Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Data Engineering 4.0

Data Engineering 4.0

Digitale Systeme und Infrastrukturen werden in der Regel gemeinsam oder wie im öffentlichen Sprachgebrauch üblich, „geteilt“ genutzt.Das gilt sowohl für die Systeme und Infrastrukturen selbst, als auch für Daten, die häufig als das Öl der Digitalisierung bezeichnet werden.In industriellen Nutzungen sind Daten in den meisten Fällen eine geschäftskritische Ressource und können nicht, wie im privaten Nutzungsumfeld, bedingungslos und uneigennützig Dritten überlassen werden. Dennoch ist das Teilen von Daten für industrielle Anwendungen gewünscht und häufig auch zwingend notwendig, aber ebenso häufig unzulässig und gefährlich. Genauso zwingend wie das Teilen von Daten ist in industriellen Anwendungen das nutzungsgerechte und passgerechte Zusammenführen von Daten unterschiedlicher Bedeutung zu Daten-Konglomeraten.Um die digitale Souveränität gemeinsam berechtigter Nutzer von Daten gewährleisten zu können, muss zur Bewältigung dieser beiden Aufgaben ein systematisches Data Engineering bereitgestellt werden.HERBERT WEBEr war Universitätsprofessor im Fachbereich Informatik der Technischen Universität Berlin sowie Gründer und langjähriger Leiter des Fraunhofer-Instituts für Software und Systemtechnik. Informationen und Informationsmodelle.- Informationsmodellierung für industrielle Anwendungen.- Methoden der Informationsmodellierung.- Kompositionale konstruierte Informationsmodelle.- Extensionale Konstruktionen.- Intensionale Konstruktionen.- Das HERMES Komponentenmodell.- Zusammenfassung.

Regulärer Preis: 49,99 €
Produktbild für Multi-Site Network and Security Services with NSX-T

Multi-Site Network and Security Services with NSX-T

Know the basics of network security services and other stateful services such as NAT, gateway and distributed firewalls (L2-L7), virtual private networks (VPN), load balancing (LB), and IP address management. This book covers these network and security services and how NSX-T also offers integration and interoperability with various other products that are not only created by VMware, but are also referred by VMware as third-party integrated vendors.With the integration of VMware vRealize Automation, you can automate full application platforms consisting of multiple virtual machines with network and security services orchestrated and fully automated.From the operational perspective, this book provides best practices on how to configure logging, notification, and monitoring features and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure.Another key part of this book is the explanation of multi-site capabilities and how network and security services can be offered across multiple on-premises locations with a single management pane. Interface with public cloud services also is included. The current position of NSX-T operation in on-premises private clouds and the position and integration with off-premises public clouds are covered as well.This book provides a good understanding of integrations with other software to bring the best out of NSX-T and offer even more features and capabilities.WHAT YOU WILL LEARN* Understand the NSX-T security firewall and advanced security* Become familiar with NAT, DNS, DHCP, and load balancing features* Monitor your NSX-T environment* Be aware of NSX-T authentication and authorization possibilities* Understand integration with cloud automation platforms* Know what multi-cloud integrations are possible and how to integrate NSX-T with the public cloudWHO THIS BOOK IS FORVirtualization administrators, system integratorsIWAN HOOGENDOORN started his IT career in 1999 as a help desk agent. Soon after, he started to learn Microsoft products and obtained MCP, MCSA, MCDBA, and MCSE certifications. While working as a Microsoft Systems Engineer, Iwan developed additional skills and knowledge in computer networking. Networking became a passion in his life. This passion resulted in learning networking with Cisco products. One of Iwan's dreams was to work for Cisco. But before this could happen, he first needed to finish his bachelor's degree in ICT, which he completed in 2009. In early 2010, he started working for his dream company, Cisco. After finishing his master's degree (part-time) in computer science at the University of Amsterdam and becoming a CCIE (#13084) in six different technology areas, Iwan wanted to learn something new, and that was virtualization. Because networking was something that ran through his veins, network virtualization was the next logical step. So he decided to learn VMware NSX.Iwan got the opportunity to work for VMware in 2016 as Senior NSX PSO Consultant. In his time at VMware, he gained more knowledge on private and public clouds and the related products that VMware developed to build the Software-Defined Data Center (SDDC). As new technology is growing at a rapid pace (especially within VMware and the VMware cloud space), Iwan is trying to keep up.After working for four years as Senior NSX PSO Consultant (primarily with VMware NSX-v and NSX-T), Iwan was promoted to Staff SDDC Consultant, focusing on the full SDDC stack that includes Hyperscaler offerings on the main public clouds such as AWS (VMC on AWS), Microsoft (Azure VMware Solution), and Google (Google Cloud VMware Engine).Iwan is certified on multiple VMware products, including NSX, and he is actively working together with VMware certification to develop network-related exams for VMware. Next to his VMware certifications, Iwan is also AWS and TOGAF certified.Iwan is the author of the Apress book, Getting Started with NSX-T: Logical Routing and Switching.· CHAPTER 1o Title: NSX-T SECURITY | FIREWALLo Chapter Goal: The theory about the Basic Security Services offered by NSX-T followed by the deployment’s details and steps with proper verification.o Number of Pages: 20o Subtopics:§ Gateway Firewalls§ Distributed Firewall§ Security Profiles§ Time-Based Firewall Policy· CHAPTER 2o Title: NSX-T ADVANCED SECURITYo Chapter Goal: The theory about the Advanced Security Services/features offered by NSX-T.o Number of Pages: 20o Subtopics:§ Distributed IDS§ Layer-7 Context Profiles§ Identity based Firewall§ Bare Metal Server Security· CHAPTER 3o Title: NSX-T SERVICE INSERTIONo Chapter Goal: The theory about the Security Services/features offered by 3rd Party vendors from VMware’s perspective and how the integration works.o Number of Pages: 15o Subtopics:§ East/West Third-party service insertion§ North/South Third-party service insertion§ End-Point Protection§ Network Introspection Settings· CHAPTER 4o Title: NETWORK ADDRESS TRANSLATION (NAT), DNS AND DHCPo Chapter Goal: Know the difference between SNAT and DNAT and explanation on how to configure NAT, DNS and DHCP IP address Management using the internal NSX-T.o Number of Pages: 20o Subtopics:§ SNAT§ DNAT§ Configure NAT Services§ DNS Zone§ DNS Forwarding Zone§ DHCP Profile§ IP Address Pool§ IP Address Block· CHAPTER 5o Title: LOAD BALANCING (LB)o Chapter Goal: Discuss Load Balancing capabilities and configuration.o Number of Pages: 30o Subtopics:§ Load Balancing Concepts§ Distributed Load Balancer§ Setting up the Load Balancer Components· CHAPTER 6o Title: VIRTUAL PRIVATE NETWORK (VPN)o Chapter Goal: Know the differ types of VPN and how to configure and monitor them.o Number of Pages: 25o Subtopics:§ IPSEC (L3 VPN)§ L2 VPN§ Configuration of VPN· L3· L4§ Monitoring of VPN sessions· CHAPTER 7o Title: NSX-T MONITORINGo Chapter Goal: Tools to verify the Routing and Routing performance.o Number of Pages: 30o Subtopics:§ Network Monitoring§ Logging§ vRealize Network insight integration§ IPFIX§ Network Performance Testing using IPERF Tools§ Monitoring / Events and Alarms§ Logging§ vRealize Log insight integration§ vRealize Operations integration§ Other Operation Tools Integration· CHAPTER 8o Title: AUTHENTICATION AND AUTHORIZATIONo Chapter Goal: Information on how to integrate NSX-T with an external LDAP server and create user (groups) with different roles and rights (RBAC).o Number of Pages: 15o Subtopics:§ vIDM Integration & LDAP Integration§ LDAP only integration§ RBAC· CHAPTER 9o Title: MULTI-SITE AND FEDERATIONo Chapter Goal: Design Principles regarding Multi Site routingo Number of Pages: 40o Subtopics:§ Multi-Site Capabilities§ NSX-T Federation overview§ Networking with Federation§ Security with Federation§ Backup & Restore with Federation· CHAPTER 10o Title: PUBLIC CLOUD INTEGRATIONo Chapter Goal: NSX-T is also used in all major Public Clouds. This chapter gives you an overview on what is deployed there and how NSX-T can be consumed in these Public Clouds.o Number of Pages: 30o Subtopics:§ Forwarding Policies§ VMC on AWS§ Azure VMware Solution (AVS)§ Google Cloud VMware Engine· CHAPTER 11o Title:CLOUD MANAGEMENT PLATFORM INTEGRATION & AUTOMATIONo Chapter Goal: Get familiar on the out-of-the-box automation capabilities and vRO extensibility.o Number of Pages: 20o Subtopics:§ vCloud Director· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ vRealize Automation / vRealize Orchestration· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ NSX-T API Capabilities

