Computer und IT
Windows 11 (3. Auflg.)
So bedienen Sie Windows 11 schneller und besser. In diesem Buch finden Sie alle Tipps und Tricks, die Ihnen den Windows-Alltag leichter machen. Schreiben Sie E-Mails, spielen Sie Musik und Filme ab, bearbeiten Sie Fotos, oder sichern Sie Ihre Daten. Folgen Sie den Anleitungen einfach Bild für Bild, und bedienen Sie Windows noch besser und geschickter. Aus dem Inhalt: Windows schneller machenInternet und Netzwerk einrichtenFotos verwalten und bearbeitenDesktop und Startseite anpassenMusik und Filme abspielenMehrere Benutzer anmeldenMit Dateien und Ordnern arbeitenDen PC warten und pflegenTipps für E-Mails und OneDriveApps effizienter nutzenUnter der Haube: Die Registry
Softwaretesten nach ISTQB für Dummies (2. Auflage)
Soll in Ihrem Unternehmen neue Software eingeführt werden und Sie müssen sie testen? Und Sie wissen nicht, wie Sie das angehen sollen? Oder wollen Sie als Entwickler über den Tellerrand schauen und sich auch mit dem Softwaretesten beschäftigen? Dieses Buch erläutert alle vom ISTQB® Certified Tester Foundation Level geforderten Lerninhalte sowohl für den Anwender mit Fachkenntnissen, der Software später einsetzen wird, als auch für den Programmierer. Die Übungen sind leicht in die eigene Praxis übertragbar und sorgen für eine optimale Prüfungsvorbereitung. Darüber hinaus wird für alle Testaktivitäten gezeigt, wie diese jeweils im klassischen oder im agilen Kontext aussehen.Leseprobe (PDF-Link)Autor:Maud Schlich coacht seit mehr als 25 Jahren Testmanager und Qualitätssicherungsteams im klassischen und im agilen Kontext. Sie ist Certified Tester Full Advanced Level, seit 2007 Mitglied des German Testing Board und lebt in Dannenfels in der Nordpfalz.
Twitch For Dummies
FIND YOUR OWN STREAMING SUCCESS WITH DUMMIESTwitch For Dummies will get you up to date with Twitch, the breakthrough streaming platform where you can set up a channel, increase your viewership, and find your people. Step-by-step guides and helpful, real-life examples get you ready to go live and, who knows, maybe even earn a little money while having fun online. Check out this new edition for all the details on the new Creator Dashboard interface, streaming in the metaverse, and details you need to know to get the world watching. This handy reference even covers the latest Twitch integrations for streaming from your mobile devices. Community-based entertainment has never been hotter, and Dummies shows you how to get on board.* Discover why the streaming platform Twitch is taking the world by storm* Set up your first channel, stream gameplay, create highlight reels, and find viewers* Understand the ad revenue structure so you can earn cash from your stream* Get current on going live from the latest console models to Virtual RealityThis is the perfect Dummies guide for new and established Twitch streamers who want to improve their audience and skills.TEE MORRIS, an early adopter of podcasting, is no stranger to building audiences and releasing original content online. Now he adds Twitch to his online arsenal of creativity, managing his own streaming channel featuring a variety of gaming, cooking, and talk shows. Tee is co-author of Podcasting For Dummies, 4th Edition, a contributor to Making YouTube Videos, 2nd Edition (Dummies Junior), and a writer of science fiction and fantasy, including the award-winning steampunk series The Ministry of Peculiar Occurrences.Foreword xiINTRODUCTION 1About This Book 1How to Use This Book 2Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4PART 1: GETTING YOUR GAME ON 5CHAPTER 1: WELCOME TO THE WORLD OF TWITCH 7Creating a Twitch Account 8Press X to begin: The basics 9“New Twitch, who dis?”: Completing the Profile 11All in the details: Channel and Videos settings 13Controlling the signal: From privacy to connected third parties 16Learning at the Feet of Masters: Following and Subscribing to Twitch Channels 17Following on Twitch 18Subscribing on Twitch 19Other Twitch Resources 22CHAPTER 2: TURNING A CONSOLE INTO A STREAMER’S STUDIO 25What’s Your Preferred Platform? 26PlayStation 27Xbox 30Nonessentials That Are Essential 33Video cameras 33Audio gear 34Laptop computer or mobile device (on a stand) 35Green screen 35Virtual assistants 35CHAPTER 3: MAKING FIRST IMPRESSIONS 39Creating a Complete Twitch Channel 40Creating an Info Panel 40Deciding which Info Panels to create 42Editing and deleting Info Panels 44Streaming Off Your Console 47Setting up your PlayStation for streaming 48Setting up your Xbox for streaming 50CHAPTER 4: AND WE’RE LIVE! (WAIT, WE’RE LIVE?!) 55Streaming Your First Gameplay 56OMG! I’m live! What do I do now?! 57Wrapping up your stream 59Post-Show Production: What to Do After a Stream 61Take a bow: Social media shout-outs 61YouTube: Your content, on demand 62Creating a highlight 65CHAPTER 5: SETTING SCHEDULES AND MANAGING SOCIAL MEDIA 69Same Bat-Time, Same Bat-Channel: Setting Your Schedule 70From start to finish: A basic schedule 71Your own pocket of time: The length of your stream 73Consistency and Communication 75Notifications on Twitch 76Notifications on Social Media 78Notifications on Discord 80When Life Happens: Changes in the Schedule 84CHAPTER 6: IMPROVING YOUR STREAM: BEING YOUR OWN HARSHEST CRITIC 87G, PG, PG-13, or R: What’s the Rating? 88Setting the Mature Content option 90The parameters of adult content 91Popularity Versus Pleasure: What Are You Streaming? 92Streaming popular games 93Streaming games you enjoy 94Streaming retro games 96Beyond Consoles: Streaming without Video Games 98PART 2: CREATING YOUR BROADCASTING STUDIO 105CHAPTER 7: STREAMING WITHOUT CONSTRAINTS: STREAMING FROM A PC 107Looking under the Hood: What a PC Needs 108The computer processor 108Cooling systems 109Random access memory 111Graphics card 111Capture card 111Power supply 112Setting Up Your Console 112Making Creativity and Interactivity Happen with StreamElements and OBS 114Downloading a template from Nerd or Die 115Setting up OBS with StreamElements 117Incorporating your template 118Customizing your template 120Adding a camera to your template 122Adding a console to your template 124Setting Up Audio: Easier Said than Done 125Setting up your audio in OBS 126Using Discord as your Party Chat solution 128CHAPTER 8: BELLS & WHISTLES: NIFTY ADD-ONS FOR YOUR TWITCH STREAM131Stand By for Stream: Introduction and Intermission B-roll 132Second-in-Command: Channel Moderators 135StreamElements: Your Friendly Neighborhood Virtual Assistant 137Say it again and again: Using custom commands 138Locking it down: Spam protection 139Complete Control: The Elgato Stream Deck 142CHAPTER 9: ALL THE WORLD’S YOUR STAGE 147Quiet on the Set: A Critical Look at Your Twitch Studio 148Couchcasting 148Streaming from the office studio 149Streaming from the set 150Twitch on the Go: Streaming from a Mobile Phone 152Setting up your mobile stream with Streamlabs 155Customizing your mobile stream on Streamlabs 157Live from the Metaverse: Streaming in Virtual Reality 160Setting up your PC for VR streaming 161Launching a VR stream 163PART 3: LEVELLING UP WITH TWITCH 169CHAPTER 10: LET’S GOOOOO, CHAT: WELCOME TO THE SHOW! 171Announcing Who, What, Where: Your Show Intro 172Gittin’ Gud at Multitasking: Responding to Chat 173Checking in with Chat in real time 174Checking in with Chat at specific points 175Creating Content for Two (or More): Hosting Interviews 176Extending interview requests 177Asking really great questions 178Avoiding really bad questions 180Taking a Bow: Ending Your Stream 182CHAPTER 11: IN BETWEEN THE STREAMS 185Meanwhile, at Penguin’s Secret Lair: Your Channel between Streams 186Why host other streamers? 187Selecting other streamers 189Twitch on Demand: Past Broadcasts 192Past broadcasts on Twitch 193Past broadcasts on YouTube 194Highlight Reels, Revisited 195Creating highlight reels with iMovie 196Leveling up: video editing with HitFilm Express 200CHAPTER 12: FROM HOBBY TO SIDE HUSTLE TO FULL-TIME JOB? 207Semi-Pro: The Affiliate Streamer 209Expressing yourself: Emotes 210Patrons of the Arts: Subscribers 215Expressing your loyalty: Subscriber badges 216A penny for your thoughts: Bits 217Skipping the intermediary: the Tip 218Achievement Unlocked: Partnership 219Why become a Twitch Partner? 220The checklist for a Twitch Partner 221Show Me the Money: Revenue Opportunities 222This Twitch stream is sponsored by 222Affiliate programs: Working together 223So, Chat, let me tell you about this amazing product from 223Show me your swag! 224Don’t Quit Your Day Job Just Yet 224PART 4: BEYOND THE CONSOLE 227CHAPTER 13: BUILDING YOUR TWITCH COMMUNITY 229Check Me Out Now: Publicizing Your Stream 230Twitter 230TikTok 231Instagram 234Hover 236YouTube 239Creating a social media strategy 241Who Is “The Fam” and Why Do They Matter? 