Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für MERN Projects for Beginners

MERN Projects for Beginners

Learn how to use the MERN stack (MongoDB, Express.js, React, and Node) to build five fully functioning web apps for dating, video sharing, messaging, and social media. While creating these web apps, you’ll learn key development concepts including how to use React hooks, Redux, MongoDB, Express, Heroku, Firebase, Material UI, and Google authentication. By expanding your portfolio with the projects you create, you will be well equipped as front-end developer.You will first create a dating site with a swiping feature and chat functionality. You will then build a video sharing app with videos displaying vertically. Next, you will learn to build an awesome messaging web app. Users will be able to chat in real time, as well as log in to their account using Google authentication. You will also create a photo sharing app and social media web apps with the ability to post images with captions and log in using email and password authentication.Most MERN tutorials out there today cover basic web apps but it is capable of so much more – learn how to use this stack to its full potential and build projects that can be converted into full scaled start-ups with additional features.WHAT YOU'LL LEARN* Work with React hooks and React router* Examine powerful MongoDB services for easy to use and setup* Create routes using Node and host on Heroku* Study different authentication techniques* Deploy all sites using simple Firebase hosting* Use the powerful React ecosystem to add functionalities to your appsWHO THIS BOOK IS FORThose who have just started their career in web development and have basic knowledge of the core web technologies: HTML, CSS, and JavaScript. Those with basic React development and feel ready to explore its capabilities further.NABENDU BISWAS is a full stack JavaScript developer who has been working in the IT industry for the past 16 years and has worked for some of the world’s top development firms and investment banks. He is a passionate tech blogger who publishes on dev.to and medium.com and on thewebdev.tech. He is an all-round nerd, passionate about everything JavaScript, React and Gatsby. You can find him on Twitter @nabendu82.Chapter One: Setting Up Our EnvironmentChapter Two: Dating App· Firebase hosting initial setup· React basic setup· Adding Swipe functionality· Setting up MongoDB database· Creating NodeJS schema and routes· Integrating backend with React· Deploying backend in heroku· Hosting through firebaseChapter Three : Video Sharing App· Firebase hosting initial setup· React basic setup· Adding Short videos to site· Adding snap feature to video· Setting up MongoDB database· Creating NodeJS schema and routes· Integrating backend with React· Deploying backend in heroku· Hosting through firebaseChapter Four: Messaging App· Firebase hosting initial setup· React basic setup· Creating Sidebar component showing rooms· Creating the Chat functionality· Setting up MongoDB database· Creating NodeJS schema and routes· Adding real-time chat with Pusher· Integrating backend with React· Adding Google authentication· Deploying backend in heroku· Hosting through firebaseChapter Five: Photo-based Social Network· Firebase hosting initial setup· React basic setup· Showing images with caption on site· Setting up MongoDB database· Creating NodeJS schema and routes· Adding real-time posts with Pusher· Integrating backend with React· Adding email/password authentication· Adding Signup and Sign-in to site· Adding ability to add post· Adding ability to comment on post· Deploying backend in heroku· Hosting through firebaseChapter Six: More Complex Social Network· Firebase hosting initial setup· React basic setup and adding styled components· Showing basic structure of the site· Adding Google authentication· Setting up MongoDB database· Creating NodeJS schema and routes· Adding file upload with Multer· Integrating backend with React· Adding ability to add post· Adding real-time posts with Pusher· Deploying backend in heroku· Hosting through firebase

Regulärer Preis: 66,99 €
Produktbild für The Self-Taught Computer Scientist

The Self-Taught Computer Scientist

THE FOLLOW-UP TO CORY ALTHOFF'S BESTSELLING THE SELF-TAUGHT PROGRAMMER, WHICH INSPIRED HUNDREDS OF THOUSANDS OF PROFESSIONALS TO LEARN TO PROGRAM OUTSIDE OF SCHOOL!Fresh out of college and with just a year of self-study behind him, Cory Althoff was offered a dream first job as a software engineer for a well-known tech company, but he quickly found himself overwhelmed by the amount of things he needed to know, but hadn’t learned yet. This experience combined with his personal journey learning to program inspired his widely praised guide, The Self-Taught Programmer. Now Cory's back with another guide for the self-taught community of learners focusing on the foundations of computer science.The Self-Taught Computer Scientist introduces beginner and self-taught programmers to computer science fundamentals that are essential for success in programming and software engineering fields. Computer science is a massive subject that could cover an entire lifetime of learning. This book does not aim to cover everything you would learn about if you went to school to get a computer science degree. Instead, Cory's goal is to give you an introduction to some of the most important concepts in computer science that apply to a programming career. With a focus on data structures and algorithms, The Self-Taught Computer Scientist helps you fill gaps in your knowledge, prepare for a technical interview, feel knowledgeable and confident on the job, and ultimately, become a better programmer.* Learn different algorithms including linear and binary search and test your knowledge with feedback loops* Understand what a data structure is and study arrays, linked lists, stacks, queues, hash tables, binary trees, binary heaps, and graphs* Prepare for technical interviews and feel comfortable working with more experienced colleagues* Discover additional resources and tools to expand your skillset and continue your learning journeyIt's as simple as this: You have to study computer science if you want to become a successful programmer, and if you don't understand computer science, you won't get hired. Ready for a career in programming, coding, or software engineering and willing to embrace an "always be learning" mindset? The Self-Taught Computer Scientist is for you.CORY ALTHOFF is a programmer, speaker, and author whose work includes The Self-Taught Programmer and The Self-Taught Computer Scientist. After graduating with a major in political science, Cory taught himself to program, eventually becoming a software engineer at eBay. Cory's books have been translated into eight languages, and he has been featured in publications like Forbes and CNBC. Over 250K developers are part of the self-taught programmer community he created through his popular Facebook group, course, and newsletter. Cory is a senior vice president at CompTIA, where he helps people learn the skills they need to have successful careers in tech. Cory lives in California with his wife and daughter.Introduction xivI INTRODUCTION TO ALGORITHMS 11 WHAT IS AN ALGORITHM? 3Analyzing Algorithms 4Constant Time 8Logarithmic Time 9Linear Time 10Log-Linear Time 11Quadratic Time 11Cubic Time 13Exponential Time 14Best-Case vs. Worst-Case Complexity 15Space Complexity 15Why is This Important? 16Vocabulary 17Challenge 182 RECURSION 19When to Use Recursion 23Vocabulary 23Challenge 233 SEARCH ALGORITHMS 25Linear Search 25When to Use a Linear Search 27Binary Search 27When to Use a Binary Search 30Searching for Characters 32Vocabulary 34Challenge 354 SORTING ALGORITHMS 37Bubble Sort 37When to Use Bubble Sort 41Insertion Sort 42When to Use Insertion Sort 45Merge Sort 45When to Use Merge Sort 52Sorting Algorithms in Python 53Vocabulary 54Challenge 545 STRING ALGORITHMS 55Anagram Detection 55Palindrome Detection 56Last Digit 57Caesar Cipher 58Vocabulary 61Challenge 616 MATH 63Binary 63Bitwise Operators 66FizzBuzz 70Greatest Common Factor 72Euclid’s Algorithm 74Primes 75Vocabulary 77Challenge 787 SELF-TAUGHT INSPIRATION: MARGARET HAMILTON 79II DATA STRUCTURES 818 WHAT IS A DATA STRUCTURE? 83Vocabulary 85Challenge 869 ARRAYS 87Array Performance 88Creating an Array 90Moving Zeros 91Combining Two Lists 94Finding the Duplicates in a List 95Finding the Intersection of Two Lists 98Vocabulary 99Challenge 10010 LINKED LISTS 101Linked List Performance 103Create a Linked List 104Search a Linked List 107Removing a Node from a Linked List 108Reverse a Linked List 109Finding a Linked List Cycle 110Vocabulary 111Challenges 11211 STACKS 113When to Use Stacks 114Creating a Stack 115Using Stacks to Reverse Strings 119Min Stack 120Stacked Parentheses 123Vocabulary 125Challenges 12512 QUEUES 127When to Use Queues 128Creating a Queue 129Python’s Built-In Queue Class 134Create a Queue Using Two Stacks 134Vocabulary 136Challenge 13613 HASH TABLES 137When to Use Hash Tables 140Characters in a String 141Two Sum 143Vocabulary 144Challenge 14514 BINARY TREES 147When to Use Trees 150Creating a Binary Tree 153Breadth-First Tree Traversal 155More Tree Traversals 157Invert a Binary Tree 160Vocabulary 162Challenges 16215 BINARY HEAPS 163When to Use Heaps 167Creating a Heap 167Connecting Ropes with Minimal Cost 169Vocabulary 171Challenge 17116 GRAPHS 173When to Use Graphs 177Creating a Graph 178Dijkstra’s Algorithm 180Vocabulary 186Challenge 18717 SELF-TAUGHT INSPIRATION: ELON MUSK 18918 NEXT STEPS 191What’s Next? 191Climbing the Freelance Ladder 192How to Get an Interview 192How to Prepare for a Technical Interview 193Additional Resources 194Final Thoughts 194Index 195

Regulärer Preis: 21,99 €
Produktbild für Developer Relations

Developer Relations

Increasingly, business leaders are either looking to start a new developer program at their company or looking to increase the impact of their existing DevRel program. In this context, software developers are finally recognized as legitimate decision makers in the technology buying process, regardless of the size of their organization. New companies are appearing with the sole purpose of making tools for developers, and even companies whose primary focus was elsewhere are waking up to the developer opportunity. Even as the need and demand for DevRel has grown, there are still re-occurring challenges for DevRel leaders.It is these challenges that this book addresses, covering all aspects of a DevRel program. It is an essential reference to professionalize the practice of developer relations by providing you with strategic, repeatable, and adoptable frameworks, processes, and tools, including developer segmentation and personas, and developer experience frameworks.InDeveloper Relations, you’ll find the answers to the following questions:* How do we convince stakeholders to support a program?* How do we go about creating a program?* How do we make developers aware of our offer?* How do we stand out from the crowd?* How do we get developers to use our products?* How do we ensure developers are successful using our products?* How do we measure success?* How do we maintain the support of our stakeholders?After reading this book you’ll have a clear definition of what developer relations is, the type of companies that engage in DevRel, and the scope and business models involved.WHAT YOU WILL LEARN* Discover what developer relations is and how it contributes to a company’s success* Launch a DevRel program * Operate a successful program * Measure the success of your program* Manage stakeholders WHO THIS BOOK IS FORThose interested in starting a new developer program or looking to increase the impact of their existing one. From executives to investors, from marketing professionals to engineers, all will find this book useful to realize the impact of developer relations.PART 1: DEVELOPING A COMMON UNDERSTANDING.- 1. What is Developer Relations?.- 2. Where does Developer Relations Fit?- 3. The Origin of Developer Relations & The Rise of the Developer.- 4. The Value of the Developer Economy.- PART 2: THE KEY DIFFERENTIATORS OF DEVELOPER RELATIONS.- 5. The Audience: Developers.- 6. Developers as Decision Makers.- 7. Developer First & Dev Plus.- 8.Business Models.- 9. Developer Products.- PART 3: ALIGNMENT ON GOALS.- 10. Corporate Alignment.- 11. Program Goals.- PART 4: GO TO MARKET/STRATEGY ACTIVATION.- 12. Developer Segmentation.- 13. Developer Personas.- 14. Developer Messaging.- 15. The Developer Journey.- 16. Discover.- 17. Developer Experience.- 18. Evaluate.- 19. Learn.- 20. Build.- 21. Scale.- 22. Communities.-PART 5: MEASURE.- 23. Metrics.- PART 6: GROWING YOUR PROGRAM.- 24. Team.- 25. Program Maturity.- 26. What Comes Next?.- Appendix.

