Allgemein
Persönlichkeitsschutz in Social Networks
Dieses Buch befasst sich mit dem Schutz der Persönlichkeitsrechte der Nutzer von Social Networks. Es werden die Vorgaben der Datenschutz-Grundverordnung dezidiert auf Social Networks angewendet. Diese haben auf unionsrechtlicher Ebene mit dem Wirksamwerden der Datenschutz-Grundverordnung wichtige Veränderungen erfahren. Besondere Beachtung findet dabei die Verteilung der Verantwortlichkeit auf Anbieter und Nutzer, die durch die komplexen Datenverarbeitungsvorgänge in Social Networks in der Praxis sehr vielschichtig sind. Außerdem werden mithilfe der interdisziplinären Methode KORA aus verfassungsrechtlichen Vorgaben und Anforderungen rechtliche Kriterien identifiziert und organisatorische und technische Gestaltungsziele entwickelt, um eine rechtsverträgliche Systemgestaltung von Social Networks anzustoßen.MAXI NEBEL ist wissenschaftliche Mitarbeiterin in der Projektgruppe verfassungsverträgliche Technikgestaltung (provet) unter der Leitung von Prof. Dr. Alexander Roßnagel am Wissenschaftlichen Zentrum für Informationstechnik-Gestaltung (ITeG) an der Universität Kassel. Sie ist Mitglied im Forum Privatheit.MAXI NEBEL ist wissenschaftliche Mitarbeiterin in der Projektgruppe verfassungsverträgliche Technikgestaltung (provet) unter der Leitung von Prof. Dr. Alexander Roßnagel am Wissenschaftlichen Zentrum für Informationstechnik-Gestaltung (ITeG) an der Universität Kassel. Sie ist Mitglied im Forum Privatheit. Einleitung.- Untersuchungsgegenstand Social Networks.- Individuelle und gesellschaftliche Auswirkungen der Nutzung von Social Networks.- Privatsphäre und Privatheit.- Verfassungsrechtliche Vorgaben.- Unionsrechtliche Vorgaben.- Regelungen der Datenschutz-Grundverordnung.- Rechtsverträgliche Systemgestaltung.- Zusammenfassung und Ausblick
Empower Decision Makers with SAP Analytics Cloud
Discover the capabilities and features of SAP Analytics Cloud to draw actionable insights from a variety of data, as well as the functionality that enables you to meet typical business challenges. With this book, you will work with SAC and enable key decision makers within your enterprise to deliver crucial business decisions driven by data and key performance indicators. Along the way you’ll see how SAP has built a strong repertoire of analytics products and how SAC helps you analyze data to derive better business solutions.This book begins by covering the current trends in analytics and how SAP is re-shaping its solutions. Next, you will learn to analyze a typical business scenario and map expectations to the analytics solution including delivery via a single platform. Further, you will see how SAC as a solution meets each of the user expectations, starting with creation of a platform for sourcing data from multiple sources, enabling self-service for a spectrum of business roles, across time zones and devices. There’s a chapter on advanced capabilities of predictive analytics and custom analytical applications. Later there are chapters explaining the security aspects and their technical features before concluding with a chapter on SAP’s roadmap for SAC.Empower Decision Makers with SAP Analytics Cloud takes a unique approach of facilitating learning SAP Analytics Cloud by resolving the typical business challenges of an enterprise. These business expectations are mapped to specific features and capabilities of SAC, while covering its technical architecture block by block.WHAT YOU WILL LEARN* Work with the features and capabilities of SAP Analytics Cloud* Analyze the requirements of a modern decision-support systemUse the features of SAC that make it a single platform for decision support in a modern enterprise. * See how SAC provides a secure and scalable platform hosted on the cloud WHO THIS BOOK IS FOREnterprise architects, SAP BI analytic solution architects, and developers.VINAYAK is a seasoned analytics consultant with experience across multiple business domains and roles. As senior architect at Tata Consultancy Services Ltd., Vinayak has been engaged in technology consulting and architecting solutions across the SAP analytics portfolio for Fortune 500 firms. He has been instrumental in building, mentoring, and enabling teams delivering complex digital transformations for global clients. Passionate about technology, Vinayak regularly publishes articles and technical papers with well-known publications. He is also an active contributor to the SAP community and regularly publishes blogs on technologies in the SAP analytics portfolio.SHREEKANT is a senior management professional with expertise on leading and managing business functions and technology consulting. He established and developed business units for Fortune 500 firms, namely the public service business for the world’s leading professional services company, launched the Shell Gas business in India for a JV of Shell. Shreekant grew the SAP technology business for Tata Consultancy Services Ltd. by winning strategic clients in new and existing geographies, creating innovative service offerings. He played a critical part in multiple transformation programs for Bharat Petroleum Corporation Ltd. He has mentored authors, published best seller books and white papers on technology, and has patents on technology and service delivery. He specializes in realizing concepts to their value-creation stage, innovation and transformation, and building organizations.CHAPTER 1: CURRENT TRENDS IN ANALYTICS AND SAP’S ROAD MAPChapter Goal: To understand the latest trends in analytics and how SAP is adapting to these trends. To understand SAP’s digital core and how analytics forms a pillar of the methodology.CHAPTER 2: BUSINESS SCENARIO FOR ANALYTICS LANDSCAPE TRANSFORMATIONChapter Goal: To understand a real-world scenario of an enterprise which is planning to upgrade its traditional business intelligence to a modern analytics landscape.SUB TOPICS:Customer introductionCustomer’s current landscape and pain pointsCustomer’s expectation from analytics landscapeExpected landscapeCHAPTER 3: SAC FOR ENABLING “SINGLE VERSION OF TRUTH”Chapter Goal: Understand how SAP Analytics Cloud enables a single platform for multiple data sources to come together for analysis.SUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 4: LEVERAGE SAC TO CREATE “ALL-IN-ONE” ANALYTICS PLATFORMChapter Goal: SAC enables analytics for multiple business roles in an organization with options for 360 degree dashboards to self service data analysis to planning. This chapter explores these capabilities in detail.SUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 5: EXPLOIT “AUGMENTED ANALYTICS” CAPABILITY OF SACChapter Goal: SAC enables self-service with augmented analytics like search to insight and multiple smart features. This chapter explores each of these concepts in detail along with benefits of each feature.SUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 6: DEVELOP SAC FOR “ANYTIME AVAILABLE” PLATFORMChapter Goal: One of the advantages of cloud application is the accessibility in addition to the freedom from maintaining costly infrastructure. This chapter explores how SAC is available across time zones and across devices.SUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 7: CAPITALIZE ON “PREDICTIVE ANALYTICS” CAPABILITY THROUGH SACChapter Goal: SAC includes built in capabilities to create predictive models and incorporate predictive analytics in data analysis and dashboards. This chapter explores this capability in detail.SUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 8: CRAFT SPECIAL BUSINESS REQUIREMENTS ON SAC VIA CUSTOM APPLICATION DESIGNChapter Goal: One of the recently added capability is to build custom applications using a scripting language very similar to JavaScript. This enables developers to create custom apps and make them available for the business. This capability is the focus of this chapterSUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 9: DESIGN A SECURE PLATFORM USING SACChapter Goal: Especially with cloud applications, security is always a major concern in terms of data protection and authenticated access. This chapter explores SAC’s security capabilities in terms of data and application access.SUB TOPICS:Analysis of customer requirementAlignment to specific SAP Analytics Cloud capabilityStep by step process to implement the capabilityCustomer benefits and future directionCHAPTER 10: PRODUCT ROAD MAP & FUTURE DIRECTION FOR SACChapter Goal: This chapter explores the future road map of SAC and how SAP’s direction for the toolAppendix AAppendix B
Immersive Office 365
Bring mixed reality into your office workplace by building immersive experiences using data and content from your Office 365 platform. Imagine being able to sit at your desk and surround yourself with a 3D chart showing your work relationships as mined from your relationships with others based on how you collaborate together. This book shows you how to access your Office 365 data using the Microsoft Graph API, and then helps you present that data in a 3D modeling visualization using the Microsoft HoloLens 2 as a mixed reality device.This book covers the growing number of tools and techniques you can use to access and visualize data on a Microsoft HoloLens 2 device. Foremost is the Graph API, giving access to the full range of data in Office 365. Also covered are Unity and Visual Studio, the development environments from which you can create mixed reality applications for Microsoft HoloLens 2. You will learn how to load data from and save data to your Office 365 platform based on several interesting use cases. You will be able to extend your digital workplace into a 3D space powered by Microsoft HoloLens 2.Whether you know Office 365 and want to move toward mixed reality, or whether you know the Microsoft HoloLens 2 and want to build functionality around Office 365 data, this book helps you step up and accomplish your goal of bridging between mixed reality and Office 365.WHAT YOU WILL LEARN* Create immersive experiences using Microsoft HoloLens 2 and Office 365* Access Office 365 data programmatically using the Microsoft Graph API* Control your immersive experiences using natural gestures and eye tracking* Understand and correctly use different visualization models* Implement design patterns to write better code in Unity* Know how to access services using web requests via DLLsWHO THIS BOOK IS FORDevelopers who want to expand their knowledge of the Office 365 platform into the world of mixed reality by creating immersive experiences and 3D visualizations using the Microsoft HoloLens 2 and similar devices, and mixed reality developers who want to extend their repertoire toward serving everyday business needs of workers in corporate office environmentsALEXANDER MEIJERS is a professional who inspires, motivates, and supports others while helping them to innovate. His goal is to help organizations achieve more by creating, improving, and working smarter as well as shortening business processes and improving the environment for employees. As a Global XR Tech lead and Microsoft Windows MVP for Mixed Reality, and working for Avanade, Alexander understands business issues and translates them into logical solutions using technology. He supports companies in applying emerging experiences during their journey to transition to digital. He works with technologies such as virtual, augmented, and mixed reality in combination with cloud services such as the Mixed Reality services and Azure Digital Twins from the Microsoft Azure platform, Office 365, and Dynamics 365. Alexander's primary focus is in manufacturing, utilities, and the engineering and construction sector. However, he certainly does not stay away from other sectors. He engages in speaking, blogging, and is an organizer of local and global events such as the Mixed Reality User Group in the Netherlands and globally with the Global XR Talks and Global XR Bootcamp that are part of the GlobalXR.Community.1. Immersive Experiences2. Controlling Data3. Environment and Configuration4. Unity5. Unity Advanced6. HoloLens7. HoloLens Development8. Visualization9. Building A Social App10. Model Implementation11. Interact with the Model