241Oh hai, Mark: Talking to Chat 242The Fam includes other streamers too 243The Community Board: Discord 244Setting up channels 244Share with the class: Talking to your Chat 246Family Matters: The Unseen Community Members 247The significant other 248When your kids want to stream 249CHAPTER 14: TWITCH ETIQUETTE 251Don’t Let the Door Hit You on the Way Out: Bad Behavior on Twitch 252Yo, check out my stream 252Hey, Streamer! Hey! Listen! Pay attention to ME! 253Well, I support this stream, so you owe me 254They See Me Trollin’ and Hatin’ 255You just earned a timeout, kiddo: Muting trolls in stream 256Hate raids 259Not-So-Merry Melodies: Twitch, the RIAA, and the DMCA 262What the DMCA is 263When the DMCA leveled up 264The simple (but complicated) relationship between the RIAA and Twitch 264Where to find stream-safe music 265Positive Impressions: Putting your best foot forward on Twitch 266CHAPTER 15: GAME OVER: TWITCH OUTSIDE OF GAMING 269Game On: The Rise of Esports 269NASA TV: Going Live in the Sky 272The Food of Love on Twitch: Music 273Harping on a passion: Meadow Fox 273Sing a song: Ashley Abbink and Camila Knight 274The Sounds of Serenity: ASMR 276Phasmo for Real: Old Spirits Investigations Live 277Gaming for Good: Charity Streaming 279Remembering rule 1: Charity streaming is not about you! 279Setting up a Tiltify profile 280Doing a little prep before you get started 284PART 5: THE PART OF TENS 287CHAPTER 16: TEN (OR MORE) LIFE LESSONS FROM TWITCH 289Twitch Enabled Me to Take Center Stage 290Twitch Opened the World to Me 290Twitch Helped Me Realize I Am Not Alone 290Success Is Waiting for You If You’re Willing to Work for It 291Twitch Encourages Me to Look for Improvement 291You Always Have Someone Watching Your Back 291Twitch Can Surprise You in the Best of Ways 292One Life Lesson from Twitch 292It’s a Glimpse of How Good We Can Be 293Twitch Took My Education and Leveled It Up 293Twitch Restored My Faith in People 293To Thine Own Self Be True 294Twitch Doesn’t Believe in a Comfort Zone, and That’s a Good Thing 294Twitch Opened Doors I Didn’t Know Existed 294There Are a Lot of Good People in the World — Connect with Them 295Twitch Taught Me the Power of Community 295If You Have Something to Share, You Have to Make It Happen 296Twitch Proves the Power of Paying It Forward 296CHAPTER 17: TEN FINAL THOUGHTS FROM A TEEMONSTER ON TWITCH 297Five Lessons from Five Years 297Grow at your own pace 298Don’t let life pass you by 298Stream fearlessly 299Make yourself your stream’s top priority 300Stream because you love it 300Five Goals for the Streams to Come 301Don’t define yourself by analytics 301A good mantra to focus on: My stream is a fun place to be 302Remember, there’s no silver bullet to success 303To thine own self be true 304Partnership is not the endgame 304Index 307
Raspberry Pi Image Processing Programming
Understand the concepts of image processing with Python 3 and create applications using Raspberry Pi 4. This book covers image processing with the latest release of Python 3, using Raspberry Pi OS and Raspberry Pi 4B with the 8 GB RAM model as the preferred computing platform.This second edition begins with the installation of Raspberry Pi OS on the latest model of Raspberry Pi and then introduces Python programming language, IDEs for Python, and digital image processing. It also illustrates the theoretical foundations of Image processing followed by advanced operations in image processing. You'll then review image processing with NumPy, and Matplotlib followed by transformations, interpolation, and measurements of images.Different types of filters such as Kernels convolution filters, low pass filters, high pass filters, and Fourier filters are discussed in a clear, methodical manner. Additionally, the book examines various image processing techniques such as Morphology, Thresholding, and Segmentation, followed by a chapter on live webcam input with OpenCV, an image processing library with Python. The book concludes with an appendix covering a new library for image processing with Python, pgmagik, followed by a few important tips and tricks relevant to RPi.WHAT YOU'LL LEARN* Get started with Raspberry Pi and Python* Understand Image Processing with Pillow* See how image processing is processed using Numpy and Matplotlib* Use Pi camera and webcamWHO THIS BOOK IS FORRaspberry Pi and IoT enthusiasts, and Python and Open Source professionalsASHWIN PAJANKAR earned a Master of Technology in Computer Science Engineering from IIIT Hyderabad and has over 25 years of programming experience. He started his journey in programming and electronics at the tender age of 7 with a MS-DOS computer and BASIC programming language. He is now proficient in Assembly programming, C, C++, Java, Shell Scripting, JavaScript, Go Programming, HTML, and Python. His other technical expertise includes single board computers such as Raspberry Pi and Banana Pro, and microcontroller boards (Arduino), and embedded boards (BBC Micro Bit). He has worked extensively on domains such as Software/Product Testing, Software Automation, Databases, Data Analytics, Computer Vision, and Web Development.Ashwin is currently a freelance online instructor teaching programming and electronics to more than 8200 professionals. He also regularly conducts live programming boot camps for software professionals. His growing Youtube channel has an audience of more than 11000 subscribers. He has published more than 20 books on programming and electronics with many international publications, including Apress and regularly reviews books on programming written by other authors.Chapter 1: Introduction to Single Board Computers and RPiChapter Goal: Brief intro into SBCs and RPiNo of pagesSub -Topics1. SBCs2. Raspberry Pi3. Raspberry Pi Imager and setup4. Configuring the PiChapter 2: Introduction to Python and Digital Image ProcessingChapter Goal: Brief acquaintance with the subject of the bookNo of pages:Sub - Topics:1. History of Python2. Features3. Installation of Python on Raspberry Pi4. IDEs for Python5. Digital Image ProcessingChapter 3: Getting Started with Image ProcessingChapter Goal: Getting to understand the basicsNo of pages:Sub - Topics:1. Image Sources (Standard Image Datasets)2. Various Cameras for RPi3. Pillow Basics4. Tk Basics5. Reading and displaying images with Pillow and Tk6. Image PropertiesChapter 4: Basic Operations on ImagesChapter Goal: Getting to know PillowNo of pages:Sub - Topics:1. Image modulea) Image channelsb) Mode Conversionc) Blendingd) Resizinge) Rotationf) Crop and pasteg) Alpha compositionh) Mandelbrot seti) Noise and gradient2. ImageChops module3. ImageOps moduleChapter 5: Advanced Operations on ImagesChapter Goal: Filtering and Enhancements1. Image filter (will cover more filters in the second edition)2. Image enhancements (will cover additional effects)3. Color quantization4. Histogram and equalizationChapter 6: Scientific PythonChapter Goal: Introduction to the Scientific Python1. The SciPy stack2. NumPy, SciPy, and Matplotlib3. Image Processing with NumPy and MatplotlibChapter 7: Transformations, Interpolation, and MeasurementsChapter Goal: Transformations and Measurements1. Transformations and Interpolationsa) Affine_transformb) Geometric_transformc) Map_coordinatesd) Rotatee) Shiftf) Spline_filterg) Spline_filter1dh) Zoom2. Measurementsa) Center_of_massb) Extremac) Find_objectsd) Histograme) Labelf) Labeled_comprehensiong) Maximumh) Maximum_positioni) Meanj) Mediank) Minimuml) Minimum_positionm) Standard_deviationn) Sum_labelso) Variancep) Watershed_iftChapter 8: Filters and their ApplicationChapter Goal: Study Various types of filters1. Kernels, Convolution, Filters2. Correlation3. Low Pass Filtersa) Blurring Filter (Gaussian, Gaussian 1D, uniform, uniform 1D, percentile, rank)b) Noise Removal (Gaussian, Median, Maximum, Minimum, rank)4. High Pass filtersa) Prewittb) Sobelc) Laplaciand) Gaussian Gradient Magnitudee) Gaussian Laplace5. Fourier FiltersChapter 9: Morphology, Thresholding, and SegmentationChapter Goal: Study operations1. Morphologya) Distance transformb) Structuring Element (generate_binary_structure)c) Binary Morphological Operationsd) Greyscale Morphological Operationse) More Morphological Operations2. Thresholding and SegmentationChapter 10: pgmagikChapter Goal: Learn pgmagic library in detail1. Installation2. Creating images3. Draw text4. Image filter and transformation5. Bezier curve6. Blob7. Circle8. Animation
Corona und die anderen Wissenschaften
Die Corona-Pandemie hat die gesamte Welt weitestgehend unvorbereitet getroffen, Entscheidungsträger*innen auf allen gesellschaftlichen Ebenen vor enorme Herausforderungen gestellt und ihnen schwerwiegende Entscheidungen unter weitestgehend unbekannten Voraussetzungen abverlangt. Gerade deswegen braucht es ein stärkeres Hinhören, was die anderen Wissenschaften, denen weniger Aufmerksamkeit zukam als etwa der Virologie, Epidemiologie, Pneumologie, zur Bewältigung beizutragen haben: Was können wir aus den vielfältigen Perspektiven der vielen anderen Wissenschaften zur Bewältigung der Corona-Krise und zukünftiger Pandemien lernen? Welche Erkenntnisse der vielen anderen Fächer wurden in den zurückliegenden Jahren und Monaten nicht ausreichend wahrgenommen und beherzigt? Welchen gesamtgesellschaftlichen Beitrag können diese Fächer zur Krisenbewältigung leisten und welche Voraussetzungen müssen dafür erfüllt sein?PETER KLIMCZAK (Priv.-Doz. Dr. phil. et Dr. rer. nat. habil.) forscht als Senior Research Fellow der Alexander von Humboldt Foundation an der University of Wroclaw zu digitalen/sozialen Medien, kognitiven Systemen sowie dem Einsatz künstlicher Sprachen in den Medien- und Kulturwissenschaften.DENIS NEWIAK (Dr. des.) promovierte an der Brandenburgischen Technischen Universität und forscht zu Ästhetiken und Narrativen der Einsamkeit in aktuellen Fernsehserien sowie deren gemeinschaftsstiftenden Funktionen und lehrt Medien-, Film- und Fernsehtheorie sowie Kommunikations- und Organisationsmanagement.CHRISTER PETERSEN (Prof. Dr. phil.) ist Inhaber des Lehrstuhls für Angewandte Medienwissenschaften an der Brandenburgischen Technischen Universität. Seine Forschungsschwerpunkte liegen auf den Gebieten der Methodologie der Medienwissenschaften sowie der Semiotik technischer, politischer und künstlerischer Medien.Einleitung.- Wahrheitsrelativismus, Wissenschaftsskeptizismus und die politischen Folgen.- Von Fakes und Frauds: Können wissenschaftliche „Hoaxes“ ein legitimes Erkenntnisinstrument sein?.- Fiction, Fake and Fact.- Stranger than Fiction.- Die marxistisch-leninistische Faschismusdefinition und der Mauerbau.- Vorsicht: mögliche „Fake News“ – ein technischer Ansatz zur frühen Erkennung.- Fake News technisch begegnen – Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen.- NewsDeps: Visualizing the Origin of Information in News Articles.
