Computer und IT
Textual Intelligence
THE BOOK IS A MUST-HAVE RESOURCE FOR ANYONE LOOKING TO UNDERSTAND THE COMPLEXITIES OF GENERATIVE AI, OFFERING COMPREHENSIVE INSIGHTS INTO LLMS, EFFECTIVE TRAINING STRATEGIES, AND PRACTICAL APPLICATIONS.Textual Intelligence: Large Language Models and Their Real-World Applications provides an overview of generative AI and its multifaceted applications, as well as the significance and potential of Large Language Models (LLMs), including GPT and LLaMA. It addresses the generative AI project lifecycle, challenges in existing data architectures, proposed use case planning and scope definition, model deployment, and application integration. Training LLMs, data requirements for effective LLM training, pre-training and fine-tuning processes, and navigating computational resources and infrastructure are also discussed. The volume delves into in-context learning and prompt engineering, offering strategies for crafting effective prompts, techniques for controlling model behavior and output quality, and best practices for prompt engineering. Textual Intelligence: Large Language Models and Their Real-World Applications also discusses cost optimization strategies for LLM training, aligning models to human values, optimizing model architectures, the power of transfer learning and fine-tuning, instruction fine-tuning for precision, and parameter-efficient fine-tuning (PEFT) with adapters such as LoRA, QLoRA, and soft prompts, making it an essential guide for both beginners and industry veterans. Readers will find this book:* Explores the real-world potential of large language models;* Introduces industry-changing AI solutions;* Provides advanced insights on AI and its models.AUDIENCEIndustry professionals, academics, graduate students, and researchers seeking real-world solutions using generative AI. MEENAKSHI MALIK, PHD is an assistant professor at BML Munjal University, India, with over 12 years of experience. She earned her computer science and engineering doctorate at Maharshi Dayanand University, Rohtak, in December 2023 and was honored by the Vice President for her exceptional PhD research. Her research interests include artificial intelligence, machine learning, deep learning, and big data. PREETI SHARMA, PHD is a faculty member at Chitkara University, Punjab, India. She is the author or co-author of over 12 publications in national and international journals and conferences. Dr. Sharma’s research interests include extensive work in blockchain and its diverse applications, as well as artificial intelligence and machine learning. SUSHEELA HOODA, PHD is an associate professor in the Department of Computer Science and Engineering, Chitkara University, Punjab, India. She has published over 30 technical research papers in national and international journals and conferences. Her research interests include software engineering, aspect-oriented software development, software testing, cloud computing, artificial intelligence, and machine learning.
Automated Machine Learning and Industrial Applications
THE BOOK PROVIDES A COMPREHENSIVE UNDERSTANDING OF AUTOMATED MACHINE LEARNING’S TRANSFORMATIVE POTENTIAL ACROSS VARIOUS INDUSTRIES, EMPOWERING USERS TO SEAMLESSLY IMPLEMENT ADVANCED MACHINE LEARNING SOLUTIONS WITHOUT NEEDING EXTENSIVE EXPERTISE.Automated Machine Learning (AutoML) is a process to automate the responsibilities of machine learning concepts for real-world problems. The AutoML process is comprised of all steps, beginning with a raw dataset and concluding with the construction of a machine learning model for deployment. The purpose of AutoML is to allow non-experts to work with machine learning models and techniques without requiring much knowledge in machine learning. This advancement enables data scientists to produce the easiest solutions and most accurate results within a short timeframe, allowing them to outperform normal machine learning models. Meta-learning, neural network architecture, and hyperparameter optimization, are applied based on AutoML. Automated Machine Learning and Industrial Applications offers an overview of the basic architecture, evolution, and applications of AutoML. Potential applications in healthcare, banking, agriculture, aerospace, and security are discussed in terms of their frameworks, implementation, and evaluation. This book also explores the AutoML ecosystem, its integration with blockchain, and various open-source tools available on the AutoML platform. It serves as a practical guide for engineers and data scientists, offering valuable insights for decision-makers looking to integrate machine learning into their workflows. Readers will find the book:* Aims to explore current trends such as augmented reality, virtual reality, blockchain, open-source platforms, and Industry 4.0;* Serves as an effective guide for professionals, researchers, industrialists, data scientists, and application developers; * Explores technologies such as IoT, blockchain, artificial intelligence, and robotics, serving as a core guide for undergraduate and postgraduate students.AUDIENCEData and computer scientists, research scholars, professionals, and industrialists interested in technology for Industry 4.0 applications. E. GANGADEVI, PHD is an assistant professor in the Department of Computer Science at Loyola College, Chennai, India. She has published two patents, six books, over 18 research papers in international journals, and many book chapters. Her areas of research are machine learning, deep learning, IoT, and cloud computing. M. LAWANYA SHRI, PHD is an associate professor in the School of Information Technology and Engineering at Vellore Institute of Technology, India. She has published two books, two patents, and over 50 articles and papers in refereed journals and international conferences. Her research interests include blockchain technology, machine learning, cloud computing, and IOT. BALAMURUGAN BALUSAMY, PHD is an associate dean at Shiv Nadar University, Delhi, India with over 12 years of teaching experience. He has published more than 200 papers in international journals, 80 books, and given over 195 talks at various international events and symposia. His contributions focus on engineering education, blockchain, and data sciences. RAJESH KUMAR DHANARAJ, PHD is a professor in the School of Computing Science and Engineering at Symbiosis University, Pune, India. He has contributed to over 25 books on various technologies, 21 patents, and 53 articles and papers in various refereed journals and conferences. His research interests include machine learning, cyber-physical systems, and wireless sensor networks.
