Computer und IT
Security in Vehicular Networks
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road.This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.Leila Benarous is an associate professor in the Computer Science department and a researcher at LIM Laboratory, University of Laghouat, Algeria. She is also an associate member of UPEC-LiSSi-TincNET Research Team, France.Salim Bitam is a professor of Computer Science and vice rector responsible for post-graduation training and scientific research at the University of Biskra, Algeria. His main research interests include vehicular networks, cloud computing and bio-inspired methods.Abdelhamid Mellouk is currently the director of IT4H High School Engineering Department, a professor at the University of Paris-Est Créteil (UPEC) and Head of UPEC-LiSSi-TincNET Research Team, France. He is the founder of the Network Control Research and Curricula activities in UPEC, the current co President of the French Deep Tech Data Science and Artificial Intelligence Systematic Hub, member of the Algerian High Research Council (CNRST) and an associate editor of several top ranking scientific journals.Preface xiList of Acronyms xiiiIntroduction xixCHAPTER 1 VEHICULAR NETWORKS 11.1 Introduction 11.2 Motivation by numbers 21.3 Evolution 31.4 Architecture 41.5 Characteristics 51.6 Technical challenges and issues 61.7 Wireless technology 71.8 Standards 71.8.1 IEEE WAVE stack 81.8.2 ETSI standards 91.8.3 The 3GPP standard 91.9 Types 101.9.1 The autonomous vehicle (self-dependent) 101.9.2 VANET 111.9.3 Vehicular clouds 111.9.4 Internet of vehicles 121.9.5 Social Internet of vehicles 141.9.6 Data named vehicular networks 151.9.7 Software-defined vehicular networks 151.10 Test beds and real implementations 161.11 Services and applications 171.12 Public opinion 191.13 Conclusion 20CHAPTER 2 PRIVACY AND SECURITY IN VEHICULAR NETWORKS 212.1 Introduction 212.2 Privacy issue in vehicular networks 222.2.1 Types 232.2.2 When and how it is threatened? 242.2.3 Who is the threat? 242.2.4 What are the consequences? 242.2.5 How can we protect against it? 252.3 State-of-the-art location privacy-preserving solutions 282.3.1 Non-cooperative change 282.3.2 Silence approaches 282.3.3 Infrastructure-based mix-zone approach 282.3.4 The cooperation approach (distributed mix-zone) 362.3.5 Hybrid approach 362.4 Authentication issues in vehicular networks 492.4.1 What is being authenticated in vehicular networks? 492.4.2 Authentication types 502.4.3 How does authentication risk privacy? 512.5 Identity privacy preservation authentication solutions: state of the art 522.6 Conclusion 54CHAPTER 3 SECURITY AND PRIVACY EVALUATION METHODOLOGY 553.1 Introduction 553.2 Evaluation methodology 583.2.1 Security 583.2.2 Privacy 663.3 Conclusion 74CHAPTER 4 THE ATTACKER MODEL 754.1 Introduction 754.2 Security objectives 764.3 Security challenges 784.4 Security attacker 794.4.1 Aims 804.4.2 Types 804.4.3 Means 814.4.4 Attacks 82Contents vii4.4.5 Our attacker model 854.5 Conclusion 90CHAPTER 5 PRIVACY-PRESERVING AUTHENTICATION IN CLOUD-ENABLED VEHICLE DATA NAMED NETWORKS (CVDNN) FOR RESOURCES SHARING 915.1 Introduction 915.2 Background 925.2.1 Vehicular clouds 925.2.2 Vehicular data named networks 945.3 System description 945.4 Forming cloud-enabled vehicle data named networks 955.5 Migrating the local cloud virtual machine to the central cloud 975.6 Privacy and authentication when using/providing CVDNN services 975.6.1 The authentication process 985.6.2 The reputation testimony 1005.7 The privacy in CVDNN 1025.8 Discussion and analysis 1035.8.1 The privacy when joining the VC 1035.8.2 Privacy while using the VC 1065.9 Conclusion 106CHAPTER 6 PRIVACY-PRESERVING AUTHENTICATION SCHEME FOR ON-ROAD ON-DEMAND REFILLING OF PSEUDONYM IN VANET 1096.1 Introduction 1096.2 Network model and system functionality 1116.2.1 Network model 1116.2.2 The system functionality 1136.3 Proposed scheme 1146.4 Analysis and discussion 1196.4.1 Security analysis 1196.4.2 Burrows, Abadi and Needham (BAN) logic 1246.4.3 SPAN and AVISPA tools 1266.5 Conclusion 129CHAPTER 7 PRESERVING THE LOCATION PRIVACY OF VEHICULAR AD HOC NETWORK USERS 1317.1 Introduction 1317.2 Adversary model 1337.3 Proposed camouflage-based location privacy-preserving scheme 1337.3.1 Analytical model 1357.3.2 Simulation 1367.4 Proposed hybrid pseudonym change strategy 1417.4.1 Hypothesis and assumptions 1417.4.2 Changing the pseudonyms 1427.4.3 The simulation 1457.5 Conclusion 148CHAPTER 8 PRESERVING THE LOCATION PRIVACY OF INTERNET OF VEHICLES USERS 1518.1 Introduction 1518.2 CE-IoV 1538.3 Privacy challenges 1568.4 Attacker model 1578.5 CLPPS: cooperative-based location privacy-preserving scheme for Internet of vehicles 1588.5.1 Simulation 1598.5.2 Comparative study and performance analysis 1638.6 CSLPPS: concerted silence-based location privacy-preserving scheme for Internet of vehicles 1668.6.1 The proposed solution 1668.6.2 Simulation results 1678.6.3 Comparative study performance analysis 1698.7 Obfuscation-based location privacy-preserving scheme in cloud-enabled Internet of vehicles 1718.7.1 The proposition 1718.7.2 Study of feasibility using game theoretic approach 1738.7.3 The simulation 1748.7.4 Analytical model 1778.7.5 Comparative study 1788.8 Conclusion 180CHAPTER 9 BLOCKCHAIN-BASED PRIVACY-AWARE PSEUDONYM MANAGEMENT FRAMEWORK FOR VEHICULAR NETWORKS 1819.1 Introduction 1819.2 Background 1839.2.1 Public key infrastructure (PKI) 1839.2.2 Vehicular PKI 1859.2.3 Blockchain technology 1859.2.4 Blockchain of blockchains 1909.3 Related works 1919.3.1 Blockchain-based PKI 1919.3.2 Privacy-aware blockchain-based PKI 1919.3.3 Monero 1919.3.4 Blockchain-based vehicular PKI 1929.4 Key concepts 1929.4.1 Ring signature 1929.4.2 One-time address 1949.5 Proposed solution 1959.5.1 General description 1959.5.2 Registration to the blockchain 1969.5.3 Certifying process 1969.5.4 Revocation process 1979.5.5 Transaction structure and validation 1979.5.6 Block structure and validation 2009.5.7 Authentication using blockchain 2019.6 Analysis 2029.7 Comparative study 2069.8 Conclusion 206Conclusion 211References 215Index 229
Product Ownership meistern (2. Auflg.)
Produkte erfolgreich entwickelnAls Product Owner stehen Sie jeden Tag vor der Herausforderung, Produkte Wirklichkeit werden zu lassen. Sie sind stets auf der Suche nach dem Wert für ihre Kunden und müssen dabei Stakeholder, Unternehmenspolitik und Kundinnen unter einen Hut bringen. »Product Ownership meistern« zeigt auf, warum heutiges Produktmanagement nicht nur kompliziert, sondern komplex ist und gibt Ihnen Hilfestellungen, wie Sie die Komplexität meistern können – von der ersten Produktidee bis zur Produktablöse den gesamten Lebenszyklus entlang.Autoren: Frank Düsterbeck macht Arbeit wert(e)voll – als Geschäftsführer der Kurswechsel Unternehmensberatung GmbH, Berater bei der HEC GmbH, Dozent, Fachbeirat und Sprecher auf diversen Konferen-zen und Veranstaltungen. Er ist Experte in den Bereichen digitale Produktentwicklung, Innovation sowie Organisationsentwicklung und -Transformation. Immer mit dem klaren Ziel, wirklich etwas im Denken seiner Gegenüber zu bewirken und über den Einsatz mo-derner Verfahren und Methoden, eine wertbringende und wert-schöpfende Zusammenarbeit zu ermöglichen.Ina Einemann arbeitet als agiler Coach mit dem Schwerpunkt An-forderungsmanagement und Product Ownership bei der Open Knowlege GmbH in Oldenburg. Seit zehn Jahren beschäftigt sie sich mit agilen Methoden und Vorgehensmodellen und berät Teams bei der Umsetzung agiler Praktiken mit dem Ziel, Teams zu motivieren, tolle Produkte umzusetzen. Sie spricht regelmäßig auf agilen Konferenzen, ist Kuratorin diverser Konferenzen und einer der Hosts vom agilen Podcast „Mein Scrum ist kaputt“.Zielgruppen: Product OwnerProduktmanager*innenProjektmanager*innenScrum Master
Make: Elektronik (3. Auflage)
Eine unterhaltsame Einführung für Maker, Kids, Tüftlerinnen und Bastler in 3. Auflage.Dinge verheizen, Sachen vermasseln – so lernt man. Beginnend mit den grundlegenden Konzepten können Sie anhand eigener praktischer Experimente und unter Verwendung erschwinglicher Teile und Werkzeuge lernen.Auf dem Weg dorthin können Sie eine Sicherung durchbrennen lassen, ein Relais zum Summen bringen und eine Leuchtdiode durchbrennen lassen. In Make: Elektronik gibt es kein misslungenes Experiment, denn alle Experimente sind ein wertvoller Lernprozess. Mit dieser dritten Auflage wird das bewährte Buch jetzt noch besser.Innerhalb weniger Stunden bauen Sie einen Reflexionstester, einen Einbruchsalarm, ein Quizspiel oder ein Zahlenschloss – und modifizieren sie, um noch viel mehr zu tun. Nachdem Sie die Grundlagen von Spannung, Strom, Widerstand, Kapazität und Induktivität kennengelernt haben, werden Sie die Grundlagen von Logikchips, Funk, Mikrocontrollern und Elektromagnetismus entdecken. Jedes Projekt passt auf ein einziges Breadboard, und die meisten erfordern keine Lötarbeiten.Alle Experimente arbeiten mit sicheren, niedrigen Spannungen, die meist von einer einzigen 9-Volt-Batterie geliefert werden. Make:-Elektronik zieht Leserinnen und Leser aller Altersgruppen angezogen, von 10-Jährigen bis hin zu Rentnerinnen und Rentnern, die endlich freie Zeit haben, um ihre Neugierde an Elektronik zu befriedigen.Zum Autor:Charles Platts erstes Elektronik-Projekt war ein Telefonanrufbeantworter, den er mit 15 selbst baute. Er wurde Science-Fiction-Autor (The Silicon Man), brachte Leuten das Erstellen von Computergrafiken bei und war Redakteur bei der Zeitschrift Wired, ehe er wieder zu seiner ersten Liebe, der Elektronik, zurückkehrte. Er ist Editor beim amerikanischen Make:-Magazin.
