Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Konstruktion für die Additive Fertigung 2019

Konstruktion für die Additive Fertigung 2019

Dieses Buch thematisiert grundlegende Spezifikationen von Bauteilen und Prozessen, Methoden zur Abschätzung der Bauteileignung und Anwendung der Additiven Fertigung sowie zur Entwicklung von Konzepten und Entwürfen. Der Inhalt ist in vier Schwerpunktkapitel unterteilt: Zuerst wird auf die Integration additiver Fertigungsverfahren in bestehende Prozesse und Maßnahmen zur Steigerung der Wertschöpfung eingegangen. Nachfolgend sind Konstruktionen von Bauteilen, deren Gestaltung zur Sicherstellung funktionaler Anforderungen und Herstellbarkeit sowie Methoden zur Bauteiloptimierung dargestellt. Weiterhin werden Ansätze zur rechnergestützten Simulation sowie physischen Validierung von Bauteilen und deren Erprobung beschrieben. Daraus abgeleitet werden Maßnahmen zur Sicherstellung von Qualitätsaspekten charakterisiert. Die kapitelübergreifenden Inhalte werden vor dem Hintergrund zum Aufbau neuer Geschäftsmodelle diskutiert und legen den aktuellen Stand der Forschung im Bereich der Additiven Fertigung dar. Dieser Konferenzband baut auf den Inhalten des Vorjahresbandes "Konstruktion für die Additive Fertigung 2018" auf. 

Regulärer Preis: 99,99 €
Produktbild für Introducing Disaster Recovery with Microsoft Azure

Introducing Disaster Recovery with Microsoft Azure

Explore and learn the key building blocks of Microsoft Azure services and tools for implementing a disaster-recovery solution of any on-premises or cloud-based application. In this book, you will go through various aspects of planning, designing, and configuring a robust recovery solution on Azure.Introducing Disaster Recovery with Microsoft Azure starts by explaining the disaster-recovery landscape and how Azure disaster recovery is different from the traditional approach. You will learn how to leverage Azure site recovery and various Azure-based services to design and implement a recovery solution and much more. Moving forward, you will design and implement various scenarios such as on-premises to Azure, Azure to Azure, and on-premises to on-premises disaster recovery. You will also learn common considerations and technicalities of implementing recovery solutions for various multi-tier, monolithic, and modern micro-services enterprise applications. Finally, you will go through real-life examples, scenarios, and exercises.After reading this book, you will be able to design and implement disaster recovery on Azure in different scenarios. You will also look at a few real-world scenarios that will provide more practical insights.WHAT YOU WILL LEARN* Discover the fundamental building blocks of disaster recovery on Azure* Examine various application-specific considerations for disaster recovery* Leverage various PaaS capabilities to achieve maximum benefit* Design and implement a multi-regional Azure to Azure disaster recovery planWHO THIS BOOK IS FORConsultants, architects, and Azure administrators.BAPI CHAKRABORTY has over 14 years of IT experience in the field of on-premises and cloud infrastructure architecture, solution design, migration, deployment, and support practices. He has worked with customers and partners from various industries and understands their unique demands and requirements to achieve business goals. Bapi holds various industry and product certification including Microsoft, AWS, and IASA.YASHAJEET CHOWDHURY has over 17 years of IT experience in the field of On-premises and Cloud infrastructure architecture, solution design, migration, deployment, and support practices. He has deep technical hands-on experience on various Infrastructure services including Datacenter consolidation/migration, Virtualization, Cloud Computing & other Infrastructure offerings for various small and enterprise customers.Yash holds strong knowledge in Architecting, Designing, Implementation and many professional technical certifications including Microsoft and IBM.CHAPTER 1: DISASTER RECOVERY AND CLOUDCHAPTER GOAL: How cloud has changed the DR landscapeNO OF PAGES 20SUB -TOPICS1. How cloud has changed the DR landscape2. cost, security, storage, archival, maintenance, accessibility3. How traditional DR is different from new age DR4. Why Azure as a DR site5. options, storage, capabilities, pricing, integrated monitoring, tools, platform capability, competitive advantages6. benefits for existing customers, end to end orchestrationCHAPTER 2: INTRODUCING AZURE SITE RECOVERYCHAPTER GOAL: Understand Disaster recovery with Azure site recovery and Azure MigrateNO OF PAGES: 20SUB - TOPICS1. Supported scenarios including migration, supportability matrix,2. DR dependencies on Azure3. Storage, network, etc.4. Concepts of ASR for each scenarionetworking ER, Migration , tools, recovery plans, roles and RBAC, sites, config & process server etc.CHAPTER 3: DESIGNING AND IMPLEMENTING SIMPLE AZURE TO AZURE DR - SCENARIOCHAPTER GOAL: Understand Disaster recovery scenario for Azure to Azure scenarioNO OF PAGES : 20SUB - TOPICS:1. Questions to ask, decisions to make, data to collect, assess, Planning and designing the DR2. High level configurations3. Backup as a strategy4. Design and implement a multi regional A2A DR - scenario (5)5. High level configurations6. Common challenges and how to remediate themCHAPTER 4: ON-PREMISES TO AZURE DRCHAPTER GOAL: Understand Disaster recovery scenario for On-premises to Azure DR scenarioNO OF PAGES: 40SUB - TOPICS:1. Hyper-V (with SCVMM) to Azure2. Hyper-V (without SCVMM) to Azure3. Physical systems to Azure4. Azure Stack to Azure5. Planning6. Designing7. Configuring8. Common challenges and how to remediate themCHAPTER 5: ON-PREMISES TO ON-PREM USING ASRNO OF PAGES: 10CHAPTER GOAL: understand On-premises only scenario1. On-premises to On-prem using ASR2. Planning3. Designing4. Configuring5. Common challenges and how to remediate themCHAPTER 6: APP SPECIFIC DR SCENARIOSNO OF PAGES: 20CHAPTER GOAL: understand application specific DR scenario1. ADDS2. SQL3. Oracle4. RDS etc.CHAPTER 7: AUTOMATION AND MONITORINGNO OF PAGES: 10CHAPTER GOAL: understand automation and monitoring for Disaster recovery solution Common Automation and Monitoring scenarios for DR on AzureCHAPTER 8: SUMMARY, BEST PRACTICES AND EXERCISESNO OF PAGES: 10CHAPTER GOAL: Summary, Best Practices and Exercises for executing Azure Disaster Recovery1. Summary2. Best Practices3. Exercises

Regulärer Preis: 62,99 €
Produktbild für Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server

Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server

The paper concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present some reference when configuring ISA and Squid. There a lot of issues that not covered, and you can go to the manual of ISA server and Squid server for detailed configuration of ISA and Squid. The paper is composed from two parts 1.Microsoft ISA server 2004 Configuration2.Linux Squid Server ConfigurationNote that, this work was done without proper simulation, because of the lack of resources, as testing firewall configuration requires many computers, with one of them should have many network cards. Also the ISA server is not used in the computer center now.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 4,49 €
Produktbild für Selling on Amazon For Dummies