Regulärer Preis: 52,99 €
Produktbild für Information Security

Information Security

PROVIDES SYSTEMATIC GUIDANCE ON MEETING THE INFORMATION SECURITY CHALLENGES OF THE 21ST CENTURY, FEATURING NEWLY REVISED MATERIAL THROUGHOUTInformation Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, security protocols, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data.Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, Elliptic-curve cryptography (ECC), and hash functions based on bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, and more. Presenting a highly practical approach to information security, this popular textbook:* Provides up-to-date coverage of the rapidly evolving field of information security* Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols* Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments* Discusses software tools used for malware detection, digital rights management, and operating systems security* Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resourcesInformation Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.To request supplementary materials, please contact mark.stamp@sjsu.edu and visit the author-maintained website for more: https://www.cs.sjsu.edu/~stamp/infosec/ [https://urldefense.com/v3/__https:/www.cs.sjsu.edu/*stamp/infosec/__;fg!!N11eV2iwtfs!vQiT_RPMbK65YTVJVaaG1i4R6paBRZB91H3juc9ejhGB1vRRIH-7YPUI7_GjtuXF_7mJyM39sfFjrtfZOkSIbw$] .MARK STAMP, PHD, has more than 25 years of experience in the field of information security. He has worked in industry, in academia as Professor of Computer Science, and in government as a cryptologic scientist for the National Security Agency. He has written dozens of academic papers, numerous journal articles, and two books on the topic of information security. Preface xvAbout The Author xixAcknowledgments xxi1 Introductions 11.1 The Cast of Characters 11.2 Alice's Online Bank 21.2.1 Confidentiality, Integrity, and Availability 21.2.2 Beyond CIA 21.3 About This Book 41.3.1 Cryptography 41.3.2 Access Control 51.3.3 Network Security 61.3.4 Software 61.4 The People Problem 71.5 Principles and Practice 71.6 Problems 8I Crypto 132 Classic Cryptography 152.1 Introduction 152.2 How to Speak Crypto 152.3 Classic Crypto 172.3.1 Simple Substitution Cipher 182.3.2 Cryptanalysis of a Simple Substitution 202.3.3 Definition of Secure 212.3.4 Double Transposition Cipher 222.3.5 One-Time Pad 232.3.6 Codebook Cipher 27viii CONTENTS2.4 Classic Crypto in History 282.4.1 Ciphers of the Election of 1876 282.4.2 Zimmermann Telegram 302.4.3 Project VENONA 322.5 Modern Crypto History 332.6 A Taxonomy of Cryptography 362.7 A Taxonomy of Cryptanalysis 372.8 Summary 392.9 Problems 393 Symmetric Ciphers 453.1 Introduction 453.2 Stream Ciphers 463.2.1 A5/1 473.2.2 RC4 493.3 Block Ciphers 513.3.1 Feistel Cipher 513.3.2 DES 523.3.3 Triple DES 573.3.4 AES 593.3.5 TEA 623.3.6 Block Cipher Modes 643.4 Integrity 683.5 Quantum Computers and Symmetric Crypto 703.6 Summary 723.7 Problems 724 Public Key Crypto 794.1 Introduction 794.2 Knapsack 824.3 RSA 854.3.1 Textbook RSA Example 874.3.2 Repeated Squaring 884.3.3 Speeding Up RSA 904.4 Diffie-Hellman 914.5 Elliptic Curve Cryptography 934.5.1 Elliptic Curve Math 934.5.2 ECC Diffie-Hellman 954.5.3 Realistic Elliptic Curve Example 964.6 Public Key Notation 974.7 Uses for Public Key Crypto 984.7.1 Confidentiality in the Real World 984.7.2 Signatures and Non-repudiation 99CONTENTS ix4.7.3 Confidentiality and Non-repudiation 994.8 Certificates and PKI 1024.9 Quantum Computers and Public Key 1044.10 Summary 1064.11 Problems 1065 Crypto Hash Functions++ 1155.1 Introduction 1155.2 What is a Cryptographic Hash Function? 1165.3 The Birthday Problem 1175.4 A Birthday Attack 1195.5 Non-Cryptographic Hashes 1205.6 SHA-3 1215.7 HMAC 1245.8 Cryptographic Hash Applications 1265.8.1 Online Bids 1265.8.2 Blockchain 1275.9 Miscellaneous Crypto-Related Topics 1365.9.1 Secret Sharing 1365.9.2 Random Numbers 1405.9.3 Information Hiding 1435.10 Summary 1475.11 Problems 147II Access Control 1596 Authentication 1616.1 Introduction 1616.2 Authentication Methods 1626.3 Passwords 1636.3.1 Keys Versus Passwords 1646.3.2 Choosing Passwords 1646.3.3 Attacking Systems via Passwords 1666.3.4 Password Verification 1676.3.5 Math of Password Cracking 1686.3.6 Other Password Issues 1736.4 Biometrics 1746.4.1 Types of Errors 1766.4.2 Biometric Examples 1766.4.3 Biometric Error Rates 1816.4.4 Biometric Conclusions 1826.5 Something You Have 182x CONTENTS6.6 Two-Factor Authentication 1836.7 Single Sign-On and Web Cookies 1836.8 Summary 1846.9 Problems 1857 Authorization 1957.1 Introduction 1957.2 A Brief History of Authorization 1967.2.1 The Orange Book 1967.2.2 The Common Criteria 1997.3 Access Control Matrix 2007.3.1 ACLs and Capabilities 2017.3.2 Confused Deputy 2027.4 Multilevel Security Models 2047.4.1 Bell-LaPadula 2067.4.2 Biba's Model 2077.4.3 Compartments 2087.5 Covert Channels 2107.6 Inference Control 2127.7 CAPTCHA 2147.8 Summary 2167.9 Problems 216III Topics in Network Security 2218 Network Security Basics 2238.1 Introduction 2238.2 Networking Basics 2238.2.1 The Protocol Stack 2258.2.2 Application Layer 2268.2.3 Transport Layer 2288.2.4 Network Layer 2318.2.5 Link Layer 2338.3 Cross-Site Scripting Attacks 2358.4 Firewalls 2368.4.1 Packet Filter 2388.4.2 Stateful Packet Filter 2408.4.3 Application Proxy 2408.4.4 Defense in Depth 2428.5 Intrusion Detection Systems 2438.5.1 Signature-Based IDS 2458.5.2 Anomaly-Based IDS 246CONTENTS xi8.6 Summary 2508.7 Problems 2509 Simple Authentication Protocols 2579.1 Introduction 2579.2 Simple Security Protocols 2599.3 Authentication Protocols 2619.3.1 Authentication Using Symmetric Keys 2649.3.2 Authentication Using Public Keys 2679.3.3 Session Keys 2689.3.4 Perfect Forward Secrecy 2709.3.5 Mutual Authentication, Session Key, and PFS 2739.3.6 Timestamps 2739.4 ``Authentication"" and TCP 2759.5 Zero Knowledge Proofs 2789.6 Tips for Analyzing Protocols 2829.7 Summary 2849.8 Problems 28410 Real-World Security Protocols 29310.1 Introduction 29310.2 SSH 29410.2.1 SSH and the Man-in-the-Middle 29510.3 SSL 29610.3.1 SSL and the Man-in-the-Middle 29910.3.2 SSL Connections 30010.3.3 SSL Versus IPsec 30010.4 IPsec 30110.4.1 IKE Phase 1 30210.4.2 IKE Phase 2 30910.4.3 IPsec and IP Datagrams 31010.4.4 Transport and Tunnel Modes 31110.4.5 ESP and AH 31310.5 Kerberos 31410.5.1 Kerberized Login 31610.5.2 Kerberos Ticket 31610.5.3 Security of Kerberos 31810.6 WEP 31910.6.1 WEP Authentication 31910.6.2 WEP Encryption 32010.6.3 WEP Non-Integrity 32010.6.4 Other WEP Issues 32110.6.5 WEP: The Bottom Line 322xii CONTENTS10.7 GSM 32210.7.1 GSM Architecture 32310.7.2 GSM Security Architecture 32410.7.3 GSM Authentication Protocol 32610.7.4 GSM Security Flaws 32710.7.5 GSM Conclusions 32910.7.6 3GPP 33010.8 Summary 33010.9 Problems 331IV Software 33911 Software Flaws and Malware 34111.1 Introduction 34111.2 Software Flaws 34111.2.1 Buffer Overflow 34511.2.2 Incomplete Mediation 35611.2.3 Race Conditions 35611.3 Malware 35811.3.1 Malware Examples 35911.3.2 Malware Detection 36511.3.3 The Future of Malware 36711.3.4 The Future of Malware Detection 36911.4 Miscellaneous Software-Based Attacks 36911.4.1 Salami Attacks 36911.4.2 Linearization Attacks 37011.4.3 Time Bombs 37111.4.4 Trusting Software 37211.5 Summary 37311.6 Problems 37312 Insecurity in Software 38112.1 Introduction 38112.2 Software Reverse Engineering 38212.2.1 Reversing Java Bytecode 38412.2.2 SRE Example 38512.2.3 Anti-Disassembly Techniques 39012.2.4 Anti-Debugging Techniques 39112.2.5 Software Tamper Resistance 39212.3 Software Development 39312.3.1 Flaws and Testing 39512.3.2 Secure Software Development? 396CONTENTS xiii12.4 Summary 39612.5 Problems 397Appendix 403A-1 Modular Arithmetic 403A-2 Permutations 405A-3 Probability 406A-4 DES Permutations 406Index 418

Regulärer Preis: 103,99 €
Produktbild für Performance Testing

Performance Testing

Use this book to prepare for the ISTQB® Certified Tester Foundation Level Performance Testing exam. The book has been designed to follow the ISTQB syllabus, covering all of the syllabus learning objectives, with additional reference material extending beyond the syllabus. The book covers an overall methodology for managing and conducting performance testing.Performance testing has often been considered a black art. In many organizations, perhaps an individual or a small group of technical staff or contractors is given the task of “load testing” an extended system, network, or application.Performance testing is like any other form of testing. It follows a defined test process that is similar to other test types. It utilizes a disciplined approach to the definition of requirements and user stories, the creation of test conditions, test cases, and test procedures. It establishes measurable goals against which the success or failure of the testing can be judged. It also requires (and this cannot be stressed highly enough) a definition and recognition of performance test failures.Readers will gain the knowledge with both content and practice questions to prepare them for the ISQTB Performance Testing exam. The book covers the performance test types, the performance testing methodology, and the steps to plan, create, and execute performance tests and analyze the results.WHAT YOU WILL LEARN* Understand the basic concepts of performance efficiency and performance testing* Define performance risks, goals, and requirements to meet stakeholder needs and expectations* Understand performance metrics and how to collect them* Develop a performance test plan for achieving stated goals and requirements* Conceptually design, implement, and execute basic performance tests* Analyze the results of a performance test and communicate the implications to stakeholders* Explain the process, rationale, results, and implications of performance testing to stakeholders* Understand the categories and uses for performance tools and criteria for their selection* Determine how performance testing activities align with the software life cycleWHO THIS BOOK IS FORThose who want to achieve the ISTQB performance testing certification, testers and test managers who want to increase their performance testing knowledge, and project managers/staff working with performance testing in their project for the first timeAfter a circuitous route into IT, KEITH YORKSTON has spent the last 20 years involved with software quality and risk. Cutting his teeth early in performance testing before good books were written on the subject, Keith went on to work as a consultant and trainer across the world. He currently works as an independent consultant specializing in performance and security.IntroductionChapter 1. The Basic Concepts of Performance TestingISTQB® KeywordsOther Keywords1.1 Principles of Performance Testing1.2 Types of Performance TestingPerformance TestingLoad TestingStress TestingScalability TestingSpike TestingEndurance TestingConcurrency TestingCapacity Testing1.3 Testing Activities in Performance TestingStatic TestingDynamic Testing1.4 The Concept of Load GenerationLoad Generation via the User InterfaceLoad Generation Using CrowdsLoad Generation via the Application Programming Interface (API)Load Generation using Captured Communication Protocols1.5 Common Performance Efficiency Failure Modes and Their CausesChapter 1 QuestionsChapter 2. Performance Measurement FundamentalsISTQB® KeywordsOther Keywords2.1 Typical Measurements Collected in Performance TestingWhy Performance Metrics Are NeededCollecting Performance Measurements and MetricsSelecting Performance Metrics2.2 Aggregating Results from Performance Testing2.3 Key Sources of Performance Metrics2.4 Typical Results of a Performance TestChapter 2 QuestionsChapter 3. Performance Testing in the Software LifecycleISTQB® Keywords3.1 Principal Performance Testing Activities3.2 Categories of Performance Risks for Different ArchitecturesSingle Computer SystemsMulti-tier SystemsDistributed SystemsVirtualised SystemsDynamic/Cloud-based SystemsClient –Server SystemsMobile ApplicationsEmbedded Real-time SystemsMainframe Applications3.3 Performance Risks Across the Software Development Lifecycle3.4 Performance Testing ActivitiesSequential Development ModelsIterative and Incremental Development ModelsCommercial Off-the-Shelf (COTS) and other Supplier/Acquirer ModelsChapter 3 QuestionsChapter 4. Performance Testing TasksISTQB® Keywords4.1 Planning4.1.1 Deriving Performance Test Objectives4.1.2 The Performance Test Plan4.1.3 Communicating about Performance Testing4.2 Analysis, Design and Implementation4.2.1 Typical Communication Protocols4.2.2 Transactions4.2.3 Identifying Operational Profiles4.2.4 Creating Load Profiles4.2.5 Analysing Throughput and Concurrency4.2.6 Basic Structure of a Performance Test Script4.2.7 Implementing Performance Test Scripts4.2.8 Preparing for Performance Test Execution4.3 Execution4.4 Analysing Results and ReportingAnalysis TechniquesReportingChapter 4 QuestionsChapter 5. ToolsISTQB® Keywords5.1 Tool Support5.2 Tool SuitabilityChapter 5 QuestionsChapter 6. References6.1 Standards6.2 ISTQB® Documents6.3 Books6.4 Papers and ArticlesChapter 7. Question Answers7.1 Chapter 17.2 Chapter 2

Regulärer Preis: 66,99 €
Produktbild für Artificial intelligence and the future of warfare

Artificial intelligence and the future of warfare

This volume offers an innovative and counter-intuitive study of how and why artificial intelligence-infused weapon systems will affect the strategic stability between nuclear-armed states. Johnson demystifies the hype surrounding artificial intelligence (AI) in the context of nuclear weapons and, more broadly, future warfare. The book highlights the potential, multifaceted intersections of this and other disruptive technology – robotics and autonomy, cyber, drone swarming, big data analytics, and quantum communications – with nuclear stability. Anticipating and preparing for the consequences of the AI-empowered weapon systems are fast becoming a critical task for national security and statecraft. Johnson considers the impact of these trends on deterrence, military escalation, and strategic stability between nuclear-armed states – especially China and the United States. The book draws on a wealth of political and cognitive science, strategic studies, and technical analysis to shed light on the coalescence of developments in AI and other disruptive emerging technologies. Artificial intelligence and the future of warfare sketches a clear picture of the potential impact of AI on the digitized battlefield and broadens our understanding of critical questions for international affairs. AI will profoundly change how wars are fought, and how decision-makers think about nuclear deterrence, escalation management, and strategic stability – but not for the reasons you might think. James Johnson is an Assistant Professor in the School of Law and Government at Dublin City University Introduction: Opening the AI Pandora’s box Part I: Destabilizing AI renaissance 1 Military AI primer 2 Artificial intelligence in the 2nd nuclear age Part II: Military AI superpowers 3 New challenges to military-techno Pax Americana 4 U.S.-China crisis stability under the AI nuclear shadow Part III: Nuclear instability redux? 5 Hunting for nuclear weapons in the digital age 6 Fast and the furious: Drone swarming and hypersonic weapons 7 The AI-cyber security nexus 8 Delegating strategic decisions to intelligent machines Conclusion: Managing an AI future Index

Regulärer Preis: 139,99 €
Produktbild für Cryptography and Cryptanalysis in MATLAB

Cryptography and Cryptanalysis in MATLAB

Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB.Cryptography and Cryptanalysis in MATLAB will serve as your definitive go-to cryptography reference, whether you are a student, professional developer, or researcher, showing how a multitude of cryptographic challenges can be overcome using the powerful tools of MATLAB.WHAT YOU WILL LEARN* Discover MATLAB’s cryptography functions* Work with conversion mechanisms in MATLABImplement cryptographic algorithms using arithmetic operations * Understand the classical, simple cryptosystems that form the basis of modern cryptography* Develop fully working solutions (encryption/decryption operations)* Study pseudo-random generators and their real-life implementations* Utilize hash functions by way of practical examples* Implement solutions to defend against practical cryptanalysis methods and attacks* Understand asymmetric and symmetric encryption systems and how to use themLeverage visual cryptography, steganography, and chaos-based cryptographyWHO THIS BOOK IS FORThose who are new to cryptography/analysis. Some prior exposure to MATLAB recommended.MARIUS IULIAN MIHAILESCU, PHD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT Officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructures, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.STEFANIA LOREDANA NITA, PHD is a software developer at the Institute of Computer Science of the Romanian Academy and a Fellow PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.NEW ToCChapter 01 – IntroductionChapter 02 – MATLAB Cryptography FunctionsChapter 03 – Conversions used in CryptographyChapter 04 – Basic Arithmetic FoundationsChapter 05 – Number TheoryChapter 06 – Classical Cryptography6.1. Caesar Cipher6.2. VigenereChapter 07 – Pseudo Random GeneratorsChapter 08 – Hash FunctionsChapter 09 – Formal Techniques for CryptographyChapter 10 – Symmetric Encryption Schemes10.1. Case Study: The Data Encryption Standard (DES)10.2. Advanced Encryption Standard (AES)Chapter 11 – Asymmetric Encryption Schemes11.1. RSA11.2. El Gamal11.3. Knapsack11.4. Merkle-HellmanChapter 12 – Visual CryptographyChapter 13 – SteganographyChapter 14 – Chaos-based CryptographyPART 1 - FOUNDATIONS.1. Cryptography Fundamentals2. Mathematical Background and Its Applicability3. Large Integer Arithmetic4. Floating-point Arithmetic5. New Features in MATLAB 106. Secure Coding Guidelines7. Cryptography Libraries in MATLABPART 2 – PRO CRYPTOGRAPHY.8. Elliptic-curve Cryptography and Public Key Algorithms9. Lattice-based Cryptography10. Searchable Encryption11. Homomorphic Encryption12. Learning with Errors and Ring Learning with Errors Cryptography13. Chaos-based Cryptography14. Big Data Cryptography15. Cloud Computing Cryptography.PART 3 – PRO CRYPTANALYSIS16. Introduction to Cryptanalysis17. General notions for Conducting Cryptanalysis Attacks18. Linear and Differential Cryptanalysis19. Integral Cryptanalysis20. Attacks21. Text Characterization22. Basic Implementations of Cryptanalysis Methods.

