Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Investing in Revolutions

Investing in Revolutions

Take a deep dive into the life cycle of revolutionary technologies. This book is a pivotal read for anyone looking to navigate the burgeoning world of technology investment and serves as a crucial guide for those eager to delve into the complexities and immense potential of emerging technologies like Blockchain, Web3, AI, VR/AR, Quantum computing or Genomics.The book traces the growth journey of these various innovations, offering readers a comprehensive view of how technologies evolve, mature, and potentially (and eventually) transform markets and societies. What makes this book unique is its fusion of forward-looking insights with valuable historical context. It doesn't merely present a roadmap for the future; it anchors its guidance in lessons learned from past tech revolutions. This approach provides a robust framework for understanding not just where technology is heading, but also the why and how behind its trajectory.More than just an investment guide; it's a lens through which you can view the unfolding future of technology. The book offers a balanced view, recognizing the potential pitfalls and hype that often accompany emerging tech, while highlighting the genuine opportunities for creating wealth and driving innovation. Whether you're looking to make your first investment in a tech startup, diversify your portfolio with tech stocks, or simply gain a deeper understanding of how technological innovations shape our world, _Investing in Revolutions_ is an invaluable resource.WHAT YOU’LL LEARN* Identify emerging transformational technologies.* Understand the ecosystem and investment opportunities of these emerging technologies.* Differentiate between overhyped tech fads and technologies with real, sustainable impact.* Examine strategies for investing in the tech space, while carefully balancing the risk-reward equation.* Navigate uncertainties and make calculated decisions to maximize potential returns.WHO THIS BOOK IS FORInvestors, entrepreneurs, and tech enthusiastsTal Elyashiv is an entrepreneur, venture capitalist, serial investor, author of the bestseller, _Blockchain Prophecies_, and is the founder and managing partner of SPiCE VC, the best performing blockchain venture capital fund. With a background as a senior executive and change-maker at both Bank of America and Capital One, while also co-founding Securitize, the leading platform for tokenizing real world assets globally, Elyashiv seamlessly combines traditional finance experience with his visionary leadership in deep tech. This unique expertise makes him one of today’s preeminent voices and blue-flame thinkers on how to foresee, understand and capitalize on the emergence and convergence of revolutionary technologies.CHAPTER 1: Understanding the Technology Evolution Cycle Through History.- CHAPTER 2: Identifying the Trends and Spotting the Next Big Wave.- CHAPTER 3: Exponential Growth and the Laws That Drive Innovation.- CHAPTER 4: Inflection Points and the Difference Between Reality and Hype.- CHAPTER 5: The Convergence Effect.- CHAPTER 6: Technology Life Cycles, Waves and Darwinism.- CHAPTER 7: Technology Revolutions’ Cast of Corporate Characters.- CHAPTER 8: Investing in the Quantum Revolution: An Active, Not Passive, Pursuit.- CHAPTER 9: Quantum Revolution Investment Scenario Examples, or Putting Theory to Practice.- EPILOGUE: Embracing the Quantum Revolution – A Historic Opportunity.- APPENDIX A: Sources/Citations.

Regulärer Preis: 52,99 €
Produktbild für Creating ChatGPT Apps with JavaScript

Creating ChatGPT Apps with JavaScript

Transform your JavaScript expertise through the power of Open AI API models using “Creating ChatGPT Apps with JavaScript.” This book will guide JavaScript developers to build smart applications while providing tangible knowledge of OpenAI’s API for text summarization, creating transcripts from audio files, generating images, and running models locally on your machine.Through hands-on projects and code examples, readers will discover how to build AI-powered apps from scratch, such as using embeddings to train a Discord bot to answer customers’ questions in multiple languages. Readers will also learn to dictate text for writing articles or blogs with a localized integration of Whisper and generate hero images with Dall-E. What’s more, in the final chapter of this book, you’ll be able to maximize productivity by creating a Smart Assistant like Alexa or Siri with JavaScript and the new Raspberry Pi 5.From seasoned developers to newcomers, this book offers something for everyone. Not only will readers learn to build apps with ChatGPT and JavaScript, but they will also learn best practices for prompt engineering. They’ll understand how AI models can enhance workplace efficiency and utilize natural language processing (NLP) to make interactions with applications feel…well, natural. The end result is expert knowledge in leveraging ChatGPT programmatically and incorporating the technology into diverse applications.WHAT YOU WILL LEARN:* Gain a deeper understanding of ChatGPT and how OpenAI’s models work, and different ways to implement each of their various features.* Authenticate with ChatGPT and OpenAI’s API and learn to send prompts with best practices with prompt engineering.* Streamline productivity and content creation by leveraging transcription generation for dictation and image generation for creating hero images.* Stay ahead of the game by incorporating different new features of OpenAI’s API and understanding more complex concepts like using GPT-4 to train a Discord bot with an FAQ to assist with multilingual tech support.WHO THIS BOOK IS FOR:This book is written for JavaScript developers and hobbyists that want to use OpenAI and ChatGPT to create intelligent applications and streamline productivity. No prior experience with ChatGPT or OpenAI APIs is required.BRUCE HOPKINS JR. is a JavaScript, Typescript, and Rust developer. He has worked in both R&D and professional capacities with ChatGPT and other LLMs (large language model) such as Meta’s LLama and LLama 2.BRUCE HOPKINS SR. is an accomplished author and technical writer. His focus has been on pioneering research in natural language processing (NLP) and artificial intelligence (AI), particularly in the domain of speech and chatbot applications. He holds the distinguished title of an Intel Innovator for AI and IoT.Chapter 1: Introducing ChatGPT for JavaScript Developers.- Chapter 2: Using ChatGPT as Your JavaScript Pair-Programmer.- Chapter 3: Creating a Basic ChatGPT Client in JavaScript.- Chapter 4: Using AI in the Enterprise! Creating a Text Summarizer for Slack Messages.- Chapter 5: Multimodal AI: Creating a Podcast Visualizer with Whisper and DALL·E 3.- Chapter 6: Creating an Automated Community Manager Bot with Discord and JavaScript.- Chapter 7: Adding Intelligence to our Discord Bots, Part 1: Improving Our Q&A Bot.- Chapter 8: Adding Intelligence to our Discord Bots, Part 2: Improving Our Moderator Bot.

Regulärer Preis: 62,99 €
Produktbild für Microsoft 365 Word For Professionals For Dummies

Microsoft 365 Word For Professionals For Dummies

A BEYOND-THE-BASICS GUIDE TO LEVELING UP YOUR SKILLS IN MICROSOFT WORDMicrosoft 365 Word For Professionals For Dummies is an easy-to-understand guide to the more advanced features available in the Microsoft 365 version of Word. You can enhance the quality of your documents and boost productivity in any field, with this in-depth resource. You'll delve into topics that you may not have encountered in school or on-the-job training, such as collaborating on a document and using Copilot to improve text. Complete your Word-related tasks more efficiently as you unlock lesser-known tools and learn to organize the application so you can quickly access the features you need. You're on your way to becoming a Word superhero, with this fun resource.* Learn advanced formatting and template creation techniques* Work more efficiently with graphics, tables, and other objects* Get a handle on document sharing, reviewing, and collaboration* Automate writing and editing tasks to speed up tedious jobsFor Word users seeking to take their knowledge to the next level, this in-depth guide covers the professional tasks and topics you most need to know. DAN GOOKIN is the bestselling author of Word For Dummies. His previous books have been translated into 32 languages and have sold over 11 million copies. He’s been writing for the For Dummies series for 34 years.

Regulärer Preis: 19,99 €
Produktbild für Bluesky For Dummies

Bluesky For Dummies

THE FIRST AND MOST TRUSTWORTHY GUIDE TO THE HOT NEW SOCIAL MEDIA PLATFORMBluesky has been taking the social media world by storm. The platform offers users a high degree of control over what information they view and share, abilities they've lost on other platforms. Bluesky For Dummies serves as your guidebook to navigating the new platform. Learn to import your contacts, control your feed, and share content, with easy-to-follow instructions. This book also shows you how to manage who can contact you and access your content, so you can avoid bots, trolls, and other unsavory characters. For business owners, this Dummies guide is a breath of fresh air—learn how to set up Bluesky for your business and enjoy a peaceful and profitable social experience.* Discover how Bluesky differs from the other social media apps out there* Create a profile, make connections, share your content, and build a following* Take control of your social media experience with access and content settings* Connect with users by exploring custom lists and feedsRefugees from other social media sites, as well as social media beginners, can find out what it's like to be social without the downsides, thanks to Bluesky For Dummies.ERIC BUTOW is a professional author and course developer. He is a co-author of Funding a New Business For Dummies, Instagram For Business For Dummies, Instagram For Dummies, and Digital Etiquette For Dummies. REBECCA BOLLWITT is a social media and digital publishing strategist.

Regulärer Preis: 12,99 €
Produktbild für Die ultimative FRITZ!Box-Bibel! (7. Auflg.)

Die ultimative FRITZ!Box-Bibel! (7. Auflg.)