The Complete ASP.NET Core 3 API Tutorial
Use this ASP.NET Core API tutorial and straightforward step-by-step guide to build, test, and deploy an ASP.NET Core API to Azure. It will help you code confidently and efficiently, and provides just what you need for context.The book starts with detailing how to set up your development environment, and then introduces a variety of tools and technologies to build, test, and deploy your API. It covers tools such as .NET Core SDK, (Version 3.1), Visual Studio Code, Git, xUnit, Docker, PostgreSQL, Postman, Azure DevOps, Azure, AutoMapper, and many more.Practical guidance is provided so you can achieve a tangible and valuable outcome, and you also are given a dose of theory on REST (Representational State Transfer), JSON, (JavaScript Object Notation), DTOs (Data Transfer Objects), and the MVC (Model View Controller) architectural pattern.WHAT YOU WILL LEARN* Build an ASP.NET Core API using C#, test it, and deploy it to Azure * Understand concepts on Entity Framework Core* Gain hard-earned secrets, shortcuts, and gotchas throughout the “build along” * Get comfortable with ASP NET Core Environments* Be introduced to unit testing, CI/CD pipelines, bearer authentication, and JSON Web Tokens (JWT)WHO THIS BOOK IS FORDevelopers using the Microsoft stack. Some basic understanding of .NET Core is assumed.LES JACKSON, originally from Glasgow, Scotland, lives and works in Melbourne, Australia. He has been an IT professional since completing his computer science degree. He holds several industry accreditations, including a Microsoft Certified Solution Developer (MCSD) certification, His mantra is that there is no substitute for experience and passion. In his down time, he enjoys producing content for his popular tutorials on YouTube.Chapter 1: IntroductionChapter 2 : Setting Up Your Development EnvironmentChapter 3: Overview of Our APIChapter 4: Scaffold Our API SolutionChapter 5: The "C" in MVCChapter 6: Our Model & RepositoryChapter 7: Persisting Our DataChapter 8: Environment Variables & User SecretsChapter 9: Data Transfer ObjectsChapter 10: Completing Our API EndpointsChapter 11: Unit Testing Our APIChapter 12: The CI/CD PipelineChapter 13: Deploying to Azure
Roguelike Development with JavaScript
Go on an adventure and build a roguelike from scratch using JavaScript. With the help of the battle-tested Phaser library, you’ll go through all the steps to build a small, fun, playable web roguelite game. The author will guide you on how to add further features to the game such as populating the game with enemies, adding treasures, and so on. You will acquire technical knowledge about procedural generation and tile-based mapping as well as learn game design skills such as what makes dungeons fun and how to evoke an emotion in your game.Roguelikes are very popular with indie developers because of their focus on gameplay over graphics. You’ll see why they appeal to game designers on a budget and discover that they serve as a good platform to experiment with novel ideas and designs. Along the way, you’ll cover the increasingly popular roguelite genre that provides a hyper casual form of the genre that is approachable and often mobile.After reading this book, you’ll be ready to create your own roguelikes, to dive deep into procedural generation, and also to bring some of the techniques shown here into other genres and game projects.WHAT YOU WILL LEARN* Make use of procedural generation for dungeons, mazes, monsters, and treasure* Pick up skills to use Phaser to build games* Implement turn-based mechanics* Use tile-based graphicsWHO THIS BOOK IS FORGame developers who want to build something fun and who have at least some prior JavaScript programming experience. Andre Alves Garzia is a developer who loves web and game development. In recent years, he has published books about building games for Firefox OS and managed a web literacy program in vulnerable neighborhoods of Rio de Janeiro. He is a firm believer in empowerment through technological experimentation and thinks game development should be on everyone’s bucket list. He lives in London and wonders if the UK procedural generator is biased toward raining. Chapter 1: Before We BeginCHAPTER GOAL: Introduces the reader to roguelike and the technologies used.SUB -TOPICS· Roguelike history· Why develop roguelikes· Why use web technologies· Why PhaserChapter 2: Introduction to PhaserCHAPTER GOAL: Provide a quick introduction to PhaserSUB - TOPICS· Displaying a scene· Game loops· Controlling a player character· Tile-based maps without procedural generationChapter 3: Enemies and PermadeathCHAPTER GOAL: Populating the game from the previous chapter with enemies and providing the initial game mechanicsSUB - TOPICS:· How to build enemies· Turn-based action· Enemy AI· CombatChapter 4: Treasure and UpgradesCHAPTER GOAL: Adding rewards for the player and how to provide gameplay progressionSUB - TOPICS:· Multiple levels in a dungeon· Adding treasure· Adding upgrades· Adding monster loot· Inventory screenChapter 5: Character ClassesCHAPTER GOAL: Create multiple character classes with different abilities and double check how that affects gameplaySUB - TOPICS:· Character classes· Wizard· Cleric· Elf· NecromancerChapter 6: Procedurally Generated DungeonsCHAPTER GOAL: Introduces you to procedural generation. Replace the current maps with procedurally generated dungeonsSUB - TOPICS:· Procedural generation introduction· Generating dungeons· Bias· Different types of dungeonsChapter 7: Procedurally Generated Monsters and TreasureCHAPTER GOAL: Use procedural generation to customize the monsters and treasures according to the dungeon layoutSUB - TOPICS:· Custom monsters· Custom treasure· Changing parameters depending on dungeon layoutChapter 8: The Power of StorytellingCHAPTER GOAL: Tie the features we currently have in the game together in a cohesive experience through the power of storytellingSUB - TOPICS:· Storytelling concepts· Non-player characters· Adding storytelling to a dungeon crawler· PacingChapter 9: Finished GameCHAPTER GOAL: Add the final touches to have a publishable gameSUB - TOPICS:· Intro screen· Winning conditions· Multiple objectives· Publishing to the webChapter 10: Extra Chapter - MonetizationCHAPTER GOAL: Briefly explore potential routes for monetizing the gameSUB - TOPICS:· Selling the game on your site· Itch.io· Steam· Web monetization APIs
Design Patterns in C#
Get hands-on experience with each Gang of Four (GoF) design pattern using C#. For each of the patterns, you will see at least one real-world scenario, a coding example, and a complete implementation including output. In addition to GoF patterns, you will learn additional design patterns which are common and equally important.In this second edition, you will go through the design patterns and their implementation in Visual Studio 2019 and C# 8. Common patterns in asynchronous programming are covered, including the TAP pattern and APM pattern. You will learn via easy-to-follow examples and understand the concepts in depth. With these updated patterns, you will have a collection of programs to port over to your own projects.The book begins with the 23 GoF design patterns, and then moves onto alternative design patterns, including the Simple Factory, Null Object, and MVC patterns plus various patterns in asynchronous programming. The book concludes with a discussion of the criticisms of design patterns and chapters on anti-patterns.Each chapter includes a Q&A session that clears up any doubts and covers the pros and cons of each pattern. FAQs will help you consolidate your knowledge.WHAT YOU WILL LEARN* Work with each of the design patterns* Implement the design patterns in real-world applications* Select an alternative to these patterns by comparing their pros and cons* Use Visual Studio Community Edition 2019 to write code and generate outputWHO THIS BOOK IS FORSoftware developers, testers, and architectsVaskaran Sarcar obtained his Master of Engineering in software engineering from Jadavpur University, Kolkata (India) and an MCA from Vidyasagar University, Midnapore (India). He was a National Gate Scholar (2007-2009) and has more than 12 years of experience in Education and the IT industry. Vaskaran devoted his early years (2005-2007) in teaching at various engineering colleges, and later he joined HP India PPS R&D Hub Bangalore .He worked there until August, 2019. At the time of his retirement from the IT industry, he was a Senior Software Engineer and Team Lead at HP. To follow his dream and passion, Vaskaran is now an independent full-time author. Other books by him include: • Getting Started with Advanced C# (Apress,2020) • Interactive Object-Oriented Programming in Java Second Edition (Apress,2019) • Java Design Patterns Second Edition (Apress,2019) • Design Patterns in C# (Apress,2018) • Interactive C# (Apress,2017) • Interactive Object-Oriented Programming in Java(Apress,2016) • Java Design Patterns(Apress,2016) • C# Basics: Test Your Skills(Createspace,2015) • Operating System: Computer Science Interview Series(Createspace,2014) Part-I: Gang of Four Design Patterns 1.A: Creational Patterns Chapter 1: Singleton PatternCHAPTER GOAL: To discuss about the Singleton Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 2: Prototype PatternCHAPTER GOAL: To discuss about the Prototype Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 3: Builder PatternCHAPTER GOAL: To discuss about the Builder Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 4: Factory Method PatternCHAPTER GOAL: To discuss about the Factory Method Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 5: Abstract Factory PatternCHAPTER GOAL: To discuss about the Abstract Factory Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)1.B: Structural Patterns Chapter 6: Proxy PatternCHAPTER GOAL: To discuss about the Proxy Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 7: Decorator PatternCHAPTER GOAL: To discuss about the Decorator Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 8: Adapter PatternCHAPTER GOAL: To discuss about the Adapter Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 9: Facade PatternCHAPTER GOAL: To discuss about the Facade Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 10: Flyweight PatternCHAPTER GOAL: To discuss about the Flyweight Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 11: Composite PatternCHAPTER GOAL: To discuss about the