Computer und IT
Practical Svelte
Learn to leverage the power of Svelte to produce web applications that are efficient and fast. This project-oriented book simplifies creating sites using Svelte from start to finish, with little more than a text editor and familiar languages such as HTML, CSS, and JavaScript. It equips you with a starting toolset that you can use to develop future projects, incorporate into your existing workflow, and allow you to take your websites to the next level.Practical Svelte is an excellent resource for getting acquainted with creating and manipulating websites or online applications using a component framework approach. It takes the view that we don’t have to create something complex and unwieldy. We can build something quickly, using less code than some of its competitors, and extend it using the power of the API and plugins over time, without sacrificing speed or features.You will learn how to use the Svelte framework to rapidly create and deploy websites or online applications that are performant, with the minimum of fuss and using existing tools already available in the browser, get up to speed with individual features of the Svelte framework, and work through a series of small projects that will combine to produce a finished site at the end of the book – this to help consolidate skills from day one and create something that you can use as a basis for future projects.WHAT YOU WILL LEARN* Understand why Svelte’s popularity makes it the go-to framework for constructing applications* Learn how to scaffold and implement web sites or online applications using Svelte* Create reusable components using Svelte that are interoperable with other frameworks and can solve real-world problems* Perform automated testing and deployment using tools such as CI/CD testing * Work through some mini projects from start to finish, understanding what we can achieve using Svelte and where we may need to bring other tools into playWHO THIS BOOK IS FORWebsite developers who are already familiar with JavaScript, CSS, and HTML and are keen to learn how to leverage the Svelte component framework to quickly create web sites or online applications with little more than a text editor. It’s perfect for development teams who do not want to follow the mold and use a credible alternative to React or Angular.Alex Libby is a frontend engineer and seasoned computer book author who hails from England. His passion for all things Open Source dates back to the days of his degree studies, where he first came across web development and has been hooked ever since. His daily work involves extensive use of React, NodeJS, JavaScript, HTML, and CSS; Alex enjoys tinkering with different open source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library and enjoys writing about Open Source technologies, principally for front end UI development.INTRODUCTION (2 PAGES)CHAPTER 1: GETTING STARTED – 20 PAGES1. Setting up our development environment – Git, Git repository, Svelte, editor, etc2. Exploring the basic principles of using Svelte – a primer only: enough to give beginners something to work on3. Setting up the starting site for the book4. Reviewing the changes made5. Setting the background for this bookCHAPTER 2: CREATING COMPONENTS – 30 PAGES1. Understanding the makeup of components2. Creating some examples3. Publishing examples4. X5. Adding functionality to the frontend demoCHAPTER 3: MANAGING STATE AND DATA – 30 PAGES1. Passing and setting values in code2. Exploring the world of props3. Creating and maintaining Svelte stores4. X5. Adding functionality to the frontend demoCHAPTER 4: CONTROLLING LOGIC – 30 PAGES1. Creating if-else conditions2. Working through some examples3. X4. X5. Adding functionality to the frontend demoCHAPTER 5: MANAGING EVENTS – 35 PAGES1. The theory of reactivity – updating the DOM2. Different event types – which to choose?3. X4. X5. Adding functionality to the frontend demoCHAPTER 6: BINDING ELEMENTS – 30 PAGES1. Creating forms in Svelte2. Binding and managing events3. Catering for different form elements4. Managing context5. Adding functionality to the frontend demoCHAPTER 7: ADDING STYLES – 20 PAGES1. Understanding styling in Svelte2. Inlining or external?3. Taking it further – using a style preprocessor4. Applying themes – using a plugin or manually5. Adding functionality to the frontend demoCHAPTER 8: UNIT TESTING AND SVELTE – 30 PAGES1. Deciding our strategy2. Setting up testing environment3. Creating example tests4. Assessing the outcome5. Applying principles to our projectCHAPTER 9: DEPLOYING SVELTE – 30 PAGES1. Debugging Svelte2. Understanding the deployment process3. Setting up the hosting provider4. Deploying content to production5. Bonus – applying a domain nameCHAPTER 10: WORKING WITH EXTERNAL LIBRARIES – 30 PAGES1. Exploring example libraries2. Working client-side v. server-side – watch out!3. Adding Stripe to our frontend site project4. Reviewing the changes made5. What about React?CHAPTER 11: ANIMATING SVELTE – 30 PAGES1. Auditing the site – how could we use animation?2. A quick review of types of animation options3. Working through some examples4. Creating custom animations5. Using Svelte libraries6. Applying animation to our frontend projectCHAPTER 12: ADAPTING FOR SAPPER – 20 PAGES1. Introducing Sapper2. Setting up a Sapper site3. Exploring the structure of a Sapper site4. Migrating our frontend project to SapperAPPENDIX: API REFERENCE (15 PAGES) – ITS INCLUSION TO BE CONFIRMEDThis section will cover guidance on where to seek help when using Svelte if needed and how to debug Svelte
Java Programmieren für Einsteiger
Wie Sie als Einsteiger praxisnah und einfach Java programmieren lernen!- inkl. kostenfreien Zugang zur E-Book Version (PDF) –Egal ob für Ihr Studium, Ihren Beruf, bessere Jobmöglichkeiten und Karrierechancen, oder Ihr Hobby: Mithilfe dieses Buches werden Sie auch ohne Vorkenntnisse alle wichtigen Programmiergrundlagen Schritt für Schritt erlernen und Ihr Wissen in Java vertiefen. Somit erschaffen Sie sich ein solides Fundament und sammeln erste wichtige Erfahrungen für die Praxis, um im Anschluss Ihre eigenen Programme, Anwendungen, Apps und Spiele mit Java programmieren zu können.Da die Programmiersprache Java sich bereits seit langer Zeit als eine zentrale Programmiersprache etabliert hat, werden damit Smartphone-Apps für Android, Computerprogramme und Spiele programmiert. Somit lernen Sie mit diesem Buch eine sehr beliebte Allrounder-Sprache, die Ihnen viele Möglichkeiten liefert und dabei trotzdem relativ leicht zu erlernen ist.Von Datenstrukturen, mathematischen und logischen Operatoren über Kontrollstrukturen, Textverarbeitung bis hin zur rekursiven und objektorientierten Programmierung erwartet Sie alles Notwendige in diesem Buch, damit Sie erfolgreich programmieren lernen und Ihre eigenen Anwendungen mit Java schreiben können!Im Detail erwarten Sie folgende Inhalte:-Schritt für Schritt Anleitungen, damit Sie direkt mit dem Programmieren starten können-alle Grundlagen, damit Sie auch ohne Vorerfahrung erfolgreich programmieren lernen-objektorientierte Programmierung mit Java, damit Sie eigene Anwendungen schreiben können-Exception Handling, damit Sie Fehlerquellen schnell erkennen und so reibungslos programmieren können-Übungen nach jedem Kapitel, damit Sie Ihr Wissen optimal für die Praxis vorbereiten können-zahlreiche Beispiele, Tipps und Tricks, damit Ihnen programmieren noch einfacher fälltIch freue mich darauf, mich mit Ihnen gemeinsam auf die spannende Reise in die Programmierwelt mit Java zu begeben und wünsche Ihnen viel Spaß und Erfolg beim Programmieren lernen!Simon Flaig Neben exzellenten Leistungen im Programmieren im Schulunterricht, eignete sich Simon Flaig in seiner Freizeit selbstständig verschiedene Programmierkenntnisse an. Nach einem sehr guten Abschluss seines Informatikstudiums, konnte Simon reichlich praktische Erfahrung im Bereich der Softwareentwicklung in etablierten Unternehmen im In- und Ausland sammeln. Nun vermittelt Simon sein Know-How im Bereich der Programmierung mithilfe seiner praxisnahen Lehrbücher.
Snowflake Security
This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake.Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges.There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling role hierarchy, building monitoring dashboards, etc., to your organizations.WHAT YOU WILL LEARN* Implement security best practices for Snowflake* Set up user provisioning, MFA, OAuth, and SSO* Set up a Snowflake security model* Design roles architecture* Use advanced access control such as row-based security and dynamic masking* Audit and monitor your Snowflake Data CloudWHO THIS BOOK IS FORData engineers, data privacy professionals, and security teams either with security knowledge (preferably some data security knowledge) or with data engineering knowledge; in other words, either “Snowflake people” or “data people” who want to get security right, or “security people” who want to make sure that Snowflake gets handled right in terms of securityBEN HERZBERG is an experienced hacker and developer with years of experience in endpoint security, behavioral analytics, application security, and data security. His professional experience in development, research, and security includes roles such as the CTO of Cynet and leading the threat research group at Imperva. Ben is now the Chief Scientist for Satori, streamlining data access and security with DataSecOps. Ben also loves to write, speak at conferences, travel, and meet new people.YOAV COHEN is the Co-Founder and Chief Technology Officer of Satori Cyber. At Satori, Yoav is building the company’s technology vision and leading the research and engineering teams. Before founding Satori Cyber, Yoav was the Senior Vice President of Product Development for Imperva, which he joined as part of the acquisition of Incapsula, a cloud-based web applications security and acceleration company, where he was the Vice President of Engineering. Before joining Incapsula, Yoav held several technology leadership positions at SAP. When he isn’t glued to his laptop or on a whiteboard, Yoav can be found traveling with his wife and four kids in an RV, playing electric guitar, or doing laps at the pool. He is still dreaming about building his own operating system. Yoav holds an MSc in computer science from Tel-Aviv University and a BSc in computer science and biology from Tel-Aviv University.CHAPTER 1. INTRODUCTION TO SNOWFLAKEWhat’s happening to dataWhere Snowflake fits inBuilding your first Snowflake Data WarehouseCHAPTER 2. ACCOUNT SECURITYSecurity Best Practices for SnowflakePrivate Link ConnectionCHAPTER 3. AUTHENTICATIONAuthentication in Snowflake overviewSetting Up MFASetting Up OAuthSetting Up SSOConnecting through a 3rd party SSOConnecting through a custom OAuth Authentication ServiceNetwork Access ControlManaging Roles Through SCIMCHAPTER 4. DATA ACCESS CONTROLIntroduction to Data Access ControlsSnowflake Security ModelDesigning roles architectureCustom Data Access ControlColumn Based Access ControlUsing AbstractionUsing Dynamic MaskingRow Based Access ControlUsing AbstractionUsing Row Based PoliciesCustom Access ControlCHAPTER 5. LOGGING & MONITORINGIntroductionSnowflake MetadataAccount Usage vs Information SchemaMain Views for SecurityLimitationsSnowAlertBuilding a Custom Security DashboardSetting Things UpDashboardIncident ResponseCHAPTER 6. EPILOGUERecapWhat’s Coming Up
Computation in BioInformatics
