Computer und IT
Betriebswirtschaftliche KI-Anwendungen
Digitalisierung und Künstliche Intelligenz ermöglichen Unternehmen disruptive Erweiterungen ihrer Geschäftsmodelle. Wer rechtzeitig digitale KI-Geschäftsmodelle einführt, wird seinen Erfolg nachhaltig sichern können. Aber wie und wo können solche Modelle Anwendung finden? Diese Publikation gibt Antworten, wo KI-Geschäftsmodelle greifen können, und wie diese von der ersten Idee bis zur produktiven Anwendung realisiert werden können.KI-Anwendungen in der Betriebswirtschaft.- Grundlagen und Technik.- Digitale Geschäftsmodelle auf Basis Künstlicher Intelligenz.- Prototyp einer digitalen KI-Anwendung.- Beispielanwendung 1.- Beispielanwendung 2.- Beispielanwendung 3.- Der Weg zum Erfolg mit KI.
Der agile Festpreis
- Warum brauchen agil entwickelte IT-Projekte einen anderen Vertragsrahmen als Projekte nach der Wasserfallmethode? - Wie ein partnerschaftliches Miteinander zu größeren Projekterfolgen führt - Erfahren Sie, wie Sie Schritt für Schritt einen agilen Festpreisvertrag ausarbeiten, verhandeln und umsetzen - Nutzen Sie die Vertragsvorlage als Anregung für Ihre eigenen agilen Festpreisverträge - Reale Beispiele aus der Praxis illustrieren den Weg zum passenden Vertrag - Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten Buches Agiles Arbeiten ist in der Softwareentwicklung eine Selbstverständlichkeit und selbst Großkonzerne definieren im Zuge von Digitalisierungsinitiativen die Rahmenbedingungen ihrer Produktentwicklung neu. Sich mit den vertraglichen Bedingungen zwischen Kunden und Lieferanten unter agilen Vorzeichen auseinanderzusetzen, ist für den Projekterfolg ausschlaggebend und angesichts hochdynamischer Marktsituationen notwendiger denn je. Schließlich ist konstruktive Zusammenarbeit das maßgebliche Prinzip agiler Methoden und genau das wird von traditionellen Vertragsformen oft verhindert. Agile IT-Projekte brauchen Verträge, die den Spagat zwischen festem Kostenrahmen und agiler Entwicklung – etwa mit Scrum – schaffen. Der Agile Festpreis balanciert die Interessen von Anbieter und Kunde und formt ein kooperatives Modell, indem er Grundsätze der Zusammenarbeit und Flexibilität in der Ausgestaltung von Anforderungen bestmöglich vereint. Die 4. Auflage enthält neue Erfahrungsberichte und wurde um weitere Aspekte des Verhandelns sowie neue Praxisbeispiele ergänzt. Kunden, Lieferanten und Einkäufern bietet dieses Buch Best Practices, Vertragsvorlagen und Argumentarien. AUS DEM INHALT // - Wie der Agile Festpreisvertrag Sicherheit und Flexibilität vereinbart - Die 6 Schritte zum neuen Vertragsmodell - Muster für einen Agilen Festpreisvertrag - Ausschreibung und Preisfindung - Vor- und Nachteile verschiedener Vertragsformen
Data Quality
DISCOVER HOW TO ACHIEVE BUSINESS GOALS BY RELYING ON HIGH-QUALITY, ROBUST DATAIn Data Quality: Empowering Businesses with Analytics and AI, veteran data and analytics professional delivers a practical and hands-on discussion on how to accelerate business results using high-quality data. In the book, you’ll learn techniques to define and assess data quality, discover how to ensure that your firm’s data collection practices avoid common pitfalls and deficiencies, improve the level of data quality in the business, and guarantee that the resulting data is useful for powering high-level analytics and AI applications. The author shows you how to:* Profile for data quality, including the appropriate techniques, criteria, and KPIs * Identify the root causes of data quality issues in the business apart from discussing the 16 common root causes that degrade data quality in the organization.* Formulate the reference architecture for data quality, including practical design patterns for remediating data quality* Implement the 10 best data quality practices and the required capabilities for improving operations, compliance, and decision-making capabilities in the businessAn essential resource for data scientists, data analysts, business intelligence professionals, chief technology and data officers, and anyone else with a stake in collecting and using high-quality data, Data Quality: Empowering Businesses with Analytics and AI will also earn a place on the bookshelves of business leaders interested in learning more about what sets robust data apart from the rest. PRASHANTH SOUTHEKAL, PHD, is a data, analytics, and AI consultant, author, and professor. He has worked and consulted for over 80 organizations including P&G, GE, Shell, Apple, FedEx, and SAP. Dr. Southekal is the author of Data for Business Performance and Analytics Best Practices (ranked #1 analytics books of all time by BookAuthority) and writes regularly on data, analytics, and AI in Forbes and CFO.University. He serves on the Editorial Board of MIT CDOIQ Symposium and is an advisory board member at BGV (Benhamou Global Ventures) a Silicon Valley-based venture capital firm. Apart from his consulting and advisory pursuits, he has trained over 3,000 professionals worldwide in data and analytics. Dr. Southekal is also an adjunct professor of data and analytics at IE Business School (Madrid, Spain). CDO Magazine included him in the top 75 global academic data leaders of 2022. He holds a PhD from ESC Lille (FR), an MBA from the Kellogg School of Management (US), and holds the ICD.D designation from the Institute of Corporate Directors (Canada).Forewordby Bill InmonPrefaceAbout the BookQuality Principles Applied in This BookOrganization of the BookWho Should Read This Book?ReferencesAcknowledgmentsDefine PhaseChapter 1: IntroductionIntroductionData, Analytics, AI, and Business PerformanceData as a Business Asset or LiabilityData Governance, Data Management, and Data QualityLeadership Commitment to Data QualityKey TakeawaysConclusionReferencesChapter 2: Business DataIntroductionData in BusinessTelemetry DataPurpose of Data in BusinessBusiness Data ViewsKey Characteristics of Business DataCritical Data Elements (CDE)Key TakeawaysConclusionReferencesChapter 3: Data Quality in BusinessIntroductionData Quality DimensionsContext in Data QualityConsequences and Costs of Poor Data QualityData Depreciation and Its FactorsData in IT SystemsData Quality and Trusted InformationKey TakeawaysConclusionReferencesAnalyze PhaseChapter 4: Causes for Poor Data QualityIntroductionData Quality RCA TechniquesTypical Causes of Poor Data QualityKey TakeawaysConclusionReferencesChapter 5: Data Lifecycle and LineageIntroductionBusiness-Enabled DLC StagesIT Business-Enabled DLC StagesData LineageKey TakeawaysConclusionReferencesChapter 6: Profiling for Data QualityIntroductionCriteria for Data ProfilingData Profiling Techniques for Measures of CentralityData Profiling Techniques for Measures of VariationIntegrating Centrality and Variation KPIsKey TakeawaysConclusionReferencesRealize PhaseChapter 7: Reference Architecture for Data QualityIntroductionOptions to Remediate Data QualityDataOpsData ProductData Fabric and Data MeshData EnrichmentKey TakeawaysConclusionReferencesChapter 8: Best Practices to Realize Data QualityIntroductionOverview of Best PracticesBP 1: Identify the Business KPIs and the Ownership of These KPIs and the Pertinent DataBP 2: Build and Improve the Data Culture and Literacy in the OrganizationBP 3: Define the Current and Desired state of Data QualityBP 4: Follow the Minimalistic Approach to Data CaptureBP 5: Select and Define the Data Attributes for Data QualityBP 6: Capture and Manage Critical Data with Data Standards in MDM SystemsKey TakeawaysConclusionReferencesChapter 9: Best Practices to Realize Data QualityIntroductionBP 7: Automate the Integration of Critical Data ElementsBP 8: Define the SoR and Securely Capture Transactional Data in the SoR/OLTP SystemBP 9: Build and Manage Robust Data Integration CapabilitiesBP 10: Distribute Data Sourcing and Insight ConsumptionKey TakeawaysConclusionReferencesSustain PhaseChapter 10: Data GovernanceIntroductionData Governance PrinciplesData Governance Design ComponentsImplementing the Data Governance ProgramData ObservabilityData Compliance – ISO 27001 and SOC2Key TakeawaysConclusionReferencesChapter 11: Protecting DataIntroductionData ClassificationData SafetyData SecurityKey TakeawaysConclusionReferencesChapter 12: Data EthicsIntroductionData EthicsImportance of Data EthicsPrinciples of Data EthicsModel Drift in Data EthicsData PrivacyManaging Data EthicallyKey TakeawaysConclusionReferencesAppendix 1: Abbreviations and AcronymsAppendix 2: GlossaryAppendix 3: Data Literacy CompetenciesAbout the AuthorIndex
IAPP CIPM Certified Information Privacy Manager Study Guide
AN ESSENTIAL RESOURCE FOR ANYONE PREPARING FOR THE CIPM CERTIFICATION EXAM AND A CAREER IN INFORMATION PRIVACYAs cybersecurity and privacy become ever more important to the long-term viability and sustainability of enterprises in all sectors, employers and professionals are increasingly turning to IAPP’s trusted and recognized Certified Information Privacy Manager qualification as a tried-and-tested indicator of information privacy management expertise. In IAPP CIPM Certified Information Privacy Manager Study Guide, a team of dedicated IT and privacy management professionals delivers an intuitive roadmap to preparing for the CIPM certification exam and for a new career in the field of information privacy. Make use of pre-assessments, the Exam Essentials feature, and chapter review questions with detailed explanations to gauge your progress and determine where you’re proficient and where you need more practice. In the book, you’ll find coverage of every domain tested on the CIPM exam and those required to succeed in your first—or your next—role in a privacy-related position. You’ll learn to develop a privacy program and framework, as well as manage the full privacy program operational lifecycle, from assessing your organization’s needs to responding to threats and queries. The book also includes:* A head-start to obtaining an in-demand certification used across the information privacy industry* Access to essential information required to qualify for exciting new career opportunities for those with a CIPM credential* Access to the online Sybex learning environment, complete with two additional practice tests, chapter review questions, an online glossary, and hundreds of electronic flashcards for efficient studyingAn essential blueprint for success on the CIPM certification exam, IAPP CIPM Certified Information Privacy Manager Study Guide will also ensure you hit the ground running on your first day at a new information privacy-related job. ABOUT THE AUTHORSMIKE CHAPPLE, PHD, CIPM, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is the bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program.JOE SHELLEY, CIPM, is the Vice President for Libraries and Information Technology at Hamilton College in New York. He oversees information security and privacy programs, IT risk management, business intelligence and analytics, and data governance. Introduction xviiAssessment Test xxviiCHAPTER 1 DEVELOPING A PRIVACY PROGRAM 1INTRODUCTION TO PRIVACY 3What Is Privacy? 4What Is Personal Information? 5What Isn’t Personal Information? 5Why Should We Care about Privacy? 8Generally Accepted Privacy Principles 9Management 10Notice 11Choice and Consent 11Collection 12Use, Retention, and Disposal 12Access 13Disclosure to Third Parties 14Security for Privacy 14Quality 15Monitoring and Enforcement 16Developing a Privacy Program 16Crafting Vision, Strategy, Goals, and Objectives 17Structuring the Privacy Team 20Creating a Program Scope and Charter 22Privacy Roles 25Building Inventories 25Conducting a Privacy Assessment 26Implementing Privacy Controls 27Ongoing Operation and Monitoring 27Data Governance 28Data Governance Approaches 28Data Governance Roles 29Access Requirements 29Governing Information Processing 31Managing the Privacy Budget 31Organizational Budgeting 32Expense Types 32Budget Monitoring 33Communicating about Privacy 34Creating Awareness 34Building a Communications Plan 35Privacy Program Operational Life Cycle 36Summary 36Exam Essentials 37Review Questions 38CHAPTER 2 PRIVACY PROGRAM FRAMEWORK 43Develop the Privacy Program Framework 44Examples of Privacy Frameworks 44Develop Privacy Policies, Procedures, Standards, and Guidelines 51Define Privacy Program Activities 52Implement the Privacy Program Framework 57Communicate the Framework 57Aligning with Applicable Laws and Regulations 58Develop Appropriate Metrics 78Identify Intended Audience for Metrics 79Define Privacy Metrics for Oversight and Governance per Audience 80Summary 83Exam Essentials 84Review Questions 86CHAPTER 3 PRIVACY OPERATIONAL LIFE CYCLE: ASSESS 91Document Your Privacy Program Baseline 93Education and Awareness 94Monitoring and Responding to the Regulatory Environment 94Assess Policy Compliance against Internal and External Requirements 94Data, Systems, and Process Assessment 95Risk Assessment Methods 96Incident Management, Response, and Remediation 97Perform Gap Analysis against an Accepted Standard or Law 97Program Assurance 97Processors and Third- Party Vendor Assessment 98Evaluate Processors and Third- Party Vendors 99Understand Sources of Information 99Risk Assessment 100Contractual Requirements and Ongoing Monitoring 102Physical Assessments 