Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Designing to FIPS-140

Designing to FIPS-140

This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs such as AIS31, GM/T-0005-2021, etc.). It also covers how to perform compliance testing. By the end of the book, you will know how to interact with accredited certification labs and with related industry forums (CMUF, ICMC). In short, the book covers everything you need to know to make sound designs.There is a process for FIPS-140 (Federal Information Processing Standard) certification for cryptographic products sold to the US government. And there are parallel certifications in other countries, resulting in a non-trivial and complex process. A large market of companies has grown to help companies navigate the FIPS-140 certification process. And there are accredited certification labs you must contract toget the certification.Although this was once a fairly niche topic, it is no longer so. Other industries—banking, military, healthcare, air travel, and more—have adopted FIPS certification for cryptographic products. The demand for these services has grown exponentially. Still, the available skills pool has not grown. Many people are working on products with zero usable information on what to do to meet these standards and achieve certification or even understand if such certification applies to their products.WHAT YOU WILL LEARN* What is FIPS-140? What is the SP800 standard?* What is certification? What does it look like? What is it suitable for?* What is NIST? What does it do?* What do accredited certification labs do?* What do certification consultants do?* Where and when is certification required?* What do FIPS-140 modules look like?* What are the sub-components of FIPS-140 modules (RNGs, PUFs, crypto functions)? How does certification work for them?* What are the physical primitives (RNGs, PUFs, key stores) and how do you handle the additional complexity of certifying them under FIPS?* What are the compliance algorithms (AES, SP800-90 algos, SHA, ECDSA, key agreement, etc.)?* How do you design for certification (BIST, startup tests, secure boundaries, test access, zeroization, etc.)?* How do you get CAVP certificates (cert houses, ACVTs)?* How do you get CMVP certifications (cert houses, required documents, design information, security policy, etc.)?WHO THIS BOOK IS FORHardware and software engineers or managers of engineering programs that include any form of cryptographic functionality, including silicon vendors, library vendors, OS vendors, and system integratorsDAVID JOHNSTON is an engineer at Intel working on cryptographic hardware used in Intel CPUs and other silicon products. He has been directly involved in the development of the SP800-90 and FIPS140 standard revisions and is active in FIPS-related industry forums—he has several FIPS and CAVP certifications. David spent 30 years in various hardware and software roles and is the author of Random Number Generators, Principles and Practices.RICHARD FANT performs security assessments for Intel products and platforms by evaluating the FIPS 140-3 compliance and design strategy for the FPGA Business Unit (Programmable Solution Group). He also helps lead the Intel FIPS CoE (Center of Excellence) across other Intel business units. Richard has two bachelor's degrees from the University of Texas: (Computer Science and Mathematics) as well as a master’s degree in Cybersecurity from Syracuse University. He has worked in the semiconductor industry for 20+ years for companies such as Motorola, AMD, and Intel. He also worked at Atsec Information Security performing FIPS evaluations for various semiconductor manufacturers.In his free time, Richard likes to engage in his other passions: half-marathons and travel. To date, he has run a half-marathon on every continent except Antarctica. While visiting those faraway places, he frequently enjoys testing the laws of entropy at the casinos located there. He has lived in Austin, Texas his entire life and yet has racked up over 2 million frequent flyer miles from traveling about the world for work and fun.Chapter 1: FIPS140.- Chapter 2: FIPS Technical Details.- Chapter 3: Security Levels (1,2,3,4).- Chapter 4: Subordinate Specs.- Chapter 5: Working with Accredited Certification Labs.- Chapter 6: Documentation Requirements.- Chapter 7: Algorithm Validation.- Chapter 8: Industry Forums.

Regulärer Preis: 64,99 €
Produktbild für Grundlagen des Quantencomputing für Dummies (1. Auflage)

Grundlagen des Quantencomputing für Dummies (1. Auflage)

Grundlagen des Quantencomputing für Dummies. In erster Auflage, erschienen im April 2024. In diesem Buch erfahren Sie, wieso Quantencomputer Probleme lösen können, für die Supercomputer Millionen von Jahren brauchen würden. Die Autoren zeigen Ihnen, welche wirtschaftlichen Potenziale das Quantencomputing für Ihr Unternehmen birgt und wie es Ihre Arbeit unterstützen kann. Sie vermitteln Ihnen nicht nur die Grundlagen, sondern zeigen Ihnen ganz konkret, wie das Quantencomputing Industrien wie das Finanzwesen, Transportwesen, die Pharmazie und Cybersecurity transformieren wird. Um Quantencomputing und sein Potenzial verstehen zu können, benötigen Sie keinen Doktortitel, sondern nur dieses Buch.Inhaltsverzeichnis (PDF-Link)Leseprobe (PDF-Link)Über die Autoren: William Hurley, weltweit vielen besser bekannt als "whurley", ist Gründer und CEO von Strangeworks, einem Startup, das die Möglichkeiten des Quantencomputings leicht zugänglich und für alle verfügbar macht.Floyd Smith ist Marketer für Startups, Tech-Communicator und langjähriger Für-Dummies-Bestseller-Autor.

Regulärer Preis: 26,00 €
Produktbild für Webseiten programmieren und gestalten - Das umfassende Handbuch

Webseiten programmieren und gestalten - Das umfassende Handbuch

Webseiten programmieren und gestalten - Das umfassende HandbuchGute Webseiten zu entwickeln ist eine vielseitige Kunst: Ein Gespür für die Gestaltung ist ebenso gefragt wie solide Kenntnisse der Web-Sprachen HTML und JavaScript. Hinzu kommt die Serverseite, hier ist PHP die beliebteste Wahl. Der erfahrene Webexperte und Dozent Uwe Mutz beweist mit diesem Handbuch, dass sich lehren und lernen lässt, was Sie als Webseiten-Profi brauchen. Es ist der perfekte Begleiter für eine ganzheitliche Ausbildung und für den Beruf. Frisch ans Werk, programmieren und gestalten Sie professionelle Webauftritte! Ideal zum Lernen, Auffrischen und Nachschlagen.Ihr Weg zum Webseiten-Profi1. Grundlagen zuerstZum Einstieg ist ein gutes Fundament unverzichtbar: HTML, CSS und JavaScript wollen ebenso verstanden werden wie das Vorgehen beim Aufbau einer neuen Website. Dieses Buch nimmt Sie zu allen Themen an die Hand und hilft auch, Ihre Entwicklungsumgebung aufzusetzen.2. Technologie und MenschFarbeinsatz, User Experience, Inhaltsarchitektur ... in diesem Handbuch kommen auch die gestalterischen Themen nicht zu kurz. Auch Performanz und Barrierefreiheit spielen eine wichtige Rolle. Eignen Sie sich technisches Know-how an und blicken Sie über den Tellerrand – im Dienste wirklich guter Webentwicklung!3. Den Fullstack im BlickZum Frontend kommt ein Backend, wenn eine Website Funktionalitäten wie Buchungen oder Informationsdienste bieten soll. Nicht immer gibt es hier eine Arbeitsteilung – nutzen Sie die Chance und nehmen Sie die beliebte Backend-Sprache PHP sowie das Datenbanksystem MySQLi in Ihr Repertoire auf!4. Experten-NiveauLernen Sie wichtige Konzepte und Best Practices kennen und programmieren Sie effizient und effektiv. Werden Sie Profi für Webauftritte, die höchsten Ansprüchen genügen!Aus dem Inhalt:Eine Arbeitsumgebung einrichtenClientseitige Grundlagen: HTML, CSS und JavaScriptUser-Zentrierung und GestaltungsprinzipienEinblicke in Usability und BarrierefreiheitGrundlagen der ProgrammierungServerseitige Technologien: PHP und MySQLEin Datenbankschema entwerfenVerschlüsselungsstandardsSQL-Injections und anderen Angriffen vorbeugenBeispielprojekte: Bibliotheksverwaltung, Onlineshop, Mitgliederverwaltung, Dienstpläne u. v. m.Leseprobe(PDF-Link)Über den Autor: Uwe Mutz ist Web-Entwickler der ersten Stunde, Geschäftsführer der SYNE Marketing & Consulting GmbH, Autor zahlreicher Fachbücher und Vortragender an der Universität für Weiterbildung Krems.

