Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Mastering Linux System Administration

Mastering Linux System Administration

ACHIEVE LINUX SYSTEM ADMINISTRATION MASTERY WITH TIME-TESTED AND PROVEN TECHNIQUESIn Mastering Linux System Administration, Linux experts and system administrators Christine Bresnahan and Richard Blum deliver a comprehensive roadmap to go from Linux beginner to expert Linux system administrator with a learning-by-doing approach. Organized by do-it-yourself tasks, the book includes instructor materials like a sample syllabus, additional review questions, and slide decks.Amongst the practical applications of the Linux operating system included within, you'll find detailed and easy-to-follow instruction on:* Installing Linux servers, understanding the boot and initialization processes, managing hardware, and working with networks* Accessing the Linux command line, working with the virtual directory structure, and creating shell scripts to automate administrative tasks* Managing Linux user accounts, system security, web and database servers, and virtualization environmentsPerfect for entry-level Linux system administrators, as well as system administrators familiar with Windows, Mac, NetWare, or other UNIX systems, Mastering Linux System Administration is a must-read guide to manage and secure Linux servers.CHRISTINE BRESNAHAN has over thirty years of experience working in the IT industry. She is an Adjunct Professor at Ivy Tech Community College where she teaches Linux certification and Python programming classes. She is co-author with Richard Blum of CompTIA Linux+ Study Guide, Linux Essentials, and the Linux Command Line and Scripting Bible. RICHARD BLUM has over thirty years of experience working as a system and network administrator. He teaches online courses in Linux and Web programming and is co-author with Christine Bresnahan of several Linux titles, including CompTIA Linux+ Study Guide, Linux Essentials, and the Linux Command Line and Scripting Bible.Introduction xxvPART 1 BASIC ADMIN FUNCTIONS 1CHAPTER 1 UNDERSTANDING THE BASICS 3What is Linux? 3Looking into the Linux Kernel 4The GNU Utilities 12Linux User Interfaces 12Linux Distributions 18Core Linux Distributions 19Specialized Linux Distributions 19The Bottom Line 20CHAPTER 2 INSTALLING AN UBUNTU SERVER 23Pre-Installation Requirements 23Hardware Requirements 24Virtual Server Requirements 25Finding the Software 26Oracle VirtualBox 26Ubuntu Server 26Running the Installation 29Oracle VirtualBox 29Ubuntu Server 33Checking the Installation 49The Bottom Line 50CHAPTER 3 INSTALLING AND MAINTAINING SOFTWARE IN UBUNTU 53Exploring Package Management 53Inspecting the Debian-Based Systems 54Managing Packages with apt 54Installing Software Packages with apt 56Upgrading Software with apt 59Uninstalling Software with apt 60The apt Repositories 61Using Snap Containers 62Installing from Source Code 64The Bottom Line 66CHAPTER 4 INSTALLING A RED HAT SERVER 69Pre-Installation Requirements 69Hardware Requirements 70Virtual Server Requirements 71Finding the Software 72Oracle VirtualBox 72CentOS 73Running the Installation 76Oracle VirtualBox 77CentOS 77Checking the Installation 96The Bottom Line 97CHAPTER 5 INSTALLING AND MAINTAINING SOFTWARE IN RED HAT 99Exploring Red Hat Packages 99Automated Package Management 100Listing Installed Packages 100Installing Software with dnf 102Upgrading Software with dnf 104Uninstalling Software with dnf 104Handling Broken Dependencies 105Working with RPM Repositories 106Working Directly with Packages 107Finding Package Files 107Inspecting Package Files 108Installing Package Files 109Removing Package Files 110Using Flatpak Containers 111The Bottom Line 113CHAPTER 6 WORKING WITH THE SHELL 115Exploring the Shell 115The Shell Prompt 116The Shell Manual 117Working with Commands 121Entering Commands 121Retrieving Past Commands 123Redirecting Commands 125Environment Variables 129Global Environment Variables 129User-Defined Environment Variables 131The Bottom Line 133CHAPTER 7 EXPLORING LINUX FILE MANAGEMENT 135Filesystem Navigation 135The Linux Filesystem 135Traversing Directories 138Linux Files 139Determining File Types 139Filenames 140Hidden Files 140File Inodes 141File and Directory Listing 142Basic Listing 142Modifying Listing Information 143The Complete Parameter List 143Directory Handling 146Creating Directories 146Deleting Directories 146File Handling 147Creating Files 147Copying Files 148Linking Files 150Renaming Files 152Deleting Files 152File Features 154Using Wildcards 154Quoting 155Case Sensitivity 156Finding Files 156The which Command 156The locate Command 156The whereis Command 157The find Command 157Archiving Files 159Compressing Files 159Creating Archive Files 160Archiving Scenarios 161The Bottom Line 163CHAPTER 8 WORKING WITH TEXT FILES 165The vim Editor 165Checking Your vim Editor Program 166Using the vim Editor 167The nano Editor 170Working with Data Files 172Sorting 172Searching 175Compressing 181Archiving 182The Bottom Line 187PART 2 INTERMEDIATE ADMIN FUNCTIONS 189CHAPTER 9 MANAGING HARDWARE 191Device Driver Modules 191Listing Installed Modules 192Installing New Modules 193Removing Modules 196Communicating with Devices 196Device Interfaces 196The /dev Directory 198The /proc Directory 199The /sys Directory 202Working with Devices 203Finding Devices 203Working with PCI Cards 205Working with USB Devices 206Using Hot Pluggable Devices 207Detecting Dynamic Devices 208Working with Dynamic Devices 208The Bottom Line 209CHAPTER 10 BOOTING LINUX 211Understanding the Boot Process 211Overview of the Boot Process 211Watching the Boot Process 212The Firmware Startup 212The GRUB2 Bootloader 214Configuring the GRUB2 Bootloader 215Exploring the GRUB2 Configuration 215Interacting with GRUB2 217The systemd Initialization Process 219Exploring Unit Files 220Focusing on Service Unit Files 221Focusing on Target Unit Files 225Changing a Unit Configuration File 226Changing the systemd Configuration File 227Looking at systemctl 227Jumping Targets 230Analyzing with systemd 232The Bottom Line 234CHAPTER 11 WORKING WITH STORAGE DEVICES 235Storage Basics 235Drive Connections 235Partitioning Drives 236Automatic Drive Detection 236Partitioning Tools 237Working with fdisk 237Working with gdisk 239The GNU parted Command 241Formatting Filesystems 243Common Filesystem Types 243Creating Filesystems 245Mounting Filesystems 246Manually Mounting Devices 246Automatically Mounting Devices 247Managing Filesystems 249Retrieving Filesystem Stats 249Filesystem Tools 250Storage Alternatives 251Multipath 251Logical Volume Manager 251Using RAID Technology 253The Bottom Line 254CHAPTER 12 CONFIGURING NETWORK SETTINGS 255Network Settings 255Ubuntu Servers 256Red Hat Servers 258Using Network Command-Line Tools 260NetworkManager Tools 260Other Tools 262Basic Network Troubleshooting 269Sending Test Packets 269Finding Host Information 271Advanced Network Troubleshooting 273The netstat Command 273Examining Sockets 276The Bottom Line 277CHAPTER 13 MANAGING USERS AND GROUPS 279Understanding Linux Permissions 279Understanding Ownership 280Controlling Access Permissions 282Exploring Special Permissions 284Managing Default Permissions 285Using Access Control Lists 288Managing User Accounts 290Adding Accounts 290Maintaining Accounts 298Removing Accounts 301Maintaining the Environment 302Setting Environment Variables 302Exploring User Entries 302Exploring Global Entries 303Managing Groups 304Adding Groups 305Removing Groups 306The Bottom Line 307CHAPTER 14 WORKING WITH PROCESSES AND JOBS 309Looking at Processes 309Monitoring Processes in Real Time 311Managing Processes 314Setting Priorities 314Stopping Processes 315Running Programs in Background Mode 317Running in the Background 317Running Multiple Background Jobs 318Running Programs Without a Console 319Job Control 320Viewing Jobs 320Restarting Stopped Jobs 322Scheduling Jobs 323Scheduling a Job Using the at Command 323Scheduling Recurring Programs 326The Bottom Line 328CHAPTER 15 MANAGING LOG FILES 329The systemd Journaling System 329Configuring systemd-journald 330Looking at Journal Files 331Making the Journal Persistent 332Viewing Journal Entries 332Maintaining the Journal 335Viewing Different Journal Files 337Protecting Journal Files 337Making Journal Entries 337The rsyslog Legacy System 338The syslog Protocol 338Basic Logging Using rsyslogd 340Layering Your Logging 342Making Log Entries 343Finding Event Messages 344The Bottom Line 344CHAPTER 16 MANAGING PRINTERS 347The Common Unix Printing System 347Printer Drivers 347Web Interface 348Command-Line Commands 348Printer Sharing 349Printer Classes 350Installing and Configuring CUPS 350Installing CUPS 351Preparing the Server to Use CUPS 354Using CUPS 356Administration Functions 356Managing Printers and Jobs in CUPS 360The Bottom Line 361PART 3 ADVANCED ADMIN FUNCTIONS 363CHAPTER 17 EXPLORING UBUNTU SECURITY 365Locking Down Root 365Looking at Linux Account Types 366Gaining Super User Privileges 367Using OpenSSH on Ubuntu 369Exploring Basic SSH Concepts 370Configuring SSH 372Generating SSH Keys 373Authenticating with SSH Keys 374The AppArmor System 376Network Security Using Firewalls 380Understanding UFW 380Configuring UFW 381The Bottom Line 385CHAPTER 18 EXPLORING RED HAT SECURITY 387Working with Root Access 387Keeping Track of Root Logins 388Disabling Root Access from SSH 388Enabling Automatic Logout 389Blocking Root Access 390Using SELinux 391Enabling SELinux 391Understanding Security Context 392Using Policies 393Network Security Using Firewalls 395Red Hat Firewall Concepts 395Checking the Firewall Status 397Working with Zones 398Working with Firewall Rules 399The Bottom Line 401CHAPTER 19 WRITING SCRIPTS 403Beginning a Shell Script 403Creating a Script File 403Displaying Messages 405Using Variables 407Environment Variables 407User Variables 408Command Substitution 409Exiting the Script with Status 410Passing Parameters 411Adding Conditional Expressions 414Working with the if-then Statement 414Using Compound Tests 417Working with the if-then-else Statement 418Trying the case Statement 419Using Loops 420Looking at the for Command 420Working with the while Format 423Using the until Command 424Using Functions 427Creating Functions 427Calling Functions 427The Bottom Line 430CHAPTER 20 MANAGING WEB SERVERS 433Linux Web Servers 433Apache 433nginx 434The Apache Web Server 435Installing an Apache Server 435Configuring the Apache Server 437Hosting Dynamic Web Applications 445Creating a Secure Web Server 447The nginx Server 448Installing nginx 448Configuring nginx 449The Bottom Line 451CHAPTER 21 MANAGING DATABASE SERVERS 453Linux Database Servers 453Organizing the Data 454Querying the Data 455Controlling the Data 456Installing and Using MySQL/MariaDB 457Conducting a MariaDB Installation 458Accessing a MariaDB Database 462Populating and Using MariaDB Database 466Installing and Using PostgreSQL 471Conducting a PostgreSQL Installation 471Accessing a PostgreSQL Database 474Populating and Using a PostgreSQL Database 477The Bottom Line 478CHAPTER 22 EXPLORING THE VIRTUALIZATION ENVIRONMENT 481Hypervisors 481Managing VMs 481Creating a Virtual Machine 483Integrating via Linux Extensions 485Containers 486Exploring Container Types 487Looking at Container Software 487Organizing Containers 489Software Packaging 491Looking at Ubuntu Snap 491Looking at Flatpak 499The Bottom Line 503APPENDIX THE BOTTOM LINE 505Chapter 1: Understanding the Basics 505Chapter 2: Installing an Ubuntu Server 506Chapter 3: Installing and Maintaining Software in Ubuntu 507Chapter 4: Installing a Red Hat Server 509Chapter 5: Installing and Maintaining Software in Red Hat 510Chapter 6: Working with the Shell 512Chapter 7: Exploring Linux File Management 513Chapter 8: Working with Text Files 515Chapter 9: Managing Hardware 516Chapter 10: Booting Linux 517Chapter 11: Working with Storage Devices 519Chapter 12: Configuring Network Settings 520Chapter 13: Managing Users and Groups 521Chapter 14: Working with Processes and Jobs 523Chapter 15: Managing Log Files 524Chapter 16: Managing Printers 526Chapter 17: Exploring Ubuntu Security 527Chapter 18: Exploring Red Hat Security 528Chapter 19: Writing Scripts 529Chapter 20: Managing Web Servers 532Chapter 21: Managing Database Servers 533Chapter 22: Exploring the Virtualization Environment 535Index 537

