Computer und IT
Deep Learning with Swift for TensorFlow
ABOUT THIS BOOKDiscover more insight about deep learning algorithms with Swift for TensorFlow. The Swift language was designed by Apple for optimized performance and development whereas TensorFlow library was designed by Google for advanced machine learning research. Swift for TensorFlow is a combination of both with support for modern hardware accelerators and more. This book covers the deep learning concepts from fundamentals to advanced research. It also introduces the Swift language for beginners in programming. This book is well suited for newcomers and experts in programming and deep learning alike. After reading this book you should be able to program various state-of-the-art deep learning algorithms yourself.The book covers foundational concepts of machine learning. It also introduces the mathematics required to understand deep learning. Swift language is introduced such that it allows beginners and researchers to understand programming and easily transit to Swift for TensorFlow, respectively. You will understand the nuts and bolts of building and training neural networks, and build advanced algorithms.WHAT YOU’LL LEARN• Understand deep learning concepts• Program various deep learning algorithms• Run the algorithms in cloudWHO THIS BOOK IS FOR• Newcomers to programming and/or deep learning, and experienced developers.• Experienced deep learning practitioners and researchers who desire to work in user space instead of library space with a same programming language without compromising the speedRahul Bhalley is an independent machine intelligence researcher. He was the co-founder of a short-lived deep learning startup in 2018. He has published research papers in areas such as speech processing and generative modeling. He actively contributes to open source projects related to deep learning on GitHub. He has also worked with Apple's Swift and shares Google's vision of making it easy for others to understand deep learning with Swift.Chapter 1: Machine Learning BasicsChapter 2: Essential MathChapter 3: Differential ProgrammingChapter 4: TensorFlow BasicsChapter 5: Neural NetworksChapter 6: Computer Vision
TensorFlow 2.x in the Colaboratory Cloud
Use TensorFlow 2.x with Google's Colaboratory (Colab) product that offers a free cloud service for Python programmers. Colab is especially well suited as a platform for TensorFlow 2.x deep learning applications. You will learn Colab’s default install of the most current TensorFlow 2.x along with Colab’s easy access to on-demand GPU hardware acceleration in the cloud for fast execution of deep learning models. This book offers you the opportunity to grasp deep learning in an applied manner with the only requirement being an Internet connection. Everything else—Python, TensorFlow 2.x, GPU support, and Jupyter Notebooks—is provided and ready to go from Colab.The book begins with an introduction to TensorFlow 2.x and the Google Colab cloud service. You will learn how to provision a workspace on Google Colab and build a simple neural network application. From there you will progress into TensorFlow datasets and building input pipelines in support of modeling and testing. You will find coverage of deep learning classification and regression, with clear code examples showing how to perform each of those functions. Advanced topics covered in the book include convolutional neural networks and recurrent neural networks.This book contains all the applied math and programming you need to master the content. Examples range from simple to relatively complex when necessary to ensure acquisition of appropriate deep learning concepts and constructs. Examples are carefully explained, concise, accurate, and complete to perfectly complement deep learning skill development. Care is taken to walk you through the foundational principles of deep learning through clear examples written in Python that you can try out and experiment with using Google Colab from the comfort of your own home or office.WHAT YOU WILL LEARN* Be familiar with the basic concepts and constructs of applied deep learning* Create machine learning models with clean and reliable Python code* Work with datasets common to deep learning applications* Prepare data for TensorFlow consumption* Take advantage of Google Colab’s built-in support for deep learning* Execute deep learning experiments using a variety of neural network models* Be able to mount Google Colab directly to your Google Drive account* Visualize training versus test performance to see model fitWHO THIS BOOK IS FORReaders who want to learn the highly popular TensorFlow 2.x deep learning platform, those who wish to master deep learning fundamentals that are sometimes skipped over in the rush to be productive, and those looking to build competency with a modern cloud service tool such as Google ColabDR. DAVID PAPER is a full professor at Utah State University (USU) in the Management Information Systems department. He has over 30 years of higher education teaching experience. At USU, he has over 26 years teaching in the classroom and distance education over satellite. Dr. Paper has taught a variety of classes at the undergraduate, graduate, and doctorate levels, but he specializes in technology education. He has competency in several programming languages, but his focus is currently on deep learning (Python) and database programming (PyMongo). Dr. Paper has published three technical books for industry professionals, including Web Programming for Business: PHP Object-Oriented Programming with Oracle, Data Science Fundamentals for Python and MongoDB (Apress), and Hands-on Scikit-Learn for Machine Learning Applications: Data Science Fundamentals with Python (Apress). He has authored more than 100 academic publications. Besides growing up in family businesses, Dr. Paper has worked for Texas Instruments, DLS, Inc., and the Phoenix Small Business Administration. He has performed IS consulting work for IBM, AT&T, Octel, Utah Department of Transportation, and the Space Dynamics Laboratory. 1. Introduction to Deep Learning2. Build Your First Neural Network with Google Colab3. Working with TensorFlow Data4. Working with Other Data5. Classification6. Regression7. Convolutional Neural Networks8. Automated Text Generation9. Sentiment Analysis10. Time Series Forecasting with RNNs
Hands-on Question Answering Systems with BERT
Get hands-on knowledge of how BERT (Bidirectional Encoder Representations from Transformers) can be used to develop question answering (QA) systems by using natural language processing (NLP) and deep learning.The book begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural language understanding with tokenization, stemming, and lemmatization, and bag of words. Next, you’ll look at neural networks for NLP starting with its variants such as recurrent neural networks, encoders and decoders, bi-directional encoders and decoders, and transformer models. Along the way, you’ll cover word embedding and their types along with the basics of BERT.After this solid foundation, you’ll be ready to take a deep dive into BERT algorithms such as masked language models and next sentence prediction. You’ll see different BERT variations followed by a hands-on example of a question answering system.Hands-on Question Answering Systems with BERT is a good starting point for developers and data scientists who want to develop and design NLP systems using BERT. It provides step-by-step guidance for using BERT.WHAT YOU WILL LEARN* Examine the fundamentals of word embeddings* Apply neural networks and BERT for various NLP tasksDevelop a question-answering system from scratch* Train question-answering systems for your own dataWHO THIS BOOK IS FORAI and machine learning developers and natural language processing developers.Navin is the chief architect for HCL DryICE Autonomics. He is an innovator, thought leader, author, and consultant in the areas of AI, machine learning, cloud computing, big data analytics, and software product development. He is responsible for IP development and service delivery in the areas of AI and machine learning, automation, AIOPS, public cloud GCP, AWS, and Microsoft Azure. Navin has authored 15+ books in the areas of cloud computing , cognitive virtual agents, IBM Watson, GCP, containers, and microservices.Amit Agrawal is a senior data scientist and researcher delivering solutions in the fields of AI and machine learning. He is responsible for designing end-to-end solutions and architecture for enterprise products. He has also authored and reviewed books in the area of cognitive virtual assistants.Chapter 1: Introduction to Natural Language ProcessingChapter Goal: To introduce basics of natural language processing1.1 What is natural language processing1.2 What is natural language understanding1.3 Natural language processing tasks1.3.1 Tokenization1.3.2 Stemming and lemmatization1.3.3 Bag of words1.3.4 Word / Sentence vectorizationChapter 2: Introduction to Word EmbeddingsChapter Goal: To introduce the basics of word embeddings3.1 What is word embeddings3.2 Different methods of word embeddings3.2.1 Word2vec3.2.2 Glove3.2.3 Elmo3.2.4 Universal sentence encoders3.2.5 BERT3.3 Bidirectional Encoder Representations from Transformers (BERT)3.3.1 BERT – base3.3.2 BERT - largeChapter 3: BERT Algorithms ExplainedChapter Goal: Details on BERT model algorithms4.1 Masked language model4.2 Next sentence prediction (NSP)4.3 Text classification using BERT4.4 Various types of BERT based models4.4.1 ALBERT4.4.2 ROBERT4.4.3 DistilBERTChapter 4: BERT Model Applications - Question Answering SystemChapter Goal: Details on question answering system5.1 Introduction5.2 Types of QA systems5.3 QA system design using BERT5.4 DrQA system5.5 DeepPavlov QA systemChapter 5: BERT Model Applications - Other tasksChapter Goal: Details on NLP tasks performed by BERT.6.1 Introduction6.2 Other NLP Tasks:6.2.1 Sentiment analysis6.2.2. Named entity recognition6.2.3 Tag generation6.2.4 Classification6.2.5 Text summarization6.2.6 Language translationChapter 6: Future of BERT modelsChapter Goal: Provides an introduction to the new advances in the areas NLP using BERT7.1 BERT - Future capabilities
Intelligent Data Analytics for Terror Threat Prediction
Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis.This book provides innovative insights that will help obtain interventions to undertake emerging dynamic scenarios of criminal activities. Furthermore, it presents emerging issues, challenges and management strategies in public safety and crime control development across various domains. The book will play a vital role in improvising human life to a great extent. Researchers and practitioners working in the fields of data mining, machine learning and artificial intelligence will greatly benefit from this book, which will be a good addition to the state-of-the-art approaches collected for intelligent data analytics. It will also be very beneficial for those who are new to the field and need to quickly become acquainted with the best performing methods. With this book they will be able to compare different approaches and carry forward their research in the most important areas of this field, which has a direct impact on the betterment of human life by maintaining the security of our society. No other book is currently on the market which provides such a good collection of state-of-the-art methods for intelligent data analytics-based models for terror threat prediction, as intelligent data analytics is a newly emerging field and research in data mining and machine learning is still in the early stage of development.SUBHENDU KUMAR PANI received his PhD from Utkal University Odisha, India in 2013. He is a professor in the Department of Computer Science & Engineering, Orissa Engineering College (OEC), Bhubaneswar, India. He has published more than 50 articles in international journals, authored 5 books and edited 2 volumes. SANJAY KUMAR SINGH is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Varanasi. He has published more than 130 international publications, 4 edited books and 2 patents. LALIT GARG received his PhD from the University of Ulster, UK in Computing and Information Engineering. He is a senior lecturer in Computer Information Systems, University of Malta, Malta. RAM BILAS PACHORI received his PhD degree in Electrical Engineering from the Indian Institute of Technology (IIT) Kanpur, India in 2008. He is now a professor of Electrical Engineering, IIT Indore, India. He has more than 170 publications which include journal papers, conference papers, books, and book chapters. XIAOBO ZHANG obtained his Master of Computer Science, Doctor of Engineering (Control Theory and Control Engineering) and is now working in the Internet of Things Department of Automation, Guangdong University of Technology, China. He has published more than 30 journal articles, edited 3 books, and has applied for more than 40 invention patents and obtained 6 software copyrights. Preface xv1 RUMOR DETECTION AND TRACING ITS SOURCE TO PREVENT CYBER-CRIMES ON SOCIAL MEDIA 1Ravi Kishore Devarapalli and Anupam Biswas1.1 Introduction 21.2 Social Networks 41.2.1 Types of Social Networks 41.3 What is Cyber-Crime? 71.3.1 Definition 71.3.2 Types of Cyber-Crimes 71.3.2.1 Hacking 71.3.2.2 Cyber Bullying 71.3.2.3 Buying Illegal Things 81.3.2.4 Posting Videos of Criminal Activity 81.3.3 Cyber-Crimes on Social Networks 81.4 Rumor Detection 91.4.1 Models 91.4.1.1 Naïve Bayes Classifier 101.4.1.2 Support Vector Machine 131.4.2 Combating Misinformation on Instagram 141.5 Factors to Detect Rumor Source 151.5.1 Network Structure 151.5.1.1 Network Topology 161.5.1.2 Network Observation 161.5.2 Diffusion Models 181.5.2.1 SI Model 181.5.2.2 SIS Model 191.5.2.3 SIR Model 191.5.2.4 SIRS Model 201.5.3 Centrality Measures 211.5.3.1 Degree Centrality 211.5.3.2 Closeness Centrality 211.5.3.3 Betweenness Centrality 221.6 Source Detection in Network 221.6.1 Single Source Detection 231.6.1.1 Network Observation 231.6.1.2 Query-Based Approach 251.6.1.3 Anti-Rumor-Based Approach 261.6.2 Multiple Source Detection 261.7 Conclusion 27References 282 INTERNET OF THINGS (IOT) AND MACHINE TO MACHINE (M2M) COMMUNICATION TECHNIQUES FOR CYBER CRIME PREDICTION 31Jaiprakash Narain Dwivedi2.1 Introduction 322.2 Advancement of Internet 332.3 Internet of Things (IoT) and Machine to Machine (M2M) Communication 342.4 A Definition of Security Frameworks 382.5 M2M Devices and Smartphone Technology 392.6 Explicit Hazards to M2M Devices Declared by Smartphone Challenges 412.7 Security and Privacy Issues in IoT 432.7.1 Dynamicity and Heterogeneity 432.7.2 Security for Integrated Operational World with Digital World 442.7.3 Information Safety with Equipment Security 442.7.4 Data Source Information 442.7.5 Information Confidentiality 442.7.6 Trust Arrangement 442.8 Protection in Machine to Machine Communication 482.9 Use Cases for M2M Portability 522.10 Conclusion 53References 543 CRIME PREDICTIVE MODEL USING BIG DATA ANALYTICS 57Hemanta Kumar Bhuyan and Subhendu Kumar Pani3.1 Introduction 583.1.1 Geographic Information System (GIS) 593.2 Crime Data Mining 603.2.1 Different Methods for Crime Data Analysis 623.3 Visual Data Analysis 633.4 Technological Analysis 653.4.1 Hadoop and MapReduce 653.4.1.1 Hadoop Distributed File System (HDFS) 653.4.1.2 MapReduce 653.4.2 Hive 673.4.2.1 Analysis of Crime Data using Hive 673.4.2.2 Data Analytic Module With Hive 683.4.3 Sqoop 683.4.3.1 Pre-Processing and Sqoop 683.4.3.2 Data Migration Module With Sqoop 683.4.3.3 Partitioning 683.4.3.4 Bucketing 683.4.3.5 R-Tool Analyse Crime Data 693.4.3.6 Correlation Matrix 693.5 Big Data Framework 693.6 Architecture for Crime Technical Model 723.7 Challenges 733.8 Conclusions 74References 754 THE ROLE OF REMOTE SENSING AND GIS IN MILITARY STRATEGY TO PREVENT TERROR ATTACKS 79Sushobhan Majumdar4.1 Introduction 804.2 Database and Methods 814.3 Discussion and Analysis 824.4 Role of Remote Sensing and GIS 834.5 Cartographic Model 834.5.1 Spatial Data Management 854.5.2 Battlefield Management 854.5.3 Terrain Analysis 864.6 Mapping Techniques Used for Defense Purposes 874.7 Naval Operations 884.7.1 Air Operations 894.7.2 GIS Potential in Military 894.8 Future Sphere of GIS in Military Science 894.8.1 Defense Site Management 904.8.2 