Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Azure Arc-Enabled Data Services Revealed

Azure Arc-Enabled Data Services Revealed

Get introduced to Azure Arc-enabled data services and the powerful capabilities they provide to deploy and manage local, on-premises, and hybrid cloud data resources using the same centralized management and tooling you get from the Azure cloud. This book shows how you can deploy and manage databases running on SQL Server and Posgres in your corporate data center as if they were part of the Azure platform. You will learn how to benefit from the centralized management that Azure provides, the automated rollout of patches and updates, and more.This book is the perfect choice for anyone looking for a hybrid or multi-vendor cloud strategy for their data estate. The authors walk you through the possibilities and requirements to get services such as Azure SQL Managed Instance and PostgresSQL Hyperscale, deployed outside of Azure, so the services are accessible to companies that cannot move to the cloud or do not want to use the Microsoft cloud exclusively. The technology described in this book will be especially useful to those required to keep sensitive services, such as medical databases, away from the public cloud, but who still want to benefit from the Azure cloud and the centralized management and tooling that it supports.WHAT YOU WILL LEARN* Understand the core concepts of Kubernetes* Understand the fundamentals and architecture of Azure Arc-enabled data services* Build a multi-cloud strategy based on Azure data services* Deploy Azure Arc-enabled data services on premises or in any cloud* Deploy Azure Arc-enabled SQL Managed Instance on premises or in any cloud* Deploy Azure Arc-enabled PostgreSQL Hyperscale on premises or in any cloud* Manage Azure-enabled data services running outside of Azure* Monitor Azure-enabled data services running outside of Azure through the Azure PortalWHO THIS BOOK IS FORDatabase administrators and architects who want to manage on-premises or hybrid cloud data resources from the Microsoft Azure cloud. Especially for those wishing to take advantage of cloud technologies while keeping sensitive data on premises and under physical control.BEN WEISSMAN is the owner and founder of Solisyon, a consulting firm based in Germany and focused on business intelligence, business analytics, and data warehousing. He is a Microsoft Data Platform MVP, the first German BimlHero, and has been working with SQL Server since SQL Server 6.5. Ben is also an MCSE, Charter Member of the Microsoft Professional Program for Big Data, Artificial Intelligence, and Data Science, and he is a Certified Data Vault Data Modeler. If he is not currently working with data, he is probably travelling to explore the world.ANTHONY E. NOCENTINO is the Founder and President of Centino Systems as well as a Pluralsight author, a Microsoft Data Platform MVP, and an industry recognized Kubernetes, SQL Server, and Linux expert. In his consulting practice, Anthony designs solutions, deploys the technology, and provides expertise on system performance, architecture, and security. He has bachelor's and master's degrees in computer science, with research publications in machine virtualization, high performance/low latency data access algorithms, and spatial database systems. 1. A Kubernetes Primer2. Azure Arc-Enabled Data Services3. Getting Ready for Deployment4. Deploying a Data Controller5. Deploying an Azure Arc-Enabled SQL Managed Instance6. Deploying Azure Arc-Enabled PostgreSQL Hyperscale7. Monitoring

Regulärer Preis: 39,99 €
Produktbild für Einführung in SQL

Einführung in SQL

Grundlagen und Schlüsseltechniken verstehen und mit vielen Beispielen vertiefen Konzepte und typische Arbeitsschritte verständlich und kompakt erklärt Die SQL-Beispiele laufen ohne Änderungen auf MySQL und (ggf. mit geringfügigen Änderungen) auf neueren Versionen von Oracle Database, DB2 und SQL Server Mit SQL Daten von diversen Plattformen und nicht-relationalen Datenbanken verarbeiten SQL-Kenntnisse sind nach wie vor unverzichtbar, um das Beste auf Ihren Daten herauszuholen. In seinem Handbuch vermittelt Alan Beaulieu die nötigen SQL-Grundlagen, um Datenbankanwendungen zu schreiben, administrative Aufgaben durchzuführen und Berichte zu erstellen. Sie finden neue Kapitel zu analytischen Funktionen, zu Strategien für die Arbeit mit großen Datenbanken sowie zu SQL und großen Datenmengen. Jedes Kapitel präsentiert eine in sich geschlossene Lektion zu einem Schlüsselkonzept oder einer Schlüsseltechnik von SQL und nutzt hierfür zahlreiche Abbildungen und kommentierte Beispiele. Durch Übungen vertiefen Sie die erlernten Fähigkeiten.

Regulärer Preis: 29,90 €
Produktbild für Beginning Mathematica and Wolfram for Data Science

Beginning Mathematica and Wolfram for Data Science

Enhance your data science programming and analysis with the Wolfram programming language and Mathematica, an applied mathematical tools suite. The book will introduce you to the Wolfram programming language and its syntax, as well as the structure of Mathematica and its advantages and disadvantages.You’ll see how to use the Wolfram language for data science from a theoretical and practical perspective. Learning this language makes your data science code better because it is very intuitive and comes with pre-existing functions that can provide a welcoming experience for those who use other programming languages.You’ll cover how to use Mathematica where data management and mathematical computations are needed. Along the way you’ll appreciate how Mathematica provides a complete integrated platform: it has a mixed syntax as a result of its symbolic and numerical calculations allowing it to carry out various processes without superfluous lines of code. You’ll learn to use its notebooks as a standard format, which also serves to create detailed reports of the processes carried out.WHAT YOU WILL LEARN* Use Mathematica to explore data and describe the concepts using Wolfram language commands* Create datasets, work with data frames, and create tables* Import, export, analyze, and visualize data* Work with the Wolfram data repository * Build reports on the analysis* Use Mathematica for machine learning, with different algorithms, including linear, multiple, and logistic regression; decision trees; and data clusteringWHO THIS BOOK IS FORData scientists new to using Wolfram and Mathematica as a language/tool to program in. Programmers should have some prior programming experience, but can be new to the Wolfram language.JALIL VILLALOBOS ALVA is a Wolfram language programmer and Mathematica user. He graduated with a degree in engineering physics from the Universidad Iberoamericana in Mexico City. His research background comprises quantum physics, bionformatics, proteomics, and protein design. His academic interests cover the topics of quantum technology, bioinformatics, machine learning, stochastic processes, and space engineering. During his idle hours he likes to play soccer, swim, and listen to music.1. Introductiona. What is Data science?b. Data science and Statisticsc. Data scientist2. Introduction to Mathematicaa. Why Mathematica?b. Wolfram Languagec. Structure of Mathematicad. Notebookse. How Mathematica worksf. Input Form3. Data Manipulationa. Listsb. Lists of objectsc. Manipulating listsd. Operations with listse. Indexed Tablesf. Working with data framesg. Datasets4. Data Analysisa. Data Import and exportb. Wolfram data repositoryc. Statistical Analysisd. Visualizing datae. Making reports5. Machine learning with Wolfram Languagea. Linear Regressionb. Multiple Regressionc. Logistic Regressiond. Decision Tresse. Data Clustering6. Neural networks with Wolfram Languagea. Network Data and structureb. Network Layersc. Perceptron Modeld. Multi-layer Neural Networke. Using preconstructed nets from Wolfram Neural net repositoryf. LeNet Neural net for text recognition

Regulärer Preis: 56,99 €
Produktbild für Modern C for Absolute Beginners

Modern C for Absolute Beginners

Learn the C programming language easily and in a straightforward way. This book teaches the basics of C, the C Standard Library, and modern C standards. No previous programming experience is required.C is a language that is as popular today as it was decades ago. C covers a wide variety of domains. It can be used to program a microcontroller, or to develop an entire operating system. This book is an effort to introduce the reader to the C programming language in a concise and easy to follow manner.The author takes you through the C programming language, the Standard Library, and the C standards basics. Each chapter is the right balance of theory and code examples.After reading and using this book, you'll have the essentials to start programming in modern C.WHAT YOU WILL LEARN* The C programming language fundamentals* The C Standard Library fundamentals* New C Standards features* The basics of types, operators, statements, arrays, functions, and structs* The basics of pointers, memory allocation, and memory manipulation* Take advantage of best practices in CWHO THIS BOOK IS FORBeginner or novice programmers who wish to learn the C programming language. No prior programming experience is required.SLOBODAN DMITROVIĆ is a software consultant, trainer, and entrepreneur. He is the CEO and founder of “Clear Programming Paradigm”, an LLC that provides outsourcing and training services. Slobodan’s ability to summarize complex topics and provide insightful training made him a sought after consultant for the automotive, fintech, and other industries. Slobodan has a strong interest in C, C++, software architecture, training, and R&D.Part I: The C Programming LanguageChapter 1: IntroductionChapter 2: Our First ProgramChapter 3: Types and DeclarationsChapter 4: ExercisesChapter 5: OperatorsChapter 6: ExpressionsChapter 7: StatementsChapter 8: ExercisesChapter 9: ArraysChapter 10: PointersChapter 11: Command-line ArgumentsChapter 12: ExercisesChapter 13: FunctionsChapter 14: ExercisesChapter 15: StructuresChapter 16: UnionsChapter 17: Conditional ExpressionChapter 18: TypedefChapter 19: Const QualifierChapter 20: EnumerationsChapter 21: Function PointersChapter 22: ExercisesChapter 23: PreprocessorChapter 24: ExerciesChapter 25: Dynamic Memory AllocationChapter 26: Storage and ScopeChapter 27: ExercisesChapter 28: Standard Input and OutputChapter 29: File Input and OutputChapter 30: ExercisesChapter 31: Header and Source FilesPart II: The C Standard LibraryChapter 32: Introduction to C Standard LibraryPart III: Modern C StandardsChapter 33: Introduction to C 11 StandardsChapter 34: The C 17 StandardChapter 35: The Upcoming C2X StandardPart IV: Dos and Don'tsChapter 36: Do Not Use the gets FunctionChapter 37: Initialize Variables Before Using ThemChapter 38: Do Not Read Out of BoundsChapter 39: Do Not Free the Allocated Memory TwiceChapter 40: Do Not Cast the Result of mallocChapter 41: Do Not Overflow a Signed IntegerChapter 42: Cast a Pointer to void* When Printing Through printfChapter 43: Do Not Divide by ZeroChapter 44: Where to Use Pointers?Chapter 45: Prefer Functions to Function-like MacrosChapter 46: Static Global NamesChapter 47: What to Put in Header Files?Part V: AppendicesAppendix A: LinkageAppendix B: Time and DateAppendix C: Bitwise OperatorsAppendix D: Numeric LimitsAppendix E: Summary and Advice

Regulärer Preis: 56,99 €
Produktbild für Basiswissen Testautomatisierung (3. Auflg.)

Basiswissen Testautomatisierung (3. Auflg.)