Regulärer Preis: 56,99 €
Produktbild für Monitoring Cloud-Native Applications

Monitoring Cloud-Native Applications

Introduce yourself to the nuances of modern monitoring for cloud-native applications running on Kubernetes clusters. This book will help you get started with the concepts of monitoring, introduce you to popular open-source monitoring tools, and help with finding the correct set of use cases for their implementation. It covers the in-depth technical details of open-source software used in modern monitoring systems that are tailor made for environments running microservices.Monitoring Cloud-Native Applications is divided into two parts. Part 1 starts with an introduction to cloud-native applications and the foundational concepts of monitoring. It then walks you through the various aspects of monitoring containerized workloads using Kubernetes as the de-facto orchestration platform. You will dive deep into the architecture of a modern monitoring system and look at its individual components in detail.Part 2 introduces you to popular open-source tools which are used by enterprises and startups alike and are well established as the tools of choice for industry stalwarts. First off, you will look at Prometheus and understand its architecture and usage. You will also learn about InfluxDB, formerly called TICK Stack (Telegraf, InfluxDB, Chronograf, and Kapacitor). You will explore the technical details of its architecture and the use cases which it solves. In the next chapter, you will be introduced to Grafana, a multi-platform open source analytics and interactive visualization tool that can help you with visualization of data and dashboards.After reading this book, you will have a much better understanding of key terminologies and general concepts around monitoring and observability. You will also be able to select a suitable monitoring solution from the bouquet of open-source monitoring solutions available for applications, microservices, and containers. Armed with this knowledge, you will be better prepared to design and lead a successful agile operations team.What You Will LearnMonitor and observe of metrics, events, logs, and tracesCarry out infrastructure and application monitoring for microservices architectureAnalyze and visualize collected dataUse alerting, reporting, and automated actions for problem resolutionWho This Book Is ForDevOps administrators, cloud administrators, and site reliability engineers (SREs) who manage and monitor applications and cloud infrastructure on a day-to-day basis within their organizations.MAINAK CHAKRABORTY works as a senior solutions architect at a leading public cloud company, specializing in cloud management and automation tools. He has been instrumental in shaping the cloud journey of customers across industry segments whether they be established enterprises or born-in-the-cloud startups. Mainak is an open source enthusiast and regularly presents at industry technical events on his favorite topics of automation, cloud native applications, and cloud computing.AJIT PRATAP KUNDAN stands at the leading edge of the innovative technologies of todays’ information technology world. He’s worked with HPE, VMware, Novell, Redington, and PCS and helped their customers in transforming their datacenters through software-defined services. Ajit is a valued author on cloud technologies and has authored two books VMware Cross-Cloud Architecture and Intelligent Automation with VMware published by Packt and has reviewed one book Deep Learning with Pytorch.PART I: INTRODUCTION TO MONITORINGCHAPTER 1: BASIC CONCEPTS OF MONITORINGCHAPTER GOAL: This chapter is about the foundational concepts of monitoring and the associated terminology. It starts with explaining why monitoring is important and also discusses the parameters which can be monitored. We will take a look at the different ways in which monitoring can be done —some systems generate data continuously and others produce data when some event happens. It is most useful for identifying and investigating problems within your systems.No of pages: 20 PagesSub -Topics:1. Overview of Monitoring Concepts2. Proactive and Reactive Monitoring3. Importance of Observability4. What to Monitor – Infrastructure, Application and Services5. Advanced Monitoring of Business KPIs and User ExperienceCHAPTER 2: COLLECTION OF EVENTS, LOGS AND METRICSCHAPTER GOAL: This chapter will explain the difference between Events, Logs and Metrics. It also goes into the details of collection of telemetry from Work Metric and Resource Metric. We will take a look at which data to collect and how to collect that data.No of pages: 40 PagesSub - Topics1. Granularity and Resolution – observations at fixed time interval2. Types of Metrics – Histograms, Gauges, Counters and Timers3. Statistical functions – Count, Sum, Average etc.4. Work Metric – Throughput, Success, Error, Performance5. Resource Metric – Utilization, Saturation, Errors, Availability6. Introduction to Telegraf, collectd, statdCHAPTER 3: ARCHITECTURE OF A MODERN MONITORING SYSTEMCHAPTER GOAL: In this chapter we would take a look at the architecture of a modern monitoring system, its components and the integrations. We would look at how to configure a modern monitoring system, how to manage the collected data, run a query on the data, integrations with alerting tools and the reporting of the analysis.No of pages : 20 PagesSub - Topics:1. Architecture and Components2. Data management3. Query Engine4. Alerting Tools5. VisualizationPART 2- OPEN SOURCE MONITORING TOOLSCHAPTER 4: PROMETHEUSCHAPTER GOAL: This chapter will introduce Prometheus as an open-source monitoring and alerting tool. We will cover the basic concepts, installation and configuration and integration with other tools. We will also look at the use cases which can be delivered with Prometheus and its advantages when compared to Open Source tools like Graphite.No of pages: 50Sub - Topics:1. Introduction to Prometheus2. Architecture and Data Model3. Installation and Configuration4. Instrumenting Prometheus5. Integrations with other solutionsCHAPTER 5: TICK PLATFORMCHAPTER GOAL: We would take a look at Open Source TICK Stack collectively, Telegraf, InfluxDB, Chronograf and Kapacitor. The TICK Stack is a loosely coupled yet tightly integrated set of open source projects designed to handle massive amounts of time-stamped information to support the metrics analysis needs.No of pages: 50Sub - Topics:1. Architecture of TICK Stack2. Deep Dive into Telegraf3. Introduction to Influx DB4. Chronograf and Kapacitor5. Use cases delivered by Tick StackCHAPTER 6: ELASTIC STACK – ELASTIC SEARCHCHAPTER GOAL: In this chapter we will take a look at the open source Elastic Stack – formerly known as the ELK Stack, to understand the practical application of this tool. We would understand the primary areas where we can use it and how is it different from other tools available in the market today.No of pages: 50Sub - Topics:1. Introduction to Elastic Search, Log Stash and Kibana2. Architecture and Data Model3. Installation and Configuration4. Integrations with other solutionsPart 3- Visualization and DashboardsPART 3- VISUALIZATION AND DASHBOARDSCHAPTER 7: ANALYZE AND INVESTIGATECHAPTER GOAL: This chapter is focused on explaining the techniques around choosing the right set of graphs for visualizing your data, specifically time series data. It is important to know the different types, how they work and when to use them. We will also look at how to find a co-relation amongst millions of metrics and arrive at a resolution.No of pages: 20CHAPTER 8: TYPE OF TIME SERIES GRAPHSCHAPTER GOAL: This chapter is focused on explaining the techniques around choosing the right set of visualization for your data, specifically time series data. It is important to know the different types, how they work and when to use them.No of pages: 20Sub - Topics:1. Line Graphs2. Stacked Area Graphs3. Bar Graphs4. Heat MapsCHAPTER 9:TYPE OF SUMMARY GRAPHSCHAPTER GOAL: This chapter will cover summary graphs, which are visualizations that flatten a particular span of time to provide a summary window into your infrastructure. For each graph type, we’ll explain how it works and when to use it. But first, we’ll quickly discuss two concepts that are necessary to understand infrastructure summary graphs: aggregation across time (which you can think of as “time flattening” or “snapshotting”), and aggregation across space.NO OF PAGES: 20SUB - TOPICS:1. Single Value Summaries2. Toplists3. Change Graphs4. Host Maps5. DistributionsCHAPTER 10:GRAPHANACHAPTER GOAL: In this chapter will take a look at Open Source Grafana tool which allows users to query, visualize, alert on and understand metrics wherever they might be stored. It can integrate with Graphite, Influx DB, Prometheus, AWS CloudWatch etc. as a data source and can act as a single visualization option to help better understand your environment.NO OF PAGES: 50PART 4 - ACTING ON THE DATACHAPTER 11:ALERTING AND NOTIFICATIONSChapter Goal: The chapter is focused on how to start your journey to notifications – set up alerts with a simple click or perform complex anomaly detection based on machine learning algorithms. We will look at sending alerts to popular services like Slack, SMS and PagerDuty. We will also explain using automatic action on alerts through orchestration and how to create custom triggers to perform any action.NO OF PAGES: 20SUB - TOPICS:1. False Alarms2. Notifications3. Setup integration with alerting tools4. Setup integration with ITSM tools5. Automated actions

Regulärer Preis: 79,99 €
Produktbild für SAP S/4HANA Embedded Analytics

SAP S/4HANA Embedded Analytics

Imagine you are a business user, consultant, or developer about to enter an SAP S/4HANA implementation project. You are well-versed with SAP’s product portfolio and you know that the preferred reporting option in S/4HANA is embedded analytics. But what exactly is embedded analytics? And how can it be implemented? And who can do it: a business user, a functional consultant specialized in financial or logistics processes? Or does a business intelligence expert or a programmer need to be involved? Good questions!This book will answer these questions, one by one. It will also take you on the same journey that the implementation team needs to follow for every reporting requirement that pops up: start with assessing a more standard option and only move on to a less standard option if the requirement cannot be fulfilled. In consecutive chapters, analytical apps delivered by SAP, apps created using Smart Business Services, and Analytical Queries developed either using tiles or in a development environment are explained in detail with practical examples. The book also explains which option is preferred in which situation. The book covers topics such as in-memory computing, cloud, UX, OData, agile development, and more.Author Freek Keijzer writes from the perspective of an implementation consultant, focusing on functionality that has proven itself useful in the field. Practical examples are abundant, ranging from “codeless” to “hardcore coding.”WHAT YOU WILL LEARN* Know the difference between static reporting and interactive querying on real-time data* Understand which options are available for analytics in SAP S/4HANA* Understand which option to choose in which situation* Know how to implement these optionsWho This Book is ForSAP power users, functional consultants, developersFREEK KEIJZER has a background in science (physics), industry (manufacturing, process industry) and ICT (SAP system integration), holding various project management, people management, and specialist positions. He holds degrees in natural sciences (PhD) and information management (MIM). In 1996, he became involved in an SAP implementation, initially as an R/3 key user, later as internal project leader, interim manager of the support organization, and (international) information manager. Since 2001, he has focused on SAP BI consultancy, working for three consultancy firms and more than 50 clients. His responsibilities as a consultant include product development, team competence development, sales support, and resourcing. Freek's specialties (technical) include SAP Business Intelligence, Hana, NetWeaver, and ERP integration. His roles include project leader, lead consultant, business consultant, (interim) manager, and scrum master.Since 2015, Freek has been a brewer/owner of the Rubelijn craft beer brand.CHAPTER 1: BEFORE THE WORK STARTSCHAPTER GOAL: Miscellaneous intro topics.NO OF PAGES: 40SUB -TOPICS1. Business Intelligence: the art of enriching data2. HANA changing the OLTP versus OLAP game3. Cloud flavors: SaaS versus IaaS4. The latest thing: CDS-views5. Frontend: Fiori and UI56. SAP’s BI portfolio7. S/4HANA and Embedded AnalyticsCHAPTER 2: NO WORK: USE WHAT IS DELIVEREDCHAPTER GOAL: S/4HANA comes with rich analytical apps that can be used immediately. This chapter focuses on the content delivered by SAP.NO OF PAGES: 20SUB - TOPICS1. Discover analytical apps2. Activate them3. Use themCHAPTER 3: SOME WORK: SMART BUSINESS SERVICECHAPTER GOAL: S/4HANA has built-in functions for codeless creation of simple analytical apps. Target group of these functions are power users, but in practice functional (non-BI) consultants are most suitable to use this functionality.Functions are made available as a group of Fiori-tiles under the product name “Smart Business Service”.NO OF PAGES : 30SUB - TOPICS:1. Tiles “KPI Design”2. Tiles “Report Design”3. Tile “Analysis Path Framework Modeling”4. The end-result: again tilesCHAPTER 4: MORE WORK: BUILDING ANALYTICAL QUERIES USING TILESCHAPTER GOAL: S/4HANA comes with tiles to create so-called “Analytical Queries” starting from SAP-delivered CDS-views. Analytical Queries are not static reports, but versatile, interactive queries on real-time data.For the SaaS version of S/4HANA, this is the only option to create Analytical Queries.NO OF PAGES: 40SUB - TOPICS:1. Discovery of SAP-delivered CDS-views with tile “View Browser”2. Enriching CDS-views with tiles “Custom CDS Views”3. Building an Analytical Query with tile “Custom Analytical Query”4. Running the query with tile “Query Browser”5. How to navigate within an Analytical Query.6. Creating a dedicated tile for the queryCHAPTER 5: MOST WORK: BUILDING ANALYTICAL QUERIES IN A DEVELOPMENT ENVIRONMENTCHAPTER GOAL: Starting from real-life business requirements, often the conclusion is reached that SAP-delivered CDS-views won’t do the trick. For a SaaS version of S/4HANA, the process following this conclusion is called “managing expectations”. For an on-premise version, a development environment can be applied. And then … the sky is the limit! Development can start not only from SAP-delivered CDS-views but also from tables.NO OF PAGES: 60SUB - TOPICS:1. Layered approach towards the analytical query2. Data-integration3. “Cube-view”4. Analytical query5. Examples transaction data6. Examples master data7. Example: Replacing custom ABAP-report by analytical query8. Performance considerations; balance between performance and support-friendliness9. Access and data authorizationCHAPTER 6: EXTENSIBILITY, ODATA AND BEYONDCHAPTER GOAL: Miscellaneous outro topics related to Embedded AnalyticsNO OF PAGES: 20SUB - TOPICS:1. S/4HANA Extensibility2. OData and APIs3. Agile development and Devops4. Ideal skill-set for an Embedded Analytics expert