Regulärer Preis: 49,90 €
Produktbild für Kubernetes - Das Praxisbuch für Entwickler und DevOps-Teams

Kubernetes - Das Praxisbuch für Entwickler und DevOps-Teams

Kubernetes - Das Praxisbuch für Entwickler und DevOps-Teams. Kubernetes ist die Grundlage moderner IT-Infrastrukturen und ein unverzichtbares Werkzeug für das schnelle und agile Deployment von Anwendungen. Wenn es doch nur nicht so komplex wäre! Die Lernkurve ist steil, die Architektur und das Zusammenspiel der zahlreichen Komponenten muss gut verstanden sein, damit kein Chaos entsteht.In diesem Praxisbuch gibt Ihnen Kevin Welter eine gründliche Einführung in die Konzepte und Ideen containerisierter Umgebungen. Sie lernen die vielen Bestandteile einer Kubernetes-Installation kennen und erfahren praxisnah, wie Anwendungen deployt werden.1. Objekte, Ressourcen und KonzepteSie starten mit einer Test-Installation und lernen, wie Sie auf ein Kubernetes-Setup zugreifen. So machen Sie sich mit den Grundlagen vertraut: Pod- und Container-Management, Ingress, Services, ConfigMaps und Storage.2. Cloud Native: Anwendungen für Kubernetes entwickelnRollbacks, Healthchecks, High Availability, Skalierbarkeit: Container-Cluster bieten viele Vorteile gegenüber traditionellen Deployments. Mit den Best Practices und einem umfassenden Verständnis der Architektur orchestrieren Sie die schnelle und reibungslose Bereitstellung Ihrer Anwendungen.3. Deployment mit HelmHelm ist der Paketmanager für Kubernetes. Sie lernen, wie Sie eigene Helm-Charts schreiben, mit denen Sie Ihre Anwendungen flexibel und agil in Kubernetes-Cluster deployen.Aus dem Inhalt:Grundlagen und KonzeptePod- und Container-ManagementRessources as CodeSkalierung und LoadbalancingStorageNetzwerke und SicherheitMonitoring und FehlersucheAnwendungen für Kubernetes entwickelnPaketmanagement mit HelmLeseprobe (PDF-Link)Über den Autor: Kevin Welter ist Mitgründer und Geschäftsführer der HumanITy GmbH. Mit seinem Unternehmen unterstützt er Großkonzerne wie Deutsche Bahn, EnBW und Deutsche Telekom bei der Weiterentwicklung ihrer Software sowei der dazugehörigen Prozesse und hat es sich zur Aufgabe gemacht, die Digitalisierung auch für den Mittelstand attraktiv und einfach nutzbar zu gestalten.

Regulärer Preis: 39,90 €
Produktbild für Practical Web Accessibility

Practical Web Accessibility

Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population, or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future.Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.WHAT YOU WILL LEARN* A greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.* Ways to apply the practical steps required to cater for those needs.* How to take your sites, and colleagues, on a journey from being inaccessible to accessible.* The importance of accessibility in your designs, code, content, and more.* The best ways to test andimprove your sites, so you can be compliant, and truly accessible. WHO THIS BOOK IS FORAnyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.ASHLEY FIRTH is the Global Director of Engineering at award-winning energy technology company Octopus Energy, responsible for building and overseeing the online experience of its many millions of users worldwide. Starting at the company as one of its very first employees (now standing at over 5,000), Ashley has championed the need for inclusive and accessible websites from the very beginning, and has spoken internationally on the subject, taking into account both customer and colleague needs when doing so.Octopus Energy, along with being one of the best energy companies in the world for customer service, has won numerous customer and digital experience awards thanks to Ashley’s approach to accessibility. In 2020 - just four years after starting up - the supplier also became the 15th tech unicorn born out of the UK. The year after, it became a quintuple unicorn.Along with his demanding day job, Ashley is determined to make web accessibility a cornerstone of any company’s handbook. He spends his spare time as a consultant to government bodies and private companies to help them improve their approach to accessibility. He is also a technical reviewer for books on the subject. He was shortlisted for the Young Energy Professional of the Year award.All of Ashley’s experience culminated in the production of Practical Web Accessibility. The first edition of this book reached number one on the Amazon technology charts, and is used by readers and companies around the world to understand accessibility and improve their approach to it, always with fantastic results. Outside of accessibility, Ashley blogs and consults about management, which you can find at mrfirthy.me.1. Intro.- 2. Blindness.- 3. Low Vision and Color Blindness.- 4. Motor Impairments.- 5. Deafness and Hard of Hearing.- 6. Cognitive Impairments.- 7. Mental Health.- 8. Imagery.- 9. Accessible Email. - 10. Outsourcing Accessibility.- 11. Tools and Auditing.- 12. Conclusion.

Regulärer Preis: 54,99 €
Produktbild für AWS Certified SysOps Administrator Study Guide

AWS Certified SysOps Administrator Study Guide

PREPARE FOR SUCCESS ON THE AWS SYSOPS EXAM, YOUR NEXT JOB INTERVIEW, AND IN THE FIELD WITH THIS HANDY AND PRACTICAL GUIDEThe newly updated Third Edition of AWS Certified SysOps Administrator Study Guide: Associate (SOA-C02) Exam prepares you for the Amazon Web Services SysOps Administrator certification and a career in the deployment, management, and operation of an AWS environment.Whether you’re preparing for your first attempt at the challenging SOA-C02 Exam, or you want to upgrade your AWS SysOps skills, this practical Study Guide delivers the hands-on skills and best practices instruction you need to succeed on the test and in the field. You’ll get:* Coverage of all of the SOA-C02 exam’s domains, including monitoring, logging, remediation, reliability, business continuity, and more * Instruction that’s tailor-made to achieve success on the certification exam, in an AWS SysOps job interview, and in your next role as a SysOps administrator * Access to the Sybex online study tools, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The AWS Certified SysOps Administrator Study Guide: Associate (SOA-C02) Exam includes all the digital and offline tools you need to supercharge your career as an AWS Certified SysOps Administrator.ABOUT THE AUTHORSJORGE T. NEGRÓN is part of Cloud Academy’s AWS Subject Matter Experts team where he builds courses, writes blogs and records podcast while helping customers learn and improve their skills in AWS technologies. Prior to that Jorge was AWS Academy’s Technical Program Manager within the training and certification teams. He was born and raised in San Juan Puerto Rico and travels the world enabling customers and partners gain intimate knowledge of Cloud Computing related skills and development. His passion is in education and contributing to the next generation work force with Cloud Computing literacy. CHRISTOFFER JONES, AWS Certified DevOps Professional, is a technologist, IT consultant, and educator who has spent more than 20 years working with IT operations, network engineering, and IT administration. He has spent the last six years diving deep into Amazon Web Services to consult, teach, and mentor others on AWS services and solutions. GEORGE SAWYER has been in technology education since before the turn of the century and was an early adopter of cloud computing. In addition to teaching around the world with his own training company, George has been a senior technical trainer and global learning strategist at Amazon Web Services. He is currently developing learning programs for Compass, Inc. George is a doctoral candidate and lives on his farm with his wife Mandi where they practice regenerative farming and raise heritage livestock. Introduction xxiCHAPTER 1 AWS FUNDAMENTALS 1Getting Started 1 2The AWS Shared Responsibility Model 8General Root Account Best Practices 9The AWS Global Infrastructure 16The AWS Command-Line Interface 17The AWS Health API and Dashboards 23Pricing 24Summary 25Exam Essentials 25Hands-On Exercises 26Review Questions 29CHAPTER 2 ACCOUNT CREATION, SECURITY, AND COMPLIANCE 33Shared Responsibility 34Compliance 37IAM 38AWS Organizations and Control Tower 60AWS Directory Service 68AWS License Manager 72Summary 74Exam Essentials 74Review Questions 75CHAPTER 3 AWS COST MANAGEMENT 81AWS Cost and Usage Reports 82AWS Cost Explorer 88Savings Plans 90AWS Budgets 95Managing Costs with Managed Services 99Amazon EC2 Spot Instances and Cost Optimization 100Summary 101Exam Essentials 102Review Questions 104CHAPTER 4 AUTOMATED SECURITY SERVICES AND COMPLIANCE 109Review Reports, Findings, and Checks 110Data Protection Strategies 131Network Protection Strategies 160Summary 190Exam Essentials 193Review Questions 195CHAPTER 5 COMPUTE 201The Hypervisor 202Amazon Machine Image (AMI) 203Amazon EC2 206Amazon EC2 Image Builder 211Compute Optimizer 213Elastic Load Balancing 214Auto Scaling 218AWS Application Auto Scaling 223AWS Lambda 225Summary 230Exam Essentials 230Review Questions 232CHAPTER 6 STORAGE, MIGRATION, AND TRANSFER 237Storage vs. Migration 238Amazon Simple Storage Service (S3) 239Amazon S3 Glacier 247Amazon Elastic Block Store 252Amazon Elastic File System 256Amazon FSx 259Migration and Transfer 263AWS Backup 263AWS Storage Gateway 267AWS DataSync 270AWS Transfer Family 272Summary 273Exam Essentials 276Review Questions 278CHAPTER 7 DATABASES 285Amazon Relational Database Service 286Amazon ElastiCache 294Summary 300Exam Essentials 300Review Questions 302CHAPTER 8 MONITORING, LOGGING, AND REMEDIATION 307Amazon CloudWatch 308Monitoring on AWS 313Basic CloudWatch Terms and Concepts 315Monitoring Compute 317Monitoring Storage 318CloudWatch Alarms 319CloudWatch Events 320Exercises 322AWS CloudTrail 327API Logs Are Trails of Data 332CloudTrail as a Monitoring Tool 334Exercises 336AWS Config 340AWS Systems Manager 346Exercises 351Summary 357Exam Essentials 358Review Questions 360CHAPTER 9 NETWORKING 365Networking 366Troubleshooting 371VPC IP Address Manager 371Hubs, Spokes, and Bastion Hosts 373Connecting to the Internet 374Connecting to Networks and Services 375VPC Peering 376Bastion Hosts 378Monitoring VPC Traffic 381AWS Client VPN 384VPC Endpoints 385AWS Transit Gateway 386Cloud WAN 389Summary 389Exam Essentials 389Review Questions 391CHAPTER 10 CONTENT DELIVERY 395Domain Name System 396Amazon Route 53 399Route 53 Health Checks 401Routing Policies 404Route 53 Traffic Flow 408Route 53 Guided Exercise 409Amazon CloudFront 412Edge Locations 413The CloudFront Cache Process 413Restricting Access to S3 (OAI vs. OAC) 414CloudFront Functions 415CloudFront Guided Exercise 415AWS Global Accelerator 420Pricing 421Summary 421Exam Essentials 422Review Questions 423CHAPTER 11 DEPLOYMENT, PROVISIONING, AND AUTOMATION 427Elastic Beanstalk 429Elastic Beanstalk Extensions 433AWS CloudFormation 435Amazon SQS 446Amazon SNS 449Amazon Kinesis Services 451Step Functions 454Summary 457Exam Essentials 458Review Questions 460APPENDIX ANSWERS TO REVIEW QUESTIONS 465Chapter 1: AWS Fundamentals 466Chapter 2: Account Creation, Security, and Compliance 468Chapter 3: AWS Cost Management 470Chapter 4: Automated Security Services and Compliance 472Chapter 5: Compute 475Chapter 6: Storage, Migration, and Transfer 477Chapter 7: Databases 481Chapter 8: Monitoring, Logging, and Remediation 483Chapter 9: Networking 485Chapter 10: Content Delivery 487Chapter 11: Deployment, Provisioning, and Automation 488Index 491