Regulärer Preis: 32,99 €
Produktbild für Growth Hacking für Dummies

Growth Hacking für Dummies

Growth Hacking hilft Ihnen, schnell erfolgreich zu sein und dabei wenig Geld zu investieren. Dieses Buch hilft Ihnen, schnell erfolgreich im Growth Hacking zu sein.Wer will das nicht: Marketing betreiben und dafür weniger Geld ausgeben? Growth Hacking wurde genau dafür entwickelt, es sollte Startups helfen, ohne viel Geld zu wachsen. Dieses Buch gibt Ihnen einen Einblick in die Grundlagen des Growth-Hacking-Prozesses. Der Autor erläutert außerdem, wie Sie Kommunikationslinien mit Ihren Kunden eröffnen, wie Sie Testmodelle etablieren und wie Sie sich die nötigen Werkzeuge aneignen, um erfolgreich kostengünstiges Marketing zu betreiben. Zudem geht er noch darauf ein, wie Sie sich das richtige Team zusammenstellen und eine passende Firmenkultur einführen. So ist dieses Buch der verständliche und übersichtliche Start zu Ihrem schnellen Erfolg.Anuj Adhiya ist Growth Hacker, war Director of Engagement and Analytics bei GrowthHacker, einer Organisation, die vom Growth-Hacker-Erfinder Sean Ellis gegründet wurde.

Regulärer Preis: 18,99 €
Produktbild für AI for Healthcare with Keras and Tensorflow 2.0

AI for Healthcare with Keras and Tensorflow 2.0

Learn how AI impacts the healthcare ecosystem through real-life case studies with TensorFlow 2.0 and other machine learning (ML) libraries.This book begins by explaining the dynamics of the healthcare market, including the role of stakeholders such as healthcare professionals, patients, and payers. Then it moves into the case studies. The case studies start with EHR data and how you can account for sub-populations using a multi-task setup when you are working on any downstream task. You also will try to predict ICD-9 codes using the same data. You will study transformer models. And you will be exposed to the challenges of applying modern ML techniques to highly sensitive data in healthcare using federated learning. You will look at semi-supervised approaches that are used in a low training data setting, a case very often observed in specialized domains such as healthcare. You will be introduced to applications of advanced topics such as the graph convolutional network and how you can develop and optimize image analysis pipelines when using 2D and 3D medical images. The concluding section shows you how to build and design a closed-domain Q&A system with paraphrasing, re-ranking, and strong QnA setup. And, lastly, after discussing how web and server technologies have come to make scaling and deploying easy, an ML app is deployed for the world to see with Docker using Flask.By the end of this book, you will have a clear understanding of how the healthcare system works and how to apply ML and deep learning tools and techniques to the healthcare industry.WHAT YOU WILL LEARN* Get complete, clear, and comprehensive coverage of algorithms and techniques related to case studies * Look at different problem areas within the healthcare industry and solve them in a code-first approach* Explore and understand advanced topics such as multi-task learning, transformers, and graph convolutional networks* Understand the industry and learn MLWHO THIS BOOK IS FORData scientists and software developers interested in machine learning and its application in the healthcare industryANSHIK has a deep passion for building and shipping data science solutions that create great business value. He is currently working as a senior data scientist at ZS Associates and is a key member on the team developing core unstructured data science capabilities and products. He has worked across industries such as pharma, finance, and retail, with a focus on advanced analytics. Besides his day-to-day activities, which involve researching and developing AI solutions for client impact, he works with startups as a data science strategy consultant. Anshik holds a bachelor’s degree from Birla Institute of Technology & Science, Pilani. He is a regular speaker at AI and machine learning conferences. He enjoys trekking and cycling.Chapter 1: Healthcare Market: A PrimerChapter Goal: Know how sub-markets like pharmaceutical, medicaltechnology, and hospital come together to form the healthcare ecosystem. Learn on how digital and mobile are shaping and reforming traditional health. With technology available and permissible to large masses via internet things like telehealth have become a norm. Also, what kind ofproblems are being solved at industry level and at various startups.Sub Topics:Healthcare Marketplace Overview● Map of how different stakeholder comes together to form the system● Medicare Overview● Paying Doctors● Healthcare CostsEmerging Trends● Changing role of consumer in healthcare● Future of Healthcare Payments● Quality of Healthcare DeliveryIndustry 4.0 and HealthcareChapter 2: Multi Task Deep Learning To Predict HospitalRe-admissionsChapter Goal: A real world case study showing how re-admissions whichcosts billions of dollars to the US healthcare system can be addressed. We will be using EHR data to cluster patients on their baseline characteristics and clinical factors and correlate with their readmission rates.Sub Topics:● Introduction to EHR data.● Exploring MIMIC III datasets● Establishing a baseline model to assess re-admission rates usingensemble of classification models with handling class imbalance.● Using auto-encoder to create a distributed representation of features.● Clustering patients● Analyzing readmission rate based on clusters.● Comparative analysis between baseline and deep learning basedmodel.Chapter 3: Predict Medical Billing Codes from Clinical NotesChapter Goal: Clinical notes contain information on prescribed proceduresand diagnosis from doctors and are used for accurate billings in the current medical system, but these are not readily available. One has to extract them manually for the process to be carried out seamlessly. We are attempting to solve this problem using a classification model using the MIMIC III datasets introduced above.Sub Topics:● Introduction to case study data.● Learn about transfer learning in NLP by fine-tuning the BERT modelfor your task.● Using various attention based sequence modelling architectures likeLSTM and transformers to predict medical billing codes.Chapter 4: Extracting Structured Data from Receipt ImagesChapter Goal: Just like any other sales job, the sales rep of a Pharma firm isalways on the field. While being on the field lots of receipts get generated for reimbursement on food and travel. It becomes difficult to keep track of bills which don’t follow company guidelines. In this case study we will explore how to extract information from receipt images and structure various information from it.Sub Topics:● Introduction to information extraction through Images.● Exploring receipt data● Using graph CNN to extract information○ What is a graph convolutional architecture○ How is it different from traditional convolutional layers○ Applications○ Hands on example to demonstrate training of a graph CNN● Exploring recent trends in extracting information from templatedocuments.Chapter 5: Handle Availability of Low-Training Data in HealthcareChapter Goal: Availability of training data has limited the use of advancedmodels and general interest for problems in the healthcaredomain. Get introduced to weak supervision techniques that canbe used to handle low training data. Also learn about upcominglibraries (like Snorkel and Astron) and research in this field.Sub Topics:● Explore weak supervision learning using Snorkel and Astron● Learn to create label functions● Hands on experimentation with a simple classification problem onapplication of concepts from weak supervised learningChapter 6: Federated Learning and HealthcareChapter Goal: Federated learning enables distributed machine learning inwhich machine learning models train on decentralized data.This is deemed as the future of ML models as sharing patientlevel data becomes more difficult for organizations due toprivacy and security concerns.Sub Topics:● Introduction to federated learning and what it means for healthcare● Hands on example on how to use the concepts of federated learningin one of your project○ Load and prepare an example decentralized datasets○ Design a federated learning architecture to predict diagnosisof inflammation in bladder.● Learn about TensorFlow federatedChapter 7: Medical ImagingChapter Goal: Complete end to end analysis of how to develop a deep -learning based medical diagnosis system using images. Learn about different kinds of image scans available like (cellular images, X-Ray scans etc.) . Also learn about the challenges such as accessibility of data, difference in image quality and how to address it, explainability etc. in disease detection via images.Sub Topics:● What is medical imaging● Different kinds of image analysis● Deep learning based methods for image analysis● Understanding how to deal with 2-D and 3-D images● Solve image classification and segmentation problem● Understand challenges like accessibility of data, image quality issues,explainability etc.Chapter 8: Machine has all the Answers, Except What’s the Purpose of Life.Chapter Goal: Introduction to concepts of a Question & Answering system.Comparative analysis of different Question and Answering architectures. Hands-on-Example of building your own Q&A system to ask and query questions over published medical papers on pubmed.Sub Topics:● Review and understand various Question & Answering Techniques.● Comparative analysis of different Question and Answeringarchitectures● What is BERT architecture ?● Using Bio-Bert architecture to train your own Q&A SystemChapter 9: You Need an Audience NowChapter Goal: Learned something from the book, excited to show it to theworld. In this chapter we are going to do exactly that, we are going to learn how to bring your models live and let the world interact with it. We will be building a Django app taking the Question Answering case study in point and also learning the basics of using docker for deployment.Sub Topics:● Understand technologies like Streamlit, Flask and Django that can helpyou deploy your model depending upon the use case.● What is docker and why should we dockerize our solutions.● Building a production grade docker application.● Django basics● Using services like Heroku or Github SPAs to deploy your DjangoApp and bring it live.

