Computer und IT
Design für junge Designer*innen
Du malst, kritzelst und schnibbelst den ganzen Tag? Auf deinem ipad und Smartphone ist die Zeichenapp immer geöffnet? Du möchtest auch so kreativ sein wie deine Freundinnen und Freunde? Dann lass dir dieses Buch schenken, denn es ist genau für dich gemacht. Hier findest du viele Kreativideen zum Nachmachen und tolle Tipps und Tricks. Und was auch cool ist: wie nebenher lernst du die Tricks der Profis kennen: welche Farben lassen sich gut kombinieren, wie malst du richtig in der Perspektive oder wie gestaltest du am Tablet einen echt guten Flyer? Mit diesem Buch gestaltest du immer besser, ohne es groß zu merken. Also los, Lieblingsstifte und Papier oder Tablet raus und los geht es in deiner Kreativ-Werkstatt! Aus dem Inhalt: Design ist überall: Beispiele für Kreativität im AlltagZum Einstieg: Moodboards gestalten, Überblick über Materialien und ZubehörDeine Mal- und Zeichen-Schule: Übung "Kleine Krakelvögel", Symbole für deine Notizen, Zeichnen mit den Grundformen, Schraffuren und Muster, Licht und Schatten, Perspektivisch zeichnenDigitales Gestalten mit dem iPad und Procreate, mit dem Computer und dem Smartphone, Einführung in kostenlose Software, coole AppsZeichne einfache Figuren, z. B. einen Fuchs, und dein eigenes LogoFarben geschickt auswählenComics zeichnen, ein kreatives Bullet Journal anlegenKreativ werden mit den eigenen FotosDeine Handlettering-Werkstatt: Aufwärmen, Schrift mit Verzierungen, Schmuckelemente, Übung: Eine Einladungskarte lettern, BrushletteringDeine Grafikdesign-Werkstatt: Hintergrundwissen, Plakate gestalten, Formen geschickt einsetzen, Übungen: Flyer und PlakateGroße Gestaltungsaufgaben: Erstelle deine eigene Schülerzeichnung u. v. m.Mode-Illustration für Kids: Haare und Kleidung malen, Zeichen-Tricks Herzlich willkommen ... 10 So funktioniert dieses Buch ... 11 1. Design ist überall ... 12 Wir lieben Design ... 14 Alle Menschen lieben Bilder ... 15 Gestalten -- das kannst du auch! ... 16 ÜBUNG: Gestalte ein Moodboard für deine Ideensammlung ... 016 Stifte für alle Stile ... 20 Material und Zubehör ... 22 Digitale Apps und Tools ... 24 2. Deine Mal- und Zeichen-Werkstatt ... 28 Jede*r ist kreativ ... 30 ÜBUNG: Kleine Krakelvögel ... 31 Alles zeichnen mit fünf Grundformen ... 32 ÜBUNG: Symbole für deine Notizen ... 34 Schraffuren und Muster ... 36 Licht und Schatten ... 38 ÜBUNG: Zeichne eine eigene Figur ... 40 Farben für deine Designs ... 44 Farben auswählen ... 46 ÜBUNG: Male dein Lieblingstier in Farbe ... 50 ÜBUNG: Zeichne dein eigenes Logo ... 55 ÜBUNG: Für Profis: Zentralperspektive ... 58 Für Profis: Von Vögeln, Fröschen und der Normalperspektive ... 61 3. Deine Handlettering-Werkstatt ... 62 Grundlagen für dein Handlettering ... 64 ÜBUNG: Muster und Formen zum Aufwärmen ... 66 ÜBUNG: Buchstaben zeichnen ... 68 Buchstaben verändern durch die Strichdicke ... 70 ÜBUNG: Dein Name als Handlettering ... 71 Gib deinen Buchstaben eine schöne Form ... 73 ÜBUNG: Buchstabenform variieren ... 74 Schrift mit Verzierungen ... 76 ÜBUNG: Brushlettering: Schreiben wie mit einem Pinsel ... 78 ÜBUNG: Buchstaben mit dem Brushpen zeichnen ... 80 Schmuckelemente für dein Handlettering ... 82 ÜBUNG: Eine Einladungskarte ... 84 4. Deine Bullet-Journal-Werkstatt ... 88 Was ist ein Bullet Journal? ... 90 Leg dir ein eigenes Bullet Journal an ... 92 ÜBUNG: Deine Woche im Bullet Journal ... 94 Passende Gestaltungselemente ... 99 ÜBUNG: Mit einem Bullet Journal durch den (Schul-)Alltag ... 101 ÜBUNG: Digitale Bullet Journals ... 104 5. Deine Grafikdesign-Werkstatt ... 108 Sechs Gestaltungstipps für deine Designs ... 110 ÜBUNG: Gestalte ein interessantes Plakat ... 114 Jetzt kommt Farbe in deine Designs! ... 118 ÜBUNG: Farben aus einem Foto aussuchen ... 120 Mit dem Farbklima Wirkung erzeugen ... 122 ÜBUNG: Erstelle einen Flyer am Tablet oder Computer ... 130 Schriften mit Charakter für deine Texte ... 126 Layouten wie ein Profi: Das Raster ... 137 ÜBUNG: Ein Gestaltungsraster für die Schülerzeitung ... 138 Layouten wie ein Profi: Das Raster ... 137 ÜBUNG: Ein Gestaltungsraster für die Schülerzeitung ... 138 6. Deine Comic-Werkstatt ... 146 Comic-Grundlagen ... 148 Ein Comic entsteht: deine Story ... 149 Der Bildausschnitt ... 151 Deine Zeichnungen ... 152 Der Text für deinen Comic ... 153 Farben für deinen Comic ... 155 Figuren für deine Comics ... 156 ÜBUNG: Strich für Strich zur Comicfigur ... 157 Deine Heldenreise: So schreibst du eine spannende Story ... 161 ÜBUNG: Schreibe und zeichne deinen eigenen Comic ... 165 7. Deine Modedesign-Werkstatt ... 166 Figuren im Modedesign ... 168 ÜBUNG: Körperproportionen leicht gemacht ... 169 ÜBUNG: Schnelle Modeskizzen ... 173 Kleidung und Stoffe ... 175 Gesichter zeichnen ... 179 ÜBUNG: Frisuren zeichnen ... 180 Accessoires und Schmuck ... 184 ÜBUNG: Schuhe zeichnen ... 185 ÜBUNG: Entwirf deine eigene Kollektion ... 187 8. Deine Foto- und Video-Werkstatt ... 190 Was brauchst du für ein gutes Foto? ... 192 So funktioniert eine professionelle Kamera ... 193 Fototipp 1: Erst überlegen, dann fotografieren ... 195 Fototipp 2: Wähle eine spannende Perspektive ... 197 ÜBUNG: Fototipp 3: Halte dich an die Drittelregel ... 200 Fototipp 4: Gutes Licht für deine Fotos ... 203 ÜBUNG: Eine Stunde mit deiner Kamera ... 205 Smartphone-Aufnahmen leicht gemacht ... 207 ÜBUNG: Eine Social-Media-Grafik mit deinen Fotos ... 210 Videos filmen ... 215 ÜBUNG: Dreh dein eigenes Video ... 219 Stichwortverzeichnis ... 220
Frei & kreativ
Eigentlich möchten Sie sich nur mit Ihrer kreativen Arbeit beschäftigen, aber dann stehen Sie plötzlich vor den organisatorischen Problemen? Businessplan, Akquise? Muss das sein? Welche Versicherung brauchen ich, welches Honorar kann ich überhaupt verlangen, wie organisiere ich meinen Alltag als Selbstständiger? Diese und viele andere dringende Fragen beantwortet dieses Buch. Knapp, konkret und topaktuell hilft es Ihnen durch den Verwaltungsdschungel, damit Sie den Kopf schnell wieder frei haben für die nächste kreative Idee. Aus dem Inhalt: Will ich das wirklich? Einstellung, mentale Ausrichtung und Ziele analysierenDas Geschäftsmodell: Wer will ich sein? Alleinstellungsmerkmale, ein eigenes Profil entwickeln, Businessplan, Finanzplan, Gründerzuschüsse, Kredite, Crowdfounding, RechtsformenDie Kunden: Für wen mache ich das? Einen Kundenstamm aufbauen, passende Kunden, Akquise, Follow-up, Netzwerken, TerminierungEigene Leistung kalkulieren Stundensatz kalkulieren, Angebot erstellen, Preisverhandlungen, Vorleistungen, AGBs, Rahmenverträge, RechnungenWie lege ich los? Auftragsphasen, Lasten- und Pflichtenheft, Zeitmanagement, Deep Work, Work-Life-Balance, Co-Working, Fortbildungen, UrlaubSteuern und Versicherungen Buchhaltung, Steuererklärung, Vorsorge, KSK, Zuschüsse, Designschutz, Werkverträge, DSGVOWer und was hilft mir? Tools und Werkzeuge Software, Kollaborationswerkzeuge, Zeittracking, die eigene Website, Werbematerial, Auftreten, CoachingBusiness stabilisieren und wachsen lassen Monitoring der Geschäftsprozesse, Kundenfeedback, Controlling, Reflexion, Mitarbeiter, Skalieren, ScheiternChecklisten zur Kosten-Stundenlohn-Berechnung, Versicherungen, Altersvorsorge, Akquise, Controlling Vorwort ... 17 1. Die Unternehmerpersönlichkeit: Warum Kreativität Freiheit braucht ... 19 1.1 ... Warum Selbstständigkeit attraktiv ist ... 19 1.2 ... Eigenschaften erfolgreicher Selbstständiger ... 22 1.3 ... Warum will ich das? ... 32 1.4 ... Die Einstellung erfolgreicher Selbstständiger ... 41 1.5 ... Fantasie und Realität: Mut zum optimistischen Realismus ... 47 1.6 ... Checkliste Selbstreflexion ... 51 2. Erste Schritte: Wie Ihr Unternehmen eine Form bekommt ... 53 2.1 ... Haupt- oder nebenberuflich selbstständig ... 53 2.2 ... Selbstständigkeit: Wichtige Vorbereitungen treffen ... 57 2.3 ... Scheinselbstständigkeit vermeiden ... 59 2.4 ... Einzelunternehmen oder Teamgründung ... 63 2.5 ... USP und Profil: Einzigartig durch den Markendschungel ... 66 2.6 ... Only you! Werden Sie eine echte Marke ... 76 3. Rechtsformen: Ein Unternehmen entsteht ... 87 3.1 ... Einzelunternehmer ... 88 3.2 ... Gesellschaft bürgerlichen Rechts (GbR) ... 95 3.3 ... Partnergesellschaft ... 97 3.4 ... Offene Handelsgesellschaft (OHG) ... 98 3.5 ... Kommanditgesellschaft (KG) ... 99 3.6 ... Gesellschaft mit beschränkter Haftung (GmbH) ... 100 3.7 ... Unternehmergesellschaft (haftungsbeschränkt, UG) ... 102 3.8 ... Holding ... 103 3.9 ... Purpose-Unternehmen ... 103 3.10 ... Checkliste für Ihre Unternehmensgründung ... 105 4. Businessplan und Finanzplan: Die Schatzkarte für Ihre Selbstständigkeit ... 107 4.1 ... Der Businessplan ... 107 4.2 ... Finanzplan -- Wie Sie Ihr Geld in den Griff bekommen ... 113 4.3 ... Checkliste Businessplan ... 123 5. Startkapital: Das nötige Kleingeld für die Gründung ... 125 5.1 ... Sparen Sie Geld für Ihren Start ... 125 5.2 ... Zuschüsse -- Die Selbstständigkeit anschieben ... 129 5.3 ... Unterstützung -- Wie andere Ihnen helfen können ... 138 6. Die Zielgruppe: Kunden finden und binden ... 141 6.1 ... Ihre Kunden -- die unbekannten Wesen ... 141 6.2 ... Akquise: Wie Sie aus Mitmenschen Kundschaft machen ... 148 6.3 ... Kundenpflege ... 158 6.4 ... Das soziale Netzwerk ... 161 7. Kalkulation und Preisverhandlung: Was bin ich wert? ... 171 7.1 ... Kalkulation: Weil Sie es sich wert sind! ... 172 7.2 ... Der Markt und seine Bedingungen: Was bin ich wirklich wert? ... 182 7.3 ... Angebote und KVA: Ich mach dir einen Kostenvoranschlag, den du nicht ablehnen kannst ... 187 7.4 ... Preisverhandlung: Wie Sie verdienen, was Sie verdienen ... 192 7.5 ... Arbeiten ohne Bezahlung: Für Ruhm und Ehre ... 199 7.6 ... Zahlungsverzug: Was tun, wenn der Kunde nicht zahlt? ... 202 8. Verträge, AGB und Abrechnung: Ernten, was Sie säen ... 205 8.1 ... Verträge und AGB ... 205 8.2 ... Abrechnung ... 210 9. Selbstorganisation: Wie lege ich los? ... 215 9.1 ... Projektmanagement: Der heilige Gral des organisierten Chaos ... 215 9.2 ... Workflow: Gute Arbeit in gelenkten Bahnen ... 223 9.3 ... Terminierung und Auftragsbuch ... 228 9.4 ... Zeitmanagement: Gut Ding braucht keine Weile ... 230 9.5 ... Deep Work -- Mach weniger, aber mach es besser! ... 237 9.6 ... Work-Life-Balance: Ausgeglichen arbeiten ... 241 9.7 ... Nein sagen ... 247 9.8 ... Arbeitsplatz -- Wo Ihre Kreativität zuhause ist ... 251 9.9 ... Urlaub und Auszeiten ... 258 9.10 ... Checkliste Arbeitsorganisation ... 261 10. Steuern, Versicherungen, Recht: Worauf muss ich achten? ... 263 10.1 ... Buchhaltung ... 263 10.2 ... Steuern ... 270 10.3 ... Versicherungen ... 280 10.4 ... KSK -- Die Künstlersozialkasse ... 289 10.5 ... Altersvorsorge ... 295 10.6 ... Zuschüsse und Verwertungsgesellschaften ... 306 10.7 ... Urheberrecht, Designschutz, Nutzungsrechte ... 308 10.8 ... DSGVO ... 315 11. Weiterkommen: Wer und was hilft mir? ... 321 11.1 ... Technische Helferlein: Software und Tools ... 321 11.2 ... Pitchen: Eine lange Geschichte kurz machen ... 327 11.3 ... Zeittracking: Wer hat an der Uhr gedreht? ... 331 11.4 ... Werbung und Werbematerial ... 334 11.5 ... Website ... 341 11.6 ... Image und Auftreten ... 347 11.7 ... Investitionen ... 352 11.8 ... Coaching und Beratung ... 356 12. Wachsen, gedeihen und noch besser werden: Wie halte ich den Laden am Laufen? ... 361 12.1 ... Reflexionen ... 361 12.2 ... Flauten überstehen ... 365 12.3 ... Kundenfeedback ... 370 12.4 ... Entspannung pur: Wie Sie mit Stress und Zeitdruck umgehen ... 375 12.5 ... So happy together: Langfristige Zusammenarbeit ... 379 12.6 ... Mitarbeiter und Unterstützerinnen ... 382 12.7 ... Scheitern ... 389 12.8 ... Checklisten ... 394 Index ... 399
Beginning jOOQ
Learn to use the jOOQ library to manage SQL database operations in Java and JVM applications. This book walks you through what JOOQ is, how to install and get started with it, and then gets you working with it.Practical examples and case studies demonstrate how jOOQ offers a more efficient and versatile alternative to Object-Relational Mapping frameworks like Hibernate and JPA, while providing a natural, native-SQL feeling for the developer. You'll see how to maximize the full potential of your SQL database with advanced query syntax and functions with this lightweight, SQL-friendly framework. Come see how you can use high performance approaches like reactive, data streaming and cloud-native programming to get data from SQL tables.Never write another incorrect SQL statement again and protect your application from SQL injection with the strong typing and inbuilt controls in jOOQ. Learn how to add jOOQ to your existing Hibernate, Spring Boot or Quarkus applications.When you’ve completed this book, you will be able to take the knowledge you’ve gained, along with the freely available source code, and directly apply them to your own work.WHAT YOU WILL LEARN* Comparing equivalent features between Hibernate, JPA and jOOQ* Unlock the power of your SQL database with high performing, flexible and typesafe SQL queries* Seamlessly work with many different SQL database vendors without changing your code* Effortlessly generate Java code based on the content of your database* Write reactive SQL database access code with R2DBC* Integrating jOOQ into popular frameworks and platforms like Hibernate, Spring boot and Quarkus tools like IDEs* Testing jOOQ-based code with modern integration testing frameworks like TestContainers and Docker* Learn how to safely handle data access code within frameworks like the Java Persistence API (JPA)WHO THIS BOOK IS FORIntermediate Java programmers new to jOOQ. Some prior experience with SQL may be helpful but not required.Tayo Koleoso is the Founder and CEO of LettuceWork.io, the platform dedicated to engineering culture. He created the Better Managed Development method for building and sustaining an effective product engineering culture. He's a lifelong learner, engineer, and engineering leader committed to building people and software in a healthy, sustainable, and effective ecosystem. Outside of tech, comedy is the only thing he consumes in large quantity. King of the Hill, Peep Show and 30 Rock are his comfort telly, I tell you what.He got his start in software engineering as a teenage database programmer with Oracle 8i. The jOOQ platform is therefore a natural fit and a return to his roots: his love affair with SQL.1. Welcome to jOOQ – Gives the reader a high-level overview of the jOOQ platform, the goals, features and a comparison with alternatives.• Database Operations in Java – the good parts• Database Operations in Java – the...not-good parts• You have got to be jOOQing• jOOQ Feature Tour2. Getting Started with jOOQ – Provides a crash course in core features of jOOQ• Setup jOOQ• CRUD with jOOQ◦ Lazy◦ Reactive• Transactions• Configuration• Exception Handling• Logging• Packaging and deployment◦ Maven◦ Gradle3. Working with jOOQ – This gives a guided tour of implementing specific features with jOOQ• Data Type Handling• Generating Artifacts• Advanced Database Manipulation◦ Batch Processing▪ Batch Loading▪ Batch Inserts• Advanced Query Syntax Support• SQL Joins• Database Functions• Stored Procedures4. jOOQ integrations - This shows the reader how jOOQ can be combined with specific tools, libraries and platforms• Java Persistence API• Hibernate• Spring Framework• Spring Data JPA5. Testing jOOQ – This will show the user how to execute unit and integration tests in jOOQ
