Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Azure Kubernetes Services with Microservices

Azure Kubernetes Services with Microservices

Design and implement scalable microservices using Azure Kubernetes Services (AKS) and other Azure Services. This book will help you understand why and when to choose microservices as a solution for modernization and how to use Azure DevOps to implement CI/CD for deploying microservices.The book starts with an introduction to the evolution to microservices and AKS along with its components. You will learn design patterns to implement microservices on AKS and understand Kubernetes as a container orchestration platform. You will go through the common errors faced in AKS-based applications and ways to handle them. You will learn error handling tips and tricks and how to design for business continuity and disaster recovery. The book discusses things you should know related to security and monitoring when working with AKS-based applications. The book presents a practical approach to set up processes for CI/CD, such as building Build and release pipelines for AKS deployment using Azure DevOps.After reading this book, you will understand design considerations for designing scalable microservices and know how to implement the design through AKS.WHAT YOU WILL LEARN* Know design patterns for microservices and how to handle failure scenarios* Be aware of architecture and design considerations* Understand container and Kubernetes architecture components* Understand security and monitoring aspects* Take a practical approach to continuous integration and continuous deliveryWHO THIS BOOK IS FORIT professionals associated with cloud computing, especially with Microsoft AzureKASAM SHAIKH is an Azure AI enthusiast, published author, global speaker, community MVP, and Microsoft Docs Contributor. He has more than 14 years of experience in the IT industry and is a regular speaker at various meetups, online communities, and international conferences on Azure and AI. He is currently working as Senior Cloud Architect for a multi-national firm where he leads multiple programs in the Practice for Microsoft Cloud Platform and Low Code. He is also a founder of the community named DearAzure-Azure INDIA (az-India) and leads the community for learning Microsoft Azure. He owns a YouTube channel and website and shares his experience over his website https://www.kasamshaikh.comSHAILESH AGASKAR has 20+ years of experience in information technology. For the last 20 years, he has been working on Microsoft technologies such as Win32 SDK using C, C++, Office 365, Azure Data Engineering & Analytics powered by Azure Cloud Platform. He has been advising customers across the globe and helping them leverage best fit technologies to drive their enterprise digital transformation journey. Microsoft Platforms & Technologies is one of the options which has been heavily leveraged by his customers. He is currently working as Chief Architect for a multi-national firm where he heads the Practice for Microsoft Cloud Platform, M365, and other technologies.CHAPTER 1: A QUICK HANDSHAKE WITH MICROSERVICES & AKSCHAPTER GOAL: This Chapter will present an overview of Microservices and AKS. This will detail down the What, Why, When for using this Architecture and Service. How they are related to each other and merits on coupling these two entities.NO OF PAGES 30 -40SUB -TOPICS1. Introduction to Microservices2. Monolith vs Microservices3. Introduction to Cloud Native4. How does Business benefit from Cloud Native Applications.5. Introduction to AKS and its componentsCHAPTER 2: ARCHITECTURE & DESIGNING CONSIDERATIONCHAPTER GOAL: This chapter will involve points to be considered while Architectural & designing Microservices with AKS based applications. Must consideration checklist, and points to be remembered while brainstorming on making designing decisions.NO OF PAGES: 30 - 40SUB - TOPICS1. Introduction to Microservices design patterns2. Design patterns to implement Microservices on AKS3. What are Containers4. Kubernetes as a container orchestration platform5. Sample application to drive the design best practices of Microservices and AKSCHAPTER 3: DEALING WITH COMMON FAILURESCHAPTER GOAL: This Chapter will help in detailing common errors faced in AKS based applications and ways to handle the same. This will cover the error handling tips & tricks.NO OF PAGES : 30 - 40SUB - TOPICS:1. Failure scenarios and how to handle them e.g. Handling node failures2. Common failures and building resiliency in Microservices using AKS and other Azure Services.3. high availability and deployment scenarios to ensure always available microservices using Azure services.4. How to design for business continuity and disaster recoveryCHAPTER 4: SECURING YOUR AKS WORKLOADSCHAPTER GOAL: This Chapter deals with setting up and configuring AKS workloads with Security aspects. Steps to keep the AKS application secure.NO OF PAGES: 30 - 40SUB - TOPICS:1. Security best practices for microservices and how to leverage AKS2. Role based access control in AKS and how to design .3. Azure Active Directory pod- managed identities3. Leverage of Azure Key Vaults and Network Security in AKS4. Azure Security Center leverage for AKSCHAPTER 5: MONITORING AKS BASED APPLICATIONChapter Goal: This Chapter will detail all required commands used for debugging and Monitoring ASK based applications. Configuring Metrics and Diagnostics for AKS.NO OF PAGES: 30 - 40SUB - TOPICS:1. Monitoring AKS cluster and microservices2. Ready and Alive probes and how to implement them3. Health and Diagnostics Metric for the Microservices and AKS4. Pod Consumption metrics and thresholds managementCHAPTER 6: CI/CD FOR AKSCHAPTER GOAL: This chapter will present with Setup process for CI/CD, like building Build, release pipelines for AKS deployment using Azure and GitHub.NO OF PAGES: 30 - 40SUB - TOPICS:1. Azure DevOps setup Microservices deployment2.CI/CD process for containers and kubernetes3. Setup of CI/CD pipelines and promotion to various environments4. Overview of testing integration.

Regulärer Preis: 66,99 €
Produktbild für Practical C++ Design

Practical C++ Design

Go from competent C++ developer to skilled designer or architect using this book as your personal C++ design master class. Updated for the C++20 standard, this title will guide you through the design and implementation of an engaging case study that forms the backdrop for learning the art of applying design patterns and modern C++ techniques to create a high quality, robust application.Starting with a quick exploration of the requirements for building the application, you'll delve into selecting an appropriate architecture, eventually designing and implementing all of the necessary modules to meet the project’s requirements. By the conclusion of Practical C++ Design, you'll have constructed a fully functioning calculator capable of building and executing on any platform that supports both Qt and C++20. Access to the complete source code will help speed your learning.Utilize the Model-View-Controller pattern as the basis for the architecture of the calculator; the observer pattern to design an event system; the singleton pattern as you design the calculator’s central data repository, a reusable stack; the command pattern to design a command system supporting unlimited undo/redo; the abstract factory pattern to build a cross-platform plugin infrastructure for extensibility; coroutines to implement a command line interface with a lazy tokenizer; and more.After reading and using this book, you’ll have begun the transition from C++ programmer to architect.WHAT YOU WILL LEARN* Read a specification document and translate it into a practical C++ design using some of the latest language features from C++20* Understand trade-offs in selecting between alternative design scenarios* Gain practical experience in applying design patterns to realistic development scenarios* Learn how to effectively use language elements of modern C++ to create a lasting design* Develop a complete C++ program from a blank canvas through to a fully functioning, cross platform application* Read, modify, and extend existing, high quality code* Learn the fundamentals of API design, including class, module, and plugin interfacesWHO THIS BOOK IS FORThe experienced C++ developer ready to take the next step to becoming a skilled C++ designer.ADAM B. SINGER graduated first in his class at the Georgia Institute of Technology in 1999 with a bachelors degree in chemical engineering. He subsequently attended the Massachusetts Institute of Technology on a National Defense, Science, and Engineering Graduate Fellowship. He graduated from MIT with a Ph.D. in chemical engineering in 2004 after defending his thesis titled Global Dynamic Optimization. Since graduation, Adam has been a member of the research and engineering staff at an oil and gas major, where he has worked in software development, design, and project management in areas such as optimization, reservoir simulation, decision support under uncertainty, basin modeling, well log modeling, and stratigraphy. He has also served on and chaired committees designing in-house training in the areas of technical software development and computational and applied mathematics. He currently holds a research supervisory position. Adam additionally held the title of adjunct assistant professor in the Department of Computational and Applied Mathematics at Rice University from 2007-2012. In both 2006 and 2007, he taught a graduate level course, CAAM 520, on computational science. The course focused on the design and implementation of high performance parallel programs.Preface (5 pages)The preface details my motivation for writing the book, the target audience for the book, thegeneral structure of the book, and how to contact the author. Of particular importance is therationale behind choosing the case study, the target language (C++), and the GUI toolkit (Qt).Chapter 1: Defining the Case Study (6 pages)The first chapter describes, in detail, the case study to be examine in the book. The chapterdiscusses requirements in the abstract and then transitions to the calculator’s specific requirements.This sets the stage for the remainder of the book, which describes, in detail, the design andimplementation of the calculator, pdCalc, proposed in Chapter 1.1. A Brief Introduction2. A Few Words About Requirements3. Reverse Polish Notation (RPN)4. The Calculator’s Requirements5. The Source Code1The advice, information, and conclusions discussed in this book are those of the author and have not beenendorsed by, or reflect the opinions or practices of, ExxonMobil Corporation or its affiliates.5Chapter 2: Decomposition (18 pages)In this chapter, I explain the elements of a good decomposition and strategies for decomposing aproblem into manageable pieces. Subsequently, an architecture for pdCalc is selected, the calculatoris modularized, and use cases are used to develop interfaces for the high level calculator modules.The four high level modules are the stack, the command dispatcher, the user interface (subdividedinto a command line interface and a graphic user interface), and a plugin manager.1. The Elements of a Good Decomposition2. Selecting An Architecture3. Interfaces4. Assessment of Our Current Design5. Next StepsChapter 3: The Stack (20 pages)The stack is the first module discussed in detail. The stack is the fundamental data repositoryof the calculator. As part of the calculator’s design and implementation, the singleton pattern isexplored. The stack also affords the first opportunity to discuss an event system for the calculator,which provides a backdrop for exploration of the observer pattern, including the design andimplementation of reusable publisher and observer abstract classes.1. Decomposition of the Stack Module2. The Stack Class3. Adding Events4. A Quick Note on TestingChapter 4: The Command Dispatcher (32 pages)This chapter describes the design and implementation of the command dispatcher, the module ofthe calculator responsible for the creation, storage, and execution of commands. Of particular notein this chapter is the exposition on the command pattern and how it can be used to implement apractical undo/redo framework. In addition to exploring a traditional deep hierarchy method forimplementing commands, a C++11 alternative using lambda expressions and the standard functiontemplate are presented as a modern alternative design.1. The Decomposition of the Command Dispatcher2. The Command Class3. The Command Repository4. The Command Manager5. The Command Dispatcher6. Revisiting Earlier Decisions6Chapter 5: The Command Line Interface (14 pages)This chapter marks an important milestone, the creation of the first user executable program.In addition to building a simple command line interface, we’ll explore how to create an abstractsoftware interface suitable for both a command line interface and a graphical user interface. Withinthe context of the command line interface, we’ll learn techniques for simple parsing and tokenizingof input text streams.1. The User Interface Abstraction2. The Concrete CLI Class3. Tying It Together: A Working ProgramChapter 6: The Graphical User Interface (24 pages)In this chapter, we build the Qt-based graphical user interface for the calculator. Here, we’llexamine different strategies for building GUIs, abstraction of GUI elements, and modularization ofthe overall GUI design. Included in the discussion is design for the separation of on-screen widgetsfrom look-and-feel.1. Requirements2. Building GUIs3. Modularization4. A Working Program5. A Microsoft Windows Build NoteChapter 7: Plugins (38 pages)In this chapter, I describe how to build a cross-platform plugin system. This system includes theabstract interface for C++ plugins as well as the operating system specific mechanics involved withloading plugins and executing plugin functions. In the concrete case of the plugin loader, I explainthe many build tricks that can be used to handle cross-platform code and demonstrate how theabstract factory pattern provides an elegant design solution to this problem.1. What Is a Plugin?2. Problem 1: The Plugin Interface3. Problem 2: Loading Plugins4. Problem 3: Retrofitting pdCalc5. Incorporating Plugins6. A Concrete Plugin7. Next Steps7Chapter 8: New Requirements (24 pages)Any developer who has ever worked on a production software project quickly learns that newrequirements are always added late in the development cycle. In this chapter, we explore theaddition of new user requests after the original requirements have already been satisfied. Thediscussion progresses from fully implemented solutions to design only solutions to vague ideas forthe reader to explore on her own.1. Fully Designed New Features2. Designs Toward a More Useful Calculator3. Some Interesting Extensions for Self-ExplorationAppendix A: Acquiring, Building, and Executing pdCalc (4 pages)This appendix explains how to download the source code from GitHub and how to build the casestudy on Linux and Windows. Once the program is built, readers will want to execute the codeand its included test suite; execution instructions are therefore provided.1. Getting The Source Code2. Dependencies3. Building pdCalc4. Executing pdCalcAppendix B: Organization of the Source Code (6 pages)This appendix simply explains the organization of the source tree for pdCalc. This appendix isuseful for finding the locations for the source files referenced in the text.1. The src Directory2. The test DirectoryReferences (2 pages)This section lists twenty-nine references cited in the book.Index (3 pages)This section is a complete index for the book.