Regulärer Preis: 46,99 €
Produktbild für CompTIA Network+ Study Guide

CompTIA Network+ Study Guide

PREPARE FOR THE NETWORK+ CERTIFICATION AND A NEW CAREER IN NETWORK INSTALLATION AND ADMINISTRATIONIn the newly revised Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009, bestselling authors and network experts Todd Lammle and Jon Buhagiar deliver thorough and accurate coverage of how to install, configure, and troubleshoot today's networking hardware peripherals and protocols.This book shows you how to succeed on the in-demand CompTIA Network+ certification exam, impress interviewers in the networking industry, and excel in your first role as a network administrator, support technician, or related position.The accomplished authors draw on their combined 30+ years of networking experience to walk you through the ins and outs of the five functional domains covered by the Network+ Exam: N10-009: Networking concepts, implementation, operations, security, and troubleshooting. You'll also get:* Comprehensive, domain-specific coverage of the updated Network+ Exam: N10-009 objectives* Preparation for the leading network certification used by over 350,000 networking professionals* Access to a superior set of online study tools, including hundreds of practice questions, flashcards, and a glossary of key termsPerfect for anyone preparing for the latest version of the CompTIA Network+ Exam: N10-009, the Sixth Edition of CompTIA Network+ Study Guide: Exam N10-009 is a must-have resource for network admins seeking to enhance their skillset with foundational skills endorsed by industry pros and thought leaders from around the world.And save 10% when you purchase your CompTIA exam voucher with our exclusive WILEY10 coupon code.ABOUT THE AUTHORS TODD LAMMLE, Network+, CCSI, CCNA, CCNP, is the networking authority. Todd is President of GlobalNet System Solutions, Inc., a networking integration and training firm, and is the bestselling author of numerous titles, including the popular CompTIA Network+ Study Guide. Todd has over 900,000 copies of his books in print. He can be reached through his website at www.lammle.com. JON BUHAGIAR, Network+, A+, CCNA, is Supervisor of Network Operations at Pittsburgh Technical Institute. In addition to teaching, he has been creating course content for almost 20 years. Introduction xxxvAssessment Test xlviCHAPTER 1 INTRODUCTION TO NETWORKS 1First Things First: What’s a Network? 2Physical Network Topologies 14Topology Selection, Backbones, and Segments 22Summary 29Exam Essentials 29Written Lab 30Review Questions 31CHAPTER 2 THE OPEN SYSTEMS INTERCONNECTION (OSI) REFERENCE MODEL 35Internetworking Models 36Introduction to Encapsulation 53Modulation Techniques 54Summary 55Exam Essentials 56Written Lab 56Review Questions 57CHAPTER 3 NETWORKING CONNECTORS AND WIRING STANDARDS 61Physical Media 63Cable Properties 82Wiring Standards 84Installing Wiring Distributions 92Summary 94Exam Essentials 95Written Lab 95Review Questions 97CHAPTER 4 THE CURRENT ETHERNET SPECIFICATIONS 101Network Basics 102Ethernet Basics 104Ethernet at the Data Link Layer 110Ethernet at the Physical Layer 117Ethernet over Other Standards (IEEE 1905.1- 2013) 123Summary 127Exam Essentials 127Written Lab 127Review Questions 129CHAPTER 5 NETWORKING DEVICES 133Common Network Connectivity Devices 135Other Specialized Devices 157Networked Devices 174Planning and Implementing a Basic SOHO Network Using Network Segmentation 175Summary 186Exam Essentials 186Written Lab 187Review Questions 189CHAPTER 6 INTRODUCTION TO THE INTERNET PROTOCOL 193Introducing TCP/IP 195Data Encapsulation 230Summary 234Exam Essentials 235Written Lab 236Review Questions 237CHAPTER 7 IP ADDRESSING 241IP Terminology 243The Hierarchical IP Addressing Scheme 244IPv4 Address Types 251Internet Protocol Version 6 (IPv6) 253Summary 263Exam Essentials 264Written Labs 265Review Questions 267CHAPTER 8 IP SUBNETTING, TROUBLESHOOTING IP, AND INTRODUCTION TO NAT 271Subnetting Basics 273Troubleshooting IP Addressing 296Introduction to Network Address Translation (NAT) 304Summary 309Exam Essentials 309Written Lab 310Review Questions 311CHAPTER 9 INTRODUCTION TO IP ROUTING 319Routing Basics 320The IP Routing Process 323Testing Your IP Routing Understanding 329Static and Dynamic Routing 331Summary 334Exam Essentials 334Written Lab 335Review Questions 336CHAPTER 10 ROUTING PROTOCOLS 341Routing Protocol Basics 343Distance- Vector Routing Protocols 347Link- State Routing Protocols 357High Available Routes 362Advanced IPv6 Concepts 363Tunneling 366Dual Stack 369IPv6 Routing Protocols 370RIPng 370EIGRPv 6 371OSPFv 3 371Summary 371Exam Essentials 372Written Lab 372Review Questions 375CHAPTER 11 SWITCHING AND VIRTUAL LANS 379Networking Before Layer 2 Switching 381Switching Services 385Spanning Tree Protocol 392Virtual LANs 397VLAN Trunking Protocol 409Advanced Features of Switches 419Summary 424Exam Essentials 424Written Lab 425Review Questions 426CHAPTER 12 WIRELESS NETWORKING 431Introduction to Wireless Technology 433Cellular Technologies 436The 802.11 Standards (Regulatory Impacts) 438Comparing 802.11 Standards 445Wireless Network Components 447Site Survey 466Providing Capacity 468Multiple Floors 469Location- Based WLAN 470Site Survey Tools 470Wireless Security 471Summary 482Exam Essentials 483Written Lab 484Review Questions 485CHAPTER 13 REMOTE NETWORK ACCESS 489Site- to- Site VPN 490Client- to- Site VPN 491Remote Desktop Connection 493Virtual Network Computing 495Connection Methods 496Jump Box/Host 501In- Band vs. Out- of- Band Management 502Summary 502Exam Essentials 502Written Lab 503Review Questions 504CHAPTER 14 USING STATISTICS AND SENSORS TO ENSURE NETWORK AVAILABILITY 509Performance Monitoring/Metrics/Sensors 511SNMP 518Application Programming Interface Integration 523Protocol Analyzer/Packet Capture 524Flow Data 525Log Aggregation 526Summary 532Exam Essentials 532Written Lab 532Review