Practical MATLAB Deep Learning
Harness the power of MATLAB for deep-learning challenges. Practical MATLAB Deep Learning, Second Edition, remains a one-of a-kind book that provides an introduction to deep learning and using MATLAB's deep-learning toolboxes. In this book, you’ll see how these toolboxes provide the complete set of functions needed to implement all aspects of deep learning. This edition includes new and expanded projects, and covers generative deep learning and reinforcement learning.Over the course of the book, you'll learn to model complex systems and apply deep learning to problems in those areas. Applications include:* Aircraft navigation* An aircraft that lands on Titan, the moon of Saturn, using reinforcement learning* Stock market prediction* Natural language processing* Music creation usng generative deep learning* Plasma control* Earth sensor processing for spacecraft* MATLAB Bluetooth data acquisition applied to dance physics WHAT YOU WILL LEARN* Explore deep learning using MATLAB and compare it to algorithms* Write a deep learning function in MATLAB and train it with examples* Use MATLAB toolboxes related to deep learning* Implement tokamak disruption prediction* Now includes reinforcement learningWHO THIS BOOK IS FOREngineers, data scientists, and students wanting a book rich in examples on deep learning using MATLAB.MICHAEL PALUSZEK is the co-author of MATLAB Recipes published by Apress. He is President of Princeton Satellite Systems, Inc. (PSS) in Plainsboro, New Jersey. Mr. Paluszek founded PSS in 1992 to provide aerospace consulting services. He used MATLAB to develop the control system and simulation for the Indostar-1 geosynschronous communications satellite, resulting in the launch of PSS' first commercial MATLAB toolbox, the Spacecraft Control Toolbox, in 1995. Since then he has developed toolboxes and software packages for aircraft, submarines, robotics, and fusion propulsion, resulting in PSS' current extensive product line. He is currently leading an Army research contract for precision attitude control of small satellites and working with the Princeton Plasma Physics Laboratory on a compact nuclear fusion reactor for energy generation and propulsion. Prior to founding PSS, Mr. Paluszek was an engineer at GE Astro Space in East Windsor, NJ. At GE he designed the Global Geospace Science Polar despun platform control system and led the design of the GPS IIR attitude control system, the Inmarsat-3 attitude control systems and the Mars Observer delta-V control system, leveraging MATLAB for control design. Mr. Paluszek also worked on the attitude determination system for the DMSP meteorological satellites. Mr. Paluszek flew communication satellites on over twelve satellite launches, including the GSTAR III recovery, the first transfer of a satellite to an operational orbit using electric thrusters. At Draper Laboratory Mr. Paluszek worked on the Space Shuttle, Space Station and submarine navigation. His Space Station work included designing of Control Moment Gyro based control systems for attitude control. Mr. Paluszek received his bachelors in Electrical Engineering, and master's and engineer’s degrees in Aeronautics and Astronautics from the Massachusetts Institute of Technology. He is author of numerous papers and has over a dozen U.S. Patents.STEPHANIE THOMAS is the co-author of MATLAB Recipes, published by Apress. She received her bachelor's and master's degrees in Aeronautics and Astronautics from the Massachusetts Institute of Technology in 1999 and 2001. Ms. Thomas was introduced to PSS' Spacecraft Control Toolbox for MATLAB during a summer internship in 1996 and has been using MATLAB for aerospace analysis ever since. She built a simulation of a lunar transfer vehicle in C++, LunarPilot, during the same internship. In her nearly 20 years of MATLAB experience, she has developed many software tools including the Solar Sail Module for the Spacecraft Control Toolbox; a proximity satellite operations toolbox for the Air Force; collision monitoring Simulink blocks for the Prisma satellite mission; and launch vehicle analysis tools in MATLAB and Java, to name a few. She has developed novel methods for space situation assessment such as a numeric approach to assessing the general rendezvous problem between any two satellites implemented in both MATLAB and C++. Ms. Thomas has contributed to PSS' Attitude and Orbit Control textbook, featuring examples using the Spacecraft Control Toolbox, and written many software User's Guides. She has conducted SCT training for engineers from diverse locales such as Australia, Canada, Brazil, and Thailand and has performed MATLAB consulting for NASA, the Air Force, and the European Space Agency.ERIC HAM is a a Technical Specialist, Princeton Satellite Systems. His expertise lies with deep learning, programming using MATLAB, C++ and related.1. What is deep learning? – no changes except editoriala. Machine learning vs. deep learningb. Approaches to deep learningc. Recurrent deep learningd. Convolutional deep learning2. MATLAB machine and deep learning toolboxesa. Describe the functionality and applications of each toolboxb. Demonstrate MATLAB toolboxes related to Deep Learningc. Include the text toolbox generative toolbox and reinforcement learning toolboxd. Add more detail on each3. Finding Circles – no changes except editorial.4. Classifying movies – no changes except editorial.5. Tokamak disruption detection – this would be updated.6. Classifying a pirouette – no changes except editorial.7. Completing sentences - This would be revamped using the MATLAB Text Processing Toolbox.8. Terrain based navigation-The example in the original book would be changed to a regression approach that can interpolate position. We would switch to a terrestrial example applicable to drones.9. Stock prediction – this is a very popular chapter. We would improve the algorithm.10. Image classification – no changes except editorial.11. Orbit Determination – add inclination to the algorithm.12. Earth Sensors – a new example on how to use neural networks to measure roll and yaw from any Earth sensor.13. Generative deep learning example. This would be a neural network that generates pictures after learning an artist’s style.14. Reinforcement learning. This would be a simple quadcopter hovering control system. It would be simulation based although readers would be able to apply this to any programmable quadcopter.
CO-PA in SAP S/4HANA Finance
Wirksames Ergebniscontrolling ist für den Erfolg Ihres Unternehmens entscheidend. In diesem Buch lernen Sie, wie Sie die Ergebnis- und Marktsegmentrechnung in SAP S/4HANA Finance an Ihre Bedürfnisse anpassen. Anhand von Beispielen und Screenshots erfahren Sie alles zur Stammdatenpflege und Berichterstellung. Und Sie lernen, wie Sie Predictive Accounting nutzen, um vorausschauend bessere und schnellere Entscheidungen zu treffen. Auch die Migration von SAP ERP zu SAP S/4HANA Finance wird ausführlich behandelt. Aus dem Inhalt: Ergebnisrechnung mit CO-PA in SAP S/4HANA FinanceErgebnisbereich und Grundeinstellungen für die ErgebnisrechnungMerkmalkonfigurationKonfiguration von Wert- und MengenfeldernBuchhalterische ErgebnisrechnungMargenanalyseIst-Wertflüsse Einleitung ... 13 1. Einführung in die Ergebnisrechnung ... 17 1.1 ... Zweck der Ergebnisrechnung ... 17 1.2 ... Kosten- und Erlösträger ... 19 1.3 ... Arten der Ergebnisrechnung ... 20 1.4 ... Technische Struktur ... 30 1.5 ... Zusammenfassung ... 32 2. Customizing des Ergebnisbereichs und Grundeinstellungen für die Ergebnisrechnung ... 35 2.1 ... Einen Ergebnisbereich pflegen ... 35 2.2 ... Währungen ... 50 2.3 ... Nummernkreise ... 54 2.4 ... Versionen ... 59 2.5 ... Ergebnisbereich transportieren ... 61 2.6 ... Ergebnisbereich setzen ... 64 2.7 ... Erweiterungsledger für die Ergebnisrechnung anlegen ... 65 2.8 ... Zusammenfassung ... 68 3. Merkmale konfigurieren ... 69 3.1 ... Merkmale ... 69 3.2 ... Merkmalsableitungen ... 86 3.3 ... Merkmale in Belegen ableiten ... 121 3.4 ... Zusammenfassung ... 137 4. Customizing der Wert- und Mengenfelder für die kalkulatorische Ergebnisrechnung ... 139 4.1 ... Wertfelder konfigurieren ... 139 4.2 ... Mengenfelder konfigurieren ... 143 4.3 ... Wert- und Mengenfelder dem Ergebnisbereich zuordnen ... 146 4.4 ... Zusammenfassung ... 150 5. Customizing des Werteflusses für die Margenanalyse ... 151 5.1 ... Einführung ... 151 5.2 ... Predictive Accounting ... 152 5.3 ... Überleitung von Fakturen ... 160 5.4 ... Herstellkosten in der Margenanalyse ... 177 5.5 ... Split der Umsatzkosten ... 179 5.6 ... Abweichungsermittlung ... 189 5.7 ... Ableitung für Belegzeilen ohne Ergebnisobjekt ... 210 5.8 ... Abrechnung Projekte/PSP-Elemente ... 219 5.9 ... Kostenstellenumlage ... 230 5.10 ... Direktkontierung ... 245 5.11 ... Zusammenfassung ... 247 6. Customizing des Werteflusses für die kalkulatorische Ergebnisrechnung ... 249 6.1 ... Einführung ... 249 6.2 ... Kundenauftragsbestand ... 252 6.3 ... Fakturaüberleitung ... 260 6.4 ... Herstellkosten in CO-PA ... 275 6.5 ... Kalkulation nach CO-PA übernehmen ... 284 6.6 ... Abweichungsermittlung ... 297 6.7 ... Projekte/PSP-Elemente abrechnen ... 315 6.8 ... Kostenstellenumlage ... 324 6.9 ... Direktkontierung ... 338 6.10 ... Zusammenfassung ... 342 7. Planung ... 343 7.1 ... Was ändert sich für die Planung mit SAP S/4HANA Finance? ... 343 7.2 ... Planung in der Margenanalyse ... 345 7.3 ... Planung in der kalkulatorischen Ergebnisrechnung ... 354 7.4 ... Zusammenfassung ... 366 8. Reporting ... 369 8.1 ... Übersicht des Reportings in der Ergebnisrechnung ... 369 8.2 ... Reporting in der Margenanalyse ... 373 8.3 ... Reporting in der kalkulatorischen Ergebnisrechnung ... 402 8.4 ... Zusammenfassung ... 412 A. Änderungen am Datenmodell ... 413 Die Autorin ... 415 Index ... 417