Handbook of Intelligent Automation Systems Using Computer Vision and Artificial Intelligence
Handbook of Intelligent Automation Systems Using Computer Vision and Artificial Intelligence offers a corpus on intelligent automation systems using computer vision and AI. This book will cover everything from foundational concepts to real-world applications and ethical considerations. The book covers the major role, current trends, challenges, and possible solutions to existing challenges. With the knowledgeable insights of this book, readers gain actionable knowledge with case studies and the integration of various techniques, like facial recognition and natural language processing.This book contains 22 chapters on intelligent automation systems. The first section presents the study of intelligent automation systems, driven by artificial intelligence. This section further presents studies on the automation system and optimizing data flow management using AI algorithms. The second section provides a study of computer vision and how these systems automate tasks, like object recognition, image classification, and scene understanding. In addition, this section also explores the rapid advancements in computer vision and image processing and provides surveys on how AI enhances mental health services and patient outcomes. The third section explores the interconnection between neuroscience and artificial intelligence. Furthermore, this section provides studies of neural connections and how neuroscience aids in improving learning methods and validating AI modelsRupali Gill, Ph.D., is a professor and dean at Chitkara University Institute of Engineering & Technology, Chitkara University, Rajpura, Punjab, India. She is a distinguished researcher in image processing, cloud computing, artificial intelligence, and machine learning. She has published over 47 technical research papers in leading journals and conferences. Dr. Gill has also organized international conferences and published patents.Susheela Hooda, Ph.D., is an associate professor and head (academic delivery), Chitkara University of Engineering & Technology, Chitkara University, Rajpura, Punjab, India. She researches areas in software engineering, aspect-oriented software development, software testing, cloud computing, etc. She has published over thirty technical research papers in leading journals and conferences. She has published more than 10 national and international patents.Durgesh Srivastava, Ph.D., is a professor and head (academic operations), Chitkara University of Engineering & Technology, Chitkara University, Rajpura, Punjab, India. He is an enthusiastic and motivating technocrat who has organized and attended various workshops during his 15+ teaching career. His research interests include machine learning, soft computing, pattern recognition, software engineering, modeling, design, etc. He has published over 30 papers in reputed international/national journals and conferences/seminars. He has published several patents and copyrights in the field of computer software.Shilpi Harnal, Ph.D., is an associate professor at Chandigarh University, Punjab, India. She specializes in cloud computing. She has also worked on fog computing, underwater wireless sensor networks, artificial intelligence, etc. Dr. Harnal has published around 34 research papers in various international/national peer-reviewed journals, books, and conferences with 24 Scopus-indexed publications
Privileged Access Management
Zero trust is a strategy that identifies critical, high-risk resources and greatly reduces the risk of a breach. Zero trust accomplishes this by leveraging key tools, technologies, and governance around Privileged Access Management (PAM). These identities and accounts that have elevated access are the key targets of the bad actors and nearly every event, breach, or incident that occurs is the result of a privileged account being broken into.Many organizations struggle to control these elevated accounts, what tools to pick, how to implement them correctly, and implement proper governance to ensure success in their zero trust strategy. This book defines a strategy for zero trust success that includes a privileged access strategy with key tactical decisions and actions to guarantee victory in the never-ending war against the bad actors.What You Will Learn:* The foundations of Zero Trust security and Privileged Access Management.* Tie-ins to the ZT strategy and discussions about successful implementation with strategy and governance.* How to assess your security landscape including current state, risk-based gaps, tool and technology selection, and assessment output.* A step-by-step strategy for Implementation, including planning, execution, governance, and root-cause analysis.Who This Book is for:* C-level suite: not designed to be overly technical, but cover material enough to allow this level to be conversant in strategy and leadership needs to success.* Director-level in Cyber and IT: this level of personnel are above the individual contributors (IC) and require the information in this book to translate the strategy goals set by C-suite and the tactics required for the ICs to implement and govern.* GRC leaders and staff.* Individual Contributors: while not designed to be a technical manual for engineering staff, it does provide a Rosetta Stone for themto understand how important strategy and governance are to their success. Chapter 1: Privileged Access Management: The Essentials- Chapter 2: Zero Trust: Origins and Evolutions.- Chapter 3: Assessments and Solutions.- Chapter 4: PAM Governance.- Chapter 5: Blueprint for Successfull Implementation.- Chapter 6: Conclusion.
Modern Django Web Development
Django has evolved into a powerful full-stack framework ideal for developing data-driven web applications, continuously expanding with new tools for asynchronous solutions, APIs, and real-time applications. This book explores modern Django development best practices, including Django Channels for WebSockets, Django REST Framework (DRF) for REST APIs, Graphene and Strawberry for GraphQL APIs, and integrating a front-end built with React The content is structured into two main parts, covering both fundamental and advanced concepts in a practical and digestible manner.The first part introduces Django's core concepts, starting with an overview of web development and Python’s asyncio module for asynchronous processing. It then walks you through Django installation, project setup, and the admin interface. The Model-View-Template (MVT) architecture is explained in depth, with chapters on models, views, and templates, illustrating real-world examples. Additionally, it covers database interactions, introducing SQLAlchemy ORM and MongoDB integration to extend Django’s capabilities beyond its default ORM.The second part delves into advanced Django features and the broader ecosystem. Topics include authentication, security, messaging, and reusable apps such as the Django toolbar. REST API development with Django REST Framework is explored, followed by an introduction to building GraphQL APIs using Graphene and Strawberry. A dedicated chapter covers Django Channels and the WebSocket protocol for real-time applications. _Modern Django Web Development _concludes with integrating React to develop front-end clients for Django-based REST, GraphQL, and WebSocket APIs, enabling a full-stack development experience.YOU WILL:* Explore the full spectrum of modern Django development* Learn how to use SQLAlchemy MongoDB with Django* Understand Django Channels for asynchronous web apps* Explore DRF for building REST API in Django* Learn how to build GraphQL API with Graphene and Strawberry* Understand how to develop a Django-React appWHO IS IT FOR:Software developers, web developers and engineers who are interested in adding Django to their development skillset. Python Developers can also leverage the power of modern Django with the help of this practical guide.Chapter 1: Django Basics.- Chapter 2: Django- First Steps.- Chapter 3: Django ORM.- Chapter 4: Django Templates.- Chapter 5: Django using Databases.- Chapter 6: Advanced Django.- Chapter 7: Restful Django.- Chapter 8: GraphQL Django.- Chapter 9: Django Channels.- Chapter 10: ReactJS with Django.