Regulärer Preis: 62,99 €
Produktbild für The Definitive Guide to Conversational AI with Dialogflow and Google Cloud

The Definitive Guide to Conversational AI with Dialogflow and Google Cloud

Build enterprise chatbots for web, social media, voice assistants, IoT, and telephony contact centers with Google's Dialogflow conversational AI technology. This book will explain how to get started with conversational AI using Google and how enterprise users can use Dialogflow as part of Google Cloud. It will cover the core concepts such as Dialogflow essentials, deploying chatbots on web and social media channels, and building voice agents including advanced tips and tricks such as intents, entities, and working with context.The Definitive Guide to Conversational AI with Dialogflow and Google Cloud also explains how to build multilingual chatbots, orchestrate sub chatbots into a bigger conversational platform, use virtual agent analytics with popular tools, such as BigQuery or Chatbase, and build voice bots. It concludes with coverage of more advanced use cases, such as building fulfillment functionality, building your own integrations, securing your chatbots, and building your own voice platform with the Dialogflow SDK and other Google Cloud machine learning APIs.After reading this book, you will understand how to build cross-channel enterprise bots with popular Google tools such as Dialogflow, Google Cloud AI, Cloud Run, Cloud Functions, and Chatbase.WHAT YOU WILL LEARN* Discover Dialogflow, Dialogflow Essentials, Dialogflow CX, and how machine learning is used* Create Dialogflow projects for individuals and enterprise usage* Work with Dialogflow essential concepts such as intents, entities, custom entities, system entities, composites, and how to track context* Build bots quickly using prebuilt agents, small talk modules, and FAQ knowledge bases* Use Dialogflow for an out-of-the-box agent review* Deploy text conversational UIs for web and social media channels* Build voice agents for voice assistants, phone gateways, and contact centers* Create multilingual chatbots* Orchestrate many sub-chatbots to build a bigger conversational platform* Use chatbot analytics and test the quality of your Dialogflow agent* See the new Dialogflow CX concepts, how Dialogflow CX fits in, and what’s different in Dialogflow CXWHO THIS BOOK IS FOREveryone interested in building chatbots for web, social media, voice assistants, or contact centers using Google’s conversational AI/cloud technology.Lee Boonstra is a senior developer advocate at Google working with conversational AI. In this role she focuses on Dialogflow, Contact Center AI and speech technology. Lee is based in Amsterdam, the Netherlands, where she has been working with different technologies over the past 15 years, ranging from web/mobile, Ext JS, Sencha Touch, and Node.js, to conversational AI, Dialogflow, Actions on Google and Contact Centers.Over the years she has helped many brands and enterprises to build and deploy conversational AI solutions (chatbots and voice assistants) at enterprise scale. She’s worn different hats from engineer to technical trainer to sales engineer to developer advocate. Prior to Google, Lee worked at Sencha Inc.You can find Lee on online via the Twitter handle: @ladysign.CHAPTER 1: INTRODUCTION TO CONVERSATIONAL AIWhy do some chatbots fail?Machine learning simply explainedChatbots and machine learningMachine learning and GoogleAbout DialogflowDialogflow essentials & Dialogflow CXAbout Google CloudAbout Contact Center AIOther Google conversational AI productsActions on Google / Action BuilderAdLingoChatbaseDuplexMeenaSummaryReferenceCHAPTER 2: GETTING STARTED WITH DIALOGFLOW ESSENTIALSCreating a Dialogflow agentCreating Dialogflow agents for enterprisesConfiguring your Dialogflow projectSummaryReferenceCHAPTER 3: DIALOGFLOW ESSENTIALS CONCEPTSSetting up intentsCreating custom entitiesCreating intents with entities in training phrasesKeeping contextTesting in the simulatorSummaryReferenceCHAPTER 4: BUILDING CHATBOTS WITH TEMPLATESCreating prebuilt agentsEnabling small talk modulesCreating a FAQ knowledge baseSummaryReferenceCHAPTER 5: REVIEWING YOUR AGENTValidating your Dialogflow agentSummaryReferenceCHAPTER 6: DEPLOYING YOUR CHATBOT TO WEB & SOCIAL MEDIA CHANNELSIntegrating your agent with Google ChatIntegrating your agent with a web demoIntegrating your agent with a Dialogflow MessengerSummaryReferenceCHAPTER 7: BUILDING VOICE AGENTSBuilding a voice AI for a virtual assistant like the Google AssistantBuilding a callbot with a phone gatewayBuilding bots for contact centers with Contact Center AIImproving speech qualityFine tuning voice bots with SSMLSummaryReferenceCHAPTER 8: CREATING A MULTILINGUAL CHATBOTBuilding multilingual chatbotsSummaryReferenceCHAPTER 9: ORCHESTRATE MULTIPLE SUB CHATBOTS FROM ONE CHAT INTERFACECreating a mega agentSummaryReferenceCHAPTER 10: CREATING FULFILLMENT WEBHOOKSBuilding a fulfillment with the built-in editorBuilding webhook fulfillmentsBuilding multilingual webhook fulfillmentsUsing local webhooksSecuring webhooksSummaryReferenceCHAPTER 11: CREATING A CUSTOM INTEGRATION WITH THE DIALOGFLOW SDKImplementing a custom chatbot in your website front-endCreating rich responses in your chatbot integrationUsing markdown syntax & conditional templates in in your Dialogflow responsesSummaryReferenceCHAPTER 12: IMPLEMENTING A DIALOGFLOW VOICE AGENT IN YOUR WEBSITE OR APP USING THE SDKBuilding a client-side web application which streams audio from a browser microphone to a serverBuilding a web server which receives a browser microphone stream to detect intentsRetrieving audio results from Dialogflow and play it in your browserSummaryReferenceCHAPTER 13: COLLECTING & MONITORING ADVANCED AGENT INSIGHTSCapturing conversation related metrics to store in BigQuerySession IdDate / time stampSentiment scoreLanguage & keywordPlatformIntent detectionBuilding a platform for capturing conversation related metrics and redact sensitive informationDetecting user sentimentMonitoring chat session & funnel metrics with Dialogflow , Chatbase or Actions on GoogleTotal UsageThe number of requests the intent was matched to and the percentage of all users that matched the intent.Completion Rate & Drop off Rate / Drop off PlaceUser retentionEndpoint healthDiscoveryDialogflow Built-in AnalyticsMonitoring metrics with ChatbaseAnalytics on Actions on GoogleCapturing chatbot model health metrics for testing the underlying NLU model qualityTrue positive - A correctly matched intentFalse positive - A misunderstood requestTrue negative - An unsupported requestFalse negative - A missed requestAccuracyPrecisionRecall & falloutF1 scoreConfusion matrixROC curveImprove the Dialogflow NLU model with built-in trainingSummaryReference

Regulärer Preis: 62,99 €
Produktbild für Systematische Entwicklung von Dienstleistungsinnovationen

Systematische Entwicklung von Dienstleistungsinnovationen

Dieser Sammelband zum Projekt „Augmented Reality in flexiblen Dienstleistungsprozessen" (ARinFLEX) zeigt Anwendungsfälle für Dienstleistungsinnovationen in Pflege und industrieller Wartung auf. Die Autoren entwickeln Ideen, Konzepte und Prototypen für innovative Dienstleistungen mittels Augmented Reality und evaluieren diese in verschiedenen Kontexten. Der Sammelband bietet Grundlagen, Kontext und methodische Unterstützung zur Digitalisierung von Dienstleistungen in Pflege und industrieller Wartung.

