolgsautor Philip Kiefer mit auf eine Reise rund um das Thema Microsoft Office.Ob Sie in Word Briefe schreiben, in Excel Ihre Haushaltskosten in einer übersichtlichen Tabelle aufschlüsseln, Präsentationen in PowerPoint darstellen wollen oder in Outlook E-Mails an Ihre Enkel schreiben, der umfangreiche Einblick in die wichtigen Office-Funktionen hilft Ihnen, schon nach kurzer Zeit routiniert mit Microsoft Office umzugehen.Aus dem Inhalt:Ihre ersten Schritte mit Microsoft OfficeTexte verfassen: mit Word ganz einfachWeitere Inhalte in einen Text einfügenSeiten gestalten und ausdruckenMit Excel Tabellen erstellen und Berechnungen durchführenPräsentationen mit PowerPointE-Mails, Termine und Adressen mit OutlookDokumente in der Cloud speichern und mit anderen teilenLeseprobe (PDF-Link)

Regulärer Preis: 19,95 €
Produktbild für Linux All-In-One For Dummies

Linux All-In-One For Dummies

LINUX IS FOR EVERYONE!Linux All-in-One For Dummies breaks down the ever-popular operating system to its basics and trains users on the art of Linux. This handy reference covers all the latest updates and operating system features. It presents content on Linux desktops, applications, and more. With eight books in one, you’ll have access to the most comprehensive overview of Linux around. Explore the inner workings of Linux machines, so you’ll know Linux front to back. This all-inclusive handbook also walks you through solving Linux problems—complete with hands-on examples—so you’ll be a Linux whiz before you know it.* Get familiar with Linux as you install and customize the operating system* Learn how to navigate the file system, use the Linux shell, and get online* Become a Linux guru with server hosting, scripting, and security how-tos* Study for your Linux certification by using this complete guide as your referenceThis book is a massive source of support for beginning and intermediate Linux users, as well as those looking to brush up on their knowledge for certification. And, thanks to the signature Dummies approach, it’s also a lot of fun. RICHARD BLUM has more than 30 years’ experience in the IT industry working as a systems and network administrator. He is an online instructor for Linux and programming courses and is the author of Linux Command Line and Shell Scripting Bible, Linux Essentials, and Linux For Dummies.INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4BOOK 1: GETTING STARTED WITH LINUX 5CHAPTER 1: INTRODUCING LINUX 7What Is Linux? 7The Linux kernel 8GNU utilities 11Linux user interfaces 12Linux Distributions: Why So Many? 16Core Linux distributions 17Specialized Linux distributions 18CHAPTER 2: INSTALLING LINUX 21Dual-Booting with Linux and Microsoft Windows 23Installing a second hard drive 24Partitioning an existing drive 24Partitioning using Windows tools 25Partitioning using Linux tools 26Finally, Finally, Before You Get Started 27Disabling the secure boot feature 27Creating a boot disk 28Installing Ubuntu 30Your First Ubuntu Boot 36CHAPTER 3: LIVING IN A VIRTUAL WORLD 39What Are Virtual Servers? 39Installing VirtualBox 40Creating a Linux Virtual Machine 42Installing Linux on a Virtual Machine 45Changing settings 45Loading the operating system 47Working with the sandbox 50CHAPTER 4: TRYING OUT LINUX 53Starting Linux 53Playing with the Shell 56Starting the bash shell 56Understanding shell commands 58Trying a few Linux commands 58Shutting Down 60CHAPTER 5: TROUBLESHOOTING AND CUSTOMIZING LINUX 63Using Text Mode Installation 64Lookin’ for Trouble 64Using the kernel ring buffer 65Using log files 66Using the journal 67Resolving Other Installation Problems 68Using KNOPPIX boot commands 68Handling the fatal signal 11 error 71Getting around the PC reboot problem 71Using Linux kernel boot options 71Setting Up Printers 74Managing DVDs, CD-ROMs, and Flash Drives 76Updating the Operating System 77Updating Ubuntu 77Updating openSUSE 78Installing New Software 79Adding applications 80Adding packages 81BOOK 2: LINUX DESKTOPS 85CHAPTER 1: THE GNOME DESKTOP 87Looking at the History of GNOME 87Breaking Down the GNOME Desktop 88Menu, please! 