Das umfassende Buch zum Nachschlagen von Markt+Technik! In der 7. Auflage aus dem März 2025.In der neuesten 7. Auflage des Praxisbuchs zu den Routern des Marktführers AVM bekommen Sie neben einem aktuellen Überblick über die Geräte viele praktische Tipps. Sie richten Ihre FRITZ!Box schnell und sicher ein, konfigurieren Ihr WLAN für die optimale Reichweite, bieten dem Besuch ein eigenes Gast-WLAN an und stellen Mesh-Verbindungen her. Sie setzen die FRITZ!Box als Steuerzentrale für Ihr vernetztes Zuhause ein und nutzen sie für den sicheren Fernzugang von unterwegs ins Heimnetz. Sie erfahren, wie FRITZ!OS Sie bei einem FRITZ!Box-Modellwechsel unterstützt, und lernen die Neuerungen der aktuellen Betriebssystem-Version FRITZ!OS 8 kennen. Die anschaulichen Schrittanleitungen setzen keine Vorkenntnisse voraus, aber auch der erfahrene Anwender findet hilfreiche Hinweise.Über den Autor:Wolfram Gieseke ist langjähriger Windows-Experte und viel gelesener Autor zahlreicher erfolgreicher Bücher zu den Themen Windows-Betriebs-system und Netzwerksicherheit.

Regulärer Preis: 19,95 €
Produktbild für API-Design

API-Design

Schnittstellen-Know-how für die Programmierung - Das Standardwerk zur API-Programmierung - Effektive APIs entwerfen - APIs für professionelle Projekte entwickeln Application Programming Interfaces (APIs) sind allgegenwärtig, denn Softwareentwickler benutzen sie nicht nur ständig, sondern entwerfen sie häufig auch. Dieses Buch bietet erstmals eine umfassende Anleitung für das vielfältige Thema API-Design. Neben theoretischen Konzepten werden zahlreiche praktische Hinweise und Programmbeispiele für Java-APIs gegeben. Remote APIs in Form von RESTful HTTP, GraphQL und Messaging, die für moderne Webanwendungen und andere verteilte Systeme enorm wichtig sind, spielen in diesem Buch ebenfalls eine zentrale Rolle. Aus dem Inhalt: - Entwurf leicht benutzbarer APIs - Kompatibilität und Versionierung - Objektkollaboration, Fluent APIs und Thread-Sicherheit - Dokumentation - Skalierbarkeit, Caching - API-Management Nach der erfolgreichen Lektüre dieses Buches kennen Sie die Grundlagen von APIs und sind in der Lage, objektorientierte APIs für Softwarekomponenten und Remote APIs für verteilte Systeme zu entwerfen. In der dritten Auflage sind u. a. der API-first-Ansatz und Sicherheitsthemen wie Authentifizierung, API-Keys, Distributed Denial of Service (DDos) und Injection-Angriffe hinzugekommen.

Regulärer Preis: 44,90 €
Produktbild für Abbildung und Integration von Elementarfaktoren in SAP S/4HANA

Abbildung und Integration von Elementarfaktoren in SAP S/4HANA

Anhand bereichsübergreifend miteinander kontinuierlich integrierte Übungsbeispiele aus den Bereichen Materialwirtschaft, Kostenarten- und Kostenstellenrechnung (Controlling), Produktion und Produktkostenplanung (Controlling) werden die typischesProzessschritte zur Leistungserstellung in SAP S/4HANA dargestellt.Der Leser lernt konkret, wie die drei direkt an der Leistungserstellung beteiligten betriebswirtschaftlichen Produktionsfaktoren (Elementarfaktoren) Werkstoffe, ausführende Arbeit und Betriebsmittel in SAP S/4HANA abgebildet und im Leistungserstellungsprozess miteinander verknüpft werden.ZielgruppeSAP-Anwender in UnternehmenSchulungsleiterDozenten an HochschulenStudierende aus Wirtschaftswissenschaften, Wirtschaftsinformatikoder WirtschaftsingenieurwesenPROF. DR. UDO RIMMELSPACHER, früher Prokurist bei einem führenden internationalen Beratungsunternehmen, ist Professor für Betriebswirtschaftliche Unternehmenssoftware und IT-Consulting an der THI Business School der Technischen Hochschule Ingolstadt, Prozess- und IT-Berater sowie mehrfach zertifizierter SAP-Consultant.Einführung in SAP S/4HANA.- Organisationseinheiten und -strukturen.- Abbildung und Integration der drei Elementarfaktoren: Werkstoffe (Materialien), Ausführende Arbeit und Betriebsmittel.- Zusammenführung der drei Elementarfaktoren zu einem Fertigerzeugnis.

Regulärer Preis: 54,99 €
Produktbild für Mastering UltraEdit

Mastering UltraEdit

This guide to UltraEdit covers the text editor's powerful and flexible functions that go far beyond the functionality of a normal text editor for a breadth of use cases, including text/code editing, web development, system administration, development/programming, remote file editing, data filtering and sorting, and file compare. Even though UltraEdit celebrated its 30th anniversary in 2024, very few manuals exist. This book provides a well-founded introduction and exhaustively discusses all UltraEdit’s powerful functions. At the same time, the book is intended to be a solid reference and a bundled compendium for the more than four million UltraEdit customers worldwide.WHAT YOU WILL LEARN* Know the basic functions and many power functions* Understand the focus of UltraEdit in the areas of programming/development, web development, database management, and system administration, as well as technical writing, editing, and publishing* Get up to speed on functions and capabilities, user interface and program navigation, customization and settings, and windows arrangement and file management* Know the core functions for editing and inserting data* Expand your knowledge with the many view variations, formatting options, and powerful search and replace features an editor can include* Perfect your workflow with many other power functions such as multi-caret editing, column mode, and FTP integrationWHO THIS BOOK IS FORUsers who are familiar with text editors but are frustrated with their limits, or who want to benefit from UltraEdit's long-established power functionsDEVID ESPENSCHIED lives in Berlin, Germany and has been working in software development for more than 30 years. As a freelance author and developer, he has written many articles for IT magazines and programmed his own system diagnostic tool. His previous books include the German-language book, _System Programming with Delphi_.Introduction.- Chapter 1: History of UltraEdit.- Chapter 2: User Interface.- Chapter 3: Program Navigation.- Chapter 4: UI Customization and Options.- Chapter 5: Window Arrangement.- Chapter 6: Basics of File Management.- Chapter 7: Edit, Insert & Columns.- Chapter 8: View, Format & Find.- Chapter 9: More Powerful Functions.- Chapter 10: Further Help.

Regulärer Preis: 56,99 €
Produktbild für Microsoft Excel 365 Bible

Microsoft Excel 365 Bible

YOUR COMPLETE GUIDE TO EXCEL 365, WRITTEN FOR NEWBIES ALL THE WAY TO SEASONED PROFESSIONALSNeatly organised and written using accessible language, Microsoft Excel 365 Bible contains everything that readers need to know to get up and running quickly with Excel. Covering the numerous updates to Excel 365 since the previous edition was published in 2022, this Second Edition contains many useful examples and tips and tricks that cover all essential aspects of Excel—from the basics, such as navigating the user interface, to more advanced topics, such as creating visualisations and crafting custom functions. Written by an accomplished team of authors with decades of Excel and business intelligence experience, this book explores topics including:* Entering and editing worksheet data, with information on data types, formulas, dates, times and other cell contents* Building formulas with Excel table objects, correcting common formula errors and using formula variables* Working with data series, changing basic chart elements and making use of chart customization* Loading data from other sources, performing common transformations and applying conditional logicMicrosoft Excel 365 Bible earns a well-deserved spot on the bookshelves of all professionals and individuals seeking to get the most out of Excel 365, from beginners with limited knowledge of the software all the way to advanced users with years of experience under their belts. MICHAEL ALEXANDER is a senior consultant at Slalom Consulting with more than 15 years’ experience in data management and reporting. He is the author of more than a dozen books on business analysis using Microsoft Excel and has been named Microsoft Excel MVP for his contributions to the Excel community. DICK KUSLEIKA has been working with Microsoft Office for more than 20 years. He was formerly a Microsoft MVP, having been awarded 12 consecutive years. Dick has written several books about Excel and Access. Introduction xliPART I: GETTING STARTED WITH EXCEL 1Chapter 1: Introducing Excel 3Chapter 2: Entering and Editing Worksheet Data 29Chapter 3: Performing Basic Worksheet Operations 55Chapter 4: Working with Excel Ranges and Tables 75Chapter 5: Formatting Worksheets 125Chapter 6: Understanding Excel Files and Templates 161Chapter 7: Printing Your Work 181Chapter 8: Customizing the Excel User Interface 203PART II: WORKING WITH FORMULAS AND FUNCTIONS 213Chapter 9: Introducing Formulas and Functions 215Chapter 10: Understanding and Using Array Formulas 251Chapter 11: Using Common Formulas for Math and Dates 273Chapter 12: Using Formulas to Manipulate Text 311Chapter 13: Using Formulas for Conditional Analysis 331Chapter 14: Using Formulas for Matching and Lookups 347Chapter 15: Using Formulas with Conditional Formatting 365Chapter 16: Making Your Formulas Error-Free 379PART III: CREATING CHARTS AND OTHER VISUALIZATIONS 399Chapter 17: Getting Started with Excel Charts 401Chapter 18: Using Advanced Charting Techniques 439Chapter 19: Creating Sparkline Graphics 473Chapter 20: Visualizing with Custom Number Formats and Shapes 487PART IV: MANAGING AND ANALYZING DATA 519Chapter 21: Importing and Cleaning Data 521Chapter 22: Using Data Validation 553Chapter 23: Creating and Using Worksheet Outlines 567Chapter 24: Linking and Consolidating Worksheets 577Chapter 25: Introducing Pivot Tables 597Chapter 26: Analyzing Data with Pivot Tables 619Chapter 27: Performing Spreadsheet What-If Analysis 653Chapter 28: Analyzing Data Using Goal Seeking and Solver 675Chapter 29: Analyzing Data with the Analysis ToolPak 695Chapter 30: Protecting Your Work 707PART V: UNDERSTANDING POWER PIVOT AND POWER QUERY 721Chapter 31: Introducing Power Pivot 723Chapter 32: Working Directly with the Internal Data Model 747Chapter 33: Adding Formulas to Power Pivot 757Chapter 34: Introducing Power Query 787Chapter 35: Transforming Data with Power Query 813Chapter 36: Making Queries Work Together 845Chapter 37: Enhancing Power Query Productivity 861PART VI: AUTOMATING EXCEL 873Chapter 38: Introducing Visual Basic for Applications 875Chapter 39: Creating Custom Worksheet Functions 903Chapter 40: Creating UserForms 917Chapter 41: Using UserForm Controls in a Worksheet 939Chapter 42: Working with Excel Events 953Chapter 43: Creating Custom Excel Add-Ins 967Chapter 44: Office Scripts for Excel 977Index 1009