WordPress - Plugins, Themes und Blöcke entwickeln
Mit der Entwicklung eigener Plugins, Themes und Blöcke erschließen Sie sich das gesamte Potenzial von WordPress – ohne Einschränkungen und ganz nach Ihren Bedürfnissen. Florian Simeth führt Sie in die Grundlagen der professionellen Entwicklung ein und stellt Ihnen das vollständige Expertenwissen für Ihren Erfolg zur Verfügung. Sie steigen tief in die Entwicklungsprozesse ein und lernen die relevanten APIs kennen. Profitieren Sie von zahlreichen Beispielprojekten und Best Practices. Inkl. UX-Crashkurs für gutes Webdesign. Aktuell zu WordPress 6. Aus dem Inhalt: Die ersten Schritte im EntwicklungsprozessPlugins, Themes und Blöcke entwickelnCrashkurs UX für gutes Theme-DesignPerformance, Sicherheit, PrivatsphärejQuery, React und Underscore in WordPress nutzenInternationalisierungFehler finden und beheben: DebuggingEigene InhaltstypenExterne Daten nachladenAuf Datenbanken zugreifenArbeiten mit der REST-APIMultisite-Umgebung aufsetzenInhalte dynamisch einfügen Materialien zum Buch ... 20 Vorwort ... 21 TEIL I. Die Entwicklungsumgebung kennenlernen ... 27 1. Erste Schritte im Entwicklungsprozess ... 29 1.1 ... WordPress installieren ... 31 1.2 ... Lokale Laufzeitumgebungen ... 42 1.3 ... Entwickeln mit dem Texteditor? ... 45 1.4 ... Software-Entwicklungstools einrichten ... 47 2. Bewährte Konzepte bei der Entwicklung mit WordPress ... 57 2.1 ... Der Slug: Den Namen für das Projekt richtig wählen ... 57 2.2 ... Den richtigen Lizenzvertrag wählen ... 59 2.3 ... Coding-Standards: Welche sollten verwendet werden? ... 62 2.4 ... Dokumentationsstandards: Welche sollten verwendet werden? ... 77 2.5 ... Präfixe und Namespaces ... 83 2.6 ... Objektorientierung in WordPress ... 85 2.7 ... Empfohlene Datei- und Verzeichnisstrukturen ... 85 2.8 ... Online-Nachschlagewerke für die WordPress-Entwicklung ... 88 3. Überall alles verändern: Die Hooks als Grundkonzept in WordPress ... 93 3.1 ... Was sind Actions und Filter? ... 94 3.2 ... Häufig genutzte Actions und Filter in WordPress ... 104 3.3 ... Filter und Actions finden ... 107 3.4 ... Arbeiten mit Filtern und Actions ... 111 TEIL II. Plugins, Themes und Blöcke entwickeln ... 127 4. Ein Plugin erstellen ... 129 4.1 ... Grundwissen zu Plugins ... 129 4.2 ... Das erste eigene Plugin ... 144 4.3 ... Pfadangaben ... 162 5. Ein Theme erstellen ... 175 5.1 ... Grundwissen zu Themes ... 175 5.2 ... Crashkurs: Gutes Webdesign ... 188 5.3 ... Ein Classic-Theme erstellen ... 208 5.4 ... CSS für Themes ... 269 5.5 ... Seitenleisten und Widgets erstellen ... 286 5.6 ... Menüs erstellen ... 301 5.7 ... Wenn Themes Kinder bekommen: Child-Themes ... 306 5.8 ... Ein Block-Theme entwickeln ... 308 5.9 ... Themes testen ... 329 5.10 ... Zusammenfassung ... 333 6. Einstellungsseiten generieren und das Dashboard erweitern ... 335 6.1 ... Haupt- und Untermenüs erstellen ... 335 6.2 ... Konsistenz im Layout: Die WordPress-UI nutzen ... 342 6.3 ... Einstellungsfelder generieren ... 358 6.4 ... Dashboard-Widgets erstellen ... 373 7. Performance und Sicherheit ... 379 7.1 ... WordPress-Projekte absichern ... 379 7.2 ... Den Turbo aktivieren: Mehr Performance in WordPress-Projekten ... 411 8. CSS und JavaScript in WordPress ... 429 8.1 ... Skripte registrieren, einhängen und entfernen ... 431 8.2 ... Integrierte JS- und CSS-Dateien in WordPress ... 441 8.3 ... Backbone und Underscore ... 445 8.4 ... Crashkurs jQuery ... 446 8.5 ... Crashkurs React ... 460 8.6 ... Internationalisierung ... 485 8.7 ... Hintergrundaktivitäten mit der Heartbeat-API ... 489 9. Einen Block erstellen ... 495 9.1 ... Grundwissen zu Blöcken ... 496 9.2 ... Einen Block erstellen ... 501 9.3 ... Block-Vorlagen erstellen ... 546 10. Internationalisierung ... 555 10.1 ... Grundwissen ... 556 10.2 ... Übersetzungsdateien und Gettext ... 557 10.3 ... Ein Plugin zur Übersetzung vorbereiten ... 557 10.4 ... Ein Theme zur Übersetzung vorbereiten ... 560 10.5 ... Übersetzungsfunktionen ... 561 10.6 ... JavaScript-Inhalte (und Blöcke) übersetzen ... 567 10.7 ... Eine Übersetzungsdatei erstellen ... 569 11. Fehler finden und beheben: Das Debugging ... 581 11.1 ... Kompatibilität ... 582 11.2 ... Error-Logging in WordPress ... 588 11.3 ... Debugging aktivieren und Skripte analysieren ... 597 11.4 ... Ein WordPress-Plugin zum Debuggen ... 605 11.5 ... JavaScript debuggen ... 607 TEIL III. Ihr Projekt erweitern und individualisieren ... 611 12. Schöne URLs mit der Rewrite-API ... 613 12.1 ... Warum »schöne« URLs? ... 613 12.2 ... Was ist ein Permalink in WordPress? ... 614 12.3 ... Wie WordPress schöne URLs auflöst ... 616 12.4 ... Eigene Permalink-Strukturen anlegen ... 624 12.5 ... Ein alternativer Weg zu neuen Permalink-Strukturen ... 636 13. Mit eigenen Inhaltstypen arbeiten ... 641 13.1 ... Benutzerdefinierte Artikeltypen ... 641 13.2 ... Benutzerdefinierte Taxonomien ... 660 13.3 ... Das Kind braucht einen Namen: Terme für Taxonomien erstellen ... 670 13.4 ... Zusätzliche Daten zu Inhalten speichern mit der Metadaten-API ... 674 13.5 ... Mit Inhaltstypen im Frontend arbeiten ... 686 14. Externe Daten nachladen mit der HTTP-API ... 697 14.1 ... Was ist eine HTTP-Abfrage? ... 698 14.2 ... HTTP-Abfragen mit WordPress ... 702 15. Die Schnittstelle zur Außenwelt: Die REST-API ... 719 15.1 ... Was bedeutet »REST«? ... 719 15.2 ... Abgrenzung zu HTTP ... 720 15.3 ... Schlüsselkonzepte der REST-API ... 721 15.4 ... Mit Endpunkten arbeiten ... 725 15.5 ... Die REST-API mit eigenen Routen erweitern ... 744 15.6 ... Controller-Klassen nutzen ... 766 15.7 ... Mit Metadaten und REST-Feldern arbeiten ... 768 16. Benutzer- und Rechtemanagement ... 785 16.1 ... Arbeiten mit Benutzern ... 786 16.2 ... Rollenverteilung: Rollen und Benutzer-Befugnisse (Capabilities) ... 801 16.3 ... Daten zu Benutzern speichern: Die Metadata-API ... 819 17. Zugriff auf die Datenbank ... 825 17.1 ... Eigene Datenbank-Verbindungen ... 825 17.2 ... Benutzerdefinierte Tabellen ... 827 17.3 ... Die wichtigsten Datenbank-Klassen in WordPress ... 849 18. Dateien auf dem Laufwerk manipulieren ... 873 18.1 ... Was ist die Filesystem-API? ... 873 18.2 ... Mögliche Einsatzzwecke ... 873 18.3 ... Lokale Daten manipulieren ... 875 18.4 ... Entfernte Daten manipulieren ... 893 19. Zeitgesteuerte Aufgaben (Cronjobs) ... 897 19.1 ... Was ist ein Cronjob? ... 897 19.2 ... Planung von Cron-Ereignissen ... 900 19.3 ... Eigene Intervalle erstellen ... 905 19.4 ... Einen Cronjob neu planen ... 906 19.5 ... Ein einzelnes Event planen ... 907 20. WordPress auf der Kommandozeile: Die WP-CLI ... 911 20.1 ... Was ist die WP-CLI und wofür braucht man sie? ... 911 20.2 ... WP-CLI installieren und konfigurieren ... 913 20.3 ... WP-CLI-Befehle auf der Kommandozeile nutzen ... 915 20.4 ... Eigene CLI-Befehle programmieren ... 920 21. Mehrere Websites in einer Installation: Die Multisite-Umgebung ... 937 21.1 ... Eine Multisite-Installation durchführen ... 939 21.2 ... Datenbanken ... 945 21.3 ... Multisite-Funktionen ... 946 21.4 ... Benutzer in Multisite-Umgebungen verwalten ... 957 22. Inhalte dynamisch einfügen mit der Shortcode-API ... 961 22.1 ... Was sind Shortcodes? ... 961 22.2 ... Eigene Shortcodes registrieren ... 964 22.3 ... Shortcode-Funktionen ... 969 23. Alles gesund? Die Site-Health-API ... 971 23.1 ... Der Website-Status ... 971 23.2 ... Website-Bericht ... 975 Schlusswort ... 979 Index ... 981
Growth Hacking
Mehr Wachstum, mehr Kunden, mehr Erfolg Nutzen Sie die Methoden der Growth Hacker! Erfahren Sie, wie Sie mit geringstmöglichem Aufwand an Zeit, Geld und Manpower den maximalen Effekt erzielen. Was Sie dafür brauchen? Kreative Marketing ideen, Kennzahlen aus Ihrer Webanalyse, Know-how in User Experience und Webentwicklung sowie die Möglichkeit, Prozesse zu automatisieren. Mit dem Expertenwissen in diesem Buch bringen Sie all das zusammen und werden selbst Growth Hacker. Stellen Sie die Weichen auf Wachstum!
Trends und Entwicklungstendenzen im Qualitätsmanagement
Zielsetzung der Gesellschaft für Qualitätswissenschaft e.V. ist es, die Qualitätswissenschaft in Lehre und Forschung zu fördern und den Wissenstransfer in die industrielle Anwendung zu unterstützen. Geschehen soll dies unter anderem durch Pflege des wissenschaftlichen Erfahrungsaustauschs unter den auf diesem Gebiet tätigen Personen und Institutionen und der Verbreitung von Forschungs- und Entwicklungsergebnissen sowie der Unterstützung des Wissenstransfers zwischen Forschung und Praxis. Die Jahrestagung 2021 der Gesellschaft für Qualitätswissenschaft fand gemeinsam mit der Brandenburgischen Technischen Universität Cottbus - Senftenberg unter der Leitung von Prof. Dr.-Ing. Ralf Woll im September 2021 in Cottbus statt. Leitthema der Tagung war "Trends und Entwicklungstendenzen im Qualitätsmanagement". Der Tagungsband beinhaltet die eingereichten und begutachteten Beiträge, die im Rahmen der Tagung präsentiert worden sind. Diese decken ein weites thematisches Spektrum ab, von Potentialen neuronaler Netze zur Fehlervermeidung, automatisierte Maßnahmenempfehlung in Softwareentwicklungsprozessen über die zeitliche Veränderung von Kundenanforderungen bis hin zur Sicherheitskultur in der Agrar- und Ernährungsbranche.
