Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für IT und IT-Sicherheit in Begriffen und Zusammenhängen

IT und IT-Sicherheit in Begriffen und Zusammenhängen

Verloren im Dschungel der vielen Begriffe und Modewörter in der IT und der IT-Sicherheit? Genervt von ausschweifenden Internet-Texten, unverständlichen Insider-Beiträgen und fragwürdigen Darstellungen? Dieses Kompendium informiert zweckdienlich, präzise und objektiv. Die Begriffe werden leicht verständlich erklärt. Die thematische Sortierung lädt zum Weiterlesen ein, sodass Sie sich mühelos ein kleines oder größeres Teilgebiet erschließen können. Mit Hilfe alphabetischer Verzeichnisse für Fachbegriffe und kommentierte Abkürzungen finden Sie schnell den gesuchten Begriff. Die Texte versuchen niemals zu überzeugen oder gar etwas anzubieten oder zu verkaufen, wie man es häufig im Internet findet. Das Buch ist ein Kompendium, das Sie nicht komplett lesen müssen und doch alles bietet.Umfang und Themenwahl sind einzigartig: IT-Sicherheit, Informationstechnik und Netze, marktgängige IT-Services, Produktionsprozesse, Sicherheitsprodukte, etwas Kryptografie sowie vieles über Verträge und Geschäfte.PROF. DR. EBERHARD VON FABER arbeitet als Chief Security Advisor, IT Services, bei T-Systems. Er verfügt über fast 30 Jahre Industrieerfahrung auf dem Gebiet der IT-Sicherheit und lehrt als Professor für IT-Sicherheit an der Technischen Hochschule Brandenburg. Seine Spezialthemen sind Sicherheitsarchitekturen und die Interaktion in industriellen Liefernetzwerken für mehr und bessere Informationssicherheit. Allgemeine IT-Sicherheit - Identitäts- und Zugriffsmanagement (IAM) - IT/TK-Services und Informationstechnologie - IT-Verfahren, Abläufe und Prozesse - Produkte und Produktgruppen der IT-Sicherheit - Kunden, Verträge und Geschäfte - Kryptografie.

Regulärer Preis: 46,99 €
Produktbild für Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Microsoft Azure, commonly referred to as Azureis a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems. The major benefit of a remote desktop connection is being able to connect to your data from anywhere in the world. Your data is in one place that is easy to see and you no longer have to have software installed on your own computer.Azure is one of the best virtual computers and networks providers for remote desktop (RDP) connections. When you create Azure account, you pay as you go. You purchase Azure services with pay-as-you-go pricing. You pay only for what you use each month, with no upfront commitment, and cancel anytime. You must add your credit/debit card for billing to use pay as you go subscription.But I was looking for totally free subscription where I dont need to add my credit card for billing. I found there are two possible options for that:1) A sandbox gives you access to Azure resources. Your Azure subscription will not be charged. The sandbox may only be used to complete training on Microsoft Learn. Creating the Azure Virtual machines using sandbox which is learning subscription, you can connect to the VM via RDP port but you cannot access to Internet through the Internet Explorer. 2) Alternatively Microsoft Azure provides a free $100 credit for students accounts registered through university emails (free student subscription for around one year). There is internet access in the VM machine under this type of subscription.Azure documentations is too deep and it is hard to be understand creating and managing virtual computers and networks in Auzre for remote access connection by any beginner. So, I tried to outline in this report the most important topics as reference guide to assist the user to create and manage virtual computers and networks in Azure for remote access connection in simplified and clear way. This report will include the following parts:1.Getting free Azure subscription through Sandbox Microsoft Learn subscription (No credit card needed)2.Free 12 months, then pay-as-you-go Azure account subscription (Credit card needed) 3.Student subscription (No debit/credit cards needed)4.How to get university email5.Virtual networks and virtual machines in Azure6.Quick start for PowerShell in Azure Cloud Shell7.Quick start with Azure PowerShell8.Installing Azure CLI on Windows and creating virtual machine9.Creating a Windows virtual machine in Azure10.Quick start to create a Linux virtual machine in the Azure portal11.Tutorial to create a NAT Gateway using the Azure portal and test the NAT service12.What is Azure Network Watcher?13.Network Watcher Agent14.Troubleshoot connections with Azure Network Watcher using the Azure portal15.Troubleshoot Azure VM connectivity problems16.Quick start to configure Load Balancer17.Quick start to configure VPN Gateway using Azure portal18.Tutorial to connect to a virtual machine using Azure Bastion19.Exercise to create Window Virtual Machine 20.Exercise to create Ubuntu Virtual MachineI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 6,49 €
Produktbild für Integration of Cloud Computing with Internet of Things