Pro C# 10 with .NET 6
Welcome to the most comprehensive foundational guide available on the topic of C# coding and .NET. This book goes beyond “do this, to achieve this” to drill down into the core stuff that makes a good developer, great. This expanded 11th edition delivers loads of new content on Entity Framework, Razor Pages, Web APIs and more. You will find the latest C# 10 and .NET 6 features served up with plenty of “behind the curtain” discussion designed to expand developers’ critical thinking skills when it comes to their craft. Coverage of ASP.NET Core, Entity Framework Core, and more sits alongside the latest updates to the new unified .NET platform, from performance improvements to Windows Desktop apps on .NET 6, updates in XAML tooling, and expanded coverage of data files and data handling. Going beyond the latest features in C# 10, all code samples are rewritten for this latest release.Dive in and discover why this essential classic is a favorite of C# developers worldwide. Gain a solid foundation in object-oriented development techniques, attributes and reflection, generics and collections, and numerous advanced topics not found in other texts (such as CIL opcodes and emitting dynamic assemblies). PRO C# 10 WITH .NET 6 will build your coding confidence putting C# into practice, and exploring the .NET universe and its vast potential on your own terms.WHAT YOU WILL LEARN* Explore C# 10 features and updates in records and record structs, global and implicit using directives, file level namespaces, extended property patterns, and more* Develop applications with C# and modern frameworks for services, web, and smart client applications* Hit the ground running with ASP.NET Core web applications using MVC and Razor Pages, including view components, custom tag helpers, custom validation, GDPR support, and areas* Build ASP.NET RESTful services complete with versioning, enhanced swagger, and basic authentication* Embrace Entity Framework Core for building real-world, data-centric applications, with deeply expanded coverage new to this edition including SQL Server temporal table support* Dive into Windows Desktop Apps on .NET 6 using Windows Presentation Foundation* Understand the philosophy behind .NET* Discover the new features in .NET 6, including single file applications, smaller container images, and moreWHO THIS BOOK IS FORDevelopers of any level who want to either learn C# and .NET or want to take their skills to the next level.“Amazing! Provides easy-to-follow explanations and examples. I remember reading the first version of this book; this is a ‘must-have’ for your collection if you are learning .NET!”– Rick McGuire, Senior Application Development Manager, Microsoft“Phil is a journeyman programmer who brings years of experience and a passion for teaching to make this fully revised and modernized ‘classic’ a ‘must-have’. Any developer who wants full-spectrum, up-to-date coverage of both the C# language and how to use it with .NET and ASP.NET Core should get this book.”– Brian A. Randell, Partner, MCW Technologies and Microsoft MVPANDREW TROELSEN has more than 20 years of experience in the software industry. Over this time he has worked as a developer, educator, author, public speaker, and now team lead and lead engineer. He is the author of numerous books in the Microsoft universe. He holds a master of science degree in software engineering (MSSE) from the University of St. Thomas and another in computational linguistics (CLMS) from the University of Washington.PHIL JAPIKSE is an international speaker, Microsoft MVP, ASPInsider, Professional Scrum Trainer, and a passionate member of the developer community. He is the lead director of the Cincinnati .NET User Group and the Cincinnati Software Architect Roundtable, and he founded the CincyDeliver conference, Currently, he works as a Director of Consulting and Enterprise Architect. Follow him on his blog (skimedic.com) or on Twitter @skimedic.Part 1: Introducing C# and .NET 61 Introducing C# and .NET (Core) 62 Building C# ApplicationsPart 2: Core C# Programming3 Core C# Programming Constructs, Part 14 Core C# Programming Constructs, Part 2Part 3: Object Oriented Programming with C#5 Understanding Encapsulation6 Understanding Inheritance and Polymorphism7 Understanding Structured Exception Handling8 Working with Interfaces9 Understanding Object LifetimePart 4: Advanced C# Programming10 Collections and Generics11 Advanced C# Language Features12 Delegates, Events, and Lambda Expressions13 LINQ To Objects14 Processes, AppDomains, and Load Contexts15 Multithreaded, Parallel, and Async ProgrammingPart 5: Programming with .NET Core Assemblies16 Building and Configuring Class Libraries17 Type Reflection, Late Binding, Attributes, and Dynamic Types18 Understanding CIL and the Role of Dynamic AssembliesPart 6: File Handling, Object Serialization, and Data Access19 File I/O and Object Serialization20 Data Access with ADO.NETPart 7: Entity Framework Core21 Introducing Entity Framework Core22 Exploring EF Core23 Build a Data Access Layer with Entity Framework Core24 Test Driving the Autolot Data Access LayerPart 8: Windows Client Development25 Introducing Windows Presentation Foundation and XAML26 WPF Controls, Layouts, Events, and Data Binding27 WPF Graphics Rendering Services28 WPF Resources, Animations, Styles, and Templates29 WPF Notifications, Validations, Commands, and MVVMPart 9: ASP.NET Core30 Introducing ASP.NET Core31 Diving into ASP.NET Core32 RESTful Services with ASP.NET Core33 Web Applications using MVC34 Web Applications using Razor Pages
Das DevOps-Handbuch (2. Auflage)
Teams, Tools und Infrastrukturen erfolgreich umgestaltenDie IT ist heute das Herzstück eines jeden Unternehmens, unabhängig vom Geschäftsmodell oder Produkt. DevOps-Praktiken werden daher immer häufiger nicht nur in der IT-Abteilung genutzt, sondern im gesamten Unternehmen eingeführt. Diese Entwicklung veranschaulichen auch die zahlreichen neuen Fallstudien beispielsweise von Adidas oder American Airlines, um die die Neuauflage dieses Standardwerks erweitert wurde.Das DevOps-Handbuch – jetzt aktualisiert und durch neueste Erkenntnisse und Methoden ergänzt – erläutert, wie die DevOps-Philosopie praktisch implementiert wird: Sie lernen konkrete Tools und Techniken kennen, die Ihnen helfen, Software schneller und sicherer zu produzieren. Zudem stellt das Autorenteam Ihnen Maßnahmen vor, die die Zusammenarbeit aller Abteilungen optimieren, die Arbeitskultur verbessern und die Profitabilität Ihres Unternehmens steigern.Die 2. Auflage wurde vollständig aktualisiert und durch die neuesten Forschungsergebnisse und 15 neue Case Studies erweitert.Themen des Buchs sind: Die Drei Wege: Die obersten Prinzipien, von denen alle DevOps-Maßnahmen abgeleitet werdenEinen Ausgangspunkt finden: Eine Strategie für die DevOps-Transformation entwickeln, Wertketten und Veränderungsmuster kennenlernen, Teams schützen und fördernFlow beschleunigen: Den schnellen Fluss der Arbeit von Dev hin zu Ops ermöglichen durch eine optimale Deployment-Pipeline, automatisierte Tests, Continuous Integration und Continuous DeliveryFeedback verstärken: Feedback-Schleifen verkürzen und vertiefen, Telemetriedaten erzeugen und Informationen unternehmensweit sichtbar machenKontinuierliches Lernen ermöglichen: Eine »Just Culture« aufbauen und ausreichend Zeit reservieren, um das firmenweite Lernen zu fördern
Java - die Neuerungen in Version 17 LTS, 18 und 19
Dieses Buch von Michael Inden eignet sich für alle, die ihr Java-Wissen auf den neuesten Stand bringen und es durch eine Vielzahl an Übungen festigen möchten. Es beschreibt alle wichtigen Neuerungen in Java 17 – der aktuellen LTS-Version – sowie in den brandaktuellen Versionen 18 und 19.»Java – die Neuerungen in Version 17 LTS, 18 und 19« behandelt alle wesentlichen Änderungen der aktuellen Java-Versionen. Einen Schwerpunkt bildet die Beschreibung einer Vielzahl an Syntaxverbesserungen. Beispiele sind die prägnantere Syntax bei switch sowie die mehrzeiligen Strings und records, welche die Definition von Werteklassen erleichtern. Auch das immer populärer werdende Pattern Matching für instanceof und switch wird vorgestellt. Nicht nur in der Syntax, sondern auch in den APIs finden sich einige Neuerungen, etwa der HTTP/2-Support sowie diverse Detailverbesserungen, beispielsweise im Stream-API. Schließlich werden nennenswerte Neuerungen in der JVM beschrieben, unter anderem Direct Compilation, die JShell zum interaktiven Ausprobieren, JMH zum Erstellen von Microbenchmarks sowie jpackage zum Bereitstellen von installierbaren Distributionen.Zielgruppe: Java-Programmierer*innenSoftwareentwickler*innenAutor: Dipl.-Inform. Michael Inden ist Oracle-zertifizierter Java-Entwickler. Nach seinem Studium in Oldenburg hat er bei diversen internationalen Firmen in verschiedenen Rollen etwa als Softwareentwickler, -architekt, Consultant, Teamleiter, CTO sowie Leiter Academy gearbeitet. Nach rund 1,5 Jahren als freiberuflicher Autor und Trainer ist er seit Januar 2022 als Head of Development in Zürich tätig.Michael Inden hat über zwanzig Jahre Berufserfahrung beim Entwurf komplexer Softwaresysteme gesammelt und an diversen Fortbildungen sowie mehreren Java-One-Konferenzen teilgenommen. Sein besonderes Interesse gilt dem Design qualitativ hochwertiger Applikationen sowie dem Coaching. Sein Wissen gibt er gerne als Trainer in internen und externen Schulungen und auf Konferenzen weiter, etwa bei der JAX/W-JAX, JAX London, Oracle Code One, ch.open sowie bei der Java User Group Switzerland.
Lean UX
DAS STANDARDWERK FÜR AGILE UX-TEAMS * Die erfolgreichen Methoden von Lean Startup im UX-Design einsetzen * Von den Lean-UX-Prinzipien bis zur Integration der -Praktiken im Team und Unternehmen * Für UX-Designer*innen, Scrum Master und Manager*innen Lean UX ist ein Synonym für modernes Produktdesign und -entwicklung. Durch die Kombination von menschenzentriertem Design, agilen Arbeitsweisen und einem ausgeprägten Geschäftssinn machen Designer*innen, Produktmanager*innen, Entwickler*innen und Scrum Master auf der ganzen Welt Lean UX heute zum führenden Ansatz für digitale Produktteams. In der dritten Auflage dieses preisgekrönten Buches helfen Ihnen die Autoren Jeff Gothelf und Josh Seiden, sich auf das Produkterlebnis und nicht auf die Ergebnisse zu konzentrieren. Sie lernen Taktiken für die Integration von User Experience Design, Produktentdeckung, agilen Methoden und Produktmanagement kennen. Und Sie erfahren, wie Sie Ihr Design in kurzen, iterativen Zyklen vorantreiben können, um zu ermitteln, was für Unternehmen und Benutzer*innen am besten funktioniert. Lean UX führt Sie durch diesen Wandel – zum Besseren. - Erleichtern Sie Ihrem Team den Lean-UX-Prozess mit dem Lean-UX-Canvas. - Stellen Sie sicher, dass jedes Projekt mit klaren kundenzentrierten Erfolgskriterien beginnt. - Verstehen Sie die Rolle des Designers in einem agilen Team. - Stellen Sie sicher, dass die Designarbeit in jedem Sprint stattfindet. - Bauen Sie Produktentdeckung in die "Geschwindigkeit" Ihres Teams ein.
Penetration Testing mit Metasploit (2. Auflg.)
Metasploit ist ein mächtiges Werkzeug, mit dem auch unerfahrene Administratoren gängige Angriffsmethoden verstehen und nachstellen können, um Sicherheitslücken im System aufzuspüren. Der Autor erläutert in diesem Buch gezielt alle Funktionen von Metasploit, die relevant für Verteidiger (sogenannte Blue Teams) sind, und zeigt, wie sie im Alltag der IT-Security wirkungsvoll eingesetzt werden können.Als Grundlage erhalten Sie das Basiswissen zu Exploits und Penetration Testing und setzen eine Kali-Linux-Umgebung auf. Mit dem kostenlos verfügbaren Portscanner Nmap scannen Sie Systeme auf angreifbare Dienste ab. Schritt für Schritt lernen Sie die Durchführung eines typischen Hacks mit Metasploit kennen und erfahren, wie Sie mit einfachen Techniken in kürzester Zeit höchste Berechtigungsstufen in den Zielumgebungen erlangen.Schließlich zeigt der Autor, wie Sie Metasploit von der Meldung einer Sicherheitsbedrohung über das Patchen bis hin zur Validierung in der Verteidigung von IT-Systemen und Netzwerken einsetzen. Dabei gibt er konkrete Tipps zur Erhöhung Ihres IT-Sicherheitslevels. Zusätzlich lernen Sie, Schwachstellen mit dem Schwachstellenscanner Nessus zu finden, auszuwerten und auszugeben.So wird Metasploit ein effizienter Bestandteil Ihrer IT-Sicherheitsstrategie. Sie können Schwachstellen in Ihrem System finden und Angriffstechniken unter sicheren Rahmenbedingungen selbst anwenden sowie fundierte Entscheidungen für Gegenmaßnahmen treffen und prüfen, ob diese erfolgreich sind.Aus dem Inhalt:Metasploit: Hintergrund und HistorieKali-Linux-Umgebung aufsetzenPentesting-GrundlagenSchwachstellen und ExploitsNmap-ExkursMetasploit-BasicsMetasploit in der VerteidigungHacking-PraxisbeispieleAnti-Virus-EvasionNessus-SchwachstellenscannerGlossar Autoreninfo (Stand: Mai 2020):Sebastian Brabetz ist als Geschäftsleiter verantwortlich für die Professional Security Services bei der mod IT GmbH und ist zertifiziert als Offensive Security Certified Professional (OSCP).Er arbeitet im Bereich IT Security in allen Bereichen vom Consulting über defensives Schwachstellen-Management und Incident Response bis hin zu offensiven Penetrationstests. U.a. gibt er Workshops zu den Themen Pentesting und Metasploit.
