Computer und IT
Handbook on Interactive Storytelling
HANDBOOK ON INTERACTIVE STORYTELLINGDISCOVER THE LATEST RESEARCH ON CRAFTING COMPELLING NARRATIVES IN INTERACTIVE ENTERTAINMENTElectronic games are no longer considered “mere fluff” alongside the “real” forms of entertainment, like film, music, and television. Instead, many games have evolved into an art form in their own right, including carefully constructed stories and engaging narratives enjoyed by millions of people around the world. In Handbook on Interactive Storytelling, readers will find a comprehensive discussion of the latest research covering the creation of interactive narratives that allow users to experience a dramatically compelling story that responds directly to their actions and choices. Systematically organized, with extensive bibliographies and academic exercises included in each chapter, the book offers readers new perspectives on existing research and fresh avenues ripe for further study. In-depth case studies explore the challenges involved in crafting a narrative that comprises one of the main features of the gaming experience, regardless of the technical aspects of a game’s production. Readers will also enjoy:* A thorough introduction to interactive storytelling, including discussions of narrative, plot, story, interaction, and a history of the phenomenon, from improvisational theory to role-playing games* A rigorous discussion of the background of storytelling, from Aristotle’s Poetics to Joseph Campbell and the hero’s journey* Compelling explorations of different perspectives in the interactive storytelling space, including different platforms, designers, and interactors, as well as an explanation of storyworldsPerfect for game designers, developers, game and narrative researchers, academics, undergraduate and graduate students studying storytelling, game design, gamification, and multimedia systems, Handbook on Interactive Storytelling is an indispensable resource for anyone interested in the deployment of compelling narratives in an interactive context. JOUNI SMED, PHD, holds his doctorate in Computer Science. He has twenty years of experience in the game development, from algorithms and networking in multiplayer games to game software construction, design, and interactive storytelling.TOMI 'BGT' SUOVUO focuses on the virtual barrier in mediated interaction, particularly between multiple users. He has taught Principles of Interaction Design for four years.NATASHA SKULT is an active member of the Finnish and international game developers community as the Chairperson of IGDA and founder of Hive – Turku Game Hub.PETTER SKULT, PHD, obtained his doctorate in 2019 in English language and literature from Åbo Akademi University. He is a game designer and writer.List of Figures ixList of Tables xiiiPreface xvAcknowledgements xvii1 INTRODUCTION 11.1 Interactive Storytelling 31.1.1 Partakers 51.1.2 Narrative, Plot, and Story 61.1.3 Interaction 81.2 History of Interactive Storytelling 101.2.1 Theatre 111.2.2 Multicursal Literature 121.3 Role-playing Games 131.3.1 Hypertext Fiction 141.3.2 Webisodics 141.3.3 Interactive Cinema 151.3.4 Television 171.3.5 Games 171.3.5.1 Interactive Fiction 181.3.5.2 Digital Games 191.4 Summary 21Exercises 222 BACKGROUND 252.1 Analysis of Storytelling 252.1.1 Aristotle's Poetics 252.1.1.1 Elements of Tragedy 262.1.1.2 Narrative Forms 272.1.1.3 Dramatic Arc 272.1.2 Visual Storytelling 292.1.2.1 Semiotics 302.1.2.2 Work of Art 312.1.2.3 Video Games as Visual Art 312.1.3 Structuralism 332.1.3.1 Propp's Morphology of Russian Folktales 332.1.3.2 Colby's Grammar of Alaska Natives' Folktales 352.1.3.3 Story Grammars 372.1.4 Joseph Campbell and the Hero's Journey 412.1.5 Kernels and Satellites 422.2 Research on Interactive Storytelling 442.2.1 Brenda Laurel and Interactive Drama 462.2.2 Janet Murray and the Cyberbard 472.2.3 Models for Interactive Storytelling 482.2.4 Narrative Paradox and Other Research Challenges 492.2.4.1 Platform 522.2.4.2 Designer 522.2.4.3 Interactors 532.2.4.4 Storyworld 532.2.4.5 Terminology 532.3 Summary 54Exercises 543 PLATFORM 573.1 Software Development 583.1.1 Model-View-Controller 593.1.2 Interactor's Interface 613.1.3 Designer's Interface 633.1.4 Modding 633.2 Solving the Narrative Paradox 653.2.1 Author-centric Approach 663.2.2 Character-centric Approach 683.2.3 Hybrid Approach 693.3 Implementations 713.3.1 Pioneering Storytelling Systems 713.3.2 Crawford's IDS Systems 733.3.3 Stern's and Mateas's Façade 743.3.4 Experimental Systems 753.3.5 Other Systems 763.4 Summary 77Exercises 784 DESIGNER 814.1 Storyworld Types 824.1.1 Linear Storyworlds 834.1.2 Branching Storyworlds 844.1.3 Open Storyworlds 874.2 Design Process and Tools 894.2.1 Concepting the Storyworld 904.2.1.1 Character Design 924.2.1.2 Plot Composition 934.2.1.3 Adapting Material from Other Media 944.2.1.4 Transmedia Design 954.2.1.5 Adams' Template for Requirements Specifications 964.2.2 Iterative Design Process 974.2.3 Evaluating Interactive Stories 984.3 Relationship with the Interactor 1004.3.1 Focalization 1004.3.2 Story as Message 1014.4 Summary 103Exercises 1035 INTERACTOR 1075.1 Experiencing an Interactive Story 1085.1.1 Onboarding -- From Amnesia to Awareness 1095.1.2 Supporting the Journey 1105.1.3 Is There an End? 1115.1.4 Re-experiencing an Interactive Story 1125.2 Agency 1135.2.1 Theoretical and Perceived Agency 1145.2.2 Local and Global Agency 1155.2.3 Invisible Agency 1155.2.4 Limited Agency and No Agency 1165.2.5 Illusion of Agency 1165.3 Immersion 1175.3.1 Immersion Types 1175.3.2 Models for Immersion 1185.3.3 Flow 1195.4 Transformation 1205.5 Interactor Types 1215.5.1 Top-down Analysis 1225.5.2 Bottom-up Analysis 1245.5.3 Discussion 1255.6 Summary 126Exercises 1266 STORYWORLD 1316.1 Characters 1326.1.1 Perception 1336.1.2 Memory 1336.1.3 Personality 1356.1.4 Decision-making 1386.2 Elemental Building Blocks 1416.2.1 Props 1416.2.1.1 Schrödinger's Gun 1426.2.1.2 Internal Economy 1436.2.2 Scenes 1446.2.3 Events 1446.3 Representation 1456.3.1 Visual 1476.3.2 Audio 1486.3.2.1 Diegetic 1486.3.2.2 Non-diegetic 1496.4 Summary 150Exercises 1517 PERSPECTIVES 1537.1 Multiple Interactors 1537.1.1 Multiple Focus 1537.1.2 Persistence 1547.2 Extended Reality 1557.2.1 Visual Considerations 1557.2.2 Developing a Language of Expression 1577.3 Streaming Media 1577.3.1 Problems 1577.3.2 Solution Proposals 1597.4 Other Technological Prospects 1607.4.1 Voice Recognition 1607.4.2 Locating 1607.4.3 Artificial Intelligence 1617.5 Ethical Considerations 1627.5.1 Platform 1637.5.2 Designer 1637.5.3 Interactor 1647.5.4 Storyworld 1647.6 Summary 165Exercises 165Bibliography 169Ludography 187Index 191
Daily Play
»Ein toller Ansatz, um Menschen miteinander ins Gespräch zu bringen, Ideen zu diskutieren und Denkblockaden zu durchbrechen.« Coworking Map, 07/2021Ein inspirierendes Buch für alle, die Workshops moderieren, sowie für Scrum Master und Coaches, die agile Spiele in ihren Trainings einsetzen möchten. Mit agilen Spielen förderst du Interaktion, Produktivität und nachhaltiges Lernen in deinen Teams. Das erfahrene Autorenteam zeigt in 25 Spielen, worauf es dabei ankommt, inklusive ausführlicher Spielanleitungen mit Hinweisen zu Vorbereitung, Moderation und Auswertung. Zudem gibt es einiges zu deiner Rolle als Spielleitung zu wissen – wirkungsvoll agil zu moderieren ist nämlich eine Kunst! Schärfe deinen Blick für Ziele und entwickle ein gutes Gespür für Situationen, Teamprozesse und Möglichkeiten. So setzt du agile Spiele in deinem Umfeld erfolgreich ein.Aus dem Inhalt:Über 20 konkrete AnleitungenFundierte EinführungZum Spiel einladen und eine wertschätzende Atmosphäre schaffenÜbersicht nach Funktion – finde das richtige SpielGekonnte Spielleitung und ModerationAufwärmen und mit Widerständen umgehenZielgruppen definierenZufall, Regeln und Hindernisse einsetzenErlebnisse teilen und auswertenEigene Spiele entwickelnLeseprobe (PDF-Link)
Windows Server (2. Auflg.)
