Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Migrating from Xamarin.Forms to .NET MAUI

Migrating from Xamarin.Forms to .NET MAUI

This guide walks you through the process of updating a Xamarin.Forms application to .NET MAUI, using a fitness app as a case study for a real-world example of a migration. The book lays out a comprehensive roadmap for a migration, shining a light on both the strategic moves and the technical leaps required to embrace the latest in .NET MAUI. It covers topics such as:* The evolution of Xamarin.Forms to MAUI* Significant differences* Features, enhancements, and alternatives* Preparing for a migration* A migration inventory* Planning and executing a migration* Testing, debugging, and optimization* Staying up to dateBy using a practical case study, the author cuts through the complexity with hands-on examples while covering the nitty-gritty details and common questions and problems. You are exposed to new capabilities, app performance, best practices, and design patterns for MAUI, and other relevant topics.With .NET MAUI stepping up as Microsoft's beacon for unifying the app development process across the board, and Xamarin.Forms nearing its "end of life," getting a handle on MAUI isn't just nice—it's necessary. For anyone in the app-making game aiming to stay relevant, stepping into MAUI means getting a hold of the latest tech enhancements, boosting app performance, and delivering top-notch user experiences.WHAT YOU WILL LEARN* Know the best practices for migrating Xamarin.Forms applications to .NET MAUI* Refactor UI, application logic, and data models to take advantage of .NET MAUI's features* Create strategies for handling platform-specific code and integrating new MAUI capabilities* Test and optimize .NET MAUI applications for performance and reliabilityWHO THIS BOOK IS FORMobile and cross-platform developers with experience in Xamarin.Forms and looking to migrate their applications to .NET MAUIIRIS CLASSON isn't new to the XAML tech scene. Having navigated the waters of Silverlight, Windows Phone, Windows Store, Xamarin, and now MAUI, her expertise is broad and deep. Currently, she's in the trenches, part of a team steering a large-scale, complex application over a million users, from Xamarin.Forms to MAUI. This not only fuels her insights in this book, but also ensures that the guidance comes from someone who's well-versed in making the leap from theory to action in the world of app migration.Iris has held the title of Microsoft MVP for 12 years and has authored half a dozen technical books on .NET. Additionally, she has produced a wide array of Pluralsight and YouTube tutorials, along with Microsoft Learn tutorials and numerous hands-on workshops catering to a range from beginners to advanced users. She frequently speaks at conferences and user groups and keeps an active blog. Her entire professional life is dedicated to teaching, learning, and disseminating information about .NET, her platform of choice. Writing is a particular passion of hers; having published 13 books, some of which have been translated into several languages, it's clear that writing is not only her preferred way to share knowledge, but also something she deeply enjoys.Chapter 1: The Evolution from Xamarin.Forms.- Chapter 2: .NET MAUI: Features, Alternatives, and Future.- Chapter 3: Introducing the Case Study: A Fitness Application.- Chapter 4: Preparing for Migration.- Chapter 5: Planning Your Migration.- Chapter 6: Executing the Migration.- Chapter 7: Migrating Platform Projects.- Chapter 8: Migrating the UI and Navigation.- Chapter 9: Cleaning Up, Testing, and Optimization.- Appendix A: Resources and Further Reading.- Appendix B: Common Errors and Problems.

Regulärer Preis: 59,99 €
Produktbild für Die KI-Revolution

Die KI-Revolution

Das Buch Die KI-Revolution – Wie Künstliche Intelligenz unsere Zukunft verändert – und wie du davon profitierst bietet eine tiefgehende und fundierte Auseinandersetzung mit den technologischen, wirtschaftlichen und gesellschaftlichen Entwicklungen, die durch den Fortschritt der Künstlichen Intelligenz vorangetrieben werden. Es beleuchtet, wie KI nicht nur bestehende Industrien transformiert, sondern auch völlig neue Geschäftsfelder erschließt und gesellschaftliche Strukturen nachhaltig verändert. Ein zentraler Fokus liegt auf der praktischen Anwendung dieser Technologie in verschiedenen Branchen. KI hat längst Einzug in die Wirtschaft gehalten, automatisiert Prozesse, optimiert Entscheidungsstrukturen und eröffnet innovative Geschäftsmodelle, die bislang nicht denkbar waren. Besonders in den Bereichen Industrie, Bauwesen, Medizin, Raumfahrt und Klimaforschung zeigt das Buch auf, wie intelligente Systeme Abläufe effizienter gestalten, präzisere Diagnosen ermöglichen, neue Materialien entwickeln und sogar komplexe Umweltveränderungen vorhersagen können. Neben der technologischen Perspektive werden auch wirtschaftliche Chancen beleuchtet. Das Buch gibt Einblicke in die Geschäftsmodelle der Zukunft und zeigt auf, wie Unternehmen und Unternehmer KI gewinnbringend einsetzen können, um sich im globalen Wettbewerb nachhaltig zu positionieren. Auch die Chemie- und Materialwissenschaften erleben durch KI eine Revolution, die weitreichende Auswirkungen auf Produktion, Energieeffizienz und Ressourcenschonung hat. Ein weiteres bedeutendes Thema ist der Einfluss der KI auf kreative Prozesse. Kunst, Musik und Medien werden zunehmend von Algorithmen beeinflusst, die nicht nur Inhalte generieren, sondern auch völlig neue Formen der künstlerischen Gestaltung ermöglichen. Dabei stellt sich die Frage, wie diese Entwicklung die Rolle menschlicher Kreativität verändert und welche Herausforderungen sich im Hinblick auf Urheberrecht, Authentizität und künstlerische Originalität ergeben. Doch die KI-Revolution bringt nicht nur Fortschritte, sondern wirft auch tiefgreifende gesellschaftliche und ethische Fragen auf. Der Einfluss auf den Arbeitsmarkt, die Regulierung von Algorithmen, Datenschutz, Transparenz und die Verantwortung von Unternehmen und Politik stehen im Mittelpunkt der Diskussion. Das Buch beleuchtet, wie KI sinnvoll reguliert und ethisch vertretbar genutzt werden kann, um das Gleichgewicht zwischen technologischer Innovation und gesellschaftlicher Verantwortung zu wahren. Diese umfassende Analyse richtet sich an alle, die den technologischen Wandel nicht nur verstehen, sondern aktiv mitgestalten möchten – sei es als Unternehmer, Fachkraft, Entscheider oder einfach als Interessierter, der die Zukunft mit fundiertem Wissen und einer strategischen Perspektive angehen will.

Regulärer Preis: 29,99 €
Produktbild für Generative AI with SAP and Amazon Bedrock

Generative AI with SAP and Amazon Bedrock

Explore Generative AI and understand its key concepts, architecture, and tangible business use cases. This book will help you develop the skills needed to use SAP AI Core service features available in the SAP Business Technology Platform.You’ll examine large language model (LLM) concepts and gain the practical knowledge to unleash the best use of Gen AI. As you progress, you’ll learn how to get started with your own LLM models and work with Generative AI use cases. Additionally, you’ll see how to take advantage Amazon Bedrock stack using AWS SDK for ABAP.To fully leverage your knowledge, _Generative AI with SAP and Amazon Bedrock_ offers practical step-by-step instructions for how to establish a cloud SAP BTP account model and create your first GenAIartifacts. This work is an important prerequisite for those who want to take full advantage of generative AI with SAP.WHAT YOU WILL LEARN* Master the concepts and terminology of artificial intelligence and GenAI* Understand opportunities and impacts for different industries with GenAI* Become familiar with SAP AI Core, Amazon Bedrock, AWS SDK for ABAP and develop your firsts GenAI projects* Accelerate your development skills* Gain more productivity and time implementing GenAI use casesWHO THIS BOOK IS FORAnyone who wants to learn about Generative AI for Enterprise and SAP practitioners who want to take advantage of AI within the SAP ecosystem to support their systems and workflows.MIGUEL FIGUEIREDO is a passionate software professional with more than 30 years of experience in technical solution architecture. He has a degree in information systems and an MBA from Mackenzie University, as well as an international MBA in business administration from FIA Business School in partnership with Vanderbilt University. Miguel gained his experience delivering business intelligence solutions for a number of Fortune 500 companies and multiple global corporations. As the SAP HANA Services Center of Excellence leader, he was responsible for the evangelization and best-practice adoption of data management and business intelligence in his region.Currently, Miguel advises companies to maximize value realization in their digital transformation journeys and move to cloud initiatives. Miguel is dedicated to supporting his family and encouraging the development of good habits for health of body and mind.Chapter 1: Introduction to Artificial Intelligence.- Chapter 2: Generative AI in the spotlight.- Chapter 3: Opportunities and Impacts of Generative AI.- Chapter 4: Building Applications with SAP AI Core.- Chapter 5: Building Applications with Amazon Bedrock.- Chapter 6: Building ABAP Programs with Amazon Bedrock.- Chapter 7: What to Expect Going Forward.