Selling on Amazon For Dummies

SELL ON AMAZON AND MAKE THEM DO THE HEAVY LIFTINGSelling on Amazon has become one of the most popular ways to earn income online. In fact, there are over 2 million people selling on Amazon worldwide. Amazon allows any business, no matter how small, to get their products in front of millions of customers and take advantage of the largest fulfillment network in the world. It also allows businesses to leverage their first-class customer service and storage capabilities.Selling on Amazon For Dummies walks owners through the process of building a business on Amazon—a business that can be built almost anywhere in the world, as long as you have access to a computer and the internet.* The basics of selling on Amazon* Using FBA* Getting started* Deciding what to sell* Conducting product research* Finding your way around Seller Central* Product sourcing, shipping and returns, Amazon subscription, fees, sales tax, and more* How to earn ROIs (Returns on Your Investments)Selling on Amazon For Dummies provides the strategies, tools, and education you need, including turnkey solutions focused on sales, marketing, branding, and marketplace development to analyze and maximize opportunities.DENIZ OLMEZ is an Amazon consultant who specializes in search engine optimization, new account setup and management, FBA, and branding services. JOE KRAYNAK has authored and coauthored numerous books including Flipping Houses For Dummies and Foreclosure Self-Defense For Dummies.INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 3Where to Go from Here 4PART 1: GETTING STARTED WITH SELLING ON AMAZON 5CHAPTER 1: LAYING THE GROUNDWORK 7Getting the Lowdown on Selling Online 7Weighing the pros and cons of online retailing 8Taking a tour of online stores and marketplaces 9Exploring How Amazon Works 10Before you start selling 10Selling products 11Using Fulfillment by Amazon (FBA) 11Comparing Amazon Business Types 13Vendor (1P) versus Seller (3P) 13Individual versus Professional 14Arbitrage versus private label 15Sellers with and without brand registry 17Tabulating the Costs 18Product sourcing 18Shipping and storage 18Amazon Seller fees 19Returns 19Other costs 20Following Amazon’s Rules 20Seller code of conduct 20Accurate information 21Acting fairly 21Ratings, feedback, and reviews 22Communications 22Customer information 22Circumventing the sales process 22Multiple Amazon Seller accounts 23CHAPTER 2: SELLING ON AMAZON IN A NUTSHELL 25First Things First: Finding Products to Sell 26Deciding what to sell and not sell 26Exploring product sourcing options 29Listing Products for Sale on Amazon 30Prepping and Shipping Products to Customers 31Introducing Amazon Prime 31Fulfillment by Amazon (FBA) and Small and Light (SNL) 32Fulfillment by Merchant (FBM) 33Seller Fulfilled Prime 34Drop-shipping 34Multi-Channel Fulfillment 35Boosting Sales with Advertising and Promotions 35Providing Stellar Customer Service 37CHAPTER 3: SETTING UP YOUR AMAZON SELLER ACCOUNT 39Registering to Become an Amazon Seller 39Completing Your Amazon Seller Business Profile 42Business Address 42Official Registered Address 43Language for Feed Processing Report 43Legal Entity 43Merchant Token 44Display Name 44Checking and Adjusting Your Account Settings 45Entering Shipping and Return Settings 46Shipping settings 46Return settings 47Securing Your Amazon Seller Account 49CHAPTER 4: BECOMING FAMILIAR WITH SELLER CENTRAL 53Finding Your Way around Seller Central 53Switching marketplaces 54Navigating the menu bar 54Using the search bar 60Viewing your payments summary 61Taking advantage of Amazon business reports 62Accessing the Buyer-Seller Messaging Service 64Getting Help and Information 65Engaging in the seller forums 66Contacting Amazon support for help 67Managing your case log 67Consulting Amazon Selling Coach 68Skimming Amazon headline news 69Checking out Amazon’s app store: The Service Provider Network (SPN) 69Exploring Amazon’s Seller University 70PART 2: PROCURING PRODUCTS TO SELL ON AMAZON 71CHAPTER 5: KNOWING WHAT YOU CAN AND CAN’T SELL ON AMAZON 73Recognizing Products You Can Sell: Amazon’s Product Categories 73Open categories 74Categories that require approval 75Steering Clear of Restricted Products 76Brushing Up on Food Safety Rules 78Organic products 79Chilled and frozen products 80CHAPTER 6: FINDING PRODUCTS WITH PROFIT POTENTIAL 81Recognizing the Characteristics of Products with High Profit Potential 82Uniqueness 82Price range and profit margin 82Sales volume 83Shipping cost/complexity 84Reviews 84Steering Clear of Troublesome Products 84Trademarked products 85Mechanically complex products 85Products that are difficult and costly to store and ship 86Products sold in large retail stores 87Conducting Your Own Product Research 87Using product research tools 87Sizing up the competition 89Exploring Alibaba and other Chinese online wholesale marketplaces 90Validating or Rejecting Product Ideas 92Weighing the pros and cons of carrying the latest, greatest products 92Considering seasonal products 93Giving new brands a try (or not) 93Focusing on Price and Sales Volume 94Checking out different pricing strategies 95Keeping an eye on the competition 95Estimating sales volume 97Setting realistic profit projections 98CHAPTER 7: EXPLORING YOUR PRODUCT SOURCING OPTIONS 101Mastering Retail Arbitrage 102Buying from brick-and-mortar retailers 102Buying from online retailers 105Recognizing the importance of having a purchase order (PO) or receipt 107Sourcing Products at Auctions and Liquidation Sales 107Weighing the Pros and Cons of Drop-Shipping 109Buying from Manufacturers, Distributors, and Wholesalers 110Deciding whether a manufacturer is best 111Knowing when to opt for a distributor 111Deciding when a wholesaler is best 112Sourcing Products from Alibaba 114Finding Suppliers at Tradeshows 117Making and Selling Your Own Products: Amazon Handmade and Custom 119Selling your own hand-crafted products 119Selling customized products on Amazon 121CHAPTER 8: EVALUATING AND NEGOTIATING WITH SUPPLIERS 123Deciding Whether to Use Domestic or Foreign Suppliers or Both 124Recognizing the pros and cons of working with domestic suppliers 124Weighing the pros and cons of working with foreign suppliers 125Selecting Suppliers with the Right Stuff 126Gauging experience and expertise 127Ensuring clear communication 127Sizing up a supplier’s reputation 128Assessing a supplier’s responsiveness 130Comparing prices 131Negotiating Prices and Terms 132Prepping for negotiation 132Brushing up on effective negotiating tactics 133Obtaining a purchase order contract 134PART 3: GETTING DOWN TO THE BUSINESS OF SELLING 137CHAPTER 9: LISTING PRODUCTS FOR SALE ON AMAZON 139Knowing What’s Required to Own the Buy Box 140Ensuring buy-box eligibility 140Meeting the quality metrics for winning the buy box 141Thinking outside the buy box 144Obtaining High-Quality Product Photos 144Brushing up on Amazon’s product photo rules and restrictions 145Procuring manufacturer photos 146Taking your own photos 146Outsourcing product photos 147Checking out Amazon Imaging Services 148Creating a Product Listing 149Matching to an existing product listing 149Creating a new product listing 151Listing multiple products in bulk 155Listing variations and bundles 159Creating product subscriptions 162Increasing Your Product Search Ranking on Amazon 164Harnessing the power of the A9 algorithm 164Checking out the competition 166Using keywords to your advantage 166CHAPTER 10: FULFILLING CUSTOMER ORDERS 171Choosing an Order Fulfillment Method 172Fulfillment by Amazon (FBA) 172Fulfillment by Merchant (FBM) 174Seller Fulfilled Prime 175Drop-shipping 177Using Fulfillment by Amazon (FBA) 178Accounting for the costs 179Knowing what to send and not send to FBA 182Signing up for FBA 185Preparing and shipping products to FBA 185Removing inventory from FBA 190Shipping Products Yourself: Fulfillment by Merchant (FBM) 193CHAPTER 11: HELPING SHOPPERS FIND YOU AND YOUR PRODUCTS 195Gaining Traction with Product and Seller Ratings and Feedback 195Encouraging customers to review products 196Improving your seller rating and feedback 199Harnessing the Power of Search Engine Optimization (SEO) 200Jazzing Up Your Listings with A+ Content 201Driving Web Traffic from Outside Amazon to Your Product Listings 203Generating buzz via social media 203Creating a website or landing page 204Using pay-per-click advertising 206CHAPTER 12: BOOSTING SALES WITH MARKETING AND ADVERTISING 207Exploring Different Ad Types 208Sponsored Products 208Sponsored Brands 210Sponsored Display 211Amazon demand-side platform (DSP) 211Custom ads 212Deals and coupons 212Optimizing Your Search Rank with Sponsored Product Ads 214Letting Amazon target your Sponsored Product ad for you 214Targeting your own Sponsored Product Ads 215Evaluating and adjusting your ad campaigns 217Boosting Brand Awareness with Sponsored Brands 219Giving Your Shoppers an Added Incentive to Buy: Deals and Coupons 221Offering special deals 221Offering coupon discounts 223Creating promotions 224Taking Advantage of External Marketing Options 225Dipping into social media marketing 226Harnessing the power of influencer marketing 228Firing Up Your Email Marketing Machine 229CHAPTER 13: FOCUSING ON CUSTOMER SERVICE 231Understanding Why Customer Satisfaction Is So Important 232Laying the Groundwork for Quality Customer Service 233Managing and Shipping Orders 234Responding to Customer Questions, Concerns, and Complaints 235Processing Returns, Refunds, and Cancellations 236Handling returns 237Issuing refunds 239Following up on order cancellations 239Managing Seller Feedback and Product Reviews 240Monitoring and responding to seller feedback 241Monitoring and responding to product ratings and reviews 243Fielding A-to-Z Claims 244CHAPTER 14: BUILDING AND MANAGING YOUR OWN WEBSTORE 247Choosing Where to Build Your Webstore: Inside or Outside Amazon or Both 248Weighing the pros and cons of building an Amazon Store 248Weighing the pros and cons of building a webstore outside Amazon 249Creating two webstores 250Laying the Groundwork for Your Webstore 250Choosing a unique and recognizable domain name 250Deciding how to build your webstore 251Categorizing your products 252Gathering the essentials to build your store 254Creating Your Amazon Store 257Creating a Stand-Alone Webstore 259Designing your storefront 259Making sure you have everything in place 261CHAPTER 15: MANAGING YOUR INVENTORY 263Grasping the Importance of Inventory Management 263Managing Inventory via Amazon’s Manage Inventory Page 264Maintaining Sufficient Stock 266Forecasting sales 266Accounting for lead time 267Replenishing FBA inventory 268Setting up replenishment alerts 269Avoiding FBA’s long-term storage fees 271Getting Some Cash or Credit to Buy Inventory 272Hitting Amazon up for a loan 272Getting daily payouts with Payability 273Making savvy use of credit cards 274Financing with loans or lines of credit 274PART 4: TAKING YOUR BUSINESS TO THE NEXT LEVEL 277CHAPTER 16: PUTTING ADDITIONAL AMAZON SELLER TOOLS TO WORK FOR YOU 279Tracking Your Account’s Health and Performance 280Checking your account health 280Reviewing customer feedback 282Monitoring and managing your A-to-Z Guarantee claims 282Monitoring and managing your chargeback claims 283Accessing Amazon’s performance notifications 284Gaining additional insight via the Voice of the Customer feature 284Improving your performance via Seller University 285Dealing with Sales Tax 285Grasping the basics of Marketplace Tax Collection 286Using Amazon’s Tax Calculation Service (TCS) 287Generating Business and Inventory Reports 289Sales reports 289Inventory reports 290Payments reports 292Customer concession reports 292Removal reports 293Managing Your Amazon Seller Account with the Mobile App 293Getting the Amazon Seller Mobile App 294Navigating the Amazon Seller Mobile App 294CHAPTER 17: BUILDING YOUR OWN BRAND (OR NOT) 297Deciding Whether Branding Is Right for You 298Creating Your Own Brand 299Discover your purpose 299Analyze your competition 300Identify your target market 300Identify your brand’s key benefits 301Write a slogan 302Visualize your brand 302Work it: Reinforce your brand 302Trademarking Your Brand 303Registering your trademark on USPTO.gov 303Streamlining the trademark registrationprocess with IP Accelerator 304Adding your trademark to the Amazon Brand Registry 305Building a Brand with Private-Label Products 309CHAPTER 18: TAKING ADVANTAGE OF THIRD-PARTY TOOLS AND SERVICE PROVIDERS 311Taking Product Research to the Next Level 312Managing the Backend of Your Ecommerce Business 313Handling multi-channel integration 314Streamlining order management 315Simplifying inventory management 315Automating price changes 316Automating Feedback and Reviews 317Finding Help through Amazon’s Service Provider Network 318CHAPTER 19: EXPANDING YOUR OPERATIONS: B2B AND GLOBAL SALES 321Selling Products to Amazon as a Vendor 322Weighing the pros and cons of selling to Amazon as a vendor 322Increasing your chances of getting invited to become a vendor 323Selling to Other Businesses 323Getting up to speed on performance standards and rules 324Managing business pricing and quantity discounts 325Creating business-only offers 328Enrolling in Amazon’s tax exemption program 329Negotiating business prices 330Expanding Your Operations Globally 331Simplifying the process with FBA Export 331Expanding your operations into other countries using Amazon Global Selling 333PART 5: THE PART OF TENS 335CHAPTER 20: TOP TEN ADVERTISING TIPS 337Get to Know the Different Ad Types 337Test the Market with Automatic Targeting 338Make the Most of Manual Targeting 339Find Your Long-Tail Search Terms 339Research Your Competitor’s Search Terms 340Write Copy Specific to Your Product 340Avoid These Common Search Terms Mistakes 341Specify Negative Search Terms 342Always Test and Track 343Don’t Rush! Good Advertising Takes Time 343CHAPTER 21: TEN TIPS TO DELIVER AWESOME CUSTOMER SERVICE 345Follow Amazon’s Rules and Updates 346Respond in a Timely Manner 346Be Honest 347Be Empathetic 347Go the Extra Mile 348Ask Questions 348Personalize Your Responses 349Stay Calm 349Remain Positive 350Think Long Term 350CHAPTER 22: TEN (PLUS ONE) TIPS TO FIND BEST-SELLING PRODUCTS 353Recognize Key Product Selection Criteria 354Find a Niche 354Sell What You Know and Love 355Do Your Own Thing 355Don’t Expect Seasonal Products to Sell Year-Round 356Decide Whether to Pursue Best Sellers 357Capitalize on Low Competition 357Focus on Products That Sell for More than 20 Bucks 358Check Competitors’ Reviews 359Reduce Returns 359Avoid Legal Issues 360Index 361

