Computer und IT
Blockchain Essentials
This book will teach you the core concepts of blockchain technology in a concise manner through straightforward, concrete examples using a range of programming languages, including Python and Solidity. The 50 programs presented in this book are all you need to gain a firm understanding of blockchain and how to implement it.The book begins with an introduction to the fundamentals of blockchain technology, followed by a review of its types, framework, applications and challenges. Moving ahead, you will learn basic blockchain programming with hash functions, authentication code, and Merkle trees. You will then dive into the basics of bitcoin, including wallets, digital keys, transactions, digital signatures, and more. This is followed by a crash course on Ethereum programming, its network, and ecosystem. As you progress through the book, you will also learn about Hyperledger and put your newly-gained knowledge to work through case studies and example applications.After reading this book, you will understand blockchain’s underlying concepts and its common implementations.WHAT YOU WILL LEARN* Master theoretical and practical implementations of various blockchain components using Python* Implement hashing, Merkel trees, and smart contracts using the Solidity programming language for various applications* Grasp the internal structure of EVM and its implementation in smart contracts* Understand why blockchain plays an essential role in cryptocurrencies and identify possible applications beyond cryptocurrencies* Investigate and apply alternative blockchain solutions using Hyperledger, including its integration and deployment* Explore research opportunities through case studies and gain an overview of implementation using various languagesWHO IS THIS BOOK FOR:Anyone who is new to blockchain and wants to gain an an understanding of how it works and can be implemented.DR. RAMCHANDRA SHARAD MANGRULKAR is a Professor in the Department of Information Technology at Dwarkadas J. Sanghvi College of Engineering in Mumbai, India. He holds various memberships in professional organizations such as IEEE, ISTE, ACM, and IACSIT. He completed his Doctor of Philosophy (Ph.D.) in Computer Science and Engineering from S.G.B. Amravati University in Maharashtra, and Master of Technology (MTech) degree in Computer Science and Engineering from the National Institute of Technology, Rourkela. Dr. Mangrulkar is proficient in several technologies and tools, including Microsoft's Power BI, Power Automate, Power Query, Power Virtual Agents, Google's Dialog Flow, and Overleaf. With over 23 years of combined teaching and administrative experience, Dr. Mangrulkar has established himself as a knowledgeable and skilled professional in his field. He has also obtained certifications such as Certified Network Security Specialist (ICSI - CNSS) from ICSI, UK. Dr. Mangrulkar has a strong publication record with 95 publications including refereed/peer-reviewed international journal publications, book chapters with international publishers (including Scopus indexed ones), and international conference publications.DR. PALLAVI VIJAY CHAVAN is an Associate Professor in the Department of Information Technology at Ramrao Adik Institute of Technology, D Y Patil Deemed to be University, Navi Mumbai, MH, India. She has been in academics since the past 17 years and has worked in the areas of computing theory, data science, and network security. In her academic journey, she has published research work in the data science and security domains with reputed publishers including Springer, Elsevier, CRC Press, and Inderscience. She has published 2 books, 7+ book chapters, 10+ international journal papers and 30+ international conference papers. She is currently guiding 5 Ph.D. research scholars. She completed her Ph.D. from Rashtrasant Tukadoji Maharaj Nagpur University, Nagpur, MH, India in 2017. She secured the first merit position in Nagpur University for the degree of B.E. in Computer Engineering in 2003. She is recipient of research grants from UGC, CSIR, and University of Mumbai. She is an active reviewer for Elsevier and Inderscience journals. Her firm belief is "Teaching is a mission.”Chapter 1: Introduction to Blockchain.- Chapter 2: Essentials of Blockchain Programming.- Chapter 3: The Bitcoin.- Chapter 4: Ethereum Blockchain.- Chapter 5: Hyperledger.- Chapter 6: Case Studies using Blockchain.- Chapter 7: Beyond Blockchain.
The Cloud Computing Journey
As the need for digital transformation and remote work surges, so does the demand for cloud computing. However, the complexity of cloud architecture and the abundance of vendors and tools can be overwhelming for businesses. This book addresses the need for skilled professionals capable of designing, building, and managing scalable and resilient cloud systems to navigate the complex landscape of cloud computing through practical tips and strategies.This comprehensive cloud computing guide offers the expertise and best practices for evaluating different cloud vendors and tools. The first part will help you gain a thorough understanding of cloud computing basics before delving deeper into cloud architecture, its design, and implementation. Armed with this expert insight, you'll be able to avoid costly mistakes, ensure that your cloud systems are secure and compliant, and build cloud systems that can adapt and grow with the business.By the end of this book, you’ll be proficient in leveraging different vendors and tools to build robust and secure cloud systems to achieve specific goals and meet business requirements.
