Allgemein
Testing the Creditcoin Blockchain
Follow the quality engineering journey of the Creditcoin blockchain across four distinct implementation versions and a myriad of technologies. Through the eyes of a test engineer, this book discusses testing implementations with the Hyperledger Sawtooth and Substrate frameworks, testing switch from proof-of-work to proof-of-stake consensus algorithm, and testing an Ethereum Virtual Machine compatibility layer.You’ll traverse several years of fast-paced multiple blockchain implementations and technological changes including an explanation of all major components involved, and the approach taken. You’ll also look at examples of test automation approaches and tools, interesting bugs, and testing challenges.Most everything discussed in _Testing the Creditcoin Blockchain_ is open source, ensuring easy access, and multiple references to source code and GitHub are included throughout.WHO THIS BOOK IS FORSoftware testers and quality engineers with limited experience working on a blockchain implementation.WHAT YOU WILL LEARN* Study the many of the components of a distributed blockchain network. * See how components work and where testing can be plugged into a distributed blockchain network environment.* Glimpse into the daily blockchain testing activities of a principal test engineer.* Become familiar with a fast-paced technical software development project.Alex is quality assurance engineer and ISTQB and Red Hat Certified professional with two decades of industry experience as an open source hacker with thousands of contributions, a Python instructor, and co-organizer of FOSDEM’s Testing and Continuous Delivery devroom. He’s also tested multiple components of Red Hat Enterprise Linux, was a test lead for the entire lifecycle of its version 5 family, and later tested various components of the Creditcoin blockchain.Alex holds a Master’s degree in Computer Engineering from the Technical University of Sofia, Bulgaria and loves public speaking and riding fast motorcycles. In his spare time, he’s the lead engineer behind Kiwi TCMS, a popular open source test management system.You can find Alex on LinkedIn, www.linkedin.com/in/alextodorov/ and follow his work directly on GitHub via www.github.com/atodorov.PART 1 INTRODUCTION TO BLOCKCHAIN.- Chapter 1: Introduction to blockchain.- Chapter 2: Blockchain development frameworks.- PART 2 THE CREDITCOIN BLOCKCHAIN – AIMS AND OBJECTIVES.- Chapter 3: The Creditcoin Blockchain.- PART 3 TESTING THE CREDITCOIN BLOCKCHAIN.- Chapter 4: Creditcoin 1.x.- Chapter 5: Creditcoin 2.0.- Chapter 6: Creditcoin 2.3.- Chapter 7: Creditcoin 3.0.- PART 4 BLOCKCHAIN TESTING APPROACHES.- Chapter 8: My blockchain testing approach.- Chapter 9: Conclusions.
Stripe Integration in Angular
Welcome to the book “Stripe Integration in Angular: A Step-by-Step Guide to Creating Payment Functionality”. In this book, I explain how to integrate Stripe into your Angular application. Stripe is a leading payment processing platform that enables businesses to accept online payments. By integrating payment processing into your application, you can create all kinds of e-commerce applications. You will learn how to create the checkout session, how to use webhooks events and finally how to go live. By the end of this book, you will be able to process payments in your Angular application and handle all kinds of scenarios. Let us get started. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.
Azure SQL Revealed
Access detailed content and examples on Azure SQL, a set of cloud services that allows for SQL Server to be deployed in the cloud. This book teaches the fundamentals of deployment, configuration, security, performance, and availability of Azure SQL from the perspective of these same tasks and capabilities in SQL Server. This distinct approach makes this book an ideal learning platform for readers familiar with SQL Server on-premises who want to migrate their skills toward providing cloud solutions to an enterprise market that is increasingly cloud-focused.If you know SQL Server, you will love this book. You will be able to take your existing knowledge of SQL Server and translate that knowledge into the world of cloud services from the Microsoft Azure platform, and in particular into Azure SQL. This book provides information never seen before about the history and architecture of Azure SQL. Author Bob Ward is a leading expert with access to and support from the Microsoft engineering team that built Azure SQL and related database cloud services. He presents powerful, behind-the-scenes insights into the workings of one of the most popular database cloud services in the industry. This book also brings you the latest innovations for Azure SQL including Azure Arc, Hyperscale, generative AI applications, Microsoft Copilots, and integration with the Microsoft Fabric.WHAT YOU WILL LEARN* Know the history of Azure SQL* Deploy, configure, and connect to Azure SQL* Choose the correct way to deploy SQL Server in Azure* Migrate existing SQL Server instances to Azure SQL* Monitor and tune Azure SQL’s performance to meet your needs* Ensure your data and application are highly available* Secure your data from attack and theft* Learn the latest innovations for Azure SQL including Hyperscale* Learn how to harness the power of AI for generative data-driven applications and Microsoft Copilots for assistance* Learn how to integrate Azure SQL with the unified data platform, the Microsoft FabricWHO THIS BOOK IS FORThis book is designed to teach SQL Server in the Azure cloud to the SQL Server professional. Anyone who operates, manages, or develops applications for SQL Server will benefit from this book. Readers will be able to translate their current knowledge of SQL Server—especially of SQL Server 2019 and 2022—directly to Azure. This book is ideal for database professionals looking to remain relevant as their customer base moves into the cloud.BOB WARD is a Principal Architect for the Microsoft Azure Data team, which owns the development for Microsoft SQL Edge to Cloud. Bob has worked for Microsoft for 30+ years on every version of SQL Server shipped from OS/2 1.1 to SQL Server 2022, including Azure SQL. Bob is a well-known speaker on SQL Server and Azure SQL, often presenting talks on new releases, internals, and specialized topics at events such as SQLBits, Microsoft Build, Microsoft Ignite, PASS Summit, DevIntersection, and VS Live. You can also learn Azure SQL from him on the popular series aka.ms/azuresql4beginners. You can follow him at @bobwardms. Bob is the author of the books _Pro SQL Server on Linux_, _SQL Server 2019 Revealed_, _Azure SQL Revealed_ 1st and 2nd Editions, and _SQL Server 2022 Revealed_ (available from Apress Media).1. SQL Server Rises to the Clouds.- 2. What is Azure SQL?.- 3. SQL Server on Azure Virtual Machine.- 4. Deploying Azure SQL.- 5. Configuring Azure SQL.- 6. Securing Azure SQL.- 7. Monitoring and Tuning Performance for Azure SQL.- 8. Availability for Azure SQL.- 9. Using the power of AI with Azure SQL.- 10. Completing Your Knowledge of Azure SQL.- 11. Go Big with the Cloud.
Internet of Things in Bioelectronics
THIS BOOK PROVIDES A COMPREHENSIVE EXPLORATION OF THE EXCITING INTERSECTION BETWEEN TECHNOLOGY AND BIOLOGY AND DELVES INTO THE PRINCIPLES, APPLICATIONS, AND FUTURE DIRECTIONS OF IOT IN THE REALM OF BIOELECTRONICS; IT SERVES AS BOTH AN INTRODUCTION FOR THOSE NEW TO THE FIELD AND AS A DETAILED REFERENCE FOR EXPERIENCED PROFESSIONALS SEEKING TO DEEPEN THEIR KNOWLEDGE.The rapid convergence of technology and biology heralds a new era of evolution in the Internet of Things (IoT), a transformative force enabling interconnected devices to communicate and operate with unparalleled synergy. This is particularly true in the groundbreaking field of bioelectronics, where the fusion of biological systems with electronic devices and IoT is reshaping the landscape of bioelectronics, promising to open up new frontiers in healthcare, diagnostics, and personalized medicine. This timely book explores the numerous ways in which IoT-enabled bioelectronic devices are used to monitor and enhance human health, from wearable sensors that track vital signs to implantable devices that can communicate with healthcare providers in real time. One central theme of this book is the transformative impact of IoT on healthcare. By enabling continuous, remote monitoring of patients, IoT technologies are not only improving the accuracy of diagnostics but also making healthcare more accessible and personalized. The book also addresses the critical issues of securing health records on the internet, which are of paramount importance as we increasingly rely on interconnected devices to collect and transmit sensitive health information. Additional attention is paid to the future directions of IoT in bioelectronics and the integration of innovative areas, such as artificial intelligence, machine learning, and big data analytics, in driving the development of ever more sophisticated and capable bioelectronic systems. AUDIENCEThe target audience includes professionals, researchers, academics, and students involved in various fields related to bioelectronics, IoT, healthcare, biotechnology, engineering, and related disciplines. HARI MURTHY, PHD, is a faculty member in the Department of Electronics and Communication Engineering, CHRIST (Deemed to be University), Bengaluru, India. His doctoral thesis from the University of Canterbury, New Zealand was on novel anticorrosion materials. He has published several articles in international journals and conferences as well as edited “Novel Anti-Corrosion and Anti-Fouling Coatings and Thin Films” with the Wiley-Scrivener imprint (2024). MARTA ZUREK-MORTKA, PHD, is a senior specialist in the Department of Control Systems, Lukasiewics Research Network, Institute for Sustainable Technologies, Radom, Poland. She obtained her doctorate in electrical engineering from the University of Technology and Humanities Kazimierz Pulaski in 2020. She is an author and co-author of more than 30 publications in SCI journals, as well as a co-author of four patent applications. Her research interests include electromobility, renewable energy, power electronic converters for electromobility, and renewable energy sources. VINAY JHA PILLAI, PHD, is an assistant professor in the Department of Electronics and Communication Engineering, CHRIST (Deemed to be University), Kengeri Campus, Bangalore, India. His primary research is in the early detection of breast cancer using optical imaging and holds two patents related to the subject. He is also exploring the domain of sensors for extracting coating parameters, especially for thermal barrier coatings which have a wide application in the field of corrosion and biofouling inhibitors. KUKATLAPALLI PRADEEP KUMAR, PHD, is an associate professor and data science program coordinator at Christ University, Bangalore, India. He has published multiple publications in journals and conferences. His areas of interest include data science, information security, data provenance, and multiparty secret sharing.