Composite Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)CHAPTER 12: BRIDGE PATTERNCHAPTER GOAL: To discuss about the Bridge Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)1.C:Behavioral Patterns Chapter 13: Visitor PatternCHAPTER GOAL: To discuss about the Visitor Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)CHAPTER 14: OBSERVER PATTERNCHAPTER GOAL: To discuss about the Observer Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 15: Strategy PatternCHAPTER GOAL: To discuss about the Strategy Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 16: Template Method PatternCHAPTER GOAL: To discuss about the Template Method Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 17: Command PatternCHAPTER GOAL: To discuss about the Command Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)CHAPTER 18: ITERATOR PATTERNCHAPTER GOAL: To discuss about the Iterator Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)CHAPTER 19: MEMENTO PATTERNCHAPTER GOAL: To discuss about the Memento Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES 8-10+(Rough estimate)Chapter 20: State PatternCHAPTER GOAL: To discuss about the State Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 21: Mediator PatternCHAPTER GOAL: To discuss about the Mediator Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 22: Chain of Responsibility PatternCHAPTER GOAL: To discuss about the Chain of Responsibility Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 23: Interpreter PatternCHAPTER GOAL: To discuss about the Interpreter Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Part-II:Additional Design PatternsCHAPTER 24: SIMPLE FACTORY PATTERNCHAPTER GOAL: To discuss about the Simple Factory Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 25: Null Object PatternCHAPTER GOAL: To discuss about the Null Object Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Chapter 26: MVC PatternCHAPTER GOAL: To discuss about the MVC Pattern with the GoF Definition and the core concept behind that with a real life example and a computer world example. The chapter ends with a concrete implementation and its corresponding output. Author has used visual studio community 2017 for this purpose. This is free and latest in this field.NO OF PAGES: 8-10+ (Rough estimate)Part-III: Final talks on Design PatternsChapter 27: Criticism to Design PatternsCHAPTER GOAL: To discuss about the criticism to design patternsNO OF PAGES: 5 (Rough estimate)CHAPTER 28: AVOID THE TRAPS OF ANTI-PATTERNSCHAPTER GOAL: To discuss about the anti-patternsNO OF PAGES: 5 (Rough estimate)CHAPTER 29: SEAL THE LEAKS IN YOUR APPLICATIONCHAPTER GOAL: To discuss about memory leaks and garbage collections to build a steady and healthy system.NO OF PAGES: 15 (Rough estimate)CHAPTER 30: ASYNCHRONOUS PROGRAMMINGCHAPTER GOAL: To discuss new patterns in Task-based Asynchronous Pattern and IAsync PatternCHAPTER 31: FAQCHAPTER GOAL: This chapter will consist of the frequently asked questions to help readers for a quick revision. This chapter will also clear the doubts that may arise among similar patterns.NO OF PAGES: 7-10+ (Rough estimate)
Practical JAMstack
Learn what JAMstack is all about, what those three big letters in the front mean and why it’s so beneficial. This book shows you how to create sites and apps on the JAMstack using GatsbyJS, a tool made specifically for generating them. As part of that, you’ll learn about React, one of the hottest front-end development tools out there today.You will build three separate projects, starting with a relatively simple site to get your feet wet, then a more robust and dynamic application to see more advanced topics like API usage and data storage. Finally, you’ll build a game on the JAMstack to get a whole different perspective on how all the pieces can fit together.JAMstack, a modern take on best practices, is taking the web development world by storm and allowing developers to create web site and apps that are blazingly fast and highly secure. In many ways JAMstack is a throwback to web development of yesteryear, all while providing a simpler development experience that is streamlined by many years of best practices being brought to bear.WHAT YOU'LL LEARN* Review the principles of JAMstack: Javascript, APIs and Markup* Use React to build a front-end* Set up a GitHub account and hosting using GitHub Pages* Host in Netlify (the creators of JAMstack!)* Understand Netlify functions and FaunaDB for persistent data storage* Explore GraphQL usage for querying data* Work with the Phaser game libraryWHO THIS BOOK IS FORWeb developers with some HTML, CSS and JavaScript experience, who want to apply best practices to build web sites that have no back-end server infrastructure while still providing dynamic content along with a streamlined development process. Architects who just want to learn JAMstack, even if they aren’t going to be hacking code all day.FRANK ZAMMETTI is the author of several Apress titles on a variety of web and mobile development topics. He has over 25 years of experience as a developer. You can find him on Twitter @fzammetti.1. What is JAMstack All About?2. Making a Simple Sandwich with JAMstack3. Bringing in The Big Guns: Gatsby4. A Deeper Dive into React5. Building JAMboard6. The 'A' in JAMstack7. JAMstack for Fun and...Well, Just FUN!8. Completing the Game
Malware Analysis and Detection Engineering
Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. MALWARE ANALYSIS AND DETECTION ENGINEERING is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you.The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation.The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment.WHAT YOU WILL LEARN* Analyze, dissect, reverse engineer, and classify malware* Effectively handle malware with custom packers and compilers* Unpack complex malware to locate vital malware components and decipher their intent* Use various static and dynamic malware analysis tools * Leverage the internals of various detection engineering tools to improve your workflow * Write Snort rules and learn to use them with Suricata IDS WHO THIS BOOK IS FORSecurity professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers"This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." PEDRAM AMINI, CTO INQUEST; FOUNDER OPENRCE.ORG AND ZERODAYINITIATIVEABHIJIT MOHANTA is an independent cybersecurity consultant and corporate trainer who has worked extensively in malware reverse engineering, vulnerability research, anti-virus engine development, anti-malware signature writing, and sandbox development. He has worked with the Symantec, McAfee, and Juniper Networks anti-malware labs. He holds several patents. He blogs regularly and has been a speaker at security conferences and workshops. His articles have been republished and quoted in a number of blogs and whitepapers, including eForensics magazine. He is also the author of the book Preventing Ransomware: Understand, Prevent, and Remediate Ransomware Attacks.ANOOP SALDANHA is one of the core authors of the Suricata Intrusion Detection and Prevention System, funded by the US Department of Homeland Security (DHS). He works as an independent security consultant and as a corporate security trainer. He designs and develops various detection technologies to secure both the host and the network, ranging from network security tools such as IDS/IPS to malware sandboxes, malware analysis tools, firewalls, and endpoints. He holds multiple patents in the field of security and speaks at security conferences and workshops. He has previously worked in threat research labs and detection engineering teams at RSA Security, Juniper Networks, Cyphort Cybersecurity, and various other cybersecurity startups.Part 1: Introduction1. Introduction2. Malware Analysis Lab SetupPart 2: OS and System Fundamentals3. File & File Formats4. Virtual Memory & Portable Executable(PE) File5. Windows InternalsPart 3: Malware Components & Analysis6. Malware Components & Distribution7. Malware Packers8. Persistence Mechanisms9. Network Communication10. Code Injection, Process Hollowing & API Hooking11. Stealth and RootkitsPart 3: Malware Analysis & Classification12. Static Analysis13. Dynamic Analysis14. Memory Forensics With Volatility15. Malware Payload Dissection & ClassificationPart 4: Malware Reverse Engineering16. Debuggers & Assembly Language17. Debugging Tricks for Unpacking Malwares18. Debugging Code Injection19. Armoring & Evasion - The Anti Techniques20. File-less, Macros & Other Malware TrendsPart 5: Detection Engineering21. Dev Analysis Lab Setup22. Anti-Virus Engines23. IDS/IPS & Snort/Suricata Rule Writing24. Malware Sandbox Internals25. Binary Instrumentation for Reversing Automation
Introducing Bootstrap 4
Get introduced to front-end CSS frameworks using the latest version of Bootstrap. Through easy-to-follow instructions and examples, this book will prepare you to create powerful web applications using Bootstrap 4.5.This updated second edition of Introducing Bootstrap 4 builds your understanding of the basic rules of CSS, the SASS pre-compiler, Bootstrap, and how they work together. After learning to set up CSS on both Linux (Ubuntu) and Windows, you will discover how you can make use of templates and themes written for Bootstrap, and how to refine the user interface. You will also find out how you can utilize and activate components. Numerous screenshots and code snippets are provided to help explain and reinforce the concepts discussed in the book.CSS frameworks give front-end developers the capability to create responsible and adaptive web designs that are able to accommodate the various variations of modern browsers. Start front-end development using Bootstrap 4.5 with this book.WHAT YOU WILL LEARN* Explore the Bootstrap features required to create web applications* Understand the basics of responsive web design using CSS 3* Install the SASS framework and understand how to use it* Master practical aspects of using Bootstrap in real-life scenariosWHO THIS BOOK IS FORThis book is intended for beginner-level web designers and developers interested in front-end development.JÖRG KRAUSE has been working with software and software technology since the early 1980s, beginning with a Sinclair and taking his first steps as a programmer in BASIC and assembly language. He studied Information Technology at Humboldt University, Berlin, but left early, in the 1990s, to start his own company. He has worked with Internet technology and software development since the early days when CompuServe and FidoNet dominated. In 1998, he worked on one of the first commercial e-commerce solutions, and wrote his first book in Germany. Due to its wide success, he started working as a freelance consultant and author in order to share his experience and knowledge with others. He has written several books with Apress, Hanser, Addison Wesley, and other major publishers along with several self-published books—a total of over sixty titles. He also publishes articles in magazines and speaks at major conferences in Germany. Currently, Jörg works as an independent consultant, software developer, and author in Berlin, Germany. The main focus is Web development (nowadays called full-stack), cloud native architectures, and Web security. In his occasional spare time, Jörg enjoys reading thrillers and science fiction novels, and going on a round of golf.