Regulärer Preis: 62,99 €
Produktbild für Xiaomi Redmi Note 10 - alle Modelle

Xiaomi Redmi Note 10 - alle Modelle

Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit

Regulärer Preis: 9,99 €
Produktbild für Learn to Program with Kotlin

Learn to Program with Kotlin

Teach yourself programming starting with the basics and progressing to a series of exciting projects using Kotlin, one of today's hottest programming languages. This book starts with the absolute basics and then introduces just enough syntax to get into some fascinating projects. These include text processing: a statistical analysis of Jane Austen's novels, solving anagrams, and working with palindromes; image processing: cropping and resizing images, and pixel transformation; and computer vision: finding digits, parsing images, and reading speed signs.The projects are developed in tiny steps and complete solutions are provided. Some of these projects include core data science concepts, giving you skills in one of the most important areas of modern programming. Along the way you’ll cover functional programming, object-oriented programming (OOP), refactoring, and writing unit tests.After reading Learn to Program with Kotlin, you'll come away with practical insights and code to get you started right away with programming using Kotlin for your own projects.WHAT YOU WILL LEARN* Gain the basics of Kotlin using the IntelliJ Java IDE* Implement OOP with Kotlin along with unit testing and code refactoring using a series of text-related projects* Harness functional programming with Kotlin by building an image-processing library* Write software to locate and read speed signs in photosWHO IS THIS BOOK FORAnyone who wants to learn how to program or code from scratch. Also great for experienced programmers who want to know more about Kotlin. Tim Lavers is a senior software engineer at KPMG with expertise in Java, Kotlin, and other programming languages employed for data engineering and enterprise software projects. He is also a mathematical hobbyist in his spare time.PART 1 - BASICSThe very basics of programming in Kotlin using the IntelliJ code editor.Chapter 1: Getting StartedChapter 2: Simple patternsChapter 3: Arrays and loopsChapter 4: Binary choicesChapter 5: IntegersChapter 6: Values and variablesChapter 7: StringsChapter 8: Data structuresChapter 9: The file systemPART II - TEXTObject-Oriented Programming, Unit Testing and code refactoring through a series of fascinating text-related projects.Chapter 10: Project AustenChapter 11: AnagramsChapter 12: PalindromesChapter 13: Word switchPART III - IMAGESThis part of the book introduces Functional Programming by building a basic image processing library.The culmination of this is a CGI (Computer Generated Imagery) project.Chapter 14: Colour picturesChapter 15: Pixel transformationsChapter 16: Cropping and resizing imagesChapter 17: Project DinoPART IV - VISIONWe cap it all of with a project in which we write software to locate and read speed signs in photos.Chapter 18: OverviewChapter 19: Finding digitsChapter 20: Parsing the imagesChapter 21: Reading speed signs

Regulärer Preis: 56,99 €
Produktbild für From Traditional Fault Tolerance to Blockchain

From Traditional Fault Tolerance to Blockchain

This book covers the most essential techniques for designing and building dependable distributed systems, from traditional fault tolerance to the blockchain technology. Topics include checkpointing and logging, recovery-orientated computing, replication, distributed consensus, Byzantine fault tolerance, as well as blockchain.This book intentionally includes traditional fault tolerance techniques so that readers can appreciate better the huge benefits brought by the blockchain technology and why it has been touted as a disruptive technology, some even regard it at the same level of the Internet. This book also expresses a grave concern on using traditional consensus algorithms in blockchain because with the limited scalability of such algorithms, the primary benefits of using blockchain in the first place, such as decentralization and immutability, could be easily lost under cyberattacks.DR. ZHAO received the PhD degree in Electrical and Computer Engineering from the University of California, Santa Barbara, in 2002. He is now a Full Professor in the Department of Electrical Engineering and Computer Science at Cleveland State University. He has more than 200 academic publications and three of his recent research papers in the dependable distributed computing area have won the best paper awards. Dr. Zhao also has two US utility patents and a patent application on blockchain under review.List of Figures xiiiList of Tables xixAcknowledgments xxiPreface xxiiiReferences xxix1 INTRODUCTION 11.1 Basic Concepts and Terminologies for Dependable Computing 21.1.1 System Models 21.1.2 Threat Models 31.1.3 Dependability Attributes and Evaluation Metrics 61.2 Means to Achieve Dependability 91.2.1 Fault Avoidance 91.2.2 Fault Detection and Diagnosis 91.2.3 Fault Removal 101.2.4 Fault Tolerance 111.3 System Security 13References 182 LOGGING AND CHECKPOINTING 212.1 System Model 222.1.1 Fault Model 232.1.2 Process State and Global State 232.1.3 Piecewise Deterministic Assumption 262.1.4 Output Commit 262.1.5 Stable Storage 272.2 Checkpoint-Based Protocols 272.2.1 Uncoordinated Checkpointing 272.2.2 Tamir and Sequin Global Checkpointing Protocol 292.2.3 Chandy and Lamport Distributed Snapshot Protocol 352.2.4 Discussion 382.3 Log Based Protocols 402.3.1 Pessimistic Logging 422.3.2 Sender-Based Message Logging 51References 603 RECOVERY-ORIENTED COMPUTING 633.1 System Model 653.2 Fault Detection and Localization 683.2.1 Component Interactions Modeling and Anomaly Detection 723.2.2 Path Shapes Modeling and Root Cause Analysis 763.2.3 Inference-Based Fault Diagnosis 803.3 Microreboot 893.3.1 Microrebootable System Design Guideline 903.3.2 Automatic Recovery with Microreboot 913.3.3 Implications of the Microrebooting Technique 923.4 Overcoming Operator Errors 933.4.1 The Operator Undo Model 943.4.2 The Operator Undo Framework 95References 994 DATA AND SERVICE REPLICATION 1034.1 Service Replication 1054.1.1 Replication Styles 1074.1.2 Implementation of Service Replication 1094.2 Data Replication 1114.3 Optimistic Replication 1164.3.1 System Models 1174.3.2 Establish Ordering among Operations 1194.3.3 State Transfer Systems 1224.3.4 Operation Transfer System 1264.3.5 Update Commitment 1314.4 CAP Theorem 1364.4.1 2 out 3 1394.4.2 Implications of Enabling Partition Tolerance 140References 1435 GROUP COMMUNICATION SYSTEMS 1475.1 System Model 1495.2 Sequencer Based Group Communication System 1525.2.1 Normal Operation 1535.2.2 Membership Change 1575.2.3 Proof of Correctness 1655.3 Sender Based Group Communication System 1665.3.1 Total Ordering Protocol 1675.3.2 Membership Change Protocol 1745.3.3 Recovery Protocol 1835.3.4 The Flow Control Mechanism 1905.4 Vector Clock Based Group Communication System 192References 1976 CONSENSUS AND THE PAXOS ALGORITHMS 1996.1 The Consensus Problem 2006.2 The Paxos Algorithm 2026.2.1 Algorithm for Choosing a Value 2026.2.2 Algorithm for Learning a Value 2046.2.3 Proof of Correctness 2046.2.4 Reasoning of the Paxos Algorithm 2066.3 Multi-Paxos 2126.3.1 Checkpointing and Garbage Collection 2136.3.2 Leader Election and View Change 2146.4 Dynamic Paxos 2166.4.1 Dynamic Paxos 2176.4.2 Cheap Paxos 2206.5 Fast Paxos 2276.5.1 The Basic Steps 2286.5.2 Collision Recovery, Quorum Requirement, and Value Selection Rule 2296.6 Implementations of the Paxos Family Algorithms 2356.6.1 Hard Drive Failures 2366.6.2 Multiple Coordinators 2366.6.3 Membership Changes 2376.6.4 Limited Disk Space for Logging 241References 2427 BYZANTINE FAULT TOLERANCE 2457.1 The Byzantine Generals Problem 2467.1.1 System Model 2477.1.2 The Oral Message Algorithms 2507.1.3 Proof of Correctness for the Oral Message Algorithms 2607.2 Practical Byzantine Fault Tolerance 2617.2.1 System Model 2627.2.2 Overview of the PBFT Algorithm 2637.2.3 Normal Operation of PBFT 2657.2.4 Garbage Collection 2677.2.5 View Change 2687.2.6 Proof of Correctness 2717.2.7 Optimizations 2737.3 Fast Byzantine Agreement 2777.4 Speculative Byzantine Fault Tolerance 2787.4.1 The Agreement Protocol 2797.4.2 The View Change Protocol 2837.4.3 The Checkpointing Protocol 2887.4.4 Proof of Correctness 288References 2908 CRYPTOCURRENCY AND BLOCKCHAIN 2958.1 History of Cryptocurrency 2958.2 Bitcoin 2988.2.1 Decentralized Network and Architecture 3018.2.2 Self-Contained Cryptography 3028.2.3 Decentralized Data Structure 3048.2.4 Decentralized Algorithms 3138.3 Ethereum 3178.3.1 Ethereum Computing Model 3188.3.2 Block and Consensus 3268.3.3 Tokenization 3408.4 Attacks on Blockchain 342References 3479 CONSENSUS ALGORITHMS FOR BLOCKCHAIN 3499.1 Model on Blockchain Consensus 3539.1.1 Requirements on Puzzle Design 3549.1.2 Zero-Knowledge Proof 3559.2 Proof of Work 3569.3 Proof of Resources 3579.3.1 Using Storage as Resource 3579.3.2 Using Computing as Resource 3599.4 Virtual Mining 3609.4.1 PeerCoin PoS 3609.4.2 Fixed-Epoch Time Based PoS Schemes 3689.4.3 Proof of Elapsed Time 371References 37510 BLOCKCHAIN APPLICATIONS 37710.1 The Value of Blockchain 37810.1.1 Non-Functional Benefits 37910.1.2 Functional Benefits 38210.2 Blockchain-Enabled Cyber-Physical Systems 38310.2.1 Cyber-Physical Systems 38310.2.2 Application Categories 38510.2.3 Blockchain-Enabled Operations in CPS 39010.3 On Blockchain Throughput 39810.3.1 On-Chain Approach 39910.3.2 Off-Chain Approach 40210.4 A Critical Look on Blockchain from Economy Perspective 40810.4.1 Blockchain Technology from the Economic View 40910.4.2 Economic Functions of Blockchain 41210.4.3 Blockchain as a Financial Infrastructure 416References 419Index 427