Job Ready Go
TACKLE GOLANG WITH PRACTICAL AND EMPLOYMENT-FOCUSED INSTRUCTIONIn Job Ready Go, software education guru Dr. Haythem Balti delivers an essential and hands-on guide to Go, an open-source programming language developed by Google engineers to combine the most sought-after capabilities of other programming languages, including Java, C#, and C++. In the book, the author walks you through all the most critical skills necessary for successful, on-the-job Go programming. You’ll discover:* How to get started with Go, including how to run, build, and test your own go programs* Understand control flow and data structures in Go including arrays, slices, maps, and pointerss* How to leverage structs, interfaces, and methods to organize and reuse code* How to leverage go to process data, access different types of files and develop APIs* Leverage concurrency and gRPCs to create complex and interconnected systems. Job Ready Go offers readers straightforward and elegant instruction based on the renowned mthree Global Academy and Software Guild training program. It’s an essential read for aspiring Go developers looking for a fast-track to developing real-world skills demanded by employers. HAYTHEM BALTI, PHD, is an associate dean at Wiley Edge. He has created courses used by thousands of Software Guild and Wiley Edge (formerly mthree) alumni to learn Go, Java, Python, and other development and data science skills. KIMBERLY A. WEISS is a Senior Manager of Curriculum Operations for Wiley Edge. She has worked with multiple universities as well as corporate training settings to develop interactive instructional content appropriate for the target learners and course goals, specializing in software development courses. About the Authors vAbout the Technical Writer viAbout the Technical Editor viiAcknowledgments viiiIntroduction xxiPART I: THE BASICS OF THE GO PROGRAMMING LANGUAGE 1Lesson 1: Getting Started with Go 3Lesson 2: Understanding Go Basics 21Lesson 3: Storing with Variables 39Lesson 4: Performing Operations 69Lesson 5: Controlling Program Flow with Conditional Statements 99Lesson 6: Controlling Program Flow with Loops 123Lesson 7: Pulling It All Together: Income Tax Calculator 145PART II: ORGANIZING CODE AND DATA IN GO 173Lesson 8: Using Functions 175Lesson 9: Accessing Arrays 195Lesson 10: Working with Pointers 215Lesson 11: Organizing with Structs 237Lesson 12: Accessing Slices 263Lesson 13: Manipulating Maps 287Lesson 14: Creating Methods 305Lesson 15: Adding Interfaces 325Lesson 16: Pulling It All Together: Building a Burger Shop 343PART III: CREATING JOB READY SOLUTIONS IN GO 377Lesson 17: Handling Errors 379Lesson 18: Concurrency 395Lesson 19: Sorting and Data Processing 421Lesson 20: File I/O and OS Operations 453Lesson 21: Pulling It All Together: Word Analysis in Go 485PART IV: ADVANCED TOPICS FOR GO DEVELOPMENT 525Lesson 22: Testing 527Lesson 23: API Development Tutorial 561Lesson 24: Working with gRPC 591Lesson 25: Pulling It All Together: Using Smart Data 607Lesson 26: Using Modules 645Appendix: File Permissions and Access Rights 651Index 655
iPadOS 16 Handbuch - PREMIUM Videobuch
Für alle iPad-Modelle geeignetBenutzen Sie schon länger ein iPad und suchen Sie Informationen zur neuen Software iPadOS 15? Oder freuen Sie sich über Ihr erstes iPad und möchten Sie sich einen Überblick über seine Funktionsweise verschaffen und die zahlreichen Apps erkunden? In beiden Fällen halten Sie die ideale Anleitung für Ihr iPad in der Hand.Das iPad-Betriebssystem hat viel zu bieten! Sowohl Besitzer/-innen älterer iPad-Modelle als auch Neueinsteiger/-innen kommen auf ihre Kosten. Alles, was Sie lieben, hat Apple besser denn je aufbereitet: iPadOS 16 ist deutlich flotter und intuitiver in der Bedienung als alle seine Vorgängerversionen.Zum Beispiel können Sie nunmehr mit dem Apple Pencil handschriftliche Notizen in editierbaren Text umwandeln, Widgets neu darstellen, Siri hat noch mehr Antworten parat und vieles Weitere mehr.Aus dem Inhalt:Installation und Wechsel So installieren Sie iPadOS 16, richten es ein und finden sich zügig zurecht.Neu in iPadOS 16 Widgets auf dem Home-Screen, App Library, optimiertes Multitasking, neue Funktionen der Nachrichten-App uvm.Das iPad im Alltag Internet, Kommunikation, iCloud-Dienste, Kamera und Bildbearbeitung, Kalender, Erinnerungen, Bildschirmzeit, Aktien, Sprachmemos und vieles mehrDatenaustausch Nutzen Sie die neue Dateien-App, versenden Sie Fotos ganz einfach via AirDrop, übertragen Sie Ihre Diashow via AirPlay auf Ihren Fernseher, Drucken Sie wichtige Dokumente via AirPrint u. v. m.Tipps & Tricks Alles zu den Themen Mitteilungen, Sicherheit, Stromsparen, Fehlerbehebung und den perfekten Einstellungen.
macOS Ventura Standardwerk - PREMIUM Videobuch
Für alle Mac-Modelle geeignetEin Mac-Computer ist einfach zu bedienen und dennoch extrem leistungsfähig. Das liegt daran, dass Apple sowohl Hard- als auch Software herstellt und so perfekt aufeinander abstimmen kann. Nutznießer sind Sie als Kunde, die einen optimalen Computer egal ob MacBook, iMac, Mac mini oder Pro für die Arbeit und Freizeit erhalten. macOS ist enorm vielseitig einsetzbar und extrem stabil. Ergänzt wird macOS Ventura durch eine Fülle nützlicher Apps wie Mail, Safari, Erinnerungen, Kalender, iMovie, Pages, Numbers, Keynote, Vorschau, Nachrichten, Bücher, Home, Aktien und vieles mehr.In wenigen Sekunden ist der Mac-Computer installiert und einsatzbereit. Und da jeder Benutzer über einen eigenen Account verfügt, kann ein Apple Rechner bequem für die ganze Familie zum Einsatz kommen.In diesem Standardwerk erhalten Sie einen umfassende Funktionsbeschreibung, mit der Sie sofort loslegen können. Anton Ochsenkühn bedient seit über 30 Jahren Mac-Computer und kennt macOS in- und auswendig. Zahlreiche Insidertipps runden das kompakte Werk ab.Aus dem Inhalt:Installation und Update von macOS VenturaDie neue Bedienoberfläche kennenlernen und nutzenVersionsunterschiede: Intel versus Apple Silicon-RechnerBenutzer einrichten und den Mac den eigenen Bedürfnissen anpassenDie wichtigen Apps: Erinnerungen, Kalender, Mail, Safari, Nachrichten, Notizen, Vorschau, Stage ManagermacOS und Apple-ID: wie Sie Daten ganz einfach über verschiedene Geräte synchronisieren könnenWas tut man, wenn es mal irgendwo hakt?Fitnesstraining für Ihren Mac
Ubuntu 22.04 LTS Schnelleinstieg
Steigen Sie mit Ubuntu ein in die Linux-Welt! Mit diesem Buch erhalten Sie eine leicht verständliche Schritt-für-Schritt-Anleitung für die Installation und den Einsatz von Ubuntu 22.04 LTS.Sie lernen die verschiedenen Installationsmöglichkeiten von Ubuntu kennen (Live-Version, Festinstallation, Ubuntu als einziges oder als zweites Betriebssystem parallel zu Windows). Darüber hinaus erfahren Sie, wie Sie Ubuntu einrichten und an Ihre individuellen Bedürfnisse anpassen. Sie erhalten eine detaillierte Einführung in die Arbeitsoberfläche GNOME sowie einen Überblick über vorinstallierte und weitere beliebte Linux-Software. So können Sie auch ohne Vorkenntnisse schnell und einfach auf Linux umsteigen. Darüber hinaus erfahren Sie, wie Sie auch Software, die eigentlich für den Betrieb unter Windows gedacht ist, installieren können.Eine Einführung in die wichtigsten Linux-Grundlagen wie die Datei- und Benutzerverwaltung, die Installation von Software (Paketverwaltung) sowie das Terminal runden diesen Praxiseinstieg ab. So sind Sie optimal darauf vorbereitet, alle im Alltag anfallenden Aufgaben problemlos mit Ubuntu zu meistern.Aus dem Inhalt:Grundlagen zu Linux und UbuntuInstallation und Live-VersionDie grafische Oberfläche GNOMEAnwendungen nachinstallierenWindows-Programme mit Ubuntu nutzenLinux-Alternativen zu gängigen Windows-ProgrammenBackups und SicherheitTerminal und VerzeichnishierarchieÜber den Autor:Robert Gödl ist überzeugter Linux-Nutzer mit einer Vorliebe für das Testen von freien Betriebssystemen und freier Software. Nach über 20 Jahren ohne Microsoft Windows möchte er anderen zeigen, dass Linux heute einfach zu installieren, zu nutzen und zu verstehen ist. Ohne viele technische IT-Begriffe macht er Linux auch Benutzern ohne Vorkenntnisse schnell und einfach zugänglich.Leseprobe (PDF-Link)
Windows 11 Power-Tipps
In diesen Power-Tipps hat Windows-Experte Wolfram Gieseke neue Tricks aus seinem Blog-Alltag für Sie zusammengestellt. Ob ein externes Gerät nicht erkannt wird, Programme nicht mehr wie gewohnt laufen oder ein Ihnen unbekannter Update-Fehler auftritt: Wenn Sie den unterschiedlichen Fehlermeldungen selbst auf den Grund gehen möchten, hilft Ihnen dieses Buch weiter. Dieses Buch berücksichtigt alle Windows 11 Editionen. Das detaillierte Inhaltsverzeichnis sowie ein ausführliches Stichwortverzeichnis machen alle Informationen leicht auffindbar.Aus dem Inhalt: Spezielle InstallationsmethodenDiagnose und ReparaturUpdate- und Treiber-ManagementPartitionierung und DatenträgerverwaltungBenutzerverwaltung und ZugriffskontrolleNetzwerk, Internet, SicherheitVirtualisierungWindows-TroubleshootingAutor:Wolfram Gieseke ist ein international tätiger Sachbuchautor zu IT-Themen. Seine Anfang der 1990er Jahre gestartete schriftstellerische Tätigkeit umfasst mit über 50 Werken das gesamte Spektrum von Einstiegsliteratur zu den Themen Betriebssysteme und Anwendungen bis hin zu Fachliteratur in den Bereichen Netzwerksicherheit und Programmierung. Er veröffentlichte lange Jahre beim Verlag Data Becker. Seit dessen Schließung erscheinen seine Bücher bei Markt+Technik Verlag und O'Reilly Verlag. Er lebt in der Nähe von Osnabrück
WhatsApp wirklichlich einfach erklärt
- WhatsApp richtig und sicher nutzen- Für Einsteiger - mit Tipps und Bildern- So klappt Ihr Umzug aufs neue iOS-Gerät Bleiben Sie über WhatsApp mit Familie und Freunden in Kontakt! Dieses Buch zeigt Ihnen gut nachvollziehbar, wie Sie alle Vorteile der App einfach nutzen und dabei stets auf Ihre Sicherheit achten. Lernen Sie Schritt für Schritt, wie Sie die App starten, Text- sowie Sprachnachrichten austauschen, Fotos senden bzw. empfangen, eine Gruppenkommunikation einrichten und vieles mehr. Erfahren Sie außerdem, wie Sie Ihre alten Konversationen löschen und unerwünschte Kontakte blockieren. Freuen Sie sich auf zahlreiche praktische Anwendertipps und chatten Sie am besten gleich los! Aus dem Inhalt:- WhatsApp installieren und Benutzerkonto erstellen- Nachrichten emotional gestalten und senden- Fotos und Videos empfangen, speichern und verschicken- Lesebestätigung und Status – was ist das und wie geht das?- Das eigene Profil und persönliche Einstellungen verwalten- Standort senden und weitere hilfreiche Funktionen nutzen- Gruppenchat und Broadcast: so funktioniert's!- Mit der App telefonieren und ein Livebild übertragen - WhatsApp am PC bedienen- Tipps für den Umzug auf Ihr neues Smartphone
Microsoft Azure for Java Developers