React Anti-Patterns
Take your React development skills to the next level by examining common anti-patterns with expert insights and practical solutions, to refine your codebases into sophisticated and scalable creations. Through this easy-to-follow guide, React Anti-Patterns serves as a roadmap to elevating the efficiency and maintainability of your React projects.You’ll begin by familiarizing yourself with the essential aspects of React before exploring strategies for structuring React applications and creating well-organized, modular, and easy-to-maintain codebases. From identifying and addressing common anti-patterns using refactoring techniques to harnessing the power of test-driven development (TDD), you’ll learn about the tools and techniques necessary to create reliable and robust tests. As you advance, you’ll get to grips with business logic and design patterns that offer solutions to prevalent challenges faced in React development. The book also offers insights into using composition patterns, such as code splitting and multiple entry points, to enhance the flexibility and modularity of your React applications, guiding you through end-to-end project implementation.By the end of this React book, you’ll be able to overcome common challenges and pitfalls to transform your React projects into elegant, efficient, and maintainable codebases.
Das DDR-Chiffriergerät T-310
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden. So können die damaligen Methoden und Ergebnisse mit den aktuellen Möglichkeiten der kryptologischen Analyse verglichen werden – insbesondere unter dem Aspekt der heute zur Verfügung stehenden Computertechnik. Es wird herausgearbeitet, dass die konsequente Anwendung von Methoden der Gruppen- und Automatentheorie in der Analyse eine zentrale Rolle spielte. Dieser algebraische Analyseansatz aus der sowjetischen Schule wird bis heute unterschätzt – die Betrachtungsweisen können auch für Nichtkryptologen von Nutzen sein. Darüber hinaus werden die Unterschiede dargestellt zwischen der Analyse des Chiffrieralgorithmus, der Sicherheitsanalyse des Geräts und der Chiffrierverfahren, in denen es zum Einsatz kommt. Die Ergänzungen in der zweiten Auflage beruhen auf Informationen früherer Mitarbeiter und auf Dokumenten aus den 80er Jahren, die erst nach Erscheinen der Erstauflage zugänglich wurden: Auf der Basis von Originaldokumenten wird nun die Historie der T-310-Entwicklung ausgehend vom Vorläuferalgorithmus SKS genauer dargestellt. Außerdem gelang es den Autoren, einige zuvor nicht lösbare Probleme mit der heute zur Verfügung stehenden Computertechnik zu bearbeiten – daran wird deutlich, wie begrenzt die Rechenkapazität in den 70er und 80er Jahren war. Schließlich wird der letzte Einsatz der T-310 zur Realisierung von gesicherten Fernschreibverbindungen zwischen Ministerien der BRD und der DDR rekonstruiert.
Beginning C++ Compilers
This book focuses on how to install C/C++ compilers on Linux and Windows platforms in a timely and efficient way. Installing C/C++ compilers, especially Microsoft compilers, typically takes quite a lot of time because it comes with Microsoft Visual Studio for the vast majority of users. Installing Visual Studio requires usually about 40 GB of disk space and a large amount of RAM, so it is impossible to use weak hardware.The authors provide an easy way to deploy Microsoft C/C++ compiler: with no disk space headache and hardware resources lack. The method described saves significant time since software can even be deployed on removable devices, such as flash sticks, in an easy and portable way.It is achieved by using Enterprise Windows Driver Kit (EWDK), single big ISO image, which can be mounted as virtual device and used directly without any installation. EWDK contains everything from Visual Studio except IDE. EWDK also allows to use MASM64 (Microsoft Macro-Assembly) and C# compilers.With the aid of the MSBuild System, one can compile Visual Studio Projects (.vcxproj) and Solutions (.sln) without even using Visual Studio! Similarly, MinGW compilers can be deployed from 7z/zip archives, simply by unpacking into appropriate location. Both Microsoft C/C++ and MinGW compilers can be used as portable software—an approach that does not require administrative privileges at all.WHAT YOU’LL LEARN* Rapid installation of modern Microsoft C/C++ and MinGW compilers.* How to prepare reusable and portable Microsoft C/C++ and MinGW compilers suite on removable media (flash stick, CD/DVD).* How to use Microsoft C/C++ and MinGW compilers even on old/slow computers without standard installation.* How to build under Windows the libraries originally designed for Unix-systems.