Computer und IT
Raspberry Pi 400 Schnelleinstieg
Der Raspberry Pi 400 ist ein minimalistischer „All-in-one“-PC zu einem unschlagbaren Preis. Die gesamte Technik ist in der Tastatur verbaut und die gesamte Software auf einer SD-Karte gespeichert. Mit diesem Buch erhalten Sie eine einfache und kompakte Einführung für den Einsatz des Raspberry Pi 400 und erfahren alles, was Sie brauchen, um mit dem Betriebssystem, der Arbeitsumgebung und der Software zu arbeiten. Herbert Hertramph zeigt Schritt für Schritt, wie Sie den Raspberry Pi 400 einrichten, um ihn im Alltag, Homeoffice oder für das Homeschooling optimal einzusetzen. Außerdem erhalten Sie jede Menge Tipps und Tricks für Streaming, Fotobearbeitung und vieles mehr. Alle notwendigen Linux-Grundlagen werden für Ein- und Umsteiger ganz einfach erläutert. Der Autor erklärt die Vorteile des Systems und geht besonders auf Sicherheit und Backups ein. Mit diesem Buch werden Sie die Möglichkeiten des Raspberry Pi 400 voll ausschöpfen und den Mini-PC optimal an die eigenen Bedürfnisse anpassen.Aus dem Inhalt:Linux-GrundlagenRaspberry Pi 400 einrichtenArbeiten mit LibreOffice, GoogleOffice, Microsoft und iWorksBackup und SynchronisationFernzugriff und SicherheitPi-AppsWeitere BetriebssystemeMit der Kommandozeile arbeiten Über den Autor:Herbert Hertramph ist am Institut für Psychologie und Pädagogik der Universität Ulm als Sozialwissenschaftler mit aktuellen Fragestellungen des digitalen Lehrens und Lernens befasst.
Excel 2021 Alles-in-einem-Band für Dummies
Dieses Buch lässt keine Excel-Wünsche offen: Es beschreibt grundlegende Excel-Funktionen, wie das Erstellen und Bearbeiten von Arbeitsblättern, aber auch das Teilen und Überarbeiten von Dokumenten oder das Bearbeiten von Makros mit Visual Basic. Darüber hinaus: Arbeitsblätter formatieren und schützen, Formeln erstellen, Daten importieren, in Diagrammen darstellen und mit Statistikfunktionen auswerten, Pivot-Tabellen erzeugen, Was-wäre-wenn-Szenarien und Webabfragen durchführen, Datenbankfunktionen nutzen, Makros erstellen und ausführen, Excel in Verbindung mit Power BI nutzen und noch vieles mehr. Mit diesem Buch suchen Sie nicht mehr endlos nach Excel-Funktionen, sondern haben mehr Zeit für Ihre Projekte! Paul McFedries verbringt die meiste Zeit seines Lebens damit, Computerbücher zu schreiben. Er hat an über 160 Publikationen zu Themen wie Windows 10, Microsoft Office, Apple Gadgets und Amazon Alexa mitgewirkt.Greg Harvey schrieb vor mehr als zwanzig Jahren sein erstes Computerbuch und die Liste seiner Bestseller wurde immer länger, unter anderem gehen alle Ausgaben von »Excel für Dummies« auf sein Konto.Über die Autoren 13Einführung 29BUCH I: EXCEL- GRUNDLAGEN 37Kapitel 1: Excel – Der erste Eindruck 39Kapitel 2: Excel anpassen 69BUCH II: DESIGN VON ARBEITSBLÄTTERN 105Kapitel 1: Arbeitsblätter erstellen 107Kapitel 2: Arbeitsblätter formatieren 163Kapitel 3: Arbeitsblätter bearbeiten und prüfen 223Kapitel 4: Arbeitsblätter verwalten 267Kapitel 5: Arbeitsblätter drucken 305BUCH III: FORMELN UND FUNKTIONEN 333Kapitel 1: Einfache Formeln erstellen 335Kapitel 2: Logische Funktionen und Fehlersuche 379Kapitel 3: Datums- und Zeitformeln 405Kapitel 4: Abgezockte Finanzformeln 419Kapitel 5: Mathematische und statistische Formeln 435Kapitel 6: Nachschlage- , Informations- und Textformeln 453BUCH IV: ARBEITSBLÄTTER GEMEINSAM BEARBEITEN 481Kapitel 1: Arbeitsmappen und Arbeitsblattdaten schützen 483Kapitel 2: Arbeitsmappen für die Veröffentlichung vorbereiten 503Kapitel 3: Arbeitsmappen und Arbeitsblattdaten gemeinsam nutzen 515BUCH V: DIAGRAMME UND GRAFIKEN 543Kapitel 1: Diagramme für Arbeitsblattdaten 545Kapitel 2: Grafikobjekte hinzufügen 579BUCH VI: DATENVERWALTUNG 607Kapitel 1: Datentabellen erstellen und pflegen 609Kapitel 2: Tabellen filtern und abfragen 631BUCH VII: DATENANALYSE 665Kapitel 1: Was- wäre- wenn- Szenarien 667Kapitel 2: Durchführung einer groß angelegten Datenanalyse 691BUCH VIII: MAKROS UND VBA 735Kapitel 1: Makros aufzeichnen und ausführen 737Kapitel 2: VBA- Programmierung 751Abbildungsverzeichnis 775Stichwortverzeichnis 787
Excel Macros For Dummies
SAVE TIME AND BECOME AN EXCEL WIZARD WITH THE WORLD’S LEADING EXCEL MACRO GUIDEDo you love Excel and all the things you can do with it, but wish you could just work…faster? Excel macros—automated workflows that save you time and energy—might be just what you need. In Excel Macros For Dummies, you’ll learn over 70 of the most productive, time-saving macros in less time than it takes to back up the files on your computer! Every chapter in the book gives you practical info and exercises you can put to work immediately, alongside step-by-step instructions and guidance on how to customize Excel to fit your every need. Inside, you’ll find:* Automations that take your Excel productivity to the next level, and beyond* Fully updated macros compatible with the newest version of Excel included in Microsoft 365* Careful explanations of the basics as well as tips for the advanced userWith something for everyone, Excel Macros For Dummies is the productivity supercharger you’ve been waiting for. Grab a copy today! DICK KUSLEIKA has been helping users get the most out of Microsoft Office products for more than 25 years through online forums, blogging, books, and conferences.Introduction 1PART 1: HOLY MACRO BATMAN! 7Chapter 1: Macro Fundamentals 9Chapter 2: Getting Cozy with the Visual Basic Editor 29Chapter 3: The Anatomy of Macros 43PART 2: MAKING SHORT WORK OF WORKBOOK TASKS 57Chapter 4: Working with Workbooks 59Chapter 5: Working with Worksheets 81PART 3: ONE-TOUCH DATA MANIPULATION 107Chapter 6: Feeling at Home on the Range 109Chapter 7: Manipulating Data with Macros 129PART 4: MACRO-CHARGING REPORTS AND EMAILS 163Chapter 8: Automating Common Reporting Tasks 165Chapter 9: Sending Emails from Excel 199Chapter 10: Wrangling External Data with Macros 217PART 5: PART OF TENS 235Chapter 11: Ten Handy Visual Basic Editor Tips 237Chapter 12: Ten Places to Turn for Macro Help 247Chapter 13: Ten Ways to Speed Up Your Macros 253Index 263
Introducing .NET 6
Welcome to .NET 6, Microsoft’s unified framework that converges the best of the modern and traditional .NET Framework. This book will introduce you to the new aspects of Microsoft’s fully supported .NET 6 Framework and will teach you how to get the most out of it. You will learn about the progress to one unified .NET, including MAUI and the revival of desktop development. You will dive into Roslyn, Blazor, CLI, Containers, Cloud, and much more, using a “framework first” learning approach. You will begin by learning what each tool is, its practical uses, and how to apply it and then you will try it out on your own for learning reinforcement. And, of course, there will be plenty of code samples using C# 10.INTRODUCING .NET 6 is aimed at .NET developers, both junior developers and those coming from the .NET framework, who want to understand everything the modern framework has to offer, besides the obvious programming languages. While you will still see a lot of fabulous C# 10 throughout the book, the focus of this learning is all about .NET and its tooling.WHAT YOU WILL LEARN* Become a more versatile developer by knowing the variety of options available to you in the .NET 6 framework and its powerful tooling* Know the different front-end frameworks .NET offers, such as UWP, WPF, and WinForms, and how they stack up to each other* Understand the different communication protocols, such as REST and gRPC, for your back-end services* Discover the secrets of cloud-native development, such as serverless computing with Azure Functions and deploying containers to Azure Container Services* Master the command line, take your skill set to the cloud, and containerize your .NET 6 appWHO THIS BOOK IS FORBoth students and more experienced developers, C# developers who want to learn more about the framework they use, developers who want to be more productive by diving deeper into the tooling that .NET 6 brings to the fold, developers who need to make technical decisions. A working knowledge of C# is recommended to follow the examples used in the book.NICO VERMEIR is an Microsoft MVP in the field of Windows development. He works as a Solution Architect at Inetum-Realdolmen Belgium and spends a lot of time keeping up with the rapidly changing world of technology. He loves talking about and using the newest and experimental technologies in the .NET stack. Nico founded MADN, a user group focusing on front end development in .NET. He regularly presents on the topic of .NET.CHAPTER 1: A TOUR OF.NET 6CHAPTER 2: RUNTIMES AND DESKTOP PACKSCHAPTER 3: COMMAND LINE INTERFACECHAPTER 4: DESKTOP DEVELOPMENTCHAPTER 5: BLAZORCHAPTER 6: MAUICHAPTER 7: ASP.NET CORECHAPTER 8: MICROSOFT AZURECHAPTER 9: APPLICATION ARCHITECTURECHAPTER 10: .NET COMPILER PLATFORMCHAPTER 11: ADVANCED .NET 6
Microsoft Excel 365 Bible
YOUR PERSONAL, HANDS-ON GUIDE TO THE LATEST AND MOST USEFUL FEATURES IN MICROSOFT EXCEL 365Excel 365 is Microsoft’s latest cloud-based version of its world-famous spreadsheet app. Powerful and user-friendly, it’s an ideal solution for businesses and people looking to make sense of—and draw intelligence from—their data.The Excel 365 Bible carries over the best content from the best-selling Excel 2019 Bible while reflecting how a new generation uses Excel in Excel 365. The authoring team with their decades of Excel and business intelligence experience and recognition from the Excel community as Excel MVPs delivers an accessible and authoritative roadmap to Excel 365. Interested in the basics? You’ll learn to create spreadsheets and workbooks and navigate the user interface. If you’re ready for more advanced topics you can skip right to the material on creating visualizations, crafting custom functions, and using Visual Basic for Applications to script automations.You’ll also get:* Over 900 pages of powerful tips, tricks, and strategies to unlock the full potential of Microsoft Excel 365* Guidance on how to import, manage, and analyze large amounts of data* Advice on how to craft predictions and "What-If Analyses" based on data you already havePerfect for anyone new to Excel, as well as experts and advanced users, the Excel 365 Bible is your comprehensive, go-to guide for everything you need to know about the world’s most popular, easy-to-use spreadsheet software.MICHAEL ALEXANDER is a senior consultant at Slalom Consulting with more than 15 year’s experience in data management and reporting. He is the author of more than a dozen books on business analysis using Microsoft Excel, and has been named Microsoft Excel MVP for his contributions to the Excel community.DICK KUSLEIKA has been working with Microsoft Office for more than 20 years. He was formerly a Microsoft MVP, having been awarded 12 consecutive years. Dick has written several books about Excel and Access. Introduction xxxixPART I: GETTING STARTED WITH EXCEL 1Chapter 1: Introducing Excel 3Chapter 2: Entering and Editing Worksheet Data 27Chapter 3: Performing Basic Worksheet Operations 53Chapter 4: Working with Excel Ranges and Tables 73Chapter 5: Formatting Worksheets 121Chapter 6: Understanding Excel Files and Templates 157Chapter 7: Printing Your Work 177Chapter 8: Customizing the Excel User Interface 199PART II: WORKING WITH FORMULAS AND FUNCTIONS 209Chapter 9: Introducing Formulas and Functions 211Chapter 10: Understanding and Using Array Formulas 247Chapter 11: Using Formulas for Common Mathematical Operations 271Chapter 12: Using Formulas to Manipulate Text 285Chapter 13: Using Formulas with Dates and Times 301Chapter 14: Using Formulas for Conditional Analysis 329Chapter 15: Using Formulas for Matching and Lookups 347Chapter 16: Using Formulas with Tables and Conditional Formatting 365Chapter 17: Making Your Formulas Error-Free 379PART III: CREATING CHARTS AND OTHER VISUALIZATIONS 399Chapter 18: Getting Started with Excel Charts 401Chapter 19: Using Advanced Charting Techniques 441Chapter 20: Creating Sparkline Graphics 475Chapter 21: Visualizing with Custom Number Formats and Shapes 489PART IV: MANAGING AND ANALYZING DATA 519Chapter 22: Importing and Cleaning Data 521Chapter 23: Using Data Validation 553Chapter 24: Creating and Using Worksheet Outlines 567Chapter 25: Linking and Consolidating Worksheets 577Chapter 26: Introducing PivotTables 595Chapter 27: Analyzing Data with PivotTables 617Chapter 28: Performing Spreadsheet What-If Analysis 651Chapter 29: Analyzing Data Using Goal Seeking and Solver 675Chapter 30: Analyzing Data with the Analysis ToolPak 697Chapter 31: Protecting Your Work 709PART V: UNDERSTANDING POWER PIVOT AND POWER QUERY 721Chapter 32: Introducing Power Pivot 723Chapter 33: Working Directly with the Internal Data Model 747Chapter 34: Adding Formulas to Power Pivot 757Chapter 35: Introducing Power Query 777Chapter 36: Transforming Data with Power Query 805Chapter 37: Making Queries Work Together 837Chapter 38: Enhancing Power Query Productivity 855PART VI: AUTOMATING EXCEL 867Chapter 39: Introducing Visual Basic for Applications 869Chapter 40: Creating Custom Worksheet Functions 899Chapter 41: Creating UserForms 913Chapter 42: Using UserForm Controls in a Worksheet 935Chapter 43: Working with Excel Events 949Chapter 44: Seeing Some VBA Examples 963Chapter 45: Creating Custom Excel Add-Ins 979Index 989
Windows 11 All-in-One For Dummies