Regulärer Preis: 62,99 €
Produktbild für Cloud Native Security

Cloud Native Security

EXPLORE THE LATEST AND MOST COMPREHENSIVE GUIDE TO SECURING YOUR CLOUD NATIVE TECHNOLOGY STACKCloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates.The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. You'll also learn about:* Installing and configuring multiple types of DevSecOps tooling in CI/CD pipelines* Building a forensic logging system that can provide exceptional levels of detail, suited to busy containerized estates* Securing the most popular container orchestrator, Kubernetes* Hardening cloud platforms and automating security enforcement in the cloud using sophisticated policiesPerfect for DevOps engineers, platform engineers, security professionals and students, Cloud Native Security will earn a place in the libraries of all professionals who wish to improve their understanding of modern security challenges.CHRIS BINNIE is a Technical Consultant who has worked for almost 25 years with critical Linux systems in banking and government, both on-premise and in the cloud. He has written two Linux books, has written for Linux and ADMIN magazines and has five years of experience in DevOps security consultancy roles.RORY MCCUNE has over 20 years of experience in the Information and IT security arenas. His professional focus is on container, cloud, and application security and he is an author of the CIS Benchmarks for Docker and Kubernetes and has authored and delivered container security training at conferences around the world.Introduction xixPART I CONTAINER AND ORCHESTRATOR SECURITY 1CHAPTER 1 WHAT IS A CONTAINER? 3Common Misconceptions 4Container Components 6Kernel Capabilities 7Other Containers 13Summary 14CHAPTER 2 ROOTLESS RUNTIMES 17Docker Rootless Mode 18Installing Rootless Mode 20Running Rootless Podman 25Setting Up Podman 26Summary 31CHAPTER 3 CONTAINER RUNTIME PROTECTION 33Running Falco 34Configuring Rules 38Changing Rules 39Macros 41Lists 41Getting Your Priorities Right 41Tagging Rulesets 42Outputting Alerts 42Summary 43CHAPTER 4 FORENSIC LOGGING 45Things to Consider 46Salient Files 47Breaking the Rules 49Key Commands 52The Rules 52Parsing Rules 54Monitoring 58Ordering and Performance 62Summary 63CHAPTER 5 KUBERNETES VULNERABILITIES 65Mini Kubernetes 66Options for Using kube-hunter 68Deployment Methods 68Scanning Approaches 69Hunting Modes 69Container Deployment 70Inside Cluster Tests 71Minikube vs. kube-hunter 74Getting a List of Tests 76Summary 77CHAPTER 6 CONTAINER IMAGE CVES 79Understanding CVEs 80Trivy 82Getting Started 83Exploring Anchore 88Clair 96Secure Registries 97Summary 101PART II DEVSECOPS TOOLING 103CHAPTER 7 BASELINE SCANNING (OR, ZAP YOUR APPS) 105Where to Find ZAP 106Baseline Scanning 107Scanning Nmap’s Host 113Adding Regular Expressions 114Summary 116CHAPTER 8 CODIFYING SECURITY 117Security Tooling 117Installation 118Simple Tests 122Example Attack Files 124Summary 127CHAPTER 9 KUBERNETES COMPLIANCE 129Mini Kubernetes 130Using kube-bench 133Troubleshooting 138Automation 139Summary 140CHAPTER 10 SECURING YOUR GIT REPOSITORIES 141Things to Consider 142Installing and Running Gitleaks 144Installing and Running GitRob 149Summary 151CHAPTER 11 AUTOMATED HOST SECURITY 153Machine Images 155Idempotency 156Secure Shell Example 158Kernel Changes 162Summary 163CHAPTER 12 SERVER SCANNING WITH NIKTO 165Things to Consider 165Installation 166Scanning a Second Host 170Running Options 171Command-Line Options 172Evasion Techniques 172The Main Nikto Configuration File 175Summary 176PART III CLOUD SECURITY 177CHAPTER 13 MONITORING CLOUD OPERATIONS 179Host Dashboarding with NetData 180Installing Netdata 180Host Installation 180Container Installation 183Collectors 186Uninstalling Host Packages 186Cloud Platform Interrogation with Komiser 186Installation Options 190Summary 191CHAPTER 14 CLOUD GUARDIANSHIP 193Installing Cloud Custodian 193Wrapper Installation 194Python Installation 195EC2 Interaction 196More Complex Policies 201IAM Policies 202S3 Data at Rest 202Generating Alerts 203Summary 205CHAPTER 15 CLOUD AUDITING 207Runtime, Host, and Cloud Testing with Lunar 207Installing to a Bash Default Shell 209Execution 209Cloud Auditing Against Benchmarks 213AWS Auditing with Cloud Reports 215Generating Reports 217EC2 Auditing 219CIS Benchmarks and AWS Auditing with Prowler 220Summary 223CHAPTER 16 AWS CLOUD STORAGE 225Buckets 226Native Security Settings 229Automated S3 Attacks 231Storage Hunting 234Summary 236PART IV ADVANCED KUBERNETES AND RUNTIME SECURITY 239CHAPTER 17 KUBERNETES EXTERNAL ATTACKS 241The Kubernetes Network Footprint 242Attacking the API Server 243API Server Information Discovery 243Avoiding API Server Information Disclosure 244Exploiting Misconfigured API Servers 245Preventing Unauthenticated Access to the API Server 246Attacking etcd 246etcd Information Discovery 246Exploiting Misconfigured etcd Servers 246Preventing Unauthorized etcd Access 247Attacking the Kubelet 248Kubelet Information Discovery 248Exploiting Misconfigured Kubelets 249Preventing Unauthenticated Kubelet Access 250Summary 250CHAPTER 18 KUBERNETES AUTHORIZATION WITH RBAC 251Kubernetes Authorization Mechanisms 251RBAC Overview 252RBAC Gotchas 253Avoid the cluster-admin Role 253Built-In Users and Groups Can Be Dangerous 254Read-Only Can Be Dangerous 254Create Pod is Dangerous 256Kubernetes Rights Can Be Transient 257Other Dangerous Objects 258Auditing RBAC 258Using kubectl 258Additional Tooling 259Rakkess 259kubectl-who-can 261Rback 261Summary 262CHAPTER 19 NETWORK HARDENING 265Container Network Overview 265Node IP Addresses 266Pod IP Addresses 266Service IP Addresses 267Restricting Traffic in Kubernetes Clusters 267Setting Up a Cluster with Network Policies 268Getting Started 268Allowing Access 271Egress Restrictions 273Network Policy Restrictions 274CNI Network Policy Extensions 275Cilium 275Calico 276Summary 278CHAPTER 20 WORKLOAD HARDENING 279Using Security Context in Manifests 279General Approach 280allowPrivilegeEscalation 280Capabilities 281privileged 283readOnlyRootFilesystem 283seccompProfile 283Mandatory Workload Security 285Pod Security Standards 285PodSecurityPolicy 286Setting Up PSPs 286Setting Up PSPs 288PSPs and RBAC 289PSP Alternatives 291Open Policy Agent 292Installation 292Enforcement Actions 295Kyverno 295Installation 296Operation 296Summary 298Index 299

Regulärer Preis: 25,99 €
Produktbild für Basics Interactive Design: User Experience Design

Basics Interactive Design: User Experience Design

By putting people at the centre of interactive design, user experience (UX) techniques are now right at the heart of digital media design and development. As a designer, you need to create work that will impact positively on everyone who is exposed to it. Whether it's passive and immutable or interactive and dynamic, the success of your design will depend largely on how well the user experience is constructed.User Experience Design shows how researching and understanding users' expectations and motivations can help you develop effective, targeted designs. The authors explore the use of scenarios, personas and prototyping in idea development, and will help you get the most out of the latest tools and techniques to produce interactive designs that users will love.With practical projects to get you started, and stunning examples from some of today's most innovative studios, this is an essential introduction to modern UXD.

Regulärer Preis: 108,00 €
Produktbild für Clean C++20

Clean C++20

Write maintainable, extensible, and durable software with modern C++. This book, updated for the recently released C++20 standard, is a must for every developer, software architect, or team leader who is interested in well-crafted C++ code, and thus also wants to save development costs. If you want to teach yourself about writing better C++ code, Clean C++20 is exactly what you need. It is written for C++ developers of all skill levels and shows by example how to write understandable, flexible, maintainable, and efficient C++ code. Even if you are a seasoned C++ developer, there are nuggets and data points in this book that you will find useful in your work.If you don't take care with your codebase, you can produce a large, messy, and unmaintainable beast in any programming language. However, C++ projects in particular are prone to get messy and tend to slip into a maintenance nightmare. There is lots of C++ code out there that looks as if it was written in the 1980s, completely ignoring principles and practices of well-written and modern C++.It seems that C++ developers have been forgotten by those who preach Software Craftsmanship and Clean Code principles. The web is full of C++ code examples that may be very fast and highly optimized, but whose developers have completely ignored elementary principles of good design and well-written code. This book will explain how to avoid this and how to get the most out of your C++ code. You'll find your coding becomes more efficient and, importantly, more fun.WHAT YOU WILL LEARN* Gain sound principles and rules for clean coding in C++* Carry out test-driven development (TDD)* Better modularize your C++ code base* Discover and apply C++ design patterns and idioms* Write C++ code in both object-oriented and functional programming stylesWHO THIS BOOK IS FORAny C++ developer or software engineer with an interest in producing better code.STEPHAN ROTH is a coach, consultant, and trainer for systems and software engineering with German consultancy company oose Innovative Informatik eG located in Hamburg. Before he joined oose, he worked for many years as a software developer, software architect, and systems engineer in the field of radio reconnaissance and communication intelligence systems. He has developed sophisticated applications, especially in a high-performance system environment, and graphical user interfaces using C++ and other programming languages. Stephan is an active supporter of the Software Craftsmanship movement and is concerned with principles and practices of Clean Code Development (CCD).CH01 - IntroductionCH02 - Build a Safety NetCH03 - Be PrincipledCH04 - Basics of Clean C++CH05 - Advanced concepts of modern C++CH06 - Object OrientationCH07 - Functional ProgrammingCH08 - Test Driven DevelopmentCH09 - Design Patterns and IdiomsAppendix A - Small UML GuideBibliography

Regulärer Preis: 46,99 €
Produktbild für E-Auto einfach erklärt

E-Auto einfach erklärt

Alles, was Sie über Elektroautos wissen müssen: von A wie Akku bis Z wie zu Hause laden.Überlegen Sie, ein Elektroauto zu kaufen oder suchen Sie als Neubesitzer/in einen schnellen Einstieg ins Thema? Timo Kauffmann erklärt in dem Buch »E-Auto einfach erklärt« genau, wie das mit dem Fahren und Laden eines Elektroautos funktioniert – von One-Pedal-Driving und Rekuperation über Ladekarten und -apps bis zur Installation einer heimischen Wallbox für Ihr E-Auto. Leicht verständliche Erläuterungen zu Akkus, Motoren und Kilowattstunden helfen Ihnen, die zugrundeliegende Technologie besser zu verstehen und Ihr Elektroauto effizienter zu nutzen. So machen Sie sich mit Ihrem neuen Auto schneller vertraut und können diese leise, saubere und komfortable Form des Fahrens wirklich genießen.Aus dem Inhalt:Entscheidungshilfe: Welches Elektroauto passt zu mir?Worauf Sie bei gebrauchten Elektroautos achten müssenKein Haus- oder Wohnungseigentümer und trotzdem zuhause laden?Faktencheck: 10 Antworten auf typische FragenEffizienz & Fahrspaß – keine Gegensätze!So funktionieren Elektromotoren und AkkusÜbersicht zu Stecker- und KabeltypenSo nutzen Sie öffentliche LadestationenWallboxen für daheim und unterwegsUmweltbonus und KfW-FörderungÜbersicht Ladekarten und Lade-AppsReiseplanung und LadestrategienTipps zur ReichweitenoptimierungPflege, Versicherung und PannenhilfeInhalt (PDF-Link)

Regulärer Preis: 24,90 €
Produktbild für Running Microsoft Workloads on AWS

Running Microsoft Workloads on AWS

Did you know that Amazon Web Services runs nearly double the amount of Microsoft Workloads in the cloud than any other provider?RUNNING MICROSOFT WORKLOADS IN AWS is your single-source solution for learning the best practice skills and guidance that AWS consultants offer their customers in the field. Over 70% of enterprise workloads are based on Microsoft technologies and AWS has been running these technologies in the AWS Cloud for more than 12 years—far longer than Microsoft’s own Azure cloud platform.This book introduces AWS foundations and compares them to traditional Microsoft architectures, showing you how to design your AWS Cloud platform to run your current Microsoft solutions. It covers the crucial area of identity and access control, showing how to implement Active Directory inside the AWS platform and the most secure ways of enabling Single Sign On from your own data centers and from Microsoft AzureAD.The book goes in-depth and shows how developers across the globe are using their existing .NET skills to develop directly on top of AWS, using current AWS development services such as AWS Code Pipeline, AWS Code Build, and AWS Code Deploy to create the next generation of cloud-native applications using the most popular cloud serverless service—AWS Lambda.WHAT YOU WILL LEARN* Be familiar with the basic building blocks of AWS and how the terminology differs from your own data center and Microsoft Azure* Understand Amazon Machine Images (AMI) strategies and solutions to best manage the trade-off between speed and manageability* Run one of the most popular Microsoft products: SQL Server on AWS* Be aware of the different database architecture designs for using Amazon RDS and Amazon EC2* Read an overview of Serverless Development in the AWS cloud from a Microsoft .NET perspective* Know migration strategies for moving your Microsoft Workloads to the AWS CloudWHO THIS BOOK IS FORCovers high-level concepts and solutions for CTOs and CCTOs; provides a solution for architects; and dives deep into the topic for administrators and DevOps engineersRyan Pothecary is Senior Specialist Solution Architect for a Cloud-based services company, which he joined four years ago. He has worked on the AWS platform for the last eight years as part of a near 30-year career in IT. Over the last four years he’s worked directly with customers and partners who are moving to the AWS Cloud. He specializes in helping customers move Microsoft Workloads to AWS and works with customers throughout their entire cloud journey. He is also a member of a Community of engineers, architects, and consultants who help customers run Microsoft Workloads on AWS in every part of the world. Outside of work he is determined to learn how to play the guitar his wife bought him, even though he has small stubby fingers.

