Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Clean C++20

Clean C++20

Write maintainable, extensible, and durable software with modern C++. This book, updated for the recently released C++20 standard, is a must for every developer, software architect, or team leader who is interested in well-crafted C++ code, and thus also wants to save development costs. If you want to teach yourself about writing better C++ code, Clean C++20 is exactly what you need. It is written for C++ developers of all skill levels and shows by example how to write understandable, flexible, maintainable, and efficient C++ code. Even if you are a seasoned C++ developer, there are nuggets and data points in this book that you will find useful in your work.If you don't take care with your codebase, you can produce a large, messy, and unmaintainable beast in any programming language. However, C++ projects in particular are prone to get messy and tend to slip into a maintenance nightmare. There is lots of C++ code out there that looks as if it was written in the 1980s, completely ignoring principles and practices of well-written and modern C++.It seems that C++ developers have been forgotten by those who preach Software Craftsmanship and Clean Code principles. The web is full of C++ code examples that may be very fast and highly optimized, but whose developers have completely ignored elementary principles of good design and well-written code. This book will explain how to avoid this and how to get the most out of your C++ code. You'll find your coding becomes more efficient and, importantly, more fun.WHAT YOU WILL LEARN* Gain sound principles and rules for clean coding in C++* Carry out test-driven development (TDD)* Better modularize your C++ code base* Discover and apply C++ design patterns and idioms* Write C++ code in both object-oriented and functional programming stylesWHO THIS BOOK IS FORAny C++ developer or software engineer with an interest in producing better code.STEPHAN ROTH is a coach, consultant, and trainer for systems and software engineering with German consultancy company oose Innovative Informatik eG located in Hamburg. Before he joined oose, he worked for many years as a software developer, software architect, and systems engineer in the field of radio reconnaissance and communication intelligence systems. He has developed sophisticated applications, especially in a high-performance system environment, and graphical user interfaces using C++ and other programming languages. Stephan is an active supporter of the Software Craftsmanship movement and is concerned with principles and practices of Clean Code Development (CCD).CH01 - IntroductionCH02 - Build a Safety NetCH03 - Be PrincipledCH04 - Basics of Clean C++CH05 - Advanced concepts of modern C++CH06 - Object OrientationCH07 - Functional ProgrammingCH08 - Test Driven DevelopmentCH09 - Design Patterns and IdiomsAppendix A - Small UML GuideBibliography

Regulärer Preis: 46,99 €
Produktbild für Smart Mobility

Smart Mobility

Each year we witness several paradigm shifts in mobility systems and services, increasingly so as technology progresses. The future of mobility is people-centric, software-defined, connected, and electric. Now more than ever, it is imperative for current and aspiring leaders in the field to understand the foundations of people-centric smart cities with a focus on sustainability.Smart Mobility offers a holistic view of the current and emerging smart mobility systems and explores their foundational technologies, technology enablers, and disruptors. Author Alaa Khamis acknowledges the need for smart mobility arising with growing world urbanization, and the impact of this on public health, congestion, and climate change. Khamis expertly interrogates how a focus on smart mobility can mitigate all of these risks using his triad of complementary factors: technology, governance, and city planning.In this book you’ll study how foundational technologies such as artificial intelligence, blockchain, the Internet of Things, robotics, and many more all work together to allow for smart mobility in our modern era. Khamis additionally covers the topical events of the COVID-19 pandemic and analyzes its impact on consumer behavior and the expected short-term disruptions and longer-term structural changes. The socioeconomic changes in our urban centers are vast, and Smart Mobility breaks down the core concepts with meaningful data and insights.WHAT YOU WILL LEARN* Explore different mobility modes, including mobility-as-a-service, shared mobility, mobility on demand, the gig economy and the passenger economy* Cover how the smart mobility triad - technology, governance, and city planning - work together to create a smart and sustainable mobility* See how the COVID-19 pandemic is impacting consumer behavior and preferences and changing the future of mobilityWHO THIS BOOK IS FORWorking professionals, students, researchers, technologists, city planners, and the curious layman.DR. ALAA KHAMIS is a Senior AI Expert at General Motors, Canada. He is also Smart Mobility Lecturer at University of Toronto, Affiliate Member of Center of Pattern Analysis and Machine Intelligence (CPAMI) at University of Waterloo and Adjunct Professor at Nile University. He worked as Autonomous Vehicles Professor at Zewail City of Science and Technology, Head of AI at Sypron Solutions, AI Consultant at Menya Solutions, Senior Research Scientist at Vestec, Canada, Director of Engineering R&I - Canada at Marques Aviation Ltd., Associate Professor and Head of Engineering Science Department at Suez University, Associate Professor and Director of Robotics and Autonomous Systems (RAS) research group at German University in Cairo (GUC), Research Assistant Professor and AI Lecturer at University of Waterloo, Canada, Visiting Professor at Charles III University of Madrid, Spain and University of Sherbrooke, Canada, Visiting Researcher at University of Reading, UK and Distinguished Scholar at University of Applied Sciences Ravensburg-Weingarten, Germany.He is a Senior IEEE member, recipient of the 2018 IEEE Member and Geographic Activities (MGA) Achievement Award, founder of Minesweepers: Towards a Landmine-free World international robotic competition and member in IEEE SA P7007 Ontological Standard for Ethically Driven Robotics and Automation Systems Working Group and P1872.2 Standard for Autonomous Robotics (AuR) Ontology Working Group.His research interests include smart mobility, autonomous and connected vehicles, algorithmic robotics, humanitarian robotics, intelligent data processing and analysis, machine learning and combinatorial optimization. He published 4 books, 5 book chapters, 16 technical reports and more than 90 scientific papers in refereed journal and international conferences. He also filed 12 US patents.Preface1 Introduction2 Toward a People-centric Smart City2.1 World Urbanization Problems2.2 People-centric Smart Cities3 Smart Mobility Triad3.1 Smart Mobility Governance3.2 City Planning3.3 Smart Mobility Technology4 Smart Mobility: Foundational Technologies4.1 PNT and GIS4.2 Wireless Communication4.3 Mobile Computing4.4 IoT4.5 Artificial Intelligence(AI)4.6 Robotics4.7 Blockchain4.8 Electrification5 Smart Mobility: Technology Enablers5.1 Intelligent Infrastructure5.2 Connected Mobility5.3 Automated Mobility5.4 E-Mobility5.5 Micro-Mobility5.6 Active,Soft or Zero-impact Mobility5.7 Inclusive Mobility5.8 Context Awareness Systems(CAS)6 Smart Mobility: Disruptors6.1 Disruptive Mobility Platforms6.1.1 Autonomous Ground Vehicles6.1.2 3D Mobility and Urban Air Mobility (UAM)6.1.3 River Taxis6.1.4 Automated People Movers(APMs)6.1.5 Hyperloop and Urbanloop6.2 Shared Mobility6.3 Mobility-as-a-Service(MaaS)6.4 Mobility On Demand(MOD)6.5 Seamless Integrated Mobility Systems (SIMS)6.6 Last-mile Delivery6.7 Vehicle-as-a-Service(VaaS)6.8 Gig Economyand Passenger Economy6.8.1 Gig Economy and Crowdsourcing6.8.2 Passenger Economy7 Smart mobility in a pandemic and post-pandemic world8 Concluding RemarksBibliography

Regulärer Preis: 56,99 €
Produktbild für E-Auto einfach erklärt

E-Auto einfach erklärt

Alles, was Sie über Elektroautos wissen müssen: von A wie Akku bis Z wie zu Hause laden.Überlegen Sie, ein Elektroauto zu kaufen oder suchen Sie als Neubesitzer/in einen schnellen Einstieg ins Thema? Timo Kauffmann erklärt in dem Buch »E-Auto einfach erklärt« genau, wie das mit dem Fahren und Laden eines Elektroautos funktioniert – von One-Pedal-Driving und Rekuperation über Ladekarten und -apps bis zur Installation einer heimischen Wallbox für Ihr E-Auto. Leicht verständliche Erläuterungen zu Akkus, Motoren und Kilowattstunden helfen Ihnen, die zugrundeliegende Technologie besser zu verstehen und Ihr Elektroauto effizienter zu nutzen. So machen Sie sich mit Ihrem neuen Auto schneller vertraut und können diese leise, saubere und komfortable Form des Fahrens wirklich genießen.Aus dem Inhalt:Entscheidungshilfe: Welches Elektroauto passt zu mir?Worauf Sie bei gebrauchten Elektroautos achten müssenKein Haus- oder Wohnungseigentümer und trotzdem zuhause laden?Faktencheck: 10 Antworten auf typische FragenEffizienz & Fahrspaß – keine Gegensätze!So funktionieren Elektromotoren und AkkusÜbersicht zu Stecker- und KabeltypenSo nutzen Sie öffentliche LadestationenWallboxen für daheim und unterwegsUmweltbonus und KfW-FörderungÜbersicht Ladekarten und Lade-AppsReiseplanung und LadestrategienTipps zur ReichweitenoptimierungPflege, Versicherung und PannenhilfeInhalt (PDF-Link)

Regulärer Preis: 24,90 €
Produktbild für Running Microsoft Workloads on AWS

Running Microsoft Workloads on AWS

Did you know that Amazon Web Services runs nearly double the amount of Microsoft Workloads in the cloud than any other provider?RUNNING MICROSOFT WORKLOADS IN AWS is your single-source solution for learning the best practice skills and guidance that AWS consultants offer their customers in the field. Over 70% of enterprise workloads are based on Microsoft technologies and AWS has been running these technologies in the AWS Cloud for more than 12 years—far longer than Microsoft’s own Azure cloud platform.This book introduces AWS foundations and compares them to traditional Microsoft architectures, showing you how to design your AWS Cloud platform to run your current Microsoft solutions. It covers the crucial area of identity and access control, showing how to implement Active Directory inside the AWS platform and the most secure ways of enabling Single Sign On from your own data centers and from Microsoft AzureAD.The book goes in-depth and shows how developers across the globe are using their existing .NET skills to develop directly on top of AWS, using current AWS development services such as AWS Code Pipeline, AWS Code Build, and AWS Code Deploy to create the next generation of cloud-native applications using the most popular cloud serverless service—AWS Lambda.WHAT YOU WILL LEARN* Be familiar with the basic building blocks of AWS and how the terminology differs from your own data center and Microsoft Azure* Understand Amazon Machine Images (AMI) strategies and solutions to best manage the trade-off between speed and manageability* Run one of the most popular Microsoft products: SQL Server on AWS* Be aware of the different database architecture designs for using Amazon RDS and Amazon EC2* Read an overview of Serverless Development in the AWS cloud from a Microsoft .NET perspective* Know migration strategies for moving your Microsoft Workloads to the AWS CloudWHO THIS BOOK IS FORCovers high-level concepts and solutions for CTOs and CCTOs; provides a solution for architects; and dives deep into the topic for administrators and DevOps engineersRyan Pothecary is Senior Specialist Solution Architect for a Cloud-based services company, which he joined four years ago. He has worked on the AWS platform for the last eight years as part of a near 30-year career in IT. Over the last four years he’s worked directly with customers and partners who are moving to the AWS Cloud. He specializes in helping customers move Microsoft Workloads to AWS and works with customers throughout their entire cloud journey. He is also a member of a Community of engineers, architects, and consultants who help customers run Microsoft Workloads on AWS in every part of the world. Outside of work he is determined to learn how to play the guitar his wife bought him, even though he has small stubby fingers.

