Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für The IT Support Handbook

The IT Support Handbook

Become a more effective tech professional by learning how to provide the most useful IT support for your users. You'll learn how to efficiently and effectively deal with any type of problem, including operating systems, software, and hardware. IT support is often complex, time-consuming, and expensive, but it doesn't have to be with the right processes in place.Whether you're an individual, part of an IT support team, or managing staff supporting PC users in their homes, _this book _will help you understand the right way to approach, troubleshoot, and isolate problems so they can be handled efficiently, with the least disruption and cost to your business. Expanded and revised for this second edition, you'll make yourself popular with your colleagues, and keep your clients and users happy and productive.New To This EditionThe world of work has changed, with remote and hybrid working now the new normal and with IT Support departments worldwide having to adapt to this new paradigm. This expanded edition highlights the skills, tools, and structures needed to support businesses of any size in the new normal.WHAT YOU'LL LEARN* Manage reporting, and keep a record of issues that occur* Provide effective remote support for users working from home or elsewhere in the world* Use error and system reporting in Windows to obtain high-quality, relevant information* Spot patterns in user behavior that may be causing difficult-to-diagnose problems* Be familiar with best practices to make you a better support professionalWHO THIS BOOK IS FORIT professionals, IT support (on-site and remote), and system administrators who manage support teams. No prior knowledge is required.MIKE HALSEY is a Microsoft MVP (Most Valuable Professional) awardee, since 2011, and technical expert. As the author of Windows troubleshooting books and training videos since Windows 7 he is well versed in the problems and issues faced by PC users, IT pros, and system administrators when administering and maintaining all aspects of a PC ecosystem. Mike spent many years as a teacher and used this experience to help explain complex subjects in simple and straightforward ways. Originally from the UK, Mike now lives a simpler and less complicated life in the South of France with his three border collies, Evan, Robbie and Téo.Part I: IT Support Fundamentals.- 1. An Introduction to IT Support.- 2. Understanding Your IT System Better.- 3. Understanding Your Users: How Much Do They Know?.- Part II: IT Support Methodology.- 4. Flow Logic and Troubleshooting.- 5. Querying Users Effectively.- 6. Supporting Remote and Hybrid Workers. - 7. Joining The Dots: Finding the Root Cause of an IT Issue.- Part III: Understanding IT System Problems.- 8. How IT Systems are Structured.- 9. The Human Factor.- 10. The Peripheral Problem.- 11. Building and Environmental Factors.- 12. How Climate Change Affects IT Support. - Part IV: Documentation and Reporting.- 13. Why Good Documentation Matters.- 14. Creating Troubleshooting Guides.- 15. Creating and Managing Reporting.- 14. Harnessing System and Error Reporting in Windows.- 17. Obtaining Advanced Error and Status Information on PCs.- Part V: Providing Remote Support.- 18. Remote Support Tools.- 19. Gathering Information Remotely.- 20. Helping Your Users to Help You. – 21. Taking IT Support to the Next Level.

Regulärer Preis: 52,99 €
Produktbild für Getting Started with Pester 5

Getting Started with Pester 5

Embark on a transformative journey into the world of Pester and elevate your PowerShell scripting to new heights of robustness, reliability, and efficiency. This comprehensive beginner's guide provides a hands-on approach to PowerShell testing using Pester, empowering you to enhance your code quality with confidence.The book starts with an introduction to Pester, the powerful testing and mocking framework for PowerShell. You'll gain a solid foundation by exploring Pester's fundamental building blocks. The book guides you through the phases of Pester, helping you write your initial Pester code. You will dive into topics such as tags, assertions with Should and parameter filters, and you will explore advanced techniques such as Test Drive and Test Registry.You will discover the art of mocking in Pester and master its advanced testing methodologies. You will gain insights into working without installed modules and seamlessly integrating Pester with Azure DevOps Pipeline for a streamlined testing process.After reading this book, you will have the knowledge and skills to initiate your own exploration into PowerShell testing with Pester. You will transform your scripts into reliable powerhouses, ensuring the resilience and quality of your PowerShell code.WHAT WILL YOU LEARN* Building blocks and phases of Pester* Writing effective Pester tests* Assertions, mocking, and advanced testing techniques* Integration with Azure DevOps* Tags, code coverageWHO THIS BOOK IS FORPowerShell scripters and Pester Framework beginnersOWEN HEAUME is a seasoned PowerShell programmer with a passion for crafting efficient solutions in the dynamic landscapes of Intune and Azure. Having recently embarked on a professional journey in PowerShell programming for a prominent company within their automation team, Owen is dedicated to mastering the intricacies of Pester, Azure DevOps, and adhering to best practices.Owen has published books on deploying applications in Intune using PowerShell, deploying applications in ConfigMgr using PowerShell, and deploying language and regional settings using ConfigMgr. In this book, Owen shares insights gained from real-world experiences, providing readers with practical knowledge and a glimpse into the mind of a multi-faceted professional thriving in the realms of technology.Chapter 1: Unveiling the Power of Pester.- Chapter 2: Mastering Pester Fundamentals.- Chapter 3: Writing Your First Tests.- Chapter 4: Mastering Block Scope in Pester.- Chapter 5: Data-Driven Tests.- Chapter 6: Navigating the Pester Phases: Discovery and Run.- Chapter 7: Test Drive and Test Registry.- Chapter 8: Tags and Invoke-Pester.- Chapter 9: Mocking.- Chapter 10: Code Coverage.- Chapter 11: Integrating Pester with Azure DevOps Pipeline.- Chapter 12: Examples.

Regulärer Preis: 54,99 €
Produktbild für The Business of Hacking

The Business of Hacking

There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that.The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience.The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions.WHAT YOU’LL LEARN* How to handle and ongoing develop client relationships in a high end industry* Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.* How to identify, understand, and over-deliver on client expectations.* How to staff and develop talent within the team.* Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.* The various structures of services available that they may present to their clients.WHO THIS BOOK IS FORThis book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.MICHAEL BUTLER is a cybersecurity subject matter expert with 12 years of experience focusing on building, developing, and leading teams of ethical hackers. He is a primary instructor and developer of an offensive cloud security course taught both privately and at Blackhat conferences in the United States, Europe, and Asia. He has previously collaborated with Dr. Oakley as the technical reviewer for Professional Red Teaming and is the co-author of Theoretical Cybersecurity: Principles and Advanced Concepts (Apress, 2022).DR. JACOB G. OAKLEY is a cybersecurity author and subject matter expert with 16 years of experience focusing on strategic enterprise level cybersecurity architectures as well as offensive cybersecurity operations within government and commercial sectors. His previous technical books, Theoretical Cybersecurity, Professional Red Teaming, Waging Cyber War, and Cybersecurity for Space, are also published by Apress. Cybersecurity Engagements, as well as Waging Cyber War: Technical Challenges and Operational Constraints.CHAPTER 1: INTRODUCTION. -CHAPTER 2: THE CAPABILITY.- CHAPTER 3: FINDING AND RETAINING TALENT.- CHAPTER 4: TEAM MANAGEMENT.- CHAPTER 5: OPERATIONAL MANAGEMENT.- CHAPTER 6: DEVELOPING HACKERS.- CHAPTER 7: UNDERSTANDING CLIENTS.- CHAPTER 8: ENGAGEMENT MANAGEMENT AND SECURITY.- CHAPTER 9: EFFECTIVE WEB AND MOBILE APPLICATION TESTING.- CHAPTER 10: EFFECTIVE TESTING IN CLOUD ENVIRONMENTS.- CHAPTER 11: EFFECTIVE NETWORK TESTING.- CHAPTER 12: REPORTING.- CHAPTER 13: THE WEDGE.- CHAPTER 14: THE CYBER ARMS DEALER.- CHAPTER 15: NEW FRONTIERS.- CHAPTER 16: INFINITE COST BENEFIT.

