Computer und IT
The Official (ISC)2 CCSP CBK Reference
THE ONLY OFFICIAL BODY OF KNOWLEDGE FOR CCSP—THE MOST POPULAR CLOUD SECURITY CREDENTIAL—FULLY REVISED AND UPDATED. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide:* Covers the six CCSP domains and over 150 detailed objectives* Provides guidance on real-world best practices and techniques* Includes illustrated examples, tables, and diagrams The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Foreword to the Fourth Edition xixIntroduction xxiCHAPTER 1 CLOUD CONCEPTS, ARCHITECTURE, AND DESIGN 1Understand Cloud Computing Concepts 2Cloud Computing Definitions 2Cloud Computing Roles and Responsibilities 3Key Cloud Computing Characteristics 7Building Block Technologies 11Describe Cloud Reference Architecture 14Cloud Computing Activities 14Cloud Service Capabilities 15Cloud Service Categories 17Cloud Deployment Models 18Cloud Shared Considerations 21Impact of Related Technologies 27Understand Security Concepts Relevant to Cloud Computing 33Cryptography and Key Management 33Identity and Access Control 34Data and Media Sanitization 36Network Security 37Virtualization Security 39Common Threats 41Security Hygiene 41Understand Design Principles of Secure Cloud Computing 43Cloud Secure Data Lifecycle 43Cloud-BasedBusiness Continuity and Disaster Recovery Plan 44Business Impact Analysis 45Functional Security Requirements 46Security Considerations for Different Cloud Categories 48Cloud Design Patterns 49DevOps Security 51Evaluate Cloud Service Providers 51Verification against Criteria 52System/Subsystem Product Certifications 54Summary 56CHAPTER 2 CLOUD DATA SECURITY 57Describe Cloud Data Concepts 58Cloud Data Lifecycle Phases 58Data Dispersion 61Data Flows 62Design and Implement Cloud Data Storage Architectures 63Storage Types 63Threats to Storage Types 66Design and Apply Data Security Technologies and Strategies 67Encryption and Key Management 67Hashing 70Data Obfuscation 71Tokenization 73Data Loss Prevention 74Keys, Secrets, and Certificates Management 77Implement Data Discovery 78Structured Data 79Unstructured Data 80Semi-structuredData 81Data Location 82Implement Data Classification 82Data Classification Policies 83Mapping 85Labeling 86Design and Implement Information Rights Management 87Objectives 88Appropriate Tools 89Plan and Implement Data Retention, Deletion, and Archiving Policies 89Data Retention Policies 90Data Deletion Procedures and Mechanisms 93Data Archiving Procedures and Mechanisms 94Legal Hold 95Design and Implement Auditability, Traceability, and Accountability of Data Events 96Definition of Event Sources and Requirement of Event Attribution 97Logging, Storage, and Analysis of Data Events 99Chain of Custody and Nonrepudiation 100Summary 101CHAPTER 3 CLOUD PLATFORM AND INFRASTRUCTURE SECURITY 103Comprehend Cloud Infrastructure and Platform Components 104Physical Environment 104Network and Communications 106Compute 107Virtualization 108Storage 110Management Plane 111Design a Secure Data Center 113Logical Design 114Physical Design 116Environmental Design 117Analyze Risks Associated with Cloud Infrastructure and Platforms 119Risk Assessment 119Cloud Vulnerabilities, Threats, and Attacks 122Risk Mitigation Strategies 123Plan and Implementation of Security Controls 124Physical and Environmental Protection 124System, Storage, and Communication Protection 125Identification, Authentication, and Authorization in Cloud Environments 127Audit Mechanisms 128Plan Disaster Recovery and Business Continuity 131Business Continuity/Disaster Recovery Strategy 131Business Requirements 132Creation, Implementation, and Testing of Plan 134Summary 138CHAPTER 4 CLOUD APPLICATION SECURITY 139Advocate Training and Awareness for Application Security 140Cloud Development Basics 140Common Pitfalls 141Common Cloud Vulnerabilities 142Describe the Secure Software Development Life Cycle Process 144NIST Secure Software Development Framework 145OWASP Software Assurance Maturity Model 145Business Requirements 145Phases and Methodologies 146Apply the Secure Software Development Life Cycle 149Cloud-Specific Risks 149Threat Modeling 153Avoid Common Vulnerabilities during Development 156Secure Coding 156Software Configuration Management and Versioning 157Apply Cloud Software Assurance and Validation 158Functional and Non-functional Testing 159Security Testing Methodologies 160Quality Assurance 164Abuse Case Testing 164Use Verified Secure Software 165Securing Application Programming Interfaces 165Supply-Chain Management 166Third-Party Software Management 166Validated Open-Source Software 167Comprehend the Specifics of Cloud Application Architecture 168Supplemental Security Components 169Cryptography 171Sandboxing 172Application Virtualization and Orchestration 173Design Appropriate Identity and Access Management Solutions 174Federated Identity 175Identity Providers 175Single Sign-on 176Multifactor Authentication 176Cloud Access Security Broker 178Summary 179CHAPTER 5 CLOUD SECURITY OPERATIONS 181Build and Implement Physical and Logical Infrastructure for Cloud Environment 182Hardware-Specific Security Configuration Requirements 182Installation and Configuration of Virtualization Management Tools 185Virtual Hardware–Specific Security Configuration Requirements 186Installation of Guest Operating System Virtualization Toolsets 188Operate Physical and Logical Infrastructure for Cloud Environment 188Configure Access Control for Local and Remote Access 188Secure Network Configuration 190Operating System Hardening through the Application of Baselines 195Availability of Stand-Alone Hosts 196Availability of Clustered Hosts 197Availability of Guest Operating Systems 199Manage Physical and Logical Infrastructure for Cloud Environment 200Access Controls for Remote Access 201Operating System Baseline Compliance Monitoring and Remediation 202Patch Management 203Performance and Capacity Monitoring 205Hardware Monitoring 206Configuration of Host and Guest Operating System Backup and Restore Functions 207Network Security Controls 208Management Plane 212Implement Operational Controls and Standards 212Change Management 213Continuity Management 214Information Security Management 216Continual Service Improvement Management 217Incident Management 218Problem Management 221Release Management 221Deployment Management 222Configuration Management 224Service Level Management 225Availability Management 226Capacity Management 227Support Digital Forensics 228Forensic Data Collection Methodologies 228Evidence Management 230Collect, Acquire, and Preserve Digital Evidence 231Manage Communication with Relevant Parties 234Vendors 235Customers 236Partners 238Regulators 238Other Stakeholders 239Manage Security Operations 239Security Operations Center 240Monitoring of Security Controls 244Log Capture and Analysis 245Incident Management 248Summary 253CHAPTER 6 LEGAL, RISK, AND COMPLIANCE 255Articulating Legal Requirements and Unique Risks within the Cloud Environment 256Conflicting International Legislation 256Evaluation of Legal Risks Specific to Cloud Computing 258Legal Frameworks and Guidelines 258eDiscovery 265Forensics Requirements 267Understand Privacy Issues 267Difference between Contractual and Regulated Private Data 268Country-Specific Legislation Related to Private Data 272Jurisdictional Differences in Data Privacy 277Standard Privacy Requirements 278Privacy Impact Assessments 280Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment 281Internal and External Audit Controls 282Impact of Audit Requirements 283Identify Assurance Challenges of Virtualization and Cloud 284Types of Audit Reports 285Restrictions of Audit Scope Statements 288Gap Analysis 289Audit Planning 290Internal Information Security Management System 291Internal Information Security Controls System 292Policies 293Identification and Involvement of Relevant Stakeholders 296Specialized Compliance Requirements for Highly Regulated Industries 297Impact of Distributed Information Technology Model 298Understand Implications of Cloud to Enterprise Risk Management 299Assess Providers Risk Management Programs 300Differences between Data Owner/Controller vs. Data Custodian/Processor 301Regulatory Transparency Requirements 302Risk Treatment 303Risk Frameworks 304Metrics for Risk Management 307Assessment of Risk Environment 307Understand Outsourcing and Cloud Contract Design 309Business Requirements 309Vendor Management 311Contract Management 312Supply Chain Management 314Summary 316Index 317
Up and Running on Microsoft Viva Connections
Leverage the collaboration capabilities of Microsoft Viva Connections as an employee experience platform to build a gateway to your digital workplace. This book helps you set up Microsoft Viva connections via easy-to-follow steps and extend it to target your business scenarios.The book starts with an introduction to Microsoft Viva and its modules and it discusses Viva Connections for desktop and mobile users. You will learn about the intranet landing experience with SharePoint where you will plan, build, and launch a home site. You will know how to use the app bar and global navigation in Viva Connections and understand the importance of the dashboard and dashboard cards. You will learn how to enable Viva Connections in MS Teams and define a rollout strategy. You will gain experience with Viva Connections on mobile devices and go through end-user guidance. And you will learn to extend Viva Connections with the SharePoint Framework and deploy SPFx solutions.After reading this book, you will be able to set up Microsoft Viva Connections for your digital workplace and empower your employees to search and discover relevant news, information, content, and sites from across the organization.WHAT WILL YOU LEARN* Understand the modern experience in SharePoint with Microsoft Viva Connect* Know best practices for your home site in SharePoint* Get your content ready for feed with SharePoint and Yammer* Build Adaptive Card Extensions (ACEs) with SPFx* Define governance for Viva ConnectionsWHO THIS BOOK IS FORMicrosoft professionals and business users who want to leverage the collaboration capabilities of Microsoft Viva ConnectionsNANDDEEP NACHAN is a two-time Microsoft MVP (Office Apps & Services), and Microsoft Certified Trainer. He is a results-oriented Technology Architect with experience in Microsoft Technologies, especially with Microsoft 365, SharePoint, MS Azure, and Power Platform. He is experienced in the design, implementation, configuration, and maintenance of several large-scale projects. He focuses on architectural design and implementation, website design and development, complete application development cycles, with an intense focus on .NET technologies. He is an active contributor to the PnP Microsoft 365 Platform Community.SMITA NACHAN is a Microsoft MVP (Office Development), and Microsoft Certified Trainer. She is a Certified ScrumMaster (CSM), Certified M365 professional with experience in SharePoint, Microsoft Teams, Power Platform, Groups, Yammer, Forms, and Microsoft Viva. She has 13+ years of experience in the design, implementation, configuration, and adoption of Microsoft 365 across the organization. She focuses on architectural design and implementation, development, and complete application development cycles, with an intense focus on Microsoft 365 apps and services. She is a frequent speaker at various community events, including SPS, Global Microsoft 365 Developer Bootcamp, and Global Power Platform Bootcamp. She is an active contributor to Microsoft 365 Community. She is a travel, fashion, and food blogger.CHAPTER 1: MICROSOFT VIVA FOR EVERYONECHAPTER GOAL: GET INTRODUCED TO MICROSOFT VIVA AND MODULES OF MICROSOFT VIVANO OF PAGES 5SUB -TOPICS1. Microsoft Viva Overview2. Explore Microsoft Viva modules3. Microsoft Viva Connections Experiencebegins toCHAPTER 2: MICROSOFT VIVA CONNECTIONS EXPERIENCE AND SET UPCHAPTER GOAL: UNDERSTAND THE MICROSOFT VIVA CONNECTION EXPERIENCE FOR DESKTOP AND MOBILE USERSNO OF PAGES: 5SUB - TOPICS1. Viva Connections desktop experience2. Viva Connections mobile experience3. Branding4. Understand the setup processCHAPTER 3: MODERN EXPERIENCE IN SHAREPOINTCHAPTER GOAL: UNDERSTAND THE MODERN EXPERIENCE IN SHAREPOINTNO OF PAGES : 10SUB - TOPICS:1. Modern experience in SharePoint2. Classic to modern experience journey3. Features of SharePoint4. Flat hierarchy structure and its importance5. Plan for hub sites6. Navigation experienceCHAPTER 4: HOME SITE SUPERPOWERSCHAPTER GOAL: UNDERSTAND THE INTRANET LANDING EXPERIENCE WITH SHAREPOINT HOME SITENo of pages: 10SUB - TOPICS:1. Plan, build, and launch a home site2. Home site superpowers3. SharePoint templates for home site4. Best practices for home siteCHAPTER 5: APP BAR AND GLOBAL NAVIGATIONCHAPTER GOAL: UNDERSTAND THE IMPORTANCE OF APP BAR AND GLOBAL NAVIGATION.NO OF PAGES: 10SUB - TOPICS:1. Enable SharePoint app bar2. Customize global navigation3. Localization scenariosCHAPTER 6: DASHBOARD AND CARDSCHAPTER GOAL: UNDERSTAND THE IMPORTANCE OF DASHBOARD AND ADDING CARDS TO DASHBOARD.NO OF PAGES: 10SUB - TOPICS:1. Basics of Dashboard2. Dashboard anatomy3. Dashboard authoring4. Dashboard cards5. 3rd party supportCHAPTER 7: DEFINE YOUR CONTENT FEEDSChapter Goal: Get your content ready for feed with SharePoint and Yammer.NO OF PAGES: 10SUB - TOPICS:1. Prepare content for your feeds2. Create engaging experience in feedCHAPTER 8: ENABLE VIVA CONNECTIONS IN MS TEAMSCHAPTER GOAL: PREPARE STRATEGY TO ENABLE VIVA CONNECTIONS AND ROLL OUT IN MS TEAMS.NO OF PAGES: 10SUB - TOPICS:1. Plan for Viva Connections in MS Teams2. Define roll out strategyCHAPTER 9: MOBILE SETTINGSCHAPTER GOAL: DEFINE VIVA CONNECTIONS EXPERIENCE FOR MOBILE.NO OF PAGES: 3SUB - TOPICS:1. Mobile settings guidance2. Viva Connections Dashboard on a mobile deviceCHAPTER 10: END-USER GUIDANCECHAPTER GOAL: DEFINE END USER ROLL OUT PLAN AND GUIDANCE.NO OF PAGES: 3SUB - TOPICS:1. Define roll out plan2. Educate end users for Viva ConnectionsCHAPTER 11: EXTEND VIVA CONNECTIONSCHAPTER GOAL: LEARN TO MEET CUSTOM BUSINESS SCENARIOS BY EXTENDING VIVA CONNECTIONS WITH SHAREPOINT FRAMEWORK (SPFX).NO OF PAGES: 15SUB - TOPICS:1. SPFx to extend Viva Connections2. Build Adaptive Card Extensions (ACEs) with SPFx3. Deploy SPFx solutions
Deep Learning for Targeted Treatments