Regulärer Preis: 49,99 €
Produktbild für Artificial Intelligence and Cybersecurity in Healthcare

Artificial Intelligence and Cybersecurity in Healthcare

ARTIFICIAL INTELLIGENCE AND CYBERSECURITY IN HEALTHCARE PROVIDES A CRUCIAL EXPLORATION OF AI AND CYBERSECURITY WITHIN HEALTHCARE CYBER PHYSICAL SYSTEMS (CPS), OFFERING INSIGHTS INTO THE COMPLEX TECHNOLOGICAL LANDSCAPE SHAPING MODERN PATIENT CARE AND DATA PROTECTION.As technology advances, healthcare has transformed, particularly through the implementation of CPS that integrate the digital and physical worlds, enhancing system efficiency and effectiveness. This increased reliance on technology raises significant security concerns. The book addresses the integration of AI and cybersecurity in healthcare CPS, detailing technological advancements, applications, and the challenges they present. AI applications in healthcare CPS include remote patient monitoring, AI chatbots for patient assistance, and biometric authentication for data security. AI not only improves patient care and clinical decision-making by analyzing extensive data and optimizing treatment plans, but also enhances CPS security by detecting and responding to cyber threats. Nonetheless, AI systems are susceptible to attacks, emphasizing the need for robust cybersecurity. Significant issues include the privacy and security of sensitive healthcare data, potential identity theft, and medical fraud from data breaches, alongside ethical concerns such as algorithmic bias. As the healthcare industry becomes increasingly digital and data-driven, integrating AI and cybersecurity measures into CPS is essential. This requires collaboration among healthcare providers, tech vendors, regulatory bodies, and cybersecurity experts to develop best practices and standards. This book aims to provide a comprehensive understanding of AI, cybersecurity, and healthcare CPS. It explores technologies like augmented reality, blockchain, and the Internet of Things, addressing associated challenges like cybersecurity threats and ethical dilemmas. RASHMI AGRAWAL, PHD, is a professor and the Head of the Department of Computer Applications, Manav Rachna International Institute of Research and Studies, Faridabad, India with 20 years of experience in teaching and research. She is a lifetime member of the Computer Society of India, a senior member of the Institute of Electrical and Electronics Engineers, and a chapter chair and professional member of the Association for Computing Machinery. Alongside her affiliations, she is a series editor, has authored and co-authored over 80 research papers in peer-reviewed national and international journals and conferences, and has four patents to her credit as well as a copyright. Additionally, she has contributed as a keynote speaker at IEEE international conferences, an expert lecturer at professional development events, and a session chair for various international conferences. PRAMOD SINGH RATHORE, PHD, is an assistant professor in the computer science and engineering department at the Aryabhatta Engineering College and Research Centre, Ajmer, Rajasthan, India and is also visiting faculty at the Government University, MDS Ajmer. He has over eight years of teaching experience and more than 45 publications in peer-reviewed journals, books, and conferences. He has also co-authored and edited numerous books with a variety of global publishers, such as the imprint, Wiley-Scrivener. GANESH GOPAL DEVARAJAN, PHD, is a professor in the Department of Computer Science and Engineering, SRM Institute of Science and Technology, India with more than 17 years of research and teaching experience in computer science and engineering. He has edited many special issues in reputed journals and is a member of the Institute of Electrical and Electronics Engineers, Association for Computing Machinery, and Computer Society of India. His research interests include Internet of Things (IoT), wireless communication, vehicular communication, and big data. RAJIVA RANJAN DIVIVEDI is an assistant professor in the Computer Science and Engineering Department at SRM Institute of Science and Technology, Delhi, India with over six years of teaching and research experience. He holds a Master’s Degree in Computer Science and Engineering and has qualified under both the National Testing Agency’s National Eligibility Test and the Graduate Aptitude Test in Engineering. His research interests include machine learning, data analytics, and Internet of Things.

Regulärer Preis: 216,99 €
Produktbild für Explainable Artificial Intelligence in the Healthcare Industry

Explainable Artificial Intelligence in the Healthcare Industry

DISCOVER THE ESSENTIAL INSIGHTS AND PRACTICAL APPLICATIONS OF EXPLAINABLE AI IN HEALTHCARE THAT WILL EMPOWER PROFESSIONALS AND ENHANCE PATIENT TRUST WITH EXPLAINABLE AI IN THE HEALTHCARE INDUSTRY, A MUST-HAVE RESOURCE.Explainable AI (XAI) has significant implications for the healthcare industry, where trust, accountability, and interpretability are crucial factors for the adoption of artificial intelligence. XAI techniques in healthcare aim to provide clear and understandable explanations for AI-driven decisions, helping healthcare professionals, patients, and regulatory bodies to better comprehend and trust the AI models’ outputs. Explainable AI in the Healthcare Industry presents a comprehensive exploration of the critical role of explainable AI in revolutionizing the healthcare industry. With the rapid integration of AI-driven solutions in medical practice, understanding how these models arrive at their decisions is of paramount importance. The book delves into the principles, methodologies, and practical applications of XAI techniques specifically tailored for healthcare settings. ABHISHEK KUMAR, PHD, is an Assistant Director and associate professor in the Computer Science and Engineering Department at Chandigarh University, India with over 11 years of teaching experience. He has over 100 publications in reputed, peer-reviewed national and international journals, books, and conferences, six internationally published book, and has edited over 27 books. Additionally, he has been a session chair and keynote speaker for many international conferences and webinars in India and abroad. T. ANANTH KUMAR, PHD, is an associate professor at the Indo-French Educational Trust College of Engineering. He has presented papers in various national and international conferences and journals, as well as published many book chapters. His fields of interest include networks on chips, computer architecture, and application-specific integrated circuit design. PRASENJIT DAS, PHD, is a professor in the Department of Computer Science and Engineering at Chandigarh University, Punja, India with over 19 years of experience in academics and the IT industry. He has more than 20 research papers and two books to his credit and has filed more than 25 patents, three of which have been granted. Apart from data mining, his other areas of research include machine learning, image processing, and natural language processing. CHETAN SHARMA is a program manager at the upGrad Campus, upGradEducation Private Limited, India with more than 15 years of experience in academics, administration, and EdTech. He has published more than 42 research manuscripts in various national and international journals and conferences and presented papers at several national and international conferences. In addition to this, he serves as a reviewer for various journals and conferences and filed more than 30 patents, eight of which have been granted by the Indian Patent Office. ASHUTOSH KUMAR DUBEY, PHD, is an associate professor in the Department of Computer Science, School of Engineering and Technology, Chitkara University, India with more than 14 years of teaching experience. He is also a postdoctoral fellow for the Ingenium Research Group Lab, Universidad de Castilla-La Mancha, Ciudad Real, Spain. He has authored and edited ten books and published over 50 articles in peer-reviewed international journals and conference proceedings. Additionally, he is a senior member of the Institute for Electronics and Electrical Engineers and Association for Computing Machinery, as well as an editor editorial board member, and reviewer for many peer-reviewed journals.

Regulärer Preis: 237,99 €
Produktbild für CompTIA PenTest+ Study Guide

CompTIA PenTest+ Study Guide

PREPARE FOR THE COMPTIA PENTEST+ CERTIFICATION EXAM AND IMPROVE YOUR INFORMATION SECURITY JOB PERFORMANCE WITH SYBEXIn the newly revised third edition of the CompTIA PenTest+ Study Guide: Exam PT0-003, renowned information security professionals Mike Chapple, Rob Shimonski, and David Seidl deliver a comprehensive and up-to-date roadmap to succeeding on the challenging PenTest+ certification exam. Freshly updated to track the latest changes made to Exam PT0-003, the book will prepare you not just for the test, but for your first day at your first or next information security job.From penetration testing to vulnerability management and assessment, the authors cover every competency tested by the qualification exam. You'll also find:* Complimentary access to the Sybex online learning environment, complete with hundreds of electronic flashcards and a searchable glossary of important terms* Up-to-date info organized to track the newly updated PT0-003 PenTest+ certification exam* Quick reference material and practice tests designed to help you prepare smarter and faster for the testSucceed on the PT0-003 exam the first time. Grab a copy of CompTIA PenTest+ Study Guide and walk into the test—or your new information security job—with confidence.ABOUT THE AUTHORSMIKE CHAPPLE, PHD, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 50 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com. ROBERT SHIMONSKI, CASP+, CySA+, PenTest+, Security+, is a technology executive specializing in healthcare IT for one of the largest health systems in America. Rob is considered a leading expert in prepping others to achieve certification success. DAVID SEIDL is Vice President for Information Technology and Chief Information Officer at Miami University. He has served in a variety of technical and information security roles.

Regulärer Preis: 50,99 €
Produktbild für Building CLI Applications with .NET

Building CLI Applications with .NET

Developers and system administrators often face challenges like inefficient workflows, complex system operations, and the growing demand for robust automation tools. CLI applications provide a powerful solution by enhancing flexibility, efficiency, and productivity in various environments. This book will guide you through mastering the development of robust command-line tools using .NET.Written by a Microsoft Azure MVP, the book’s hands-on approach ensures practical experience with real-world projects. You’ll start with an overview of foundational principles, essential concepts, and best practices for CLI application development. From there, you’ll advance to creating interactive interfaces, integrating with external APIs and services, and implementing security measures to safeguard your applications. Each chapter will build progressively from basic to advanced topics.Beyond development, you’ll learn how to enhance application quality through testing, package for efficient distribution, and deploy effectively. The book also teaches strategies to optimize performance to ensure your applications run efficiently under heavy usage.By the end of this book, you’ll have gained a deep understanding of CLI application development with .NET to build modular, extensible, and easy-to-maintain applications.