Beginning Hibernate 6
Get started with Hibernate, an open source Java persistence layer and gain a clear introduction to the current standard for object-relational persistence in Java. This updated edition includes the new Hibernate 6.0 framework which covers new configuration, new object relational mapping changes, and enhanced integration with the more general Spring, Boot and Quarkus and other Java frameworks.The book keeps its focus on Hibernate without wasting time on nonessential third-party tools, so you’ll be able to immediately start building transaction-based engines and applications. Experienced authors Joseph Ottinger with Dave Minter and Jeff Linwood provide more in-depth examples than any other book for Hibernate beginners. They present their material in a lively, example-based manner—not a dry, theoretical, hard-to-read fashion.WHAT YOU'LL LEARN* Build enterprise Java-based transaction-type applications that access complex data with Hibernate* Work with Hibernate 6 using a present-day build process* Integrate into the persistence life cycle* Search and query with the new version of Hibernate* Keep track of versioned data with Hibernate EnversWHO THIS BOOK IS FORProgrammers experienced in Java with databases (the traditional, or connected, approach), but new to open-source, lightweight Hibernate.JOSEPH B. OTTINGER is an expert software developer, coder and programmer. He has also served as technology evangelist GigaSpaces and a principle engineer at Red Hat. He was Editor in Chief of TheServerSide-dot-com. He is the author of Hibernate Recipes and Beginning Hibernate for Apress and has authored other books as well as articles.JEFF LINWOOD has been involved in software programming since he had a 286 in high school. He got caught up with the Internet when he got access to a UNIX shell account, and it has been downhill ever since. Jeff has published articles on several Jakarta Apache open source projects in Dr. Dobb's Journal, CNET's Builder.com, and JavaWorld. Jeff also co-authored Professional Struts Applications, Building Portals with the Java Portlet API, and Pro Hibernate 3. He was a technical reviewer for Enterprise Java Development on a Budget and Extreme Programming with Ant.DAVE MINTER has adored computers since he was small enough to play in the boxes they came in. He built his first PC from discarded, faulty, and obsolete components, and considers that to be the foundation of his career as an integration consultant. Dave is based in London, where he helps large and small companies build systems that "just work." He co-authored Building Portals with the Java Portlet API and Pro Hibernate 3.* An Introduction to Hibernate 5* Integrating and Configuring Hibernate * Building a Simple Application * The Persistence Life Cycle * An Overview of Mapping * Mapping with Annotations * JPA Integration and Lifecycle Events* Using the Session * Searches and Queries * Advanced Queries Using Criteria * Filtering the Results of Searches * Leaving the Relational Database Behind: NoSQL* Hibernate Envers* Using with Spring and Boot Frameworks* Using with Quarkus/Other Frameworks
Modularizing Legacy Projects Using TDD
Improve current or new projects with top notch testability and maintainability. Writing tests improves the design of your apps, as it pushes you to have a more modularized design. This in turn improves the maintainability and sustainability of your apps. This book is for iOS developers who already know the basics of iOS and Swift development but want to learn all the testing pro features in iOS.You'll start by reviewing the TDD Cycle and how to implement these concepts on a legacy project or a new one. You'll then walk through TDD step-by-step on a blank project, including setting up test targets, assertions, and expectations. You'll follow that with all levels of testing such as unit tests, integration tests, and end-to-end tests, and also tackle fairly complex, yet badly written legacy code.The book will take you through the journey of modularizing a legacy app using TDD. Throughout this journey, you will be introduced to multiple testing concepts and techniques, like writing tests for network and core data layers. You will write tests to ensure the thread safety of your app. And you’ll add a new feature while you are in the middle of refactoring, which is an important skill so you can keep adding features while you are fixing your technical debt. By the end of this book, you will have all the tools needed to become a testing master.WHAT YOU'LL LEARN* Use mocking and dependency injection to make components more testable* Write tests for asynchronous code like network code* Add new features to existing legacy apps using TDDWHO THIS BOOK IS FORExperienced iOS developers who care about software quality and meeting customer expectations. Khaled El-MorabeaKhaled is an engineering manager at Instabug. He has been an iOS developer for more than 8 years and leading the iOS team for more than 3 years. In that time he has worked on several projects. During his time at Instabug, he has worked on multiple integral products, both as a developer and as a strategic engineering manager.Hassaan El-Garem Hassaan has been involved in the field of iOS Development for 5 years, during which he worked on multiple apps and projects. He has a passion for testing and for working on complex projects, while maintaining the highest level of quality. Following his passion for testing has led him to create a closed-source testing framework used for randomized stress testing.Chapter 1: IntroductionWhy write tests?Levels of testingOverview of TDDChapter 2: Your First TestBasics of testing in iOSXCTestCode ExamplesChapter 3: The Testing PyramidTesting Level ValuesDistributing tests along levelsChapter 4: TDD Deep DiveCore conceptsComplex examplesImplement projects from scratch with TDDChapter 5: Modularization for the WinIntroducing a legacy projectTransform with maintainabilityBreak up larger componentsApply TDD for modularizationChapter 5: Dependency Injection and MocksWrite tests for a componentDownsides of these techniquesDeciding when to applyChapter 6: Avoiding Threading NightmaresThreading issuesSimulate situationsDetermine which components need to have multithreading testsChapter 7: Testing Your Network LayerTesting network code cDifferences between sync and async codeTest network codeChapter 8: Taming CoreDataCore DataTesting Core Data layerChapter 9: Adding Features to Legacy AppsTesting concepts and techniquesAdd a feature to an existing applicationTDD and modularizationModify a tested and modularized projectChapter 10: Handling Production IssuesImprove the application qualityMake sure that similar problems don't happen againTools used to identify and keep track of bugs and crashes.Add tests for every production issue discoveredChapter 11: Performance TestingWrite performance testsMetricKitValue of performance testingWrite performance tests for iOS applications
Java 17 Quick Syntax Reference
Quickly gain the insight necessary to address a multitude of Java coding challenges using this succinct reference guide, Java 17 Quick Syntax Reference, Third Edition. Short, focused code examples will help you learn and master various existing and new Java source code elements.This edition includes the following additions to Java SE and OpenJDK, through Java 17: Pattern matching for switch and instanceof, Sealed classes and interfaces, Switch expressions, Text block multiline strings, Java module system, Private methods in interfaces, and Type inference for local variables.You won’t find any technical jargon, bloated samples, drawn out history lessons or witty stories in this book. What you will find is a language reference that is concise, to the point and highly accessible. The book is packed with useful information and is a must-have for any Java programmer.WHAT YOU WILL LEARN* Run a Java file with a single command* * Learn what a switch expression is and how to use it* Use pattern matching* Code with Java modules* Create text blocks to handle multiline strings* Learn what sealed classes are and how to use these and moreWHO THIS BOOK IS FORThose with prior experience with Java who want a quick and handy reference. Mikael Olsson is a professional web entrepreneur, programmer, and author. He works for an R&D company in Finland where he specializes in software development. In his spare time he writes books and creates websites that summarize various fields of interest. The books he writes are focused on teaching their subject in the most efficient way possible, by explaining only what is relevant and practical without any unnecessary repetition or theory. 1. HelloWorld2. Compile and Run3. Variables4. Operators5. String6. Arrays7. Conditionals8. Loops9. Methods10. Class11. Stack12. Inheritance13. Overriding14. Packages15. Access Levels16. Constants17. Interface18. Abstract19. Enum20. Exception Handling21. Boxing and Unboxing22. Generics23. Modules
Go for Java Programmers
Get an in-depth introduction to the Go programming language and its associated standard runtime libraries. This book is targeted towards programmers that already know the Java programming language and uses that Java knowledge to direct the learning of Go. You will get a deep understanding of the Go language and obtain a good introduction to the extensive Go standard libraries.This book teaches Go through clear descriptions of Go features, contrasting them with similar Java features and via providing extensive code examples. After reading this book you will be knowledgeable enough about Go and its libraries to begin doing effective programming using the Go language.Go for Java Programmers is structured more like a tutorial than a reference document. It covers key features of Go, but not every little detail as a reference might. Its goal is to get you competent enough in Go and its runtime that you can begin to effectively write Go programs.WHAT YOU WILL LEARN* Examine the key Go Runtime libraries and how they compare to Java libraries* See when it is appropriate to use the Go language instead of the Java language* Read and understand programs written in Go* Write many programs in Go* Determine when Go is an appropriate language to develop applications in* Discover how the Go and Java languages and development experience compare and contrastWHO THIS BOOK IS FORPrimarily existing professional Java programmers or students that already know something about Java. A basic understanding of Java is expected. Some basic programming experience with imperative languages is expected.BARRY FEIGENBAUM has decades of software engineering experience. Over his career, he has worked for major industry-leading companies such as IBM and Amazon, and is currently at Dell where he is a Senior Principal Software Engineer. He has worked on mainframe and midrange servers and many applications for personal computers. He has developed software products in many key industry languages, such as assemblers for multiple hardware architectures, C/C++/C#, Python, JavaScript, Java and now Go. He has extensive experience in the full software development lifecycle. Most recently, he has committed himself to leading teams developing mission-critical microservices, most often written in Go, that operate in large clustered environments.He led the early development of the LAN support inside Microsoft Windows (he defined the SMB protocol that is the basis for both the CIFS and the SAMBA technologies). He has served as a software tester, developer and designer as well as a development team lead, architect and manger on multiple occasions. He was a key contributor as a developer, architect and manager to several releases of PC-DOS and OS/2. In these roles, he worked extensively with Microsoft on joint requirements, design, and implementation.Dr. Feigenbaum has a Ph. D. in Computer Engineering with a concentration in OO software design and other degrees in Electrical Engineering. He has published multiple articles in technical magazines and juried journals. He coauthored several books on IBM PC-DOS. He has spoken at numerous technical conferences, such as JavaOne. He has served on industry standard bodies. He taught multiple college level courses on data structures, software engineering and distributed software as an adjunct professor at several universities. He has over twenty issued US patents.He is married, has one son, and lives in Austin, TX.Part I: First look at GoChapter 1: A Brief Look at Go vs. JavaChapter 2: What Java has that Go does notChapter 3: A Deeper Comparison of Go and JavaPart 2: The Go LanguageChapter 4: Key Go AspectsChapter 5: Go Basic FeaturesChapter 6: Go TypesChapter 7: Errors and PanicsChapter 8: Go StatementsChapter 9: Applications for interfacesChapter 10: Go Unit Tests and BenchmarksChapter 11: Going into the FuturePart 3: Go Library SurveyChapter 12: Key Packages ComparisonChapter 13: Key Method/Function ComparisonChapter 14: Go Package SurveyChapter 15: SQL Database AccessChapter 16: Client and Server SupportChapter 17: Go RuntimeAppendix A. Installing GoAppendix B: Some Go FAQsAppendix C: Go Gotchas to look out forAppendix D: Mark-Sweep Pseudo-codeAppendix E: ASCII vs. UTF-8