Narrative SQL
This book addresses an important gap in data analytics education: the interplay between complex query-making and storytelling. While many resources cover the fundamentals of SQL queries and the technical skills required to manipulate data, few also explore moving beyond the numbers and figures to tell stories that drive strategic business decisions. By weaving together both SQL and narrative mechanics, author Hamed Tabrizchi has assembled a powerful tool for data analysts, aspiring database professionals, and business intelligence specialists.A strong foundation is laid in the first part of the book, which examines the technical skills necessary to access and manipulate data. You’ll explore foundational SQL commands, advanced querying techniques, data manipulation, data integrity, and optimization of queries for performance. The second half moves from the "how" of SQL to the "why," examining the meaning-making practices we can apply to data, and the stories data can tell. You'll learn how SQL queries can be interpreted, how to prepare data for visualization, and most importantly, how to convey the findings in a way that engages and informs the audience. In each chapter, practical exercises reinforce the techniques learned and help you apply them in real-world situations. In addition to strengthening technical skills, these exercises encourage readers to take a critical view of the data they are studying, considering the larger story it represents.Upon completing this book, you will not only be proficient in SQL, but also possess the key skill of converting data into narratives that can influence strategic direction and operational decisions in the modern workplace.WHAT YOU WILL LEARN* Advanced SQL Techniques: Master data manipulation and retrieval skills using advanced SQL queries* Data Analysis Proficiency: Develop analytical skills to uncover key insights and understand significant data patterns* Storytelling with Data: Learn to translate data analytics into compelling narratives for effective stakeholder communication* Complex Querying Skills: Understand advanced SQL concepts such as common table expressions (CTEs), subqueries, and window functions* Query Optimization: Optimize query execution time, resource usage, and scalability by mastering Indexes and Views* Practical Application of Techniques: Gain hands-on experience with practical examples of advanced SQL techniques in real-world data analysis scenarios* Effective Data Presentation: Discover strategies for visually presenting data stories to enhance engagement and understanding among diverse audiencesWHO THIS BOOK IS FORData analysts and business analysts, SQL developers, data-driven managers and executives and academics and students looking to enhance advanced querying and narrative building skills to better interpret and convey data.Chapter 1: The Storyteller’s Database.- Chapter 2: Starting with SELECT.- Chapter 3: Filtering Facts with WHERE.- Chapter 4: Complex Characters with JOINS.- Chapter 5: Aggregating Acts.- Chapter 6: Ordering the Plot with ORDER BY and LIMIT.- Chapter 7: Dynamic Dialogues with Subqueries.- Chapter 8: Conditional Logic in Data Plotting. Chapter 9: Optimizing Your Script with Indexes and Views.- Chapter 10: Analytics Alchemy: Turning Data into Gold.- Chapter 11: The Grand Finale: Presenting Your Data Story.- Appendix A: SQL Syntax Reference Guide.- Appendix B: Glossary of Terms.- Appendix C: PostgreSQL Elements Reference.
Building AI Agents with LLMs, RAG, and Knowledge Graphs
This AI agents book addresses the challenge of building AI that not only generates text but also grounds its responses in real data and takes action. Authored by AI specialists with deep expertise in drug discovery and systems optimization, this guide empowers you to leverage retrieval-augmented generation (RAG), knowledge graphs, and agent-based architectures to engineer truly intelligent behavior. By combining large language models (LLMs) with up-to-date information retrieval and structured knowledge, you'll create AI agents capable of deeper reasoning and more reliable problem-solving. Inside, you'll find a practical roadmap from concept to implementation. You’ll discover how to connect language models with external data via RAG pipelines for increasing factual accuracy and incorporate knowledge graphs for context-rich reasoning. The chapters will help you build and orchestrate autonomous agents that combine planning, tool use, and knowledge retrieval to achieve complex goals. Concrete Python examples built on popular libraries, along with real-world case studies, reinforce each concept and show you how these techniques come together. By the end of this book, you’ll be well-equipped to build intelligent AI agents that reason, retrieve, and interact dynamically, empowering you to deploy powerful AI solutions across industries.
Next Generation Data Science and Blockchain Technology for Industry 5.0
A GROUNDBREAKING VIEW OF THE INDUSTRIAL MODELS OF THE FUTUREIndustry 5.0 is an increasingly widespread term for the coming business paradigm, which will combine humans, robotics, and smart technology to create the industrial processes of the future. Technological innovations like smart factories, networked processes, data science, blockchain, and more will be combined to revolutionize industry and drive innovation at an unprecedented pace. Next Generation Data Science and Blockchain Technology for Industry 5.0 offers an overview of these most important questions, their early answers, and the most promising paths forward. Incorporating practical case studies grounded in real-world data, the book emphasizes a hands-on approach combining numerous analytical tools. With a broad view of the historical role of industrial revolutions and a cutting-edge grasp of the key technologies, this book is an indispensable window into the future of business. Next Generation Data Science and Blockchain Technology for Industry 5.0 readers will also find:* Incorporation of tools including statistical analysis, machine learning, graph analysis, and more* Detailed treatment of cutting-edge technologies like additive manufacture (3D printing), edge computing, and many others* Self-assessment tools to facilitate understandingNext Generation Data Science and Blockchain Technology for Industry 5.0 is ideal for academics, researchers, and advanced students in computer science and computer technology, as well as professionals and researchers working in data science or any other area of industrial technology. AMIT KUMAR TYAGI, PHD, is Assistant Professor in the Department of Fashion Technology, National Institute of Fashion Technology, New Delhi, India. He has published widely on blockchain, deep learning, artificial intelligence, and other cutting-edge technologies and their industrial applications.
Artificial Intelligence in Healthcare for the Elderly
Artificial Intelligence in Healthcare for the Elderly provides valuable insights into how artificial intelligence can transform healthcare through personalized monitoring, ethical considerations, and real-world applications. Artificial intelligence has the potential to revolutionize healthcare for the elderly by providing efficient and personalized monitoring and care. Though this technology has the potential to revolutionize care, there is currently little information on the potential of this technology in elderly healthcare. Artificial Intelligence in Healthcare for the Elderly explores AI algorithms that can transform health monitoring for older adults by analyzing data from wearable devices, electronic health records, and other sources that provide real-time data analysis, detect early warning signs of diseases, and offer personalized treatment. This book addresses the critical ethical, societal, and practical aspects of elderly care that are often overlooked with insights from various disciplines, including healthcare, technology, ethics, and sociology, to offer a holistic perspective on AI’s impact on aging. Artificial Intelligence in Healthcare for the Elderly offers an all-encompassing perspective on AI technologies employed in elderly healthcare by examining the specific types of technology used and delineating its role in elderly healthcare, drawing insights from existing research and case studies. SANDEEP SHARMA, PHD is an assistant professor in Bharati Vidyapeeth’s College of Engineering. He has published more than 15 research papers in reputed journals and one patent. His main area of focus is the use of heuristic techniques for finding the optimal parameters of FACTS devices in power systems. PREETI NAGRATH, PHD is an associate professor in Bharati Vidyapeeth’s College of Engineering with more than 20 years of academic experience. She has published over 80 research papers in international journals and international conferences, four books, and two patents. His research interests include network security, delay-tolerant networks, machine learning, and deep learning. BHAWNA SINGLA, PHD is a professor in the Computer Science and Engineering Department at the Panipat Institute of Engineering and Technology. She has published two edited books, three patents, and 30 research articles in international journals and conferences. His research interests include artificial intelligence, machine learning, data science, and networking JOEL J.P.C. RODRIGUES is a professor in the College of Computer Science and Technology at the China University of Petroleum, a senior researcher at the Instituto de Telecomunicações in Portugal, and a collaborator for the post-graduation program on teleinformatics engineering at the Federal University of Ceará in Brazil. He has authored and co-authored over 950 papers in refereed international journals and conferences, three books, and two patents. His research interests include sensor networks, Internet of Things, eHealth, vehicular networks, and cloud computing.