Verteiltes Arbeiten kompakt
Verteiltes Arbeiten und virtuelle Projekte schaffen Effizienz und Flexibilität. Nach Corona muss jeder damit umgehen können, egal ob im Unternehmen oder als Freiberufler. Doch es gibt eine Menge Risiken und Fallstricke.Mit diesem Buch optimieren Sie Verteiltes Arbeiten für Ihre Aufgaben. Sie erhalten praxisnahe und leicht umsetzbare Vorgehensweisen. Tipps, Tools und Soft Skills.Profitieren Sie von den leicht umsetzbaren Erfahrungen und Checklisten.CHRISTOF EBERT ist Geschäftsführer der Vector Consulting Services. Er unterstützt Kunden bei Produktstrategie, Entwicklung und agiler Transformation und sitzt in verschiedenen Aufsichtsgremien. Zuvor war er zwölf Jahre bei einem IT Konzern in weltweiten Führungsaufgaben. Seine Bücher zu Requirements Engineering und globalem Software Engineering dienen als Branchenreferenzen. Als Business Angel und Professor an der Universität Stuttgart und der Sorbonne in Paris fördert er innovative Unternehmen. Er ist in den Herausgeber-Komitees führender Zeitschriften wie IEEE Software.Herausforderung Verteiltes Arbeiten - Verteilte und Virtuelle Teams - Führung in verteilten Teams - Sourcing und Lieferanten - Länder und Kulturen - Recht und Risikomanagement - Tools und Infrastruktur - Wohin geht die Reise?
Machine Learning Concepts with Python and the Jupyter Notebook Environment
* Create, execute, modify, and share machine learning applications with Python and TensorFlow 2.0 in the Jupyter Notebook environment. This book breaks down any barriers to programming machine learning applications through the use of Jupyter Notebook instead of a text editor or a regular IDE.You’ll start by learning how to use Jupyter Notebooks to improve the way you program with Python. After getting a good grounding in working with Python in Jupyter Notebooks, you’ll dive into what TensorFlow is, how it helps machine learning enthusiasts, and how to tackle the challenges it presents. Along the way, sample programs created using Jupyter Notebooks allow you to apply concepts from earlier in the book.Those who are new to machine learning can dive in with these easy programs and develop basic skills. A glossary at the end of the book provides common machine learning and Python keywords and definitions to make learning even easier.WHAT YOU WILL LEARN* Program in Python and TensorFlow* Tackle basic machine learning obstacles* Develop in the Jupyter Notebooks environmentWHO THIS BOOK IS FORIdeal for Machine Learning and Deep Learning enthusiasts who are interested in programming with Python using Tensorflow 2.0 in the Jupyter Notebook Application. Some basic knowledge of Machine Learning concepts and Python Programming (using Python version 3) is helpful.NIKITA SILAPARASETTY is a Data Scientist and an AI/Deep Learning Enthusiast specializing in Statistics and Mathematics. She is presently the head of the Indian based ‘AI For Women’ initiative, which aims to empower women in the field of Artificial Intelligence. She has strong experience programming using Jupyter Notebooks and a deep enthusiasm for TensorFlow and the potentials of Machine Learning. Through the book, she hopes to help readers become better at Python Programming using Tensorflow 2.0 with the help of Jupyter Notebooks, which can benefit them immensely in their Machine Learning journey. MACHINE LEARNING CONCEPTS WITH PYTHON AND THE JUPYTER NOTEBOOK ENVIRONMENTChapter 1: An Overview of Artificial IntelligenceChapter 2: An Overview of Machine LearningChapter 3: Introduction to Deep LearningChapter 4: Machine Learning Versus Deep LearningChapter 5: Machine Learning with PythonChapter 6: Introduction to Jupyter NotebooksChapter 7: Python Programming on the Jupyter NotebookChapter 8: The Tensorflow Machine Learning LibraryChapter 9: Programming with Tensorflow 1.0Chapter 10: Introducing TensorFlow 2.0Chapter 11: Machine Learning Programming with TensorFlow 2.0
Getting Started with Oracle Cloud Free Tier
Use this comprehensive guide to get started with the Oracle Cloud Free Tier. Reading this book and creating your own application in the Free Tier is an excellent way to build familiarity with, and expertise in, Oracle Cloud Infrastructure. Even better is that the Free Tier by itself is capable enough and provides all the ingredients needed for you to create secure and robust, multi-tiered web applications of modest size.Examples in this book introduce the broad suite of Always Free options that are available from Oracle Cloud Infrastructure. You will learn how to provision autonomous databases and autonomous Linux compute nodes. And you will see how to use Terraform to manage infrastructure as code. You also will learn about the virtual cloud network and application deployment, including how to create and deploy public-facing Oracle Application Express solutions and three-tier web applications on a foundation of Oracle REST Data Services. The book also includes a brief introduction to using and managing access to Oracle Machine Learning Notebooks.Cloud computing is a strong industry trend. Mastering the content in this book leaves you well-positioned to make the transition into providing and supporting cloud-based applications and databases. You will have the knowledge and skills that you need to deploy modest applications along with a growing understanding of Oracle’s Cloud platform that will serve you well as you go beyond the limits of the Always Free options and take full advantage of all that Oracle Cloud Infrastructure can offer.WHAT YOU WILL LEARN* Know which resources are available for free forever from Oracle Cloud Infrastructure* Provision your virtual cloud network* Host, manage, and monitor web applications using the freely available components* Provision and manage Autonomous Databases and Autonomous Linux Compute Nodes* Use and manage access to Oracle Machine Learning Notebooks* Automate and manage your infrastructure as code using Terraform* Monitor and manage costs when you grow beyond the Always Free platformWHO THIS BOOK IS FORDatabase administrators and application developers who want to learn about Oracle’s cloud offerings, application developers seeking a robust platform on which to build and deploy modest applications at zero cost, and developers and administrators interested in exploring Oracle Application Express running on a self-managing, self-tuning Oracle DatabaseADRIAN PNG is Senior Consultant at Insum Solutions. He has over two decades of experience in designing and implementing software solutions using a wide variety of programming languages. Adrian has a deep passion for Oracle Application Express and has helped many organizations succeed in developing robust data management practices. As a full-stack developer, he also does double-duty as a database and cloud administrator. “Design for the user” is his motto, and he continually seeks to optimize processes and adopt new strategies and technologies to improve how data is captured, integrated, and used effectively.LUC DEMANCHE is an Oracle DBA with 20 years of experience. His high-level expertise recently earned him the distinctions of Oracle Cloud Infrastructure 2018 Certified Architect, Oracle Autonomous Database Cloud 2019 Specialist, and Oracle Certified Professional 12c. His passion for the discipline has also led him to share his knowledge through a 2016 IOUG-published book titled Oracle Application Express Administration, which he co-authored with his colleague Francis Mignault, CTO at Insum. Luc specializes in Oracle databases from 7.3 to 19c and is particularly knowledgeable about the numerous Oracle tools used on his projects. He is heavily involved in building the Oracle Cloud team at Insum and has several successfully completed cloud projects to his credit.IntroductionPART I. GETTING STARTED1. Create an Account2. Identity and Access ManagementPART II. INFRASTRUCTURE AND OPERATIONS3. Basic Networking4. Compute Instances5. Storage6. Oracle Autonomous Linux7. Autonomous Databases8. Load Balancers9. Notifications and MonitoringPART III. APPLICATIONS10. SQL Developer Web11. Oracle Application Express12. Oracle REST Data Services13. Deploy Multitiered Web Applications14. Oracle Machine Learning NotebooksPART IV. NEXT STEPS15. Infrastructure as Code16. Account Management
Understanding Oracle APEX 20 Application Development
This book shows developers and Oracle professionals how to build practical, non-trivial web applications using Oracle’s rapid application development environment – Application Express (APEX). This third edition Is revised to cover the new features and user interface experience found in APEX 20. Interactive grids and form regions are two of the newer aspects of APEX covered in this edition. The book is targeted at those who are new to APEX and just beginning to develop real projects for deployment, as well as those who are familiar with APEX and want a deeper understanding. The book takes you through the development of a demo web application that illustrates the concepts all APEX programmers should know.This book introduces the world of APEX properties, explaining the functionality supported by each page component as well as the techniques developers use to achieve that functionality. Topics include conditional formatting, user-customized reports, data entry forms, concurrency and lost updates, and security control. Specific attention is given in the book to the thought process involved in choosing and assembling APEX components and features to deliver a specific result. UNDERSTANDING ORACLE APEX 20 APPLICATION DEVELOPMENT, 3RD EDITION is the ideal book to take you from an understanding of the individual pieces of APEX to an understanding of how those pieces are assembled into polished applications.WHAT YOU WILL LEARN* Build attractive, highly functional web apps from the ground up* Enhance and customize pages created by the APEX wizards* Understand the security implications of page design* Write PL/SQL code for process activity and verification* Build complex components such as forms and interactive gridsWHO THIS BOOK IS FORDevelopers new to APEX who desire a strong fundamental understanding of how APEX applications work. For existing developers and database administrators desiring to mine the most value from APEX by improving their development techniques.EDWARD SCIORE is a recently retired Associate Professor in the computer science department at Boston College. He has been teaching college students for more than 35 years. His research specialty is database systems, and he thoroughly enjoys teaching the wonders of database technology to captive students.1. The SQL Workshop2. Applications and Pages3. Regions4. Navigation5. Items and Buttons6. Session State7. Processes8. Data Validation9. Branches10. Forms11. Interactive Grids12. Dynamic SQL13. Security
Microsoft Azure Architect Technologies Study Companion