DEEP LEARNING FOR TREATMENTSTHE BOOK PROVIDES THE DIRECTION FOR FUTURE RESEARCH IN DEEP LEARNING IN TERMS OF ITS ROLE IN TARGETED TREATMENT, BIOLOGICAL SYSTEMS, SITE-SPECIFIC DRUG DELIVERY, RISK ASSESSMENT IN THERAPY, ETC.Deep Learning for Targeted Treatments describes the importance of the deep learning framework for patient care, disease imaging/detection, and health management. Since deep learning can and does play a major role in a patient’s healthcare management by controlling drug delivery to targeted tissues or organs, the main focus of the book is to leverage the various prospects of the DL framework for targeted therapy of various diseases. In terms of its industrial significance, this general-purpose automatic learning procedure is being widely implemented in pharmaceutical healthcare. AUDIENCEThe book will be immensely interesting and useful to researchers and those working in the areas of clinical research, disease management, pharmaceuticals, R&D formulation, deep learning analytics, remote healthcare management, healthcare analytics, and deep learning in the healthcare industry. RISHABHA MALVIYA, PHD, is an associate professor in the Department of Pharmacy, School of Medical and Allied Sciences, Galgotias University. His areas of interest include formulation optimization, nanoformulation, targeted drug delivery, localized drug delivery, and characterization of natural polymers as pharmaceutical excipients. He has authored more than 150 research/review papers for national/international journals of repute. He has been granted more than 10 patents from different countries while a further 40 patents are published/under evaluation. GHEORGHITA GHINEA, PHD, is a professor in Computing, Department of Computer Science Brunel University London. His research activities lie at the confluence of computer science, media, and psychology, and particularly interested in building semantically underpinned human-centered e-systems, particularly integrating human perceptual requirements. Has published more than 30+ articles and received 10+ research grants. RAJESH KUMAR DHANARAJ, PHD, is an associate professor in the School of Computing Science and Engineering at Galgotias University, Greater Noida, India. He has contributed 20+ books on various technologies and 35+ articles and papers in various refereed journals and international conferences and contributed chapters to the books. His research interests include machine learning, cyber-physical systems, and wireless sensor networks. He is an Expert Advisory Panel Member of Texas Instruments Inc USA. BALAMURUGAN BALUSAMY, PHD, is a professor at Galgotias University. He has published 30+ books on various technologies as well as more than 150 journal articles, conferences, and book chapters. SONALI SUNDRAM completed B. Pharm & M. Pharm (pharmacology) from AKTU, Lucknow, and is working at Galgotias University, Greater Noida. Her areas of interest are neurodegeneration, clinical research, and artificial intelligence. She has more than 8 patents to her credit. Preface xviiAcknowledgement xix1 DEEP LEARNING AND SITE-SPECIFIC DRUG DELIVERY: THE FUTURE AND INTELLIGENT DECISION SUPPORT FOR PHARMACEUTICAL MANUFACTURING SCIENCE 1Dhanalekshmi Unnikrishnan Meenakshi, Selvasudha Nandakumar, Arul Prakash Francis, Pushpa Sweety, Shivkanya Fuloria, Neeraj Kumar Fuloria, Vetriselvan Subramaniyan and Shah Alam Khan1.1 Introduction 21.2 Drug Discovery, Screening and Repurposing 51.3 DL and Pharmaceutical Formulation Strategy 111.3.1 DL in Dose and Formulation Prediction 111.3.2 DL in Dissolution and Release Studies 151.3.3 DL in the Manufacturing Process 161.4 Deep Learning Models for Nanoparticle-Based Drug Delivery 191.4.1 Nanoparticles With High Drug Delivery Capacities Using Perturbation Theory 201.4.2 Artificial Intelligence and Drug Delivery Algorithms 211.4.3 Nanoinformatics 221.5 Model Prediction for Site-Specific Drug Delivery 231.5.1 Prediction of Mode and a Site-Specific Action 231.5.2 Precision Medicine 261.6 Future Scope and Challenges 271.7 Conclusion 29References 302 ROLE OF DEEP LEARNING, BLOCKCHAIN AND INTERNET OF THINGS IN PATIENT CARE 39Akanksha Sharma, Rishabha Malviya and Sonali Sundram2.1 Introduction 402.2 IoT and WBAN in Healthcare Systems 422.2.1 IoT in Healthcare 422.2.2 WBAN 442.2.2.1 Key Features of Medical Networks in the Wireless Body Area 442.2.2.2 Data Transmission & Storage Health 452.2.2.3 Privacy and Security Concerns in Big Data 452.3 Blockchain Technology in Healthcare 462.3.1 Importance of Blockchain 462.3.2 Role of Blockchain in Healthcare 472.3.3 Benefits of Blockchain in Healthcare Applications 482.3.4 Elements of Blockchain 492.3.5 Situation Awareness and Healthcare Decision Support with Combined Machine Learning and Semantic Modeling 512.3.6 Mobile Health and Remote Monitoring 532.3.7 Different Mobile Health Application with Description of Usage in Area of Application 542.3.8 Patient-Centered Blockchain Mode 552.3.9 Electronic Medical Record 572.3.9.1 The Most Significant Barriers to Adoption Are 602.3.9.2 Concern Regarding Negative Unintended Consequences of Technology 602.4 Deep Learning in Healthcare 622.4.1 Deep Learning Models 632.4.1.1 Recurrent Neural Networks (RNN) 632.4.1.2 Convolutional Neural Networks (CNN) 642.4.1.3 Deep Belief Network (DBN) 652.4.1.4 Contrasts Between Models 662.4.1.5 Use of Deep Learning in Healthcare 662.5 Conclusion 702.6 Acknowledgments 70References 703 DEEP LEARNING ON SITE-SPECIFIC DRUG DELIVERY SYSTEM 77Prem Shankar Mishra, Rakhi Mishra and Rupa Mazumder3.1 Introduction 783.2 Deep Learning 813.2.1 Types of Algorithms Used in Deep Learning 813.2.1.1 Convolutional Neural Networks (CNNs) 823.2.1.2 Long Short-Term Memory Networks (LSTMs) 833.2.1.3 Recurrent Neural Networks 833.2.1.4 Generative Adversarial Networks (GANs) 843.2.1.5 Radial Basis Function Networks 843.2.1.6 Multilayer Perceptron 853.2.1.7 Self-Organizing Maps 853.2.1.8 Deep Belief Networks 853.3 Machine Learning and Deep Learning Comparison 863.4 Applications of Deep Learning in Drug Delivery System 873.5 Conclusion 90References 904 DEEP LEARNING ADVANCEMENTS IN TARGET DELIVERY 101Sudhanshu Mishra, Palak Gupta, Smriti Ojha, Vijay Sharma, Vicky Anthony and Disha Sharma4.1 Introduction: Deep Learning and Targeted Drug Delivery 1024.2 Different Models/Approaches of Deep Learning and Targeting Drug 1044.3 QSAR Model 1054.3.1 Model of Deep Long-Term Short-Term Memory 1054.3.2 RNN Model 1074.3.3 CNN Model 1084.4 Deep Learning Process Applications in Pharmaceutical 1094.5 Techniques for Predicting Pharmacotherapy 1094.6 Approach to Diagnosis 1104.7 Application 1134.7.1 Deep Learning in Drug Discovery 1144.7.2 Medical Imaging and Deep Learning Process 1154.7.3 Deep Learning in Diagnostic and Screening 1164.7.4 Clinical Trials Using Deep Learning Models 1164.7.5 Learning for Personalized Medicine 1174.8 Conclusion 121Acknowledgment 122References 1225 DEEP LEARNING AND PRECISION MEDICINE: LESSONS TO LEARN FOR THE PREEMINENT TREATMENT FOR MALIGNANT TUMORS 127Selvasudha Nandakumar, Shah Alam Khan, Poovi Ganesan, Pushpa Sweety, Arul Prakash Francis, Mahendran Sekar, Rukkumani Rajagopalan and Dhanalekshmi Unnikrishnan Meenakshi5.1 Introduction 1285.2 Role of DL in Gene Identification, Unique Genomic Analysis, and Precise Cancer Diagnosis 1325.2.1 Gene Identification and Genome Data 1335.2.2 Image Diagnosis 1355.2.3 Radiomics, Radiogenomics, and Digital Biopsy 1375.2.4 Medical Image Analysis in Mammography 1385.2.5 Magnetic Resonance Imaging 1395.2.6 CT Imaging 1405.3 dl in Next-Generation Sequencing, Biomarkers, and Clinical Validation 1415.3.1 Next-Generation Sequencing 1415.3.2 Biomarkers and Clinical Validation 1425.4 dl and Translational Oncology 1445.4.1 Prediction 1445.4.2 Segmentation 1465.4.3 Knowledge Graphs and Cancer Drug Repurposing 1475.4.4 Automated Treatment Planning 1495.4.5 Clinical Benefits 1505.5 DL in Clinical Trials—A Necessary Paradigm Shift 1525.6 Challenges and Limitations 1555.7 Conclusion 157References 1576 PERSONALIZED THERAPY USING DEEP LEARNING ADVANCES 171Nishant Gaur, Rashmi Dharwadkar and Jinsu Thomas6.1 Introduction 1726.2 Deep Learning 1746.2.1 Convolutional Neural Networks 1756.2.2 Autoencoders 1806.2.3 Deep Belief Network (DBN) 1826.2.4 Deep Reinforcement Learning 1846.2.5 Generative Adversarial Network 1866.2.6 Long Short-Term Memory Networks 188References 1917 TELE-HEALTH MONITORING USING ARTIFICIAL INTELLIGENCE DEEP LEARNING FRAMEWORK 199Swati Verma, Rishabha Malviya, Md Aftab Alam and Bhuneshwar Dutta Tripathi7.1 Introduction 2007.2 Artificial Intelligence 2007.2.1 Types of Artificial Intelligence 2017.2.1.1 Machine Intelligence 2017.2.1.2 Types of Machine Intelligence 2037.2.2 Applications of Artificial Intelligence 2047.2.2.1 Role in Healthcare Diagnostics 2057.2.2.2 AI in Telehealth 2057.2.2.3 Role in Structural Health Monitoring 2057.2.2.4 Role in Remote Medicare Management 2067.2.2.5 Predictive Analysis Using Big Data 2077.2.2.6 AI’s Role in Virtual Monitoring of Patients 2087.2.2.7 Functions of Devices 2087.2.2.8 Clinical Outcomes Through Remote Patient Monitoring 2107.2.2.9 Clinical Decision Support 2117.2.3 Utilization of Artificial Intelligence in Telemedicine 2117.2.3.1 Artificial Intelligence–Assisted Telemedicine 2127.2.3.2 Telehealth and New Care Models 2137.2.3.3 Strategy of Telecare Domain 2147.2.3.4 Role of AI-Assisted Telemedicine in Various Domains 2167.3 AI-Enabled Telehealth: Social and Ethical Considerations 2187.4 Conclusion 219References 2208 DEEP LEARNING FRAMEWORK FOR CANCER DIAGNOSIS AND TREATMENT 229Shiv Bahadur and Prashant Kumar8.1 Deep Learning: An Emerging Field for Cancer Management 2308.2 Deep Learning Framework in Diagnosis and Treatment of Cancer 2328.3 Applications of Deep Learning in Cancer Diagnosis 2338.3.1 Medical Imaging Through Artificial Intelligence 2348.3.2 Biomarkers Identification in the Diagnosis of Cancer Through Deep Learning 2348.3.3 Digital Pathology Through Deep Learning 2358.3.4 Application of Artificial Intelligence in Surgery 2368.3.5 Histopathological Images Using Deep Learning 2378.3.6 MRI and Ultrasound Images Through Deep Learning 2378.4 Clinical Applications of Deep Learning in the Management of Cancer 2388.5 Ethical Considerations in Deep Learning–Based Robotic Therapy 2398.6 Conclusion 240Acknowledgments 240References 2419 APPLICATIONS OF DEEP LEARNING IN RADIATION THERAPY 247Akanksha Sharma, Ashish Verma, Rishabha Malviya and Shalini Yadav9.1 Introduction 2489.2 History of Radiotherapy 2509.3 Principal of Radiotherapy 2519.4 Deep Learning 2519.5 Radiation Therapy Techniques 2549.5.1 External Beam Radiation Therapy 2579.5.2 Three-Dimensional Conformal Radiation Therapy (3D-CRT) 2599.5.3 Intensity Modulated Radiation Therapy (IMRT) 2609.5.4 Image-Guided Radiation Therapy (IGRT) 2619.5.5 Intraoperative Radiation Therapy (IORT) 2639.5.6 Brachytherapy 2659.5.7 Stereotactic Radiosurgery (SRS) 2689.6 Different Role of Deep Learning with Corresponding Role of Medical Physicist 2699.6.1 Deep Learning in Patient Assessment 2699.6.1.1 Radiotherapy Results Prediction 2699.6.1.2 Respiratory Signal Prediction 2719.6.2 Simulation Computed Tomography 2719.6.3 Targets and Organs-at-Risk Segmentation 2739.6.4 Treatment Planning 2749.6.4.1 Beam Angle Optimization 2749.6.4.2 Dose Prediction 2769.6.5 Other Role of Deep Learning in Corresponds with Medical Physicists 2779.7 Conclusion 280References 28110 APPLICATION OF DEEP LEARNING IN RADIATION THERAPY 289Shilpa Rawat, Shilpa Singh, Md. Aftab Alam and Rishabha Malviya10.1 Introduction 29010.2 Radiotherapy 29110.3 Principle of Deep Learning and Machine Learning 29310.3.1 Deep Neural Networks (DNN) 29410.3.2 Convolutional Neural Network 29510.4 Role of AI and Deep Learning in Radiation Therapy 29510.5 Platforms for Deep Learning and Tools for Radiotherapy 29710.6 Radiation Therapy Implementation in Deep Learning 30010.6.1 Deep Learning and Imaging Techniques 30110.6.2 Image Segmentation 30110.6.3 Lesion Segmentation 30210.6.4 Computer-Aided Diagnosis 30210.6.5 Computer-Aided Detection 30310.6.6 Quality Assurance 30410.6.7 Treatment Planning 30510.6.8 Treatment Delivery 30510.6.9 Response to Treatment 30610.7 Prediction of Outcomes 30710.7.1 Toxicity 30910.7.2 Survival and the Ability to Respond 31010.8 Deep Learning in Conjunction With Radiomoic 31210.9 Planning for Treatment 31410.9.1 Optimization of Beam Angle 31510.9.2 Prediction of Dose 31510.10 Deep Learning’s Challenges and Future Potential 31610.11 Conclusion 317References 31811 DEEP LEARNING FRAMEWORK FOR CANCER 333Pratishtha11.1 Introduction 33411.2 Brief History of Deep Learning 33511.3 Types of Deep Learning Methods 33611.4 Applications of Deep Learning 33911.4.1 Toxicity Detection for Different Chemical Structures 33911.4.2 Mitosis Detection 34011.4.3 Radiology or Medical Imaging 34111.4.4 Hallucination 34211.4.5 Next-Generation Sequencing (NGS) 34211.4.6 Drug Discovery 34311.4.7 Sequence or Video Generation 34311.4.8 Other Applications 34311.5 Cancer 34311.5.1 Factors 34411.5.1.1 Heredity 34511.5.1.2 Ionizing Radiation 34511.5.1.3 Chemical Substances 34511.5.1.4 Dietary Factors 34511.5.1.5 Estrogen 34611.5.1.6 Viruses 34611.5.1.7 Stress 34711.5.1.8 Age 34711.5.2 Signs and Symptoms of Cancer 34711.5.3 Types of Cancer Treatment Available 34811.5.3.1 Surgery 34811.5.3.2 Radiation Therapy 34811.5.3.3 Chemotherapy 34811.5.3.4 Immunotherapy 34811.5.3.5 Targeted Therapy 34911.5.3.6 Hormone Therapy 34911.5.3.7 Stem Cell Transplant 34911.5.3.8 Precision Medicine 34911.5.4 Types of Cancer 34911.5.4.1 Carcinoma 34911.5.4.2 Sarcoma 34911.5.4.3 Leukemia 35011.5.4.4 Lymphoma and Myeloma 35011.5.4.5 Central Nervous System (CNS) Cancers 35011.5.5 The Development of Cancer (Pathogenesis) Cancer 35011.6 Role of Deep Learning in Various Types of Cancer 35011.6.1 Skin Cancer 35111.6.1.1 Common Symptoms of Melanoma 35111.6.1.2 Types of Skin Cancer 35211.6.1.3 Prevention 35311.6.1.4 Treatment 35311.6.2 Deep Learning in Skin Cancer 35411.6.3 Pancreatic Cancer 35411.6.3.1 Symptoms of Pancreatic Cancer 35511.6.3.2 Causes or Risk Factors of Pancreatic Cancer 35511.6.3.3 Treatments of Pancreatic Cancer 35511.6.4 Deep Learning in Pancreatic Cancer 35511.6.5 Tobacco-Driven Lung Cancer 35711.6.5.1 Symptoms of Lung Cancer 35711.6.5.2 Causes or Risk Factors of Lung Cancer 35811.6.5.3 Treatments Available for Lung Cancer 35811.6.5.4 Deep Learning in Lung Cancer 35811.6.6 Breast Cancer 35911.6.6.1 Symptoms of Breast Cancer 36011.6.6.2 Causes or Risk Factors of Breast Cancer 36011.6.6.3 Treatments Available for Breast Cancer 36111.6.7 Deep Learning in Breast Cancer 36111.6.8 Prostate Cancer 36211.6.9 Deep Learning in Prostate Cancer 36211.7 Future Aspects of Deep Learning in Cancer 36311.8 Conclusion 363References 36312 CARDIOVASCULAR DISEASE PREDICTION USING DEEP NEURAL NETWORK FOR OLDER PEOPLE 369Nagarjuna Telagam, B.Venkata Kranti and Nikhil Chandra Devarasetti12.1 Introduction 37012.2 Proposed System Model 37512.2.1 Decision Tree Algorithm 37512.2.1.1 Confusion Matrix 37612.3 Random Forest Algorithm 38112.4 Variable Importance for Random Forests 38312.5 The Proposed Method Using a Deep Learning Model 38412.5.1 Prevention of Overfitting 38612.5.2 Batch Normalization 38612.5.3 Dropout Technique 38612.6 Results and Discussions 38612.6.1 Linear Regression 38612.6.2 Decision Tree Classifier 38812.6.3 Voting Classifier 38912.6.4 Bagging Classifier 38912.6.5 Naïve Bayes 39012.6.6 Logistic Regression 39012.6.7 Extra Trees Classifier 39112.6.8 K-Nearest Neighbor [KNN] Algorithm 39112.6.9 Adaboost Classifier 39212.6.10 Light Gradient Boost Classifier 39312.6.11 Gradient Boosting Classifier 39312.6.12 Stochastic Gradient Descent Algorithm 39312.6.13 Linear Support Vector Classifier 39412.6.14 Support Vector Machines 39412.6.15 Gaussian Process Classification 39512.6.16 Random Forest Classifier 39512.7 Evaluation Metrics 39612.8 Conclusion 401References 40213 MACHINE LEARNING: THE CAPABILITIES AND EFFICIENCY OF COMPUTERS IN LIFE SCIENCES 407Shalini Yadav, Saurav Yadav, Shobhit Prakash Srivastava, Saurabh Kumar Gupta and Sudhanshu Mishra13.1 Introduction 40813.2 Supervised Learning 41013.2.1 Workflow of Supervised Learning 41013.2.2 Decision Tree 41013.2.3 Support Vector Machine (SVM) 41113.2.4 Naive Bayes 41313.3 Deep Learning: A New Era of Machine Learning 41413.4 Deep Learning in Artificial Intelligence (AI) 41613.5 Using ML to Enhance Preventive and Treatment Insights 41713.6 Different Additional Emergent Machine Learning Uses 41813.6.1 Education 41813.6.2 Pharmaceuticals 41913.6.3 Manufacturing 41913.7 Machine Learning 41913.7.1 Neuroscience Research Advancements 42013.7.2 Finding Patterns in Astronomical Data 42013.8 Ethical and Social Issues Raised ! ! ! 42113.8.1 Reliability and Safety 42113.8.2 Transparency and Accountability 42113.8.3 Data Privacy and Security 42113.8.4 Malicious Use of AI 42213.8.5 Effects on Healthcare Professionals 42213.9 Future of Machine Learning in Healthcare 42213.9.1 A Better Patient Journey 42213.9.2 New Ways to Deliver Care 42413.10 Challenges and Hesitations 42413.10.1 Not Overlord Assistant Intelligent 42413.10.2 Issues with Unlabeled Data 42513.11 Concluding Thoughts 425Acknowledgments 426References 426Index 431
From Sequences to Graphs
