Deine agile Reise34,90 €*
Was zählt für dich als Agile Coach wirklich? Wie kannst du mehr Wirkung in der Arbeitswelt entfalten? Finde es heraus!- 99 erkenntnisreiche Selbstcoaching-Übungen mit unterschiedlichem Fokus- die Methoden der Übungen kommen aus den Bereichen Journaling, agilen Methoden und Systemisches Coaching- Gestalte dein Lernbacklog, um deine agile Reise aktiv zu gestaltenDas Arbeitsbuch "Deine Agile Reise" ist eine Kombination aus Selbstcoaching und Training. Es bietet dir die perfekten Mischung aus fachlich fundierten Fakten aus der agilen und systemischen Welt sowie eigenen Erfahrungen, die die Autorin Janna Wurdig ehrlich mit dir teilt. Die Übungen und Aufgaben aus dem Buch führen dich aktiv mit Stift, Papier und Post-its zu neuen Erkenntnissen zu deiner Rolle als Agile Coach.Schnapp dir einen Stift und starte deine agile Reise!Janna Wurdig ist Expertin für Agilität, Teamentwicklung und moderne Arbeitsweisen im digitalen Wandel. Als Agile Coach und Senior Consultant für Future Work bei der esentri AG arbeitet sie gemeinsam mit ihren Kund*innen an Haltung, Fähigkeiten, Werkzeugen und Strukturen, die eine agile, nachhaltige und wertstiftende (Zusammen-)Arbeit ermöglichen. Mit viel Leidenschaft unterstützt sie mutige Entscheidungen, Entwicklung und neues Denken. Hierbei setzt sie auf gemeinsames Wachstum und Potenzialentfaltung. Erfahre mehr: www.deine-agile-reise.de/ueber-mich
Software Transparency22,99 €*
DISCOVER THE NEW CYBERSECURITY LANDSCAPE OF THE INTERCONNECTED SOFTWARE SUPPLY CHAINIn Software Transparency: Supply Chain Security in an Era of a Software-Driven Society, a team of veteran information security professionals delivers an expert treatment of software supply chain security. In the book, you’ll explore real-world examples and guidance on how to defend your own organization against internal and external attacks. It includes coverage of topics including the history of the software transparency movement, software bills of materials, and high assurance attestations. The authors examine the background of attack vectors that are becoming increasingly vulnerable, like mobile and social networks, retail and banking systems, and infrastructure and defense systems. You’ll also discover:* Use cases and practical guidance for both software consumers and suppliers* Discussions of firmware and embedded software, as well as cloud and connected APIs* Strategies for understanding federal and defense software supply chain initiatives related to securityAn essential resource for cybersecurity and application security professionals, Software Transparency will also be of extraordinary benefit to industrial control system, cloud, and mobile security professionals. CHRIS HUGHES is the co-founder and Chief Information Security Officer of Aquia. He is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and the University of Maryland Global Campus, and a co-host of the Resilient Cyber Podcast. TONY TURNER has 25 years’ experience as a cybersecurity engineer, architect, consultant, executive, and community builder. He is the Founder of Opswright, a software company creating solutions for security engineering in critical infrastructure and leads the OWASP Orlando chapter.
Business Capabilities49,90 €*
Praxisleitfaden für Enterprise Architects- Umfassend und anwendungsbezogen- Ein Buch aus der Praxis für die Praxis- Mit »Real-world«-Beispielen von Capabilty Maps aus UnternehmenDas Konzept der Business Capabilities zur Beschreibung von Geschäftsfähigkeiten ist im Enterprise Architecture Management schon lange erfolgreich im Einsatz. Doch die Möglichkeiten zum nutzbringenden Einsatz von Capabilities sind deutlich umfangreicher und bieten sich bei vielen Aufgaben im Rahmen der Unternehmensentwicklung an.Dieses Buch bietet eine systematische Einführung in die Grundlagen, die Anwendung und die Vorbereitung für den Einsatz von Capabilities in der Praxis: von der Definition und den Eigenschaften von Capabilities über den Unternehmenskontext, Objekt- und Beziehungstypen und Kategorisierung sowie Einordnung in Rahmenwerke und Methoden bis hin zur Modellierung von Capabilities. Es gibt Ihnen einen flexiblen Werkzeugkasten an die Hand für den Einsatz von Capabilities in diversen Anwendungsfällen der Unternehmensentwicklung.Dr. Wolf Pfannenstiel arbeitete nach Studium und Promotion in Informatik an der TU Berlin zunächst mehrere Jahre als Business-Analyst und Softwareproduktmanager, bevor er sich auf Enterprise Architecture Management spezialisierte. Business Capabilities nutzt er als konzeptionelles Werkzeug seit mehr als 15 Jahren erfolgreich in Projekten verschiedener Art und Branchen. Seit 2015 arbeitet er bei der Innovationeers GmbH als Lösungs- und Enterprise-Architekt und begleitet sowohl die Vorbereitung als auch die Umsetzung von Innovations- und Transformationsvorhaben bei Konzernen und großen Mittelständlern.
How I Rob Banks17,99 €*
FOLLOW FC AS HE STEALS FROM THE WORLD’S MOST SECURE BANKS AND GOVERNMENT FACILITIES—WITHOUT BREAKING A SINGLE LAWIn How I Rob Banks: And Other Such Places, renowned ethical hacker and social engineer FC delivers a gripping and often hilarious discussion of his work: testing the limits of physical bank security by trying to “steal” money, data, and anything else he can get his hands on. In the book, you’ll explore the secretive world of physical assessments and follow FC as he breaks into banks and secure government locations to identify security flaws and loopholes.The author explains how banks and other secure facilities operate, both digitally and physically, and shows you the tools and techniques he uses to gain access to some of the world’s most locked-down buildings. You’ll also find:* Strategies you can implement immediately to better secure your own company, home, and data against malicious actors* Detailed photos, maps, and drawings to bring to life the unbelievable true stories contained inside* An inside and candid look at a rarely examined industry through the eyes of one of its most respected penetration testersA can’t-miss account of real-life security exploits perfect for infosec pros, including red and blue teamers, pentesters, CIOs, CISSPs, and social engineers, How I Rob Banks also belongs in the hands of anyone who loves a great Ocean’s 11-style story pulled straight from the real world.FC is a renowned ethical hacker and social engineer with over 20 years’ experience working in the field of information security. He has worked for major high street banks in the UK and Europe, FTSE100 companies, several government agencies, and security forces. He’s a frequent speaker at corporate events, security conferences, universities, and schools around the world.
CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!32,99 €*
SKIP THE FLUFF AND GET STRAIGHT TO THE ESSENTIALS WITH AN INDISPENSABLE PREP HANDBOOK FOR THE COMPTIA A+ CORE 2 EXAMIn CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 2 Exam 220-1102, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking—and succeeding on—the CompTIA A+ Core 2 exam. You’ll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:* PREPARE -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!* PRACTICE -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!* PASS -- On exam day, use the critical knowledge you've learned when you’re ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You’ll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test—the first time around!An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 2 Exam 220-1102 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.
Mach was mit 3D-Druck!34,99 €*
Hast du bereits 3D-Druck-Vorlagen nachgedruckt und willst nun selbst kreativ werden? Dann weißt du: Dazu braucht es eine gute Idee – und um diese in die Tat umzusetzen, musst du mehr können als einen 3D-Drucker zu bedienen. Dieses Buch vermittelt dir Fertigkeiten, die echte Erfinder:innen ausmachen. Du erfährst alles, was du wissen musst, um mithilfe von 3D-Druck deine Produktidee zu realisieren.Folgende Themen erwarten dich:- Der komplette Weg zum DIY-Objekt – vom Konstruktionsmodell über das 3D-Drucken der Einzelteile bis zum Zusammenbau- Alles Wissenswerte zu CAD-Software, Druckeinstellungen, verwendbaren Materialien & Drucker-Wartung- Tipps zum Umgang mit der ersten Druckschicht, dünnen Wandstärken, schrägen Wänden (inkl. Support), Bridges, Warping, Düsenverstopfung etc.- Die Verbindung von 3D-Druckteilen (inkl. elektronischer Komponenten)In mehr als 15 Projekten erhältst du Anregungen für originelle 3D-Druck-Kreationen – sei es ein Ventilator, eine Hamburgerpresse oder eine Geige. Die 2. Auflage berücksichtigt den aktuellen Stand der Verbindungstechnik, wie Helicoils und Inserts, und enthält neue Anwendungsbeispiele, zu denen unter anderem ein Nussknacker, ein Brillengestell und ein Gyro-Uhrenbeweger gehören. Zur Weiterbearbeitung der CAD-Modelle sowie zur Erstellung der Druckdaten stehen auf plus.hanser-fachbuch.de die STEP- und STL-Dateien aller Projekte zum Download bereit.Wenn du darauf brennst, mithilfe von 3D-Druck deine eigenen Produktideen zu verwirklichen, dann liefert dir dieses Buch eine Fülle von Inspirationen, die deine Kreativität beflügeln werden, und alle notwendigen Skills, um dein Wunschobjekt zu entwickeln, zu drucken und zu bauen. Dipl.-Ing. Stephan Regele war sechs Jahre Konstrukteur bei der MAN Druckmaschinen AG. Seit 2002 ist er Inhaber eines Ingenieurbüros in der Nähe von Madrid (www.inotec-sl.net). Zu den Hauptgeschäftsfeldern des Unternehmens zählen Entwicklungsprojekte auf den Gebieten des Betriebsmittel- und Prüfvorrichtungsbaus für die Luftfahr- und Transportindustrie. In seiner Freizeit tüftelt stets an neuen Produktideen, die er mit seinem 3D-Drucker realisieren kann.
Handbook of Software Fault Localization96,99 €*
Handbook of Software Fault LocalizationA COMPREHENSIVE ANALYSIS OF FAULT LOCALIZATION TECHNIQUES AND STRATEGIES In Handbook of Software Fault Localization: Foundations and Advances, distinguished computer scientists Prof. W. Eric Wong and Prof. T.H. Tse deliver a robust treatment of up-to-date techniques, tools, and essential issues in software fault localization. The authors offer collective discussions of fault localization strategies with an emphasis on the most important features of each approach. The book also explores critical aspects of software fault localization, like multiple bugs, successful and failed test cases, coincidental correctness, faults introduced by missing code, the combination of several fault localization techniques, ties within fault localization rankings, concurrency bugs, spreadsheet fault localization, and theoretical studies on fault localization. Readers will benefit from the authors’ straightforward discussions of how to apply cost-effective techniques to a variety of specific environments common in the real world. They will also enjoy the in-depth explorations of recent research directions on this topic. Handbook of Software Fault Localization also includes:* A thorough introduction to the concepts of software testing and debugging, their importance, typical challenges, and the consequences of poor efforts * Comprehensive explorations of traditional fault localization techniques, including program logging, assertions, and breakpoints * Practical discussions of slicing-based, program spectrum-based, and statistics-based techniques * In-depth examinations of machine learning-, data mining-, and model-based techniques for software fault localization Perfect for researchers, professors, and students studying and working in the field, Handbook of Software Fault Localization: Foundations and Advances is also an indispensable resource for software engineers, managers, and software project decision makers responsible for schedule and budget control. W. ERIC WONG, PHD, is a Full Professor, Director of Software Engineering Program, and the Founding Director of Advanced Research Center for Software Testing and Quality Assurance in Computer Science at the University of Texas at Dallas. He is also a Guest Researcher with the US National Institute of Standards and Technology. Professor Wong was the award recipient of the 2014 IEEE Reliability Society Engineer of the Year. In addition, he was the Editor-in-Chief of the IEEE Transactions on Reliability from June 2016 to May 2022. He received his MS and PhD in Computer Science from Purdue University. T.H. TSE received his PhD from London School of Economics, and was a Visiting Fellow at University of Oxford. He is an Honorary Professor in Computer Science with The University of Hong Kong after retiring from full professorship. He is a Steering Committee Chair of the IEEE International Conference on Software Quality, Reliability, and Security; and an Associate Editor of IEEE Transactions on Reliability. He has over 270 publications, including a book with Cambridge University Press. He ranks internationally as no. 2 in metamorphic testing. He was awarded an MBE by Queen Elizabeth II of the United Kingdom. Chapter 1: Software Fault Localization: An Overview of Research, Techniques, and ToolsChapter 2: Traditional Techniques for Software Fault LocalizationChapter 3: Slicing-Based Techniques for Software Fault LocalizationChapter 4: Spectrum-Based Techniques for Software Fault LocalizationChapter 5: Statistics-Based Techniques for Software Fault LocalizationChapter 6: Machine Learning-Based Techniques for Software Fault LocalizationChapter 7: Data Mining-Based Techniques for Software Fault LocalizationChapter 8: Information Retrieval-Based Techniques for Software Fault LocalizationChapter 9: Model-Based Techniques for Software Fault LocalizationChapter 10: Software Fault Localization in SpreadsheetsChapter 11: Theoretical Aspects of Software Fault LocalizationChapter 12: Software Fault Localization for Programs with Multiple BugsChapter 13: Emerging Aspects of Software Fault Localization