Blockchain Security from the Bottom Up
THE GOLD STANDARD IN UP-TO-DATE BLOCKCHAIN CYBERSECURITY HANDBOOKSIn Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology’s ecosystem. You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution. You’ll also find:* Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem* Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts* Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of workA can’t-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations. HOWARD E. POSTON III is an independent blockchain consultant, educator, and content creator who has developed and taught over a dozen courses covering cybersecurity topics. He holds a master’s degree in Cybersecurity from the Air Force Institute of Technology and is a Certified Ethical Hacker. He has developed and facilitated blockchain security courses for major companies.CHAPTER 1 INTRODUCTION TO BLOCKCHAIN SECURITY 1The Goals of Blockchain Technology 2Anonymity 2Decentralization 2Fault Tolerance 2Immutability 3Transparency 3Trustless 3Structure of the Blockchain 3The Blockchain Network 5The Blockchain Node 5A Blockchain Block 6A Blockchain Transaction 7Inside the Blockchain Ecosystem 8Fundamentals 8Primitives 9Data Structures 9Protocols 9Consensus 9Block Creation 10Infrastructure 10Nodes 10Network 11Advanced 11Smart Contracts 11Extensions 11Threat Modeling for the Blockchain 12Threat Modeling with STRIDE 12Spoofing 12Tampering 12Repudiation 13Information Disclosure 13Denial of Service 13Elevation of Privilege 13Applying STRIDE to Blockchain 14Conclusion 14CHAPTER 2 FUNDAMENTALS 15Cryptographic Primitives 15Public Key Cryptography 16Introducing “Hard” Mathematical Problems 16Building Cryptography with “Hard” Problems 18How the Blockchain Uses Public Key Cryptography 19Security Assumptions of Public Key Cryptography 20Attacking Public Key Cryptography 20Hash Functions 25Security Assumptions of Hash Functions 25Additional Security Requirements 27How the Blockchain Uses Hash Functions 28Attacking Hash Functions 31Threat Modeling for Cryptographic Algorithms 32Data Structures 33Transactions 33What’s In a Transaction? 33Inside the Life Cycle of a Transaction 34Attacking Transactions 34Blocks 37Inside a Block 37Attacking Blockchain Blocks 38Threat Modeling for Data Structures 39Conclusion 39CHAPTER 3 PROTOCOLS 43Consensus 43Key Concepts in Blockchain Consensus 44Byzantine Generals Problem 44Security via Scarcity 45The Longest Chain Rule 46Proof of Work 46Introduction to Proof of Work 47Security of Proof of Work 48Proof of Stake 53Introduction to Proof of Stake 53Variants of Proof of Stake 54Security of Proof of Stake 54Threat Modeling for Consensus 59Block Creation 59Stages of Block Creation 60Transaction Transmission 60Block Creator Selection (Consensus) 60Block Building 61Block Transmission 61Block Validation 61Attacking Block Creation 62Denial of Service 62Frontrunning 63SPV Mining 65Threat Modeling for Block Creation 65Conclusion 65CHAPTER 4 INFRASTRUCTURE 67Nodes 67Inside a Blockchain Node 68Attacking Blockchain Nodes 68Blockchain- Specific Malware 69Denial-of-Service Attacks 70Failure to Update 71Malicious Inputs 72Software Misconfigurations 73Threat Modeling for Blockchain Nodes 74Networks 74Attacking the Blockchain Network 75Denial-of-service Attacks 75Eclipse/Routing Attacks 76Sybil Attacks 78Threat Modeling for Blockchain Networks 80Conclusion 80CHAPTER 5 ADVANCED 83Smart Contracts 83Smart Contract Vulnerabilities 84General Programming Vulnerabilities 85Blockchain- Specific Vulnerabilities 94Platform-Specific Vulnerabilities 103Application- Specific Vulnerabilities 119Threat Modeling for Smart Contracts 128Blockchain Extensions 128State Channels 129State Channel Security Considerations 129Sidechains 130Sidechain Security Considerations 131Threat Modeling for Blockchain Extensions 132Conclusion 133CHAPTER 6 CONSIDERATIONS FOR SECURE BLOCKCHAIN DESIGN 137Blockchain Type 137Public vs. Private 138Benefits of Public vs. Private Blockchains 138Open vs. Permissioned 139Benefits of Open vs. Permissioned Blockchains 139Choosing a Blockchain Architecture 140Privacy and Security Enhancements 140Zero-Knowledge Proofs 140Stealth Addresses 141Ring Signatures 141Legal and Regulatory Compliance 142Designing Secure Blockchains for the Future 143Index 145
Lean UX (3. Auflage)
Mit agilen Teams erfolgreiche Produkte designen Lean UX ist ein Synonym für modernes Produktdesign und -entwicklung. Durch die Kombination von menschenzentriertem Design, agilen Arbeitsweisen und einem ausgeprägten Geschäftssinn machen Designer:innen, Produktmanager:innen, Entwickler:innen und Scrum Master auf der ganzen Welt Lean UX heute zum führenden Ansatz für digitale Produktteams.In der dritten Auflage dieses preisgekrönten Buches helfen Ihnen die Autoren Jeff Gothelf und Josh Seiden, sich auf das Produkterlebnis und nicht auf die Ergebnisse zu konzentrieren. Sie lernen Taktiken für die Integration von User Experience Design, Produktentdeckung, agilen Methoden und Produktmanagement kennen. Und Sie erfahren, wie Sie Ihr Design in kurzen, iterativen Zyklen vorantreiben können, um zu ermitteln, was für Unternehmen und Benutzer:innen am besten funktioniert. Lean UX führt Sie durch diesen Wandel – zum Besseren.Erleichtern Sie Ihrem Team den Lean-UX-Prozess mit dem Lean-UX-Canvas.Stellen Sie sicher, dass jedes Projekt mit klaren kundenzentrierten Erfolgskriterien beginnt.Verstehen Sie die Rolle der Designer:innen in einem agilen Team.Stellen Sie sicher, dass die Designarbeit in jedem Sprint stattfindet.Bauen Sie Produktentdeckung in die »Geschwindigkeit« Ihres Teams ein.Zielgruppe: UX-/Produktdesigner*innenProduktmanager*innenScrum MasterManager*innen von UX-TeamsAutoren: Jeff Gothelf unterstützt Unternehmen bei der Entwicklung besserer Produkte und Führungskräfte bei der Entwicklung einer Kultur, die bessere Produkte hervorbringt. Er begann als Software-Designer und arbeitet heute als Coach, Berater und Keynote-Speaker, der Unternehmen dabei hilft, die Lücken zwischen geschäftlicher Agilität, digitaler Transformation, Produktmanagement und menschenzentriertem Design zu schließen.Josh Seiden ist Designer, Autor und Coach. Er hilft Teams dabei, echte Probleme für Kunden zu lösen und Mehrwert für Unternehmen zu schaffen. Als Coach hilft er Teams, ihre Arbeitsweise zu verbessern, eine effektivere Zusammenarbeit aufzubauen und die Reise der Produktentwicklung zu genießen.
Xiaomi 12 / 12 Pro / 12X
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Xiaomi 12 / 12 Pro / 12X von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Xiaomi 12 / 12 Pro / 12X- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
Teach Yourself VISUALLY Python
A SIMPLE, STRAIGHTFORWARD, AND HANDS-ON ROADMAP TO THE WORLD OF COMPUTER PROGRAMMING WITH PYTHONTeach Yourself VISUALLY: Python is your personal guide to getting you started in programming. As one of the world's most popular—and most accessible—coding languages, Python is your gateway into the wide and wonderful world of computer science. This hands-on guide walks you through Python step by clearly illustrated step, from writing your very first Python code in a terminal window or the VS Code app through to creating your own lists, dictionaries, and custom classes.In the book, you’ll learn to:* Install Python and the tools you need to work with it on Windows, macOS, and Linux* Work with files and folders, manipulate text, and create powerful functions that do exactly what you want* Write clean code that makes decisions effectively, repeats actions as needed, and handles any errors that occurA must-have resource for aspiring programmers starting from the very beginning, Teach Yourself VISUALLY: Python is also an indispensable handbook for programmers making a transition from another language.CHAPTER 1 GETTING READY TO WORK WITH PYTHONUnderstanding What Python Is and Does 4Choose the Right Version of Python 6Install Python on Windows 8Install Python on the Mac 12Install Python on Linux If Necessary 14Learn About Development Tools for Python 16Download and Install Visual Studio Code 20Get Started with Visual Studio Code and Apply a Theme 22Install Visual Studio Code Extensions for Python 24Configure Visual Studio Code for Working with Python 26CHAPTER 2 WRITING AND RUNNING YOUR FIRST PYTHON CODEUnderstanding the main() Function 30Create and Save a New Script in Visual Studio Code 32Write and Run Code in Visual Studio Code 34Execute Python Commands in a Terminal Window 38Run a Python Script in a Terminal Window 39Understanding Comments in Python 40Add Comments to Your Code 42Grasp Importing Modules and Objects 44Import Modules and Use Their Methods 48CHAPTER 3 GETTING STARTED WITH VARIABLESUnderstanding Variables and Their Usage 52Understanding Python’s Data Types 54Work with Integers 58Work with Floating‐Point Values 60Work with Boolean Values 62Work with Tuples 64Work with Sets 66Start Working with Strings 68Start Working with Lists 70Start Working with Dictionaries 72Convert Data from One Type to Another 74CHAPTER 4 WORKING WITH FILES AND DIRECTORIESUnderstanding Working with Files and Directories 78Load the os Module and List Files and Directories 80Navigate Among Directories 82Create and Delete Directories 84Rename, Move, and Copy Files and Directories 88Get Information About the User and System 92Split a File Path into Its Components 94Understanding Python’s open() Function 96Understanding Python’s Ways of Closing Files 97Open a File If It Exists; If Not, Create It 98Check an Open File’s Status and Close It 100Write Data to a File 102Open a File for Both Reading and Writing 104Append Data to a File 106Read a Text File 108CHAPTER 5 WORKING WITH PYTHON’S OPERATORSMeet the Arithmetic Operators 112Work with the Arithmetic Operators 114Meet the Assignment Operators 116Work with the Assignment Operators 117Meet the Comparison Operators 118Work with the Comparison Operators 119Meet the Logical Operators 120Work with the Logical Operators 121Meet the Identity Operators 122Work with the Identity Operators 123Meet the Membership Operators 124Work with the Membership Operators 125Meet the Bitwise Operators 126Work with the Bitwise Operators 127CHAPTER 6 MAKING DECISIONS WITH IF STATEMENTSLearn the Essentials of if Statements 130Understanding the if Statement 132Create an if Statement 133Understanding the if else Statement 134Create an if else Statement 135Understanding the if elif Statement 136Create an if elif Statement 137Understanding the if elif else Statement 138Create an if elif else Statement 139Understanding Nested if Statements 140Create Nested if Statements 141Chapter 7 Repeating Actions with LoopsUnderstanding Python’s Loops 144Understanding How for Loops Work 146Create for Loops 148Understanding How while Loops Work 150Create while Loops 152Understanding break Statements in Loops 154Using a break Statement to Exit a Loop Early 155Understanding continue Statements in Loops 156Using a continue Statement in a Loop 157Understanding else Statements in Loops 158Using an else Statement in a Loop 159Understanding Loop Nesting 160Nest Loops to Create Complex Repetition 161CHAPTER 8 WORKING WITH FUNCTIONSUnderstanding Functions and Their Syntax 164Understanding Function Parameters and Returns 166Using Python’s Built‐In Functions 168Create a Function with Parameters and a Return 172Create a Function with a