Regulärer Preis: 16,99 €
Produktbild für Homeoffice und mobiles Arbeiten im Team effektiv umsetzen

Homeoffice und mobiles Arbeiten im Team effektiv umsetzen

Produktives Arbeiten im Homeoffice erfordert neben richtiger Ausstattung, guter Sprach- und Datenkommunikation und Zugriff auf Daten auch die – durch IT-Tools unterstützten – passenden Führungs- und Arbeitsmethoden. Dieser Ratgeber bietet konkrete Anleitungen, um ohne IT-Fachkenntnisse das weltweite Arbeiten im Team schnell und pragmatisch möglich zu machen.Peter Bruhn ist Diplom-Wirtschaftsinformatiker (TU Darmstadt) und zweifacher Master of Science (Computer Science, University of Illinois (USA) und Informationswissenschaft, Hochschule Darmstadt). Bereits 2000 spezialisierte er sich als Berater bei McKinsey & Company auf die Digitale Transformation. Anschließend baute er als Senior Manager im Innovationsbereich der Deutschen Telekom AG neue Geschäftsmodelle u.a. für die Digital Business Unit auf. Als Vice President Group Digital Transformation übernahm Bruhn 2016 die Verantwortung für die Digitale Agenda der TAKKT AG in Europa und den USA.Peter Bruhn ist ein Vorreiter für mobiles Arbeiten und hat als Führungskraft jahrelange Erfahrung in der Führung verteilter Teams auf Distanz. Einleitung.- Hardware.- Konnektivität.- Software.- Anwendungen für die Team-Zusammenarbeit.- IT-Sicherheit und Datenschutz.- Fazit und Empfehlung

Regulärer Preis: 4,99 €
Produktbild für Agile Artificial Intelligence in Pharo

Agile Artificial Intelligence in Pharo

Cover classical algorithms commonly used as artificial intelligence techniques and program agile artificial intelligence applications using Pharo. This book takes a practical approach by presenting the implementation details to illustrate the numerous concepts it explains.Along the way, you’ll learn neural net fundamentals to set you up for practical examples such as the traveling salesman problem and cover genetic algorithms including a fun zoomorphic creature example. Furthermore, Practical Agile AI with Pharo finishes with a data classification application and two game applications including a Pong-like game and a Flappy Bird-like game. This book is informative and fun, giving you source code to play along with. You’ll be able to take this source code and apply it to your own projects.WHAT YOU WILL LEARN* Use neurons, neural networks, learning theory, and more* Work with genetic algorithms * Incorporate neural network principles when working towards neuroevolution * Include neural network fundamentals when building three Pharo-based applicationsWHO THIS BOOK IS FORCoders and data scientists who are experienced programmers and have at least some prior experience with AI or deep learning. They may be new to Pharo programming, but some prior experience with it would be helpful.ALEXANDRE BERGEL, PH.D., is an associate professor in the Department of Computer Science (DCC) at the University of Chile and is a member of the Intelligent Software Construction laboratory (ISCLab). His research interests include software engineering, software performance, software visualization, programming environment, and machine learning. He is interested in improving the way we build and maintain software. His current hypotheses are validated using rigorous empirical methodologies. To make his research artifacts useful not only to stack papers, he co-founded Object Profile.1: Introduction2: The Perceptron Model3: Artificial Neuron4: Neural Networks5: Theory on Learning6: Data Classification7: A Matrix Library8: Matrix-Based Neural Network9: Genetic Algorithm10: Genetic Algorithm in Action11: Traveling Salesman Problem12: Exiting a Maze13: Building Zoomorphic Creatures14: Evolving Zoomorphic Creature15: Neuroevolution16: Neuroevolution with NEAT17: The MiniMario Video GameLast Words (Afterword)

Regulärer Preis: 62,99 €
Produktbild für Some Tutorials in Computer Networking Hacking

Some Tutorials in Computer Networking Hacking

The objective of this work is to provide some quick tutorials in computer networking hacking.The work includes the following tutorials:* Tutorial 1: Setting Up Penetrating Tutorial in Linux.* Tutorial 2: Setting Up Penetrating Tutorial in Windows.* Tutorial 3: OS Command Injection: * Tutorial 4: Basic SQL Injection Commands. * Tutorial 5: Manual SQL injection using order by and union select technique.* Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.* Tutorial 7: Uploading Shell in the Site having LFI.* Tutorial 8: Advanced Way for Uploading Shell* Tutorial 9: Uploading shell Using Sqli Command.* Tutorial 10: Uploading Shell Using SQLmap* Tutorial 11: Post Based SQL Injection* Tutorial 12: Cracking the Hashes Using Hashcat. * Tutorial 13: Hacking windows 7 and 8 through Metasploite * Tutorial 14: Tutorial on Cross Site Scripting * Tutorial 15: Hacking Android Mobile Using Metasploit* Tutorial 16: Man of the middle attack:* Tutorial 17: Using SQLmap for SQL injection* Tutorial 18: Hide Your Ip* Tutorial 19: Uploading Shell and Payloads Using SQLmap * Tutorial 20: Using Sql Shell in SQLmap* Tutorial 21: Blind SQL Injection* Tutorial 22: Jack Hridoy SQL Injection Solution* Tutorial 23: Using Hydra to Get the PasswordTutorial 24: Finding the phpmyadmin page using websploit. * Tutorial 25: How to root the server using back connect * Tutorial 25: How to root the server using back connect* Tutorial 26: HTML Injection* Tutorial 27: Tutuorial in manual SQl Injection* Tutorial 28: Venom psh-cmd-exe payload * Tutorial 29: Cross site Request Forgery (CSRF)* Tutorial 30: Disable Victim Computer* Tutorial 31: Exploit any firefox by xpi_bootstrapped addon* Tutorial 32: Hack android mobile with metasploit* Tutorial 33: PHP Code Injection to Meterpreter Session* Tutorial 34: Basic google operators* Tutorial 35: Hacking Credit Cards with google* Tutorial 36: Finding Vulnerable Websites in Google* Tutorial 37: Using the httrack to download website* Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper* Tutorial 39: Using burp suite to brute force password

Regulärer Preis: 12,99 €
Produktbild für Autodesk Fusion 360

Autodesk Fusion 360

3D-Modelle professionell konstruieren, rendern, animieren und simulierenAufbereitung der Modelle für 3D-Druck und CNC-Bearbeitungen sowie Einführung in den FertigungsprozessAlle wichtigen Funktionen anhand praktischer Beispiele Schritt für Schritt erklärt Mit dem cloudbasierten CAD/CAM-Programmsystem Fusion 360 lassen sich schnell und einfach professionelle 3D-Modelle und 2D-Fertigungszeichnungen erstellen und für CNC-Bearbeitungen und 3D-Druck vorbereiten. Dieses Buch bietet eine praktische Einführung in die wichtigsten Funktionen der umfangreichen Software. Dabei setzt der Autor folgende Themenschwerpunkte: 3D-Modelle zweidimensional skizzieren und aus der Skizze heraus erzeugenVolumenkörper-, Flächen-, Freiform- und Netzmodellierung2D-Fertigungszeichnungen mit Beschriftung und Stücklisten ableitenBauteile und Baugruppen rendern, animieren und Mechanismen simulierenErstellen von Fertigungsdaten für 3D-Drucker und CNC-Bearbeitungsmaschinen3D-Druck und CNC-Bearbeitungen (wie CNC-Fräsen, CNC-Drehen und Laserschneiden) Alle Funktionen und Arbeitsweisen werden Schritt für Schritt demonstriert und eingeübt. Zahlreiche praktische Beispiele helfen, die verschiedenen Techniken nachzuvollziehen und zu verinnerlichen. Nach der Lektüre dieses Buches sind Sie bestens gerüstet, individuelle 3D-Modelle sowie die entsprechenden Fertigungsdaten zu erstellen und eigene Projekte umzusetzen. Zum Download: Alle im Buch verwendeten Konstruktionsbeispiele stehen unter www.mitp.de/0158 zum kostenlosen Download zur Verfügung. Detlef Ridder hat langjährige Erfahrung im Bereich CAD und bereits zahlreiche Bücher zu AutoCAD, Inventor, Revit und ArchiCAD veröffentlicht. Er gibt Schulungen zu diesen Programmen und zu CNC und weiß daher, welche Themen für Einsteiger besonders wichtig sind.

Regulärer Preis: 25,99 €
Produktbild für 45 Elektronik-Projekte für den Raspberry Pi

45 Elektronik-Projekte für den Raspberry Pi

Der Raspberry Pi stellt einen sehr preiswerten, aber doch vollwertigen Computer dar, an den auf einfache Weise verschiedenste Elektronik angeschlossen werden kann. Dieses Buch geht auf eine der Stärken des Raspberry Pi ein: die Kombination von Elektronik und Software.Nach einer kurzen Einführung zum Raspberry Pi wird auf die benötigte Software eingegangen. Im Anschluss wird das Linux-Betriebssystem kurz vorgestellt – gefolgt von einer Einführung in die Programmierung mit Bash, Python und JavaScript. Der Schwerpunkt liegt dabei auf Python. Die Erläuterungen sind in allen Fällen kurz und bündig und trotzdem so ausführlich, dass das Notwendigste besprochen wird, um die folgenden Projekte zu verstehen und individuell anzupassen.Dieses Buch beschreibt 45 spannende und interessante Projekte, wie zum Beispiel ein Wechselblinklicht, eine Motorregelung, Erzeugen und Verarbeiten analoger Signale, ein digitales Thermometer, ein Lichtmesser. Aber auch kompliziertere Projekte wie eine Motor-Geschwindigkeitsregelung, ein Webserver mit CGI (Common Gateway Interface) und Client-Server-Programme werden vorgestellt. Sie können dieses Buch als Projektbuch verwenden und die Projekte nachbauen, um sie dann in der Praxis einzusetzen. Durch die ausführliche Beschreibung mit Schaltplänen und Fotos gestaltet sich der Aufbau auf dem Steckbrett recht einfach.Sie können dieses Buch auch als Lehrbuch verwenden. Bei jedem Projekt wird erklärt, warum es auf diese Art und Weise ausgeführt ist. Sie lernen viel über den Raspberry Pi, Python und die verwendeten Bauteile, so dass Sie selbst die Projekte anpassen, nach eigenen Wünschen erweitern oder mehrere Projekte miteinander kombinieren können.Um Ihnen die Software-Installation zu erleichtern, hat der Autor das Betriebssystem und alle Programmbeispiele auf einer SD-Karte zusammengetragen. Passend zu den Projekten ist neben dieser SD-Karte auch ein Hardware-Starterkit bei Elektor erhältlich.Bert van Dam ist freiberuflicher Autor von Büchern, Kursen und Artikeln über PIC- und ARM Mikrocontroller, Arduino, Raspberry Pi, PCs, Künstliche Intelligenz und die Programmiersprachen JAL, C, Assembler, Python und Flowcode.