Optimization Techniques in Engineering173,99 €*
OPTIMIZATION TECHNIQUES IN ENGINEERINGTHE BOOK DESCRIBES THE BASIC COMPONENTS OF AN OPTIMIZATION PROBLEM ALONG WITH THE FORMULATION OF DESIGN PROBLEMS AS MATHEMATICAL PROGRAMMING PROBLEMS USING AN OBJECTIVE FUNCTION THAT EXPRESSES THE MAIN AIM OF THE MODEL, AND HOW IT IS TO BE EITHER MINIMIZED OR MAXIMIZED; SUBSEQUENTLY, THE CONCEPT OF OPTIMIZATION AND ITS RELEVANCE TOWARDS AN OPTIMAL SOLUTION IN ENGINEERING APPLICATIONS, IS EXPLAINED.This book aims to present some of the recent developments in the area of optimization theory, methods, and applications in engineering. It focuses on the metaphor of the inspired system and how to configure and apply the various algorithms. The book comprises 30 chapters and is organized into two parts: Part I — Soft Computing and Evolutionary-Based Optimization; and Part II — Decision Science and Simulation-Based Optimization, which contains application-based chapters. Readers and users will find in the book:* An overview and brief background of optimization methods which are used very popularly in almost all applications of science, engineering, technology, and mathematics;* An in-depth treatment of contributions to optimal learning and optimizing engineering systems;* Maps out the relations between optimization and other mathematical topics and disciplines;* A problem-solving approach and a large number of illustrative examples, leading to a step-by-step formulation and solving of optimization problems.AUDIENCEResearchers, industry professionals, academicians, and doctoral scholars in major domains of engineering, production, thermal, electrical, industrial, materials, design, computer engineering, and natural sciences. The book is also suitable for researchers and postgraduate students in mathematics, applied mathematics, and industrial mathematics. ANITA KHOSLA, PHD, is a professor in the Department of Electrical and Electronics Engineering at Manav Rachna International Institute of Research and Studies, University, Faridabad. She is the editor of two books and more than 50 research papers in national, international journals and conferences. PRASENJIT CHATTERJEE, PHD, is a full professor of Mechanical Engineering and Dean (Research and Consultancy) at MCKV Institute of Engineering, West Bengal, India. He has more than 120 research papers in various international journals and peer-reviewed conferences. He has authored and edited more than 22 books on intelligent decision-making, fuzzy computing, supply chain management, optimization techniques, risk management, and sustainability modeling. Dr. Chatterjee is one of the developers of a new multiple-criteria decision-making method called Measurement of Alternatives and Ranking according to Compromise Solution (MARCOS). IKBAL ALI, PHD, is a professor in the Department of Electrical Engineering, Faculty of Engineering & Technology of Jamia Millia Islamia, New Delhi, India. His research work has been widely published and cited in refereed international journals/conferences of repute like IEEE. His research interests are in the fields of power systems, operation, and control; and smart grid technologies. DHEERAJ JOSHI, PHD, is a professor in the Electrical Engineering Department, Delhi Technological University since 2015. He has published more than 200 publications in international/national journals and conferences. His areas of interest are power electronics converters, induction generators in wind energy conversion systems, and electric drives.
MCE Microsoft Certified Expert Cybersecurity Architect Study Guide38,99 €*
PREP FOR THE SC-100 EXAM LIKE A PRO WITH SYBEX’ LATEST STUDY GUIDEIn the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect certification exam offered by Microsoft. In the book, you’ll find comprehensive coverage of the objectives tested by the exam, covering the evaluation of Governance Risk Compliance technical and security operations strategies, the design of Zero Trust strategies and architectures, and data and application strategy design. With the information provided by the authors, you’ll be prepared for your first day in a new role as a cybersecurity architect, gaining practical, hands-on skills with modern Azure deployments. You’ll also find:* In-depth discussions of every single objective covered by the SC-100 exam and, by extension, the skills necessary to succeed as a Microsoft cybersecurity architect* Critical information to help you obtain a widely sought-after credential that is increasingly popular across the industry (especially in government roles)* Valuable online study tools, including hundreds of bonus practice exam questions, electronic flashcards, and a searchable glossary of crucial technical termsAn essential roadmap to the SC-100 exam and a new career in cybersecurity architecture on the Microsoft Azure cloud platform, MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100 is also ideal for anyone seeking to improve their knowledge and understanding of cloud-based management and security. ABOUT THE AUTHORSKATHIRAVAN UDAYAKUMAR is Head of Delivery and Chief Architect for Oracle Digital Technologies (Europe Practice) at Cognizant, covering various elements of technology stack in on-prem and cloud. He has over 18 years of experience in architecture, design, implementation, administration and integration with Green-field IT Systems, ERP, Cloud Platforms and Solutions across various business domains and Industries. He has had a passion for networking since he was an undergraduate and becoming a Cisco Certified Network Associate (CCNA). PUTHIYAVAN UDAYAKUMAR is an infrastructure architect with over 14 years of experience in modernizing and securing IT infrastructure, including the Cloud. He has been writing technical books for more than ten years on various infrastructure and security domains. He has designed, deployed, and secured IT infrastructure out of on-premises and Cloud, including virtual servers, networks, storage, and desktops for various industries, including pharmaceutical, banking, healthcare, aviation, federal entities, etc. He is an open group certified Master certified architect.