Regulärer Preis: 35,99 €
Produktbild für SAS For Dummies

SAS For Dummies

BECOME DATA-SAVVY WITH THE WIDELY USED DATA AND AI SOFTWAREData and analytics are essential for any business, giving insight into what's working, what can be improved, and what else needs to be done. SAS software helps you make sure you're doing data right, with a host of data management, reporting, and analysis tools. SAS For Dummies teaches you the essentials, helping you navigate this statistical software and turn information into value. In this book, learn how to gather data, create reports, and analyze results. You'll also discover how SAS machine learning and AI can help deliver decisions based on data. Even if you're brand new to data and analytics, this easy-to-follow guide will turn you into an SAS power user.* Become familiar with the most popular SAS applications, including SAS 9 and SAS Viya* Connect to data, organize your information, and adopt sound data security practices* Get a primer on working with data sets, variables, and statistical analysis* Explore and analyze data through SAS programming and rich application interfaces* Create and share graphs interactive visualizations to deliver insightsThis is the perfect Dummies guide for new SAS users looking to improve their skills—in any industry and for any organization size. CHRIS HEMEDINGER is the author of previous editions of SAS For Dummies. He’s also the Director of SAS User Engagement, facilitating the activities of online communities, user groups, tech newsletters, tutorials, and webinars with a focus on SAS software.

Regulärer Preis: 25,99 €
Produktbild für Time Series Forecasting Using Generative AI

Time Series Forecasting Using Generative AI

"_Time Series Forecasting Using Generative AI_ introduces readers to Generative Artificial Intelligence (Gen AI) in time series analysis, offering an essential exploration of cutting-edge forecasting methodologies."The book covers a wide range of topics, starting with an overview of Generative AI, where readers gain insights into the history and fundamentals of Gen AI with a brief introduction to large language models. The subsequent chapter explains practical applications, guiding readers through the implementation of diverse neural network architectures for time series analysis such as Multi-Layer Perceptrons (MLP), WaveNet, Temporal Convolutional Network (TCN), Bidirectional Temporal Convolutional Network (BiTCN), Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), Deep AutoRegressive(DeepAR), and Neural Basis Expansion Analysis(NBEATS) using modern tools.Building on this foundation, the book introduces the power of Transformer architecture, exploring its variants such as Vanilla Transformers, Inverted Transformer (iTransformer), DLinear, NLinear, and Patch Time Series Transformer (PatchTST). Finally, The book delves into foundation models such as Time-LLM, Chronos, TimeGPT, Moirai, and TimesFM enabling readers to implement sophisticated forecasting models tailored to their specific needs.This book empowers readers with the knowledge and skills needed to leverage Gen AI for accurate and efficient time series forecasting. By providing a detailed exploration of advanced forecasting models and methodologies, this book enables practitioners to make informed decisions and drive business growth through data-driven insights.● Understand the core history and applications of Gen AI and its potential to revolutionize time series forecasting.● Learn to implement different neural network architectures such as MLP, WaveNet, TCN, BiTCN, RNN, LSTM, DeepAR, and NBEATS for time series forecasting.● Discover the potential of Transformer architecture and its variants, such as Vanilla Transformers, iTransformer, DLinear, NLinear, and PatchTST, for time series forecasting.● Explore complex foundation models like Time-LLM, Chronos, TimeGPT, Moirai, and TimesFM.● Gain practical knowledge on how to apply Gen AI techniques to real-world time series forecasting challenges and make data-driven decisions.Who this book is for:Data Scientists, Machine learning engineers, Business Aanalysts, Statisticians, Economists, Financial Analysts, Operations Research Analysts, Data Analysts, Students.Bangalore Vijay Kumar Vishwas (B.V. Vishwas) is a seasoned Principal Data Scientist and AI researcher with over 11 years of experience in the IT industry. Currently based in San Diego, California, he works at NTT DATA. Vishwas holds a Master of Technology in Software Engineering from Birla Institute of Technology & Science, Pilani, India. He specializes in developing innovative solutions for large enterprises, with expertise in Machine Learning, Deep Learning, Time Series Forecasting, Natural Language Processing, Reinforcement Learning, and Generative AI. He is also the author of _Hands-On Time Series Analysis with Python: From Basics to Bleeding-Edge Techniques_, published by Apress.Sri Ram Macharla, is a consultant and architect in the areas of AI and ML with over 19 years of experience in IT. He holds an M.Tech from BITS Pilani and has experience working with clients in domains such as finance, retail, life sciences, defense, and manufacturing. Additionally, he has worked as a mentor, corporate trainer, and guest faculty teaching AI and ML. He has papers published and works as a reviewer with leading journals and publishers. He is passionate about mathematical modeling and applying AI for social good.Chapter 1: Time Series Meets Generative AI.- Chapter 2: Neural Network For Time Series.- Chapter 3: Transformers For Time Series.- Chapter 4: Time-LLM: Reprogramming Large Language Model.- Chapter 5: Chronos: Pretrained Probabilistic Time Series Model.- Chapter 6: TimeGPT: The First Foundation Model For Time Series.- Chapter 7: Moirai: A Time Series Foundation Model For Universal Forecasting.- Chapter 8: TimesFM: Decoder-Only Foundation Model For Time Series.

Regulärer Preis: 52,99 €
Produktbild für Beginning Spring AI

Beginning Spring AI

Discover how to use Large Language Models in the Spring Framework. This quick guide equips developers with insights into the strengths and limitations of Spring AI and how to leverage the model for typical use cases.First, you will orient yourself to the new and exciting landscape of AI and Spring integration. You will learn how to issue simple queries, asking the right questions to get the results you want. From there, you will be empowered to select the right model for functionality and refinement, building a simple yet effective chat bot using real-world examples. Additionally, the book explores how to generate images, refine them, and how to send source images when appropriate. Lastly, the book focuses on how Spring AI and LLMs affect the developer landscape, including pitfalls and ethical concerns.Designed for fast adoption, this book provides targeted guidance on integrating AI and LLMs into your projects within days. Through a pragmatic approach, it emphasizes direct utilization of the API.WHAT YOU WILL LEARN* Explore popular use cases for LLMs* Gain insight into the Spring AI module, including its capabilities and limitations* Know how to create effective queries and interactions for AI-driven conversations and image generation* Discover strategies for selecting an appropriate LLM service and model* Acquire skills to AI-proof your job and understand why it is NOT a replacementWHAT THIS BOOK ISSpring developers who are new to AI and focused on the essentials without exhaustive framework details. This is an optional supplement to the more comprehensive Apress book, _Beginning Spring 6_.ANDREW LOMBARDI is a veteran entrepreneur and software engineer. He has been running the consulting firm Mystic Coders for 25 years, authored multiple kick-ass books on Spring for Apress and WebSocket for O'Reilly, coding, speaking internationally and offering technical guidance to companies as large as Airbus and companies as controversial and unique as Twitter 1.0. He firmly believes that the best thing he has done so far is being a great dad.JOSEPH B. OTTINGER is a distributed systems architect with experience in many cloud platforms. He was the editor-in-chief of both Java Developer Journal and TheServerSide.com, and has also contributed to many publications, open source projects, and commercial projects over the years, using many different languages (but primarily Java, Python, and JavaScript). He was also a previously published author online (with too many publications to note individually) and in print, through Apress.Chapter 1: Introduction.- Chapter 2: Getting Started.- Chapter 3: Asking Questions and Using Data.- Chapter 4: Working with Audio.- Chapter 5: Generating Images.- Chapter 6: Navigating AI in Engineering: Challenges and Best Practices.