Learn Azure-based features to build and deploy Java applications on Microsoft’s Azure cloud platform. This book provides examples of components on Azure that are of special interest to Java programmers, including the different deployment models that are available. The book shows how to deploy your Java applications in Azure WebApp, Azure Kubernetes Service, Azure Functions, and Azure Spring Cloud. Also covered is integration with components such as Graph API, Azure Storage, Azure Redis Cache, and Azure SQL.The book begins with a brief discussion of cloud computing and an introduction to Java support on Azure. You’ll then learn how to deploy Java applications using each of the deployment models, and you’ll see examples of integrating with Azure services that are of particular interest to Java programmers. Security is an important aspect, and this book shows you how to enable authentication and authorization for your Java applications using Azure Active Directory.Implementing a DevOps strategy is essential in today’s market when building any application. Examples in this book show you how to build continuous integration and continuous deployment pipelines to build and deploy Java applications on Azure. The book focuses on the best practices you should follow while designing and implementing Java applications on Azure. The book also elaborates on monitoring and debugging Java applications running on Azure using Application Insights and Azure Monitor.WHAT YOU WILL LEARN* Design and build Azure-based Java applications* Run Azure-based Java applications on services such as Azure App Services, Azure Spring Cloud, Azure Functions, and Azure Kubernetes Service* Integrate Azure services such as Azure SQL, Azure Storage Account, Azure Redis Cache, Azure Active Directory, and more with Java applications running on Azure * Monitor and debug Java applications running on Azure* Secure Azure-based Java applications* Build DevOps CI/CD strategy for Azure-based Java applications* Package and deploy Azure-based Java applications on Azure WHO THIS BOOK IS FORJava developers planning to build Azure-based Java applications and deploy them on Azure. Developers should be aware of the preliminary cloud fundamentals to help them understand the Java capability available on Azure. They do not need to be an expert in Azure to grasp the book’s content and start building Java-based applications using the capability available on Azure. However, they should have a good understanding of the Java programming language and frameworks.ABHISHEK MISHRA is a Principal Cloud Architect at a leading organization and has more than 17 years of experience in building and architecting software solutions for large and complex enterprises across the globe. He has deep expertise in enabling digital transformation for his customers using the cloud and artificial intelligence. He speaks at conferences on Azure and has authored four books on Azure prior to writing this new book.IntroductionPART I. BUILDING AND DEPLOYING JAVA APPLICATIONS TO AZURE1. Getting Started with Java Development for Azure2. Java for Azure WebApp3. Java-based Azure Functions4. Containerizing Java Applications with Azure Kubernetes Service5. Running Java Applications on Azure Spring CloudPART II. INTEGRATING JAVA APPLICATIONS WITH POPULAR AZURE SERVICES6. Integrating with Azure Storage Account7. Azure SQL from Java Applications8. Work with Azure Cosmos DB9. Storing Runtime Data in Azure Redis Cache10. Sending Emails using Graph API11. Debugging and Monitoring using Azure Monitor12. Authentication and Authorization with Azure Active DirectoryPART III. DEVOPS AND BEST PRACTICES13. Provisioning Resources with Azure DevOps and Azure CLI14. Building and Deploying using Azure DevOps15. A Near-Production Azure-based Java Application
From Complex Sentences to a Formal Semantic Representation using Syntactic Text Simplification and Open Information Extraction
This work presents a discourse-aware Text Simplification approach that splits and rephrases complex English sentences within the semantic context in which they occur. Based on a linguistically grounded transformation stage, complex sentences are transformed into shorter utterances with a simple canonical structure that can be easily analyzed by downstream applications. To avoid breaking down the input into a disjointed sequence of statements that is difficult to interpret, the author incorporates the semantic context between the split propositions in the form of hierarchical structures and semantic relationships, thus generating a novel representation of complex assertions that puts a semantic layer on top of the simplified sentences. In a second step, she leverages the semantic hierarchy of minimal propositions to improve the performance of Open IE frameworks. She shows that such systems benefit in two dimensions. First, the canonical structure of the simplified sentences facilitatesthe extraction of relational tuples, leading to an improved precision and recall of the extracted relations. Second, the semantic hierarchy can be leveraged to enrich the output of existing Open IE approaches with additional meta-information, resulting in a novel lightweight semantic representation for complex text data in the form of normalized and context-preserving relational tuples. Background.- Discourse-Aware Sentence Splitting.- Open Information Extraction.- Evaluation.- Conclusion.
Minecraft Basics For Dummies
THE EASY WAY TO GET STARTED WITH MINECRAFTWant to creep into the biggest video game of all time? Grab your pickaxe and let's go! Minecraft Basics For Dummies helps you (or your kids) get started and join the infinite online world that keeps millions of players of all ages engaged every day. Inside this portable-trim book, crafters will get all the tips and tricks needed to get started—on their own or with multiple players—in each of the three gameplay modes.* Choose a platform and download the game* Navigate, collect resources, and build structures* Defend your creations against monsters* Manage parental controls to keep kids safe while playing online* Become a Minecraft master by defeating the Ender DragonUnleash your creativity, elevate family game night, and have a ton of fun joining more than 141 million players in the online world of Minecraft! JESSE STAY is a social media technologist consultant and developer. Jesse was named by Mashable as one of ten entrepreneurs to follow on Twitter. He is the author of several For Dummies books on social media.JOSEPH STAY eats, drinks, and breathes Minecraft. Joseph is a straight-A student who jump-started his college studies a year early. Introduction 1PART 1: GETTING STARTED WITH MINECRAFT 5Chapter 1: Minecraft Is for Everyone — But What Is It? 7Chapter 2: Scratching the Surface of Minecraft 21Chapter 3: Let’s Go! Playing the Game and Surviving the First Night 33PART 2: GETTING A HANDLE ON THE BASIC SKILLS 55Chapter 4: Surviving Hunger 57Chapter 5: Discovering Blocks and Items 63Chapter 6: Exploring Biomes 79PART 3: EXPANDING YOUR SKILLS 87Chapter 7: Creating Farms in Your World 89Chapter 8: Exploring the Minecraft Underground by Mining and Caving 107Chapter 9: Leading Your Village 121Chapter 10: Powering Up with Weapons and Potions 131Chapter 11: Advancing to the Nether, The End, and Beyond 147Chapter 12: Expanding Your Minecraft Experience 175PART 4: THE PART OF TENS 187Chapter 13: Ten Things Adults Should Try in Minecraft (Adults Only!) 189Chapter 14: Ten Helpful Survival Tips 195Glossary 201Index 205
Web Application Development with Streamlit
Transition from a back-end developer to a full-stack developer with knowledge of all the dimensions of web application development, namely, front-end, back-end and server-side software. This book provides a comprehensive overview of Streamlit, allowing developers and programmers of all backgrounds to get up to speed in as little time as possible.Streamlit is a pure Python web framework that will bridge the skills gap and shorten development time from weeks to hours. This book walks you through the complete cycle of web application development, from an introductory to advanced level with accompanying source code and resources. You will be exposed to developing basic, intermediate, and sophisticated user interfaces and subsequently you will be acquainted with data visualization, database systems, application security, and cloud deployment in Streamlit.In a market with a surplus demand for full stack developers, this skill set could not possibly come at a better time. In one sentence, Streamlit is a means for the empowerment of developers everywhere and all stand to gain from it.WHAT YOU’LL LEARN* Mutate big data in real-time* Visualize big data interactively* Implement web application security and privacy protocols * Deploy Streamlit web applications to the cloud using Streamlit, Linux and Windows serversWHO IS THIS BOOK FOR?Developers with solid programming experience wanting to learn Streamlit; Back-end developers looking to upskill and transition to become a full-stack developers; Those who wish to learn and become more acquainted with data visualization, database systems, security and cloud deployment with SteamlitMOHAMMAD KHORASANI A hybrid of an engineer and a computer scientist with a Bachelor’s of Science in Mechanical Engineering from Texas A&M University, and a Master’s in Computer Science from the University of Illinois at Urbana-Champaign. Mohammad specializes in developing and implementing software solutions for the advancement of renewable energy systems and services at Iberdrola. In addition, he develops robotic devices using embedded systems and rapid prototyping technologies. He is also an avid blog-ger of STEM related topics on Towards Data Science - a Medium publication.MOHAMED ABDOU A Software Engineer with diverse academic and industrial exposure. A graduate of Computer Engineering from Qatar University, and currently a SDE at Amazon. Mohamed has built a variety of open source tools used by tens of thousands in the Streamlit community. He led the first Google Developer Student Club in Qatar, and represented Qatar University in national and international programming contests. He is a a cyber security enthusiast, and was ranked 2nd nationwide in bug bounty hunting in Qatar in 2020 among under 25 year old’s.JAVIER HERNANDEZ FERNANDEZ specializes in the area of technology innovation and brings over twenty years of practical experience in overseeing the design and delivery of technological developments on behalf of multi-national companies in the fields of IT, telecom, and utilities. He publishes extensively, speaks at conferences around the world, and spends his days wading through piles of academic papers in the hope of finding something interesting. He holds Masters’ degrees in both Energy Management and Project Management, in addition to a B.Sc. in Computer Science from the from the Faculty of Engineering of the University of Ottawa.PART I: INTRODUCTION TO STREAMLIT1 GETTING STARTED WITH STREAMLIT1.1 Why Streamlit?1.2 How Streamlit Works1.3 Firing it up2 STREAMLIT BASICS2.1 The Streamlit API2.2 Creating a basic appPART II: DEVELOPING ADVANCED INTERFACES AND APPLICATIONS3 