Parameter But No Return 173Create a Function with No Parameters But a Return 174Create a Function with No Parameters and No Return 176Create a Function That Returns Multiple Values 177Create a Function with Optional Parameters 178CHAPTER 9 WORKING WITH TEXTLearn the Essentials of Strings 182Create Single‐Line Strings 184Create Multiline Strings 186Meet Python’s String Methods 188Return Information About a String 190Transform and Clean Up a String 192Return Part of a String via Slicing 194Concatenate and Repeat Strings 196Search for One String Inside Another String 198Check and Change String Capitalization 200Meet Python’s Tools for Building Strings 204Build Strings with the Interpolation Operator 210Build Strings with the .format Method 212Build Strings with f‐Strings 214Build Strings with Template Strings 216CHAPTER 10 HANDLING ERRORSUnderstanding the Various Types of Errors 220Identify Common Python Errors 222Meet the try except Block 224Cause Errors and Trap Exceptions 226Raise an Exception Manually 228Add an else Block or a finally Block 229Create Nested try except Blocks 230Create Custom Exceptions 232CHAPTER 11 WORKING WITH LISTS AND DICTIONARIESUnderstanding Lists and Their Use 236Create a List 238Meet Python’s List Methods 239Add Items to a List 240Remove Items from a List 242Locate Items and Access Data in a List 244Sort the Items in a List 246Understanding Dictionaries and Their Use 248Create a Dictionary and Return Values 250Meet Python’s Dictionary Methods 251Create a Dictionary from an Existing Iterable 252Add Key/Value Pairs to a Dictionary 254Remove Key/Value Pairs from a Dictionary 256Return Keys and Values from a Dictionary 258CHAPTER 12 WORKING WITH CLASSESUnderstanding Classes and Instances 262Create a Class and Instantiate Instances 264Understanding Class and Instance Attributes 266Set Class and Instance Attributes 268Grasp Class, Instance, and Static Methods 270Create an Instance Method 274Create a Class Method 275Create a Static Method 276Review the Class’s Code 277Index 278
Cloud Attack Vectors
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years, attackers have realigned their efforts, focusing on remaining undetected, monetization after exploitation, and publicly shaming organizations after a breach.New, innovative, and useful products continue to emerge and offer some cloud protection, but they also have distinct limitations. No single, standalone solution or strategy can effectively protect against all cloud attack vectors or identify all malicious activity. The simple fact is that the cloud is based on a company’s assets being offered as services. As a result, the best security any organization can achieve is to establish controls and procedures in conjunction with services that are licensed in the cloud.Cloud Attack Vectors details the risks associated with cloud deployments, the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and shows how to improve detection of malicious activity.WHAT YOU’LL LEARN* Know the key definitions pertaining to cloud technologies, threats, and cybersecurity solutions* Understand how entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environment* Implement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environments* Develop a comprehensive model for documenting risk, compliance, and reporting based on your cloud implementationWHO THIS BOOK IS FORNew security professionals, entry-level cloud security engineers, managers embarking on digital transformation, and auditors looking to understand security and compliance risks associated with the cloud MOREY J. HABER is Chief Technology Officer at BeyondTrust. He has more than 20 years of IT industry experience and is author of the book Privileged Attack Vectors and Asset Attack Vectors. Morey joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology for vulnerability, privileged, and remote access management solutions. In 2004, Morey joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. Morey began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.BRIAN CHAPPELL is Chief Security Strategist for Beyond Trust, EMEA & APAC, and is a multi-skilled individual with a passion for delivering best practice solutions that help customers run their businesses more effectively and securely. His specialties include: cybersecurity solutions, IT strategy and implementation, project management, global IT operations management, sales engineering, software development, and enterprise and solutions architecture.CHRISTOPHER HILLS is a Security Strategist focused on Privileged Access Management (PAM) and Identity and Access Management (IAM). He is Security Strategist for BeyondTrust's Privileged Access Management Solutions, enforcing Privileged Password Management and Privileged Session Management, Privileged Endpoint Management, and Secure Remote Access which utilizes a single pane of glass for all management aspects, including Automated Account Discovery, Privileged Management and Elevation, Audit and Compliance, and Behavior & Reporting. His responsibilities include: IAM/PAM focus, strategy, mentoring, leadership, customer and prospect liaison, thought leadership, background reference, business development, customer-facing GRC, and working closely with global sales and marketing organizations to help support GTM efforts while assisting with critical sales opportunities and key marketing events.FORWARDINTRODUCTIONCHAPTER 1. CLOUD COMPUTINGSoftware as a ServicePlatform as a ServiceInfrastructure as a ServiceFunction as a ServiceX as a ServiceDesktop as a ServiceData Center as a ServiceManaged Software as a ServiceBackend as a ServiceCHAPTER 2. CLOUD PROVIDERSAmazon Web ServicesMicrosoft AzureGoogle Cloud PlatformOracle CloudAlibabaOther ServicesCHAPTER 3. CLOUD DEFINITIONSIdentitiesAccountsEntitlementsPrivilegesRightsPermissionsContainersSegmentationMicrosegmentationInstancesChapter 4. Asset ManagementDiscoveryCHAPTER 5. ATTACK VECTORSEntitlementsVulnerabilitiesHardeningConfigurationsCredentialsS3 BucketsIdentitiesEntitlementsAPIAuthenticationCertificatesPhishingRemote AccessSupply Chain – 3rd Party MSP/MSSPChapter 6. MitigationsHardeningPatch ManagementPAMCIEMCIAMCWPPChapter 7. Regulatory ComplianceSecurity QuestionnairesSOCType IType IIType IIICloud Security AllianceCCMCAIQCIS ControlsPCI DSSISONISTFedRampChapter 8. ArchitecturesZero TrustCloud-NativeHybridEphemeral ImplementationsAccountsInstancesPrivilegesCHAPTER 9. Imposter SyndromeCHAPTER 10. RECOMMENDATIONSCHAPTER 11. CONCLUSION
Digitale Notizen mit GoodNotes
Mit GoodNotes erstellst und verwaltest du deine Notizen schnell und einfach auf dem iPad oder dem iPhone. Egal ob in der Schule, im Studium, beruflich oder privat: Die vielfältigen Funktionen der umfangreichen App ermöglichen es dir, verschiedenste Inhalte wie Notizen, Fotos, gescannte Dokumente, PDF-Dateien und Sketchnotes miteinander zu kombinieren und das Potenzial deines digitalen Notizbuchs voll auszuschöpfen.Die Autorin führt dich Schritt für Schritt durch die Menüs und alle wichtigen Funktionen von GoodNotes: vom Erstellen eines Notizbuchs über den Import verschiedener Dateiformate bis hin zur Datensicherung. Du lernst, wie du eigene Vorlagen und Sticker erstellst, Dokumente einscannst, die Handschrifterkennung nutzt und GoodNotes ganz nach deinen Bedürfnissen einrichtest und anpasst.Darüber hinaus gibt dir die Autorin einen praktischen Leitfaden für die klare Strukturierung deiner Notizen an die Hand und zeigt dir, wie du dich mit GoodNotes selbst organisierst und online mit anderen zusammenarbeitest.Ein farbiges Kapitel rund um die kreative Gestaltung deiner Notizen mit Schmuckschrift, Farben, Sketchnotes und mehr sowie eine Vielzahl von Beispielen als Inspiration für den Einsatz von GoodNotes im Alltag runden dieses Praxisbuch ab.Zahlreiche Tipps und Best Practices helfen dir, GoodNotes effektiv zu nutzen und optimal in deine Arbeitsabläufe einzubinden. So bist du bestens darauf vorbereitet, deine Notizen von der »Papierwelt« auf die »digitale Welt« umzustellen.Aus dem Inhalt:Tipps für die passende HardwareNotizbücher anlegen und organisierenStiftwerkzeuge, Auswahlfunktion, Bilder einfügen und mehrEffizient arbeiten mit der Suchfunktion, Gliederungen, Favoriten und VorlagenImportfunktion und Dokumente scannenLernkarten, Präsentationen und Online-ZusammenarbeitKreative Gestaltung mit Farben, Schmuckschriften und StickernInspiration für Mindmaps, Mitschriften, Kalender, Bullet Journals und mehrNotizen exportieren und druckenSchritt für Schritt auf digitale Notizen umsteigen Autorin:Andrea Rawanschad ist Enthusiastin für handschriftliche Notizen mit klarer Struktur und kreativer Gestaltung sowie Expertin für Selbstorganisation. Digital, denn sie ist bekennender GoodNotes-Fan und organisiert ihren gesamten beruflichen und privaten Alltag mit Hilfe der App. Als Inhaberin der LIKE PAPER Andrea Rawanschad GmbH berät und begleitet sie Menschen bei der Umstellung auf digitale Notizen mit GoodNotes.
ERP-Systeme erfolgreich implementieren
Mit Enterprise Resource Planning werden Personal und Ressourcen in einem Unternehmen termingemäß und bedarfsgerecht geplant, gesteuert und verwaltet. Dabei geht es nicht primär um die Entwicklung oder Produktion von Software, sondern um die Installation einer fertigen Software und deren Adaption an eine Organisation. Ein ERP-Projekt beinhaltet daher immer individuelle und bedarfsgerechte Anpassungen – sowohl an der eingesetzten Standard-Software als auch im Unternehmen.Friedhelm Espeter zeigt in diesem Buch, wie Sie bei der Implementierung von ERP-Systemen erfolgreich vorgehen. Dabei erfahren Sie insbesondere, inwiefern agiles Prozessmanagement von Vorteil ist, um nicht nur die Vorgaben zu Zeit, Budget und Qualität zu erfüllen, sondern auch um die richtige Balance zwischen Änderungen an der Software und in den Unternehmensprozessen zu finden.Zudem lernen Sie, wie Sie die Risiken der Zeit- und Kostenüberschreitung durch agile Beweglichkeit und Anpassungsfähigkeit reduzieren, um Business-Software erfolgreich einzuführen. Darüber hinaus wird besonderer Wert auf die praktischen Aspekte des agilen Ansatzes z.B. in Form von Workshops und Best Practices gelegt.Die hier dargestellten methodischen Vorgehensweisen basieren auf den 25-jährigen Erfahrungen des Autors in der Implementierung von ERP-Software. Eingeflossen sind die Methoden Triton Target der ehemaligen Fa. Baan, AIM for Business Flows der Fa. Oracle und das von Barry W. Boehm entwickelte Spiralmodell.Aus dem Inhalt:Implementierungsmethoden verstehen: Geschäftsprozesse, Testworkshops, Test-skripts und -casesPraktisches Vorgehen bei der agilen Einführung von Business-SoftwareKauf, Beratung und Projekt-SetupNotwendige Schritte in der EvaluierungsphaseDie verschiedenen Zyklen der ImplementierungsphaseErforderliche Anpassungen vornehmen, Daten übernehmen und Software testenChange-Management: Veränderungsprozesse aktiv steuernDurchführung von ValidierungsworkshopsAufbau der Projekt-InfrastrukturGelungener Systemübergang und effektives Projektmanagement Autor:Friedhelm Espeter, Projektmanager (PMP/PMI) und Scrum Master (PSM I), arbeitet seit mehr als 30 Jahren als Projektmanager bei der Implementierung von Standard-Software. Er war Manager bei namhaften amerikanischen und europäischen Softwarehäusern und arbeitet heute als Berater zu Projekt-Management-Services speziell im ERP-Umfeld.
