Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Security and Privacy for Modern Networks

Security and Privacy for Modern Networks

This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense mechanisms, while also preparing readers for future technological impacts on security. This concise resource is essential to understanding and implementing advanced cyber defense strategies in an AI-integrated world.Readers are provided with methods and tips on how to evaluate the efficacy, suitability, and success of cybersecurity methods and AI/machine learning applications to safeguard their networks. Case studies are included; with examples of how security gaps have led to security breaches and how the methods discussed in the book would help combat these.This book is intended for those who wish to understand the latest trends in network security. It provides an exploration of how AI is revolutionizing cyber defense, offering readers from various fields including insights into strengthening security strategies. With its detailed content, the book empowers its audience to navigate complex regulations and effectively protect against a landscape of evolving cyber threats, ensuring they are well-equipped to maintain robust security postures within their respective sectors.WHAT YOU WILL LEARN:* The transformative role AI plays in enhancing network security, including threat detection, pattern recognition, and automated response strategies.* Cutting-edge security protocols, encryption techniques, and the deployment of multi-layered defense systems for robust network protection.* Insights into vulnerability assessments, risk analysis, and proactive measures to prevent and mitigate cyber threats in modern network environments.WHO THIS BOOK IS FOR:IT professionals and network administrators, cybersecurity specialists and analysts, students and researchers in computer science or cybersecurity programs, corporate decision-makers and C-level executives responsible for overseeing their organizations' security posture. Also security architects and engineers designing secure network infrastructures, government and defense agency personnel tasked with protecting national and organizational cyber assets. Finally technology enthusiasts and hobbyists with a keen interest in cybersecurity trends and AI developments and professionals in regulatory and compliance roles requiring an understanding of cybersecurity challenges and solutions.SESHAGIRIRAO LEKKALA, A seasoned Cloud and Network Security expert, brings a potent combination of an Electrical and Electronics Engineering degree with 16 years of robust experience in architecting software solutions for the telecommunications industry. Renowned for his expertise in engineering highly scalable, distributed networking solutions tailored for Cloud and AI technologies, his strategic insights and architectural ingenuity have been critical in generating multi-billion-dollar revenue for industry giants. His groundbreaking inventions in SD-WAN and adaptive traffic engineering established him as a leading figure in the field.His commitment extends beyond technical mastery; he actively fosters the professional development of emerging talent through mentorship and contributes to the industry's body of knowledge through his scholarly articles. His influence is recognized in both academic and professional circles, as he regularly serves as a judge at various national and international events, including startup pitches and hackathons, which affirms his reputation as a reliable and prominent leader in Network SecurityPRIYANKA GURIJALA, with over a decade of experience, is a recognized expert in designing robust Cloud Networking Solutions. Holding a Master’s degree in Electrical and Computer Engineering from the University of Maryland, College Park, she has played pivotal roles in driving product success and fostering organizational growth at industry-leading companies. Currently at the forefront of innovation, she applies her expertise in Networking and Artificial Intelligence to advance Azure cloud infrastructure capabilities. She has made significant contributions in the fields of secure network configuration and remote management. She excels in translating visionary concepts into practical solutions, rigorously evaluating functionality, and refining technologies to align with industry standards, demonstrating her steadfast commitment to technological progress.Chapter 1: Introduction to Modern network Systems.- Chapter 2: Building Blocks of Network Security.- Chapter 3: Navigating the Cyber Threat Landscape.- Chapter 4: Cryptography: The Backbone of Secure Communications.

Regulärer Preis: 54,99 €
Produktbild für Autonomous Data Security

Autonomous Data Security

This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud, on-premises, and hybrid setups, as well as different deployment scales and comprehensive channel coverages, it encourages readers to break away from conventional norms in their approach.By exploring the factors that should be taken into account, the book highlights the significant gap in existing data safeguarding solutions, which often rely solely on configured security policies. It proposes a forward-thinking security approach designed to endure over time, surpassing traditional policies and urging readers to consider proactive autonomous data security solutions. Additionally, it delves into the system's ability to adapt to deployed environments, learn from feedback, and autonomously safeguard data while adhering to security policies.More than just a set of guidelines, this book serves as a catalyst for the future of the cybersecurity industry. Its focus on autonomous data security and its relevance in the era of advancing AI make it particularly timely and essential.WHAT YOU WILL LEARN:* Understand why data security is important for enterprise businesses.* How data protection solutions work and how to evaluate a solution in the market.* How to start thinking and evaluating requirements when building a solution for small, medium, and large enterprises.* Understand the pros and cons of security policy configurations defined by administrators and why can’t they provide comprehensive protection.* How to safeguard data via adaptive learning from the deployed environment – providing autonomous data security with or without policies.* How to leverage AI to provide data security with comprehensive proactive protection.* What factors to consider when they have to protect and safeguard data.WHO THIS BOOK IS FOR:The primary audience is cybersecurity professionals, security enthusiasts, C-level executives in organizations (all verticals), and security analysts and IT administrators. Secondary audience includes professors and teachers, channel integrators, professional services, and hackers.PRIYANKA NEELAKRISHNAN is a distinguished data security expert with over a decade of experience in building world-class data protection solutions. Her illustrious career includes pivotal roles at renowned cybersecurity firms such as Palo Alto Networks and Symantec, where she has consistently driven innovation and excellence.As the Product Line Manager at Palo Alto Networks, Priyanka has been instrumental in conceptualizing, designing, and launching transformative cybersecurity products. Her efforts have led to the widespread adoption of advanced information protection solutions, significantly enhancing enterprise security. During her tenure at Symantec (now Broadcom), Priyanka spearheaded initiatives in on-prem, cloud, and hybrid data protection, notably developing the industry's first cloud data protection solution tailored for large enterprise customers. This groundbreaking solution encompassed all major cloud channels, including Email, Web, and Applications, and featured patented content detection technologies.Recognized as a go-to authority in the field of data protection, Priyanka is highly regarded for her mentoring capabilities and expertise across a wide range of data security topics. She is also a renowned speaker and independent researcher, contributing extensively to the advancement of the cybersecurity field. Her innovative products and strategic insights have earned her leadership and excellence awards, underscoring her significant contributions to the cybersecurity landscape.Chapter 1: Introduction, Data Security, and Fundamental Requirements.- Chapter 2: Tradition Data Security.- Chapter 3: Thinking Outside Norms.- Chapter 4: Policy-Less Data Security.- Chapter 5: AI Driven Data Security.- Chapter 6: Conclusion and Design For the Future.- Chapter 7: Future Ready Data Security.

Regulärer Preis: 59,99 €
Produktbild für Computers For Seniors For Dummies

Computers For Seniors For Dummies

BECOME A TECH-SAVVY COMPUTER USER, THE BEGINNER-FRIENDLY WAYComputers For Seniors For Dummies gives you the confidence you need to connect with friends and explore the internet all from the comfort of your couch. This step-by-step guide walks you through the basics of buying and setting up a computer, working with Windows or Mac, and getting online. With large print and clear figures, you'll learn essential tasks like emailing, browsing the internet, creating and viewing digital photos, and staying safe from hackers and viruses. In no time you'll be shopping online and video calling family from across the country.* Get advice on purchasing a reliable, budget-friendly computer, along with accessories like printers* Create formatted documents and spreadsheets and share them with others* Organize and share family photos* Watch movies and listen to music online* Stay safe online, with tips to avoid hackers, scammers, and identity theft* Shop online for everything from groceries to life insuranceThose older and wiser who need help getting started with computers will love this no-nonsense For Seniors For Dummies guide. FAITHE WEMPEN, M.A., CompTIA A+, has spent the last 35+ years as an information technology instructor and learning designer. She designs and creates technology courses for online universities, and is the author of over 160 books, including Office for Seniors for Dummies and Outlook for Dummies. Introduction 1PART 1: GET GOING! 5Chapter 1: Buying a Computer 7Chapter 2: Setting Up Your Computer 37Chapter 3: Buying and Setting Up a Printer 65PART 2: GETTING UP TO SPEED WITH WINDOWS 79Chapter 4: Working with Apps in Windows 81Chapter 5: Managing Your Personal Files 109Chapter 6: Making Windows Your Own 133PART 3: GOING ONLINE 151Chapter 7: Getting Connected to the Internet 153Chapter 8: Browsing the Web 167Chapter 9: Staying Safe While Online 189Chapter 10: Keeping in Touch with Email 209Chapter 11: Working in the Cloud 229Chapter 12: Connecting with People Online 247Chapter 13: Exploring Artificial Intelligence 263PART 4: HAVING FUN 273Chapter 14: Let’s Play a Game! 275Chapter 15: Viewing and Creating Digital Photos and Videos 289Chapter 16: Listening to Music on Your PC 309PART 5: WINDOWS TOOLKIT 323Chapter 17: Working with Networks 325Chapter 18: Protecting Windows 341Chapter 19: Maintaining Windows 353Index 369

Regulärer Preis: 16,99 €
Produktbild für Ritsch + Renn. Die besten IT-Cartoons aus 25 Jahren