Spatial Data Management 904.8.3 Intelligence Capability Approach 904.8.4 Data Converts Into Information 904.8.5 Defense Estate Management 914.9 Terrain Evolution 914.9.1 Problems Regarding the Uses of Remote Sensing and GIS 914.9.2 Recommendations 924.10 Conclusion 92References 935 TEXT MINING FOR SECURE CYBER SPACE 95Supriya Raheja and Geetika Munjal5.1 Introduction 955.2 Literature Review 975.2.1 Text Mining With Latent Semantic Analysis 1005.3 Latent Semantic Analysis 1015.4 Proposed Work 1025.5 Detailed Work Flow of Proposed Approach 1045.5.1 Defining the Stop Words 1065.5.2 Stemming 1075.5.3 Proposed Algorithm: A Hybrid Approach 1095.6 Results and Discussion 1115.6.1 Analysis Using Hybrid Approach 1115.7 Conclusion 115References 1156 ANALYSES ON ARTIFICIAL INTELLIGENCE FRAMEWORK TO DETECT CRIME PATTERN 119R. Arshath Raja, N. Yuvaraj and N.V. Kousik6.1 Introduction 1206.2 Related Works 1216.3 Proposed Clustering for Detecting Crimes 1226.3.1 Data Pre-Processing 1236.3.2 Object-Oriented Model 1246.3.3 MCML Classification 1246.3.4 GAA 1246.3.5 Consensus Clustering 1246.4 Performance Evaluation 1246.4.1 Precision 1256.4.2 Sensitivity 1256.4.3 Specificity 1316.4.4 Accuracy 1316.5 Conclusions 131References 1327 A BIOMETRIC TECHNOLOGY-BASED FRAMEWORK FOR TACKLING AND PREVENTING CRIMES 133Ebrahim A.M. Alrahawe, Vikas T. Humbe and G.N. Shinde7.1 Introduction 1347.2 Biometrics 1357.2.1 Biometric Systems Technologies 1377.2.2 Biometric Recognition Framework 1417.2.3 Biometric Applications/Usages 1427.3 Surveillance Systems (CCTV) 1447.3.1 CCTV Goals 1467.3.2 CCTV Processes 1467.3.3 Fusion of Data From Multiple Cameras 1497.3.4 Expanding the Use of CCTV 1497.3.5 CCTV Effectiveness 1507.3.6 CCTV Limitations 1507.3.7 Privacy and CCTV 1507.4 Legality to Surveillance and Biometrics vs. Privacy and Human Rights 1517.5 Proposed Work (Biometric-Based CCTV System) 1537.5.1 Biometric Surveillance System 1547.5.1.1 System Component and Flow Diagram 1547.5.2 Framework 1567.6 Conclusion 158References 1598 RULE-BASED APPROACH FOR BOTNET BEHAVIOR ANALYSIS 161Supriya Raheja, Geetika Munjal, Jyoti Jangra and Rakesh Garg8.1 Introduction 1618.2 State-of-the-Art 1638.3 Bots and Botnets 1668.3.1 Botnet Life Cycle 1668.3.2 Botnet Detection Techniques 1678.3.3 Communication Architecture 1688.4 Methodology 1718.5 Results and Analysis 1758.6 Conclusion and Future Scope 177References 1779 SECURING BIOMETRIC FRAMEWORK WITH CRYPTANALYSIS 181Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma and Martin Sagayam9.1 Introduction 1829.2 Basics of Biometric Systems 1849.2.1 Face 1859.2.2 Hand Geometry 1869.2.3 Fingerprint 1879.2.4 Voice Detection 1879.2.5 Iris 1889.2.6 Signature 1899.2.7 Keystrokes 1899.3 Biometric Variance 1929.3.1 Inconsistent Presentation 1929.3.2 Unreproducible Presentation 1929.3.3 Fault Signal/Representational Accession 1939.4 Performance of Biometric System 1939.5 Justification of Biometric System 1959.5.1 Authentication (“Is this individual really the authenticate user or not?”) 1959.5.2 Recognition (“Is this individual in the database?”) 1969.5.3 Concealing (“Is this a needed person?”) 1969.6 Assaults on a Biometric System 1969.6.1 Zero Effort Attacks 1979.6.2 Adversary Attacks 1989.6.2.1 Circumvention 1989.6.2.2 Coercion 1989.6.2.3 Repudiation 1989.6.2.4 DoB (Denial of Benefit) 1999.6.2.5 Collusion 1999.7 Biometric Cryptanalysis: The Fuzzy Vault Scheme 1999.8 Conclusion & Future Work 203References 20510 THE ROLE OF BIG DATA ANALYSIS IN INCREASING THE CRIME PREDICTION AND PREVENTION RATES 209Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal and G.N. Shinde10.1 Introduction: An Overview of Big Data and Cyber Crime 21010.2 Techniques for the Analysis of BigData 21110.3 Important Big Data Security Techniques 21610.4 Conclusion 219References 21911 CRIME PATTERN DETECTION USING DATA MINING 221Dipalika Das and Maya Nayak11.1 Introduction 22111.2 Related Work 22211.3 Methods and Procedures 22411.4 System Analysis 22711.5 Analysis Model and Architectural Design 23011.6 Several Criminal Analysis Methods in Use 23311.7 Conclusion and Future Work 235References 23512 ATTACKS AND SECURITY MEASURES IN WIRELESS SENSOR NETWORK 237Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan and Aditya Khamparia12.1 Introduction 23812.2 Layered Architecture of WSN 23912.2.1 Physical Layer 23912.2.2 Data Link Layer 23912.2.3 Network Layer 24012.2.4 Transport Layer 24012.2.5 Application Layer 24112.3 Security Threats on Different Layers in WSN 24112.3.1 Threats on Physical Layer 24112.3.1.1 Eavesdropping Attack 24112.3.1.2 Jamming Attack 24212.3.1.3 Imperil or Compromised Node Attack 24212.3.1.4 Replication Node Attack 24212.3.2 Threats on Data Link Layer 24212.3.2.1 Collision Attack 24312.3.2.2 Denial of Service (DoS) Attack 24312.3.2.3 Intelligent Jamming Attack 24312.3.3 Threats on Network Layer 24312.3.3.1 Sybil Attack 24312.3.3.2 Gray Hole Attack 24312.3.3.3 Sink Hole Attack 24412.3.3.4 Hello Flooding Attack 24412.3.3.5 Spoofing Attack 24412.3.3.6 Replay Attack 24412.3.3.7 Black Hole Attack 24412.3.3.8 Worm Hole Attack 24512.3.4 Threats on Transport Layer 24512.3.4.1 De-Synchronization Attack 24512.3.4.2 Flooding Attack 24512.3.5 Threats on Application Layer 24512.3.5.1 Malicious Code Attack 24512.3.5.2 Attack on Reliability 24612.3.6 Threats on Multiple Layer 24612.3.6.1 Man-in-the-Middle Attack 24612.3.6.2 Jamming Attack 24612.3.6.3 Dos Attack 24612.4 Threats Detection at Various Layers in WSN 24612.4.1 Threat Detection on Physical Layer 24712.4.1.1 Compromised Node Attack 24712.4.1.2 Replication Node Attack 24712.4.2 Threat Detection on Data Link Layer 24712.4.2.1 Denial of Service Attack 24712.4.3 Threat Detection on Network Layer 24812.4.3.1 Black Hole Attack 24812.4.3.2 Worm Hole Attack 24812.4.3.3 Hello Flooding Attack 24912.4.3.4 Sybil Attack 24912.4.3.5 Gray Hole Attack 25012.4.3.6 Sink Hole Attack 25012.4.4 Threat Detection on the Transport Layer 25112.4.4.1 Flooding Attack 25112.4.5 Threat Detection on Multiple Layers 25112.4.5.1 Jamming Attack 25112.5 Various Parameters for Security Data Collection in WSN 25212.5.1 Parameters for Security of Information Collection 25212.5.1.1 Information Grade 25212.5.1.2 Efficacy and Proficiency 25312.5.1.3 Reliability Properties 25312.5.1.4 Information Fidelity 25312.5.1.5 Information Isolation 25412.5.2 Attack Detection Standards in WSN 25412.5.2.1 Precision 25412.5.2.2 Germane 25512.5.2.3 Extensibility 25512.5.2.4 Identifiability 25512.5.2.5 Fault Forbearance 25512.6 Different Security Schemes in WSN 25612.6.1 Clustering-Based Scheme 25612.6.2 Cryptography-Based Scheme 25612.6.3 Cross-Checking-Based Scheme 25612.6.4 Overhearing-Based Scheme 25712.6.5 Acknowledgement-Based Scheme 25712.6.6 Trust-Based Scheme 25712.6.7 Sequence Number Threshold-Based Scheme 25812.6.8 Intrusion Detection System-Based Scheme 25812.6.9 Cross-Layer Collaboration-Based Scheme 25812.7 Conclusion 264References 26413 LARGE SENSING DATA FLOWS USING CRYPTIC TECHNIQUES 269Hemanta Kumar Bhuyan13.1 Introduction 27013.2 Data Flow Management 27113.2.1 Data Flow Processing 27113.2.2 Stream Security 27213.2.3 Data Privacy and Data Reliability 27213.2.3.1 Security Protocol 27213.3 Design of Big Data Stream 27313.3.1 Data Stream System Architecture 27313.3.1.1 Intrusion Detection Systems (IDS) 27413.3.2 Malicious Model 27513.3.3 Threat Approaches for Attack Models 27613.4 Utilization of Security Methods 27713.4.1 System Setup 27813.4.2 Re-Keying 27913.4.3 New Node Authentication 27913.4.4 Cryptic Techniques 28013.5 Analysis of Security on Attack 28013.6 Artificial Intelligence Techniques for Cyber Crimes 28113.6.1 Cyber Crime Activities 28213.6.2 Artificial Intelligence for Intrusion Detection 28213.6.3 Features of an IDPS 28413.7 Conclusions 284References 28514 CYBER-CRIME PREVENTION METHODOLOGY 291Chandra Sekhar Biswal and Subhendu Kumar Pani14.1 Introduction 29214.1.1 Evolution of Cyber Crime 29414.1.2 Cybercrime can be Broadly Defined as Two Types 29614.1.3 Potential Vulnerable Sectors of Cybercrime 29614.2 Credit Card Frauds and Skimming 29714.2.1 Matrimony Fraud 29714.2.2 Juice Jacking 29814.2.3 Technicality Behind Juice Jacking 29914.3 Hacking Over Public WiFi or the MITM Attacks 29914.3.1 Phishing 30014.3.2 Vishing/Smishing 30214.3.3 Session Hijacking 30314.3.4 Weak Session Token Generation/Predictable Session Token Generation 30414.3.5 IP Spoofing 30414.3.6 Cross-Site Scripting (XSS) Attack 30514.4 SQLi Injection 30614.5 Denial of Service Attack 30714.6 Dark Web and Deep Web Technologies 30914.6.1 The Deep Web 30914.6.2 The Dark Web 31014.7 Conclusion 311References 312Index 313
CompTIA Security+ Review Guide
LEARN THE INS AND OUTS OF THE IT SECURITY FIELD AND EFFICIENTLY PREPARE FOR THE COMPTIA SECURITY+ EXAM SY0-601 WITH ONE EASY-TO-FOLLOW RESOURCECompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible.Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms.Covering all five domains tested by Exam SY0-601, this guide reviews:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and ComplianceThis newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.JAMES MICHAEL STEWART holds variety of certifications, including: Security+, Network+, A+, CySA+, PenTest+, CASP+, CTT+, CEH, CHFI, ECSA, ECIH, CND, CEI, CISSP, CISM, and CFR. He has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. Michael has been teaching job skill and certification courses for over 25 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. He has taught hundreds of classes, accumulating over 16,000 hours of instruction. His most recent publications include the CISSP Study Guide, 9th Edition. Michael has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael graduated in 1992 from the University of Texas at Austin. Introduction xixCHAPTER 1 THREATS, ATTACKS, AND VULNERABILITIES 11.1 Compare and contrast different types of social engineering techniques 51.2 Given a scenario, analyze potential indicators to determine the type of attack 201.3 Given a scenario, analyze potential indicators associated with application attacks 371.4 Given a scenario, analyze potential indicators associated with network attacks 571.5 Explain different threat actors, vectors, and intelligence sources 801.6 Explain the security concerns associated with various types of vulnerabilities 911.7 Summarize the techniques used in security assessments 991.8 Explain the techniques used in penetration testing 109Review Questions 118CHAPTER 2 ARCHITECTURE AND DESIGN 1232.1 Explain the importance of security concepts in an enterprise environment 1282.2 Summarize virtualization and cloud computing concepts 1392.3 Summarize secure application development, deployment, and automation concepts 1522.4 Summarize authentication and authorization design concepts 1672.5 Given a scenario, implement cybersecurity resilience 1832.6 Explain the security implications of embedded and specialized systems 1962.7 Explain the importance of physical security controls 2082.8 Summarize the basics of cryptographic concepts 220Review Questions 240CHAPTER 3 IMPLEMENTATION 2453.1 Given a scenario, implement secure protocols 2483.2 Given a scenario, implement host or application security solutions 2623.3 Given a scenario, implement secure network designs 2803.4 Given a scenario, install and configure wireless security settings 3043.5 Given a scenario, implement secure mobile solutions 3153.6 Given a scenario, apply cybersecurity solutions to the cloud 3303.7 Given a scenario, implement identity and account management controls 3363.8 Given a scenario, implement authentication and authorization solutions 3443.9 Given a scenario, implement public key infrastructure 355Review Questions 370CHAPTER 4 OPERATIONS AND INCIDENT RESPONSE 3754.1 Given a scenario, use the appropriate tool to assess organizational security 3774.2 Summarize the importance of policies, processes, and procedures for incident response 3984.3 Given an incident, utilize appropriate data sources to support an investigation 4094.4 Given an incident, apply mitigation techniques or controls to secure an environment 4184.5 Explain the key aspects of digital forensics 422Review Questions 435CHAPTER 5 GOVERNANCE, RISK, AND COMPLIANCE 4415.1 Compare and contrast various types of controls 4435.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture 4465.3 Explain the importance of policies to organizational security 4565.4 Summarize risk management processes and concepts 4695.5 Explain privacy and sensitive data concepts in relation to security 486Review Questions 494APPENDIX ANSWERS TO REVIEW QUESTIONS 499Chapter 1: Threats, Attacks, and Vulnerabilities 500Chapter 2: Architecture and Design 505Chapter 3: Implementation 508Chapter 4: Operations and Incident Response 511Chapter 5: Governance, Risk, and Compliance 514Index 519
Laptops For Dummies
THE LATEST ON GETTING THE MOST FROM LAPTOPS AND TABLETSNot that long ago, laptops were seen as luxuries. Now they're practically an essential for many people, and—as faster computing power and super-sharp displays make many of them the equal of a desktop—the new wave of lightweight laptops is increasingly replacing the home PC with its bulky tower and multiple cords. Plus, you can use your laptop when chilling on the couch or venturing out for a quick coffee!In this fully updated edition of Laptops For Dummies, bestselling tech writer Dan Gookin takes a friendly walk through everything you need to know, from the basics (if you're new to laptops) all the way up to the latest hardware and tech updates—including the recent release of Windows 10. Along the way you'll learn how to synchronize your laptop with other machines, coordinate email pickup across devices, and beef up your security. You'll also learn how to* Choose the right laptop* Check out tablet options* Troubleshoot problems* Maintain and upgradeWhether you're choosing a new laptop or want to maximize what you're getting from the one you have, Laptops For Dummies has you covered, wherever you want to work—or play!DAN GOOKIN combined his love of writing with his gizmo fetish nearly 30 years ago, and has written more than 170 books explaining technology in a fun, non-threatening way. In 1991 he penned DOS For Dummies, launching the entire For Dummies franchise. Dan's books have 12 million copies in print and have been translated into more than 30 languages. INTRODUCTION 1About This Book 1And Just Who Are You? 2Icons Used in This Book 2Where to Go from Here 3PART 1: THIS LAPTOP THING 5CHAPTER 1: THE PORTABLE COMPUTING QUEST 7The History of Portable Computing 7The Xerox Dynabook 9The Osborne 1 9The loveable luggables 9The Model 100 10The lunch buckets 13Dawn of the PC laptop 13The search for light 15Modern Laptops 17The notebook 17The subnotebook 18The tablet PC 18CHAPTER 2: A LAPTOP OF YOUR OWN 21Do You Need a Laptop? 21Why you need a laptop 22Why you don’t need a laptop 23Laptop Shopping 23Things to ignore when buying a laptop 24Things to heed when buying a laptop 24Software for Your Laptop 25The operating system 25Other software 26Laptop Hardware Buying Decisions 26Important laptop hardware guts 26Communications options 28The green laptop 28Service, Support, and Warranty 29The Final Step: Buying Your Laptop 30PART 2: SAY HELLO TO YOUR LAPTOP 31CHAPTER 3: FROM LAPTOP BOX TO LAP 33Laptop Box 101 33Removing the laptop from the box 34“How long should I keep the box?” 36Submitting the warranty 36Set Up Your Laptop 36Finding a place for the laptop 37Charging the battery 38“Should I plug the laptop into a UPS?” 39Bye-Bye, Old Laptop 40Deciding when to retire an old laptop 40Disposing of the old laptop 40What to Do Next 41CHAPTER 4: TO TURN ON A LAPTOP 43Turn On Your Laptop 43Step 1: Open the lid 44Step 2: Adjust the lid for optimal viewing 45Step 3: Locate the power button 45Step 4: Punch the power button 46It’s Windows! 47Running Windows for the first time 48Activating Windows 49Signing in to Windows 49What’s Next? 51Migrating your files 51Reinstalling your programs 53Adding other accounts 54CHAPTER 5: TO TURN OFF A LAPTOP 55End Your Laptop Day 55Keeping the laptop on all the time 56Finding the shutdown options 56Shutting down your laptop 58Restarting Windows 59Putting Mr Laptop to sleep 60Hibernating the laptop 61Locking Windows 62Signing out of Windows 62Switching to another user 63Shutting down when the laptop doesn’t want to 63Shutdown Options and Configuration 63Setting the power button’s function 63Determining what happens when you shut the lid 65Activating hibernation 66CHAPTER 6: TRADITIONAL LAPTOP TOUR 67Around Your Laptop 67Locating removable storage slots 68Attaching the laptop to something sturdy 69Keeping the air circulating 69Discovering the webcam 69The Pluggable-Innable Holes 70Look at the Pretty Lights! 