Regulärer Preis: 29,99 €
Produktbild für Internet of Crimes

Internet of Crimes

Das Internet bietet Verbrechern ganz neue Möglichkeiten: Hacker attackieren Bezahlsysteme, beeinflussen Wahlen und ganze Demokratien. Gehackt und erpresst werden nicht nur Konzerne und Internetgrößen wie Facebook oder Microsoft, auch kleine und mittlere Unternehmen sind immer häufiger im Visier der Internetmafia. Jeder, der das Internet nutzt, ob privat oder beruflich, kann Opfer einer Attacke werden.Gerald Reischl zeigt in seinem Buch »Internet of Crimes«, mit welchen Szenarien wir alle rechnen müssen, wie man die Gefahr eindämmen kann und was jeder Einzelne tun kann, um nicht selbst Opfer von Internetkriminalität zu werden.Gerald Reischl ist gefragter Tech- und IT-Security-Experte, Journalist und Buchautor. Er war Redakteur für diverse österreichische Tageszeitungen, baute das führende Technologie-Nachrichtenportal Österreichs auf und war Geschäftsführer im öffentlich-rechtlichen Rundfunk. Heute ist er Kommunikationschef eines der führenden Technologie-Unternehmen Österreichs.

Regulärer Preis: 2,99 €
Produktbild für Programming with Node-RED

Programming with Node-RED

The Internet of Things (IoT) is becoming a major application area for embedded systems. As a result, more and more people are becoming interested in learning about embedded design and programming. Technical colleges and universities are moving away from legacy 8 and 16-bit microcontrollers and are introducing 32-bit embedded microcontrollers to their curriculums. Many IoT applications demand precision, high processing power, and low power consumption.Produced by IBM, Node-RED is an open-source visual editor for wiring the Internet of Things. Node-RED comes with a large number of nodes to handle a multitude of tasks. The required nodes are selected and joined together to perform a particular task. Node-RED is based on flow type programming where nodes are configured and joined together to form an application program. There are nodes for performing complex tasks, including web access, Twitter, E-mail, HTTP, Bluetooth, MQTT, controlling GPIO ports, etc. One particularly nice aspect of Node-RED is that the programmer does not need to learn how to write complex programs. For example, an email can be sent by simply joining nodes together and writing only a few lines of code.The aim of this book is to teach how Node-RED can be used in projects. The main hardware platform used with most of the projects in this book is Raspberry Pi 4. Chapters are included to show how Node-RED can be also be used with Arduino Uno, ESP32 DevKitC, and the ESP8266 NodeMCU microcontroller development boards.Prof. Dr. Dogan Ibrahim is a Fellow of the Institution of Electrical Engineers. He is the author of over 60 technical books, published by publishers including Wiley, Butterworth, and Newnes. He is the author of over 250 technical papers, published in journals, and presented in seminars and conferences.

Regulärer Preis: 32,99 €
Produktbild für C Programming with  Arduino

C Programming with Arduino

Technology is constantly changing. New microcontrollers become available every year. The one thing that has stayed the same is the C programming language used to program these microcontrollers. If you would like to learn this standard language to program microcontrollers, then this e-book (pdf) is for you!Arduino is the hardware platform used to teach the C programming language as Arduino boards are available worldwide and contain the popular AVR microcontrollers from Atmel.Atmel Studio is used as the development environment for writing C programs for AVR microcontrollers. It is a full-featured integrated development environment (IDE) that uses the GCC C software tools for AVR microcontrollers and is free to download.At a glance:• Start learning to program from the very first chapter• No programming experience is necessary• Learn by doing - type and run the example programs• A fun way to learn the C programming language• Ideal for electronic hobbyists, students and engineers wanting to learn the C programming language in an embedded environment on AVR microcontrollers• Use the free full-featured Atmel Studio IDE software for Windows• Write C programs for 8-bit AVR microcontrollers as found on the Arduino Uno and MEGA boards• Example code runs on Arduino Uno and Arduino MEGA 2560 boards and can be adapted to run on other AVR microcontrollers or boards• Use the AVR Dragon programmer / debugger in conjunction with Atmel Studio to debug C programsWarwick A. Smith lives in South Africa and works as an Electronics Engineer and Embedded System Programmer. He is a bestselling author of the books C Programming for Embedded Microcontrollers, ARM Microcontroller Interfacing and Open Source Electronics on Linux.

Regulärer Preis: 33,99 €
Produktbild für Teach Yourself VISUALLY Windows 10

Teach Yourself VISUALLY Windows 10

MASTER WINDOWS 10 BY READING ONLY ONE BOOKTeach Yourself Visually Windows 10, 3rd Edition brings together all of the necessary resources to make you an expert in the use of the latest version of Windows. Using highly visual techniques to maximize learner retention and memory, Teach Yourself Visually Windows 10 will have you breezing through the most popular operating system in the world in no time.The book includes hundreds of step-by-step and illustrated sets of instructions to teach you both the basics and the complexities of Windows 10 operation. Lessons include:* Installing and repairing applications* System maintenance* Setting up password-protection* Downloading photos* Managing media files* And moreTeach Yourself Visually Windows 10 combines the best of visual learning techniques with comprehensive source material about the interface and substance of Windows 10 to leave you with encyclopedic knowledge of the operating system.Perfect for beginners and intermediate users alike, this book will turn your Windows-using experience from a slow slog into a lighting-fast masterclass of efficiency.PAUL MCFEDRIES (Toronto, Ontario) is the president of Logophilia Limited, a technical writing company. He has been programming since he was a teenager in the mid-1970s, has programmed everything from mainframes to desktops to bar code scanners, and has worked with many different languages, including Fortran, assembly language, C++, and, of course, JavaScript. Paul has written more than four dozen books that have sold more than two million copies worldwide. These books include Windows 8 Visual Quick Tips, Teach Yourself VISUALLY Macs, 2nd Edition, Macs Portable Genius, and Teach Yourself VISUALLY Windows 10. Paul encourages all readers to drop by his Web site, www.mcfedries.com.CHAPTER 1 GETTING STARTED WITH WINDOWSExplore the PC Screen 4Explore the Tablet Screen 5Start and Close an App 6Connect to Your Wireless Network 8Put Windows to Sleep 10Restart or Shut Down Windows 11Switch to a Microsoft Account 12Install an App 16Switch Between Running Apps 18Uninstall an App 20CHAPTER 2 CUSTOMIZING WINDOWSPin an App to the Start Menu 24Open the Settings App 26Change the Lock Screen Background 28Add an App to the Lock Screen 30Synchronize Settings Between PCs 32Access an App’s Features 34Pin an App to the Taskbar 36Adjust the Volume 38Set the Time Zone 39Configure Windows to Work with Multiple Monitors 40Customize the Taskbar’s Notification Area 42Set Up Multiple Desktops 44CHAPTER 3 SURFING THE WEBOpen a Web Page 48Open a Web Page in a Tab 50Navigate Web Pages 52Find Text on a Page 53Navigate with the History List 54Change Your Startup Page 56Save Favorite Web Pages 58Take Advantage of the Favorites Bar 60Share a Web Page 62Search for Sites 64Download a File 66CHAPTER 4 SENDING AND RECEIVING EMAIL CONFIGURE AN EMAIL ACCOUNT 70Send an Email Message 72Format the Message Text 74Add a File Attachment 76Save a Draft of a Message 78Receive and Read Email Messages 80Reply to a Message 82Forward a Message 84Open and Save an Attachment 86Delete a Message 88Create a Folder for Saving Messages 90Configure Mail Options 92CHAPTER 5 GETTING SOCIAL WITH WINDOWS CREATE A CONTACT 96Add Your Google Account 98Add Your iCloud Account 100View a Contact 102Edit a Contact 104Assign a Photo to a Contact 106Add Extra Fields to a Contact 108Filter the Contacts List 110Combine Multiple Profiles for a Contact 112View Your Calendar 114Add an Event to Your Calendar 116Create a Recurring Event 118Add an Event Reminder 119Send or Respond to an Event Invitation 120Customize Your Calendar 122CHAPTER 6 PERFORMING DAY-TO-DAY TASKS WITH APPS SEARCH YOUR PC 126Configure the Cortana Voice Assistant 128Control Your PC with Cortana 130Configure Skype 132Call Someone Using Skype 134Display a Location on a Map 136Get Directions to a Location 138Check Your Weather Forecast 140Check Another City’s Weather Forecast 142Perform Calculations 144Record a Voice Memo 146Set an Alarm 148Write a Note 150CHAPTER 7 WORKING WITH IMAGES IMPORT IMAGES FROM A DIGITAL CAMERA 154Scan an Image 156Navigate the Pictures Folder 158View Your Images 160Start a Slide Show 162Repair an Image 164Add a Photo Effect 166Crop an Image 168Rotate an Image 170Delete an Image 171Print an Image 172Take a Picture with Your PC Camera 174CHAPTER 8 WORKING WITH MULTIMEDIA IMPORT VIDEOS FROM A DIGITAL CAMERA 178Navigate the Videos Folder 180Watch a Video 182Edit a Video 184Make a Movie 188Play a Music CD 192Copy Tracks from a Music CD 196Navigate the Music Folder 198Play Music 200Create a Playlist 202Switch Between Audio Devices 204CHAPTER 9 EDITING DOCUMENTS CREATE AND SAVE A DOCUMENT 208Open a Document 210Change the Text Font 212Find Text 214Replace Text 216Insert Special Symbols 218Make a Copy of a Document 220Create a OneNote Notebook 222Add Pages and Sections to a Notebook 224Add Text Notes 226Add an Image to a Notebook Page 228Work with Notebook Lists 230Print a Document 232CHAPTER 10 WORKING WITH FILES SELECT A FILE 236Change the File View 238Preview a File 239Copy a File 240Move a File 241Rename a File 242Create a New File 243Delete a File 244Restore a Deleted File 245Add a File to Your OneDrive 246Extract Files from a Compressed Folder 248Specify a Different Program When Opening a File 250CHAPTER 11 SHARING YOUR COMPUTER DISPLAY USER ACCOUNTS 254Create a User Account 256Switch Between Accounts 258Change Your User Account Picture 260Change a User’s Password 262Delete an Account 264Add a Child to Your PC 266Set Restrictions on a Child Account 268Share a Document or Folder 270View Network Resources 272Chapter 12 Getting More from a Tablet PC Understanding Gestures 276Using Gestures to Control Windows 278Input Text with the Touch Keyboard 280Configure the Touch Keyboard 282Configure Your Tablet to Work with a Second Monitor 284Adjust Screen Brightness 286Monitor Battery Life 287CHAPTER 13 IMPLEMENTING SECURITY UNDERSTANDING WINDOWS SECURITY 290Check for Security Problems 292Create a Picture Password 294Sign In with a PIN 298Set Up a Fingerprint Sign‐In 300Lock Your Computer 302Configure Your PC to Lock Automatically 304Browse the Web Privately 306Control Your Private Information 308Clear Your Activity History 310CHAPTER 14 MAINTAINING WINDOWS CHECK HARD DRIVE FREE SPACE 314Delete Unnecessary Files 316Refresh Your Computer 318Create a Recovery Drive 320Keep a History of Your Files 322Restore a File from Your History 324Check Your Hard Drive for Errors 326Check Your Devices for Errors 328Index 33

