Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Simple and Efficient Programming with C#

Simple and Efficient Programming with C#

Apply skills and approaches to your programming to build a real-world application in C# 9 using the latest editions of Visual Studio, C#, and Microsoft .NET. Each chapter opens with an introduction and original application written in C# 9 for you to jump  into coding. From there, you are guided through an expected output and taught best practices along the way. Author Vaskaran Sarcar emphasizes extending and maintaining the same program and he demonstrates examples for different scenarios to make your program more efficient and effective. This book is divided into four parts. The first part starts with a detailed discussion of polymorphism. It then shows you how to make proper use of abstract classes and interfaces, and you will know which technique to use for a specific scenario. Discussions on code comments teach you how to use them effectively, and why you need to be careful with code comments. In the second part youwill learn six design principles, including SOLID and DRY principles. These are the foundation of well-known design patterns and they establish practices for developing software with considerations for maintaining and extending as a project grows. The third part takes you through the methods to make efficient applications. You will learn the common use of factories to separate code from its opposite and the alternative of inheritance using object composition and wrappers. This part also demonstrates the use of template methods, hooks, and facades in programming. Hints show you how professional coders develop an enterprise application. In the fourth and final part you will learn about effective memory management techniques by preventing leaks in your application and the use and misuse of design patterns. This part also discusses how to decide between a static method and an instance method and other techniques, in brief. After reading this book, you will beable to implement best practices to make your programs more effective and reliable. What Will You Learn * Analyze the alternative solutions before implementation by comparing the pros and cons * Make polymorphic code perform better * Know the side-effects of bad/redundant comments * Understand the significance of the SOLID and DRY principles * Add features using wrappers * Redefine steps without altering the calling sequence of an algorithm * Use hooks in your application * Convert a complex system into a user-friendly system using facades * Run your application in .NET 6 Who Is This Book For Developers with a basic knowledge of C# Part I: Fundamentals.- Chapter 1: Flexible Code Using Polymorphism.- Chapter 2: Abstract Class or Interface?.- Chapter 3: Wise Use of Code Comments.- Part II: Important Principles.- Chapter 4: Know SOLID Principles.- Chapter 5: Use the DRY Principle.- Part III: Make Efficient Applications.- Chapter 6: Separate Changeable Code Using Factories.-  Chapter 7:  Add Features Using Wrappers.- Chapter 8: Efficient Templates Using Hooks.- Chapter 9: Simplify Complex Systems Using Facades. - Part IV: The Road Ahead.- Chapter 10: Memory Management. – Chapter 11: Leftover Discussions. 

Regulärer Preis: 62,99 €
Produktbild für Strategisches Prozessmanagement - einfach und effektiv

Strategisches Prozessmanagement - einfach und effektiv

Prozessmanager, Unternehmensarchitekt oder Business Analyst sehen Sie vielleicht angesichts der Fülle Ihrer Detailprozesse „den Wald vor lauter Bäumen“ nicht mehr. Dann müssen Sie eine ganzheitliche Sicht auf die Prozesslandschaft und ihre Abhängigkeiten schaffen, damit auf dieser Basis strategische Unternehmens- oder Projektentscheidungen getroffen werden können. Das ist die strategische Seite des Prozessmanagements.In diesem Leitfaden vermitteln Ihnen die Autoren anhand vieler Praxisbeispiele einen Einblick, was für das Strategische Prozessmanagement wirklich notwendig ist. Und sie geben Ihnen eine Schritt-für-Schritt-Anleitung von der Identifikation und Dokumentation der Geschäftsprozesse (end-to-end) bis zur Analyse und Gestaltung der zukünftigen Prozesslandschaft. Dafür stellen sie Ihnen erprobte Modelle und Methoden vor und zeigen, wie diese für die Business-Planung und für das strategische IT-Management wirkungsvoll genutzt werden können.Mit dieser Unterstützung können Sie einfach und effektiv adäquate Prozesslandkarten sowie die für das Management erforderlichen Sichten erstellen. So schaffen Sie einen Überblick über die für die aktuelle und zukünftige Geschäftsentwicklung wesentlichen Geschäftsprozesse und deren Zusammenspiel – und damit die Voraussetzung, um zur richtigen Zeit das Richtige zu tun.AUS DEM INHALT EinleitungStrategisches ProzessmanagementErgebnistypenAufbau der Basisdokumentation und des Prozessmanagement-ReportingsAusbau des Strategischen ProzessmanagementsBusiness Capability ManagementGlossar (RODC)

Regulärer Preis: 39,99 €
Produktbild für Storytelling im UX-Design

Storytelling im UX-Design

Ideen, Inspirationen und Erkenntnisse aus dem traditionellen Storytelling für next-level UX-Design* Erfolgreich Methoden, Werkzeuge und Techniken des Storytelling auf Produktdesign anwenden* Mit vielen anschaulichen Beispielen und praxisnahen Übungen* Ohne abgelutschte Vergleiche und mit dem nötigen TiefgangAngesichts der Vielfalt der heutigen Geräte, Schnittstellen und Kanäle haben Sie immer weniger Kontrolle darüber, wie Nutzer*innen Ihre sorgfältig konzipierten Produkte erleben. Trotzdem ist es für Sie sehr wichtig zu verstehen, an welchen Punkten der User Journey Ihre Kunden sich befinden, damit Sie die passenden Inhalte und interaktiven Elemente zur richtigen Zeit und auf dem richtigen Gerät bereitstellen können.Mit diesem praktischen Leitfaden lernen Sie, welchen positiven Einfluss Storytelling auf Ihr Produktdesign haben kann und wie es Ihnen dabei hilft, die UX Ihrer Produkte entscheidend zu verbessern. Anna Dahlström zeigt Ihnen anhand zahlreicher spannender Beispiele, wie Sie Storytelling einsetzen und bewährte Prinzipien aus Film und Literatur wie Heldenreise und Storyboards anwenden, um großartige Produkterfahrungen zu erzeugen.- Erfahren Sie, wie die Anatomie einer guten Geschichte Ihr Produktdesign maßgeblich verbessern kann.- Entdecken Sie, wie sich traditionelle Prinzipien, Werkzeuge und Techniken des Storytellings auf wichtige Faktoren des Produktdesigns auswirken.- Lernen Sie, wie Sie mit zielgerichtetem Storytelling die richtige Geschichte erzählen und Menschen zum Handeln motivieren.- Nutzen Sie die Regeln des Storytellings, um Ihre Produkte vorzustellen, zu präsentieren und zu verkaufen.Anna Dahlström ist eine schwedische UX-Designerin mit Sitz in London und die Gründerin von UX Fika. Seit 2001 arbeitet sie für Kund*innen, Agenturen und Start-ups an einer Vielzahl von Marken und Projekten, von Websites und Apps bis hin zu Bots und TV-Interfaces.

Regulärer Preis: 36,90 €
Produktbild für Architekturpatterns mit Python

Architekturpatterns mit Python

Bewährte Patterns für komplexe Python-Projekte* bekannte Architekturpatterns - endlich in idiomatischem Python* die Komplexität anspruchsvoller Projekte erfolgreich managen* den größten Nutzen aus den Testsuiten herausholenPythons Popularität wächst weiterhin und mit Python werden inzwischen komplexe Projekte realisiert. Viele Python-Entwicklerinnen und -Entwickler interessieren sich deshalb für High-Level-Design-Patterns wie hexagonale Architektur, ereignisgesteuerte Architektur und die strategischen Patterns, die durch das Domain-Driven Design vorgegeben sind. Das Übertragen dieser Patterns nach Python ist allerdings nicht immer einfach.In diesem Praxisbuch stellen Harry Percival und Bob Gregory von MADE.com erprobte Architekturpatterns vor, die Python-Entwickler dabei unterstützen, die Komplexität von Anwendungen im Griff zu behalten – und den größtmöglichen Nutzen aus den Testsuiten zu ziehen. Jedes Pattern wird durch Beispiele in schönem, idiomatischem Python illustriert; dabei wird die Weitschweifigkeit der Java- oder C#-Syntax vermieden.Anna Dahlström ist eine schwedische UX-Designerin mit Sitz in London und die Gründerin von UX Fika. Seit 2001 arbeitet sie für Kund*innen, Agenturen und Start-ups an einer Vielzahl von Marken und Projekten, von Websites und Apps bis hin zu Bots und TV-Interfaces.

Regulärer Preis: 36,90 €
Produktbild für CorelDRAW Graphics Suite 2019-2021

CorelDRAW Graphics Suite 2019-2021

Die Neuerungen von CorelDRAW 2020/2021: das umfassende Handbuch zu CorelDRAW in aktueller Auflage, September 2021.Wie Sie mit dem umfangreichen Softwarepaket von Corel Bildbearbeitung, Vektorgrafiken, Layout und Design kreativ umsetzen, dabei hilft Ihnen dieses Buch mit verständlichen Schritt-für-Schritt-Anleitungen und anschaulichen Beispielen.Sie starten mit der grundlegenden Arbeitsweise, indem Sie alle wichtigen Bedienelemente, Menüs und Funktionen kennenlernen. Danach geht es an die praktische Umsetzung mit CorelDRAW und Corel PHOTO-PAINT.AutorMichael Gradias ist seit 1980 selbstständiger Grafikdesigner und Fotograf.Seit 1997 hat er über 120 Fachbücher in den Bereichen Grafik, Video und Fotografie veröffentlicht, die teilweise in acht Sprachen übersetzt wurden. Außerdem schreibt er regelmäßig für diverse Fachzeitschriften Artikel. Er fotografiert seit 1985 mit Nikon-Kameras und sammelt diese auch. Auf seiner Website www.gradias.de finden Leser viele weitere Informationen zu den jeweiligen Themen. Seine Kompetenz als Fotograf stellt er auf www.gradias-foto.de unter Beweis.Leseprobe (PDF-Link)