Das umfassende Handbuch zum Windows Server 2019 in 2., aktualisierte und erweiterte Auflage.Der Windows Server ist das Herzstück Ihrer Firmen-IT – und dieses umfassende Handbuch zeigt Ihnen, wie Sie den sicheren Betrieb gewährleisten. Dazu erläutert es Ihnen alle Serverrollen und gibt praxisorientierte Antworten auf alle Fragen des täglichen Betriebs. Das Autorenteam aus Microsoft Premier Field Engineers und erfahrenen Administratoren liefert Ihnen detaillierte Hintergrundinformationen und zahlreiche Praxistipps, die dafür sorgen, dass Ihnen die Konfiguration reibungslos gelingt. Aus dem Inhalt: Neuerungen und FunktionsumfangAlle Rollen und FeaturesNetzwerkgrundlagen und -TopologienActive Directory: Benutzer, Gruppen, Rechte und DelegationenMigration von ServerdienstenPowerShell-GrundkursVirtualisierung mit Hyper-VPatchmanagement mit WSUSRemotedesktopdiesnte, VPN und NPSIntegration in AzureTroubleshooting und Sicherheit Inhalt (PDF-Link)Leseprobe (PDF-Link)
Wiko VIEW5 / VIEW5 Plus
Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie das Wiko VIEW5 / VIEW5 Plus von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Wiko VIEW5 / VIEW5 Plus auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit
SQL Data Warehousing mit SAP HANA
Die Standardlösung SAP BW/4HANA passt nicht für Ihr Unternehmen? Dieses umfassende Handbuch zeigt Ihnen, wie Sie ein SQL Data Warehouse auf SAP HANA aufbauen. Von der Entwicklung einer geeigneten Architektur über die Datenmodellierung bis hin zur Beladung des Data Warehouse erfahren Sie anhand zahlreicher Beispiele, wie Sie vorgehen sollten. Auch die Anbindung an SAP Data Warehouse Cloud erläutert das erfahrene Autorenteam Ihnen. Aus dem Inhalt: Data-Warehousing-Ansätze von SAP im VergleichEinsatzgebiete von SQL Data WarehousingArchitektur- und DatenmodellierungskonzepteDevOps-AnsatzPhysisches, logisches und konzeptionelles DatenmodellEntwicklung auf der SAP-HANA-PlattformDatenspeicherung und -analyseDatenbeschaffung und BetriebWerkzeuge der SAP HANA Data Warehousing Foundation Einleitung ... 17 TEIL I. Einführung ... 23 1. Ziele und Einsatzgebiete von Data Warehousing ... 25 1.1 ... Neue Anforderungen an das Data Warehousing ... 27 1.2 ... Data-Warehousing-Ansätze von SAP im Vergleich ... 33 1.3 ... Warum SAP SQL Data Warehousing? ... 47 1.4 ... Zusammenfassung ... 53 2. Einführung in SAP HANA als Plattform ... 55 2.1 ... Architektur der SAP-HANA-Plattform ... 55 2.2 ... Die Funktionen der SAP-HANA-Plattform ... 63 2.3 ... Werkzeuge der SAP-HANA-Plattform ... 77 2.4 ... Zusammenfassung ... 83 TEIL II. Architektur- und Datenmodellierungskonzepte eines SQL Data Warehouse ... 85 3. Referenzarchitektur eines modernen Data Warehouse ... 87 3.1 ... Data-Warehouse-Architektur ... 87 3.2 ... Zweck der Referenzarchitektur ... 96 3.3 ... Konzeption und Vorteile der Referenzarchitektur ... 97 3.4 ... Bestandteile der Referenzarchitektur ... 98 3.5 ... Business-Intelligence-Tools ... 108 3.6 ... Zusammenfassung ... 109 4. Entwicklungsansatz für das SAP SQL DWH ... 111 4.1 ... Unterschiedliche Entwicklungsansätze im Vergleich ... 111 4.2 ... DevOps-Ansatz für SAP SQL Data Warehousing ... 126 4.3 ... Zusammenfassung ... 139 5. Methodische Grundlagen für das Data Warehousing ... 141 5.1 ... Modellierungsprozess ... 142 5.2 ... Modellierungsarten ... 154 5.3 ... Prozessorganisation ... 178 5.4 ... Teamarbeit und Prozessautomatisierung ... 181 5.5 ... Zusammenfassung ... 187 6. Technische Grundlagen ... 189 6.1 ... Infrastruktur ... 190 6.2 ... Core Data Services ... 201 6.3 ... Persistenztypen ... 211 6.4 ... Datenzugriff ... 214 6.5 ... Datentransformation und Orchestrierung ... 236 6.6 ... Analyseobjekte ... 245 6.7 ... Sonstige Datenbankobjekte ... 255 6.8 ... Zusammenfassung ... 258 TEIL III. Modellierung und Implementierung eines SQL Data Warehouse ... 259 7. Modellierung des konzeptionellen Datenmodells ... 261 7.1 ... Issue Tracking ... 262 7.2 ... Anforderungsaufnahme ... 266 7.3 ... Zusammenfassung ... 279 8. Modellierung der physischen Datenmodelle ... 281 8.1 ... Erstellen des Datenmodells der Quellsysteme ... 283 8.2 ... Erstellen des quellgetriebenen Datenmodells ... 292 8.3 ... Erstellen des Core-Datenmodells ... 303 8.4 ... Erstellen der analytischen Datenmodelle ... 321 8.5 ... Export der Datenmodelle ... 331 8.6 ... Zusammenfassung ... 334 9. Entwicklung des SQL Data Warehouse ... 337 9.1 ... Initialisierung von Git und SAP Web IDE ... 338 9.2 ... Import der SAP-PowerDesigner-Datenmodelle ... 342 9.3 ... Datenzugriff ... 346 9.4 ... Datentransformation ... 357 9.5 ... Implementierung von Calculation Views im Virtual Analytical Layer ... 378 9.6 ... Implementierung von Calculation Views in Data Marts ... 387 9.7 ... Berechtigungskonzept für analytische Sichten ... 391 9.8 ... Zusammenfassung ... 393 10. Deployment des SAP SQL Data Warehouse ... 395 10.1 ... Manuelles Deployment ... 396 10.2 ... Automatisches Deployment ... 400 10.3 ... Testautomation ... 404 10.4 ... Zusammenfassung ... 408 11. Beladung und Betrieb des SQL Data Warehouse ... 409 11.1 ... Beladung und Orchestrierung ... 410 11.2 ... Data Lifecycle Manager ... 415 11.3 ... Data Distribution Optimizer ... 419 11.4 ... Data Warehouse Monitoring ... 425 11.5 ... Zusammenfassung ... 426 TEIL IV. Ergänzende Werkzeuge ... 429 12. SAP Analytics Cloud ... 431 12.1 ... SAP Analytics Cloud im Überblick ... 432 12.2 ... Anbinden von Datenquellen ... 436 12.3 ... Datenmodellierung ... 441 12.4 ... Erstellen von Storys ... 446 12.5 ... Zusammenfassung ... 452 13. SAP Data Warehouse Cloud ... 453 13.1 ... SAP Data Warehouse Cloud im Überblick ... 454 13.2 ... SAP Data Warehouse Cloud und SAP SQL DWH ... 474 13.3 ... Zusammenfassung ... 483 14. SAP Data Intelligence ... 485 14.1 ... Architektur von SAP Data Intelligence ... 486 14.2 ... Datenmanagement und Datenorchestrierung ... 494 14.3 ... Machine Learning ... 504 14.4 ... Anwendungsbeispiel für SAP Data Intelligence ... 514 14.5 ... SAP Data Intelligence und SAP SQL DWH ... 532 14.6 ... Zusammenfassung ... 540 Abkürzungsverzeichnis ... 543 Literaturverzeichnis ... 549 Die Autoren ... 553 Index ... 555
SAP Cloud Integration
Sie möchten SAP-Cloud-Services zusammen mit Ihren On-Premise-Anwendungen einsetzen? Dann lesen Sie in diesem Buch, wie Sie Integration Flows modellieren und überwachen, um Daten zwischen diesen beiden Welten auszutauschen. Sie werden durch alle Bereiche von SAP Cloud Integration (vormals SAP Cloud Platform Integration) geführt und lernen dabei die Verwendung der verschiedenen Komponenten wie Events und Routing sowie die Anwendung der unterschiedlichen Connectivity-Adapter. Aus dem Inhalt: Architektur und VersionenNeo- und Cloud-Foundry-UmgebungKonfiguration und EinrichtungIntegrationskomponenten und AdapterMonitoring und SicherheitIntegrationsflüsse modellieren und ausführenMit Mappings- und XML-Daten arbeitenCloud Connector und API-ZugriffeTransport von Integrationen Einleitung ... 15 1. Grundlagen ... 21 1.1 ... Cloud Computing ... 21 1.2 ... SAP Business Technology Platform ... 26 1.3 ... Einführung in SAP Cloud Integration ... 37 1.4 ... SAP Integration Suite ... 41 1.5 ... Zusammenfassung ... 51 2. Einrichtung von SAP Cloud Integration ... 53 2.1 ... Einen Trial Account für SAP Cloud Integration einrichten ... 53 2.2 ... SAP Cloud Integration in der Neo-Umgebung einrichten ... 67 2.3 ... Ihre erste Integration erstellen ... 70 2.4 ... Zusatzinformationen und Dokumentation verwenden ... 74 2.5 ... Zusammenfassung ... 78 3. Discover-Oberfläche ... 79 3.1 ... Einführung in die Discover-Oberfläche ... 79 3.2 ... Beispiele für vordefinierte Integrationsszenarien ... 91 3.3 ... Prozessinformationen mit dem SAP Best Practices Explorer abrufen ... 96 3.4 ... Zusammenfassung ... 100 4. Design-Oberfläche ... 101 4.1 ... Pakete und Artefakte ... 101 4.2 ... Versionierung ... 121 4.3 ... Grundlagen zur Erstellung einer Integration ... 123 4.4 ... Zusammenfassung ... 138 5. Monitor-Oberfläche ... 139 5.1 ... Startseite der Monitor-Oberfläche im Überblick ... 139 5.2 ... Integration Flows überwachen ... 143 5.3 ... Veröffentlichte Artefakte überwachen ... 155 5.4 ... Sicherheitseinstellungen ... 160 5.5 ... Datenspeicherung verwalten ... 185 5.6 ... Log-Einträge ... 191 5.7 ... Gesperrte Objekte verwalten ... 194 5.8 ... Zusammenfassung ... 195 6. Settings-Oberfläche ... 197 6.1 ... Produktprofile ... 198 6.2 ... Transporteinstellungen ... 202 6.3 ... ES Repository ... 203 6.4 ... Custom Tags ... 207 6.5 ... Zusammenfassung ... 213 7. Komponenten und Adapter ... 215 7.1 ... Integrationskomponenten ... 215 7.2 ... Adapter ... 282 7.3 ... Zusammenfassung ... 311 8. Wichtige Grundfunktionen ... 313 8.1 ... Apache Camel und Expressions ... 314 8.2 ... Bedingungen mit Vergleichsoperatoren definieren ... 317 8.3 ... XML und XPath ... 319 8.4 ... Parametrisierung mit der Funktion »Externalize« ... 322 8.5 ... Migration von Komponenten ... 327 8.6 ... Erweiterungskonzept für Integrationsszenarien ... 329 8.7 ... Aufbau von Nachrichten ... 334 8.8 ... Dokumentation der Header- und Property-Variablen ... 335 8.9 ... Partner Directory ... 336 8.10 ... Verfügbarkeit von Services und Rechenzentren prüfen ... 340 8.11 ... Zusammenfassung ... 343 9. Ergänzende Werkzeuge ... 345 9.1 ... HTTP-Anfragen mit Postman verschicken ... 345 9.2 ... WSDL-Dateien mit SoapUI öffnen ... 354 9.3 ... Große Dateien mit Notepad++ bearbeiten ... 357 9.4 ... Groovy-Skripte mit Atom entwickeln ... 360 9.5 ... Weitere Werkzeuge der SAP Community ... 363 9.6 ... Zusammenfassung ... 370 10. Design Guidelines zur Anwendung der Komponenten ... 371 10.1 ... Enterprise Integration Patterns ... 372 10.2 ... Fehlerbehandlung ... 389 10.3 ... Skripte erweitern ... 401 10.4 ... Sicherheit ... 415 10.5 ... Mit dem Partner Directory arbeiten ... 424 10.6 ... Zusammenfassung ... 429 11. Prüfen, Testen und Debugging ... 431 11.1 ... Simulation ... 431 11.2 ... Debugging und Tracing ... 438 11.3 ... Debugging-Skripte ... 444 11.4 ... Zusammenfassung ... 449 12. Konnektivität ... 451 12.1 ... Transport von Integrationen ... 451 12.2 ... Cloud Connector ... 466 12.3 ... API-Zugriff auf SAP Cloud Integration ... 489 12.4 ... SAP Cloud Integration im Zusammenspiel mit anderen Services der SAP BTP ... 501 12.5 ... Zusammenfassung ... 504 13. Beispiele für Integrationsszenarien ... 505 13.1 ... Einen Lead in SAP Sales Cloud anlegen ... 506 13.2 ... Serviceabruf in SAP Field Service Management ... 530 13.3 ... Lieferantenrechnung in SAP S/4HANA Cloud anlegen ... 547 13.4 ... Zusammenfassung ... 575 14. Ausblick und weiterführende Informationen ... 577 14.1 ... Weiterführende Informationen ... 577 14.2 ... Geplante Funktionen ... 592 14.3 ... Zusammenfassung ... 596 Der Autor ... 597 Index ... 598
Pinterest-Marketing