* Learn to run multiple versions of these compilers at the same time.WHO THIS BOOK IS FORReader of all skills who wants to save time and efforts to start to work with C++. Also useful for scientists who are not familiar with software installation.BERIK TULEUOV is a Senior Lecturer at L. N. Gumilyov Eurasian National University, Nur-Sultan, Kazakhstan. He’s a researcher and mathematician who uses computers for scientific computations and designing algorithms. He runs a topic on The AIFC Tech Hub (a meeting point for global startups, entrepreneurs, investors, industry’s top experts and talent pool) about Microsoft C/C++ compilers. This forum has more than two million registered participants. He regularly takes part in academic and industry conferences, mainly on computer science topics. Interests include programming languages, algorithms and data structures, concurrent (parallel) programming, scientific programming, (La)TeX Typesetting System, and data visualization.Ademi B. Ospanova is an Associate Professor in the Department of Information Security at L. N. Gumilyev Eurasian National University. She is the author of many courses in the field of IT technologies. She is developer of educational programmes of all levels of the university on information security. In the educational process and projects she uses her own software and libraries in C/C++, C#, Java, Prolog, R, Python, Solidity, works in Mathematica, Maple, Sage packages. She also has her own website, including hosting on her own server. She manages grant and initiative research projects, and her Masters and PhD students are winners of national scientific competitions. Ademi also gives courses and consultations on cryptography and programming to specialists from various companies."Part I. Operating Systems and PlatformsIntroductionChapter 1. Files and DevicesChapter Goal: General Information on Files and DevicesFile types and formatsExecutable and batch filesSystem commandsMounting DevicesVirtual DevicesChapter 2. Software InstallationChapter Goal: Description of Software Installation WaysInstallation packages (msi)Installing with archivesInstalling from sourcesPortable InstallationOverview of Installation MethodsBest Software Installation Practices for Windows systemsChapter 3. Programming Languages and SoftwareChapter Goal: Overview of Programming LanguagesProgramming LanguagesC/C++FortranAssemblyPart II. Programming EnvironmentsChapter 4. General Build InformationChapter Goal: Description of Software Building on Various Platforms with Various CompilersUnix systemsGNU Autotools (GNU Build System)Windows systemsnmake UtilityVisual Studio .vcxproj and .sln filesMSBuild Build SystemCygwinCross-platform topicsChapter 5. Some Useful Open Source UtilitiesChapter Goal: Overview of Handy ToolsFar ManagerDefault InstallationEasy InstallationUsage7zDefault InstallationEasy InstallationUsageNotepad++Default InstallationEasy InstallationUsagelessmsiEasy InstallationUsageWinCDEmuEasy InstallationUsageChapter 6. Command-Line InterfaceChapter Goal: Description of Important Shell EnvironmentCommand InterpreterEnvironment VariablesAccess managementChapter 7. Integrated Development Environments and EditorsChapter Goal: Various Visual Development ToolsMicrosoft Visual StudioQt CreatorCode::BlocksGeanyKateChapter 8. Minimal SystemsChapter Goal: Overview of Handy Build SubsystemsMSYSEasy InstallationSome TipsMSYS2Default InstallationEasy InstallationCMakeDefault InstallationEasy InstallationChapter 9. CompilersChapter Goal: Various Ways of Compilers InstallationsGCC/MinGWDefault InstallationBuilding from the sourcesEasy InstallationMicrosoft C/C++Default InstallationEasy Installation (without Visual Studio) with EWDKIntel C/C++Part III. Building and Using Libraries (A. B. Ospanova, co-author)Chapter 10. LibrariesChapter Goal: Libraries, How to Treat ThemDynamic and Static LibrariesBuilding LibrariesCreating User LibrariesChapter 11. Using LibrariesChapter Goal: Overview of Using LibrariesLinking with Static LibrariesLinking with Dynamic LibrariesUsing Libraries from Source CodeChapter 12. GMP (GNU Multiprecision Library)Chapter Goal: Using GMP LibraryBuildingExample: Computation of 10 000 000!Chapter 13. Crypto++Chapter Goal: Using Crypto++ LibraryBuilding with MinGWBuilding with Microsoft C/C++ CompilerExample: AES ImplementationChapter 14. Process HackerChapter Goal: Using Process Hacker UtilityBuilding with Microsoft C/C++ CompilerBuilding DriverBuilding Utility
Design für Testbarkeit, Fehlersuche und Zuverlässigkeit
In diesem Buch werden mehrere neue Ansätze vorgestellt, die den Weg für die nächste Generation integrierter Schaltungen ebnen, die auch in sicherheitskritischen Anwendungen erfolgreich und zuverlässig integriert werden können. Die Autoren beschreiben neue Maßnahmen zur Bewältigung der steigenden Herausforderungen im Bereich des Designs für Testbarkeit, Fehlersuche und Zuverlässigkeit, die für moderne Schaltungsentwürfe unbedingt erforderlich sind. Insbesondere werden in diesem Buch formale Techniken wie das Satisfiability (SAT)-Problem und das Bounded Model Checking (BMC) kombiniert, um die entstehenden Herausforderungen in Bezug auf die Zunahme des Testdatenvolumens, die Testanwendungszeit und die erforderliche Zuverlässigkeit zu bewältigen. Alle Methoden werden detailliert diskutiert und unter Berücksichtigung von industrie-relevanten Benchmark-Kandidaten ausführlich evaluiert. Alle Maßnahmen wurden in ein gemeinsames Framework integriert, das standardisierte Software/Hardware-Schnittstellen implementiert. Einführung.- Integrierte Schaltungen.- Formale Techniken.- Eingebettete Kompressionsarchitektur für Testzugriffsports.- Optimiertes SAT-basiertes Retargeting für eingebettete Kompression.- Rekonfigurierbare TAP-Controller mit eingebetteter Kompression.- Eingebettete mehrkanalige Testkompression für Tests mit geringer Pin-Anzahl.- Erhöhte Zuverlässigkeit durch formale Techniken.- Fazit und Ausblick.