Regulärer Preis: 28,99 €
Produktbild für Multi-valued Logic for Decision-Making Under Uncertainty

Multi-valued Logic for Decision-Making Under Uncertainty

Multi-valued and fuzzy logics provide mathematical and computational tools for handling imperfect information and decision-making with rational collective reasoning and irrational individual judgements.The suggested implementation of multi-valued logics is based on the uninorm and absorbing norm with generating functions defined by probability distributions. Natural extensions of these logics result in non-commutative and non-distributive logics. In addition to Boolean truth values, these logics handle subjective truth and false values and model irrational decisions. Dynamics of decision-making are specified by the subjective Markov process and learning – by neural network with extended Tsetlin neurons. Application of the suggested methods is illustrated by modelling of irrational economic decisions and biased reasoning in the wisdom-of-the-crowd method, and by control of mobile robots and navigation of their groups.TOPICS AND FEATURES:* Bridges the gap between fuzzy and probability methods* Includes examples in the field of machine-learning and robots’ control* Defines formal models of subjective judgements and decision-making* Presents practical techniques for solving non-probabilistic decision-making problems* Initiates further research in non-commutative and non-distributive logicsThe book forms a basis for theoretical studies and practice of decision-making under uncertainty and will be useful for computer scientists and mathematicians interested in multi-valued and fuzzy logic, as well as for engineers working in the field of data mining and data analysis.DR. EVGENY KAGAN is with the Faculty of Engineering, Ariel University, Israel.DR. ALEXANDER RYBALOV is with the LAMBDA Laboratory, Tel-Aviv University, Israel.PROF. RONALD YAGER is with the Machine Learning Institute, Yona College, New York, USA.1. Introduction.- 2. Background.- 3. Probability-generated multi-valued logic.- 4. Muli-valued logic algebra of subjective trusts.- 5. Algebra with non-commutative norms.- 6. Implementation of subjective trusts in control.

Regulärer Preis: 213,99 €
Produktbild für KI in Medien, Kommunikation und Marketing

KI in Medien, Kommunikation und Marketing

Der Herausgeberband beleuchtet den aktuellen globalen Einsatz von Künstlicher Intelligenz im Kommunikationssektor aus wirtschaftlicher, gesellschaftlicher und rechtlicher Perspektive. Auch der Blick der Rezipienten auf Produkte künstlicher Intelligenz wird dabei empirisch untersucht. Was sind ihre Erwartungen, Idiosynkrasien und Einstellungen gegenüber Künstlicher Intelligenz und ihren vielfältigen Anwendungen? Die Beiträge umfassen neben wissenschaftlichen Analysen auch aktuelle Trends aus Sicht von Praktikern und Experten. Die kritisch-analytische Betrachtung von KI-Anwendungen in Sub- und Populärkultur rundet den gesamten Band ab.Künstliche Intelligenz in Journalismus, Unternehmenskommunikation und Marketing.- Internationale Perspektiven auf Künstliche Intelligenz.- Künstliche Intelligenz als Treiber des sozialen, ethischen und ästhetischen Wandels.

Regulärer Preis: 69,99 €
Produktbild für Securing the Digital Frontier

Securing the Digital Frontier

SECURE YOUR UNDERSTANDING OF VITAL SECURITY AND FORENSIC STRATEGIES BY PURCHASING SECURING THE DIGITAL FRONTIER: THREATS AND ADVANCED TECHNIQUES IN SECURITY AND FORENSICS, A DEFINITIVE GUIDE THAT EMPOWERS YOU TO PROTECT SENSITIVE INFORMATION AND TACKLE CYBER THREATS WITH INSIGHTS FROM LEADING EXPERTS AND REAL-WORLD CASE STUDIES.In the field of security and forensics, it’s crucial to implement strong security measures to protect sensitive data and effectively respond to cyber incidents. Digital forensics is vital for analyzing cyber threats, where experts use advanced techniques to scrutinize digital artifacts, system logs, and network traffic. This approach helps reconstruct incidents, pinpoint vulnerabilities, and support legal actions, ensuring the confidentiality, integrity, and availability of crucial data in our rapidly evolving digital world. This book provides an in-depth look at security and forensics, pooling knowledge from top experts across various cybersecurity domains. It focuses on real-world applications and case studies, offering valuable insights for protecting information and responding to digital crimes. Designed for cybersecurity professionals, digital forensics investigators, legal teams, and academics, this comprehensive guide is a key resource for anyone looking to deepen their understanding of modern digital forensics and cybersecurity challenges. KAVITA SHARMA, PHD, is a professor in the Department of Computer Science and Engineering at Galgotias College of Engineering and Technology, Greater Noida, India with over 12 years of research and academic experience. She has also been awarded a research fellowship from the Ministry of Electronics and Information Technology from the Government of India. Additionally, she has four patents (one granted and three published) and one granted design and has published seven books and 45 research articles in international journals and conferences of high repute. VISHNU SHARMA, PHD, is the Head of Department and a professor in the Department of Computer Science and Engineering at Galgotias College of Engineering and Technology, Greater Noida, India with over 21 years of teaching experience. He has published over 50 research papers on mobile ad-hoc networks and mobile computing in national and international conferences and journals, as well as two books on mobile computing and advanced mobile computing. Additionally, he has organized several national and international conferences and workshops and serves as the editor of IEEE Conference ICCCA proceedings. PARMA NAND, PHD, is the Dean of Academics at Sharda University, Greater Noida, India. He has over 26 years of teaching, industry, and research experience, emphasizing bridging the gap between academics and industry keeping in mind the growing IT industry in terms of futuristic technologies. Through his work, he has provided consultancy on a number of projects for industries and has delivered many invited and keynote talks at national and international conferences, workshops, and seminars in India and abroad. He has published more than 85 papers in peer-reviewed national and international journals and conferences, as well as two filed patents. ANIL KUMAR SAGAR, PHD, is a professor in the Department of Computer Science and Engineering in the School of Engineering and Technology, Sharda University, India with over 20 years of experience in teaching, guiding ten Master’s of Technology and five doctoral candidates in computer science. He also serves as a member of the editorial boards and review committees for many national and international journals and has served as a program and organizing committee member for several conferences. GULSHAN SHRIVASTAVA, PHD, is an associate professor in the Department of Computer Science and Engineering at Galgotias University, Greater Noida, India. He has five patents (four granted, one published) and 55 articles, books, and editorials in international journals and conferences of high repute. He also serves many reputed journals as a guest editor, editorial board member, international advisory board member, and reviewer board member and has delivered expert talks and guest lectures at numerous international conferences.

Regulärer Preis: 188,99 €
Produktbild für Generative Artificial Intelligence

Generative Artificial Intelligence

THIS BOOK IS A COMPREHENSIVE OVERVIEW OF AI FUNDAMENTALS AND APPLICATIONS TO DRIVE CREATIVITY, INNOVATION, AND INDUSTRY TRANSFORMATION.Generative AI stands at the forefront of artificial intelligence innovation, redefining the capabilities of machines to create, imagine, and innovate. GAI explores the domain of creative production with new and original content across various forms, including images, text, music, and more. In essence, generative AI stands as evidence of the boundless potential of artificial intelligence, transforming industries, sparking creativity, and challenging conventional paradigms. It represents not just a technological advancement but a catalyst for reimagining how machines and humans collaborate, innovate, and shape the future. The book examines real-world examples of how generative AI is being used in a variety of industries. The first section explores the fundamental concepts and ethical considerations of generative AI. In addition, the section also introduces machine learning algorithms and natural language processing. The second section introduces novel neural network designs and convolutional neural networks, providing dependable and precise methods. The third section explores the latest learning-based methodologies to help researchers and farmers choose optimal algorithms for specific crop and hardware needs. Furthermore, this section evaluates significant advancements in revolutionizing online content analysis, offering real-time insights into content creation for more interactive processes. AUDIENCEThe book will be read by researchers, engineers, and students working in artificial intelligence, computer science, and electronics and communication engineering as well as industry application areas. R. NIDHYA, PHD, is an assistant professor in the Department of Computer Science & Engineering, Madanapalle Institute of Technology & Science, affiliated with Jawaharlal Nehru Technical University, Anantapuram, India. She has published many research papers in international journals and her research interests include wireless body area networks, network security, and data mining. D. PAVITHRA, PHD, is an assistant professor at Dr. NGP Institute of Technology, Coimbatore, Tamil Nadu, India. Her current research interests include autism, machine learning, and deep learning. MANISH KUMAR, PHD, is an assistant professor at The School of Computer Science & Engineering, VIT, Chennai, India. His research interests include soft computing applications for bioinformatics problems and computational intelligence. A. DINESH KUMAR, PHD, is an associate professor at KL (Deemed to be University), Vijayawada, Andhra Pradesh, India. His current research interests include wireless body area networks, wireless sensor networks, network security, and artificial intelligence. S. BALAMURUGAN, PHD, is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamil Nadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman of the Renewable Energy Society of India (RESI), India. He has published 50+ books, 200+ international journals/conferences, and 35 patents.