Regulärer Preis: 34,99 €
Produktbild für Informatik in Teams

Informatik in Teams

Auf dem 11. Münsteraner Workshop für Schulinformatik werden Erfahrungsberichte, Studien und didaktische Konzepte diskutiert, die Aspekte von Teamarbeit aufgreifen: z.B. Partizipation, Projektmanagement, kollaborative Plattformen, Prozessbegleitung, kooperative Übungen oder Bewertungen.Marco Thomas:Prof. Dr. Marco Thomas leitet den Arbeitsbereich Didaktik der Informatik an der Universität Münster.Michael Weigend:Dr. Michael Weigend ist Diplom-Informatiker, war Informatiklehrer in Witten und ist Dozent an der WWU-IT der Universität Münster.

Regulärer Preis: 5,99 €
Produktbild für CompTIA Linux+ Certification Companion

CompTIA Linux+ Certification Companion

The CompTIA Linux+ Certification" book – the ultimate guide to mastering Linux system administration in preparation for the COMPTIA LINUX+ CERTIFICATION. Whether you're a beginner or an experienced professional, this comprehensive resource is designed to equip you with the knowledge and skills needed to excel in the world of Linux.With its comprehensive coverage, this book delves into essential Linux concepts, commands, and techniques, providing you with a complete reference guide. You'll review how to customize and navigate the shell environment, write powerful scripts, configure user interfaces, perform administrative tasks, configure system services, establish network connections, and secure your system. No stone is left unturned in this in-depth exploration of Linux administration.What sets this book apart is its practical approach. Real-world scenarios and practical applications take center stage, ensuring that you not only understand the theory but also know how to apply it effectively.Troubleshooting common issues becomes second nature as you gain the skills to diagnose and resolve system problems with ease. You'll discover industry best practices and standards, enabling you to optimize systems, implement robust security measures, and adhere to compliance regulations.WHAT YOU WILL LEARN:* Linux operating systems, including installation, configuration, and management of Linux-based servers and systems. * Essential administrative tasks, such as user and group management, file system administration, network configuration, and security implementation.* Insights into troubleshooting common Linux issues, enabling readers to diagnose and resolve system problems effectively. * Practical techniques for identifying and addressing system errors, performance bottlenecks, network connectivity issues, and other challenges that may arise in a Linux environment.* Industry best practices and standards in Linux administration. * System optimization, backup and recovery strategies, security practices, and adherence to compliance regulations.WHO THIS BOOK IS FOR:ADMINISTRATORS: This book serves as an excellent resource for individuals who are new to Linux administration and wish to develop a strong foundation in this field. They may have basic knowledge of Linux concepts or come from related IT roles and seek to expand their skills to include Linux system management.IT PROFESSIONALS TRANSITIONING TO LINUX: Professionals already working in the IT industry, such as system administrators or network engineers, who want to enhance their skill set and broaden their knowledge by incorporating Linux administration into their repertoire. They may have experience with other operating systems and are seeking to acquire Linux-specific skills.EXPERIENCED LINUX ADMINISTRATORS: Seasoned Linux administrators can benefit from this book as well. It serves as a comprehensive reference guide, offering advanced topics, best practices, and insights into the latest trends and developments in the Linux ecosystem. It can be a valuable resource for expanding their expertise and staying up-to-date with industry standards.Secondary or tertiary audiences may include IT managers, system architects, or developers who work closely with Linux systems and wish to gain a deeper understanding of Linux administration. Additionally, students pursuing computer science or IT-related degrees may find the book beneficial for their coursework and career advancement.AHMED SHEIKH is a Fulbright alumnus and has earned a master's degree in electrical engineering from Kansas State University, USA. He is a seasoned IT expert with a specialty in network security planning and skills in cloud computing. Currently, he is a Research Fellow at Energy Systems Research Laboratory.As an experienced IT professional with a passion for Linux, Ahmed Sheikh has spent several years working in various roles, including system administration and network engineering. Throughout his career, he has witnessed the growing demand for Linux expertise and the need for comprehensive resources in the field. This has motivated him to share his knowledge and experience through writing this book.Ahmed's goal is to provide readers with a practical and accessible guide that covers essential concepts, best practices, and real-world examples to help them succeed in their Linux journey. He is excited to contribute to the Linux community and empower individuals with the skills they need to excel in this ever-evolving field.Chapter 1. Introduction to Ethical Hacking.- Chapter 2. Footprinting and Reconnaissance & Scanning Networks.- Chapter 3. Enumeration.- Chapter 4. System Hacking.- Chapter 5. Trojans and Backdoors Viruses and Worms.- Chapter 6. Sniffers & Social Engineering.- Chapter 7. Denial of Service.- Chapter 8. Session Hijacking.- Chapter 9. Hacking Webservers.- Chapter 10. Hacking Web Applications.- Chapter 11. SQL Injection.- Chapter 12. Hacking Wireless Networks.- Chapter 13. Evading IDS, Firewalls, and Honeypots.- Chapter 14. Buffer Overflow.- Chapter 15. Cryptography.- Chapter 16. Penetration Testing.

Regulärer Preis: 54,99 €
Produktbild für The Engineering Leadership Playbook

The Engineering Leadership Playbook

In today's business landscape, software engineering teams must deliver innovation faster than ever. However, outdated management approaches centered on tools and metrics rather than people strangle velocity and creativity. Legacy leaders cling to rigid structures mismatched with market dynamics, draining effort and morale from burnt-out teams.The Engineering Leadership Playbook provides a modern framework to unlock your team's potential through empathy, clarity, and empowerment. Unlike traditional leadership books fixated on delivery metrics, Raphael Neves offers a refreshing people-oriented leadership model tailored to nuances of engineering culture.With 15+ years leading high-growth tech teams, Raphael demystifies how to balance autonomy with alignment, reconstruct feedback models on psychological safety, and sustain excellence amidst uncertainty. You'll learn his proven conflict resolution blueprint for defusing clashes through mutual understanding while tangibly tracking progress. Additionally, his continuous feedback system grounded in evidence spotlights gaps early while accelerating strengths.This playbook moves systematically from foundational concepts like emotional intelligence and leading by example into team development frameworks around high-impact coaching, mentorship, and performance reviews. The method is brought full circle through innovation catalysts that maintain creative momentum at scale.Step-by-step, Raphael unpacks human-centered leadership aligned with accelerating market realities. Apply his engineering management playbook, and your teams will thrive fuelled by vision, trust, and care.WHAT YOU'LL LEARN* A modern, human-centered framework to empower engineering teams through clarity, trust, and purpose.* Techniques to match coaching and mentoring styles to individual motivations and development needs.* A customizable 9-box talent assessment model grounded in objective competency evidence.* Conflict resolution blueprint focused on mutual understanding and win-win integrative solutions.* Methodologies to sustain growth mindsets, celebrate experimentation, and extract learnings from setbacks.* Systems to provide caring yet candid career feedback tailored to team members' personalities.* Frameworks to secure executive buy-in, influence without authority, and craft compelling narratives.* Engineering hiring practices focused on competencies over credentials to diversify innovation perspectives.* Approaches for compassionate yet accountable performance management grounded in structure.* Processes to create mentorship programs for individual learning styles and career ambitions.WHO THIS BOOK IS FORAspiring engineering leaders seeking management fundamentals, new managers transitioning into people leadership, and experienced executives refreshing approaches to performance and innovation. Its practical takeaways scale across software teams from lean startups to large enterprises.Chapter 1: Principles to Become an Effective Engineering Leader.- Chapter 2: Leadership Styles and Situational Leadership.- Chapter 3: Collaboration and Team Dynamics.- Chapter 4: The Art of Mentoring.- Chapter 5: Fostering Growth and Innovation.- Chapter 6: Evaluating and Developing Your Team.