Human Hacked
DISCOVER THE FUTURE OF CYBERSECURITY THROUGH THE EYES OF THE WORLD'S FIRST AUGMENTED ETHICAL HACKERIn Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker by Len Noe, a pioneering cyborg with ten microchips implanted in his body, you'll find a startlingly insightful take on the fusion of biology and technology. The author provides a groundbreaking discussion of bio-implants, cybersecurity threats, and defenses. Human Hacked offers a comprehensive guide to understanding an existing threat that is virtually unknown. How to implement personal and enterprise cybersecurity measures in an age where technology transcends human limits and any person you meet might be augmented. The book provides:* Exposure of a subculture of augmented humans hiding in plain sight* Explorations of the frontier of bio-Implants, showing you the latest advancements in the tech and how it paves the way for access to highly restricted technology areas* Discussions of cybersecurity tactics, allowing you to gain in-depth knowledge of phishing, social engineering, MDM restrictions, endpoint management, and more to shield yourself and your organization from unseen threats* A deep understanding of the legal and ethical landscape of bio-implants as it dives into the complexities of protections for augmented humans and the ethics of employing such technologies in the corporate and government sectorsWhether you're a security professional in the private or government sector, or simply fascinated by the intertwining of biology and technology, Human Hacked is an indispensable resource. This book stands alone in its category, providing not just a glimpse into the life of the world's first augmented ethical hacker, but also offering actionable insights and lessons on navigating the evolving landscape of cybersecurity. Don't miss this essential read on the cutting edge of technology and security. LEN NOE is a technical evangelist, white hat hacker, and biohacker for CyberArk Software. He’s an international cybersecurity speaker with 10 digital devices implanted in his body. As a global thought leader in the Transhuman/Human+ movement, he uses his microchip implants to advance cybersecurity and the human experience. Foreword xiiiIntroduction xix1 THE HUMAN YEARS 1The Odyssey 2 2The Commodore 64 4Newb Before It Was a Thing 5Windows into the Corporate World 7A Hacker Is Born 8A Life Divided 9Flesh Is Stronger Than Steel 102 A CHANGE IN DIRECTION 15Into the Light 17Road Warrior 173 SYMBIOTIC ATTACK VECTOR 21Tap-to-Pwn 22My First Attack: Dinner and a Show 284 TRANSHUMANISM: WE WHO ARE NOT AS OTHERS 31A Brief History of Transhumanism 33I, Cyborg 38Bad Intentions 39Notes 425 USING THEIR LAWS AGAINST THEM 43Prepare for Takeoff Seat Backs and Tray Tables 45Obfuscation by Law 476 A TECHNOLOGICAL REBIRTH 51Finding My Techno-shaman 55Honey, We Need to Talk 587 MY FIRST INSTALLS 61Human MFA 63Touching Digital 65Cyberpunk in Downtown Austin 66I Am Machine 71Physical Meets Biological 72Digital Lockpicks 73Magnetic Vision 75My Tools 78Note 808 I AM THE CYBER THREAT 81Mobile Devices 81L3pr@cy Attack 81Fl3$h-H00k Attack 82Implant a Man-in-the-Middle Attack 84Implant Phishing/Smishing Attack 95Implant Automation Attack 99Physical Access 100H@nd-$h@k 3 102Magnetic Tracing 104Notes 1079 LIVING THE TRANSHUMAN LIFE 109VivoKey Chips 109VivoKey Spark 2 109VivoKey Apex 111Cheeseburger Use Cases 112Walletmor 115NeXT Chip and BioMagnet 11610 I’M HACKABLE 119Identity Evolution 120Cultural Significance 121What Is “Acceptable”? 123Am I an Abomination? 124Note 12611 HERE THERE BE GRINDERS 127The PirateBox and PegLeg 127The HakLeg 129HakLeg Antenna 130A Grinder After All 131Why Me? 131Note 13212 CURRENT LIMITATIONS OF TRANSHUMAN TECHNOLOGY 133Cyber Defense Against Humans 135Technological Identification and Mitigation 136Phishing Attack Defense 138Smishing Attack Defense 139MitM Defense 139Technological Work-Life Balance 141Physical Access Attacks 141Specialized K9 Detection 143Notes 14513 THE FUTURE OF TRANSHUMAN TECHNOLOGY 147Brain–Computer Interfaces 148Invasive BCIs 148Early Issues in the Neuralink BCI 149Neuro Rights 150Partially Invasive BCIs 151Noninvasive BCIs 152Smart Devices 153Internal Power 154Sound Power 155Glucose-Powered Metabolic Fuel Cell 155Kinetic Power 156Thermal Power 156Batteries 157AI: A Necessary Evil 158Military Defense/Espionage 159Haptics 161Notes 16214 TRANSHUMAN RIGHTS ARE HUMAN RIGHTS 165Transhuman Discrimination 168The Hypocritic Oath 172Transhuman, but Still Human 173Notes 17515 MY FUTURE AS A TRANSHUMAN 177Final Thoughts 180Notes 182A My Hardware 183NExT 183VivoKey Spark 2 (Cryptobionic) 183flexNExT 184flexM1 “Magic” 1k 185flexEM T 5577 186Titan-Sensing Biomagnet 186Walletmor 187flexDF2 DESFire 188VivoKey Apex 188flexClass (HID iClass) 189B FAQs 191C Resources 195My Body Mechanics 195Organizations, Clubs, and Information Hubs 195Implant Distributors 197GitHub Repos 197Open-Source Tools 197Acknowledgments 199About the Author 201Index 203
The Embedded Project Cookbook
Learn how to create and release an embedded system in a fast and reliable manner. This book will help you build and release a commercially viable product that meets industry standards for quality. The book is not just about code: it covers non-code artifacts such as software processes, requirements, software documentation, continuous integration, design reviews, and code reviews.While specifically targeting microcontroller applications, the processes in this book can be applied to most software projects, big or small. Additionally, the book provides an open-source C++ framework that can be used to quick start any embedded project. This framework has an OSAL (OS Abstraction Layer) and essential middleware that is needed for many embedded systems. Using a hands-on approach of building-and-testing the software application first allows you to develop a significant amount of production quality code even before the hardware is available, dramatically reducing the start-to-release duration for a project.As you follow the recipes in this book, you will learn essential software development processes, perform just in time design, create testable modules, and incorporate continuous integration (CI) into your day-to-day developer workflow. The end-result is quality code that is maintainable and extensible, and can be reused for other projects, even when presented with changing or new requirements._The Embedded Project Cookbook _is focused on the _how_ of developing embedded software. For a discussion of the _why_, readers are invited to refer to the optional companion book _Patterns in the Machine: A Software Engineering Guide to Embedded Development_.WHAT YOU WILL LEARN* Separate software architecture from software design* Write software documents that are intrinsically resistant to going out-of-date.* Identify the processes, workflows, and best practices for the team to follow.* Initiate code reviews before code is checked intoa stable branch.* Design testable modules and implement automated unit testing that doesn’t require hardware.* Incorporate continuous integration into the day-to-day developer workflow, including automated integration testing.* Create a code base that can be reused on other projects.WHO THIS BOOK IS FORMid-level developers and software leads who are looking to get up and running without all the underlying theories. This book is also for professionals looking to learn how to productize a concept or technology and sell the results to a customer.JOHN TAYLOR has been an embedded developer for over 30 years. He has worked as a firmware engineer, technical lead, system engineer, software architect, and software development manager for companies such as Ingersoll Rand, Carrier, Allen-Bradley, Hitachi Telecom, Emerson, and several start-up companies. He has developed firmware for products that include HVAC control systems, telecom SONET nodes, IoT devices, micro code for communication chips, and medical devices. He is the co-author of five US patents and holds a bachelor’s degree in mathematics and computer science.WAYNE TAYLOR has been a technical writer for 27 years. He has worked with companies such as IBM, Novell, Compaq, HP, EMC, SanDisk, and Western Digital. He has documented compilers, LAN driver development, storage system deployment and maintenance, and dozens of low-level and system-management APIs. He also has ten years of experience asa software development manager. He is the co-author of two US patents and holds master’s degrees in English and human factors. He is a co-author of _OS/2 and NetWare Programming_ (Van Nostrand Reinhold, 1995).Chapter 1: Introduction.- Chapter 2: Requirements.- Chapter 3: Analysis.- Chapter 4: Software Development Plan.- Chapter 5: Preparation.- Chapter 6: Foundation.- Chapter 7: Building Applications with the Main Pattern.- Chapter 8: Continuous Integration Builds.- Chapter 9: Requirements Revisited.- Chapter 10: Tasks.- Chapter 11: Just in Time Detailed Design.- Chapter 12: Coding, Unit Tests, and Pull Requests.- Chapter 13: Integration Testing.- Chapter 14: Broad Support Package.- Chapter 15: Drivers.- Chapter 16: Release.- Appendix A: Getting started with the Source Code.- Appendix B: Running the Example Code.- Appendix C: Introduction to the Data Model Architecture.- Appendix D: LHeader and LConfig Patterns.- Appendix E: CPL C++ framework.- Appendix F: LHeader and LConfig Patterns.- Appendix G: Ratt.- Appendix H: GM6000 Requirements.- Appendix I: GM6000 System Architecture.- Appendix J: GM6000 Software Architecture.- Appendix K: GM6000 Software Development Plan.- Appendix L: GM6000 Software Detailed Design.- Appendix M: GM6000 Software Detailed Design.- Appendix N: GM6000 Fuzzy Logic Temperature Control.- Appendix O: Software C/C++ Embedded Coding Standard.- Appendix P: GM6000 Software Requirements Trace Matrix.- Appendix Q: GM6000 Software Bill of Materials.- Appendix R: GM6000 Software Release Notes.
