Allgemein
Beginning PBR Texturing
Delve into the concepts of physically based rendering (PBR) using Allegorithmic’s Substance Painter. This book covers the integration of PBR textures with various 3D modeling and rendering packages as well as with the Unreal Engine 4 game engine.BEGINNING PBR TEXTURING covers all aspects of the software and guides you in implementing its incredible possibilities, including using materials, masks, and baking. Integration with both internal and popular external rendering engines is covered.This book teaches you the skills you need to use the texturing tool that is recognized by studios worldwide. You will know tips and tricks to implement the pipeline and speed up your workflow.WHAT YOU WILL LEARN* Know the fundamentals of PBR-based texturing from the ground up* Create production-ready textured models from scratch* Integrate PBR textures with standard 3D modeling and rendering applications* Create portfolio-ready renders using offline renderersWHO THIS BOOK IS FORBeginners in the fields of 3D animation, computer graphics, and game technologyDR. ABHISHEK KUMAR is Assistant Professor in the Department of Computer Science at the Institute of Science at Banaras Hindu University. He is an Apple Certified Associate, Adobe Education Trainer, and certified by Autodesk. He is actively involved in course development in animation and design engineering courses for various institutions and universities as they will be a future industry requirement.Dr. Kumar has published a number of research papers and covered a wide range of topics in various digital scientific areas (image analysis, visual identity, graphics, digital photography, motion graphics, 3D animation, visual effects, editing, composition). He holds two patents in the field of design and IoT and has created two inventions related to a pipeline inspection robot to help visually impaired people.Dr. Kumar has completed professional studies related to animation, computer graphics, virtual reality, stereoscopy, filmmaking, visual effects, and photography from Norwich University of Arts, University of Edinburg, and Wizcraft MIME & FXPHD, Australia. He is passionate about the media and entertainment industry, and has directed two animation short films.Dr. Kumar has trained more than 50,000 students across the globe from 153 countries (top five: India, Germany, United States, Spain, Australia). His alumni have worked for national and international movies such as Ra-One, Krissh, Dhoom, Life of Pi, the Avengers series, the Iron Man series, GI Joe 3D, 300, Alvin and the Chipmunks, Prince of Persia, Titanic 3D, the Transformers series, Bahubali 1 & 2, London Has Fallen, Warcraft, Aquaman 3D, Alita, and more.CHAPTER 1: INTRODUCTIONChapter Goal: This chapter introduces the reader to the layout of the book and how to best use the book in a practical way to develop their skills.Sub-Topics• What is our goal• A career as game developer• How to best use this bookCHAPTER 2: GRAPHICS IN THE GAME INDUSTRYChapter Goal: In this chapter, the readers will take a peek into the working of the video game industry. Also, software used in the Production pipeline are discussed.Sub-Topics• Concept of computer graphics• Visualization basics• What is PBR?• Game render engines or game enginesCHAPTER 3: WORKFLOW OF TEXTURINGChapter Goal: This chapter discusses the general workflows of preparing a model for texturing. The concept and importance of UV unwrapping are also considered as well as common problems that usually arise during work and how to handle them.Sub-Topics• Game texturing pipeline• What is UV mapping?• What are the different types of texture maps?CHAPTER 4: TEXTURING GAMES VS TEXTURING MOVIESChapter Goal: Here the reader will learn more about the major differences as well as the similarities between texturing assets for movies and texturing assets for games.Sub-Topics• Texture map fundamental• What are the major differences?• Common pipelines and similaritiesCHAPTER 5: PBR TEXTURING VS TRADITIONAL TEXTURINGChapter Goal: In this chapter, we discuss the various traditional and modern texturing methods and their pros and cons. This will help readers decide which method is best suited for them.Sub-Topics• Texturing using 2D painting applications• Texturing using 3D texture painting applications• PBR texturing examples• PBR vs traditional texturingCHAPTER 6: SUBSTANCE SUITEChapter Goal: The readers are introduced to the four softwares that come with the Substance Suite and the different functions of each of them and where they are used in the industry.Sub-Topics• What is Substance Painter?• Why should we use substances?• Uses of other Substance Suite applicationsCHAPTER 7: HARDWARE SPECIFICATIONChapter Goal: The recommended hardware configurations required to run Substance Painter properly are discussed.Sub-Topics• GPU vs CPU• Recommended hardwareCHAPTER 8: GRAPHICAL USER INTERFACEChapter Goal: All the essential shortcuts and the GUI for Substance Painter are listed in this chapter.Sub-Topics• Main menu• Sliders• Toolbars• Properties• Texture Set• Layer Stack• History• Shelf• Display SettingsCHAPTER 9: VIEWPORT NAVIGATIONChapter Goal: The readers are introduced to the Viewport and all the tools and shelves of Substance Painter.Sub-Topics• Common shortcuts• A detailed guide to commonly used toolsCHAPTER 10: PROJECT SETUPChapter Goal: How to setup a project in Substance Painter and what are the correct settings for the same? We will discuss all that in this chapter.Sub-Topics• Choosing a substance workflow• Import into Substance Painter• Project configuration in detailCHAPTER 11: BAKING AND IMPORTANCE OF MAPSChapter Goal: In this chapter, the readers will learn about the importance of baking maps and their uses.Sub-Topics• Introduction to the Baker• Baking parameters in Substance Painter• Uses of different maps created by BakerCHAPTER 12: WORKING WITH MATERIALS, LAYERS, AND MASKSChapter Goal: This chapter introduces the students to the materials and the robust layer-based workflow that allows the creation of complex materials using masks.Sub-Topics• Introduction to Materials and Smart Materials• Building up your material• Layers and MasksCHAPTER 13: WORKING WITH PROCEDURAL MAPSChapter Goal: Here, we discuss how to texture procedurally using various maps and filters and more advanced uses of masks.Sub-Topics• Detailed introduction of filters• Comprehensive introduction of generators• Uses of grunge and other procedural texturesCHAPTER 14: SUBSTANCE ANCHORSChapter Goal: The students will now learn about the anchor system of Substance Painter and how powerful they are.Sub-Topics• What is an anchor?• Anchor point as a reference• How to effectively use anchorCHAPTER 15: RENDERING WITH I-RAYChapter Goal: The internal of render engine of Substance Painter, the Nvidia I-Ray is discussed in this chapter and how to render an asset using it.Sub-Topics• What is I-Ray?• I-Ray Render settings• Exporting Painter filesCHAPTER 16: INTEGRATION WITH MARMOSET, MAYA, AND BLENDERChapter Goal: Here, we discuss the procedure for export of the created material from Substance Painter to other popular render engines.Sub-Topics• Exporting for Marmoset, Maya, and Blender• Importing into Marmoset, Maya, and Blender• Material setup in Marmoset, Maya, and BlenderCHAPTER 17: RENDERING A PORTFOLIOChapter Goal: Finally, we discuss the process of importing maps in the render engine of your choice and rendering a portfolio ready image. In our case, we will use Blender and Marmoset tool bag.Sub-Topics• Material setup in Blender• Rendering with Blender• Rendering with Marmoset tool bagCHAPTER 18: INTEGRATION WITH GAME ENGINE (UE4)Chapter Goal: In this chapter, readers will learn about the process of exporting materials for game engine (Unreal Engine 4 in our case) as well as setting up the material inside the game engine for use.Sub-Topics• Exporting to Unreal Engine 4• Importing into Unreal Engine 4• Material setupCHAPTER 19: TIPS AND TRICKS OF SUBSTANCE PAINTERChapter Goal: In this final chapter, we will discuss some tips and tricks that will help speed up your work-flow or help you in creating something interesting.Sub-Topics• Some general tips• Integration of substance painter with Designer• Some tricks with tools• Substance painter use in media and entertainment industry
Robotic Process Automation
Sie planen Robotic Process Automation (RPA) im Unternehmen einzuführen und ihre administrativen Prozesse ins digitale Zeitalter zu überführen? Dieser pragmatische Ratgeber, bietet Ihnen praxisgerecht, komprimiert und auf den Punkt zusammengefasst Erfahrungen aus deutschen Unternehmen. Neben der Erläuterung der Vorteile und notwendigen Schritte zur Einführung der innovativen RPA Technologie, werden mögliche Anwendungsfelder näher beleuchtet.Worauf muss man bei der Implementierung und dem Betrieb achten, welche Stolpersteine gilt es zu umgehen, wie setze ich den ersten Software-Robot um und was ist notwendig für einen flächendeckenden, störungsfreien Einsatz? Wie bringt man die eigene Mitarbeiterbelegschaft und die Gremien hinter sein Vorhaben? Welchen Compliance- und Sicherheitsanforderungen muss RPA genügen? All diese Fragestellung werden in diesem Buch mit Beispielen, Checklisten und Illustrationen praxisnah beantwortet.CHRISTINA KOCH hat in ihrer Rolle als Projektleiterin bei einem DAX-Konzern in über 10 Jahren vielzählige Großprojekte eigenverantwortlich geleitet und erfolgreich umgesetzt – zuletzt die konzernweite Einführung von RPA. Hierbei profitierte sievom Austausch mit RPA-Experten diverser deutschen Industriegrößen und greift somit auf einen breiten Erfahrungsschatz aus erster Hand zurück. Christina Koch als die Autorin dieses Buches hat, basierend auf ihrer mehrjährigen praktischen RPA-Erfahrung in der deutschen Industrie, den Text und die Grafiken erarbeitet.DR. STEPHEN FEDTKE ist CTO des auf IT-Sicherheit und -Compliance spezialisierten Lösungsanbieters Enterprise-IT-security.com. Er hat das Manuskript unter Einsatz seiner fundierten IT-Expertise qualitätsgesichert.Roboter gehören in die Fertigungshallen, nicht ins Büro! Oder doch nicht?.- Der Leuchtturm-Robot – welche Schritte sind notwendig zur Einführung des ersten Robots?.- Der Rollout – wie führe ich RPA flächendeckend im Unternehmen ein?.- Wo kann die Reise hingehen und wann werden die Zukunftsvisionen im Bereich Business Process Automation real?.
Bauen, erleben, begreifen: fischertechnik®-Roboter mit Arduino
Arduino-Modellroboter zum Nachbauen und Selbermachen!* Baue mit fischertechnik und Arduino erstaunliche Modell-Roboter* Konstruiere ein Fernsteuer-Auto mit GPS-Navigation, einen schnellen Roboter-Arm und einen 2-D-Drucker* Entwickle deine eigen RoboterDer Arduino eröffnet für kleines Geld auch Programmier-Einsteigern die Welt der Robotik: Er ist ein universeller Steuerungs-Controller, an den sich unzählige Sensoren, Motoren und andere Aktoren anschließen lassen. Kombiniert mit dem Baukastensystem fischertechnik lassen sich so Modellroboter mit erstaunlicher Leistungsfähigkeit entwickeln.Das Buch zeigt an drei Grundmodellen die schier unbegrenzten Möglichkeiten solcher Arduino-gesteuerter fischertechnik-Roboter:- der "Plotter": ein hoch präziser und schneller 2D-Drucker, der HP-GL-Dateien einlesen und plotten kann,- der "Delta": ein Roboter-Arm, der Objekte mit hoher Geschwindigkeit greifen, sortieren und gegen den man Tic-Tac-Toe spielen kann,- der "Flitzer": ein Auto, das sich fernsteuern lässt oder auch selbständig einer Fahrbahn folgen, eine Parklücke finden, einparken sowie eine vorgegebene GPS-Position anfahren kann.Das Buch möchte zum Weiterbauen und Experimentieren anregen und enthält, neben einer Einführung in die verwendeten Arduino Shields und Sensoren, zahlreiche Ideen und Vorschläge, welche weiteren Modelle und Steuerungen sich aus diesen drei Grundmodellen konstruieren lassen.Dirk Fox ist Informatiker, Gründer und Geschäftsführer eines Beratungsunternehmens für IT-Sicherheit, Herausgeber einer Fachzeitschrift für Datenschutz und Datensicherheit, Vorstand eines großen IT-Netzwerks – und begeisterter "fischertechniker". Er gibt die fischertechnik-Zeitschrift "ft:pedia" heraus und setzt sich für den Ausbau des Technikunterrichts an deutschen Schulen ein – mit fischertechnik. Thomas Püttmann ist außerplanmäßiger Professor für Mathematik an der Ruhr-Universität Bochum. Zur Vermittlung von Themen aus den Bereichen Mathematik, Technik und Naturwissenschaften entwickelt er gezielt lehrreiche Modelle, wenn möglich aus fischertechnik. Als echter Mathematiker optimiert er seine Konstruktionen so lange, bis man keinen Stein mehr weglassen oder verschieben kann. Regelmäßig schreibt er Beiträge für die "ft:pedia".