Questions 534CHAPTER 15 ORGANIZATIONAL DOCUMENTS AND POLICIES 537Plans and Procedures 539Hardening and Security Policies 545Common Documentation 554IP Address Management 566Common Agreements 566Summary 568Exam Essentials 568Written Lab 568Review Questions 570CHAPTER 16 HIGH AVAILABILITY AND DISASTER RECOVERY 575Load Balancing 576Multipathing 577Network Interface Card (NIC) Teaming 578Redundant Hardware/Clusters 579Facilities and Infrastructure Support 587Redundancy and High Availability Concepts 591Backups 600Testing 602Summary 603Exam Essentials 603Written Lab 604Review Questions 605CHAPTER 17 DATA CENTER ARCHITECTURE AND CLOUD CONCEPTS 609Cloud Computing 611Infrastructure as Code 625Software- Defined Networking 628Virtual Extensible Local Area Network 633Zero Trust Architecture 633Secure Access Secure Edge/Security Service Edge 634Summary 635Exam Essentials 636Written Lab 636Review Questions 638CHAPTER 18 NETWORK TROUBLESHOOTING METHODOLOGY 643Narrowing Down the Problem 646Troubleshooting Steps 666Troubleshooting Tips 695Summary 699Exam Essentials 699Written Lab 700Review Questions 701CHAPTER 19 NETWORK SOFTWARE TOOLS AND COMMANDS 705Software Tools 707Using traceroute 712Using ipconfig, ifconfig, and ip 715Using the ifconfig Utility 720Using the ip Utility 720Using the iptables Utility 721Using the ping Utility 722Using the arp Utility 726Using the nslookup Utility 729Resolving Names with the Hosts File 731Using the mtr Command (pathping) 732Using the Nmap Utility 734Using the route Command 735Using tcpdump 747Basic Networking Device Commands 748Hardware Tools 762Summary 766Exam Essentials 767Written Lab 768Review Questions 769CHAPTER 20 NETWORK SECURITY CONCEPTS 775Common Security Terminology 777AAA Model 790Regulatory Compliance 801Summary 805Exam Essentials 806Written Lab 807Review Questions 808CHAPTER 21 COMMON TYPES OF ATTACKS 813Technology- Based Attacks 817Human and Environmental 829Hardening Security 831Implementing Network Segmentation 837Physical Security Concepts 847Summary 851Exam Essentials 852Written Lab 853Review Questions 854APPENDIX A ANSWERS TO WRITTEN LABS 859Chapter 1: Introduction to Networks 860Chapter 2: The Open Systems Interconnection (OSI) Reference Model 860Chapter 3: Networking Connectors and Wiring Standards 860Chapter 4: The Current Ethernet Specifications 861Chapter 5: Networking Devices 862Chapter 6: Introduction to the Internet Protocol 862Chapter 7: IP Addressing 863Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 864Chapter 9: Introduction to IP Routing 865Chapter 10: Routing Protocols 865Chapter 11: Switching and Virtual LANs 867Chapter 12: Wireless Networking 867Chapter 13: Remote Network Access 868Chapter 14: Using Statistics and Sensors to Ensure Network Availability 868Chapter 15: Organizational Documents and Policies 869Chapter 16: High Availability and Disaster Recovery 870Chapter 17: Data Center Architecture and Cloud Concepts 870Chapter 18: Network Troubleshooting Methodology 871Chapter 19: Network Software Tools and Commands 871Chapter 20: Network Security Concepts 872Chapter 21: Common Types of Attacks 872APPENDIX B ANSWERS TO REVIEW QUESTIONS 873Chapter 1: Introduction to Networks 874Chapter 2: The Open Systems Interconnection (OSI) Reference Model 876Chapter 3: Networking Connectors and Wiring Standards 878Chapter 4: The Current Ethernet Specifications 881Chapter 5: Networking Devices 883Chapter 6: Introduction to the Internet Protocol 885Chapter 7: IP Addressing 888Chapter 8: IP Subnetting, Troubleshooting IP, and Introduction to NAT 890Chapter 9: Introduction to IP Routing 892Chapter 10: Routing Protocols 895Chapter 11: Switching and Virtual LANs 897Chapter 12: Wireless Networking 900Chapter 13: Remote Network Access 902Chapter 14: Using Statistics and Sensors to Ensure Network Availability 905Chapter 15: Organizational Documents and Policies 907Chapter 16: High Availability and Disaster Recovery 910Chapter 17: Data Center Architecture and Cloud Concepts 912Chapter 18: Network Troubleshooting Methodology 915Chapter 19: Network Software Tools and Commands 917Chapter 20: Network Security Concepts 920Chapter 21: Common Types of Attacks 922APPENDIX C SUBNETTING CLASS A 927Subnetting Practice Examples: Class A Addresses 928Subnetting in Your Head: Class A Addresses 930Written Lab C. 1 931Written Lab C. 2 932Answers to Written Lab C. 1 932Answers to Written Lab C. 2 933Index 935

Regulärer Preis: 35,99 €
Produktbild für Auf dem Weg zu Netto-Null-Zielen

Auf dem Weg zu Netto-Null-Zielen

Dieses Buch diskutiert die Verwendung von Technologie, Data Science und Open Data, um das Netto-Null-Emissionsziel des Pariser Abkommens zum Klimawandel zu erreichen. Es gibt viele Diskussionen über Nachhaltigkeit und Lösungen für den Klimawandel, um die negativen Auswirkungen zu mildern. Die Verwendung von Technologiehebeln zur Bewältigung von Klimaherausforderungen wird jedoch selten als der bedeutendste Katalysator betrachtet. Die verfügbare Forschung in diesem Bereich ist im Allgemeinen qualitativer Natur, bei der Technologie und Daten noch nicht genutzt wurden. Durch den Einsatz von KI/ML sagt das Buch die Klimawandelfolgen aufgrund von Investitionen in den fossilen Brennstoffsektor voraus, schätzt die CO2-Emissionen des Verkehrssektors, prognostiziert die durch nicht erneuerbare Energiequellen verursachte durchschnittliche Landtemperatur und segmentiert indische Bundesstaaten auf der Grundlage von Haushalts-CO2-Emissionen. Die Forscher, Entscheidungsträger, Studenten, Lehrer, Bildungseinrichtungen, Regierungen, Regulierungsbehörden, Unternehmen, internationale Organisationen usw. werden immens von diesem Buch profitieren. Darüber hinaus soll dieses Buch dazu dienen, den nächsten Generationen eine dekarbonisierte Umgebung und eine bessere Zukunft zu bieten.

Regulärer Preis: 99,99 €
Produktbild für Langlebige Software-Architekturen (4. Auflg.)

Langlebige Software-Architekturen (4. Auflg.)