Blockchain in Health Sciences
THE BOOK PROVIDES A COMPREHENSIVE UNDERSTANDING OF HOW BLOCKCHAIN TECHNOLOGY CAN REVOLUTIONIZE HEALTHCARE BY IMPROVING PATIENT OUTCOMES, ENHANCING DATA PRIVACY, AND DRIVING INNOVATIVE SOLUTIONS TO INDUSTRY CHALLENGES.Blockchain in Health Sciences is an essential roadmap for navigating the complex landscape of blockchain technology in healthcare. From foundational concepts to real-world applications, this book empowers understanding to harness the potential of blockchain to improve patient outcomes, enhance data privacy, and optimize healthcare delivery. Delve into the integration of blockchain with the Internet of Things and AI to uncover groundbreaking solutions for challenges faced by the healthcare industry. Gain insights into the regulatory and ethical implications of blockchain in healthcare, ensuring responsible and effective implementation. Each chapter unveils the current uses of blockchain in drug discovery, drug and device tracking, real-world data collection, and increased patient engagement, used to unlock opportunities to advance health sciences research. This book is an essential guide for readers exploring opportunities to empower and enable data in health science research. Readers will find the volume:* Introduces the fundamentals of blockchain and its integration with IoT in healthcare;* Provides practical applications across patient records, drug supply chains, and genomics research;* Explores the synergy of AI, IoT, and blockchain for unprecedented healthcare advancements.AUDIENCEHealthcare professionals, researchers, policymakers, IT experts, and anyone interested in the future of healthcare. ARYAN CHAUDHARY is the Chief Scientific Advisor, BioTech Sphere Research, India. He has published academic papers on public and digital health in international journals and participated as a keynote speaker in many national and international conferences. His research includes the integration of Internet of Things and sensor technology for gathering vital signs through ambulatory monitoring, the functionality of artificial intelligence, machine learning for big data analytics for faster intervention, and tracking of prognosis and research for effective clinical research for the future development of treatments, drugs, pathological tests, and the supply system. RASHMI SINGH, PHD is a professor and placement coordinator at the Amity Institute of Applied Sciences with over 20 years of experience. She has published two books, 40 patents, and 18 articles in national and international journals of repute. Her research interests include fuzzy, soft, and rough set theory, near structures, and mathematics in artificial intelligence and machine learning. GAURAV AGARWAL, PHD is an associate professor and program chair in the School of Computer Science and Engineering at Galgotias University with over 20 years of teaching experience. He has published ten articles in international journals and conferences and eight patents. His research interests include web usability and accessibility, deep learning, machine learning, and large language models.
Leading The Shift
Leading the Shift: Enhancing Operational Efficiency With AI is a groundbreaking, experience-led guide for education leaders seeking to harness the power of artificial intelligence to drive meaningful transformation in their institutions. Written by Chris Loveday-a Vice Principal who led a sector-first AI implementation in a Sixth Form College, this book reframes AI not as a buzzword, but as a powerful tool for solving real, immediate operational challenges in education.While AI headlines often focus on classroom disruption or futuristic teaching tools, Loveday directs attention to where the greatest and most urgent gains can be made: in the back office. From automating data-heavy processes to reducing staff workload and improving service delivery, the book shows how AI, when applied thoughtfully, can create capacity, reduce pressure, and enhance outcomes for staff and students alike.Blending strategic insight with practical application, Leading the Shift walks readers through the entire implementation journey, from initial leadership buy-in and cultural groundwork to the development of bespoke AI agents and scaled deployment. It draws on established change models such as Burke-Litwin, Kotter, ADKAR, and Lewin's, integrating these frameworks with lived experience to demonstrate how to lead responsibly in a time of rapid technological advancement.Key features include:Real-World Case Studies: Learn how one college saved hundreds of hours through in-house AI agents built to automate results processing, ID verification, and student support.Ethical and Inclusive Design: Discover how to implement AI solutions that are safe, GDPR-compliant, and built around staff and student wellbeing.Strategic Leadership Tools: Use reflection questions, audit templates, and planning frameworks to inform your own AI roadmap.Customisation Over Commercialisation: Understand why building your own AI agents in-house can provide better value, flexibility, and control than off-the-shelf tools.Culture as Catalyst: Explore how digital trust, psychological safety, and inclusive communication are essential for sustainable innovation.This is not a technical manual or speculative vision. It's a leadership resource for education professionals, school business managers, senior leaders, MAT executives, governors, and policymakers, who want to act decisively and ethically in the face of emerging technology.Whether you're just starting your AI journey or seeking to scale an existing digital strategy, Leading the Shift offers clarity, courage, and a deeply practical blueprint. It's a must-read for anyone who believes that education can, and must, work smarter, not harder, in the age of intelligent automation.Join Chris Loveday in shaping the future of education, one intentional, values-led decision at a time.
Yocto Project Customization for Linux
Embedded computers have become very complex and are now called upon to solve a range of increasingly advanced problems. This added complexity means embedded systems need even more complex operating systems in order to work as required.The Yocto Project is now the effective standard for most embedded systems around the world due to its robustness and high configuration, availability of software packages and the ability to support several hardware platforms with common mechanisms so that developers can deploy their systems with ease regardless of the machine._Yocto Project Customization for Linux_ is not just another book talking about the Yocto Project, but shows how the Yocto Build system really works. Developers can easily and quickly move from the demo Yocto Project distributions that silicon vendors rely on for their development kits to their final product. This book is a practical guide teaching you everything you need to know about writing new recipes and customizing existing ones by explaining the Build System internals and how to manage them for your ongoing projects.YOU WILL LEARN:* To understand Yocto Project internals and how Yocto Project tools work* How to define a new meta layer or a new machine/distro in order to generate a custom Yocto Project image for their embedded system* To generate a new Yocto Project recipe for your software, or to alter an already existing recipe in order to fit your needs* How to update one or more packages on their running Yocto Project system* How to optimize and effectively manage the Yocto Build SystemWHO IS IT FOR:This is for embedded developers as well as Linux users who want to know more how to use Yocto1: Setting up the Build Environment.-2: Installing the Sources.-3: Yocto Basics.- 4: Yocto Tools.- 5: BitBake Internals.- 6: Recipes.- 7: Generating and Managing Layers.- 8: Adding New Hardware.- 9: C Application Recipes.- 10: Python Application Recipes.- 11: Miscellaneous Recipes.- 12: Image Recipes.- 13: Optimization and Best Practices.