COMPUTATION IN BIOINFORMATICS1 BIOINFOMATICS AS A TOOL IN DRUG DESIGNING 1Rene Barbie Browne, Shiny C. Thomas and Jayanti Datta Roy1.1 Introduction 11.2 Steps Involved in Drug Designing 31.2.1 Identification of the Target Protein/Enzyme 51.2.2 Detection of Molecular Site (Active Site) in the Target Protein 61.2.3 Molecular Modeling 61.2.4 Virtual Screening 91.2.5 Molecular Docking 101.2.6 QSAR (Quantitative Structure-Activity Relationship) 121.2.7 Pharmacophore Modeling 141.2.8 Solubility of Molecule 141.2.9 Molecular Dynamic Simulation 141.2.10 ADME Prediction 151.3 Various Softwares Used in the Steps of Drug Designing 161.4 Applications 181.5 Conclusion 20References 202 NEW STRATEGIES IN DRUG DISCOVERY 25Vivek Chavda, Yogita Thalkari and Swati Marwadi2.1 Introduction 262.2 Road Toward Advancement 272.3 Methodology 302.3.1 Target Identification 302.3.2 Docking-Based Virtual Screening 322.3.3 Conformation Sampling 332.3.4 Scoring Function 342.3.5 Molecular Similarity Methods 352.3.6 Virtual Library Construction 372.3.7 Sequence-Based Drug Design 372.4 Role of OMICS Technology 382.5 High-Throughput Screening and Its Tools 402.6 Chemoinformatic 442.6.1 Exploratory Data Analysis 452.6.2 Example Discovery 462.6.3 Pattern Explanation 462.6.4 New Technologies 462.7 Concluding Remarks and Future Prospects 46References 483 ROLE OF BIOINFORMATICS IN EARLY DRUG DISCOVERY: AN OVERVIEW AND PERSPECTIVE 49Shasank S. Swain and Tahziba Hussain3.1 Introduction 503.2 Bioinformatics and Drug Discovery 513.2.1 Structure-Based Drug Design (SBDD) 523.2.2 Ligand-Based Drug Design (LBDD) 533.3 Bioinformatics Tools in Early Drug Discovery 543.3.1 Possible Biological Activity Prediction Tools 553.3.2 Possible Physicochemical and Drug-Likeness Properties Verification Tools 583.3.3 Possible Toxicity and ADME/T Profile Prediction Tools 603.4 Future Directions With Bioinformatics Tool 613.5 Conclusion 63Acknowledgements 64References 644 ROLE OF DATA MINING IN BIOINFORMATICS 69Vivek P. Chavda, Amit Sorathiya, Disha Valu and Swati Marwadi4.1 Introduction 704.2 Data Mining Methods/Techniques 714.2.1 Classification 714.2.1.1 Statistical Techniques 714.2.1.2 Clustering Technique 734.2.1.3 Visualization 744.2.1.4 Induction Decision Tree Technique 744.2.1.5 Neural Network 754.2.1.6 Association Rule Technique 754.2.1.7 Classification 754.3 DNA Data Analysis 774.4 RNA Data Analysis 794.5 Protein Data Analysis 794.6 Biomedical Data Analysis 804.7 Conclusion and Future Prospects 81References 815 IN SILICO PROTEIN DESIGN AND VIRTUAL SCREENING 85Vivek P. Chavda, Zeel Patel, Yashti Parmar and Disha Chavda5.1 Introduction 865.2 Virtual Screening Process 885.2.1 Before Virtual Screening 905.2.2 General Process of Virtual Screening 905.2.2.1 Step 1 (The Establishment of the Receptor Model) 915.2.2.2 Step 2 (The Generation of Small-Molecule Libraries) 925.2.2.3 Step 3 (Molecular Docking) 925.2.2.4 Step 4 (Selection of Lead Protein Compounds) 945.3 Machine Learning and Scoring Functions 945.4 Conclusion and Future Prospects 95References 966 NEW BIOINFORMATICS PLATFORM-BASED APPROACH FOR DRUG DESIGN 101Vivek Chavda, Soham Sheta, Divyesh Changani and Disha Chavda6.1 Introduction 1026.2 Platform-Based Approach and Regulatory Perspective 1046.3 Bioinformatics Tools and Computer-Aided Drug Design 1076.4 Target Identification 1096.5 Target Validation 1106.6 Lead Identification and Optimization 1116.7 High-Throughput Methods (HTM) 1126.8 Conclusion and Future Prospects 114References 1157 BIOINFORMATICS AND ITS APPLICATION AREAS 121Ragini Bhardwaj, Mohit Sharma and Nikhil Agrawal7.1 Introduction 1217.2 Review of Bioinformatics 1247.3 Bioinformatics Applications in Different Areas 1267.3.1 Microbial Genome Application 1267.3.2 Molecular Medicine 1297.3.3 Agriculture 1307.4 Conclusion 131References 1318 DNA MICROARRAY ANALYSIS: FROM AFFYMETRIX CEL FILES TO COMPARATIVE GENE EXPRESSION 139Sandeep Kumar, Shruti Shandilya, Suman Kapila, Mohit Sharma and Nikhil Agrawal8.1 Introduction 1408.2 Data Processing 1408.2.1 Installation of Workflow 1408.2.2 Importing the Raw Data for Processing 1418.2.3 Retrieving Sample Annotation of the Data 1428.2.4 Quality Control 1438.2.4.1 Boxplot 1448.2.4.2 Density Histogram 1458.2.4.3 MA Plot 1458.2.4.4 NUSE Plot 1458.2.4.5 RLE Plot 1458.2.4.6 RNA Degradation Plot 1458.2.4.7 QCstat 1488.3 Normalization of Microarray Data Using the RMA Method 1488.3.1 Background Correction 1488.3.2 Normalization 1498.3.3 Summarization 1498.4 Statistical Analysis for Differential Gene Expression 1518.5 Conclusion 153References 1539 MACHINE LEARNING IN BIOINFORMATICS 155Rahul Yadav, Mohit Sharma and Nikhil Agrawal9.1 Introduction and Background 1569.1.1 Bioinformatics 1589.1.2 Text Mining 1599.1.3 IoT Devices 1599.2 Machine Learning Applications in Bioinformatics 1599.3 Machine Learning Approaches 1619.4 Conclusion and Closing Remarks 162References 16210 DNA-RNA BARCODING AND GENE SEQUENCING 165Gifty Sawhney, Mohit Sharma and Nikhil Agrawal10.1 Introduction 16610.2 RNA 16910.3 DNA Barcoding 17210.3.1 Introduction 17210.3.2 DNA Barcoding and Molecular Phylogeny 17710.3.3 Ribosomal DNA (rDNA) of the Nuclear Genome (nuDNA)—ITS 17810.3.4 Chloroplast DNA 18010.3.5 Mitochondrial DNA 18110.3.6 Molecular Phylogenetic Analysis 18110.3.7 Metabarcoding 18910.3.8 Materials for DNA Barcoding 19010.4 Main Reasons of DNA Barcoding 19110.5 Limitations/Restrictions of DNA Barcoding 19210.6 RNA Barcoding 19210.6.1 Overview of the Method 19310.7 Methodology 19410.7.1 Materials Required 19510.7.2 Barcoded RNA Sequencing High-Level Mapping of Single-Neuron Projections 19610.7.3 Using RNA to Trace Neurons 19610.7.4 A Life Conservation Barcoder 19810.7.5 Gene Sequencing 19910.7.5.1 DNA Sequencing Methods 20010.7.5.2 First-Generation Sequencing Techniques 20410.7.5.3 Maxam’s and Gilbert’s Chemical Method 20410.7.5.4 Sanger Sequencing 20510.7.5.5 Automation in DNA Sequencing 20610.7.5.6 Use of Fluorescent-Marked Primers and ddNTPs 20610.7.5.7 Dye Terminator Sequencing 20710.7.5.8 Using Capillary Electrophoresis 20710.7.6 Developments and High-Throughput Methodsin DNA Sequencing 20810.7.7 Pyrosequencing Method 20910.7.8 The Genome Sequencer 454 FLX System 21010.7.9 Illumina/Solexa Genome Analyzer 21010.7.10 Transition Sequencing Techniques 21110.7.11 Ion-Torrent’s Semiconductor Sequencing 21110.7.12 Helico’s Genetic Analysis Platform 21110.7.13 Third-Generation Sequencing Techniques 21210.8 Conclusion 212Abbreviations 213Acknowledgement 214References 21411 BIOINFORMATICS IN CANCER DETECTION 229Mohit Sharma, Umme Abiha, Parul Chugh, Balakumar Chandrasekaran and Nikhil Agrawal11.1 Introduction 23011.2 The Era of Bioinformatics in Cancer 23011.3 Aid in Cancer Research via NCI 23211.4 Application of Big Data in Developing Precision Medicine 23311.5 Historical Perspective and Development 23511.6 Bioinformatics-Based Approaches in the Study of Cancer 23711.6.1 SLAMS 23711.6.2 Module Maps 23811.6.3 COPA 23911.7 Conclusion and Future Challenges 240References 24012 GENOMIC ASSOCIATION OF POLYCYSTIC OVARIAN SYNDROME: SINGLE-NUCLEOTIDE POLYMORPHISMS AND THEIR ROLE IN DISEASE PROGRESSION 245Gowtham Kumar Subbaraj and Sindhu Varghese12.1 Introduction 24612.2 FSHR Gene 25212.3 IL-10 Gene 25212.4 IRS-1 Gene 25312.5 PCR Primers Used 25412.6 Statistical Analysis 25512.7 Conclusion 258References 25913 AN INSIGHT OF PROTEIN STRUCTURE PREDICTIONS USING HOMOLOGY MODELING 265S. Muthumanickam, P. Boomi, R. Subashkumar, S. Palanisamy, A. Sudha, K. Anand, C. Balakumar, M. Saravanan, G. Poorani, Yao Wang, K. Vijayakumar and M. Syed Ali13.1 Introduction 26613.2 Homology Modeling Approach 26813.2.1 Strategies for Homology Modeling 26913.2.2 Procedure 26913.3 Steps Involved in Homology Modeling 27013.3.1 Template Identification 27013.3.2 Sequence Alignment 27113.3.3 Backbone Generation 27113.3.4 Loop Modeling 27113.3.5 Side Chain Modeling 27213.3.6 Model Optimization 27213.3.6.1 Model Validation 27213.4 Tools Used for Homology Modeling 27313.4.1 Robetta 27313.4.2 M4T (Multiple Templates) 27313.4.3 I-Tasser (Iterative Implementation of the Threading Assembly Refinement) 27313.4.4 ModBase 27413.4.5 Swiss Model 27413.4.6 PHYRE2 (Protein Homology/Analogy Recognition Engine 2) 27413.4.7 Modeller 27413.4.8 Conclusion 275Acknowledgement 275References 27514 BASIC CONCEPTS IN PROTEOMICS AND APPLICATIONS 279Jesudass Joseph Sahayarayan, A.S. Enogochitra and Murugesan Chandrasekaran14.1 Introduction 28014.2 Challenges on Proteomics 28114.3 Proteomics Based on Gel 28314.4 Non-Gel–Based Electrophoresis Method 28414.5 Chromatography 28414.6 Proteomics Based on Peptides 28514.7 Stable Isotopic Labeling 28614.8 Data Mining and Informatics 28714.9 Applications of Proteomics 28914.10 Future Scope 29014.11 Conclusion 291References 29215 PROSPECTS OF COVALENT APPROACHES IN DRUG DISCOVERY: AN OVERVIEW 295Balajee Ramachandran, Saravanan Muthupandian and Jeyakanthan Jeyaraman15.1 Introduction 29615.2 Covalent Inhibitors Against the Biological Target 29715.3 Application of Physical Chemistry Concepts in Drug Designing 29915.4 Docking Methodologies—An Overview 30115.5 Importance of Covalent Targets 30215.6 Recent Framework on the Existing Docking Protocols 30315.7 SN2 Reactions in the Computational Approaches 30415.8 Other Crucial Factors to Consider in the Covalent Docking 30515.8.1 Role of Ionizable Residues 30515.8.2 Charge Regulation 30615.8.3 Charge-Charge Interactions 30615.9 QM/MM Approaches 30915.10 Conclusion and Remarks 310Acknowledgements 311References 311Index 321
CompTIA PenTest+ Study Guide
PREPARE FOR SUCCESS ON THE NEW PENTEST+ CERTIFICATION EXAM AND AN EXCITING CAREER IN PENETRATION TESTINGIn the revamped Second Edition of CompTIA PenTest+ Study Guide: Exam PT0-002, veteran information security experts Dr. Mike Chapple and David Seidl deliver a comprehensive roadmap to the foundational and advanced skills every pentester (penetration tester) needs to secure their CompTIA PenTest+ certification, ace their next interview, and succeed in an exciting new career in a growing field.You’ll learn to perform security assessments of traditional servers, desktop and mobile operating systems, cloud installations, Internet-of-Things devices, and industrial or embedded systems. You’ll plan and scope a penetration testing engagement including vulnerability scanning, understand legal and regulatory compliance requirements, analyze test results, and produce a written report with remediation techniques.This book will:* Prepare you for success on the newly introduced CompTIA PenTest+ PT0-002 Exam * Multiply your career opportunities with a certification that complies with ISO 17024 standards and meets Department of Defense Directive 8140/8570.01-M requirements * Allow access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone preparing for the updated CompTIA PenTest+ certification exam, CompTIA PenTest+ Study Guide: Exam PT0-002 is also a must-read resource for aspiring penetration testers and IT security professionals seeking to expand and improve their skillset.MIKE CHAPPLE, SECURITY+, CYSA+, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame. He's a cybersecurity professional and educator with over 20 years of experience. Mike provides cybersecurity certification resources at his website, CertMike.com.DAVID SEIDL, SECURITY+, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University. David co-led Notre Dame's move to the cloud, and has written multiple cybersecurity certification books.Introduction xxvAssessment Test xxxixCHAPTER 1 PENETRATION TESTING 1What Is Penetration Testing? 2Cybersecurity Goals 2Adopting the Hacker Mindset 4Ethical Hacking 5Reasons for Penetration Testing 5Benefits of Penetration Testing 6Regulatory Requirements for Penetration Testing 7Who Performs Penetration Tests? 8Internal Penetration Testing Teams 8External Penetration Testing Teams 9Selecting Penetration Testing Teams 10The CompTIA Penetration Testing Process 10Planning and Scoping 11Information Gathering and Vulnerability Scanning 11Attacks and Exploits 12Reporting and Communication 13Tools and Code Analysis 13The Cyber Kill Chain 14Reconnaissance 15Weaponization 16Delivery 16Exploitation 16Installation 16Command and Control 16Actions on Objectives 17Tools of the Trade 17Reconnaissance 20Vulnerability Scanners 21Social Engineering 21Credential Testing Tools 22Debuggers and Software Testing Tools 22Network Testing 23Remote Access 23Exploitation 24Steganography 24Cloud Tools 25Summary 25Exam Essentials 25Lab Exercises 26Activity 1.1: Adopting the Hacker Mindset 26Activity 1.2: Using the Cyber Kill Chain 26Review Questions 27CHAPTER 2 PLANNING AND SCOPING PENETRATION TESTS 31Scoping and Planning Engagements 34Assessment Types 35Known Environments and Unknown Environments 35The Rules of Engagement 37Scoping Considerations—A Deeper Dive 39Support Resources for Penetration Tests 42Penetration Testing Standards and Methodologies 44Key Legal Concepts for Penetration Tests 46Contracts 46Data Ownership and Retention 47Permission to Attack (Authorization) 47Environmental Differences and Location Restrictions 48Regulatory Compliance Considerations 49Summary 51Exam Essentials 52Lab Exercises 53Review Questions 54CHAPTER 3 INFORMATION GATHERING 59Footprinting and Enumeration 63OSINT 64Location and Organizational Data 65Infrastructure and Networks 68Security Search Engines 74Google Dorks and Search Engine Techniques 77Password Dumps and Other Breach Data 77Source Code Repositories 78Passive Enumeration and Cloud Services 78Active Reconnaissance and Enumeration 78Hosts 79Services 79Networks, Topologies, and Network Traffic 85Packet Crafting and Inspection 88Enumeration 90Information Gathering and Code 97Avoiding Detection 99Information Gathering and Defenses 99Defenses Against Active Reconnaissance 100Preventing Passive Information Gathering 100Summary 100Exam Essentials 101Lab Exercises 102Activity 3.1: Manual OSINT Gathering 102Activity 3.2: Exploring Shodan 102Activity 3.3: Running an Nmap Scan 103Review Questions 104CHAPTER 