Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Semantic Web for Effective Healthcare Systems

Semantic Web for Effective Healthcare Systems

SEMANTIC WEB FOR EFFECTIVE HEALTHCARE SYSTEMSTHE BOOK SUMMARIZES THE TRENDS AND CURRENT RESEARCH ADVANCES IN WEB SEMANTICS, DELINEATING THE EXISTING TOOLS, TECHNIQUES, METHODOLOGIES, AND RESEARCH SOLUTIONSSemantic Web technologies have the opportunity to transform the way healthcare providers utilize technology to gain insights and knowledge from their data and make treatment decisions. Both Big Data and Semantic Web technologies can complement each other to address the challenges and add intelligence to healthcare management systems. The aim of this book is to analyze the current status on how the semantic web is used to solve health data integration and interoperability problems, and how it provides advanced data linking capabilities that can improve search and retrieval of medical data. Chapters analyze the tools and approaches to semantic health data analysis and knowledge discovery. The book discusses the role of semantic technologies in extracting and transforming healthcare data before storing it in repositories. It also discusses different approaches for integrating heterogeneous healthcare data. This innovative book offers:* The first of its kind and highlights only the ontology driven information retrieval mechanisms and techniques being applied to healthcare as well as clinical information systems;* Presents a comprehensive examination of the emerging research in areas of the semantic web; * Discusses studies on new research areas including ontological engineering, semantic annotation and semantic sentiment analysis;* Helps readers understand key concepts in semantic web applications for the biomedical engineering and healthcare fields;* Includes coverage of key application areas of the semantic web.AUDIENCE: Researchers and graduate students in computer science, biomedical engineering, electronic and software engineering, as well as industry scientific researchers, clinicians, and systems managers in biomedical fields. VISHAL JAIN is an associate professor in the Department of Computer Science and Engineering, School of Engineering and Technology, Sharda University, Greater Noida, U. P. India. He obtained Ph.D (CSE), M.Tech (CSE), MBA (HR), MCA, MCP and CCNA. He has authored more than 80 research papers in reputed conferences and journals, including Web of Science and Scopus. He has authored and edited more than 10 books with various international publishers. JYOTIR MOY CHATTERJEE is an assistant professor in the Department of Information Technology at Lord Buddha Education Foundation (Asia Pacific University of Technology & Innovation), Kathmandu, Nepal. ANKITA BANSAL is an assistant professor in the Division of Information Technology at Netaji Subhas University of Technology. She received her master’s and doctoral degree in computer science from Delhi Technological University (DTU). ABHA JAIN is an assistant professor in the Department of Computer Science Engineering, Shaheed Rajguru College of Applied Sciences for Women, Delhi University, India. She received her master’s and doctorate degree in software engineering from Delhi Technological University. Preface xvAcknowledgment xix1 AN ONTOLOGY-BASED CONTEXTUAL DATA MODELING FOR PROCESS IMPROVEMENT IN HEALTHCARE 1A. M. Abirami and A. Askarunisa1.1 Introduction 11.1.1 Ontology-Based Information Extraction 31.1.2 Ontology-Based Knowledge Representation 41.2 Related Work 51.3 Motivation 81.4 Feature Extraction 91.4.1 Vector Space Model 101.4.2 Latent Semantic Indexing (LSI) 111.4.3 Clustering Techniques 121.4.4 Topic Modeling 121.5 Ontology Development 171.5.1 Ontology-Based Semantic Indexing (OnSI) Model 171.5.2 Ontology Development 181.5.3 OnSI Model Evaluation 191.5.4 Metrics Analysis 231.6 Dataset Description 241.7 Results and Discussions 251.7.1 Discussion 1 291.7.2 Discussion 2 291.7.3 Discussion 3 301.8 Applications 311.9 Conclusion 321.10 Future Work 33References 332 SEMANTIC WEB FOR EFFECTIVE HEALTHCARE SYSTEMS: IMPACT AND CHALLENGES 39Hemendra Shankar Sharma and Ashish Sharma2.1 Introduction 402.2 Overview of the Website in Healthcare 452.2.1 What is Website? 452.2.2 Types of Website 452.2.2.1 Static Website 452.2.2.2 Dynamic Website 462.2.3 What is Semantic Web? 462.2.4 Role of Semantic Web 472.2.4.1 Pros and Cons of Semantic Web 492.2.4.2 Impact on Patient 512.2.4.3 Impact on Practitioner 522.2.4.4 Impact on Researchers 522.3 Data and Database 532.3.1 What is Data? 542.3.2 What is Database? 542.3.3 Source of Data in the Healthcare System 542.3.3.1 Electronic Health Record (EHR) 552.3.3.2 Biomedical Image Analysis 562.3.3.3 Sensor Data Analysis 572.3.3.4 Genomic Data Analysis 572.3.3.5 Clinical Text Mining 582.3.3.6 Social Media 592.3.4 Why Are Databases Important? 602.3.5 Challenges With the Database in the Healthcare System 612.4 Big Data and Database Security and Protection 612.4.1 What is Big Data 612.4.2 Five V’s of Big Data 622.4.2.1 Volume 622.4.2.2 Variety 632.4.2.3 Velocity 632.4.2.4 Veracity 642.4.2.5 Value 652.4.3 Architectural Framework of Big Data 652.4.4 Data Protection Versus Data Security in Healthcare 672.4.4.1 Phishing Attacks 672.4.4.2 Malware and Ransomware 672.4.4.3 Cloud Threats 672.4.5 Technology in Use to Secure the Healthcare Data 682.4.5.1 Access Control Policy 692.4.6 Monitoring and Auditing 692.4.7 Standard for Data Protection 702.4.7.1 Healthcare Standard in India 702.4.7.2 Security Technical Standards 712.4.7.3 Administrative Safeguards Standards 712.4.7.4 Physical Safeguard Standards 71References 713 ONTOLOGY-BASED SYSTEM FOR PATIENT MONITORING 75R. Mervin, Tintu Thomas and A. Jaya3.1 Introduction 763.1.1 Basics of Ontology 773.1.2 Need of Ontology in Patient Monitoring 783.2 Literature Review 783.2.1 Uses of Ontology in Various Domains 783.2.2 Ontology in Patient Monitoring System 803.3 Architectural Design 803.3.1 Phases of Patient Monitoring System 823.3.2 Reasoner in Patient Monitoring 873.4 Experimental Results 883.4.1 SPARQL Results 893.4.2 Comparison Between Other Systems 893.5 Conclusion and Future Enhancements 90References 914 SEMANTIC WEB SOLUTIONS FOR IMPROVISED SEARCH IN HEALTHCARE SYSTEMS 95Nidhi Malik, Aditi Sharan and Sadika Verma4.1 Introduction 954.1.1 Key Benefits and Usage of Technology in Healthcare System 964.2 Background 974.2.1 Significance of Semantics in Healthcare Systems 974.2.2 Scope and Benefits of Semantics in Healthcare Systems 984.2.3 Issues in Incorporating Semantics 984.2.4 Existing Semantic Web Technologies 994.3 Searching Techniques in Healthcare Systems 1004.3.1 Keyword-Based Search 1004.3.2 Controlled Vocabularies Based Search 1014.3.3 Improvising Searches With Semantic Web Solutions 1014.3.4 Health Domain-Specific Resources for Semantic Search 1024.3.4.1 Ontologies 1034.3.4.2 Libraries 1034.3.4.3 Search Engines 1034.4 Emerging Technologies/Resources in Health Sector 1084.4.1 Elasticsearch 1094.4.2 BioBERT 1094.4.3 Knowledge Graphs 1104.5 Conclusion 110References 1115 ACTIONABLE CONTENT DISCOVERY FOR HEALTHCARE 115Ujwala Bharambe and Anuradha Srinivasaraghavan5.1 Introduction 1165.2 Actionable Content 1175.2.1 Actionable Content in Theory 1175.2.2 Actionable Content in Practice 1225.3 Health Analytics 1245.3.1 Artificial Intelligence/Machine Learning-Based Predictive Analytics 1255.3.2 Semantic Technology for Prescriptive Health Analytics 1265.4 Ontologies and Actionable Content 1275.4.1 Ontologies in Healthcare Domain 1295.5 General Architecture for the Discovery of Actionable Content for Healthcare Domain 1305.5.1 Ontology-Driven Actionable Content Discovery in Healthcare Domain 1315.5.2 Case Study for Actionable Content Discovery in Cancer Domain 1345.6 Conclusion 136References 1366 INTELLIGENT AGENT SYSTEM USING MEDICINE ONTOLOGY 139Tintu Thomas and R. Mervin6.1 Introduction to Semantic Search 1406.1.1 What is an Ontology in Terms of Medicine? 1406.1.2 Needs and Benefits of Ontology in Medical Search 1416.2 Sematic Search 1426.2.1 How NLP Works in Sematic Search? 1426.2.2 Part of Speech Tagging and Chunking 1426.2.3 Sentence Parsing 1436.2.4 Discussion About the Various Semantic Search in Medical Databases 1446.2.5 Discussion About the Retrieval Tools Used in Sematic Search in Medline 1456.3 Structural Pattern of Semantic Search 1466.3.1 Architectural Diagram 1476.3.2 Agent Ontology 1486.3.3 Rule-Based Approach 1496.3.4 Reasoners-Based Approach 1516.4 Implementation of Reasoners 1526.5 Implementation and Results 1536.6 Conclusion and Future Prospective 153References 1547 ONTOLOGY-BASED SYSTEM FOR ROBOTIC SURGERY—A HISTORICAL ANALYSIS 159Ajay Agarwal and Amit Kumar Mishra7.1 Historical Discourse of Surgical Robots 1607.2 The Necessity for Surgical Robots 1627.3 Ontological Evolution of Robotic Surgical Procedures in Various Domains 1637.4 Inferences Drawn From the Table 1647.5 Transoral Robotic Surgery 1667.6 Pancreatoduodenectomy 1677.7 Robotic Mitral Valve Surgery 1687.8 Rectal Tumor Surgery 1707.9 Robotic Lung Cancer Surgery 1707.10 Robotic Surgery in Gynecology 1717.11 Robotic Radical Prostatectomy 1717.12 Conclusion 1727.13 Future Work 172References 1728 IOT-ENABLED EFFECTIVE HEALTHCARE MONITORING SYSTEM USING SEMANTIC WEB 175Sapna Juneja, Abhinav Juneja, Annu Dhankhar and Vishal Jain8.1 Introduction 1768.2 Literature Review 1778.3 Phases of IoT-Based Healthcare 1788.4 IoT-Based Healthcare Architecture 1798.5 IoT-Based Sensors for Health Monitoring 1808.6 IoT Applications in Healthcare 1828.7 Semantic Web, Ontology, and Its Usage in Healthcare Sector 1838.8 Semantic Web-Based IoT Healthcare 1838.9 Challenges of IoT in Healthcare Industry 1858.10 Conclusion 186References 1869 PRECISION MEDICINE IN THE CONTEXT OF ONTOLOGY 191Rehab A. Rayan and Imran Zafar9.1 Introduction 1929.2 The Rationale Behind Data 1959.3 Data Standards for Interoperability 1979.4 The Evolution of Ontology 1989.5 Ontologies and Classifying Disorders 1999.6 Phenotypic Ontology of Humans in Rare Disorders 2019.7 Annotations and Ontology Integration 2029.8 Precision Annotation and Integration 2039.9 Ontology in the Contexts of Gene Identification Research 2049.10 Personalizing Care for Chronic Illness 2079.11 Roadblocks Toward Precision Medicine 2089.12 Future Perspectives 2099.13 Conclusion 209References 21010 A KNOWLEDGEBASE MODEL USING RDF KNOWLEDGE GRAPH FOR CLINICAL DECISION SUPPORT SYSTEMS 215Ravi Lourdusamy and Xavierlal J. Mattam10.1 Introduction 21610.2 Relational Database to Graph Database 21710.2.1 Relational Database for Knowledge Representation 21810.2.2 NoSQL Databases 22010.2.3 Graph Database 22310.3 RDF 22510.3.1 RDF Model and Technology 22610.3.2 Metadata and URI 22610.3.3 RDF Stores 22810.4 Knowledgebase Systems and Knowledge Graphs 23010.4.1 Knowledgebase Systems 23010.4.2 Knowledge Graphs 23210.4.3 RDF Knowledge Graphs 23310.4.4 Information Retrieval Using SPARQL 23410.5 Knowledge Base for CDSS 23510.5.1 Curation of Knowledge Base for CDSS 23610.5.2 Proposed Model for Curation 23610.5.3 Evaluation Methodology 23810.6 Discussion for Further Research and Development 23910.7 Conclusion 239References 24011 MEDICAL DATA SUPERVISED LEARNING ONTOLOGIES FOR ACCURATE DATA ANALYSIS 249B. Tarakeswara Rao, R. S. M. Lakshmi Patibandla, V. Lakshman Narayana and Arepalli Peda Gopi11.1 Introduction 25011.2 Ontology of Biomedicine 25111.2.1 Ontology Resource Open Sharing 25411.3 Supervised Learning 25511.4 AQ21 Rule in Machine Learning 25611.5 Unified Medical Systems 25911.5.1 Note of Relevance to Bioinformatic Experts 25911.5.2 Terminological Incorporation Principles 26011.5.3 Cross-References External 26111.5.4 UMLS Data Access 26211.6 Performance Analysis 26211.7 Conclusion 265References 26512 RARE DISEASE DIAGNOSIS AS INFORMATION RETRIEVAL TASK 269Jaya Lakkakula, Rutuja Phate, Alfiya Korbu and Sagar Barage12.1 Introduction 27012.2 Definition 27112.3 Characteristics of Rare Diseases (RDs) 27212.4 Types of Rare Diseases 27312.4.1 Genetic Causes 27412.4.2 Non-Genetic Causes 27512.4.3 Pathogenic Causes (Infectious Agents) 27512.4.4 Toxic Agents 27512.4.5 Other Causes 27612.5 A Brief Classification 27612.6 Rare Disease Databases and Online Resources 27712.6.1 European Reference Network: ERN 27712.6.2 Genetic and Rare Diseases Information Center: GARD 27812.6.3 International Classification of Diseases, 10th Revision: ICD-10 27912.6.4 Orphanet-INSERM (Institut National de la Santé et de la Recherche Médicale) 28012.6.5 Medical Dictionary for Regulatory Activities: MedDRA 28012.6.6 Medical Subject Headings: MeSH 28112.6.7 Online Mendelian Inheritance in Man: OMIM 28212.6.8 Orphanet Rare Disease Ontology: ORDO 28212.6.9 UMLS: Unified Medical Language System 28212.6.10 SNOMED-CT: Systematized Nomenclature of Human and Veterinary Medicine—Clinical Terms 28312.7 Information Retrieval of Rare Diseases Through a Web Search and Other Methods 28412.7.1 What is Information Retrieval (IR)? 28412.7.2 Listed Below Are Some of the Methods for Information Retrieval 28412.7.2.1 Web Search for a Diagnosis 28412.7.2.2 Cause of Diagnostic Errors in Web-Based Tools 28512.7.2.3 Nonprofessional Use of Web Tool for Diagnosis 28512.7.2.4 Performance of Web Search Tools 28512.7.2.5 Design of Watson 28612.8 Tips and Tricks for Information Retrieval 28712.9 Research on Rare Disease Throughout the World 28812.10 Conclusion 290References 29013 ATYPICAL POINT OF VIEW OF SEMANTIC COMPUTING IN HEALTHCARE 293L. Mayuri and K. M. Mehata13.1 Introduction 29413.2 Mind the Language 29513.2.1 Why Words Matter 29613.2.2 What Words Matter 29613.2.3 How Words Matter 29713.3 Semantic Analytics and Cognitive Computing: Recent Trends 29713.3.1 Semantic Data Analysis 29813.3.2 Semantic Data Integration 29913.3.3 Semantic Applications 30013.4 Semantics-Powered Healthcare SOS Engineering 30213.5 Conclusion 303References 30414 USING ARTIFICIAL INTELLIGENCE TO HELP COVID-19 PATIENTS 309Ayush Hans14.1 Introduction 31014.2 Method 31314.3 Results 31414.4 Discussion 31514.4.1 What is the Use of AI in Healthcare? 31514.4.2 How to Use AI for Critical Care Units 31514.4.2.1 Input Stage 31514.4.2.2 Process Stage 31614.4.2.3 Output Stage 31714.5 Conclusion 320Acknowledgment 321References 321Index 325