Konzepte, Methoden und Techniken für die Testautomatisierung. 3. aktualisierte und überarbeitete Auflage.Dieses Buch vermittelt die Grundlagen und gibt einen fundierten Überblick, wie Testautomatisierung mit Fokus auf den funktionalen Systemtest konzipiert und in bestehende Projekte und die Organisation eingegliedert wird. Dabei werden sowohl fachliche als auch technische Konzepte vorgestellt.Ziele und Erfolgsfaktoren der TestautomatisierungVorbereitungen für die TestautomatisierungEinführung in die generische TestautomatisierungsarchitekturRisiken und Eventualitäten bei der SoftwareverteilungBerichte und MetrikenÜberführung des manuellen Testens in eine automatisierte UmgebungVerifizierung der TestautomatisierungslösungFortlaufende OptimierungIm Anhang finden sich ein Überblick über die Softwarequalitätsmerkmale nach ISO 25010, eine Einführung in Last- und Performanztests sowie beispielhaft ein Kriterienkatalog zur Testwerkzeugauswahl.Die 3. Auflage wurde vollständig überarbeitet und ist konform zum ISTQB®-Lehrplan Advanced Level Specialist – Certified Test Automation Engineer. Das Buch eignet sich mit vielen erläuternden Beispielen gleichermaßen zur Vorbereitung auf die Zertifizierung wie als kompaktes Basiswerk zum Thema in der Praxis und an Hochschulen.Über die Autoren:Manfred Baumgartner, Vice President Quality Assurance bei Nagarro GmbH, Wien, ist seit über 30 Jahren im Bereich Softwaretest und Qualitätssicherung als Berater, Coach und Manager tätig. Seine umfangreichen Erfahrungen bringt er in viele Präsentationen auf Konferenzen im gesamten deutschsprachigen Raum sowie in Artikeln und Büchern zum Thema Softwaretest ein.Stefan Gwihs ist begeisterter Softwareentwickler, Softwaretester und Testautomatisierer für die Nagarro GmbH, Wien. Aktuell beschäftigt er sich vor allem mit Themen im Bereich mobiler Testautomatisierung und agiler Softwareentwicklung.Richard Seidl ist Berater und Coach für agile Methoden und Softwaretest. Er hat in seiner beruflichen Laufbahn schon viel Software gesehen und getestet: gute und schlechte, große und kleine, alte und neue, Schokolade und Grütze. Mit seiner Erfahrung unterstützt er Unternehmen dabei, ihre Entwicklungs- und Testprozesse zu verbessern und so zu gestalten, dass Software effektiver realisiert wird, höhere Qualität hat und die Teams Spaß an der Entwicklung haben.Thomas Steirer ist als Automatisierungsexperte, Berater und Trainer für die Nagarro GmbH, Wien, tätig und leitet die globale Practice für Test Automation. Er ist Autor von Fachartikeln, Speaker auf Konferenzen und Architekt von A2A, dem Nagarro „Advanced Automation Approach".Marc-Florian Wendland ist seit über 10 Jahren Senior Researcher am Fraunhofer Institut FOKUS in Berlin im Bereich Qualitätssicherung softwareintensiver Systeme. Seine Expertise liegt vor allem in der Testautomatisierung und stützt sich auf die Erfahrungen aus zahlreichen nationalen und internationalen Forschungs- und Industrieprojekten. Darüber hinaus ist er in verschiedene Standardisierungsaktivitäten im Bereich des Softwaretests involviert.

Regulärer Preis: 39,90 €
Produktbild für Software Engineering for Absolute Beginners

Software Engineering for Absolute Beginners

Start programming from scratch, no experience required. This beginners’ guide to software engineering starts with a discussion of the different editors used to create software and covers setting up a Docker environment. Next, you will learn about repositories and version control along with its uses. Now that you are ready to program, you’ll go through the basics of Python, the ideal language to learn as a novice software engineer. Many modern applications need to talk to a database of some kind, so you will explore how to create and connect to a database and how to design one for your app. Additionally you will discover how to use Python’s Flask microframework and how to efficiently test your code. Finally, the book explains best practices in coding, design, deployment, and security.Software Engineering for Absolute Beginners answers the question of what topics you should know when you start out to learn software engineering. This book covers a lot of topics, and aims to clarify the hidden, but very important, portions of the software development toolkit.After reading this book, you, a complete beginner, will be able to identify best practices and efficient approaches to software development. You will be able to go into a work environment and recognize the technology and approaches used, and set up a professional environment to create your own software applications.WHAT YOU WILL LEARN* Explore the concepts that you will encounter in the majority of companies doing software development* Create readable code that is neat as well as well-designed* Build code that is source controlled, containerized, and deployable* Secure your codebase* Optimize your workspaceWHO THIS BOOK IS FORA reader with a keen interest in creating software. It is also helpful for students.Nico Loubser has been working in the software development environment for more than 16 years, and holds a post-graduate degree in software engineering from the University of South Africa. He has spent quite a bit of his career as a team lead, and advising on architecture, which prompted him to amalgamate his knowledge and experience into one book. He currently lives in London, where he seeks exposure to an even greater variety of ideas and methods in today’s software development industry.Chapter 1 : Editors.- Chapter 2 : Setting up the Development Environment using Docker.- Chapter 3 : Repositories and Git.- Chapter 4 : Basic Programming using Python.- Chapter 5 : Coding Styles, Refactoring and Code Calisthenics.- Chapter 6 : Database and Database Design.- Chapter 7 RESTful APIS using flask.- Chapter 8 Testing and Code Quality.- Chapter 9 Planning and designing your code.- Chapter 10 Security.- Chapter 11 CI/CD.

Regulärer Preis: 46,99 €
Produktbild für Der Zufall in Physik, Informatik und Philosophie

Der Zufall in Physik, Informatik und Philosophie

Zufall als Fundament der Welt, aus der Buchreihe "Die blaue Stunde der Informatik".Der Zufall ist uns unheimlich. Wir dachten, es gäbe ihn nicht, hinter allem stehe Gott oder eine vernünftige Erklärung. Aber wir wissen heute: Es gibt ihn. Wir wissen, dass vieles dessen, was uns umgibt und das wir nicht durchschauen, trotzdem kausal abläuft. Anders als zu Zeiten der Aufklärung gedacht, ist der Zufall um uns eher die Regel als die gesetzmäßige Ordnung. Die Wolken sind Fraktale, die Wellen auf dem Meer sind eine reine Zufallsmaschinerie. Der Philosoph Charles Peirce hat genau in diesem Sinn noch vor Quanten- und Chaostheorie die fundamentale Bedeutung des Zufalls erkannt und der Lehre ihren Namen gegeben: Tychismus.Ohne Zufall gäbe es nichts Neues, kein Leben, keine Kreativität, keine Geschichte.Dieses Buch betrachtet den Zufall aus Sicht der Physik, der Informatik und der Philosophie. Es spannt den Bogen von der Antike zur Quantenphysik und zeigt, dass der Zufall fest in die Welt eingebaut ist und es sie ohne Zufall nicht gäbe.Dr. Walter Hehl ist vielseitiger Physiker und Autor recht verschiedener Bücher zu IT, Management, Religion, Philosophie und zur Geschichte der Wissenschaft. Sein Buch über Galilei erhielt 2019 den Preis der Woitschach-Stiftung für das beste kritische, aber faire Wissenschaftsbuch.

Varianten ab 44,99 €
Regulärer Preis: 49,99 €
Produktbild für PHP 8 Revealed

PHP 8 Revealed

Discover the new and updated features of PHP 8, such as the JIT compiler, union types, and attributes, with code examples of each. For each feature, the author includes real-life cases for its use and explains its benefits.WHAT YOU WILL LEARN* Utilize the new features of PHP 8 and modern development technologies* Work with the JIT compiler in PHP 8* Discover PHP 8 using real-life cases* Increase your available resources to become more valuable in your development teamWHO THIS BOOK IS FORExperienced PHP programmers new to PHP 8.GUNNARD ENGEBRETH began coding at the age of 11 through a “Learning BASIC” book given to him by his father. Technology was changing fast and Gunnard rode the wave from 1200 to 56k baud modems. Logging in to BBSs, Prodigy, Compuserve, Delphi and IRC he could see the world changing and he wanted to be a part of it. He soon got involved in the ansi/demo scene, making several application generators for many groups in the 90’s. Visual Basic was the next language of choice allowing him to develop “tools” for online systems such as AOL. This introduced many aspects of development, security and UI while they were still in their infancy. Once the WWW arrived via Mindspring in Atlanta, Ga. Gunnard quickly joined in the race for the web. Learning HTML, PERL and Linux (Slackware at the time) he began to build his skill-set which lead to a full-time Sysadmin position at the age of 20 (2000) at Activegrams/Silverpop. Gunnard has moved around the IT industry from SAN/NAS storage at IBM to custom Wordpress sites for marketing companies, but one thing has stayed the same, a passion for learning and problem solving. Gunnard also DJ’s Drum and Bass as Section31, Playing drums and baking bread (doughcode.com).1. Getting Started2. Setting up your development environment3. Devilbox4. Vagrant5. PHP 8 The Basics6. Whats newJIT compilerunion typesattributesThe nullsafe operatorNamed argumentsAttributesMatch expressionConstructor property promotionNew static return typeNew mixed typeThrow expressionInheritance with private methodsWeak mapsAllowing ::class on objectsNon-capturing catchesTrailing comma in parameter listsCreate DateTime objects from interfaceNew Stringable interfaceNew str_contains() function New str_starts_with() and str_ends_with() functionsNew fdiv() functionNew get_debug_type() functionNew get_resource_id() functionAbstract methods in traits improvementsObject implementation of token_get_all()Variable syntax tweaksType annotations for internal functionsext-json always available7. Breaking ChangesConsistent type errorsReclassified engine warningsThe @ operator no longer silences fatal errorsDefault error reporting levelDefault PDO error modeConcatenation precedenceStricter type checks for arithmetic and bitwise operators Reflection method signature changesStable sortingFatal error for incompatible method signatures8. FrameworksLaravelSlimPHPComposerSymphony9. The AdvancedMaintaining codeGithubGitlab Git workflowsCode StylePSR7phpDoc10. Refactoring and optimizationA. Giving Back

Regulärer Preis: 39,99 €
Produktbild für Echtzeit 2020

Echtzeit 2020

Mit seiner Tagung 2020 zum Thema „Kommunikationssicherheit im IoT“ greift der GI/GMA/ITG-Fachausschuss Echtzeitsysteme ein immer wichtiger werdendes Thema in einer mehr und mehr vernetzten Welt auf. Die präsentierten Lösungen reichen dabei von Hardware über Systementwurf bis hin zu einzelnen Applikationen. Ein historischer Rückblick sowie ein erstmals in einem Buch präsentiertes, kompaktes Tutorial der Programmiersprache OPENPearl, die u. a. mit der Zielsetzung, funktionale Sicherheit in Steuerungssystemen zu gewährleisten, im Fachausschuss entworfen wurde, runden die Darstellungen ab.Prof. Dr. Herwig Unger, FernUniversität in Hagen, Lehrstuhl für Kommunikationsnetze

Regulärer Preis: 39,99 €
Produktbild für Bloggen für Einsteiger

Bloggen für Einsteiger

Von der ersten Idee bis zum eigenen Blog mit WordPress.Ein Blog gibt dir die Möglichkeit, dich kreativ auszudrücken, mit Gleichgesinnten zu kommunizieren, dich persönlich weiterzuentwickeln und – wenn du es geschickt anstellst – sogar einen kleinen finanziellen Ausgleich für deine Arbeit erhalten. Und das Tolle ist: Du brauchst dafür keine großen Vorkenntnisse, sondern kannst sofort starten.Yvonne Kraus hat schon viele erfolgreiche Blogs an den Start gebracht und kennt die Fragen, die du als angehende Bloggerin oder Blog-Anfänger hast. Mit ihrem Ratgeber hast du eine Anleitung zur Hand, um schnell deinen Blog mit WordPress zu erstellen und die ersten Besucher anzusprechen. Dabei lernst du alle Facetten des Bloggens kennen. Schritt-für-Schritt-Anleitungen und bewährte Tipps aus der Praxis unterstützen dich. Und wenn deine ersten Artikel stehen, erfährst du, wie du mit Social Media, E-Mail-Marketing und SEO auf dich aufmerksam machst, eine Community aufbaust und sogar Geld verdienen kannst.Leseprobe (PDF-Link)