Ethical Decision-Making Using Artificial Intelligence
Ethical Decision-Making Using Artificial Intelligence: Challenges, Solutions, and Applications gives invaluable insights into the ethical complexities of artificial intelligence, empowering the navigation of critical decisions that shape our future in an era where AI’s influence on society is rapidly expanding. The significant impact of artificial intelligence on society cannot be overstated in a time of lightning-fast technical development and growing integration of AI into our daily lives. A new frontier of human potential has emerged with the development and application of AI technologies, pushing the limits of what is possible in the areas of innovation and efficiency. AI systems are increasingly trusted with complicated decisions that affect our security, well-being, and the fundamental foundation of our societies as they develop in intelligence and autonomy. These choices have substantial repercussions for both individuals and communities in a wide range of fields, including healthcare, finance, criminal justice, and transportation. The necessity for moral direction and deliberate decision-making procedures is critical as AI systems develop and become more independent. Ethical Decision-Making Using Artificial Intelligence: Challenges, Solutions, and Applications examines the complex relationship between artificial intelligence and the moral principles that guide its application. This book addresses fundamental concerns surrounding AI ethics, namely what moral standards ought to direct the creation and use of AI systems. In order to promote responsible AI development that is consistent with human values and goals, this book’s goal is to equip readers with the knowledge and skills they need to traverse the ethical landscape of AI decision-making. SAPNA JUNEJA, PHD is a professor and Associate Dean of Research and Development in the Department of Computer Science and Engineering with the KIET Group of Institutions, with over 17 years of experience. She has published six patents and various research articles in renowned journals. Her research interests include software engineering, computer networks, operating systems, database management systems, and artificial intelligence. RAJESH KUMAR DHANARAJ, PHD is a professor at Symbiosis International University. He has authored and edited over 50 books, numerous book chapters, and over 100 articles in refereed international journals, in addition to 21 patents. His research interests include machine learning, cyber-physical systems, and wireless sensor networks. ABHINAV JUNEJA, PHD is a professor and the Head of the Department of Computer Science and Information Technology with the KIET Group of Institutions, with over 21 years of teaching experience. He has edited two books and has over 55 publications in books, journals, and conferences. His research focuses on machine learning and Internet of Things. MALATHY SATHYAMOORTHY, PHD is an assistant professor in the Department of Information Technology at the KPR Institute of Engineering and Technology. She has published over 25 research papers in international journals. 22 papers in international conferences, two patents, four book chapters, and one book. His research interests include wireless sensor networks, networking, security, and machine learning. ASADULLAH SHAIKH, PHD is a professor, the Head of Research and Graduate Studies, and the coordinator for seminars and training with the College of Computer Science and Information Systems, at Najran University. He has over 170 publications in international journals and conferences. His research interests include Unified Modeling Language model verification and class diagrams verification with Object Constraint Language constraints for complex models, formal verification, and feedback techniques for unsatisfiable UML and OCL class diagrams.
Wirtschaftsinformatik für Dummies
WERDEN SIE ZUM KOMPETENTEN IT-MANAGER!Dieses Buch vermittelt Ihnen alles Wichtige über Wirtschaftsinformatik. Stephan Thesmann erklärt Ihnen die Bedeutung der Informationstechnologie und ihrer Megatrends – wie zum Beispiel künstliche Intelligenz – für die Gesellschaft, Unternehmen und das Individuum. Schritt für Schritt durchleuchtet er betriebliche IT-Systeme und erläutert, wie IT-Management unter Berücksichtigung von Nachhaltigkeit, Ethik und Recht funktioniert und was Sie bezüglich Informationssicherheit und Datenschutz beachten müssen. Anschauliche Praxisbeispiele und zahlreiche Übungsaufgaben runden das Buch ab. SIE ERFAHREN* Mit welchen Methoden und Maßnahmen Wirtschaftsinformatiker die Betriebe optimieren* Was es mit KI, ERP, BI, BPMN, ERM, DSGVO, UML, Scrum und Co. auf sich hat* Wie Sie die Herausforderungen des IT-Managements meisternSTEPHAN THESMANN forschte mehrere Jahre im Bereich künstliche Intelligenz, bevor ihn 1998 der Ruf an die Hochschule Pforzheim erreichte. Dort leitete er das Rechenzentrum sowie mehrere Studiengänge und lehrt bis heute Wirtschaftsinformatik in Bachelor- und Masterprogrammen. Über den Autor 9Einführung 23TEIL I: ABENTEUER WIRTSCHAFTSINFORMATIK 29Kapitel 1: Ihr Einstieg in die Unternehmens-IT 31Kapitel 2: Megatrends der Digitalisierung 35Kapitel 3: Umwelt, Gesellschaft und Individuum 83TEIL II: BETRIEBLICHE INFORMATIONSSYSTEME, WOHIN MAN SCHAUT … 97Kapitel 4: Willkommen bei der Meblo AG 99Kapitel 5: IT am Arbeitsplatz 123Kapitel 6: ERP-Systeme: Das Herz der Meblo-IT 137Kapitel 7: Informationssysteme im Vertrieb 155Kapitel 8: Informationssysteme in Beschaffung und Materialwirtschaft 177Kapitel 9: Informationssysteme für das E-Business: Geschäftsprozesse über die Unternehmensgrenzen hinaus optimieren 197Kapitel 10: Informationssysteme in der Produktion 233Kapitel 11: Informationssysteme für Entscheider 251Kapitel 12: Informationssysteme für Zusammenarbeit und Wissensmanagement 275TEIL III: DER BETRIEB VON INFORMATIONSSYSTEMEN 297Kapitel 13: Die Informationsversorgung sicherstellen 299Kapitel 14: Ausgewählte Sicherheitsmaßnahmen 325Kapitel 15: Juristische Herausforderungen 349Kapitel 16: Ethische Herausforderungen 377TEIL IV: INFORMATIONSSYSTEME ENTWICKELN 391Kapitel 17: Informationssysteme beschreiben mit ARIS 393Kapitel 18: Organisationsstrukturen beschreiben 399Kapitel 19: Daten beschreiben 403Kapitel 20: Funktionen beschreiben 427Kapitel 21: Benutzungsoberflächen beschreiben 435Kapitel 22: Geschäftsprozesse beschreiben 445Kapitel 23: Der Weg zur passenden Software 463Kapitel 24: Individuelle Problemlösungen entwickeln 483Kapitel 25: Informationssysteme einführen durch Change-Management 521TEIL V: DER TOP-TEN-TEIL 529Kapitel 26: Die zehn größten Denkfehler über Wirtschaftsinformatiker 531Kapitel 27: Die zehn Gebote für Wirtschaftsinformatiker 543Abbildungsverzeichnis 553Stichwortverzeichnis 557
Hardware & Security (2. Auflg.)