88The desktop 90Exploring the Activities Overview 91Customizing Your Ride 92CHAPTER 2: THE KDE PLASMA DESKTOP 93The KDE Plasma Desktop 93The Application launcher 95The panel 96The desktop 96Using Widgets 98Adding widgets 98Getting more widgets 99Plasma System Settings 99Desktop Settings 100CHAPTER 3: OTHER POPULAR DESKTOPS 103Spicing Things Up with Cinnamon 103Reviewing the history of Cinnamon 104Looking at the menu 105Changing settings 105Adding more spice 106Working with MATE 107The history of MATE 107Looking at the menu 109Changing desktop settings 109Applets 110The Xfce Desktop Interface 111The history of Xfce 111The Whisker menu 112Changing Xfce settings 113Applets 113CHAPTER 4: LINUX DESKTOP APPLICATIONS 115The LibreOffice Suite 115Browsing the Web with Firefox 117Configuring Firefox 117Communicating with Email 119Evolving into email 120Working with KMail 121The amazing Thunderbird 123Listening to Audio 124Listening to downloaded music 127Viewing Movie Files 129Creating and Modifying Graphics 130CHAPTER 5: THE LINUX FILE SYSTEM 133Pieces of the Puzzle 133Touring the Linux File System 134The root of the tree 134Where removable media lives 136Managing Your File System without a Net (or Mouse) 136Viewing information about files on the command line 136Understanding file listing information 137Comprehending file types 139Navigating the file system in Linux 140A Permissions Primer 141Checking out the triplets 141Beware of owners 143Hanging out in groups 143Clicking Your Way through the File System 144Using files 145Swimming with Dolphin 149Don’t forget Xfce! 151Finding Things 152CHAPTER 6: TEXT EDITORS 155Viewing the Contents of a Text File 155Editing Text Files with nano 156Going with gedit 157Editing Text in the KDE Plasma Desktop 158Writing with KWrite 159Meet Kate 160Text Editing with ed and vi 161Using ed 162Using vi 165BOOK 3: NETWORKING 171CHAPTER 1: CONNECTING TO THE INTERNET 173Understanding the Internet 174Deciding How to Connect to the Internet 175Connecting with DSL 176How DSL works 176DSL alphabet soup: ADSL, IDSL, SDSL 177Typical DSL setup 179Connecting with a Cable Modem 180How a cable modem works 181Typical cable modem setup 182CHAPTER 2: SETTING UP A LOCAL AREA NETWORK 185Understanding TCP/IP 185IP addresses 187Internet services and port numbers 189Setting Up an Ethernet LAN 190How Ethernet works 191Ethernet cables 192Configuring TCP/IP Networking 195Connecting Your LAN to the Internet 196CHAPTER 3: GOING WIRELESS 199Understanding Wireless Ethernet Networks 199Understanding infrastructure and ad hoc modes 201Understanding wireless security 201Setting Up Wireless Hardware 203Configuring the Wireless Access Point 204Configuring Wireless Networks 205CHAPTER 4: MANAGING THE NETWORK 207Configuring Network Features 207Manually editing network configuration files 208Using a graphical tool 210Using a command-line tool 212Basic Network Troubleshooting 216Advanced Network Troubleshooting 218BOOK 4: ADMINISTRATION 223CHAPTER 1: WORKING WITH THE SHELL 225Opening Terminal Windows and Virtual Consoles 225Using the Bash Shell 228Understanding the syntax of shell commands 228Working with files 230Combining shell commands 231Controlling command input and output 231Going wild with asterisks and question marks 233Discovering and Using Linux Commands 235Becoming root (superuser) 240Managing processes 241Working with date and time 242Processing files 243Writing Shell Scripts 246CHAPTER 2: INTRODUCING BASIC SYSTEM ADMINISTRATION 249Taking Stock of System Administration Tasks 250Becoming root 251Using the su - command 251Using the sudo command 252Understanding How Linux Boots 252Understanding the SysVinit method 253Understanding the Systemd method 259Monitoring System Performance 264Using the top utility 264Using the uptime command 266Using the vmstat utility 267Checking disk performance and disk usage 267Viewing System Information with the /proc File System 270Understanding Linux Devices 273Device files 274Persistent