AWS Certified Database Study Guide38,99 €*
VALIDATE YOUR AWS CLOUD DATABASE SKILLS!AWS Certified Database Study Guide: Specialty (DBS-C01) Exam focuses on helping you to understand the basic job role of a database administrator / architect and to prepare for taking the certification exam. This is your opportunity to take the next step in your career by expanding and validating your skills on the AWS Cloud, and performing a database-focused role. AWS is the frontrunner in cloud computing products and services, and this study guide will help you to gain an understanding of core AWS services, uses, and basic AWS database design and deployment best practices. AWS offers more than relational and nonrelation databases, they offer purpose built databases, which allow you to utilize database services prebuilt to meet your business requirements. If you are looking to take the Specialty (DBS-C01) exam, this Study Guide is what you need for comprehensive content and robust study tools that will help you gain the edge on exam day and throughout your career. AWS Certified Database certification offers a great way for IT professionals to achieve industry recognition as cloud experts. This new study guide is perfect for you if you perform a database-focused role and want to pass the DBS-C01 exam to prove your knowledge of how to design and deploy secure and robust database applications on AWS technologies. IT cloud professionals who hold AWS certifications are in great demand, and this certification could take your career to the next level!* Master all the key concepts you need to pass the AWS Certified Database Specialty (DBS-C01) Exam* Further your career by demonstrating your cloud computing expertise and your knowledge of databases and database services* Understand the concept of purpose built databases, allowing you to pick the right tool for the right job.* Review deployment and migration, management and operations, monitoring and troubleshooting, database security, and more* Access the Sybex online learning environment and test bank for interactive study aids and practice questionsReaders will also get one year of FREE access after activation to Sybex’s superior online interactive learning environment and test bank, including hundreds of questions, a practice exam, electronic flashcards, and a glossary of key terms. ABOUT THE AUTHORSMATHEUS ARRAIS is a Senior Partner Solutions Architect at Amazon Web Services. RENE MARTINEZ BRAVET is a Solutions Architect at AWS focused on enterprise and financial services customers. LEONARDO CICCONE is a Senior Database Migration Specialist at Amazon Web Services, with a focus on database migration and modernization. ANGIE NOBRE COCHARERO is the Database Specialist Solution Architect at Amazon Web Services for Latin America. ÉRIKA KURAUCHI is the Specialist Solution Architecture Manager at Amazon Web Services for Latin America. HUGO ROZESTRATEN is a Principal Data Strategy Solutions Architect and author of several AWS blog posts.
Cyber Threat Intelligence83,99 €*
CYBER THREAT INTELLIGENCE“Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn’t just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when you know.”—SIMON EDWARDS, Security Testing Expert, CEO SE Labs Ltd., Chair AMTSO EFFECTIVE INTRODUCTION TO CYBER THREAT INTELLIGENCE, SUPPLEMENTED WITH DETAILED CASE STUDIES AND AFTER ACTION REPORTS OF INTELLIGENCE ON REAL ATTACKSCyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view. The author takes a systematic, system-agnostic, and holistic view to generating, collecting, and applying threat intelligence. The text covers the threat environment, malicious attacks, collecting, generating, and applying intelligence and attribution, as well as legal and ethical considerations. It ensures readers know what to look out for when considering a potential cyber attack and imparts how to prevent attacks early on, explaining how threat actors can exploit a system’s vulnerabilities. It also includes analysis of large scale attacks such as WannaCry, NotPetya, Solar Winds, VPNFilter, and the Target breach, looking at the real intelligence that was available before and after the attack. Topics covered in Cyber Threat Intelligence include:* The constant change of the threat environment as capabilities, intent, opportunities, and defenses change and evolve* Different business models of threat actors, and how these dictate the choice of victims and the nature of their attacks* Planning and executing a threat intelligence programme to improve an organistation’s cyber security posture* Techniques for attributing attacks and holding perpetrators to account for their actionsCyber Threat Intelligence describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, particularly if they wish to develop a career in intelligence, and as a reference for those already working in the area. MARTIN LEE is Technical Lead of Security Research within Talos, Cisco’s threat intelligence and research organization. Martin started his career researching the genetics of human viruses, but soon switched paths to follow a career in IT. With over 20 years of experience within the cyber security industry, he is CISSP certified, a Chartered Engineer, and holds degrees from the Universities of Bristol, Cambridge, Paris-Sud and Oxford. PrefaceAbout the AuthorAbbreviations1. IntroductionDefinitionsHistory of Threat IntelligenceUtility of Threat IntelligenceSummary2. Threat EnvironmentThreatRisk and VulnerabilityThreat ActorsTTPs - Tactics, Techniques and ProceduresVictimologyThreat LandscapeAttack Vectors, Vulnerabilities and ExploitsUntargeted vs Targeted AttacksPersistenceThinking Like a Threat ActorSummary3. Applying IntelligencePlanning Intelligence GatheringThe Intelligence CycleSituational AwarenesssGoal Oriented Security and Threat ModellingStrategic, Operational and Tactical IntelligenceIncident Preparedness and ResponseSummary4. Collecting IntelligenceHierarchy of EvidenceUnderstanding IntelligenceThird Party Intelligence ReportsInternal Incident ReportsActive Intelligence GatheringSummary5. Generating IntelligenceThe Intelligence Cycle in PracticeApplying the Intelligence CycleSources of DataSearching DataThreat HuntingTransforming Data into IntelligenceSharing IntelligenceMeasuring the Effectiveness of Generated IntelligenceSummary6. AttributionHolding Perpetrators to AccountStandards of ProofMechanisms of AttributionAnti-Attribution TechniquesThird Party AttributionUsing AttributionSummary7. ProfessionalismNotions of ProfessionalismDeveloping a New ProfessionBehaving EthicallyLegal and Ethical EnvironmentManaging the UnexpectedContinuous ImprovementSummary8. Future Threats and ConclusionsEmerging TechnologiesEmerging AttacksEmerging WorkforceConclusion9. Case StudiesTarget Compromise 2013WannaCry 2017NotPetya 2017VPNFilter 2018SUNBURST and SUNSPOT 2020Macron Leaks 2017Index
AI for Retail21,99 €*