Ritsch + Renn. Die besten IT-Cartoons aus 25 Jahren

Ritsch + Renn. Die besten IT-Cartoons aus 25 Jahren.Die IT-Welt steckt voller Absurditäten: Computer, die mehr Arbeit machen, als sie uns abnehmen, Technik, die nervt, anstatt zu begeistern, und dann noch Smartphones, die fragen, ob man ein Roboter ist. Ritsch und Renn bieten eine kurze Pause vom alltäglichen IT-Wahnsinn und nehmen die Welt der Technik auf humorvolle Weise unter die Lupe. Ob selbstfahrende Autos, die ihre Insassen an der Raststätte vergessen haben, Sticheleien gegen die Verschlimmbesserungen der neuesten Windows-Version oder sogar Gott beim Online-Shopping, all das haben Ritsch und Renn in den „Schlagseiten“ des Computermagazins c't festgehalten. Mal kurios, mal völlig absurd, mal nah an der Realität, aber immer lustig. In diesem Buch finden Sie eine Sammlung der besten Cartoons aus 25 Jahren „Schlagseiten“ mit exklusivem, unveröffentlichtem Material, Skizzen und Hintergrundinfos.Abschalten und loslachen1. Witzig, absurd, einfach zum LachenVon Admins, Windows und überhitzten PCs bis zu Smartphones, Social Media und KI, gibt es kein Thema, zu dem Ritsch und Renn keine Pointe haben.2. 25 Jahre SchlagseitenDie Schlagseiten haben mehr zu bieten als nur witzige Pointen. Die Cartoons von Ritsch und Renn sind auch ein Abbild von 25 Jahren IT-Geschichte.3. Neues unveröffentlichtes MaterialMit Skizzen und Hintergrundinfos geben die beiden Cartoonisten einen spannenden Einblick in ihre Arbeit.25 Jahre Ritsch und RennEine Auswahl der lustigsten WerkeÜber 150 CartoonsZeitreise durch 25 Jahre IT-HumorEin Blick in die WerkstattFür IT-Profis, Nerds und alle, die am digitalen Alltag Spaß habenÜber die Autoren: Harald Ritsch ist ein international erfolgreicher Illustrator. Begonnen hat er mit dem Zeichnen von Comics und Cartoons, einer Leidenschaft, die er heute noch mit seinem Kompagnon Marcus Renn, einem Texter und Konzeptentwickler, begeistert auslebt.Marcus Renn ist ein leidenschaftlicher Ideenentwickler, Texter, Mediendesigner, Humorist und Universitätslektor in Wien.

Regulärer Preis: 24,90 €
Produktbild für FPGAs - Einstieg, Schaltungen, Projekte

FPGAs - Einstieg, Schaltungen, Projekte

FPGAs. Einstieg, Schaltungen, Projekte.Field Programmable Gate Arrays – kurz FPGAs – sind die ideale Basis für anspruchsvolle Maker-Projekte. Dank effizienter Parallelverarbeitung und hoher Flexibilität lassen sich mit diesen frei programmierbaren Logikbausteinen komplexe digitale Schaltungen mühelos realisieren.In diesem Praxisbuch zeigt Ihnen Jörg Rippel anhand kreativer Beispielprojekte mit den benutzerfreundlichen FPGAs von Lattice und Gowin Semiconductor, wie Sie Ideen schnell umsetzen. Durch den Einsatz einer Chat-KI generieren Sie ohne Vorkenntnisse den benötigten Verilog-Code. Im Handumdrehen basteln Sie Lichteffekte oder Animationsanzeigen, verarbeiten Sensordaten und realisieren Ihr persönliches Traumprojekt.FPGAs für Maker und Kreative1. Alles für den EinstiegDieser Leitfaden stellt Ihnen das IceZero-Board mit dem iCE40HX FPGA von Lattice Semiconductor sowie das Sipeed Tang Nano 9K Board mit dem Gowin GW1NR-9C FPGA im Detail vor. Sie richten sich eine passende Raspberry-Pi-Entwicklungsumgebung mit Open-Source-Toolchain ein und lernen alle Grundlagen für die Arbeit mit programmierbarer Logik.2. Programmieren mit KIDie Hardwarebeschreibungssprache Verilog können Sie in 50 bis 100 Stunden erlernen – oder Sie lassen sich von ChatGPT oder GitHub Copilot für den Einstieg unterstützen. Jörg Rippel zeigt Ihnen, wie Sie künstliche Intelligenz nutzen, um blitzschnell Code zu erstellen, der Ihrem FPGA-Design Leben einhaucht.3. Setzen Sie Ihr Traumprojekt umMit FPGAs können Sie viel mehr machen als nur LEDs blinken lassen. Die vielen Beispielprojekte, Anleitungen, Praxishinweise und Verilog-Codebeispiele helfen Ihnen, um Ihr ganz persönliches Traumprojekt umzusetzen. Mit dabei: Zugriff auf Displays, Sensoren,  SPI- und I2C-Schnittstellen, die Arbeit mit Zufallszahlen, Testbenches und Simulationen und einer lizenzfreien Entwicklungsumgebung .Aus dem InhaltGrundlagen der FPGAs und hardwarenahen ProgrammierungEffizientes Pairprogramming mit künstlicher Intelligenz wie ChatGPTPraxisnaher Einstieg: FPGAs programmieren und die Toolchain beherrschenAnbindung und Verarbeitung von Sensordaten über gängige SchnittstellenInteraktive Steuerung und Kommunikation über serielle VerbindungenSteuern von Displays, RGB-LEDs und vielfältigen AusgabenTestbenchsysteme entwickeln zum Simulieren und DebuggenEinrichten der Open-Source-Entwicklungsumgebung auf dem Raspberry PiLeseprobe (PDF-Link)Über den AutorDas Basteln mit elektronischen Geräten gehörte schon immer zu Jörg Rippels Hobbys. Privat beschäftigt er sich gerne mit Mikrocontroller- und Mikrocomputing-Projekten, beruflich hat er mehr als 20 Jahre in verschiedenen IT-Unternehmen und in der Luft- und Raumfahrtindustrie gearbeitet.Als Systemingenieur lag sein Schwerpunkt auf der Zusammenführung und Pflege komplexer Systeme, die aus vielen verschiedenen technischen Bereichen bestehen. Heute lebt er mit seiner Frau im Grünen und schraubt gerne an kreativen Projekten, wobei es auch immer mal wieder Probleme gibt und nicht immer alles beim ersten Versuch funktioniert. Trotzdem – oder gerade deswegen – macht ihm die Arbeit mit Elektronik immer Spaß. Sein Wissen teilt er in Fachbüchern und Beiträgen. Ausbildungen und Studiengänge in Elektronik, Funktechnik und Informatik haben dafür gesorgt, dass er ein breites Wissen zu allerlei elektrischen Geräten hat. Dazu gehören die Erstellung von analogen und digitalen Robotern, der Bau von Computern, das Betreiben von Amateurfunk und Satellitenfunk, das Design von Schaltungen und Platinenlayouts, die Arbeit mit 8- und 32-Bit-Mikrocontrollern und die Programmierung in verschiedenen Sprachen.

Regulärer Preis: 49,90 €
Produktbild für Home Assistant (2. Auflg.)

Home Assistant (2. Auflg.)

Home Assistant ist Ihr Begleiter auf dem Weg zum eigenen Smart Home. Im Handumdrehen integrieren Sie Geräte und Dienste in Ihr System und automatisieren Schaltungen und Szenen ganz nach Ihren Bedürfnissen. Udo Brandes beschreibt alle Schritte, die Sie für Ihr eigenes Smart Home benötigen, von der Einrichtung über die Verwaltung bis hin zur Automatisierung. So erfahren Sie in übersichtlichen Kapiteln zum Nachschlagen, wie Sie den Home Assistant um Datenbank- und Programmiermöglichkeiten erweitern, mit ESPHome eigene Schalter und Sensoren einbinden und daraus ein Komplettpaket für die Heimautomation schnüren.Neu in der 2. Auflage: Ein Ausblick auf den neue Matter-Standard zur Heimautomation und die Einrichtung einer Home-Assistant-Installation auf Proxmox.Aus dem InhaltDas Setup und der erste Start: das Webinterface von Home AssistantHome Assistant administrierenGeräte, Dienste, EntitätenAutomatisierungen mit Szenen, Skripten und VorlagenDashboards, Apps und externer ZugriffMedien und SprachdiensteBereiche und ZonenWerkzeuge und HelferDatenspeicherung mit MariaDB und InfluxDBSonoff, Tasmota, Shelly, Matter und Tuya integrierenProgrammierung mit Node-REDEigene Geräte mit ESPHome Leseprobe (PDF)Über den Autor:Udo Brandes ist selbständiger Programmierer, IT-Entwickler und Autor. Die Möglichkeiten der Mikrocontrollerprogrammierung sind Zukunftsthemen, die ihn faszinieren und mit deren Chancen und Risiken er sich seit langem intensiv befasst.