Use this invaluable study companion and hands-on guide to help you prepare for the AZ-300 and AZ-303 certification exam and get well on your way to becoming an Azure Solutions Architect.The book starts with an overview of public, private, and hybrid clouds and then goes into configuration of virtual machines. Azure Resource Manager (ARM) and VM encryption are discussed along with Azure Monitor. You will learn how to work with Azure recommendations and analyze your resource configuration. Storage solutions, connecting to networks, and Azure Active Directory are discussed in depth, with examples. You will be able to migrate servers to Azure and demonstrate server-less computing, load balancing, and app services in Azure. You also will learn about Service Fabric, Azure Kubernetes services, and data security in Azure. Cosmos DB and Relational DB are covered and you will know how to connect to cloud databases using SQL Server Management Studio (SSMS). The book presents exercises, practice questions, and Azure architecture best practices.WHAT WILL YOU LEARN* Be able to speak with customers, understand their infrastructure, and provide a blueprint to migrate their framework to Azure* Go beyond moving on-premise frameworks to Azure and design solutions on Azure from the start* Know Azure architecture best practices to optimize Azure deployments* Complete practice exercises to prepare for exam lab assignments* Take a mock exam for practiceWHO THIS BOOK IS FORAzure developers, Azure Solution Architects, and those aspiring to fill these roles, who possess some familiarity with cloud computingRAHUL SAHAY is a Microsoft MVP specializing in web technologies. He is Software Development Engineer at Kongsberg Digital. He has been working in various aspects of the software development life cycle for 11+ years, focusing on web stack development. He is part of software development in different applications, ranging from client applications to web services to websites. Rahul is well versed with C#, ASP.NET, .Net Core, Angular, Microservices, Azure, Kubernetes, Docker, DevOps, Power BI, etc. He is also involved in designing application architecture from scratch. He spends most of his time in writing platform-agnostic and cloud-agnostic code. CHAPTER 1. SETTING THE EXPECTATION, sets the tone of this book. It starts from ground zero like what is cloud, what are public, private and hybrid cloud. It also explains how to spin up free azure account and sets the budget alert. Finally it talks about resource groups, subscriptions etc.CHAPTER 2. VIRTUAL MACHINES, explains how to get started with machine configuration. You will first get the glimpse of how to choose these machine configurations based on your need. Then, you will spin up your first virtual machine with default settings. Next, you will understand availability set, availability zones. Then, you will see how to create Virtual machine scale set. You will also learn how to connect to VM via bastion login.CHAPTER 3. ARM TEMPLATES, explains how to get started with ARM Templates and automate your deployment process. Azure Resource Manager aka ARM is the modern way of deploying resources to azure. You will learn various techniques to automate the deployment model.CHAPTER 4. VIRTUAL MACHINE ENCRYPTION, explains the VM encryption process. You will learn techniques to encrypt virtual machines. You will also see how to use Azure Key Vault to achieve encryption. Then, how to apply the key to encrypt it.CHAPTER 5. AZURE MONITORING, explains the resource monitoring process. You will learn how to make use of Azure monitor dashboard. You will also learn how diagnostics work, how to enable guest level monitoring. You will also learn how to set customized diagnostics for a particular resource, how to set agents. Finally you will see how make use of Alerts and Metrics, cost management.CHAPTER 6. AZURE RECOMMENDATIONS, enables you to get the cost recommendations. This is personalized cloud consultant to help you follow best practices to optimize your azure deployments. You will learn how it analyses your resource configuration and usage telemetry to recommend solution to improve cost effectiveness.CHAPTER 7. STORAGE SOLUTIONS, explains how to get started with storage accounts and then what are the different ways to manage it. You will also see how to handle endpoint configurations, different access keys associated with it. Then you will learn how to make use of azure storage explorer. You will also learn how to make use of AD authentication against storage accounts. Finally, you will see how to replication and failover for storage accounts.CHAPTER 8. MANAGING VIRTUAL NETWORKS, explains you how to get started with creating our first virtual network. Next, you will understand what subnets are and why it’s important. You will also see how to setup public and private IP addresses. Finally you will learn about application security group aka (ASG).CHAPTER 9. CONNECTING NETWORKS, explains how to connect two or more than two virtual networks. Here you will learn different techniques like peering between networks, gateways, virtual private networks aka (VPN). Finally you will also learn about ExpressRoute Direct. You will also learn about scalability as well as costing factor associated with virtual networks.CHAPTER 10. AZURE ACTIVE DIRECTORY, explains how to create an active directory, adding and managing users, groups, guest users. You will also learn how to add custom domains. Next, you will learn about Identity Protection, self-service password reset, conditional access, identity governance, and hybrid identity. Finally, you will learn about Azure AD B2C and B2B account.CHAPTER 11. MIGRATE SERVERS TO AZURE, covers azure recovery service. You will learn how to setup disaster recovery. You will also see best practices to choose from different available zones for setting up these services. Next, you will learn about different backup management types. Then, you will see how to prepare infrastructure for any site recovery. Finally you will test the failover.CHAPTER 12. SERVERLESS COMPUTING, covers concepts like function apps, azure functions, logic apps etc. You will learn how to create a function app then how to integrate the same using blob container means you will experience one full cycle with storage solution. Next comes logic apps where in you will create one simple logic app to create a file in one drive. Here, you will learn how to stitch multiple dynamic conditions together. Finally, you will also learn about event grid and service bus.CHAPTER 13. LOAD BALANCING, covers different concepts of balancing like load balancing, application gateways and front door. In this chapter, you will learn how to create these and when to use which service. You will also learn concepts like backend pools, health probes, frontend configurations, http settings, routing table and so on.CHAPTER 14. MULTI FACTOR AUTHENTICATION, covers how to setup multi factor authentication for a user. Here, you will learn complete flow of MFA also how to setup fraud alerts, one time bypass, and role based access control etc.CHAPTER 15. APP SERVICES, covers how to create a simple web app, app services with containers etc. Next, you will learn how to setup background jobs, auto scaling options and so on. You will also see how to setup different deployment options. Finally, you will also learn how to create rules for auto scaling feature.CHAPTER 16. SERVICE FABRIC, covers the concept of service fabric then how to get started with service fabric cluster. You will also learn about containers support in service fabric. Next, we will see how to manage the service fabric on local machine and also understand different programming models.CHAPTER 17. APPS WITH CONTAINERS, covers apps with container support. Here, you will learn about Azure Kubernetes services aka (AKS). We will see how to get started with AKS from scratch. Next, we will see how to deploy kubernetes cluster. Next, we will see how to visualize the kubernetes dashboard locally.CHAPTER 18. DATA SECURITY, covers variety of techniques say encryption, firewall, virtual network service endpoints, non-public networks. You will learn to apply these techniques on different resources say Database, ARM Templates etc.CHAPTER 19. COSMOS DB covers cosmos Db in depth. In this chapter, you will learn how to create a cosmos db, apply replication globally. Next, you will learn how to create items container, database collection. Then, you will learn how to create records in database, query records from database. Finally, you will also learn how to apply default consistency based on different needs.CHAPTER 20. RELATIONAL DB covers relational database from high level. In this chapter, you will learn how to create SQL Db in azure, next how to apply Geo replication, firewall settings to database. Next, you will also learn how to set active directory admin against your database. Then, you will see how to use built in query editor in azure. Finally, you will learn how to connect to cloud db using SQL Server management studio locally.CHAPTER 21. CASE STUDIES presents various case studies to you to solve. In this section, you will be presented with variety of questions to get the feel of actual exam. These questions will be scenario based where in you will be expected to present good, cost-effective solution to solve client’s requirement.CHAPTER 22. PRACTICE QUESTIONS presents a set of mock exam questions. This is the place where you can validate your knowledge before taking actual test.CHAPTER 23. AZURE ARCHITECTURAL PRACTICES - covers structured approach for designing applications on Azure which are scalable, resilient, and highly available. This is based on proven practices which we have learned from customer engagements. An Architecture style is a family of architectures which share common characteristics irrespective of what technologies used under the hood. In this section, you will gain the same insight.
Data Teams
Learn how to run successful big data projects, how to resource your teams, and how the teams should work with each other to be cost effective. This book introduces the three teams necessary for successful projects, and what each team does.Most organizations fail with big data projects and the failure is almost always blamed on the technologies used. To be successful, organizations need to focus on both technology and management.Making use of data is a team sport. It takes different kinds of people with different skill sets all working together to get things done. In all but the smallest projects, people should be organized into multiple teams to reduce project failure and underperformance.This book focuses on management. A few years ago, there was little to nothing written or talked about on the management of big data projects or teams. DATA TEAMS shows why management failures are at the root of so many project failures and how to proactively prevent such failures with your project.WHAT YOU WILL LEARN* Discover the three teams that you will need to be successful with big data* Understand what a data scientist is and what a data science team does* Understand what a data engineer is and what a data engineering team does* Understand what an operations engineer is and what an operations team does* Know how the teams and titles differ and why you need all three teams* Recognize the role that the business plays in working with data teams and how the rest of the organization contributes to successful data projectsWHO THIS BOOK IS FORManagement, at all levels, including those who possess some technical ability and are about to embark on a big data project or have already started a big data project. It will be especially helpful for those who have projects which may be stuck and they do not know why, or who attended a conference or read about big data and are beginning their due diligence on what it will take to put a project in place.This book is also pertinent for leads or technical architects who are: on a team tasked by the business to figure out what it will take to start a project, in a project that is stuck, or need to determine whether there are non-technical problems affecting their project.JESSE ANDERSON serves in three roles at Big Data Institute: data engineer, creative engineer, and managing director. He works on big data with companies ranging from startups to Fortune 100 companies. His work includes training on cutting-edge technologies such as Apache's Kafka, Hadoop, and Spark. He has taught over 30,000 people the skills needed to become data engineers.Jesse is widely regarded as an expert in the field and for his novel teaching practices. He has published for O’Reilly and Pragmatic Programmers. He has been covered in prestigious publications such as: The Wall Street Journal, CNN, BBC, NPR, Engadget, and Wired. He has spent the past 6+ years observing, mentoring, and working with data teams. He has condensed this knowledge of why teams succeed or fail into this book.