Corporate Cybersecurity
CORPORATE CYBERSECURITYAN INSIDER’S GUIDE SHOWING COMPANIES HOW TO SPOT AND REMEDY VULNERABILITIES IN THEIR SECURITY PROGRAMSA bug bounty program is offered by organizations for people to receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. Corporate Cybersecurity gives cyber and application security engineers (who may have little or no experience with a bounty program) a hands-on guide for creating or managing an effective bug bounty program. Written by a cyber security expert, the book is filled with the information, guidelines, and tools that engineers can adopt to sharpen their skills and become knowledgeable in researching, configuring, and managing bug bounty programs. This book addresses the technical aspect of tooling and managing a bug bounty program and discusses common issues that engineers may run into on a daily basis. The author includes information on the often-overlooked communication and follow-through approaches of effective management. Corporate Cybersecurity provides a much-needed resource on how companies identify and solve weaknesses in their security program. This important book:* Contains a much-needed guide aimed at cyber and application security engineers * Presents a unique defensive guide for understanding and resolving security vulnerabilities * Encourages research, configuring, and managing programs from the corporate perspective * Topics covered include bug bounty overview; program set-up; vulnerability reports and disclosure; development and application Security Collaboration; understanding safe harbor and SLAWritten for professionals working in the application and cyber security arena, Corporate Cybersecurity offers a comprehensive resource for building and maintaining an effective bug bounty program. JOHN JACKSON is a Cyber Security Professional, Hacker, and the founder of the Hacking Group: Sakura Samurai. He is skilled in the art of configuring, managing, and utilizing Application Security Tools and programs, and an effective leader in the Cyber Security space. His unique perspective as both an Engineer and a Security Researcher provides hands-on experience towards configuring programs in a way that both organizations and researchers can benefit.Foreword xiiiAcknowledgments xvPART 1 BUG BOUNTY OVERVIEW 11 THE EVOLUTION OF BUG BOUNTY PROGRAMS 31.1 Making History 31.2 Conservative Blockers 41.3 Increased Threat Actor Activity 41.4 Security Researcher Scams 51.5 Applications Are a Small Consideration 51.6 Enormous Budgetary Requirements 51.7 Other Security Tooling as a Priority 61.8 Vulnerability Disclosure Programs vs Bug Bounty Programs 61.8.1 Vulnerability Disclosure Programs 61.8.2 Bug Bounty Programs 71.9 Program Managers 71.10 The Law 71.11 Redefining Security Research 81.12 Taking Action 81.12.1 Get to Know Security Researchers 91.12.2 Fair and Just Resolution 91.12.3 Managing Disclosure 91.12.4 Corrections 91.12.5 Specific Community Involvement 9PART 2 EVALUATING PROGRAMS 112 ASSESSING CURRENT VULNERABILITY MANAGEMENT PROCESSES 132.1 Who Runs a Bug Bounty Program? 132.2 Determining Security Posture 132.3 Management 142.3.1 Software Engineering Teams 142.3.2 Security Departments (Security Operations, Fraud Prevention, Governance/Risk/Compliance, Edge Controls, Vulnerability Management, Endpoint Detection, and Response) 142.3.3 Infrastructure Teams 142.3.4 Legal Department 142.3.5 Communications Team 142.4 Important Questions 152.5 Software Engineering 152.5.1 Which Processes Are in Place for Secure Coding? Do the Software Engineers Understand the Importance of Mitigating the Risks Associated with Vulnerable Code? 152.5.2 How Effective Are Current Communication Processes? Will Vulnerabilities Be Quickly Resolved If Brought to Their Attention? 152.5.3 Is the Breadth of Our Enterprise’s Web and Mobile Applications Immense? Which Processes Are Engineers Using for Development in the Software Development Lifecycle? 162.6 Security Departments 162.6.1 How Does Security Operations Manage Incidents? Will Employee Assistance Be Provided from the Security Operations Team If a Threat Actor Manages to Exploit an Application Vulnerability? Which Tools Do They Have in Place? 162.6.2 What Does the Fraud Prevention Team Do to Prevent Malicious Activities? How Many Occurrences Do They See of Issues such as Account Takeover, and Could They Potentially Create Application Vulnerabilities? 162.6.3 Are There Any Compliance Practices in Place and, If So, How Do They Affect the Vulnerability Management Process? What Does the Application Security Team Have to Do to Assist in Enterprise Compliance? 172.6.4 What Edge Tooling is in Place to Prevent Attacks? Are Any of the Enterprise Applications at Risk of Being Exploited due to an IoT (Internet of Things) Device? 172.6.5 How Often Does Our Vulnerability Management Team Push for Updates? How Does the Vulnerability Management Team Ensure Servers in which Enterprise Applications Reside Are Secure? 172.7 Infrastructure Teams 172.7.1 What Are Infrastructure Teams Doing to Ensure Best Security Practices Are Enabled? How Long Will It Take the Infrastructure Team to Resolve a Serious Issue When a Server-side Web Application is Exploited, or During a Subdomain Takeover Vulnerability? 172.7.2 Is There Effective Communication between Infrastructure, Vulnerability Management, Security Operations, and Endpoint Detection and Response? 182.8 Legal Department 182.8.1 How Well Refined is the Relationship between the Application Security Team and the Legal Department? 182.8.2 What Criteria Are/Will Be Set Out for the Escalation of Issues? 182.8.3 Does the Legal Department Understand the Necessity of Bug Bounty Program Management? 182.9 Communications Team 182.9.1 Has the Communications Team Dealt with Security Researchers Before? is the Importance Understood? 182.9.2 Was the Communications Team Informed of Bug Bounty Program Expectations? 192.10 Engineers 192.11 Program Readiness 193 EVALUATING PROGRAM OPERATIONS 213.1 One Size Does Not Fit All 213.2 Realistic Program Scenarios 213.3 Ad Hoc Program 223.4 Note 243.5 Applied Knowledge 243.5.1 Applied Knowledge #1 243.5.1.1 Private Programs 253.5.2 Applied Knowledge #2 253.5.2.1 Public Programs 253.5.3 Applied Knowledge #3 263.5.3.1 Hybrid Models 263.6 Crowdsourced Platforms 273.7 Platform Pricing and Services 283.8 Managed Services 283.9 Opting Out of Managed Services 293.10 On-demand Penetration Tests 29PART 3 PROGRAM SETUP 314 DEFINING PROGRAM SCOPE AND BOUNTIES 334.1 What is a Bounty? 334.2 Understanding Scope 334.3 How to Create Scope 344.3.1 Models 344.4 Understanding Wildcards 344.4.1 Subdomain 354.4.2 Domain 354.4.3 Specific Domain Path or Specific Subdomain Path 354.5 Determining Asset Allocation 364.6 Asset Risk 374.7 Understanding Out of Scope 374.8 Vulnerability Types 384.8.1 Denial of Service (DOS) or Distributed Denial of Service (DDoS) Attacks 384.8.2 Social Engineering Attacks 384.8.3 Brute Force or Rate Limiting 384.8.4 Account and Email Enumeration 384.8.5 Self-XSS 394.8.6 Clickjacking 394.8.7 Miscellaneous 394.9 When is an Asset Really Out of Scope? 394.10 The House Wins – Or Does It? 404.11 Fair Judgment on Bounties 424.12 Post-mortem 434.13 Awareness and Reputational Damage 434.14 Putting It All Together 444.15 Bug Bounty Payments 444.15.1 Determining Payments 454.15.2 Bonus Payments 464.15.3 Nonmonetary Rewards 465 UNDERSTANDING SAFE HARBOR AND SERVICE LEVEL AGREEMENTS 495.1 What is “Safe Harbor”? 495.1.1 The Reality of Safe Harbor 495.1.2 Fear and Reluctance 495.1.3 Writing Safe Harbor Agreements 505.1.4 Example Safe Harbor Agreement 505.2 Retaliation against a Rogue Researcher (Cybercriminal or Threat/Bad Actor) 515.3 Service Level Agreements (SLAs) 525.3.1 Resolution Times 535.3.2 Triage Times 536 PROGRAM CONFIGURATION 556.1 Understanding Options 556.2 Bugcrowd 556.2.1 Creating the Program 556.2.2 Program Overview 616.2.2.1 The Program Dashboard 616.2.2.2 The Crowd Control Navbar 63Summary 63Submissions 63Researchers 64Rewards 65Insights Dashboard 65Reports 666.2.3 Advanced Program Configuration and Modification 666.2.3.1 Program Brief 666.2.3.2 Scope and Rewards 676.2.3.3 Integrations 726.2.3.4 Announcements 736.2.3.5 Manage Team 746.2.3.6 Submissions 756.2.4 Profile Settings 766.2.4.1 The Profile and Account 786.2.4.2 Security 786.2.4.3 Notification Settings 796.2.4.4 API Credentials 806.2.5 Enterprise “Profile” Settings 816.2.5.1 Management and Configuration 816.2.5.2 Organization Details 816.2.5.3 Team Members 816.2.5.4 Targets 816.2.5.5 Authentication 816.2.5.6 Domains 826.2.5.7 Accounting 836.3 HackerOne 846.3.1 Program Settings 856.3.1.1 General 856.3.1.2 Information 866.3.1.3 Product Edition 866.3.1.4 Authentication 876.3.1.5 Verified Domains 886.3.1.6 Credential Management 896.3.1.7 Group Management 896.3.1.8 User Management 906.3.1.9 Audit Log 916.3.2 Billing 926.3.2.1 Overview 926.3.2.2 Credit Card 926.3.2.3 Prepayment 926.3.3 Program 936.3.3.1 Policy 936.3.3.2 Scope 936.3.3.3 Submit Report Form 956.3.3.4 Response Targets 966.3.3.5 Metrics Display 976.3.3.6 Email Notifications 976.3.3.7 Inbox Views 986.3.3.8 Disclosure 986.3.3.9 Custom Fields 986.3.3.10 Invitations 996.3.3.11 Submission 1006.3.3.12 Message Hackers 1016.3.3.13 Email Forwarding 1026.3.3.14 Embedded Submission Form 1026.3.3.15 Bounties 1036.3.3.16 Swag 1036.3.3.17 Common Responses 1046.3.3.18 Triggers 1066.3.3.19 Integrations 1076.3.3.20 API 1076.3.3.21 Hackbot 1076.3.3.22 Export Reports 1086.3.3.23 Profile Settings 1086.3.4 Inbox 1086.3.4.1 Report Details 1096.3.4.2 Timeline 1096.4 Summary 110PART 4 VULNERABILITY REPORTS AND DISCLOSURE 1117 TRIAGE AND BUG MANAGEMENT 1137.1 Understanding Triage 1137.1.1 Validation 1137.1.2 Lessons Learned 1157.1.3 Vulnerability Mishaps 1157.1.4 Managed Services 1157.1.5 Self-service 1167.2 Bug Management 1167.2.1 Vulnerability Priority 1167.2.2 Vulnerability Examples 1177.2.2.1 Reflected XSS on a login portal 117Report and Triage 117Validation 1177.2.2.2 Open redirect vulnerability 117Report and Triage 117Validation 1187.2.2.3 Leaked internal Structured Query Language (SQL) server credentials 118Report and Triage 118Validation 1187.3 Answers 1187.3.1 Vulnerability Rating-test Summary 1197.3.1.1 Reflected XSS in a login portal 1187.3.1.2 Open redirect vulnerability 1187.3.1.3 Leaked internal SQL server credentials 1187.3.2 Complexity vs Rating 1197.3.3 Projected Ratings 1207.3.4 Ticketing and Internal SLA 1207.3.4.1 Creating Tickets 1208 VULNERABILITY DISCLOSURE INFORMATION 1238.1 Understanding Public Disclosure 1238.1.1 Making the Decision 1238.1.1.1 Private Programs 123The Bottom Line 1248.1.1.2 Public Programs 125The Bottom Line 1268.2 CVE Responsibility 1268.2.1 What are CVEs? 1268.2.2 Program Manager Responsibilities 1268.2.3 Hardware CVEs 1268.2.4 Software and Product CVEs 1288.2.5 Third-party CVEs 1288.3 Submission Options 1308.3.1 In-house Submissions 1308.3.2 Program Managed Submissions and Hands-off Submissions 1308.3.2.1 Program Managed Submissions 1308.3.2.2 Hands-off Submissions 131PART 5 INTERNAL AND EXTERNAL COMMUNICATION 1339 DEVELOPMENT AND APPLICATION SECURITY COLLABORATION 1359.1 Key Role Differences 1359.1.1 Application Security Engineer 1359.1.2 Development 1359.2 Facing a Ticking Clock 1369.3 Meaningful Vulnerability Reporting 1369.4 Communicating Expectations 1379.5 Pushback, Escalations, and Exceptions 1389.5.1 Internal steps 1389.5.2 External steps 1399.5.2 Escalations 1399.5.3 Summary 1409.6 Continuous Accountability 1419.6.1 Tracking 1419.6.2 Missed Deadlines 14110 HACKER AND PROGRAM INTERACTION ESSENTIALS 14310.1 Understanding the Hacker 14310.1.1 Money, Ethics, or Both? 14310.1.2 Case Study Analysis 14510.2 Invalidating False Positives 14510.2.1 Intake Process and Breaking the News 14510.2.2 Dealing with a Toxic Hacker 14710.3 Managed Program Considerations 14710.4 In-house Programs 14810.5 Blackmail or Possible Threat Actor 15110.6 Public Threats or Disclosure 15110.7 Program Warning Messages 15310.8 Threat Actor or Security Researcher? 15310.9 Messaging Researchers 15510.9.1 Security Researcher Interviews 15510.9.2 Bug Bounty Program Manager Interviews 15910.10 Summary 164PART 6 ASSESSMENTS AND EXPANSIONS 16511 INTERNAL ASSESSMENTS 16711.1 Introduction to Internal Assessments 16711.2 Proactive Vs Reactive Testing 16711.3 Passive Assessments 16811.3.1 Shodan 16811.3.1.1 Using Shodan 16811.3.2 Amass/crt.sh 17111.3.2.1 Amass 17211.3.2.2 crt.sh 17311.4 Active Assessments 17311.4.1 nmapAutomator.sh 17311.4.2 Sn1per 17511.4.3 Owasp Zap 17511.4.4 Dalfox 17711.4.5 Dirsearch 17911.5 Passive/Active Summary 18011.6 Additional Considerations: Professional Testing and Third-Party Risk 18012 EXPANDING SCOPE 18112.1 Communicating with the Team 18112.2 Costs of Expansion 18212.3 When to Expand Scope 18212.4 Alternatives to Scope Expansion 18312.5 Managing Expansion 18313 PUBLIC RELEASE 18513.1 Understanding the Public Program 18513.2 The “Right” Time 18513.3 Recommended Release 18613.3.1 Requirements 18613.4 Rolling Backwards 18613.5 Summary 187Index 189