Regulärer Preis: 44,99 €
Produktbild für Fog Computing for Intelligent Cloud IoT Systems

Fog Computing for Intelligent Cloud IoT Systems

FOG COMPUTING FOR INTELLIGENT CLOUD IOT SYSTEMSTHIS BOOK IS A COMPREHENSIVE GUIDE ON FOG COMPUTING AND HOW IT FACILITATES COMPUTING, STORAGE, AND NETWORKING SERVICESFog computing is a decentralized computing structure that connects data, devices, and the cloud. It is an extension of cloud computing and is an essential concept in IoT (Internet of Things), as it reduces the burden of processing in cloud computing. It brings intelligence and processing closer to where the data is created and transmitted to other sources. Fog computing has many benefits, such as reduced latency in processing data, better response time that helps the user’s experience, and security and privacy compliance that assures protecting the vital data in the cloud. It also reduces the cost of bandwidth, because the processing is achieved in the cloud, which reduces network bandwidth usage and increases efficiency as user devices share data in the local processing infrastructure rather than the cloud service. Fog computing has various applications across industries, such as agriculture and farming, the healthcare industry, smart cities, education, and entertainment. For example, in the agriculture industry, a very prominent example is the SWAMP project, which stands for Smart Water Management Platform. With fog computing’s help, SWAMP develops a precision-based smart irrigation system concept used in agriculture, minimizing water wastage. This book is divided into three sections. The first section studies fog computing and machine learning, covering fog computing architecture, application perspective, computational offloading in mobile cloud computing, intelligent Cloud-IoT systems, machine learning fundamentals, and data visualization. The second section focuses on applications and analytics, spanning various applications of fog computing, such as in healthcare, Industry 4.0, cancer cell detection systems, smart farming, and precision farming. This section also covers analytics in fog computing using big data and patient monitoring systems, and the emergence of fog computing concerning applications and potentialities in traditional and digital educational systems. Security aspects in fog computing through blockchain and IoT, and fine-grained access through attribute-based encryption for fog computing are also covered. AUDIENCEThe book will be read by researchers and engineers in computer science, information technology, electronics, and communication specializing in machine learning, deep learning, the cyber world, IoT, and security systems. CHANDAN BANERJEE, PHD, is a professor in the Department of Information Technology, Netaji Subhash Engineering College, West Bengal, India. His research interests include cloud computing, computer networks, fog computing, data structure, and algorithms. With about 35 publications in referred international journals, he serves as a reviewer for many peer-reviewed international journals and international conferences. Banerjee is the recipient of several awards including the top-performing mentor award and the Silver Partner Faculty Recognition award. ANUPAM GHOSH, PHD, is a professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata, India. He has published more than 100 international papers in reputed international journals and conferences. His fields of interest are mainly AI, machine learning, deep learning, image processing, soft computing, bioinformatics, IoT, and data mining. RAJDEEP CHAKRABORTY, PHD, is an assistant professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata, India. His fields of interest are mainly in cryptography and computer security. He was awarded the Adarsh Vidya Saraswati Rashtriya Puraskar, National Award of Excellence 2019 conferred by Glacier Journal Research Foundation, AHMED A. ELNGAR, PHD, is an associate professor in the Department of Computer Science and Engineering, University Institute of Engineering, Chandigarh University, Punjab, India. His field of interest focuses on cryptology and computer security. He has several publications in reputed journals along with a book on hardware cryptography. In 2019, Elngar was awarded the Adarsh Vidya Sarawati Rashtriya Puraskar, National Award of Excellence. Preface xviiPART I: STUDY OF FOG COMPUTING AND MACHINE LEARNING 11 Fog Computing: Architecture and Application 3Soumen Swarnakar2 A Comparative Review on Different Techniques of Computation Offloading in Mobile Cloud Computing 33Priyajit Sen, Tamanna Islam, Rajat Pandit and Debabrata Sarddar3 Fog Computing for Intelligent Cloud–IoT System: Optimization of Fog Computing in Industry 4.0 45Mayank Patel, Monika Bhatt and Ankush Patel4 Machine Learning Integration in Agriculture Domain: Concepts and Applications 71Ankur Biswas and Rita Banik5 Role of Intelligent IoT Applications in Fog Computing 99Pawan Whig, Dhaya Sindhu Battina, Srinivas Venkata, Ashima Bhatnagar Bhatia and Yusuf Jibrin Alkali6 SaaS-Based Data Visualization Platform—A Study in COVID-19 Perspective 119S. Majumder, A. Shaw, R. Keshri and A. Chakraborty7 A Complete Study on Machine Learning Algorithms for Medical Data Analysis Inderdeep 137Kaur and Aleem AliPART II: APPLICATIONS AND ANALYTICS 1738 Fog Computing in Healthcare: Application Taxonomy, Challenges and Opportunities 175Subrata Datta and Priyanka Datta9 IoT-Driven Predictive Maintenance Approach in Industry 4.0: A Fiber Bragg Grating (FBG) Sensor Application 203Dipak Ranjan Nayak, Pramod Sharma, Ambarish G. Mohapatra, Narayan Nayak, Bright Keswani and Ashish Khanna10 Fog Computing-Enabled Cancer Cell Detection System Using Convolution Neural Network in Internet of Medical Things 229Soumen Santra, Dipankar Majumdar and Surajit Mandal11 Application of IoT in Smart Farming and Precision Farming: A Review 245Suparna Biswas and Soumik Podder12 Big IoT Data Analytics in Fog Computing 279Manash Kumar Mondal, Riman Mandal and Utpal Biswas13 IOT-Based Patient Monitoring System in Real Time 309Suparna Biswas, Tirtha Chakraborty, Souvik Mitra, Shubham Banerjee, Tuhin Sarkar and Sourav Paul14 Fog Computing and Its Emergence with Reference to Applications and Potentialities in Traditional and Digital Educational Systems: A Scientific Review 331P. K. PaulPART III: SECURITY IN FOG COMPUTING 35515 Blockchain Security for Fog Computing 357Saiyam Varshney and Gur Mauj Saran Srivastava16 Blockchain Security for Fog Computing and Internet of Things 379Awais Khan Jumani, Waqas Ahmed Siddique, Muhammad Farhan Siddiqui and Kanwal17 Fine-Grained Access Through Attribute-Based Encryption for Fog Computing 405Malabika DasReferences 421Index 425