Regulärer Preis: 190,99 €
Produktbild für Roboter in der Bildung

Roboter in der Bildung

Wie Robotik das Lernen im digitalen Zeitalter bereichern kann.Der Bildungsbereich verändert sich durch die Einführung digitaler Technologien. Roboter sind die Brücke zwischen der digitalen und der physischen Welt und daher ein wesentliches Thema in und für die Bildung. Dies hat einen direkten Einfluss darauf, wie und was wir den Lernenden beibringen.Dieses Buch bietet eine Einführung in die Verwendung und den Einsatz von Robotern in der Bildung und hilft Forschern geeignete Soft- und Hardware zu entwickeln. Lehrer und Trainer erfahren, wie sie Roboter in ihrer Arbeit mit Schülern und Studenten einsetzen können. Es bietet eine Einführung in die einschlägigen Lehr- und Lerntheorien im Zusammenhang mit dem veränderten Lernen sowie praktische Ratschläge zum Einsatz von Robotern als Teil eines Lehrplans.Leseprobe (PDF-Link)

Regulärer Preis: 29,99 €
Produktbild für JavaServer Faces und Jakarta Server Faces 2.3 (3.Auflg.)

JavaServer Faces und Jakarta Server Faces 2.3 (3.Auflg.)

Das Arbeitsbuch für Java-Webentwickler in aktualisierter 3. Auflage.JavaServerTM Faces und Jakarta Server Faces 2.3 sind ein Framework für die Entwicklung von Benutzerschnittstellen für bzw. als Teil einer Java-Web-Anwendung. Dieses Arbeitsbuch führt Sie Schritt für Schritt in die Programmierung mit JSF ein. Sie erfahren, wie Sie damit moderne Benutzerschnittstellen für die Praxis entwickeln.Und natürlich geht es auch darum, wie JSF in eine Java-Web-Anwendung zu integrieren sind. Behandelt werden auch Themen wie die Anbindung an eine Datenbank mit JPA, die Verwendung von CDI sowie Authentifizierung und Autorisierung.Verfolgen Sie Schritt für Schritt die Entwicklung einer betrieblichen Anwendung und lernen Sie so anhand realer Aufgabenstellungen alle wichtigen Aspekte von JSF 2.3 kennen. Mit Hilfe der Übungen, deren Lösungen sich von der Website zum Buch und von GitHub herunterladen lassen, können Sie das Gelernte selbst ausprobieren und umsetzen.Aus dem Inhalt:EinleitungJSF im DetailContext und Dependency InjectionWeiterführende ThemenClassic ModelsSpezialthemenVerwendete SystemeAusblick/Anhang: Die Tags der Standardbibliotheken

Regulärer Preis: 44,99 €
Produktbild für MCA Microsoft Office Specialist (Office 365 and Office 2019) Study Guide

MCA Microsoft Office Specialist (Office 365 and Office 2019) Study Guide

MCA Microsoft Office Specialist Study Guide: PowerPoint Associate Exam MO-300is your roadmap to preparing for taking the MO-300 exam and earning the PowerPoint Associate (PowerPoint and PowerPoint 2019) certification. The following objectives are covered:* Manage presentations* Manage slides* Insert and format text, shapes, and images* Insert tables, charts, smartArt, 3D models, and media* Apply transitions and animationsMajor topics include creating, editing, and enhancing presentations and slideshows, including the ability to create and manage presentations, insert and format shapes and slides, create slide content, apply transitions and animations, and manage multiple presentations. This Study Guide also covers creating professional-grade sales presentations, employee training, instructional materials, and kiosk slideshows.Readers will also have access to Sybex's superior online test bank, includng hundreds of practice questions, flashcards, and a glossary of important terms.ERIC BUTOW is the author of 39 books on technology topics and has developed and taught networking, computing, and usability courses for Ed2Go, Virtual Training Company, California State University, Sacramento, and Udemy. He has been using PowerPoint professionally since 1994. He's served as a technical writer for companies like Intel, Wells Fargo, Cisco Systems, and Hewlett-Packard. He is the founder and owner of Butow Communications Group in Jackson, California.Introduction xiAssessment Test xvCHAPTER 1 CREATING PRESENTATIONS 1Modifying Slide Masters, Handout Masters, and Note Masters 3Changing the Slide Master Theme or Background 4Modifying Slide Master Content 9Creating Slide Layouts 10Modify Slide Layouts 15Modifying the Handout Master 19Modifying the Notes Master 26Changing Presentation Options and Views 32Changing the Slide Size 32Displaying Presentations in Different Views 34Setting Basic File Properties 36Configuring Print Settings for Presentations 37Printing All or Part of a Presentation 37Printing Notes Pages 39Printing Handouts 40Printing in Color, Grayscale, or Black and White 41Configuring and Presenting Slideshows 43Creating Custom Slideshows 43Configuring Slideshow Options 48Rehearsing Slideshow Timing 49Setting Up Slideshow Recording Options 53Presenting Slideshows by Using Presenter View 56Preparing Presentations for Collaboration 62Mark Presentations as Final 63Protecting Presentations by Using Passwords 64Inspecting Presentations for Issues 65Adding and Managing Comments 67Preserving Presentation Content 72Exporting Presentations to Other Formats 73Summary 82Key Terms 83Exam Essentials 83Review Questions 85CHAPTER 2 MANAGING SLIDES 87Inserting Slides 88Importing Word Document Outlines 88Inserting Slides from Another Presentation 91Inserting Slides and Selecting Slide Layouts 93Inserting Summary Zoom Slides 95Duplicating Slides 100Modifying Slides 101Hiding and Unhiding Slides 102Modifying Individual Slide Backgrounds 103Inserting Slide Headers, Footers, and Page Numbers 106Ordering and Grouping Slides 110Creating Sections 110Modifying the Slide Order 112Renaming Sections 114Summary 115Key Terms 116Exam Essentials 116Review Questions 117CHAPTER 3 INSERTING AND FORMATTING TEXT, SHAPES, AND IMAGES 119Formatting Text 121Applying Formatting and Styles to Text 121Formatting Text in Multiple Columns 127Creating Bulleted and Numbered Lists 128Inserting Links 130Inserting Hyperlinks 130Inserting Section Zoom Links and Slide Zoom Links 131Inserting and Formatting Images 135Resizing and Cropping Images 137Applying Built-In Styles and Effects to Images 139Inserting Screenshots and Screen Clippings 141Inserting and Formatting Graphic Elements 144Inserting and Changing Shapes 144Drawing by Using Digital Ink 146Adding Text to Shapes and Text Boxes 149Resizing Shapes and Text Boxes 151Formatting Shapes and Text Boxes 153Applying Built-In Styles to Shapes and Text Boxes 155Adding Alt Text to Graphic Elements for Accessibility 158Ordering and Grouping Objects on Slides 160Ordering Shapes, Images, and Text Boxes 160Aligning Shapes, Images, and Text Boxes 161Grouping Shapes and Images 163Displaying Alignment Tools 164Summary 165Key Terms 166Exam Essentials 166Review Questions 167CHAPTER 4 INSERTING TABLES, CHARTS, SMARTART, 3D MODELS, AND MEDIA 169Inserting and Formatting Tables 170Creating and Inserting Tables 170Inserting and Deleting Table Rows and Columns 171Applying Built-In Table Styles 174Inserting and Modifying Charts 177Creating and Inserting Charts 177Modifying Charts 180Inserting and Formatting SmartArt Graphics 186Inserting SmartArt Graphics 186Converting Lists to SmartArt Graphics 186Adding and Modifying SmartArt Graphic Content 189Inserting and Modifying 3D Models 191Inserting 3D Models 191Modifying 3D Models 193Inserting and Managing Media 194Inserting Audio and Video Clips 194Creating and Inserting Screen Recordings 202Configuring Media Playback Options 207Summary 210Key Terms 211Exam Essentials 211Review Questions 213CHAPTER 5 APPLYING TRANSITIONS AND ANIMATIONS 215Applying and Configuring Slide Transitions 216Applying Basic and 3D Slide Transitions 216Configuring Transition Effects 218Animating Slide Content 222Animating Text and Graphic Elements 222Animating 3D Models 232Configuring Animation Effects 235Configuring Animation Paths 238Reordering Animations on a Slide 243Setting Timing for Transitions 245Setting Transition Effect Duration 245Configuring Transition Start and Finish Options 246Summary 248Key Terms 248Exam Essentials 249Review Questions 250APPENDIX ANSWERS TO REVIEW QUESTIONS 253Chapter 1: Creating Presentations 254Chapter 2: Managing Slides 254Chapter 3: Inserting and Formatting Text, Shapes, and Images 255Chapter 4: Inserting Tables, Charts, SmartArt, 3D Models, and Media 256Chapter 5: Applying Transitions and Animations 256Index 259