Integration of Cloud Computing with Internet of Things

The book aims to integrate the aspects of IoT, Cloud computing and data analytics from diversified perspectives. The book also plans to discuss the recent research trends and advanced topics in the field which will be of interest to academicians and researchers working in this area. Thus, the book intends to help its readers to understand and explore the spectrum of applications of IoT, cloud computing and data analytics.Here, it is also worth mentioning that the book is believed to draw attention on the applications of said technology in various disciplines in order to obtain enhanced understanding of the readers. Also, this book focuses on the researches and challenges in the domain of IoT, Cloud computing and Data analytics from perspectives of various stakeholders.MONIKA MANGLA PhD is an Assistant Professor in the Department of Computer Engineering at Lokmanya Tilak College of Engineering (LTCoE), Mumbai, India. Her research areas include IoT, cloud computing, algorithms and optimization, location modelling and machine learning.SUNEETA SATPATHY PhD is an Associate Professor in the Department of Computer Science & Engineering at College of Engineering Bhubaneswar (CoEB), Bhubaneswar. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis, and decision mining.BHAGIRATHI NAYAK has 25 years of experience in the areas of computer science and engineering and database designing. Prof. Nayak earned his PhD in Computer Science from IIT Kharagpur. He is currently associated with Sri Sri University, Cuttack as head of the Department of Information & Communication Technology. He has obtained five patents in the area of computer science and engineering and his areas of interest are data mining, big data analytics, artificial intelligence and machine learning.SACHI NANDAN MOHANTY obtained his PhD from IIT Kharagpur in 2015 and is now an Associate Professor in the Department of Computer Science & Engineering at ICFAI Foundation for Higher Education Hyderabad. Dr. Mohanty’s research areas include data mining, big data analysis, cognitive science, fuzzy decision making, brain-computer interface, and computational intelligence.Preface xvAcknowledgement xvii1 INTERNET OF THINGS: A KEY TO UNFASTEN MUNDANE REPETITIVE TASKS 1Hemanta Kumar Palo and Limali Sahoo1.1 Introduction 11.2 The IoT Scenario 21.3 The IoT Domains 31.3.1 The IoT Policy Domain 31.3.2 The IoT Software Domain 51.3.2.1 IoT in Cloud Computing (CC) 51.3.2.2 IoT in Edge Computing (EC) 61.3.2.3 IoT in Fog Computing (FC) 101.3.2.4 IoT in Telecommuting 111.3.2.5 IoT in Data-Center 121.3.2.6 Virtualization-Based IoT (VBIoT) 121.4 Green Computing (GC) in IoT Framework 121.5 Semantic IoT (SIoT) 131.5.1 Standardization Using oneM2M 151.5.2 Semantic Interoperability (SI) 181.5.3 Semantic Interoperability (SI) 191.5.4 Semantic IoT vs Machine Learning 201.6 Conclusions 21References 212 MEASURES FOR IMPROVING IOT SECURITY 25Richa Goel, Seema Sahai, Gurinder Singh and Saurav Lall2.1 Introduction 252.2 Perceiving IoT Security 262.3 The IoT Safety Term 272.4 Objectives 282.4.1 Enhancing Personal Data Access in Public Repositories 282.4.2 Develop and Sustain Ethicality 282.4.3 Maximize the Power of IoT Access 292.4.4 Understanding Importance of Firewalls 292.5 Research Methodology 302.6 Security Challenges 312.6.1 Challenge of Data Management 322.7 Securing IoT 332.7.1 Ensure User Authentication 332.7.2 Increase User Autonomy 332.7.3 Use of Firewalls 342.7.4 Firewall Features 352.7.5 Mode of Camouflage 352.7.6 Protection of Data 352.7.7 Integrity in Service 362.7.8 Sensing of Infringement 362.8 Monitoring of Firewalls and Good Management 362.8.1 Surveillance 362.8.2 Forensics 372.8.3 Secure Firewalls for Private 372.8.4 Business Firewalls for Personal 372.8.5 IoT Security Weaknesses 372.9 Conclusion 37References 383 AN EFFICIENT FOG-BASED MODEL FOR SECURED DATA COMMUNICATION 41V. Lakshman Narayana and R. S. M. Lakshmi Patibandla3.1 Introduction 413.1.1 Fog Computing Model 423.1.2 Correspondence in IoT Devices 433.2 Attacks in IoT 453.2.1 Botnets 453.2.2 Man-In-The-Middle Concept 453.2.3 Data and Misrepresentation 463.2.4 Social Engineering 463.2.5 Denial of Service 463.2.6 Concerns 473.3 Literature Survey 483.4 Proposed Model for Attack Identification Using Fog Computing 493.5 Performance Analysis 523.6 Conclusion 54References 544 AN EXPERT SYSTEM TO IMPLEMENT SYMPTOM ANALYSIS IN HEALTHCARE 57Subhasish Mohapatra and Kunal Anand4.1 Introduction 574.2 Related Work 594.3 Proposed Model Description and Flow Chart 604.3.1 Flowchart of the Model 604.3.1.1 Value of Symptoms 604.3.1.2 User Interaction Web Module 604.3.1.3 Knowledge-Base 604.3.1.4 Convolution Neural Network 604.3.1.5 CNN-Fuzzy Inference Engine 614.4 UML Analysis of Expert Model 624.4.1 Expert Module Activity Diagram 634.4.2 Ontology Class Collaboration Diagram 654.5 Ontology Model of Expert Systems 664.6 Conclusion and Future Scope 67References 685 AN IOT-BASED GADGET FOR VISUALLY IMPAIRED PEOPLE 71Prakash, N., Udayakumar, E., Kumareshan, N., Srihari, K. and Sachi Nandan Mohanty5.1 Introduction 715.2 Related Work 735.3 System Design 745.4 Results and Discussion 825.5 Conclusion 845.6 Future Work 84References 846 IOT PROTOCOL FOR INFERNO CALAMITY IN PUBLIC TRANSPORT 87Ravi Babu Devareddi, R. Shiva Shankar and Gadiraju Mahesh6.1 Introduction 876.2 Literature Survey 896.3 Methodology 946.3.1 IoT Message Exchange With Cloud MQTT Broker Based on MQTT Protocol 986.3.2 Hardware Requirement 986.4 Implementation 1036.4.1 Interfacing Diagram 1056.5 Results 1066.6 Conclusion and Future Work 108References 1097 TRAFFIC PREDICTION USING MACHINE LEARNING AND IOT 111Daksh Pratap Singh and Dolly Sharma7.1 Introduction 1117.1.1 Real Time Traffic 1117.1.2 Traffic Simulation 1127.2 Literature Review 1127.3 Methodology 1137.4 Architecture 1167.4.1 API Architecture 1177.4.2 File Structure 1177.4.3 Simulator Architecture 1187.4.4 Workflow in Application 1227.4.5 Workflow of Google APIs in the Application 1227.5 Results 1227.5.1 Traffic Scenario 1227.5.1.1 Low Traffic 1247.5.1.2 Moderate Traffic 1247.5.1.3 High Traffic 1257.5.2 Speed Viewer 1257.5.3 Traffic Simulator 1267.5.3.1 1st View 1267.5.3.2 2nd View 1287.5.3.3 3rd View 1287.6 Conclusion and Future Scope 128References 1298 APPLICATION OF MACHINE LEARNING IN PRECISION AGRICULTURE 131Ravi Sharma and Nonita Sharma8.1 Introduction 1318.2 Machine Learning 1328.2.1 Supervised Learning 1338.2.2 Unsupervised Learning 1338.2.3 Reinforcement Learning 1348.3 Agriculture 1348.4 ML Techniques Used in Agriculture 1358.4.1 Soil Mapping 1358.4.2 Seed Selection 1408.4.3 Irrigation/Water Management 1418.4.4 Crop Quality 1438.4.5 Disease Detection 1448.4.6 Weed Detection 1458.4.7 Yield Prediction 1478.5 Conclusion 148References 1499 AN IOT-BASED MULTI ACCESS CONTROL AND SURVEILLANCE FOR HOME SECURITY 153Yogeshwaran, K., Ramesh, C., Udayakumar, E., Srihari, K. and Sachi Nandan Mohanty9.1 Introduction 1539.2 Related Work 1559.3 Hardware Description 1569.3.1 Float Sensor 1589.3.2 Map Matching 1589.3.3 USART Cable 1599.4 Software Design 1619.5 Conclusion 162References 16210 APPLICATION OF IOT IN INDUSTRY 4.0 FOR PREDICTIVE ANALYTICS 165Ahin Banerjee, Debanshee Datta and Sanjay K. Gupta10.1 Introduction 16510.2 Past Literary Works 16810.2.1 Maintenance-Based Monitoring 16810.2.2 Data Driven Approach to RUL Finding in Industry 16910.2.3 Philosophy of Industrial-IoT Systems and its Advantages in Different Domain 17310.3 Methodology and Results 17610.4 Conclusion 179References 18011 IOT AND ITS ROLE IN PERFORMANCE ENHANCEMENT IN BUSINESS ORGANIZATIONS 183Seema Sahai, Richa Goel, Parul Bajaj and Gurinder Singh11.1 Introduction 18311.1.1 Scientific Issues in IoT 18411.1.2 IoT in Organizations 18511.1.3 Technology and Business 18711.1.4 Rewards of Technology in Business 18711.1.5 Shortcomings of Technology in Business 18811.1.6 Effect of IoT on Work and Organization 18811.2 Technology and Productivity 19011.3 Technology and Future of Human Work 19311.4 Technology and Employment 19411.5 Conclusion 195References 19512 AN ANALYSIS OF CLOUD COMPUTING BASED ON INTERNET OF THINGS 197Farhana Ajaz, Mohd Naseem, Ghulfam Ahamad, Sparsh Sharma and Ehtesham Abbasi12.1 Introduction 19712.1.1 Generic Architecture 19912.2 Challenges in IoT 20212.3 Technologies Used in IoT 20312.4 Cloud Computing 20312.4.1 Service Models of Cloud Computing 20412.5 Cloud Computing Characteristics 20512.6 Applications of Cloud Computing 20612.7 Cloud IoT 20712.8 Necessity for Fusing IoT and Cloud Computing 20712.9 Cloud-Based IoT Architecture 20812.10 Applications of Cloud-Based IoT 20812.11 Conclusion 209References 20913 IMPORTANCE OF FOG COMPUTING IN EMERGING TECHNOLOGIES-IOT 211Aarti Sahitya13.1 Introduction 21113.2 IoT Core 21213.3 Need of Fog Computing 227References 23014 CONVERGENCE OF BIG DATA AND CLOUD COMPUTING ENVIRONMENT 233Ranjan Ganguli14.1 Introduction 23314.2 Big Data: Historical View 23414.2.1 Big Data: Definition 23514.2.2 Big Data Classification 23614.2.3 Big Data Analytics 23614.3 Big Data Challenges 23714.4 The Architecture 23814.4.1 Storage or Collection System 24014.4.2 Data Care 24014.4.3 Analysis 24014.5 Cloud Computing: History in a Nutshell 24114.5.1 View on Cloud Computing and Big Data 24114.6 Insight of Big Data and Cloud Computing 24114.6.1 Cloud-Based Services 24214.6.2 At a Glance: Cloud Services 24414.7 Cloud Framework 24514.7.1 Hadoop 24514.7.2 Cassandra 24614.7.2.1 Features of Cassandra 24614.7.3 Voldemort 24714.7.3.1 A Comparison With Relational Databases and Benefits 24714.8 Conclusions 24814.9 Future Perspective 248References 24815 DATA ANALYTICS FRAMEWORK BASED ON CLOUD ENVIRONMENT 251K. Kanagaraj and S. Geetha15.1 Introduction 25115.2 Focus Areas of the Chapter 25215.3 Cloud Computing 25215.3.1 Cloud Service Models 25315.3.1.1 Software as a Service (SaaS) 25315.3.1.2 Platform as a Service (PaaS) 25415.3.1.3 Infrastructure as a Service (IaaS) 25515.3.1.4 Desktop as a Service (DaaS) 25615.3.1.5 Analytics as a Service (AaaS) 25715.3.1.6 Artificial Intelligence as a Service (AIaaS) 25815.3.2 Cloud Deployment Models 25915.3.3 Virtualization of Resources 26015.3.4 Cloud Data Centers 26115.4 Data Analytics 26315.4.1 Data Analytics Types 26315.4.1.1 Descriptive Analytics 26315.4.1.2 Diagnostic Analytics 26415.4.1.3 Predictive Analytics 26515.4.1.4 Prescriptive Analytics 26515.4.1.5 Big Data Analytics 26515.4.1.6 Augmented Analytics 26615.4.1.7 Cloud Analytics 26615.4.1.8 Streaming Analytics 26615.4.2 Data Analytics Tools 26615.5 Real-Time Data Analytics Support in Cloud 26615.6 Framework for Data Analytics in Cloud 26815.6.1 Data Analysis Software as a Service (DASaaS) 26815.6.2 Data Analysis Platform as a Service (DAPaaS) 26815.6.3 Data Analysis Infrastructure as a Service (DAIaaS) 26915.7 Data Analytics Work-Flow 26915.8 Cloud-Based Data Analytics Tools 27015.8.1 Amazon Kinesis Services 27115.8.2 Amazon Kinesis Data Firehose 27115.8.3 Amazon Kinesis Data Streams 27115.8.4 Amazon Textract 27115.8.5 Azure Stream Analytics 27115.9 Experiment Results 27215.10 Conclusion 272References 27416 NEURAL NETWORKS FOR BIG DATA ANALYTICS 277Bithika Bishesh16.1 Introduction 27716.2 Neural Networks—An Overview 27816.3 Why Study Neural Networks? 27916.4 Working of Artificial Neural Networks 27916.4.1 Single-Layer Perceptron 27916.4.2 Multi-Layer Perceptron 28016.4.3 Training a Neural Network 28116.4.4 Gradient Descent Algorithm 28216.4.5 Activation Functions 28416.5 Innovations in Neural Networks 28816.5.1 Convolutional Neural Network (ConvNet) 28816.5.2 Recurrent Neural Network 28916.5.3 LSTM 29116.6 Applications of Deep Learning Neural Networks 29216.7 Practical Application of Neural Networks Using Computer Codes 29316.8 Opportunities and Challenges of Using Neural Networks 29316.9 Conclusion 296References 29617 META-HEURISTIC ALGORITHMS FOR BEST IOT CLOUD SERVICE PLATFORM SELECTION 299Sudhansu Shekhar Patra, Sudarson Jena, G.B. Mund, Mahendra Kumar Gourisaria and Jugal Kishor Gupta17.1 Introduction 29917.2 Selection of a Cloud Provider in Federated Cloud 30117.3 Algorithmic Solution 30717.3.1 TLBO Algorithm (Teaching-Learning-Based Optimization Algorithm) 30717.3.1.1 Teacher Phase: Generation of a New Solution 30817.3.1.2 Learner Phase: Generation of New Solution 30917.3.1.3 Representation of the Solution 30917.3.2 JAYA Algorithm 30917.3.2.1 Representation of the Solution 31117.3.3 Bird Swarm Algorithm 31117.3.3.1 Forging Behavior 31317.3.3.2 Vigilance Behavior 31317.3.3.3 Flight Behavior 31317.3.3.4 Representation of the Solution 31317.4 Analyzing the Algorithms 31417.5 Conclusion 316References 31618 LEGAL ENTANGLEMENTS OF CLOUD COMPUTING IN INDIA 319Sambhabi Patnaik and Lipsa Dash18.1 Cloud Computing Technology 31918.2 Cyber Security in Cloud Computing 32218.3 Security Threats in Cloud Computing 32318.3.1 Data Breaches 32318.3.2 Denial of Service (DoS) 32318.3.3 Botnets 32318.3.4 Crypto Jacking 32418.3.5 Insider Threats 32418.3.6 Hijacking Accounts 32418.3.7 Insecure Applications 32418.3.8 Inadequate Training 32518.3.9 General Vulnerabilities 32518.4 Cloud Security Probable Solutions 32518.4.1 Appropriate Cloud Model for Business 32518.4.2 Dedicated Security Policies Plan 32518.4.3 Multifactor Authentication 32518.4.4 Data Accessibility 32618.4.5 Secure Data Destruction 32618.4.6 Encryption of Backups 32618.4.7 Regulatory Compliance 32618.4.8 External Third-Party Contracts and Agreements 32718.5 Cloud Security Standards 32718.6 Cyber Security Legal Framework in India 32718.7 Privacy in Cloud Computing—Data Protection Standards 32918.8 Recognition of Right to Privacy 33018.9 Government Surveillance Power vs Privacy of Individuals 33218.10 Data Ownership and Intellectual Property Rights 33318.11 Cloud Service Provider as an Intermediary 33518.12 Challenges in Cloud Computing 33718.12.1 Classification of Data 33718.12.2 Jurisdictional Issues 33718.12.3 Interoperability of the Cloud 33818.12.4 Vendor Agreements 33918.13 Conclusion 339References 34119 SECURING THE PHARMA SUPPLY CHAIN USING BLOCKCHAIN 343Pulkit Arora, Chetna Sachdeva and Dolly Sharma19.1 Introduction 34319.2 Literature Review 34519.2.1 Current Scenario 34619.2.2 Proposal 34719.3 Methodology 34919.4 Results 35419.5 Conclusion and Future Scope 358References 358Index 361