4 VULNERABILITY SCANNING 109Identifying Vulnerability Management Requirements 112Regulatory Environment 112Corporate Policy 116Support for Penetration Testing 116Identifying Scan Targets 117Determining Scan Frequency 118Active vs. Passive Scanning 120Configuring and Executing Vulnerability Scans 121Scoping Vulnerability Scans 121Configuring Vulnerability Scans 122Scanner Maintenance 129Software Security Testing 131Analyzing and Testing Code 131Web Application Vulnerability Scanning 133Developing a Remediation Workflow 138Prioritizing Remediation 140Testing and Implementing Fixes 141Overcoming Barriers to Vulnerability Scanning 141Summary 143Exam Essentials 143Lab Exercises 144Activity 4.1: Installing a Vulnerability Scanner 144Activity 4.2: Running a Vulnerability Scan 145Activity 4.3: Developing a Penetration Test Vulnerability Scanning Plan 145Review Questions 146CHAPTER 5 ANALYZING VULNERABILITY SCANS 151Reviewing and Interpreting Scan Reports 152Understanding CVSS 156Validating Scan Results 162False Positives 162Documented Exceptions 162Understanding Informational Results 163Reconciling Scan Results with Other Data Sources 164Trend Analysis 164Common Vulnerabilities 165Server and Endpoint Vulnerabilities 166Network Vulnerabilities 175Virtualization Vulnerabilities 181Internet of Things (IoT) 183Web Application Vulnerabilities 184Summary 186Exam Essentials 187Lab Exercises 188Activity 5.1: Interpreting a Vulnerability Scan 188Activity 5.2: Analyzing a CVSS Vector 188Activity 5.3: Developing a Penetration Testing Plan 189Review Questions 190CHAPTER 6 EXPLOITING AND PIVOTING 195Exploits and Attacks 198Choosing Targets 198Enumeration 199Identifying the Right Exploit 201Exploit Resources 204Exploitation Toolkits 206Metasploit 206PowerSploit 212BloodHound 213Exploit Specifics 213RPC/DCOM 213PsExec 214PS Remoting/WinRM 214WMI 214Fileless Malware and Living Off the Land 215Scheduled Tasks and cron Jobs 216SMB 217DNS 219RDP 220Apple Remote Desktop 220VNC 220SSH 220Network Segmentation Testing and Exploits 221Leaked Keys 222Leveraging Exploits 222Common Post-Exploit Attacks 222Cross Compiling 225Privilege Escalation 226Social Engineering 226Escaping and Upgrading Limited Shells 227Persistence and Evasion 228Scheduled Jobs and Scheduled Tasks 228Inetd Modification 228Daemons and Services 229Backdoors and Trojans 229Data Exfiltration and Covert Channels 230New Users 230Pivoting 231Covering Your Tracks 232Summary 233Exam Essentials 234Lab Exercises 235Activity 6.1: Exploit 235Activity 6.2: Discovery 235Activity 6.3: Pivot 236Review Questions 237CHAPTER 7 EXPLOITING NETWORK VULNERABILITIES 243Identifying Exploits 247Conducting Network Exploits 247VLAN Hopping 247DNS Cache Poisoning 249On-Path Attacks 251NAC Bypass 254DoS Attacks and Stress Testing 255Exploit Chaining 257Exploiting Windows Services 257NetBIOS Name Resolution Exploits 257SMB Exploits 261Identifying and Exploiting Common Services 261Identifying and Attacking Service Targets 262SNMP Exploits 263SMTP Exploits 264FTP Exploits 265Kerberoasting 266Samba Exploits 267Password Attacks 268Stress Testing for Availability 269Wireless Exploits 269Attack Methods 269Finding Targets 270Attacking Captive Portals 270Eavesdropping, Evil Twins, and Wireless On-Path Attacks 271Other Wireless Protocols and Systems 275RFID Cloning 276Jamming 277Repeating 277Summary 278Exam Essentials 279Lab Exercises 279Activity 7.1: Capturing Hashes 279Activity 7.2: Brute-ForcingServices 280Activity 7.3: Wireless Testing 281Review Questions 282CHAPTER 8 EXPLOITING PHYSICAL AND SOCIAL VULNERABILITIES 287Physical Facility Penetration Testing 290Entering Facilities 290Information Gathering 294Social Engineering 294In-Person Social Engineering 295Phishing Attacks 297Website-BasedAttacks 298Using Social Engineering Tools 298Summary 302Exam Essentials 303Lab Exercises 303Activity 8.1: Designing a Physical Penetration Test 303Activity 8.2: Brute-Forcing Services 304Activity 8.3: Using BeEF 305Review Questions 306CHAPTER 9 EXPLOITING APPLICATION VULNERABILITIES 311Exploiting Injection Vulnerabilities 314Input Validation 314Web Application Firewalls 315SQL Injection Attacks 316Code Injection Attacks 319Command Injection Attacks 319LDAP Injection Attacks 320Exploiting Authentication Vulnerabilities 320Password Authentication 321Session Attacks 322Kerberos Exploits 326Exploiting Authorization Vulnerabilities 327Insecure Direct Object References 327Directory Traversal 328File Inclusion 330Privilege Escalation 331Exploiting Web Application Vulnerabilities 331Cross-Site Scripting (XSS) 331Request Forgery 334Clickjacking 335Unsecure Coding Practices 335Source Code Comments 335Error Handling 336Hard-Coded Credentials 336Race Conditions 337Unprotected APIs 337Unsigned Code 338Steganography 340Application Testing Tools 341Static Application Security Testing (SAST) 341Dynamic Application Security Testing (DAST) 342Mobile Tools 346Summary 346Exam Essentials 347Lab Exercises 347Activity 9.1: Application Security Testing Techniques 347Activity 9.2: Using the ZAP Proxy 348Activity 9.3: Creating a Cross-Site Scripting Vulnerability 348Review Questions 349CHAPTER 10 ATTACKING HOSTS, CLOUD TECHNOLOGIES, AND SPECIALIZED SYSTEMS 355Attacking Hosts 360Linux 361Windows 365Cross-Platform Exploits 367Credential Attacks and Testing Tools 368Credential Acquisition 368Offline Password Cracking 369Credential Testing and Brute-Forcing Tools 371Wordlists and Dictionaries 371Remote Access 372SSH 372NETCAT and Ncat 373Metasploit and Remote Access 373Proxies and Proxychains 374Attacking Virtual Machines and Containers 374Virtual Machine Attacks 375Containerization Attacks 377Attacking Cloud Technologies 379Attacking Cloud Accounts 379Attacking and Using Misconfigured Cloud Assets 380Other Cloud Attacks 382Tools for Cloud Technology Attacks 383Attacking Mobile Devices 384Attacking IoT, ICS, Embedded Systems, and SCADA Devices 389Attacking Data Storage 392Summary 393Exam Essentials 395Lab Exercises 396Activity 10.1: Dumping and Cracking the Windows SAM and Other Credentials 396Activity 10.2: Cracking Passwords Using Hashcat 397Activity 10.3: Setting Up a Reverse Shell and a Bind Shell 398Review Questions 400CHAPTER 11 REPORTING AND COMMUNICATION 405The Importance of Communication 409Defining a Communication Path 409Communication Triggers 410Goal Reprioritization 410Recommending Mitigation Strategies 411Finding: Shared Local Administrator Credentials 412Finding: Weak Password Complexity 413Finding: Plaintext Passwords 414Finding: No Multifactor Authentication 414Finding: SQL Injection 416Finding: Unnecessary Open Services 416Writing a Penetration Testing Report 416Structuring the Written Report 417Secure Handling and Disposition of Reports 420Wrapping Up the Engagement 421Post-Engagement Cleanup 421Client Acceptance 421Lessons Learned 421Follow-UpActions/Retesting 422Attestation of Findings 422Retention and Destruction of Data 422Summary 423Exam Essentials 423Lab Exercises 424Activity 11.1: Remediation Strategies 424Activity 11.2: Report Writing 424Review Questions 425CHAPTER 12 SCRIPTING FOR PENETRATION TESTING 429Scripting and Penetration Testing 431Bash 432PowerShell 433Ruby 434Python 435Perl 435JavaScript 436Variables, Arrays, and Substitutions 438Bash 439PowerShell 440Ruby 441Python 441Perl 442JavaScript 442Comparison Operations 444String Operations 445Bash 446PowerShell 447Ruby 448Python 449Perl 450JavaScript 451Flow Control 452Conditional Execution 453for Loops 458while Loops 465Input and Output (I/O) 471Redirecting Standard Input and Output 471Comma-SeparatedValues (CSV) 472Error Handling 472Bash 472PowerShell 473Ruby 473Python 473Advanced Data Structures 474JavaScript Object Notation (JSON) 474Trees 475Reusing Code 475The Role of Coding in Penetration Testing 476Analyzing Exploit Code 476Automating Penetration Tests 477Summary 477Exam Essentials 477Lab Exercises 478Activity 12.1: Reverse DNS Lookups 478Activity 12.2: Nmap Scan 479Review Questions 480APPENDIX A ANSWERS TO REVIEW QUESTIONS 485Chapter 1: Penetration Testing 486Chapter 2: Planning and Scoping Penetration Tests 487Chapter 3: Information Gathering 489Chapter 4: Vulnerability Scanning 491Chapter 5: Analyzing Vulnerability Scans 493Chapter 6: Exploiting and Pivoting 495Chapter 7: Exploiting Network Vulnerabilities 497Chapter 8: Exploiting Physical and Social Vulnerabilities 499Chapter 9: Exploiting Application Vulnerabilities 501Chapter 10: Attacking Hosts, Cloud Technologies, and Specialized Systems 503Chapter 11: Reporting and Communication 505Chapter 12: Scripting for Penetration Testing 506APPENDIX B SOLUTION TO LAB EXERCISE 509Solution to Activity 5.2: Analyzing a CVSS Vector 510Index 511
Wahrheit und Fake im postfaktisch-digitalen Zeitalter
Die Zunahme von Fake News, die stärker werdende Beeinflussung von Wahlen, zunehmende Falschmeldungen und gezielte Desinformationskampagnen sind nicht zuletzt eine Folge der fortschreitenden Digitalisierung. Um diesen Fehlentwicklungen Einhalt zu gebieten, ist die Informationstechnik gefragt. Mit intelligenten Algorithmen und einer verfeinerten Datenanalyse müssen zukünftig Fakes schneller erkannt und deren Verbreitung verhindert werden. Um jedoch Fakes mittels künstlicher Intelligenz sinnvoll zu erkennen und zu filtern, muss es möglich sein, Fakes von Fakten, Fakten von Fiktionen und Fiktionen von Fakes zu unterscheiden.In diesem Buch werden daher auch Fragen nach den Distinktionen von Fake, Faktizität und Fiktionalität gestellt. Es wird auf die dahinter liegenden Wahrheitstheorien eingegangen und es werden praktisch-technische Möglichkeiten aufgezeigt, um Wahrheit von Falschheit zu differenzieren. Mit der Berücksichtigung des Fiktionalen sowie der Annahme, dass informationstechnische Weiterentwicklung von geisteswissenschaftlichen Erkenntnissen profitieren kann, hoffen die Autorinnen und Autoren, dass inhaltliche, technische und methodische Herausforderungen der Gegenwart und Zukunft bewältigt werden können.PETER KLIMCZAK (Dr. phil. et Dr. rer. nat. habil.) lehrt als Privatdozent Medien-, Kultur- und Technikwissenschaften an der Brandenburgischen Technischen Universität und forscht im Rahmen eines Feodor Lynen Research Fellowship an der University of Wroclaw. Er ist Autor zahlreicher Publikationen zum Einsatz künstlicher Sprachen in den Medien- und Kulturwissenschaften, zu digitalen und sozialen Medien sowie zu kognitiven Systemen und künstlicher Intelligenz.THOMAS ZOGLAUER (Dr. phil. habil.) lehrt als außerplanmäßiger Professor Philosophie an der Brandenburgischen Technischen Universität und als Lehrbeauftragter an den Universitäten Freiburg und Stuttgart. Er ist Autor zahlreicher Bücher zur Technikphilosophie, Logik und angewandten Ethik. Einleitung - Wahrheitsrelativismus, Wissenschaftsskeptizismus und die politischen Folgen - Von Fakes und Frauds: Können wissenschaftliche „Hoaxes“ ein legitimes Erkenntnisinstrument sein? - Fiction, Fake and Fact - Stranger than Fiction - Die marxistisch-leninistische Faschismusdefinition und der Mauerbau - Vorsicht: mögliche „Fake News“ – ein technischer Ansatz zur frühen Erkennung - Fake News technisch begegnen – Detektions- und Behandlungsansätze zur Unterstützung von NutzerInnen - NewsDeps: Visualizing the Origin of Information in News Articles
Modeling and Optimization in Software-Defined Networks
THIS BOOK PROVIDES A QUICK REFERENCE AND INSIGHTS INTO MODELING AND OPTIMIZATION OF SOFTWARE-DEFINED NETWORKS (SDNS). It covers various algorithms and approaches that have been developed for optimizations related to the control plane, the considerable research related to data plane optimization, and topics that have significant potential for research and advances to the state-of-the-art in SDN.Over the past ten years, network programmability has transitioned from research concepts to more mainstream technology through the advent of technologies amenable to programmability such as service chaining, virtual network functions, and programmability of the data plane. However, the rapid development in SDN technologies has been the key driver behind its evolution.The logically centralized abstraction of network states enabled by SDN facilitates programmability and use of sophisticated optimization and control algorithms for enhancing network performance, policy management, and security.Furthermore, the centralized aggregation of network telemetry facilitates use of data-driven machine learning-based methods. To fully unleash the power of this new SDN paradigm, though, various architectural design, deployment, and operations questions need to be addressed. Associated with these are various modeling, resource allocation, and optimization opportunities.The book covers these opportunities and associated challenges, which represent a ``call to arms'' for the SDN community to develop new modeling and optimization methods that will complement or improve on the current norms.* Preface* Acknowledgments* Introduction* SDN Control Plane Optimization* SDN Data Plane Optimization* Future Research Directions* Bibliography* Authors' Biographies