Future Networking Essentials
Explore virtualized networking environments through the Cloud, Edge, and 5G core networks, and their applications. This book covers the primary approaches related to setting up and experimenting with related cloud and networking environments using virtual networks, and virtual network functions.You’ll start by experimenting with future networking environments and learn a variety of Docker basics and essential networking skills. Specifically, containers, networking, volumes, iptables (for Docker environment security) and default orchestration features are discussed to help set up custom cloud, edge, and 5G core networking environments. Hands-on activities related to Docker networking and services features for publishing, scaling, and monitoring of services are also provided. By the end of Part 1, you’ll be able to set up a variety of custom networking environments easily using Docker compose features and secure the set-up using iptables.Part 2 introduces Network Function Virtualization (NFV) architecture, and its roles in Cloud and 5G core networks. You’ll learn to deploy an open source 5G core platform from OpenAirInterface (OAI) using Docker. Then, you’ll set up and evaluate Virtual Network Functions (VNF) over suitable virtual networks. Hands-on activities are featured to guide you through the process of setting up and deploying VNFs such as DHCP, DNS, and proxy servers.Finally, Part 3 discusses key virtual networks such as IP VLANs, MAC VLANs, and overlay networks using Docker cluster setups. You’ll use interesting hands-on activities to easily experiment and learn cloud and 5G core network set-up related virtual networks, overlay networks, and network slicing. When done, you’ll be able to set up a variety of VNFs, carefully deploying VNFs, and conducting slicing activities over Docker cluster setups.WHAT YOU’LL LEARN* Explore Cloud, Edge, and 5G core networking using Docker networking features.* Build and evaluate a variety of virtual networks and deploy Virtual Network Functions (VNFs) and Network Slices using Docker swarm setups.* Set up and deploy an open source 5G core network using Docker for experimenting.* Enhance cloud environment and applications security using linux security features such as Capabilities, Seccomp, and AppArmors.* Develop and evaluate network security experiments using Scapy and Docker networks.WHO THIS BOOK IS FORNetwork engineers, cloud engineers, students, faculty, and cloud and networking researchers.Dr Anil Kumar Rangisetti received his PhD in the field of computer science and engineering from IIT Hyderabad. He has nearly 10 years of teaching and research experience in computer science and engineering. During his career, he worked at prestigious Indian institutions such as IIIT Dharwad, SRM-AP, and GMR, and worked at MNC such as ARICENT, IRL-Delhi. Currently he is working as Assistant Professor in the Department of CSE, IIITDM Kurnool.Broadly his research interests include Wi-Fi, Next Generation Mobile Networks, SDN, NFV, and Cloud computing. He published a number of novel research publications with IEEE, Springer, Elsevier, Wiley in the field of a variety of networking technologie such as Wi-Fi, 4G/5G, SDN , NFV and Cloud technologies. He guided a significant number of undergraduate and postgraduate students for project works. Besides research activities, he is interested in writing books on computer science technologies and programming languages.Part 1: Docker Basics and Networking.- Chapter 1: Getting started with Future Networking Environments.- Chapter 2: Exploring Docker Networking features.- Chapter 3: Setting up realistic networking scenarios.- Part 2: Network Function Virtualization and Virtual Networks Basics.- Chapter 4: Virtualizing network functions in cloud and telecom core networks.- Chapter 5: Experiment with VNFs over Docker Containers.- Chapter 6: Importance of virtual networks in cloud and telecom networks.- Part 3: Cloud and Networking Security.- Chapter 7: Learning Docker Security for experimenting with Cloud Security.- Chapter 8: Explore Scapy for experimenting with networking environments security.- Chapter 9: Recreating and analyzing realistic network security scenarios.
Software Testing for Managers
Software leaders, directors, and managers of all types need to know about software testing. It can be a tough climb up the mountain of technical jargon. Engineers seem to be speaking a language all their own sometimes. Most books on testing are deep in the weeds with technical terms and techniques that simply aren’t applicable even to technical managers.This book provides a high-level perspective on broad topics in a friendly, easy-to-absorb style. Get started and up to speed quickly with immediately useful, actionable guidance. Guidance on team structure, best practices and even common pitfalls will save you time and money, while automation and code reuse will provide exponential value.There’s a gap of knowledge between engineers and their managers; they are almost speaking different languages and the jargon can be confusing. There’s a lot to know about the world of testing. Test from the Top delivers quick, concise guidance to bridge the gap! It offers clear, actionable steps and is a must have for busy leaders who need quick answers.WHAT YOU WILL LEARN:* How and where to integrate testing in the software development lifecycle* Testing terminology and concepts from a management perspective* Common pitfalls of testing, how to avoid wasted time* How to hire test-aware teams* The value in reusing test code for more generalized automationWHO THIS BOOK IS FOR:Software managers, Lead Software Engineers, Tech Directors, CTOs, Project Managers, software leaders of all kinds. These leaders understand the value of testing, but have not yet built out extensive automation or team structure. Either new to testing concepts or modernizing systems or looking to improve software quality. Assumed to have a working knowledge of the Software Development Lifecycle and basic project management (no specific methodology required).Ross Radford is the founder of TestfromtheTop.com and is on a mission to bring test awareness to leadership. He has spent a career developing and testing enterprise level software for huge projects serving millions of users. No matter the size of the organization, if you’re building software, testing is crucial. Leaders are in a unique position to unblock and prioritize quality assurance at every level. Personally, as a software professional, testing has been a deep interest motivated by improving craft and quality. Radford developed knowledge sharing presentations for peers and conference talks, with the common feedback from software engineers: “This is great. Now convince my boss!” He set out to do just that.Chapter 1: Test Awareness.- Chapter 2: Test Driven Development vs. Test During Development.- Chapter 3: Quality _and _Assurance.- Chapter 4: Specification.- Chapter 5: Automation Reuse.- Chapter 6: Coverage.- Chapter 7: Security.- Chapter 8: Conclusion.- Chapter 9: Pitfalls.
Security and Privacy for Modern Networks
This book reviews how to safeguard digital network infrastructures, emphasizing on the latest trends in cybersecurity. It addresses the evolution of network systems, AI-driven threat detection, and defense mechanisms, while also preparing readers for future technological impacts on security. This concise resource is essential to understanding and implementing advanced cyber defense strategies in an AI-integrated world.Readers are provided with methods and tips on how to evaluate the efficacy, suitability, and success of cybersecurity methods and AI/machine learning applications to safeguard their networks. Case studies are included; with examples of how security gaps have led to security breaches and how the methods discussed in the book would help combat these.This book is intended for those who wish to understand the latest trends in network security. It provides an exploration of how AI is revolutionizing cyber defense, offering readers from various fields including insights into strengthening security strategies. With its detailed content, the book empowers its audience to navigate complex regulations and effectively protect against a landscape of evolving cyber threats, ensuring they are well-equipped to maintain robust security postures within their respective sectors.WHAT YOU WILL LEARN:* The transformative role AI plays in enhancing network security, including threat detection, pattern recognition, and automated response strategies.* Cutting-edge security protocols, encryption techniques, and the deployment of multi-layered defense systems for robust network protection.* Insights into vulnerability assessments, risk analysis, and proactive measures to prevent and mitigate cyber threats in modern network environments.WHO THIS BOOK IS FOR:IT professionals and network administrators, cybersecurity specialists and analysts, students and researchers in computer science or cybersecurity programs, corporate decision-makers and C-level executives responsible for overseeing their organizations' security posture. Also security architects and engineers designing secure network infrastructures, government and defense agency personnel tasked with protecting national and organizational cyber assets. Finally technology enthusiasts and hobbyists with a keen interest in cybersecurity trends and AI developments and professionals in regulatory and compliance roles requiring an understanding of cybersecurity challenges and solutions.SESHAGIRIRAO LEKKALA, A seasoned Cloud and Network Security expert, brings a potent combination of an Electrical and Electronics Engineering degree with 16 years of robust experience in architecting software solutions for the telecommunications industry. Renowned for his expertise in engineering highly scalable, distributed networking solutions tailored for Cloud and AI technologies, his strategic insights and architectural ingenuity have been critical in generating multi-billion-dollar revenue for industry giants. His groundbreaking inventions in SD-WAN and adaptive traffic engineering established him as a leading figure in the field.His commitment extends beyond technical mastery; he actively fosters the professional development of emerging talent through mentorship and contributes to the industry's body of knowledge through his scholarly articles. His influence is recognized in both academic and professional circles, as he regularly serves as a judge at various national and international events, including startup pitches and hackathons, which affirms his reputation as a reliable and prominent leader in Network SecurityPRIYANKA GURIJALA, with over a decade of experience, is a recognized expert in designing robust Cloud Networking Solutions. Holding a Master’s degree in Electrical and Computer Engineering from the University of Maryland, College Park, she has played pivotal roles in driving product success and fostering organizational growth at industry-leading companies. Currently at the forefront of innovation, she applies her expertise in Networking and Artificial Intelligence to advance Azure cloud infrastructure capabilities. She has made significant contributions in the fields of secure network configuration and remote management. She excels in translating visionary concepts into practical solutions, rigorously evaluating functionality, and refining technologies to align with industry standards, demonstrating her steadfast commitment to technological progress.Chapter 1: Introduction to Modern network Systems.- Chapter 2: Building Blocks of Network Security.- Chapter 3: Navigating the Cyber Threat Landscape.- Chapter 4: Cryptography: The Backbone of Secure Communications.