Regulärer Preis: 66,99 €
Produktbild für Multi-Platform Graphics Programming with Kivy

Multi-Platform Graphics Programming with Kivy

Modern science requires computer graphics models to provide realistic visual renderings. Learning the appropriate programming tools for 2D and 3D modeling doesn’t have to be so difficult. This book reviews the best programming tools to achieve this and explains how to apply them to mobile platforms like Android.Multi-Platform Graphics Programming with Kivy provides a straightforward introductory approach for designing 2D, 3D, and stereoscopic applications, using analytical equations from vector algebra. Throughout the book you’ll look closely at this approach and develop scenes in Kivy, taking advantage of powerful mathematical functions for arrays by NumPy for Python.Unbuntu is used to develop the programs, which allows you to easily convert to Android platform. Each chapter contains step-by-step descriptions on each subject and provides complete program listings.WHAT YOU’LL LEARN* Work with Kivy, a modern, powerful multi-platform graphics system* Convert and run programs on Android devices* Program, fill faces, and rotate 2D and 3D polygons* Apply the concepts of 2D and 3D applications* Develop stereoscopic scenes* Review a straightforward introduction to 2D, 3D, and stereoscopic graphics applications* Use simple analytical equations from vector algebraWHO THIS BOOK IS FORThe primary audience is students and researchers in graphics programming with experience in analytical equations.Moisés Cywiak is a researcher in physical optical sciences with over 20 years of teaching experience in physics, mathematics, electronic engineering, and programming in C, C++, and python, in Centro de Investigaciones en Óptica A.C.David Cywiak received his Ph.D. degree in physics in 2014 from Universidad de Guanajuato. From 2012 to 2013 he collaborated as a guest researcher at the Dalton Cardiovascular Research Center, University of Missouri-Columbia, in the development of an optical-photoacoustic system intended for the detection of photoacoustic signals generated by cancerous cells. Since 2014 he has been working as a metrologist in the Thermometry Department at Centro Nacional de Metrologia, México. His research includes photoacoustics, optical engineering and radiation thermometry. He has over 7 years of experience teaching physics, mathematics and programming in C for undergraduate students. He also has over 5 years of experience teaching Temperature measurement techniques and calibration of instruments in the thermometry area for industry professionals.Chapter 1: Preliminaries. Software installation1.1. installing pip3 and IDLE1.2. Installing kivy1.3. Installing buildozerChapter 2: Polygon rotation in two dimensions2.1. Rotation equations2.2. Mapping equations to the screenChapter 3: Two dimensional polygon programming3.1. Polygon structure3.2. Drawing the edges of the polygon3.3. Filling the polygon with lines3.4. Rotating the polygon3.5. The kivy platform3.6. main.py listing3.7. File.kv lisitng3.8. Using buildozerChapter 4: Three-dimensional projections and rotations4.1. Projection of a three-dimensional point into a plane4.2. Rotation of a point in a planeChapter 5: Programming three-dimensional polygons5.1. Polygon structure5.2. Basic functions5.3. main.py listing5.4. File.kvChapter 6: Stereoscopic 3D Programming6.1. Basics of a stereoscopic view6.2. Programming and ORing the images6.3. Projections6.4. Polygon structure6.5. DrawAxes function6.6. Points of projection6.7. main.py listing6.8. File.kvChapter 7: 3D plots programming7.1. Program basic operations7.2. Function overview7.3. Generating the axes, the mesh and the function7.4. Plotting the function in the screen7.5. Rotating the plot7.6. main.py listing7.7. File.kv listingChapter 8: Stereoscopic 3D plots8.1. Creating the function, coordinates and mesh8.2. Creating two images for stereoscopic effects8.3. Drawing the plot8.4. main.py listing8.5. File.kv listing8.6. Surfaces with saddle pointsChapter 9: 3D parametric plots9.1. Parametric equations9.2. Plotting9.3. main.py9.4. File.kvChapter 10: Stereoscopic 3D parametric plots10.1. Generating the function10.2. Creating PIL images for the stereoscopic effect10.3. Plotting the function10.4. main.py10.5. File.kvChapter 11: Sympy11.1. Analytical expressions and symbols11.2. Declaring functions with analytical expressions11.3. Solving equations11.4. Solving simultaneous equations11.5. Differentiation11.6. IntegrationChapter 12: Plotting functions in spherical coordinates12.1. Spherical coordinates12.2. Spherical differential equation example12.3. The associated Legendre polynomials12.4. Plotting 3D spherical coordinates12.5. main.py listing12.6. File.kv listing12.7. Incorporating sympy into the Android projectChapter 13. Stereoscopic plots of spherical functions13.1. Creating the stereoscopic scenes13.2. main.py listing13.3. File.kv listingChapter 14. Stereoscopic simple numerical method for the gravitational N-body problem14.1. The gravitational N-body problem14.2. Motion equations14.3. Numerical approach of the dynamic equations14.4. Capturing numerical data14.5. Five planets example14.6. main.py listing14.7. File.kvChapter 15. Stereoscopic cylindrical coordinates plotting. Aberrations of optical lenses15.1. Ideal lens focusing. The Fresnel diffraction integral15.2. Departure from the ideal lens15.3. The wave aberration function in cylindrical coordinates15.4. Stereoscopic plot of the wave aberration terms in cylindrical coordinates15.5. main.py listing15.6. File.kv listingChapter 16. Stereoscopic plotting of three-dimensional conics16.1. Analytical approach16.2. Stereoscopic ellipsoid plotting16.3. main.py (Ellipsoid)16.4. File.kv16.5. HyperboloidChapter 1: Preliminaries. Software installation1.1. installing pip3 and IDLE1.2. Installing kivy1.3. Installing buildozerChapter 2: Polygon rotation in two dimensions2.1. Rotation equations2.2. Mapping equations to the screenChapter 3: Two dimensional polygon programming3.1. Polygon structure3.2. Drawing the edges of the polygon3.3. Filling the polygon with lines3.4. Rotating the polygon3.5. The kivy platform3.6. main.py listing3.7. File.kv lisitng3.8. Using buildozerChapter 4: Three-dimensional projections and rotations4.1. Projection of a three-dimensional point into a plane4.2. Rotation of a point in a planeChapter 5: Programming three-dimensional polygons5.1. Polygon structure5.2. Basic functions5.3. main.py listing5.4. File.kvChapter 6: Stereoscopic 3D Programming6.1. Basics of a stereoscopic view6.2. Programming and ORing the images6.3. Projections6.4. Polygon structure6.5. DrawAxes function6.6. Points of projection6.7. main.py listing6.8. File.kvChapter 7: 3D plots programming7.1. Program basic operations7.2. Function overview7.3. Generating the axes, the mesh and the function7.4. Plotting the function in the screen7.5. Rotating the plot7.6. main.py listing7.7. File.kv listingChapter 8: Stereoscopic 3D plots8.1. Creating the function, coordinates and mesh8.2. Creating two images for stereoscopic effects8.3. Drawing the plot8.4. main.py listing8.5. File.kv listing8.6. Surfaces with saddle pointsChapter 9: 3D parametric plots9.1. Parametric equations9.2. Plotting9.3. main.py9.4. File.kvChapter 10: Stereoscopic 3D parametric plots10.1. Generating the function10.2. Creating PIL images for the stereoscopic effect10.3. Plotting the function10.4. main.py10.5. File.kvChapter 11: Sympy11.1. Analytical expressions and symbols11.2. Declaring functions with analytical expressions11.3. Solving equations11.4. Solving simultaneous equations11.5. Differentiation11.6. IntegrationChapter 12: Plotting functions in spherical coordinates12.1. Spherical coordinates12.2. Spherical differential equation example12.3. The associated Legendre polynomials12.4. Plotting 3D spherical coordinates12.5. main.py listing12.6. File.kv listing12.7. Incorporating sympy into the Android projectChapter 13. Stereoscopic plots of spherical functions13.1. Creating the stereoscopic scenes13.2. main.py listing13.3. File.kv listingChapter 14. Stereoscopic simple numerical method for the gravitational N-body problem14.1. The gravitational N-body problem14.2. Motion equations14.3. Numerical approach of the dynamic equations14.4. Capturing numerical data14.5. Five planets example14.6. main.py listing14.7. File.kvChapter 15. Stereoscopic cylindrical coordinates plotting. Aberrations of optical lenses15.1. Ideal lens focusing. The Fresnel diffraction integral15.2. Departure from the ideal lens15.3. The wave aberration function in cylindrical coordinates15.4. Stereoscopic plot of the wave aberration terms in cylindrical coordinates15.5. main.py listing15.6. File.kv listingChapter 16. Stereoscopic plotting of three-dimensional conics16.1. Analytical approach16.2. Stereoscopic ellipsoid plotting16.3. main.py (Ellipsoid)16.4. File.kv16.5. Hyperboloid16.6. main.py (Hyperboloid)Chapter 17. Two-dimensional Fourier transform17.1. One-dimensional Fourier transform17.2. Rectangular and sinc functions17.3. Code for calculating the discrete one-dimensional Fourier transform17.4. Two-dimensional Fourier transform17.5. Discrete two-dimensional Fourier transform17.6. main.py lisitng17.7. File.kv listing17.8. The Fourier transform of the circular function17.9. Analytical formulation for the Fourier transform of the circular functionChapter 18. Stereoscopic two-dimensional Fourier transform18.1. Piloting the functions18.2. main.py listing18.3. File.kv listing16.6. main.py (Hyperboloid)Chapter 17. Two-dimensional Fourier transform17.1. One-dimensional Fourier transform17.2. Rectangular and sinc functions17.3. Code for calculating the discrete one-dimensional Fourier transform17.4. Two-dimensional Fourier transform17.5. Discrete two-dimensional Fourier transform17.6. main.py lisitng17.7. File.kv listing17.8. The Fourier transform of the circular function17.9. Analytical formulation for the Fourier transform of the circular functionChapter 18. Stereoscopic two-dimensional Fourier transform18.1. Piloting the functions18.2. main.py listing18.3. File.kv listing

Regulärer Preis: 56,99 €
Produktbild für UX for XR

UX for XR

Extending traditional digital platforms to the new frontier of extended reality (XR) requires taking into account what best practices, new concepts, and conventions have been established and what learnings can be brought forward from case studies involving industry leaders. By looking at practical examples from the field of handheld AR breakthroughs, virtual reality (VR) success stories and experimental interaction concept of pioneering XR platforms, you'll see how it's possible to map out a framework of user experience (UX) guidelines to close in on opportunities and challenges that lay ahead.This book defines, identifies, and analyzes UX practices for XR environments and reviews the techniques and tools for prototyping and designing XR user interactions. You'll approach the design for experiential state and spatial cognition, using established UX key performance indicators, while taking into account the social dynamics, emotional framework and wider industry context.UX design and strategy for the XR space is a new frontier, so _UX for XR _focuses on case studies and industry research to illustrate the relationship between UX design and the growth of immersive technologies. Practical examples will demonstrate how you should apply UX design principles using designing interactions in XR by identifying the importance of spaces, senses and storyboarding.WHAT YOU'LL LEARN* Explore the challenges and opportunities of designing for XR* See how spatial interaction is revolutionizing human computer interaction* Examine sensory input and interaction beyond the screen* Work with 3D Interaction Design and build a strong 3D UX* Understand VR and augmented reality essentials for emotion-rich user experiences* Apply UX research techniques for the XR spaceWHO THIS BOOK IS FORThis book is primarily for UX designers, consultants, and strategists; XR developers; and media professionalsChapter 1: Introduction.- Chapter 2: The History and Future of XR.- Chapter 3: The Rise of UX and How it Drives XR User Adoption.- Chapter 4: UX and experience design: From screen to 3D space.- Chapter 5: Pioneering platforms and UX learnings.- Chapter 6: Practical approaches: UX and XR in the real world.

