Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Teach Yourself VISUALLY Windows 11

Teach Yourself VISUALLY Windows 11

EVERYTHING YOU NEED TO KNOW ABOUT WINDOWS 11 IN A SINGLE, VISUAL BOOKTeach Yourself VISUALLY Windows 11 collects all the resources you need to master the day-to-day use of Microsoft’s new operating system and delivers them in a single resource. Fully illustrated, step-by-step instructions are combined with crystal-clear screenshots to walk you through the basic and advanced functions of Windows 11.Teach Yourself VISUALLY Windows 11 offers the best visual learning techniques with comprehensive source material about the interface and substance of Windows 11, as well as:* Stepwise guidance on working with files, digital pictures, and media* Instructions for customizing Windows 11 and sharing your computer with family members* Tutorials on installing and repairing applications, system maintenance, and computer securityThe fastest, easiest way for visual learners to get a grip on Windows 11, Teach Yourself VISUALLY Windows 11 is the best way to go from newbie to expert in no time at all.CHAPTER 1 GETTING STARTED WITH WINDOWSExplore the PC Screen 4Explore the Start Menu 5Start and Close an App 6Connect to Your Wireless Network 8Put Windows to Sleep 10Restart or Shut Down Windows 11Switch to a Microsoft Account 12Install an App 16Switch Between Running Apps 18Arrange Running Apps 20Uninstall an App 22CHAPTER 2 CUSTOMIZING WINDOWSPin an App to the Start Menu 26Open the Settings App 28Change the Lock Screen Background 30Choose a Lock Screen Status App 32Customize Syncing Between Devices 34Access an App’s Features 36Pin an App to the Taskbar 38Change the Theme 40Adjust the Volume 42Set the Time Zone 43Configure Windows to Work with Multiple Monitors 44Customize the Taskbar 46Work with Widgets 48Set Up Multiple Desktops 50CHAPTER 3 SURFING THE WEBOpen a Web Page 54Open a Web Page in a Tab 56Navigate Web Pages 58Find Text on a Page 59Navigate with the History List 60Change Your Startup Page 62Save Favorite Web Pages 64Take Advantage of the Favorites Bar 66Share a Web Page 68Search for Sites 70Download a File 72CHAPTER 4 SENDING AND RECEIVING EMAILLaunch the Mail App 76Configure Mail Settings 77Configure an Email Account 78Send an Email Message 80Format the Message Text 82Add a File Attachment 84Save a Draft of a Message 86Receive and Read Email Messages 88Reply to a Message 90Forward a Message 92Open and Save an Attachment 94Delete a Message 96Create a Folder for Saving Messages 98CHAPTER 5 GETTING SOCIAL WITH WINDOWSCreate a Contact 102Add Your Google Account 104Add Your iCloud Account 106View a Contact 108Edit a Contact 110Assign a Photo to a Contact 112Add Extra Fields to a Contact 114Filter the Contacts List 116Combine Multiple Profiles for a Contact 118View Your Calendar 120Add an Event to Your Calendar 122Create a Recurring Event 124Add an Event Reminder 125Send or Respond to an Event Invitation 126Customize Your Calendar 128CHAPTER 6 PERFORMING DAY-TO-DAY TASKS WITH APPSSearch Your PC 132Write a Note 134Make a To‐Do List 136Configure Skype 138Call Someone Using Skype 140Display a Location on a Map 142Get Directions to a Location 144Check Your Weather Forecast 146Check Another City’s Weather Forecast 148Perform Calculations 150Record a Voice Memo 152Set an Alarm 154CHAPTER 7 WORKING WITH IMAGESImport Images from a Digital Camera 158Scan an Image 160Navigate the Pictures Folder 162View Your Images 164Start a Slide Show 166Set an Image as the Photos App Tile 167Repair an Image 168Add a Photo Effect 170Crop an Image 172Rotate an Image 174Delete an Image 175Print an Image 176Take a Picture with Your PC Camera 178CHAPTER 8 WORKING WITH MULTIMEDIAImport Videos from a Digital Camera 182Navigate the Videos Folder 184Watch a Video 186Edit a Video 188Make a Movie 192Play a Music CD 196Copy Tracks from a Music CD 200Navigate the Music Folder 202Play Music 204Create a Playlist 206Switch Between Audio Devices 208CHAPTER 9 EDITING DOCUMENTSCreate and Save a Document 212Open a Document 214Change the Text Font 216Find Text 218Replace Text 220Insert Special Symbols 222Make a Copy of a Document 224Create a OneNote Notebook 226Add Pages and Sections to a Notebook 228Add Text Notes 230Add an Image to a Notebook Page 232Work with Notebook Lists 234Print a Document 236CHAPTER 10 WORKING WITH FILESSelect a File 240Change the File View 242Preview a File 243Copy a File 244Move a File 245Rename a File 246Create a New File 247Delete a File 248Restore a Deleted File 249Add a File to Your OneDrive 250Extract Files from a Compressed Folder 252Specify a Different Program When Opening a File 254CHAPTER 11 SHARING YOUR COMPUTERDisplay User Accounts 258Create a User Account 260Switch Between Accounts 262Change Your User Account Picture 264Change a User’s Password 266Delete an Account 268Add a Child to Your PC 270Set Restrictions on a Child Account 272CHAPTER 12 GETTING MORE FROM A TABLET PCUnderstanding Gestures 276Using Gestures to Control Windows 278Display the Touch Keyboard 280Input Text with the Touch Keyboard 282Customize the Touch Keyboard Size and Theme 284Adjust Screen Brightness 286Monitor Battery Life 287CHAPTER 13 IMPLEMENTING SECURITYUnderstanding Windows Security 290Check for Security Problems 292Create a Picture Password 294Sign In with a PIN 298Set Up a Fingerprint Sign‐In 300Lock Your Computer 302Configure Your PC to Lock Automatically 304Browse the Web Privately 306Control Your Private Information 308Clear Your Activity History 310CHAPTER 14 MAKING WINDOWS MORE ACCESSIBLEIncrease the Text Size 314Magnify Screen Areas 316Have Screen Text Read to You 318Change to a High‐Contrast Theme 320Apply a Color Filter 322Flash the Screen During Audio Notifications 324Make the Keyboard More Accessible 326Control Windows via Voice 328Index 330

Regulärer Preis: 20,99 €
Produktbild für Kultur und Innovation durch Raumkonzepte (2.Auflage)

Kultur und Innovation durch Raumkonzepte (2.Auflage)

Kultur und Innovation durch RaumkonzepteErfahren Sie, was Sie unbedingt beachten müssen, wenn Sie einen Innovationsraum in Ihrem Unternehmen aufbauen möchten.Lernen Sie, wie Sie die größte Wirkung erzielen, um Kreativität und Innovation zu fördern.Entdecken Sie, welche Möbel und Farben wie wirken, um agiles Vorgehen zu intensivieren. Mit vielen Beispielen, Interviews und Tipps von erfolgreichen Unternehmen und Profis aus der PraxisMit Einkaufsliste zur sofortigen UmsetzungIhr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesDas Buch ist für Führungskräfte und Mitarbeitende gedacht, die entschlossen sind, Kreativität und Innovation zu fördern und eine kollaborative Umgebung zu schaffen, die das Beste in den Menschen hervorbringt.Hier finden Sie sowohl praktische Umsetzungstipps von Profis aus verschiedenen Bereichen als auch Erklärungen zu kreativem Verhalten, Vorlagen und Ideen. Denn die Art, wie Unternehmen Räume gestalten, unterstützt (oder behindert) die Menschen bei ihrer kreativen Arbeit.Gerade in Sachen Innovation ist das Bedürfnis nach einem passenden Raum verständlich. Physische Räume sind aber mehr als bunte Arbeitsplätze und Ausdruck einer Innovationskultur: Sie fördern darüber hinaus Kreativität, agiles Vorgehen und Teamleistung.Wenn Sie einen Raum für Innovationen aufbauen, gibt es verschiedene Aspekte, die Sie beachten sollten, damit der Raum auch wirklich erfolgreich innerhalb des Unternehmens etabliert wird.(Leseprobe als PDF)

Regulärer Preis: 39,99 €
Produktbild für Datenvisualisierung mit Power BI

Datenvisualisierung mit Power BI

Visualisieren Sie Ihre Daten schnell und ausdrucksstark mit Power BI, um praktisch umsetzbare Ergebnisse zu erhalten. Alexander Loth und Peter Vogel zeigen Ihnen Schritt für Schritt, wie Sie ganz einfach visuelle Analysen erstellen und so selbst komplexe Datenstrukturen verstehen sowie gewonnene Erkenntnisse effektiv kommunizieren können.Das Buch richtet sich an die folgenden Zielgruppen:Alle, die Zugang zu Daten haben und diese verstehen möchtenFührungskräfte, die Entscheidungen auf Grundlage von Daten treffennAnalysten und Entwickler, die Visualisierungen und Dashboards erstellen angehende Data ScientistsZum Verständnis dieses Buches und dem Erwerb von Power BI Kenntnissen sind weder besondere mathematische Fähigkeiten noch Programmiererfahrung nötig. Es eignet sich daher auch für Einsteiger und Anwender, die sich dem Thema Datenvisualisierung und -analysepraxisbezogen nähern möchten, ohne ausschweifende theoretische Abhandlungen. Die grundlegenden Funktionen von Power BI werden Schritt für Schritt erläutert und Sie lernen, welche Visualisierungsmöglichkeiten wann sinnvoll sind. Die Autoren zeigen Fallbeispiele auf, die weit über eine »Standardanalyse« hinausreichen und gehen auf Funktionen ein, die selbst erfahrenen Nutzern oft nicht hinlänglich bekannt sind. Sie geben Ihnen außerdem wertvolle Hinweise und Tipps, die das Arbeiten mit Power BI merklich erleichtern. So können Sie zukünftig Ihre eigenen Daten bestmöglich visualisieren und analysieren.Aus dem Inhalt:Einführung und erste Schritte in Power BIDatenquellen in Power BI anlegenVisualisierungen erstellenAggregationen, Berechnungen und ParameterDimensionsübergreifende Berechnungen mit DAX-AusdrückenMit Karten zu weitreichenden ErkenntnissenTiefgehende Analysen mit Trends, Prognosen, Clustern und VerteilungInteraktive DashboardsAnalysen teilenLeseprobe (PDF-Link)

Regulärer Preis: 29,99 €
Produktbild für More Java 17

More Java 17

Work with the essential and advanced features of the Java 17 release. This book covers features such as annotations, reflection, and generics. These topics are then complemented by details of how to use lambda expressions, allowing you to build powerful and efficient Java programs. Furthermore, added to this edition you'll find topics on network programming, Java RMI, the process API, and custom runtime images. The authors provide a multitude of diagrams and complete programs to help you visualize and better understand the topics covered in this book.More Java 17, Third Edition starts with a series of chapters on the essential language features provided by Java before moving on to Java module development and packaging, and improved interop with other languages. After reading this book, you'll have the know-how of a professional Java programmer and be able to tackle most projects with confidence.This book's source code can be accessed at github.com/Apress/more-java-17.WHAT YOU WILL LEARN* Use essential and advanced features of the Java language* Code Java annotations* Work with reflection and generics* Manage streams with the Stream APIWHO THIS BOOK IS FORThose new to Java programming who are continuing the Java learning journey; it is recommended that you read an introductory Java programming book first, such as Java 17 for Absolute Beginners, from Apress.KISHORI SHARAN has earned a master of science in computer information systems degree from Troy State University, Alabama. He is a Sun Certified Java 2 programmer. He has vast experience in providing training to professional developers in Java, JSP, EJB, and web technology. He possesses over ten years of experience in implementing enterprise-level Java applications.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects. In 2016, he decided to concentrate on writing books on various aspects, but with a main focus on software development. With two books about graphics and sound processing, three books on Android app development, and a beginner’s book on Jakarta EE development, the author continues his effort in writing software development-related literature.1. Annotations2. Inner Classes3. Reflection4. Generics5. Lambda Expressions6. Threads7. Input Output8. Working with Archive Files9. New Input Output NIO10. New Input Output 2.011. Garbage Collection12. Collections13. Streams14. Implementing Services15. The Module API16. Breaking Module Encapsulation17. Reactive Streams18. Stack Walking19. Network Programming20. JDBC API21. Java Remote Method Invocation22. Java Native Interface23. Process API24. Packaging Modules25. Custom Runtime Images