Regulärer Preis: 29,90 €
Produktbild für Teach Yourself VISUALLY iPhone 12, 12 Pro, and 12 Pro Max

Teach Yourself VISUALLY iPhone 12, 12 Pro, and 12 Pro Max

KNOW YOUR NEW IPHONE 12, 12 PRO, AND 12 PRO MAX FROM THE INSIDE-OUT WITH 900 COLOR SCREEN SHOTS!Teach Yourself VISUALLY iPhone is your ultimate guide to getting the most out of your iPhone! Apple's graphics-driven iOS is perfect for visual learners, so this book uses a visual approach to show you everything you need to know to get up and running—and much more. Full-color screen shots walk you step-by-step through setup, customization, and everything your iPhone can do. Whether you are new to the iPhone or have just upgraded to the 12, 12 Pro, or 12 Pro Max, this book helps you discover your phone's full functionality and newest capabilities. Stay in touch by phone, text, email, FaceTime Audio or Video calls, and social media; download and enjoy books, music, movies, and more; take, edit, and manage photos; track your health, fitness, and habits; organize your schedule, your contacts, and your commitments; and much more!The iPhone is designed to be user-friendly, attractive, and functional. But it is capable of so much more than you think—don't you want to explore the possibilities? This book walks you through iOS 14 visually to help you stay in touch, get things done, and have some fun while you're at it!* Get to know the iPhone 12, 12 Pro, and 12 Pro Max with 900 full-color screen shots* Master the iPhone's basic functions and learn the latest features* Customize your iPhone to suit your needs and get optimal performance* Find the apps and services that can make your life easierThe iPhone you hold in your hand represents the pinnacle of mobile technology and is a masterpiece of industrial design. Once you get to know it, you'll never be without it. Teach Yourself VISUALLY iPhone is your personal map for exploring your new tech companion.GUY HART-DAVIS (Barnard Castle, UK) is the author of more than 100 computing books, including Teach Yourself VISUALLY iPhone 11, Teach Yourself VISUALLY MacBook, 3rd Edition, and Teach Yourself VISUALLY Android, 2nd Edition. He also writes about PCs, Windows, Linux, and VBA.CHAPTER 1 GETTING STARTED WITH YOUR IPHONEIdentify and Compare the iPhone Models 4Understanding iPhone 12 Controls 8Install and Set Up iTunes on Windows 10Set Up and Activate Your iPhone 12Set Up Your iPhone Using Finder or iTunes 16Choose Which Items to Sync from Your Computer 18Explore the Interface and Launch Apps 22Using Cover Sheet and Today View 24Using Control Center 26CHAPTER 2 PERSONALIZING YOUR IPHONEFind the Settings You Need 30Choose Which iCloud Items to Sync 32Configure the Find My Feature 34Choose Which Apps Can Give Notifications 36Choose Sounds and Haptics Settings 38Set Appearance, Brightness, and Auto-Brightness 40Change the Wallpaper 42Configure Night Shift and Display Zoom 44Choose Privacy and Location Settings 46Configure and Use Search 48Choose Locking and Control Center Settings 50Set Up and Use Do Not Disturb Mode 52Customize Today View 54Secure Your iPhone with Face ID and a Passcode 56Configure Exposure Notifications 58Configure Screen Time and Restrictions 60Set Up Family Sharing and Add Members 62Choose Date, Time, and International Settings 64CHAPTER 3 USING VOICE, ACCESSIBILITY, AND CONTINUITYGive Commands with Siri 68Dictate Text Using Siri 70Gather and Share Information with Siri 72Configure Siri to Work Your Way 74Set Up VoiceOver to Identify Items On-Screen 76Configure Other Accessibility Features 78Using Your iPhone with Your Mac 84Using Your iPhone with Your Apple Watch 86CHAPTER 4 SETTING UP COMMUNICATIONSSet Up Your Mail Accounts 90Control How Your E-Mail Appears 92Organize Your E-Mail Messages by Threads 94Set Your Default E-Mail Account 96Control How Your Contacts Appear 97Browse or Search for Contacts 98Create a New Contact 100Import Contacts from a SIM Card 102Choose Default Alert Options for Calendar Events 103Set Up and Use Wallet and Apple Pay 104Set Up and Use eSIMs 106CHAPTER 5 MAKING CALLS AND MESSAGINGMake Phone Calls and FaceTime Audio Calls 110Using a Wireless Headset or Car System 112Mute a Call or Put a Call on Hold 113Make a Conference Call 114Make Video Calls Using FaceTime 116Save Time with Call Favorites and Recents 118Send Text and Multimedia Messages 120Using Emoji and iMessage Features 122Manage Your Instant Messages 124Choose Settings for Messages 126Block and Unblock Senders 128Set Up and Use the Emergency SOS Feature 130CHAPTER 6 NETWORKING AND SOCIAL NETWORKINGUsing Airplane Mode 134Monitor Your Cellular Network Usage 135Control Cellular Data and Background Refresh 136Connect Your iPhone to a Different Carrier 138Turn Data Roaming On or Off 139Using Bluetooth Devices with Your iPhone 140Share Items via AirDrop 144Share Internet Access via Personal Hotspot 146Connect to Wi-Fi Networks and Hotspots 148Manage Your Wi-Fi Networks 150Set Up and Enjoy Social Networking 152CHAPTER 7 WORKING WITH APPSCustomize the Home Screen 156Organize Apps with Folders 158Place Widgets on the Home Screen 160Hide Home Screen Pages 162Work with the App Library 163Switch Quickly from One App to Another 164Find Apps on the App Store 166Update and Remove Apps 168Using App Clips 170Type, Cut, Copy, and Paste Text 172Format and Replace Text 174CHAPTER 8 BROWSING THE WEB AND E-MAILINGBrowse the Web with Safari 178Access Websites Quickly with Bookmarks 180Create Bookmarks 182Keep a Reading List of Web Pages 184Navigate Among Open Web Pages Using Tabs 186Using Zoom and Reader View 188Switch Between Mobile Sites and Desktop Sites 190Control Settings for a Website 191View Safari’s Privacy Report 192Using Private Browsing Mode 193Tighten Up Safari’s Security 194Manage Your App and Website Passwords 196Using the Sign In with Apple Feature 198Read E-Mail 200Reply To or Forward an E-Mail Message 202Organize Your Messages in Mailbox Folders 204Write and Send E-Mail Messages 206CHAPTER 9 KEEPING YOUR LIFE ORGANIZEDBrowse Existing Events in Your Calendars 210Create New Events in Your Calendars 212Work with Calendar Invitations 214Track Your Commitments with Reminders 216Keep Essential Documents at Hand with Wallet 220Find Your Location with Maps 222Find Directions with Maps 224Explore with 3D Flyover 226Using Maps’ Favorites and Contacts 228Take Notes 230Using Stocks, Weather, and Clock 232Using the Health App 234Manage Files with the Files App 236Understanding Shortcuts and Automation 240Create a Custom Shortcut 242Get Your Bearings with Compass 244Measure with the Measure App 245CHAPTER 10 ENJOYING MUSIC, VIDEOS, AND BOOKSNavigate the Music App and Set Preferences 248Play Music Using the Music App 250Play Videos Using the TV App 252Play Music and Videos Using AirPlay 254Create a Music Playlist and Add Songs 256Listen to Apple Music Radio 258Read Digital Books with the Books App 260CHAPTER 11 WORKING WITH PHOTOS AND VIDEOTake Photos with the Camera App 264Using Night Mode and the Flash 266Configure Camera Settings to Suit You 268Shoot with the Grid and Different Aspect Ratios 272Take Live Photos and Timed Photos 274Using Portrait Mode 276Apply Filters to Your Photos 278Edit Your Photos 280Capture Video 284Edit Video with the Trim Feature 286Browse Photos Using Years, Months, and Days 288Browse Photos Using Memories 290Browse Photos Using the Map 291Browse Photos Using Shared Albums 292Browse Photos Using Albums 294Share Photos Using iCloud Photos 296Share Your Shared Albums 298Share and Use Your Photos and Videos 300Play Slide Shows of Photos 302CHAPTER 12 ADVANCED FEATURES AND TROUBLESHOOTINGTake Screenshots or Screen Recordings 306Connect to a Network via VPN 308Connect Your iPhone to Exchange Server 310Update Your iPhone’s Software 312Extend Your iPhone’s Runtime on the Battery 314Back Up and Restore Using Your Computer 316Back Up and Restore Using iCloud 318Reset Your iPhone’s Settings 320Troubleshoot Wi-Fi Connections 322Locate Your iPhone with Find My iPhone 324Manage Your Apple ID 328Index 330

Regulärer Preis: 16,99 €
Produktbild für Einführung in SQL (3. Auflg.)

Einführung in SQL (3. Auflg.)

Daten erzeugen, bearbeiten und abfragen. Grundlagen und Schlüsseltechniken verstehen und mit vielen Beispielen vertiefen.SQL ist nach wie vor das Werkzeug der Wahl, um Daten in kürzester Zeit zu bearbeiten und das Beste aus ihnen herauszuholen. Alan Beaulieu vermittelt in »Einführung in SQL« die praxisrelevanten Grundlagen, um Datenbankanwendungen zu schreiben, administrative Aufgaben durchzuführen und Berichte zu erstellen.Jedes Kapitel präsentiert eine in sich geschlossene Lektion zu einem Schlüsselkonzept oder einer Schlüsseltechnik von SQL und nutzt hierfür zahlreiche Abbildungen und kommentierte Beispiele. Durch Übungen können Sie die erlernten Fähigkeiten nachhaltig vertiefen. Die Einführung wendet sich an alle, die im Unternehmen mit SQL arbeiten möchten, sie kann aber ebenso begleitend zu IT-Ausbildung und Studium eingesetzt werden.In der 3. Auflage (01/2021) finden Sie neue Kapitel zu analytischen Funktionen, zu Strategien für die Arbeit mit großen Datenbanken und zu SQL und großen Datenmengen.SQL-Kenntnisse sind ein Muss für die Interaktion mit Daten. Mit »Einführung in SQL« werden Sie schnell herausfinden, wie Sie die Möglichkeiten dieser Sprache in ihrem ganzen Umfang nutzen können.Eignen Sie sich zügig die SQL-Grundlagen und wichtige erweiterte Funktionen anVerwenden Sie SQL-Datenanweisungen zum Erzeugen, Bearbeiten und Abrufen von DatenErstellen Sie mit SQL-Schemaanweisungen Datenbankobjekte wie Tabellen, Indizes und ConstraintsLernen Sie, wie Datens.tze mit Abfragen interagieren; verstehen Sie die Bedeutung von UnterabfragenKonvertieren und bearbeiten Sie Daten mit den integrierten Funktionen von SQL und verwenden Sie in Datenanweisungen bedingte Logik