Regulärer Preis: 197,99 €
Produktbild für Data Science Revealed

Data Science Revealed

Get insight into data science techniques such as data engineering and visualization, statistical modeling, machine learning, and deep learning. This book teaches you how to select variables, optimize hyper parameters, develop pipelines, and train, test, and validate machine and deep learning models. Each chapter includes a set of examples allowing you to understand the concepts, assumptions, and procedures behind each model.The book covers parametric methods or linear models that combat under- or over-fitting using techniques such as Lasso and Ridge. It includes complex regression analysis with time series smoothing, decomposition, and forecasting. It takes a fresh look at non-parametric models for binary classification (logistic regression analysis) and ensemble methods such as decision trees, support vector machines, and naive Bayes. It covers the most popular non-parametric method for time-event data (the Kaplan-Meier estimator). It also covers ways of solving classification problems using artificial neural networks such as restricted Boltzmann machines, multi-layer perceptrons, and deep belief networks. The book discusses unsupervised learning clustering techniques such as the K-means method, agglomerative and Dbscan approaches, and dimension reduction techniques such as Feature Importance, Principal Component Analysis, and Linear Discriminant Analysis. And it introduces driverless artificial intelligence using H2O.After reading this book, you will be able to develop, test, validate, and optimize statistical machine learning and deep learning models, and engineer, visualize, and interpret sets of data.WHAT YOU WILL LEARN* Design, develop, train, and validate machine learning and deep learning models* Find optimal hyper parameters for superior model performance* Improve model performance using techniques such as dimension reduction and regularization* Extract meaningful insights for decision making using data visualizationWHO THIS BOOK IS FORBeginning and intermediate level data scientists and machine learning engineersTSHEOP CHRIS NOKERI harnesses advanced analytics and artificial intelligence to foster innovation and optimize business performance. He has delivered complex solutions to companies in the mining, petroleum, and manufacturing industries. He completed a bachelor’s degree in information management and graduated with an honors degree in business science at the University of the Witwatersrand on a TATA Prestigious Scholarship and a Wits Postgraduate Merit Award. He also was awarded the Oxford University Press Prize. Section 1: Parametric MethodsChapter 1: An Introduction to Simple Linear RegressionChapter goal: Introduces the reader to parametric and understand the underlying assumptions of regression.Subtopics• Regression assumptions.• Detecting missing values.• Descriptive analysis.• Understand correlation.o Plot Pearson correlation matrix.• Determine covariance.o Plot covariance matrix.• Create and reshape arrays.• Split data into training and test data.• Normalize data.• Find best hyper-parameters for a model.• Build your own model.• Review model performance.o Mean Absolute Error.o Mean Squared Error.o Root Mean Squared Error.o R-squared.o Plotting Actual Values vs. Predicted Values.• Residual diagnosis.o Normal Q-Q Plot.o Cook’s D Influence Plot.o Plotting predicted values vs. residual values.o Plotting Fitted Values vs. Residual Values.o Plotting Leverage Values vs. Residual Values.o Plotting Fitted Values vs. Studentized Residual Values.o Plotting Leverage Values vs. Studentized Residual Values.Chapter 2: Advanced Parametric MethodsChapter goal: Highlights methods of dealing with the problem of under-fitting and over-fitting.Subtopics• Issue of multi-collinearity.• Explore methods of dealing with the problem under-fitting and over-fitting.• Understand Ridge, RidgeCV and Lasso regression models.• Find best hyper-parameters for a model.• Build regularized models.• Compare performance of different regression methods.o Mean Absolute Error.o Mean Squared Error.o Root Mean Squared Error.o R-squared.o Plotting actual values vs. predicted values.Chapter 3: Time Series AnalysisChapter goal: Covers a model for identifying trends and patterns in sequential data and how to forecast a series.• What is time series analysis?• Underlying assumptions of time series analysis.• Different types of time series analysis models.• The ARIMA model.• Test of stationary.o Conduct an ADF Fuller Test.• Test of white noise.• Test of correlation.o Plot Lag Plot.o Plot Lag vs Autocorrelation Plot.o Plot ACF.o Plot PACF.• Understand trends, seasonality and trends.o Plot seasonal components.• Smoothen a time series using Moving Average, Standard Deviation and Exponential techniques.o Plot smoothened time series.• Determine rate of return and rolling rate of return.• Determine parameters of ARIMA model.• Build ARIMA model.• Forecast ARIMA.o Plot forecast.• Residual diagnosisChapter 4: High Quality Time SeriesChapter goal: Explores Prophet for better series forecast.• Difference between statsmodel and Prophet.• Understand components in Prophet.• Data preprocessing.• Develop a model using Prophet.• Forecast a series.o Plot forecasted.o Plot seasonal components.• Evaluate model performance using Prophet.Chapter 4: Logistic RegressionChapter goal: Introduces reader to logistic regression – a powerful classification model.Subtopics• Find missing values• Understand correlation.o Plotting Pearson correlation matrix.• Determine covariance.o Plotting covariance matrix.• PCA for dimension reduction.o Plotting scree plot.• Normalize data.• Hyper-parameter tuning.• Create a pipeline.• Develop a Logit model.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot learning curve.Chapter 5: Dimension Reduction and Multivariate Analysis using Linear DiscriminantChapter goal: Discusses the difference between linear discriminant analysis and logistic regression and how linear discriminant analysis can be used for other purposes other than classification.Subtopics• Difference between logistic regression and discriminant analysis.• Purpose of discriminant analysis.• Model fitting.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot learning curve.Section 2: Ensemble methodsChapter 6: Finding Hyper Lanes Using Support Vector MachineChapter goal: Highlights ways of finding hyper lanes using Linear Support Vector Chain including its pros and cons.• Understand support vector machine.• Find hyper lanes using SVM.• Scenarios in which SVM performs better.• Disadvantages of SVM. • Model fitting.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC curveo Find AUC.o Plot Precision Recall curve.o Find APS.o Plot learning curve.Chapter 7: Classification Using Decision TreeChapter goal: Explores how decision trees are formed and visualized them.Subtopics• Discussing entropy.• Information gain• Structure of decision trees• Visualizing decision trees• Modelling fitting• Model evaluation.o Tabulating classification report.o Tabulating confusion matrix.o Plotting ROC curveo Finding AUC.o Plotting Precision Recall curve.o Finding APS.o Plotting learning curve.Chapter 8: Back to the ClassicChapter goal: Gives an overview of this classical algorithm and explain why it is still relevant up to this date.Subtopics• The Naïve Bayes theorem.• Unpacking Gaussian Naïve Bayes.• Model fitting.• Hyper-parameter tuning.• Create a pipeline.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot learning curve.Section 3: Non-Parametric MethodsChapter 9: Finding Similarities and Dissimilarities Using Cluster AnalysisChapter goal: Explain clustering and explore three main clustering algorithms (K-Means, Agglomerative and DBSCAN).• An introduction to cluster analysis.• Types of clustering algorithms.• Normalize data.• Dimension reduction using PCA.o Finding number of components• Find number of clusters.o Elbow curve.• Clustering K-Means.• Fit K-Means model.• Plot K-Means clusters.• Clustering using Agglomerative algorithm.o Techniques of calculating similarities/dissimilarities• Fit Agglomerative.• Plot Agglomerative clusters.• Clustering using Density-Based Spatial Clustering Algorithm with Noise (DBSCAN)• Fit DBSCAN.• Plot DBSCAN clusters.Chapter 10: Survival AnalysisChapter: Provides an overview of survival analysis (a model used commonly used in medical and insurance industries) by detailing the commonly used estimator – Kaplan Meier Fitter.Subtopics• Create a survival table.• The survival function.• An introduction to the Kaplan Meier Estimator.• Finding confidence intervals.• Tabulating cumulative density estimates.• Tabulating survival function estimates.• Plotting survival curve.• Plotting cumulative density.• Model evaluation.Chapter 11: Neural NetworksChapter goal: Discusses the fundamentals of neural networks and ways of optimizing networks for better accuracy.Subtopics• Forward propagation.• Backward propagation.• Forward pass.• Backward pass.• Cost function.• Gradient.• The vanishing gradient problem.• Other functions.• Optimizing networks.• Bernoulli Restricted Boltzmann Machine.• Multi-Layer Perceptron.• Regularizing networks.• Dropping layers.• Model evaluation.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot training and validation loss across epochs.o Plot training and validation accuracy across epochs.Chapter 12: Driverless AI Using H2OChapter goal: Covers a new library that helps organizations accelerate their adoption of AI.• How H2O works.• Data processing.• Model training.• Model evaluation.• AutoML.