Regulärer Preis: 46,99 €
Produktbild für Hands-On Guide to AgileOps

Hands-On Guide to AgileOps

Discover the best practices for transforming cloud and infrastructure operations by using Agile, Scrum, Kanban, Scrumban and Spotify models. This book will help you gain an in-depth understanding of these processes so that you can apply them to your own work.The book begins by offering an overview of current processes and methods used in IT Operations using ITIL and IT4IT. The Authors provide a background of the Agile, Scrum, Kanban, SaFe, Scrumban, and Spotify models used in software development. You’ll then gain in-depth guidance and best practices to implement Agile in the Operations world. You’ll see how Agile, Site Reliability Engineering and DevOps work in tandem to provide the foundation for modern day infrastructure and cloud operations. The book also offers a comparison of various agile processes and their suitability to the infrastructure and cloud operations world.After completing this is hands-on guide, you’ll know how to adopt Agile, DevOps and SRE and select the most suitable processes for your organization to achieve higher reliability, agility and lower costs while running cloud and infrastructure operations.WHAT YOU WILL LEARN* Understand how cloud computing and microservices architecture are changing operations dynamics* Understand ITIL, IT4IT, and Lean* Learn how Site Reliability Engineering, Agile and DevOps work in tandem* Leverage Agile, Scrum, Kanban, Scrumban, and Spotify models to run cloud operations* Use Site Reliability techniques along with Agile and DevOps* Study the different agile frameworks (Spotify, SAFe, LeSS, DAD, Nexus), their purpose, benefits and implementation approaches.* Learn a step-by-step process to identify and implement these frameworks in your organizationWHO THIS BOOK IS FORInfrastructure architects, DevOps architects, Agile practitioners, DevSecOps Experts, Product Managers/Scrum Masters, DevOps Engineers.NAVIN SABHAWAL, currently is the Chief Architect and Head of Strategy for Autonomics, named ‘DRYiCE’ at HCL Technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL Technologies.He is an innovator, thought leader, author and a consultant in areas of AI and Machine Learning, Cloud Computing, Big Data Analytics, Software Product Development, Engineering and R&D. He is responsible for IP Development & Service Delivery in the Areas of AI and Machine Learning, Automation products, Cloud Computing, Public Cloud AWS, Microsoft Azure, VMWare Private Cloud, Microsoft Private Cloud, Data Center Automation, Analytics for IT Operations, IT Service Management.RAMINDER RATHORE , an enthusiastic IT Practitioner with close to about two decades of work experience ranging from research and development to product management, to enabling organizations towards digitalization through agile ways of working. She currently leads the DevOps Centre of Excellence (CoE) at HCL Technologies, Canada.She holds a Master’s degree in Computer Science and is certified in a couple of areas on IBM Rational tools, Microsoft Azure, Scrum and ITIL methodologies. She started her career as a developer and progressed into product lifecycle management and consulting. She has been driving enterprise transformative programs on Automation (CI/CD), Cloud and DevOps for multiple customers. She has strong expertise in analyzing ecosystems, designing transformation roadmaps with milestones, building, and implementing accelerators / tools that drive end to end product traceability with agility and resiliency.UDITA AGRAWAL , an agile and automation transformation expert with over seventeen years of work experience, working with HCL Technologies. She holds a Master's degree in Business Administration in Information Technology and is also a PMP certified professional. She has wide experience in managing and leading engagements across different domains that includes Java, Data science and Automation. She is a passionate consultant running digital transformation programs for various customers. She also delivers enablement sessions on Agile and DevOps and works closely with product teams to practice agile methods. She also runs workshops on planning and implementing automated pipelines using various tools that includes COTS and open-source tools.Chapter 1: IntroductionCHAPTER GOAL: UNDERSTANDING THE AGILE JOURNEY AND THE NEED TO BRIDGE DEVELOPMENT AND OPERATIONS AREANO OF PAGES 17SUB -TOPICS1. Agile History2. Evolving software teams3. Bridging the gap4. Complementing Agile5. Agile in InfraOps6. Agile ManifestoChapter 2: Traditional Infrastructure OperationsCHAPTER GOAL: QUICK BRIEF ON TRADITIONAL ITSM APPROACH AND THE NEED TO TRANSITION TO AGILE OPERATIONS.No of pages: 20SUB - TOPICS1. ITSM and its phase2. Drawbacks3. Need to changeChapter 3: Agile and DevOpsCHAPTER GOAL: INTRODUCE CORE CONCEPTS TO AGILE AND DEVOPS AND UNDERSTAND ITS RELEVANCE IN THE PRODUCT LIFECYCLE.NO OF PAGES : 13SUB - TOPICS:1. When to adopt Agile2. Agile principles and values3. Scaling Agile with DevOps4. When to adopt DevOps5. DevOps in product lifecycleChapter 4: Factors leading to Agile OperationsCHAPTER GOAL: GET TO LEARN THE FACTORS THAT ARE MOTIVATING ORGANIZATIONS TO TRANSITION THEIR INFRASTRUCTURE OPERATIONS TO AGILE OPERATIONSNO OF PAGES: 29SUB - TOPICS:1.Shift towards Agile2.Benefits with Agility3.Cloud Computing4. Microservices5. Deployment patterns6. Shift left testing7. Changes in architectureChapter 5: Introduction to Agile MethodsCHAPTER GOAL: Introduce agile methods, roles, ceremonies and best practicesNO OF PAGES: 40SUB - TOPICS:1. Scrum2. Kanban3. ScrumbanChapter 6: Introduction to Agile FrameworksChapter Goal: INTRODUCE AGILE FRAMEWORKS, ROLES, AND STUDY THEIR COMPARISON.NO. OF PAGES : 47SUB - TOPICS:1. Agile ITSM2. IT4IT3. Lean IT4. SAFe5. Spotify6. LeSS7. Nexus8. DAD9. Site Reliability EngineeringChapter 7: Using Agile for Infrastructure OperationsCHAPTER GOAL:WITH THE BASIC UNDERSTANDING ON AGILE, THIS CHAPTER FOCUSES ON THE STRATEGY FOR ADOPTING AGILE IN INFRASTRUCTURE OPERATIONS SPACE.NO. OF PAGES : 22SUB - TOPICS:1. Adopting the right agile method2. Identify the right tools3. Upskill teams4. Redefine roles and responsibilities5. Continuously monitoring team performance6. Pilot-Expand-SustainChapter 8: Infrastructure as CodeCHAPTER GOAL:LEARN HOW TO LEVERAGE AGILE METHODS WHILE IMPLEMENTING INFRASTRUCTURE AS CODE PIPELINES AND EXTEND ITS INTEGRATION WITH DEVELOPMENT PIPELINES.NO. OF PAGES : 21SUB - TOPICS:1. Getting started with Scrum2. Estimating stories3. Defining acceptance criteria4. Integrating IaC with development pipelines5. IaC ExampleChapter 9: Success PathCHAPTER GOAL:THIS CHAPTER SHARES THE JOURNEY OF AN IMAGINARY COMPANY ON HOW THEY TRANSITION INTO AGILE OPS WITH A WELL-DEFINED TRANSFORMATION MAP AND MILESTONES.NO. OF PAGES : 7SUB - TOPICS:1. Enterprise Alpha2. New operating model3. OutcomesChapter 10: Learnings and Way forwardCHAPTER GOAL:AS ORGANIZATIONS ADOPT AGILE, THEY ALSO NEED TO PLAN FOR THE TRENDING TECHNOLOGIES THAT WILL BENEFIT THEM. THIS LAST CHAPTER SUMMARIZES THE LEARNINGS FROM THE EARLIER CHAPTERS AND SHARES UPCOMING TRENDS AND NEXT STEPS TO CONSIDER.NO. OF PAGES : 6SUB - TOPICS:1. Our Learnings2. Emerging Trends3. Next Steps

Regulärer Preis: 62,99 €
Produktbild für Navigating Hyperspace

Navigating Hyperspace

Like a hurricane that exposes the underlying bedrock--and an occasional hidden treasure--by washing away the accumulated grains of sand, the pandemic blew away the accumulated certainties and securities of the globally connected, digitized society. Suddenly, nothing can be taken for granted: visiting ailing relatives, shopping--or going to church. The internet and, particularly, social networking sites have become the indispensable infrastructure holding our sociability together. The global companies of the digital economy profited handsomely. How about the users of their services? This volume explores how priests inhabit the digital environment of social networking sites, specifically Facebook. The authors looked at how they present themselves, what they publish, and how people engage with this content. The context of the pandemic suggested that we should also examine how digital technology and social media are being used for purposes of priestly ministry. Our hope is that these analyses and considerations will help not just priests but every person at becoming proficient not only in things virtual but also in practicing virtue. Peter Lah is a Jesuit priest and associate professor at the Faculty of Social Sciences, Pontifical Gregorian University, in Rome. He teaches courses in communication and media studies, focusing on media literacy, ICT regulation, and media ethics. Since 2016, he has been summer director at the Monte Santo di Lussari–Svete Višarje pilgrimage site in Italy.

Regulärer Preis: 26,99 €
Produktbild für #Myprivacy #Myright

#Myprivacy #Myright

If you ever thought you could run away into the wilderness without being noticed, think again. Right from the time you get up in the morning, picking up your mobile devices, wearing your fitness tracker, and every aspect of your life is connected to an unknown world—a world that decides whether you are noteworthy or play worthy of being tracked. A common man is caught up in a world that is intertwined between your private life, gains of the government through surveillance capitalism and the law of the internet and dark web. This book takes you through a journey that looks at various privacy aspects of your private life and unusual case laws. Laws that have challenged the courts to think beyond the traditional line of thinking. They have also influenced the media who are looking for juicy scoops to make stories more enticing for their viewership/ readership. It further dwells into the idea of Artificial Intelligence, and it will make things even more invasive with the unknown sources and data of an individual that is out there. Finally, the book attempts to answer the question of what should individuals do if they are caught up in a storm of data breaches.Remember, once the information is out on the internet, it is virtually impossible to redact it back.

Regulärer Preis: 4,49 €
Produktbild für Building an Effective Data Science Practice

Building an Effective Data Science Practice

Gain a deep understanding of data science and the thought process needed to solve problems in that field using the required techniques, technologies and skills that go into forming an interdisciplinary team. This book will enable you to set up an effective team of engineers, data scientists, analysts, and other stakeholders that can collaborate effectively on crucial aspects such as problem formulation, execution of experiments, and model performance evaluation.You’ll start by delving into the fundamentals of data science – classes of data science problems, data science techniques and their applications – and gradually build up to building a professional reference operating model for a data science function in an organization. This operating model covers the roles and skills required in a team, the techniques and technologies they use, and the best practices typically followed in executing data science projects.Building an Effective Data Science Practice provides a common base of reference knowledge and solutions, and addresses the kinds of challenges that arise to ensure your data science team is both productive and aligned with the business goals from the very start. Reinforced with real examples, this book allows you to confidently determine the strategic answers to effectively align your business goals with the operations of the data science practice.WHAT YOU’LL LEARN* Transform business objectives into concrete problems that can be solved using data science* Evaluate how problems and the specifics of a business drive the techniques and model evaluation guidelines used in a project* Build and operate an effective interdisciplinary data science team within an organization* Evaluating the progress of the team towards the business RoI* Understand the important regulatory aspects that are applicable to a data science practice WHO THIS BOOK IS FORTechnology leaders, data scientists, and project managersVineet is a Chief Data Scientist at GS Lab, India, and has led the effort of setting up a Data Science group at GS Lab which has now successfully executed Data Science projects in diverse fields like healthcare, IoT, communication, etc. He has also led research projects - in Computer Vision and Demand Forecasting, and developed new Data Science algorithms/techniques in areas like model performance tuning.Vineet is a computer science engineer from Pune university with a master’s degree from BITS Pilani. For most of his 17-year professional career, he has been associated with Data Science projects and has 2 US patents in his name. Prior to joining GS Lab, he worked at SAS for 7 years building data science products. He has presented papers in global conferences and has given talks in colleges on topics related to Data Science. He has also been associated with universities for research projects in the field of Data Science.Srinath is a Principal Architect at GS Lab, India. His key responsibility has been to bootstrap, and now to lead, the Data Science capability in GS Lab. A TOGAF9-certified architect, Srinath specializes in aligning business goals to the technical roadmap and data strategy for his clients. His typical clients are software technology companies that depend on data science, or enterprises looking to leverage data science as part of their digitalization programs.Srinath is a computer-science graduate from Pune University. During his 17 years of professional experience, he has primarily worked on data mining, predictive modeling, and analytics in varied areas such as CRM (retail/finance), life-sciences, healthcare, video conferencing, industrial-IoT and smart cities.Part One: Fundamentals1. Introduction: The Data Science Process2. Data Science and your business3. Monks vs. Cowboys: Data Science CulturesPart Two: Classes of Problems4. Classification5. Regression6. Natural Language Processing7. Clustering8. Anomaly Detection9. Recommendations10. Computer Vision11. Sequential Decision MakingPart Three: Techniques & Technologies12. Overview13. Data Capture14. Data Preparation15. Data Visualization16. Machine Learning17. Inference18. Other tools and services19. Reference Architecture20. Monks vs. Cowboys: PraxisPart Four: Building Teams and Executing Projects21. The Skills Framework22. Building and structuring the team23. Data Science ProjectsAppendix FAQs