Windows 11 For Dummies
NEED WINDOWS HELP? FIND THE LATEST TIPS AND TRICKS IN THIS PERENNIAL FAVORITE ON WINDOWSWindows 11 promises to be the fastest, most secure, and most flexible version of the Microsoft operating system yet. With a promise like that, of course you want to start using it, as quickly as possible! Windows 11 For Dummies gives you that speed, security, and flexibility by getting you up to date with the latest in Windows. Windows expert and bestselling author Andy Rathbone gives you a helping hand by showing you how to get around the newly updated Windows 11 interface, how to use the new Windows tools like Teams and widgets, and how to use Android apps. Your tour of Windows 11 starts with the Start menu and ends with how to troubleshoot when things go wrong. In between you find out how to find files on your hard drive, connect with friends and colleagues on Microsoft Teams, transfer photos from your phone to your hard drive, or switch between your desktop and laptop. Additional topics include:* Navigating the Start menu* Finding where your files are hiding* Adding separate user accounts to keep your kids out of your business* Connecting to a WiFi network* Customizing your widgets* Switching to a laptop or tabletYou know what you want to get done. Keep Windows 11 For Dummies by your desktop, laptop, and tablet, and you can open it at any time to find out how to get your Windows computer to do what you need. ANDY RATHBONE probably didn’t think “someday I’m going to be the world’s all-time best-selling tech how-to book author” when he was finishing his comparative literature degree. A stint writing for computer magazines led to him writing Windows For Dummies, published in October 1992. Since then the book has seen 18 editions published and sold millions of copies. When not helping people find the Start button, Andy enjoys bird watching and playing ukulele.Introduction 1About This Book 2How to Use This Book 3Touchscreen Owners Aren’t Left Out 4And What about You? 5Icons Used in This Book 5Beyond the Book 6Where to Go from Here 6PART 1: WINDOWS 11 STUFF EVERYBODY THINKS YOU ALREADY KNOW7CHAPTER 1: WHAT IS WINDOWS 11? 9What Is Windows, and Why Are You Using It? 10What’s New in Windows 11? 12What’s Missing from Windows 11? 14Why Does Windows 11 Keep Changing? 16Can My Current PC Run Windows 11? 16The Different Flavors of Windows 11 18CHAPTER 2: STARTING WITH THE START MENU19Being Welcomed to the World of Windows 20Understanding user accounts 22Keeping your account private and secure 23Signing up for a Microsoft account 25Figuring Out the Windows 11 Start Menu 27Launching a Start menu program or app 29Finding something on the Start menu 29Viewing, closing, or returning to open apps 31Getting to know your free apps 32Adding or removing Start menu items 35Customizing the Start menu 36Exiting from Windows 39Temporarily leaving your computer 39Leaving your computer for the day 41CHAPTER 3: THE TRADITIONAL DESKTOP 43Finding the Desktop and the Start Menu 44Working with the Desktop 45Launching apps with the Start menu 47Jazzing up the desktop’s background 48Dumpster diving in the Recycle Bin 50Bellying Up to the Taskbar 52Shrinking windows to the taskbar and retrieving them 54Switching to different tasks from the taskbar’s Jump Lists 54Clicking the taskbar’s sensitive areas 55Seeing the Action Center and Notifications 58Viewing notifications 58Seeing Quick Settings icons 60Watching Widgets 60Customizing the taskbar 62Setting Up Virtual Desktops 63Making Programs Easier to Find 66CHAPTER 4: BASIC DESKTOP WINDOW MECHANICS 69Dissecting a Typical Desktop Window 70Tugging on a window’s title bar 71Navigating folders with a window’s Address bar 73Figuring out your folder’s new Menu bars 74Quick shortcuts with the Navigation pane 76Moving inside a window with its scroll bar 78Boring borders 80Maneuvering Windows Around the Desktop 81Moving a window to the top of the pile 81Moving a window from here to there 82Making a window fill the whole desktop 82Closing a window 83Making a window bigger or smaller 83Neatly placing windows side by side 83Making windows open to the same darn size 85CHAPTER 5: STORING AND ORGANIZING FILES 87Browsing the File Explorer File Cabinets 89Getting the Lowdown on Folders 92Peering into Your Drives, Folders, and Other Media 93Seeing the files on a drive 93Seeing what’s inside a folder 95Creating a New Folder 98Renaming a File or Folder 100Selecting Bunches of Files or Folders 100Getting Rid of a File or Folder 101Copying or Moving Files and Folders 103Seeing More Information about Files and Folders 105Writing to CDs and DVDs 107Buying the right kind of blank CDs and DVDs for burning 108Copying files to or from a CD or DVD 109Working with Flash Drives and Memory Cards 112OneDrive: Your Cubbyhole in the Clouds 113Setting up OneDrive 114Changing your OneDrive settings 116Opening and saving files from OneDrive 118Understanding which files live on OneDrive, your PC, or both places 120Accessing OneDrive from the internet 122PART 2: WORKING WITH PROGRAMS, APPS, AND FILES125CHAPTER 6: PLAYING WITH PROGRAMS, APPS, AND DOCUMENTS127Starting an App or Program 128Opening a Document 130Saving a Document 133Choosing Which Program Should Open Which File 134Navigating the Microsoft Store 138Adding new apps from the Microsoft Store app 138Uninstalling apps 141Taking the Lazy Way with a Desktop Shortcut 142Absolutely Essential Guide to Cutting, Copying, and Pasting 144The quick ’n’ dirty guide to cut ’n’ paste 144Selecting things to cut or copy 145Cutting or copying your selected goods 147Pasting information to another place 148CHAPTER 7: FINDING THE LOST151Finding Currently Running Apps and Programs 151Finding Lost Windows on the Desktop 153Locating a Missing App, Program, Setting, or File 154Finding a Missing File inside a Folder 158Finding Lost Photos 160Finding Other Computers on a Network 161CHAPTER 8: PRINTING AND SCANNING YOUR WORK163Printing from a Start Menu App 164Printing Your Masterpiece from the Desktop 166Adjusting how your work fits on the page 167Adjusting your printer’s settings 169Canceling a print job 171Printing a web page 172Troubleshooting your printer 174Scanning from the Start Menu 176PART 3: GETTING THINGS DONE ON THE INTERNET179CHAPTER 9: CRUISING THE WEB181What’s an ISP, and Why Do I Need One? 182Connecting Wirelessly to the Internet 183Browsing the Web with Microsoft Edge 186Moving from one web page to another 188Making Microsoft Edge open to your favorite site 190Revisiting favorite places 191Finding things on the internet 193Finding More Information on a Website 194Saving Information from the Internet 195Saving a web page 195Saving text 196Saving a picture 196Downloading a program, song, or other type of file 197CHAPTER 10: BEING SOCIAL: MAIL, CALENDAR, AND TEAMS CHAT199Adding Your Accounts to Windows 200Understanding the Mail App 202Switching among the Mail app’s views, menus, and accounts 202Composing and sending email 205Reading a received email 208Sending and receiving files through email 209Managing Your Contacts in the People App 212Adding contacts 214Deleting or editing contacts 215Managing Appointments in Calendar 216Meeting Online with Teams Chat 219Starting Teams Chat 219Sending text messages 221Holding video chats 222CHAPTER 11: SAFE COMPUTING227Understanding Those Annoying Permission Messages 227Staying Safe with Windows Security 228Avoiding and removing viruses 230Avoiding phishing scams 232Setting up controls for children 234PART 4: CUSTOMIZING AND UPGRADING WINDOWS 11237CHAPTER 12: CUSTOMIZING SETTINGS IN WINDOWS239Finding the Right Switch 240Flipping Switches with the Windows Settings App 241Adjusting the System settings 242Connecting and adjusting Bluetooth and other devices 249Connecting to nearby Wi-Fi networks and internet 255Personalizing your PC’s look and feel 256Fixing and removing apps 260Creating and changing accounts for others 263Changing date, time, and language settings quickly 263Setting up for video games 264Adapting Windows for your special physical needs 264Managing your privacy and security 266Staying current and safe with Windows Update 267CHAPTER 13: KEEPING WINDOWS FROM BREAKING269Backing Up Your Computer with File History 271Finding Technical Information about Your Computer 275Freeing Up Space on Your Hard Drive 276Setting Up Devices That Don’t Work (Fiddling with Drivers) 278CHAPTER 14: SHARING ONE COMPUTER WITH SEVERAL PEOPLE 281Understanding User Accounts 282Changing or Adding User Accounts 284Adding an account for a family member or friend 284Changing existing accounts 288Switching Quickly between Users 290Changing a User Account’s Picture 292Setting Up Passwords and Security 294Signing in with Windows Hello 296CHAPTER 15: CONNECTING COMPUTERS WITH A NETWORK299Understanding a Network’s Parts 300Setting Up a Small Network 302Buying parts for a network 302Setting up a wireless router 303Setting up Windows computers to connect to a network 304Sharing Files with Your Networked Computers 306Setting your home network to private 306Sharing files and folders on your private network 310Accessing what others have shared 312Sharing a printer on the network 313Sharing with Nearby Sharing 314Turning on Nearby Sharing 315Sharing files with Nearby Sharing 316PART 5: MUSIC, PHOTOS, AND VIDEOS319CHAPTER 16: PLAYING AND COPYING MUSIC321Playing Music with the Groove Music App 322Handing Music-Playing Chores Back to Windows Media Player 325Stocking the Windows Media Player Library 328Browsing the Windows Media Player Libraries 331Playing Music Files in a Playlist 334Controlling Your Now Playing Items 335Playing CDs 337Playing DVDs 338Playing Videos and TV Shows 338Creating, Saving, and Editing Playlists 339Ripping (Copying) CDs to Your PC 341Burning (Creating) Music CDs 342CHAPTER 17: FIDDLING WITH PHOTOS, VIDEOS, AND PHONES 345Dumping Photos from a Phone or Camera to Your Computer 346Making Photos and Videos with the Camera App 349Grabbing Photos from Your Android Phone through the Your Phone App 351Viewing Photos with the Photos App 354Viewing your photo collection 355Viewing photo albums 358Viewing a slideshow 360PART 6: HELP!361CHAPTER 18: THE CASE OF THE BROKEN WINDOW363The Magic Fixes in Windows 364Resetting your computer 364Restoring backups with File History 368Windows Keeps Asking Me for Permission 372I Need to Retrieve Deleted Files 374I Need to Fix Broken Apps 374My Settings Are Messed Up 375I Forgot My Password 377My Computer Is Frozen Solid 378CHAPTER 19: STRANGE MESSAGES: WHAT YOU DID DOES NOT COMPUTE381Add Your Microsoft Account 382Calendar Notifications 382Choose What Happens with This Device 383Deleted Files Are Removed Everywhere 384Did You Mean to Switch Apps? 385Do You Want to Allow This App to Make Changes to Your Device? 385Do You Want to Pin This App to the Taskbar? 386Do You Want to Save Changes? 386Enter Network Credentials 387How Do You Want to Open This File? 388Keep These Display Settings? 389Let’s Finish Setting Up 389No Usable Drive Found 390Save to OneDrive 391Select to Choose What Happens with Removable Drives 391Threats Found 392USB Device Not Recognized 393Verify Your Identity on This PC 394We’re Not Allowed to Find You 394You Don’t Currently Have Permission to Access This Folder 395Your Privacy Settings Blocked Access to Your Location 395CHAPTER 20: MOVING FROM AN OLD PC TO A NEW WINDOWS 11 PC397Moving to Windows 11 the Microsoft Way 397Hiring a Third Party to Make the Move 399Buying Laplink’s PCmover program 399Visiting a repair shop 401Transferring Files Yourself 401CHAPTER 21: HELP ON THE WINDOWS HELP SYSTEM407Getting Started with Windows 11 408Contacting Support 409Microsoft’s support options 410Microsoft’s free support options 410PART 7: THE PART OF TENS413CHAPTER 22: TEN THINGS YOU’LL HATE ABOUT WINDOWS 11 (AND HOW TO FIX THEM)415Knowing Whether Your PC Can Upgrade to Windows 11 416There’s No Backup Program! 416I Want the Start Button and Menu in the Lower-Left Corner! 417Windows 11 Keeps Changing! 418I Don’t Want a Microsoft Account 418Windows Makes Me Sign in All the Time 419I Can’t Line Up Two Windows on the Screen 420It Won’t Let Me Do Something Unless I’m an Administrator! 421I Don’t Know What Version of Windows I Have 421My Print Screen Key Doesn’t Work 422CHAPTER 23: TEN OR SO TIPS FOR TABLET AND LAPTOP OWNERS425Using the New Touchscreen Gestures 426Switching to Airplane Mode 427Connecting to a New Wireless Internet Network 428Toggling Your Tablet’s Screen Rotation 429Adjusting to Different Locations 430Turning on the Traffic Widget 431Backing Up Your Laptop Before Traveling 432Accessing the Mobility Center 432Turning Calculator into a Road Warrior Tool 433Index 435
Autodesk Revit Architecture 2022