Regulärer Preis: 19,95 €
Produktbild für Threat Hunting in the Cloud

Threat Hunting in the Cloud

IMPLEMENT A VENDOR-NEUTRAL AND MULTI-CLOUD CYBERSECURITY AND RISK MITIGATION FRAMEWORK WITH ADVICE FROM SEASONED THREAT HUNTING PROSIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.With this book you'll learn:* Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment* Metrics available to assess threat hunting effectiveness regardless of an organization's size* How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations* A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks* Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs)* Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration* Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies* Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers* The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices.Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.CHRIS PEIRIS, PHD, has advised Fortune 500 companies, Federal and State Governments, and Defense and Intelligence entities in the Americas, Asia, Japan, Europe, and Australia New Zealand. He has 25+ years of IT industry experience. He is the author of 10 published books and is a highly sought-after keynote speaker.BINIL PILLAI is a Microsoft Global Security Compliance and Identity (SCI) Director for Strategy and Business Development focusing on the Small Medium Enterprise segment. He has 21+ years of experience in B2B cybersecurity, digital transformation, and management consulting. He is also a board advisor to several start-ups to help grow their businesses successfully. ABBAS KUDRATI is a CISO and cybersecurity practitioner. He is currently Microsoft Asia’s Lead Chief Cybersecurity Advisor for the Security Solution Area and serves as Executive Advisor to Deakin University, LaTrobe University, HITRUST ASIA, and EC Council ASIA. Foreword xxxiIntroduction xxxiiiPART I THREAT HUNTING FRAMEWORKS 1CHAPTER 1 INTRODUCTION TO THREAT HUNTING 3The Rise of Cybercrime 4What Is Threat Hunting? 6The Key Cyberthreats and Threat Actors 7Phishing 7Ransomware 8Nation State 10The Necessity of Threat Hunting 14Does the Organization’s Size Matter? 17Threat Modeling 19Threat-HuntingMaturity Model 23Organization Maturity and Readiness 23Level 0: INITIAL 24Level 1: MINIMAL 25Level 2: PROCEDURAL 25Level 3: INNOVATIVE 25Level 4: LEADING 25Human Elements of Threat Hunting 26How Do You Make the Board of Directors Cyber-Smart? 27Threat-Hunting Team Structure 30External Model 30Dedicated Internal Hunting Team Model 30Combined/Hybrid Team Model 30Periodic Hunt Teams Model 30Urgent Need for Human-Led Threat Hunting 31The Threat Hunter’s Role 31Summary 33CHAPTER 2 MODERN APPROACH TO MULTI-CLOUD THREAT HUNTING 35Multi-Cloud Threat Hunting 35Multi-Tenant Cloud Environment 38Threat Hunting in Multi-Cloud and Multi-Tenant Environments 39Building Blocks for the Security Operations Center 41Scope and Type of SOC 43Services, Not Just Monitoring 43SOC Model 43Define a Process for Identifying and Managing Threats 44Tools and Technologies to Empower SOC 44People (Specialized Teams) 45Cyberthreat Detection, Threat Modeling, and the Need for Proactive Threat Hunting Within SOC 46Cyberthreat Detection 46Threat-Hunting Goals and Objectives 49Threat Modeling and SOC 50The Need for a Proactive Hunting Team Within SOC 50Assume Breach and Be Proactive 51Invest in People 51Develop an Informed Hypothesis 52Cyber Resiliency and Organizational Culture 53Skillsets Required for Threat Hunting 54Security Analysis 55Data Analysis 56Programming Languages 56Analytical Mindset 56Soft Skills 56Outsourcing 56Threat-Hunting Process and Procedures 57Metrics for Assessing the Effectiveness of Threat Hunting 58Foundational Metrics 58Operational Metrics 59Threat-Hunting Program Effectiveness 61Summary 62CHAPTER 3 EXPLORATION OF MITRE KEY ATTACK VECTORS 63Understanding MITRE ATT&CK 63What Is MITRE ATT&CK Used For? 64How Is MITRE ATT&CK Used and Who Uses It? 65How Is Testing Done According to MITRE? 65Tactics 67Techniques 67Threat Hunting Using Five Common Tactics 69Privilege Escalation 71Case Study 72Credential Access 73Case Study 74Lateral Movement 75Case Study 75Command and Control 77Case Study 77Exfiltration 79Case Study 79Other Methodologies and Key Threat-Hunting Tools to CombatAttack Vectors 80Zero Trust 80Threat Intelligence and Zero Trust 83Build Cloud-Based Defense-in-Depth 84Analysis Tools 86Microsoft Tools 86Connect To All Your Data 87Workbooks 88Analytics 88Security Automation and Orchestration 90Investigation 91Hunting 92Community 92AWS Tools 93Analyzing Logs Directly 93SIEMs in the Cloud 94Summary 95Resources 96PART II HUNTING IN MICROSOFT AZURE 99CHAPTER 4 MICROSOFT AZURE CLOUD THREAT PREVENTION FRAMEWORK 101Introduction to Microsoft Security 102Understanding the Shared Responsibility Model 102Microsoft Services for Cloud Security Posture Management and Logging/Monitoring 105Overview of Azure Security Center and Azure Defender 105Overview of Microsoft Azure Sentinel 108Using Microsoft Secure and Protect Features 112Identity & Access Management 113Infrastructure & Network 114Data & Application 115Customer Access 115Using Azure Web Application Firewall to Protect a Website Against an “Initial Access” TTP 116Using Microsoft Defender for Office 365 to Protect Against an “Initial Access” TTP 118Using Microsoft Defender Endpoint to Protect Against an “Initial Access” TTP 121Using Azure Conditional Access to Protect Against an “Initial Access” TTP 123Microsoft Detect Services 127Detecting “Privilege Escalation” TTPs 128Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Privilege Escalation” TTP 128Detecting Credential Access 131Using Azure Identity Protection to Detect Threats Against a “Credential Access” TTP 132Steps to Configure and Enable Risk Polices (Sign-in Risk and User Risk) 134Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Credential Access” TTP 137Detecting Lateral Movement 139Using Just-in-Time in ASC to Protect and Detect Threats Against a “Lateral Movement” TTP 139Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Lateral Movement” TTP 144Detecting Command and Control 145Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Command and Control” TTP 146Detecting Data Exfiltration 147Using Azure Information Protection to Detect Threats Against a “Data Exfiltration” TTP 148Discovering Sensitive Content Using AIP 149Using Azure Security Center and Azure Sentinel to Detect Threats Against a “Data Exfiltration” TTP 153Detecting Threats and Proactively Hunting with Microsoft 365 Defender 154Microsoft Investigate, Response, and Recover Features 155Automating Investigation and Remediation with Microsoft Defender for Endpoint 157Using Microsoft Threat Expert Support for Remediation and Investigation 159Targeted Attack Notification 159Experts on Demand 161Automating Security Response with MCAS and Microsoft Flow 166Step 1: Generate Your API Token in Cloud App Security 167Step 2: Create Your Trigger in Microsoft Flow 167Step 3: Create the Teams Message Action in Microsoft Flow 168Step 4: Generate an Email in Microsoft Flow 168Connecting the Flow in Cloud App Security 169Performing an Automated Response Using Azure Security Center 170Using Machine Learning and Artificial Intelligence in Threat Response 172Overview of Fusion Detections 173Overview of Azure Machine Learning 174Summary 182CHAPTER 5 MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE AND CAPABILITY MAP 183Introduction 183Microsoft Security Architecture versus the NIST Cybersecurity Framework (CSF) 184Microsoft Security Architecture 185The Identify Function 186The Protect Function 187The Detect Function 188The Respond Function 189The Recover Function 189Using the Microsoft Reference Architecture 190Microsoft Threat Intelligence 190Service Trust Portal 192Security Development Lifecycle (SDL) 193Protecting the Hybrid Cloud Infrastructure 194Azure Marketplace 194Private Link 195Azure Arc 196Azure Lighthouse 197Azure Firewall 198Azure Web Application Firewall (WAF) 200Azure DDOS Protection 200Azure Key Vault 201Azure Bastion 202Azure Site Recovery 204Azure Security Center (ASC) 205Microsoft Azure Secure Score 205Protecting Endpoints and Clients 206Microsoft Endpoint Manager (MEM) Configuration Manager 207Microsoft Intune 208Protecting Identities and Access 209Azure AD Conditional Access 210Passwordless for End-to-EndSecure Identity 211Azure Active Directory (aka Azure AD) 211Azure MFA 211Azure Active Directory Identity Protection 212Azure Active Directory Privilege IdentityManagement (PIM) 213Microsoft Defender for Identity 214Azure AD B2B and B2C 215Azure AD Identity Governance 215Protecting SaaS Apps 216Protecting Data and Information 219Azure Purview 220Microsoft Information Protection (MIP) 221Azure Information Protection Unified Labeling Scanner (File Scanner) 222The Advanced eDiscovery Solution in Microsoft 365 223Compliance Manager 224Protecting IoT and Operation Technology 225Security Concerns with IoT 226Understanding That IoT Cybersecurity Starts with a Threat Model 227Microsoft Investment in IoT Technology 229Azure Sphere 229Azure Defender 229Azure Defender for IoT 230Threat Modeling for the Azure IoT Reference Architecture 230Azure Defender for IoT Architecture (Agentless Solutions) 233Azure Defender for IoT Architecture (Agent-based solutions) 234Understanding the Security Operations Solutions 235Understanding the People Security Solutions 236Attack Simulator 237Insider Risk Management (IRM) 237Communication Compliance 239Summary 240PART III HUNTING IN AWS 241CHAPTER 6 AWS CLOUD THREAT PREVENTION FRAMEWORK 243Introduction to AWS Well-Architected Framework 244The Five Pillars of the Well-Architected Framework 245Operational Excellence 246Security 246Reliability 246Performance Efficiency 246Cost Optimization 246The Shared Responsibility Model 246AWS Services for Monitoring, Logging, and Alerting 248AWS CloudTrail 249Amazon CloudWatch Logs 251Amazon VPC Flow Logs 252Amazon GuardDuty 253AWS Security Hub 254AWS Protect Features 256How Do You Prevent Initial Access? 256How Do You Protect APIs from SQL Injection Attacks Using APIGateway and AWS WAF? 256Prerequisites 257Create an API 257Create and Configure an AWS WAF 259AWS Detection Features 263How Do You Detect Privilege Escalation? 263How Do You Detect the Abuse of Valid Account to Obtain High-Level Permissions? 264Prerequisites 264Configure GuardDuty to Detect Privilege Escalation 265Reviewing the Findings 266How Do You Detect Credential Access? 269How Do You Detect Unsecured Credentials? 269Prerequisites 270Reviewing the Findings 274How Do You Detect Lateral Movement? 276How Do You Detect the Use of Stolen Alternate Authentication Material? 277Prerequisites 277How Do You Detect Potential Unauthorized Access to Your AWS Resources? 277Reviewing the Findings 278How Do You Detect Command and Control? 280How Do You Detect the Communications to a Command and Control Server Using the Domain Name System (DNS)? 281Prerequisites 281How Do You Detect EC2 Instance Communication with a Command and Control (C&C) Server Using DNS 281Reviewing the Findings 282How Do You Detect Data Exfiltration? 284Prerequisites 285How Do You Detect the Exfiltration Using an Anomalous API Request? 285Reviewing the Findings 286How Do You Handle Response and Recover? 289Foundation of Incident Response 289How Do You Create an Automated Response? 290Automating Incident Responses 290Options for Automating Responses 291Cost Comparisons in Scanning Methods 293Event-Driven Responses 294How Do You Automatically Respond to Unintended Disabling of CloudTrail Logging? 295Prerequisites 296Creating a Trail in CloudTrail 296Creating an SNS Topic to Send Emails 299Creating Rules in Amazon EventBridge 302How Do You Orchestrate and Recover? 305Decision Trees 305Use Alternative Accounts 305View or Copy Data 306Sharing Amazon EBS Snapshots 306Sharing Amazon CloudWatch Logs 306Use Immutable Storage 307Launch Resources Near the Event 307Isolate Resources 308Launch Forensic Workstations 309Instance Types and Locations 309How Do You Automatically Recover from Unintended Disabling of CloudTrail Logging? 310Prerequisites 311Aggregate and View Security Status in AWS Security Hub 311Reviewing the Findings 312Create Lambda Function to Orchestrate and Recover 314How Are Machine Learning and Artificial Intelligence Used? 317Summary 318References 319CHAPTER 7 AWS REFERENCE ARCHITECTURE 321AWS Security Framework Overview 322The Identify Function Overview 323The Protect Function Overview 324The Detect Function Overview 325The Respond Function Overview 325The Recover Function Overview 325AWS Reference Architecture 326The Identify Function 326Security Hub 328AWS Config 329AWS Organizations 330AWS Control Tower 331AWS Trusted Advisor 332AWS Well-Architected Tool 333AWS Service Catalog 334AWS Systems Manager 335AWS Identity and Access Management (IAM) 337AWS Single Sign-On (SSO) 338AWS Shield 340AWS Web Application Firewall (WAF) 340AWS Firewall Manager 342AWS Cloud HSM 343AWS Secrets Manager 345AWS Key Management Service (KMS) 345AWS Certificate Manager 346AWS IoT Device Defender 347Amazon Virtual Private Cloud 347AWS PrivateLink 349AWS Direct Connect 349AWS Transit Gateway 350AWS Resource Access Manager 351The Detect and Respond Functions 353GuardDuty 354Amazon Detective 356Amazon Macie 357Amazon Inspector 358Amazon CloudTrail 359Amazon CloudWatch 360Amazon Lambda 361AWS Step Functions 362Amazon Route 53 363AWS Personal Health Dashboard 364The Recover Functions 365Amazon Glacier 366AWS CloudFormation 366CloudEndure Disaster Recovery 367AWS OpsWorks 368Summary 369PART IV THE FUTURE 371CHAPTER 8 THREAT HUNTING IN OTHER CLOUD PROVIDERS 373The Google Cloud Platform 374Google Cloud Platform Security Architecture alignment to NIST 376The Identify Function 376The Protect Function 378The Detect Function 380The Respond Function 382The Recover Function 383The IBM Cloud 385Oracle Cloud Infrastructure Security 386Oracle SaaS Cloud Security Threat Intelligence 387The Alibaba Cloud 388Summary 389References 389CHAPTER 9 THE FUTURE OF THREAT HUNTING 391Artificial Intelligence and Machine Learning 393How ML Reduces False Positives 395How Machine Intelligence Applies to Malware Detection 395How Machine Intelligence Applies to Risk Scoring in a Network 396Advances in Quantum Computing 396Quantum Computing Challenges 398Preparing for the Quantum Future 399Advances in IoT and Their Impact 399Growing IoT Cybersecurity Risks 401Preparing for IoT Challenges 403Operational Technology (OT) 405Importance of OT Security 406Blockchain 406The Future of Cybersecurity with Blockchain 407Threat Hunting as a Service 407The Evolution of the Threat-Hunting Tool 408Potential Regulatory Guidance 408Summary 409References 409PART V APPENDICES 411APPENDIX A MITRE ATT&CK TACTICS 413APPENDIX B PRIVILEGE ESCALATION 415APPENDIX C CREDENTIAL ACCESS 421APPENDIX D LATERAL MOVEMENT 431APPENDIX E COMMAND AND CONTROL 435APPENDIX F DATA EXFILTRATION 443APPENDIX G MITRE CLOUD MATRIX 447Initial Access 447Drive-byCompromise 447Exploiting a Public-FacingApplication 450Phishing 450Using Trusted Relationships 451Using Valid Accounts 452Persistence 452Manipulating Accounts 452Creating Accounts 453Implanting a Container Image 454Office Application Startup 454Using Valid Accounts 455Privilege Escalation 456Modifying the Domain Policy 456Using Valid Accounts 457Defense Evasion 457Modifying Domain Policy 457Impairing Defenses 458Modifying the Cloud Compute Infrastructure 459Using Unused/Unsupported Cloud Regions 459Using Alternate Authentication Material 460Using Valid Accounts 461Credential Access 461Using Brute Force Methods 461Forging Web Credentials 462Stealing an Application Access Token 462Stealing Web Session Cookies 463Using Unsecured Credentials 464Discovery 464Manipulating Account Discovery 464Manipulating Cloud Infrastructure Discovery 465Using a Cloud Service Dashboard 466Using Cloud Service Discovery 466Scanning Network Services 467Discovering Permission Groups 467Discovering Software 468Discovering System Information 468Discovering System Network Connections 469Lateral Movement 469Internal Spear Phishing 469Using Alternate Authentication Material 470Collection 471Collecting Data from a Cloud Storage Object 471Collecting Data from Information Repositories 471Collecting Staged Data 472Collecting Email 473Data Exfiltration 474Detecting Exfiltration 474Impact 475Defacement 475Endpoint Denial of Service 475Resource Hijacking 477APPENDIX H GLOSSARY 479Index 489