Regulärer Preis: 79,99 €
Produktbild für API Marketplace Engineering

API Marketplace Engineering

This is your hands-on guide to designing, building, and operating an API Marketplace to allow your organization to expose internal services and customer data securely for use by external developers. The book shows the mutual nature of a relationship in which organizations benefit from revenue and the reach of a new digital channel and third-party developers benefit from leveraging APIs to build unique applications.Providing open access is a regulatory requirement in some sectors, such as financial services, and this book helps you to build a platform to comply with regulatory requirements while at the same time encouraging and supporting use by external development teams. The book provides the blueprints for assembling teams and systems to build and support an API ecosystem. It offers insight into how the Marketplace can be constructed in a way to allow agility and flexibility to meet aggressive startup developer timelines while balancing established enterprise requirements of stability, reliability, and governance. The goal of this book is to provide engineering teams with a view of the operational requirements and how to meet and exceed these by establishing foundational elements at design time.An API Marketplace presents a unique challenge as organizations have to share internal capability and customer data with external developers. Security practices and industry standards are contrasted and discussed in this book. Practical approaches are provided to build and support a third-party developer ecosystem, manage sandbox environments hosting APIs of varying complexities, and cover monetization strategies that are yielding positive results to achieve self-sustainability.WHAT YOU WILL LEARN* Understand the motivation and objectives for an API economy* Build key technical components of an API platform* Comply with regulatory requirements such as Open Banking* Secure APIs and customer data from external attack* Deliver APIs quickly while satisfying governance requirements* Get insight into a real-world API Marketplace implementationWHO THIS BOOK IS FORSolution architects, API product owners, delivery and development leads, and developers; anyone developing APIs for consumption by external business partners; API developers who want more insight into regulatory complianceRENNAY DORASAMY has spent the last 20 years in various technology roles, ranging from development to operations to architecture, across a number of industries. He has worked in telecoms, with government, and most recently in financial services. He has considerable hands-on integration experience working on middleware platforms from C-based messaging to Java Enterprise Edition. He is experienced in both core enterprise and digital contexts. As a full-stack engineer, he is intimately familiar with technologies such as containerization, cloud, and serverless technology for building and deploying mission-critical solutions. He is currently the Engineering Lead of an API Marketplace implementation, the first of its kind in financial services on the African continent. 1. API Engineering2. Regulation3. Consumption4. Monetization5. Platform Architecture6. Security7. API Design8. API Development9. Sandbox10. API Operations11. Conclusion

Regulärer Preis: 62,99 €
Produktbild für Cybersecurity Risk Management

Cybersecurity Risk Management

CYBERSECURITY RISK MANAGEMENTIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fundamentals of cybersecurity risk planning and management. The book offers readers easy-to-understand overviews of cybersecurity risk management principles, user, and network infrastructure planning, as well as the tools and techniques for detecting cyberattacks. The book also provides a roadmap to the development of a continuity of operations plan in the event of a cyberattack. With incisive insights into the Framework for Improving Cybersecurity of Critical Infrastructure produced by the United States National Institute of Standards and Technology (NIST), Cybersecurity Risk Management presents the gold standard in practical guidance for the implementation of risk management best practices. Filled with clear and easy-to-follow advice, this book also offers readers:* A concise introduction to the principles of cybersecurity risk management and the steps necessary to manage digital risk to systems, assets, data, and capabilities* A valuable exploration of modern tools that can improve an organization’s network infrastructure protection* A practical discussion of the challenges involved in detecting and responding to a cyberattack and the importance of continuous security monitoring* A helpful examination of the recovery from cybersecurity incidentsPerfect for undergraduate and graduate students studying cybersecurity, Cybersecurity Risk Management is also an ideal resource for IT professionals working in private sector and government organizations worldwide who are considering implementing, or who may be required to implement, the NIST Framework at their organization. CYNTHIA BRUMFIELD is the President of DCT Associates and a veteran media, communications, and technology analyst who is now focused on cybersecurity. Backed by executive-level experience at top-tier U.S. communications trade associations, a premier investment analysis firm, and her own successful publication and consulting businesses, she has spearheaded research, analysis, consulting, publishing, and education initiatives for major organizations, including Fortune 500 corporations, security organizations, and federal government clients. In addition, she is an award-winning writer who currently runs a pioneering cybersecurity news destination, Metacurity, and writes regularly for top news outlets, including ongoing columns for CSO Online.BRIAN HAUGLI is the Managing Partner and Founder of SideChannel. He has been driving security programs for two decades and brings a true practitioner’s approach to the industry. He has led programs for the DoD, Pentagon, Intelligence Community, Fortune 500, and many others. In addition, Brian is a renowned speaker and expert on NIST guidance, threat intelligence implementations, and strategic organizational initiatives. Academic Foreword xiiiAcknowledgments xvPreface – Overview of the NIST Framework xviiBackground on the Framework xviiiFramework Based on Risk Management xixThe Framework Core xixFramework Implementation Tiers xxiFramework Profile xxiiOther Aspects of the Framework Document xxiiiRecent Developments At Nist xxiiiCHAPTER 1 CYBERSECURITY RISK PLANNING AND MANAGEMENT 1Introduction 2I. What Is Cybersecurity Risk Management? 2A. Risk Management Is a Process 3II. Asset Management 4A. Inventory Every Physical Device and System You Have and Keep the Inventory Updated 5B. Inventory Every Software Platform and Application You Use and Keep the Inventory Updated 9C. Prioritize Every Device, Software Platform, and Application Based on Importance 10D. Establish Personnel Security Requirements Including Third-Party Stakeholders 11III. Governance 13A. Make Sure You Educate Management about Risks 13IV. Risk Assessment and Management 15A. Know Where You’re Vulnerable 15B. Identify the Threats You Face, Both Internally and Externally 16C. Focus on the Vulnerabilities and Threats That Are Most Likely AND Pose the Highest Risk to Assets 17D. Develop Plans for Dealing with the Highest Risks 18Summary 20Chapter Quiz 20Essential Reading on Cybersecurity Risk Management 22CHAPTER 2 USER AND NETWORK INFRASTRUCTURE PLANNING AND MANAGEMENT 23I. Introduction 24II. Infrastructure Planning and Management Is All about Protection, Where the Rubber Meets the Road 24A. Identity Management, Authentication, and Access Control 251. Always Be Aware of Who Has Access to Which System, for Which Period of Time, and from Where the Access Is Granted 272. Establish, Maintain, and Audit an Active Control List and Process for Who Can Physically Gain Access to Systems 283. Establish Policies, Procedures, and Controls for Who Has Remote Access to Systems 284. Make Sure That Users Have the Least Authority Possible to Perform Their Jobs and Ensure That at Least Two Individuals Are Responsible for a Task 295. Implement Network Security Controls on All Internal Communications, Denying Communications among Various Segments Where Necessary 31A Word about Firewalls 316. Associate Activities with a Real Person or a Single Specific Entity 327. Use Single- or Multi-Factor Authentication Based on the Risk Involved in the Interaction 33III. Awareness and Training 34A. Make Sure That Privileged Users and Security Personnel Understand Their Roles and Responsibilities 35IV. Data Security 35A. Protect the Integrity of Active and Archived Databases 35B. Protect the Confidentiality and Integrity of Corporate Data Once It Leaves Internal Networks 36C. Assure That Information Can Only Be Accessed by Those Authorized to Do So and Protect Hardware and Storage Media 37D. Keep Your Development and Testing Environments Separate from Your Production Environment 38E. Implement Checking Mechanisms to Verify Hardware Integrity 39V. Information Protection Processes and Procedures 39A. Create a Baseline of IT and OT Systems 40B. Manage System Configuration Changes in a Careful, Methodical Way 41A Word about Patch Management 42C. Perform Frequent Backups and Test Your Backup Systems Often 43D. Create a Plan That Focuses on Ensuring That Assets and Personnel Will Be Able to Continue to Function in the Event of a Crippling Attack or Disaster 43VI. Mainte nance 44A. Perform Maintenance and Repair of Assets and Log Activities Promptly 45B. Develop Criteria for Authorizing, Monitoring, and Controlling All Maintenance and Diagnostic Activities for Third Parties 45VII. Protective Technology 46A. Restrict the Use of Certain Types of Media On Your Systems 46B. Wherever Possible, Limit Functionality to a Single Function Per Device (Least Functionality) 47C. Implement Mechanisms to Achieve Resilience on Shared Infrastructure 48Summary 49Chapter Quiz 50Essential Reading on Network Management 51CHAPTER 3 TOOLS AND TECHNIQUES FOR DETECTING CYBER INCIDENTS 53Introduction 54What Is an Incident? 55I. Detect 56A. Anomalies and Events 561. Establish Baseline Data for Normal, Regular Traffic Activity and Standard Configuration for Network Devices 572. Monitor Systems with Intrusion Detection Systems and Establish a Way of Sending and Receiving Notifications of Detected Events; Establish a Means of Verifying, Assessing, and Tracking the Source of Anomalies 58A Word about Antivirus Software 603. Deploy One or More Centralized Log File Monitors and Configure Logging Devices throughout the Organization to Send Data Back to the Centralized Log Monitor 614. Determine the Impact of Events Both Before and After they Occur 615. Develop a Threshold for How Many Times an Event Can Occur Before You Take Action 62B. Continuous Monitoring 621. Develop Strategies for Detecting Breaches as Soon as Possible, Emphasizing Continuous Surveillance of Systems through Network Monitoring 632. Ensure That Appropriate Access to the Physical Environment Is Monitored, Most Likely through Electronic Monitoring or Alarm Systems 643. Monitor Employee Behavior in Terms of Both Physical and Electronic Access to Detect Unauthorized Access 654. Develop a System for Ensuring That Software Is Free of Malicious Code through Software Code Inspection and Vulnerability Assessments 655. Monitor Mobile Code Applications (e.g., Java Applets) for Malicious Activity by Authenticating the Codes’ Origins, Verifying their Integrity, and Limiting the Actions they Can Perform 666. Evaluate a Provider’s Internal and External Controls’ Adequacy and Ensure they Develop and Adhere to Appropriate Policies, Procedures, and Standards; Consider the Results of Internal and External Audits 667. Monitor Employee Activity for Security Purposes and Assess When Unauthorized Access Occurs 678. Use Vulnerability Scanning Tools to Find Your Organization’s Weaknesses 68C. Detection Processes 681. Establish a Clear Delineation between Network and Security Detection, with the Networking Group and the Security Group Having Distinct and Different Responsibilities 692. Create a Formal Detection Oversight and Control Management Function; Define Leadership for a Security Review, Operational Roles, and a Formal Organizational Plan; Train Reviewers to Perform Their Duties Correctly and Implement the Review Process 703. Test Detection Processes Either Manually or in an Automated Fashion in Conformance with the Organization’s Risk Assessment 714. Inform Relevant Personnel Who Must Use Data or Network Security Information about What Is Happening and Otherwise Facilitate Organizational Communication 715. Document the Process for Event Detection to Improve the Organization’s Detection Systems 72Summary 72Chapter Quiz 73Essential Reading for Tools and Techniques for Detecting a Cyberattack 74CHAPTER 4 DEVELOPING A CONTINUITY OF OPERATIONS PLAN 75Introduction 77A. One Size Does Not Fit All 77I. Response 77A. Develop an Executable Response Plan 79B. Understand the Importance of Communications in Incident Response 80C. Prepare for Corporate-Wide Involvement During Some Cybersecurity Attacks 81II. Analysis 82A. Examine Your Intrusion Detection System in Analyzing an Incident 82B. Understand the Impact of the Event 83C. Gather and Preserve Evidence 84D. Prioritize the Treatment of the Incident Consistent with Your Response Plan 84E. Establish Processes for Handling Vulnerability Disclosures 85III. Mitigation 86A. Take Steps to Contain the Incident 86B. Decrease the Threat Level by Eliminating or Intercepting the Adversary as Soon as the Incident Occurs 87C. Mitigate Vulnerabilities or Designate Them as Accepted Risk 88IV. Recover 88A. Recovery Plan Is Executed During or After a Cybersecurity Incident 89B. Update Recovery Procedures Based on New Information as Recovery Gets Underway 91C. Develop Relationships with Media to Accurately Disseminate Information and Engage in Reputational Damage Limitation 92Summary 92Chapter Quiz 93Essential Reading for Developing a Continuity of Operations Plan 94CHAPTER 5 SUPPLY CHAIN RISK MANAGEMENT 95Introduction 96I. NIST Special Publication 800-161 96II. Software Bill of Materials 97III. NIST Revised Framework Incorporates Major Supply Chain Category 98A. Identify, Establish, and Assess Cyber Supply Chain Risk Management Processes and Gain Stakeholder Agreement 98B. Identify, Prioritize, and Assess Suppliers and Third-Party Partners of Suppliers 99C. Develop Contracts with Suppliers and Third-Party Partners to Address Your Organization’s Supply Chain Risk Management Goals 100D. Routinely Assess Suppliers and Third-Party Partners Using Audits, Test Results, and Other Forms of Evaluation 101E. Test to Make Sure Your Suppliers and Third-Party Providers Can Respond to and Recover from Service Disruption 102Summary 103Chapter Quiz 103Essential Reading for Supply Chain Risk Management 104CHAPTER 6 MANUFACTURING AND INDUSTRIAL CONTROL SYSTEMS SECURITY 105Essential Reading on Manufacturing and Industrial Control Security 110Appendix A: Helpful Advice for Small OrganizationsSeeking to Implement Some of the Book’s Recommendations 111Appendix B: Critical Security Controls Version 8.0 Mapped to NIST CSF v1.1 113Answers to Chapter Quizzes 121Index 131