Regulärer Preis: 62,99 €
Produktbild für Semantische Datenintelligenz im Einsatz

Semantische Datenintelligenz im Einsatz

Semantische Technologien haben mit der Entwicklung von datenbasierten Systemen wie Neuronale Netze, Deep Learning und Machine Learning ihre Bedeutung nicht verloren, sondern werden als effiziente wissensbasierte Systeme immer wichtiger. Denn intelligente Systeme der Zukunft müssen nicht nur in der Lage sein zu sagen, was sie entschieden haben, sondern auch wie sie zu dieser Entscheidung gekommen sind. Solche Systeme sind jedoch nur mit Hilfe von wissensbasierten Systemen auf der Grundlage von semantischen Technologien erreichbar. Heute reichen die Anwendungen von semantischen Systemen von der semantischen Suche, Knowledge Graphs, Chatbots, NLP, in der Medizin bis zur Telekommunikation, Verwaltung und Robotik. Semantische Technologien werden spätestens mit dem Voranschreiten des Internet of Things (IoT) und Industrie 4.0 Anwendungen allgegenwärtig sein. Dies ist unumgänglich, denn ohne sie ist auch die Interoperabilität unter Maschinen und insbesondere unter Roboter für eine intelligente Zusammenarbeit und Produktion nicht so einfach umsetzbar. Dafür gibt es bereits heute zahlreiche Beispiele aus der Industrie.DIPL.-ING. BÖRTEÇIN EGE studierte Informatik an der Technischen Universität Wien. Er beschäftigt sich seit 2005 mit Semantic Web und Künstlicher Intelligenz. Im Jahr 2007 gründete er eine Arbeitsgruppe, die sich mit Semantic Web-Technologien beschäftigt. Zudem ist er einer der Ersten im deutschsprachigen Raum, der Trainings über die Semantic Web Technologien angeboten hat. Nach langjährigen beruflichen Erfahrungen in verschiedenen Firmen und Konzernen als Software-Entwickler brachte er im Jahr 2015 mit zwei Kollegen gemeinsam sein erstes Buch Corporate Semantic Web beim Springer-Verlag heraus. Er ist Autor auch von zahlreichen populärwissenschaftlichen Beiträgen.PROF. DR. ADRIAN PASCHKE leitet seit 2008 die Corporate Semantic Web Gruppe an der Freien Universität Berlin und seit 2015 das Data Analytics Center (DANA) am Fraunhofer Institut für Offene Kommunikationssystem (FOKUS). Er hat aktiv in der Standardisierung semantischer Technologien im W3C, OMG, OASIS, RuleML und mit seinen wissenschaftlichen Publikation in der Corporate Semantic Web Community-Bildung beigetragen, sowie eine Vielzahl an Veranstaltungen wie das Berlin Semantic Web Meetup, RuleML, SWAT4LS, Semantics, Pragmatic Web organisiert.Neuronale Netze.-Deep Learning.-Machine Learning.-Semantische Künstliche Intelligenz.-Ontologien.-Corporate Smart Insights.-Knowledge Graphs.-Semantische Interoperabilität in Cyber-physischen Produktionssystemen.-Einsatz von Semantischen Technologien bei Unbemannten Systemen, Flugsicherung und Lieferkettenbeobachtung.-Die Rolle von Ontologien in NLP.-Artificial General Intelligence.-Bitcoin und Blockchain Technologien.-Semiotik.-Maschinenethik.-Welches Land macht das Rennen in Künstlicher Intelligenz?.

Regulärer Preis: 42,99 €
Produktbild für Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security

Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deceptionAn exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threatsPractical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systemsIn-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security. GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deceptionAn exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threatsPractical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systemsIn-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security. Charles A. Kamhoua, PhD, is a researcher at the United States Army Research Laboratory’s Network Security Branch. He is co-editor of Assured Cloud Computing (2018) and Blockchain for Distributed Systems Security (2019), and Modeling and Design of Secure Internet of Things (2020). Christopher D. Kiekintveld, PhD, is Associate Professor at the University of Texas at El Paso. He is Director of Graduate Programs with the Computer Science Department. Fei Fang, PhD, is Assistant Professor in the Institute for Software Research at the School of Computer Science at Carnegie Mellon University. Quanyan Zhu, PhD, is Associate Professor in the Department of Electrical and Computer Engineering at New York University.

Regulärer Preis: 121,99 €
Produktbild für Enabling Healthcare 4.0 for Pandemics

Enabling Healthcare 4.0 for Pandemics

ENABLING HEALTHCARE 4.0 FOR PANDEMICSTHE BOOK EXPLORES THE ROLE AND SCOPE OF AI, MACHINE LEARNING AND OTHER CURRENT TECHNOLOGIES TO HANDLE PANDEMICS.In this timely book, the editors explore the current state of practice in Healthcare 4.0 and provide a roadmap for harnessing artificial intelligence, machine learning, and Internet of Things, as well as other modern cognitive technologies, to aid in dealing with the various aspects of an emergency pandemic outbreak. There is a need to improvise healthcare systems with the intervention of modern computing and data management platforms to increase the reliability of human processes and life expectancy. There is an urgent need to come up with smart IoT-based systems which can aid in the detection, prevention and cure of these pandemics with more precision. There are a lot of challenges to overcome but this book proposes a new approach to organize the technological warfare for tackling future pandemics. In this book, the reader will find:* State-of-the-art technological advancements in pandemic management;* AI and ML-based identification and forecasting of pandemic spread;* Smart IoT-based ecosystem for pandemic scenario.AUDIENCEThe book will be used by researchers and practitioners in computer science, artificial intelligence, bioinformatics, data scientists, biomedical statisticians, as well as industry professionals in disaster and pandemic management. ABHINAV JUNEJA PHD is Professor and Head of Computer Science & Information Technology Department, at KIET Group of Institutions, Ghaziabad, Delhi-NCR, India. He has published more than 40 research articles.VIKRAM BALI PHD is Professor and Head of Computer Science and Engineering Department at JSS Academy of Technical Education, Noida, India. SAPNA JUNEJA PHD is Professor and Head of Computer Science Department at IMS Engineering College, Ghaziabad, India. VISHAL JAIN PHD is an Associate Professor in the Department of Computer Science and Engineering, Sharda University, Greater Noida, India. He has published more than 85 research articles and authored/edited more than 15 books. PRASHANT TYAGI, MBBS MS MCH is a practicing plastic surgeon at Cosmplastik Clinic,Sonepat, Delhi-NCR,India. Preface xvPART 1: MACHINE LEARNING FOR HANDLING COVID-19 11 COVID-19 AND MACHINE LEARNING APPROACHES TO DEAL WITH THE PANDEMIC 3Sapna Juneja, Abhinav Juneja, Vikram Bali and Vishal Jain1.1 Introduction 31.1.1 COVID-19 and its Various Transmission Stages Depending Upon the Severity of the Problem 41.2 COVID-19 Diagnosis in Patients Using Machine Learning 51.2.1 Machine Learning to Identify the People who are at More Risk of COVID-19 61.2.2 Machine Learning to Speed Up Drug Development 71.2.3 Machine Learning for Re-Use of Existing Drugs in Treating COVID-19 81.3 AI and Machine Learning as a Support System for Robotic System and Drones 101.3.1 AI-Based Location Tracking of COVID-19 Patients 101.3.2 Increased Number of Screenings Using AI Approach 111.3.3 Artificial Intelligence in Management of Resources During COVID-19 111.3.4 Influence of AI on Manufacturing Industry During COVID-19 111.3.5 Artificial Intelligence and Mental Health in COVID-19 141.3.6 Can AI Replace the Human Brain Intelligence in COVID-19 Crisis? 141.3.7 Advantages and Disadvantages of AI in Post COVID Era 151.4 Conclusion 17References 172 HEALTHCARE SYSTEM 4.0 PERSPECTIVES ON COVID-19 PANDEMIC 21Rehab A. Rayan, Imran Zafar and Iryna B. Romash2.1 Introduction 222.2 Key Techniques of HCS 4.0 for COVID-19 242.2.1 Artificial Intelligence (AI) 242.2.2 The Internet of Things (IoT) 252.2.3 Big Data 252.2.4 Virtual Reality (VR) 262.2.5 Holography 262.2.6 Cloud Computing 272.2.7 Autonomous Robots 272.2.8 3D Scanning 282.2.9 3D Printing Technology 282.2.10 Biosensors 292.3 Real World Applications of HCS 4.0 for COVID-19 292.4 Opportunities and Limitations 332.5 Future Perspectives 342.6 Conclusion 34References 353 ANALYSIS AND PREDICTION ON COVID-19 USING MACHINE LEARNING TECHNIQUES 39Supriya Raheja and Shaswata Datta3.1 Introduction 393.2 Literature Review 403.3 Types of Machine Learning 423.4 Machine Learning Algorithms 433.4.1 Linear Regression 433.4.2 Logistic Regression 453.4.3 K-NN or K Nearest Neighbor 463.4.4 Decision Tree 473.4.5 Random Forest 483.5 Analysis and Prediction of COVID-19 Data 483.5.1 Methodology Adopted 493.6 Analysis Using Machine Learning Models 543.6.1 Splitting of Data into Training and Testing Data Set 543.6.2 Training of Machine Learning Models 543.6.3 Calculating the Score 543.7 Conclusion & Future Scope 55References 554 RAPID FORECASTING OF PANDEMIC OUTBREAK USING MACHINE LEARNING 59Sujata Chauhan, Madan Singh and Puneet Garg4.1 Introduction 604.2 Effect of COVID-19 on Different Sections of Society 614.2.1 Effect of COVID-19 on Mental Health of Elder People 614.2.2 Effect of COVID-19 on our Environment 614.2.3 Effect of COVID-19 on International