Regulärer Preis: 187,99 €
Produktbild für Data Science

Data Science

Data Science ist in vielen Organisationen angekommen und oft alltägliche Praxis. Dennoch stehen viele Verantwortliche vor der Herausforderung, sich erstmalig mit konkreten Fragestellungen zu beschäftigen oder laufende Projekte weiterzuentwickeln. Die Spannbreite der Methoden, Werkzeuge und Anwendungsmöglichkeiten ist sehr groß und entwickelt sich kontinuierlich weiter. Die Vielzahl an Publikationen zu Data Science ist spezialisiert und behandelt fokussiert Einzelaspekte.Das vorliegende Werk gibt den Leserinnen und Lesern eine umfassende Orientierung zum Status Quo aus der wissenschaftlichen Perspektive und zahlreiche vertiefende Darstellungen praxisrelevanter Aspekte. Die Inhalte bauen auf den wissenschaftlichen CAS-Zertifikatskursen zu Big Data und Data Science der Hochschule Niederrhein in Kooperation mit der Hochschule Bonn-Rhein-Sieg und der FH Dortmund auf. Sie berücksichtigen wissenschaftliche Grundlagen und Vertiefungen, aber auch konkrete Erfahrungen aus Data Science Projekten. Das Buch greift praxisrelevante Fragen auf wissenschaftlichem Niveau aus Sicht der Rollen eines „Data Strategist“, „Data Architect“ und „Data Analyst“ auf und bindet erprobte Praxiserfahrungen u. a. von Seminarteilnehmern mit ein. Das Buch gibt für Interessierte einen Einblick in die aktuell relevante Vielfalt der Aspekte zu Data Science bzw. Big Data und liefert Hinweise für die praxisnahe Umsetzung.PROF. DR. DETLEV FRICK ist Professor für BWL, insb. Wirtschaftsinformatik an der Hochschule Niederrhein,PROF. DR. ANDREAS GADATSCH ist Professor für BWL, insb. für Wirtschaftsinformatik an der Hochschule Bonn-Rhein-Sieg,PROFESSOR DR. JENS KAUFMANN ist Professor für Wirtschaftsinformatik, insb. Data Science an der Hochschule Niederrhein,DIPL.-KFF. (FH) BIRGIT LANKES ist Lehrkraft für besondere Aufgaben an der Hochschule Niederrhein,PROF. DR. CHRISTOPH QUIX ist Professor für Wirtschaftsinformatik und Data Science an der Hochschule Niederrhein,ANDREAS SCHMIDT, M.A. ist Wissenschaftlicher Mitarbeiter im Data Innovation Lab der Hochschule Bonn-Rhein-Sieg undPROF. DR. UWE SCHMITZ ist Professor für Wirtschaftsinformatik an der FH Dortmund.Data Strategist: Digitalisierung von Geschäftsmodellen – Big Data Technologien erfolgreich implementieren - Data Architect: Informationsarchitekturen gestalten – Daten effizient verwalten - Data Analyst: Auswerten, Präsentieren, Entscheiden – Systematische Datenanalyse im Unternehmen - Anwendungsorientierte Data Science

Regulärer Preis: 46,00 €
Produktbild für Design Patterns für Machine Learning

Design Patterns für Machine Learning

Entwurfsmuster für Datenaufbereitung Modellbildung und MLOpsDie Design Patterns in diesem Buch zeigen praxiserprobte Lösungen für wiederkehrende Aufgaben im Machine Learning. Die Autor:innen – ML-Experten bei Google – beschreiben Methoden, die Data Scientists helfen, typische Probleme im gesamten ML-Prozess zu bewältigen. Die Entwurfsmuster verdichten die Erfahrungen von Hunderten von Expert:innen zu klar strukturierten, zugänglichen Best Practices. Das Buch bietet detaillierte Erläuterungen zu 30 Mustern für die Daten- und Problemdarstellung, Operationalisierung, Wiederholbarkeit, Reproduzierbarkeit, Flexibilität, Erklärbarkeit und Fairness. Zu jedem Muster erhält man eine Beschreibung des Problems, eine Vielzahl möglicher Lösungen sowie Empfehlungen, welche Technik die beste für Problemstellungen ist. Aus dem Inhalt:Herausforderungen beim Trainieren, Bewerten und Deployen von ML-Modellen erkennen und überwindenDaten für verschiedene ML-Modelltypen mit Einbettungen, Feature Crosses und mehr darstellenden richtigen Modelltyp für bestimmte Fragestellungen auswähleneine robuste Trainingsschleife mit Checkpoints, Verteilungsstrategie und Hyperparameter-Tuning erstellenskalierbare ML-Systeme deployen, die bei erneutem Training aktuelle Daten berücksichtigenModellvorhersagen für Stakeholder interpretierenModellgenauigkeit, Reproduzierbarkeit, Resilienz und Fairness verbessernAutoren:Valliappa Lakshmanan ist Global Head für Datenanalyse und KI-Lösungen bei Google Cloud. Sara Robinson ist Developer Advocate im Google-Cloud-Team, sie ist spezialisiert auf Machine Learning. Michael Munn ist ML Solutions Engineer bei Google. Er unterstützt Kunden bei der Entwicklung, Implementierung und Bereitstellung von Machine-Learning-Modellen.