Langlebige Software-Architekturen. Technische Schulden analysieren, begrenzen und abbauen. In 4., überarbeiteter und erweiterter Auflage (April 2024).Je nachdem, wo Sie gerade stehen, ob Sie ein neues Entwicklungsprojekt planen oder das Ausmaß an technischen Schulden in einem bestehenden System reduzieren wollen, in diesem Buch finden Sie die passenden Antworten, um zu verhindern, dass die Architektur Ihres Systems erodiert, die Komplexität zunimmt, ständig weitere technische Schulden entstehen und Wartung und Erweiterung immer aufwendiger werden.In diesem Buch zeigt Ihnen die Autorin, worauf Sie bei der Umsetzung der Architektur achten sollten und welche Prinzipien eingehalten werden müssen, damit Sie in Ihren Softwareprojekten langlebige Architekturen entwerfen oder Ihre bestehenden Systeme durch kleine und große Refactorings in langlebige Architekturen überführen können. Es werden Muster in Softwarearchitekturen und Mustersprachen sowie verschiedene Architekturstile erläutert und aufgezeigt, welche Vorgaben letztlich zu Architekturen führen, die für Entwickler noch gut durchschaubar sind.Mit über 200 farbigen Bildern aus real existierenden Softwaresystemen und etlichen Fallbeispielen werden schlechte und gute Lösungen verständlich und nachvollziehbar dargestellt. Empfehlungen und vielfältige Hinweise aus Praxisprojekten erlauben dem Leser einen direkten Transfer zu seiner täglichen Arbeit.In der 4. Auflage wurde dem Thema Modularity Maturity Index (MMI) ein eigenes Kapitel gewidmet und der Text inhaltlich so erweitert, dass der gesamte Algorithmus zur Berechnung des MMI zugänglich wird. Nun kann jedes Team den MMI für sein System selbst bestimmen.Leseprobe (PDF-Link)Zielgruppe: Softwarearchitekt*innen, Softwareentwickler*innen, IT-Consultants, Systemanalytiker*innen, Technische ProjektleitendeÜber die Autorin:Dr. Carola Lilienthal ist Geschäftsführerin der WPS – Workplace Solutions GmbH in Hamburg und verantwortet dort den Bereich Softwarearchitektur. Sie hat 1995 an der Universität Hamburg ihr Diplom in Informatik gemacht und dort zum Thema »Komplexität von Softwarearchitekturen« promoviert. Seit 2003 analysiert sie international im Auftrag ihrer Kund*innen die Architektur von Softwaresystemen und berät Entwicklungsteams, wie sie die Langlebigkeit ihrer Softwaresysteme verbessern können. Insgesamt hat sie mit ihrem Team über dreihundert Softwaresysteme zwischen 30.000 und 15 Mio. LOC in Java, C++, C#, ABAP, PHP und TypeScript untersucht. Besonders am Herzen liegt ihr die Ausbildung von Softwarearchitekt*innen und Entwickler*innen, weshalb sie aktives Mitglied im iSAQB, International Software Architecture Qualification Board, ist und ihr Wissen aus über 25 Jahren Softwareentwicklung regelmäßig auf Konferenzen, in Artikeln und bei Schulungen weitergibt.

Regulärer Preis: 36,90 €
Produktbild für Basiswissen Digital Design

Basiswissen Digital Design

Zunehmende Komplexität, steigende Anforderungen an die Digitalisierung und immer neue Möglichkeiten digitaler Technologien stellen die Industrie vor neue Herausforderungen. Das Fachgebiet »Digital Design« begegnet diesen Herausforderungen mit einem ganzheitlichen Gestaltungsanspruch durch die Integration von drei Kompetenzfeldern: Gestaltungskompetenz, Kompetenz in digitalen Technologien und Querschnittskompetenz für interdisziplinäres Arbeiten.Dieses Buch vermittelt die Grundlagen und gibt einen fundierten Überblick über alle relevanten Aspekte der ganzheitlichen Gestaltung digitaler Lösungen. Es beschreibt• die Kompetenzfelder des Digital Designs,• das Design mit digitalem Material und den Bauprozess,• die Strukturierung von Bauprozessen aus Sicht des Digital Designs,• wichtige digitale Technologien,• Designkompetenz und Designarbeit auf Lösungs-, System- und Elementebene sowie• die ganzheitliche Gestaltarbeit entlang des Bauprozesses.Abschließend werden Frameworks für den Bauprozess und die soziale Dimension des Bauprozesses behandelt. Das Buch orientiert sich am Lehrplan zum »Digital Design Professional – Foundation Level« (DDP) des International Requirements Engineering Board (IREB) und eignet sich daher nicht nur bestens zur Prüfungsvorbereitung, sondern dient gleichzeitig als kompaktes Grundlagenwerk zu diesen Themen in der Praxis und an Hochschulen.Kim Lauenroth gestaltet seit 2011 digitale Lösungen und vertritt seit 2022 das Lehrgebiet Digital Design an der Fachhochschule Dortmund. Er ist Mitinitiator und Erstunterzeichner des Bitkom Digital-Design-Manifests und engagiert sich ehrenamtlich für die berufliche Aus- und Weiterbildung als erster Vorsitzender des IREB e.V. Kim hat Informatik, Betriebswirtschaft und Psychologie an der Technischen Universität Dortmund studiert und im Bereich Requirements Engineering für Produktlinien an der Universität Duisburg-Essen promoviert.

Regulärer Preis: 39,90 €
Produktbild für CompTIA Network+ Practice Tests

CompTIA Network+ Practice Tests

ASSESS AND IMPROVE YOUR NETWORKING SKILLSET WITH PROVEN SYBEX PRACTICE TESTSIn the freshly revised Third Edition of CompTIA Network+ Practice Tests Exam N10-009, IT expert and author Craig Zacker delivers a set of accessible and useful practice tests for the updated Network+ Exam N10-009. You'll prepare for the exam, learn the information you need in an industry interview, and get ready to excel in your first networking role.These practice tests gauge your skills in deploying wired and wireless devices; understanding network documentation and the purpose of network services; work with datacenter, cloud, and virtual networking concepts; monitor network activity; and more.This book also offers:* Comprehensive coverage of all five domain areas of the updated Network+ exam, including network concepts, implementation, operations, security, and troubleshooting* Practical and efficient preparation for the Network+ exam with hundreds of domain-by-domain questions* Access to the Sybex interactive learning environment and online test bankPerfect for anyone preparing for the CompTIA Network+ Exam N10-009, the CompTIA Network+ Practice Tests Exam N10-009 is also an indispensable resource for network administrators seeking to enhance their skillset with new, foundational skills in a certification endorsed by industry leaders around the world.And save 10% when you purchase your CompTIA exam voucher with our exclusive WILEY10 coupon code.ABOUT THE AUTHORCRAIG ZACKER, is the author or co-author of dozens of books, manuals, articles, and web sites on computer and networking topics. Introduction xiiiCHAPTER 1 NETWORKING CONCEPTS 11.1 Explain concepts related to the Open Systems Interconnection (OSI) reference model 81.2 Compare and contrast networking appliances, applications, and functions 151.3 Summarize cloud concepts and connectivity options 251.4 Explain common networking ports, protocols, services, and traffic types 291.5 Compare and contrast transmission media and transceivers 371.6 Compare and contrast network topologies, architectures, and types 481.7 Given a scenario, use appropriate IPv4 network addressing 531.8 Summarize evolving use cases for modern network environments 59CHAPTER 2 NETWORK IMPLEMENTATION 632.1 Explain characteristics of routing technologies 662.2 Given a scenario, configure switching technologies and features 732.3 Given a scenario, select and configure wireless devices and technologies 832.4 Explain important factors of physical installations 94CHAPTER 3 NETWORK OPERATIONS 1033.1 Explain the purpose of organizational processes and procedures 1083.2 Given a scenario, use network monitoring technologies 1183.3 Explain disaster recovery (DR) concepts 1243.4 Given a scenario, implement IPv4 and IPv 6 network services 1313.5 Compare and contrast network access and management methods 138CHAPTER 4 NETWORK SECURITY 1454.1 Explain the importance of basic network security concepts 1484.2 Summarize various types of attacks and their impact to the network 1604.3 Given a scenario, apply network security features, defense techniques, and solutions 167CHAPTER 5 NETWORK TROUBLESHOOTING 1775.1 Explain the troubleshooting methodology 1815.2 Given a scenario, troubleshoot common cabling and physical interface issues 1875.3 Given a scenario, troubleshoot common issues with network services 2015.4 Given a scenario, troubleshoot common performance issues 2115.5 Given a scenario, use the appropriate tool or protocol to solve networking issues 219CHAPTER 6 PRACTICE TEST 1 241CHAPTER 7 PRACTICE TEST 2 267APPENDIX ANSWERS TO REVIEW QUESTIONS 293Chapter 1: Networking Concepts 294Chapter 2: Network Implementation 328Chapter 3: Network Operations 351Chapter 4: Network Security 375Chapter 5: Network Troubleshooting 396Chapter 6: Practice Test 1 428Chapter 7: Practice Test 2 443Index 457