Regulärer Preis: 19,99 €
Produktbild für Data-Driven Company

Data-Driven Company

Daten werden für Unternehmen immer wichtiger. Gleichzeitig mangelt es an Best Practices und Leitfäden, wie klassische mit modernen Ansätzen wie Data Mesh oder Data Fabric zu einem anwendbaren Framework integriert werden können. Hierzu werden die Themen Organisationsdesign, Datenstrategie / -management und Enterprise Architecture auf theoretische und pragmatische Weise verbunden. Das Buch präsentiert Ziele, ein Data Operating Model sowie datenstrategische Ansätze für eine Data-Driven Company. Hervorzuheben sind dabei die zahlreichen Abbildungen aus diesem Buch, die die komplexen Zusammenhänge anschaulich machen und das Lesen unterstützen.ZIELGRUPPEMit diesen Inhalten richtet sich das Buch an Führungskräfte, Experten, Berater und weitere Personen, die einen Bezug zur IT und Daten haben beziehungsweise diesen entwickeln möchten. Durch den niedrigschwelligen Einstieg und gleichzeitigen Tiefgang in die ausgewählten Themen adressiert es sowohl Einsteiger als auch erfahrene Datenexperten.AUTORDR. SVEN-ERIK WILLRICH ist ein erfahrener Experte im Bereich IT und Datenmanagement. Mit seinem Hintergrund in Wirtschaftsinformatik und langjähriger Beratungserfahrung bringt er sowohl theoretisches Wissen als auch praxisorientierte Lösungsansätze ein. Als Dozent und Redner im Bereich Digitalisierung teilt er regelmäßig seine Expertise.DR. SVEN-ERIK WILLRICH ist ein erfahrener Experte im Bereich IT und Datenmanagement. Mit seinem Hintergrund in Wirtschaftsinformatik und langjähriger Beratungserfahrung bringt er sowohl theoretisches Wissen als auch praxisorientierte Lösungsansätze ein. Als Dozent und Redner im Bereich Digitalisierung teilt er regelmäßig seine Expertise.Einführung Data-Driven Company,- Wichtigkeit einer Data-Driven Company,- Geschäftsbereiche, die betroffen sind,- Zielbild einer Data-Driven Company,- Wie Unternehmen eine Data-Driven Company werden,- Chancen & Herausforderungen.- Trends & Ausblick.

Regulärer Preis: 27,99 €
Produktbild für Samsung Galaxy A16 / A16 5G

Samsung Galaxy A16 / A16 5G

Samsung Galaxy A16 / A16 5G – Für Einsteiger ohne Vorkenntnisse – Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Samsung Galaxy A16 / A16 5G kennen und sicher beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt: - Ihr Samsung Galaxy A16 / A16 5G mit One UI 6.1- Alle Bedienelemente auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit

Regulärer Preis: 14,99 €
Produktbild für Spring Security 6 Recipes

Spring Security 6 Recipes

Ensure robust web security for your Java applications in just a few days. This recipe-driven, practical pocketbook provides a straightforward guide to quickly developing and deploying secure enterprise applications using the Spring 6 Framework, Spring Boot 3, and the H2 database.The book is organized into problems and corresponding recipes, offering solutions for both small and large challenges. First, you will learn how to install all essential development tools, such as IntelliJ IDEA, JDK v17, and Maven. Then you will dive into recipes on using Spring Security 6 with JSP tags and Thymeleaf and integrating security features through Spring Boot 3 Initializr. Finally, you'll be equipped to build your own Spring Boot project using Spring Security, Spring Data JDBC, and the H2 database.This recipes guide is ideal for readers who want to get up and running with only the essential security features in a fraction of time. Its simplified approach offers immediate results for securing Java applications.WHAT YOU WILL LEARN* Set up and configure Spring Security 6 installation tools* Explore the basics of integrating Spring Security 6 with JSP tags, Thymeleaf, and Spring Boot 3 Initializr* Build and deploy a secure Spring Boot application using Spring Data JDBC and the H2 databaseWHO THIS BOOK IS FORBeginners in Spring Security 6, Boot 3 Initializr, and H2 DB, and assumes you have some basic web development and security experience. It is suitable for busy readers who are seeking a simple, focused approach for immediate results. For more comprehensive coverage, detailed explanations, and advanced topics, we recommend _Pro Spring Security: Securing Spring Framework 6 and Boot 3-based Java Applications_.MASSIMO NARDONE has more than 29 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He holds an MSc degree in computing science from the University of Salerno, Italy. Throughout his working career, he has held various positions, starting as a programming developer, and then security teacher, PCI QSA, auditor, assessor, lead IT/OT/SCADA/SCADA/cloud architect, CISO, BISO, executive, program director, OT/IoT/IIoT security competence leader, VP OT security, etc. In his last working engagement, he worked as a seasoned cyber and information security executive, CISO and OT, IoT and IIoT security competence leader helping many clients to develop and implement cyber, information, OT, IoT security activities. He is currently working as Vice President of OT Security for SSH Communications Security. He is an Apress co-author of numerous books, including _Pro Spring Security_, _Pro JPA 2 in Java EE 8_ ,_Pro Android Games_, and has reviewed more than 70 titles.1. Development Tools.- 2. Spring Security, JSP Tags ad Thymeleaf.- 3. Java Web application and Spring Boot 3 Initializr.- 4. Spring Data JDBC and H2 Database.

Regulärer Preis: 22,99 €
Produktbild für Softwaretesting kompakt

Softwaretesting kompakt

Softwaretests sind unverzichtbar für jede robuste Software. Dies zeigt sich durch nahezu wöchentliche Bugbedingte Ausfälle. Doch wie lassen sich diese effektiver verhindern? Nach dem Lesen dieses Buches sind Sie in der Lage, eigene Softwaretests in den unterschiedlichsten Industriebereichen mit Java umzusetzen.Dieses Buch richtet sich an alle, die in die Disziplin des Testens eintauchen möchten. Es nimmt Sie direkt an die Hand und führt Sie Schritt für Schritt durch die unterschiedlichen Bereiche, es sind keine Vorkenntnisse im Testing oder Programmierung notwendig. Lernen Sie essenzielle Testtheorie kennen und wie Sie in der Praxis verschiedene Testarten einsetzen.Die notwendigen Java-Grundkenntnisse zur Testimplementierung werden Ihnen anhand von Beispielen immer aus der Sicht eines Testers praxisnah vermittelt. Erfahren Sie mehr über Testautomatisierung mit JUnit, Oberflächentests mit Selenium und Mocking von APIs mit WireMock. Lernen Sie die Anwendung von Behaviour Driven Development mit Cucumber kennen sowie exploratives Testen.PASCAL MOLL ist freiberuflicher Berater. 2021 wurde er Zweiter beim „Freelancer des Jahres“-Wettbewerb. Seine Schwerpunkte liegen im Bereich der Java-Entwicklung, des Testmanagements und der Testautomatisierung von Web- und Desktopapplikationen, insbesondere SAP. Er ist „ISTQB Certified Tester, Full Advanced“ sowie zertifizierter Softwarearchitekt. Sein Wissen teilt er regelmäßig in Podcasts, Webinaren, Artikeln und Blogposts. Seit 2024 ist er zudem Dozent an der Technische Hochschule Würzburg-Schweinfurt (THWS) für die Vorlesung Software Testing.DANIEL SONNET ist Hochschullehrer für Data Science an der Fresenius University of Applied Sciences und IT-Unternehmer mit einem Faible für den nachhaltigen Einsatz von IT inkl. Softwaretesting. Grundlagen des Softwaretestings. Java Grundlagen für Softwaretesting. Welcome to Apache Maven. Grundlagen der Testautomatisierung. Mocking & API Testing. Oberflächen und deren automatisierte Tests mit Selenium. Behaviour Driven Development mit Cucumber.

Regulärer Preis: 17,99 €
Produktbild für Robotic Process Automation (RPA) im Desktop-Publishing

Robotic Process Automation (RPA) im Desktop-Publishing

Dieses Buch soll dem Leser verschiedene Automatisierungsmöglichkeiten im Bereich Desktop-Publishing aufzeigen und ihn motivieren, diese in Ihren Arbeitsprozess einzube-ziehen, um die Effizienz und Effektivität ihrer Gestaltungs- bzw. Produktionsprozesse zu erhöhen. Die Methoden reichen von kleinen Hilfsmitteln wie in DTP-Software wie Adobe InDesign integrierten Skripten zur automatischen Generierung grafischer Assets bis hin zu komplexen Software-Infrastrukturen, die das automatisierte Publizieren von Tausenden von Dokumenten realisieren.Das Buch soll möglichst viele Szenarien abdecken, ein breites Publikum ansprechen und weitestgehend alle Themen rund um die Automatisierung im Desktop-Publishing kurz und prägnant abdecken. Ebenso soll das Buch mithilfe von Fall-beispielen die Effizienz und Effektivität der Automatisierung verifizieren und mehrere Blickwinkel auf DTP-bezogene Unterthemen bieten.ENNIS GÜNDOĞAN hat IT-Management und Wirtschaftsinformatik studiert und ist IHK-geprüfter Mediengestalter für Digital und Print. Im Beruf verknüpft er derzeit Know-how aus beiden Tätigkeitsfeldern, um Softwareprojekte im Rahmen der DTP-Automatisierung zu realisieren.Desktop Publishing. -Automatisierung.-Automatisierung von Artwork-Prozessen.- Client Server Kommunikation.