Allies and Healthcare 624.2.4 Therapeutic Approaches Adopted by Different Countries to Combat COVID-19 634.2.5 Effect of COVID-19 on Labor Migrants 634.2.6 Impact of COVID-19 on our Economy 644.3 Definition and Types of Machine Learning 644.3.1 Machine Learning & Its Types 654.3.2 Applications of Machine Learning 684.4 Machine Learning Approaches for COVID-19 694.4.1 Enabling Organizations to Regulate and Scale 694.4.2 Understanding About COVID-19 Infections 694.4.3 Gearing Up Study and Finding Treatments 694.4.4 Predicting Treatment and Healing Outcomes 704.4.5 Testing Patients and Diagnosing COVID-19 70References 715 RAPID FORECASTING OF PANDEMIC OUTBREAK USING MACHINE LEARNING: THE CASE OF COVID-19 75Nishant Jha and Deepak Prashar5.1 Introduction 765.2 Related Work 785.3 Suggested Methodology 795.4 Models in Epidemiology 805.4.1 Bayesian Inference Models 815.4.1.1 Markov Chain (MCMC) Algorithm 825.5 Particle Filtering Algorithm 825.6 MCM Model Implementation 835.6.1 Reproduction Number 845.7 Diagnosis of COVID-19 855.7.1 Predicting Outbreaks Through Social Media Analysis 865.7.1.1 Risk of New Pandemics 875.8 Conclusion 88References 88PART 2: EMERGING TECHNOLOGIES TO DEAL WITH COVID-19 916 EMERGING TECHNOLOGIES FOR HANDLING PANDEMIC CHALLENGES 93D. Karthika and K. Kalaiselvi6.1 Introduction 946.2 Technological Strategies to Support Society During the Pandemic 956.2.1 Online Shopping and Robot Deliveries 966.2.2 Digital and Contactless Payments 966.2.3 Remote Work 976.2.4 Telehealth 976.2.5 Online Entertainment 986.2.6 Supply Chain 4.0 986.2.7 3D Printing 986.2.8 Rapid Detection 996.2.9 QRT-PCR 996.2.10 Immunodiagnostic Test (Rapid Antibody Test) 996.2.11 Work From Home 1006.2.12 Distance Learning 1006.2.13 Surveillance 1006.3 Feasible Prospective Technologies in Controlling the Pandemic 1016.3.1 Robotics and Drones 1016.3.2 5G and Information and Communications Technology (ICT) 1016.3.3 Portable Applications 1016.4 Coronavirus Pandemic: Emerging Technologies That Tackle Key Challenges 1026.4.1 Remote Healthcare 1026.4.2 Prevention Measures 1036.4.3 Diagnostic Solutions 1036.4.4 Hospital Care 1046.4.5 Public Safety During Pandemic 1046.4.6 Industry Adapting to the Lockdown 1056.4.7 Cities Adapting to the Lockdown 1056.4.8 Individuals Adapting to the Lockdown 1066.5 The Golden Age of Drone Delivery 1076.5.1 The Early Adopters are Winning 1076.5.2 The Golden Age Will Require Collaboration and Drive 1086.5.3 Standardization and Data Sharing Through the Smart City Network 1086.5.4 The Procedure of AI and Non-AI-Based Applications 1106.6 Technology Helps Pandemic Management 1116.6.1 Tracking People With Facial Recognition and Big Data 1116.6.2 Contactless Movement and Deliveries Through Autonomous Vehicles, Drones, and Robots 1126.6.3 Technology Supported Temperature Monitoring 1126.6.4 Remote Working Technologies to Support Social Distancing and Maintain Business Continuity 1126.7 Conclusion 113References 1137 UNFOLDING THE POTENTIAL OF IMPACTFUL EMERGING TECHNOLOGIES AMID COVID-19 117Nusrat Rouf, Aatif Kaisar Khan, Majid Bashir Malik, Akib Mohi Ud Din Khanday and Nadia Gul7.1 Introduction 1187.2 Review of Technologies Used During the Outbreak of Ebola and SARS 1207.2.1 Technological Strategies and Tools Used at the Time of SARS 1207.2.2 Technological Strategies and Tools Used at the Time of Ebola 1217.3 Emerging Technological Solutions to Mitigate the COVID-19 Crisis 1247.3.1 Artificial Intelligence 1247.3.1.1 Application of AI in Developed Countries 1277.3.1.2 Application of AI in Developing Countries 1287.3.2 IoT & Robotics 1297.3.2.1 Application of IoT and Robotics in Developed Countries 1307.3.2.2 Application of IoT and Robotics in Developing Countries 1317.3.3 Telemedicine 1317.3.3.1 Application of Telemedicine in Developed Countries 1327.3.3.2 Application of Telemedicine in Developing Countries 1337.3.4 Innovative Healthcare 1337.3.4.1 Application of Innovative Healthcare in Developed Countries 1347.3.4.2 Application of Innovative Healthcare in Developing Countries 1347.3.4.3 Application of Innovative Healthcare in the Least Developed Countries 1357.3.5 Nanotechnology 1357.4 Conclusion 136References 1378 ADVANCES IN TECHNOLOGY: PREPAREDNESS FOR HANDLING PANDEMIC CHALLENGES 143Shweta Sinha and Vikas Thada8.1 Introduction 1438.2 Issues and Challenges Due to Pandemic 1458.2.1 Health Effect 1468.2.2 Economic Impact 1478.2.3 Social Impact 1488.3 Digital Technology and Pandemic 1498.3.1 Digital Healthcare 1498.3.2 Network and Connectivity 1518.3.3 Development of Potential Treatment 1518.3.4 Online Platform for Learning and Interaction 1528.3.5 Contactless Payment 1528.3.6 Entertainment 1528.4 Application of Technology for Handling Pandemic 1538.4.1 Technology for Preparedness and Response 1538.4.2 Machine Learning for Pandemic Forecast 1558.5 Challenges with Digital Healthcare 1578.6 Conclusion 158References 1599 EMERGING TECHNOLOGIES FOR COVID-19 163Rohit Anand, Nidhi Sindhwani, Avinash Saini and Shubham9.1 Introduction 1639.2 Related Work 1659.3 Technologies to Combat COVID-19 1669.3.1 Blockchain 1679.3.1.1 Challenges and Solutions 1689.3.2 Unmanned Aerial Vehicle (UAV) 1699.3.2.1 Challenges and Solutions 1699.3.3 Mobile APK 1709.3.3.1 Challenges and Solutions 1709.3.4 Wearable Sensing 1719.3.4.1 Challenges and Solutions 1729.3.5 Internet of Healthcare Things 1739.3.5.1 Challenges and Solutions 1759.3.6 Artificial Intelligence 1759.3.6.1 Challenges and Solutions 1759.3.7 5G 1769.3.7.1 Challenges and Solutions 1769.3.8 Virtual Reality 1769.3.8.1 Challenges and Solutions 1779.4 Comparison of Various Technologies to Combat COVID-19 1779.5 Conclusion 185References 18510 EMERGING TECHNIQUES FOR HANDLING PANDEMIC CHALLENGES 189Ankur Gupta and Puneet Garg10.1 Introduction to Pandemic 19010.1.1 How Pandemic Spreads? 19010.1.2 Background History 19110.1.3 Corona 19210.2 Technique Used to Handle Pandemic Challenges 19410.2.1 Smart Techniques in Cities 19410.2.2 Smart Technologies in Western Democracies 19610.2.3 Techno- or Human-Driven Approach 19710.3 Working Process of Techniques 19710.4 Data Analysis 20110.5 Rapid Development Structure 20610.6 Conclusion & Future Scope 207References 208PART 3: ALGORITHMIC TECHNIQUES FOR HANDLING PANDEMIC 21111 A HYBRID METAHEURISTIC ALGORITHM FOR INTELLIGENT NURSE SCHEDULING 213Tan Nhat Pham and Son Vu Truong Dao11.1 Introduction 21311.2 Methodology 21411.2.1 Data Collection 21411.2.2 Mathematical Model Development 21511.2.3 Proposed Hybrid Adaptive PSO-GWO (APGWO) Algorithm 21711.2.4 Discrete Version of APGWO 21911.2.4.1 Population Initialization 21911.2.4.2 Discrete Search Operator for PSO Main Loop 22311.2.4.3 Discrete Search Strategy for GWO Nested Loop 22411.2.4.4 Constraint Handling 23011.3 Computational Results 23011.4 Conclusion 232References 23312 MULTI-PURPOSE ROBOTIC SENSING DEVICE FOR HEALTHCARE SERVICES 237HirakRanjan Das, Dinesh Bhatia, Ajan Patowary and Animesh Mishra12.1 Introduction 23812.2 Background and Objectives 23812.3 The Functioning of Multi-Purpose Robot 23912.4 Discussion and Conclusions 248References 24913 PREVALENCE OF INTERNET OF THINGS IN PANDEMIC 251Rishita Khurana and Madhulika Bhatia13.1 Introduction 25213.2 What is IoT? 25513.2.1 History of IoT 25513.2.2 Background of IoT for COVID-19 Pandemic 25613.2.3 Operations Involved in IoT for COVID-19 25713.2.4 How is IoT Helping in Overcoming the Difficult Phase of COVID-19? 25713.3 Various Models Proposed for Managing a Pandemic Like COVID-19 Using IoT 26013.3.1 Smart Disease Surveillance Based on Internet of Things 26113.3.1.1 Smart Disease Surveillance 26113.3.2 IoT PCR for Spread Disease Monitoring and Controlling 26313.4 Global Technological Developments to Overcome Cases of COVID-19 26413.4.1 Noteworthy Applications of IoT for COVID-19 Pandemic 26513.4.2 Key Benefits of Using IoT in COVID-19 26913.4.3 A Last Word About Industrial Maintenance and IoT 27013.4.4 Issues Faced While Implementing IoT in COVID-19 Pandemic 27013.5 Results & Discussions 27013.6 Conclusion 271References 27214 MATHEMATICAL INSIGHT OF COVID-19 INFECTION—A MODELING APPROACH 275Komal Arora, Pooja Khurana, Deepak Kumar and Bhanu Sharma14.1 Introduction 27514.1.1 A Brief on Coronaviruses 27614.2 Epidemiology and Etiology 27714.3 Transmission of Infection and Available Treatments 27814.4 COVID-19 Infection and Immune Responses 27914.5 Mathematical Modeling 28014.5.1 Simple Mathematical Models 28114.5.1.1 Basic Model 28114.5.1.2 Logistic Model 28214.5.2 Differential Equations Models 28314.5.2.1 Temporal Model (Linear Differential Equation Model, Logistic Model) 28314.5.2.2 SIR Model 28414.5.2.3 SEIR Model 28514.5.2.4 Improved SEIR Model 28714.5.3 Stochastic Models 28814.5.3.1 Basic Model 28814.5.3.2 Simple Stochastic SI Model 28914.5.3.3 SIR Stochastic Differential Equations 29014.5.3.4 SIR Continuous Time Markov Chain 29014.5.3.5 Stochastic SIR Model 29114.5.3.6 Stochastic SIR With Demography 29214.6 Conclusion 292References 29315 MACHINE LEARNING: A TOOL TO COMBAT COVID-19 299Shakti Arora, Vijay Anant Athavale and Tanvi Singh15.1 Introduction 30015.1.1 Recent Survey and Analysis 30115.2 Our Contribution 30315.3 State-Wise Data Set and Analysis 30715.4 Neural Network 30815.4.1 M5P Model Tree 30915.5 Results and Discussion 30915.6 Conclusion 31415.7 Future Scope 314References 314Index 317