device naming with udev 275Managing Loadable Driver Modules 276Loading and unloading modules 276Understanding the /etc/modprobe.d files 277Scheduling Jobs in Linux 278Scheduling one-time jobs 278Scheduling recurring jobs 281Introducing Some GUI System Administration Tools 284CHAPTER 3: MANAGING USERS AND GROUPS 287Adding User Accounts 288Managing user accounts by using a GUI user manager 288Managing user accounts by using commands 290Managing Groups 291Exploring the User Environment 292Changing User and Group Ownership of Files 295CHAPTER 4: MANAGING FILE SYSTEMS 297Exploring the Linux File System 297Understanding the file-system hierarchy 298Mounting a device on the file system 299Examining the /etc/fstab file 303Sharing Files with NFS 304Installing NFS 305Exporting a file system with NFS 306Mounting an NFS file system 307Accessing a DOS or Windows File System 308Mounting a DOS or Windows disk partition 308Mounting an NTFS partition 309BOOK 5: MANAGING LINUX SERVERS 311CHAPTER 1: HOSTING INTERNET SERVICES 313What Is a Linux Server? 313Launching services 314Listening for clients 316Serving the Basics 318Web services 319Database services 320Mail services 322Serving Local Networks 324File servers 325Print servers 326Network resource servers 326CHAPTER 2: MANAGING A WEB SERVER 331Linux Web Servers 331Apache 331NGINX 333The Apache Web Server 333Installing an Apache server 333Configuring an Apache server 336The NGINX Server 344Installing NGINX 344Configuring NGINX 346CHAPTER 3: MANAGING A DATABASE SERVER 349Using the MySQL/MariaDB Database 349Installing MariaDB 350Looking at the MariaDB command prompt 353Using the mysql commands 356Creating database objects 360Using the PostgreSQL Database 363Installing PostgreSQL 364Looking at the PostgreSQL command interface 366Creating PostgreSQL database objects 370CHAPTER 4: WORKING WITH SAMBA AND NFS 373Sharing Files with NFS 373Installing NFS 374Exporting a file system with NFS 375Mounting an NFS file system 378Setting Up a Windows Server Using Samba 378Installing Samba 380Configuring Samba 382Trying out Samba 383CHAPTER 5: MANAGING MAIL SERVERS 385Working with sendmail 385The sendmail configuration file 386Syntax of the sendmail.cf file 391Other sendmail files 393The forward file 395The sendmail alias file 395Working with Postfix 396A Mail-Delivery Test 398Using the mail command 399The mail-delivery mechanism 400BOOK 6: SECURITY 401CHAPTER 1: INTRODUCING LINUX SECURITY 403Why Worry about Security? 404Establishing a Security Framework 404Determining business requirements for security 406Performing risk analysis 406Establishing a security policy 408Implementing security solutions (mitigation) 409Managing security 410Securing Linux 410Understanding the host-security issues 411Understanding network-security issues 412Delving Into Computer Security Terminology and Tools 413Keeping Up with Security News and Updates 418CHAPTER 2: SECURING LINUX 419Securing Passwords 420Shadow passwords 420Pluggable authentication modules (PAMs) 421Protecting Files and Directories 422Viewing ownerships and permissions 423Changing file ownerships 423Changing file permissions 423Setting default permission 424Checking for set user ID permission 426Encrypting and Signing Files with GnuPG 427Understanding public key encryption 427Understanding digital signatures 428Using GPG 429Monitoring System Security 433Securing Internet Services 434Turning off stand-alone services 434Configuring the Internet super server 435Configuring TCP wrapper security 436Using Secure Shell for Remote Logins 437Setting Up Simple Firewalls 439Using NAT 442Enabling packet filtering on your Linux system 443Security Files to Be Aware Of 447CHAPTER 3: VULNERABILITY TESTING AND COMPUTER SECURITY AUDITS 449Understanding Security Audits 450Nontechnical aspects of security audits 450Technical aspects of security audits 451Implementing a Security Test Methodology 452Some common computer vulnerabilities 453Host-security review 454Network-security review 458Vulnerability Testing Types 