Regulärer Preis: 39,90 €
Produktbild für Car IT kompakt Reloaded

Car IT kompakt Reloaded

Die vielen neuen Funktionen, die im vernetzten Auto Realität werden, finden Sie in diesem Buch übersichtlich beschrieben. Dabei geht es von der Einbindung von Google und Facebook bis hin zu Diensten, die Ihnen helfen Ihren Parkplatz wiederzufinden, per App Ihr Auto einzuparken oder das Sonnendach aus der Ferne zu schließen, wenn es regnet.Als Ziel dieser Entwicklung wird das autonome Fahren definiert inklusive aktueller Entwicklungen, Implementierungsvarianten und den wesentlichen Herausforderungen bezüglich der Sicherheit und Rechtslage. Das Buch gibt darüber hinaus Auskunft zu notwendigen Qualitätsstandards in der Entwicklung komplexer Fahrzeug-IT-Systeme.Zum Abschluss werden die Auswirkungen auf Wirtschaft, Gesellschaft und Politik beschrieben. Dabei werden speziell Fahrzeugnutzer sowie Fahrzeughersteller und ihre Lieferanten berücksichtigt.ROMAN MILDNER ist Berater, Projektmanager und Buchautor für die Themen Projektorganisation und Prozessqualität in der Automobilindustrie.THOMAS ZILLER ist Projektmanager, der zudem sein umfassendes Wissen als Dozent an der Fachhochschule Heilbronn weitergibt.FRANCO BAIOCCHI ist ein Intacs™-zertifizierter Competent Assessor und Projektmanager, der seit 2021 als selbstständiger Berater wirkt.Fahrzeugindustrie zwischen Tradition und Innovation.- Das autonome Fahren.- Das vernetzte Fahrzeug.- Automobile Qualität.- Herausforderung automobiles Projektmanagement.- CORE SPICE.- Automobile Strategie im Fokus.- Automobile Zukunft.

Regulärer Preis: 37,99 €
Produktbild für Angular for Kids

Angular for Kids

Welcome to the book “Angular for Kids: Start your Coding Adventure”. This book is your introduction to the world of Angular. It's your first step towards developing websites and mobile applications. With Angular, you can turn your ideas into reality. Learning should be fun, so you will feel like you are reading a story. By the end of this book, you will have a good understanding of Angular. You will have taken the first steps in your modern web programming adventure. Have fun programming! Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.

Regulärer Preis: 29,99 €
Produktbild für Hands-On Object-Oriented Programming

Hands-On Object-Oriented Programming

Learn how to easily design and implement a software system using object-oriented programming. Through hands-on activities, this book equips you with the real-world practice needed to master OOP skills that can be applied universally across any programming language.This book is dedicated to bridging the gap between theoretical concepts and practical implementation in software development using OOP. Readers will first understand the importance of OOP in handling software complexities before learning how to model real-world problems through access control, extendible object design, and object relationships. Specifically, the author discusses how to use inheritance, association, and polymorphism concepts for implementing reusable and easy-to-use complex software. More importantly, this book covers design patterns and event-driven programming for learning how to model complex interactions among various objects of the software system to implement various use cases.Unlike existing books on OOP which teach syntax and semantics through standard examples, this book leverages an immersive learning experience through a variety of real-world use cases, applications, games, and system software. While written in C++, the skills can be applied to any OOP language of the reader's preference. The book's last chapters will quickly introduce Python and Solidity languages for learning advanced technologies. By the end, novice and seasoned developers will know how to implement practical and reusable software systems with confidence.WHAT YOU WILL LEARN* Apply OOP concepts through real-time use cases: games, applications software (online shopping, reservations, etc.), system software (protocols, simulators, etc.), and modeling and implementation using C+* Design and implement reusable and extendible software with OOP* Understand the importance of design patterns and learn how to use them for solving real-time issues* Use event-driven programming for implementing complete interactions of complex application software, system software, and simulators* Implement OOP using C++ features and discover Python and Solidity constructs for OOPWHO THIS BOOK IS FORBeginners and intermediate software developers with basic programming knowledge to quickly learn OOP concepts with C++. Advanced users will find it useful for quickly exploring best-design principles, patterns, and event-driven programming for implementing complex software systems.DR. ANIL KUMAR RANGISETTI received his PhD in the field of computer science and engineering from IIT Hyderabad. He has 10 years of teaching and research experience in computer science and engineering. During his career, he worked at prestigious Indian institutions such as IIIT Dharwad, SRM-AP, and GMR, and worked at software development and research labs such as ARICENT, IRL-Delhi. Currently he is working as Assistant Professor in the Department of CSE, IIITDM Kurnool. He trained the students in OOP languages, and how to use advanced simulators (NS-3), Docker, and Networking tools for researching and developing applications at his work places. He guided a significant number of undergraduate and postgraduate students for project works.Broadly, his research interests include Wi-Fi technologies, Next Generation Mobile Networks, SDN, NFV, and Cloud Computing. Besides research activities, he is interested in writing and reviewing books on computer science technologies and programming languages. He published a number of novel research publications with IEEE, Springer, Elsevier, and Wiley in the field of a variety of networking technologies such as LTE, SDN and NFV, and Wi-Fi technologies. He authored a book titled _Advanced Network Simulations Simplified._Chapter 1: Importance of Object Oriented Programming.- Chapter 2: Start Learning OOP Using C++.- Chapter 3: Systematically Starting and Stopping Software Objects.- Chapter 4: Exploring Important C++ Features.- Chapter 5: Quickly and Systematically Model Real-World Problems into Software.- Chapter 6: Quick Software Development using OOP.- Chapter 7: Easy to Use Software Development Using OOP.- Chapter 8: Learning the Design Patterns.- Chapter 9: Learning Event Driven Programming.- Chapter 10: Quick Introduction to Python and Solidity Ways of OOP.

Regulärer Preis: 64,99 €
Produktbild für Advanced ASP.NET Core 8 Security

Advanced ASP.NET Core 8 Security

Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the framework itself. And most developers don’t use all of the best practices that are recommended.If you are interested in truly top-notch security, available sources don’t give you the information you need. Most blogs and other books simply state how to use the configurations within ASP.NET, but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren’t incorporating security practices.This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in ASP.NET. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC).WHAT YOU’LL LEARN* Know how both attackers and professional defenders approach web security* Establish a baseline of security for understanding how to design more secure software* Discern which attacks are easy to prevent, and which are more challenging, in ASP.NET* Dig into ASP.NET source code to understand how the security services work* Know how the new logging system in ASP.NET falls short of security needs* Incorporate security into your software development processWHO THIS BOOK IS FORSoftware developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET. To get the most out of this book, you should already have a basic understanding of web programming and ASP.NET, including creating new projects, creating pages, and using JavaScript.TOPICS THAT ARE NEW TO THIS EDITIONThis edition has been updated with the following changes:* Best practices and code samples updated to reflect security-related changes in ASP.NET 8* Improved examples, including a fully-functional website incorporating security suggestions* Best practices for securely using Large Language Models (LLMs) and AI* Expansions and clarifications throughoutSCOTT NORBERG is a web security specialist with almost 20 years of experience in various technology and programming roles, specializing in web development and web security using Microsoft technologies. He has a wide range of experiences in security, from working with development teams on secure code techniques, to software security assessments, and application security program building. He also has an interest in building plug-and-play software libraries that developers can use to secure their sites with little-to-no extra effort.Scott holds several certifications, including Microsoft Certified Technology Specialist (MCTS), and certifications for ASP.NET and SQL Server. He also holds two certifications from ISC2, (Certified Information Systems Security Professional (CISSP) and Cloud Certified Security Professional (CCSP)) and an MBA from Indiana University.Scott is the Founder and President of Opperis Technologies LLC, a firm dedicated to helping small- to mid-sized businesses write more secure software. His latest project is CodeSheriff.NET, an open-source security scanner for ASP.NET Core, which can be found on GitHub at ScottNorberg-NCG/CodeSheriff.NET.Chapter 1: Intro to Security.- Chapter 2: Software Security Overview.- Chapter 3: Web Security.- Chapter 4: Thinking Like a Hacker.- Chapter 5: Introduction to ASP.NET Core Security.- Chapter 6: Cryptography.- Chapter 7: Processing User Input.- Chapter 8: Data Access and Storage.- Chapter 9: Authentication and Authorization.- Chapter 10: Advanced Web Security.- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC).

Regulärer Preis: 59,99 €
Produktbild für Advanced interactive interfaces with Access

Advanced interactive interfaces with Access

Explore and learn advanced techniques for working with graphical, interactive interfaces that can be built in Access.This book starts with best practices and tips to write code using VBA, and covers how to implement them in a real-world scenario. You will learn how to create and use VBA classes. An introduction to the binary code and the "bit vector" technique is discussed, followed by the implementation of a drag-and-drop engine. You also will learn how to design a timeline, and make it scrollable.WHAT YOU WILL LEARN* Write readable, easy-to-maintain code* Add a drag-and-drop engine to an Access application* Apply variations to the drag-and-drop technique to create different graphical effects* Embed a scrollable timeline in an Access application, on which objects can be dynamically placedWHO THIS BOOK IS FORVBA developersALESSANDRO GRIMALDI was born in Rome, Italy, where he first approached the computer world in 1982. He has been a professional VBA developer since 1998. For several years Alessandro consulted for the World Food Programme (WFP), a major United Nations agency for which he worked in Afghanistan, North Korea, Ethiopia, and Italy. He has also worked in Vienna, Austria for the CTBTO, another UN agency. Since 2014 he has lived in Frankfurt, Germany, and where he worked for the European Central Bank for about five years. In all these places he has developed VBA tools, ranging from simple automation tools to complex, multi-user, distributed, enterprise-level applications.In recent years, Alessandro has produced several videos about the drag-and-drop and the scrolling timeline, and delivered live workshops and presentations explaining these techniques. He has an online VBA shop (AlessandroGrimaldi.com/Shop) where he sells VBA tutorials, workshops, and tools. He also has a YouTube channel (@AlxGrim) where he publishes VBA-related videos.Introduction.- Chapter 1 - Writing code: good practices and tips.- Chapter 2 - VBA classes.- Chapter 3 - The presence vector technique.- Chapter 4 - Advanced interfaces: Drag and Drop.- Chapter 5 - Advanced interfaces: Scrollable timeline.- Conclusion.