Cloud Defense Strategies with Azure Sentinel
Use various defense strategies with Azure Sentinel to enhance your cloud security. This book will help you get hands-on experience, including threat hunting inside Azure cloud logs and metrics from services such as Azure Platform, Azure Active Directory, Azure Monitor, Azure Security Center, and others such as Azure Defender's many security layers.This book is divided into three parts. Part I helps you gain a clear understanding of Azure Sentinel and its features along with Azure Security Services, including Azure Monitor, Azure Security Center, and Azure Defender. Part II covers integration with third-party security appliances and you learn configuration support, including AWS. You will go through multi-Azure Tenant deployment best practices and its challenges. In Part III you learn how to improve cyber security threat hunting skills while increasing your ability to defend against attacks, stop data loss, prevent business disruption, and expose hidden malware. You will get an overview of the MITRE Attack Matrix and its usage, followed by Azure Sentinel operations and how to continue Azure Sentinel skill improvement.After reading this book, you will be able to protect Azure resources from cyberattacks and support XDR (Extend, Detect, Respond), an industry threat strategy through Azure Sentinel.WHAT YOU WILL LEARN* Understand Azure Sentinel technical benefits and functionality* Configure to support incident response* Integrate with Azure Security standards* Be aware of challenges and costs for the Azure log analytics workspaceWHO THIS BOOK IS FORSecurity consultants, solution architects, cloud security architects, and IT security engineersMARSHALL COPELAND is a Senior Consultant focused on Cyber Security in Azure public cloud defensive deployments using Azure cloud native and third-party cyber solutions. His work focuses on security in customers hybrid cloud deployments, Secure DevOps and security partner cloud integrations that enhance “blue team hunting” efficiencies. Marshall currently works at Microsoft Corporation supporting enterprise customers security teams using Azure security services for hybrid network security management and data protection. He previously worked in cloud security roles at Optiv Security, and Salesforce. PART I (PAGE COUNT 100)GOALS: Introduction to Azure Sentinel es with technical featurthat benefit the business. Initial configuration using Azure subscription data connectors, discuss 3rd party integration and alignment with other Azure Security Services. XDR introduction, why it is an industry standard and how to use it in Sentinel.SUB-TOPICS1. Overview of Technical Features2. Benefit and cost support for the business, initial configuration3. Azure Defender support into Azure Sentinel4. Azure Security Center support into Azure SentinelCHAPTER 1 AZURE SENTINEL OVERVIEWPlatform benefits, SOC security reference, alignment to Cyber framework, Log Analytics planning, cost structureCHAPTER 2 OTHER AZURE SECURITY SERVICESAzure Monitor, Azure Security Center, Azure Defender, working together to support Azure SentinelCHAPTER 3 AZURE SENTINEL XDR CAPABILITIESIntegration with Azure Security standards, protection for additional Azure workloads, guidance for XDR and how it should be used to modernize security operations.PART II (PAGE COUNT 100)GOALS: Deployment best practices, platform integration and support for AWSSUB - TOPICS1. Enable integration with 3rd party security appliances2. Configure support for AWS3. Multi-Azure Tenant deployment best practicesCHAPTER 4 DATA CONNECTIONSingle Tenant: Data connectors native, Log Analytics storage options, 3rd party data, KQL validation processes, AWS connection, Service NOW integrationCHAPTER 5 THREAT INTELLIGENCE (TI)TI connectors and feeds, Sentinel Workbooks introduction, Sentinel Notebook usage, Python integrationCHAPTER 6 MULTI-TENANT ARCHITECTUREChallenges and cost of Azure log analytics workspace, KQL modification requirements, SOC alignment neededPART III (PAGE COUNT 100)GOALS: Improve Cyber Security Threat Hunting TechniquesSUB - TOPICS:1. Threat Hunting with KQL Language deep dive with examples2. Integration with MITRE attack Matrix and support for TAXII3. Data flow examples: User logon, track and validate. Stop network connection to China, etc.4. Configuration changes needed for multiple Sentinel deploymentsCHAPTER 7 THREAT HUNTING WITH AZURE SENTINELKQL Hunting introduction, custom queries, Sentinel bookmarks, Sentinel notebooksCHAPTER 8 INTRODUCTION TO MITRE MATRIXMITRE Attack Matrix overview and usage, STIX defined, TAXII defined, free TI -vs- service SLACHAPTER 9 AZURE SENTINEL OPERATIONSDaily, Weekly, Monthly tasks, SOC engineer alignment, Continued SOC operations support from official Microsoft supported forumCHAPTER APPENDIX:CHAPTER GOAL: WHERE TO GAIN ADDITIONAL KNOWLEDGE FOR AZURE SENTINELNO OF PAGES: 20SUB - TOPICS:1. Guidance to continue Azure Sentinel skill improvement2. Relating information to Cyber Security standards
A Greater Foundation for Machine Learning Engineering
This research scholarly illustrated book has more than 250 illustrations. The simple models of supervised machine learning with Gaussian Naïve Bayes, Naïve Bayes, decision trees, classification rule learners, linear regression, logistic regression, local polynomial regression, regression trees, model trees, K-nearest neighbors, and support vector machines lay a more excellent foundation for statistics. The author of the book Dr. Ganapathi Pulipaka, a top influencer of machine learning in the US, has created this as a reference book for universities. This book contains an incredible foundation for machine learning and engineering beyond a compact manual. The author goes to extraordinary lengths to make academic machine learning and deep learning literature comprehensible to create a new body of knowledge. The book aims at readership from university students, enterprises, data science beginners, machine learning and deep learning engineers at scale for high-performance computing environments. A Greater Foundation of Machine Learning Engineering covers a broad range of classical linear algebra and calculus with program implementations in PyTorch, TensorFlow, R, and Python with in-depth coverage. The author does not hesitate to go into math equations for each algorithm at length that usually many foundational machine learning books lack leveraging the JupyterLab environment. Newcomers can leverage the book from University or people from all walks of data science or software lives to the advanced practitioners of machine learning and deep learning. Though the book title suggests machine learning, there are several implementations of deep learning algorithms, including deep reinforcement learning.The book's mission is to help build a strong foundation for machine learning and deep learning engineers with all the algorithms, processors to train and deploy into production for enterprise-wide machine learning implementations. This book also introduces all the concepts of natural language processing required for machine learning algorithms in Python. The book covers Bayesian statistics without assuming high-level mathematics or statistics experience from the readers. It delivers the core concepts and implementations required with R code with open datasets. The book also covers unsupervised machine learning algorithms with association rules and k-means clustering, metal-learning algorithms, bagging, boosting, random forests, and ensemble methods.The book delves into the origins of deep learning in a scholarly way covering neural networks, restricted Boltzmann machines, deep belief networks, autoencoders, deep Boltzmann machines, LSTM, and natural language processing techniques with deep learning algorithms and math equations. It leverages the NLTK library of Python with PyTorch, Python, and TensorFlow's installation steps, then demonstrates how to build neural networks with TensorFlow. Deploying machine learning algorithms require a blend of cloud computing platforms, SQL databases, and NoSQL databases. Any data scientist with a statistics background that looks to transition into a machine learning engineer role requires an in-depth understanding of machine learning project implementations on Amazon, Google, or Microsoft Azure cloud computing platforms. The book provides real-world client projects for understanding the complete implementation of machine learning algorithms.This book is a marvel that does not leave any application of machine learning and deep learning algorithms. It sets a more excellent foundation for newcomers and expands the horizons for experienced deep learning practitioners. It is almost inevitable that there will be a series of more advanced algorithms follow-up books from the author in some shape or form after setting such a perfect foundation for machine learning engineering.
Beginning IoT Projects
Experiment with building IoT projects without the demanding time or patience required to learn about electronics. This book thoroughly introduces readers of all ages to the world of IoT devices and electronics without getting bogged down by the overly technical aspects or being tied to a specific platform. You'll learn IoT, Arduino, Raspberry Pi from the ground up using the Qwiic and Grove components systems.The book begins with a brief overview of IoT followed by primers for the two most popular platforms; Arduino and Raspberry Pi. There is also a short tutorial on programming each host; Arduino C-like sketches and Python scripts respectfully. Thus, the book also helps you get started with your choice of platform. Next, you’ll learn the basics for the Qwiic and Grove component systems.The rest of the book presents a number of projects organized into easy-to-follow chapters that details the goal for the project, the components used, a walk-through of the code, and a challenge section that provides suggestions on how to improve or augment the project. Projects are presented for both the Arduino and Raspberry Pi where possible making each project as versatile as possible.WHAT YOU'LL LEARN* Write Arduino sketches* Create Python scripts for the Raspberry Pi* Build IoT projects with Arduino and Raspberry Pi* Use the Qwiic and Grove component systems* Join the electronics and IoT hobby world with almost no experience* Host projects data in the cloud using ThingSpeakWHO THIS BOOK IS FORThose interested in building or experimenting with IoT solutions but have little or no experience working with electronics. This includes those with little or no programming experience. A secondary target would include readers interested in teaching the basics of working with Arduino and Raspberry Pi to others.Charles Bell conducts research in emerging technologies. He is a member of the Oracle MySQL Development team and is a Principal Developer for the MySQL Cloud Services team. He lives in a small town in rural Virginia with his loving wife. He received his Doctor of Philosophy in Engineering from Virginia Commonwealth University in 2005. Dr. Bell is an expert in the database field and has extensive knowledge and experience in software development and systems engineering. His research interests include 3D printers, microcontrollers, three-dimensional printing, database systems, software engineering, and sensor networks. He spends his limited free time as a practicing Maker focusing on microcontroller projects and refinement of three-dimensional printers.Part 1 - Getting Started with IoT.- Chapter 1. Introduction to IoT.- Chapter 2. Introducing the Arduino.- Chapter 3. Arduino Programming .- Chapter 4. Introducing the Raspberry Pi.- Chapter 5. Python Programming for the Raspberry Pi.- Part 2 - The Qwiic Component System.- Chapter 6. Introducing Qwiic, STEMMA, and QT.- Chapter 7. Qwiic Example: Keep your distance!.- Chapter 8. Qwiic Example: Weather Station.- Chapter 9. Qwiic Example: Digital Compass.- Chapter 10. STEMMA and Qwiic Example: Plant Monitoring.- Chapter 11. STEMMA and Qwiic Example: Balancing Act.- Part 3 - The Grove Component System.- Chapter 12. Introducing Grove.- Chapter 13. Example: Knock-Knock!.- Chapter 14. Example: Mood Lighting.- Chapter 15. Example: Monitoring your Environment.- Chapter 16. Example: Simon Game.- Part 4: Going Further: IoT and the Cloud.- Chapter 17. Introducing IoT for the Cloud.- Chapter 18. Using ThingSpeak.- Appendix.