Regulärer Preis: 168,99 €
Produktbild für File System Forensics

File System Forensics

COMPREHENSIVE FORENSIC REFERENCE EXPLAINING HOW FILE SYSTEMS FUNCTION AND HOW FORENSIC TOOLS MIGHT WORK ON PARTICULAR FILE SYSTEMSFile System Forensics delivers comprehensive knowledge of how file systems function and, more importantly, how digital forensic tools might function in relation to specific file systems. It provides a step-by-step approach for file content and metadata recovery to allow the reader to manually recreate and validate results from file system forensic tools. The book includes a supporting website that shares all of the data (i.e. sample file systems) used for demonstration in the text and provides teaching resources such as instructor guides, extra material, and more. Written by a highly qualified associate professor and consultant in the field, File System Forensics includes information on:* The necessary concepts required to understand file system forensics for anyone with basic computing experience* File systems specific to Windows, Linux, and macOS, with coverage of FAT, ExFAT, and NTFS* Advanced topics such as deleted file recovery, fragmented file recovery, searching for particular files, links, checkpoints, snapshots, and RAID* Issues facing file system forensics today and various issues that might evolve in the field in the coming yearsFile System Forensics is an essential, up-to-date reference on the subject for graduate and senior undergraduate students in digital forensics, as well as digital forensic analysts and other law enforcement professionals. FERGUS TOOLAN, PHD, is an Associate Professor in the Norwegian Police University College. He has published over 30 peer-reviewed papers and supervised a number of master’s and PhD students throughout his career. Additionally, Dr. Toolan has provided consultancy services to a number of police services and other governmental organizations. He has taught a range of courses from introductory programming to advanced databases, and from computer hardware to discrete mathematics. Preface xviiAcknowledgements xxiPART I PRELIMINARIES 11 INTRODUCTION 31.1 What is Digital Forensics? 41.2 File System Forensics 51.3 Digital Forensic Principles 51.4 Digital Forensic Methodology 71.4.1 Preparation 81.4.2 Localisation/Preservation 81.4.3 Acquisition 81.4.4 Processing 91.4.5 Analysis 91.4.6 Reporting 91.4.7 Quality Assurance 101.4.8 Evidence Return 101.5 About This Book 101.5.1 Who Should Read This Book? 111.6 Book Structure 121.7 Summary 13Exercises 13Bibliography 142 LINUX AS A FORENSIC PLATFORM 172.1 Open-Source Software 172.1.1 Advantages of Open-Source Software 192.1.2 Open Source ≠ Free 202.2 Open-Source Software in Digital Forensics 202.3 What is Linux? 212.3.1 The Anatomy of the Linux OS 222.3.2 Linux Distributions 272.3.3 A (very) Brief History of Linux 282.4 Using Linux 292.4.1 User Accounts 302.4.2 Basic Linux Commands 322.4.2.1 Navigating the File System 322.4.2.2 Getting Help 342.4.2.3 Viewing/Editing Text Files 342.4.2.4 Managing Directories 352.4.2.5 Redirection and Pipes 352.5 Linux as a Forensic Platform 362.5.1 Commands for Digital Forensics 362.5.1.1 Hashing 362.5.1.2 Hex Viewers 382.5.1.3 Archiving/Compression 392.5.1.4 The file Command 402.5.1.5 The strings Command 402.5.1.6 Text Searching with (e)grep 412.6 Summary 42Exercises/Discussion Topics 42Bibliography 433 MATHEMATICAL PRELIMINARIES 453.1 Bits and Bytes 453.2 Number Systems 483.2.1 Notational Conventions 483.2.2 Decimal 483.2.3 Binary 493.2.4 Hexadecimal 503.2.5 Number Conversions 513.2.6 Number Conversion with Bash 513.2.7 Negative Numbers 533.2.8 Floating-Point Numbers 533.3 Representing Text 563.3.1 Ascii 563.3.2 Iso- 8859 573.3.3 Unicode 593.3.4 Utf- 8 603.3.5 Utf- 16 613.4 Representing Time 623.4.1 Unix Time 633.4.2 The Linux date Command 643.5 Endianness and Raw Data 643.6 Summary 66Exercises 67Bibliography 684 DISKS, PARTITIONS AND FILE SYSTEMS 694.1 Disk Storage 704.1.1 Traditional Rotational Hard Drives 714.1.1.1 Optical Media 724.1.2 Flash Drives 734.1.3 Solid-State Drives 734.2 Partitions 744.2.1 Creating Partitions/File Systems on Linux 744.2.1.1 Mounting File Systems on Linux 774.2.2 Master Boot Record 784.2.3 GUID Partition Table 804.3 File Systems 834.3.1 File System Concepts 834.3.2 Comparison of File Systems 864.4 Acquisition of File System Data 884.4.1 Logical vs Physical Acquisition 884.4.2 Acquisition Under Linux 884.4.2.1 The dd Family 894.4.2.2 Expert Witness Format (EWF) 904.4.2.3 guymager 914.5 Analysis of File Systems 924.5.1 The Sleuth Kit 924.5.1.1 Determine the Partition Layout 934.5.1.2 Determine the File System Type 934.5.1.3 List the Files 944.5.1.4 Recover File Metadata 954.5.1.5 Recover File Content 954.5.1.6 Other TSK Commands 954.5.2 Data Carving 964.6 Summary 97Exercises 97Bibliography 98PART II WINDOWS FILE SYSTEMS 995 THE FAT FILE SYSTEM 1015.1 On-Disk Structures 1015.1.1 Layout 1025.1.2 Volume Boot Record 1025.1.3 File System Information (FSINFO) 1025.1.4 File Allocation Table 1045.1.5 Directory Entries 1055.1.6 FAT Date and Time 1085.1.7 Mapping Clusters to Sectors 1095.2 Analysis of FAT 32 1095.2.1 Creating FAT32 File Systems 1095.2.2 Supplied FAT32 Image Files 1105.2.3 FAT32 Manual Analysis 1105.2.3.1 Process the VBR 1115.2.3.2 Process the Root Directory 1125.2.3.3 Process Sub-directories 1135.2.3.4 Recover Metadata/Content 1135.3 FAT32 Advanced Analysis 1155.3.1 Deleted Files 1165.3.2 The Volume Label 1175.4 Summary 117Exercises 118Bibliography 1186 THE EXFAT FILE SYSTEM 1216.1 On-Disk Structures 1216.1.1 Volume Boot Record 1226.1.2 File Allocation Table 1236.1.3 Directory Entries 1256.1.3.1 Allocation Bitmap (Type: 0x81) 1276.1.3.2 Up-Case Table (Type: 0x82) 1286.1.3.3 Volume Label (Type: 0x83) 1286.1.3.4 File (Type: 0x85) 1296.1.3.5 Volume GUID (Type: 0xA0) 1306.1.3.6 Stream Extension (Type: 0xC0) 1306.1.3.7 Filename Extension 1316.1.3.8 Other Directory Entries 1326.2 Analysis of ExFAT 1326.2.1 Creating ExFAT File Systems 1326.2.2 Supplied ExFAT Image Files 1326.2.3 ExFAT Manual Analysis 1326.2.3.1 Step 1: Process the VBR 1336.2.3.2 Step 2: Process the Root Directory 1336.2.3.3 Step 3: Process Subdirectories 1366.2.3.4 Step 4: Recover Metadata 1376.2.3.5 Step 5: Recover Content 1376.3 ExFAT Advanced Analysis 1396.3.1 Long File Names 1396.3.2 Deleted Files 1406.3.3 Fragmented Files and Large Directories 1416.4 Summary 142Exercises 143Bibliography 1437 THE NTFS FILE SYSTEM 1457.1 On-Disk Structures 1467.1.1 $Boot 1467.1.2 Indexes 1477.1.3 Fixup Arrays 1497.1.4 Time in NTFS 1507.1.5 Master File Table 1517.1.6 MFT Record Structure 1527.1.6.1 MFT Record Header 1527.1.6.2 Browsing Attributes 1557.1.6.3 $STANDARD_INFORMATION (0x10) 1557.1.6.4 $ATTRIBUTE_LIST (0x20) 1567.1.6.5 $FILENAME (0x30) 1567.1.6.6 $OBJECT_ID (0x40) 1577.1.6.7 $SECURITY_DESCRIPTOR (0x50) 1597.1.6.8 $VOLUME_NAME (0x60) 1627.1.6.9 $VOLUME_INFORMATION (0x70) 1627.1.6.10 $DATA (0x80) 1637.1.6.11 $INDEX_ROOT (0x90) 1637.1.6.12 $INDEX_ALLOCATION (0xA0) 1657.1.6.13 $BITMAP (0xB0) 1657.1.6.14 $REPARSE_POINT (0xC0) 1667.1.6.15 $EA_INFORMATION (0xD0) and $EA (0xE0) 1677.2 Analysis of NTFS 1677.2.1 Creating NTFS File Systems 1687.2.2 Supplied NTFS Image Files 1687.2.3 NTFS Manual Analysis 1687.2.3.1 Process $Boot 1697.2.3.2 Recover $MFT 1717.2.3.3 Process Directories 1737.2.3.4 Recover File Metadata 1777.2.3.5 Recover File Content 1827.3 NTFS Advanced Analysis 1857.3.1 Further File System Information 1857.3.2 Deleted Files 1867.3.3 Fragmented Files 1877.3.4 Alternate Data Streams 1907.3.5 Large MFT Records 1917.4 Summary 194Exercises 194Bibliography 195PART III LINUX FILE SYSTEMS 1978 THE EXT2 FILE SYSTEM 1998.1 On-Disk Structures 2008.1.1 The Superblock 2018.1.2 The Block Group Descriptor Table 2048.1.3 The Inode Table 2058.1.3.1 Mode/Permissions 2078.1.3.2 Inode Flags 2088.1.3.3 Block Pointers 2088.1.4 The Data and Inode Bitmaps 2098.1.5 Locating an Inode 2098.2 Analysis of ext 2 2108.2.1 Creating ext2 File Systems 2108.2.2 Supplied ext2 Image Files 2108.2.3 Ext2 Manual Analysis 2118.2.3.1 Process the Superblock 2118.2.3.2 Map the Block Groups 2138.2.3.3 Process Root Directory Inode 2168.2.3.4 Process the Root Directory 2178.2.3.5 Process Directories 2198.2.3.6 Process Files 2198.3 Ext2 Advanced Analysis 2228.3.1 Fragmented Files 2228.3.2 Links 2238.3.3 Deleted Files 2258.4 Summary 226Exercises 226Bibliography 2279 THE EXT3/EXT4 FILE SYSTEMS 2299.1 Supplied Image Files 2299.2 The ext3 File System 2299.2.1 The Ext Journal 2309.2.2 HTree Directory Indexing 2379.3 The Ext4 File System 2419.3.1 Large Inodes 2419.3.1.1 Timestamps 2419.3.2 Ext4 Data Storage 2449.3.2.1 Extent-Based Storage 2449.3.2.2 Inline Storage 2489.3.2.3 Symbolic Links 2489.3.3 File Deletion in Ext 4 2499.3.4 Extended Attributes 2529.3.5 Ext4 Block Group Descriptors 2559.3.6 Flexible Block Groups 2559.4 Summary 258Exercises 259Bibliography 26010 THE XFS FILE SYSTEM 26310.1 On-Disk Structures 26410.1.1 Allocation Groups 26410.1.2 Addressing 26610.1.2.1 Inode Addressing 26610.1.3 XFS B+ Trees 26710.1.4 The Superblock 26810.1.4.1 Locating Superblocks 26810.1.5 XFS Signatures 27110.1.6 XFS Inodes 27110.1.7 Directories 27310.1.8 Extents 27410.1.9 Time in XFS 27510.2 Analysis of XFS 27510.2.1 Creating XFS File Systems 27510.2.2 Supplied XFS Image Files 27510.2.3 XFS Manual Analysis 27610.2.3.1 Process the Superblock 27610.2.3.2 Locate the Root Directory 27710.2.3.3 Process the Root Directory 27910.2.3.4 Process the Subdirectories 28110.2.3.5 Recover File Content/Metadata 28110.3 XFS Advanced Analysis 28210.3.1 AG Free Space Management 28310.3.1.1 AG Free List 28510.3.2 AG Inode Management 28610.3.3 Deleted Files 28910.3.4 Extended Attributes 29010.3.5 Links 29110.3.6 The XFS Journal 29210.4 Summary 300Exercises 301Bibliography 30111 THE BTRFS FILE SYSTEM 30311.1 On-Disk Structures 30411.1.1 The Superblock 30511.1.2 Btrfs Trees 30511.1.3 Btrfs Tree Structure 30711.1.3.1 Node Header Structure 30711.1.3.2 Internal Node Structure 30911.1.4 Btrfs Keys 30911.1.5 Btrfs Items 31011.1.6 Time in Btrfs 31511.1.7 Logical and Physical Addressing 31511.2 Analysis of Btrfs 31711.2.1 Creating Btrfs File Systems 31711.2.2 Supplied Btrfs Image Files 31811.2.3 Btrfs Analysis Methodology 31811.2.4 Manual Analysis of a Single Device File System 32011.2.4.1 Process the Superblock 32011.2.4.2 Process the CHUNK_ARRAY 32111.2.4.3 Locate the CHUNK_TREE 32211.2.4.4 Process the CHUNK_TREE 32311.2.4.5 Locate the Root Tree 32611.2.4.6 Locate the FS_TREE 32711.2.4.7 Processing the FS_TREE 32811.2.4.8 Process Directories 32911.2.4.9 Recovering Metadata 33511.2.4.10 Recovering File Contents 33611.3 Btrfs Advanced Analysis 33811.3.1 File Deletion 33811.3.2 Analysis of Internal Nodes 34211.3.3 Multiple Device Configuration 34311.3.4 Subvolumes and Snapshots 34611.4 Summary 350Exercises 350Bibliography 351PART IV APPLE FILE SYSTEMS 35312 THE HFS+ FILE SYSTEM 35512.1 On-Disk Structures 35512.1.1 Forks 35712.1.2 Time in HFS+ 35712.1.3 Volume Header 35812.1.4 B-Trees 35812.1.5 Catalog File 36212.1.6 HFS+ Permissions 36312.1.7 Text Encoding 36512.1.8 Extents Overflow File 36512.1.9 Allocation File 36612.1.10 HFS+ Journal 36712.2 Analysis of HFS+ 36912.2.1 Creating HFS+ File Systems 36912.2.2 Supplied HFS+ Image Files 37012.2.3 HFS+ Manual Analysis 37012.2.3.1 Process the Volume Header 37012.2.3.2 Locate the Catalog File 37112.2.3.3 Process the Catalog B-Tree 37312.2.3.4 Gather Metadata 37712.2.3.5 Recover File Content 37712.3 HFS+ Advanced Analysis 38012.3.1 Deleted Files 38012.3.2 Index Nodes 38112.3.3 Fragmented Files 38312.3.4 Links 38712.4 Summary 390Exercises 391Bibliography 39113 THE APFS FILE SYSTEM 39313.1 On-Disk Structures 39413.1.1 Time in APFS 39413.1.2 Objects 39413.1.3 B-Trees 39613.1.4 Containers and Volumes 39913.1.5 Container Superblock 40013.1.6 Volume Superblock 40213.1.7 Object Maps 40413.1.8 File-Related Structures 40513.1.8.1 File System Keys 40613.1.8.2 Inode 40713.1.8.3 Directory Record 40813.1.8.4 Extent 41013.1.9 Checkpoints 41013.1.10 Other APFS Structures 41213.2 Analysis of APFS 41213.2.1 Creating APFS File Systems 41213.2.2 Supplied APFS Image Files 41313.2.3 APFS Manual Analysis 41313.2.3.1 Process the Container Superblock 41413.2.3.2 Process the Container Object Map 41513.2.3.3 Process the Volume Superblock 41813.2.3.4 Process the Volume Object Map 41813.2.3.5 Process the File System Tree 41913.3 APFS Advanced Analysis 42513.3.1 Deleted Files 42513.3.2 Checkpoint Recovery 42613.3.3 Multi-Level B-Trees 42713.3.4 Multiple Volumes 42913.3.5 Extended Attributes 43013.3.6 Links 43113.4 Summary 433Exercises 433Bibliography 434PART V THE FUTURE 43514 FUTURE CHALLENGES IN DIGITAL FORENSICS 43714.1 Challenges in Digital Forensics 43714.1.1 Data Volume 43814.1.2 Multi-Source Correlation 43914.1.3 New File Systems 44014.1.4 Encryption 44014.1.5 Cloud Storage 44114.1.6 Lack of Resources 44114.1.6.1 Human Resources 44114.1.6.2 Software Resources 44214.1.6.3 Hardware Resources 44214.1.7 Tool Validation/Datasets 44314.1.8 Lack of Standardisation 44414.1.9 Legal/Scientific Challenges 44414.1.10 Presentation of Evidence 44514.1.11 Human Error/Bias 44614.2 Where Do We Go from Here? 44714.2.1 Training/Education 44814.2.2 Free Open-Source Software (FOSS) 44814.2.3 Triage 44914.2.4 Artificial Intelligence (AI) 44914.2.5 Live Data Forensics 45014.2.6 Legal Solutions 45114.2.7 Data Set Development/Tool Testing 45214.2.8 Standardisation 45214.2.9 Information Sharing 45314.2.10 Virtualisation 45314.3 Summary 454Bibliography 454Index 457