Regulärer Preis: 59,99 €
Produktbild für Deep Reinforcement Learning and Its Industrial Use Cases

Deep Reinforcement Learning and Its Industrial Use Cases

THIS BOOK SERVES AS A BRIDGE CONNECTING THE THEORETICAL FOUNDATIONS OF DRL WITH PRACTICAL, ACTIONABLE INSIGHTS FOR IMPLEMENTING THESE TECHNOLOGIES IN A VARIETY OF INDUSTRIAL CONTEXTS, MAKING IT A VALUABLE RESOURCE FOR PROFESSIONALS AND ENTHUSIASTS AT THE FOREFRONT OF TECHNOLOGICAL INNOVATION.Deep Reinforcement Learning (DRL) represents one of the most dynamic and impactful areas of research and development in the field of artificial intelligence. Bridging the gap between decision-making theory and powerful deep learning models, DRL has evolved from academic curiosity to a cornerstone technology driving innovation across numerous industries. Its core premise—enabling machines to learn optimal actions within complex environments through trial and error—has broad implications, from automating intricate decision processes to optimizing operations that were previously beyond the reach of traditional AI techniques. “Deep Reinforcement Learning and Its Industrial Use Cases: AI for Real-World Applications” is an essential guide for anyone eager to understand the nexus between cutting-edge artificial intelligence techniques and practical industrial applications. This book not only demystifies the complex theory behind deep reinforcement learning (DRL) but also provides a clear roadmap for implementing these advanced algorithms in a variety of industries to solve real-world problems. Through a careful blend of theoretical foundations, practical insights, and diverse case studies, the book offers a comprehensive look into how DRL is revolutionizing fields such as finance, healthcare, manufacturing, and more, by optimizing decisions in dynamic and uncertain environments. This book distills years of research and practical experience into accessible and actionable knowledge. Whether you’re an AI professional seeking to expand your toolkit, a business leader aiming to leverage AI for competitive advantage, or a student or academic researching the latest in AI applications, this book provides valuable insights and guidance. Beyond just exploring the successes of DRL, it critically examines challenges, pitfalls, and ethical considerations, preparing readers to not only implement DRL solutions but to do so responsibly and effectively. AUDIENCEThe book will be read by researchers, postgraduate students, and industry engineers in machine learning and artificial intelligence, as well as those in business and industry seeking to understand how DRL can be applied to solve complex industry-specific challenges and improve operational efficiency. SHUBHAM MAHAJAN, PHD, is an assistant professor in the School of Engineering at Ajeekya D Y Patil University, Pune, Maharashtra, India. He has eight Indian, one Australian, and one German patent to his credit in artificial intelligence and image processing. He has authored/co-authored more than 50 publications including peer-reviewed journals and conferences. His main research interests include image processing, video compression, image segmentation, fuzzy entropy, and nature-inspired computing methods with applications in optimization, data mining, machine learning, robotics, and optical communication. PETHURU RAJ, PHD, is chief architect and vice president at Reliance Jio Platforms Ltd in Bangalore, India. He has a PhD in computer science and automation from the Indian Institute of Science in Bangalore, India. His areas of interest focus on artificial intelligence, model optimization, and reliability engineering. He has published thirty research papers and edited forty-two books. AMIT KANT PANDIT, PHD, is an associate professor in the School of Electronics & Communication Engineering Shri Mata Vaishno Devi University, India. He has authored/co-authored more than 60 publications including peer-reviewed journals and conferences. He has two Indian and one Australian patent to his credit in artificial intelligence and image processing. His main research interests are image processing, video compression, image segmentation, fuzzy entropy, and nature-inspired computing methods with applications in optimization. Preface 1. Deep Reinforcement Learning Applications in Real-World Scenarios: Challenges and OpportunitiesSunilkumar Ketineni and Sheela J.2. Deep Reinforcement Learning: A Key to Unlocking the Potential of Robotics and Autonomous SystemsSaksham and Chhavi Rana3. Deep Reinforcement Learning Algorithms: A Comprehensive OverviewShweta V. Bondre, Bhakti Thakre, Uma Yadav and Vipin D. Bondre4. Deep Reinforcement Learning in Healthcare and Biomedical ApplicationsBalakrishnan D., Aarthy C., Nandhagopal Subramani, Venkatesan R. and Logesh T. R.5. Application of Deep Reinforcement Learning in Adversarial Malware DetectionManju and Chhavi Rana6. Artificial Intelligence in Blockchain and Smart Contracts for Disruptive InnovationEashwar Sivakumar, Kiran Jot Singh and Paras Chawla7. Clinical Intelligence: Deep Reinforcement Learning for Healthcare and Biomedical AdvancementsKeerthika K., Kannan M. and T. Saravanan8. Cultivating Expertise in Deep and Reinforcement Learning PrinciplesChilakalapudi Malathi and J. Sheela9. . Deep Reinforcement Learning in Healthcare and Biomedical ResearchShruti Agrawal and Pralay Mitra10. Deep Reinforcement Learning in Robotics and Autonomous SystemsUma Yadav, Shweta V. Bondre and Bhakti Tha11. Diabetic Retinopathy Detection and Classification Using Deep Reinforcement LearningH.R. Manjunatha and P. Sathish12. Early Brain Stroke Detection Based on Optimized Cuckoo Search Using LSTM‑Gated Multi-Perceptron Neural NetworkAnita Venaik, Asha A., Dhiyanesh B., Kiruthiga G., Shakkeera L. and Vinodkumar Jacob13. Hybrid Approaches: Combining Deep Reinforcement Learning with Other TechniquesM. T. Vasumathi, Manju Sadasivan and Aurangjeb Khan14. Predictive Modeling of Rheumatoid Arthritis Symptoms: A High-Performance Approach Using HSFO-SVM and UNET-CNNAnusuya V., Baseera A., Dhiyanesh B., Parveen Begam Abdul Kareem and Shanmugaraja P.15. Using Reinforcement Learning in Unity Environments for Training AI AgentGeetika Munjal and Monika Lamba16. Emerging Technologies in Healthcare SystemsRavi Kumar Sachdeva, Priyanka Bathla, Samriti Vij, Dishika, Madhur Jain, Lokesh Kumar, G. S. Pradeep Ghantasala and Rakesh AhujaReferencesIndex

Regulärer Preis: 188,99 €
Produktbild für Raspberry Pi für Kids

Raspberry Pi für Kids

* Spannende Spiele sowie Projekte wie Autosimulator, Temperaturmessung und Überwachungskamera * Einfache Programmierbeispiele mit Scratch und Python * Für Raspberry Pi 5, 4, 3 und Raspberry Pi Zero WH * Ab 12 Jahre, aber auch für Erwachsene, die eine wirklich einfache Einführung suchen Raspberry Pi von Grund auf kennenlernen Du lernst, wie du deinen Raspberry Pi zum Laufen bringst, Software installierst und sogar deine eigenen Spiele programmierst! Außerdem gibt es jede Menge spannende Projekte mit Sensoren und anderen Gadgets. Dafür eignet sich selbst das günstige Modell Raspberry Pi Zero. Mit dabei ist auch eine Liste der benötigten Hardware inklusive Sensoren. Programmieren ohne Vorkenntnisse Du musst kein Technik-Nerd sein, um loszulegen! Mit der visuellen Programmiersprache Scratch erstellst du kinderleicht deine eigenen Spiele, Animationen und sogar einen Autosimulator. Für coole Experimente mit Sensoren, Kameras und Co. tauchen wir in die Welt von Python ein. Am Ende jedes Kapitels warten spannende Aufgaben mit Lösungen auf dich, damit du dein Wissen testen und vertiefen kannst. Spannende Projekte und Elektronik-Experimente Sei bereit für zahlreiche Elektronik-Projekte mit einfachen Schritt-für-Schritt-Anleitungen! Du lernst, wie du Programme schreibst, die Blinkmuster erzeugen, LED-Strips steuern und sogar Hindernisse im Dunkeln mit Ultraschall erkennen. Außerdem kannst du Morsezeichen senden, Temperaturen messen, mit einer Kamera den Garten beobachten und das Livebild automatisch auswerten. Aus dem Inhalt: * Einführung in Scratch und Programmierung kleiner Spiele * Grundlagen von Python * Leuchtdioden steuern * Steuerung mit Schaltern * Datensammlungen verarbeiten * Projekte mit dem Ultraschallsensor * Temperaturmessung * Grafische Benutzungsoberflächen und Animation * Projekte mit der Kamera Zum Download: * Zwei Bonuskapitel und der Code für alle Projekte Systemvoraussetzungen: Windows, Linux oder macOS Michael Weigend hat an der Universität Potsdam in Informatik promoviert. Er war für mehr als 30 Jahre als Lehrer tätig und hat 20 Jahre lang an der FernUniversität Hagen Seminare zur Didaktik der Informatik gegeben. An der Universität Münster hält er im Rahmen eines Lehrauftrags Vorlesungen zur Python-Programmierung. Michael Weigend engagiert sich in mehreren nationalen und internationalen Communities für den Computer-Einsatz in der Bildung, darunter Constructionism, International Federation for Information Processing (TC 3 Computers in Education) , Bebras - International Contest on Informatics and Computational Thinking. Er hat über 60 wissenschaftliche Artikel veröffentlicht und mehrere Bücher zu den Themen Programmierung, Web Development und visuelle Modellierung geschrieben.