Regulärer Preis: 35,90 €
Produktbild für Practical Event-Driven Microservices Architecture

Practical Event-Driven Microservices Architecture

In the simplest terms, event-driven architectures are like onions; they are manageable as a single layer (like a monolith) but when you get into them, they begin to cascade apart and you quickly realize that there are many complex layers (distributed microservices architecture). And that’s when the tears begin.This prescriptive guide takes you through the steps of moving a platform with millions of users from a monolith to a microservices event-driven architecture. You will learn about the challenges and complexities that arise in high-throughput environments that often contain upwards of hundreds of microservices. This book is designed to be your single best resource for learning how to apply event-driven architectures in real-world scenarios and offers hundreds of patterns to overcome the common and not so common challenges.While event-driven architectures have been the standard for decoupled, pluggable, evolutionary architectures for years, they have only recently been adopted by enterprises for the purpose of distributed microservices and there is little information about adopting them. Using them at scale can save valuable resources, but requires different considerations, including the added complexity of supporting several moving parts and getting the event schema right from the start in order to avoid large restructuring later on.Author Hugo Rocha understands that these kinds of challenges, as well as many others, need to be considered from the beginning, and helps teach you the mindset needed to create a deliberate strategy upfront. This book offers learning approaches and patterns to get you up to speed in order to sustainably build and manage event-driven architectures.WHAT YOU WILL LEARN* Understand the real-world challenges of event-driven architectures and the patterns to deal with those challenges and the trade-offs of each solution* Leverage the advantages of event-driven architectures to build scalable solutions and address legacy applications* Plan successful future implementations to avoid common pitfalls and apply proven patterns to deal with challenges in a real-world platform with millions of users* Decide whether event-driven solutions are the right choice for the requirements at hand* Discuss and understand advanced concepts about event-driven architecturesWHO IS THIS BOOK FORSoftware engineers and software architects. Anyone currently working with microservice architectures, primarily event-driven microservices, will greatly benefit from this book. Readers working with monoliths will benefit, as the book explores migration from a monolithic application to an event-driven microservice architecture.HUGO ROCHA has nearly a decade of experience working with highly distributed event-driven microservices architectures. He currently is an engineering lead for the leading global ecommerce platform for luxury products (Farfetch), providing services to millions of active users, backed by an event-driven architecture with hundreds of microservices processing hundreds of changes per second. Before that, he worked for several reference telecommunications companies that transitioned from monolithic applications to microservice-oriented architectures. Hugo has managed several teams that directly face the caveats of event-driven architectures every day. He designed solutions for critical pieces of the platform’s highly distributed backoffice platform, handling hundreds of changes per second, concurrently, scalably, and with high performance.CHAPTER 1. EMBRACING EVENT-DRIVEN ARCHITECTURES1.1. The truth about monoliths1.1.1. Anatomy of a typical monolith1.1.2. It's not all bad1.1.3. When monoliths become the business constrictor knot1.1.4. Using event-driven architectures to move away from a monolith1.2. What are microservices and how do they relate to event-driven1.3. SOA, microservice, and event-driven architectures1.4. The promise of event-driven microservices1.5. When should you use event-driven microservices?1.6. Overview of the challenges in event-driven architectures1.7. SummaryCHAPTER 2. MOVING FROM A MONOLITH TO AN EVENT-DRIVEN ARCHITECTURE2.1. Is migrating to an event-driven architecture your best option?2.2. How to decide where to start2.3. Using an event-driven approach to migrate data2.4. Using change data capture (CDC)2.4.1. Event-driven and change data capture (CDC), a real-world example2.5. Event-driven as a source of truth for both systems2.6. Managing dependencies between the two systems2.6.1. Dependency from new event-driven services to the monolith2.6.2. Dependency from the monolith to new event-driven services2.7. Gradually moving traffic2.8. Two-way synchronization and living with two sources of truth2.9. SummaryCHAPTER 3. DEFINING AN EVENT-DRIVEN MICROSERVICE AND ITS BOUNDARIES3.1. Building event-driven microservices3.1.1. Durable vs. ephemeral message brokers and GDPR3.1.2. Message types3.1.3. When to use documents over events3.1.4. Common event-driven messaging patterns3.1.5. Event-driven service topologies3.1.6. Common event-driven pitfalls and anti-patterns3.2. Organizing event-driven microservice boundaries3.3. Brief and practical introduction to domain-driven design and bounded contexts3.4. The impact of aggregate size and common pitfalls3.5. Request-driven vs. event-driven services3.6. Adding functionality to an existing microservice vs. creating a new one3.7. SummaryCHAPTER 4. EVENT-DRIVEN STRUCTURAL PATTERNS AND HIGH-LEVEL PROCESSES4.1. The challenges of transactional consistency in distributed systems4.1.1. Why abandon a monolithic database in the first place?4.1.2. The limitations of distributed transactions4.1.3. Managing multi-step processes with Sagas4.2. Event-driven orchestration pattern4.3. Event-driven choreography pattern4.4. Orchestration, choreography, or both?4.5. Data retrieval in event-driven architectures and associated patterns4.5.1. CQS, CQRS and when to use them4.5.2. The different flavors of CQRS4.5.3. When and how to use event sourcing4.5.4. Using command sourcing and its applicability4.6. Building multiple read models4.7. The pitfall of microservice spaghetti architectures and how to avoid it4.8. SummaryCHAPTER 5. HOW TO MANAGE EVENTUAL CONSISTENCY5.1. The impacts of eventual consistency and the need for alignment with the business5.2. Using event schema to leverage eventual consistency5.3. Applying domain boundaries to leverage eventual consistency5.4. Event versioning to manage delays5.5. Saving state to avoid eventual consistency5.6. End-to-end argument: a real-world use case5.7. For most use cases, it's not eventual if nobody notices5.7.1. Autoscaling use case with Prometheus and Kafka5.8. Tradeoffs of each solution5.9. SummaryCHAPTER 6. DEALING WITH EVENT-DRIVEN CONCURRENCY AND OUT OF ORDER MESSAGES6.1. Why is concurrency different in a monolith from an event-driven architecture?6.2. Pessimistic vs. optimistic concurrency, when and when not to use6.2.1. Pessimistic vs. optimistic approaches6.2.2. Solving concurrency by implementation and by architecture6.3. Using optimistic concurrency6.4. Using pessimistic concurrency6.4.1. Distributed locks6.4.2. Database transactions6.5. Dealing with out-of-order events6.5.1. How can events lose their order?6.5.2. Solving out of order events with versioning6.6. Using end-to-end message partitioning to handle concurrency and guarantee message ordering6.6.1. The relevance of message routing and partitioning6.6.2. Real-world example of message routing using Kafka6.6.3. Using end-to-end partitioning6.6.4. Limitations of end-to-end partitioning6.7. SummaryCHAPTER 7. ACHIEVING RESILIENCE AND EVENT PROCESSING RELIABILITY IN EVENT-DRIVEN MICROSERVICES7.1. Common failures in microservice architectures and how they relate to event-driven architectures7.1.1. Cascading failures and event-driven services7.1.2. Load balancing and rate limiters in event-driven services7.2. Understanding message delivery semantics7.3. Avoiding inconsistencies when saving state and publishing events7.3.1. Event stream as the only source of truth7.3.2. Outbox pattern7.3.3. Transactions and compensating actions7.4. Applying ACID 2.0 as a resilience strategy7.5. Avoiding message leak7.6. Applying common resilience patterns7.6.1. Retries7.6.2. Circuit breakers7.7. Recovering data and repairing state7.8. Bulkhead pattern7.9. SummaryCHAPTER 8. CHOOSING THE CORRECT EVENT SCHEMA DESIGN8.1. Event storming8.2. Event headers and envelopes8.2.1. Headers vs envelopes8.2.2. Relevant event contextual information8.3. Town crier events8.4. Bee events8.5. The event schema goldilocks principle8.6. Denormalized event schema8.7. Schema evolution8.7.1. Event stream versioning8.7.2. Using a downscaler/upscaler8.8. SummaryCHAPTER 9. HOW TO LEVERAGE THE USER INTERFACE9.1. Using an aggregating layer9.2. Backends for frontends9.3. UI Decomposition9.3.1. Application decomposition9.3.2. Page decomposition9.3.3. Section decomposition9.4. The limitations of API composition9.5. Task-based UIs9.6. Event-driven APIs9.7. SummaryCHAPTER 10. OVERCOMING THE CHALLENGES IN QUALITY ASSURANCE10.1. The only happens in production syndrome10.2. Component tests vs integration tests10.3. The correct mix of component validation and production validations10.4. Monitoring and alarmistic from the ground up10.5. SummaryCHAPTER 11. ORGANIZATIONAL COST OF EVENT-DRIVEN MICROSERVICES11.1. The epic journey to be onboarded11.2. When implementation overhead impacts time to market11.3. Dependencies management11.4. Summary

Regulärer Preis: 66,99 €
Produktbild für Leadership im Produktmanagement

Leadership im Produktmanagement

Pflichtlektüre für angehende und erfahrene Produktmanager:innen»Leadership im Produktmanagement« hilft, ein besserer Product Owner zu werden. Von Roman Pichlers umfangreicher Erfahrung profitieren und lernen, Stakeholder auf gemeinsame Ziele auszurichten und Entwicklungsteams auch unter herausfordernden Umständen zu führen, häufige Führungsfehler vermeiden und als Führungskraft wachsen.In einem ansprechenden und leicht verständlichen Stil geschrieben, bietet dieses Buch eine Fülle von praktischen Tipps und Strategien. Durch hilfreiche Beispiele veranschaulicht das Buch, wie Sie die Techniken direkt auf Ihre Arbeit anwenden können.Der Inhalt umfasst:Den passenden Leadership-Stil wählen und Empathiefähigkeit stärkenVertrauensvolle Partnerschaften mit Stakeholdern, Entwicklungsteam und Scrum Master etablierenDie richtigen produktbezogenen Ziele setzenEffektiv kommunizieren: aktives Zuhören und bewusstes SprechenEntscheidungen treffen, die von den Mitarbeitenden mitgetragen und umgesetzt werdenKonflikte nachhaltig lösenEntscheidungen treffen und die Zustimmung der Stakeholder sichernSich selbst bewusst führen: Achtsamkeit, Growth Mindset und Zeitmanagement