Regulärer Preis: 173,99 €
Produktbild für Jump-start Your SOC Analyst Career

Jump-start Your SOC Analyst Career

The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities.A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.Authors _Tyler E. Wall _and _Jarrett W. Rodrick _carefully and expertly share real-world insights and practical tips in _Jump-start Your SOC Analyst Career_. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals.This book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey. The gems of knowledge shared in this book provide you with a notable advantage for entering this dynamic field of work.The recent surplus in demand for SOC analysts makes _Jump-start Your SOC Analyst Career _a must-have for aspiring tech professionals and long-time veterans alike. Recent industry developments such as using the cloud and security automation are broken down in concise,understandable ways, to name a few. The rapidly changing world of cybersecurity requires innovation and fresh eyes, and this book is your roadmap to success.NEW TO THIS EDITION:This revised edition includes three entirely new chapters: Roadmap to Cybersecurity Success, The SOC Analyst Method, and ChatGPT for SOC Analysts. In addition, new material includes a substantially revised Cloud chapter, revised pre-requisite skills, and minor revisions to all chapters to update data.WHAT YOU WILL LEARN• Understand the demand for SOC analysts• Know how to find a SOC analyst job fast• Be aware of the people you will interact with as a SOC analyst• Be clear on the prerequisite skills needed to be a SOC analyst and what to study• Be familiar with the day-to-day life of a SOC analyst, including the toolsand language used• Discover the rapidly emerging areas of a SOC analyst job: the cloud• and security automation• Explore the career paths of a SOC analyst• Discover background-specific tips for your roadmap to cybersecurity success• Know how to analyze a security event• Know how to apply ChatGPT as a SOC analystWHO THIS BOOK IS FORAnyone interested in starting a career in cybersecurity: recent graduates, IT professionals transitioning into security, veterans, and those who are self-taught.TYLER WALL is CEO of Cyber NOW Education, which specializes in global cybersecurity training and certification that’s accessible and affordable. He is an accomplished security professional with a decade of experience in security operations at some of the world’s largest corporations. Tyler’s education includes: Master of Science in Cybersecurity Management from Purdue University, CISSP, CEH, CSSK, Terraform Associate, CFSR, LRPA, Security+, Network+, and A+. He enjoys spending time with his son and being creative.JARRETT W. RODRICK is the Senior Manager of Security Operations at Omnissa and was formerly the Senior Manager of the Security Operation Center at VMware. He is a retired Cyber Network Defender and Cyber Warfare Specialist from the US Army and has over eleven years of Defensive Cyber Operations experience between US Army Cyber Command and leading world-class security programs at Fortune 100 companies. Jarrett’s education includes a Bachelor of Science in Applied Cybersecurity from SANS Technology Institute and 17 GIAC cyber security certifications. Jarrett lives in Melissa, Texas, and enjoys golfing with his son and board games with his family.Chapter 1: The Demand for Cybersecurity and SOC Analysts.- Chapter 2: Areas of Expertise in Cybersecurity.- Chapter 3: Job Hunting.- Chapter 4: Prerequisite Skills.- Chapter 5: The SOC Analyst.- Chapter 6: SOC in the Clouds.- Chapter 7: SOC Automation.- Chapter 8:ChatGPT for SOC Analysts.- Chapter 9: The SOC Analyst Method.- Chapter 10: Roadmap to Success.- Chapter 11: Real SOC Analyst Stories.

Regulärer Preis: 49,99 €
Produktbild für Responsive Layouts

Responsive Layouts

Welcome to the book “Responsive Layouts: Flex, Grid and Multi-Column” In this book I explain the three best-known responsive layouts: the Flexbox, the Grid and the Multi-Column layout. Flexbox is a one-dimensional layout that only works in one dimension at a time, either horizontally or vertically. The grid layout is a two-dimensional layout that distributes the elements horizontally and vertically at the same time. The multi-column layout is a special layout for magazines and newspapers, where the text should flow in columns with spacing, rules, etc. I'll explain all the properties and their values and how they affect the distribution of elements on the screen. So let's get started. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.

Regulärer Preis: 29,99 €
Produktbild für Angular Shopping Store

Angular Shopping Store

In this book, you'll learn how to create an online shopping store using the Angular framework. To get your store up and running, you need more than Angular. You need a backend, a database, payment and shipping gateways and much more. This book is only about the frontend part. The goal of this book is to show you in detail how to create the frontend part of your online store. You will create everything from scratch and end up with a complete frontend shopping store. To make things even more interesting, I've created a small Nodejs application to help you with Stripe payments so you can sell items in your store. However, in reality, you need to use webhooks to make sure the money has landed in your Stripe account before you release the product to the customer. All these details are part of full-stack development. Also in this book, we will focus only on the front-end part of the application to strengthen your Angular skills and prepare you for full-stack projects. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.

Regulärer Preis: 29,99 €
Produktbild für Angular Portfolio App Development

Angular Portfolio App Development

In this book you'll learn how to create an online portfolio application with Angular. Building a personal brand is important for your online growth and career. In this book, you'll learn how to create an online portfolio application to showcase your talent to the world and impress your potential employers. We start from scratch and build everything together. By the end of this book, you'll be confident working with Angular and creating an elegant and impressive portfolio to showcase yourself online. We will use the latest Angular technology v19.2, NgRx SignalStore and Modern CSS Layouts. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.

Regulärer Preis: 29,99 €
Produktbild für Visual Analytics for Dashboards

Visual Analytics for Dashboards

This book covers the key principles, best practices, and practical techniques for designing and implementing visually compelling dashboards. It explores the various stages of the dashboard development process, from understanding user needs and defining goals, to selecting appropriate visual encodings, designing effective layouts, and employing interactive elements. It also addresses the critical aspect of data storytelling, examining how narratives and context can be woven into dashboards to deliver impactful insights and engage audiences._Visual Analytics for Dashboards _is designed to cater to a wide range of readers, from beginners looking to grasp the fundamentals of visual analytics, to seasoned professionals seeking to enhance their dashboard design skills. For different types of readers, such as a data analyst, BI professional, data scientist, or simply someone interested in data visualization, this book aims to equip them with the knowledge and tools necessary to create impactful dashboards.WHAT YOU’LL LEARNThe principles of data visualizationHow to create effective dashboardsMeet all the requirements for visual analytics/data visualization/dashboard coursesDeepen understanding of data presentation and analysisHow to use different kinds of tools for data analysis, such as scorecards and key performance indicatorsWHO THIS BOOK IS FORBusiness analysts, data analysts, BI professionals, end-users, executives, developers, as well as students in dashboards, data visualizations, and visual analytics courses.Arshad Khan is a versatile business intelligence/analytics and training professional, with 35+ years of experience, who has led many Tableau and SAP projects. He has consulted for Accenture, PwC, Deloitte, Chevron, Bose Corporation, Daimler Chrysler, Genentech, PepsiCo, Hitachi-America, and many other blue-chip companies.Khan has authored 17 books including six on business intelligence. He has taught many data visualization, dashboards, data analysis, BI, and SAP courses at 9 universities including Golden Gate University, Santa Clara University, and the University of California (Berkeley, Santa Cruz/Silicon Valley, and San Diego Extensions). Mr. Khan has a graduate degree in chemical engineering and an MBA.Chapter 1: Dashboards.- Chapter 2: Scorecards.- Chapter 3: Key performance indicators.- Chapter 4: Dashboard requirements.- Chapter 5: Dashboard design.- Chapter 6: Data visualization.- Chapter 7: Visualization principles.- Chapter 8: Visual communication.- Chapter 9: Understanding and using charts.- Chapter 10: Selecting charts.- Chapter 11: Best Practices and Tips.