Reinzeichnung - Das umfassende Handbuch
Reinzeichner und Reinzeichnerinnen erstellen perfekt druckfähige und optisch einwandfreie Druckdaten. Klingt einfach? Bei Weitem nicht. Denn ein breit gefächertes Wissen zu technischen Hintergründen, Farbmanagement, Farbe, Typografie und Ausgabe sowie zur Druckproduktion ist hier nötig. Dieses Buch von Daniel Schulte ist das erste, das alle relevanten Informationen versammelt. Es ist für Einsteiger systematisch aufbereitet, aber auch für alte Grafikdesign-Hasen sehr nützlich: Das Handbuch gibt klare Empfehlungen und Checklisten, bietet Hinweise auf Stolperfallen und beachtet alle neuen Standards der Branche. Aus dem Inhalt: Aufgaben der ReinzeichnungFarbmanagement und Farbeinstellungen in der Adobe Creative CloudGrundeinstellungen in InDesign FarbeSchrift und MikrotypografieEinstellungen für Bilder und VektorenFortgeschrittene InDesign-Funktionen nutzenReinzeichnung in IllustratorAusgabeHintergrundwissen Druckproduktion Leseprobe (PDF-Link)
Einstieg in Kotlin - Apps entwickeln mit Android Studio (2. Auflage)
Einfach und strukturiert ohne Vorkenntnisse Kotlin lernen. Mit IntelliJ IDEA lernen Sie die Sprache kennen und steigen dann in die App-Entwicklung mit Android Studio ein – so entwickeln Sie eigene Apps samt Zugriff auf verschiedenste Sensoren, Datenbanken und Multimedia. Kotlin ist Googles bevorzugte Sprache für die App-Entwicklung und zu Recht beliebt: Nicht nur Java-Kenner werden an den modernen Sprach-Features ihre Freude haben. Und für Programmierer ist Kotlin genau das Richtige für den Einstieg in die App-Entwicklung. Aus dem Inhalt:Alle Grundlagen der ProgrammierungIntelliJ IDEA und Android Studio installierenVerzweigungen, Schleifen und Co.Funktionen und funkionale ProgrammierungLayouts und Menüs aufbauenStandard-DialogeSensoren nutzenSystemdienste integrierenSpiele und Trainings entwickelnDatenbanken zur SpeicherungGestensteuerungZugriffsrechte verwaltenAutor: Thomas Theis ist Dipl.-Ing. Technische Informatik. Als Softwareentwickler verfügt er über langjährige Erfahrung, ebenso als IT-Dozent, unter anderem an der Fachhochschule Aachen. Als Kenner vieler verschiedener Programmiersprachen leitet er Seminare zur Programmierung und ist Autor vieler erfolgreicher Fachbücher. Leseprobe (PDF Link)
Docs for Developers
Learn to integrate programming with good documentation. This book teaches you the craft of documentation for each step in the software development lifecycle, from understanding your users’ needs to publishing, measuring, and maintaining useful developer documentation.Well-documented projects save time for both developers on the project and users of the software. Projects without adequate documentation suffer from poor developer productivity, project scalability, user adoption, and accessibility. In short: bad documentation kills projects.Docs for Developers demystifies the process of creating great developer documentation, following a team of software developers as they work to launch a new product. At each step along the way, you learn through examples, templates, and principles how to create, measure, and maintain documentation—tools you can adapt to the needs of your own organization.WHAT YOU'LL LEARN* Create friction logs and perform user research to understand your users’ frustrations* Research, draft, and write different kinds of documentation, including READMEs, API documentation, tutorials, conceptual content, and release notes* Publish and maintain documentation alongside regular code releases* Measure the success of the content you create through analytics and user feedback* Organize larger sets of documentation to help users find the right information at the right timeWHO THIS BOOK IS FORIdeal for software developers who need to create documentation alongside code, or for technical writers, developer advocates, product managers, and other technical roles that create and contribute to documentation for their products and services.Jared BhattiJared is a Staff Technical Writer at Alphabet, and the co-founder of Google’s Cloud documentation team. He’s worked for the past 14 years documenting an array of projects at Alphabet, including Kubernetes, App Engine, Adsense, Google’s data centers, and Google’s environmental sustainability efforts. He currently leads technical documentation at Waymo and mentors several junior writers in the industry.Zachary Sarah CorleissenZach began this book as the Lead Technical Writer for the Linux Foundation and ended it as Stripe’s first Staff Technical Writer. Zach served as co-chair for Kubernetes documentation from 2017 until 2021, and has worked on developer docs previously at GitHub, Rackspace, and several startups. They enjoy speaking at conferences and love to mentor writers and speakers of all abilities and backgrounds.Heidi WaterhouseHeidi spent a couple decades at Microsoft, Dell Software, and many, many startups learning to communicate with and for developers. She currently works as a principal developer advocate at LaunchDarkly, but was reassured to find that technical communication is universal across all roles.David NunezDavid heads up the technical writing organization at Stripe, where he founded the internal documentation team and wrote for Increment magazine. Before Stripe, he founded and led the technical writing organization at Uber and held a documentation leadership role at Salesforce. Having led teams that have written about cloud, homegrown infrastructure, self-driving trucks, and economic infrastructure, he’s studied the many ways that technical documentation can shape the user experience. David also acts as an advisor for several startups in the knowledge platform space.Jen LambourneJen leads the technical writing and knowledge management discipline at Monzo Bank. Before her foray into fintech, she led a community of documentarians across the UK government as Head of Technical Writing at the Government Digital Service (GDS). Having moved from government to finance, she recognizes she’s drawn to creating inclusive and user-centred content in traditionally unfriendly industries. She likes using developer tools to manage docs, demystifying the writing process for engineers, mentoring junior writers, and presenting her adventures in documentation at conferences.* Getting Started* Researching documentation* Understanding your users* Cultivating empathy* Understanding user desires, user needs, and company needs* Recruiting users for research* Research methods* Reading code comments* Trying it outFriction logs* Running diverse and inclusive focus groups and interviews* User journey mapping* Identifying and working with stakeholders* Finding your experts* Collaborative documentation development* Learning from existing content* The value of design documents* Finding examples in industry* Designing documentation* Defining your initial set of content* Deciding your minimum viable documentation* Drafting test and acceptance criteria* Understanding content types* Concepts, tutorials and reference documentation* Code comments* API specificationsREADMEs* Guides* Release notes* Drafting documentation* Setting yourself up for writing success* Who is this for? Personas, requirements, content types* Definition of done* How to iterateTools and tips for writing rough drafts* Understanding your needs* Choosing your writing tools (handwriting, text-only, productivity/measurement writing tools)* “Hacks” to get started drafting content* Mechanics* Headings* Paragraphs* ListsNotes and warnings* Conclusions/tests* Using templates to form drafts* Purpose of a template* How to derive a template from existing docsHow to take templates into text* Gathering initial feedback* Feedback methods* Integrating feedback* Getting feedback from difficult contributorsEditing content for publication* Determine destination* Editing tools (Grammarly, linters, etc)* Declaring good enough* Recap, strategies, and reassuranceStructuring sets of documentation* Where content types live* Concepts, tutorials and reference documentation* Code comments* API specificationsREADMEs* Guides* Release notes* Designing your information architecture* Content information architecture styles* Designing for search* Creating clear, well-lit paths through content* User testing and maintenance* Planning for document automation* Integrating code samples and visual content* Integrating code samples* When and why to use code samples* Creating concise, usable, maintainable samples* Standardising your samples* Using visual content: Screenshots, diagrams, and videos* When your documentation may need visual content* Making your visual content accessible* Integrating screenshots, diagrams* Videos* Measuring documentation success* How documentation succeeds* Measuring different types of documentation quality* Structural Quality* Functional Quality* Process Quality* Measuring what you want to changeDrawing conclusions from document metrics* Working with contributors* Defining how decisions are made* Deciding on a governance structure* Writing an effective Code of Conduct* Choosing a content licence* Code licenses* Content licencesBuilding and enforcing a style guide* Editing submitted content and giving feedback* Setting acceptability criteria* Editing for accessibility and inclusion* Editing for internationalization and translation* Giving actionable feedback* Planning and running a document sprint* Maintaining documentation* Creating a content review processes* Assigning document owners* Performing freshness checks on contentResponding to documentation issues* Separating documentation issues from product issues* Responding to users* Automating document maintenance* Automating API and reference content* Using doc linters* Deleting and archiving content* Wrapping up
Cloud Native Architecture and Design
Build enterprise-grade cloud-native systems and learn all about cloud-native architecture and design. This book provides extensive in-depth details of patterns, tools, techniques, and processes with plenty of examples.Cloud Native Architecture and Design begins by explaining the fundamentals of cloud-native architecture and services, what cloud principles and patterns to use, and details of designing a cloud-native element.The book progresses to cover the details of how IT systems can modernize to embrace cloud-native architecture, and also provides details of various enterprise assessment techniques to decide what systems can move and cannot move into the cloud.Architecting and designing a cloud-native system isn’t possible without modernized software engineering principles, the culture of automation, and the culture of innovation. As such, this book covers the details of cloud-native software engineering methodologies, and process, and how to adopt an automated governance approach across enterprises with the adoption of artificial intelligence.Finally, you need your cloud-native applications to run efficiently; this section covers the details of containerization, orchestration, and virtualization in the public, private, and hybrid clouds.After reading this book, you will have familiarity with the many concepts related to cloud-native and understand how to design and develop a successful cloud-native application. Technologies and practices may change over time, but the book lays a strong foundation on which you can build successful cloud-native systems.WHAT YOU WILL LEARNDiscover cloud-native principles and patterns, and how you can leverage them to solve your business problems * Gain the techniques and concepts you need to adapt to design a cloud-native applicationUse assessment techniques and tools for IT modernization * Apply cloud-native engineering principles to the culture of automation and culture of innovationHarness the techniques and tools to run your cloud-native applications and automate infrastructure* Operate your cloud-native applications by using AI techniques and zero operation techniques WHO THIS BOOK IS FORSoftware architects, leaders, developers, engineers, project managers, and students.SHIVAKUMAR R GONIWADA is an enterprise architect, technology leader, and inventor with more than 23 years of experience in architecting enterprise architecture with cloud-native, event-driven systems. He currently works at Accenture and leads a highly experienced technology enterprise and cloud architects. In his 23 years of experience, he led many highly complex projects across industries and the globe. He has ten software patents to his name in the areas of cloud, polyglot and polylithic architecture, software engineering, and IoT. He is a speaker at multiple global and in-house conferences. He holds Master Technology Architecture Accenture, Google Professional, AWS, and data science certifications. He completed an executive MBA at MIT Sloan School of Management.PART I: CLOUD NATIVE JOURNEY, PRINCIPLES & PATTERNS1. Introduction to Cloud Native Architecture2. Cloud Native Services3. Cloud Native Architecture Principles4. Cloud Native Architecture & Design PatternsPART II: ELEMENTS OF CLOUD NATIVE ARCHITECTURE & DESIGN5. Microservices Architecture & Design6. Event Driven Architecture7. Serverless Architecture8. Cloud Native Data Architecture9. Designing for “-ilities”PART III: MODERNIZING AN ENTERPRISE IT SYSTEMS10. Modernize Monolithic Application to Cloud Native11. Enterprise IT Systems Assessment to Decide Cloud Native Journey12. Cloud Native Architecture Fitness CheckPART IV: CLOUD NATIVE SOFTWARE ENGINEERING13. Developing an Enterprise Systems for Cloud Native14. Automation in an Enterprise Cloud-Native Journey15. AI Driven DevelopmentPART V: CLOUD NATIVE INFRASTRUCTURE16. Containerization and Virtualization17. Automation in InfrastructurePART VI: CLOUD NATIVE OPERATION18. Intelligent Operation19. ObservabilityPART VII: CLOUD NATIVE FEATURE20. Cloud Native Supported Future Technologies
Programming Arduino Projects with the PIC Microcontroller
Now that you’ve built a few Arduino projects, and reused some pre-written sketches, it’s time to move on to the next step and explore the world of embedded programming. To truly up-skill, you'll need to understand how your code works, and that's where this book comes in.You'll review and work with several Arduino projects plus two extra ones written for a PIC microcontroller. Each one is accompanied with a basic circuit diagram and photos of the program working. Ideal for the Arduino hobbyist and PIC programmers who want to merge their skills, this comprehensive book will go over every aspect of the 8-bit microcontroller, provide line-by-line analysis of the code, and in the end, show you how to bring your Arduino projects to the PIC microcontroller using C. You'll gain a full understanding of how the C instructions work and can be used with the PIC microcontroller.Programming Arduino Projects with the PIC Microcontroller is your one-stop reference resource.WHAT YOU’LL LEARN* Examine how the code works * Create code to perform any function* Build practical projects on vero boards with full vero plans and circuit diagrams* Understand how programs work by simulation with an ECAD package WHO THIS BOOK IS FORWould-be embedded programmers, Arduino hobbyists, and PIC programmers.Hubert Ward has been a college lecturer since 1993 and over 24 years experience teaching at the Higher National Certificate and The Higher Diploma in Electrical & Electronic Engineering. Hubert has also spent time as a consultant in embedded programming in assembler language and C and was the UK technical expert in Mechatronics where he trained the UK team for the Skills Olympics in Seoul 2001. Hubert Ward is also happily married to his wife Ann and with whom he has two wonderful children, Claire and Vincent.Preface: The Arduino ProgramsChapter 1: IntroductionThis chapter will set up the basics and cover the following:• What is a microcontroller• What are the main differences between the Arduino and the PIC• What are the aims and objectives of this book• How the book will workEach chapter looks at a different Arduino project creating a practical circuit built of vero board with the full program listing.Each program will have a full line by line analysis of all new instructions detailing how they work and what they are doing.Chapter 2: What You Will Need• What you will need to use the book, such as a minimal approach; where the reader can just try the programming at no cost by simulation within MPLABX. Then use an inexpensive PIC programming option at around £30 to a full prototype board costing from around £70 to £150.• An introduction to MPLABX as to what it is and how you create a project and simulate a simple program.Chapter 3: Our First Programs• We start with the first projects: Flashing a simple LED• Running a simple seven segment display.• As we write these programs we will look at creating our first header file for the configuration words.• As we use new instructions; as this is the first program all the instructions will be new, we explain how the instructions work and how they can be used to achieve what we want.• We will look at building the circuit on vero board by drawing the circuit diagram , the vero board plan what components and how they work and how to solder them.Chapter 4: The 7 Segment Display and the 8by8 Matrix Display• This will look at the next two projects: The 4 seven segment display & 8by8 Matrix Display• This will mean we will look at the ADC module how it works and how we use it. Also we will look at the LCD with a full explanation of how it works and how we use it. We will also make our second header file for the LCD. We will also look at arrays and how we can use them.Chapter 5: The Joystick Controller, The Ultrasonic and PIR Sensors• This will look at two more projects: the Joystick control and the Ultrasonic and PIR Sensors• The stepper motor linking that with the joystick control.• The ultrasonic sensor linking it with the buzzer.Chapter 6: The Servo Motor and The Rotary EncoderThis will look at three more projects• The servo motor• The rotary encoder.• The RGB led• This will look at PWM as to how we can use it to create a square wave and the compare aspect of the CCP module.Chapter 7: Interrupts and a RTC and The DS1307 RTC Module• This will look at a real time clock using interrupts and an external crystal. It will then look at the DS1307 RTC Module.• This will explain what interrupts are and how they work and how we can use them.Chapter 8: The DHT11 Humidity and Temperature Sensor and SPI and I2C Communication• This will look at the DHT11 humidity and temperature sensor. It will also look at the TC72 and TC74 temperature sensors.• This will look at SPI and I2C comms.Chapter 9: The USART and Bluetooth Communication With HC-06 Module• This will look at the USART in the PIC. How they work and how they can be used. This will move onto how we can use the HC-06 bluetooth module to send the temperature readings from the TC72 and TC74 to your mobile phone.Chapter 10: DC Motors and Using a Keypad• This will look at the DC motor and fan.• It will also look at a 3 by 4 keypad and the 4 by 4 membrane keypad.Chapter 11: Understanding Those Obscure C Instructions and Logic Operators• This will look at some of the more obscure C program and a full range of logic instructions. This will use the simulation aspect of the MPLABX software to test and prove how the instructions work.