Regulärer Preis: 56,99 €
Produktbild für Creating ASP.NET Core Web Applications

Creating ASP.NET Core Web Applications

Design and develop an ASP.NET Core web application using .NET Core 3.0. This book shows you how to publish a web application to a web server and connect the published web application to a production database.CREATING ASP.NET CORE WEB APPLICATIONS starts by setting up the Visual Studio project where you will learn about Razor pages, Entities, and creating a data service. You will create models along with methods to use a query string and handle bad requests. Modifying data with Tag helpers is discussed as well as installation of Entity Framework, working with database migrations, and implementing a data access service. You will learn how to use layout pages and sections with Partial Views, _ViewImports, and _ViewStart files. You also will create custom middleware and log application events. You will be able to deploy the web application as well as connect it to a SQL Server database.WHAT YOU WILL LEARN* Work with models* Modify data* Work with EF Core and SQL Server* Work with Razor pages and Partial Views* Use separate scripts for production vs development* Trace client-side errors using Chrome Developer tools* Create cascading style sheets (CSS) with Sassy CSS (SCSS)* Explore middleware* Deploy your web application to IISWHO THIS BOOK IS FORSoftware developers on the .NET stack who want to create ASP.NET Core web applicationsDIRK STRAUSS is a software developer from South Africa who has been writing code since 2003. He has extensive experience in SYSPRO, with C# and web development being his main focus. He studied at the Nelson Mandela University, where he wrote software on a part-time basis to gain a better understanding of the technology. He remains passionate about writing code and imparting what he learns with others.CHAPTER 1: CREATING AND SETTING UP YOUR PROJECTCHAPTER GOAL: CREATE THE VISUAL STUDIO PROJECT REQUIRED TO START THE WEB APPLICATION DEVELOPMENT. HERE WE WILL LOOK AT RAZOR PAGES, ENTITIES, CREATING A DATA SERVICE AND USING THIS DUMMY DATA TO DISPLAY DATA ON THE WEB PAGE.NO OF PAGES 25SUB -TOPICS1. Creating Your Web Application Project2. Adding and Editing Razor Pages3. Looking at the Configuration4. Working with Entities5. Create and Register a Data Service6. Displaying Test Data on Your Web PageCHAPTER 2: CREATING MODELSCHAPTER GOAL: CREATE A SEARCH FORM THAT ALLOWS THE READER TO FIND DATA IN THE DATA STORE. HERE THE READER WILL LOOK AT USING MODELS, MODEL BINDING, WORKING WITH A QUERY STRING, AND SPECIFYING PAGE ROUTES. WE WILL ALSO TAKE A LOOK AT HOW TO HANDLE BAD REQUESTS.NO OF PAGES: 25SUB - TOPICS1. Building a Search Form2. Implementing the Find logic3. Using Query Strings, Model Binding and Tag Helpers4. Displaying Related Data5. Working with Page Routes6. Handling Bad RequestsCHAPTER 3: MODIFYING DATACHAPTER GOAL: THE READER WILL LEARN HOW TO CREATE A PAGE TO EDIT AND ADD DATA STORED IN THE DATA STORE. THE READER WILL ALSO REVISIT TAG HELPERS.NO OF PAGES : 20SUB - TOPICS:1. Editing Existing Data and Using Tag Helpers2. Validating Edited Data3. Display Validation Errors4. Creating New Data5. Modify the Data Access ServiceCHAPTER 4: EF CORE AND SQL SERVERCHAPTER GOAL: THE READER WILL LEARN HOW TO INSTALL ENTITY FRAMEWORK, WORKING WITH DATABASE MIGRATIONS AND IMPLEMENTING A DATA ACCESS SERVICE.NO OF PAGES : 25SUB - TOPICS:1. Install Entity Framework2. Implement DbContext3. Specify Database Connection Strings4. Working with Database Migrations5. Implement a New Data Access Service6. Changing the Data Access Service RegistrationCHAPTER 5: WORKING WITH RAZOR PAGESCHAPTER GOAL: THE READER WILL LEARN HOW TO USE LAYOUT PAGES AND SECTIONS. THEY WILL ALSO LEARN ABOUT WORKING WITH PARTIAL VIEWS, _VIEWIMPORTS AND _VIEWSTART FILES.NO OF PAGES : 25SUB - TOPICS:1. Using Sections in Your Razor Pages2. What are _ViewImports and _ViewStart files?3. Working with Partial Views4. Working with ViewComponentsCHAPTER 6: ADDING CLIENT-SIDE LOGICCHAPTER GOAL: THE READER WILL LEARN HOW TO WORK WITH SCSS TO CREATE CSS, USING JAVASCRIPT AND JQUERY. THE READER WILL ALSO LEARN HOW TO SEPARATE SCRIPTS TARGETED AT PRODUCTION FROM SCRIPTS TARGETED FOR DEVELOPMENT.NO OF PAGES : 30SUB - TOPICS:1. Separate Production Scripts from Development Scripts2. Setting up SCSS and generating CSS with the Web Compiler3. Creating a Client-side API4. Working with Chrome Developer ToolsCHAPTER 7: EXPLORING MIDDLEWARECHAPTER GOAL: THE READER WILL LEARN HOW TO USE MIDDLEWARE AND HOW TO CREATE CUSTOM MIDDLEWARE. WE WILL ALSO BE LOOKING AT LOGGING APPLICATION EVENTS.NO OF PAGES : 25SUB - TOPICS:1. What is Middleware2. Creating Custom Middleware3. Logging InformationCHAPTER 8: WEB APPLICATION DEPLOYMENTCHAPTER GOAL: THE READER WILL LEARN HOW TO DEPLOY THE WEB APPLICATION THEY CREATED. THIS WILL LOOK AT DEPLOYMENT TO A WEB SERVER AS WELL AS CONNECTING THE WEB APPLICATION TO A SQL SERVER DATABASE.NO OF PAGES : 25SUB - TOPICS:1. Getting Your Site Ready for Deployment2. Deploying Your Web Application to IIS

Regulärer Preis: 62,99 €
Produktbild für Raspberry Pi IoT Projects

Raspberry Pi IoT Projects

Build your own Internet of Things (IoT) projects for prototyping and proof-of-concept purposes.Updated for the Raspberry Pi 4 and other recent boards, this book contains the tools needed to build a prototype of your design, sense the environment, communicate with the Internet (over the Internet and Machine to Machine communications) and display the results._Raspberry Pi IoT Projects, 2nd Edition_ provides several IoT projects and designs shown from the start to the finish including an IoT Heartbeat Monitor, an IoT Swarm, IoT Solar Powered Weather Station, an IoT iBeacon Application and a RFID (Radio Frequency Identification) IoT Inventory Tracking System.The software is presented as reusable libraries, primarily in Python and C with full source code available, making this version a valuable learning resource for classrooms and learning labs.WHAT YOU'LL LEARN* Create IOT projects with the Raspberry Pi* Talk to sensors with the Raspberry Pi* Use iBeacons with the IOT Raspberry Pi* Communicate your IOT data to the Internet* Build security into your IOT deviceWHO THIS BOOK IS FORPrimary audience are those with some technical background, but not necessarily engineers. It will also appeal to technical people wanting to learn about the Raspberry Pi in a project-oriented method.DR. JOHN C. SHOVIC is currently Chief Technical Officer of SwitchDoc Labs, LLC, a company specializing in technical products for the Maker Movement, and InstiComm, LLC, a company specializing in mobile medical software solutions for health practitioners. He is also Chief Technology Strategist at Stratus Global Partners with a focus on supplying expertise in computer security regulatory and technical areas to healthcare providers. He has worked in industry for over thirty years and has founded seven companies: Advance Hardware Architectures, TriGeo Network Security, Blue Water Technologies, MiloCreek, LLC, InstiComm, LLC, SwitchDoc Labs, LLC and bankCDA. As a founding member of the bankCDA board of directors, he currently serves as the chairman of the loan and technology committees. He has also served as a Professor of Computer Science at Eastern Washington University, Washington State University and the University of Idaho. Dr. Shovic has given over 70 invited talks and has published over 60 papers on a variety of topics on Arduinos / Raspberry Pi, HIPAA, GLB, computer security, computer forensics, embedded systems and others.Chapter 1: Introduction to IoTChapter 2: Sensing your IoT EnvironmentChapter 3: Building a Solar Powered IoT Weather StationChapter 4: Changing Your Environment with IoT and iBeaconsChapter 5: Connecting an IoT Device to a Cloud Server - IoTPulseChapter 6: Using IoT for RFID and MQTT and the Rasberry PiChapter 7: Computer Security and the IoTAppendix 1: Suggestions of Further Work

Regulärer Preis: 36,99 €
Produktbild für React and Libraries

React and Libraries

Harness the power of React and the related libraries that you need to know to deliver successful front-end implementations. Whether you are a beginner getting started or an existing React developer, this book will provide you with the must-have knowledge you need in your toolbox to build a complete app.Start by learning how to create and style your own components, add state management, and manage routing. You’ll also learn how to work with the backend using the MERN stack (MongoDB, Express, React, and Node.js). Once you have completed building your app you will learn how to deliver quality software by conducting unit testing, integration testing, and end-to-end (E2E) testing, as well as learn techniques to debug, profile, and optimize your React app.Libraries and tools covered include TypeScript, Material-UI, Styled Components, SCSS, React Router, Redux Toolkit, Recoil, Jest, Enzyme, Sinon, MongoDB, NodeJS, Express, Serve, Grunt, Puppeteer, ESLint, Prettier and many others. And, you'll get access to bonus material and learn how to conduct and nail React interview questions.Each chapter in this book can be used independently so you can pick and choose the information you’d like to learn. Use it to get deep into your React development world and find out why React has been rated the most loved framework by front-end developers for three years in a row.WHAT YOU'LL LEARN* Review the basics of DOM, React Virtual DOM, JSX, Babel, ES5/ES6, CRA, package manager, Yarn, Webpack, and build tools* Write your own custom React components and learn about hooks and props.* Apply routing and state management with React Route, Recoil, and Redux Toolkit* Deliver quality software and reduce QA load by learning unit testing integration testing and end-to-end testing with libraries such as Jest, Jest-dom, Enzyme, Sinon, and Puppeteer* Set an ultimate React automated development and CI cycle with ESLint, Prettier, Husky, Jest, Puppeteer, GitHub Actions, Codecov.io, Coveralls, Travis, and DeepScan* Publish your code on Ubuntu Server with the help of Grunt* Optimize your React app with pure components, lazy loading, prerender, precache, code splitting, tree shaking, reduce media size, and prefetchingWHO THIS BOOK IS FOR?This book is for new developers looking to start working on React applications, and React developers looking to expand on their existing knowledge. It is also suitable for developers coming from other front-end frameworks such as Angular and Vue who would like to add React to their toolbox.ELAD ELROM is a coder, technical lead and a technical writer and technical trainer. Elad is passionate about teaching and helping other developers advance and learn. As a writer, he has co-authored several technical books. Elad has consulted for a variety of clients, from large corporations such as HBO, Viacom, NBC Universal, and Weight Watchers, to smaller startups. Aside from coding, Elad is also a certified PADI dive instructor, motorcycle enthusiast, as well as an accomplished certified pilot.1. Learn the Basics2. Starter React Project & Friends3. React Components4. React Router and Material-UI5. State Management6. MERN Stack- Part I7. MERN Stack-Part II8. React Deployment- MERN Stack9. Testing Part I- Unit Test Your React App10. Testing Part II- Development & Deployment Cycle11. Debug & Profile Your React App12. Optimize Your React App

Regulärer Preis: 46,99 €
Produktbild für Jump-start Your SOC Analyst Career

Jump-start Your SOC Analyst Career

The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in JUMP-START YOUR SOC ANALYST CAREER. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals. This book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey. The gems of knowledge shared in this book provide you with a notable advantage for entering this dynamic field of work.The recent surplus in demand for SOC analysts makes JUMP-START YOUR SOC ANALYST CAREER a must-have for aspiring tech professionals and long-time veterans alike. Recent industry developments such as using the cloud and security automation are broken down in concise, understandable ways, to name a few. The rapidly changing world of cybersecurity requires innovation and fresh eyes, and this book is your roadmap to success.WHAT YOU WILL LEARN* Understand the demand for SOC analysts* Know how to find a SOC analyst job fast* Be aware of the people you will interact with as a SOC analyst* Be clear on the prerequisite skills needed to be a SOC analyst and what to study* Be familiar with the day-to-day life of a SOC analyst, including the tools and language used* Discover the rapidly emerging areas of a SOC analyst job: the cloud and security automationWHO THIS BOOK IS FORAnyone interested in starting a career in cyber security: recent graduates, IT professionals transitioning into security, veterans, and those who are self taughtTYLER E. WALL is CEO of Cyber NOW Education, LLC which specializes in connecting education with opportunity. He is an accomplished security professional with years of experience in security operations and engineering that includes presently serving remotely as a Senior Security Engineer in Silicon Valley. He has built and led security operations centers for companies such as EY and Opentext. His current focus is enabling security operations centers to continuously mature by the adoption of security automation. Tyler’s education includes: Master of Science in Cybersecurity Management, CISSP, CEH, CFSR, LRPA, Security+, Network+, and A+. He enjoys long golf cart rides in Braselton, Georgia with his wife and son.JARRETT RODRICK is the SOC Team Lead and Senior Information Security Analyst for VMware, the global leader in visualization technology. He is a retired Cyber Network Defender and Cyber Warfare Specialist from the US Army and has over eight years of Defensive Cyber Operations experience working with the Army’s Cyber Protection Brigade. Jarrett’s time with the Cyber Protection Brigade has provided him with the skills needed to fight in today’s Cyber War. Jarrett’s cyber security certifications include: GSEC, GCED, GCIH, GCIA, GCFE, GCFA, GSNA, GRID, GCUX, and GSTRT. Jarrett lives in Melissa, Texas with his wife and family and enjoys researching new and innovative technologies.Chapter 1: The Demand for Cybersecurity and SOC AnalystsChapter 2: Areas of Expertise in CybersecurityChapter 3: Job HuntingChapter 4: Prerequisite SkillsChapter 5: The SOC AnalystChapter 6: SOC in the CloudsChapter 7: SOC AutomationChapter 8: Real SOC Analyst Stories.