Regulärer Preis: 16,99 €
Produktbild für Sozioinformatik

Sozioinformatik

Ein neuer Blick auf Informatik und Gesellschaft. Einführung in die Modellierung und Analyse digitaler Technikfolgen.Welche Auswirkungen könnte es haben, wenn Technik in den Körper implantiert wird und sich Menschen zunehmend zu Cyborgs entwickeln? Wie kann es passieren, dass sich mazedonische Jugendliche in den Präsidentschaftswahlkampf der USA einmischen? Wann entstehen Filterblasen?In den letzten Jahren konnten viele gewollte und ungewollte Technikfolgen der digitalen Transformation beobachtet werden. Die in diesem Buch vorgestellte Sozioinformatik befasst sich mit der Modellierung und Analyse solcher Phänomene: Sie untersucht dafür die Folgen der informatischen Gestaltung unter interdisziplinären Aspekten, insbesondere denen der Verhaltensökonomie.Zentrales Hilfsmittel der Analyse ist der Aufbau eines visuellen Wirkungsgefüges, mit dem verschiedene Dynamiken und Technikfolgen in der digitalen Transformation abgeschätzt werden können. Damit wird erklärbar, wann man eine Filterblase erwarten kann, warum manche digitale Technik unsere Aufmerksamkeit so effektiv bindet, und warum Software dazu verführen kann, Einfluss auf Wahlen in einem anderen Land zu nehmen.Das Buch eignet sich als Grundlage für »Informatik und Gesellschaft« Vorlesungen in der Informatik, genauso als Grundlage für Seminare in den Gesellschaftswissenschaften oder zur Besprechung digitaler Phänomene in der Schule. Es bietet zudem eine neue Kommunikationsmethode, die im Journalismus, der Politik oder in der Beratung eingesetzt werden kann.Leseprobe (PDF-Link)

Regulärer Preis: 29,99 €
Produktbild für Getting Started with WidgetKit

Getting Started with WidgetKit

Develop handy, UI/UX friendly and eye-pleasing widgets using the brand new WidgetKit. Apple’s brand new widgets allow iOS users to work with their favorite apps in the home screen of their iPhone or iPad without even opening the app!Join us in this exciting journey as we explore the APIs introduced in Apple’s WidgetKit framework. You'll dive into the human interface guidelines (HIG) for creating widgets and review the recommendations Apple gives to developers for developing widgets with intuitive, easy-to-learn, and consistent user interfaces. In addition, you’ll take a look at some SwiftUI views that are useful not only in creating widgets for iOS apps, but also for creating iOS apps themselves.You’ll put everything you learn into practical application by actually writing code and creating widgets. Get a clear view of how everything works so that you’re able to incorporate widgets into your real-world projects authentically and successfully.WHAT YOU'LL LEARN* Configure widgets and make them talk to APIs using URLSession* Work with timelines and event handling in widgets* Fetch content from a remote server and display the data in a widget* Make content dynamic both remotely and locallyWHO THIS BOOK IS FORiOS developers working in the Apple ecosystem with a basic understanding of SwiftUI.SAGUN RAJ LAGE started his professional career in software development as a Full Stack Web Developer and later moved into developing iOS applications. He has been a part of development teams on applications used in fields such as transportation, multimedia, shopping, finance, astrology, and management. He is actively involved in organizing developer events and in contributing as a mentor and tutor in programming bootcamps. Apart from software development and programming, he enjoys reading and writing blogs, music, graphic design, and video editing.PRAKSHAPAN SHRESTHA is an entrepreneurial app developer with 6 years of iOS development experience. He devoutly follows the latest tools and technologies that make a developer's life easier and actively helps out budding developers. Aside from software development, Prakshapan enjoys hiking and heading his recent venture, Pregasathi, which provides new families in need of baby products with help. Chapter 1: Getting Familiar with WidgetKit in a FlashChapter 2: SwiftUI, Human Interface Guidelines and Widget FamilyChapter 3: Writing Your First WidgetChapter 4: Making Widgets Configurable and InteractiveChapter 5: Fetching Configuration Options for Configurable Widgets

Regulärer Preis: 62,99 €
Produktbild für Digitale Transformation von Geschäftsmodellen

Digitale Transformation von Geschäftsmodellen

Dieses Buch zeigt, wie es Unternehmen gelingt, ihre Geschäftsmodelle auf die digitale Zukunft vorzubereiten und wie dadurch Wettbewerbsvorteile geschaffen und Kundenanforderungen besser erfüllt werden können. Die Autoren aus Praxis und Wissenschaft zeigen die digitale Transformation von Unternehmen über die gesamte Wertschöpfungskette hinweg. Die Beiträge behandeln Ansätze und Instrumente, Studienergebnisse und Best Practices unterschiedlicher Industrien im Kontext der digitalen Transformation. Die Inhalte berücksichtigen divergierende Anforderungen von Unternehmen und Industrien und können nach Bedarf kombiniert und erweitert werden, um sie an die spezifischen Rahmenbedingungen eines Unternehmens anzupassen. Die zweite aktualisierte Auflage wurde überarbeitet und enthält neue wissenschaftliche und praktische Beiträge zu den folgenden drei zentralen Themen: Ansätze und Instrumente, Studienergebnisse sowie Best Practices aus den Bereichen Mobilität, Gesundheit, Maschinenbau, Medien, Lebensmittel, Banken und Handel. Ansätze und Instrumente.- Studienergebnisse.- Best Practices aus den Bereichen Mobilität, Gesundheit, Maschinenbau, Medien, Lebensmittel, Banken und Handel.

Regulärer Preis: 54,99 €
Produktbild für Multimedial lehren und lernen

Multimedial lehren und lernen

Für alle Lehrkräfte, die digitale Lehrinhalte schnell und einfach gestalten wollen. Lesen Sie, wie Sie mit H5P multimedial lehren und lernen können.Für die Nutzung ist außer einem modernen Webbrowser keine zusätzliche Software erforderlich, so dass H5P-Inhalte auf jedem PC und jedem Smartphone nutzbar sind.Die Inhalte können problemlos in die Lernplattform Moodle sowie in die Content-Management-Systeme WordPress und Drupal integriert werden.Das Werk stellt mehr als 40 H5P-Inhaltstypen und ihren Einsatz im Detail vor. Wer mehr über die Webtechnologien wissen und die Hintergründe verstehen möchte, findet in Workshops zum Webdesign einen Einstieg in die grundlegenden Technologien.H5P ist die kommende Technologie zur Gestaltung multimedialer und interaktiver Lehrmaterialien – auch als offene Inhalte im Interesse für ein breites Bildungsangebot. Die Inhalte eignen sich sowohl für rein digitales Lehren als auch unterstützend für den klassischen Präsenzunterricht.Aus dem Inhalt:Qualitätsverbesserung statt Rationalisierung in der LehreDas H5P-Projekt: Einladung zum MitgestaltenH5P in der Praxis einsetzenH5P-Inhaltstypen – Wissen vermitteln und reflektierenFotos und multimediale Inhalte für Distance-Learning gestalten/Rechtliche AspekteDie Technik im Hintergrund: Einführungen in HTML, CSS, JavaScript und PHPLeseprobe (PDF-Link)

Regulärer Preis: 39,99 €
Produktbild für Oracle Database Programming with Visual Basic.NET

Oracle Database Programming with Visual Basic.NET

ORACLE DATABASE PROGRAMMING WITH VISUAL BASIC.NETDISCOVER A DETAILED TREATMENT OF THE PRACTICAL CONSIDERATIONS AND APPLICATIONS OF ORACLE DATABASE PROGRAMMING WITH VISUAL BASIC 2019Oracle Database Programming with Visual Basic.NET: Concepts, Designs, and Implementations delivers a comprehensive exploration of the foundations of Oracle database programming using Visual Basic.NET. Using Visual Basic.NET 2019, Visual Studio.NET 2019, and Oracle 18c XE, the book introduces the Oracle database development system, Oracle SQL Developer and Modeler, and teaches readers how to implement a sample database solution. The distinguished author also demonstrates the use of dotConnect for Oracle to show readers how to create an effective connection to an Oracle 18c XE database. The current versions of the .NET framework, ASP.NET, and ASP.NET 4.7 are also explored and used to offer readers the most up to date web database programming techniques available today. The book provides practical example projects and detailed, line-by-line descriptions throughout to assist readers in the development of their database programming skill. Students will also benefit from the inclusion of:* A thorough introduction to databases, including definitions, examples, descriptions of keys and relationships, and some database components in popular databases, like Access, SQL, and Oracle* An exploration of ADO.NET, including its architecture and components, like the DataReader class, DataSet component, DataTable component, and the command and parameter classes* A discussion of Language Integrated Query (LINQ), including its architecture and components, its relationship to objects, DataSet, Oracle, and Entities* An explanation of how to access data in ASP.NET and ASP.NET Web Services with multiple real project examples.Perfect for college and university students taking courses related to database programming and applications, Oracle Database Programming with Visual Basic.NET will also earn a place in the libraries of programmers and software engineers seeking a comprehensive reference for database coding in Visual Basic.NET. YING BAI, PHD, is Professor in the Department of Computer Science and Engineering at Johnson C. Smith University. He is the author of Practical Microcontroller Engineering with ARM Technology, Practical Database Programming with Visual Basic.NET, 2nd Edition, Practical Database Programming with Java, and Practical Database Programming with Visual C#.NET.