Pro Exchange 2019 and 2016 Administration
__Use this one-stop resource for both basic and advanced administration of Exchange Server 2019 and 2016. It will help you in running an Exchange environment, whether it be 100% on-premises or a hybrid configuration with Exchange Online (as part of Office 365).This revised version is divided into four parts, describing Exchange infrastructure, upgrading Exchange server, integration with Office 365, and security and compliance. In the first part, you will go through a short introduction of Exchange server followed by its installation and configuration. You will learn client access along with Exchange mailbox and managing Exchange recipients. In the second part, you will learn how to upgrade from Exchange 2010 to 2016 and from 2013 to Exchange 2019. The third part is dedicated to the Exchange integration with Office 365, followed by the last part that teaches you how to secure your Exchange environment and its compliance.After reading this book, you will understand best practices, do’s and don’ts, and notes from the field to migrate and work on Exchange 2016 and 2019.WHAT YOU WILL LEARN* Create a highly available and redundant Exchange environment* Understand security, message hygiene (CEO fraud, for example), and compliance* Know the infrastructure changes in Exchange 2019* Integrate and manage hybrid recipientsWHO THIS BOOK IS FORIT pros who are responsible for building and maintaining an Exchange environment, both on-premises and in a hybrid configuration with Exchange OnlineMICHEL DE ROOIJ is a consultant and Microsoft MVP since 2013. He lives in The Netherlands, and has been working in the IT industry for over 20 years. Michel helps customers with their journeys related to Microsoft 365, with a focus on Exchange and Identity, but also related technologies such as Microsoft Teams or e-mail in general. Michel has a developer background, but after some long-term dedicated Exchange-related work for a large multinational switched to Exchange and never looked back. Michel is also a big fan of automating processes and procedures related to infrastructure, being either supporting projects or automating administrator tasks. Michel is also active in online communities, such as Tech Community, or on social media such as Twitter (@mderooij). He runs an Exchange-related blog at eightwone.com, guest authors for several other sites, and speaks at international events.JAAP WESSELIUS is an independent consultant based in The Netherlands. As a consultant, Jaap has been working with Exchange server since Exchange 5.0 in 1997. After working for Microsoft, he became an independent consultant in 2006. For his work in the (Exchange) community, Jaap has received a Microsoft MVP award 2007, an award he still holds in 2021. The first MVP category was Exchange server, but over the years that has changed to Office Apps and Services. Besides working with Exchange, Jaap also works with Office 365, identity management, privacy, and security. Jaap is 54 years old, married, has three (almost) grown-up sons, and likes to ride his motorcycle, when possible.SECTION 1 - EXCHANGE INFRASTRUCTURE1. INTRODUCTION1.1. History of Exchange server1.2. Exchange 2016 or Exchange 2019?1.3. Exchange Admin Center1.4. PowerShell1.5. Exchange and Active Directory2. INSTALLING AND CONFIGURING EXCHANGE2.1. Designing the Exchange environment2.2. Testing the Exchange environment2.3. Building the Exchange environment2.4. Exchange Edge Transport Server2.5. Cumulative Updates3. EXCHANGE AND CLIENT ACCESS3.1. Clients3.2. Outlook on the Web3.3. Outlook3.4. Autodiscover3.5. Exchange Web Services3.6. ActiveSync3.7. Namespaces3.8. Virtual Directories3.9. Certificates3.10. Client Access High Availability4. EXCHANGE MAILBOX AND MAILBOX SERVER4.1. Mailbox databases4.2. Backup and Restore4.3. High Availability4.4. Mailbox database High Availability5. MANAGING EXCHANGE RECIPIENTS5.1. Managing Recipients5.2. Mailboxes5.3. Distribution Groups5.4. Contacts5.5. Public Folders5.6. Address Lists5.7. Global Address List5.8. Custom Address List5.9. Offline Address Books5.10. Address Book Policies6. Exchange Transport6.1. Transport pipeline6.2. Send and Receive Connectors6.3. SMTP Relay6.4. Edge Transport server6.5. Load balancing transportSECTION 2 - UPGRADING EXCHANGE SERVER7. Upgrading from Exchange 2010 to Exchange 20167.1. Preparing Active Directory7.2. Installing the Exchange servers7.3. Change client access7.4. Move Mailboxes7.5. Move Public Folders7.6. Decommission Exchange 20108. Upgrading from Exchange 2013 to Exchange 20198.1. Preparing AD en Installing Exchange is identical to 7.1 and 7.28.2. Client access in 2013/2019 coexistence8.3. Move Mailboxes and Public Folders8.4. Decommission Exchange 2013SECTION 3 - INTEGRATION WITH OFFICE 3659. Exchange Hybrid9.1. Identities and source of authority9.2. Managing Hybrid Recipients9.3. Federation9.4. Federation with other organizations9.5. Organizational relationships9.6. Sharing policies9.7. Directory Synchronization9.8. Exchange Hybrid Configuration Wizard9.9. Autodiscover continued9.10. Mailflow in coexistence9.11. Exchange Online Protection9.12. Modern Authentication9.13. Bulk EmailSECTION 4 - SECURITY AND COMPLIANCE10. Securing your Exchange environment10.1. Hybrid Modern Authentication10.2. Message hygiene10.3. Multi Factor Authentication10.4. Role Based Access Control11. Compliance11.1. Archiving11.2. Journaling11.3. In-place hold11.4. In-place eDiscovery11.5. Messaging Records management11.6. Data Loss Prevention11.7. Auditing11.8. Reporting
Person Re-Identification with Limited Supervision
PERSON RE-IDENTIFICATION IS THE PROBLEM OF ASSOCIATING OBSERVATIONS OF TARGETS IN DIFFERENT NON-OVERLAPPING CAMERAS. Most of the existing learning-based methods have resulted in improved performance on standard re-identification benchmarks, but at the cost of time-consuming and tediously labeled data. Motivated by this, learning person re-identification models with limited to no supervision has drawn a great deal of attention in recent years.In this book, we provide an overview of some of the literature in person re-identification, and then move on to focus on some specific problems in the context of person re-identification with limited supervision in multi-camera environments. We expect this to lead to interesting problems for researchers to consider in the future, beyond the conventional fully supervised setup that has been the framework for a lot of work in person re-identification.Chapter 1 starts with an overview of the problems in person re-identification and the major research directions. We provide an overview of the prior works that align most closely with the limited supervision theme of this book. Chapter 2 demonstrates how global camera network constraints in the form of consistency can be utilized for improving the accuracy of camera pair-wise person re-identification models and also selecting a minimal subset of image pairs for labeling without compromising accuracy. Chapter 3 presents two methods that hold the potential for developing highly scalable systems for video person re-identification with limited supervision. In the one-shot setting where only one tracklet per identity is labeled, the objective is to utilize this small labeled set along with a larger unlabeled set of tracklets to obtain a re-identification model. Another setting is completely unsupervised without requiring any identity labels. The temporal consistency in the videos allows us to infer about matching objects across the cameras with higher confidence, even with limited to no supervision. Chapter 4 investigates person re-identification in dynamic camera networks. Specifically, we consider a novel problem that has received very little attention in the community but is critically important for many applications where a new camera is added to an existing group observing a set of targets. We propose two possible solutions for on-boarding new camera(s) dynamically to an existing network using transfer learning with limited additional supervision. Finally, Chapter 5 concludes the book by highlighting the major directions for future research.* Preface* Person Re-identification: An Overview* Supervised Re-identification: Optimizing the Annotation Effort* Towards Unsupervised Person Re-identification* Re-identification in Dynamic Camera Networks* Future Research Directions* Bibliography* Authors' Biographies
Setup of a Graphical User Interface Desktop for Linux Virtual Machine on Cloud Platforms
Cloud Platforms provide VM images in the Linux OS as well. Linux has always been operated via terminal or shell through a keyboard and a terminal. Even with GUIs around, Linux continues to be operated from the shell.Linux VMs are also operated from the command line of your desktop via an SSH (secure shell) connection. They do not have a desktop environment or GUI installed by default. For Windows users migrating to Linux, a desktop environment would be more convenient to operate. Hence, various desktop environments can be set up on a Linux VM.Mostly we need to have Graphical User Interface GUI on the Linux Virtual Machine instance and to use Internet browser on it.This report will talk about the steps to install minimum required User Interface on VM (virtual machine) with Web Browser. We will work on installing a desktop environment on a Linux Virtual Machine on different Cloud Platforms. The book consists from the following sections:1. Generating SSH key for auto log in to Linux server2. Creating Google Cloud Linux Virtual Machine3. Logon to the Linux Virtual Machine4. Installing VNC server5. Installing XRDP server6. Installing a Graphical User Interface (GUI) for Linux Google Cloud instance and connecting to the server through VNC or RDP connection7. Quick guide to create a Linux virtual machine in Cloudsigma8. Quick guide to create a Linux Virtual Machine in the Microsoft Azure portal9. Quick guide to create a Linux Virtual Machine in Amazon AWSI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator.I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering.I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
Text as Data
Combine the best of qualitative and quantitative techniques within the SAS system for superior results Text analytics has become an indispensable part of fields as diverse as pharmaceutical research and development and social media marketing. Organizations around the world are implementing comprehensive, text-inclusive analytics strategies. In Text as Data: Computational Methods of Understanding Written Expression Using SAS, you’ll discover how and why the SAS platform delivers exceptional text analytics results by combining linguistic and quantitative algorithms and treating text as qualitative data from within a quantitative analytics framework. The accomplished authors offer a thorough introduction to the principles and dynamics of text analytics, along with a comprehensive overview of an effective framework for common use cases. Readers will learn about the interplay between qualitative-linguistic and quantitative data analysis and gain a deep understanding of techniques like expression parsing and detection, text parsing, theme and topic detection, and more. They’ll also discover why SAS is the ideal platform for deploying a text analytics solution. Ideal for SAS users and data scientists in any industry, Text as Data provides readers with a rich and insightful exploration of text analytics with SAS, creating a foundation for practical and effective applications. Text As Data: Combining qualitative and quantitative algorithms within the SAS system for accurate, effective and understandable text analytics The need for powerful, accurate and increasingly automatic text analysis software in modern information technology has dramatically increased. Fields as diverse as financial management, fraud and cybercrime prevention, Pharmaceutical R&D, social media marketing, customer care, and health services are implementing more comprehensive text-inclusive, analytics strategies. Text as Data: Computational Methods of Understanding Written Expression Using SAS presents an overview of text analytics and the critical role SAS software plays in combining linguistic and quantitative algorithms in the evolution of this dynamic field. Drawing on over two decades of experience in text analytics, authors Barry deVille and Gurpreet Singh Bawa examine the evolution of text mining and cloud-based solutions, and the development of SAS Visual Text Analytics. By integrating quantitative data and textual analysis with advanced computer learning principles, the authors demonstrate the combined advantages of SAS compared to standard approaches, and show how approaching text as qualitative data within a quantitative analytics framework produces more detailed, accurate, and explanatory results. * Understand the role of linguistics, machine learning, and multiple data sources in the text analytics workflow * Understand how a range of quantitative algorithms and data representations reflect contextual effects to shape meaning and understanding * Access online data and code repositories, videos, tutorials, and case studies * Learn how SAS extends quantitative algorithms to produce expanded text analytics capabilities * Redefine text in terms of data for more accurate analysis This book offers a thorough introduction to the framework and dynamics of text analytics—and the underlying principles at work—and provides an in-depth examination of the interplay between qualitative-linguistic and quantitative, data-driven aspects of data analysis. The treatment begins with a discussion on expression parsing and detection and provides insight into the core principles and practices of text parsing, theme, and topic detection. It includes advanced topics such as contextual effects in numeric and textual data manipulation, fine-tuning text meaning and disambiguation. As the first resource to leverage the power of SAS for text analytics, Text as Data is an essential resource for SAS users and data scientists in any industry or academic application. BARRY DEVILLE is a Data Scientist and Solutions Architect with 18 years of experience working at SAS. He led the development of the KnowledgeSEEKER decision tree package and has given workshops and tutorials on decision trees for Statistics Canada, the American Marketing Association, the IEEE, and the Direct Marketing Association. GURPREET SINGH BAWA is the Data Science Senior Manager at Accenture PLC in India. He delivers advanced analytics solutions for global clients in a variety of corporate sectors. Preface xi Acknowledgments xiii About the Authors xv Introduction 1 Chapter 1 Text Mining and Text Analytics 3 Chapter 2 Text Analytics Process Overview 15 Chapter 3 Text Data Source Capture 33 Chapter 4 Document Content and Characterization 43 Chapter 5 Textual Abstraction: Latent Structure, Dimension Reduction 73 Chapter 6 Classification and Prediction 103 Chapter 7 Boolean Methods of Classification and Prediction 125 Chapter 8 Speech to Text 139 Appendix A Mood State Identification in Text 157 Appendix B A Design Approach to Characterizing Users Based on Audio Interactions on a Conversational AI Platform 175 Appendix C SAS Patents in Text Analytics 189 Glossary 197 Index 203