Regulärer Preis: 29,99 €
Produktbild für PCs & Laptops For Dummies

PCs & Laptops For Dummies

A ONE-STOP GUIDE TO MAKING THE MOST OF YOUR DESKTOP PC OR LAPTOP COMPUTERPCs and Laptops For Dummies is the essential user's guide to the features your PC or laptop has to offer—and how to use them successfully. With this book as your coach, you can jump over technological hurdles with ease, navigating the hardware and software of your personal computer. Regardless of what brand of computer you use, you'll learn to navigate the latest version of Windows. You'll also explore how PCs, laptops, and other mobile devices can be used together, and how to keep your data secure. This Dummies guide is your first step toward computer-whiz status, saving you time and energy with everything in one place.* Learn about Microsoft Windows, the operating system for PC and laptop* Discover PC and laptop features you never knew about, and get your devices to play nicely together* Identify the specs and features you need, so you can purchase a computer that's a fit for you* Get easy-to-understand information, advice, and tricks at your fingertipsThis is the perfect Dummies guide for PC or laptop users at home or at work who need a go-to guide for their hardware and software questions. DAN GOOKIN wrote the very first For Dummies book in 1991. The author of several bestsellers, Dan enjoys worldwide success with books that have been translated into 32 languages and have more than 11 million copies in print. Dan is also author of Word For Dummies and C Programming For Dummies.

Regulärer Preis: 16,99 €
Neu
Produktbild für Raspberry Pi für Kids (5. Auflg.)

Raspberry Pi für Kids (5. Auflg.)

Raspberry Pi für Kids. 5. Auflage 2024Raspberry Pi von Grund auf kennenlernenDu lernst, wie du deinen Raspberry Pi zum Laufen bringst, Software installierst und sogar deine eigenen Spiele programmierst! Außerdem gibt es jede Menge spannende Projekte mit Sensoren und anderen Gadgets. Dafür eignet sich selbst das günstige Modell Raspberry Pi Zero. Mit dabei ist auch eine Liste der benötigten Hardware inklusive Sensoren.Programmieren ohne VorkenntnisseDu musst kein Technik-Nerd sein, um loszulegen! Mit der visuellen Programmiersprache Scratch erstellst du kinderleicht deine eigenen Spiele, Animationen und sogar einen Autosimulator. Für coole Experimente mit Sensoren, Kameras und Co. tauchen wir in die Welt von Python ein. Am Ende jedes Kapitels warten spannende Aufgaben mit Lösungen auf dich, damit du dein Wissen testen und vertiefen kannst.Spannende Projekte und Elektronik-ExperimenteSei bereit für zahlreiche Elektronik-Projekte mit einfachen Schritt-für-Schritt-Anleitungen! Du lernst, wie du Programme schreibst, die Blinkmuster erzeugen, LED-Strips steuern und sogar Hindernisse im Dunkeln mit Ultraschall erkennen. Außerdem kannst du Morsezeichen senden, Temperaturen messen, mit einer Kamera den Garten beobachten und das Livebild automatisch auswerten.Aus dem Inhalt:Einführung in Scratch und Programmierung kleiner SpieleGrundlagen von PythonLeuchtdioden steuernSteuerung mit SchalternDatensammlungen verarbeitenProjekte mit dem UltraschallsensorTemperaturmessungGrafische Benutzungsoberflächen und AnimationProjekte mit der KameraLeseprobe (PDF-Link)Zum Download: Zwei Bonuskapitel und der Code für alle ProjekteSystemvoraussetzungen: Windows, Linux oder macOSÜber den Autor:Michael Weigend hat an der Universität Potsdam in Informatik promoviert. Er war für mehr als 30 Jahre als Lehrer tätig und hat 20 Jahre lang an der FernUniversität Hagen Seminare zur Didaktik der Informatik gegeben. An der Universität Münster hält er im Rahmen eines Lehrauftrags Vorlesungen zur Python-Programmierung. Michael Weigend engagiert sich in mehreren nationalen und internationalen Communities für den Computer-Einsatz in der Bildung, darunter Constructionism, International Federation for Information Processing (TC 3 Computers in Education) , Bebras – International Contest on Informatics and Computational Thinking. Er hat über 60 wissenschaftliche Artikel veröffentlicht und mehrere Bücher zu den Themen Programmierung, Web Development und visuelle Modellierung geschrieben.

Regulärer Preis: 29,99 €
Neu
Produktbild für Das große Plotterbuch für Einsteiger

Das große Plotterbuch für Einsteiger

Das große Plotterbuch für Einsteiger. 1. Auflage 2024Du möchtest endlich plotten, weißt jedoch nicht, für welches Gerät du dich entscheiden sollst? Du möchtest gerne wissen, was für dich und deinen Bedarf am besten geeignet ist: Cricut Maker oder Cricut Joy von Cricut, ScanNCut von Brother oder Cameo von Silhouette?Du fragst dich, was du überhaupt alles mit einem Plotter machen kannst und was du alles zum Erstellen toller Designs brauchst?Dann ist dieses Buch genau das richtige für dich, denn »Plotter-tante« Miriam Jug gibt dir in diesem Buch alle Infos, die du für einen leichten Einstieg in die Welt der Schneidemaschinen brauchst:Angefangen bei der Frage, welches Gerät das richtige für dich ist, über die Anwendungsbereiche der verschiedenen Materialien und Folien sowie die Möglichkeiten der jeweiligen Software bis hin zu hilfreichen Tipps und Tricks insbesondere für Plotter-Neulinge.Um dir den Start zu erleichtern, findest du außerdem eine Auswahl leicht umsetzbarer Projekte, die Miriam für dich zusammengestellt hat. Sie zeigt dir alle Schritte, die dir den Einstieg erleichtern, um mit dem Plotten loszulegen.Über die Autorin:Miriam Jug, auch bekannt als »Plottertante«, gehört zu den bekanntesten Creatorinnen der deutschsprachigen Plotterszene. Die gebürtige Österreicherin lebt mit ihrem Mann und drei Kindern in der Schweiz. Ihre kreative Leidenschaft lebt sie in Online-Kursen, auf YouTube und in ihrer eigenen Facebook-Community aus.

Regulärer Preis: 24,99 €
Produktbild für Critical Security Controls for Effective Cyber Defense