460Exploring Security Testing Tools 461BOOK 7: SCRIPTING 465CHAPTER 1: INTRODUCTORY SHELL SCRIPTING 467Trying Out Simple Shell Scripts 468Exploring the Basics of Shell Scripting 469Storing stuff 470Calling shell functions 471Controlling the flow 471Exploring bash’s built-in commands 475CHAPTER 2: ADVANCED SHELL SCRIPTING 479Trying Out sed 479Working with awk and sed 482Step 1: Pull out the ISBN 483Step 2: Calculate the 13th digit 484Step 3: Add the 13th digit to the other 12 485Step 4: Finish the process 485Final Notes on Shell Scripting 486CHAPTER 3: PROGRAMMING IN LINUX 487An Overview of Programming 488Exploring the Software-Development Tools in Linux 489GNU C and C++ compilers 490The GNU make utility 493The GNU debugger 502Understanding the Implications of GNU Licenses 509The GNU General Public License 510The GNU Library General Public License 511BOOK 8: LINUX CERTIFICATION 513CHAPTER 1: STUDYING FOR THE LINUX PROFESSIONAL INSTITUTE EXAMS 515Overview of LPI Certification Exams 515Overview of the Linux Essentials Exam 516Getting involved in the Linux community and finding a career in open source 517Finding your way on a Linux system 518The power of the command line 520The Linux operating system 521Security and file permissions 522Overview of the Linux Professionals Exams 524The LPIC-1 exams 524The LPIC-2 exams 527The LPIC-3 exams 528CHAPTER 2: STUDYING FOR THE COMPTIA LINUX+ EXAM 529Overview of the CompTIA Linux+ Exam 530System Management 531Security 532Scripting, Containers, and Automation 533Troubleshooting 533CHAPTER 3: OTHER LINUX CERTIFICATIONS 535Vendor-Neutral Certifications 535The Linux Foundation 535The GIAC Certifications 536Vendor-Specific Certifications 537Index 539

Regulärer Preis: 25,99 €
Produktbild für Beginning Software Engineering

Beginning Software Engineering

DISCOVER THE FOUNDATIONS OF SOFTWARE ENGINEERING WITH THIS EASY AND INTUITIVE GUIDEIn the newly updated second edition of Beginning Software Engineering, expert programmer and tech educator Rod Stephens delivers an instructive and intuitive introduction to the fundamentals of software engineering. In the book, you’ll learn to create well-constructed software applications that meet the needs of users while developing the practical, hands-on skills needed to build robust, efficient, and reliable software. The author skips the unnecessary jargon and sticks to simple and straightforward English to help you understand the concepts and ideas discussed within. He also offers you real-world tested methods you can apply to any programming language. You’ll also get:* Practical tips for preparing for programming job interviews, which often include questions about software engineering practices* A no-nonsense guide to requirements gathering, system modeling, design, implementation, testing, and debugging* Brand-new coverage of user interface design, algorithms, and programming language choicesBeginning Software Engineering doesn’t assume any experience with programming, development, or management. It’s plentiful figures and graphics help to explain the foundational concepts and every chapter offers several case examples, Try It Out, and How It Works explanatory sections. For anyone interested in a new career in software development, or simply curious about the software engineering process, Beginning Software Engineering, Second Edition is the handbook you’ve been waiting for. ROD STEPHENS is a former Microsoft MVP, programmer, and award-winning instructor who speaks regularly at programming conferences and users’ group meetings. He has written more than 250 magazine articles as well as 37 books that have been translated into at least ten different languages on topics including C#, Python, and other languages. He runs the popular C# Helper and VB Helper web sites. Introduction xxviiPART I: SOFTWARE ENGINEERING STEP- BY- STEPCHAPTER 1: SOFTWARE ENGINEERING FROM 20,000 FEET 3Requirements Gathering 4High- Level Design 5Low- Level Design 6Development 6Testing 7Deployment 9Maintenance 10Wrap- Up 10Everything