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
An accessible roadmap to software disassembly for advanced security professionals In x86 Software Reverse-Engineering, Cracking, and Counter-Measures, veteran security researchers and thought leaders deliver an introductory crash course in software reverse-engineering and cracking, as well as the methods used to counter those tactics. The authors provide the foundation to take anyone with a basic background in software and turn them in to proficient x86 reverse engineers, crackers and defenders. In the book, you'll examine software, techniques, and tools that real-world crackers, researchers, and defenders use. You'll put your newfound knowledge to the test with the use of extensive hands on labs, introducing you to a wide range of industry favorite tools - such as IDA, Resource Hacker, Cheat Engine, Immunity, and more. Additionally you'll learn some powerful defensive techniques that not only makes you a better defender but empowers you to be a better reverse engineering and cracker. An essential and practice resource for developers, security professionals, security researchers, and programmers. x86 Software Reverse-Engineering, Cracking and Counter-Measures is the hands-on blueprint for taking apart, reasoning about, and manipulating x86 based code that the security community has been waiting for. A crystal-clear and practical blueprint to software disassembly x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world’s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we’ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventionsReverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry toolsCracking: patching, key checkers, key generators, resource hacking, dependency walkingDefense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications. STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast. CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.
Beginning Anomaly Detection Using Python-Based Deep Learning
This beginner-oriented book will help you understand and perform anomaly detection by learning cutting-edge machine learning and deep learning techniques. This updated second edition focuses on supervised, semi-supervised, and unsupervised approaches to anomaly detection. Over the course of the book, you will learn how to use Keras and PyTorch in practical applications. It also introduces new chapters on GANs and transformers to reflect the latest trends in deep learning.Beginning Anomaly Detection Using Python-Based Deep Learning begins with an introduction to anomaly detection, its importance, and its applications. It then covers core data science and machine learning modeling concepts before delving into traditional machine learning algorithms such as OC-SVM and Isolation Forest for anomaly detection using scikit-learn. Following this, the authors explain the essentials of machine learning and deep learning, and how to implement multilayer perceptrons for supervised anomaly detection in both Keras and PyTorch. From here, the focus shifts to the applications of deep learning models for anomaly detection, including various types of autoencoders, recurrent neural networks (via LSTM), temporal convolutional networks, and transformers, with the latter three architectures applied to time-series anomaly detection. This edition has a new chapter on GANs (Generative Adversarial Networks), as well as new material covering transformer architecture in the context of time-series anomaly detection.After completing this book, you will have a thorough understanding of anomaly detection as well as an assortment of methods to approach it in various contexts, including time-series data. Additionally, you will have gained an introduction to scikit-learn, GANs, transformers, Keras, and PyTorch, empowering you to create your own machine learning- or deep learning-based anomaly detectors.WHAT YOU WILL LEARN* Understand what anomaly detection is, why it it is important, and how it is applied* Grasp the core concepts of machine learning.* Master traditional machine learning approaches to anomaly detection using scikit-kearn.* Understand deep learning in Python using Keras and PyTorch* Process data through pandas and evaluate your model's performance using metrics like F1-score, precision, and recall* Apply deep learning to supervised, semi-supervised, and unsupervised anomaly detection tasks for tabular datasets and time series applicationsWHO THIS BOOK IS FORData scientists and machine learning engineers of all levels of experience interested in learning the basics of deep learning applications in anomaly detection.Suman Kalyan Adari is a machine learning research engineer. He obtained a B.S. in Computer Science at the University of Florida and a M.S. in Computer Science specializing in Machine Learning at Columbia University. He has been conducting deep learning research in adversarial machine learning since his freshman year at the University of Florida and presented at the IEEE Dependable Systems and Networks workshop on Dependable and Secure Machine Learning held in Portland, Oregon in June 2019. Currently, he works on various anomaly detection tasks spanning behavioral tracking and geospatial trajectory modeling.He is passionate about deep learning, and specializes in various fields ranging from video processing, generative modeling, object tracking, time-series modeling, and more.SRIDHAR ALLA is the co-founder and CTO of Bluewhale, which helps organizations big and small in building AI-driven big data solutions and analytics, as well as SAS2PY, a powerful tool to automate migration of SAS workloads to Python-based environments using Pandas or PySpark. He is a published author and an avid presenter at numerous conferences, including Strata, Hadoop World, and Spark Summit. He also has several patents filed with the US PTO on large-scale computing and distributed systems. He has extensive hands-on experience in several technologies, including Spark, Flink, Hadoop, AWS, Azure, Tensorflow, Cassandra, and others. He spoke on Anomaly Detection Using Deep Learning at Strata SFO in March 2019 and also presented at Strata London in October 2019. He was born in Hyderabad, India and now lives in New Jersey, USA with his wife Rosie, his daughters Evelyn andMadelyn, and his son, Jayson. When he is not busy writing code, he loves to spend time with his family. He also enjoys training, coaching, and organizing meetups.