Regulärer Preis: 29,90 €
Produktbild für Practical Rust Web Projects

Practical Rust Web Projects

Go beyond the basics of Rust and build web and serverless cloud applications. The applications explained in this practical book include web sites, RESTful APIs, a real-time web chat application, and frontend application with WebAssembly. Each chapter is organized in the following format: what this kind of application looks like; requirements for the example program; an introduction to the Rust libraries used; step-by-step implementation of the example program, including common pitfalls and best practices; and a brief comparison of libraries and frameworks in the same domain.This book will open your eyes to the world of practical web applications of Rust. After reading the book, you will be able to apply your Rust knowledge to build your own web projects.WHAT YOU WILL LEARN* Build dynamic websites with databases* Build RESTful APIs* Write a WebSocket server that can power a real-time chat app in Rust* Discover the benefits of serverless computing using Amazon Web Service's Rust support* Compile Rust to WebAssembly for high-performance frontend applicationsWHO THIS BOOK IS FORA reader with basic Rust knowledge, wishing to learn more about how to apply Rust in a real-world scenario. A developer who is evaluating the possibility to build their next project in Rust.Shing Lyu is a software engineer who is passionate about open source software. He's been working on Rust professionally at Mozilla, on the Firefox (Gecko) and Servo browser engine project. Currently, he is working at DAZN, a sports streaming platform as a backend developer, with a focus on AWS and serverless technology. Shing has worked for many world famous brands like Mozilla, Booking, and Intel. And, he is also active in the open source community. Being one of the founders of the Taiwan Rust community, he loves to share his enthusiasm for Rust with people.Chapter 1, IntroductionThis chapter gives a short introduction to why Rust is a solid tool for building all kinds of application, and a brief overview of the format and organization of the book.● Introduction● Why Rust?● Who should read this book?● Chapters overviewChapter 2, Developing websitesThis chapter will cover how to use popular web frameworks to build static and dynamic websites. We'll also touch how to build RESTful API and common requirements in web backend programming: database, authentication and authorization● What are we going to build? (A web version of the cat breed dictionary, first a static site and then server-side rendering )● Serving a static website● Generate dynamic content with templates● Fetching data from databases● Authentication and authorization● SummaryChapter 3, REST APIs● What are we going to build? (A web version of the cat breed dictionary, with a single-page app + REST API)● Defining the API with Open API specification● Building a static frontend with AJAX calls● Building a RESTful API● Serialize/Deserialize JSON● SummaryChapter 4, Chatting in realtime with WebSocketThis chapter will discuss how to build a WebSocket server that can power a real-time chat application in Rust● What are we going to build? (A chat app for cats in people can send all kinds of cat noises)● What is WebSocket● Enabling two way communication● Implementing the chat application● SummaryChapter 5, Going serverlessThis chapter will demonstrate the benefit of serverless computing using AWS's experimental Rust support.● What is serverless?● What are we going to build? (Serverless version of Chapter 4)● Pros and cons of serverless● Setting up an AWS account● Building a lambda function with Rust● Exposing the API Gateway● Cleaning it up● SummaryChapter 6, High performance web frontend using WebAssemblyThis chapter will talk about how to compile Rust to WebAssembly and make it work together with JavaScript in the web frontend● What is WebAssembly? (We'll implement the bottleneck of Book 1 Chapter 4 in WebAssembly to speed it up)● What are we going to build?● How to compile Rust to WebAssembly?● Exposing Rust function to JavaScript● Passing native data type between Rust and JavaScript● Manipulating DOM from Rust● SummaryChapter 7, Advanced topicsThis chapter will discuss other more advanced use of Rust. Each section will introduce one application, existing projects for that kind of application and their status. But we'll not go into the detail as the previous chapters.● Web scraping/Web crawling● Browser engine - Servo● Conclusion

Regulärer Preis: 36,99 €
Produktbild für MySQL Concurrency

MySQL Concurrency

Know how locks work in MySQL and how they relate to transactions. This book explains the major role that locks play in database systems, showing how locks are essential in allowing high-concurrency workloads. You will learn about lock access levels and lock granularities from the user level as well as table locks to record and gap locks. Most importantly, the book covers troubleshooting techniques when locking becomes a pain point.Several of the lock types in MySQL have a duration of a transaction. For this reason, it is important to understand how transactions work. This book covers the basics of transactions as well as transaction isolation levels and how they affect locking. The book is meant to be your go-to resource for solving locking contention and similar problems in high-performance MySQL database applications.Detecting locking issues when they occur is the first key to resolving such issues. MySQL Concurrency provides techniques for detecting locking issues such as contention. The book shows how to analyze locks that are causing contention to see why those locks are in place. A collection of six comprehensive case studies combine locking and transactional theory with realistic lock conflicts. The case studies walk you through the symptoms to look for in order to identify which issue you are facing, the cause of the conflict, its analysis, solution, and how to prevent the issue in the future.WHAT YOU WILL LEARN* Understand which lock types exist in MySQL and how they are used* Choose the best transaction isolation level for a given transaction* Detect and analyze lock contention when it occurs* Reduce locking issues in your applications* Resolve deadlocks between transactions* Resolve InnoDB record-level locking issues* Resolve issues from metadata and schema locksWHO THIS BOOK IS FORDatabase administrators and SQL developers who are familiar with MySQL and want to gain a better understanding of locking and transactions as well as how to work with them. While some experience with MySQL is required, no prior knowledge of locks and transactions is needed.JESPER WISBORG KROGH has worked with MySQL databases since 2006 both as a SQL developer and a database administrator, and for more than eight years as part of the Oracle MySQL Support team. He currently works as a database reliability engineer for Okta. He has spoken at MySQL Connect and Oracle OpenWorld on several occasions. In addition to his books, Jesper regularly blogs on MySQL topics and has authored approximately 800 documents in the Oracle Knowledge Base. He has contributed to the sys schema and four Oracle Certified Professional (OCP) exams for MySQL 5.6–8. Jesper holds a PhD in computational chemistry, lives in Sydney, Australia, and enjoys spending time outdoors walking, traveling, and reading. His areas of expertise include MySQL Cluster, MySQL Enterprise Backup (MEB), performance tuning, and the performance and sys schemas. 1. Introduction2. Monitoring Locks and Mutexes3. Monitoring InnoDB Transactions4. Transactions in the Performance Schema5. Lock Access Levels6. High-Level Lock Types7. InnoDB Locks8. Working with Lock Conflicts9. Reducing Locking Issues10. Indexes and Foreign Keys11. Transactions12. Transaction Isolation Levels13. Case Study: Flush Locks14. Case Study: Metadata and Schema Locks15. Case Study: Record-Level Locks16. Case Study: Deadlocks17. Case Study: Foreign Keys18. Case Study: SemaphoresAppendix A. ReferencesAppendix B. MySQL Shell Module

Regulärer Preis: 66,99 €
Produktbild für High Performance SQL Server

High Performance SQL Server

Design and configure SQL Server instances and databases in support of high-throughput, mission-critical applications providing consistent response times in the face of variations in numbers of users and query volumes. In this new edition, with over 100 pages of additional content, every original chapter has been updated for SQL Server 2019, and the book also includes two new chapters covering SQL Server on Linux and Intelligent Query Processing.This book shows you how to configure SQL Server and design your databases to support a given instance and workload. You will learn advanced configuration options, in-memory technologies, storage and disk configuration, and more, all aimed toward enabling your desired application performance and throughput.Configuration doesn’t stop with implementation. Workloads change over time, and other impediments can arise to thwart desired performance. HIGH PERFORMANCE SQL SERVER covers monitoring and troubleshooting to aid you in detecting and fixing production performance problems and minimizing application outages. You will learn about a variety of tools, ranging from the traditional wait analysis methodology to the query store or indexing, and you will learn how improving performance is an iterative process.This book is an excellent complement to query performance tuning books and provides the other half of what you need to know by focusing on configuring the instances on which mission-critical queries are executed.WHAT YOU WILL LEARN* Understand SQL Server's database engine and how it processes queries* Configure instances in support of high-throughput applications* Provide consistent response times to varying user numbers and query volumes* Design databases for high-throughput applications with focus on performance* Record performance baselines and monitor SQL Server instances against them* Troubleshot and fix performance problemsWHO THIS BOOK IS FORSQL Server database administrators, developers, and data architects. The book is also of use to system administrators who are managing and are responsible for the physical servers on which SQL Server instances are run.BENJAMIN NEVAREZ is a database professional based in Los Angeles, California who specializes in SQL Server query tuning and optimization. He is the author of four books: SQL Server 2017 on Linux, High Performance SQL Server, SQL Server 2014 Query Tuning & Optimization, and Inside the SQL Server Query Optimizer, and he has co-authored other books, including SQL Server 2012 Internals. Benjamin has been a speaker at many SQL Server conferences and events around the world, including the PASS Summit, SQL Server Connections and SQLBits. His blog can be found at benjaminnevarez.com and he can be reached on twitter at @BenjaminNevarez and on Facebook.PART I. SQL SERVER INTERNALS1. How SQL Server Works2. SQL Server on LinuxPART II. DESIGN AND CONFIGURATION3. SQL Server Configuration4. tempdb Troubleshooting and ConfigurationPART III. MONITORING5. Analyzing Wait Statistics6. The Query StorePART IV. PERFORMANCE TUNING AND TROUBLESHOOTING7. SQL Server In-Memory Technologies8. Performance Troubleshooting9. Indexing10. Intelligent Query Processing11. SQL Server Storage

Regulärer Preis: 56,99 €
Produktbild für The Alignment Problem

The Alignment Problem

'Vital reading. This is the book on artificial intelligence we need right now.' Mike Krieger, cofounder of InstagramArtificial intelligence is rapidly dominating every aspect of our modern lives influencing the news we consume, whether we get a mortgage, and even which friends wish us happy birthday. But as algorithms make ever more decisions on our behalf, how do we ensure they do what we want? And fairly?This conundrum - dubbed 'The Alignment Problem' by experts - is the subject of this timely and important book. From the AI program which cheats at computer games to the sexist algorithm behind Google Translate, bestselling author Brian Christian explains how, as AI develops, we rapidly approach a collision between artificial intelligence and ethics. If we stand by, we face a future with unregulated algorithms that propagate our biases - and worse - violate our most sacred values. Urgent and fascinating, this is an accessible primer to the most important issue facing AI researchers today.Brian Christian is the author of the acclaimed bestsellersThe Most Human Human andAlgorithms to Live By, which have been translated into nineteen languages. A visiting scholar at the University of California, Berkeley, he lives in San Francisco.

Regulärer Preis: 11,49 €
Produktbild für Data Analytics in Bioinformatics

Data Analytics in Bioinformatics

Machine learning techniques are increasingly being used to address problems in computational biology and bioinformatics. Novel machine learning computational techniques to analyze high throughput data in the form of sequences, gene and protein expressions, pathways, and images are becoming vital for understanding diseases and future drug discovery. Machine learning techniques such as Markov models, support vector machines, neural networks, and graphical models have been successful in analyzing life science data because of their capabilities in handling randomness and uncertainty of data noise and in generalization. Machine Learning in Bioinformatics compiles recent approaches in machine learning methods and their applications in addressing contemporary problems in bioinformatics approximating classification and prediction of disease, feature selection, dimensionality reduction, gene selection and classification of microarray data and many more. RABINARAYAN SATPATHY graduated from the National Institute of Technology – Rourkela. He has received 2 PhDs, one in Computational Mathematics from Utkal University and other in Computer Science Engineering from Fakir Mohan University, as well as a DSc in Computational Fluid Dynamics. TANUPRIYA CHOUDHURY earned his PhD in 2016. He has filed 14 patents and received 16 copyrights from MHRD for his own software. He has authored more than 85 research papers. He is also Technical Adviser of Deetya Soft Pvt. Ltd. Noida, IVRGURU Mydigital360, etc. SUNEETA SATPATHY, received her PhD from Utkal University, Bhubaneswar, Odisha, in 2015 with Directorate of Forensic Sciences, Her research interests include computer forensics, cyber security, data fusion, data mining, big data analysis, and decision mining. She has edited several books. SACHI NANDAN MOHANTY, received his PhD from IIT Kharagpur in 2015. His research areas include data mining, big data analysis, cognitive science, fuzzy decision making, brain-computer interface, and computational intelligence. He has authored 3 books as well as edited four, of which several are with the Wiley-Scrivener imprint. XIAOBO ZHANG received his Master of Computer Science, Doctor of Engineering (Control Theory and Control Engineering) and works in the Department of Automation, Guangdong University of Technology, China. He has published more than 30 papers in academic journals as well as edited three books. He has applied for more than 40 invention patents and obtained 6 software copyrights.