Autonomous Data Security
This book focuses on analyzing the foundational requirements necessary to construct an autonomous data protection solution for enterprise businesses. It navigates readers through various options and tools, outlining the advantages and disadvantages of each. Covering diverse deployment environments including cloud, on-premises, and hybrid setups, as well as different deployment scales and comprehensive channel coverages, it encourages readers to break away from conventional norms in their approach.By exploring the factors that should be taken into account, the book highlights the significant gap in existing data safeguarding solutions, which often rely solely on configured security policies. It proposes a forward-thinking security approach designed to endure over time, surpassing traditional policies and urging readers to consider proactive autonomous data security solutions. Additionally, it delves into the system's ability to adapt to deployed environments, learn from feedback, and autonomously safeguard data while adhering to security policies.More than just a set of guidelines, this book serves as a catalyst for the future of the cybersecurity industry. Its focus on autonomous data security and its relevance in the era of advancing AI make it particularly timely and essential.WHAT YOU WILL LEARN:* Understand why data security is important for enterprise businesses.* How data protection solutions work and how to evaluate a solution in the market.* How to start thinking and evaluating requirements when building a solution for small, medium, and large enterprises.* Understand the pros and cons of security policy configurations defined by administrators and why can’t they provide comprehensive protection.* How to safeguard data via adaptive learning from the deployed environment – providing autonomous data security with or without policies.* How to leverage AI to provide data security with comprehensive proactive protection.* What factors to consider when they have to protect and safeguard data.WHO THIS BOOK IS FOR:The primary audience is cybersecurity professionals, security enthusiasts, C-level executives in organizations (all verticals), and security analysts and IT administrators. Secondary audience includes professors and teachers, channel integrators, professional services, and hackers.PRIYANKA NEELAKRISHNAN is a distinguished data security expert with over a decade of experience in building world-class data protection solutions. Her illustrious career includes pivotal roles at renowned cybersecurity firms such as Palo Alto Networks and Symantec, where she has consistently driven innovation and excellence.As the Product Line Manager at Palo Alto Networks, Priyanka has been instrumental in conceptualizing, designing, and launching transformative cybersecurity products. Her efforts have led to the widespread adoption of advanced information protection solutions, significantly enhancing enterprise security. During her tenure at Symantec (now Broadcom), Priyanka spearheaded initiatives in on-prem, cloud, and hybrid data protection, notably developing the industry's first cloud data protection solution tailored for large enterprise customers. This groundbreaking solution encompassed all major cloud channels, including Email, Web, and Applications, and featured patented content detection technologies.Recognized as a go-to authority in the field of data protection, Priyanka is highly regarded for her mentoring capabilities and expertise across a wide range of data security topics. She is also a renowned speaker and independent researcher, contributing extensively to the advancement of the cybersecurity field. Her innovative products and strategic insights have earned her leadership and excellence awards, underscoring her significant contributions to the cybersecurity landscape.Chapter 1: Introduction, Data Security, and Fundamental Requirements.- Chapter 2: Tradition Data Security.- Chapter 3: Thinking Outside Norms.- Chapter 4: Policy-Less Data Security.- Chapter 5: AI Driven Data Security.- Chapter 6: Conclusion and Design For the Future.- Chapter 7: Future Ready Data Security.
Ritsch + Renn. Die besten IT-Cartoons aus 25 Jahren
Ritsch + Renn. Die besten IT-Cartoons aus 25 Jahren.Die IT-Welt steckt voller Absurditäten: Computer, die mehr Arbeit machen, als sie uns abnehmen, Technik, die nervt, anstatt zu begeistern, und dann noch Smartphones, die fragen, ob man ein Roboter ist. Ritsch und Renn bieten eine kurze Pause vom alltäglichen IT-Wahnsinn und nehmen die Welt der Technik auf humorvolle Weise unter die Lupe. Ob selbstfahrende Autos, die ihre Insassen an der Raststätte vergessen haben, Sticheleien gegen die Verschlimmbesserungen der neuesten Windows-Version oder sogar Gott beim Online-Shopping, all das haben Ritsch und Renn in den „Schlagseiten“ des Computermagazins c't festgehalten. Mal kurios, mal völlig absurd, mal nah an der Realität, aber immer lustig. In diesem Buch finden Sie eine Sammlung der besten Cartoons aus 25 Jahren „Schlagseiten“ mit exklusivem, unveröffentlichtem Material, Skizzen und Hintergrundinfos.Abschalten und loslachen1. Witzig, absurd, einfach zum LachenVon Admins, Windows und überhitzten PCs bis zu Smartphones, Social Media und KI, gibt es kein Thema, zu dem Ritsch und Renn keine Pointe haben.2. 25 Jahre SchlagseitenDie Schlagseiten haben mehr zu bieten als nur witzige Pointen. Die Cartoons von Ritsch und Renn sind auch ein Abbild von 25 Jahren IT-Geschichte.3. Neues unveröffentlichtes MaterialMit Skizzen und Hintergrundinfos geben die beiden Cartoonisten einen spannenden Einblick in ihre Arbeit.25 Jahre Ritsch und RennEine Auswahl der lustigsten WerkeÜber 150 CartoonsZeitreise durch 25 Jahre IT-HumorEin Blick in die WerkstattFür IT-Profis, Nerds und alle, die am digitalen Alltag Spaß habenÜber die Autoren: Harald Ritsch ist ein international erfolgreicher Illustrator. Begonnen hat er mit dem Zeichnen von Comics und Cartoons, einer Leidenschaft, die er heute noch mit seinem Kompagnon Marcus Renn, einem Texter und Konzeptentwickler, begeistert auslebt.Marcus Renn ist ein leidenschaftlicher Ideenentwickler, Texter, Mediendesigner, Humorist und Universitätslektor in Wien.
Home Assistant (2. Auflg.)
Home Assistant ist Ihr Begleiter auf dem Weg zum eigenen Smart Home. Im Handumdrehen integrieren Sie Geräte und Dienste in Ihr System und automatisieren Schaltungen und Szenen ganz nach Ihren Bedürfnissen. Udo Brandes beschreibt alle Schritte, die Sie für Ihr eigenes Smart Home benötigen, von der Einrichtung über die Verwaltung bis hin zur Automatisierung. So erfahren Sie in übersichtlichen Kapiteln zum Nachschlagen, wie Sie den Home Assistant um Datenbank- und Programmiermöglichkeiten erweitern, mit ESPHome eigene Schalter und Sensoren einbinden und daraus ein Komplettpaket für die Heimautomation schnüren.Neu in der 2. Auflage: Ein Ausblick auf den neue Matter-Standard zur Heimautomation und die Einrichtung einer Home-Assistant-Installation auf Proxmox.Aus dem InhaltDas Setup und der erste Start: das Webinterface von Home AssistantHome Assistant administrierenGeräte, Dienste, EntitätenAutomatisierungen mit Szenen, Skripten und VorlagenDashboards, Apps und externer ZugriffMedien und SprachdiensteBereiche und ZonenWerkzeuge und HelferDatenspeicherung mit MariaDB und InfluxDBSonoff, Tasmota, Shelly, Matter und Tuya integrierenProgrammierung mit Node-REDEigene Geräte mit ESPHome Leseprobe (PDF)Über den Autor:Udo Brandes ist selbständiger Programmierer, IT-Entwickler und Autor. Die Möglichkeiten der Mikrocontrollerprogrammierung sind Zukunftsthemen, die ihn faszinieren und mit deren Chancen und Risiken er sich seit langem intensiv befasst.