* ARCHITEKTURKONSTRUKTIONEN VOM GRUNDRISS BIS ZUM 3D-MODELL UND PLOT* DIE WICHTIGSTEN KONSTRUKTIONS- UND BEARBEITUNGSBEFEHLE MIT ZAHLREICHEN BEISPIELEN* PRAXISNAHES ANWENDUNGSBEISPIEL EINES EINFAMILIENHAUSES VOM KELLER BIS ZUM DACHDieses Grundlagen- und Lehrbuch zeigt Ihnen die typischen Befehle der Architektursoftware Revit 2022 anhand einer vollständigen Beispielkonstruktion sowie einzelner Demonstrationsbeispiele. Der Autor richtet sich insbesondere an Revit-Neulinge, die einen fundierten, praxisnahen Einstieg suchen. Mit dem Buch und einer 30-Tage-Revit-Testversion von der Autodesk-Webseite können Sie sofort beginnen und in Kürze Ihre ersten Grundrisse und Häuser erstellen.Die wichtigsten Vorgehensweisen werden sowohl mit einem vollständigen Projektbeispiel als auch anhand vieler einzelner Detailbeispiele erklärt und geübt. Bei Revit ist es besonders wichtig, die verschiedenen Befehlsoptionen und Bedienelemente über Beispiele kennenzulernen, weil bei deren Anwendung stets die Element-Eigenschaften und Typvorgaben sowie die Einstellungen der Optionsleiste und der Eingabeaufforderungen beachtet werden müssen, was viel praktische Übung erfordert. Am Ende jedes Kapitels finden Sie Testfragen mit dazugehörigen Lösungen im Anhang.Neben der traditionellen Konstruktionsweise für einzelne Stockwerke mit Wänden, Türen, Fenstern, Geschossdecken, Treppen und Dächern wird auch das konzeptionelle Design vorgestellt, bei dem zunächst als Basis die Gebäudeform als Volumenkörper entworfen wird.Schließlich führt ein Beispiel in den Familieneditor ein, der die Erstellung eigener Architekturkomponenten erlaubt.Abschließend wird auch die Vorgehensweise bei der Gebäudetechnik an einem Beispiel aus dem Sanitärbereich gezeigt.AUS DEM INHALT:* Installation und Benutzeroberfläche* Dokumentiertes Beispielprojekt* Elemente in andere Geschosse kopieren* Bearbeitungsfunktionen zum Ändern und Anpassen* Bemaßung und Beschriftung im Grundriss und im Schnitt* Ausrichtung des Projekts: Gelände, Himmelsrichtung, Höhe* Außen-, Innen-, Detail- und Schnittansichten* Stützen, Träger, Streben sowie Einführung in den Stahlbau* Verschiedene Dachformen* Fotorealistische Darstellungen mit Rendern* Auswertungen mit Raumstempeln und Elementlisten* Wege über Routen-Analyse bestimmen* Ausgabe mehrerer Pläne und Ansichten als PDF* Alternatives konzeptionelles Design* Einführung in den Familieneditor* BIM-Austausch von und zu Inventor sowie Komponenten mit BIMobject® EVO importieren* Arbeiten mit Gebäudetechnik-KomponentenDetlef Ridder hat bereits zahlreiche Bücher zu AutoCAD, Inventor, Revit und ArchiCAD veröffentlicht und gibt Schulungen zu diesen Programmen und im Bereich CNC.
Samsung Galaxy A03s
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Samsung Galaxy A03s kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Galaxy A03s auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
Job Ready Python
GET READY TO TAKE ON PYTHON WITH A PRACTICAL AND JOB-FOCUSED GUIDEJob Ready Python offers readers a straightforward and elegant approach to learning Python that emphasizes hands-on and employable skills you can apply to real-world environments immediately.Based on the renowned mthree Global Academy and Software Guild training program, this book will get you up to speed in the basics of Python, loops and data structures, object-oriented programming, and data processing. You’ll also get:* Thorough discussions of Extract, Transform, and Load (ETL) scripting in Python * Explorations of databases, including MySQL, and MongoDB—all commonly used database platforms in the field * Simple, step-by-step approaches to dealing with dates and times, CSV files, and JSON files Ideal for Python newbies looking to make a transition to an exciting new career, Job Ready Python also belongs on the bookshelves of Python developers hoping to brush up on the fundamentals with an authoritative and practical new handbook.HAYTHEM BALTI, PHD, is the associate dean at Wiley’s mthree academy. He has created courses used by thousands of Software Guild and mthree alumni to learn Go, Java, Python, and other development and data science skills.KIMBERLY A. WEISS is a veteran course developer, specializing in Computer Science courses since 2002. She was an assistant professor in Computer Science for over ten years before deciding to focus exclusively on course design. She has worked with multiple universities as well as corporate training settings to develop interactive instructional content appropriate for the target learners and course goals. About the Authors vAbout the Technical Writer vAbout the Technical Editor vAcknowledgments viIntroduction xviiPART I: GETTING STARTED WITH PYTHON 1LESSON 1: SETTING UP A PYTHON PROGRAMMING ENVIRONMENT 3Python Overview 4Using Replit Online 4Getting Started with Jupyter Notebook 14A Quick Look at Visual Studio Code 21Using Python from the Command Line 24Summary 26Exercises 26LESSON 2: UNDERSTANDING PROGRAMMING BASICS 29The Future of Computer Programming 30Programming Languages 32Data Types and Variables 37Variables 40Constants 44Summary 46Exercises 46LESSON 3: EXPLORING BASIC PYTHON SYNTAX 49Using with Single- Line Commands 51Using Semicolons 52Continuing with Backslash 54Working with Case Structure 55Adding Comments 56Using the Input Function 57Storing Input 59Understanding Variable Types 61Displaying Variable Values 62Naming Variables 64Summary 65Exercises 65LESSON 4: WORKING WITH BASIC PYTHON DATA TYPES 69Review of Data Types 70Number Data Types 70Identifying Data Types 72Mathematical Operations 74Pemdas 77Common Math Functions 81Math Library Functions 83Using Numbers with User Input 86Boolean Types and Boolean Operations 89Logic Operations 92Comparative Operators 95Summary 96Exercises 97LESSON 5: USING PYTHON CONTROL STATEMENTS 101Control Structures Review 101Understanding Sequence Control Structure 102Understanding Selection Statements 103Understanding Conditional Statements 106If- Else Statements 108Working with Nested Conditions 109Embedding Conditions 112Summary 114Exercises 114LESSON 6: PULLING IT ALL TOGETHER: INCOME TAX CALCULATOR 117Getting Started 118Step 1: Gather Requirements 118Step 2: Design the Program 120Step 3: Create the Inputs 120Step 4: Calculate the Taxable Income 122Step 5: Calculate the Tax Rate 124Step 6: Update the Application 133Step 7: Address the UI 136On Your Own 139Summary 139PART II: LOOPS AND DATA STRUCTURES 141LESSON 7: CONTROLLING PROGRAM FLOW WITH LOOPS 143Iterations Overview 144The Anatomy of a Loop 144The for Loop 145The while Loop 146for vs. while Loops 149Strings and String Operations 151Iterating through Strings 164Summary 167Exercises 167LESSON 8: UNDERSTANDING BASIC DATA STRUCTURES: LISTS 173Data Structure Overview—Part 1 174Creating Lists 175Determining List Length 179Working with List Indexes 179Negative Indexing in Lists 182Slicing Lists 184Adding Items to a List 189Inserting List Items 190Removing List Items 192Concatenating Lists 196List Comprehension 197Sorting Lists 199Copying Lists 200Summary 202Exercises 202LESSON 9: UNDERSTANDING BASIC DATA STRUCTURES: TUPLES 205Tuples and Tuple Operations 206Tuple Index Values 209Negative Indexing in Tuples 210Slicing Tuples 212Immutability 213Concatenating Tuples 216Searching Tuples 217Summary 218Exercises 219LESSON 10: DIVING DEEPER INTO DATA STRUCTURES: DICTIONARIES 223Data Structure Overview— Part 2 224Getting Started with Dictionaries 224Generating a Dictionary 227Retrieving Items from a Dictionary 230Using the keys() Method 233Using the items() Method 234Reviewing the keys(), values(), and items() Methods 236Using the get() Method 239Using the pop() Method 241Working with the in Operator 245Updating a Dictionary 246Duplicating a Dictionary 249Clearing a Dictionary 254Summary 255Exercises 255LESSON 11: DIVING DEEPER INTO DATA STRUCTURES: SETS 259Sets 260Retrieving Items from a Set 261Adding Items to a Set 262Creating an Empty Set 262Understanding Set Uniqueness 263Searching Items in a Set 265Calculating the Length of a Set 267Deleting Items from a Set 268Clearing a Set 270Popping Items in a Set 272Deleting a Set 273Determining the Difference Between Sets 274Intersecting Sets 277Combining Sets 278Summary 279Exercises 279LESSON 12: PULLING IT ALL TOGETHER: PROMPTING FOR AN ADDRESS 283Step 1: Getting Started 284Step 2: Accept User Input 285Step 3: Display the Input Value 286Step 4: Modify the Output 287Step 5: Split a Text Value 288Step 6: Display Only the House Number 290Step 7: Display the Street Name 291Step 8: Add the Period 292Summary 293LESSON 13: ORGANIZING WITH FUNCTIONS 295Functions Overview 295Defining Functions in Python 296Function Syntax 300Default Input Values 301Parameter Syntax 303Arbitrary Arguments 304Keyword Arguments 306Arbitrary Keyword Arguments 306Summary 308Exercises 309PART III: OBJECT- ORIENTED PROGRAMMING IN PYTHON 311LESSON 14: INCORPORATING OBJECT- ORIENTED PROGRAMMING 313Object- Oriented Programming Overview 314Defining Classes 314Creating Objects 316Working with Methods 319Class Attributes 324Summary 330Exercises 330LESSON 15: INCLUDINGInheritance 333Understanding Inheritance 334Creating a Parent Class 335Creating a Child Class 335Inheriting at Multiple Levels 338Overriding Methods 340Summary 343Exercises 344LESSON 16: PULLING IT ALL TOGETHER: BUILDING A BURGER SHOP 349Requirements for Our Application 350Plan the Code 350Create the Classes 351Create the Food Item Class 352Create the Main File 357Display the Output 364Tie the Code Files Together 364Summary 368PART IV: DATA PROCESSING WITH PYTHON 369LESSON 17: WORKING WITH DATES AND TIMES 371Getting Started with Dates and Times 372Getting the Current Date and Time 376Splitting a Date String 377Using datetime Attributes 379Creating Custom datetime Objects 380Compare datetime Values 381Working with UTC Format 383Applying Timestamps 384Arithmetic and Dates 387Calculating the Difference in Days 388Using Date without Time 390Using Time without Date 392Summary 394Exercises 394Calculator 1: Time Duration 396Calculator 2: Add or Subtract Time from a Date 397Calculator 3: Age Calculator 397LESSON 18: PROCESSING TEXT FILES 399File Processing Overview 401Introduction to File Input/Output 402Processing Text Files 404Opening a File 404Reading Text from a File 406Add Content to a File 412Overwriting the Contents of a File 415Creating a New File 417Using the os Module 418Deleting a File 419Summary 421Exercises 421LESSON 19: PROCESSING CSV FILES 425Reading CSV Files 426Using the DictReader Class 430Creating a Dataset List 432Using writerow() 434Appending Data 436Writing Rows as Lists 439Writing Rows from Dictionaries 440Summary 444Exercises 444LESSON 20: PROCESSING JSON FILES 447Processing JSON Files 448Creating a JSON File with dump() 448Converting to JSON with dumps() 449Formatting JSON Data 450Using json.loads() 452Iterating through JSON Data 454Reading and Writing JSON Data 457Summary 460Exercises 461PART V: DATA ANALYSIS AND EXCEPTION HANDLING 465LESSON 21: USING LAMBDAS 467Creating a Lambda Function 468Working with Multiple Inputs 469Placing Lambda Functions inside a Function 471Using the map() Function 472Combining Map and Lambda Functions 475Using the filter() Function 477Combining a Filter and a Lambda 479Using the reduce() Function 480Summary 486Exercises 486LESSON 22: HANDLING EXCEPTIONS 491Built- In Exceptions 492Working with try and except 493Working with Multiple Excepts 495Combining Exception Types 498Using Multiple Operations in a try 500Using the raise Keyword 501Exploring the General Exception Classes 502Adding finally 505Summary 506Exercises 506LESSON 23: PULLING IT ALL TOGETHER: WORD ANALYSIS IN PYTHON 511Examine the Data 512Read the Data 514Tokenize the Dataset 517Count the Words in Each Review 524Summary 528LESSON 24: EXTRACTING, TRANSFORMING, AND LOADING WITH ETL SCRIPTING 531ETL Scripting in Python 532Design and Implement Custom ETL Scripts 532The extract Class 534The transform Class 546The load Class 569Summary 582Exercises 582LESSON 25: IMPROVING ETL SCRIPTING 585Converting to Static Methods for the extract Class 586Converting to Static Methods for the transform Class 588Summary 607Exercises 608PART VI: APPENDICES 611APPENDIX A: FLOWCHARTS 613Flowchart Basics 613Common Flowcharting Shapes 615APPENDIX B: CREATING PSEUDOCODE 621What Is Pseudocode? 621APPENDIX C: INSTALLING MYSQL 623MySQL Installation 623Verify the Installation 628The MySQL Notifier 630APPENDIX D: INSTALLING VINYL DB 631Database Structure 631Create the Database 632APPENDIX E: INSTALLING MONGODB 637Installing MongoDB Community Server 637Running MongoDB 642APPENDIX F: IMPORTING TO MONGODB 643Index 645
Wissenschaftliche Arbeiten schreiben mit LaTeX
* SCHNELL ZUR FERTIG GESETZTEN ARBEIT - OHNE VORKENNTNISSE* LÖSUNGSORIENTIERTE UND VERSTÄNDLICHE BESCHREIBUNGEN* VON TABELLEN UND FORMELN ÜBER GRAFIKEN BIS ZUM LITERATURVERZEICHNISDas professionelle Setzen von Texten mit LaTeX ist in vielen akademischen Disziplinen Standard. Besitzen Sie keine Vorkenntnisse und wollen sich in kurzer Zeit in LaTeX einarbeiten, um Ihre Arbeit zu verfassen, wird Ihnen dieses Buch eine wertvolle Hilfe sein. Speziell für diese Aufgabe konzipiert, vermittelt es Ihnen genau das praxisorientierte Wissen, das Sie benötigen - ohne überflüssigen Ballast. Anhand vieler Beispiele lernen Sie alles, was Sie brauchen, um eine formvollendete wissenschaftliche Arbeit mit LaTeX zu erstellen.Dank dieses »Last-Minute-LaTeX-Buches« können Sie auch ohne Vorkenntnisse eine gut gesetzte wissenschaftliche Arbeit erstellen. Schritt für Schritt wird die Installation beschrieben ebenso wie das Erstellen und Einfügen von Tabellen, Formeln, Abbildungen, Fußnoten, des Literaturverzeichnisses mit biblatex etc. Neben weiteren Themen wie PDF-Erstellung und Druckoptimierung schließt das Buch mit einem umfassenden Kapitel zum Troubleshooting.Das Buch ist von Anfang bis Ende praxisorientiert und enthält zahlreiche Beispiele, die die Anwendung von LaTeX veranschaulichen.AUS DEM INHALT:* Installation und Konfiguration* Gliederungsbefehle* Textformatierung und Strukturierung* Aufzählungen und Nummerierungen* Querverweise* Fußnoten* Satzspiegel und Layout* Tabellen erstellen, formatieren und einfügen* Grafiken erstellen und einfügen* Mathematische Gleichungen erstellen und einfügen* Kopf- und Fußzeilen* Literatur zitieren und verwalten mit biblatex* Inhalts-, Abbildungs-, Tabellen-, Literaturverzeichnis, Index und Glossar erstellen* Längere Arbeiten aufsetzen* Schriften wählen - jetzt auch mit TeX Gyre* PDF erstellen und Arbeit drucken* FehlersucheDr. Joachim Schlosser leitet Ingenieure und Informatiker im Consulting-Bereich eines Softwarehauses und beschäftigt sich seit 20 Jahren mit professionellem Textsatz in LaTeX.