Manipulierte USB-Sticks, unscheinbare Keylogger, falsche Access-Points, geklonte RFID-Karten – die Gefahren für Ihre IT-Infrastruktur beschränken sich nicht auf Attacken von Viren und Trojanern. Tobias Scheible zeigt Ihnen in diesem Handbuch, wie Sie Ihre Rechnersysteme und Netzwerke umfassend vor Hardware-Angriffen schützen. Sorgen Sie proaktiv für Sicherheit, indem Sie Ihre Mitarbeiterinnen und Mitarbeiter für die Bedrohungen sensibilisieren und die Werkzeuge der Angreifer detailliert kennenlernen. Denn nur mit einem ganzheitlichen Blick auf die Bedrohungslage gelingt es Ihnen, Industriespionage, Ransomware-Angriffe und andere Attacken richtig zu bekämpfen.Aktuell zu: Rubber Ducky Mark II, MalDuino 3, ESP32-S3 Pendrive, O.MG Plug, O.MG Cabel, O.MG Adapter, O.MG UnBlocker, USBKill Professionell, HackrRF One Porta Pack, XIXEI X7, Packet Squirrel Mark II, LilyGo T-Dongle S3, Flipper Zero und Lilygo T-Embed.Aus dem Inhalt Planung, Durchführung und Auswertung von Penetrationstests: Red Teaming in der Praxis Security Awareness schulen Spionage-Gadgets: GPS-Tracker, Kameras, Aufnahmegeräte, Key- und Screenlogger Angriffe über die USB-Schnittstelle: Rubber Ducky, Digispark, USBKill und mehr WLAN-Verbindungen manipulieren: WiFi Deauther, WiFi Pineapple Kabelgebundene Netzwerke ausspionieren: Throwing Star LAN Tap, Packet Squirrel Funkverbindungen stören: Crazyradio PA, HackRF One, Störsender und mehr RFID-Tags duplizieren und manipulieren: Proxmark, iCopy-X, NFC-Kill Bluetooth tracken und abhören: Bluefruit LE Sniffer, Ubertooth One und BBC micro:Boards Universelle Hacking-Hardware: LilyGo, Raspberry Pi Zero, Flipper Zero und mehr Gefundene Hardware analysieren, Datenspeicher auslesen und Netzwerkverkehr überwachen Angriffsszenarien und LaborumgebungLeseprobe (PDF)
Paradigmenwechsel Low-Code
Das Buch bietet als bislang einziges Standardwerk einen umfassenden und herstellerneutralen Überblick über die Ursprünge, Funktionsweisen und Möglichkeiten, über Einsatzszenarien und Perspektiven von Low-Code- und No-Code-Technologien. Es bietet hierbei einen praxisbezogenen Leitfaden für Auswahl, Implementierung und Einsatz passender Low-Code-Lösungen. Das Buch ist deshalb von besonderer Wichtigkeit, weil Low-Code die Welt der Softwareentwicklung wie kaum eine andere Innovation der letzten Jahrzehnte verändern wird, und das in einer kaum überblickbaren Breite und Vielfalt. Es bietet den notwendigen Überblick sowie Einsatzszenarien, objektive Einschätzung und Bewertung unterschiedlicher Low-Code-Lösungen. Das Buch bietet damit eine fundamentale Entscheidungshilfe für die relevanten IT-Strategen und IT-Manager. Hauptzielgruppe: IT-Verantwortliche in Wirtschaft, Organisationen aller Art und Verwaltung, d.h. CIOs, CDOs, CTOs, IT-Verantwortliche und deren gesamter Mitarbeiterstab.Projektverantwortliche von IT-Projekten in den Fachbereichen in Wirtschaft, Organisationen aller Art, sowie Verwaltung und Management von Softwareherstellern und IT-Dienstleistern, unabhängig von Art und Größe.Berater, Projektmanager und Experten für IT- und Digitalisierungsstrategien, einschl. Pressevertreter, Blogger u.dgl.KI- und Sicherheitsexperten, die sich ihren Aspekt im Bereich Low-Code interessierenVorwort/Einleitung.- Paradigmenwechsel Low-Code: Software entwickeln ohne Programmieren – geht das? Und warum überhaupt?.- Was ist nicht Low-Code?.- Für wen ist Low-Code eigentlich gedacht? Low-Code adressiert sehr unterschiedliche Arten von Softwareentwicklern.- Welche Anwender-/Kundengruppen adressiert Low-Code? Low-Code adressiert sehr unterschiedliche Zielgruppen und Einsatzszenarien.- Low-Code im Einsatz: Organisationsstrukturen, Projektmanagement und Vorgehensmodelle.- Praxiserfahrungen und Leuchtturmprojekte.- Die schier unüberschaubare Vielfalt an Low-Code Plattformen. Jede Low-Code Plattform ist anders.- Prozessbasierte versus daten- bzw. datenbankbasierte Low-Code- und No-Code-Plattformen.- Low-Code für besondere Szenarien und im Zusammenspiel mit anderen IT-Systemen.- Compliance, Security und Betrieb von Low-Code-Anwendungen.- KI und Low-Code.- Ausblick.
Digital Deception
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate.Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, "Digital Deception" offers a path forward, rooted in real computer science, to restore trust and security in our digital world.The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy.WHAT YOU WILL LEARN:* Gain a deep understanding of the fundamental flaw in cybersecurity, particularly the impact of public access to secure networks and the deception inherent in current MFA practices.* Recognize how various actors, knowingly or unknowingly, have contributed to the current cybersecurity crisis.* Implement real solutions with actionable strategies based on real computer science to address and correct these vulnerabilities, paving the way for a more secure digital future.* A revolutionary concept of Direct User Interaction and Digital IDs, as opposed to more traditional cybersecurity approaches like Zero Trust or perimeter security.WHO THIS BOOK IS FOR:This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet.The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.Chapter 1: The Myth of Mitigation.- Chapter 2: Public Access: The Original Flaw.- Chapter 3: The Legal and Economic Time Bomb of MFA Deception.- Chapter 4: The Pervasiveness of Cybersecurity Deception.- Chapter 5: Complicity Through Blind Conformity.- Chapter 6: The Failure of the Cybersecurity Education System.- Chapter 7: The Rise of Mitigation: Patching Over the Problem.- Chapter 8: The Failure to Look Beyond the Immediate Horizon.- Chapter 9: The Internet as a Crime Scene.- Chapter 10: Regulatory Failures and the Consequences of Inaction.- Chapter 11: The Role of Vendors and Auditors in Perpetuating the Cybersecurity Crisis.- Chapter 12: The Victims of Cybersecurity Deception: Internet Users and the Global Economy.- Chapter 13: The Long Road to Correction: An Elegantly Simple Solution.- Chapter 14: Corporate Leadership’s Role in Cybersecurity: The Cost of Complacency and the Call for Accountability.- Chapter 15: The Path to Rebuilding Trust with Vendors and Stakeholders.- Chapter 16: Looking Ahead: The Future of Cybersecurity and the End of the Mitigation Era.- Chapter 17: The Role of Digital IDs and Direct User Interaction.- Chapter 18: A Call for Integrity and Real Security.- Chapter 19: The Impact of AI on Cybersecurity.- Chapter 20: The Global Landscape: Cybersecurity Challenges Across Borders.- Chapter 21: A New Era of Network Security Through Real Computer Science.