Pinterest ist der versteckte Stern am Marketing-Himmel. Nutze die Stärken von Pinterest und leite so mehr Traffic auf deine Website. Die Nutzerinnen und Nutzer lassen sich auf der Plattform inspirieren und verwenden sie als visuelle Suchmaschine. Das Gute daran? Marken-Content ist hier gern gesehen. Mit diesem Praxisbuch erhältst du das nötige Know-how, um erfolgreiches Pinterest-Marketing zu betreiben. Die beiden Autorinnen zeigen dir, wie die Plattform funktioniert und welche Möglichkeiten sich für dich bieten.Sie geben dir das Gesamtpaket in die Hand: vom verständlichen Einstieg, der Optimierung deiner Inhalte und Pins, der richtigen strategischen Planung bis zum Einsatz von Werbeanzeigen und der Auswertung der Zahlen mit Pinterest Analytics. So setzt du Pinterest gewinnbringend für deine Zwecke ein! Aus dem Inhalt: Die Einsatzmöglichkeiten von PinterestRundgang durch die PlattformOptimierung deiner Inhalte und PinsPinterest-SEODie unterschiedlichen Pin-FormateDie richtige Strategie für dein BusinessWebsite, Bilder und Videos optimierenWerbeanzeigen mit dem Ads ManagerPinterest Analytics: die Zahlen auswertenCommunity Management und Monitoring Geleitwort ... 13 1. Einführung in das Pinterest-Marketing ... 15 2. Über Pinterest ... 23 2.1 ... Eine Reise durch die Benutzeroberfläche von Pinterest ... 24 2.2 ... Die Customer Journey auf Pinterest ... 27 2.3 ... Warum Pinterest die ideale Plattform für Blogger, Unternehmerinnen und E-Commerce ist ... 32 2.4 ... Für welche Branchen ist Pinterest interessant? ... 38 2.5 ... Was du vor deinem Start über Pinterest wissen solltest ... 39 3. Mit strategischer Planung zum erfolgreichen Pinterest-Auftritt ... 45 3.1 ... Lerne die Zielgruppe auf Pinterest kennen ... 46 3.2 ... Erstelle deine Persona ... 55 3.3 ... Zieldefinition: Was möchtest du auf Pinterest erreichen? ... 60 3.4 ... Finde die passende Themenwolke für dein Unternehmen und deine Zielgruppe ... 61 4. Deine ersten Schritte auf Pinterest: die Profileinrichtung, Teil 1 ... 71 4.1 ... Unternehmenskonto einrichten ... 71 4.2 ... Rich Pins ... 82 5. SEO: Optimiere deine Inhalte für die visuelle Suchmaschine ... 87 5.1 ... Was sind die Ranking-Faktoren auf Pinterest? ... 87 5.2 ... So funktioniert die Keyword-Recherche auf Pinterest ... 89 5.3 ... Strategische Nutzung von Keywords auf Pinterest ... 95 5.4 ... Formulierungstipps für klickstarke Pin-Überschriften ... 101 6. Der perfekte Pin: Pin-Formate und Designtipps für klickstarke Pins ... 111 6.1 ... Pin-Formate im Überblick: Standard-Pin, Karussell-Pin, Video-Pin, Idea-Pin ... 113 6.2 ... Wie fallen deine Pins im Feed auf? ... 120 6.3 ... Best Practice: Designregeln, die auf jedem deiner Pins umgesetzt werden sollten ... 121 6.4 ... Designregeln für weitere Pin-Formate ... 136 6.5 ... 85 % mobil: Optimiere für mobile Endgeräte ... 160 7. Deine ersten Schritte auf Pinterest: die Profileinrichtung, Teil 2 ... 163 7.1 ... Funktionen und Einrichtung von Pinnwänden ... 163 7.2 ... So lädst du deine ersten Pins hoch ... 174 8. Pin-Strategie: So holst du das Bestmögliche aus deinen Inhalten heraus ... 191 8.1 ... Content Upcycling -- erstelle zeitsparend viel Content auf einmal ... 191 8.2 ... Strategische Verteilung der Pins auf deine Pinnwände ... 202 8.3 ... Scheduling auf Pinterest ... 210 8.4 ... Zeitsparend mit Planungstools: im Vergleich ... 212 9. Optimiere deine Website und deinen Blog für Pinterest ... 215 9.1 ... Pinterest-Nutzerinnen und -Nutzer da abholen, wo sie ankommen ... 216 9.2 ... Optimiere deine Website, um auf Pinterest aufmerksam zu machen ... 226 10. Pinterest Analytics: Werte deine Zahlen richtig aus ... 243 10.1 ... Was ist Pinterest Analytics? ... 244 10.2 ... Einfach erklärt: die Analytics-Metriken ... 244 10.3 ... Rundgang: die Analytics-Navigation ... 247 10.4 ... Gewusst wie: So wertest du deine Pinterest-Analytics-Zahlen aus ... 262 10.5 ... So erstellst du aus deinen Zahlen ein Reporting ... 269 10.6 ... Zusätzliche Erkenntnisse in Tailwind Insights ... 270 11. Werbeanzeigen ... 273 11.1 ... Kampagnen erstellen -- eine Anleitung für den Ads Manager ... 276 11.2 ... Werbekampagnen planen ... 289 11.3 ... Pinterest Ads: So erstellst du zielführende Werbeanzeigen ... 294 11.4 ... Kampagnen verwalten und optimieren ... 309 11.5 ... Praxistipps ... 318 12. Community-Management und -Monitoring ... 323 12.1 ... Die Entwicklungen im Community-Management ... 323 12.2 ... Community-Management ... 325 12.3 ... Community-Monitoring ... 333 13. Bonus: Hilfreiche Tipps und Tricks ... 335 13.1 ... Weitere Einsatzmöglichkeiten von Pinterest ... 335 13.2 ... Hilfreiche Tools und ihre Einsatzgebiete ... 342 13.3 ... Pinterest-Workflow -- alle wichtigen Aufgaben auf einen Blick ... 347 13.4 ... Pinterest und Recht -- was sollte ich wissen? ... 357 13.5 ... E-Commerce auf Pinterest ... 362 Index ... 373
SAP Fieldglass
Sparen Sie Ressourcen und sichern Sie die Compliance Ihres Unternehmens! Dieses praktische Handbuch stellt Ihnen alle wichtigen Module von SAP Fieldglass und ihren Einsatz bei der Personalbeschaffung vor. Sie lernen, wie Sie Fieldglass implementieren und konfigurieren, wie Sie die einzelnen Module verwenden und welche übergreifenden Funktionen es z. B. für das Reporting bietet. Auch die Integration mit SAP S/4HANA und Cloud-Produkten wie SuccessFactors und Ariba wird beschrieben. Aus dem Inhalt: Beschaffungsprozesse und ModuleManaged Service Provider (MSP)Fremdpersonal und LeistungsbeschreibungenDienst- und WerkverträgeProfilmitarbeiter*innenTarife und RatenTätigkeits- und AusgabennachweiseOnboarding und OffboardingDatenaufbewahrungReportingStandard- und produktisierte Integrationen Danksagungen ... 19 Vorwort ... 23 Foreword ... 25 Über dieses Buch ... 27 TEIL I. SAP Fieldglass - Übersicht und Prozesse ... 31 1. Einführung in SAP Fieldglass ... 33 1.1 ... Einsatzfelder ... 34 1.2 ... Positionierung im Intelligent Enterprise ... 37 1.3 ... Programmorganisation ... 39 1.4 ... Implementierung und Lifecycle Management ... 42 1.5 ... Benutzeroberfläche ... 47 1.6 ... Zusammenfassung ... 52 2. Architektur: Beschaffungsprozesse und Module ... 53 2.1 ... Zugang und Module ... 53 2.2 ... Beschaffungsprozesse ... 55 2.3 ... Periphere Module ... 66 2.4 ... Zusammenfassung ... 82 3. Fremdpersonal: Prozesse und Funktionen ... 83 3.1 ... Beschaffungsprozess ... 83 3.2 ... Prozessdetails ... 87 3.3 ... Typ des Fremdpersonals und Tätigkeitsprofilvorlagen ... 107 3.4 ... Qualifikationen ... 113 3.5 ... Bewerbungsgespräch ... 115 3.6 ... Arbeitnehmerüberlassung in Deutschland ... 118 3.7 ... Zusammenfassung ... 119 4. Ausschreibungen und Leistungsbeschreibungen: Prozesse und Funktionen ... 121 4.1 ... Ausschreibungen und Leistungsbeschreibungen ... 123 4.2 ... Funktionen, Einstellungen und Prozesse ... 136 4.3 ... Klassifizierung der Ausschreibungen und Leistungsbeschreibungen ... 138 4.4 ... Leistungsbeschreibungstyp ... 142 4.5 ... Leistungsbeschreibungsvorlagen ... 148 4.6 ... Weitere Konfigurationen und Überlegungen ... 155 4.7 ... Einzelposten und Bibliotheken ... 159 4.8 ... Anwendungsfälle und Beispiele ... 190 4.9 ... Zusammenfassung ... 192 TEIL II. Modulübergreifende Funktionen ... 193 5. Unternehmensstruktur ... 195 5.1 ... Implementierung ... 196 5.2 ... Master Data: Einsatzort und Ort ... 198 5.3 ... Master Data: Geschäftsbereich ... 204 5.4 ... Master Data: Kostenstelle ... 207 5.5 ... Master Data: Rechtseinheit ... 213 5.6 ... Art der Arbeit ... 217 5.7 ... Benutzer ... 218 5.8 ... Benutzerrolle ... 226 5.9 ... Lieferanten ... 228 5.10 ... Externe Mitarbeiter*innen ... 236 5.11 ... Zusammenfassung ... 249 6. Tarife und Raten ... 251 6.1 ... Raten im Beschaffungsprozess ... 251 6.2 ... Grundkenntnisse ... 259 6.3 ... Ratengestaltung ... 265 6.4 ... Komplexe Ratenstrukturen ... 285 6.5 ... Anwendungsfälle und Überlegungen ... 300 6.6 ... Zusammenfassung ... 305 7. Tätigkeitsnachweise, Ausgabennachweise und Rechnungsstellung ... 307 7.1 ... Tätigkeitsnachweise ... 308 7.2 ... Ausgabennachweis ... 327 7.3 ... Rechnung für Sonstiges ... 334 7.4 ... Rechnungsstellung ... 337 7.5 ... Zusammenfassung ... 347 8. Andere Einstellungen ... 349 8.1 ... Kundenspezifische Felder ... 350 8.2 ... Kundenspezifisches Lookup ... 361 8.3 ... Stellencodes ... 362 8.4 ... Kategorien ... 363 8.5 ... Gründe ... 363 8.6 ... Genehmigungen ... 364 8.7 ... Messaging und Benachrichtigungen ... 373 8.8 ... Systemnotifikationen ... 380 8.9 ... Social Enterprise ... 386 8.10 ... Zusammenfassung ... 392 9. Compliance ... 393 9.1 ... Aktivitätsposten und Aktivitäten-Checklisten ... 393 9.2 ... Meilensteine ... 404 9.3 ... Vermögensgegenstandstypen ... 406 9.4 ... Elektronische Signatur mit DocuSign ... 407 9.5 ... Zusammenfassung ... 411 10. Berichte und Analysen ... 413 10.1 ... Voreinstellungen und Voraussetzungen ... 414 10.2 ... Berichtsfelder und Formeln ... 418 10.3 ... Berichterstellung ... 421 10.4 ... Analysewerkzeuge und Analysefunktionen ... 428 10.5 ... Empfehlungen zur effektiven Verwendung der Reporting-Funktion ... 436 10.6 ... Zusammenfassung ... 438 11. Datenaufbewahrung ... 439 11.1 ... Datenhaltungsrichtlinien verwalten ... 439 11.2 ... Löschen von Benutzerinformationen ... 447 11.3 ... Zusammenfassung ... 449 TEIL III. Integrationen und Zusammenspiel mit anderen SAP-Produkten ... 451 12. Standardintegrationen ... 453 12.1 ... Übersicht ... 454 12.2 ... Standard-Konnektoren ... 459 12.3 ... Configuration Manager ... 469 12.4 ... Single Sign-On ... 481 12.5 ... Produktisierte Integrationen ... 484 12.6 ... SAP Fieldglass Integrations Add-on 1.0 ... 485 12.7 ... Zusammenfassung ... 488 13. Integration mit SAP SuccessFactors ... 489 13.1 ... Produktisierte Integrationen: Übersicht ... 490 13.2 ... Master-Data-Integration ... 493 13.3 ... Position-Management-Integration ... 499 13.4 ... Mitarbeiterdaten-Integration ... 506 13.5 ... Zusammenfassung ... 512 14. Integration mit SAP Ariba ... 513 14.1 ... Produktisierte Integrationen: Übersicht ... 514 14.2 ... Master-Data-Integration ... 519 14.3 ... Transaktionale Integrationen: Übersicht ... 524 14.4 ... SAP Ariba Sourcing und SAP Ariba Contracts ... 527 14.5 ... Beschaffungsintegration: Bestellanforderung/Bestellung ... 531 14.6 ... Rechnungsintegration ... 540 14.7 ... Zusammenfassung ... 547 15. Integration mit SAP S/4HANA ... 549 15.1 ... Produktisierte Integrationen: Übersicht ... 550 15.2 ... Replikation der Master Data von SAP S/4HANA nach SAP Fieldglass ... 555 15.3 ... Geschäftspartner-Replikation von SAP S/4HANA nach SAP Fieldglass ... 564 15.4 ... Transaktionsintegrationen ... 567 15.5 ... Beschaffungsintegration mit Bestellanforderung und Bestellung ... 571 15.6 ... Integration von Leistungserfassungsblättern ... 578 15.7 ... Rechnungsintegration ... 583 15.8 ... Zusammenfassung ... 588 Anhang ... 589 A ... Begriffserklärungen ... 591 B ... Reihenfolge der Implementierung ... 599 C ... Übersichten ... 605 Das Autorenteam ... 615 Index ... 619
SAP Business Technology Platform - Sicherheit und Berechtigungen