GET MORE OUT OF YOUR WINDOWS 11 COMPUTER WITH EASY-TO-FOLLOW ADVICEPowering 75% of the PCs on the planet, Microsoft Windows is capable of extraordinary things. And you don’t need to be a computer scientist to explore the nooks and crannies of the operating system! With Windows 11 All-in-One For Dummies, anyone can discover how to dig into Microsoft’s ubiquitous operating system and get the most out of the latest version. From securing and protecting your most personal information to socializing and sharing on social media platforms and making your Windows PC your own through personalization, this book offers step-by-step instructions to unlocking Windows 11’s most useful secrets.With handy info from 10 books included in the beginner-to-advanced learning path contained within, this guide walks you through how to:* Install, set up, and customize your Windows 11 PC in a way that makes sense just for you * Use the built-in apps, or download your own, to power some of Windows 11’s most useful features * Navigate the Windows 11 system settings to keep your system running smoothly Perfect for anyone who’s looked at their Windows PC and wondered, “I wonder what else it can do?”, Windows 11 All-in-One For Dummies delivers all the tweaks, tips, and troubleshooting tricks you’ll need to make your Windows 11 PC do more than you ever thought possible.CIPRIAN ADRIAN RUSEN is cofounder of Digital Citizen (digitalcitizen.life), a tech blog that posts how-to articles on consumer technologies. Ciprian is also co-author of Windows 10 All-in-One For Dummies, 4th Edition and author of Windows 10 At Work For Dummies.INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 2Beyond the Book 3Where to Go from Here 4BOOK 1: GETTING STARTED WITH WINDOWS 11 5CHAPTER 1: INTRODUCING WINDOWS 11 7Taking Your First Look at Windows 11 8Hardware and Software 9Must You Run Windows? 10Understanding Important Terminology 13Buying a Windows 11 Computer 17Looking inside your PC 20Secure boot, TPM, and Windows 11 23Tablets 24Displays 28Managing disks and drives 29Connecting your PC to other devices 32Video, sound, and multimedia 35Ultrabooks and convertibles 37What You Might Not Like about Windows 11 38CHAPTER 2: SEEING WHAT’S NEW IN WINDOWS 11 39Rolling Back to Windows 10 40Microsoft’s Design Philosophy behind Windows 11 42Understanding the Types of Windows 11 Apps 43Seeing What’s New for the Windows Crowd 45A new Start menu and taskbar 46Increased role for Settings 46Improved performance 47Better gaming 48Improved Microsoft Edge 50Less Cortana 51Improved security 52Fine-tuned virtual desktops 53Improved window snapping and grouping 54Widgets are back 54Other apps and improvements 55CHAPTER 3: WINDOWS 11 VERSIONS 57Windows 11 Editions 58Buying the right edition, the first time 60Narrowing the choices 6164-bit is the new normal 62Which Version of Windows Are You Running? 63BOOK 2: PERSONALIZING WINDOWS 67CHAPTER 1: GETTING AROUND IN WINDOWS 69Navigating around the Desktop 70Using Windows 11 on Tablets and Touchscreens 74Shut Down, Sleep, Restart, Sign Out, Lock, Sleep 75Taking Screen Shots 78Keyboard Shortcuts 79CHAPTER 2: LOGGING INTO WINDOWS 11 83Working with the Lock Screen 84Signing in 85Changing the picture for the lock screen 85Adding and removing apps on the lock screen 89Logging in without a Password 90Creating a PIN 90Windows Hello 92Bypassing Passwords 94CHAPTER 3: HANDLING NOTIFICATIONS AND QUICK ACTIONS 97What, Exactly, Is a Notification? 98Using the Notification Center 99Disabling Notifications 101Enabling Focus Assist 102Using Quick Actions 104CHAPTER 4: MANAGING USER ACCOUNTS 107Understanding Why You Need Separate User Accounts 108Choosing Account Types 109What’s a standard account? 109What’s an administrator account? 110Choosing between standard and administrator accounts 110Knowing What’s Good and Bad about Microsoft Accounts 112Adding Accounts in Windows 11 113Adding a user with a Microsoft account 114Adding a local (offline) account 115Adding a Child Account 118Changing Other Users’ Settings 119Setting a standard account as administrator 119Modifying the settings of other accounts 120Switching Users 124CHAPTER 5: UNDERSTANDING MICROSOFT ACCOUNTS 127Realizing Which Accounts Are Microsoft Accounts 128Deciding Whether You Want a Microsoft Account 129Setting Up a Microsoft Account 131Creating an Outlook.com account 132Making any email address a Microsoft account 133Discontinuing Your Microsoft Account 136Taking Care of Your Microsoft Account 137Controlling Which Windows 11 Settings Get Synchronized 137CHAPTER 6: PROTECTING YOUR PRIVACY 139Realizing Why You Should Care about Privacy 140Handling Your Privacy in Windows 11 142Limiting diagnostics and feedback data collection 143Viewing the diagnostic data sent to Microsoft 145Knowing What Connections Windows Prefers 146Seeing Fewer Ads in Windows 11 147Controlling Location Tracking 149Blocking all location tracking in Windows 11 152Blocking location tracking in an app 153Minimizing Privacy Intrusion 154BOOK 3: WORKING ON THE DESKTOP 155CHAPTER 1: RUNNING YOUR DESKTOP FROM START TO FINISH 157Working with the Desktop 158Changing the background 159Switching Windows 11 themes 161Battling dark mode and light mode 162Setting Up Your Display 163Switching the night light on and off 163Enabling HDR and auto HDR 164Setting the screen resolution 166Changing the size of text, apps, and other items 167Adjusting the refresh rate 168Using magnification 170Working with a Mouse and a Touchpad 170Snapping app windows 171Configuring the mouse 173Setting up the trackpad 174Using Virtual Desktops 175Moving apps between virtual desktops 176Managing Icons and Shortcuts 177Creating shortcuts 178Arranging icons on the desktop 180The Recycle Bin 181CHAPTER 2: PERSONALIZING THE START MENU 183Touring the Start Menu 184Modifying the Start Menu 185Adding, moving and removing pinned apps 186Changing your picture 188Personalizing the Recommended section 189Adding and removing Start menu folders 190Moving the Start menu and taskbar to the left 191CHAPTER 3: EXPLORING SEARCH AND THE TASKBAR 193Searching in Windows 11 194Searching is the fastest way to start apps 196Filtering search results to find what you need 198Starting apps as admin from a Windows search 199Searching your entire PC 200Touring the Windows 11 Taskbar 202Using the taskbar 203Using jump lists and other taskbar tricks 203Pinning apps to the taskbar 205Adding and removing taskbar items 207CHAPTER 4: WORKING WITH FILES AND FOLDERS 209Using File Explorer 210Navigating File Explorer 210Viewing and opening your file and folders 212Creating and managing files and folders 215Searching for files 217Sorting and grouping files and folders 218Displaying file extensions 219Viewing hidden files 221Pinning items to and removing items from Quick Access 222Enabling and disabling check boxes for files and folders 222Sharing files 224Working with ZIP Files 225Creating a ZIP file 226Extracting a ZIP file 227Right-Clicking in Windows 11 228CHAPTER 5: CONNECTING TO THE INTERNET AND BROWSING THE WEB 231Connecting to the Internet 232Connecting a desktop PC to the network 232Connecting your laptop or tablet to Wi-Fi 233Connecting to hidden Wi-Fi 234Using Microsoft Edge 236Familiarizing yourself with Microsoft Edge 237Enabling vertical tabs in Microsoft Edge 238InPrivate browsing with Microsoft Edge 239Adding extensions to Microsoft Edge 241Using Other Web Browsers 243Changing the Default Browser in Windows 11 243CHAPTER 6: CALLING ON CORTANA 247The Cortana Backstory 247Setting up Cortana 248Turning on Voice Activation for Cortana 250Using Cortana 251Exploring Cortana’s Settings 253Useful or Fun Commands for Cortana 255CHAPTER 7: MAINTAINING YOUR DRIVES 257Using Maintenance Tools for Your Computer Drives 258Formatting drives 258Freeing up storage space with Storage Sense 260Running an error check on a drive 261Defragmenting a drive 263Maintaining solid-state drives 264Accessing the Health Report 265BOOK 4: USING WINDOWS APPS 267CHAPTER 1: USING THE MAIL AND CALENDAR APPS 269Choosing Mail and Calendar Apps 271Comparing email apps 272Comparing calendar apps 275Choosing the right package 277Using the Mail App 277Creating an email message 281Searching for email in the Mail app 284Mail Settings 284Adding a new email account 284Setting extra options 286Avoiding Calendar App Collisions 287Adding calendar items 290Struggling with the Calendar app’s shortcomings 291CHAPTER 2: KEEPING TRACK OF PEOPLE 293Alternatives to the People App 294The Contact List in Windows 11 294Adding Contacts in the People App 295Adding accounts to People 295Editing a contact 299Adding a contact 301CHAPTER 3: WORKING WITH PHOTOS 303Viewing Pictures with the Photos App 304Adding Photos 306Importing pictures from a camera or an external drive 307Adding folders to the Photos app 308Editing Photos 309Switching to Light Mode in the Photos App 312Working with Albums 313CHAPTER 4: NOTE-TAKING WITH ONENOTE 315Getting Started in OneNote with or without a Pen 316Adding Notebooks, Sections, and Pages 318Adding Content to a OneNote Page 322Sending Sites from Microsoft Edge to OneNote 325Configuring OneNote’s Settings 326CHAPTER 5: STORING IN ONEDRIVE 329What Is OneDrive? 330Setting Up a OneDrive Account 331The Four States of OneDrive Data 334Adding Files and Folders to OneDrive 339Changing the States of OneDrive Data 342Sharing OneDrive Files and Folders 343CHAPTER 6: COMMUNICATING WITH SKYPE 345Signing Up with Skype 346Adding a Contact 350Testing Your Skype Settings 351Improving Skype’s Settings 353Making Individual and Group Calls 355Recording Calls 356CHAPTER 7: USING WIDGETS 359Working with Widgets 360Customizing Widgets 361Adding Widgets 363CHAPTER 8: HANDLING MUSIC, MOVIES, AND VIDEOS 365Getting Your Groove Music On 366Choosing where Groove Music looks for music 368Creating playlists in Groove Music 370Playing Videos and Music with Windows Media Player 371Ripping Music from Your Old CDs 373Setting Up Spotify 375Creating Your Own Videos 377Using the Movies & TV App 379CHAPTER 9: PLAYING GAMES 381Searching the Microsoft Store for Games 382Enabling Game Mode 384Using the Xbox Game Bar 386Setting the Default Graphics Card 388Bringing Back the Classics 389BOOK 5: MANAGING APPS 393CHAPTER 1: NAVIGATING THE MICROSOFT STORE 395Understanding What a Windows 11 App Can Do 396Browsing the Microsoft Store 398Installing Apps from the Microsoft Store 402Uninstalling Windows 11 Apps 403CHAPTER 2: USING BUILT-IN APPLICATIONS 405Checking Out the New Clock App 406Getting Weather Forecasts 408Editing Text Files with Notepad 409Writing with WordPad 411Doing Math with Calculator 414Checking Out the New Paint App 416Creating Sticky Notes 417Keeping Track of Tasks with Microsoft To Do 418Navigating with Maps 419CHAPTER 3: GETTING APPS FROM THE WEB 423Finding Safe Places to Download Desktop Apps 424Checking Apps for Malware 426Uninstalling Desktop Apps or Programs 428CHAPTER 4: KEEPING APPS AND DRIVERS UP TO DATE 431Updating Your Microsoft Store Apps 432Updating Programs and Desktop Apps 434Updating Drivers 437BOOK 6: SHARING, SOCIALIZING, AND WORKING ONLINE 441CHAPTER 1: BEING SOCIAL ON FACEBOOK AND TWITTER 443Getting Started with Facebook 443Choosing the Facebook App or Facebook.com 444Signing up for a Facebook account 446Building a great Timeline 453Downloading your Facebook data 457Using the other Facebook apps for Windows 459Getting Started with Twitter 460Understanding Twitter 461Setting up a Twitter account 464Tweeting for beginners 469CHAPTER 2: MASTERING TOOLS FOR REMOTE WORK 473Getting Started with LinkedIn 474Signing up for LinkedIn 475Understanding LinkedIn basics 479Using LinkedIn apps for Windows and mobile devices 480Video Conferencing with Zoom 481Downloading and installing Zoom 482Setting up a Zoom account 483Signing into Zoom cloud meetings 485Scheduling a Zoom meeting 486Joining a Zoom meeting 488Contacting Others through Teams 489Getting started with Microsoft Teams 489Chatting from Windows 11 490Starting a meeting from Windows 11 492Accessing the full Microsoft Teams experience 493Working Remotely with Windows 11 494Enabling remote desktop connections 495Connecting with Remote Desktop Connection 496Connecting a second monitor 498Installing a webcam 499Adding clocks to the taskbar 500BOOK 7: CONTROLLING YOUR SYSTEM 503CHAPTER 1: NAVIGATING WINDOWS SETTINGS AND LANGUAGES 505Understanding the Settings App 506Exploring the Control Panel 509Putting Shortcuts to Settings on Your Desktop 511God Mode (Still) Works in Windows 11 514Using Search to Quickly Find Settings 516Installing New Languages in Windows 11 517CHAPTER 2: MANAGING WINDOWS UPDATES 521Understanding the Terminology 522Installing Updates for Windows 11 524Postponing Windows 11 Updates 525Getting Updates for Office 526Stopping Updates from Rebooting Your PC 527Getting Information about and Removing Updates 528The Case against Windows Automatic Update 530Blocking Windows 11 updates 531When is it a good time to unblock updates? 532CHAPTER 3: TROUBLESHOOTING AND GETTING HELP 535Troubleshooting the Easy Way 536Troubleshooting the Hard Way 537Tackling installation problems 537Problems with installing updates 539Using Windows Terminal 545Experimenting with Windows Sandbox 547Tricks to Using Microsoft Support 548The problems with Windows Help & Learning 549Managing your expectations of Windows Help & Learning 549Snapping Your Problems 551Recording a Video of Your Problems 552Connecting to Remote Assistance 555Understanding the interaction 555Making the connection 556Troubleshooting Remote Assistance 561Getting Better Help Online 562CHAPTER 4: STORING IN STORAGE SPACES 565Understanding the Virtualization of Storage 566Setting Up Storage Spaces 568Working with Storage Spaces 572Storage Space Strategies 574CHAPTER 5: WORKING WITH PRINTERS 575Installing a Printer 576Attaching a local printer 577Installing a network printer 578Using the Print Queue 581Displaying a print queue 582Pausing and resuming a print queue 583Pausing, restarting, and resuming a document 583Canceling a document 584Troubleshooting Printing 585Removing a printer 587Stopping a print job you’ve sent by mistake 587CHAPTER 6: WORKING WITH USB AND BLUETOOTH DEVICES 589Connecting USB Devices 590Configuring AutoPlay for removable devices 591Removing USB devices 592Connecting Bluetooth Devices 594Unpairing Bluetooth Devices 596BOOK 8: MAINTAINING WINDOWS 599CHAPTER 1: BACKING UP DATA 601Finding Windows 7’s Backup Options in Windows 11 602The Future of Reliable Storage Is in the Cloud 603Backing Up and Restoring Files with File History 603Setting up File History 604Checking whether File History backed up your data 605Restoring data from File History 606Changing File History settings 608Storing to and through the Cloud 611Considering cloud storage privacy concerns 612Reaping the benefits of backup and storage in the cloud 613Choosing an online backup and sharing service 614CHAPTER 2: RESETTING WINDOWS TO A WORKING STATE 617Resuscitating Malfunctioning Windows 11 PCs 618Resetting Your Windows 11 PC 620Resetting Your PC to Factory Settings 623Restoring to an Earlier Point 625Enabling System Protection 626Creating a restore point 628Rolling back to a restore point 628CHAPTER 3: TROUBLESHOOTING WITH SAFE MODE 633Working in Safe Mode 634Accessing safe mode 634Using safe mode for troubleshooting 637Entering the Windows Recovery Environment 638CHAPTER 4: MONITORING WINDOWS 641Viewing Events 641Using Event Viewer 642Events worthy — and not worthy — of viewing 644Gauging System Reliability 645CHAPTER 5: MANAGING RUNNING APPS, PROCESSES, AND STARTUP APPS 651Using Task Manager 652Starting Task Manager 653Viewing running apps and processes 653Dealing with Misbehaving Apps 656Killing apps that don’t respond 656Keeping an eye on performance 657Getting More Info from Task Manager 659Viewing App History 659Managing startup programs 660Checking out details and services 663Managing Startup Apps from Settings 665BOOK 9: SECURING WINDOWS 667CHAPTER 1: SPIES, SPAMS, AND SCAMS ARE OUT TO GET YOU 669Understanding the Hazards — and the Hoaxes 670The primary infection vectors 671Zombies and botnets 673Phishing 675419 scams 680I’m from Microsoft, and I’m here to help 6830day exploits 684Staying Informed 685Relying on reliable sources 686Ditching the hoaxes 686Is My Computer Infected? 