Regulärer Preis: 66,99 €
Produktbild für Multi-Platform Graphics Programming with Kivy

Multi-Platform Graphics Programming with Kivy

Modern science requires computer graphics models to provide realistic visual renderings. Learning the appropriate programming tools for 2D and 3D modeling doesn’t have to be so difficult. This book reviews the best programming tools to achieve this and explains how to apply them to mobile platforms like Android.Multi-Platform Graphics Programming with Kivy provides a straightforward introductory approach for designing 2D, 3D, and stereoscopic applications, using analytical equations from vector algebra. Throughout the book you’ll look closely at this approach and develop scenes in Kivy, taking advantage of powerful mathematical functions for arrays by NumPy for Python.Unbuntu is used to develop the programs, which allows you to easily convert to Android platform. Each chapter contains step-by-step descriptions on each subject and provides complete program listings.WHAT YOU’LL LEARN* Work with Kivy, a modern, powerful multi-platform graphics system* Convert and run programs on Android devices* Program, fill faces, and rotate 2D and 3D polygons* Apply the concepts of 2D and 3D applications* Develop stereoscopic scenes* Review a straightforward introduction to 2D, 3D, and stereoscopic graphics applications* Use simple analytical equations from vector algebraWHO THIS BOOK IS FORThe primary audience is students and researchers in graphics programming with experience in analytical equations.Moisés Cywiak is a researcher in physical optical sciences with over 20 years of teaching experience in physics, mathematics, electronic engineering, and programming in C, C++, and python, in Centro de Investigaciones en Óptica A.C.David Cywiak received his Ph.D. degree in physics in 2014 from Universidad de Guanajuato. From 2012 to 2013 he collaborated as a guest researcher at the Dalton Cardiovascular Research Center, University of Missouri-Columbia, in the development of an optical-photoacoustic system intended for the detection of photoacoustic signals generated by cancerous cells. Since 2014 he has been working as a metrologist in the Thermometry Department at Centro Nacional de Metrologia, México. His research includes photoacoustics, optical engineering and radiation thermometry. He has over 7 years of experience teaching physics, mathematics and programming in C for undergraduate students. He also has over 5 years of experience teaching Temperature measurement techniques and calibration of instruments in the thermometry area for industry professionals.Chapter 1: Preliminaries. Software installation1.1. installing pip3 and IDLE1.2. Installing kivy1.3. Installing buildozerChapter 2: Polygon rotation in two dimensions2.1. Rotation equations2.2. Mapping equations to the screenChapter 3: Two dimensional polygon programming3.1. Polygon structure3.2. Drawing the edges of the polygon3.3. Filling the polygon with lines3.4. Rotating the polygon3.5. The kivy platform3.6. main.py listing3.7. File.kv lisitng3.8. Using buildozerChapter 4: Three-dimensional projections and rotations4.1. Projection of a three-dimensional point into a plane4.2. Rotation of a point in a planeChapter 5: Programming three-dimensional polygons5.1. Polygon structure5.2. Basic functions5.3. main.py listing5.4. File.kvChapter 6: Stereoscopic 3D Programming6.1. Basics of a stereoscopic view6.2. Programming and ORing the images6.3. Projections6.4. Polygon structure6.5. DrawAxes function6.6. Points of projection6.7. main.py listing6.8. File.kvChapter 7: 3D plots programming7.1. Program basic operations7.2. Function overview7.3. Generating the axes, the mesh and the function7.4. Plotting the function in the screen7.5. Rotating the plot7.6. main.py listing7.7. File.kv listingChapter 8: Stereoscopic 3D plots8.1. Creating the function, coordinates and mesh8.2. Creating two images for stereoscopic effects8.3. Drawing the plot8.4. main.py listing8.5. File.kv listing8.6. Surfaces with saddle pointsChapter 9: 3D parametric plots9.1. Parametric equations9.2. Plotting9.3. main.py9.4. File.kvChapter 10: Stereoscopic 3D parametric plots10.1. Generating the function10.2. Creating PIL images for the stereoscopic effect10.3. Plotting the function10.4. main.py10.5. File.kvChapter 11: Sympy11.1. Analytical expressions and symbols11.2. Declaring functions with analytical expressions11.3. Solving equations11.4. Solving simultaneous equations11.5. Differentiation11.6. IntegrationChapter 12: Plotting functions in spherical coordinates12.1. Spherical coordinates12.2. Spherical differential equation example12.3. The associated Legendre polynomials12.4. Plotting 3D spherical coordinates12.5. main.py listing12.6. File.kv listing12.7. Incorporating sympy into the Android projectChapter 13. Stereoscopic plots of spherical functions13.1. Creating the stereoscopic scenes13.2. main.py listing13.3. File.kv listingChapter 14. Stereoscopic simple numerical method for the gravitational N-body problem14.1. The gravitational N-body problem14.2. Motion equations14.3. Numerical approach of the dynamic equations14.4. Capturing numerical data14.5. Five planets example14.6. main.py listing14.7. File.kvChapter 15. Stereoscopic cylindrical coordinates plotting. Aberrations of optical lenses15.1. Ideal lens focusing. The Fresnel diffraction integral15.2. Departure from the ideal lens15.3. The wave aberration function in cylindrical coordinates15.4. Stereoscopic plot of the wave aberration terms in cylindrical coordinates15.5. main.py listing15.6. File.kv listingChapter 16. Stereoscopic plotting of three-dimensional conics16.1. Analytical approach16.2. Stereoscopic ellipsoid plotting16.3. main.py (Ellipsoid)16.4. File.kv16.5. HyperboloidChapter 1: Preliminaries. Software installation1.1. installing pip3 and IDLE1.2. Installing kivy1.3. Installing buildozerChapter 2: Polygon rotation in two dimensions2.1. Rotation equations2.2. Mapping equations to the screenChapter 3: Two dimensional polygon programming3.1. Polygon structure3.2. Drawing the edges of the polygon3.3. Filling the polygon with lines3.4. Rotating the polygon3.5. The kivy platform3.6. main.py listing3.7. File.kv lisitng3.8. Using buildozerChapter 4: Three-dimensional projections and rotations4.1. Projection of a three-dimensional point into a plane4.2. Rotation of a point in a planeChapter 5: Programming three-dimensional polygons5.1. Polygon structure5.2. Basic functions5.3. main.py listing5.4. File.kvChapter 6: Stereoscopic 3D Programming6.1. Basics of a stereoscopic view6.2. Programming and ORing the images6.3. Projections6.4. Polygon structure6.5. DrawAxes function6.6. Points of projection6.7. main.py listing6.8. File.kvChapter 7: 3D plots programming7.1. Program basic operations7.2. Function overview7.3. Generating the axes, the mesh and the function7.4. Plotting the function in the screen7.5. Rotating the plot7.6. main.py listing7.7. File.kv listingChapter 8: Stereoscopic 3D plots8.1. Creating the function, coordinates and mesh8.2. Creating two images for stereoscopic effects8.3. Drawing the plot8.4. main.py listing8.5. File.kv listing8.6. Surfaces with saddle pointsChapter 9: 3D parametric plots9.1. Parametric equations9.2. Plotting9.3. main.py9.4. File.kvChapter 10: Stereoscopic 3D parametric plots10.1. Generating the function10.2. Creating PIL images for the stereoscopic effect10.3. Plotting the function10.4. main.py10.5. File.kvChapter 11: Sympy11.1. Analytical expressions and symbols11.2. Declaring functions with analytical expressions11.3. Solving equations11.4. Solving simultaneous equations11.5. Differentiation11.6. IntegrationChapter 12: Plotting functions in spherical coordinates12.1. Spherical coordinates12.2. Spherical differential equation example12.3. The associated Legendre polynomials12.4. Plotting 3D spherical coordinates12.5. main.py listing12.6. File.kv listing12.7. Incorporating sympy into the Android projectChapter 13. Stereoscopic plots of spherical functions13.1. Creating the stereoscopic scenes13.2. main.py listing13.3. File.kv listingChapter 14. Stereoscopic simple numerical method for the gravitational N-body problem14.1. The gravitational N-body problem14.2. Motion equations14.3. Numerical approach of the dynamic equations14.4. Capturing numerical data14.5. Five planets example14.6. main.py listing14.7. File.kvChapter 15. Stereoscopic cylindrical coordinates plotting. Aberrations of optical lenses15.1. Ideal lens focusing. The Fresnel diffraction integral15.2. Departure from the ideal lens15.3. The wave aberration function in cylindrical coordinates15.4. Stereoscopic plot of the wave aberration terms in cylindrical coordinates15.5. main.py listing15.6. File.kv listingChapter 16. Stereoscopic plotting of three-dimensional conics16.1. Analytical approach16.2. Stereoscopic ellipsoid plotting16.3. main.py (Ellipsoid)16.4. File.kv16.5. Hyperboloid16.6. main.py (Hyperboloid)Chapter 17. Two-dimensional Fourier transform17.1. One-dimensional Fourier transform17.2. Rectangular and sinc functions17.3. Code for calculating the discrete one-dimensional Fourier transform17.4. Two-dimensional Fourier transform17.5. Discrete two-dimensional Fourier transform17.6. main.py lisitng17.7. File.kv listing17.8. The Fourier transform of the circular function17.9. Analytical formulation for the Fourier transform of the circular functionChapter 18. Stereoscopic two-dimensional Fourier transform18.1. Piloting the functions18.2. main.py listing18.3. File.kv listing16.6. main.py (Hyperboloid)Chapter 17. Two-dimensional Fourier transform17.1. One-dimensional Fourier transform17.2. Rectangular and sinc functions17.3. Code for calculating the discrete one-dimensional Fourier transform17.4. Two-dimensional Fourier transform17.5. Discrete two-dimensional Fourier transform17.6. main.py lisitng17.7. File.kv listing17.8. The Fourier transform of the circular function17.9. Analytical formulation for the Fourier transform of the circular functionChapter 18. Stereoscopic two-dimensional Fourier transform18.1. Piloting the functions18.2. main.py listing18.3. File.kv listing

Regulärer Preis: 56,99 €
Produktbild für UX for XR

UX for XR

Extending traditional digital platforms to the new frontier of extended reality (XR) requires taking into account what best practices, new concepts, and conventions have been established and what learnings can be brought forward from case studies involving industry leaders. By looking at practical examples from the field of handheld AR breakthroughs, virtual reality (VR) success stories and experimental interaction concept of pioneering XR platforms, you'll see how it's possible to map out a framework of user experience (UX) guidelines to close in on opportunities and challenges that lay ahead.This book defines, identifies, and analyzes UX practices for XR environments and reviews the techniques and tools for prototyping and designing XR user interactions. You'll approach the design for experiential state and spatial cognition, using established UX key performance indicators, while taking into account the social dynamics, emotional framework and wider industry context.UX design and strategy for the XR space is a new frontier, so _UX for XR _focuses on case studies and industry research to illustrate the relationship between UX design and the growth of immersive technologies. Practical examples will demonstrate how you should apply UX design principles using designing interactions in XR by identifying the importance of spaces, senses and storyboarding.WHAT YOU'LL LEARN* Explore the challenges and opportunities of designing for XR* See how spatial interaction is revolutionizing human computer interaction* Examine sensory input and interaction beyond the screen* Work with 3D Interaction Design and build a strong 3D UX* Understand VR and augmented reality essentials for emotion-rich user experiences* Apply UX research techniques for the XR spaceWHO THIS BOOK IS FORThis book is primarily for UX designers, consultants, and strategists; XR developers; and media professionalsChapter 1: Introduction.- Chapter 2: The History and Future of XR.- Chapter 3: The Rise of UX and How it Drives XR User Adoption.- Chapter 4: UX and experience design: From screen to 3D space.- Chapter 5: Pioneering platforms and UX learnings.- Chapter 6: Practical approaches: UX and XR in the real world.

Regulärer Preis: 39,99 €
Produktbild für Introduction to Python for Kids

Introduction to Python for Kids

Want to create cool games and apps to impress your friends (or yourself), but not sure where to start? Or, have you tried your hand at programming, but got utterly bored after combing through hundreds of pages of dry text? Then you’ve come to the right place! This book is the perfect blend of education and fun for kids 8 years and above looking to learn the magic of Python, one of the easiest and most powerful programming languages around, all while solving fun puzzles and building your own projects on the way.Yes, there’ll be chapters on the fundamentals of Python, such as variables, numbers, strings, automation with conditions, loops and functions, objects, and files. But, early on in the book you’ll get started with Turtle, a Python package that was custom-made for kids like you. It lets you literally draw and animate on your computer! Every concept will be interspersed with a fun mini project with Turtle, so you’ll never get bored. Once you get the fundamentals down, you’ll dive right into Tkinter and Pygame, more fun Python packages (goodbye theory!) and you’ll learn all about creating apps and games like the ones you see and use every day (bouncing ball, temperature converter, calculator, rock-paper-scissors, and so much more!).There are also four capstone projects at the end of the book that convert everything you’ve learned so far into full-blown apps and games that you can show off to your friends, parents, and even teachers! You’ll be creating a snake game with Turtle, a tic tac toe game with Tkinter, a full-fledged paint app, again with Tkinter, and finally, a classic space shooters game with Pygame (the cherry on top). Every project chapter will be accompanied with the logic behind the game/app and an explanation on how you’ve arrived at the logic. You’ll develop strong problem solving skills that’ll help you create future projects on your own.There are also two chapters dedicated to just creating fun mini projects and puzzles, one of them placed in the middle of the book to give you a welcome break from all the learning. The book ends with an overview on web development with Python and ideas for more fun projects and puzzles you can solve on your own. Become the “most likely to succeed” kid in your grade while having the most fun getting there!WHAT YOU'LL LEARN* Gain a gentle, but thorough introduction into the world of programming and Python* Create programs and solve problems with core Python concepts* Build mini projects and capstone projects (showcase worthy) with Turtle, Tkinter, and Pygame * Develop programming skills while doing the puzzles and activities described in the book WHO THIS BOOK IS FORKids 8 years and above.Aarthi Elumalai is a programmer, educator, entrepreneur, and innovator. She has a Bachelor of Engineering degree in Computer Science from Anna University, Chennai.Since then, she has managed a team of programmers and worked with 100s of clients. She is also launched a dozen web apps, plugins and software that are being used by thousands of customers online.She has over 15 years of experience in programming. She started coding in Basics at the age of 12, but her love for programming took root when she came across C programming at the age of 15.She is the founder of DigiFisk, an E-learning platform that has more than 60,000 students all over the world. Her courses are well-received by the masses, and her unique, project-based approach is a refreshing change to many. She teaches the complex world of programming by solving a ton of practical exercises and puzzles along the way. Her courses and books always come with hands-on training in creating real world projects using the knowledge learned so her students get better equipped for the real world.When she is not working on her next course or book, you'll see her researching her next product idea and refining her existing products. She is currently committed to bringing the sheer power of artificial intelligence to make life easier for small business owners.Chapter 1. Did You Know?.- Chapter 2. Let's Install Python.- Chapter 3. Your First Python Program.- Chapter 4. Python Loves Numbers.- Chapter 5. Let's Play With Our Numbers.- Chapter 6. Draw Cool Stuff with Turtle.- Chapter 7. A Turtle Deep Dive.- Chapter 8. Play with Letters and Words.- Chapter 9. Follow My Command! . Chapter 10. Automate a Little.- Chapter 11. Lots and Lots of Information.- Chapter 12. Fun Mini Projects Galore.- Chapter 13. Automate with Functions.- Chapter 14. Let’s Create Real World Objects.- Chapter 15. Python and Files.- Chapter 16. Create Cool apps with TKinter.-Chapter 17. Tic Tac Toe Game with Tkinter .- Chapter 18. Project: Paint App with Tkinter.- Chapter 19. Project: Snake Game with Turtle .- Chapter 20. Become a Game Developer with PyGame.- Chapter 21. Project: Space Shooters Game with PyGame.- Chapter 22. Web Development with Python.- Chapter 23. More Mini Projects.- Chapter 24. What’s Next?.