SAP in der Cloud? Aber sicher! Dieses Buch führt Sie in die Sicherheitsmechanismen der SAP Business Technology Platform (vormals SAP Cloud Platform) ein. Sie lernen, Benutzer und Berechtigungen für Ihre Szenarien einzurichten, sichere Verbindungen zu Cloud- und On-Premise-Systemen zu konfigurieren und mit den Administrationstools der Plattform zu arbeiten. Die Sicherheitsfunktionen sowohl der Neo- als auch der Cloud-Foundry-Umgebung werden umfassend vorgestellt. Aus dem Inhalt: Accounts und SpacesSichere KommunikationIdentity ProviderSAP Cloud Identity ServicesBenutzer, Rollen und BerechtigungenCloud ConnectorAPIs absichernAdministration per KommandozeileChecklisten und Praxisbeispiele Einleitung ... 13 1. Einführung in die SAP Business Technology Platform ... 17 1.1 ... Positionierung der SAP Business Technology Platform innerhalb der SAP-Strategie ... 18 1.2 ... Umgebungen der SAP Business Technology Platform ... 27 1.3 ... Architektur der SAP BTP ... 37 2. Sicherheit auf der SAP Business Technology Platform im Überblick ... 53 2.1 ... Sichere Kommunikation ... 53 2.2 ... Authentifizierung ... 63 2.3 ... Autorisierung ... 76 2.4 ... SAP Cloud Identity Services ... 79 2.5 ... SAP Cloud Identity Access Governance ... 120 2.6 ... Checkliste zur allgemeinen Sicherheit der SAP Business Technology Platform ... 122 3. Sicherheit und Berechtigungen in der Neo-Umgebung konfigurieren ... 125 3.1 ... Kommandozeile für die Neo-Umgebung einrichten ... 126 3.2 ... Benutzerverwaltung ... 129 3.3 ... Trust-Konfiguration ... 137 3.4 ... Berechtigungsverwaltung ... 148 3.5 ... Checkliste zu Sicherheit und Berechtigungen in der Neo-Umgebung ... 167 3.6 ... Beispiele für die Benutzer- und Berechtigungsverwaltung aus der Praxis ... 168 4. Sicherheit und Berechtigungen in der Cloud-Foundry-Umgebung konfigurieren ... 191 4.1 ... Kommandozeile für die Cloud-Foundry-Umgebung einrichten ... 193 4.2 ... Benutzerverwaltung ... 195 4.3 ... Trust-Konfiguration ... 198 4.4 ... Berechtigungsverwaltung ... 203 4.5 ... Checkliste zu Sicherheit und Berechtigungen in der Cloud-Foundry-Umgebung ... 217 4.6 ... Beispiele für die Benutzer- und Berechtigungsverwaltung aus der Praxis ... 219 5. Cloud Connector ... 239 5.1 ... Architektur ... 240 5.2 ... Installation und Konfiguration des Cloud Connectors ... 244 5.3 ... Authentifizierungsmethoden ... 256 5.4 ... Cloud-zu-on-Premise-Verbindungen ... 258 5.5 ... Einrichtung des SAP Destination Service ... 276 5.6 ... Checkliste für die Konfiguration des Cloud Connectors ... 281 5.7 ... Beispiele zur sicheren Konfiguration des Cloud Connectors in der Praxis ... 282 6. Administrationswerkzeuge der SAP Business Technology Platform ... 299 6.1 ... Administration der Neo-Umgebung über die Kommandozeile ... 300 6.2 ... Verwaltung des Global Accounts mit dem SAP BTP Command Line Interface ... 303 6.3 ... Administration über APIs ... 305 6.4 ... Checkliste zur Arbeit mit der Kommandozeile und APIs ... 331 6.5 ... Beispiele zur sicheren Verwendung der Kommandozeile ... 331 7. Sicherheitsaspekte wichtiger Cloud-Services ... 339 7.1 ... SAP Web IDE und SAP Business Application Studio ... 341 7.2 ... SAP Cloud Integration ... 348 7.3 ... SAP API Management ... 362 7.4 ... SAP Cloud Portal Service und SAP Launchpad Service ... 366 7.5 ... SAP Internet of Things ... 371 7.6 ... SAP BTP, ABAP Environment ... 375 7.7 ... Corporate User Store ... 380 7.8 ... Checkliste zur Absicherung von Cloud-Services ... 383 Das Autorenteam ... 385 Index ... 387
Mastering Linux System Administration
ACHIEVE LINUX SYSTEM ADMINISTRATION MASTERY WITH TIME-TESTED AND PROVEN TECHNIQUESIn Mastering Linux System Administration, Linux experts and system administrators Christine Bresnahan and Richard Blum deliver a comprehensive roadmap to go from Linux beginner to expert Linux system administrator with a learning-by-doing approach. Organized by do-it-yourself tasks, the book includes instructor materials like a sample syllabus, additional review questions, and slide decks.Amongst the practical applications of the Linux operating system included within, you'll find detailed and easy-to-follow instruction on:* Installing Linux servers, understanding the boot and initialization processes, managing hardware, and working with networks* Accessing the Linux command line, working with the virtual directory structure, and creating shell scripts to automate administrative tasks* Managing Linux user accounts, system security, web and database servers, and virtualization environmentsPerfect for entry-level Linux system administrators, as well as system administrators familiar with Windows, Mac, NetWare, or other UNIX systems, Mastering Linux System Administration is a must-read guide to manage and secure Linux servers.CHRISTINE BRESNAHAN has over thirty years of experience working in the IT industry. She is an Adjunct Professor at Ivy Tech Community College where she teaches Linux certification and Python programming classes. She is co-author with Richard Blum of CompTIA Linux+ Study Guide, Linux Essentials, and the Linux Command Line and Scripting Bible. RICHARD BLUM has over thirty years of experience working as a system and network administrator. He teaches online courses in Linux and Web programming and is co-author with Christine Bresnahan of several Linux titles, including CompTIA Linux+ Study Guide, Linux Essentials, and the Linux Command Line and Scripting Bible.Introduction xxvPART 1 BASIC ADMIN FUNCTIONS 1CHAPTER 1 UNDERSTANDING THE BASICS 3What is Linux? 3Looking into the Linux Kernel 4The GNU Utilities 12Linux User Interfaces 12Linux Distributions 18Core Linux Distributions 19Specialized Linux Distributions 19The Bottom Line 20CHAPTER 2 INSTALLING AN UBUNTU SERVER 23Pre-Installation Requirements 23Hardware Requirements 24Virtual Server Requirements 25Finding the Software 26Oracle VirtualBox 26Ubuntu Server 26Running the Installation 29Oracle VirtualBox 29Ubuntu Server 33Checking the Installation 49The Bottom Line 50CHAPTER 3 INSTALLING AND MAINTAINING SOFTWARE IN UBUNTU 53Exploring Package Management 53Inspecting the Debian-Based Systems 54Managing Packages with apt 54Installing Software Packages with apt 56Upgrading Software with apt 59Uninstalling Software with apt 60The apt Repositories 61Using Snap Containers 62Installing from Source Code 64The Bottom Line 66CHAPTER 4 INSTALLING A RED HAT SERVER 69Pre-Installation Requirements 69Hardware Requirements 70Virtual Server Requirements 71Finding the Software 72Oracle VirtualBox 72CentOS 73Running the Installation 76Oracle VirtualBox 77CentOS 77Checking the Installation 96The Bottom Line 97CHAPTER 5 INSTALLING AND MAINTAINING SOFTWARE IN RED HAT 99Exploring Red Hat Packages 99Automated Package Management 100Listing Installed Packages 100Installing Software with dnf 102Upgrading Software with dnf 104Uninstalling Software with dnf 104Handling Broken Dependencies 105Working with RPM Repositories 106Working Directly with Packages 107Finding Package Files 107Inspecting Package Files 108Installing Package Files 109Removing Package Files 110Using Flatpak Containers 111The Bottom Line 113CHAPTER 6 WORKING WITH THE SHELL 115Exploring the Shell 115The Shell Prompt 116The Shell Manual 117Working with Commands 121Entering Commands 121Retrieving Past Commands 123Redirecting Commands 125Environment Variables 129Global Environment Variables 129User-Defined Environment Variables 131The Bottom Line 133CHAPTER 7 EXPLORING LINUX FILE MANAGEMENT 135Filesystem Navigation 135The Linux Filesystem 135Traversing Directories 138Linux Files 139Determining File Types 139Filenames 140Hidden Files 140File Inodes 141File and Directory Listing 142Basic Listing 142Modifying Listing Information 143The Complete Parameter List 143Directory Handling 146Creating Directories 146Deleting Directories 146File Handling 147Creating Files 147Copying Files 148Linking Files 150Renaming Files 152Deleting Files 152File Features 154Using Wildcards 154Quoting 155Case Sensitivity 156Finding Files 156The which Command 156The locate Command 156The whereis Command 157The find Command 157Archiving Files 159Compressing Files 159Creating Archive Files 160Archiving Scenarios 161The Bottom Line 163CHAPTER 8 WORKING WITH TEXT FILES 165The vim Editor 165Checking Your vim Editor Program 166Using the vim Editor 167The nano Editor 170Working with Data Files 172Sorting 172Searching 175Compressing 181Archiving 182The Bottom Line 187PART 2 INTERMEDIATE ADMIN FUNCTIONS 189CHAPTER 9 MANAGING HARDWARE 191Device Driver Modules 191Listing Installed Modules 192Installing New Modules 193Removing Modules 196Communicating with Devices 196Device Interfaces 196The /dev Directory 198The /proc Directory 199The /sys Directory 202Working with Devices 203Finding Devices 203Working with PCI Cards 205Working with USB Devices 206Using Hot Pluggable Devices 207Detecting Dynamic Devices 208Working with Dynamic Devices 208The Bottom Line 209CHAPTER 10 BOOTING LINUX 211Understanding the Boot Process 211Overview of the Boot Process 211Watching the Boot Process 212The Firmware Startup 212The GRUB2 Bootloader 214Configuring the GRUB2 Bootloader 215Exploring the GRUB2 Configuration 215Interacting with GRUB2 217The systemd Initialization Process 219Exploring Unit Files 220Focusing on Service Unit Files 221Focusing on Target Unit Files 225Changing a Unit Configuration File 226Changing the systemd Configuration File 227Looking at systemctl 227Jumping Targets 230Analyzing with systemd 232The Bottom Line 234CHAPTER 11 WORKING WITH STORAGE DEVICES 235Storage Basics 235Drive Connections 235Partitioning Drives 236Automatic Drive Detection 236Partitioning Tools 237Working with fdisk 237Working with gdisk 239The GNU parted Command 241Formatting Filesystems 243Common Filesystem Types 243Creating Filesystems 245Mounting Filesystems 246Manually Mounting Devices 246Automatically Mounting Devices 247Managing Filesystems 249Retrieving Filesystem Stats 249Filesystem Tools 250Storage Alternatives 251Multipath 251Logical Volume Manager 251Using RAID Technology 253The Bottom Line 254CHAPTER 12 CONFIGURING NETWORK SETTINGS 255Network Settings 255Ubuntu Servers 256Red Hat Servers 258Using Network Command-Line Tools 260NetworkManager Tools 260Other Tools 262Basic Network Troubleshooting 269Sending Test Packets 269Finding Host Information 271Advanced Network Troubleshooting 273The netstat Command 273Examining Sockets 276The Bottom Line 277CHAPTER 13 MANAGING USERS AND GROUPS 279Understanding Linux Permissions 279Understanding Ownership 280Controlling Access Permissions 282Exploring Special Permissions 284Managing Default Permissions 285Using Access Control Lists 288Managing User Accounts 290Adding Accounts 290Maintaining Accounts 298Removing Accounts 301Maintaining the Environment 302Setting Environment Variables 302Exploring User Entries 302Exploring Global Entries 303Managing Groups 304Adding Groups 305Removing Groups 306The Bottom Line 307CHAPTER 14 WORKING WITH PROCESSES AND JOBS 309Looking at Processes 309Monitoring Processes in Real Time 311Managing Processes 314Setting Priorities 314Stopping Processes 315Running Programs in Background Mode 317Running in the Background 317Running Multiple Background Jobs 318Running Programs Without a Console 319Job Control 320Viewing Jobs 320Restarting Stopped Jobs 322Scheduling Jobs 323Scheduling a Job Using the at Command 323Scheduling Recurring Programs 326The Bottom Line 328CHAPTER 15 MANAGING LOG FILES 329The systemd Journaling System 329Configuring systemd-journald 330Looking at Journal Files 331Making the Journal Persistent 332Viewing Journal Entries 332Maintaining the Journal 335Viewing Different Journal Files 337Protecting Journal Files 337Making Journal Entries 337The rsyslog Legacy System 338The syslog Protocol 338Basic Logging Using rsyslogd 340Layering Your Logging 342Making Log Entries 343Finding Event Messages 344The Bottom Line 344CHAPTER 16 MANAGING PRINTERS 347The Common Unix Printing System 347Printer Drivers 347Web Interface 348Command-Line Commands 348Printer Sharing 349Printer Classes 350Installing and Configuring CUPS 350Installing CUPS 351Preparing the Server to Use CUPS 354Using CUPS 356Administration Functions 356Managing Printers and Jobs in CUPS 360The Bottom Line 361PART 3 ADVANCED ADMIN FUNCTIONS 363CHAPTER 17 EXPLORING UBUNTU SECURITY 365Locking Down Root 365Looking at Linux Account Types 366Gaining Super User Privileges 367Using OpenSSH on Ubuntu 369Exploring Basic SSH Concepts 370Configuring SSH 372Generating SSH Keys 373Authenticating with SSH Keys 374The AppArmor System 376Network Security Using Firewalls 380Understanding UFW 380Configuring UFW 381The Bottom Line 385CHAPTER 18 EXPLORING RED HAT SECURITY 387Working with Root Access 387Keeping Track of Root Logins 388Disabling Root Access from SSH 388Enabling Automatic Logout 389Blocking Root Access 390Using SELinux 391Enabling SELinux 391Understanding Security Context 392Using Policies 393Network Security Using Firewalls 395Red Hat Firewall Concepts 395Checking the Firewall Status 397Working with Zones 398Working with Firewall Rules 399The Bottom Line 401CHAPTER 19 WRITING SCRIPTS 403Beginning a Shell Script 403Creating a Script File 403Displaying Messages 405Using Variables 407Environment Variables 407User Variables 408Command Substitution 409Exiting the Script with Status 410Passing Parameters 411Adding Conditional Expressions 414Working with the if-then