Practical TensorFlow.js
Develop and deploy deep learning web apps using the TensorFlow.js library. TensorFlow. js is part of a bigger framework named TensorFlow, which has many tools that supplement it, such as TensorBoard , ml5js , tfjs-vis. This book will cover all these technologies and show they integrate with TensorFlow. js to create intelligent web apps.The most common and accessible platform users interact with everyday is their web browser, making it an ideal environment to deploy AI systems. TensorFlow.js is a well-known and battle-tested library for creating browser solutions. Working in JavaScript, the so-called language of the web, directly on a browser, you can develop and serve deep learning applications.You'll work with deep learning algorithms such as feedforward neural networks, convolutional neural networks (CNN), recurrent neural networks (RNN), and generative adversarial network (GAN). Through hands-on examples, apply these networks in use cases related to image classification, natural language processing, object detection, dimensionality reduction, image translation, transfer learning, and time series analysis.Also, these topics are very varied in terms of the kind of data they use, their output, and the training phase. Not everything in machine learning is deep networks, there is also what some call shallow or traditional machine learning. While TensorFlow.js is not the most common place to implement these, you'll be introduce them and review the basics of machine learning through TensorFlow.js.WHAT YOU'LL LEARN* Build deep learning products suitable for web browsers* Work with deep learning algorithms such as feedforward neural networks, convolutional neural networks (CNN), recurrent neural networks (RNN), and generative adversarial network (GAN)* Develop apps using image classification, natural language processing, object detection, dimensionality reduction, image translation, transfer learning, and time series analysisWHO THIS BOOK IS FORProgrammers developing deep learning solutions for the web and those who want to learn TensorFlow.js with at least minimal programming and software development knowledge. No prior JavaScript knowledge is required, but familiarity with it is helpful.JUAN DE DIOS SANTOS RIVERA is a machine learning engineer who focuses on building data-driven and machine learning-driven platforms. As a Big Data Software Engineer for mobile apps, his role has been to build solutions to detect spammers and avoid the proliferation of them. This book goes hand-to-hand with that role in building data solutions. As the AI field keeps growing, developers need to keep extending the reach of our products to every platform out there, which includes web browsers.Chapter 1Welcome to TensorFlow.jsHeadings* ● What is TensorFlow.js?* ● TensorFlow.js API○ Tensors○ Operations ○ Variables● How to install it● Use casesChapter 2Building your First ModelHeadings* ● Building a logistic regression classification model* ● Building a linear regression model* ● Doing unsupervised learning with k-means* ● Dimensionality reduction and visualization with t-SNE and d3.js* ● Our first neural networkChapter 3Create a drawing app to predict handwritten digits usingConvolutional Neural Networks and MNISTHeadings* ● Convolutional Neural Networks* ● The MNIST Dataset* ● Design the model architecture* ● Train the model* ● Evaluate the model* ● Build the drawing app* ● Integrate the model within the appChapter 4"Move your body!" A game featuring PoseNet, a pose estimator modelHeadings* ● What is PoseNet?* ● Loading the model* ● Interpreting the result* ● Building a game around itChapter 5Detect yourself in real-time using an object detection model trained inGoogle Cloud's AutoMLHeadings* ● TensorFlow Object Detection API* ● Google Cloud's AutoML* ● Training the model* ● Exporting the model and importing it in TensorFlow.js* ● Building the webcam appChapter 6Transfer Learning with Image Classifier and Voice RecognitionHeadings* ● What's Transfer Learning?* ● MobileNet and ImageNet (MobileNet is the base model and ImageNet is the training set)* ● Transferring the knowledge* ● Re-training the model* ● Testing the model with a videoChapter 7Censor food you do not like with pix2pix, Generative AdversarialNetworks, and ml5.jsHeadings* ● Introduction to Generative Adversarial Networks* ● What is image translation?* ● Training your custom image translator with pix2pix* ● Deploying the model with ml5.jsChapter 8Detect toxic words from a Chrome Extension using a UniversalSentence EncoderHeadings* ● Toxicity classifier* ● Training the model* ● Testing the model* ● Integrating the model in a Chrome ExtensionChapter 9Time Series Analysis and Text Generation with Recurrent NeuralNetworksHeadings* ● Recurrent Neural Networks* ● Example 1: Building an RNN for time series analysis* ● Example 2: Building an RNN to generate textChapter 10Best practices, integrations with other platforms, remarks and finalwordsHeadings* ● Best practices* ● Integration with other platforms* ● Materials for further practice* ● Conclusion
Big Public Data aus dem Programmable Web
Die Verbreitung des Internets und die zunehmende Digitalisierung in der öffentlichen Verwaltung und Politik haben über die letzten Jahre zu einer starken Zunahme an hochdetaillierten digitalen Datenbeständen über politische Akteure und Prozesse geführt. Diese big public data werden oft über programmatische Schnittstellen (Web APIs; programmable Web) verbreitet, um die Einbettung der Daten in anderen Webanwendungen zu vereinfachen. Die Analyse dieser Daten für wissenschaftliche Zwecke in der politischen Ökonomie und Politologie ist vielversprechend, setzt jedoch die Implementierung einer data pipeline zur Beschaffung und Aufbereitung von Daten aus dem programmable Web voraus. Dieses Buch diskutiert die Chancen und Herausforderungen der praktischen Nutzung dieser Datenbestände für die empirische Forschung und zeigt anhand einer Fallstudie ein mögliches Vorgehen zur systematischen Analyse von big public data aus dem programmable Web auf.ULRICH MATTER ist Assistenzprofessor für Volkswirtschaftslehre an der Universität St. Gallen.Einleitung.- Chancen: Datengenerierung und Datenqualität.- Herausforderungen: Webtechnologien und Variabilität der Daten.- Konzeptioneller Lösungsansatz: Data pipelines.- Fallstudie: Religion in der US Politik.- Replizierbarkeit und Verifizierbarkeit der Datensammlung.- Diskussion und Ausblick
Introducing Deno
Learn everything there is to know about the new secure runtime for JavaScript: Deno. A proposed replacement for Node.js envisioned and created by the same developer who wrote the first version of Node, Deno is a simple, modern and secure runtime for JavaScript and TypeScript that uses V8 and is built in Rust. This book will cover everything from its inception to the currently available version.You’ll see how to take advantage of the security layer in order to avoid unwanted security holes, and how to use TypeScript to develop your applications without having to manually set up a build process. You'll also learn how to create and use modules without having to depend on a package manager, and much more. Armed with these newly learned concepts, by the time you finish this book, you’ll be ready to build and test your own Deno applications.Whether you’re a brand new developer to the back end with a JavaScript background or a seasoned Node.js developer looking to understand this competing technology, Introducing Deno will put you on the right path.WHAT YOU'LL LEARN* Learn why Deno was created and why it is different from Node* Build real applications using Deno and related technologies* Create backend applications with Typescript * Resolve how to live without npm and package.json* Set permissions and default behaviorWHO THIS BOOK IS FORAnyone with knowledge of back-end development looking to learn a new way of doing things and those with a basic understanding of JavaScript and Node.js core concepts.FERNANDO DOGLIO has been a part of the Software Development industry for the past 16 years. He’s worked on countless web projects, which include (amongst other things) APIs, Web Services, SPA, Node.js applications, PHP, Ruby, and a lot of JavaScript/HTML/CSS. He was there when SOAP hit the web and it was all the rage and he was also there when XML was the magic X on AJAX. He’s worked with Node.js for several years now and he’s written several books and countless articles about it, covering everything from the art of designing REST APIs with it to understanding the best design patterns and how they can be implemented with it. Now, working as a Technical Manager, he’s an eager evangelist of using JavaScript for backend development given how flexible and powerful this language is. You can find him on Twitter @deleteman123.CHAPTER 1: WHY DENO?Covering the reasons why Deno was created, what new features and improvements it brings over Node.js, and some basic code samples.● What problems is it trying to solve?● A quick overview of what’s new○ TypeScript as first-class citizen○ Security○ Top-level await○ Extended and improved standard library○ No more npm● Trying Deno○ Online playgrounds○ Installing Deno on your computerCHAPTER 2: TYPESCRIPT YOU NEED TO KNOWThe chapter will cover the basic concepts of TypeScript to make sure the reader understands the basics for the code samples that will follow.CHAPTER 3: LIVING A SECURE LIFEA more in-depth chapter covering everything about the new security layer and code examples to showcase the feature.● Understanding how to set permissions & default behavior● Code examplesCHAPTER 4: NO MORE NPMA detailed chapter covering how Deno intends to handle modules including several code examples showcasing the different features.● Importing external modules● Handling versions● Importing once, requiring many times● What happened to package.json?● What if the external resource is removed?● Potential pitfallsCHAPTER 5: EXISTING MODULESReview of the standard library and some already existing ports from Node.js that can be used with Deno. All covered modules will have at least one code sample associated with them.● The standard library, what is it and how can we use it?● Ported modules from NodeCHAPTER 6: PUTTING IT ALL TOGETHER-SAMPLE APPSThe final chapter will cover a few practical projects to showcase how different types of applications can look like using Deno and how to structure them.● Building an API with Deno and Mongo● Building a chat server with Deno● Building a command line tool with Deno
Spring Quick Reference Guide