Regulärer Preis: 46,99 €
Produktbild für Beginning Robotics with Raspberry Pi and Arduino

Beginning Robotics with Raspberry Pi and Arduino

Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study.Fully updated to cover the Raspberry Pi 4 with its better processor and memory, discover new ways to work with Computer Vision. You'll be led step by step through the process of building a robot that uses the power of a Linux based computer paired with the simplicity of Arduino. You’ll learn why the Raspberry Pi is a great choice for a robotics platform; its strengths as well as its shortcomings; how to overcome these limitations by implementing an Arduino; and the basics of the Python programming language as well as some of the more powerful features.With the Raspberry Pi you can give your project the power of a Linux computer, while Arduino makes interacting with sensors and motors very easy. These two boards are complimentary in their functions; where one falters the other performs admirably.The book also includes references to other great works to help further your growth in the exciting, and now accessible, field of smart robotics. As a bonus, the final chapter of the book demonstrates the real power of the Raspberry Pi by implementing a basic vision system. Using OpenCV and a standard USB web cam, you will build a robot that can chase a ball.WHAT YOU'LL LEARN* Install Raspbian, the operating system that drives the Raspberry Pi* Drive motors through an I2C motor controller* Read data through sensors attached to an ArduinoWHO THIS BOOK IS FORHobbyists and students looking for a rapid start in robotics. It assumes no technical background. Readers are guided to pursue the areas that interest them in more detail as they learn.JEFF CICOLANI is the President of The Robot Group, an Austin, Texas based robotics group consisting of robotics enthusiasts and professionals from throughout the Austin area. He has had a successful technical career as a systems analyst, developer, and project manager for multiple Fortune 500 companies. In 2017, Jeff leveraged his Maker skills, general technical acumen, and passion for robotics into a new career when he accepted a position at SparkLabs, the prototype and research division of SparkCognition, an AI company based in Austin.Jeff currently lives in Pflugerville, a suburb of Austin, with his lovely wife, two dogs, and countless robots. When he’s not building robots at work, he builds robots for fun. He is also the developer of Nomad: Autonomous Robot, which has been featured in several magazine articles and exhibitions.BEGINNING ROBOTICS WITH RASPBERRY PI AND ARDUINOChapter 1: Introduction to RoboticsChapter 2: An Introduction to Raspberry PiChapter 3: A Crash Coarse in PythonChapter 4: Raspberry Pi GPIOChapter 5: Raspberry Pi and ArduinoChapter 6: Driving MotorsChapter 7: Assembling the RobotChapter 8: Working with Infrared SensorsChapter 9: An Introduction to Open CVChapter 10: Conclusion

Regulärer Preis: 56,99 €
Produktbild für Reinforcement Learning Aided Performance Optimization of Feedback Control Systems

Reinforcement Learning Aided Performance Optimization of Feedback Control Systems

Changsheng Hua proposes two approaches, an input/output recovery approach and a performance index-based approach for robustness and performance optimization of feedback control systems. For their data-driven implementation in deterministic and stochastic systems, the author develops Q-learning and natural actor-critic (NAC) methods, respectively. Their effectiveness has been demonstrated by an experimental study on a brushless direct current motor test rig.THE AUTHOR:CHANGSHENG HUA received the Ph.D. degree at the Institute of Automatic Control and Complex Systems (AKS), University of Duisburg-Essen, Germany, in 2020. His research interests include model-based and data-driven fault diagnosis and fault-tolerant techniques.CHANGSHENG HUA received the Ph.D. degree at the Institute of Automatic Control and Complex Systems (AKS), University of Duisburg-Essen, Germany, in 2020. His research interests include model-based and data-driven fault diagnosis and fault-tolerant techniques.Introduction.- The basics of feedback control systems.- Reinforcement learning and feedback control.- Q-learning aided performance optimization of deterministic systems.- NAC aided performance optimization of stochastic systems.- Conclusion and future work.

Regulärer Preis: 74,89 €
Produktbild für Das Behaviour Driven Development in agilen Projekten der Automobilbranche. Ein Vergleich mit den Techniken Cucumber und Spock

Das Behaviour Driven Development in agilen Projekten der Automobilbranche. Ein Vergleich mit den Techniken Cucumber und Spock

Softwaretests werden in der Automobilbranche zunehmend automatisiert. Das Behaviour Driven Development ist eine Technik der agilen Softwareentwicklung, die automatisierte Tests ermöglicht. Dabei wählen Softwareentwickler Testwerkzeuge nach bestimmten Prinzipien aus und wenden diese bei Tests wie dem Akzeptanztest an.Aber welches Framework eignet sich zur Automatisierung von Akzeptanztests? Welche Probleme ergeben sich beim Einsatz von Werkzeugen des Behaviour Driven Development? Und welche Kriterien sind bei der Auswahl eines Testframeworks wichtig?Pascal Mödinger vergleicht anhand eines Testszenarios die Tools Cucumber und Spock miteinander. Er implementiert diese und prüft nach ausgewählten Kriterien, welches Framework sich zur Automatisierung von Akzeptanztests besser eignet.Aus dem Inhalt:- Behaviour Driven Development;- Agile Projekte;- Softwaretest;- Akzeptanztest;- Automobilbranche;- Testautomatisierung

Regulärer Preis: 29,99 €
Produktbild für Agricultural Informatics

Agricultural Informatics

Despite the increasing population (the Food and Agriculture Organization of the United Nations estimates 70% more food will be needed in 2050 than was produced in 2006), issues related to food production have yet to be completely addressed. In recent years, Internet of Things technology has begun to be used to address different industrial and technical challenges to meet this growing need. These Agro-IoT tools boost productivity and minimize the pitfalls of traditional farming, which is the backbone of the world's economy. Aided by the IoT, continuous monitoring of fields provides useful and critical information to farmers, ushering in a new era in farming. The IoT can be used as a tool to combat climate change through greenhouse automation; monitor and manage water, soil and crops; increase productivity; control insecticides/pesticides; detect plant diseases; increase the rate of crop sales; cattle monitoring etc.Agricultural Informatics: Automation Using the IoT and Machine Learning focuses on all these topics, including a few case studies, and they give a clear indication as to why these techniques should now be widely adopted by the agriculture and farming industries.AMITAVA CHOUDHURY PhD is an assistant professor in the school of Computer Science, University of Petroleum & Energy Studies, Dehradun, India.ARINDAM BISWAS PhD is an assistant professor in School of Mines and Metallurgy at Kazi Nazrul University, Asansol, West Bengal, India.MANISH PRATEEK PhD is Professor and Dean, School of Computer Science, at the University of Petroleum and Energy Studies, Dehradun, India.AMLAN CHAKRABARTI PhD is a Full Professor in the A.K. Choudhury School of Information Technology at the University of Calcutta.Preface xiii1 A STUDY ON VARIOUS MACHINE LEARNING ALGORITHMS AND THEIR ROLE IN AGRICULTURE 1Kalpana Rangra and Amitava Choudhury1.1 Introduction 11.2 Conclusions 92 SMART FARMING USING MACHINE LEARNING AND IOT 13Alo Sen, Rahul Roy and Satya Ranjan Dash2.1 Introduction 142.2 Related Work 152.3 Problem Identification 222.4 Objective Behind the Integrated Agro-IoT System 232.5 Proposed Prototype of the Integrated Agro-IoT System 232.6 Hardware Component Requirement for the Integrated Agro-IoT System 262.7 Comparative Study Between Raspberry Pi vs Beaglebone Black 302.8 Conclusions 312.9 Future Work 323 AGRICULTURAL INFORMATICS VIS-À-VIS INTERNET OF THINGS (IOT): THE SCENARIO, APPLICATIONS AND ACADEMIC ASPECTS--INTERNATIONAL TREND & INDIAN POSSIBILITIES 35P.K. Paul3.1 Introduction 363.2 Objectives 363.3 Methods 373.4 Agricultural Informatics: An Account 373.5 Agricultural Informatics & Technological Components: Basics & Emergence 403.6 IoT: Basics and Characteristics 413.7 IoT: The Applications & Agriculture Areas 433.8 Agricultural Informatics & IoT: The Scenario 453.9 IoT in Agriculture: Requirement, Issues & Challenges 493.10 Development, Economy and Growth: Agricultural Informatics Context 503.11 Academic Availability and Potentiality of IoT in Agricultural Informatics: International Scenario & Indian Possibilities 513.12 Suggestions 603.13 Conclusion 604 APPLICATION OF AGRICULTURAL DRONES AND IOT TO UNDERSTAND FOOD SUPPLY CHAIN DURING POST COVID-19 67Pushan Kumar Dutta and Susanta Mitra4.1 Introduction 684.2 Related Work 694.3 Smart Production With the Introduction of Drones and IoT 724.4 Agricultural Drones 754.5 IoT Acts as a Backbone in Addressing COVID-19 Problems in Agriculture 774.6 Conclusion 815 IOT AND MACHINE LEARNING-BASED APPROACHES FOR REAL TIME ENVIRONMENT PARAMETERS MONITORING IN AGRICULTURE: AN EMPIRICAL REVIEW 89Parijata Majumdar and Sanjoy Mitra5.1 Introduction 905.2 Machine Learning (ML)-Based IoT Solution 905.3 Motivation of the Work 915.4 Literature Review of IoT-Based Weather and Irrigation Monitoring for Precision Agriculture 915.5 Literature Review of Machine Learning-Based Weather and Irrigation Monitoring for Precision Agriculture 925.6 Challenges 1125.7 Conclusion and Future Work 1136 DEEP NEURAL NETWORK-BASED MULTI-CLASS IMAGE CLASSIFICATION FOR PLANT DISEASES 117Alok Negi, Krishan Kumar and Prachi Chauhan6.1 Introduction 1176.2 Related Work 1196.3 Proposed Work 1216.4 Results and Evaluation 1246.5 Conclusion 1277 DEEP RESIDUAL NEURAL NETWORK FOR PLANT SEEDLING IMAGE CLASSIFICATION 131Prachi Chauhan, Hardwari Lal Mandoria and Alok Negi7.1 Introduction 1317.2 Related Work 1367.3 Proposed Work 1397.4 Result and Evaluation 1427.5 Conclusion 1448 DEVELOPMENT OF IOT-BASED SMART SECURITY AND MONITORING DEVICES FOR AGRICULTURE 147Himadri Nath Saha, Reek Roy, Monojit Chakraborty and Chiranmay Sarkar8.1 Introduction 1488.2 Background & Related Works 1508.3 Proposed Model 1558.4 Methodology 1608.5 Performance Analysis 1658.6 Future Research Direction 1668.7 Conclusion 1679 AN INTEGRATED APPLICATION OF IOT-BASED WSN IN THE FIELD OF INDIAN AGRICULTURE SYSTEM USING HYBRID OPTIMIZATION TECHNIQUE AND MACHINE LEARNING 171Avishek Banerjee, Arnab Mitra and Arindam Biswas9.1 Introduction 1729.2 Literature Review 1759.3 Proposed Hybrid Algorithms (GA-MWPSO) 1779.4 Reliability Optimization and Coverage Optimization Model 1799.5 Problem Description 1819.6 Numerical Examples, Results and Discussion 1829.7 Conclusion 18310 DECRYPTION AND DESIGN OF A MULTICOPTER UNMANNED AERIAL VEHICLE (UAV) FOR HEAVY LIFT AGRICULTURAL OPERATIONS 189Raghuvirsinh Pravinsinh Parmar10.1 Introduction 19010.2 History of Multicopter UAVs 19210.3 Basic Components of Multicopter UAV 19310.4 Working and Control Mechanism of Multicopter UAV 20710.5 Design Calculations and Selection of Components 21010.6 Conclusion 21811 IOT-ENABLED AGRICULTURAL SYSTEM APPLICATION, CHALLENGES AND SECURITY ISSUES 223Himadri Nath Saha, Reek Roy, Monojit Chakraborty and Chiranmay Sarkar11.1 Introduction 22411.2 Background & Related Works 22611.3 Challenges to Implement IoT-Enabled Systems 23211.4 Security Issues and Measures 24011.5 Future Research Direction 24311.6 Conclusion 24412 PLANE REGION STEP FARMING, ANIMAL AND PEST ATTACK CONTROL USING INTERNET OF THINGS 249Sahadev Roy, Kaushal Mukherjee and Arindam Biswas12.1 Introduction 25012.2 Proposed Work 25412.3 Irrigation Methodology 25712.4 Sensor Connection Using Internet of Things 25912.5 Placement of Sensor in the Field 26312.6 Conclusion 267References 268Index 271