THE COMING OF THE AI REVOLUTION IN BRICK-AND-MORTAR RETAILIn AI for Retail: A Practical Guide to Modernize Your Retail Business with AI and Automation, Francois Chaubard, AI researcher and retail technology CEO, delivers a practical guide for integrating AI into your brick-and-mortar retail business. In the book, you’ll learn how to make your business more efficient by automating inventory management, supply chain, front-end, merchandising, pricing, loss prevention, e-commerce processes, and more.The author takes you step by step from no AI Strategy at all to implementing a robust AI playbook that will permeate through your entire organization. In this book, you will learn:* How AI works, including key terminology and fundamental AI applications in retail* How AI can be applied to the major functions of retail with detailed P&L analysis of each application* How to implement an AI strategy across your entire business to double or even triple Free Cash FlowAI for Retail is the comprehensive, hands-on blueprint for AI adoption that retail managers, executives, founders, entrepreneurs, board members, and other business leaders have been waiting for.SECTION 1 INTRODUCTION TO THE AI REVOLUTION 111 How Ai Has Revolutionized Many Other Industries over the Last 20 Years 132 The Three Myths of How AI Will Transform Retail 373 How AI Will Automate and Optimize Retail 514 Level- Setting the AI Doomsday- ism 67SECTION 2 AI THEORY 755 What Is AI? 776 From CPUs to GPUs 847 Optimization 888 Measuring AI Performance 949 AI Learning Techniques 10010 Simulators and AI 11111 OODA Loops 11612 Hierarchy of Data Maturity 12013 A “General Theory for Retail AI” 125SECTION 3 APPLICATIONS OF AI IN RETAIL 13714 The Inefficiencies in Retail Today 13915 AI for Merchandising 14316 AI for Inventory, Ordering, and Supply Chain Management 15317 AI for Replenishment and Labor Management 17718 AI for Labor Budgets and Scheduling 19319 AI for E- Commerce and Customer Service 19920 AI for Warehouse and Distribution Centers 21221 AI for Checkout 22722 AI for Pricing and Promotion 25423 Other AI Use Cases 263SECTION 4 IMPLEMENTATION 26924 Create your “AI Strategy and Road Map” 27125 Buying vs. Building AI 28526 How to Run a Proof of Concept Bake- off Effectively 29227 Transitioning to a Fact- based, Data- driven Culture 303About the Author 309Index 311
Deep Dive28,99 €*
LEARN TO GATHER AND ANALYZE PUBLICLY AVAILABLE DATA FOR YOUR INTELLIGENCE NEEDSIn Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to advance your investigative OSINT skills and how your adversaries are most likely to use publicly accessible data against you. The author delivers an authoritative introduction to the tradecraft utilized by open-source intelligence gathering specialists while offering real-life cases that highlight and underline the data collection and analysis processes and strategies you can implement immediately while hunting for open-source info. In addition to a wide breadth of essential OSINT subjects, you’ll also find detailed discussions on ethics, traditional OSINT topics like subject intelligence, organizational intelligence, image analysis, and more niche topics like maritime and IOT. The book includes:* Practical tips for new and intermediate analysts looking for concrete intelligence-gathering strategies* Methods for data analysis and collection relevant to today’s dynamic intelligence environment* Tools for protecting your own data and information against bad actors and potential adversariesAn essential resource for new intelligence analysts, Deep Dive: Exploring the Real-world Value of Open Source Intelligence is also a must-read for early-career and intermediate analysts, as well as intelligence teams seeking to improve the skills of their newest team members. RAE BAKER is a Senior OSINT Analyst on the Dynamic Adversary Intelligence team at Deloitte specializing in maritime intelligence, human intelligence, corporate reconnaissance, and U.S. sanctions research. Rae is also a licensed private investigator and owns Kase Scenarios, an immersive training experience geared toward readying individuals for real-life OSINT work.
Cybersecurity First Principles: A Reboot of Strategy and Tactics22,99 €*
THE FIRST EXPERT DISCUSSION OF THE FOUNDATIONS OF CYBERSECURITYIn Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles. The author convincingly lays out the arguments for the absolute cybersecurity first principle and then discusses the strategies and tactics required to achieve it.In the book, you'll explore:* Infosec history from the 1960s until the early 2020s and why it has largely failed* What the infosec community should be trying to achieve instead* The arguments for the absolute and atomic cybersecurity first principle* The strategies and tactics to adopt that will have the greatest impact in pursuing the ultimate first principle* Case studies through a first principle lens of the 2015 OPM hack, the 2016 DNC Hack, the 2019 Colonial Pipeline hack, and the Netflix Chaos Monkey resilience program* A top to bottom explanation of how to calculate cyber risk for two different kinds of companiesThis book is perfect for cybersecurity professionals at all levels: business executives and senior security professionals, mid-level practitioner veterans, newbies coming out of school as well as career-changers seeking better career opportunities, teachers, and students.RICK HOWARD is the Chief Analyst and Senior Fellow at The CyberWire, the world’s largest cybersecurity podcast network, and the CSO of N2K (The CyberWire’s parent company). He’s been a CSO for Palo Alto Networks, TASC, and a former Commander for the U.S. Army’s Computer Emergency Response Team. He helped found the Cyber Threat Alliance (an ISAO for security vendors) and the Cybersecurity Canon Project (a Rock & Roll Hall of Fame for cybersecurity books).
Data Analytics in the AWS Cloud38,99 €*
A COMPREHENSIVE AND ACCESSIBLE ROADMAP TO PERFORMING DATA ANALYTICS IN THE AWS CLOUDIn Data Analytics in the AWS Cloud: Building a Data Platform for BI and Predictive Analytics on AWS, accomplished software engineer and data architect Joe Minichino delivers an expert blueprint to storing, processing, analyzing data on the Amazon Web Services cloud platform. In the book, you’ll explore every relevant aspect of data analytics—from data engineering to analysis, business intelligence, DevOps, and MLOps—as you discover how to integrate machine learning predictions with analytics engines and visualization tools. You’ll also find:* Real-world use cases of AWS architectures that demystify the applications of data analytics* Accessible introductions to data acquisition, importation, storage, visualization, and reporting* Expert insights into serverless data engineering and how to use it to reduce overhead and costs, improve stability, and simplify maintenanceA can't-miss for data architects, analysts, engineers and technical professionals, Data Analytics in the AWS Cloud will also earn a place on the bookshelves of business leaders seeking a better understanding of data analytics on the AWS cloud platform. GIONATA “JOE” MINICHINO is Principal Software Engineer and Data Architect on the Data & Analytics Team at Teamwork. He specializes in cloud computing, machine/deep learning, and artificial intelligence and designs end-to-end Amazon Web Services pipelines that move large quantities of diverse data for analysis and visualization.
CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified!25,99 €*
THE LEADING, NO-NONSENSE GUIDE TO GET YOU UP TO SPEED ON THE FUNDAMENTALS OF ITIn CompTIA ITF+ CertMike: Prepare. Practice. Pass the Exam! Get Certified! Exam FC0-U61, experienced tech education guru Mike Chapple delivers an essential and efficient guide to acing the ITF+ (IT Fundamentals+) exam administered by CompTIA. In the book, you’ll get access to every objective tested by the foundational exam, including IT concepts and terminology, infrastructure, applications and software, software development, database fundamentals, and security. Ace the test using the proven CertMike approach:* PREPARE -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!* PRACTICE -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!* PASS -- On exam day, use the critical knowledge you've learned when you’re ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You'll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test—the first time around!A must-read guide for anyone considering a career in IT and looking for a resource that assumes no background knowledge or experience, CompTIA ITF+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Exam FC0-U61 is your ticket to basic IT competency and confidence.MIKE CHAPPLE, PHD is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com.
CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!25,99 €*
SKIP THE FLUFF AND GET STRAIGHT TO THE ESSENTIALS WITH AN INDISPENSABLE PREP HANDBOOK FOR THE COMPTIA A+ CORE 1 EXAMIn CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified!Core 1 Exam 220-1101, veteran tech experts and educators Mike Chapple and Mark Soper deliver a hands-on and practical roadmap to taking—and succeeding on—the CompTIA A+ Core 1 exam. You’ll learn how to install, configure, and maintain computer equipment, mobile devices, and software for end users, service components based on customer requirements, understand networking basics, and apply essential cybersecurity methods. Ace the test using the proven CertMike approach:* PREPARE -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!* PRACTICE -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!* PASS -- On exam day, use the critical knowledge you've learned when you’re ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!With a laser-focus on getting you job- and exam-ready, the book skips the fluff and gets right to the point of getting you familiar with IT basics and on the road to an in-demand IT certification and a new career in tech. You’ll also get complimentary access to additional online study tools, complete with a bonus practice exam and audio recordings of the CertMike Exam Essentials. Banish test anxiety and feel ready to pass the test—the first time around!An indispensable resource for anyone preparing for their A+ certification, CompTIA A+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Core 1 Exam 220-1101 is also a must-read for hardware and PC technicians seeking to upgrade their skillset.
CompTIA Network+ CertMike: Prepare. Practice. Pass the Test! Get Certified!25,99 €*
A LASER-FOCUSED AND JOB-READY BLUEPRINT FOR SUCCESS ON THE COMPTIA NETWORK+ EXAM AND A RUNNING START ON YOUR FIRST (OR NEXT) JOB IN TECHCompTIA Network+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Exam N10-008 delivers a no-nonsense, straight-to-business guide to acing the CompTIA Network+ test on your first attempt. Veteran tech experts and educators Mike Chapple and Craig Zacker walk you through every step you’ll need to take on the N10-008 exam, from networking fundamentals, implementations, and operations to network security and troubleshooting. Ace the test using the proven CertMike approach:* PREPARE -- CertMike is your personal study coach, guiding you through all the exam objectives and helping you gain an understanding of how they apply to on-the-job tasks!* PRACTICE -- Each chapter includes two multiple choice practice questions. Work through the detailed explanations to evaluate each answer option and understand the reason for the best answer!* PASS -- On exam day, use the critical knowledge you've learned when you’re ready to take the test. You'll feel ready and confident to pass the exam and earn your certification!The book skips the fluff and gets right to the point of getting you familiar with network basics and on the road to an in-demand certification and a new career as a network technician or admin. You’ll also get complimentary access to additional Sybex online study tools, including a bonus practice exam and audio recordings of the book’s CertMike Exam Essentials.A can’t-miss roadmap to success on the Network+ exam, CompTIA Network+ CertMike: Prepare. Practice. Pass the Test! Get Certified! Exam N10-008 is the job-focused and practical guide you’ve been looking for to help you hone your networking skills.ABOUT THE AUTHORSMIKE CHAPPLE, PHD is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com. CRAIG ZACKER is the author or co-author of dozens of books, manuals, articles, and web sites on computer and networking topics.
Teach Yourself VISUALLY Power BI21,99 €*
A COMPREHENSIVE AND FULLY VISUAL GUIDE TO MICROSOFT POWER BITeach Yourself VISUALLY Power BI collects all the resources you need to master the everyday use of Microsoft's powerful data visualization software and delivers them in a single, easy-to-use volume. Fully illustrated, step-by-step instructions are combined with crystal-clear screenshots that walk you through the basic and advanced functions of Microsoft Power BI.Teach Yourself VISUALLY Power BI offers the best visual learning techniques with complete source material about the interface and substance of Power BI, as well as:* Stepwise guidance on working with, transforming, and processing data sources* Instructions for customizing data visualizations to create informative and presentation-ready charts and graphs* Full-color, two-page tutorials on the more advanced features of Power BI, including app integrations and data access with DAXThe fastest, easiest way for visual learners to get a handle on Microsoft Power BI, Teach Yourself VISUALLY Power BI is a can't-miss resource, loaded with useful tips for newbies and experts alike.
Not with a Bug, But with a Sticker19,99 €*
A ROBUST AND ENGAGING ACCOUNT OF THE SINGLE GREATEST THREAT FACED BY AI AND ML SYSTEMSIn Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour – from inside secretive government organizations to academic workshops at ski chalets to Google’s cafeteria – recounting how major AI systems remain vulnerable to the exploits of bad actors of all stripes. Based on hundreds of interviews of academic researchers, policy makers, business leaders and national security experts, the authors compile the complex science of attacking AI systems with color and flourish and provide a front row seat to those who championed this change. Grounded in real world examples of previous attacks, you will learn how adversaries can upend the reliability of otherwise robust AI systems with straightforward exploits. The steeplechase to solve this problem has already begun: Nations and organizations are aware that securing AI systems brings forth an indomitable advantage: the prize is not just to keep AI systems safe but also the ability to disrupt the competition’s AI systems. An essential and eye-opening resource for machine learning and software engineers, policy makers and business leaders involved with artificial intelligence, and academics studying topics including cybersecurity and computer science, Not With A Bug, But With A Sticker is a warning—albeit an entertaining and engaging one—we should all heed. How we secure our AI systems will define the next decade. The stakes have never been higher, and public attention and debate on the issue has never been scarcer. The authors are donating the proceeds from this book to two charities: Black in AI and Bountiful Children’s Foundation.