Regulärer Preis: 56,99 €
Produktbild für Windows 10 Troubleshooting

Windows 10 Troubleshooting

Troubleshoot Windows 10 the way the experts do, whatever device or form factor you are using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, solution, and tools required.Windows 10 is constantly evolving and changing and a great many aspects of the operating system, including many associated with troubleshooting and repair, have been changed, removed, replaced, or expanded since the first edition of this book was published. This new edition is updated with a dedicated chapter on using scripting tools for troubleshooting along with numerous updates on Windows device and update installation, Microsoft Sysinternals Suite, and Troubleshooting malware attacks. Additionally, there is extensive coverage of the technical diagnosis and troubleshooting tools you need from Event Viewer to Recovery Console.This book will help you discover the connections between different hardware and software in your devices, and how their bonds with external hardware, networks, and the Internet are more inter-dependent than you think. You will also learn how to support the increasing volume of home workers, and make sure they can stay online and active on PCs from your own organization or their own devices.If you are fed up with those nagging, day-to-day issues, want to avoid costly repairs, or just want to learn more about how PCs work, _Windows 10 Troubleshooting_ is your ideal one-stop guide to the Windows 10 operating system.What You Will Learn* Understand your PC’s ecosystem and how to connect the dots, so you can successfully track problems to their source* Support home workers using PCs from your organization and family devices, and keep workers productive and online* Make your PC safe and secure for family and everyone in your workplace, and ensure that data is kept secure from loss or attack* Understand the threat from malware and viruses and a range of approaches to dealing with them, depending on the situation* Know tips and tricks for researching difficult problems, including third-party tools and useful web resourcesWHO THIS BOOK IS FORAnyone using Windows 10 on a desktop, laptop, or hybrid deviceMIKE HALSEY has been a Microsoft MVP (Most Valuable Professional) awardee since 2011 and is a recognized technical expert. As the author of Windows 7, 8, and 10 troubleshooting books and associated video courses, he is well versed in the problems and issues that PC users, IT pros, and system administrators face when administering and maintaining all aspects of a PC ecosystem.Mike understands that some subjects can be intimidating for some people and that everybody is different, so he approaches each subject area in straightforward and easy-to-understand ways.Mike is originally from the UK, but now lives in the south of France with his rescue border collies, Evan and Robbie. You can contact Mike on Twitter @MikeHalsey.Part 1: Getting Started with Windows TroubleshootingChapter 1: Introducing Troubleshooting in Windows 10The Three Seashells…The Problems We EncounterHardware ProblemsSoftware and App ProblemsNetworking ProblemsStartup ProblemsOS Installation and Update Problems“Prevention Is Better Than Cure”The Security and Maintenance CenterAutomatically Check for Solutions to ProblemsWindows Reliability HistoryWindows Automatic MaintenanceManaging Diagnostic Feedback and PrivacyRecovery OptionsWindows’ Security SystemsWindows Defender Anti-malwareWindows FirewallWindows SmartScreenUACUser Account ManagementAdministrators vs. Standard UsersLocal Accounts vs. Microsoft AccountsAzure ADUser Identity and Sign-In ManagementAn Introduction to Family SafetyManaging and Deleting User AccountsChapter 2: Building a Safe and Secure OSCreating a Recovery DriveBacking Up and Restoring Windows 10.ResetSystem Image BackupCreating a System Image Backup.Restoring a System Image BackupUsing Windows System RestoreConfiguring System RestoreUsing the Windows 10 Media Creation ToolSetting Up and Managing OneDriveBacking Up Your Files with OneDriveUsing OneDrive Personal and OneDrive ProfessionalRestoring Deleted and Previous Versions of FilesChapter 3: Configuring Windows 10The Settings AppSystem > StorageSystem > Default AppsSystem > AboutDevices > Printers & Scanners / Connected DevicesDevices > AutoPlayNetwork & InternetAccountsTime & LanguageUpd^ Windows UpdateUpdate & Security > Windows Defender / BackupUpdate & Security > ActivationUpdate & Security > For DevelopersIntroducing the Control PanelManaging the Virtual Memory, Paging FileManaging Remote Connections to the PCMoving the Shell User Folders.Creating, Managing, and Deleting PartitionsManaging Startup AppsChapter 4: Fixing Windows 10 QuicklyThe Disk Cleanup WizardManaging EdgeCleaning Temporary and Other Files from EdgeResetting - EdgeResetting the Windows Store and Store AppsDefragmenting Your Hard DisksManaging Running Apps and Services with Task ManagerManaging win32 App CompatibilityUsing the System File CheckerMicrosoft Answers, Service Status Site, and Being a TwitChapter 5: Understanding Tasks and EventsThe Windows Event ViewerIntroducing the Microsoft Management ConsoleThe Main Events ViewMaking Sense of Error LogsCreating Custom Event ViewsCreating Event SubscriptionsAttaching a Task to an EventSaving, Exporting, and Importing Event InformationChapter 6: Understanding PC HardwareBIOS and UEFIBIOS Virus/Malware AttackResetting BIOS and UEFI FirmwarePower SuppliesJump-Starting a PCThe MotherboardThe Rear Panel Connectors and CablesMemoryHard Disks, SSDs, M.2, and PCIe DrivesExpansion CardsMonitors and CablingKeyboards and MiceChapter 7: Diagnosing and Repairing Problem Hardware and PeripheralsGetting USB Devices to Work ReliablyInstalling and Managing Bluetooth DevicesInstalling and Configuring PrintersInstalling Different Types of PrinterFinding the Name or IP Address of a PrinterManaging Printing PoliciesHave You Tried [Not] Turning It Off and On Again?Chapter 8: Troubleshooting StartupHave You Tried Turning It Off and On Again?Using Startup RepairThe Windows Recovery Options MenuUsing the Command Prompt to Repair Windows StartupChapter 9: Troubleshooting NetworksThe Network and Sharing CenterConfiguring Network ConnectionsManaging Network AdaptersManaging Network Connections in the Settings AppSetting Up and Managing Your RouterTroubleshooting Wi-Fi Connection ProblemsRecovering Lost Wi-Fi PasswordsChapter 10: Troubleshoot and Manage EdgeManaging EdgeManaging Permissions, Security and Privacy in EdgeManaging Temporary and Other Files in EdgeUsing the Edge Task Manager to Manage Running Web AppsResetting EdgeOther Useful Settings in EdgePart 2: Becoming a Proficient TroubleshooterChapter 11: Dealing with Common Windows AnnoyancesIncorrect File AssociationsSetting Disk and File PermissionsManaging Audio DevicesTroubleshooting Windows ActivationTroubleshooting and Resetting Windows UpdateTroubleshooting Power Loss During an Update InstallationManaging and Resetting Windows SearchTroubleshooting Slow StartupWindows 10 Hangs on StartupWindows 10 Shuts Down SlowlyWindows Fails to Sleep/Resume from Sleep.Gaining Access After Bitlocker LockoutTroubleshooting Touch Screen ProblemsUSB Type-C and Thunderbolt ProblemsNo Picture on Desktop PC Monitor or TVDisappearing and Conflicting DrivesUnderstanding the BSODChapter 12: Remote HelpThe Problem Steps RecorderRecording an App with Game DVRQuick AssistWindows Remote AssistanceSending and Responding to a Remote Assistance RequestSending Unsolicited Remote Assistance OffersRemote DesktopChapter 13: Repairing Windows Startup ProblemsManually Repairing Windows StartupRepairing BIOS Startup FilesRepairing UEFI Startup FilesAdditional Repair Commands for BIOS and UEFIRecreating or Moving the Boot PartitionStep 1a: Create a New Boot Partition (Command Prompt)Step 1b: Create a New Boot Partition (Disk Management Console)Step 2: Create the New Boot FilesSetting Up and Managing Dual/Multiboot SystemsSecure BootBitlocker and Dual-Boot SystemsManaging Boot Systems with BCDEditBCDEdit IdentifiersBCDEdit Data FormatsExamples of BCDEdit UseEffecting Repairs on the Boot Partition StructuresChapter 14: Networks and Internet ConnectionsChecking the Status of a Network ConnectionDisplaying Information About Wi-Fi NetworksCreating Wi-Fi HotspotsPrioritizing Network ConnectionsDiagnosing Network Connection ProblemsGetting Network Diagnostic Reports from the Event ViewerSee the Status of Your Connection with the Performance Monitor.See What’s Using Your Bandwidth with the Resource MonitorTroubleshooting in the Network and Sharing CenterChanging a Network Type Between Private and PublicSetting Advanced Network Configuration OptionsUsing and Managing Ad-Hoc NetworksHOSTS, LMHOSTS and WINSUsing Authentication TechnologiesUnderstanding TCP/IPOSI Network LayersIPv4 vs IPv6 AddressingDCHPDNSUsing TCP/IP Management ToolsPingTraceRTIPConfigNetshManaging User ProfilesRoaming ProfilesAzure and AD Domain Profiles and SettingsChapter 15: Managing Device Drivers and PC ResourcesDeciphering the Device ManagerIdentifying and Installing Unknown DevicesInstalling Legacy HardwareForcibly installing a Device DriverUninstalling and Deleting Device DriversBlocking Device Driver and Device App InstallationFinding Device Driver Details and InformationTroubleshooting Device DriversBacking Up and Restoring the Driver StoreManaging Driver PropertiesChapter 16: Windows Update and System UpgradesDeferring Updates in Windows 10Long-Term Servicing ChannelChoosing How Updates Are DeliveredUninstalling and Blocking UpdatesTroubleshooting and Repairing Windows UpdateWindows Upgrades and the Reset ImageThe Windows Insider Programme (for Business)Chapter 17: Maintaining App and Web Site CompatibilityMaintaining Compatibility with Win32 AppsManaging Web Site and Intranet CompatibilityUsing Edge in IE Compatibility ModeManaging Security in EdgeInstalling and Managing Browser Plug-ins in EdgeSynchronizing Settings in EdgeSetting Your Default Web BrowserInstalling, Removing, Managing and Using Progressive Web AppsUsing the Software Compatibility TroubleshooterDPI ScalingProgram Compatibility AssistantMicrosoft Application Compatibility ToolkitShimsStandard User AnalyzerChapter 18: Managing Security and PrivacyCreating a Strong Password?Using Two-Factor AuthenticationTFA for Microsoft ServicesTFA for Third-Party ServicesMicrosoft TFA AppGoogle TFA AppManaging Safety and Privacy for ChildrenUsing the Credential ManagerManaging Passwords in EdgeManaging Encryption in Windows 10Using the EFSManaging EFS Encryption with Cipher.exeManaging Device EncryptionEncrypting Your PC with BitlockerManaging a TPM on Your PC and in Windows 10Managing Bitlocker Encryption on Your PCUsing Bitlocker To GoChapter 19: Malware and VirusesHow to Defend Against MalwareSo What Is This Malware Stuff Anyway?Viruses and WormsSpywareAdwareTrojansBotsRootkits / BootkitsBackdoorsRansomwareSpam and Phishing EmailDefending PCs Against MalwareDefending Your Files Against RansomwareSecure BootTrusted BootUsing EncryptionApp ContainersIdentifying a Malware AttackHow Malware Infects PCsHow Malware Infects NetworksIdentifying External AttacksIdentifying Internal AttacksTraining Staff for VigilanceManually Removing Malware from a PCFirst Steps – IsolationIdentifying the Running ProcessesDeactivating the MalwareTest and RetestFinishing UpRemoving RootkitsUsing BCDEdit to Repair Malware DamageUsing Third-Party Tools to Remove MalwareMalware Protection CenterBaseline Security AmalyzerMicrosoft DaRTWindows Defender OfflineESET Online (and Offline) ScannerNorton Bootable Recovery ToolSophos Bootable AntivirusKaspersky Rescue DiskKaspersky Ransomware DecryptorAVG Bootkit RemoverF-Secure Rescue CDTrend Micro Rescue DiskMcAfee Free ToolsD7IIRKillJunkware/Adware Removal ToolsMicrosoft SysInternals SuiteResearching Virus Removal OnlineChapter 20: Using Virtualization to Protect PCsCreating and Managing VMs in Hyper-VManaging Networks in Hyper-VCreating Backups of VMs in Hyper-VBooting and Repurposing Your PC from a VMCreating a VHDAdding a VHD to the Boot MenuVirtual Switches in Hyper-VCreating a Virtual SwitchManaging a Virtual SwitchManaging Hyper-V with PowerShellTroubleshooting Hyper-V ConnectionsPart 3: Mastering Windows 10 TroubleshootingChapter 21: Bomb-Proofing Your PCCreating a Robust Backup StrategyLock Down Your PCs with Group PolicyUsing the Group Policy EditorConfiguring a GPOUsing Server-Side Group PoliciesAdvanced Usage of Group PolicyUsing the Group Policy Management ConsoleActivating and Configuring the GPMCUsing the GPMCTroubleshooting Group Policy IssuesManaging Windows ServicesManage Your Local Security PolicyManaging Advanced Firewall PolicyChapter 22: Microsoft SysinternalsFile and Disk UtilitiesAccessChksAccessEnumContigDisk2VhdDiskExtDiskmonDiskViewEFSDumpMoveFile and PendMovesNTFSInfoPsFileSDeleteShareEnumSigcheckNetworking UtilitiesPSPingPsToolsTCPViewWhoIsProcess UtilitiesAutoRunsHandleListDLLsPortmonProcDumpProcess ExplorerProcess MonitorPSExecPsKillPsListPsServicePsSuspendShellRunasVMMapSecurity UtilitiesLogonSessionsPsLoggedOnPsLogListSysmon/Sysmon64System Information UtilitiesHandleLiveKdLoadOrderRAMMapMiscellaneous UtilitiesRegDelNullRegistry UsageRegJumpChapter 23: Best Practice in the WorkplaceManaging Power and BatteriesManaging Users and BYOD PCsMDMGroup PolicyBackups Best PracticeDeployment and Recovery Best PracticeManaging External and Network HardwareChapter 24: Managing BYOD HardwareManaging VPNs and Secure ConnectionsWorkplace JoinConnecting to an Exchange or ActiveSync AccountConnecting to Office 365 or Microsoft AzureWork FoldersChapter 25: Getting Advanced InformationThe Task ManagerThe Performance MonitorData Collector SetsThe Resource MonitorThe Computer Management ConsoleSystem InformationDXDiagChapter 26: The Registry in DepthRegistry FilesRegistry Keys and ValuesHKEY_CLASSES_ROOT (HKCR)HKEY_CURRENT_USER (HKCU)HKEY_LOCAL_MACHINE (HKLM)HKEY_USERS (HKU)HKEY_CURRENT_CONFIG (HKCC)HKEY_PERFORMANCE_DATARegistry Value TypesThe Registry EditorBacking Up and Restoring the RegistryCreating and Modifying Registry KeysEditing Other Users’ Registry DatabasesConnecting to a Remote RegistryUsing PowerShellUsing Group PolicyComparing RegistriesREGINI.EXEEditing the Registry with PowerShellScanRegEdit the Registry from the Recovery PanelThird-Party Registry UtilitiesChapter 27: Using Scripting Tools for TroubleshootingUsing the Windows Command LineUseful Command Line Tools for TroubleshootingUsing the Command Line from the Recovery ConsoleTroubleshooting Using PowerShellGetting Started with PowerShellUsing the Event Log in PowerShellGathering Detailed Reports and InformationManaging AppsManaging Running ProcessesManaging the RegistryManaging Windows UpdateManaging ServicesAdditional Troubleshooting with PowerShellThe Windows TerminalInstalling and Using the Windows TerminalChapter 28: Windows 10 File Structure in DepthThe Windows 10 File and Folder StructureRoot Windows FoldersWin32 and Store App FoldersWindows Operating System FoldersUser Account FoldersWindows Log FoldersWindows Temporary File FoldersWindows File TypesManaging the Shell User FoldersFile System Tools and UtilitiesFile Management from the Command LineHow File Systems Handle Files DifferentlyTroubleshooting File and Folder PermissionsACLs, DACLs, and PermissionsNTFS InheritanceUsign GroupsEffective AccessTaking OwnershipAuditingTroubleshooting File and Folder SharingChapter 29: Researching Difficult ProblemsReading the Windows Log FilesLog Text FilesReading .xml and .etl FilesReading .dmp filesSearching the Internet for SolutionsAnswers.Microsoft.comSupport.Microsoft.comTechnet.Microsoft.com and MSDN.Microsoft.comOther Microsoft and Third-Party Support SitesHardware Driver and Support SitesThird-Party Support ToolsChapter 30: Troubleshooting Difficult Problems“Mike Halsey’s Holistic Troubleshooting Agency”Gauging Both Internal and External FactorsUsing Troubleshooting Tools TogetherTroubleshooting and Repairing HardwareMinimal Boot Configuration and Jumpstarting PCsChapter 31: Installation and RestoreTroubleshooting the Windows 10 UpgradeInstalling Windows 10Obtaining Up-to-Date Installation MediaCreating Customized Installation MediaNondestructively Reinstalling Windows 10Windows 10 SysPrep

Regulärer Preis: 66,99 €
Produktbild für Phishing and Communication Channels

Phishing and Communication Channels

Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.WHAT YOU WILL LEARN* Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing* Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more* Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness* Be aware of the techniques that attackers most commonly use to request information* Master the best solutions (including educational, legal, technical) to protect against phishing attacksWHO THIS BOOK IS FORSecurity professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.DR. GUNIKHAN SONOWAL is an Assistant Professor in the Department of Computer Science and Engineering at KL University. His research interests include information security (phishing) and accessibility computing. He received his Bachelor of Science degree (BSc) from Sibsagar College, a Master of Computer Application (MCA) at University of Hyderabad, India, and a PhD in computer science and engineering from Pondicherry University. He has published eight research papers in peer-reviewed journals and international conferences.1: Introduction to Phishing.-2: Types of Phishing.-3: Communication Channels.-4: What Does a Phishing URL Look Like?.-5: Characteristics of a Phishing Website.-6: Phishing Kits.-7: Training Methods for Phishing Detection.-8: Legal Solution: Phishing is Prohibited Under a Number of Laws.-9: Phishing Detection Based on Technology.