Regulärer Preis: 32,99 €
Produktbild für Daten- und Prozessanalyse für Fachinformatiker*innen

Daten- und Prozessanalyse für Fachinformatiker*innen

Ideal für Aus- und Weiterbildung Big Data, Machine Learning und künstliche Intelligenz sind aktuell wohl die am schnellsten wachsenden Teilgebiete der Informatik. Nicht umsonst wurde daher 2020 der neue Fachinformatik-Ausbildungsgang Daten- und Prozessanalyse eingeführt. Worauf es dabei ankommt, zeigt dieses neue Lehr- und Praxisbuch. Auszubildende dieser Fachrichtung finden hier alle nötigen mathematischen Grundlagen, eine Einführung in die Python-Programmierung, Algorithmen und insbesondere Machine-Learning-Verfahren sowie in die Geschäftsprozessanalyse. Für alle Themen kommen praxiserprobte Sprachen, Tools und Bibliotheken zum Einsatz. Inkl. zahlreicher Übungsaufgaben. Aus dem Inhalt:Arbeitsoberfläche, Navigation und ObjekteModelling und SculptingShading, Texturing und MappingLichtquellen, Kameras und TrackingAnimationen mit Keyframes, Pfaden und DrivernPartikelsysteme, Haare und KollisionenRauch, Feuer und FlüssigkeitenDie neuen Geometry Nodes2D-Animationen mit Grease PencilRendering mit Eevee und CyclesCompositing, Schnitt und Ton Import und ExportAutor: Sascha Kersken arbeitet seit vielen Jahren als Softwareentwickler sowie als Trainer für EDV-Schulungen in den Themengebieten Netzwerke und Internet, interaktive Medien und Programmierung. Er hat zahlreiche Fachbücher und Artikel zu verschiedenen IT-Themen geschrieben.Leseprobe (PDF-Link)

Regulärer Preis: 23,92 €
Produktbild für The Personal Computer Past, Present and Future 1975/2021

The Personal Computer Past, Present and Future 1975/2021

This book relates the story of the Personal Computer, from 1975 to 2021. It discusses the spectacular growth in sales over the first 36 years to 2011 and the techniques used by entrepreneurs to make this happen.The next six years to 2017 are years of precipitous decline in Personal computer sales. We explain the causes of this decline.We conclude by an examination of PC sales to 2021, when they enjoyed a resurgence and speculate on why this has been happening.

Regulärer Preis: 4,49 €
Produktbild für Storytelling im UX-Design

Storytelling im UX-Design

Ideen, Inspirationen und Erkenntnisse aus dem traditionellen Storytelling für next-level UX-DesignAngesichts der Vielfalt der Geräte, Schnittstellen und Kanäle haben Sie heutzutage immer weniger Kontrolle darüber, wie Nutzer:innen Ihre sorgfältig konzipierten Produkte erleben. Trotzdem ist es für Sie sehr wichtig zu verstehen, an welchen Punkten der User Journey Ihre Kund:innen sich befinden, damit Sie die passenden Inhalte und interaktiven Elemente zur richtigen Zeit und auf dem richtigen Gerät bereitstellen können.Mit diesem praktischen Leitfaden lernen Sie, welchen positiven Einfluss Storytelling auf Ihr Produktdesign haben kann und wie es Ihnen dabei hilft, die UX Ihrer Produkte entscheidend zu verbessern. Anna Dahlström zeigt anhand zahlreicher spannender Beispiele, wie Sie Storytelling einsetzen und bewährte Prinzipien aus Film und Literatur wie Heldenreise und Storyboards anwenden, um großartige Produkterfahrungen zu erzeugen. Aus dem Inhalt:Erfahren Sie, wie die Anatomie einer guten Geschichte Ihr Produktdesign maßgeblich verbessern kann.Entdecken Sie, wie sich traditionelle Prinzipien, Werkzeuge und Techniken des Storytellings auf wichtige Faktoren des Produktdesigns auswirken.Lernen Sie, wie Sie mit zielgerichtetem Storytelling die richtige Geschichte erzählen und Menschen zum Handeln motivieren.Nutzen Sie die Regeln des Storytellings, um Ihre Produkte vorzustellen, zu präsentieren und zu verkaufen.»Anna Dahlström leistet großartige Arbeit bei der Anwendung von UX- und Designprinzipien auf Storytelling und Kommunikation. Sie greift auf Theater sowie historisches und modernes Storytelling zurück, um eine fesselnde Erzählung zu schaffen. Ich empfehle dieses Buch allen Designern, die ihre internen und externen Kommunikationsfähigkeiten verbessern wollen, insbesondere denjenigen, die in Führungspositionen aufsteigen wollen.«— Ellen Chisa, Mitbegründerin und CEO, Dark

Regulärer Preis: 36,90 €
Produktbild für High-Quality Illumination of Virtual Objects Based on an Environment Estimation in Mixed Reality Applications

High-Quality Illumination of Virtual Objects Based on an Environment Estimation in Mixed Reality Applications

Visualizations of virtual objects in the real environment is often done by a simplified representation with simple surfaces and without reference to the surrounding environment. The seamless fusion of the virtual and real environment is, however, an essential factor in many areas, which is of particular importance when calculating lighting in mixed realities on mobile devices. Current approaches focus on approximations, which allow the calculation of diffuse lighting, whereby the rendering of glossy reflection properties is often neglected. The aim of this book is to enable the visualization of mirror-like reflective surfaces in mixed reality. In order to achieve this goal, various approaches are explored enabling high-quality visualization of virtual objects in realtime with a focus on the use of common hardware such as cameras, sensors in mobile devices, and partially depth sensors. Complete ambient lighting can be estimated, which enables detailed reflections. The results provide a novel way to embed complex and simple geometric shapes with glossy surfaces in the real world which offers a higher level of detail in the reflections without using additional hardware.TOBIAS SCHWANDT´S professional and personal focus at the TU Ilmenau is the area of Mixed-Reality (MR). Within his dissertation, he particularly concerned himself with the topic of illumination of virtual content in AR, its influence on the real environment, the reconstruction of the environment light, and the manipulation of real geometry by virtual content.Introduction.- Fundamentals & State of the Art.- Illumination in Mixed Reality.- Realization.- Results.- Discussion & Limitations.- Conclusion & Outlook.

Regulärer Preis: 74,89 €
Produktbild für The Protractor Handbook

The Protractor Handbook

Learn to quickly set up Protractor and dive into the amazing possibilities that this tool offers for automating browser interactions for a user for any Angular web application. Software testing is here to stay, and an integral part of this is test automation. Protractor is one of the most evolved test automation frameworks that every software testing professional working with an Angular application should know.You will to automate a vast range of actions that a user takes to interact with the browser. From a simple ‘click’ to more complex user actions such as frame switches, selecting from drop-downs, and file downloads using Protractor APIs for Angular-based websites. You will also learn about assertions, timeouts, waits, parallel testing frameworks that are available, and the general pros and cons you should be aware of.With over 150 working code samples demonstrating various test scenarios that you require in your day-to-day automation testing, and examples that may be given in interviews, this book will be your practical handbook to all the key Protractor API implementations.WHAT YOU'LL LEARN* Set up and install Protractor efficiently* Implement Angular-specific locator strategies* Automate Angular web pages* Run parallel execution using Protractor* Explore all the pros, cons and challenges you may face while using Protractor* Use specific notes around each API to ensure optimum usage and avoid common mistakesWHO THIS BOOK IS FORIdeal for test engineers who have a basic understanding of test automation with Selenium, developers who want to implement this testing tool for internal testing, Test Managers/IT Project Managers who want to get some general understanding of this tool and its advantages, and students who want to pursue career in test automation.SHASHANK SHUKLA has been working in software testing for over a decade and is passionate about tools and technology that can be leveraged to enrich the testing experience and optimize the quality of delivery. This is his second Apress book.1. Getting Started2. Installationa. Prerequisitesb. Installation processc. Installation Details3. Locatorsa. IDb. Classc. Name Attributed. Tag Namee. Link Textf. Partial Link Textg. Element with certain texth. CSS Query Selectori. xPathj. JS Functionk. Chain Selectorsl. React Selectorsm. Custom Selectors4. Browser APIsa. Get count of elements returned from an Array of elementb. Get First element returned from an Array of elementc. Get Text of an elementd. Get any element returned from an Array of elementse. Get Last element returned from an Array of elementsf. 'Then' functiong. Iterate all elementsh. Getting all links of a pagei. Map functionj. Reduce functionk. Returns the most relevant locator of an elementl. Scroll an element Into Viewm. Click on an elementn. Double Click on an elemento. Right click on an elementp. Send text to an Input fieldq. Send text to an Input field via addValuer. Send Keyboard keys to an elements. Get Value of an elementt. Clear the text inside an Input fieldu. Hover Mouse on an elementv. Navigating to new URL in a browserw. Navigating Back in a browserx. Navigating Forward in a browsery. Refreshing a web-pagez. Restarting a browseraa. Getting & Setting Window Size & positionbb. Getting Element Sizecc. Maximizing the Browserdd. Minimizing the Browseree. Browser fullscreen modeff. Open a new Windowgg. Get the URL of the current pagehh. Get the Title of the current pageii. Send JavaScript to do a task Vanilla JSCodejj. Send JavaScript to do a task Handeling Datepickerkk. Send JavaScript to do a task Clickingll. Send JavaScript to do a task Detecting Broken imagemm. Taking Full page Screenshotnn. Switching Between Windowsoo. Switching between Framespp. Closing the pageqq. Closing the browserrr. Alerts Accepting an Alertss. Alerts Dismissing an Alerttt. Alerts Reading message of an Alertuu. Alerts Sending message to an Alertvv. Selecting from a Dropdownww. Drag and Dropxx. Uploading a fileyy. Submitting a formzz. Display Cookiesaaa. delete Cookiesbbb.Set Cookiesccc. Basic authenticationddd.GeoLocations5. Element APIsa. Is the element Present? isExistingb. Is the element Present? toExistc. Is the element Present? ToBePresentd. Is the element Present in DOM? ToBeExistinge. Is the element Present inside another element?f. Is the element Enabled? IsEnabledg. Is the element Enabled? ToBeEnabledh. Is the element Disabled? ToBeEnabledi. Is the element Visible? IsDisplayedj. Is the element Visible? ToBeDisplayedk. Is the element Visible? toBeVisiblel. Is the element Visible on the screen? toBeDisplayedInViewportm. Is the element Visible on the screen? toBeVisibleInViewportn. Is the element Selected? isSelectedo. Is the element Selected? ToBeSelectedp. Is the element Selected? ToBeCheckedq. Is the element Clickable? isClickabler. Is the element Clickable? toBeClickable6. Some Additional Protractor IO Methodsa. Is the element Focused? isFocusedb. Is the element Focused? toBeFocusedc. Does the element have a specific Attribute? toHaveAttributed. Does the element have a specific Attribute? toHaveAttre. Does element contains a specific text Attribute? toHaveAttributeContainingf. Does the element have a specific Class? toHaveClassg. Does element contains specific text in Class? toHaveClassContainingh. Does the element have a specific Property? toHavePropertyi. Does the element have a specific Value? toHaveValuej. Does the element have a specific Href? toHaveHrefk. Does element contains specific text in Href? toHaveHrefContainingl. Does the element have specific Link? toHaveLinkm. Does element contains specific text in Link? toHaveLinkContainingn. Does the element have a specific text toHaveTexto. Does element contains a specific text?p. Does the element have specific ID?q. Count of Element7. Waitsa. Wait untilb. Hard Sleepc. Wait for element to be Clickabled. Wait for element to be Displayede. Wait for element to be Enabledf. Wait for element to Existg. Chapter 8: Other APIsh. Dealing with shadow DOMi. Getting the page sourcej. Getting active elementk. Getting the Property of elementl. Getting the CSS Property of elementm. Getting the Tag Name of the elementn. Getting the Location of an elemento. Getting Size of the elementp. Getting the HTML build of the elementq. Debug8. Jasmine Assertionsa. To verify if strings match by valueb. To verify if strings match by value & typec. To verify if a value is Truthyd. To verify if a value is Falsye. To verify if a value is equal(==)f. To verify if a value & type both are equal(===)g. To verify if a value is not equal(==)h. To verify if a value & type are not equal(==)i. To verify if a value is abovej. To verify if a value is belowk. To verify if a Expected is Truel. To verify if a Expected is falsem. To verify if a Expected is an arrayn. To verify if a Expected is a Stringo. To verify if Array contains a valuep. To verify length of an Array9. Timeoutsa. Setting & Getting various Timeoutb. Session Script Timeoutc. Session Page Load Timeoutd. Session Implicit Wait Timeoute. WaitForTimeout Protractor related timeoutsf. Framework related timeouts10. Parallel Executiona. Framework Optionsb. Protractor with Mochac. Protractor with Jasmined. Protractor with Cucumbere. Protractor with Mocha & TypeScript11. Conclusiona. Advantagesb. Disadvantagesc. Challenges