Regulärer Preis: 89,99 €
Produktbild für Diagnosis and Fault-tolerant Control 1

Diagnosis and Fault-tolerant Control 1

This book presents recent advances in fault diagnosis strategies for complex dynamic systems. Its impetus derives from the need for an overview of the challenges of the fault diagnosis technique, especially for those demanding systems that require reliability, availability, maintainability and safety to ensure efficient operations. Moreover, the need for a high degree of tolerance with respect to possible faults represents a further key point, primarily for complex systems, as modeling and control are inherently challenging, and maintenance is both expensive and safety-critical.Diagnosis and Fault-tolerant Control 1 also presents and compares different diagnosis schemes using established case studies that are widely used in related literature. The main features of this book regard the analysis, design and implementation of proper solutions for the problems of fault diagnosis in safety critical systems. The design of the considered solutions involves robust data-driven, model-based approaches. VICENC PUIG is Professor of Automatic Control at the Universitat Politècnica de Catalunya (UPC), Spain. He has published more than 80 journal articles and more than 350 articles in international conference/workshop proceedings related to diagnosis and faulttolerant control.SILVIO SIMANI is Professor of Automatic Control in the Engineering Department of Ferrara University, Italy. He has published about 260 journal and conference papers, several book chapters and four monographs on fault diagnosis and sustainable control topics.Introduction ixVicenç Puig and Silvio SimaniCHAPTER 1 MATHEMATICAL MODELING AND FAULT DESCRIPTION 1Silvio Simani1.1. Introduction 11.2. Model-based FDI techniques 21.3. Modeling of faulty systems 31.3.1. Fault modeling and description 51.3.2. Mathematical description 61.4. Residual generation 111.5. Residual generation techniques 141.5.1. Residual generation via parameter estimation 151.5.2. Observer-based approaches 181.5.3. Fault detection via parity equations 241.6. Change detection and symptom evaluation 281.7. Residual generation robustness problem 301.7.1. FDI H∞ approach 321.7.2. Active and passive disturbance decoupling 351.8. Fault diagnosis technique integration 361.8.1. Fuzzy logic for residual generation 371.8.2. Neural networks for fault diagnosis 381.8.3. Neuro-fuzzy approaches to FDI 401.8.4. Fault detectability and isolability 421.8.5. NF model structure identification 431.8.6. NF residual generation for FDI 441.9. Conclusion 461.10. References 47CHAPTER 2 STRUCTURAL ANALYSIS 57Mattias Krysander and Erik Frisk2.1. Introduction 572.2. Background 582.2.1. Structural models 582.2.2. Dulmage–Mendelsohn decomposition and matchings 602.2.3. Dulmage–Mendelsohn decomposition and simulation 632.3. Fault isolability analysis 642.3.1. Fault detectability analysis 642.3.2. Fault isolability analysis 652.3.3. Canonical isolability decomposition of the overdetermined part 672.4. Testable submodels 692.4.1. Basic definitions 692.4.2. MSO algorithm 712.4.3. Residual generation based on matching 722.5. Sensor placement 742.5.1. The basic sensor placement problem 742.5.2. A structural approach 752.6. Summary and discussion 802.7. References 81CHAPTER 3 SET-BASED FAULT DETECTION AND ISOLATION 83Ye Wang and Vicenç Puig3.1. Introduction 833.2. Notations, definitions and properties 843.3. Problem statement 863.3.1. Uncertain discrete-time linear systems 863.3.2. Set-based methods 863.3.3. FDI problem statement 883.4. Proposed techniques 893.4.1. Set-membership approach 893.4.2. Zonotopic observer 903.4.3. Relationship between set-based methods 913.5. Design methods 923.5.1. Robustness conditions 923.5.2. Fault sensitivity condition 963.6. Fault detection and isolation procedures 993.6.1. Fault detection 993.6.2. Fault isolation 1003.7. Application example: quadruple-tank system 1013.7.1. Results with robustness condition 1053.7.2. Results with robustness and fault sensitivity conditions 1053.8. Conclusion 1053.9. References 109CHAPTER 4 DIAGNOSIS OF STOCHASTIC SYSTEMS 111Gregory Provan4.1. Introduction 1114.2. Stochastic diagnosis task 1134.2.1. Notation 1134.2.2. Problem formulation 1134.2.3. Representing uncertainty 1154.3. Inference methods for diagnosis task 1164.3.1. Difference with other tasks 1164.4. Model-based approach 1174.4.1. Traditional FDD methods 1174.4.2. Bayesian inversion/filtering 1204.5. Data-driven approaches 1224.5.1. ML methods 1234.5.2. Statistical methods 1244.6. Hybrid approaches: surrogate methods 1254.6.1. Fitting surrogate models via sampling 1254.7. Comparative analysis of approaches 1264.8. Summary and conclusions 1274.9. References 128CHAPTER 5 DATA-DRIVEN METHODS FOR FAULT DIAGNOSIS 131Silvio Simani5.1. Introduction 1315.2. Models for linear system fault diagnosis 1335.3. Parameter estimation methods for fault diagnosis 1355.3.1. Data-driven method in ideal conditions 1355.3.2. Data-driven methods in real scenarios 1385.3.3. Algebraic Frisch scheme 1395.3.4. Dynamic Frisch scheme 1415.3.5. MIMO case Frisch scheme 1455.4. Nonlinear dynamic system identification 1465.4.1. Piecewise affine model 1475.4.2. Hybrid model structure 1485.4.3. Nonlinear system approximation 1495.4.4. Model continuity and domain partitioning 1515.4.5. Local affine model estimation 1545.4.6. Multiple-model estimation 1585.5. Fuzzy data-driven approach to fault diagnosis 1645.5.1. Fuzzy model identification 1655.5.2. Takagi–Sugeno prototypes 1675.5.3. Data-driven fuzzy modeling 1705.5.4. Clustering methods 1705.5.5. Fuzzy c-means clustering algorithms 1725.5.6. Gustafson–Kessel clustering algorithm 1745.5.7. Optimal number of clusters 1765.6. Fuzzy model identification 1765.6.1. Nonlinear model identification 1785.6.2. Product space clustering identification 1815.6.3. Fuzzy clustering model identification 1835.6.4. Antecedent membership function estimation 1835.6.5. Estimating consequent parameters 1855.7. Conclusion 1895.8. References 189CHAPTER 6 THE ARTIFICIAL INTELLIGENCE APPROACH TO MODEL-BASED DIAGNOSIS 197Belarmino Pulido, Carlos J. Alonso-González and Anibal Bregon6.1. Introduction 1976.2. Case studies 1996.3. Knowledge-based diagnosis systems 2016.3.1. Diagnosis task and system model 2036.3.2. Diagnosis of physical devices 2066.3.3. Limits of KBS for diagnosis of physical devices 2076.4. Model-based diagnosis 2086.4.1. Formalization of consistency-based diagnosis and its first implementation, GDE 2096.5. CBD for dynamic systems 2176.5.1. Different approaches for CBD of dynamic systems 2196.5.2. PCs for the three-tank system case study 2226.6. Conclusion 2246.7. References 226List of Authors 231Index 233Summary of Volume 2 237