Regulärer Preis: 24,90 €
Produktbild für Entwurfsmuster von Kopf bis Fuß

Entwurfsmuster von Kopf bis Fuß

JETZT AKTUALISIERT UND ERWEITERT: DAS STANDARDWERK ZU ENTWURFSMUSTERN * »Dieses Buch vereint Spaß, herzhaftes Lachen, profundes technisches Verständnis und geniale Praxistipps zu einem denkwürdigen Lesegenuss.« Richard Helm, Gang of Four * Softwareentwickler wollen das Rad nicht neu erfinden: Mit Entwurfsmustern können Sie von den Erfahrungen und Best Practices anderer profitieren * Die Design Patterns werden detailliert und verständlich erklärt, inklusive Herleitung und geeigneten Anwendungsfällen Dieses Buch ist ein moderner Klassiker zum Thema Entwurfsmuster. Mit dem einzigartigen Von-Kopf-bis-Fuß-Lernkonzept gelingt es den Autoren, die anspruchsvolle Materie witzig, leicht verständlich und dennoch gründlich darzustellen. Jede Seite ist ein Kunstwerk für sich, mit vielen visuellen Überraschungen, originellen Comic-Zeichnungen, humorvollen Dialogen und geistreichen Selbstlernkontrollen. Spätestens, wenn es heißt "Spitzen Sie Ihren Bleistift", wird Leser:innen klar, dass bei diesem Buch Mitmachen gefragt ist. Das ist nicht nur unterhaltsam, sondern auch effektiv: Komplexe Sachverhalte lassen sich nach Erkenntnis der modernen Lernwissenschaft am gründlichsten über mehrere verschiedene Kanäle verstehen. Das Buch verspricht Ihnen daher nicht nur Spaß beim Lernen, Sie werden nach der Lektüre auch die Herausforderungen des Softwaredesigns meistern können.

Regulärer Preis: 49,90 €
Produktbild für Architekturen für BI & Analytics

Architekturen für BI & Analytics

Konzepte, Technologien und Anwendung - Erstauflage aus November 2021.Sowohl regulatorische Vorgaben als auch gesteigerte Anforderungen seitens der Fachanwender haben in den letzten Jahren zu immer komplexeren Business-Intelligence- und Analytics-Landschaften geführt, die es zu entwickeln und betreiben gilt. So setzt sich eine heute übliche Architektur aus zahlreichen Einzelkomponenten zusammen, deren Zusammenspiel und funktionale Abdeckung als wesentlicher Erfolgsfaktor für zugehörige BIA-Initiativen zu werten ist.»Architekturen für Business Intelligence & Analytics« setzt sich das Ziel, die derzeit gebräuchlichen Architekturmuster zu beschreiben und dabei einen Überblick über die aktuell verwendeten Technologien zu liefern. Dabei werden nicht nur die architektonischen Frameworks der großen Produktanbieter aufgegriffen, sondern darüber hinaus Lösungen für konkrete Anwendungsfälle präsentiert. Im Einzelnen werden behandelt:Anforderungen an eine ganzheitliche BIA-ArchitekturArchitekturen und Technologien für Data LakesDatenzugriffsstrategien für AnalyticsEnterprise Application IntegrationCloud-Konzepte und -ArchitekturenEinfluss regulatorischer AnforderungenDatenvirtualisierungBIA-Architekturen für KMU Das Buch vermittelt wertvolle Einblicke und hilfreiche Anregungen für die erfolgreiche Konzeptionierung und Realisierung von BIA-Ökosystemen und -Landschaften in der Praxis. Zielgruppe:Business-Intelligence-Manager*innenDaten- und InformationsverantwortlicheProjektleiter*innenStudierende der Informatik und Wirtschaftsinformatik Autoren:Prof. Dr. Peter Gluchowski leitet den Lehrstuhl für Wirtschaftsinformatik, insb. Systementwicklung und Anwendungssysteme, an der Technischen Universität in Chemnitz und konzentriert sich dort mit seinen Forschungsaktivitäten auf das Themengebiet Business Intelligence & Analytics. Er beschäftigt sich seit mehr als 25 Jahren mit Fragestellungen, die den praktischen Aufbau dispositiver bzw. analytischer Systeme zur Entscheidungsunterstützung betreffen. Seine Erfahrungen aus unterschiedlichsten Praxisprojekten sind in zahlreichen Veröffentlichungen zu diesem Themenkreis dokumentiert. ‪Frank Leisten ist passionierter Berater für datengetriebene Vorhaben mit modernen Technologien. Seine Expertise in den Funktionen des Datenmanagements sowie jahrelange Praxiserfahrung in verschiedenen IT-Domänen und Rollen kommen seinen Kunden bei der Orchestrierung sowie der kulturellen und strategischen Entwicklung ihrer Transformationen zugute. ‪Dr. Gero Presser ist Mitgründer und Geschäftsführer bei der QuinScape GmbH, einem Dortmunder IT-Dienstleistungsunternehmen mit 170 Mitarbeitern und Fokus auf Data & Analytics. Er organisiert die Meetup-Gruppe „Business Intelligence & Analytics Dortmund“ mit über 1.000 Mitgliedern und ist Vorsitzender des TDWI Roundtable Ruhrgebiet.

Regulärer Preis: 59,90 €
Produktbild für Entwurfsmuster von Kopf bis Fuß (2. Auflg.)

Entwurfsmuster von Kopf bis Fuß (2. Auflg.)

Mit Design Patterns flexible objektorientierte Software erstellen. Worum geht es in diesem Buch? Entwurfsmustern bieten die geballte Erfahrung von Entwicklern, die elegante, übertragbare Lösungen für typische Herausforderungen des Softwaredesigns gefunden haben. Dieses Buch zeigt auf spielerische, visuell abwechslungsreiche Art bewährte Muster, mit denen man flexible Software entwerfen kann. Es zeigt, auf welche Muster es ankommt, wie diese für eigene Designs eingesetzt werden können und auf welchen objektorientierten Entwurfsprinzipien sie beruhen. Mit diesem modernen Klassiker werden Sie – wie schon Hunderttausende Entwicklern vor Ihnen – Ihr Wissen über Softwaredesign entscheidend verbessern. Wieso sieht dieses Buch so anders aus? Das Buch ist ein Workbook mit zahlreichen visuellen Überraschungen, das Spaß macht und auf die Arbeitsweise Ihres Gehirns zugeschnitten ist: Statt einschläfernder Bleiwüsten werden verschiedenste Textformen und Selbstlernkontrollen verwendet, die Ihnen das Wissen direkt ins Hirn spielen. Spätestens, wenn es heißt »Spitzen Sie Ihren Bleistift«, wird klar, dass hier Mitmachen gefragt ist. Zielgruppe: Programmierer*innenStudent*innenSoftwareentwickler*innen Autoren: Eric Freeman ist Informatiker, Technologieautor, Unternehmer und ehemaliger CTO der Walt Disney Company. Er hat einen Doktortitel in Informatik von der Yale University. Aktuell ist er Kodirektor der Head-First-Reihe, die in Deutschland als Von-Kopf-bis-Fuß-Reihe bekannt ist. Bei der von ihm mitgegründeten Online-Lernplattform WickedlySmart widmet er seine Zeit der Erstellung von Print- und Video-Inhalten, die über die führenden Bildungskanäle vertrieben werden. Eric lebt in Austin, Texas. Elisabeth Robson ist Softwareentwicklerin, Autorin und IT-Trainerin. Seit ihren Studententagen an der Yale University, wo sie ihren Master in Informatik erworben hat, ist sie mit Leib und Seele Informatikerin. Sie ist Mitbegründerin von WickedlySmart, einer Online-Lernplattform für Softwareentwickler:innen, für die sie Bücher, Artikel und Videos erstellt. Zuvor hat sie als Director of Special Projects bei O’Reilly Media Präsenz-Workshops und Onlinekurse zu einer Vielzahl von technischen Themen gestaltet.

Regulärer Preis: 49,90 €
Produktbild für Mastering VMware Horizon 8

Mastering VMware Horizon 8

Learn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual desktops using Horizon. This book allows you to follow the complete process for deploying VMware Horizon and covers the design, deployment, and management of solutions.You'll start by reviewing remote solutions, from virtual desktops to published applications, including the benefits and what the different solutions deliver. Once through the high-level technology you'll then look at the VMware Horizon solution focusing on the architecture and the components that make up the solution and how to design a production-ready environment. Other VMware EUC technologies that complement the core Horizon solution will also be incorporate into it.Armed with the knowledge of how to design a solution, you'll move onto the installation phase and start to build a test lab environment. Once your lab is installed, you'll move onto the configuration stage where you will understand how to build, configure, and optimize virtual desktops, and desktop pools ready for end-users to use. As part of this you will also look at delivering published applications with Horizon Apps.With resources built and configured you can optimize the end-user experience with Horizon clients. The final sections of the book will focus on the other complementary solutions introducing you to VMware App Volumes and VMware Dynamic Environment Manager before finishing with how to manage the solution where we will look at some advanced configuration options and troubleshooting techniques.WHAT YOU WILL LEARN* See the core components of VMware Horizon and their functionality* Design and install a Horizon environment* Deliver the best end-user experience* Manage the deployed solution* Use VMware reference architectures to create real-life scenario examples* Review the minimum requirements for designing a solutionWHO THIS BOOK IS FORVMware professionals, system integrators, IT professionals, and consultants.PETER VON OVEN is an experienced technical consultant working closely with customers and partners designing technology solutions, to meet business needs. During his career, Peter has presented at key IT events such as VMworld, IP EXPO, and various VMUGs and CCUG events. He has also worked in senior presales roles and presales management roles for Fujitsu, HP, Citrix, and VMware, and has been awarded VMware vExpert for the last six years in a row. In 2016, Peter founded his own company, Droplet Computing, where he works today as the founder and chief executive officer, helping redefine the way applications are delivered today. He is also an avid author, having now written 13 books and made videos about VMware end-user computing solutions. In his spare time, Peter volunteers as a STEM Ambassador, helping the next generation develop the skills and confidence in building careers in technology.Chapter 1: What Are Remote Desktop Solutions?Chapter 2: Getting Started with VMware HorizonChapter 3: Architecting Horizon for DeploymentChapter 4: Installing and Configuring Your Horizon EnvironmentChapter 5: Creating Virtual Desktop Images for DeploymentChapter 6: Building and Configuring Desktop PoolsChapter 7: Managing Horizon with Active Directory GPOsChapter 8: Horizon Computer GPOs Settings (split from chapter 7)Chapter 9: Horizon User GPO Settings (split from chapter 7)Chapter 10: Managing the End User Environments (former chapter 8)Chapter 11: Horizon Apps (former chapter 9)Chapter 12: Horizon Published Desktop (former chapter 10)Chapter 13: Connecting End Users (former chapter 11)Chapter 14: Horizon Enterprise Edition (former chapter 12)Chapter 15: Upgrading Horizon (former chapter 13)Chapter 16: Running Horizon in the Cloud (former chapter 14)Chapter 17: Horizon Troubleshooting (former chapter 15)Online Resource: Advanced Configuration and Management (former chapter 16)