Regulärer Preis: 184,99 €
Produktbild für Computational Intelligence and Healthcare Informatics

Computational Intelligence and Healthcare Informatics

COMPUTATIONAL INTELLIGENCE AND HEALTHCARE INFORMATICSTHE BOOK PROVIDES THE STATE-OF-THE-ART INNOVATION, RESEARCH, DESIGN, AND IMPLEMENTS METHODOLOGICAL AND ALGORITHMIC SOLUTIONS TO DATA PROCESSING PROBLEMS, DESIGNING AND ANALYSING EVOLVING TRENDS IN HEALTH INFORMATICS, INTELLIGENT DISEASE PREDICTION, AND COMPUTER-AIDED DIAGNOSIS. Computational intelligence (CI) refers to the ability of computers to accomplish tasks that are normally completed by intelligent beings such as humans and animals. With the rapid advance of technology, artificial intelligence (AI) techniques are being effectively used in the fields of health to improve the efficiency of treatments, avoid the risk of false diagnoses, make therapeutic decisions, and predict the outcome in many clinical scenarios. Modern health treatments are faced with the challenge of acquiring, analyzing and applying the large amount of knowledge necessary to solve complex problems. Computational intelligence in healthcare mainly uses computer techniques to perform clinical diagnoses and suggest treatments. In the present scenario of computing, CI tools present adaptive mechanisms that permit the understanding of data in difficult and changing environments. The desired results of CI technologies profit medical fields by assembling patients with the same types of diseases or fitness problems so that healthcare facilities can provide effectual treatments. This book starts with the fundamentals of computer intelligence and the techniques and procedures associated with it. Contained in this book are state-of-the-art methods of computational intelligence and other allied techniques used in the healthcare system, as well as advances in different CI methods that will confront the problem of effective data analysis and storage faced by healthcare institutions. The objective of this book is to provide researchers with a platform encompassing state-of-the-art innovations; research and design; implementation of methodological and algorithmic solutions to data processing problems; and the design and analysis of evolving trends in health informatics, intelligent disease prediction and computer-aided diagnosis. AUDIENCE The book is of interest to artificial intelligence and biomedical scientists, researchers, engineers and students in various settings such as pharmaceutical & biotechnology companies, virtual assistants developing companies, medical imaging & diagnostics centers, wearable device designers, healthcare assistance robot manufacturers, precision medicine testers, hospital management, and researchers working in healthcare system. OM PRAKASH JENA PHD is an assistant professor in the Department of Computer Science, Ravenshaw University, Cuttack, Odisha, India. He has more than 30 research articles in peer-reviewed journals and 4 patents.ALOK RANJAN TRIPATHY PHD is an assistant professor in the Department of Computer Science, Ravenshaw University, Cuttack, Odisha, India. AHMED A. ELNGAR PHD is an assistant professor of Computer Science, Chair of Scientific Innovation Research Group (SIRG), Director of Technological and Informatics Studies Center, at Beni-Suef University, Egypt. ZDZISLAW POLKOWSKI PHD is Professor in the Faculty of Technical Sciences, Jan Wyzykowski University, Polkowice, Poland. He has published more than 75 research articles in peer-reviewed journals. Preface xvPART I: INTRODUCTION 11 MACHINE LEARNING AND BIG DATA: AN APPROACH TOWARD BETTER HEALTHCARE SERVICES 3Nahid Sami and Asfia Aziz1.1 Introduction 31.2 Machine Learning in Healthcare 41.3 Machine Learning Algorithms 61.3.1 Supervised Learning 61.3.2 Unsupervised Learning 71.3.3 Semi-Supervised Learning 71.3.4 Reinforcement Learning 81.3.5 Deep Learning 81.4 Big Data in Healthcare 81.5 Application of Big Data in Healthcare 91.5.1 Electronic Health Records 91.5.2 Helping in Diagnostics 91.5.3 Preventive Medicine 101.5.4 Precision Medicine 101.5.5 Medical Research 101.5.6 Cost Reduction 101.5.7 Population Health 101.5.8 Telemedicine 101.5.9 Equipment Maintenance 111.5.10 Improved Operational Efficiency 111.5.11 Outbreak Prediction 111.6 Challenges for Big Data 111.7 Conclusion 11References 12PART II: MEDICAL DATA PROCESSING AND ANALYSIS 152 THORACIC IMAGE ANALYSIS USING DEEP LEARNING 17Rakhi Wajgi, Jitendra V. Tembhurne and Dipak Wajgi2.1 Introduction 182.2 Broad Overview of Research 192.2.1 Challenges 192.2.2 Performance Measuring Parameters 212.2.3 Availability of Datasets 212.3 Existing Models 232.4 Comparison of Existing Models 302.5 Summary 382.6 Conclusion and Future Scope 38References 393 FEATURE SELECTION AND MACHINE LEARNING MODELS FOR HIGH-DIMENSIONAL DATA: STATE-OF-THE-ART 43G. Manikandan and S. Abirami3.1 Introduction 433.1.1 Motivation of the Dimensionality Reduction 453.1.2 Feature Selection and Feature Extraction 463.1.3 Objectives of the Feature Selection 473.1.4 Feature Selection Process 473.2 Types of Feature Selection 483.2.1 Filter Methods 493.2.1.1 Correlation-Based Feature Selection 493.2.1.2 The Fast Correlation-Based Filter 503.2.1.3 The INTERACT Algorithm 513.2.1.4 ReliefF 513.2.1.5 Minimum Redundancy Maximum Relevance 523.2.2 Wrapper Methods 523.2.3 Embedded Methods 533.2.4 Hybrid Methods 543.3 Machine Learning and Deep Learning Models 553.3.1 Restricted Boltzmann Machine 553.3.2 Autoencoder 563.3.3 Convolutional Neural Networks 573.3.4 Recurrent Neural Network 583.4 Real-World Applications and Scenario of Feature Selection 583.4.1 Microarray 583.4.2 Intrusion Detection 593.4.3 Text Categorization 593.5 Conclusion 59References 604 A SMART WEB APPLICATION FOR SYMPTOM-BASED DISEASE DETECTION AND PREDICTION USING STATE-OF-THE-ART ML AND ANN MODELS 65Parvej Reja Saleh and Eeshankur Saikia4.1 Introduction 654.2 Literature Review 684.3 Dataset, EDA, and Data Processing 694.4 Machine Learning Algorithms 724.4.1 Multinomial Naïve Bayes Classifier 724.4.2 Support Vector Machine Classifier 724.4.3 Random Forest Classifier 734.4.4 K-Nearest Neighbor Classifier 744.4.5 Decision Tree Classifier 744.4.6 Logistic Regression Classifier 754.4.7 Multilayer Perceptron Classifier 764.5 Work Architecture 774.6 Conclusion 78References 795 CLASSIFICATION OF HEART SOUND SIGNALS USING TIME-FREQUENCY IMAGE TEXTURE FEATURES 81Sujata Vyas, Mukesh D. Patil and Gajanan K. Birajdar5.1 Introduction 815.1.1 Motivation 825.2 Related Work 835.3 Theoretical Background 845.3.1 Pre-Processing Techniques 845.3.2 Spectrogram Generation 855.3.2 Feature Extraction 885.3.4 Feature Selection 905.3.5 Support Vector Machine 915.4 Proposed Algorithm 915.5 Experimental Results 925.5.1 Database 925.5.2 Evaluation Metrics 945.5.3 Confusion Matrix 945.5.4 Results and Discussions 945.6 Conclusion 96References 996 IMPROVING MULTI-LABEL CLASSIFICATION IN PROTOTYPE SELECTION SCENARIO 103Himanshu Suyal and Avtar Singh6.1 Introduction 1036.2 Related Work 1056.3 Methodology 1066.3.1 Experiments and Evaluation 1086.4 Performance Evaluation 1086.5 Experiment Data Set 1096.6 Experiment Results 1106.7 Conclusion 117References 1177 A MACHINE LEARNING–BASED INTELLIGENT COMPUTATIONAL FRAMEWORK FOR THE PREDICTION OF DIABETES DISEASE 121Maqsood Hayat, Yar Muhammad and Muhammad Tahir7.1 Introduction 1217.2 Materials and Methods 1237.2.1 Dataset 1237.2.2 Proposed Framework for Diabetes System 1247.2.3 Pre-Processing of Data 1247.3 Machine Learning Classification Hypotheses 1247.3.1 K-Nearest Neighbor 1247.3.2 Decision Tree 1257.3.3 Random Forest 1267.3.4 Logistic Regression 1267.3.5 Naïve Bayes 1267.3.6 Support Vector Machine 1267.3.7 Adaptive Boosting 1267.3.8 Extra-Tree Classifier 1277.4 Classifier Validation Method 1277.4.1 K-Fold Cross-Validation Technique 1277.5 Performance Evaluation Metrics 1277.6 Results and Discussion 1297.6.1 Performance of All Classifiers Using 5-Fold CV Method 1297.6.2 Performance of All Classifiers Using the 7-Fold Cross-Validation Method 1317.6.3 Performance of All Classifiers Using 10-Fold CV Method 1337.7 Conclusion 137References 1378 HYPERPARAMETER TUNING OF ENSEMBLE CLASSIFIERS USING GRID SEARCH AND RANDOM SEARCH FOR PREDICTION OF HEART DISEASE 139Dhilsath Fathima M. and S. Justin Samuel8.1 Introduction 1408.2 Related Work 1408.3 Proposed Method 1428.3.1 Dataset Description 1438.3.2 Ensemble Learners for Classification Modeling 1448.3.2.1 Bagging Ensemble Learners 1458.3.2.2 Boosting Ensemble Learner 1478.3.3 Hyperparameter Tuning of Ensemble Learners 1518.3.3.1 Grid Search Algorithm 1518.3.3.2 Random Search Algorithm 1528.4 Experimental Outcomes and Analyses 1538.4.1 Characteristics of UCI Heart Disease Dataset 1538.4.2 Experimental Result of Ensemble Learners and Performance Comparison 1548.4.3 Analysis of Experimental Result 1548.5 Conclusion 157References 1579 COMPUTATIONAL INTELLIGENCE AND HEALTHCARE INFORMATICS PART III—RECENT DEVELOPMENT AND ADVANCED METHODOLOGIES 159Sankar Pariserum Perumal, Ganapathy Sannasi, Santhosh Kumar S.V.N. and Kannan Arputharaj9.1 Introduction: Simulation in Healthcare 1609.2 Need for a Healthcare Simulation Process 1609.3 Types of Healthcare Simulations 1619.4 AI in Healthcare Simulation 1639.4.1 Machine Learning Models in Healthcare Simulation 1639.4.1.1 Machine Learning Model for Post-Surgical Risk Prediction 1639.4.2 Deep Learning Models in Healthcare Simulation 1699.4.2.1 Bi-LSTM–Based Surgical Participant Prediction Model 1709.5 Conclusion 174References 17410 WOLFRAM’S CELLULAR AUTOMATA MODEL IN HEALTH INFORMATICS 179Sutapa Sarkar and Mousumi Saha10.1 Introduction 17910.2 Cellular Automata 18110.3 Application of Cellular Automata in Health Science 18310.4 Cellular Automata in Health Informatics 18410.5 Health Informatics–Deep Learning–Cellular Automata 19010.6 Conclusion 191References 191PART III: MACHINE LEARNING AND COVID PROSPECTIVE 19311 COVID-19: CLASSIFICATION OF COUNTRIES FOR ANALYSIS AND PREDICTION OF GLOBAL NOVEL CORONA VIRUS INFECTIONS DISEASE USING DATA MINING TECHNIQUES 195Sachin Kamley, Shailesh Jaloree, R.S. Thakur and Kapil Saxena11.1 Introduction 19511.2 Literature Review 19611.3 Data Pre-Processing 19711.4 Proposed Methodologies 19811.4.1 Simple Linear Regression 19811.4.2 Association Rule Mining 20211.4.3 Back Propagation Neural Network 20311.5 Experimental Results 20411.6 Conclusion and Future Scopes 211References 21212 SENTIMENT ANALYSIS ON SOCIAL MEDIA FOR EMOTIONAL PREDICTION DURING COVID-19 PANDEMIC USING EFFICIENT MACHINE LEARNING APPROACH 215Sivanantham Kalimuthu12.1 Introduction 21512.2 Literature Review 21812.3 System Design 22212.3.1 Extracting Feature With WMAR 22412.4 Result and Discussion 22912.5 Conclusion 232References 23213 PRIMARY HEALTHCARE MODEL FOR REMOTE AREA USING SELF-ORGANIZING MAP NETWORK 235Sayan Das and Jaya Sil13.1 Introduction 23613.2 Background Details and Literature Review 23913.2.1 Fuzzy Set 23913.2.2 Self-Organizing Mapping 23913.3 Methodology 24013.3.1 Severity_Factor of Patient 24413.3.2 Clustering by Self-Organizing Mapping 24913.4 Results and Discussion 25013.5 Conclusion 252References 25214 FACE MASK DETECTION IN REAL-TIME VIDEO STREAM USING DEEP LEARNING 255Alok Negi and Krishan Kumar14.1 Introduction 25614.2 Related Work 25714.3 Proposed Work 25814.3.1 Dataset Description 25814.3.2 Data Pre-Processing and Augmentation 25814.3.3 VGG19 Architecture and Implementation 25914.3.4 Face Mask Detection From Real-Time Video Stream 26114.4 Results and Evaluation 26214.5 Conclusion 267References 26715 A COMPUTATIONAL INTELLIGENCE APPROACH FOR SKIN DISEASE IDENTIFICATION USING MACHINE/DEEP LEARNING ALGORITHMS 269Swathi Jamjala Narayanan, Pranav Raj Jaiswal, Ariyan Chowdhury, Amitha Maria Joseph and Saurabh Ambar15.1 Introduction 27015.2 Research Problem Statements 27415.3 Dataset Description 27415.4 Machine Learning Technique Used for Skin Disease Identification 27615.4.1 Logistic Regression 27715.4.1.1 Logistic Regression Assumption 27715.4.1.2 Logistic Sigmoid Function 27715.4.1.3 Cost Function and Gradient Descent 27815.4.2 SVM 27915.4.3 Recurrent Neural Networks 28115.4.4 Decision Tree Classification Algorithm 28315.4.5 CNN 28615.4.6 Random Forest 28815.5 Result and Analysis 29015.6 Conclusion 291References 29116 ASYMPTOTIC PATIENTS’ HEALTHCARE MONITORING AND IDENTIFICATION OF HEALTH AILMENTS IN POST COVID-19 SCENARIO 297Pushan K.R. Dutta, Akshay Vinayak and Simran Kumari16.1 Introduction 29816.1.1 Motivation 29816.1.2 Contributions 29916.1.3 Paper Organization 29916.1.4 System Model Problem Formulation 29916.1.5 Proposed Methodology 30016.2 Material Properties and Design Specifications 30116.2.1 Hardware Components 30116.2.1.1 Microcontroller 30116.2.1.2 ESP8266 Wi-Fi Shield 30116.2.2 Sensors 30116.2.2.1 Temperature Sensor (LM 35) 30116.2.2.2 ECG Sensor (AD8232) 30116.2.2.3 Pulse Sensor 30116.2.2.4 GPS Module (NEO 6M V2) 30216.2.2.5 Gyroscope (GY-521) 30216.2.3 Software Components 30216.2.3.1 Arduino Software 30216.2.3.2 MySQL Database 30216.2.3.3 Wireless Communication 30216.3 Experimental Methods and Materials 30316.3.1 Simulation Environment 30316.3.1.1 System Hardware 30316.3.1.2 Connection and Circuitry 30416.3.1.3 Protocols Used 30616.3.1.4 Libraries Used 30716.4 Simulation Results 30716.5 Conclusion 31016.6 Abbreviations and Acronyms 310References 31117 COVID-19 DETECTION SYSTEM USING CELLULAR AUTOMATA–BASED SEGMENTATION TECHNIQUES 313Rupashri Barik, M. Nazma B. J. Naskar and Sarbajyoti Mallik17.1 Introduction 31317.2 Literature Survey 31417.2.1 Cellular Automata 31517.2.2 Image Segmentation 31617.2.3 Deep Learning Techniques 31617.3 Proposed Methodology 31717.4 Results and Discussion 32017.5 Conclusion 322References 32218 INTERESTING PATTERNS FROM COVID-19 DATASET USING GRAPH-BASED STATISTICAL ANALYSIS FOR PREVENTIVE MEASURES 325Abhilash C. B. and Kavi Mahesh18.1 Introduction 32618.2 Methods 32618.2.1 Data 32618.3 GSA Model: Graph-Based Statistical Analysis 32718.4 Graph-Based Analysis 32918.4.1 Modeling Your Data as a Graph 32918.4.2 RDF for Knowledge Graph 33118.4.3 Knowledge Graph Representation 33118.4.4 RDF Triple for KaTrace 33318.4.5 Cipher Query Operation on Knowledge Graph 33518.4.5.1 Inter-District Travel 33518.4.5.2 Patient 653 Spread Analysis 33618.4.5.3 Spread Analysis Using Parent-Child Relationships 33718.4.5.4 Delhi Congregation Attended the Patient’s Analysis 33918.5 Machine Learning Techniques 33918.5.1 Apriori Algorithm 33918.5.2 Decision Tree Classifier 34118.5.3 System Generated Facts on Pandas 34318.5.4 Time Series Model 34518.6 Exploratory Data Analysis 34618.6.1 Statistical Inference 34718.7 Conclusion 35618.8 Limitations 356Acknowledgments 356Abbreviations 357References 357PART IV: PROSPECTIVE OF COMPUTATIONAL INTELLIGENCE IN HEALTHCARE 35919 CONCEPTUALIZING TOMORROW’S HEALTHCARE THROUGH DIGITIZATION 361Riddhi Chatterjee, Ratula Ray, Satya Ranjan Dash and Om Prakash Jena19.1 Introduction 36119.2 Importance of IoMT in Healthcare 36219.3 Case Study I: An Integrated Telemedicine Platform in Wake of the COVID-19 Crisis 36319.3.1 Introduction to the Case Study 36319.3.2 Merits 36319.3.3 Proposed Design 36319.3.3.1 Homecare 36319.3.3.2 Healthcare Provider 36519.3.3.3 Community 36719.4 Case Study II: A Smart Sleep Detection System to Track the Sleeping Pattern in Patients Suffering From Sleep Apnea 37119.4.1 Introduction to the Case Study 37119.4.2 Proposed Design 37319.5 Future of Smart Healthcare 37519.6 Conclusion 375References 37520 DOMAIN ADAPTATION OF PARTS OF SPEECH ANNOTATORS IN HINDI BIOMEDICAL CORPUS: AN NLP APPROACH 377Pitambar Behera and Om Prakash Jena20.1 Introduction 37720.1.1 COVID-19 Pandemic Situation 37820.1.2 Salient Characteristics of Biomedical Corpus 37820.2 Review of Related Literature 37920.2.1 Biomedical NLP Research 37920.2.2 Domain Adaptation 37920.2.3 POS Tagging in Hindi 38020.3 Scope and Objectives 38020.3.1 Research Questions 38020.3.2 Research Problem 38020.3.3 Objectives 38120.4 Methodological Design 38120.4.1 Method of Data Collection 38120.4.2 Method of Data Annotation 38120.4.2.1 The BIS Tagset 38120.4.2.2 ILCI Semi-Automated Annotation Tool 38220.4.2.3 IA Agreement 38320.4.3 Method of Data Analysis 38320.4.3.1 The Theory of Support Vector Machines 38420.4.3.2 Experimental Setup 38420.5 Evaluation 38520.5.1 Error Analysis 38620.5.2 Fleiss’ Kappa 38820.6 Issues 38820.7 Conclusion and Future Work 388Acknowledgements 389References 38921 APPLICATION OF NATURAL LANGUAGE PROCESSING IN HEALTHCARE 393Khushi Roy, Subhra Debdas, Sayantan Kundu, Shalini Chouhan, Shivangi Mohanty and Biswarup Biswas21.1 Introduction 39321.2 Evolution of Natural Language Processing 39521.3 Outline of NLP in Medical Management 39621.4 Levels of Natural Language Processing in Healthcare 39721.5 Opportunities and Challenges From a Clinical Perspective 39921.5.1 Application of Natural Language Processing in the Field of Medical Health Records 39921.5.2 Using Natural Language Processing for Large-Sample Clinical Research 40021.6 Openings and Difficulties From a Natural Language Processing Point of View 40121.6.1 Methods for Developing Shareable Data 40121.6.2 Intrinsic Evaluation and Representation Levels 40221.6.3 Beyond Electronic Health Record Data 40321.7 Actionable Guidance and Directions for the Future 40321.8 Conclusion 406References 406Index 409

Regulärer Preis: 190,99 €
Produktbild für Evaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware

Evaluation of Some Android Emulators and Installation of Android OS on Virtualbox and VMware