Practical Paint.NET
Learn to use the most up-to-date version of Paint.NET, the free, Windows-based program for image editing. This book is ideal for PC users who find Microsoft Paint too lacking, and Photoshop or GIMP too overwhelming. Paint.NET is a lightweight yet capable program that’s easy to navigate and is regularly updated.You’ll quickly become acquainted with this powerful, yet easy-to-learn program’s features; tools, layers, adjustments, and effects. See how to correct exposure, digitally retouch and repair damaged photos, and handle a broad spectrum of photo editing tasks—even how to colorize a black-and-white image. You’ll also learn how to create digital art using the Paint.NET drawing tools and effects. Practice files are provided with step-by-step instructions to jump into photo editing and art creation.Practical Paint.NET highlights this powerful program's rich set of features and capabilities providing you the pathway for just about any kind of image editing. Join the large community behind it today!WHAT YOU'LL LEARN* Use layers, which are essential in any professional quality image editing program* Acquire and install plugins to maximize Paint.NET’s capabilities* Enhance, retouch, and modify digital images* Create compelling digital artwork using the drawing tools and applying artistic filtersWHO THIS BOOK IS FORWindows-based PC users who require the ability to edit digital images without the ongoing cost of subscription-based software, or complex open-source software. This group includes art or photography instructors (especially those in schools systems with limited budgets), small business owners, casual photographers, aspiring graphic designers, or anyone requiring a solid, basic editing program.Phillip Whitt has a passion for images, and has been involved with digital image editing and graphic design since the 1990's. As a freelance photo editing/restoration and graphic design professional, he has retouched and restored countless photographs.Mr. Whitt holds a number of certifications, which include one for Adobe Photoshop CS from Expert Rating, as well as a number of others for demonstrating proficiency in Desktop Publishing, Scribus Basics, GIMP 2.6, and Photo Impact. Mr. Whitt is the author of several Apress titles such as Beginning Photo Retouching and Restoration Using GIMP, Pro Freeware and Open Source Solutions for Business, and Pro Colorizing With GIMP.Introduction* Paint.NET―Quite Possibly the Perfect Solution* What can Paint.NET Do?* What You’ll Learn from this BookPart I: Acquiring, Installing, and Getting to Know Paint.NETChapter 1: An Overview of Paint.NET* Chapter Overview* Acquiring Paint.NET* Downloading and Installing Paint.NET* Overview of the User Interface* Changing The User Interface Color Scheme* Supported File Formats* Installing Plugin Pack* The Main Window* The Title Bar * The Menu Bar* The Tool Bar* The Image List* The Canvas* The Tools Window* The Layers Window* The History Window* The Colors Windows* The Status Bar* Chapter ConclusionChapter 2: Layers* Chapter Overview* Understanding Layers* How Layers Work* Why Layers are Important* Layer Blend Modes* A Closer Look at the Layers Window* Chapter ConclusionChapter 3: An Overview of the Tools* Chapter Overview* The Brush Tools* The Selection Tools* Other Tools* Chapter ConclusionPart II: Working with Digital PhotosChapter 4: Correcting Tonality, Contrast and Exposure* Chapter Overview* An Overview of Image Tonality * Tutorial 1: Correcting Exposure Using the Auto-Level Adjustment * Tutorial 2: Correcting Exposure Using the Brightness/Contrast Adjustment * Understanding the Curves Adjustment* Tutorial 3: Correcting Dull Contrast Using Curves Adjustment * Understanding the Levels Adjustment* Tutorial 4: Correcting Underexposure Using the Levels Adjustment* The Curves Dialog* Tutorial 5: Improving Tonality Using Curves* Tutorial 6: Correcting Local Tonality (Darkening a Light Area) * Tutorial 7: Correcting Local Tonality (Lightening a Dark Area)* Chapter ConclusionChapter 5: Enhancing, Correcting, and Working with Color* Chapter Overview* Tutorial 6: Correcting Color Using the Auto-Level Adjustment * Tutorial 8: Reviving a Faded Color Photo Using Levels * Tutorial 9: Correcting Color Balance (Color Balance Plugin Required) * Tutorial 10: Turning a Color Image to Black and White (Black and White + Plugin Required)* Tutorial 11: Using The Sepia Adjustment* Tutorial 12: Colorizing a Black and White Photo* Chapter ConclusionChapter 6: Modifying, Retouching and Restoring Photos* Chapter Overview* Tutorial 13: Removing Unwanted Objects* Tutorial 14: Straightening An Image * Tutorial 15: Brightening Teeth * Tutorial 16: Removing Blemishes* Tutorial 17 Repairing Scratches and Damage * Chapter ConclusionChapter 7: Compositing Images* Chapter Overview* Tutorial 18: Adding an Element to an Image* Tutorial 19: Simple Background Replacement* Chapter ConclusionPart III: Creating Digital ArtChapter 8: Drawing Basics* Chapter Overview* Using the Pencil and Paint Brush Tools* Tutorial 20: Drawing a Simple Sketch* Tutorial 21: Drawing a Shamrock* Tutorial 22: Drawing a Ladybug* Chapter ConclusionChapter 9: Creating Digital Artwork* Chapter Overview* Tutorial 23: Creating a Scenic Sunset* Tutorial 24: Creating a Starry Night* Tutorial 25: Drawing a Smart Phone* Chapter ConclusionChapter 10: Applying Effects* Chapter Overview* Tutorial 26: Applying a Dream Effect (Dream Plugin Required)* Tutorial 27: Applying an Ink Sketch Effect* Tutorial 28: Applying an Oil Painting Effect (Oil Painting + Plugin Required)* Tutorial 29: Applying a Pastel Effect (Pastel Plugin Required)* Tutorial 30: Applying a Pencil Sketch Effect* Chapter ConclusionAppendix: More About Paint.NET Plugins
Intelligent Connectivity
INTELLIGENT CONNECTIVITY AI, IOT, AND 5GEXPLORE THE ECONOMICS AND TECHNOLOGY OF AI, IOT, AND 5G INTEGRATION Intelligent Connectivity: AI, IoT, and 5G delivers a comprehensive technological and economic analysis of intelligent connectivity and the integration of artificial intelligence, Internet of Things (IoT), and 5G. It covers a broad range of topics, including Machine-to-Machine (M2M) architectures, edge computing, cybersecurity, privacy, risk management, IoT architectures, and more. The book offers readers robust statistical data in the form of tables, schematic diagrams, and figures that provide a clear understanding of the topic, along with real-world examples of applications and services of intelligent connectivity in different sectors of the economy. Intelligent Connectivity describes key aspects of the digital transformation coming with the 4th industrial revolution that will touch on industries as disparate as transportation, education, healthcare, logistics, entertainment, security, and manufacturing. Readers will also get access to:* A thorough introduction to technology adoption and emerging trends in technology, including business trends and disruptive new applications* Comprehensive explorations of telecommunications transformation and intelligent connectivity, including learning algorithms, machine learning, and deep learning* Practical discussions of the Internet of Things, including its potential for disruption and future trends for technological development* In-depth examinations of 5G wireless technology, including discussions of the first five generations of wireless techIdeal for telecom and information technology managers, directors, and engineers, Intelligent Connectivity: AI, IoT, and 5G is also an indispensable resource for senior undergraduate and graduate students in telecom and computer science programs. ABDULRAHMAN YARALI, PHD is Professor of Cybersecurity and Network Management at Murray State University, Kentucky, USA. He also has extensive industry experience in wireless communications, with his research teams completing contracts for AT&T, Nortel, Spring PCS, and more.PrefaceAcknowledgementIntroduction1 Technology Adoption and Emerging Trends1.1 Introduction1.2 Trends in Business technology1.3 AI-Fueled Organizations1.4 Connectivity of Tomorrow1.5 Moving Beyond Marketing1.6 Cloud Computing1.7 Cybersecurity, Privacy, and Risk Management1.8 Conclusion2 Telecommunication Transformation and Intelligent Connectivity2.1 Introduction2.2 Cybersecurity Concerns in the 5G World2.3 Positive Effects of Addressing Cybersecurity Challenges in 5G2.4 Intelligent Connectivity Use-Cases2.5 Industrial and Manufacturing Operations2.6 Healthcare2.7 Public Safety and Security2.8 Conclusion3 The Internet of Things (IoT): Potentials and the Future Trends3.1 Introduction3.2 Achieving the Future of IoT3.3 Commercial Opportunities for IoT3.4 The Industrial Internet of Things3.5 Future Impact of IoT in Our Industry3.6 Data Sharing in the IoT Environment3.7 IoT Devises Environment Operation3.8 Interoperability Issues of IoT3.9 IoT-Cloud –Application3.10 Regulation and Security Issues of IoT3.11 Achieving IoT Innovations While Tackling Security and Regulation Issues3.12 Future of IoT3.13 Conclusion4 The Wild Wonders of 5G Wireless Technology4.1 Introduction4.2 5G Architecture4.3 5G Applications4.4 5G Network Architecture4.5 Security and Issues of 5G4.6 IoT Devices in 5G Wireless4.7 Big Data Analytics in 5G4.8 AI Empowers a Wide Scope of Use Cases4.9 Conclusion5 Artificial Intelligence Technology5.1 Introduction5.2 Core Concepts of Artificial Intelligence5.3 Machine Learning and Applications5.4 Deep Learning5.5 Neural Networks Follow a Natural Model5.6 Classifications of Artificial Intelligence5.7 Trends in Artificial Intelligence5.8 Challenges of Artificial Intelligence5.9 Funding Trends in Artificial Intelligence5.10 Conclusion6 AI, 5G, & IoT: Driving Forces Towards the Industry Technology Trends6.1 Introduction6.2 Fifth Generation of Network Technology6.3 Internet of Things (IoT)6.4 Industrial Internet of Things6.5 IoT in Automotive6.6 IoT in Agriculture6.7 AI, IoT, and 5G Security6.8 Conclusion7 Intelligent Connectivity: A New Capabilities to Bring Complex Use Cases7.1 Introduction7.2 Machine-to-Machine Communication and the Internet of Things7.3 Convergence of Internet of Things, Artificial Intelligence and 5G7.4 Intelligent Connectivity Applications7.5 Challenges and Risks of Intelligent Connectivity7.6 Recommendations7.7 Conclusion8 IoT: Laws, Policies and Regulations8.1 Introduction8.2 Recently Published laws and Regulations8.3 Developing Innovation and Growing the Internet of Things (DIGIT) Act8.4 General View8.5 Relaxation of laws by the Federal Aviation Administration's (FAA)8.6 Supporting Innovation of Self Driving Cars by Allowing Policies8.7 Recommendations8.8 Conclusion9 Artificial Intelligence and Blockchain9.1 Introduction9.2 Decentralized Intelligence9.3 Applications9.4 How Artificial Intelligence and Blockchain will Affect Society9.5 How Augmented Reality Works9.6 Mixed Reality9.7 Virtual Reality9.8 Key Components in a Virtual Reality System9.9 Augmented Reality Uses9.10 Applications of Virtual Reality in Business9.11 The Future of Blockchain9.12 Blockchain Applications9.13 Blockchain and the Internet of Things9.14 Law Coordination9.15 Collaboration for Blockchain Success10 Digital Twin Technology10.1 Introduction10.2 The Timeline and History of Digital Twin Technology10.3 Technologies Employed in Digital Twin Models10.4 The Dimension of Digital Twins Models10.5 Digital Twin and Other Technologies10.6 Digital Twin Technology Implementation10.7 Benefits of Digital Twin10.8 Application of Digital Twins10.9 Challenges of Digital Twins11 Artificial Intelligence, Big Data Analytics, and IoT11.1 Introduction11.2 Analytic11.3 AI Technology in Big Data and IoT11.4 AI Technology Applications and Use Cases11.5 AI Technology Impact on the Vertical Market11.6 AI in Big Data and IoT Market Analysis and Forecasts11.7 Conclusion12 Digital Transformation Trends in the Automotive Industry12.1 