Regulärer Preis: 66,99 €
Produktbild für Solving the Riddle of Microsoft and Your Computer

Solving the Riddle of Microsoft and Your Computer

Solving the Riddle of Microsoft and Your Computer provides easy to follow step by step instructions.Chapter one provides some useful facts about your computer. This Chapter describes such things as how to operate your mouse; how to modify your screen saver and printer settings; options for printing files; how to use different functions of the calculator; playing and storing music; using Snipping Tool to capture images; determining amount of Radom Access Memory (RAM) is on your computer; determining your computer name; how to use Microsoft Excel to keep track of financial transactions.Chapter two discusses how to use Microsoft File Explorer. I refer to File Explorer as the electronic filing cabinet. This chapter provides a description of the drives in your computer; how to create top level and sub-folders in your C-Drive also known as the hard drive; how to find files in File Explorer; copying files from the C-Drive and changing properties on files.Chapter three is the real meat of this book. It provides detailed information on the most useful Microsoft Word functions. You will learn how to use pull down menus to include (Find, Replace, Tracking Changes, Accepting or Rejecting Changes, saving files, Print Preview, Printing, inserting Headers and Footers); additional topics on cover pages, inserting blank pages, inserting page breaks, inserting tables and inserting pictures; next you will learn how to adjust margins, adjust orientation, adjusting size of paper, inserting columns, inserting page and section breaks, how to vertical line numbers; an in depth discussion concerning interactive table of contents; other useful tools include inserting symbols, inserting footnotes, inserting text boxes, inserting other files into Word, how to use Format Painter, description of formatting fonts and how to insert splits in Word.

Regulärer Preis: 3,49 €
Produktbild für Knowledge Graphs

Knowledge Graphs

This book provides a comprehensive and accessible introduction to knowledge graphs, which have recently garnered notable attention from both industry and academia. Knowledge graphs are founded on the principle of applying a graph-based abstraction to data, and are now broadly deployed in scenarios that require integrating and extracting value from multiple, diverse sources of data at large scale. The book defines knowledge graphs and provides a high-level overview of how they are used. It presents and contrasts popular graph models that are commonly used to represent data as graphs, and the languages by which they can be queried before describing how the resulting data graph can be enhanced with notions of schema, identity, and context. The book discusses how ontologies and rules can be used to encode knowledge as well as how inductive techniques—based on statistics, graph analytics, machine learning, etc.—can be used to encode and extract knowledge. It covers techniques for the creation, enrichment, assessment, and refinement of knowledge graphs and surveys recent open and enterprise knowledge graphs and the industries or applications within which they have been most widely adopted. The book closes by discussing the current limitations and future directions along which knowledge graphs are likely to evolve. This book is aimed at students, researchers, and practitioners who wish to learn more about knowledge graphs and how they facilitate extracting value from diverse data at large scale. To make the book accessible for newcomers, running examples and graphical notation are used throughout. Formal definitions and extensive references are also provided for those who opt to delve more deeply into specific topics. * Preface * Acknowledgments * Introduction * Data Graphs * Schema, Identity, and Context * Deductive Knowledge * Inductive Knowledge * Creation and Enrichment * Quality Assessment * Refinement * Publication * Knowledge Graphs in Practice * Conclusions * Bibliography * Authors' Biographies

Regulärer Preis: 72,99 €
Produktbild für Prinzipien des Softwaredesigns

Prinzipien des Softwaredesigns

Entwurfsstrategien für komplexe SystemeDie Prinzipien guten Softwaredesigns zu verstehen, hält John Ousterhout für eine Schlüsselqualifikation in der Softwareentwicklung. Sein Buch gibt Impulse für eine anregende und notwendige Diskussion und bietet praxistaugliche Hilfestellungen für gute Designentscheidungen. Ausgehend von der Frage »Wie können wir die Komplexität in großen Softwaresystemen reduzieren und managen?« arbeitet John Ousterhout Prinzipien für das Softwaredesign heraus, die als Leitlinie für den gesamten Softwareentwicklungsprozess dienen können. Ousterhout stellt Überzeugungen infrage, die weit verbreitet sind: Er rät davon ab, die Anzahl der Codezeilen einer Methode oder Klasse als Gradmesser für die Komplexität von Software zu verstehen, und plädiert dafür, sich auf ihre »Tiefe« zu konzentrieren – wie gut sie also Komplexität verstecken. Und während viele Entwicklerinnen und Entwickler meinen, dass sich gut geschriebene Programme von selbst dokumentierten, zeigt Ousterhout, wie essenziell Kommentare sind: Das Schreiben guter Kommentare ermöglicht Abstraktion, und es wird zu besserem Softwaredesign führen.Zielgruppe:Softwareentwickler*innenProgrammierendeSoftwarearchitekt*innenAutor:John Ousterhout ist Professor für Informatik an der Stanford University. Er hat die Entwicklung weit verbreiteter Softwaresysteme wie Raft, Tcl/Tk, Sprite und Magic geleitet und eigene Unternehmen gegründet. Er ist Mitglied der National Academy of Engineering und erhielt zahlreiche Auszeichnungen wie den U.C. Berkeley Distinguished Teaching Award.Aus dem Inhalt:Wie man komplexe Systeme in möglichst unabhängige Module mit einfachen Schnittstellen zerlegen kannWie Spezialisierung in Modulen zu vermeiden istWie man die Anzahl der Stellen im Code minimieren kann, an denen Exceptions behandelt werden müssenWie Kommentare und gut gewählte Namen genutzt werden können, um den Code verständlicher zu machenWie es zu vermeiden ist, dass sich Komplexität einschleicht, wenn Systeme sich weiterentwickelnWelche Warnhinweise darauf hindeuten, dass Designentscheidungen überprüft werden sollten

Regulärer Preis: 24,90 €
Produktbild für Learn to Program with Assembly

Learn to Program with Assembly

Many programmers have limited effectiveness because they don't have a deep understanding of how their computer actually works under the hood. In Learn to Program with Assembly, you will learn to program in assembly language - the language of the computer itself.Assembly language is often thought of as a difficult and arcane subject. However, author Jonathan Bartlett presents the material in a way that works just as well for first-time programmers as for long-time professionals. Whether this is your first programming book ever or you are a professional wanting to deepen your understanding of the computer you are working with, this book is for you. The book teaches 64-bit x86 assembly language running on the Linux operating system. However, even if you are not running Linux, a provided Docker image will allow you to use a Mac or Windows computer as well.The book starts with extremely simple programs to help you get your grounding, going steadily deeper with each chapter. At the end of the first section, you will be familiar with most of the basic instructions available on the processor that you will need for any task. The second part deals with interactions with the operating system. It shows how to make calls to the standard library, how to make direct system calls to the kernel, how to write your own library code, and how to work with memory. The third part shows how modern programming language features such as exception handling, object-oriented programming, and garbage collection work at the assembly language level.Additionally, the book comes with several appendices covering various topics such as running the debugger, vector processing, optimization principles, a list of common instructions, and other important subjects.This book is the 64-bit successor to Jonathan Bartlett's previous book, Programming from the Ground Up, which has been a programming classic for more than 15 years. This book covers similar ground but with modern 64-bit processors, and also includes a lot more information about how high level programming language features are implemented in assembly language.WHAT YOU WILL LEARN* How the processor operates * How computers represent data internally * How programs interact with the operating system* How to write and use dynamic code libraries* How high-level programming languages implement their features WHO THIS BOOK IS FORAnyone who wants to know how their computer really works under the hood, including first time programmers, students, and professionals.JONATHAN BARTLETT is a software developer, researcher, and writer. His first book, Programming from the Ground Up, has been required reading in computer science programs from DeVry to Princeton. He has been the sole or lead author for eight books on topics ranging from computer programming to calculus. He is a technical lead for ITX, where his specialty is getting stuck projects unstuck.Chapter 1: IntroductionChapter 2: The Truth About ComputersPart I: Assembly Language BasicsChapter 3: Your First ProgramChapter 4: Registers and Simple ArithmeticChapter 5: Comparison, Branching and LoopingChapter 6: Working with Data in MemoryChapter 7: Data RecordsChapter 8: Signed Numbers and Bitwise OperationsChapter 9: More Instructions You Should KnowPart II: Operating System BasicsChapter 10: Making System CallsChapter 11: The Stack and Function CallsChapter 12: Calling Functions from LibrariesChapter 13: Common and Useful Assembler DirectivesChapter 14: Dynamic Memory AllocationChapter 15: Dynamic LinkingPart III: Programming Language TopicsChapter 16: Basic Language Features Represented in Assembly LanguageChapter 17: Tracking Memory AllocationsChapter 18: Object-Oriented ProgrammingChapter 19: Conclusion and AcknowlegmentsPart IV: AppendicesAppendix A: Getting Set Up with DockerAppendix B: The Command LineAppendix C: Debugging with GDBAppendix D: Nasm (Intel) Assembly Language SyntaxAppendix E: Common x86-64 InstructionsAppendix F: Floating Point NumbersAppendix G: The Starting State of the StackAppendix H: ASCII, Unicode, and UTF-8Appendix I: OptimizationAppendix J: A Simplified Garbage CollectorAppendix K: Going to an Even Lower Level