102Mergers, Acquisitions, and Divestitures 103Privacy Assessments and Documentation 105Privacy Threshold Analyses (PTAs) 105Define a Process for Conducting Privacy Assessments 105Summary 108Exam Essentials 108Review Questions 110CHAPTER 4 PRIVACY OPERATIONAL LIFE CYCLE: PROTECT 115Privacy and Cybersecurity 117Cybersecurity Goals 117Relationship between Privacy and Cybersecurity 118Cybersecurity Controls 119Security Control Categories 120Security Control Types 120Data Protection 121Data Encryption 121Data Loss Prevention 122Data Minimization 123Backups 124Policy Framework 125Cybersecurity Policies 126Cybersecurity Standards 128Cybersecurity Procedures 129Cybersecurity Guidelines 130Exceptions and Compensating Controls 131Developing Policies 133Identity and Access Management 133Least Privilege 134Identification, Authentication, and Authorization 134Authentication Techniques 135Provisioning and Deprovisioning 137Account and Privilege Management 138Privacy by Design 139Privacy and the SDLC 140System Development Phases 141System Development Models 142Integrating Privacy with Business Processes 146Vulnerability Management 146Vulnerability Scanning 147Vulnerability Remediation 147Data Policies 149Data Sharing 149Data Retention 149Data Destruction 150Summary 151Exam Essentials 151Review Questions 153CHAPTER 5 PRIVACY OPERATIONAL LIFE CYCLE: SUSTAIN 157Monitor 158Monitoring the Environment 159Monitor Compliance with Privacy Policies 160Monitor Regulatory Changes 160Compliance Monitoring 161Audit 162Aligning with Audits 163Audit Focus 164Summary 167Exam Essentials 168Review Questions 170CHAPTER 6 PRIVACY OPERATIONAL LIFE CYCLE: RESPOND 175Data Subject Rights 176Access 177Managing Data Integrity 178Right of Erasure 178Right to Be Informed 180Control over Use 180Complaints 181Handling Information Requests 181Incident Response Planning 182Stakeholder Identification 182Building an Incident Oversight Team 183Building the Incident Response Plan 184Integrating the Plan with Other Functions 187Incident Detection 187Security and Privacy Incidents 187Security Events and Incidents 188Privacy Incidents 188Reporting Privacy Incidents 189Coordination and Information Sharing 190Internal Communications 191External Communications 191Breach Notification 192Incident Handling 192Risk Assessment 193Containment Activities 193Remediation Measures 194Ongoing Communications 195Post- Incident Activity 196Planning for Business Continuity 198Project Scope and Planning 200Business Impact Analysis 204Continuity Planning 211Plan Approval and Implementation 213Summary 218Exam Essentials 219Review Questions 221Appendix Answers to Review Questions 225Chapter 1: Developing a Privacy Program 226Chapter 2: Privacy Program Framework 228Chapter 3: Privacy Operational Life Cycle: Assess 229Chapter 4: Privacy Operational Life Cycle: Protect 231Chapter 5: Privacy Operational Life Cycle: Sustain 233Chapter 6: Privacy Operational Life Cycle: Respond 235Index 239
Threats
A PRACTICAL GUIDE TO WRITING SECURE APPLICATIONS, WITH HELP FROM YOUR FAVORITE JEDI MASTERS, SITH LORDS, AND DROIDS Have you ever wondered what R2-D2, Darth Vader, Han Solo, or even Yoda could teach you about software security? Well, wonder no more. In Threats: What Every Engineer Should Learn from Star Wars, veteran game designer and software engineer Adam Shostack delivers a fun and hands-on guide to developing secure software. The book is easy to read and immediately useful, demonstrating how to write more secure applications code with wisdom and insights from the Star Wars universe. You’ll discover practical security models—like STRIDE—that are relevant to a wide variety of applications and systems. You’ll also learn ways that attackers use various strategies, like tampering, spoofing, and denial of service—to achieve their nefarious goals. Modern application development has to account for security, usability, and rapid delivery. We can’t wait for “reviews” and interminable debates in the Galactic Senate. That’s what makes good security engineering so critical. Threats is an engaging and hilarious roadmap to writing secure apps from the ground up that you’ll actually want to read from cover to cover. Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You’ll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don’t need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You’ll also find: * Understandable and memorable introductions to the most important threats that every engineer should know * Straightforward software security frameworks that will help engineers bake security directly into their systems * Strategies to align large teams to achieve application security in today’s fast-moving and agile world * Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaigns An indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code. ADAM SHOSTACK is a technologist, entrepreneur, and game designer. One of the world’s leading experts on threat modeling, he wrote Threat Modeling: Designing for Security and is an Affiliate Professor at the University of Washington. He is a member of the BlackHat Review Board and the founder of Shostack + Associates, a specialized security consultancy dedicated to helping organizations deliver secure systems. Preface xi Introduction xv 1 Spoofing and Authenticity 1 2 Tampering and Integrity 41 3 Repudiation and Proof 63 4 Information Disclosure and Confidentiality 95 5 Denial of Service and Availability 131 6 Expansion of Authority and Isolation 151 7 Predictability and Randomness 187 8 Parsing and Corruption 211 9 Kill Chains 249 Epilogue 291 Glossary 295 Bibliography 303 Story Index 317 Index 323
Threats
SECURE YOUR APPLICATIONS WITH HELP FROM YOUR FAVORITE JEDI MASTERSIn Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn—in a structured and memorable way—about the threats to your systems. You’ll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don’t need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You’ll also find:* Understandable and memorable introductions to the most important threats that every engineer should know* Straightforward software security frameworks that will help engineers bake security directly into their systems* Strategies to align large teams to achieve application security in today’s fast-moving and agile world* Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaignsAn indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code. ADAM SHOSTACK is a technologist, entrepreneur, and game designer. One of the world’s leading experts on threat modeling, he wrote Threat Modeling: Designing for Security and is an Affiliate Professor at the University of Washington. He is a member of the BlackHat Review Board and the founder of Shostack + Associates, a specialized security consultancy dedicated to helping organizations deliver secure systems. Preface xiIntroduction xv1 Spoofing and Authenticity 12 Tampering and Integrity 413 Repudiation and Proof 634 Information Disclosure and Confidentiality 955 Denial of Service and Availability 1316 Expansion of Authority and Isolation 1517 Predictability and Randomness 1878 Parsing and Corruption 2119 Kill Chains 249Epilogue 291Glossary 295Bibliography 303Story Index 317Index 323
Procedural Generation in Godot
Learn the tricks of simple procedural generation and how various genres, such as racing simulators, platformers, and roguelikes, can all benefit from these techniques.In this book, you'll learn how to combine hand-crafted content with algorithms to create immersive and beautiful environments. You'll learn how to create a seeding system, so that you can replay great levels with your friends. We'll cover how to create good tilesets, how to use the tilemap editor effectively, and how to inject just the right amount of logic into an otherwise automated machine that is your own personal procedural content generation engine.We will use 2D examples to demonstrate the concepts covered throughout the book. By the time you complete this book, you’ll have a good handle on how to add procedural generation to your games.WHAT YOU WILL LEARN* Learn to set up the perfect content generation system * Master the tools for randomization and repeatability* Understand how much content to craft versus how much to generateWHO THIS BOOK IS FORBasic familiarity with the Godot engine and GDScript is essential. While all concepts are explained in the book, it can be overwhelming learning these techniques at the same time as learning the engine.Christopher Pitt is a developer living in South Africa. He has published a bunch of indie games, many of which use procedural content generation, on mobile, and desktop environments. Most of his games have been built in JavaScript or the Godot engine. He also likes to bake sweet things and build wood things.Chapter 1: Hand crafted vs. ProceduralSub -Topics• A study of hand-crafted content• Case study of Limbo• A study of procedural content• Case study of Oxygen Not Included• How much of each is good?• Case study of Diablo 2• Brief overview of different approaches we'll take in the rest of the bookChapter 2: Generating with NodesSub - Topics• Set up new project• Create node hierarchy (with limited inheritance)• Use randomization to place nodes in an area• Vary node behavior to create realismChapter 3: Generating with TilesSub - Topics:• Create Tilemaps and Tilesets• Change tiles via code• Creating and using Autotile via the editor• Using Autotile via codeChapter 4: Recreating SokobanSub - Topics:• Create a new project (rapid)• Create a player character• Add movement to the player character• Create a push able crate• Create a storage location• Create different levels with code• Add level transitionsChapter 5: Designing Levels in Pixel ArtSub - Topics: • Brief introduction to Aseprite• Importing map assets into Godot• Reading image data• Defining map cell types• Drawing cells into a gameChapter 6: Creating a Seeding SystemSub - Topics:• Using seeded PRNG randomization• Loading word lists into a game• Displaying, storing, and using seeds in generationChapter 7: Recreating Bouncy CarsSub - Topics:• Create a new project (rapid)• Create a seed screen• Create a few maps in pixel art, read them into the game• Manipulate quadrant maps to form a loop• Put players into the loop• Trace the "correct" path, display helper direction arrowChapter 8: Navigating in Generated LevelsSub - Topics:• Intro to navigation polygons in tile maps• Combining collision shapes with navigation meshes• Exploring alternatives to mesh manipulation• Randomizing specific obstacles to optionally include navigation or collisionChapter 9: Randomized Collective Nodes within a Generated MapSub - Topics:• Identifying collections of cells• Representing these as larger structures in a generated space• Adding variability to these structuresChapter 10: Recreating InvasionSub - Topics:• Create a new project (rapid)• Prototype a global generator, rooms, levels, tiles, and doodads• Generate rooms• Handle room transitions• Collect compound doodads• Create houses with variability• Spawn survivors, add acquisition and rescue• Spawn soldiers, add capture and harass• Create exit pointChapter 11: Paths and Path FollowersSub - Topics:• Create path by hand• Create node to follow• Make node follow path• Create path via pixel art• Connect multiple separate paths together (train switch)Chapter 12: Interaction SystemsSub - Topics:• Create player and intractable nodes• Create area-based (proximity) nodes that can be reused• Implement event-based interaction• Brief intro for dialogic add-on, as a means of extending the interaction systemChapter 13: Recreating This War of MineSub - Topics:• Create new project (rapid)• Prototype rooms, make pixel art map• Create paths• Create playable characters with path followers• Create intractable nodes in rooms• Add dialogic add-on for interaction between playable characters
IBM Software Systems Integration