Regulärer Preis: 28,99 €
Produktbild für Deep Learning Tools for Predicting Stock Market Movements

Deep Learning Tools for Predicting Stock Market Movements

DEEP LEARNING TOOLS FOR PREDICTING STOCK MARKET MOVEMENTSTHE BOOK PROVIDES A COMPREHENSIVE OVERVIEW OF CURRENT RESEARCH AND DEVELOPMENTS IN THE FIELD OF DEEP LEARNING MODELS FOR STOCK MARKET FORECASTING IN THE DEVELOPED AND DEVELOPING WORLDS.The book delves into the realm of deep learning and embraces the challenges, opportunities, and transformation of stock market analysis. Deep learning helps foresee market trends with increased accuracy. With advancements in deep learning, new opportunities in styles, tools, and techniques evolve and embrace data-driven insights with theories and practical applications. Learn about designing, training, and applying predictive models with rigorous attention to detail. This book offers critical thinking skills and the cultivation of discerning approaches to market analysis. The book:* details the development of an ensemble model for stock market prediction, combining long short-term memory and autoregressive integrated moving average;* explains the rapid expansion of quantum computing technologies in financial systems;* provides an overview of deep learning techniques for forecasting stock market trends and examines their effectiveness across different time frames and market conditions;* explores applications and implications of various models for causality, volatility, and co-integration in stock markets, offering insights to investors and policymakers.AUDIENCEThe book has a wide audience of researchers in financial technology, financial software engineering, artificial intelligence, professional market investors, investment institutions, and asset management companies. RENUKA SHARMA, PHD, is a professor of finance at the Chitkara Business School, Punjab, India. She has authored more than 70 research papers published in international and national journals as well as authoring books on financial services. She is a much sought-after speaker on the international circuit. Her current research concentrates on SMEs and innovation, responsible investment, corporate governance, behavioral biases, risk management, and portfolios. KIRAN MEHTA, PHD, is a professor and dean of finance at Chitkara Business School, Punjab, India. She has published one book on financial services. Currently, her research endeavors focus on sustainable business and entrepreneurship, cryptocurrency, ethical investments, and women’s entrepreneurship. Additionally, Dr. Kiran is the founder and director of a research and consultancy firm.

Regulärer Preis: 194,99 €
Produktbild für IT Security managen

IT Security managen

- Die Basis für Ihren Erfolg in der Verantwortung ür das IT Security Management - Einführung in die wichtigen Themen des IT Security Managements - Hilfe für das Management der vielfältigen Anforderungen in der Praxis - Neu in der 2. Auflage: Ausführliche Darstellung des Themenblocks IT Security Policy, Management der Sicherheit von operativer Technologie (OT-Security), Aktualisierte gesetzliche Regelungen, z.B. DSGVO, EU Cybersecurity Act, DDG, TTD - Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten Buches IT-Sicherheit ist weit mehr als nur der Einsatz technischer Sicherheitsmaßnahmen wie Firewalls oder Virenschutz. Eine beständige und wirtschaftliche Sicherheit für Ihre IT erreichen Sie nur, wenn Sie die IT-Risiken kontinuierlich managen und die ITSicherheit ganzheitlich betrachten, wozu neben der physischen und technischen Situation auch die Einbeziehung von personellen und organisatorischen Faktoren gehören. Dieses Praxishandbuch geht nicht nur auf die Methodik des IT Security Managements ein, so wie dies viele andere Bücher über das Thema tun, sondern widmet sich vor allem den Dingen dahinter, zum Beispiel unternehmenspolitischen Einflüssen, organisatorischen Fragestellungen oder taktischen Überlegungen. Damit beschäftigt es sich mit den Managementaspekten, mit denen Sie in der Verantwortung für das IT Security Management in Ihrer täglichen Arbeit konfrontiert werden und geht auf die Aspekte ein, die Sie berücksichtigen müssen, um in Ihrer Tätigkeit erfolgreich zu sein. AUS DEM INHALT // Stellenwert der Informationssicherheit/Risiko und Sicherheit/Entstehung und Auswirkungen von Risiken/Sicherheitsorganisation/IT Security Policy/ Sicherheit definieren und vorgeben/Risiken erkennen und bewerten/Reporting/Business Continuity/Notfallmanagement/Der Mensch in der Informationssicherheit/Incident Handling und IT-Forensik/IT-Sicherheit und externe Partner/Rechtliche Einflüsse

Regulärer Preis: 69,99 €
Produktbild für Mensch-Roboter-Interaktion (2. Auflg.)

Mensch-Roboter-Interaktion (2. Auflg.)

Die Rolle der Roboter in der Gesellschaft wächst und diversifiziert sich ständig und bringt eine Vielzahl von Fragen mit sich, die die Beziehung zwischen Robotern und Menschen betreffen. Dieses Lehrbuch zur Mensch-Roboter-Interaktion bietet einen umfassenden Überblick über die interdisziplinären Themen, die für die moderne Forschung von zentraler Bedeutung sind. Studenten und Forscher aus den Bereichen Robotik, künstliche Intelligenz, Informatik, Elektrotechnik sowie Psychologie, Soziologie und Design finden darin einen prägnanten und verständlichen Leitfaden zum aktuellen Stand des Fachgebiets:- Funktion, Design und Leistungsbewertung von Robotern- Kommunikationsmodalitäten wie Sprache, nonverbale Kommunikation und die Verarbeitung von Emotionen- ethische Fragen rund um den Einsatz von Robotern heute und im Kontext unserer künftigen Gesellschaft.Zahlreiche Beispiele und farbige Abbildungen veranschaulichen die verschiedenen Themenfelder. Diskussionsfragen und relevante Literatur am Ende des Kapitels tragen zur Vertiefung bei.Aus dem Inhalt:- Was ist Mensch-Roboter-Interaktion?- Wie ein Roboter funktioniert- Design- Interaktion im Raum- Nonverbale Interaktion- Verbale Interaktion- Wie Menschen Roboter wahrnehmen- Emotionen- Forschungsmethoden- Anwendungen- Roboter in der Gesellschaft- Die ZukunftNeu in der 2. Auflage: Abschnitte zu kollaborativen Robotern, Roboterteams, Roboterschnittstellen; Maschinelles Lernen; Roboter in der Gesellschaft, in denen neue technische Entwicklungen sowie gesellschaftliche Veränderungen berücksichtigt werden. Christoph Bartneck ist außerordentlicher Professor im Fachbereich Informatik und Softwaretechnik an der Universität Canterbury, Neuseeland. Er hat einen Werdegang in Industriedesign und Mensch-Computer-Interaktion. Seine Projekte und Studien werden in führenden Zeitschriften, Zeitungen und Konferenzen veröffentlicht. Seine Interessen liegen in den Bereichen Mensch-Computer Interaktion, Naturwissenschaft und Technologie, sowie visuelles Design. Insbesondere beschäftigt Christoph sich mit den Auswirkungen von Anthropomorphismus auf HRI. Als sekundäres Forschungsinteresse arbeitet er an Projekten im Bereich der Sporttechnologie und der kritischen Untersuchung von Prozessen und Richtlinien in der Wissenschaft. Im Bereich Design beschäftigt sich Christoph mit der Geschichte des Produktdesigns, Mosaiken und Fotografie.Tony Belpaeme ist Professor an der Universität Gent, Belgien, und war zuvor Professor für Robotik und kognitive Systeme an der Universität Plymouth, Großbritannien. Er promovierte in künstlicher Intelligenz an der Vrije Universiteit Brussel (VUB). Ausgehend von der Prämisse, dass Intelligenz in sozialer Interaktion verwurzelt ist, versuchen Tony und sein Forschungsteam, die künstliche Intelligenz sozialer Roboter zu fördern. Dieser Ansatz führt zu einer Reihe an Ergebnissen, die von theoretischen Erkenntnissen bis zu praktischen Anwendungen reicht. Er ist an groß angelegten Projekten beteiligt, in denen untersucht wird, wie Roboter zur Unterstützung von Kindern in der Bildung eingesetzt werden können. Er untersucht, wie kurze Interaktionen mit Robotern zu langfristigen werden können und wie Roboter in der Therapie eingesetzt werden können.Friederike Eyssel ist Professorin für Angewandte Sozialpsychologie und Geschlechterforschung am Zentrum für Kognitive Interaktionstechnologie der Universität Bielefeld. Friederike interessiert sich für verschiedene Forschungsthemen, die von sozialer Robotik, sozialen Agenten und Ambient Intelligenz bis hin zu Einstellungsänderungen, Vorurteilsabbau und der sexuellen Objektivierung von Frauen reichen. Als Quereinsteigerin hat Friederike zahlreiche Publikationen in den Bereichen Sozialpsychologie, Human-Agent Interaction (HAI) und soziale Robotik veröffentlicht.Takayuki Kanda ist Professor für Informatik an der Universität Kyoto, Japan. Außerdem ist er Gastgruppenleiter bei Advanced Telecommunications Research (ATR), Interaction Science Laboratories, Kyoto, Japan. Er erhielt seinen Bachelor in Ingenieurwesen, seinen Master in Ingenieurwesen und seinen Doktortitel in Informatik von der Universität Kyoto, in den Jahren 1998, 2000 bzw. 2003. Er ist eines der Gründungsmitglieder des Kommunikationsroboter-Projekts am Advanced Telecommunications Research (ATR) in Kyoto. Er hat den Kommunikationsroboter Robovie entwickelt und ihn in alltäglichen Situationen eingesetzt, z. B. als Nachhilfelehrer in einer Grundschule und Ausstellungsführer in einem Museum. Zu seinen Forschungsinteressen gehören HAI, interaktive humanoide Roboter und Feldversuche.Merel Keijsers ist Assistenzprofessorin für Psychologie an der John Cabot University in Rom. Sie hat einen Abschluss in Sozialpsychologie und Statistik und promovierte an der Universität Canterbury, über das Thema „Roboter-Mobbing“. In ihrer Doktorarbeit untersuchte sie, welche bewussten und unbewussten psychologischen Prozesse Menschen dazu veranlassen, Roboter zu missbrauchen und zu schikanieren. In jüngster Zeit interessiert sie sich dafür, wie Roboter beeinflussen, auf welche Art Menschen sich selbst sehen. Da sie aus dem Bereich der Sozialpsychologie kommt, interessiert sie sich vor allem für die Gemeinsamkeiten und Unterschiede im Umgang von Menschen mit Robotern im Vergleich zu anderen Menschen.Selma Šabanović ist Professorin für Informatik und Kognitionswissenschaften an der Indiana University, Bloomington, USA, wo sie als Gründerin das R-House Human-Robot Interaction Lab leitet. Ihre Forschungsarbeit umfasst Studien zu Design, Nutzung und Folgen von sozial interaktiven und assistierenden Robotern in verschiedenen sozialen und kulturellen Kontexten, darunter Gesundheitseinrichtungen, Haushalten und verschiedene Länder. Sie befasst sich auch mit der kritischen Untersuchung der gesellschaftlichen Bedeutung und der potenziellen Auswirkungen der Entwicklung und des Einsatzes von Robotern in Kontext auf den Alltag. Sie promovierte 2007 in Wissenschafts- und Technologiestudien am Rensselaer Polytechnic Institute mit einer Dissertation über die kulturübergreifende Untersuchung der sozialen Robotik in Japan und den Vereinigten Staaten. Von 2017 bis 2023 war sie Chefredakteurin der Zeitschrift ACM Transactions on Human-Robot Interaction.