71This Isn’t Your Daddy’s Keyboard 73Exploring the keyboard layout 73Finding the secret numeric keypad 74Having fun with the Fn key 75This Isn’t Your Momma’s Mouse 76Using a touchpad 77Obtaining a real mouse 78CHAPTER 7: THE TABLET PC TOUR 81Tablet PC Types 82The Tablet PC Tour 83The Pen Is Mightier than the Mouse 85Introducing the digital pen 85Using the pen as a mouse 87Touchscreen Text Typing 88Summoning the touch keyboard 88Exploring the touch keyboard varieties 88Typing control-key combinations 91Scribbling text on the screen 91Windows Does the Tablet PC 92Special Tablet PC Software 94CHAPTER 8: YOUR LAPTOP AND WINDOWS 95The Big Windows Picture 95Viewing the desktop 96Exploring the Start button menu 97Working on the taskbar 98Visiting with the Action Center 100Using the supersecret shortcut menu 101Shouting at Cortana 101Windows and Your Stuff 101Exploring your laptop’s storage 101Accessing your User Profile folder 103Finding programs 104Settings and Options 105Opening the Settings app 105Visiting the Control Panel 106Using the Quick Settings 107Accessing the Windows Mobility Center 108PART 3: OUT AND ABOUT WITH MR LAPTOP 109CHAPTER 9: YOU AND YOUR LAPTOP 111User Accounts 111Accessing your user account info 112Eschewing an online account 112Setting an account PIN 114Changing your user account picture 115Adding online accounts 116The Perfect Display 117Setting the display resolution 117Changing the desktop wallpaper 117Adding a screen saver 118Setting the display orientation 119Adjusting screen brightness 120Removable Storage 120Adding storage 121Using the AutoPlay notification 121Controlling AutoPlay settings 122Ejecting media and storage devices 123The Software Side 124Adding new software 124Removing software 125CHAPTER 10: PORTABLE POWER 127The Battery Will Get a Charge Out of This! 127Using the battery (or not) 128Locating the laptop’s battery 128Monitoring the battery 130Charging the battery 131Using a second battery 131Replacing the battery 132When the Power Gets Low 132Setting low-battery warnings 132Using the Battery Saver 134Reviewing the power management plan 136CHAPTER 11: THE PRINTING CHAPTER 137The Great Printer Hunt 137Finding printers in Windows 137Connecting a printer directly to your laptop 139Adding a network or wireless printer 140“What is the default printer?” 141Something Needs Printing 142Printing a document 142Stopping a printer run amok 144Printing when you don’t have a printer 145Printing a PDF document 145A Portable Printer for Your Laptop 146CHAPTER 12: EXPANDING YOUR LAPTOP’S UNIVERSE 149USB Expansion Options 149Understanding the USB thing 150Attaching and removing a USB gizmo 151Dealing with USB-powered devices 152Using a USB hub 153Perusing potential USB goodies 154The Bluetooth Thing 155Checking for Bluetooth 155Pairing with a Bluetooth gizmo 156The Laptop Becomes a Desktop 157Using a full-size keyboard and mouse 158Adding a monitor 158Running the laptop with its lid closed 159CHAPTER 13: O THE PLACES YOU’LL GO 161In the Bag 162Features to look for 162Things to pack in your laptop bag 163Things to do before you leave 164Flying with Mr Laptop 164Is your laptop case one carry-on bag or half a carry-on bag? 164Laptop inspection 165All aboard! 165Airplane mode 166Air power 167In-flight Wi-Fi 167Café Computing 168Find a good seat 168Other tips ’n’ stuff 169In a Hotel Room 169Mind the Laptop’s Temperature 170CHAPTER 14: PRESENTATION INFORMATION 171The Show Must Go On 171Giving the dog-and-pony show 171Setting up your presentation 173Printing out a slide show 175To Create a Better Slide Show 176Starting your presentation 176Driving home your point 177Building a better presentation 178Keeping your audience awake 178Selling a presentation 179CHAPTER 15: A LAPTOP AT PLAY 181The Laptop Media Player 181Exploring Windows Media Player 181Running the Photos app 183Using the Groove Music app 184Expand the Laptop’s Media Universe 185Ripping music from a CD 186Uploading pictures and videos from a phone or camera 187Taking a picture 189Media Sharing 190Copying media to your OneDrive 190Adding media from your OneDrive 191Connecting to a network media player 192Sharing your laptop’s media 193Laptop Phone Calls 194eBooks on Your Laptop 195PART 4: LAPTOP NETWORKING 197CHAPTER 16: THE NETWORKING THING 199The Big Networking Picture 199Make the Network Connection 202Connecting the laptop to a wired network 203Accessing a Wi-Fi network 203Connecting to a hidden Wi-Fi network 205Tethering to a smartphone 206Break the Network Connection 207Disconnecting from a wired network 207Releasing the Wi-Fi connection 207CHAPTER 17: NETWORK LIFE IN LAPTOP LAND 209Network Configuration 209Locating network central 209Setting the network security 211Controlling the Wi-Fi radio 212Forgetting a Wi-Fi connection 213Getting the laptop’s MAC address 214Your Laptop, Windows, and the Network 215Setting your laptop’s network name 215Exploring the network 217Checking the sharing status 219Sharing a folder 219CHAPTER 18: YOUR FILES FROM AFAR 223Files from Here to There 223Walking files between computers 223Using octopus net to connect computers 224Quickly transferring files over Ethernet 225Using the Windows Sync Center 225Cloud Storage Synchronization 225Understanding cloud storage 226Exploring cloud storage options 228Synchronizing cloud storage files 228Sharing a file from cloud storage 230PART 5: SECURITY AND MAINTENANCE 231CHAPTER 19: INTERNET SAFETY 233Security Central 233Viewing the Action Center 234Checking the Windows Security Center 235Keep Windows Up-to-Date 237Checking the update status 237Postponing an update 237The Malware Scourge 238Doing a virus scan 238Dealing with a quarantined file 240Behind the Firewall 240Finding the firewall 241Dealing with a firewall warning 242Safe and Private Browsing 243Browsing in secret 243Purging your web browsing history 244Location Information 244General Security Settings 245CHAPTER 20: A MORE SECURE LAPTOP 247The Hot Laptop 247Before Your Laptop Is Stolen 248Marking your laptop 249Registering the laptop and its software 249Paying attention to your environment 249Attaching the old ball-and-chain 250Protect Your Data with a Strong Password 251Back Up Your Data 253Preparing for backup 254Configuring File History 254Checking the backup schedule 256Restoring an older version 257Restoring more than a single file 259The Laptop Reset 261CHAPTER 21: LAPTOP TROUBLESHOOTING 263The Universal Quick-Fix 264Restarting the laptop 264Signing out of Windows 264The Windows Troubleshooter 265Restore the System 267Doing a system restore 267Restoring the previous version of Windows 268Common Problems and Solutions 269“The keyboard is wacky!” 269Touchpad touchiness 269“My laptop won’t wake up” 270Power management woes 270“The battery won’t charge” 270CHAPTER 22: LAPTOP MAINTENANCE AND UPGRADING 271New Laptop Hardware 271How ’bout Some New Software? 272Upgrading your software 272Upgrading to a new version of Windows 273Laptop Maintenance 274Maintaining the storage system 274Keeping it clean 274Grooming the keyboard 275Cleansing the screen 275PART 6: THE PART OF TENS 277CHAPTER 23: TEN BATTERY TIPS AND TRICKS 279Don’t Drop the Battery, Get It Wet, Short It, Play Keep-Away with It, Open It, Burn It, or Throw It Away 279Reduce the Screen’s Brightness 280Power Down the Hard Drive 280Add RAM to Prevent Virtual Memory Disk Swapping 281Keep Memory Empty 282Guard the Battery’s Terminals 283Avoid Extreme Temperatures 283Store the Battery if You Don’t Plan to Use It 283Understand That Batteries Drain Over Time! 284Deal with the Low-Battery Warning 284CHAPTER 24: TEN HANDY LAPTOP ACCESSORIES 287Laptop Bag or Travel Case 288Spare Battery 288External Storage 288Cooling Pad 288Minivac 289USB Lamp 289Full-Size Keyboard and External Mouse 290Privacy Screen Filter 290ID Card or Return Service Sticker 291Theft-Prevention System 292CHAPTER 25: TEN THINGS TO THROW IN YOUR LAPTOP BAG 293Power Cord and Brick 293Spare Battery 294Mouse or Digital Pen 294Screen Wipes and Cleaner 294Laptop Lock 294Removable Media 295Headphones 295Office Supplies 295Cables, Cables, Cables 296Not the End of the List 296Index 297
CompTIA Security+ Practice Tests
GET READY FOR A CAREER IN IT SECURITY AND EFFICIENTLY PREPARE FOR THE SY0-601 EXAM WITH A SINGLE, COMPREHENSIVE RESOURCECompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601.Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and CompliancePerfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.ABOUT THE AUTHORDAVID SEIDL, CYSA+, CISSP, GPEN, GCIH, is the co-author of CompTIA Security+ Study Guide: Exam SY0-601, CompTIA CySA+ Study Guide: Exam CS0-002, CompTIA CySA+ Practice Tests: Exam CS0-002, and CompTIA PenTest+ Study Guide: Exam PT0-001. David is Vice President for Information Technology and CIO at Miami University. Previously, he led the University of Notre Dame security team as Director of Information Security and has served in a variety of technical and IT security roles. Introduction xixChapter 1 Threats, Attacks, and Vulnerabilities 1Chapter 2 Architecture and Design 45Chapter 3 Implementation 81Chapter 4 Operations and Incident Response 129Chapter 5 Governance, Risk, and Compliance 159Appendix Answers and Explanations 185Index 299
IoT Projects with Arduino Nano 33 BLE Sense
Get started with the extremely versatile and powerful Arduino Nano 33 BLE Sense, a smart device based on the nRF52840 from Nordic semiconductors. This book introduces you to developing with the device.You'll learn how to access Arduino I/O such as analog and digital I/O, serial communication, SPI and I2C. The book also covers how to access sensor devices on Arduino Nano 33 BLE Sense, how to interact with other external devices over BLE, and build embedded Artificial Intelligence applications.Arduino Nano 33 BLE Sense consists of multiple built-in sensors such as 9-axis inertial, humidity, temperature, barometric, microphone, gesture, proximity, light color and light intensity sensors. With this book, you'll see how this board supports the Bluetooth Low Energy (BLE) network, enabling interactions with other devices over the network.WHAT YOU’LL LEARN* Prepare and set up Arduino Nano 33 BLE Sense board* Operate Arduino Nano 33 BLE Sense board hardware and software* Develop programs to access Arduino Nano 33 BLE Sense board I/O* Build IoT programs with Arduino Nano 33 BLE Sense boardWHO THIS BOOK IS FORMakers, developers, students, and professionals at any level interested in developing with the Arduino Nano 33 BLE Sense board.Agus Kurniawan is a lecturer, IT consultant, and author. He has 15 years of experience in various software and hardware development projects, delivering materials in training and workshops, and technical writing. He has been awarded the Microsoft Most Valuable Professional (MVP) award 16 years in a row.Agus is a lecturer and researcher in the field of networking and security systems at the Faculty of Computer Science, Universitas Indonesia, Indonesia.He can be reached on his Linkedin at @agusk and Twitter at @agusk2010.Chapter 1: Setting up Development EnvironmentChapter goal: to introduce Arduino Nano 33 BLE Sense and set up development environment1.1 Introduction1.2 Review Arduino Nano 33 BLE Sense Board1.3 Set up Development Environment1.4 Hello Arduino: Blinking ProgramChapter 2: Arduino Nano 33 BLE Sense Board DevelopmentChapter goal: to access Arduino Nano 33 BLE Sense I/O and communication protocol2.1 Introduction2.2 Basic Sketch Programming2.3 Digital I/O2.4 Analog I/O2.5 Serial Communication2.6 PWM2.7 SPI2.8 I2CChapter 3: Sensor ProgrammingChapter goal: to access built-in sensors on Arduino Nano 33 BLE Sense3.1 Introduction3.2 Working with Digital Microphone3.3 Working with Gesture Sensor3.4 Working with Barometer3.5 Working with Temperature and Relative HumidityChapter 4: Bluetooth Low Energy (BLE)Chapter goal: to work with Bluetooth Low Energy (BLE) on Arduino Nano 33 BLE Sense board4.1 Introduction4.2 Setting up Bluetooth Low Energy (BLE)4.3 Demo: Controlling LED with BLEChapter 5: Embedded Artificial IntelligenceChapter goal: to build Embedded Artificial Intelligence on Arduino Nano 33 BLE Sense board5.1 Introduction5.2 Setting up TensorFlow Lite5.3 Demo: Embedded Artificial Intelligence
Microsoft Excel Functions Quick Reference
This condensed syntax reference presents the essential Excel function syntax in a well-organized format that can be used as a quick and handy reference. You can use it to improve your Excel knowledge and increase your productivity. It will help you upgrade the quality of your data analysis, dashboards, models, and templates.The Microsoft Excel Functions Quick Reference helps you set up workbooks, enter data, and format it for easier viewing. It starts by giving an overview of Excel functions explaining the different types of Excel functions available followed by an understanding of string functions and date functions. It then covers time, lookup, aggregate, and logical functions along with practice problems. Further, you will see math functions and information functions in Excel. You will also be able to create sophisticated forecast worksheets, key performance indicators (KPIs), and timelines. Each function in the text is illustrated by helpful, illuminating examples.With this book by your side, you'll always have the answer to your Excel function syntax questions.WHAT YOU WILL LEARN* Work with basic Excel functions* Use the LOOKUP function* Take advantage of new functions in information functions* Create a mega formulaWHO THIS BOOK IS FORAdministrators, analysts, and anyone else working with Microsoft Excel.Mandeep has more than 20 years of experience in administration, operations, software development, and reporting. He mostly works with cross-functional teams in ensuring operational and service excellence. Mandeep has worked with Capgemini for more than ten years and is currently working as a freelancer in conducting various training in MS Office and providing data services.CHAPTER 1 – WHAT IS AN EXCEL FUNCTION?· Excel formula definition· How to use an Excel formula· Different types of Excel functionsCHAPTER 2 –TEXT FUNCTIONS· LEFT· RIGHT· MID· UPPER· LOWER· PROPER· TRIM· LEN· FIND· SEARCH· CONCATENATE/&· VALUE· TEXT· EXACT· REPLACE· SUBSTITUTECHAPTER 3 – DATE FUNCTIONS· TODAY· DAY· MONTH· YEAR· DATE· EDATE· EOMONTH· WEEKDAY· WEEKNUM· DATEVALUE· NETWORKDAYS· DATEDIFCHAPTER 4 – TIME FUNCTIONS· NOW· HOUR· MINUTE· SECOND· TIMEVALUECHAPTER 5 – LOOKUP FUNCTIONS· VLOOKUP· HLOOKUP· MATCH· INDEX· CHOOSECHAPTER 6 – AGGREGATE FUNCTIONS· SUM· SUMIF· SUMIFS· SUMPRODUCT· SUBTOTAL· COUNT· COUNTIF· COUNTIFS· AVERAGE· AVERAGEIF· AVERAGEIFS· AGGREGATECHAPTER 7 – LOGICAL FUNCTIONS· IF· IFS· AND· OR· NOT· IFERROR· IFNA· SWITCHCHAPTER 8 – REFERENCE FUNCTIONS· INDIRECT· ADDRESS· OFFSET· ROW· ROWS· COLUMN· COLUMNSCHAPTER 9 – MATH FUNCTIONS· ABS· INT· TRUNC· ROUND· ODD· EVEN· POWER· PRODUCTCHAPTER 10 – INFORMATION FUNCTIONS· CELL· ISBLANK· ISERROR· ISEVEN· ISODD· ISFORMULA· ISLOGICAL· ISNA· ISNONTEXT· ISNUMBER· ISTEXT· N· TYPECHAPTER 11 – MEGA-FORMULA· What is Mega formula?· How to create a mega formula· ExamplesCHAPTER 12 – ARRAY FORMULA· What is an array formula?· Advantages and disadvantages· ExamplesAppendix A – Formula Reference ready reckoner
Requirements Engineering für Dummies