688Evaluating telltale signs 689Where did that message come from? 689What to do next 691Shunning scareware 693Getting Protected 694Protecting against malware 695Stop using Java and Flash 696Using your credit card safely online 697Defending your privacy 698Reducing spam 700Dealing with Data Breaches 702CHAPTER 2: FIGHTING VIRUSES AND OTHER MALWARE 705Basic Windows Security Do’s and Don’ts 706Making Sense of Malware 710Deciphering Browsers’ Inscrutable Warnings 713Google Chrome 713Mozilla Firefox 715Microsoft Edge 715CHAPTER 3: RUNNING BUILT-IN SECURITY PROGRAMS 717Working with Windows Security 718Adjusting Windows Security 720Running Windows Security manually 722Controlling Folder Access 724Judging SmartScreen 726Booting Securely with UEFI 729A brief history of BIOS 730How UEFI is different from and better than BIOS 731How Windows 11 uses UEFI 732Controlling User Account Control 733Poking at Windows Defender Firewall 735Understanding Defender Firewall basic features 736Speaking your firewall’s lingo 737Peeking into your firewall 738Making inbound exceptions 739CHAPTER 4: ENHANCING YOUR SECURITY 743Encrypting Your PC with BitLocker 744Managing Your Passwords 747Using password managers 747My recommendations 747Rockin’ RoboForm 748Liking Bitwarden 749Fighting Back at Tough Scumware 751Securing Your Communication with VPN 752What’s a VPN? 752Setting up a VPN in Windows 11 754Which paid VPN services should you consider? 756BOOK 10: ENHANCING WINDOWS 757CHAPTER 1: LINKING ANDROID TO WINDOWS 759Making Windows Talk to Your Android Device 760Trying Samsung DeX 762Linking an Android Smartphone to a PC 763Using the Your Phone app 765Removing your Android device from the Your Phone app 767Turning a Smartphone into a PC Webcam 768CHAPTER 2: USING YOUR IPHONE WITH WINDOWS 771Installing iTunes on Windows 11 772Setting up iTunes 773Synchronizing the iPhone with Windows 11 774Installing iCloud on Windows 11 776Controlling Windows from an iPhone or iPad 778CHAPTER 3: WRANGLING E-BOOK FILES 781Working with E-Book Files 782Introducing popular e-book formats 782Reading e-book files on your PC 783Organizing your e-book files with calibre 784Getting e-Books from Your PC to Your Kindle 787Emailing books from your PC to your Kindle 787Receiving emailed books from a friend 789CHAPTER 4: GETTING STARTED WITH GMAIL AND OTHER GOOGLE APPS 791Introducing Google’s Ecosystem 793Setting Up Gmail 796Sending and Reading Emails from Gmail 798Moving an Existing Account to Gmail 799Adding Google Drive to File Explorer 802Using Google Apps to View and Edit Files 804CHAPTER 5: USING OUTLOOK.COM AND MICROSOFT 365 809Using Outlook.com 810Sweeping emails in Outlook.com 812Bringing some sanity to your Outlook.com inbox 814Handling Outlook.com Failures 815The Office App and Microsoft 365 817Using the Free Office Web Apps 818CHAPTER 6: DISCOVERING THE BEST FREE WINDOWS ADD-ONS 821Windows Apps You Absolutely Must Have 821VLC Media Player 822Bitwarden 823Recuva 824The Best of the Rest — All Free 825Ninite 825Revo Uninstaller 826Paint.NET 8277-Zip 828qBittorrent 829Dropbox, Google Drive, OneDrive, or 829Other interesting free software 830You may not need to buy Microsoft Office 831Don’t Pay for Software You Don’t Need! 832Windows 11 has all the antivirus software you need 833Windows 11 doesn’t need a disk defragger 833Windows 11 doesn’t need a disk partitioner 833Windows 11 doesn’t need a registry cleaner 834Windows 11 doesn’t need a backup program 835Don’t turn off services or hack your registry 835Index 837
Games mit Roblox
* ALLES, WAS DU FÜR DEINE EIGENEN ROBLOX-SPIELE WISSEN MUSST* EINFÜHRUNG IN ROBLOX STUDIO, PROGRAMMIERUNG MIT LUA, SPIELPHYSIK, BENUTZUNGSOBERFLÄCHEN, ANIMATIONEN UND VIELES MEHR* MIT EINFACHEN SCHRITT-FÜR-SCHRITT-ANLEITUNGEN, TIPPS UND ÜBUNGSAUFGABENDER OFFIZIELLE ROBLOX-GUIDE ist der perfekte Begleiter für angehende Spieleentwickler, die Games für Roblox erstellen möchten. In diesem Buch erfährst du alles, was du brauchst, um spannende und erfolgreiche Spiele zu erstellen, die von Menschen auf der ganzen Welt gerne gespielt werden. Dafür brauchst du keine Vorkenntnisse.Leicht verständliche Schritt-für-Schritt-Anleitungen führen dich durch alle wichtigen Aufgaben bei der Spieleentwicklung mit Roblox Studio. Du lernst anhand vieler Beispiele, wie du die Möglichkeiten der kostenlosen Spiel-Engine voll ausschöpfst. Praktische Tipps helfen dir, Problemen von Anfang an aus dem Weg zu gehen und mit FAQs, Testfragen und Übungen am Ende jedes Kapitels festigst du dein Wissen.Wenn du dieses Buch gelesen hast, bist du ein echter Experte in der Roblox-Spieleentwicklung.AUS DEM INHALT:* Erste Schritte mit Roblox Studio* Einführung in die Programmierung mit Lua* Workflow bei der Spieleentwicklung* Spielphysik, Licht und Atmosphäre, Sounds und Effekte, Landschaften generieren* Models, Meshparts, Texturen und Import von Objekten* Programmierung von Spielmechanik, Animationen, Kamerabewegungen und grafischen Benutzungsoberflächen* Entwicklung für mobile Geräte und Konsolen* Geld verdienen: Consumables, einmalige Käufe, Premium-Version, neue Spieler gewinnen und WerbungFÜR PC UND MACRoblox hat die Mission, Menschen auf der ganzen Welt durch Spiele zu verbinden. Dabei ermöglicht es Roblox allen, der eigenen Fantasie freien Lauf zu lassen, etwas Neues zu erschaffen und Spaß mit Freunden zu haben, während sie Millionen von immersiven 3D-Welten erforschen. Roblox wird von einer internationalen Community von mehr als zwei Millionen Entwicklern gestaltet, die mit Roblox Studio ihre eigenen immersiven Multiplayer-Spiele erschaffen, und gehört zu den beliebtesten Online-Plattformen für Kinder und Jugendliche unter 18 Jahren, gemessen an den monatlichen Besucherzahlen und der Spielzeit (ComScore).
Beginning DevOps on AWS for iOS Development
Apply the principles of DevOps in software development—automated builds, automated tests, and continuous deployment and delivery—to iOS application development on Amazon Web Services (AWS) cloud. This book provides detailed walkthroughs and example source code is provided for the concepts discussed so you can put theory into practical application.You'll start by building a basic iOS application and then dive deep into key AWS Developer tools and services to see how they can be used in iOS application development. Then review the details of the integration of these fully managed AWS services with open-source tools such as Jenkins and Fastlane that allow developers to get the best of both worlds and further help to enhance and increase agility in the development lifecycle of iOS apps.You'll also investigate the Amazon EC2 Mac instance, which allows you to run XCode in a cloud environment for the first time to leverage the flexibility, elasticity, and scale of AWS. It also allows for seamless integration of XCode with fully managed AWS Services from source code control to application deployment. Finally, the book covers how a fully managed Continuous Integration Continuous Deployment (CICD) pipeline can be used to orchestrate all the different components of iOS application development to achieve a fully automated development lifecycle.Get started building your iOS applications using a fully automated process on the AWS Cloud today!WHAT YOU'LL LEARN* Build an iOS application using AWS DevOps tools* Incorporate continuous deployment in your iOS application development* Integrate AWS tooling with Xcode and open source tools such as Jenkins and FastlaneWHO THIS BOOK IS FORiOS application developers wanting to incorporate DevOps and Cloud Architecture into their development process.ABDULLAHI OLAOYE works at Amazon Web Services (AWS) as a Cloud Architect where he is a technical leader and specializes in DevOps and Cloud Architecture. He obtained a Master of Science in Computer Networking from Wichita State University, Kansas, USA and a Bachelor of Engineering from All Nations University, Ghana. As a DevOps and Cloud expert, he works at the forefront of Cloud innovations by assisting Enterprises of different scale in designing, building scalable IT solutions that solves business challenges and in running their workloads on AWS Cloud by helping automate deployments and providing architectural guidance following best practices.Abdullahi has authored and contributed to numerous technical AWS public content such as AWS Blog posts, whitepaper and AWS Prescriptive guidance covering topics from Continuous deployment at scale to general architecture patterns.He is very passionate about Cloud Computing, and he holds Seven AWS Certifications which include the AWS Certified Solutions Architect Professional and AWS Certified DevOps Engineer Professional. He is also a Google Cloud Certified Associate Cloud Engineer. In his spare time, he enjoys listening to history podcasts and traveling. You can follow him on LinkedIn and Github at https://github.com/abdulolaChapter 1: Overview of DevOps and Continuous Deployment• What is DevOps• Principles of DevOps• Continuous Integration• Continuous DeploymentChapter 2: Overview of iOS application development• iOS development environment• Building with Xcode• Automation with fastlaneChapter 3: Core Amazon Web Services (AWS) Concepts• What is Cloud Computing and AWS• Introduction to Core AWS Services• The value proposition of AWSChapter 4: DevOps on AWS• Continuous Integration• Continuous Delivery• Microservices• Infrastructure as Code• Monitoring and LoggingChapter 5: Amazon EC2 Mac Build Server• iOS development at scale without EC2 Mac build server• Deploying EC2 Mac Server• Connecting to your EC2 Mac Server• Monitoring for EC2 macOS• Other Cloud-based Mac build server OfferingsChapter 6: Setup Development tools on the Build server• Apple developer Command-line tools• Setting up Xcode• Setting up Jenkins• Setting up FastlaneChapter 7: Source Control with AWS Code Commit• Git fundamentals• Creating an AWS CodeCommit repository• Approval Rules in AWS CodeCommit• Security in AWS CodeCommit• Monitoring an AWS CodeCommit RepositoryChapter 8: Automated build with Jenkins• Introduction to Jenkins Plugins• Jenkins git Plugin• Integrate an AWS CodeCommit Repository with Jenkins• iOS application build on Jenkins• Managing build artifactsChapter 9: Automated Testing with AWS Device Farm• Introduction to AWS Device Farm• Setting up a Device Farm Project and Test Runs• Integrate Device Farm with Jenkins• Automating AWS Device FarmChapter 10: Automated Deployment• Integrate Jenkins and Fastlane for Continuous Integration• Automate Code Signing• Automate Appstore deploymentsChapter 11 - Pipeline Orchestration with AWS CodePipeline• Creating a CICD Pipeline with AWS CodePipeline• Integrating AWS CodeCommit to Pipeline• Integrating Jenkins to Pipeline for Building• Integrate AWS Device Farm to Pipeline for Testing• Adding an automated Deployment stage• Monitoring AWS CodePipelineChapter 12 – Multi AWS Environment Pipeline Deployment• Why need a Cross-Account Pipeline Deployment• Prerequisites of a Cross-Account Pipeline• Creating a Pipeline with AWS CodeCommit in a different account• Creating a Pipeline with AWS Device Farm in a different accountAudience: Beginning
Smarte Services mit künstlicher Intelligenz
In diesem Buch erfährt der Leser, wie smarte Services mit künstlicher Intelligenz realisierbar sind und wie eine digitale Transformation gelingt, mit der sich die Kundenorientierung, Wettbewerbsfähigkeit, Widerstandsfähigkeit, Agilität und Nachhaltigkeit von Unternehmen verbessern lässt. Was sind smarte Services und wie sehen sie in der Praxis aus? Was beinhalten die dafür erforderlichen Komponenten Internet of Things, Data Lake und Advanced Analytics? Wofür lässt sich die künstliche Intelligenz einsetzen und wie erfolgt das in der Praxis? Wie entsteht Digital Trust? Wie lässt sich der digitale Reifegrad von Unternehmen ermitteln? Welches Vorgehen hat sich für die digitale Transformation in der Praxis bewährt? Wofür wird ein digitales Ecosystem benötigt und wie kann es aussehen? Was wird unter „New Work“ verstanden? Wie arbeiten datengetriebene Unternehmen und welche Vorteile hat das? Was ist ein Digital Use Case? Wie läuft ein Use-Case-Entwicklungs-Workshop ab? Wie lässt sich ein Digital Use Case strukturiert beschreiben? Welche interessanten, innovativen Beispiele für Digital Use Cases gibt es? Wie erfolgt ein Proof of Concept? Wie lassen sich die Kernprozesse Order to Cash (O2C), Procure to Pay (P2P), Design to Operate (D2O), Recruit to Retire (R2R) und Awareness to Advocacy (A2A) digitalisieren? Welche neuen digitalen Technologien und in ihrem Zusammenhang angewandte Verfahren existieren?DER AUTORDR.-ING. EGMONT FOTH war nach dem Studium der Informationstechnik und einer Promotion in der Nachrichtentechnik in zahlreichen Führungsfunktionen in der Industrie tätig. Seit 2017 hat er bei SPIE, dem unabhängigen europäischen Marktführer für Multitechnik-Dienstleistungen in den Bereichen Energie und Kommunikation, als Mitglied der Geschäftsleitung sowie CIO & CTO für Deutschland und Zentraleuropa den Einkauf, die Informationstechnologie, das Geschäftsprozessmanagement und die Digitalisierung verantwortet. Er ist Autor mehrerer Fachbücher und mehrfacher Preisträger der von Computerwoche und CIO-Magazin organisierten Wahl zum CIO des Jahres. 2017 gewann er mit seinem Team für SPIE den Digital Leader Award in der Kategorie "Spark Collaboration" und 2019 erhielt SPIE für die mit einem umfassenden Digital Ecosystem implementierte Digitalisierungsstrategie als Zweiter in der Kategorie "Strategy" erneut den Digital Leader Award. Eine Kontaktaufnahme mit ihm ist über seine Website www.changeprojekte.de möglich.Einleitung - Smarte Services - Digitale Transformation von Unternehmen - Digital Use Cases - Digitalisierung von Kernprozessen - Neue digitale Technologien und angewandte Verfahren - Schlusswort
Scrum Master Kompagnon