In order to study living organisms, scientists not only study them at an overall macroscopic scale but also on a more detailed microscopic scale. This observation, pushed to its limits, consists of investigating the very center of each cell, where we find the molecules that determine the way it functions: DNA (deoxyribonucleic acid) and RNA (ribonucleic acid).In an organism, DNA carries the genetic information, which is called the genome. It is represented as four-letter sequences using the letters A, C, G and T; based on these sequences, computer methods described in this book can answer fundamental questions in bioinformatics.This book explores how to quickly find sequences of a few hundred nucleotides within a genome that may be made up of several billion, how to compare those sequences and how to reconstruct the complete sequence of a genome. It also discusses the problems of identifying bacteria in a given environment and predicting the structure of RNA based on its sequence.ANNIE CHATEAU is a lecturer at the University of Montpellier, France. Her research interests include algorithms and combinatorial structures.MIKAËL SALSON is a lecturer at the University of Lille, France. His work focuses mainly on indexing and sequence comparison.Preface xiAuthor Biographies xviiCHAPTER 1 METHODOLOGICAL CONCEPTS: ALGORITHMIC SOLUTIONS OF BIOINFORMATICS PROBLEMS 1Annie CHATEAU and Tom DAVOT-GRANGÉ1.1 Data, Models, Problem Formalism in Bioinformatics 11.1.1 Data 11.1.2 Genome Modeling 41.1.3 Problems in Bioinformatics 51.2 Mathematical Preliminaries 61.2.1 Propositional Logic Preliminaries 61.2.2 Preliminaries on Sets 71.3 Vocabulary in Text Algorithmics 91.4 Graph Theory 101.4.1 Subgraphs 121.4.2 Path in a Graph 131.4.3 Matching 131.4.4 Planarity 141.4.5 Tree Decomposition 151.5 Algorithmic Problems 161.5.1 Definition 161.5.2 Graph Problem 171.5.3 Satisfiability Problems 191.6 Problem Solutions 201.6.1 Algorithm 201.6.2 Complexity 211.6.3 Runtime 241.7 Complexity Classes 261.7.1 Generality 261.7.2 Exact Algorithms 281.7.3 Approximation Algorithms 321.7.4 Solvers 341.8 Some Algorithmic Techniques 351.8.1 Dynamic Programming 351.8.2 Tree Traversal 381.9 Validation 411.9.1 The Different Types of Errors 421.9.2 Quality Measures 441.9.3 And in the Non-Binary Case? 461.10 Conclusion 471.11 References 47CHAPTER 2 SEQUENCE INDEXING 49Thierry LECROQ and Mikaël SALSON2.1 Introduction 492.1.1 What is Indexing? 502.1.2 When to Index? 512.1.3 What to Index? 512.1.4 Indexing Structures and Queries Considered 522.1.5 Basic Notions and Vocabulary 532.2 Word Indexing 542.2.1 Bloom Filters 542.2.2 Inverted List 562.2.3 De Bruijn Graphs 602.2.4 Efficient Structures for Targeted Queries 612.3 Full-Text Indexing 622.3.1 Suffix Tree 622.3.2 (Extended) Suffix Array 642.3.3 Burrows–Wheeler Transform 672.4 Indexing Choice Criteria 762.4.1 Based on the Type of the Necessary Query 772.4.2 Based on the Space-Time and Data Quantity Trade-Off 772.4.3 Based on the Need to Add or Modify Indexed Data 792.4.4 Indexing Choices According to Applications 802.5 Conclusion and Perspectives 812.5.1 Efficient Methods for Indexing a Few Genomes or Sequencing Sets 812.5.2 Methods that Struggle to Take Advantage of Data Redundancy 822.6 References 83CHAPTER 3 SEQUENCE ALIGNMENT 87Laurent NOÉ3.1 Introduction 873.1.1 What is Pairwise Alignment? 873.1.2 How to Evaluate an Alignment? 883.2 Exact Alignment 903.2.1 Representation in Edit Graph Form 903.2.2 Global Alignment and Needleman–Wunsch Algorithm 933.2.3 Local Alignment and Smith–Waterman Algorithm 943.2.4 Alignment with Affine Indel Function and the Gotoh Algorithm 963.3 Heuristic Alignment 983.3.1 Seeds 993.3.2 Min-Hash and Global Sampling 1053.3.3 Minimizing and Local Sampling 1063.4 References 109CHAPTER 4 GENOME ASSEMBLY 113Dominique LAVENIER4.1 Introduction 1134.2 Sequencing Technologies 1164.2.1 Short Reads 1174.2.2 Long Reads 1184.2.3 Linked Reads 1184.2.4 Hi-C Reads 1194.2.5 Optical Mapping 1194.3 Assembly Strategies 1204.3.1 The Main Steps 1204.3.2 Cleaning and Correction of Reads 1214.3.3 Scaffold Construction 1224.3.4 Scaffold Ordering 1234.4 Scaffold Construction Methods 1244.4.1 Greedy Assembly 1244.4.2 OLC Assembly 1264.4.3 DBG Assembly 1274.4.4 Constrained Assembly 1304.5 Scaffold-Ordering Methods 1324.5.1 Hi-C Data-Based Methods 1324.5.2 Optical Mapping-Based Methods 1374.6 Assembly Validation 1394.6.1 Metrics 1404.6.2 Read Realignment 1404.6.3 Gene Prediction 1414.6.4 Competitions 1414.7 Conclusion 1424.8 References 143CHAPTER 5 METAGENOMICS AND METATRANSCRIPTOMICS 147Cervin GUYOMAR and Claire LEMAITRE5.1 What is Metagenomics? 1475.1.1 Motivations and Historical Context 1475.1.2 The Metagenomics Data 1485.1.3 Bioinformatics Challenges for Metagenomics 1515.2 “Who Are They”: Taxonomic Characterization of Microbial Communities 1535.2.1 Methods for Targeted Metagenomics 1545.2.2 Whole-Genome Methods with Reference 1555.2.3 Reference-Free Methods 1605.3 “What Are They Able To Do?”: Functional Metagenomics 1665.3.1 Gene Prediction and Annotation 1665.3.2 Metatranscriptomics 1675.3.3 Reconstruction of Metabolic Networks 1685.4 Comparative Metagenomics 1695.4.1 Comparative Metagenomics with Diversity Estimation 1705.4.2 De Novo Comparative Metagenomics 1705.5 Conclusion 1755.6 References 176CHAPTER 6 RNA FOLDING 185Yann PONTY And Vladimir REINHARZ6.1 Introduction 1856.1.1 RNA Folding 1866.1.2 Secondary Structure 1896.2 Optimization for Structure Prediction 1926.2.1 Computing the Minimum Free-Energy (MFE) Structure 1926.2.2 Listing (Sub)optimal Structures 1986.2.3 Comparative Prediction: Simultaneous Alignment/Folding of RNAs 2036.2.4 Joint Alignment/Folding Model 2046.3 Analyzing the Boltzmann Ensemble 2106.3.1 Computing the Partition Function 2106.3.2 Statistical Sampling 2156.3.3 Boltzmann Probability of Structural Patterns 2206.4 Studying RNA Structure in Practice 2256.4.1 The Turner Model 2256.4.2 Tools 2286.5 References 228Conclusion 233List of Authors 237Index 239
The Official (ISC)2 CCSP CBK Reference
THE ONLY OFFICIAL BODY OF KNOWLEDGE FOR CCSP—THE MOST POPULAR CLOUD SECURITY CREDENTIAL—FULLY REVISED AND UPDATED. Certified Cloud Security Professional (CCSP) certification validates the advanced technical skills needed to design, manage, and secure data, applications, and infrastructure in the cloud. This highly sought-after global credential has been updated with revised objectives. The new third edition of The Official (ISC)2 Guide to the CCSP CBK is the authoritative, vendor-neutral common body of knowledge for cloud security professionals. This comprehensive resource provides cloud security professionals with an indispensable working reference to each of the six CCSP domains: Cloud Concepts, Architecture and Design; Cloud Data Security; Cloud Platform and Infrastructure Security; Cloud Application Security; Cloud Security Operations; and Legal, Risk and Compliance. Detailed, in-depth chapters contain the accurate information required to prepare for and achieve CCSP certification. Every essential area of cloud security is covered, including implementation, architecture, operations, controls, and immediate and long-term responses. Developed by (ISC)2, the world leader in professional cybersecurity certification and training, this indispensable guide:* Covers the six CCSP domains and over 150 detailed objectives* Provides guidance on real-world best practices and techniques* Includes illustrated examples, tables, and diagrams The Official (ISC)2 Guide to the CCSP CBK is a vital ongoing resource for IT and information security leaders responsible for applying best practices to cloud security architecture, design, operations and service orchestration. Foreword to the Fourth Edition xixIntroduction xxiCHAPTER 1 CLOUD CONCEPTS, ARCHITECTURE, AND DESIGN 1Understand Cloud Computing Concepts 2Cloud Computing Definitions 2Cloud Computing Roles and Responsibilities 3Key Cloud Computing Characteristics 7Building Block Technologies 11Describe Cloud Reference Architecture 14Cloud Computing Activities 14Cloud Service Capabilities 15Cloud Service Categories 17Cloud Deployment Models 18Cloud Shared Considerations 21Impact of Related Technologies 27Understand Security Concepts Relevant to Cloud Computing 33Cryptography and Key Management 33Identity and Access Control 34Data and Media Sanitization 36Network Security 37Virtualization Security 39Common Threats 41Security Hygiene 41Understand Design Principles of Secure Cloud Computing 43Cloud Secure Data Lifecycle 43Cloud-BasedBusiness Continuity and Disaster Recovery Plan 44Business Impact Analysis 45Functional Security Requirements 46Security Considerations for Different Cloud Categories 48Cloud Design Patterns 49DevOps Security 51Evaluate Cloud Service Providers 51Verification against Criteria 52System/Subsystem Product Certifications 54Summary 56CHAPTER 2 CLOUD DATA SECURITY 57Describe Cloud Data Concepts 58Cloud Data Lifecycle Phases 58Data Dispersion 61Data Flows 62Design and Implement Cloud Data Storage Architectures 63Storage Types 63Threats to Storage Types 66Design and Apply Data Security Technologies and Strategies 67Encryption and Key Management 67Hashing 70Data Obfuscation 71Tokenization 73Data Loss Prevention 74Keys, Secrets, and Certificates Management 77Implement Data Discovery 78Structured Data 79Unstructured Data 80Semi-structuredData 81Data Location 82Implement Data Classification 82Data Classification Policies 83Mapping 85Labeling 86Design and Implement Information Rights Management 87Objectives 88Appropriate Tools 89Plan and Implement Data Retention, Deletion, and Archiving Policies 89Data Retention Policies 90Data Deletion Procedures and Mechanisms 93Data Archiving Procedures and Mechanisms 94Legal Hold 95Design and Implement Auditability, Traceability, and Accountability of Data Events 96Definition of Event Sources and Requirement of Event Attribution 97Logging, Storage, and Analysis of Data Events 99Chain of Custody and Nonrepudiation 100Summary 101CHAPTER 3 CLOUD PLATFORM AND INFRASTRUCTURE SECURITY 103Comprehend Cloud Infrastructure and Platform Components 104Physical Environment 104Network and Communications 106Compute 107Virtualization 108Storage 110Management Plane 111Design a Secure Data Center 113Logical Design 114Physical Design 116Environmental Design 117Analyze Risks Associated with Cloud Infrastructure and Platforms 119Risk Assessment 119Cloud Vulnerabilities, Threats, and Attacks 122Risk Mitigation Strategies 123Plan and Implementation of Security Controls 124Physical and Environmental Protection 124System, Storage, and Communication Protection 125Identification, Authentication, and Authorization in Cloud Environments 127Audit Mechanisms 128Plan Disaster Recovery and Business Continuity 131Business Continuity/Disaster Recovery Strategy 131Business Requirements 132Creation, Implementation, and Testing of Plan 134Summary 138CHAPTER 4 CLOUD APPLICATION SECURITY 139Advocate Training and Awareness for Application Security 140Cloud Development Basics 140Common Pitfalls 141Common Cloud Vulnerabilities 142Describe the Secure Software Development Life Cycle Process 144NIST Secure Software Development Framework 145OWASP Software Assurance Maturity Model 145Business Requirements 145Phases and Methodologies 146Apply the Secure Software Development Life Cycle 149Cloud-Specific Risks 149Threat Modeling 153Avoid Common Vulnerabilities during Development 156Secure Coding 156Software Configuration Management and Versioning 157Apply Cloud Software Assurance and Validation 158Functional and Non-functional Testing 159Security Testing Methodologies 160Quality Assurance 164Abuse Case Testing 164Use Verified Secure Software 165Securing Application Programming Interfaces 165Supply-Chain Management 166Third-Party Software Management 166Validated Open-Source Software 167Comprehend the Specifics of Cloud Application Architecture 168Supplemental Security Components 169Cryptography 171Sandboxing 172Application Virtualization and Orchestration 173Design Appropriate Identity and Access Management Solutions 174Federated Identity 175Identity Providers 175Single Sign-on 176Multifactor Authentication 176Cloud Access Security Broker 178Summary 179CHAPTER 5 CLOUD SECURITY OPERATIONS 181Build and Implement Physical and Logical Infrastructure for Cloud Environment 182Hardware-Specific Security Configuration Requirements 182Installation and Configuration of Virtualization Management Tools 185Virtual Hardware–Specific Security Configuration Requirements 186Installation of Guest Operating System Virtualization Toolsets 188Operate Physical and Logical Infrastructure for Cloud Environment 188Configure Access Control for Local and Remote Access 188Secure Network Configuration 190Operating System Hardening through the Application of Baselines 195Availability of Stand-Alone Hosts 196Availability of Clustered Hosts 197Availability of Guest Operating Systems 199Manage Physical and Logical Infrastructure for Cloud Environment 200Access Controls for Remote Access 201Operating System Baseline Compliance Monitoring and Remediation 202Patch Management 203Performance and Capacity Monitoring 205Hardware Monitoring 206Configuration of Host and Guest Operating System Backup and Restore Functions 207Network Security Controls 208Management Plane 212Implement Operational Controls and Standards 212Change Management 213Continuity Management 214Information Security Management 216Continual Service Improvement Management 217Incident Management 218Problem Management 221Release Management 221Deployment Management 222Configuration Management 224Service Level Management 225Availability Management 226Capacity Management 227Support Digital Forensics 228Forensic Data Collection Methodologies 228Evidence Management 230Collect, Acquire, and Preserve Digital Evidence 231Manage Communication with Relevant Parties 234Vendors 235Customers 236Partners 238Regulators 238Other Stakeholders 239Manage Security Operations 239Security Operations Center 240Monitoring of Security Controls 244Log Capture and Analysis 245Incident Management 248Summary 253CHAPTER 6 LEGAL, RISK, AND COMPLIANCE 255Articulating Legal Requirements and Unique Risks within the Cloud Environment 256Conflicting International Legislation 256Evaluation of Legal Risks Specific to Cloud Computing 258Legal Frameworks and Guidelines 258eDiscovery 265Forensics Requirements 267Understand Privacy Issues 267Difference between Contractual and Regulated Private Data 268Country-Specific Legislation Related to Private Data 272Jurisdictional Differences in Data Privacy 277Standard Privacy Requirements 278Privacy Impact Assessments 280Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment 281Internal and External Audit Controls 282Impact of Audit Requirements 283Identify Assurance Challenges of Virtualization and Cloud 284Types of Audit Reports 285Restrictions of Audit Scope Statements 288Gap Analysis 289Audit Planning 290Internal Information Security Management System 291Internal Information Security Controls System 292Policies 293Identification and Involvement of Relevant Stakeholders 296Specialized Compliance Requirements for Highly Regulated Industries 297Impact of Distributed Information Technology Model 298Understand Implications of Cloud to Enterprise Risk Management 299Assess Providers Risk Management Programs 300Differences between Data Owner/Controller vs. Data Custodian/Processor 301Regulatory Transparency Requirements 302Risk Treatment 303Risk Frameworks 304Metrics for Risk Management 307Assessment of Risk Environment 307Understand Outsourcing and Cloud Contract Design 309Business Requirements 309Vendor Management 311Contract Management 312Supply Chain Management 314Summary 316Index 317
Erklärvideos
An jedem Büroarbeitsplatz ist ein Werkzeug vorhanden, komplexe Zusammenhänge leicht zu erklären: PowerPoint. Aber viele Anwender wissen gar nicht, was es tatsächlich alles kann: nicht nur einfache Bildschirmvorgänge aufzeichnen, sondern auch komplex animierte Videos erstellen. Elemente können ein- oder ausgeblendet werden, schrittweise aufgebaut werden oder ineinander übergehen. So wird die Konzentration der Zuschauer fokussiert und Zusammenhänge klarer. Dieses Heft konzentriert sich auf den Bereich der Videoerstellung zu Lehr- und Demonstrationszwecken. Weitere Hard- oder Software ist nicht nötig. Die Ergebnisse können an beliebigem Ort abgespeichert oder verteilt werden, damit einmal geleistete Arbeit je nach Bedarf abgerufen werden kann.Ina Koys ist langjährige Trainerin für MS-Office-Produkte. Viele Fragen werden in den Kursen immer wieder gestellt, aber selten in Fachbüchern behandelt. Einige davon beantwortet sie jetzt in der Reihe "kurz & knackig".