Für den Erfolg von Softwareprojekten ist es entscheidend, sich erstmal klar zu machen, wozu das System überhaupt dienen soll und wie es dafür beschaffen sein muss. Klingt eigentlich selbstverständlich, und doch scheitern Projekte oft gerade an der Anforderungsanalyse. Das Buch "Requirements Engineering für Dummies" beschreibt verständlich und pragmatisch, wie Sie vorgehen sollten - und zwar sowohl für klassische als auch für agile Projekte. Es liefert Ihnen Techniken, wie Sie Ziele bestimmen und Releases sinnvoll zusammenstellen, wie Sie Anforderungen erheben und verstehen, wie Sie mit Änderungen umgehen und wie Sie Fallstricke vermeiden. Das Buch ist auch geeignet zur Vorbereitung auf die CPRE-FL-Prüfung. Dr. Marcus Winteroll ist Mitglied der oose Innovative Informatik eG, einem Anbieter von Schulungen und Workshops zu Software & Systems Engineering in Hamburg. Als Trainer und Berater beschäftigt er sich mit der Analyse sowie Verbesserung von Geschäfts- und Entwicklungsprozessen. Dazu setzt er auf agile Methoden; aber auch die klassischen Vorgehensweisen sind ihm aus seiner langjährigen Erfahrung als Requirements Engineer, Projektleiter, Prozessmanager, Qualitätssicherer und Entwickler vertraut. Seine gesammelten Erfahrungen teilt er auf Konferenzen und als Autor von Fachartikeln.Über den Autor 13EINLEITUNG 25Über dieses Buch 25Konventionen in diesem Buch 26Was Sie nicht lesen müssen 26Törichte Annahmen über die Leser 26Wie dieses Buch aufgebaut ist 26Teil I: Requirements Engineering verstehen 27Teil II: Vorgehen im Requirements Engineering 27Teil III: Anforderungsanalyse 27Teil IV: Requirements Management 27Teil V: Der Top-Ten-Teil 27Symbole, die in diesem Buch verwendet werden 27Wie es weitergeht 28TEIL I: REQUIREMENTS ENGINEERING VERSTEHEN 29KAPITEL 1 DAS IST REQUIREMENTS ENGINEERING 31Warum uns Requirements Engineering weiterhelfen kann 31Aufgaben im Requirements Engineering 34Wer das Requirements Engineering macht 36Der Requirements Engineer 37Wer sonst noch das Requirements Engineering macht 37Viele Arten von Anforderungen 38Funktionale Anforderungen 38Nichtfunktionale Anforderungen 39Randbedingungen 40Abstraktionsstufen von Anforderungen 41Möglichkeiten der Zertifizierung 42Zertifikate des IREB 43Zertifikate des IIBA 44PMI Professional in Business Analysis (PMI-PBA) 45KAPITEL 2 EINBETTUNG DES REQUIREMENTS ENGINEERING47Das Zusammenspiel mit den übrigen Beteiligten 47Die Kunden des Requirements Engineering 48Wer sonst noch so wichtig ist: die Stakeholder 48Die Basis vieler Anforderungen: die Geschäftsprozesse 49Das Anforderungsdokument: eines für alle? 50Requirements Engineering im klassischen Vorgehen: alles klar 52Was zu erwarten ist 52Was nicht zu erwarten ist 52Requirements Engineering in agilen Projekten: just in time 53Beliebte Missverständnisse beim agilen Requirements Engineering 53Was agiles Vorgehen vom klassischen unterscheidet 54Klassisch, agil, Festpreis, Aufwandspreis –nicht jede Kombination ist sinnvoll 56Klassisch und Festpreis 56Agil und Aufwandspreis 56Agil und Festpreis 57Klassisch und Aufwandspreis 57Alles im Überblick 57KAPITEL 3 FALLSTRICKE59Was wir von den Kunden erwarten dürfen – und sie von uns 59Wer nimmt die Anforderungen auf? 60Der Projektleiter als Requirements Engineer 60Der Product Owner als Requirements Engineer 61Entwickler als Requirements Engineers 61Kunde und Nutzer als Requirements Engineers 62Die richtige Detaillierung von Anforderung 63Umgang mit Änderungen 64Dokumentation von Anforderungen 66TEIL II: VORGEHEN IM REQUIREMENTS ENGINEERING 69KAPITEL 4 VORGEHEN IN KLASSISCHEN PROJEKTEN71Einordnung in den Projektablauf 71Der Ablauf 73KAPITEL 5 VORGEHEN IN AGILEN PROJEKTEN77Direkte Kommunikation statt Dokumentation 78Der Wert gibt den Takt an 79Das Ziel immer vor Augen 80Die Vorbereitungsphase 80Requirements Engineering in Scrum 82Scrum kurz erklärt 82Wo das Requirements Engineering in Scrum stattfindet 84Das Product Backlog weiterentwickeln: Refinement 86Fertig heißt fertig: die Definition of Done 88Welche Rolle für die Anforderungen zuständig ist 89Wenn mehrere Teams an einem System arbeiten 90Fortwährende Analyse statt Änderungsmanagement 91Die Unterschiede zwischen klassischem und agilem Requirements Engineering 92KAPITEL 6 ANPASSUNG DES REQUIREMENTS-ENGINEERING-PROZESSES93Einflussfaktoren 93Facetten des Requirements-Engineering-Prozesses 94Zeitfacette 95Zweckfacette 96Zielfacette 96Konfiguration des Prozesses 97TEIL III: ANFORDERUNGSANALYSE 99KAPITEL 7 AN DIE ANFORDERUNGEN HERANKOMMEN101Stakeholderanalyse 102Stakeholder identifizieren 103Stakeholder verstehen 105Maßnahmen zur Einbindung der Stakeholder 110Zusätzliche Anforderungsquellen 111Anforderungen ermitteln 112Von geheimen und selbstverständlichen Anforderungen: das Kano-Modell 113Wer fragt, gewinnt: die Befragungstechniken 115Anforderungen gemeinsam erheben: Kooperationstechniken 121Schauen Sie genau hin: Beobachtungstechniken 123Systemarchäologie und der Blick zurück: artefaktbasierte Techniken 126Recycling im Requirements Engineering: die Wiederverwendung von Anforderungen 127Seien Sie kreativ: Entwurfs- und Ideenfindungstechniken 128Hypothesen bilden und ausprobieren 133Techniken, die Sie zusätzlich unterstützen 134Welche Technik Ihnen weiterhilft 135Konflikte und der Umgang damit 138Analyse von Konflikten 138Auflösung von Konflikten 139KAPITEL 8 WAS UNS ZU BEGINN KLAR SEIN SOLLTE 145Wohin soll die Reise gehen? Das Ziel klar vor Augen 145Auf die Verpackung kommt es an: der Produktkarton 147Alles auf einem Blick: das Product Vision Board 150Auf die Schnelle: das Fahrstuhlgespräch 152Den Überblick gewinnen 153Den Kontext des Systems verstehen 154Wie das System verwendet werden soll: Anwendungsfälle 156Der Überblick über die ganze Geschichte: Story Map 159Releases schneiden 164Werden Sie zum Minimalisten: das Minimale Marktfähige Release 164Von der Story Map zum Releaseplan 167KAPITEL 9 FUNKTIONALE ANFORDERUNGEN VERSTEHEN UND BESCHREIBEN175Die Systemverwendung mit Anwendungsfällen beschreiben 176Wer das System zu welchem Zweck verwendet: das Anwendungsfalldiagramm 178Anwendungsfälle Schritt für Schritt: Abläufe beschreiben 180Anwendungsfälle mit Anwendungsfällen erweitern 192Die Geschichten der Nutzer: User Stories 196Die Akzeptanzkriterien einer User Story 198Wie kleine User Stories große ersetzen 201Anwendungsfälle oder User Stories? 205Anwendungsfälle klassisch 205Von der Story Map über Anwendungsfälle zu den User Stories 205KAPITEL 10 WEITERE ASPEKTE FUNKTIONALER ANFORDERUNGEN209Fachliche Begriffe begreifen 210Alle wichtigen Begriffe auf einem Blick: das Glossar 210Der Zusammenhang zwischen den fachlichen Gegenständen im Fachklassenmodell 212Das sind ja Zustände 220Die Zustände fachlicher Gegenstände 220Das System bekommt Zustände 225Wie das Geschäft zu regeln ist 232Prototypen 243Die natürliche Sprache 247Man kann nicht alles verstehen 248Tipps zum Umgang mit der Sprache 248Ein Bausatz für Sätze: Satzschablonen 250Die Sprache und nichts als die Sprache 254KAPITEL 11 NICHTFUNKTIONALE ANFORDERUNGEN UND RANDBEDINGUNGEN257Die Bedeutung der nichtfunktionalen Anforderungen 258Nichtfunktionale Anforderungen verstehen 260Nichtfunktionale Anforderungen ermitteln 265Nichtfunktionale Anforderungen in der agilen Entwicklung 270Was schon vorher feststeht: die Randbedingungen 273KAPITEL 12 WER WEIẞ, OB DAS AUCH SO STIMMT – ANFORDERUNGEN PRÜFEN277Was gibt es denn da zu prüfen? 278Vorgehen im klassischen Requirements Engineering 279Qualitätskriterien zur Verifikation und Validierung 279Vorgehen im agilen Requirements Engineering 281Techniken für die Prüfung 282Reviewtechniken 282Explorative Validierungstechniken 284Prinzipien der Überprüfung 286KAPITEL 13 ANFORDERUNGEN FESTHALTEN289Zweck der Dokumentation 289Der richtige Zeitpunkt 292Hilfreiche Regeln 294Arten der Dokumentation 295Dokumente 296Modelle 302Anforderungssammlungen im Requirements-Management-Tool 304Product Backlog 305Story Map 306Formularvorlagen für Anforderungen 306TEIL IV: REQUIREMENTS MANAGEMENT 309KAPITEL 14 ANFORDERUNGEN ORGANISIEREN311Requirements Management im agilen Vorgehen 312Der Lebenszyklus einer Anforderung 314Versionierung 316Attribute einer Anforderung 317Kann man so oder so sehen: Sichtweisen 318Konfigurationen 320KAPITEL 15 IST DAS WIRKLICH WICHTIG? – PRIORISIERUNG VON ANFORDERUNGEN323Was wichtig ist 324Ad-hoc-Priorisierungstechniken 325Priorisierung mittels Stufen 325Ranking 326Top-Ten-Technik 326Kauf dir ein Feature 326Analytische Priorisierungstechniken 327Wiegers’sche Priorisierungsmatrix 327Kano-Modell 330Vorgehen 330KAPITEL 16 DIE ANFORDERUNGEN VERFOLGEN 333Zweck der Verfolgbarkeit 333Verfolgbarkeit darstellen 335Methodisches Verfolgen 338KAPITEL 17 UMGANG MIT ÄNDERUNGEN341Ganz normal und doch unbeliebt 341Der Änderungsprozess und seine Bestandteile 342KAPITEL 18 WERKZEUGE IM REQUIREMENTS ENGINEERING: UNTERSTÜTZUNG UND LAST347Arten von Werkzeugen 348Office-Tools 348Requirements-Management-Tools 349Modellierungstools 350Was schon da ist: Bugtracker und Wiki 351Lowtech-Tools 351Kombinationen von Tools 352Einführung von Werkzeugen 352TEIL V: DER TOP-TEN-TEIL 355KAPITEL 19 ZEHN PRINZIPIEN DES REQUIREMENTS ENGINEERING357Zusammenarbeit: Requirements Engineering allein funktioniert nicht 357Wertorientierung: Anforderungen sind kein Selbstzweck 358Stakeholder: Es geht darum, ihren Bedarf zu erfüllen 358Gemeinsames Verständnis: Die Basis für erfolgreiche Systementwicklung 358Kontext: Notwendig, um Systeme zu verstehen 359Problem, Anforderung, Lösung: Eine untrennbare Verbindung 359Validierung: Ungeprüfte Anforderungen sind nutzlos 360Evolution: Änderungen sind normal 360Innovation: Mehr vom Gleichen reicht nicht 361Systematische und disziplinierte Arbeit: Ohne geht es nicht 361KAPITEL 20 ZEHN BELIEBTE FEHLER IM REQUIREMENTS ENGINEERING 363Die Suche nach dem Schuldigen 363Lösungen beschreiben anstatt Probleme zu verstehen 364Anforderungen einfach vom Altsystem übernehmen 364Die Nutzer beschreiben die Anforderungen 364Wir arbeiten agil und dokumentieren nichts 365Entweder keine oder unverständliche Systemdokumentationen 365User Stories sind allein dazu da, die bestehenden Anforderungen in das Backlog aufzunehmen 365Agil und Modellierung geht nicht zusammen 366Fachleute und Entwickler sprechen nicht miteinander 366Das Requirements Engineering läuft nicht, also brauchen wir ein Tool 366KAPITEL 21 ZEHN ONLINE-QUELLEN369IREB-Lehrpläne, Handbücher und Glossar 369Requirements Engineering Magazine 369Scrum-Guide 369Online Browsing Platform der ISO 370V-Modell 370UML-Spezifikation 370UML-Übersicht 371DMN-Spezifikation 371Übersicht über Requirements-Tools 371Übersicht über UML-Tools 371Stichwortverzeichnis 375
iPad Portable Genius
INCREASE YOUR IPAD IQ WITH THIS GENIUS-LEVEL GUIDE TO THE APPLE IPADIf you want to squeeze every last bit of incredible from your Apple iPad we've got you covered with this newly revised iPad Portable Genius. Want to learn how to connect to a network? How to configure your tablet? How to surf the web more comfortably? All while keeping your identity and accounts private and secure?With the iPad Portable Genius as your guide, you'll unlock the full potential of your iPad in no time at all. You'll learn how to:* Get the most out of sending and receiving your email* Have fun with your images and take crystal-clear photos every time* Shoot and edit video right on your iPad* Manage your busy schedule with calendarsPerfect for anyone looking to save time and reveal the true power and flexibility of their iPad, the iPad Portable Genius, Fourth Edition contains all the new, engaging, and extensively illustrated info you need to master your tablet.PAUL MCFEDRIES is president of Logophilia Limited, a technical writing company. Over the past 40 years, Paul has programmed everything from mainframes to desktops to bar code scanners, and his nearly 100 books have sold more than four million copies worldwide. Visit him at www.paulmcfedries.com.Fun, hip, and straightforward, the PORTABLE GENIUS series gives forward-thinking technology users helpful information in handy, compact books that are easy to navigate and don't skimp on the essentials. Collect the whole series and make the most of your digital lifestyle.Acknowledgments iiiIntroduction xCHAPTER 1 HOW DO GET STARTED WITH MY IPAD? 2Using the Top Button 4Sleeping and waking the iPad 5Turning the iPad off and back on again 5Making a purchase 6Using the Home Button 7Setting the Volume 8Working with the Touchscreen 8Understanding touchscreen gestures 9Searching for stuff on your iPad 9Switching from one app to another 11Shutting down an app 11Typing on the touchscreen keyboard 12Editing with Your iPad 14Editing text 14Selecting, copying, and pasting text 15Copying and pasting an image 17Undoing an edit 17Configuring iPad from the Control Center 18CHAPTER 2 HOW DO I CONNECT TO A NETWORK? 20Making Wi-Fi Network Connections 22Displaying nearby Wi-Finetworks automatically 23Making a connection to a hidden Wi-Fi network 23Working with Wi-Fi Connections 24Checking Wi-Fi security 25Using Wi-Fi to transfer a file from your Mac to your iPad 25Preventing your iPad from automatically joining a known network connection 26Shutting off the Wi-Fi antenna 26Tethering to an iPhone Internet Connection 27Working with Cellular-Enabled iPads 29Tracking cellular data usage 29Shutting off the LTE antenna 29Preventing your iPad from using cellular data 30Controlling app access to cellular data 30Disabling data roaming 30Switching to Low Data Mode 31Activating Airplane Mode 31Connecting Bluetooth Devices 32Making your iPad discoverable 32Pairing with a Bluetooth keyboard 33Pairing with Bluetooth headphones 34Selecting paired headphones as the audio output device 34Unpairing your iPad from a Bluetooth device 35CHAPTER 3 HOW DO I CONFIGURE MY IPAD? 36Customizing the iPad Home Screen 38Rearranging the Home screen icons 38Storing multiple app icons in an app folder 39Adding a web page icon to the Home screen 40Dealing with App Notifications 41Opening the Notification Center 41Working with notifications 42Configuring an app’s notifications 43Configuring Do Not Disturb settings 45Trying Out a Few More Useful iPad Customizations 46Changing your iPad’s name 46Customizing iPad sounds 46Customizing the iPad keyboard 47Configuring the Siri voice assistant 51Configuring and using multitasking 52Controlling your iPad’s privacy settings 54Configuring your iPad to use Apple Pay 54CHAPTER 4 HOW CAN I GET MORE OUT OF WEB SURFING? 56Surfing with the Touchscreen 58Utilizing Pro Tips for Easier Web Browsing 59Browsing with tabs 59Opening a tab in the foreground 61Working with iCloud tabs 62Viewing a page without distractions 62Requesting a website’s desktop version 63Working with bookmarks 64Adding pages to your Reading List 67Revisiting pages using the History list 67Dealing with Forms 68Filling in forms faster with AutoFill 69Storing website login data 70Storing website logins manually 72Enhancing Web Browsing Privacy 73Deleting sites from your browsing history 73Removing website data 74Browsing privately 75Making Safari Even Easier and Better 76Switching the default search engine 76Searching for text in a web page 76Searching the web with Siri 77Sharing a link via AirDrop 78CHAPTER 5 HOW DO I MAKE THE MOST OF EMAIL? 80Managing Your Accounts 82Adding an email account manually 82Changing the default account 84Disabling an account 85Removing an account 85Switching from one account to another 86Configuring Some Useful Mail Settings 86Creating a custom email signature 86Thwarting spammers by disabling remote images 87Stopping messages from getting organized by thread 88Customizing Mail’s swipe options 89Working with Email Messages 89Adding iCloud folders 89Attaching a document from iCloud Drive 90Formatting message text 90Maintaining messages with swipe gestures 91Marking every message as read 92Controlling email with Siri voice commands 92CHAPTER 6 HOW CAN I HAVE FUN WITH PHOTOS? 94Browsing and Viewing Your Photos 96Navigating and manipulating photos 97Creating a photo album 98Marking a photo as a favorite 98Streaming photos to Apple TV 98Editing a Photo 99Enhancing color and brightness 99Cropping and straightening a photo 100Applying a filter to a photo 102Adjusting the lighting in a photo 102Using the Cameras 103Launching the Camera app 104Taking a photo 104Learning the Camera app’s features 105Focusing your shot 106Locking the exposure and focus 106Zooming in and out of the shot 107Shooting live photos 108Shooting a panoramic photo 108Shooting a photo with a time delay 110Reducing blurry iPad photos 110CHAPTER 7 HOW CAN I CREATE VIDEO ON MY IPAD? 112Recording Video 114Recording video on your iPad 114Shooting a time-lapse video 116Setting the recording format for video and slow motion 116Editing Recorded Video 117Creating Videos with the Clips App 118Creating a Clips video 119Adding a new Clips project 122Making Movies with iMovie 122Creating a new iMovie project 122Opening a project for editing 123Importing media into your project 124Working with video clips 126Working with your project 131CHAPTER 8 HOW DO I MANAGE MY CONTACTS? 