Examine the working details for real-world Java programs used for system integration with IBM Software, applying various API libraries (as used by Banking and Insurance companies). This book includes the step-by-step procedure to use the IBM FileNet Case Manager 5.3.3 Case Builder solution and the similar IBM System, IBM Business Automation Workflow to create an Audit System.You'll learn how to implement the workflow with a client Java Message Service (JMS) java method developed with Workflow Custom Operations System Step components. Using IBM Cognos Analytics Version 11.2, you'll be able to create new views for IBM Case Manager Analytics for custom time dimensions. The book also explains the SQL code and procedures required to create example Online Analytical Processing (OLAP) cubes with multi-level time dimensions for IBM Case Manager analytics.IBM Software Systems Integration features the most up to date systems software procedures using tested API calls.WHAT YOU WILL LEARN* Review techniques for generating custom IBM JMS code* Create a new custom view for a multi-level time dimension* See how a java program can provide the IBM FileNet document management API calls for content store folder and document replication* Configure Java components for content engine eventsWHO THIS BOOK IS FORIT consultants, Systems and Solution Architects.ALAN BLUCK has over 45 years IT experience. He has been a Solutions Architect for IBM for over 10 years. Elected as an IBM Champion (2022), he is now the Director and owner of ASB Software Development Limited, an IBM PartnerWorld partner, and a consultancy providing systems architecture for a broad range of services. He is a Member of the British Computer Society (MBCS, CITP).Chapter 1IBM FileNet Case Manager 5.3.3 Case Builder Solution Development Steps for The Audit SystemCHAPTER GOAL: Building the initial IBM Case Manager Audit SolutionNO OF PAGES 90SUB -TOPICSSECTIONS* Bill of Materials* Add a new solution* Add properties and Business Objects* Add Roles* Add properties to the Inbaskets for each role* Add Document class* Add Business Objects* Add Business Object Types as Case propertiesAdd Case Types* Audit Department Task* Add Business Objects to be searched* Audit Solution First Test* Remove the Case Search Business Objects* Edit the Cases Page to allow Case Search to work correctly* Debug the Case Manager Client* Check FileNet Version* Check FileNet Health* Check FileNet Object Store Upgrade Status* Check FileNet Workflow Upgrade StatusFix / Workaround for Error on Case Search * Other Fixes (Recommended)Chapter 2: Configuring Java Custom ComponentsCHAPTER GOAL: CREATION AND CONFIGURATION OF THE JAVA CUSTOMISATIONSNO OF PAGES: 20SUB - TOPICSSECTIONS* Configuring Java Components for Content Engine Events* Custom Code Module java JAR API call development* Adding a Code ModuleCreating a Custom Event Object* Configuring Workflow Subscriptions* Configuring Component Manager for WebSphere control* Component Manager Extension MBean Provider* Creating the Component Manager Custom Service* DbExecute system function* Setting DbExecute connections* Example DB2 Stored procedure* Example Oracle Stored procedure* Example SQL*Server Stored procedureChapter 3: IBM JMS (Java Message Service) Interface Development IBM FileNet 5.5.x WorkflowCHAPTER GOAL: Theexample development of a java jar file for the IBM Java Messaging Service calls and its deployment for use in an IBM Case Manager Workflow.NO OF PAGES : 240SUB - TOPICS:* MQ Series 7.5 Install and Configure* Notification of successful repository load into FileNet* Custom Operations Component Development- JMSMessage Operation* Custom Operations Component Development- Fix list for WebSphere MQ Version 7.5* IBM MQ Series 7.x Fix Pack Installation* Linux: Applying maintenance level updates on WebSphere MQ version* Setting up the client on Windows* Setting up the client on Linux* Sending a message from a client to a server* AuditOperations method parameterisation* AuditOperations.java Code Development* AuditOperations re-build and deploy .jar* Final pre-build test AuditOperations.jar* FileNet Workflow System Component AuditOperations.jar deployment* Checking deployment in the Component Manager and Workflow* Transfer Workflow and set up Workflow subscriptionsChapter 4: A Replication Java Program for IBM FileNet Object StoresCHAPTER GOAL: The development of the java API calls and the configuration required to replicate an IBM FileNet Document Management ObjectStore.NO OF PAGES: 100SUB - TOPICS:* Setting up the Creator Property* Setting Object Store Access Rights* Batch Jobs* Required supporting Library .jar files* The Configuration set up file* Encryption of the administrator user password in a config.xml Configuration file* Update of the Config.xml Start Date* Event Set-up * Folder Class - Update Event and Deletion Events* Document Class - Deletion Events* Unit Test results ( New Folder and Document )* Existing Folder Name and Security updatesNew Folder Name and Document updatesChapter 5: Cognos RTM Custom DevelopmentCHAPTER GOAL: Create a new Custom View for a Multi-level Time DimensionNO OF PAGES: 90SUB - TOPICS:SECTIONS* Creation and test of Multilevel Time Dimension for a new OLAP Database* Update to add Year YearNumber and Month* Update to add Hour* Create a new View for Workflow Tasks* Create a new data stream in Cognos RTM – Task Load Data Stream* Create a new Cube including the Multilevel Time Dimension* Case Attribute Review for Exposed Dimensions* Creation and test of Multilevel Time Dimensions* Create a new Multilevel Time Dimension Cube* Average Age Hours* Average Wait Time Hours* Average Processing Time Hours* Average Ready Time Hours* Average Failed Time HoursCHAPTER 6: PDF Document Creation using iTextCHAPTER GOAL: A Java Program to generate PDF document using the iText libraryNO OF PAGES: 20SUB - TOPICS:SECTIONS1. Adding an Image to a PDF2. Adding a Table to a PDF3. Creating a PdfWriter object4. Creating a PdfDocument object5. Creating the Document object6. Creating an Image object7. Adding image to the documentClosing the Document
Pro SQL Server 2022 Wait Statistics
Use this practical guide to analyze and troubleshoot SQL Server performance using wait statistics. You'll learn to identify precisely why your queries are running slowly. And you'll know how to measure the amount of time consumed by each bottleneck so you can focus attention on making the largest improvements first. This edition is updated to cover analysis of wait statistics current with SQL Server 2022. Whether you are new to wait statistics, or already familiar with them, this book provides a deeper understanding on how wait statistics are generated and what they mean for your SQL Server instance’s performance.The book goes beyond the most common wait types into the more complex and performance-threatening wait types. You’ll learn about per-query wait statistics and session-based wait statistics, and the types of problems they can help you solve. The different wait types are categorized by their area of impact, including CPU, IO, Latching, Locking, and many more.Clear examples are included to help you gain practical knowledge of why and how specific wait times increase or decrease, how they impact your SQL Server’s performance, and what you can do to improve performance. After reading this book, you won’t want to be without the valuable information that wait statistics provide regarding where you should be spending your limited tuning time to maximize performance and value to your business.WHAT YOU'LL LEARN* Understand how the SQL Server engine processes requests* Identify resource bottlenecks in a running SQL Server instance* Locate wait statistics information inside DMVs and Query Store* Analyze the root cause of sub-optimal performance* Diagnose I/O contention and locking contention* Benchmark SQL Server performance* Improve database performance by lowering overall wait time WHO THIS BOOK IS FORDatabase administrators who want to identify and resolve performance bottlenecks, those who want to learn more about how the SQL Server engine accesses and uses resources inside SQL Server, and administrators concerned with achieving—and knowing they have achieved—optimal performance__THOMAS LAROCK has over 20 years of IT experience holding roles such as programmer, developer, analyst, and database administrator. He is a Microsoft Certified Master in SQL Server and a Microsoft Data Platform MVP since 2009. Thomas has spent much of his career working with data and databases, which led to his selection as Technical Advocate for Confio Software in 2010 for the software now known as SolarWinds Database Performance Analyzer (DPA).Currently, Thomas serves as Head Geek for SolarWinds, a company specializing in software for enterprise infrastructure monitoring. This role allows him to work with a variety of customers, helping to solve questions regarding network, application, and database performance tuning and virtualization. You can reach him through his blog (thomaslarock.com/blog) and find him on Twitter @SQLRockstar).ENRICO VAN DE LAAR has been working with data in various formats and sizes for over 15 years. He is a data and advanced analytics consultant for Dataheroes where he helps organizations optimize their data platform environment and helps them with their first steps in the world of advanced analytics. He is a Data Platform MVP since 2014 and a frequent speaker on various data-related events throughout the world. He frequently blogs about technologies such as Microsoft SQL Server and Azure Machine Learning on his blog at enricovandelaar.com. You can contact Enrico on Twitter @evdlaar.PART I: FOUNDATIONS OF WAIT STATISTICS ANALYSIS1. Wait Statistics Internals2. Querying SQL Server Wait Statistics3. The Query Store4. Building a Solid BaselinePART II: WAIT TYPES5. CPU-Related Wait Types6. IO-Related Wait Types7. Backup-Related Wait Types8. Lock-Related Wait Types9. Latch-Related Wait Types10. High-Availability and Disaster-Recovery Wait Types11: Preemptive Wait Types12: Background and Miscellaneous Wait Types13. In-Memory OLTP-Related Wait Types14. Appendix I. Example SQL Server Machine Configurations15. Appendix II. Spinlocks16. Appendix III. Latch Classes
Microsoft Conversational AI-Platform für Entwickler
Erstellen Sie einen Chatbot mit der Microsoft Conversational AI-Plattform. In diesem Buch lernen Sie Schritt für Schritt, wie Sie Zeit und Geld sparen können, indem Sie Chatbots in die Strategie Ihres Unternehmens integrieren. Sie werden lernen, wie Sie jede Phase der Entwicklung beherrschen, von der Zusammenarbeit an einem Chatbot in einem End-to-End-Szenario über die erste Mock-up-Phase bis hin zur Einsatz- und Bewertungsphase. Microsoft hat ein Cloud-Service-Ökosystem für die Ausführung von künstlichen Intelligenz-Workloads in öffentlichen Cloud-Szenarien und eine robuste KI-Plattform aufgebaut, die eine breite Palette von Diensten für konversationelle künstliche Intelligenz-Lösungen wie Chatbots bietet. Die Entwicklung eines Chatbots erfordert nicht nur Programmierkenntnisse von Entwicklern, sondern auch besondere Überlegungen, einschließlich des Inputs von Geschäftsinteressenten wie Fachexperten und Power-Usern. Sie werden anhand von Beispielen lernen, wie Sie eine Reihe von Tools und Diensten nutzen können, um die Kluft zwischen Unternehmen und Technik zu überbrücken.Sie werden lernen, wie Sie Geschäftsanforderungen erfolgreich in umsetzbare IT- und technische Anforderungen umwandeln können. Sie lernen den Bot Framework Composer kennen, der es Power-Usern ermöglicht, die Erstellung eines Chatbots zu initiieren, der dann an das Entwicklungsteam weitergegeben werden kann, um durch Code weitere Funktionen hinzuzufügen. Der Prozess der Aufteilung der Implementierungsaufgaben und des Arbeitsaufwands zwischen Power-Usern, die einen Low-Code- oder No-Code-Ansatz verwenden, und Entwicklern, die die erweiterten Funktionen für den Chatbot entwickeln, wird ebenfalls behandelt.Was Sie lernen werden:* Verstehen Sie Microsofts umfassendes KI-Ökosystem und seine Dienste und Lösungen* Erkennen Sie, welche Lösungen und Dienste in jedem Geschäftsszenario angewendet werden sollten* Entdecken Sie No-Code-/Low-Code-Ansätze für die Erstellung von Chatbots* Entwickeln Sie Chatbots unter Verwendung des Conversational AI Stacks* Richten Sie Geschäft und Entwicklung für verbesserte Chatbot-Ergebnisse und kürzere Markteinführungszeiten ausDieses Buch richtet sich an Entwickler und Power-User, die Chatbots erstellen möchten. Ein Verständnis für die Grundprinzipien des Programmierens moderner Webanwendungen (.NET oder JavaScript) wird vorausgesetzt.STEPHAN BISSER ist technischer Leiter bei Solvion und ein Microsoft MVP für künstliche Intelligenz. In seiner aktuellen Rolle konzentriert er sich auf Conversational AI, Microsoft 365 und Azure. Seine Leidenschaft gilt der Conversational AI Plattform und dem Cognitive-Services-Ökosystem. Stephan und mehrere andere MVPs gründeten die Community-Initiativen BotBuilderCommunity und SelectedTech, die sich auf Bot-Framework-SDKs, Tools und technische Themen im Zusammenhang mit Microsoft 365 und KI konzentrieren.Kapitel 1: Einführung in die Microsoft Conversational AI PlatformKapitel 2: Einführung in das Microsoft Bot FrameworkKapitel 3: Einführung in Azure Cognitive ServicesKapitel 4: Gestaltungsprinzipien eines ChatbotsKapitel 5: Aufbau eines ChatbotsKapitel 6: Testen eines ChatbotsKapitel 7: Veröffentlichung eines ChatbotsKapitel 8: Verbinden eines Chatbots mit Kanälen
Connecting the Internet of Things
Navigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution to a viable product. This book guides you through this fractured landscape with real world examples and projects that can be leverage for an IoT product.Backed by an overview of IoT use cases and key connectivity elements of IoT solutions, you'll gain an understanding of the breadth of the IoT landscape and the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies. You'll also be able to understand the essentials of connectivity including, hardware, software, and business models.IoT is essential for increasing productivity of many industries and quality of life (making the world smart and autonomous). Both wired and wireless connectivity technologies are essential ingredients in an IoT product. Written by Intel engineers and architects, Connecting the Internet of Things understands that connectivity is a key topic of IoT and comprehensively covers the topic from a system engineering and practical perspective.WHAT YOU'LL LEARN* Understand the trade offs between different wireless technologies and network topologies* Use wireless technologies in IoT products* Examine connectivity technologies and considerations on selecting it for the IoT use cases* Assemble all of the components of a working solution * Scale your solution to a product* Review emerging connectivity technologies for addressing new use cases* Advance and optimize the performance of existing technologiesWHO THIS BOOK IS FORResearchers, managers, strategists, technologists, makers, and students in the embedded and Internet of Things (IoT) space trying to understand and implement connectivity in the devices/platforms.ANIL KUMAR is a Principal Engineer at Intel Corporation. As a System Architect in the Client Computing Group, he works with Intel’s partners to unlock people’s potential by bringing computing devices to market, allowing them to focus, create and connect in ways that matter most to them. Before this role, Anil was responsible for the Connectivity Platform Architecture in the Internet of Things Group (IOTG). In IOTG, he successfully drove platform and chip-level integration of several critical connectivity and communication technologies, resulting in a broad set of IoT applications across different vertical markets.Anil joined Intel in 2007 as a design engineer in the Digital Home Group. He served as Platform Architect for several Intel Architecture-based Media Processors for TV and Set Top Box applications. As the chief architect in Intel Media Group, Anil led several designs that resulted in award-winning consumer electronic device designs at CES (Consumer Electronics Show). The world’s first Google TV devices are based on reference designs created by Anil.Before joining Intel, Anil held design engineering positions at multinational companies such as Fujitsu & Alcatel. Anil’s passion and purpose is driven by taking designs from concept to production. Anil is a co-author of Demystifying Internet of Things Security (Apress 2019).JAFER HUSSAIN is a Senior Product Line Manager in the Network and Edge Group (NEX) at Intel Corporation. Jafer is responsible for the product management of Intel’s Core based Smart and Intelligent AI platforms. In his current role, Jafer engages with Intel’s ecosystem partners to drive Intel’s leadership in various IoT markets.Jafer has previously led the development and integration of wireless connectivity solutions and contributed to the development of wireless connectivity strategy. He also led several customer engagements to drive these solutions to the market.Jafer is an accomplished inventor with multiple patents on embedded systems, wireless technologies, and IoT. He received B.S. in Electrical Engineering from University of Engineering and Technology Taxila, Pakistan, and M.S. in Management of Technology from the National University of Singapore.DR. ANTHONY (TONY) CHUN is head of digital access and an Encore.org/CoGenerate Fellow, at The Bridging Tech Charitable Fund, a nonprofit that is closing the digital divide for K-12 students via computers and connectivity. He recently retired from Intel Corporation, where he was the Wi-Fi product manager in the Internet of Things Group.He joined Intel in 2000 and was a research scientist in Intel Labs where he developed architectures for reconfigurable software defined radios and accelerators.He has co-authored 20 patents in wireless architectures and accelerators. He has co-authored several papers in engineering journals and received best paper awards at the Intel Design Technology and Test Conference 2011 and at the IEEE Computer Society Annual Symposium on VLSI, 2009. He has B.S., M.S. and PhD degrees in Electrical Engineering from Stanford University, Stanford, California.Chapter 1: Introduction to IoT ConnectivityChapter Goal: This chapter provides an overview of key IoT use cases and key connectivity elements of IoT solutions. The reader will get an understanding of the breadth of the IoT landscape.• Purpose of this book• Background and Terminology• Key IoT use caseso Smart citieso Asset trackingo Smart factorieso Industrialo Transportationo Digital surveillance systemso Retailo Medicalo Indoor location• End-to-end IoT building blockso Things/devices/sensorso Edge/Gateway/Fogo Cloud• IoT Stakeholders/Value Chaino Chip Vendorso Module Vendorso System Integratorso ODMso ISVso End CustomersChapter 2: Considerations in choosing a connectivity technologyChapter Goals: This chapter highlights the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies and also discusses the tradeoffs between different wireless technologies and network topologies. Also, this chapter provides the motivation for using wireless technologies in IoT products as well as challenges.• Compute and connect are integral functions that are fully integrated in single SoC-for lower cost and low power solutions• Benefits of wireless• Seamless wireless connectivity for mobility applications• Remote Commissioning, ease of deployment, OTA update, device identification• Challenges of Wireless Connectivity• Fragmentation of the IoT Ecosystemo Discussion of IoT Framework Open Connectivity Foundation etc.o Interoperability (open standards)• Coexistence and interference• Wireless security is vital• Certification (Industry, regulatory, operator)o Certified labs• Antenna design challenges• Considerations in choosing a connectivity technologyo Energy/power/cost tradeoffso Selection of network architectures and topologieso Wireless standards and alignment to use cases-how to choose the right wireless protocol for the jobo Selection criteria-range, data rate, power, security, latency, capacity, etc.• Wireless Standard BodiesSubchapter Goal: Overview of Connectivity standards including 15.4, ZigBee, Thread, 6LoWPAN, wi-fi, BT, LTE, 5G etc. and which is appropriate for each use case; include cost considerationso WiFi Allianceo BT SIGo ZigBee Allianceo Thread Groupo Dot doto Z-Waveo 3GPP (ITU-T)Chapter Goals: The following chapters (3 to 10) provide a deep dive on each connectivity technology and considerations on selecting it for the IoT use casesChapter 3: Wi-Fi• Wi-Fi mesh• WiFi 802.11a/b/g/n/ac• WiFi 6Chapter 4: Bluetooth• BLE• BT mesh• BT direction finding• BT beaconsChapter 5: 802.15.4 (unlicensed)• ZigBee• ThreadChapter 6: LPWAN• Lora• SigFoxChapter 7: Cellular Technologies• NB IoT• 3G• 4G LTE• CBRS (Private LTE) / OnGoChapter 8: 5G• eMBB• mMTC• urLLC• 5G TSNChapter 9: Ethernet• TSN• Industrial Ethernet TechnologiesChapter 10: GNSSChapter 11: IoT Connectivity Frameworks and StacksChapter Goal: This chapter goes into detail on how to assemble all of the components of a working solution and discusses how to scale your solution to a product• Software stacks, drivers, operating systems, RTOS• Gateway architecture including protocolso IoT protocols CoAP MQTT OPCUA• RF: antenna, PA, etc.• Coexistence• Environmental considerations, reliability, long life etc.• Security and privacy• Managing the network• Certification• Putting it together• How to integrate and validate (chip vs pre-certified module)• Scaling from project to product• Putting it together: Sample Projects• Go through the earlier examples and discuss the complete productsChapter 12: The Future of IoT ConnectivityChapter Goal: This chapter discusses emerging connectivity technologies for addressing new use cases as well as advancing and optimizing the performance of existing technologies• Things/sensors (low power, battery powered, low compute, need wireless connectivity, small memory footprint, small RTOS footprint)• Software defined radio• What is coming next?• Future technologies: Wi-Fi 7, etc.• Next steps for the reader• Where to get more informationReferencesIndex
MCA Microsoft 365 Certified Associate Modern Desktop Administrator Complete Study Guide with 900 Practice Test Questions
COMPLETE, UPDATED STUDY GUIDE FOR MCA MODERN DESKTOP ADMINISTRATOR CERTIFICATION EXAMS, MD-100 AND MD-101. COVERS NEW WINDOWS 11, SERVICES, TECHNOLOGIES, AND MORE!MCA Microsoft 365 Certified Associate Modern Desktop Administrator Complete Study Guide, Second Edition, is your all-in-one guide to preparing for the exams that will earn you the MCA Modern Desktop Administrator certification! In this book, well-known Windows guru and five-time Microsoft MVP, William Panek, guides you through the latest versions of the Windows Client exam (MD-100) and the Managing Modern Desktops exam (MD-101). This one-stop resource covers 100% of the objectives for both exams, providing real world scenarios, hands-on exercises, and challenging review questions. You’ll also dive deeper into some of the more complex topics and technologies, including deploying, maintaining, and upgrading Windows; managing devices and data; configuring storage and connectivity; managing apps and data; and more.* Learn everything you need to know to pass the MD-100 and MD-101 exams* Earn your MCA Modern Desktop Administrator certification to launch or advance your career* Access exercises, review questions, flashcards, and practice exams, in the book and online* Master all of the test objectives for the latest exam versions—updated for Windows 11With this study guide, you also get access to Sybex’s superior online learning environment, including an assessment test, hundreds of practice exams, flashcards, searchable glossary, and videos for many of the chapter exercises. This is the perfect test prep resource for admins preparing for certification and anyone looking to upgrade their existing skills to Microsoft’s latest desktop client. ABOUT THE AUTHORWILLIAM PANEK is a Five-Time Microsoft MVP Winner. He has taught at Boston University, Clark University, and the University of Maryland, and presently conducts live online classes for StormWind Studios (www.stormwindstudios.com). Will has been a consultant and trainer for the United States Secret Service, Cisco, the United States Air Force, and the United States Army. He also creates training videos to help students prepare for various Microsoft exams. Introduction xxixAssessment Test – MD- 100 xliiiAssessment Test – MD- 101 xlixAnswers to Assessment Test – MD- 100 lvAnswers to Assessment Test – MD- 101 lviiiPART I EXAM MD-100 1CHAPTER 1 WINDOWS CLIENT INSTALLATION 3Understanding the Basics 4Windows 10/11 Features 9Windows 10 vs. Windows 11 11What Has Been Changed in Windows 11? 12Windows 10 and 11 Architecture 13Preparing to Install Windows 14Windows Home 15Windows Pro 15Windows Enterprise 16Windows 10 Enterprise E3 and E 5 17Windows Client Requirements 18New Installation or Upgrade? 20Disk Partitioning 24Language and Region Pack 25Installing Windows 10 25Performing a Clean Installation of Windows 10 26Performing an Upgrade to Windows 10 from Windows 8.1 36Installing Windows 11 41Performing a Clean Installation of Windows 11 42Performing an Upgrade to Windows 11from Windows 10 43Troubleshooting Installation Problems 43Supporting Multiple- Boot Options 45Using Windows Activation 47Understanding Automated Deployment Options 48An Overview of the Microsoft Deployment Toolkit 48An Overview of Unattended Installation 54An Overview of Windows Deployment Services 56An Overview of the System Preparation Tool and Disk Imaging 59Overview of the Windows Assessment and Deployment Kit 63Windows Configuration Designer 64Summary of Windows Client Deployment Options 64Deploying Unattended Installations 66Using the System Preparation Tool to Prepare an Installation for Imaging 67Using Windows Configuration Designer to Create a Disk Image 69Using the Deployment Image Servicing and Management Tool 71Using Windows System Image Manager to Create Answer Files 73Windows Update 74The Update Process 75Using Windows Update 76Using Windows Update for Business 78Delivery Optimization 81Using Command- Line Options 83Installing Microsoft Store Updates 83Summary 85Exam Essentials 86Video Resources 87Review Questions 88CHAPTER 2 CONFIGURING USERS 93Understanding User Accounts 94Account Types 95Built- In Accounts 96Local and Domain User Accounts 97Working with User Accounts 98Using the Local Users and Groups Utility 98Using the User Accounts Option in Control Panel 101Creating New Users 102Disabling User Accounts 107Deleting User Accounts 108Renaming User Accounts 109Changing a User’s Password 110Using Windows Hello, Pictures, and Biometrics 111Using Device Guard 112Understanding Windows Defender Credential Guard 114Configuring Device Health Attestation 116Managing User Properties 117Managing User Group Membership 117Setting Up User Profiles, Logon Scripts, and Home Folders 119Troubleshooting User Account Authentication 126Managing and Creating Groups 127Using Built- In Groups 127Creating Groups 131Managing Group Membership 133Deleting Groups 135Managing Security Using GPOs and LGPOs 135Understanding the GPO and LGPO Basics 135Using the Group Policy Result Tool 137Managing and Applying LGPOs 138Configuring Local Security Policies 140Using Account Policies 141Using Local Policies 147Configuring User Account Control 155Privilege Elevation 156Managing Credentials by Using Credential Manager 157Local Administrator Password Solutions (LAPS) 159Registry and File Virtualization 165Understanding Smart Cards 165Configuring Remote Management 167Remote Assistance 168Easy Connect 168Remote Desktop 173Quick Assist 