Computer und IT
Mathe-Basics für Data Scientists
Um als Data Scientist erfolgreich zu sein, müssen Sie über ein solides mathematisches Grundwissen verfügen. Dieses Buch bietet einen leicht verständlichen Überblick über die Mathematik, die Sie in der Data Science benötigen. Thomas Nield führt Sie Schritt für Schritt durch Bereiche wie Infinitesimalrechnung, Wahrscheinlichkeit, lineare Algebra, Statistik und Hypothesentests und zeigt Ihnen, wie diese Mathe-Basics beispielsweise in der linearen und logistischen Regression und in neuronalen Netzen eingesetzt werden. Zusätzlich erhalten Sie Einblicke in den aktuellen Stand der Data Science und erfahren, wie Sie dieses Wissen für Ihre Karriere als Data Scientist nutzen.- Verwenden Sie Python-Code und Bibliotheken wie SymPy, NumPy und scikit-learn, um grundlegende mathematische Konzepte wie Infinitesimalrechnung, lineare Algebra, Statistik und maschinelles Lernen zu erkunden- Verstehen Sie Techniken wie lineare und logistische Regression und neuronale Netze durch gut nachvollziehbare Erklärungen und ein Minimum an mathematischer Terminologie- Wenden Sie deskriptive Statistik und Hypothesentests auf einen Datensatz an, um p-Werte und statistische Signifikanz zu interpretieren- Manipulieren Sie Vektoren und Matrizen und führen Sie Matrixzerlegung durch- Vertiefen Sie Ihre Kenntnisse in Infinitesimal- und Wahrscheinlichkeitsrechnung, Statistik und linearer Algebra und wenden Sie sie auf Regressionsmodelle einschließlich neuronaler Netze an- Erfahren Sie, wie Sie Ihre Kenntnisse und Fähigkeiten in der Datenanalyse optimieren und gängige Fehler vermeiden, um auf dem Data-Science-Arbeitsmarkt zu überzeugenThomas Nield ist der Gründer der Nield Consulting Group sowie Dozent bei O'Reilly Media und an der University of Southern California. Er hat Freude daran, technische Inhalte für diejenigen verständlich und gut nutzbar zu machen, die mit ihnen nicht vertraut sind oder sich von ihnen abgeschreckt fühlen. Thomas Nield unterrichtet regelmäßig Kurse zu Datenanalyse, Machine Learning, mathematischer Optimierung, KI-Systemsicherheit und praktischer künstlicher Intelligenz. Er ist Autor von zwei Büchern, Getting Started with SQL (O'Reilly) und Learning RxJava (Packt). Außerdem ist er der Gründer und Erfinder von Yawman Flight, einem Unternehmen, das Handsteuerungen für Flugsimulatoren und unbemannte Luftfahrzeuge entwickelt.
Privacy Preservation of Genomic and Medical Data
PRIVACY PRESERVATION OF GENOMIC AND MEDICAL DATADISCUSSES TOPICS CONCERNING THE PRIVACY PRESERVATION OF GENOMIC DATA IN THE DIGITAL ERA, INCLUDING DATA SECURITY, DATA STANDARDS, AND PRIVACY LAWS SO THAT RESEARCHERS IN BIOMEDICAL INFORMATICS, COMPUTER PRIVACY AND ELSI CAN ASSESS THE LATEST ADVANCES IN PRIVACY-PRESERVING TECHNIQUES FOR THE PROTECTION OF HUMAN GENOMIC DATA.Privacy Preservation of Genomic and Medical Data focuses on genomic data sources, analytical tools, and the importance of privacy preservation. Topics discussed include tensor flow and Bio-Weka, privacy laws, HIPAA, and other emerging technologies like Internet of Things, IoT-based cloud environments, cloud computing, edge computing, and blockchain technology for smart applications. The book starts with an introduction to genomes, genomics, genetics, transcriptomes, proteomes, and other basic concepts of modern molecular biology. DNA sequencing methodology, DNA-binding proteins, and other related terms concerning genomes and genetics, and the privacy issues are discussed in detail. The book also focuses on genomic data sources, analyzing tools, and the importance of privacy preservation. It concludes with future predictions for genomic and genomic privacy, emerging technologies, and applications. AUDIENCEResearchers in information technology, data mining, health informatics and health technologies, clinical informatics, bioinformatics, security and privacy in healthcare, as well as health policy developers in public and private health departments and public health. AMIT KUMAR TYAGI, PHD, is an assistant professor, at the National Institute of Fashion Technology, New Delhi, India. He has published more than 100 papers in refereed international journals, conferences, and books. He has filed more than 20 national and international patents in the areas of deep learning, Internet of Things, cyber-physical systems, and computer vision. His current research focuses on smart and secure computing and privacy amongst other interests.
Blockchain and Deep Learning for Smart Healthcare
BLOCKCHAIN AND DEEP LEARNING FOR SMART HEALTHCARETHE BOOK DISCUSSES THE POPULAR USE CASES AND APPLICATIONS OF BLOCKCHAIN TECHNOLOGY AND DEEP LEARNING IN BUILDING SMART HEALTHCARE.The book covers the integration of blockchain technology and deep learning for making smart healthcare systems. Blockchain is used for health record-keeping, clinical trials, patient monitoring, improving safety, displaying information, and transparency. Deep learning is also showing vast potential in the healthcare domain. With the collection of large quantities of patient records and data, and a trend toward personalized treatments. there is a great need for automated and reliable processing and analysis of health information. This book covers the popular use cases and applications of both the above-mentioned technologies in making smart healthcare. AUDIENCEComprises professionals and researchers working in the fields of deep learning, blockchain technology, healthcare & medical informatics. In addition, as the book provides insights into the convergence of deep learning and blockchain technology in healthcare systems and services, medical practitioners as well as healthcare professionals will find this essential reading. AKANSHA SINGH, PHD, is an associate professor in the School of Computer Science Engineering and Technology, Bennett University, Greater Noida, India. Dr. Singh has acquired a BTech, MTech, and PhD (IIT Roorkee) in the area of neural networks and remote sensing. She has to her credit more than 70 research papers, 20 books, and numerous conference papers. She has also national and international patents in the field of machine learning. Her area of interest includes mobile computing, artificial intelligence, machine learning, and digital image processing.ANURADHA DHULL, PHD, is an assistant professor in the Department of Computer Science Engineering, The NorthCap University, Gurugram, India. She has published more than 30 research papers in the area of data mining and machine learning. Dr. Anuradha has acquired a BTech, MTech, and PhD in the area of medical diagnosis and machine learning. KRISHNA KANT SINGH, PHD, is a professor at the Delhi Technical Campus, Greater Noida, India. Dr. Singh has acquired a BTech, MTech, and PhD (IIT Roorkee) in the area of deep learning and remote sensing. He has authored more than 80 technical books and research papers in international conferences and SCIE journals of repute. Preface xvPART 1: BLOCKCHAIN FUNDAMENTALS AND APPLICATIONS 11 BLOCKCHAIN TECHNOLOGY: CONCEPTS AND APPLICATIONS 3Hermehar Pal Singh Bedi, Valentina E. Balas, Sukhpreet Kaur and Rubal Jeet1.1 Introduction 31.2 Blockchain Types 41.3 Consensus 81.4 How Does Blockchain Work? 101.5 Need of Blockchain 121.6 Uses of Blockchain 121.7 Evolution of Blockchain 141.8 Blockchain in Ethereum 171.9 Advantages of Smart Contracts 211.10 Use Cases of Smart Contracts 211.11 Real-Life Example of Smart Contracts 221.12 Blockchain in Decentralized Applications 221.13 Decentraland 251.14 Challenges Faced by Blockchain 271.15 Weaknesses of Blockchain 291.16 Future of Blockchain 301.17 Conclusion 312 BLOCKCHAIN WITH FEDERATED LEARNING FOR SECURE HEALTHCARE APPLICATIONS 35Akansha Singh and Krishna Kant Singh2.1 Introduction 362.2 Federated Learning 362.3 Motivation 372.4 Federated Machine Learning 382.5 Federated Learning Frameworks 392.6 FL Perspective for Blockchain and IoT 392.7 Federated Learning Applications 412.8 Limitations 423 FUTURISTIC CHALLENGES IN BLOCKCHAIN TECHNOLOGIES 45Arun Kumar Singh, Sandeep Saxena, Ashish Tripathi, Arjun Singh and Shrikant Tiwari3.1 Introduction 463.2 Blockchain 473.3 Issues and Challenges with Blockchain 533.4 Internet of Things (IoT) 583.5 Background of IoT 593.6 Conclusion 674 AIML-BASED BLOCKCHAIN SOLUTIONS FOR IOMT 73Rishita Khurana, Manika Choudhary, Akansha Singh and Krishna Kant Singh4.1 Introduction 744.2 Objective and Contribution 754.3 Security Challenges in Different Domains 764.4 Healthcare 774.5 Agriculture 774.6 Transportation 784.7 Smart Grid 784.8 Smart City 784.9 Smart Home 794.10 Communication 794.11 Security Attacks in IoT 814.12 Solutions for Addressing Security Using Machine Learning 834.13 Solutions for Addressing Security Using Artificial Intelligence 834.14 Solutions for Addressing Security Using Blockchain 864.15 Summary 884.16 Critical Analysis 894.17 Conclusion 895 A BLOCKCHAIN-BASED SOLUTION FOR ENHANCING SECURITY AND PRIVACY IN THE INTERNET OF MEDICAL THINGS (IOMT) USED IN E-HEALTHCARE 95Meenakshi and Preeti Sharma5.1 Introduction: E-Health and Medical Services 965.2 Literature Review 985.3 Architecture of Blockchain-Enabled IoMT 1015.4 Proposed Methodology 1045.5 Conclusion and Future Work 1086 A REVIEW ON THE ROLE OF BLOCKCHAIN TECHNOLOGY IN THE HEALTHCARE DOMAIN 113Aryan Dahiya, Anuradha, Shilpa Mahajan and Swati Gupta6.1 Introduction 1136.2 Systematic Literature Methodology 1196.3 Applications of Blockchain in the Healthcare Domain 1226.4 Blockchain Challenges 1366.5 Future Research Directions and Perspectives 1396.6 Implications and Conclusion 1407 BLOCKCHAIN IN HEALTHCARE: USE CASES 147Utsav Sharma, Aditi Ganapathi, Akansha Singh and Krishna Kant Singh7.1 Introduction 1477.2 Challenges Faced in the Healthcare Sector 1497.3 Use Cases of Blockchains in the Healthcare Sector 1507.4 What is Medicalchain? 