Regulärer Preis: 139,99 €
Produktbild für The Tactile Internet

The Tactile Internet

The Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data.This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet.As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed.Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance. TARA ALI-YAHIYA is Associate Professor at Paris-Saclay University, France. She is deputy head of the Networking & Stochastic and Combinatorial Optimization Team at LISN Laboratory. She has an HDR, PhD and MSc in Telecommunications and was a post-doctoral researcher at Telecom SudParis.WRYA MONNET is a faculty member of the CSE department at the University of Kurdistan Hewler, Iraq. He has 23 years of experience in industry and academia and has done post-doctoral research at Telecom SudParis, France. He worked as an R&D and embedded software engineer for 10 years.Foreword xiIan F. AkyildizPreface xiiiTara Ali-Yahiya and Wrya MonnetList of Acronyms xvCHAPTER 1 INTRODUCTION TO TACTILE INTERNET 1Tara Ali-Yahiya1. 1. Human perception and Tactile Internet 21. 2. The roadmap towards Tactile Internet 31. 3. What is Tactile Internet? 51. 4. Cyber-Physical Systems and TI 71. 4. 1. Physical world 71. 4. 2. Internet of Things 71. 4. 3. Communication 71. 4. 4. Storage and computation 81. 4. 5. Feedback 81. 4. 6. Smart computing 101. 5. References 11CHAPTER 2 REFERENCE ARCHITECTURE OF THE TACTILE INTERNET 13Tara Ali-Yahiya2. 1. Tactile Internet system architecture 132. 2. IEEE 1918. 1 use cases 152. 2. 1. Teleoperation 162. 2. 2. Automotive 172. 2. 3. Immersive virtual reality (IVR) 172. 2. 4. Internet of drones 182. 2. 5. Inter personal communication 182. 2. 6. Live haptic-enabled broadcast 192. 2. 7. Cooperative automated driving 192. 3. Conclusion 202. 4. References 20CHAPTER 3 TACTILE INTERNET KEY ENABLERS 21Tara Ali-Yahiya3. 1. Introduction 213. 1. 1. The fifth-generation system architecture 213. 1. 2. Network slicing 233. 1. 3. Network function virtualization 253. 1. 4. Software-defined networking 263. 1. 5. Edge computing 273. 1. 6. Artificial intelligence 293. 2. Conclusion 313. 3. References 31CHAPTER 4 6G FOR TACTILE INTERNET 35Pinar Kirci and Tara Ali-Yahiya4. 1. Introduction 354. 2. Thearchitectureof6G 374. 2. 1. Networkperformanceof6G 384. 2. 2. Space network 394. 2. 3. Air network 404. 2. 4. Ground network 404. 2. 5. Underwater network 414. 3. 6G channel measurements and characteristics 414. 3. 1. Optical wireless channel 414. 3. 2. Unmanned aerial vehicle (UAV) channel 424. 3. 3. Underwater acoustic channel 434. 3. 4. Satellite channel 434. 3. 5. RFandterahertznetworksin6G 454. 3. 6. Visible light communication technology 484. 3. 7. Orbital angular momentum technology 484. 4. 6GcellularInternetofThings 494. 5. Energy self-sustainability (ESS) in 6G 504. 6. IoT-integrated ultra smart city life 524. 7. AI-enabled6Gnetworks 554. 8. AI- and ML-based security management in super IoT 594. 9. Securityfor6G 604. 10. The WEAFMnecosystem (water, earth, air, fire micro/nanoecosystem) with 6G and Tactile Internet 614. 11. References 63CHAPTER 5 IOT, IOE AND TACTILE INTERNET 65Wrya Monnet5. 1. From M2MtoIoT 665. 2. Classification of remote monitoring and control systems 665. 3. IoT-enabling technologies 675. 3. 1. IoT hardware 675. 3. 2. IoT software 675. 3. 3. IoT connectivity 675. 4. Architectural design and interfaces 685. 5. IoT communication protocols 715. 5. 1. Message Queuing Telemetry Transport (MQTT) 725. 5. 2. Constrained Application Protocol (CoAP) 745. 5. 3. Data Distribution Service for real-time systems (DDS) 765. 5. 4. Open Mobile Alliance Device Management (OMA-DM) 795. 6. Internet of Everything (IoE) 805. 6. 1. Enabling technologies for the IoE 815. 7. Protocol comparisons and the readiness for TI 825. 8. TI-IoT models and challenges 835. 9. Edge computing in the IoT 855. 9. 1. Edge computing paradigms 865. 10. Real-time IoT and analytics versus real time in TI 885. 11. From IoT towardsTI 885. 12. Conclusion 905. 13. References 91CHAPTER 6 TELEROBOTICS 95Wrya Monnet6. 1. Introduction 956. 2. Teleoperation evolution to telepresence 966. 3. Tele presence applications 976. 4. Teleoperation system components 996. 4. 1. Master domains 1026. 4. 2. Network domain (communication channel) 1026. 4. 3. Slave domain 1026. 5. Architecture of bilateral teleoperation control system 1036. 5. 1. Classification of the control systems architectures 1066. 5. 2. Discrete architecture with transmission delay 1076. 6. Performance and transparency of telepresence systems 1106. 6. 1. Passivity and stability 1106. 6. 2. Time delay issues 1126. 7. Other methods for time-delay mitigation 1166. 8. Teleoperation over the Internet 1176. 9. Multiple access to a teleoperation system 1196. 10. A use case 1216. 11. Conclusion 1226. 12. References 122CHAPTER 7 HAPTIC DATA: COMPRESSION AND TRANSMISSION PROTOCOLS 127Wrya Monnet7. 1. Introduction 1277. 2. Haptic perception 1287. 2. 1. Human haptic perception 1287. 2. 2. Telerobotic tactile and haptic perception 1287. 2. 3. Tactile sensing for material recognition 1297. 2. 4. Tactile sensing for object shape recognition 1307. 2. 5. Tactile sensing for pose estimation 1317. 3. Haptic interfaces 1337. 3. 1. Haptic interface for tele presence 1337. 3. 2. Haptic and tactile sensors and actuators 1357. 4. Haptic compression 1397. 5. Haptic transport protocols 1427. 5. 1. Application layer protocols 1437. 5. 2. Transport layer protocols 1467. 6. Multi-transport protocols 1497. 7. Haptic transport protocol performance metrics 1497. 8. Conclusion 1507. 9. References 150CHAPTER 8 MAPPING WIRELESS NETWORKED ROBOTICS INTO TACTILE INTERNET 155Nicola Roberto Zema and Tara Ali-Yahiya8. 1. Wireless networked robots 1558. 2. WNR traffic requisites 1588. 2. 1. Types of traffic in WNRs 1588. 3. Traffic shaping and TI haptic codecs 1608. 3. 1. Introduction 1618. 3. 2. Mapping WNR control traffic to TI 1618. 4. WNRs in the Tactile Internet architecture 1648. 4. 1. WNRs in the TI architecture and interfaces 1658. 5. Conclusion 1698. 6. References 170CHAPTER 9 HOIP OVER 5G FOR TACTILE INTERNET TELEOPERATION APPLICATION 173Tara Ali-Yahiya, Wryamonnet and Bakhtiar M. Amin9. 1. Relatedworks 1749. 2. 5G architecture design for Tactile Internet 1799. 2. 1. Tactile edge A 1809. 2. 2. Network domain 1829. 2. 3. Protocol stack of 5G integration with IEEE 1918. 1 1829. 3. HapticsoverIP 1839. 4. Teleoperationcasestudy 1859. 4. 1. Master to slave (uplink) data rate in edge A 1879. 4. 2. Slave to master (downlink) data rate in edge B 1879. 4. 3. Encapsulating the haptic data in HoIP 1889. 4. 4. 5G network data and control handling 1889. 4. 5. Case study operational states 1909. 4. 6. Case study protocol stack 1919. 5. Simulationresults 1929. 5. 1. Simulation topology 1939. 5. 2. NS3networkarchitecture 1949. 5. 3. Simulation scenario 1969. 5. 4. Simulation results 1989. 6. Conclusion 2039. 7. References 203CHAPTER 10 ISSUES AND CHALLENGES FACING LOW LATENCY IN THE TACTILE INTERNET 209Tara Ali-Yahiya10. 1. Introduction 20910. 1. 1. Technical requirements for the TI 21110. 2. Low latency in the Tactile Internet 21210. 2. 1. Resource allocation 21210. 2. 2. Mobile edge computing 21310. 2. 3. Network coding 21410. 2. 4. Haptic communication protocols 21410. 3. Intelligence and the Tactile Internet 21610. 4. Edge intelligent 21610. 5. Openissues 21910. 6. Conclusion 22010. 7. References 221List of Authors 227Index 229

Regulärer Preis: 139,99 €
Produktbild für Coole Spiele mit Scratch 3 (2. Auflg.)

Coole Spiele mit Scratch 3 (2. Auflg.)

Mit Videospielen programmieren lernen – ohne Code zu schreiben! 2. überarbeitete und aktualisierte Auflage.Scratch, die farbenfrohe Drag-and-drop-Programmiersprache, wird auf der ganzen Welt von Millionen von Anfängern verwendet, und die zweite Ausgabe von »Coole Spiele mit Scratch« wurde jetzt vollständig aktualisiert. Die Verwendung mit Scratch 3 macht es einfacher denn je, deine Programmierfähigkeiten Block für Block aufzubauen. Du lernst spielerisch zu programmieren, indem du Videospiele erschaffst, in denen beim Katzenwerfen ins Schwarze getroffen, Asteroiden zerstört und ein KI-Feind überlistet werden können. Mit Scratch 3 geht das jetzt auch auf Mobilgeräten und dem Raspberry Pi – und immer ganz ohne Installation.»Coole Spiele mit Scratch 3« leitet Kinder und Programmierneulinge zum Programmieren an. Beispiele und Sprache des Buches sind leichtverständlich gehalten; für Kinder in den ersten Grundschulklassen wird empfohlen, die Kapitel gemeinsam mit Älteren durchzugehen.In jeden Kapitel wirst du ein Spiel erstellen und dabei die wichtigsten Programmierkonzepte kennenlernen und direkt anwenden. Von einer Skizze, die festlegt, wie das Spiel aussehen soll, führt eine Schritt-für-Schritt-Anleitung zum funktionierenden Videospiel. Diese Spiele kannst du nach eigenen Vorstellungen gestalten, indem du spezielle Funktionen, zusätzliche Level und sogar Cheat-Modi hinzufügst.Zu den Programmierbeispielen gehören Spiele wie z.B.:Maze Runner, mit acht verschiedenen Levels, durch die man entkommen mussKörbewerfen unter Schwerkraftbedingungen (und mit Katzen!), inklusive realistischer FlugbahnEin Brick-Breaker-Spiel mit Animationen und Soundeffekten von simpel bis edelAsteroidenknacker, ein Klon des klassischen Asteroids-Spiels mit einem tastaturgesteuertem RaumschiffEin Mario-Bros.-ähnliches Jump-&-Run-Spiel mit viel Action und KI-gesteuerten FeindenEs ist nie zu früh (oder zu spät), mit dem Programmieren anzufangen, und »Coole Spiele mit Scratch 3« macht den Lernprozess nicht nur lustig – es lässt die Programmiererinnen und Coder in spe auch ein Spiel daraus machen!Über den Autor:Al Sweigart ist Softwareentwickler und vermittelt Coding-Kenntnisse an Erwachsene und Kinder. Er hat mehrere Programmierlehrbücher für Einsteiger (und auch solche für Fortgeschrittene) geschrieben, unter anderem Routineaufgaben mit Python automatisieren, das ebenfalls bei dpunkt erschienen ist.

Regulärer Preis: 19,95 €
Produktbild für Das iPad-Buch für Senioren (3. Auflg.)

Das iPad-Buch für Senioren (3. Auflg.)