ARCHITECTING STREAMLIT’S FRONT-END DESIGN3.1 Designing the application3.2 Provisioning multi-page applications3.3 Data wrangling4 GRAPHING IN DEPTH4.1 Visualization stack4.2 Exploring Plotly data visualizationsPART III: INTERFACING WITH DATABASE AND BACK-END SYSTEMS5 DATABASE INTEGRATION5.1 Relational Databases5.2 Non-relational databases6 BACK-END SERVERS6.1 The need for back-end servers6.2 Front-end/ Back-end Communication6.3 Working with JSON files6.4 Provisioning a back-end server6.5 Multi-threading and multi-processing request6.6 Connecting Streamlit to a Back-end ServerPART IV: ENFORCING APPLICATION SECURITY AND PRIVACY7 SESSION STATE7.1 Introducing session IDs7.2 Implementing session state persistently7.3 Recording user insights7.4 Implementing session state natively7.5 Cookies management8 AUTHENTICATION AND APPLICATION SECURITY8.1 Developing user accounts8.2 Verifying user credentials8.3 Secrets management8.4 Anti-SQL injection measures with SQL Alchemy8.5 Configuring Git Ignore variablesPART V: DEPLOYING STREAMLIT TO THE CLOUD9 PERSISTENT DEPLOYMENT9.1 Deployment to Streamlit Sharing9.2 Deployment to Linux9.3 Deployment to Windows Server10 EXPOSING LOCAL STREAMLIT TO THE WORLD WIDE WEB10.1 Port forwarding over network gateway10.2 Reverse Port Forwarding using NGROKPART VI: STREAMLIT CUSTOM COMPONENTS11 BUILDING STREAMLIT COMPONENTS WITH REACT.JS11.1 Introduction to Streamlit custom components11.2 Using React.js to create custom HTML components11.3 Deploying components as a Pip package12 EXTRA-STREAMLIT-COMPONENTS PACKAGE12.1 Stepper bar12.2 Splash screen . .12.3 Tab bar12.4 Cookie ManagerPART VII: STREAMLIT CASE STUDIES13 GENERAL USE CASES13.1 Data science & machine learning applications13.2 Dashboards and real-time applications13.3 Time-series applications13.4 Advanced application development14 STEAMLIT AT WORK14.1 Iberdrola Renewables14.2 DummyLearn.com
Building the Snowflake Data Cloud
Implement the Snowflake Data Cloud using best practices and reap the benefits of scalability and low-cost from the industry-leading, cloud-based, data warehousing platform. This book provides a detailed how-to explanation, and assumes familiarity with Snowflake core concepts and principles. It is a project-oriented book with a hands-on approach to designing, developing, and implementing your Data Cloud with security at the center. As you work through the examples, you will develop the skill, knowledge, and expertise to expand your capability by incorporating additional Snowflake features, tools, and techniques. Your Snowflake Data Cloud will be fit for purpose, extensible, and at the forefront of both Direct Share, Data Exchange, and Snowflake Marketplace.BUILDING THE SNOWFLAKE DATA CLOUD helps you transform your organization into monetizing the value locked up within your data. As the digital economy takes hold, with data volume, velocity, and variety growing at exponential rates, you need tools and techniques to quickly categorize, collate, summarize, and aggregate data. You also need the means to seamlessly distribute to release value. This book shows how Snowflake provides all these things and how to use them to your advantage.The book helps you succeed by delivering faster than you can deliver with legacy products and techniques. You will learn how to leverage what you already know, and what you don’t, all applied in a Snowflake Data Cloud context. After reading this book, you will discover and embrace the future where the Data Cloud is central. You will be able to position your organization to take advantage by identifying, adopting, and preparing your tooling for the coming wave of opportunity around sharing and monetizing valuable, corporate data.WHAT YOU WILL LEARN* Understand why Data Cloud is important to the success of your organization* Up-skill and adopt Snowflake, leveraging the benefits of cloud platforms* Articulate the Snowflake Marketplace and identify opportunities to monetize data* Identify tools and techniques to accelerate integration with Data Cloud* Manage data consumption by monitoring and controlling access to datasets* Develop data load and transform capabilities for use in future projectsWHO THIS BOOK IS FORSolution architects seeking implementation patterns to integrate with a Data Cloud; data warehouse developers looking for tips, tools, and techniques to rapidly deliver data pipelines; sales managers who want to monetize their datasets and understand the opportunities that Data Cloud presents; and anyone who wishes to unlock value contained within their data silosANDREW CARRUTHERS is the Director for the Snowflake Corporate Data Cloud at the London Stock Exchange Group. Comprising two Snowflake accounts supporting both ingestion data lake and consumption analytics hub, the Corporate Data Cloud services a growing customer base of over 7,000 end users. He also leads both the Centre for Enablement developing tooling, best practices and training, and the Snowflake Landing Zone provisioning Snowflake Accounts conforming to both internal standards and best practices.PART I. CONTEXT1. The Snowflake Data Cloud2. Breaking Data SiloesPART II. CONCEPTS3. Architecture4. Account Security5. Role Based Access Control (RBAC)6. Account Usage StorePART III. TOOLS7. Ingesting Data8. Data Pipelines9. Data Presentation10. Semi Structured and Unstructured DataPART IV. MANAGEMENT11. Query Optimizer Basics12. Data Management13. Data Modelling14. Snowflake Data Cloud By Example
Object Detection by Stereo Vision Images
OBJECT DETECTION BY STEREO VISION IMAGESSINCE BOTH THEORETICAL AND PRACTICAL ASPECTS OF THE DEVELOPMENTS IN THIS FIELD OF RESEARCH ARE EXPLORED, INCLUDING RECENT STATE-OF-THE-ART TECHNOLOGIES AND RESEARCH OPPORTUNITIES IN THE AREA OF OBJECT DETECTION, THIS BOOK WILL ACT AS A GOOD REFERENCE FOR PRACTITIONERS, STUDENTS, AND RESEARCHERS.Current state-of-the-art technologies have opened up new opportunities in research in the areas of object detection and recognition of digital images and videos, robotics, neural networks, machine learning, stereo vision matching algorithms, soft computing, customer prediction, social media analysis, recommendation systems, and stereo vision. This book has been designed to provide directions for those interested in researching and developing intelligent applications to detect an object and estimate depth. In addition to focusing on the performance of the system using high-performance computing techniques, a technical overview of certain tools, languages, libraries, frameworks, and APIs for developing applications is also given. More specifically, detection using stereo vision images/video from its developmental stage up till today, its possible applications, and general research problems relating to it are covered. Also presented are techniques and algorithms that satisfy the peculiar needs of stereo vision images along with emerging research opportunities through analysis of modern techniques being applied to intelligent systems. AUDIENCEResearchers in information technology looking at robotics, deep learning, machine learning, big data analytics, neural networks, pattern & data mining, and image and object recognition. Industrial sectors include automotive electronics, security and surveillance systems, and online retailers. R. AROKIA PRIYA, PHD, is Head of Electronics & Telecommunication Department at Dr. D Y Patil Institute of Engineering, Management and Research, Pune, India. She has 20 years of experience in this field as well as more than 40 publications, one patent and two copyrights to her credit.ANUPAMA V PATIL, PHD, is the Principal at Dr. D Y Patil Institute of Engineering, Management and Research, Pune, India. She has more than 30 years of experience in this field as well as more than 40 publications and 1 patent to her credit. MANISHA BHENDE, PHD, is a professor at the Marathwada Mitra Mandals Institute of Technology, Pune, India. She has 23 years of experience in this field as well as 39 research papers in international and national conferences and journals, and has published five patents and four copyrights to her credit. ANURADHA THAKARE, PHD, is a professor in the Department of Computer Engineering at Pimpri Chinchwad College of Engineering, Pune, India. She has 20 years of experience in academics and research, with 78 research publications and eight IPR’s (Patents and Copyrights) to her credit. SANJEEV WAGH, PHD, is a Professor in the Department of Information Technology at Govt. College of Engineering, Karad, India. He has 71 research papers to his credit. Preface xiii1 DATA CONDITIONING FOR MEDICAL IMAGING 1Shahzia Sayyad, Deepti Nikumbh, Dhruvi Lalit Jain, Prachi Dhiren Khatri, Alok Saratchandra Panda and Rupesh Ravindra Joshi1.1 Introduction 21.2 Importance of Image Preprocessing 21.3 Introduction to Digital Medical Imaging 31.3.1 Types of Medical Images for Screening 41.3.1.1 X-rays 41.3.1.2 Computed Tomography (CT) Scan 41.3.1.3 Ultrasound 41.3.1.4 Magnetic Resonance Imaging (MRI) 51.3.1.5 Positron Emission Tomography (PET) Scan 51.3.1.6 Mammogram 51.3.1.7 Fluoroscopy 51.3.1.8 Infrared Thermography 61.4 Preprocessing Techniques of Medical Imaging Using Python 61.4.1 Medical Image Preprocessing 61.4.1.1 Reading the Image 71.4.1.2 Resizing the Image 71.4.1.3 Noise Removal 81.4.1.4 Filtering and Smoothing 91.4.1.5 Image Segmentation 111.5 Medical Image Processing Using Python 131.5.1 Medical Image Processing Methods 161.5.1.1 Image Formation 171.5.1.2 Image Enhancement 191.5.1.3 Image Analysis 191.5.1.4 Image Visualization 191.5.1.5 Image Management 191.6 Feature Extraction Using Python 201.7 Case Study on Throat Cancer 241.7.1 Introduction 241.7.1.1 HSI System 251.7.1.2 The Adaptive Deep Learning Method Proposed 251.7.2 Results and Findings 271.7.3 Discussion 281.7.4 Conclusion 291.8 Conclusion 29References 30Additional Reading 31Key Terms and Definition 322 DETECTION OF PNEUMONIA USING MACHINE LEARNING AND DEEP LEARNING TECHNIQUES: AN ANALYTICAL STUDY 33Shravani Nimbolkar, Anuradha Thakare, Subhradeep Mitra, Omkar Biranje and Anant Sutar2.1 Introduction 332.2 Literature Review 352.3 Learning Methods 412.3.1 Machine Learning 412.3.2 Deep Learning 422.3.3 Transfer Learning 422.4 Detection of Lung Diseases Using Machine Learning and Deep Learning Techniques 432.4.1 Dataset Description 432.4.2 Evaluation Platform 442.4.3 Training Process 442.4.4 Model Evaluation of CNN Classifier 462.4.5 Mathematical Model 472.4.6 Parameter Optimization 472.4.7 Performance Metrics 502.5 Conclusion 52References 533 CONTAMINATION MONITORING SYSTEM USING IOT AND GIS 57Kavita R. Singh, Ravi Wasalwar, Ajit Dharmik and Deepshikha Tiwari3.1 Introduction 583.2 Literature Survey 583.3 Proposed Work 603.4 Experimentation and Results 613.4.1 Experimental Setup 613.5 Results 643.6 Conclusion 70Acknowledgement 71References 714 VIDEO ERROR CONCEALMENT USING PARTICLE SWARM OPTIMIZATION 73Rajani P. K. and Arti Khaparde4.1 Introduction 744.2 Proposed Research Work Overview 754.3 Error Detection 754.4 