Usability und User Experience Design - Das umfassende Handbuch
Usability und User Experience Design - Das umfassende Handbuch.Gute Usability und User Experience sind niemals Zufall. Dahinter stecken systematische Prozesse und Know-how aus verschiedenen Disziplinen. Produkte zu schaffen, die Menschen nicht nur leicht und sicher bedienen können, sondern rundum schätzen – das lernen Sie hier von erfolgreichen Spezialisten. Sie zeigen Ihnen, wie Sie praktisch vorgehen, um Ihre eigenen Produkte zu optimieren oder Ihre Kunden in Usability- und UX-Projekten dabei zu unterstützen. Umfassende Anleitungen inklusive. Für B2C wie B2B, verschiedene Branchen und Budgets: Mit diesem Handbuch werden Sie immer eine effiziente Methode parat haben!Ihr Weg zu herausragendem UX-Design für B2B- und B2C-AnwendungenInkl. interdisziplinärer Grundlagen, Mindset, Einsichten aus der Praxis, Return of Invest u. v. m.Mit umfassendem Methodenüberblick und praktischer Auswahlhilfe1. Einstieg und WeiterbildungGewinnen Sie den umfassenden Überblick, den Sie als Profi brauchen. Dieses Buch unterstützt Sie beim Lernen im Studium, aber auch, falls Sie Ihre Expertise vertiefen oder in eine stärker datengetriebene Arbeitsweise einsteigen möchten.2. Leitfaden zur MethodenwahlIn der Praxis gilt es, Ressourcen sorgsam einzusetzen und für jedes UX- oder Usability-Projekt den passenden Ansatz zu finden. Der Leitfaden der Autoren zu Methodenauswahl wird von ihren Kunden geschätzt und hat sich in der Praxis vielfach bewährt.3. Psychologie, Design und Ingenieurskunst vereinen sichDas Fundament ist interdisziplinär: In gute UX-Arbeit fließen z. B. Erkenntnisse aus der Psychologie, Grundlagen der Gestaltung und Prinzipien datengetriebener Methoden ein. Was Sie wissen sollten und wie alles zusammenhängt, lernen Sie hier.4. Komplexität und SicherheitVon der Casual App bis zum Medizinprodukt – Rahmenbedingungen und Ziele von Usability-Projekten variieren beträchtlich. Unsere Autoren übernehmen auch in Branchen mit speziellen Anforderungen und komplexen Produkten Verantwortung. Profitieren Sie von ihrem Erfahrungsschatz!´Aus dem Inhalt:Übersicht über Prozesse und VorgehenDas richtige "Mindset"User Researcher Skills: Beobachten, Fragenstellen, ZuhörenPsychologische GrundlagenNutzer*innen, Kund*innen und wirDesigngrundlagenData Driven UX DesignLösungen evaluierenEin Glossar mit allen wichtigen FachbegriffenLeseprobe (PDF-Link)
Game Programming with Unity and C#
Learn the essentials of the Unity game engine, the C# programming language, and the art of object-oriented programming. This book is aimed at beginners with no knowledge or experience in game development or programming.Packed with examples, this Second Edition is up-to-date with the latest Unity standards and features as of 2023, and includes many adjustments to improve your experience. Starting with an introduction to Unity, you will learn the essentials of the engine: navigating the various windows, managing the objects that make up your game, and understanding the concepts that are fundamental to the engine. After that, you will gain a solid foundation in the concepts of object-oriented programming and the syntax of the C# language. Then the fun really begins, as you get hands-on experience building three playable example projects that drill you on the concepts you’ve learned until they stick.Guided at each step by author Casey Hardman, you will outline and implement bare-bones, simple games designed to exercise your development skills: a top-down obstacle course, a tower defense game, and a 3D playground that demonstrates Unity's physics features. As you progress through the book, you'll put to use more and more of the features of C# and Unity, adding tools to your belt and strengthening you as a game developer. By the time you’ve completed the book, you will be empowered to strike out on your own and build the game mechanics of your choice.WHAT YOU WILL LEARN* Understand the fundamentals of object-oriented computer programming and the C# programming language* Leverage the features of Unity to implement game mechanics with reusable, clean, and elegant code* Design and implement your own mechanics and independently solve problems as they ariseWHO IS THIS BOOK FORBeginners who have no prior experience with programming or game development, who would like to learn to create games with a solid foundation that prepares them to further develop their skills.CASEY HARDMAN has been a programmer and hobbyist game developer for over 8 years. He found inspiration in the capacity for immersion and interactivity provided by games, and has nurtured a passion for video games since he was a child. In his early teens, this interest led him on a journey into the world of programming and game design. He works with the Unity game engine, the Godot game engine, and Web development technologies.