Mit agilen Teams starten, wachsen und Wirkung entfalten Scrum Master zu sein, ist nicht nur einer der herausforderndsten Jobs der Welt, sondern gleichzeitig einer der spannendsten und interessantesten. Dabei gibt es nicht den einen Tätigkeitsbereich des Scrum Masters, sondern es existieren – je nach Unternehmen und Kontext – viele verschiedene: Aufgaben als Trainer, als Coach, als Moderator, als Teammitglied und als Veränderungskraft in der Organisation. Der Scrum Master Kompagnon setzt den Fokus auf die Kernkompetenz des Scrum Masters: die Begleitung und Unterstützung eines Scrum-Teams. Dabei orientiert sich die Struktur des Buches an den typischen Entwicklungsphasen des Teams und dem Lebenszyklus der Zusammenarbeit zwischen Scrum Master und Team sowie Product Owner und Stakeholdern. Es werden relevante theoretische Modelle und Konzepte vorgestellt, die in den jeweiligen Prozessphasen hilfreich sein können, sowie ganz praktische und durchführbare Interventionen präsentiert.Die Themen im Einzelnen: Verantwortlichkeiten und Wirksamkeit als Scrum MasterGute Rahmenbedingungen für TeamarbeitTeams kennenlernen und startenTeams begleitenTeams verabschiedenOrganisationsstrukturen und -kulturPersönliche WeiterentwicklungZahlreiche Praxisbeispiele und Erfahrungsberichte sowie mehr als 20 konkrete Workshop-Designs machen das Buch zu einem unverzichtbaren Begleiter jedes Scrum Masters. Autor: Martin Heider hat über 10 Jahre Erfahrung in agiler Produktentwicklung in verschiedensten Branchen und Rollen. Er ist Co-Creator verschiedener Community-Intitiativen, wie Agile Coach Camp, Play4Agile, Coach Reflection Day sowie Agile Monday in Nürnberg. Als selbständiger Agile Coach und Trainer begleitet er Organisationen, Teams und Einzelpersonen. Ein besonderes Anliegen ist ihm die Aus- und Weiterbildung von wirkungsvollen Scrum Mastern. So war er bereits 2014 Mitbegründer der ersten berufsbegleitenden Scrum-Master-Ausbildung in Deutschland. Fabian Schiller hat über 10 Jahre Erfahrung in agiler Produktentwicklung in verschiedensten Branchen und Rollen. Derzeit arbeitet er selbständig als Coach und Trainer und berät vom 30 Mann Startup bis zum Großkonzern seine Kunden bei der Weiterentwicklung der Organisation und agiler Methoden. Er ist Sprecher auf nationalen und internationalen Konferenzen und einer der Gründer der CoReDay- (Coach Reflection Day-)Bewegung zur kontinuierlichen Weiterentwicklung von Scrum Mastern und Agile Coaches.Zielgruppe: Scrum MasterAgile CoachesTrainer*innenWorkshop-Leiter*innen
AutoCAD For Dummies
YOU’RE ONE STEP AWAY FROM CREATING CRYSTAL-CLEAR COMPUTER-AIDED DRAFTS IN AUTOCADEver started an AutoCAD project, only to give up when you couldn’t quite get the hang of it? Or do you have a project coming up that would really benefit from a few meticulously created drawings? Then you need the latest edition of AutoCAD For Dummies, the world’s bestselling retail book about the wildly popular program. With coverage of all the important updates to AutoCAD released since 2019, this book walks you through the very basics of pixels, vectors, lines, text, and more, before moving on to more advanced step-by-step tutorials on three-dimensional drawings and models. Already know the fundamentals? Then skip right to the part you need! From blocks to parametrics, it’s all right here at your fingertips. You’ll also find:* In-depth explanations of how to create and store your drawings on the web* Stepwise instructions on creating your very first AutoCAD drawing, from product installation and project creation to the final touches* An exploration of system variables you can tweak to get the best performance from AutoCADPerfect for the AutoCAD newbie just trying to find their way around the interface for the first time, AutoCAD For Dummies is also a must-read reference for the experienced user looking to get acquainted with the program’s latest features and essential drawing tips. Grab a copy today! RALPH GRABOWSKI is editor of upFront.eZine, a weekly e-newsletter that reports on the business of computer-aided design. He is the author of more than 240 books and e-books on CAD and other topics, and his renowned WorldCAD Access industry blog is widely respected in the industry.INTRODUCTION 1About This Book 2Foolish Assumptions 3Conventions Used in This Book 3Using the command line 3Using aliases 4Icons Used in This Book 4Beyond the Book 5Where to Go from Here 6PART 1: GETTING STARTED WITH AUTOCAD 7CHAPTER 1: INTRODUCING AUTOCAD AND AUTOCAD LT 9Launching AutoCAD 10Drawing in AutoCAD 11Understanding Pixels and Vectors 14The Cartesian Coordinate System 15CHAPTER 2: THE GRAND TOUR OF AUTOCAD 17Looking at AutoCAD’s Drawing Screen 18For your information 21Making choices from the Application menu 22Unraveling the Ribbon 24Getting with the Program 27Looking for Mr Status Bar 28Using Dynamic Input 28Let your fingers do the talking: The command line 29The key(board) to AutoCAD success 30Keeping tabs on palettes 34Down the main stretch: The drawing area 34Fun with F1 35CHAPTER 3: A LAP AROUND THE CAD TRACK 37A Simple Setup 38Drawing a (Base) Plate 43Taking a Closer Look with Zoom and Pan 52Modifying to Make It Merrier 53Crossing your hatches 53Now that’s a stretch 54Following the Plot 57Plotting the drawing 57Today’s layer forecast: Freezing 60CHAPTER 4: SETUP FOR SUCCESS 61A Setup Roadmap 62Choosing your units 62Weighing up your scales 65Thinking about paper 68Defending your border 69A Template for Success 69Making the Most of Model Space 72Setting your units 72Making the drawing area snap-py (and grid-dy) 73Setting linetype, text, and dimension scales 76Entering drawing properties 77Making Templates Your Own 77CHAPTER 5: A ZOOM WITH A VIEW 83Panning and Zooming with Glass and Hand 84The wheel deal 84Navigating a drawing 85Zoom, Zoom, Zoom 87A View by Any Other Name 88Degenerating and Regenerating 91PART 2: LET THERE BE LINES 93CHAPTER 6: ALONG THE STRAIGHT AND NARROW 95Drawing for Success 96Introducing the Straight-Line Drawing Commands 97Drawing Lines and Polylines 98Toeing the line 99Connecting the lines with polyline 100Squaring Off with Rectangles 105Choosing Sides with POLygon 106CHAPTER 7: DANGEROUS CURVES AHEAD 109Throwing Curves 109Going Full Circle 110Arc-y-ology 112Solar Ellipses 114Splines: Sketchy, Sinuous Curves 115Donuts: Circles with a Difference 117Revision Clouds on the Horizon 118Scoring Points 120CHAPTER 8: PRECISELINESS IS NEXT TO CADLINESS 123Controlling Precision 124Understanding the AutoCAD Coordinate Systems 127Keyboard capers: Coordinate input 128Introducing user coordinate systems 128Drawing by numbers 129Grabbing an Object and Making It Snappy 131Grabbing points with object snap overrides 132Snap goes the cursor 134Running with object snaps 135Other Practical Precision Procedures 137CHAPTER 9: MANAGE YOUR PROPERTIES 141Using Properties with Objects 142Using the ByLayer approach 142Changing properties 144Working with Layers 146Accumulating properties 148Creating new layers 149Manipulating layers 156Scaling an object’s linetype 158Using Named Objects 159Using AutoCAD DesignCenter 161CHAPTER 10: GRABBING ONTO OBJECT SELECTION 163Commanding and Selecting 164Command-first editing 164Selection-first editing 164Direct-object editing 164Choosing an editing style 165Selecting Objects 166One-by-one selection 167Selection boxes left and right 167Tying up object selection 169Perfecting Selecting 170AutoCAD Groupies 173Object Selection: Now You See It 173CHAPTER 11: EDIT FOR CREDIT 175Assembling Your AutoCAD Toolkit 175The Big Three: Move, COpy, and Stretch 178Base points and displacements 178Move 180COpy 181Copy between drawings 182Stretch 183More Manipulations 186Mirror, mirror on the monitor 186ROtate 188SCale 189-ARray 190Offset 192Slicing, Dicing, and Splicing 194TRim and EXtend 194BReak 196Fillet, CHAmfer, and BLEND 197Join 200Other editing commands 202Getting a Grip 203When Editing Goes Bad 206Dare to Compare 207CHAPTER 12: PLANNING FOR PAPER 209Setting Up a Layout in Paper Space 212The layout two-step 212Put it on my tabs 215Any Old Viewport in a Layout 216Up and down the detail viewport scales 216Keeping track of where you’re at 218Practice Makes Perfect 219Clever Paper Space Tricks 219PART 3: IF DRAWINGS COULD TALK 221CHAPTER 13: TEXT WITH CHARACTER 223Getting Ready to Write 224Creating Simply Stylish Text 226Font follies 227Get in style 228Taking Your Text to New Heights 230Plotted text height 230Calculating non-annotative AutoCAD text height 231Entering Text 232Using the Same Old Line 232Saying More in Multiline Text 235Making it with mText 235mText dons a mask 238Insert Field 239Doing a number on your mText lists 239Line up in columns — now! 242Modifying mText 243Turning On Annotative Objects 244Gather Round the Tables 247Tables have style, too 247Creating and editing tables 249Take Me to Your Leader 251Electing a leader 251Multi options for multileaders 254CHAPTER 14: ENTERING NEW DIMENSIONS 255Adding Dimensions to a Drawing 256Dimensioning the Legacy Way 257A Field Guide to Dimensions 260Self-centered 263Quick, dimension! 263Where, oh where, do my dimensions go? 264The Latest Styles in Dimensioning 266Creating dimension styles 269Adjusting style settings 271Changing styles 274Scaling Dimensions for Output 275Editing Dimensions 278Editing dimension geometry 278Editing dimension text 280Controlling and editing dimension associativity 281And the Correct Layer Is 282CHAPTER 15: DOWN THE HATCH! 283Creating Hatches 284Hatching Its Own Layer 287Using the Hatches Tab 287Scaling Hatches 290Scaling the easy way 291Annotative versus non-annotative 292Pushing the Boundaries of Hatch 292Adding style 293Hatches from scratch 294Editing Hatch Objects 296CHAPTER 16: THE PLOT THICKENS 299You Say “Printing,” I Say “Plotting” 300The Plot Quickens 300Plotting success in 16 steps 300Getting with the system 304Configuring your printer 305Preview one, two 307Instead of fit, scale it 307Plotting the Layout of the Land 309Plotting Lineweights and Colors 311Plotting with style 311Plotting through thick and thin 316Plotting in color 320It’s a (Page) Setup! 321Continuing the Plot Dialog 322The Plot Sickens 325PART 4: ADVANCING WITH AUTOCAD 327CHAPTER 17: THE ABCS OF BLOCKS 329Rocking with Blocks 330Creating Block Definitions 332Inserting Blocks 336Attributes: Fill-in-the-Blank Blocks 340Creating attribute definitions 341Defining blocks that contain attribute definitions 343Inserting blocks that contain attribute definitions 343Editing attribute values 344Extracting data 344Exploding Blocks 345Purging Unused Block Definitions 345CHAPTER 18: EVERYTHING FROM ARRAYS TO XREFS 347Arraying Associatively 349Comparing the old and new ARray commands 350Hip, hip, array! 351Associatively editing 356Going External 358Becoming attached to your xrefs 360Layer-palooza 362Editing an external reference file 362Forging an xref path 363Managing xrefs 365Blocks, Xrefs, and Drawing Organization 366Mastering the Raster 367Attaching a raster image 369Maintaining your image 370You Say PDF; I Say DWF 371Theme and Variations: Dynamic Blocks 373Now you see it 373Lights! Parameters! Actions! 377Manipulating dynamic blocks 379CHAPTER 19: CALL THE PARAMETRICS! 381Maintaining Design Intent 382Defining terms 384Forget about drawing with precision! 385Constrain yourself 386Understanding Geometric Constraints 386Applying a little more constraint 388Using inferred constraints 393You AutoConstrain yourself! 394Understanding Dimensional Constraints 395Practice a little constraint 396Making your drawing even smarter 398Using Parameters Manager 400Dimensions or constraints? Have it both ways! 403Lunchtime! 406CHAPTER 20: DRAWING ON THE INTERNET 407The Internet and AutoCAD: An Overview 407You send me 408Prepare it with eTransmit 408Rapid eTransmit 409Increasing cloudiness 411Bad reception? 411Help from Reference Manager 412The Drawing Protection Racket 413Outgoing! 414Autodesk weather forecast: Increasing cloud 414Your head planted firmly in the cloud 416AutoCAD Web and Mobile 417PART 5: ON A 3D SPREE 419CHAPTER 21: IT’S A 3D WORLD AFTER ALL 421The 3.5 Kinds of 3D Digital Models 422Tools of the 3D Trade 424Warp speed ahead 425Entering the third dimension 425Untying the Ribbon and opening some palettes 426Modeling from Above 428Using 3D coordinate input 428Using point filters 429Object snaps and object snap tracking 429Changing Work Planes 430Displaying the UCS icon 430Adjusting the UCS 431Orbit à go-go 437Taking a spin around the cube 438Grabbing the SteeringWheels 440Visualizing 3D Objects 440On a Render Bender 442CHAPTER 22: FROM DRAWINGS TO MODELS 443Is 3D for Me? 444Getting Your 3D Bearings 445Creating a better 3D template 445Seeing the world from new viewpoints 450From Drawing to Modeling in 3D 451Drawing basic 3D objects 452Gaining a solid foundation 453Drawing solid primitives 454Adding the Third Dimension to 2D Objects 455Adding thickness to a 2D object 455Extruding open and closed objects 455Pressing and pulling closed boundaries 456Lofting open and closed objects 456Sweeping open and closed objects along a path 457Revolving open or closed objects around an axis 458Modifying 3D Objects 458Selecting subobjects 459Working with gizmos 459More 3D variants of 2D commands 460Editing solids 461CHAPTER 23: IT’S SHOWTIME! 465Get the 2D Out of Here! 466A different point of view 470Additional 3D tricks 471AutoCAD’s top model 472Visualizing the Digital World 474Adding Lights 475Default lighting 475User-defined lights 476Sunlight 479Creating and Applying Materials 479Defining a Background 482Rendering a 3D Model 484CHAPTER 24: AUTOCAD PLAYS WELL WITH OTHERS 485Get Out of Here! 485Making a splash with PNG 486PDF to the rescue 488What the DWF? 4893D print 490But wait! There’s more! 491Open Up and Let Me In! 491Editing other drawing file formats 491PDF editing 491Translation, Please! 494The Importance of Being DWG 495PART 6: THE PART OF TENS 497CHAPTER 25: TEN AUTOCAD RESOURCES 499Autodesk Discussion Groups 499Autodesk’s Own Blogs 499Autodesk University 500Autodesk Channel on YouTube 500World Wide (CAD) Web 500Your Local Authorized Training Center 501Your Local User Group 501Autodesk User Groups International 502Books 502Autodesk Feedback Community 502CHAPTER 26: TEN SYSTEM VARIABLES TO MAKE YOUR AUTOCAD LIFE EASIER 503Aperture 504Dimassoc 505Menubar 505Mirrtext 505Osnapz 506Pickbox 506Rememberfolders 507Rollovertips And Tooltips 507Taskbar 508Visretain 508And the Bonus Round 508CHAPTER 27: TEN AUTOCAD SECRETS 511Sheet Sets 511Custom Tool Palettes 512Ribbon Customization 512Toolsets 512Programming Languages 512Vertical Versions 513Language Packs 513Multiple Projects or Clients 514Data Extraction and Linking 514Untying the Ribbon and Drawings 514Index 515
Einstieg in C# mit Visual Studio 2022
Ideal für ProgrammiereinsteigerC#-Programmierung leicht gemacht! An einfach nachvollziehbaren Beispielen lernen Sie alle wichtigen Themen rund um die Programmierung mit C#. Thomas Theis ist spezialisiert darauf, gerade Anfängern einen guten Einstieg zu ermöglichen. Das gelingt ihm dank anschaulicher Beispiele und klar verständlicher Sprache. Dieses Buch führt Sie von der Installation von Visual Studio 2022 zu den Sprachgrundlagen und stellt Ihnen objektorientierte Programmierung, Fehlerbehandlung, das Erstellen von Datenbankanwendungen sowie die Entwicklung von GUIs einsteigergerecht vor.Aus dem Inhalt:Einführung in Visual Studio 2022C#-SprachgrundlagenObjektorientiert programmierenGUIs entwickelnProgrammieren mit der WPFDatenbankanwendungenZeichnen mit GDI+Leseprobe (PDF)Autor:Thomas Theis, Dipl.-Ing. für Technische Informatik, verfügt über langjährige Erfahrung als EDV-Dozent, unter anderem an der Fachhochschule Aachen.