1597.5 Implementing Blockchain in SCM 1657.6 Why Use Blockchain in SCM 167PART 2: SMART HEALTHCARE 1718 POTENTIAL OF BLOCKCHAIN TECHNOLOGY IN HEALTHCARE, FINANCE, AND IOT: PAST, PRESENT, AND FUTURE 173Chetna Tiwari and Anuradha8.1 Introduction 1738.2 Types of Blockchain 1758.3 Literature Review 1778.4 Methodology and Data Sources 1888.5 The Application of Blockchain Technology Across Various Industries 1898.6 Conclusion 1999 AI-ENABLED TECHNIQUES FOR INTELLIGENT TRANSPORTATION SYSTEM FOR SMARTER USE OF THE TRANSPORT NETWORK FOR HEALTHCARE SERVICES 205Meenakshi and Preeti Sharma9.1 Introduction 2069.2 Artificial Intelligence 2089.3 Artificial Intelligence: Transport System and Healthcare 2099.4 Artificial Intelligence Algorithms 2119.5 AI Workflow 2159.6 AI for ITS and e-Healthcare Tasks 2169.7 Intelligent Transportation, Healthcare, and IoT 2189.8 AI Techniques Used in ITS and e-Healthcare 2219.9 Challenges of AI and ML in ITS and e-Healthcare 2239.10 Conclusions 22510 CLASSIFICATION OF DEMENTIA USING STATISTICAL FIRST-ORDER AND SECOND-ORDER FEATURES 235Deepika Bansal and Rita Chhikara10.1 Introduction 23610.2 Materials and Methods 23810.3 Proposed Framework 23910.4 Experimental Results and Discussion 24710.5 Conclusion 25111 PULMONARY EMBOLISM DETECTION USING MACHINE AND DEEP LEARNING TECHNIQUES 257Renu Vadhera, Meghna Sharma and Priyanka Vashisht11.1 Introduction 25711.2 The State-of-the-Art of PE Detection Models 26011.3 Literature Survey 26111.4 Publications Analysis 27011.5 Conclusion 27012 COMPUTER VISION TECHNIQUES FOR SMART HEALTHCARE INFRASTRUCTURE 277Reshu Agarwal12.1 Introduction 27812.2 Literature Survey 28012.3 Proposed Idea 30812.4 Results 31612.5 Conclusion 31713 ENERGY-EFFICIENT FOG-ASSISTED SYSTEM FOR MONITORING DIABETIC PATIENTS WITH CARDIOVASCULAR DISEASE 323Rishita Khurana, Manika Choudhary, Akansha Singh and Krishna Kant Singh13.1 Introduction 32413.2 Literature Review 32613.3 Architectural Design of the Proposed Framework 32813.4 Fog Services 33013.5 Smart Gateway and Fog Services Implementation 33713.6 Cloud Servers 33813.7 Experimental Results 33913.8 Future Directions 34513.9 Conclusion 35014 MEDICAL APPLIANCES ENERGY CONSUMPTION PREDICTION USING VARIOUS MACHINE LEARNING ALGORITHMS 353Kaustubh Pagar, Tarun Jain, Horesh Kumar, Aditya Bhardwaj and Rohit Handa14.1 Introduction 35414.2 Literature Review 35514.3 Methodology 35614.4 Machine Learning Algorithms Used 36414.5 Results and Analysis 36814.6 Model Analysis 36914.7 Conclusion and Future Work 374PART 3: FUTURE OF BLOCKCHAIN AND DEEP LEARNING 37915 DEEP LEARNING-BASED SMART E-HEALTHCARE FOR CRITICAL BABIES IN HOSPITALS 381Ritam Dutta15.1 Introduction 38215.2 Literature Survey 38315.3 Evaluation Criteria 39215.4 Results 39315.5 Conclusion and Future Scope 39416 AN IMPROVED RANDOM FOREST FEATURE SELECTION METHOD FOR PREDICTING THE PATIENT’S CHARACTERISTICS 399K. Indhumathi and K. Sathesh Kumar16.1 Introduction 40016.2 Literature Survey 40216.3 Dataset 40316.4 Data Analysis 40616.5 Data Pre-Processing 40716.6 Feature Selection Methods 40816.7 Variable Importance by Machine Learning Methods 41416.8 Random Forest Feature Selection 41516.9 Proposed Methodology 41816.10 Results and Discussion 42016.11 Conclusion 42117 BLOCKCHAIN AND DEEP LEARNING: RESEARCH CHALLENGES, OPEN PROBLEMS, AND FUTURE 425Akansha Singh and Krishna Kant Singh17.1 Introduction 42617.2 Research Challenges 42717.3 Open Problems 42817.4 Future Possibilities 42917.5 Conclusion 430References 431Index 433
The Composable Enterprise: Agile, Flexible, Innovative
The benefits of digitalisation do not lie in the use of new technologies for existing processes, but in organisational changes and new business models. The book highlights the composable enterprise as the guiding principle for successful digital transformation and associated cost reductions and revenue increases. What does it mean? A composable enterprise is organised in a decentralised process-oriented way. This allows the enterprise to react quickly to new situations, develop or change processes and business models. The information systems are based on platform architectures. A paradigm shift to monolithic applications.Sector concepts for industry, consulting and universities show how organisation and application architectures interlock in the composable enterprise.The reader receives inspiration, a foundation and a compass for the digital transformation of a company to the composable enterprise.PROF. DR. DR. H.C. MULT. AUGUST-WILHELM SCHEER is one of the most influential figures and entrepreneurs in German computing. The ARIS method he developed for enterprise architecture and process management is used internationally.His books on business informatics have been highly influential and have been translated into several languages. His research focuses on information, innovation and business process management. In addition, Scheer is the publisher of the trade journal IM+io.He has founded several successful IT companies. He has been the sole shareholder of IDS Scheer Holding GmbH since 2010. The company network with over 1,300 employees includes the larger companies Scheer GmbH, imc AG and Scheer PAS GmbH. The company network also has holdings in several start-up companies. In 2014, he founded the non-profit research institute August-Wilhelm Scheer Institute for digital products and processes gGmbH (AWSi).He was a member of the SAP AG supervisory board for 20 years. From 2007 to 2011, he was President of Bitkom e. V. As an IT innovator and entrepreneur, he also works as an independent political consultant.Scheer is also an experienced and respected jazz baritone saxophonist and promotes culture and science with the help of the August-Wilhelm Scheer Foundation for Science and Art, which he founded in 2001. He is the holder of numerous national and international accolades. In 2017, he was inducted into the Hall of Fame of German Research.His interpretation of the composable enterprise is his vision for designing future-oriented digitised companies, one which he also implements in his own companies.
AI Applications to Communications and Information Technologies
AI APPLICATIONS TO COMMUNICATIONS AND INFORMATION TECHNOLOGIESAPPLY THE TECHNOLOGY OF THE FUTURE TO NETWORKING AND COMMUNICATIONS.Artificial intelligence, which enables computers or computer-controlled systems to perform tasks which ordinarily require human-like intelligence and decision-making, has revolutionized computing and digital industries like few other developments in recent history. Tools like artificial neural networks, large language models, and deep learning have quickly become integral aspects of modern life. With research and development into AI technologies proceeding at lightning speeds, the potential applications of these new technologies are all but limitless. AI Applications to Communications and Information Technologies offers a cutting-edge introduction to AI applications in one particular set of disciplines. Beginning with an overview of foundational concepts in AI, it then moves through numerous possible extensions of this technology into networking and telecommunications. The result is an essential introduction for researchers and for technology undergrad/grad student alike. AI Applications to Communications and Information Technologies readers will also find:* In-depth analysis of both current and evolving applications* Detailed discussion of topics including generative AI, chatbots, automatic speech recognition, image classification and recognition, IoT, smart buildings, network management, network security, and more* An authorial team with immense experience in both research and industryAI Applications to Communications and Information Technologies is ideal for researchers, industry observers, investors, and advanced students of network communications and related fields. DANIEL MINOLI is Principal Consultant for DVI Communications, New York, USA, and a longtime Expert Witness and Testifying Expert in networking, wireless, video, IoT, and VoIP. In addition to working as Director of Engineering for gamut of premiere high-tech firms, he has acted as Adjunct Instructor at New York University and Stevens Institute of Technology, USA for twenty years. He has published extensively on networks, IP/IPv6, video, wireless communications, and related subjects. BENEDICT OCCHIOGROSSO is Co-Founder of DVI Communications, New York, USA, with extensive experience as a technology engineer, manager and executive. He is a subject matter expert in several disciplines now enhanced by artificial intelligence including telecommunications networking, speech recognition, image processing and building management systems. He has also served as a testifying expert witness and advisor on patent portfolios. Ch 1: Overview1.1 Introduction and Basic Concepts1.1.1 Machine Learning1.1.2 Deep Learning1.1.3 Activation Functions1.1.4 MLPs1.1.5 RNNs1.1.6 CNNs1.1.7 Comparison1.2 Learning Methods1.3 Areas of applicability1.4 Scope of this textReferencesGlossaryCh 2: Current and evolving applications to Natural Language Processing2.1 Scope2.2 Introduction2.3 Overview of Natural Language Processing and Speech Processing2.3.1 Feed-forward NN2.3.2 RNNs2.3.3 LSTM2.3.4 Attention2.3.5 Transformer2.4 NLP/NLU Basics2.4.1 Pre-training2.4.2 NLP/NLG Architectures2.4.3 Encoder-Decoder Methods2.4.4 Application of Transformer2.4.5 Other Approaches2.5 NLG Basics2.6 ChatbotsReferencesGlossaryChapter 3: Current and evolving applications to Speech Processing3.1 Scope3.2 Overview3.2.1 Traditional Approaches3.2.2 DNN-based feature extraction3.3 Noise Cancellation3.3.1 Approaches3.3.2 Example of a system supporting noise cancellation3.4 Training3.5 Applications to voice interfaces used to control home devices & Digital Assistant Applications3.6 Attention-based models3.7 Sentiment Extraction3.8 