Statement 414Using Compound Tests 417Working with the if-then-else Statement 418Trying the case Statement 419Using Loops 420Looking at the for Command 420Working with the while Format 423Using the until Command 424Using Functions 427Creating Functions 427Calling Functions 427The Bottom Line 430CHAPTER 20 MANAGING WEB SERVERS 433Linux Web Servers 433Apache 433nginx 434The Apache Web Server 435Installing an Apache Server 435Configuring the Apache Server 437Hosting Dynamic Web Applications 445Creating a Secure Web Server 447The nginx Server 448Installing nginx 448Configuring nginx 449The Bottom Line 451CHAPTER 21 MANAGING DATABASE SERVERS 453Linux Database Servers 453Organizing the Data 454Querying the Data 455Controlling the Data 456Installing and Using MySQL/MariaDB 457Conducting a MariaDB Installation 458Accessing a MariaDB Database 462Populating and Using MariaDB Database 466Installing and Using PostgreSQL 471Conducting a PostgreSQL Installation 471Accessing a PostgreSQL Database 474Populating and Using a PostgreSQL Database 477The Bottom Line 478CHAPTER 22 EXPLORING THE VIRTUALIZATION ENVIRONMENT 481Hypervisors 481Managing VMs 481Creating a Virtual Machine 483Integrating via Linux Extensions 485Containers 486Exploring Container Types 487Looking at Container Software 487Organizing Containers 489Software Packaging 491Looking at Ubuntu Snap 491Looking at Flatpak 499The Bottom Line 503APPENDIX THE BOTTOM LINE 505Chapter 1: Understanding the Basics 505Chapter 2: Installing an Ubuntu Server 506Chapter 3: Installing and Maintaining Software in Ubuntu 507Chapter 4: Installing a Red Hat Server 509Chapter 5: Installing and Maintaining Software in Red Hat 510Chapter 6: Working with the Shell 512Chapter 7: Exploring Linux File Management 513Chapter 8: Working with Text Files 515Chapter 9: Managing Hardware 516Chapter 10: Booting Linux 517Chapter 11: Working with Storage Devices 519Chapter 12: Configuring Network Settings 520Chapter 13: Managing Users and Groups 521Chapter 14: Working with Processes and Jobs 523Chapter 15: Managing Log Files 524Chapter 16: Managing Printers 526Chapter 17: Exploring Ubuntu Security 527Chapter 18: Exploring Red Hat Security 528Chapter 19: Writing Scripts 529Chapter 20: Managing Web Servers 532Chapter 21: Managing Database Servers 533Chapter 22: Exploring the Virtualization Environment 535Index 537
Growth Hacking für Dummies
Growth Hacking hilft Ihnen, schnell erfolgreich zu sein und dabei wenig Geld zu investieren. Dieses Buch hilft Ihnen, schnell erfolgreich im Growth Hacking zu sein.Wer will das nicht: Marketing betreiben und dafür weniger Geld ausgeben? Growth Hacking wurde genau dafür entwickelt, es sollte Startups helfen, ohne viel Geld zu wachsen. Dieses Buch gibt Ihnen einen Einblick in die Grundlagen des Growth-Hacking-Prozesses. Der Autor erläutert außerdem, wie Sie Kommunikationslinien mit Ihren Kunden eröffnen, wie Sie Testmodelle etablieren und wie Sie sich die nötigen Werkzeuge aneignen, um erfolgreich kostengünstiges Marketing zu betreiben. Zudem geht er noch darauf ein, wie Sie sich das richtige Team zusammenstellen und eine passende Firmenkultur einführen. So ist dieses Buch der verständliche und übersichtliche Start zu Ihrem schnellen Erfolg.Anuj Adhiya ist Growth Hacker, war Director of Engagement and Analytics bei GrowthHacker, einer Organisation, die vom Growth-Hacker-Erfinder Sean Ellis gegründet wurde.
Systematische Entwicklung von Dienstleistungsinnovationen
Dieser Sammelband zum Projekt „Augmented Reality in flexiblen Dienstleistungsprozessen" (ARinFLEX) zeigt Anwendungsfälle für Dienstleistungsinnovationen in Pflege und industrieller Wartung auf. Die Autoren entwickeln Ideen, Konzepte und Prototypen für innovative Dienstleistungen mittels Augmented Reality und evaluieren diese in verschiedenen Kontexten. Der Sammelband bietet Grundlagen, Kontext und methodische Unterstützung zur Digitalisierung von Dienstleistungen in Pflege und industrieller Wartung.
Cloud Native Security
EXPLORE THE LATEST AND MOST COMPREHENSIVE GUIDE TO SECURING YOUR CLOUD NATIVE TECHNOLOGY STACKCloud Native Security delivers a detailed study into minimizing the attack surfaces found on today's Cloud Native infrastructure. Throughout the work hands-on examples walk through mitigating threats and the areas of concern that need to be addressed. The book contains the information that professionals need in order to build a diverse mix of the niche knowledge required to harden Cloud Native estates.The book begins with more accessible content about understanding Linux containers and container runtime protection before moving on to more advanced subject matter like advanced attacks on Kubernetes. You'll also learn about:* Installing and configuring multiple types of DevSecOps tooling in CI/CD pipelines* Building a forensic logging system that can provide exceptional levels of detail, suited to busy containerized estates* Securing the most popular container orchestrator, Kubernetes* Hardening cloud platforms and automating security enforcement in the cloud using sophisticated policiesPerfect for DevOps engineers, platform engineers, security professionals and students, Cloud Native Security will earn a place in the libraries of all professionals who wish to improve their understanding of modern security challenges.CHRIS BINNIE is a Technical Consultant who has worked for almost 25 years with critical Linux systems in banking and government, both on-premise and in the cloud. He has written two Linux books, has written for Linux and ADMIN magazines and has five years of experience in DevOps security consultancy roles.RORY MCCUNE has over 20 years of experience in the Information and IT security arenas. His professional focus is on container, cloud, and application security and he is an author of the CIS Benchmarks for Docker and Kubernetes and has authored and delivered container security training at conferences around the world.Introduction xixPART I CONTAINER AND ORCHESTRATOR SECURITY 1CHAPTER 1 WHAT IS A CONTAINER? 3Common Misconceptions 4Container Components 6Kernel Capabilities 7Other Containers 13Summary 14CHAPTER 2 ROOTLESS RUNTIMES 17Docker Rootless Mode 18Installing Rootless Mode 20Running Rootless Podman 25Setting Up Podman 26Summary 31CHAPTER 3 CONTAINER RUNTIME PROTECTION 33Running Falco 34Configuring Rules 38Changing Rules 39Macros 41Lists 41Getting Your Priorities Right 41Tagging Rulesets 42Outputting Alerts 42Summary 43CHAPTER 4 FORENSIC LOGGING 45Things to Consider 46Salient Files 47Breaking the Rules 49Key Commands 52The Rules 52Parsing Rules 54Monitoring 58Ordering and Performance 62Summary 63CHAPTER 5 KUBERNETES VULNERABILITIES 65Mini Kubernetes 66Options for Using kube-hunter 68Deployment Methods 68Scanning Approaches 69Hunting Modes 69Container Deployment 70Inside Cluster Tests 71Minikube vs. kube-hunter 74Getting a List of Tests 76Summary 77CHAPTER 6 CONTAINER IMAGE CVES 79Understanding CVEs 80Trivy 82Getting Started 83Exploring Anchore 88Clair 96Secure Registries 97Summary 101PART II DEVSECOPS TOOLING 103CHAPTER 7 BASELINE SCANNING (OR, ZAP YOUR APPS) 105Where to Find ZAP 106Baseline Scanning 107Scanning Nmap’s Host 113Adding Regular Expressions 114Summary 116CHAPTER 8 CODIFYING SECURITY 117Security Tooling 117Installation 118Simple Tests 122Example Attack Files 124Summary 127CHAPTER 9 KUBERNETES COMPLIANCE 129Mini Kubernetes 130Using kube-bench 133Troubleshooting 138Automation 139Summary 140CHAPTER 10 SECURING YOUR GIT REPOSITORIES 141Things to Consider 142Installing and Running Gitleaks 144Installing and Running GitRob 149Summary 151CHAPTER 11 AUTOMATED HOST SECURITY 153Machine Images 155Idempotency 156Secure Shell Example 158Kernel Changes 162Summary 163CHAPTER 12 SERVER SCANNING WITH NIKTO 165Things to Consider 165Installation 166Scanning a Second Host 170Running Options 171Command-Line Options 172Evasion Techniques 172The Main Nikto Configuration File 175Summary 176PART III CLOUD SECURITY 177CHAPTER 13 MONITORING CLOUD OPERATIONS 179Host Dashboarding with NetData 180Installing Netdata 180Host Installation 180Container Installation 183Collectors 186Uninstalling Host Packages 186Cloud Platform Interrogation with Komiser 186Installation Options 190Summary 191CHAPTER 14 CLOUD GUARDIANSHIP 193Installing Cloud Custodian 193Wrapper Installation 194Python Installation 195EC2 Interaction 196More Complex Policies 201IAM Policies 202S3 Data at Rest 202Generating Alerts 203Summary 205CHAPTER 15 CLOUD AUDITING 207Runtime, Host, and Cloud Testing with Lunar 207Installing to a Bash Default Shell 209Execution 209Cloud Auditing Against Benchmarks 213AWS Auditing with Cloud Reports 215Generating Reports 217EC2 Auditing 219CIS Benchmarks and AWS Auditing with Prowler 220Summary 223CHAPTER 16 AWS CLOUD STORAGE 225Buckets 226Native Security Settings 229Automated S3 Attacks 231Storage Hunting 234Summary 236PART IV ADVANCED KUBERNETES AND RUNTIME SECURITY 239CHAPTER 17 KUBERNETES EXTERNAL ATTACKS 241The Kubernetes Network Footprint 242Attacking the API Server 243API Server Information Discovery 243Avoiding API Server Information Disclosure 244Exploiting Misconfigured API Servers 245Preventing Unauthenticated Access to the API Server 246Attacking etcd 246etcd Information Discovery 246Exploiting Misconfigured etcd Servers 246Preventing Unauthorized etcd Access 247Attacking the Kubelet 248Kubelet Information Discovery 248Exploiting Misconfigured Kubelets 249Preventing Unauthenticated Kubelet Access 250Summary 250CHAPTER 18 KUBERNETES AUTHORIZATION WITH RBAC 251Kubernetes Authorization Mechanisms 251RBAC Overview 252RBAC Gotchas 253Avoid the cluster-admin Role 253Built-In Users and Groups Can Be Dangerous 254Read-Only Can Be Dangerous 254Create Pod is Dangerous 256Kubernetes Rights Can Be Transient 257Other Dangerous Objects 258Auditing RBAC 258Using kubectl 258Additional Tooling 259Rakkess 259kubectl-who-can 261Rback 261Summary 262CHAPTER 19 NETWORK HARDENING 265Container Network Overview 265Node IP Addresses 266Pod IP Addresses 266Service IP Addresses 267Restricting Traffic in Kubernetes Clusters 267Setting Up a Cluster with Network Policies 268Getting Started 268Allowing Access 271Egress Restrictions 273Network Policy Restrictions 274CNI Network Policy Extensions 275Cilium 275Calico 276Summary 278CHAPTER 20 WORKLOAD HARDENING 279Using Security Context in Manifests 279General Approach 280allowPrivilegeEscalation 280Capabilities 281privileged 283readOnlyRootFilesystem 283seccompProfile 283Mandatory Workload Security 285Pod Security Standards 285PodSecurityPolicy 286Setting Up PSPs 286Setting Up PSPs 288PSPs and RBAC 289PSP Alternatives 291Open Policy Agent 292Installation 292Enforcement Actions 295Kyverno 295Installation 296Operation 296Summary 298Index 299
Basics Interactive Design: User Experience Design
By putting people at the centre of interactive design, user experience (UX) techniques are now right at the heart of digital media design and development. As a designer, you need to create work that will impact positively on everyone who is exposed to it. Whether it's passive and immutable or interactive and dynamic, the success of your design will depend largely on how well the user experience is constructed.User Experience Design shows how researching and understanding users' expectations and motivations can help you develop effective, targeted designs. The authors explore the use of scenarios, personas and prototyping in idea development, and will help you get the most out of the latest tools and techniques to produce interactive designs that users will love.With practical projects to get you started, and stunning examples from some of today's most innovative studios, this is an essential introduction to modern UXD.