Kubernetes in Action
Mit Kubernetes große Container-Infrastrukturen ausfallsicher verwaltenNach einer Einführung in die typischen Problemstellungen, mit denen Softwareentwickler und Administratoren konfrontiert sind, und wie diese mit Kubernetes gelöst werden können, lernen Sie in einem ersten Beispielprojekt die praktische Umsetzung. Es wird gezeigt, wie eine einfache in einem Container laufende Web-Applikation über ein Kubernetes-Cluster verwaltet werden kann. Im zweiten Teil des Buches lernen Sie die zu Grunde liegenden Konzepte kennen, deren Verständnis unbedingt notwendig ist, um große Container-Cluster mit Kubernetes zu betreiben. Im letzten Teil wird die Funktionsweise von Kubernetes beschrieben und auf weiterführende Aspekte eingegangen. Hier wird außerdem das erworbene Wissen aus den ersten beiden Teilen zusammengeführt, damit Sie den vollen Nutzen aus der Kubernetes-Plattform ziehen können. Marko Lukša ist Software Engineer bei Red Hat im Cloud Enablement Team. Das Team sorgt dafür, dass Red Hat's Enterprise Middleware-Produkte auf OpenShift funktionieren – eine PaaS-Plattform, die auf Kubernetes läuft. Durch seine 15-jährige Erfahrung als Trainer gelingt es ihm besonders gut schwierige Inhalte einfach und verständlich zu vermitteln.
Wie Business Intelligence das IT-Controlling vereinfacht. Einsatzpotentiale und Möglichkeiten der Automatisierung in IT-Unternehmen
In IT-Unternehmen ist das Controlling dafür zuständig, die Verwendung von IT-Ressourcen zu planen und somit die Entscheidung des Managements vorzubereiten. Business Intelligence stellt eine Möglichkeit dar, diese Entscheidungsfindung zu unterstützen: relevante Daten werden erhoben, zusammengefasst, ausgewertet und anschließend werden die Ergebnisse veranschaulicht. Welche Aufgaben hat das IT-Controlling konkret? Welchen Zweck verfolgt Business Intelligence? Und welche Prozesse im IT-Controlling können durch Business Intelligence automatisiert werden? Nur Üzümcü untersucht die Möglichkeiten von Business Intelligence im IT-Controlling. Dazu klärt sie wichtige Grundlagen zum Thema Business Intelligence und stellt Organisationskonzepte des IT-Controllings vor. Üzümcü geht in ihrer Publikation auf die Potentiale ein, die eine Automatisierung mit Hilfe der Business Intelligence mit sich bringt. Gleichzeitig benennt sie aber auch Herausforderungen, die eine Implementierung erschweren können. Aus dem Inhalt: - Digitalisierung; - Informationstechnologie; - Organisation; - Strategische Managemententscheidungen; - Datenintegration; - Kostenplanung
PCI DSS
Gain a broad understanding of how PCI DSS is structured and obtain a high-level view of the contents and context of each of the 12 top-level requirements. The guidance provided in this book will help you effectively apply PCI DSS in your business environments, enhance your payment card defensive posture, and reduce the opportunities for criminals to compromise your network or steal sensitive data assets.Businesses are seeing an increased volume of data breaches, where an opportunist attacker from outside the business or a disaffected employee successfully exploits poor company practices. Rather than being a regurgitation of the PCI DSS controls, this book aims to help you balance the needs of running your business with the value of implementing PCI DSS for the protection of consumer payment card data.Applying lessons learned from history, military experiences (including multiple deployments into hostile areas), numerous PCI QSA assignments, and corporate cybersecurity and InfoSec roles, author Jim Seaman helps you understand the complexities of the payment card industry data security standard as you protect cardholder data. You will learn how to align the standard with your business IT systems or operations that store, process, and/or transmit sensitive data. This book will help you develop a business cybersecurity and InfoSec strategy through the correct interpretation, implementation, and maintenance of PCI DSS.WHAT YOU WILL LEARN* Be aware of recent data privacy regulatory changes and the release of PCI DSS v4.0* Improve the defense of consumer payment card data to safeguard the reputation of your business and make it more difficult for criminals to breach security* Be familiar with the goals and requirements related to the structure and interdependencies of PCI DSS* Know the potential avenues of attack associated with business payment operations* Make PCI DSS an integral component of your business operations* Understand the benefits of enhancing your security culture* See how the implementation of PCI DSS causes a positive ripple effect across your businessWHO THIS BOOK IS FORBusiness leaders, information security (InfoSec) practitioners, chief information security managers, cybersecurity practitioners, risk managers, IT operations managers, business owners, military enthusiasts, and IT auditorsJAMES (JIM) SEAMAN has been dedicated to the pursuit of security for his entire adult life. He served 22 years in the RAF Police, covering a number of specialist areas including physical security, aviation security, information security management, IT security management, cybersecurity management, security investigations, intelligence operations, and incident response and disaster recovery. He has successfully transitioned his skills to the corporate environment and now works in areas such as financial services, banking, retail, manufacturing, e-commerce, and marketing. He helps businesses enhance their cybersecurity and InfoSec defensive measures and work with various industry security standards.CHAPTER 1: AN EVOLVING REGULATORY PERSPECTIVEOverview of the changes that have occurred in regard to personal data regulatory compliance and the implication for PCI DSS.· Data Privacy and PCI DSSCHAPTER 2: DATA THE ‘LIFE BLOOD’ OF BUSINESSUnderstand the true value of data to modern digital businessCHAPTER 3: AN INTEGRATED CYBER/INFOSEC STRATEGYDemonstrates the links between various Cyber/InfoSec terms· Synchronized Defenses:o Information Systems & Connected Technologieso Security Culture§ Roles§ Responsibilities· Complimentary Defense Nodeso Data Securityo Cyber Securityo Information Securityo Physical Securityo Resilience· Knowing you enemieso Tactics, Techniques and Protocols (TTPs)o External Threato Internal ThreatCHAPTER 4: THE IMPORTANCE OF RISK MANAGEMENTExplains the integral importance of risk management for an effective Cyber/InfoSec Strategy· Risk Management1. Vulnerability Management2. Threat Management3. Business Impact ManagementCHAPTER 5: COMPLIANCE VERSUS RISK—THE DIFFERENTIATORCHAPTER 6: THE EVOLUTION OF PCI DSSProvides an overview of the PCI DSS evolutionCHAPTER 7: PCI DSS APPLICABILITYExplains the purpose and benefits of PCI DSS· PCI DSS Overview1. Structure2. ScopingCHAPTER 8: AN INTRODUCTION TO PCI DSS CONTROLS FRAMEWORKDescribes the structure and interdependencies of PCI DSS· Six Goals1. Fortress Design2. Secure Silos3. Secure Maintenance4. Gate Keeping5. Routine Assurance6. People & Process· 12 RequirementsRequirement 12: People ManagementRequirement 1: Layering The NetworkRequirement 2: Secure By Design/DefaultRequirement 3: The VaultRequirement 4: Secure In MotionRequirement 5: Entry SearchRequirement 6: Build & MaintainRequirement 7: Role Based RestrictionsRequirement 8: Logical Entry ControlRequirement 9: Physical Entry ControlRequirement 10: DetectionRequirement 11: Assurance TestingCHAPTER 9: PAYMENT CHANNEL ATTACK VECTORSProvides an understanding of the potential avenues of attack, associated to a business’ payment operations· Online· Face To Face· Telephone-Based· 3rd PartiesCHAPTER 10: COMPLIANCE—A TEAM EFFORTRecommendations for making PCI DSS an integral component of business operations· In house· Outsourced· SharedCHAPTER 11: PIE FARM—A PROJECT MANAGED APPROACHProvides insight into a project managed approach to simplify Cyber/InfoSec strategiesCHAPTER 12: PROACTIVE DEFENSEProvides insight into the five pillars for Proactive DefenseCHAPTER 13: PEOPLE, PEOPLE, PEOPLEDescribes the benefits of enhancing the security culture.CHAPTER 14: THE RIPPLE EFFECTProvides a description on why the implementation of PCI DSS causes a positive ‘Ripple Effect’ across business.CHAPTER 15: QUICK FIRE ROUND—YOUR STARTER FOR 10The author’s response to commonly asked questionsAPPENDICES· Useful Resources
The Project Managers Guide to Microsoft Project 2019
Learn Microsoft Project 2019 from the perspective of the project manager.This guide is an all-in-one training resource and reference that covers all versions found in the Microsoft Project 2019 suite. It is not a “how-to” manual covering the features and functions of the software, but is designed to explain and demonstrate why those features and functions are important to you as a project manager, allowing you to maximize the value of Microsoft Project 2019.Each aspect of project-manager-specific coverage was selectively compiled by author and Microsoft Project expert Cicala over more than two decades of consulting, project management training, and managing real-world projects using Microsoft Project. Readers will appreciate the robust index and intuitively organized and learning-oriented chapters, and sub-sections for quick reference and problem solving. “Try it” exercises at the close of every chapter help ensure understanding of the content.WHAT YOU WILL LEARN* Understand key components to the Microsoft Project 2019 solution* Reinforce learning via hands-on exercises with step-by-step illustrations * Build a plan and work breakdown structure, and manage resources and assignments* Utilize enterprise project management for creating a project, monitoring, controlling, and tracking* Export and communicate project information to an external audienceWHO THIS BOOK IS FORProject managers with limited time and resources who need to maximize their efficiency with Microsoft ProjectAnswer keys and supporting PowerPoint slides are available for academic instructors upon request.GUS CICALA is the founder and CEO of Project Assistants, an Inc. 500 company founded in 1996. Project Assistants focuses on best practices, proven technology, and highly trained consultants who help companies optimize their business strategy. Gus and his team deliver process, technology, and people-based solutions across many industry verticals in the US and Western Europe and have been awarded Silver Competency in project and portfolio management by Microsoft. Gus specializes in Microsoft Project Server and online deployment, training, application development, and portfolio management consulting. He is a certified Microsoft Cloud and Office 365 partner.PART I: INTRODUCTION TO PROJECT MANAGEMENTChapter 1: IntroductionChapter 2: Understanding Project Management ConceptsChapter 3: Introduction to Microsoft Project 2019PART II: PROJECT DEFINITIONChapter 4: Understanding Project DefinitionChapter 5: Defining Your Project Using Microsoft Project 2019PART III: PROJECT TASK PLANNINGChapter 6: Developing a Work Breakdown StructureChapter 7: Building a Work Breakdown Structure with Microsoft Project 2019Chapter 8: Managing Project Resources and AssignmentsChapter 9: Using Microsoft Project 2019 to Optimize the PlanPART IV: ENTERPRISE PROJECT MANAGEMENTChapter 10: Creating Enterprise ProjectsChapter 11: Monitoring and Controlling – The Project Manager’s FunctionsChapter 12: Using Project Web Application for TrackingChapter 13: Other Features in Project Web ApplicationChapter 14: Variance Analysis, Plan Revision, and Project CommunicationChapter 15: Presenting Project Information with Microsoft Project 2019
Nutzerverhalten verstehen - Softwarenutzen optimieren
Software muss nicht nur technische Definitionen, Standards und Normen erfüllen, sondern von ihren Benutzern auch entsprechend wahrgenommen werden. Nutzer und Käufer erwarten eine bestimmte Leistung, die zu den eigenen Zielen passen muss und es ist Aufgabe der Softwareentwickler, diese Leistung zu liefern.Da es hierbei nie eine vollständige Passung geben kann, entsteht ein Kommunikationsproblem – ein Kommunikationsproblem zwischen Menschen, das noch zu selten ernstgenommen wird.Über bekannte Ansätze hinausgehend zeigt das Buch anhand vieler praxisnaher Beispiele ein Verfahren, mit dem Sie Kommunikationsprobleme während der Entwicklung von Software aufdecken und bearbeiten und mit dem Sie auch nach der Veröffentlichung Ihrer Software Möglichkeiten der Optimierung identifizieren können.Zusätzliche Fragen per App: Laden Sie die Springer Nature Flashcards-App kostenlos herunter und nutzen Sie exklusives Zusatzmaterial, um an weiteren Beispielen zu üben und Ihr Wissen zu prüfen.DR. MARIO DONICK ist Kommunikationswissenschaftler. Er studierte Germanistik und Geschichte an der Universität Rostock und war dort bis 2013 wissenschaftlicher Mitarbeiter am Institut für Informatik. 2016 erschien seine Dissertation zu Unsicherheit und Ordnung der Computernutzung. Seitdem arbeitet er im und zum technischen Kundenservice und ist Autor und Entwickler. Zuletzt erschien sein Sachbuch „Die Unschuld der Maschinen“.Einleitung: Was Software-Qualität mit menschlicher Kommunikation zu tun hat - Kommunikation bei der Software-Entwicklung - Über die Beziehung von Nutzer*in, Software und Nutzungssituation - Softwarenutzung strukturiert beobachten - Strukturelle Analyse der Beobachtungsdaten - Analyseergebnisse interpretieren: Software als Medium und Schnittstelle, Quality of Interaction und Gestaltungsnormen
Textverarbeitung für Studium und Ausbildung
Längere Schriftstücke bereiten oft einiges Kopfzerbrechen. Nicht nur beim fachlichen Inhalt, sondern auch bei Layout und Bearbeitungsfreundlichkeit. Denn das Schreiben kann selbst ganz einfach und glatt funktionieren und dabei noch super aussehen, wenn man nur richtig anfängt. Hier sehen wir uns alle Teile an, die für fachliche und wissenschaftliche Dokumente gebraucht werden: Formatvorlagen, Abbildungen, Inhaltsverzeichnisse, Deckblätter und Inhalte mit Überbreite, die im Text eingefügt werden müssen. Das alles in einer kompakten Form, von der ausgehend weitere Details bearbeitet werden können. Dazu dann noch Möglichkeiten, ein Dokument gemeinsam zu verfassen und dabei den Überblick zu behalten. Damit sich jeder Autor voll auf den Inhalt der Texte konzentrieren kann und sich nicht in Kleinkram verzettelt!Ina Koys ist langjährige Trainerin für MS-Office-Produkte. Viele Fragen werden in den Kursen immer wieder gestellt, aber selten in Fachbüchern behandelt. Einige davon beantwortet sie jetzt in der Reihe "kurz & knackig".