Regulärer Preis: 116,99 €
Produktbild für Explainable and Responsible Artificial Intelligence in Healthcare

Explainable and Responsible Artificial Intelligence in Healthcare

THIS BOOK PRESENTS THE FUNDAMENTALS OF EXPLAINABLE ARTIFICIAL INTELLIGENCE (XAI) AND RESPONSIBLE ARTIFICIAL INTELLIGENCE (RAI), DISCUSSING THEIR POTENTIAL TO ENHANCE DIAGNOSIS, TREATMENT, AND PATIENT OUTCOMES.This book explores the transformative potential of explainable artificial intelligence (XAI) and responsible AI (RAI) in healthcare. It provides a roadmap for navigating the complexities of healthcare-based AI while prioritizing patient safety and well-being. The content is structured to highlight topics on smart health systems, neuroscience, diagnostic imaging, and telehealth. The book emphasizes personalized treatment and improved patient outcomes in various medical fields. In addition, this book discusses osteoporosis risk, neurological treatment, and bone metastases. Each chapter provides a distinct viewpoint on how XAI and RAI approaches can help healthcare practitioners increase diagnosis accuracy, optimize treatment plans, and improve patient outcomes. Readers will find the book:* explains recent XAI and RAI breakthroughs in the healthcare system;* discusses essential architecture with computational advances ranging from medical imaging to disease diagnosis;* covers the latest developments and applications of XAI and RAI-based disease management applications; * demonstrates how XAI and RAI can be utilized in healthcare and what problems the technology faces in the future. AUDIENCEThe main audience for this book is targeted to scientists, healthcare professionals, biomedical industries, hospital management, engineers, and IT professionals interested in using AI to improve human health. RISHABHA MALVIYA, PHD, is an associate professor in the Department of Pharmacy, School of Medical and Allied Sciences, Galgotias University. He has authored more than 150 research/review papers for national/international journals of repute. He has been granted more than 10 patents from different countries while a further 40 patents have either been published or under evaluation. His areas of interest include formulation optimization, nanoformulation, targeted drug delivery, localized drug delivery, and characterization of natural polymers as pharmaceutical excipients. SONALI SUNDRAM, PHD AND MPHARM, completed her doctorate in pharmacy and is an assistant professor at Galgotias University, Greater Noida. Her areas of interest are neurodegeneration, clinical research, and artificial intelligence. She has edited four books.