Windows 11
- PC, Laptop und Tablet von Anfang an sicher bedienen- Von A wie Apps bis Z wie Zwischenablage- Praktische Anleitungen mit zahlreichen AbbildungenLernen Sie das neue Windows 11 von Microsoft Schritt für Schritt kennen und werden Sie sicher im Umgang mit PC, Laptop und Tablet! Dieses Handbuch führt Sie systematisch und leicht nachvollziehbar durch alle wesentlichen Funktionen und Techniken. Für Einsteiger ist es ein hilfreicher Ratgeber, versierte Anwender nutzen es als praktisches Nachschlagewerk im Arbeitsalltag. Die Autorinnen starten mit der grundlegenden Bedienung Ihres Computers und gehen mit anschaulichen Anleitungen zu komplexen Themen über, z. B. individuelle Anpassungen der Benutzeroberfläche, Datenorganisation und -sicherung sowie Sicherheit und Datenschutz. Startmenü, Explorer und der Cloud-Speicher OneDrive sind Ihnen schon bald genauso vertraut wie der Umgang mit den vielen kostenlosen Apps, u. a. Kalender, Mail, Fotos und der Internetbrowser Edge. Dank der Tipps der erfahrenen Dozentinnen werden Sie schnell rundum fit in Windows 11.Aus dem Inhalt:- Was ist neu in Windows 11?- Grundlegende Bedienungs- und Eingabetechniken- So nutzen Sie Startmenü, Taskleiste und Info-Center- Die Benutzeroberfläche individuell anpassen- Apps mit wenigen Klicks installieren und deinstallieren- Dateien speichern und übersichtlich in Ordnern verwalten- Kommunikation mit den Apps Mail, Teams und Kontakte - Mit Microsoft Edge im Internet surfen- Bilder mit der App Fotos organisieren und bearbeiten- Datensicherung mit dem Cloud-Speicher OneDrive- Wichtige Einstellungen zu Sicherheit und Datenschutz
Clean ABAP
Schluss mit unleserlichen ABAP-Programmen! Dieses offizielle Begleitbuch zum Repository »Clean ABAP« auf GitHub zeigt Ihnen, wie Sie intuitiv verständlichen und leicht zu wartenden Code schreiben. Gespickt mit Best Practices zu Namenskonventionen, Kommentaren und Formatierungen, ist dieser Leitfaden unverzichtbar für den Programmieralltag. Aus dem Inhalt: Klassen und InterfacesMethodenNamen von ObjektenVariablen und LiteraleInterne TabellenKontrollflussKommentareFormatierungFehlerbehandlungUnit-TestsPaketeClean ABAP im Team umsetzen Einleitung ... 17 1. Einführung ... 23 1.1 ... Was ist Clean ABAP? ... 23 1.2 ... Wie kann ich mit Clean ABAP anfangen? ... 26 1.3 ... Wie gehe ich mit Legacy-Code um? ... 28 1.4 ... Wie kann ich Code automatisch prüfen? ... 30 1.5 ... Wie steht Clean ABAP im Verhältnis zu anderen Programmierleitfäden? ... 32 1.6 ... Wie kann ich mich in der Clean-ABAP-Community engagieren? ... 33 1.7 ... Zusammenfassung ... 34 2. Die Programmiersprache ABAP ... 35 2.1 ... Legacy-Code ... 35 2.2 ... Performance ... 38 2.3 ... Objektorientierte vs. prozedurale Programmierung ... 41 2.4 ... Funktionale vs. prozedurale Sprachkonstrukte ... 49 2.5 ... Obsolete Sprachelemente ... 52 2.6 ... Entwurfsmuster ... 54 2.7 ... Zusammenfassung ... 56 3. Klassen und Interfaces ... 59 3.1 ... Objektorientierung ... 59 3.2 ... Geltungsbereich und Sichtbarkeit ... 90 3.3 ... Konstruktoren ... 99 3.4 ... Zusammenfassung ... 111 4. Methoden ... 113 4.1 ... Objektorientierte Programmierung ... 113 4.2 ... Parameter ... 121 4.3 ... Methodeninhalt ... 137 4.4 ... Methoden aufrufen ... 148 4.5 ... Zusammenfassung ... 153 5. Namen ... 155 5.1 ... Gute Namen ... 155 5.2 ... Eigenheiten von ABAP ... 162 5.3 ... Affixe: Präfixe, Suffixe und Infixe ... 163 5.4 ... Mit Legacy-Code umgehen ... 166 5.5 ... Zusammenfassung ... 167 6. Variablen und Literale ... 169 6.1 ... Variablen ... 170 6.2 ... Konstanten ... 177 6.3 ... Zeichenketten ... 186 6.4 ... Boolesche Ausdrücke ... 188 6.5 ... Reguläre Ausdrücke ... 191 6.6 ... Das Schlüsselwort REDUCE ... 193 6.7 ... Zusammenfassung ... 196 7. Interne Tabellen ... 197 7.1 ... Die richtige Tabellenart verwenden ... 198 7.2 ... DEFAULT KEY vermeiden ... 200 7.3 ... Zeilen hinzufügen mit INSERT INTO TABLE und APPEND TO ... 201 7.4 ... Prüfen, ob eine Tabelle eine bestimmte Zeile enthält ... 202 7.5 ... Tabelleninhalte abfragen ... 204 7.6 ... Die Anweisung LOOP AT ... WHERE ... und verschachtelte IF-Anweisungen ... 206 7.7 ... Unnötige Tabellenabfragen identifizieren ... 207 7.8 ... Tabellenzeilen blockweise und Zeile für Zeile bearbeiten ... 208 7.9 ... DESCRIBE TABLE und die Funktion LINES ... 209 7.10 ... Zusammenfassung ... 210 8. Kontrollfluss ... 211 8.1 ... Das Schlüsselwort IF ... 212 8.2 ... Schachtelungstiefe ... 217 8.3 ... Bedingungen ... 218 8.4 ... Das Schlüsselwort CASE ... 225 8.5 ... Die Anweisung DO 1 TIMES ... 229 8.6 ... Zusammenfassung ... 233 9. Kommentare ... 235 9.1 ... Präziser Code benötigt keine Kommentare ... 235 9.2 ... Kommentare richtig platzieren und verwenden ... 238 9.3 ... Kommentare, die Sie vermeiden sollten ... 239 9.4 ... FIXME-, TODO- und XXX-Kommentare ... 242 9.5 ... Spezielle Kommentare: ABAP Doc, Pragmas und Pseudokommentare ... 244 9.6 ... Zusammenfassung ... 245 10. Formatierung ... 247 10.1 ... Einen konsistenten Stil verfolgen ... 248 10.2 ... Den Code fürs Lesen optimieren ... 249 10.3 ... Der Pretty Printer ... 250 10.4 ... Wie viele Anweisungen pro Zeile? ... 252 10.5 ... Zeilenlänge ... 252 10.6 ... Code straffen ... 254 10.7 ... Leerzeilen ... 255 10.8 ... Zuweisungen ausrichten ... 256 10.9 ... Variablendeklarationen ausrichten ... 257 10.10 ... Wohin mit den Klammern? ... 257 10.11 ... Methodenparameter formatieren ... 258 10.12 ... Zusammenfassung ... 263 11. Fehlerbehandlung ... 265 11.1 ... Nachrichten ... 265 11.2 ... Rückgabewerte ... 269 11.3 ... Ausnahmen ... 274 11.4 ... Ausnahmen auslösen und behandeln ... 284 11.5 ... Zusammenfassung ... 291 12. Unit Tests ... 293 12.1 ... Testklassen ... 294 12.2 ... Testmethoden ... 304 12.3 ... Die getestete Klasse ... 309 12.4 ... Namen von Testklassen und -methoden ... 310 12.5 ... Assertions ... 313 12.6 ... Test-Doubles ... 325 12.7 ... Test-Seams ... 337 12.8 ... Konzepte zum Umgang mit Unit Tests ... 339 12.9 ... Zusammenfassung ... 343 13. Pakete ... 345 13.1 ... Allgemeine Paketkonzepte ... 345 13.2 ... Paketkonzept in ABAP ... 347 13.3 ... Optionen für das Paketdesign ... 353 13.4 ... Paketprüfungen ... 358 13.5 ... Konsequenzen einer mangelhaften oder fehlenden Paketstrategie ... 367 13.6 ... Zusammenfassung ... 368 14. Wie Sie Clean ABAP umsetzen ... 369 14.1 ... Gemeinsames Verständnis der Teammitglieder ... 370 14.2 ... Den Broken-Window-Effekt angehen ... 374 14.3 ... Code-Reviews und Lernen ... 378 14.4 ... Clean Code Advisor ... 382 14.5 ... Lerntechniken ... 382 14.6 ... Continuous Learning in funktionsübergreifenden Teams ... 387 14.7 ... Zusammenfassung ... 390 Das Autorenteam ... 391 Index ... 393
Beginning ReactJS Foundations Building User Interfaces with ReactJS
QUICKLY LEARN THE MOST WIDELY USED FRONT-END DEVELOPMENT LANGUAGE WITH EASE AND CONFIDENCEReact JS Foundations: Building User Interfaces with ReactJS - An Approachable Guide walks readers through the fundamental concepts of programming with the explosively popular front-end tool known as React JS. Written by an accomplished full-stack engineer, speaker, and community organizer, React JS Foundations teaches readers how to understand React and how to begin building applications with it. The book:* Explains and clarifies technical terminology with relevant and modern examples to assist people new to programming understand the language* Helps experienced programmers quickly get up to speed with React* Is stocked throughout with practical and applicable examples of day-to-day React workPerfect for beginner, intermediate, and advanced programmers alike, React JS Foundations will quickly bring you up to speed on one of the most useful and widely used front-end languages on the web today. You can start building your first application today. ABOUT THE AUTHORCHRIS MINNICK is an accomplished author, trainer, and web developer with experience working on web and mobile projects with both small and large companies. The companion website at www.reactjsfoundations.com provides code listings for each chapter, plus examples and downloads that can be used to test out the various ReactJS techniques in the book. Introduction XxviiCHAPTER 1: HELLO, WORLD! 1React without a Build Toolchain 1Interactive “Hello, World” with Create React App and JSX 7Summary 9CHAPTER 2: THE FOUNDATION OF REACT 11What’s in a Name? 11UI Layer 12Virtual DOM 13The Philosophy of React 14Thinking in Components 15Composition vs. Inheritance 15React Is Declarative 16React Is Idiomatic 17Why Learn React? 17React vs.... 18React vs. Angular 18React vs. Vue 19What React Is Not 19React Is Not a Web Server 20React Is Not a Programming Language 20React Is Not a Database Server 21React Is Not a Development Environment 21React Is Not the Perfect Solution to Every Problem 21Summary 21CHAPTER 3: JSX 23JSX Is Not HTML 23What Is JSX? 30How JSX Works 30Transpiler . . . Huh? 31Compilation vs. Transpilation 31JSX Transform 31Introducing Babel 31Eliminating Browser Incompatibilities 33Syntax Basics of JSX 33JSX Is JavaScript XML 33Beware of Reserved Words 33JSX Uses camelCase 33Preface Custom Attributes in DOM Elements with data-34JSX Boolean Attributes 34Use Curly Braces to Include Literal JavaScript 35Remember to Use Double Curly Braces with Objects 35Put Comments in Curly Braces 35When to Use JavaScript in JSX 36Conditionals in JSX 36Conditional Rendering with if/else and Element Variables 36Conditional Rendering with the && Operator 37Conditional Rendering with the Conditional Operator 38Expressions in JSX 38Using Children in JSX 40React Fragments 40Summary 41CHAPTER 4: ALL ABOUT COMPONENTS 43What Is a Component? 43Components vs. Elements 44Components Define Elements 44Elements Invoke Components 45Built-in Components 47HTML Element Components 47Attributes vs. Props 52Passing Props 52Accessing Props 52Standard HTML Attributes 54Non-Standard Attributes 56Custom Attributes 56User-DefinedComponents 56Types of Components 56Class Components 57Stepping through a React Class Component 68React.Component 68Importing React.Component 68The Class Header 69The Constructor Function 69Managing State in Class Components 71The Render Function 73Creating and Using Props 74Function Components 76What Are Function Components? 79How to Write Function Components 79Optimizations and Function Component Shortcuts 80Managing State in Function Components 83Differences between Function and Class Components 84React Component Children 84this.props.children 85Manipulating Children 86React.Children 86isValidElement 87cloneElement 87The Component Lifecycle 89Mounting 90constructor() 90static getDerivedStateFromProps 90render 90componentDidMount() 90Updating 90shouldComponentUpdate 91getSnapshotBeforeUpdate 91componentDidUpdate 92Unmounting 92componentWillUnmount 92Error Handling 92getDerivedStateFromError 92componentDidCatch 92Improving Performance and Avoiding Errors 92Avoiding Memory Leaks 93React.PureComponent 96React.memo 97React.StrictMode 98Rendering Components 98Rendering with ReactDOM 98Virtual DOM 100Other Rendering Engines 101React Native 101ReactDOMServer 102React Konsul 103react-pdf 103Component Terminology 103Summary 104CHAPTER 5: REACT DEVTOOLS 105Installation and Getting Started 105Inspecting Components 107Working with the Component Tree 108Searching for Components 110Using the Search Input Box 110Using Regular Expressions 110Filtering Components 112Selecting Components 114Editing Component Data in DevTools 114Working with Additional DevTools Functionality 118Profiling 119Summary 121CHAPTER 6: REACT DATA FLOW 123One-WayData Flow 123Understanding One-WayData Flow 124Why One-WayData Flow? 125Props 126Components Receive Props 126Props Can Be Any Data Type 126Props Are Read-Only 127Validating Incoming Props with PropTypes 129What Is PropTypes? 130Getting Started with PropTypes 131What Can PropTypes Validate? 133Default Props 141React State 145What Is state? 146Initializing state 146Initializing state in Class Components 146Initializing State in Function Components 147The Difference between state and props 149Updating state 149Updating a Class Component’s state with setState 150Updating state with Function Components 154What to Put in State 161Building the Reminders App 161What Not to Put in State 168Where to Put State 168Lifting State Up 170About the key Prop 177Filtering the Reminders 183Implementing the isComplete Changing Functionality 188Converting to Class Components 190Summary 198CHAPTER 7: EVENTS 199How Events Work in React 199What Is SyntheticEvent? 201Using Event Listener Attributes 202The Event Object 203Supported Events 204Event Handler Functions 211Writing Inline Event Handlers 211Writing Event Handlers in Function Components 212Writing Event Handlers in Class Components 213Binding Event Handler Functions 214Using bind 215Using Arrow Functions 216Passing Data to Event Handlers 218Summary 219CHAPTER 8: FORMS 221Forms Have State 221Controlled Inputs vs. Uncontrolled Inputs 222Updating a Controlled Input 223Controlling an Input in a Function Component 224Controlling an Input in a Class Component 224Lifting Up Input State 226Using Uncontrolled Inputs 228Using Different Form Elements 229Controlling the Input Element 230Controlling a textarea 230Controlling a Select Element 231Preventing Default Actions 231Summary 232CHAPTER 9: REFS 233What Refs Are 233How to Create a Ref in a Class Component 234How to Create a Ref in a Function Component 234Using Refs 234Creating a Callback Ref 236When to Use Refs 238When Not to Use Refs 238Examples 239Managing Focus 239Automatically Selecting Text 239Controlling Media Playback 241Setting Scroll Position 241Summary 242CHAPTER 10: STYLING REACT 243The Importance of Styles 243Importing CSS into the HTML File 244Using Plain Old CSS in Components 245Writing Inline Styles 247JavaScript Style Syntax 248Why to Use Inline Styles 249Why Not to Use Inline Styles 249Improving Inline Styles with Style Modules 249CSS Modules 250Naming CSS Module Files 251Advanced CSS Modules Functionality 252Global Classes 252Class Composition 252CSS-in- JS and Styled Components 253Summary 255CHAPTER 11: INTRODUCING HOOKS 257What Are Hooks? 257Why Were Hooks Introduced? 257Rules of Hooks 259The Built-in Hooks 259Managing State with useState 260Setting the Initial State 262Using the Setter Function 262Passing a Value to a Setter 263Passing a Function to a Setter 263Setter Function Value Comparison 264Hooking into the Lifecycle with useEffect 264Using the Default useEffect Behavior 265Cleaning Up After Effects 265Customizing useEffect 266Running Asynchronous Code with useEffect 270Subscribing to Global Data with useContext 272Combining Logic and State with useReducer 273Memoized Callbacks with useCallback 275Caching Computed Values with useMemo 278Solving Unnecessary Renders 278Solving Performance Problems 279Accessing Children Imperatively with useRef 279Customizing Exposed Values with useImperativeHandle 280Updating the DOM Synchronously with useLayoutEffect 281Writing Custom Hooks 281Labeling Custom Hooks with useDebugValue 283Finding and Using Custom Hooks 285use-http 285react-fetch-hook 286axios-hooks 286react-hook- form 286@rehooks/local-storage 287use-local- storage- state 287Other Fun Hooks 288Lists of Hooks 288Summary 288CHAPTER 12: ROUTING 289What Is Routing? 289How Routing Works in React 291Using React Router 293Installing and Importing react-router- dom 293The Router Component 294Selecting a Router 294Using the Router Component 295Linking to Routes 296Internal Linking with Link 296Internal Navigation with NavLink 298Automatic Linking with Redirect 302Creating Routes 302Restricting Path Matching 304Using URL Parameters 304The component Prop 305Render Props 306Switching Routes 307Rendering a Default Route 308Routing with Redirect 308Behind the Scenes: location, history, and match 309The history Object 310The location Object 313The match Object 313React Router Hooks 317useHistory 317useLocation 317useParams 317useRouteMatch 317Summary 318CHAPTER 13: ERROR BOUNDARIES 319The Best Laid Plans 319What Is an Error Boundary? 320Implementing an Error Boundary 323Building Your Own ErrorBoundary Component 323getDerivedStateFromErrors Is a Static Method 324getDerivedStateFromErrors Runs During the Render Phase 325getDerivedStateFromErrors Receives the Error as a Parameter 325getDerivedStateFromErrors Should Return an Object for Updating State 325Testing Your Boundary 326Logging Errors with ComponentDidCatch() 327Using a Logging Service 328Resetting the State 333Installing a Pre-Built ErrorBoundary Component 334What Can’t an Error Boundary Catch? 336Catching Errors in Error Boundaries with try/catch 336Catching Errors in Event Handlers with react-error- boundary 337Summary 338CHAPTER 14: DEPLOYING REACT 339What Is Deployment? 339Building an App 339Running the build Script 340Examining the build Directory 340The Built index.html 341The static Directory 342asset-manifest. json 342What’s in a Name? 343How Is a Deployed App Different? 343Development Mode vs. Production 343Putting It on the Web 344Web Server Hosting 344Node Hosting 345Deploying with Netlify 345Enabling Routing with Netlify 347Enabling Custom Domains and HTTPS 348Summary 349CHAPTER 15: INITIALIZE A REACT PROJECT FROM SCRATCH 351Building Your Own Toolchain 351Initializing Your Project 352The HTML Document 352The Main JavaScript File 353The Root Component 353Running in the Browser 354How Webpack Works 357Loaders 358Plugins 358Automating Your Build Process 358Making an HTML Template 359Development Server and Hot Reloading 360Testing Tools 360Installing and Configuring ESLint 360ESLint Configuration 361How to Fix Errors 362Testing with Jest 363Creating NPM Scripts 364Structuring Your Source Directory 365Grouping by File Type 366Grouping by Features 367Summary 367CHAPTER 16: FETCHING AND CACHING DATA 369Asynchronous Code: It’s All About Timing 369JavaScript Never Sleeps 370Where to Run Async Code in React 374Ways to Fetch 376Getting Data with Fetch 377Getting Data with Axios 377Using Web Storage 379Two Types of Web Storage 379When to Use Web Storage 380When Not to Use Web Storage 380Web Storage Is Synchronous 380Working with localStorage 381Storing Data with localStorage 381Reading Data from localStorage 382Removing Data from localStorage 384Summary 385CHAPTER 17: CONTEXT API 387What Is Prop Drilling? 387How Context API Solves the Problem 388Creating a Context 388Creating a Provider 389Consuming a Context 390Using Context in a Class Component 390Using Context in a Function Component 391Common Use Cases for Context 391When Not to Use Context 392Composition as an Alternative to Context 392Example App: User Preferences 396Summary 398CHAPTER 18: REACT PORTALS 399What Is a Portal? 399How to Make a Portal 399Why Not Just Render Multiple Component Trees? 403Common Use Cases 403Rendering and Interacting with a Modal Dialog 404Managing Keyboard Focus with Modals 409Summary 411CHAPTER 19: ACCESSIBILITY IN REACT 413Why Is Accessibility Important? 413Accessibility Basics 414Web Content Accessibility Guidelines (WCAG) 414Web Accessibility Initiative –Accessible Rich Internet Applications (WAI-ARIA) 415Implementing Accessibility in React Components 415ARIA Attributes in React 416Semantic HTML 416Form Accessibility 417Focus Control in React 418Skip Links 418Managing Focus Programmatically 419Media Queries in React 420Media Queries in Included CSS 421Using useMediaQuery 422Summary 422CHAPTER 20: GOING FURTHER 425Testing 425Mocha 426Enzyme 426Chai 427Assert 427Expect 428Should 428Karma 428Nightwatch.js 428Server-SideRendering 429Flux 430Redux 430GraphQL 432Apollo 433React Native 434Next.js 434Gatsby 434People to Follow 435Useful Links and Resources 435Summary 436Index 437