Wegweiser durch den Fachbegriff-Dschungel* Klare, verständliche Sprache* Fachbegriffe werden erläutert* Ausführliche Beispiele zu typischen AnwendungenTablet-Computer sind wegen ihrer einfachen Handhabung und vielfältigen Einsatzmöglichkeiten beliebt. Z.B. Videotelefonate mit den Enkeln haben in den Corona-Monaten für viele einen besonderen Stellenwert erlangt. Apples iPads stehen im Ruf, verlässlich zu sein, nicht so schnell zu veralten und durch ihr Design zu überzeugen. Der Umgang ist allerdings für viele nicht selbst erklärend. Gerade erste Versuche können so schnell zu einer Enttäuschung werden.Phillip Kiefer hat auch die dritte Auflage seiner bewährten Anleitung zu Apples Tablet überarbeitet und aktualisiert. Das Buch bahnt für Sie einen Weg durch den Fachbegriff-Dschungel und erläutert die Bedienung und die Funktionen der Apple-Tablets. Die Standard-Programme der iPads erklärt der Autor Ihnen mit anschaulichen Beispielen: So lernen Sie beispielsweise "Fotos" kennen, das Programm zum Betrachten, Bearbeiten, Ordnen und Versenden Ihrer Bilder. Sie erfahren, wie Sie Dokumente und Daten in der iCloud, Apples Datenspeicher im Internet, ablegen. Auch erklärt das Buch, wie Sie Ihre Passwörter einfach, aber geschützt handhaben, und vieles mehr.Erläuterungen und Bilder sind auf das neue iPadOS 15 aktualisiert.Philip Kiefer, geboren in Friedrichshafen am Bodensee, studierte Literaturwissenschaften und Philosophie in Tübingen und Oxford. Nebenher jobbte er in verschiedenen Verlagen sowie in einem Altenpflegeheim. Ende 2001 machte er sich als Autor selbstständig und hat bis heute über 150 Bücher in namhaften Verlagen veröffentlicht, darunter zahlreiche Computerbücher speziell für Senioren.

Regulärer Preis: 26,90 €
Produktbild für Handbuch Infrastructure as Code (2. Auflg.)

Handbuch Infrastructure as Code (2. Auflg.)

Prinzipien, Praktiken und Patterns für eine cloudbasierte IT-Infrastruktur In diesem praktischen Handbuch beschreibt Kief Morris von ThoughtWorks, wie Sie Ihre IT-Infrastruktur im Cloud-Zeitalter erfolgreich aufsetzen und betreiben. Sie erfahren, wie Sie hierfür die von zahlreichen DevOps-Teams entwickelten und erprobten Prinzipien, Praktiken und Patterns nutzen können. Diese aktualisierte Auflage wendet sich an Mitarbeitende in der Systemadministration, Infrastruktur- und Softwareentwicklung, Teamleitung und Architekturabteilung von Unternehmen. Kief Morris zeigt Ihnen, wie Sie Cloud- und Automatisierungs-Technologien einsetzen, um Änderungen einfach, sicher, schnell und verantwortungsvoll vorzunehmen. Sie lernen, wie Sie alles als Code definieren und Praktiken aus dem Softwaredesign und der Entwicklung einsetzen, um Ihr System aus kleinen und lose gekoppelten Elementen aufzubauen. Zielgruppe: Mitarbeiter*innen in Systemadministration, Softwareentwicklung und -architektur Autor:Kief Morris ist Global Director of Cloud Engineering bei ThoughtWorks.Er unterstützt Teams dabei, Cloud- und Infrastrukturtechnologien so einzusetzen, dass Unternehmen mit ihnen schnell und zuverlässig einen größeren Mehrwert schaffen können. Kief entwirft, baut und betreibt seit über 20 Jahren automatisierte IT-Server-Infrastrukturen. Angefangen hat er mit Shell-Skripten und Perl, später ist er auf CFengine, Puppet, Chef und Terraform und andere Technologien umgestiegen.

Regulärer Preis: 44,90 €
Produktbild für NSX-T Logical Routing

NSX-T Logical Routing

This book is a one-stop guide for IT professionals with a background in traditional and software-defined networks looking to expand or hone their skill set and has been developed through a combination of extensive research and testing in both development and production environments. It provides reliable information on a fundamental component of NSX-T, logical routing.A comprehensive understanding of this capability will help IT professionals with design, implementation, troubleshooting, and enhancements.The book starts with an introduction to the foundational components of the NSX-T platform and how NSX-T fits into the software-defined data center. The focus then moves to tunnel endpoints, which is a critical aspect of the NSX-T platform, and the differences between overlays and underlays are explained. Once the basics are covered, it provides a detailed description of how NSX-T components communicate.Next, the book introduces logical routing and its components and provides a better understanding of how these components function with one another. Several packet walks are illustrated to explain NSX-T logical routing behavior in different scenarios. After mastering logical routing, it explains how NSX-T ensures data plane availability, which is explored at various layers of NSX-T.Finally, the book explores the concepts and intricacies of routing into and out of the NSX-T environment. It deep dives into utilizing the Border Gateway Protocol (BGP), Open Shortest Path First (OSPF), and Static Routing.WHAT YOU WILL LEARN* Know how VMware NSX-T endpoints communicate* Understand how NSX-T logical routing works* Know how NSX-T provides high availability for the data plane* Understand how NSX-T operates with static and dynamic routing protocols* Configure the platformWHO THIS BOOK IS FORReaders with an intermediate to advanced skill set who wish to further their knowledge, those who focus on datacenter technology, those planning to move to a software-defined datacenter to transform the way their current datacenter works, and anyone looking to learn about VMware NSX-T and how it operatesSHASHANK MOHAN (Shank) is the ANZ Professional Services Practice Lead for Networking at VMware. He brings over a decade of experience in IT infrastructure and architecture, with a specialization in networking, virtual cloud networking (VCN), and VMware Cloud Foundation (VCF).Shank is a VMware Advanced Professional in Network Virtualization, a vExpert in NSX and Security, and NSX Advanced Load Balancer (AVI), he is also CISCO and AWS certified.Shank was born and raised in Sydney, Australia but now prefers the calm and cold capital city, Canberra. Between firmware upgrades and breaking his home lab, he makes time for weightlifting, gardening, and most importantly, his family. While Shank is a first-time author, he is a serial blogger. If you’d like to get in touch or continue to learn about virtualization, look up https://www.lab2prod.com.au/.Chapter 1: IntroductionThe Modern-Day Software-Defined Data CenterSoftware-Defined Datacenter ArchitectureVMware NSX-T: SDDC NetworkingThe Basics of NSX-TSummaryChapter 2: Tunnel EndpointsOverlay NetworkingNSX-T Transport Node CommunicationTransport Node TypesWhat Is a Tunnel Endpoint?Tunnel Endpoint CommunicationRouted Transport VLANsTunnel Endpoint ConfigurationTunnel Endpoint FailureSummaryChapter 3: Remote Tunnel EndpointsA Solution for Multiple SitesNSX-T Federation ComponentsSummaryChapter 4: Logical RoutingWhat Is Logical Routing?NSX-T Logical ComponentsLogical Routing ArchitecturePacket Flow Within the NSX-T FabricSummaryChapter 5: Data Plane AvailabilityEdge Cluster Deployment ConsiderationsEdge Failure TypesBidirectional Forwarding Detection (BFD)Equal Cost Multipathing (ECMP)SummaryChapter 6: Datacenter RoutingChapter ObjectivesCommunication with the Physical NetworkNSX-T and BGPNSX-T and OSPFNSX-T and Static RoutingDeterministic PeeringBidirectional Forwarding Detection (BFD)Unicast Reverse Path Forwarding (uRPF)Summary

Regulärer Preis: 62,99 €
Produktbild für Introducing Blockchain Applications

Introducing Blockchain Applications

Deepen your understanding of blockchain technology and develop your own blockchain applications. This book provides a thorough review of distribution-based systems on blockchain technology, starting from the fundamental concepts that underlie it, all the way through the implementation of a blockchain network for business purposes.Author JOSEPH THACHIL GEORGE begins by introducing you to blockchain and some basic concepts of technology, including distributed systems, systems of systems, cyber-physical systems, the Byzantine Consensus, the CAP theorem, and cryptographic techniques. Next, he analyzes the structure of blocks and smart contracts and the mother of all blockchain platforms, Bitcoin. That sets the stage for an examination of transaction structure, validation, and flow, from creation to registration in the ledger and structure of the blocks, the Nakamoto consensus, and finally forks. From there, you’ll experience a deep dive into Ethereum; including the concepts of Gas and Message, smart contracts and the Ethereum virtual machine. From there, you’ll learn about the Ethereum consensus protocol, Ethereum Casper, and the Ethereum Proof-of-Stake algorithm. You’ll then see how blockchain can be connected to a distributed system, followed by a demonstration of how you can model a distributed system using Blockly4SoS and Kilobots. The concluding chapters offer a practical example that combines distributed systems with blockchain technology.After reading this book, you will understand how to implement blockchain technology in a distributed system and be able to leverage this knowledge in your own projects.WHAT YOU WILL LEARN* Learn the concept of blockchains by way of a practical example * Grasp the connection between distributed systems and blockchain technology* Learn the design of blockchain with hyperledger fabric* Learn the design of cyber-physical systems in a distributed environment WHO IS THIS BOOK FORDevelopers who are enthusiastic about the design and implementation of distributed systems.Joseph Thachil George is a Technical Consultant for International Game Technology (IGT), Rome, Italy. Additionally, Joseph is pursuing doctorate (PhD) in Computer Science and Engineering at the University of Lisbon, Portugal. He has completed M.S. in Cyber Security from the Università degli Studi di Firenze, Italy. In addition, he is also part of the research group (DISIA) of the University of Florence, Italy, and the research group (INESC-ID Lisbon) of the University of Lisbon, Portugal. His research interests cover dynamic malware analysis, Blockchain technology - hyperledger fabric, and cyber security. In IGT, he has been a part of various project related to game configuration and integration in various platform. Specialized in Java and spring boot-based projects. He has also worked in various companies in India, Angola, Portugal, and UK; he has seven years of experience in various IT companies.1: INTRODUCING BLOCKCHAIN APPLICATIONS THROUGH DISTRIBUTED SYSTEMS2: INTRODUCTION TO BLOCKCHAIN3: BITCOIN4: ETHEREUM5: PROOF OF STAKE: CONSENSUS OF THE FUTURE6: HYPERLEDGER FABRIC7: CONSENSUS ALGORITHMS FOR BLOCKCHAINS8: SAMPLE PROJECT EXERCISE: CONSENSUS ALGORITHMS FOR BLOCKCHAINS9: REAL-TIME SYSTEMS10: SCHEDULING IN REAL-TIME SYSTEMS11: ENGINEERING BASED ON MODELS12: BLOCKLY 4 SOS13: PROJECT: CYBER PHYSICAL SYSTEMS14: PROJECT USING MATLAB: SMART FARM15: PLATOON PROJECT16: BLOCKCHAIN TECHNOLOGY AND DISTRIBUTED SYSTEMS FUTURE SCOPE AND B-COIN PROJECT17: AI AND BLOCKCHAIN: MONITORING AUTONOMOUS VEHICLES MANAGEMENT PROJECT18: SUMMARY