An Android emulator is an Android Virtual Device (AVD) that represents a specific Android device. You can use an Android emulator as a target platform to run and test your Android applications on your PC. The Android Emulator runs the Android operating system in a virtual machine called an Android Virtual Device (AVD). The AVD contains the full Android software stack, and it runs as if it were on a physical device.You can also install Android on VMware Workstation, VMware Player, VMware ESXi, and Virtualbox. Once you install Android on VMware Workstation or ESXi, you will get all features available for Android installed on a smartphone.This report covers the evaluation of some Android Emulators and Installation of Android OS on Virtualbox and VMware. The report contains the following sections:1. Enabling Hardware Virtualization2. General guideline for installing OpenGL and running OpenGL programs on Microsoft Windows 7 and higher3. Apk Downloader from Google Play Store to PC4. How to install Xapk applications5. Smart GaGa Android Emulator6. NoxPlayer Android Emulator7. Other Types of Gaming Android Emulators8. Genymotion Android Emulator9. Installing Android x86 ISO using Virtualbox10. Installing Android x86 ISO using VMware11. Running Android Apps on Google Chrome using ARC Welder extensionI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator.I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering.I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 7,49 €
Produktbild für Programming Basics

Programming Basics

Explore the basics of the three most popular programming languages: C#, Java, and Python and see what it's like to function in today's world from the perspective of a programmer. This book's uses is highly practical approach with numerous code listings aimed at bringing generations together through the intricacies of technology.You'll learn how understanding the basics of coding benefits non-programmers working with software developers. Those in the gaming/media industry will also benefit from understanding a programmer's point of view. The same applies to software testers and even company executives, who might have an education in business instead of computer science.WHAT YOU'LL LEARN* Think and read code-listings like a programmer* Gain a basic working proficiency in three popular programming languages* Communicate more efficiently with programmers of all experience levels in a work-based environment* Review advanced OOP concepts such as exceptions and error handling* Set up your programming environments for Windows, MacOS, and LinuxWHO THIS BOOK IS FORThose looking to discover programming, including beginners in all fields, and professionals looking to understand how code works.Robert Ciesla is an author and filmmaker from Helsinki, Finland. He is also a freelance-programmer working mostly in the indie game scene. He is the author of Encryption for Organizations and Individuals (2020), Game Development with Ren'Py (2019) and Mostly Codeless Game Development (2017).Chapter 1. Why kids love to code (and you will too)* Motivation for and the benefits of programming* The basic hardware components of a computerChapter 2. What is programming? (and what does it take)* Basic programming concepts explained with some specifics for C#, Java, and Python* What an integrated development environment (IDE) refers to* The gist of variables, variable manipulation, and flow control logicChapter 3. Setting up your programming environments for Windows, MacOS, and LinuxChapter 4. Object-Oriented Programming (OOP)* The object-oriented programming paradigm explained in detail* The basics of UMLChapter 5. File Operations, Multithreading, and Other Wonders of Java* Small tutorials for the language demonstrating the more advanced mechanics of the languageChapter 6. And now for something completely different: Python* More Python techniques (file operations etc.)Chapter 7. C#: A jack of most programming tasks* Deploying C# for desktop, online, and mobile platformsChapter 8. Advanced OOP Techniques* Advanced OOP concepts: exceptions, error handling, etc.Chapter 9. Unified Modeling Language (UML)* Detailed techniques (class relationships and multiplicity, etc.)* Software tools for modeling in UML

Regulärer Preis: 62,99 €
Produktbild für Simple and Efficient Programming with C#

Simple and Efficient Programming with C#

Apply skills and approaches to your programming to build a real-world application in C# 9 using the latest editions of Visual Studio, C#, and Microsoft .NET. Each chapter opens with an introduction and original application written in C# 9 for you to jump  into coding. From there, you are guided through an expected output and taught best practices along the way. Author Vaskaran Sarcar emphasizes extending and maintaining the same program and he demonstrates examples for different scenarios to make your program more efficient and effective. This book is divided into four parts. The first part starts with a detailed discussion of polymorphism. It then shows you how to make proper use of abstract classes and interfaces, and you will know which technique to use for a specific scenario. Discussions on code comments teach you how to use them effectively, and why you need to be careful with code comments. In the second part youwill learn six design principles, including SOLID and DRY principles. These are the foundation of well-known design patterns and they establish practices for developing software with considerations for maintaining and extending as a project grows. The third part takes you through the methods to make efficient applications. You will learn the common use of factories to separate code from its opposite and the alternative of inheritance using object composition and wrappers. This part also demonstrates the use of template methods, hooks, and facades in programming. Hints show you how professional coders develop an enterprise application. In the fourth and final part you will learn about effective memory management techniques by preventing leaks in your application and the use and misuse of design patterns. This part also discusses how to decide between a static method and an instance method and other techniques, in brief. After reading this book, you will beable to implement best practices to make your programs more effective and reliable. What Will You Learn * Analyze the alternative solutions before implementation by comparing the pros and cons * Make polymorphic code perform better * Know the side-effects of bad/redundant comments * Understand the significance of the SOLID and DRY principles * Add features using wrappers * Redefine steps without altering the calling sequence of an algorithm * Use hooks in your application * Convert a complex system into a user-friendly system using facades * Run your application in .NET 6 Who Is This Book For Developers with a basic knowledge of C# Part I: Fundamentals.- Chapter 1: Flexible Code Using Polymorphism.- Chapter 2: Abstract Class or Interface?.- Chapter 3: Wise Use of Code Comments.- Part II: Important Principles.- Chapter 4: Know SOLID Principles.- Chapter 5: Use the DRY Principle.- Part III: Make Efficient Applications.- Chapter 6: Separate Changeable Code Using Factories.-  Chapter 7:  Add Features Using Wrappers.- Chapter 8: Efficient Templates Using Hooks.- Chapter 9: Simplify Complex Systems Using Facades. - Part IV: The Road Ahead.- Chapter 10: Memory Management. – Chapter 11: Leftover Discussions. 

Regulärer Preis: 62,99 €
Produktbild für Strategisches Prozessmanagement - einfach und effektiv

Strategisches Prozessmanagement - einfach und effektiv

Prozessmanager, Unternehmensarchitekt oder Business Analyst sehen Sie vielleicht angesichts der Fülle Ihrer Detailprozesse „den Wald vor lauter Bäumen“ nicht mehr. Dann müssen Sie eine ganzheitliche Sicht auf die Prozesslandschaft und ihre Abhängigkeiten schaffen, damit auf dieser Basis strategische Unternehmens- oder Projektentscheidungen getroffen werden können. Das ist die strategische Seite des Prozessmanagements.In diesem Leitfaden vermitteln Ihnen die Autoren anhand vieler Praxisbeispiele einen Einblick, was für das Strategische Prozessmanagement wirklich notwendig ist. Und sie geben Ihnen eine Schritt-für-Schritt-Anleitung von der Identifikation und Dokumentation der Geschäftsprozesse (end-to-end) bis zur Analyse und Gestaltung der zukünftigen Prozesslandschaft. Dafür stellen sie Ihnen erprobte Modelle und Methoden vor und zeigen, wie diese für die Business-Planung und für das strategische IT-Management wirkungsvoll genutzt werden können.Mit dieser Unterstützung können Sie einfach und effektiv adäquate Prozesslandkarten sowie die für das Management erforderlichen Sichten erstellen. So schaffen Sie einen Überblick über die für die aktuelle und zukünftige Geschäftsentwicklung wesentlichen Geschäftsprozesse und deren Zusammenspiel – und damit die Voraussetzung, um zur richtigen Zeit das Richtige zu tun.AUS DEM INHALT EinleitungStrategisches ProzessmanagementErgebnistypenAufbau der Basisdokumentation und des Prozessmanagement-ReportingsAusbau des Strategischen ProzessmanagementsBusiness Capability ManagementGlossar (RODC)

Regulärer Preis: 39,99 €
Produktbild für Storytelling im UX-Design

Storytelling im UX-Design

Ideen, Inspirationen und Erkenntnisse aus dem traditionellen Storytelling für next-level UX-Design* Erfolgreich Methoden, Werkzeuge und Techniken des Storytelling auf Produktdesign anwenden* Mit vielen anschaulichen Beispielen und praxisnahen Übungen* Ohne abgelutschte Vergleiche und mit dem nötigen TiefgangAngesichts der Vielfalt der heutigen Geräte, Schnittstellen und Kanäle haben Sie immer weniger Kontrolle darüber, wie Nutzer*innen Ihre sorgfältig konzipierten Produkte erleben. Trotzdem ist es für Sie sehr wichtig zu verstehen, an welchen Punkten der User Journey Ihre Kunden sich befinden, damit Sie die passenden Inhalte und interaktiven Elemente zur richtigen Zeit und auf dem richtigen Gerät bereitstellen können.Mit diesem praktischen Leitfaden lernen Sie, welchen positiven Einfluss Storytelling auf Ihr Produktdesign haben kann und wie es Ihnen dabei hilft, die UX Ihrer Produkte entscheidend zu verbessern. Anna Dahlström zeigt Ihnen anhand zahlreicher spannender Beispiele, wie Sie Storytelling einsetzen und bewährte Prinzipien aus Film und Literatur wie Heldenreise und Storyboards anwenden, um großartige Produkterfahrungen zu erzeugen.- Erfahren Sie, wie die Anatomie einer guten Geschichte Ihr Produktdesign maßgeblich verbessern kann.- Entdecken Sie, wie sich traditionelle Prinzipien, Werkzeuge und Techniken des Storytellings auf wichtige Faktoren des Produktdesigns auswirken.- Lernen Sie, wie Sie mit zielgerichtetem Storytelling die richtige Geschichte erzählen und Menschen zum Handeln motivieren.- Nutzen Sie die Regeln des Storytellings, um Ihre Produkte vorzustellen, zu präsentieren und zu verkaufen.Anna Dahlström ist eine schwedische UX-Designerin mit Sitz in London und die Gründerin von UX Fika. Seit 2001 arbeitet sie für Kund*innen, Agenturen und Start-ups an einer Vielzahl von Marken und Projekten, von Websites und Apps bis hin zu Bots und TV-Interfaces.

Regulärer Preis: 36,90 €
Produktbild für Architekturpatterns mit Python

Architekturpatterns mit Python

Bewährte Patterns für komplexe Python-Projekte* bekannte Architekturpatterns - endlich in idiomatischem Python* die Komplexität anspruchsvoller Projekte erfolgreich managen* den größten Nutzen aus den Testsuiten herausholenPythons Popularität wächst weiterhin und mit Python werden inzwischen komplexe Projekte realisiert. Viele Python-Entwicklerinnen und -Entwickler interessieren sich deshalb für High-Level-Design-Patterns wie hexagonale Architektur, ereignisgesteuerte Architektur und die strategischen Patterns, die durch das Domain-Driven Design vorgegeben sind. Das Übertragen dieser Patterns nach Python ist allerdings nicht immer einfach.In diesem Praxisbuch stellen Harry Percival und Bob Gregory von MADE.com erprobte Architekturpatterns vor, die Python-Entwickler dabei unterstützen, die Komplexität von Anwendungen im Griff zu behalten – und den größtmöglichen Nutzen aus den Testsuiten zu ziehen. Jedes Pattern wird durch Beispiele in schönem, idiomatischem Python illustriert; dabei wird die Weitschweifigkeit der Java- oder C#-Syntax vermieden.Anna Dahlström ist eine schwedische UX-Designerin mit Sitz in London und die Gründerin von UX Fika. Seit 2001 arbeitet sie für Kund*innen, Agenturen und Start-ups an einer Vielzahl von Marken und Projekten, von Websites und Apps bis hin zu Bots und TV-Interfaces.