Critical Security Controls for Effective Cyber Defense

This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats.The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS), these controls are the benchmark in cybersecurity, crafted to counteract the most common and impactful cyber threats. The book breaks down these controls into comprehensible segments, explaining their implementation, management, and effectiveness. This detailed approach is crucial in the context of the digital era's evolving cyber threats, heightened by the rise in remote work and cloud-based technologies. The book's relevance is magnified by its focus on contemporary challenges, offering strategies to strengthen cyber defenses in a fast-paced digital world.WHAT YOU WILL LEARN* IMPLEMENTATION STRATEGIES: Learn detailed strategies for implementing each of the CIS 18 Controls within your organization. The book provides step-by-step guidance and practical insights to help you integrate these controls effectively, ensuring that your cyber defenses are robust and resilient.* RISK MITIGATION TECHNIQUES: Discover how to identify and mitigate risks associated with failing to implement these controls. By understanding the potential consequences of neglecting each control, you can prioritize actions that protect your organization from the most significant threats.* ACTIONABLE RECOMMENDATIONS: Access practical, actionable recommendations for managing and maintaining these controls. The book offers clear and concise advice on how to continuously improve your cybersecurity measures, adapting to evolving cyber threats and organizational needs to ensure long-term protection.* TRAINING AND SIMPLIFICATION: Explore recommended training programs and simplified security control measures that can be tailored to fit the specific needs and challenges of your business environment. This section emphasizes the importance of ongoing education and streamlined processes to enhance your organization's overall cybersecurity readiness.* IMPORTANCE AND RELEVANCE: Understand the importance and relevance of each CIS 18 Control in the context of contemporary cybersecurity challenges. Learn why these controls are crucial for safeguarding your organization against the most prevalent cyber threats.* KEY CONCEPTS AND TERMS: Familiarize yourself with the key concepts and terms associated with each CIS 18 Control. This foundational knowledge will help you communicate more effectively with stakeholders and ensure a common understanding of cybersecurity principles.* QUESTIONS TO ASK: Discover the critical questions you should ask when assessing your organization’s implementation of each control. These questions will guide your evaluation and help identify areas for improvement.WHO THIS BOOK IS FORIT and cybersecurity professionals, business leaders and executives, small business owners and managers, students and academics in cybersecurity fields, government and on-profit sector professionals, and cybersecurity consultants and trainersDR. JASON EDWARDS is a seasoned cyber author and professional with over 20 years of experience in the cybersecurity field, having held diverse roles from IT operations and project management to cybersecurity strategy and governance. His strategic approach has enabled him to guide organizations through complex cyber defense challenges, ensuring robust protection against evolving threats. As the author of several books and dozens of articles, Dr. Edwards shares deep knowledge and practical insights with IT professionals, cybersecurity experts, and organizational leaders. Active on LinkedIn, he connects with over 70,000 professionals through daily and weekly posts, and manages a 20,000-subscriber mailing list called the Cyber Spear. Passionate about education and community engagement, he offers monthly group sessions, one-on-one consultations, and is a frequent podcast guest discussing cybersecurity trends, strategies, and best practices. For more information, visit his website at jason-edwards.me.Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter 3. Control 3: Data Protection.- Chapter 4. Control 4: Secure Configuration of Enterprise Assets and software.- Chapter 5. Control 5: Account Management.- Chapter 6. Control 6: Access Control Management.- Chapter 7. Control 7: Continuous Vulnerability Management.- Chapter 8. Control 8: Audit Log Management.- Chapter 9. Control 9: Email and Web Browser Protections.- Chapter 10. Control 10: Malware Defenses.- Chapter 11. Control 11: Data Recovery.- Chapter 12. Control 12: Network Infrastructure Management.- Chapter 13. Control 13: Network Monitoring and Defense.- Chapter 14. Control 14: Security Awareness and Skills Training.- Chapter 15. Control 15: Service Provider Management.- Chapter 16. Control 16: Application Software Security.- Chapter 17. Control 17: Incident Response Management.- Chapter 18. Control 18: Penetration Testing.

Regulärer Preis: 59,99 €
Produktbild für Java Microservices and Containers in the Cloud

Java Microservices and Containers in the Cloud

Spring Boot helps developers create applications that simply run. When minimal configuration is required to start up an application, even novice Java developers are ready to start. But this simplicity shouldn't constrain developers in addressing more complex enterprise requirements where microservice architecture is concerned. With the need to rapidly deploy, patch, or scale applications, containers provide solutions which can accelerate development, testing as well as production cycles. The cloud helps companies to scale and adapt at speed, accelerate innovation and drive business agility, without heavy upfront IT investment. What if we can equip even a novice developer with all that is required to help enterprises achieve all of this, this book does this and more._Java Microservices and Containers in the Cloud_offers a comprehensive guide to both architecture and programming aspects to Java microservices development, providing a fully hands-on experience. We not only describe various architecture patterns but also provide practical implementations of each pattern through code examples. Despite the focus on architecture, this book is designed to be accessible to novice developers with only basic programming skills, such as writing a "Hello World" program and using Maven to compile and run Java code. It ensures that even such readers can easily comprehend, deploy, and execute the code samples provided in the book. Regardless of your current knowledge or lack thereof in Docker, Kubernetes, and Cloud technologies, this book will empower you to develop programming skills in these areas.There is no restriction on beginners attempting to understand serious and non-trivial architecture constraints. While mastering concurrency and scalability techniques often requires years of experience, this book promises to empower you to write microservices, as well as how to containerize and deploy them in the cloud. If you are a non-programming manager who is not afraid to read code snippets, this book will empower you to navigate the challenges posed by seasoned architects. It will equip you with the necessary understanding of specialized jargon, enabling you to engage in more meaningful discussions and break through barriers when collaborating with programmers, architects and engineers across the table.The code examples provided in the book are intentionally designed to be simple and accessible to all, regardless of your programming background. Even if you are a C# or Python programmer and not familiar with Java, you will find the code examples easy to follow and understand.YOU WILL* Acquire proficiency in both RPC-style and Messaging-style inter-microservice communication* Construct microservices utilizing a combination of SQL (PostgreSQL) and NoSQL (MongoDB) databases* Leverage Liquibase, a database schema version control tool, and administer UI in conjunction with PostgreSQL* Leverage both GraphQL and conventional REST approaches side by side* Gain practical experience in implementing Hexagonal and Onion Architectures through hands-on exercises* Integrate asynchronous processing into your Java applications using powerful APIs such as DeferredResult and CompletableFutureWHO IT'S FOR:Developers, programmers and Architects who want to level up their Java Micoservices and Archtecture knowledge as well as managers who want to brush up on their technical knowledge around the topic.BINILDAS A. CHRISTUDAS is an experienced architect and developer, specializing in building distributed software solutions for the Airlines, Hospitality, and Telecommunications domains ever since the inception of Java. He is currently working in IBS Software, a leader in Airline Cargo software domain as Vice President, heading Technology Services. Binildas is currently engaged in architecting highly resilient and highly available software solutions for some of the world's largest Cruise and Airline companies. He specializes in ensuring data consistency across distributed and decentralized systems, encompassing various scenarios such as cross-region deployments across major public cloud.Binildas is a Mechanical engineer from the College of Engineering, Trivandrum (CET) with a post-graduation in Systems from the Institute of Management Kerala (IMK). Leveraging over 25 years of experience in distributed systems, Binil currently dedicates his focus to architecting Conflict-Free, Replicated, and Eventually Consistent systems thathandle streaming data and big data and is the author of “_Practical Microservices Architectural Patterns_” by Apress and “_Service Oriented Java Business Integration_” by Packt. Binildas was the captain of Kerala University Power Lifting team and was the national champion during his studies. He has been awarded patent for “_A Method and a System for Facilitating Multitenancy of Services_” by the USPTO.Binildas can be contacted through www.linkedin.com/in/binildasca/1: Microservices for the Enterprise.- 2 More Hands-on Microservices .- 3: Onion and Hexagonal Architecture in Practice.- 4: Message Oriented Microservices,- 5: Microservices Integration in Practice.- 6: Production Grade Message Oriented Microservices.- 7: Introducing Docker.- 8: Microservices Containers.- 9: Composing Multi Service Containers.- 10: Microservices with Kubernetes.- 11: Message Oriented Microservices in Kubernetes.- 12:Automating Kubernetes Deployment and Helm Packaging.-13: CI/CD for Microservices in Containers.- 14: Microservices in AWS Elastic Compute Cloud (EC2).-15: Microservices in AWS Elastic Kubernetes Service (EKS).

Regulärer Preis: 59,99 €
Produktbild für Numerical Python

Numerical Python

Learn how to leverage the scientific computing and data analysis capabilities of Python, its standard library, and popular open-source numerical Python packages like NumPy, SymPy, SciPy, matplotlib, and more. This book demonstrates how to work with mathematical modeling and solve problems with numerical, symbolic, and visualization techniques. It explores applications in science, engineering, data analytics, and more._Numerical Python, Third Edition_, presents many case study examples of applications in fundamental scientific computing disciplines, as well as in data science and statistics. This fully revised edition, updated for each library's latest version, demonstrates Python's power for rapid development and exploratory computing due to its simple and high-level syntax and many powerful libraries and tools for computation and data analysis.After reading this book, readers will be familiar with many computing techniques, including array-based and symbolic computing, visualization and numerical file I/O, equation solving, optimization, interpolation and integration, and domain-specific computational problems, such as differential equation solving, data analysis, statistical modeling, and machine learning.WHAT YOU'LL LEARN* Work with vectors and matrices using NumPy* Review Symbolic computing with SymPy* Plot and visualize data with Matplotlib* Perform data analysis tasks with Pandas and SciPy* Understand statistical modeling and machine learning with statsmodels and scikit-learn* Optimize Python code using Numba and CythonWHO THIS BOOK IS FORDevelopers who want to understand how to use Python and its ecosystem of libraries for scientific computing and data analysis.ROBERT JOHANSSON is an experienced Python programmer and computational scientist with a Ph.D. in Theoretical Physics from Chalmers University of Technology, Sweden. He has worked with scientific computing in academia and industry for over 15 years and participated in open source and proprietary research and development projects. His open-source contributions include work on QuTiP, a popular Python framework for simulating the dynamics of quantum systems, and he has also contributed to several other popular Python libraries in the scientific computing landscape. Robert is passionate about scientific computing and software development, teaching and communicating best practices for combining these fields with optimal outcomes: novel, reproducible, extensible, and impactful computational results.1. Introduction to Computing with Python.- 2. Vectors, Matrices and Multidimensional Arrays.- 3. Symbolic Computing.- 4. Plotting and Visualization.- 5. Equation Solving.- 6. Optimization.- 7. Interpolation.- 8. Integration.- 9. Ordinary Differential Equations.- 10. Sparse Matrices and Graphs.- 11. Partial Differential Equations.- 12. Data Processing and Analysis.- 13. Statistics.- 14. Statistical Modeling.- 15. Machine Learning.- 16. Bayesian Statistics.- 17. Signal and Image Processing.- 18. Data Input and Output.- 19. Code Optimization.- Appendix.