Regulärer Preis: 66,99 €
Produktbild für Office 365 All-in-One For Dummies

Office 365 All-in-One For Dummies

MULTIPLY YOUR PRODUCTIVITY WITH THE WORLD'S MOST STRAIGHTFORWARD GUIDE TO THE WORLD'S MOST POPULAR OFFICE SOFTWAREMicrosoft Office 365 contains straightforward tools for virtually every office task you could possibly think of. And learning how to use this powerful software is much easier than you might expect! With the latest edition of Office 365 All-in-One For Dummies, you'll get a grip on some of the most popular and effective office software on the planet, including Word, Excel, PowerPoint, Outlook, Access, Publisher, and Teams. This expanded handbook walks you through the ins and outs of reviewing and composing documents with Word, hosting and joining meetings with Teams, crunching numbers with Excel, and answering emails with Outlook. And it's ideal for anyone who's brand new to Office and those who just need a quick refresher on the latest useful updates from Microsoft. In this one-stop reference, you'll find:* Step-by-step instructions on the installation, maintenance, and navigation of all the critical components of Office 365* Guidance for using Office 365's built-in online and cloud functionality* Complete explanations of what every part of Office 365 is used for and how to apply them to your lifeOffice 365 All-in-One For Dummies is the last handbook you'll ever need to apply Microsoft's world-famous software suite to countless everyday tasks. PETER WEVERKA is a veteran tech writer who has written dozens of Dummies titles, including the first edition of Office 365 All-in-One For Dummies. He has also authored books on PowerPoint, OneNote, Word, and Quicken.Introduction 1BOOK 1: COMMON OFFICE TASKS 5Chapter 1: Office Nuts and Bolts 7Chapter 2: Wrestling with the Text 29Chapter 3: Speed Techniques Worth Knowing About 49BOOK 2: WORD 365 57Chapter 1: Speed Techniques for Using Word 59Chapter 2: Laying Out Text and Pages 79Chapter 3: Word Styles 105Chapter 4: Constructing the Perfect Table 123Chapter 5: Taking Advantage of the Proofing Tools 147Chapter 6: Desktop Publishing with Word 167Chapter 7: Getting Word’s Help with Office Chores 185Chapter 8: Tools for Reports and Scholarly Papers 205BOOK 3: EXCEL 365 229Chapter 1: Up and Running with Excel 231Chapter 2: Refining Your Worksheet 249Chapter 3: Formulas and Functions for Crunching Numbers 265Chapter 4: Making a Worksheet Easier to Read and Understand 299Chapter 5: Advanced Techniques for Analyzing Data 317BOOK 4: POWERPOINT 365 337Chapter 1: Getting Started in PowerPoint 339Chapter 2: Fashioning a Look for Your Presentation 361Chapter 3: Entering the Text 377Chapter 4: Making Your Presentations Livelier 393Chapter 5: Delivering a Presentation 409BOOK 5: OUTLOOK 365 431Chapter 1: Outlook Basics. 433Chapter 2: Maintaining the People App 445Chapter 3: Handling Your Email 457Chapter 4: Managing Your Time and Schedule 479BOOK 6: ACCESS 365 491Chapter 1: Introducing Access 493Chapter 2: Building Your Database Tables 509Chapter 3: Entering the Data 537Chapter 4: Sorting, Querying, and Filtering for Data 547Chapter 5: Presenting Data in a Report 567BOOK 7: PUBLISHER 365 573Chapter 1: Introducing Publisher 575Chapter 2: Refining a Publication 587Chapter 3: Putting on the Finishing Touches 599BOOK 8: WORKING WITH CHARTS AND GRAPHICS 609Chapter 1: Creating a Chart 611Chapter 2: Making a SmartArt Diagram 631Chapter 3: Handling Graphics and Photos 651Chapter 4: Drawing and Manipulating Lines, Shapes, and Other Objects 667BOOK 9: OFFICE 365: ONE STEP BEYOND 701Chapter 1: Customizing an Office Program 703Chapter 2: Ways of Distributing Your Work 717BOOK 10: MICROSOFT TEAMS 725Chapter 1: Getting around in Teams 727Chapter 2: Getting Up to Speed with Teams and Channels 753Chapter 3: Communicating through Channels and Private Chat 769Chapter 4: Organizing Your Files in Teams 793Chapter 5: Getting Together for Online Meetings 809BOOK 11: FILE SHARING AND COLLABORATING 835Chapter 1: File Sharing and Collaborating 837Chapter 2: Making the Most of OneDrive 851Chapter 3: Collaborating in SharePoint 865Index 895

Regulärer Preis: 25,99 €
Produktbild für Outlook For Dummies

Outlook For Dummies

LEARN ALL ABOUT THE BEST APPLICATION FOR EMAILING, SCHEDULING, COLLABORATING, AND JUST PLAIN GETTING STUFF DONEDid you know that Microsoft Outlook can do everything, including cook your dinner? Okay, it can’t cook your dinner. But it can deliver your email, filter out the junk, help you organize your life, sync data to the cloud, integrate with iOS and Android, and about a zillion other things. Outlook For Dummies shows you how to work all the basic and advanced features of the Office 2021 version.Outlook is loaded with interesting productivity tools that most people—even in business environments—don’t know about. Did you know you can create automated mail-handling rules? Translate messages into other languages? Share your calendar with other people? It’s true, and when people start wondering how you suddenly got to be so productive, you can tell them: Outlook For Dummies.* Take a stroll around the basic interface and emailing capabilities of Outlook for Office 2021 * Use Outlook to create daily and monthly schedules, manage a to-do list, organize messages into folders, and make notes for later reference * Discover advanced and little-known features that will help you get organized and stay on top of things * Sync email across your devices and access Outlook from any computer, tablet, or phone For users who are brand-new to Outlook and those upgrading to the latest version, this book makes it simple to get going.FAITHE WEMPEN, M.A., is a Microsoft Office Specialist Master Instructor and the author of over 150 books on Windows, Office, and computer technology.Introduction 1PART 1: GETTING STARTED WITH OUTLOOK 9Chapter 1: A First Look at Outlook 11Chapter 2: Taking a Tour of the Outlook Interface 25Chapter 3: Getting on the Fast Track with Handy Shortcuts 43PART 2: TAMING THE EMAIL BEAST 57Chapter 4: Email Essentials 59Chapter 5: Taking Email to the Next Level 81Chapter 6: Conquering Your Mountain of Messages 103Chapter 7: Managing Multiple Email Accounts and Data Files 143PART 3: KEEPING TRACK OF CONTACTS, DATES, TASKS, AND MORE 165Chapter 8: Your Little Black Book: Managing Your Contacts 167Chapter 9: Organizing Your Schedule with the Calendar 191Chapter 10: Staying on Task: To-Do Lists and More 219PART 4: TAKING OUTLOOK TO THE NEXT LEVEL 245Chapter 11: Merging Mail From Outlook to Microsoft Word 247Chapter 12: Integrating Outlook with Google and iCloud 261Chapter 13: Outlook for iOS and Android Devices 273Chapter 14: Seeing It Your Way: Customizing Outlook 285PART 5: OUTLOOK AT WORK 305Chapter 15: Outlook on the Job 307Chapter 16: Using Outlook on the Web: Your Outlook Away From Outlook 329PART 6: THE PART OF TENS 347Chapter 17: Ten Shortcuts Worth Taking 349Chapter 18: Ten Things You Can’t Do with Outlook 359Chapter 19: Ten Things You Can Do After You’re Comfy 365Index 371

Regulärer Preis: 19,99 €
Produktbild für Customer Experience visualisieren und verstehen

Customer Experience visualisieren und verstehen

Mit Mapping-Techniken zu einer erfolgreichen Kundenausrichtung* Für alle, die an Planung, Design und Entwicklung von Produkten und Dienstleistungen beteiligt sind wie Designer, Produktmanager, Markenmanager, Marketing-Manager, Unternehmer und Geschäftsinhaber* US-Bestseller und Grundlagenwerk zu Mapping-Techniken* Starker Praxisbezug durch kommentierte Beispiele, Case Studies und PraxistippsMapping-Techniken unterstützen Unternehmen dabei, den Status quo, wichtige Zusammenhänge, aber vor allem Sicht und Bedürfnisse ihrer Kund:innen zu verstehen und zu dokumentieren. So entsteht ein teamübergreifendes Verständnis - beispielsweise auch von Multi-Channel-Plattformen oder Produkt-Ökosystemen.James Kalbach vermittelt in diesem Standardwerk die Grundlagen dieser Mapping-Techniken – z.B. welche Aspekte und Dimensionen visualisiert werden können – und beschreibt den Praxiseinsatz von Service Blueprints, Customer Journey Maps, Experience Maps, Mentalen Modellen oder Ökosystem-Modellen.Jim Kalbach ist Head of Customer Experience bei MURAL, einem führenden visuellen Online-Workspace für Remote-Zusammenarbeit. Er ist ein bekannter Autor, Redner und Dozent für User Experience Design, Informationsarchitektur und Strategie und hat mit Unternehmen wie eBay, Audi, Sony, Elsevier Science, LexisNexis und Citrix zusammengearbeitet. Jim ist der Autor von "Designing Web Navigation" (O'Reilly) und "The Jobs to Be Done Playbook" (Rosenfeld).

Regulärer Preis: 42,90 €
Produktbild für Handbuch Infrastructure as Code

Handbuch Infrastructure as Code

CLOUD-INFRASTRUKTUREN ERFOLGREICH AUTOMATISIEREN: STRATEGIEN FÜR DIE PRAXIS * Mithilfe von Patterns und Antipatterns Automatisierung verstehen und erfolgreich umsetzen * Pseudocode-Beispiele veranschaulichen die konkrete Umsetzung * Diese Auflage beschreibt neben dem Managen von Servern jetzt auch komplexe Container-Plattformen Kief Morris von ThoughtWorks zeigt in diesem Praxisbuch, wie Sie die von DevOps-Teams entwickelte Prinzipien, Praktiken und Patterns effektiv verwenden, um in der Cloud sicher und flexibel Infrastruktur zu managen. Es vermittelt, wie nicht nur Server, sondern auch komplexe Container-Plattformen (Stacks) aufgesetzt werden. Sie erfahren, wie sie mithilfe von Cloud- und Automatisierungstechnologien Änderungen einfach, sicher und schnell vornehmen. Sie lernen, wie Sie nahezu alles als Code definieren und setzen Praktiken aus dem Softwaredesign ein, um ein System aus kleinen, lose gekoppelten Elementen aufzubauen. Zielgruppen sind Mitarbeiterinnen und Mitarbeiter in der Systemadministration, Infrastruktur-Entwicklung, Softwareentwicklung und Architektur.

Regulärer Preis: 44,90 €
Produktbild für Agile Visualization with Pharo

Agile Visualization with Pharo

Use the Pharo interactive development environment to significantly reduce the cost of creating interactive visualizations. This book shows how Pharo leverages visualization development against traditional frameworks and toolkits.Agile Visualization with Pharo focuses on the Roassal visualization engine and first presents the basic and necessary tools to visualize data, including an introduction to the Pharo programming language. Once you’ve grasped the basics, you’ll learn all about the development environment offered by Roassal. The book provides numerous ready-to-use examples. You’ll work on several applications, including visualizing the training phase of reinforcement learning (a powerful machine learning algorithm) and generating software visualizations from GitHub.This book covers aspects that are relevant for engineers and academics to successfully design and implement interactive visualizations.WHAT YOU WILL LEARN* Implement agile data visualization using the Pharo programming language* Chart, plot, and curve using Grapher* Build and draw graphs using Mondrian* Implement reinforcement learning (Q-Learning, from scratch) and use visualizations to monitor learning and state exploration* Use GitHub Action to generate software visualizations (UML class diagram, test coverage) at each commit WHO THIS BOOK IS FORProgrammers with some prior exposure to data visualization and computer vision who may be new to the Pharo programming language. This book is also for those with some Pharo experience looking to apply it to data visualization.ALEXANDRE BERGEL is a contributor to the Pharo programming language and an assistant professor at the University of Chile. He does research in software engineering and programming using Pharo and other programming languages with applications in data visualization, agile methodology, and more.1: Introduction.-2: Quick Start.-3: Pharo in a Nutshell.-4: Agile Visualization.-5: Overview of Rossal.-6: The Rossal Canvas.-7: Shapes.-8: Line Builder.-9: Shape Composition.-10: Normalizing and Scaling Values.-11: Interactions.-12: Layouts.-13: Integration in the Inspector.-14: Reinforcement Learning.-15: Generating Visualizations from GitHub.-