Regulärer Preis: 19,99 €
Produktbild für Django Standalone Apps

Django Standalone Apps

Develop standalone Django apps to serve as the reusable building blocks for larger Django projects. This book explores best practices for publishing these apps, with special considerations for testing Django apps, and strategies for extracting existing functionality into a separate package.This jumpstart reference is divided into four distinct and sequential sections, all containing short, engaging chapters that can be read in a modular fashion, depending on your level of experience. The first section covers the structure and scope of standalone Django apps. The second section digs into questions about pulling code out of existing projects and into new standalone apps for reuse. The third section details additional, advanced technical best practices toward making standalone apps as broadly useful as possible. The fourth and final section covers strategies for managing a published Django app.Django Standalone Apps is the perfect resource for developers who have at least some prior experience working with Django web applications and want to simplify their deployments and share their knowledge as open source packages.WHAT YOU'LL LEARN* Scope a standalone Django app project for optimum usefulness* Extract code from existing projects to reuse* Test a standalone app outside of your Django project* Reuse your own code for increased delivery cadence and code quality* Review best practices for maintaining a Django app packageWHO THIS BOOK IS FORProfessional developers who work with Django. Deep expertise is not required or expected, but readers should have working familiarity with Django.Ben is cofounder of a web development consultancy and has been working professionally with Django for almost a decade. He has architected and led development on Django-based web applications including, custom content management systems, media platforms, and multi tenant back office solutions.He lives in the Rochester, NY, area, and graduated from the University of Virginia with a degree in Economics. Previously he managed the data and analytics services for a market research firm and was an IT strategy consultant for a global management consulting firm. His own standalone apps include Django Organizations, a long term project for managing multi user accounts in Django projects.Chapter 1: Defining the Scope of a Django Standalone AppChapter 2: Structuring Django Standalone AppsChapter 3: TestingChapter 4: Model MigrationsChapter 5: TemplatesChapter 6: Using Static FilesChapter 7: Namespacing in Your AppChapter 8: Creating a Basic PackageChapter 9: Scooping and Drawing BoundariesChapter 10: Separating Your AppChapter 11: Adding Your App Back InChapter 12: Handling App SettingsChapter 13: InternationalizationChapter 14: Managing Version CompatibilityChapter 15: Mixed Dependency SupportChapter 16: ModularityChapter 17: Better PackagingChapter: 18: LicensingChapter: 19: Documenting Your Standalone AppChapter 20: Additional TestingChapter 21: AutomatingChapter 22: Databases and other backend specific considerationsChapter 23: CollaboratingChapter 24: Using App Templates

Regulärer Preis: 46,99 €
Produktbild für Securing Critical Infrastructures

Securing Critical Infrastructures

This book explains the modern techniques required to protect a cyber security critical infrastructure. Three fundamental techniques are presented, namely: network access control, physical access control, encryption and decryption techniques.Dr. Kamara had won two awards for community building in higher education and is an author of two other books:The Implications of Internet Usage, 2013The Impacts of Cognitive Theory on Human and Computer Science Development, 2016

Regulärer Preis: 3,49 €
Produktbild für Game Design und Produktion

Game Design und Produktion

Dieses Grundlagenlehrbuch für angehende Computerspieldesigner erläutert zunächst die allgemeinen Zusammenhänge des menschlichen Spielens. Dabei kommt es dem Autor auch darauf an, die Übergänge zu den neuen vernetzten Medien und den Gemeinschaften in den sogenannten virtuellen Räumen zu betrachten.Im weiteren Verlauf wird der Stand der Technik bezüglich der Produktion von Computerspielen beschrieben, wobei auf die Spielentwicklung (Game Design) ebenso eingegangen wird wie auf die Programmierung, Funktionsweisen und Jobprofile der Spieleindustrie. Hier liegt der Schwerpunkt auf allgemeinen Prinzipien, da die Computertechnologie einem sehr schnellen Wandel unterliegt.Das Buch verweist in Kästen und Anmerkungen auf einschlägige Literatur, Spiele und andere Medien und soll so zur Vertiefung des Gebiets anregen. Zudem gibt das Buch einen Überblick über Spielformen von Online- und Offline-Spielen und klärt Kernbegriffe des Aufbaus von Computerspielen. Anschaulich geschrieben, vermittelt dieses Lehrbuch wichtige Grundlagen des Designs und der Entwicklung von Computerspielen vor dem Hintergrund moderner spieltheoretischer Grundlagen.In der zweiten Auflage: Aktualisierung der Beispiele, neue Engines (Kapitel über die Unreal Engine), Technik, Technologie, Skills. Prof. Gunther Rehfeld lehrt am Department Medientechnik der HAW Hamburg und forscht zu Online-Computerspielen, Dramaturgie und aktivierenden Spielformaten.