Regulärer Preis: 46,99 €
Produktbild für Betriebswirtschaftliche KI-Anwendungen

Betriebswirtschaftliche KI-Anwendungen

Digitalisierung und Künstliche Intelligenz ermöglichen Unternehmen disruptive Erweiterungen ihrer Geschäftsmodelle. Wer rechtzeitig digitale KI-Geschäftsmodelle einführt, wird seinen Erfolg nachhaltig sichern können. Aber wie und wo können solche Modelle Anwendung finden? Diese Publikation gibt Antworten, wo KI-Geschäftsmodelle greifen können, und wie diese von der ersten Idee bis zur produktiven Anwendung realisiert werden können. KI-Anwendungen in der Betriebswirtschaft.- Grundlagen und Technik.- Digitale Geschäftsmodelle auf Basis Künstlicher Intelligenz.- Prototyp einer digitalen KI-Anwendung.- Beispielanwendung 1.- Beispielanwendung 2.- Beispielanwendung 3.-  Der Weg zum Erfolg mit KI.

Regulärer Preis: 62,99 €
Produktbild für Cybersecurity and Third-Party Risk

Cybersecurity and Third-Party Risk

MOVE BEYOND THE CHECKLIST AND FULLY PROTECT YOURSELF FROM THIRD-PARTY CYBERSECURITY RISKOver the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic.The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing.Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation.* Understand the basics of third-party risk management* Conduct due diligence on third parties connected to your network* Keep your data and sensitive information current and reliable* Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts* Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and EquifaxThe time to talk cybersecurity with your data partners is now.Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.GREGORY C. RASNER is the lead of Cyber Third-Party Risk at Truist Financial Corporation. He has extensive experience in cybersecurity and technology leadership in banking, biotech, software, telecom, and manufacturing. He is the author of several published articles on Third Party Risk and is a sought-after keynote speaker in this area.Foreword xviIntroduction xviiiSECTION 1 CYBERSECURITY THIRD-PARTY RISKCHAPTER 1 WHAT IS THE RISK? 1The SolarWinds Supply-Chain Attack 4The VGCA Supply-Chain Attack 6The Zyxel Backdoor Attack 9Other Supply-Chain Attacks 10Problem Scope 12Compliance Does Not Equal Security 15Third-Party Breach Examples 17Third-Party Risk Management 24Cybersecurity and Third-Party Risk 27Cybersecurity Third-Party Risk as a Force Multiplier 32Conclusion 33CHAPTER 2 CYBERSECURITY BASICS 35Cybersecurity Basics for Third-Party Risk 38Cybersecurity Frameworks 46Due Care and Due Diligence 53Cybercrime and Cybersecurity 56Types of Cyberattacks 59Analysis of a Breach 63The Third-Party Breach Timeline: Target 66Inside Look: Home Depot Breach 68Conclusion 72CHAPTER 3 WHAT THE COVID-19 PANDEMIC DID TO CYBERSECURITY AND THIRD-PARTY RISK 75The Pandemic Shutdown 77Timeline of the Pandemic Impact on Cybersecurity 80Post-Pandemic Changes and Trends 84Regulated Industries 98An Inside Look: P&N Bank 100SolarWinds Attack Update 102Conclusion 104CHAPTER 4 THIRD-PARTY RISK MANAGEMENT 107Third-Party Risk Management Frameworks 113ISO 27036:2013+ 114NIST 800-SP 116NIST 800-161 Revision 1: Upcoming Revision 125NISTIR 8272 Impact Analysis Tool for Interdependent Cyber Supply-Chain Risks 125The Cybersecurity and Third-Party Risk Program Management 127Kristina Conglomerate (KC) Enterprises 128KC Enterprises’ Cyber Third-Party Risk Program 131Inside Look: Marriott 140Conclusion 141CHAPTER 5 ONBOARDING DUE DILIGENCE 143Intake 145Data Privacy 146Cybersecurity 147Amount of Data 149Country Risk and Locations 149Connectivity 150Data Transfer 150Data Location 151Service-Level Agreement or Recovery Time Objective 151Fourth Parties 152Software Security 152KC Enterprises Intake/Inherent Risk Cybersecurity Questionnaire 153Cybersecurity in Request for Proposals 154Data Location 155Development 155Identity and Access Management 156Encryption 156Intrusion Detection/Prevention System 157Antivirus and Malware 157Data Segregation 158Data Loss Prevention 158Notification 158Security Audits 159Cybersecurity Third-Party Intake 160Data Security Intake Due Diligence 161Next Steps 167Ways to Become More Efficient 173Systems and Organization Controls Reports 174Chargebacks 177Go-Live Production Reviews 179Connectivity Cyber Reviews 179Inside Look: Ticketmaster and Fourth Parties 182Conclusion 183CHAPTER 6 ONGOING DUE DILIGENCE 185Low-Risk Vendor Ongoing Due Diligence 189Moderate-Risk Vendor Ongoing Due Diligence 193High-Risk Vendor Ongoing Due Diligence 196“Too Big to Care” 197A Note on Phishing 200Intake and Ongoing Cybersecurity Personnel 203Ransomware: A History and Future 203Asset Management 205Vulnerability and Patch Management 206802.1x or Network Access Control (NAC) 206Inside Look: GE Breach 207Conclusion 208CHAPTER 7 ON-SITE DUE DILIGENCE 211On-site Security Assessment 213Scheduling Phase 214Investigation Phase 215Assessment Phase 217On-site Questionnaire 221Reporting Phase 227Remediation Phase 227Virtual On-site Assessments 229On-site Cybersecurity Personnel 231On-site Due Diligence and the Intake Process 233Vendors Are Partners 234Consortiums and Due Diligence 235Conclusion 237CHAPTER 8 CONTINUOUS MONITORING 239What is Continuous Monitoring? 241Vendor Security-Rating Tools 241Inside Look: Health Share of Oregon’s Breach 251Enhanced Continuous Monitoring 252Software Vulnerabilities/Patching Cadence 253Fourth-Party Risk 253Data Location 254Connectivity Security 254Production Deployment 255Continuous Monitoring Cybersecurity Personnel 258Third-Party Breaches and the Incident Process 258Third-Party Incident Management 259Inside Look: Uber’s Delayed Data Breach Reporting 264Inside Look: Nuance Breach 265Conclusion 266CHAPTER 9 OFFBOARDING 267Access to Systems, Data, and Facilities 270Physical Access 274Return of Equipment 275Contract Deliverables and Ongoing Security 275Update the Vendor Profile 276Log Retention 276Inside Look: Morgan StanleyDecommissioning Process Misses 277Inside Look: Data Sanitization 279Conclusion 283SECTION 2 NEXT STEPSCHAPTER 10 SECURING THE CLOUD 285Why is the Cloud So Risky? 287Introduction to NIST Service Models 288Vendor Cloud Security Reviews 289The Shared Responsibility Model 290Inside Look: Cloud Controls Matrix by the Cloud Security Alliance 295Security Advisor Reports as Patterns 298Inside Look: The Capital One Breach 312Conclusion 313CHAPTER 11 CYBERSECURITY AND LEGAL PROTECTIONS 315Legal Terms and Protections 317Cybersecurity Terms and Conditions 321Offshore Terms and Conditions 324Hosted/Cloud Terms and Conditions 327Privacy Terms and Conditions 331Inside Look: Heritage Valley Health vs. Nuance 334Conclusion 335CHAPTER 12 SOFTWARE DUE DILIGENCE 337The Secure Software Development Lifecycle 340Lessons from SolarWinds and Critical Software 342Inside Look: Juniper 344On-Premises Software 346Cloud Software 348Open Web Application Security Project Explained 350OWASP Top 10 350OWASP Web Security Testing Guide 352Open Source Software 353Software Composition Analysis 355Inside Look: Heartbleed 355Mobile Software 357Testing Mobile Applications 358Code Storage 360Conclusion 362CHAPTER 13 NETWORK DUE DILIGENCE 365Third-Party Connections 368Personnel Physical Security 368Hardware Security 370Software Security 371Out-of-Band Security 372Cloud Connections 374Vendor Connectivity Lifecycle Management 375Zero Trust for Third Parties 379Internet of Things and Third Parties 385Trusted Platform Module and Secure Boot 388Inside Look: The Target Breach (2013) 390Conclusion 391CHAPTER 14 OFFSHORE THIRD-PARTY CYBERSECURITY RISK 393Onboarding Offshore Vendors 397Ongoing Due Diligence for Offshore Vendors 399Physical Security 399Offboarding Due Diligence for Offshore Vendors 402Inside Look: A Reminder on Country Risk 404Country Risk 405KC’s Country Risk 406Conclusion 409CHAPTER 15 TRANSFORM TO PREDICTIVE 411The Data 414Vendor Records 415Due Diligence Records 416Contract Language 416Risk Acceptances 417Continuous Monitoring 417Enhanced Continuous Monitoring 417How Data is Stored 418Level Set 418A Mature to Predictive Approach 420The Predictive Approach at KC Enterprises 420Use Case #1: Early Intervention 423Use Case #2: Red Vendors 425Use Case #3: Reporting 426Conclusion 427CHAPTER 16 CONCLUSION 429Advanced Persistent Threats Are the New Danger 431Cybersecurity Third-Party Risk 435Index 445

Regulärer Preis: 27,99 €
Produktbild für Wireless and Mobile Hacking  and Sniffing Techniques

Wireless and Mobile Hacking and Sniffing Techniques

Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of tapping phone wires and get to know about the conversation. It is also called wiretapping applied to the computer networks.Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.There are several ways how hackers can gain access to a public WiFi network and infiltrate connected devices to steal data. The most common practice that hackers use is called sniffing. This method allows hackers to hijack any packet of data that is being transmitted between a device and a router.The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to userThis report covers the main Wireless and Mobile Hacking and Sniffing Techniques. The report contains the following pars: Part A: Setup LabPart B: Sniffer and Phishing HackingPart C: Wireless Hacking Networks in LinuxPart D: Mobile Platforms HackingI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 7,49 €
Produktbild für Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks The report contains of the following parts:Part A: Lab Setup Part B: Foot printing and ReconnaissancePart C: Scanning MethodologyPart D: EnumerationI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 5,99 €
Produktbild für Common Windows, Linux and Web Server Systems Hacking Techniques

Common Windows, Linux and Web Server Systems Hacking Techniques

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Computer viruses generally require a host program.System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage.Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.This report covers the common techniques and tools used for System, Windows, Linux and Web Server Hacking. The report contains from the following sections:Part A: Setup Lab:Part B: Trojens and Backdoors and VirusesPart C: System HackingPart D: Hacking Web ServersPart E: Windows and Linux HackingI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 10,99 €
Produktbild für Visual Studio Code for Python Programmers