Developing Inclusive Mobile Apps
By failing to consider those with needs different to ourselves, we are telling these people they are not welcome in our app, and therefore that technology as a whole, is not for them. This is not hyperbole—23% of people in the US with a registered disability aren't online at all, that's three times more likely than the general population. When asked why they're not online, disabled respondents say their disability prevents them or that using the internet is too hard.To help your apps combat the issue of digital exclusion, this book covers considerations and tools mobile developers, or anyone creating mobile experiences, can use to make mobile work better for those with disabilities—mental or physical—and how to create a better experience for everyone.Software is not made up of cold, unthinking algorithms. Software is a craft in the truest sense of the word, and one of the greatest tools you can have as a craftsperson is empathy for the people who will be using your app. Each one of whom is an individual with different abilities, experiences, knowledge, and circumstances.WHAT YOU'LL LEARN* Create mobile experiences that work for as many people as possible* Incorporate a worldview of accessibility and customer service into your design* Work with accessibility tools and techniques commonly available for developersWHO THIS BOOK IS FORMobile developers working solo or as part of a team. UX designers, quality engineers, product owners, and anybody working in mobile.ROB WHITAKER is an iOS software development engineer at Capital One UK with a passion for improving digital experiences for everyone. He actively observes how people use technology, and considers how we can all make those interactions better. Currently he’s working on a project to make the Capital One UK app the first mobile app certified by the RNIB (Royal National Institute for Blind People).Chapter 1: What is Accessibility?• Intro to accessibility - great accessibility is a great experience for everyone• Intro to disability - ie, its not all visual• Why mobile is the best for accessible innovationChapter 2: What is Digital Inclusion?• Brief history of accessible thinking• Inclusive design & the persona spectrum• EmpathyChapter 3: Accessibility Tools on Android• Brief overview of the accessibility features & tools built into Android. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 4: Accessibility Tools for iOS• Brief overview of the accessibility features & tools built into iOS. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 5: Ensuring good accessibility• User research• Testing with accessibility toolsChapter 6: Visual Impairments• Practical tips for improving the experience for people with visual impairments• Including code snippetsChapter 7: Motor issues• Practical tips for improving the experience for people with motor issues• Including code snippetsChapter 8: Deaf & Hard of Hearing• Practical tips for improving the experience for people with auditory impairments• Including code snippetsChapter 9: Anxiety & Mental Health• Practical tips for improving the experience for people with visual mental health issues• Including code snippetsChapter 10: Dyslexia, Autism and Learning Difficulties• Practical tips for improving the experience for people with learning difficulties• Including code snippetsChapter 11: Poor Digital Skills• Good accessibility is not just about disability, but ability too• What skills are essential for digital life, and how do we measure up• Practical tips for improving the experience for people with poor digital skillsChapter 12: Life Circumstances• Good accessibility is not just about disability, but people's circumstances too• How circumstances such as low income, poor education etc can affect your digital interactions• Practical tips for improving the experience for people with with difficult life circumstancesChapter 13: Age, Gender & Sexuality• Theres a huge gap in digital use between 18 year olds, and those aged 60+.• How do we make sure we're not prejudicing based on age or experience, gender or sexuality when creating softwareChapter 14: Internationalization
C++20 Recipes
Discover the newest major features of C++20, including modules, concepts, spaceship operators, and smart pointers. This book is a handy code cookbook reference guide that covers the C++ core language standard as well as some of the code templates available in standard template library (STL).In C++20 Recipes: A Problem-Solution Approach, you'll find numbers, strings, dates, times, classes, exceptions, streams, flows, pointers, and more. Also, you'll see various code samples, templates for C++ algorithms, parallel processing, multithreading, and numerical processes. It also includes 3D graphics programming code. A wealth of STL templates on function objects, adapters, allocators, and extensions are also available.This is a must-have, contemporary reference for your technical library to help with just about any project that involves the C++ programming language.WHAT YOU WILL LEARN* See what's new in C++20Write modules * Work with text, numbers, and classes* Use the containers and algorithms available in the standard library* Work with templates, memory, concurrency, networking, scripting, and more* Code for 3D graphicsWHO THIS BOOK IS FORProgrammers with at least some prior experience with C++.DR. J. BURTON BROWNING earned his doctorate from North Carolina State University. He has conducted research in areas including: distance learning, programming, and instructional technology. As a life-long learner and someone who has interests in topics such as: programming, photography, robotics, car restoration, wood working, hunting, reading, fishing, and archery, he is never at a loss for something to do. The art and joy of serving as a professor suits his inquisitive nature. Dr. Browning’s previous publications include works on cross-functional learning teams (CFLT), The Utopian School (teacher-led school model), computer programming (several languages), open-source software, healthcare statistics and data mining, CNC plasma cutter operation, educational technology, biography, mobile learning, online teaching, and more.BRUCE SUTHERLAND is a video game programmer hailing from Dundee, Scotland. He graduated with a Bsc (Hons) Computer Games Technology from the University of Abertay, Dundee in Scotland, graduating in 2005. After graduating he began his first job in the games industry at 4J Studios where he worked on Star Trek: Encounters (PS2), The Elder Scrolls IV: Oblivion (PS3), Star Trek: Conquest (PS2, Wii), Ducati Moto (NDS) and AMF Pinbusters! (NDS). In July 2008 he moved from Dundee to Melbourne Australia where he joined Visceral Studios and was a software engineer on Dead Space (Xbox 360, PS3, PC), The Godfather II (Xbox 360, PS3, PC) and Dead Space 3 (Xbox 360, PS3, PC). He developed an interest in developing for Android in his spare time and writes tutorials on his blog.1. Beginning C++2. Modern C++3. Working with Text4. Working with Numbers5. Classes6. Inheritance7. The STL Containers8. The STL Algorithms9. Templates10. Memory11. Concurrency12. Networking13. Scripting14. 3D Graphics Programming
CCNP Enterprise Certification Study Guide: Implementing and Operating Cisco Enterprise Network Core Technologies
THE PRACTICAL AND CONCEPTUAL KNOWLEDGE YOU NEED TO ATTAIN CCNP ENTERPRISE CERTIFICATIONFrom one of the most trusted study guide publishers comes CCNP Enterprise Certification Study Guide: Exam 350-401. This guide helps you develop practical knowledge and best practices for critical aspects of enterprise infrastructure so you can gain your CCNP Enterprise certification. If you’re hoping to attain a broader range of skills and a solid understanding of Cisco technology, this guide will also provide fundamental concepts for learning how to implement and operate Cisco enterprise network core technologies.By focusing on real-world skills, each chapter prepares you with the knowledge you need to excel in your current role and beyond. It covers emerging and industry-specific topics, such as SD-WAN, network design, wireless, and automation. This practical guide also includes lessons on:● Automation● Network assurance● Security● Enterprise infrastructure● Dual-stack architecture● VirtualizationIn addition to helping you gain enterprise knowledge, this study guidecan lead you toward your Cisco specialist certification.When you purchase this guide, you get access to the information you need to prepare yourself for advances in technology and new applications, as well as online study tools such as:● Bonus practice exams● Pre-made flashcards● Glossary of key terms● Specific focus areasExpand your skillset and take your career to the next level with CCNP Enterprise Certification Study Guide.ABOUT THE AUTHORBEN PIPER is an IT consultant who has created more than 20 training courses, covering Cisco routing and switching, Amazon Web Services, Puppet configuration management, and Windows Server Administration. He is the co-author of AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam, AWS Certified Solutions Architect Study Guide: Associate (SAA-C01) Exam, AWS Certified SysOps Administrator Practice Tests: Associate (SOA-C01) Exam, and Learn Cisco Network Administration in a Month of Lunches.Introduction xxiAssessment Test xxviiiCHAPTER 1 NETWORKING FUNDAMENTALS 1The OSI Model 2The Upper Layers: Application, Presentation, and Session 4Making Sense of Layers 4The Lower Layers: Physical, Data Link, Network, and Transport 6Layer 1: The Physical Layer 7Layer 2: The Data Link Layer 8A Brief History of Ethernet 8The MAC Address Table 10Maximum Transmission Unit 12Subnet Limits 12Layer 3: The Network Layer 13Forwarding within a Subnet 14Forwarding between Subnets 14Address Resolution Protocol 16Fragmentation 17Routing vs. Forwarding 18Layer 4: The Transport Layer 18Transmission Control Protocol 19Encapsulation and Decapsulation 21Summary 22Exam Essentials 22Review Questions 24CHAPTER 2 SPANNING TREE PROTOCOLS 29The Need for Spanning Tree 31VLANs and Trunking 32Dynamic Trunking 34Unconditional Trunking 35Active and Allowed VLANs 36Rapid Per-VLAN Spanning Tree 38Electing the Root Bridge 38Calculating the Root Ports 41Calculating the Root Ports of Indirectly Connected Switches 44Modifying Port Cost 46Modifying Port Priority 47Calculating Blocked Ports 48Port States 49Port Roles 49Link Types 49Multiple Spanning Tree 50Root Bridges and Port Priority 52Internal Spanning Tree 53Native VLAN 54Topology Change Detection 55Spanning Tree Extensions 55Root Guard 55BPDU Guard and BPDU Filter 57Unidirectional Link Detection 58Loop Guard 58Summary 58Exam Essentials 59Exercises 60Review Questions 62CHAPTER 3 ENTERPRISE NETWORK DESIGN 67Physical Network Architectures 68Comparing Campus and Data Center Networks 69The Three-Tier Architecture 70The Two-Tier Collapsed Core: A Cheaper Alternative 73Layer 2 Design 74Switched and Routed Interfaces 75Switched Topologies 76Routed Access Topology 81EtherChannels 82Load-Balancing Methods 83Static EtherChannels 84Port Aggregation Control Protocol 88Link Aggregation Control Protocol 90First-Hop Redundancy Protocols 91Hot Standby Router Protocol 92Virtual Router Redundancy Protocol 94Gateway Load-Balancing Protocol 95Summary 97Exam Essentials 98Review Questions 100CHAPTER 4 WIRELESS LAN (WLAN) 105Radio Frequency Fundamentals 106Frequency and Amplitude 107Carrier Frequency 109Power Levels 110WLAN 802.11 Standards 115The Physical Layer: Frequencies and Channels 115Layer 2: 802.11 Media Access Control (MAC) 119Access Point Modes 124Autonomous 124Lightweight 124Wireless LAN Controller Selection Process 125Roaming and Location Services 126Roaming 126Location Services 128Summary 128Exam Essentials 129Review Questions 130CHAPTER 5 OPEN SHORTEST PATH FIRST (OSPF) 135Link-State Advertisements 136OSPF Areas 137LSA Types 137Neighbor Operations 141Configuring OSPF 142Configuring Area 0 on a Broadcast Network 142Viewing Neighbor Adjacencies 143Rigging the Designated Router Election 144Viewing and Understanding LSAs 146Authentication 154Passive Interfaces 158Injecting a Default Route 159Inter-Area Summarization 161Route Filtering 162Distribute Lists 162Summary 163Exam Essentials 164Exercises 164Review Questions 166CHAPTER 6 ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP) 171EIGRP Fundamentals 172EIGRP Packet Types 172The Diffusing Update Algorithm (DUAL) 173Weighted Metrics 176Configuring EIGRP 178Equal Cost Multipathing 181Modifying Metrics 182Switching Types 186Unequal Cost Multipathing 187Summary 190Exam Essentials 190Exercises 191Review Questions 192CHAPTER 