Regulärer Preis: 56,99 €
Produktbild für Azure Security Handbook

Azure Security Handbook

Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization’s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization.This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigue and confusion. Throughout the book you will learn how to secure your applications using Azure’s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure.WHAT YOU WILL LEARN* Remediate security risks of Azure applications by implementing the right security controls at the right time* Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations* Protect the most common reference workloads according to security best practices* Design secure access control solutions for your Azure administrative access, as well as Azure application accessWHO THIS BOOK IS FORCloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise.KARL OTS is a cloud and cybersecurity leader with more than a decade of experience in Microsoft Azure security. He has worked with large enterprises in fields such as technology, manufacturing, and finance. Karl is recognized as a Microsoft Regional Director, a patented inventor, a LinkedIn Learning instructor, and a Microsoft Azure MVP. He holds the Azure Security Engineer, SABSA Foundation SCF, and CISSP certifications. Karl is a frequent speaker on cloud security topics at global conferences such as Microsoft Ignite or (ISC)2 Security Congress. He hosts the Cloud Gossip podcast.1. Introduction to Cloud Security Architecture2. Identity and Access Management3. Logging and Monitoring4. Network Security5. Workload Protection- Data6. Workload Protection- Platform-as-a-Service7. Workload Protection- Containers8 Workload Protection- IaaS

Regulärer Preis: 62,99 €
Produktbild für Practical Enterprise React

Practical Enterprise React

Learn to write a real-world enterprise app using the fundamentals of React and the most popular React libraries. Knowing the basics of React is important, but what is more important is knowing the common third-party libraries and how to use them. The book is perfect for intermediate to experienced React developers or busy React developers who would like to get things done and have maintainable React code.Practical Enterprise React features popular libraries such as React Router v6 for route navigation, Redux with Saga and Thunk for state management, and Formik with Yup for form and input validations. You'll also work with Material UI 5 (the next major version of the most popular UI component library in React), Axios as the HTTP client library, JWT auth for client app authentication, and TypeScript. Finally, you'll learn to deploy the app to Netlify, and containerize the React app to ship it as a standalone container instance or in a Kubernetes cluster.Become a more effective React developer by using what is available out there instead of trying to reinvent the wheel. This book reveals how to save time and money, and build better apps for your clients. Get practical with React enterprise app development and enhance your career.WHAT YOU'LL LEARN* Use TypeScript in React and React Hooks* Work with Redux Toolkit, and TypeScript* Build an inventory dashboard, charts, and calendar* Write forms with Formik* Validate inputs with Yup* Use Material UI for fast user interface building* Secure your React app by building a login form and protecting the routesWHO THIS BOOK IS FORThose interested in writing React enterprise apps. Knowledge of HTML, CSS and JavaScript/TypeScript is required, and experience with JavaScript libraries/frameworks would be useful.Devlin Duldulao is a Filipino full-stack cloud engineer (web, mobile, backend, cloud services developer) based in Norway. He is a Microsoft MVP, an Auth0 Ambassador, a corporate on-site trainer for the past four years, a Microsoft certified trainer, an international conference speaker, and a senior consultant at Inmeta. He loves going to universities and user groups after office hours or during the weekend to share his expertise. If he is not coding or speaking at conferences, he is probably traveling around the world with his wife; trying local foods in different cities. You can find him on Twitter @DevlinDuldulao.Ruby Jane Canagbot is a serendipitous Filipina React.js developer with a wanderlust heart but currently living in Norway. She is based in Oslo, Norway, with about three years of experience as a developer and over ten years as a content writer/manager. She believes that one can still teach old dogs new tricks, even coding.Written by a professional React developer andChapter 1. Getting Ahead in ReactChapter 2. Getting Started with Node Package ManagerChapter 3. Getting Started with React Function Components and TypescriptChapter 4. Setting Up an Enterprise-level AppChapter 5. Navigating the React RouterChapter 6. Writing Local State, Sending HTTP Requests, & ApexChartsChapter 7. Writing Data Tables, Formik Forms, and Yup ValidationsChapter 8. Writing Data Tables, Formik Forms, and Yup Validations -- Part 2Chapter 9: Managing State Using Redux with Redux ToolkitChapter 10: Setting Up Redux Toolkit and Dispatching an Asynchronous ActionChapter 11: Creating, Deleting, and Updating Events on FullCalendar Using RTKChapter 12: Protecting Routes and Authentication in ReactChapter 13: Writing Profile Form and Syncing Profile to ComponentsChapter 14: Updating the Dashboard Sidebar NavigationChapter 15: Creating the Notifications, Security, and Subscription PagesChapter 16: Making the App Mobile-FriendlyChapter 17: Styling Methods for React ComponentsChapter 18: Deploying React in Netlify and in DockerChapter 19: Reusing React Skills in Other Platforms and Frameworks

Regulärer Preis: 66,99 €
Produktbild für Tools für Social Listening und Sentiment-Analyse

Tools für Social Listening und Sentiment-Analyse

Mit diesem Buch lernen Sie, wie Sie Social Listening und Sentiment-Analyse professionell einsetzen können. Der Leser erhält Schritt-für-Schritt-Beschreibungen für verschiedene Einsatzszenarien, gekoppelt mit Übungsaufgaben und nützlichen Materialien, darunter ein Merkblatt für Kennzahlen, eine Checkliste für die Toolauswahl und ein Glossar für Fachbegriffe. Dieses Lehr- und Praxisbuch verdeutlicht anhand von Anwendungsszenarien und Praxisbeispielen, wie Tools und Technologien für Social Listening und Sentiment-Analyse für die Analyse deutschsprachiger Online-Textdaten angewandt werden können und welche Vorteile diese bringen. Der Leser erhält einen Überblick über wichtige Funktionalitäten aktuell verfügbarer Social-Listening-Tools und deren Einsatzmöglichkeiten.MELPOMENI ALEXA ist Professorin an der Hochschule Darmstadt und unterrichtet dort Methoden und Einsatz von Tools für Online Monitoring, Sentiment-Analyse/Opinion Mining und Social Listening im Fachgebiet Onlinekommunikation.MELANIE SIEGEL ist Professorin an der Hochschule Darmstadt und unterrichtet dort Verfahren zur automatischen Analyse von Sprache im Fachgebiet Information Science.Einleitung, Hintergrund und Motivation.- Grundlagen: Social Listening und Sentimentanalyse.- Anwendungsfelder.- Überblick Tools und Technologien.- Tool-Funktionalitäten und Elemente (was wird wie bewertet?).- Anwendungsszenarien: Ziel, Toolauswahl, Analyse, Alarms, Reports inkl. Datenvisualisierung.- Herausforderungen, Grenzen (inkl. Opinion Spam, Sarkasmus, Ironie).- Ausblick (inkl. Sentimentanalyse von Bild und Video).

Regulärer Preis: 39,99 €
Produktbild für Certified Ethical Hacker (CEH) Preparation Guide

Certified Ethical Hacker (CEH) Preparation Guide

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs.You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.WHAT YOU WILL LEARN* Understand the concepts associated with Footprinting* Perform active and passive reconnaissance* Identify enumeration countermeasures* Be familiar with virus types, virus detection methods, and virus countermeasures* Know the proper order of steps used to conduct a session hijacking attack* Identify defensive strategies against SQL injection attacks* Analyze internal and external network traffic using an intrusion detection systemWHO THIS BOOK IS FORSecurity professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and moreAHMED SHEIKH is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as an IT Expert Engineer at a leading IT electrical company.CHAPTER 1. INTRODUCTION TO ETHICAL HACKINGIdentify the five phase of ethical hacking.Identify the different types of hacker attacks.CHAPTER 2. FOOTPRINTING AND RECONNAISSANCE & SCANNING NETWORKSIdentify the specific concepts associated with Footprinting.Describe information gathering tools and methodology.Explain DNS enumeration.Perform active and passive reconnaissance.Recognize the differences between port scanning, network scanning and vulnerability scanning.Identify TCP flag types.Identify types of port scans.Identify scanning countermeasuresCHAPTER 3. ENUMERATIONExplain enumeration techniques.Recognize how to establish sessions.Identify enumeration countermeasures.Perform active and passive enumeration.CHAPTER 4. SYSTEM HACKINGIdentify different types of password attacks.Use a password cracking tool.Identify various password cracking countermeasures.Identify different ways to hide files.Recognize how to detect a rootkit.Identify tools that can be used to cover attacker tracks.CHAPTER 5. TROJANS AND BACKDOOR VIRUSES AND WORMSExplain how a Trojan infects a system.Identify ports used by Trojans and Trojan countermeasures.Identify the symptoms of a virus.Describe how a virus works.Identify virus types, virus detection methods, and virus countermeasures.CHAPTER 6. SNIFFERS AND SOCIAL ENGINEERINGIdentify types of sniffing, and protocols vulnerable to sniffing.Recognize types of sniffing attacks.Identify methods for detecting sniffing.Identify countermeasures for sniffing.Identify different types of social engineering, and social engineering countermeasures.CHAPTER 7. DENIAL OF SERVICEIdentify characteristics of a DoS attack.Analyze symptoms of a DoS attack.Recognize DoS attack techniques.Identify detection techniques, and countermeasure strategies.CHAPTER 8. SESSION HIJACKINGIdentify the proper order of steps used to conduct a session hijacking attack.Recognize different types of session hijacking.Identify TCP/IP hijacking.Describe countermeasures to protect against session hijacking.CHAPTER 9. HACKING WEBSERVERSDefine Web Server architecture.Explain Web server vulnerabilities.Explore various Web Server attacks.CHAPTER 10. HACKING WEB APPLICATIONSIdentify Web application components.Describe Web application attacks.Identify countermeasures.CHAPTER 11. SQL INJECTIONExamine SQL Injection Attacks.Identify defensive strategies against SQL injection attacks.CHAPTER 12. HACKING WIRELESS NETWORKSIdentify various types of wireless networks.Identify authentication methods, and types of wireless encryption.Explain the methodology of wireless hacking.Apply wireless commands and tools.Examine plain text wireless traffic, wired equivalent privacy (WEP)CHAPTER 13. EVADING IDS, FIREWALLS, AND HONEYPOTSIdentify intrusion detection systems, and techniques.Identify the classes of firewalls.Define a honeypot.Analyze internal and external network traffic using an intrusion detection system.CHAPTER 14. BUFFER OVERFLOWDefine a buffer overflow.Identify a buffer overflow.Identify buffer overflow countermeasures.CHAPTER 15. CRYPTOGRAPHYRecognize public key cryptography.Identify a digital signature.Define a message digest.Define secure sockets layer (SSL).Analyze encrypted email.CHAPTER 16. PENETRATION TESTINGIdentify types of security assessments.Identify steps of penetration testing.Examine risk management.Identify various penetration testing tools.