Regulärer Preis: 37,99 €
Produktbild für Data Engineering for Machine Learning Pipelines

Data Engineering for Machine Learning Pipelines

This book covers modern data engineering functions and important Python libraries, to help you develop state-of-the-art ML pipelines and integration code.The book begins by explaining data analytics and transformation, delving into the Pandas library, its capabilities, and nuances. It then explores emerging libraries such as Polars and CuDF, providing insights into GPU-based computing and cutting-edge data manipulation techniques. The text discusses the importance of data validation in engineering processes, introducing tools such as Great Expectations and Pandera to ensure data quality and reliability. The book delves into API design and development, with a specific focus on leveraging the power of FastAPI. It covers authentication, authorization, and real-world applications, enabling you to construct efficient and secure APIs using FastAPI. Also explored is concurrency in data engineering, examining Dask's capabilities from basic setup to crafting advanced machine learning pipelines. The book includes development and delivery of data engineering pipelines using leading cloud platforms such as AWS, Google Cloud, and Microsoft Azure. The concluding chapters concentrate on real-time and streaming data engineering pipelines, emphasizing Apache Kafka and workflow orchestration in data engineering. Workflow tools such as Airflow and Prefect are introduced to seamlessly manage and automate complex data workflows.What sets this book apart is its blend of theoretical knowledge and practical application, a structured path from basic to advanced concepts, and insights into using state-of-the-art tools. With this book, you gain access to cutting-edge techniques and insights that are reshaping the industry. This book is not just an educational tool. It is a career catalyst, and an investment in your future as a data engineering expert, poised to meet the challenges of today's data-driven world.WHAT YOU WILL LEARN* Elevate your data wrangling jobs by utilizing the power of both CPU and GPU computing, and learn to process data using Pandas 2.0, Polars, and CuDF at unprecedented speeds* Design data validation pipelines, construct efficient data service APIs, develop real-time streaming pipelines and master the art of workflow orchestration to streamline your engineering projects* Leverage concurrent programming to develop machine learning pipelines and get hands-on experience in development and deployment of machine learning pipelines across AWS, GCP, and AzureWHO THIS BOOK IS FORData analysts, data engineers, data scientists, machine learning engineers, and MLOps specialistsPAVAN KUMAR NARAYANAN has an extensive and diverse career in the information technology industry, with a primary focus on the data engineering and machine learning domains. Throughout his professional journey, he has consistently delivered solutions in environments characterized by heterogeneity and complexity. His experience spans a broad spectrum, encompassing traditional data warehousing projects following waterfall methodologies and extending to contemporary integrations that involve APIs and message-based systems. Pavan has made substantial contributions to large-scale data integrations for applications in data science and machine learning. At the forefront of these endeavors, he has played a key role in delivering sophisticated data products and solutions, employing a versatile mix of both traditional and agile approaches. Currently employed with Ether Infinitum LLC, Sheridan, WY, Pavan Kumar Narayanan continues to bring his wealth of experience to the forefront of the data engineering and machine learning landscape.Chapter 1: Data Manipulation and Analytics Using Pandas.- Chapter 2: Data Manipulation Using Polars and CuDF.- Chapter 3: Introduction to Data Validation.- Chapter 4: Data Validation Using Great Expectations.- Chapter 5: Introduction to API Design Using FastAPI.- Chapter 6: Introduction to Concurrency Programming Using Task.- Chapter 7: Dask ML.- Module 5: Data Pipelines in the Cloud.- Chapter 9: Introduction to Microsoft Azure.- Chapter 10: Introduction to Google Cloud.- Chapter 11: Introduction to Streaming Data.- Chapter 12: Introduction to Workflow Management Using Airflow.- Chapter 13: Introduction to Workflow Management Using Prefect.

Regulärer Preis: 59,99 €
Produktbild für Knowledge Management and Industry Revolution 4.0

Knowledge Management and Industry Revolution 4.0

GET UP TO SPEED WITH HOW THE LATEST KNOWLEDGE MANAGEMENT AND INDUSTRY 4.0 TECHNOLOGYHELP MAKE ENTERPRISES SECURE, CONTROLLED, AND OPTIMIZED FOR A BETTER FUTURE.This book focuses on how the practices of Industrial Revolution 4.0 and knowledge management interact to create value. In recent years, value chain relationships and related activities have utilized new technologies so that existing conceptual frameworks require a roadmap for innovation strategies and effective implementation. The chapters in this book include case studies contributed by researchers and industry practitioners that showcase the impact of practices and challenges presented by technological changes, upgrading of old systems, and internal and external factors. Knowledge Management and Industrial Revolution 4.0 describes how knowledge management impacts the automation of the industry in secure, controlled, and optimized ways. For instance, the use of the latest technologies and sensors can lead to significant time and cost savings, and operators can utilize their machines and equipment from remote locations. The Industrial Revolution 4.0 incorporates the latest technologies for automation and, in many cases, the result is similar to working from home, even in manufacturing. The use of deep learning should offer many quality control benefits. Furthermore, blockchain technology can help the industry with automation in secure and transparent ways. Apart from industry automation, other departments like human resources can also use effective knowledge management for better outcomes. The use of HR knowledge management allows employees to find and access the information they require without the assistance of the HR department. The book focuses on every aspect of the industry to help all the stakeholders of an organization. The benefits include a reduction in time required for accessing information, easier training, decreased operational expenses, improved stakeholders’ satisfaction, faster problem-solving, increased pace of innovation, simpler employee review and progress reports. AUDIENCEThe book will have a wide audience within academia, education, businesses, and industrial organizations, especially those who are undergoing industry 4.0 changes to optimize for a better future. RAJENDRA KUMAR, PHD, is an associate professor in the Department of Computer Science & Engineering, School of Engineering and Technology, Sharda University, Greater Noida, India. He has published 5 textbooks and about 35 papers in national and international journals and conferences. VISHAL JAIN, PHD, is an associate professor at Sharda University, Greater Noida, India. His research interests focus on information retrieval, the semantic web, ontology engineering, data mining, etc. He has edited 50 books for a variety of publishers and authored 95 research papers for reputed conferences and journals. Jain has several awards, which include the 2012 Young Active Member Award and the 2019 Best Researcher Award. VENUS C. IBARRA, MD, DBA, works as the dean of the MBA/DBA Department of San Pablo Colleges, Philippines. Ibarra also works as a lecturer at the Ateneo Graduate School of Business in management accounting. Ibarra earned her master’s degree in business administration at the Philippines Women’s University. She has professional experience in administration, finance, budgeting, and statistical functions. In 2009, Ibarra was recognized as an outstanding finance educator by CITI NBank and Bank Central in the Philippines. CORRIENNA ABDUL TALIB, PHD, is a senior lecturer in the Department of Educational Science, Mathematics, and Creative Multimedia, Universiti Teknologi, Malaysia. She is a certified computational thinking master trainer who designs professional skill courses at UTM and researches and leads projects on computational skills, microscale chemistry, visual programming language, and educational robotic and game-based learning. VINAY KUKREJA, PHD, is a professor of computer science & engineering at Chitkara University, Punjab, India. His research interests primarily focus on machine learning, deep learning, agile software development, image processing, etc. He has about 90 articles indexed in Scopus and has authored 3 books. In 2018, Kukreja received the first prize in the SIH Hackathon from the Ministry of Housing & Urban Affairs, India.

Regulärer Preis: 173,99 €
Produktbild für 3D Printed Science Projects Volume 1

3D Printed Science Projects Volume 1

Create 3D printable models that can help students from kindergarten through grad school learn math, physics, botany, chemistry, engineering and more.This book shows parents and teachers how to use the models inside as starting points for 3D printable explorations. Students can start with these models and vary them for their own explorations. Unlike other sets of models that can just be scaled, these models have the science built-in to allow for more insight into the fundamental concepts.Each of the eight topics is designed to be customized by you to create a wide range of projects suitable for science fairs, extra credit, or classroom demonstrations. Science fair project suggestions and extensive "where to learn more" resources are included, too. You will add another dimension to your textbook understanding of science.FOR THIS NEW EDITION:The second edition of 3D Printed Science Projects is a thorough update of the original, modernizing the 3D printing technology. 3D Printed Science Projects shows you how to create 3D printable models that can help students from kindergarten through grad school learn math, physics, botany, chemistry, engineering and more. Each of the models is created in the free, open source CAD program OpenSCAD, so it can be customized by the reader. This allows the models to be the basis of open-ended STEM projects at a variety of levels.WHAT YOU'LL LEARN* Create (and present the science behind) 3D printed models.* Use a 3D printer to create those models as simply as possible.* Discover new science insights from designing 3D models.WHO THIS BOOK IS FOR3D Printed Science Projects particularly targets the technology-squeamish teacher or parent who want their kids tolearn something from their 3D printer but need help getting started. Kids who love science, homeschoolers (and the grandmas who buy them birthday presents) will be customers.As an engineer and management consultant, JOAN HORVATH has coordinated first-of-a-kind interdisciplinary technical and business projects, helping people with no common vocabulary (startups, universities, small towns, etc). work together. Her experience as a systems engineer has spanned software development, spacecraft flight operations, risk management, and spacecraft/ground system test and contingency planning.As an educator, Joan’s passion is bringing science and technology to the non-specialist in a comprehensible and entertaining way that will stay with the learner for a lifetime.RICH CAMERON is a co-founder of Pasadena-based Nonscriptum LLC. Nonscriptum consults for educational and scientific users in the areas of 3D printing and maker technologies. Rich (known online as “Whosawhatsis”) is an experienced open source developer who has been a key member of the RepRap 3D-printer development community for many years. His designs include the original spring/lever extruder mechanism used on many 3D printers, the RepRap Wallace, and the Deezmaker Bukito portable 3D printer. By building and modifying several of the early open source 3D printers to wrestle unprecedented performance out of them, he has become an expert at maximizing the print quality of filament-based printers. When he's not busy making every aspect of his own 3D printers better, from slicing software to firmware and hardware, he likes to share that knowledge and experience online so that he can help make everyone else’s printers better too.Chapter 1: Math Modeling with 3D Prints.- Chapter 2: Light and Other Waves.- Chapter 3: Gravity.- Chapter 4: Airfoils.- Chapter 5: Simple Machines.- Chapter 6: Plants and Their Ecosystems.- Chapter 7: Molecules.- Chapter 8: Trusses.- Chapter 9: Gears.- Appendix A: Links.