POCO M3 Pro 5G
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle Einstieg in Ihr Smartphone. Lernen Sie das POCO M3 Pro 5G von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen.Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt- Alle Bedienelemente des POCO M3 Pro 5G auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen- Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen- Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten- Updates, Datenschutz und Sicherheit
Samsung Galaxy A22 / A22 5G
Mit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Samsung Galaxy A22 bzw. A22 5G kennen und beherrschen!Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen.Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Galaxy A22 / A22 5G auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen- Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen- Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten- Updates, Datenschutz und Sicherheit
Private Cloud und Home Server mit QNAP NAS
* MUSIK, FOTOS, VIDEOS UND DOKUMENTE ZENTRAL SPEICHERN UND MIT ANDEREN TEILEN* BENUTZER VERWALTEN, BACKUPS ERSTELLEN UND DATEN VOR UNERLAUBTEN ZUGRIFFEN SCHÜTZEN* FORTGESCHRITTENE THEMEN WIE VPN UND VIRTUALISIERUNG* ZAHLREICHE SCHRITT-FÜR-SCHRITT-ANLEITUNGEN UND PRAXIS-TIPPSMit diesem Buch lernen Sie umfassend alles, was Sie brauchen, um Ihr QNAP NAS an Ihre persönlichen Bedürfnisse anzupassen und das Potenzial Ihres Geräts voll auszuschöpfen. Dafür gibt der Autor Ihnen zahlreiche praktische Tipps an die Hand. So können Sie all Ihre Dateien wie Musik, Videos und Fotos zentral sichern und effektiv verwalten.Andreas Hofmann stellt die verschiedenen NAS-Modelle vor, so dass Sie wissen, welches für Sie am besten geeignet ist. In leicht nachvollziehbaren Schritten erläutert er detailliert, wie Sie Ihr NAS in Betrieb nehmen und mit dem Betriebssystem QTS konfigurieren.Anhand einfacher Schritt-für-Schritt-Anleitungen zeigt er Ihnen, wie Sie Ihr NAS als Private Cloud und Home Server optimal einrichten: Dateien sichern, verwalten und mit anderen teilen, Benutzer verwalten, Fernzugriff einrichten, automatische Backups erstellen sowie Office-Dokumente und Multimedia-Dateien freigeben und mit dem SmartTV und anderen Geräten wiedergeben.Für alle, die noch tiefer in die Welt von QNAP NAS eintauchen möchten, geht der Autor auf weiterführende Themen wie Datensicherheit und die Überwachung und Optimierung des Betriebs ein und zeigt Ihnen die Konfiguration abseits der QNAP-Apps für die Einrichtung eines eigenen Chatservers sowie die Virtualisierung von Webanwendungen und Betriebssystemen.AUS DEM INHALT:* Kaufberatung und Inbetriebnahme* Das Betriebssystem * QTS im Detail* Dateien zentral verwalten mit der File Station* RAID-Konfiguration und automatische Backups* Dateifreigabe und Fernzugriff via App, FTP u.v.m.* Datensicherheit, Virenschutz und Firewall* Fotos organisieren und teilen mit der Photo Station* Musik zentral verwalten mit der Music Station * Filme katalogisieren und streamen mit dem Plex Media Server* Office-Dokumente, Kalender, Adressbuch und Notizen verwalten* E-Mail-Verwaltung mit dem QmailAgent* Zentrales Download-Management* Videoüberwachung mit der Surveillance Station* Virtualisierung* Speicher und RAID erweiternblog.viking-studios.net
iPad Handbuch für iPadOS 15
Benutzen Sie schon länger ein iPad und suchen Sie Informationen zur neuen Software iPadOS 15? Oder freuen Sie sich über Ihr erstes iPad und möchten Sie sich einen Überblick über seine Funktionsweise verschaffen und die zahlreichen Apps erkunden? In beiden Fällen halten Sie die ideale Anleitung für Ihr iPad in der Hand. Das iPad-Betriebssystem hat viel zu bieten! Sowohl Besitzer/-innen älterer iPad-Modelle als auch Neueinsteiger/-innen kommen auf ihre Kosten. Alles, was Sie lieben, hat Apple besser denn je aufbereitet: iPadOS 15 ist deutlich flotter und intuitiver in der Bedienung als alle seine Vorgängerversionen. Aus dem Inhalt So installieren Sie iPadOS 15, richten es ein und finden sich zügig zurecht. Widgets auf dem Home-Screen, App Library, optimiertes Multitasking, neue Funktionen der Nachrichten-App uvm. Internet, Kommunikation, iCloud-Dienste, Kamera und Bildbearbeitung, Kalender, Erinnerungen, Bildschirmzeit, Aktien, Sprachmemos und vieles mehr Nutzen Sie die neue Dateien-App, versenden Sie Fotos ganz einfach via AirDrop, übertragen Sie Ihre Diashow via AirPlay auf Ihren Fernseher, Drucken Sie wichtige Dokumente via AirPrint u. v. m. Alles zu den Themen Mitteilungen, Sicherheit, Stromsparen, Fehlerbehebung und den perfekten Einstellungen.
iPhone Handbuch (iOS 15)
Mit jeder neuen iOS-Version wird die Bedienung eines iPhone-Modells noch einfacher und vor allem vielseitiger. Mit der aktuellen Version iOS 15 sind wieder eine Menge nützlicher Funktionen hinzugekommen, die man bereits nach kurzer Eingewöhnungszeit nicht mehr missen möchte. Besonders hervorzuheben ist hier die Texterkennung, die nun ganz einfach Textmodule auf Fotos erkennt und zur Weiterbearbeitung zur Verfügung stellt.Zudem wurden Dinge wie FaceTime, Siri, Nachrichten etc. kräftig überarbeitet und bieten noch mehr Funktionen. Via Übersetzen ist es nun ein Einfaches, Texte in andere Sprachen zu übersetzen.In diesem Buch finden Sie als iPhone-Nutzer alle Funktionen nachvollziehbar beschrieben. Viele nummerierte Bildschirmfoto, Schritt-für-Schritt-Anleitungen und Lern-Videos helfen Ihnen, sofort alles in die Praxis umzusetzen. Wenn Sie neuer iPhone-Besitzer sind, dann ist das Buch perfekt für Sie. Aus dem Inhalt: Installation und Update auf iOS 15Datenabgleich mit einem Mac- oder Windows-RechnerAlles im Überblick: Widgets, Mitteilungen, Heute-Ansicht, BildschirmzeitProduktiv sein mit Erinnerungen, Mail, KalenderNeue Funktionen in Safari, Aktivität, Home, etc.Verbesserungen in der Karten-, Nachrichten- und App-Store-App
Pro Data Visualization Using R and JavaScript
Use R 4, RStudio, Tidyverse, and Shiny to interrogate and analyze your data, and then use the D3 JavaScript library to format and display that data in an elegant, informative, and interactive way. You will learn how to gather data effectively, and also how to understand the philosophy and implementation of each type of chart, so as to be able to represent the results visually.With the popularity of the R language, the art and practice of creating data visualizations is no longer the preserve of mathematicians, statisticians, or cartographers. As technology leaders, we can gather metrics around what we do and use data visualizations to communicate that information. Pro Data Visualization Using R and JavaScript combines the power of the R language with the simplicity and familiarity of JavaScript to display clear and informative data visualizations.Gathering and analyzing empirical data is the key to truly understanding anything. We can track operational metrics to quantify the health of our products in production. We can track quality metrics of our projects, and even use our data to identify bad code. Visualizing this data allows anyone to read our analysis and easily get a deep understanding of the story the data tells. This book makes the R language approachable, and promotes the idea of data gathering and analysis mostly using web interfaces.WHAT YOU WILL LEARN* Carry out data visualization using R and JavaScript* Use RStudio for data visualization * Harness Tidyverse data pipelinesApply D3 and R Notebooks towards your data * Work with the R Plumber API generator, Shiny, and moreWHO THIS BOOK IS FORProgrammers and data scientists/analysts who have some prior experience with R and JavaScript.Tom Barker is an engineer, a professor and an author. Currently he is Sr Manager of Web Development at Comcast, and an instructor at Philadelphia University. He has authored several books on web development including Pro JavaScript Performance: Monitoring and Visualization, and Pro Data Visualization with JavaScript and R.Matthew Campbell has worked on data visualization and dashboards with a data science team using RStudio. He got his start with technology after college when he learned SAS to do statistical programming at the Educational Testing Service (ETS). Learning this programming language kicked off a lifelong obsession with technology.1. Exploring Data Visualization2. RStudio3. Tidyverse Data Pipelines4. Data Visualization with D35. Comparing Groups with Bar Charts6. Correlation Analysis with Scatter Plots7. Datetime Trend Data with Line Charts8. Visual Presentations with D3 and R Notebooks9. Interactive Dashboards with D3 and Shiny10. Visualization on the Web with D3 and R Plumber API Generator
macOS Daemonology
Take advantage of the full power of Swift through XPC. Development for macOS differs from iOS and web-based development because of multicomponent applications. Besides the usual GUI-based applications and app extensions, there are a wide range of daemons—processes that run in the background—to worry about. These include system monitoring, event listening, notification agents, and many-many more.First, you'll take a tour around different types of daemons: user agents, privileged helpers, login items, XPC services, and System Extensions. Knowing key specifics of the daemons will open a wide range of possibilities from non-trivial application development to system development. You'll find lots of examples, working code samples, and even ready-to-use utilities. The book will guide you step-by-step through preparation, registration, and management of all kinds of daemons.System Extensions are brand new for macOS and open additional powerful features for developers. You'll explore installation, user flow, and communication with System Extensions, too, with examples, of course. XPC provides an object-oriented way of communication. There’s no need for custom byte/text-based protocols. A good macOS developer has to know not only programming interfaces, but also design patterns related to technology. XPC communication has a few patterns of its own, and we'll go through them all, including uni- and bi-directional communication, passing objects by-value and by-proxy, handling connection invalidation, named and anonymous connections, and many more.WHAT YOU'LL LEARN* Use multiples types of daemons in your applications* Deal with System Extensions – the new type of system daemons* Get acquainted with Swift bridging patterns for XPC communicationWHO THIS BOOK IS FORSoftware developers and solution architects with at least a working knowledge of macOS and Swift programming. As overview, may be interested for software/solution architects.VOLODYMYR VASHURKIN (@ALKENSO) is an experienced macOS system and security developer and engineer. His first steps in daemonology were made while researching FileVault full disk encryption on macOS, and its interaction with iCloud services. iCloud on macOS uses plenty of system daemons and user agents, and investigating macOS’s infrastructure led to a solid understanding of how the background world of macOS works. This led him deeply into the development of security solutions for macOS. Working in the security area, Volodymyr gained practical skills for creating GUI-based applications with fewer user agents (user background processes) and root daemons (root'ed background processes). In developing his knowledge and skills, Volodymyr faced numerous tricky cases, lack of documentation, and minor and major documentation gaffes. He would like to help his readers avoid the same pitfalls. PART 1. DAEMONS: OVERVIEW & MANAGEMENTCHAPTER 1. DAEMONS AT A GLANCETHE OPERATING SYSTEM BACKGROUND WORLDDIFFERENT TYPES OF DAEMONSCHAPTER 2. LAUNCHD AND LAUNCHD JOBSLAUNCHD FUNCTIONAL RELATED TO DAEMONSDAEMONS' CONFIGURATION (.PLIST FILES).CHAPTER 3. LAUNCHCTLSETUP AND MANAGE DAEMONSLAUNCHCTL TOOL IN DETAILSWIFT API FOR DAEMONS MANAGEMENTPART 2. DAEMONS IN DETAILCHAPTER 4. CHOOSE THE RIGHT DAEMON FOR YOUCOMPARING DAEMON TYPESPICKING A DAEMON TYPE BASED ON NEEDSCHAPTER 5. CLASSIC DAEMONSWHAT IS A CLASSIC DAEMON?ROOT BACKGROUND PROCESSESCHAPTER 6. USER AGENTSSPECIFICS OF USER AGENTSUSER BACKGROUND PROCESSESCHAPTER 7. XPC SERVICESTHE SIMPLEST DAEMONWORKING WITH XPC SERVICESCHAPTER 8. PRIVILEGED HELPERSSPECIAL DAEMONSTHE OFFICIAL AND MODERN WAY OF PRIVILEGE ESCALATION IN MACOSCHAPTER 9. LOGIN ITEMSUSER AGENT LOGINITEMAPIS RELATED TO LOGINITEMCHAPTER 10. SYSTEM EXTENSIONS (SINCE MACOS 10.15)BRAND NEW DAEMON TYPESSYSTEM EXTENSIONENDPOINTSECURITY.FRAMEWORKREQUIRED ENTITLEMENTSSPECIFIC INSTALLATIONMANAGEMENTPART 3. TALKING TO DAEMONSCHAPTER 11. XPC COMMUNICATIONEXAMPLES OF XPC COMMUNICATION BETWEEN PROCESSESCORNER CASESPASSING OBJECTS BY-PROXYUSING NSPROGRESS WITHIN XPCOTHER DETAILSCHAPTER 12. XPC SECURITYNOTES AND RECOMMENDATIONSSECURING XPC COMMUNICATION BETWEEN PROCESSESCODE SIGNINGCHAPTER 13. XPC AND SWIFTADOPTING XPC COMMUNICATION TO SWIFTPASSING STRUCTURES OVER XPCWORKING WITH CALLBACKS INSTEAD OF DELEGATESPART 4. SPECIFICS AND NUANCESCHAPTER 14. USERAGENTS AND SANDBOXS (APPSTORE COMPATIBLE)USE USERAGENTS AS PART OF SANDBOXED APPLICATIONSAPPSTORE COMPATIBILITY