Quickly gain the insight necessary to address a multitude of Java-based Spring Framework and Spring Boot coding challenges using this succinct reference guide. Short, focused code examples will help you master many of the Spring elements such as AOP, data access, MVC for web development, security, web services/REST for microservices development, Batch for large data sets, and more. You’ll also get a rundown of the increasingly popular Spring Boot microframework as well.You won’t find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What you will find is a language reference that is concise, to the point, and highly accessible. The book is packed with useful information and is a must-have for any Java programmer.WHAT YOU WILL LEARN* Discover the Spring Framework and its many sub-projects* Work with the Spring Boot microframework* Program with the Spring Boot framework to build Java-based* microservices, native cloud applications, and more* Use some of the lesser-known but still important frameworks and tools such as REST Docs, HATEOAS, Cloud, and more* Leverage these Spring frameworks and tools for building your next Java-based cloud applicationWHO THIS BOOK IS FORThose with prior experience with Java who want a quick and handy reference to using Spring.Adam L. Davis makes software. He’s spent many years developing in Java (since Java 1.2) and has enjoyed using Spring and Hibernate for more than a decade. Since 2006 he’s been using Groovy, Grails, HTML, CSS, and JavaScript, in addition to Java to create SaaS web applications that help track finances for large institutions (among other things).Adam has a Masters and a Bachelors degree in Computer Science from Georgia Tech. He is also the author of Reactive Streams in Java (Apress, 2019) and Learning Groovy: Second Edition (Apress, 2019).1. Introduction2. Core3. Libraries4. Spring AOP5. Spring Data6. Spring MVC7. Spring Mobile8. Spring Security9. Spring Web Services10. Spring REST11. Reactor12. Spring XD13. Spring Batch14. Spring Social15. Spring Boot16. Spring Boot with WebFlux17. Spring IO18. Spring Shell19. Spring Cloud
Pro C# 8 with .NET Core 3
This essential classic provides a comprehensive foundation in the C# programming language and the frameworks it lives in. Now in its 9th edition, you will find the latest C# 8 and .NET Core features, along with new chapters on Microsoft’s lightweight, cross-platform framework, .NET Core 3.1. Coverage of ASP.NET Core, Entity Framework Core, and more, sits alongside the latest updates to .NET Core, including Windows Presentation Foundation (WPF). Not only does this book cover all of the latest features in C# 8, but all chapters and code samples have been rewritten for this latest release.Dive in and discover why this book has been a favorite of C# developers worldwide for more than 15 years. Gain a solid foundation in object-oriented development techniques, attributes and reflection, generics and collections, and numerous advanced topics not found in other texts (such as CIL opcodes and emitting dynamic assemblies). With the help of Pro C# 8 with .NET Core 3 gain the confidence to put C# into practice and explore the .NET Core universe on your own terms.WHAT YOU WILL LEARN* Discover the bells and whistles of C# 8 features and updates to previous features* Hit the ground running with ASP.NET Core web applications and web services, and Entity Framework Core* Work with the latest version of Windows Presentation Foundation, now a part of .NET Core* Understand the philosophy behind .NET and the cross-platform alternative, .NET Core* Develop applications with C# and modern frameworks for services, web, and smart client applicationsWHO THIS BOOK IS FORDevelopers who are interested in .NET programming and the C# language“Amazing! Provides easy-to-follow explanations and examples. I remember reading the first version of thisbook; this is a 'must-have' for your collection if you are learning .NET Core!”– Rick McGuire, Senior Application Development Manager, Microsoft“Phil is a journeyman programmer who brings years of experience and a passion for teaching to make this fully revised and modernized ‘classic’ a ‘must-have’. Any developer who wants full-spectrum, up-to-date coverage of both the C# language and how to use it with .NET Core and ASP.NET Core should get this book.”– Brian A. Randell, Partner, MCW Technologies and Microsoft MVPANDREW TROELSEN has more than 20 years of experience in the software industry. Over this time he has worked as a developer, educator, author, public speaker, and now team lead and lead engineer. He is the author of numerous books in the Microsoft universe. He holds a master of science degree in software engineering (MSSE) from the University of St. Thomas and another in computational linguistics (CLMS) from the University of Washington.PHIL JAPIKSE is an international speaker, Microsoft MVP, ASPInsider, Professional Scrum Trainer, and a passionate member of the developer community. He is the lead director of the Cincinnati .NET User Group and the Cincinnati Software Architect Roundtable, and he founded the CincyDeliver conference, Currently, Phil works as a Director of Consulting and Enterprise Architect. Follow Phil on his blog (skimedic.com) or on Twitter @skimedic.PART I: INTRODUCING C# AND .NET CORE.- Chapter 1: Introducing .NET Core.- Chapter 2: Building C# Applications.- PART II: CORE C# PROGRAMMING.- Chapter 3: Core C# Programming Constructs, Part I.- Chapter 4: Core C# Programming Constructs, Part II.- PART III: OBJECT ORIENTED PROGRAMMING WITH C#.- Chapter 5: Understanding Encapsulation.- Chapter 6: Understanding Inheritance and Polymorphism.- Chapter 7: Understanding Structured Exception Handling.- Chapter 8: Working with Interfaces.- Chapter 9: Understanding Object Lifetime .- PART IV: ADVANCED C# PROGRAMMING.- Chapter 10: Collections and Generics.- Chapter 11: Advanced C# Language Features.- Chapter 12: Delegates, Events, and Lambda Expressions.- Chapter 13: LINQ To Objects.- Chapter 14: Processes, AppDomains, and Load Contexts.- Chapter 15: Multithreaded, Parallel, and Async Programming.- PART V: PROGRAMMING WITH .NET CORE ASSEMBLIES.- Chapter 16: Building and Configuring Class Libraries.- Chapter 17: Type Reflection, Late Binding, and Attribute-Based Programming.- Chapter 18: Dynamic Types and the Dynamic Languare Runtime.- Chapter 19:Understanding CIL and the Role of Dynamic Assemblies.- PART VI: FILE AND DATA HANDLING.- Chapter 20: File I/O and Object Serialization.- Chapter 21: Data Access with ADO.NET.- Chapter 22: Introducing Entity Framework Core.- Chapter 23: Finishing the Data Access Layer.- PART VII: WINDOWS CLIENT DEVELOPMENT.- Chapter 24: Introducing Windows Presentation Foundation and XAML.- Chapter 25: WPF Controls, Layouts, Events, and Data Binding.- Chapter 26: WPF Graphics Rendering Services.- Chapter 27: WPF Resources, Animations, Styles, and Templates.- Chapter 28: WPF Notifications, Validations, Commands, and MVVM.- PART VIII: ASP.NET CORE.- Chapter 29: Introducing ASP.NET Core.- Chapter 30: Restful Services with ASP.NET Core.- Chapter 31: MVC Applications with ASP.NET Core.
GNU Octave by Example
Get a quick start to learn, understand, and apply GNU Octave using a math- and programming-friendly approach. This book focuses on an end-to-end track to teach mathematical programming, data science, signal processing, and image processing with GNU Octave.GNU Octave by Example starts with an introduction to GNU Octave, a free and open-source alternative to MATLAB. Next, it explains the processes to install GNU Octave on popular operating systems such as Windows, Ubuntu, Raspberry Pi, and other platforms. Further, it covers hands-on exercises with GNU Octave exploring the basic functionality and command line in interactive mode. This is followed by covering matrices and various operations including how to read and analyze data from various sources. Moving forward, it introduces commonly used programming constructs in data visualization. It explains 2D and 3D data visualization along with data analysis. It also demonstrates the concepts related to geometry and its application with GNU Octave. It concludes with coverage of signal processing followed by image, video, and audio processing techniques.After reading this book, you will be able to write your own programs for scientific and numerical applications.WHAT YOU WILL LEARN● Understand the practical aspects of GNU Octave with math and programming-friendly abstractions● Install GNU Octave on multiple platforms including Windows, Raspberry Pi, and Ubuntu● Work with GNU Octave using the GUI, the command line, and Jupyter notebooks● Implement 2D and 3D data visualization and analysis with GNU OctaveWHO THIS BOOK IS FORSoftware engineers, data engineers, data science enthusiasts, and computer vision professionals.ASHWIN PAJANKAR holds a Master of Technology from IIIT Hyderabad. He started programming and tinkering with electronics at the tender age of seven. BASIC was the first programming language he worked with. He was gradually exposed to C programming, 8085, and x86 assembly programming during his higher secondary schooling. He is proficient in x86 assembly, C, Java, Python, and shell programming. He is also proficient with Raspberry Pi, Arduino, and other single board computers and microcontrollers. Ashwin is passionate about training and mentoring. He has trained more than 60,000 students and professionals in live and online training courses. He has published more than a dozen books with many international and Indian publishers. He has also reviewed numerous books and educational video courses. This is his fourth book with Apress and he is working on more books. He regularly conducts programming bootcamps and hands-on training for software companies.He is also an avid YouTuber with more than 10,000 subscribers to his channel. You can find him on LinkedIn.SHARVANI CHANDU holds an MS in Computer Vision from CMU and BTech in Electronics and Communication Engineering from IIIT Hyderabad. She has research experience in the areas of computer vision and machine learning. She currently works for Amazon and has also worked in Bangalore as a software engineer for a couple of years focusing on machine learning and natural language processing. During her undergraduate and graduate studies, she worked as a research intern, teaching assistant, and research assistant. She has also published research papers related to her work. She is enthusiastic about working in the areas of mathematics, computer vision, and programming.You can find her on LinkedIn.Chapter 1: An introduction to GNU OctaveCHAPTER GOAL: Introduce the reader to the GNU Octave tool and steps for the installation on various popular platformNO OF PAGES - 15 (will include the screenshots of GUI too)SUB -TOPICS1. What is GNU Octave and its history2. Applications3. Limitations of Octave4. The Octave Community5. Comparison with other tools (MATLAB and Scilab)6. Install Octave and Jupyter● Windows● Ubuntu● Raspberry Pi7. Octave Programming Modes● Octave CLI and launching CLI from the command prompt● Octave GUI and *.m files● Jupyter NotebookChapter 2: Action with Octave ProgrammingCHAPTER GOAL: Help the reader to engage with hands-on exercises with GNU Octave. Readers will explore the basic functionality of the GUI and command line in the interactive mode.No of pages: 10SUB - TOPICS1. Getting started with the interactive mode2. Basics of variables3. Data types and naming conversions4. Global and local variables5. Clear the screen and get the help6. Writing scripts and launching them from the command prompt7. Predefined constants and common mathematical functions8. Complex variables9. Various Operations on variablesChapter 3: Matrices and OperationsCHAPTER GOAL: Demonstrate the multidimensional data with matrices and their operations with GNU OctaveNO OF PAGES: 15Sub - Topics:1. Scalars, vectors, and matrices2. Operations on Matrices and ArraysChapter 4: Scripts, Loops, and User defined functionsChapter Goal: Write Scripts and Loops. Learn how to write own custom user defined functions in GNU Octave. This chapter heavily focuses on scripting part and programming constructs. We will also see how to read the data from various sources for further working.NO OF PAGES: 15SUB - TOPICS:1. Scripts2. Loops3. Define functions4. Inline functions5. Save data into files6. Read data from csv files7. Work with online data sources8. Binary file formatCHAPTER 5 : DATA VISUALIZATIONChapter goal – Learn to visualize data with octave. Readers working in the data science and visualization domains will be benefited from this.NO OF PAGES: 15SUB - TOPICS:1. 