Regulärer Preis: 62,99 €
Produktbild für Teach Yourself VISUALLY Zoom

Teach Yourself VISUALLY Zoom

LEARN ZOOM IN A FLASH WITH STEP-BY-STEP INSTRUCTIONS AND CLEAR, FULL-SIZE SCREENSHOTSFor anyone looking for a fast and easy way to learn the most popular videoconferencing software on the market today, Teach Yourself VISUALLY Zoom is your secret weapon. This hands-on guide skips the long-winded explanations and actually shows you how to do what you need to do in Zoom with full-size, color pictures and screenshots.Whether you’re a total newbie to Zoom or you just need to brush up on some of the finer points of this practical software, you’ll be up and running in no time at all. From joining and hosting Zoom meetings to protecting your privacy and security while you’re online, Teach Yourself VISUALLY Zoom hits all the key features that make online meetings a breeze. You’ll also learn to:* Integrate Zoom with other apps and share screens and PowerPoints with other meeting attendees * Schedule, record, and replay your meetings so you never miss out on the important stuff * Update your Zoom installation to ensure you’re using the latest security patches and upgrades Perfect for anyone expected to use Zoom at school or at work, Teach Yourself VISUALLY Zoom is the most useful and simplest Zoom handbook currently available.PAUL MCFEDRIES has been writing about computers and technology for nearly 30 years. He has authored more than 100 books including the bestselling Teach Yourself VISUALLY Windows 10.CHAPTER 1 GETTING STARTEDUnderstanding Zoom Meetings 4Understanding Other Zoom Products 5Create a Basic Zoom Account 6Sign In to Your Zoom Account 7Upgrade Your Zoom Account 8Download and Install the Zoom App 10Join a Test Meeting 12Explore the Zoom Desktop Window 14Explore the Zoom Mobile Window 15Understanding Presence Status 16Set Your Presence Status 17CHAPTER 2 HOSTING A MEETINGStart an Instant Meeting 20Start an Instant Meeting in Your PersonalMeeting Room 21Invite People to a Meeting 22Schedule a Meeting 24Schedule a Recurring Meeting 26Start a Scheduled Meeting 28Explore Host Controls 30Allow a Person into Your Meeting 31Enable the Co‐Host Option 32Make an Attendee a Meeting Co‐Host 33Assign an Attendee to Type Closed Captions 34Enable Screen Sharing for Participants 35Enable Breakout Rooms for Participants 36Create Breakout Rooms 37Enable Recording for Participants 38End a Meeting 39CHAPTER 3 JOINING A MEETINGJoin a Meeting via the Desktop App 42Join a Meeting via the Mobile App 44Accept a Direct Meeting Invitation 46Join a Meeting via an Invitation Link 47Join a Meeting via the Web 48Configure Meeting Settings 50Explore Attendee Controls 52Keep Meeting Controls On‐Screen 53Change Your Display Name 54Raise Your Hand 55Send a Reaction 56Send Nonverbal Feedback 57Join a Breakout Room 58Change the View 60Show Your Connected Time 61Leave a Meeting 62CHAPTER 4 WORKING WITH MEETING AUDIOTest Your Audio Devices 66Select a Different Audio Output Device 68Select a Different Audio Input Device 70Mute and Unmute Participants 72Mute and Unmute Your Microphone 74Mute Your Microphone Automatically 75Enable Push-to-Talk 76Suppress Background Noise 77Join a Meeting with Audio Automatically 78CHAPTER 5 WORKING WITH MEETING VIDEOSelect a Different Camera 82Stop and Start a Participant’s Video 84Stop and Start Your Video 86Turn Off Video Automatically 87Bypass the Video Preview 88Adjust Video for Low Light 89Choose a Video Filter 90Choose a Virtual Background 92Pin a Participant’s Video 94Spotlight Participant Videos 96CHAPTER 6 SHARING YOUR SCREENShare Your Screen 100Explore Sharing Controls 102Share a Portion of the Screen 103Share Your iPhone or iPad Device Screen 104Share a Whiteboard 106Share a Video 108Share Audio 110Share Video from a Second Camera 112Annotate a Shared Screen 113Share Slides as a Virtual Background 114Host a Screen Share–Only Meeting 116View a Shared Screen in Side‐by‐Side Mode 117Request Control of a Screen Share 118CHAPTER 7 RECORDING A MEETINGCreate a Local Recording 122Configure Cloud Recording 124Create a Cloud Recording 126Set Up Automatic Meeting Recording 128View a Recording 130Delete a Recording 132CHAPTER 8 CONFIGURING SETTINGSAccess Your Zoom Profile 136Change Your Profile Picture 138Change Your Email Address 140Configure Date and Time Settings 142Configure Scheduled Meeting Settings 144Change Basic Meeting Settings 146Change Advanced Meeting Settings 148Control Email Notifications 150Make Zoom Accessible 152Set Meeting Options at the Account andGroup Levels 154Customize Your Host Key 156CHAPTER 9 CONFIGURING SECURITYSet a Strong Password 160Enable Two‐Factor Authentication 162Sign Out of All Devices 166Enable the Waiting Room 168Allow Only Authenticated App Users 170Allow Only Authenticated Web Users 171Disable Passcode Embedding 172Create a Custom Personal Meeting Passcode 173Set Security Options at the Account and Group Levels 174Set In‐Meeting Security Options 176CHAPTER 10 MANAGING USERS AND CONTACTSView Users 180Add a User 182Resend a User Invitation 184Delete a Pending User 185Edit a User 186Change a User’s Role 187Unlink a User 188Delete a User 189Customize the Admin Role 190Create a New Role 192Create a User Group 194Add Members to a Group 196Move a User to Another Group 198Set a User’s Primary Group 199Add an External Contact 200Accept a Contact Request 202CHAPTER 11 CHATTING WITH ZOOMStart a New Chat 206Reply to a Chat Message 208Reply with a Screenshot 210Send a File 212Reply with an Audio Message 214Manage Important Chat Messages 216Configure Chat Notifications 218Create a Channel 220Add Members to a Private Channel 222Join a Public Channel 223Insert Chat Mentions 224Start an Instant Meeting from Chat 225Start a Meeting with a Channel’s Members 226Leave a Channel 227Add Data to Your Personal Chat Space 228CHAPTER 12 MAKING CALLS WITH ZOOM PHONESet Up Zoom Phone 232Configure Zoom Phone Settings 234Make a Call 236Receive a Call 238Listen to Voicemail 239Manage a Call 240Exchange SMS Messages 242Invite a Caller to a Meeting 244Manage Call History 246CHAPTER 13 SETTING UP WEBINARSCreate a Webinar 250Invite People to Your Webinar 252Create a Poll 254Create a Survey 256Configure Q&A Settings 258Start Your Webinar 259Share Your Screen 260Record the Webinar 261Handle Q&A 262Live‐Stream the Webinar 264End the Webinar 265CHAPTER 14 INTEGRATING WITH OTHER APPSSet Up File‐Sharing Integration 268Integrate Calendar and Contacts 270Integrate Dropbox 272Navigate App Marketplace 274Install Zoom Apps 276Index 278

Regulärer Preis: 19,99 €
Produktbild für Pro Azure Administration and Automation

Pro Azure Administration and Automation

Learn best practices and the proper use of Azure management tools, such as Azure Portal, Azure PowerShell, Azure CLI, and ARM templates, which are time-saving tools that support daily administration tasks such as monitoring, alerting, backups, security, and more. This book explores common Azure services, including Azure networking, virtual machines, app services, backup, monitoring, and other tools of the trade that IT professionals use on a regular basis. And you will come away with a strong understanding of these services and how to use them.While Microsoft Azure is no longer “the new cloud on the block,” it continues to be one of the fastest-growing platforms with regard to features, integrations, and capabilities. Over the last decade, it has undergone significant changes and amassed a large following, but many of its users, especially those who transitioned from traditional admin tasks to modern cloud computing, are not reaping its full benefits.Management in the cloud, while seemingly simpler in some ways, is not without its own set of complexities and headaches. Admins want to streamline it where it makes sense and allocate the right resources to the right job in order to keeps cost in check, but where does one begin?PRO AZURE ADMINISTRATION AND AUTOMATION is a comprehensive guide that is chock full of time-saving recipes and scripts you can rely on to learn about day-to-day Azure administration and automation.WHAT YOU WILL LEARN* Attain theoretical and practical knowledge on deploying and managing Azure* Gain an understanding of services, their relationship with other services, and their configuration parameters* Adopt a modern mindset, transitioning from a traditional IT admin mindset to a cloud admin pro* Understand how everything in the cloud is billable and learn how to factor it into choices* Apply in-chapter PowerShell scripts and ARM templates which can be re-purposed* Know when it makes sense to be more involved in tasks (for example, automation and scripting)WHO THIS BOOK IS FORIT professionals who are responsible for the day-to-day tasks in Azure as well as cloud management and planningVLADIMIR STEFANOVIC is a Microsoft Azure MVP and Cloud Solution Architect with more than 15 years of experience in the IT industry. He is also a Microsoft Certified Trainer (MCT) and the MCT Regional Lead for the Serbian chapter. Over the course of his career as a Solution Architect, he has designed and delivered numerous projects in Microsoft Azure and on-premises environments, helping companies across industries customize their infrastructures to meet their specific needs. As a technical trainer, he has delivered hundreds of courses and has successfully mentored many, from students and enthusiasts, to IT professionals.MILOS KATINSKI is an Azure Solutions Engineer with more than 12 years of IT experience spanning from on-premises to cloud-native solutions. Over the last few years, he has focused on cloud technologies and DevOps culture and has helped companies make a smooth transition to Microsoft Azure. Milos enjoys sharing his cloud knowledge and is an active blogger and a regular speaker. He is an active leader of one of the Azure Serbia user groups, and an organizer at Azure Saturday-Belgrade edition conference organizers.CHAPTER 01: FOUNDATIONS IN CLOUD COMPUTINGCHAPTER 02: AZURE ADMINISTRATIONCHAPTER 03: VIRTUAL NETWORKS IN AZURECHAPTER 04: VIRTUAL MACHINE: VIRTUAL MACHINE SCALE SETS IN AZURE COMPUTECHAPTER 05: APP SERVICES AND CONTAINERS IN AZURE COMPUTECHAPTER 06: AZURE STORAGECHAPTER 07: ADVANCED AZURE NETWORKINGCHAPTER 08: MONITORING AND DATA PROTECTIONCHAPTER 09: NETWORK TRAFFIC MANAGEMENTCHAPTER 10: AZURE SECURITY AND COMPLIANCE

Regulärer Preis: 66,99 €
Produktbild für Cloud Native Integration with Apache Camel

Cloud Native Integration with Apache Camel

Address the most common integration challenges, by understanding the ins and outs of the choices and exemplifying the solutions with practical examples on how to create cloud native applications using Apache Camel. Camel will be our main tool, but we will also see some complementary tools and plugins that can make our development and testing easier, such as Quarkus, and tools for more specific use cases, such as Apache Kafka and Keycloak.You will learn to connect with databases, create REST APIs, transform data, connect with message oriented software (MOMs), secure your services, and test using Camel. You will also learn software architecture patterns for integration and how to leverage container platforms, such as Kubernetes. This book is suitable for those who are eager to learn an integration tool that fits the Kubernetes world, and who want to explore the integration challenges that can be solved using containers.WHAT YOU WILL LEARN* Focus on how to solve integration challenges* Understand the basics of the Quarkus as it’s the foundation for the application* Acquire a comprehensive view on Apache Camel* Deploy an application in Kubernetes * Follow good practices WHO THIS BOOK IS FORJava developers looking to learn Apache Camel; Apache Camel developers looking to learn more about Kubernetes deployments; software architects looking to study integration patterns for Kubernetes based systems; system administrators (operations teams) looking to get a better understand of how technologies are integrated.GUILHERME CAMPOSO is a solution architect. He started to use open source projects and completely fell in love with the OSS philosophy and potential, leading him to start working with an open source company in 2018. Throughout his more than 12-year career, starting as a Java developer, becoming a consultant and then an architect, Guilherme was able to acquire a vast experience helping customers from a great variety of business sectors, giving him a broad view on how integration and good software practices can help businesses to grow. Chapter 1: Welcome to Apache CamelCHAPTER GOAL: Introduce readers to Apache Camel, it's basic concepts and contextualize everything with integration patterns. Also introduce other base tools as Quarkus and Maven.NO OF PAGES Approximately 30 pagesSUB -TOPICS1. Apache Camel basics2. Quarkus basics3. Introduction to Enterprise Integration Patterns4. Hello World application (First Application)Chapter 2: Developing REST IntegrationsCHAPTER GOAL: Introduces the conversation on web services applications using REST, how to expose and how to consume those services. Also gives the first examples of unit testing.NO OF PAGES: Approximately 35 pagesSUB - TOPICS1. Web Services with REST2. Camel REST DSL3. Camel HTTP components4. Unit test with QuarkusChapter 3: Securing Web Services with KeycloakCHAPTER GOAL: Introduces the reader to Keycloak, an Open Source product that provides IAM(Identity and Access Management). Focus on OpenID Connect protocol and how important security isNO OF PAGES : Approximately 35 pagesSUB - TOPICS:1. Keycloak basics2. OpenId Connect Protocol3. Quarkus and Camel securityChapter 4: Access Databases with Apache CamelCHAPTER GOAL: Approaches a very common need in programming: access databases. Here we are going to show how to use two of the most used open source databases: H2 and PostgreSQL.NO OF PAGES: Approximately 40 pagesSUB - TOPICS:1. Camel database components2. Database integration patterns3. In-memory database with H24. Transaction controlChapter 5: Messaging with Apache KafkaCHAPTER GOAL: Introduces the reader to Message Oriented Middleware(MOM), which is a very common integration used. We dive into the architecture aspect of this kind of implementation, getting practical examples using Apache Kafka, another very popular Open Source project.NO OF PAGES: Approximately 40 pagesSUB - TOPICS:1. Message Oriented Middleware2. Apache Kafka3. Asynchronous integrationChapter 6: Deploying application into KubernetesCHAPTER GOAL: Here we discuss the architectural aspects of deploying applications into Kubernetes, discussing micro services architecture, scalability, configuration and patterns as The Twelve-Factor Apps. We also learn how to configure the application and plugins to allow us to test and deploy the application in Kubernetes.NO OF PAGES: Approximately 50 pagesSUB - TOPICS:1. The Twelve-Factor Apps2. Quarkus and Camel properties configuration3. Quarkus plugins for Kubernetes Deployments4. The main Kubernetes aspects to take into consideration for your architecture