Conceptual Variable Design for Scorecards
Embark on a journey through the intricate landscape of predictive modeling, where the fusion of conceptual clarity and robust statistical techniques creates powerful tools for decision-making. This book distills years of experience into a standardized methodology that empowers professionals across industries—from banking to telecommunications—to construct scorecards that predict outcomes with precision and confidence.In a world driven by data, the ability to transform complex information into actionable insights is paramount. This is your essential guide to mastering the art and science of model building. With practical examples, real-world case studies, and step-by-step guidance, this book is not just a resource—it's a roadmap to success in the rapidly evolving field of analytics. By focusing on reducing operational risk, you’ll be equipped to make informed decisions that safeguard your organization’s future.Whether you’re a seasoned data scientist or just starting your journey, _Conceptual Variable Design for Scorecards_ will provide you with the knowledge and skills to thrive in an era where data-driven decisions are the key to competitive advantage. Join the ranks of forward-thinking professionals who are redefining the future of risk management and predictive analytics. Your journey begins here.WHAT YOU WILL LEARN* Harness the power of conceptualization to create models that solve real-world problems.* Design meaningful variables that reflect the behaviors of your target population.* Expand variables with temporal patterns to capture trends and dynamic changes.* Master data integration to streamline preparation and avoid common pitfalls.* Implement a unified workflow to simplify and accelerate the modeling process.* Explore a larger number of variables in your multivariable models by harnessing the use of experimental design and hyperoptimization.WHO THIS BOOK IS FORProfessionals engaged in the practical construction of models who seek to gain a comprehensive understanding of the model-building process.Chapter 1: Conceptual Representations.- Chapter 2: Conceptual Modelling.- Chapter 3: Balance Equation.- Chapter 4: Ratios.- Chapter 5: Time and Behavioral Patterns.-Chapter 6: Additional Variables.- Chapter 7: Things to Know About ABTs.- Chapter 8 The Building Plan and Variable Management.- Chapter 9: Target Population.- Chapter 10: The ABT Building Process.- Chapter 11: A Brief Introduction to the use of SAS® Enterprise MinerTM.- Chapter 12: Partitioning.- Chapter 13: Univariable Analysis.- Chapter 14: Collinearity Analysis.- Chapter 15: Weight of Evidence.- Chapter 16: Multivariable Selection Methods.- Chapter 17: Experimental Design and Hyperoptimization.- Chapter 18: The Main-Effects Model.- Chapter 19: The Scoring Process.- Chapter 20: Closing Thoughts.
Exploring Azure Container Apps
Equip yourself with the knowledge and tools needed to harness the full potential of Azure Container Apps, Microsoft's cutting-edge platform for orchestrating and scaling containerized applications effortlessly.Begin your journey with an introduction to Azure Container Apps (ACA), uncovering its unique features, benefits, and use cases. Further, you will dive into setting up and using Azure Container Registry (ACR) to efficiently store and manage container images, while mastering best practices for access control and security. You will also explore the intricacies along with comprehensive guides on deployment, scaling, and troubleshooting. You will learn how to integrate the Distributed Application Runtime (Dapr) with Azure Container Apps, explore best practices for seamless integration, and leverage its powerful building blocks for state management and pub/sub mechanisms. In conclusion, you will navigate the complexities of communication between microservices within Azure Container Apps environments, exploring various communication patterns and techniques.After reading this book, you will be able to work with ACA and implement the modern application deployment and scaling with Azure Container Apps with KEDA.WHAT YOU WILL LEARN:· Building and Deploying Backend API and Frontend UI to ACA· Communication between different Microservices inside ACA· Integration with Distributed Application Runtime (Dapr)· State management inside ACA· Scheduling and managing backend jobs· Monitoring with Application insights· Kubernetes Event Driven AutoScaler (KEDA)WHO THIS BOOK IS FOR:Application developers, DevOps Engineers and Tech EnthusiastsChapter 1: Introduction to Azure Container Apps.- Chapter 2: Deploying First Containerized App to Azure Container Apps.- Chapter 3: Creating and Deploying Frontend Blazor Web Application.- Chapter 4: Integrating Dapr with Azure Container Apps.- Chapter 5: Async Communication with Dapr Pub/Sub API.- Chapter 6: ACA Scheduled Jobs with Dapr .- Chapter 7: Monitoring and Observability.- Chapter 8: Auto Scaling with KEDA.
Creational Design Patterns in C#
Unlock the power of design patterns to elevate your software architecture. This pocket book provides an in-depth guide to five essential creational design patterns, crucial for building robust, scalable, and maintainable applications in C#.With step-by-step implementation in C# and a focus on practical applications, this book will empower you to enhance your software solutions and sharpen your design skills. The book starts by covering the simple factory pattern first where you will learn object creation with clear, single-responsibility classes followed by the factory method pattern. Next, you will go through the prototype, singleton, and builder patterns. In the end, you will demonstrate dependency injection with real-life examples.The book breaks down complex concepts into practical examples and concise explanations, making it an invaluable resource at every level of experience.WHAT YOU WILL LEARN:* Gain insights into the concepts of design patterns.* Will be familiar with real-world applications of design patterns* Gets a hands-on experience for each of the patterns using the latest version of C#.* Some of the alternatives to these patterns with their pros and cons.WHO THIS BOOK IS FOR:OOP, C# developers who want to learn and practice design patterns to upgrade their development skills.Chapter 1: Factory Method Pattern.- Chapter 2: Singleton Pattern.- Chapter 3: Builder Pattern.- Chapter 4: Prototype Pattern.- Chapter 5: Dependency Injection Pattern.- Appendix A: What’s Next?.- Appendix B: Other Books by the Author.