Regulärer Preis: 62,99 €
Produktbild für Running ESXi on a Raspberry Pi

Running ESXi on a Raspberry Pi

Gain foundational knowledge of ESXi technology and understand why it is such a dominant force in the datacenter. This book also looks beyond ESXi to other vSphere technologies, such as virtual machines (VMs), vMotion, and vCenter Server.Knowing how these technologies complement ESXi running on a Raspberry Pi will help you get the most out of ESXi on Arm technologies. This marks a significant change for ESXi, and has created new learning opportunities and use cases for both seasoned ESXi users and users completely new to the virtualization space. For those already familiar with ESXi but new to the Raspberry Pi, you’ll develop an in-depth understanding of this device and why it has become such a popular platform for technologists.Once you’ve learned the fundamentals, you’ll be introduced to enterprise, edge, and personal use-cases for this technology. Then, you’ll be walked through the process of installing ESXi on a Pi, as well as managing and monitoring it. You will also come to recognize its strengths and limitations and become familiar with the storage and networking options that are currently available. Lastly, given the fact that the sole purpose of running ESXi on a Pi is to run VMs on it, you’ll receive detailed step-by-step instructions for installing popular OSes including Ubuntu, CentOS, and Raspberry Pi OS.WHAT YOU'LL LEARN* Build a fully functional ESXi server on a Raspberry Pi* Select the correct hardware for particular use cases* Create and optimize virtual machines running on a Pi* Run Kubernetes on a Pi running ESXiWHO THIS BOOK IS FORThose new to the datacenter who want a low-cost way to work with one of the most powerful datacenter technologies to experienced datacenter professionals who need to use ESXi on Arm to complement their enterprise’s long-term strategic goals.TOM FENTON has worked with virtualization for over two decades. He’s held staff and senior-level positions at VMware, IBM, ControlUp, and other high-tech companies. He wrote the first training course for Horizon, VMware’s virtual desktop product. He is a frequent contributor to StorageReview.com, Virtualization & Cloud Review magazine, and other blogs and websites. He lives in the Pacific Northwest and enjoys skiing, snowboarding, hiking, and trail riding. Chapter 1: ESXi on Arm on PiAbout This BookWhat You’ll Learn About ESXi on Arm on PiWho This Book Is ForIntroduction to ESXi on Arm on PiIntroduction to Virtual MachinesIntroduction to ESXiIntroduction to ArmIntroduction to PiIntroduction to ESXi on Arm on PiLimitations on Using a Pi for ESXiExecutablesPi HardwareStorageRAMNICLicensing ESXi on ArmChapter 2: ESXi on Arm on Pi Use CasesLearning EnvironmentCorporate sandboxHome LabHome AssistantGame ServerLightweight VDI HostWeb DevelopmentEdge ServervSAN WitnessMicro vSphere ClusterFirewall for Small OfficeAutomation environment for PowerCLI and Terraform and packerKubernetesChapter 3: ESXi on Arm on Pi Build KitsRequirementsLow-Cost Naked BuildArgon One KitArgon One Kit M.2Argon One Kit Expansion BoardCluster Build 1Chapter 4: Installing ESXi on a PiHardware PreparationInstall Pi on microSD cardUpdate Pi eepromPrep microSD with UEFIInstall ESXi on the ArmModify Pi boot orderPost Installation ConfigurationChapter 5: ESXi Client for ManagementInstalling the ClientManaging ESXi using the ESXi ClientCreating a Virtual MachineMonitoring ESXi using the ESXi ClientGoing furtherChapter 6: vCenter Server for ManagementIntroduction to vCenter ServerInstalling the vCenter Server on x64 ESXiInstalling the vCenter Server on VMware WorkstationManaging ESXi using vCenter ServerCreating a Virtual MachineMonitoring ESXiChapter 7: Storage Options for ESXi on a PiDatastoresNFSiSCSILocal StorageThumb drivesSATA HDDSATA SSDNVMe in EncloserPerformance Comparison of Storage OptionsChapter 8: Virtual Machines on ESXiVirtual MachinesVMware ToolsvMotionCloning virtual machinesWhy Windows will Not WorkUbuntuRed HatSUSEFreeBSDChapter 9: Kubernetes on ESXiInstalling K3sSample KChapter 10: Going Further3rd Party Monitoring – Grafana3rd Party Monitoring - ControlUpStateless ESXi on ArmAdditional NICsHigh Availability and ESXivSphere Distributed SwitchConclusion

Regulärer Preis: 56,99 €
Produktbild für Web App Development and Real-Time Web Analytics with Python

Web App Development and Real-Time Web Analytics with Python

Learn to develop and deploy dashboards as web apps using the Python programming language, and how to integrate algorithms into web apps.Author Tshepo Chris Nokeri begins by introducing you to the basics of constructing and styling static and interactive charts and tables before exploring the basics of HTML, CSS, and Bootstrap, including an approach to building web pages with HTML. From there, he’ll show you the key Python web frameworks and techniques for building web apps with them. You’ll then see how to style web apps and incorporate themes, including interactive charts and tables to build dashboards, followed by a walkthrough of creating URL routes and securing web apps. You’ll then progress to more advanced topics, like building machine learning algorithms and integrating them into a web app. The book concludes with a demonstration of how to deploy web apps in prevalent cloud platforms.Web App Development and Real-Time Web Analytics with Python is ideal for intermediate data scientists, machine learning engineers, and web developers, who have little or no knowledge about building web apps that implement bootstrap technologies. After completing this book, you will have the knowledge necessary to create added value for your organization, as you will understand how to link front-end and back-end development, including machine learning.WHAT YOU WILL LEARN* Create interactive graphs and render static graphs into interactive ones* Understand the essentials of HTML, CSS, and Bootstrap* Gain insight into the key Python web frameworks, and how to develop web applications using themDevelop machine learning algorithms and integrate them into web apps * Secure web apps and deploy them to cloud platformsWHO THIS BOOK IS FORIntermediate data scientists, machine learning engineers, and web developers. Tshepo Chris Nokeri harnesses big data, advanced analytics, and artificial intelligence to foster innovation and optimize business performance. In his functional work, he has delivered complex solutions to companies in the mining, petroleum, and manufacturing industries. He initially completed a bachelor’s degree in information management. He then graduated with an honors degree in business science at the University of the Witwatersrand on a TATA prestigious scholarship and a Wits Postgraduate Merit Award. They unanimously awarded him the Oxford University Press Prize. He has authored the Apress book Data Science Revealed and Implementing Machine Learning for Finance. Chapter 1: Static 2D and 3D GraphsChapter Goal: This chapter introduces the basics of tabulating data and constructing staticgraphical representations. To begin with, it exhibits an approach of extracting and tabulating data by implementing the pandas and sqlalchemy library. Subsequently, it reveals a prevalent 2D and 3D charting recognized as Matplotlib, then exhibits a technique of constructing basic charts (i.e. box-whisker plot, histogram, line plot, and scatter plot).● Tabulating Data● 2D Chartingo Box-whisker-ploto Histogramo Line ploto Scatter ploto Density Plot● 3D Charting● ConclusionChapter 2: Interactive ChartingChapter Goal: This chapter introduces an approach for constructing interactive charts byimplementing the most prevalent library, recognized as Plotly.● Plotly● 2D Chartingo Box-whisker-ploto Histogramo Line ploto Scatter ploto Density Ploto Bar Charto Pie Charto Sunburst● 3D Charting● ConclusionChapter 3: Containing functionality in Interactive GraphsChapter Goal: This chapter extends to the preceding chapter. It introduces an approach toupdating interactive graphs to improve user experience. For instance, you will learn how to add buttons and range sliders, among other functionalities. Besides that, it exhibits an approach for integrating innumerable graphs into one graph with some functionality.● Updating Graph Layout● Updating Plotly Axes● Including Range Slider● Including Buttons to a Graph● Styling Interactive Graphs● Updating Plotly X-Axis● Color Sequencing● Subplots● ConclusionsChapter 4: Essentials of HTMLChapter Goal: This chapter introduces the most prevalent markup language for developingwebsites. It acquaints you with the essentials of designing websites. Besides that, it contains a richset of code and examples to support you in getting started with coding using HTML.● The Communication between a Web Browser and Web Server● Domain Hostingo Shared Hostingo Managed Hosting● HyperText Markup Languageo HTML Elements▪ Headings▪ Paragraphs▪ Div▪ Span▪ Buttons▪ Text Box▪ Input▪ File Upload▪ Label▪ Form▪ Meta Tag● Practical Example● ConclusionChapter 5: Python Web Frameworks and ApplicationsChapter Goal: The preceding chapter acquainted you with interactive visualization using Plotly. This chapter introduces key Python web frameworks (i.e., flask and dash) and how they differ.Besides that, it provides practical examples and helps you get started with Python web development.● Web Frameworks● Web Applications● Flasko WSGIo Werkzeugo Jinjao Installing Flasko Initializing a Flask Web Applicationo Flask Application Codeo Deploy a Flask Web Application● Dasho Installing Dash Dependencieso Initializing a Dash Web Applicationo Dash Application Codeo Deploy a Dash Web Application● Jupyter Dash● ConclusionChapter 6: Dash Bootstrap ComponentsChapter Goal: This chapter covers dash_bootstrap_component. It is a Python library from the Plotly family, which enables us to have key bootstrap functionalities on a dash web application, thussimplifying the web application development.● Dash Bootstrap Components (cont.)o Number Inputo Text Areaso Selecto Radio Itemso Checklisto Switcheso Tabso Buttono Table● ConclusionChapter 7: Styling and ThemingChapter Goal: This chapter introduces the basics of UX design for a web application, dash with plotly. To begin with, it introduces styling an HTML web page. Subsequently, it acquaints you with the Cascade styling sheet (css). Following that, it presents bootstrap. Afterward, it reveals bootstrapping dash web applications. It concludes by demonstrating a way of designing the layout of a dash webapplication.● Styling● Cascade Styling Sheet● Bootstrap● Dash Bootstrappingo Dash Core Componentso Dash Bootstrap Componentso Implementing Dash Bootstrap Components Themingo Dash HTML Componentso Dash Web Application Layout Design● Responsive Grid SystemChapter 8: Real-Time Web ApplicationChapter Goal: This chapter introduces you to creating a real-time web application with aresponsive navigation bar, sidebar, charts, tables, callbacks, and URL routing. After reading the contents of this chapter you should be able to develop a functional and responsive web application by implementing key Python web frameworks (i.e., dash, dash_core_components, dash_html_components). Besides that, you should be able to use the Input, State, and Output methods available for creating functional application callbacks. Equally, it acquaints you with an approach for implementing CSS to customize as a dash web application.Sub-topics:● Creating Iconso Alert Icono Messageso Profile Icon with Dropdown Menu● Search Bar● Navigation Bar● Sidebar Styling● Responsive Sidebar Styling● Content Styling● Sub Menu● Finalize Sidebar Menu● Footer Navigation Bar● Web Application Layout● Including Charts● Including a Table● Enabling Data Download● Tabs● Collapse● Callbackso Callbacks for Responsive Menu● URL Routing● ConclusionChapter 9: Basic AuthenticationChapter Goal: This chapter introduces an approach to securing a dash web application. After reading the contents of this chapter, you should be able to implement user access control, thus providing users access to some web resources and restricting them to others.Sub-topics:● Dash Authentications● Login Form● Login on Home Page● ConclusionChapter 10: Dash Into a Full WebsiteChapter Goal: Prior chapters introduced a way of building dashboards as web applications,integrated with machine learning models. This chapter takes it a step further. It introduces a way of building the front-end. After reading the contents of this chapter, you should be able to build important pages of a website, such as the home page, about us page, and contact us page, in addition to that, a page for billing/checkout.Sub-topics:● Building Home Page● Building Contact Us Page● Building Billing / Check-Out BuildingChapter 11: Integrate Machine Learning ModelsChapter Goal: This chapter introduces an approach to integrate machine learning models. Initially, it will provide an over of machine learning recognized as linear regression, including ways of preprocessing data and generating predictions. It concludes by exhibiting a technique of implementing it in web applications.Sub-topics:● An Introduction to Linear Regression● An Introduction to Scikit learn● Preprocessing● Splitting Data into Training and Test Data● Standardization● Training an Algorithm● Predictions● Integrating an Algorithm to a Web App● ConclusionsChapter 12: Deploying Web AppChapter Goal: This chapter concludes the book. It exhibits a way of deploying a web app. Initially, it summarizes an integrated development environment useful for developing, testing, and debugging Python web frameworks. Subsequently, it exhibits an approach of organizing the file structure prior to deploying a web app. Besides that, it provides a practical example that will help you better web app deployment.Sub-topics:● Integrated Development Environment○ PyCharm● Virtual Environment● File Structure● Integration among Multiple Innumerable Python Files● Hosting Web App