7 THE BORDER GATEWAY PROTOCOL (BGP) 197BGP Fundamentals 198BGP AS Numbers 199BGP Session States 201Configuring BGP 202Advertising Prefixes 204Path Selection 205Route Redistribution among BGP, OSPF, and EIGRP 210Testing IP Reachability Using Tcl Scripts 214Troubleshooting 215Modifying Weight 218Advertising Summary Routes Using Route Aggregation 220Route Filtering Using Route Maps and Prefix Lists 222Summary 225Exam Essentials 226Exercises 226Review Questions 228CHAPTER 8 NETWORK ADDRESS TRANSLATION AND MULTICAST 233Network Address Translation 234Address Types 234Static NAT 236Dynamic NAT 241NAT Overload with Port Address Translation 247Outside Static NAT 250Removing NAT Configurations 251Multicast 252IP Multicast 253LAN Multicast 253Multicast Routing 257Configuring PIM 258Configuring a Multicast Receiver 262IP Multicast and Ethernet 264Summary 265Exam Essentials 267Exercises 268Review Questions 270CHAPTER 9 QUALITY OF SERVICE 275Understanding Quality of Service 276Classification and Marking 277Differentiated Services 277Layer 2 Marking 280Class Maps and Policy Maps 280Wireless QoS 281Policing 284Single-Rate, Two-Color Policing 284Single-Rate, Three-Color Policing 285Two-Rate Policing 287Queuing 288Class-Based Weighted Fair Queuing 288Low-Latency Queuing 293Explicit Congestion Notification 295Shaping 295Summary 297Exam Essentials 297Exercises 298Review Questions 299CHAPTER 10 NETWORK VIRTUALIZATION 303Virtual Machines, Hypervisors, and Network Virtualization 304Virtual Machines and Server Virtualization 305Network Virtualization 307Generic Routing Encapsulation Tunnels 312Configuring a GRE Tunnel to Tunnel IPv4 and IPv6 over IPv4 312Recursive Routing 318IP Security 319Internet Key Exchange 320Encapsulating Security Payload 320Configuring IPsec in Transport Mode with a GRE Tunnel 321Configuring IPsec in Tunnel Mode 324Location/ID Separation Protocol 326LISP Terminology 328Configuring LISP 328Simulating IP Mobility 332Is LISP a Routing Protocol? 334Virtual Extensible Local Area Network 334MAC Address Learning 335Forwarding 335Configuring VXLAN 336VXLAN Control Planes 336Configuring the Underlay 337Configuring the Overlay 338Configuring R1 and R2 339Virtual Routing and Forwarding 340Configuring a VRF 340Configuring Multi-VRF EIGRP 342Summary 345Exam Essentials 345Exercises 346Review Questions 347CHAPTER 11 SOFTWARE-DEFINED NETWORKING AND NETWORK PROGRAMMABILITY 353What Is Software-Defined Networking? 355Software-Defined Access 356SD-Access Layers 357Physical Layer 357Network Underlay 358Fabric Overlay 359Controller Layer 363Management Layer 364Software-Defined WAN 369vManage Network Management System 370vSmart Controller 370vBond Orchestrator 371vEdge Routers 371Network Programmability and Automation 372The Cisco DNA Center Intent API 372vManage REST API 379NETCONF 383Embedded Event Manager 386Configuration Management Platforms 388Summary 391Exam Essentials 391Exercises 392Review Questions 393CHAPTER 12 NETWORK SECURITY AND MONITORING 397Infrastructure Security 398Device Access 399Authentication, Authorization, and Accounting 402Access Control Lists 407Control Plane Policing 412Cisco Security Products 414AnyConnect Secure Mobility Client 414Umbrella 414Advanced Malware Protection ThreatGrid 414Advanced Malware Protection for Endpoints 415Firepower Next-Generation Firewall 415TrustSec 416MAC Security 418Wireless Security 418WebAuth 418Configuring WPA2 with 802.1X 422Configuring 802.1X on the Client 422Configure Preshared Keys 424Monitoring 425Conditional Debugs 425Simple Network Management Protocol (SNMP) 425Syslog 426Network Time Protocol 428NetFlow and Flexible NetFlow 429Switched Port Analyzer 432IP Service Level Agreement 434Summary 436Exam Essentials 437Exercises 438Review Questions 439Appendix Answers to Review Questions 443Chapter 1: Networking Fundamentals 444Chapter 2: Spanning Tree Protocols 445Chapter 3: Enterprise Network Design 447Chapter 4: Wireless LAN (WLAN) 448Chapter 5: Open Shortest Path First (OSPF) 450Chapter 6: Enhanced Interior Gateway Routing Protocol (EIGRP) 451Chapter 7: The Border Gateway Protocol (BGP) 453Chapter 8: Network Address Translation and Multicast 454Chapter 9: Quality of Service 456Chapter 10: Network Virtualization 457Chapter 11: Software-Defined Networking and Network Programmability 459Chapter 12: Network Security and Monitoring 460Index 463
Smarter Data Science
ORGANIZATIONS CAN MAKE DATA SCIENCE A REPEATABLE, PREDICTABLE TOOL, WHICH BUSINESS PROFESSIONALS USE TO GET MORE VALUE FROM THEIR DATAEnterprise data and AI projects are often scattershot, underbaked, siloed, and not adaptable to predictable business changes. As a result, the vast majority fail. These expensive quagmires can be avoided, and this book explains precisely how.Data science is emerging as a hands-on tool for not just data scientists, but business professionals as well. Managers, directors, IT leaders, and analysts must expand their use of data science capabilities for the organization to stay competitive. Smarter Data Science helps them achieve their enterprise-grade data projects and AI goals. It serves as a guide to building a robust and comprehensive information architecture program that enables sustainable and scalable AI deployments.When an organization manages its data effectively, its data science program becomes a fully scalable function that’s both prescriptive and repeatable. With an understanding of data science principles, practitioners are also empowered to lead their organizations in establishing and deploying viable AI. They employ the tools of machine learning, deep learning, and AI to extract greater value from data for the benefit of the enterprise.By following a ladder framework that promotes prescriptive capabilities, organizations can make data science accessible to a range of team members, democratizing data science throughout the organization. Companies that collect, organize, and analyze data can move forward to additional data science achievements:* Improving time-to-value with infused AI models for common use cases* Optimizing knowledge work and business processes* Utilizing AI-based business intelligence and data visualization* Establishing a data topology to support general or highly specialized needs* Successfully completing AI projects in a predictable manner* Coordinating the use of AI from any compute node. From inner edges to outer edges: cloud, fog, and mist computingWhen they climb the ladder presented in this book, businesspeople and data scientists alike will be able to improve and foster repeatable capabilities. They will have the knowledge to maximize their AI and data assets for the benefit of their organizations.NEAL FISHMAN is a Distinguished Engineer and CTO of Data-Based Pathology at IBM. He is an IBM-certified Senior IT Architect and Open Group Distinguished Chief Architect. COLE STRYKER is a journalist based in Los Angeles. He is the author of Epic Win for Anonymous and Hacking the Future. Foreword for Smarter Data Science xixEpigraph xxiPreamble xxiiiCHAPTER 1 CLIMBING THE AI LADDER 1Readying Data for AI 2Technology Focus Areas 3Taking the Ladder Rung by Rung 4Constantly Adapt to Retain Organizational Relevance 8Data-Based Reasoning is Part and Parcel in the Modern Business 10Toward the AI-Centric Organization 14Summary 16CHAPTER 2 FRAMING PART I: CONSIDERATIONS FOR ORGANIZATIONS USING AI 17Data-Driven Decision-Making 18Using Interrogatives to Gain Insight 19The Trust Matrix 20The Importance of Metrics and Human Insight 22Democratizing Data and Data Science 23Aye, a Prerequisite: Organizing Data Must Be a Forethought 26Preventing Design Pitfalls 27Facilitating the Winds of Change: How Organized Data Facilitates Reaction Time 29Quae Quaestio (Question Everything) 30Summary 32CHAPTER 3 FRAMING PART II: CONSIDERATIONS FOR WORKING WITH DATA AND AI 35Personalizing the Data Experience for Every User 36Context Counts: Choosing the Right Way to Display Data 38Ethnography: Improving Understanding Through Specialized Data 42Data Governance and Data Quality 43The Value of Decomposing Data 43Providing Structure Through Data Governance 43Curating Data for Training 45Additional Considerations for Creating Value 45Ontologies: A Means for Encapsulating Knowledge 46Fairness, Trust, and Transparency in AI Outcomes 49Accessible, Accurate, Curated, and Organized 52Summary 54CHAPTER 4 A LOOK BACK ON ANALYTICS: MORE THAN ONE HAMMER 57Been Here Before: Reviewing the Enterprise Data Warehouse 57Drawbacks of the Traditional Data Warehouse 64Paradigm Shift 68Modern Analytical Environments: The Data Lake 69By Contrast 71Indigenous Data 72Attributes of Difference 73Elements of the Data Lake 75The New Normal: Big Data is Now Normal Data 77Liberation from the Rigidity of a Single Data Model 78Streaming Data 78Suitable Tools for the Task 78Easier Accessibility 79Reducing Costs 79Scalability 79Data Management and Data Governance for AI 80Schema-on-Read vs. Schema-on-Write 81Summary 84CHAPTER 5 A LOOK FORWARD ON ANALYTICS: NOT EVERYTHING CAN BE A NAIL 87A Need for Organization 87The Staging Zone 90The Raw Zone 91The Discovery and Exploration Zone 92The Aligned Zone 93The Harmonized Zone 98The Curated Zone 100Data Topologies 100Zone Map 103Data Pipelines 104Data Topography 105Expanding, Adding, Moving, and Removing Zones 107Enabling the Zones 108Ingestion 108Data Governance 111Data Storage and Retention 112Data Processing 114Data Access 116Management and Monitoring 117Metadata 118Summary 119CHAPTER 6 ADDRESSING OPERATIONAL DISCIPLINES ON THE AI LADDER 121A Passage of Time 122Create 128Stability 128Barriers 129Complexity 129Execute 130Ingestion 131Visibility 132Compliance 132Operate 133Quality 134Reliance 135Reusability 135The xOps Trifecta: DevOps/MLOps, DataOps, and AIOps 136DevOps/MLOps 137DataOps 139AIOps 142Summary 144CHAPTER 7 MAXIMIZING THE USE OF YOUR DATA: BEING VALUE DRIVEN 147Toward a Value Chain 148Chaining Through Correlation 152Enabling Action 154Expanding the Means to Act 155Curation 156Data Governance 159Integrated Data Management 162Onboarding 163Organizing 164Cataloging 166Metadata 167Preparing 168Provisioning 169Multi-Tenancy 170Summary 173CHAPTER 8 VALUING DATA WITH STATISTICAL ANALYSIS AND ENABLING MEANINGFUL ACCESS 175Deriving Value: Managing Data as an Asset 175An Inexact Science 180Accessibility to Data: Not All Users are Equal 183Providing Self-Service to Data 184Access: The Importance of Adding Controls 186Ranking Datasets Using a Bottom-Up Approach for Data Governance 187How Various Industries Use Data and AI 188Benefi ting from Statistics 189Summary 198CHAPTER 9 CONSTRUCTING FOR THE LONG-TERM 199The Need to Change Habits: Avoiding Hard-Coding 200Overloading 201Locked In 202Ownership and Decomposition 204Design to Avoid Change 204Extending the Value of Data Through AI 206Polyglot Persistence 208Benefi ting from Data Literacy 213Understanding a Topic 215Skillsets 216It’s All Metadata 218The Right Data, in the Right Context, with the Right Interface 219Summary 221CHAPTER 10 A JOURNEY’S END: AN IA FOR AI 223Development Efforts for AI 224Essential Elements: Cloud-Based Computing, Data, and Analytics 228Intersections: Compute Capacity and Storage Capacity 234Analytic Intensity 237Interoperability Across the Elements 238Data Pipeline Flight Paths: Preflight, Inflight, Postflight 242Data Management for the Data Puddle, Data Pond, and Data Lake 243Driving Action: Context, Content, and Decision-Makers 245Keep It Simple 248The Silo is Dead; Long Live the Silo 250Taxonomy: Organizing Data Zones 252Capabilities for an Open Platform 256Summary 260Appendix Glossary of Terms 263Index 269
Emerging Extended Reality Technologies for Industry 4.0