Cloud Security For Dummies
EMBRACE THE CLOUD AND KICK HACKERS TO THE CURB WITH THIS ACCESSIBLE GUIDE ON CLOUD SECURITYCloud technology has changed the way we approach technology. It’s also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.Using the practical techniques discussed in Cloud Security For Dummies, you’ll mitigate the risk of a data breach by building security into your network from the bottom-up. Learn how to set your security policies to balance ease-of-use and data protection and work with tools provided by vendors trusted around the world.This book offers step-by-step demonstrations of how to:* Establish effective security protocols for your cloud application, network, and infrastructure * Manage and use the security tools provided by different cloud vendors * Deliver security audits that reveal hidden flaws in your security setup and ensure compliance with regulatory frameworks As firms around the world continue to expand their use of cloud technology, the cloud is becoming a bigger and bigger part of our lives. You can help safeguard this critical component of modern IT architecture with the straightforward strategies and hands-on techniques discussed in this book.TED COOMBS is a direct descendant of King Edward of England, a former world record holder for most miles roller skated in a day, and a longtime technology guru and author. He’s written over a dozen technology books on a wide array of topics ranging from database programming to building an internet site. Along the way he helped create early artificial intelligence tools and served as cybersecurity professional focused on computer forensics. INTRODUCTION 1About This Book 2Foolish Assumptions 3Icons Used in This Book 3Beyond the Book 3Where to Go from Here 4PART 1: GETTING STARTED WITH CLOUD SECURITY 5CHAPTER 1: CLOUDS AREN’T BULLETPROOF 7Knowing Your Business 8Discovering the company jewels 8Initiating your plan 8Automating the discovery process 8Knowing Your SLA Agreements with Service Providers 10Where is the security? 10Knowing your part 11Building Your Team 11Finding the right people 12Including stakeholders 12Creating a Risk Management Plan 13Identifying the risks 14Assessing the consequences of disaster 15Pointing fingers at the right people 15Disaster planning 16When Security Is Your Responsibility 17Determining which assets to protect 17Knowing your possible threat level 20Van Gogh with it (paint a picture of your scenario) 21Setting up a risk assessment database 22Avoiding Security Work with the Help of the Cloud 24Having someone else ensure physical security 25Making sure providers have controls to separate customer data 25Recognizing that cloud service providers can offer better security 25CHAPTER 2: GETTING DOWN TO BUSINESS 27Negotiating the Shared Responsibility Model 28Coloring inside the lines 29Learning what to expect from a data center 29Taking responsibility for your 75 percent 31SaaS, PaaS, IaaS, AaaA! 31SaaS 31SaaS security 32PaaS 32PaaS security 33IaaS 33IaaS security 34FaaS 34SaaS, PaaS, IaaS, FaaS responsibilities 34Managing Your Environment 35Restricting access 36Assessing supply chain risk 36Managing virtual devices 38Application auditing 38Managing Security for Devices Not Under Your Control 39Inventorying devices 39Using a CASB solution 40Applying Security Patches 41Looking Ahead 42CHAPTER 3: STORING DATA IN THE CLOUD 43Dealing with the Data Silo Dilemma 44Cataloging Your Data 45Selecting a data catalog software package 46Three steps to building a data catalog 46Controlling data access 47Working with labels 49Developing label-based security 50Applying sensitivity levels 50Assessing impact to critical functions 50Working with Sample Classification Systems 51Tokenizing Sensitive Data 54Defining data tokens 54Isolating your tokenization system 55Accessing a token system 55Segmenting Data 56Anonymizing Data 56Encrypting Data in Motion, in Use, and at Rest 58Securing data in motion 59Encrypting stored data 59Protecting data in use by applications 60Creating Data Access Security Levels 60Controlling User Access 61Restricting IP access 61Limiting device access 62Building the border wall and other geofencing techniques 63Getting rid of stale data 64CHAPTER 4: DEVELOPING SECURE SOFTWARE 65Turbocharging Development 65No more waterfalls 66CI/CD: Continuous integration/continuous delivery 68Shifting left and adding security in development 68Tackling security sooner rather than later 69Putting security controls in place first 70Circling back 70Implementing DevSecOps 71Automating Testing during Development 71Using static and dynamic code analysis 72Taking steps in automation 73Leveraging software composition analysis 74Proving the job has been done right 76Logging and monitoring 76Ensuring data accountability, data assurance, and data dependability 77Running Your Applications 78Taking advantage of cloud agnostic integration 79Recognizing the down sides of cloud agnostic development 80Getting started down the cloud agnostic path 81Like DevOps but for Data 82Testing, 1-2-3 84Is this thing working? 85Working well with others 85Baking in trust 85DevSecOps for DataOps 86Considering data security 87Ending data siloes 88Developing your data store 89Meeting the Challenges of DataSecOps 90Understanding That No Cloud Is Perfect 92CHAPTER 5: RESTRICTING ACCESS 95Determining the Level of Access Required 95Catching flies with honey 96Determining roles 97Auditing user requirements 97Understanding Least Privilege Policy 98Granting just-in-time privileges 99The need-to-know strategy 99Granting access to trusted employees 99Restricting access to contractors 100Implementing Authentication 101Multifactor authentication (Or, who’s calling me now?) 101Authenticating with API keys 102Using Firebase authentication 102Employing OAuth 103Google and Facebook authentication methods 103Introducing the Alphabet Soup of Compliance 104Global compliance 104Complying with PCI 105Complying with GDPR 106HIPAA compliance 107Government compliance 109Compliance in general 110Maintaining Compliance and CSPM 110Discovering and remediating threats with CSPM applications 112Automating Compliance 113Integrating with DevOps 113Controlling Access to the Cloud 114Using a cloud access security broker (CASB) 115Middleware protection systems 117Getting Certified 121ISO 27001 Compliance 121SOC 2 compliance 122PCI certification 124PART 2: ACCEPTANCE 125CHAPTER 6: MANAGING CLOUD RESOURCES 127Defending Your Cloud Resources from Attack 128Living in a Virtual World 129Moving to virtualization 130Addressing VM security concerns 130Using containers 131Securing Cloud Resources with Patch Management 132Patching VMs and containers 133Implementing patch management 133Keeping Your Cloud Assets Straight in Your Mind 134Keeping Tabs with Logs 136Using Google Cloud Management software 136Using AWS log management 137Using Azure log management 139Working with third-party log management software 139Logging containers 140Building Your Own Defenses 141Creating your development team 141Using open-source security 142Protecting your containers 143Protecting your codebase 143CHAPTER 7: THE ROLE OF AIOPS IN CLOUD SECURITY 145Taking the AIOps Route 146Detecting the problem 148Using dynamic thresholds 149Catching attacks early in the Cyber Kill chain 149Prioritizing incidents 150Assigning tasks 150Diagnosing the root problem 151Reducing time to MTTR 151Spotting transitory problems 152Digging into the past 152Solving the problem 153Achieving resolution 154Automating security responses 154Continually improving 155Making Things Visible 155Implementing resource discovery 155Automating discovery 156Managing Resources, CMDB-Style 157Seeing potential impacts 157Adding configuration items 158Employing CSDM 158Using AIOps 159Gaining insights 159Examining a wireless networking use case 159Using Splunk to Manage Clouds 161Observability 161Alerts 162Splunk and AIOps 163Predictive analytics 163Adaptive thresholding 163Views of everything 164Deep Dive in Splunk 164Event Analytics in Splunk 164Splunk On-Call 165Phantom 166Putting ServiceNow Through Its Paces 167AIOps require an overhead view 167React to problems 167Gauge system health 168Automation makes it all happen 169Getting the Job Done with IT Service Management 170How ITSM is different 170Performance analytics 170Changing Your Team 171A (Not So Final) Word 172CHAPTER 8: IMPLEMENTING ZERO TRUST 173Making the Shift from Perimeter Security 174Examining the Foundations of Zero Trust Philosophy 175Two-way authentication 175Endpoint device management 176End-to-end encryption 177Policy based access 179Accountability 181Least privilege 182Network access control and beyond 182CSPM risk automation 184Dealing with Zero Trust Challenges 185Choose a roadmap 186Take a simple, step-by-step approach 186Keep in mind some challenges you face in implementing zero trust 190CHAPTER 9: DEALING WITH HYBRID CLOUD ENVIRONMENTS 195Public Clouds Make Pretty Sunsets 196Controlling your environment 197Optimizing for speed 197Managing security 198Private Clouds for Those Special Needs 199Wrapping Your Mind around Hybrid Cloud Options 200Hybrid storage solution 201Tiered data storage 202Gauging the Advantages of the Hybrid Cloud Setup 203It’s scalable 203The costs 203You maintain control 203The need for speed 204Overcoming data silos 204Compliance 206Struggling with Hybrid Challenges 207Handling a larger attack surface 207Data leakage 207Data transport times 208Complexity 208Risks to your service level agreements 208Overcoming Hybrid Challenges 209Asset management 209SAM 210HAM 211IT asset management 211Latency issues 212On the Move: Migrating to a Hybrid Cloud 213Data migration readiness 213Making a plan 213Picking the right cloud service 214Using a migration calendar 215Making it happen 215Dealing with compatibility issues 215Using a Package 216HPE Hybrid Cloud Solution 216Amazon Web Services 216Microsoft Azure 217CHAPTER 10: DATA LOSS AND DISASTER RECOVERY 219Linking Email with Data Loss 220Data loss from malware 221The nefarious ransomware 222Ransomware and the cloud 223Crafting Data Loss Prevention Strategies 224Backing up your data 226Tiered backups 226Minimizing Cloud Data Loss 229Why Cloud DLP? 229Cloud access security brokers 229Recovering from Disaster 232Recovery planning 232Business continuity 232RTO and RPO 233Coming up with the recovery plan itself 233Chaos Engineering 235Practical chaos engineering 236Listing what could go wrong 238Seeing how bad it can get 239Attaining resiliency 239PART 3: BUSINESS AS USUAL 241CHAPTER 11: USING CLOUD SECURITY SERVICES 243Customizing Your Data Protection 244Validating Your Cloud 244Multifactor authentication 245One-time passwords 245Managing file transfers 250HSM: Hardware Security Modules for the Big Kids 251Looking at HSM cryptography 252Managing keys with an HSM 253Building in tamper resistance 255Using HSMs to manage your own keys 255Meeting financial data security requirements with HSMs 256DNSSEC 256OpenDNSSEC 257Evaluating HSM products 258Looking at cloud HSMs 259KMS: Key Management Services for Everyone Else 259SSH compliance 260The encryption-key lifecycle 262Setting Up Crypto Service Gateways 263CHAPTER 12: WHEN THINGS GO WRONG 265Finding Your Focus 265Stealing Data 101 266Landing, expanding, and exfiltrating 267Offboarding employees 273Preventing the Preventable and Managing Employee Security 276Navigating Cloud Native Breaches 280Minimizing employee error 281Guarding against insider data thefts 283Preventing employee data spillage 284Cleaning up after the spill 285CHAPTER 13: SECURITY FRAMEWORKS 289Looking at Common Frameworks 290COBIT 290SABSA 291Federal Financial Institutions Examination Council (FFIEC) Cyber Assessment Tool (CAT) 292Federal Risk and Authorization Management Program (FEDRAMP) 292Personal Information Protection and Electronic Documents Act (PIPEDA) 293Payment Card Industry — Data Security Standard (PCI–DSS) 293GLBA 293SCF 294DFARS 252.204-7012/ NIST 800-171 294ISO/IEC 27000 Series 295CIS Critical Security Controls 295CIS Benchmarks 295Common Criteria 296FDA regulations on electronic records and signatures 296ITIL 297Introducing SASE Architecture 298The sassy side of SASE 299Sassy makeup 300The Cloud Native Application Protection Platform 303Working with CWPP 304Managing with CSPM 305NIST Risk Management Framework 305Federal Information Security Modernization Act 306Cybersecurity Strategy and Implementation Plan 307CHAPTER 14: SECURITY CONSORTIUMS 311Doing the Right Thing 311Membership in the Cloud Security Alliance 313Company membership 314Individual membership 315Getting that Stamp of Approval 317CCSK Certification 317CISA: Certified Security Information Systems Auditor 317CRISC: Certified Risk and Information Systems Control 318CCAK: Certificate of Cloud Auditing Knowledge 318Advanced Cloud Security Practitioner 318GDPR Lead Auditor and Consultant 319Information Security Alliances, Groups, and Consortiums 319Words for the Road 321PART 4: THE PART OF TENS 323CHAPTER 15: TEN STEPS TO BETTER CLOUD SECURITY 325Scoping Out the Dangers 326Inspiring the Right People to Do the Right Thing 327Keeping Configuration Management on the Straight and Narrow 328Adopting AIOps 329Getting on board with DataOps 330Befriending Zero Trust 330Keeping the Barn Door Closed 331Complying with Compliance Mandates 332Joining the Cloud Security Club 333Preparing for the Future 333CHAPTER 16: CLOUD SECURITY SOLUTIONS 335Checkpoint CloudGuard 335CloudPassage Halo 336Threat Stack Cloud Security Platform 336Symantec Cloud Workload Protection 336Datadog Monitoring Software 337Azure AD 338Palo Alto Prisma 338Fortinet Cloud Security 338ServiceNow AIOps 339Lacework 340Index 341
Jedes Team ist anders
Ein Praxisbuch für nachhaltige TeamentwicklungTeamentwicklung ist ein kontinuierlicher, komplexer Prozess. Er verlangt vom Team-Coach neben Einfühlungsvermögen in die Situation und die aktuellen Bedürfnisse seines Teams ein abgestimmtes, schrittweises Vorgehen und ständige Reflexion. Die Autoren präsentieren ein Modell für nachhaltige Teamentwicklung, das auf fünf sich teils gegenseitig beeinflussenden und aufeinander aufbauenden Handlungsfeldern (Psychologische Sicherheit, Wissen, Erfahrung, Werte, Haltung) basiert. Dabei verdeutlichen in Wort und Bild illustrierte Team-Personas typisches Verhalten in Teams und unterstützen den Team-Coach bei der Einschätzung der Situation in seinem Team und der Festlegung des nächsten Entwicklungsschritts, indem sie die zugehörigen möglichen Handlungsfelder benennen. Ein ausführliches Praxisbeispiel zeigt den Einsatz von Modell und Leitfaden bei der nachhaltigen Teamentwicklung. Das Buch vermittelt dem Team-Coach wertvolle Anregungen für die tägliche Arbeit und hilft, sowohl das Team als auch sich selbst kontinuierlich weiterzuentwickeln und dabei gut auf sich zu achten.Zielgruppe: FührungskräfteVerantwortliche in ProjektteamsPersonalverantwortliche(Agile) CoachesScrum Master Autoren: Holger Koschek ist selbstständiger Berater, Trainer und Coach für fortschrittliches Management in Projekten und Organisationen. Dabei legt er Wert auf eine klare Vision, wirksame Kommunikation, eine dynamische Arbeitsorganisation und eine von gemeinsamen Werten getragene Zusammenarbeit. Er ist u.a. (Ko-)Autor von „Geschichten vom Scrum“ (dpunkt), „Neue Geschichten vom Scrum“ (dpunkt), „Scrum – kurz & gut“ (O’Reilly) und „Management Y“ (Campus). Markus Trbojevic ist ausgebildeter Fachinformatiker und hat Softwareentwicklung von der Pike auf gelernt. Er macht die Projektwelt insbesondere für Teams, aber auch für deren Kunden, jeden Tag ein bisschen besser. Als Coach für seine Teams ist es sein Ziel, sich selbst so weit wie möglich überflüssig zu machen.