Car IT kompakt Reloaded
Die vielen neuen Funktionen, die im vernetzten Auto Realität werden, finden Sie in diesem Buch übersichtlich beschrieben. Dabei geht es von der Einbindung von Google und Facebook bis hin zu Diensten, die Ihnen helfen Ihren Parkplatz wiederzufinden, per App Ihr Auto einzuparken oder das Sonnendach aus der Ferne zu schließen, wenn es regnet.Als Ziel dieser Entwicklung wird das autonome Fahren definiert inklusive aktueller Entwicklungen, Implementierungsvarianten und den wesentlichen Herausforderungen bezüglich der Sicherheit und Rechtslage. Das Buch gibt darüber hinaus Auskunft zu notwendigen Qualitätsstandards in der Entwicklung komplexer Fahrzeug-IT-Systeme.Zum Abschluss werden die Auswirkungen auf Wirtschaft, Gesellschaft und Politik beschrieben. Dabei werden speziell Fahrzeugnutzer sowie Fahrzeughersteller und ihre Lieferanten berücksichtigt.ROMAN MILDNER ist Berater, Projektmanager und Buchautor für die Themen Projektorganisation und Prozessqualität in der Automobilindustrie.THOMAS ZILLER ist Projektmanager, der zudem sein umfassendes Wissen als Dozent an der Fachhochschule Heilbronn weitergibt.FRANCO BAIOCCHI ist ein Intacs™-zertifizierter Competent Assessor und Projektmanager, der seit 2021 als selbstständiger Berater wirkt.Fahrzeugindustrie zwischen Tradition und Innovation.- Das autonome Fahren.- Das vernetzte Fahrzeug.- Automobile Qualität.- Herausforderung automobiles Projektmanagement.- CORE SPICE.- Automobile Strategie im Fokus.- Automobile Zukunft.
Angular for Kids
Welcome to the book “Angular for Kids: Start your Coding Adventure”. This book is your introduction to the world of Angular. It's your first step towards developing websites and mobile applications. With Angular, you can turn your ideas into reality. Learning should be fun, so you will feel like you are reading a story. By the end of this book, you will have a good understanding of Angular. You will have taken the first steps in your modern web programming adventure. Have fun programming! Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.
Hands-On Object-Oriented Programming
Learn how to easily design and implement a software system using object-oriented programming. Through hands-on activities, this book equips you with the real-world practice needed to master OOP skills that can be applied universally across any programming language.This book is dedicated to bridging the gap between theoretical concepts and practical implementation in software development using OOP. Readers will first understand the importance of OOP in handling software complexities before learning how to model real-world problems through access control, extendible object design, and object relationships. Specifically, the author discusses how to use inheritance, association, and polymorphism concepts for implementing reusable and easy-to-use complex software. More importantly, this book covers design patterns and event-driven programming for learning how to model complex interactions among various objects of the software system to implement various use cases.Unlike existing books on OOP which teach syntax and semantics through standard examples, this book leverages an immersive learning experience through a variety of real-world use cases, applications, games, and system software. While written in C++, the skills can be applied to any OOP language of the reader's preference. The book's last chapters will quickly introduce Python and Solidity languages for learning advanced technologies. By the end, novice and seasoned developers will know how to implement practical and reusable software systems with confidence.WHAT YOU WILL LEARN* Apply OOP concepts through real-time use cases: games, applications software (online shopping, reservations, etc.), system software (protocols, simulators, etc.), and modeling and implementation using C+* Design and implement reusable and extendible software with OOP* Understand the importance of design patterns and learn how to use them for solving real-time issues* Use event-driven programming for implementing complete interactions of complex application software, system software, and simulators* Implement OOP using C++ features and discover Python and Solidity constructs for OOPWHO THIS BOOK IS FORBeginners and intermediate software developers with basic programming knowledge to quickly learn OOP concepts with C++. Advanced users will find it useful for quickly exploring best-design principles, patterns, and event-driven programming for implementing complex software systems.DR. ANIL KUMAR RANGISETTI received his PhD in the field of computer science and engineering from IIT Hyderabad. He has 10 years of teaching and research experience in computer science and engineering. During his career, he worked at prestigious Indian institutions such as IIIT Dharwad, SRM-AP, and GMR, and worked at software development and research labs such as ARICENT, IRL-Delhi. Currently he is working as Assistant Professor in the Department of CSE, IIITDM Kurnool. He trained the students in OOP languages, and how to use advanced simulators (NS-3), Docker, and Networking tools for researching and developing applications at his work places. He guided a significant number of undergraduate and postgraduate students for project works.Broadly, his research interests include Wi-Fi technologies, Next Generation Mobile Networks, SDN, NFV, and Cloud Computing. Besides research activities, he is interested in writing and reviewing books on computer science technologies and programming languages. He published a number of novel research publications with IEEE, Springer, Elsevier, and Wiley in the field of a variety of networking technologies such as LTE, SDN and NFV, and Wi-Fi technologies. He authored a book titled _Advanced Network Simulations Simplified._Chapter 1: Importance of Object Oriented Programming.- Chapter 2: Start Learning OOP Using C++.- Chapter 3: Systematically Starting and Stopping Software Objects.- Chapter 4: Exploring Important C++ Features.- Chapter 5: Quickly and Systematically Model Real-World Problems into Software.- Chapter 6: Quick Software Development using OOP.- Chapter 7: Easy to Use Software Development Using OOP.- Chapter 8: Learning the Design Patterns.- Chapter 9: Learning Event Driven Programming.- Chapter 10: Quick Introduction to Python and Solidity Ways of OOP.
Advanced ASP.NET Core 8 Security
Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the framework itself. And most developers don’t use all of the best practices that are recommended.If you are interested in truly top-notch security, available sources don’t give you the information you need. Most blogs and other books simply state how to use the configurations within ASP.NET, but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren’t incorporating security practices.This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in ASP.NET. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC).WHAT YOU’LL LEARN* Know how both attackers and professional defenders approach web security* Establish a baseline of security for understanding how to design more secure software* Discern which attacks are easy to prevent, and which are more challenging, in ASP.NET* Dig into ASP.NET source code to understand how the security services work* Know how the new logging system in ASP.NET falls short of security needs* Incorporate security into your software development processWHO THIS BOOK IS FORSoftware developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET. To get the most out of this book, you should already have a basic understanding of web programming and ASP.NET, including creating new projects, creating pages, and using JavaScript.TOPICS THAT ARE NEW TO THIS EDITIONThis edition has been updated with the following changes:* Best practices and code samples updated to reflect security-related changes in ASP.NET 8* Improved examples, including a fully-functional website incorporating security suggestions* Best practices for securely using Large Language Models (LLMs) and AI* Expansions and clarifications throughoutSCOTT NORBERG is a web security specialist with almost 20 years of experience in various technology and programming roles, specializing in web development and web security using Microsoft technologies. He has a wide range of experiences in security, from working with development teams on secure code techniques, to software security assessments, and application security program building. He also has an interest in building plug-and-play software libraries that developers can use to secure their sites with little-to-no extra effort.Scott holds several certifications, including Microsoft Certified Technology Specialist (MCTS), and certifications for ASP.NET and SQL Server. He also holds two certifications from ISC2, (Certified Information Systems Security Professional (CISSP) and Cloud Certified Security Professional (CCSP)) and an MBA from Indiana University.Scott is the Founder and President of Opperis Technologies LLC, a firm dedicated to helping small- to mid-sized businesses write more secure software. His latest project is CodeSheriff.NET, an open-source security scanner for ASP.NET Core, which can be found on GitHub at ScottNorberg-NCG/CodeSheriff.NET.Chapter 1: Intro to Security.- Chapter 2: Software Security Overview.- Chapter 3: Web Security.- Chapter 4: Thinking Like a Hacker.- Chapter 5: Introduction to ASP.NET Core Security.- Chapter 6: Cryptography.- Chapter 7: Processing User Input.- Chapter 8: Data Access and Storage.- Chapter 9: Authentication and Authorization.- Chapter 10: Advanced Web Security.- Chapter 11: Logging and Error Handling. Chapter 12: Setup and Configuration. - Chapter 13: Secure Software Development Life Cycle. (SSDLC).