Regulärer Preis: 36,90 €
Produktbild für Threat Hunting in the Cloud

Threat Hunting in the Cloud

IMPLEMENT A VENDOR-NEUTRAL AND MULTI-CLOUD CYBERSECURITY AND RISK MITIGATION FRAMEWORK WITH ADVICE FROM SEASONED THREAT HUNTING PROSIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.With this book you'll learn:* Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment* Metrics available to assess threat hunting effectiveness regardless of an organization's size* How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations* A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks* Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs)* Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration* Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies* Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers* The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices.Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.CHRIS PEIRIS, PHD, has advised Fortune 500 companies, Federal and State Governments, and Defense and Intelligence entities in the Americas, Asia, Japan, Europe, and Australia New Zealand. He has 25+ years of IT industry experience. He is the author of 10 published books and is a highly sought-after keynote speaker.BINIL PILLAI is a Microsoft Global Security Compliance and Identity (SCI) Director for Strategy and Business Development focusing on the Small Medium Enterprise segment. He has 21+ years of experience in B2B cybersecurity, digital transformation, and management consulting. He is also a board advisor to several start-ups to help grow their businesses successfully. ABBAS KUDRATI is a CISO and cybersecurity practitioner. He is currently Microsoft Asia’s Lead Chief Cybersecurity Advisor for the Security Solution Area and serves as Executive Advisor to Deakin University, LaTrobe University, HITRUST ASIA, and EC Council ASIA. Foreword xxxiIntroduction xxxiiiPART I THREAT HUNTING FRAMEWORKS 1CHAPTER 1 INTRODUCTION TO THREAT HUNTING 3The Rise of Cybercrime 4What Is Threat Hunting? 6The Key Cyberthreats and Threat Actors 7Phishing 7Ransomware 8Nation State 10The Necessity of Threat Hunting 14Does the Organization’s Size Matter? 17Threat Modeling 19Threat-HuntingMaturity Model 23Organization Maturity and Readiness 23Level 0: INITIAL 24Level 1: MINIMAL 25Level 2: PROCEDURAL 25Level 3: INNOVATIVE 25Level 4: LEADING 25Human Elements of Threat Hunting 26How Do You Make the Board of Directors Cyber-Smart? 27Threat-Hunting Team Structure 30External Model 30Dedicated Internal Hunting Team Model 30Combined/Hybrid Team Model 30Periodic Hunt Teams Model 30Urgent Need for Human-Led Threat Hunting 31The Threat Hunter’s Role 31Summary 33CHAPTER 2 MODERN APPROACH TO MULTI-CLOUD THREAT HUNTING 35Multi-Cloud Threat Hunting 35Multi-Tenant Cloud Environment 38Threat Hunting in Multi-Cloud and Multi-Tenant Environments 39Building Blocks for the Security Operations Center 41Scope and Type of SOC 43Services, Not Just Monitoring 43SOC Model 43Define a Process for Identifying and Managing Threats 44Tools and Technologies to Empower SOC 44People (Specialized Teams) 45Cyberthreat Detection, Threat Modeling, and the Need for Proactive Threat Hunting Within SOC 46Cyberthreat Detection 46Threat-Hunting Goals and Objectives 49Threat Modeling and SOC 50The Need for a Proactive Hunting Team Within SOC 50Assume Breach and Be Proactive 51Invest in People 51Develop an Informed Hypothesis 52Cyber Resiliency and Organizational Culture 53Skillsets Required for Threat Hunting 54Security Analysis 55Data Analysis 56Programming Languages 56Analytical Mindset 56Soft Skills 56Outsourcing 56Threat-Hunting Process and Procedures 57Metrics for Assessing the Effectiveness of Threat Hunting 58Foundational Metrics 58Operational Metrics 59Threat-Hunting Program Effectiveness 61Summary 62CHAPTER 3 EXPLORATION OF MITRE KEY ATTACK VECTORS 63Understanding MITRE ATT&CK 63What Is MITRE ATT&CK Used For? 64How Is MITRE ATT&CK Used and Who Uses It? 65How Is Testing Done According to MITRE? 65Tactics 67Techniques 67Threat Hunting Using Five Common Tactics 69Privilege Escalation 71Case Study 72Credential Access 73Case Study 74Lateral Movement 75Case Study 75Command and Control 77Case Study 77Exfiltration 79Case Study 79Other Methodologies and Key Threat-Hunting Tools to CombatAttack Vectors 80Zero Trust 80Threat Intelligence and Zero Trust 83Build Cloud-Based Defense-in-Depth 84Analysis Tools 86Microsoft Tools 86Connect To All Your Data 87Workbooks 88Analytics 88Security Automation and Orchestration 90Investigation 91Hunting 92Community 92AWS Tools 93Analyzing Logs Directly 93SIEMs in the Cloud 94Summary 95Resources 96PART II HUNTING IN MICROSOFT AZURE 99CHAPTER 4 MICROSOFT AZURE CLOUD THREAT PREVENTION FRAMEWORK 101Introduction to Microsoft Security 102Understanding the Shared Responsibility Model 102Microsoft Services for Cloud Security Posture Management and Logging/Monitoring 105Overview of Azure Security Center and Azure Defender 105Overview of Microsoft Azure Sentinel 108Using Microsoft Secure and Protect Features 112Identity & Access Management 113Infrastructure & Network 114Data & Application 115Customer Access 115Using Azure Web Application Firewall to Protect a Website Against an “Initial Access” TTP 116Using Microsoft Defender for Office 365 to Protect Against an “Initial Access” TTP 118Using Microsoft Defender Endpoint to Protect Against an “Initial Access” TTP 121Using Azure Conditional Access to Protect Against an “Initial Access” TTP 123Microsoft Detect Services 127Detecting “Privilege Escalation” TTPs 128Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Privilege Escalation” TTP 128Detecting Credential Access 131Using Azure Identity Protection to Detect Threats Against a “Credential Access” TTP 132Steps to Configure and Enable Risk Polices (Sign-in Risk and User Risk) 134Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Credential Access” TTP 137Detecting Lateral Movement 139Using Just-in-Time in ASC to Protect and Detect Threats Against a “Lateral Movement” TTP 139Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Lateral Movement” TTP 144Detecting Command and Control 145Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Command and Control” TTP 146Detecting Data Exfiltration 147Using Azure Information Protection to Detect Threats Against a “Data Exfiltration” TTP 148Discovering Sensitive Content Using AIP 149Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Data Exfiltration” TTP 153Detecting Threats and Proactively Hunting with Microsoft 365 Defender 154Microsoft Investigate, Response, and Recover Features 155Automating Investigation and Remediation with Microsoft Defender for Endpoint 157Using Microsoft Threat Expert Support for Remediation and Investigation 159Targeted Attack Notification 159Experts on Demand 161Automating Security Response with MCAS and Microsoft Flow 166Step 1: Generate Your API Token in Cloud App Security 167Step 2: Create Your Trigger in Microsoft Flow 167Step 3: Create the Teams Message Action in Microsoft Flow 168Step 4: Generate an Email in Microsoft Flow 168Connecting the Flow in Cloud App Security 169Performing an Automated Response Using Azure Security Center 170Using Machine Learning and Artificial Intelligence in Threat Response 172Overview of Fusion Detections 173Overview of Azure Machine Learning 174Summary 182CHAPTER 5 MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE AND CAPABILITY MAP 183Introduction 183Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) 184Microsoft Security Architecture 185The Identify Function 186The Protect Function 187The Detect Function 188The Respond Function 189The Recover Function 189Using the Microsoft Reference Architecture 190Microsoft Threat Intelligence 190Service Trust Portal 192Security Development Lifecycle (SDL) 193Protecting the Hybrid Cloud Infrastructure 194Azure Marketplace 194Private Link 195Azure Arc 196Azure Lighthouse 197Azure Firewall 198Azure Web Application Firewall (WAF) 200Azure DDOS Protection 200Azure Key Vault 201Azure Bastion 202Azure Site Recovery 204Azure Security Center (ASC) 205Microsoft Azure Secure Score 205Protecting Endpoints and Clients 206Microsoft Endpoint Manager (MEM) Configuration Manager 207Microsoft Intune 208Protecting Identities and Access 209Azure AD Conditional Access 210Passwordless for End-to-EndSecure Identity 211Azure Active Directory (aka Azure AD) 211Azure MFA 211Azure Active Directory Identity Protection 212Azure Active Directory Privilege IdentityManagement (PIM) 213Microsoft Defender for Identity 214Azure AD B2B and B2C 215Azure AD Identity Governance 215Protecting SaaS Apps 216Protecting Data and Information 219Azure Purview 220Microsoft Information Protection (MIP) 221Azure Information Protection Unified Labeling Scanner (File Scanner) 222The Advanced eDiscovery Solution in Microsoft 365 223Compliance Manager 224Protecting IoT and Operation Technology 225Security Concerns with IoT 226Understanding That IoT Cybersecurity Starts with a Threat Model 227Microsoft Investment in IoT Technology 229Azure Sphere 229Azure Defender 229Azure Defender for IoT 230Threat Modeling for the Azure IoT Reference Architecture 230Azure Defender for IoT Architecture (Agentless Solutions) 233Azure Defender for IoT Architecture (Agent-based solutions) 234Understanding the Security Operations Solutions 235Understanding the People Security Solutions 236Attack Simulator 237Insider Risk Management (IRM) 237Communication Compliance 239Summary 240PART III HUNTING IN AWS 241CHAPTER 6 AWS CLOUD THREAT PREVENTION FRAMEWORK 243Introduction to AWS Well-Architected Framework 244The Five Pillars of the Well-Architected Framework 245Operational Excellence 246Security 246Reliability 246Performance Efficiency 246Cost Optimization 246The Shared Responsibility Model 246AWS Services for Monitoring, Logging, and Alerting 248AWS CloudTrail 249Amazon CloudWatch Logs 251Amazon VPC Flow Logs 252Amazon GuardDuty 253AWS Security Hub 254AWS Protect Features 256How Do You Prevent Initial Access? 256How Do You Protect APIs from SQL Injection Attacks Using APIGateway and AWS WAF? 256Prerequisites 257Create an API 257Create and Configure an AWS WAF 259AWS Detection Features 263How Do You Detect Privilege Escalation? 263How Do You Detect the Abuse of Valid Account to Obtain High-Level Permissions? 264Prerequisites 264Configure GuardDuty to Detect Privilege Escalation 265Reviewing the Findings 266How Do You Detect Credential Access? 269How Do You Detect Unsecured Credentials? 269Prerequisites 270Reviewing the Findings 274How Do You Detect Lateral Movement? 276How Do You Detect the Use of Stolen Alternate Authentication Material? 277Prerequisites 277How Do You Detect Potential Unauthorized Access to Your AWS Resources? 277Reviewing the Findings 278How Do You Detect Command and Control? 280How Do You Detect the Communications to a Command and Control Server Using the Domain Name System (DNS)? 281Prerequisites 281How Do You Detect EC2 Instance Communication with a Command and Control (C&C) Server Using DNS 281Reviewing the Findings 282How Do You Detect Data Exfiltration? 284Prerequisites 285How Do You Detect the Exfiltration Using an Anomalous API Request? 285Reviewing the Findings 286How Do You Handle Response and Recover? 289Foundation of Incident Response 289How Do You Create an Automated Response? 290Automating Incident Responses 290Options for Automating Responses 291Cost Comparisons in Scanning Methods 293Event-Driven Responses 294How Do You Automatically Respond to Unintended Disabling of CloudTrail Logging? 295Prerequisites 296Creating a Trail in CloudTrail 296Creating an SNS Topic to Send Emails 299Creating Rules in Amazon EventBridge 302How Do You Orchestrate and Recover? 305Decision Trees 305Use Alternative Accounts 305View or Copy Data 306Sharing Amazon EBS Snapshots 306Sharing Amazon CloudWatch Logs 306Use Immutable Storage 307Launch Resources Near the Event 307Isolate Resources 308Launch Forensic Workstations 309Instance Types and Locations 309How Do You Automatically Recover from Unintended Disabling of CloudTrail Logging? 310Prerequisites 311Aggregate and View Security Status in AWS Security Hub 311Reviewing the Findings 312Create Lambda Function to Orchestrate and Recover 314How Are Machine Learning and Artificial Intelligence Used? 317Summary 318References 319CHAPTER 7 AWS REFERENCE ARCHITECTURE 321AWS Security Framework Overview 322The Identify Function Overview 323The Protect Function Overview 324The Detect Function Overview 325The Respond Function Overview 325The Recover Function Overview 325AWS Reference Architecture 326The Identify Function 326Security Hub 328AWS Config 329AWS Organizations 330AWS Control Tower 331AWS Trusted Advisor 332AWS Well-Architected Tool 333AWS Service Catalog 334AWS Systems Manager 335AWS Identity and Access Management (IAM) 337AWS Single Sign-On (SSO) 338AWS Shield 340AWS Web Application Firewall (WAF) 340AWS Firewall Manager 342AWS Cloud HSM 343AWS Secrets Manager 345AWS Key Management Service (KMS) 345AWS Certificate Manager 346AWS IoT Device Defender 347Amazon Virtual Private Cloud 347AWS PrivateLink 349AWS Direct Connect 349AWS Transit Gateway 350AWS Resource Access Manager 351The Detect and Respond Functions 353GuardDuty 354Amazon Detective 356Amazon Macie 357Amazon Inspector 358Amazon CloudTrail 359Amazon CloudWatch 360Amazon Lambda 361AWS Step Functions 362Amazon Route 53 363AWS Personal Health Dashboard 364The Recover Functions 365Amazon Glacier 366AWS CloudFormation 366CloudEndure Disaster Recovery 367AWS OpsWorks 368Summary 369PART IV THE FUTURE 371CHAPTER 8 THREAT HUNTING IN OTHER CLOUD PROVIDERS 373The Google Cloud Platform 374Google Cloud Platform Security Architecture alignment to NIST 376The Identify Function 376The Protect Function 378The Detect Function 380The Respond Function 382The Recover Function 383The IBM Cloud 385Oracle Cloud Infrastructure Security 386Oracle SaaS Cloud Security Threat Intelligence 387The Alibaba Cloud 388Summary 389References 389CHAPTER 9 THE FUTURE OF THREAT HUNTING 391Artificial Intelligence and Machine Learning 393How ML Reduces False Positives 395How Machine Intelligence Applies to Malware Detection 395How Machine Intelligence Applies to Risk Scoring in a Network 396Advances in Quantum Computing 396Quantum Computing Challenges 398Preparing for the Quantum Future 399Advances in IoT and Their Impact 399Growing IoT Cybersecurity Risks 401Preparing for IoT Challenges 403Operational Technology (OT) 405Importance of OT Security 406Blockchain 406The Future of Cybersecurity with Blockchain 407Threat Hunting as a Service 407The Evolution of the Threat-Hunting Tool 408Potential Regulatory Guidance 408Summary 409References 409PART V APPENDICES 411APPENDIX A MITRE ATT&CK TACTICS 413APPENDIX B PRIVILEGE ESCALATION 415APPENDIX C CREDENTIAL ACCESS 421APPENDIX D LATERAL MOVEMENT 431APPENDIX E COMMAND AND CONTROL 435APPENDIX F DATA EXFILTRATION 443APPENDIX G MITRE CLOUD MATRIX 447Initial Access 447Drive-byCompromise 447Exploiting a Public-FacingApplication 450Phishing 450Using Trusted Relationships 451Using Valid Accounts 452Persistence 452Manipulating Accounts 452Creating Accounts 453Implanting a Container Image 454Office Application Startup 454Using Valid Accounts 455Privilege Escalation 456Modifying the Domain Policy 456Using Valid Accounts 457Defense Evasion 457Modifying Domain Policy 457Impairing Defenses 458Modifying the Cloud Compute Infrastructure 459Using Unused/Unsupported Cloud Regions 459Using Alternate Authentication Material 460Using Valid Accounts 461Credential Access 461Using Brute Force Methods 461Forging Web Credentials 462Stealing an Application Access Token 462Stealing Web Session Cookies 463Using Unsecured Credentials 464Discovery 464Manipulating Account Discovery 464Manipulating Cloud Infrastructure Discovery 465Using a Cloud Service Dashboard 466Using Cloud Service Discovery 466Scanning Network Services 467Discovering Permission Groups 467Discovering Software 468Discovering System Information 468Discovering System Network Connections 469Lateral Movement 469Internal Spear Phishing 469Using Alternate Authentication Material 470Collection 471Collecting Data from a Cloud Storage Object 471Collecting Data from Information Repositories 471Collecting Staged Data 472Collecting Email 473Data Exfiltration 474Detecting Exfiltration 474Impact 475Defacement 475Endpoint Denial of Service 475Resource Hijacking 477APPENDIX H GLOSSARY 479Index 489

Regulärer Preis: 32,99 €
Produktbild für The Personal Computer Past, Present and Future 1975/2021

The Personal Computer Past, Present and Future 1975/2021

This book relates the story of the Personal Computer, from 1975 to 2021. It discusses the spectacular growth in sales over the first 36 years to 2011 and the techniques used by entrepreneurs to make this happen.The next six years to 2017 are years of precipitous decline in Personal computer sales. We explain the causes of this decline.We conclude by an examination of PC sales to 2021, when they enjoyed a resurgence and speculate on why this has been happening.