Regulärer Preis: 197,99 €
Produktbild für Patterns in the Machine

Patterns in the Machine

Discover how to apply software engineering patterns to develop more robust firmware faster than traditional embedded development approaches. In the authors’ experience, traditional embedded software projects tend towards monolithic applications that are optimized for their target hardware platforms. This leads to software that is fragile in terms of extensibility and difficult to test without fully integrated software and hardware. Patterns in the Machine focuses on creating loosely coupled implementations that embrace both change and testability.This book illustrates how implementing continuous integration, automated unit testing, platform-independent code, and other best practices that are not typically implemented in the embedded systems world is not just feasible but also practical for today’s embedded projects.After reading this book, you will have a better idea of how to structure your embedded software projects. You will recognize that while writing unit tests, creating simulators, and implementing continuous integration requires time and effort up front, you will be amply rewarded at the end of the project in terms of quality, adaptability, and maintainability of your code.WHAT YOU WILL LEARN* Incorporate automated unit testing into an embedded project* Design and build functional simulators for an embedded project* Write production-quality software when hardware is not available* Use the Data Model architectural pattern to create a highly decoupled design and implementation* Understand the importance of defining the software architecture before implementation starts and how to do it* Discover why documentation is essential for an embedded project* Use finite state machines in embedded projectsWHO THIS BOOK IS FORMid-level or higher embedded systems (firmware) developers, technical leads, software architects, and development managers.John Taylor has been an embedded developer for over 29 years. He has worked as a firmware engineer, technical lead, system engineer, software architect, and software development manager for companies such as Ingersoll Rand, Carrier, Allen-Bradley, Hitachi Telecom, Emerson, and several start-up companies. He has developed firmware for products that include HVAC control systems, telecom SONET nodes, IoT devices, micro code for communication chips, and medical devices. He is the co-author of five US patents and holds a bachelor’s degree in mathematics and computer science.Wayne Taylor has been a technical writer for 25 years. He has worked with companies such as IBM, Novell, Compaq, HP, EMC, SanDisk, and Western Digital. He has documented compilers, LAN driver development, storage system deployment and maintenance, and dozens of low-level and system-management APIs. He also has ten years of experience as a software development manager. He is the co-author of two US patents and holds master’s degrees in English and human factors. He is a co-author of OS/2 and NetWare Programming (Van Nostrand Reinhold, 1995).1: Introduction2: Core Concepts3: Design Theory For Embedded Programming4: Persistent Storage Example5: Software Architecture6: Automated Unit Testing7: Functional Simulator8: Continuous Integration9: Data Model10: Finite State Machines11: Documentation12: File Organization and Naming13: More About Late Bindings14: Main and Initialization15: More Best Practices16: Example Code17: Rules For DevelopmentAppendix A: TerminologyAppendix B: UML Cheat SheetAppendix C: Notation for State MachinesAppendix D: Coding ConventionsAppendix E: Why C++

Regulärer Preis: 46,99 €
Produktbild für Delivering Applications with VMware App Volumes 4

Delivering Applications with VMware App Volumes 4

Acquire the skills to build an App Volumes environment for a proof of concept, a pilot, or a live production environment. Delivering Applications with VMware App Volumes 4 starts with an in-depth overview of where the solution fits within the market and its key features, introducing you to application layering and VMware App Volumes. Next, it explains how to install the software and use its management consoles to configure App Volumes. You will understand how to build and configure application layers for delivery and will learn to build and configure writeable volumes for user data and user-installed applications.In the advanced management section, you will learn to customize package templates and integrate App Volumes with JMP. Along the way you will understand how to deliver published apps in MS RemoteApp using layered apps for scalability. In the next phase of the book you will install and configure App Volumes for different use cases: VMware Horizon View, VMware ThinApp, Microsoft RDSH, and Citrix Virtual Apps and Desktops.Throughout the chapters, you will be given hints and tips, along with best practices, all seen from the eyes of somebody who works with this technology day in, day out, and in many different types of environments and scenarios.WHAT YOU WILL LEARN* Understand the App Volumes architecture * Master the concept of application layering* Work with App Volumes, application packages, and Writable Volumes WHO THIS BOOK IS FORVMware professionals, system integrators, IT professionals, and consultants.PETER VON OVEN is an experienced technical consultant working closely with customers and partners designing technology solutions, to meet business needs. During his career, Peter has presented at key IT events such as VMworld, IP EXPO, and various VMUGs and CCUG events. He has also worked in senior presales roles and presales management roles for Fujitsu, HP, Citrix, and VMware, and has been awarded VMware vExpert for the last six years in a row. In 2016, Peter founded his own company, Droplet Computing, where he works today as the founder and chief executive officer, helping redefine the way applications are delivered today. He is also an avid author, having now written 13 books and made videos about VMware end-user computing solutions. In his spare time, Peter volunteers as a STEM Ambassador, helping the next generation develop the skills and confidence in building careers in technology.VMware App VolumesChapter 1 INTRODUCING APPLICATION LAYERING AND VMWARE APP VOLUMESCHAPTER GOAL: Introduction to app layering, VMware App Volumes and it’s features and architecture1. Overview of app layering2. Introduction to App Volumes3. App Volumes architecture4. App Volumes featuresNO OF PAGES 20Chapter 2: INSTALLING THE VMWARE APP VOLUMES SOFTWARECHAPTER GOAL: Installing the software and components1. Prerequisites and requirements for installing App Volumes2. Installing the App Volumes Manager3. Installing the App Volumes AgentNO OF PAGES 30Chapter 3: APP VOLUMES MANAGEMENT CONSOLECHAPTER GOAL: Using the management consoles to configure App Volumes1. Initial login and configuration2. Navigating the menu optionsNO OF PAGES 20Chapter 4: CREATING AND PACKAGING APPLICATIONSCHAPTER GOAL: How to build and configure application layers for delivery1. Definition of an App Volumes package2. Creating a provisioning machine – OS optimization tool template3. Creating a package4. Assigning packages5. Package lifecycle managementNO OF PAGES 50Chapter 5: WORKING WITH WRITEABLE VOLUMESCHAPTER GOAL: How to build and configure Writeable volumes for user data and user installed applications1. What is a Writeable Volume?2. Creating a Writeable Volume3. Assigning Writeable Volume to end users and desktops4. Managing Writeable VolumesNO OF PAGES 35Chapter 6: ADVANCED MANAGEMENTCHAPTER GOAL: Configuring the advanced management features of App Volumes1. How to customize package templates2. Advanced agent configurationNO OF PAGES 50Chapter 7: INTEGRATING APP VOLUMES WITH JMPCHAPTER GOAL: Configuring App Volumes to deliver apps with the VMware just in time management platform1. JMP architecture overview2. Configuring App Volumes in the JMP management console3. App Volumes JMP assignmentsNO OF PAGES 20Chapter 8: APP VOLUMES AND MICROSOFT REMOTEAPPCHAPTER GOAL: How to deliver published apps in MS RemoteApp using layered apps for scalability1. Building an application package for RemoteApp2. Configuring the RDSH role3. Creating and configuring RDSH-based packages4. Delivering packages to end usersNO OF PAGES 30Chapter 9: APP VOLUMES INTEGRATION WITH CITRIX VIRTUAL APPSCHAPTER GOAL: How to deliver published apps with Citrix Virtual Apps1. Building an application package for Citrix Virtual Apps2. Configuring the RDSH role for Citrix Virtual Apps3. Configuring RDSH-based packages for Citrix Virtual Apps4. Installing the Citrix Virtual Desktop Agent (VDA)5. Installing the App Volumes Agent6. Creating a Machine Group and Delivery Group7. Testing your applicationsNO OF PAGES 30Chapter 10: APP VOLUMES INTEGRATION WITH VMWARE HORIZON APPSCHAPTER GOAL: How to deliver layered apps with VMware Horizon Apps published apps1. Building an application package for Horizon Apps2. Configuring the RDSH role for Horizon Apps3. Configuring RDSH-based packages for Horizon Apps4. Installing the App Volumes Agent5. Installing the Horizon Agent6. Configuring a Horizon App farm7. Configuring a Horizon App pool8. Assigning packages to the Horizon Apps server9. Testing your applicationsNO OF PAGES 30Chapter 11: APP VOLUMES AND VMWARE VIEW VIRTUAL DESKTOPSCHAPTER GOAL: How to deliver layered apps to virtual desktops delivered by VMware Horizon View1. Building an application package for Horizon View2. Installing the App Volumes Agent3. Installing the Horizon Agent4. Optimizing the image5. Configuring a Horizon desktop pool6. Assigning packages to Horizon View end users7. Testing your applicationsNO OF PAGES 30Chapter 12: APP VOLUMES AND CITRIX VIRTUAL DESKTOPSCHAPTER GOAL: How to deliver layered apps to virtual desktops delivered by Citrix Virtual Desktops1. Building an application package for Citrix Virtual Desktops2. Installing the Citrix Virtual Desktop Agent (VDA3. Optimizing the image4. Creating a Machine Group and Delivery Group5. Testing your applicationsNO OF PAGES 30Chapter 13: DELIVERING THINAPP VIRTUALIZED APPS WITH APP VOLUMESCHAPTER GOAL: How to deliver virtualized and isolated apps as app layers with VMware ThinApp1. Overview of ThinApp app virtualization2. Creating a ThinApp AppStack3. Advanced configuration optionsNO OF PAGES 30Chapter 14: UPGRADING TO APP VOLUMES 4CHAPTER GOAL: How to upgrade from a previous version to the latest version of App Volumes1. Upgrading the App Volumes management console2. Upgrading the App Volumes Agent3. Upgrading AppStacks to App Packages4. MigratingNO OF PAGES 20

Regulärer Preis: 62,99 €
Produktbild für Funktionalität und Standardunterstützung von IoT-Software-Plattformen

Funktionalität und Standardunterstützung von IoT-Software-Plattformen

Derzeit konkurrieren über 450 Anbieter von IoT-Software-Plattformen miteinander, die Komplexität und die unterschiedlichen Eigenschaften dieser Plattformen führen zu einem intransparenten Markt. Folglich stehen Unternehmen, die eine IoT-Anwendung unter Weiternutzung ihrer bestehenden IT-Infrastruktur umsetzen wollen, vor der Herausforderung, die für diesen unternehmensspezifischen Anwendungsfall am besten geeignete IoT-Plattform aus einer Vielzahl von Kandidaten auszuwählen. Vor diesem Hintergrund werden Unternehmen durch das vorliegende Buch in die Lage versetzt, die Funktionalität und Standardunterstützung der am Markt verfügbaren IoT-Plattformen schnell zu verstehen und untereinander zu vergleichen.Sebastian Lempert forscht im Bereich des IoT und hat im März 2020 seine Dissertation zu IoT-Software-Plattformen fertiggestellt.Prof. Dr. Alexander Pflaum erforscht die digitale Transformation von Unternehmen und Branchen, die Auswirkungen der Digitalisierung auf Unternehmen und unternehmensübergreifende Wertschöpfungssysteme sowie die Rolle digitaler Plattformen in Wertschöpfungssystemen. Einleitung und Motivation.- Verwandte Arbeiten.- Methodik.- Einheitliche Beschreibung der Funktionalität und Standardunterstützung von IoT-Software-Plattformen.- Vergleich und Bewertung der Funktionalität und der Standardunterstützung von IoT-Software-Plattformen.- Zusammenfassung und Ausblick.