All at Once 11Summary 12What You Learned in This Chapter 13CHAPTER 2: BEFORE THE BEGINNING 15Document Management 16Historical Documents 19Email 19Code 22Code Documentation 22Application Documentation 25Summary 26What You Learned in This Chapter 27CHAPTER 3: THE TEAM 29Team Features 30Clear Roles 30Effective Leadership 30Clear Goals 31Consensus 32Open Communication 32Support for Risk- Taking 33Shared Accountability 33Informal Atmosphere 34Trust 34Team Roles 34Common Roles 35More- Specialized Roles 36Informal Roles 36Roles Wrap- Up 37Team Culture 37Interviews 40Interview Puzzles 40The Bottom Line 41Physical Environment 41Creativity 41Office Space 43Ergonomics 43Work- Life Balance 45Collaboration Software 46Searching 46Overload 47Outsourcing 47Summary 48What You Learned in This Chapter 50CHAPTER 4: PROJECT MANAGEMENT 53Executive Support 54Project Management 56PERT Charts 57Critical Path Methods 62Gantt Charts 65Scheduling Software 67Predicting Times 68Get Experience 69Break Unknown Tasks into Simpler Pieces 70Look for Similarities 71Expect the Unexpected 71Track Progress 73Risk Management 74Summary 76What You Learned in This Chapter 79CHAPTER 5: REQUIREMENTS GATHERING 81Requirements Defined 82Clear 82Unambiguous 83Consistent 84Prioritized 84Verifiable 88Words to Avoid 89Requirement Categories 89Audience- Oriented Requirements 90Business Requirements 90User Requirements 90Functional Requirements 91Nonfunctional Requirements 92Implementation Requirements 92FURPS 92FURPS+ 93Common Requirements 96Gathering Requirements 96Listen to Customers (and Users) 97Use the Five Ws (and One H) 98Who 98What 98When 98Where 98Why 99How 99Study Users 99Refining Requirements 100Copy Existing Systems 101Clairvoyance 102Brainstorm 103Recording Requirements 106UML 107User Stories 107Use Cases 108Prototypes 108Requirements Specification 109Validation and Verification 110Changing Requirements 110Digital Transformation 111What to Digitize 111How to Digitize 112Summary 113What You Learned in This Chapter 116CHAPTER 6: HIGH- LEVEL DESIGN 117The Big Picture 118What to Specify 119Security 119Hardware 120User Interface 121Internal Interfaces 122External Interfaces 123Architecture 124Monolithic 124Client/Server 125Component- Based 127Service- Oriented 128Data- Centric 130Event- Driven 130Rule- Based 130Distributed 131MIX and Match 132Reports 133Other Outputs 134Database 135Audit Trails 136User Access 136Database Maintenance 137NoSQL 137Cloud Databases 138Configuration Data 138Data Flows and States 139Training 139UML 141Structure Diagrams 142Behavior Diagrams 145Activity Diagrams 145Use Case Diagram 146State Machine Diagram 147Interaction Diagrams 148Sequence Diagram 148Communication Diagram 150Timing Diagram 150Interaction Overview Diagram 151UML Summary 151Summary 151What You Learned in This Chapter 152CHAPTER 7: LOW- LEVEL DESIGN 155Design Approaches 156Design- to- Schedule 157Design- to- Tools 158Process- Oriented Design 158Data- Oriented Design 159Object- Oriented Design 159Hybrid Approaches 159High, Low, and Iterative Design 160OO Design 160Identifying Classes 161Building Inheritance Hierarchies 162Refinement 163Generalization 165Hierarchy Warning Signs 167Object Composition 167Database Design 168Relational Databases 168First Normal Form 170Second Normal Form 174Third Normal Form 176Higher Levels of Normalization 179When to Optimize 180Summary 180What You Learned in This Chapter 182CHAPTER 8: SECURITY DESIGN 185Security Goals 186Security Types 186Cybersecurity 188Shift- Left Security 189Malware Menagerie 189Phishing and Spoofing 193Social Engineering Attacks 195Crapware 197Password Attacks 198User Access 201Countermeasures 201Cyber Insurance 202Summary 203What You Learned in This Chapter 207CHAPTER 9: USER EXPERIENCE DESIGN 209Design Mindset 210UI vs. UX 210UX Designers 211Platform 212User Skill Level 214Beginners and Beyond 216Configuration 217Hidden Configuration 218Models 219Metaphors and Idioms 220Case Study: Microsoft Word 221Design Guidelines 225Allow Exploration 225Make the Interface