In the fast-developing world of Industry 4.0, which combines Extended Reality (XR) technologies, such as Virtual Reality (VR) and Augmented Reality (AR), creating location aware applications to interact with smart objects and smart processes via Cloud Computing strategies enabled with Artificial Intelligence (AI) and the Internet of Things (IoT), factories and processes can be automated and machines can be enabled with self-monitoring capabilities. Smart objects are given the ability to analyze and communicate with each other and their human co-workers, delivering the opportunity for much smoother processes, and freeing up workers for other tasks. Industry 4.0 enabled smart objects can be monitored, designed, tested and controlled via their digital twins, and these processes and controls are visualized in VR/AR. The Industry 4.0 technologies provide powerful, largely unexplored application areas that will revolutionize the way we work, collaborate and live our lives. It is important to understand the opportunities and impact of the new technologies and the effects from a production, safety and societal point of view.JOLANDA G. TROMP is a Human-Computer Interaction expert for User-Centered design and evaluation of new technologies (VR/AR/AI/IoT), with 20 years' experience as principal Usability investigator. She has a PhD in Systematic Usability Design and Evaluation for Collaborative Virtual Environments, 2001, University of Nottingham, United Kingdom, a BSc in Psychology (with honors) University of Amsterdam, Holland (1995). She is a research consultant for the Center of Visualization and Simulation at Duy Tan University, Vietnam; for the Mixed Reality Task Group of the State University of New York; and for the global Simulations Working Group. DAC-NHUONG LE is PhD Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His areas of research include: evolutionary computation, specialized with evolutionary multiobjective optimization, approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, image processing in biomedical. His core work in evolutionary multi-objective optimization, network security, wireless, mobile computing and virtual reality. He has edited several books for the Wiley-Scrivener imprint. CHUNG VAN LE is Vice-Director Center of Visualization and Simulation. He has a MSc in Computer Science from Duy Tan University, 2011, Vietnam and a BSc in Computer Science at Da Nang University, 2004, Vietnam. He is currently pursuing a PhD at Duy Tan University, Vietnam. He researches medical image processing, e-Health, virtual simulation in medicine. He is Duy Tan University Lead Software Developer for 3D virtual body system for teaching anatomy and virtual endoscopic techniques for medical students. List of Figures xiList of Tables xvForeword xviiIntroduction xixPreface xxiiiAcknowledgments xxvAcronyms xxviiPART I EXTENDED REALITY EDUCATION1 MIXED REALITY USE IN HIGHER EDUCATION: RESULTS FROM AN INTERNATIONAL SURVEY 3J. Riman, N. Winters, J. Zelenak, I. Yucel, J. G. Tromp1.1 Introduction 41.2 Organizational Framework 41.3 Online Survey About MR Usage 51.4 Results 61.4.1 Use in Classrooms 81.4.2 Challenges 91.4.3 Examples of Research in Action 101.4.4 Hardware and Software for Use in Classrooms and Research 101.4.5 Challenges Described by Researcher Respondents 121.4.6 Anecdotal Responses about Challenges 121.5 Conclusion 13References 152 APPLYING 3D VR TECHNOLOGY FOR HUMAN BODY SIMULATION TO TEACHING, LEARNING AND STUDYING 17Le Van Chung, Gia Nhu Nguyen, Tung Sanh Nguyen, Tri Huu Nguyen, Dac-Nhuong Le2.1 Introduction 182.2 Related Works 182.3 3D Human Body Simulation System 192.3.1 The Simulated Human Anatomy Systems 192.3.2 Simulated Activities and Movements 202.3.3 Evaluation of the System 232.4 Discussion of Future Work 252.5 Conclusion 26References 26PART II INTERNET OF THINGS3 A SAFETY TRACKING AND SENSOR SYSTEM FOR SCHOOL BUSES IN SAUDI ARABIA 31Samah Abbas, Hajar Mohammed, Laila Almalki Maryam Hassan, Maram Meccawy3.1 Introduction 323.2 Related Work 323.3 Data Gathering Phase 333.3.1 Questionnaire 343.3.2 Driver Interviews 353.4 The Proposed Safety Tracking and Sensor School Bus System 363.4.1 System Analysis and Design 373.4.2 User Interface Design 383.5 Testing and Results 413.6 Discussion and Limitation 423.7 Conclusions and Future Work 42References 424 A LIGHTWEIGHT ENCRYPTION ALGORITHM APPLIED TO A QUANTIZED SPEECH IMAGE FOR SECURE IOT 45Mourad Talbi4.1 Introduction 464.2 Applications of IoT 464.3 Security Challenges in IoT 474.4 Cryptographic Algorithms for IoT 474.5 The Proposed Algorithm 484.6 Experimental Setup 504.7 Results and Discussion 524.8 Conclusion 57References 58PART III MOBILE TECHNOLOGY5 THE IMPACT OF SOCIAL MEDIA ADOPTION ON ENTREPRENEURIAL ECOSYSTEM 63Bodor Almotairy, Manal Abdullah, Rabeeh Abbasi5.1 Introduction 645.2 Background 655.2.1 Small and Medium-Sized Enterprises (SMEs) 655.2.2 Social Media 655.2.3 Social Networks and Entrepreneurial Activities 665.3 Analysis Methodology 665.4 Understanding the Entrepreneurial Ecosystem 675.5 Social Media and Entrepreneurial Ecosystem 695.5.1 Social Media Platforms and Entrepreneurship 715.5.2 The Drivers of Social Media Adoption 715.5.3 The Motivations and Benefits for Entrepreneurs to Use Social Media 715.5.4 Entrepreneurship Activities Analysis Techniques in Social Media Networks 715.6 Research Gap and Recommended Solution 735.6.1 Research Gap 735.6.2 Recommended Solution 745.7 Conclusion 74References 756 HUMAN FACTORS FOR E-HEALTH TRAINING SYSTEM: UX TESTING FOR XR ANATOMY TRAINING APP 81Zhushun Timothy Cai, Oliver Medonza, Kristen Ray, Chung Van Le, Damian Schofield, Jolanda Tromp6.1 Introduction 826.2 Mobile Learning Applications 826.3 Ease of Use and Usability 826.3.1 Effectiveness 836.3.2 Efficiency 836.3.3 Satisfaction 836.4 Methods and Materials 866.5 Results 896.5.1 Task Completion Rate (TCR) 896.5.2 Time-on-Task (TOT) 906.5.3 After-Scenario Questionnaire (ASQ) 916.5.4 Post-Study System Usability Questionnaire (PSSUQ) 936.6 Conclusion 93References 94PART IV TOWARDS DIGITAL TWINS AND ROBOTICS7 AUGMENTED REALITY AT HERITAGE SITES: TECHNOLOGICAL ADVANCES AND EMBODIED SPATIALLY MINDED INTERACTIONS 101Lesley Johnston, Romy Galloway, Jordan John Trench, Matthieu Poyade, Jolanda Tromp, Hoang Thi My7.1 Introduction 1027.2 Augmented Reality Devices 1037.3 Detection and Tracking 1057.4 Environmental Variation 1067.5 Experiential and Embodied Interactions 1097.6 User Experience and Presence in AR 1147.7 Conclusion 115References 1168 TELECI ARCHITECTURE FOR MACHINE LEARNING ALGORITHMS INTEGRATION IN AN EXISTING LMS 121V. Zagorskis, A. Gorbunovs, A. Kapenieks8.1 Introduction 1228.2 TELECI Architecture 1238.2.1 TELECI Interface to a Real LMS 1238.2.2 First RS Steps in the TELECI System 1248.2.3 Real Student Data for VS Model 1258.2.4 TELECI Interface to VS Subsystem 1268.2.5 TELECI Interface to AI Component 1288.3 Implementing ML Technique 1288.3.1 Organizational Activities 1288.3.2 Data Processing 1298.3.3 Computing and Networking Resources 1308.3.4 Introduction to Algorithm 1308.3.5 Calibration Experiment 1328.4 Learners’ Activity Issues 1338.5 Conclusion 136References 137PART V BIG DATA ANALYTICS9 ENTERPRISE INNOVATION MANAGEMENT IN INDUSTRY 4.0: MODELING ASPECTS 141V. Babenko9.1 Introduction 1429.2 Conceptual Model of Enterprise Innovation Process Management 1449.3 Formation of Restrictions for Enterprise Innovation Management Processes 1479.4 Formation of Quality Criteria for Assessing Implementation of Enterprise Innovation Management Processes 1489.5 Statement of Optimization Task of Implementation of Enterprise Innovation Management Processes 1489.6 Structural and Functional Model for Solving the Task of Dynamic 1509.7 Formulation of the Task of Minimax Program Management of Innovation Processes at Enterprises 1529.8 General Scheme for Solving the Task of Minimax Program Management of Innovation Processes at the Enterprises 1549.9 Model of Multicriteria Optimization of Program Management of Innovation Processes 1569.10 Conclusion 161References 16210 USING SIMULATION FOR DEVELOPMENT OF AUTOMOBILE GAS DIESEL ENGINE SYSTEMS AND THEIR OPERATIONAL CONTROL 165Mikhail G. Shatrov, Vladimir V. Sinyavski, Andrey Yu. Dunin, Ivan G. Shishlov, Sergei D. Skorodelov, Andrey L. Yakovenko10.1 Introduction 16610.2 Computer Modeling 16710.3 Gas Diesel Engine Systems Developed 16810.3.1 Electronic Engine Control System 16810.3.2 Modular Gas Feed System 16910.3.3 Common Rail Fuel System for Supply of the Ignition Portion of Diesel Fuel 16910.4 Results and Discussion 17210.4.1 Results of Diesel Fuel Supply System Simulation 17210.4.2 Results of Engine Bed Tests 18110.5 Conclusion 183References 184PART VI TOWARDS COGNITIVE COMPUTING11 CLASSIFICATION OF CONCEPT DRIFT IN EVOLVING DATA STREAM 189Mashail Althabiti and Manal Abdullah11.1 Introduction 19011.2 Data Mining 19011.3 Data Stream Mining 19111.3.1 Data Stream Challenges 19111.3.2 Features of Data Stream Methods 19311.4 Data Stream Sources 19311.5 Data Stream Mining Components 19311.5.1 Input 19411.5.2 Estimators 19411.6 Data Stream Classification and Concept Drift 19411.6.1 Data Stream Classification 19411.6.2 Concept Drift 19411.6.3 Data Stream Classification Algorithms with Concept Drift 19611.6.4 Single Classifier 19611.6.5 Ensemble Classifiers 19711.6.6 Output 20011.7 Datasets 20011.8 Evaluation Measures 20011.9 Data Stream Mining Tools 20111.10 Data Stream Mining Applications 20211.11 Conclusion 202References 20212 DYNAMICAL MASS TRANSFER SYSTEMS IN BUSLAEV CONTOUR NETWORKS WITH CONFLICTS 207Marina Yashina, Alexander Tatashev, Ivan Kuteynikov12.1 Introduction 20812.2 Construction of Buslaev Contour Networks 21012.3 Concept of Spectrum 21112.4 One-Dimensional Contour Network Binary Chain of Contours 21212.5 Two-Dimensional Contour Network-Chainmail 21412.6 Random Process with Restrictions on the Contour with the Possibility of Particle Movement in Both Directions 21812.7 Conclusion 218References 21913 PARALLEL SIMULATION AND VISUALIZATION OF TRAFFIC FLOWS USING CELLULAR AUTOMATA THEORY AND QUASIGASDYNAMIC APPROACH 223Antonina Chechina, Natalia Churbanova, Pavel Sokolov, Marina Trapeznikova, Mikhail German, Alexey Ermakov, Obidzhon Bozorov13.1 Introduction 22413.2 The Original CA Model 22413.3 The Slow-to-Start Version of the CA Model 22513.4 Numerical Realization 22513.5 Test Predictions for the CA Model 22913.6 The QGD Approach to Traffic Flow Modeling 23013.7 Parallel Implementation of the QGD Traffic Model 23213.8 Test Predictions for the QGD Traffic Model 23213.9 Conclusion 235References 236
Cloud Debugging and Profiling in Microsoft Azure
Use this collection of best practices and tips for assessing the health of a solution. This book provides detailed techniques and instructions to quickly diagnose aspects of your Azure cloud solutions.The initial chapters of this book introduce you to the many facets of Microsoft Azure, explain why and how building for the cloud differs from on-premise development, and outline the need for a comprehensive strategy to debugging and profiling in Azure. You learn the major types of blades (FaaS, SaaS, PaaS, IaaS), how different views can be created for different scenarios, and you will become familiar with the Favorites section, Cost Management & Billing blade, support, and Cloud Shell. You also will know how to leverage Application Insights for application performance management, in order to achieve a seamless cloud development experience. Application Insights, Log Analytics, and database storage topics are covered. The authors further guide you on identity security with Azure AD and continuous delivery with CI and CD covered in detail along with the capabilities of Azure DevOps. And you are exposed to external tooling and trouble shooting in a production environment.After reading this book, you will be able to apply methods to key Azure services, including App Service (Web Apps, Function Apps,and Logic Apps), Cloud Services, Azure Container Service, Azure Active Directory, Azure Storage, Azure SQL Database, Cosmos DB, Log Analytics, and many more.WHAT YOU WILL LEARN* Debug and manage the performance of your applications* Leverage Application Insights for application performance management* Extend and automate CI/CD with the help of various build tools, including Azure DevOps, TeamCity, and Cake bootstrapperWHO THIS BOOK IS FORApplication developers, designers, and DevOps personnel who want to find a one-stop shop in best practices for managing their application’s performance in the cloud and for debugging the issues accordinglyJEFFREY CHILBERTO is a software consultant specializing in the Microsoft technical stack, including Azure, BizTalk, MVC, WCF, and SQL Server. He has enterprise development experience in a wide range of industries, including banking, telecommunications, and healthcare in the USA, Europe, Australia, and New Zealand.SJOUKJE ZAAL is a managing consultant, Microsoft Cloud architect, and Microsoft Azure MVP with over 15 years of experience providing architecture, development, consultancy, and design expertise. She works at Capgemini, a global leader in consulting, technology services, and digital transformation.GAURAV ARORAA is a serial entrepreneur and startup mentor. He has a MPhil in computer science, and is a Microsoft MVP award recipient. He is a lifetime member of the Computer Society of India (CSI), an advisory member and senior mentor of IndiaMentor, certified as a Scrum trainer/coach, ITIL-F certified, and PRINCE-F and PRINCE-P certified. He is an open source developer, and a contributor to the Microsoft TechNet community. Recently, he was awarded