Regulärer Preis: 62,99 €
Produktbild für Natural Language Processing Recipes

Natural Language Processing Recipes

Focus on implementing end-to-end projects using Python and leverage state-of-the-art algorithms. This book teaches you to efficiently use a wide range of natural language processing (NLP) packages to: implement text classification, identify parts of speech, utilize topic modeling, text summarization, sentiment analysis, information retrieval, and many more applications of NLP.The book begins with text data collection, web scraping, and the different types of data sources. It explains how to clean and pre-process text data, and offers ways to analyze data with advanced algorithms. You then explore semantic and syntactic analysis of the text. Complex NLP solutions that involve text normalization are covered along with advanced pre-processing methods, POS tagging, parsing, text summarization, sentiment analysis, word2vec, seq2seq, and much more. The book presents the fundamentals necessary for applications of machine learning and deep learning in NLP. This second edition goes over advanced techniques to convert text to features such as Glove, Elmo, Bert, etc. It also includes an understanding of how transformers work, taking sentence BERT and GPT as examples. The final chapters explain advanced industrial applications of NLP with solution implementation and leveraging the power of deep learning techniques for NLP problems. It also employs state-of-the-art advanced RNNs, such as long short-term memory, to solve complex text generation tasks.After reading this book, you will have a clear understanding of the challenges faced by different industries and you will have worked on multiple examples of implementing NLP in the real world.WHAT YOU WILL LEARN* Know the core concepts of implementing NLP and various approaches to natural language processing (NLP), including NLP using Python libraries such as NLTK, textblob, SpaCy, Standford CoreNLP, and more* Implement text pre-processing and feature engineering in NLP, including advanced methods of feature engineering* Understand and implement the concepts of information retrieval, text summarization, sentiment analysis, text classification, and other advanced NLP techniques leveraging machine learning and deep learningWHO THIS BOOK IS FORData scientists who want to refresh and learn various concepts of natural language processing (NLP) through coding exercisesAKSHAY KULKARNI is an AI and machine learning evangelist and thought leader. He has consulted with Fortune 500 and global enterprises to drive AI and data science-led strategic transformations. He has a rich experience of building and scaling AI and machine learning businesses and creating significant client impact. Akshay is currently Manager-Data Science & AI at Publicis Sapient where he is part of strategy and transformation interventions through AI. He manages high-priority growth initiatives around data science, works on AI engagements, and applies state-of-the-art techniques. Akshay is a Google Developers Expert-Machine Learning, and is a published author of books on NLP and deep learning. He is a regular speaker at major AI and data science conferences, including Strata, O'Reilly AI Conf, and GIDS. In 2019, he was featured as one of the Top "40 under 40 Data Scientists" in India. In his spare time, he enjoys reading, writing, coding, and helping aspiring data scientists. He lives in Bangalore with his family.ADARSHA SHIVANANDA is Lead Data Scientist at Indegene's Product and Technology team where he leads a group of analysts who enable predictive analytics and AI features for all of their healthcare software products. They handle multi-channel activities for pharma products and solve real-time problems encountered by pharma sales reps. Adarsha aims to build a pool of exceptional data scientists within the organization and to solve greater health care problems through training programs and staying ahead of the curve. His core expertise involves machine learning, deep learning, recommendation systems, and statistics. Adarsha has worked on data science projects across multiple domains using different technologies and methodologies. Previously, he was part of Tredence Analytics and IQVIA. He lives in Bangalore and loves to read and teach data science.Chapter 1: Extracting the DataChapter Goal: Understanding the potential data sources to build NLP applications for business benefits and ways to extract the text data with examplesNo of pages: 23Sub - Topics:1. Data extraction through API2. Reading HTML page, HTML parsing3. Reading pdf file in python4. Reading word document5. Regular expressions using python6. Handling strings using python7. Web scrapingChapter 2: Exploring and Processing the Text DataChapter Goal: Data is never clean. This chapter will give in depth knowledge about how to clean and process the text data. It covers topics like cleaning, tokenizing and normalizing text data.No of pages: 22Sub - Topics1 Text preprocessing methods2 Data cleaning – punctuation removal, stopwords removal, spelling correction3 Lexicon normalization – stemming and lemmatization4 Tokenization5 DEALING WITH EMOTICONS AND EMOJIS6 Exploratory data analysis7 End to end text processing pipeline implementationChapter 3: Text to FeaturesChapter Goal: One of the important task with text data is to transform text data into machines or algorithms understandable form, by using different feature engineering methods (basic to advanced).No of pages: 40Sub - Topics1 One hot encoding2 Count vectorizer3 N grams4 Co-occurrence matrix5 Hashing vectorizer6 TF-IDF7 Word Embedding - Word2vec, fasttext8 GLOVE EMBEDDINGS9 ELMO10 UNIVERSAL SENTENCE ENCODER11 UNDERSTANDING TRANSFORMERS LIKE BERT, GPT12 OPEN AISChapter 4: Implementing Advanced NLPChapter Goal: Understanding and building advanced NLP techniques to solve the business problems starting from text similarity to speech recognition and language translation.No of pages: 25Sub - Topics:1. Noun phrase extraction2. Text similarity3. Parts of speech tagging4. Information extraction – NER – entity recognition5. Topic modeling6. Machine learning for NLP –a. Text classification7. Sentiment analysis8. Word sense disambiguation9. Speech recognition and speech to text10. Text to speech11. Language detection and translationChapter 5: Deep Learning for NLPChapter Goal: Unlocking the power of deep learning on text data. Solving few real-time applications of deep learning in NLP.No of pages: 55Sub - Topics:1. Fundamentals of deep learning2. Information retrieval using word embedding’s3. Text classification using deep learning approaches (CNN, RNN, LSTM, Bi-directional LSTM)4. Natural language generation – prediction next word/ sequence of words using LSTM.5. Text summarization using LSTM encoder and decoder.6. SENTENCE COMPARISON USING SENTENCEBERT7. UNDERSTANDING GPT8. COMPARISON BETWEEN BERT, ROBERTA, DISTILBERT, XLNETChapter 6: Industrial Application with End to End ImplementationChapter Goal: Solving real time NLP applications with end to end implementation using python. Right from framing and understanding the business problem to deploying the model.No of pages: 90Sub - Topics:1. Consumer complaint classification2. Customer reviews sentiment prediction3. Data stitching using text similarity and record linkage4. Text summarization for subject notes5. Document clustering6. PRODUCT360 - SENTIMENT, EMOTION & TREND CAPTURING SYSTEM7. TED TALKS SEGMENTATION & TOPICS EXTRACTION USING MACHINE LEARNING8. FAKE NEWS DETECTION SYSTEM USING DEEP NEURAL NETWORKS9. E-COMMERCE SEARCH ENGINE & RECOMMENDATION SYSTEMS USING DEEP LEARNING10. MOVIE GENRE TAGGING USING MULTI-LABEL CLASSIFICATION11. E-COMMERCE PRODUCT CATEGORIZATION USING DEEP LEARNING12. SARCASM DETECTION MODEL USING CNN13. BUILDING CHATBOT USING TRANSFER LEARNING14. SUMMARIZATION SYSTEM USING RNN AND REINFORCEMENT LEARNINGChapter 7: Conclusion - Next Gen NLP & AIChapter Goal: So far, we learnt how NLP when coupled with machine learning and deep learning helps us solve some of the complex business problems across industries and domains. In this chapter let us uncover how some of the next generation algorithms that would potentially play important roles in the future NLP era.

Regulärer Preis: 62,99 €
Produktbild für From AI to Autonomous and Connected Vehicles

From AI to Autonomous and Connected Vehicles

The main topic of this book is the recent development of on-board advanced driver-assistance systems (ADAS), which we can already tell will eventually contribute to the autonomous and connected vehicles of tomorrow.With the development of automated mobility, it becomes necessary to design a series of modules which, from the data produced by on-board or remote information sources, will enable the construction of a completely automated driving system. These modules are perception, decision and action. State-of-the-art AI techniques and their potential applications in the field of autonomous vehicles are described.Perception systems, focusing on visual sensors, the decision module and the prototyping, testing and evaluation of ADAS systems are all presented for effective implementation on autonomous and connected vehicles.This book also addresses cooperative systems, such as pedestrian detection, as well as the legal issues in the use of autonomous vehicles in open environments. ABDELAZIZ BENSRHAIR is a Professor at the INSA Rouen Normandie, France. He is the Founding Manager of the pedagogical chair of excellence in autonomous and connected vehicles (INSA Rouen Normandie and the ADAS Group of the NextMove cluster) and is an expert in the automotive and mobility R&D cluster NextMove. His research in focused on the field of Intelligent Transport Systems.THIERRY BAPIN has a scientific and legal background and is currently deputy general manager at NextMove, the French competitiveness cluster for automotive and mobility industry. He also coordinates the ADAS Group, manages programs for the creation and development of services for NextMove members (SMEs, higher education and research institutions and local authorities) and is in charge of the sector in the Normandy region.Foreword 1 xiThierry BAPINForeword 2 xiiiDominique GRUYERForeword 3 xixAlberto BROGGIPreface xxiAbdelaziz BENSRHAIRCHAPTER 1. ARTIFICIAL INTELLIGENCE FOR VEHICLES 1Gérard YAHIAOUI1.1. What is AI? 11.2. The main methods of AI 31.2.1. Deep Learning 31.2.2. Machine Learning 41.2.3. Clustering 51.2.4. Reinforcement learning 61.2.5. Case-based reasoning 81.2.6. Logical reasoning 81.2.7. Multi-agent systems 81.2.8. PAC learning 91.3. Modern AI challenges for the industry 91.3.1. Explainability: XAI (eXplainable Artificial Intelligence) 91.3.2. The design of so-called “hybrid” AI systems 101.4. What is an “intelligent” vehicle? 101.4.1. ADAS 111.4.2. The autonomous vehicle 141.4.2. The construction of the intelligent vehicle’s basic building blocks employing AI methods 181.5. References 21CHAPTER 2. CONVENTIONAL VISION OR NOT: A SELECTION OF LOW-LEVEL ALGORITHMS 25Fabien BONARDI, Samia BOUCHAFA, Hicham HADJ-ABDELKADER and Désiré SIDIBÉ2.1. Introduction 252.2. Vision sensors 262.2.1. Conventional cameras 272.2.2. Emerging sensors 302.3. Vision algorithms 332.3.1. Choosing the type of information to be retrieved from the images 342.3.2. Estimation of ego-movement and localization 392.3.3. Detection of the navigable space by a dense approach 442.3.4. From the detection of 3D plans to visual odometry 582.3.5. Detection of obstacles through the compensation of ego-movement 622.3.6. Visual odometry 662.4. Conclusion 712.5. References 72CHAPTER 3. AUTOMATED DRIVING, A QUESTION OF TRAJECTORY PLANNING 79Olivier ORFILA, Dominique GRUYER and Rémi SAINCT3.1. Definition of planning 793.2. Trajectory planning: general characteristics 813.2.1. Variables 833.2.2. Constraints 833.2.3. Cost functions 833.2.4. Planning methodology 833.2.5. Co-pilot respecting legal traffic rules 883.2.6. Trajectory prediction for “ghost” objects and vehicles 923.2.7. Trajectory evaluation 1003.2.8. Results on real vehicles and on simulators 1013.3. Multi-objective trajectory planning 1043.3.1. Linear scalarization 1073.3.2. Nonlinear scalarization 1143.3.3. Ideal methods 1163.3.4. Summary of multi-objective planning methods 1193.3.5. High level information 1193.4. Conclusion on multi-agent planning for a fleet of vehicles: the future of planning 1213.5. References 122CHAPTER 4. FROM VIRTUAL TO REAL, HOW TO PROTOTYPE, TEST, EVALUATE AND VALIDATE ADAS FOR THE AUTOMATED AND CONNECTED VEHICLE? 125Dominique GRUYER, Serge LAVERDURE, Jean-Sébastien BERTHY, Philippe DESOUZA and Mokrane HADJ-BACHIR4.1. Context and goals 1254.2. Generic dynamic and distributed architecture 1284.2.1. Introduction 1284.2.2. An interoperable platform 1294.3. Environment and climatic conditions 1324.3.1. Introduction 1324.3.2. Environmental modeling: lights, shadows, materials and textures 1324.3.3. Degraded, adverse and climatic conditions 1364.3.4. Visibility layers and ground truths 1404.4. Modeling of perception sensors 1434.4.1. Typology of sensor technologies 1434.4.2. From a functional model to a physical model 1454.4.3. Optical sensors 1454.4.4. LIght Detection And Ranging (LIDAR) 1494.4.5. RAdio Detection And Ranging (RADAR) 1514.4.6. Global Navigation Satellite System (GNSS) 1534.5. Connectivity and means of communication 1574.5.1. State of the art 1574.5.2. Statistical model of the propagation channel 1584.5.3. Multi-platform physico-realistic model 1594.6. Some relevant use cases 1614.6.1. Graphic resources 1614.6.2. Communication and overall risk 1614.6.3. Automated parking maneuver 1664.6.4. Co-pilot and automated driving 1694.6.5. Eco-mobility and eco-responsible driving profile 1714.7. Conclusion and perspectives 1744.8. References 176CHAPTER 5. STANDARDS FOR COOPERATIVE INTELLIGENT TRANSPORT SYSTEMS (C-ITS) 181Thierry ERNST5.1. Context and goals 1825.1.1. Intelligent transport systems (ITS) 1825.1.2. The connected and cooperative vehicle 1845.1.3. Silos communication systems 1855.1.4. Cooperative Intelligent Transport Systems (C-ITS) 1865.1.5. Diversity of Cooperative ITS services 1865.1.6. Standardization bodies 1895.1.7. Genesis of the “Cooperative ITS” standards 1905.2. “ITS station” architecture 1925.2.1. General description 1925.2.2. ITS station communication units 1955.2.3. Types of ITS stations 1955.3. Features of the ITS station architecture 1975.3.1. Combination of communication technologies 1975.3.2. Centralized communications 1985.3.3. Localized communications (V2X) 1985.3.4. Hybrid communications 2005.3.5. Extensive communications 2025.3.6. Communications management 2035.3.7. Messaging 2045.3.8. Data organization and identification 2065.3.9. Secure communications and access to data 2075.3.10. Evolution of standards 2085.4. Features of the ITS station architecture 2085.5. Deployment of Cooperative ITS services 2095.6. References 213CHAPTER 6. THE INTEGRATION OF PEDESTRIAN ORIENTATION FOR THE BENEFIT OF ADAS: A MOROCCAN CASE STUDY 215Aouatif AMINE, Abdelaziz BENSRHAIR, Safaa DAFRALLAH and Stéphane MOUSSET6.1. Introduction 2156.2. Advanced Driver Assistance System (ADAS) 2186.3. Proposal for an applicable system to the Moroccan case 2196.4. General conclusion 2306.5. References 231CHAPTER 7. AUTONOMOUS VEHICLE: WHAT LEGAL ISSUES? 233Axelle OFFROY7.1. Introduction 2337.2. The definition of the so-called “autonomous” vehicle 2347.3. Legal framework and experiments 2367.4. The notion of the “driver” 2377.5. The notion of the “custodian” 2387.6. What liability regime? 2387.7. Self-driving vehicle insurance? 2407.8. Personal data and the autonomous vehicle 2427.9. The need for uniform regulation 245List of Authors 247Index 249