Introduction12.2 Evolution of Automotive Industry12.3 Data-Driven Business Model and data monetization12.4 Services of Data-Driven Business Model12.5 Values of New Services in the New Automotive Industry12.6 Conclusion13 Wireless Sensors/IoT and Artificial Intelligence for Smart Grid and Smart Home13.1 Introduction13.2 Wireless Sensor Networks13.3 Power Grid Impact13.4 Benefits of Smart Grid13.5 Internet of Things13.6 Internet of Things on Smart Grid13.7 Smart Grid and Artificial Intelligence13.8 Smart Grid Programming13.9 Conclusion14 Artificial Intelligence, 5G and IoT: Security14.1 Introduction14.2 Understanding IoT14.3 Artificial Intelligence14.4 5G Network14.5 Emerging Partnership of Artificial Intelligence, IoT, 5G, and Cybersecurity14.6 Conclusion15 Intelligent Connectivity and Agriculture15.1 Introduction15.2 The Potential of Wireless Sensors and IoT in Agriculture15.3 IoT Sensory Technology with Traditional Farming15.4 IoT Devices and Communication Techniques15.5 IoT and all Crop Stages15.6 Drone in Farming Applications15.7 Conclusion16 Applications of Artificial Intelligence, ML, and DL16.1 Introduction16.2 Building Artificial Intelligence Capabilities16.3 What is Machine Learning?16.4 Deep Learning16.5 Machine Learning vs. Deep Learning Comparison16.6 Feature Engineering16.7 Application of Machine Learning16.8 Applications of Deep learning16.9 Future Trends17 Big Data and Artificial Intelligence: Strategies for Leading Business Transformation17.1 Introduction17.2 Big Data17.2 Machine Learning-Based Medical Systems17.3 Artificial Intelligence for Stock Market Prediction17.3.1 Application of Artificial Intelligence by Investors17.4 Trends in AI and Big Data Technologies Drive Business Innovation17.5 Driving Innovation Through Big Data17.6 The Convergence of AI and Big Data17.7 How AI and Big Data Will Combine to Create Business Innovation17.8 AI and Big Data for Technological Innovation17.9 AI and Production17.10 AI and ML Operations Research17.11 Collaboration Between Machines and Human17.12 Generative Designs17.13 Adapting to a Changing Market17.14 ConclusionIndex
Java on the Raspberry Pi
Use Java to do whatever you want to do with the Raspberry Pi and the devices you need for your project. In theory, it should be possible, and even easy, to work with on the Pi. Unfortunately, reality is a bit different. This book features an extensive set of techniques that allow you to get close to bringing this theory to fruition.You'll review some limitations on using Java imposed by the Raspberry Pi and Raspberry Pi OS, and even Java itself, and examine which ones might apply to your projects and your devices. You'll also explore solutions to address the limitations and l look at efficient development of Java for the Raspberry Pi.Java on the Raspberry Pi shows how to interact with a range of devices useful in robotics and IOT, overcoming the hurdles in doing so. It also covers off-loading work from the Raspberry Pi to an Arduino, leveraging its close-to-real time capabilities.WHAT YOU'LL LEARN* Develop with Java remotely using NetBeans* Leverage available libraries to enable device interaction, and what to do if they don’t work* Implement multi-processing, using an Arduino as a co-processor* Build sophisticated projects with multiple threads of execution, multiple processes, and even multiple systemsWHO THIS BOOK IS FORExperienced programmers who appreciate the benefits of Java and world class tools for application development and want to build robotics or IOT projects using the low cost, low power, and portability of the Raspberry Pi.GREG FLURRY has worked as a programmer and electronics engineer for IBM. In the span of a 40-year career, his roles have included product development, product architecture, research, and client services. He achieved the title of IBM Distinguished Engineer. Greg has authored over 50 articles in IBM and non-IBM publications on topics ranging from simple programming examples to large scale system architectures. He is an inventor, with over 30 patents. He started programming in Java from the time it became public in 1996, and over time, wrote thousands of lines of Java code. After retirement in 2013, he started working with the Raspberry Pi, with the goal of using it as the brain in autonomous robots. As the robots became more complex, he longed for Java and professional development tools. In 2017, he began using Java on the Raspberry Pi and has done so since, educating himself on the techniques of connecting sundry devices to the Raspberry Pi via Java, as well as identifying techniques useful in building moderately complex robotics systems.Chapter 1: Motivation● Why the Raspberry Pi?● Why Java?● Why NetBeans?Chapter 2: Setting up the Raspberry Pi● Raspberry Pi OS● Enabling device support● Java● Remote control via sshChapter 3: Setting up NetBeans● Installing NetBeans● Configuring NetBeans for remote development on the Raspberry Pi● The first program● Debugging● Additional techniquesChapter 4: Connecting an Inertial Management Unit (IMU)● Testing using an Arduino● Pi4J● Porting an Arduino library● Gyroscope● Accelerometer● MagnetometerChapter 5: Using the Gyroscope● The Gyroscope class● Testing GyroscopeChapter 6: Connecting a Servo Controller● Testing and configuring Maestro via Control Center● Porting an Arduino library● The Maestro class● The Servo classChapter 7: Using the Maestro● Extending the Maestro class● The Servo classChapter 8: Connecting a DC Motor Controller● Testing and configuring RoboClaw via Motion Studio● Testing with Python● Porting a Python library● The RoboClaw classChapter 9: Connecting a Temperature/Humidity Sensor● Porting an Arduino library● The DHT22 class● The TeHu classChapter 10: Connecting an Arudino● The command structure● The Arduino classChapter 11: Connecting LIDAR sensor to the Arduino● Getting the Arduino library● TestingChapter 12: Connecting the servo controller to the Arduino● Configuring Maestro via Control Center● Getting the Arduino library● TestingChapter 13: Creating a LIDAR Subsystem on the Arduino● Creating the subsystem● Testing on the Arduino● The Lidar classChapter 14: Communicating with other programs.● Establishing the communication protocols● Establishing the data exchange● The Python program● The Java program
Deep-Dive Terraform on Azure
Get started with the foundations of Infrastructure as Code and learn how Terraform can automate the deployment and management of resources on Azure. This book covers all of the software engineering practices related to Terraform and Infrastructure as Code with Azure as a cloud provider.The book starts with an introduction to Infrastructure as Code and covers basic concepts, principles, and tools, followed by an overview of Azure and Terraform that shows you how Terraform can be used to provision and manage Azure resources. You will get started writing multiple Terraform scripts and explore its various concepts. Author Ritesh Modi takes a deep dive into Terraform and teaches you about deployment and multiple resource creation using loops. Writing a reusable script using modules is discussed as well as management and administration of secrets, sensitive data, and passwords within Terraform code. You will learn to store and version Terraform scripts and know how Terraform is used in Azure DevOps pipelines. And you will write unit and integration tests for Terraform and learn its best practices. The book also highlights and walks through the Terraform Azure Provider and shows you a simple way to create a new Terraform provider.After reading this book, you will be able to write quality Terraform scripts that are secure by design, modular, and reusable in Azure.WHAT WILL YOU LEARN* Understand implementation within infrastructure and application deployments* Provision resources in Azure using Terraform* Use unit and integration testing* Explore concepts such as local vs remote, importing state, workspaces, and backends WHO THIS BOOK IS FORSoftware engineers, DevOps professionals, and technology architectsRITESH MODI works with Microsoft as Senior Engineer on the Commercial Engineering team. He has served as Microsoft Regional Director as well as Regional Lead for Microsoft certified trainers.Ritesh is an architect, a senior evangelist, cloud architect, published author, speaker, and a known leader for his contributions in Blockchain, Ethereum, Datacenter, Azure, bots, cognitive services, DevOps, artificial intelligence, and automation. He has more than a decade of experience in building and deploying enterprise solutions for customers. He has contributed to AzureRM provider multiple times as an open source contribution. CHAPTER 1: INTRODUCTION TO INFRASTRUCTURE AS CODECHAPTER GOAL: UNDERSTAND THE BASICS ON INFRASTRUCTURE AS CODE PARADIGM AND KNOWN ABOUT ITS ADVANTAGES, PRINCIPLES AND TOOLS. UNDERSTAND THE NEED TO CONVERT INFRASTRUCTURE INTO CODE.NO OF PAGES: 5SUB -TOPICS1. Understanding Configuration Management2. Understanding Infrastructure as code3. Principles of Infrastructure as code4. Benefits and applicability for cloud environmentsCHAPTER 2: AZURE AND TERRAFORMCHAPTER GOAL: GET AN OVERVIEW OF AZURE AS ENTERPRISE CLOUD PROVIDER WITH DIFFERENT PARADIGM LIKE IAAS, PAAS. DIFFERENT WAYS TO PROVISION RESOURCES IN AZURE. HOW TERRAFORM FITS WITHIN THE AZURE LANDSCAPE AND HOW IT CAN BE USED TO PROVISION AZURE RESOURCES. UNDERSTAND THE HIGH-LEVEL ARCHITECTURE AND WORKFLOW USING TERRAFORMNO OF PAGES: 15SUB - TOPICS1. Overview of Azure cloud2. Overview of Terraform configuration management3. Terraform workflow for provisioning and de-provisioning of resources4. Terraform architecture – providers, plugins, resources, repositoriesCHAPTER 3: GETTING STARTED WITH TERRAFORMCHAPTER GOAL: GETTING HAND DIRTY WITH TERRAFORM, WRITING MULTIPLE TERRAFORM SCRIPTS EXPLORING DIFFERENT CONCEPTS OF TERRAFORM.NO OF PAGES: 45SUB - TOPICS:1. Understand Terraform CLI and using various options2. State Management in Terraform3. using Resources, providers, outputs4. Terraform Data types5. Dependency graphs in Terraform scriptsCHAPTER 4: DEEP DIVE INTO TERRAFORMChapter Goal: Understanding the advance features of Terraform both from component as well at script level. Write advance Terraform scripts for conditional deployments, multiple resource creation using loops.NO OF PAGES: 45SUB - TOPICS:1. Backend, state and workspace management in Terraform2. dynamic provisioning of resources3. loops, conditional statements – for, for-each, if4. using Terraform functions – string, collection, encoding, fileCHAPTER 5: WRITING REUSABLE MODULES IN TERRAFORMChapter Goal: Writing reusable Terraform scripts using modules, storing modules in repositories and consuming them in multiple scripts.NO OF PAGES: 251. Basic of Modules, child and parent modules2. Passing parameters and getting output from modules3. Using modules from multiple scripts.CHAPTER 6: WRITING SECURE SCRIPTS WITH TERRAFORMCHAPTER GOAL: MANAGEMENT AND ADMINISTRATION OF SENSITIVE DATA, SECRETS AND PASSWORDS WITHIN TERRAFORM CODE. USAGE OF KEY VAULTS FOR STORING OF SECRETS.NO OF PAGES: 201. Secure storage of credentials and sensitive information2. Usage of Managed Identities, certificates, service principles to connect to Azure3. Storing secrets in Azure Key vaultCHAPTER 7: REPOS, VERSIONING, CI/CD PIPELINES FOR TERRAFORMCHAPTER GOAL: OVERVIEW OF STORING AND VERSIONING OF TERRAFORM SCRIPTS SUCH THAT EACH VERSION CAN BE USED IN ISOLATION WITHOUT CONFLICTING WITH OTHERS. USING TERRAFORM CLI IN AZURE DEVOPS PIPELINES TO AUTOMATE THE PROCESS OF DEPLOYMENT OF AZURE RESOURCES.NO OF PAGES: 201. Storing Terraform scripts in Azure DevOps2. Versioning of Terraform modules3. CICD pipelines for deploying resources on Azure using TerraformCHAPTER 8: WRITING UNIT AND INTEGRATION TESTS FOR TERRAFORMCHAPTER GOAL: TESTING OF TERRAFORM SCRIPTS USING TERRATEST UTILITY. UNDERSTANDING PRINCIPLES OF UNIT AND INTEGRATING TESTING ALONGSIDE IMPLEMENTING THEMNO OF PAGES: 201. Exploring TerraTest and terra-lint2. Understanding Unit testing and writing unit tests for Terraform scripts3. Understanding Integration testing and writing Integration tests for Terraform scriptsCHAPTER 9: TERRAFORM BEST PRACTICESCHAPTER GOAL: UNDERSTANDING THE BEST PRACTICES OF AUTHORING, DEPLOYING AND MANAGING TERRAFORM SCRIPTS IN GENERAL AND IN AZURENO OF PAGES: 101. Understanding Terraform Folder structure and deployment structure2. Writing testable Terraform scripts3. Writing Maintainable code – usage of variables, no hard-coding etc
Konstruierte Wahrheiten
In einer Welt, in der immer mehr Fake News verbreitet werden, wird es zunehmend schwieriger, Wahrheit und Lüge, Wissen und Meinung auseinanderzuhalten. Desinformationskampagnen werden nicht nur als ein politisches Problem wahrgenommen, vielmehr geht es in der Fake-News-Debatte auch um fundamentale philosophische Fragen: Was ist Wahrheit? Wie können wir sie erkennen? Gibt es so etwas wie objektive Fakten oder ist alles sozial konstruiert? Dieses Buch erklärt, wie Echokammern und alternative Weltbilder entstehen, es macht das postfaktische Denken für die gegenwärtige Wahrheitskrise verantwortlich und zeigt, wie wir einem drohenden Wahrheitsrelativismus entgehen können.THOMAS ZOGLAUER (Dr. phil. habil.) lehrt Philosophie an der Brandenburgischen Technischen Universität Cottbus-Senftenberg und an der Graduierten-Akademie der Universität Stuttgart und ist Autor zahlreicher Bücher zur Technikphilosophie und angewandten Ethik.Filterblasen und Echokammern.- Verschwörungstheorien.- Fake News.- Epistemologie des Postfaktischen.- Wahrheitstheorien.- Information und Wissen.