Advanced interactive interfaces with Access
Explore and learn advanced techniques for working with graphical, interactive interfaces that can be built in Access.This book starts with best practices and tips to write code using VBA, and covers how to implement them in a real-world scenario. You will learn how to create and use VBA classes. An introduction to the binary code and the "bit vector" technique is discussed, followed by the implementation of a drag-and-drop engine. You also will learn how to design a timeline, and make it scrollable.WHAT YOU WILL LEARN* Write readable, easy-to-maintain code* Add a drag-and-drop engine to an Access application* Apply variations to the drag-and-drop technique to create different graphical effects* Embed a scrollable timeline in an Access application, on which objects can be dynamically placedWHO THIS BOOK IS FORVBA developersALESSANDRO GRIMALDI was born in Rome, Italy, where he first approached the computer world in 1982. He has been a professional VBA developer since 1998. For several years Alessandro consulted for the World Food Programme (WFP), a major United Nations agency for which he worked in Afghanistan, North Korea, Ethiopia, and Italy. He has also worked in Vienna, Austria for the CTBTO, another UN agency. Since 2014 he has lived in Frankfurt, Germany, and where he worked for the European Central Bank for about five years. In all these places he has developed VBA tools, ranging from simple automation tools to complex, multi-user, distributed, enterprise-level applications.In recent years, Alessandro has produced several videos about the drag-and-drop and the scrolling timeline, and delivered live workshops and presentations explaining these techniques. He has an online VBA shop (AlessandroGrimaldi.com/Shop) where he sells VBA tutorials, workshops, and tools. He also has a YouTube channel (@AlxGrim) where he publishes VBA-related videos.Introduction.- Chapter 1 - Writing code: good practices and tips.- Chapter 2 - VBA classes.- Chapter 3 - The presence vector technique.- Chapter 4 - Advanced interfaces: Drag and Drop.- Chapter 5 - Advanced interfaces: Scrollable timeline.- Conclusion.
Deep Reinforcement Learning and Its Industrial Use Cases
THIS BOOK SERVES AS A BRIDGE CONNECTING THE THEORETICAL FOUNDATIONS OF DRL WITH PRACTICAL, ACTIONABLE INSIGHTS FOR IMPLEMENTING THESE TECHNOLOGIES IN A VARIETY OF INDUSTRIAL CONTEXTS, MAKING IT A VALUABLE RESOURCE FOR PROFESSIONALS AND ENTHUSIASTS AT THE FOREFRONT OF TECHNOLOGICAL INNOVATION.Deep Reinforcement Learning (DRL) represents one of the most dynamic and impactful areas of research and development in the field of artificial intelligence. Bridging the gap between decision-making theory and powerful deep learning models, DRL has evolved from academic curiosity to a cornerstone technology driving innovation across numerous industries. Its core premise—enabling machines to learn optimal actions within complex environments through trial and error—has broad implications, from automating intricate decision processes to optimizing operations that were previously beyond the reach of traditional AI techniques. “Deep Reinforcement Learning and Its Industrial Use Cases: AI for Real-World Applications” is an essential guide for anyone eager to understand the nexus between cutting-edge artificial intelligence techniques and practical industrial applications. This book not only demystifies the complex theory behind deep reinforcement learning (DRL) but also provides a clear roadmap for implementing these advanced algorithms in a variety of industries to solve real-world problems. Through a careful blend of theoretical foundations, practical insights, and diverse case studies, the book offers a comprehensive look into how DRL is revolutionizing fields such as finance, healthcare, manufacturing, and more, by optimizing decisions in dynamic and uncertain environments. This book distills years of research and practical experience into accessible and actionable knowledge. Whether you’re an AI professional seeking to expand your toolkit, a business leader aiming to leverage AI for competitive advantage, or a student or academic researching the latest in AI applications, this book provides valuable insights and guidance. Beyond just exploring the successes of DRL, it critically examines challenges, pitfalls, and ethical considerations, preparing readers to not only implement DRL solutions but to do so responsibly and effectively. AUDIENCEThe book will be read by researchers, postgraduate students, and industry engineers in machine learning and artificial intelligence, as well as those in business and industry seeking to understand how DRL can be applied to solve complex industry-specific challenges and improve operational efficiency. SHUBHAM MAHAJAN, PHD, is an assistant professor in the School of Engineering at Ajeekya D Y Patil University, Pune, Maharashtra, India. He has eight Indian, one Australian, and one German patent to his credit in artificial intelligence and image processing. He has authored/co-authored more than 50 publications including peer-reviewed journals and conferences. His main research interests include image processing, video compression, image segmentation, fuzzy entropy, and nature-inspired computing methods with applications in optimization, data mining, machine learning, robotics, and optical communication. PETHURU RAJ, PHD, is chief architect and vice president at Reliance Jio Platforms Ltd in Bangalore, India. He has a PhD in computer science and automation from the Indian Institute of Science in Bangalore, India. His areas of interest focus on artificial intelligence, model optimization, and reliability engineering. He has published thirty research papers and edited forty-two books. AMIT KANT PANDIT, PHD, is an associate professor in the School of Electronics & Communication Engineering Shri Mata Vaishno Devi University, India. He has authored/co-authored more than 60 publications including peer-reviewed journals and conferences. He has two Indian and one Australian patent to his credit in artificial intelligence and image processing. His main research interests are image processing, video compression, image segmentation, fuzzy entropy, and nature-inspired computing methods with applications in optimization. Preface 1. Deep Reinforcement Learning Applications in Real-World Scenarios: Challenges and OpportunitiesSunilkumar Ketineni and Sheela J.2. Deep Reinforcement Learning: A Key to Unlocking the Potential of Robotics and Autonomous SystemsSaksham and Chhavi Rana3. Deep Reinforcement Learning Algorithms: A Comprehensive OverviewShweta V. Bondre, Bhakti Thakre, Uma Yadav and Vipin D. Bondre4. Deep Reinforcement Learning in Healthcare and Biomedical ApplicationsBalakrishnan D., Aarthy C., Nandhagopal Subramani, Venkatesan R. and Logesh T. R.5. Application of Deep Reinforcement Learning in Adversarial Malware DetectionManju and Chhavi Rana6. Artificial Intelligence in Blockchain and Smart Contracts for Disruptive InnovationEashwar Sivakumar, Kiran Jot Singh and Paras Chawla7. Clinical Intelligence: Deep Reinforcement Learning for Healthcare and Biomedical AdvancementsKeerthika K., Kannan M. and T. Saravanan8. Cultivating Expertise in Deep and Reinforcement Learning PrinciplesChilakalapudi Malathi and J. Sheela9. . Deep Reinforcement Learning in Healthcare and Biomedical ResearchShruti Agrawal and Pralay Mitra10. Deep Reinforcement Learning in Robotics and Autonomous SystemsUma Yadav, Shweta V. Bondre and Bhakti Tha11. Diabetic Retinopathy Detection and Classification Using Deep Reinforcement LearningH.R. Manjunatha and P. Sathish12. Early Brain Stroke Detection Based on Optimized Cuckoo Search Using LSTM‑Gated Multi-Perceptron Neural NetworkAnita Venaik, Asha A., Dhiyanesh B., Kiruthiga G., Shakkeera L. and Vinodkumar Jacob13. Hybrid Approaches: Combining Deep Reinforcement Learning with Other TechniquesM. T. Vasumathi, Manju Sadasivan and Aurangjeb Khan14. Predictive Modeling of Rheumatoid Arthritis Symptoms: A High-Performance Approach Using HSFO-SVM and UNET-CNNAnusuya V., Baseera A., Dhiyanesh B., Parveen Begam Abdul Kareem and Shanmugaraja P.15. Using Reinforcement Learning in Unity Environments for Training AI AgentGeetika Munjal and Monika Lamba16. Emerging Technologies in Healthcare SystemsRavi Kumar Sachdeva, Priyanka Bathla, Samriti Vij, Dishika, Madhur Jain, Lokesh Kumar, G. S. Pradeep Ghantasala and Rakesh AhujaReferencesIndex
Das große Plotterbuch für Einsteiger
Das große Plotterbuch für Einsteiger. 1. Auflage 2024Du möchtest endlich plotten, weißt jedoch nicht, für welches Gerät du dich entscheiden sollst? Du möchtest gerne wissen, was für dich und deinen Bedarf am besten geeignet ist: Cricut Maker oder Cricut Joy von Cricut, ScanNCut von Brother oder Cameo von Silhouette?Du fragst dich, was du überhaupt alles mit einem Plotter machen kannst und was du alles zum Erstellen toller Designs brauchst?Dann ist dieses Buch genau das richtige für dich, denn »Plotter-tante« Miriam Jug gibt dir in diesem Buch alle Infos, die du für einen leichten Einstieg in die Welt der Schneidemaschinen brauchst:Angefangen bei der Frage, welches Gerät das richtige für dich ist, über die Anwendungsbereiche der verschiedenen Materialien und Folien sowie die Möglichkeiten der jeweiligen Software bis hin zu hilfreichen Tipps und Tricks insbesondere für Plotter-Neulinge.Um dir den Start zu erleichtern, findest du außerdem eine Auswahl leicht umsetzbarer Projekte, die Miriam für dich zusammengestellt hat. Sie zeigt dir alle Schritte, die dir den Einstieg erleichtern, um mit dem Plotten loszulegen.Über die Autorin:Miriam Jug, auch bekannt als »Plottertante«, gehört zu den bekanntesten Creatorinnen der deutschsprachigen Plotterszene. Die gebürtige Österreicherin lebt mit ihrem Mann und drei Kindern in der Schweiz. Ihre kreative Leidenschaft lebt sie in Online-Kursen, auf YouTube und in ihrer eigenen Facebook-Community aus.