2D Plotting2. 3D Plotting3. Surface PlottingCHAPTER 6 : DATA ANALYSISCHAPTER GOAL – Learn to analyze data with octave. Again, the readers working in the domain of data science and analytics will benefit from this.No of pages: 10SUB - TOPICS:1. Simple descriptive statistics2. Histogram and moments3. Comparing data sets4. Function fitting5. Polynomial fittingChapter 7 : GeometryCHAPTER GOAL – Understand geometry and its applications with octave. We will explore the GNU Octave implementation of important geometry related algorithms.NO OF PAGES: 10Sub - Topics:1. Delaunay Triangulation2. Voronoi Diagrams3. Convex Hull4. Interpolation on Scattered DataCHAPTER 8 : SIGNAL PROCESSINGCHAPTER GOAL – Learn to work with Fourier analysis and processing techniques for signal.No of pages: 10SUB - TOPICS:1. Signal Generation2. Fourier AnalysisCHAPTER 9 : IMAGE, VIDEO, AND AUDIO PROCESSINGCHAPTER GOAL – Learn to process images, video, and audio. We will see all the techniques in details.NO OF PAGES: 20SUB - TOPICS:1. Image Processing2. Video Processing3. Audio ProcessingAPPENDIXChapter goal – This chapter will have all assorted topics that are not related to each other but very important for readers.NO OF PAGES: 10SUB - TOPICS:1. Oct2py2. Structures and cellarrays
Einsatz der Blockchain-Technologie im Energiesektor
Die Blockchain-Technologie erweist sich als eine neue, hochinteressante Technologie, die seit der Einführung des Bitcoins in zahlreichen Anwendungsfeldern diskutiert wird. Die zahlreichen Forschungsprojekte untermauern die hohen Erwartungen an diese Technologie. Das vorliegende Essential soll ein grundlegendes Verständnis über die Blockchain-Technologie vermitteln und insbesondere den Fokus auf die technologische Ausgestaltung und Konzeptentwicklung in ausgewählten Bereichen der Energiewirtschaft legen.
Self-Service AI with Power BI Desktop
This book explains how you can enrich the data you have loaded into Power BI Desktop by accessing a suite of Artificial Intelligence (AI) features. These AI features are built into Power BI Desktop and help you to gain new insights from existing data. Some of the features are automated and are available to you at the click of a button or through writing Data Analysis Expressions (DAX). Other features are available through writing code in either the R, Python, or M languages. This book opens up the entire suite of AI features to you with clear examples showing when they are best applied and how to invoke them on your own datasets.No matter if you are a business user, analyst, or data scientist – Power BI has AI capabilities tailored to you. This book helps you learn what types of insights Power BI is capable of delivering automatically. You will learn how to integrate and leverage the use of the R and Python languages for statistics, how to integrate with Cognitive Services and Azure Machine Learning Services when loading data, how to explore your data by asking questions in plain English ... and more! There are AI features for discovering your data, characterizing unexplored datasets, and building what-if scenarios.There’s much to like and learn from this book whether you are a newcomer to Power BI or a seasoned user. Power BI Desktop is a freely available tool for visualization and analysis. This book helps you to get the most from that tool by exploiting some of its latest and most advanced features.WHAT YOU WILL LEARN* Ask questions in natural language and get answers from your data* Let Power BI explain why a certain data point differs from the rest* Have Power BI show key influencers over categories of data* Access artificial intelligence features available in the Azure cloud* Walk the same drill down path in different parts of your hierarchy* Load visualizations to add smartness to your reports* Simulate changes in data and immediately see the consequences* Know your data, even before you build your first report* Create new columns by giving examples of the data that you need* Transform and visualize your data with the help of R and Python scriptsWHO THIS BOOK IS FORFor the enthusiastic Power BI user who wants to apply state-of-the-art artificial intelligence (AI) features to gain new insights from existing data. For end-users and IT professionals who are not shy of jumping into a new world of machine learning and are ready to make that step and take a deeper look into their data. For those wanting to step up their game from doing simple reporting and visualizations by making the move into diagnostic and predictive analysis.MARKUS EHRENMUELLER-JENSEN is a data professional who started his career as a consultant for Business Intelligence solutions on an IBM AS/400 system before he was introduced into the world of Microsoft’s Data Platform in 2006. He has since built Data Warehouses and Business Intelligence solutions for a wide variety of clients. His portfolio includes training and workshops, architectural designs, and the development of data-oriented solutions. In 2018 he founded Savory Data, an independent consultancy company.Markus is certified as a Microsoft Certified Solution Expert (MCSE) for Data Platform and Business Intelligence, and as a Microsoft Certified Trainer (MCT). He teaches databases, information management, and project management at HTL Leonding, Austria. He co-founded both PASS Austria and PUG Austria and co-organizes the yearly SQL Saturday in Vienna. He has been a Microsoft Most Valuable Professional (MVP) each year since 2017. 1. Asking Questions in Natural Language2. The Insights Feature3. Discovering Key Influencers4. Drill-Down and Decomposing Hierarchies5. Adding Smart Visualizations6. Experimenting with Scenarios7. Characterizing a Dataset8. Creating Columns from Example9. Executing R and Python Visualizations10. Transforming Data with R and Python11. Execute Machine Learning Models in the Azure Cloud
CompTIA Security+ Certification Study Guide
Prepare for the CompTIA Security+ certification exam that covers the skills required to perform core security functions and pursue a career in IT. You will learn the basic principles of network security.Computer network vulnerabilities and threats are covered and you will learn how to safeguard computer networks. Network security planning, technology, and organization are discussed along with associated legal and ethical issues.Lesson objectives and instruction succinctly review each major topic, including: network fundamentals, operational and organizational security, risk management, wireless security, change management, physical security, forensics, network attacks, and much more.WHAT YOU WILL LEARN* Identify the concepts of confidentiality, integrity, and availability* Implement secure network administration principles* Apply appropriate risk mitigation strategies* Explain the impact of physical security on computer and network security* Use assessment tools to discover security threats and vulnerabilities* Implement appropriate security controls when performing account managementWHO THIS BOOK IS FORSecurity professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors and penetration testers, security specialists, security consultants, security engineers, and moreAHMED SHEIKH is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is working as IT Expert Engineer at a leading IT electrical company.CHAPTER 1. GENERAL CONCEPTSIdentify the concepts of confidentiality, integrity and availability.Perform packet level analysis.CHAPTER 2. CHAPTER 2. NETWORK FUNDAMENTALS INFRASTRUCTURE SECURITYExplain the security function and purpose of network devices and technologies.Implement secure network administration principles.Differentiate network design elements and compounds.Use common protocols to employ infrastructure security.Identify commonly used default network ports.CHAPTER 3. IDS WIRELESS SECURITYExplain the security function and purpose of network devices and technologies.Apply secure network administration principles.Implement a wireless network in a secure manner.CHAPTER 4. ROLE OF PEOPLE IN SECURITY—OPERATIONAL AND ORGANIZATIONAL SECURITYExplain the importance of security-related awareness and training.CHAPTER 5. RISK MANAGEMENTExplain risk related concepts.Apply appropriate risk mitigation strategies.CHAPTER 6. CHANGE MANAGEMENTCompare aspects of business continuity.Execute disaster recovery plans and procedures.CHAPTER 7. PHYSICAL SECURITYExplain the impact of physical security on computer and network security.Explain the impact and proper use of environmental controls.CHAPTER 8. FORENSICS, LEGAL ISSUES, PRIVACYApply appropriate incident response procedures.Identify the various laws that affect cybersecurity.CHAPTER 9. ATTACKSIdentify the different types of malware that exist.Describe computer attacks.CHAPTER 10. NETWORK ATTACKSIdentify different types of network attacks.Use assessment tools to discover security threats and vulnerabilities.CHAPTER 11. BASELINE SECURE SOFTWARE DEVELOPMENTExplain the importance of application security.Carry out appropriate procedures to establish host security.Explain the importance of data security.CHAPTER 12. EMAIL AND IM WEB COMPONENTSDescribe security issues associated with Email and Instant Messaging.Explain web applications, plug-ins, and related security issues.Explain web-based application security issues.CHAPTER 13. AUTHENTICATION AND REMOTE ACCESSExplain the function and purpose of authentication services.Explain the fundamental concepts and best practices related to authentication.Identify the methods and protocols used for remote access to networks.CHAPTER 14. ACCESS CONTROL AND PRIVILEGE MANAGEMENTExplain the fundamental concepts and best practices related to authorization and access control.Implement appropriate security controls when performing account management.CHAPTER 15. CRYPTOGRAPHYSummarize general cryptography concepts.Apply appropriate cryptographic tools and products.CHAPTER 16. PUBLIC KEY INFRASTRUCTUREExplain the core concepts of public key infrastructure.Implement Public Key Infrastructure (PKI), certificate management and associated components.