the Icon of the Year for Excellence in Mentoring Technology Startups for the 2018-19 by Radio City, which is a Jagran Initiative, for his extraordinary work during his career of 22 years in the industry and the field of technology mentoring.ED PRICE is Senior Program Manager in Engineering at Microsoft, with an MBA in technology management. He ran Microsoft customer feedback programs for Azure Development and Visual Studio. He also was a technical writer at Microsoft for six years, helped lead TechNet Wiki, and now leads efforts to publish key guidance from AzureCAT (Customer Advisory Team).CHAPTER 1: Building Solutions in the Azure CloudCHAPTER GOAL: The first chapter will introduce the reader to the many facets of Microsoft Azure, why and how building for the cloud differs from on-prem development, and the need for a comprehensive strategy to debugging and profiling in Azure.We will cover the major types of blades (FaaS, SaaS, PaaS, IaaS).NO OF PAGES: 20SUB -TOPICS1. Microsoft Azure overview2. FaaS (Functions as a Service/Code as a Service) – a tour of Azure Functions and Logic Apps3. SaaS (Software as a Service) – Web Apps, Office3654. PaaS (Platform as a Service) – Cloud Services5. IaaS (Infrastructure as a Service) – Virtual Machines, SQL ServerChapter 2: The Azure PortalCHAPTER GOAL: The different Azure blades have many common features. This chapter will explore the Azure portal and some of the common features. The dashboard will be explained and how different views can be created for different scenarios. The Favorites section, the Cost Management & Billing blade, support, and Cloud Shell will all be introduced. The goal of the chapter is to get the reader comfortable with navigating the portal and feeling less overwhelmed, especially if this is the first time they’ve used the portal.NO OF PAGES: 35SUB - TOPICS1. Azure portal – what is a blade?2. Dashboard3. Navigation – favorites, subscription filtering, and searching4. You’re not alone – help and support5. Cost management6. Cloud shellChapter 3: Services in the CloudCHAPTER GOAL: Using examples in Azure Functions and Logic Apps, this chapter will provide an example of building an Azure Function and calling it from a Logic App. The logging and debugging capabilities will be explored in the appropriate blades.NO OF PAGES: 25SUB - TOPICS1. What is serverless?2. Azure Functions* Logic Apps* Using tags for billing Chapter 4: Application Insights and Log AnalyticsCHAPTER GOAL: Using the example built in Chapter 2, we will apply Application Insights and use it to monitor the solution.NO OF PAGES: 20SUB - TOPICS:1. Application Insights overview2. Adding to Azure Functions3. Adding Log Analytics to a Logic AppChapter 5: Databases and StorageCHAPTER GOAL: Building upon chapters 1 and 2, persistent storage will be incorporated into the example. Different implementations will be explored, including Azure SQL Database, Azure Cosmos DB, and Azure Storage Tables.NO OF PAGES: 25SUB - TOPICS:1. Azure SQL Database2. Azure Cosmos DB3. Azure Storage TablesCHAPTER 6: Azure Web AppCHAPTER GOAL: An Azure Web App will now be added to the example, and we’ll expand on the Application Insights capabilities, including custom events.NO OF PAGES: 20SUB – TOPICS:1. Overview of the Web App (functional)2. App Service blade overview – default and adding new graphs3. Diagnose and solve problemsChapter 7: Identity Security with Azure ADCHAPTER GOAL: Azure AD security will be added to the solution. OpenID will be used to secure the Azure Web App. The Logic App and Azure Function will be secured to only be accessible from the Web App (not directly to the user).NO OF PAGES: 20SUB – TOPICS:1. Overview of Azure AD2. Tracking user activity3. AD Connect Health4. AD reportingChapter 8: Continuous DeliveryCHAPTER GOAL: CI, CD will be covered. Capabilities of VSTS (covering Git, TFVC) will be shown, with the help of Build and Deployment. The chapter will focus on getting a better understanding of the state of a solution under change. What is currently deployed and where is it? How does VSTS and the Azure portal relate, and how can you get a complete view of the solution?NO OF PAGES: 25SUB – TOPICS:1. Introduction to VSTS2. Projects and dashboards3. Code – TFVC4. Code – Git5. Work, Wiki, Test – How these can be used to better understand the development process6. Build7. ReleaseChapter 9: External ToolingCHAPTER GOAL: Extend and automate CI, CD with the help of various build tools, viz. VSTS, TeamCity, and Cake bootstrapper.NO OF PAGES: 15SUB – TOPICS:1. Azure portal dashboard – widgets2. VSTS – pluginsChapter 10: Visualizing the Health of a SolutionCHAPTER GOAL: We cover troubleshooting in a production environment.NO OF PAGES: 18SUB – TOPICS:1. Remote combining reports for a complete picture2. Combining reports for a complete picture3. Disaster recovery and versioning of applications in a solution4. Enterprise reporting
Cybersecurity and Decision Makers
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization. Marie de Freminville is a non-executive director and founding partner of Starboard Advisory. She is also a member of the IFA (French Institute of non-executive Directors), HEC Governance and Swiss Association of Women Directors. In addition, de Freminville is an expert in governance, financial performance, risk mapping and data protection.Foreword xiPreface xiiiIntroduction xviiCHAPTER 1. AN INCREASINGLY VULNERABLE WORLD 11.1. The context 11.1.1. Technological disruptions and globalization 11.1.2. Data at the heart of industrial productivity 31.1.3. Cyberspace, an area without boundaries 31.1.4. IT resources 41.2. Cybercrime 41.2.1. The concept of cybercrime 41.2.2. Five types of threats 61.2.3. Five types of attackers 91.3. The cybersecurity market 151.3.1. The size of the market and its evolution 151.3.2. The market by sector of activity 151.3.3. Types of purchases and investments 161.3.4. Geographical distribution 171.4. Cyber incidents 171.4.1. The facts 171.4.2. Testimonials versus silence 241.4.3. Trends 251.4.4. Examples 271.5. Examples of particularly exposed sectors of activity 301.5.1. Cinema 301.5.2. Banks 311.5.3. Health 341.5.4. Tourism and business hotels 351.5.5. Critical national infrastructure 361.6. Responsibilities of officers and directors 37CHAPTER 2. CORPORATE GOVERNANCE AND DIGITAL RESPONSIBILITY 392.1. Corporate governance and stakeholders 392.2. The shareholders 402.2.1. Valuation of the company 412.2.2. Cyber rating agencies 422.2.3. Insider trading 432.2.4. Activist shareholders 442.2.5. The stock exchange authorities 452.2.6. The annual report 452.3. The board of directors472.3.1. The facts 472.3.2. The four missions of the board of directors. 472.3.3. Civil and criminal liability 492.3.4. The board of directors and cybersecurity 502.3.5. The board of directors and data protection 532.3.6. The statutory auditors 542.3.7. The numerical responsibility of the board of directors 552.4. Customers and suppliers 562.5. Operational management 582.5.1. The impacts of digital transformation 582.5.2. The digital strategy 592.5.3. The consequences of poor digital performance 622.5.4. Cybersecurity 632.5.5. Merger and acquisition transactions 652.5.6. Governance and data protection, cybersecurity 66CHAPTER 3. RISK MAPPING 693.1. Cyber-risks 693.2. The context 713.3. Vulnerabilities 723.3.1. Fraud against the president 733.3.2. Supplier fraud 733.3.3. Other economic impacts 743.4. Legal risks 763.4.1. Class actions 763.4.2. Sanctions by the CNIL and the ICO 773.5. The objectives of risk mapping 783.6. The different methods of risk analysis 793.7. Risk assessment (identify) 813.7.1. The main actors 813.7.2. The steps 823.8. Protecting 833.9. Detecting 833.10. Reacting 843.11. Restoring 853.12. Decentralized mapping 853.12.1. The internal threat 853.12.2. Industrial risks 873.12.3. Suppliers, subcontractors and service providers 883.12.4. Connected objects 893.13. Insurance 943.14. Non-compliance risks and ethics 96CHAPTER 4. REGULATIONS 994.1. The context 994.1.1. Complaints filed with the CNIL 1004.1.2. Vectaury 1014.1.3. Optical Center 1024.1.4. Dailymotion 1034.2. The different international regulations (data protection) 1034.2.1. The United States 1044.2.2. China 1044.2.3. Asia 1054.2.4. Europe 1054.3. Cybersecurity regulations, the NIS Directive 1054.4. Sectoral regulations 1064.4.1. The banking industry 1064.4.2. Health 1084.5. The General Data Protection Regulation (GDPR) 1094.5.1. The foundations 1104.5.2. Definition of personal data 1104.5.3. The so-called “sensitive” data 1114.5.4. The principles of the GDPR 1124.5.5. The five actions to be in compliance with the GDPR 1134.5.6. The processing register 1134.5.7. The five actions to be carried out 1134.5.8. Cookies 1164.6. Consequences for the company and the board of directors 117CHAPTER 5. BEST PRACTICES OF THE BOARD OF DIRECTORS 1195.1. Digital skills 1205.2. Situational awareness 1215.2.1. The main issues 1215.2.2. Insurance 1255.3. Internal governance 1265.3.1. The CISO 1265.3.2. The CISO and the company 1275.3.3. Clarifying responsibilities 1315.3.4. Streamlining the supplier portfolio 1335.3.5. Security policies and procedures 1345.3.6. The human being 1375.4. Data protection 1385.4.1. Emails 1395.4.2. The tools 1415.4.3. Double authentication: better, but not 100% reliable 1425.5. Choosing your service providers 1425.6. The budget 1435.7. Cyberculture 1445.8. The dashboard for officers and directors 145CHAPTER 6. RESILIENCE AND CRISIS MANAGEMENT 1476.1. How to ensure resilience? 1476.2. Definition of a CERT 1496.3. Definition of a SOC 1496.4. The role of ENISA 1506.5. The business continuity plan 1506.6. Crisis management 1516.6.1. The preparation 1516.6.2. Exiting the state of sideration 1526.6.3. Ensuring business continuity 1536.6.4. Story of the TV5 Monde attack 1546.6.5. Management of the first few hours 1596.7. Crisis simulation 163Conclusion. The Digital Committee 165APPENDICES 167Appendix 1. Cybersecurity Dashboard 169Appendix 2. Ensuring Cybersecurity in Practice and on a Daily Basis 173Appendix 3. Tools to Identify, Protect, Detect, Train, React and Restore 175Glossary 179References 183Index 187
Das Internet der Dinge und Künstliche Intelligenz als Game Changer
Das Internet der Dinge (IoT) und Künstliche Intelligenz (KI) bieten im Zuge der Digitalisierung große Chancen für innovative Geschäftsmodelle und Produktivitätssteigerungen von Unternehmen. Diese Chancen nutzen gegenwärtig vor allem die großen Digital-Champions und Startups. Umfassend und aktuell greifen die Autoren diese Herausforderung für etablierte Unternehmen auf. Zentrale These des Buches ist, dass diese digitalen Technologien die Spielregeln des Wettbewerbs grundlegend verändern und zu Game Changern werden. Die Autoren belegen dies in vier Blöcken: Im ersten Teil erläutern sie wichtige Begriffe. Im zweiten Teil beschreiben Timothy Kaufmann und Hans-Gerd Servatius die Entwicklung zum neuen Management 4.0-Paradigma und dessen Bausteine. Der dritte Teil beschäftigt sich mit dem Wandel der Informations- und Kommunikationstechnik hin zu einer durch IoT- und KI-Technologien geprägten digitalen Architektur. Der abschließende vierte Teil skizziert die Bausteine einer Innovationspolitik 4.0 für den digitalen Wandel, die den Rahmen für Management- und Architektur-Innovationen liefert.Dank klarer Gliederung, anschaulicher Erläuterung der neuen Konzepte und zahlreicher Beispiele aus der Praxis ist das Buch eine wichtige Orientierungshilfe für alle, die nach erfolgreichen Wegen zu einem Management 4.0 und einer digitalen Architektur suchen.TIMOTHY KAUFMANN arbeitet bei SAP als Business Development Director für neue Technologien. Er ist Mitinitiator der Open Industry 4.0 Alliance.PROF. DR. HANS-GERD SERVATIUS ist geschäftsführender Gesellschafter des Innovationsspezialisten Competivation. Daneben lehrt er an der Universität Stuttgart und der RWTH Aachen. Er ist Autor mehrerer Bücher und zahlreicher Fachartikel.Digitale Technologien verändern den Wettbewerb.- Das neue Management 4.0-Paradigma.- Digitale Geschäftsmodelle gemeinsam mit IoT- und KI-Plattformpartnern.- Integration der Objectives and Key Results (OKR-) Methode in agile Strategie- und Innovationsprozesse.- Digitaler Wandel in einer evolutionären Organisation.- Produktivitätssteigerung mit Künstlicher Intelligenz.- Eine IT-Architektur 4.0 unterstützt IoT und KI.- IoT- und KI-Architekturen.- Datengetriebene Services und die Architektur 4.0.- Geschäftsprozesse und die Architektur 4.0.- Das Wertversprechen und die Architektur 4.0.- IoT- und KI-Innovationsökosysteme und die Architektur 4.0.- Auf dem Weg zu einer Innovationspolitik 4.0.