Regulärer Preis: 168,99 €
Produktbild für Algorithmen und Datenstrukturen

Algorithmen und Datenstrukturen

- Das Buch stellt alle für das Informatikstudium relevanten Themenbereiche verständlich dar. - Beginnend mit einfachsten Algorithmen, wird die Komplexität nach und nach gesteigert. - Für jeden Algorithmus wird ein lauffähiges Programm inklusive Programmablaufplan vorgestellt, das sich auch direkt in den Programmierpraktika einsetzen lässt. - Mit Programmbeispielen, Programmablaufplänen, Diagrammen, Tabellen, Übungsaufgaben, Praxistipps - Zusatzmaterial zum Buch unter plus.hanser-fachbuch.de - Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten Buches Sie beginnen gerade das erste Semester im Studiengang Informatik und haben deshalb die Vorlesungen Algorithmen und Datenstrukturen 1 und 2 sowie Programmierung 1 und 2 belegt? Dieses Buch hilft Ihnen, die nötigen Erfahrungen und Fähigkeiten zu erwerben, um stressfrei durch Praktika und Prüfungen zu kommen. Die ersten drei Kapitel wenden sich ausschließlich an Einsteiger:innen mit grundlegenden Programmierkenntnissen in C/C++. Von den restlichen Kapiteln profitieren auch im Studium fortgeschrittene Programmierer:innen, die sich an komplexere Themen wie verkettete Listen, Bäume, Graphen, Sortieralgorithmen, neuronale Netze, kryptografische Algorithmen oder Graphen heranwagen. Das Buch bietet einen einfachen Einstieg in das komplexe Thema Algorithmen und Datenstrukturen. Anstatt Comic- oder Pseudocode-Stil wird stets ausführbarer Quellcode in C++ oder Java verwendet. Die Programme sind auf jeder Standard-Linux- Installation lauffähig, inklusive des bei Studierenden immer beliebter werdenden Raspberry Pi. Aber auch unter Windows müssen Sie nur sehr selten Anpassungen am Quellcode vornehmen. AUS DEM INHALT // - Berechenbarkeit - Basisalgorithmen - Rekursive Algorithmen - Verkettete Listen - Bäume - Such- und Sortierverfahren - Signalverarbeitung - Grafische Bildverarbeitung - Simulation neuronaler Netze - Kryptografische Algorithmen - Graphen - Lösung der Übungsaufgaben

Regulärer Preis: 59,99 €
Produktbild für Handbuch IT-System- und Plattformmanagement (3. Auflg.)

Handbuch IT-System- und Plattformmanagement (3. Auflg.)

- Lernen Sie die Methoden, Tools und Instrumente für ein erfolgreiches IT-System- und Plattformmanagement kennen- Aktuelles Wissen und Praxis-Tipps, die Sie in Ihren Tätigkeitsbereichen umsetzen können- Profiwissen für das IT-System- und Plattformmanagement, IT-Architektur, Applikationsmanagement, IT-Servicemanagement, IT-Projektmanagement und CyberSecurity-Management- Von 13 Fachleuten aus Unternehmen, Consulting-Firmen und HochschulenEin effizientes und ganzheitliches Management der installierten IT-Systeme (Applikationen, Datenbanken, IT-Infrastrukturen) und IT-Plattformen (Cloud, Daten, Integration) ist heute unverzichtbar. Nur so lassen sich Geschäftsprozesse optimal unterstützen und neue Geschäftspotenziale generieren.Dieses Handbuch bietet das relevante Wissen für einen erfolgreichen Einsatz von IT-Systemen in systematischer Form (Darlegung der Methoden, Instrumente und Prozesse). Fragen der Planung und Weiterentwicklung der IT-Systemlandschaft werden genauso behandelt wie Aspekte der Koordination (Auftragsmanagement, Systemsupport) und der sicheren Steuerung der installierten IT-Systeme (Qualitätsmanagement, Risiko- und Sicherheitsmanagement, Notfallplanung etc.).Viele Praxistipps und Beispiele helfen Ihnen, IT-Systeme und die Plattformnutzung zu planen und zu verwalten sowie deren stabilen Betrieb zu gewährleisten.Mit Beiträgen von Martin Beims, Christian Bischof, Wolf Hengstberger, Luca Ingianni, Thomas Mandl, Wolfgang Ortner, Stefan Papp, Markus Schiemer, Dierk Söllner, Ernst Tiemeyer, Jörg Wesiak, Manfred Wöhrl, Helmut E. Zsifkovits. Dipl.-Hdl. Ernst Tiemeyer ist seit mehr als 25 Jahren in leitenden Projektfunktionen sowie als IT-Consultant und im Bildungsbereich bzw. Managementtraining tätig. Schwerpunktmäßig befasst er sich in der Praxis mit Projektmanagement, strategischem IT-Management, Enterprise IT-Architekturmanagement, Enterprise IT-Governance, IT-Controlling sowie BPM. Seine Lehrtätigkeit führt er unter anderem an der EU-FH in Hamburg, am FH Joanneum Kapfenberg/Graz sowie an der FOM (Hochschule für Berufstätige) in verschiedenen Bachelor- und Masterstudiengängen aus.

Regulärer Preis: 99,99 €
Produktbild für Handbuch Data Science und KI

Handbuch Data Science und KI

- Bietet einen umfassenden Überblick über die verschiedenen Anwendungsbereiche von Data Science und KI - Mit Fallbeispielen aus der Praxis, um die beschriebenen Konzepte greifbar zu machen - Mit praktischen Beispielen, die Ihnen helfen, einfache Datenanalyseprojekte durchzuführen - Neu in der 3. Auflage: Generativ KI und LLMs, KI und Klimawandel, ML Ops und ML Security, Zahlreiche Kapitel wurden von Grund auf überarbeitet - Ihr exklusiver Vorteil: E-Book inklusive beim Kauf des gedruckten Buches Data Science, Big Data und künstliche Intelligenz gehören derzeit zu den Konzepten, über die in Industrie, Regierung und Gesellschaft viel gesprochen wird, die aber auch am häufigsten missverstanden werden. Dieses Buch erklärt die Konzepte und vermittelt Ihnen das praktische Wissen, um sie zu nutzen. Das Buch nähert sich den Themen Data Science und KI von mehreren Seiten. Es zeigt, wie Sie Data-Plattformen aufbauen und Data-Science-Tools und -Methoden einsetzen können. Auf dem Weg dorthin hilft es Ihnen zu verstehen – und den verschiedenen Interessengruppen zuerklären –, wie Sie mit diesen Techniken Mehrwert generieren können. So kann Data Science in Unternehmen dabei helfen, schnellere Entscheidungen zu treffen, Kosten zu senken und neue Märkte zu erschließen. Darüber hinaus werden die grundlegenden Konzepte von Data Science, einschließlich Statistik, Mathematik sowie rechtliche Überlegungen erklärt. Praktische Fallstudien veranschaulichen, wie aus Daten generiertes Wissen verschiedene Branchen langfristig verändern wird. Das Autor:innenteam besteht aus Datenexpert:innen aus der Wirtschaft und aus dem akademischen Umfeld. Das Spektrum reicht von strategisch ausgerichteten Führungskräften über Data Engineers, die Produktivsysteme erstellen, bis hin zu Data Scientists, die aus Daten Wert generieren. Alle Autor:innen sind im Vorstand oder Mitglieder der Vienna Data Science Group (VDSG). Diese NGO hat sich zum Ziel gesetzt, eine Plattform für den Wissensaustausch zu etablieren. AUS DEM INHALT // - Grundlagen der Mathematik: ML-Algorithmen verstehen und nutzen - Machine Learning: Von statistischen zu neuronalen Verfahren; von Transformers und GPT-3 bis AutoML - Natural Language Processing: Werkzeuge und Techniken zur Gewinnung von Erkenntnissen aus Textdaten und zur Entwicklung von Sprachtechnologien - Computer Vision: Erkenntnisse aus Bildern und Videos gewinnen - Modellierung und Simulation: Modellierung des Verhaltens komplexer Systeme, z. B. der Ausbreitung von COVID-19. Was-wäre-wenn-Analysen - ML und KI in der Produktion: Vom Experiment zum Data- Science-Produkt - Ergebnisse präsentieren: Grundlegende Präsentationstechniken für Data Scientists

Regulärer Preis: 59,99 €
Produktbild für Einstieg in WordPress 6 (6. Auflg.)

Einstieg in WordPress 6 (6. Auflg.)