Python for Cybersecurity
DISCOVER AN UP-TO-DATE AND AUTHORITATIVE EXPLORATION OF PYTHON CYBERSECURITY STRATEGIESPython For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including:* Reconnaissance, resource development, initial access, and execution* Persistence, privilege escalation, defense evasion, and credential access* Discovery, lateral movement, collection, and command and control* Exfiltration and impactEach chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, Python For Cybersecurity offers in-depth information about a wide variety of attacks and effective, Python-based defenses against them.HOWARD E. POSTON III is a freelance consultant and content creator with a professional focus on blockchain and cybersecurity. He has over ten years’ experience in programming with Python and has developed and taught over a dozen courses teaching cybersecurity. He is a sought-after speaker on blockchain and cybersecurity at international security conferences. Introduction xviiCHAPTER 1 FULFILLING PRE- ATT&CK OBJECTIVES 1Active Scanning 2Scanning Networks with scapy 2Implementing a SYN Scan in scapy 4Performing a DNS Scan in scapy 5Running the Code 5Network Scanning for Defenders 6Monitoring Traffic with scapy 7Building Deceptive Responses 8Running the Code 9Search Open Technical Databases 9Offensive DNS Exploration 10Searching DNS Records 11Performing a DNS Lookup 12Reverse DNS Lookup 12Running the Code 13DNS Exploration for Defenders 13Handling DNS Requests 15Building a DNS Response 15Running the Code 16Summary 17Suggested Exercises 17CHAPTER 2 GAINING INITIAL ACCESS 19Valid Accounts 20Discovering Default Accounts 20Accessing a List of Default Credentials 21Starting SSH Connections in Python 22Performing Telnet Queries in Python 23Running the Code 24Account Monitoring for Defenders 24INTRODUCTION TO WINDOWS EVENT LOGS 25Accessing Event Logs in Python 28Detecting Failed Logon Attempts 28Identifying Unauthorized Access to Default Accounts 30Running the Code 30Replication Through Removable Media 31Exploiting Autorun 31Converting Python Scripts to Windows Executables 32Generating an Autorun File 33Setting Up the Removable Media 34Running the Code 34Detecting Autorun Scripts 34Identifying Removable Drives 35Finding Autorun Scripts 36Detecting Autorun Processes 36Running the Code 36Summary 37Suggested Exercises 37CHAPTER 3 ACHIEVING CODE EXECUTION 39Windows Management Instrumentation 40Executing Code with WMI 40Creating Processes with WMI 41Launching Processes with PowerShell 41Running the Code 42WMI Event Monitoring for Defenders 42WMI in Windows Event Logs 43Accessing WMI Event Logs in Python 45Processing Event Log XML Data 45Running the Code 46Scheduled Task/Job 47Scheduling Malicious Tasks 47Checking for Scheduled Tasks 48Scheduling a Malicious Task 48Running the Code 49Task Scheduling for Defenders 50Querying Scheduled Tasks 51Identifying Suspicious Tasks 52Running the Code 52Summary 53Suggested Exercises 53CHAPTER 4 MAINTAINING PERSISTENCE 55Boot or Logon Autostart Execution 56Exploiting Registry Autorun 56The Windows Registry and Autorun Keys 57Modifying Autorun Keys with Python 60Running the Code 61Registry Monitoring for Defenders 62Querying Windows Registry Keys 63Searching the HKU Hive 64Running the Code 64Hijack Execution Flow 65Modifying the Windows Path 65Accessing the Windows Path 66Modifying the Path 67Running the Code 68Path Management for Defenders 69Detecting Path Modification via Timestamps 69Enabling Audit Events 71Monitoring Audit Logs 73Running the Code 75Summary 76Suggested Exercises 76CHAPTER 5 PERFORMING PRIVILEGE ESCALATION 77Boot or Logon Initialization Scripts 78Creating Malicious Logon Scripts 78Achieving Privilege Escalation with Logon Scripts 79Creating a Logon Script 79Running the Code 79Searching for Logon Scripts 80Identifying Autorun Keys 81Running the Code 81Hijack Execution Flow 81Injecting Malicious Python Libraries 82How Python Finds Libraries 82Creating a Python Library 83Running the Code 83Detecting Suspicious Python Libraries 83Identifying Imports 85Detecting Duplicates 85Running the Code 86Summary 86Suggested Exercises 87CHAPTER 6 EVADING DEFENSES 89Impair Defenses 90Disabling Antivirus 90Disabling Antivirus Autorun 90Terminating Processes 93Creating Decoy Antivirus Processes 94Catching Signals 95Running the Code 95Hide Artifacts 95Concealing Files in Alternate Data Streams 96Exploring Alternate Data Streams 96Alternate Data Streams in Python 97Running the Code 98Detecting Alternate Data Streams 98Walking a Directory with Python 99Using PowerShell to Detect ADS 100Parsing PowerShell Output 101Running the Code 102Summary 102Suggested Exercises 103CHAPTER 7 ACCESSING CREDENTIALS 105Credentials from Password Stores 106Dumping Credentials from Web Browsers 106Accessing the Chrome Master Key 108Querying the Chrome Login Data Database 108Parsing Output and Decrypting Passwords 109Running the Code 109Monitoring Chrome Passwords 110Enabling File Auditing 110Detecting Local State Access Attempts 111Running the Code 113Network Sniffing 114Sniffing Passwords with scapy 114Port- Based Protocol Identification 116Sniffing FTP Passwords 116Extracting SMTP Passwords 117Tracking Telnet Authentication State 119Running the Code 121Creating Deceptive Network Connections 121Creating Decoy Connections 122Running the Code 122Summary 123Suggested Exercises 123CHAPTER 8 PERFORMING DISCOVERY 125Account Discovery 126Collecting User Account Data 126Identifying Administrator Accounts 127Collecting User Account Information 128Accessing Windows Password Policies 128Running the Code 129Monitoring User Accounts 130Monitoring Last Login Times 130Monitoring Administrator Login Attempts 131Running the Code 132File and Directory Discovery 133Identifying Valuable Files and Folders 133Regular Expressions for Data Discovery 135Parsing Different File Formats 135Running the Code 136Creating Honeypot Files and Folders 136Monitoring Decoy Content 136Creating the Decoy Content 137Running the Code 138Summary 138Suggested Exercises 139CHAPTER 9 MOVING LATERALLY 141Remote Services 142Exploiting Windows Admin Shares 142Enabling Full Access to Administrative Shares 143Transferring Files via Administrative Shares 144Executing Commands on Administrative Shares 144Running the Code 144Admin Share Management for Defenders 145Monitoring File Operations 146Detecting Authentication Attempts 147Running the Code 148Use Alternative Authentication Material 148Collecting Web Session Cookies 149Accessing Web Session Cookies 150Running the Code 150Creating Deceptive Web Session Cookies 151Creating Decoy Cookies 151Monitoring Decoy Cookie Usage 153Running the Code 153Summary 154Suggested Exercises 155CHAPTER 10 COLLECTING INTELLIGENCE 157Clipboard Data 158Collecting Data from the Clipboard 158Accessing the Windows Clipboard 159Replacing Clipboard Data 159Running the Code 160Clipboard Management for Defenders 160Monitoring the Clipboard 161Processing Clipboard Messages 161Identifying the Clipboard Owner 161Running the Code 162Email Collection 162Collecting Local Email Data 162Accessing Local Email Caches 163Running the Code 163Protecting Against Email Collection 164Identifying Email Caches 165Searching Archive Files 165Running the Code 166Summary 166Suggested Exercises 166CHAPTER 11 IMPLEMENTING COMMAND AND CONTROL 169Encrypted Channel 170Command and Control Over Encrypted Channels 170Encrypted Channel Client 171Encrypted Channel Server 172Running the Code 173Detecting Encrypted C2 Channels 174Performing Entropy Calculations 175Detecting Encrypted Traffic 175Running the Code 176Protocol Tunneling 176Command and Control via Protocol Tunneling 176Protocol Tunneling Client 177Protocol Tunneling Server 177Running the Code 179Detecting Protocol Tunneling 179Extracting Field Data 181Identifying Encoded Data 181Running the Code 181Summary 182Suggested Exercises 182CHAPTER 12 EXFILTRATING DATA 183Alternative Protocols 184Data Exfiltration Over Alternative Protocols 184Alternative Protocol Client 185Alternative Protocol Server 186Running the Code 188Detecting Alternative Protocols 189Detecting Embedded Data 190Running the Code 191Non- Application Layer Protocols 191Data Exfiltration via Non- Application Layer Protocols 192Non- Application Layer Client 193Non- Application Layer Server 193Running the Code 194Detecting Non- Application Layer Exfiltration 195Identifying Anomalous Type and Code Values 196Running the Code 196Summary 197Suggested Exercises 197CHAPTER 13 ACHIEVING IMPACT 199Data Encrypted for Impact 200Encrypting Data for Impact 200Identifying Files to Encrypt 201Encrypting and Decrypting Files 202Running the Code 202Detecting File Encryption 203Finding Files of Interest 204Calculating File Entropies 204Running the Code 205Account Access Removal 205Removing Access to User Accounts 205Changing Windows Passwords 207Changing Linux Passwords 207Running the Code 207Detecting Account Access Removal 208Detecting Password Changes in Windows 209Detecting Password Changes in Linux 210Running the Code 211Summary 211Suggested Exercises 212Index 213
Der Weg zum Python-Profi
Ein Best-Practice-Buch für sauberes Programmieren. Der Brückenschlag zu einer anderen Ebene der Python-Programmierung.Sie haben ein grundlegendes Python-Programmiertutorial absolviert oder bereits erste Erfahrungen im Programmieren. Was ist der nächste Schritt auf dem Weg zur fähigen, kompetenten Softwareentwickler:in? Der Weg zum Python Profi ist mehr als eine bloße Sammlung meisterhafter Tipps für das Schreiben von sauberem Code. Es zeigt Ihnen, wie Sie die Kommandozeile bedienen und andere professionelle Tools wie Code-Formatierer, Type Checkers, Linters und Versionskontrolle verwenden können. Al Sweigart führt Sie durch bewährte Praktiken für die Einrichtung Ihrer Entwicklungsumgebung, die Benennung von Variablen und die Verbesserung der Lesbarkeit und geht dann auf Dokumentation, Organisation, Leistungsmessung, objektorientiertes Design und sogar Big-O-Algorithmus-Analyse ein. Die Hinweise und Anleitungen des Buchs werden Ihre Programmierfähigkeiten deutlich verbessern - nicht nur in Python, sondern in jeder Sprache.Sie werden lernen:wie Sie Pythons automatisches Formatierungswerkzeug Black für sauberen Code verwendenwie Sie häufige Fehlerquellen erkennen und sie mit Static analyzers aufspürenwie Sie die Dateien in Ihren Code-Projekten mit dem Cookiecutter-Template-Tool strukturierenerschließen Sie sich funktionale Programmiertechniken wie Lambda- und Funktionen höherer Ordnungwie Sie die Geschwindigkeit Ihres Codes mit den in Python integrierten Modulen timeit und cProfile verbessern könnenwie Sie Ihre Kommentare und Dokumentationsstrings informativ gestalten und wie oft Sie sie schreiben solltenAutor: Al Sweigart arbeitet als Softwareentwickler und bringt Jugendlichen und Erwachsenen das Programmieren bei. Er ist Autor mehrerer Bücher für Einsteiger, u.a. „Eigene Spiele programmieren mit Python“.
Blender 3
Das umfassende Handbuch. Blender verstehen und anwenden – aktuell zum großen Update 3!Das große Handbuch zu allen wichtigen Funktionen von Blender 3. Dieses Buch bietet einen soliden Einstieg in die 3D-Software und in die Grundlagen des 3D-Designs. Aber es geht noch weiter: Es begleitet Sie vom Modelling über Texturing und Shading, die Beleuchtung, Rigging und Animation bis hin zu Simulation, Rendering und Postproduktion. In Schritt-für-Schritt-Anleitungen konstruieren, texturieren und animieren Sie Ihre eigenen 3D-Objekte und setzen das Gelernte direkt in die Praxis um. Das verlässliche Lern- und Nachschlagewerk für alle Anwender! Aus dem Inhalt: Arbeitsoberfläche, Navigation und ObjekteModelling und SculptingShading, Texturing und MappingLichtquellen, Kameras und TrackingAnimationen mit Keyframes, Pfaden und DrivernPartikelsysteme, Haare und KollisionenRauch, Feuer und FlüssigkeitenDie neuen Geometry Nodes2D-Animationen mit Grease PencilRendering mit Eevee und CyclesCompositing, Schnitt und TonImport und Export Leseprobe (PDF-Link)Autor: Andreas Asanger ist als technischer Redakteur und Medienentwickler in den Bereichen Grafik, Visualisierung und 3D-Animation tätig.