Practical CockroachDB
Get a practical introduction to CockroachDB. This book starts with installation and foundational concepts and takes you through to creating clusters that are ready for production environments. You will learn how to create, optimize, and operate CockroarchDB clusters in single and multi-region environments. You will encounter anti-patterns to avoid, as well as testing techniques for integration and load testing.The book explains why CockroachDB exists, goes over its major benefits, and quickly transitions into installing and configuring CockroachDB. Just as quickly, you’ll be creating databases, getting data into those databases, and querying that data from your applications. You’ll progress to data privacy laws such as GDPR and CCPA, and learn how CockroachDB’s global distribution features can help you comply with ever-shifting data sovereignty regulations. From there, you’ll move into deployment topologies, guidance on integration testing and load testing, best practices, and a readiness checklist for production deployments.WHAT YOU WILL LEARN* Deploy and interact with CockroachDB* Design and optimize databases and tables* Choose the correct data types for modeling your data* Protect data with database and table encryption* Achieve compliance with international data privacy regulations* Scale your databases in a way that enhances their performance* Monitor changes to the data and health of your databasesWHO THIS BOOK IS FORDevelopers and database administrators who want to provide a secure, reliable, and effortlessly distributed home for their data; those who wish to use a modern tool to tackle the kinds of scaling challenges that have previously required dedicated teams of people to solve; anyone who wants to leverage their database to solve non-trivial, real-world challenges while protecting their data and users ROB REID is a software developer from London, England. In his career, he has written backend, frontend, and messaging software for the police, travel, finance, commodity, sports betting, telecom, retail, and aerospace industries. He is an avid user of CockroachDB and has worked with the Cockroach Labs team in recent years to promote the database and embed it into development teams in the US and UK. 1. The Reason for CockroachDB2. Installing CockroachDB3. Concepts4. Managing CockroachDB from the Command Line5. Interacting with CockroachDB Instances6. Data Privacy7. Deployment Topologies8. Testing9. Production
Extending Oracle Application Express with Oracle Cloud Features
This book shows Oracle Application Express (APEX) developers how to take advantage of Oracle Cloud Infrastructure (OCI) features for APEX that might otherwise go missed. You will learn how to use OCI features for data science tasks such as detecting anomalies in your data, training machine learning models, and much more. The book provides an in-depth look at Oracle Cloud features and demonstrates how they can be easily integrated into an APEX application. While the book focuses on developing for APEX, the approaches covered in the book are also applicable to any other modern web developer framework for applications running on the OCI platform.For many organizations, the database is the heart of operations. Those who opt to invest in the Oracle Database can learn from this book how to maximize their return on investment. The book begins with an introduction to OCI and help on setting up your OCI developer environment. From there you’ll begin with security by learning to provide single sign-on via the Oracle Identity Cloud Service. Subsequent chapters take you through cloud-focused features such as Object Storage, Oracle Function, Oracle Machine Learning REST Services, and Oracle Cloud Anomaly Detection. You’ll even learn to troubleshoot email delivery services.WHAT YOU WILL LEARN* Be aware of Oracle Cloud Infrastructure features for developers* Integrate with cloud native services such as cloud-based object storage and serverless functions* Enhance APEX applications with machine learning features* Implement Natural Language Processing and Anomaly Detection Algorithms* Troubleshoot email delivery services when sending emails using the APEX_MAIL package* Design and implement an APEX environment that is secureWHO THIS BOOK IS FORAPEX developers who are looking to extend their application’s capabilities using features and resources available through the Oracle Cloud, and cloud solutions architects who support development teams and help design and implement architectures that benefit business operationsADRIAN PNG is a seasoned solutions architect with over 20 years of experience working with clients to design and implement state-of-the-art infrastructure and applications. He earned a Master of Technology (Knowledge Engineering) degree from the National University of Singapore and is always eager to apply his knowledge and skills in machine learning. Adrian is also trained and certified in several Oracle technologies, including Oracle Cloud Infrastructure, Oracle Autonomous Database, Oracle Cloud-Native Services, Oracle Database, and Oracle Application Express. He is an Oracle ACE and a recognized contributor in the Oracle community. Most recently, he co-authored the Apress book Getting Started with the Oracle Cloud Free Tier. In his spare time, Adrian enjoys tinkering with electronics projects and 3D printing.HELI HELSKYAHO is the CEO for Miracle Finland Oy. She holds a master’s degree in computer science from the University of Helsinki and specializes in databases. At the moment she is working on her doctoral studies, researching and teaching at the University of Helsinki. Heli has been working in IT since 1990. She has held several positions, but every role has included databases and data. Heli believes that understanding your data makes using the data much easier. She is an Oracle ACE Director, and a frequent speaker at many conferences. She is the author of several books and has been listed as one of the TOP 100 influencers in the IT sector in Finland for each year from 2015 to 2021.1. Setting Up the OCI Developer Environment2. Single Sign-On with Oracle Identify Cloud Service3. Storing Large Objects using Object Storage4. Using Oracle Function5. Exposing Functionality with API Gateway6. Oracle Machine Learning REST Services7. Out-of-the-box AI Services8. Anomaly Detection9. Speech and Vision10. Language11. Architecting Secure Infrastructures for APEX
CompTIA Project+ Study Guide
PREPARE FOR THE PROJECT+ EXAM AND A NEW CAREER IN PROJECT MANAGEMENT QUICKLY AND EFFICIENTLY WITH A NEWLY UPDATED GUIDEIn the newly revised Third Edition of the CompTIA Project+ Study Guide: Exam PK0-005, veteran project manager and tech educator Kim Heldman delivers a fully updated and comprehensive guide to the foundational CompTIA Project+ exam. This all-in-one study aid focuses on the job-critical skills demanded by employers and will help you hit the ground running on your first day in a new project management role. In this Study Guide, you’ll learn to manage the project lifecycle, coordinate small- and medium-sized projects, establish communication plans, manage resources and stakeholders, maintain project documentation and artifacts, and support the completion of larger projects within an information technology environment. It also offers:* Hands-on, concrete guidance designed to banish test anxiety and prepare you for the entry-level CompTIA Project+ exam* Detailed advice on project management concepts, lifecycle phases, project tools and documentation, and IT and governance basics required by on-the-job project managers* Complimentary access to Sybex’s interactive, online learning environment and test bank, complete with an assessment test, hundreds of practice questions, practice exams, electronic flashcards, and a searchable glossary of key termsFull of practical examples and insights drawn from the author’s extensive, real-world experience, the newest edition of CompTIA Project+ Study Guide: Exam PK0-005, Third Edition, is a must-read for anyone considering a new career in project management or preparing for the CompTIA Project+ exam. ABOUT THE AUTHORKIM HELDMAN, MBA, PMP, is Senior Manager and IT/Chief Information Officer for the Regional Transportation District in Denver, Colorado. She has over 25 years’ experience in IT project management and directs IT resource planning, budgeting, project prioritization, and strategic and tactical planning. Learn more about her at www.kimheldman.com. Introduction Assessment Test xxiCHAPTER 1 INTRODUCING THE PROJECT 1Defining the Project 2Identifying the Project 2Programs and Portfolios 3Understanding Operations 4Using the PMBOK ® Guide 5Project Life Cycle Phases 5Discovery Phase 6Initiating Phase 6Planning Phase 7The Executing Phase 9The Closing Phase 10Performing the Discovery/Concept Preparation Phase 10How Projects Come About 11Creating the Business Case and Selecting Projects 13Determining Benefits and Rewards 14Examining Existing Artifacts 21Project Selection Methods 23Decision Models 24Expert Judgment 25Summary 25Exam Essentials 26Key Terms 27Review Questions 28CHAPTER 2 UNDERSTANDING IT FUNDAMENTALS 33Understanding the Role of the Project Manager 34Leadership 35Communication 35Problem Solving 36Negotiating 36Organization and Time Management 37Factors That Influence Project Management Activities 38Environmental, Social, and Governance (ESG) Factors 38Compliance and Privacy Considerations 40Information Technology Fundamentals 46Infrastructure 46Cloud Models 51Software 55Financial Systems 60Summary 62Exam Essentials 64Key Terms 65Review Questions 67CHAPTER 3 CREATING THE PROJECT CHARTER 71Identifying and Assessing Stakeholder Roles and Responsibilities 72The Customer and End Users 73The Project Sponsor 74The Project Manager 75The Senior Management Team 76The Business Analyst 76The Subject Matter Experts 76The Project Management Office 77The Program Manager 77The IT Team 78The Stakeholder Register 79Assessing Stakeholders 80Creating the Preliminary Scope Statement 83Understanding the Need 84Documenting the Preliminary Scope Definition 85Creating the Project Charter 85Purpose or Justification for the Project 86Objectives 86Project Description 87Key Deliverables 87High- Level List of Requirements 87High- Level Milestones 87Preapproved Budget 88High- Level Assumptions 88High- Level Constraints 88Overall Risks 89Other Contents 89Project Success Criteria 89Formal Approval 90Creating the Records Management Plan 90Determining Access Requirements 92Holding the Kickoff Meeting 93Summary 98Exam Essentials 99Key Terms 101Review Questions 102CHAPTER 4 PLANNING THE PROJECT 107Defining the Planning Phase 108Documenting the Scope Management Plan 109Writing the Scope Statement 110Project Objectives 111Project and Product Description 111Success Criteria and Key Performance Indicators 111Key Deliverables 112Exclusions from Scope 112Time and Cost Estimates 112Assumptions 113Constraints 113Approval of the Scope Statement 118Documenting the Requirements 119Requirement Categories 119The Requirements Document 121Determining a Project Methodology 122Projects in Control (PRINCE2) 124DevOps 124Development Life Cycle Methodologies 125Using the Waterfall Methodology 125Using Agile Methodologies 126Scrum 127Kanban 127Scrumban 129Lean 129Extreme Programming 130Feature- Driven Development 132Dynamic Systems Development Method 132Agile Unified Process 133Hybrid 133Summary of Project Life Cycles 134Selecting a Methodology 136Determining Scope on Agile Projects 138Agile Team Members 139Determine a Solutions Design 140Summary 143Exam Essentials 145Key Terms 146Review Questions 148CHAPTER 5 CREATING THE PROJECT SCHEDULE 153Creating the Work Breakdown Structure 154Decomposing the Major Deliverables 155Guidelines for Creating a WBS 156Benefits of the WBS 157WBS Dictionary 158Scope Baseline 158Documenting the Project Management Plan 159Schedule Planning 160Defining Tasks 161Task Sequencing 162Types of Dependencies 162Logical Relationships 163Creating a Network Diagram 164Assigning Resources 164Determining Task Durations 165Defining Duration 165Estimating Techniques 165Developing the Project Schedule 167Milestones 168Program Evaluation and Review Technique 169Gantt Charts 170The Critical Path Method 170Duration Compression 172Resource Loading 173Project Scheduling Software 175Setting the Baseline and Obtaining Approval 175Quality Gates 176Establishing Governance Gates 176Scheduling Techniques Using Agile Methodologies 177Estimating Techniques Using Agile 177Burndown Chart 178Story Points and Velocity 179Kanban Board 180Scrum Board 181Agile Release Planning 182Summary 185Exam Essentials 186Key Terms 188Review Questions 190CHAPTER 6 RESOURCE PLANNING AND MANAGEMENT 195Understanding Organizational Structures 196The Functional Organization 196The Matrix Organization 198The Projectized Organization 200Determining Resource Needs 201Resource Overallocation 203Interproject Work 203Resource Life Cycle 204Personnel Management 206Team Composition 206Selecting Team Members 206Roles and Responsibilities 208Organization Charts and Position Descriptions 208Matrix- Based Charts 209Building and Managing a Cohesive Team 211Trust Building 212Monitoring Team Performance 212Conflict Management 216Managing Conflict 216Project Kickoff Part Two 219Procurement Planning 220Statement of Work 221Vendor Solicitation 222Vendor Selection Criteria 223Types of Contracts 226Vendor- Related Documents 228Summary 230Exam Essentials 232Key Terms 233Review Questions 235CHAPTER 7 DEFINING THE PROJECT BUDGET AND RISK PLANS 239Understanding Information Security Concepts 240Corporate IT Security Policies 240Categorizing Security Policies 242Estimating Costs 245Cost- Estimating Techniques 245Estimating Tips 249Creating the Project Budget 250Creating the Project Budget 251Cost Baseline 253Expenditure Tracking and Reporting 254Budget Burndown Chart 255Earned Value Management 256Expenditure Reporting 260Risk Planning 260Risk Identification 261Risk Analysis 263Preparing Risk Responses 267Risk Monitoring 270Summary 272Exam Essentials 273Key Terms 275Review Questions 277CHAPTER 8 COMMUNICATING THE PLAN 283Communications Planning 284Exchanging Information 285Listening 287Methods of Communicating 288Assessing the Forms of Communication 288Written and Verbal Communication 289Communication Methods and Tools 289The Communication Plan 292Communicating with Project Team Members 293Communicating on an Agile Team 294Factors That Influence Communications 297Communication Triggers 299Holding Effective Meetings 302Meeting Types 302Preparing for Meetings 305Communication Platforms 307Collaboration Tools 307Meeting Tools 309Reporting Project Information 310Project Status Reports 310Project Dashboard 311Charts 311Establishing Communication Channels 313Maintaining Communication Records 313Controlling Communications 315Managing Stakeholder Expectations and Communication Needs 316Summary 321Exam Essentials 322Key Terms 323Review Questions 325CHAPTER 9 PROCESSING CHANGE REQUESTS 329Executing Phase Activities 330Reviewing the Project Management Plan 331Managing Vendors 332Contract Change Control 333Paying Vendors 334Implementing Change Control Systems 335Create and Submit the Change Request 336Documenting Changes in the Change Control Log and Conducting a Preliminary Review 336Conducting Impact Assessments 337Documenting Change Recommendations 338Determining Decision-Makers 339Managing the Change Control Board 339Documenting Approval Status in the Change Control Log 340Communicating Change Status 340Updating the Project Management Plan 341Implementing the Change 341Validating the Change and Perform a Quality Check 342Communicating Change Deployment 342Other Change Requests 342Project Change Management 342Implementing Organizational Change 343Types of Organizational Change 343Implementing Organizational Change 344Operational Change Control on an IT Project 347IT Infrastructure Control 347Software Change Control 348Other IT Change Processes 349Agile Frameworks 349Scaling Frameworks 350Projects in Control (PRINCE2) 351Summary 353Exam Essentials 354Key Terms 355Review Questions 357CHAPTER 10 MANAGING QUALITY AND CLOSING OUT THE PROJECT 363Controlling Quality 364Inspecting and Testing 364Using Quality Charts 366Common Causes of Variances 372Taking Action on Quality Control 373Managing Issues 374Roles and Responsibilities 374Issue Tracking 374Resolution Plan 375Resolution Techniques 376Outcome Documentation 376Action Items 376Using Performance Measures 377Key Performance Indicators 377Balanced Scorecard 379Key Objectives and Results 379Cost and Schedule Performance 379Project Endings 380Characteristics of Closing 380Types of Project Endings 380Steps in Closing Out a Project 382Verification and Validation of Deliverables 382Obtaining Sign- Off 383Developing a Transition Plan and Operational Handoff 383Removing Access 384Releasing Team Members 384Closing Out the Contract 384Archiving Documentation 385Documenting Lessons Learned and Project Evaluation 385Project Closure Meeting 388Project Closeout Report 388Rewards and Celebrations 389Postimplementation Support and Warranty Period 389Summary 390Exam Essentials 391Key Terms 393Review Questions 394Appendix Answers to Review Questions 399Chapter 1: Introducing the Project 400Chapter 2: Understanding IT Fundamentals 401Chapter 3: Creating the Project Charter 403Chapter 4: Planning the Project 404Chapter 5: Creating the Project Schedule 406Chapter 6: Resource Planning and Management 408Chapter 7: Defining the Project Budget and Risk Plans 409Chapter 8: Communicating the Plan 411Chapter 9: Processing Change Requests 413Chapter 10: Managing Quality and Closing Out the Project 414Index 417
CompTIA Server+ Study Guide