Regulärer Preis: 4,49 €
Produktbild für High-Quality Illumination of Virtual Objects Based on an Environment Estimation in Mixed Reality Applications

High-Quality Illumination of Virtual Objects Based on an Environment Estimation in Mixed Reality Applications

Visualizations of virtual objects in the real environment is often done by a simplified representation with simple surfaces and without reference to the surrounding environment. The seamless fusion of the virtual and real environment is, however, an essential factor in many areas, which is of particular importance when calculating lighting in mixed realities on mobile devices. Current approaches focus on approximations, which allow the calculation of diffuse lighting, whereby the rendering of glossy reflection properties is often neglected. The aim of this book is to enable the visualization of mirror-like reflective surfaces in mixed reality. In order to achieve this goal, various approaches are explored enabling high-quality visualization of virtual objects in realtime with a focus on the use of common hardware such as cameras, sensors in mobile devices, and partially depth sensors. Complete ambient lighting can be estimated, which enables detailed reflections. The results provide a novel way to embed complex and simple geometric shapes with glossy surfaces in the real world which offers a higher level of detail in the reflections without using additional hardware.TOBIAS SCHWANDT´S professional and personal focus at the TU Ilmenau is the area of Mixed-Reality (MR). Within his dissertation, he particularly concerned himself with the topic of illumination of virtual content in AR, its influence on the real environment, the reconstruction of the environment light, and the manipulation of real geometry by virtual content.Introduction.- Fundamentals & State of the Art.- Illumination in Mixed Reality.- Realization.- Results.- Discussion & Limitations.- Conclusion & Outlook.

Regulärer Preis: 74,89 €
Produktbild für The Protractor Handbook

The Protractor Handbook

Learn to quickly set up Protractor and dive into the amazing possibilities that this tool offers for automating browser interactions for a user for any Angular web application. Software testing is here to stay, and an integral part of this is test automation. Protractor is one of the most evolved test automation frameworks that every software testing professional working with an Angular application should know.You will to automate a vast range of actions that a user takes to interact with the browser. From a simple ‘click’ to more complex user actions such as frame switches, selecting from drop-downs, and file downloads using Protractor APIs for Angular-based websites. You will also learn about assertions, timeouts, waits, parallel testing frameworks that are available, and the general pros and cons you should be aware of.With over 150 working code samples demonstrating various test scenarios that you require in your day-to-day automation testing, and examples that may be given in interviews, this book will be your practical handbook to all the key Protractor API implementations.WHAT YOU'LL LEARN* Set up and install Protractor efficiently* Implement Angular-specific locator strategies* Automate Angular web pages* Run parallel execution using Protractor* Explore all the pros, cons and challenges you may face while using Protractor* Use specific notes around each API to ensure optimum usage and avoid common mistakesWHO THIS BOOK IS FORIdeal for test engineers who have a basic understanding of test automation with Selenium, developers who want to implement this testing tool for internal testing, Test Managers/IT Project Managers who want to get some general understanding of this tool and its advantages, and students who want to pursue career in test automation.SHASHANK SHUKLA has been working in software testing for over a decade and is passionate about tools and technology that can be leveraged to enrich the testing experience and optimize the quality of delivery. This is his second Apress book.1. Getting Started2. Installationa. Prerequisitesb. Installation processc. Installation Details3. Locatorsa. IDb. Classc. Name Attributed. Tag Namee. Link Textf. Partial Link Textg. Element with certain texth. CSS Query Selectori. xPathj. JS Functionk. Chain Selectorsl. React Selectorsm. Custom Selectors4. Browser APIsa. Get count of elements returned from an Array of elementb. Get First element returned from an Array of elementc. Get Text of an elementd. Get any element returned from an Array of elementse. Get Last element returned from an Array of elementsf. 'Then' functiong. Iterate all elementsh. Getting all links of a pagei. Map functionj. Reduce functionk. Returns the most relevant locator of an elementl. Scroll an element Into Viewm. Click on an elementn. Double Click on an elemento. Right click on an elementp. Send text to an Input fieldq. Send text to an Input field via addValuer. Send Keyboard keys to an elements. Get Value of an elementt. Clear the text inside an Input fieldu. Hover Mouse on an elementv. Navigating to new URL in a browserw. Navigating Back in a browserx. Navigating Forward in a browsery. Refreshing a web-pagez. Restarting a browseraa. Getting & Setting Window Size & positionbb. Getting Element Sizecc. Maximizing the Browserdd. Minimizing the Browseree. Browser fullscreen modeff. Open a new Windowgg. Get the URL of the current pagehh. Get the Title of the current pageii. Send JavaScript to do a task Vanilla JSCodejj. Send JavaScript to do a task Handeling Datepickerkk. Send JavaScript to do a task Clickingll. Send JavaScript to do a task Detecting Broken imagemm. Taking Full page Screenshotnn. Switching Between Windowsoo. Switching between Framespp. Closing the pageqq. Closing the browserrr. Alerts Accepting an Alertss. Alerts Dismissing an Alerttt. Alerts Reading message of an Alertuu. Alerts Sending message to an Alertvv. Selecting from a Dropdownww. Drag and Dropxx. Uploading a fileyy. Submitting a formzz. Display Cookiesaaa. delete Cookiesbbb.Set Cookiesccc. Basic authenticationddd.GeoLocations5. Element APIsa. Is the element Present? isExistingb. Is the element Present? toExistc. Is the element Present? ToBePresentd. Is the element Present in DOM? ToBeExistinge. Is the element Present inside another element?f. Is the element Enabled? IsEnabledg. Is the element Enabled? ToBeEnabledh. Is the element Disabled? ToBeEnabledi. Is the element Visible? IsDisplayedj. Is the element Visible? ToBeDisplayedk. Is the element Visible? toBeVisiblel. Is the element Visible on the screen? toBeDisplayedInViewportm. Is the element Visible on the screen? toBeVisibleInViewportn. Is the element Selected? isSelectedo. Is the element Selected? ToBeSelectedp. Is the element Selected? ToBeCheckedq. Is the element Clickable? isClickabler. Is the element Clickable? toBeClickable6. Some Additional Protractor IO Methodsa. Is the element Focused? isFocusedb. Is the element Focused? toBeFocusedc. Does the element have a specific Attribute? toHaveAttributed. Does the element have a specific Attribute? toHaveAttre. Does element contains a specific text Attribute? toHaveAttributeContainingf. Does the element have a specific Class? toHaveClassg. Does element contains specific text in Class? toHaveClassContainingh. Does the element have a specific Property? toHavePropertyi. Does the element have a specific Value? toHaveValuej. Does the element have a specific Href? toHaveHrefk. Does element contains specific text in Href? toHaveHrefContainingl. Does the element have specific Link? toHaveLinkm. Does element contains specific text in Link? toHaveLinkContainingn. Does the element have a specific text toHaveTexto. Does element contains a specific text?p. Does the element have specific ID?q. Count of Element7. Waitsa. Wait untilb. Hard Sleepc. Wait for element to be Clickabled. Wait for element to be Displayede. Wait for element to be Enabledf. Wait for element to Existg. Chapter 8: Other APIsh. Dealing with shadow DOMi. Getting the page sourcej. Getting active elementk. Getting the Property of elementl. Getting the CSS Property of elementm. Getting the Tag Name of the elementn. Getting the Location of an elemento. Getting Size of the elementp. Getting the HTML build of the elementq. Debug8. Jasmine Assertionsa. To verify if strings match by valueb. To verify if strings match by value & typec. To verify if a value is Truthyd. To verify if a value is Falsye. To verify if a value is equal(==)f. To verify if a value & type both are equal(===)g. To verify if a value is not equal(==)h. To verify if a value & type are not equal(==)i. To verify if a value is abovej. To verify if a value is belowk. To verify if a Expected is Truel. To verify if a Expected is falsem. To verify if a Expected is an arrayn. To verify if a Expected is a Stringo. To verify if Array contains a valuep. To verify length of an Array9. Timeoutsa. Setting & Getting various Timeoutb. Session Script Timeoutc. Session Page Load Timeoutd. Session Implicit Wait Timeoute. WaitForTimeout Protractor related timeoutsf. Framework related timeouts10. Parallel Executiona. Framework Optionsb. Protractor with Mochac. Protractor with Jasmined. Protractor with Cucumbere. Protractor with Mocha & TypeScript11. Conclusiona. Advantagesb. Disadvantagesc. Challenges

Regulärer Preis: 56,99 €
Produktbild für Azure Security Handbook

Azure Security Handbook

Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization.This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigue and confusion. Throughout the book you will learn how to secure your applications using Azure’s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure.WHAT YOU WILL LEARN* Remediate security risks of Azure applications by implementing the right security controls at the right time* Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations* Protect the most common reference workloads according to security best practices* Design secure access control solutions for your Azure administrative access, as well as Azure application accessWHO THIS BOOK IS FORCloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise.KARL OTS is a cloud and cybersecurity leader with more than a decade of experience in Microsoft Azure security. He has worked with large enterprises in fields such as technology, manufacturing, and finance. Karl is recognized as a Microsoft Regional Director, a patented inventor, a LinkedIn Learning instructor, and a Microsoft Azure MVP. He holds the Azure Security Engineer, SABSA Foundation SCF, and CISSP certifications. Karl is a frequent speaker on cloud security topics at global conferences such as Microsoft Ignite or (ISC)2 Security Congress. He hosts the Cloud Gossip podcast.1. Introduction to Cloud Security Architecture2. Identity and Access Management3. Logging and Monitoring4. Network Security5. Workload Protection- Data6. Workload Protection- Platform-as-a-Service7. Workload Protection- Containers8 Workload Protection- IaaS

Regulärer Preis: 62,99 €
Produktbild für Practical Enterprise React

Practical Enterprise React

Learn to write a real-world enterprise app using the fundamentals of React and the most popular React libraries. Knowing the basics of React is important, but what is more important is knowing the common third-party libraries and how to use them. The book is perfect for intermediate to experienced React developers or busy React developers who would like to get things done and have maintainable React code.Practical Enterprise React features popular libraries such as React Router v6 for route navigation, Redux with Saga and Thunk for state management, and Formik with Yup for form and input validations. You'll also work with Material UI 5 (the next major version of the most popular UI component library in React), Axios as the HTTP client library, JWT auth for client app authentication, and TypeScript. Finally, you'll learn to deploy the app to Netlify, and containerize the React app to ship it as a standalone container instance or in a Kubernetes cluster.Become a more effective React developer by using what is available out there instead of trying to reinvent the wheel. This book reveals how to save time and money, and build better apps for your clients. Get practical with React enterprise app development and enhance your career.WHAT YOU'LL LEARN* Use TypeScript in React and React Hooks* Work with Redux Toolkit, and TypeScript* Build an inventory dashboard, charts, and calendar* Write forms with Formik* Validate inputs with Yup* Use Material UI for fast user interface building* Secure your React app by building a login form and protecting the routesWHO THIS BOOK IS FORThose interested in writing React enterprise apps. Knowledge of HTML, CSS and JavaScript/TypeScript is required, and experience with JavaScript libraries/frameworks would be useful.Devlin Duldulao is a Filipino full-stack cloud engineer (web, mobile, backend, cloud services developer) based in Norway. He is a Microsoft MVP, an Auth0 Ambassador, a corporate on-site trainer for the past four years, a Microsoft certified trainer, an international conference speaker, and a senior consultant at Inmeta. He loves going to universities and user groups after office hours or during the weekend to share his expertise. If he is not coding or speaking at conferences, he is probably traveling around the world with his wife; trying local foods in different cities. You can find him on Twitter @DevlinDuldulao.Ruby Jane Canagbot is a serendipitous Filipina React.js developer with a wanderlust heart but currently living in Norway. She is based in Oslo, Norway, with about three years of experience as a developer and over ten years as a content writer/manager. She believes that one can still teach old dogs new tricks, even coding.Written by a professional React developer andChapter 1. Getting Ahead in ReactChapter 2. Getting Started with Node Package ManagerChapter 3. Getting Started with React Function Components and TypescriptChapter 4. Setting Up an Enterprise-level AppChapter 5. Navigating the React RouterChapter 6. Writing Local State, Sending HTTP Requests, & ApexChartsChapter 7. Writing Data Tables, Formik Forms, and Yup ValidationsChapter 8. Writing Data Tables, Formik Forms, and Yup Validations -- Part 2Chapter 9: Managing State Using Redux with Redux ToolkitChapter 10: Setting Up Redux Toolkit and Dispatching an Asynchronous ActionChapter 11: Creating, Deleting, and Updating Events on FullCalendar Using RTKChapter 12: Protecting Routes and Authentication in ReactChapter 13: Writing Profile Form and Syncing Profile to ComponentsChapter 14: Updating the Dashboard Sidebar NavigationChapter 15: Creating the Notifications, Security, and Subscription PagesChapter 16: Making the App Mobile-FriendlyChapter 17: Styling Methods for React ComponentsChapter 18: Deploying React in Netlify and in DockerChapter 19: Reusing React Skills in Other Platforms and Frameworks

Regulärer Preis: 66,99 €
Produktbild für Tools für Social Listening und Sentiment-Analyse

Tools für Social Listening und Sentiment-Analyse

Mit diesem Buch lernen Sie, wie Sie Social Listening und Sentiment-Analyse professionell einsetzen können. Der Leser erhält Schritt-für-Schritt-Beschreibungen für verschiedene Einsatzszenarien, gekoppelt mit Übungsaufgaben und nützlichen Materialien, darunter ein Merkblatt für Kennzahlen, eine Checkliste für die Toolauswahl und ein Glossar für Fachbegriffe. Dieses Lehr- und Praxisbuch verdeutlicht anhand von Anwendungsszenarien und Praxisbeispielen, wie Tools und Technologien für Social Listening und Sentiment-Analyse für die Analyse deutschsprachiger Online-Textdaten angewandt werden können und welche Vorteile diese bringen. Der Leser erhält einen Überblick über wichtige Funktionalitäten aktuell verfügbarer Social-Listening-Tools und deren Einsatzmöglichkeiten.MELPOMENI ALEXA ist Professorin an der Hochschule Darmstadt und unterrichtet dort Methoden und Einsatz von Tools für Online Monitoring, Sentiment-Analyse/Opinion Mining und Social Listening im Fachgebiet Onlinekommunikation.MELANIE SIEGEL ist Professorin an der Hochschule Darmstadt und unterrichtet dort Verfahren zur automatischen Analyse von Sprache im Fachgebiet Information Science.Einleitung, Hintergrund und Motivation.- Grundlagen: Social Listening und Sentimentanalyse.- Anwendungsfelder.- Überblick Tools und Technologien.- Tool-Funktionalitäten und Elemente (was wird wie bewertet?).- Anwendungsszenarien: Ziel, Toolauswahl, Analyse, Alarms, Reports inkl. Datenvisualisierung.- Herausforderungen, Grenzen (inkl. Opinion Spam, Sarkasmus, Ironie).- Ausblick (inkl. Sentimentanalyse von Bild und Video).

Regulärer Preis: 39,99 €