End-to-end learning3.9 Speech Synthesis3.10 Zero-shot TTS3.11 VALL-E: Unseen speaker as an acoustic promptReferencesGlossaryCh 4: Current and evolving applications to Video and Imaging4.1 Overview4.2 Convolution process4.3 CNNs4.3.1 Nomenclature4.3.2 Basic Formulation of the CNN layers4.3.3 Fully convolutional networks (FCN)4.3.4 Convolutional Autoencoders4.3.5 R-CNNs, Fast R-CNN, Faster R-CNN4.4 Imaging Applications4.4.1 Basic Image Management4.4.2 Image segmentation and classification4.4.3 Illustrative examples of a DNN/CNN4.4.4 Well-known Image classification networks4.5 Specific application Examples4.5.1 Semantic segmentation and semantic edge detection4.5.2 CNN Filtering Process For Video Coding4.5.3 Virtual clothing4.5.5 Object Detection Applications4.5.6 Classifying video data4.5.7 Example of Training4.5.8 Example: Image reconstruction is used to remove artifacts4.5.9 Example: Video Transcoding/Resolution-enhancement4.5.10 Facial expression recognition4.5.11 Transformer Architecture for image processing4.5.12 Example: A GAN Approach/Synthetic Photo4.5.13 Situational Awareness4.6 Other models: Diffusion and Consistency ModelsReferencesGlossaryCh 5: Current and evolving applications to IoT and applications to Smart buildings and energy management5.1 Introduction5.1.1 IoT Applications5.1.2 Smart Cities5.2 Smart Building ML Applications5.2.1 Basic Building Elements5.2.2 Particle Swarm Optimization5.2.3 Specific ML Example – Qin Model5.2.3.1 EnergyPlus™5.3.3.2 Modeling and Simulation5.2.3.3 Energy Audit Stage5.2.3.4 Optimization Stage5.2.3.5 Model Construction5.2.3.6 EnergyPlus Models5.2.3.7 Real-Time Control Parameters5.2.3.8 Neural Networks in the Qin Model (DNN, RNN, CNN)5.2.3.9 Finding Inefficiency Measures5.2.3.10 Particle Swarm Optimizer5.2.3.11 Integration of Particle Swarm Optimization with Neural Networks5.2.3.12 Deep Reinforcement Learning5.2.3.13 Deployments5.3 Example of a Commercial Product – BrainBox5.3.1 Overview5.3.2 LSTM Application - technical background5.3.3 BrainBox Energy Optimization systemReferencesGlossaryCh 6: Current and evolving applications to Network Cybersecurity6.1 Overview6.2 General Security Requirements6.3 Corporate resources/intranet Security Requirements6.3.1 Network And Endsystem Security Testing6.3.2 Application Security Testing6.3.3 Compliance Testing6.4 IoT Security (IoTSec)6.5 Blockchains6.6 Zero Trust Environments6.7 Areas of ML applicability6.7.1 Example of cyberintrusion detector6.7.2 Example of Hidden Markov Model (HMM) for intrusion detection6.7.3 Anomaly Detection Example6.7.4 Phishing Detection Emails Using Feature Extraction6.7.5 Example of classifier engine to identify phishing websites6.7.6 Example of system for data protection6.7.7 Example of an integrated cybersecurity threat management6.7.8 Example of a Vulnerability Lifecycle Management SystemReferencesGlossaryCh 7: Current and evolving applications to Network Management7.1 Overview7.2 Examples of Neural Network-Assisted Network Management7.2.1 Example of NN-based Network Management system (FM)7.2.2 Example of a model for predictions related to the operation of a telecommunication network (FM)7.2.3 Prioritizing Network Monitoring Alerts (FM, PM)7.2.4 System for Recognizing And Addressing Network Alarms (FM)7.2.5 Load Control Of An Enterprise Network (PM)7.2.6 Data Reduction To Accelerate Machine Learning For Networking (FM, PM)7.2.7 Compressing Network Data (PM)7.2.8 ML Predictor For A Remote Network Management Platform (FM, PM, CM, AM)7.2.9 Cable Television (CATV) Performance Management system (PM)ReferencesGlossary
AI Applications to Communications and Information Technologies
AI APPLICATIONS TO COMMUNICATIONS AND INFORMATION TECHNOLOGIESAPPLY THE TECHNOLOGY OF THE FUTURE TO NETWORKING AND COMMUNICATIONS.Artificial intelligence, which enables computers or computer-controlled systems to perform tasks which ordinarily require human-like intelligence and decision-making, has revolutionized computing and digital industries like few other developments in recent history. Tools like artificial neural networks, large language models, and deep learning have quickly become integral aspects of modern life. With research and development into AI technologies proceeding at lightning speeds, the potential applications of these new technologies are all but limitless. AI Applications to Communications and Information Technologies offers a cutting-edge introduction to AI applications in one particular set of disciplines. Beginning with an overview of foundational concepts in AI, it then moves through numerous possible extensions of this technology into networking and telecommunications. The result is an essential introduction for researchers and for technology undergrad/grad student alike. AI Applications to Communications and Information Technologies readers will also find:* In-depth analysis of both current and evolving applications* Detailed discussion of topics including generative AI, chatbots, automatic speech recognition, image classification and recognition, IoT, smart buildings, network management, network security, and more* An authorial team with immense experience in both research and industryAI Applications to Communications and Information Technologies is ideal for researchers, industry observers, investors, and advanced students of network communications and related fields. DANIEL MINOLI is Principal Consultant for DVI Communications, New York, USA, and a longtime Expert Witness and Testifying Expert in networking, wireless, video, IoT, and VoIP. In addition to working as Director of Engineering for gamut of premiere high-tech firms, he has acted as Adjunct Instructor at New York University and Stevens Institute of Technology, USA for twenty years. He has published extensively on networks, IP/IPv6, video, wireless communications, and related subjects. BENEDICT OCCHIOGROSSO is Co-Founder of DVI Communications, New York, USA, with extensive experience as a technology engineer, manager and executive. He is a subject matter expert in several disciplines now enhanced by artificial intelligence including telecommunications networking, speech recognition, image processing and building management systems. He has also served as a testifying expert witness and advisor on patent portfolios. About the Authors xiPreface xiii1 OVERVIEW 11.1 Introduction and Basic Concepts 11.1.1 Machine Learning 51.1.2 Deep Learning 61.1.3 Activation Functions 131.1.4 Multi-layer Perceptrons 171.1.5 Recurrent Neural Networks 211.1.6 Convolutional Neural Networks 211.1.7 Comparison 261.2 Learning Methods 261.3 Areas of Applicability 391.4 Scope of this Text 41A. Basic Glossary of Key AI Terms and Concepts 44References 572 CURRENT AND EVOLVING APPLICATIONS TO NATURAL LANGUAGE PROCESSING 652.1 Scope 652.2 Introduction 662.3 Overview of Natural Language Processing and Speech Processing 722.3.1 Feed-forward NNs 742.3.2 Recurrent Neural Networks 742.3.3 Long Short-Term Memory 752.3.4 Attention 772.3.5 Transformer 782.4 Natural Language Processing/Natural Language Understanding Basics 812.4.1 Pre-training 822.4.2 Natural Language Processing/Natural Language Generation Architectures 852.4.3 Encoder-Decoder Methods 882.4.4 Application of Transformer 892.4.5 Other Approaches 902.5 Natural Language Generation Basics 912.6 Chatbots 952.7 Generative AI 101A. Basic Glossary of Key AI Terms and Concepts Related to Natural Language Processing 103References 1093 CURRENT AND EVOLVING APPLICATIONS TO SPEECH PROCESSING 1173.1 Scope 1173.2 Overview 1193.2.1 Traditional Approaches 1193.2.2 DNN-based Feature Extraction 1233.3 Noise Cancellation 1263.3.1 Approaches 1283.3.1.1 Delay-and-Sum Beamforming (DSB) 1293.3.1.2 Minimum Variance Distortionless Response (MVDR) Beamformer 1303.3.1.3 Non- adaptive Beamformer 1313.3.1.4 Multichannel Linear Prediction (MCLP) 1323.3.1.5 ML-based Approaches 1323.3.1.6 Neural Network Beamforming 1353.3.2 Specific Example of a System Supporting Noise Cancellation 1383.4 Training 1413.5 Applications to Voice Interfaces Used to Control Home Devices and Digital Assistant Applications 1423.6 Attention-based Models 1463.7 Sentiment Extraction 1483.8 End-to-End Learning 1483.9 Speech Synthesis 1503.10 Zero-shot TTS 1523.11 VALL- E: Unseen Speaker as an Acoustic Prompt 152A. Basic Glossary of Key AI Terms and Concepts 156References 1664 CURRENT AND EVOLVING APPLICATIONS TO VIDEO AND IMAGING 1734.1 Overview and Background 1734.2 Convolution Process 1764.3 CNNs 1814.3.1 Nomenclature 1814.3.2 Basic Formulation of the CNN Layers and Operation 1814.3.2.1 Layers 1814.3.2.2 Operations 1884.3.3 Fully Convolutional Networks (FCN) 1904.3.4 Convolutional Autoencoders 1904.3.5 R-CNNs, Fast R-CNN, Faster R-CNN 1934.4 Imaging Applications 1954.4.1 Basic Image Management 1954.4.2 Image Segmentation and Image Classification 1994.4.3 Illustrative Examples of a Classification DNN/CNN 2024.4.4 Well-Known Image Classification Networks 2044.5 Specific Application Examples 2134.5.1 Semantic Segmentation and Semantic Edge Detection 2134.5.2 CNN Filtering Process for Video Coding 2154.5.3 Virtual Clothing 2164.5.4 Example of Unmanned Underwater Vehicles/Unmanned Aerial Vehicles 2184.5.5 Object Detection Applications 2184.5.6 Classifying Video Data 2224.5.7 Example of Training 2244.5.8 Example: Image Reconstruction is Used to Remove Artifacts 2254.5.9 Example: Video Transcoding/Resolution-enhancement 2284.5.10 Facial Expression Recognition 2284.5.11 Transformer Architecture for Image Processing 2304.5.12 Example: A GAN Approach/Synthetic Photo 2304.5.13 Situational Awareness 2314.6 Other Models: Diffusion and Consistency Models 236A. Basic Glossary of Key AI Terms and Concepts 238B. Examples of Convolutions 246References 2505 CURRENT AND EVOLVING APPLICATIONS TO IOT AND APPLICATIONS TO SMART BUILDINGS AND ENERGY MANAGEMENT 2575.1 