Regulärer Preis: 34,99 €
Produktbild für Windows Forensics

Windows Forensics

This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.WHAT WILL YOU LEARN* Understand Windows architecture* Recover deleted files from Windows and the recycle bin* Use volatility and PassMark volatility workbench* Utilize Windows PowerShell scripting for forensic applicationsWHO THIS BOOK IS FORWindows administrators, forensics practitioners, and those wanting to enter the field of digital forensicsDR. CHUCK EASTTOM is the author of 39 books, including several on computer security, forensics, and cryptography. He is also an inventor with 25 patents and the author of over 70 research papers. He holds a Doctor of Science in cyber security, a Ph.D. in Nanotechnology, a Ph.D. in computer science, and three master’s degrees.DR. WILLIAM BUTLER is Vice President of Academic Affairs and Executive Director of the Center for Cybersecurity Research and Analysis (CCRA) at Capitol Technology University (Located in Laurel, Maryland). Before this appointment, Bill served as the Chair of Cybersecurity programs for eight years.JESSICA PHELAN is a computer science graduate student at Vanderbilt University. She is currently doing research in natural language processing at the University of Texas at Austin.RAMYA SAI BHAGAVATULA is a Cybersecurity enthusiast and holds a Security+ Certification from CompTIA. She is currently working as an AI Engineer for a medical organization, Baylor Genetics, where she is using her AI expertise to work with genomic data to bring out valuable insights and predictions. She has previously worked for NASA as a Deep Learning Research Intern, where she developed deep learning models to effectively predict severe climate patterns. She was also a lead Data Analyst Intern at an arts organization, Houston Arts Alliance, where she was involved in analyzing in-depth patterns and providing recommendations for their future art grants. Through her dedication to continuous learning and professional development, she pursued her Master's in Data Analytics at UH and is currently pursuing her second Master's in Computer Science at Vanderbilt University. She is also 3x Microsoft Certified in AI and Data Engineering. She aspires for her future career path to involve Cybersecurity, Quantum Computing, and AI. In her free time, she loves to volunteer at local organizationsto raise awareness about Computer Science among underprivileged school students. She has also received the Presidential Volunteer Service Award for her volunteer services.SEAN STEUBER has a BS in Engineering from University of Alabama, an MS in Computer Science from Vanderbilt University, and eight years of professional computer science experience.KARELY RODRIGUEZ is a first-generation DACA recipient and a woman pursuing STEM. She earned a Bachelor’s of Science in Computer Science and minored in Mathematics at the University of Washington and has continued her education in achieving a Masters of Computer Science from Vanderbilt University.VICTORIA INDY BALKISSOON is working in the Naval Enterprise Research Data Science (N.E.R.D.S.) team at NAWCTSD Orlando where she currently works on developing software applications and data science solutions for the US NAVY. She is also currently pursuing a Master’s degree inComputer Science at Vanderbilt University.ZEHRA NASEER has an MS in Ccmputer Science from Vanderbilt University.Chapter 1: Introduction to Windows.- Chapter 2: Forensics Concepts.- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy.- Chapter 4: Windows File Artifacts.- Chapter 5: Windows Registry Part 1.- Chapter 6: Windows Registry Part 2.- Chapter 7: Windows Shadow Copy.- Chapter 8: Windows Memory Forensics.- Chapter 9: PowerShell Forensics.- Chapter 10: Web Browser Forensics.- Chapter 11: Windows Email Forensics.- Chapter 12: Microsoft Azure and Cloud Forensics.- Chapter 13: Data-Hiding Techniques in Windows.- Appendix A: Volatility Cheat Sheet.- Appendix B: Windows Registry Cheat Sheet.

Regulärer Preis: 62,99 €
Produktbild für Mastering Knowledge Management Using Microsoft Technologies

Mastering Knowledge Management Using Microsoft Technologies

For companies and individuals already using Microsoft365 and other Microsoft technologies, this book is designed to reveal how to fully utilize these platforms for effective Knowledge Management without needing to rely on additional third-party tools. It addresses a common issue where organizations find themselves with overlapping technology capabilities for managing knowledge. This situation arises because many companies are not fully aware of the capabilities they already possess within their existing Microsoft tools. Knowledge management firms capitalize on this gap by offering white-labeled, branded applications with user-friendly interfaces, selling them to companies that could achieve the same results with what they already own, if only they knew how to use them properly. By mastering the use of Microsoft technologies for Knowledge Management, organizations can save significant amounts of money that would otherwise be spent on unnecessary external solutions.Whether your objective is to optimize Knowledge Management processes or align these tools with your organization's business processes, this book is designed to serve as a valuable resource, offering practical guidance and strategies to empower your endeavors. By the end of this book, readers will be equipped with the knowledge and skills necessary to make informed decisions regarding the utilization of Microsoft technologies for Knowledge Management and organizational design.WHAT YOU WILL LEARN* The components of a Microsoft Knowledge Base* How PowerPlatfom can support Knowledge Management activities* How Microsoft tools fit into the Knowledge Management Landscape* How to integrate AI using Microsoft Co-PilotWHO THIS BOOK IS FORChief Technology Officers, Chief Information Officers, Chief Knowledge Officers, Chief Digital Officers, Directors of Knowledge Management, Knowledge Managers, SharePoint Administrators, Digital Transformation ConsultantsTori Reddy Dodla, Ph.D., a distinguished professional with the title of Knowledge Collaborative Engineer Principal, brings a wealth of expertise and academic rigor to knowledge management. Holding a Ph.D. in Technology, Dr. Dodla has dedicated her career to unraveling the complexities of knowledge management systems. Her research, centered on navigating the risks, rewards, and implementation challenges of knowledge management including Microsoft products has not only advanced the theoretical underpinnings of the field but has also contributed practical insights that have guided organizations toward more effective knowledge strategies.Chapter 1: Microsoft is Good for Knowledge Management.- Chapter 2: The Importance of a Knowledge Base.- Chapter 3: PowerApps for Knowledge Sharing.- Chapter 4: PowerBi for Gamification.- Chapter 5: Integrate AI on PowerPlatform.- Chapter 6: Knowledge Management for Document Management.- Chapter 7: Designing a SharePoint Newsletter.- Chapter 8: Knowledge Management Metrics and Analytics.- Chapter 9: Knowledge Management Challenges and Solutions.

Regulärer Preis: 64,99 €
Produktbild für Linking with Nature in the Digital Age

Linking with Nature in the Digital Age

The use of digital technology in our societies is growing to meet the ever-increasing challenges of data collection, raising awareness, education and understanding nature. Artificial intelligence, for example, appears to be the answer to collecting massive amounts of data on biodiversity at a global scale and facilitating citizen participation in such data collection.Linking with Nature in the Digital Age explores the reconfiguration of our relationship with nature within this digital framework. This book examines this mediated linking from three angles. Firstly, it shows how digital technology can foster the development of links to nature. Then, it describes in greater detail the materiality of these links and how they have evolved with the developments in information technology. Finally, it questions the belief in the digital as a facilitator and opens up new perspectives on our relationship with nature and the living worldÉMILIE KOHLMANN is a lecturer in information and communication sciences at Université Grenoble Alpes, France. As part of the GRESEC laboratory, she works on nature mediation systems.Acknowledgments xi Introduction xiiiÉmilie KOHLMANNPART 1 EXTENDING LINKS THROUGH DIGITAL DEVICES 1Chapter 1 Benchmarks: Biodiversity, Participation and Digital Technology 3Émilie KOHLMANN and Catherine GAUTHIERChapter 2 The Documentary Links of Herbarium Collections and Their Communicative Stakes 15Lisa CHUPINChapter 3 Investigating the Relationship with Nature in the Animation of Wineries' Facebook Pages 35Marie-Caroline HEÏD and Catherine DE LAVERGNEChapter 4 Forms of Linking with Nature and with Others through a Digital Device: "Let Them Know and Participate" 53Émilie KOHLMANNPART 2 LINK MATERIALITY AND STRUCTURE: GENERATING DATA ON NATURE 73Chapter 5 Explainable Artificial Intelligence for a Better Understanding of Naturalist Data 75Ikram CHRAIBI KAADOUDChapter 6 Pooling Biodiversity Databases: Linking Data, Linking Actors 103Camille BERNARDChapter 7 The Challenges and Implementation of the LPO Auvergne-Rhône-Alpes Naturalist Information System 127Daniel THONONPART 3 GAINS AND LOSSES: QUESTIONING THE LINK TO NATURE 149Chapter 8 Complementarity of Big Data and Citizen Participation in Monitoring Plant Biodiversity 151Pierre BONNET, Alexis JOLY and François MUNOZChapter 9 New Automatic Identification Tools: An Aid for Botanists and Nature Managers? 161François MUNOZ and Pierre BONNETChapter 10 The Contribution of New Technologies to Our Experiences of Nature 177Minh-Xuan TRUONGChapter 11 Belonging to the World to Think of the Link: The Relationship with the Natural Environment as a Crucible of Relatedness 191Amélie COULBAUT-LAZZARINIConclusion 209Émilie KOHLMANNList of Authors 215Index 217