176Windows Admin Center 180Enabling PowerShell Remoting 182Configuring a VPN Connection 182Transparent Caching 185Broadband Tethering 185Using PowerShell 186Summary 189Exam Essentials 189Video Resources 190Review Questions 191CHAPTER 3 MANAGING DATA 197Managing File and Folder Security 198Folder Options/File Explorer Options 199Understanding Dynamic Access Control 203Securing Access to Files and Folders 204Determining and Viewing Effective Permissions for NTFS 208Determining NTFS Permissions for Copied or Moved Files 211Managing Network Access 211Creating and Managing Shared Folders 211Configuring Share Permissions 213Cloud- Based Storage 214Configuring OneDrive 215Understanding Hardware Security 220Using BitLocker Drive Encryption 221Features of BitLocker 222Windows 7 vs. Windows 10/11 224Using the BitLocker Administration and Monitoring Utility 227Use Configuration Manager to Manage BitLocker Drive Encryption (BDE) 228Understanding Smart Cards 229Summary 230Exam Essentials 231Video Resources 231Review Questions 232CHAPTER 4 MANAGING THE WINDOWS CLIENT ENVIRONMENT 239Managing Windows 240Manipulating the Desktop Environment 241Configuring Personalization 251Using Control Panel 259Using the Microsoft Management Console 270Using the System Settings 272Understanding the Settings Window 273Using PowerShell 277Configuring Mobility Options 279Configuring Offline Files and Synchronization 279Configuring Power Policies 281Managing Windows 10/11 Services 288Configuring Internet Browsers 291Cortana 291Browser Controls 293Pinning Sites to the Taskbar 293Searchable Address Bar 293Security and Privacy Enhancements 293Using the Browser’s Compatibility Mode 294Using Enhanced Security Mode in Edge 295Using InPrivate Browsing 297Configuring Internet Options 297Manage and Use Hyper- V on Windows Client 303Hyper- V System Requirements 304Enabling the Hyper- V Role 304Opening the Hyper- V Manager 305Changing Configuration on an Existing Virtual Machine 311Deleting Virtual Machines 313Manage Virtual Switches 314Managing Virtual Hard Disks 316PowerShell Commands 322Windows Sandbox 325Summary 328Exam Essentials 329Video Resources 329Review Questions 330CHAPTER 5 CONFIGURING SECURITY AND DEVICES 335Configuring Disk Storage 336Basic Storage 337Dynamic Storage 337GUID Partition Table 339Using the Disk Management Utility 340Understanding the Disk Management Utility 340Managing Storage 355Managing Dynamic Storage 355Understanding Filesystems 358Filesystem Selection 358Filesystem Conversion 361Configuring NTFS 361Configuring Hardware 365Understanding Devices 365Using Device Manager 366Installing and Updating Device Drivers 370Driver Signing 379Managing I/O Devices 381Configuring Removable Storage Devices 381Managing Printers 385Configuring Windows Defender Firewall 401Understanding the Windows Defender Firewall Basics 401Windows Defender Firewall with Advanced Security 403Managing Windows Security 408Windows Security Center 408Summary 411Exam Essentials 412Video Resources 412Review Questions 413CHAPTER 6 CONFIGURING NETWORK CONNECTIVITY 419Understanding the Basics 420Peer- to- Peer Networks 420On- Site Active Directory Networks 422Cloud- Based Azure Active Directory 424Other Microsoft Networking Terms and Roles 424Configuring NIC Devices 427Configuring a Network Adapter 428Troubleshooting a Network Adapter 434Configuring Wireless NIC Devices 434Configuring Wi- Fi Direct 442Understanding TCP/IP 445Benefits and Features of TCP/IP 446Basics of IP Addressing and Configuration 448Using IPv6 Addresses 452Configuring TCP/IP on Windows 10 463Testing Your IP Configuration 467Configuring Windows Client on a Network 468Configure VPN Clients 470Create a VPN Profile 471Configure and Manage Certificates on Client Devices 475Summary 478Exam Essentials 479Video Resources 479Review Questions 480CHAPTER 7 CONFIGURING RECOVERY 485Understanding Recovery 487Knowing the Startup/Boot Options 488Starting in Safe Mode 489Enabling Boot Logging 492Using Other Startup Setting Options 494Understanding System Restore 495Using the System Image Recovery 497Using the Startup Repair Tool 498Maintaining Windows 10/11 with Backup and Restore 498Creating a Backup 499Restoring Files from a Backup 500Recovering Files from OneDrive 501Using the WBAdmin Command Utility 502Using Advanced Backup Options 503Using System Protection 505Creating Restore Points 506Restoring Restore Points 507Cleaning Up Old Restore Points 507Storage Sense 508Using the Recycle Bin 510Monitoring Windows 511Introducing Performance Monitor 511Using Other Performance- Monitoring Tools 521Manage the Registry 531Summary 532Exam Essentials 533Video Resources 533Review Questions 534PART II EXAM MD- 101 539CHAPTER 8 DEPLOY WINDOWS CLIENT 541Plan a Windows Client Deployment 542Microsoft Endpoint Manager (MEM) Overview 542Endpoint Analytics 544Deploying with Windows Autopilot 551Windows Autopilot Requirements 552Configure Device Registration for Autopilot 557Windows Autopilot Profiles 559Provision Windows Devices by Using Autopilot 563Troubleshoot an Autopilot Deployment 564Using Microsoft Deployment Toolkit (MDT) 567Planning MDT Deployments 567MDT Configuration Options 568Plan and Implement PXE Boot by Using Windows Deployment Services (WDS) 569Summary 576Exam Essentials 576Video Resources 577Review Questions 578CHAPTER 9 MANAGING IDENTITY AND ACCESS 585Active Directory vs. Azure Active Directory 586Understanding Active Directory 586Understanding Azure Active Directory 597Managing Hybrid Networks 625Password Hash Synchronization with Azure AD 625Azure Active Directory Pass-Through Authentication 626Federation with Azure AD 627Common Identity Scenarios 630Azure AD Connect 631Configure Enterprise State Roaming in Azure AD 638Requirements of Enterprise State Roaming 638Enable Enterprise State Roaming 639Plan and Implement Conditional Access Policies 639Create a Conditional Access Policy 642Troubleshooting Conditional Access 643Using PowerShell Commands 645Summary 647Exam Essentials 648Video Resources 649Review Questions 650CHAPTER 10 PLANNING AND MANAGING MICROSOFT INTUNE 655Managing Devices with Microsoft Intune 656Understanding Microsoft Intune Benefits 658Configuring Intune Subscriptions 658Provisioning User Accounts 665Setting Administrator Accounts 665Supporting Applications 687Deploying Applications Using Intune 687Supporting Broadband Connectivity 694Understanding Data Synchronization 695Using Mobile Application Management 697Understanding Updates 699Deploying Software Updates Using Intune 699Using Intune Compliance Reports 705Using Intune Reports 705Implement App Protection and App Configuration Policies 706PowerShell Commands 710Summary 711Exam Essentials 711Video Resources 712Review Questions 713CHAPTER 11 MANAGING DEVICES 719Compliance Policies 721Conditional Access 721Plan Device Compliance Policies 723Device Configuration Profiles 728Summary 740Exam Essentials 741Video Resources 741Review Questions 742CHAPTER 12 MANAGING SECURITY 747Windows Security 748Planning and Implementing Endpoint Protection 749Endpoint Security 751Managing Endpoint Security in Microsoft Intune 752Implementing Microsoft Defender for Endpoint 759Understanding Microsoft Defender Application Guard 771Understanding Microsoft Defender Credential Guard 780Implementing and Managing Microsoft Defender Exploit Guard 783Using Windows Defender Application Control 787Summary 788Exam Essentials 789Video Resources 790Review Questions 791CHAPTER 13 MONITORING DEVICES 797Monitoring Windows 799Monitor Cloud- Based Tools 799Monitor Azure Device Security 809Monitor Devices by Using Endpoint Manager Admin Center 813Monitoring Devices by Using Endpoint Analytics 818Summary 820Exam Essentials 820Video Resources 820Review Questions 821Appendix Answers to Review Questions 827Chapter 1: Windows Client Installation 828Chapter 2: Configuring Users 830Chapter 3: Managing Data 833Chapter 4: Managing the Windows Client Environment 836Chapter 5: Configuring Security and Devices 840Chapter 6: Configuring Network Connectivity 843Chapter 7: Configuring Recovery 846Chapter 8: Deploy Windows Client 850Chapter 9: Managing Identity and Access 855Chapter 10: Planning and Managing Microsoft Intune 858Chapter 11: Managing Devices 862Chapter 12: Managing Security 865Chapter 13: Monitoring Devices 869Index 873
Die Kunst der agilen Entwicklung (2. Auflage)
Grundlagen, Methoden und PraktikenUm agile Entwicklung zu meistern, müssen Sie im Team lernen, unzählige Möglichkeiten von Moment zu Moment zu bewerten und intuitiv die beste Vorgehensweise auszuwählen.Dieses Buch beschreibt umfassend und praxisorientiert die Grundlagen, Methoden und Praktiken agiler Softwareentwicklung. James Shore gibt wertvolle Ratschläge für den Projektstart, inkrementellen Entwurf, Continuous Integration, iterative Planung und testgetriebene Entwicklung sowie die Bereitstellung und Refactoring von Software, die aus über zwei Jahrzehnten Erfahrung mit Agilität stammen. Er bringt den State of the Art aus Extreme Programming, Scrum, Lean, DevOps und mehr in ein zusammenhängendes Ganzes und vermittelt darüber hinaus, dass Agilität zu meistern auch bedeutet, in Abhängigkeit von Projektgegebenheiten und der Organisation, in der Software entwickelt wird, Praktiken anzupassen.Diese 2. Auflage ist vollständig überarbeitet und von Grund auf neu geschrieben worden und berücksichtigt dabei die Weiterentwicklung auf dem Gebiet der agilen Entwicklung der letzten 14 Jahre. Neu aufgenommen wurden Themen wie agile Skalierung, DevOps, die Arbeit mit Remote-Teams sowie das Agile Fluency Model zur Einführung und Anpassung von Agilität an die Bedürfnisse des Unternehmens. Autor:James Shore leitet seit 1999 Teams, die agile Entwicklung praktizieren. Er kombiniert ein tiefes Verständnis der agilen Ideen mit jahrzehntelanger praktischer Erfahrung in der Entwicklung und nutzt diese Erfahrung, um Menschen dabei zu unterstützen, zu verstehen, wie alle Aspekte von Agilität zusammenpassen, um herausragende Ergebnisse zu erzielen. James hat den Gordon Pask Award der Agile Alliance für Beiträge zur agilen Praxis erhalten, ist Moderator mehrerer Screencasts zur Softwareentwicklung und Mitbegründer des Agile Fluency Model. Er ist online unter jamesshore.com zu finden.Zielgruppe: Programmierer*innenSoftwareentwickler*innenProduktverantwortlicheProjektmanager*innenQualitätsverantwortlicheManagementStudierende
Cybersecurity All-in-One For Dummies
OVER 700 PAGES OF INSIGHT INTO ALL THINGS CYBERSECURITYCybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.* Explore the basics of cybersecurity at home and in business* Learn how to secure your devices, data, and cloud-based assets* Test your security to find holes and vulnerabilities before hackers do* Create a culture of cybersecurity throughout an entire organizationThis For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide. This All-in-One gathers the expertise of the leading For Dummies authors in the world of cybersecurity, including JOSEPH STEINBERG, author of Cybersecurity For Dummies; KEVIN BEAVER, author of Hacking For Dummies; TED COOMBS, author of Cloud Security For Dummies; and IRA WINKLER, author of Security Awareness For Dummies. BOOK 1: CYBERSECURITY BASICS 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49BOOK 2: PERSONAL CYBERSECURITY 69Chapter 1: Evaluating Your Current Cybersecurity Posture 71Chapter 2: Enhancing Physical Security 93Chapter 3: Cybersecurity Considerations When Working from Home 103Chapter 4: Securing Your Accounts 113Chapter 5: Passwords 131Chapter 6: Preventing Social Engineering Attacks 147BOOK 3: SECURING A BUSINESS 169Chapter 1: Securing Your Small Business 171Chapter 2: Cybersecurity and Big Businesses 195Chapter 3: Identifying a Security Breach 211Chapter 4: Recovering from a Security Breach 229Chapter 5: Backing Up 249Chapter 6: Resetting Your Device 277Chapter 7: Restoring from Backups 287BOOK 4: SECURING THE CLOUD 311Chapter 1: Clouds Aren’t Bulletproof 313Chapter 2: Getting Down to Business 333Chapter 3: Developing Secure Software 349Chapter 4: Restricting Access 377Chapter 5: Implementing Zero Trust 407Chapter 6: Using Cloud Security Services 429BOOK 5: TESTING YOUR SECURITY 451Chapter 1: Introduction to Vulnerability and Penetration Testing 453Chapter 2: Cracking the Hacker Mindset 473Chapter 3: Developing Your Security Testing Plan 485Chapter 4: Hacking Methodology 497Chapter 5: Information Gathering 507Chapter 6: Social Engineering 513Chapter 7: Physical Security 529BOOK 6: ENHANCING CYBERSECURITY AWARENESS 541Chapter 1: Knowing How Security Awareness Programs Work 543Chapter 2: Creating a Security Awareness Strategy 553Chapter 3: Determining Culture and Business Drivers 559Chapter 4: Choosing the Best Tools for the Job 573Chapter 5: Measuring Performance 589Chapter 6: Assembling Your Security Awareness Program 601Chapter 7: Running Your Security Awareness Program 621Chapter 8: Implementing Gamification 641Index 655
The Art of Virtual LEGO Design