Introduction 2575.1.1 IoT Applications 2575.1.2 Smart Cities 2585.2 Smart Building ML Applications 2755.2.1 Basic Building Elements 2755.2.2 Particle Swarm Optimization 2765.2.3 Specific ML Example – Qin Model 2795.2.3.1 EnergyPlus™ 2815.2.3.2 Modeling and Simulation 2825.2.3.3 Energy Audit Stage 2865.2.3.4 Optimization Stage 2875.2.3.5 Model Construction 2895.2.3.6 EnergyPlus Models 2895.2.3.7 Real- Time Control Parameters 2905.2.3.8 Neural Networks in the Qin Model (DNN, RNN, CNN) 2905.2.3.9 Finding Inefficiency Measures 2945.2.3.10 Particle Swarm Optimizer 2945.2.3.11 Integration of Particle Swarm Optimization with Neural Networks 2965.2.3.12 Deep Reinforcement Learning 2985.2.3.13 Deployments 2985.3 Example of a Commercial Product – BrainBox AI 3015.3.1 Overview 3015.3.2 LSTM Application – Technical Background 3025.3.3 BrainBox AI Commercial Energy Optimization System 305A. Basic Glossary of Key IoT (Smart Building) Terms and Concepts 314References 3396 CURRENT AND EVOLVING APPLICATIONS TO NETWORK CYBERSECURITY 3476.1 Overview 3476.2 General Security Requirements 3496.3 Corporate Resources/Intranet Security Requirements 3536.3.1 Network and End System Security Testing 3586.3.2 Application Security Testing 3606.3.3 Compliance Testing 3626.4 IoT Security (IoTSec) 3636.5 Blockchains 3656.6 Zero Trust Environments 3696.7 Areas of ML Applicability 3706.7.1 Example of Cyberintrusion Detector 3736.7.2 Example of Hidden Markov Model (HMM) for Intrusion Detection 3746.7.3 Anomaly Detection Example 3786.7.4 Phishing Detection Emails Using Feature Extraction 3836.7.5 Example of Classifier Engine to Identify Phishing Websites 3866.7.6 Example of System for Data Protection 3886.7.7 Example of an Integrated Cybersecurity Threat Management 3906.7.8 Example of a Vulnerability Lifecycle Management System 392A. Basic Glossary of Key Security Terms and Concepts 396References 4007 CURRENT AND EVOLVING APPLICATIONS TO NETWORK MANAGEMENT 4077.1 Overview 4077.2 Examples of Neural Network- Assisted Network Management 4087.2.1 Example of NN-Based Network Management System (Case of FM) 4137.2.2 Example of a Model for Predictions Related to the Operation of a Telecommunication Network (Case of FM) 4167.2.3 Prioritizing Network Monitoring Alerts (Case of FM and PM) 4197.2.4 System for Recognizing and Addressing Network Alarms (Case of FM) 4247.2.5 Load Control of an Enterprise Network (Case of PM) 4287.2.6 Data Reduction to Accelerate Machine Learning for Networking (Case of FM and PM) 4317.2.7 Compressing Network Data (Case of PM) 4357.2.8 ML Predictor for a Remote Network Management Platform (Case of FM, PM, CM, AM) 4377.2.9 Cable Television (CATV) Performance Management System (Case of PM) 441A. Short Glossary of Network Management Concepts 446References 447Super Glossary 449Index 467
Geheimakte Computer
Spiel, Spaß und ... IT-Wissen?! Ein Computerbuch zum Schmökern.Der Informatikunterricht ist dir zu trocken? Du bist auf der Suche nach den wirklich spannenden Themen? Halt! Psssst! Dann wirf doch einen Blick in die »Geheimakte Computer«. Sie ist dein Einstieg in die große weite IT-Welt. Hier erfährst du alles, was dich rund um den Computer wirklich interessiert: Bastelprojekte, Computerspiele, Programmierung und nützliches Wissen zu spannenden Themen wie Hacking, Digitalisierung und Sicherheit, künstliche Intelligenz und interessante Persönlichkeiten der Branche.Genau nach deinem GeschmackDu magst Computer und Spielekonsolen? Aber zocken allein reicht dir nicht aus? Dann wage einen Blick in die »Geheimakte Computer« und erfahre mehr über die faszinierende IT-Welt. Durch spannende Projekte, Geschichten und Aufgaben lernst du Dinge, die dich wirklich interessieren.IT-Themen – unterhaltsam erklärtHacking, künstliche Intelligenz, Computerspiele, Digitalisierung oder die miesen Tricks der Tech-Industrie: hier erfährst du über alle Themen, was dir die Schule nicht vermitteln kann. Das Buch weckt deine Neugier und ermöglicht eine intensive Beschäftigung mit der digitalen Welt.Mehr als ein LesebuchHier wird dir nicht nur wichtiges Wissen rund um den Computer vermittelt. Tobias Hübner gibt dir mit kreativen Maker-Projekten, Programmier-Challenges und unterhaltsamen Hintergrundgeschichten Einblicke in die Welt der Informatik, die dir Programmiereinführungen und der Informatikunterricht nicht bieten können.Aus dem Inhalt:Das kreativste Werkzeug der WeltSo funktioniert ein ComputerAlte Technik neu entdeckenGames – besser als ihr RufEine Spielkonsole mit dem Raspberry PiWie schützt du dich vor Hackertricks?Ist künstliche Intelligenz gefährlich?Digitalisierung – Pro und ContraDie fiesen Tricks der Tech-IndustrieVision: Die Zukunft des ComputersLeseprobe (PDF-Link)Über den Autor:Tobias Hübner setzt sich seit über 15 Jahren als Lehrer, Autor, Dozent und IT-Trainer für digitale Bildung ein und wurde für seine kreativen Ideen mehrfach ausgezeichnet, u. a. vom Bundesfamilienministerium und auf der Frankfurter Buchmesse.
Pro Bash
Learn how to effectively utilize the Bash shell in your programming. This refreshed and expanded third edition has been updated to Bash 5.2, and many scripts have been rewritten to make them more idiomatically Bash, taking better advantage of features specific to Bash. It is easy to read, understand, and will teach you how to get to grips with Bash programming without drowning you in pages and pages of syntax.Using this book you will be able to use the shell efficiently, make scripts run faster using expansion and external commands, and understand how to overcome many common mistakes that cause scripts to fail. This book is perfect for all beginning Linux and Unix system administrators who want to be in full control of their systems, and really get to grips with Bash programming.The Bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of Shell internals, Shell programs can perform as snappily as utilities written in C or other compiled languages. And you will see how, without assuming UNIX lore, you can write professional Bash programs through standard programming techniques.WHAT YOU'LL LEARN* Use the Bash shell to write utilities and accomplish most programming tasks* Replace many external commands with shell parameter expansion making scripts very fast* Avoid many common mistakes that cause scripts to fail* See how Bash’s read line and history libraries can save typing when getting user input* Build shell scripts that get information from the WebWHO THIS BOOK IS FORDevelopers, programmers, and open source enthusiasts who want to write scripts using Bash on multiple platformsJAYANT VARMA is the founder of OZ Apps (www.oz-apps.com), a consulting and development company providing IT solutions. He is an experienced developer with more than 30 years of industry experience spread across several countries. As well as being a university lecturer in Australia where he currently resides, he is the author of a number of books topics like SwiftUI Lua and Xcode as well as Open Source topics like Linux, Bash and Shell Scripting . He loves to travel and finds Europe to be his favorite destination.Chris F.A. Johnson was introduced to Unix in 1990 and learned shell scripting because there was no C compiler on the system. His first major project was a menu-driven, user-extensible database system with report generator. Chris is now retired and currently resides in Toronto, Canada. 1. Hello, World: Your First Shell Program.- 2. Input, Output and Throughput.- 3. Looping and Branching.- 4. Command-Line parsing and Expansion.- 5. Parameters and Variables.- 6. Shell Functions.- 7. String Manipulation.- 8. File Operations and Commands.- 9. Reserved Words and Built-in Commands.- 10. Writing Bug-Free Scripts and Debugging the Rest.- 11. Programming for the Command Line.- 12. Runtime Configuration.- 13. Data Processing.-14. Scripting the Screen.- 15. Entry Level Programming.
Practical GraphQL
Master the query language that is revolutionizing how websites are developed and built. This book is a hands-on guide to GraphQL, and will teach you how to use this open source tool to develop and deploy applications quickly and with minimal fuss.Using a project-based approach, you'll learn how to use GraphQL from the ground up. You'll start with the basics, including set up and key details regarding queries and mutations, before moving on to more advanced topics and projects. Over the course of the book, you will gain a thorough understanding of the web development ecosystem from frontend to backend by building React applications using Prisma Apollo Client and MongoDB.After completing this book, you'll be equipped with the knowledge and skills needed to turbo charge your own enterprise projects.WHAT YOU'LL LEARN* Understand what GraphQL is and how to use it* Distinguish between queries and mutations, and how to leverage them* Gain a greater knowledge of full-stack applications with React, Apollo Server, and Apollo Client* Create a full stack application with React and PrismaWHO THIS BOOK IS FORDevelopers and engineers who want to learn about GraphQL so that they can implement in their enterprise React projects. This book is aimed at both backend developers and full stack developers who want to learn to create backend queries using GraphQL.NABENDU BISWAS is a Full Stack JavaScript developer, who has been working in the IT industry for the past 16 years for some of world's top development firms and investment banks. He is a passionate tech blogger, YouTuber, and currently runs an EdTech company, specializing in teaching students about web-app development and the JavaScript ecosystem. He is also the author of five Apress books focusing on topics such as Gatsby, MERN, and React Firebase, all of which can be found on Amazon.1.Getting Started. - 2. Queries.- 3. Mutations.- 4. Full Stack GraphQL.- 5 App with Prisma.- 6. Connecting with the Frontend.