PREPARE FOR THE SERVER+ EXAM—AND AN EXCITING NEW CAREER IN TECH—WITH THIS HANDS-ON GUIDEIn the newly updated Second Edition of the CompTIA Server+ Study Guide: Exam SK0-005, veteran technology educator Troy McMillan delivers a comprehensive, hands-on blueprint for success on the Server+ SK0-005 exam. Learn about essential hardware and software technologies used in on-premise and hybrid server environments and prepare yourself for the exam and real-world, on-the-job challenges. This Study Guide provides you with a solid understanding of how network and cloud storage systems work by helping you learn how to store, protect, and access the data that’s ever more crucial to modern businesses. Find coverage of every objective tested by the exam, including server hardware installation and management, server administration, security and disaster recovery, and troubleshooting. You also learn:* Expert guidance on acing a certification exam is increasing demand amongst high-paying employers* Critical performance tips for professionals who want to hit the ground running on their first day on the job* Complimentary access to the Sybex interactive online learning environment and test bank, complete with hundreds of practice questions and answers, bonus exams, electronic flashcards, and a searchable glossary of key termsA can’t-miss resource for anyone preparing for a new role as a server administrator, data storage specialist, or related IT specialty, the CompTIA Server+ Study Guide: Exam SK0-005, Second Edition, will earn a place in the libraries of anyone looking for an efficient and effective way to prep for this challenging and rewarding technical certification. ABOUT THE AUTHORTROY MCMILLAN has earned over 30 IT certifications, including Server+, A+, and Network+. He is a Product Developer and Technical Editor for CyberVista and helps individuals and organizations train on technology and prepare for certification exams. He specializes in teaching CompTIA, Cisco, Microsoft, and Wireless certifications. Introduction xxiiiAssessment Test livAnswers to Assessment Test lxiCHAPTER 1 SERVER HARDWARE 1Racking 3Enclosure Sizes 3Unit Sizes 3Rack Layout 5Power Cabling 14Voltage 15Redundant Power 18Power Connector Types 23Cable Management 25Network Cabling 26Redundant Networking 26Twisted Pair 27Fiber 30Gigabit 3110 GigE 31Small Form- Factor Pluggable (SFP) 32Sfp+ 32Quad Small Form- Factor Pluggable (QSFP) 33Cable Management 33Server Chassis Types 35Server Components 42NICs 55Summary 57Exam Essentials 57Review Questions 59CHAPTER 2 INSTALLING AND CONFIGURING SERVERS 63Installing Server Operating Systems 67Minimum Operating System (OS) Requirements 67Hardware Compatibility List (HCL) 68Installations 68Partition and Volume Types 73File System Types 75Configuring and Maintaining Server Functions and Features 76Server Roles Requirements 77Data Migration and Transfer 96Administrative Interfaces 97The Purpose and Operation of Virtualization 98Host vs. Guest 98Virtual Networking 99Resource Allocation and Provisioning 103Management Interfaces for Virtual Machines 108Cloud Models 110Summary 111Exam Essentials 111Review Questions 112CHAPTER 3 SERVER MAINTENANCE 115Given a Scenario, Perform Server Hardware Maintenance 117Out- of- Band Management 117Local Hardware Administration 122Components 125Drives 126Hot- Swappable Hardware 129Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) 131Explain Licensing Concepts 132Models 132Open Source 134Subscription 135License vs. Maintenance and Support 135Volume Licensing 136License Count Validation 136Version Compatibility 136Summary 137Exam Essentials 137Review Questions 138CHAPTER 4 STORAGE TECHNOLOGIES AND ASSET MANAGEMENT 143Given a Scenario, Deploy and Manage Storage 146RAID Levels and Types 146Capacity Planning 151Hard Drive Media Types 153Interface Types 157Shared Storage 161Explain the Importance of Asset Management and Documentation 165Asset Management 166Documentation Management 169Document Availability 175Secure Storage of Sensitive Documentation 175Summary 175Exam Essentials 176Review Questions 177CHAPTER 5 IDENTIFYING FAULT TOLERANCE REQUIREMENTS 181Clustering 182Active–Active 182Active–Passive 183Failover/Failback 183Proper Patching Procedures 184Heartbeat 184Fault Tolerance 184Server- Level Redundancy vs. Component Redundancy 185Redundant Server Network Infrastructure 185Load Balancing 185Network Interface Card (NIC) Teaming and Redundancy 186Summary 191Exam Essentials 191Review Questions 192CHAPTER 6 SECURING THE SERVER 197Summarize Physical Security Concepts 200Physical Access Controls 200Environmental Controls 206Explain Data Security Risks and Mitigation Strategies 210Security Risks 210Mitigation Strategies 223Given a Scenario, Apply Server Hardening Methods 226OS Hardening 226Application Hardening 228Host Security 228Hardware Hardening 230Summary 238Exam Essentials 238Review Questions 239CHAPTER 7 SECURING SERVER DATA AND NETWORK ACCESS 243Summarize Data Security Concepts 246Encryption Paradigms 246Vpn 248IPsec 248Retention Policies 249Data Storage 249UEFI/BIOS Passwords 250Bootloader Passwords 251Business Impact 251Explain Important Concepts Pertaining to Identity and Access Management for Server Administration 252User Accounts 252Permissions and Access Controls 256Auditing 261Multifactor Authentication (MFA) 264Single Sign- on (SSO) 265Summarize Proper Server Decommissioning Concepts 265Proper Removal Procedures 265Media Destruction 266Media Retention Requirements 268Cable Remediation 268Electronics Recycling 268Summary 269Exam Essentials 269Review Questions 270CHAPTER 8 NETWORKING AND SCRIPTING 275Given a Scenario, Configure Servers to Use Network Infrastructure Services 277IP Configuration 277Virtual Local Area Network (VLAN) 277Default Gateways 279Name Resolution 279Addressing Protocols 285Firewall 287Static vs. Dynamic 293MAC Addresses 296Summarize Scripting Basics for Server Administration 297Script Types 297Environment Variables 299Comment Syntax 299Basic Script Constructs 299Basic Data Types 301Common Server Administration Scripting Tasks 301Summary 302Exam Essentials 303Review Questions 304CHAPTER 9 DISASTER RECOVERY 309Explain the Importance of Backups and Restores 311Backup Methods 311Backup Frequency 313Media Rotation 313Backup Media Types 315File- Level vs. System- State Backup 317Restore Methods 317Backup Validation 318Media Inventory Before Restoration 319Explain the Importance of Disaster Recovery 319Site Types 319Replication 320Testing 323Summary 323Exam Essentials 324Review Questions 325CHAPTER 10 TROUBLESHOOTING HARDWARE AND SOFTWARE ISSUES 329Explain the Troubleshooting Theory and Methodology 334Identify the Problem and Determine the Scope 334Establish a Theory of Probable Cause (Question the Obvious) 336Test the Theory to Determine the Cause 337Establish a Plan of Action to Resolve the Problem 337Implement the Solution or Escalate 338Verify Full System Functionality and, if Applicable, Implement Preventive Measures 338Perform a Root Cause Analysis 338Document Findings, Actions, and Outcomes Throughout the Process 339Given a Scenario, Troubleshoot Common Hardware Failures 339Common Problems 339Causes of Common Problems 351Tools and Techniques 359Given a Scenario, Troubleshoot Common OS and Software Problems 363Common Problems 363Causes of Common Problems 369OS and Software Tools and Techniques 374Summary 387Exam Essentials 387Review Questions 389CHAPTER 11 TROUBLESHOOTING NETWORK CONNECTIVITY AND SECURITY ISSUES 393Given a Scenario, Troubleshoot Network Connectivity Issues 396Common Problems 396Causes of Common Problems 402Tools and Techniques 411Given a Scenario, Troubleshoot Security Problems 419Common Problems 420Causes of Common Problems 421Security Tools 433Summary 439Exam Essentials 440Review Questions 441Chapter 12 Troubleshooting Storage Issues 445Given a Scenario, Troubleshoot Storage Problems 447Common Problems 447Causes of Common Problems 458Tools and Techniques 467Summary 489Exam Essentials 489Review Questions 490APPENDIX ANSWERS TO REVIEW QUESTIONS 495Chapter 1: Server Hardware 496Chapter 2: Installing and Configuring Servers 497Chapter 3: Server Maintenance 499Chapter 4: Storage Technologies and Asset Management 501Chapter 5: Identifying Fault Tolerance Requirements 502Chapter 6: Securing the Server 504Chapter 7: Securing Server Data and Network Access 506Chapter 8: Networking and Scripting 508Chapter 9: Disaster Recovery 509Chapter 10: Troubleshooting Hardware and Software Issues 511Chapter 11: Troubleshooting Network Connectivity and Security Issues 513Chapter 12: Troubleshooting Storage Issues 515Index 517
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
THE ONLY OFFICIAL STUDY GUIDE FOR THE NEW CCSP EXAM OBJECTIVES EFFECTIVE FROM 2022-2025(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide, 3rd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. In this completely rewritten 3rd Edition, experienced cloud security professionals Mike Chapple and David Seidl use their extensive training and hands on skills to help you prepare for the CCSP exam. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Cloud Concepts, Architecture and Design, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Cloud Security Operations, and Legal, Risk, and Compliance with real-world scenarios to help you apply your skills along the way. The CCSP credential from (ISC)2 and the Cloud Security Alliance is designed to show employers that you have what it takes to keep their organization safe in the cloud. Learn the skills you need to be confident on exam day and beyond.* Review 100% of all CCSP exam objectives* Practice applying essential concepts and skills* Access the industry-leading online study tool set* Test your knowledge with bonus practice exams and moreAs organizations become increasingly reliant on cloud-based IT, the threat to data security looms larger. Employers are seeking qualified professionals with a proven cloud security skillset, and the CCSP credential brings your resume to the top of the pile. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide gives you the tools and information you need to earn that certification and apply your skills in a real-world setting. ABOUT THE AUTHORSMIKE CHAPPLE, PHD, CCSP, CISSP, is a bestselling author and Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is also the Academic Director of the University’s Master of Science in Business Analytics program and holds multiple technical certifications, including the CIPP/US, CySA+, CISM, PenTest+, and Security+. DAVID SEIDL, CISSP, is Vice President for Information Technology and Chief Information Officer at Miami University. He holds multiple technical certifications including GPEN, GCIH, PenTest+, and CySA+ and has written books on security certification and cyberwarfare.Introduction xxiiiAssessment Test xxxiiCHAPTER 1 ARCHITECTURAL CONCEPTS 1Cloud Characteristics 3Business Requirements 5Understanding the Existing State 6Cost/Benefit Analysis 7Intended Impact 10Cloud Computing Service Categories 11Software as a Service 11Infrastructure as a Service 12Platform as a Service 12Cloud Deployment Models 13Private Cloud 13Public Cloud 13Hybrid Cloud 13Multi- Cloud 13Community Cloud 13Multitenancy 14Cloud Computing Roles and Responsibilities 15Cloud Computing Reference Architecture 16Virtualization 18Hypervisors 18Virtualization Security 19Cloud Shared Considerations 20Security and Privacy Considerations 20Operational Considerations 21Emerging Technologies 22Machine Learning and Artificial Intelligence 22Blockchain 23Internet of Things 24Containers 24Quantum Computing 25Edge and Fog Computing 26Confidential Computing 26DevOps and DevSecOps 27Summary 28Exam Essentials 28Review Questions 30CHAPTER 2 DATA CLASSIFICATION 35Data Inventory and Discovery 37Data Ownership 37Data Flows 42Data Discovery Methods 43Information Rights Management 46Certificates and IRM 47IRM in the Cloud 47IRM Tool Traits 47Data Control 49Data Retention 50Data Audit and Audit Mechanisms 53Data Destruction/Disposal 55Summary 57Exam Essentials 57Review Questions 59CHAPTER 3 CLOUD DATA SECURITY 63Cloud Data Lifecycle 65Create 66Store 66Use 67Share 67Archive 69Destroy 70Cloud Storage Architectures 71Storage Types 71Volume Storage: File- Based Storage and Block Storage 72Object- Based Storage 72Databases 73Threats to Cloud Storage 73Designing and Applying Security Strategies for Storage 74Encryption 74Certificate Management 77Hashing 77Masking, Obfuscation, Anonymization, and Tokenization 78Data Loss Prevention 81Log Capture and Analysis 82Summary 85Exam Essentials 85Review Questions 86CHAPTER 4 SECURITY IN THE CLOUD 91CHAPTER 5 SHARED CLOUD PLATFORM RISKS AND RESPONSIBILITIES 92Cloud Computing Risks by Deployment Model 94Private Cloud 95Community Cloud 95Public Cloud 97Hybrid Cloud 101Cloud Computing Risks by Service Model 102Infrastructure as a Service (IaaS) 102Platform as a Service (PaaS) 102Software as a Service (SaaS) 103Virtualization 103Threats 105Risk Mitigation Strategies 107Disaster Recovery (DR) and Business Continuity (BC) 110Cloud- Specific BIA Concerns 110Customer/Provider Shared BC/DR Responsibilities 111Cloud Design Patterns 114Summary 115Exam Essentials 115Review Questions 116Cloud Platform, Infrastructure, and Operational Security 121Foundations of Managed Services 123Cloud Provider Responsibilities 124Shared Responsibilities by Service Type 125IaaS 125PaaS 126SaaS 126Securing Communications and Infrastructure 126Firewalls 127Intrusion Detection/Intrusion Prevention Systems 128Honeypots 128Vulnerability Assessment Tools 128Bastion Hosts 129Identity Assurance in Cloud and Virtual Environments 130Securing Hardware and Compute 130Securing Software 132Third- Party Software Management 133Validating Open- Source Software 134OS Hardening, Monitoring, and Remediation 134Managing Virtual Systems 135Assessing Vulnerabilities 137Securing the Management Plane 138Auditing Your Environment and Provider 141Adapting Processes for the Cloud 142Planning for Cloud Audits 143Summary 144Exam Essentials 145Review Questions 147CHAPTER 6 CLOUD APPLICATION SECURITY 151Developing Software for the Cloud 154Common Cloud Application Deployment Pitfalls 155Cloud Application Architecture 157Cryptography 157Sandboxing 158Application Virtualization and Orchestration 158Application Programming Interfaces 159Multitenancy 162Supplemental Security Components 162Cloud- Secure Software Development Lifecycle (SDLC) 164Software Development Phases 165Software Development Models 166Cloud Application Assurance and Validation 172Threat Modeling 172Common Threats to Applications 174Quality Assurance and Testing Techniques 175Supply Chain Management and Licensing 177Identity and Access Management 177Cloud Identity and Access Control 178Single Sign- On 179Identity Providers 180Federated Identity Management 180Multifactor Authentication 181Secrets Management 182Common Threats to Identity and Access Management in the Cloud 183Zero Trust 183Summary 183Exam Essentials 184Review Questions 186CHAPTER 7 OPERATIONS ELEMENTS 191Designing a Secure Data Center 193Build vs. Buy 193Location 194Facilities and Redundancy 196Data Center Tiers 200Logical Design 201Virtualization Operations 202Storage Operations 205Managing Security Operations 207Security Operations Center (SOC) 208Continuous Monitoring 208Incident Management 209Summary 209Exam Essentials 210Review Questions 211CHAPTER 8 OPERATIONS MANAGEMENT 215Monitoring, Capacity, and Maintenance 217Monitoring 217Physical and Environmental Protection 218Maintenance 219Change and Configuration Management 224Baselines 224Roles and Process 226Release and Deployment Management 228Problem and Incident Management 229IT Service Management and Continual Service Improvement 229Business Continuity and Disaster Recovery 231Prioritizing Safety 231Continuity of Operations 232BC/DR Planning 232The BC/DR Toolkit 234Relocation 235Power 237Testing 238Summary 239Exam Essentials 239Review Questions 241CHAPTER 9 LEGAL AND COMPLIANCE ISSUES 245Legal Requirements and Unique Risks in the Cloud Environment 247Constitutional Law 247Legislation 249Administrative Law 249Case Law 250Common Law 250Contract Law 250Analyzing a Law 251Determining Jurisdiction 251Scope and Application 252Legal Liability 253Torts and Negligence 254U.S. Privacy and Security Laws 255Health Insurance Portability and Accountability Act 255The Health Information Technology for Economic and Clinical Health Act 258Gramm–Leach–Bliley Act 259Sarbanes–Oxley Act 261State Data Breach Notification Laws 261International Laws 263European Union General Data Protection Regulation 263Adequacy Decisions 267U.S.- EU Safe Harbor and Privacy Shield 267Laws, Regulations, and Standards 269Payment Card Industry Data Security Standard 270Critical Infrastructure Protection Program 270Conflicting International Legislation 270Information Security Management Systems 272Iso/iec 27017:2015 272Privacy in the Cloud 273Generally Accepted Privacy Principles 273Iso 27018 279Direct and Indirect Identifiers 279Privacy Impact Assessments 280Cloud Forensics 281Forensic Requirements 281Cloud Forensic Challenges 281Collection and Acquisition 282Evidence Preservation and Management 283e-discovery 283Audit Processes, Methodologies, and Cloud Adaptations 284Virtualization 284Scope 284Gap Analysis 285Restrictions of Audit Scope Statements 285Policies 286Audit Reports 286Summary 288Exam Essentials 288Review Questions 290CHAPTER 10 CLOUD VENDOR MANAGEMENT 295The Impact of Diverse Geographical Locations and Legal Jurisdictions 297Security Policy Framework 298Policies 298Standards 300Procedures 302Guidelines 303Exceptions and Compensating Controls 304Developing Policies 305Enterprise Risk Management 306Risk Identification 308Risk Calculation 308Risk Assessment 309Risk Treatment and Response 313Risk Mitigation 313Risk Avoidance 314Risk Transference 314Risk Acceptance 315Risk Analysis 316Risk Reporting 316Enterprise Risk Management 318Assessing Provider Risk Management Practices 318Risk Management Frameworks 319Cloud Contract Design 320Business Requirements 321Vendor Management 321Data Protection 323Negotiating Contracts 324Common Contract Provisions 324Contracting Documents 326Government Cloud Standards 327Common Criteria 327FedRAMP 327Fips 140- 2 327Manage Communication with Relevant Parties 328Summary 328Exam Essentials 329Review Questions 330Appendix Answers to the Review Questions 335Chapter 1: Architectural Concepts 336Chapter 2: Data Classification 337Chapter 3: Cloud Data Security 339Chapter 4: Security in the Cloud 341Chapter 5: Cloud Platform, Infrastructure, and Operational Security 343Chapter 6: Cloud Application Security 345Chapter 7: Operations Elements 347Chapter 8: Operations Management 349Chapter 9: Legal and Compliance Issues 350Chapter 10: Cloud Vendor Management 352Index 355
Understanding Artificial Intelligence