Frame Replacement Video Error Concealment Algorithm 774.5 Research Methodology 774.5.1 Particle Swarm Optimization 784.5.2 Spatio-Temporal Video Error Concealment Method 784.5.3 Proposed Modified Particle Swarm Optimization Algorithm 794.6 Results and Analysis 834.6.1 Single Frame With Block Error Analysis 854.6.2 Single Frame With Random Error Analysis 864.6.3 Multiple Frame Error Analysis 884.6.4 Sequential Frame Error Analysis 914.6.5 Subjective Video Quality Analysis for Color Videos 934.6.6 Scene Change of Videos 944.7 Conclusion 954.8 Future Scope 97References 975 ENHANCED IMAGE FUSION WITH GUIDED FILTERS 99Nalini Jagtap and Sudeep D. Thepade5.1 Introduction 1005.2 Related Works 1005.3 Proposed Methodology 1025.3.1 System Model 1025.3.2 Steps of the Proposed Methodology 1045.4 Experimental Results 1045.4.1 Entropy 1045.4.2 Peak Signal-to-Noise Ratio 1055.4.3 Root Mean Square Error 1075.4.3.1 Qab/f 1085.5 Conclusion 108References 1096 DEEPFAKE DETECTION USING LSTM-BASED NEURAL NETWORK 111Tejaswini Yesugade, Shrikant Kokate, Sarjana Patil, Ritik Varma and Sejal Pawar6.1 Introduction 1116.2 Related Work 1126.2.1 Deepfake Generation 1126.2.2 LSTM and CNN 1126.3 Existing System 1136.3.1 AI-Generated Fake Face Videos by Detecting Eye Blinking 1136.3.2 Detection Using Inconsistence in Head Pose 1136.3.3 Exploiting Visual Artifacts 1136.4 Proposed System 1146.4.1 Dataset 1146.4.2 Preprocessing 1146.4.3 Model 1156.5 Results 1176.6 Limitations 1196.7 Application 1196.8 Conclusion 119References 1197 CLASSIFICATION OF FETAL BRAIN ABNORMALITIES WITH MRI IMAGES: A SURVEY 121Kavita Shinde and Anuradha Thakare7.1 Introduction 1217.2 Related Work 1237.3 Evaluation of Related Research 1297.4 General Framework for Fetal Brain Abnormality Classification 1297.4.1 Image Acquisition 1307.4.2 Image Pre-Processing 1307.4.2.1 Image Thresholding 1307.4.2.2 Morphological Operations 1317.4.2.3 Hole Filling and Mask Generation 1317.4.2.4 MRI Segmentation for Fetal Brain Extraction 1327.4.3 Feature Extraction 1327.4.3.1 Gray-Level Co-Occurrence Matrix 1337.4.3.2 Discrete Wavelet Transformation 1337.4.3.3 Gabor Filters 1347.4.3.4 Discrete Statistical Descriptive Features 1347.4.4 Feature Reduction 1347.4.4.1 Principal Component Analysis 1357.4.4.2 Linear Discriminant Analysis 1367.4.4.3 Non-Linear Dimensionality Reduction Techniques 1377.4.5 Classification by Using Machine Learning Classifiers 1377.4.5.1 Support Vector Machine 1387.4.5.2 K-Nearest Neighbors 1387.4.5.3 Random Forest 1397.4.5.4 Linear Discriminant Analysis 1397.4.5.5 Naïve Bayes 1397.4.5.6 Decision Tree (DT) 1407.4.5.7 Convolutional Neural Network 1407.5 Performance Metrics for Research in Fetal Brain Analysis 1417.6 Challenges 1427.7 Conclusion and Future Works 142References 1438 ANALYSIS OF COVID-19 DATA USING MACHINE LEARNING ALGORITHM 147Chinnaiah Kotadi, Mithun Chakravarthi K., Srihari Chintha and Kapil Gupta8.1 Introduction 1478.2 Pre-Processing 1488.3 Selecting Features 1498.4 Analysis of COVID-19–Confirmed Cases in India 1528.4.1 Analysis to Highest COVID-19–Confirmed Case States in India 1538.4.2 Analysis to Highest COVID-19 Death Rate States in India 1538.4.3 Analysis to Highest COVID-19 Cured Case States in India 1548.4.4 Analysis of Daily COVID-19 Cases in Maharashtra State 1558.5 Linear Regression Used for Predicting Daily Wise COVID- 19Cases in Maharashtra 1568.6 Conclusion 157References 1579 INTELLIGENT RECOMMENDATION SYSTEM TO EVALUATE TEACHING FACULTY PERFORMANCE USING ADAPTIVE COLLABORATIVE FILTERING 159Manish Sharma and Rutuja Deshmukh9.1 Introduction 1609.2 Related Work 1629.3 Recommender Systems and Collaborative Filtering 1649.4 Proposed Methodology 1659.5 Experiment Analysis 1679.6 Conclusion 168References 16810 VIRTUAL MORATORIUM SYSTEM 171Manisha Bhende, Muzasarali Badger, Pranish Kumbhar, Vedanti Bhatkar and Payal Chavan10.1 Introduction 17210.1.1 Objectives 17210.2 Literature Survey 17210.2.1 Virtual Assistant—BLU 17210.2.2 HDFC Ask EVA 17310.3 Methodologies of Problem Solving 17310.4 Modules 17410.4.1 Chatbot 17410.4.2 Android Application 17510.4.3 Web Application 17510.5 Detailed Flow of Proposed Work 17610.5.1 System Architecture 17610.5.2 DFD Level 1 17710.6 Architecture Design 17810.6.1 Main Server 17810.6.2 Chatbot 17810.6.3 Database Architecture 18010.6.4 Web Scraper 18010.7 Algorithms Used 18110.7.1 AES-256 Algorithm 18110.7.2 Rasa NLU 18110.8 Results 18210.9 Discussions 18310.9.1 Applications 18310.9.2 Future Work 18310.9.3 Conclusion 183References 18311 EFFICIENT LAND COVER CLASSIFICATION FOR URBAN PLANNING 185Vandana Tulshidas Chavan and Sanjeev J. Wagh11.1 Introduction 18511.2 Literature Survey 18911.3 Proposed Methodology 19111.4 Conclusion 192References 19212 DATA-DRIVEN APPROCHES FOR FAKE NEWS DETECTION ON SOCIAL MEDIA PLATFORMS: REVIEW 195Pradnya Patil and Sanjeev J. Wagh12.1 Introduction 19612.2 Literature Survey 19612.3 Problem Statement and Objectives 20112.3.1 Problem Statement 20112.3.2 Objectives 20112.4 Proposed Methodology 20212.4.1 Pre-Processing 20212.4.2 Feature Extraction 20312.4.3 Classification 20312.5 Conclusion 204References 20413 DISTANCE MEASUREMENT FOR OBJECT DETECTION FOR AUTOMOTIVE APPLICATIONS USING 3D DENSITY-BASED CLUSTERING 207Anupama Patil, Manisha Bhende, Suvarna Patil and P. P. Shevatekar13.1 Introduction 20813.2 Related Work 21013.3 Distance Measurement Using Stereo Vision 21313.3.1 Calibration of the Camera 21513.3.2 Stereo Image Rectification 21513.3.3 Disparity Estimation and Stereo Matching 21613.3.4 Measurement of Distance 21713.4 Object Segmentation in Depth Map 21813.4.1 Formation of Depth Map 21813.4.2 Density-Based in 3D Object Grouping Clustering 21813.4.3 Layered Images Object Segmentation 21913.4.3.1 Image Layer Formation 22113.4.3.2 Determination of Object Boundaries 22213.5 Conclusion 223References 22414 REAL-TIME DEPTH ESTIMATION USING BLOB DETECTION/ CONTOUR DETECTION 227Arokia Priya Charles, Anupama V. Patil and Sunil Dambhare14.1 Introduction 22714.2 Estimation of Depth Using Blob Detection 22914.2.1 Grayscale Conversion 23014.2.2 Thresholding 23114.2.3 Image Subtraction in Case of Input with Background 23214.2.3.1 Preliminaries 23314.2.3.2 Computing Time 23414.3 Blob 23414.3.1 BLOB Extraction 23414.3.2 Blob Classification 23514.3.2.1 Image Moments 23614.3.2.2 Centroid Using Image Moments 23814.3.2.3 Central Moments 23814.4 Challenges 24114.5 Experimental Results 24114.6 Conclusion 251References 255Index 257
Vue.js
Von Grundlagen bis Best Practices – für den Um- und Einstieg in Vue 3Dieses Buch ist ein praxisnaher Einstieg für alle, die sich Vue einmal genauer ansehen möchten. Fabian Deitelhoff erklärt den komponentenbasierte Ansatz, wie dieser umgesetzt wird und natürlich was für Vorteile er hat. Die Neuerungen von Vue 3 erläutert er detailliert. Und wer noch mit Vue 2 arbeiten muss oder möchte, findet hilfreiche Tipps und Hinweise zu Unterschieden und Stolpersteinen. Auch ein Blick in das Vue-Ökosystem rund um Themen wie State Management oder Internationalisierung sind Teil dieses Buchs. Angereichert mit vielen Code-Beispielen und praktischen Tipps aus der Webentwicklung begleitet Sie der Autor so von Projektstart, über Architektur bis Testen und Deployment.Autor:Dr. Fabian Deitelhoff arbeitet nach seiner Promotion zu „Source Code Comprehension“ als Tech-Lead Domestics an Cloud-Themen bei Miele. Darüber hinaus ist er mit brickobotik in der MINT-Bildung und mit Loosely in der Cross-Plattform-Softwareentwicklung tätig. Seine Schwerpunkte sind Low- und No-Code sowie digitale Geschäftsmodelle. Daneben ist er als freier Autor, Dozent und Softwareentwickler im .NET- und Web-Umfeld tätig. Sie erreichen ihn über deitelhoff.me, unter fabian@deitelhoff.me oder auf Twitter als @FDeitelhoff.Zielgruppe:Softwareentwickler*innenWebentwickler*innenFrontend-Entwickler*innenInformatikstudierendeAuszubildende
Blockchain and Ethereum Smart Contract Solution Development
Build decentralized applications with smart contract programming. Following the curriculum from an active blockchain course taught by the author at the McCombs School of Business at the University of Texas, this book fills the gaps for you from learning about basic cryptocurrency uses of blockchain to understanding smart contracts and dapps.You’ll first start by understanding the basics of blockchain technology. Take a business point of view to discover general concepts about blockchains and dapps or “decentralized apps” built off of smart contracts. Next, learn about the token economy, how to design tokens, and relevant client technologies, such as web3, metamask, and UI/UX design. Then, install a blockchain node yourself.With a basic understanding of blockchain applications and business uses, you’ll move further into hands-on development. There are ten modules for hands-on smart contract programming covered to build your own decentralized applications. Several team projects built end-to-end from concept to deployment to operation are also provided. Using these models and your own original work, you’ll build a smart contract development environment, practice Solidity programming, compile source code, perform security reviews, and deploy bytecode to blockchains.The breakthrough in blockchain technology has empowered novel ecosystems and applications in the areas of Decentralized Finance (DeFi), Central Bank Digital Currency (CBDC), Non-Fungible Tokens (NFT), Decentralized Autonomous Organization (DAO), and more. Blockchain and Ethereum Smart Contract Solution Development will prepare you to create fantastic applications using Ethereum’s smart contracts and solid concepts of decentralized programming!WHAT YOU'LL LEARN* Become familiar with Blockchain technology, both in theory and in practice* Understand architectural components of blockchain and the underlying computer science* Implement blockchain smart contract solutions using both public and enterprise Ethereum blockchainsWHO THIS BOOK IS FORIT professionals and mid-level managers interested in smart contract development. Blockchain Consultants who want to have a handbook of smart contract development methodologies. And enterprise technologiests helping companies through the transformation to blockchain technologies.DR.WEIJIA ZHANG teaches a smart contract development course at the University of Texas. Dr. Weijia Zhang has extensive R&D knowledge and engineering experience in blockchain, cognitive sciences, mental modeling, Computational Fluid Dynamics (CFD), software modeling, computer technologies, and industrial standards. Weijia has published over thirty research and technical papers and is named as an inventor for over twenty patents, granted and pending, in computer and digital technology. He has also served as a technical committee voting member to publish the Solution Deployment Descriptor (SDD) by the Organization for the Advancement of Structured Information Standards (OASIS).DR TEJ ANAND is an award-winning business-technology strategist, consultant, and innovator with a passion for