Regulärer Preis: 32,99 €
Produktbild für Künstliche Intelligenz (FAZ-Dossier Spezial)

Künstliche Intelligenz (FAZ-Dossier Spezial)

Künstliche Intelligenz denkt schneller als je zuvor – doch echte Durchbrüche erfordern mehr als nur Rechenleistung. Experten setzen nun auf „langsames Denken“, um KI präziser und effizienter zu machen. Ein chinesisches Unternehmen sorgt dabei für Aufsehen. Steht eine neue Ära bevor?Die Künstliche Intelligenz ist in eine kritische Phase eingetreten – wieder einmal. Wie kompetent derzeit angesagte KI-Modelle mit Sprache umgehen können, wie ausführlich sie auf verschiedenste Anfragen Antworten ausformulieren und in der Lage sind, ein Fachgespräch zu führen, davon haben sich Milliarden Menschen rund um den Globus überzeugt. Doch wie geht es weiter? Hilfreich ist eine bahnbrechende Unterscheidung, die der verstorbene Wirtschaftsnobelpreisträger Daniel Kahneman einmal anstellte, und die auch die Diskussion über die Künstliche Intelligenz inspiriert: Er beschrieb zwei verschiedene Systeme, in denen Menschen denken. Als "schnelles Denken" bezeichnete er spontane Antworten, intuitive, zeitnahe Reaktionen. Nicht immer ist das durchdacht oder korrekt – aber ohne diese Fertigkeit gelingen der Alltag und viel Zwischenmenschliches nicht. Davon grenzte Kahneman das "langsame Denken" ab, die Fähigkeit, etwas tiefer zu durchdringen, zu analysieren, rational zu planen, zu berechnen, abzuwägen. Ohne diese Fähigkeit sind erfolgversprechende Entscheidungen kaum denkbar.Die Entwickler großer KI-Sprachmodelle von führenden Anbietern wie Open AI, Google, Meta oder Anthropic rekonstruierten zunächst vornehmlich das "schnelle Denken". Sie setzten auf immer weiter wachsende Datenmengen und noch mächtigere Rechner, auf einen möglichst großen Wort- und Textschatz, um Nutzern schnell sinnvolle und ausführliche Ergebnisse zu präsentieren. Besonders ausgeklügelt waren und sind diese Antworten aber nicht, denn das ist in diesen KI-Modellen so gar nicht angelegt. Inzwischen ändert sich das. KI-Fachleute konzentrieren sich zunehmen darauf, ihre KI-Modelle zu verbessern, indem sie ihnen mehr Zeit geben, sozusagen um zuerst länger nachzudenken und dann zu antworten. Sie haben Instrumente gefunden und integriert, mit denen die KI-Modelle herausfinden sollen, welcher der beste Lösungsweg ist – auch indem sie Zwischenschritte darlegen und klären, wie komplex eine ihnen gestellte Aufgabe überhaupt ist. Danach wählen sie dann aus, wie viel Aufwand sie hineinstecken. Das macht die Antworten besser und die Modelle effizienter. Und durchaus auch menschenähnlicher in einem gewissen Sinne. Der Fokus richtet sich so zunehmend auf Kahnemans "langsames Denken", um weiter voranzukommen.Genau in diesem Bereich hat das chinesische Unternehmen Deepseek einen enormen Erfolg erzielt. Das ist der Grund, warum dieses bis dahin hierzulande weitgehend unbekannte Unternehmen für Furore und neue Hoffnung sorgte. Indem die Tüftler die benannten Methoden geschickt kombinierten und vermutlich auch besser ausgewählte und aufbereitete Daten verwendeten, ist es ihnen nach eigenem Bekunden gelungen, mit älterer Hardware eine KI zu erfinden, die mit den Spitzenmodellen aus Amerika mithalten kann – für einen Bruchteil der Kosten. Das ist eine großartige Ingenieurleistung.Damit wächst die Zuversicht, viel mehr Unternehmen, Behörden oder Universitäten als bisher könnten dank geringerer Kosten in der Lage sein, in der KI doch mitzuhalten, nicht zuletzt in Deutschland und Europa. Künftig sind vielleicht nicht immer und überall Milliardensummen für riesige Rechenzentren und moderne Hochleistungschips aus dem Hause Nvidia nötig, die speziell auf die Mathematikanforderungen der KI zugeschnitten sind. Gerade deutsche Fachleute propagieren, dass der Weg zum künstlichen Gehirn nicht über immer mehr Daten, Rechenleistung und Modellgröße führen müsse, sondern noch ganz andere Ansätze erforderlich seien. Sie versuchen, auf dem Lernen basierende KI-Systeme mit solchen zu verschmelzen, die auf Logik und fest einprogrammiertem Wissen fußen. Sie wollen den ganzen Kahneman in die Künstliche Intelligenz einbringen, das schnelle Denken und das langsame Denken.Inhalt: 3 Editorial von Alexander Armbruster 4 Ein Mysterium namens Deepseek 7 Das Jahr der KI-Agenten 10 Der harte Kampf um die KI-Hoheit 13 Smartere Screenings 16 Der Chatarzt 20 ChatGPT, mein Anlageberater 23 KI verwaltet Vermögen 26 Ich spreche jeden Tag mit ChatGPT 29 Wie Künstliche Intelligenz den Büroalltag erleichtert 34 "KI-Agenten werden den Charakter der Arbeit verändern" 38 Abgehängt 43 Regelmäßige KI-Nutzung

Regulärer Preis: 4,50 €
Produktbild für Praxishandbuch Verwaltungsinformatik

Praxishandbuch Verwaltungsinformatik

Macheten für den Verwaltungsdschungel (eine Art Einleitung)Tim Pidun und David Richter 9Schwerpunkt VerwaltungsinformatikBeitrag der Sozioinformatik zur menschengerechten Gestaltung von VerwaltungsleistungenAnsatz der Modellierung eines sozioinformatischen Wirkungsgefüges für die Technikfolgenabschätzung am Beispiel der VerwaltungsdigitalisierungOlivia Jürgenssen und Jürgen Anke 15Bewertung von Software-Architekturentscheidungen auf Nachhaltigkeit in einem konkreten IT-ProjektAnne Gellert und André Mai 33Evaluation einer föderalen Referenzarchitektur für CybersicherheitThomas Rehbohm und Kurt Sandkuhl 39Risikomanagement: Fundament einer GRC-Gesamt-ArchitekturFrank Moses 63Potenziale und Grenzen beim Einsatz von Methoden der Künstlichen Intelligenz in der öffentlichen VerwaltungEin Praxisbericht aus dem Geschäftsbereich des Sächsischen Staatsministeriums für RegionalentwicklungStephan Rohde, Oliver Jokisch, Anita Eichhorn und Markus Straßburg 87Wie können digitale Zwillinge die Aufgabenwahrnehmung deutscher Kommunen verändern?Einsatzbereiche, Veränderungspotenziale, RahmenbedingungenSophia Weß 117Nachweisgebundene und digital signierte Online-Antragsverfahren mit Blockchain-UnterstützungEine Entwicklungsperspektive für nachweisgebundene hybride Online-Antragsverfahren – am Beispiel des Online-Elterngeldantrages in HessenSteffen Vaupel 129Digitalisierte Verwaltung am Beispiel Bürgergeld – Beiträge der Arbeitsgruppe openDVASarah T. Bachinger, Mahsum Bas, Philipp Bornheimer, Stephan Breidenbach, Benjamin Degenhart, Maximilian Enderling, Robin Erd, Naouel Karam, Hannes Legner, Stephan Löbel, Felicitas Löffler, Marianne Mauch, Maximilian Raupach, Jörg Schröder, Christoph Unger, Tilo Wend und Birgitta König-Ries 143Schwerpunkt RechtsinformatikKomplexitätsprobleme bei der OZG Umsetzung am Beispiel der EfA-LeistungenRalf-Rainer Piesold 161Anwendungsfälle und Datenverfügbarkeit für den Einsatz von Künstlicher Intelligenz in Geschäftsprozessen der Justiz auf LandesebeneEinblicke in die nutzerzentrierte Bedarfsermittlung für das Projekt KI4JUSTiSFrank Binder, Lydia Müller, Julian Balling, Chris Zenner, Claudia Glausch und Gerhard Heyer 175Schwerpunkt Aus- und WeiterbildungDer Kompetenz-Mix macht’s – Wie die Zusammenarbeit in interdisziplinären Smart-City-Teams gelingtLara Kahl und Ilona Benz 193Verwaltung 4.0: Die Verwaltungsinformatik als maßgeschneiderte und notwendige Bildungsplattform für eine moderne IT-gestützte BundesverwaltungUwe M. Borghoff, Nicol Matzner-Vogel und Siegfried Rapp 203Ein Rahmenwerk transformativer und technologischer Kompetenzen für die Verwaltungsdigitalisierung in DeutschlandTim Pidun und Natalie Hinze 221