Immutable 227Support Commensurate Difficulty 227Avoid State 228Make Similar Things Similar 228Provide Redundant Commands 230Do the Right Thing 231Show Qualitative Data, Explain Quantitative Data 232Give Forms Purpose 232Gather All Information at Once 233Provide Reasonable Performance 234Only Allow What’s Right 235Flag Mistakes 235Form Design 236Use Standard Controls 236Decorating 237Displaying 237Arranging 237Commanding 238Selecting 238Entering 239Display Five Things 240Arrange Controls Nicely 241Summary 241What You Learned in This Chapter 242CHAPTER 10: PROGRAMMING 245Tools 246Hardware 246Network 247Development Environment 248Source Code Control 249Profilers 249Static Analysis Tools 249Testing Tools 249Source Code Formatters 250Refactoring Tools 250Training 250Collaboration Tools 250Algorithms 251Top- Down Design 252Programming Tips and Tricks 255Be Alert 255Write for People, Not the Computer 255Comment First 256Write Self- Documenting Code 259Keep It Small 259Stay Focused 261Avoid Side Effects 261Validate Results 262Practice Offensive Programming 264Use Exceptions 266Write Exception Handlers First 266Don’t Repeat Code 267Defer Optimization 267Summary 269What You Learned in This Chapter 270CHAPTER 11: ALGORITHMS 273Algorithm Study 274Algorithmic Approaches 275Decision Trees 275Knapsack 275The Eight Queens Problem 276Exhaustive Search 277Backtracking 278Pruning Trees 279Branch and Bound 279Heuristics 280Greedy 281Divide and Conquer 282Recursion 283Dynamic Programming 285Caching 287Randomization 287Monte Carlo Algorithms 287Las Vegas Algorithms 288Atlantic City Algorithms 289State Diagrams 289Design Patterns 290Creational Patterns 291Structural Patterns 291Behavioral Patterns 292Design Pattern Summary 293Parallel Programming 293Artificial Intelligence 295Definitions 295Learning Systems 296Natural Language Processing 297Artificial Neural Network 297Deep Learning 297Expert System 298Artificial General Intelligence 298Algorithm Characteristics 301Summary 302What You Learned in This Chapter 304CHAPTER 12: PROGRAMMING LANGUAGES 307The Myth of Picking a Language 308Language Generations 311First Generation 311Second Generation 311Third Generation (3GL) 312Fourth Generation 313Fifth Generation 314Sixth Generation 314IDEs 315Language Families 316Assembly 316Imperative 317Procedural 317Declarative 318Object- Oriented 318Functional 319Specialized 319Language Family Summary 319The Best Language 319Summary 323What You Learned in This Chapter 324CHAPTER 13: TESTING 327Testing Goals 329Reasons Bugs Never Die 330Diminishing Returns 330Deadlines 330Consequences 330It’s Too Soon 330Usefulness 331Obsolescence 331It’s Not a Bug 331It Never Ends 332It’s Better Than Nothing 333Fixing Bugs Is Dangerous 333Which Bugs to Fix 334Levels of Testing 334Unit Testing 335Integration Testing 336Regression Testing 337Automated Testing 337Component Interface Testing 338System Testing 339Acceptance Testing 340Other Testing Categories 341Testing Techniques 342Exhaustive Testing 342Black- Box Testing 343White- Box Testing 344Gray- Box Testing 344Testing Habits 345Test and Debug When Alert 345Test Your Own Code 346Have Someone Else Test Your Code 346Fix Your Own Bugs 348Think Before You Change 349Don’t Believe in Magic 349See What Changed 350Fix Bugs, Not Symptoms 350Test Your Tests 350How to Fix a Bug 351Estimating Number of Bugs 351Tracking Bugs Found 352Seeding 353The Lincoln Index 353Summary 355What You Learned in This Chapter 357CHAPTER 14: DEPLOYMENT 359Scope 360The Plan 361Cutover 362Staged Deployment 362Gradual Cutover 363Incremental Deployment 365Parallel Testing 365Deployment Tasks 365Deployment Mistakes 366Summary 368What You Learned in This Chapter 370CHAPTER 15: METRICS 371Wrap Party 372Defect Analysis 372Species of Bugs 373Discoverer 373Severity 374Creation Time 374Age at Fix 374Task Type 375Defect Database 376Ishikawa Diagrams 376Software Metrics 379Qualities of Good Attributes and Metrics 381Using Metrics 382Process Metrics 384Project Metrics 384Things to Measure 385Size Normalization 387Function