Visual Studio Code for Python Programmers

BECOME PROFICIENT AND EFFICIENT WITH VISUAL STUDIO CODE AND LEARN HOW TO INTEGRATE ALL YOUR EXTERNAL TOOLS!Visual Studio Code for Python Programmers helps Python developers become not just familiar, but productive in Visual Studio Code. To start, you’ll find the steps for installing Visual Studio Code on Windows, Mac and Linux platforms, along with an introduction to the editing features of the workspace. Coverage of more advanced functionality includes managing source code, debugging, unit testing, and Jupyter Notebook support. The book finishes with a walk-through of real-world projects which utilize Visual Studio Code features introduced in the book.For developers, the choice of an editor is a very personal one. You have idiosyncratic needs and wants that are unique to you as a developer. This book will help you learn how to customize Visual Studio Code to meet your needs and Python development workflow.* Introduces you to the features of the Visual Studio Code workspace and how those features can be customized* Demonstrates how Visual Studio Code allows you to choose your structure according to your needs* Covers editing code in Python, including syntax highlighting, code completion, object definition, refactoring, and code navigation* Describes Git integration and how to perform common Git functions (commits, checkouts, branches, and merges) from within Visual Studio Code* Highlights debugging features for Python developersA final section on Real World Applications will step you through several examples (and features integration with Django, Flask, Jupyter Notebook, Docker, and Azure), so you can hit the ground running with Visual Studio Code.APRIL SPEIGHT is a developer who specializes in Python and conversational design for chat bots and AI Assistants. Her passion for learning and teaching Python led to her first published title, Bite-Size Python: An Introduction to Python Programming. She currently works on content creation and developer community engagement for Spatial Computing and Mixed Reality at Microsoft. Introduction xixPART I WELCOME TO VISUAL STUDIO CODE 1CHAPTER 1 GETTING STARTED 3Installing Visual Studio Code 4The Visual Studio Code User Interface 4Activity Bar 5Side Bar 6Editor 7Panels 11Status Bar 12Command Palette 12Extensions 14Customizations 15Settings 16Color Themes and Icons 18Keybindings 18Display Langage 18Summary 19CHAPTER 2 HELLO WORLD FOR PYTHON 21Installing a Python Interpreter 21macOS 22Linux 22Windows 22Installing the Python Extension for Visual Studio Code 22Creating a Python File 23Selecting an Interpreter 24Setting a Default Interpreter 26Settings Editor 26settings.json File 26Selecting a Linter 26Editing a Python File 27Running a Python File 29Workflow Recap 30Summary 31CHAPTER 3 EDITING CODE 33Quick Fixes 34Code Completion, Definitions, and Declarations 35Formatting 38Edit Formatting Settings in the Settings Editor 39Edit Formatting Settings in settings.json 40Linting 41Enable and Disable Linting 41Run Linting 42Linting Settings 43Refactoring 44Extract Variable 44Extract Method 45Sort Imports 46Snippets 47Summary 48PART II ADDITIONAL VISUAL STUDIO CODE FEATURES 51CHAPTER 4 MANAGING PROJECTS AND COLLABORATION 53Files and Folders 53Open a Project 54Navigate Files 56Search across Files 57Close a File or Folder 60Environments 60Virtual Environments 61Conda Environments 61Source Control 63Initialize a Repository 65Commit Changes 66Branches 69Remotes 70Gutter Indicators 71View Diffs 71Push and Merge Commits 73Pull Requests 74Live Share 74Install Live Share 75Sign In to Live Share 76Share a Project 76Join a Session 78Editing and Collaboration 80Follow a Participant 80Share a Terminal 81Summary 82CHAPTER 5 DEBUGGING 83Starting a Debug Session 84Debug Commands 89Continue 89Step Over 90Step Into 90Step Out 91Stop 91Restart 92Call Stack 92Triggering a Breakpoint 93Logpoints 95Watch 96The Debug Console 98Launch Configurations 101Summary 104CHAPTER 6 UNIT TESTING 105Enable and Discover Tests 105Run Tests 109Debug Tests 113Summary 115CHAPTER 7 JUPYTER NOTEBOOK 117Creating and Opening a Jupyter Notebook 118Code Cell Modes 120Adding Cells 121Editing Cells 122Running a Cell 124Running a Single Cell 124Running All Code Cells 124Running Cells Above and Below a Code Cell 125Additional Commands 126Viewing Variables and Data 126Viewing Plots 128Debugging a Jupyter Notebook 129Connecting to a Remote Server 130Exporting a Notebook 131Summary 132CHAPTER 8 USING GIT AND GITHUB WITH VISUAL STUDIO CODE 135Getting Started 135GitHub Pull Requests and Issues Extension 136Publish a Project to GitHub 139Push Changes to GitHub 141Manage Pull Requests and Issues 143Pull Requests 144Issues 147Clone Repository 152Timeline View 154Summary 156CHAPTER 9 DEPLOY A DJANGO APP TO AZURE APP SERVICE WITH THE AZURE APP SERVICE EXTENSION 157Getting Started 157Creating a Django Project 159Creating an App 161Creating a Home Page 163Creating Website Pages 166Deploying to Azure 168Summary 175CHAPTER 10 CREATE AND DEBUG A FLASK APP 177Getting Started 177Create a Flask App 178Create and Render a Template 180Debug the Flask App 184Summary 187CHAPTER 11 CREATE AND DEPLOY A CONTAINER WITH AZURE CONTAINER REGISTRY AND AZURE APP SERVICE 189Getting Started 189Create a Container 191Add Docker Files to the Project 191Build an Image 193Build and Run a Container 195Debug a Container 197Push an Image to the Registry 197Create an Azure Container Registry 198Determine the Image’s Registry Location 199Deploy the Container Image to Azure 201Make Changes to the App and Deploy 205Multicontainer Apps 206Summary 207CHAPTER 12 DEPLOY AN AZURE FUNCTION TRIGGER BY A TIMER 209Getting Started 210Create an Azure Function 211Invoke the Function Locally 213Add the Code to the Function 214Deploy the Function to Azure 215Summary 220APPENDIX GETTING STARTED WITH AZURE 221Index 225

Regulärer Preis: 32,99 €
Produktbild für SPS-Programmierung mit dem Raspberry Pi und dem OpenPLC-Projekt

SPS-Programmierung mit dem Raspberry Pi und dem OpenPLC-Projekt

Einführung in die SPS-Programmierung mit dem Open-Source-Projekt auf dem Raspberry Pi und Modbus-Beispiele'mit dem'Arduino Uno und ESP8266Die SPS-Programmierung ist heute in der Industrie und in der Hausauto-mation sehr weit verbreitet. In diesem Buch beschreibt der Autor, wie der Raspberry Pi 4 als SPS eingesetzt werden kann. Angefangen mit der Softwareinstallation auf dem Raspberry Pi und dem SPS-Editor auf dem PC geht es nach einer Beschreibung der Hardware an das Programmieren.Es folgen interessante Beispiele nach IEC 61131-3 in den verschiedenen Programmiersprachen. Ausführlich wird auch erklärt, wie der SPS-Editor benutzt wird und wie die Programme auf den Raspberry Pi geladen und ausgeführt werden. Angefangen mit der Programmierung mit KOP (Kontaktplan) über ST (Structured Control Language) bis zu AS (Special Function Chart) werden alle IEC-Sprachen mit Beispielen behandelt. Diese können auf der Website des Autors heruntergeladen werden.Auch die Vernetzung kommt nicht zu kurz. Der Arduino Uno und der ESP8266 werden als ModbusRTU- bzw. ModbusTCP-Module program-miert, um ZugriŸ auf externe Peripherie zu erhalten. Damit ist es möglich, Sensoren einzulesen und Verbraucher zu schalten. Interessant dürften auch E/A-Schaltungen sein, die dem 24V-Industriestandard entsprechen.Befehlsübersichten für ST und KOP runden das Buch ab.Nach dem Durcharbeiten des Buches ist der Leser in der Lage, eigene SPS-Steuerungen mit dem Raspberry Pi zu verwirklichen.Josef Bernhardt hat sich schon früh mit Elektronik beschäftigt. Mit zwölf Jahren baute er seinen ersten Detektorempfänger. Die ersten Programmiererfahrungen sammelte er in den 80er-Jahren mit dem Commodore VC20. Auch Assemblerprogrammierung auf dem 8088-Prozessor ist ihm nicht fremd. Er kann auf über 30 Jahre Elektronikentwicklung an der Uni Regensburg zurückblicken. Dort war er im Bereich Elektronik- und Softwareentwicklung tätig. Mit der eigenen SMD-Fertigung setzt er auch Elektronikprojekte von Kunden um. Der Spaß an Elekt-ronik und Programmierung sowie sein Interesse an allem Neuen begleiten ihn schon sein ganzes Leben lang.

Regulärer Preis: 27,99 €
Produktbild für Praxishandbuch VMware vSphere 7 (5. Auflg.)

Praxishandbuch VMware vSphere 7 (5. Auflg.)

Leitfaden für Installation, Konfiguration und Optimierung.Sie brauchen praxisrelevante Informationen zur technischen Realisierung einer virtualisierten Infrastruktur mittels vSphere 7? Dann halten Sie mit dem »Praxishandbuch VMware vSphere 7.0« genau das richtige Buch in Ihren Händen. In diesem Handbuch finden Sie komprimiert alles, was Sie über Virtualisierung im Allgemeinen und vSphere 7 im Speziellen wissen müssen – samt unzähligen Tipps und Tricks aus der Praxis, Warnungen und Hinweisen zu angrenzenden Technologien.Schritt für Schritt zur optimalen virtualisierten UmgebungDas Buch gibt Ihnen schnell eine Übersicht über die einzelnen vSphere-Komponenten, deren Konfiguration und Optimierung. Sobald der Hypervisor (ESXi) installiert ist, können die ersten virtuellen Maschinen von Grund auf richtig eingerichtet und optimiert werden.Dann erfahren Sie, wie Sie Ihr Netzwerk am besten konfigurieren müssen und die ESXi Server an gemeinsamen Speicher anbinden. Was die Funktion Hostprofile, der VMware Lifecycle Manager oder der VMware Converter für Sie tun können, fehlt genauso wenig wie der Einsatz von vApps und Templates. Und auch wenn die vSphere-Umgebung steht, bleibt immer etwas zu tun: Backups und Sicherheitsstrategien (am Beispiel von Veeam Backup & Replication), die geschickte Verwaltung der Ressourcen und eine kontinuierliche Optimierung des laufenden Betriebs lassen sich mit den richtigen Werkzeugen und Konzepten besser in die Tat umsetzen. Auch die Kommandozeile und PowerCLI kommen nicht zu kurz.Aktualisierte fünfte AuflageDie fünfte Auflage wurde komplett auf VMware vSphere 7 aktualisiert. Zusätzlich aufgenommen wurden die Neuerungen von vSphere 7, z.B. vSAN, virtuelle Volumes, der HTML5-Client und die neue vSphere Appliance auf Photon Linux Basis. Weiterhin beinhaltet die fünfte Auflage die Themen Upgrade von einer Vorversion, NFS Storage unter Linux erstellen, Alarme, Hostprofile (erweitert), Troubleshooting (erweitert) und eine bestmögliche Netzwerkkonfiguration.

Regulärer Preis: 49,90 €
Produktbild für Samsung Galaxy A72

Samsung Galaxy A72

Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit

Regulärer Preis: 9,99 €
Produktbild für Societal Responsibility of Artificial Intelligence

Societal Responsibility of Artificial Intelligence

The digital world is characterized by its immediacy, its density of information and its omnipresence, in contrast to the concrete world. Significant changes will occur in our society as AI becomes integrated into many aspects of our lives.This book focuses on this vision of universalization by dealing with the development and framework of AI applicable to all. It develops a moral framework based on a neo-Darwinian approach - the concept of Ethics by Evolution - to accompany AI by observing a certain number of requirements, recommendations and rules at each stage of design, implementation and use. The societal responsibility of artificial intelligence is an essential step towards ethical, eco-responsible and trustworthy AI, aiming to protect and serve people and the common good in a beneficial way.JEROME BERANGER is a scientific expert on the ethical approach of the digital revolution and Ethics by Evolution. He is cofounder and CEO of ADELIAA and is also an associate researcher in the Inserm 1295 BIOETHICS team at the University of Toulouse III, France.