Regulärer Preis: 49,99 €
Produktbild für Reinforcement Learning

Reinforcement Learning

In uralten Spielen wie Schach oder Go können sich die brillantesten Spieler verbessern, indem sie die von einer Maschine produzierten Strategien studieren. Robotische Systeme üben ihre Bewegungen selbst. In Arcade Games erreichen lernfähige Agenten innerhalb weniger Stunden übermenschliches Niveau. Wie funktionieren diese spektakulären Algorithmen des bestärkenden Lernens? Mit gut verständlichen Erklärungen und übersichtlichen Beispielen in Java und Greenfoot können Sie sich die Prinzipien des bestärkenden Lernens aneignen und in eigenen intelligenten Agenten anwenden. Greenfoot (M.Kölling, King’s College London) und das Hamster-Modell (D.Bohles, Universität Oldenburg) sind einfache, aber auch mächtige didaktische Werkzeuge, die entwickelt wurden, um Grundkonzepte der Programmierung zu vermitteln. Wir werden Figuren wie den Java-Hamster zu lernfähigen Agenten machen, die eigenständig ihre Umgebung erkunden. Die zweite Auflage enthält neue Themen wie "Genetische Algorithmen" und "Künstliche Neugier" sowie Korrekturen und Überarbeitungen.UWE LORENZ war nach seinem Studium der Informatik und Philosophie mit Schwerpunkt künstliche Intelligenz und maschinelles Lernen an der Humboldt-Universität in Berlin und einigen Jahren als Projektingenieur für 10 Jahr als Gymnasiallehrer für Informatik und Mathematik tätig. Seit seinem Erstkontakt mit Computern Ende der 80er Jahre hat ihn das Thema Künstliche Intelligenz nicht mehr losgelassen. Derzeit arbeitet er als wissenschaftlicher Mitarbeiter in der Arbeitsgruppe Didaktik der Informatik bei Prof. Dr. Romeike an der Freien Universität Berlin in einem Projekt zur Thematik "Verantwortungsvolle Künstliche Intelligenz in der Lehramtsausbildung".Bestärkendes Lernen als Teilgebiet des Maschinellen Lernens.- Grundbegriffe des Bestärkenden Lernens.- Optimale Entscheidungen in einem bekannten Umweltsystem.- Entscheiden und Lernen in einem unbekannten Umweltsystem.- Neuronale Netze als Schätzer für Zustandsbewertungen und Aktionspreferenzen.- Werden digitale Agenten bald intelligenter als Menschen sein?.- Leitbilder in der KI.

Regulärer Preis: 26,99 €
Produktbild für Maschinelles Lernen für Dummies

Maschinelles Lernen für Dummies

ALGORITHMEN FÜR KÜNSTLICHES LERNEN VERSTEHENMaschinelles Lernen ist eines der wichtigsten Teilgebiete der künstlichen Intelligenz und das Verstehen und Entwickeln von passenden Algorithmen bleibt die große Herausforderung. Dieses Buch bietet einen außergewöhnlich umfassenden Überblick über die neuesten Algorithmen und die bereits bewährten Verfahren. Jörn Fischer beschreibt nicht nur deren Funktionsweise, sondern gibt für alle Bereiche verständliche Beispiele, die detailliert beschrieben und leicht nachvollziehbar sind. Außerdem werden hilfreiche Methoden zur Fehlersuche und -beseitigung an die Hand gegeben. SIE ERFAHREN* Wie Sie mit Python und Frameworks starten* Wie Sie Optimierung, Clustering und Klassifizierung umsetzen * Wie generative Methoden und Reinforcement Learning funktionieren * Wie neuronale Netze arbeiten und erklärbar werdenJÖRN FISCHER lehrt und forscht als Professor der Informatik an der Hochschule Mannheim. Sein Interesse für neuronale Netze und maschinelles Lernen geht zurück bis in die frühen 1990-er Jahre. Seit 2010 hält er Vorlesungen im Bereich maschinelles Lernen und begleitet die Umsetzung der Algorithmen in zahlreichen Projekten. Einleitung 17TEIL I: EINFÜHRUNG INS MASCHINELLE LERNEN 23Kapitel 1: Die Welt der KI 25Kapitel 2: Ein kleiner Mathe-Exkurs 29Kapitel 3: Python-Grundlagen 55Kapitel 4: Das Wichtigste: die Daten 69TEIL II: GRUNDLEGENDE OPTIMIERUNGS- UND LERNALGORITHMEN 83Kapitel 5: Einfach besser werden 85Kapitel 6: Natürlich – künstliche Evolution 97Kapitel 7: Clustering 115Kapitel 8: Klassifikation 123Kapitel 9: Regression 145TEIL III: NEURONALE NETZE 153Kapitel 10: Und was ist mit neuronalen Netzen? 155Kapitel 11: Tiefe Netze 193Kapitel 12: Generative Netze 219Kapitel 13: Rückgekoppelte Netze 237Kapitel 14: Neuronale Netze erklärbar 259TEIL IV: VERSTÄRKENDES LERNEN 271Kapitel 15: Reinforcement Learning 273Kapitel 16: Reinforcement Learning kombiniert 289Kapitel 17: Ein kleiner Blick in die Zukunft 305TEIL V: DER TOP-TEN-TEIL 313Kapitel 18: Zehn Tipps, damit es funktioniert 315Kapitel 19: Zehn Kategorien für die Anwendung 319Literaturverzeichnis 327Abbildungsverzeichnis 329Stichwortverzeichnis 337