Regulärer Preis: 39,99 €
Produktbild für Python Adventures for Young Coders

Python Adventures for Young Coders

This book takes young readers on an exciting adventure with a child named Kai. One day, Kai wakes up trapped inside a giant robot. He can't talk to anyone outside, and the only way to communicate is through the robot. Inside the robot, Kai finds many books and documents written in a strange language—it's the robot's language, which is Python. Kai realizes he needs to learn this language to control the robot and talk to the outside world. In each chapter in this book, we will join Kai on a new adventure to learn something that helps us control the robot better and communicate with the real world. This fun and interactive book is designed to introduce young minds to the basics of programming while encouraging creativity and problem-solving skills.In the introductory chapters, readers discover Python as a friendly and accessible programming language. The book guides them through setting up their programming environment and crafting their initial lines of code, laying the foundation for an exciting coding adventure. As the exploration unfolds, it delves into fundamental programming concepts essential for any budding coder. From variables and data types to loops and conditionals, these building blocks empower readers to create their programs, fostering a solid understanding of the core principles of coding. It seamlessly integrates these concepts with previously learned fundamentals, providing a comprehensive view of Python's capabilities. Fueling creativity, it inspires readers to unleash their imagination through engaging projects. From crafting games to developing useful applications, young coders learn to apply their programming skills in innovative ways, transforming abstract coding concepts into real and interactive projects.With a focus on accessibility, engagement, and real-world application, this book paves the way for the next generation of Python enthusiasts.What you will learn:* Understand Python programming fundamentals, including syntax, variables, data types, loops, conditionals, lists, functions, and handling files.* Learn to break down complex problems into smaller, manageable tasks and apply coding concepts to find creative solutions.* How to create their interactive coding projects using Python.* Understand strategies for debugging and troubleshooting common programming problems, which are essential skills for any programmerWho this book is for:This book caters primarily for high school students and individuals keen on delving into programming with minimal or zero coding background. It's structured to be both accessible and captivating for young readers, immersing them in the realm of coding through entertaining and interactive journeys. Moreover, it extends its reach to educators and coding enthusiasts alike.Alaa Tharwat Othman is a distinguished PostDoc and Research Group Leader at Bielefeld University of Applied Sciences in Germany. He earned his Ph.D. in Electrical Engineering from Ain Shams University in Egypt. His research focuses on machine learning with small data, active learning, and explainable AI for Industry 4.0 applications. Actively engaged in academia, Alaa has contributed to conferences like AISI and organized workshops and tutorials at prestigious events such as ECML PKDD, IEEE WCCI, and WUML. His numerous publications and tutorials, easily accessible for students, underscore his commitment to knowledge dissemination. Recognized for his exceptional presentations, Alaa has received awards, including Best Presenter, Best Paper, and Best Teaching Assistant. Motivated by a passion for simplifying complex concepts, he extends his expertise to authoring a book aimed at imparting fundamental programming knowledge to readers, reflecting his dedication to spreading knowledge and facilitating learning.Chapter 1: Welcome to the world of programming!.- Chapter 2: Variable fundamentals, an introduction to storing and manipulating data.- Chapter 3: Controlling program flow, understanding the if statement.- Chapter 4: Repeating actions with for loops.- Chapter 5: Checkpoint: Strengthening your programming Skills.-Chapter 6: Exploring Lists: Operations and Manipulations.- Chapter 7: Using the For Loop for Searching, Removing, and Updating Lists.- Chapter 8: Using Functions for Robust and Flexible Code.- Chapter 9: Function Deep Dive: Uncovering Functionality and Built-in Function Usage.- Chapter 10: Checkpoint: Revisiting Lists, Functions, and Core Programming Concepts.- Chapter 11: Level Up Your Skills: Constructing Your First Game from Scratch.- Chapter 12: Managing Files: Exploring Reading, Saving, Updating, and Deleting Operations.- Chapter 13: Code Training 1: Developing a Game or App for Improving Programming Skills.- Chapter 14: Code Training 2: Developing a Game or App for Improving Programming Skills.- Chapter 15: Code Training 3: Developing a Game or App for Improving Programming Skills.

Regulärer Preis: 29,99 €
Produktbild für Cyber Defense

Cyber Defense

PRACTICAL AND THEORETICAL GUIDE TO UNDERSTANDING CYBER HYGIENE, EQUIPPING READERS WITH THE TOOLS TO IMPLEMENT AND MAINTAIN DIGITAL SECURITY PRACTICESCyber Defense is a comprehensive guide that provides an in-depth exploration of essential practices to secure one’s digital life. The book begins with an introduction to cyber hygiene, emphasizing its importance and the foundational concepts necessary for maintaining digital security. It then dives into financial security, detailing methods for protecting financial accounts, monitoring transactions, and compartmentalizing accounts to minimize risks. Password management and multifactor authentication are covered, offering strategies for creating strong passwords, using password managers, and enabling multifactor authentication. With a discussion on secure internet browsing practices, techniques to avoid phishing attacks, and safe web browsing, this book provides email security guidelines for recognizing scams and securing email accounts. Protecting personal devices is discussed, focusing on smartphones, tablets, laptops, IoT devices, and app store security issues. Home network security is explored, with advice on securing home networks, firewalls, and Wi-Fi settings. Each chapter includes recommendations for success, offering practical steps to mitigate risks. Topics covered in Cyber Defense include:* Data protection and privacy, providing insights into encrypting information and managing personal data* Backup and recovery strategies, including using personal cloud storage services* Social media safety, highlighting best practices, and the challenges of AI voice and video* Actionable recommendations on protecting your finances from criminals* Endpoint protection, ransomware, and malware protection strategies, alongside legal and ethical considerations, including when and how to report cyber incidents to law enforcementCyber Defense is an essential guide for anyone, including business owners and managers of small and medium-sized enterprises, IT staff and support teams, and students studying cybersecurity, information technology, or related fields. JASON EDWARDS, DM, CISSP, is an accomplished cybersecurity leader with extensive experience in the technology, finance, insurance, and energy sectors. Holding a Doctorate in Management, Information Systems, and Technology, Jason specializes in guiding large public and private companies through complex cybersecurity challenges. His career includes leadership roles across the military, insurance, finance, energy, and technology industries. He is a husband, father, former military cyber officer, adjunct professor, avid reader, dog dad, and a popular voice on LinkedIn. ContentsChapter 1: Why Cyber Safety Matters Today9The Rise of Digital Connectivity10The Expanding Threat Landscape12Personal Implications of Cyber Insecurity15The Importance of Proactive Cyber Safety18Adopting Safe Online Proactices20Recommendations23Chapter Conclusion25Chapter Questions26Chapter 2: Understanding Cyber Safety in the Digital Age29Defining Cyber Safety and Security30Fundamentals of Digital Literacy33Developing Critical Thinking Skills Online35The Human Element in Cybersecurity38Recommendations42Chapter Conclusion43Chapter Questions44Chapter 3: Understanding and Preventing Identity Theft47What is Identity Theft?48Recognizing Signs of Identity Theft51Understanding Data Breaches55Preventing Identity Theft58Responding to Identity Theft and Data Breaches62Recommendations66Chapter Conclusion68Chapter Questions69Chapter 4: Protecting Your Accounts with Strong Passwords and MFA72The Importance of Strong Passwords72Creating and Managing Strong Passwords76Understanding Multi-Factor Authentication (MFA)78Advanced Account Security Measures80Protecting Business and Shared Accounts83Recommendations86Chapter Conclusion87Chapter Questions88Chapter 5: Email Security Best Practices91Understanding Email Threats92Recognizing and Avoiding Phishing Attempts95Securing Your Email Accounts99Safe Email Practices102Professional Email Etiquette and Security105Recommendations108Chapter Conclusion110Chapter Questions110Chapter 6: Managing Your Digital Footprint and Online Reputation114Understanding Your Digital Footprint115Monitoring and Controlling Your Online Presence118Building a Positive Online Reputation120Privacy Considerations123Future Implications of Your Digital Footprint125Recommendations127Chapter Conclusion129Chapter Questions130Chapter 7: Safe and Professional Use of Social Media133Navigating Social Media Platforms Securely133Protecting Personal Information136Professional Conduct on Social Media139Dealing with Social Media Threats141Leveraging Social Media Safely143Recommendations145Chapter Conclusion147Chapter Questions148Chapter 8: Dealing with Cyberbullying and Online Harassment152Understanding Cyberbullying and Harassment153Recognizing Signs of Cyberbullying155Strategies for Victims158Preventing Cyberbullying160Supporting Others and Advocacy163Recommendations166Chapter Conclusion167Chapter Questions168Chapter 9: Children's Online Safety and Parental Controls171The Digital World of Children and Teens172Communicating with Children About Cyber Safety175Implementing Parental Controls and Monitoring177Educating Children on Safe Online Practices180Collaborating with Schools and Communities183Recommendations185Chapter Conclusion187Chapter Questions188Chapter 10: Avoiding Online Scams and Social Engineering Tricks192Understanding Social Engineering193Common Online Scams195Recognizing Red Flags199Protecting Yourself from Scams202Educating Others and Staying Informed206Recommendations208Chapter Conclusion210Chapter Questions210Chapter 11: Using AI Securely and Protecting Your Privacy214The Role of AI in Everyday Life215Privacy Concerns with AI Technologies218Secure Use of AI-Powered Devices and Services221Protecting Personal Data in the Age of AI224Preparing for Future AI Developments228Recommendations230Chapter Conclusion232Chapter Questions233Chapter 12: Securing Your Devices and Wearables236Mobile Device Security Essentials237Protecting Against Mobile Malware240Securing Wearable Devices242Physical Security and Theft Prevention245Disposal and Recycling of Devices248Recommendations251Chapter Conclusion253Chapter Questions254Chapter 13: Managing Software and App Security on All Devices257Importance of Software Security258Safe Installation and Use of Applications261Configuration and Hardening of Software263Application Whitelisting and Blacklisting266Responding to Software Vulnerabilities270Recommendations272Chapter Conclusion274Chapter Questions275Chapter 14: Defending Yourself Against Ransomware and Malware278Understanding Malware and Ransomware279Preventing Malware Infections283Recognizing Signs of Infection286Responding to a Malware Attack290Mitigating the Impact of Ransomware292Recommendations295Chapter Conclusion296Chapter Questions297Chapter 15: How to Stay Safe While Browsing the Internet301Secure Browsing Practices302Avoiding Malicious Websites and Content305Protecting Personal Information Online308Mental Health and Digital Well-being312Safe Participation in Online Communities314Recommendations317Chapter Conclusion318Chapter Questions319Chapter 16: Network Security322Securing Your Home Network323Protecting Internet of Things (IoT) Devices326Safe Use of Public Wi-Fi Networks328Encryption and VPNs330Cybersecurity for Remote Work and Home Offices333Securing Online Gaming and Virtual Reality Platforms336Recommendations339Chapter Conclusion340Chapter Questions341Chapter 17: Safeguarding Your Financial Assets and Secure Online Transactions345Secure Online Banking Practices346Safe Online Shopping349Protecting Against Financial Fraud352Understanding Cryptocurrency Security356Planning for Financial Security359Recommendations361Chapter Conclusion362Chapter Questions363Chapter 18: Protecting Your Data: Backups, Cloud Storage, and Disaster Recovery367Importance of Data Protection368Effective Backup Strategies371Secure Use of Cloud Storage373Disaster Recovery Planning376Data Disposal and Destruction379Recommendations381Chapter Conclusion382Chapter Questions384Chapter 19: Cyber Crimes and How to Report Them387Understanding Cyber Crimes388Recognizing When You're a Victim391Reporting Cyber Crimes394The Investigation and Legal Process398Preventing Future Incidents400Recommendations402Chapter Conclusion404Chapter Questions405Chapter 20: Preparing for Emerging Cyber Threats408Emerging Cyber Threats409AI and Machine Learning in Cybersecurity411Adapting Security Practices415Personal Strategies for Future-Proofing Security418The Role of Individuals in Shaping Cybersecurity421Recommendations424Chapter Conclusion425Chapter Questions426Chapter 21: Teaching and Empowering Others in Cyber Safety429Sharing Knowledge and Resources430Encouraging Safe Practices in the Workplace433Supporting Friends and Family436Mentoring and Community Involvement439Continuing the Journey of Cyber Safety441Recommendations443Chapter Conclusion445Chapter Questions446Appendix – Answers to Chapter Questions449Chapter 1449Chapter 2452Chapter 3454Chapter 4456Chapter 5459Chapter 6462Chapter 7465Chapter 8468Chapter 9470Chapter 10472Chapter 11474Chapter 12476Chapter 13478Chapter 14480Chapter 15482Chapter 16484Chapter 17486Chapter 18488Chapter 19490Chapter 20492Chapter 21494Glossary496