Regulärer Preis: 139,99 €
Produktbild für MATLAB For Dummies

MATLAB For Dummies

GO FROM TOTAL MATLAB NEWBIE TO PLOTTING GRAPHS AND SOLVING EQUATIONS IN A FLASH!MATLAB is one of the most powerful and commonly used tools in the STEM field. But did you know it doesn’t take an advanced degree or a ton of computer experience to learn it? MATLAB For Dummies is the roadmap you’ve been looking for to simplify and explain this feature-filled tool.This handy reference walks you through every step of the way as you learn the MATLAB language and environment inside-and-out. Starting with straightforward basics before moving on to more advanced material like Live Functions and Live Scripts, this easy-to-read guide shows you how to make your way around MATLAB with screenshots and newly updated procedures. It includes:* A comprehensive introduction to installing MATLAB, using its interface, and creating and saving your first file * Fully updated to include the 2020 and 2021 updates to MATLAB, with all-new screenshots and up-to-date procedures * Enhanced debugging procedures and use of the Symbolic Math Toolbox * Brand new instruction on working with Live Scripts and Live Functions, designing classes, creating apps, and building projects * Intuitive walkthroughs for MATLAB’s advanced features, including importing and exporting data and publishing your work Perfect for STEM students and new professionals ready to master one of the most powerful tools in the fields of engineering, mathematics, and computing, MATLAB For Dummies is the simplest way to go from complete newbie to power user faster than you would have thought possible.JOHN PAUL MUELLER is an author and technical editor with experience in application development, database management, machine learning, and deep learning. He has written hundreds of books and articles helping everyday people learn everything from networking to database management.INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4PART 1: GETTING STARTED WITH MATLAB 7CHAPTER 1: INTRODUCING MATLAB AND ITS MANY USES 9Putting MATLAB in Its Place 10Understanding how MATLAB relates to a Turing machine 10Using MATLAB as more than a calculator 13Determining why you need MATLAB 14Discovering Who Uses MATLAB for Real-World Tasks 17Knowing How to Get the Most from MATLAB 18Getting the basic computer skills 18Defining the math requirements 19Applying what you know about other procedural languages 19Understanding how this book will help you 20Getting Over the Learning Curve 20CHAPTER 2: STARTING YOUR COPY OF MATLAB 21Installing MATLAB 22Discovering which platforms MATLAB supports 22Getting your copy of MATLAB 23Performing the installation 23Activating the product 24Meeting the MATLAB Interface 25Starting MATLAB for the first time 25Considering the default Toolstrip tabs 27Working with the Quick Access toolbar (QAT) 29Employing the Command Window 30Getting additional help with MATLAB 31Using the Current Folder toolbar 32Viewing the Current Folder window 32Changing the MATLAB layout 38CHAPTER 3: INTERACTING WITH MATLAB 41Using MATLAB as a Calculator 42Entering information at the prompt 42Entering a formula 44Copying and pasting formulas 44Changing the Command Window formatting 46Suppressing Command Window output 47Understanding the MATLAB Math Syntax 48Adding, subtracting, multiplying, and dividing 48Working with exponents 50Organizing Your Storage Locker 51Using ans — the default storage locker 52Creating your own storage lockers 52Operating MATLAB as More Than a Calculator 54Learning the truth 54Using the built-in functions 54Accessing the function browser 56Recovering from Mistakes 57Understanding the MATLAB error messages 58Stopping MATLAB when it hangs 58CHAPTER 4: STARTING, STORING, AND SAVING MATLAB FILES 61Examining MATLAB’s File Structure 62Understanding the MATLAB files and what they do 63Exploring folders with the GUI 65Exploring folders with commands 69Working with files in MATLAB 72Accessing and Sharing MATLAB Files 74Opening 74Exporting 75Importing 76Saving Your Work 78Saving variables with the GUI 78Saving variables using commands 78Saving commands with the GUI 79Saving commands using commands 79Using online storage 80PART 2: MANIPULATING AND PLOTTING DATA IN MATLAB 81CHAPTER 5: EMBRACING VECTORS, MATRICES, AND HIGHER DIMENSIONS 83Working with Vectors and Matrices 84Understanding MATLAB’s perspective of linear algebra 84Entering data 86Adding and Subtracting 92Understanding the Many Ways to Multiply and Divide 94Performing scalar multiplication and division 94Employing matrix multiplication 95Dividing two vectors 98Effecting matrix division 98Creating powers of matrices 101Using complex numbers 102Working with exponents 104Working with Higher Dimensions 105Creating a multidimensional matrix 105Accessing a multidimensional matrix 108Replacing individual elements 109Replacing a range of elements 110Modifying the matrix size 112Using cell arrays and structures 113Using the Matrix Helps 117CHAPTER 6: UNDERSTANDING PLOTTING BASICS 121Considering Plots 121Understanding what you can do with plots 122Comparing MATLAB plots to spreadsheet graphs 122Creating a plot using commands 123Creating a plot using the Workspace window 125Creating a plot using the Plots tab options 126Using the Plot Function 128Working with line color, markers, and line style 128Creating multiple plots in a single command 129Modifying Any Plot 130Making simple changes 130Adding to a plot 132Deleting a plot 134Working with subplots 134Plotting with 2D Information 137CHAPTER 7: USING ADVANCED PLOTTING FEATURES 139Plotting with 3D Information 140Using the bar() function to obtain a flat 3D plot 140Using bar3() to obtain a dimensional 3D plot 144Using barh() and more 146Enhancing Your Plots 147Getting an axes handle 147Modifying axes labels 148Adding a title 150Rotating label text 151Employing annotations 153Printing your plot 154Using the Plot Extras 155Creating axes dates using datetick() 155Creating plots with colorbar() 157Interacting with daspect 159Interacting with pbaspect 161PART 3: STREAMLINING MATLAB 163CHAPTER 8: AUTOMATING YOUR WORK 165Understanding What Scripts Do 166Creating less work for yourself 166Defining when to use a script 167Creating a Script 168Writing your first script 168Using commands for user input 170Copying and pasting into a script 171Converting the Command History into a script 172Continuing long strings 172Adding comments to your script 174Revising Scripts 179Calling Scripts 179Improving Script Performance 180Analyzing Scripts for Errors 181Using the MATLAB Profiler to Improve Performance 182CHAPTER 9: EXPANDING MATLAB’S POWER WITH FUNCTIONS 185Working with Built-in Functions 186Learning about built-in functions 186Sending data in and getting data out 191Creating a Function 191Understanding script and function differences 192Understanding built-in function and custom function differences 193Writing your first function 193Using the new function 195Passing data in 196Passing data out 198Creating and using global variables 199Using subfunctions 202Nesting functions 203Using Other Types of Functions 204Inline functions 204Anonymous functions 205CHAPTER 10: ADDING STRUCTURE TO YOUR SCRIPTS 207Making Decisions 208Using the if statement 208Using the switch statement 212Understanding the switch difference 214Deciding between if and switch 214Creating Recursive Functions 215Performing Tasks Repetitively 219Using the for statement 219Using the while statement 220Starting a new loop iteration using continue 221Ending processing using break 222Ending processing using return 223Determining which loop to use 225Creating Menus 225CHAPTER 11: WORKING WITH LIVE SCRIPTS 229Comparing a Live Script to a Regular Script 230Working with the Live Editor 231Opening the Live Editor 232Working with the Output pane 232Adding formatted text 235Using plots within the coded area 236Incorporating graphics 237Incorporating controls 238Running Live Script Sections 241Diagnosing Coding Errors 242CHAPTER 12: WORKING WITH LIVE FUNCTIONS 245Comparing a Live Function to a Regular Function 246Understanding Live Function Flexibility Differences 247Creating a Live Function 247Running a Live Function 248Refactoring a Live Function 249Using the specialized coding buttons 253Going to a specific function 254Converting a Function to a Live Function 255Sharing Live Functions and Live Scripts 256Using an interactive document 256Employing a full screen presentation 257Working with plain text 257Creating a static document 257Performing Comparisons and Merges 259Comparing Live Functions and Live Scripts 259Merging Live Functions and Live Scripts 260CHAPTER 13: DESIGNING AND USING CLASSES 263A Brief Overview of Object-Oriented Programming (OOP) 264Defining an object 264Considering how properties define an object 265Using methods to interact with an object 266Listening to an object using events 267Understanding the need for privacy 268Understanding OOP in MATLAB 268Comparing MATLAB OOP to other languages 269Uses of classes and objects in MATLAB 270Performing tasks with objects in MATLAB 271Creating a Basic MATLAB Class 272Starting the class 272Adding properties 275Specifying methods 278CHAPTER 14: CREATING MATLAB APPS 281Working with the App Designer 282Understanding apps 282Getting apps 283Starting the App Designer 286Defining an Interface 290Understanding the various components 290Changing the component properties 292Making the Interface Functional 293Working with Code View 294Creating a callback function 295Running the App 297Packaging Your App 298CHAPTER 15: BUILDING PROJECTS 301Considering the Need for Projects 302Creating a New Project 303Choosing a project type 303Using the Project editor 305Understanding the Project Dependencies 309Running Required Checks 311Checking project integrity 311Looking for potential updates 311PART 4: EMPLOYING ADVANCED MATLAB TECHNIQUES 315CHAPTER 16: IMPORTING AND EXPORTING DATA 317Importing Data 318Avoiding older import/export function calls 319Performing import basics 319Importing mixed strings and numbers 325Importing selected rows or columns 327Exporting Data 328Performing export basics 328Exporting scripts and functions 331Working with Images 332Exporting images 332Importing images 333CHAPTER 17: PRINTING AND PUBLISHING YOUR WORK 335Using Commands to Format Text 336Modifying font appearance 336Using special characters 344Adding math symbols 346Publishing Your MATLAB Data 350Performing advanced script and function publishing tasks 350Saving your figures to disk 354Printing Your Work 355Configuring the output page 355Printing the data 356CHAPTER 18: RECOVERING FROM MISTAKES 357Working with Error Messages 358Responding to error messages 359Understanding the MException class 361Creating error and warning messages 362Setting warning message modes 365Understanding Quick Alerts 366Relying on Common Fixes for MATLAB’s Error Messages 368Making Your Own Error Messages 369Developing the custom error message 370Creating useful error messages 374Using Good Coding Practices 375PART 5: SPECIFIC MATLAB APPLICATIONS 379CHAPTER 19: SOLVING EQUATIONS AND FINDING ROOTS 381Working with the Symbolic Math Toolbox 382Obtaining your copy of the Symbolic Math Toolbox 382Installing the Symbolic Math Toolbox 384Working with the GUI 386Typing a simple command in the Command Window 387Performing Algebraic Tasks 388Differentiating between numeric and symbolic algebra 389Solving quadratic equations 390Working with cubic and other nonlinear equations 392Understanding interpolation 393Working with Statistics 395Understanding descriptive statistics 395Understanding robust statistics 398Employing the Symbolic Math Toolbox for plotting 401CHAPTER 20: PERFORMING ANALYSIS 405Using Linear Algebra 406Working with determinants 406Performing reduction 407Using eigenvalues 409Understanding factorization 409Employing Calculus 411Working with differential calculus 411Using integral calculus 413Working with multivariate calculus 413Solving Differential Equations 415Using the numerical approach 415Using the symbolic approach 416PART 6: THE PART OF TENS 419CHAPTER 21: THE TOP TEN USES OF MATLAB 421Working with Linear Algebra 422Performing Numerical Analysis 422Designing a Neural Network Simulation 423Getting Involved in Science 423Logging Sensor Data 424Exploring Research 424Creating Light Animations Using Arduino 425Employing Image Processing 425Controlling Industrial Equipment 426Performing Audio Compression Using Wavelets 427CHAPTER 22: TEN WAYS TO MAKE A LIVING USING MATLAB 429Working with Green Technology 430Creating Speech Recognition Software 430Performing Antenna Analysis and Design 431Getting Disease under Control 432Becoming a Computer Chip Designer 432Working with Robots 433Keeping the Trucks Rolling 433Designing Equipment Used in the Field 434Reducing Risks Using Simulation 434Creating Security Solutions 435Appendix A: MATLAB Functions 437Appendix B: MATLAB’s Plotting Routines 447Index 453