Mobile Security
Das Buch bietet eine fundierte Einführung in die Chronologie bekannter Angriffe und Verwundbarkeiten auf mobile Systeme und dessen konzeptionelle Einordnung der letzten zwei Dekaden. So erhält der Leser einen einmaligen Überblick über die Vielfältigkeit nachweisbar ausgenutzter Angriffsvektoren auf verschiedenste Komponenten mobiler drahtloser Geräte sowie den teilweise inhärent sicherheitskritischen Aktivitäten moderner mobiler OS. Eine für Laien wie Sicherheitsarchitekten gleichermaßen fesselnde Lektüre, die das Vertrauen in sichere mobile Systeme stark einschränken dürfte.DIRK WESTHOFF kann auf nunmehr 25 Jahre Erfahrung im Bereich der IT-Sicherheit verweisen. Sowohl als Chief-Researcher innerhalb der Europäischen Forschungseinrichtung eines weltweit agierenden Elektronikkonzerns, als auch als Professor für Informationssicherheit an verschiedenen Hochschulen. Er ist Mitautor einer Reihe von Patenten sowie von ca. 90 Veröffentlichungen auf dem Gebiet der IT-Sicherheit.Verwundbarkeit von 802.15.4: PiP-Injektion.- Verwundbarkeit von WLAN: KRACK-Angriff auf WPA2.- Verwundbarkeit von Bluetooth: Blueborne und Co..-Verwundbarkeiten von NFC und durch NFC.- Angriffe über das Baseband.- Android Sicherheitsarchitektur.- Horizontale Rechteausweitung.-Techniken zu Obfuskierung und De-Obfuskierung von Apps.- Apps mit erhöhten Sicherheitsbedarf: Banking App.- Positionsbestimmung durch Swarm-Mapping.- Seitenkanäle zur Überwindung des ‚Air-gap‘.- Ausblick: 5G Sicherheitsarchitektur.- .
Introducing the HTML5 Web Speech API
Leverage the power of HTML5 Web Speech API to quickly add voice capabilities to your websites. This project-oriented book simplifies the process of setting up and manipulating the API in the browser using little more than a text editor or free software.You'll be presented with a starting toolset that you can use to develop future projects, incorporate into your existing workflow and allow you to take your websites to the next level, reducing the reliance on entering choices through a keyboard and making the overall experience easier for customers.This excellent resource is perfect for getting acquainted with creating and manipulating browser-based APIs. You don’t have to convert your whole work process immediately; you can incorporate as little or as much as you want of the API, and build on this as your skills develop. We live in an age where speed and simplicity are of the essence – this book provides a perfect way to add speech capabilities to our websites, directly in the browser and with the minimum of fuss.Introducing the HTML5 Web Speech API is the right choice for developers who want to focus on simplicity to produce properly optimized content in modern browsers using tools already in their possession.WHAT YOU'LL LEARN* Implement the Web Speech API in a project* Explore some of the options for personalizing them for a project* Gain an appreciation of pointers around user experience and how this affects the API* Understand how to manage issues and security when using the API* Work through some example projects, from standalone demos to implementing with other tools or librariesWHO THIS BOOK IS FORWebsite developers who are already familiar with JavaScript, and are keen to learn how to leverage the Web Speech API to quickly add voice-enabled capabilities to a website, using little more than a text editor. It’s ideal for those in agile development teams, where time is of the essence, and the pressure is on to deliver results quickly.ALEX LIBBY is a front end engineer and seasoned computer book author, who hails from England. His passion for all things Open Source dates back to the days of his degree studies, where he first came across web development, and has been hooked ever since. His daily work involves extensive use of JavaScript, HTML and CSS to manipulate existing website content; Alex enjoys tinkering with different open source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library, and enjoys writing about Open Source technologies, principally for front end UI development.1. Getting Started2. Exploring the APIs in More Detail3. Supporting Mobile Devices4. Combining the APIs- Building a ChatBot5. Project- Leaving Review Feedback6. Project- Building Alexa7. Project- Finding a Restaurant8. Project- Finding and Playing Music9. Project- Automating the Purchase ProcessAppendix: API Reference
eLearning und Mobile Learning - Konzept und Drehbuch
In dem Praxishandbuch beschreibt die Autorin, wie ein Drehbuch nach lernpsychologischen und didaktischen Kriterien erstellt werden kann. Sie stellt Werkzeuge für das Konzipieren und Schreiben vor und evaluiert sie. Das Buch und die begleitende Website bieten zahlreiche Hilfsmittel: u. a. eine Checkliste zur Prüfung des fertigen Drehbuchs und eine Qualitätssicherungsmaßnahme, die Zeit und Kosten spart. Die Neuauflage wurde durchgehend aktualisiert. Für Projektleiter in Multimediaagenturen, Fachleute in Unternehmen sowie (zukünftige) Drehbuchautoren.DANIELA MODLINGER M.A. ist seit 1990 in der Verlags- und Multimedia-Branche tätig. Seit dem Jahr 2000 arbeitet sie als Medienautorin und Beraterin für eLearning-Anwendungen im institutionellen und betrieblichen Bildungswesen und bietet außerdem Inhouse-Schulungen zum Thema „Konzeption und Drehbuchschreiben für eLearning und Mobile Learning“ an. Ihre reiche Praxiserfahrung aus zahlreichen Projekten und ihrer weiterhin aktiven Unterrichtstätigkeit ist in dieses Buch eingeflossen.Wie kommt das Drehbuch vom Film zum eLearning - Wer bezieht Stellung bei der Produktion von eLearning - Briefing – welche Inhalte sollen ins Drehbuch? - Konzeption – wie kommt Struktur in die Inhalte? - Was macht ein gutes eLearning-Drehbuch aus? - Mobile Learning – Konzept und Drehbuch - Wie organisiere ich die Arbeit am Drehbuch? - Woran erkenne ich einen guten Medienautor? - Weiterführende Informationen - Checklisten - Glossar
Deep Learning kompakt für Dummies
Wollen Sie sich über Deep Learning informieren und vielleicht erste kleine Schritte machen, diese Technologie zu nutzen? Dann hilft Ihnen dieses Buch. Die Autoren erklären Ihnen, welchen Einfluss Deep Learning im Alltag hat und in welcher Beziehung es zu maschinellem Lernen steht. Sie sammeln erste eigene Erfahrungen mit vorgegebenen Python-Programmen und verstehen so die Funktionsweise von neuronalen Netzen und wie Bilder klassifiziert und Sprache sowie Text verarbeitet werden. So ist dieses Buch ein schneller erster und verständlicher Einstieg in Deep Learning. John Paul Mueller ist freier Autor und technischer Redakteur. Er hat das Schreiben im Blut. Bis heute hat er 100 Bücher und mehr als 600 Zeitschriftenartikel geschrieben. Seine Themen reichen von Netzwerken bis Haussicherheit und von Datenbankmanagement bis Programmierung.Luca Massaron ist Data Scientist und spezialisiert auf die Aufbereitung und Analyse von Big Data. Er beherrscht die einfachsten und effektivsten Data-Mining- und Maschinelles-Lernen-Techniken und macht so aus Big Data Smart Data. Als Marketing-Consultant und -Forscher hat er seit dem Jahr 2000 mit Data Science zu tun, mit verschiedenen Kunden und in verschiedenen Märkten. Er ist Top-Ten-Kaggle-Data-Scientist.ÜBER DIE AUTOREN9Widmung von John Mueller 9Widmung von Luca Massaron 10Danksagung von John Mueller 10Danksagung von Luca Massaron 10EINFÜHRUNG21Über dieses Buch 21Törichte Annahmen über den Leser 23Symbole, die in diesem Buch verwendet werden 23Weitere Ressourcen 24Wie es weitergeht 24TEIL I: EINFÜHRUNG IN DEEP LEARNING 27KAPITEL 1 EINFÜHRUNG IN DEEP LEARNING29Definition von Deep Learning 30Künstliche Intelligenz als Oberbegriff 30Die Rolle der KI 32Maschinelles Lernen als Teil der KI 35Deep Learning als Form des maschinellen Lernens 37Deep Learning in der Praxis 39Der Prozess des Lernens 39Aufgabenbewältigung mit Deep Learning 39Deep Learning als Bestandteil größerer Anwendungen 40Programmierumgebung für Deep Learning 40Deep Learning: Hype vs Realität 43Ihre ersten Schritte 43Ungeeignete Szenarien für Deep Learning 43KAPITEL 2 MASCHINELLES LERNEN45Definition von maschinellem Lernen 45Funktionsweise von maschinellem Lernen 46Lernen durch unterschiedliche Strategien 47Training, Validierung und Test 49Suche nach Generalisierungen 51Der Einfluss von Bias 51Beachtung der Komplexität des Modells 52Lernstrategien und Arten von Algorithmen 52Fünf wesentliche Strategien 53Verschiedene Arten von Algorithmen 54Sinnvolle Einsatzbereiche für maschinelles Lernen 59Anwendungsszenarien für maschinelles Lernen 59Die Grenzen des maschinellen Lernens 62KAPITEL 3 INSTALLATION UND VERWENDUNG VON PYTHON65Verwendung von Python in diesem Buch 66Installation von Anaconda 66Anaconda von Continuum Analytics 67Installation von Anaconda unter Linux 67Installation von Anaconda unter Mac OS X 68Installation von Anaconda unter Windows 70Jupyter Notebook 72Verwendung von Jupyter Notebook 73Verwendete Datensätze in diesem Buch 79Erstellen einer Anwendung 81Die Arbeit mit Zellen 81Hinzufügen von Dokumentationszellen 82Andere Zellarten 83Einrückung von Codezeilen 83Hinzufügen von Kommentaren 85Weitere Informationen zu Python 88Arbeiten in der Cloud 89Verwendung der Datensätze und Kernels von Kaggle 89Verwendung von Google Colaboratory 89KAPITEL 4 FRAMEWORKS FÜR DEEP LEARNING93Das Framework-Prinzip 94Unterschiede zwischen Frameworks 94Hohe Beliebtheit von Frameworks 95Frameworks speziell für Deep Learning 96Auswahl eines Frameworks 97Einfache Frameworks für Deep Learning 98Kurzvorstellung von TensorFlow 101TEIL II: GRUNDLAGEN VON DEEP LEARNING 113KAPITEL 5 RECHNEN MIT MATRIZEN115Nötige mathematische Grundlagen 116Die Arbeit mit Daten 116Matrixdarstellung von Daten 117Skalar-, Vektor- und Matrixoperationen 118Erzeugung einer Matrix 119Multiplikation von Matrizen 121Fortgeschrittene Matrixoperationen 123Datenanalysen mit Tensoren 125Effektive Nutzung von Vektorisierung 127Der Lernprozess als Optimierung 128Kostenfunktionen 128Minimierung des Fehlers 129Die richtige Richtung 130KAPITEL 6 GRUNDLAGEN DER LINEAREN REGRESSION133Kombination von Variablen 134Die einfache lineare Regression 134Die multiple lineare Regression 135Verwendung des Gradientenabstiegs 137Die lineare Regression in Aktion 138Vermischung von Variablen unterschiedlichen Typs 140Modellierung der Antworten 140Modellierung der Merkmale 141Umgang mit komplexen Zusammenhängen 142Nutzung von Wahrscheinlichkeiten 144Spezifikation einer binären Antwort 144Umwandlung numerischer Schätzungen in Wahrscheinlichkeiten 145Schätzung der richtigen Merkmale 148Irreführende Ergebnisse durch inkompatible Merkmale 148Vermeidung einer Überanpassung durch Merkmalsauswahl und Regularisierung 149Lernen aus einzelnen Beispielen 150Verwendung des Gradientenabstiegs 150Stochastisches Gradientenabstiegsverfahren 151KAPITEL 7 EINFÜHRUNG IN NEURONALE NETZE155Das faszinierende Perzeptron 156Höhen und Tiefen des Perzeptrons 156Die Funktionsweise des Perzeptrons 157Trennbare und nicht trennbare Daten 158Komplexere Lernverfahren und neuronale Netze 160Das Neuron als Grundbaustein 160Vorwärtsausrichtung in Feedforward-Netzen 162Schichten und noch mehr Schichten 164Lernen mittels Rückwärtspropagierung 167Vermeidung von Überanpassung 170KAPITEL 8 ENTWURF EINES EINFACHEN NEURONALEN NETZES173Grundlegende Funktionsweise neuronaler Netze 173Definition der grundlegenden Architektur 175Die wichtigsten Funktionen eines neuronalen Netzes 176Lösen eines einfachen Problems 180Ein Blick ins Innere von neuronalen Netzen 183Auswahl der richtigen Aktivierungsfunktion 183Auswahl eines cleveren Optimierers 185Auswahl einer sinnvollen Lernrate 186KAPITEL 9 DEEP LEARNING IM DETAIL187Daten, Daten, Daten 188Strukturierte und unstrukturierte Daten 188Mooresches Gesetz 189Datenwachstum infolge des mooreschen Gesetzes 191Vorteile durch all die neuen Daten 191Innovationen dank Daten 192Rechtzeitigkeit und Qualität von Daten 192Mehr Tempo bei der Datenverarbeitung 193Nutzung leistungsstarker Hardware 194Weitere Investitionen in Deep Learning 195Neuerungen von Deep Learning 195Immer mehr Schichten 196Bessere Aktivierungsfunktionen 198Regularisierung durch Dropout 199Die Suche nach noch smarteren Lösungen 201Kontinuierliches