Regulärer Preis: 70,99 €
Produktbild für Microsoft Power FX in Power Apps für Dummies

Microsoft Power FX in Power Apps für Dummies

EFFIZIENTE APP-ENTWICKLUNG AUF DER POWER PLATFORMSie haben Interesse an der App-Entwicklung mit Low-Code/No-Code? Dirk Larisch vermittelt Ihnen praxisnah einen strukturierten Einstieg in Microsoft Power Fx, insbesondere in die Entwicklung von Canvas Apps in Power Apps. Neben Grundlagen der App-Entwicklung lernen Sie die Funktionen und Bedienung von Power Apps, erhalten Einblick in Datentypen und Operatoren in Power Fx, erstellen Prozeduren und Funktionen, nutzen Copilot und setzen JSON und YAML ein. SIE ERFAHREN* Wie Sie mit Power Fx Canvas Apps entwickeln* Wie Sie andere Anwendungen der Power Platform an Ihre App anbinden* Tipps und Tricks zur Administration und App-EntwicklungDIRK LARISCH war als Informatiker lange in der IT und im Management tätig. Er ist Autor zahlreicher Bücher zu den Themen Computer, Netzwerktechnik, Programmierung und Anwendungen. Seine Erfahrungen als Coach und Trainer wendet er heute unter anderem im Bereich Power Platform an.