Clean C++20
Write maintainable, extensible, and durable software with modern C++. This book, updated for the recently released C++20 standard, is a must for every developer, software architect, or team leader who is interested in well-crafted C++ code, and thus also wants to save development costs. If you want to teach yourself about writing better C++ code, Clean C++20 is exactly what you need. It is written for C++ developers of all skill levels and shows by example how to write understandable, flexible, maintainable, and efficient C++ code. Even if you are a seasoned C++ developer, there are nuggets and data points in this book that you will find useful in your work.If you don't take care with your codebase, you can produce a large, messy, and unmaintainable beast in any programming language. However, C++ projects in particular are prone to get messy and tend to slip into a maintenance nightmare. There is lots of C++ code out there that looks as if it was written in the 1980s, completely ignoring principles and practices of well-written and modern C++.It seems that C++ developers have been forgotten by those who preach Software Craftsmanship and Clean Code principles. The web is full of C++ code examples that may be very fast and highly optimized, but whose developers have completely ignored elementary principles of good design and well-written code. This book will explain how to avoid this and how to get the most out of your C++ code. You'll find your coding becomes more efficient and, importantly, more fun.WHAT YOU WILL LEARN* Gain sound principles and rules for clean coding in C++* Carry out test-driven development (TDD)* Better modularize your C++ code base* Discover and apply C++ design patterns and idioms* Write C++ code in both object-oriented and functional programming stylesWHO THIS BOOK IS FORAny C++ developer or software engineer with an interest in producing better code.STEPHAN ROTH is a coach, consultant, and trainer for systems and software engineering with German consultancy company oose Innovative Informatik eG located in Hamburg. Before he joined oose, he worked for many years as a software developer, software architect, and systems engineer in the field of radio reconnaissance and communication intelligence systems. He has developed sophisticated applications, especially in a high-performance system environment, and graphical user interfaces using C++ and other programming languages. Stephan is an active supporter of the Software Craftsmanship movement and is concerned with principles and practices of Clean Code Development (CCD).CH01 - IntroductionCH02 - Build a Safety NetCH03 - Be PrincipledCH04 - Basics of Clean C++CH05 - Advanced concepts of modern C++CH06 - Object OrientationCH07 - Functional ProgrammingCH08 - Test Driven DevelopmentCH09 - Design Patterns and IdiomsAppendix A - Small UML GuideBibliography
Smart Mobility
Each year we witness several paradigm shifts in mobility systems and services, increasingly so as technology progresses. The future of mobility is people-centric, software-defined, connected, and electric. Now more than ever, it is imperative for current and aspiring leaders in the field to understand the foundations of people-centric smart cities with a focus on sustainability.Smart Mobility offers a holistic view of the current and emerging smart mobility systems and explores their foundational technologies, technology enablers, and disruptors. Author Alaa Khamis acknowledges the need for smart mobility arising with growing world urbanization, and the impact of this on public health, congestion, and climate change. Khamis expertly interrogates how a focus on smart mobility can mitigate all of these risks using his triad of complementary factors: technology, governance, and city planning.In this book you’ll study how foundational technologies such as artificial intelligence, blockchain, the Internet of Things, robotics, and many more all work together to allow for smart mobility in our modern era. Khamis additionally covers the topical events of the COVID-19 pandemic and analyzes its impact on consumer behavior and the expected short-term disruptions and longer-term structural changes. The socioeconomic changes in our urban centers are vast, and Smart Mobility breaks down the core concepts with meaningful data and insights.WHAT YOU WILL LEARN* Explore different mobility modes, including mobility-as-a-service, shared mobility, mobility on demand, the gig economy and the passenger economy* Cover how the smart mobility triad - technology, governance, and city planning - work together to create a smart and sustainable mobility* See how the COVID-19 pandemic is impacting consumer behavior and preferences and changing the future of mobilityWHO THIS BOOK IS FORWorking professionals, students, researchers, technologists, city planners, and the curious layman.DR. ALAA KHAMIS is a Senior AI Expert at General Motors, Canada. He is also Smart Mobility Lecturer at University of Toronto, Affiliate Member of Center of Pattern Analysis and Machine Intelligence (CPAMI) at University of Waterloo and Adjunct Professor at Nile University. He worked as Autonomous Vehicles Professor at Zewail City of Science and Technology, Head of AI at Sypron Solutions, AI Consultant at Menya Solutions, Senior Research Scientist at Vestec, Canada, Director of Engineering R&I - Canada at Marques Aviation Ltd., Associate Professor and Head of Engineering Science Department at Suez University, Associate Professor and Director of Robotics and Autonomous Systems (RAS) research group at German University in Cairo (GUC), Research Assistant Professor and AI Lecturer at University of Waterloo, Canada, Visiting Professor at Charles III University of Madrid, Spain and University of Sherbrooke, Canada, Visiting Researcher at University of Reading, UK and Distinguished Scholar at University of Applied Sciences Ravensburg-Weingarten, Germany.He is a Senior IEEE member, recipient of the 2018 IEEE Member and Geographic Activities (MGA) Achievement Award, founder of Minesweepers: Towards a Landmine-free World international robotic competition and member in IEEE SA P7007 Ontological Standard for Ethically Driven Robotics and Automation Systems Working Group and P1872.2 Standard for Autonomous Robotics (AuR) Ontology Working Group.His research interests include smart mobility, autonomous and connected vehicles, algorithmic robotics, humanitarian robotics, intelligent data processing and analysis, machine learning and combinatorial optimization. He published 4 books, 5 book chapters, 16 technical reports and more than 90 scientific papers in refereed journal and international conferences. He also filed 12 US patents.Preface1 Introduction2 Toward a People-centric Smart City2.1 World Urbanization Problems2.2 People-centric Smart Cities3 Smart Mobility Triad3.1 Smart Mobility Governance3.2 City Planning3.3 Smart Mobility Technology4 Smart Mobility: Foundational Technologies4.1 PNT and GIS4.2 Wireless Communication4.3 Mobile Computing4.4 IoT4.5 Artificial Intelligence(AI)4.6 Robotics4.7 Blockchain4.8 Electrification5 Smart Mobility: Technology Enablers5.1 Intelligent Infrastructure5.2 Connected Mobility5.3 Automated Mobility5.4 E-Mobility5.5 Micro-Mobility5.6 Active,Soft or Zero-impact Mobility5.7 Inclusive Mobility5.8 Context Awareness Systems(CAS)6 Smart Mobility: Disruptors6.1 Disruptive Mobility Platforms6.1.1 Autonomous Ground Vehicles6.1.2 3D Mobility and Urban Air Mobility (UAM)6.1.3 River Taxis6.1.4 Automated People Movers(APMs)6.1.5 Hyperloop and Urbanloop6.2 Shared Mobility6.3 Mobility-as-a-Service(MaaS)6.4 Mobility On Demand(MOD)6.5 Seamless Integrated Mobility Systems (SIMS)6.6 Last-mile Delivery6.7 Vehicle-as-a-Service(VaaS)6.8 Gig Economyand Passenger Economy6.8.1 Gig Economy and Crowdsourcing6.8.2 Passenger Economy7 Smart mobility in a pandemic and post-pandemic world8 Concluding RemarksBibliography
E-Auto einfach erklärt
Alles, was Sie über Elektroautos wissen müssen: von A wie Akku bis Z wie zu Hause laden.Überlegen Sie, ein Elektroauto zu kaufen oder suchen Sie als Neubesitzer/in einen schnellen Einstieg ins Thema? Timo Kauffmann erklärt in dem Buch »E-Auto einfach erklärt« genau, wie das mit dem Fahren und Laden eines Elektroautos funktioniert – von One-Pedal-Driving und Rekuperation über Ladekarten und -apps bis zur Installation einer heimischen Wallbox für Ihr E-Auto. Leicht verständliche Erläuterungen zu Akkus, Motoren und Kilowattstunden helfen Ihnen, die zugrundeliegende Technologie besser zu verstehen und Ihr Elektroauto effizienter zu nutzen. So machen Sie sich mit Ihrem neuen Auto schneller vertraut und können diese leise, saubere und komfortable Form des Fahrens wirklich genießen.Aus dem Inhalt:Entscheidungshilfe: Welches Elektroauto passt zu mir?Worauf Sie bei gebrauchten Elektroautos achten müssenKein Haus- oder Wohnungseigentümer und trotzdem zuhause laden?Faktencheck: 10 Antworten auf typische FragenEffizienz & Fahrspaß – keine Gegensätze!So funktionieren Elektromotoren und AkkusÜbersicht zu Stecker- und KabeltypenSo nutzen Sie öffentliche LadestationenWallboxen für daheim und unterwegsUmweltbonus und KfW-FörderungÜbersicht Ladekarten und Lade-AppsReiseplanung und LadestrategienTipps zur ReichweitenoptimierungPflege, Versicherung und PannenhilfeInhalt (PDF-Link)
Running Microsoft Workloads on AWS
Did you know that Amazon Web Services runs nearly double the amount of Microsoft Workloads in the cloud than any other provider?RUNNING MICROSOFT WORKLOADS IN AWS is your single-source solution for learning the best practice skills and guidance that AWS consultants offer their customers in the field. Over 70% of enterprise workloads are based on Microsoft technologies and AWS has been running these technologies in the AWS Cloud for more than 12 years—far longer than Microsoft’s own Azure cloud platform.This book introduces AWS foundations and compares them to traditional Microsoft architectures, showing you how to design your AWS Cloud platform to run your current Microsoft solutions. It covers the crucial area of identity and access control, showing how to implement Active Directory inside the AWS platform and the most secure ways of enabling Single Sign On from your own data centers and from Microsoft AzureAD.The book goes in-depth and shows how developers across the globe are using their existing .NET skills to develop directly on top of AWS, using current AWS development services such as AWS Code Pipeline, AWS Code Build, and AWS Code Deploy to create the next generation of cloud-native applications using the most popular cloud serverless service—AWS Lambda.WHAT YOU WILL LEARN* Be familiar with the basic building blocks of AWS and how the terminology differs from your own data center and Microsoft Azure* Understand Amazon Machine Images (AMI) strategies and solutions to best manage the trade-off between speed and manageability* Run one of the most popular Microsoft products: SQL Server on AWS* Be aware of the different database architecture designs for using Amazon RDS and Amazon EC2* Read an overview of Serverless Development in the AWS cloud from a Microsoft .NET perspective* Know migration strategies for moving your Microsoft Workloads to the AWS CloudWHO THIS BOOK IS FORCovers high-level concepts and solutions for CTOs and CCTOs; provides a solution for architects; and dives deep into the topic for administrators and DevOps engineersRyan Pothecary is Senior Specialist Solution Architect for a Cloud-based services company, which he joined four years ago. He has worked on the AWS platform for the last eight years as part of a near 30-year career in IT. Over the last four years he’s worked directly with customers and partners who are moving to the AWS Cloud. He specializes in helping customers move Microsoft Workloads to AWS and works with customers throughout their entire cloud journey. He is also a member of a Community of engineers, architects, and consultants who help customers run Microsoft Workloads on AWS in every part of the world. Outside of work he is determined to learn how to play the guitar his wife bought him, even though he has small stubby fingers.