Regulärer Preis: 34,99 €
Produktbild für Linux Bible

Linux Bible

THE INDUSTRY FAVORITE LINUX GUIDELinux Bible, 10th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. this updated tenth edition covers the latest versions of Red Hat Enterprise Linux (RHEL 8), Fedora 30, and Ubuntu 18.04 LTS. It includes information on cloud computing, with new guidance on containerization, Ansible automation, and Kubernetes and OpenShift. With a focus on RHEL 8, this new edition teaches techniques for managing storage, users, and security, while emphasizing simplified administrative techniques with Cockpit. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow.This useful guide assumes a base of little or no Linux knowledge, and takes you step by step through what you need to know to get the job done.* Get Linux up and running quickly* Master basic operations and tackle more advanced tasks* Get up to date on the recent changes to Linux server system management* Bring Linux to the cloud using Openstack and Cloudforms* Simplified Linux administration through the Cockpit Web Interface * Automated Linux Deployment with Ansible * Learn to navigate Linux with Amazon (AWS), Google (GCE), and Microsofr Azure Cloud services Linux Bible, 10th Edition is the one resource you need, and provides the hands-on training that gets you on track in a flash.CHRISTOPHER NEGUS has been teaching and writing about Linux and UNIX for more than 25 years. He is an instructor and principal technical writer for Red Hat, Inc., and the author of dozens of Linux and UNIX books, including Red Hat Linux Bible (all editions), CentOS Bible, Fedora Bible, Ubuntu Linux Toolbox, Linux Troubleshooting Bible, Linux Toys, and Linux Toys II.Acknowledgments xiIntroduction xxxvPART I: GETTING STARTED 1CHAPTER 1: STARTING WITH LINUX 3Understanding What Linux Is 4Understanding How Linux Differs from Other Operating Systems 6Exploring Linux History 7Free-flowing UNIX culture at Bell Labs 7Commercial UNIX 9GNU transitions UNIX to freedom 11BSD loses some steam 12Linus builds the missing piece 13OSI open source definition 14Understanding How Linux Distributions Emerged 16Choosing a Red Hat distribution 16Choosing Ubuntu or another Debian distribution 19Finding Professional Opportunities with Linux Today 19Understanding how companies make money with Linux 20Becoming Red Hat certified 21Summary 25CHAPTER 2: CREATING THE PERFECT LINUX DESKTOP 27Understanding Linux Desktop Technology 28Starting with the Fedora GNOME Desktop Live image 30Using the GNOME 3 Desktop 31After the computer boots up 31Setting up the GNOME 3 desktop 38Extending the GNOME 3 desktop 39Starting with desktop applications 41Stopping the GNOME 3 desktop 46Using the GNOME 2 Desktop 46Using the Metacity window manager 48Changing GNOME’s appearance 49Using the GNOME panels 50Adding 3D effects with AIGLX 54Summary 57Exercises 57PART II: BECOMING A LINUX POWER USER 59CHAPTER 3: USING THE SHELL 61About Shells and Terminal Windows 62Using the shell prompt 63Using a Terminal window 63Using virtual consoles 65Choosing Your Shell 65Running Commands 66Understanding command syntax 67Locating commands 70Recalling Commands Using Command History 72Command-line editing 73Command-line completion 75Command-line recall 76Connecting and Expanding Commands 78Piping between commands 78Sequential commands 79Background commands 79Expanding commands 80Expanding arithmetic expressions 80Expanding variables 80Using Shell Variables 81Creating and using aliases 81Exiting the shell 83Creating Your Shell Environment 84Configuring your shell 84Setting your prompt 85Adding environment variables 87Getting Information about Commands 88Summary 90Exercises 90CHAPTER 4: MOVING AROUND THE FILESYSTEM 93Using Basic Filesystem Commands 96Using Metacharacters and Operators 98Using file-matching metacharacters 98Using file-redirection metacharacters 99Using brace expansion characters 101Listing Files and Directories 101Understanding File Permissions and Ownership 105Changing permissions with chmod (numbers) 106Changing permissions with chmod (letters) 107Setting default file permission with umask 108Changing file ownership 109Moving, Copying, and Removing Files 109Summary 111Exercises 111CHAPTER 5: WORKING WITH TEXT FILES 113Editing Files with vim and vi 113Starting with vi 115Skipping around in the file 119Searching for text 119Using ex mode 120Learning more about vi and vim 120Finding Files 120Using locate to find files by name 121Searching for files with find 122Searching in files with grep 128Summary 129Exercises 129CHAPTER 6: MANAGING RUNNING PROCESSES 131Understanding Processes 131Listing Processes 132Listing processes with ps 132Listing and changing processes with top 134Listing processes with System Monitor 136Managing Background and Foreground Processes 137Starting background processes 138Using foreground and background commands 139Killing and Renicing Processes140Killing processes with kill and killall 140Setting processor priority with nice and renice 142Limiting Processes with cgroups 143Summary 144Exercises 145CHAPTER 7: WRITING SIMPLE SHELL SCRIPTS 147Understanding Shell Scripts 147Executing and debugging shell scripts 148Understanding shell variables 149Performing arithmetic in shell scripts 152Using programming constructs in shell scripts 153Trying some useful text manipulation programs 159Using simple shell scripts 161Summary 163Exercises 163PART III: BECOMING A LINUX SYSTEM ADMINISTRATOR 165CHAPTER 8: LEARNING SYSTEM ADMINISTRATION 167Understanding System Administration 167Using Graphical Administration Tools 169Using the root User Account 174Exploring Administrative Commands, Configuration Files, and Log Files 178Administrative commands 178Administrative configuration files 179Using Other Administrative Accounts 185Checking and Configuring Hardware 186Checking your hardware 187Managing removable hardware 189Working with loadable modules 191Summary 193Exercises 193CHAPTER 9: INSTALLING LINUX 195Choosing a Computer 196Installing Fedora from Live Media 198Installing Red Hat Enterprise Linux from Installation Media 201Understanding Cloud-Based Installations 204Installing Linux in the Enterprise 205Exploring Common Installation Topics 207Upgrading or installing from scratch 207Dual booting 208Installing Linux to run virtually 209Using installation boot options 210Using specialized storage 213Partitioning hard drives 214Using the GRUB boot loader 217Summary 219Exercises 219CHAPTER 10: GETTING AND MANAGING SOFTWARE 221Managing Software on the Desktop 221Going Beyond the Software Window 223Understanding Linux RPM and DEB Software Packaging 224Understanding DEB packaging 225Understanding RPM packaging 226Managing RPM Packages with YUM 229Transitioning from yum to dnf 229Understanding how yum works 229Using YUM with third-party software repositories 233Managing software with the yum command 233Installing, Querying, and Verifying Software with the rpm Command 241Installing and removing packages with rpm 241Querying rpm information 242Verifying RPM packages 244Managing Software in the Enterprise 245Summary 246Exercises 247CHAPTER 11: MANAGING USER ACCOUNTS 249Creating User Accounts 249Adding users with useradd 252Setting user defaults 255Modifying users with usermod 257Deleting users with userdel 258Understanding Group Accounts 259Using group accounts 259Creating group accounts 260Managing Users in the Enterprise 261Setting permissions with Access Control Lists 262Centralizing User Accounts 269Summary 270Exercises 270CHAPTER 12: MANAGING DISKS AND FILESYSTEMS 273Understanding Disk Storage 273Partitioning Hard Disks 275Understanding partition tables 275Viewing disk partitions 276Creating a single-partition disk 277Creating a multiple-partition disk 281Using Logical Volume Manager Partitions 285Checking an existing LVM 286Creating LVM logical volumes 289Growing LVM logical volumes 290Mounting Filesystems 291Supported filesystems 291Enabling swap areas 293Disabling swap area 294Using the fstab file to define mountable file systems 295Using the mount command to mount file systems 297Mounting a disk image in loopback 298Using the umount command 299Using the mkfs Command to Create a Filesystem 300Managing Storage with Cockpit 301Summary 303Exercises 303PART IV: BECOMING A LINUX SERVER ADMINISTRATOR 305CHAPTER 13: UNDERSTANDING SERVER ADMINISTRATION 307Starting with Server Administration 308Step 1: Install the server 308Step 2: Configure the server 310Step 3: Start the server 311Step 4: Secure the server 312Step 5: Monitor the server 314Checking and Setting Servers 316Managing Remote Access with the Secure Shell Service 316Starting the openssh-server service 317Using SSH client tools 318Using key-based (passwordless) authentication 324Configuring System Logging 326Enabling system logging with rsyslog 326Watching logs with logwatch 331Checking System Resources with sar 332Checking System Space 334Displaying system space with df 334Checking disk usage with du 334Finding disk consumption with find 335Managing Servers in the Enterprise 336Summary 336Exercises 337CHAPTER 14: ADMINISTERING NETWORKING 339Configuring Networking for Desktops 340Checking your network interfaces 342Configuring network interfaces 349Configuring a network proxy connection 352Configuring Networking from the Command Line 353Configure networking with nmtui 354Editing a NetworkManager TUI connection 354Understanding networking configuration files 355Setting alias network interfaces 360Setting up Ethernet channel bonding 361Setting custom routes 363Configuring Networking in the Enterprise 364Configuring Linux as a router 364Configuring Linux as a DHCP server 365Configuring Linux as a DNS server 365Configuring Linux as a proxy server 366Summary 366Exercises 367CHAPTER 15: STARTING AND STOPPING SERVICES 369Understanding the Initialization Daemon (init or systemd) 370Understanding the classic init daemons 371Understanding systemd initialization 377Checking the Status of Services 384Checking services for SysVinit systems 385Stopping and Starting Services 387Stopping and starting SysVinit services 387Enabling Persistent Services 391Configuring persistent services for SysVinit 391Configuring a Default Runlevel or Target Unit 394Configuring the SysVinit default runlevel 394Adding New or Customized Services 396Adding new services to SysVinit 396Adding new services to systemd 399Summary 401Exercises 401CHAPTER 16: CONFIGURING A PRINT SERVER 403Common UNIX Printing System 403Setting Up Printers 405Adding a printer automatically 405Using web-based CUPS administration 406Using the Print Settings window 409Working with CUPS Printing 415Configuring the CUPS server (cupsdconf) 415Starting the CUPS server 417Configuring CUPS printer options manually 417Using Printing Commands 418Printing with lp 419Listing status with lpstat -t 419Removing print jobs with lprm 419Configuring Print Servers 420Configuring a shared CUPS printer 420Configuring a shared Samba printer 422Summary 424Exercises 424CHAPTER 17: CONFIGURING A WEB SERVER 427Understanding the Apache Web Server 427Getting and Installing Your Web Server 428Understanding the httpd package 428Installing Apache 431Starting Apache 432Securing Apache 433Understanding the Apache configuration files 435Adding a virtual host to Apache 440Allowing users to publish their own web content 442Securing your web traffic with SSL/TLS 443Troubleshooting Your Web Server 449Checking for configuration errors 449Accessing forbidden and server internal errors 451Summary 453Exercises 453CHAPTER 18: CONFIGURING AN FTP SERVER 455Understanding FTP 455Installing the vsftpd FTP Server 457Starting the vsftpd Service 458Securing Your FTP Server 461Opening up your firewall for FTP 461Configuring SELinux for your FTP server 463Relating Linux file permissions to vsftpd 465Configuring Your FTP Server 465Setting up user access 465Allowing uploading 467Setting up vsftpd for the Internet 468Using FTP Clients to Connect to Your Server 469Accessing an FTP server from Firefox 470Accessing an FTP server with the lftp command 470Using the gFTP client 472Summary 473Exercises 473CHAPTER 19: CONFIGURING A WINDOWS FILE SHARING (SAMBA) SERVER 475Understanding Samba 475Installing Samba 476Starting and Stopping Samba 478Starting the Samba (smb) service 478Starting the NetBIOS (nmbd) name server 480Stopping the Samba (smb) and NetBIOS (nmb) services 481Securing Samba 482Configuring firewalls for Samba 482Configuring SELinux for Samba 484Configuring Samba host/user permissions 486Configuring Samba 486Configuring the [global] section 486Configuring the [homes] section487Configuring the [printers] section 489Accessing Samba Shares 493Accessing Samba shares in Linux 493Accessing Samba shares in Windows 496Using Samba in the Enterprise 497Summary 497Exercises 498CHAPTER 20: CONFIGURING AN NFS FILE SERVER 499Installing an NFS Server 502Starting the NFS service 502Sharing NFS Filesystems 503Configuring the /etc/exports file 504Exporting the shared filesystems 507Securing Your NFS Server 508Opening up your firewall for NFS 508Allowing NFS access in TCP wrappers 510Configuring SELinux for your NFS server 511Using NFS Filesystems 512Viewing NFS shares 512Manually mounting an NFS filesystem 512Mounting an NFS filesystem at boot time 513Using autofs to mount NFS filesystems on demand 517Unmounting NFS filesystems 520Summary 521Exercises 521CHAPTER 21: TROUBLESHOOTING LINUX 523Boot-Up Troubleshooting 523Understanding Startup Methods 524Starting from the firmware (BIOS or UEFI) 526Troubleshooting the GRUB boot loader 528GRUB 2 Boot loader 530Starting the kernel 532Troubleshooting Software Packages 542Fixing RPM databases and cache 545Troubleshooting Networking 547Troubleshooting outgoing connections 547Troubleshooting incoming connections 550Troubleshooting Memory 553Uncovering memory issues 554Troubleshooting in Rescue Mode 559Summary 561Exercises 561PART V: LEARNING LINUX SECURITY TECHNIQUES 563CHAPTER 22: UNDERSTANDING BASIC LINUX SECURITY 565Implementing Physical Security 565Implementing disaster recovery 566Securing user accounts 566Securing passwords 570Securing the filesystem 576Managing software and services 579Advanced implementation 580Monitoring Your Systems 580Monitoring log files 581Monitoring user accounts 584Monitoring the filesystem 587Auditing and Reviewing Linux 595Conducting compliance reviews 595Conducting security reviews 596Summary 596Exercises 597CHAPTER 23: UNDERSTANDING ADVANCED LINUX SECURITY 599Implementing Linux Security with Cryptography 599Understanding hashing 600Understanding encryption/decryption 602Implementing Linux cryptography 610Implementing Linux Security with PAM 618Understanding the PAM authentication process 619Administering PAM on your Linux system 622Obtaining more information on PAM 633Summary 633Exercises 633CHAPTER 24: ENHANCING LINUX SECURITY WITH SELINUX 635Understanding SELinux Benefits 635Understanding How SELinux Works 637Understanding Type Enforcement 637Understanding Multi-Level Security 638Implementing SELinux security models 639Configuring SELinux 645Setting the SELinux mode 645Setting the SELinux policy type 647Managing SELinux security contexts 648Managing SELinux policy rule packages 651Managing SELinux via Booleans 653Monitoring and Troubleshooting SELinux 654Understanding SELinux logging 654Troubleshooting SELinux logging 656Troubleshooting common SELinux problems 657Putting It All Together 659Obtaining More Information on SELinux 659Summary 660Exercises 660CHAPTER 25: SECURING LINUX ON A NETWORK 663Auditing Network Services 663Evaluating access to network services with nmap 665Using nmap to audit your network services advertisements 668Working with Firewalls 672Understanding firewalls 673Implementing firewalls 674Summary 688Exercises 688PART VI: ENGAGING WITH CLOUD COMPUTING 691CHAPTER 26: SHIFTING TO CLOUDS AND CONTAINERS 693Understanding Linux Containers 694Namespaces 695Container registries 695Base images and layers 696Starting with Linux Containers 697Pulling and running containers 697Starting and stopping containers 701Building a container image 702Tagging and pushing an image to a registry 705Using containers in the enterprise 706Summary 706Exercises 707CHAPTER 27: USING LINUX FOR CLOUD COMPUTING 709Overview of Linux and Cloud Computing 710Trying Basic Cloud Technology 713Setting Up a Small Cloud 714Configuring hypervisors 715Configuring storage 718Creating virtual machines 720Managing virtual machines 724Migrating virtual machines 725Summary 727Exercises 727CHAPTER 28: DEPLOYING LINUX TO THE CLOUD 729Getting Linux to Run in a Cloud 729Creating Linux Images for Clouds 731Configuring and running a cloud-init cloud instance 731Investigating the cloud instance 733Cloning the cloud instance 734Using cloud-init in enterprise computing 738Using OpenStack to Deploy Cloud Images 739Starting from the OpenStack Dashboard 739Using Amazon EC2 to Deploy Cloud Images 744Summary 746Exercises 746CHAPTER 29: AUTOMATING APPS AND INFRASTRUCTURE WITH ANSIBLE 749Understanding Ansible 750Exploring Ansible Components 751Inventories 751Playbooks 752Stepping Through an Ansible Deployment 753Installing Ansible 756Running Ad-Hoc Ansible Commands 760Automating Tasks with Ansible Tower Automation Framework 762Summary 763Exercises 763CHAPTER 30: DEPLOYING APPLICATIONS AS CONTAINERS WITH KUBERNETES 765Understanding Kubernetes 766Kubernetes masters 766Kubernetes workers 767Kubernetes applications 767Kubernetes interfaces 768Trying Kubernetes 768Getting Kubernetes 769Running the Kubernetes Basics tutorial 771Enterprise-Quality Kubernetes with OpenShift 782Summary 783Exercises 783PART VII: APPENDIXES 785Appendix A: Media 787Appendix B: Exercise Answers 797Index 863