Regulärer Preis: 73,99 €
Produktbild für JavaServer™ Faces und Jakarta Server Faces 2.3

JavaServer™ Faces und Jakarta Server Faces 2.3

DAS ARBEITSBUCH FÜR JAVA-WEBENTWICKLER // - Steigen Sie mit diesem fundierten Arbeitsbuch in die Entwicklung von Benutzerschnittstellen mit JavaServerTM Faces und Jakarta Server Faces 2.3 ein. - Anhand einer Beispielanwendung werden alle wichtigen Aspekte von JSF erläutert. - Vertiefen und erweitern Sie Ihre Fertigkeiten mit den zahlreichen Übungen. - Verwendet werden ausschließlich Open-Source-Systeme, so dass Sie alle Übungen und Beispiele ohne weitere Lizenzkosten nachvollziehen können. - Im Internet: Quell-Code zu den Beispielen und Lösungen der Übungen auf der Autorenwebsite zum Buch und GitHub - Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten Buches JavaServerTM Faces und Jakarta Server Faces 2.3 sind ein Framework für die Entwicklung von Benutzerschnittstellen für bzw. als Teil einer Java-Web-Anwendung. Dieses Arbeitsbuch führt Sie Schritt für Schritt in die Programmierung mit JSF ein. Sie erfahren, wie Sie damit moderne Benutzerschnittstellen für die Praxis entwickeln. Und natürlich geht es auch darum, wie JSF in eine Java-Web-Anwendung zu integrieren sind. Behandelt werden auch Themen wie die Anbindung an eine Datenbank mit JPA, die Verwendung von CDI sowie Authentifizierung und Autorisierung. Verfolgen Sie Schritt für Schritt die Entwicklung einer betrieblichen Anwendung und lernen Sie so anhand realer Aufgabenstellungen alle wichtigen Aspekte von JSF 2.3 kennen. Mit Hilfe der Übungen, deren Lösungen sich von der Website zum Buch und von GitHub herunterladen lassen, können Sie das Gelernte selbst ausprobieren und umsetzen. AUS DEM INHALT // Einleitung/JSF im Detail/Context und Dependency Injection/Weiterführende Themen/Classic Models/Spezialthemen/Verwendete Systeme/Ausblick/Anhang: Die Tags der Standardbibliotheken

Regulärer Preis: 44,99 €
Produktbild für Email Marketing Best Practices for Beginners

Email Marketing Best Practices for Beginners

E-mail marketing is hands down the most powerful and effective form of online marketing. Nothing comes close. Seriously. Even search marketing with all its hype and tried-and-proven success can't even hold the candle to just how effective list marketing can be. It's easy to see why, survey after survey, marketing firms keep putting e-mail marketing at or near the top of their advertising preferences. Here are the reasons why.Through e-mail marketing, you can get in front of the eyeballs of your audience members anytime anywhere. That's right. You can be at a beach in the Bahamas somewhere writing an e-mail update. Plug that in to your e-mail service provider and your audience, regardless of where they may be in the world and regardless of what they're doing, are sure to get your e-mail. After all, most people check their e-mail inboxes. Isn't that awesome?This enables you to sell more products. Since you have a de facto relationship with people who voluntarily got on your mailing list, you are able to keep the conversation going. You don't get just one bite at the apple in trying to get list members to buy.Hello my name is Mey Irtz and I am the author of several books in the area of health, relationships and others. I love to write books and share my knowledge.

Regulärer Preis: 5,49 €
Produktbild für Blogging for Money for Beginners

Blogging for Money for Beginners

Making a living as a blogger has to be one of the sweetest gigs out there.As a blogger, you'll be able to earn passive income which means that your money will flow in even as you're sleeping, travelling or relaxing with friends. You're no long trading time for income and this is the point you need to get to if you want to really be free and financially independent (even being self-employed with clients is still pretty much like having a job).What's more, blogging means you get to earn that money by writing on a topic that you find fascinating and you even get to become something of a minor celebrity in your chosen niche. You can earn a lot of money here too – if a blog takes off and becomes really successful then in theory you can earn thousands a day. It's incredibly scalable and there's no 'upper limit' for what you can achieve.Hello my name is Mey Irtz and I am the author of several books in the area of health, relationships and others. I love to write books and share my knowledge.

Regulärer Preis: 4,99 €
Produktbild für Information Refinement Technologies for Crisis Informatics

Information Refinement Technologies for Crisis Informatics

Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response. He develops a novel framework for information refinement, which integrates the event, organisational, societal, and technological perspectives of crises. Therefore, he reviews the state of the art on crisis informatics and empirically examines the use, potentials and barriers of both social media and mobile apps. Based on these insights, he designs and evaluates ICT concepts and artifacts with the aim to overcome the issues of information overload and quality in large-scale crises, concluding with practical and theoretical implications for technology adaptation and design.About the author:Marc-André Kaufhold is a postdoc at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the Technical University of Darmstadt. His research focuses on the user-centred design and evaluation of mobile apps and social media technologies in the context of crisis and security research.Part I: Outline.- Part II: Theoretical and Empirical Findings.- Part III: Design and Evaluation Findings.- Part IV: Conclusion and Outlook.

Regulärer Preis: 106,99 €
Produktbild für Configuration of Apache Server To Support ASP

Configuration of Apache Server To Support ASP

The paper aim is to configure Apache Server to support ASP. Two methods were tested. The first, by installing Bundle::Apache::ASP, and the second, by installing SUN ONE ASP Server. Two possible options for connecting to a Microsoft Access database with Sun ONE ASP for UNIX or Linux, using the using SequeLink, and using the Sun ONE ASP Database Publisher tool to migrate an Access database to MySQL, were studied. The paper is composed from the following parts,1. Setting up working environment when working with CodeCharge Studio program, software for building web applications.2. Connecting to databases in ASP.3. ASP program example.4. Configuring apache server to support ASP by installing Bundle::Apacahe::ASP.5. Configuring apache server to support ASP by installing Sun ONE ASP.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator.I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering.I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 6,49 €
Produktbild für Cisco Networks