Kubernetes Fundamentals
Explore the world of Kubernetes and learn the concepts needed to develop, deploy, and manage applications on this container orchestrator. This step-by-step development guide is designed for application developers and support members aiming to learn Kubernetes and/or prepare for interviews. All the concepts in the book are presented in Q&A format, with questions framed exactly the way they are asked in an interview, giving you a distinctive edge in interviews.You’ll start by understanding how application development and deployment have evolved over the decades leading up to containerization. You’ll then dive deep into core Kubernetes concepts, learning Kubernetes architecture, Kubernetes objects and workload resources, and how to exploit them to their full potential. You’ll also learn Kubernetes deployment strategies and concepts related to rollout and rollback.Moving on, you’ll look at two very important aspects of any computing ecosystem: networking and storage. You will gain an understanding of access control in Kubernetes and how to manage a Kubernetes cluster using probes, resource quotas, taints, and tolerations. You will also get an overview of Docker and review Docker and Kubernetes best practices. Finally, you will learn about the kubectl command line tool.WHAT YOU WILL LEARN* Learn about basic and advanced Kubernetes objects and workload resources* Master important concepts such as namespaces, selectors, annotations, and access control* Understand the Kubernetes networking and storage system* Manage a Kubernetes cluster with the help of probes, resource quotas, limits, and taintsWHO THIS BOOK IS FORApplication developers and technical managers—both on the development and support sides, beginner and intermediate Kubernetes practitioners and aspirants, and those preparing for Kubernetes interviews.HIMANSHU AGRAWAL is a distinguished IT professional with 13+ years of experience in designing and implementing solutions in JEE technologies. He is currently working as Associate Consultant with CGI, for 13+ years. Himanshu specializes in some niche technical areas like JVM, Multithreading, TLS, Apache, and Kubernetes to name a few, and is a Technical Reviewer of published books. Himanshu has earned certifications from some of the top universities like Harvard and MIT. He is an Oracle Certified Java Dev, Oracle Certified Web Component Dev, and certified by Google Cloud in Architecting with Google Kubernetes Engine. Apart from technical areas, he is a Certified SAFe 5 Practitioner. Himanshu extends his technical expertise to teams primarily in BFSI and Telecom sectors.Chapter 1: Welcome to the World of Containers.- Chapter 2: Kubernetes- Deep Dive Begins.- Chapter 3: Essential Objects in Kubernetes Cluster.- CHAPTER 4: Objects Important for Secure Kubernetes Cluster.- CHAPTER 5: Networking in Kubernetes.- CHAPTER 6: Kubernetes Storage System.- CHAPTER 7: Manage Your Kubernetes Cluster Efficiently.- CHAPTER 8: Best Practices – Kubernetes and Docker.- CHAPTER 9: kubectl – The Command Line Tool
Modern Data Architecture on Azure
This book is an exhaustive guide to designing and implementing data solutions on Azure. It covers the process of managing data from end to end, starting from data collection all the way through transformation, distribution, and consumption.Modern Data Architecture on Azure begins with an introduction to the fundaments of data management, followed by a demonstration of how to build relational and non-relational data solutions on Azure. Here, you will learn data processing for complex analysis and how to work with CSV and JSON files. Moving forward, you will learn the foundational concepts of big data architecture, along with data management patterns and technology options offered by Azure. From there, you’ll be walked through the data architecture process, including data consortium on Azure, enterprise data governance, and much more. The book culminates with a deep dive into data architecture frameworks with data modeling.After reading this book, you will have a thorough understanding of data design and analytics using Azure, allowing you to collect and analyze massive amounts of data to optimize business performance, forecast future results, and more.WHAT WILL YOU LEARN* Understand the fundamentals of data architecture including data management, data handling ethics, data governance, and metadata management* Analyze and understand business needs to choose the right Azure services and make informed business decisions* Understand Azure Cloud Data design patterns for relational and non-relational data, batch real-time processing, and ETL/ELT pipelines* Modernize data architecture using Azure to leverage data and AI to enable digital transformation by securing and optimizing overall data lifecycle managementWHO IS THIS BOOK FOR:Data solution architects, data engineers, and IT consultants who want to gain a better understanding of modern data architecture design and implementation on Azure.SAGAR LAD is an Azure Data Solution Architect working with a leading multinational software company who has deep expertise in implementing data management and analytics solutions for large enterprises using cloud and artificial intelligence. He is an experienced Azure cloud evangelist with a strong focus on driving cloud adoption for enterprise organizations using Microsoft Cloud Solutions with more than ten years of IT experience. He loves blogging and is an active blogger on Medium, LinkedIn, and the C# Corner developer community. He was awarded the C# Corner MVP in September 2021 for his contributions to the developer community.Chapter 1: Introduction: Fundamentals of Data Management.- Chapter 2: Build Relational & Non-Relational Data Solutions on Azure.- Chapter 3: Building a Big Data Architecture.- Chapter 4: Data Management Patterns & Technology Choices with Azure.- Chapter 5: Data Architecture Process.- Chapter 6: Data Architecture Framework Explained.
Enterprise Social for the Java Platform
Learn everything you need to know about frameworks that help developers to integrate their solutions with social networks or APIs, from general purpose (Facebook, Twitter, Google, Mastodon) to specialized (LinkedIn, Xing, WhatsApp, YouTube, Instagram, Flickr, TikTok) to vertical (eToro, Fitbit, Strava). This book will teach you how to add social media features to web applications or services developed using Java, Jakarta EE, or generally running on a Java Virtual Machine (JVM).Jam-packed with practical examples of social integration into enterprise applications, you’ll learn how to address common requirements such as social login, identity federation, single sign-on via social accounts, OpenID Connect, and mashups. You’ll also see how to leverage Java social frameworks like Facebook Business SDK, Twitter4J, Agorava, Keycloak, and Spring Security.Enterprise Social for the Java Platform is an excellent companion to books covering Jakarta EE Security, Spring Security, portals, and related frameworks. Upon completing it, you’ll be armed with the expertise you need to integrate your own Java enterprise applications with social media networks.WHAT YOU WILL LEARN* Harness the reach and power of social media platforms by integrating your enterprise Java applications with them* Understand social media standards for different platforms* Address common security issuesWHO THIS BOOK IS FORDevelopers, architects, and managers of projects involving the use of APIs or Social Networks.WERNER KEIL is a cloud architect, Eclipse RCP, and a microservice expert for a large bank. He helps Global 500 Enterprises across industries and leading IT vendors. He worked for over 30 years as an IT manager, PM, coach, and SW architect and consultant for the finance, mobile, media, transport, and public sectors. Werner develops enterprise systems using Java, Java/Jakarta EE, Oracle, IBM, Spring or Microsoft technologies, JavaScript, Node, Angular, and dynamic or functional languages. He is a Committer at Apache Foundation, and Eclipse Foundation, a Babel Language Champion, UOMo Project Lead, and active member of the Java Community Process in JSRs such as 321 (Trusted Java), 344 (JSF 2.2), 354 (Money, also Maintenance Lead), 358/364 (JCP.next), 362 (Portlet 3), 363 (Unit-API 1), 365 (CDI 2), 366 (Java EE 8), 375 (Java EE Security), 380 (Bean Validation 2), and 385 (Unit-API 2, also Spec Lead), and was the longest serving Individual Member of the Executive Committee for nine years in a row until 2017. Werner is currently the Community representative in the Jakarta EE Specification Committee. He was among the first five Jakarta EE Ambassadors when it was founded as Java EE Guardians, and is a member of its Leadership Council.Chapter 1: Introduction.- Chapter 2: SocialUse Cases.- Chapter 3: Standardization.- Chapter 4: Social Security.- Chapter 5: Security Frameworks.- Chapter 6: Social Frameworks.- Chapter 7: Social Portals.- Appendix A: References.
Self-Service BI & Analytics
Self-Service BI & Analytics. Planung, Implementierung und Organisation. November 2023.Self-Service im BI- und Analytics-Kontext bedeutet, dass BI-Anwender selbst aktiv werden, um auf bestimmte Daten und Informationsprodukte zuzugreifen. Dabei hängt die Möglichkeit des Self-Service von Umgebungsfaktoren ab, nicht von einzelnen Werkzeugen. Um die Daten nutzen zu können, ist Datenkompetenz bei den Beteiligten erforderlich. Self-Service ist somit als strategischer Prozess zu verstehen, der als Teil der Datenstrategie immer der Unternehmensstrategie folgt und eine Kultur der Transparenz und offenen Kommunikation erfordert.Dieses Buch bietet eine umfassende Einführung in die grundlegenden Konzepte von Self-Service BI & Analytics. Es beschreibt die derzeit gängigen Ansätze mit Fokus auf die Konzeption und Governance von Self-Service. Darüber hinaus werden Lösungen für konkrete Anwendungsfälle vorgestellt. Im Einzelnen werden behandelt:Planung von Self-Service: Was ist vor der Einführung von Self-Service im Kontext einer gesamtheitlichen Datenstrategie, der Organisation und der Unternehmensarchitektur zu beachten? Welche Governance-Anforderungen müssen berücksichtigt werden?Implementierung von Self-Service: Die Entwicklung und der Betrieb von Self-Service-Lösungen werden ebenso aufgezeigt wie die Positionierung gegenüber einer Schatten-IT und die Vermeidung von technischen Schulden.Organisation von Self-Service: BI-Communitys, die Mitarbeiterausbildung und die Etablierung einer Self-Service-Kultur im Unternehmen spielen hier eine wichtige Rolle.Das Buch liefert wertvolle Einblicke und hilfreiche Anregungen für die erfolgreiche Einführung und Realisierung von Self-Service-Initiativen in der Unternehmenspraxis.Michael Kalke implementiert BI-Lösungen seit mehr als zehn Jahren. Zurzeit arbeitet er für die Vaillant Group und etabliert u.a. Self-Service BI.Artur König verantwortet bei der reportingimpulse GmbH die ganzheitliche Umsetzung von Datenprodukten von der Datenquelle bis zum fertigen Datenprodukt im Microsoft-Umfeld. Philipp Baron Freytag von Loringhoven ist ein versierter Marketingexperte und Datenanalyst, der sich seit mehr als 15 Jahren auf die Kombination von Daten, Marketing und Technologie spezialisiert hat.Lars Schreiber arbeitet als Abteilungsleiter für Business Intelligence Services in der Global IT der Pepperl + Fuchs SE. Dr. Thomas Zachrau ist seit über 30 Jahren leidenschaftlich im Bereich Analytics unterwegs. Die Analytik der kundenzentrierten Prozesse liegt ihm besonders am Herzen.Leseprobe (PDF-Link)
Building Your Own JavaScript Framework
JavaScript frameworks play an essential role in web application development; however, no single framework works perfectly for all projects. This book will help you understand existing projects, design new software architecture, and maintain projects as they grow. You’ll go through software architecture principles with JavaScript, along with a guided example of structuring your project and maintenance guidance.This book covers framework planning aspects, enabling you to identify key stakeholders, understand JavaScript API design, and leverage complex abstraction. The second part of the book takes a practical programming approach to building your own framework by showing you how to structure modules and interfaces. As you advance, you’ll discover how to develop data-binding components, work with JavaScript APIs, and much more. While writing a framework is half the job, continuing to develop it requires effort from everyone involved. The concluding chapters help to achieve this by teaching you the crucial aspects of software maintenance and highlighting the constants of framework development.By the end of this book, you’ll have gained a clear understanding of the JavaScript framework landscape, along with the ability to build frameworks for your use cases.