Regulärer Preis: 142,99 €
Produktbild für Information Systems Management

Information Systems Management

Information Systems Management is intended to sensitize the heads of organizations to the issues raised by information systems (IS). Through its pedagogical presentation, this book ensures that issues related to IS are not left solely to the experts in the field.This book combines and analyzes three key concepts in IS science: governance, urbanization and alignment. While governance implies the implementation of a certain number of means, bodies and procedures to manage IS more effectively, urbanization involves visualization methods to enable the manager to take into account the different levels of the organization of an IS and their coherence. Finally, alignment assesses the ability of the IS to make a significant contribution to the organization's strategy.DANIEL ALBAN is former Senior Lecturer in Management Sciences and Information Systems at Paris Descartes University (2005-2017), France.PHILIPPE EYNAUD is Professor of Management Sciences at Sorbonne Business School, University of Paris 1 Panthéon-Sorbonne, France.JEAN-LOUP RICHET is Associate Professor in Information Systems at the IAE Paris-Sorbonne, University of Paris 1 Panthéon-Sorbonne, France.CLAUDIO VITARI is Professor of Management Sciences at Aix-Marseille University, France.Foreword to the 2nd Edition xiSerge AMABILE and Régis MEISSONIERForeword to the 1st Edition xvLaurent BIBARDIntroduction xixPART 1 GOVERNING THE STAKEHOLDERS 1Introduction to Part 1 3CHAPTER 1 IS STAKEHOLDERS 51.1 The technological environment of IS stakeholders, and its development 61.2 Impact of the developing technologies on organizational management 81.3 Understanding and categorizing the human stakeholders in IS 11CHAPTER 2 FROM GLOBAL GOVERNANCE TO IS GOVERNANCE 212.1 From organizational governance to IS governance 222.2 Defining IS governance 252.3 IS governance in an outsourcing strategy 282.4 IS governance in a resource pooling strategy 322.5 IS governance in a co-management strategy with stakeholders 372.6 Open innovation-type software 422.7 Exercise: PingPongApp 42CHAPTER 3 IS GOVERNANCE IN PRACTICE 453.1 IS governance organizational models 463.2 IS governance benchmarks 503.3 Implement a best practice benchmark 573.4 Exercise: GreenNRJ 59PART 2 URBANIZING THE TERRITORIES 63Introduction to Part 2 65CHAPTER 4 THE IS TERRITORY 674.1 The territory 674.2 Organizational and microeconomic territory 694.3 Organizational territory and mesoeconomics 774.4 The IS territory 804.5 The IS territory and the organization's territory 834.6 The IS territory and process systems engineering 874.7 Alignment between the firm's territory and the IS territory 914.8 Representing the IS territory 964.9 Unified modeling language (UML) 984.10 Exercise: Linky and Enedis' IS territory 103CHAPTER 5 TERRITORIAL URBANIZATION 1075.1 Urbanization 1075.2 Urbanization of ISs 1105.3 Urbanization: approaches and objectives 1125.4 The planner's job 1185.5 The limits 1195.6 IS urbanization and the ecological transition 1205.7 Exercise: urbanization of France's government IS 122CHAPTER 6 URBANIZING THE INTER-ORGANIZATIONAL IS 1256.1 Inter-organizational territory 1256.2 Inter-organizational territory of the IS 1316.3 Alignment and representation of the inter-organizational IS territory 1396.4 Urbanization of an inter-organizational IS 1396.5 Exercise: AGK 149PART 3 PROJECT ALIGNMENT 153Introduction to Part 3 155CHAPTER 7 IS PROJECT MANAGEMENT 1577.1 Strategy of IS projects 1577.2 Roll-out of a traditional IS project 1607.3 Agile IS projects: a development methodology, a process and a philosophy 1637.4 DevOps: making the link between IS developments and IS department procedures 1687.5 Security in IS projects 1707.6 Exercise: cybersecurity in projects, managing tomorrow's threats 174CHAPTER 8 TECHNOLOGY, ALIGNMENT AND STRATEGIC TRANSFORMATION 1778.1 The alignment of stakeholders, territories and projects 1788.2 Strategic alignment 1798.3 Competition, technological revolutions and new strategies 1818.4 Strategic transformation linked to ISs and new technologies 1858.5 Towards a dynamic perspective of strategic transformation linked to the IS 1888.6 Exercise: TechOne: Big Data and the Cloud 189CHAPTER 9 AUDITING ISS 1919.1 What is an audit? 1919.2 The IS and auditing 1959.3 The audit process 1989.4 Scope of the audit 2019.5 Audit repositories 2039.6 Towards an approach via the risks of strategic alignment? 2049.7 Conclusion 2069.8 Exercise: an auditor's view 206Conclusion 209Glossary 219References 227Index 237

Regulärer Preis: 142,99 €
Produktbild für Artificial Intelligence for Risk Mitigation in the Financial Industry