Regulärer Preis: 4,99 €
Produktbild für SAP, The Agile Way

SAP, The Agile Way

Praxisbewährte Tipps für die erfolgreiche agile Arbeit mit weltweit verteilten SAP-Teams.Der weltweit tätige SAP-Berater und Agile Coach Klaus Wybranietz zerlegt in diesem Buch das hartnäckige Vorurteil: »Ja, Scrum ist toll, aber mit SAP funktioniert das nicht.« Er beweist nämlich seit Jahren das Gegenteil: Scrum und SAP können auf einen Nenner gebracht werden – und das sogar sehr erfolgreich. Denn in seinen Projekten für internationale Großkonzerne hat Klaus Wybranietz immer wieder die Erfahrung gemacht: Selbst über den Globus verteilte SAP-Teams können mit Scrum in der halben Zeit dreimal so effektiv sein.In diesem Buch erklärt der Autor die Entwicklungsstufen, über die er SAP-Teams aus dem klassischen Wasserfalldenken heraus und stattdessen hinein in die agile Performance führt. Das fängt beim Teambuilding trotz Superstars an, führt über den Aufbau von gezielten Kompetenzen und hilfreichen Regelwerken bis hin zum Schaffen echter Kundenwerte durch die Anwendung von Kanban-Metriken. Das alles funktioniert seit vielen Jahren auch mit weltweit verteilten SAP-Teams – »Ja, aber …« hat als Argument somit ausgedient.AUS DEM INHALT //- SAP und Scrum – das geht doch nicht?- Die Grundlagen von Scrum- Mit verteilten SAP-Teams remote arbeiten- Mit agilen SAP-Teams starten- Skalierung mit dem Agile Working Model 4 SAP- Praktiken für fortgeschrittene agile SAP-Teams

Regulärer Preis: 39,99 €
Produktbild für Pro Cryptography and Cryptanalysis with C++20

Pro Cryptography and Cryptanalysis with C++20

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice.The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how “bad” cryptography creeps in during implementation and what “good” cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability.WHAT YOU WILL LEARN* Understand where and why cryptography is used and how it gets misused * Discover what modern cryptography algorithms and methods are used for * Design and implement advanced cryptographic mechanisms * See how C++20 and its new features are impacting the future of implementing cryptographic algorithms* Practice the basics of public key cryptography, including ECDSA signatures and more* Find out how most of the algorithms can be brokenWHO THIS BOOK IS FORProfessional programmers, developers, and software engineers who are developing cryptography algorithms and security schemes/modules in C++. Prior C++ programming and IDE experience and some basic experience of cryptography concepts (symmetric and asymmetric) highly recommended.MARIUS IULIAN MIHAILESCU, PHD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.STEFANIA LOREDANA NITA, PHD is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.Part I: Foundations1: Introduction2: Cryptography Fundamentals3: Mathematical Background and Its Applicability4: Large Integer Arithmetic5: Floating Point Arithmetic6: New Features in C++207: Secure Coding Guidelines8: Cryptography Libraries in C/C++20Part II: Pro Cryptography9: Elliptic Curve Cryptography10: Lattice-based Cryptography11: earchable Encryption12: Homomorphic Encryption13: (Ring) Learning with Errors Cryptography14: Chaos-based Cryptography15: Big Data Cryptography16:Cloud Computing CryptographyPart III: Pro Cryptanalysis17: Getting Started with Cryptanalysis18: Cryptanalysis Attacks and Techniques19: Linear and Differential Cryptanalysis20: Integral Cryptanalysis21: Brute Force and Buffer Overflow Attacks22: Text Characterization23: Implementation and Practical Approach of Cryptanalysis Methods

Regulärer Preis: 52,99 €
Produktbild für Machine Vision Inspection Systems, Machine Learning-Based Approaches

Machine Vision Inspection Systems, Machine Learning-Based Approaches

Machine Vision Inspection Systems (MVIS) is a multidisciplinary research field that emphasizes image processing, machine vision and, pattern recognition for industrial applications. Inspection techniques are generally used in destructive and non-destructive evaluation industry. Now a day's the current research on machine inspection gained more popularity among various researchers, because the manual assessment of the inspection may fail and turn into false assessment due to a large number of examining while inspection process.This volume 2 covers machine learning-based approaches in MVIS applications and it can be employed to a wide diversity of problems particularly in Non-Destructive testing (NDT), presence/absence detection, defect/fault detection (weld, textile, tiles, wood, etc.), automated vision test & measurement, pattern matching, optical character recognition & verification (OCR/OCV), natural language processing, medical diagnosis, etc. This edited book is designed to address various aspects of recent methodologies, concepts, and research plan out to the readers for giving more depth insights for perusing research on machine vision using machine learning-based approaches.MUTHUKUMARAN MALARVEL obtained his PhD in digital image processing and he is currently working as an associate professor in the Department of Computer Science and Engineering at Chitkara University, Punjab, India. His research interests include digital image processing, machine vision systems, image statistical analysis & feature extraction, and machine learning algorithms. SOUMYA RANJAN NAYAK obtained his PhD in computer science and engineering from the Biju Patnaik University of Technology, India. He has more than a decade of teaching and research experience and currently is working as an assistant professor, Amity University, Noida, India. His research interests include image analysis on fractal geometry, color and texture analysis jointly and separately. PRASANT KUMAR PATTNAIK PhD (Computer Science), Fellow IETE, Senior Member IEEE is a Professor at the School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, India. He has more than a decade of teaching and research experience. His areas of interest include mobile computing, cloud computing, cyber security, intelligent systems and brain computer interface. SURYA NARAYAN Panda is a Professor and Director Research at Chitkara University, Punjab, India. His areas of interest include cybersecurity, networking, advanced computer networks, machine learning, and artificial intelligence. He has developed the prototype of Smart Portable Intensive Care Unit through which the doctor can provide immediate virtual medical assistance to emergency cases in the ambulance. He is currently involved in designing different healthcare devices for real-time issues using AI and ML. Preface xiii1 MACHINE LEARNING-BASED VIRUS TYPE CLASSIFICATION USING TRANSMISSION ELECTRON MICROSCOPY VIRUS IMAGES 1Kalyan Kumar Jena, Sourav Kumar Bhoi, Soumya Ranjan Nayak and Chittaranjan Mallick1.1 Introduction 21.2 Related Works 31.3 Methodology 41.4 Results and Discussion 61.5 Conclusion 16References 162 CAPSULE NETWORKS FOR CHARACTER RECOGNITION IN LOW RESOURCE LANGUAGES 23C. Abeysinghe, I. Perera and D.A. Meedeniya2.1 Introduction 242.2 Background Study 252.2.1 Convolutional Neural Networks 252.2.2 Related Studies on One-Shot Learning 262.2.3 Character Recognition as a One-Shot Task 262.3 System Design 282.3.1 One-Shot Learning Implementation 312.3.2 Optimization and Learning 312.3.3 Dataset 322.3.4 Training Process 322.4 Experiments and Results 332.4.1 N-Way Classification 342.4.2 Within Language Classification 372.4.3 MNIST Classification 392.4.4 Sinhala Language Classification 412.5 Discussion 412.5.1 Study Contributions 412.5.2 Challenges and Future Research Directions 422.5.3 Conclusion 43References 433 AN INNOVATIVE EXTENDED METHOD OF OPTICAL PATTERN RECOGNITION FOR MEDICAL IMAGES WITH FIRM ACCURACY—4F SYSTEM-BASED MEDICAL OPTICAL PATTERN RECOGNITION 47Dhivya Priya E.L., D. Jeyabharathi, K.S. Lavanya, S. Thenmozhi, R. Udaiyakumar