Public Cloud Potenzial in einem Unternehmensumfeld
Die Transformation in die Public Cloud ist mit vielen Herausforderungen verbunden. Das Buch erläutert drei Phasen, die die Grundlage für die Ermittlung der Position eines Unternehmens in der Transformation bilden. Jede Stufe umreißt einen Reifegrad der Transformation. Ein Bewertungsrahmen führt den Leser durch die Analyse der Cloud-Readiness zur Identifikation der derzeitigen Stufe des Unternehmens und um die nächste Stufe zur Ausschöpfung des Mehrwerts der Cloud zu erreichen. Das Framework wird durch praxisnahe Beispiele ergänzt.DER INHALT:* Kombination eines mehrstufigen, ganzheitlichen Frameworks* Bewertung zur Ermittlung des Ausgangspunkts der Cloud-Readiness* Überblick über die Reifegrade der Transformation mit PraxisbeispielenDIE ZIELGRUPPEN* IT-Entscheidungsträger von Unternehmen aus allen BranchenNIKLAS FEIL arbeitet als Consultant für die Accenture GmbH und unterstützt Kunden bei der Planung und Durchführung der Cloud-Transformation.DR. ANDRÉ BÖGELSACK arbeitet als Managing Director bei der Accenture AG und unterstützt Kunden aller Industrien bei der Nutzung von Cloud Services im gesamten Lebenszyklus.RAMÓN SCHULZ arbeitet als Direktor bei der Deloitte Consulting GmbH im Bereich Technology Strategy & Transformation und verantwortet Cloud Journey Advisory für Energy, Resources & Industrials.GABRIEL ABRANTES arbeitet als Direktor bei der Deloitte Consulting GmbH im Bereich Technology Strategy & Transformation mit Schwerpunkt auf Cloud Journey Advisory. Einleitung.- Marktübersicht und Cloud Canvas.- Die drei Phasen der Cloud-Adaption.- Bewertung - Bestimmen Sie Ihren Reifegrad für die Cloud-Readiness.- Stufe 1 - Cloud-Strategie und Startphase.- Stufe 2 - Kosten und Cloud-Nutzung unter Kontrolle halten.- Stufe 3 - Verwendung innovativer Technologien und Ausbau der Cloud-Nutzung.- Zusammenfassung und Ausblick.
Deep Learning with MXNet Cookbook
Explore the capabilities of the open-source deep learning framework MXNet to train and deploy neural network models and implement state-of-the-art (SOTA) architectures in Computer Vision, natural language processing, and more. The Deep Learning with MXNet Cookbook is your gateway to constructing fast and scalable deep learning solutions using Apache MXNet.Starting with the different versions of MXNet, this book helps you choose the optimal version for your use and install your library. You’ll work with MXNet/Gluon libraries to solve classification and regression problems and gain insights into their inner workings. Venturing further, you’ll use MXNet to analyze toy datasets in the areas of numerical regression, data classification, picture classification, and text classification. From building and training deep-learning neural network architectures from scratch to delving into advanced concepts such as transfer learning, this book covers it all. You'll master the construction and deployment of neural network architectures, including CNN, RNN, LSTMs, and Transformers, and integrate these models into your applications.By the end of this deep learning book, you’ll wield the MXNet and Gluon libraries to expertly create and train deep learning networks using GPUs and deploy them in different environments.
Learn Azure Administration
Complete with the latest advancements in Azure services, this second edition of Learn Azure Administration is a comprehensive guide to scaling your cloud administration skills, offering an updated exploration of Azure fundamentals and delving into the intricacies of Azure Resource Manager and Azure Active Directory.Starting with infrastructure as code (IaC) basics, this book guides you through the seamless migration to Azure Bicep and ARM templates. From Azure virtual networks planning to deployment, you’ll get to grips with the complexities of Azure Load Balancer, virtual machines, and configuring essential virtual machine extensions. You'll handle the identity and security for users with the Microsoft Entra ID and centralize access using policies and defined roles. Further chapters strengthen your grasp of Azure Storage security, supplemented by an overview of tools such as Network Watcher.By the end of the book, you’ll have a holistic grasp of Azure administration principles to tackle contemporary challenges and expand your proficiency to administer your Azure-based cloud environment using various tools like Azure CLI, Azure PowerShell, and infrastructure as code.
The Definitive Guide to Google Vertex AI
While AI has become an integral part of every organization today, the development of large-scale ML solutions and management of complex ML workflows in production continue to pose challenges for many. Google’s unified data and AI platform, Vertex AI, directly addresses these challenges with its array of MLOPs tools designed for overall workflow management.This book is a comprehensive guide that lets you explore Google Vertex AI’s easy-to-advanced level features for end-to-end ML solution development. Throughout this book, you’ll discover how Vertex AI empowers you by providing essential tools for critical tasks, including data management, model building, large-scale experimentations, metadata logging, model deployments, and monitoring. You’ll learn how to harness the full potential of Vertex AI for developing and deploying no-code, low-code, or fully customized ML solutions. This book takes a hands-on approach to developing u deploying some real-world ML solutions on Google Cloud, leveraging key technologies such as Vision, NLP, generative AI, and recommendation systems. Additionally, this book covers pre-built and turnkey solution offerings as well as guidance on seamlessly integrating them into your ML workflows.By the end of this book, you’ll have the confidence to develop and deploy large-scale production-grade ML solutions using the MLOps tooling and best practices from Google.
Angular Cookbook
Angular has long been the framework of choice for web development projects of various scales, offering much-needed stability and a rich tooling ecosystem for building production-ready web and mobile apps. This recipe-based guide ensures high performance apps with the latest version of Angular, helping you to build up your Angular expertise with a wide range of recipes across key tasks in web development.In this second edition, the recipes have been updated, added, and improved based on developer feedback, new challenges, and Angular 17. The first few chapters will show you how to utilize core Angular concepts such as components, directives, and services to get you ready for building frontend web apps. You’ll then develop web components with Angular and go on to learn about advanced concepts such as dynamic components loading and state management with NgRx for achieving real-time performance.Later chapters will focus on recipes for effectively testing your Angular apps to make them fail-safe, before progressing to techniques for optimizing your app’s performance. Finally, you’ll create Progressive Web Apps (PWA) with Angular to provide an intuitive experience for users.By the end of this book, you’ll be able to create full-fledged, professional-looking Angular apps and have the skills you need for frontend development.