Cisco Networks

For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. Cisco Networks, 2nd Edition is a practical guide and desk reference for Cisco engineers. This new edition will discuss tools that can be used to automate and troubleshoot networks. A new chapter on quality of service has been added to teach managing network resources by prioritizing specific types of network traffic. The new edition has an updated wireless section which focuses on an updated controller and integration with Cisco Identity Services Engine (ISE) and Cisco Prime Infrastructure.This practical desk companion doubles as a comprehensive overview of the basic knowledge and skills needed by CCNA and CCNP exam takers. Prior familiarity with Cisco routing and switching is desirable but not necessary, as Chris Carthern, Dr. Will Wilson, and Noel Rivera start their book with a review of network basics. Further they explain practical considerations and troubleshooting when establishing a physical medium for network communications. Later they explain the concept of network layers, intermediate LAN switching, and routing. Next they introduce you to the tools and automation used with Cisco networks. Moving forward they explain management planes, data planes, and control planes. Next they describe advanced security, trouble shooting, and network management. They conclude the book with a section which focuses on using network automation to automate Cisco IOS networks.WHAT YOU WILL LEARN* Configure Cisco switches, routers, and data center devices in typical corporate network architectures* Use black-hat tools to conduct penetration testing on the security of your network* Configure and secure virtual private networks (VPNs)* Enable identity management in your network with the Cisco Identity Services Engine (ISE) WHO THIS BOOK IS FORNetwork designers, engineers, programmers, managers, and students.CHRIS is a senior network engineer for Mantech and has worked for the department of defense. He is responsible for designing, installing, and maintaining the Cisco network infrastructure and mentoring junior network engineers. Carthern took his BS (honors) in computer science from Morehouse College and his MS in system engineering from the University of Maryland Baltimore County (UMBC). He holds the following certifications: Cisco Certified Network Professional (CCNP), Certified Information Systems Security Professional (CISSP), Brocade Certified Network Professional (BCNP), and ITIL v3. He is also an award winning photographer and indie movie producer.NOEL RIVERA is a systems architect with CACI who specializes in communications networks, IT security, and infrastructure automation. He has worked at NASA, DoD, Lockheed Martin, and CACI. Mr. Rivera holds a bachelors of electrical engineering from the University of Puerto Rico at Mayaguez and two masters degrees one in electrical engineering and another in computer science from Johns Hopkins University. Mr. Rivera holds the following certifications: Cisco Internetwork Expert in Routing and Switching (CCIE-RS), Cisco Internetwork Expert in Security (CCIE-SEC), Certified Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Juniper Network Certified Service Provider Professional (JNCIP-SP ), Juniper Networks Certified Cloud Professional (JNCIP-Cloud), VMWare Certified Data Center Virtualization Professional (VCP-DCV), VMWare Certified Network Virtualization Professional (VCP-NV), ITILv3 and is currently working on his Juniper Networks Certified Service Provider Expert certification (JNCIE-SP) and Microsoft Azure Solutions Architect Expert certification.DR. WILSON is a senior network consulting engineer. He specializes in optimization of routing and in security. He is responsible for assisting customers with resolving complex architectural and operation issues. He holds a bachelor’s degree in mathematics from the University of Colorado. His doctorate is in computer science with a focus on applications of artificial intelligence in information security. He maintains the following certifications: Cisco CCIE Routing and Switching, CCIE Security, all of the CCNP tracks, Cisco DevNet Professional, VMware VCP-NV, Certified Ethical Hacker, CISSP, MCSE, and PMP.CHAPTER 1. PRACTICAL NETWORKING INTRO[The purposes and functions each layer in network communications; discussion of OSI and TCP/IP protocols. How the layers work together and what do they tell us about the layers below.]1.1 OSI Model1.2 Physical layer1.3 Data Link layer1.4 Network layer1.5 Transport layer1.6 Session layer1.7 Presentation layer1.8 Application layer1.9 TCP/IP Protocol1.10 Port Numbers - (List common enterprise port numbers)1.11 Types of Communications - Broadcast, Unicast, Multicast and Anycast1.12 Types of Networks1.13 Network Architectures1.14 Intro and use case for software define networking1.15 SummaryCHAPTER 2. THE PHYSICAL MEDIUM[Practical considerations and troubleshooting when establishing a physical medium for network communications. Common problems at the physical layer.]2.1 Physical medium2.2 Standards2.3 Cables2.4 Ethernet2.5 Negotiation2.6 Duplex2.7 Unidirectional Link Detection (UDLD)2.8 Common issues2.9 SummaryCHAPTER 3. PROTOCOLS AND THE DATA LINK LAYER[The idea of protocols and their use, functions of the data link layer using IEEE 802.3 and switching. What the data link tells about the physical medium state and the higher layer protocols.]3.1 Protocols -- Ethernet, MPLS, LLDP, CDP, Spanning Tree, LACP, DOT1Q,3.2 Link layer functions3.3 Link layer discovery protocol3.4 Link layer related to other layers3.5 Types of messages3.6 SummaryCHAPTER 4. THE NETWORK LAYER[The concept of routing, which protocol transmissions are routable and IP addressing, including architecture requirements for IPv4 and IPv6 networks; subnetting. Observing the protocol layer transitions with packet captures]4.1 IP Communication Types - Broadcast, Multicast, Unicast, Anycast4.2 IP Addressing (Public vs Private) Bogons and Martians4.3 CIDR4.4 IPv44.5 IPv64.6 Subnetting4.7 Subnetting exercises4.8 SummaryCHAPTER 5. INTERMEDIATE LAN SWITCHING[Basic switching concepts, switch operations, common switching helper protocols their use and functions: (Trunking 802.1q, EtherChannels 802.3ad, RSTP 802.1D. Review the purpose of VLANs; their implementation and multilayer devices.]5.1 Switching5.2 LAGs5.3 Spanning Tree and Spanning Tree interop, Spanning Tree Convergence5.4 VLANs5.5 Trunking5.6 VTP5.7 MSTP5.8 Labs; Exercises5.9 SummaryCHAPTER 6. ROUTING[Routing concepts with practical implementation, including static routing and dynamic protocols such as OSPF, BGP, RIP and EIGRP.]6.1 Static routing6.2 Routing protocols6.3 IS-IS6.4 EIGRP6.5 OSFP6.6 BGP6.7 Labs; Exercises6.8 SummaryCHAPTER 7. INTRODUCTION TO TOOLS AND AUTOMATION[Introduction into using tools and automation that will be used in further chapters for different use cases.]7.1 Tools overview7.2 Introduction to prime infrastructure7.3 Introduction to ISE7.4 Introduction to SD-WAN / vManage7.5 Introduction to DNACHAPTER 8. SWITCH AND ROUTER TROUBLESHOOTING (NOTE: NEEDS WORK, ADD MPLS TROUBLESHOOTING.ROUTING TROUBLESHOOTING CAN BE QUIET BIG SHOULD WE BREAK IT DOWN?WE ALSO NEED TO ADD DATA STRUCTURES FOR SWITCHING/ROUTING: MAC TABLE, ARP TABLE, CEF ADJACENCY TABLE, FIB TABLES, RIB TABLE ETC.)[How to troubleshoot and resolve issues with Cisco network devices and Client side tools.]8.1 Techniques8.2 VLANs8.3 Trunking8.4 Routing8.5 Dynamic routing8.6 Spanning tree8.7 EtherChannel8.8 Tools8.9 Labs; Exercises8.10 SummaryCHAPTER 9. NAT/DHCP (ADD A SECTION ON NAT AND IPSEC AND NAT AFFECTED PROTOCOLS)[The purpose of NAT and DCHP and how to configure them on network devices.]9.1 NAT9.2 Static Nat9.3 Dynamic Nat9.4 PAT9.5 DHCP9.6 Setting up router as DHCP server9.7 NAT affected protocols9.8 Labs; Exercises9.9 SummaryCHAPTER 10. MANAGEMENT PLANE[How to administer Cisco devices, including booting, working from rommom, managing cisco images, upgrading the IOS, and configuring syslog and SNMPv3. Also port security, access-lists, password security and ssh, SNMPv3, TACACS, RADIUS, Logging]10.1 Authentication and authorization10.2 SSH10.3 Password recovery10.4 User accounts10.5 Logging10.6 Banners10.7 AAA10.8 Disabling services10.9 IOS switch upgrade10.10 Configuration using prime infrastructure10.11 Introduction to netconf10.12Labs; Exercises10.13 SummaryCHAPTER 11. DATA PLANE[Commons traffic protocols and the applications of filters. Netflow/Sflow]11.1 Traffic protocols11.2 Filters11.3 Netflow/Sflow11.4 Labs; Exercises11.5 SummaryCHAPTER 12. CONTROL PLANE[Securing the protocol exchange, IGP, BGP, DNS and NTP]12.1 Layer 212.2 IGP12.3 BGP12.4 DNS12.5 Protocol independent multicasting12.6 NTP12.7 Managing control plane using tools12.8 Labs; Exercises12.9 SummaryCHAPTER 13. INTRODUCTION TO AVAILABILITY[Redundancy at layer 2 and layer 3: GLBP, VRRP and multilinks. How to VoIP and video configurations; creating high availability and redundancy.]13.1 High availability13.2 HSRP13.3 VRRP13.4 GLBP13.5 SLB13.6 Multilinks13.7 Layer 2 extensions overview13.8 Labs; Exercises13.9 SummaryCHAPTER 14. ADVANCED ROUTING[How to implement multi-area OSPF, eBGP, IPv6 routing, IPv4 route redistribution to static routes, and dynamic routing protocols; layer 3 path control; implementing basic teleworker and branch services, including GRE tunnels]14.1 Route maps14.2 Policy based routing14.3 Redistribution14.4 EIGRP14.5 Multi-area OSPF14.6 BGP14.7 IPv6 routing14.8 GRE tunnels14.9 IPsec VPNs14.10 Labs; Exercises14.11 SummaryCHAPTER 15. QOS[How to implement, manage and optimize QoS in Cisco Networks]15.1 Intro to QoS15.2 Classification and marking15.3 Policing and shaping15.4 QoS in IPv615.5 QoS design strategies15.6 QoS for tunnels and sub-interfaces15.7 Troubleshooting15.8 Labs15.9 SummaryCHAPTER 16. ADVANCED SECURITY[How to implement advanced security solutions, including private VLANs, VACLs and PACLs; implementing port authentication, and Extended ACLs.]16.1 Private VLANs16.2 Dot1x16.3 Extended ACL16.4 VACL16.5 PACL16.6 MAC ACL16.7 DHCP snooping16.8 IDS/IPS16.9 MAC SEC16.10 Compliance16.11 Labs; Exercises16.12 SummaryCHAPTER 17. ADVANCED TROUBLESHOOTING[How to verify advanced routing problems, including EIGRP, OSPF, eBGP, route redistribution, NAT, DHCP, VACLs, PACLs, and IPv6 routing.]17.1 Route redistribution17.2 ACLs17.3 NAT17.4 PACL17.5 Dynamic routing protocols17.6 IPv617.7 IPsec17.8 GRE tunnels17.9 HSRP, VRRP, GLBP17.10 Labs; Exercises17.11 SummaryCHAPTER 18. EFFECTIVE NETWORK MANAGEMENT[Aggregation of data from the control, data and managementplane for effective network and data flow management. Use of logs, SNMP, IDSalerts and Netflow/Sflow]18.1 Logs18.2 SNMP18.3 SLAs and embedded event manager18.4 sFlow/NetFlow18.5 Tools18.6 Labs; Exercises18.7 SummaryCHAPTER 19. DATA CENTER[How to configure VLANs and interswitch communications using a Nexus with NX-OS software; configuring routing on NX-OS software, including OSPF and BGP; port channels and port profiles; configuring the Nexus for Fabric Extender (FEX) support.]19.1 NX-OS19.2 NX-OSv overview19.3 VLAN19.4 VTP19.5 Virtual Route Forwarding (VRF)19.6 EIGRP19.7 OSPF19.8 BGP19.9 Port profiles19.10 Fabric extenders19.11 Fabric design19.12 GLBP19.13 Virtual Port Channel (vPC)19.14Virtual Device Context (VDC)19.15 VXLAN19.16 OTV19.17 ACI overview19.18 Labs; Exercises19.19 SummaryCHAPTER 20. WIRELESS LAN[The basic components of the Cisco Wireless Network architecture; how to install access points and wireless controllers and incorporate them into switches; wireless security, including port authentication, authentication, and encryption.]20.1 Wireless components20.2 Wireless access points20.3 Wireless controllers20.4 Integration with ISE20.5 Cisco prime infrastructure20.6 Security and authentication20.7 Labs; Exercises20.8 SummaryCHAPTER 21. FIREPOWER[The basic components of the Cisco Firepower; how to configure and manage firewalls and Intrusion Prevention and incorporating them into network architectures, including traffic analysis, Packet filtering, NAT, VPNs, Remote Access and device management.]21.1 Testing Policies in a Safe Environment21.2 Baseline network21.3 Access rules21.4 Open services21.5 Anti-Spoofing21.6 Service policies21.7 Cluster21.8 Multi-Context21.9 Virtual21.10 Active/Active21.11 Active/Standby21.12 SGT based ACLs21.13 Routing21.14 VPNs21.15 Labs; Exercises21.16 SummaryCHAPTER 22. NETWORK PENETRATION TESTING[This section will focus on testing the security of your network; performing basic network penetration testing using NMAP, NESSUS, Linux Backtrack and Metasploit tools.]22.1 Reconnaissance and scanning22.2 Vulnerability assessment22.3 Exploitation22.4 Labs22.5 SummaryCHAPTER 23. MPLS[This section will focus on Multiprotocol Label Switching (MPLS) and its implementation in modern networks that is mostly used by enterprises and service providers.]23.1 Intro to MPLS23.2 LDP23.3 MPLS Layer3 VPN23.4 MPLS Layer2 VPN (VPLS)23.5 VRF Lite23.6 IPv6 over MPLS23.7 MPLS troubleshooting23.8 Labs23.9 SummaryCHAPTER 24. DMVPN[This section will focus on the implementation of dynamic multipoint virtual private networks (DMVPN). We will explore implementing DMVPNs with a hub and spoke architecture; using routing protocols and IPsec.]24.1 Intro DMVPN24.2 Phase 124.3 Phase 224.4 Phase 324.5 Flex VPN24.6 DMVPN troubleshooting24.7 Labs24.8 SummaryCHAPTER 25. NETWORK AUTOMATION[This section will focus on using network automation to automate Cisco IOS networks.]25.1 Python25.2 Python APIs25.3 Napalm25.4 Nornir25.5 Labs25.6 Summary

Regulärer Preis: 119,99 €
Produktbild für Samsung Galaxy A52 - alle Modelle

Samsung Galaxy A52 - alle Modelle

Die verständliche Anleitung für Ihr Smartphone:- Alle Funktionen & Einstellungen auf einen Blick- Schritt für Schritt erklärt – mit praktischen TippsMit diesem smarten Praxisbuch gelingt Ihnen der schnelle und sichere Einstieg in Ihr Smartphone. Lernen Sie Ihr Handymodell von Grund auf kennen und beherrschen! Anschauliche Anleitungen, Beispiele und Bilder zeigen Ihnen gut nachvollziehbar, wie Sie Ihr mobiles Gerät optimal handhaben – von der Ersteinrichtung und Personalisierung über die große Funktionsvielfalt bis zu den wichtigsten Anwendungen. Nutzen Sie darüber hinaus die übersichtlichen Spicker-Darstellungen: Damit können Sie jene Bedienungsschritte, die man am häufigsten braucht, aber immer wieder vergisst, auf einen Blick finden und umsetzen. Freuen Sie sich auf viele hilfreiche Tipps und legen Sie ganz einfach los!Aus dem Inhalt:- Alle Bedienelemente des Smartphones auf einen Blick- Ersteinrichtung und Tipps zum Umzug- Google-Konto erstellen und verwalten- Die Benutzeroberfläche Ihres Smartphones personalisieren- Apps aus dem Play Store herunterladen- Kontakte anlegen und im Adressbuch verwalten- Anrufe tätigen und SMS austauschen - Nachrichten über Mail und WhatsApp versenden und empfangen- Uhr, Kalender, Maps und andere praktische Apps nutzen - Fotos sowie Videos aufnehmen, verwalten und teilen- Ins Internet gehen über WLAN und mobile Daten - Updates, Datenschutz und Sicherheit