Blue Fox28,99 €*
PROVIDES READERS WITH A SOLID FOUNDATION IN ARM ASSEMBLY INTERNALS AND REVERSE-ENGINEERING FUNDAMENTALS AS THE BASIS FOR ANALYZING AND SECURING BILLIONS OF ARM DEVICESFinding and mitigating security vulnerabilities in Arm devices is the next critical internet security frontier—Arm processors are already in use by more than 90% of all mobile devices, billions of Internet of Things (IoT) devices, and a growing number of current laptops from companies including Microsoft, Lenovo, and Apple. Written by a leading expert on Arm security, Blue Fox: Arm Assembly Internals and Reverse Engineering introduces readers to modern Armv8-A instruction sets and the process of reverse-engineering Arm binaries for security research and defensive purposes. Divided into two sections, the book first provides an overview of the ELF file format and OS internals, followed by Arm architecture fundamentals, and a deep-dive into the A32 and A64 instruction sets. Section Two delves into the process of reverse-engineering itself: setting up an Arm environment, an introduction to static and dynamic analysis tools, and the process of extracting and emulating firmware for analysis. The last chapter provides the reader a glimpse into macOS malware analysis of binaries compiled for the Arm-based M1 SoC. Throughout the book, the reader is given an extensive understanding of Arm instructions and control-flow patterns essential for reverse engineering software compiled for the Arm architecture. Providing an in-depth introduction into reverse-engineering for engineers and security researchers alike, this book:* Offers an introduction to the Arm architecture, covering both AArch32 and AArch64 instruction set states, as well as ELF file format internals* Presents in-depth information on Arm assembly internals for reverse engineers analyzing malware and auditing software for security vulnerabilities, as well as for developers seeking detailed knowledge of the Arm assembly language* Covers the A32/T32 and A64 instruction sets supported by the Armv8-A architecture with a detailed overview of the most common instructions and control flow patterns* Introduces known reverse engineering tools used for static and dynamic binary analysis * Describes the process of disassembling and debugging Arm binaries on Linux, and using common disassembly and debugging tools Blue Fox: Arm Assembly Internals and Reverse Engineering is a vital resource for security researchers and reverse engineers who analyze software applications for Arm-based devices at the assembly level. MARIA MARKSTEDTER is the CEO and founder of Azeria Labs, offering high-quality training courses on Arm reverse engineering and exploitation. She has an extensive educational background, holding a Bachelor’s degree in Corporate Security and a Master’s degree in Enterprise Security, and has collaborated with Arm on exploit mitigation research. Maria’s outstanding contributions to the cybersecurity industry have earned her a place on Forbes’ “30 under 30” list for technology in Europe (2018) and the title of Forbes Person of the Year in Cybersecurity in 2020.
Handbuch IT-Management69,99 €*
- Lernen Sie die Methoden und Techniken für ein erfolgreiches IT-Management kennen- Aktuelles Wissen und Praxis-Tipps für Ihren Berufsalltag- Profiwissen für erfahrene und werdende IT-Manager (IT-Leiter, CIO, CTO, CDO, Projektleiter, Enterprise IT-Architekten, Data Manager, Cloud-Manager, Technologiemanager)- Von 18 Expert:innen aus Unternehmenspraxis, Consulting-Firmen und Hochschulen- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesIT-Management ist einer der wichtigsten Erfolgsfaktoren für alle Unternehmen und Dienstleistungsorganisationen. Deshalb nehmen IT-Verantwortliche eine zunehmend zentrale Rolle ein. Gestützt durch leistungsfähige Technologien wie Big Data und Data Analytics, Cloud Computing, durch mobile Endgeräte und neue Formen der Vernetzung (IoT u. a.) sowie weitere digitale Innovationen (KI, AR u. a.) werden völlig neue Geschäftsmodelle, Produkte und Prozesse entwickelt und erfolgreich realisiert bzw. implementiert.Damit Sie als IT-Manager für die Praxis gerüstet sind, bietet Ihnen dieses Handbuch umfassendes und unverzichtbares Wissen zu allen wichtigen Handlungsfeldern der IT sowie Unterstützung für die erfolgreiche Nutzung bewährter Methoden und Instrumente.Diese Auflage wurde umfassend aktualisiert und durch innovative Managementthemen, wie z.B. IT-Sourcing, IT-Relationship-Management oder Digitale Transformation erweitert.Mit Beiträgen von Robert Bergmann, Matthias Farwick, Vanessa Greger, Torsten Groll, Norbert Gronau, Christiana Klingenberg, Michael Klotz, Dietmar Kopperger, Helmut Krcmar, Jörg Kunsmann, Klaus Schmidt, Tobias Schmidt, Ernst Tiemeyer, Thomas Trojer, Kristin Weber, Anette Weisbecker, Walter Wintersteiger und Helmut ZsifkovitsAUS DEM INHALT //- Strategisches IT-Management- Digitalisierung managen- Enterprise Architecture Management- Daten- und Informationsmanagement- Geschäftsprozessorientierte Softwaresysteme- Cloud Computing- IT-Sourcing- IT-Anforderungsmanagement- IT-System- und IT-Servicemanagement- Digital Workplace Management- IT-Organisation- Personalmanagement im IT-Bereich- IT-Controlling- Lizenzmanagement in der IT- Enterprise IT-Governance- Information Security Management- IT-Compliance- Partnermanagement in der IT- Enterprise IT-Projektmanagement- Digitale Transformation Dipl.-Hdl. Ernst Tiemeyer ist seit mehr als 25 Jahren in leitenden Projektfunktionen sowie als IT-Consultant und im Bildungsbereich bzw. Managementtraining tätig. Schwerpunktmäßig befasst er sich in der Praxis mit Projektmanagement, strategischem IT-Management, Enterprise IT-Architekturmanagement, Enterprise IT-Governance, IT-Controlling sowie BPM. Seine Lehrtätigkeit führt er unter anderem an der EU-FH in Hamburg, am FH Joanneum Kapfenberg/Graz sowie an der FOM (Hochschule für Berufstätige) in verschiedenen Bachelor- und Masterstudiengängen aus.