Regulärer Preis: 170,99 €
Produktbild für The Digital Notebook

The Digital Notebook

To keep information snippets in a notebook that can't be lost, that always stays up to date, that does not get dog-ears, can reach any size and takes texts, pictures, videos and sounds, shares and finds them quickly - that would be great! You have such a notebook in Windows 10, but only few use it. If you want to make it communicate with Outlook, take Office OneNote to unfold the whole potential of co-operation. There are only two types of people: the ones who love OneNote and the others who do not know it yet. It's easy to learn. In this booklet you'll find all important topics. With a short introduction to Class Notebook, a special version for education purposes.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €
Produktbild für Office365

Office365

The new office package is continuously changing. New features are supplied frequently and provide new possibilities to users and administrators alike. This booklet supplies all novelties in Word, Excel, Outlook and PowerPoint - and entirely the novelties. It makes it easy for you to make up your mind what's in for you and what new possibilities will be at your disposal. You remain on top of the game!Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €
Produktbild für Splunk Certified Study Guide

Splunk Certified Study Guide

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field extraction, field aliases and macros, and Splunk tags. You will be able to make your own data model and prepare an advanced dashboard in Splunk.In the second part, you will explore the Splunk Admin certification. There will be in-depth coverage of Splunk licenses and user role management, and how to configure Splunk forwarders, indexer clustering, and the security policy of Splunk. You’ll also explore advanced data input options in Splunk as well as .conf file merging logic, btool, various attributes, stanza types, editing advanced data inputs through the .conf file, and various other types of .conf file in Splunk.The concluding part covers the advanced topics of the Splunk Admin certification. You will also learn to troubleshoot Splunk and to manage existing Splunk infrastructure. You will understand how to configure search head, multi-site indexer clustering, and search peers besides exploring how to troubleshoot Splunk Enterprise using the monitoring console and matrix.log. This part will also include search issues and configuration issues. You will learn to deploy an app through a deployment server on your client’s instance, create a server class, and carry out load balancing, socks proxy, and indexer discovery.By the end of the Splunk Certified Study Guide, you will have learned how to manage resources in Splunk and how to use REST API services for Splunk. This section also explains how to set up Splunk Enterprise on the AWS platform and some of the best practices to make them work efficiently together.The book offers multiple choice question tests for each part that will help you better prepare for the exam.WHAT YOU WILL LEARN* Study to pass the Splunk User, Power User, and Admin certificate exams* Implement and manage Splunk multi-site clustering* Design, implement, and manage a complex Splunk Enterprise solution* Master the roles of Splunk Admin and troubleshooting* Configure Splunk using AWSWHO THIS BOOK IS FORPeople looking to pass the User, Power User, and Enterprise Admin exams. It is also useful for Splunk administrators and support engineers for managing an existing deployment.Deep Mehta is a AWS Certified Associate Architect, Docker Certified Associate, Certified Splunk Architect (ongoing), and Certified Splunk User, Power User, and Admin. He’s worked on the Splunk platform since 2017 having experience consulting in the telecommunication, aviation, and healthcare industries. Apart from being passionate about big data technologies, he also loves playing squash and badminton.PART 1: SPLUNK ARCHITECTURE , SPLUNK SPL(SEARCH PROCESSING LANGUAGE) AND SPLUNK KNOWLEDGE OBJECTSGOAL: In this module, readers will be given a detailed idea about current splunk architecture.They will learn how to fire splunk queries using splunk SPL(Search Processing Language) and will look into all the modules provided by splunk to analyze data and will cover all modules necessary to pass power user exam which covers splunk knowledge objects in detail.This module is basic module where we create base for candidate to pass splunk admin exam.Chapter 1: Overview Of SplunkChapter 2: Splunk Search Processing LanguageChapter 3: Macros,Field Extraction and Field AliasesChapter 4: Tags,Lookups and Correlating EventsChapter 5: Datamodels,Pivot and CIM in SplunkChapter 6: Knowledge Manager and Dashboard in SplunkChapter 7: Splunk User/Power User Exam setPART 2: SPLUNK DATA ADMINISTRATION AND SYSTEM ADMINISTRATIONGOAL: In this module data & system administration are designed in a way that will focus on very important topics that will help candidates to pass splunk admin exam.We will study the roles of a splunk admin. In this module, we will understand the concepts behind splunk Licenses and role management, configuring splunk forwarders, clustering in splunk, getting advanced data input and updating .conf file.Chapter 8: Splunk Licenses, Indexes and role ManagementChapter 9: Machine Data using Splunk forwarder and clusteringChapter 10: Splunk Advanced Data InputsChapter 11: Splunk Advanced .Conf file and DiagChapter12: Splunk Admin Exam setPART 3: ADVANCED SPLUNKGOAL: In this part we will explore some features that are very useful for splunk admins in day to day life like infrastructure planning with search head clustering , troubleshooting in splunk,Advanced Deployment, Roles of splunk architect and splunk best practices . By the end of this module, readers will gain a more advanced insight of splunk.Chapter 13: Infrastructure planning with Indexer and Search Head ClusteringChapter 14: Troubleshooting in SplunkChapter 15: Advanced Deployment in SplunkChapter 16: Advanced SplunkChapter 17: Final Practice setChapter 18: Setting up a Splunk Environment with AWS

Regulärer Preis: 56,99 €
Produktbild für Zero Trust Security

Zero Trust Security

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security—moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. ZERO TRUST SECURITY uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization‘s journey to Zero Trust.WHAT YOU WILL LEARN* Understand Zero Trust security principles and why it is critical to adopt them* See the security and operational benefits of Zero Trust* Make informed decisions about where, when, and how to apply Zero Trust security architectures* Discover how the journey to Zero Trust will impact your enterprise and security architecture* Be ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organizationWHO THIS BOOK IS FORSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategistsJASON GARBIS is Senior Vice President of Products at Appgate, a leading provider of Zero Trust secure access solutions. At Appgate, he is responsible for the company's security product strategy and product management. He has over 30 years of product management, engineering, and consulting experience at security and technology firms. He is also co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance, leading research and publication initiatives. He holds a CISSP certification, a BS in computer science from Cornell University, and an MBA from Northeastern University.JERRY W. CHAPMAN is Engineering Fellow, Identity Management at Optiv Security. With over 25 years of industry experience, Jerry has successfully guided numerous clients in the design and implementation of their enterprise IAM strategies, in ways that align with both security and business objectives. His job roles have spanned enterprise architecture, solution engineering, and software architecture and development. As an IAM industry expert, Jerry provides guidance, support, and thought leadership across Optiv cybersecurity practice areas, with a focus on positioning Identity and Data as a core component within enterprise security architectures. He is a key spokesperson for Optiv’s Zero Trust strategy, and frequently speaks at conferences and other industry events. Jerry is active in the technical working group at the Identity Defined Security Alliance (IDSA), where he was the group’s original Technical Architect. Jerry is a certified Forrester Zero Trust Strategist, has a BS in Computer Information Systems from DeVry University and is currently pursuing a degree in Applied Mathematics from Southern New Hampshire University.