Regulärer Preis: 22,99 €
Produktbild für Teach Yourself VISUALLY Microsoft Teams

Teach Yourself VISUALLY Microsoft Teams

DISCOVER THE POWER OF MICROSOFT TEAMS WITH THIS INTUITIVE AND TIMELY NEW GUIDEMicrosoft Teams is unlocking the potential of remote work and virtual meetings at a time when they couldn’t be more necessary. Its feature-rich interface and ease-of-use promise to bring your team together—as long as you can harness its full suite of capabilities.In Teach Yourself VISUALLY Microsoft Teams, Microsoft experts and authors Matt Wade and Sven Seidenberg turn their years of engineering and IT experience loose on the virtual collaboration software now used by over one hundred million people across the globe. Using the book’s huge collection of vibrant and full-sized images and walkthroughs, you’ll see exactly what you need to do in order to:* Realize the key benefits of Teams by using its messaging and video-conferencing capabilities to stay connected with your colleagues* Manage multiple teams and channels to use Teams across your organization* Extend the functionality of Teams by using additional apps and add-ons* Learn valuable tips, best practices, and work-arounds to make the most of and avoid the landmines in TeamsRapidly becoming the central hub for working in Microsoft 365, Microsoft Teams promises to transform the way you work and communicate. And you’ll master it faster and easier by using this ultimate guide to get the most out of Microsoft’s latest and greatest software! MATT WADE is an engineer-turned IT nerd and Microsoft MVP. He's best known for his SharePoint and Office 365 infographics and advocating AI and chatbots to automate business workloads.SVEN SEIDENBERG is a Microsoft 365 advocate and Microsoft Teams geek with a strong focus on Microsoft Teams administration, change management, and adoption. He consults with organizations to develop procedures and best practices for using Microsoft 365 apps and services to work more productively and efficiently.CHAPTER 1 GETTING STARTED WITH TEAMSLog into Teams 4Install the Desktop App 10Modify Your Personal Settings 11Switch Between Dark Mode and Light Mode 12Add or Update Your Profile Photo 14Access and Manage Your Saved Messages 15Access a List of Keyboard Shortcuts 16Set Up and Manage Your Video and Audio Devices 17View a Person’s Contact Card 18View the Organization Chart 19Switch Between Organizations as a Guest 20Leave an Organization as a Guest 21Log Out of Teams 24CHAPTER 2 NOTIFICATIONS AND THE ACTIVITY FEEDNavigate the Activity Feed 28Filter the Activity Feed by Notification Type 29Set Your Status 30Set Your Status Message 31Enable Do Not Disturb 32Manage Priority Access 33Customize Your Notifications on the Desktop App 34Customize Your Notifications on the Mobile App 35Enable Quiet Hours on Mobile 37CHAPTER 3 THE FILES APPNavigate the Files App 42Add Outside Cloud Storage Locations 44CHAPTER 4 SEARCH AND SEARCH BOX FEATURESSearch in Teams 50Use Microsoft Search 52Search Tricks in Teams 54Use Hashtags 56Slash Commands 57CHAPTER 5 APPS, TABS, AND CONNECTORSOverview and Using the App Store 60Install an App from the App Store 62Pin an App to the App Bar 64Add a Tab to a Private Chat 65Add a Tab to a Channel 67Make an Office File a Tab 69Make a PDF File a Tab 71Add a SharePoint Page as a Tab 73Add a SharePoint Document Library as a Tab 76Add a Website as a Tab 79Add a Team (Channel) Calendar 81Send a File for Approval 84Respond to an Approval Request 85Add a Poll to a Conversation 86CHAPTER 6 PRIVATE CHATStart a Chat with Someone in Your Organization 90Start a Chat with a Teams User OutsideYour Organization 91Start a Chat with a Skype for Business or SkypeConsumer User Outside YourOrganization 92Add Someone to an Ongoing Chat 93Rename a Chat 94Format Your Chat Message 95@mention an Individual 96Mark Your Chat Message as Important 97Mark Your Chat Message as Urgent 98Add an Emoji, GIF, Sticker, or Memeto Your Chat Message 99Send Praise to Someone in Your Chat Message 100Edit a Chat Message 101Like or React to a Chat Message 102Save a Chat Message 103Delete a Chat Message 104Mark a Chat Message as Read or Unread 105Share a Chat Message to Outlook 106Translate a Chat Message 107Mute a Chat 108Pin a Chat 109Pop Out a Chat in a New Window 110Leave a Group Chat 111Delete or Hide a Chat 112Turn Chat Read Receipts On or Off 113Filter Your Chat Listing by Person,Read Status, and More 114Send a Quoted Reply 115Create a Buddy List of Important Contacts 116CHAPTER 7 FILES IN A PRIVATE CHATShare Files in a Private Chat 120Set Permissions of a File in a Private Chat 121Change Permissions of a File in a Private Chat 122Access Shared Files in a Private Chat 124Delete Files in a Private Chat 125CHAPTER 8 TEAMSUnderstanding a Team 130Create a Team from Scratch 132Create a Team from a Template 134Create a Team from an Existing SharePointOnline Team Site 137Create a Team from an ExistingMicrosoft 365 Group 138Search for a Team to Join 140Edit a Team Name and Description 141Edit Your Team Settings 142Add Internal People to Your Team by Invitation 143Add External Guests to Your Team by Invitation 144Remove People from a Team 146Accept Pending Join Requests for a Team 147Add People to a Team Using a Join Code 148Share a Team Using a Link 150Limit Who Can @mention Teams and Channels 151Create a Teams Tag 152Leave a Team 154Archive a Team 155Delete a Team 156Hide a Team 157CHAPTER 9 CHANNELSCreate a Standard Channel 160Create a Private Channel 161Add People to a Private Channel 162Manage Private Channel Owners 163Edit a Channel Name and Description 164Manage a Channel 165Delete a Channel 166Restore a Deleted Channel 167Set Channel Notifications 168Pin a Channel 169Moderate a Channel 170Share a Link to a Channel 171Send an Email to a Channel 172Share an Email from Outlook to Teams 174Email a Channel vs. Share to a Channel 176Silence a Channel 178Hide a Channel 179Leave a Channel 180Follow a Channel 181CHAPTER 10 CHANNEL CONVERSATIONSThe Case for Conversations Over Email 184Create a Standard Channel Conversation 186Create a Multichannel Conversation 187Create an Announcement 189Reply to a Channel Conversation 190Set Who Can Reply to Your Channel Conversation 191Format Your Channel Message 192Add a Subject to a New Channel Conversation 193@mention an Individual, Channel, or Team 194Mark Your Channel Message as Important 195Add an Emoji, GIF, Sticker, or Meme to YourChannel Message 196Send Praise to Someone in Your Channel Message 198Edit a Channel Message 199Like or React to a Channel Message 200Save a Channel Message 201Delete a Channel Message 202Delete an Entire Channel Conversation 203Mark a Channel Message as Read or Unread 204Get the Link to a Channel Message 205Share a Channel Conversation to Outlook 206Translate a Channel Message 207Pin a Channel Conversation 208Silence a Channel Conversation 209CHAPTER 11 FILES IN A TEAMUnderstanding Files in a Team 212Create a File in a Team 214Upload Files to a Team 215Upload Folders to a Team 216Attach Files to a Channel Conversation 217Rename a File in a Team 218Open and Edit Office Files in Teams or theDesktop App 219Co‐author Office Files 220Pin Files and Folders to the Top of the Tab 221Sort, Filter, and Group Files into Views 222View Your Files in List or Tile View 226Sync Files to Your Desktop 227Sync Files to Your Smartphone or Tablet 228Share a Link to an Existing File or Folder with aTeam Member 229Add a File to a Channel Conversation 230Start a Conversation Based on a File 231Move or Copy Files Between Teams, SharePoint,or OneDrive 232Download a File 233Check Files In and Out 234Delete a File or Folder 235Understanding Files in Private Channels 236Open Your Team’s Files in SharePoint 237Revert to a Previous Version of a File 238Restore a Deleted File or Folder 239Share a File Externally 241CHAPTER 12 CALLING AND VOICEMAILThe Calls App 244Set Up Your Voicemail 245Check Your Voicemail 246Call a Teams User in Your Organization or anExternal Guest 247Call a Teams User Outside Your Organization 248Call a Skype for Business or Skype ConsumerUser Outside Your Organization 249Dial an Outside Phone Number 251CHAPTER 13 PLANNING A MEETINGStart a Meet Now Meeting from a Private Chat 254Start a Meet Now Meeting from Your Calendar 255Start a Meet Now Meeting from a Channel 256Schedule a Meeting with Internal and/orExternal Attendees 257Schedule a Meeting from an Ongoing Private Chat 259Schedule a Meeting from Outlook 260Schedule a Channel Meeting 261Understanding Channel Meetings 262Find the Right Meeting Time 263Chat with Meeting Participants Before the Meeting 264Manage Meeting Options 265Change Who Can Bypass the Lobby 266Assign Meeting Roles 267Set Whether Attendees Can Unmute Themselves (Hard Mute) 269Set Whether the Meeting Chat Is Enabled 270Include a Dial‐in Number with a Meeting Invitation 271Update a Scheduled Meeting 272RSVP to a Meeting 273CHAPTER 14 JOINING A MEETINGJoin from Teams 276Join from Outlook 277Join from a Link or Email Invitation 278Join from a Telephone or Smartphone 280Select Your Audio and Video Devices 282Set Your Video Background 283Add a Room to a Meeting When Joining 285CHAPTER 15 DURING A MEETINGChange Your Meeting View and Layout 288Pin a Participant 290Spotlight a Participant 292Record a Meeting 294Let People in from the Meeting Lobby 295Add People to an Ongoing Meeting 296Mute Yourself 298Mute Someone Else 299Mute Everyone in the Meeting 300Force All Attendees to Stay on Mute (Hard Mute) 301Turn Your Video On or Off 302Set Background Blur or a Background Image 303Raise Your Hand 305React During a Meeting 306Share Your Screen During a Meeting 307Share a Single Window During a Meeting 309Present a PowerPoint Slide Deck During a Meeting (PowerPoint Live) 311Share the Meeting Whiteboard During a Meeting 314Share Your Video and Content Side by Side 316Share Files During a Meeting 318Share a Poll During a Meeting 322Enable Live Captions or Transcription 327Use the Meeting Chat 328Change Meeting Roles 329Take Meeting Notes 331Change Your Audio and Video Devices 333Turn Off Incoming Video to Improve Your Connection 334Transfer a Meeting or Call from Desktop to Mobile 335Remove a Participant from a Meeting 336Manage Meeting Options During a Meeting 337Meeting Settings Best Practices 338CHAPTER 16 MEETING BREAKOUT ROOMSCreate Breakout Rooms 342Assign or Switch Participants BetweenBreakout Rooms 343Rename Breakout Rooms 344Add a Breakout Room 345Delete a Breakout Room 346Set Participants to Join Breakout Rooms Automatically 347Open Breakout Rooms 348Allow Participants to Return to the Main Meeting 349Set a Time Limit for Breakout Rooms 350Send an Announcement to All Breakout Rooms 351Join a Breakout Room as the Organizer 353View Breakout Room Chat Without Joiningthe Breakout Room 354Record Breakout Rooms 355Send a Chat Message to the Organizeras a Breakout Room Attendee 356Close One or All Breakout Rooms 357CHAPTER 17 CLOSING A MEETINGLeave or End a Meeting 360Access the Meeting Recap 361Download the Attendance Report 362Access and Share the Meeting Recording 364Download the Meeting Transcript 366Use the Meeting Chat After the Meeting 367Index 368

Regulärer Preis: 22,99 €
Produktbild für MCA Microsoft Office Specialist (Office 365 and Office 2019) Complete Study Guide

MCA Microsoft Office Specialist (Office 365 and Office 2019) Complete Study Guide