Regulärer Preis: 46,99 €
Produktbild für Beginning Java 17 Fundamentals

Beginning Java 17 Fundamentals

Learn the fundamentals of the Java 17 LTS or Java Standard Edition version 17 Long Term Support release, including basic programming concepts and the object-oriented fundamentals necessary at all levels of Java development. Authors Kishori Sharan and Adam L. Davis walk you through writing your first Java program step-by-step. Armed with that practical experience, you'll be ready to learn the core of the Java language. Beginning Java 17 Fundamentals provides over 90 diagrams and 240 complete programs to help you learn the topics faster.While this book teaches you the basics, it also has been revised to include the latest from Java 17 including the following: value types (records), immutable objects with an efficient memory layout; local variable type inference (var); pattern matching, a mechanism for testing and deconstructing values; sealed types, a mechanism for declaring all possible subclasses of a class; multiline text values; and switch expressions.The book continues with a series of foundation topics, including using data types, working with operators, and writing statements in Java. These basics lead onto the heart of the Java language: object-oriented programming. By learning topics such as classes, objects, interfaces, and inheritance you'll have a good understanding of Java's object-oriented model. The final collection of topics takes what you've learned and turns you into a real Java programmer.You'll see how to take the power of object-oriented programming and write programs that can handle errors and exceptions, process strings and dates, format data, and work with arrays to manipulate data.WHAT YOU WILL LEARN* Write your first Java programs with emphasis on learning object-oriented programming* How to work with switch expressions, value types (records), local variable type inference, pattern matching switch and more from Java 17* Handle exceptions, assertions, strings and dates, and object formatting* Learn about how to define and use modules* Dive in depth into classes, interfaces, and inheritance in Java* Use regular expressions* Take advantage of the JShell REPL toolWHO THIS BOOK IS FORThose who are new to Java programming, who may have some or even no prior programming experience.KISHORI SHARAN has earned a Master of Science in Computer Information Systems degree from Troy State University, Alabama. He is a Sun Certified Java 2 programmer. He has vast experience in providing training to professional developers in Java, JSP, EJB, and Web technology. He possesses over ten years of experience in implementing enterprise level Java application.ADAM L. DAVIS makes software. He’s spent many years developing in Java (since Java 1.2) and has enjoyed using Spring and Hibernate for more than a decade. Since 2006 he’s been using Groovy, Grails, HTML, CSS, and JavaScript, in addition to Java, to create SaaS web applications that help track finances for large institutions (among other things). Adam has a master’s and a bachelor’s degree in Computer Science from Georgia Tech. He is also the author of Reactive Streams in Java (Apress, 2019), Learning Groovy 3, Second Edition (Apress, 2019) and Modern Programming Made Easy, Second Edition (Apress, 2020).1. Programming Concepts2. Setting Up the Environment3. Writing Java Programs4. Data Types5. Operators6. Statements7. Classes and Objects8. Methods9. Constructors10. Modules11. Object and Objects Classes12. Wrapper Classes13. Execution Handling14. Assertions15. Strings16. Dates and Times17. Formatting Data18. Regular Expressions19. Arrays20. Inheritance21. Interfaces22. Enum Types23. Java ShellAppendix A: Character EncodingsAppendix B: Documentation Comments

Regulärer Preis: 66,99 €
Produktbild für Hands-on Matplotlib

Hands-on Matplotlib

Learn the core aspects of NumPy, Matplotlib, and Pandas, and use them to write programs with Python 3. This book focuses heavily on various data visualization techniques and will help you acquire expert-level knowledge of working with Matplotlib, a MATLAB-style plotting library for Python programming language that provides an object-oriented API for embedding plots into applications.You'll begin with an introduction to Python 3 and the scientific Python ecosystem. Next, you'll explore NumPy and ndarray data structures, creation routines, and data visualization. You'll examine useful concepts related to style sheets, legends, and layouts, followed by line, bar, and scatter plots. Chapters then cover recipes of histograms, contours, streamplots, and heatmaps, and how to visualize images and audio with pie and polar charts.Moving forward, you'll learn how to visualize with pcolor, pcolormesh, and colorbar, and how to visualize in 3D in Matplotlib, create simple animations, and embed Matplotlib with different frameworks. The concluding chapters cover how to visualize data with Pandas and Matplotlib, Seaborn, and how to work with the real-life data and visualize it. After reading Hands-on Matplotlib you'll be proficient with Matplotlib and able to comfortably work with ndarrays in NumPy and data frames in Pandas.WHAT YOU'LL LEARN* Understand Data Visualization and Python using Matplotlib* Review the fundamental data structures in NumPy and Pandas * Work with 3D plotting, visualizations, and animations* Visualize images and audio dataWHO THIS BOOK IS FORData scientists, machine learning engineers and software professionals with basic programming skills.Ashwin Pajankar holds a Master of Technology from IIIT Hyderabad, and has over 25 years of programming experience. He started his journey in programming and electronics with BASIC programming language and is now proficient in Assembly programming, C, C++, Java, Shell Scripting, and Python. Other technical experience includes single board computers such as Raspberry Pi and Banana Pro, and Arduino.Chapter 1: Getting Started with Python and Jupyter NotebookChapter Goal: Introduce the reader to the basics of Python programming language, philosophy, and installation. We will also learn how to install it on various platforms. This chapter also introduces the readers to Python programming with Jupyter notebook. In the end, we will also have a brief overview of the constituent libraries of SciPy stack.No of pages - 26Sub -Topics• Python Programming Language• Installing Python on various platforms• Python Modes• Python IDEs• Scientific Python Ecosystem• Overview of Jupyter Notebook• Setting up Jupyter Notebook• Running Code in Jupyter NotebookChapter 2: Getting Started with NumPyChapter Goal: Get started with NumPy Ndarrays and basics of NumPy library. The chapter covers the instructions for installation and basic usage of NumPy.No of pages: 9Sub - Topics:· Introduction to the NumPy Ndarrays· Ndarray Properties· NumPy ConstantsChapter 3 : NumPy Routines and Getting started with MatplotlibChapter goal – In this chapter, we will discuss the various Ndarray creation routines available in NumPy. We will also get started with visualizations with Matplotlib. We will learn how to visualize the various numerical ranges with Matplotlib.No of pages: 15Sub - Topics:· Routines for creating Ndarrays· Matplotlib· Visualization with NumPy and MatplotlibChapter 4 : Revisiting Matplotlib VisualizationsChapter goal – This chapter is focused on learning the details of Matplotlib styles for visualizing NumPy Ndarrays.No of pages: 24Sub - Topics:• Single Line Plots• Multiline plots• Grid, Axes, and Labels• Colors, Lines, and Markers• Subplots• Object Oriented Style• Working with the textChapter 5 : Styles and LayoutsChapter goal – This chapter is focused on learning the details of Matplotlib styles and layouts.No of pages: 12Sub - Topics:1. Styles2. layoutsChapter 6 : Line, Bar, and Scatter PlotsChapter goal – In this chapter, we will learn how to create nice visualizations with lines, bars, and scatter.No of pages: 14Sub - Topics:· Lines and Logs· Errorbar· Bar Graphs· Scatter PlotChapter 7 : Histograms, Contours, and StreamplotsChapter goal – In this chapter, we will learn how to create nice visualizations histograms, contours, and streamplots.No of pages: 15Sub - Topics:• Histograms• Contours• Plot vector entities with streamplotsChapter 8 : Image and Audio VisualizationChapter goal – Learn to work with Image Processing using NumPy and Matplotlib. Also learn how to process and visualize audio data as waveforms.No of pages: 15Sub - Topics:• Visualizing images• Interpolation Methods• Audio Visualization• Audio ProcessingChapter 9 : Pie and Polar ChartsChapter goal – Learn to work with Pie and Polar charts.No of pages: 12Sub - Topics:1. Pie charts2. Polar chartsChapter 10 : PColor, Pcolormesh, and ColorbarChapter goal – In this chapter, we will learn Pcolor, Pcolormesh, and colorbar.No of pages: 10Sub - Topics:1. PColor2. Pcolormesh3. ColorbarChapter 11 : 3D Visualizations in MatplotlibChapter goal – In this chapter, we will learn how to create 3D visualizations.No of pages: 17Sub - Topics:• Getting Ready• Plotting 3D Line• 3D Scatter plot• 3D Contours• Wireframe, Surface, and Sample Data• Bar graphs• Quiver and Stemplot• 3D VolumesChapter 12 : Animations with MatplotlibChapter goal – In this chapter, we will learn how to create simple animations with Matplotlib.No of pages: 8Sub - Topics:• Animation Basics• Celluloid libraryChapter 13 : More Recipes of Visualizations with MatplotlibChapter goal – In this chapter, we will learn more types of visualizations with Matplotlib.No of pages: 14Sub - Topics:· Visualizing Function as an image and a contour· 3D Vignette· Decorated Scatter Plots· Time plots and Signals· Filled Plots· Step Plots· Hexbins· XKCD StyleChapter 14 : Introduction to PandasChapter goal – Get started with Pandas data structuresNo of pages: 10Sub - Topics:• Introduction to Pandas• Series in Pandas• Dataframe in PandasChapter 15 : Data AcquisitionChapter goal – Read the data from various sourcesNo of pages: 18Sub - Topics:• Plain Text File Handling• Handling CSV with Python• Python and Excel• Writing and reading files with NumPy• Reading the data from a CSV file with NumPy• Matplotlib CBook• Reading data from a CSV• Reading data from an Excel• Reading data from JSON• Reading data from Pickle• Reading data from Web• Reading data from Relation databases• Reading Data from the clipboardChapter 16 : Visualizing Data with Pandas and MatplotlibChapter goal – Get started with Data Visualization with MatplotlibNo of pages: 25• Simple Plots• Bar Graphs• Histogram• Box Plot• Area Plots• Scatter Plot• Hexagonal Bin Plot• Pie ChartsChapter 17 : Introduction to Data Visualization with SeabornChapter goal – Get started with Pandas and seabornNo of pages: 20Sub - Topics:• What is Seaborn?• Plotting statistical Relationships• Plotting Lines• Visualizing the distribution of dataChapter 18 : Visualizing real-life Data with Matplotlib and SeabornChapter goal – Get started with COVID and Animal disease datasets and Visualize themNo of pages: 20Sub - Topics:• COVID-19 Pandemic Data• Fetching the Pandemic Data Programmatically• Preparing the data for visualization• Visualization with Matplotlib and Seaborn• Visualization of Animal Disease Data