134Getting Started with Contacts 136Creating a Contact 137Editing a Contact 138Assigning phone numbers to a contact 138Assigning email addresses to a contact 140Assigning web addresses to a contact 140Assigning social media data to a contact 141Assigning physical addresses to a contact 142Adding a photo to a contact 143Deleting a contact 144Getting More Out of Contacts 145Creating a custom field label 145Adding fields to a contact 145Deleting fields from a contact 146Creating a new contact from a vCard 147Sending and receiving a contact via AirDrop 148Sorting contacts 149Syncing contacts 149CHAPTER 9 HOW DO I TRACK MY EVENTS AND APPOINTMENTS? 150Getting Started with the Calendar App 152Tracking Your Events 153Adding an event to your calendar 154Editing an event 154Repeating an event 155Converting an event to an all-day event 156Adding an alert to an event 157Getting More Out of the Calendar App 158Setting the default calendar 159Subscribing to a calendar 159Controlling events with Siri voice commands 160Handling Microsoft Exchange meeting requests 161Working with Reminders 162Creating a time reminder 162Creating a location reminder 163Creating a new list and setting the default list 164Completing a reminder 164Deleting a reminder 165Setting reminders with Siri voice commands 165CHAPTER 10 HOW CAN I NAVIGATE MY WORLD WITH IPAD? 166Working with Location Services 168Controlling how apps access Location Services 168Shutting off Location Services 170Mapping Locations 171Searching for a location 171Marking a location 173Flying over your destination 174Mapping your current location 174Mapping a contact’s address 176Mapping an address from an email 177Saving a location as a favorite 177Sharing a map 178Mapping locations with Siri voice commands 178Navigating with Maps 178Getting directions to a location 179Getting live traffic information 180Getting directions with Siri voice commands 181CHAPTER 11 HOW DO I PROTECT MY IPAD? 182Locking Your iPad 184Locking your iPad with a passcode 184Locking your iPad with a fingerprint 186Locking your iPad with facial recognition 188Configuring Your Tablet to Sleep Automatically 190Backing Up Your Tablet 190Setting Restrictions on a Child’s iPad 191CHAPTER 12 HOW DO I SOLVE IPAD PROBLEMS? 194Troubleshooting iPad Problems: A Quick Guide 196Troubleshooting iPad Problems Step-by-Step 196Step 1: Shut down whatever app you’re using 197Step 2: Restore a changed setting 198Step 3: Shut down and then restart your iPad 198Step 4: Reboot the iPad hardware 200Step 5: Recharge your iPad 200Step 6: Check for iPadOS updates 200Step 7: Free up storage space 201Step 8: Check your Wi-Fi connection 202Step 9: Reset your settings 204Step 10: Erase and restore your content and settings 205Index 208
Mobile Device Management in Zeiten von mobilem Arbeiten. Wie Unternehmen mobile Endgeräte erfolgreich in bestehende IT-Infrastrukturen integrieren
In Unternehmen geht der Trend immer mehr zum Homeoffice und Remote Work. Viele Unternehmen erlauben es den Mitarbeitern, private Endgeräte wie Smartphones oder Tablets für Firmenzwecke zu nutzen. Für Unternehmen bedeutet dies jedoch eine Gefährdung ihrer Firmendaten. Mobile Device Management-Systeme können dabei helfen, mögliche Sicherheitslücken zu schließen. Welche technischen Anforderungen stellen Mobile Device Management-Systeme an Unternehmen? Wie sicher ist Mobile Device Management und welche Chancen und Risiken gibt es? Und welche rechtlichen Aspekte müssen Unternehmen beim Verwalten von mobilen Geräten beachten? Der Autor Timmy Lutz klärt die wichtigsten Fragen zum Thema Mobile Device Management. Er nimmt die aktuelle Mobile Device Management Software in den Blick und erläutert, wie Unternehmen das richtige System für sich finden. Dabei gibt er praktische Tipps für eine erfolgreiche Implementierung in Unternehmen. Aus dem Inhalt: - Mobile Security Management; - Bring your own Device; - Betriebssystem; - Firmendaten; - Datensicherheit; - IT-Infrastruktur
CompTIA Security+ Study Guide
LEARN THE KEY OBJECTIVES AND MOST CRUCIAL CONCEPTS COVERED BY THE SECURITY+ EXAM SY0-601 WITH THIS COMPREHENSIVE AND PRACTICAL STUDY GUIDE! AN ONLINE TEST BANK OFFERS 650 PRACTICE QUESTIONS AND FLASHCARDS!The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and ComplianceThe study guide comes with the Sybex online, interactive learning environment offering 650 practice questions! Includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms. The book is written in a practical and straightforward manner, ensuring you can easily learn and retain the material.Perfect for everyone planning to take the SY0-601 Exam—as well as those who hope to secure a high-level certification like the CASP+, CISSP, or CISA—the study guide also belongs on the bookshelves of everyone who has ever wondered if the field of IT security is right for them. It's a must-have reference!ABOUT THE AUTHORSMIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame. He's a cybersecurity professional and educator with over 20 years of experience. Mike provides cybersecurity certification resources at his website, CertMike.com. DAVID SEIDL, SECURITY+, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University. David co-led Notre Dame's move to the cloud and has written multiple cybersecurity certification books. Introduction xxvAssessment Test xxxviCHAPTER 1 TODAY’S SECURITY PROFESSIONAL 1Cybersecurity Objectives 2Data Breach Risks 3The DAD Triad 3Breach Impact 5Implementing Security Controls 7Security Control Categories 7Security Control Types 8Data Protection 9Summary 12Exam Essentials 12Review Questions 14CHAPTER 2 CYBERSECURITY THREAT LANDSCAPE 19Exploring Cybersecurity Threats 20Classifying Cybersecurity Threats 20Threat Actors 22Threat Vectors 28Threat Data and Intelligence 30Open Source Intelligence 31Proprietary and Closed-Source Intelligence 33Assessing Threat Intelligence 35Threat Indicator Management and Exchange 36Public and Private Information Sharing Centers 37Conducting Your Own Research 38Summary 38Exam Essentials 39Review Questions 40CHAPTER 3 MALICIOUS CODE 45Malware 46Ransomware 47Trojans 47Worms 48Rootkits 48Backdoors 49Bots 50Keyloggers 52Logic Bombs 53Viruses 53Fileless Viruses 53Spyware 54Potentially Unwanted Programs (PUPs) 55Malicious Code 55Adversarial Artificial Intelligence 57Summary 58Exam Essentials 59Review Questions 61CHAPTER 4 SOCIAL ENGINEERING, PHYSICAL, AND PASSWORD ATTACKS 65Social Engineering 66Social Engineering Techniques 67Influence Campaigns 72Password Attacks 72Physical Attacks 74Summary 76Exam Essentials 76Review Questions 78CHAPTER 5 SECURITY ASSESSMENT AND TESTING 83Vulnerability Management 84Identifying Scan Targets 84Determining Scan Frequency 86Configuring Vulnerability Scans 87Scanner Maintenance 92Vulnerability Scanning Tools 95Reviewing and Interpreting Scan Reports 96Validating Scan Results 106Security Vulnerabilities 107Patch Management 107Legacy Platforms 108Weak Configurations 109Error Messages 110Insecure Protocols 111Weak Encryption 112Penetration Testing 113Adopting the Hacker Mindset 114Reasons for Penetration Testing 115Benefits of Penetration Testing 115Penetration Test Types 116Rules of Engagement 118Reconnaissance 119Running the Test 120Cleaning Up 120Training and Exercises 120Summary 122Exam Essentials 122Review Questions 124CHAPTER 6 SECURE CODING 129Software Assurance Best Practices 130The Software Development Life Cycle 130Software Development Phases 131Software Development Models 133DevSecOps and DevOps 136Designing and Coding for Security 138Secure Coding Practices 138API Security 139Code Review Models 139Software Security Testing 143Analyzing and Testing Code 143Injection Vulnerabilities 144SQL Injection Attacks 145Code Injection Attacks 148Command Injection Attacks 149Exploiting Authentication Vulnerabilities 150Password Authentication 150Session Attacks 151Exploiting Authorization Vulnerabilities 154Insecure Direct Object References 154Directory Traversal 155File Inclusion 156Privilege Escalation 157Exploiting Web Application Vulnerabilities 157Cross-Site Scripting (XSS) 158Request Forgery 160Application Security Controls 161Input Validation 162Web Application Firewalls 163Database Security 163Code Security 166Secure Coding Practices 168Source Code Comments 168Error Handling 168Hard-Coded Credentials 170Memory Management 170Race Conditions 171Unprotected APIs 172Driver Manipulation 172Summary 173Exam Essentials 173Review Questions 175CHAPTER 7 CRYPTOGRAPHY AND THE PUBLIC KEY INFRASTRUCTURE 179An Overview of Cryptography 180Historical Cryptography 181Goals of Cryptography 186Confidentiality 187Integrity 188Authentication 188Nonrepudiation 189Cryptographic Concepts 189Cryptographic Keys 189Ciphers 190Modern Cryptography 191Cryptographic Secrecy 191Symmetric Key Algorithms 192Asymmetric Key Algorithms 193Hashing Algorithms 196Symmetric Cryptography 197Data Encryption Standard 197Triple DES 199Advanced Encryption Standard 200Symmetric Key Management 200Asymmetric Cryptography 203RSA 203Elliptic Curve 204Hash Functions 205SHA 206MD5 207Digital Signatures 207HMAC 208Digital Signature Standard 209Public Key Infrastructure 209Certificates 209Certificate Authorities 211Certificate Generation and Destruction 212Certificate Formats 215Asymmetric Key Management 216Cryptographic Attacks 217Emerging Issues in Cryptography 220Tor and the Dark Web 220Blockchain 220Lightweight Cryptography 221Homomorphic Encryption 221Quantum Computing 222Summary 222Exam Essentials 222Review Questions 224CHAPTER 8 IDENTITY AND ACCESS MANAGEMENT 229Identity 230Authentication and Authorization 231Authentication and Authorization Technologies 232Directory Services 236Authentication Methods 237Multifactor Authentication 237One-Time Passwords 239Biometrics 241Knowledge-Based Authentication 243Managing Authentication 244Accounts 245Account Types 245Account Policies and Controls 245Access Control Schemes 248Filesystem Permissions 249Summary 251Exam Essentials 252Review Questions 253CHAPTER 9 RESILIENCE AND PHYSICAL SECURITY 257Building Cybersecurity Resilience 258Storage Resiliency: Backups and Replication 260Response and Recovery Controls 266Physical Security Controls 269Site Security 269Summary 278Exam Essentials 279Review Questions 281CHAPTER 10 CLOUD AND VIRTUALIZATION SECURITY 285Exploring the Cloud 286Benefits of the Cloud 287Cloud Roles 289Cloud Service Models 289Cloud Deployment Models 293Shared Responsibility Model 295Cloud Standards and Guidelines 298Virtualization 300Hypervisors 300Cloud Infrastructure Components 302Cloud Compute Resources 302Cloud Storage Resources 304Cloud Networking 307Cloud Security Issues 311Availability 311Data Sovereignty 311Virtualization Security 312Application Security 312Governance and Auditing 313Cloud Security Controls 313Cloud Access Security Brokers 314Resource Policies 314Secrets Management 316Summary 316Exam Essentials 316Review Questions 318CHAPTER 11 ENDPOINT SECURITY 323Protecting Endpoints 324Preserving Boot Integrity 325Endpoint Security Tools 326Hardening Endpoints and Systems 332Service Hardening 333Operating System Hardening 335Hardening the Windows Registry 336Configuration, Standards, and Schemas 336Disk Security and Sanitization 338File Manipulation and Other Useful Command-Line Tools 341Scripting, Secure Transport, and Shells 343Securing Embedded and Specialized Systems 344Embedded Systems 345SCADA and ICS 346Securing the Internet of Things 348Specialized Systems 349Communication Considerations 350Security Constraints of Embedded Systems 351Summary 352Exam Essentials 354Review Questions 356CHAPTER 12 NETWORK SECURITY 361Designing Secure Networks 363Network Segmentation 365Network Access Control 366Port Security and Port-Level Protections 367Port Spanning/Port Mirroring 369Virtual Private Network 370Network Appliances and Security Tools 371Network Security, Services, and Management 377Deception and Disruption 382Secure Protocols 383Using Secure Protocols 383Secure Protocols 384Attacking and Assessing Networks 389On-Path Attacks 389Domain Name System Attacks 391Layer 2 Attacks 393Distributed Denial-of-Service Attacks 394Network Reconnaissance and Discovery Tools and Techniques 398Summary 411Exam Essentials 412Review Questions 414CHAPTER 13 WIRELESS AND MOBILE SECURITY 419Building Secure Wireless Networks 420Connectivity Methods 421Wireless Network Models 425Attacks Against Wireless Networks 426Designing a Network 430Controller and Access Point Security 432Wi-Fi Security Standards 433Wireless Authentication 434Managing Secure Mobile Devices 436Mobile Device Deployment Methods 436Mobile Device Management 438Specialized Mobile Device Security Tools 442Summary 442Exam Essentials 443Review Questions 445CHAPTER 14 INCIDENT RESPONSE 449Incident Response 450The Incident Response Process 451Attack Frameworks and Identifying Attacks 457Incident Response Data and Tools 461Security Information and Event Management Systems 462Alerts and Alarms 464Correlation and Analysis 465Rules 465Mitigation and Recovery 473Summary 477Exam Essentials 478Review Questions 480CHAPTER 15 DIGITAL FORENSICS 485Digital Forensic Concepts 486Legal Holds and e-Discovery 487Conducting Digital Forensics 488Acquiring Forensic Data 489Acquisition Tools 493Validating Forensic Data Integrity 496Data Recovery 499Forensic Suites and a Forensic Case Example 499Reporting 504Digital Forensics and Intelligence 504Summary 505Exam Essentials 505Review Questions 507CHAPTER 16 SECURITY POLICIES, STANDARDS, AND COMPLIANCE 511Understanding Policy Documents 512Policies 512Standards 515Procedures 517Guidelines 518Exceptions and Compensating Controls 519Personnel Management 520Least Privilege 520Separation of Duties 521Job Rotation and Mandatory Vacations 521Clean Desk Space 522Onboarding and Offboarding 522Nondisclosure Agreements 522Social Media 522User Training 522Third-Party Risk Management 523Winding Down Vendor Relationships 524Complying with Laws and Regulations 524Adopting Standard Frameworks 525NIST Cybersecurity Framework 525NIST Risk Management Framework 528ISO Standards 529Benchmarks and Secure Configuration Guides 531Security Control Verification and Quality Control 531Summary 533Exam Essentials 534Review Questions 535CHAPTER 17 RISK MANAGEMENT AND PRIVACY 539Analyzing Risk 540Risk Identification 541Risk Calculation 542Risk Assessment 543Managing Risk 547Risk Mitigation 547Risk Avoidance 549Risk Transference 549Risk Acceptance 549Risk Analysis 550Disaster Recovery Planning 552Disaster Types 552Business Impact Analysis 553Privacy 553Sensitive Information Inventory 554Information Classification 554Data Roles and Responsibilities 556Information Lifecycle 557Privacy Enhancing Technologies 557Privacy and Data Breach Notification 558Summary 559Exam Essentials 559Review Questions 560APPENDIX ANSWERS TO REVIEW QUESTIONS 565Chapter 1: Today’s Security Professional 566Chapter 2: Cybersecurity Threat Landscape 567Chapter 3: Malicious Code 569Chapter 4: Social Engineering, Physical, and Password Attacks 572Chapter 5: Security Assessment and Testing 574Chapter 6: Secure Coding 576Chapter 7: Cryptography and the Public Key Infrastructure 578Chapter 8: Identity and Access Management 579Chapter 9: Resilience and Physical Security 582Chapter 10: Cloud and Virtualization Security 584Chapter 11: Endpoint Security 586Chapter 12: Network Security 589Chapter 13: Wireless and Mobile Security 591Chapter 14: Incident Response 594Chapter 15: Digital Forensics 596Chapter 16: Security Policies, Standards, and Compliance 598Chapter 17: Risk Management and Privacy 600Index 603
Sketch
Apps und Websites erstellen mit der Sketch-App.Mit der Sketch-App setzen Sie Apps für Web und mobile Geräte effizienter und intuitiver um. Und dieses umfassende Handbuch hilft Ihnen dabei, Sketch in allen Details kennenzulernen und in der Praxis richtig anzuwenden. Mit den Tipps und Workshops von Micha Kafka starten Sie bei App-Design und Webgestaltung richtig durch: vektorbasiertes Arbeiten, Pages und Artboards anlegen, Objekte ausrichten, Farb- und Schriftoptionen nutzen, mit Symbolen arbeiten, mit Sketch Mirror Layouts in Echtzeit testen, Layouts exportieren u.v.m. Immer im Blick: Gutes Design, UX und Usability. So werden Sie als App-Designer und Web-Designer noch besser, sparen Zeit und überzeugen mit modernen Designs.Leseprobe (PDF-Link)
Content Design (2. Auflg.)