and A. Sharmila3.1 Introduction 483.1.1 Fourier Optics 483.2 Optical Signal Processing 503.2.1 Diffraction of Light 503.2.2 Biconvex Lens 513.2.3 4f System 513.2.4 Literature Survey 523.3 Extended Medical Optical Pattern Recognition 553.3.1 Optical Fourier Transform 553.3.2 Fourier Transform Using a Lens 553.3.3 Fourier Transform in the Far Field 563.3.4 Correlator Signal Processing 563.3.5 Image Formation in 4f System 573.3.6 Extended Medical Optical Pattern Recognition 583.4 Initial 4f System 593.4.1 Extended 4f System 593.4.2 Setup of 45 Degree 593.4.3 Database Creation 593.4.4 Superimposition of Diffracted Pattern 603.4.5 Image Plane 603.5 Simulation Output 603.5.1 MATLAB 603.5.2 Sample Input Images 613.5.3 Output Simulation 613.6 Complications in Real Time Implementation 643.6.1 Database Creation 643.6.2 Accuracy 653.6.3 Optical Setup 653.7 Future Enhancements 65References 654 BRAIN TUMOR DIAGNOSTIC SYSTEM— A DEEP LEARNING APPLICATION 69Kalaiselvi, T. and Padmapriya, S.T.4.1 Introduction 694.1.1 Intelligent Systems 694.1.2 Applied Mathematics in Machine Learning 704.1.3 Machine Learning Basics 724.1.4 Machine Learning Algorithms 734.2 Deep Learning 754.2.1 Evolution of Deep Learning 754.2.2 Deep Networks 764.2.3 Convolutional Neural Networks 774.3 Brain Tumor Diagnostic System 804.3.1 Brain Tumor 804.3.2 Methodology 804.3.3 Materials and Metrics 844.3.4 Results and Discussions 854.4 Computer-Aided Diagnostic Tool 864.5 Conclusion and Future Enhancements 87References 885 MACHINE LEARNING FOR OPTICAL CHARACTER RECOGNITION SYSTEM 91Gurwinder Kaur and Tanya Garg5.1 Introduction 915.2 Character Recognition Methods 925.3 Phases of Recognition System 935.3.1 Image Acquisition 935.3.2 Defining ROI 945.3.3 Pre-Processing 945.3.4 Character Segmentation 945.3.5 Skew Detection and Correction 955.3.6 Binarization 955.3.7 Noise Removal 975.3.8 Thinning 975.3.9 Representation 975.3.10 Feature Extraction 985.3.11 Training and Recognition 985.4 Post-Processing 1015.5 Performance Evaluation 1035.5.1 Recognition Rate 1035.5.2 Rejection Rate 1035.5.3 Error Rate 1035.6 Applications of OCR Systems 1045.7 Conclusion and Future Scope 105References 1056 SURFACE DEFECT DETECTION USING SVM-BASED MACHINE VISION SYSTEM WITH OPTIMIZED FEATURE 109Ashok Kumar Patel, Venkata Naresh Mandhala, Dinesh Kumar Anguraj and Soumya Ranjan Nayak6.1 Introduction 1106.2 Methodology 1136.2.1 Data Collection 1136.2.2 Data Pre-Processing 1136.2.3 Feature Extraction 1156.2.4 Feature Optimization 1166.2.5 Model Development 1196.2.6 Performance Evaluation 1206.3 Conclusion 123References 1247 COMPUTATIONAL LINGUISTICS-BASED TAMIL CHARACTER RECOGNITION SYSTEM FOR TEXT TO SPEECH CONVERSION 129Suriya, S., Balaji, M., Gowtham, T.M. and Rahul, Kumar S.7.1 Introduction 1307.2 Literature Survey 1307.3 Proposed Approach 1347.4 Design and Analysis 1347.5 Experimental Setup and Implementation 1367.6 Conclusion 151References 1518 A COMPARATIVE STUDY OF DIFFERENT CLASSIFIERS TO PROPOSE A GONN FOR BREAST CANCER DETECTION 155Ankita Tiwari, Bhawana Sahu, Jagalingam Pushaparaj and Muthukumaran Malarvel8.1 Introduction 1568.2 Methodology 1578.2.1 Dataset 1578.2.2 Linear Regression 1598.2.2.1 Correlation 1608.2.2.2 Covariance 1608.2.3 Classification Algorithm 1618.2.3.1 Support Vector Machine 1618.2.3.2 Random Forest Classifier 1628.2.3.3 K-Nearest Neighbor Classifier 1638.2.3.4 Decision Tree Classifier 1638.2.3.5 Multi-Layered Perceptron 1648.3 Results and Discussion 1658.4 Conclusion 169References 1699 MEXICAN SIGN-LANGUAGE STATIC-ALPHABET RECOGNITION USING 3D AFFINE INVARIANTS 171Guadalupe Carmona-Arroyo, Homero V. Rios-Figueroa and Martha Lorena Avendaño-Garrido9.1 Introduction 1719.2 Pattern Recognition 1759.2.1 3D Affine Invariants 1759.3 Experiments 1779.3.1 Participants 1799.3.2 Data Acquisition 1799.3.3 Data Augmentation 1799.3.4 Feature Extraction 1819.3.5 Classification 1819.4 Results 1829.4.1 Experiment 1 1829.4.2 Experiment 2 1849.4.3 Experiment 3 1849.5 Discussion 1889.6 Conclusion 189Acknowledgments 190References 19010 PERFORMANCE OF STEPPED BAR PLATE-COATED NANOLAYER OF A BOX SOLAR COOKER CONTROL BASED ON ADAPTIVE TREE TRAVERSAL ENERGY AND OSELM 193S. Shanmugan, F.A. Essa, J. Nagaraj and Shilpa Itnal10.1 Introduction 19410.2 Experimental Materials and Methodology 19610.2.1 Furious SiO2/TiO2 Nanoparticle Analysis of SSBC Performance Methods 19610.2.2 Introduction for OSELM by Use of Solar Cooker 19810.2.3 Online Sequential Extreme Learning Machine (OSELM) Approach for Solar Cooker 19910.2.4 OSELM Neural Network Adaptive Controller on Novel Design 19910.2.5 Binary Search Tree Analysis of Solar Cooker 20010.2.6 Tree Traversal of the Solar Cooker 20510.2.7 Simulation Model of Solar Cooker Results 20610.2.8 Program 20710.3 Results and Discussion 21010.4 Conclusion 212References 21411 APPLICATIONS TO RADIOGRAPHY AND THERMOGRAPHY FOR INSPECTION 219Inderjeet Singh Sandhu, Chanchal Kaushik and Mansi Chitkara11.1 Imaging Technology and Recent Advances 22011.2 Radiography and its Role 22011.3 History and Discovery of X-Rays 22111.4 Interaction of X-Rays With Matter 22211.5 Radiographic Image Quality 22211.6 Applications of Radiography 22511.6.1 Computed Radiography (CR)/Digital Radiography (DR) 22511.6.2 Fluoroscopy 22711.6.3 DEXA 22811.6.4 Computed Tomography 22911.6.5 Industrial Radiography 23111.6.6 Thermography 23411.6.7 Veterinary Imaging 23511.6.8 Destructive Testing 23511.6.9 Night Vision 23511.6.10 Conclusion 236References 23612 PREDICTION AND CLASSIFICATION OF BREAST CANCER USING DISCRIMINATIVE LEARNING MODELS AND TECHNIQUES 241M. Pavithra, R. Rajmohan, T. Ananth Kumar and R. Ramya12.1 Breast Cancer Diagnosis 24212.2 Breast Cancer Feature Extraction 24312.3 Machine Learning in Breast Cancer Classification 24512.4 Image Techniques in Breast Cancer Detection 24612.5 Dip-Based Breast Cancer Classification 24812.6 RCNNs in Breast Cancer Prediction 25512.7 Conclusion and Future Work 260References 26113 COMPRESSED MEDICAL IMAGE RETRIEVAL USING DATA MINING AND OPTIMIZED RECURRENT NEURAL NETWORK TECHNIQUES 263Vamsidhar Enireddy, Karthikeyan C., Rajesh Kumar T. and Ashok Bekkanti13.1 Introduction 26413.2 Related Work 26513.2.1 Approaches in Content-Based Image Retrieval (CBIR) 26513.2.2 Medical Image Compression 26613.2.3 Image Retrieval for Compressed Medical Images 26713.2.4 Feature Selection in CBIR 26813.2.5 CBIR Using Neural Network 26813.2.6 Classification of CBIR 26913.3 Methodology 26913.3.1 Huffman Coding 27013.3.2 Haar Wavelet 27113.3.3 Sobel Edge Detector 27313.3.4 Gabor Filter 27313.3.5 Proposed Hybrid CS-PSO Algorithm 27613.4 Results and Discussion 27713.5 Conclusion and Future Enhancement 28213.5.1 Conclusion 28213.5.2 Future Work 283References 28314 A NOVEL DISCRETE FIREFLY ALGORITHM FOR CONSTRAINED MULTI-OBJECTIVE SOFTWARE RELIABILITY ASSESSMENT OF DIGITAL RELAY 287Madhusudana Rao Nalluri, K. Kannan and Diptendu Sinha Roy14.1 Introduction 28814.2 A Brief Review of the Digital Relay Software 29114.3 Formulating the Constrained Multi-Objective Optimization of Software Redundancy Allocation Problem (CMOO-SRAP) 29314.3.1 Mathematical Formulation 29414.4 The Novel Discrete Firefly Algorithm for Constrained Multi-Objective Software Reliability Assessment of Digital Relay 29714.4.1 Basic Firefly Algorithm 29814.4.2 The Modified Discrete Firefly Algorithm 29914.4.2.1 Generating Initial Population 29914.4.2.2 Improving Solutions 29914.4.2.3 Illustrative Example 30114.4.3 Similarity-Based Parent Selection (SBPS) 30314.4.4 Solution Encoding for the CMOO-SRAP for Digital Relay Software 30514.5 Simulation Study and Results 30514.5.1 Simulation Environment 30514.5.2 Simulation Parameters 30614.5.3 Configuration of Solution Vectors for the CMOOSRAP for Digital Relay 30614.5.4 Results and Discussion 30614.6 Conclusion 317References 317Index 323