Regulärer Preis: 39,99 €
Produktbild für Introduction to Python for Kids

Introduction to Python for Kids

Want to create cool games and apps to impress your friends (or yourself), but not sure where to start? Or, have you tried your hand at programming, but got utterly bored after combing through hundreds of pages of dry text? Then you’ve come to the right place! This book is the perfect blend of education and fun for kids 8 years and above looking to learn the magic of Python, one of the easiest and most powerful programming languages around, all while solving fun puzzles and building your own projects on the way.Yes, there’ll be chapters on the fundamentals of Python, such as variables, numbers, strings, automation with conditions, loops and functions, objects, and files. But, early on in the book you’ll get started with Turtle, a Python package that was custom-made for kids like you. It lets you literally draw and animate on your computer! Every concept will be interspersed with a fun mini project with Turtle, so you’ll never get bored. Once you get the fundamentals down, you’ll dive right into Tkinter and Pygame, more fun Python packages (goodbye theory!) and you’ll learn all about creating apps and games like the ones you see and use every day (bouncing ball, temperature converter, calculator, rock-paper-scissors, and so much more!).There are also four capstone projects at the end of the book that convert everything you’ve learned so far into full-blown apps and games that you can show off to your friends, parents, and even teachers! You’ll be creating a snake game with Turtle, a tic tac toe game with Tkinter, a full-fledged paint app, again with Tkinter, and finally, a classic space shooters game with Pygame (the cherry on top). Every project chapter will be accompanied with the logic behind the game/app and an explanation on how you’ve arrived at the logic. You’ll develop strong problem solving skills that’ll help you create future projects on your own.There are also two chapters dedicated to just creating fun mini projects and puzzles, one of them placed in the middle of the book to give you a welcome break from all the learning. The book ends with an overview on web development with Python and ideas for more fun projects and puzzles you can solve on your own. Become the “most likely to succeed” kid in your grade while having the most fun getting there!WHAT YOU'LL LEARN* Gain a gentle, but thorough introduction into the world of programming and Python* Create programs and solve problems with core Python concepts* Build mini projects and capstone projects (showcase worthy) with Turtle, Tkinter, and Pygame * Develop programming skills while doing the puzzles and activities described in the book WHO THIS BOOK IS FORKids 8 years and above.Aarthi Elumalai is a programmer, educator, entrepreneur, and innovator. She has a Bachelor of Engineering degree in Computer Science from Anna University, Chennai.Since then, she has managed a team of programmers and worked with 100s of clients. She is also launched a dozen web apps, plugins and software that are being used by thousands of customers online.She has over 15 years of experience in programming. She started coding in Basics at the age of 12, but her love for programming took root when she came across C programming at the age of 15.She is the founder of DigiFisk, an E-learning platform that has more than 60,000 students all over the world. Her courses are well-received by the masses, and her unique, project-based approach is a refreshing change to many. She teaches the complex world of programming by solving a ton of practical exercises and puzzles along the way. Her courses and books always come with hands-on training in creating real world projects using the knowledge learned so her students get better equipped for the real world.When she is not working on her next course or book, you'll see her researching her next product idea and refining her existing products. She is currently committed to bringing the sheer power of artificial intelligence to make life easier for small business owners.Chapter 1. Did You Know?.- Chapter 2. Let's Install Python.- Chapter 3. Your First Python Program.- Chapter 4. Python Loves Numbers.- Chapter 5. Let's Play With Our Numbers.- Chapter 6. Draw Cool Stuff with Turtle.- Chapter 7. A Turtle Deep Dive.- Chapter 8. Play with Letters and Words.- Chapter 9. Follow My Command! . Chapter 10. Automate a Little.- Chapter 11. Lots and Lots of Information.- Chapter 12. Fun Mini Projects Galore.- Chapter 13. Automate with Functions.- Chapter 14. Let’s Create Real World Objects.- Chapter 15. Python and Files.- Chapter 16. Create Cool apps with TKinter.-Chapter 17. Tic Tac Toe Game with Tkinter .- Chapter 18. Project: Paint App with Tkinter.- Chapter 19. Project: Snake Game with Turtle .- Chapter 20. Become a Game Developer with PyGame.- Chapter 21. Project: Space Shooters Game with PyGame.- Chapter 22. Web Development with Python.- Chapter 23. More Mini Projects.- Chapter 24. What’s Next?.

Regulärer Preis: 46,99 €
Produktbild für Introduction to Video Game Engine Development

Introduction to Video Game Engine Development

Start your video game development journey by learning how to build a 2D game engine from scratch. Using Java (with NetBeans as your IDE and using Java’s graphics framework) or by following along in C# (with Visual Studio as your IDE and using the MonoGame framework), you’ll cover the design and implementation of a 2D game engine in detail. Each class will be reviewed with demonstration code. You’ll gain experience using the engine by building a game from the ground up.Introduction to Video Game Engine Development reviews the design and implementation of a 2D game engine in three parts. Part 1 covers the low-level API class by class. You’ll see how to abstract lower-level functionality and design a set of classes that interact seamlessly with each other. You’ll learn how to draw objects, play sounds, render text, and more. In Part 2, you’ll review the mid-level API that is responsible for drawing the game, loading resources, and managing user input. Lastly, in Part 3, you’ll build a game from the ground up following a step-by-step process using the 2D game engine you just reviewed.On completing this book, you’ll have a solid foundation in video game engine design and implementation. You’ll also get exposure to building games from scratch, creating the solid foundation you’ll need to work with more advanced game engines, and industry tools, that require learning complex software, APIs, and IDEs.WHAT YOU WILL LEARN* Gain experience with lower-level game engine APIs and abstracting framework functionality* Write application-level APIs: launching the game, loading resources, settings, processing input, and more * Discover cross-platform APIs in the game engine projects written in both Java and C#/MonoGame * Develop games with an SDK-based game engine and simplified tool chain focused on direct control of the game through code* Master creating games by using the game engine to build a game from the ground up with only code and an IDEWHO THIS BOOK IS FORThose of you out there with some programming experience, moderate to advanced, who want to learn how to write video games using modern game engine designs.Victor Brusca is an experienced software developer specializing in building cross-platform applications and APIs. He regards himself as a self-starter with a keen eye for detail, an obsessive protection of systems/data, and a desire to write well-documented, well-encapsulated code. With over 14 years' software development experience, he has been involved in game and game engine projects on J2ME, T-Mobile SideKick, WebOS, Windows Phone, Xbox 360, Android, iOS, and web platforms.Chapter 1: MmgBase API IntroductionChapter 2: Base ClassesChapter 3: Helper ClassesChapter 4: Other ClassesChapter 5: Advanced ClassesChapter 6: Widget ClassesChapter 7: Animation ClassesChapter 8: Game Screen ClassesChapter 9: MmgCore API IntroductionChapter 10: Static Main Entry PointChapter 11: Dynamic SettingsChapter 12: Event HandlersChapter 13: Resource LoadingChapter 14: Game ScreensChapter 15: Game Build IntroductionChapter 16: PongClone Project SetupChapter 17: PongClone Main Menu ScreenChapter 18: PongClone Game ScreenChapter 19: Conclusion

Regulärer Preis: 79,99 €
Produktbild für Betriebswirtschaftliche KI-Anwendungen

Betriebswirtschaftliche KI-Anwendungen

Digitalisierung und Künstliche Intelligenz ermöglichen Unternehmen disruptive Erweiterungen ihrer Geschäftsmodelle. Wer rechtzeitig digitale KI-Geschäftsmodelle einführt, wird seinen Erfolg nachhaltig sichern können. Aber wie und wo können solche Modelle Anwendung finden? Diese Publikation gibt Antworten, wo KI-Geschäftsmodelle greifen können, und wie diese von der ersten Idee bis zur produktiven Anwendung realisiert werden können. KI-Anwendungen in der Betriebswirtschaft.- Grundlagen und Technik.- Digitale Geschäftsmodelle auf Basis Künstlicher Intelligenz.- Prototyp einer digitalen KI-Anwendung.- Beispielanwendung 1.- Beispielanwendung 2.- Beispielanwendung 3.-  Der Weg zum Erfolg mit KI.