Das Handbuch für Conversion-orientierte Content Marketer, Webdesigner & Unternehmer.Die Autoren erklären Ihnen, wie Sie mit psychologischen Triggern aus Besuchern Ihrer Website Newsletter-Abonnenten, Leads und Kunden machen und wie Sie durch Content-Optimierung nachhaltig Ihre Umsätze steigern. Sie erhalten eine Übersicht über die Voraussetzungen für erfolgreiches Content Design sowie eine klar strukturierte Einführung in die Gestaltung und Konzeption digitaler Inhalte – insbesondere Text, Bild, Video und Audio. Profitieren Sie nicht nur vom Expertenwissen der Autoren, sondern auch von erfahrenen Marketingverantwortlichen bei Facebook, Zalando, Pixum und LogMeIn. Mithilfe der Tipps zur Content- und Conversion-Optimierung sowie passenden Tool-Empfehlungen haben Sie alles was Sie brauchen, um Ihr eigenes Content Marketing auf den nächsten Level zu heben.Mit ihrem Buch richten sich Robert Weller und Ben Harmanus sowohl an Einsteiger als auch an erfahrene Online-Marketing-Manager, die nicht nur einzelne Aufgaben schnell umsetzen, sondern den Zusammenhang von Content und Design in Bezug auf das Marketing in seiner Vielschichtigkeit verstehen wollen. Zahlreiche visuelle Beispiele, bewährte Tipps aus der Marketingpraxis sowie Erfahrungsberichte, Worksheets und Checklisten helfen dabei.
Convolutional Neural Networks with Swift for Tensorflow
Dive into and apply practical machine learning and dataset categorization techniques while learning Tensorflow and deep learning. This book uses convolutional neural networks to do image recognition all in the familiar and easy to work with Swift language.It begins with a basic machine learning overview and then ramps up to neural networks and convolutions and how they work. Using Swift and Tensorflow, you'll perform data augmentation, build and train large networks, and build networks for mobile devices. You’ll also cover cloud training and the network you build can categorize greyscale data, such as mnist, to large scale modern approaches that can categorize large datasets, such as imagenet.Convolutional Neural Networks with Swift for Tensorflow uses a simple approach that adds progressive layers of complexity until you have arrived at the current state of the art for this field.WHAT YOU'LL LEARN* Categorize and augment datasets* Build and train large networks, including via cloud solutions* Deploy complex systems to mobile devicesWHO THIS BOOK IS FORDevelopers with Swift programming experience who would like to learn convolutional neural networks by example using Swift for Tensorflow as a starting point. BRETT KOONCE is the CTO of Quarkworks, a mobile consulting agency. He's a developer with five years experience creating apps for iOS and Android. His team has worked on dozens of apps that are used by millions of people around the world. Brett knows the pitfalls of development and can help you avoid them. Whether you want to build something from scratch, port your app from iOS to Android (or vice versa) or accelerate your velocity, Brett can help.Chapter 1: MNIST: 1D Neural NetworkChapter 2: MNIST: 2D Neural NetworkChapter 3: CIFAR: 2D Nueral Network with BlocksChapter 4: VGG NetworkChapter 5: Resnet 34Chapter 6: Resnet 50Chapter 7: SqueezeNetChapter 8: MobileNrt v1Chapter 9: MobileNet v2Chapter 10: Evolutionary StrategiesChapter 11: MobileNet v3Chapter 12: Bag of TricksChapter 13: MNIST RevisitedChapter 14: You are Here
Design Patterns in .NET Core 3
Implement design patterns in .NET Core 3 using the latest versions of the C# and F# languages. This book provides a comprehensive overview of the field of design patterns as they are used in today’s developer toolbox. This new edition introduces topics such as Functional Builder, Asynchronous Factory Method, Generic Value Adapter, and new Composite Proxies, including one that attempts to solve the SoA/AoS problem.Using the C# and F# programming languages, DESIGN PATTERNS IN .NET CORE 3 explores the classic design pattern implementations and discusses the applicability and relevance of specific language features for implementing patterns. You will learn by example, reviewing scenarios where patterns are applicable. MVP and patterns expert Dmitri Nesteruk demonstrates possible implementations of patterns, discusses alternatives and pattern inter-relationships, and illustrates the way that a dedicated refactoring tool (ReSharper) can be used to implement design patterns with ease.WHAT YOU WILL LEARN* Become familiar with the latest pattern implementations available in C# 8 and F# 5* Know how to better reason about software architecture* Understand the process of refactoring code to patterns* Refer to researched and proven variations of patterns* Study complete, self-contained examples, including many that cover advanced scenarios* Use the latest implementations of C# and Visual Studio/Rider/ReSharperWHO THIS BOOK IS FORDevelopers who have some experience in the C# language and want to expand their comprehension of the art of programming by leveraging design approaches to solving modern problemsDMITRI NESTERUK is a quantitative analyst, developer, course and book author, and an occasional conference speaker. His interests lie in software development and integration practices in the areas of computation, quantitative finance, and algorithmic trading. His technological interests include C# and C++ programming as well as high-performance computing using technologies such as CUDA and FPGAs. He has been a C# MVP from 2009 to 2018.PART I: INTRODUCTION.-Chapter 1: The SOLID Design PrinciplesChapter 2: The Functional PerspectivePART II: CREATIONAL PATTERNSChapter 3: BuilderChapter 4: FactoriesChapter 5: PrototypeChapter 6: SingletonPART III: STRUCTURAL PATTERNSChapter 7: AdapterChapter 8: BridgeChapter 9: CompositeChapter 10: DecoratorChapter 11: FaçadeChapter 12: FlyweightChapter 13: ProxyPART IV: BEHAVIORAL PATTERNSChapter 14: Chain of ResponsibilityChapter 15: CommandChapter 16: InterpreterChapter 17: IteratorChapter 18: MediatorChapter 19: MementoChapter 20: Null ObjectChapter 21: ObserverChapter 22: StateChapter 23: StrategyChapter 24: Template MethodChapter 25: Visitor
Practical Linux with Raspberry Pi OS
Quickly start programming with Linux while learning the Raspberry Pi OS—the Linux distribution designed specifically for low-cost Raspberry Pis. This short guide reviews Linux commands, GUI, and shell scripting in a holistic manner by diving into both advanced and day-to-day tasks using the Raspberry Pi OS.You'll comfortably work with the Linux command prompt, and explore the RPi OS GUI and all its base applications. Then move into writing your own programs with shell-programming and using high-level languages such as C, C++, and Python 3. You’ll also study hardware and GPIO programming. Use Python 3 for GPIO programming to drive LEDs and pushbuttons.Examples are written in Shell, C, C++, and Python 3. Graphical output is displayed in helpful screenshots that capture just what you’ll see when working in this environment. All code examples are well tested on actual Raspberry Pi boards. After reading this book and following the examples, you’ll be able to write programs for demonstration in your academic/industrial research work, business environment, or just your circle of friends for fun!WHAT YOU'LL LEARN* Navigate the core aspects of Linux and programming on a Linux platform* Install Raspberry Pi OS on a Raspberry Pi* Program in Shell, C, C++, and Python* Redirect Io and work with the crontabWHO THIS BOOK IS FORLinux enthusiasts, software engineers, researchers, business analysts, and managers working with the low-cost Raspberry Pi.Ashwin Pajankar holds a Master of Technology from IIIT Hyderabad, and has over 25 years of programming experience. He started his journey in programming and electronics at the tender age of 7 with BASIC programming language and is now proficient in Assembly programming, C, C++, Java, Shell Scripting, and Python. Other technical experience includes single board computers such as Raspberry Pi and Banana Pro, and Arduino.He is currently a freelance online instructor teaching programming bootcamps to more than 60,000 students from tech companies and colleges. His Youtube channel has an audience of 10000 subscribers and he has published more than 15 books on programming and electronics with many international publications.PRACTICAL LINUX WITH RASPBERRY PI OSChapter 1: Introduction to Raspberry PiChapter 2: Getting ReadyChapter 3: Directory Commands and Text EditorsChapter 4: More CommandsChapter 5: Useful Unix Commands and ToolsChapter 6: Shell ScriptingChapter 7: I/O Redirection and CronChapter 8: Introduction to High Level Programming LanguagesChapter 9: Programming with Python 3 GPIOChapter 10: Exploring Raspberry Pi OS GUIAppendix: Additional Tools
The TYPO3 Guidebook
Learn how to make the most of TYPO3 – the enterprise CMS – to organize information and digital assets, and communicate globally with powerful multi-site and multilingual support. This book will show you how the TYPO3 CMS backend and frontend work from top to bottom.Content management is a core aspect of every company’s communications, whether intranets and internal digital asset repositories or public-facing product pages and online communities. The book starts with four chapters covering how TYPO3 works, giving you a high-level overview of the most important aspects you should know about, including its community and professional ecosystem. If you’ve never seen TYPO3 before, you’ll learn how to make the most of it and what makes TYPO3 different from other content management systems you may have used before.You'll then move on to 10 hands-on guides. These step-by-step tutorials show you how to work with TYPO3 CMS. Each guide is self-contained, introducing a scenario, and showing you how to solve a given problem. The guides include references to documentation, examples, code samples, and everything you need to get the job done.The TYPO3 Guidebook will help you learn how to put your creative ideas online with TYPO3.WHAT YOU'LL LEARN* Scope, plan, design, and build efficient websites and web applications with TYPO3* Determine how TYPO3 can work best for you and how to avoid complications* Implement a project from idea to launch* Manage client expectations and complete TYPO3 projects on time and within budget* Understand TYPO3 terminology in practical terms* Create TYPO3 projects using best practices and configure them efficiently* Build integrations and features using TYPO3 Core APIsWHO THIS BOOK IS FORDecision makers, project managers, consultants and developersFELICITY BRAND, Open Strategy Partners. Felicity has more than ten years of experience as a writer and technical communicator. She spent the ten years before that as a business analyst. She has spent much of her career writing a variety of technical content for internal and external consumption—from online help to manuals, release notes, and in-house product training webinars, to web content and white papers. Felicity has a special knack for designing visuals and illustrations and a passion for clearly communicating technical concepts.HEATHER MCNAMEE, Open Strategy Partners. Heather is a technical communications professional with an M.Sc. in Learning and Technology. By using her marketing skills for good, she enables the right audiences to find, learn, and get the most out of the products they love. She loves working with subject-matter experts to distill their knowledge so newcomers can be successful. Since 2008, she’s developed hundreds of hours of documentation, learning, and certification materials to facilitate open-source technology and product adoption.JEFFREY A. “JAM” MCGUIRE, keynote speaker, Partner at Open Strategy Partners. Jeffrey helps organizations communicate and grow, finding and telling the stories that connect their technologies with the value they deliver. He builds on more than a dozen years of experience and a strong following at the intersection of open source software, business, and culture. His approach to technology marketing—sharing the human context of complex technology solutions, for example, celebrating their creators’ expertise and success—has left its mark in business and open source communities.PART 1: OVERVIEW.1. TYPO3 Showroom2. Designing and Planning with TYPO33. Building and Extending TYPO34.- Managing and Maintaining TYPO3PART 2: HANDS-ON GUIDES5. Guide 1 - Installing TYPO36. Guide 2 - Creating Your First TYPO3 Site7. Guide 3 - Extending TYPO38. Guide 4 - Planning, Building, and Using Content Elements9. Guide 5 - Create Your First Standalone Extension10. Guide 6 - Creating a Password-Protected Members' Area11. Guide 7 - Translating Your Site12. Guide 8 - Configure Content Management Workflow and Permissions13. Guide 9 -Creating a Business around TYPO314. Guide 10 - Debugging and Troubleshooting TYPO315. A Guidebook to Your New TYPO3 HomeAppendix A. GlossaryAppendix B. References
Blockchain Enabled Applications
Learn all about blockchain and its applications in cryptocurrency, healthcare, Internet of Things, finance, decentralized organizations, and more. Featuring case studies and practical insights, this book covers a unique mix of topics and offers insight into how to overcome hurdles that arise as the market and consumers grow accustomed to blockchain-based organizations and services.The book is divided into three major sections. The first section provides a historical background to blockchain technology. You will start with a historical context to financial capital markets when Bitcoin was invented, followed by mining protocols, the need for consensus, hardware mining, etc. Next, a formal introduction to blockchain is provided covering transaction workflow, role of decentralized network, and payment verification. Then, we dive deep into a different implementation of a blockchain: Ethereum. The main technical features, such as Ethereum Virtual Machine, are presented along with the smart contract programming language, Solidity.In this second section, you will look at some modern use cases for blockchain from a decentralized autonomous organization, high-performance computing in Ethereum and off-grid computations, and healthcare and scientific discovery. The final section of the book looks toward the future of blockchain. This is followed by chapters covering the rise of consortia in the blockchain world, the Hyperledger project, particularly the updates since 2018, and a chapter on educational blockchain games. This is followed by updates to EOS.IO, Chain Core, and Quorum, ICOs and a look at the major changes to financial markets brought about by blockchain and decentralized networks.WHAT YOU WILL LEARN* Get an overview of the popular games employed to teach the basic concepts of blockchain and decentralized networks* Be familiar with the rise of blockchain consortiums as well as updates to Hyperledger Project, 2020* Find out about cloud blockchains, including Microsoft Azure and Amazon Webservices, and how to set up test environments* Study machine learning integration in the blockchain and the role of smart contractsWHO THIS BOOK IS FORBlockchain developers interested in keeping up with the newest updates and students looking for a broad overview of this vast ecosystem, plus business executives who want to make informed product decisions about including blockchain as well as policy makers who want a better understanding of the current use casesVIKRAM DHILLON is an internal medicine resident physician at Wayne State University, Detroit Medical Center and a research fellow at the Institute of Simulation and Training, University of Central Florida (UFC). He holds a bachelor of science degree in molecular biology from the University of Central Florida where his main focus was bioinformatics, a Doctor of Osteopathic Medicine, and a doctoral degree from Nova Southeastern University. He has published multiple scientific papers on computational genomics. He has worked as a software and business development coach at the Blackstone Launchpad to mentor young entrepreneurs and startups through the process of building technology products. He was previously funded by the National Science Foundation through the Innovation Corps program to study customer discovery and apply it to commercialize high-risk startup ideas. He is a member of the Linux Foundation and has been involved in open-source projects and initiatives for the past several years. He often speaks at local conferences and meetups about programming, design, security, and