Critical Security Controls for Effective Cyber Defense
This book is an essential guide for IT professionals, cybersecurity experts, and organizational leaders navigating the complex realm of cyber defense. It offers an in-depth analysis of the Critical Security Controls for Effective Cyber Defense, known as the CIS 18 Controls, which are vital actions for protecting organizations against prevalent cyber threats.The core of the book is an exhaustive examination of each CIS 18 Control. Developed by the Center for Internet Security (CIS), these controls are the benchmark in cybersecurity, crafted to counteract the most common and impactful cyber threats. The book breaks down these controls into comprehensible segments, explaining their implementation, management, and effectiveness. This detailed approach is crucial in the context of the digital era's evolving cyber threats, heightened by the rise in remote work and cloud-based technologies. The book's relevance is magnified by its focus on contemporary challenges, offering strategies to strengthen cyber defenses in a fast-paced digital world.WHAT YOU WILL LEARN* IMPLEMENTATION STRATEGIES: Learn detailed strategies for implementing each of the CIS 18 Controls within your organization. The book provides step-by-step guidance and practical insights to help you integrate these controls effectively, ensuring that your cyber defenses are robust and resilient.* RISK MITIGATION TECHNIQUES: Discover how to identify and mitigate risks associated with failing to implement these controls. By understanding the potential consequences of neglecting each control, you can prioritize actions that protect your organization from the most significant threats.* ACTIONABLE RECOMMENDATIONS: Access practical, actionable recommendations for managing and maintaining these controls. The book offers clear and concise advice on how to continuously improve your cybersecurity measures, adapting to evolving cyber threats and organizational needs to ensure long-term protection.* TRAINING AND SIMPLIFICATION: Explore recommended training programs and simplified security control measures that can be tailored to fit the specific needs and challenges of your business environment. This section emphasizes the importance of ongoing education and streamlined processes to enhance your organization's overall cybersecurity readiness.* IMPORTANCE AND RELEVANCE: Understand the importance and relevance of each CIS 18 Control in the context of contemporary cybersecurity challenges. Learn why these controls are crucial for safeguarding your organization against the most prevalent cyber threats.* KEY CONCEPTS AND TERMS: Familiarize yourself with the key concepts and terms associated with each CIS 18 Control. This foundational knowledge will help you communicate more effectively with stakeholders and ensure a common understanding of cybersecurity principles.* QUESTIONS TO ASK: Discover the critical questions you should ask when assessing your organization’s implementation of each control. These questions will guide your evaluation and help identify areas for improvement.WHO THIS BOOK IS FORIT and cybersecurity professionals, business leaders and executives, small business owners and managers, students and academics in cybersecurity fields, government and on-profit sector professionals, and cybersecurity consultants and trainersDR. JASON EDWARDS is a seasoned cyber author and professional with over 20 years of experience in the cybersecurity field, having held diverse roles from IT operations and project management to cybersecurity strategy and governance. His strategic approach has enabled him to guide organizations through complex cyber defense challenges, ensuring robust protection against evolving threats. As the author of several books and dozens of articles, Dr. Edwards shares deep knowledge and practical insights with IT professionals, cybersecurity experts, and organizational leaders. Active on LinkedIn, he connects with over 70,000 professionals through daily and weekly posts, and manages a 20,000-subscriber mailing list called the Cyber Spear. Passionate about education and community engagement, he offers monthly group sessions, one-on-one consultations, and is a frequent podcast guest discussing cybersecurity trends, strategies, and best practices. For more information, visit his website at jason-edwards.me.Chapter 1. Control 1: Inventory and Control of Enterprise (Hardware) Assets.- Chapter 2. Control 2: Inventory and Control of Software Assets.- Chapter 3. Control 3: Data Protection.- Chapter 4. Control 4: Secure Configuration of Enterprise Assets and software.- Chapter 5. Control 5: Account Management.- Chapter 6. Control 6: Access Control Management.- Chapter 7. Control 7: Continuous Vulnerability Management.- Chapter 8. Control 8: Audit Log Management.- Chapter 9. Control 9: Email and Web Browser Protections.- Chapter 10. Control 10: Malware Defenses.- Chapter 11. Control 11: Data Recovery.- Chapter 12. Control 12: Network Infrastructure Management.- Chapter 13. Control 13: Network Monitoring and Defense.- Chapter 14. Control 14: Security Awareness and Skills Training.- Chapter 15. Control 15: Service Provider Management.- Chapter 16. Control 16: Application Software Security.- Chapter 17. Control 17: Incident Response Management.- Chapter 18. Control 18: Penetration Testing.
Java Microservices and Containers in the Cloud
Spring Boot helps developers create applications that simply run. When minimal configuration is required to start up an application, even novice Java developers are ready to start. But this simplicity shouldn't constrain developers in addressing more complex enterprise requirements where microservice architecture is concerned. With the need to rapidly deploy, patch, or scale applications, containers provide solutions which can accelerate development, testing as well as production cycles. The cloud helps companies to scale and adapt at speed, accelerate innovation and drive business agility, without heavy upfront IT investment. What if we can equip even a novice developer with all that is required to help enterprises achieve all of this, this book does this and more._Java Microservices and Containers in the Cloud_offers a comprehensive guide to both architecture and programming aspects to Java microservices development, providing a fully hands-on experience. We not only describe various architecture patterns but also provide practical implementations of each pattern through code examples. Despite the focus on architecture, this book is designed to be accessible to novice developers with only basic programming skills, such as writing a "Hello World" program and using Maven to compile and run Java code. It ensures that even such readers can easily comprehend, deploy, and execute the code samples provided in the book. Regardless of your current knowledge or lack thereof in Docker, Kubernetes, and Cloud technologies, this book will empower you to develop programming skills in these areas.There is no restriction on beginners attempting to understand serious and non-trivial architecture constraints. While mastering concurrency and scalability techniques often requires years of experience, this book promises to empower you to write microservices, as well as how to containerize and deploy them in the cloud. If you are a non-programming manager who is not afraid to read code snippets, this book will empower you to navigate the challenges posed by seasoned architects. It will equip you with the necessary understanding of specialized jargon, enabling you to engage in more meaningful discussions and break through barriers when collaborating with programmers, architects and engineers across the table.The code examples provided in the book are intentionally designed to be simple and accessible to all, regardless of your programming background. Even if you are a C# or Python programmer and not familiar with Java, you will find the code examples easy to follow and understand.YOU WILL* Acquire proficiency in both RPC-style and Messaging-style inter-microservice communication* Construct microservices utilizing a combination of SQL (PostgreSQL) and NoSQL (MongoDB) databases* Leverage Liquibase, a database schema version control tool, and administer UI in conjunction with PostgreSQL* Leverage both GraphQL and conventional REST approaches side by side* Gain practical experience in implementing Hexagonal and Onion Architectures through hands-on exercises* Integrate asynchronous processing into your Java applications using powerful APIs such as DeferredResult and CompletableFutureWHO IT'S FOR:Developers, programmers and Architects who want to level up their Java Micoservices and Archtecture knowledge as well as managers who want to brush up on their technical knowledge around the topic.BINILDAS A. CHRISTUDAS is an experienced architect and developer, specializing in building distributed software solutions for the Airlines, Hospitality, and Telecommunications domains ever since the inception of Java. He is currently working in IBS Software, a leader in Airline Cargo software domain as Vice President, heading Technology Services. Binildas is currently engaged in architecting highly resilient and highly available software solutions for some of the world's largest Cruise and Airline companies. He specializes in ensuring data consistency across distributed and decentralized systems, encompassing various scenarios such as cross-region deployments across major public cloud.Binildas is a Mechanical engineer from the College of Engineering, Trivandrum (CET) with a post-graduation in Systems from the Institute of Management Kerala (IMK). Leveraging over 25 years of experience in distributed systems, Binil currently dedicates his focus to architecting Conflict-Free, Replicated, and Eventually Consistent systems thathandle streaming data and big data and is the author of “_Practical Microservices Architectural Patterns_” by Apress and “_Service Oriented Java Business Integration_” by Packt. Binildas was the captain of Kerala University Power Lifting team and was the national champion during his studies. He has been awarded patent for “_A Method and a System for Facilitating Multitenancy of Services_” by the USPTO.Binildas can be contacted through www.linkedin.com/in/binildasca/1: Microservices for the Enterprise.- 2 More Hands-on Microservices .- 3: Onion and Hexagonal Architecture in Practice.- 4: Message Oriented Microservices,- 5: Microservices Integration in Practice.- 6: Production Grade Message Oriented Microservices.- 7: Introducing Docker.- 8: Microservices Containers.- 9: Composing Multi Service Containers.- 10: Microservices with Kubernetes.- 11: Message Oriented Microservices in Kubernetes.- 12:Automating Kubernetes Deployment and Helm Packaging.-13: CI/CD for Microservices in Containers.- 14: Microservices in AWS Elastic Compute Cloud (EC2).-15: Microservices in AWS Elastic Kubernetes Service (EKS).