Regulärer Preis: 24,99 €
Produktbild für Securing Microsoft Azure OpenAI

Securing Microsoft Azure OpenAI

SECURELY HARNESS THE FULL POTENTIAL OF OPENAI’S ARTIFICIAL INTELLIGENCE TOOLS IN AZURESecuring Microsoft Azure OpenAI is an accessible guide to leveraging the comprehensive AI capabilities of Microsoft Azure while ensuring the utmost data security. This book introduces you to the collaborative powerhouse of Microsoft Azure and OpenAI, providing easy access to cutting-edge language models like GPT-4o, GPT-3.5-Turbo, and DALL-E. Designed for seamless integration, the Azure OpenAI Service revolutionizes applications from dynamic content generation to sophisticated natural language translation, all hosted securely within Microsoft Azure’s environment. Securing Microsoft Azure OpenAI demonstrates responsible AI deployment, with a focus on identifying potential harm and implementing effective mitigation strategies. The book provides guidance on navigating risks and establishing best practices for securely and responsibly building applications using Azure OpenAI. By the end of this book, you’ll be equipped with the best practices for securely and responsibly harnessing the power of Azure OpenAI, making intelligent decisions that respect user privacy and maintain data integrity. KARL OTS is Global Head of Cloud Security at EPAM Systems, an engineering and consulting firm. He leads a team of experts in delivering security and compliance solutions for cloud and AI deployments for Fortune 500 enterprises in a variety of industries. He has over 15 years’ experience in tech and is a trusted advisor and thought leader. Karl is also a Microsoft Regional Director and Security MVP. Introduction xxiiiCHAPTER 1 OVERVIEW OF GENERATIVE ARTIFICIAL INTELLIGENCE SECURITY 1Common Use Cases for Generative AI in the Enterprise 1Generative Artificial Intelligence 1Generative AI Use Cases 2LLM Terminology 3Sample Three-Tier Application 4Presentation Tier 5Application Tier 5Data Tier 5Generative AI Application Risks 5Hallucinations 6Malicious Usage 6Shadow AI 7Unfavorable Business Decisions 8Established Risks 8Shared AI Responsibility Model 8Shared Responsibility Model for the Cloud 9Shared Responsibility Model for AI 10AI Usage 10AI Application 10AI Platform 11Applying the Shared Responsibility Model 11Regulation and Control Frameworks 12Regulation in the United States 12Regulation in the European Union 12NIST AI Risk Management Framework 14Govern 15Map 15Measure 16Manage 16Key Takeaways 16References 17CHAPTER 2 SECURITY CONTROLS FOR AZURE OPENAI SERVICE 19On the Importance of Selecting Appropriate Security Controls 19Risk Appetite 20Comparing OpenAI Hosting Models 21OpenAI ChatGPT 21Privacy and Compliance 21Identity and Access Management 21Data Protection and Encryption 22Audit Logging 22Network Isolation 22Data Residency 22Azure OpenAI 22Privacy and Compliance 23Identity and Access Management 23Data Protection and Encryption 23Audit Logging 23Network Isolation 23Data Residency 23Recommendation for Enterprise Usage 24Evaluating Security Controls with MCSB 24Control Domains 26Network Security 27Identity Management 28Privileged Access 28Data Protection 29Asset Management 29Logging and Threat Detection 29Incident Response 30Posture and Vulnerability Management 30Endpoint Security 31Backup and Recovery 31DevOps Security 32Governance and Strategy 32Security Baselines 33Applying Microsoft Cloud Security Baseline to Azure OpenAI 33Security Profile 34How to Approach the Security Baseline 34Data Protection 35Identity Management 36Logging and Threat Detection 37Network Security 38Asset Management 38Backup and Recovery 39Endpoint Security 40Posture and Vulnerability Management 40Privileged Access 41Selected Controls 42Mapping the Selected Controls to CIS and NIST 44Using Azure Policy to Secure Azure OpenAI at Scale 46Azure Policy 46Continuous Compliance Monitoring 47Azure Policies for Azure OpenAI 48Key Takeaways 49References 49CHAPTER 3 IMPLEMENTING AZURE OPENAI SECURITY CONTROLS 51OWASP Top 10 for LLM Applications 51Prompt Injection 52Insecure Output Handling 52Training Data Poisoning 53Model Denial of Service 53Supply Chain Vulnerabilities 53Sensitive Information Disclosure 54Insecure Plugin Design 54Excessive Agency 54Overreliance 55Model Theft 55Access Control 56Implementing Access Control for Azure OpenAI 56Cognitive Services OpenAI User 57Cognitive Services OpenAI Contributor 58Azure AI Administrator 59Azure AI Developer 61Azure AI Enterprise Network Connection Approver 62Azure AI Inference Deployment Operator 64Preventing Local Authentication 65Disable Local Authentication Using Bicep 66Disable Local Authentication Using Terraform 66Disable Local Authentication Using ARM Templates 67Prevent Local Authentication Using PowerShell 67Enforcing with Azure Policy 67Audit Logging 68Control Plane Audit Logging 68Data Plane Audit Logging 71Enable Data Plane Audit Logging Using Azure Portal 72Enable Data Plane Audit Logging Using Bicep 73Enable Data Plane Audit Logging Using Terraform 73Enable Data Plane Audit Logging Using ARM Templates 74Enable Data Plane Audit Logging Using PowerShell 76Enable Data Plane Audit Logging Using Azure cli 76Enforcing with Azure Policy 77Enable Logging by Category Group for Cognitive Services 77Network Isolation 82Default Network Controls 83Control Inbound Network Traffic 83Control Inbound Network Traffic Using the Azure Portal 84Control Inbound Network Traffic Using Bicep 84Control Inbound Network Traffic with Private Endpoints Using Infrastructure as Code 85Control Inbound Network Traffic Using Terraform 87Control Inbound Network Traffic with Private Endpoints Using Terraform 87Control Inbound Network Traffic Using ARM Templates 89Control Inbound Network Traffic with Private Endpoints Using ARM Templates 90Control Inbound Network Traffic Using PowerShell 93Control Inbound Network Traffic with Private Endpoints Using PowerShell 94Control Inbound Network Traffic Using Azure cli 95Control Inbound Network Traffic with Private Endpoints Using Azure cli 95Control Outbound Network Traffic 97Enable Data Loss Prevention Using REST 97Enable Data Loss Prevention Using Bicep 98Enable Data Loss Prevention Using Terraform 98Enable Data Loss Prevention Using ARM Templates 99Enforcing with Azure Policy 101Azure AI Services Resources Should Restrict Network Access 101Azure AI Services Resources Should Use Azure Private Link 103Encryption at Rest 105Implementing Azure OpenAI with CMK 106Implement CMK Using Azure Portal 106Implement CMK Using Bicep 107Implement CMK Using Terraform 109Implement CMK Using ARM Templates 111Implement CMK Using PowerShell 114Implement CMK Using the Azure cli 115Enforcing with Azure Policy 116Azure AI Services Resources Should Encrypt Data at Rest with a CMK 117Content Filtering Controls 119System Safety Prompts 119Azure AI Content Safety 120Content Filtering 120Prompt Shields 121Protected Material Detection 121Groundedness Detection 121Creating a Content Filter 121Implementing Content Filtering Programmatically 122Content Safety Input Restrictions 123Key Takeaways 123References 124CHAPTER 4 SECURING THE ENTIRE APPLICATION 125The Three-Tier LLM Application in Azure 125Presentation Tier 126Application Tier 126Data Tier 126On Threat Modeling 126Threat Model of the Three-Tier Application 127Revised Application Architecture 129Retrieval-Augmented Generation 129RAG in Azure 130Azure AI Search 130Azure Cosmos DB 131Application Architecture with RAG 131Azure Front Door 132Security Profile 132Security Baseline 132Implementing Security Controls 133Access Control 133Audit Logging 133Network Isolation 141Encryption at Rest 152Enforcing Controls with Policies 152Azure App Service 153Security Profile 153Security Baseline 153Implementing Security Controls 155Access Control 156Audit Logging 163Network Isolation 169Encryption at Rest 176Enforcing Controls with Policies 176API Management 177Security Profile 177Security Baseline 178Implementing Security Controls 178Access Control 179Audit Logging 180Network Isolation 186Encryption at Rest 201Enforcing Controls with Policies 202Storage Account 202Security Profile 202Security Baseline 203Implementing Security Controls 204Access Control 204Audit Logging 209Network Isolation 216Encryption at Rest 225Backup and Recovery 232Discover, Classify, and Protect Sensitive Data 238Enforcing Controls with Policies 238Cosmos DB 238Security Profile 239Security Baseline 239Implementing Security Controls 241Access Control 241Audit Logging 244Network Isolation 249Encryption at Rest 256Backup and Recovery 262Enforcing Controls with Policies 266Azure AI Search 266Security Profile 266Security Baseline 267Implementing Security Controls 268Access Control 268Audit Logging 272Network Isolation 278Encryption at Rest 287Enforcing Controls with Policies 294Key Takeaways 294References 294CHAPTER 5 MOVING TO PRODUCTION 297LLM Application Security Lifecycle 297Model Supply Chain 298Security Testing 299Model Safety Evaluation 299How to Use Model Safety Evaluation 300Adversarial Testing 300How to Use the Adversarial Simulator Service 301Red Teaming 304Crescendo Multiturn Attack 304Red Teaming with PyRIT 304Content Credentials 305AI Security Posture Management 307Discover and Manage Shadow AI 307Discover SaaS Applications 307Discover Generative AI Applications 309Manage Generative AI Applications 312Alert on Anomalous Activity and Applications 313Defender for Cloud AI Workloads 314Discovery 314Posture Management 314Security Alerting 314Security Posture Management 315Investigating Security Alerts 316Alert Details 317Supporting Evidence 318Take Action 319Managing Incidents 323Instrumenting Security Alert Ingestion 324Azure OpenAI Alerts 326Detected Credential Theft Attempts on an Azure OpenAI Model Deployment 327A Jailbreak Attempt on an Azure OpenAI Model Deployment Was Blocked by Azure AI Content Safety Prompt Shields 327A Jailbreak Attempt on an Azure OpenAI Model Deployment Was Detected by Azure AI Content Safety Prompt Shields 327Sensitive Data Exposure Detected in Azure OpenAI Model Deployment 327Corrupted AI Application, Model, or Data Directed a Phishing Attempt at a User 328Phishing URL Shared in an AI Application 328Phishing Attempt Detected in an AI Application 328Defender for Cloud Alerts for Other Services 328App Service Alerts 329API Management Alerts 330Storage Account Alerts 331Cosmos DB Alerts 332LLM Application in Your Cloud Security Architecture 332Cloud Security Control Domains 333Asset Management 333Incident Response 334Privileged Access 336Posture and Vulnerability Management 337Landing Zones 339About Landing Zones 339Microsoft Enterprise-Scale Landing Zones 339Microsoft Landing Zone Accelerator for OpenAI 342LLM Application in the Landing Zone 342The Sample Application in the Landing Zone 342Access Control 343Security Monitoring 343Incident Response 344Network 344Key Takeaways 345References 345Index 347

Regulärer Preis: 42,99 €
Produktbild für When Docker Meets Java

When Docker Meets Java

Discover how to become a more efficient Java developer using Docker. This book will help you streamline your development process, boost portability, and enhance the efficiency of your applications.Docker has transformed the landscape of application and deployment by simplifying the creation and management of development environments, saving valuable time and reducing compatibility issues. With this book, you will learn how to package Java applications into Docker containers, making them consistent and portable across different environments. As a result, you’ll gain the expertise to efficiently scale and manage your applications, ensuring they run smoothly in production to boost development efficiency.This book sets itself apart through its emphasis on Java developers’ specific needs and challenges, providing relevant examples and use cases. The hands-on practical approach provides you with the necessary skills to be a more valuable Java developer.WHAT YOU WILL LEARN* Understand the fundamental concepts of Docker and containerization* Package Java applications into Docker containers* Gain hands-on experience in Dockerizing Java applications* Efficiently test, debug, deploy, and scale Java applications using Docker* Acquire skills that will make you a more valuable and efficient Java developerWHO THIS BOOK IS FORJava developers who want to make their applications more portable and easier to manageASHISH CHOUDHARY is a senior software engineer and published author. He has over 14 years of experience in the IT industry. He has experience in designing, developing, and deploying web applications. His technical expertise includes Java, Spring Boot, Docker, Kubernetes, IMDG, distributed systems, microservices, DevOps, and the cloud. Ashish is an active blogger and technical writer. He has delivered talks at renowned conferences such as GitHub Satellite India and Fosdem. He is a strong advocate of Open Source technologies. He has been contributing to various open source projects for quite some time. Ashish believes in continuous learning and knowledge sharing.Chapter 1: Overview of Containers.- Chapter 2: Docker High-Level Overview.- Chapter 3: Up and Running with Docker.- Chapter 4: Learning Advanced Docker Concepts.- Chapter 5: Containerizing Java Applications with Dockerfile.- Chapter 6: Working with Container Builder Tools for Java Applications.- Chapter 7: Deploying Docker Containers using GitHub Actions.- Chapter 8: Exploring Docker Alternatives.- Chapter 9: Building Native Images with GraalVM.- Chapter 10: Testing Java Applications using Testcontainers.- Chapter 11: Docker Best Practices for Java Developers.

Regulärer Preis: 72,99 €