Multi-Platform Graphics Programming with Kivy
Modern science requires computer graphics models to provide realistic visual renderings. Learning the appropriate programming tools for 2D and 3D modeling doesn’t have to be so difficult. This book reviews the best programming tools to achieve this and explains how to apply them to mobile platforms like Android.Multi-Platform Graphics Programming with Kivy provides a straightforward introductory approach for designing 2D, 3D, and stereoscopic applications, using analytical equations from vector algebra. Throughout the book you’ll look closely at this approach and develop scenes in Kivy, taking advantage of powerful mathematical functions for arrays by NumPy for Python.Unbuntu is used to develop the programs, which allows you to easily convert to Android platform. Each chapter contains step-by-step descriptions on each subject and provides complete program listings.WHAT YOU’LL LEARN* Work with Kivy, a modern, powerful multi-platform graphics system* Convert and run programs on Android devices* Program, fill faces, and rotate 2D and 3D polygons* Apply the concepts of 2D and 3D applications* Develop stereoscopic scenes* Review a straightforward introduction to 2D, 3D, and stereoscopic graphics applications* Use simple analytical equations from vector algebraWHO THIS BOOK IS FORThe primary audience is students and researchers in graphics programming with experience in analytical equations.Moisés Cywiak is a researcher in physical optical sciences with over 20 years of teaching experience in physics, mathematics, electronic engineering, and programming in C, C++, and python, in Centro de Investigaciones en Óptica A.C.David Cywiak received his Ph.D. degree in physics in 2014 from Universidad de Guanajuato. From 2012 to 2013 he collaborated as a guest researcher at the Dalton Cardiovascular Research Center, University of Missouri-Columbia, in the development of an optical-photoacoustic system intended for the detection of photoacoustic signals generated by cancerous cells. Since 2014 he has been working as a metrologist in the Thermometry Department at Centro Nacional de Metrologia, México. His research includes photoacoustics, optical engineering and radiation thermometry. He has over 7 years of experience teaching physics, mathematics and programming in C for undergraduate students. He also has over 5 years of experience teaching Temperature measurement techniques and calibration of instruments in the thermometry area for industry professionals.Chapter 1: Preliminaries. Software installation1.1. installing pip3 and IDLE1.2. Installing kivy1.3. Installing buildozerChapter 2: Polygon rotation in two dimensions2.1. Rotation equations2.2. Mapping equations to the screenChapter 3: Two dimensional polygon programming3.1. Polygon structure3.2. Drawing the edges of the polygon3.3. Filling the polygon with lines3.4. Rotating the polygon3.5. The kivy platform3.6. main.py listing3.7. File.kv lisitng3.8. Using buildozerChapter 4: Three-dimensional projections and rotations4.1. Projection of a three-dimensional point into a plane4.2. Rotation of a point in a planeChapter 5: Programming three-dimensional polygons5.1. Polygon structure5.2. Basic functions5.3. main.py listing5.4. File.kvChapter 6: Stereoscopic 3D Programming6.1. Basics of a stereoscopic view6.2. Programming and ORing the images6.3. Projections6.4. Polygon structure6.5. DrawAxes function6.6. Points of projection6.7. main.py listing6.8. File.kvChapter 7: 3D plots programming7.1. Program basic operations7.2. Function overview7.3. Generating the axes, the mesh and the function7.4. Plotting the function in the screen7.5. Rotating the plot7.6. main.py listing7.7. File.kv listingChapter 8: Stereoscopic 3D plots8.1. Creating the function, coordinates and mesh8.2. Creating two images for stereoscopic effects8.3. Drawing the plot8.4. main.py listing8.5. File.kv listing8.6. Surfaces with saddle pointsChapter 9: 3D parametric plots9.1. Parametric equations9.2. Plotting9.3. main.py9.4. File.kvChapter 10: Stereoscopic 3D parametric plots10.1. Generating the function10.2. Creating PIL images for the stereoscopic effect10.3. Plotting the function10.4. main.py10.5. File.kvChapter 11: Sympy11.1. Analytical expressions and symbols11.2. Declaring functions with analytical expressions11.3. Solving equations11.4. Solving simultaneous equations11.5. Differentiation11.6. IntegrationChapter 12: Plotting functions in spherical coordinates12.1. Spherical coordinates12.2. Spherical differential equation example12.3. The associated Legendre polynomials12.4. Plotting 3D spherical coordinates12.5. main.py listing12.6. File.kv listing12.7. Incorporating sympy into the Android projectChapter 13. Stereoscopic plots of spherical functions13.1. Creating the stereoscopic scenes13.2. main.py listing13.3. File.kv listingChapter 14. Stereoscopic simple numerical method for the gravitational N-body problem14.1. The gravitational N-body problem14.2. Motion equations14.3. Numerical approach of the dynamic equations14.4. Capturing numerical data14.5. Five planets example14.6. main.py listing14.7. File.kvChapter 15. Stereoscopic cylindrical coordinates plotting. Aberrations of optical lenses15.1. Ideal lens focusing. The Fresnel diffraction integral15.2. Departure from the ideal lens15.3. The wave aberration function in cylindrical coordinates15.4. Stereoscopic plot of the wave aberration terms in cylindrical coordinates15.5. main.py listing15.6. File.kv listingChapter 16. Stereoscopic plotting of three-dimensional conics16.1. Analytical approach16.2. Stereoscopic ellipsoid plotting16.3. main.py (Ellipsoid)16.4. File.kv16.5. HyperboloidChapter 1: Preliminaries. Software installation1.1. installing pip3 and IDLE1.2. Installing kivy1.3. Installing buildozerChapter 2: Polygon rotation in two dimensions2.1. Rotation equations2.2. Mapping equations to the screenChapter 3: Two dimensional polygon programming3.1. Polygon structure3.2. Drawing the edges of the polygon3.3. Filling the polygon with lines3.4. Rotating the polygon3.5. The kivy platform3.6. main.py listing3.7. File.kv lisitng3.8. Using buildozerChapter 4: Three-dimensional projections and rotations4.1. Projection of a three-dimensional point into a plane4.2. Rotation of a point in a planeChapter 5: Programming three-dimensional polygons5.1. Polygon structure5.2. Basic functions5.3. main.py listing5.4. File.kvChapter 6: Stereoscopic 3D Programming6.1. Basics of a stereoscopic view6.2. Programming and ORing the images6.3. Projections6.4. Polygon structure6.5. DrawAxes function6.6. Points of projection6.7. main.py listing6.8. File.kvChapter 7: 3D plots programming7.1. Program basic operations7.2. Function overview7.3. Generating the axes, the mesh and the function7.4. Plotting the function in the screen7.5. Rotating the plot7.6. main.py listing7.7. File.kv listingChapter 8: Stereoscopic 3D plots8.1. Creating the function, coordinates and mesh8.2. Creating two images for stereoscopic effects8.3. Drawing the plot8.4. main.py listing8.5. File.kv listing8.6. Surfaces with saddle pointsChapter 9: 3D parametric plots9.1. Parametric equations9.2. Plotting9.3. main.py9.4. File.kvChapter 10: Stereoscopic 3D parametric plots10.1. Generating the function10.2. Creating PIL images for the stereoscopic effect10.3. Plotting the function10.4. main.py10.5. File.kvChapter 11: Sympy11.1. Analytical expressions and symbols11.2. Declaring functions with analytical expressions11.3. Solving equations11.4. Solving simultaneous equations11.5. Differentiation11.6. IntegrationChapter 12: Plotting functions in spherical coordinates12.1. Spherical coordinates12.2. Spherical differential equation example12.3. The associated Legendre polynomials12.4. Plotting 3D spherical coordinates12.5. main.py listing12.6. File.kv listing12.7. Incorporating sympy into the Android projectChapter 13. Stereoscopic plots of spherical functions13.1. Creating the stereoscopic scenes13.2. main.py listing13.3. File.kv listingChapter 14. Stereoscopic simple numerical method for the gravitational N-body problem14.1. The gravitational N-body problem14.2. Motion equations14.3. Numerical approach of the dynamic equations14.4. Capturing numerical data14.5. Five planets example14.6. main.py listing14.7. File.kvChapter 15. Stereoscopic cylindrical coordinates plotting. Aberrations of optical lenses15.1. Ideal lens focusing. The Fresnel diffraction integral15.2. Departure from the ideal lens15.3. The wave aberration function in cylindrical coordinates15.4. Stereoscopic plot of the wave aberration terms in cylindrical coordinates15.5. main.py listing15.6. File.kv listingChapter 16. Stereoscopic plotting of three-dimensional conics16.1. Analytical approach16.2. Stereoscopic ellipsoid plotting16.3. main.py (Ellipsoid)16.4. File.kv16.5. Hyperboloid16.6. main.py (Hyperboloid)Chapter 17. Two-dimensional Fourier transform17.1. One-dimensional Fourier transform17.2. Rectangular and sinc functions17.3. Code for calculating the discrete one-dimensional Fourier transform17.4. Two-dimensional Fourier transform17.5. Discrete two-dimensional Fourier transform17.6. main.py lisitng17.7. File.kv listing17.8. The Fourier transform of the circular function17.9. Analytical formulation for the Fourier transform of the circular functionChapter 18. Stereoscopic two-dimensional Fourier transform18.1. Piloting the functions18.2. main.py listing18.3. File.kv listing16.6. main.py (Hyperboloid)Chapter 17. Two-dimensional Fourier transform17.1. One-dimensional Fourier transform17.2. Rectangular and sinc functions17.3. Code for calculating the discrete one-dimensional Fourier transform17.4. Two-dimensional Fourier transform17.5. Discrete two-dimensional Fourier transform17.6. main.py lisitng17.7. File.kv listing17.8. The Fourier transform of the circular function17.9. Analytical formulation for the Fourier transform of the circular functionChapter 18. Stereoscopic two-dimensional Fourier transform18.1. Piloting the functions18.2. main.py listing18.3. File.kv listing
UX for XR
Extending traditional digital platforms to the new frontier of extended reality (XR) requires taking into account what best practices, new concepts, and conventions have been established and what learnings can be brought forward from case studies involving industry leaders. By looking at practical examples from the field of handheld AR breakthroughs, virtual reality (VR) success stories and experimental interaction concept of pioneering XR platforms, you'll see how it's possible to map out a framework of user experience (UX) guidelines to close in on opportunities and challenges that lay ahead.This book defines, identifies, and analyzes UX practices for XR environments and reviews the techniques and tools for prototyping and designing XR user interactions. You'll approach the design for experiential state and spatial cognition, using established UX key performance indicators, while taking into account the social dynamics, emotional framework and wider industry context.UX design and strategy for the XR space is a new frontier, so _UX for XR _focuses on case studies and industry research to illustrate the relationship between UX design and the growth of immersive technologies. Practical examples will demonstrate how you should apply UX design principles using designing interactions in XR by identifying the importance of spaces, senses and storyboarding.WHAT YOU'LL LEARN* Explore the challenges and opportunities of designing for XR* See how spatial interaction is revolutionizing human computer interaction* Examine sensory input and interaction beyond the screen* Work with 3D Interaction Design and build a strong 3D UX* Understand VR and augmented reality essentials for emotion-rich user experiences* Apply UX research techniques for the XR spaceWHO THIS BOOK IS FORThis book is primarily for UX designers, consultants, and strategists; XR developers; and media professionalsChapter 1: Introduction.- Chapter 2: The History and Future of XR.- Chapter 3: The Rise of UX and How it Drives XR User Adoption.- Chapter 4: UX and experience design: From screen to 3D space.- Chapter 5: Pioneering platforms and UX learnings.- Chapter 6: Practical approaches: UX and XR in the real world.