CompTIA Security+ Study Guide with over 500 Practice Test Questions
MASTER KEY EXAM OBJECTIVES AND CRUCIAL CYBERSECURITY CONCEPTS FOR THE COMPTIA SECURITY+ SY0-701 EXAM, ALONG WITH AN ONLINE TEST BANK WITH HUNDREDS OF PRACTICE QUESTIONS AND FLASHCARDSIn the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You’ll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight.You’ll get access to the information you need to start a new career—or advance an existing one—in cybersecurity, with efficient and accurate content. You’ll also find:* Practice exams that get you ready to succeed on your first try at the real thing and help you conquer test anxiety* Hundreds of review questions that gauge your readiness for the certification exam and help you retain and remember key concepts* Complimentary access to the online Sybex learning environment, complete with hundreds of additional practice questions and flashcards, and a glossary of key terms, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questionsPerfect for everyone planning to take the CompTIA SY0-701 exam, as well as those aiming to secure a higher-level certification like the CASP+, CISSP, or CISA, this study guide will also earn a place on the bookshelves of anyone who’s ever wondered if IT security is right for them. It’s a must-read reference!And save 10% when you purchase your CompTIA exam voucher with our exclusive WILEY10 coupon code.ABOUT THE AUTHORSMIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com. DAVID SEIDL, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University where he leads an award winning, nationally recognized IT organization. David is a bestselling author who has written over 20 books with a focus on cybersecurity certification and cyberwarfare. Introduction xxxiCHAPTER 1 TODAY’S SECURITY PROFESSIONAL 1Cybersecurity Objectives 2Data Breach Risks 3The DAD Triad 4Breach Impact 5Implementing Security Controls 7Gap Analysis 7Security Control Categories 8Security Control Types 9Data Protection 10Data Encryption 11Data Loss Prevention 11Data Minimization 12Access Restrictions 13Segmentation and Isolation 13Summary 13Exam Essentials 14Review Questions 16CHAPTER 2 CYBERSECURITY THREAT LANDSCAPE 21Exploring Cybersecurity Threats 23Classifying Cybersecurity Threats 23Threat Actors 25Attacker Motivations 31Threat Vectors and Attack Surfaces 32Threat Data and Intelligence 35Open Source Intelligence 35Proprietary and Closed- Source Intelligence 38Assessing Threat Intelligence 39Threat Indicator Management and Exchange 40Information Sharing Organizations 41Conducting Your Own Research 42Summary 42Exam Essentials 43Review Questions 45CHAPTER 3 MALICIOUS CODE 49Malware 50Ransomware 51Trojans 52Worms 54Spyware 55Bloatware 56Viruses 57Keyloggers 59Logic Bombs 60Rootkits 60Summary 62Exam Essentials 62Review Questions 64CHAPTER 4 SOCIAL ENGINEERING AND PASSWORD ATTACKS 69Social Engineering and Human Vectors 70Social Engineering Techniques 71Password Attacks 76Summary 78Exam Essentials 78Review Questions 80CHAPTER 5 SECURITY ASSESSMENT AND TESTING 85Vulnerability Management 87Identifying Scan Targets 87Determining Scan Frequency 89Configuring Vulnerability Scans 91Scanner Maintenance 95Vulnerability Scanning Tools 98Reviewing and Interpreting Scan Reports 101Confirmation of Scan Results 111Vulnerability Classification 112Patch Management 112Legacy Platforms 113Weak Configurations 115Error Messages 115Insecure Protocols 116Weak Encryption 117Penetration Testing 118Adopting the Hacker Mindset 119Reasons for Penetration Testing 120Benefits of Penetration Testing 120Penetration Test Types 121Rules of Engagement 123Reconnaissance 125Running the Test 125Cleaning Up 126Audits and Assessments 126Security Tests 127Security Assessments 128Security Audits 129Vulnerability Life Cycle 131Vulnerability Identification 131Vulnerability Analysis 132Vulnerability Response and Remediation 132Validation of Remediation 132Reporting 133Summary 133Exam Essentials 134Review Questions 136CHAPTER 6 APPLICATION SECURITY 141Software Assurance Best Practices 143The Software Development Life Cycle 143Software Development Phases 144DevSecOps and DevOps 146Designing and Coding for Security 147Secure Coding Practices 148API Security 149Software Security Testing 149Analyzing and Testing Code 150Injection Vulnerabilities 151SQL Injection Attacks 151Code Injection Attacks 155Command Injection Attacks 155Exploiting Authentication Vulnerabilities 156Password Authentication 156Session Attacks 157Exploiting Authorization Vulnerabilities 160Insecure Direct Object References 161Directory Traversal 161File Inclusion 163Privilege Escalation 163Exploiting Web Application Vulnerabilities 164Cross- Site Scripting (XSS) 164Request Forgery 167Application Security Controls 168Input Validation 168Web Application Firewalls 170Parameterized Queries 170Sandboxing 171Code Security 171Secure Coding Practices 173Source Code Comments 174Error Handling 174Hard- Coded Credentials 175Package Monitoring 175Memory Management 176Race Conditions 177Unprotected APIs 178Automation and Orchestration 178Use Cases of Automation and Scripting 179Benefits of Automation and Scripting 179Other Considerations 180Summary 181Exam Essentials 181Review Questions 183CHAPTER 7 CRYPTOGRAPHY AND THE PKI 189An Overview of Cryptography 190Historical Cryptography 191Goals of Cryptography 196Confidentiality 197Integrity 199Authentication 200Non-repudiation 200Cryptographic Concepts 200Cryptographic Keys 201Ciphers 202Modern Cryptography 202Cryptographic Secrecy 202Symmetric Key Algorithms 204Asymmetric Key Algorithms 205Hashing Algorithms 208Symmetric Cryptography 208Data Encryption Standard 208Advanced Encryption Standard 209Symmetric Key Management 209Asymmetric Cryptography 211RSA 212Elliptic Curve 213Hash Functions 214Sha 215md 5 216Digital Signatures 216HMAC 217Public Key Infrastructure 218Certificates 218Certificate Authorities 219Certificate Generation and Destruction 220Certificate Formats 223Asymmetric Key Management 224Cryptographic Attacks 225Brute Force 225Frequency Analysis 225Known Plain Text 226Chosen Plain Text 226Related Key Attack 226Birthday Attack 226Downgrade Attack 227Hashing, Salting, and Key Stretching 227Exploiting Weak Keys 228Exploiting Human Error 228Emerging Issues in Cryptography 229Tor and the Dark Web 229Blockchain 229Lightweight Cryptography 230Homomorphic Encryption 230Quantum Computing 230Summary 231Exam Essentials 231Review Questions 233CHAPTER 8 IDENTITY AND ACCESS MANAGEMENT 237Identity 239Authentication and Authorization 240Authentication and Authorization Technologies 241Authentication Methods 246Passwords 247Multifactor Authentication 251One- Time Passwords 252Biometrics 254Accounts 256Account Types 256Provisioning and Deprovisioning Accounts 257Access Control Schemes 259Filesystem Permissions 260Summary 262Exam Essentials 262Review Questions 264CHAPTER 9 RESILIENCE AND PHYSICAL SECURITY 269Resilience and Recovery in Security Architectures 271Architectural Considerations and Security 273Storage Resiliency 274Response and Recovery Controls 280Capacity Planning for Resilience and Recovery 283Testing Resilience and Recovery Controls and Designs 284Physical Security Controls 285Site Security 285Detecting Physical Attacks 291Summary 291Exam Essentials 292Review Questions 294CHAPTER 10 CLOUD AND VIRTUALIZATION SECURITY 299Exploring the Cloud 300Benefits of the Cloud 301Cloud Roles 303Cloud Service Models 303Cloud Deployment Models 307Private Cloud 307Shared Responsibility Model 309Cloud Standards and Guidelines 312Virtualization 314Hypervisors 314Cloud Infrastructure Components 316Cloud Compute Resources 316Cloud Storage Resources 319Cloud Networking 322Cloud Security Issues 325Availability 325Data Sovereignty 326Virtualization Security 327Application Security 327Governance and Auditing of Third- Party Vendors 328Hardening Cloud Infrastructure 328Cloud Access Security Brokers 328Resource Policies 329Secrets Management 330Summary 331Exam Essentials 331Review Questions 333CHAPTER 11 ENDPOINT SECURITY 337Operating System Vulnerabilities 339Hardware Vulnerabilities 340Protecting Endpoints 341Preserving Boot Integrity 342Endpoint Security Tools 344Hardening Techniques 350Hardening 350Service Hardening 350Network Hardening 352Default Passwords 352Removing Unnecessary Software 353Operating System Hardening 353Configuration, Standards, and Schemas 356Encryption 357Securing Embedded and Specialized Systems 358Embedded Systems 358SCADA and ICS 361Securing the Internet of Things 362Communication Considerations 363Security Constraints of Embedded Systems 364Asset Management 365Summary 368Exam Essentials 369Review Questions 371CHAPTER 12 NETWORK SECURITY 375Designing Secure Networks 377Infrastructure Considerations 380Network Design Concepts 380Network Segmentation 383Zero Trust 385Network Access Control 387Port Security and Port- Level Protections 388Virtual Private Networks and Remote Access 390Network Appliances and Security Tools 392Deception and Disruption Technology 399Network Security, Services, and Management 400Secure Protocols 406Using Secure Protocols 406Secure Protocols 407Network Attacks 410On- Path Attacks 411Domain Name System Attacks 412Credential Replay Attacks 414Malicious Code 415Distributed Denial- of- Service Attacks 415Summary 418Exam Essentials 419Review Questions 421CHAPTER 13 WIRELESS AND MOBILE SECURITY 425Building Secure Wireless Networks 426Connection Methods 427Wireless Network Models 431Attacks Against Wireless Networks and Devices 432Designing a Network 435Controller and Access Point Security 438Wi- Fi Security Standards 438Wireless Authentication 440Managing Secure Mobile Devices 442Mobile Device Deployment Methods 442Hardening Mobile Devices 444Mobile Device Management 444Summary 448Exam Essentials 449Review Questions 450CHAPTER 14 MONITORING AND INCIDENT RESPONSE 455Incident Response 457The Incident Response Process 458Training 462Threat Hunting 463Understanding Attacks and Incidents 464Incident Response Data and Tools 466Monitoring Computing Resources 466Security Information and Event Management Systems 466Alerts and Alarms 469Log Aggregation, Correlation, and Analysis 470Rules 471Benchmarks and Logging 478Reporting and Archiving 478Mitigation and Recovery 479Secure Orchestration, Automation, and Response (SOAR) 479Containment, Mitigation, and Recovery Techniques 479Root Cause Analysis 482Summary 483Exam Essentials 484Review Questions 485CHAPTER 15 DIGITAL FORENSICS 489Digital Forensic Concepts 490Legal Holds and e- Discovery 491Conducting Digital Forensics 493Acquiring Forensic Data 493Acquisition Tools 497Validating Forensic Data Integrity 500Data Recovery 502Forensic Suites and a Forensic Case Example 503Reporting 507Digital Forensics and Intelligence 508Summary 508Exam Essentials 509Review Questions 511CHAPTER 16 SECURITY GOVERNANCE AND COMPLIANCE 515Security Governance 518Corporate Governance 518Governance, Risk, and Compliance Programs 520Information Security Governance 520Types of Governance Structures 521Understanding Policy Documents 521Policies 522Standards 524Procedures 526Guidelines 528Exceptions and Compensating Controls 529Monitoring and Revision 530Change Management 531Change Management Processes and Controls 532Version Control 534Documentation 535Personnel Management 535Least Privilege 535Separation of Duties 535Job Rotation and Mandatory Vacations 536Clean Desk Space 536Onboarding and Offboarding 536Nondisclosure Agreements 537Social Media 537Third- Party Risk Management 537Vendor Selection 537Vendor Assessment 538Vendor Agreements 538Vendor Monitoring 539Winding Down Vendor Relationships 540Complying with Laws and Regulations 540Common Compliance Requirements 541Compliance Reporting 541Consequences of Noncompliance 542Compliance Monitoring 543Adopting Standard Frameworks 543NIST Cybersecurity Framework 544NIST Risk Management Framework 546ISO Standards 547Benchmarks and Secure Configuration Guides 549Security Awareness and Training 550User Training 551Ongoing Awareness Efforts 553Summary 554Exam Essentials 555Review Questions 557CHAPTER 17 RISK MANAGEMENT AND PRIVACY 561Analyzing Risk 563Risk Identification 564Risk Assessment 565Risk Analysis 567Managing Risk 570Risk Mitigation 571Risk Avoidance 572Risk Transference 572Risk Acceptance 573Risk Tracking 574Risk Register 575Risk Reporting 576Disaster Recovery Planning 577Disaster Types 577Business Impact Analysis 578Privacy 578Data Inventory 579Information Classification 580Data Roles and Responsibilities 581Information Life Cycle 583Privacy Enhancing Technologies 584Privacy and Data Breach Notification 585Summary 585Exam Essentials 585Review Questions 587Appendix Answers to Review Questions 591Chapter 1: Today’s Security Professional 592Chapter 2: Cybersecurity Threat Landscape 593Chapter 3: Malicious Code 595Chapter 4: Social Engineering and Password Attacks 597Chapter 5: Security Assessment and Testing 600Chapter 6: Application Security 602Chapter 7: Cryptography and the PKI 604Chapter 8: Identity and Access Management 605Chapter 9: Resilience and Physical Security 607Chapter 10: Cloud and Virtualization Security 609Chapter 11: Endpoint Security 611Chapter 12: Network Security 614Chapter 13: Wireless and Mobile Security 616Chapter 14: Monitoring and Incident Response 619Chapter 15: Digital Forensics 621Chapter 16: Security Governance and Compliance 623Chapter 17: Risk Management and Privacy 626Index 629