entrepreneurship.DAVID METCALF is a serial entrepreneur who has launched multiple successful ventures and spinoff companies. He has reviewed thousands of emerging technology companies as an advisor and investor. He is the Director of the Mixed Emerging Technology Integration Lab at UCF’s Institute for Simulation and Training. His past projects involving XR and IoT span across education, health, space, cyber, and transportation. Current efforts include smart cities, blockchain, and enterprise learning transformation for government and industry. He is the co-editor/author of Voice Technology in Healthcare (2020) and Blockchain in Healthcare (2019) as part of the HIMSS Emerging Technology Series, Blockchain Enabled Applications (2018), Connected Health (2017), HIMSS mHealth Innovation (2014), and the HIMSS best-seller mHealth: From Smartphones to Smart Systems (2012).MAX HOOPER is the chief executive officer of Merging Traffic. He is responsible for the company’s management and growth strategy, serving as the corporate liaison to the financial services industry and various capital formation groups. Prior to starting the company, he was co-founder of Equity Broadcasting Corporation (EBC), a media company that owned and operated more than 100 television stations across the United States. He was responsible for activities in the cable, satellite, investment banking, and technology industries, and during his tenure, it grew to become one of the top 10 largest broadcasting companies in the country. He is a lifelong learner and has earned five doctorate degrees: PhD, DMin, PhD, ThD, and DMin from a variety of institutions. Hooper studied financial technology with cohorts at MIT, and cryptocurrency and business disruption with cohorts at the London School of Economics. As an avid runner, he has completed more than 100 marathons and an additional 20 ultra-marathons, which are 50- or 100-mile runs. He has completed the Grand Slam of Ultra Running. He is committed to his family and is a husband, father to five children, and grandfather to seven grandsons. He is active in many organizations and serves on various boards of directors. He works globally with several ministries and nonprofit aid groups and was honored to speak at the United Nations in New York in 2015.CHAPTER 1: BEHOLD THE DEAMERSChapter Goal: Provide a backdrop for introducing blockhain and the basics of a decentralized appSub -Topics:1. Financial crisis of 2008, the origins of bitcoin2. Basics of private-public keys3. What is a block, how is a block created4. What's a blockchain-enabled application? What is a decentralized application?CHAPTER 2: GOLD RUSH: MINING BITCOINChapter Goal: Provide a technical introduction to mining and the mathematical background to hashes, block headers, and consensusSub -Topics:1. Overview of mining, why is mining necessary for Bitcoin2. What is consensus3. Components of a block and a block header (mining components)4. What are hashes and how are they used in Bitcoin5. Hardware for mining (the gold rush part refers to the arms race that happened in hardware mining field).CHAPTER 3: FOUNDATIONS OF A BLOCKCHAINChapter Goal: Provide a technical introduction to transaction workflow, a blockchain network, simple payment verification, merkel roots, and block identifiersSub -Topics:1. What is a block header (block identifiers)2. How does the network participate3. A transaction workflow4. Unspent transaction outputs, transaction propagation5. Simple payment verification6. Merkel roots, blockchain forksCHAPTER 4: UNPACKING ETHEREUMChapter Goal: Provide a technical introduction to Ethereum, the differences between a Bitcoin blockchain and Ethereum blockchain, internal states, Ethereum Virtual Machine, and dAppsSub -Topics:1. Overview of Ethereum2. Proof of stake3. Accounts and contract model in Ethereum4. Global state, gas, internal storage5. Ethereum Virtual Machine6. Solidity programming language + Smart Contracts7. World Computer Model and components8. Blockchain as a service9. Decentralized apps10. Geth, MistCHAPTER 5: DECENTRALIZED ORGANIZATIONS (DAOS)Chapter Goal: Provide a technical introduction to DAOs and Aragon for setting up a DAO, including updates to new implementations of decentralized organizations in 2020.Sub -Topics:1. What is a DAO2. What is a blockchain organizations/companies3. Aragon-core and Kernel4. How do you make DAOs and other blockchain organizations using Aragon?5. How do you operate DAOs?CHAPTER 6: THE DAO HACKEDChapter Goal: Provide an overview to the vulnerabilities in the original DAO model, the conditions that led up to the hack, and the consequences to security hardening since.Sub -Topics:1. Concept of a DAO building on Vitalik’s concepts2. Slock.it and its involvement in making the DAO3. The Smart Contract for DAO4. The code vulnerability responsible for the hack5. Consequences of the hack6. Ethereum splitting into ETCCHAPTER 7: ETHEREUM TOKENS: HIGH PERFORMANCE COMPUTING (HPC)Chapter Goal: Provide an introduction to token in Ethereum by highlighting applications in HPC. Particularly, focus on Golem, SONM, and iEx.ec grid computing for off-chain computations and conflict resolution.Sub -Topics:1. Why tokens and what’s the value of using tokens2. Introduction to tokens, ERC 20 compatibility3. Token layer and an app layer4. Prototype for tokens and HPC – Ethereum Computation Markets5. Golem network, app registry, transaction framework, use-cases initially, and how the Smart Contract system ties them together6. SONM network and fog computing, use-cases, Smart Contract system, buyer-miner-hub interactions, purchasing computational power, Superglobal architecture, and OS7. iEx.ec, grid computing, sidechains, and how iEx.ec worksCHAPTER 8: BLOCKCHAIN IN HEALTHCAREChapter Goal: Provide an introduction to areas in healthcare where using a blockchain can provide benefit - Patient workflows, insurance claims processing, lightning network, verifiable data auditSub -Topics:1. Payer-provider-patient model, how claims work within this framework, and how will that change in the future2. Patient workflow based on permissions, blockchain-based workflow of a simple EHR, how permissions are passed as a patient moves from a general physician to a specialist3. Show how permissions work in blockchain insurance claims processing4. Waste management in healthcare and claims processing5. Concept of hotswitching, mentioning lightning network6. How can blockchain be used to reduce economic waste7. DeepMind’s Verifiable Data Audit as an alternative to blockchain8. Blockchain to streamline business processesCHAPTER 9: BLOCKCHAIN IN SCIENCEChapter Goal: Provide an introduction to major topics in science where blockchain can be beneficial – Reputation markets, reproducibility crisis, drug tracking, digital clinical trialsSub -Topics:1. Reproducibility crisis in science2. Prediction markets in science – Augur and Gnosis3. Initiatives to fix reproducibility traditionally4. Clinical trials using the blockchain, colored coins to demonstrate workflow5. Reputation systems using Blockchain6. Pharma drug tracking using blockchainCHAPTER 10: BUILDING HEALTHCARE COMPANIES ON BLOCKCHAINChapter Goal: Interview with John Bass on how to build a healthcare company on the blockchain and lessons learned along the way.Sub -Topics:1. The makings of Hashed Health2. Collaborative and consortium models3. Working groups for high-risk, high-reward technologies4. Governance models for Hashed Health consortia5. Member participationCHAPTER 11: RISE OF CONSORTIUMSChapter Goal: Provide an overview of consortium models that have become popular in the blockchain industry, the challenges consortiums hope to solve, and advantages to individual membersSub -Topics:1. Collaborative and consortium models2. Working groups for high-risk, high-reward technologies3. Governance models for Hashed Health consortiaCHAPTER 12: THE HYPERLEDGER PROJECTChapter Goal: Provide a broad overview of the Hyperledger Project and cover the rapid pace of developments since 2018 to the new products launched.Sub -Topics:1. Updates to all the components under Hyperledger umbrella including Fabric and Sawtooth2. New consensus algorithm (PBFT)3. Demo of Hyperledger Fabric Constructor4. Does your business need a blockchain (flowcharts)?5. Security in enterprise-grade Blockchains6. Smart Contracts in FabricCHAPTER 13: RECENT ADVANCES IN BLOCKCHAINChapter Goal: Provide a review of three major networks shaping the future of Blockchain – EOS.io with parallel processing virtual machine, chain-core with asset management, and Ivy Playground and Quorum with private–public transaction interfacesSub -Topics:1. EOS.io, how the tech works, the new advances such as parallel processing of smart contracts and instructions2. Chain Core, managing assets on blockchain, Ivy Playground as the new programming language to manage assets3. Quorum by JP Morgan, how the consensus works, how private transactions work, zero-knowledge proofs, Ethereum Enterprise AllianceCHAPTER 14: BLOCKCHAIN GAMESChapter Goal: Provide a review of the educational games and APIs that have been released to teach the basic concepts of a blockchain networkSub -Topics:1. Components of a blockchain game2. Formal education and training in blockchain3. Formalization of blockchain study with journals and research articles4. Review of major blockchain games (3)CHAPTER 15: CLOUD BLOCKCHAINSChapter Goal: Provide an overview of how to click and deploy a blockchain using cloud services and give a visual tutorial on how to set it upSub -Topics:1. Demo of Hyperledger Fabric Constructor on IBM Bluemix2. Azure blockchain deployment3. Amazon ECS cloud blockchain deployment4. Setting up your own blockchain test-lab and budget itCHAPTER 16: TECHNOLOGICAL REVOLUTIONS AND FINANCIAL CAPITALChapter Goal: Provide an overview of the financial markets and ICOs, focusing particularly on how to set up ICOs, how to manage them, advances to financial regulation technology based on blockchainSub -Topics:1. Dr. Hooper’s chapter focused on ICOs and financial capital markets2. Setting up ICOs, major pitfalls to avoid, and challenges to overcome during an ICO3. Major tech advances in financial markets using blockchain4. Reg TechAFTERWORD – CALL TO ACTION AND THE FUTURE OF BLOCKCHAIN
Data Science - Analytics and Applications
Organisationen sind bereits von der starren Struktur des klassischen Projektmanagements zu agilen Ansätzen übergegangen. Dies gilt auch für Softwareentwicklungsprojekte, die flexibel sein müssen, um schnell auf die Wünsche der Kunden reagieren zu können und um Änderungen zu berücksichtigen, die aufgrund von Architekturentscheidungen erforderlich sind. Nachdem sich die Datenwissenschaft als Eckpfeiler in Organisationen und Unternehmen etabliert hat, ist es nun zwingend erforderlich, diesen entscheidenden Schritt auch für analytische Geschäftsprozesse durchzuführen. Die nicht-deterministische Natur der Datenwissenschaft und die ihr innewohnenden analytischen Aufgaben erfordern einen interaktiven Ansatz für eine evolutionäre, schrittweise Entwicklung zur Realisierung der wichtigsten Geschäftsanwendungen und Anwendungsfälle.Die 3. Internationale Konferenz zur Datenwissenschaft (iDSC 2020) brachte Forscher, Wissenschaftler und Wirtschaftsexperten zusammen, um Möglichkeiten zu erörtern, wie neue Wege zur Umsetzung agiler Ansätze in den verschiedenen Bereichen der Datenwissenschaft, wie maschinelles Lernen und KI, Data Mining oder Visualisierung und Kommunikation, sowie Fallstudien und Best Practices von führenden Forschungseinrichtungen und Wirtschaftsunternehmen etabliert werden können.Der Tagungsband umfasst alle im wissenschaftlichen Track vorgestellten Volltexte und die Kurzbeiträge aus dem studentischen Track.Zu den Themen, die Sie interessieren, gehören unter anderem:* Künstliche Intelligenz und Maschinelles Lernen * Implementierung von Data-Mining-Prozessen * Agile Datenwissenschaft und Visualisierung * Fallstudien und Anwendungen für Agile DatenwissenschaftOrganizations have moved already from the rigid structure of classical project management towards the adoption of agile approaches. This holds also true for software development projects, which need to be flexible to adopt to rapid requests of clients as well to reflect changes that are required due to architectural design decisions. With data science having established itself as corner stone within organizations and businesses, it is now imperative to perform this crucial step for analytical business processes as well. The non-deterministic nature of data science and its inherent analytical tasks require an interactive approach towards an evolutionary step-by-step development to realize core essential business applications and use-cases.The 3rd International Data Science Conference (iDSC 2020) brougt together researchers, scientists, and business experts to discuss means of establishing new ways of embracing agile approaches within the various domains of data science, such as machine learning and AI, data mining, or visualization and communication as well as case studies and best-practices from leading research institutions and business companies.The proceedings include all full papers presented in the scientific track and the short papers from the student track.Among the topics of interest are:* Artificial Intelligence and Machine Learning * Implementation of data mining processes * Agile Data Science and Visualization * Case Studies and Applications for Agile Data SciencePETER HABEr is a Professor of Information and Communication Technology, in particular for analog and digital signal processing, and responsible coordinator for system theory and electrical engineering at Salzburg University of Applied Sciences. He is a researcher and project manager, leading and coordinating national and international projects in the field of IT and IT management, while also integrating data science solutions at businesses. Since 2009 he has been a member of the international advisory board for the IATED conferences.THOMAS LAMPOLTSHAMMER is an Assistant Professor for ICT and Deputy Head of the Centre for E-Governance at the Department of E-Governance and Administration, Danube University Krems, Austria. His current research focus is on the domain of data governance, the effects of ICT application in a connected society, and the effects on a data-driven society. He has a substantial background in the design and implementation of expert and decision-making systems, data analytics, and semantic-based reasoning.MANFRED MAYR is the Academic Program Director for “Business Informatics and Digital Transformation” as well department head for IT-Management at Salzburg University of Applied Sciences. He is a lecturer at international conferences and the author of various publications in the field of business informatics and researches business applications of data science. The digitalisation of ERP applications in the industrial environment is a long-standing and important field of his research. In addition, he has coordinated several national and international research projects.KATHRIN PLANKENSTEINER is the Head of „Data Analytics & Intelligence“ at the research center Digital Factory Vorarlberg, FH Vorarlberg University of Applied Science. She studied technical mathematics and data analysis and holds a PhD in Applied Statistics from the University of Klagenfurt (Austria). Her field of research includes reliability testing and analyzing, lifetime modeling, regression analysis, computational statistics, multivariate data analysis, statistical inference, reasoning, & statistical machine learning.The editors are the conference chairs of the International Data Science Conference.-------PETER HABER ist Professor für Informations- und Kommunikationstechnik, insbesondere für analoge und digitale Signalverarbeitung, und verantwortlicher Koordinator für Systemtheorie und Elektrotechnik an der Fachhochschule Salzburg. Er ist Forscher und Projektleiter, leitet und koordiniert nationale und internationale Projekte im Bereich IT und IT-Management und integriert datenwissenschaftliche Lösungen in Unternehmen. Seit 2009 ist er Mitglied des internationalen Beirats für die IATED-Konferenzen.THOMAS LAMPOLTSHAMMER ist Assistenzprofessor für IKT und stellvertretender Leiter des Zentrums für E-Governance am Lehrstuhl für E-Governance und Verwaltung, Donau-Universität Krems, Österreich. Sein aktueller Forschungsschwerpunkt liegt auf dem Gebiet der Datenverwaltung, den Auswirkungen der IKT-Anwendung in einer vernetzten Gesellschaft und den Auswirkungen auf eine datengesteuerte Gesellschaft. Er verfügt über einen substantiellen Hintergrund im Design und in der Implementierung von Experten- und Entscheidungssystemen, Datenanalyse und semantisch-basierter Argumentation.MANFRED MAYR ist Akademischer Programmdirektor für "Wirtschaftsinformatik und digitale Transformation" sowie Abteilungsleiter für IT-Management an der Fachhochschule Salzburg. Er ist Vortragender bei internationalen Konferenzen und Autor verschiedener Publikationen im Bereich der Wirtschaftsinformatik und forscht zu betriebswirtschaftlichen Anwendungen der Datenwissenschaft. Die Digitalisierung von ERP-Anwendungen im industriellen Umfeld ist ein langjähriges und wichtiges Feld seiner Forschung. Darüber hinaus hat er mehrere nationale und internationale Forschungsprojekte koordiniert.KATHRIN PLANKENSTEINER ist Leiterin der Abteilung "Data Analytics & Intelligence" am Forschungszentrum Digitale Fabrik Vorarlberg, FH Vorarlberg. Sie studierte Technische Mathematik und Datenanalyse und promovierte in Angewandter Statistik an der Universität Klagenfurt (Österreich). Ihr Forschungsgebiet umfasst Zuverlässigkeitstests und -analysen, Lebensdauermodellierung, Regressionsanalyse, rechnergestützte Statistik, multivariate Datenanalyse, statistische Inferenz, logisches Denken und statistisches maschinelles Lernen.Die Herausgeber sind die Konferenzvorsitzenden der International Data Science Conference.Abstracts of Industry Contributions - Non Peer-Reviewed Invited Papers - German Abstracts of Peer-Reviewed Full Papers - Peer-Reviewed Full Papers - Data Science Frameworks - Bayesian Analysis - Optimizing Methods for Data Science - Deep Learning Applications