Regulärer Preis: 139,99 €
Produktbild für Hyperdocumentation

Hyperdocumentation

The term "hyperdocumentation" is a hyperbole that seems to characterize a paradox. The leading discussions on this topic bring in diverse ideas such as that of data, the fantasy of Big Data, cloud computing, artificial intelligence, algorithmic processing, the flow of information and the outstanding successes of disinformation.The purpose of this book is to show that the current context of documentation is just another step in human construction that has been ongoing for not centuries but millennia and which, since the end of the 19th century, has been accelerating. Coined by Paul Otlet in 1934 in his Traite de Documentation, "hyperdocumentation" refers to the concept of documentation that is constantly being expanded and extended in its functionalities and prerogatives.While, according to Otlet, everything could potentially be documented in this way, increasingly we find that it is our lives that are being hyperdocumented. Hyperdocumentation manifests as an increase not only in the quantity of information that is processed but also in its scope, as information is progressively integrated across areas that were previously poorly documented or even undocumented. OLIVIER LE DEUFF is a lecturer in Information Science and Communication Studies at Bordeaux Montaigne University, France. He is the author of several books, essays and short stories, including Digital Humanities: History and Development, also published by ISTE-WileyAcknowledgements ixForeword xiMichael BUCKLANDIntroduction xvCHAPTER 1 HYPERDOCUMENTATION ACCORDING TO PAUL OTLET 11.1 The different levels of hyper in hyperdocumentation 31.1.1 Hyperdocumentation as an extension 41.1.2 Hyperdocumentation as accumulation 101.1.3 Hyperdocumentation as an increase in documentary forms 121.2 Hyperdocumentation as reduction 131.3 Hyperdocumentation as hypertext 161.4 Hyperdocumentation as a new world order 181.4.1 A hyperdocumentation between utopia and dystopia 211.4.2 Between classification and synthesis 231.5 The ultimate perspective of the documentation 25CHAPTER 2 HYPERDOCUMENTATION AS A TRIUMPH OF DOCUMENTALITY 292.1 A documentary theory of humanity 302.1.1 A philosophical theory of humanity 302.1.2 Homo documentator 312.2 Documentality or social ontology 322.3 Documentality and memory 352.4 Documentation and authority 372.5 A hyperdocumentary era 392.6 A document theory 41CHAPTER 3 HYPERHUMAN OR HYPERMACHINE? 453.1 Desiring machines? 473.2 Typology of hyperdocumentary machines 503.3 Towards hyperdocumentality? 57CHAPTER 4 TOWARDS HYPERDOCUMENTARY REGIMES 594.1 The documentary regime of Otlet’s time 604.2 Changes in documentary regimes 674.2.1 Between memory and knowledge carriers 684.2.2 Hypermediation 694.2.3 Probability regimes 714.2.4 Regimes of confession and conversion 724.2.5 Regimes of monumentality 744.3 Post-Otlet documentation regimes 78CHAPTER 5 BETWEEN KNOWLEDGE INDEXING AND EXISTENCE INDEXING 855.1 An index question 875.2 The two faces of indexing 905.3 The need for an indexing ethic 925.4 A long history of indexing 955.4.1 Tension among those involved in documentation 975.5 Between documentarity and monumentality 1025.6 Which indexation regime? 1045.7 Should we stop indexing? 105CHAPTER 6 PERSONAL DOCUMENTATION: BETWEEN “THE SELF” AND “MYSELF” 1116.1 Renewal of personal documentary practices 1156.2 Self-documentation 1186.3 Self-demonstration or self-documentation 1226.4 Documentary freedom under constraints 1286.5 Hypodocumentation or the concept of sousveillance 132CHAPTER 7 THE HYPERDOCUMENTALISTS OF OUR LIVES 1357.1 The hyperdocumentalists of self 1387.2 From the found friend to the “caring” lover 1417.3 Computing centers or archive centers 1437.4 Post-mortem hyperdocumentation 1477.5 Post-human hyperdocumentation? 149CHAPTER 8 DOCUMENTATION OF ALL THE SENSES 1558.1 Hyperdocumentation as documentation of all the senses 1558.2 Beyond the senses? 1588.3 Paranormal hyperdocumentation 1628.3.1 The hyperdocumentation of the sixth sense 1628.3.2 Charles Fort 1678.4 Political meaning? 1698.5 Indexation of desires 173CHAPTER 9 FREE (OR OPEN?) HYPERDOCUMENTATION 1779.1 Which hyperdocumentary forms are “open”? 1789.2 Documentation as resistance 1819.3 Hyperleaks? 1849.4 Hyperdocumentary convergence: the OSINT 1869.5 Utopia or dystopia? 188CHAPTER 10 CONCLUSION: IS IT NECESSARY TO GO TO SAN JUNIPERO? 19110.1 A continuous confrontation between ancient and modern? 19210.2 Between documents and monuments: Promethean vertigo 19410.3 Towards an ethical hyperdocumentation, the challenge of moderation 19610.4 Preserving the links, nexialism against hyperseparatism 197Postface – Beyond Otlet: Fragmented Encyclopedism 201Jean-Max NOYERReferences 235Index 247

Regulärer Preis: 139,99 €
Produktbild für Pro Java Microservices with Quarkus and Kubernetes

Pro Java Microservices with Quarkus and Kubernetes

Build and design microservices using Java and the Red Hat Quarkus Framework. This book will help you quickly get started with the features and concerns of a microservices architecture. It will introduce Docker and Kubernetes to help you deploy your microservices.You will be guided on how to install the appropriate tools to work properly. For those who are new to enterprise development using Quarkus, you will be introduced to its core principles and main features through a deep step-by-step tutorial. For experts, this book offers some recipes that illustrate how to split monoliths and implement microservices and deploy them as containers to Kubernetes.By the end of reading this book, you will have practical hands-on experience of building microservices using Quarkus and you will master deploying them to Kubernetes.WHAT YOU WILL LEARN* Work with Quarkus and GraalVM* Split a monolith using the domain-driven design approach* Implement the cloud and microservices patterns* Rethink the deployment process* Introduce containerization, Docker, and Kubernetes to your toolkit* Boost microservices efficiency and performance with Azure* Play with Quarkus and distributed application runtimesWHO THIS BOOK IS FORJava developers who want to build microservices using Red Hat Quarkus and who want to deploy them in Kubernetes.Nebrass Lamouchi is a senior software engineer at Microsoft, addicted to Java and cloud technologies. He was a NetBeans Dream Team member until December 2017. Nebrass was one of the happy four winners of the Oracle Groundbreaker Awards in May 2019. Since March 2013 he has also worked as a project leader at the OWASP Foundation on the Barbarus Project.Table of ContentsDedication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4What this book covers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Reader feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7Getting started with Containerization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9Introduction to containerization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10Introducing Docker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Installation and first hands-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12Docker Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Diving into Docker Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Meeting the Docker Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31Achieving more with Docker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Containerization is not Docker only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39Conclusion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42Introduction to the Monolithic architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Introduction to an actual situation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44Presenting the context. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45How to solve these issues ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45Coding the Monolithic application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46Presenting our domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47Coding the application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106Upgrading the Monolithic application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107Implementing QuarkuShop Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108Building and Running QuarkuShop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Building & Deploying the Monolithic application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Importing the Project in Azure DevOps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Creating the CI/CD pipelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171Adding the anti-disasters layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Implementing the Security Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173Implementing the Monitoring Layer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226Microservices Architecture Pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228Microservices Architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229Making the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230Splitting the Monolith: Bombarding the domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232What is Domain-Driven Design ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232Bombarding QuarkuShop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234Dependencies and Commons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234Entities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234Refactoring Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236Transactional Boundaries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238Applying DDD to the code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240Applying Bounded Contexts to Java Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240Locating & breaking the BC Relationships . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242Meeting the microservices concerns and patterns. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250Cloud Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250What’s next? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Getting started with Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259What is Kubernetes ? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259Run Kubernetes locally . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269Practical Summary & Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271Additional reading. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272Implementing the Cloud Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275Bringing the Monolithic Universe to Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293Building the Kubernetized Microservices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Creating the Commons Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295Implementing the Product µservice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299Implementing the Order µservice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306Implementing the Customer µservice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315Implementing the User µservice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318Flying all over the Sky with Quarkus and Kubernetes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320Implementing the Circuit Breaker pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320Implementing the Log Aggregation pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324Implementing the Distributed Tracing pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334Implementing the API Gateway pattern . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346Playing with Quarkus in Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347Bringing Dapr into the game . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349Final words & thoughts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351About the author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352

Regulärer Preis: 79,99 €
Produktbild für State-of-the-Art Deep Learning Models in TensorFlow