conceiving and successfully implementing transformative data-driven business initiatives. He’s known for being a charismatic leader who effectively collaborates across silos to create committed and impactful cross-functional teams. As a published author, adjunct professor, and educator, Dr. Anand also holds multiple patents in healthcare business processes and business intelligence.CHAPTER 1: BUSINESS AND ECONOMIC MOTIVATION FOR BLOCKCHAIN● Origin of moneyEvolution of fiat currencyComplications with multiparty transactionsAdvantages and disadvantages of paper currents● Current economic inefficiencies● Blockchain potential● QuizzesCHAPTER 2: THE CORE TECHNOLOGIES SUPPORTING BLOCKCHAIN● Cryptology● Distributed systems● Peer-to-peer networking● QuizzesCHAPTER 3: BLOCKCHAIN COMPONENTS AND ARCHITECTURE● Notion of distributed ledgers● Transactions, blocks, mining● Smart contracts● QuizzesCHAPTER 4: BLOCKCHAIN BUSINESS APPLICATION GUIDELINES● Selecting a use case● Design issues● QuizzesCHAPTER 5: BITCOIN BLOCKCHAIN IMPLEMENTATION AND ECONOMICS● Bitcoin system setup● Programming Assignments● QuizzesCHAPTER 6: ETHEREUM OVERVIEW AND ARCHITECTURE● Blockchain Ecosystem and Dapps● Assignment: Ethereum Smart contract setup with environments● geth client, Besu client, Metamask, Remix, Truffle, web3CHAPTER 7: PROGRAMMING SMART CONTRACT WITH SOLIDITY● Module 1 Hello World and syntax● Module 2 data structure● Module 3 event● Module 4 security● Module 5 (Tools, Test, Debug)● Module 6 (Client consideration)CHAPTER 8: SECURITY CONSIDERATIONSCHAPTER 9: LAYER 2, SHARDING, ETH2 TECHNOLOGIES PROJECT DESIGNSCHAPTER 10: FUNDING A PROJECTCHAPTER 11: BUILDING TEAM PROJECTS● Brainstorming● User stories● Architecture● Token and smart contract Design● Client consideration● Security review● Testnet deployment● Mainnet deployment● Operation and upgrade considerationAudience: Intermediate
Simulation with Python
Understand the theory and implementation of simulation. This book covers simulation topics from a scenario-driven approach using Python and rich visualizations and tabulations.The book discusses simulation used in the natural and social sciences and with simulations taken from the top algorithms used in the industry today. The authors use an engaging approach that mixes mathematics and programming experiments with beginning-intermediate level Python code to create an immersive learning experience that is cohesive and integrated.After reading this book, you will have an understanding of simulation used in natural sciences, engineering, and social sciences using Python.WHAT YOU'LL LEARN* Use Python and numerical computation to demonstrate the power of simulation* Choose a paradigm to run a simulation* Draw statistical insights from numerical experiments* Know how simulation is used to solve real-world problemsWHO THIS BOOK IS FOREntry-level to mid-level Python developers from various backgrounds, including backend developers, academic research programmers, data scientists, and machine learning engineers. The book is also useful to high school students and college undergraduates and graduates with STEM backgrounds.RON LI is a long-term and enthusiastic educator. He has been a researcher, data science instructor, and business intelligence engineer. Ron published a highly rated (4.5-star rating out of 5 on amazon) book titled Essential Statistics for Non-STEM Data Analysts. He has also authored/co-authored academic papers, taught (pro bono) data science to non-STEM professionals, and gives talks at conferences such as PyData.AIICHIRO NAKANO is a Professor of Computer Science with joint appointments in Physics & Astronomy, Chemical Engineering & Materials Science, Biological Sciences, and at the Collaboratory for Advanced Computing and Simulations at the University of Southern California. He received a PhD in physics from the University of Tokyo, Japan, in 1989. He has authored more than 360 refereed articles in the areas of scalable scientific algorithms, massive data visualization and analysis, and computational materials science.Chapter 1: Calculating Pi and Beyond: Searching Order in Disorder with Simulation [30]Description: The beginning chapter will use Monte Carlo simulation as a topic to introduce some fundamental concepts in simulation.Topics to be covered:1. Simulating Pi2. The goat problem and uniform sampling3. How to properly set a simulation environmentChapter 2: Markov Chain: A Peek into the Future [20]Description: Markov chain simulation will be introduced from both probabilistic perspective and matrix multiplication perspective.Topics to be covered:1. How to predict weather?2. The transition matrix and stability states3. Markov chain Monte Carlo simulationChapter 3: Multi-Armed Bandits: Probability Simulation and Bayesian Statistics [30]Description: Classical multi-armed bandits’ model will be introduced to continue the probabilistic perspective of the previous chapter. In addition, Bayesian statistics will be introduced.Topics to be covered:1. Introduction to multi-armed bandit2. Greedy versus explorative strategies3. The interpretation of a Bayesian statistician.Chapter 4: Balls in 2D Box: A Simplest Physics Engine [20]Description: This chapter is mainly about event-driven simulation. It is not about simulation in the time space but in the event space.Topics to be covered:1. Introduce the physics laws that govern motion2. Use event-driven paradigm to build a physics engine3. More realistic simulation with frictionChapter 5: Percolation: Threshold and Phase Change [25]Description: Phase changing is an important physics behavior for systems near critical boundaries. We are going to simulate critical behaviors using percolation as examples.Topics to be covered:1. The concept of percolation and2. Why dimension matters: 1D percolation and 2D percolation3. 3D percolation and even higher dimensionsChapter 6: Queuing System: How Stock Trades are Made [30]Description: As the first example in the business world, concepts in queuing systems are introduced and the simulation using basic data structures like queue and deque will be carried out.Topics to be covered:1. Basic data structures in Python2. Microstructure of trading3. Simulating tradingChapter 7: Rock, Scissor and Paper: Multi-Agent Simulation[30]Description: Sometimes we want to simulate a system with multiple agents acting on their own behalf. In this chapter, we are going to run a multi-agent simulation and test the performance of different competing strategies in such a scenario.Topics to be covered:1. Characteristics of multi-agent system2. Baseline strategies3. Analyzing nontrivial strategiesChapter 8: Matthew Effect and Tax Policy: Why the Rich Keeps Getting Richer[30]Description: Differential equation is an important field of study that governs a big group of phenomena. In this chapter, we are going to study it with a very relevant topic: wealth distribution in modern society.Topics to be covered:1. Introduction of differential equations2. Matthew effect and ROI3. How tax policy can gauge social wealth distributionChapter 9: Misinformation Spreading: Simulation on a Graph (Centrality, Networkx)[30]Description: Network simulation is another important domain. Nowadays social media like Twitter, Facebook and reddit can be easily modelled as a network. We will cover a simple simulation to study how misinformation can spread in a network and how we can fight against it.Topics to be covered:1. Concepts of a network2. Simulate misinformation spreading in a directed network3. How to fight misinformation (or suppress freedom of expression)Chapter 10: Simulated Annealing and Genetic Algorithm [30]Description: There are two simulation algorithms widely used in research and industry that mimic natural phenomena. We are going to use them to solve two real world problems and explain the origin of their power.Topics to be covered:4. Simulated Annealing Basics5. Use Simulated Annealing to solve an optimization problem6. Genetic Algorithm7. Use Genetic algorithm to solve an optimization problem
Unleash Core Data
Create apps with rich capabilities to receive, process, and intelligently store data that work across multiple devices in the Apple ecosystem. This book will show you how to organize your app's data and make it work for you and your users!With many frameworks, there’s a point in the learning curve where you stop fearing the mountain of knowledge to learn and just enjoy the power to play and develop. For some reason many developers feel that point seems harder to reach with Core Data. And that’s unjustified—Core Data is a great framework that with powerful, optimized tools right out of the box. So it's time you stopped fearing the journey and took your steps further out into the world of enjoying the power of Core Data.With what you learn, you can build apps to deal with a large amount of data and complex relationships in intelligent and efficient ways. Core Data has many secrets underneath the hood that can power up your persistent store like never before. Tools such as Undo, objects deletion, migration, and more. Set up your store and your data model, handle objects with a multi-threading environment, write integration tests, and share your data with an Apple Watch app and iCloud.WHAT YOU'LL LEARN* Work with Core Data objects across apps and platforms* Write integration tests with your persistent store* Fetch, organize, write, and process data efficiently and intelligentlyWHO THIS BOOK IS FORExperienced iOS developers with Swift knowledge creating iOS apps that require saving complex data on the device other than a few numbers or text.Avi Tsadok is an accomplished iOS Developer with almost a decade of experience. He is currently the head of mobile development at Melio. He's also a regular contributor to "Better Programming" and has an active presence on Medium. Having written many iOS articles, he's decided to combine his passion for writing and developing by writing his third book. Chapter 1: Introduction• Importance of Core Data as a persistent store• How to read this bookChapter 2: Core Data Stack and Setup• The Core Data Framework• Data Model• Persistent Store• Container• Holding the stackChapter 3: Data Model• The different types• Relationships• Fetched Properties• Parent Entities• Deletion• Code GenerationChapter 4: Working with Contexts• Contexts• Create Objects• Delete, Update, and Fetching• SortingChapter 5: Advanced Predicates• Compound• INCLUDE• String Queries• Sorting• Relationships Queries• Subquery• Regular ExpressionsChapter 6: Implemention• Converting to structs• UIFetchController• Undo• Generics and Wrappers• Combine and SwiftUI• Saving filesChapter 7: Performance• Multi Threading• Debugging• Faulting• Fetching Optimisationo LimitsChapter 8: Core Data Underneath• Faulting• Snapshotting• Sqlite File SchemeChapter 9: Maintenance• Migrations and Versioningo Light migrationo Heavyweight migration• Unit TestingChapter 10: Sharing• iCloud Sync• Extensions• Swift PackageAudience: Advanced