Transforming Your Business with AWS
EXPERT GUIDANCE ON HOW TO USE AMAZON WEB SERVICES TO SUPERCHARGE YOUR DIGITAL SERVICES BUSINESSIn Transforming Your Business with AWS: Getting the Most Out of Using AWS to Modernize and Innovate Your Digital Services, renowned international consultant and sought-after speaker Philippe Abdoulaye delivers a practical and accessible guide to using Amazon Web Services to modernize your business and the digital services you offer. This book provides you with a concrete action plan to build a team capable of creating world-class digital services and long-term competitive advantages.You'll discover what separates merely average digital service organizations from the truly outstanding, as well as how moving to the cloud will enable your business to deliver your services faster, better, and more efficiently.This book also includes:* A comprehensive overview of building industry-leading digital service delivery capabilities, including discussions of the development lifecycle, best practices, and AWS-based development infrastructure* Explanations of how to implement a digital business transformation strategy* An exploration of key roles like DevOps Continuous Delivery, Continuous Deployment, Continuous Integration, Automation, and DevSecOps* Hands-on treatments of AWS application management tools, including Elastic Beanstalk, CodeDeploy, and CodePipelinePerfect for executives, managers, and other business leaders attempting to clarify and implement their organization's digital vision and strategy, Transforming Your Business with AWS is a must-read reference that answers the "why" and, most importantly, the "how," of digital transformation with Amazon Web Services.PHILIPPE ABDOULAYE is an international digital business transformation consultant. He advises business and IT leaders on how to take advantage of digital technologies to grow and prosper. He is a sought-after speaker for technology conferences around the world and has authored seven books on digital transformation and digital technologies.Introduction xxviiPART I UNDERSTANDING THE DIGITAL TRANSFORMATION CHALLENGES 1CHAPTER 1 THE DIGITAL ECONOMY’S CHALLENGES, OPPORTUNITIES, AND RELEVANCE OF AWS 3Understanding the Digital Economy’s Impacts 4Surviving Disruptions Are Your Business’s Primary Challenge 4Understanding the Digital Economy’s Opportunities 4Surviving the Disruptions: The AWS Solutions 5The AWS Universal Architecture: Simplifying AWS Understanding 5Navigating AWS IaaS Building Block 6AWS Compute Resources 7AWS Network Resources 8AWS Storage Resources 9Understanding Essential AWS PaaS Tools 10AWS Elastic Beanstalk 10AWS CodeDeploy 10AWS CodePipeline 11Understanding Innovation with AWS: Machine Learning, Internet of Things, and Elastic MapReduce 11AWS Machine Learning 11AWS Internet of Things 12Amazon Elastic MapReduce 12Understanding the AWS Integration Building Block 13Site-to-Site VPN 13Hybrid Cloud with VMware Cloud on AWS 13Changes in the AWS Implementation Paradigm 14Lift-and-Shift Migration is a Problem 14Failure Factors Making Lift-and-Shift Irrelevant 14Understanding the Benefits of Enterprise Architecture for AWS 15Key Takeaways 16References 16CHAPTER 2 WHAT IS A DIGITAL PRODUCT? 17Differences Between Digital Products and Digital Services 17Digital Service Delivers Information 18Digital Product Exists in Intangible Formats 18Anatomy of the Digital Product 18The Digital Product’s Technology Stack 18The 4G/5G Services 19Cloud Computing Services: Innovation as a Service 20Smart Mobile Devices 24Impacts on Digital Product and Service Development 24The Growing Complexity of the Technological Stack 24Technology Innovation Alone Isn’t Enough Anymore 25Key Takeaways 25References 26CHAPTER 3 DIGITAL PRODUCT AND SERVICE DEVELOPMENT CHALLENGES 27What is Digital Product and Service Development? 28Digital Product and Service Development Defined 28How is Digital Product and Service Development Performed? 28Ideation 29Concept 30Business Case 30Development 30Testing 31Launch 31Digital Product and Service Development Approach Evaluation 31Understanding the Digital Product and Service Development Assessment Framework 32Assessment Framework Overview 32The Context Elements 33The Performance Enablers 33The Digital Transformation Solutions 34Assessing Current Digital Product and Service Development 35What is a Digital Product and Service Development Platform? 35Capturing Business Context 37Evaluating Your Digital Operating Model 37Evaluating Your Technical Platform 38Evaluating Your Organizational Model 40Assessing Your Human Capital 41Challenges of Current Digital Product Development 42Focus on Digital Product and Service Development 42Accurate Customer Insights 43Competitive Pricing 43Premium Customer Experience 43Rapid Go-to-Market 44Key Takeaways 44References 44CHAPTER 4 INDUSTRIALIZING DIGITAL PRODUCT AND SERVICE DEVELOPMENT 47The Total Quality Management and Mass Production Heritage 48Total Quality Management Principles Defined 48Customer Focus 48Workforce Commitment 49Process Approach 49Integrated System 49Continual Improvement 49Transversal Communication 49Mass Production Principles Defined 49Assembly Line 50Work Specialization 50Automation 50Industrialization Factors 50Industrialization Factor Defined 50Families of Industrialization Factors 51Principles Family 51Design Patterns Family 52Methodology Family 52Technology Family 53Understanding DevOps as the Framework for Implementing Your Digital Product and Service Development Platform 54DevOps Defined 54Understanding DevOps Components 54Software Delivery Lifecycle’s Importance 54DevOps Practices Purpose 56Methodologies Benefit 58DevOps Toolchain Importance 63AWS Industrialization Factors 64Understanding AWS Design Patterns: The Enterprise Cloud Migration Pattern 64Defining AWS Enterprise Cloud Migration Pattern 65Understanding the Baseline Architecture Purpose 66AWS Methodology 66Defining AWS Well-Architected Framework 66Understanding the Industrialization Matrix for AWS 70Key Takeaways 73References 73PART II DIGITIZING THE BUSINESS MODEL USING AWS 75CHAPTER 5 THE J&S FOOD DIGITAL TRANSFORMATION PROJECT 77History of J&S Food, Inc. 77Company’s Evolution 78Territorial Conquest 78Diversification 79Company’s Culture 79Productivity 80Effectiveness 80Innovation 80Technology 81Transformation Journey’s First Stage: Planning the Transformation 81The Kickoff Meeting 82Understanding the Grocery Sector’s Digital Disruption Impacts on J&S Food 82Capturing and Analyzing the Factors Driving the Grocery Sector Disruption 84Discussing and Agreeing on the Factors Affecting J&S’s Food Business 87Developing and Sharing J&S Food’s Digital Mission and Digital Strategy 90Defining J&S Food’s Mission 90Developing J&S Food’s Digital Strategy 91Developing J&S Food’s Digital Transformation Roadmap 94Digital Transformation Roadmap Defined 94Developing a Digital Transformation Roadmap 96Understanding J&S Food’s Digital Transformation Roadmap 98The J&S Food Digital Transformation Project’s Statement of Work 99The Statement of Work Defined 99Introduction/Background 99Scope of Work 100Work Requirements 100Schedule/Milestones 101Acceptance Criteria 101Other Requirements 101The Next Step 102Key Takeaways 102References 102CHAPTER 6 RETHINKING J&S FOOD’S BUSINESS 103Transformation Journey’s Second Stage: Rethinking the Business 104Understanding J&S Food’s Current Business 105Capturing the Current Business Model 105Understanding Use Cases 106Understanding Actors 106Understanding Links 106The Current Business Model Captured 106Buy 107Fulfill Order 108Pay 109Perform Customer Service 109Manage Supply Chain 110Maintain Website 111Develop Food Product 112Understanding J&S Food’s Current Data Model 112Assessing the As-Is Operational Model 113Digital Food Experience Defined 113Assessing J&S Food’s Operational Model 114Defining the Digital Smart Shopping Bag 116Optimizing the Fulfill Order Experience Based on a Two-SidedMarketplace Platform 117Enhancing Online Order Experience Using a Mobile App 118Implementing a Digital Products and Services Development Platform 118Defining the Future Digital Business Model 118Reconfiguring J&S Food’s Operational Model 119Understanding Michael Porter’s Value Chain 119The Value Chain for Digital Business Defined 121J&S Food’s Digital Business Model Defined 123Understanding J&S Food’s Next Digital Value Chain 123Support Digital Business Activities 123Primary Digital Business Activities 124Understanding J&S Food’s AWS Cloud Platform 126J&S Food’s AWS Software as a Service 126The J&S Food’s Platform as a Service 126The J&S Food’s AWS Virtual Infrastructure 126Integrating J&S Food’s Digital Operational Model with the Organization 127The Digital Business Value Chain: A Shortcut to the Digital Business Organization 127Digital Business Organizational Model Defined 127Developing the Digital Business Organizational Model 128The J&S Organizational Model Defined 130Roles and Responsibilities 130Interaction and Collaboration Mechanisms 132Key Takeaways 132References 133CHAPTER 7 DIGITIZING J&S FOOD’S BUSINESS MODEL USING AWS—IMPLEMENTING THE VPC 135Transformation Journey’s Third Stage: Digitizing the Business Model 136Defining J&S Food’s AWS Migration Strategy 137Sharing J&S Food’s Digital Business Model 138Defining the J&S Food’s Digital Business Application Portfolio 139Specifying J&S Food’s Virtual Private Cloud Architecture 141Understanding the Enterprise Cloud Migration Model For AWS 141J&S Food’s Virtual Private Cloud Specified 141The Availability Zone 142Amazon CloudFront and the Content Delivery Network 143J&S Food’s Virtual Private Cloud 143J&S Food’s Extended Elastic Compute Cloud Building Block 145J&S Food’s Extended Storage Build Block 149J&S Food’s Extended Fault Tolerance Building Block4 150J&S Food’s Extended Security Build Block 151Executing J&S Food’s AWS Migration Strategy 152Understanding the AWS Application Migration Process 152Discover 152Design 152Build 153Integrate 153Validate 153Cutover 153Migrating J&S Food’s Ecommerce Website Into a Two-Sided Marketplace Platform 154Implementing J&S Food’s Virtual Private Cloud 154Discovering the Ecommerce Website Three-Tier Architecture 155Extending the Ecommerce Website Architecture to a Two-Sided Marketplace Platform 157Implementing J&S Food’s Two-Sided Marketplace Platform 161Validating the Two-Sided Marketplace Platform 165Key Takeaways 165References 166CHAPTER 8 IMPLEMENTING J&S FOOD’S DEVOPS PLATFORM USING AWS PAAS 167Transformation Journey’s Third Stage: Implementing J&S Food’s DevOps Platform 168Understanding What J&S Food is Trying to Achieve 169Understanding the DevOps Implementation in the AWS Computing Environment 169Discussing the Challenges 170Understanding the Common Mistakes 171The DevOps Implementation Framework for AWS 171The Digital Business Value Chain Primary Activities and AWS Modern Application Influence 172The AWS CodePipeline Service 173Understanding DevOps Implementation for AWS 175Implementing J&S Food’s Digital Product and Service Development Platform 177J&S Food’s Digital Product and Service Development