Regulärer Preis: 54,99 €
Produktbild für Foundations and Opportunities of Biometrics

Foundations and Opportunities of Biometrics

Biometrics are used in many situations of our daily lives, but we still don’t fully understand the way they work and what potential lies behind them. This book covers a fascinating and broad area that impacts everyone, not only companies involved in deep-tech. Over the past decades, biometrics have made their way into our daily lives after being first limited to science fiction and later expensive high-tech applications. With the widespread use of smartphones and other technological gadgets we interact with on a daily basis, the ability to collect and use biometric signals has become ubiquitous.This book provides a comprehensive overview of the type of biometric signals that are being used, how they are implemented, and what their limitations are. With technology being more relevant in all aspects of life, it’s more important for people who make decisions in their business to understand the opportunities and limitations of biometric use.This book will guide the readerthrough the history of biometric technology, including initial applications of the technology, and reflect on how pop culture like science fiction media has influenced the way we look at biometrics and shaped our expectations and fears. It also covers real-world applications and how they work. This book provides foundational information that will help readers understand how they can use biometrics in their everyday life and assess their ability to disrupt existing business processes and models.WHAT YOU WILL LEARN:How Biometrics have evolved over time and the main drivers for them being disruptive.The scope and limitations of various types of biometrics.Foundational knowledge to lead the conversation about biometrics within your company.An analysis of BMD sources that remain stable over time.Develop an analytical understanding of accuracy, precision and errors and understand how the various uses of BMD rate within these contexts.WHO THIS BOOK IS FOR:This book is aimed at people who have an interest in technology, but perhaps aren’t very technical themselves. It focuses on business leaders, product managers, product designers, etc. who want to understand the opportunities biometrics offer to their customers and how to implement them in a useful and effective way.Dario Salice is a seasoned professional in the space of Telecommunications, Security, and Online-Identities. While most recently working at Google and then Meta, he provided the right security tools to billions of users to protect their online accounts. I also launched dedicated security programs to protect highly targeted individuals from more sophisticated attacks. Serving as Meta’s representative on the Board of the FIDO Alliance, an industry standards organization working on strong authentication methods, he gained a broader perspective on the global authentication market. Dario's current focus is ramping up an independent boutique consulting service to engage with companies of any size who want to benefit from my insights Part I - Laying the foundationJennifer Bailey-Salice is an author of calculus workbooks at Calculus Workbooks at White Willow Math. For over 20 year, Jennifer Bailey-Salice taught all levels of math from 6th grade through Multi-Variable Calculus. As a classroom teacher and a private tutor, Ms. Bailey-Salice developed an understanding of what students need to know in order to fully understand the topic at hand. While her teaching took her from Atlanta to Spain and then California, she is now settled in Surrey, UK where she hopes to continue helping students succeed atmath.Part I: Laying Down the Foundation.- Chapter 1: The growing Use of Biometrics.- Chapter 2: What are Biometrics?.- Chapter 3: Adversarial Behavior - Attack and Defense.- Part II: Sources of Biometric Signals.- Chapter 4: Physiological Biometrics.- Chapter 5: Facial Recognition.- Chapter 6: Behavioral Biometrics.- Chapter 7: Voice Analysis.- Part III: Critical Analysis.- Chapter 8: How Do We Judge Accuracy?.- Chapter 9: Risks and Responsibilities.- Chapter 10: Usability and Practicality.

Regulärer Preis: 64,99 €
Produktbild für Biotech and IoT

Biotech and IoT

Dive into the intricacies of biotech and IoT integration with a meticulously crafted journey through the chapters. This book unveils the synergies between lab-based biotech processes and cloud-connected technologies, promising a paradigm shift in healthcare, agriculture, and beyond.Beginning with an introduction to IoT applications and biotechnological principles, the book navigates historical developments and convergence. Chapters unfold transformation of laboratories into smart spaces, revolutionizing healthcare through remote patient monitoring and personalized medicine. Explore the world of IoT-enabled biomedical devices and their impact, while delving into data management, security challenges, and ethical considerations. The narrative extends to precision agriculture, environmental monitoring, and synergy of biometric security systems with wearable devices. Bioinformatics and cloud analytics take center stage, unraveling their role in the biotech IoT landscape. Finally, gaze into the future, anticipating trends, innovations, and global collaborations, concluding with practical insights for professionals and enthusiasts alike.On completion, you will emerge from this enlightening journey equipped with a deep understanding of the transformative power at the intersection of biotechnology and IoT. Gain insights into the historical context, current applications, and future trends shaping the landscape. Armed with a wealth of technical knowledge, readers will navigate smart laboratories, healthcare revolutions, environmental interventions, and more. This book not only opens doors to the intricacies of biotech IoT but also provides practical guidance for navigating the evolving field.WHAT YOU WILL LEARN* Understand the core principles of IoT and its versatile applications across various fields* Review the integration of IoT in laboratories, witnessing the metamorphosis of traditional labs into intelligent, connected spaces* Explore real-world applications of IoT in healthcare, agriculture, and environmental monitoringWHO THIS BOOK IS FORProfessionals in healthcare, agriculture, or laboratory settings with a foundational knowledge of biotechnology or IoT looking to deepen their understanding of how these technologies converge and impact their respective industries would greatly benefit from this book.DR. ALOK KUMAR SRIVASTAV is an accomplished Assistant Professor in the Department of Health Science at the University of the People, Pasadena, California, USA. His academic background includes a Ph.D., M.Tech, M.Sc. in Bio-Technology, a Post-Doctoral Fellowship (Research) in Bio-Technology from Lincoln University College, Malaysia, and an MBA in Human Resource Management. He is a distinguished figure in Academia and Research, honored with the "International Pride of Educationist Award" at AIT, Thailand in 2022, for pioneering contributions to advancing education in the digital era and receiving a prestigious accolade "Innovative Academic Researcher Award" at HULT, France, UK in 2024 for his exceptional creativity, innovation, and impact in academic research.DR. PRIYANKA DAS serves as an Assistant Professor in the Department of Health Science at the prestigious University of the People in Pasadena, California, USA. She holds a Ph.D., M.Tech, and M.Sc. in Biotechnology along with an MBA in Human Resource Management. Prior to her current position, she was a Post-Doctoral Fellow (Research) in Biotechnology at Lincoln University College, Malaysia. Dr. Priyanka Das is a dedicated scholar, contributing significantly to the field of Biotechnology.ASHISH KUMAR SRIVASTAVA is renowned in the industry for expertise in IoT and smart connected products, with a proven track record of collaborating across functions to develop assets in new products, R&D, and portfolios. As a seasoned manager, Ashish effectively launched smart connected products, providing value in processes, designs, and business models. Leading product development in IoT platforms, Ashish excels in stakeholder alignment and managing client relationships. With extensive experience in IoT and cloud architecture, Ashish has spearheaded the development of innovative solutions in categories such as smart home, security, and sensors. Beyond corporate achievements, Ashish has contributed significantly to community building, mentoring in Intel CAG youth empowerment programs and leading projects in diverse areas such as robotics, embedded systems, and innovation. Ashish is an active participant in Intel College excellence programs, offering hands-on training and workshops on IoT projects. As an accomplished author, Ashish brings a wealth of knowledge and a commitment to advancing technology.Chapter 1: Introduction to Biotechnology and IoT Integration.- Chapter 2: Historical Development and Convergence.- Chapter 3: Smart Laboratories and IoT Transformation.- Chapter 4: Healthcare Revolution.- Chapter 5: Connected Biomedical Devices and Digital Integration.- Chapter 6: Data Management, Security, and Ethical Considerations.- Chapter 7: Precision Agriculture and Environmental Monitoring.- Chapter 8: Biometric Security Systems and Wearable Devices.- Chapter 9: Bioinformatics and Cloud Analytics.- Chapter 10: Future Trends, Innovations, and Global Collaboration.

Regulärer Preis: 49,99 €