Circuit Design and Simulation Quick Start Guide
Open up the exciting world of electronics with 3D circuit designing tools and create your own fresh new projects. With this quick guide you’ll use high-quality graphical programs to create, modify, and update circuits in an interactive, virtual environment that can also be used in the real world.Follow along with the tutorials and get the chance to play with electronics safely before getting your hands dirty. In just a few minutes, you’ll start creating your first circuit. You’ll focus more on how the components layout together than on worrying about design to get started. Watch as different electronic components receive different signals and test them in different situations and circuit conditions first before moving on to real-life testing. When you’re ready, you’ll work with real breadboards and microcontrollers, such as the Arduino, to bring your simulated circuits and projects to life.Once you have your circuit put together, work with basic Arduino programming to give it purpose and make it respond to your commands. By the end of the book you'll have mastered the basics of both circuit design and programming.WHAT YOU'LL LEARN* Engineer electrical equipment for little to no cost* Measure different electrical signals, such as voltage, temperature, light, and more* Program Arduinos to work with your new circuitsWHO THIS BOOK IS FORStudents and hobbyists interested in electrical engineering and programming who want to dive into experimentation virtually before working with real-world circuits.ASHRAF ALMADHOUN is an educator, Mechatronics engineer, electronics and programming hobbyist, and Maker. He hosts the popular EduEng YouTube channel and has authored four books on microcontrollers. As a Chief Educational Engineer since 2007 for Educational Engineering Team, a company he founded, Ashraf’s mission is to explore new trends and technology and help educate the world and make it a better place. Educational Engineering offers educational courses and bootcamps, articles, lessons, and online support for electronics hobbyists, programming hobbyists, microcontroller hobbyists, STEM students, and teachers. His passion for microcontrollers and programming and in particular for the world of Arduino, PIC microcontroller, and the Raspberry Pi has guided his personal development and his work through Educational Engineering.Chapter 1: Introduction● Introduction to Microcontrollers● Set-Up Your SystemChapter 2: Simulating Your First Circuit● Explaining the Interface● SimulatingChapter 3: Dealing with Electronic Components● Editing Components● Wiring Components● Adding ComponentsChapter 4: Breadboard and RGB LEDs● Setting-Up Your Breadboard● Adding RGB LEDsChapter 5: Ohm's Law● Introduction to Ohm’s Law● Practical ExampleChapter 6: Series and Parallel Circuits● Basics of Series and Parallel Circuits● Practical ExampleChapter 7: Arduino Output Basics● Arduino Digital Output - Led Control● Arduino Dealing with Multiple LEDs and Breadboard● Arduino Analog Output - Fading LEDChapter 8: Arduino Input Basics● Reading Digital Input● Reading Analog ValueChapter 9: Arduino RGB LEDs + Potentiometers● Dealing with RGB LEDs with PotentiometersChapter 10: Serial Monitoring● Arduino Serial MonitorChapter 11: What to Do Next?● ReferencesAudience: Beginning
JavaScript for Web Developers
Learn the basics of JavaScript to enhance your web pages. This book focuses on modern JavaScript programming and encourages a well-organized approach to programming in general.JavaScript for Web Developers explains each foundational concept of the language, followed by a practical implementation of that lesson to reinforce what you’ve learned. Author Mark Simon starts with the basics of JavaScript programming, followed by a tutorial on manipulating HTML elements. You will then learn to work with forms, along with CSS and Event Listeners. Hands-on projects will not only solidify each concept in your mind, but they will also give you greater confidence and help you absorb best practices. The book concludes with coverage of Ajax, which will enable you to send and retrieve data from a server asynchronously without interfering with the display and behavior of an existing web page.After reading this book, you will be able to use JavaScript to design and program your own web applications.WHAT WILL YOU LEARN* Understand the basics of JavaScript programming* Manipulate and modify web pages with JavaScript* Use JavaScript to interact with HTML and CSS* Work with data and understand the basics of working with AjaxWHO IS THIS BOOK FORBeginning web developers with little to no experience using JavaScript. MARK SIMON has been involved in training and education since the beginning of his career. He started as a teacher of mathematics but soon moved into IT consultancy and training because computers are much easier to work with than high school students! He has worked with and trained in several programming and coding languages, and currently focuses on web development and database languages. When not involved in work, you will generally find Mark listening to or playing music, reading, or just wandering about.Chapter 1: Working With JavaScript.- Chapter 2: Project — A Simple Guessing Game.- Chapter 3: Manipulating HTML Elements.- Chapter 4: Project — Creating a Slide Show.- Chapter 5: Working with Forms.- Chapter 6: Project — Creating a Custom Calculator Form.- Chapter 7: Interacting with CSS and Event Listeners.- Chapter 8: Project— Showing and Hiding Content.- Chapter 9: Project— Building a Lightbox Gallery.- Chapter 10: Project - An Introduction to Ajax.
Coding Clean, Reliable, and Safe REST APIs with ASP.NET Core 8
Learn ASP.NET Core APIs delivered in its latest version of the Microsoft Framework: .NET 8. This book will show you how to develop APIs with ASP.NET Core 8. Author Anthony Giretti will reveal all you need to know about HTTP protocol, REST architecture style, and ASP.NET Core 8.You will learn what reflexes and mindset a developer must have to approach the development of an API of medium complexity. By performing CRUD operations on a SQL Server database, you will see how to set up a clean and reliable application with industry best practices (clean code, security, observability, optimization and testing).After completing Coding Clean, Reliable, and Safe REST APIs with ASP.NET Core 8, you will be able to develop many kinds of APIs that require a senior developer level of knowledge and provide your customers with high-quality APIs.WHAT YOU WILL LEARN* Discover the latest version of ASP.NET Core 8* Code REST APIs with minimal APIs* Become familiar with clean code principles* Optimize performances with caching, background tasks and more* Make APIs resilient by handling SQL and HttpClient transient errors* Understand the importance of observability* Implement Authentication and Authorization* Grasp OWASP principles* Protect sensitive data* Master unit testing best practicesWHO THIS BOOK IS FORBeginner and intermediate professionals wishing to build clean, reliable and safe ASP.NET Core APIs and elevate their skills to a senior developer level.Anthony Giretti is a passionate developer who always likes to learn new technologies. He is a Microsoft MVP (awarded six times) and got certified in MCSD in 2016. He is a senior developer/architect at Marchex in Toronto, Canada. A specialist in Web technologies (17 years experience), including .NET, his expertise in IT and his passion for sharing his knowledge allows him to understand any web project and help other developers achieve their projects. He loves to deal with performance constraints, high availability, and optimization challenges.
Go Crazy
Go beyond the basics of Go and build complete applications using open-source libraries or the Go programming language by Google. This book will take you deep into the memory lane of the Go language with crunchy details straight from outer space.The applications in this book include the framework for a 2D Go-based game, an image random generator Rest API, financial time series handling for trading, a Kubernetes operator, a Blockchain coding and more. You'll also get refreshers on Go constructs and useful code tricks to build performant projects, and develop an HTTP based cloud ready image generator.Each chapter will be organized in the following format: what the particular application looks like; requirements and user stories of our example program; an introduction to the Go libraries or frameworks used; and the actual implementation of the example program, including common pitfalls and their solutions.Go Crazy will open your eyes to a new world of practical applications for Go. After reading the book, you will be able to apply your Golang knowledge to build your own crazy projects. Free source code will be available on this book's Apress GitHub page.WHAT YOU'LL LEARN* Compile and inline other programming languages, including GPU coding.* Handle Kubernetes clusters via your own operator* Write Go to code against Ethereum based block chains. * Write intelligent bot code to get you rich and famous.WHO THIS BOOK IS FORGo programmers both experienced and novice.Nicolas Modrzyk is the technical guru of Karabiner Software a successful consulting company located in the ever-dynamic Tokyo, Japan, with its mix of ancestral culture, and its future-oriented movement. He is also an active contributor to the Open-Source community in various projects for Imaging, AI and Cloud Computing. As both an engineer and a consultant, Nico has been involved in both sides of selling and designing large scale applications, managing enormous clusters of databases through handwritten middleware, enabling Japanese leaders and pushing international boundaries. Nico is an ardent advocate of Agile methods and is focused on getting the job done right to satisfy clients. He also knows how to say no to customer, and discuss requests to make the product less robust, and convoluted. At the same time, he loves to push both team members, and friends, to challenge themselves and define and reach their clearly goals. To gather culture, and different point of views, he has been meeting people and living in various countries such as France, Ireland, Japan, China, Korea and India as well as the US of A. Nico is the author of a few programming books, available on Amazon. You can talk to Nico in French, English and Japanese, and you can get along with him in Spanish and Chinese. He recently picked up a saxophone to honor his grand-father and his uncle, in the hope to match their skill with a brass instrument. He will be ready for a jazz session together whenever you are.