Kubernetes Application Developer
Write efficient, smart, and optimized code for containerized applications on public and private clouds at a generic level. This book shows you how to set up microservices that are robust, scalable, and capable of running on GKE (Google Kubernetes Service), AKS (Azure Kubernetes Service), ECS (Elastic Container Service), or even on a vanilla K8S cluster.The book covers the nuts and bolts of container orchestration engines (COEs) and explains how to install and configure them. It also covers creation and deployment of a sample application on COEs. You will learn how to integrate different applications such as OAuth and how to test them and secure them using Istio Citadel. You also will be taught how to create HPA rules for microservices and scale only those microservices that require it, making your stack intelligent. In the concluding chapter, the book explains how to build a SaaS solution from scratch, running on the cloud with automated deployments accessed publicly via a secured ingress K8S controller.By the end of the book, you will have a good understanding of developing microservices and how to design and create a software solution on the cloud.WHAT YOU WILL LEARN* Build software on Kubernetes in the most optimized way* Interact with Kubernetes using client SDKs in Python, Go, nodejs, etc.* Create a testing and deployment CI/CD system for software stacks* Secure your application using Istio, without writing code* Access microservices using ingress controllers and scale them using HPA rulesWHO THIS BOOK IS FORSoftware and system engineers and developersPRATEEK KHUSHALANI is a Cloud Architect at Google and works as a full stack developer in developing cloud based accelerators. Prior to Google, he worked as software developer at IBM and worked as an individual contributor on the development of SDN networking of the IBM public cloud. He has worked across industries such as software, retail, and R&D prototypes, with a focus on cloud computing and machine learning. At Google, he contributes to the development of tools which help accelerate customer's migration journey to Google Cloud Platform. Prateek has strong expertise in developing and designing IaaS, PaaS, and SaaS solutions for both public and private clouds. He holds a bachelor's degree from Birla Institute of Technology, Mesra. He is an open-source contributor and is an active writer on tech blogs.•Chapter 1, Cloud Computing and KubernetesChapter Goal:o What is cloud computingo What is Kuberneteso Different distributions of Kuberneteso Setting up a K8S cluster- for workshop purposeso Common commands of K8So Place of Kubernetes from an architecture point of view.•Chapter 2, Creating Applications on KubernetesChapter Goal:o Create an Apache http servero Create a Java Tomcat war-based servero Create a gRPC API servero Create a Rest API servero Differences when creating applications on Kubernetes.o How will the application be actually called in a production based cluster.•Chapter 3, Testing of Applications on KubernetesChapter Goal:o Creating a CI system for testing.o Using of Pytest, go test, behave and other best testing tools based on programming language.o Adding a simple CD system stage.o Coverage of code and mock of applications to replicate real time scenarios.•Chapter 4, Security of ApplicationsChapter Goal:o Creating a book inventory application composed of UI, API and DBo Using cloud services instead of reinventing the wheelo Using and understand Istio for TLS Encryption and monitoring.o Understanding authentication/authorization and RBAC systems.o Leverage all the services available rather than developing things to secure all microservices.•Chapter 5, Networking of ApplicationsChapter Goal:o Understanding the basics of networking in Kubernetes.o How containers/pod reach each other via overlay networking.o Different ways networking is configured in Kubernetes cluster.o Using name-based DNS routing in applications rather than IP’so Understanding load balancers and the features provided by it.o Using Istio to create a service mesh of microservices and see the flow of traffic between them.o Configuring Kubernetes objects such as Ingress, Service, Endpoints.•Chapter 6, Scaling of Software SolutionChapter Goal:o Identify which microservice of the solution is becoming a bottlenecko Creating HPA rules in Kubernetes to scale specific microservice.o Use case and real-world problems and solutions to them via scaling.•Chapter 7, Building a SaaS SolutionChapter Goal:o Start with nothing but a simple k8s cluster.o Create microservice with your own hands one by one.o Identify what all services are required for building a sample SaaS e commerce solution.o Creating/Configuring a UI, API, DB, business logic, monitoring software stack.o Architecting the entire solution.o Bring the stack up and testing it against load and autoscaling the solution to support any number of requests.
Hands-on AIOps
Welcome to your hands-on guide to artificial intelligence for IT operations (AIOps). This book provides in-depth coverage, including operations and technical aspects. The fundamentals of machine learning (ML) and artificial intelligence (AI) that form the core of AIOps are explained as well as the implementation of multiple AIOps uses cases using ML algorithms.The book begins with an overview of AIOps, covering its relevance and benefits in the current IT operations landscape. The authors discuss the evolution of AIOps, its architecture, technologies, AIOps challenges, and various practical use cases to efficiently implement AIOps and continuously improve it. The book provides detailed guidance on the role of AIOps in site reliability engineering (SRE) and DevOps models and explains how AIOps enables key SRE principles.The book provides ready-to-use best practices for implementing AIOps in an enterprise. Each component of AIOps and ML using Python code and templates is explained and shows how ML can be used to deliver AIOps use cases for IT operations.WHAT YOU WILL LEARN* Know what AIOps is and the technologies involved* Understand AIOps relevance through use cases* Understand AIOps enablement in SRE and DevOps* Understand AI and ML technologies and algorithms* Use algorithms to implement AIOps use cases* Use best practices and processes to set up AIOps practices in an enterprise* Know the fundamentals of ML and deep learning* Study a hands-on use case on de-duplication in AIOps* Use regression techniques for automated baselining* Use anomaly detection techniques in AIOpsWHO THIS BOOK IS FORAIOps enthusiasts, monitoring and management consultants, observability engineers, site reliability engineers, infrastructure architects, cloud monitoring consultants, service management experts, DevOps architects, DevOps engineers, and DevSecOps expertsNAVIN SABHARWAL is currently Chief Architect and Head of Strategy for Autonomics, named "DRYiCE" at HCL technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL technologies. Navin is an innovator, thought leader, author, and a consultant in areas of AI and machine learning (ML), observability, AIOps, DevOps, DevSecOps, engineering, and R&D. He is responsible for IP development & service delivery in the areas of AI and ML, automation products, cloud computing, public cloud AWS, Microsoft Azure, VMWare private cloud, Microsoft private cloud, data center automation, analytics for IT operations, and IT service management.GAURAV BHARDWAJ is a seasoned IT professional and technology evangelist with expertise in service assurance, cloud computing, AI/ML-based software product development, engineering, and data analytics. He has international experience in developing and executing IT automation strategies and solutions that are aligned with business goals as well as heading multi-million USD services globally. Gaurav has a proven track record of achievements in roles of enterprise architect and consultant for large and complex global engagements (includes multiple Fortune 500 companies) leveraging automation as the pivot for business development as well as for transforming legacy environments/platforms into next-generation IT environments powered by cloud-native and containerized apps, SDI, and AIOps and DevOps methodologies.CHAPTER 1: WHAT IS AIOPS, NEED, AND BENEFITSChapter goal: This chapter talks about challenges that IT modernization and business digitalization are posing to IT business and how AIOPs can help in overcoming them as well as sustain and stay relevant in this post-pandemic economy.No of pages 15Sub -topics1. Impact of IT modernization and digitalization2. Challenges with ITOA3. What is artificial intelligence4. AIOPs - AI in information technology5. AIOPs businesses leversCHAPTER 2: AIOPS ARCHITECTURE, METHODOLOGY, CHALLENGESChapter goal: Explain technologies and components involved in AIOPs architecture along with its implementation methodology and challenges.No of pages: 12Sub - Topics1. AIOPs overview2. AIOPs architecture and components3. AIOPs implementation methodology4. AIOPs challengesCHAPTER 3: AIOPS SUPPORTING SITE RELIABILITY ENGINEERING AND DEVOPSChapter goal: Explain the use of AIOPs in SRE in keeping services up and running and the DevOps process of product development to operations.No of pages: 15Sub - Topics:1. Overview of SRE and DevOps model2. AIOPs for diverse personas - SRE & DevOps3. AIOPs for application development life cycle4. Aligning Dev and Ops via AIOPs.5. SRE principles and AIOPs6. AIOPs enabling visibility in SRE and DevOpsCHAPTER 4: FUNDAMENTALS OF MACHINE LEARNING AND AIChapter Goal: Explain the technology and concepts behind artificial intelligence and machine learning.No of pages: 12Sub - Topics:1. What is machine learning2. Why machine learning is important3. Types of machine learning4. Natural language processing5. Machine learning algorithmic tradeoff6. Principles of artificial intelligenceCHAPTER 5: AIOPS USE CASESChapter Goal: Explain practical scenarios or tasks which can be facilitated by AIOPs.No of pages: 8Sub - Topics:Monitoring of software systemsRoot cause analysis with AIOpsSecurity use casesCHAPTER 6: APPLYING MACHINE LEARNING FOR AIOPS:Chapter Goal: Provide No. of pages: 12Sub - Topics:1. Automated baselining2. Deduplication3. Anomaly detection4. ML-driven correlation5. Rule-based correlation6. AIOPs in detect-to-correct value chainCHAPTER 7: SETTING UP OF AIOPSChapter Goal: Provide best practices for AIOPs journey and guidance on setting up of AIOPs practic.No. of pages: 10Sub - Topics:1. AIOPs implementation framework.2. Define roadmap of AIOPs3. Setting up guardrails4. Teams enablement and engagement5. Visibility and governance6. Continous improvementCHAPTER 8: FUTURE OF AIOPSChapter Goal: Provide a blueprint of AIOPs future and its impact on the IT industry.No. of pages: 3Sub - Topics:1. Transition from domain-centric to domain-agnostic AIOPs2. AIOPs holds key To digital business transformation3. Unified Framework - AIOPs with SecOps and DevSecOps.