Platform 177J&S Food’s DevOps Toolchain 178J&S Food’s Digital Business Primary Activities 180Designing the Agile Operating Model 181The Usual Challenges and Solutions 181J&S Food’s Agile Operating Model Defined 182Key Takeaways 183References 184CHAPTER 9 DEVELOPING J&S FOOD’S INNOVATION AS A SERVICE PLATFORM USING AWS 185Transformation Journey’s Third Stage: Developing J&S Food’s Innovation as a Service 185Software Engineering Methodology for Innovations Development in the AWS Cloud 186Software Engineering Methodology for Innovations Development 187Driving Principles Explained 187Key Concepts to Understand 189Understanding the Innovative Digital Product Development Lifecycle 193The Five-Step Development Lifecycle 193Specifying the Innovative Digital Product Using a UML Use Case Diagram 194Designing the Innovative Digital Product Using a UML Package Diagram 196Prototyping the Microservices Using AWS Amplify 197Developing and Deploying the Application Supporting the Innovative Digital Product 198Implementing the Microservices Architecture of the Digital Product and Service 200The User Interface Microservices 201The Business Logic Microservices 201The Technology Microservices 201Key Takeaways 202References 202PART III DEVELOPING WORLD-CLASS DIGITAL PRODUCTS AND SERVICES USING AWS 205CHAPTER 10 J&S FOOD’S SMART SHOPPING BAG DIGITAL PRODUCT PROJECT 207Transformation Journey’s Fourth Stage: Experimenting with the Digital Business Model 208The Smart Shopping Bag Project Overview 208The Smart Shopping Bag Project’s Organization 209The Smart Shopping Bag Project’s Opportunity Statement 209The Smart Shopping Bag Project’s Objectives 210The Smart Shopping Bag Project’s Scope 210The Pilot Project Management 211Key Takeaways 211References 212CHAPTER 11 SPECIFYING J&S FOOD’S SMART SHOPPING BAG DIGITAL PRODUCT 213Transformation Journey’s Fourth Stage: Specification of the Smart Shopping Bag Digital Product 213Specifying the Smart Shopping Bag Digital Product’s Scope 214Using Context Diagrams to Improve the Specification Process 215Developing the Smart Shopping Bag’s Context Diagram 215J&S Food’s Stores IoT Infrastructure 215J&S Food’s AWS IoT Core Platform 216Developing the Smart Shopping Bag Use Case Diagram 216Identifying the Smart Shopping Bag’s Actors and Use Cases 218Specifying the Smart Shopping Bag’s Functions Using Sequence Diagrams 221Use Case Description: Press Start to Begin Shopping 221Use Case Description: Respond to In-Store Customer Button Presses 222Use Case Description: Detect Product Code Put in the Bag 223Use Case Description: Send EEPROM Data to Billing System 225Use Case Description: Respond to RFID Reader Queries 226Use Case Description: Calculate the Bill Amount 226Specifying the Smart Shopping Business Rules Using Class Diagram 228The In-Store Customer 228The Smart Shopping Bag 230The RFID Reader 230The Product RFID Tag 230The Smart Mobile Device 231The Shopping Session 231The Smart Shopping Service 231The Smart Shopping Bag Application 231Key Takeaways 232References 232CHAPTER 12 DESIGNING J&S FOOD’S SMART SHOPPING BAG DIGITAL PRODUCT 233Transformation Journey’s Fourth Stage: Designing the Smart Shopping Bag Digital Product 233The Agile Operational Model Confirmed as the Foundation of J&S Food’s Work Organization 234J&S Food’s New Organization of Work 234The Princeton’s Digital Product Development Team Defined 235UML Package Diagram Facilitates the Microservices Architecture Design Process 237Lucidchart Confirmed as the Best Architecture Tool 237Overall Feedback 237The Resulting Smart Shopping Bag’s Architecture 238The Smart Shopping Bag Blueprint 239The In-Store Customer Package 240The Shopping Session Package 240The Smart Shopping Bag Package 241Acquired Digital Business Competency: Digital Products and Services Architecture Design 241Key Takeaways 241References 242CHAPTER 13 PROTOTYPING J&S FOOD’S SMART SHOPPING BAG USING INNOVATION AS A SERVICE 243Transformation Journey’s Fourth Stage: Prototyping the Smart Shopping Bag’s Application 244Sharing the Prototyping Process Goal and Approach 245Prototyping Using AWS Amplify Defined 245The Prototyping Iterations Using AWS Amplify 245The Prototyping Team 251The Team’s Feedback 252The Smart Shopping Bag Application Prototype 253The Business Logic, Technological, and UI Microservices Prototyped 255The Microservices Development Process in the AWS Amplify Context 255Defining the Microservices Granularity 256The Smart Shopping Bag Business Logic Microservices Implemented 257The Smart Shopping Bag Business Logic Microservices Documented 257The Smart Shopping Bag Technological Innovation Microservices Implemented 259IoT Gateway Microservices 259AWS IoT Core Microservices 261RFID Reader Microservices 263RFID Tag Microservices 265The Smart Shopping Bag UI Microservices Implemented 265Key Takeaways 266References 267CHAPTER 14 IMPLEMENTING J&S FOOD’S SMART SHOPPING BAG APPLICATION 269Transformation Journey’s Fourth Stage: Implementing the Smart Shopping Bag’s Production Release 270The Smart Shopping Bag App: Production Release 270Blueprint of the Smart Shopping Bag in Production 270Understanding the Production Release Building Blocks 271Application Layer 271AWS Innovation Layer 273AWS Virtual Infrastructure Layer 274Understanding the Pivotal Role Played by Agile Methodologies 275The Architectural Spike and Prototyping Benefits 275The Importance of Scrum Sprints in the Incremental Development Effort 275Understanding the Vital Role of the Daily Scrums 276The Development Team’s Feedback: Lessons Learned 277Key Takeaways 278References 278CHAPTER 15 LAUNCHING J&S FOOD’S FIRST DIGITAL FOOD PRODUCT 279Transformation Journey’s Fourth Stage: Deploy J&S Food’s Digital Business 279Defining J&S Food’s Go-To-Market Strategy 280The Go-To-Market Strategy Defined 281Articulating J&S Food’s Go-To-Market Strategy 281The Objectives Questionnaire 282The Value Propositions Questionnaire 282The Key Processes to Stress Questionnaire 282The Organizational and Technological Assets to Stress Questionnaire 282J&S Food’s Go-To-Market Strategy Defined 282Understanding J&S Food’s Go-To-Market Strategy 283Declaring J&S Food’s Digital Business Opened 284Key Takeaways 284References 285CHAPTER 16 MAINTAINING AND SUPPORTING J&S FOOD’S DIGITAL BUSINESS ON A DAILY BASIS 287The New J&S Food Day-to-Day Business 287J&S Food’s Customer Value Creation Virtuous Circle 288J&S Food’s Virtuous Circle for Creating Customer Value 288Customer Insights Management on a Daily Basis 289J&S Food’s AWS EMR Infrastructure 289Business Data Providers 290Data Lake 290Data Warehouse 290Data Mart 290The Big Data Analytics Activity in the Customer Insights Management Team 291Customer Value Increase Management’s Day-to-Day Operations 292J&S Food’s AI/ML Development Environment 292Generate Data 293Train Models 293Deploy Models 294The Customer Increase Value Management Team’s Activity 294Digital Product and Service Releases Development 295Defining Product Backlog 295Sprint Planning 296Sprint Execution 296Key Takeaways 296References 297Index 299
FRITZ!Box - Der umfassende Ratgeber (2. Auflg.)
Die ganze Power der FRITZ!Box nutzen. Der umfassende Ratgeber in 2. Auflage, September 2021.Erfahren Sie alles, was Sie zum sicheren Umgang mit der FRITZ!Box wissen müssen! Verständlich erklärt und reich bebildert hilft Ihnen dieses Buch bei der Kaufentscheidung. So finden Sie das richtige Modell, das perfekt zu Ihren persönlichen Ansprüchen passt. Dennis Rühmer zeigt Ihnen, worauf Sie bei der Ersteinrichtung achten sollten. Er führt Sie Schritt für Schritt durch die zahlreichen Funktionen und Einsatzmöglichkeiten, ob (Mesh-)WLAN, Telefonie oder die Steuerung eines Smart Homes. So lernen Sie, wie Sie Ihren Router richtig konfigurieren und ein sicheres Heimnetzwerk einrichten.Aus dem Inhalt:Die FRITZ!Box stellt sich vorDas richtige Modell auswählen3... 2... 1: der erste StartDie Benutzeroberfläche verstehenDie NetzwerkfunktionenKabellos glücklich - alles rund ums WLANReichweite vergrößer: Mesh, AccessPoints und Repeater einrichtenRuf doch mal an - TelefoniefunktionenErweiterte Systemfunktionen
JavaScript - Das umfassende Handbuch
Das Lehr- und Nachschlagewerk zu JavaScript!Ein umfassender Einstieg in JavaScript, viele praktische Beispiele und eine Darstellung auch von professionellen Techniken – das zeichnet dieses unverzichtbare Handbuch aus. Lernen Sie JavaScript von Grund auf und nutzen Sie dieses Buch als Nachschlagewerk für die tägliche Entwicklungsarbeit. Auch fortgeschrittene Aspekte wie Objektorientierung und funktionale Programmierung werden berücksichtigt. Die schnellen und praxisnahen Beispielanwendungen können Sie sofort in eigenen Projekten einsetzen. Nebenbei erfahren Sie mehr über aktuelle Trends und Entwicklungen, z. B. den Einsatz bei Mikrocontrollern und den serverseitigen Einsatz von JavaScript (Node.js). Aus dem Inhalt: Grundlagen und SprachkernMit Referenztypen arbeitenWebseiten dynamisch verändernEreignisse verarbeiten und auslösenFormulare verarbeitenBrowserinformationen verarbeitenSeiteninhalte dynamisch verarbeitenAufgaben vereinfachen mit jQueryBilder dynamisch erstellenModerne Web-APIs verwendenObjektorientierte ProgrammierungFunktionale Programmierung Autor: Philip Ackermann ist CTO der Cedalo GmbH und Autor mehrerer Fachbücher und Fachartikel über Java und JavaScript. Seine Schwerpunkte liegen in der Konzeption und Entwicklung von Node.js- und JEE-Projekten in den Bereichen Industrie 4.0 und Internet of Things. Leseprobe (PDF-Link)
Java Übungsbuch (2. Auflage)
Aufgaben mit vollständigen Lösungen für die Versionen Java 8 bis Java 17.Dieses Buch ist kein Lehrbuch, sondern ein reines Übungsbuch und wendet sich an Leser, die ihre Java-Kenntnisse anhand zahlreicher praktischer Übungen durch „Learning by Doing“ vertiefen und festigen möchten. Es ist ideal, um sich auf Prüfungen vorzubereiten oder das Programmieren mit Java praktisch zu üben.Jedes Kapitel beginnt mit einer kompakten Zusammenfassung des Stoffs, der in den Übungsaufgaben dieses Kapitels verwendet wird. Anschließend haben Sie die Möglichkeit, zwischen Aufgaben in drei verschiedenen Schwierigkeitsstufen – von einfach bis anspruchsvoll – zu wählen. Anhand dieser Aufgaben können Sie Ihr Wissen praktisch testen. Am Ende der Kapitel finden Sie vollständige und kommentierte Musterlösungen.Es werden folgende Themen abgedeckt:Die Kapitel 1 bis 3 enthalten Aufgaben zur objektorientierten Programmierung mit Java und die Neuerungen aus den Versionen 8 bis 13, die sich auf die neue Date&Time API, Textblöcke, Compact Strings und die Weiterentwicklung von Interfaces beziehen.In Kapitel 4 geht es im Detail um Generics und das Collection Framework mit all seinen generischen Klassen und Interfaces sowie mit der Definition von Enumerationen. Kapitel 5 erläutert das Exception Handling.Das Kapitel 6 beschäftigt sich mit den neuen Sprachmitteln von Java 8, Lambdas und Streams, sowie mit weiteren Neuerungen aus den Versionen 8 bis 13 wie Switch Expressions und Local Variable Type Inference.Kapitel 7 bietet einen Einblick in die mit Java 9 vorgenommene Modularisierung der Java-Plattform.Kapitel 8 enthält Aufgaben zu den Weiterentwicklungen aus den Versionen 14 bis 17, die sich auf die Java-Programmiersprache beziehen, dazu gehören die Einführung von Records und Sealed Classes sowie das Pattern Matching.Kapitel 9 enthält viele Aufgaben zu Tests mit JUnit 5 und Gradle sowie eine kurze theoretische Einführung in beide Systeme.Nach dem Durcharbeiten des Buches verfügen Sie über fundierte Programmierkenntnisse und einen umfangreichen Fundus an Beispielcode.Aus dem Inhalt:Klassendefinition und ObjektinstanziierungAbgeleitete Klassen und VererbungAbstrakte Klassen und InterfacesDie Definition von AnnotationenInnere KlassenGenerics und ReflectionTypprüfung und Typsicherheit in JavaLambdasMethoden- und Konstruktor-ReferenzenFunktionale InterfacesLocal Variable Type InferenceDefinition und Nutzung von StreamsDas Modulsystem von JavaRecords und Sealed TypesPattern Matching für den instanceof-OperatorPattern Matching für switchTests mit Junit 5 und Gradle