WordPress 6: So steigen Sie optimal ein, in aktualisierter 6. Auflage aus Februar 2025.WordPress ist der perfekte Einstieg für alle, die eine eigene Website erstellen möchten. Dieses Buch bietet Ihnen einen leicht verständlichen Zugang – ideal sowohl für Anfänger als auch für Anwender mit Vorkenntnissen. Peter Müller führt Sie durch den gesamten Prozess: vom Herunterladen und Installieren von WordPress bis hin zum Betrieb auf Ihrem eigenen Webspace. Sie lernen, wie Sie WordPress optimal für Ihre Bedürfnisse nutzen und moderne Funktionen mit nur wenigen Klicks integrieren. Anschaulich wird Ihnen WordPress sowohl als Blogsystem als auch als Content-Management-System (CMS) erklärt, sodass Sie Schritt für Schritt Ihre eigene Website erstellen. Aktuell zu WordPress 6.7 und dem neuen Standard-Theme. Lernen Sie WordPress 6 richtig kennen Starten Sie mit der Planung Ihrer Website und erfahren Sie, wie Sie eine Domain mit passendem Webspace einrichten. Nach der Installation erstellen und gestalten Sie mit dem Block-Editor Texte, Bilder, Audio und Videos. Passen Sie Aussehen und Funktionalitäten an Sie wollen das Layout Ihrer Website anpassen, übersichtliche Navigationsmenüs erstellen und ein ansprechendes Design umsetzen? Oder neue Funktionen hinzufügen? Mit Themes und Plugins bekommen Sie alle dafür benötigten Werkzeuge an die Hand. Tipps und Tricks für den laufenden Betrieb Erfahren Sie, wie Sie automatisierte Sicherheitskopien erstellen, Ihre Website regelmäßig updaten und für Suchmaschinen optimieren. Mit den richtigen Tools lassen sich viele Wartungsarbeiten effektiver erledigen. Aus dem Inhalt: Planung, Domain, Webspace Installation online und offline WordPress als Blog und CMS Seiten und Beiträge erstellen und gestalten im Block-Editor Texte, Bilder, Audio und Video veröffentlichen Block-Themes anpassen mit dem Website-Editor Klassische Themes anpassen mit dem Customizer Plugins auswählen und installieren Suchmaschinenoptimierung (SEO) Backups, Updates, Tipps & Tricks Leseprobe (PDF-Link)Peter Müller arbeitet seit vielen Jahren als IT-Dozent und ist als Autor von CSS-, HTML- und WordPress-Büchern bekannt.

Regulärer Preis: 29,90 €
Produktbild für PowerShell Fast Track

PowerShell Fast Track

Create complex scripts in PowerShell and learn how to connect them to cloud services like Azure and Azure AD. This updated version of the book will help you learn PowerShell by providing small “cheat” snippets that you can combine to write efficient and effective scripts.New to the book:* PowerShell 5 to PowerShell 7 upgrade throughout the text* New code Snippets for AWS and other technologies.* New Chapter on error reportingPowerShell Fast Track starts with the basics of PowerShell before moving on to discuss functions like date and logs, along with concepts such as inputs for your scripts. Author Vikas Sukhija then walks you through interactive input and Snapins modules, where you will learn GUI button prompts and how to import sessions. He’ll then show you how to report errors through email and log errors to a text file. Reporting CSV (Comma Separate Value) is discussed next, followed by a demonstration of miscellaneous functions, including how to connect your PowerShell scripts with Azure, SharePoint, Teams and other services. As you progress further, you’ll see how PowerShell provides powerful features for automation that can be leveragedfor managing your Teams workload. Finally, using practical examples, you will learn how to implement and create scripts for day-to-day usage.After reading this book, you will be able to hit the ground running and use PowerShell’s powerful features in your own work.WHAT YOU WILL LEARN:* Utilize code Snippets to perform practical tasks* Combine the code to create more complex scripts.* Logging and reporting* Connect to various products such as Exchange, SharePoint, Teams, and AzureADWHO THIS BOOK IS FOR:System administratorsVikas Sukhija has over a decade of IT infrastructure experience with expertise in Messaging, Collaboration & IT automations utilizing PowerShell, PowerApps , Power Automate and other tools. He is currently working as a Global Director at Golden Five Consulting in Canada. He is also a Blogger, Architect, Microsoft MVP and is known by the name TechWizard. As an experienced professional he is assisting small to large enterprises in architecting, implementing, and automating Microsoft 365 and Azure.Chapter 1. PowerShell Basics.- Chapter 2. Date & logs.- Chapter 3. Input to your scripts.- Chapter 4. Interactive Input.- Chapter 5. Adding Snap ins/ Modules.- Chapter 6. Sending Email.- Chapter 7. Error Reporting.- Chapter 8. Reporting CSV.- Chapter 9. Miscellaneous Keywords.- Chapter 10. Product Examples (Daily Use).- Appendix.

Regulärer Preis: 64,99 €
Produktbild für Source Code - Meine Anfänge

Source Code - Meine Anfänge

Meine Anfänge — Die Autobiographie des Microsoft-Gründers. Die ganz persönliche Geschichte eines Jahrhundertcharakters.Die geschäftlichen Erfolge von Bill Gates sind weithin bekannt: der 20-Jährige, der sein Studium in Harvard abbrach, um ein Softwareunternehmen zu gründen, das zu einem Branchenriesen wurde und die Art und Weise, wie die Welt arbeitet und lebt, veränderte; der mehrfache Milliardär, der sich philanthropischen Aufgaben zuwandte, um den Klimawandel, die globale Gesundheit und die Bildung anzugehen.  In Source Code geht es nicht um Microsoft, die Gates Stiftung oder die Zukunft der Technologie. Es ist die menschliche, persönliche Geschichte, wie Bill Gates zu dem wurde, was er heute ist: seine Kindheit, seine frühen Leidenschaften und Ziele.Es ist die Geschichte seiner prinzipientreuen Großmutter und seiner ehrgeizigen Eltern, seiner ersten tiefen Freundschaften und des plötzlichen Todes seines besten Freundes; von seinen Kämpfen, sich anzupassen, und seiner Entdeckung der Welt des Programmierens und der Computer in der Morgendämmerung einer neuen Ära; von seinem Start als Teenager auf einem Weg, der ihn von nächtlichen Eskapaden in einem nahegelegenen Computerzentrum bis in sein Studentenwohnheim führte, wo er eine Revolution auslöste, die die Welt für immer verändern sollte.Bill Gates erzählt zum ersten Mal seine eigene Geschichte: weise, warmherzig, aufschlussreich - ein faszinierendes Porträt eines amerikanischen Lebens.Übersetzt von: Henning Dedekind, Ursula Held, Karsten Petersen, Hans-Peter Remmler, Sigrid SchmidPressestimmen:»Die freimütig erzählten Eskapaden des jungen Bill Gates tragen sehr zum Unterhaltungswert bei: Wenn er sich als Schüler nachts aus dem Haus schleicht, um ein paar Stunden ungenutzte Computerzeit einer PDP-10 für sich abzuzwacken – Mainframes dieser Art, von der Größe mehrere Kühlschränke, boten die einzige Gelegenheit, überhaupt einen Computer zu programmieren. Welch wichtige Rolle gerade diese Systeme für das Microsoft-Werden spielten, macht das Buch deutlich. Schön ist, dass es in Gänze über die stereotypischen Legenden hinausgeht.«Peter Siering, heise online»Wer sich für Algorithmen, Gleitkommas und Betriebssysteme begeistern kann, wird ›Source Code‹ wie einen historischen Thriller lesen.«Süddeutsche Zeitung»Nicht nur Microsoft-Enthusiasten werden der Autobiografie etwas abgewinnen können, es lohnt sich eine Lektüre mit einer politischen Brille.«Frankfurter Allgemeine Zeitung

Regulärer Preis: 24,00 €
Produktbild für Innovative agile Teamkonzepte

Innovative agile Teamkonzepte

Innovative agile TeamkonzepteAgile Entwicklung hat ihren Ursprung in dem Gedanken »ein Team, ein Produkt«. Dass mehrere Teams gemeinsam ein Produkt entwickeln, war in den Anfangsjahren unüblich. Inzwischen haben sich die Verhältnisse umgekehrt, es ist eher die Regel als die Ausnahme, dass mehrere Teams gemeinsam ein Produkt entwickeln.Es gibt verschiedene Skalierungsframeworks, die definieren, wie die Entwicklung mit mehreren Teams organisiert werden kann. Ihr Einsatz birgt jedoch immer die Gefahr des Dogmatismus und der Schwerfälligkeit. Mitunter fühlt sich skalierte »Agilität« eher nach der »Behörde für Agilität« an.Stefan Roock zeigt anhand einer fiktiven Geschichte, wie die Entwicklung mit mehreren Teams so optimiert werden kann, dass sie den Namen »agil« wirklich verdient. Die Geschichte beschreibt, wie Teams gut und immer wieder neu geschnitten sowie übergreifende Funktionalitäten und Abhängigkeiten immer besser organisiert werden. Außerdem werden in der Geschichte innovative Konzepte, Denkansätze und Erkenntnisse vorgestellt, wie Teams jenseits des klassischen Dogmas »klein, langfristig stabil« aufgebaut werden können. Den Abschluss bildet eine ausführliche Zusammenfassung dieser Konzepte und Denkansätze, die auch unabhängig von der Geschichte gelesen werden kann. Die Inhalte des Buches sind auch dann anwendbar, wenn man sich an Kanban oder Extreme Programming orientiert oder einen komplett eigenen Ansatz verfolgt. Wichtig ist lediglich, dass iterativ-inkrementell gearbeitet wird.Leseprobe (PDF-Link)Zielgruppe: Scrum Master, Agile Coaches, Projektmanager*innen, Developers, Produktmanager*innen, Agile LeaderÜber den AutorStefan Roock (it-agile GmbH) will eine bessere Arbeitswelt schaffen, in der Kunden von den Produkten und Services begeistert sind, Mitarbeitende ihre Arbeitsbedingungen lieben und Unternehmen erfolgreich sind. Er unterstützt Menschen und Unternehmen dabei, ihre Potenziale für dieses Ideal zu entfalten. Seit 1999 ist Stefan maßgeblich an der Verbreitung und Weiterentwicklung neuer Arbeits- und Organisationsansätze (agil, Scrum, Kanban etc.) im deutschsprachigen Raum beteiligt. Zunächst als Entwickler in agilen Teams, später als Scrum Master/Agile Coach und Product Owner. Seitdem hat er sein Verständnis dessen, was für begeisternde Produkte und Arbeitsbedingungen notwendig ist, kontinuierlich weiterentwickelt. Hervorragende Produkte entstehen nicht dadurch, dass Teams Anforderungen »agil« umsetzen. Stattdessen müssen Teams gemeinsam und im direkten Kundenkontakt Produkte und Services gestalten. Stefan ist regelmäßiger Sprecher auf Konferenzen, bei User Groups und in Unternehmen. Außerdem hat er zahlreiche Bücher und Artikel veröffentlicht.