Data Observability for Data Engineering
In the age of information, strategic management of data is critical to organizational success. The constant challenge lies in maintaining data accuracy and preventing data pipelines from breaking. Data Observability for Data Engineering is your definitive guide to implementing data observability successfully in your organization.This book unveils the power of data observability, a fusion of techniques and methods that allow you to monitor and validate the health of your data. You’ll see how it builds on data quality monitoring and understand its significance from the data engineering perspective. Once you're familiar with the techniques and elements of data observability, you'll get hands-on with a practical Python project to reinforce what you've learned. Toward the end of the book, you’ll apply your expertise to explore diverse use cases and experiment with projects to seamlessly implement data observability in your organization.Equipped with the mastery of data observability intricacies, you’ll be able to make your organization future-ready and resilient and never worry about the quality of your data pipelines again.
Mastering QuickBooks 2024
In today's competitive business landscape, efficient financial management is crucial for success. QuickBooks Online has emerged as the go-to accounting software for small businesses, offering a user-friendly platform to manage finances, track expenses, and gain valuable insights. This new edition will help you use QuickBooks Online from scratch and customize it to suit your small business needs. Written by accounting expert Crystalynn Shelton, it takes you on an in-depth journey, from setting up your account to mastering advanced features and customizations.This book empowers you to conquer the latest features of QuickBooks Online 2024, overcome challenges encountered during migration from desktop to online; plan cash flow, profits, revenue with precision; and streamline billing, expense tracking, and financial reporting. As you progress, you’ll learn to manage sales tax, including how to set up, collect, track, pay, and report sales tax payments. You’ll explore how to export reports to Google Sheets, use the custom chart builder, import budgets, and perform smart reporting with with using data sync with Excel. You'll learn how to tailor QuickBooks Online to your specific business needs. By the end of the book, you’ll master the art of QuickBooks Online and take control of your business finances
ASP.NET 8 Best Practices
As .NET 8 emerges as a long-term support (LTS) release designed to assist developers in migrating legacy applications to ASP.NET, this best practices book becomes your go-to guide for exploring the intricacies of ASP.NET and advancing your skills as a software engineer, full-stack developer, or web architect.This book will lead you through project structure and layout, setting up robust source control, and employing pipelines for automated project building. You’ll focus on ASP.NET components and gain insights into their commonalities. As you advance, you’ll cover middleware best practices, learning how to handle frontend tasks involving JavaScript, CSS, and image files. You’ll examine the best approach for working with Blazor applications and familiarize yourself with controllers and Razor Pages. Additionally, you’ll discover how to leverage Entity Framework Core and exception handling in your application. In the later chapters, you’ll master components that enhance project organization, extensibility, security, and performance.By the end of this book, you’ll have acquired a comprehensive understanding of industry-proven concepts and best practices to build real-world ASP.NET 8.0 websites confidently.
Redis Stack for Application Modernization
In modern applications, efficiency in both operational and analytical aspects is paramount, demanding predictable performance across varied workloads. This book introduces you to Redis Stack, an extension of Redis and guides you through its broad data modeling capabilities. With practical examples of real-time queries and searches, you’ll explore Redis Stack’s new approach to providing a rich data modeling experience all within the same database server.You’ll learn how to model and search your data in the JSON and hash data types and work with features such as vector similarity search, which adds semantic search capabilities to your applications to search for similar texts, images, or audio files. The book also shows you how to use the probabilistic Bloom filters to efficiently resolve recurrent big data problems. As you uncover the strengths of Redis Stack as a data platform, you’ll explore use cases for managing database events and leveraging introduce stream processing features. Finally, you’ll see how Redis Stack seamlessly integrates into microservices architectures, completing the picture.By the end of this book, you’ll be equipped with best practices for administering and managing the server, ensuring scalability, high availability, data integrity, stored functions, and more.
DevOps for Databases
In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You’ll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You’ll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you’ll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.