State-of-the-Art Deep Learning Models in TensorFlow

Use TensorFlow 2.x in the Google Colab ecosystem to create state-of-the-art deep learning models guided by hands-on examples. The Colab ecosystem provides a free cloud service with easy access to on-demand GPU (and TPU) hardware acceleration for fast execution of the models you learn to build. This book teaches you state-of-the-art deep learning models in an applied manner with the only requirement being an Internet connection. The Colab ecosystem provides everything else that you need, including Python, TensorFlow 2.x, GPU and TPU support, and Jupyter Notebooks.The book begins with an example-driven approach to building input pipelines that feed all machine learning models. You will learn how to provision a workspace on the Colab ecosystem to enable construction of effective input pipelines in a step-by-step manner. From there, you will progress into data augmentation techniques and TensorFlow datasets to gain a deeper understanding of how to work with complex datasets. You will find coverage of Tensor Processing Units (TPUs) and transfer learning followed by state-of-the-art deep learning models, including autoencoders, generative adversarial networks, fast style transfer, object detection, and reinforcement learning.Author Dr. Paper provides all the applied math, programming, and concepts you need to master the content. Examples range from relatively simple to very complex when necessary. Examples are carefully explained, concise, accurate, and complete. Care is taken to walk you through each topic through clear examples written in Python that you can try out and experiment with in the Google Colab ecosystem in the comfort of your own home or office.WHAT YOU WILL LEARN* Take advantage of the built-in support of the Google Colab ecosystem* Work with TensorFlow data sets* Create input pipelines to feed state-of-the-art deep learning models* Create pipelined state-of-the-art deep learning models with clean and reliable Python code* Leverage pre-trained deep learning models to solve complex machine learning tasks* Create a simple environment to teach an intelligent agent to make automated decisionsWHO THIS BOOK IS FORReaders who want to learn the highly popular TensorFlow deep learning platform, those who wish to master the basics of state-of-the-art deep learning models, and those looking to build competency with a modern cloud service tool such as Google ColabDR. PAPER is a retired academic from the Utah State University (USU) Data Analytics and Management Information Systems department in the Huntsman School of Business. He has over 30 years of higher education teaching experience. At USU, he taught for 27 years in the classroom and distance education over satellite. He taught a variety of classes at the undergraduate, graduate, and doctorate levels, but he specializes in applied technology education.Dr. Paper has competency in several programming languages, but his focus is currently on deep learning with Python in the TensorFlow-Colab Ecosystem. He has published extensively on machine learning, including Apress books: Data Science Fundamentals for Python and MongoDB, Hands-on Scikit-Learn for Machine Learning Applications: Data Science Fundamentals with Python, and TensorFlow 2.x in the Colaboratory Cloud: An Introduction to Deep Learning on Google’s Cloud Service. He has also published more than 100 academic articles.Besides growing up in family businesses, Dr. Paper has worked for Texas Instruments, DLS, Inc., and the Phoenix Small Business Administration. He has performed IS consulting work for IBM, AT&T, Octel, the Utah Department of Transportation, and the Space Dynamics Laboratory. He has worked on research projects with several corporations, including Caterpillar, Fannie Mae, Comdisco, IBM, RayChem, Ralston Purina, and Monsanto. He maintains contacts in corporations such as Google, Micron, Oracle, and Goldman Sachs.1. Build TensorFlow Input Pipelines2. Increase the Diversity of your Dataset with Data Augmentation3. TensorFlow Datasets4. Deep Learning with TensorFlow Datasets5. Introduction to Tensor Processing Units6. Simple Transfer Learning with TensorFlow Hub7. Advanced Transfer Learning8. Stacked Autoencoders9. Convolutional and Variational Autoencoders10. Generative Adversarial Networks11. Progressive Growing Generative Adversarial Networks12. Fast Style Transfer13. Object Detection14. An Introduction to Reinforcement Learning

Regulärer Preis: 79,99 €
Produktbild für Artificial Intelligence Hardware Design

Artificial Intelligence Hardware Design

ARTIFICIAL INTELLIGENCE HARDWARE DESIGNLEARN FOUNDATIONAL AND ADVANCED TOPICS IN NEURAL PROCESSING UNIT DESIGN WITH REAL-WORLD EXAMPLES FROM LEADING VOICES IN THE FIELDIn Artificial Intelligence Hardware Design: Challenges and Solutions, distinguished researchers and authors Drs. Albert Chun Chen Liu and Oscar Ming Kin Law deliver a rigorous and practical treatment of the design applications of specific circuits and systems for accelerating neural network processing. Beginning with a discussion and explanation of neural networks and their developmental history, the book goes on to describe parallel architectures, streaming graphs for massive parallel computation, and convolution optimization. The authors offer readers an illustration of in-memory computation through Georgia Tech’s Neurocube and Stanford’s Tetris accelerator using the Hybrid Memory Cube, as well as near-memory architecture through the embedded eDRAM of the Institute of Computing Technology, the Chinese Academy of Science, and other institutions. Readers will also find a discussion of 3D neural processing techniques to support multiple layer neural networks, as well as information like:* A thorough introduction to neural networks and neural network development history, as well as Convolutional Neural Network (CNN) models* Explorations of various parallel architectures, including the Intel CPU, Nvidia GPU, Google TPU, and Microsoft NPU, emphasizing hardware and software integration for performance improvement* Discussions of streaming graph for massive parallel computation with the Blaize GSP and Graphcore IPU* An examination of how to optimize convolution with UCLA Deep Convolutional Neural Network accelerator filter decompositionPerfect for hardware and software engineers and firmware developers, Artificial Intelligence Hardware Design is an indispensable resource for anyone working with Neural Processing Units in either a hardware or software capacity. ALBERT CHUN CHEN LIU, PHD, is Chief Executive Officer of Kneron. He is Adjunct Associate Professor at National Tsing Hua University, National Chiao Tung University, and National Cheng Kung University. He has published over 15 IEEE papers and is an IEEE Senior Member. He is a recipient of the IBM Problem Solving Award based on the use of the EIP tool suite in 2007 and IEEE TCAS Darlington award in 2021.OSCAR MING KIN LAW, PHD, is the Director of Engineering at Kneron. He works on smart robot development and in-memory architecture for neural networks. He has over twenty years of experience in the semiconductor industry working with CPU, GPU, and mobile design. He has also published over 60 patents in various areas. Author Biographies xiPreface xiiiAcknowledgments xvTable of Figures xvii1 INTRODUCTION 11.1 Development History 21.2 Neural Network Models 41.3 Neural Network Classification 41.3.1 Supervised Learning 41.3.2 Semi-supervised Learning 51.3.3 Unsupervised Learning 61.4 Neural Network Framework 61.5 Neural Network Comparison 10Exercise 11References 122 DEEP LEARNING 132.1 Neural Network Layer 132.1.1 Convolutional Layer 132.1.2 Activation Layer 172.1.3 Pooling Layer 182.1.4 Normalization Layer 192.1.5 Dropout Layer 202.1.6 Fully Connected Layer 202.2 Deep Learning Challenges 22Exercise 22References 243 PARALLEL ARCHITECTURE 253.1 Intel Central Processing Unit (CPU) 253.1.1 Skylake Mesh Architecture 273.1.2 Intel Ultra Path Interconnect (UPI) 283.1.3 Sub Non-unified Memory Access Clustering (SNC) 293.1.4 Cache Hierarchy Changes 313.1.5 Single/Multiple Socket Parallel Processing 323.1.6 Advanced Vector Software Extension 333.1.7 Math Kernel Library for Deep Neural Network (MKL-DNN) 343.2 NVIDIA Graphics Processing Unit (GPU) 393.2.1 Tensor Core Architecture 413.2.2 Winograd Transform 443.2.3 Simultaneous Multithreading (SMT) 453.2.4 High Bandwidth Memory (HBM2) 463.2.5 NVLink2 Configuration 473.3 NVIDIA Deep Learning Accelerator (NVDLA) 493.3.1 Convolution Operation 503.3.2 Single Data Point Operation 503.3.3 Planar Data Operation 503.3.4 Multiplane Operation 503.3.5 Data Memory and Reshape Operations 513.3.6 System Configuration 513.3.7 External Interface 523.3.8 Software Design 523.4 Google Tensor Processing Unit (TPU) 533.4.1 System Architecture 533.4.2 Multiply–Accumulate (MAC) Systolic Array 553.4.3 New Brain Floating-Point Format 553.4.4 Performance Comparison 573.4.5 Cloud TPU Configuration 583.4.6 Cloud Software Architecture 603.5 Microsoft Catapult Fabric Accelerator 613.5.1 System Configuration 643.5.2 Catapult Fabric Architecture 653.5.3 Matrix-Vector Multiplier 653.5.4 Hierarchical Decode and Dispatch (HDD) 673.5.5 Sparse Matrix-Vector Multiplication 68Exercise 70References 714 STREAMING GRAPH THEORY 734.1 Blaize Graph Streaming Processor 734.1.1 Stream Graph Model 734.1.2 Depth First Scheduling Approach 754.1.3 Graph Streaming Processor Architecture 764.2 Graphcore Intelligence Processing Unit 794.2.1 Intelligence Processor Unit Architecture 794.2.2 Accumulating Matrix Product (AMP) Unit 794.2.3 Memory Architecture 794.2.4 Interconnect Architecture 794.2.5 Bulk Synchronous Parallel Model 81Exercise 83References 845 CONVOLUTION OPTIMIZATION 855.1 Deep Convolutional Neural Network Accelerator 855.1.1 System Architecture 865.1.2 Filter Decomposition 875.1.3 Streaming Architecture 905.1.3.1 Filter Weights Reuse 905.1.3.2 Input Channel Reuse 925.1.4 Pooling 925.1.4.1 Average Pooling 925.1.4.2 Max Pooling 935.1.5 Convolution Unit (CU) Engine 945.1.6 Accumulation (ACCU) Buffer 945.1.7 Model Compression 955.1.8 System Performance 955.2 Eyeriss Accelerator 975.2.1 Eyeriss System Architecture 975.2.2 2D Convolution to 1D Multiplication 985.2.3 Stationary Dataflow 995.2.3.1 Output Stationary 995.2.3.2 Weight Stationary 1015.2.3.3 Input Stationary 1015.2.4 Row Stationary (RS) Dataflow 1045.2.4.1 Filter Reuse 1045.2.4.2 Input Feature Maps Reuse 1065.2.4.3 Partial Sums Reuse 1065.2.5 Run-Length Compression (RLC) 1065.2.6 Global Buffer 1085.2.7 Processing Element Architecture 1085.2.8 Network-on- Chip (NoC) 1085.2.9 Eyeriss v2 System Architecture 1125.2.10 Hierarchical Mesh Network 1165.2.10.1 Input Activation HM-NoC 1185.2.10.2 Filter Weight HM-NoC 1185.2.10.3 Partial Sum HM-NoC 1195.2.11 Compressed Sparse Column Format 1205.2.12 Row Stationary Plus (RS+) Dataflow 1225.2.13 System Performance 123Exercise 125References 1256 IN-MEMORY COMPUTATION 1276.1 Neurocube Architecture 1276.1.1 Hybrid Memory Cube (HMC) 1276.1.2 Memory Centric Neural Computing (MCNC) 1306.1.3 Programmable Neurosequence Generator (PNG) 1316.1.4 System Performance 1326.2 Tetris Accelerator 1336.2.1 Memory Hierarchy 1336.2.2 In-Memory Accumulation 1336.2.3 Data Scheduling 1356.2.4 Neural Network Vaults Partition 1366.2.5 System Performance 1376.3 NeuroStream Accelerator 1386.3.1 System Architecture 1386.3.2 NeuroStream Coprocessor 1406.3.3 4D Tiling Mechanism 1406.3.4 System Performance 141Exercise 143References 1437 NEAR-MEMORY ARCHITECTURE 1457.1 DaDianNao Supercomputer 1457.1.1 Memory Configuration 1457.1.2 Neural Functional Unit (NFU) 1467.1.3 System Performance 1497.2 Cnvlutin Accelerator 1507.2.1 Basic Operation 1517.2.2 System Architecture 1517.2.3 Processing Order 1547.2.4 Zero-Free Neuron Array Format (ZFNAf) 1557.2.5 The Dispatcher 1557.2.6 Network Pruning 1577.2.7 System Performance 1577.2.8 Raw or Encoded Format (RoE) 1587.2.9 Vector Ineffectual Activation Identifier Format (VIAI) 1597.2.10 Ineffectual Activation Skipping 1597.2.11 Ineffectual Weight Skipping 161Exercise 161References 1618 NETWORK SPARSITY 1638.1 Energy Efficient Inference Engine (EIE) 1638.1.1 Leading Nonzero Detection (LNZD) Network 1638.1.2 Central Control Unit (CCU) 1648.1.3 Processing Element (PE) 1648.1.4 Deep Compression 1668.1.5 Sparse Matrix Computation 1678.1.6 System Performance 1698.2 Cambricon-X Accelerator 1698.2.1 Computation Unit 1718.2.2 Buffer Controller 1718.2.3 System Performance 1748.3 SCNN Accelerator 1758.3.1 SCNN PT-IS-CP-Dense Dataflow 1758.3.2 SCNN PT-IS-CP-Sparse Dataflow 1778.3.3 SCNN Tiled Architecture 1788.3.4 Processing Element Architecture 1798.3.5 Data Compression 1808.3.6 System Performance 1808.4 SeerNet Accelerator 1838.4.1 Low-Bit Quantization 1838.4.2 Efficient Quantization 1848.4.3 Quantized Convolution 1858.4.4 Inference Acceleration 1868.4.5 Sparsity-Mask Encoding 1868.4.6 System Performance 188Exercise 188References 1889 3D NEURAL PROCESSING 1919.1 3D Integrated Circuit Architecture 1919.2 Power Distribution Network 1939.3 3D Network Bridge 1959.3.1 3D Network-on-Chip 1959.3.2 Multiple-Channel High-Speed Link 1959.4 Power-Saving Techniques 1989.4.1 Power Gating 1989.4.2 Clock Gating 199Exercise 200References 201Appendix A: Neural Network Topology 203Index 205

Regulärer Preis: 99,99 €