Understanding ARTIFICIAL INTELLIGENCEPROVIDES STUDENTS ACROSS MAJORS WITH A CLEAR AND ACCESSIBLE OVERVIEW OF NEW ARTIFICIAL INTELLIGENCE TECHNOLOGIES AND APPLICATIONSArtificial intelligence (AI) is broadly defined as computers programmed to simulate the cognitive functions of the human mind. In combination with the Neural Network (NN), Big Data (BD), and the Internet of Things (IoT), artificial intelligence has transformed everyday life: self-driving cars, delivery drones, digital assistants, facial recognition devices, autonomous vacuum cleaners, and mobile navigation apps all rely on AI to perform tasks. With the rise of artificial intelligence, the job market of the near future will be radically different???many jobs will disappear, yet new jobs and opportunities will emerge.Understanding Artificial Intelligence: Fundamentals and Applications covers the fundamental concepts and key technologies of AI while exploring its impact on the future of work. Requiring no previous background in artificial intelligence, this easy-to-understand textbook addresses AI challenges in healthcare, finance, retail, manufacturing, agriculture, government, and smart city development. Each chapter includes simple computer laboratories to teach students how to develop artificial intelligence applications and integrate software and hardware for robotic development. In addition, this text:* Focuses on artificial intelligence applications in different industries and sectors* Traces the history of neural networks and explains popular neural network architectures* Covers AI technologies, such as Machine Vision (MV), Natural Language Processing (NLP), and Unmanned Aerial Vehicles (UAV)* Describes various artificial intelligence computational platforms, including Google Tensor Processing Unit (TPU) and Kneron Neural Processing Unit (NPU)* Highlights the development of new artificial intelligence hardware and architecturesUnderstanding Artificial Intelligence: Fundamentals and Applications is an excellent textbook for undergraduates in business, humanities, the arts, science, healthcare, engineering, and many other disciplines. It is also an invaluable guide for working professionals wanting to learn about the ways AI is changing their particular field.ALBERT CHUN CHEN LIU, PH.D., is the CEO of Kneron and an Adjunct Associate Professor at National Tsing Hua University, National Chiao Tung University, and National Cheng Kung University, Taiwan. OSCAR MING KIN LAW, PH.D., is the director of engineering at Kneron. He has over 20 years of experience in the semiconductor industry and has published more than 70 patents in various areas. IAIN LAW studies Economics and Data Science at the University of California, San Diego. He has worked on several artificial intelligence projects including the LEGO smart robot and DJI Tello smart drone for STEM education. 1 INTRODUCTION 11.1 Overview 11.2 Development History 31.3 Neural Network Model 61.4 Popular Neural Network 71.4.1 Convolutional Neural Network 71.4.2 Recurrent Neural Network 81.4.3 Reinforcement Learning 91.5 Neural Network Classification 91.5.1 Supervised learning 101.5.2 Semi-supervised learning 101.5.3 Unsupervised learning 111.6 Neural Network Operation 111.6.1 Training 111.6.2 Inference 121.7 Application Development 121.7.1 Business Planning 141.7.2 Network Design 141.7.3 Data Engineering 141.7.4 System Integration 15Exercise 162 NEURAL NETWORK 172.1 Convolutional Layer 192.2 Activation Layer 202.3 Pooling Layer 212.4 Batch Normalization 222.5 Dropout Layer 222.6 Fully Connected Layer 23Exercise 243 MACHINE VISION 253.1 Object Recognition 253.2 Feature Matching 273.3 Facial Recognition 283.4 Gesture Recognition 303.5 Machine Vision Applications 313.5.1 Medical Diagnosis 313.5.2 Retail Applications 323.5.3 Airport Security 33Exercise 344 NATURAL LANGUAGE PROCESSING 354.1 Neural Network Model 364.1.1 Convolutional Neural Network 364.1.2 Recurrent Neural Network 374.1.2.1 Long Short-Term Memory Network 384.1.3 Recursive Neural Network 394.1.4 Reinforcement Learning 404.2 Natural Language Processing Applications 414.2.1 Virtual Assistant 414.2.2 Language Translation 424.2.3 Machine Transcription 43Exercise 455 AUTONOMOUS VEHICLE 465.1 Levels of Driving Automation 465.2 Autonomous Technology 485.2.1 Computer Vision 485.2.2 Sensor Fusion 495.2.3 Localization 515.2.4 Path Planning 525.2.5 Drive Control 525.3 Communication Strategies 535.3.1 Vehicle-to-Vehicle Communication 545.3.2 Vehicle-to-Infrastructure Communication 545.3.3 Vehicle-to-Pedestrian Communication 555.4 Law Legislation 565.4.1 Human Behavior 575.4.2 Lability 575.4.3 Regulation 585.5 Future Challenges 585.5.1 Road Rules Variation 585.5.2 Unified Communication Protocol 585.5.3 Safety Standard and Guideline 595.5.4 Weather/Disaster 59Exercise 606 DRONE 616.1 Drone Design 616.2 Drone Structure 626.2.1 Camera 636.2.2 Gyro Stabilization 636.2.3 Collision Avoidance 646.2.4 Global Positioning System 646.2.5 Sensors 646.3 Drone Regulation 656.3.1 Recreational Rules 656.3.2 Commercial Rules 666.4 Applications 666.4.1 Infrastructure Inspection 666.4.2 Civil Construction 676.4.3 Agriculture 686.4.4 Emergency Rescue 69Exercise 707 HEALTHCARE 717.1 Telemedicine 717.2 Medical Diagnosis 727.3 Medical Imaging 737.4 Smart Medical Device 747.5 Electronic Health Record 767.6 Medical Billing 777.7 Drug Development 787.8 Clinical Trial 797.9 Medical Robotics 807.10 Elderly Care 817.11 Future Challenges 82Exercise 848 FINANCE 858.1 Fraud Prevention 858.2 Financial Forecast 888.3 Stock Trading 898.4 Banking 918.5 Accounting 948.6 Insurance 95Exercise 969 RETAIL 979.1 E-Commerce 989.2 Virtual Shopping 1009.3 Product Promotion 1029.4 Store Management 1039.5 Warehouse Management 1049.6 Inventory Management 1069.7 Supply Chain 108Exercise 11010 MANUFACTURING 11110.1 Defect Detection 11210.2 Quality Assurance 11310.3 Production Integration 11410.4 Generative Design 11510.5 Predictive Maintenance 11710.6 Environment Sustainability 11810.7 Manufacturing Optimization 119Exercise 12111 AGRICULTURE 12211.1 Crop and Soil Monitoring 12311.2 Agricultural Robot 12511.3 Pest Control 12611.4 Precision Farming 127Exercise 12912 SMART CITY 13012.1 Smart Transportation 13112.2 Smart Parking 13212.3 Waste Management 13312.4 Smart Grid 13412.5 Environmental Conservation 135Exercise 13713 GOVERNMENT 13813.1 Information Technology 14013.2 Human Service 14113.3 Law Enforcement 14413.3.4 Augmenting Human Movement 14713.4 Homeland Security 14713.5 Legislation 14913.6 Ethics 15213.7 Public Perspective 155Exercise 15914 COMPUTING PLATFORM 16014.1 Central Processing Unit 16014.1.1 System Architecture 16114.1.2 Advanced Vector Extension 16414.1.3 Math Kernel Library for Deep Neural Network 16514.2 Graphics Processing Unit 16514.2.1 Tensor Core Architecture 16714.2.2 NVLink2 Configuration 16714.2.3 High Bandwidth Memory 16914.3 Tensor Processing Unit 17014.3.1 System Architecture 17014.3.2 Brain Floating Point Format 17114.3.3 Cloud Configuration 17214.4 Neural Processing Unit 17314.4.1 System Architecture 17314.4.2 Deep Compression 17414.4.3 Dynamic Memory Allocation 17414.4.4 Edge AI Server 175Exercise 176APPENDIX A KNERON NEURAL PROCESSING UNIT 178APPENDIX B OBJECT DETECTION (OVERVIEW) 179B.1 Kneron Environment Setup 179B.2 Python Installation 180B.3 Library Installation 184B.4 Driver Installation 185B.5 Model Installation 186B.6 Image/Camera Detection 186B.7 Yolo Class List 190APPENDIX C OBJECT DETECTION - HARDWARE 192C.1 Library Setup 192C.2 System Parameters 193C.3 NPU Initialization 194C.4 Image Detection 195C.5 Camera Detection 197APPENDIX D HARDWARE TRANSFER MODE 199D.1 Serial Transfer Mode 199D.2 Pipeline Transfer Mode 201D.3 Parallel Transfer Mode 203APPENDIX E OBJECT DETECTION – SOFTWARE (OPTIONAL) 205E.1 Library Setup 205E.2 Image Detection 207E.3 Video Detection 208Reference 211
From Sequences to Graphs
In order to study living organisms, scientists not only study them at an overall macroscopic scale but also on a more detailed microscopic scale. This observation, pushed to its limits, consists of investigating the very center of each cell, where we find the molecules that determine the way it functions: DNA (deoxyribonucleic acid) and RNA (ribonucleic acid).In an organism, DNA carries the genetic information, which is called the genome. It is represented as four-letter sequences using the letters A, C, G and T; based on these sequences, computer methods described in this book can answer fundamental questions in bioinformatics.This book explores how to quickly find sequences of a few hundred nucleotides within a genome that may be made up of several billion, how to compare those sequences and how to reconstruct the complete sequence of a genome. It also discusses the problems of identifying bacteria in a given environment and predicting the structure of RNA based on its sequence.ANNIE CHATEAU is a lecturer at the University of Montpellier, France. Her research interests include algorithms and combinatorial structures.MIKAËL SALSON is a lecturer at the University of Lille, France. His work focuses mainly on indexing and sequence comparison.Preface xiAuthor Biographies xviiCHAPTER 1 METHODOLOGICAL CONCEPTS: ALGORITHMIC SOLUTIONS OF BIOINFORMATICS PROBLEMS 1Annie CHATEAU and Tom DAVOT-GRANGÉ1.1 Data, Models, Problem Formalism in Bioinformatics 11.1.1 Data 11.1.2 Genome Modeling 41.1.3 Problems in Bioinformatics 51.2 Mathematical Preliminaries 61.2.1 Propositional Logic Preliminaries 61.2.2 Preliminaries on Sets 71.3 Vocabulary in Text Algorithmics 91.4 Graph Theory 101.4.1 Subgraphs 121.4.2 Path in a Graph 131.4.3 Matching 131.4.4 Planarity 141.4.5 Tree Decomposition 151.5 Algorithmic Problems 161.5.1 Definition 161.5.2 Graph Problem 171.5.3 Satisfiability Problems 191.6 Problem Solutions 201.6.1 Algorithm 201.6.2 Complexity 211.6.3 Runtime 241.7 Complexity Classes 261.7.1 Generality 261.7.2 Exact Algorithms 281.7.3 Approximation Algorithms 321.7.4 Solvers 341.8 Some Algorithmic Techniques 351.8.1 Dynamic Programming 351.8.2 Tree Traversal 381.9 Validation 411.9.1 The Different Types of Errors 421.9.2 Quality Measures 441.9.3 And in the Non-Binary Case? 461.10 Conclusion 471.11 References 47CHAPTER 2 SEQUENCE INDEXING 49Thierry LECROQ and Mikaël SALSON2.1 Introduction 492.1.1 What is Indexing? 502.1.2 When to Index? 512.1.3 What to Index? 512.1.4 Indexing Structures and Queries Considered 522.1.5 Basic Notions and Vocabulary 532.2 Word Indexing 542.2.1 Bloom Filters 542.2.2 Inverted List 562.2.3 De Bruijn Graphs 602.2.4 Efficient Structures for Targeted Queries 612.3 Full-Text Indexing 622.3.1 Suffix Tree 622.3.2 (Extended) Suffix Array 642.3.3 Burrows–Wheeler Transform 672.4 Indexing Choice Criteria 762.4.1 Based on the Type of the Necessary Query 772.4.2 Based on the Space-Time and Data Quantity Trade-Off 772.4.3 Based on the Need to Add or Modify Indexed Data 792.4.4 Indexing Choices According to Applications 802.5 Conclusion and Perspectives 812.5.1 Efficient Methods for Indexing a Few Genomes or Sequencing Sets 812.5.2 Methods that Struggle to Take Advantage of Data Redundancy 822.6 References 83CHAPTER 3 SEQUENCE ALIGNMENT 87Laurent NOÉ3.1 Introduction 873.1.1 What is Pairwise Alignment? 873.1.2 How to Evaluate an Alignment? 883.2 Exact Alignment 903.2.1 Representation in Edit Graph Form 903.2.2 Global Alignment and Needleman–Wunsch Algorithm 933.2.3 Local Alignment and Smith–Waterman Algorithm 943.2.4 Alignment with Affine Indel Function and the Gotoh Algorithm 963.3 Heuristic Alignment 983.3.1 Seeds 993.3.2 Min-Hash and Global Sampling 1053.3.3 Minimizing and Local Sampling 1063.4 References 109CHAPTER 4 GENOME ASSEMBLY 113Dominique LAVENIER4.1 Introduction 1134.2 Sequencing Technologies 1164.2.1 Short Reads 1174.2.2 Long Reads 1184.2.3 Linked Reads 1184.2.4 Hi-C Reads 1194.2.5 Optical Mapping 1194.3 Assembly Strategies 1204.3.1 The Main Steps 1204.3.2 Cleaning and Correction of Reads 1214.3.3 Scaffold Construction 1224.3.4 Scaffold Ordering 1234.4 Scaffold Construction Methods 1244.4.1 Greedy Assembly 1244.4.2 OLC Assembly 1264.4.3 DBG Assembly 1274.4.4 Constrained Assembly 1304.5 Scaffold-Ordering Methods 1324.5.1 Hi-C Data-Based Methods 1324.5.2 Optical Mapping-Based Methods 1374.6 Assembly Validation 1394.6.1 Metrics 1404.6.2 Read Realignment 1404.6.3 Gene Prediction 1414.6.4 Competitions 1414.7 Conclusion 1424.8 References 143CHAPTER 5 METAGENOMICS AND METATRANSCRIPTOMICS 147Cervin GUYOMAR and Claire LEMAITRE5.1 What is Metagenomics? 1475.1.1 Motivations and Historical Context 1475.1.2 The Metagenomics Data 1485.1.3 Bioinformatics Challenges for Metagenomics 1515.2 “Who Are They”: Taxonomic Characterization of Microbial Communities 1535.2.1 Methods for Targeted Metagenomics 1545.2.2 Whole-Genome Methods with Reference 1555.2.3 Reference-Free Methods 1605.3 “What Are They Able To Do?”: Functional Metagenomics 1665.3.1 Gene Prediction and Annotation 1665.3.2 Metatranscriptomics 1675.3.3 Reconstruction of Metabolic Networks 1685.4 Comparative Metagenomics 1695.4.1 Comparative Metagenomics with Diversity Estimation 1705.4.2 De Novo Comparative Metagenomics 1705.5 Conclusion 1755.6 References 176CHAPTER 6 RNA FOLDING 185Yann PONTY And Vladimir REINHARZ6.1 Introduction 1856.1.1 RNA Folding 1866.1.2 Secondary Structure 1896.2 Optimization for Structure Prediction 1926.2.1 Computing the Minimum Free-Energy (MFE) Structure 1926.2.2 Listing (Sub)optimal Structures 1986.2.3 Comparative Prediction: Simultaneous Alignment/Folding of RNAs 2036.2.4 Joint Alignment/Folding Model 2046.3 Analyzing the Boltzmann Ensemble 2106.3.1 Computing the Partition Function 2106.3.2 Statistical Sampling 2156.3.3 Boltzmann Probability of Structural Patterns 2206.4 Studying RNA Structure in Practice 2256.4.1 The Turner Model 2256.4.2 Tools 2286.5 References 228Conclusion 233List of Authors 237Index 239
Apache Essentials
Apache is the most widely used web server on the Internet today, and that comes as no surprise—it’s open source and therefore free of charge, not to mention gloriously extensible. And it’s much more secure than other web servers.So you’ve picked this book up and youre wondering what exactly makes it different from all those other Apache books? There are hundreds of books about Apache; books that promise to unleash its power, provide a complete reference for it, or delve into the most miniscule corners of its functionality.The problem is that none of them talks to the average web designer or developer. Most books on Apache are written by propellerheads for propellerheads. None of them explain how to configure Apache using plain language, giving examples that matter to you—but _Apache Essentials_ does!In _Apache Essentials_, I’ll show you how to install, configure, and maintain Apache. The key features that you’ll use on a daily basis will be emphasized. You’ll learn how to host secure (SSL) sites, optimize key Apache modules, use Apache with Perl and PHP, work with Server Side Includes (SSI), and take advantage of the information contained in log files.By the time you’re done reading this book, you’ll be an Apache superstar!Like most of the world, Darren James Harkness started his coding career with “Hello world!” on a computer he bought himself at the local office supply store. Originally registered as a computer science major, he quickly learned there might be a different way to participate in technology better suited to his skill set than hard coding. From that point on Darren turned to writing for the web, writing about the web, and managing smart people who do the same. He has never looked back.Darren lives in the lower mainland of British Columbia where he still spends too much time online, much to the chagrin of his partner, son, cat, and scruffy dog.* INTRODUCTION: REVISITING APACHE ESSENTIALSGoals• Learn about Apache and get very brief history of its origins and use.• Discover what you will learn from Apache and what you will be able to accomplish with it.• Question: where to use Apache or another web server, and what the benefits/drawbacks of each are.Chapter 1: Installing ApacheGoals:• Feel confident installing Apache on Windows, Linux, and MacOS for a development environment.• Create a running installation of Apache serving its Hello World static HTML file.Subtopics• Instal Apache.• Question: should to use something other than Apache?• Manage dependencies (PHP, RewriteEngine, etc).Chapter 2: Configuration EssentialsGoals• Set up a basic Apache instance pointing to static HTML on http://localhost/.• Develop an understanding of commonly used Apache directives.• Learn .htaccess files and how/when to use them.Subtopics• Structure of Apache configuration files.• Commonly used configuration directives.• The .htaccess file. Benefits & drawbacks of putting configuration options in .htaccess.• Put it all together.Chapter 3: Scripting languagesGoals:• Learn how the web server and programming languages work together to create websites.• Configure your website securely for PHP or NodeJS.• Configure your localhost to load an index.php instead of the default Apache HTML file.Subtopics• Overview.• Commonly used scripting environments.• PHP on Apache.• NodeJS on Apache.• Put it all together.Chapter 4: setting up virtual hosts for developmentGoals• Learn about Apache virtual hosts and how to configure them.• Set up a local dev domain — using local DNS settings or a tool such as ngrok.• Create two development environments configured and accessible through the browser; one for PHP and another for NodeJS.Subtopics• Overview of virtual hosts.• Set up a local dev domain.• Configure Apache for multiple virtual hosts.• Configure Apache for modern PHP and Node frameworks (example of setting up a NodeJS application).Chapter 5: Securing your setupGoals• Understand the importance of using HTTPS by default.• Recognize what SSL certificates are and how they work to secure communication between the browser and the server.• Install an SSL certificate on their local Apache setup.Subtopics• How HTTPS works to secure data and why this is important.• Get a certificate for your development environment.• Put it all together.Chapter 6: Using log files to troubleshoot your codeGoals• Learn about Log files and what information they provide.• Troubleshoot code problems via Apache’ s log files.Subtopics• About Apache’s log files.• Configure Apache log files.• Common troubleshooting patterns for PHP and NodeJS.• A troubleshooting story (leads reader through analyzing and identifying an issue in a piece of faulty PHP code).Chapter 7: Sample Apache ConfigurationsGoals• Use one the 4-5 example Apache configurations in your own Apache configurations.Subsections• Basic configuration for PHP.• Basic configuration for NodeJS.• Protecting a directory / domain.• Virtual Host configuration.• Configuring for Rewritten URLs (URL redirecting).AfterwordGoals• Revisit main concepts from book. Looking forward to next steps.
Test Automation Fundamentals
Concepts, methods, and techniques—supported with practical, real-world examples* The first book to cover the ISTQB® Certified Test Automation Engineer syllabus* With real-world project examples* – Suitable as a textbook, as a reference book for ISTQB® training courses, and for self-studyThis book provides a complete overview of how to design test automation processes and integrate them into your organization or existing projects. It describes functional and technical strategies and goes into detail on the relevant concepts and best practices. The book's main focus is on functional system testing. Important new aspects of test automation, such as automated testing for mobile applications and service virtualization, are also addressed as prerequisites for creating complex but stable test processes. The text also covers the increase in quality and potential savings that test automation delivers.The book is fully compliant with the ISTQB® syllabus and, with its many explanatory examples, is equally suitable for preparation for certification, as a concise reference book for anyone who wants to acquire this essential skill, or for university-level study.Manfred Baumgartner has more than 30 years of experience in software testing and quality assurance. Since 2001, he has established and expanded the QA consulting and training services of Nagarro GmbH, one of the leading service companies in the field of software testing. He is a board member of the Association for Software Quality and Further Education (ASQF)) and the Association for Software Quality Management Austria (STEV) as well as a member of the Austrian Testing Board (ATB). He shares his extensive experience in numerous presentations at conferences and in articles and books on software testing. Stefan Gwihs is an enthusiastic software developer, software tester and test automation architect for Nagarro GmbH, where he currently focuses on topics related to test automation for Agile software development and DevOps. Richard Seidl has seen and tested a lot of software in his professional career: good and bad, big and small, old and new, chocolate and groats. His credo: Quality is an attitude. If you want to create excellent software today, you have to think holistically about the development process: people, methods, tools, and mindset. As a consultant and coach, he supports companies in living agility and quality and anchoring them in the corporate DNA. Thomas Steirer leads Nagarro's global test automation practice as a test automation architect, test manager and trainer. Since 2010 he is certified as ISTQB® Certified Tester - Full Advanced Level. He is a lecturer for test automation in the master program Software Engineering at the UAS Technikum Vienna and researches the use of artificial intelligence with the goal of making test automation even more efficient. Marc-Florian Wendland is a research associate at the Fraunhofer Institute FOKUS in Berlin. For more than 10 years he has been involved in national and international, cross-domain research and industry projects on topics of test automation in design and execution. He is a member of the German Testing Board (GTB) and a trainer for the various ISTQB® programs. Julian Hartner is an ISTQB® certified quality engineer for Nagarro based in New York City and a passionate software developer and Test Automation Engineer. He currently focuses on streamlining manual and automated testing for CRM applications.