Microsoft Windows Server 2022 - Das Handbuch
Das Standardwerk zur neuen Version: praxisnah und kompetent Diese komplett überarbeitete und aktualisierte Auflage des Klassikers zu Windows Server gibt Ihnen einen tiefgehenden Einblick in den praktischen Einsatz von Windows Server 2022. Das Buch richtet sich sowohl an Neueinsteiger:innen in Microsoft-Servertechnologien als auch an Umsteiger:innen von Vorgängerversionen. Planung und Migration, Konzepte und Werkzeuge der Administration sowie die wichtigsten Konfigurations- und Verwaltungsfragen werden praxisnah behandelt. Alle wichtigen Funktionen werden ausführlich vorgestellt, ebenso die effiziente Zusammenarbeit mit Windows 10-Clients. Es erwarten Sie mehr als 1.000 Seiten praxisnahes und kompetentes Insiderwissen mit vielen hilfreichen Anleitungen und Profitipps.Aus dem Inhalt: Alle Neuerungen von Windows Server 2022 und Änderungen im Vergleich zu Windows Server 2019Lizenzierung und Installation Secured Core Server, Secure DNS und weitere Sicherheitsneuerungen in der PraxisLokale Rechenzentren an Microsoft Azure anbindenBetreiben und Erweitern von Active DirectoryVerwaltung mit dem Windows Admin CenterHochverfügbarkeit und LastenausgleichWindows Server Update Services (WSUS)Diagnose und Überwachung für System, Prozesse und DiensteWindows Server Container, Docker und Hyper-V-ContainerVirtualisierung mit Hyper-VFehlerbehebung Leseprobe (PDF-Link)Autor: Thomas Joos ist selbstständiger IT-Consultant und seit 20 Jahren in der IT-Branche tätig. Er schreibt Fachbücher und berät Unternehmen im Mittelstandsund Enterprise-Bereich in den Themenfeldern Active Directory, Exchange Server und IT-Sicherheit. Durch seinen praxisorientierten und verständlichen Schreibstil sind seine Fachbücher für viele IT-Spezialisten eine wichtige Informationsquelle geworden. Seinen Blog finden Sie auf http://thomasjoos.wordpress.com. Neben vielen erfolgreichen Büchern schreibt er für zahlreiche IT-Publikationen wie z.B. c’t, iX, ITAdministrator und tecchannel.de.Zielgruppe: Administrator*innen
Beginning Scala 3
Learn the latest version of Scala through simple, practical examples. This book introduces you to the Scala programming language, its object-oriented and functional programming characteristics, and then guides you through Scala constructs and libraries that allow you to assemble small components into high-performance, scalable systems.Beginning Scala 3 explores new Scala 3 language features such as Top-level declarations, Creator applications, Extension methods to add extra functionality to existing types, and Enums. You will also learn new ways to manipulate types via Union types, intersection, literal, and opaque type aliases. Additionally, you’ll see how Implicits are replaced by given and using clauses.After reading this book, you will understand why Scala is judiciously used for critical business applications by leading companies such as Twitter, LinkedIn, Foursquare, the Guardian, Morgan Stanley, Credit Suisse, UBS, and HSBC – and you will be able to use it in your own projects.WHAT YOU WILL LEARN* Get started with Scala 3 or Scala language programming in general* Understand how to utilitze OOP in Scala* Perform functional programming in Scala* Master the use of Scala collections, traits and implicits* Leverage Java and Scala interopability* Employ Scala for DSL programming* Use patterns and best practices in ScalaWHO THIS BOOK IS FORThose with a background in Java and/or Kotlin who are new to Scala. This book is also for those with some prior Scala experience who want to learn Scala version 3.DAVID POLLAK has been writing commercial software since 1977. He wrote the award-winning Mesa spreadsheet, which in 1992 was the first real-time spreadsheet. Wall Street companies traded billions of dollars a day through Mesa. In 1996, David sold his company to CMP Media and became CTO of CMP Media's NetGuide Live and was one of the first large-scale users of Java and WebLogic to power an Internet site. In 1998, David released Integer, the world's first browser-accessible, multiuser spreadsheet. Since 2000, David has been consulting for companies including Hewlett-Packard, Pretzel Logic/WebGain, BankServ, Twitter, and SAP. David has been using Scala since 2006 and is the lead developer of the Lift Web framework.VISHAL LAYKA is the chief technology officer of Star Protocol. He is involved in the architecture, design, and implementation of distributed business systems, and his focus is on consulting and training with the JVM languages. His language proficiencies include Java, Groovy, Scala, and Haskell. Vishal is also the lead author of Beginning Groovy, Grails, and Griffon (Apress, 2012). When he needs a break from technology, Vishal reads eclectically from calculus to star formation.ANDRES SACCO has been a professional developer since 2007, working with a variety of languages, including Java, Scala, PHP, NodeJs, and Kotlin. Most of his background is in Java and the libraries or frameworks associated with it, but since 2016, he has utilized Scala as well, depending on the situation. He is focused on researching new technologies to improve the performance, stability, and quality of the applications he develops.BEGINNING SCALA 3 (3E)1. Getting started with Scala2. Basics of Scala3. OOP in Scala4. Functional programming in Scala5. Pattern matching6. Scala Collections7. Traits8. Types and Implicits9. Scala and Java Interoperability10. SBT11. Building web applications with Scala12. DSL13. Scala Best practices
Learn JavaFX 17
This unique in-depth tutorial shows you how to start developing rich-client desktop applications using your Java skills and provides comprehensive coverage of JavaFX 17's features. Each chapter starts with an introduction to the topic at hand, followed by a step-by-step discussion of the topic with small snippets of code. The book contains numerous figures aiding readers in visualizing the GUI that is built at every step in the discussion. This book has been revised to include JavaFX 17 and earlier releases since previous edition.It starts with an introduction to JavaFX and its history. It lists the system requirements and the steps to start developing JavaFX applications. It shows you how to create a Hello World application in JavaFX, explaining every line of code in the process. Later in the book, authors Kishori Sharan and Peter Späth discuss advanced topics such as 2D and 3D graphics, charts, FXML, advanced controls, and printing. Some of the advanced controls such as TableView, and WebView are covered at length in separate chapters.This book provides complete and comprehensive coverage of JavaFX 17 features; uses an incremental approach to teach JavaFX, assuming no prior GUI knowledge; includes code snippets, complete programs, and pictures; covers MVC patterns using JavaFX; and covers advanced topics such as FXML, effects, transformations, charts, images, canvas, audio and video, DnD, and more. So, after reading and using this book, you'll come away with a comprehensive introduction to the JavaFX APIs.WHAT YOU WILL LEARN* How to build JavaFX User Interfaces and Java clients* What are properties, bindings, observable collections, stages, scenes; how to use these* How to play with colors, styling nodes and event handling* How to add user interactivity (mouse, keyboard, DnD)* How to do tables, trees and tree tables* How to do 2D shapes, text nodes, 3D shapes* How to apply effects, transformations, animations, images* How to draw; play audio and videoWHO IS THIS BOOK FOR:Developers new to the JavaFX platform. Some prior Java experience is recommended.KISHORI SHARAN has earned a Master of Science in Computer Information Systems degree from Troy State University, Alabama. He is a Sun Certified Java 2 programmer. He has vast experience in providing training to professional developers in Java, JSP, EJB, and Web technology. He possesses over ten years of experience in implementing enterprise level Java application.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects. In 2016, he decided to concentrate on writing books on various aspects, but with a main focus on software development. With two books about graphics and sound processing, three books on Android app development, and a beginner’s book on Jakarta EE development, the author continues his effort in writing software development-related literature.Chapter 1. Getting Started with JavaFXChapter 2. Properties and BindingsChapter 3. Observable CollectionsChapter 4. Managing StagesChapter 5. Making ScenesChapter 6. Understanding NodesChapter 7. Playing with ColorsChapter 8. Styling NodesChapter 9. Event HandlingChapter 10. Understanding Layout PanesChapter 11. Model-View-Controller PatternChapter 12. Understanding ControlsChapter 13. Understanding TableViewChapter 14. Understanding TreeViewChapter 15. Understanding TreeTableViewChapter 16. Browsing Web PagesChapter 17. Understanding 2D ShapesChapter 18. Understanding Text NodesChapter 19. Understanding 3D ShapesChapter 20. Applying EffectsChapter 21. Understanding TransformationsChapter 22. Understanding AnimationChapter 24. Understanding ImagesChapter 25. Drawing on a CanvasChapter 26. Understanding Drag-and-DropChapter 27. Understanding Concurrency in JavaFXChapter 28. Playing Audios and VideosChapter 29. Understanding FXMLChapter 30. Printing
Excel Power Pivot & Power Query For Dummies
LEARN TO CRUNCH HUGE AMOUNTS OF DATA WITH POWERPIVOT AND POWER QUERYDo you have a ton of data you need to make sense of? Microsoft’s Excel program can handle amazingly large data sets, but you’ll need to get familiar with PowerPivot and Power Query to get started. And that’s where Dummies comes in. With step-by-step instructions—accompanied by ample screenshots—Excel PowerPivot & Power Query For Dummies will teach you how to save time, simplify your processes, and enhance your data analysis and reporting. Use Power Query to discover, connect to, and import your organization’s data. Then use PowerPivot to model it in Excel. You’ll also learn to:* Make use of databases to store large amounts of data* Use custom functions to extend and enhance Power Query* Add the functionality of formulas to PowerPivot and publish data to SharePointIf you’re expected to wrangle, interpret, and report on large amounts of data, Excel PowerPivot & Power Query For Dummies gives you the tools you need to get up to speed quickly. MICHAEL ALEXANDER is a senior consultant at Slalom Consulting with more than 15 years’ experience in data management and reporting. He is the author of more than a dozen books on business analysis using Microsoft Excel and has been named Microsoft Excel MVP for his contributions to the Excel community.INTRODUCTION1About This Book 2Foolish Assumptions 3Icons Used in This Book 3Beyond the Book 4Where to Go from Here 4PART 1: SUPERCHARGED REPORTING WITH POWER PIVOT 5CHAPTER 1: THINKING LIKE A DATABASE 7Exploring the Limits of Excel and How Databases Help 7Scalability 8Transparency of analytical processes 9Separation of data and presentation 10Getting to Know Database Terminology 11Databases 11Tables 11Records, fields, and values 12Queries 13Understanding Relationships 13CHAPTER 2: INTRODUCING POWER PIVOT 17Understanding the Power Pivot Internal Data Model 18Linking Excel Tables to Power Pivot 20Preparing Excel tables 21Adding Excel Tables to the data model 22Creating relationships between Power Pivot tables 24Managing existing relationships 26Using the Power Pivot data model in reporting 27CHAPTER 3: THE PIVOTAL PIVOT TABLE 29Introducing the Pivot Table 30Defining the Four Areas of a Pivot Table 30Values area 30Row area 31Column area 31Filter area 32Creating Your First Pivot Table 33Changing and rearranging a pivot table 36Adding a report filter 37Keeping the pivot table fresh 38Customizing Pivot Table Reports 40Changing the pivot table layout 40Customizing field names 41Applying numeric formats to data fields 42Changing summary calculations 43Suppressing subtotals 44Showing and hiding data items 47Hiding or showing items without data 49Sorting the pivot table 51Understanding Slicers 52Creating a Standard Slicer 54Getting Fancy with Slicer Customizations 56Size and placement 56Data item columns 57Miscellaneous slicer settings 58Controlling Multiple Pivot Tables with One Slicer 58Creating a Timeline Slicer 59CHAPTER 4: USING EXTERNAL DATA WITH POWER PIVOT 63Loading Data from Relational Databases 64Loading data from SQL Server 64Loading data from Microsoft Access databases 70Loading data from other relational database systems 72Loading Data from Flat Files 75Loading data from external Excel files 76Loading data from text files 78Loading data from the Clipboard 81Loading Data from Other Data Sources 82Refreshing and Managing External Data Connections 83Manually refreshing Power Pivot data 83Setting up automatic refreshing 84Preventing Refresh All 85Editing the data connection 86CHAPTER 5: WORKING DIRECTLY WITH THE INTERNAL DATA MODEL 89Directly Feeding the Internal Data Model 89Managing Relationships in the Internal Data Model 95Managing Queries and Connections 96Creating a New Pivot Table Using the Internal Data Model 97Filling the Internal Data Model with Multiple External Data Tables 98CHAPTER 6: ADDING FORMULAS TO POWER PIVOT 103Enhancing Power Pivot Data with Calculated Columns 103Creating your first calculated column 104Formatting calculated columns 105Referencing calculated columns in other calculations 106Hiding calculated columns from end users 107Utilizing DAX to Create Calculated Columns 108Identifying DAX functions that are safe for calculated columns 108Building DAX-driven calculated columns 110Month sorting in Power Pivot–driven pivot tables 112Referencing fields from other tables 113Nesting functions 115Understanding Calculated Measures 116Creating a calculated measure 116Editing and deleting calculated measures 118Free Your Data with Cube Functions 119CHAPTER 7: DIVING INTO DAX 121DAX Language Fundamentals 121Using DAX operators 125Applying conditional logic in DAX 126Working with DAX aggregate functions 128Exploring iterator functions and row context 129Understanding Filter Context 133Getting context transitions with the CALCULATE function 135Adding flexibility with the FILTER function 137PART 2: WRANGLING DATA WITH POWER QUERY 141CHAPTER 8: INTRODUCING POWER QUERY 143Power Query Basics 144Starting the query 144Understanding query steps 150Refreshing Power Query data 152Managing existing queries 153Understanding Column-Level Actions 155Understanding Table Actions 157CHAPTER 9: POWER QUERY CONNECTION TYPES 159Importing Data from Files 160Getting data from Excel workbooks 160Getting data from CSV and text files 161Getting data from PDF files 163Getting data from folders 164Importing Data from Database Systems 165A connection for every database type 165Getting data from other data systems 167Walk-through: Getting data from a database 168Managing Data Source Settings 170Data Profiling with Power Query 171Data Profiling options 172Data Profiling quick actions 173CHAPTER 10: TRANSFORMING YOUR WAY TO BETTER DATA 175Completing Common Transformation Tasks 176Removing duplicate records 176Filling in blank fields 178Concatenating columns 179Changing case 181Finding and replacing specific text 181Trimming and cleaning text 183Extracting the left, right, and middle values 184Splitting columns using character markers 187Pivoting and unpivoting fields 189Creating Custom Columns 193Concatenating with a custom column 195Understanding data type conversions 196Spicing up custom columns with functions 197Adding conditional logic to custom columns 199Grouping and Aggregating Data 201Working with Custom Data Types 203CHAPTER 11: MAKING QUERIES WORK TOGETHER 207Reusing Query Steps 208Understanding the Append Feature 211Creating the needed base queries 212Appending the data 213Understanding the Merge Feature 216Understanding Power Query joins 216Merging queries 217Understanding Fuzzy Match 221CHAPTER 12: EXTENDING POWER QUERY WITH CUSTOM FUNCTIONS 225Creating and Using a Basic Custom Function 225Creating a Function to Merge Data from Multiple Excel Files 229Creating Parameter Queries 236Preparing for a parameter query 236Creating the base query 238Creating the parameter query 239PART 3: THE PART OF TENS 243CHAPTER 13: TEN WAYS TO IMPROVE POWER PIVOT PERFORMANCE 245Limit the Number of Rows and Columns in Your Data Model Tables 246Use Views Instead of Tables 246Avoid Multi-Level Relationships 246Let the Back-End Database Servers Do the Crunching 247Beware of Columns with Many Unique Values 248Limit the Number of Slicers in a Report 248Create Slicers Only on Dimension Fields 249Disable the Cross-Filter Behavior for Certain Slicers 250Use Calculated Measures Instead of Calculated Columns 250Upgrade to 64-Bit Excel 251CHAPTER 14: TEN TIPS FOR WORKING WITH POWER QUERY 253Getting Quick Information from the Queries & Connections Pane 253Organizing Queries in Groups 254Selecting Columns in Queries Faster 255Renaming Query Steps 256Quickly Creating Reference Tables 257Viewing Query Dependencies 258Setting a Default Load Behavior 259Preventing Automatic Data Type Changes 259Disabling Privacy Settings to Improve Performance 261Disabling Relationship Detection 261Index 263