Regulärer Preis: 56,99 €
Produktbild für Machine Learning with PySpark

Machine Learning with PySpark

Master the new features in PySpark 3.1 to develop data-driven, intelligent applications. This updated edition covers topics ranging from building scalable machine learning models, to natural language processing, to recommender systems.Machine Learning with PySpark, Second Edition begins with the fundamentals of Apache Spark, including the latest updates to the framework. Next, you will learn the full spectrum of traditional machine learning algorithm implementations, along with natural language processing and recommender systems. You’ll gain familiarity with the critical process of selecting machine learning algorithms, data ingestion, and data processing to solve business problems. You’ll see a demonstration of how to build supervised machine learning models such as linear regression, logistic regression, decision trees, and random forests. You’ll also learn how to automate the steps using Spark pipelines, followed by unsupervised models such as K-means and hierarchical clustering. A section on Natural Language Processing (NLP) covers text processing, text mining, and embeddings for classification. This new edition also introduces Koalas in Spark and how to automate data workflow using Airflow and PySpark’s latest ML library.After completing this book, you will understand how to use PySpark’s machine learning library to build and train various machine learning models, along with related components such as data ingestion, processing and visualization to develop data-driven intelligent applicationsWHAT YOU WILL LEARN:* Build a spectrum of supervised and unsupervised machine learning algorithms* Use PySpark's machine learning library to implement machine learning and recommender systems * Leverage the new features in PySpark’s machine learning library* Understand data processing using Koalas in Spark * Handle issues around feature engineering, class balance, bias and variance, and cross validation to build optimally fit modelsWHO THIS BOOK IS FORData science and machine learning professionals. Pramod Singh works at Bain & Company in the Advanced Analytics Group. He has extensive hands-on experience in large scale machine learning, deep learning, data engineering, designing algorithms and application development. He has spent more than 13 years working in the field of Data and AI at different organizations. He’s published four books – Deploy Machine Learning Models to Production, Machine Learning with PySpark, Learn PySpark and Learn TensorFlow 2.0, all for Apress. He is also a regular speaker at major conferences such as O’Reilly’s Strata and AI conferences. Pramod holds a BTech in electrical engineering from B.A.T.U, and an MBA from Symbiosis University. He has also earned a Data Science certification from IIM–Calcutta. He lives in Gurgaon with his wife and 5-year-old son. In his spare time, he enjoys playing guitar, coding, reading, and watching football.Chapter 1: Introduction to Spark 3.1Chapter Goal: The book’s opening chapter introduces the readers to latest changes in PySpark and updates to the framework. This chapter covers the different components of Spark ecosystem. The chapter doubles up as an introduction to the book’s format, including explanation of formatting practices, pointers to the book’s accompanying codebase online, and support contact information. The chapter sets readers’ expectations in terms of the content and structure of the rest of the book. This chapter provides the audience with a set of required libraries and code/data download information so that the user is able to set up their environment appropriately.No of pages -30Sub -Topics1. Data status2. Apache Spark evolution3. Apache Spark fundamentals4. Spark components5. Setting up Spark 3.1Chapter 2: Manage Data with PySparkChapter Goal:This chapter covers the steps right from reading the data, pre-processing and cleaning for machine learning purpose. The chapter showcases the steps to build end to end data handling pipelines to transform and create features for machine learning. It covers simple way to use Koalas in order to leverage pandas in a distributed way in Spark.It also covers the method to automate the data scripts in order to run schedules data jobs using Airflow.No of pages:50Sub - Topics1. Data ingestion2. Data cleaning3. Data transformation4. End- to end data pipelines5. Data processing using koalas in Spark on Pandas DataFrame6. Automate data workflow using AirflowChapter 3: Introduction to Machine LearningChapter Goal:This chapter introduces the readers to basic fundamentals of machine learning. This chapter covers different categories of machine learning and different stages in the machine learning lifecycle. It highlights the method to extract information related to model interpretation to understand the reasoning behind model predictions in PySpark .No of pages: 25Sub - Topics:1. Supervised machine learning2. Unsupervised machine learning3. Model interpretation4. Machine learning lifecycleChapter 4: Linear Regression with PySparkChapter Goal:This chapter covers the fundamentals of linear regression for readers. This chapter then showcases the steps to build feature engineering pipeline and fitting a regression model using PySpark latest machine learning libraryNo of pages:20Sub - Topics:1. Introduction to linear regression2. Feature engineering in PySpark3. Model training4. End-to end pipeline for model predictionChapter 5: Logistic Regression with PySparkChapter Goal:This chapter covers the fundamentals of logistic regression for readers. This chapter then showcases the steps to build feature engineering pipeline and fitting a logistic regression model using PySpark machine learning library on a customer datasetNo of pages:251. Introduction to logistic regression2. Feature engineering in PySpark3. Model training4. End-to end pipeline for model predictionChapter 6: Ensembling with PysparkChapter Goal:This chapter covers the fundamentals of ensembling methods including bagging, boosting and stacking. This chapter then showcases strengths of ensembling methods over other machine learning techniques. In the final part -the steps to build feature engineering pipeline and fitting random forest model using PySpark Machine learning library are coveredNo of pages:301. Introduction to ensembling methods2. Feature engineering in PySpark3. Model training4. End-to end pipeline for model predictionChapter 7: Clustering with PySparkChapter Goal:This chapter introduces the unsupervised part of machine learning - clustering. This chapter covers the steps to build feature engineering pipeline and running a customer segmentation exercise using PySpark machine learning libraryNo of pages:201.Introduction to clustering2. Feature engineering in PySpark3. Segmentation using PysparkChapter 8: Recommendation Engine with PySparkChapter Goal:This chapter focuses on the fundamentals of building scalable recommendation models. This chapter introduces different types of recommendation models that are used widely and then showcases the steps to build data pipeline and training a hybrid recommendation model using PySpark machine learning library for making recommendations to customersNo of pages:251. Introduction to types of recommender systems2. Deep dive into collaborative filtering3. Building recommendation engine using PySparkChapter 9: Advanced Feature Engineering with PySparkChapter Goal:This chapter covers the process to handle sequential data such as customer journey that can be used in prediction as well. This chapter also includes the use of PCA technique for reducing the dimensional space to handful features. At the end -it showcase use of machine learning flow to deploy Spark models in production.No of pages:451.Sequence embeddings for prediction2. Dimensionality reduction3. Model deployment in PySpark

Regulärer Preis: 62,99 €
Produktbild für Microsoft Blazor

Microsoft Blazor

Build web applications in C# and Microsoft .NET 6 that run in any modern browser and become a full-stack web developer!. Do all these things using the Microsoft Blazor framework and the techniques shown in this book. New in this edition is coverage of the new and improved Razor syntax, communication with the server using SignalR and/or gRPC, the use of virtualization to load large quantities of data efficiently, deployment and ahead-of-time compilation into WASM, new unit testing features, security using OpenID Connect, and more.Reading this book helps you learn to build user interfaces and present data to a user for display and modification, capturing the user’s changes via data binding. The book shows how to access a rich library of .NET functionality such as a component model for building a composable user interface, including how to develop reusable components that can be used across many pages and websites. Also covered is data exchange with a server using REST, SignalR, and gRPC, giving you access to microservices and database services.Blazor provides a fresh take on web development by eliminating the need for you to learn different languages and frameworks for client- and server-side development. Blazor allows C# and .NET to be used on all sides—both server-side and client-side—providing a robust feature set that is well suited toward scalable, enterprise-level applications. With Blazor you can use all your experience in .NET 6 along with thousands existing libraries, right in the browser. This book gets you proficient using this important toolkit for web application development.WHAT YOU WILL LEARN* Build user interfaces and display data for users to edit* Capture user edits and changes via data binding* Transfer data back and forth between server and client* Communicate with microservices and database services using REST, SignalR, or gRPC* Develop reusable components and assemble them into bigger components* Use routing to build single-page applications (SPAs)* Build stable and maintainable software using unit testing* Internationalize your application to reach more users* Secure your Blazor application with OpenID ConnectWHO THIS BOOK IS FORExperienced .NET developers who want to apply their existing skills toward building professional-quality, client-side web applications that run in any browser and web developers who want to step away from JavaScript and its complexities, and instead use a proven technology (C# and .NET6) that is robust toward creating enterprise-quality applications that scale and are reliable, and provide a good user experiencePETER HIMSCHOOT works as a lead trainer, architect, and strategist at U2U. He has a wide interest in software development that includes applications for the web, Windows, and mobile devices. He has trained thousands of developers, is a regular speaker at international conferences, and has been involved in many web and mobile development projects as a software architect. He has been a Microsoft Regional Director (from 2003 to 2019), which is a group of trusted advisors to developer and IT professional audiences, and to Microsoft.1. Introduction to WebAssembly and Blazor2. Data Binding3. Components and Structure for Blazor Applications4. Advanced Components5. Services and Dependency Injection6. Data Storage and Microservices7. Communication with Microservices8. Unit Testing9. Single Page Applications and Routing10. JavaScript Interoperability11. Blazor State Management12. Building Real-Time Applications with Blazor and SignalR13. Efficient Communication with gRPC14. Supporting Multiple Languages in your Blazor Application15. Deploying your Blazor Application16. Security with OpenID Connect17. Securing Blazor WebAssembly

Regulärer Preis: 69,99 €
Produktbild für Conflicts, Crimes and Regulations in Cyberspace

Conflicts, Crimes and Regulations in Cyberspace

The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared. SEBASTIEN-YVES LAURENT is a Professor working in the Faculty of Law and Political Science at the University of Bordeaux, France. His research is in international relations and security studies, with a particular focus on cyber and digital issues.Introduction XiSébastien-Yves LaurentCHAPTER 1 THE UNITED STATES, STATES AND THE FALSE CLAIMS OF THE END OF THE GLOBAL INTERNET 1Sébastien-Yves Laurent1.1 Introduction 11.2 The Creation Of The Internet And The Development Of Cyberspace By The United States 21.2.1 The First International Telecommunications Systems Developed By All States 31.2.2 The Creation And Development Of The Internet By The United States 31.2.3 International Management Controlled By The United States 41.2.4 A Sociotechnical System Bearing A Composite American Ideology 101.2.5 The False Recomposition Of The Global Sociotechnical System: The Global Summits On The Information Society 111.3 Cyberspace Transformed By The Arrival In Force Of States 131.3.1 State Intentions In “National Strategies”: A Global Approach 141.3.2 Russian–American Structural Disagreements On Information Security And Cybersecurity 161.3.3 Discussions On Cybersecurity: The Symbolic International Restoration Of The Coercive State 181.4 Praxis Of State Coercion In Cyberspace 201.4.1 Intelligence And Surveillance Activities In The Digital Environment 211.4.2 Non-Military Cyber Operations 241.4.3 Interstate Digital Conflicts, Secrecy And Coercive Diplomacy 261.5 The Fragmentation Of The Global Internet And The Digital Sovereignty Of States 291.5.1 Linguistic Balkanization: Digital Babel 291.5.2 Political Fragmentation: Alternative Internets 311.6 The Strong Constraint Of Interstate Cooperation For All States 331.6.1 Interstate Agreements On An Embryo Of International Law 331.6.2 State Dependence On International Cooperation For Cybersecurity 341.7 Conclusion 351.8 References 36CHAPTER 2 CYBERSECURITY IN AMERICA: THE US NATIONAL SECURITY APPARATUS AND CYBER CONFLICT MANAGEMENT 43Frédérick Gagnon and Alexis Rapin2.1 Introduction 432.2 Societal And Institutional Dynamics 452.3 Organizational And Bureaucratic Dynamics 492.4 Individual Dynamics 532.5 Conclusion 572.6 References 58CHAPTER 3 SEPARATION OF OFFENSIVE AND DEFENSIVE FUNCTIONS: THE ORIGINALITY OF THE FRENCH CYBERDEFENSE MODEL CALLED INTO QUESTION? 63Alix Desforges3.1 Introduction 633.2 A Model Designed And Developed In Response To The Threats And Challenges Of The Early 2010s 663.2.1 An Organizational Model Apparently Based On Two Main Actors 663.2.2 The Commitment To A Strict Offensive/Defensive Separation 713.3 A Strict Separation Of Offensive And Defensive Functions And Missions: An Obstacle To Better Defense? 753.3.1 A Rapidly Changing Context: An Increasingly Significant Threat From The Most Advanced States 763.3.2 Limits That Have Become Obstacles To Accomplishing Cyberdefense Missions 783.3.3 An Institutionalized Rapprochement Of The Actors Of Defensive And Offensive Parts In The Name Of Cyberdefense Missions: From Mitigation To Obliteration? 823.4 Conclusion 853.5 References 86CHAPTER 4 THE BOUNDARY BETWEEN CYBERCRIME AND CYBERWAR: AN UNCERTAIN NO-MAN’S LAND 89Marc Watin-Augouard4.1 Introduction 894.2 The Field Of Cybercrime Up To The Limits Of The Glass Ceiling 914.2.1 The Field Of Cybercrime: An Attempt At Delimitation 924.2.2 Cybercrime, The “21st Century Crime” 954.2.3 Cyber Conflict At The Edge Of The Glass Ceiling 954.3 War In Cyberspace, Cyber In War 984.3.1 Cyber In War, A Daily Reality 984.3.2 Autonomous Warfare In The Cyber World: The Test Of The Law Of Armed Conflict 994.3.3 Digital Cyber Persuasion 1024.4 Conclusion 1044.5 References 105CHAPTER 5 CYBERDEFENSE, THE DIGITAL DIMENSION OF NATIONAL SECURITY 107Bertrand Warusfel5.1 Introduction 1075.2 Cyberdefense In The Political And Legal Framework Of Digital Security 1085.2.1 A Definition Of Cyberdefense 1085.2.2 Linking Cyberdefense To National Security Strategy 1095.3 The Emergence Of A Coherent Legal Regime For Cyberdefense 1115.3.1 The Legal Basis Of The Permanent Cyberdefense Posture 1115.3.2 Exceptional Instruments For Responding To A Crisis 1125.4 Conclusion 1155.5 References 116CHAPTER 6 OMNIPRESENCE WITHOUT OMNIPOTENCE: THE US CAMPAIGN AGAINST HUAWEI IN THE 5G ERA 117Mark Corcoral6.1 Introduction 1176.2 The Unilateral American Offensive Against Huawei: A Disruptive Campaign Causing Significant Collateral Damage 1196.2.1 Huawei: An “Unusual And Extraordinary” Threat To The United States’ Position In The International Order 1206.2.2 A Political, Legal And Economic Offensive Against Huawei, Causing Significant Collateral Damage 1226.3 The American Diplomatic Offensive: The Limits Of American Rhetorical Coercion Of Their Partners And Allies 1286.3.1 Educating Rather Than Persuading: An Attempt To Rhetorically Coerce Partners And Allies 1296.3.2 Successful Agenda Setting But Limited Rhetorical Coercion 1316.3.3 American Rhetorical Coercion In The Special Relationship 1346.4 The Anti-Huawei Offensive: A Barometer Of American Power? 1376.5 References 139CHAPTER 7 THE ISSUE OF PERSONAL AND SOVEREIGN DATA IN THE LIGHT OF AN EMERGING “INTERNATIONAL LAW OF INTELLIGENCE” 147Fabien Lafouasse7.1 Introduction 1477.2 The Legal Rules Invoked In The Collection Of Personal And Sovereign Data 1507.2.1 Right To Privacy Versus General Communications Surveillance 1507.2.2 Violation Of Territorial Sovereignty Versus Cyberespionage 1537.3 Data Localization In The Light Of International Intelligence Law 1567.3.1 Data Fluidity Versus Data Storage 1567.3.2 Datasphere Versus International Intelligence Law 1597.4 Conclusion 1637.5 Appendix: The Quadrants Of Intelligence Law 1647.6 Sources And References 1657.6.1 Sources 1657.6.2 References 166CHAPTER 8 INTERNATIONAL CYBERSECURITY COOPERATION 169Guillaume Poupard8.1 Current Attack Trends 1698.2 The Multiple Paths Of International Cooperation 1718.3 The Issue Of Attack Attribution 175CHAPTER 9 CYBERDEFENSE AND CYBERSECURITY REGULATIONS IN THE UNITED STATES: FROM THE FAILURE OF THE “COMPREHENSIVE POLICY” TO THE SUCCESS OF THE SECTORAL APPROACH 177Adrien Manniez9.1 Introduction 1779.2 The Identification Of A New Threat And The Impact Of Cyber On How US Security And Defense Policies Are Designed 1789.3 From The Impact Of Cyber On Policy To The Impact Of Politics On Cyber 1819.4 From A Comprehensive Cyber Policy To A Sectoral Approach: The Success Of An Undeclared Regulatory Policy 1909.5 Conclusion 1959.6 References 196List of Authors 199Index 201

Regulärer Preis: 139,99 €
Produktbild für Software-Architekturen dokumentieren und kommunizieren

Software-Architekturen dokumentieren und kommunizieren

Dokumentation wird oft als lästige Pflicht angesehen und in vielen Softwareprojekten stark vernachlässigt, die Architektur wird manchmal überhaupt nicht beschrieben. Damit das in Ihren Projekten nicht passiert, schlägt dieses Buch praxiserprobte und schlankere Bestandteile für eine wirkungsvolle Architekturdokumentation vor.Anhand eines durchgängigen Beispiels erfahren Sie, wie Sie architekturrelevante Einflussfaktoren erfassen und Ihre Softwarelösung angemessen und ohne Ballast festhalten. Sie lernen nicht nur die Vorgehensweise für das Dokumentieren während des Entwickelns kennen, sondern auch, wie Sie bestehende Systeme im Nachhinein beschreiben. Neben der Methodik diskutiert das Buch auch typische Formate und Werkzeuge wie Wikis, UML-Werkzeuge unter anderem, mit denen Sie  Architekturdokumentation erfassen, verwalten und verbreiten kann.Checklisten und Übungsaufgaben geben Ihnen die nötige Sicherheit, um die Architekturdokumentation zu einem integralen Bestandteil Ihres Softwarevorhabens zu machen. Autor:Stefan Zörner arbeitet als Softwarearchitekt und Berater bei embarc in Hamburg. Er wirkt bei Entwurfs- und Umsetzungsfragen mit, unterstützt beim Festhalten von Architektur und beleuchteten Lösungsansätzen in Bewertungen. Sein Wissen und seine Erfahrung teilt er regelmäßig in Vorträgen, Artikeln und Workshops.