Requirements Engineering für die agile Softwareentwicklung39,90 €*
Das Handbuch für agile Requirements Engineers- Umfassend und anwendungsbezogen- Ein Buch aus der Praxis für die Praxis- Mit durchgängigem Projektbeispiel und wertvollen Hinweisen für pragmatische LösungenDieses Buch gibt einen praxisorientierten Überblick über die am weitesten verbreiteten Techniken für die Anforderungsspezifikation und das Requirements Management in agilen Projekten. Es beschreibt sowohl sinnvolle Anwendungsmöglichkeiten als auch Fallstricke der einzelnen Techniken.Behandelt werden im Einzelnen:- Grundlagen und die fünf Grundprinzipien des Requirements Engineering in der agilen Softwareentwicklung- Requirements-Ermittlung und -Dokumentation- Requirements-Validierung und -Abstimmung- Qualität im Requirements Engineering- Requirements Management- Organisatorische Aspekte- Rollen im Requirements EngineeringDarüber hinaus werden rechtliche und wirtschaftliche Themen erläutert sowie auf die Herausforderungen in größeren Organisationen eingegangen.Das Buch ist Hilfestellung und Nachschlagewerk, um in der täglichen Praxis der agilen Projekte Requirements Engineering und Requirements Management professionell und mit nachhaltigem Nutzen umzusetzen.Die 3. Auflage wurde vollständig überarbeitet und berücksichtigt den Lehrplan "RE@Agile Primer" des International Requirements Engineering Board (IREB) sowie die neue Fassung des Scrum Guide von November 2020.Johannes Bergsmann hat technische Informatik studiert und arbeitete ca. 11 Jahre als Softwareentwickler, Projektleiter, Technischer Leiter, Architekt, Produktmanager und Berater in einem internationalen Systemhaus und als selbstständiger Unternehmer. Im März 2003 gründete er "Software Quality Lab" und begleitet seither als Berater und Trainer viele Unternehmen im Bereich Requirements Engineering und Prozessgestaltung. Johannes Bergsmann ist zertifizierter Scrum Master, Sachverständiger für Informatik bei Gerichten, als Lehrbeauftragter an Fachhochschulen im Bereich Softwarequalitätsmanagement tätig, ist Autor vieler Fachartikel und hält Fachvorträge bei verschiedenen Veranstaltungen und Konferenzen. Unter Mitwirkung von Markus Unterauer: Markus Unterauer hat Wirtschaftsinformatik studiert. In seiner Berufspraxis war er in vielen Bereichen der Softwareentwicklung wie Architektur, Entwurf, Entwicklung, Testen, Testautomatisierung bis zu Deployment tätig. Er lernte dabei sowohl klassische als auch agile Projekte und Methoden intensiv kennen. Seit 2012 arbeitet Markus Unterauer bei Software Quality Lab als Berater und Trainer. Er ist zertifizierter Scrum Master und hat sich auf die Bereiche Softwareprozesse und Anforderungsmanagement spezialisiert. Markus Unterauer ist auch als Vortragender in diesen Themenbereichen immer wieder auf Konferenzen tätig.
Machine Learning for Business Analytics107,99 €*
MACHINE LEARNING —ALSO KNOWN AS DATA MINING OR PREDICTIVE ANALYTICS— IS A FUNDAMENTAL PART OF DATA SCIENCE. IT IS USED BY ORGANIZATIONS IN A WIDE VARIETY OF ARENAS TO TURN RAW DATA INTO ACTIONABLE INFORMATION.Machine Learning for Business Analytics: Concepts, Techniques, and Applications in Analytic Solver Data Mining provides a comprehensive introduction and an overview of this methodology. The fourth edition of this best-selling textbook covers both statistical and machine learning algorithms for prediction, classification, visualization, dimension reduction, rule mining, recommendations, clustering, text mining, experimentation, time series forecasting and network analytics. Along with hands-on exercises and real-life case studies, it also discusses managerial and ethical issues for responsible use of machine learning techniques.This fourth edition of Machine Learning for Business Analytics also includes:* An expanded chapter focused on discussion of deep learning techniques* A new chapter on experimental feedback techniques including A/B testing, uplift modeling, and reinforcement learning* A new chapter on responsible data science* Updates and new material based on feedback from instructors teaching MBA, Masters in Business Analytics and related programs, undergraduate, diploma and executive courses, and from their students* A full chapter devoted to relevant case studies with more than a dozen cases demonstrating applications for the machine learning techniques* End-of-chapter exercises that help readers gauge and expand their comprehension and competency of the material presented* A companion website with more than two dozen data sets, and instructor materials including exercise solutions, slides, and case solutionsThis textbook is an ideal resource for upper-level undergraduate and graduate level courses in data science, predictive analytics, and business analytics. It is also an excellent reference for analysts, researchers, and data science practitioners working with quantitative data in management, finance, marketing, operations management, information systems, computer science, and information technology.GALIT SHMUELI, PHD, is Distinguished Professor and Institute Director at National Tsing Hua University’s Institute of Service Science. She has designed and instructed business analytics courses since 2004 at University of Maryland, Statistics.com, The Indian School of Business, and National Tsing Hua University, Taiwan. PETER C. BRUCE, is Founder of the Institute for Statistics Education at Statistics.com, and Chief Learning Officer at Elder Research, Inc. KUBER R. DEOKAR, is the Data Science Team Lead at UpThink Experts, India. He is also a faculty member at Statistics.com. NITIN R. PATEL, PHD, is cofounder and lead researcher at Cytel Inc. He was also a co-founder of Tata Consultancy Services. A Fellow of the American Statistical Association, Dr. Patel has served as a visiting professor at the Massachusetts Institute of Technology and at Harvard University. He is a Fellow of the Computer Society of India and was a professor at the Indian Institute of Management, Ahmedabad, for 15 years. Foreword xixPreface to the Fourth Edition xxiAcknowledgments xxvPART I PRELIMINARIESCHAPTER 1 Introduction 3CHAPTER 2 Overview of the Machine Learning Process 15PART II DATA EXPLORATION AND DIMENSION REDUCTIONCHAPTER 3 Data Visualization 59CHAPTER 4 Dimension Reduction 91PART III PERFORMANCE EVALUATIONCHAPTER 5 Evaluating Predictive Performance 115PART IV PREDICTION AND CLASSIFICATION METHODSCHAPTER 6 Multiple Linear Regression 151CHAPTER 7 k-Nearest-Neighbors (k-NN) 169CHAPTER 8 The Naive Bayes Classifier 181CHAPTER 9 Classification and Regression Trees 197CHAPTER 10 Logistic Regression 229CHAPTER 11 Neural Nets 257CHAPTER 12 Discriminant Analysis 283CHAPTER 13 Generating, Comparing, and Combining Multiple Models 303PART V INTERVENTION AND USER FEEDBACKCHAPTER 14 Experiments, Uplift Modeling, and Reinforcement Learning 319PART VI MINING RELATIONSHIPS AMONG RECORDSCHAPTER 15 Association Rules and Collaborative Filtering 341CHAPTER 16 Cluster Analysis 369PART VII FORECASTING TIME SERIESCHAPTER 17 Handling Time Series 401CHAPTER 18 Regression-Based Forecasting 415CHAPTER 19 Smoothing Methods 445PART VIII DATA ANALYTICSCHAPTER 20 Social Network Analytics 467CHAPTER 21 Text Mining 487CHAPTER 22 Responsible Data Science 507PART IX CASESCHAPTER 23 Cases 537References 575Data Files Used in the Book 577Index 579