Regulärer Preis: 56,99 €
Produktbild für Soziale Roboter

Soziale Roboter

Soziale Roboter sind sensomotorische Maschinen, die für den Umgang mit Menschen oder Tieren geschaffen wurden. Sie können über fünf Dimensionen bestimmt werden, nämlich die Interaktion mit Lebewesen, die Kommunikation mit Lebewesen, die Nähe zu Lebewesen, die Abbildung von (Aspekten von) Lebewesen sowie – im Zentrum – den Nutzen für Lebewesen. Bei einem weiten Begriff können neben Hardwarerobotern auch Softwareroboter wie gewisse Chatbots, Voicebots und Social Bots dazu zählen. Die Disziplin, die soziale Roboter – ob als Spielzeugroboter, als Serviceroboter (Pflegeroboter, Therapieroboter, Sexroboter, Sicherheitsroboter etc.) oder als Industrieroboter in der Art von Kooperations- und Kollaborationsrobotern (Co-Robots bzw. Cobots) – erforscht und hervorbringt, ist die Soziale Robotik.Das Buch schafft Grundlagen in technikwissenschaftlicher, wirtschaftswissenschaftlicher, philosophischer, psychologischer und soziologischer Hinsicht. Es stellt dar, was soziale Roboter ausmacht, wie sie gebaut und programmiert werden, welche Anwendungsmöglichkeiten existieren und welche Herausforderungen sich ergeben.Das Kapitel 2 wird auf link.springer.com unter der Creative Commons Namensnennung 4.0 International Lizenz veröffentlicht.Prof. Dr. Oliver Bendel promovierte an der Universität St. Gallen. Er ist Dozent für Wirtschaftsinformatik, Informationsethik und Maschinenethik und forscht in Informations-, Maschinen- und Roboterethik.

Regulärer Preis: 66,99 €
Produktbild für The Little Book of Artificial Intelligence

The Little Book of Artificial Intelligence

This book is a brief introduction to artificial intelligence. It is intended for readers, in business, education, government, and self-edification.The author would like to thank his wife Margaret for helping with the manuscript. As in most disciplines, some of the subject matter is new and some of the subject matter is not so new, especially to persons trained in the subject of computers. A person with a degree in computer science should know it already. Artificial intelligence is an important subject to the modern world, and some disciplines have already benefitted greatly from it.The reader can survey the subject matter in any order he or she pleases. The busy executive can benefit greatly from it their parent organization. Executives in finance and banking can use to understand what is going on in their endeavors.Artificial intelligence is not only software but uses specially prepared software to take intellectual benefit in understanding what his or her data systems are doing.Artificial intelligence is something for the future from self-driving vehicles to self-managed business.

Regulärer Preis: 3,99 €
Produktbild für Apache Kafka

Apache Kafka

Die Zukunft eines Unternehmens ist sicher, wenn es mit Daten richtig umgeht. Neben dem Sammeln, Speichern und Auswerten ist der Austausch von Daten zwischen unterschiedlichen Systemen hierbei von immenser Bedeutung. Denn er soll zuverlässig und möglichst in Echtzeit erfolgen. Diese Anforderungen sind der Grund, weshalb sich Apache Kafka als Standard etabliert hat. Immer mehr Unternehmen setzen Apache Kafka heute als Streaming-Plattform und Messaging-System ein, um die Komplexität moderner IT-Architekturen beherrschbar zu machen. Um bei dieser Mission erfolgreich zu sein, ist Wissen entscheidend. Dieses Buch nimmt Software-Architekten, Entwickler und Administratoren gleichermaßen auf eine spannende Apache-Kafka-Mission mit. Eine Mission, die von den Grundlagen bis zum Produktiveinsatz von Kafka-basierten Daten-Pipelines reicht. Erleben Sie, wie Apache Kafka Zuverlässigkeit und Performance erreicht und wie Sie Komplikationen frühzeitig meistern können. Anhand zahlreicher Praxisbeispiele lernt man zudem, wie Best-Practice-Lösungen im eigenen Unternehmen umgesetzt werden können. Aus dem Inhalt:Warum Kafka? – Motivation für Kafka und verbreitete NutzungsartenWas ist Kafka? – Kafka als verteilter LogWie erreicht Kafka seine Performance? – Partitionen und Consumer GroupsWie erreicht Kafka seine Zuverlässigkeit? – Replikation, ACKs und Exactly OnceNachrichten produzieren und konsumieren: Was passiert in den Clients und auf den Brokern?Nachrichten aufräumen: Wie können nicht mehr benötigte Daten gelöscht und Speicherplatz frei geräumt werden?• Einblicke in das Kafka-Ökosystem: Kafka über Kafka Connect mit         anderen Systemen wie Datenbanken und externen Systemen verbindenAutoren: Anatoly Zelenin vermittelt als IT-Trainer hunderten Teilnehmern Apache Kafka in interaktiven Schulungen. Seine Kunden aus dem DAX-Umfeld und dem deutschen Mittelstand schätzen seit über einem Jahrzehnt seine Expertise und seine begeisternde Art. Darüber hinaus ist er nicht nur IT-Berater und -Trainer, sondern erkundet auch als Abenteurer unseren Planeten. Alexander Kropp ist seit seiner Kindheit leidenschaftlicher Informatiker und programmiert seit er 10 Jahre alt ist. Als Forscher und Berater unterstützt Alexander seit einem Jahrzehnt namhafte Unternehmen bei der Digitalisierung und Prototypen-Entwicklung. Parallel ist er als Dozent und Trainer im Cloud-Umfeld tätig

Regulärer Preis: 44,99 €
Produktbild für Cryptography, Information Theory, and Error-Correction

Cryptography, Information Theory, and Error-Correction

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book. This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book’s discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs. Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage.  Increased security and applicable research in elliptic curve cryptography are also featured. The book also: Shares vital, new research in the field of information theoryProvides quantum cryptography updatesIncludes over 350 worked examples and problems for greater understanding of ideas. Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely. CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book. This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book’s discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs. Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage.  Increased security and applicable research in elliptic curve cryptography are also featured. The book also: Shares vital, new research in the field of information theoryProvides quantum cryptography updatesIncludes over 350 worked examples and problems for greater understanding of ideas. Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely. Aiden A. Bruen, PhD, was most-recently adjunct research professor in the School of Mathematics and Statistics at Carleton University. He was professor of mathematics and honorary professor of applied mathematics at the University of Western Ontario from 1972-1999 and has instructed at various institutions since then. Dr. Bruen is the co-author of Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century (Wiley, 2004). Mario A. Forcinito, PhD, is Director and Chief Engineer at AP Dynamics Inc. in Calgary. He is previously instructor at the Pipeline Engineering Center at the Schulich School of Engineering in Calgary. Dr. Forcinito is co-author of Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century (Wiley, 2004).

Regulärer Preis: 114,99 €
Produktbild für Small-N und Big-N-Data in der Sportwissenschaft

Small-N und Big-N-Data in der Sportwissenschaft

Im Rahmen dieses essentials legen die Autoren das Augenmerk auf die Besonderheiten des Umgangs mit kleinen und großen Datenmengen in der Sportwissenschaft. Kurz und überblickartig wird dargestellt, welche Designs im Rahmen von Single-Case-Studies zum Einsatz gelangen können und wie solche Studien ausgewertet werden. Weiterhin wird erläutert, wie man die beste wissenschaftliche Evidenz in die (medizinische) Praxis integriert und wie im Rahmen von Forschungsprojekten die erhobenen Daten gesichert und öffentlich zugänglich gemacht werden. Darüber hinaus wird dargestellt, was alles unter dem Begriff Big Data subsumiert wird und welche Möglichkeiten und Grenzen für die Wissenschaft mit Big Data verbunden sind.

Regulärer Preis: 4,48 €
Produktbild für Synology NAS - Die praktische Anleitung

Synology NAS - Die praktische Anleitung

Sie möchten mit einem Synology NAS Ihre Daten zentral speichern, eigene Backups erstellen und Fotos, Filme und Dokumente streamen? Dennis Rühmer hilft Ihnen bei diesen Aufgaben und erklärt, wie Sie Ihr Synology NAS richtig konfigurieren und eine private Cloud aufsetzen. Damit können Sie Ihre Daten sicher ablegen und verwalten, Live-TV aufnehmen, automatische Sicherungen Ihrer Rechner anlegen, Kalender und Kontakte verwalten und noch viel mehr. Vom reibungslosen Einstieg und einer Kaufberatung über zentrale Grundlagen bis zu den vielfältigen Diensten erfahren Sie in diesem Ratgeber, was Sie über Ihr Synology NAS für einen reibungslosen Betrieb wissen müssen.Aus dem Inhalt:Das richtige NAS wählenDas Gerät sicher einrichtenNetzwerkfreigaben verwaltenKalender und AdressbuchMusik per NAS abspielenFotos organisieren und teilenVideos genießen und verwaltenEin zentrales Backup erstellenEinen zentralen Drucker einrichtenKameraüberwachung steuernEinen TV-Server nutzenSicherheit im HeimnetzAutor: Dennis Rühmer ist promovierter Ingenieur der Elektrotechnik, an der TU Braunschweig als wissenschaftlicher Mitarbeiter tätig und erfahrener Buchautor. Er befasst sich intensiv mit Datensicherung und Streaming, ist großer Raspberry Pi- und Kodi-Fan, bekennender Linuxer und interessiert sich seit frühester Kindheit für digitale Fotografie.