Introduction to Python for Kids
Want to create cool games and apps to impress your friends (or yourself), but not sure where to start? Or, have you tried your hand at programming, but got utterly bored after combing through hundreds of pages of dry text? Then you’ve come to the right place! This book is the perfect blend of education and fun for kids 8 years and above looking to learn the magic of Python, one of the easiest and most powerful programming languages around, all while solving fun puzzles and building your own projects on the way.Yes, there’ll be chapters on the fundamentals of Python, such as variables, numbers, strings, automation with conditions, loops and functions, objects, and files. But, early on in the book you’ll get started with Turtle, a Python package that was custom-made for kids like you. It lets you literally draw and animate on your computer! Every concept will be interspersed with a fun mini project with Turtle, so you’ll never get bored. Once you get the fundamentals down, you’ll dive right into Tkinter and Pygame, more fun Python packages (goodbye theory!) and you’ll learn all about creating apps and games like the ones you see and use every day (bouncing ball, temperature converter, calculator, rock-paper-scissors, and so much more!).There are also four capstone projects at the end of the book that convert everything you’ve learned so far into full-blown apps and games that you can show off to your friends, parents, and even teachers! You’ll be creating a snake game with Turtle, a tic tac toe game with Tkinter, a full-fledged paint app, again with Tkinter, and finally, a classic space shooters game with Pygame (the cherry on top). Every project chapter will be accompanied with the logic behind the game/app and an explanation on how you’ve arrived at the logic. You’ll develop strong problem solving skills that’ll help you create future projects on your own.There are also two chapters dedicated to just creating fun mini projects and puzzles, one of them placed in the middle of the book to give you a welcome break from all the learning. The book ends with an overview on web development with Python and ideas for more fun projects and puzzles you can solve on your own. Become the “most likely to succeed” kid in your grade while having the most fun getting there!WHAT YOU'LL LEARN* Gain a gentle, but thorough introduction into the world of programming and Python* Create programs and solve problems with core Python concepts* Build mini projects and capstone projects (showcase worthy) with Turtle, Tkinter, and Pygame * Develop programming skills while doing the puzzles and activities described in the book WHO THIS BOOK IS FORKids 8 years and above.Aarthi Elumalai is a programmer, educator, entrepreneur, and innovator. She has a Bachelor of Engineering degree in Computer Science from Anna University, Chennai.Since then, she has managed a team of programmers and worked with 100s of clients. She is also launched a dozen web apps, plugins and software that are being used by thousands of customers online.She has over 15 years of experience in programming. She started coding in Basics at the age of 12, but her love for programming took root when she came across C programming at the age of 15.She is the founder of DigiFisk, an E-learning platform that has more than 60,000 students all over the world. Her courses are well-received by the masses, and her unique, project-based approach is a refreshing change to many. She teaches the complex world of programming by solving a ton of practical exercises and puzzles along the way. Her courses and books always come with hands-on training in creating real world projects using the knowledge learned so her students get better equipped for the real world.When she is not working on her next course or book, you'll see her researching her next product idea and refining her existing products. She is currently committed to bringing the sheer power of artificial intelligence to make life easier for small business owners.Chapter 1. Did You Know?.- Chapter 2. Let's Install Python.- Chapter 3. Your First Python Program.- Chapter 4. Python Loves Numbers.- Chapter 5. Let's Play With Our Numbers.- Chapter 6. Draw Cool Stuff with Turtle.- Chapter 7. A Turtle Deep Dive.- Chapter 8. Play with Letters and Words.- Chapter 9. Follow My Command! . Chapter 10. Automate a Little.- Chapter 11. Lots and Lots of Information.- Chapter 12. Fun Mini Projects Galore.- Chapter 13. Automate with Functions.- Chapter 14. Let’s Create Real World Objects.- Chapter 15. Python and Files.- Chapter 16. Create Cool apps with TKinter.-Chapter 17. Tic Tac Toe Game with Tkinter .- Chapter 18. Project: Paint App with Tkinter.- Chapter 19. Project: Snake Game with Turtle .- Chapter 20. Become a Game Developer with PyGame.- Chapter 21. Project: Space Shooters Game with PyGame.- Chapter 22. Web Development with Python.- Chapter 23. More Mini Projects.- Chapter 24. What’s Next?.
Betriebswirtschaftliche KI-Anwendungen
Digitalisierung und Künstliche Intelligenz ermöglichen Unternehmen disruptive Erweiterungen ihrer Geschäftsmodelle. Wer rechtzeitig digitale KI-Geschäftsmodelle einführt, wird seinen Erfolg nachhaltig sichern können. Aber wie und wo können solche Modelle Anwendung finden? Diese Publikation gibt Antworten, wo KI-Geschäftsmodelle greifen können, und wie diese von der ersten Idee bis zur produktiven Anwendung realisiert werden können. KI-Anwendungen in der Betriebswirtschaft.- Grundlagen und Technik.- Digitale Geschäftsmodelle auf Basis Künstlicher Intelligenz.- Prototyp einer digitalen KI-Anwendung.- Beispielanwendung 1.- Beispielanwendung 2.- Beispielanwendung 3.- Der Weg zum Erfolg mit KI.
Cybersecurity and Third-Party Risk
MOVE BEYOND THE CHECKLIST AND FULLY PROTECT YOURSELF FROM THIRD-PARTY CYBERSECURITY RISKOver the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic.The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing.Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation.* Understand the basics of third-party risk management* Conduct due diligence on third parties connected to your network* Keep your data and sensitive information current and reliable* Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts* Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and EquifaxThe time to talk cybersecurity with your data partners is now.Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.GREGORY C. RASNER is the lead of Cyber Third-Party Risk at Truist Financial Corporation. He has extensive experience in cybersecurity and technology leadership in banking, biotech, software, telecom, and manufacturing. He is the author of several published articles on Third Party Risk and is a sought-after keynote speaker in this area.Foreword xviIntroduction xviiiSECTION 1 CYBERSECURITY THIRD-PARTY RISKCHAPTER 1 WHAT IS THE RISK? 1The SolarWinds Supply-Chain Attack 4The VGCA Supply-Chain Attack 6The Zyxel Backdoor Attack 9Other Supply-Chain Attacks 10Problem Scope 12Compliance Does Not Equal Security 15Third-Party Breach Examples 17Third-Party Risk Management 24Cybersecurity and Third-Party Risk 27Cybersecurity Third-Party Risk as a Force Multiplier 32Conclusion 33CHAPTER 2 CYBERSECURITY BASICS 35Cybersecurity Basics for Third-Party Risk 38Cybersecurity Frameworks 46Due Care and Due Diligence 53Cybercrime and Cybersecurity 56Types of Cyberattacks 59Analysis of a Breach 63The Third-Party Breach Timeline: Target 66Inside Look: Home Depot Breach 68Conclusion 72CHAPTER 3 WHAT THE COVID-19 PANDEMIC DID TO CYBERSECURITY AND THIRD-PARTY RISK 75The Pandemic Shutdown 77Timeline of the Pandemic Impact on Cybersecurity 80Post-Pandemic Changes and Trends 84Regulated Industries 98An Inside Look: P&N Bank 100SolarWinds Attack Update 102Conclusion 104CHAPTER 4 THIRD-PARTY RISK MANAGEMENT 107Third-Party Risk Management Frameworks 113ISO 27036:2013+ 114NIST 800-SP 116NIST 800-161 Revision 1: Upcoming Revision 125NISTIR 8272 Impact Analysis Tool for Interdependent Cyber Supply-Chain Risks 125The Cybersecurity and Third-Party Risk Program Management 127Kristina Conglomerate (KC) Enterprises 128KC Enterprises’ Cyber Third-Party Risk Program 131Inside Look: Marriott 140Conclusion 141CHAPTER 5 ONBOARDING DUE DILIGENCE 143Intake 145Data Privacy 146Cybersecurity 147Amount of Data 149Country Risk and Locations 149Connectivity 150Data Transfer 150Data Location 151Service-Level Agreement or Recovery Time Objective 151Fourth Parties 152Software Security 152KC Enterprises Intake/Inherent Risk Cybersecurity Questionnaire 153Cybersecurity in Request for Proposals 154Data Location 155Development 155Identity and Access Management 156Encryption 156Intrusion Detection/Prevention System 157Antivirus and Malware 157Data Segregation 158Data Loss Prevention 158Notification 158Security Audits 159Cybersecurity Third-Party Intake 160Data Security Intake Due Diligence 161Next Steps 167Ways to Become More Efficient 173Systems and Organization Controls Reports 174Chargebacks 177Go-Live Production Reviews 179Connectivity Cyber Reviews 179Inside Look: Ticketmaster and Fourth Parties 182Conclusion 183CHAPTER 6 ONGOING DUE DILIGENCE 185Low-Risk Vendor Ongoing Due Diligence 189Moderate-Risk Vendor Ongoing Due Diligence 193High-Risk Vendor Ongoing Due Diligence 196“Too Big to Care” 197A Note on Phishing 200Intake and Ongoing Cybersecurity Personnel 203Ransomware: A History and Future 203Asset Management 205Vulnerability and Patch Management 206802.1x or Network Access Control (NAC) 206Inside Look: GE Breach 207Conclusion 208CHAPTER 7 ON-SITE DUE DILIGENCE 211On-site Security Assessment 213Scheduling Phase 214Investigation Phase 215Assessment Phase 217On-site Questionnaire 221Reporting Phase 227Remediation Phase 227Virtual On-site Assessments 229On-site Cybersecurity Personnel 231On-site Due Diligence and the Intake Process 233Vendors Are Partners 234Consortiums and Due Diligence 235Conclusion 237CHAPTER 8 CONTINUOUS MONITORING 239What is Continuous Monitoring? 241Vendor Security-Rating Tools 241Inside Look: Health Share of Oregon’s Breach 251Enhanced Continuous Monitoring 252Software Vulnerabilities/Patching Cadence 253Fourth-Party Risk 253Data Location 254Connectivity Security 254Production Deployment 255Continuous Monitoring Cybersecurity Personnel 258Third-Party Breaches and the Incident Process 258Third-Party Incident Management 259Inside Look: Uber’s Delayed Data Breach Reporting 264Inside Look: Nuance Breach 265Conclusion 266CHAPTER 9 OFFBOARDING 267Access to Systems, Data, and Facilities 270Physical Access 274Return of Equipment 275Contract Deliverables and Ongoing Security 275Update the Vendor Profile 276Log Retention 276Inside Look: Morgan StanleyDecommissioning Process Misses 277Inside Look: Data Sanitization 279Conclusion 283SECTION 2 NEXT STEPSCHAPTER 10 SECURING THE CLOUD 285Why is the Cloud So Risky? 287Introduction to NIST Service Models 288Vendor Cloud Security Reviews 289The Shared Responsibility Model 290Inside Look: Cloud Controls Matrix by the Cloud Security Alliance 295Security Advisor Reports as Patterns 298Inside Look: The Capital One Breach 312Conclusion 313CHAPTER 11 CYBERSECURITY AND LEGAL PROTECTIONS 315Legal Terms and Protections 317Cybersecurity Terms and Conditions 321Offshore Terms and Conditions 324Hosted/Cloud Terms and Conditions 327Privacy Terms and Conditions 331Inside Look: Heritage Valley Health vs. Nuance 334Conclusion 335CHAPTER 12 SOFTWARE DUE DILIGENCE 337The Secure Software Development Lifecycle 340Lessons from SolarWinds and Critical Software 342Inside Look: Juniper 344On-Premises Software 346Cloud Software 348Open Web Application Security Project Explained 350OWASP Top 10 350OWASP Web Security Testing Guide 352Open Source Software 353Software Composition Analysis 355Inside Look: Heartbleed 355Mobile Software 357Testing Mobile Applications 358Code Storage 360Conclusion 362CHAPTER 13 NETWORK DUE DILIGENCE 365Third-Party Connections 368Personnel Physical Security 368Hardware Security 370Software Security 371Out-of-Band Security 372Cloud Connections 374Vendor Connectivity Lifecycle Management 375Zero Trust for Third Parties 379Internet of Things and Third Parties 385Trusted Platform Module and Secure Boot 388Inside Look: The Target Breach (2013) 390Conclusion 391CHAPTER 14 OFFSHORE THIRD-PARTY CYBERSECURITY RISK 393Onboarding Offshore Vendors 397Ongoing Due Diligence for Offshore Vendors 399Physical Security 399Offboarding Due Diligence for Offshore Vendors 402Inside Look: A Reminder on Country Risk 404Country Risk 405KC’s Country Risk 406Conclusion 409CHAPTER 15 TRANSFORM TO PREDICTIVE 411The Data 414Vendor Records 415Due Diligence Records 416Contract Language 416Risk Acceptances 417Continuous Monitoring 417Enhanced Continuous Monitoring 417How Data is Stored 418Level Set 418A Mature to Predictive Approach 420The Predictive Approach at KC Enterprises 420Use Case #1: Early Intervention 423Use Case #2: Red Vendors 425Use Case #3: Reporting 426Conclusion 427CHAPTER 16 CONCLUSION 429Advanced Persistent Threats Are the New Danger 431Cybersecurity Third-Party Risk 435Index 445
Wireless and Mobile Hacking and Sniffing Techniques
Sniffing is the process of monitoring and capturing all the packets passing through a given network using sniffing tools. It is a form of tapping phone wires and get to know about the conversation. It is also called wiretapping applied to the computer networks.Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.There are several ways how hackers can gain access to a public WiFi network and infiltrate connected devices to steal data. The most common practice that hackers use is called sniffing. This method allows hackers to hijack any packet of data that is being transmitted between a device and a router.The mobile device has become an inseparable part of life today. The attackers are easily able to compromise the mobile network because of various vulnerabilities, the majority of the attacks are because of the untrusted apps. SMS is another way the attackers are gaining access to the mobile devices by sending phishing messages/spam messages to userThis report covers the main Wireless and Mobile Hacking and Sniffing Techniques. The report contains the following pars: Part A: Setup LabPart B: Sniffer and Phishing HackingPart C: Wireless Hacking Networks in LinuxPart D: Mobile Platforms HackingI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com