Artificial Intelligence for Risk Mitigation in the Financial Industry

ARTIFICIAL INTELLIGENCE FOR RISK MITIGATION IN THE FINANCIAL INDUSTRYTHIS BOOK EXTENSIVELY EXPLORES THE IMPLEMENTATION OF AI IN THE RISK MITIGATION PROCESS AND PROVIDES INFORMATION FOR AUDITING, BANKING, AND FINANCIAL SECTORS ON HOW TO REDUCE RISK AND ENHANCE EFFECTIVE RELIABILITY. The applications of the financial industry incorporate vast volumes of structured and unstructured data to gain insight into the financial and non-financial performance of companies. As a result of exponentially increasing data, auditors and management professionals need to enhance processing capabilities while maintaining the effectiveness and reliability of the risk mitigation process. The risk mitigation and audit procedures are processes involving the progression of activities to “transform inputs into output.” As AI systems continue to grow mainstream, it is difficult to imagine an aspect of risk mitigation in the financial industry that will not require AI-related assurance or AI-assisted advisory services. AI can be used as a strong tool in many ways, like the prevention of fraud, money laundering, and cybercrime, detection of risks and probability of NPAs at early stages, sound lending, etc. AUDIENCEThis is an introductory book that provides insights into the advantages of risk mitigation by the adoption of AI in the financial industry. The subject is not only restricted to individuals like researchers, auditors, and management professionals, but also includes decision-making authorities like the government. This book is a valuable guide to the utilization of AI for risk mitigation and will serve as an important standalone reference for years to come. AMBRISH KUMAR MISHRA, PHD, is a scholar in the School of Management at Gautam Buddha University in Greater Noida, Uttar Pradesh, India. He obtained his Master’s in banking services from Amity University Noida, India in 2014, and has spent six years in the banking industry teaching and as a mutual fund and GST trainer with the BFSI sector skill council in India. He has published research papers and received various awards in his field of research. SHWETA ANAND, PHD, is the dean of the School of Management at Gautam Buddha University in Greater Noida, Uttar Pradesh, India. She earned a PhD in Wealth Management and has 30+ years of experience of which 14 years were in industry. She has won several awards and accolades and has published numerous papers in international and national journals and conferences. NARAYAN C. DEBNATH, PHD, is the Founding Dean of the School of Computing and Information Technology at Eastern International University (EIU), Vietnam where he also serves as the Head of the Department of Software Engineering. He has been the Director of the International Society for Computers and their Applications (ISCA), USA since 2014 as well as serving as a Full Professor of Computer Science at Winona State University, Minnesota, USA for 28 years. He is the author or co-author of more than 500 publications in numerous refereed journals and conference proceedings as well as the editor of several books. PURVI POKHARIYAL, PHD, is the Campus Director at the National Forensic Sciences University of the Delhi Campus, India. She has more than 25 years of academic and industry experience in the field of law and justice administration. She has published about 50 papers in national and international journals and conferences. ARCHANA PATEL, PHD, is an assistant professor at the National Forensic Sciences University, Delhi, India. She completed her PhD in Computer Applications and a PG degree from the National Institute on Technology in Kurukshetra, India in 2020 and 2016, respectively. Dr. Patel has received various awards for her presentation of research work, and published more than 40 papers in peer-reviewed journals and conferences, as well as edited 10 books. Her research interests are in ontological engineering, semantic web, big data, expert systems, and knowledge warehouses. Preface xvii1 Artificial Intelligence in Risk Management 1Pankaj Yadav, Priya Gupta, Rajeev Sijariya and Yogesh Sharma2 Application of Artificial Intelligence in Risk Assessment and Mitigation in Banks 27Ankita Srivastava, Bhartrihari Pandiya and Navtika Singh Nautiyal3 Artificial Intelligence and Financial Risk Mitigation 53Raja Rehan, Auwal Adam Sa'ad and Razali Haron4 Artificial Intelligence Adoption in the Indian Banking and Financial Industry: Current Status and Future Opportunities 81Deepthi B. and Vikram Bansal5 Impact of AI Adoption in Current Trends of the Financial Industry 103S. C. Vetrivel, T. Mohanasundaram, T. P. Saravanan and R. Maheswari6 Artificial Intelligence Applications in the Indian Financial Ecosystem 133Vijaya Kittu Manda and Khaliq Lubza Nihar7 The Extraction of Features That Characterize Financial Fraud Behavior by Machine Learning Algorithms 159George X. Yuan, Yuanlei Luo, Lan Di, Yunpeng Zhou, Wen Chen, Yiming Liu and Yudi Gu8 A New Surge of Interest in the Cybersecurity of VIP Clients is the First Step Toward the Return of the Previously Used Positioning Practice in Domestic Private Banking 187Gusev Alexey9 Determinants of Financial Distress in Select Indian Asset Reconstruction Companies Using Artificial Neural Networks 209Shashank Sharma and Ajay Kumar Kansal10 The Framework of Feature Extraction for Financial Fraud Behavior and Applications 229George X. Yuan, Shanshan Yang, Lan Di, Yunpeng Zhou, Wen Chen and Yuanlei Luo11 Real-Time Analysis of Banking Data with AI Technologies 261S. C. Vetrivel, T. Mohanasundaram, T. P. Saravanan and R. Maheswari12 Risks in Amalgamation of Artificial Intelligence with Other Recent Technologies 289K. Sathya and A. Hency Juliet13 Exploring the Role of ChatGPT in the Law Enforcement and Banking Sectors 327Shubham Pandey, Archana Patel and Purvi PokhariyalReferences 345Index 349

Regulärer Preis: 168,99 €
Produktbild für React Portfolio App Development

React Portfolio App Development

Create a portfolio application with React and show the world your talent. Create your personal brand, increase your online presence and impress your potential employers. An online portfolio is important for your career to show the world your skills and impress your future employers. Hello, I am Abdelfattah Ragab, a professional software developer with more than 20 years of experience. I am an expert in Angular, CSS, graphic design and all web related technologies. I have published numerous books on modern CSS layouts and Angular as well as complete business solutions for e-commerce and the like. I hope you enjoy my books. With kind regards.

Regulärer Preis: 29,99 €
Produktbild für The Art of Immutable Architecture

The Art of Immutable Architecture

This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable architecture to your tools.Most software components focus on the state of objects. They store the current state of a row in a relational database. They track changes to state over time, making several basic assumptions: there is a single latest version of each object, the state of an object changes sequentially, and a system of record exists.This is a challenge when it comes to building distributed systems. Whether dealing with autonomous microservices or disconnected mobile apps, many of the problems we try to solve come down to synchronizing an ever-changing state between isolated components. Distributed systems would be a lot easier to build if objects could not change.After reading THE ART OF IMMUTABLE ARCHITECTURE, you will come away with an understanding of the benefits of using immutable objects in your own distributed systems. You will learn a set of rules for identifying and exchanging immutable objects, and see a collection of useful theorems that emerges and ensures that the distributed systems you build are eventually consistent. Using patterns, you will find where the truth converges, see how changes are associative, rather than sequential, and come to feel comfortable understanding that there is no longer a single source of truth. Practical hands-on examples reinforce how to build software using the described patterns, techniques, and tools. By the end of the book, you will possess the language and resources needed to analyze and construct distributed systems with confidence.The assumptions of the past were sufficient for building single-user, single-computer systems. But aswe expand to multiple devices, shared experiences, and cloud computing, they work against us. It is time for a new set of assumptions. Start with immutable objects, and build better distributed systems.WHAT YOU WILL LEARN* Evaluate a distributed system from the perspective of immutable objects * Recognize the problems in existing designs, and make small modifications to correct them* Start a new system from scratch, applying patterns* Apply the principles of immutable architecture to your tools, including SQL databases, message queues, and the network protocols that you already use * Discover new tools that natively apply these principles WHO THIS BOOK IS FORSoftware architects and senior developers. It contains examples in SQL and languages such as JavaScript and C#. Past experience with distributed computing, data modeling, or business analysis is helpful.MICHAEL L. PERRY is Director of Consulting at Improving, where he applies his love of software mathematics to benefit his clients. He has built upon the works of mathematicians such as Marc Shapiro, Pat Helland, and Leslie Lamport to develop a mathematical system for software development. He has captured this system in the Jinaga open source project. Michael often presents on math and software at events and online. You can find out more at michaelperry.net.PART I: DEFINITION.- Chapter 1: Why Immutable Architecture?.- Chapter 2: Forms of Immutable Architecture.- Chapter 3: How to Read an Historical Model.- PART II: APPLICATION.- Chapter 4: Analysis.- Chapter 5: Location Independence.- Chapter 6: Immutable Runtimes.- Chapter 7: Structural Patterns.- Chapter 8: State Transitions.- Chapter 9: Security.- PART III: IMPLEMENTATION.- Chapter 10: SQL Databases.- Chapter 11: Communication.- Chapter 12: Feeds.- Chapter13: Inversion.