Regulärer Preis: 39,99 €
Produktbild für Office 2021: Was gibt's Neues?

Office 2021: Was gibt's Neues?

Neue Office-Versionen bieten eine Fülle von Funktionen. Die meisten sind vertraut und müssen nicht noch einmal neu erklärt werden. Denn spannend sind ja die Neuigkeiten daran! In diesem Heft wird ausschließlich gezeigt, was neu an Office 2021 ist und wie man sich mit den neuen Möglichkeiten die Arbeit erleichtern kann. Und falls man nicht alle Veränderungen mag, findet man hier auch die Wege, sich die vertraute Optik wieder einzurichten.Ina Koys ist langjährige Trainerin für MS-Office-Produkte. Viele Fragen werden in den Kursen immer wieder gestellt, aber selten in Fachbüchern behandelt. Einige davon beantwortet sie jetzt in der Reihe "kurz & knackig".

Regulärer Preis: 3,99 €
Produktbild für Beginning 3D Game Assets Development Pipeline

Beginning 3D Game Assets Development Pipeline

This project-based tutorial covers the creation of 3D assets in a game engine, from concept to implementation. You will learn the 3D pipeline using Maya and Substance Painter, which are industry-standard programs used for content creation in game development. You also will know how to add them and work with them in Unity.The book begins with an overall look at the production of game development and the different roles in creating assets. Then, starting with Maya, you learn how to start with a concept and take it through the entire production pipeline: base mesh, UV mapping, high poly, texturing, rigging, and animation. You will be working on one asset project throughout the entire book to understand how one phase leads to the next one. Lastly, you will cover asset placement and integration into Unity.WHAT YOU WILL LEARN* Build a thorough knowledge of the 3D game asset production workflow* Understand how each phase leads up to the next one* Know how 3D assets are implemented into Unity* Texture, rig, and animate the 3D model* Export and import the 3D asset or model* Understand the iterative design processWHO THIS BOOK IS FOR3D artists, from beginners to specialists, who are interested in learning the 3D production pipeline of game assets as a wholeNOVA VILLANUEVA is Professor of Game Design at Pratt Institute, New York, USA. She has taught game development for more than five years at Pratt, Parsons, and New York’s College of Technology, and is an independent game developer working on The Mills game. She live streams her game development process at twitch.tv/novavillan. Nova has previously worked as a 3D artist for Animatic Media, a 2D artist for the Webby award-winning Mafia Wars game developed by Zynga, and is a published artist featured in the Photoshop Creative magazine. She has an MFA degree in game design from the NYU Game Center in New York and a BS degree in media arts and animation from the Art Institute of Fort Lauderdale, Florida.CHAPTER 1: WHAT IS THE 3D PRODUCTION PIPELINE AND WHY IS IT IMPORTANT?Who this Book is Intended forAbout the 3D Pipeline and How it Fits in the Game Design Process3D Modeling3D TexturingWait! What about Rigging and Animation?Textures before Rigging or Backwards?3D AnimationGame Development WorkflowWorking with a TeamHow to Use this BookNon-Linear Game DevelopmentEmbracing and Utilizing Computer ShortcutsUsing the Right ToolsWhat is Maya?What is Substance Painter?What is Unity?PricingGetting StartedThe Importance of Using ReferenceGathering ReferencesSummaryCHAPTER 2: STARTING WITH MAYAInstalling and Opening MayaWindows InstallationMac InstallationOverview of the InterfaceTop MenuStatus LineMenu SetsShelfChannel BoxAttribute EditorQuick Layout and Outliner ButtonsTime SliderRange SliderPlayback ControlsView PanelMarking MenusHow to Follow along with the StepsCreating PrimitivesTranslate, Rotate, and ScaleTranslateRotateScaleNavigationDuplicate ObjectsDelete ObjectsAdding Edge LoopsPivot ManipulatorMirroring Geometry MethodsDuplicate and ScaleDuplicate SpecialComponent Selection ModeFace, Vertex, and EdgeFace ModeVertex ModeEdge ModeSelectDelete Faces and EdgesTransformScaleRotateExtrude FacesBefore ContinuingShortcutsSet-Up ProjectSetting up the Mech ProjectSummaryCHAPTER 3: CREATING THE BASE MESHBase MeshException to the RuleTopologyN-gonsConcave FacesMetricsImage Plane ReferenceSwitching Between Panel ViewsStarting to ModelSymmetryScaleDeselecting and Inverting ComponentsUsing the Channel Box for TransformationUsing Duplicates to Speed Up ModelingDisplay ModesX-Ray ModeModeling the Leg ConnectorsDuplicating the shapes of the Leg ConnectorsModeling the Foot StabilizersModeling Armor for the Motor UnitsBuilding the BodyShaping the HeadAdding Thickness to the HeadModeling the Head DetailsAdding the Neck ModelPositioning the LegInstancing the MechSummaryCHAPTER 4: PREPARING THE ASSET FOR THE NEXT PHASEAdopting Best PracticesPipeline RequirementsWhat is the Outliner and Why Do We Use it?Using the Outliner for Clean UpWhat is Construction HistoryCleaning Up the HistoryStarting to Use the OutlinerCombining, Naming and Freezing MeshesResetting TransformationsFreezing TransformationsPivot LocationsUsing Instancing for Fast PrototypingGrouping Our AssetSummaryCHAPTER 5: UV Mapping the 3D ModelWhat Are UVs?The Different Ways You Can UV MapWhat is the UV Editor and What is it Used for?Clean Up for UV MappingSetting Up and Using the UV EditorCreating a Basic UV Map for the MechUVing Multiple Meshes SimultaneouslyDeleting History if Our UVed MeshesOptimization of Mesh UVsCutting and Sewing SeamsUnfolding UV ShellsHandling a Real-Life UV Pipeline ScenarioOptimizing and Arranging UVsTexel DensityMoving, Arranging, and Packing UVsIt Always DependsFinal Arrangement and LayoutSummaryCHAPTER 6: CREATING THE HIGH POLY MODELWhat is a High Poly Model?Why Create the Illusion of DepthThe Different Approaches to End Up with a Low and High PolySetting up for the High PolyWhat is the Difference between a Low and High Poly Model?Creating the High PolyAdding Details and Edge Definition to the BodyModeling in a Non-Destructive WayAdding Details to the FeetAdding the Rest of the Mech’s DetailsSummaryCHAPTER 7: TEXTURING THE 3D MODELUsing Floaters to Add Texture DetailsGetting Our Maya Files ReadyWorking With Multiple Texture on a Single ModelExporting the FBX ModelInstalling and Opening Substance 3D PainterOverview of the InterfaceTop MenuToolbarLayersPropertiesViewportTexture Set ListAssetsDisplay SettingsSetting Up to TextureBaking the ModelCreating Textures Using a PBR PipelineStarting to TextureMaskingWorking with Multiple MaterialsAdding Sticker DecalsExporting the TexturesConfiguring Custom Output Texture MapsSummaryCHAPTER 8: RIGGING THE 3D MODELWhat is Rigging?Understanding Mesh AnimationWhat are Joints?Working with JointsCreating JointsArranging JointsMoving JointsMirroring JointsWorking with Control CurvesCreating a Control CurveUsing Kinematics for MovementCreating IKs for the LegsWhat are Constraints?The Importance of Using ConstraintsCreating GroupsSetup the Head ControlSetup the Body ControlSetup the Left and Right FemurSetup the Left and Right TibiaSetup the FeetGrouping SystemSummaryCHAPTER 9: BRINGING THE ASSET TO LIFEIterative DesignAnimating the MechAnimation StatesSet up the Scene for AnimationCreating the Idle the AnimationAdding Keyframes on the MechDeleting KeyframesExporting the Animated MechInstalling and Opening UnityOverview of UnityCreating a New ProjectNavigation in the Scene ViewInterfaceWorking with Assets in UnityUsing the HierarchyUsing the InspectorAdding Textures to Our MechChanging Shaders and Linking Textures to Map SlotsAssigning the Materials to the Mech AssetWorking with Level of DetailsPlaying the SceneWhat about Other Assets?SummaryWrapping it All UpWhere to Go from Here?Staying Inspired

Regulärer Preis: 66,99 €
Produktbild für Cloud-Native Microservices with Apache Pulsar

Cloud-Native Microservices with Apache Pulsar

Apply different enterprise integration and processing strategies available with Pulsar, Apache's multi-tenant, high-performance, cloud-native messaging and streaming platform. This book is a comprehensive guide that examines using Pulsar Java libraries to build distributed applications with message-driven architecture.You'll begin with an introduction to Apache Pulsar architecture. The first few chapters build a foundation of message-driven architecture. Next, you'll perform a setup of all the required Pulsar components. The book also covers work with Apache Pulsar client library to build producers and consumers for the discussed patterns.You'll then explore the transformation, filter, resiliency, and tracing capabilities available with Pulsar. Moving forward, the book will discuss best practices when building message schemas and demonstrate integration patterns using microservices. Security is an important aspect of any application; the book will cover authentication and authorization in Apache Pulsar such as Transport Layer Security (TLS), OAuth 2.0, and JSON Web Token (JWT). The final chapters will cover Apache Pulsar deployment in Kubernetes. You'll build microservices and serverless components such as AWS Lambda integrated with Apache Pulsar on Kubernetes.After completing the book, you'll be able to comfortably work with the large set of out-of-the-box integration options offered by Apache Pulsar.WHAT YOU'LL LEARN* Examine the important Apache Pulsar components * Build applications using Apache Pulsar client libraries* Use Apache Pulsar effectively with microservices* Deploy Apache Pulsar to the cloudWHO THIS BOOK IS FORCloud architects and software developers who build systems in the cloud-native technologies.RAHUL SHARMA is a software developer with around 17 years of experience in Java/J2EE and Python applications. Being an open-source enthusiast, he has contributed to various projects like Apache Crunch, and so on. In his career, he has worked with companies of various sizes, from enterprises to start-ups. He has worked on Kubernetes and microservices extensively for enterprises.MOHAMMAD ATYAB is a software developer with more than 13 years of developing products. He has worked in various languages primarily Java/J2EE, Python, C++. He has a passion of building products and has created web based scalable applications in chat bots, ecommerce, marketing and financial domains. He has worked in large enterprises as well as startups and worked extensively in the areas of Big Data and AI.DATA PROCESSING WITH APACHE PULSARChapter 1: Introduction to Apache PulsarChapter 2: Working with MessagesChapter 3: Working with Pulsar FunctionsChapter 4: Schema RegistryChapter 5: Build Microservices using PulsarChapter 6: Pulsar ConnectersChapter 7: Pulsar SecurityChapter 8: Deploy Pulsar on Kubernetes

Regulärer Preis: 62,99 €
Produktbild für Stylish F# 6

Stylish F# 6

Why just get by in F# when you can program in style. This book goes beyond syntax and into design. It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code. This second edition, fully updated for .NET 6 and F# 6, includes all new coverage of anonymous records, the task {} computation expression, and the relationship between types and modules.Stylish F# 6 covers every design decision that a developer makes in constructing F# programs, helping you make the most educated and valuable design choices at every stage of code development. You will learn about the design of types and function signatures, the benefits of immutability, and the uses of partial function application. You will understand best practices for writing APIs to be used by F#, C#, and other languages. Each carefully vetted design choice is supported with compelling examples, illustrations, and rationales.WHAT YOU WILL LEARN* Know why, when, and how to code in immutable style* Use collection functions, piping, and function composition to build working software quickly* Be aware of the techniques available to bring error handling into the mainstream of program logic* Optimize F# code for maximum performance* Identify and implement opportunities to use function injection to improve program design* Appreciate the methods available to handle unknown data values* Understand asynchronous and parallel programming in F#, and how it differs from C# asynchronous programming* Exploit records and anonymous records as low-overhead, easily comparable containers for structured dataWHO THIS BOOK IS FORAny developer who writes F# code and wants to write it betterKIT EASON is a software developer and educator with more than 20 years of experience. He has been programming in F# since 2011 and is employed at Perpetuum Ltd., working on an extensive network of energy-harvesting vibration sensors fitted to railway rolling stock and infrastructure. Kit is an avid F# user who is passionate about teaching others. He has contributed to several publications, including Apress books Beginning F# and F# Deep Dives. He often teaches on the topic of F# and his popular videos appear on Udemy and Pluralsight. Chapter 1: The Sense of StyleChapter 2: Designing Functions Using TypesChapter 3: Missing DataChapter 4: Working Effectively with Collection FunctionsChapter 5: Immutability and MutationChapter 6: Pattern MatchingChapter 7: Record TypesChapter 8: ClassesChapter 9: Programming With FunctionsChapter 10: Asynchronous and Parallel ProgrammingChapter 11: Railway Oriented ProgrammingChapter 12: PerformanceChapter 13: Layout and NamingChapter 14: Summary

Regulärer Preis: 62,99 €
Produktbild für Build Your Own 2D Game Engine and Create Great Web Games