Regulärer Preis: 66,99 €
Produktbild für Spring REST

Spring REST

Design and develop Java-based RESTful APIs using the latest versions of the Spring MVC and Spring Boot frameworks. This book walks you through the process of designing and building a REST application while delving into design principles and best practices for versioning, security, documentation, error handling, paging, and sorting.Spring REST provides a brief introduction to REST, HTTP, and web infrastructure. You will learn about several Spring projects such as Spring Boot, Spring MVC, Spring Data JPA, and Spring Security, and the role they play in simplifying REST application development. You will learn how to build clients that consume REST services. Finally, you will learn how to use the Spring MVC test framework to unit test and integration test your REST API.After reading this book, you will come away with all the skills to build sophisticated REST applications using Spring technologies.WHAT YOU WILL LEARN* Build Java-based microservices, native cloud, or any applications using Spring REST* Employ Spring MVC and RESTful Spring* Build a QuickPoll application example* Document REST services, as well as versioning, paging, and sorting* Test, handle errors and secure your applicationWHO THIS BOOK IS FORIntermediate Java programmers with at least some prior experience with Spring and web/cloud application development.BALAJI VARANASI is a software development manager and technology entrepreneur. He has over 13 years of experience architecting and developing Java/.Net applications and, more recently, iPhone apps. During this period he has worked in the areas of security, web accessibility, search, and enterprise portals. He has a Master s Degree in Computer Science and serves as adjunct faculty, teaching programming and information system courses. When not programming, he enjoys spending time with his lovely wife in Salt Lake City, Utah.MAXIM BARTKOV is a staff engineer with more than seven years of commercial experience in Java. Maxim specializes in building architecture for high-load systems. He is skilled in the development of Distributed High-Load Systems, Microservice architecture, Spring Framework, System Architecture, and In-Memory Data Grid (IMDG). In his spare time, he writes articles for the Java community.1. Introduction to REST2. Spring MVC & Spring Boot Primer3. RESTful Spring4. Beginning the QuickPoll Application5. Error Handling6. Documenting REST Services7. Versioning, Paging, and Sorting8. Security9. Clients and Testing10. HATEOASA. Installing cURL on Windows

Regulärer Preis: 36,99 €
Produktbild für Practical Docker with Python

Practical Docker with Python

Learn the fundamentals of containerization and get acquainted with Docker. This second edition builds upon the foundation of the first book by revising all the chapters, updating the commands, code, and examples to meet the changes in Docker. It also introduces a new chapter on setting up your application for production deployment and breaks down terminologies like Dockerfile and Docker volumes while taking you on a guided tour of building a telegram bot using Python.You'll start with a brief history of how containerization has changed over the years. Next, we look at how to install (including using the new WSL2 mode) and get started with Docker. The next couple of chapters will focus on understanding the Dockerfile, including the structure and the core instructions used in building a Docker image. You'll also see how to distribute Docker images using Docker hub and other private registries. From there, you'll look at using Docker volumes for persisting data. Then learn how to run multi-container applications with Docker compose and learn inter-container networking works with Docker networks. Finally, you'll look at how to prepare a containerized application for production deployments.Throughout the book you'll apply the techniques learned through the chapters by building a Telegram messenger Chatbot and see how much easier Docker makes it possible to build, release, contribute and distribute an application. In addition, the book shows how optimize the Docker images for production servers by using multi-stage builds and improve the reliability of your services by using health checks and restart policies. Practical Docker with Python will break down terminologies like Dockerfile and Docker volumes, and take you on a guided tour of building a telegram bot using Python.WHAT YOU'LL LEARN* Compare the difference between containerization and virtualization* Understand the Dockerfile and converting your application to Docker image* Define and run multi-container applications with Docker compose* Review data persistency with Docker volumesWHO THIS BOOK IS FORBeginner and intermediate developers, DevOps practitioners who are looking improving their build and release workflow by containerizing applications as well as system administrators learning to implement DevOps principles.Sathyajith Bhat is a seasoned DevOps/SRE professional currently working as a DevOps Engineer on Adobe I/O, which is Adobe’s developer ecosystem and community. Prior to this, he was the lead Ops/SRE at Styletag.com. He transitioned to Ops/SRE after being a lead analyst at CGI, working primarily on Oracle Fusion stack (Oracle DB/PL/SQL/Oracle Forms and other related middleware) designing, architecting, and implementing complete end-to-end solutions for a major insurance provider in the Nordics.In his free time, Sathya is part of the Barcamp Bangalore planning team, handling DevOps and Social Media for BCB. He is also a volunteer Community Moderator at Super User and Web Apps Stack Exchange, keeps the servers for Indian Video Gamer forums up and running, and was previously a Moderator for Chip-India and Tech 2 forums.Chapter 1: Introduction to Containerization & DockerChapter Goal: Brief intro into containerization, how they compare to virtual machines, Intro to Docker and getting the reader ready for the practical aspects of the bookNo of pagesSub -Topics1. What are containers2. Containers vs Virtual machines3. Introduction to Docker4. CONTAINER RUNTIMES (OCI, CRI-O, CONTAINERD)Chapter 2: Docker 101Chapter Goal: Getting started with Docker, running a sample containerNo of pages:Sub - Topics:1. INSTALLING DOCKER (INCLUDING CHANGES FOR INSTALLING DOCKER FOR WINDOWS USING THE WSL2 ENGINE)2. Checking if Docker is ready3. Docker client4. Understanding Jargon around Docker (INCLUDING DOCKER REGISTRIES, REPOSITORIES, TAGS)5. Running/stopping/ connecting a docker container6. Dockerfile brief7. Practical: Running a simple container, hands-on some common Docker commandsChapter 3: Building the Python AppChapter Goal: Getting to understand the project, APIs involved, pre-requisitesNo of pages:Sub - Topics:1. Project description (delivering latest content from Reddit to Telegram messenger)2. Setting up the Python workspace (installing the required libraries, setting up virtualenv)3. Creating a Telegram bot4. Running the Python application and confirming bot worksChapter 4: Understanding DockerfileChapter Goal: Getting to know Dockerfile, the different constructs and conceptsNo of pages:Sub - Topics:1. Dockerfile, dockerignore2. Base image & using them with “from …”3. RUN/CMD/Environment variables4. HOW AND WHY TO TAG DOCKER IMAGES5. WHY TO AVOID THE ‘LATEST’ TAG6. Practical: Modifying sample Dockerfile to run our ProjectChapter 5: Understanding Docker VolumesChapter Goal: Containers are meant for stateless applications. Chapter explains steps needed to persist data1. Problem of stateful applications in containers2. Docker volumes3. Practical: Show how data in containers is lost when container is killed and how Docker volumes avoid this4. Practical: Modifying our project Dockerfile to add Docker volumesChapter 6: Docker NetworkingChapter Goal: Overview of Docker networking, linking containers1. Docker bridged network2. User defined networks3. Practical: Create a Database container and link it with our project application server containerChapter 7: Multi Container ApplicationsChapter Goal: Building multi-container applications with Docker compose1. A LOOK AT DOCKER-COMPOSE VERSUS DOCKER COMPOSE2. Docker Compose file reference3. Linking/establishing dependencies across containers4. Environment variables across linked containers5. Practical: Moving our project from separate linked containers to Docker Compose projectCHAPTER 8: PREPARING FOR PRODUCTION DEPLOYMENTS1. WHAT IS ORCHESTRATION AND WHY DO WE NEED ORCHESTRATION2. SETTING UP CI WITH GITHUB ACTIONS TO BUILD A NEW IMAGE ON EVERY COMMIT3. TIPS TO SETUP YOUR PRODUCTION DOCKER HOSTS AND CONTAINERS4. DEPLOYING YOUR CONTAINER IMAGE TO KUBERNETES

Regulärer Preis: 56,99 €
Produktbild für Heimautomation mit KNX, Dali, 1-Wire und Co. (3. Auflage)

Heimautomation mit KNX, Dali, 1-Wire und Co. (3. Auflage)

Der Begleiter für Ihr Smart-Home-Vorhaben In diesem großen Standardwerk zur Heimautomation begleitet Sie KNX-Integrator Stefan Heinle auf dem Weg zu Ihrem smarten Zuhause. Sie finden darin nützliche Planungshilfen und Einkaufslisten, Checklisten zur Abnahme sowie unzählige Praxistipps. Von der Planung Ihrer Installation über die Auswahl der Komponenten bis hin zu Einbau, Parametrierung, Vernetzung und Absicherung wird kein Schritt ausgelassen. Selbstverständlich mit dabei: zentrale Grundlagen der Elektrik, der intelligenten Gebäudetechnik und der Programmierung. Aus dem Inhalt: Alle Grundlagen: Elektrik, intelligente Gebäudetechnik, Bus-Systeme, Vernetzung, Programmierung, Linux-AdministrationKonzepte, Standards, Vorgehensweisen und PlanungKomplette Ausstattung: Sensoren, Aktoren, Antriebe, Schnittstelle, Gateways, Logik-Maschinen, Visualisierung u. v. m.Zentrale Software: ETS, Home Server Experte, Kodi, MPD u. v. m.Multi-Room-Audio, Heimkino und Netzwerk aufbauenModerne LED-Beleuchtung, biorythmisches LichtKostenlos automatisieren: eibd, linknx, OWFS, OpenHAB, FHEM, SmartHome.pyVisualisierung/Steuerung: per Raum-Controller, Touch-Panel PC, Sprachsteuerung, Smartphone oder Web-BrowserHeimsicherheit mit Alarmanlage, Kameras und ZutrittskontrolleFunkbasierte Lösungen für den Bestandsbau nachrüstenTelefon, Türkommunikation, intelligente Haushaltsgeräte, Smart Metering u. v. m. einbindenGeldwerte Einkaufstipps und sofort einsetzbare Praxislösungen Autor: Stefan Heinle (Dipl-Ing.) plant individuelle Heimautomationslösungen und setzt Smart-Home-Projekte professionell in die Praxis um. Leseprobe (PDF-Link)

Regulärer Preis: 49,90 €
Produktbild für Robo Wunderkind für Kids

Robo Wunderkind für Kids

Roboter bauen und programmieren lernen - die spannende Erstauflage.Ein Roboter, der Nachrichten überbringen kann? Oder ein Roboter-Tier, das man selbst steuert und das genau das macht, was man möchte? Mit Robo Wunderkind und diesem Buch kannst man in die spannende Welt der Robotik eintauchen und selbst entworfenen Roboter nach eigenen Vorstellungen programmieren. Die Autorin führt einen Schritt für Schritt in die Welt von Robo ein. Egal, ob man die ersten Schritte in der Programmierung macht oder etwas komplexere Aufgaben programmieren möchte, in diesem Buch findet man für jedes Level Ideen und Anleitungen. Im ersten Teil des Buchs stellt die Autorin die einzelnen Robo-Sets und Blöcke vor: Manche Blöcke können Sounds abspielen, andere senden Lichtsignale oder schreiben Textnachrichten. Man kann die Blöcke beliebig kombinieren und so der eigenen Fantasie freien Lauf lassen.Im zweiten Teil lernst man die Coding-App kennen. Für jedes der drei Level »Robo Live«, »Robo Code« oder »Robo Blockly« findest man Ideen für die verschiedenen Sets: zum Beispiel die Musikmaschine für Robo Live, den Postboten-Robo für Robo Code und den Mondforscher-Robo für Robo Blockly. Die Autorin erklärt leicht verständlich die Befehle und verschiedenen Optionen der Coding-App – und man findet im Buch ganz viele tolle Robo-Projekte, mit denen man sich austoben und alles ausprobieren kann.Aus dem Inhalt:Die verschiedenen Blöcke und SetsVorstellung der drei Programmierlevels: Robo Live, Robo Code, Robo BlocklyProjekte für jedes Set und Level:Mars-RoverAngst-Hasen-RoboLichtweckerPostboteLinienfolgeru.v.m.Erklärungen zu allen Befehlen:den Robo flitzen oder sein LED-Licht leuchten lassenHupen- oder Lasergeräusche erzeugenHindernisse erkennen und ausweichenNachrichten in einem Display anzeigenOft verwendete Begriffe in der ProgrammierungAnregungen zu eigenen IdeenFragen und Antworten in jedem KapitelInhalt & Leseprobe (PDF-Link)

Regulärer Preis: 26,00 €