Machine Learning on Geographical Data Using Python
Get up and running with the basics of geographic information systems (GIS), geospatial analysis, and machine learning on spatial data in Python.This book starts with an introduction to geodata and covers topics such as GIS and common tools, standard formats of geographical data, and an overview of Python tools for geodata. Specifics and difficulties one may encounter when using geographical data are discussed: from coordinate systems and map projections to different geodata formats and types such as points, lines, polygons, and rasters. Analytics operations typically applied to geodata are explained such as clipping, intersecting, buffering, merging, dissolving, and erasing, with implementations in Python. Use cases and examples are included. The book also focuses on applying more advanced machine learning approaches to geographical data and presents interpolation, classification, regression, and clustering via examples and use cases.This book is your go-to resource for machine learning on geodata. It presents the basics of working with spatial data and advanced applications. Examples are presented using code (accessible at github.com/Apress/machine-learning-geographic-data-python) and facilitate learning by application.WHAT YOU WILL LEARN* Understand the fundamental concepts of working with geodata* Work with multiple geographical data types and file formats in Python* Create maps in Python* Apply machine learning on geographical dataWHO THIS BOOK IS FORReaders with a basic understanding of machine learning who wish to extend their skill set to analysis of and machine learning on spatial data while remaining in a common data science Python environmentJOOS KORSTANJE is a data scientist, with over five years of industry experience in developing machine learning tools. He has a double MSc in Applied Data Science and in Environmental Science and has extensive experience working with geodata use cases. He currently works at Disneyland Paris where he develops machine learning for a variety of tools. His experience in writing and teaching have motivated him to write this book on machine learning for geodata with Python. Chapter 1: Introduction to GeodataChapter Goal: Presenting what geodata is, how to represent it, its difficultiesNo of pages 20Sub -Topics1. Geodata definitions2. Geographical Information Systems and common tools3. Standard formats of geographical data4. Overview of Python tools for geodataChapter 2: Coordinate Systems and ProjectionsChapter Goal: Introduce coordinate systems and projectionsNo of pages: 20Sub - Topics1. Geographical coordinates2. Geographical coordinate systems3. Map projections4. Conversions between coordinate systemsChapter 3: Geodata Data Types: Points, Lines, Polygons, RasterChapter Goal: Explain the four main data types in geodataNo of pages : 20Sub - Topics:1. Points2. Lines3. Polygons4. RasterChapter 4: Creating MapsChapter Goal: Learn how to create maps in PythonNo of pages : 20Sub - Topics:1. Discover mapping libraries2. See how to create maps with different data typesChapter 5: Basic Operations 1: Clipping and Intersecting in PythonChapter Goal: Learn clipping and intersecting in PythonNo of pages: 20Sub - Topics:1. What is clipping?2. How to do clipping in Python?3. What is intersecting4. How to do intersecting in Python?Chapter 6: Basic Operations 2: Buffering in PythonChapter Goal: Learn how to create buffers in PythonNo of pages: 20Sub - Topics:1. What are buffers?2. How to create buffers in PythonChapter 7: Basic Operations 3: Merge and Dissolve in PythonChapter Goal: Learn how to merge and dissolve in PythonNo of pages: 20Sub - Topics:1. What is the merge operation?2. How to do the merge operation in Python?3. What is the dissolve operation?4. How to do the dissolve operation in Python?Chapter 8: Basic Operations 4: Erase in PythonChapter Goal: Learn how to do an erase in PythonNo of pages: 20Sub - Topics:1. What is the erase operation?2. How to apply the erase operation in PythonChapter 9: Machine Learning: InterpolationChapter Goal: Learn how to do interpolation PythonNo of pages: 20Sub - Topics:1.What is interpolation?2.How to do interpolation in Python3.Different methods for spatial interpolation in PythonChapter 10: Machine Learning: ClassificationChapter Goal: Learn how to do classification on geodata in PythonNo of pages: 20Sub - Topics:1.What is classification?2.How to do classification on geodata in Python?3.In depth example application of classification on geodata.Chapter 11: Machine Learning: RegressionChapter Goal: Learn how to do regression on geodata in PythonNo of pages: 20Sub - Topics:1.What is regression?2.How to do regression on geodata in Python?3.In depth example application of regression on geodata.Chapter 12: Machine Learning: ClusteringChapter Goal: Learn how to do clustering on geodata in PythonNo of pages: 20Sub - Topics:1.What is clustering?2.How to do clustering on geodata in Python?3.In depth example application of clustering on geodata.Chapter 13: ConclusionChapter Goal: Regroup all the knowledge togetherNo of pages: 10Sub - Topics:1.What have you learned?2.How to combine different practices together3. Other reflections for applying the topics in a real-world use case
Getting Started with Ethereum
Get started with blockchain development with this step-by-step guide. This book takes you all the way from installing requisite software through writing, testing, and deploying smart contracts.Getting Started with Ethereum delves into technologies most closely associated with Ethereum, such as IPFS, Filecoin, ENS, Chainlink, Truffle, Ganache, OpenZeppelin, Pinata, Fleek, Infura, Metamask, and Opensea. Author Davi Bauer walks you through project creation, how to compile projects and contracts, configure networks, and deploy smart contracts on blockchains. He then covers smart contracts, including deploying and verifying them. This book approaches blockchain in a way that allows you to focus on the topic that most interests you, covering Ethereum-related technologies broadly and not just focusing on Solidity.This hands-on guide offers a practical rather than conceptual approach get you coding. Upon completing this book, you will be able to confidently develop and deploy smart contracts on blockchains.Source code can be found at https://github.com/Apress/getting-started-ethereum.WHAT YOU WILL LEARN* Understand tokenization of assets, including NFTs, using Ethereum* Host censorship-resistant applications using IPFS* Deploy on second-layer blockchains using Polygon* Deploy smart contracts with multiple technologies around EthereumWHO IS THIS BOOK FOROff-chain developers who want to migrate to on-chain development starting with the Ethereum blockchain and the technologies around it. Prior programming knowledge and conceptual understanding of blockchain is necessary. Davi Pedro Bauer has over 20 years of experience in the IT sector with experience in analysis and systems development. He has been working with agile methods since 2009, where he participated in agile adoption programs in multidisciplinary teams, supporting the implementation of processes and practices such as Scrum and Kanban, as well as the launch of new digital products for web and mobile platforms. Since 2016, he has been studying topics related to Blockchain, such as cryptocurrencies, asset tokenization, smart contracts, and decentralized applications (DApps), and since 2019, he has been working with DevSecOps from code to infrastructure. ● Pre requirements○ Install Blockchain Dev Kit Extension on VS Code■ Installing the extension○ Install Truffle■ Installing Truffle■ Checking Truffle installation○ Install Ganache CLI■ Installing Ganache■ Starting Ganache locally○ Install DockerChapter 1: MetaMask○ Install and Setup MetaMask Wallet■ Installing the wallet■ Configuring the wallet■ Accessing your wallet■ Discovering your wallet addressChapter 2: Infura○ Create an account on Infura■ Creating a new account■ Setting up your Infura projectChapter 3: Solidity○ Get started with Solidity project on VS Code■ Creating a new project■ Compiling the project■ Deploying to development BlockchainChapter 4: ERC20 Tokens○ Write a simple ERC20 token using OpenZeppelin■ Preparing the environment■ Writing the contract■ Setting the Solidity compiler version■ Compiling the contract■ Verifying the result○ Deploy ERC20 token to ganache development Blockchain■ Preparing the migration■ Writing the contract■ Starting the Blockchain■ Configuring the Blockchain network■ Deploying the contract■ Adding the token to a wallet○ Create an ERC20 token with fixed supply■ Creating the project■ Writing the contract■ Starting Ganache development Blockchain■ Migrating the contract■ Configuring MetaMask■ Adding the token■ Transferring tokens between accounts○ Deploy ERC20 token to Testnet using Infura■ Installing the pre-requirements■ Setting up your Infura project■ Setting up your Smart Contract■ Configuring the private key■ Deploying the Smart Contract■ Checking your wallet balance■ Verifying the Smart Contract on Etherscan○ Deploy ERC20 token to Polygon Testnet (Layer 2)■ Installing the pre-requirements■ Adding Polygon Mumbai to MetaMask networks■ Activating the Polygon add-on on Infura■ Setting up your Infura project■ Setting up your Smart Contract■ Configuring the network (using Matic endpoint)■ Configuring the network (using Infura endpoint)■ Configuring the private key■ Deploying the Smart Contract■ Checking your wallet balance■ Verifying the Smart Contract on Polygan Scan○ Deploy ERC20 Token to Polygon Mainnet (Layer 2)■ Adding Polygon Mainnet to MetaMask networks■ Configuring the network (using Infura endpoint)■ Deploying the Smart Contract■ Checking your wallet balance■ Verifying the Smart Contract on polyganscanChapter 5: Unit Tests for Smart Contracts○ Write Unit Tests for ERC20 Smart Contracts■ Creating a new unit test file■ Writing test for the contract total supply■ Writing test asserting for the contract balanceChapter 6: ERC721- Non-Fungible Tokens○ Create your art NFT using Ganache and OpenZeppelin■ Creating the project■ Configuring the wallet■ Configuring the network■ Configuring the solidity compiler■ Configuring the private key■ Creating the badge image■ Adding the badge to your local IPFS■ Pinning the badge to a remote IPFS node■ Creating the badge metadata■ Compiling the Smart Contract■ Migrating the Smart Contract■ Instantiate the Smart Contract■ Awarding badge to a wallet■ Checking badge on Etherscan■ Adding the NFT token to your wallet○ Sell your art NFT on Opensea■ Connecting to OpenSea■ Viewing your badge■ Listing your badge for sale■ Exploring listing detailsChapter 7: Faucets○ Get Test Ether From Faucet on Ropsten Network■ Accessing the faucet■ Waiting for the transaction○ Get Test Ether From Faucet on Rinkeby Testnet■ Preparing for funding■ Funding your wallet■ Checking your wallet○ Get Test MATIC From Faucet on Mumbai Testnet■ Preparing for funding■ Funding your wallet■ Checking your wallet○ Get Test MATIC From Faucet on Mainnet■ Preparing for funding■ Funding your wallet■ Checking your walletChapter 8: IPFS - InterPlanetary File System○ Create Your IPFS Node■ Installing the node■ Configuring the node■ Testing the node■ Exploring your IPFS node○ Add Files to IPFS■ Adding the file■ Viewing the file content on the console■ Checking the file in the web ui■ Viewing the file content in the browser○ Setup IPFS Browser Extension■ Installing the browser extension■ Configuring the node type■ Starting an external node■ Importing a file○ Pin and Unpin IPFS Files on Local Node■ Starting your local node■ Adding file to your node■ Checking the file was added■ Verifying your file was pinned■ Unpinning your file■ Pinning your file manually○ Pin and Unpin Files on Remote Node using Pinata■ Setting up API Keys on Pinata■ Setting up Pinata as a remove service on your terminal■ Adding a new file to your local IPFS node■ Pinning your file to the remote IPFS node■ Unpinning your file from the remote IPFS node○ Host Your Site on IPFS Using Fleek■ Login on Fleek■ Cloning your existing repository■ Installing Fleek■ Initializing Fleek■ Deploying your siteChapter 9: Filecoin○ How to preserve files on Filecoin local node■ Creating the project■ Configuring truffle■ Adding an image to be preserved■ Installing dependencies■ Starting local endpoints■ Preserving files to FilecoinChapter 10: ENS - Ethereum Name Service○ Register your ENS to Receive any Crypto, Token or NFT on Your Wallet■ Searching your domain name■ Request to register■ Managing your registration name■ Checking the name resolutionChapter 11: Chainlink○ Get Crypto Prices Inside Smart Contracts using Chainlink Oracles■ Creating the project■ Creating the Smart Contract■ Creating the migration■ Setting up your Infura project■ Configuring the wallet■ Configuring the network■ Configuring the solidity compiler■ Configuring the private key■ Compiling the Smart Contract■ Deploying the Smart Contract■ Getting the price information from the Smart ContractChapter 12: Nethereum○ Get Ether Balance using Nethereum■ Creating the project■ Installing web3■ Creating the method■ Getting the balance