Regulärer Preis: 40,99 €
Produktbild für SAS Stored Processes

SAS Stored Processes

Customize the SAS Stored Process web application to create amazing tools for end users. This book shows you how to use stored processes—SAS programs stored on a server and executed as required by requesting applications.Never before have there been so many ways to turn data into information and build applications with SAS. This book teaches you how to use the web technologies that you frequently see used on impressive websites. By using SAS STORED PROCESSES, you will be able to build applications that exploit CSS, JavaScript, and HTML libraries and enable you to build powerful and impressive web applications using SAS as the backend.While this approach is not common with SAS users, some have had amazing results. People who have SAS skills usually do not have web development skills, and those with web development skills usually do not have SAS skills. Some people have both skills but are unaware of how to connect them with the SAS Stored Process web application. This book shows you how to leverage your skills for success.WHAT YOU WILL LEARN* Know the benefits of stored processes* Write your own tools in SAS* Make a stored process generate its own HTML menu* Pass data between stored processes* Use stored processes to generate pure JavaScript* Utilize data generated by SAS* Convert a SAS program into a stored processWHO THIS BOOK IS FORSAS programmers looking to improve their existing programming skills to develop web applications, and programming managers who want to make better use of the SAS software they already licensePHILIP MASON is a SAS expert with 34 years of experience. He shares his expertise with others in many industries. Over the last few years he has been working on building web applications using SAS and other technologies. For most of the last decade Phil has enjoyed working around SAS architecture, and has been mentoring and training people in SAS. He has worked with big data, business intelligence, analytics, and tuning and building web applications using SAS Stored Processes, HTML, and JavaScript. He is the author of several books on SAS.

Regulärer Preis: 52,99 €
Produktbild für Thinking in Pandas

Thinking in Pandas

Understand and implement big data analysis solutions in pandas with an emphasis on performance. This book strengthens your intuition for working with pandas, the Python data analysis library, by exploring its underlying implementation and data structures.Thinking in Pandas introduces the topic of big data and demonstrates concepts by looking at exciting and impactful projects that pandas helped to solve. From there, you will learn to assess your own projects by size and type to see if pandas is the appropriate library for your needs. Author Hannah Stepanek explains how to load and normalize data in pandas efficiently, and reviews some of the most commonly used loaders and several of their most powerful options. You will then learn how to access and transform data efficiently, what methods to avoid, and when to employ more advanced performance techniques. You will also go over basic data access and munging in pandas and the intuitive dictionary syntax. Choosing the right DataFrame format, working with multi-level DataFrames, and how pandas might be improved upon in the future are also covered.By the end of the book, you will have a solid understanding of how the pandas library works under the hood. Get ready to make confident decisions in your own projects by utilizing pandas—the right way.WHAT YOU WILL LEARN* Understand the underlying data structure of pandas and why it performs the way it does under certain circumstances* Discover how to use pandas to extract, transform, and load data correctly with an emphasis on performance* Choose the right DataFrame so that the data analysis is simple and efficient.* Improve performance of pandas operations with other Python librariesWHO THIS BOOK IS FORSoftware engineers with basic programming skills in Python keen on using pandas for a big data analysis project. Python software developers interested in big data.Hannah Stepanek is a software developer with a passion for performance and is an open source advocate. She has over seven years of industry experience programming in Python and spent about two of those years implementing a data analysis project using pandas.Hannah was born and raised in Corvallis, OR, and graduated from Oregon State University with a major in Electrical Computer Engineering. She enjoys engaging with the software community, often giving talks at local meetups as well as larger conferences. In early 2019, she spoke at PyCon US about the pandas library and at OpenCon Cascadia about the benefits of open source software. In her spare time she enjoys riding her horse Sophie and playing board games.

Regulärer Preis: 46,99 €
Produktbild für Robust Methods for Dense Monocular Non-Rigid 3D Reconstruction and Alignment of Point Clouds

Robust Methods for Dense Monocular Non-Rigid 3D Reconstruction and Alignment of Point Clouds

Vladislav Golyanik proposes several new methods for dense non-rigid structure from motion (NRSfM) as well as alignment of point clouds. The introduced methods improve the state of the art in various aspects, i.e. in the ability to handle inaccurate point tracks and 3D data with contaminations. NRSfM with shape priors obtained on-the-fly from several unoccluded frames of the sequence and the new gravitational class of methods for point set alignment represent the primary contributions of this book.ABOUT THE AUTHOR:VLADISLAV GOLYANIK is currently a postdoctoral researcher at the Max Planck Institute for Informatics in Saarbrücken, Germany. The current focus of his research lies on 3D reconstruction and analysis of general deformable scenes, 3D reconstruction of human body and matching problems on point sets and graphs. He is interested in machine learning (both supervised and unsupervised), physics-based methods as well as new hardware and sensors for computer vision and graphics (e.g., quantum computers and event cameras).VLADISLAV GOLYANIK is currently a postdoctoral researcher at the Max Planck Institute for Informatics in Saarbrücken, Germany. The current focus of his research lies on 3D reconstruction and analysis of general deformable scenes, 3D reconstruction of human body and matching problems on point sets and graphs. He is interested in machine learning (both supervised and unsupervised), physics-based methods as well as new hardware and sensors for computer vision and graphics (e.g., quantum computers and event cameras).Scalable Dense Non-rigid Structure from Motion.- Shape Priors in Dense Non-rigid Structure from Motion.- Probabilistic Point Set Registration with Prior Correspondences.- Point Set Registration Relying on Principles of Particle Dynamics.

Regulärer Preis: 96,29 €
Produktbild für Discord For Dummies

Discord For Dummies

CONNECT WITH THE NEWEST AND MOST VIBRANT ONLINE COMMUNITYThough it was originally a virtual meeting place primarily for gamers, Discord’s userbase has quintupled in size in just two years and branched to include discussions on a multitude of topics. Discord For Dummies shows readers how to connect with the massive Discord audience, both within and well beyond the gaming niche.Celebrated writer, broadcaster, gamer, and technologist Tee Morris teaches readers how to set up a profile, establish channels, and join other conversations. Along the way, he’ll show you how to grow your audience and utilize Discord in your business. You’ll also learn to:· Play by the rules of Discord, both written and unwritten· Build a Discord studio· Create a community· Acquire must-have accessoriesWith an audience of over 250,000,000 active users, you can’t afford to ignore the Discord community. Discord For Dummies is perfect for businesses seeking a larger audience, established media looking for a presence in private chat, and groups looking to organize their communication.TEE MORRIS is a writer, broadcaster, and cutting-edge technologist. An early adopter of using social media to reach audiences for his sci-fi and fantasy novels, he continues to blog, podcast, and stream content of all kinds. He's the author of Twitch For Dummies and co-author of Podcasting For Dummies.

Regulärer Preis: 16,99 €
Produktbild für Artificial Intelligence for Business

Artificial Intelligence for Business

Artificial Intelligence for Business: A Roadmap for Getting Started with AI will provide the reader with an easy to understand roadmap for how to take an organization through the adoption of AI technology. It will first help with the identification of which business problems and opportunities are right for AI and how to prioritize them to maximize the likelihood of success. Specific methodologies are introduced to help with finding critical training data within an organization and how to fill data gaps if they exist. With data in hand, a scoped prototype can be built to limit risk and provide tangible value to the organization as a whole to justify further investment. Finally, a production level AI system can be developed with best practices to ensure quality with not only the application code, but also the AI models. Finally, with this particular AI adoption journey at an end, the authors will show that there is additional value to be gained by iterating on this AI adoption lifecycle and improving other parts of the organization. JEFFREY L. COVEYDUC is Vice President and Master Inventor at IBM. His diverse background consists of positions that encompass the creation of innovative, technologically advanced global AI solutions and client adoption. JASON L. ANDERSON is a Partner and CTO with the data consultancy, Comp Three, where he established a new AI line of business. He is also a former IBM Cognitive Architect and Master Inventor. He received both BS and MS degrees in Computer Science from California Polytechnic State University, SLO. Preface ixAcknowledgments xiCHAPTER 1 INTRODUCTION 1Case Study #1: FANUC Corporation 2Case Study #2: H&R Block 4Case Study #3: BlackRock, Inc. 5How to Get Started 6The Road Ahead 10Notes 11CHAPTER 2 IDEATION 13An Artificial Intelligence Primer 13Becoming an Innovation-Focused Organization 23Idea Bank 25Business Process Mapping 27Flowcharts, SOPs, and You 28Information Flows 29Coming Up with Ideas 31Value Analysis 31Sorting and Filtering 34Ranking, Categorizing, and Classifying 35Reviewing the Idea Bank 37Brainstorming and Chance Encounters 38AI Limitations 41Pitfalls 44Action Checklist 45Notes 46CHAPTER 3 DEFINING THE PROJECT 47The What, Why, and How of a Project Plan 48The Components of a Project Plan 49Approaches to Break Down a Project 53Project Measurability 62Balanced Scorecard 63Building an AI Project Plan 64Pitfalls 66Action Checklist 69CHAPTER 4 DATA CURATION AND GOVERNANCE 71Data Collection 73Leveraging the Power of Existing Systems 81The Role of a Data Scientist 81Feedback Loops 82Making Data Accessible 84Data Governance 85Are You Data Ready? 89Pitfalls 90Action Checklist 94Notes 94CHAPTER 5 PROTOTYPING 97Is There an Existing Solution? 97Employing vs. Contracting Talent 99Scrum Overview 101User Story Prioritization 103The Development Feedback Loop 105Designing the Prototype 106Technology Selection 107Cloud APIs and Microservices 110Internal APIs 112Pitfalls 112Action Checklist 114Notes 114CHAPTER 6 PRODUCTION 117Reusing the Prototype vs. Starting from a Clean Slate 117Continuous Integration 119Automated Testing 124Ensuring a Robust AI System 128Human Intervention in AI Systems 129Ensure Prototype Technology Scales 131Cloud Deployment Paradigms 133Cloud API’s SLA 135Continuing the Feedback Loop 135Pitfalls 135Action Checklist 137Notes 137CHAPTER 7 THRIVING WITH AN AI LIFECYCLE 139Incorporate User Feedback 140AI Systems Learn 142New Technology 144Quantifying Model Performance 145Updating and Reviewing the Idea Bank 147Knowledge Base 148Building a Model Library 150Contributing to Open Source 155Data Improvements 157With Great Power Comes Responsibility 158Pitfalls 159Action Checklist 161Notes 161CHAPTER 8 CONCLUSION 163The Intelligent Business Model 164The Recap 164So What are You Waiting For? 168APPENDIX A AI EXPERTS 169AI Experts 169Chris Ackerson 169Jeff Bradford 173Nathan S. Robinson 175Evelyn Duesterwald 177Jill Nephew 179Rahul Akolkar 183Steven Flores 187APPENDIX B ROADMAP ACTION CHECKLISTS 191Step 1: Ideation 191Step 2: Defining the Project 191Step 3: Data Curation and Governance 192Step 4: Prototyping 192Step 5: Production 193Thriving with an AI Lifecycle 193APPENDIX C PITFALLS TO AVOID 195Step 1: Ideation 195Step 2: Defining the Project 196Step 3: Data Curation and Governance 199Step 4: Prototyping 203Step 5: Production 204Thriving with an AI Lifecycle 206Index 209