Build Your Own 2D Game Engine and Create Great Web Games

Develop a 2D game engine that will give you the experience and core understanding of foundational concepts for building complex and fun 2D games that can be played across the Internet via popular web browsers. This book is organized so that the chapters follow logical steps of building a game engine and integrates concepts accordingly.Build Your Own 2D Game Engine and Create Great Web Games isolates and presents relevant concepts from software engineering, computer graphics, mathematics, physics, game development and game design in the context of building a 2D game engine from scratch. In this edition, all the code is based on updated versions of JavaScript with HTML5 and WebGL2: you will analyze the source code needed to create a game engine that is suitable for implementing typical casual 2D videogames. You will also learn about physics and particle system. The discussion of physics component includes rotations and popular physical materials such as wood, mud, and ice. The discussion of particle component has popular presets such as fire, smoke, and dust.By the end of the book, you will understand the core concepts and implementation details of a typical 2D game engine, learn insights into how these concepts affect game design and game play, and have access to a versatile 2D game engine that they can expand upon or utilize to build their own 2D games from scratch with HTML5, JavaScript, and WebGL2.WHAT YOU WILL LEARN* Understand essential concepts for building 2D games* Grasp the basic architecture of 2D game engines* Understand illumination models in 2D games* Learn basic physics used in 2D games* Find out how these core concepts affect game design and game play* Learn to design and develop 2D interactive gamesWHO IS THIS BOOK FORGame enthusiasts, hobbyists, and anyone with little to no experience who are interested in building interactive games but are unsure of how to begin. This can also serve as a textbook for a junior- or senior-level "Introduction to Game Engine" course in a Computer Science department.Kelvin Sung is a Professor with the Computing and Software Systems Division at University of Washington Bothell (UWB). He received his Ph.D. in Computer Science from the University of Illinois at Urbana‐Champaign. Kelvin's background is in computer graphics, hardware, and machine architecture. He came to UWB from Alias|Wavefront (now part of Autodesk), where he played a key role in designing and implementing the Maya Renderer, an Academy Award‐winning image generation system. At UWB, funded by Microsoft Research and the National Science Foundation, Kelvin’s work focuses on the intersection of video game mechanics, solutions to real‐world problems, and mobile technologies. Together with his students and colleagues, Kelvin has co‐authored five books: one in computer graphics (Essentials of Interactive Computer Graphics: Concepts and Implementations, A.K. Peters, 2008), and the others in 2D game engines (Learn 2D Game Development with C# , APress, 2013; Build Your Own 2D Game Engine; Create Great Web Games, Apress, October 2015; Building a 2D Game Physics Engine, APress, 2016; and Basic Math for Game Development with Unity 3D, Apress 2019).Jebediah Pavleas is a graduate student in the Computer Science and Software Engineering program at the University of Washington Bothell (UWB) as well as an intern on the NExT Enable team at Microsoft Research. He is also the coauthor of the book Learn 2D Game Development with C#. He received a bachelor’s of science degree in 2012 and was the recipient of the Chancellor’s Medal for his class. During his time as an undergraduate, he took great interest in both computer graphics and games. His projects included an interactive math application that utilizes Microsoft’s Kinect sensor to teach algebra, a 2D role-playing game designed to teach students introductory programming concepts, and a web site where students can compete in various mini-games to control checkpoints around campus. Relating to these projects, he coauthored publications in IEEE Computers and The Journal of Computing Sciences in Colleges (CCSC). When not working toward his graduate degree, he enjoys designing, building, and playing games of all kinds as well as adapting technology for improved accessibility.Matthew Munson is a graduate student in the Computer Science and Software Engineering program at the University of Washington Bothell. He received undergraduate degrees in Computer Science and Software Engineering and Mechanical Engineering at the University of Washington Bothell in 2020. Matthew is interested in operating system development, networking, and embedded systems. As a research assistant Matthew used cloud computing to analyze years of audio data recorded by hydrophones off the Oregon coast. This data was used to study the effects of climate change and shipping noise on marine mammals. Currently, Matthew is working on a networked augmented reality library that focuses on allowing users to view the same virtual scene from different perspectives.Jason Pace has contributed to a wide range of games as a Producer, Designer, and Creative Director over 15 years in the interactive entertainment industry, from ultra-casual puzzlers to Halo. As a Designer Jason builds game mechanics and systems that start from a simple palette of core interactions (known as the core gameplay loop), progressively introducing variety and complexity to create interactive experiences that engage and delight players while maintaining focus on what makes each unique game fun.CHAPTER 1: INTRODUCTIONSub-Topics· Introduction to the IDE· Development environment setup· Guide to use the book· ReferencesCHAPTER 2: WORKING WITH HTML5 AND WEBGL2Sub - Topics· HTML5 canvas for drawing· Project organization· Elementary drawing with WebGL2· Abstraction with JavaScript objects· Working with shaders and controlling the colorCHAPTER 3: TRANSFORMATION AND WORLD COORDINATESub-Topics:· Renderable: encapsulating drawing· Transforming a renderable object· Encapsulating the transform operator· View and projection transform and the viewport· The cameraCHAPTER 4: COMMON COMPONENTS OF A GAME ENGINESub-Topics:· The game loop· Keyboard input· Resource management and asynchronous loading· Game levels and scene files· Scene objects· Audio supportCHAPTER 5: WORKING WITH TEXTURE, SPRITES, AND FONTSSub-Topics:· Texture mapping and texture coordinates· Drawing with sprite sheets· Sprite animations· Fonts and drawing of textCHAPTER 6: BEHAVIORS AND COLLISIONSSub-Topics:· Abstraction of game objects· Elementary behavior: chasing· Collision between game objects· Per-pixel accurate collisionsCHAPTER 7: CAMERA MANIPULATIONSSub-Topics:· Basic camera manipulations· Manipulation with interpolations· Camera shake effect· Working with multiple cameras· Mouse input through the camerasChapter 8: Illumination and ShadowSub-Topics:· Ambient light· Point light sources· Multiple light sources and distance attenuation· Diffuse reflections and normal mapping· Specular reflections and materials· Directional and spot lights· Simulation of shadowsCHAPTER 9: PHYSICSSub - Topics:· Physics engine and rigid shapes· Broad-phase collision detection· Collision information and separation axis theorem· Collision between rectangles and circles· Movement and symplectic Euler integration· Resolving collisions· Support for rotations· Physics engine presets: wood, mud, ice, and dirtCHAPTER 10: PARTICLE SYSTEMS AND STENCILINGSub-Topics:· Particles and effects· Particle emitters· Particle system presets: fire, smoke, snow, dust, and explosion· StencilsCHAPTER 11: SUPPORTING CAMERA BACKGROUNDSub-Topics:· Tiling of the background· Motion parallax· Layer managementCHAPTER 12: BUILDING A SAMPLE GAME: FROM DESIGN TO COMPLETIONSub-Topics:· Game concept and design· Integrating a setting: layout and playable space· Additional elements: interaction model and audio

Regulärer Preis: 66,99 €
Produktbild für Natural Language Processing Projects

Natural Language Processing Projects

Leverage machine learning and deep learning techniques to build fully-fledged natural language processing (NLP) projects. Projects throughout this book grow in complexity and showcase methodologies, optimizing tips, and tricks to solve various business problems. You will use modern Python libraries and algorithms to build end-to-end NLP projects.The book starts with an overview of natural language processing (NLP) and artificial intelligence to provide a quick refresher on algorithms. Next, it covers end-to-end NLP projects beginning with traditional algorithms and projects such as customer review sentiment and emotion detection, topic modeling, and document clustering. From there, it delves into e-commerce related projects such as product categorization using the description of the product, a search engine to retrieve the relevant content, and a content-based recommendation system to enhance user experience. Moving forward, it explains how to build systems to find similar sentences using contextual embedding, summarizing huge documents using recurrent neural networks (RNN), automatic word suggestion using long short-term memory networks (LSTM), and how to build a chatbot using transfer learning. It concludes with an exploration of next-generation AI and algorithms in the research space.By the end of this book, you will have the knowledge needed to solve various business problems using NLP techniques.WHAT YOU WILL LEARN* Implement full-fledged intelligent NLP applications with Python* Translate real-world business problem on text data with NLP techniques* Leverage machine learning and deep learning techniques to perform smart language processing* Gain hands-on experience implementing end-to-end search engine information retrieval, text summarization, chatbots, text generation, document clustering and product classification, and moreWHO THIS BOOK IS FORData scientists, machine learning engineers, and deep learning professionals looking to build natural language applications using PythonAKSHAY R KULKARNIis a renowned AI and machine learning (ML) evangelist and thought leader. He has consulted with Fortune 500 and global enterprises to drive AI and data science-led strategic transformations. Akshay has experience building and scaling AI and ML businesses and creating significant impact. He is currently Manager of Data Science & AI at Publicis Sapient on their core data science and AI team where he is part of strategy and transformation interventions through AI. He manages high-priority growth initiatives around data science and works on AI engagements by applying state-of-the-art techniques. He is a Google Developers Expert–Machine Learning, published author of books on NLP and deep learning, and a regular speaker at major AI and data science conferences (including Strata, O’Reilly AI Conf, and GIDS). Akshay is a visiting faculty member for some of the top graduate institutes in India. In 2019, he was featured as one of Top40 under 40 Data Scientists in India. In his spare time, he enjoys reading, writing, and coding, and help aspiring data scientists. He lives in Bangalore with his family.ADARSHA SHIVANANDA is a senior data scientist on Indegene's Product and Technology team where he works on building machine learning and artificial intelligence (AI) capabilities for pharma products. He aims to build a pool of exceptional data scientists within and outside of the organization to solve problems through training programs, and always wants to stay ahead of the curve. Previously, he worked with Tredence Analytics and IQVIA. Adarsha has worked extensively in the pharma, healthcare, retail, and marketing domains. He lives in Bangalore and loves to read and teach data science.ANOOSH KULKARNI is a data scientist and senior consultant focused on artificial intelligence (AI). He has worked with global clients across multiple domains and helped them solve their business problems using machine learning (ML), natural language processing (NLP), and deep learning. Presently, he is working with Subex AI labs. Previously, he was a data scientist at one of the leading ecommerce companies in the UAE. Anoosh is passionate about guiding and mentoring people in their data science journey. He leads data science/machine learning meet ups in Bangalore and helps aspiring data scientists navigate their careers. He also conducts ML/AI workshops at universities and is actively involved in conducting webinars, talks, and sessions on AI and data science. He lives in Bangalore with his family. Chapter 1: Natural Language Processing & Artificial Intelligence OverviewChapter Goal: This is an introductory chapter. This chapter provides a quick refresher of the topics to be covered in this book. Since this book teaches projects surrounding a specific area of technology, we will provide a brief introduction to the key concepts required for these projects. We will not be working on a specific project, rather discuss some important concepts without going into details. The depth on each of these topics will be covered in the specific chaptersNo of pages: 25Sub - Topics:1. Artificial intelligence paradigm2. NLP and AI life cycle3. NLP concepts (TF-IDF, word embeddings, many more)4. Machine learning concepts (supervised learning, classification, unsupervised learning)5. Deep learning concepts (CNN, RNN, LSTM)Chapter 2: Product360 - Sentiment, Emotion & Trend Capturing SystemChapter Goal: Sentiment analysis involves finding the polarity of a sentence and labels it as positive, negative or neutral. Emotion detection involves identifying emotions(sad, anger, happy, etc) from the sentences. Data is extracted from social media like Twitter, Facebook etc. and Ecommerce website, processed and analyzed using different NLP techniques will provide a 360 degree view of that product which enables better decision making. This chapter introduces sentiment analysis to the reader and the various techniques that can be used to analyze text. We will apply sentiment, emotion and trend analysis on reviews data for any E-commerce website like Amazon, Zomato, and IMDb, etc. which contains millions of customer reviews and star ratings. For this task, we will use Python libraries such as Vader, Textblob, etc.No of pages: 30Sub - Topics1. Text mining and various available libraries.2. Data preprocessing.3. Data cleaning tricks, optimized feature engineering4. EDA5. Sentiment analysis6. Emotion and trend analysisChapter 3: TED Talks Segmentation & Topics Extraction Using Machine LearningChapter Goal: Document clustering is an unsupervised learning process for grouping documents. For example, there are number of e-books and they have to be grouped to build a structure around them saves time while finding the books. Articles grouping, product clustering are the other few examples. Once we identify the clusters, it is important to understand the properties of clusters. So, Topic modeling is performed to extract topics from a set of documents and articles to understand the content of the documents using keywords and be able to tag the articles or documents using those topics.In this chapter will see how to group TED talks based on description using various clustering techniques like K-Means and Hierarchical clustering. Then we will perform topic modeling using Latent Dirichlet Allocation (LDA) to understand what defines each cluster. Important libraries include Gensim, NLTK, Scikit-learn and word2vec for this problem. We will use over 100k articles from different American publications.No of pages: 30Sub - Topics1. Data understanding and pre-processing2. Computing TF-IDF3. K-Means and hierarchical clustering4. Evaluation and visualization5. Topic modeling using Latent Dirichlet AllocationChapter 4: Enhancing E-commerce Through Advanced Search Engine and Recommendation SystemChapter Goal: An information retrieval system will search product descriptions based on a search query text and gives the results. Search engines are the most common and best use case of information retrieval models. The concept of information retrieval started from a string or word comparison, but it won’t be accurate as it doesn’t capture semantics. Advanced deep learning techniques made information retrieval work more accurately.Recommender systems are everywhere and used to create a personalized recommendations to increase the user experience. There are many types of recommender systems from collaborative filtering to graph-based. But the one dependent on Natural language processing is content-based recommender systems. It leverages the content of the item or the demographics of the user to recommend and this information is purely in the form of text. In this chapter, we will use advanced deep learning and word embedding techniques to search and recommend items/products to customers and libraries like SciKit-learn, NLTK, Keras, Word2vec, etc. We will use Flipkart e-commerce sample data which has the product name and its description.No of pages: 30Sub - Topics:1. Information retrieval, word embeddings for IR, similarity scoring.2. Content-based recommendation systems working3. Data understanding and preprocessing4. Search engine using word embeddings5. Recommender system using KNNChapter 5: E-Commerce Product Categorization Model Using Deep learningChapter Goal: Most of the time, classification problems won’t be binary rather they will be multiclass. For example, categorizing the retail products based on the description, categorizing the call center complaints, etc. Complexity increases as the number of classes increases. Let’s solve this problem by using deep learning techniques. We leverage deep neural networks using the Keras library. Feature engineering techniques like TF-IDF and word embeddings are considered. We will use product description data for an E-commerce company to categorize the products.No of pages: 25Sub - Topics:1. Text pre-processing2. Text to features using TF-IDF and word embeddings3. Multi-class classification using deep neural networks4. Parameter tuning and optimizationChapter 6: Movie Genre TaggingChapter Goal: Categorizing movies into genres is one of the classic AI problems. Online movie booking platforms, review websites like IMDB would tag movies into respective genres. The genre can be action, adventure, comedy, romance and so on.Our goal here is to tag possible movie genres given the description of the movie. Machine/model has to predict all possible classes(genres) the movie would belong to. We have solved simple multi-class classification but, in this chapter, let's explore how to solve a multi-label learning and classification problem.No of pages: 25Sub - Topics:1. Text processing2. Data preparation for modeling3. Text to features4. Multi-label classification using different algorithms5. Parameter tuning and evaluationChapter 7: Content Recommendation for the Marketing CampaignChapter Goal: A content recommendation engine collects and analyzes data based on users' behavior on marketing content. This data is then used to offer personalized and relevant marketing materials. We can tailor the subjects of the emails based on historical interactions. We will use deep learning techniques using Keras along with word embeddings.No of pages: 25Sub - Topics: 1. Why content recommendation2. Feature engineering3. Open rate to find the right contentChapter 8: Quora Question Pair SimilarityChapter Goal: Over 100 million people visit Quora every month, so it's no surprise that many people ask similarly worded questions. Multiple questions with the same intent can cause seekers to spend more time finding the best answer to their question and make writers feel they need to answer multiple versions of the same question. The goal of this chapter is to predict which of the provided pairs of questions contain two questions with the same meaning using advanced deep learning techniques. Keras will be used to find the similarity score.No of pages: 25Sub - Topics:1. Why predicting the similar questions?2. Text pre processing3. Word embeddings4. Finding similar questionsChapter 9: Resume Parsing & Shortlisting with Machine LearningChapter Goal: In the recruitment industry, millions of people are uploading resumes and applying for jobs every day on thousands of employment platforms. Businesses have their openings listed on these platforms and job seekers come to apply. Every business has a dedicated recruitment team that manually goes through the applicant's resumes and extracts relevant data to see if they are a fit. To automate this task, this project tries to converts an unstructured form of resume data into a structured format. It's a model that analyses and extracts resume data, returns the machine-readable output and ranks the top resume’s that are best match to the given job description. This helps to store and analyze data automatically.No of pages: 25Sub - Topics:1. Resume parsing using various NLP techniques2. NER3. Shortlisting and ranking resumesChapter 10: Building Chatbot Using Transfer learningChapter Goal: Question Answering (QA) System - also termed as “Chatbot” is very useful as most of the deep learning-related problems can be modeled as a question answering problem. Consequently, the field is one of the most researched fields in computer science today. The last few years have seen considerable developments and improvement in the state of the art, much of which can be credited to the upcoming of deep learning. In this chapter, we will build end to end QA system using NLTK, modern deep learning algorithms, and transfer learning.No of pages: 25Sub - Topics:1. Q&A system explained2. Q&A architecture3. Natural Language Understanding4. Learn possible approaches and algorithms5. How to use transfer learning6. Fine Tuning and optimizing the network7. End to end implementation and evaluationChapter 11: Summarization System Using RNNChapter Goal: With the ever-growing data, reading the whole document is just time-consuming. We need to summarize the huge text corpus to make life easier. Text summarization is the process of creating a short summary of a longer document with accurate meaning. It’s widely used in headlines generation, summarizing the reviews, etc. There are many approaches to solve this problem like feature-based, graph-based, using sentence embeddings, etc. Abstractive methods like deep learning and reinforcement learning are providing excellent results since it generates an entirely new sentence which captures the meaning of source document. In this chapter, we will discuss all these Extractive and Abstractive methods to summarize the text. We will be using NLTK, Gensim, SciKit-learn, and Keras libraries.No of pages: 30Sub - Topics:1. Text summarization using Extractive methods2. Abstractive methods3. Text summarization using deep learning4. Text summarization using reinforcement learningChapter 12: Automated Text Generation Using LSTM and EncodersChapter Goal: Text Generation is a type of Language Modelling problem. Language Modelling is the core problem for several natural language processing tasks such as speech to text, conversational system, and text summarization. A trained language model learns the likelihood of occurrence of a word based on the previous sequence of words used in the text. Language models can be operated at the character level, n-gram level, sentence level, or even paragraph level. In this chapter, we will create a language model for generating natural language text by implement and training state-of-the-art recurrent neural network. We will use the Python programming language for this purpose. The objective of this model is to generate new text, given that some input text is present. We will start building the architecture. We will be using NLTK, Gensim, SciKit-learn and Keras libraries.No of pages: 25Sub - Topics: 1. Text generation concepts and application2. Text generation architecture3. Text preprocessing and feature engineering4. Building the LSTM network model5. Seq2Seq modelsChapter 13: Future of NLP & Next-Gen Artificial IntelligenceChapter Goal: In this chapter, let's summarize what we learned so far in this book. We started from basics, traditional tasks to advanced text generation problems. We implemented and explored how deep learning is perfect for natural language understanding. We learned classification, information retrieval systems, Q&A systems, and also text generation. We will also explore why deep learning and other next-gen AI algorithms like GANS, Capsule networks, Differentiable Neural Computers, Unsupervised/Semi-supervised Deep Learning, Attention Networks, Transfer Learning, Deep Reinforcement Learning, Meta-Learning, is uniquely suited to NLP or their short comes, and how these algorithms would evolve and give state-of-the-art results in a slew of tasks under NLU and NLG.No of pages: 12Sub - Topics:1. What did we learn2. Future of NLP3. Next-Gen learning algorithms for NLP4. Deep reinforcement learning5. What are the current challenges in NLP?6. Research directions to solve the challenges7. Current research in the NLP world