Design Patterns in .NET 6
Implement design patterns in .NET 6 using the latest versions of the C# and F# languages. This book provides a comprehensive overview of the field of design patterns as they are used in today’s developer toolbox. In addition to the functional builder, asynchronous factory method, generic value adapter, and composite proxies, this new edition introduces topics such as Decorator Cycle Policies Functional Commands, a Transformer variation of the Visitor pattern, and factories that can perform Object Tracking and Bulk Replacement.Using the C# and F# programming languages, DESIGN PATTERNS IN .NET 6 explores the classic design pattern implementations and discusses the applicability and relevance of specific language features for implementing patterns. You will learn by example, reviewing scenarios where patterns are applicable. Former C# MVP and patterns expert Dmitri Nesteruk demonstrates possible implementations of patterns, discusses alternatives and pattern relationships, and illustrates the way that a dedicated refactoring tool (JetBrains Rider) can be used to implement design patterns with ease.WHAT YOU WILL LEARN* Become familiar with the latest pattern implementations available in C# 10 and F# 6* Know how to better reason about software architecture* Understand the process of refactoring code to patterns* Refer to researched and proven variations of patterns* Study complete, self-contained examples, including many that cover advanced scenarios* Use the latest versions of C# and Visual Studio/Rider/ReSharperWHO THIS BOOK IS FORDevelopers who have some experience in the C# language and want to expand their comprehension of the art of programming by leveraging design approaches to solve modern problemsDMITRI NESTERUK is a quantitative analyst, developer, course instructor, book author, and occasional conference speaker. His interests lie in software development and integration practices in the areas of computation, quantitative finance, and algorithmic trading. His technological interests include C# and C++ programming as well as high-performance computing using technologies such as CUDA and FPGAs.PART I: INTRODUCTION.-Chapter 1: The SOLID Design PrinciplesChapter 2: The Functional PerspectivePART II: CREATIONAL PATTERNSChapter 3: BuilderChapter 4: FactoriesChapter 5: PrototypeChapter 6: SingletonPART III: STRUCTURAL PATTERNSChapter 7: AdapterChapter 8: BridgeChapter 9: CompositeChapter 10: DecoratorChapter 11: FaçadeChapter 12: FlyweightChapter 13: ProxyChapter 14: Value ObjectPART IV: BEHAVIORAL PATTERNSChapter 15: Chain of ResponsibilityChapter 16: CommandChapter 17: InterpreterChapter 18: IteratorChapter 19: MediatorChapter 20: MementoChapter 21: Null ObjectChapter 22: ObserverChapter 23: StateChapter 24: StrategyChapter 25: Template MethodChapter 26: Visitor
Advanced Excel Formulas
Enhance and upgrade your Excel knowledge with this comprehensive guide to formulas in Excel. OVER 150 OF THE MOST USEFUL EXCEL FUNCTIONS are covered with numerous practical examples of their use. This book is fully updated and includes examples of the most recently released functions in 2022. It is written in a manner that you can read it cover-to-cover or pick it up and learn something new in just 5 minutes.The book begins with a primer on Excel formulas and functions. Starting from a basic level, but diving into intricate detail and building a solid understanding of the fundamentals. It may not always be sexy, but LEARNING WHY, in addition to how, is important to truly understanding Excel formulas. Having strong fundamentals is the most advanced skill.The book covers all the most popular functions in Excel including VLOOKUP, SUMPRODUCT, COUNTIFS, MATCH, SORT and so much more. You will learn how to return multiple results with a single formula. Harness the power of the dynamic array engine and functions such as SEQUENCE, SORTBY, UNIQUE, XLOOKUP and FILTER to create top N Lists, models and reports that would seem impossible without array formulas. In the final chapter, we discover the amazing LAMBDA function in Excel. Create your own Excel functions to simplify future Excel formulas and share them with others.In this book, the formulas are not only written to return values to the grid, but also for use with other Excel features such as charts and Conditional Formatting, to take them to another level. Practice files are provided to follow all examples shown in the book.WHAT WILL YOU LEARN* Gain intimate knowledge of Excel formulas* Understand efficient and practical use of Defined Names and Tables* Master the most popular functions of Excel – VLOOKUP, COUNTIFS, MATCH, SUMPRODUCT, and so much more* Learn to return multiple results from a single formula with the magical array formulas.* Know the best lookup functions for dynamic spreadsheets* Know true power of classic Excel functions such as IF, SUM, and INDEX* Use new Excel functions including XLOOKUP, VSTACK, LET, and LAMBDAWHO IS THIS BOOK FORExcel users who are familiar with formulas but want to improve their current skill levelALAN MURRAY is a Microsoft MVP and Excel trainer. He has been helping people in Excel for over 20 years. He loves training and the joy he gets from knowing he is making peoples working lives easier.Alan runs his own blog - Computergaga (https://computergaga.com) and writes for multiple other websites. His YouTube channel has over 550 videos and over 35 million views.He organizes a free monthly Excel meetup in London where anyone can come learn Excel, chat, and enjoy each other’s company (https://www.meetup.com/London-Excel-Meetup-Group/).CHAPTER 1: EXCEL FORMULAS – A QUICK PRIMERCHAPTER GOAL: Start the journey to mastering formulas in ExcelNO OF PAGES: 25This chapter is the first of many on formulas in Excel. It will start with basic mathematical operations, explain the structure of formulas inside-out, look at some basic functions and cover absolute cell addresses.CHAPTER 2: LOGICAL FORMULASChapter Goal: Learn the important logical functions in Excel.NO OF PAGES: 35This chapter will explain how and when to use logical functions including IF, IFS, AND, OR, XOR, IFERROR, IFNA and SWITCH. These functions are the initial building blocks of automated Excel models and reports. Their importance cannot be understated.CHAPTER 3: DEFINED NAMESCHAPTER GOAL: Understand the use and hidden brilliance of defined names.NO OF PAGES: 25This chapter explores defined names in-depth. This little-known feature has huge benefits in how we use and deploy ranges and formulas in Excel.CHAPTER 4: YOU NEED TO START USING TABLESCHAPTER GOAL: To understand and master the use of TablesNO OF PAGES: 30This chapter will introduce the reader to tables in Excel. It will explain the many benefits to their use and how to use them effectively.CHAPTER 5: MANIPULATING TEXTCHAPTER GOAL: Learn the most useful text functions of ExcelNO OF PAGES: 40This chapter will look at the formulas to extract, combine, replace, and format text. These include but are not limited to LEN, MID, SEARCH, DOLLAR, CONCAT and VALUE.CHAPTER 6: WORKING WITH DATES AND TIMESChapter Goal: Learn the popular date and time functions of ExcelNO OF PAGES: 40This chapter will explain how dates and times are stored, and are to be used, in Excel. We will use different date and time functions to perform transformations and various calculations.CHAPTER 7: THE INFAMOUS VLOOKUP FUNCTIONCHAPTER GOAL: Master this vital functionNO OF PAGES: 35This chapter is dedicated to the third most used function in Excel. It fully explains how to use VLOOKUP in a way people have probably not heard before. It will also cover some insider tricks to avoid common VLOOKUP limitations and mistakes. A variety of examples will be shown.CHAPTER 8: ADVANCED LOOKUP FORMULASCHAPTER GOAL: Learn more advanced lookup functions.NO OF PAGES: 40In this chapter, we explore functions such as INDEX, OFFSET, MATCH, CHOOSE and INDIRECT to build upon the concepts learnt with VLOOKUP. We will see alternative ways to complete a task dependent upon the scenario.CHAPTER 9: THE AWESOME SUMIFS, COUNTIFS AND FRIENDSCHAPTER GOAL: Learn how to use these two exceptional functions.NO OF PAGES: 40This chapter will explain these two functions with various examples. They are two of the best and have come to my aid so many times in the past. The chapter also shows the AVERAGEIFS, MINIFS and MAXIFS functions.CHAPTER 10: NEXT LEVEL AGGREGATION FUNCTIONSCHAPTER GOAL: Learn the SUMPRODUCT and AGGREGATION functions.NO OF PAGES: 30This chapter will look at the SUMPRODUCT and AGGREGATE functions. This chapter follows on nicely from the previous one as these functions have more power than SUMIFS and COUNTIFS.CHAPTER 11: DYNAMIC ARRAY FORMULASChapter Goal: Understand how to efficiently use dynamic array formulasNO OF PAGES: 40This chapter introduces the reader to dynamic array formulas. These formulas are available to 365 users only. Therefore, it is essential that it is understood how these formulas are best used, and how they may affect you if you are not a 365 user.CHAPTER 12: XLOOKUP – THE NEW KID ON THE BLOCKCHAPTER GOAL: Learn how and when to use the XLOOKUP functionNo of pages: 20This chapter is all about the XLOOKUP function. What does it offer that the other lookup function could not? When is the best time to use it? All will be covered in this chapter.CHAPTER 13: FILTER FUNCTION – THE GAME CHANGERCHAPTER GOAL: Learn how to effectively use the FILTER functionNO OF PAGES: 20This chapter focuses on the impressive FILTER function. Several examples are shown to demonstrate the FILTER function performing tasks that other functions cannot do.CHAPTER 14: TABLE RANKINGS AND TOP N LISTSCHAPTER GOAL: Learn to create different dynamic table rankingsNO OF PAGES: 20This chapter uses functions and skills learnt over previous chapters to create different table ranking and top N lists. These are common tasks, but difficult to perform without advanced Excel formula skills.CHAPTER 15: GETTING STATUS INFORMATIONChapter Goal: Learn how to retrieve status of cells and the Excel environmentNO OF PAGES: 20This chapter will look at the CELL, TYPE, and INFO functions of Excel. They are used to return information about cells, data types and the operating environment. We can the utilise this information in other functions.CHAPTER 16: THE LET AND LAMBDA FUNCTIONSCHAPTER GOAL: Understand these two new functionsNO OF PAGES: 30This chapter will look the LET and LAMBDA functions introduced to Excel 365 in 2020/2021. They are freshly released and change how Excel users will write complex formulas. This chapter will explain how and when to use these power functions.
Power Platform and Dynamics 365 CE for Absolute Beginners
This is your complete guide to less-code and no-code theories, along with practical application of Microsoft Power Apps and Dynamics 365 CE/CRM Apps.The book covers topics including the configurations, customizations, and enhancements in Microsoft Power Apps and Dynamics 365 CE/CRM Apps. You will start by learning Microsoft Dataverse concepts followed by Microsoft Canvas Apps, model-driven apps, and PowerApps Portals. You will understand how to work with Power Virtual Agent, Power BI, and Power Automate, and how to use AI in Power Apps. The book provides important integration concepts for Power Apps, Dynamics 365 CE/CRM Apps, and Microsoft Azure. You will know how to customize Dynamics 365 CE/CRM Apps and Power Apps using OOTB capabilities.After reading this book, you will understand how Microsoft Power Apps and Dynamics 365 CE/CRM Apps can be used, configured, and customized for your business needs using customer data. You will be able to increase efficiency in customer data management and cloud app integrations.WHAT YOU WILL LEARN* Get up to speed on the Power platform echo-system and Dynamics 365 architecture* Work with Dataverse* Understand the Power platform building blocks* Select Power Apps to manage customer data* Configure and customize Power Apps* Design robust cloud flows* Integrate Power BI with Dynamics 365 CE/CRM Apps* Understand the core apps in Dynamics 365 CE/CRM* Use AI in Power AppsWHO THIS BOOK IS FORFunctional consultants/business analysts, technical consultants/solution architects in Power Apps and Dynamics 365 CE/CRM; and beginners who want to start a career in Power Apps and Dynamics 365 CE/CRM with easy English termsSANJAYA PRAKASH PRADHAN is a Microsoft Dynamics 365 and Power Apps Business Applications (MVP), and Microsoft Certified Trainer (MCT) in Dynamics 365 CE and Power Apps. He is an experienced senior technical consultant with 13+ years of experience in consulting and training who has worked on numerous business system implementations. Sanjaya is currently working as the research and development industry solutions lead in an established worldwide business applications practice. Having led software projects in numerous industries, including BFS, healthcare, retail, and the public sector, he works across all areas of the project life cycle from demonstrations to design, architecture, documentation, customization, and development. Sanjaya gets involved in the technical community through leading the Power Platform and Dynamics 365 user group in India, running technical events, and presenting on technical and functional topics at conferences around the world. He is a/an MVP, MCT, community director, UG lead, speaker, trainer, blogger, author, podcaster, business advisor, and senior solution architect.CHAPTER 1: INTRODUCTION: MICROSOFT POWER APPSCHAPTER GOAL: Introduction to book and topics to be coveredNO OF PAGES : 20SUB -TOPICS1. Understanding Environment2. Subscribing 30-days Free Trial Environment3. Power Platform Architecture and Concept4. Difference between Power Apps and Dynamics 365 Apps5. How Power Apps supports Less-code & no-code concept6. PowerFX concept in Power Apps7. Configuration’s v/s Customization in power Platform8. Enhancement Scopes in Power Apps9. Integrations concepts in Power Apps10. Sample Domain and Project AnalysisCHAPTER 2: WORKING WITH MICROSOFT DATAVERSECHAPTER GOAL: WORKING WITH DATAVERSE CONCEPTS IN DETAILSNO OF PAGES: 30SUB – TOPICS1. Understanding Power Apps Solutions2. Working with Table Configurations and settings3. Working with Columns, Data Types, Calculated Fields, Roll-up Fields4. Auto-number columns in Dataverse5. Configuring Relationships and Relationship Behaviors6. Working with Business Rules7. Configure Views for Tables8. Table Forms Design and Layouts9. Chart Configuration and Dashboard pinning10. Configure Table-Specific Dashboards11. Concepts of Alternate Keys12. Working with Data in Dataverse13. Business Scenario, Use cases and ImplementationChapter 3: Working with Microsoft Power AppsCHAPTER GOAL: LEARN MICROSOFT CANVAS-APPS, MODEL-DRIVEN APPS AND POWER PORTALSNO OF PAGES: 30SUB - TOPICS:1. Concept of Power Apps and no-code, less-code platform2. Working with Canvas Apps in details3. PowerFX for Power Apps4. Working with Model-driven apps5. Power Portal Concepts and Design with Deployment6. Manage Power Apps7. Business Scenarios and ImplementationsCHAPTER 4: WORKING WITH POWER AUTOMATECHAPTER GOAL: LEARNING CLOUD FLOW FOR AUTOMATIONSNO OF PAGES: 40SUB - TOPICS:8. Concept of Power Automate and Building Blocks9. Connectors in Power Automate10. Types of Flows and usages11. Dynamic Values and Expressions in Flows12. Using Variables, Loops and Conditions13. Working with Approvals in Power Automate14. Business Scenarios, Use Cases and ImplementationsCHAPTER 5: WORKING WITH POWER VIRTUAL AGENTCHAPTER GOAL: CREATE DIGITAL BOTS IN POWER PLATFORMNo of pages: 20SUB - TOPICS:15. Concept of Power Virtual Agent16. Building Blocks of Power Virtual Agents17. Configure Sample Power Virtual Agent18. Deploy Power Virtual Agent in Public Website/ Portals19. Business Scenarios, Use Cases and ImplementationsCHAPTER 6: WORKING WITH POWER BI AND DYNAMICS 365 APPSCHAPTER GOAL: DESIGN REPORTS AND DASHBOARDS IN CLOUDNO OF PAGES: 20SUB - TOPICS:1. Concept of Power BI2. Building Blocks of Power BI, Data Source, Reports, Dashboards3. Connect Online Data source to use in Power BI4. Connect On-premise Data source to use in Power BI5. Integrate Power BI with Dynamics 365 CE Apps6. Business Scenarios, Use Cases and ImplementationsCHAPTER 7: WORKING WITH AI BUILDERCHAPTER GOAL: LEARN HOW TO USE AI IN POWER APPSNO OF PAGES: 20SUB - TOPICS:1. Concept of AI Builder2. Types of AI Builder and Models3. Form Processing Models4. Object Detection Models5. Use AI Builder in Power Automate and canvas Apps6. Business Scenarios, Use Cases and ImplementationsCHAPTER 8: WORKING WITH CONFIGURATIONSCHAPTER GOAL: LEARN HOW TO USE SETTINGS FOR PERSONALIZATION AND ADVANCED SETTINGS WITH SCENARIOSNO OF PAGES: 30SUB - TOPICS:1. Admin Centers and its usages2. Data import in Power Apps3. Configure Duplicate detection rules4. Configure auditing feature in power apps5. Add users in environments6. Security matrix and configurations7. Configure Workflows and concepts8. Configure Custom Actions9. Configure Reports in Power Apps10. Working with Email Templates and Email Signatures11. Install multiple languages in environments12. Working with Translation13. Working with document templatesCHAPTER 9: WORKING WITH CUSTOMIZATIONSCHAPTER GOAL: HOW TO CUSTOMIZE SYSTEMNO OF PAGES: 30SUB - TOPICS:1. Working with Client-side scripting JavaScript in Power Apps2. Develop Plugins for Power Apps3. Develop Custom Workflow Activities in Power Apps4. Edit command Bars in Power Apps5. Business Scenarios and ImplementationsCHAPTER 10: WORKING WITH INTEGRATIONS FOR POWER APPS AND DYNAMICS 365CHAPTER GOAL: INTEGRATION SCENARIOSNO OF PAGES: 20SUB - TOPICS:6. Outlook Integration in Power Apps7. SharePoint Integration in Power Apps8. One-Drive Integration in Power Apps9. Azure Integration in Power Apps10. Business Scenarios and Implementations11. What NextCHAPTER 11: DYNAMICS 365 CORE APPSCHAPTER GOAL: UNDERSTAND CORE APPS IN DYNAMICS 365 CENO OF PAGES: 30SUB - TOPICS:1. Sales Hub App Life Cycle2. Customer Service Hub App Life Cycle3. Marketing App Concept and Life Cycle4. Field Service App Life Cycle5. Project Service Automation Life Cycle6. What Next in Learning
Systematisches Requirements Engineering
Das umfassende Handbuch zum Requirements Engineering* eingeführtes Standardwerk nun in 7. Auflage!* hoher Praxisbezug* direkt anwendbare Checklisten und PraxistippsDieses Buch beschreibt praxisorientiert und systematisch das Requirements Engineering vom Konzept über Analyse und Realisierung bis zur Wartung und Evolution eines Produkts.Requirements Engineering mit seinen Methoden, Modellen, Notationen und Werkzeugen wird eingeführt. Ein durchgängiges Beispiel sowie viele industrielle Praxiserfahrungen illustrieren die Umsetzung. Direkt anwendbare Checklisten und Praxistipps runden jedes Kapitel ab. Lesen Sie das Buch, um– Requirements Engineering kennenzulernen,– Ihre Projekte und Produkte erfolgreich zu liefern,– agile Entwicklung beispielsweise mit testorientierten Anforderungen umzusetzen,- industrieerprobte Techniken des Requirements Engineering produktiv zu nutzen.Diese 7. Auflage wurde in vielen Aspekten aktualisiert und berücksichtigt den aktuellen Lehrplan des IREB®-Zertifizierungsprogramms.Christof Ebert ist Geschäftsführer von Vector Consulting Services. Er unterstützt Kunden bei Produktstrategie, Entwicklung und agiler Transformation und arbeitet in verschiedenen Aufsichtsgremien von Unternehmen. Zuvor war er zwölf Jahre bei einem IT Konzern in weltweiten Führungsaufgaben. Als Business Angel und Professor an der Universität Stuttgart und der Sorbonne in Paris stimuliert er Innovationen. Er wirkt in den Herausgeber-Komitees von Zeitschriften wie IEEE Software und dem Journal of Systems and Software. In seiner Freizeit spielt er als Musiker Keyboards und engagiert sich im sozialen Bereich.Folgen Sie ihm auf Twitter: @ChristofEbertKontakt: christof.ebert@vector.com, www.christofebert.deHomepage des Buches: www.vector.com/RE-Buch
Web Application Development with Streamlit
Transition from a back-end developer to a full-stack developer with knowledge of all the dimensions of web application development, namely, front-end, back-end and server-side software. This book provides a comprehensive overview of Streamlit, allowing developers and programmers of all backgrounds to get up to speed in as little time as possible.Streamlit is a pure Python web framework that will bridge the skills gap and shorten development time from weeks to hours. This book walks you through the complete cycle of web application development, from an introductory to advanced level with accompanying source code and resources. You will be exposed to developing basic, intermediate, and sophisticated user interfaces and subsequently you will be acquainted with data visualization, database systems, application security, and cloud deployment in Streamlit.In a market with a surplus demand for full stack developers, this skill set could not possibly come at a better time. In one sentence, Streamlit is a means for the empowerment of developers everywhere and all stand to gain from it.WHAT YOU’LL LEARN* Mutate big data in real-time* Visualize big data interactively* Implement web application security and privacy protocols * Deploy Streamlit web applications to the cloud using Streamlit, Linux and Windows serversWHO IS THIS BOOK FOR?Developers with solid programming experience wanting to learn Streamlit; Back-end developers looking to upskill and transition to become a full-stack developers; Those who wish to learn and become more acquainted with data visualization, database systems, security and cloud deployment with SteamlitMOHAMMAD KHORASANI A hybrid of an engineer and a computer scientist with a Bachelor’s of Science in Mechanical Engineering from Texas A&M University, and a Master’s in Computer Science from the University of Illinois at Urbana-Champaign. Mohammad specializes in developing and implementing software solutions for the advancement of renewable energy systems and services at Iberdrola. In addition, he develops robotic devices using embedded systems and rapid prototyping technologies. He is also an avid blog-ger of STEM related topics on Towards Data Science - a Medium publication.MOHAMED ABDOU A Software Engineer with diverse academic and industrial exposure. A graduate of Computer Engineering from Qatar University, and currently a SDE at Amazon. Mohamed has built a variety of open source tools used by tens of thousands in the Streamlit community. He led the first Google Developer Student Club in Qatar, and represented Qatar University in national and international programming contests. He is a a cyber security enthusiast, and was ranked 2nd nationwide in bug bounty hunting in Qatar in 2020 among under 25 year old’s.JAVIER HERNANDEZ FERNANDEZ specializes in the area of technology innovation and brings over twenty years of practical experience in overseeing the design and delivery of technological developments on behalf of multi-national companies in the fields of IT, telecom, and utilities. He publishes extensively, speaks at conferences around the world, and spends his days wading through piles of academic papers in the hope of finding something interesting. He holds Masters’ degrees in both Energy Management and Project Management, in addition to a B.Sc. in Computer Science from the from the Faculty of Engineering of the University of Ottawa.PART I: INTRODUCTION TO STREAMLIT1 GETTING STARTED WITH STREAMLIT1.1 Why Streamlit?1.2 How Streamlit Works1.3 Firing it up2 STREAMLIT BASICS2.1 The Streamlit API2.2 Creating a basic appPART II: DEVELOPING ADVANCED INTERFACES AND APPLICATIONS3 ARCHITECTING STREAMLIT’S FRONT-END DESIGN3.1 Designing the application3.2 Provisioning multi-page applications3.3 Data wrangling4 GRAPHING IN DEPTH4.1 Visualization stack4.2 Exploring Plotly data visualizationsPART III: INTERFACING WITH DATABASE AND BACK-END SYSTEMS5 DATABASE INTEGRATION5.1 Relational Databases5.2 Non-relational databases6 BACK-END SERVERS6.1 The need for back-end servers6.2 Front-end/ Back-end Communication6.3 Working with JSON files6.4 Provisioning a back-end server6.5 Multi-threading and multi-processing request6.6 Connecting Streamlit to a Back-end ServerPART IV: ENFORCING APPLICATION SECURITY AND PRIVACY7 SESSION STATE7.1 Introducing session IDs7.2 Implementing session state persistently7.3 Recording user insights7.4 Implementing session state natively7.5 Cookies management8 AUTHENTICATION AND APPLICATION SECURITY8.1 Developing user accounts8.2 Verifying user credentials8.3 Secrets management8.4 Anti-SQL injection measures with SQL Alchemy8.5 Configuring Git Ignore variablesPART V: DEPLOYING STREAMLIT TO THE CLOUD9 PERSISTENT DEPLOYMENT9.1 Deployment to Streamlit Sharing9.2 Deployment to Linux9.3 Deployment to Windows Server10 EXPOSING LOCAL STREAMLIT TO THE WORLD WIDE WEB10.1 Port forwarding over network gateway10.2 Reverse Port Forwarding using NGROKPART VI: STREAMLIT CUSTOM COMPONENTS11 BUILDING STREAMLIT COMPONENTS WITH REACT.JS11.1 Introduction to Streamlit custom components11.2 Using React.js to create custom HTML components11.3 Deploying components as a Pip package12 EXTRA-STREAMLIT-COMPONENTS PACKAGE12.1 Stepper bar12.2 Splash screen . .12.3 Tab bar12.4 Cookie ManagerPART VII: STREAMLIT CASE STUDIES13 GENERAL USE CASES13.1 Data science & machine learning applications13.2 Dashboards and real-time applications13.3 Time-series applications13.4 Advanced application development14 STEAMLIT AT WORK14.1 Iberdrola Renewables14.2 DummyLearn.com
Just React!