MASTER ONE OF THE MOST ESSENTIAL SKILL SETS FOR THE CONTEMPORARY OFFICEAs Microsoft Office becomes ever more ubiquitous in modern offices across the world, competence and familiarity with its intricacies is more important than ever. Now you can set yourself apart from the pack and prove your skills with the Microsoft Office Specialist certification.The MCA Microsoft Office Specialist (Office 365 and Office 2019) Complete Study Guide : Word Associate Exam MO-100, Excel Associate Exam MO-200, and PowerPoint Associate Exam MO-300 delivers a comprehensive roadmap to achieving the certification with easy-to-follow instruction for each of the three required proficiencies: Word, Excel, and PowerPoint. You’ll enjoy access to chapter review questions and Exam Essentials, a feature that identifies critical subject areas.Discover practical, hands-on exercises that prepare you for real-world roles and jobs, and gain valuable experience as you reinforce key Microsoft Office skills that you’ll be expected to demonstrate in job interviews and your day-to-day professional life. Learn to manage and create text documents in Word, perform operations with formulas in Excel, and create engaging slideshows and presentations in PowerPoint.This practical book also provides:* Fully updated information for the latest Microsoft Office Specialist certification exams covering Microsoft Office 365 * Access to new career opportunities with a professional certification that’s relevant to virtually any office environment * Access to the Sybex online study tools, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The MCA Microsoft Office Specialist (Office 365 and Office 2019) Complete Study Guide offers crystal-clear organization, comprehensive coverage, and easy-to-understand instruction. It’s perfect for anyone who hopes to prove their skills with the Microsoft Office Specialist certification or to improve their mastery of Microsoft Office 365.ABOUT THE AUTHORERIC BUTOW is the author of 41 books on technology topics and has developed and taught networking, computing, and usability courses for Ed2Go, Virtual Training Company, California State University, Sacramento, and Udemy. He has been using Office since 1994. He’s served as a technical writer for companies like Intel, Wells Fargo, Cisco Systems, and Hewlett-Packard. He is the founder and owner of Butow Communications Group in Jackson, California.Introduction xxiAssessment Test xxviiiAnswers to Assessment Test xlPART I WORD EXAM MO-100 1CHAPTER 1 WORKING WITH DOCUMENTS 3Navigating Within Documents 4Searching for Text 4Linking to Locations Within Documents 8Moving to Specific Locations and Objects in Documents 9Showing and Hiding Formatting Symbols and Hidden Text 10Formatting Documents 13Setting Up Document Pages 14Applying Style Settings 15Inserting and Modifying Headers and Footers 17Configuring Page Background Elements 18Saving and Sharing Documents 20Saving Documents in Alternative File Formatting 20Changing Basic Document Properties 21Modifying Print Settings 23Sharing Documents Electronically 24Inspecting Documents for Issues 26Locating and Removing Hidden Properties and Personal Information 26Finding and Fixing Accessibility Issues 28Locating and Correcting Compatibility Issues 29Summary 30Key Terms 31Exam Essentials 31Review Questions 33CHAPTER 2 INSERTING AND FORMATTING TEXT 35Adding and Replacing Text 36Finding and Replacing Text 36Inserting Symbols and Special Characters 40Formatting Text and Paragraphs 42Adding Text Effects 42Applying Formatting by Using Format Painter 43Setting Line and Paragraph Spacing and Indentation 43Applying Built-In Styles to Text 46Clearing Formatting 47Creating and Configuring Document Sections 50Formatting Text in Multiple Columns 50Inserting Page, Section, and Column Breaks 52Changing Page Setting Options for a Section 53Summary 56Key Terms 57Exam Essentials 57Review Questions 58CHAPTER 3 MANAGING TABLES AND LISTS 61Creating Tables 62Converting Text to Tables 64Switching Tables to Text 65Creating Tables by Specifying Rows and Columns 66Modifying Tables 68Sorting Table Data 68Configuring Cell Margins and Spacing 70Merging and Splitting Cells 73Resizing Tables, Rows, and Columns 75Splitting Tables 80Configuring a Repeating Row Header 82Creating and Formatting Lists 85Structuring Paragraphs as Numbered and Bulleted Lists 85Changing Bullet Characters and Number Formatting 86Defining Custom Bullet Characters and Number Formatting 88Increasing and Decreasing List Levels 91Restarting and Continuing List Numbering 92Setting Starting Number Values 94Summary 95Key Terms 96Exam Essentials 96Review Questions 97CHAPTER 4 BUILDING REFERENCES 99Creating and Managing Referencing Elements 100Inserting Footnotes and Endnotes 100Modifying Footnote and Endnote Properties 103Creating and Modifying Bibliography Citation Sources 104Inserting Citations for Bibliographies 107Working with Referencing Tables 109Inserting Tables of Contents 109Customizing Tables of Contents 110Adding Bibliographies 112Summary 113Key Terms 113Exam Essentials 114Review Questions 115CHAPTER 5 ADDING AND FORMATTING GRAPHIC ELEMENTS 117Inserting Illustrations and Text Boxes 118Adding Shapes 118Including Pictures 120Inserting 3D Models 121Adding SmartArt Graphics 122Placing Screenshots and Screen Clippings 123Inserting Text Boxes 125Formatting Illustrations and Text Boxes 127Applying Artistic Effects 127Adding Picture Effects and Picture Styles 128Removing Picture Backgrounds 131Formatting Graphic Elements 132Setting Up SmartArt Graphics 134Working with 3D Models 136Adding and Organizing Text 137Formatting Text in Text Boxes 137Adding Text in Shapes 139Changing SmartArt Graphic Content 141Modifying Graphic Elements 142Positioning Objects 142Wrapping Text Around Objects 143Adding Alt Text to Objects 146Summary 148Key Terms 148Exam Essentials 148Review Questions 149CHAPTER 6 WORKING WITH OTHER USERS ON YOUR DOCUMENT 151Adding Comments 152Inserting Comments 152Reviewing and Replying to Comments 153Resolving Comments 154Deleting Comments 155Tracking Your Changes 157Turning On Track Changes 157Reviewing Tracked Changes 158Accepting and Rejecting Tracked Changes 159Locking and Unlocking Change Tracking 162Summary 165Key Terms 165Exam Essentials 165Review Questions 166PART II EXCEL EXAM MO-200 169CHAPTER 7 MANAGING WORKSHEETS AND WORKBOOKS 171Importing Data into Workbooks 172Bringing in Data from TXT Files 173Importing Data from CSV Files 174Navigating Within Workbooks 178Searching for Data Within a Workbook 178Navigating to Named Cells, Ranges, or Workbook Elements 180Inserting and Removing Hyperlinks 182Formatting Worksheets and Workbooks 190Modifying Page Settings 190Adjusting Row Height and Column Width 192Customizing Headers and Footers 200Customizing Options and Views 206Customizing the Quick Access Toolbar 207Displaying and Modifying Workbook Content in Different Views 211Freezing Worksheet Rows and Columns 214Changing Window Views 216Modifying Basic Workbook Properties 218Displaying Formulas 219Configuring Content for Collaboration 222Setting a Print Area 222Saving Workbooks in Other File Formats 224Configuring Print Settings 224Inspecting Workbooks for Issues 225Summary 229Key Terms 229Exam Essentials 229Review Questions 231CHAPTER 8 USING DATA CELLS AND RANGES 233Manipulating Data in Worksheets 234Pasting Data by Using Special Paste Options 234Filling Cells by Using Auto Filling 238Inserting and Deleting Multiple Columns or Rows 240Adding and Removing Cells 242Formatting Cells and Ranges 245Merging and Unmerging Cells 245Modifying Cell Alignment, Orientation, and Indentation 246Formatting Cells by Using Format Painter 249Wrapping Text Within Cells 250Using Number Formatting 252Applying Cell Formatting from the Format Cells Dialog Box 253Working with Cell Styles 254Clearing Cell Formatting 256Defining and Referencing Named Ranges 258Defining a Named Range 258Naming a Table 263Summarizing Data Visually 265Inserting Sparklines 265Applying Built-In Conditional Formatting 269Removing Conditional Formatting 271Summary 275Key Terms 275Exam Essentials 275Review Questions 277CHAPTER 9 WORKING WITH TABLES AND TABLE DATA 279Creating and Formatting Tables 280Creating Excel Tables from Cell Ranges 280Applying Table Styles 282Converting Tables to Cell Ranges 283Modifying Tables 285Adding or Remove Table Rows and Columns 285Configuring Table Style Options 288Inserting and Configuring Total Rows 289Filtering and Sorting Table Data 292Filtering Records 292Sorting Data by Multiple Columns 296Summary 298Key Terms 299Exam Essentials 299Review Questions 300CHAPTER 10 PERFORMING OPERATIONS BY USING FORMULAS AND FUNCTIONS 303Inserting References 304Inserting Relative, Absolute, and Mixed References 305Referencing Named Ranges and Named Tables in Formulas 307Calculating and Transforming Datas 310Performing Calculations Using the AVERAGE(), MAX(), MIN(), and SUM() Functions 310Perform Conditional Operations by Using the IF() Function 321Formatting and Modifying Text 325Formatting Text Using the RIGHT(), LEFT(), and MID() Functions 325Formatting Text Using the UPPER(), LOWER(), and LEN() Functions 329Formatting Text Using the CONCAT() and TEXTJOIN() Functions 333Summary 336Key Terms 337Exam Essentials 337Review Questions 338CHAPTER 11 MANAGING CHARTS 341Creating Charts 342Building Charts 342Working with Chart Sheets 344Modifying Charts 348Adding Data Series to Charts 348Switching Between Rows and Columns in Source Data 351Adding and Modifying Chart Elements 352Formatting Charts 355Using Chart Layouts 356Applying Chart Styles 364Adding Alternative Text to Charts for Accessibility 366Summary 368Key Terms 368Exam Essentials 369Review Questions 370PART III POWERPOINT EXAM MO-300 373CHAPTER 12 CREATING PRESENTATIONS 375Modifying Slide Masters, Handout Masters, and Note Masters 377Changing the Slide Master Theme or Background 378Modifying Slide Master Content 383Creating Slide Layouts 384Modify Slide Layouts 389Modifying the Handout Master 393Modifying the Notes Master 400Changing Presentation Options and Views 406Changing the Slide Size 406Displaying Presentations in Different Views 408Setting Basic File Properties 410Configuring Print Settings for Presentations 411Printing All or Part of a Presentation 411Printing Notes Pages 413Printing Handouts 414Printing in Color, Grayscale, or Black and White 415Configuring and Presenting Slideshows 417Creating Custom Slideshows 417Configuring Slideshow Options 422Rehearsing Slideshow Timing 423Setting Up Slideshow Recording Options 427Presenting Slideshows by Using Presenter View 430Preparing Presentations for Collaboration 436Mark Presentations as Final 437Protecting Presentations by Using Passwords 438Inspecting Presentations for Issues 439Adding and Managing Comments 441Preserving Presentation Content 446Exporting Presentations to Other Formats 447Summary 456Key Terms 457Exam Essentials 457Review Questions 459CHAPTER 13 MANAGING SLIDES 461Inserting Slides 462Importing Word Document Outlines 462Inserting Slides from Another Presentation 465Inserting Slides and Selecting Slide Layouts 467Inserting Summary Zoom Slides 469Duplicating Slides 474Modifying Slides 475Hiding and Unhiding Slides 476Modifying Individual Slide Backgrounds 477Inserting Slide Headers, Footers, and Page Numbers 480Ordering and Grouping Slides 484Creating Sections 484Modifying the Slide Order 486Renaming Sections 488Summary 489Key Terms 490Exam Essentials 490Review Questions 491CHAPTER 14 INSERTING AND FORMATTING TEXT, SHAPES, AND IMAGES 493Formatting Text 495Applying Formatting and Styles to Text 495Formatting Text in Multiple Columns 501Creating Bulleted and Numbered Lists 502Inserting Links 504Inserting Hyperlinks 504Inserting Section Zoom Links and Slide Zoom Links 505Inserting and Formatting Images 509Resizing and Cropping Images 511Applying Built-In Styles and Effects to Images 513Inserting Screenshots and Screen Clippings 515Inserting and Formatting Graphic Elements 518Inserting and Changing Shapes 518Drawing by Using Digital Ink 520Adding Text to Shapes and Text Boxes 523Resizing Shapes and Text Boxes 525Formatting Shapes and Text Boxes 527Applying Built-In Styles to Shapes and Text Boxes 529Adding Alt Text to Graphic Elements for Accessibility 532Ordering and Grouping Objects on Slides 534Ordering Shapes, Images, and Text Boxes 534Aligning Shapes, Images, and Text Boxes 535Grouping Shapes and Images 537Displaying Alignment Tools 538Summary 539Key Terms 540Exam Essentials 540Review Questions 541CHAPTER 15 INSERTING TABLES, CHARTS, SMARTART, 3D MODELS, AND MEDIA 543Inserting and Formatting Tables 544Creating and Inserting Tables 544Inserting and Deleting Table Rows and Columns 545Applying Built-In Table Styles 548Inserting and Modifying Charts 551Creating and Inserting Charts 551Modifying Charts 554Inserting and Formatting SmartArt Graphics 560Inserting SmartArt Graphics 560Converting Lists to SmartArt Graphics 560Adding and Modifying SmartArt Graphic Content 563Inserting and Modifying 3D Models 565Inserting 3D Models 565Modifying 3D Models 567Inserting and Managing Media 568Inserting Audio and Video Clips 568Creating and Inserting Screen Recordings 576Configuring Media Playback Options 581Summary 584Key Terms 585Exam Essentials 585Review Questions 587CHAPTER 16 APPLYING TRANSITIONS AND ANIMATIONS 589Applying and Configuring Slide Transitions 590Applying Basic and 3D Slide Transitions 590Configuring Transition Effects 592Animating Slide Content 596Animating Text and Graphic Elements 596Animating 3D Models 606Configuring Animation Effects 609Configuring Animation Paths 612Reordering Animations on a Slide 617Setting Timing for Transitions 619Setting Transition Effect Duration 619Configuring Transition Start and Finish Options 620Summary 622Key Terms 622Exam Essentials 623Review Questions 624APPENDIX ANSWERS TO REVIEW QUESTIONS 627PART I: WORD EXAM MO-100 628Chapter 1: Working with Documents 628Chapter 2: Inserting and Formatting Text 628Chapter 3: Managing Tables and Lists 629Chapter 4: Building References 630Chapter 5: Adding and Formatting Graphic Elements 630Chapter 6: Working with Other Users on Your Document 631PART II: EXCEL EXAM MO-200 632Chapter 7: Managing Worksheets and Workbooks 632Chapter 8: Using Data Cells and Ranges 632Chapter 9: Working with Tables and Table Data 633Chapter 10: Performing Operations by Using Formulas and Functions 634Chapter 11: Managing Charts 634PART III: POWERPOINT EXAM MO-300 635Chapter 12: Creating Presentations 635Chapter 13: Managing Slides 636Chapter 14: Inserting and Formatting Text, Shapes, and Images 636Chapter 15: Inserting Tables, Charts, SmartArt, 3D Models, and Media 637Chapter 16: Applying Transitions and Animations 638Index 639

Regulärer Preis: 38,99 €
Produktbild für Lean Excellence in der Informationstechnologie

Lean Excellence in der Informationstechnologie

Jeder Prozess hat seine Verschwendungen: Dieser Umstand sorgt für einen enormen Organisationsaufwand und spielt gerade in der Wirtschaft eine bedeutende Rolle. Häufig kommt es vor, dass ein guter oder smarter Prozess zum Wettbewerbsvorteil oder gar zur Position des Weltmarktführers führt. Um einen verschwendungsarmen Prozess zu gestalten bedarf es an Führung, Organisation, bestimmten Methoden und Unternehmenskultur – diese bilden das Rückgrat der operativen Exzellenz. Wie ist das möglich, gerade wenn Prozesse kontinuierlich hinterfragt werden?Dieses Buch bietet eine mögliche Lösung: An einem konkreten Fallbeispiel wird detailliert erklärt, wie mit Hilfe eines Makigamis jegliche Prozesse aufgenommen und entsprechend aufbereitet werden. Das Makigami bietet uns eine einfache Möglichkeit, um hochindividuelle Prozesse standardisiert zu mappen, jegliche Arten der Verschwendung transparent darzustellen, sowie diese gleichzeitig zu quantifizieren.Der höchste Schwierigkeitsgrad der Prozessoptimierung ist in diesem Buch durch ein Fallbeispiel veranschaulicht. Rückblickend sind Prozessoptimierungen im physikalischen Umfeld gestartet. Nachfolgend konnten administrative Prozesse gestaltet und verbessert werden. Zuletzt sind es Prozessabläufe, die sich in der Interaktion unserer Computer wiederfinden.Nikola Vidovic wurde 1986 geboren. Nach seiner Berufsausbildung zum Bürokaufmann in einem Energieversorgungsunternehmen entschied er sich, nebenberuflich den Bachelor of Science in Wirtschaftsinformatik zu absolvieren. Dies erfolgte an der Hochschule Wismar, mit dem Schwerpunkt Operative Exzellenz in der IT. Anschließend erlangte er seinen Master of Science in IT-Management, mit dem Schwerpunkt Blockchain in der Energiewirtschaft. Mit der Erfahrung aus 16 Jahren Energiewirtschaft und seinen zahlreichen erfolgreich abgeschlossenen IT-Projekten ist Nikola Vidovic in der Rolle des Produktmanagers kontinuierlich dabei, die Digitalisierung mit digitalen Lösungen und den neuesten Methoden voranzutreiben.