Regulärer Preis: 62,99 €
Produktbild für Cybersecurity and Third-Party Risk

Cybersecurity and Third-Party Risk

MOVE BEYOND THE CHECKLIST AND FULLY PROTECT YOURSELF FROM THIRD-PARTY CYBERSECURITY RISKOver the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic.The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing.Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation.* Understand the basics of third-party risk management* Conduct due diligence on third parties connected to your network* Keep your data and sensitive information current and reliable* Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts* Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and EquifaxThe time to talk cybersecurity with your data partners is now.Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.GREGORY C. RASNER is the lead of Cyber Third-Party Risk at Truist Financial Corporation. He has extensive experience in cybersecurity and technology leadership in banking, biotech, software, telecom, and manufacturing. He is the author of several published articles on Third Party Risk and is a sought-after keynote speaker in this area.Foreword xviIntroduction xviiiSECTION 1 CYBERSECURITY THIRD-PARTY RISKCHAPTER 1 WHAT IS THE RISK? 1The SolarWinds Supply-Chain Attack 4The VGCA Supply-Chain Attack 6The Zyxel Backdoor Attack 9Other Supply-Chain Attacks 10Problem Scope 12Compliance Does Not Equal Security 15Third-Party Breach Examples 17Third-Party Risk Management 24Cybersecurity and Third-Party Risk 27Cybersecurity Third-Party Risk as a Force Multiplier 32Conclusion 33CHAPTER 2 CYBERSECURITY BASICS 35Cybersecurity Basics for Third-Party Risk 38Cybersecurity Frameworks 46Due Care and Due Diligence 53Cybercrime and Cybersecurity 56Types of Cyberattacks 59Analysis of a Breach 63The Third-Party Breach Timeline: Target 66Inside Look: Home Depot Breach 68Conclusion 72CHAPTER 3 WHAT THE COVID-19 PANDEMIC DID TO CYBERSECURITY AND THIRD-PARTY RISK 75The Pandemic Shutdown 77Timeline of the Pandemic Impact on Cybersecurity 80Post-Pandemic Changes and Trends 84Regulated Industries 98An Inside Look: P&N Bank 100SolarWinds Attack Update 102Conclusion 104CHAPTER 4 THIRD-PARTY RISK MANAGEMENT 107Third-Party Risk Management Frameworks 113ISO 27036:2013+ 114NIST 800-SP 116NIST 800-161 Revision 1: Upcoming Revision 125NISTIR 8272 Impact Analysis Tool for Interdependent Cyber Supply-Chain Risks 125The Cybersecurity and Third-Party Risk Program Management 127Kristina Conglomerate (KC) Enterprises 128KC Enterprises’ Cyber Third-Party Risk Program 131Inside Look: Marriott 140Conclusion 141CHAPTER 5 ONBOARDING DUE DILIGENCE 143Intake 145Data Privacy 146Cybersecurity 147Amount of Data 149Country Risk and Locations 149Connectivity 150Data Transfer 150Data Location 151Service-Level Agreement or Recovery Time Objective 151Fourth Parties 152Software Security 152KC Enterprises Intake/Inherent Risk Cybersecurity Questionnaire 153Cybersecurity in Request for Proposals 154Data Location 155Development 155Identity and Access Management 156Encryption 156Intrusion Detection/Prevention System 157Antivirus and Malware 157Data Segregation 158Data Loss Prevention 158Notification 158Security Audits 159Cybersecurity Third-Party Intake 160Data Security Intake Due Diligence 161Next Steps 167Ways to Become More Efficient 173Systems and Organization Controls Reports 174Chargebacks 177Go-Live Production Reviews 179Connectivity Cyber Reviews 179Inside Look: Ticketmaster and Fourth Parties 182Conclusion 183CHAPTER 6 ONGOING DUE DILIGENCE 185Low-Risk Vendor Ongoing Due Diligence 189Moderate-Risk Vendor Ongoing Due Diligence 193High-Risk Vendor Ongoing Due Diligence 196“Too Big to Care” 197A Note on Phishing 200Intake and Ongoing Cybersecurity Personnel 203Ransomware: A History and Future 203Asset Management 205Vulnerability and Patch Management 206802.1x or Network Access Control (NAC) 206Inside Look: GE Breach 207Conclusion 208CHAPTER 7 ON-SITE DUE DILIGENCE 211On-site Security Assessment 213Scheduling Phase 214Investigation Phase 215Assessment Phase 217On-site Questionnaire 221Reporting Phase 227Remediation Phase 227Virtual On-site Assessments 229On-site Cybersecurity Personnel 231On-site Due Diligence and the Intake Process 233Vendors Are Partners 234Consortiums and Due Diligence 235Conclusion 237CHAPTER 8 CONTINUOUS MONITORING 239What is Continuous Monitoring? 241Vendor Security-Rating Tools 241Inside Look: Health Share of Oregon’s Breach 251Enhanced Continuous Monitoring 252Software Vulnerabilities/Patching Cadence 253Fourth-Party Risk 253Data Location 254Connectivity Security 254Production Deployment 255Continuous Monitoring Cybersecurity Personnel 258Third-Party Breaches and the Incident Process 258Third-Party Incident Management 259Inside Look: Uber’s Delayed Data Breach Reporting 264Inside Look: Nuance Breach 265Conclusion 266CHAPTER 9 OFFBOARDING 267Access to Systems, Data, and Facilities 270Physical Access 274Return of Equipment 275Contract Deliverables and Ongoing Security 275Update the Vendor Profile 276Log Retention 276Inside Look: Morgan StanleyDecommissioning Process Misses 277Inside Look: Data Sanitization 279Conclusion 283SECTION 2 NEXT STEPSCHAPTER 10 SECURING THE CLOUD 285Why is the Cloud So Risky? 287Introduction to NIST Service Models 288Vendor Cloud Security Reviews 289The Shared Responsibility Model 290Inside Look: Cloud Controls Matrix by the Cloud Security Alliance 295Security Advisor Reports as Patterns 298Inside Look: The Capital One Breach 312Conclusion 313CHAPTER 11 CYBERSECURITY AND LEGAL PROTECTIONS 315Legal Terms and Protections 317Cybersecurity Terms and Conditions 321Offshore Terms and Conditions 324Hosted/Cloud Terms and Conditions 327Privacy Terms and Conditions 331Inside Look: Heritage Valley Health vs. Nuance 334Conclusion 335CHAPTER 12 SOFTWARE DUE DILIGENCE 337The Secure Software Development Lifecycle 340Lessons from SolarWinds and Critical Software 342Inside Look: Juniper 344On-Premises Software 346Cloud Software 348Open Web Application Security Project Explained 350OWASP Top 10 350OWASP Web Security Testing Guide 352Open Source Software 353Software Composition Analysis 355Inside Look: Heartbleed 355Mobile Software 357Testing Mobile Applications 358Code Storage 360Conclusion 362CHAPTER 13 NETWORK DUE DILIGENCE 365Third-Party Connections 368Personnel Physical Security 368Hardware Security 370Software Security 371Out-of-Band Security 372Cloud Connections 374Vendor Connectivity Lifecycle Management 375Zero Trust for Third Parties 379Internet of Things and Third Parties 385Trusted Platform Module and Secure Boot 388Inside Look: The Target Breach (2013) 390Conclusion 391CHAPTER 14 OFFSHORE THIRD-PARTY CYBERSECURITY RISK 393Onboarding Offshore Vendors 397Ongoing Due Diligence for Offshore Vendors 399Physical Security 399Offboarding Due Diligence for Offshore Vendors 402Inside Look: A Reminder on Country Risk 404Country Risk 405KC’s Country Risk 406Conclusion 409CHAPTER 15 TRANSFORM TO PREDICTIVE 411The Data 414Vendor Records 415Due Diligence Records 416Contract Language 416Risk Acceptances 417Continuous Monitoring 417Enhanced Continuous Monitoring 417How Data is Stored 418Level Set 418A Mature to Predictive Approach 420The Predictive Approach at KC Enterprises 420Use Case #1: Early Intervention 423Use Case #2: Red Vendors 425Use Case #3: Reporting 426Conclusion 427CHAPTER 16 CONCLUSION 429Advanced Persistent Threats Are the New Danger 431Cybersecurity Third-Party Risk 435Index 445

Regulärer Preis: 27,99 €
Produktbild für Visual Studio Code Distilled

Visual Studio Code Distilled

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development scenarios, including web, mobile, and cloud development. This second edition of VISUAL STUDIO CODE DISTILLED has been updated and expanded with two new chapters on writing apps with Python and building apps for the cloud and deployment to Azure.The book teaches you how to be immediately productive with Visual Studio Code, from the basics to some of the more complex topics. You will learn how to work on individual code files, complete projects, and come away with an understanding of advanced code-editing features that will help you focus on productivity, and source code collaboration with Git.WHAT YOU WILL LEARN* Get started with practical guidance on Visual Studio Code, including expansive guidance on writing apps with C# and Python* Comprehend Visual Studio Code in a way that is not just theory or a list of features, but an approach driven by developer tasks and needs* Understand integrated support for team collaboration with Git for executing and debugging code, and the many ways you can extend and customize Visual Studio Code* Debug code on multiple platforms through real-world guidance, such as working under corporate networks* Expand your coding intelligence from web to mobile to the cloud* Acquire valuable tips, tricks, and suggestions from hard-earned, real-world experience to be more productiveWHO THIS BOOK IS FORAll developers (including JavaScript, Java, NodeJS), not just those with a Microsoft background, who will benefit from learning and using VS code as a cross-platform and cross-language toolALESSANDRO DEL SOLE is Senior Software Engineer for a healthcare company, building mobile apps for doctors and dialysis patients. He has been in the software industry for more than 20 years, focusing on Microsoft technologies such as .NET, C#, Visual Studio, and Xamarin. He has been a trainer, consultant, and a Microsoft MVP since 2008 and is the author of many technical books. He is a Xamarin Certified Mobile Developer, Microsoft Certified Professional, and a Microsoft Programming Specialist in C#.Chapter 1: Introducing Visual Studio CodeChapter 2: Getting to Know the EnvironmentChapter 3: Language Support and Code Editing FeaturesChapter 4: Working with Files and FoldersChapter 5: Customizing Visual Studio CodeChapter 6: Installing and Managing ExtensionsChapter 7: Source Control with GitChapter 8:Automating TasksChapter 9: Building and Debugging Applications: .NET 5 and Other PlatformsChapter 10: Building Applications with PythonChapter 11: Deploying Applications to Azure

Regulärer Preis: 56,99 €
Produktbild für Wireless and Mobile Hacking  and Sniffing Techniques

Wireless and Mobile Hacking and Sniffing Techniques

Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of tapping phone wires and get to know about the conversation. It is also called wiretapping applied to the computer networks.Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.There are several ways how hackers can gain access to a public WiFi network and infiltrate connected devices to steal data. The most common practice that hackers use is called sniffing. This method allows hackers to hijack any packet of data that is being transmitted between a device and a router.The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to userThis report covers the main Wireless and Mobile Hacking and Sniffing Techniques. The report contains the following pars: Part A: Setup LabPart B: Sniffer and Phishing HackingPart C: Wireless Hacking Networks in LinuxPart D: Mobile Platforms HackingI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 7,49 €
Produktbild für Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks The report contains of the following parts:Part A: Lab Setup Part B: Foot printing and ReconnaissancePart C: Scanning MethodologyPart D: EnumerationI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 5,99 €
Produktbild für Common Windows, Linux and Web Server Systems Hacking Techniques

Common Windows, Linux and Web Server Systems Hacking Techniques

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus. Computer viruses generally require a host program.System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage.Web content is generated in real time by a software application running at server-side. So hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.This report covers the common techniques and tools used for System, Windows, Linux and Web Server Hacking. The report contains from the following sections:Part A: Setup Lab:Part B: Trojens and Backdoors and VirusesPart C: System HackingPart D: Hacking Web ServersPart E: Windows and Linux HackingI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 10,99 €
Produktbild für Visual Studio Code for Python Programmers