Regulärer Preis: 56,99 €
Produktbild für Outlook 365: as your personal Assistant

Outlook 365: as your personal Assistant

Nope, it won't make you a coffee right now. But Outlook can write, sort and tag your mail, find lost items, maybe throw away stuff instantly or re-present it at the time you find it suitable. More than that, Outlook can organize appointments, deliver route planning, present pictures of your contacts and much more.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 1,99 €
Produktbild für GitHub - Eine praktische Einführung

GitHub - Eine praktische Einführung

GitHub - praktisch und anschaulich erklärt. Von den ersten Schritten bis zu eigenen GitHub Actions.GitHub ist derzeit die größte Internetplattform für Open-Source-Entwicklungsprojekte und bietet ein grafisches Webinterface mit vielen Funktionen für die gemeinsame Arbeit sowie interessante Community-Features. Technisch setzt es auf der bekannten Versionsverwaltung Git auf.Aber was ist ein Repository, Branch, Commit, Pull-Request oder Fork? Wie lege ich ein eigenes Projekt an? Was muss ich beim Mergen beachten und wann sind »etwas Git« oder Actions und Apps ein guter nächster Schritt?Einsteiger*innen lernen alle wichtigen Werkzeuge und Begriffe kennen, spielen typische Arbeitsschritte durch und erhalten über die Funktionalität der Plattform hinaus viele Infos und Praxistipps. Mit diesem verständlichen und humorvollen Leitfaden gelingt der unfallfreie Einstieg in die Open-Source-Welt – garantiert.GitHub – die Plattform kennenlernen Die Oberfläche erkunden und einen eigenen Account anlegenDas erste GitHub-Projekt Mit Repositories, Issues und Branches arbeiten, Pull-Requests erstellen und mergenOpen-Source-Lizenzen Unterschiede verstehen und eine passende Lizenz auswählenAuf eigenen und fremden Projekten zusammenarbeiten Projekte für Mitstreiter attraktiver machen, Maintainer einsetzen, Pull-Requests einreichen und Projekte forkenEinstieg in Git Git installieren und wichtige Befehle ausprobierenGit und GitHub im Zusammenspiel Projekte mit GitHub und Git bearbeiten und synchron halten, Repositories forken und Merge-Konflikte lösenMit Actions und Apps effizienter arbeiten Apps und Actions aus dem Marketplace installieren und eine eigene Action programmieren

Regulärer Preis: 24,90 €
Produktbild für Heimautomation mit Arduino, ESP8266 und Raspberry Pi

Heimautomation mit Arduino, ESP8266 und Raspberry Pi

Das eigene Heim als Smart Home für Heimwerker, Bastler und Maker.Mit diesem umfassenden Praxis-Handbuch erfahren Sie, wie Sie Ihr Heim selbst automatisieren können.Anhand zahlreicher Beispiele lernen Sie Schritt für Schritt die Umsetzung verschiedener Projekte wie z.B. 433-MHz-Sender und -Empfänger, IoT-Gateway mit 433 MHz, drahtlose Infrarot-Fernsteuerung für den Fernseher, Wettermodul, drahtlose Klingel, Strom- und Briefkastenwächter und Aquarium-Timer.Der Autor zeigt Ihnen die praktischen Einsatzmöglichkeiten verschiedener Sensoren und Aktoren im Smart Home wie Licht-, Umwelt- und Barometersensor. Dabei werden zum einen selbst gebaute einfache Elektronik-Module mit Arduino, ESP8266 und Wemos-Modulen realisiert und über eine Schaltzentrale mit Raspberry Pi gesteuert. Zum anderen werden fertige Module wie Bewegungsmelder, Kontakte oder Rauchmelder über einfache Gateways ins System integriert. Dabei wird für die Zentrale Node-Red verwendet, um die Daten und Zustände zu verarbeiten und zu visualisieren.Jedes einzelne Projekt wird mit Stückliste und Steckbrett-Aufbau ausführlich dargestellt und beschrieben.Dieses Buch richtet sich an Bastler und Maker, die bereits etwas Erfahrung mit Arduino und Raspberry Pi gesammelt haben und nun praktische Anwendungen in ihrem Heim aufbauen möchten.Inhalte & Projekte:IoT-Hardware mit Arduino, ESP8266 und Raspberry PiArduino IDE und Node-RedDie Protokolle HTTP und MQTTArduino als SensormodulSchaltmodule mit Tasmota-FirmwareNode-Red als SchaltzentraleWettermodul mit Licht-, Umwelt- und Barometersensor433-MHz-Sender und -EmpfängerIoT-Gateway mit 433 MHzESP8266 als RF-GatewayNode-Red-Schaltzentrale mit Arduino-InterfaceDrahtlose Infrarot-Fernsteuerung für den FernseherDrahtlose KlingelAnalog-Wandler-ModulHomeautomation-PlattformenBriefkastenwächterStromwächterAquarium-TimerLeuchtstreifensteuerungInhalt & Leseprobe (PDF-Link)

Regulärer Preis: 29,99 €
Produktbild für Big Breaches

Big Breaches

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity.WHO THIS BOOK IS FORThose interested in understanding what cybersecurity is all about, the failures have taken place in the field to date, and how they could have been avoided. For existing leadership and management in enterprises and government organizations, existing professionals in the field, and for those who are considering entering the field, this book covers everything from how to create a culture of security to the technologies and processes you can employ to achieve security based on lessons that can be learned from past breaches.DR. NEIL DASWANI is Co-Director of the Stanford Advanced Security Certification program, and is President of Daswani Enterprises, his security consulting and training firm. He has served in a variety of research, development, teaching, and executive management roles at Symantec, LifeLock, Twitter, Dasient, Google, Stanford University, NTT DoCoMo USA Labs, Yodlee, and Telcordia Technologies (formerly Bellcore). At Symantec, he was Chief Information Security Officer (CISO) for the Consumer Business Unit, and at LifeLock he was the company-wide CISO. Neil has served as Executive-in-Residence at Trinity Ventures (funders of Auth0, New Relic, Aruba, Starbucks, and Bulletproof). He is an investor in and advisor to several cybersecurity startup companies and venture capital funds, including Benhamou Global Ventures, Firebolt, Gravity Ranch Ventures, Security Leadership Capital, and Swift VC. Neil is also co-author of Foundations of Security: What Every Programmer Needs to Know (Apress).Neil's DNA is deeply rooted in security research and development. He has dozens of technical articles published in top academic and industry conferences (ACM, IEEE, USENIX, RSA, BlackHat, and OWASP), and he has been granted over a dozen US patents. He frequently gives talks at industry and academic conferences, and has been quoted by publications such as The New York Times, USA Today, and CSO Magazine. He earned PhD and MS degrees in computer science at Stanford University, and he holds a BS in computer science with honors with distinction from Columbia University.DR. MOUDY ELBAYADI has more than 20 years of experience and has worked with a number of high-growth companies and across a variety of industries, including mobile and SaaS consumer services, and security and financial services. Having held C-level positions for leading solution providers, Dr. Elbayadi has a unique 360-degree view of consumer and enterprise SaaS businesses. He has a consistent track record of defining technology and product strategies that accelerate growth.As CTO of Shutterfly, Dr. Elbayadi oversees all technology functions including product development, cybersecurity, DevOps, and machine learning/AI R&D functions. In this capacity he is leading the technology platform transformation. Prior to Shutterfly, Dr. Elbayadi held the position of SVP, Product & Technology for Brain Corp, a San Diego-based AI company creating transformative core technology for the robotics industry.As advisor, Dr. Elbayadi has been engaged by CEOs and senior executives of companies ranging from $10M to $2B in revenues. Representative engagements include public cloud strategy, platform integration and M&A strategy. He has advised numerous VC firms on technology and prospective investments.Dr. Elbayadi earned a doctorate in leadership and change from Antioch University, a master’s degree in organizational leadership from Chapman University, and a master’s degree in business administration from the University of Redlands.PART I: THE BIGGEST BREACHESThe goal of this part is to explain, in plain English, the biggest breaches in recent years, focusing on what has resulted in everything from exposure of the majority of American consumers’ financial identities to a foreign power more than significantly “influencing” the election of our most recent President. The breaches will be covered in reverse chronological order of the years in which the breaches were made public (even though some of them occurred prior), and in the summary section, I’ll also comment on the relevance and implications of the actual years in which the breaches took place.CHAPTER 1: THE FIVE KEY ROOT CAUSESThis chapter reviews the five basic root causes that we’ll see in all the mega-breaches that will be reviewed in subsequent chapters.* Phishing* Malware* Third-party compromise (suppliers, customers, and partners, as well as acquisitions)* Software Vulnerabilities (application security as well as third-party vulnerabilities)* Inadvertent employee mistakesCHAPTER 2: THE CAPITAL ONE BREACH IN 2019On July 29, 2019, court documents were released regarding a security breach at Capital One that exposed data for over 105 million people. A lone hacker gained access to highly sensitive data including names, social security numbers, addresses, and dates of birth. This hack is just one example in which over a hundred million customer records have been exposed to the entire Internet.* The Modern Day Datacenter: The Cloud and Hybrid Clouds* Erratic: Former Amazon Web Services employee* The Firewall Hack* The Ex-Filtration* The Simple Mistakes* The Charges & The FalloutCHAPTER 3: CAMBRIDGE ANALYTICA & FACEBOOKThe goal of this chapter is to cover two issues that both involved Facebook. The first issue is how Cambridge Analytica, a data analytics firm that assisted President Trump's presidential campaign, abused Facebook to harvest data on 70 million U.S. consumers to create psychographic profiles of them and target ads to influence voting. The second issue is how a vulnerability in Facebook’s “View As” feature (that allows users to see how their profiles look to the public) was exploited to allow for the take over of approximately 50 million Facebook accounts. The sections in this chapter will also set the groundwork for the Facebook hacking of the 2016 election by the Russians.* How Facebook Works* How Facebook Makes Money Through Ads* Political Ads* Security Challenges with Ads: Abusive Targeting, Bad Ads, Malvertising, and Click Fraud* Facebook’s Third-Party Apps and APIs* Cambridge Analytica Harvesting* Bungled Remediation of Harvested Data* The “View As…” Vulnerability * Remediation of the “View As…” VulnerabilityCHAPTER 4: THE MARRIOTT HACK IN 2018The Marriott hack disclosed in 2018 has been the second largest breach of all time as it involved 383 million records, and is only second to Yahoo’s hack of 3 billion email accounts which we’ll describe in see Chapter 8. Passport numbers, and the location history of hundreds of millions of people was amongst the data stolen in the breach. Combined with stolen data from the US Government’s Office of Personnel Management breach (described in Chapter 7), one can even derive the location histories or potentially even impersonate some CIA agents and spies.* Marriott and Starwood* DBA Account Takeover* Malware: Remote Access Trojan and Mimikatz* Starwood Guest Reservation Database ExfiltrationCHAPTER 5: THE EQUIFAX HACK IN 2017The credit histories of 145M+ American consumers were stolen in 2017 in the largest breach of financial identity in history.* Vulnerability Management Problems* Apache Struts and CVE-2017-5638* The Overall State of Information Security at Equifax* The Hack* The Blundered Response* The ImpactCHAPTER 6: THE FACEBOOK HACK IN THE 2016 PRESIDENTIAL ELECTIONThis chapter describes the organized Russian disinformation campaign in which Facebook was weaponized to distribute over 5 million paid ads that focused on dividing the American public and influencing votes in the 2016 Presidential election.Dezinformatsiya: Inherently Russian * Lack of Regulatory Oversight for Social Media (as compared to TV advertising)* Russian Facebook Ads* The Internet Research Agency: Kremlin-backed Online Troll Farm (amongst 228 groups)Weaponization of Ad Targeting: Swing States (Pennsylvania, Virginia, and Wisconsin) * Suspicious Advertisers: Over 9,500* Fancy Bear: Indictments of 13 Russian IndividualsCHAPTER 7: THE DEMOCRATIC NATIONAL COMMITTEE HACK IN 2016Just as significant as the disinformation advertising campaign was the infiltration and subsequent leaks of over 150,000 emails from the Democratic National Committee.* Trump’s Request* Massive Phishing Campaign* How John Podesta Got Phished: 60,000 Emails Stolen* Additional Phishing Emails: 150,000 Emails Stolen* Guccifer 2.0* WikiLeaks* Key Emails and Information Leaked* ImpactCHAPTER 8: THE OFFICE OF PERSONNEL MANAGEMENT HACK IN 2015The SF-86 background check files of over 20 million government employees (including CIA, NSA, FBI, and other agents) which also included information about their friends, family, and neighbors, as well as over 5 million fingerprints were stolen and exfiltrated by a foreing nation state.* What was stolen* Impact* Root causes* How it could have been preventedCHAPTER 9: THE YAHOO HACK IN 2013 AND 2014 (MADE PUBLIC IN 2016)The largest breach in the history of the Internet and the world occured in 2013 and 2014 when attackers compromised Yahoo’s email and other systems.* Spear phishing * Malware to grow footprint* Cookie minting* Yahoo Account Management Tool Compromise* Targeting of Politicians and Diplomats* Financial Impact and Verizon Acquisition* Former KGB Agents and IndictmentsCHAPTER 10: HOLISTIC IMPLICATIONS* Political Impact* Financial Impact* Regulatory Impact* Technology ImpactPART II: HOW TO RECOVERFor each of the root causes of breaches, we’ll suggest countermeasures for each going forward. Phishing attacks can be successfully combated with better preventative countermeasures. Malware can unfortunately only be detected better, as no one can altogether stop adversaries from authoring malicious software. Existing software vulnerabilities also cannot be prevented, but their detection, containment, and recovery can be managed much more reliably or automated. Vulnerabilities in new applications, as well as other types of software, can be prevented through the introduction of building codes for software, as well as tools to support the development of software that meets those building codes. Finally, vulnerabilities in third-party suppliers can be recursively managed using the approaches that we’ve outlined here.In this second part of the book, technologies that are critical to the roadmap to recovery are explained in plain English. In addition, the contributions that people in various roles need to make and the processes that need to be put in place by those people will also be covered.CHAPTER 11: BETTER PREVENTATIVE COUNTERMEASURESPassword Managers, Multi-factor Authentication, and Yubico-like Hardware Tokens * Authentication Providers (Current as well as potential future e.g. FIDO Alliance)* Automated Patching: Endpoints, Servers, and IoT. Browsers (e.g., Chrome) are a great example of how this can be done right. Mac OS X updates are also a great example, even if a bit inconvenient sometimes. Servers and IoT need help. Mirai botnet from 2016 exhibits the urgency. IoT Guidelines.* Building Codes for SoftwareCHAPTER 12: DETECTION: IDENTITY MONITORING* Difference between credit monitoring and identity monitoring* Dark Web Monitoring* New Account Creation Vs. Account TakeoverCHAPTER 13: DETECTION: BAD ADS, FAKE NEWS, AND ANTI-MALVERTISINGThe goal of this chapter is to focus on detection of bad ads, fake news, and malware that attempt to enter and distribute itself through the online advertising ecosystem.* Bad Ads* Fake News* Malicious software: cannot be prevented, only detection. Not to mention Turing undecidability.CHAPTER 14: CONTAINMENT AND RECOVERY: HOW TO MAKE THE STOLEN DATA USELESSFor any and all information that has been stolen to date, we should attempt to make the stolen data useless. While that can’t be done for all data, and time will be required for some data (perhaps even a generation or two) to become fully obsolete, as in the case of stolen background information, it is will worth the effort to render certain data to be ineffective. For instance, SSNs are currently treated as secrets and are used for authentication of users. However, since most of the SSNs in the country have been stolen, they should not be treated as secrets, and alternative methods for actual authentication should be used. SSNs can still be used as identifiers, but knowledge of someone’s SSN should not allow you to transact as then. A similar argument can be made for the typical questions asked in KBA (knowledge based answer) quizzes. On the other hard, in addition to something a user knows, something that a user has (the user’s cell phone), or something that the user “is” (such as a biometric fingerprint authentication) should be used to authenticate a user. Apple Touch ID, for instance, is a step in the right direction.CHAPTER 15: CYBERSECURITY INVESTMENTS: MADE TO-DATEOver $45 billion has been invested in cybersecurity companies to date, yet the mega-breaches continue. This chapter covers where all this money has been going, and what defenses have been invested in thus far. The chapter also addresses which of the root causes have received what amounts of investment thus far, and whether or not we’ve seen any reductions in those breaches and why or why not.CHAPTER 16: CYBERSECURITY INVESTMENTS: WHAT’S NEED GOING FORWARDThis chapter analyzes what areas of cybersecurity are ripe for further investment. Areas such as cloud security, and artificial intelligence applications to security have received less private equity and public IPO investment as compared to, say, network security and probably warrant more investment going forward.CHAPTER 17: ADVICE TO LEADERSHIPToday, the most security-savvy organizations have their CSO report directly to the CEO, and have regular reporting on security topics to the board of directors. Some CSOs, for instance, report out the state of the information security program to the audit committee once per quarter, and to the full board of directors once per year. This section provides advice to such leaders on how to explain security either to a board of directors or any level of management in between such that the return on investment for security initiatives can be measured, and explained in English in an understandable fashion, often using analogies where necessary.CHAPTER 18: APPLYING YOUR SKILLS TO THE FIELD OF CYBERSECURITYThis section discusses how professionals in various roles (people managers, project managers, product managers, software developers, IT administrators) can get into the field, as well as apply their skills to make contributions to cybersecurity. There are many opportunities for them to strategically apply their skills but also provide critical tactical support when required.This section provides people managers, project managers, software developers, IT administrators, in addition to product managers advice on how they can best leverage their skill sets to achieve security.CONCLUSION / SUMMARY