Have you ever dreamed of designing your own LEGOs? Do you love building huge LEGO models, but don’t have enough bricks? This book will show you how to do all that and more with Bricklink Studio 2.0, a software program that's widely used by LEGO designers to create LEGO models virtually before making them with real LEGO bricks.You'll learn how to start a new project, use the camera control options, and drag and drop parts into your building plate. Then take your bricks from a pile of random pieces into intricate masterpiece models using building tools like Select, Hinge, Clone, Hide, Connect, Collision, and more! You’ll master all the building tools that help you build LEGO models. Then you’ll learn to search and manage LEGO bricks in Studio 2.0 using different palette options like Master, Hidden parts, and Custom parts.Beyond the official LEGO colors, there are special color options you can use to render neon, glow in the dark, and translucent brick. Use this expanded color palette to add to the complexity of your models, and then render your model to see it realistically in 3D! You’ll also learn to animate your model and watch it come to life.After finishing your design, you’ll learn to share what you’ve built with the world. You’ll create professional LEGO instructions for your model that can be printed or shared. Making you a true LEGO design master!WHAT YOU'LL LEARN* Make fascinating models with virtual LEGO bricks* Design LEGO models more efficiently with Studio 2.0’s powerful tools* Use “Build Together” simultaneously with another designer on the same project* Build massive, amazing models on a small budget WHO THIS BOOK IS FORAnyone interested in digital modelling or who loves building with LEGOs. Students, hobbyists, and enthusiasts will find fun learning activities.VISHNU AGARWAL has years of experience in the field of STEAM Education using the LEGO Education platform. He is the founder of ROBO-G, a robotics and STEAM education service provider. Vishnu has successfully coached teams in the World Robot Olympiad and First LEGO League competitions. Many students and teachers alike have learned STEAM concepts from Vishnu’s courses and coaching.He has also presented a research paper on Teaching Programming and Computational Thinking to Elementary Level Children Using LEGO Robotics Education Kit at Technology for Education (T4E) at IIT, Bombay.He is also the founder and LEGO artist at PICK A BRICK - BUILD YOUR IMAGINATION. He uses LEGO bricks to make people's imaginations come to life through custom models, workshops, and employee engagement activities. In other words, he 3D prints their thoughts using LEGO bricks.He is the author of "THE ART OF VIRTUAL LEGO DESIGN: DESIGN LEGO MODELS USING STUDIO 2.0" published by Apress, a Springer Nature company.Chapter 1: Getting Started• Welcome Screen• Starting a project• Dragging and dropping parts• Rotate Camera• Pan Camera• Zoom in Zoom out• Viewport Controls• Viewport Rotation LockChapter 2: Building Tools• Select• Hinge• Clone• Hide• Connect• Collision• Snap• Grid• Finding Compatible Bricks• Finding Alternatives• Copy & Mirror• SubmodelsChapter 3: Bricks Palette• Master• Hidden Parts• New Parts• Custom Parts• Create an empty palette• Import an official LEGO Set• Import a wanted list• Searching parts using key words• Palette Colors• Decorated Bricks on/off• Thumbnail SizeChapter 4: Color Palette• Paint with the selected color• Grab color from parts• Favorite Colors• Content Colors• Solid Colors• Transparent Colors• Chrome Colors• Pearl Colors• Metallic Colors• Milky Colors• Glitter Colors• Speckle Colors• Rubber Colors• Satin Colors• Glowing Neon (Render Only)• Luminous Soft (Render only)• Luminous (Render Only)• Translucent (Render Only)• Glow in Dark (Render Only)Chapter 5: Building Techniques• Mastering the Tools• Selecting and Copying ElementsChapter 6: How to Create Steps• Step List• Color Validator• Build a basic model• Render• StabilityChapter 7: Creating Instructions• Building a Robot Model• Step Editor (In detail explaination)• Page Editior (In detail explaination)Chapter 8: Interesting Features of Studio 2.0• Mosaic• Preferences• Import & Export Files• Hide Panels Options• Sign in to Bricklink• Upload to my Studio creations• Build Together• Add to wanted list• Buy Creations
Practical Debugging at Scale
Overhaul your debugging techniques and master the theory and tools needed to debug and troubleshoot cloud applications in production environments. This book teaches debugging skills that universities often avoid, but that typically consume as much as 60% of our time as developers. The book covers the use of debugger features such as tracepoints, object marking, watch renderers, and more. Author Shai Almog presents a scientific approach to debugging that is grounded in theory while being practical enough to help you to chase stubborn bugs through the maze of a Kubernetes deployment.Practical Debugging at Scale assumes a polyglot environment as is common for most enterprises, but focuses on JVM environments. Most of the tooling and techniques described are applicable to Python, Node, and other platforms, as well as to Java and other JVM languages. The book specifically covers debugging in production, an often-neglected discipline but an all too painful reality. You’ll learn modern techniques around observability, monitoring, logging, and full stack debugging that you can put to immediate use in troubleshooting common ailments in production environments.YOU WILL LEARN:* The scientific method underlying the process of debugging* Debugger capabilities such as tracepoints and marker objects* The correct use of less understood features such as exception breakpoints* Techniques for tracing issues in production Kubernetes environments* Observability and monitoring to resolve production problems* Industry best practices for common tooling such as logging * Profiling to understand performance and memory problems WHO THIS BOOK IS FORDevelopers in Java and JVM-related languages who want to improve their debugging skills and production reliability; and developers of cloud applications who are facing the pain of production bugs that are hard to replicate and fixSHAI ALMOG is an entrepreneur, open source hacker, speaker, author, blogger, Java rockstar, and more. He is a former Sun (later Oracle) developer with more than 30 years of experience. Shai has built JVMs, development tools, mobile phone environments, banking systems, startup/enterprise backends, user interfaces, development frameworks, and much more. He speaks at conferences all over the world and has shared the stage with luminaries such as James Gosling (father of Java). Shai is an award-winning, highly rated speaker with deep technical experience to share and he has a knack for engaging his audience. IntroductionPART I. BASICS1. Know Your Debugger2. The Checklist3. The Auxiliary Tools4. Logging, Testing, and Fail Fast5. Time Travel DebuggingPART II. THE MODERN PRODUCTION ENVIRONMENT6. Debugging Kubernetes7. Serverless Debugging8. Fullstack Debugging9. Observability and Monitoring10. Developer ObservabilityPART III. IN PRACTICE11. Tools of Learning12. Performance and Memory13. Security14. Bug Strategies
Apply Data Science
This book offers an introduction to the topic of data science based on the visual processing of data. It deals with ethical considerations in the digital transformation and presents a process framework for the evaluation of technologies. It also explains special features and findings on the failure of data science projects and presents recommendation systems in consideration of current developments. Machine learning functionality in business analytics tools is compared and the use of a process model for data science is shown.The integration of renewable energies using the example of photovoltaic systems, more efficient use of thermal energy, scientific literature evaluation, customer satisfaction in the automotive industry and a framework for the analysis of vehicle data serve as application examples for the concrete use of data science. The book offers important information that is just as relevant for practitioners as for students and teachers.PROF. DR THOMAS BARTON is a professor at Worms University of Applied Sciences. His focus is on the development of operational applications, e-business, cloud computing and data science.PROF. DR CHRISTIAN MÜLLER is a professor at the Technical University of Wildau. His focus is on operations research, simulation of business processes and internet technologies. Introduction.- Introduction to Data Science.- Systems, Tools and Methods.- Applications.
Pro Deep Learning with TensorFlow 2.0
This book builds upon the foundations established in its first edition, with updated chapters and the latest code implementations to bring it up to date with Tensorflow 2.0.Pro Deep Learning with TensorFlow 2.0 begins with the mathematical and core technical foundations of deep learning. Next, you will learn about convolutional neural networks, including new convolutional methods such as dilated convolution, depth-wise separable convolution, and their implementation. You’ll then gain an understanding of natural language processing in advanced network architectures such as transformers and various attention mechanisms relevant to natural language processing and neural networks in general. As you progress through the book, you’ll explore unsupervised learning frameworks that reflect the current state of deep learning methods, such as autoencoders and variational autoencoders. The final chapter covers the advanced topic of generative adversarial networks and their variants, such as cycle consistency GANs and graph neural network techniques such as graph attention networks and GraphSAGE.Upon completing this book, you will understand the mathematical foundations and concepts of deep learning, and be able to use the prototypes demonstrated to build new deep learning applications.WHAT YOU WILL LEARN* Understand full-stack deep learning using TensorFlow 2.0* Gain an understanding of the mathematical foundations of deep learning * Deploy complex deep learning solutions in production using TensorFlow 2.0* Understand generative adversarial networks, graph attention networks, and GraphSAGEWHO THIS BOOK IS FOR:Data scientists and machine learning professionals, software developers, graduate students, and open source enthusiasts.SANTANU PATTANAYAK works as a Senior Staff Machine Learning Specialist at Qualcomm Corp R&D and is the author of Quantum Machine Learning with Python, published by Apress. He has more than 16 years of experience, having worked at GE, Capgemini, and IBM before joining Qualcomm. He graduated with a degree in electrical engineering from Jadavpur University, Kolkata and is an avid math enthusiast. Santanu has a master’s degree in data science from the Indian Institute of Technology (IIT), Hyderabad. He also participates in Kaggle competitions in his spare time, where he ranks in the top 500. Currently, he resides in Bangalore with his wife.Chapter 1: Mathematical FoundationsChapter Goal: Setting the mathematical base for machine learning and deep learning .No of pages 100Sub -Topics1. Linear algebra2. Calculus3. Probability4. Formulation of machine learning algorithms and optimization techniques.Chapter 2: Introduction to Deep learning Concepts and Tensorflow 2.0Chapter Goal: Setting the foundational base for deep learning and introduction to Tensorflow 2.0 programming paradigm.No of pages: 75Sub - Topics:5. Deep learning and its evolution.6. Evolution of the learning techniques: from perceptron based learning to back-propagation7. Different deep learning objectives functions for supervised and unsupervised learning.8. Tensorflow 2.09. GPUChapter 3: Convolutional Neural networksChapter Goal: The mathematical and technical aspects of convolutional neural networkNo of pages: 801. Convolution operation2. Analog and digital signal3. 2D and 3D convolution, dilation and depth-wise separable convolution4. Common image processing filter5. Convolutional neural network and components6. Backpropagation through convolution and pooling layers7. Translational invariance and equivariance8. Batch normalization9. Image segmentation and localization methods (Moved from advanced Neural Network to here, to make room for Graph Neural Networks )Chapter 4: Deep learning for Natural Language ProcessingChapter Goal: Deep learning methods and natural language processing No of pages:Sub - Topics:1. Vector space model2. Word2Vec3. Introduction to recurrent neural network and LSTM4. Attention5. Transformer network architecturesChapter 5: Unsupervised Deep Learning MethodsChapter Goal: Foundations for different unsupervised deep learning techniquesNo of pages: 60Sub - Topics:1. Boltzmann distribution2. Bayesian inference3. Restricted Boltzmann machines4. Auto Encoders and variation methodsChapter 6: Advanced Neural NetworksChapter Goal: Generative adversarial networks and graph neural networksNo of pages: 70Sub - Topics:1. Introduction to generative adversarial networks2. CycleGAN, LSGAN Wasserstein GAN3. Introduction to graph neural network4. Graph attention network and graph SAGEChapter 7: Reinforcement LearningChapter Goal: Reinforcement Learning using Deep LearningNo of pages: 50Sub - Topics:1. Introduction to reinforcement learning and MDP formulation2. Value based methods3. DQN4. Policy based methods5. Reinforce and actor critic network in policy based formulations6. Transition-less reinforcement learning and bandit methods
CompTIA Server+ (4. Auflg.)