Point Normalization 389Count Function Point Metrics 390Multiply by Complexity Factors 391Calculate Complexity Adjustment Value 392Calculate Adjusted FP 394Summary 395What You Learned in This Chapter 398CHAPTER 16: MAINTENANCE 401Maintenance Costs 402Task Categories 404Perfective Tasks 404Feature Improvements 406New Features 406The Second System Effect 407Adaptive Tasks 408Corrective Tasks 410Preventive Tasks 414Clarification 414Code Reuse 415Improved Flexibility 416Bug Swarms 417Bad Programming Practices 417Individual Bugs 418Not Invented Here 418Task Execution 419Summary 420What You Learned in This Chapter 423PART II: PROCESS MODELSCHAPTER 17: PREDICTIVE MODELS 427Model Approaches 428Prerequisites 428Predictive and Adaptive 429Success and Failure Indicators for Predictive Models 430Advantages and Disadvantages of Predictive Models 431Waterfall 432Waterfall with Feedback 433Sashimi 434Incremental Waterfall 436V- model 438Software Development Life Cycle 439Summary 442What You Learned in This Chapter 444CHAPTER 18: ITERATIVE MODELS 445Iterative vs. Predictive 446Iterative vs. Incremental 448Prototypes 449Types of Prototypes 451Pros and Cons 451Spiral 453Clarifications 455Pros and Cons 456Unified Process 457Pros and Cons 459Rational Unified Process 459Cleanroom 460Cowboy Coding 461Summary 461What You Learned in This Chapter 463CHAPTER 19: RAD 465RAD Principles 467James Martin RAD 470Agile 471Self- Organizing Teams 473Agile Techniques 474Communication 474Incremental Development 475Focus on Quality 478XP 478XP Roles 479XP Values 480XP Practices 481Have a Customer On-Site 481Play the Planning Game 482Use Stand- Up Meetings 483Make Frequent Small Releases 483Use Intuitive Metaphors 484Keep Designs Simple 484Defer Optimization 484Refactor When Necessary 485Give Everyone Ownership of the Code 485Use Coding Standards 486Promote Generalization 486Use Pair Programming 486Test Constantly 486Integrate Continuously 486Work Sustainably 487Use Test- Driven and Test- First Development 487Scrum 488Scrum Roles 489Scrum Sprints 490Planning Poker 491Burndown 492Velocity 494Lean 494Lean Principles 494Crystal 495Crystal Clear 498Crystal Yellow 498Crystal Orange 499Feature- Driven Development 500FDD Roles 501FDD Phases 502Develop a Model 502Build a Feature List 502Plan by Feature 503Design by Feature 503Build by Feature 504FDD Iteration Milestones 504Disciplined Agile Delivery 506DAD Principles 506DAD Roles 506DAD Phases 507Dynamic Systems Development Method 508DSDM Phases 508DSDM Principles 510DSDM Roles 511Kanban 512Kanban Principles 513Kanban Practices 513Kanban Board 514Summary 515What You Learned in This Chapter 517PART III: ADVANCED TOPICSCHAPTER 20: SOFTWARE ETHICS 523Ethical Behavior 524IEEE- CS/ACM 524ACS 525CPSR 526Business Ethics 527Nada 528Hacker Ethics 529Hacker Terms 530Responsibility 531Gray Areas 533Software Engineering Dilemmas 535Misusing Data and the Temptation of Free Data 535Disruptive Technology 536Algorithmic Bias 537False Confidence 537Lack of Oversight 538Getting Paid 539Thought Experiments 539The Tunnel Problem 540The Trolley Problem 542Summary 544What You Learned in This Chapter 545CHAPTER 21: FUTURE TRENDS 547Security 548UX/UI 549Code Packaging 550Cloud Technology 551Software Development 552Algorithms 553Tech Toys 554Summary 555What You Learned in This Chapter 556Appendix: Solutions to Exercises 559Glossary 631Index 663

Regulärer Preis: 35,99 €
Produktbild für The Absolute Beginner's Guide to Python Programming

The Absolute Beginner's Guide to Python Programming