Lernen (Online Learning) 201Übertragung von Wissen (Transfer Learning) 201Simple Komplettlösungen (End-to-End Learning) 202KAPITEL 10 KONVOLUTIONSNETZE205Bilderkennung mit Konvolutionsnetzen 206Grundsätzlicher Aufbau von digitalen Bildern 206Konvolutionen (Faltungen) 208Funktionsprinzip von Konvolutionen 209Vereinfachtes Pooling 212Beschreibung der LeNet-Architektur 214Erkennung von Kanten und Formen in Bildern 219Visualisierung von Konvolutionen 220Einige erfolgreiche Architekturen 222Übertragung von Wissen (Transfer Learning) 223KAPITEL 11 REKURRENTE NEURONALE NETZE227Einführung in rekurrente neuronale Netze 227Modellierung von Sequenzen durch Erinnerung 228Erkennung und Übersetzung von Sprache 230Korrekte Beschriftung von Bildern 233LSTM-Zellen (Long Short-Term Memory) 234Unterschiedliche »Gedächtnisse« 235Die LSTM-Architektur 235Verschiedene LSTM-Varianten 238Der Aufmerksamkeitsmechanismus 239TEIL III: ANWENDUNG VON DEEP LEARNING 241KAPITEL 12 BILDKLASSIFIKATION 243Herausforderungen bei der Bildklassifikation 244ImageNet und Alternativen 244Erstellen von Zusatzbildern (Image Augmentation) 246Unterscheidung von Verkehrszeichen 249Vorbereitung der Bilddaten 250Durchführen einer Klassifikation 253KAPITEL 13 KOMPLEXE KONVOLUTIONSNETZE259Unterschiedliche Aufgaben beim Erkennen von Objekten im Bild 260Lokalisierung von Objekten 261Klassifikation mehrerer Objekte 262Annotation mehrerer Objekte in Bildern 263Segmentierung von Bildern 264Wahrnehmung von Objekten in ihrer Umgebung 265Funktionsweise von RetinaNet 266Verwendung des Codes von Keras RetinaNet 267Böswillige Angriffe auf DL-Anwendungen 272Heimtückische Pixel 274Hacking mit Stickern und anderen Artefakten 275KAPITEL 14 SPRACHVERARBEITUNG277Verarbeitung von Sprache 278Verstehen durch Tokenisierung 279Zusammenführen aller Texte 281Auswendiglernen von wichtigen Sequenzen 284Semantikanalyse durch Worteinbettungen 284KI für Stimmungsanalysen 289KAPITEL 15 AUTOMATISCH ERZEUGTE MUSIK UND VISUELLE KUNST297Computergenerierte Kunst 298Nachahmung eines künstlerischen Stils 298Statistische Verfahren als Grundlage 300Der Unterschied zwischen Kreativität und Deep Learning 302Imitation eines Künstlers 303Neue Werke im Stile eines bestimmten Malers 303Kombination von Stilen zum Erzeugen neuer Werke 305Überzeugende Imitate mit einem GAN 305Musikkomposition mit Deep Learning 306KAPITEL 16 GENERATIVE ADVERSARIAL NETWORKS309Konkurrierende neuronale Netze 310Wettbewerb als Schlüssel zum Erfolg 310Realistischere Ergebnisse 313Komplexere GANs für anspruchsvollere Aufgaben 320Realistische Imitate von Promigesichtern 321Mehr Bilddetails und Bildübersetzung 321KAPITEL 17 VERSTÄRKENDES LERNEN MIT DEEP LEARNING 323Strategische Spiele mit neuronalen Netzen 324Grundprinzip des verstärkenden Lernens 324Simulierte Spielumgebungen 326Q-learning 330Funktionsweise von AlphaGo 333Eine echte Gewinnerstrategie 335Selbstständiges Lernen in großem Stil 337TEIL IV: DER TOP-TEN-TEIL 339KAPITEL 18 ZEHN ANWENDUNGSSZENARIEN FÜR DEEP LEARNING341Kolorieren von Schwarz-Weiß-Aufnahmen 341Analyse der Körperhaltung in Echtzeit 342Verhaltensanalysen in Echtzeit 343Übersetzung von Sprachen 344Einsparungen mit Solaranlagen 345Computer als Spielgegner 345Erzeugung von Stimmen 346Demografische Analysen 347Kunst basierend auf normalen Fotos 348Vorhersage von Naturkatastrophen 348KAPITEL 19 ZEHN UNVERZICHTBARE TOOLS FÜR DEEP LEARNING351Kompilieren von mathematischen Ausdrücken mit Theano 351Stärkung von TensorFlow mit Keras 352Dynamische Berechnung von Graphen mit Chainer 353Einrichtung einer MATLAB-ähnlichen Umgebung mit Torch 354Dynamische Ausführung von Aufgaben mit PyTorch 354Schnellere DL-Forschung dank CUDA 355Geschäftliche Erfolge mit Deeplearning4j 357Data-Mining mit Neural Designer 358Algorithmentraining mit Microsoft Cognitive Toolkit (CNTK) 359Volle GPU-Leistung mit MXNet 359Stichwortverzeichnis 361
Building React Apps with Server-Side Rendering
Leverage the benefits of both client-side and server-side rendering to get the most out of your React applications. By the end of this book you will be able to build and deploy React applications using the Next.js framework to fully render server-side HTML on every Web page.You'll begin by reviewing JavaScript fundamentals and how they work with the core principles of React. You'll then move on to Next.js, the React framework for server-rendered applications. Using this framework, you will create a fast and secure solutional React application that renders content on the server-side, protects sensitive information, and optimizes response times. Before deploying the application using Docker containers, you'll create automated unit tests to verify that every component is appropriately doing its jobBuilding React Apps with Server-Side Rendering also covers other fun and interesting topics such as Bootstrap 4, JSX (JavaScript XML), adding styling to your React applications, and much more. By the end of this book, you will be able to build and deploy React applications that fully render server-side HTML on every page. In the end you'll have a client-side rendered React application that integrates server-side rendering into it using Next.js framework.WHAT YOU'LL LEARN* Examine fundamental concepts of JavaScript (ES 2015)* Create client-side apps using JavaScript frameworks React and Redux* Add server-side rendering to React apps using the NextJS FrameworkWHO THIS BOOK IS FORWeb developers who have prior experience in working with JavaScript, HTML and CSS, who wish to step up a level and create better web applications using modern JavaScript frameworks like React, Reduct & Next.MOHIT THAKKAR is a Software Engineer with a multinational company. He has published five books and a research paper in the International Journal of Advanced Research in Management, Architecture, Technology and Engineering.Chapter 1, JavaScript FundamentalsChapter Goal:· Introduction to JavaScript· Constants· Variable Declaration· Rest Parameters· Spread Syntax· Destructuring· Control Loops· Type Conversion· Operators· Functions· Closures· Arrays· Classes & Modules· DOM Modification· Error Handling· HTTP Requests· Promises· Form Handling in JSChapter 2, Introducing React.jsChapter Goal:· Installing Node.js· Installing React· Basic Concepts of Reacto Single Page Applicationso Immutabilityo Purityo Compositiono Presentational vs Container Componentso Eventso Form Handling in Reacto Hooks· React Element using JavaScript· React Element using JSX· Stateless & Stateful React Components· Creating Your First React Component· Working with Data· AJAX Calls· Working with the State Object· Styling React Componentso CSS in Reacto SASS in Reacto Styled Components· Babel· WebpackChapter 3, Next.jsChapter Goal:· Introduction to Next.js· Features of Next.js· Getting Started· Routing in Next.js· Dynamic Loading· Adding Multimedia Content· Creating Interactive App using Next.js· Configuring Webpack & Babel· Getting Data from Remote Server· Using Redux with Next.js· Using GraphQL with Next.jsChapter 4, Adding Server-Side Rendering to Your React ApplicationChapter Goal:· Importance of Server-Side Rendering· Building a Simple React App· Using DOM to Post Content· Using React Calls to Post Content· Creating Functional React Component· Passing Props to Functional React Component· Converting Functional Component to Class Component· Using JSX & Next.js for Server-Side Rendering· Adding CSS to Next.js· Integrating Bootstrap 4 to Your AppChapter 5, Unit Testing using JestChapter Goal:· Setting Up Jest· Writing Your First Test Using Jest· Matchers· Using Enzyme to Access React DOM· Testing a React ComponentChapter 6, Deploying Your App to a ServerChapter Goal:· Deployment Basics· Setting up Environment Variables· Introduction to Docker· Creating a Docker Container for Your App· Hosting the Container
Tribe of Hackers Security Leaders
TRIBAL KNOWLEDGE FROM THE BEST IN CYBERSECURITY LEADERSHIPThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including:* What’s the most important decision you’ve made or action you’ve taken to enable a business risk?* How do you lead your team to execute and get results?* Do you have a workforce philosophy or unique approach to talent acquisition?* Have you created a cohesive strategy for your information security program or business unit?Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.MARCUS J. CAREY is a cybersecurity researcher and inventor with patents in cryptography and cybersecurity and over 25 years of experience in protecting the public, private, and government sectors. He was the Founder and CEO of Threatcare which was acquired by ReliaQuest. Follow Marcus on Twitter at @marcusjcarey. JENNIFER JIN graduated from The University of Texas at Austin in 2017 and started her first job at Threatcare soon after. She became Threatcare's Head of Communications and Marketing before Threatcare was acquired by ReliaQuest. Jennifer is now the Product Marketing Manager at Mio and is the co-author of Tribe of Hackers. Follow Jennifer on Twitter at @jen_jin. Acknowledgments viiIntroduction viii01 Marcus J. Carey 102 Ian Anderson 603 James Arlen 1404 Mark Arnold 2505 Andrew Bagrin 3106 Zate Berg 3607 Tash Bettridge 4608 Philip Beyer 5009 Kyle Bubp 5810 Joanna Burkey 6411 Bill Burns 7012 Lesley Carhart 7813 Christopher Caruso 8314 Mike Chapple 9115 Steve Christey Coley 9816 Jim Christy 10217 Chris Cochran 11018 Edward Contreras 11419 Dan Cornell 11720 Mary Ann Davidson 12421 Kimber Dowsett 13222 David Evenden 13623 Martin Fisher 14124 Chris Hadnagy 14725 Andrew Hay 15326 Mark Hillick 15727 Terence Jackson 16528 Tanya Janca 16829 David Kennedy 17430 Joe Krull 18031 Robert M. Lee 18832 Rafal Los 19433 Tracy Z. Maleeff 19934 Jeffrey Man 20235 Angela Marafino 20936 James Medlock 21237 Kent Nabors 22138 Charles Nwatu 22839 Greg Ose 23240 Edward Prevost 23941 Ray [REDACTED] 24442 Stephen A. Ridley 24943 David Rook 25544 Marina Segal 25945 Khalil Sehnaoui 26246 Jackie Singh 26747 Dan Tentler 27148 Eugene Teo 27449 Dominique West 27950 Jake Williams 28351 Wirefall 288Appendix: Recommended Reading 293
Cybersecurity for Space
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.Space is one of the fastest growing military, government, and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations.You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems.The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems.WHAT YOU WILL LEARN* Understand what constitutes a space system and the challenges unique to operations of all spacecraft* Get introduced to various space vehicles and their unique constraints and challenges* Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit* Know the physical and cyber vectors from which threats may manifest* Study the micro- and macro-analysis provided of space system attack scenarios* Be familiar with the high-level problems of cybersecurity in the space domainWHO THIS BOOK IS FORThis book is written for two audiences: those with a background in space operations as well as those in cybersecurity. It offers the guidance needed to understand the unique challenges to space operations that affect the implementation of cybersecurity.DR. JACOB G. OAKLEY spent over seven years in the US Marines and was one of the founding members of the operational arm of the Marine Corps Forces Cyberspace Command at Ft. Meade, Maryland, leaving that unit as the senior Marine Corps operator and a division technical lead. After his enlistment he wrote and taught an advanced computer operations course, eventually returning back to mission support at Ft. Meade. He later left government contracting to do threat emulation and red teaming at a private company for commercial clients, serving as the principal penetration tester and director of penetration testing and cyber operations. He is currently working as a cyber SME for a government customer. He completed his doctorate in IT at Towson University, researching and developing offensive cybersecurity methods, and is the author of Professional Red Teaming: Conducting Successful Cybersecurity Engagements (Apress) as well as Waging Cyber War: Technical Challenges and Operational Constraints (Apress).