Serversysteme einrichten und betreiben. Vorbereitung auf die Prüfung SK0-005. 4. Auflage 2023.Die Prüfung CompTIA Server+ richtet sich an IT-Fachleute und Administratoren und weist die Fähigkeiten nach, Server in Rechenzentren sowie in lokalen und hybriden Umgebungen zu installieren, zu verwalten und Fehler zu beheben. Die Zertifizierung ist nicht auf eine einzige Plattform beschränkt, so dass Sie die Aufgaben in jeder Umgebung ausführen können. Das Zertifikat ist international anerkannt.Die Prüfung SK0-005 teilt sich in diese Fachgebiete auf:Server-Hardware: Installation und ManagementServeradministrationSicherheit und Disaster RecoveryFehlerbehebungSie lernen in diesem Buch die Eigenschaften, den Einsatz und die Konfiguration von Servern von Grund auf kennen, sowohl was die Hardware als auch was die spezifischen Betriebs-systeme und Applikationen von Servern anbelangt.Des Weiteren erläutern die Autoren die Planung und die physischen Umgebungsbedingungen von Servern sowie aktuelle Themen wie z.B. Hochverfügbarkeit, Cloud Computing und Skripterstellung. Außerdem werden wichtige Fragen zur Sicherheit, Datensicherung und zum Disaster Recovery ausführlich behandelt.So können Sie sich das für die Zertifizierung benötigte Fachwissen aneignen und ein praxistaugliches Verständnis der Thematik entwickeln, das Sie in Ihrem Arbeitsalltag bei der Server-Administration voranbringt.Aus dem Inhalt:Server-Hardware: Prozessoren, Arbeitsspeicher, BIOS/UEFIStorage-Lösungen und -technologien: SSD, SAS, SATA, Fibre Channel, iSCSIFehlertoleranz: RAID, EnergieversorgungServer installieren und aktualisierenHardware im Netzwerk: Kabel, Netzwerkkarten, ÜbertragungsgeräteTCP/IP: IPv4 und IPv6Serverrollen: Datei- und Druckdienste, Internet- und Maildienste, NetzwerkdiensteNetzwerkbetriebssysteme: Windows Server, UNIX/Linux und deren InstallationKonfigurationsbetrachtungen: Dateisystem, Kontingentierung, Verzeichnisdienste, GruppenrichtlinienServer Management: Remote-Verbindungen, Ereignisprotokolle, MonitoringSpeichertechnologien, Virtualisierung und Cloud-DiensteDeployment- und VirtualisierungsszenarienPhysische, technische und organisatorische SicherheitDatensicherung in Theorie und PraxisDisaster Recovery PlanningUnterhalt und Troubleshooting in der PraxisDie CompTIA Server+-Prüfung: Fragen, Antworten sowie ein Simulationstest in EnglischÜber die Autoren:Roland Cattini ist von Beruf Betriebs- und Elektroingenieur und befasst sich seit Windows NT-Zeiten als Microsoft-Experte mit Servern. Er ist aktiv in der Installation und Weiterbildung, nicht nur selber als MCSE, MCT, MCDBA, MCTS und MCITP, sondern auch als Trainer für Expertenschulungen in der Schweiz.Markus Kammermann, ausgebildeter ICT-Projektleiter und CompTIA Server+-Techniker, ist seit mehr als zwanzig Jahren in der System- und Netzwerktechnik tätig, fast ebenso lang als Ausbilder und Autor. Er engagiert sich zudem als Dozent in der höheren beruflichen Bildung.Michael Zaugg ist der UNIX- und Linux-Spezialist unter den drei Autoren. Er arbeitet als Network- und Security-Manager und betreut mit seinem Team eine ganze Reihe verschiedener Unix- und Linux-Server.Leseprobe (PDF-Link)
Internet of Things Using Single Board Computers
Rapidly prototype and program new IoT and Edge solutions using low-cost Maker tech, such as those from Arduino, Raspberry Pi and Nvidia. With a focus on the electronics, this book allows experienced computer science students as well as researchers, practitioners, and even hobbyists to dive right into actual engineering of prototypes and not just theoretical programming and algorithms.You'll learn to interface sensors, work with various communication mediums, incorporate wired and wireless communication protocols, and more with these single board computers. All while working in the popular Python programming language. Additionally, you’ll discover both scripting-based and drag and drop solutions for different problems. As well as a variety of useful, data gathering approaches. Then you can apply what you’ve learned to IoT projects and troubleshooting Industry 4.0 problems.The rapid growth of technology and new development initiatives has made the Internet of Things and Edge analytics an inevitable platform in all engineering domains. The need for sophisticated and ambient environments controlled by tech has resulted in an exponential growth of automation and artificial intelligence. Internet of Things Using Single Board Computers reflects these recent developments while providing a low-cost, easy ramp into the fields of IoT using single board computers and Python programming.WHAT YOU'LL LEARN* Program Arduino, Raspberry Pi, and Nvidia boards for rapid prototyping in IoT and Edge environments* Interface sensors, communication mediums, and wired and wireless communications into your programs and projects.* Study practical applications of these low-cost solutions in fields such as home automation, smart cities, electrical vehicle charging, and more.WHO THIS BOOK IS FOREngineers and hobbyists working on Internet of Things prototypes and applications. Basic skills in electronics and a working knowledge of Python are recommended. Engineers and scientists working on smart environment projects and smart city applications will also benefit.DR. G. R. KANAGACHIDAMBARESAN completed his Ph.D. at Anna University Chennai in 2017. He is currently an Associate Professor in the Department of CSE at Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology. His main research interests include Body Sensor Networks and Fault Tolerant Wireless Sensor Networks. He has published several articles and undertaken consultancy activities for leading MNC companies. He has also guest-edited special issue volumes and books and served as an editorial review board member for peer-reviewed journals. He is presently working on several government sponsored research projects like ISRO, DBT, and DST. Presently, he is the Editor in chief for the Next Generation Computer and Communication Engineering series. INTERNET OF THINGS USING SINGLE BOARD COMPUTERSChapter 1: An Overview of IoTChapter 2: IoT ArchitectureChapter 3: Programming Through pythonChapter 4: Wireless Technology for IoTChapter 5: Building IoT with Raspberry PiChapter 6: Home AutomationChapter 7: Smart Cities and Smart GridsChapter 8: Electric Vehicle ChargingChapter 9: Agriculture
Numerical Methods Using Kotlin
This in-depth guide covers a wide range of topics, including chapters on linear algebra, root finding, curve fitting, differentiation and integration, solving differential equations, random numbers and simulation, a whole suite of unconstrained and constrained optimization algorithms, statistics, regression and time series analysis. The mathematical concepts behind the algorithms are clearly explained, with plenty of code examples and illustrations to help even beginners get started.In this book, you'll implement numerical algorithms in Kotlin using NM Dev, an object-oriented and high-performance programming library for applied and industrial mathematics. Discover how Kotlin has many advantages over Java in its speed, and in some cases, ease of use. In this book, you’ll see how it can help you easily create solutions for your complex engineering and data science problems.After reading this book, you'll come away with the knowledge to create your own numerical models and algorithms using the Kotlin programming language.WHAT YOU WILL LEARN* Program in Kotlin using a high-performance numerical library* Learn the mathematics necessary for a wide range of numerical computing algorithms* Convert ideas and equations into code* Put together algorithms and classes to build your own engineering solutions* Build solvers for industrial optimization problems* Perform data analysis using basic and advanced statisticsWHO THIS BOOK IS FORProgrammers, data scientists, and analysts with prior experience programming in any language, especially Kotlin or Java.HAKSUN LI, PHD, is founder of NM Group, a scientific and mathematical research company. He has the vision of “Making the World Better Using Mathematics”. Under his leadership, the firm serves worldwide brokerage houses and funds, multinational corporations and very high net worth individuals. Haksun is an expert in options trading, asset allocation, portfolio optimization and fixed-income product pricing. He has coded up a variety of numerical software, including SuanShu (a library of numerical methods), NM Dev (a library of numerical methods), AlgoQuant (a library for financial analytics), NMRMS (a portfolio management system for equities), and supercurve (a fixed-income options pricing system). Prior to this, Haksun was a quantitative trader/quantitative analyst with multiple investment banks. He has worked in New York, London, Tokyo, and Singapore. Additionally, Haksun is the vice dean of the Big Data Finance and Investment Institute of Fudan University, China. He was an adjunct professor with multiple universities. He has taught at the National University of Singapore (mathematics), Nanyang Technological University (business school), Fudan University (economics), as well as Hong Kong University of Science and Technology (mathematics). Dr. Haksun Li has a B.S. and M.S. in pure and financial mathematics from the University of Chicago, and an M.S. and a PhD in computer science and engineering from the University of Michigan, Ann Arbor.1: Introduction to Numerical Methods in Kotlin.-2: Linear Algebra.-3: Finding Roots of Equations.-4: Finding Roots of Systems of Equations.-5: Curve Fitting and Interpolation.-6: Numerical Differentiation and Integration.-7: Ordinary Differential Equations.-8: Partial Differential Equations.-9: Unconstrained Optimization.-10: Constrained Optimization.-11: Heuristics.-12: Basic Statistics.-13: Random Numbers and Simulation.-14: Linear Regression.-15: Time Series Analysis.-References.Table of ContentsAbout the Authors...........................................................................................................iPreface............................................................................................................................ii1. Why Kotlin?..............................................................................................................61.1. Kotlin in 2022.....................................................................................................61.2. Kotlin vs. C++....................................................................................................61.3. Kotlin vs. Python................................................................................................61.4. Kotlin in the future .............................................................................................62. Data Structures.......................................................................................................72.1. Function...........................................................................................................72.2. Polynomial ......................................................................................................73. Linear Algebra .......................................................................................................83.1. Vector and Matrix ...........................................................................................83.1.1. Vector Properties .....................................................................................83.1.2. Element-wise Operations.........................................................................83.1.3. Norm ........................................................................................................93.1.4. Inner product and angle ...........................................................................93.2. Matrix............................................................................................................103.3. Determinant, Transpose and Inverse.............................................................103.4. Diagonal Matrices and Diagonal of a Matrix................................................103.5. Eigenvalues and Eigenvectors.......................................................................103.5.1. Householder Tridiagonalization and QR Factorization Methods..........103.5.2. Transformation to Hessenberg Form (Nonsymmetric Matrices)...........104. Finding Roots of Single Variable Equations .......................................................114.1. Bracketing Methods ......................................................................................114.1.1. Bisection Method ...................................................................................114.2. Open Methods...............................................................................................114.2.1. Fixed-Point Method ...............................................................................114.2.2. Newton’s Method (Newton-Raphson Method) .....................................114.2.3. Secant Method .......................................................................................114.2.4. Brent’s Method ......................................................................................115. Finding Roots of Systems of Equations...............................................................125.1. Linear Systems of Equations.........................................................................125.2. Gauss Elimination Method............................................................................125.3. LU Factorization Methods ............................................................................125.3.1. Cholesky Factorization ..........................................................................125.4. Iterative Solution of Linear Systems.............................................................125.5. System of Nonlinear Equations.....................................................................126. Curve Fitting and Interpolation............................................................................146.1. Least-Squares Regression .............................................................................146.2. Linear Regression..........................................................................................146.3. Polynomial Regression..................................................................................146.4. Polynomial Interpolation...............................................................................146.5. Spline Interpolation .......................................................................................147. Numerical Differentiation and Integration...........................................................157.1. Numerical Differentiation .............................................................................157.2. Finite-Difference Formulas...........................................................................157.3. Newton-Cotes Formulas................................................................................157.3.1. Rectangular Rule....................................................................................157.3.2. Trapezoidal