Visual Studio Code for Python Programmers

BECOME PROFICIENT AND EFFICIENT WITH VISUAL STUDIO CODE AND LEARN HOW TO INTEGRATE ALL YOUR EXTERNAL TOOLS!Visual Studio Code for Python Programmers helps Python developers become not just familiar, but productive in Visual Studio Code. To start, you’ll find the steps for installing Visual Studio Code on Windows, Mac and Linux platforms, along with an introduction to the editing features of the workspace. Coverage of more advanced functionality includes managing source code, debugging, unit testing, and Jupyter Notebook support. The book finishes with a walk-through of real-world projects which utilize Visual Studio Code features introduced in the book.For developers, the choice of an editor is a very personal one. You have idiosyncratic needs and wants that are unique to you as a developer. This book will help you learn how to customize Visual Studio Code to meet your needs and Python development workflow.* Introduces you to the features of the Visual Studio Code workspace and how those features can be customized* Demonstrates how Visual Studio Code allows you to choose your structure according to your needs* Covers editing code in Python, including syntax highlighting, code completion, object definition, refactoring, and code navigation* Describes Git integration and how to perform common Git functions (commits, checkouts, branches, and merges) from within Visual Studio Code* Highlights debugging features for Python developersA final section on Real World Applications will step you through several examples (and features integration with Django, Flask, Jupyter Notebook, Docker, and Azure), so you can hit the ground running with Visual Studio Code.APRIL SPEIGHT is a developer who specializes in Python and conversational design for chat bots and AI Assistants. Her passion for learning and teaching Python led to her first published title, Bite-Size Python: An Introduction to Python Programming. She currently works on content creation and developer community engagement for Spatial Computing and Mixed Reality at Microsoft. Introduction xixPART I WELCOME TO VISUAL STUDIO CODE 1CHAPTER 1 GETTING STARTED 3Installing Visual Studio Code 4The Visual Studio Code User Interface 4Activity Bar 5Side Bar 6Editor 7Panels 11Status Bar 12Command Palette 12Extensions 14Customizations 15Settings 16Color Themes and Icons 18Keybindings 18Display Langage 18Summary 19CHAPTER 2 HELLO WORLD FOR PYTHON 21Installing a Python Interpreter 21macOS 22Linux 22Windows 22Installing the Python Extension for Visual Studio Code 22Creating a Python File 23Selecting an Interpreter 24Setting a Default Interpreter 26Settings Editor 26settings.json File 26Selecting a Linter 26Editing a Python File 27Running a Python File 29Workflow Recap 30Summary 31CHAPTER 3 EDITING CODE 33Quick Fixes 34Code Completion, Definitions, and Declarations 35Formatting 38Edit Formatting Settings in the Settings Editor 39Edit Formatting Settings in settings.json 40Linting 41Enable and Disable Linting 41Run Linting 42Linting Settings 43Refactoring 44Extract Variable 44Extract Method 45Sort Imports 46Snippets 47Summary 48PART II ADDITIONAL VISUAL STUDIO CODE FEATURES 51CHAPTER 4 MANAGING PROJECTS AND COLLABORATION 53Files and Folders 53Open a Project 54Navigate Files 56Search across Files 57Close a File or Folder 60Environments 60Virtual Environments 61Conda Environments 61Source Control 63Initialize a Repository 65Commit Changes 66Branches 69Remotes 70Gutter Indicators 71View Diffs 71Push and Merge Commits 73Pull Requests 74Live Share 74Install Live Share 75Sign In to Live Share 76Share a Project 76Join a Session 78Editing and Collaboration 80Follow a Participant 80Share a Terminal 81Summary 82CHAPTER 5 DEBUGGING 83Starting a Debug Session 84Debug Commands 89Continue 89Step Over 90Step Into 90Step Out 91Stop 91Restart 92Call Stack 92Triggering a Breakpoint 93Logpoints 95Watch 96The Debug Console 98Launch Configurations 101Summary 104CHAPTER 6 UNIT TESTING 105Enable and Discover Tests 105Run Tests 109Debug Tests 113Summary 115CHAPTER 7 JUPYTER NOTEBOOK 117Creating and Opening a Jupyter Notebook 118Code Cell Modes 120Adding Cells 121Editing Cells 122Running a Cell 124Running a Single Cell 124Running All Code Cells 124Running Cells Above and Below a Code Cell 125Additional Commands 126Viewing Variables and Data 126Viewing Plots 128Debugging a Jupyter Notebook 129Connecting to a Remote Server 130Exporting a Notebook 131Summary 132CHAPTER 8 USING GIT AND GITHUB WITH VISUAL STUDIO CODE 135Getting Started 135GitHub Pull Requests and Issues Extension 136Publish a Project to GitHub 139Push Changes to GitHub 141Manage Pull Requests and Issues 143Pull Requests 144Issues 147Clone Repository 152Timeline View 154Summary 156CHAPTER 9 DEPLOY A DJANGO APP TO AZURE APP SERVICE WITH THE AZURE APP SERVICE EXTENSION 157Getting Started 157Creating a Django Project 159Creating an App 161Creating a Home Page 163Creating Website Pages 166Deploying to Azure 168Summary 175CHAPTER 10 CREATE AND DEBUG A FLASK APP 177Getting Started 177Create a Flask App 178Create and Render a Template 180Debug the Flask App 184Summary 187CHAPTER 11 CREATE AND DEPLOY A CONTAINER WITH AZURE CONTAINER REGISTRY AND AZURE APP SERVICE 189Getting Started 189Create a Container 191Add Docker Files to the Project 191Build an Image 193Build and Run a Container 195Debug a Container 197Push an Image to the Registry 197Create an Azure Container Registry 198Determine the Image’s Registry Location 199Deploy the Container Image to Azure 201Make Changes to the App and Deploy 205Multicontainer Apps 206Summary 207CHAPTER 12 DEPLOY AN AZURE FUNCTION TRIGGER BY A TIMER 209Getting Started 210Create an Azure Function 211Invoke the Function Locally 213Add the Code to the Function 214Deploy the Function to Azure 215Summary 220APPENDIX GETTING STARTED WITH AZURE 221Index 225

Regulärer Preis: 32,99 €
Produktbild für SPS-Programmierung mit dem Raspberry Pi und dem OpenPLC-Projekt

SPS-Programmierung mit dem Raspberry Pi und dem OpenPLC-Projekt

Einführung in die SPS-Programmierung mit dem Open-Source-Projekt auf dem Raspberry Pi und Modbus-Beispiele'mit dem'Arduino Uno und ESP8266Die SPS-Programmierung ist heute in der Industrie und in der Hausauto-mation sehr weit verbreitet. In diesem Buch beschreibt der Autor, wie der Raspberry Pi 4 als SPS eingesetzt werden kann. Angefangen mit der Softwareinstallation auf dem Raspberry Pi und dem SPS-Editor auf dem PC geht es nach einer Beschreibung der Hardware an das Programmieren.Es folgen interessante Beispiele nach IEC 61131-3 in den verschiedenen Programmiersprachen. Ausführlich wird auch erklärt, wie der SPS-Editor benutzt wird und wie die Programme auf den Raspberry Pi geladen und ausgeführt werden. Angefangen mit der Programmierung mit KOP (Kontaktplan) über ST (Structured Control Language) bis zu AS (Special Function Chart) werden alle IEC-Sprachen mit Beispielen behandelt. Diese können auf der Website des Autors heruntergeladen werden.Auch die Vernetzung kommt nicht zu kurz. Der Arduino Uno und der ESP8266 werden als ModbusRTU- bzw. ModbusTCP-Module program-miert, um ZugriŸ auf externe Peripherie zu erhalten. Damit ist es möglich, Sensoren einzulesen und Verbraucher zu schalten. Interessant dürften auch E/A-Schaltungen sein, die dem 24V-Industriestandard entsprechen.Befehlsübersichten für ST und KOP runden das Buch ab.Nach dem Durcharbeiten des Buches ist der Leser in der Lage, eigene SPS-Steuerungen mit dem Raspberry Pi zu verwirklichen.Josef Bernhardt hat sich schon früh mit Elektronik beschäftigt. Mit zwölf Jahren baute er seinen ersten Detektorempfänger. Die ersten Programmiererfahrungen sammelte er in den 80er-Jahren mit dem Commodore VC20. Auch Assemblerprogrammierung auf dem 8088-Prozessor ist ihm nicht fremd. Er kann auf über 30 Jahre Elektronikentwicklung an der Uni Regensburg zurückblicken. Dort war er im Bereich Elektronik- und Softwareentwicklung tätig. Mit der eigenen SMD-Fertigung setzt er auch Elektronikprojekte von Kunden um. Der Spaß an Elekt-ronik und Programmierung sowie sein Interesse an allem Neuen begleiten ihn schon sein ganzes Leben lang.

Regulärer Preis: 27,99 €
Produktbild für Praxishandbuch VMware vSphere 7 (5. Auflg.)

Praxishandbuch VMware vSphere 7 (5. Auflg.)

Leitfaden für Installation, Konfiguration und Optimierung.Sie brauchen praxisrelevante Informationen zur technischen Realisierung einer virtualisierten Infrastruktur mittels vSphere 7? Dann halten Sie mit dem »Praxishandbuch VMware vSphere 7.0« genau das richtige Buch in Ihren Händen. In diesem Handbuch finden Sie komprimiert alles, was Sie über Virtualisierung im Allgemeinen und vSphere 7 im Speziellen wissen müssen – samt unzähligen Tipps und Tricks aus der Praxis, Warnungen und Hinweisen zu angrenzenden Technologien.Schritt für Schritt zur optimalen virtualisierten UmgebungDas Buch gibt Ihnen schnell eine Übersicht über die einzelnen vSphere-Komponenten, deren Konfiguration und Optimierung. Sobald der Hypervisor (ESXi) installiert ist, können die ersten virtuellen Maschinen von Grund auf richtig eingerichtet und optimiert werden.Dann erfahren Sie, wie Sie Ihr Netzwerk am besten konfigurieren müssen und die ESXi Server an gemeinsamen Speicher anbinden. Was die Funktion Hostprofile, der VMware Lifecycle Manager oder der VMware Converter für Sie tun können, fehlt genauso wenig wie der Einsatz von vApps und Templates. Und auch wenn die vSphere-Umgebung steht, bleibt immer etwas zu tun: Backups und Sicherheitsstrategien (am Beispiel von Veeam Backup & Replication), die geschickte Verwaltung der Ressourcen und eine kontinuierliche Optimierung des laufenden Betriebs lassen sich mit den richtigen Werkzeugen und Konzepten besser in die Tat umsetzen. Auch die Kommandozeile und PowerCLI kommen nicht zu kurz.Aktualisierte fünfte AuflageDie fünfte Auflage wurde komplett auf VMware vSphere 7 aktualisiert. Zusätzlich aufgenommen wurden die Neuerungen von vSphere 7, z.B. vSAN, virtuelle Volumes, der HTML5-Client und die neue vSphere Appliance auf Photon Linux Basis. Weiterhin beinhaltet die fünfte Auflage die Themen Upgrade von einer Vorversion, NFS Storage unter Linux erstellen, Alarme, Hostprofile (erweitert), Troubleshooting (erweitert) und eine bestmögliche Netzwerkkonfiguration.

Regulärer Preis: 49,90 €
Produktbild für Samsung Galaxy A72

Samsung Galaxy A72

Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit

Regulärer Preis: 9,99 €