Written as an illustrated, step-by-step guide, this book will introduce you to Python with examples using the latest version of the language.You'll begin by learning to set up your Python environment. The next few chapters cover the basics of Python such as language classifications, Python language syntax, and how to write a program. Next, you will learn how to work with variables, basic data types, arithmetic, companion, and Boolean operators, followed by lab exercises. Further, the book covers flow control, using functions, and exception handling, as well as the principles of object-oriented programming and building an interface design. The last section explains how to develop a game by installing PyGame and how to use basic animation, and concludes with coverage of Python web development with web servers and Python web frameworks.The Absolute Beginners Guide to Python Programming will give you the tools, confidence, and inspiration to start writing Python programs. If you are a programmer, developer, or a student, or someone who wants to learn on their own, this book is for you.WHAT YOU WILL LEARN* Gain an understanding of computer programming * Understand different data and data types* Work with Classes and OOP* Build interfaces, simple games, and web development with PythonWHO THIS BOOK IS FORSoftware programmers, developers or students, or anyone who wants to learn Python programming on their own. With over 20 years’ experience in the computer industry, Kevin Wilson has made a career out of technology and showing others how to use it. After earning a master's degree in computer science, software engineering, and multimedia systems, Kevin has held various positions in the IT industry including graphic & web design, digital film & photography, programming & software engineering, developing & managing corporate networks, building computer systems, and IT support. He currently teaches computer science at college and works as an IT trainer in England while researching for his PhD. CHAPTER 1: WHAT IS PYTHON.Goal: About Python, what it is, how to set up the interpreter on machineSub-topicsSetting UpCHAPTER 2: THE BASICSGoal: Covers basics, syntax, writing a basic program and executing the codeSub-topicsLanguage ClassificationLow-Level LanguageHigh-Level LanguagePython Language SyntaxReserved WordsIdentifiersIndentationCommentsInputOutputEscape CharactersWriting a ProgramCHAPTER 3: WORKING WITH DATAGoal: Covers data types: integers, lists, strings, etc, etc , variables, operatorsSub-topicsVariablesLocal VariablesGlobal VariablesBasic Data TypesIntegersFloating Point NumbersStringsListsTwo Dimensional ListsSetsTuplesDictionariesCasting Data TypesArithmetic OperatorsOperator PrecedencePerforming ArithmeticComparison OperatorsBoolean OperatorsBitwise OperatorsLab ExercisesCHAPTER 4: FLOW CONTROLGoal: Explains flow control, sequence, if/elif, for/whileSub-topicsSequenceSelectionif...elseelifIteration (Loops)For loopWhile loopBreak and ContinueLab ExercisesCHAPTER 5: HANDLING FILESGoal: Explains file handling, reading files, writing to files, text files, binary filesFile TypesText FileBinaryText File OperationsOpen FilesWrite to a FileRead from a FileBinary File OperationsOpen FilesWrite to a FileRead a FileRandom File AccessLab ExercisesCHAPTER 6: USING FUNCTIONSSub-topicsDeclaring FunctionsRecursionLab ExercisesCHAPTER 7: EXCEPTION HANDLINGGoal: Covers exception and error handlingSub-topicsTypes of ExceptionCatching ExceptionsRaising your Own ExceptionsCHAPTER 8: OBJECT ORIENTED PROGRAMMINGGoal: OOP principles, classes, objects and inheritanceSub-topicsPrinciples of OOPEncapsulationInheritancePolymorphismAbstractionClasses & ObjectsClass InheritancePolymorphic ClassesMethod OverridingCHAPTER 9: BUILDING AN INTERFACEGoal: Building an interface using tkinterSub-topicsCreating a WindowAdding WidgetsMenusThe CanvasImagesButtonsMessage BoxesText FieldListboxCheckboxLabelsLabel FrameInterface DesignCHAPTER 10: DEVELOPING A GAMESub-topicsInstalling PyGameOpening a WindowAdding an ImageThe Game LoopThe Event LoopShapesBasic AnimationCHAPTER 11: PYTHON WEB DEVELOPMENTSub-topicsWeb ServersExecuting a ScriptPython Web FrameworksQUICK REFERENCEData TypesNumeric OperatorsComparison OperatorsBoolean OperatorsString OperatorsList OperatorsDictionary OperatorsString MethodsList MethodsDictionary MethodsFunctionsFilesConditionalMulti ConditionalWhile LoopFor LoopLoop ControlModulesBuilt in FunctionsDeclare a ClassChild ClassCreate ObjectCall Object Method

Regulärer Preis: 36,99 €