Regulärer Preis: 29,90 €
Produktbild für Web Forms with React

Web Forms with React

Set up web forms from scratch using the most popular React form library in use today, React Hook Form. This book is a succinct and practical guide to building robust, scalable and reusable forms. From social media and YouTube video posts, to product listings on e-commerce sites, most information on the web is entered through forms. In this book, you’ll learn how to properly handle forms in React, how to scale them, and how to handle validations, etc.There are many ways to handle forms in React so it’s good practice to have a standard in place. This book will show you how to do so. Once in place, you’ll be able to code powerful, bug-free forms. Additionally, the book highlights the important role React Hook Form plays in scalability when designing forms. You’ll look at how to handle recurring features, such as password fields and profile sections so they can be easily reused across the applications where they are required. Validations are also crucial in building forms.You’ll also see how React Hook Form provides a nice interface for hooking up validations by using either standard native validations or by using a third-party validation library like Yup or Zod. When completed, _Web Forms with React_ will provide you the knowledge and confidence to build strong, and reusable web forms in React from the ground up.WHAT YOU WILL LEARN* Explore Web Forms standards and best practices* Understand the importance of scalability, robustness and reusability when making forms* Set the standard on how to handle and set up forms using React* Add complex validations in React forms WHO THIS BOOK IS FORWeb developers new to React with some prior knowledge of JavaScript and TypeScript. React developers who have experience in building forms but are trying to find a new performant and scalable alternative.USMAN ABDUR REHMAN is a Frontend Tech lead for a US Based Healthcare Company with over four years of professional experience. As a self-taught developer, Rehman studied everything related to programming from YouTube videos, tutorials, blogs, and books. Since gaining his first developer role, Usman has been motivated to give back to the community by teaching coding.Chapter 1: Forms in React.- Chapter 2: React Hook Form.- Chapter 3: React Hook Form Basics.- Chapter 4: Making Forms with React Hook Form.- Chapter 5: Validation.- Chapter 6: Common Use Cases.

Regulärer Preis: 24,99 €
Produktbild für Codebasierte Post-Quanten-Kryptografie

Codebasierte Post-Quanten-Kryptografie

Entdecken Sie die Zukunft der Kryptographie mit „Codebasierte Post-Quanten-Kryptografie - Goppa Codes und das McEliece Kryptosystem“. Dieses Buch bietet eine grundlegende und detaillierte Einführung in eines der sichersten Kryptosysteme unserer Zeit – das McEliece-Kryptosystem. Ursprünglich 1978 entwickelt, widersteht es den modernsten Bedrohungen durch Quantencomputer und setzt neue Maßstäbe in der Post-Quanten-Kryptografie. Mit einer umfassenden Analyse der Goppa Codes und einer verständlichen Darstellung sowohl der Theorie als auch der praktischen Implementierung, ist dieses Werk ein unverzichtbarer Begleiter für jeden, der sich für die nächste Generation der Datensicherheit interessiert. Neben tiefgehenden technischen Einblick erhält man mit dem Buch Zugriff auf eine Implementierung, die es Lesern ermöglicht, die Konzepte interaktiv zu erkunden. Ein Muss für Fachleute der IT-Sicherheit, Akademiker und jeden, der ein tiefes Verständnis für die Mechanismen quantensicherer Verschlüsselung entwickeln möchte. Einleitung. Quantencomputer und moderne Kryptografie. Goppa Codes. Das McEliece-Kryptosystem und seine Varianten. Zusammenfassung und Ausblick. FELIX PETER PAUL ist Informatiker und Mathematiker mit Abschlüssen in Pädagogik und Naturwissenschaften. Er studiert an der Johannes Gutenberg-Universität Mainz und hat sich auf Kryptographie spezialisiert. Seine aktuelle Arbeit konzentriert sich auf vollständig homomorphe Verschlüsselung und Post-Quantum-Kryptographie in Zusammenarbeit mit einem großen Technologieunternehmen, um sichere und zukunftsfähige Verschlüsselungstechnologien zu entwickeln.

Regulärer Preis: 49,99 €
Produktbild für Improving Decision Making Using Semantic Web Technologies

Improving Decision Making Using Semantic Web Technologies

As technology becomes integral to our lives, its influence on decision making in smart cities, healthcare, and manufacturing is undeniable. However, challenges such as limited contextual awareness, domain knowledge, explainability of machine learning (ML), and issues of interoperability, data quality, and GDPR (General Data Protection Regulation) compliance in data sharing hinder effective decision making. This book addresses these critical challenges by exploring how the synergy of semantic technologies (SW), like ontologies and knowledge graphs, with or without ML, can overcome these challenges to improve decision making. Through real-world case studies in data sharing, manufacturing, and agriculture, it offers theoretical and practical insights and guidelines of how SW can enhance prediction accuracy, integrate domain knowledge, support ML explainability, and tackle interoperability, data quality, and GDPR challenges.Dr. Tek Raj Chhetri is currently a postdoctoral associate at the Senseable Intelligence Group at the McGovern Institute for Brain Research at the Massachusetts Institute of Technology, United States. He is the founder and director of CAIR-Nepal (Center for Artificial Intelligence Research Nepal), an artificial intelligence research organization in Nepal. He conducts research in artificial intelligence, knowledge graphs, data privacy, and Internet of Things (IoT) data sharing.Introduction.- Publications.- Bibliography.

Regulärer Preis: 96,29 €
Produktbild für Managing IT in einer digitalen Welt

Managing IT in einer digitalen Welt

Die IT ist für viele Unternehmen unersetzbar geworden. Die Digitalisierung, die in der Zwischenzeit sich verbreitet hat und die Gesellschaft immer weiter prägt, bleibt eine Priorität für viele Unternehmen. Nun hat die Komplexität zugenommen. Es sei die Wahl eines nachhaltigen Partners für eine Cloud Transformation, die Garantie, dass neue digitale Lösungen absolut sicher sind, oder das Angebot eines modernen Arbeitsplatzes, wo Home Office selbstverständlich ist.Entscheidend und gleichzeitig herausfordernd ist die Tatsache, dass alle Ebenen einer IT Organisation gut zusammenarbeiten müssen, damit das Unternehmen sich erfolgreich weiterentwickeln kann. Es handelt sich um die strategische Ebene mit den entsprechenden strategischen Entscheidungen, in erster Linie "make-or-buy" Entscheide. Weiterhin muss die taktische Ebene mit der Durchführung von Projekten und Releases und gleichzeitig das Angebot von hochwertigen IT Services sehr gut funktionieren. Die operative Ebene stellt das Fundament dar, wo die Abwicklung aller Tätigkeiten des Unternehmens sichergestellt werden muss. Verfügbarkeit und Performanz sind Key.Das ganze "Haus der IT" muss in dem Kontext des Unternehmens funktionieren. Die Kultur der Organisation und die Strukturen müssen natürlich berücksichtigt werden.Um eine optimale Transformation der IT ermöglichen zu können, ist es wichtig, ein gutes Verständnis einer IT Organisation zu besitzen und die Zusammenhänge zu verstehen. Einführung. IT-Prozesse. IT-Strategie. IT-Projekt-Portfolio. IT-Projekte. IT-Services. IT-Operations. Reporting und Measurement. Governance. Transformation. Leadership. Grundlegende Werte. DR. LIONEL PILORGET ist Dozent im Masterstudiengang "Business Information Systems" an der Fachhochschule Nordwestschweiz FHNW. Er verfügt über langjährige Erfahrung in verschiedenen IT-Managementpositionen in der Industrie und im Finanzsektor und kann daher die Brücke zwischen Theorie und Praxis schlagen. In den letzten Jahren war er stark in strategische Projekte involviert, um das Thema Digitalisierung mit der Einführung neuer Methoden wie agiler Programmierung zu verbinden. Das Buch bietet Best Practices aus der traditionellen IT-Welt, kombiniert mit modernen Ansätzen, um Unternehmen auf ihrem Weg der Transformation zu begleiten.

Regulärer Preis: 39,99 €