Regulärer Preis: 29,99 €
Produktbild für Captain CiaoCiao erobert Java

Captain CiaoCiao erobert Java

Bessere Java-Skills entwickeln und trainieren. Das Trainingsbuch für besseres Java.Das große Java-Trainingsbuch – vom Autor des Klassikers »Java ist auch eine Insel«. Heben Sie Ihre Coding-Fähigkeiten auf das nächste Level und testen Sie Ihre Java-Kenntnisse an kniffligen Programmieraufgaben rund um den Piratenkapitän CiaoCiao. Christian Ullenboom bietet Ihnen alles, was Sie dazu brauchen: Übungen zu Features und Kniffen, die man als Profi im Detail kennen sollte, sowie ein intensives Training für Clean Code und durchdachtes Design, das auch komplexe Software trägt. Zahlreiche Best Practices und ausführlich kommentierte Lösungen zu den Aufgaben machen dieses Buch zum perfekten Workout für die professionelle Softwareentwicklung mit Java.Aus dem InhaltAlle BasicsAufgaben in drei SchwierigkeitsstufenThemen auf vielen NiveausThreadsicherheitStrings und reguläre AusdrückeFunktionale ProgrammierungComparator- und Comparable-InterfaceXML, JSON und mehr verarbeitenSchnittstellen zum BetriebssystemReflection-API von A bis ZStreams, Datenbanken u. v. m.Annotations gekonnt einsetzenInhalt (PDF-Link)Leseprobe (PDF-Link)

Regulärer Preis: 39,90 €
Produktbild für Warehouse Management mit SAP

Warehouse Management mit SAP

Leere Läger oder explodierende Lagerkosten? Mit diesem Buch können Sie beides vermeiden! Es stellt sowohl die Abläufe in der Lagerverwaltung als auch die Funktionen und das grundlegende Customizing von WM umfassend dar. Anhand zahlreicher Beispiele erfahren Sie, wie Sie Ihre Prozesse verbessern und neue Prozesse effizient einsetzen können. Ob Sie WM implementieren, optimieren oder in der Fachabteilung nutzen: André Käber zeigt Ihnen, wie Sie Ihr Lager schnell und vor allem nachhaltig optimieren. Aus dem Inhalt: Betriebswirtschaftliche GrundlagenOrganisationsstrukturelementeStammdaten und BestandsverwaltungWareneingangsprozess und EinlagerungsstrategienAuslagerungssteuerungProduktionsversorgungsstrategienWarenbewegungen und operative LagerprozesseLieferabwicklungLagerprozess- und Materialflussoptimierung   1.  Einleitung ... 17   2.  Betriebswirtschaftliche Grundlagen der Lagerhaltung ... 21        2.1 ... Bedeutung der Lagerlogistik ... 21        2.2 ... Einfluss aktueller Markttrends auf die Lagerlogistik ... 22        2.3 ... Lagerkosten ... 23        2.4 ... Funktionen der Lagerhaltung ... 24        2.5 ... Kosteneffekte der Lagerhaltung ... 27        2.6 ... Lagerprozess ... 30        2.7 ... Lagerarten ... 31        2.8 ... Lagerverwaltung ... 32        2.9 ... Inventur ... 39        2.10 ... Funktionen von Lagerverwaltungssystemen ... 40   3.  Organisationsstrukturelemente in WM und SAP LES ... 45        3.1 ... Übergreifende Organisationsstruktur von WM und LES ... 46        3.2 ... LES mit und ohne WM ... 48        3.3 ... Organisationseinheiten ... 51        3.4 ... Änderungen in SAP S/4HANA Stock Room Management ... 77   4.  Stammdaten und Bestandsverwaltung in WM ... 79        4.1 ... Lagerplatzstammdaten ... 79        4.2 ... Materialstammdaten ... 84        4.3 ... Gefahrstoffstammdaten ... 94        4.4 ... Chargenstammdaten ... 96        4.5 ... Mindesthaltbarkeitsdatum/Verfallsdatum ... 98        4.6 ... Bestandsverwaltung ... 99        4.7 ... Lagerung unterschiedlicher Mengeneinheiten in WM ... 102        4.8 ... Lagereinheitenverwaltung in WM ... 104        4.9 ... Änderungen in SAP S/4HANA Stock Room Management ... 107   5.  Elemente der Prozesssteuerung in WM ... 109        5.1 ... Bewegungsarten ... 109        5.2 ... Transportbedarfe ... 122        5.3 ... Umbuchungsanweisungen ... 125        5.4 ... Transportaufträge - zentrale Belege in WM ... 127        5.5 ... Bewegungssonderkennzeichen ... 137        5.6 ... Lagerortsteuerung ... 142        5.7 ... Änderungen in SAP S/4HANA Stock Room Management ... 150   6.  Wareneingangsprozesse und Einlagerungsstrategien in WM ... 151        6.1 ... Wareneingangsprozesse in SAP ERP ... 151        6.2 ... Steuerung der Einlagerung ... 172        6.3 ... Einlagerungsstrategien von WM ... 176        6.4 ... Weitere Bestandteile des Einlagerungsprozesses ... 195        6.5 ... Änderungen in SAP S/4HANA Stock Room Management ... 201   7.  Auslagerungssteuerung in WM ... 203        7.1 ... Auslagerungssteuerung ... 203        7.2 ... Auslagerungsstrategien ... 208        7.3 ... Weitere Steuerungskriterien der Auslagerung ... 218        7.4 ... Änderungen in SAP S/4HANA Stock Room Management ... 228   8.  Produktionsversorgungsstrategien in WM ... 229        8.1 ... Betriebswirtschaftliche Grundlagen ... 229        8.2 ... Grundlagen der Fertigungsarten und der Materialbereitstellung in SAP ERP ... 230        8.3 ... Produktionsversorgung ohne WM-Bereitstellung ... 233        8.4 ... Produktionsversorgung mit WM-Bereitstellung ... 236        8.5 ... Kanban-Bereitstellung ... 255        8.6 ... Änderungen in SAP S/4HANA Stock Room Management ... 267   9.  Warenbewegungen und operative Lagerprozesse in WM ... 269        9.1 ... Grundlagen von Umlagerungen in SAP ERP ... 269        9.2 ... Lagerinterne Umlagerungen ... 271        9.3 ... Umlagerungen zwischen Lagerorten ... 281        9.4 ... Umbuchungen ... 313        9.5 ... Sperren von Lagerplätzen, Lagereinheiten und Lagerbeständen ... 321        9.6 ... Nachschubprozesse in WM ... 325        9.7 ... Änderungen in SAP S/4HANA Stock Room Management ... 340 10.  Lieferabwicklung in WM ... 341        10.1 ... Gesamtprozess der Auslagerung zum Kundenauftrag ... 341        10.2 ... Lieferbezogene Kommissionierung (Einzelauftragsbearbeitung) ... 351        10.3 ... Sammelgangsbearbeitung von Lieferungen ... 356        10.4 ... Lieferübergreifender Transportauftrag ... 362        10.5 ... Zweistufige Kommissionierung ... 365        10.6 ... Änderungen in SAP S/4HANA Stock Room Management ... 369 11.  Weitere Grundfunktionen in WM ... 371        11.1 ... Handling Unit Management ... 371        11.2 ... Chargenverwaltung in WM ... 396        11.3 ... Gefahrstoffverwaltung in WM ... 403        11.4 ... Inventurabwicklung in WM ... 426        11.5 ... Operatives Lagercontrolling in WM ... 445        11.6 ... Leistungsdatenberechnung in WM ... 463        11.7 ... Änderungen in SAP S/4HANA Stock Room Management ... 474 12.  WM-Komponenten zur Lagerprozess- und Materialflussoptimierung ... 475        12.1 ... Mobile Datenerfassung mit SAP Radio Frequency ... 475        12.2 ... Dezentrale Lagerverwaltung mit WM ... 513        12.3 ... Prozessoptimierung mit dem Task & Resource Management System (TRM) ... 523        12.4 ... Yard Management ... 537        12.5 ... Cross-Docking ... 559        12.6 ... Prozessoptimierung in Supply-Chain-Execution-Prozessen durch RFID und Event Management ... 568        12.7 ... SAP Auto-ID Infrastructure ... 579        12.8 ... Änderungen in SAP S/4HANA Stock Room Management ... 591 13.  SAP Extended Warehouse Management (EWM) ... 595        13.1 ... Lagermodellierung ... 596        13.2 ... Prozesse in SAP EWM ... 599        13.3 ... Radio-Frequency-Framework ... 624        13.4 ... Integration mit SAP Transportation Management (TM) ... 625        13.5 ... Evolution von SAP EWM 9.0 zu SAP S/4HANA 1909 ... 629 14.  SAP S/4HANA Stock Room Management ... 631        14.1 ... Funktionale Unterschiede ... 631        14.2 ... SAP-Lagerlösungen im Vergleich ... 634        14.3 ... Migration von WM nach SAP S/4HANA Stock Room Management ... 638   A.  Glossar ... 641   B.  Literaturverzeichnis ... 649   Der Autor ... 651   Index ... 653

Regulärer Preis: 79,90 €
Produktbild für SAP-Schnittstellenmanagement

SAP-Schnittstellenmanagement

So beherrschen Sie die Schnittstellen Ihrer komplexen Systemlandschaft. Dieser praktische Leitfaden hilft Ihnen dabei, sich im Dschungel der verschiedenen Schnittstellenformate und Datenaustauschprotokolle zurechtzufinden. Die Autoren stellen Ihnen die Werkzeuge der hybriden Integrationsplattform von SAP vor und führen Sie durch die Anwendung der Integration Solution Advisory Methodology (ISA-M). So entsteht eine kohärente Integrationsarchitektur aus Cloud- und On-Premise-Software. Aus dem Inhalt: Methoden und FrameworksSAP API Business Hub und SAP GraphIntegrationskonzepte und ArchitekturenSAP Enterprise MessagingSAP API ManagementOpen ConnectorsSAP Cloud IntegrationMonitoring, Governance und BetriebSAP Data IntelligenceDigital Integration Hub   Einleitung ... 15 Teil I.  Grundlagen ... 19   1.  SAP-Schnittstellenverwaltung im Zeitalter der Digitalisierung ... 21        1.1 ... Was bedeutet Integration? ... 21        1.2 ... Evolution der Schnittstellentechnologien von SAP R/3 bis SAP S/4HANA ... 24        1.3 ... SAP-Schnittstellenbibliotheken ... 35        1.4 ... Herausforderungen an das Schnittstellenmanagement ... 44   2.  Integrationskonzepte und -technologien im SAP-Umfeld ... 51        2.1 ... Integrationsarchitekturen ... 51        2.2 ... Integrationsstile ... 72        2.3 ... Integrationstechnologien, Standards und Protokolle ... 84   3.  Methoden und Frameworks ... 109        3.1 ... Integration Solution Advisory Methodology (ISA-M) ... 109        3.2 ... Reifegradmodell ... 130        3.3 ... Integration Competency Center of Excellence ... 136        3.4 ... Hybrid Integration Platform ... 150   4.  Die hybride Integrationsplattform von SAP ... 165        4.1 ... Vision ... 166        4.2 ... Komponenten ... 177 Teil II.  Werkzeuge der hybriden Integrationsplattform von SAP ... 183   5.  SAP Process Orchestration ... 185        5.1 ... Übersicht über SAP Process Orchestration ... 186        5.2 ... Funktionen für das Schnittstellenmanagement ... 189        5.3 ... Anwendungsmöglichkeiten ... 202   6.  SAP Cloud Integration ... 207        6.1 ... Übersicht ... 208        6.2 ... Funktionen für das Schnittstellenmanagement ... 210        6.3 ... Anwendungsmöglichkeiten ... 220   7.  SAP API Management ... 227        7.1 ... Übersicht ... 228        7.2 ... Funktionen für das Schnittstellenmanagement ... 232        7.3 ... Anwendungsmöglichkeiten ... 243   8.  SAP Enterprise Messaging ... 247        8.1 ... Übersicht über SAP Enterprise Messaging ... 248        8.2 ... Funktionen für das Schnittstellenmanagement ... 250        8.3 ... Anwendungsmöglichkeiten ... 258   9.  Open Connectors ... 265        9.1 ... Übersicht über Open Connectors ... 266        9.2 ... Funktionen für das Schnittstellenmanagement ... 267        9.3 ... Anwendungsmöglichkeiten ... 279 10.  SAP Data Intelligence ... 283        10.1 ... Übersicht ... 284        10.2 ... Funktionen für das Schnittstellenmanagement ... 287        10.3 ... Anwendungsmöglichkeiten ... 298 11.  Werkzeuge zur Datenintegration ... 301        11.1 ... Übersicht ... 302        11.2 ... Funktionen ... 310        11.3 ... Anwendungsmöglichkeiten ... 315 12.  SAP Application Interface Framework ... 319        12.1 ... Übersicht ... 319        12.2 ... Funktionen für das Schnittstellenmanagement ... 321        12.3 ... Anwendungsmöglichkeiten ... 333 13.  Digital Integration Hub ... 335        13.1 ... Übersicht über den Digital Integration Hub ... 336        13.2 ... Digital Integration Hub von SAP ... 338        13.3 ... Anwendungsmöglichkeiten und Empfehlungen ... 343 Teil III.  Aufgaben des Schnittstellenmanagements ... 349 14.  Governance ... 351        14.1 ... Prinzipien und Policys ... 351        14.2 ... Entwicklungsrichtlinien ... 363        14.3 ... Katalogisierung ... 377        14.4 ... Reporting ... 385 15.  Betrieb ... 397        15.1 ... Monitoring und Alerting ... 397        15.2 ... Testmanagement ... 411        15.3 ... Change Management und Transportwesen ... 422 16.  Organisation ... 437        16.1 ... Produktorientierte Organisationsmodelle ... 438        16.2 ... Rollen ... 446        16.3 ... Verantwortlichkeiten ... 457 17.  Plattformwerkzeuge ... 465        17.1 ... SAP Solution Manager ... 465        17.2 ... SAP-Partnerlösungen ... 480 18.  Zusammenfassung und Ausblick ... 497        18.1 ... Zusammenfassung ... 497        18.2 ... Ausblick ... 499        18.3 ... Schlusswort ... 500   Quellen- und Literaturverzeichnis ... 503   Die Autoren ... 505   Index ... 507

Regulärer Preis: 79,90 €