Regulärer Preis: 29,90 €
Produktbild für Pretrained Transformers for Text Ranking

Pretrained Transformers for Text Ranking

THE GOAL OF TEXT RANKING IS TO GENERATE AN ORDERED LIST OF TEXTS RETRIEVED FROM A CORPUS IN RESPONSE TO A QUERY. ALTHOUGH THE MOST COMMON FORMULATION OF TEXT RANKING IS SEARCH, INSTANCES OF THE TASK CAN ALSO BE FOUND IN MANY NATURAL LANGUAGE PROCESSING (NLP) APPLICATIONS. This book provides an overview of text ranking with neural network architectures known as transformers, of which BERT (Bidirectional Encoder Representations from Transformers) is the best-known example. The combination of transformers and self-supervised pretraining has been responsible for a paradigm shift in NLP, information retrieval (IR), and beyond.This book provides a synthesis of existing work as a single point of entry for practitioners who wish to gain a better understanding of how to apply transformers to text ranking problems and researchers who wish to pursue work in this area. It covers a wide range of modern techniques, grouped into two high-level categories: transformer models that perform reranking in multi-stage architectures and dense retrieval techniques that perform ranking directly. Two themes pervade the book: techniques for handling long documents, beyond typical sentence-by-sentence processing in NLP, and techniques for addressing the tradeoff between effectiveness (i.e., result quality) and efficiency (e.g., query latency, model and index size). Although transformer architectures and pretraining techniques are recent innovations, many aspects of how they are applied to text ranking are relatively well understood and represent mature techniques. However, there remain many open research questions, and thus in addition to laying out the foundations of pretrained transformers for text ranking, this book also attempts to prognosticate where the field is heading.* Preface* Acknowledgments* Introduction* Setting the Stage* Multi-Stage Architectures for Reranking* Refining Query and Document Representations* Learned Dense Representations for Ranking* Future Directions and Conclusions* Bibliography* Authors' Biographies

Regulärer Preis: 79,99 €
Produktbild für Navigating the Cybersecurity Career Path

Navigating the Cybersecurity Career Path

LAND THE PERFECT CYBERSECURITY ROLE—AND MOVE UP THE LADDER—WITH THIS INSIGHTFUL RESOURCEFinding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult.In Navigating the Cybersecurity Career Path, decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams. In this book, readers will find:* Explanations of why and how the cybersecurity industry is unique and how to use this knowledge to succeed* Discussions of how to progress from an entry-level position in the industry to a position leading security teams and programs* Advice for every stage of the cybersecurity career arc* Instructions on how to move from single contributor to team leader, and how to build a security program from scratch* Guidance on how to apply the insights included in this book to the reader's own situation and where to look for personalized help* A unique perspective based on the personal experiences of a cybersecurity leader with an extensive security backgroundPerfect for aspiring and practicing cybersecurity professionals at any level of their career, Navigating the Cybersecurity Career Path is an essential, one-stop resource that includes everything readers need to know about thriving in the cybersecurity industry.HELEN E. PATTON has held several senior technical leadership positions in cybersecurity, including Advisory Chief Information Security Officer at Cisco, AVP and Chief Information Security Officer at the Ohio State University and Executive Director of IT Risk and Resiliency at JP Morgan Chase.Foreword: Navigating the Cybersecurity Career Path xvIntroduction xviiPART I ARRIVING IN SECURITY 1CHAPTER 1 HOW DO YOU BECOME A SECURITY PROFESSIONAL? 3Create Your Story 8So, You Want to Work in Security 13What’s Next? 16CHAPTER 2 WHY SECURITY? 19What Kind of People Do Security? 21What Is Your Why? 24What’s Next? 28CHAPTER 3 WHERE CAN I BEGIN? 29What Does It Mean to Be a Security Professional? 32How Can You Make Sense of It All? 35What’s Next? 39CHAPTER 4 WHAT TRAINING SHOULD I TAKE? 41For the Traditional Student 43For the Nontraditional Student 44For the Full-TimeNonsecurity Worker 45Other Things to Consider 46What’s Next? 51CHAPTER 5 WHAT SKILLS SHOULD I HAVE? 53The Entry Point —Technology 55Professional Skills 59What’s Next? 66CHAPTER 6 IS MY RÉSUMÉ OKAY? 67Linking the Résumé to the Job Posting 70Elements of a Résumé 71Digital Presence 77References 78Cover Letters 79What’s Next? 80CHAPTER 7 TRYING WITH LITTLE SUCCESS? 81Physical Location 85Your Company 85Get Specific 86Know Your Market 88Assess Your Efforts So Far 89But I’m Doing All Those Things! 91What’s Next? 92PART II THRIVING IN SECURITY 93CHAPTER 8 HOW DO I KEEP UP? 97Fitting It Into Your Schedule 99Ad Hoc and Planned Learning 102Take a Mini-Sabbatical 103Where Do I Find the Information? 103What’s Next? 105CHAPTER 9 How Can I Manage Security Stress? 107The Stress of Working in Security 109Managing Security Stress 113What’s Next? 118CHAPTER 10 HOW CAN I SUCCEED AS A MINORITY? 119Making Security Work for You 124What’s Next? 128CHAPTER 11 HOW CAN I PROGRESS? 129The Security Journey 131The Opportunist 132The Intentional Career Seeker 136How to Get Promoted 139What’s Next? 141CHAPTER 12 SHOULD I MANAGE PEOPLE? 143Leadership and Management 145Preparing for Your Next Role 150What’s Next? 152CHAPTER 13 HOW CAN I DEAL WITH IMPOSTOR SYNDROME? 153Fact-Check Your Inner Monologue 157Know Competence and Incompetence 158Know When to Ask for Help 159Keep Learning and Know When Enough Is Enough 160Keep Track of Your Successes 161What’s Next? 162CHAPTER 14 HOW CAN I KNOW IF IT’S TIME TO MOVE ON? 163Are You Happy Where You Are? 165Have You Done All You Wanted to Do? 166Have You Learned All You Wanted? 167What Are Your Long-Term Goals? 168Are You Being Pigeonholed? 169Do You Fit Into the Culture? 170Job Hopping 171Are the Other Options Better than Your Current Job? 172What’s Next? 173PART III LEADING SECURITY 175CHAPTER 15 WHERE DO I START? 179What’s on Fire? 180What Is Your Timeline to Act? 181Who Are Your Partners? 182Find the Strengths and Note the Weaknesses 183Draw the Business Risk Picture 184Do You Have a Mandate? 185What’s Next? 186CHAPTER 16 HOW DO I MANAGE SECURITY STRATEGICALLY? 187Consider Your Industry 190Know Your Business Priorities 191Be Pragmatic 193Address Stakeholder Pain Points 194Threats and Vulnerabilities 195Rinse and Repeat 197Putting It Together 198What’s Next? 200CHAPTER 17 HOW DO I BUILD A TEAM? 201It Is About the How 203Things to Consider 207Identify Important Things 209Identify Areas of Weakness 211Discontinuing a Function 212Building New Functions 213What’s Next? 215CHAPTER 18 HOW DO I WRITE A JOB POSTING? 217The Challenge of Job Postings 220What’s Next? 225CHAPTER 19 HOW DO I ENCOURAGE DIVERSITY? 227Start with Numbers 229Understand Your Cultural Issues 230Attracting Diverse Talent 232Writing the Job Description and Posting 234The Interviewing Process 235Retaining Diverse Talent 236Promotions and Career Development 237Leaving the Team 239What’s Next? 239CHAPTER 20 HOW DO I MANAGE UP? 241Who Are Senior Stakeholders? 242Help Them Understand Security 246When Things Go Wrong 250What’s Next? 251CHAPTER 21 HOW DO I FUND MY PROGRAM? 253Funding a Team 255Funding a Program 256The Big Ask 260What’s Next? 261Chapter 22 How Do I Talk About My Security Program? 263What Story Should I Tell? 264Telling Stories 271What’s Next? 273CHAPTER 23 WHAT IS MY LEGACY? 275Making an Impact on the Industry 277Making an Impact on Your Company 281What’s Next? 283Epilogue 285Appendix: Resources 287About the Author 291Acknowledgments 293Index 295

Regulärer Preis: 19,99 €
Produktbild für (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests

(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests

SMARTER, FASTER PREP FOR THE SSCP EXAMThe (ISC)² SSCP Official Practice Tests, 2nd Edition is the only (ISC)²-endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapters cover each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review. When you feel well prepared, use the two complete practice exams from Sybex's online interactive learning environment as time trials to assess your readiness to take the exam.:Coverage of all exam objectives, including:* Security Operations and Administration* Access Controls* Risk Identification, Monitoring and Analysis* Incident Response and Recovery* Cryptography* Network and Communications Security* Systems and Application SecuritySSCP certification demonstrates you have the advanced technical skills and knowledge to implement, monitor and administer IT infrastructure using security best practices, policies and procedures. It's ideal for students pursuing cybersecurity degrees as well as those in the field looking to take their careers to the next level.MIKE CHAPPLE, PhD, CISSP, Security+, CISA, CySA+ is Teaching Professor of IT, Analytics and Operations at the University of Notre Dame. He is a leading expert on cybersecurity certification and runs CertMike.com. Mike is the author of more than 25 books including (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 7th, 8th, and 9th Editions.DAVID SEIDL, CISSP, GPEN, GCIH, CySA+, Pentest+ is the Vice President for Information Technology and CIO at Miami University of Ohio. During his IT career, he has served in a variety of technical and information security roles including serving as the Senior Director for Campus Technology Services at the University of Notre Dame and leading Notre Dame’s information security team as Notre Dame’s Director of Information Security. David has taught college courses on information security, and writes books on information security and cyberwarfare.Introduction xiChapter 1 Security Operations and Administration (Domain 1) 1Chapter 2 Access Controls (Domain 2) 21Chapter 3 Risk Identification, Monitoring, and Analysis (Domain 3) 37Chapter 4 Incident Response and Recovery (Domain 4) 61Chapter 5 Cryptography (Domain 5) 79Chapter 6 Network and Communications Security (Domain 6) 95Chapter 7 Systems and Application Security (Domain 7) 119Chapter 8 Practice Test 1 141Chapter 9 Practice Test 2 169Appendix Answers to Review Questions 197Chapter 1: Security Operations and Administration (Domain 1) 198Chapter 2: Access Controls (Domain 2) 204Chapter 3: Risk Identification, Monitoring, and Analysis (Domain 3) 212Chapter 4: Incident Response and Recovery (Domain 4) 221Chapter 5: Cryptography (Domain 5) 229Chapter 6: Network and Communications Security (Domain 6) 235Chapter 7: Systems and Application Security (Domain 7) 246Chapter 8: Practice Test 1 255Chapter 9: Practice Test 2 269Index 283

Regulärer Preis: 27,99 €