Apache Kafka (2. Auflage)
Apache Kafka in 2. Auflage aus dem Juli 2025: Von den Grundlagen bis zum Produktiveinsatz- Kafkas verteilte Streaming-Fähigkeiten beherrschen- Echtzeit-Datenlösungen implementieren- Kafka in Unternehmensumgebungen integrieren- Kafka-Anwendungen entwickeln und verwalten- Ausfallsicherheit und Skalierbarkeit erreichenApache Kafka ist der Goldstandard für Streaming- Datenplattformen und Kernbestandteil moderner Echtzeitdaten-Architekturen. Es ermöglicht einen nahtlosen Datenfluss zwischen verschiedenen Services, IT-Systemen und Teams in Unternehmen. Kafkas solides Design gewährleistet hohe Ausfallsicherheit und reibungslose Skalierbarkeit.Dieses Buch ist ein praktischer Leitfaden für IT-Fachleute, die Kafka in datenintensive Anwendungen und Infrastrukturen integrieren. Von der Einrichtung von Kafka-Clustern über das Produzieren und Konsumieren von Nachrichten bis zur Integration in Unternehmenssysteme – leicht verständlich wird das nötige Wissen für zuverlässige und skalierbare Kafka-Anwendungen vermittelt.Neu in der 2. Auflage: Das Buch wurde vollständig überarbeitet und um den umfangreichen Teil „Kafka im Unternehmenseinsatz“ erweitert. Dieser behandelt ausführlich Kafka Connect zur Systemintegration, Stream-Processing, Governance-Aspekte sowie eine praxisnahe Referenzarchitektur. Zusätzlich bietet das Buch erweiterte Einblicke in Monitoring, Desaster Management und Kafkas Rolle in modernen Datenarchitekturen.Anatoly Zelenin und Alexander Kropp begeistern sich seit ihrer Kindheit für IT und arbeiten heute als Experten für Echtzeitdaten und moderne IT-Architekturen mit Fokus auf Apache Kafka. Anatoly begeistert mit seinen Trainings Teams und bringt sie aufs nächste Kafka-Level. Alexander gestaltet aktiv Cloud- Plattformen mit Kubernetes und entwickelt kreative IT-Lösungen. Als Teil der DataFlow Academy verhelfen sie Unternehmen durch praxisnahe Trainings und Beratung zum Erfolg mit Echtzeitdaten.AUS DEM INHALT- Kafka-Grundlagen und Architektur: Vom Aufbau bis zur Verwaltung von Clustern- Zentrale Konzepte: Topics, Nachrichten, verteilte Logs und Zuverlässigkeit- Tiefer Einblick: Cluster-Management, Nachrichten produzieren, konsumieren und bereinigen- Kafka im Unternehmenseinsatz: Kafka Connect, Stream-Processing, Governance und Referenzarchitektur- Betriebliche Aspekte: Monitoring, Alerting und Desaster Management- Kafka in modernen Architekturen: Vergleich mit anderen Technologien und praktische Einsatzszenarien
Das Root-Manifest
Das Root-Manifest ist ein taktischer und philosophischer Aufruf zur Rückeroberung digitaler Kontrolle. Mehr als nur ein Sicherheitsleitfaden ist es ein Aufstand gegen passive Verteidigung, verwaltete Mittelmäßigkeit und Sicherheitstheater. Root ist kein Privileg – es ist eine Haltung. Dieses Buch rüstet Ingenieure, Verteidiger und Entwickler aus, um Infrastrukturen zu härten, Compliance-Theater infrage zu stellen und digitale Autonomie zu gestalten.
Game Development Concepts in C++
Leverage Unreal Engine to implement a wide variety of mechanics using C++. This book arms you with the knowledge and practices of game mechanics programming in C++, supported by detailed mathematical and programmatic explanations.Detailing everything from collision mechanics and AI pathfinding to networking and advanced physics, this book offers a holistic approach to game development, ensuring you get the most out of your gameplay experiences. You will work on character mechanics, environmental interactions, combat systems, and visual effects, gaining a thorough understanding of how to implement these features in C++.By the time you finish this book, you will be able to create complex game mechanics and to make your projects optimization-intensive and performance-driven. Whether you want to polish your skills or experiment with new techniques, _Game Dev Concepts in C++ for Unreal Engine Practitioners_ gives you the right guidance and helps you to stand out in this competitive world of game development.WHAT YOU WILL LEARN* Understand detailed scenarios that demonstrate how each mechanic is applied in real-world game development projects.* Utilize ready template codes for quicker implementation of mechanics in your games, saving time, and boosting productivity.* Develop your skills in advanced Unreal Engine and C++ programming, making you a versatile and proficient game developer.* See how different mechanics work together to create engaging gameplay experiences.__WHO IS THIS BOOK FORIdeal for intermediate level game developers who have an understanding of Unreal Engine and have a set of basic programming skills in C++.Chapter 1: Introduction.- Chapter 2: Collision Mechanics.- Chapter 3: Interaction Mechanics.- Chapter 4: Environmental Mechanics.- Chapter 5: Character Mechanics.- Chapter 6: Combat Mechanics.- Chapter 7: Physics and Dynamics.- Chapter 8: Audio and Visual Effects.- Chapter 9: AI and Pathfinding.- Chapter 10: Networking and Multiplayer.- Chapter 11: Advanced Mechanics.- Chapter 12: Case Studies.- Chapter 13: Appendices.
Microsoft Project Essentials
Microsoft Project has been a trusted tool for professionals worldwide, providing robust solutions for planning, executing, and tracking projects of any scale. This book serves as a comprehensive guide to mastering Microsoft Project, offering everything you need to elevate your project management skills and achieve your goals efficiently.The book starts by exploring Microsoft Project features and setting up your Project profile. You will then learn how to manage tasks and resources in Microsoft Project. Further, you will demonstrate scheduling and timelines followed by a deep dive into budgeting and cost management of the project. Moving forward, you will understand Microsoft Project's integration with M365 and learn Agile Project Management techniques. In the end, you will learn the advanced features and future patterns in Microsoft Project along with expert tips for efficiency.After reading the book, you will be able to create detailed project plans, set milestones, and develop schedules using Gantt charts.WHAT YOU WILL LEARN:* Discover how to assign resources to tasks, manage workloads, and optimize resource allocation* Gain skills in estimating project costs, tracking expenditures, and managing budgets effectively* Learn how to update project status, track progress against the plan, and manage changes efficiently* Integrate Microsoft Project with other Microsoft tools like Teams and SharePoint for enhanced collaborationWHO THIS BOOK IS FOR:Project Managers, Business Analysts and ConsultantsChapter 1: Introduction to Microsoft Project: Understanding the Platform.- Chapter 2: Getting Started with Microsoft Project.- Chapter 3: Managing tasks with Microsoft Project.- Chapter 4: Resource Management using Microsoft Project.- Chapter 5: Fine Tuning Project Schedule.- Chapter 6: Budget and Cost Management using Microsoft Project.- Chapter 7: Seamless integration of Microsoft Project with Microsoft 365 family.- Chapter 8: Agile Project Management using Microsoft Project.- Chapter 9: Microsoft Project Reports and Analytics.- Chapter 10: Advanced Features of Microsoft Project and Future Trends in Project Management.