Regulärer Preis: 62,99 €
Produktbild für Building Multiplayer Games in Unity

Building Multiplayer Games in Unity

Take a deep dive into creating large-scale, multiplayer games with Unity 3D, using Mirror Networking and a variety of powerful transports. You will learn the fundamentals of RPC/Command multiplayer architecture and dig deeper into networking and data persistence to achieve scalable, highly performant, large-scale, multiplayer games in Unity.This book explains how to develop multiplayer games using Unity within a commercial or enterprise environment. You will take a look at the networking fundamentals behind multiplayer games, including packets and the importance of keeping packets small. Next, you will look into Mirror Networking and see how to leverage a variety of transport layers to achieve large-scale, multiplayer games. Using Unity 3D as the core focus, you will get an understanding of the RPC/Command architecture and how you can utilize different authoritative structures to best suit your needs. You will also learn how to scale your architecture and explore industry-leading methods of deploying your game to the masses. You will also get a solid understanding of networking principles.The book wraps up with advice from leading experts who shed light on past mistakes and provide valuable insights for your next project. This book breaks down daunting concepts into easy-to-understand pieces of knowledge to help you create your first multiplayer game. It is a must-read for any developer looking to understand multiplayer games and networking.WHAT YOU WILL LEARN● Learn advanced multiplayer concepts and how to use them● Understand the key concepts for creating multiplayer virtual experiences● Know the basics of computer networking and how to employ them● Deploy large, scalable multiplayer infrastructures for your games● Gain insights from other industry professionalsWho Is This Book ForIntermediate to advanced Unity 3D developers looking to understand multiplayer networking and deploying large-scale products. Having a solid understanding of C# and Unity is required, and having an understanding or prior experience with networking principles such as IPv4 would be advantageous.DYLAN ENGELBRECHT is a Unity specialist. Born and raised in South Africa, he has worked at the top enterprise VR development studio in South Africa, and he’s currently working at the largest game development studio on the continent. He has in-depth knowledge of commercial and enterprise game development, with work showcased by invite at Comic-Con Africa and rAge Expo. He is an avid gamer who enjoys immersive experiences and real-time strategy games.Chapter 1: IntroductionSub-Topics● Why you should care about the contents of this book● Prerequisites & ResourcesChapter 2: The Messenger Pigeon, Packets, and a Trip Around the WorldSub-Topics● Introduction to networking● Understanding packets● How packets of data get transported across the world● IPV4 and UDP● The transport layer● The firewall● The importance of keeping your packets smallChapter 2: A Hall of Mirrors and ApathySub-Topics● What is Mirror Networking● Understand where Mirror comes from and why it was created● Learn the limitations of Mirror● Break some of those limitations with Apathy● What is Apathy and where to get it?● The client, the server, and the hostChapter 3: The Chain of CommandSub-Topics:● Game server architecture● Authority● Understanding the chain of command● Remote Procedure Calls (RPC’s)● Commands● Syncvars● Syncvar Hooks● Mirror Events● Creating our first multiplayer gameChapter 4: Memory of a GoldfishSub-Topics:● What are database engines?● Relational vs non-relational databases● A few popular relational database engines with their pros and cons● A few popular non-relational database engines with their pros and cons● Designing the database● Connecting to the database from your game server● Storing information● Retrieving information● Serving information to your playersChapter 5: Scaling Up, A LotSub-Topics: ● The cloud● AWS● Google Cloud● Azure● Unity Multiplay● Hosting your databases● Understanding the bottleneck● How Apex Legends created the perfect launch● Stress testing and stress clients● Things to consider, like securityChapter 6: Insights From the MastersSub-Topics:● 10 Mini-stories and interviews of game developersChapter 7: Challenge What You KnowSub-Topics:● 2 beginner multiplayer challenges● 2 intermediate multiplayer challenges with user data persistence● 1 advanced multiplayer challenge with user and world data persistenceChapter 8: ConclusionSub-Topics:● Next steps for the reader● Best wishes and thanks

Regulärer Preis: 66,99 €
Produktbild für Windows 11 für Senioren

Windows 11 für Senioren

- Texte schreiben, Dateien Speichern, Im Internet surfen, E-Mails versenden, Fotos verwalten- Schritt für Schritt erklärt, leicht nachvolziehbar, mit viele Bildern und BeispielenLernen Sie von Anfang an den sicheren Umgang mit Ihrem PC, Laptop oder Tablet! Mit diesem Handbuch gelingt nicht nur Senioren, sondern allen Computerneulingen der mühelose Einstieg in Windows 11, auch ganz ohne Vorkenntnisse. Anhand leicht nachvollziehbarer Schritt-für-Schritt-Anleitungen sowie mit vielen Beispielen und Bildern erklären die beiden erfahrenen Autorinnen alle notwendigen Techniken, Funktionen und noch vieles mehr. Schon nach kurzer Zeit schreiben und speichern Sie z. B. Briefe, tauschen E-Mails aus, verwalten und bearbeiten Ihre Fotos und surfen im Internet. Legen Sie das Buch mit seinem praktischen Querformat zum Üben vor Ihre Tastatur und freuen Sie sich über schnelle Lernerfolge!Aus dem Inhalt:- Einstellungen und erster Start von Windows 11- Die verschiedenen Apps öffnen und beenden- Einen Brief gestalten und drucken- Dateien speichern und Ordnung halten- Im Internet surfen und E-Mails versenden- Fotos betrachten, bearbeiten und verwalten- Termine eintragen – Erinnerungen erhalten- Bildschirmanzeige individuell anpassen & vergrößern- Glossar mit ausführlichen Begriffserklärungen

Regulärer Preis: 9,99 €
Produktbild für Advanced Unity Game Development

Advanced Unity Game Development

Jump start your Unity game development journey with a detailed review of a complete, professionally built game using Unity, C#, and Visual Studio. Gain invaluable experience with code structure, project structure, centralization of game state data, controlled initialization of script components, AI opponents, multiple input sources, player preferences, a full HUD and menu system, music and sound effects, level/track building, and more.Author Victor Brusca walks you through the game’s code, scripts, and overall structure, all the while showing you how the code works within the Unity engine to define a complete, refined game. Starting with game specifications, the book covers base classes, basic interaction classes, advanced interaction classes, helper classes, input classes, and abstraction of raw input. Next, you'll dive into the menu system and see how a full, complete menu and HUD are coded and set up in the project through a detailed review of the code and working examples. Subsequently, you’ll gain insight on player and game state management, and the author will demystify the component-based structure of Unity games by demonstrating how to maintain order and centralization. Lastly, you will review pertinent build and project settings while learning techniques to profile and check the performance of your games, and tie it all together by building a new racetrack for the included game project.On completing this book, you’ll have gained experience through the detailed review of a hover car racing game using C#, Unity Coding, Visual Studio, Unity C# Project Management, Unity Environment, Unity Project Management and more.WHAT YOU WILL LEARN* Understand Unity project design and implementation with regard to code base and scene hierarchy/game objects* Learn to implement game mechanics connected to Unity scene game objects with working demonstrations* Review professional topics, such as AI opponents, data persistence, menu systems, etc., and implement in the included project* Create a complete game from ground up using prefab models and the code reviewed throughout the textWHO THIS BOOK IS FORReaders with some coding experience, an understanding of classes in an OOP language, and solid experience using the Unity Editor. The code is reviewed and explained in detail on a class-by-class basis while also providing an overview of the overall structure of the code base, project, and scenes.Victor Brusca is an experienced software developer specializing in building cross-platform applications and APIs. He regards himself as a self-starter with a keen eye for detail, an obsessive protection of systems/data, and a desire to write well-documented, well-encapsulated code. With over 14 years' software development experience, he has been involved in game and game engine projects on J2ME, T-Mobile SideKick, WebOS, Windows Phone, Xbox 360, Android, iOS, and web platforms.Chapter 1: Introduction and Getting StartedSub-Topics:Setting Up Your EnvironmentPlaying Hover Racers/Getting ReadyChapter ConclusionChapter 2: Game SpecificationsSub-Topics:Model: Car, Track, SensorModel: Car, Boost, Jump, Bounce ModifiersChapter ConclusionChapter 3: Base ClassSub-Topics:Class Review TemplateClass Review: BaseScriptStatic/Constants/Read-Only Class Members: BaseScriptClass Fields: BaseScriptPertinent Method Outline/Class Header: BaseScriptSupport Method Details: BaseScriptMainMethod Details: BaseScriptDemonstration: BaseScriptChapter ConclusionChapter 4: Interaction ClassesSub-Topics:Class Review: BounceScriptClass Fields: BounceScriptPertinent Method Outline/Class Headers: BounceScriptSupport Method Details: BounceScriptDemonstration: BounceScriptClass Review: Road ScriptClass Fields: RoadScriptPertinent Method Outline/Class Headers: RoadScriptSupport Method Details: RoadScriptMain Method Details: RoadScriptDemonstration: RoadScriptClass Review: WaypointCheckClass Fields: WaypointCheckPertinent Method Outline/Class Headers: WaypointCheckSupport Method Details: WaypointCheckMain Method Details: WaypointCheckDemonstration: WaypointCheckClass Review: TrackHelpScriptPertinent Method Outline/Class Headers: TrackHelpScriptSupport Method Details: TrackHelpScriptMain Method Details: TrackHelpScriptDemonstration: TrackHelpScriptChapter ConclusionChapter 5: Advanced Interaction ClassesSub-Topics:Class Review: CollideScriptStatic/Constants/Read-Only Class Members: CollideScriptClass Fields: CollideScriptPertinent Method Outline/Class Headers: CollideScriptSupport Method Details: CollideScriptMain Method Details: CollideScriptDemonstration: CollideScriptClass Review: CarSensorScriptStatic/Constants/Read-Only Class Members: CarSensorScriptClass Fields: CarSensorScriptPertinent Method Outline/Class Headers: CarSensorScriptSupport Method Details: CarSensorScriptMain Method Details: CarSensorScriptDemonstration: CarSensorScriptChapter ConclusionChapter 6: Helper ClassesSub-Topics:Class Review: DestroyScriptClass Review: WaterResetScriptPertinent Method Outline/Class Headers: WaterResetScriptSupport Method Details: WaterResetScriptMain Method Details: WaterResetScriptDemonstration: WaterResetScriptClass Review: EngineWhineScriptStatic/Constants/Read-Only Class Members: EngineWhineScriptClass Fields: EngineWhineScriptPertinent Method Outline/Class Headers: EngineWhineScriptMain Method Details: EngineWhineScriptDemonstration: EngineWhineScriptClass Review: LapTimeClass Review: LapTimeManagerStatic/Constants/Read-Only Class Members: LapTimeManagerClass Fields: LapTimeManagerPertinent Method Outline/Class Headers: LapTimeManagerSupport Method Details: LapTimeManagerMain Method Details: LapTimeManagerDemonstration: LapTimeManagerClass Review: PopupMsgTrackerDemonstration: PopupMsgTrackerClass Review: UtilitiesStatic Class Members: UtilitiesDemonstration: UtilitiesClass Review: CameraFollowXzStatic/Constants/Read-Only Class Members: CameraFollowXzClass Fields: CameraFollowXzPertinent Method Outline/Class Headers: CameraFollowXzMain Method Details: CameraFollowXzDemonstration: CameraFollowXzClass Review: WaypointCompareDemonstration: WaypointCompareChapter ConclusionChapter 7: Input ClassesSub-Topics:Class Review: CharacterMotorMovementClass Review: CharacterMotorJumpingClass Review: CharacterMotorSlidingClass Review: CharacterMotorClass Fields: CharacterMotorPertinent Method Outline/Class Headers: CharacterMotorSupport Method Details: CharacterMotorMain Method Details: CharacterMotorDemonstration: CharacterMotorClass Review: FPSInputControllerClass Fields: FPSInputControllerPertinent Method Outline/Class Headers: FPSInputControllerMain Methods Details: FPSInputControllerDemonstration: FPSInputControllerClass Review: MouseLookNewEnumerations: MouseLookNewClass Fields: MouseLookNewPertinent Method Outline/Class Headers: MouseLookNewMain Method Details: MouseLookNewDemonstration: MouseLookNewClass Review: GameState (Touch Input Snippet Only)Chapter ConclusionChapter 8: Menu System ClassesSub-Topics:Class Review: BasePromptScriptClass Fields: BasePromptScriptPertinent Method Outline/Class Headers: BasePromptScriptSupport Method Details: BasePromptScriptMain Method Details: BasePromptScriptDemonstration: BasePromptScriptClass Review: GamePauseMenuPertinent Method Outline/Class Headers: GamePauseMenuSupport Method Details: GamePauseMenuMain Method Details: GamePauseMenuDemonstration: GamePauseMenuClass Review: GameHelpMenuClass Fields: GameHelpMenuPertinent Method Outline/Class Headers: GameHelpMenuSupport Method Details: GameHelpMenuInput Handler Support Method Details: GameHelpMenuMain Method Details: GameHelpMenuDemonstration:GameHelpMenuRemaining Menu ClassesChapter ConclusionChapter 9: Player and Game State Classes Part 1Sub-Topics:Class Review: PlayerInfoClass Review: TrackScriptClass Review: PlayerStateStatic/Constants/Read-Only Class Members: PlayerStateClass Fields: PlayerStatePertinent Method Outline/Class Header: PlayerStateSupport Method Details: PlayerStateMain Method Details: PlayerStateDemonstration: PlayerStateChapter 10: Player and Game State Classes Part 2Sub-Topics:Class Review: GameStateEnumerations: GameStateStatic/Constant/Read-Only Class Members: GameStateClass Fields: GameStatePertinent Method Outline/Class Headers: GameStateSupport Method Details: GameStateMain Method Details: GameStateDemonstration: GameStateChapter ConclusionChapter 11: Making it ProfessionalSub-Topics:Build SettingsGeneric Platform SettingsPC, Mac, and Linux Desktop SettingsUniversal Windows Platform (UWP) SettingsiOS SettingsAndroid SettingsWebGL SettingsInput MappingUI / Menu SystemData PersistenceMemory ManagementSounds and MusicStatic ObjectsTags and LayersAI OpponentsCamerasProject SettingsChapter ConclusionChapter 12: Adding a New RacetrackSub-Topics:Track Environment and Cleanup ScriptHover Racers and the GameState ObjectTrack and Waypoint ObjectsJumps, Boosts, Menu Screens, and MoreChapter ConclusionChapter 13: ConclusionSub-Topics:AccomplishmentsAcknowledgementsWhere You Go From HereSaying Goodbye