Internet of Things in Business Transformation
The objective of this book is to teach what IoT is, how it works, and how it can be successfully utilized in business. This book helps to develop and implement a powerful IoT strategy for business transformation as well as project execution. Digital change, business creation/change and upgrades in the ways and manners in which we work, live, and engage with our clients and customers, are all enveloped by the Internet of Things which is now named "Industry 5.0" or "Industrial Internet of Things." The sheer number of IoT(a billion+), demonstrates the advent of an advanced business society led by sustainable robotics and business intelligence. This book will be an indispensable asset in helping businesses to understand the new technology and thrive.PARUL GANDHI obtained her PhD in Computer Science and Software Engineering from Guru Jambheshwar University, Hisar, India. She is an associate professor at the Manav Rachna International Institute of Research and Studies (MRIIRS), Faridabad where she also handles the PhD program. She has published more than 30 research papers in reputed journals and conferences. Her research interests include software quality, soft computing, software metrics and component-based software development, data mining, IOT. SURBHI BHATIA obtained her PhD in Computer Science and Engineering from Banasthali Vidypaith, India. She is an assistant professor in the Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia. She has published seven patents with the Government of India and more than 25 papers in reputed journals and conferences in high indexing databases. She is an active researcher in the field of data mining, machine learning, deep learning and information retrieval. ABHISHEK KUMAR obtained his PhD in Computer Science from the University of Madras. He is an assistant professor in the Department of Computer Science & Engineering, Chitkara University Institute of Engineering and Technology, India. He has more than 60 publications in peer-reviewed journals and has edited more than 15 books. His research areas include AI, image processing, computer vision, data mining, machine learning. MOHAMMAD ALOJAIL obtained his PhD in Information systems from RMIT University, Australia. He is the Chairman of Information System Department, College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia. He has considerable experience in the field of information systems and has delivered many presentations on leadership and management as well as successfully leading and managing teams to deliver large scale industrial projects. Dr. Alojail has written many scholarly papers in the field of IS and IT outsourcing. PRAMOD SINGH RATHORE is pursuing his Doctorate in Computer Science & Engineering from Bundelkhand University, India. He has been working as an assistant professor at the Computer Science & Engineering Department at Aryabhatt Engineering College and Research Centre, Rajasthan. He has more than 45 publications in peer-reviewed journals. Über die Autorin 9EINFÜHRUNG 19Über dieses Buch 20Konventionen in diesem Buch 20Was Sie nicht lesen müssen 21Törichte Annahmen über die Leser:innen 21Wie dieses Buch aufgebaut ist 22Teil I: Männlich, weiblich, divers – alle Geschlechter ansprechen 22Teil II: Sechs Arten zu gendern 22Teil III: Richtig gendern in jeder Situation 23Teil IV: Der Top-Ten-Teil 23Symbole, die in diesem Buch verwendet werden 23Wie es weitergeht 24TEIL I: MÄNNLICH, WEIBLICH, DIVERS – ALLE GESCHLECHTER ANSPRECHEN 25KAPITEL 1 WAS ES MIT DEM GENDERN AUF SICH HAT27Gendern heißt: Alle Geschlechter gleich ansprechen 27Wie viele Geschlechter gibt es überhaupt? 28Viele Ideen, ein Ziel: So geht Gendern 29Darum ist gendergerechte Sprache wichtig 29Alle mitmeinen? Gar nicht so einfach! 30Das AGG und andere Gesetze 31Finden Sie Ihre Art zu gendern 32Ihre Werte zählen 32Was Ihre Zielgruppe will 33Keine Angst vor Hater:innen 33KAPITEL 2 DIVERS: DAS GESETZ ZUM DRITTEN GESCHLECHT35Wer mit »divers« gemeint ist 35Mit uneindeutigen Geschlechtsmerkmalen geboren 36Transgeschlechtliche Menschen 36So hat sich das Personenstandsgesetz verändert 38Eine dritte Geschlechtsoption – leider nicht für alle 39Die Sache mit der Bürokratie 40Was die Option »divers« für das Gendern bedeutet 41Sprachvarianten, die alle Geschlechter einschließen 41Blick in die Zukunft: ein drittes Pronomen? 42KAPITEL 3 WARUM DAS GENERISCHE MASKULINUM NICHT GESCHLECHTSNEUTRAL IST45Die deutsche Sprache ist männlich dominiert 45Sprachen mit Geschlecht: Genus und Sexus 46Vermeintlich neutral: Das generische Maskulinum 47Frauen fühlen sich nicht angesprochen 48Vom subjektiven Empfinden… 48… und was Studien sagen 49Stereotype spielen auch eine Rolle 50Wie das generische Maskulinum zu Missverständnissen führt 50Die Lösung: Geschlechtergerechte Sprache 51Und ein generisches Femininum? 52Die Sache mit der Lesbarkeit 52TEIL II: SECHS ARTEN ZU GENDERN 55KAPITEL 4 DIE PAARFORM57Immer Hand in Hand 57Das perfekte Match: Paarform und neutral Formulierungen 58Für Sparfüchse: Sparschreibungen gegen Wortwiederholungen 59Die Paarform ist einfach umzusetzen 61Verständlich und lesbar – für alle 61Rechtschreibung und Grammatik? Kein Problem! 61Hier geht es aber nur um Männer und Frauen 62Mitgemeint und mitgenannt – viele Frauen freuen sich! 62Lesbarkeit oder Inklusivität: Das große Dilemma 63Checkliste: Wann die Paarform zu Ihnen passt 64KAPITEL 5 BINNEN-I UND SCHRÄGSTRICH65Die Rentner:innen unter den Arten zu gendern 65Der Schrägstrich verkürzt die Paarform 65Binnen-I: Großbuchstaben statt nerviger Sonderzeichen 66Alte Bekannte lädt man gerne ein 67Das Problem mit der Lesbarkeit 68Vorsicht: Verwechslungsgefahr und Stolperfallen 68Da schwirrt den Leser:innen der Kopf 69Ob sich Binnen-I und Schrägstrich lohnen 70Checkliste: Wann Binnen-I oder Schrägstrich zu Ihnen passen 71KAPITEL 6 NEUTRALE FORMULIERUNGEN73Sagen Sie’s doch mal neutral 73Machen Sie Verb oder Adjektiv zum Substantiv 74-kraft und -schaft anhängen 75Diese Wörter sind sowieso schon neutral 76Es kann so einfach sein 78Sie gendern und keine:r merkt’s 78Stark im Team mit anderen Arten zu gendern 78Doch es lauern Fallstricke 79Ist da wirklich kein Geschlecht? 80Zusammengesetzte Wörter 80Neutral, aber unpersönlich 82Checkliste: Wann neutrale Formulierungen zu Ihnen passen 82KAPITEL 7 STERNCHEN, UNTERSTRICH UND DOPPELPUNKT – DER GENDER-GAP83Mut zur Lücke 83Diese Sonderzeichen dürfen Sie wählen 84Wo die Lücke hingehört – und wo nicht 85Das passiert mit Artikeln und Personalpronomen 86Alle fühlen sich gemeint 87Nichtbinäre Menschen richtig ansprechen 88Experimente mit Pronomen 88Aber nicht alle haben Zugang 89Wo der Gender-Gap an seine Grenzen stößt 89Komplizierte Formulierungen umschiffen 90Checkliste: Wann der Gender-Gap zu Ihnen passt 91KAPITEL 8 DAS PRINZIP DER ROLLENVERTEILUNG 93Mal so, mal so – aber nach Plan 93Aktivieren Sie Ihre Vorstellungskraft 94Was mit dem Plural passiert 95Stolperfallen ade! 96Die Mischung macht’s 97Perfekt als Ergänzung zu Gender-Gap und Co. 97Gute Lesbarkeit hat ihren Preis 98Wer nicht mitspielt 98Vorsicht vor stereotypen Rollenbildern 99Checkliste: Wann das Prinzip der Rollenverteilung zu Ihnen passt 100TEIL III: RICHTIG GENDERN IN JEDER SITUATION 101KAPITEL 9 GENDERN IN STUDIUM UND BERUF103Richtig gendern in Haus- und Abschlussarbeit 103Mitgemeint in der Fußnote 104Wer sucht, der findet: Die Vorgaben Ihrer Hochschule 104Kein Punktabzug für Fehler beim Gendern 106Worauf Sie in Ihrer Arbeit achten sollten 106Geschlechtergerechte Sprache im Berufsalltag 107Gendern als Teil der Corporate Language 108E-Mails und Anrede: So treten Sie niemandem auf die Füße 109Geschlechtergerechte Sprache bindet Kund:innen! 111Alle Geschlechter ansprechen in der Stellenanzeige 112Hier ist Gendern Pflicht: Das Allgemeine Gleichbehandlungsgesetz 113M/W/D/X/Y/Z: So behalten Sie den Durchblick 114KAPITEL 10 GENDERN IM INTERNET 117Gendern und Suchmaschinenoptimierung vereinbaren 117Was Suchmaschinenoptimierung eigentlich ist 118So suchen wir im Web 119Die Suchmaschine austricksen 122SEO für Frauen: So werden Sie online gefunden 123Sie müssen sich nicht als Mann ausgeben 123Nutzer:innen haben die Macht 124Digitale Texte für die Sprachausgabe gendern 125KAPITEL 11 BARRIEREFREI GENDERN – DAMIT ALLE MITKOMMEN127Wann Gendern nicht barrierefrei ist 127Geschlechterinklusiv schreiben für blinde Menschen 129Digitale Texte und die Vorlesefunktion 130Die Sache mit der Blindenschrift 131Gendern in Leichter und Einfacher Sprache 132Leicht für alle 133Das Gendern erklären 134KAPITEL 12 GESCHLECHTERGERECHT SPRECHEN 137Mündlich gendern – kein Problem 137In der Paarform sprechen 138Die Lücke richtig aussprechen 138Die Macht der Gewohnheit bezwingen 139Wie Medien gendern 141Beispiele aus Fernsehen und Radio 141Als Medienmacher:in gendergerecht sprechen 142Mit und über nichtbinäre Menschen sprechen 143TEIL IV: TOP-TEN-TEIL 147KAPITEL 13 ZEHN PUNKTE, DIE ES BEIM GENDERN ZU BEACHTEN GILT149Lesbarkeit geht vor 149Die richtige Art zu gendern gibt es nicht 149Es gibt keine falsche Art zu gendern 150Im ganzen Satz wird’s manchmal schwierig 150Schnelle Hilfe aus dem Genderwörterbuch 151Verzetteln Sie sich nicht 151Treffen Sie eine Entscheidung 151Beachten Sie die Vorgaben 152Zwei oder alle Geschlechter 152Lassen Sie sich nicht verunsichern 153KAPITEL 14 ZEHN WÖRTER, DIE SIE NICHT GENDERN MÜSSEN155Geschlechtsneutrale Substantive 155Verben 155Adjektive 156Verwendete Literatur 157Stichwortverzeichnis 159
A Web-Based Approach to Measure Skill Mismatches and Skills Profiles for a Developing Country:
Several interdisciplinary studies highlight imperfect information as a possible explanation of skill mismatches, which in turn has implications for unemployment and informality rates. Despite information failures and their consequences, countries like Colombia (where informality and unemployment rates are high) lack a proper labour market information system to identify skill mismatches and employer skill requirements. One reason for this absence is the cost of collecting labour market data. Recently, the potential use of online job portals as a source of labour market information has gained the attention of researchers and policymakers, since these portals can provide quick and relatively low-cost data collection. As such, these portals could be of use for Colombia. However, debates continue about the efficacy of this use, particularly concerning the robustness of the collected data. This book implements a novel mixed-methods approach (such as web scraping, text mining, machine learning, etc.) to investigate to what extent a web-based model of skill mismatches can be developed for Colombia. The main contribution of this book is demonstrating that, with the proper techniques, job portals can be a robust source of labour market information. In doing so, it also contributes to current knowledge by developing a conceptual and methodological approach to identify skills, occupations, and skill mismatches using online job advertisements, which would otherwise be too complex to be collected and analysed via other means. By applying this novel methodology, this study provides new empirical data on the extent and nature of skill mismatches in Colombia for a considerable set of non-agricultural occupations in the urban and formal economy. Moreover, this information can be used as a complement to household surveys to monitor potential skill shortages. Thus, the findings are useful for policymakers, statisticians, and education and training providers, among others.
AWS Certified Security Study Guide
GET PREPARED FOR THE AWS CERTIFIED SECURITY SPECIALTY CERTIFICATION WITH THIS EXCELLENT RESOURCEBy earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It’s also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers.Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications.The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics.* Covers all AWS Certified Security Specialty exam topics* Explains AWS cybersecurity techniques and incident response* Covers logging and monitoring using the Amazon cloud* Examines infrastructure security* Describes access management and data protectionWith a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.ABOUT THE AUTHORSDARIO GOLDFARB is a Security Solutions Architect at Amazon Web Services in Latin America. He has more than 15 years of experience in cybersecurity. ALEXANDRE M.S.P. MORAES is a Director of Teltec, a Brazilian systems integrator that is highly specialized in Network Design, Security Architectures and Cloud Computing. THIAGO MORAIS is the leader of Solutions Architecture teams at Amazon Web Services in Brazil. He has more than 20 years of experience in the IT industry. MAURICIO MUÑOZ is a Sr. Manager of a Specialist Solutions Architects team at Amazon Web Services in Latin America. He's worked in IT for more than 20 years, specializing in Information Security. MARCELLO ZILLO NETO is a Chief Security Advisor and a former Chief Information Security Officer (CISO) in Latin America. He has over 20 years of experience in cybersecurity and incident response. GUSTAVO A. A. SANTANA is the leader of the Specialist and Telecommunications Solutions Architecture teams at Amazon Web Services in Latin America. FERNANDO SAPATA is a Principal Business Development Manager for Serverless at Amazon Web Services in Latin America. He has more than 19 years of experience in the IT industry. Prolog 91. EINLEITUNG 15Veränderung 17Innovationsfähigkeit: Ohne Druck keine Bewegung 23Vier historische technische Revolutionen und ihrWeg zur Akzeptanz innerhalb der Gesellschaft 28Rückkehr zum eigenständigen, selbstermächtigten Menschen 31Mitarbeitende werden immer essenzieller 33Wissen verdoppelt sich, wenn man es teilt 352. MIT NETZWERKFÜHRUNG IN DIE ZUKUNFT 39Unternehmerische Voraussetzungen für das Gelingen von Netzwerken 42Führen in Netzwerken 48Unternehmensnetzwerke 52Inoffizielle Netzwerke 53Unternehmensinterne Netzwerke 54Unternehmensexterne Netzwerke 623. WAS HAT EIN PERÜCKENMACHER MIT STRATEGISCHER NETZWERKFÜHRUNG ZU TUN? 67Hierarchie und Eigenverantwortung 68Der Purpose geht uns alle an 87Serendipität 125Innovative Vernetzungsformate 134Mut zur Lücke 1634. WIE KANN AKTIV AUS TRENDS UND KRISEN GELERNT WERDEN? 167Wie können Vorbehalte abgebaut werden? 171Beispiel Corona – die Krise aktiv nutzen 172Krisen nutzen, um Gewohnheiten zu ändern 1755. WEITERBILDUNG UND PERSONALENTWICKLUNG ALS BEITRAG ZUR VERNETZUNG 183Disruption 1.0 derWeiterbildung 187Die neue Rolle der Personalentwicklung 191Mit dem TEAK®-Konfigurator auf Erfolgskurs 203Was ist Ihr Beitrag? 2366. DIE UNAUFHALTSAME DYNAMIK DES NETZWERKES AM BEISPIEL DER GROUP SCHUMACHER GMBH 2397. DIE NEUE PERSPEKTIVE DER ZUKUNFT – NACHWORT 249Danksagung 253Die Autorin 257Literaturverzeichnis 259Stichwortverzeichnis 269