Fundamentals of Trace and Log Analysis
This book will help you analyze traces and logs from different software environments and communicate analysis results using a pattern language that covers everything from a small debugging log to a distributed trace with billions of messages from hundreds of computers, thousands of software components, threads, and processes.The book begins with the basic terminology of operating systems and programming, the foundation for understanding trace and log analysis. It then talks about patterns that help describe problems from a user’s view and patterns for errors and failures. Then, the book covers a range of trace patterns that group messages, and explores how logs depict software activities. It even examines specific message patterns and how they connect in a single trace. Moving forward, you’ll review patterns for multiple traces and logs and how to evaluate them. In this way, you can use similar methods to find problems across a wide variety of software. The book also provides guidance for analyzing issues on systems such as Windows, macOS, Linux, Android, iOS, and other types of computers, including those in networks and the Internet of Things, regardless of their system differences.Upon completing this book, you will be able to navigate the complexities of trace and log analysis and apply uniform diagnostics and anomaly detection pattern language across diverse software environments to help you troubleshoot, debug, and fix issues.WHAT YOU WILL LEARN* Understand pattern language for trace and log analysis* Gain a pattern-oriented methodology for trace and log analysis applicable to various domains, including cybersecurity* Master the fundamentals of operating systems and programming related to trace and log analysis* Understand observed behavior in traces and logs, which aids incident response, diagnostics, root cause analysis, troubleshooting, and debuggingWHO THIS BOOK IS FORSoftware technical support engineers, system and network administrators, software developers, testers, DevOps and DevSecOps, digital forensics and malware analysts, security incident response engineers, data analysts, and data mining practitioners. DMITRY VOSTOKOV is an internationally recognized expert, speaker, educator, scientist, inventor, and author. He founded the pattern-oriented software diagnostics, forensics, and prognostics discipline (Systematic Software Diagnostics) and Software Diagnostics Institute (DA+TA: DumpAnalysis.org + TraceAnalysis.org). Vostokov has also authored multiple books on software diagnostics, anomaly detection and analysis, software, and memory forensics, root cause analysis and problem-solving, memory dump analysis, debugging, software trace and log analysis, reverse engineering, and malware analysis. He has over thirty years of experience in software architecture, design, development, and maintenance in various industries, including leadership, technical, and people management roles. In his spare time, he presents multiple topics on Debugging.TV and explores Software Narratology and its further development as Narratology of Things and Diagnostics of Things (DoT), Software Pathology, and Quantum Software Diagnostics. His current interest areas are theoretical software diagnostics and its mathematical and computer science foundations, application of formal logic, artificial intelligence, machine learning, and data mining to diagnostics and anomaly detection, software diagnostics engineering and diagnostics-driven development, diagnostics workflow, and interaction. Recent interest areas also include cloud native computing, security, automation, functional programming, applications of category theory to software development and big data, and artificial intelligence diagnostics.
Ethical Hacking Workshop
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you’ve learnt and get experience with the tools.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
Cloud-Native Development and Migration to Jakarta EE
Cloud-Native Development and Migration to Jakarta EE will help you unlock the secrets of Jakarta EE's evolution as you explore the migration and modernization of your applications. You’ll discover how to make your code compatible with the latest Jakarta EE version and how to leverage its modern features effectively.First, you’ll navigate the realm of cloud-native development as you demystify containers and get introduced to the Eclipse MicroProfile, a powerful tool in your toolkit. Next, you’ll take the bold step of transitioning your applications from local hardware to the limitless possibilities of the cloud. By following the author’s expert guidance to deploy your Jakarta EE applications on Microsoft Azure, you’ll gain hands-on experience in managing cloud resources.In the final leg of your journey, you’ll explore the world of serverless architecture. You’ll learn to design and run services that are truly serverless, harnessing the potential of the event-driven paradigm for scalability and cost-efficiency.By the end of this book, you’ll have mastered Jakarta EE and become a proficient cloud-native developer. Join us on this exciting journey of transformation and innovation as you pave the way for the future of Jakarta EE and cloud-native development.
Integral Methods in Science and Engineering
This volume contains a collection of articles on state-of-the-art developments in the construction of theoretical integral techniques and their application to specific problems in science and engineering. Chapters in this book are based on talks given at the Seventeenth International Conference on Integral Methods in Science and Engineering, held virtually in July 2022, and are written by internationally recognized researchers. This collection will be of interest to researchers in applied mathematics, physics, and mechanical, electrical, and petroleum engineering, as well as graduate students in these disciplines and other professionals for whom integration is an essential working tool.Computational modelling based on RIBEM method for the numerical solution of convection-diffusion equations (Al-Bayati).- Two-operator Boundary-Domain Integral Equations for Variable-Coefficient Dirichlet Problem in 2D with General Right-Hand Side (Ayele).- Implementation of Thermal Effects in Neutron Interactions in a Physical Monte Carlo Simulator (Bodmann).- On the Parameter Significance in Pandemic Modelling (Bodmann).- On a Variational Principle for Equilibrium Free Energy Functional of Simple Liquids (Brikov).- Use of variants of seismic signal approximations by proposed sets of functions for statistical structural analysis (Brikov).- Topics on Space Weather: Operational Numerical Prediction for Electron Content (de Campos Velho).- Ray-tracing the Ulam way (Chappell).- The Robin Boundary Value Problem for an Unbounded Plate with a Hole (Constanda).- A Mathematical Model Of Cell Clustering (Harris).- A revisit to a double-periodic perforated Neumann waveguide: opening spectral gaps(Pérez-Martínez).- Spectral homogenization problems in linear elasticity: the averaged Robin reaction matrix (Pérez-Martínez).- Time harmonic oscillations of a porous-elastic body with an application to modelling the spinal cord (Harris).- The Poly-Cauchy Operator, Whitney Arrays, and Fatou Theorems for Polyanalytic Functions in Uniformly Rectifiable Domains (Mitrea).- The influence of the refractive index and absorption coefficients in the solution of the radiative conductive transfer equation in Cartesian geometry (Ladeia).- Boundary Value Problems for Elliptic Systems onWeighted Morrey Spaces in Rough Domains (M. Mitrea).- Recipes for Computer Implementation of a Response Matrix Spatial Spectral Nodal Method for Three-dimensional Discrete Ordinates Neutral Particle Transport Modeling (Barros).- On Maximum Principles for Weak Solutions of some Parabolic Systems (Mikhailov).- Boundary integral equations analysis of bones resorption effect on stresses state near dentalimplants (Perelmuter).- Mathematical Modeling of Partially Miscible Water Alternating Gas Injection Using Geometric Thermodynamic Variables (Puime Pires).- Generalised model of wear in contact problems: the case of oscillatory load (Ponomarev).- On the philosophical foundations of an optimization algorithm inspired by human social behavior under a dynamical status distribution (de Oliveira).- On applications of the optimization algorithm DySDO (de Oliveira).- On the influence of the signal to noise ratio on the reconstruction of the non-linear transfer function in signal amplification (Bodmann).- An Analytic Solution for the Transient Three-Dimensional Advection–Diffusion Equation with Non-Fickian Closure by an Integral Transform Technique (Buske).- Failure Analysis of Composite Pipes Subjected to Bending: Classical Laminated Plate Theory vs. 3D Elasticity Solution (O. Menshykov).- The analytical formulation GILTT applied in a model of contaminant transport in porous media (Buske).- An Existence Result for a Class of Integral Equations via Graph-Contractions (Younis).- Some Convergence Results on the Periodic Unfolding Operator in Orlicz Setting (Zappale).- Three-Phase Flow Zero-Net Liquid Holdup in Gas-Liquid Cylindrical Cyclone (GLCC⃝c ) (Shoham).- Error Propagation in Dynamic Iterations Applied to Linear Systems of Differential Equations (Zubik-Kowal).
Linux Containers and Virtualization
This book is a practical, comprehensive guide to creating secure and efficient Linux containers using the Rust programming language. It utilizes a hands-on approach to teach Rust's programming constructs, security features, and its application in containerization.Author Shashank Mohan Jain starts with a gentle introduction to Rust to help you grasp the language's core concepts, syntax, and unique memory safety guarantees. He then transitions into the realm of Linux container development, where Rust shines as a robust and secure language for building containerized applications. Through hands-on examples, you will gain a deep understanding of how to harness Rust's features to create lightweight and secure Linux containers and how to leverage its strong type system and ownership model to eliminate common bugs and ensure memory safety in containerized applications. As you progress, you’ll explore the intricacies of working with system resources, networking, and interacting with the host operating system while maintaining isolation and security within the containers, as well as how Rust's concurrency model can build performant and responsive containerized applications. The book also covers advanced topics such as secure configuration handling, logging, and handling authentication within your containerized environment.After completing this book, you will be well-versed in Rust programming, equipped to create efficient and secure Linux containers, and confident in your ability to develop containerized applications for a variety of use cases.WHAT YOU WILL LEARN* Understand the basics of the Rust programming language* Understand Rust's security features* Create Linux constructs like namespaces in Rust* Develop your own container runtime using RustWHO THIS BOOK IS FORDevelopers, Architects and SREs working with cloud applications and dealing with container based workloads. SHASHANK MOHAN JAIN has been working in the IT industry for more than twenty years, mainly in the areas of cloud computing and distributed systems. He has a keen interest in virtualization techniques, security, and complex systems. Shashank has thirty-nine software patents (many yet to be published) to his name in the area of cloud computing, IoT, and machine learning. He is a speaker at multiple reputed cloud conferences. Shashank holds Sun, Microsoft, and Linux kernel certifications. Chapter 1: Virtualization Basics.- Chapter 2: Hypervisor.- Chapter 3: Namespaces.- Chapter 4: Cgroups.- Chapter 5: Layered File Systems.- Chapter 6: Creating a Simple Container Framework.- Chapter 7: Introduction to Rust.- Chapter 8: Containers in Rust.