Regulärer Preis: 62,99 €
Produktbild für Tuning the Snowflake Data Cloud

Tuning the Snowflake Data Cloud

This project-oriented book presents a hands-on approach to identifying migration and performance issues with experience drawn from real-world examples. As you work through the book, you will develop skills, knowledge, and deep understanding of Snowflake tuning options and capabilities while preparing for later incorporation of additional Snowflake features as they become available. Your Snowflake platform will cost less to run and will improve your customer experience. Written by a seasoned Snowflake practitioner, this book is full of practical, hands-on guidance and advice specifically designed to further accelerate your Snowflake journey._Tuning the Snowflake Data Cloud_ provides you a pathway to success by equipping you with the skills, knowledge, and expertise needed to elevate your Snowflake experience. The book shows you how to leverage what you already know, adds what you don’t, and helps you apply it toward delivering for your Snowflake accounts. Read this book to embark on a voyage of advancement and equip your organization to deliver consistent Snowflake performance.What You Will Learn* Recognize and understand the root cause of performance bottlenecks* Know how to resolve performance issues* Develop a deep understanding of Snowflake performance tuning options* Reduce expensive mistakes, remediate poorly performing code* Manage Snowflake costsAndrew Carruthers is the Director for Snowflake Distribution at the London Stock Exchange Group (LSEG). Andrew’s new role is to deliver several Snowflake accounts supporting Refinitiv “final mile” data product content delivery via Snowflake Marketplace, Private Listings and Data Shares.Previously responsible for the Snowflake Corporate Data Cloud, Andrew was responsible for both ingestion data lake and consumption analytics hub, the Corporate Data Cloud services a growing customer base of over 7,000 end users. He also leads both the Centre for Enablement developing tooling, best practice and training, also the Snowflake Landing Zone provisioning Snowflake Accounts conforming to both internal standards and best practice.Andrew has almost 30 years hands-on Relational Database design, development and implementation experience starting out with Oracle in 1993. Until joining LSEG, Andrew operated as an independent IT consultant, his experience has been gained through predominantly working at major European financial institutions. Andrew is considered a visionary and thought leader within his domain with tight focus on delivery. Successfully bridging the gap between Snowflake technological capability and business usage of technology, Andrew often develops proof of concepts to showcase benefits leading to successful business outcomes.Since 2020 Andrew has immersed himself in Snowflake and is considered a Subject Matter Expert, he is CorePro certified, contributes to online forums and speaking at Snowflake events on behalf of LSEG. In recognition of his contribution to implementing Snowflake at LSEG, Andrew received the Snowflake Data Driver award, this category recognizes a technology trailblazer who has pioneered the Data Cloud into their organization.Andrew has two daughters, 20 and 22, both elite figure skaters. He has a passion for Jaguar cars having both designed and implemented modifications, and has published articles for both the Jaguar Enthusiast Magazine and Jaguar Drivers Club. Andrew enjoys 3D printing and has a mechanical engineering workshop with lathe, milling machine, TIG welder to name but a few tools, and enjoys developing his workshop skills.1. Tuning the Snowflake Data Cloud.- 2. The Query Optimizer.- 3. The Query Profiler.- 4. Micro-Partitions.- 5. Cluster Keys.- 6. Warehouses.- 7. Search Optimization Service.- 8. Parallelization.- 9. Client Expectations.- 10. Optimizing Performance.- Appendix.

Regulärer Preis: 59,99 €
Produktbild für African Artificial Intelligence

African Artificial Intelligence

Artificial intelligence (AI) is upending life, work, and play as we know it, and it's only just getting started. The rise of AI is a milestone on par with the discovery of fire, the invention of the wheel, and the creation of the internet. In short, AI is going to change everything. For some, that's an exciting prospect. For others, it's terrifying. However you feel about AI, there's no escaping it, whether you're in a global metropolis or a farmer in rural KwaZulu-Natal.Dr Mark Nasila has been watching AI's ascent for over a decade, studying its effects on everything from agriculture and aviation to healthcare, education, entertainment, crime prevention, energy management, policy creation, finance, and anything in between, and applying them to his role at one of South Africa's most successful financial institutions, First National Bank, a division of FirstRand Group.African Artificial Intelligence is a comprehensive and fascinating journey, tracing the rise of AI and its evolution into the emerging technology underpinning all others – from connected devices and smart chatbots to the metaverse. Mark combines unexpected use cases and tales of cutting-edge innovation with a unique and potent argument: harnessing AI to solve Africa's problems requires embracing it from an African perspective.African nations can't afford to simply import AI solutions from afar. Instead, Mark contends, they need to rework, remix, and refine AI so it's able to meet uniquely African challenges in uniquely African ways, and to take advantage of the once-in-a-generation opportunity AI represents for every industry, sector, and person, everywhere.

Regulärer Preis: 16,99 €
Produktbild für ChatGPT Travel Planner

ChatGPT Travel Planner

ChatGPT Travel Planner: Creating Memorable Vacations by Bill Vincent is your ultimate guide to crafting unforgettable travel experiences. Leveraging the power of AI, this book provides travelers with personalized recommendations, travel plans, and cost estimates, ensuring every adventure is unique and enriching. By integrating the innovative Time Capsule framework, each aspect of your journey-from understanding your goals to refining your itinerary-becomes a tailored, seamless process. Whether you dream of breathtaking landscapes, cultural encounters, or simply want a hassle-free vacation, this book is your trusted companion. Dive into the world of smart travel planning and transform your travel dreams into reality.

Regulärer Preis: 0,99 €
Produktbild für Moral und künstliche Intelligenz im Marketing

Moral und künstliche Intelligenz im Marketing

Konsumentendaten lassen sich zunehmend effektiv mit künstlicher Intelligenz (KI) kombinieren, um die Online Journey kalkuliert zu beeinflussen. Dieses Buch befasst sich anhand dreier Forschungsarbeiten mit den Fragen wann Marketing-KI Konsumentenentscheidungen vielmehr manipuliert als bereichert und wie Marketing-KI infolgedessen moralischer gestaltet werden kann. Die erste Forschungsarbeit untersucht, inwieweit Manipulationswahrnehmungen vom Menschenbild des Konsumenten abhängen. Hierfür werden zwei Studien mit 1.151 Teilnehmern durchgeführt. Daran anknüpfend stellt sich die Frage, ob Manager Konsumentenbilder auf opportunistische Weise instrumentalisieren, um Marketingaktivitäten zu legitimieren. Die zweite Forschungsarbeit kombiniert daher Methoden der Ökonometrie und des Natural Language Processing, um Menschenbilder von Managern aus Textdaten (33.407 Earnings Call Transkripte) zu analysieren. Die dritte Forschungsarbeit möchte Marketing-KI moralischer gestalten. Hierfür werden neuronale Netze mithilfe psychografischer Daten von 762 Teilnehmern trainiert, um faire personalisierte Preise anzubieten und Reaktionen mittels Laborexperiment (203 Probanden) zu untersuchen.

Regulärer Preis: 59,99 €
Produktbild für Homeland and territorial security with AI

Homeland and territorial security with AI

This book explores the innovative concept of a knowledge cartridge dedicated to internal and territorial security, employing the Aitek platform - a cutting-edge AI and Big Data framework enriched by 25,000 man-days of research and development. It delves into the foundational principles of the knowledge cartridge system and subsequently addresses the critical challenges inherent in homeland and territorial security, with a particular focus on counter-terrorism efforts. Through a detailed examination, the thesis presents how artificial intelligence can be strategically applied to these challenges, offering a novel approach to enhancing security measures and operational efficiency within the domain of internal and territorial security. This work not only contributes to the academic discourse on AI's role in security but also proposes practical AI-driven solutions to complex security problems, thereby bridging the gap between theoretical research and real-world application.Bruno Ciroussel:Bruno Ciroussel, born in Lyon in 1964, is a french and swiss businessman. He is an engineer and author of the "Aitek methodology" dedicated to Auto-ML, now in its 6th edition, and has implemented his methodology in an universal Auto-ML platform: the "Aitek Engine", applicable in multiple functional domains such as banking, insurance, healthcare, logistics and telecom. He has also adapted his Aitek platform for deployment in the territorial surveillance, Homeland, and customs security sectors and delivered.Bruno Ciroussel is also author, lecturer and speaker on various issues encompassing Artificial Intelligence, Machine Learning as well as the impact of these and other technologies on business, security, gover-nment, and the democratic system.

Regulärer Preis: 5,99 €