Regulärer Preis: 9,99 €
Produktbild für Microsoft Excel im Büro

Microsoft Excel im Büro

Der Excel-Intensivkurs für Ausbildung und Beruf mit den besten Tipps & Tricks für effektives Arbeiten.Verzweifeln Sie nicht länger an Excel, nutzen Sie die Tipps und Tricks aus diesem praktischen Ratgeber. Über 100 Kniffe und Workflows helfen Ihnen dabei, Ihre Excel-Aufgaben schneller und effizienter zu bewältigen. Die Office-Profis Mareile Heiting und Carsten Thiele haben tief in ihrer Trickkiste gegraben und stellen Ihnen hier zahlreiche Methoden vor, die sich in ihrer langjährigen Excel-Praxis bewährt haben. Nutzen Sie die Tools zur Analyse und Visualisierung Ihrer Daten, setzen Sie Formeln geschickt ein, und sparen Sie mit Makros jede Menge Zeit!Aus dem InhaltZwei- und dreidimensionale Tabellen erstellenZellbezüge gekonnt einsetzenGruppierungen und Ansichten geschickt nutzenDaten importieren und Datenbanken erstellenFormeln und Text kombinierenWas-wäre-wenn-Analysen durchführenDaten filtern und visualisierenDaten freigeben und schützenTabellen richtig ausdruckenPassende Dateiformate für ArbeitsmappenMakros erzeugen leicht gemachtBeispiele für eine individuelle Programmierung in ExcelLeseprobe (PDF-Link)

Regulärer Preis: 19,90 €
Produktbild für SAP Solution Manager

SAP Solution Manager

Mit diesem Buch lernen Sie alle Funktionen von SAP Solution Manager 7.2 SPS11 in praktischen Anleitungen kennen. Das Autorenteam zeigt Ihnen, wie Sie die verschiedenen Werkzeuge einrichten und anwenden, z.B. Change Request Management, Projektmanagement, Focused Build und die Test-Suite. Nicht zuletzt erfahren Sie, wie der SAP Solution Manager Sie in allen Phasen eines SAP-S/4HANA-Projekts unterstützt. Aus dem Inhalt: GrundkonfigurationNeue FunktionenProzessmanagement und LösungsdokumentationIT-ServicemanagementProjektmanagementAnforderungsmanagementChange Control ManagementTest-SuiteTechnischer und fachlicher BetriebCustom Code ManagementFocused Build, Focused Run und Focused InsightsMigration nach SAP S/4HANA   Vorwort ... 19   Einleitung ... 21   1.  SAP Solution Manager 7.2 - Funktionsüberblick ... 27        1.1 ... Einsatzmöglichkeiten des SAP Solution Managers ... 27        1.2 ... ITIL mit dem SAP Solution Manager ... 28        1.3 ... Die wichtigsten Neuerungen in SAP Solution Manager 7.2 SPS05 bis SPS11 ... 32        1.4 ... Erste Schritte mit SAP Solution Manager 7.2 in der SAP Cloud Appliance Library ... 36        1.5 ... Einführungsmethode der nächsten Generation - SAP Activate ... 40        1.6 ... Offen für alles - neue APIs ... 40        1.7 ... Nutzungsrechte für Kunden ... 41   2.  Grundkonfiguration ... 43        2.1 ... Wichtige Informationen und SAP-Hinweise zur Grundkonfiguration ... 44        2.2 ... Obligatorische Konfigurationsaufgaben ... 45        2.3 ... Verwaltete Systeme konfigurieren ... 66        2.4 ... Grundkonfiguration der Embedded Search ... 76        2.5 ... Benutzer mit der Benutzerverwaltung anlegen ... 78   3.  Prozessmanagement ... 81        3.1 ... Grundlegende Begriffe und Konzepte ... 83        3.2 ... Voraussetzungen für die Nutzung des Prozessmanagements ... 91        3.3 ... Lösungsverwaltung ... 96        3.4 ... Lösungsdokumentation ... 116        3.5 ... Deployments ... 152        3.6 ... Integration in andere Bereiche des SAP Solution Managers ... 156        3.7 ... SAP Best Practices für die Lösungsdokumentation ... 162   4.  IT-Servicemanagement ... 165        4.1 ... Benutzeroberflächen des IT-Servicemanagements ... 165        4.2 ... Grundvoraussetzungen für den Einsatz des IT-Servicemanagements ... 181        4.3 ... Zentrale Funktionen des IT-Servicemanagements ... 197        4.4 ... Prozesse im IT-Servicemanagement ... 232        4.5 ... Focused-Build-Erweiterung »einfache IT-Anforderung« ... 257        4.6 ... Kundenbericht: Erweiterungen für das ITSM und ChaRM bei der bonprix Handelsgesellschaft mbH ... 265   5.  Projektmanagement ... 271        5.1 ... Einführung in das IT-Portfolio- und Projektmanagement ... 272        5.2 ... Voraussetzungen für den Einsatz des IT-Projektmanagements ... 274        5.3 ... Projektarten ... 281        5.4 ... Projekte verwalten ... 282        5.5 ... Projektanalyse und Dashboards ... 304        5.6 ... Integration von IT-PPM und SAP Solution Manager ... 308        5.7 ... SAP-Roadmaps ... 313   6.  Anforderungsmanagement ... 315        6.1 ... Wichtige Begriffe im Kontext des Anforderungsmanagements ... 315        6.2 ... Grundkonfiguration des Anforderungsmanagements ... 317        6.3 ... Funktionen des Anforderungsmanagements ... 327        6.4 ... SAP-Fiori-Applikation »Meine Geschäftsanforderungen« ... 346   7.  Change Control Management ... 351        7.1 ... Einordnung von Change Request Management und Quality Gate Management ... 352        7.2 ... Grundvoraussetzungen für den Einsatz von Change Request Management und Quality Gate Management ... 354        7.3 ... Quality Gate Management ... 381        7.4 ... Verfügbare Transportmanagementinfrastruktur ... 389        7.5 ... Transportbezogene Prüfungen ... 396        7.6 ... Nützliche Funktionen für duale Systemlandschaften ... 413        7.7 ... Transportanalyse und Änderungsdiagnose ... 422   8.  Change Request Management ... 429        8.1 ... Architektur des Change Request Managements ... 429        8.2 ... Änderungszyklen ... 434        8.3 ... Aufgabenpläne ... 448        8.4 ... Änderungsantrag ... 450        8.5 ... Änderungsdokumente ... 456        8.6 ... Nützliche Funktionen im Change Request Management ... 489        8.7 ... Integration des Change Request Managements mit anderen SAP-Solution-Manager-Szenarien ... 503   9.  Test-Suite ... 511        9.1 ... Die Test-Suite im Überblick ... 512        9.2 ... Grundkonfiguration der Test-Suite ... 514        9.3 ... Der Testprozess ... 526        9.4 ... Testautomatisierung ... 557        9.5 ... Änderungseinflussanalyse ... 571 10.  Technischer Betrieb ... 591        10.1 ... Einheitliche User Experience für das Monitoring ... 592        10.2 ... Berechtigungen im Umfeld des technischen Betriebs ... 595        10.3 ... Architektur der Monitoring and Alerting Infrastructure ... 596        10.4 ... Technisches Monitoring ... 606        10.5 ... Integrations-Monitoring ... 636        10.6 ... Monitoring von SAP HANA und Business-Intelligence-Lösungen ... 645        10.7 ... Ausnahmenverwaltung ... 647        10.8 ... SAP EarlyWatch Alert ... 650        10.9 ... Technische Administration ... 652        10.10 ... Konfigurationsvalidierung ... 665        10.11 ... Ursachenanalyse ... 673        10.12 ... Monitoring-Dashboards ... 675        10.13 ... Kundenbericht: System Monitoring bei der s.Oliver Bernd Freier GmbH & Co.KG ... 678 11.  Fachlicher Betrieb ... 683        11.1 ... Was wir unter dem Begriff »Business Process Operations« verstehen ... 684        11.2 ... Voraussetzungen für die Nutzung von Business-Process-Operations-Anwendungen ... 685        11.3 ... Geschäftsprozess-Monitoring ... 689        11.4 ... Geschäftsprozessoptimierung ... 704        11.5 ... Jobverwaltung ... 715        11.6 ... Datenkonsistenzmanagement ... 724        11.7 ... Perfomanceoptimierung für Geschäftsprozesse ... 733        11.8 ... Anwendungsbeispiel: IDoc-Monitoring ... 734        11.9 ... Kundenbericht: Geschäftsprozess-Monitoring bei der Otto Group ... 736 12.  Verwaltung kundeneigener Entwicklungen ... 745        12.1 ... Einführung in das Custom Code Lifecycle Management ... 745        12.2 ... Grundvoraussetzungen für den Einsatz des Custom Code Lifecycle Managements ... 747        12.3 ... Stadtmodell ... 754        12.4 ... Bibliothek für kundeneigene Entwicklungen ... 756        12.5 ... Qualitäts-Cockpit ... 760        12.6 ... Stilllegungs-Cockpit ... 765        12.7 ... SAP-BW-Reporting ... 772        12.8 ... Dashboard für die Verwaltung kundeneigener Entwicklungen ... 774        12.9 ... Custom Code Analytics ... 776        12.10 ... Kundenbericht: Vorbereitung auf SAP S/4HANA bei den Wuppertaler Stadtwerken ... 778 13.  Focused Solutions ... 783        13.1 ... Focused Build ... 783        13.2 ... Focused Insights ... 841        13.3 ... SAP Focused Run ... 863 14.  SAP Solution Manager und SAP S/4HANA ... 871        14.1 ... Phase »Discover« ... 873        14.2 ... Phase »Prepare« ... 876        14.3 ... Phase »Explore« ... 878        14.4 ... Phasen »Realize« und »Deploy« ... 880        14.5 ... Phase »Run« ... 882 15.  Weitere Funktionen ... 885        15.1 ... Datenvolumenmanagement ... 885        15.2 ... SAP-Engagement und Servicelieferung ... 896        15.3 ... Systemempfehlungen ... 899        15.4 ... TREX ... 902   Das Autorenteam ... 905   Index ... 909

Regulärer Preis: 89,90 €