Regulärer Preis: 66,99 €
Produktbild für Azure Cloud Security for Absolute Beginners

Azure Cloud Security for Absolute Beginners

Implement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure.Author PUSHPA HERATH begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure storage are discussed, as are key platform security factors. Network security groups, gateways, load balancers, virtual networks and firewall configurations are all demonstrated in detail. Finally, you’ll learn how to create a much more secure environment through Azure App Service Environment in the context of securing infrastructure. If you want to learn the basics of securing Azure, Azure Cloud Security for Absolute Beginners is for you.After reading the book, you will be able to begin implementing secure cloud solutions with Microsoft Azure.WHAT WILL YOU LEARN* Get up and running quickly securing Azure* Master the basic language of Azure security* Understand the security features available in Azure cloud* Configure and maintain Azure cloud security features* Secure Azure PaaS Services* Learn identity and access management options in Azure CloudWHO IS THIS BOOK FORCloud engineers, DevOps engineers, software developers and architects who are asked to manage or are involved in the Azure infrastructure management but have not had all that much experience with security. PUSHPA HERATH is a Microsoft Most Valuable Professional (MVP) in development technologies and an author, blogger and speaker at technical community events. She is the Senior DevOps Engineer at 99x (Pvt) Ltd. She has many years of experience in DevOps with Azure DevOps, Octopus, JIRA and many other DevOps tools. She icurrently leads the DevOps community in Sri Lanka, and she has shown in depth knowledge in Azure cloud platform tools in her community activities. She is an expert on functional test automation using Selenium and BDD.Pushpa blogs on technology, and has experience with Microsoft tools (C#, Azure DevOps, SQL Server, and Azure) and other tools (Octopus, Jira, BitBucket, MAQS, Sikuli). She has published five books with Apress and spoken at community events and published videos on the Sri Lanka DevOps community YouTube channel.CHAPTER 1: UNDERSTANDING THE IMPORTANCE OF DATA/APPLICATION SECURITYCHAPTER GOAL: Give general overview on importance of data securityNO OF PAGES: 5SUB -TOPICS1. Introduction to security2. Introduction to Azure security fundamentalsCHAPTER 2: OVERVIEW OF BASIC AZURE SECURITY COMPONENTSCHAPTER GOAL: Introduction to various security components in Azure and how to utilize them.NO OF PAGES: 15SUB - TOPICS1. Introduction to Azure Management groups and subscriptions2. Azure Management locks3. Introduction to Azure policiesCHAPTER 3: INTRODUCTION TO AZURE ACTIVE DIRECTORYCHAPTER GOAL: Lessons to provide hand-on guidance on user access control of the organization using Azure Active Directory.NO OF PAGES : 30SUB - TOPICS:1. Adding users and groups to the AD2. Manage External Identities3. Enable two factor authentications4. Roles and Administrative units in Azure AD5. Managing Enterprise applications6. Introduction to AD devices7. Azure AD app registration8. Adding custom domainsCHAPTER 4: WORKING WITH AZURE KEY VAULTCHAPTER GOAL: Step by step guidance to setting up and using azure key vault to achieve several security requirements in the organization.NO OF PAGES: 15SUB - TOPICS:1. Setting up Key vault2. Key vault access control3. Using KV to save Keys4. Using KV to secure Secrets5. Using KV to keep certificates6. Key vault access policies7. KV networking and securityCHAPTER 5: ENSURE AZURE APPLICATION SECURITYCHAPTER GOAL: Step by step guidance to setting up various security components which helps to secure application hosted in AzureNO OF PAGES: 40SUB - TOPICS:1. Keep configurations in central location using Azure Configuration2. Authentication and authorization in Azure App Service3. How to secure application with web application firewall in Azure4. Application Security groupsCHAPTER 6: ENSURE DATA SECURITY WITH AZURE STORAGESCHAPTER GOAL: Overview on how data storage security works in AzureNO OF PAGES: 30SUB - TOPICS:1. Setting up azure storage2. Azure storage encryption3. Azure defender for azure storageCHAPTER 7: ENSURE SECURITY USING AZURE VIRTUAL NETWORKSCHAPTER GOAL: Step by step guide on how to setup virtual networks to enhance the security of the data and infrastructure.NO OF PAGES: 40SUB - TOPICS:1. Network security groups2. Azure VPN gateways3. Azure Load balancer4. Azure SubnetsCHAPTER 8: WORKING WITH AZURE APPLICATION GATEWAYCHAPTER GOAL: Hands on lessons on implementing Azure Application gateway to enhance the security of the dataSUB - TOPICS:1. Setting up Azure Application gateway2. Secure Web App using App gateway3. Secure Virtual Machine using App gatewayCHAPTER 9: SECURING DATA WITH AZURE FIREWALLCHAPTER GOAL: Step by step guidance to setting up azure firewall and configure it to secure dataNO OF PAGES: 40SUB - TOPICS:1. Setting up Azure Firewall2. Setting up policies3. Setting up rulesCHAPTER 10: CREATING APP SERVICE ENVIRONMENT TO ENHANCE SECURITYCHAPTER GOAL: Step by step guidance to setting up App service environment and using it to secure applicationsNO OF PAGES: 50SUB - TOPICS:1. Setting up Azure Application service environment2. Deploy applications to app service environmentCHAPTER 11: SECURE INFRASTRUCTURES IN AZURECHAPTER GOAL: Explains different security features available with few of the azure resourcesNO OF PAGES: 30SUB - TOPICS:1. Secure Azure Virtual machine using Bastian2. Secure Azure Virtual machine using encrypted firewall rules3. Azure SQL server security components

Regulärer Preis: 56,99 €
Produktbild für More Java 17

More Java 17

Work with the essential and advanced features of the Java 17 release. This book covers features such as annotations, reflection, and generics. These topics are then complemented by details of how to use lambda expressions, allowing you to build powerful and efficient Java programs. Furthermore, added to this edition you'll find topics on network programming, Java RMI, the process API, and custom runtime images. The authors provide a multitude of diagrams and complete programs to help you visualize and better understand the topics covered in this book.More Java 17, Third Edition starts with a series of chapters on the essential language features provided by Java before moving on to Java module development and packaging, and improved interop with other languages. After reading this book, you'll have the know-how of a professional Java programmer and be able to tackle most projects with confidence.This book's source code can be accessed at github.com/Apress/more-java-17.WHAT YOU WILL LEARN* Use essential and advanced features of the Java language* Code Java annotations* Work with reflection and generics* Manage streams with the Stream APIWHO THIS BOOK IS FORThose new to Java programming who are continuing the Java learning journey; it is recommended that you read an introductory Java programming book first, such as Java 17 for Absolute Beginners, from Apress.KISHORI SHARAN has earned a master of science in computer information systems degree from Troy State University, Alabama. He is a Sun Certified Java 2 programmer. He has vast experience in providing training to professional developers in Java, JSP, EJB, and web technology. He possesses over ten years of experience in implementing enterprise-level Java applications.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects. In 2016, he decided to concentrate on writing books on various aspects, but with a main focus on software development. With two books about graphics and sound processing, three books on Android app development, and a beginner’s book on Jakarta EE development, the author continues his effort in writing software development-related literature.1. Annotations2. Inner Classes3. Reflection4. Generics5. Lambda Expressions6. Threads7. Input Output8. Working with Archive Files9. New Input Output NIO10. New Input Output 2.011. Garbage Collection12. Collections13. Streams14. Implementing Services15. The Module API16. Breaking Module Encapsulation17. Reactive Streams18. Stack Walking19. Network Programming20. JDBC API21. Java Remote Method Invocation22. Java Native Interface23. Process API24. Packaging Modules25. Custom Runtime Images

Regulärer Preis: 79,99 €
Produktbild für Practical Entity Framework Core 6

Practical Entity Framework Core 6

Take a developer journey that paves the way to enterprise-level database access from .NET and C# using the object-relational mapper (ORM) of choice. This second edition is revised to cover Entity Framework Core 5 and 6 (EF) and includes new content on table-per-type mapping, LINQ improvements (filtered includes), many-to-many navigation changes, split queries, simple logging using the DBCommandInterceptor, and other improvements available in EF Core 6. Real-world examples and considerations are presented in this book to help you create robust and efficient database solutions. Throughout the text, actual problems, questions, and common pitfalls are provided to help you recognize optimal solutions for maximum success in the different application scenarios you might encounter.PRACTICAL ENTITY FRAMEWORK CORE 6 focuses on the code first approach to developing a database. Taking the code first approach allows the entire database to be built and maintained in code using EF Core 6 so there is never a situation in which you cannot restore the database schema. Additionally, the code first approach creates an entirely transparent record of changes to the database that is easily tracked in source control systems such as GitHub. Emphasis throughout the book is on leaving you well positioned to architect and lead data development efforts for your organization.WHAT YOU WILL LEARN* Build robust and maintainable databases using a code first approach* Create and execute stored procedures, triggers, and functions* Analyze and optimize performance of database queries* Ensure data integrity through keys, constraints, and relationships* Encrypt your database columns at rest with TDE and Always-On Encryption * Leverage the FluentAPI and attributes for entity configurationWHO THIS BOOK IS FOR.NET developers who work with enterprise-level applications and need to interact with data structures and data within the back end data store, developers who want to take a code first approach to building database applications to prevent conflicts and optimize efficiency, and those who are moving into full-stack roles, or into senior and architectural roles, and will be responsible for database design and implementationBRIAN GORMAN is a Microsoft Azure MVP, developer, computer science instructor, and trainer, and has been working in .NET technologies as long as they have existed. He was originally MCSD certified in .NET 1 and re-certified with MCSA: Web Apps and MCSD: App Builder certifications in 2019. From 2019 to 2021, Brian has earned nine Azure certifications, including Azure and Data Fundamentals, Azure Administrator, Database Administrator, Security Engineer and Developer Associate certifications, Azure Solutions Architect and DevOps Expert certifications, and an IoT Specialty certification.Additionally, Brian became an MCT as of April 2019, and is focusing on developing and training developers with full-stack web solutions with .NET Core and Azure. Most recently, Brian has been employed as a Senior Training Architect with Opsgility.In addition to working with .NET technologies, Brian has been an adjunct faculty member in the computer science department for Franklin University for the last 11 years, where his courses have included data structures, algorithms, design patterns, and, more recently, full-stack solutions in the capstone practicum course.IntroductionPART I. GETTING STARTED1. Introduction to Entity Framework2. Working with an Existing Database3. Entity Framework: Code FirstPART II. BUILDING THE DATA SOLUTION4. Models and the Data Context5. Constraints, Keys, and Relationships6. Data Access (Create, Read, Update, Delete)7. Stored Procedures, Views, and Functions8. Sorting, Filtering, and PagingPART III. ENHANCING THE DATA SOLUTION9. LINQ for Queries and Projections10. Encryption of Data11. Repository and Unit of Work Patterns12. Unit Testing, Integration Testing, and Mocking13. Asynchronous Data Operations and Multiple Database ContextsPART IV. RECIPES FOR SUCCESS14. .NET 5 and EFCore515. .NET 6 and EF Core 616. Appendix A: Troubleshooting

Regulärer Preis: 54,99 €