Regulärer Preis: 34,99 €
Produktbild für Extending Gatsby

Extending Gatsby

Expand your Gatsby development skills by building a production-ready blog website. This book teaches you how to use Gatsby alongside the latest technologies including MDX, CDN, and Netlify.In this project, you will create a very complex and large blog site with just MDX files and learn to optimize images using CDN for faster website loading. You will also learn to continuously deploy to Netlify enabling you to provide daily site updates easily. To get the most out of this book you should be comfortable with the basics of React and familiar with Gatsby fundamentals as covered in Foundation Gatsby Projects, which provides several stepping stone projects.Rather than cover how to create a simple blog site, Extending Gatsby goes beyond the basics to extend your blogging skills.WHAT YOU'LL LEARN* Develop a production-ready, complex, blogging system site with MDX* Learn to make a complete mobile site* Continuously deploy your site using Netlify* Add functionalities with the powerful Gatsby plugin ecosystemWHO THIS BOOK IS FORThis book is for developers who are familiar with Gatsby and are looking to create an extended blog site. Knowledge of React is expected. You will also need to be familiar with JavaScript concepts and be confident with basic web development.Nabendu Biswas is a full stack JavaScript developer who has been working in the IT industry for the past 15 years and has worked for some of the world’s top development firms and investment banks. He is a passionate tech blogger who publishes on dev.to and medium.com and on thewebdev.tech. He is an all-round nerd, passionate about everything JavaScript, React and Gatsby. You can find him on Twitter @nabendu82.Chapter 1: Setting Up the Blog SiteChapter 2: Adding Gatsby-plugin-mdx to the SiteChapter 3: Adding Author Details to the SiteChapter 4: Adding Functionality to the SiteChapter 5: Adding a Series FeatureChapter 6: Deploying the Site in NetlifyChapter 7: Adding Gatsby Plugins to the SiteChapter 8: New Features and Fixes

Regulärer Preis: 39,99 €
Produktbild für Windows Containers for IT Pros

Windows Containers for IT Pros

This book has everything you need to know about Windows Containers, from an IT pro and ops perspective.Containers are the next big thing in IT infrastructure. More and more, we see companies relying on Kubernetes implementations to run their workloads on-premises, in the cloud, or even in hybrid deployments. IT pros and ops teams are now faced with the challenge of getting up to speed on container architecture, knowing how it differs from virtual machines (VMs), and the best means and practices for managing their applications in containers.WINDOWS CONTAINERS FOR IT PROS explores all of that, from the IT pro experience. You will approach learning about containers through the optics of an author who is accustomed to deploying virtual machines (VMs). You will learn about differences, parallel practices, use cases, and how to get started and go deep into day 2 operations.WHAT YOU WILL LEARN* Architect and deploy Windows Containers leveraging existing skills* Containerize existing applications* Know best practices for managing resources in Windows Containers* Get comfortable moving containers to the cloud with Azure* Understand the options for using containers on AzureWHO THIS BOOK IS FORWindows IT pros and technical professionals deploying Windows Server and server applications today, such as .NET, ASP.NET, IIS, and more. This book assumes little to no experience with scripting as readers deploy their workloads via one of the Windows UIs (Hyper-V, Server Manager, Windows Admin Center, etc.). Knowledge of VMs and infrastructure, such as clustered operating systems, is recommended but not required.VINICIUS RAMOS APOLINARIO is Senior Program Manager on the Windows Container Platform team at Microsoft that builds the container platform that runs on Windows Server and Azure. He has been a Microsoft professional for most of his career and holds multiple certifications from Microsoft, VMware, Exin, and others. Vinicius is passionate about passing on his knowledge and contributes to the community via blogs, events, and articles. He is a published author who is regularly seen out in the community or at trade events presenting on various topics.Chapter 1: Introduction to ContainersChapter 2: Getting Started with Windows Containers and DockerChapter 3: Containerizing Existing ApplicationsChapter 4: Managing Resources in Windows ContainersChapter 5: Container Management with Windows Admin CenterChapter 6: Moving Your Containers to the Cloud with Microsoft Azure

Regulärer Preis: 62,99 €
Produktbild für How to avoid mistakes

How to avoid mistakes

Nobody intends to make mistakes. Still, they happen. Sometimes users may not be aware of requirements or make typos. What begins as a small error, later leads to unnecessary work that costs time, money, and nerves. Here, you’ll learn how to guide users in a way that makes errors less likely or even impossible. Or to inform them on input what’s required. In other cases, you may want to prepare data for decision making in a way that one does not need actual typing anymore. And of course, there are the new cloud functionalities of Excel 365 opening new dimensions of co-operations. All of this is explained here.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 1,99 €
Produktbild für Data Science (2. Auflg.)

Data Science (2. Auflg.)

Know-how für Data Scientists. Grundlagen, Architekturen und Anwendungen in 2. Auflage 02/2021Data Science steht derzeit wie kein anderer Begriff für die Auswertung großer Datenmengen mit analytischen Konzepten des Machine Learning oder der künstlichen Intelligenz. Nach der bewussten Wahrnehmung der Big Data und dabei insbesondere der Verfügbarmachung in Unternehmen sind Technologien und Methoden zur Auswertung dort gefordert, wo klassische Businss Intelligence an ihre Grenzen stößt.Dieses Buch bietet eine umfassende Einführung in Data Science und deren praktische Relevanz für Unternehmen. Dabei wird auch die Integration von Data Science in ein bereits bestehendes Business-Intelligence-Ökosystem thematisiert. In verschiedenen Beiträgen werden sowohl Aufgabenfelder und Methoden als auch Rollen- und Organisationsmodelle erläutert, die im Zusammenspiel mit Konzepten und Architekturen auf Data Science wirken.Diese 2., überarbeitete Auflage wurde um neue Themen wie Feature Selection und Deep Reinforcement Learning sowie eine neue Fallstudie erweitert.

Regulärer Preis: 59,90 €