Konzeption und Umsetzung automatisierter Softwaretests
Für die erfolgreiche Umsetzung von Testautomatisierung im Unternehmen wird konkrete Hilfestellung geboten. Das Buch geht auf unterschiedliche Formen und Ausprägungen der Testautomatisierung, ihre Chancen und Risiken und ihren Einsatz in der betrieblichen Praxis ein. Dabei werden sowohl die Auswirkungen auf andere Bereiche (z.B. Anforderungsmanagement, Releasemanagement, Entwicklung) als auch aktuelle Trends beleuchtet. Das Buch enthält weiterhin eine Wirtschaftlichkeitsberechnung zur Einführung von Testautomatisierung, Erläuterungen zu möglichen Metriken als auch die Bewertung der Testautomatisierung mittels Prozessreifemodellen.FRANK WITTE verfügt über langjährige Erfahrung im Softwaretest in unterschiedlichen Unternehmen und Branchen. Dabei kommt es immer wieder vor, dass Prozesse zur Durchführung automatisierter Tests optimiert werden müssen und Testfälle zu automatisieren sind. Er bemerkt dabei immer wieder, dass Zielvorgaben ungenau definiert werden, unrealistische Erwartungen formuliert werden, das Thema zu stark einseitig auf die Entwicklung fokussiert ist und zu wenig im betrieblichen Kontext betrachtet wird.Bedeutung von Automatisierung.- Ziele der Testautomatisierung.- 3 Konzeption der Testautomatisierung und Schritte zur Umsetzung.-Formen der Testautomatisierung.- Automatisierung der Testdokumentation und Testfallgenerierung.- Automatisierung der Testdurchführung.- Automatisierung des Testreportings.- Automatisierung des Fehlermanagements.- Wirtschaftlichkeitsberechnung zur Testautomatisierung.- Arbeitsvorbereitung, Priorisierung und Umsetzung der Testautomatisierung.- Auswahl und Evaluierung geeigneter Tools und Entscheidungsmatrix.- Schritte zur Umsetzung der Testautomatisierung.- Einsatzgebiete für Testautomatisierung.- Reifegrad der Testautomatisierung.- Testorganisation und Testautomatisierung.- Automatisierung in unterschiedlichen Teststufen (Modultest, Integrationstest, Systemtest).- Testautomatisierung in mehreren Projekten.- Releasemanagement und Testautomatisierung.- Metriken für die Testautomatisierung.- Prozessreifemodelle und Reifegrad der Testautomatisierung.- Automatisierungsframeworks.- Rückwirkung der Testautomatisierung auf das Anforderungsmanagement.- Quantität und Qualität automatisierter Testfälle (Testeffektivität und Testeffizienz).- Keyword-Driven Testing und Testautomatisierung.- Testumgebungsmanagement und Testautomatisierung.- Agile Entwicklung, continuos delivery und Testautomatisierung.- Testgetriebene Entwicklung und Testautomatisierung.- Testdaten und Testdatengetriebene Automatisierung.- Modellbasiertes Testen.- Testautomatisierung und die Zukunft des Testens.- Grenzen der Testautomatisierung.
Implementing CI/CD Using Azure Pipelines
Continuous integration and continuous delivery (CI/CD) are ubiquitous concepts in modern development. Azure Pipelines is one of the most popular services that you can utilize for CI/CD, and this book shows you how it works by taking you through the process of building and automating CI/CD systems using Azure Pipelines and YAML, simplifying integration with Azure resources and reducing human error.You’ll begin by getting an overview of Azure Pipelines and why you should use it. Next, the book helps you get to grips with build and release pipelines, and then builds upon this by introducing the extensive power of YAML syntax, which you can use to implement and configure any task you can think of. As you advance, you’ll discover how to integrate Infrastructure as Code tools, such as Terraform, and perform code analysis with SonarQube. In the concluding chapters, you’ll delve into real-life scenarios and hands-on implementation tasks with Microsoft Azure services, AWS, and cross-mobile application with Flutter, Google Firebase, and more.By the end of this book, you’ll be able to design and build CI/CD systems using Azure Pipelines with consummate ease, write code using YAML, and configure any task that comes to mind.
Machine Learning Security with Azure
With AI and machine learning (ML) models gaining popularity and integrating into more and more applications, it is more important than ever to ensure that models perform accurately and are not vulnerable to cyberattacks. However, attacks can target your data or environment as well. This book will help you identify security risks and apply the best practices to protect your assets on multiple levels, from data and models to applications and infrastructure.This book begins by introducing what some common ML attacks are, how to identify your risks, and the industry standards and responsible AI principles you need to follow to gain an understanding of what you need to protect. Next, you will learn about the best practices to secure your assets. Starting with data protection and governance and then moving on to protect your infrastructure, you will gain insights into managing and securing your Azure ML workspace. This book introduces DevOps practices to automate your tasks securely and explains how to recover from ML attacks. Finally, you will learn how to set a security benchmark for your scenario and best practices to maintain and monitor your security posture.By the end of this book, you’ll be able to implement best practices to assess and secure your ML assets throughout the Azure Machine Learning life cycle.
Analyzing Websites
From a cluster of interconnected HTML pages to online service platforms, websites are constantly changing in form and function. These transformations have led, on the one hand, to human and social sciences renewing or inventing analytical methodologies; and on the other hand, to a reconsideration of the practices of non-specialists and digital professionals.The Web factory is equally included on the agenda of communication training, according to an alternative approach that is complementary to the one that has been implemented for computer scientists.From these two perspectives and drawing upon several case studies, Analyzing Websites presents epistemological and methodological contributions from researchers in Information and Communication Sciences exploring websites as sociotechnical, semi-discursive and communicational devices. This study covers website design as well as their integration into the digital strategies of organizations in the public, associative and private sectors.LUC MASSOU is a professor in Information and Communication Sciences at Université de Lorraine, France, and a member of CREM.PATRICK MPONDO-DICKA is a lecturer in Information and Communication Sciences at Université Toulouse Jean-Jaurès, France, and a member of LERASS.NATHALIE PINÈDE is a professor in Information and Communication Sciences at Université Bordeaux Montaigne, France, and a member of MICA.