Rule....................................................................................157.3.3. Simpson’s Rules.....................................................................................157.3.4. Higher-Order Newton-Coles Formulas..................................................157.4. Romberg Integration .....................................................................................157.4.1. Gaussian Quadrature..............................................................................157.4.2. Improper Integrals..................................................................................158. Numerical Solution of Initial-Value Problems....................................................168.1. One-Step Methods.........................................................................................168.2. Euler’s Method..............................................................................................168.3. Runge-Kutta Methods...................................................................................168.4. Systems of Ordinary Differential Equations.................................................169. Numerical Solution of Partial Differential Equations..........................................179.1. Elliptic Partial Differential Equations...........................................................179.1.1. Dirichlet Problem...................................................................................179.2. Parabolic Partial Differential Equations........................................................179.2.1. Finite-Difference Method ......................................................................179.2.2. Crank-Nicolson Method.........................................................................179.3. Hyperbolic Partial Differential Equations.....................................................1710..................................................................................................................................1811..................................................................................................................................1912. Random Numbers and Simulation ....................................................................2012.1. Uniform Distribution .................................................................................2012.2. Normal Distribution...................................................................................2012.3. Exponential Distribution............................................................................2012.4. Poisson Distribution ..................................................................................2012.5. Beta Distribution........................................................................................2012.6. Gamma Distribution ..................................................................................2012.7. Multi-dimension Distribution ....................................................................2013. Unconstrainted Optimization ............................................................................2113.1. Single Variable Optimization ....................................................................2113.2. Multi Variable Optimization .....................................................................2114. Constrained Optimization .................................................................................2214.1. Linear Programming..................................................................................2214.2. Quadratic Programming ............................................................................2214.3. Second Order Conic Programming............................................................2214.4. Sequential Quadratic Programming...........................................................2214.5. Integer Programming.................................................................................2215. Heuristic Optimization......................................................................................2315.1. Genetic Algorithm .....................................................................................2315.2. Simulated Annealing .................................................................................2316. Basic Statistics..................................................................................................2416.1. Mean, Variance and Covariance................................................................2416.2. Moment......................................................................................................2416.3. Rank...........................................................................................................2417. Linear Regression .............................................................................................2517.1. Least-Squares Regression..........................................................................2517.2. General Linear Least Squares....................................................................2518. Time Series Analysis ........................................................................................2618.1. Univariate Time Series..............................................................................2618.2. Multivariate Time Series ...........................................................................2618.3. ARMA .......................................................................................................2618.4. GARCH .....................................................................................................2618.5. Cointegration .............................................................................................2619. Bibliography .....................................................................................................2720. Index .....................................................................................................
Wireshark for Network Forensics
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.WHAT YOU'LL LEARN* Review Wireshark analysis and network forensics* Study traffic capture and its analytics from mobile devices* Analyze various access technology and cloud traffic* Write your own dissector for any new or proprietary packet formats* Capture secured application traffic for analysisWHO THIS BOOK IS FORIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud OperatorsNagendra Kumar Nainar (CCIE#20987) is a Principal Engineer with Cisco Customer Experience(CX) Organization (Formerly TAC), focusing on Enterprise customers. He is the co-inventor of more than 130 patent applications in different technologies including Virtualization/Container technologies. He is the co-author of multiple Internet RFCs, various Internet drafts and IEEE papers. Nagendra also co-authored multiple technical books with leading publishers such as Cisco Press and Packt Publication. He is a guest lecturer in North Carolina State University and a speaker in different network forums.ASHISH PANDA (CCIE#33270) is a Senior Technical Leader with Cisco Systems Customer Experience CX Organization primarily focused on handling complex service provider network design and troubleshooting escalations. He has 19+ years of rich experience in network design, operation, and troubleshooting with various large enterprises and service provider networks (ISP, satellite, MPLS, 5G, and cloud) worldwide. He is a speaker at various Cisco internal and external events and is very active in the network industry standard bodies.CHAPTER 1: WIRESHARK PRIMER· Introduction to Wireshark Architecture· Wireshark Package installation and Usage· Wireshark Cloud Services· Version and feature parity· Basic Analysis and filtering· Data stream and Graphs· SummaryCHAPTER 2: PACKET CAPTURE AND ANALYSIS§ Native Tool based Traffic Capture§ Wireshark tool based Traffic Capture§ Wireless Capture Modes and Configurations· High volume packet analysis (size based, capture filters)· Wireshark command line tool· Mobile devices Traffic CaptureCHAPTER 3: CAPTURING SECURED APPLICATION FOR ANALYSIS· Introduction to Secured Applications· Secure DNS· HTTPS· mTLS· IPsec, ISAKMP, Kerberos· SNMPv3· WEP, and WPA/WPA2/WPA3CHAPTER4: WIRELESS PACKET CAPTURE AND ANALYSIS· Basics of Wireless Technology· Wireless packet types (data, control, auth)· Wireless operational aspects and effect on wireshark capture· Effect of Wireshark modes (monitor, promiscuous) on wireless capture· Setting up Wireshark 802.11 captures for various OS types· Decoding beacons/WEP/WPA/WPA2· Wireless packet analysisCHAPTER 5: MULTIMEDIA CAPTURE AND ANALYSIS· Introduction to Multimedia Applications· Export Objects (file, images applications) from data stream· video content extraction and replay (RTP / RTSP)· mpeg live streams capture and replay· VoIP call analysis and replayCHAPTER 6: CLOUD AND CLOUD-NATIVE TRAFFIC CAPTURE· Introduction and Cloud and Cloud Native Applications· Native and Wireshark Captures in AWS· Native and Wireshark Captures in GCP· Native and Wireshark Captures in Azure· LXC and Namespace based capture· Kubernetes POD captureCHAPTER 7: BLUETOOTH PROTOCOL CAPTURE AND ANALYSIS· Introduction to Bluetooth and Usecase· HCIDump captures· Bluetooth protocol analysisCHAPTER 8: WIRESHARK ANALYSIS AND NETWORK FORENSIC· Networking protocol operation analysis· Analyzing network throughput issues, performance degradations· Network security attack identification , post mortems, prevention· Discovering malwares, covert communications· Packet replaysCHAPTER 9: WRITING YOUR OWN DISSECTOR· Wireshark Dissectors· Use Case Example· Dissector Example
Agile Model-Based Systems Engineering Cookbook
Agile MBSE can help organizations manage change while ensuring system correctness and meeting customers’ needs. But deployment challenges have changed since our first edition. The Agile Model-Based Systems Engineering Cookbook’s second edition focuses on workflows – or recipes – that will help MBSE practitioners and team leaders address practical situations that are part of deploying MBSE as part of an agile development process across the enterprise. In this 2nd edition, the Cameo MagicDraw Systems Modeler tool – the most popular tool for MBSE – is used in examples (models are downloadable by readers). Written by a world-renowned expert in MBSE, this book will take you through systems engineering workflows in the Cameo Systems Modeler SysML modeling tool and show you how they can be used with an agile and model-based approach. You’ll start with the key concepts of agile methods for systems engineering. Next, each recipe will take you through initiating a project, outlining stakeholder needs, defining and analyzing system requirements, specifying system architecture, performing model-based engineering trade studies, all the way to handling systems specifications off to downstream engineering. By the end of this MBSE book, you’ll learn how to implement systems engineering workflows and create systems engineering models.
Modern Deep Learning for Tabular Data
Deep learning is one of the most powerful tools in the modern artificial intelligence landscape. While having been predominantly applied to highly specialized image, text, and signal datasets, this book synthesizes and presents novel deep learning approaches to a seemingly unlikely domain – tabular data. Whether for finance, business, security, medicine, or countless other domain, deep learning can help mine and model complex patterns in tabular data – an incredibly ubiquitous form of structured data.Part I of the book offers a rigorous overview of machine learning principles, algorithms, and implementation skills relevant to holistically modeling and manipulating tabular data. Part II studies five dominant deep learning model designs – Artificial Neural Networks, Convolutional Neural Networks, Recurrent Neural Networks, Attention and Transformers, and Tree-Rooted Networks – through both their ‘default’ usage and their application to tabular data. Part III compounds the power of the previously covered methods by surveying strategies and techniques to supercharge deep learning systems: autoencoders, deep data generation, meta-optimization, multi-model arrangement, and neural network interpretability. Each chapter comes with extensive visualization, code, and relevant research coverage.Modern Deep Learning for Tabular Data is one of the first of its kind – a wide exploration of deep learning theory and applications to tabular data, integrating and documenting novel methods and techniques in the field. This book provides a strong conceptual and theoretical toolkit to approach challenging tabular data problems.WHAT YOU WILL LEARN* Important concepts and developments in modern machine learning and deep learning, with a strong emphasis on tabular data applications.* Understand the promising links between deep learning and tabular data, and when a deep learning approach is or isn’t appropriate.* Apply promising research and unique modeling approaches in real-world data contexts.* Explore and engage with modern, research-backed theoretical advances on deep tabular modeling* Utilize unique and successful preprocessing methods to prepare tabular data for successful modelling.WHO THIS BOOK IS FORData scientists and researchers of all levels from beginner to advanced looking to level up results on tabular data with deep learning or to understand the theoretical and practical aspects of deep tabular modeling research. Applicable to readers seeking to apply deep learning to all sorts of complex tabular data contexts, including business, finance, medicine, education, and security.ANDRE YE is a deep learning researcher with a focus on building and training robust medical deep computer vision systems for uncertain, ambiguous, and unusual contexts. He has published another book with Apress, Modern Deep Learning Design and Applications, and writes short-form data science articles on his blog. In his spare time, Andre enjoys keeping up with current deep learning research and jamming to hard metal.ANDY WANG is a researcher and technical writer passionate about data science and machine learning. With extensive experiences in modern AI tools and applications, he has competed in various professional data science competitions while gaining hundreds and thousands of views across his published articles. His main focus lies in building versatile model pipelines for different problem settings including tabular and computer-vision related tasks. At other times while Andy is not writing or programming, he has a passion for piano and swimming.○ Section 1: Machine Learning and Tabular Data■ Chapter 1 – Introduction to Machine Learning■ Chapter 2 – Data Tools○ Section 2: Applied Deep Learning Architectures■ Chapter 3 – Artificial Neural Networks■ Chapter 4 – Convolutional Neural Networks■ Chapter 5 – Recurrent Neural Networks■ Chapter 6 – Attention Mechanism■ Chapter 7 – Tree-based Neural Networks○ Section 3: Deep Learning Design and Tools■ Chapter 8 – Autoencoders■ Chapter 9 – Data Generation■ Chapter 10 – Meta-optimization■ Chapter 11 – Multi-model arrangement■ Chapter 12 – Deep Learning Interpretability○ Appendix A