Regulärer Preis: 25,99 €
Produktbild für Beginning Ring Programming

Beginning Ring Programming

Gain a gentle introduction to the world of Ring programming with clarity as a first concern using a lot of practical examples. The first part lays the foundations of the language and its basic features (data types, control structures, functions, and classes). The unique way to rigorously structure Ring programs is also explained.Then, in the second part you’ll discover Ring inputs, outputs, and what is in between. You’ll use the basic constructs of computer logic (sequence, selection, and iteration) to build simple and complex logic flows. You’ll go over the common mistakes that lead to code complexity, by example, and cover several strategies to solve them (refactoring, code cleansing, and good variable naming). Then, you’ll see a visual illustration of how Ring deals with scopes at the local, object, and global levels.In part three, you’ll play with two artifacts vital to Ring programming: functions and objects. You’ll learn how they can be composed to solve a problem and how advanced programming paradigms, such as declarative and natural, are beautifully implemented on top of them. As part of the discussion, you’ll also work on game programming. You’ll learn how you design your game declaratively, in Ring code, just as if you were designing it in visual software.Finally, the author lays out how programming can be understood in a gamified context. You will be told the truth about how gaming can be a better metaphor to achieve mastery of Ring programming.This book is for those who are passionate about writing beautiful, expressive, and learnable code. It has been designed so you can enjoy a beginner-friendly set of knowledge about Ring, and benefit from a one-stop collection of lessons learned from real-world, customer-facing programming projects.WHAT YOU WILL LEARN* Get started with Ring and master its data types, I/O, functions, and classes* Carry out structural, object-oriented, functional, declarative, natural, and meta programming in Ring* Use the full power of Ring to refactor program code and develop clean program architectures* Quickly design professional-grade video games on top of the Ring game engineWHO THIS BOOK IS FORBeginners looking for a consistent and hackable programming environment with a strong flavor of learnability and expressiveness.Mansour Ayouni is one of the leading contributors to the new Ring programming language. He wrote his first BASIC computer statement, in the mid-80s, using only pen and paper, when he was 10 years old. It wasn’t in a California garage though nor under the lights of the prestigious Evil tour of Paris, but in the rural village of Regueb in the center of Tunisia (North Africa) where there was no electricity nor computers at all. Over the years, programming took him in an otherwise impossible international journey. From Tunisia, to Niger, to Canada, he contributed to the development of dozens of software products ranging from lawyer office management solutions to banking and nuclear waste management systems. During his career, he used to oversee programmers from three cultures and lead software teams in various companies such as Whitecape, Keyrus, and Webgenetics. Now, he is a member of the Ring core team and running Kalidia Consulting helping businesses make effective software. Chapter 1: Getting Started with RingChapter 2: Data Types in RingChapter 3: Ins of RingChapter 4: Outs of RingChapter 5: Ring AlgorithmsChapter 6: Juggling with ScopesChapter 7: Functions, Objects and BeyondChapter 8: Designing Games in RingChapter 9: A Gamified Foundation for Mastering RingAppendix A: A Dialogue with Mahmoud Fayed

Regulärer Preis: 66,99 €
Produktbild für Advanced Perl Programming

Advanced Perl Programming

William "Bo" Rothwell's Advanced Perl Programming continues where his previous book left off, more or less, as it guides you through advanced techniques of the Perl programming language starting with command-line options, references, and arrays and hashes from advanced data types. Next, you'll learn about typeglobs for symbolic entries.Additionally, you'll see advanced subroutine handling, then packages and namespaces. Furthermore, you'll build advanced modules and install CPAN modules. Unlike Java and C++, modules have been around in Perl for a long time now. Along the way, you'll learn and use POD mark up language for Perl documentation.Moreover, you'll get a survey of the many advanced features and data structures of the current Perl programming language. You'll also get a survey of the new features of the latest Perl 5.x release. After reading and using this book, you'll have the tools, techniques, and source code to be an expert Perl programmer.WHAT YOU WILL LEARN* Carry out command-line parsing and extract scripts * Create references; return values from a reference; work with the ref Function and strict refs* Work with advanced Perl data types using arrays, hashes, and hash of hashes * Use Typeglobs for symbol table entries * Build modules and install CPAN modules* Write documentation for Perl using POD * Work with the newest features in Perl, including the smartmatch operator, yada yada, automated regex modifiers, the CORE namespace and moreWHO THIS BOOK IS FORThose with experience with Perl or who have read Rothwell's prior books, Beginning Perl Programming and Pro Perl Programming. At the impressionable age of 14, William "Bo" Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a “Trash 80”). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this “computer thing” work. Since this experience, Bo’s passion for understanding how computers work and sharing this knowledge with others has resulting in a rewarding career in IT training. His experience includes Linux, Unix, DevOps tools, and programming languages such as Perl, Python, Tcl, and BASH.Chapter One Command Line Options1.1 Introducing Command Line Options1.2 Changing Input Record Separator1.3 Create a Loop Around Your Script1.4 Editing in Place1.5 Syntax Checking1.6 Pre-appending to @INC1.7 Including Modules1.8 Command Line Parsing1.9 Displaying Configuration Information1.10 Extracting Scripts from Messages1.11 Additional Resources1.12 Lab ExercisesChapter Two References2.1 What are References?2.2 Creating References2.3 Returning the Value from a Reference2.4 The ref Function2.5 Making Anonymous References2.6 References to Functions2.7 use strict ‘refs’2.8 Additional Resources2.9 Lab ExercisesChapter Three Advanced Data Types: Arrays3.1 Review: What You Should Already Know About Arrays3.2 What You Might Know About Arrays3.3 Arrays of Arrays3.4 Creating Arrays of Arrays3.5 Accessing Values in an Array of Arrays3.6 Adding a Sub Array (Row)3.7 Adding a column3.8 Printing an Array of Arrays3.9 Additional Resources3.10 Lab ExercisesChapter Four Advanced Data Types: Hashes4.1 Review: What You Should Already Know About Hashes4.2 What You Might Know About Hashes4.3 Hashes of Hashes4.4 Creating Hashes of Hashes4.5 Accessing Values in a Hash of Hashes4.6 Other Data Structures4.7 Additional Resources4.8 Lab ExercisesChapter Five Typeglobs5.1 Symbolic Tables5.2 Typeglobs5.3 Using typeglobs5.4 References vs. Typeglobs5.5 Avoiding Aliases to Entire Identifier5.6 Making constants5.7 Passing Filehandles into Functions5.8 Redefining a Function5.9 Temporarily Redefining a Function5.10 Additional Resources5.11 Lab ExercisesChapter Six Advanced Subroutine Handling6.1 Review: What You Should Already Know About Functions6.2 What You Might Know About Functions6.3 Making Persistent Function Variables6.4 Using the caller Function6.5 Passing Arguments by Reference6.6 Determining Functions Return Data6.7 Returning Multiple Values6.8 Exception Handling6.9 Constant Functions6.10 Prototypes6.11 Additional Resources6.12 Lab ExercisesChapter Seven Packages and Namespaces7.1 Scope7.2 Creating Namespaces with the package Command7.3 Fully Qualified Package Names7.4 Nested Packages7.5 use strict 'vars'7.6 Identifiers Not Affected by Packages7.7 Determine the Current Package7.8 Packages vs. my Variables7.9 Additional Resources7.10 Lab ExercisesChapter Eight Building Modules8.1 Introduction to Perl Modules8.2 Creating a Module8.3 BEGIN and END Blocks8.4 Symbol Tables in Modules8.5 Exporting Identifiers from Modules8.6 Private Identifiers8.7 Oking Symbols to Export from Modules8.8 Module Version Numbers8.9 use vs. require8.10 A Note About Library Files8.11 Additional Resources8.12 Lab ExercisesChapter Nine Installing CPAN Modules9.1 What is CPAN?9.2 Accessing CPAN9.3 CPAN Organization9.4 Installing a CPAN Module Manually9.5 Installing CPAN Modules Using the CPAN Module9.6 Using the Perl Package Manager to Install CPAN Modules9.7 Listing What Modules are Currently Installed9.8 Additional Resources9.9 Lab ExercisesChapter Ten POD10.1 Overview of POD10.2 POD Commands10.3 POD Text10.4 POD Verbatim10.5 POD Examples10.6 Common POD Problems10.7 POD Utilities10.8 Additional Resources10.9 Lab ExercisesChapter Eleven Advanced Features11.1 Perl development environments11.2 The power of the do statement11.3 autodie11.4 String variables as files11.5 File::Spec11.6 Proper use of soft references11.7 Install modules from CPAN without admin privileges11.8 Basic testing11.9 Advanced testing11.10 Using prove11.11 BenchmarkingChapter Twelve Advanced Data Structures12.1 Introduction to Benchmarking12.2 Use the Readonly module to create constants12.3 Make large numbers more readable12.4 Make use of Scalar::Util12.5 Make use of List::Util12.6 Make use of List::MoreUtils12.7 List formatting12.8 Understand slices12.9 Make use of Hash::Util12.10 Make use of Hash::MoreUtils12.11 Smart use of subscripts12.12 Understand the advantages and disadvantages of for, foreach, grep and map12.13 Know different sort techniques12.14 Avoid using memory to store large dataChapter Thirteen New Features12.1 Perl versions12.2 The latest/greatest?12.3 Changes by version12.4 The feature pragma12.5 Make use of the Smartmatch Operator12.6 The // operator12.7 The UNITCHECK block12.8 Yada yada12.9 The autodie pragma12.10 Using each, keys, values with arrays 12.11 New Regular Expression modifiers12.12 Non-destructive substation12.13 Automating Regular Expression modifiers12.14 New feature for given12.15 Change in use feature12.16 The CORE namespace12.17 Overriding Perl keywords

Regulärer Preis: 66,99 €