Java EE to Jakarta EE 10 Recipes
Take a problem-solution approach for programming enterprise Java or Java EE applications and microservices for cloud-based solutions, enterprise database applications, and even small business web applications. _Java EE to Jakarta EE 10 Recipes_ provides effective, practical, and proven code snippets that you can immediately use to accomplish just about any task that you may encounter. You can feel confident using the reliable solutions that are demonstrated in this book in your personal or corporate environment.Java EE was made open source under the Eclipse Foundation, and Jakarta EE is the new name for what used to be termed the Java Platform, Enterprise Edition. This book helps you rejuvenate your Java expertise and put the platform’s latest capabilities to use for quickly developing robust applications. If you are new to Jakarta EE, this book will help you learn the features of the platform and benefit from one of the most widely used and powerful technologies available for cloud-native enterprise application development today.Examples in this book highlight Jakarta EE’s capabilities, helping you to build streamlined and reliable applications using the latest in Java technologies. The book takes a problem-solution approach in which each section introduces a common programming problem, showing you how to solve that problem in the best possible way using the latest features in Jakarta EE. Solutions in the form of working code examples are presented that you can download and use immediately in your own projects. Clear descriptions are provided to help you understand and learn to build further on the solutions provided.This is the ideal book for the code-focused programmer interested in keeping up with the future of enterprise development on the Java Platform.WHAT YOU WILL LEARN* Develop enterprise java applications using the latest open-source Jakarta EE platform* Create great-looking user interfaces using Jakarta Servlets, Jakarta Server Pages, Jakarta Server Faces and the Eclipse Krazo framework (an implementation of Jakarta MVC)* Build database applications using Jakarta NoSQL, Jakarta Persistence, and Jakarta Enterprise Beans.* Develop enterprise grade applications using Context & Dependency Injection, and Jakarta RESTFul web services* Automate testing through cohesive test suites built on Arquillian for Jakarta EE applications* Build loosely coupled distributed applications using Jakarta Messaging* Deploy microservices applications in cloud environments using Docker* Secure applications utilizing the Jakarta EE Security APIWHO THIS BOOK IS FORJava developers interested in quickly finding effective and proven solutions without reading through a lengthy manual and scrubbing for techniques.Josh Juneau is a professional application developer who enjoys working with database technology and learning new languages. He is a seasoned professional in Java SE and Java EE development, and brings strong database experience to the table as well. His interest in Java for developing web-based solutions has led to a passion of Java technology as a whole, including other languages on the JVM. In his spare time, Josh enjoys spending time with his wife and five wonderful children at his home in rural Illinois.Tarun Telang is an experienced Software Engineer with expertise in Web, Mobile & Cloud-based enterprise software solution development for world-renowned software companies including Microsoft, Oracle, SAP, BlackBerry, and Polycom. He is a hands-on technologist with 15+ years of IT industry experience with a strong business understanding and the ability to architect complex software solutions. He has been presenting in conferences related to software technology, writing technical articles and blogs since more than 10 years now. Tarun has also done 1 year of teaching for topics like Database Concepts, Data Structures & Programming Languages to Computer Science Engineering students. he has these certifications: Oracle Certified Programmer for Java 6.0 Platform, SAP Certified Development Consultant for NetWeaver 04 Java Web Application Development, SAP Certified Application Management Expert for End-to-End Root Cause Analysis - Solution Manager 4.0, and NASBA Certification on Remote Work.Revision Notes from AuthorBased on the book preview, below is the list of changes/updates I see relevant for the next revisions of this book - Jakarta EE 10 Recipes.----------------------------------Introduction:* Adding following details for Jakarta EE 9, 9.1 and 10 releases like timelines and theme.* Updating instructions for enabling Jakarta EE support using NetBeans IDE* Adding instructions for using the following IDE for building Jakarta EE applications.* Eclipse IDE* Visual Studio Code* Providing instructions for installing the following build tools for Jakarta EE* Maven* GradleAll Chapters:* Rename to chapter title Servlets and Jakarta Server Pages* Updating terminologies as below:* JavaServer Pages(JSP) to Jakarta Server Pages* JavaServer Faces(JSF) to Jakarta Faces,* JavaMail to Jakarta Mail* …* Reworking and verifying the code examples by performing the following modifications* Updating import statements in all code samples from javax.* to jakarta.*.* Updating code to make use of the latest Java 11 features* Updating instructions for enabling Jakarta EE support using NetBeans IDE* Adding instructions for using the following IDE as well for building Jakarta EE applications.* Eclipse IDE* Visual Studio Code* Ensuring the code can be executed in the latest releases of the following servers* Open Liberty, WildFly and GlassFish servers as are the flag bearers for Jakarta EE compliance.* Also verifying the code with other servers based on their availability with support for latest functionality like Payara or Apache TomEE or Oracle Weblogic and provide any specific instructions in case applicable.Note: As I would dig deeper into the content will be able to suggest more pointsChapter 1: Servlets and JavaServer Pages* Rename to chapter title Servlets1-8 (Adding content about - Improving performance with server push)* Adding a recipe for adding a user authentication to Servlets.* Adding a recipe for defining servlet behaviour based on user authorization* Adding more recipes for the following topics* session tracking andHandling cookies* HTTP Session handling* Servlet Filters / URL Redirections* . Move JSP related recipes to a separate chapterNew Chapter 2: Creating a New Chapter on Jakarta Server Pages* Adding recipes for the following topics* Handling file uploads* Add recipe for Implementing Internationalization* Managed Bean 2.0Chapter 2: JavaServer Faces Fundamentals* Rename to chapter title Jakarta Faces Fundamentals* Updating code as per Jakarta Faces 4.0 specification* Adding recipes for the following topics* Externalizing strings using resource bundlesChapter 3: Advanced JavaServer Faces* Rename to chapter title Advanced Jakarta FacesChapter 4: Eclipse Krazo* renaming it to Jakarta MVC and updating it with content for Jakarta MVC.Chapter 5: JDBC with Jakarta EE* Adding a Chapter with recipes on Jakarta TransactionsChapter 6: Object-Relational Mapping* Adding sections about migrating from Hibernate ORM 5.5 to Jakarta Persistence.Chapter 7: Jakarta NoSQL* Add recipes related to working with graph databases (like neo4j).Chapter 8: Enterprise JavaBeans* Updating recipes as Jakarta Enterprise Beans 4.0 specifications.Chapter 9: Java Persistence Query Language* Rename chapter title to Jakarta Persistence Query LanguageChapter 10: Bean Validation* Updating recipes as per Jakarta Bean validation 3.0 standard* Adding recipes about Migration from Hibernate ValidatorChapter 11: Contexts and Dependency Injection* Updates based on the latest CDI support* Adding recipes related to* Interceptor bindingsDecorators* Firing EventsChapter 12: Java Message ServiceRename to Jakarta MessagingUpdating recipes as per Jakarta Messaging 3.0Chapter 13: RESTful Web ServicesAdding a Chapter on migrating from Spring would also make sense as the upcoming release of Spring Framework 6 will align with Jakarta EE starting Q3 2021Add recipes for* Handling various status codes in HTTP responses.Chapter 14: WebSockets and JSONContent on WebSockets would be better suited after chapter* Restructuring sections on Web Sockets from Chapter 14 to Chapter 2 after HTTP/2 Server Push in Servlets changes* Adding a chapter on Jakarta ConcurrencyChapter 15: SecurityRename to Jakarta SecurityAdding recipes for* The authentication mechanism for Client-Cert and Digest* Support for OpenID, OAuth and JWTChapter 16: Concurrency and Batch* Updating recipes as per Jakarta Concurrency 3.0Chapter 17: Deploying to Containers* Adding topics related to running microservices targeted at smaller runtimes as per Jakarta Core Profile standard1. Servlets and Java Server Pages2. JavaServer Faces Fundamentals3. Advanced JavaServer Faces4. Eclipse Krazo5. JDBC With Jakarta EE6. Object-Relational Mapping7. Jakarta NoSQL8. Enterprise JavaBeans9. Java Persistence Query Language10. Bean Validation11. Contexts and Dependency Injection12. Java Message Service13. RESTful Web Services14. WebSockets and JSON15. Security16. Concurrency and Batch17. Deploying to Containers
Excel Formeln und Funktionen für Dummies (5. Auflg.)
In Excel gibt es mehr als 400 Funktionen. Aber welche der vielen Funktionen erleichtert Ihnen Ihre Arbeit? Wie setzen Sie die Funktionen richtig ein? Wie lautet die Syntax? Dieses Buch stellt Excel-Einsteigern die 150 nützlichsten Excel-Funktionen ausführlich vor. Sie lernen, wie Sie Formeln richtig für Statistiken einsetzen, Prognosen erstellen, Wahrscheinlichkeiten berechnen und vieles mehr. Einige Funktionen erleichtern den Alltag mit Excel und lassen Sie schneller erreichen, was Sie eigentlich wollen. Der richtige Gebrauch der Funktionen wird Ihnen anhand von Beispielen verdeutlicht. Ken Bluttman arbeitet seit über 25 Jahren als Software-Entwickler. Er ist spezialisiert auf VBA-Programmierung in Microsoft Office.Über den Autor 9Einführung 21TEIL I: LOS GEHT’S 23Kapitel 1: Grundlegendes zu Excel, Formeln und Funktionen 25Kapitel 2: Mit den Tools für Funktionen Zeit sparen 57Kapitel 3: Was es mit Matrixformeln und Matrixfunktionen auf sich hat 75Kapitel 4: Auch Formeln können irren 85TEIL II: SICH REICH RECHNEN 103Kapitel 5: Alles über Darlehen und Zinssätze 105Kapitel 6: Investieren Sie Ihr Geld! 123Kapitel 7: Das kleine Einmaleins der mathematischen Funktionen 141Kapitel 8: Das große Einmaleins der mathematischen Funktionen 159TEIL III: MIT STATISTIKEN JONGLIEREN 181Kapitel 9: Funktionen aus der beschreibenden Statistik 183Kapitel 10: Signifikanztests verwenden 223Kapitel 11: Prognosen und Wahrscheinlichkeiten 233TEIL IV: DIE DATENVIELFALT FEST IM GRIFF 253Kapitel 12: Mit Datumsfunktionen auf dem Laufenden bleiben 255Kapitel 13: Mit den Zeitfunktionen die Zeit im Griff haben 275Kapitel 14: Verweise, logische Werte und Bezüge in Funktionen 285Kapitel 15: Informationsfunktionen 321Kapitel 16: Textfunktionen 335Kapitel 17: Daten mit Datenbankfunktionen zusammenfassen 361TEIL V: DER TOP-TEN-TEIL 377Kapitel 18: Zehn Tipps zum Arbeiten mit Formeln 379Kapitel 19: Zehn Möglichkeiten, mit Excel ausgefallene Dinge zu tun 393Kapitel 20: Zehn wirklich coole Funktionen 399Stichwortverzeichnis 407
Android-Apps programmieren lernen für Dummies
Sie wollen programmieren lernen, um eigene Apps für Ihr Android-Gerät zu entwickeln? Dann sind Sie hier richtig. Dieses Buch ist drei Bücher in einem: Sie lernen Java, begreifen die objektorientierte Programmierung und erhalten eine Einführung in die Android-App-Entwicklung. Wichtige Themen wie die Ansteuerung des Displays oder der Umgang mit der Grafik, den Sensoren und GPS werden Ihnen an kleinen Apps vorgeführt. Nebenher erfahren Sie noch so einiges über die Spieleprogrammierung und sogar, wie Sie JSON-Daten aus dem Internet in eine App einbinden. Freuen Sie sich auf die spannende Reise, die vor Ihnen liegt!Arnold Willemer ist Programmierer und Administrator mit mehr als 30 Jahren Berufserfahrung und Dozent an der Hochschule Flensburg. Er hat mehrere erfolgreiche Computer-Bücher geschrieben, die sich durch ihre Verständlichkeit und ihren lockeren Stil auszeichnen.