Here is your perfect companion for learning about and developing React applications. This book introduces concepts innovatively, using real-world examples based on the most recommended practices to help you establish a firm foundation. This comprehensive approach provides a strong focus on building components by using React hooks.You’ll begin by learning web fundamentals, next-generation JavaScript, and how React fits into this. In the chapters that follow, you’ll build a React application from scratch and learn about JSX, components, props, state management, prop drilling, context, and lifecycle events. Along the way you’ll build a multi-component app and see how the components interact. Debugging and styling React applications are also discussed.You’ll then take an in depth look at React hooks and see how to create a custom hook. There is also a penultimate chapter that explores important concepts such as routing and authentication. The book concludes with a review of some exciting features in the upcoming release of React 18. After reading Just React you will be equipped with the skills necessary to build complex web and mobile user interfaces using this flexible JavaScript library.WHAT YOU’LL LEARN* Examine the details of modern React concepts through example projects* Set up your own React project* Debug and style React components* Take a look at routing, authentication, HTTP requests, Redux, and the new features of React 18WHO THIS BOOK IS FORWeb developers, React developers, and JavaScript developersHari Narayn is a programming enthusiast with over 11 years of experience in building web and mobile applications with React, Microsoft 365, SharePoint, Azure, Teams, Power Platform, .Net, Angular, and JavaScript. He has built web and mobile solutions for various clients across the world. He is a Microsoft 365 Certified Developer Associate, Certified Azure Solutions Architect Expert, and a Certified Power Platform Developer Associate. He is a native of Kerala, India and currently based in Melbourne, Australia. He works as a Senior Technical Specialist in Victorian Public Service.Chapter 1: Time to ReactChapter Goal: The purpose of this chapter is to introduce you to React and to introduce the role it plays in modern web development.No of pages: 20Subtopics1. Think before you React2. How React Reacts compared to JavaScript?3. React Vs Angular.4. Where to React?Chapter 2: JavaScript Before You ReactChapter Goal: Next gen JavaScript (ES6 and above) is the subject of this chapter. The goal of this chapter is to get you familiar with the latest features of this most popular programming language.No of pages: 40Sub - Topics1. Variables, Conditionals, and loops2. Functions and Arrow Functions3. Modules4. Events5. Reference Types6. Async Await7. Template Literals.Chapter 3: Start ReactingChapter Goal: The goal of this chapter is to get you started on your React journey. You will gain an in-depth understanding of React project setup and fundamental concepts.No of pages: 60Sub - Topics:1. Set up an environment to ‘React’2. How to React?3. create-react-app4. Introduction to Components5. JSX6. Reacting to inputs7. Styling your component8. Virtual DOM9. Props and State10. Just React to Child11. React on a ConditionChapter 4: Think ReactChapter Goal: Using the most recommended concepts of React, this chapter creates a fully functional application. You'll gain an understanding of state management, component interactions etc., and you will start thinking the React way.No of pages:50Sub - Topics:1. VS Code Extensions2. Restructuring the React form3. Combining Reactions4. Sibling Reactions5. Component chat continues…6. Reacting to edits7. More Reactions to the parentChapter 5: Rethink ReactChapter Goal: The goal of this chapter is to get you to rethink. It will show you how to identify and fix common problems with React applications. You will learn some advanced concepts such as code splitting and React Context.No of pages:50Sub - Topics:1. React Lazy and Suspense2. Props Drilling3. Multi View React app4. React ContextChapter 6: React to BugsChapter Goal: This chapter covers several ways to debug React applications. It mostly focuses on how you, as a developer, react to bugs in React applications.You will learn about the rich capabilities of Chrome DevTools and React DevTools.No of pages:30Sub - Topics:1. Chrome Reacts2. Don’t React, Debug first3. Console Reactions4. React to Errors5. React Developer Tools6. React to Bugs within VS CodeChapter 7: Reacting in styleChapter Goal: The purpose of this chapter is to present different ways of styling components, their pros and cons, and introduce some tools to assist you in styling React components.No of pages:30Sub - Topics:1. CSS-in-JS2. Styled Components3. CSS Style Sheets4. Sassy CSS (SCSS)5. CSS Modules6. Overview of CodeSandbox and Material UI7. Responsive ReactChapter 8: Hook into ReactChapter Goal: In this chapter, we will cover in depth about React Hooks with examples. You will learn about all the hooks and how to create custom hooks.No of pages:60Sub - Topics:1. Life of a Class2. Life of a Function and the birth of Hooks3. useState4. useEffect4. useRef5. useReducer6. Remember to React7. useMemo8. useCallback9. useContext10. Few more ‘Hookies’11. Custom ‘Hookies’Chapter 9: React moreChapter Goal: This chapter covers basics about Routing, Authentication, sending HTTP requests from a React App, Redux and a few other concepts we haven't talked about so far in other chapters. etc.No of pages:50Sub - Topics:1. React to Routes2. Identify before React3. . HTTP Reactions4. ReduxChapter 10: New ReactionsChapter Goal: This chapter summarizes all the new features in React 18No of pages:20Sub - Topics:1. New Root and the new way to Render2. React Concurrently3. React slowly for faster response4. Server on Suspense5. Automatic Batching6. ’Too Strict’ Mode7. New ‘Hookies’
Building the Snowflake Data Cloud
Implement the Snowflake Data Cloud using best practices and reap the benefits of scalability and low-cost from the industry-leading, cloud-based, data warehousing platform. This book provides a detailed how-to explanation, and assumes familiarity with Snowflake core concepts and principles. It is a project-oriented book with a hands-on approach to designing, developing, and implementing your Data Cloud with security at the center. As you work through the examples, you will develop the skill, knowledge, and expertise to expand your capability by incorporating additional Snowflake features, tools, and techniques. Your Snowflake Data Cloud will be fit for purpose, extensible, and at the forefront of both Direct Share, Data Exchange, and Snowflake Marketplace.BUILDING THE SNOWFLAKE DATA CLOUD helps you transform your organization into monetizing the value locked up within your data. As the digital economy takes hold, with data volume, velocity, and variety growing at exponential rates, you need tools and techniques to quickly categorize, collate, summarize, and aggregate data. You also need the means to seamlessly distribute to release value. This book shows how Snowflake provides all these things and how to use them to your advantage.The book helps you succeed by delivering faster than you can deliver with legacy products and techniques. You will learn how to leverage what you already know, and what you don’t, all applied in a Snowflake Data Cloud context. After reading this book, you will discover and embrace the future where the Data Cloud is central. You will be able to position your organization to take advantage by identifying, adopting, and preparing your tooling for the coming wave of opportunity around sharing and monetizing valuable, corporate data.WHAT YOU WILL LEARN* Understand why Data Cloud is important to the success of your organization* Up-skill and adopt Snowflake, leveraging the benefits of cloud platforms* Articulate the Snowflake Marketplace and identify opportunities to monetize data* Identify tools and techniques to accelerate integration with Data Cloud* Manage data consumption by monitoring and controlling access to datasets* Develop data load and transform capabilities for use in future projectsWHO THIS BOOK IS FORSolution architects seeking implementation patterns to integrate with a Data Cloud; data warehouse developers looking for tips, tools, and techniques to rapidly deliver data pipelines; sales managers who want to monetize their datasets and understand the opportunities that Data Cloud presents; and anyone who wishes to unlock value contained within their data silosANDREW CARRUTHERS is the Director for the Snowflake Corporate Data Cloud at the London Stock Exchange Group. Comprising two Snowflake accounts supporting both ingestion data lake and consumption analytics hub, the Corporate Data Cloud services a growing customer base of over 7,000 end users. He also leads both the Centre for Enablement developing tooling, best practices and training, and the Snowflake Landing Zone provisioning Snowflake Accounts conforming to both internal standards and best practices.PART I. CONTEXT1. The Snowflake Data Cloud2. Breaking Data SiloesPART II. CONCEPTS3. Architecture4. Account Security5. Role Based Access Control (RBAC)6. Account Usage StorePART III. TOOLS7. Ingesting Data8. Data Pipelines9. Data Presentation10. Semi Structured and Unstructured DataPART IV. MANAGEMENT11. Query Optimizer Basics12. Data Management13. Data Modelling14. Snowflake Data Cloud By Example
Pro Data Mashup for Power BI
This book provides all you need to find data from external sources and load and transform that data into Power BI where you can mine it for business insights and a competitive edge. This ranges from connecting to corporate databases such as Azure SQL and SQL Server to file-based data sources, and cloud- and web-based data sources. The book also explains the use of Direct Query and Live Connect to establish instant connections to databases and data warehouses and avoid loading data.The book provides detailed guidance on techniques for transforming inbound data into normalized data sets that are easy to query and analyze. This covers data cleansing, data modification, and standardization as well as merging source data into robust data structures that can feed into your data model. You will learn how to pivot and transpose data and extrapolate missing values as well as harness external programs such as R and Python into a Power Query data flow. You also will see how to handle errors in source data and extend basic data ingestion to create robust and parameterized data load and transformation processes.Everything in this book is aimed at helping you deliver compelling and interactive insight with remarkable ease using Power BI’s built-in data load and transformation tools.WHAT YOU WILL LEARN* Connect Power BI to a range of external data sources* Prepare data from external sources for easy analysis in Power BI * Cleanse data from duplicates, outliers, and other bad values* Make live connections from which to refresh data quickly and easily* Apply advanced techniques to interpolate missing dataWHO THIS BOOK IS FORAll Power BI users from beginners to super users. Any user of the world’s leading dashboarding tool can leverage the techniques explained in this book to turbo-charge their data preparation skills and learn how a wide range of external data sources can be harnessed and loaded into Power BI to drive their analytics. No previous knowledge of working with data, databases, or external data sources is required—merely the need to find, transform, and load data into Power BI..ADAM ASPIN is an independent Business Intelligence consultant based in the United Kingdom. He has worked with SQL Server for over 25 years. During this time, he has developed several dozen reporting and analytical systems based on the Microsoft Data Platform.A graduate of Oxford University, Adam began his career in publishing before moving into IT. Databases soon became a passion, and his experience in this arena ranges from dBase to Oracle, and Access to MySQL, with occasional sorties into the world of DB2. He is, however, most at home in the Microsoft universe when using SQL Server Analysis Services, SQL Server Reporting Services, SQL Server Integration Services, Azure Data Factory, Azure Synapse and, of course, Power BI.Business Intelligence has been Adam's principal focus for 20 years. He has applied his skills for a range of clients in a range of industry sectors. He is the author of SQL Server Data Integration Recipes; Pro Power BI Desktop (now in its third edition); Business Intelligence with SQL Server Reporting Services; High Impact Data Visualization; Data Mashup using Microsoft Excel using Power Query and M, and Pro Power BI Theme Creation—all with Apress.A fluent French speaker, Adam has worked in France and Switzerland for many years.1. Discovering and Loading Data with Power BI Desktop2. Discovering and Loading File-Based Data with Power BI Desktop3. Loading Data From Databases and Data Warehouses4. DirectQuery and Live Connect5. Loading Data from the Web and Cloud6. Loading Data from Other Data Sources7. Power Query8. Structuring Data9. Shaping Data10. Data Cleansing11. Data Transformation12. Complex Data Structures13. Organizing, Managing, and Parameterizing Queries14. The M LanguageAppendix A: Sample Data
Mapping Data Flows in Azure Data Factory
Build scalable ETL data pipelines in the cloud using Azure Data Factory’s Mapping Data Flows. Each chapter of this book addresses different aspects of an end-to-end data pipeline that includes repeatable design patterns based on best practices using ADF’s code-free data transformation design tools. The book shows data engineers how to take raw business data at cloud scale and turn that data into business value by organizing and transforming the data for use in data science projects and analytics systems.The book begins with an introduction to Azure Data Factory followed by an introduction to its Mapping Data Flows feature set. Subsequent chapters show how to build your first pipeline and corresponding data flow, implement common design patterns, and operationalize your result. By the end of the book, you will be able to apply what you’ve learned to your complex data integration and ETL projects in Azure. These projects will enable cloud-scale big analytics and data loading and transformation best practices for data warehouses.WHAT YOU WILL LEARN* Build scalable ETL jobs in Azure without writing code* Transform big data for data quality and data modeling requirements* Understand the different aspects of Azure Data Factory ETL pipelines from datasets and Linked Services to Mapping Data Flows* Apply best practices for designing and managing complex ETL data pipelines in Azure Data Factory* Add cloud-based ETL patterns to your set of data engineering skills* Build repeatable code-free ETL design patternsWHO THIS BOOK IS FORData engineers who are new to building complex data transformation pipelines in the cloud with Azure; and data engineers who need ETL solutions that scale to match swiftly growing volumes of dataMARK KROMER has been in the data analytics product space for over 20 years and is currently a Principal Program Manager for Microsoft’s Azure data integration products. Mark often writes and speaks on big data analytics and data analytics and was an engineering architect and product manager for Oracle, Pentaho, AT&T, and Databricks prior to Microsoft Azure. IntroductionPART I. GETTING STARTED WITH AZURE DATA FACTORY AND MAPPING DATA FLOWS1. Introduction to Azure Data Factory2. Introduction to Mapping Data FlowsPART II. DESIGNING SCALABLE ETL JOBS WITH ADF MAPPING DATA FLOWS3. Build Your First Pipeline4. Common Pipeline Patterns5. Design Your First Mapping Data Flow6. Common Data Flow Patterns7. Debugging Mapping Data Flows8. Data Pipelines with Data FlowsPART III. OPERATIONALIZE YOUR ETL DATA PIPELINES9. CI/CD and Scheduling10. Monitoring, Management, and SecurityPART IV. SAMPLE PROJECT11. Build a New ETL Project in ADF using Mapping Data Flows12. End-to-End Review of the ADF Project