Regulärer Preis: 197,99 €
Produktbild für Blockchain for Business

Blockchain for Business

The book focuses on the power of business blockchain. It gives an overview of blockchain in traditional business, marketing, accounting and business intelligence. The book provides a detailed working knowedge of blockchain, user cases of blockchain in business, cryptocurrency and Initial Coin Offering(ICO) along with the risks associated with them. The book also covers the detailed study of decentralization, mining, consensus, smart contracts, concepts and working of distributed ledgers and hyper ledgers as well as many other important concepts. It also details the security and privacy aspects of blockchain.The book is beneficial for readers who are preparing for their business careers, those who are working with small scale businesses and startups, and helpful for business executives, managers, entrepreneurs, bankers, government officials and legal professionals who are looking to blockchain for secure financial transactions. The book will also be beneficial for researchers and students who want to study the latest developments of blockchain.S.S. TYAGI is a Professor of Computer Engineering and Dean at Manav Rachna International Institute of Research & Studies, Faridabad, India. He obtained his PhD from Kururkshetra University in 2010 in Computer Technology. He has more than 28 years of teaching and research experience and has authored many research publications in high indexed journals. SHAVETA BHATIA is Professor of Faculty of Computer Applications, Manav Rachna International Institute of Research & Studies. She has more than 17 years of academic and research experience. She has authored many research papers and published over a span of her teaching career in various reputed journals and conferences. Preface xv1 INTRODUCTION TO BLOCKCHAIN 1Akshay Mudgal1.1 Introduction 11.1.1 Public Blockchain Architecture 51.1.2 Private Blockchain Architecture 51.1.3 Consortium Blockchain Architecture 51.2 The Privacy Challenges of Blockchain 61.3 De-Anonymization 81.3.1 Analysis of Network 91.3.2 Transaction Fingerprinting 91.3.3 DoS Attacks 91.3.4 Sybil Attacks 91.4 Transaction Pattern Exposure 101.4.1 Transaction Graph Analysis 101.4.2 AS-Level Deployment Analysis 101.5 Methodology: Identity Privacy Preservation 101.5.1 Mixing Services 101.5.2 Ring Signature 121.6 Decentralization Challenges Exist in Blockchain 141.7 Conclusion 151.8 Regulatory Challenges 161.9 Obstacles to Blockchain Regulation 161.10 The Current Regulatory Landscape 171.11 The Future of Blockchain Regulation 181.12 Business Model Challenges 191.12.1 Traditional Business Models 191.12.2 Manufacturer 191.12.3 Distributor 201.12.4 Retailer 201.12.5 Franchise 201.13 Utility Token Model 201.13.1 Right 211.13.2 Value Exchange 211.13.3 Toll 211.13.4 Function 211.13.5 Currency 221.13.6 Earning 221.14 Blockchain as a Service 221.15 Securities 231.16 Development Platforms 241.17 Scandals and Public Perceptions 251.17.1 Privacy Limitations 261.17.2 Lack of Regulations and Governance 261.17.3 Cost to Set Up 261.17.4 Huge Consumption of Energy 261.17.5 Public Perception 27References 272 THE SCOPE FOR BLOCKCHAIN ECOSYSTEM 29Manisha Suri2.1 Introduction 302.2 Blockchain as Game Changer for Environment 322.3 Blockchain in Business Ecosystem 382.3.1 Business Ecosystem 392.3.1.1 What Is Business Model? 392.3.1.2 Business Model—Traditional 392.3.2 Are Blockchain Business Models Really Needed? 412.3.2.1 Blockchain Business Model 412.3.2.2 Model 1: Utility Token Model 412.3.2.3 Model 2: BaaS 432.3.2.4 Model 3: Securities 442.3.2.5 Model 4: Development Platforms 452.3.2.6 Model 5: Blockchain-Based Software Products 462.3.2.7 Model 6: Blockchain Professional Services 462.3.2.8 Model 7: Business Model—P2P 472.4 Is Blockchain Business Ecosystem Profitable? 482.5 How Do You “Design” a Business Ecosystem? 492.6 Redesigning Future With Blockchain 532.6.1 Is Earth Prepared for Blockchain? 532.7 Challenges and Opportunities 57References 583 BUSINESS USE CASES OF BLOCKCHAIN TECHNOLOGY 59Vasudha Arora, Shweta Mongia, Sugandha Sharma and Shaveta Malik3.1 Introduction to Cryptocurrency 603.2 What is a Bitcoin? 603.2.1 Bitcoin Transactions and Their Processing 623.2.2 Double Spending Problem 653.2.3 Bitcoin Mining 673.3 Bitcoin ICO 693.3.1 ICO Token 693.3.2 How to Participate in ICO 703.3.3 Types of Tokens 713.4 Advantages and Disadvantages of ICO 723.5 Merchant Acceptance of Bitcoin 73References 754 ETHEREUM 77Shaveta Bhatia and S.S Tyagi4.1 Introduction 784.2 Basic Features of Ethereum 784.3 Difference between Bitcoin and Ethereum 794.4 EVM (Ethereum Virtual Machine) 824.5 Gas 854.5.1 Gas Price Chart 854.6 Applications Built on the Basis of Ethereum 864.7 ETH 874.7.1 Why Users Want to Buy ETH? 874.7.2 How to Buy ETH? 884.7.3 Alternate Way to Buy ETH 884.7.4 Conversion of ETH to US Dollar 894.8 Smart Contracts 904.8.1 Government 904.8.2 Management 914.8.3 Benefits of Smart Contracts 914.8.4 Problems With Smart Contracts 924.8.5 Solution to Overcome This Problem 924.8.6 Languages to Build Smart Contracts 924.9 DApp (Decentralized Application or Smart Contract) 934.9.1 DApp in Ethereum 934.9.2 Applications of DApps 934.10 Conclusion 95References 955 E-WALLET 97Ms. Vishawjyoti5.1 Overview of Wallet Technology 975.2 Types of Wallet 985.2.1 Paper 985.2.2 Physical Bitcoins 995.2.3 Mobile 995.2.4 Web 1005.2.5 Desktop 1005.2.6 Hardware 1005.2.7 Bank 1015.3 Security of Bitcoin Wallets 1015.4 Workings of Wallet Technology 1015.5 Create HD Wallet From Seed 1025.5.1 Initiation 1035.5.2 Steps for Creating an HD Wallet From a 24-Word Seed Phrase Through Particl-qt Tool 1045.5.3 Steps for Encrypting the HD Wallet 1065.5.4 Utilization 1085.5.5 Steps for Generating Address to Access Transactions on the HD Wallet 1085.6 Navigating HD Wallet 1095.7 Conclusion 110References 1106 BLOCKCHAIN AND GOVERNANCE: THEORY, APPLICATIONS AND CHALLENGES 113Bhavya Ahuja Grover, Bhawna Chaudhary, Nikhil Kumar Rajput and Om Dukiya6.1 Introduction 1146.2 Governance: Centralized vs Decentralized 1156.3 Blockchain’s Features Supportive of Decentralization 1176.4 Noteworthy Application Areas for Blockchain-Based Governance 1196.4.1 Public Service Governance 1196.4.2 Knowledge and Shared Governance 1216.4.3 Governance in Supply Chain 1236.4.4 Governance of Foreign Aid 1246.4.5 Environmental Governance 1256.4.6 Corporate Governance 1266.4.7 Economic Governance 1286.5 Scopes and Challenges 1286.6 Conclusion 136References 1377 BLOCKCHAIN-BASED IDENTITY MANAGEMENT 141Abhishek Bhattacharya7.1 Introduction 1417.2 Existing Identity Management Systems and Their Challenges 1427.3 Concept of Decentralized Identifiers 1447.4 The Workflow of Blockchain Identity Management Systems 1457.5 How Does it Contribute to Data Security? 1487.6 Trending Blockchain Identity Management Projects 1507.7 Why and How of Revocation 1527.8 Points to Ponder 1547.8.1 Comparison Between Traditional and Blockchain-Based Identity Management Systems 1567.9 Conclusion 157References 1588 BLOCKCHAIN & IOT: A PARADIGM SHIFT FOR SUPPLY CHAIN MANAGEMENT 159Abhishek Bhattacharya8.1 Introduction 1598.2 Supply Chain Management 1608.2.1 The Aspects of a Supply Chain 1618.2.2 Supply Chain Performance Dimensions 1628.2.3 Supply Chain Migration Towards Digitalization 1638.3 Blockchain and IoT 1648.3.1 What Makes Blockchain Suitable for SCM? 1668.3.1.1 Shared Ledger 1678.3.1.2 Permissions 1688.3.1.3 Consensus 1688.3.1.4 Smart Contracts 1698.3.2 The Role of Blockchain in Achieving the SCM Performance Dimensions 1708.3.3 The Role of IoT in the Implementation of Blockchain Technology 1718.4 Blockchain Technology and IoT Use Cases in Supply Chain Management 1728.5 Benefits and Challenges in Blockchain-Based Supply Chain Management 1738.6 Conclusion 176References 1769 BLOCKCHAIN-ENABLED SUPPLY CHAIN MANAGEMENT SYSTEM 179Sonal Pathak9.1 Introduction 1809.1.1 Supply Chain Management 1809.2 Blockchain Technology 1849.3 Blockchain Technology in Supply Chain Management 1869.4 Elements of Blockchain That Affects Supply Chain 1909.4.1 Bitcoin 1959.5 Challenges in Implementation of Blockchain-Enabled Supply Chain 1979.6 Conclusion 197References 19910 SECURITY CONCERNS OF BLOCKCHAIN 201Neha Jain and Kamiya Chugh10.1 Introduction: Security Concerns of Blockchain 20110.2 Cryptocurrencies Scenarios 20210.3 Privacy Challenges of Blockchain 20310.3.1 Protection Problems in Blockchain 20310.3.2 Privacy-Preserving Mechanisms Analysis 20710.3.3 Data Anonymization-Mixing 20710.4 Decentralization in Blockchain 20810.4.1 Role of Decentralization in Blockchain 20910.4.2 Analysis of PoS and DPoS 21010.4.3 Problems With Decentralization 21010.4.4 Decentralization Recovery Methods 21210.5 Legal and Regulatory Issues in Blockchain 21310.5.1 Legal Value of Blockchain and its Problems 21410.6 Smart Contracts 21810.7 Scandals of Blockchain 22010.7.1 Blockchain Technologies as Stumbling Blocks to Financial Legitimacy 22310.8 Is Blockchain the Rise of Trustless Trust? 22310.8.1 Why Do We Need a System of Trust? 22610.9 Blockchain Model Challenges 227References 22911 ACCEPTANCE AND ADOPTION OF BLOCKCHAIN TECHNOLOGY: AN EXAMINATION OF THE SECURITY & PRIVACY CHALLENGES 231Amandeep Dhaliwal and Sahil Malik11.1 Introduction 23111.1.1 Research Methodology 23311.1.2 Analysis 23311.2 Security Issues of Blockchain 23311.2.1 The Majority Attack (51% Attacks) 23311.2.2 The Fork Problems 23411.2.2.1 Hard Fork 23411.2.2.2 Soft Fork 23511.2.3 Scale of Blockchain 23511.2.4 Time Confirmation of Blockchain Data— Double-Spend Attack/Race Attack 23511.2.5 Current Regulations Problems 23611.2.6 Scalability and Storage Capacity 23611.2.7 DOS Attack/Sybil Attack/Eclipse Attack/Bugs 23711.2.8 Legal Issues 23711.2.9 Security of Wallets 23811.2.10 The Increased Computing Power 23811.3 Privacy Challenges of Bitcoin 23811.3.1 De-Anonymization 23911.3.1.1 Network Analysis 23911.3.1.2 Address Clustering 23911.3.1.3 Transaction Finger Printing 24011.3.2 Transaction Pattern Exposure 24011.3.2.1 Transaction Graph Analysis 24011.3.2.2 Autonomous System-Level Deployment Analysis 24111.4 Blockchain Application-Based Solutions 24111.4.1 Bitcoins 24111.4.2 IoT 24211.4.2.1 MyBit 24211.4.3 Aero Token 24211.4.4 The Chain of Things 24311.4.5 The Modum 24311.4.6 Twin of Things 24311.4.7 The Blockchain of Things 24411.4.8 Blockchain Solutions: Cloud Computing 24411.5 Conclusion and Future Work 245References 24512 DEFICIENCIES IN BLOCKCHAIN TECHNOLOGY AND POTENTIAL AUGMENTATION IN CYBER SECURITY 251Eshan Bajal, Madhulika Bhatia, Lata Nautiyal and Madhurima Hooda12.1 Introduction 25212.2 Security Issues in Blockchain Technology 25212.3 Privacy Challenges 25312.3.1 BGP Hijacking Attack 25512.3.2 BDoS (Blockchain Denial of Service) 25512.3.3 Forcing Other Miners to Stop Mining 25612.4 Decentralization Challenges 25612.5 Regulatory Challenges 26012.5.1 Principles to Follow While Regulating 26212.5.1.1 Flexible to Legal Innovation 26212.5.1.2 Experimentation Should be Encouraged 26312.5.1.3 Focus on the Immediate Implications 26412.5.1.4 Regulators Should Engage in a Transnational Conversation 26412.5.2 Regulatory Strategies 26512.5.2.1 Wait-and-See 26512.5.2.2 Imposing Narrowing and Broadening Guidance 26612.5.2.3 Sandboxing 26612.5.2.4 Issue a New Legislation 26712.5.2.5 Use Blockchain in Regulation 26812.6 Business Model Challenges 26912.7 Scandals and Public Perception 27112.8 Why Blockchain is Trustless 27712.8.1 Trust Mechanism 27812.8.2 Anonymity 27912.8.3 Use in Digital Wallets 27912.8.4 Forgery Resistance 27912.9 Use of Blockchain in Cybersecurity 28012.9.1 Blockchain Database 28112.9.2 DNS Security 28312.9.3 IoT Security 28312.9.4 DDoS Prevention 28612.9.5 CDN (Content Delivery Network) 28612.9.6 SMS Authentication 287References 28813 INTERNET OF THINGS AND BLOCKCHAIN 295Priyanka Sharma13.1 History of ‘Internet of Things’ 29613.2 IoT Devices 29813.3 Sensors and Actuators 30213.4 Cloud and Haze-Based Engineering 30713.5 Blockchain and IoT 31513.6 Edge Computing 32113.7 Contextual Analyses 32413.8 Fate of Blockchain and IoT 332References 33214 BLOCKCHAIN APPLICATIONS 337Boby Singh, Rohit Pahwa, Hari Om Tanwar and Nikita Gupta14.1 Introduction to Blockchain 33714.1.1 Uses of Blockchain in Administration 33914.2 Blockchain in Big Data Predictive Task Automation 34014.2.1 How Can Blockchain Help Big Data? 34114.2.2 Blockchain Use Cases in Big Data 34114.3 Digital Identity Verification 34214.3.1 Why Digital Identity Matters? 34314.3.2 Blockchain (Definition and its Features) 34314.3.3 Why do we Need Blockchain in Digital Identity? 34414.3.4 How Does a Blockchain Works? 34514.3.5 Why is a Blockchain Secure? 34514.3.6 What’s Blockchain Identification Management? 34614.3.7 Advantages 34714.4 Blockchain Government 34814.4.1 Decentralized Government Services 34914.4.2 Liquid Democracy and Random Sample Election 35014.5 Blockchain Science 35114.5.1 FoldingCoin 35114.5.2 GridCoin (GRC) 35214.5.3 Global Public Health 35314.5.4 Bitcoin Genomics 35414.6 Blockchain Health 35514.6.1 Health Coin 35514.6.2 EMR on Blockchain 35514.6.3 Bit Coin Health Notary 35614.7 Blockchain Learning 35714.7.1 Bitcoin MOOCs 35714.7.2 Smart Contract Literacy 35714.7.3 LearnCoin 359References 35915 ADVANCE CONCEPTS OF BLOCKCHAIN 361Raj Kumar15.1 Community Supercomputing 36115.2 Blockchain Genomics 36415.3 Blockchain Learning 36515.4 Community Coin 36615.4.1 Monetary and Non-Monetary Currencies 36715.4.2 Difference Between Monetary and Non-Monetary Assets 36915.4.3 Currency Multiplicity 36915.4.4 List of Some Prominent Alternate Coins is Given Below 37015.5 Demurrage Currencies 371Reading List 371Index 373

Regulärer Preis: 152,99 €