Numerical Python
Learn how to leverage the scientific computing and data analysis capabilities of Python, its standard library, and popular open-source numerical Python packages like NumPy, SymPy, SciPy, matplotlib, and more. This book demonstrates how to work with mathematical modeling and solve problems with numerical, symbolic, and visualization techniques. It explores applications in science, engineering, data analytics, and more._Numerical Python, Third Edition_, presents many case study examples of applications in fundamental scientific computing disciplines, as well as in data science and statistics. This fully revised edition, updated for each library's latest version, demonstrates Python's power for rapid development and exploratory computing due to its simple and high-level syntax and many powerful libraries and tools for computation and data analysis.After reading this book, readers will be familiar with many computing techniques, including array-based and symbolic computing, visualization and numerical file I/O, equation solving, optimization, interpolation and integration, and domain-specific computational problems, such as differential equation solving, data analysis, statistical modeling, and machine learning.WHAT YOU'LL LEARN* Work with vectors and matrices using NumPy* Review Symbolic computing with SymPy* Plot and visualize data with Matplotlib* Perform data analysis tasks with Pandas and SciPy* Understand statistical modeling and machine learning with statsmodels and scikit-learn* Optimize Python code using Numba and CythonWHO THIS BOOK IS FORDevelopers who want to understand how to use Python and its ecosystem of libraries for scientific computing and data analysis.ROBERT JOHANSSON is an experienced Python programmer and computational scientist with a Ph.D. in Theoretical Physics from Chalmers University of Technology, Sweden. He has worked with scientific computing in academia and industry for over 15 years and participated in open source and proprietary research and development projects. His open-source contributions include work on QuTiP, a popular Python framework for simulating the dynamics of quantum systems, and he has also contributed to several other popular Python libraries in the scientific computing landscape. Robert is passionate about scientific computing and software development, teaching and communicating best practices for combining these fields with optimal outcomes: novel, reproducible, extensible, and impactful computational results.1. Introduction to Computing with Python.- 2. Vectors, Matrices and Multidimensional Arrays.- 3. Symbolic Computing.- 4. Plotting and Visualization.- 5. Equation Solving.- 6. Optimization.- 7. Interpolation.- 8. Integration.- 9. Ordinary Differential Equations.- 10. Sparse Matrices and Graphs.- 11. Partial Differential Equations.- 12. Data Processing and Analysis.- 13. Statistics.- 14. Statistical Modeling.- 15. Machine Learning.- 16. Bayesian Statistics.- 17. Signal and Image Processing.- 18. Data Input and Output.- 19. Code Optimization.- Appendix.
Data Engineering for Machine Learning Pipelines
This book covers modern data engineering functions and important Python libraries, to help you develop state-of-the-art ML pipelines and integration code.The book begins by explaining data analytics and transformation, delving into the Pandas library, its capabilities, and nuances. It then explores emerging libraries such as Polars and CuDF, providing insights into GPU-based computing and cutting-edge data manipulation techniques. The text discusses the importance of data validation in engineering processes, introducing tools such as Great Expectations and Pandera to ensure data quality and reliability. The book delves into API design and development, with a specific focus on leveraging the power of FastAPI. It covers authentication, authorization, and real-world applications, enabling you to construct efficient and secure APIs using FastAPI. Also explored is concurrency in data engineering, examining Dask's capabilities from basic setup to crafting advanced machine learning pipelines. The book includes development and delivery of data engineering pipelines using leading cloud platforms such as AWS, Google Cloud, and Microsoft Azure. The concluding chapters concentrate on real-time and streaming data engineering pipelines, emphasizing Apache Kafka and workflow orchestration in data engineering. Workflow tools such as Airflow and Prefect are introduced to seamlessly manage and automate complex data workflows.What sets this book apart is its blend of theoretical knowledge and practical application, a structured path from basic to advanced concepts, and insights into using state-of-the-art tools. With this book, you gain access to cutting-edge techniques and insights that are reshaping the industry. This book is not just an educational tool. It is a career catalyst, and an investment in your future as a data engineering expert, poised to meet the challenges of today's data-driven world.WHAT YOU WILL LEARN* Elevate your data wrangling jobs by utilizing the power of both CPU and GPU computing, and learn to process data using Pandas 2.0, Polars, and CuDF at unprecedented speeds* Design data validation pipelines, construct efficient data service APIs, develop real-time streaming pipelines and master the art of workflow orchestration to streamline your engineering projects* Leverage concurrent programming to develop machine learning pipelines and get hands-on experience in development and deployment of machine learning pipelines across AWS, GCP, and AzureWHO THIS BOOK IS FORData analysts, data engineers, data scientists, machine learning engineers, and MLOps specialistsPAVAN KUMAR NARAYANAN has an extensive and diverse career in the information technology industry, with a primary focus on the data engineering and machine learning domains. Throughout his professional journey, he has consistently delivered solutions in environments characterized by heterogeneity and complexity. His experience spans a broad spectrum, encompassing traditional data warehousing projects following waterfall methodologies and extending to contemporary integrations that involve APIs and message-based systems. Pavan has made substantial contributions to large-scale data integrations for applications in data science and machine learning. At the forefront of these endeavors, he has played a key role in delivering sophisticated data products and solutions, employing a versatile mix of both traditional and agile approaches. Currently employed with Ether Infinitum LLC, Sheridan, WY, Pavan Kumar Narayanan continues to bring his wealth of experience to the forefront of the data engineering and machine learning landscape.Chapter 1: Data Manipulation and Analytics Using Pandas.- Chapter 2: Data Manipulation Using Polars and CuDF.- Chapter 3: Introduction to Data Validation.- Chapter 4: Data Validation Using Great Expectations.- Chapter 5: Introduction to API Design Using FastAPI.- Chapter 6: Introduction to Concurrency Programming Using Task.- Chapter 7: Dask ML.- Module 5: Data Pipelines in the Cloud.- Chapter 9: Introduction to Microsoft Azure.- Chapter 10: Introduction to Google Cloud.- Chapter 11: Introduction to Streaming Data.- Chapter 12: Introduction to Workflow Management Using Airflow.- Chapter 13: Introduction to Workflow Management Using Prefect.
Knowledge Management and Industry Revolution 4.0
GET UP TO SPEED WITH HOW THE LATEST KNOWLEDGE MANAGEMENT AND INDUSTRY 4.0 TECHNOLOGYHELP MAKE ENTERPRISES SECURE, CONTROLLED, AND OPTIMIZED FOR A BETTER FUTURE.This book focuses on how the practices of Industrial Revolution 4.0 and knowledge management interact to create value. In recent years, value chain relationships and related activities have utilized new technologies so that existing conceptual frameworks require a roadmap for innovation strategies and effective implementation. The chapters in this book include case studies contributed by researchers and industry practitioners that showcase the impact of practices and challenges presented by technological changes, upgrading of old systems, and internal and external factors. Knowledge Management and Industrial Revolution 4.0 describes how knowledge management impacts the automation of the industry in secure, controlled, and optimized ways. For instance, the use of the latest technologies and sensors can lead to significant time and cost savings, and operators can utilize their machines and equipment from remote locations. The Industrial Revolution 4.0 incorporates the latest technologies for automation and, in many cases, the result is similar to working from home, even in manufacturing. The use of deep learning should offer many quality control benefits. Furthermore, blockchain technology can help the industry with automation in secure and transparent ways. Apart from industry automation, other departments like human resources can also use effective knowledge management for better outcomes. The use of HR knowledge management allows employees to find and access the information they require without the assistance of the HR department. The book focuses on every aspect of the industry to help all the stakeholders of an organization. The benefits include a reduction in time required for accessing information, easier training, decreased operational expenses, improved stakeholders’ satisfaction, faster problem-solving, increased pace of innovation, simpler employee review and progress reports. AUDIENCEThe book will have a wide audience within academia, education, businesses, and industrial organizations, especially those who are undergoing industry 4.0 changes to optimize for a better future. RAJENDRA KUMAR, PHD, is an associate professor in the Department of Computer Science & Engineering, School of Engineering and Technology, Sharda University, Greater Noida, India. He has published 5 textbooks and about 35 papers in national and international journals and conferences. VISHAL JAIN, PHD, is an associate professor at Sharda University, Greater Noida, India. His research interests focus on information retrieval, the semantic web, ontology engineering, data mining, etc. He has edited 50 books for a variety of publishers and authored 95 research papers for reputed conferences and journals. Jain has several awards, which include the 2012 Young Active Member Award and the 2019 Best Researcher Award. VENUS C. IBARRA, MD, DBA, works as the dean of the MBA/DBA Department of San Pablo Colleges, Philippines. Ibarra also works as a lecturer at the Ateneo Graduate School of Business in management accounting. Ibarra earned her master’s degree in business administration at the Philippines Women’s University. She has professional experience in administration, finance, budgeting, and statistical functions. In 2009, Ibarra was recognized as an outstanding finance educator by CITI NBank and Bank Central in the Philippines. CORRIENNA ABDUL TALIB, PHD, is a senior lecturer in the Department of Educational Science, Mathematics, and Creative Multimedia, Universiti Teknologi, Malaysia. She is a certified computational thinking master trainer who designs professional skill courses at UTM and researches and leads projects on computational skills, microscale chemistry, visual programming language, and educational robotic and game-based learning. VINAY KUKREJA, PHD, is a professor of computer science & engineering at Chitkara University, Punjab, India. His research interests primarily focus on machine learning, deep learning, agile software development, image processing, etc. He has about 90 articles indexed in Scopus and has authored 3 books. In 2018, Kukreja received the first prize in the SIH Hackathon from the Ministry of Housing & Urban Affairs, India.