Regulärer Preis: 24,99 €
Produktbild für Introduction to One Digital Identity

Introduction to One Digital Identity

Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it’s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure decentralized digital identity features effectively. It’s a must-read for those aiming to grasp the intricacies of digital identity and leverage it for future innovation and security.The book begins by redefining digital identity, examining its evolution and the profound impact it has on both individuals and organizations. It then delves into the development of digital identity strategies, laying the foundation for future digital transformations. Covering a wide range of topics, the book discusses the innovation, challenges, and technological exploration in digital identity. A special focus is given to biometric technologies and the implementation of decentralized digital identities, addressing critical areas such as identity governance, blockchain, AI and advanced biometrics. The book also investigates the implications of digital identity across various industries, including cross border travel, healthcare, social media, finance, metaverse, IoT etc. finally the book provides not only emerging trends but offers a glimpse into the future digital identity.Whether you’re a tech professional, business leader, student or simply keen on understanding the impact of digital advancements, this book promises to offer insightful perspectives and practical solutions for navigating the complex world of digital identity. It underscores the importance of identity in spearheading digital innovation, making it a key resource for anyone looking to stay ahead in the digital landscape. As you reach its conclusion, you’ll be equipped with a wealth of knowledge and insights that are crucial in today’s digital era.WHAT YOU'LL LEARN* Digital identity strategies and their role in shaping the future of digital identity* Different facets of digital identity* Specifics of biometric technologies and decentralized digital identity * Industry specific digital identity and its implementation* Crucial aspects of privacy, ethics, and secure in the context of digital identityWHO THIS BOOK IS FORSoftware professionals, security practitioners, architects, senior managers, executives, and students who are interested in digital identity.Shivakumar R Goniwada is a renowned author, inventor, and technology leader with more than 23 years of experience in architecting cutting-edge cloud-native, data analytics, and event-driven systems. He currently holds a position as Chief Enterprise Architect at Accenture, where he leads a team of highly skilled technology enterprise and cloud architects. Throughout his career, Shivakumar has successfully led numerous complex projects across various industries and geographical locations. His expertise has earned him ten software patents in areas such as cloud computing, polyglot architecture, software engineering, and IoT. He is a sought-after speaker at global conferences and has made significant contributions to the field through his publications. Shivakumar R Goniwada holds a Master's degree in Technology Architecture and certifications in Google Professional, AWS, and data science. He also completed an Executive MBA at the prestigious MIT Sloan School of Management. His notable books include "Cloud-Native Architecture and Design" and "Introduction to Datafication," both published by Apress.Chapter 1: Redefining Digital Identity in New ERA.- Chapter 2: Digital Identity Strategy.- Chapter 3: Foundation of Future Digital Identity.- Chapter 4: The Rise of Biometric Systems.- Chapter 5: Decentralized Digital Identity (DID).- Chapter 6: Cross Border Travel with Digital Identity.- Chapter 7: Decentralized Identity in Social Media.- Chapter 8: Health Care and Financial Systems with Decentralized Identity.- Chapter 9:Next Generation Digital Frontier.- Chapter 10: Regulatory Landscape and Digital Rights.- Chapter 11: The Human Aspects – Societal and Psychological Implication.- Chapter 12: Peering into the Future – Next Frontier in Digital Identity.

Regulärer Preis: 56,99 €
Produktbild für Deep Learning Tools for Predicting Stock Market Movements

Deep Learning Tools for Predicting Stock Market Movements

DEEP LEARNING TOOLS FOR PREDICTING STOCK MARKET MOVEMENTSTHE BOOK PROVIDES A COMPREHENSIVE OVERVIEW OF CURRENT RESEARCH AND DEVELOPMENTS IN THE FIELD OF DEEP LEARNING MODELS FOR STOCK MARKET FORECASTING IN THE DEVELOPED AND DEVELOPING WORLDS.The book delves into the realm of deep learning and embraces the challenges, opportunities, and transformation of stock market analysis. Deep learning helps foresee market trends with increased accuracy. With advancements in deep learning, new opportunities in styles, tools, and techniques evolve and embrace data-driven insights with theories and practical applications. Learn about designing, training, and applying predictive models with rigorous attention to detail. This book offers critical thinking skills and the cultivation of discerning approaches to market analysis. The book:* details the development of an ensemble model for stock market prediction, combining long short-term memory and autoregressive integrated moving average;* explains the rapid expansion of quantum computing technologies in financial systems;* provides an overview of deep learning techniques for forecasting stock market trends and examines their effectiveness across different time frames and market conditions;* explores applications and implications of various models for causality, volatility, and co-integration in stock markets, offering insights to investors and policymakers.AUDIENCEThe book has a wide audience of researchers in financial technology, financial software engineering, artificial intelligence, professional market investors, investment institutions, and asset management companies. RENUKA SHARMA, PHD, is a professor of finance at the Chitkara Business School, Punjab, India. She has authored more than 70 research papers published in international and national journals as well as authoring books on financial services. She is a much sought-after speaker on the international circuit. Her current research concentrates on SMEs and innovation, responsible investment, corporate governance, behavioral biases, risk management, and portfolios. KIRAN MEHTA, PHD, is a professor and dean of finance at Chitkara Business School, Punjab, India. She has published one book on financial services. Currently, her research endeavors focus on sustainable business and entrepreneurship, cryptocurrency, ethical investments, and women’s entrepreneurship. Additionally, Dr. Kiran is the founder and director of a research and consultancy firm.

Regulärer Preis: 194,99 €
Produktbild für Softwaretesten nach ISTQB CTFL 4.0 für Dummies

Softwaretesten nach ISTQB CTFL 4.0 für Dummies

NEUE HAUPTVERSION 4.0: NEUER LEHRPLAN, GEÄNDERTER PRÜFUNGSUMFANG! Soll in Ihrem Unternehmen neue Software eingeführt werden und Sie müssen sie testen? Oder wollen Sie als Entwickler über den Tellerrand schauen und sich auch mit dem Softwaretesten beschäftigen? Leicht verständlich erläutert Ihnen Maud Schlich alle vom ISTQB® Certified Tester Foundation Level geforderten Lerninhalte sowohl für Programmierer als auch mit Blick auf Fachanwender, die die Software später einsetzen. Zahlreiche praxisorientierte Beispiele und übungen sorgen für eine optimale Prüfungsvorbereitung. Darüber hinaus erfahren Sie für alle Testaktivitäten, wie sie jeweils im klassischen oder im agilen Kontext geplant und durchgeführt werden. SIE ERFAHREN* Aus welchen Aktivitäten der Testprozess besteht* Wie Sie unterschiedliche Testverfahren nutzen* Wie Entwickler und Tester optimal zusammenarbeiten* Wie Sie prüfen, ob Sie noch im Plan sindMAUD SCHLICH coacht seit mehr als 25 Jahren Testmanager und Qualitätssicherungsteams im klassischen und im agilen Kontext. Sie ist Certified Tester Full Advanced Level und seit 2007 Mitglied des German Testing Board.

Regulärer Preis: 25,99 €
Produktbild für Large Language Model-Based Solutions

Large Language Model-Based Solutions

LEARN TO BUILD COST-EFFECTIVE APPS USING LARGE LANGUAGE MODELSIn Large Language Model-Based Solutions: How to Deliver Value with Cost-Effective Generative AI Applications, Principal Data Scientist at Amazon Web Services, Shreyas Subramanian, delivers a practical guide for developers and data scientists who wish to build and deploy cost-effective large language model (LLM)-based solutions. In the book, you'll find coverage of a wide range of key topics, including how to select a model, pre- and post-processing of data, prompt engineering, and instruction fine tuning. The author sheds light on techniques for optimizing inference, like model quantization and pruning, as well as different and affordable architectures for typical generative AI (GenAI) applications, including search systems, agent assists, and autonomous agents. You'll also find:* Effective strategies to address the challenge of the high computational cost associated with LLMs* Assistance with the complexities of building and deploying affordable generative AI apps, including tuning and inference techniques* Selection criteria for choosing a model, with particular consideration given to compact, nimble, and domain-specific modelsPerfect for developers and data scientists interested in deploying foundational models, or business leaders planning to scale out their use of GenAI, Large Language Model-Based Solutions will also benefit project leaders and managers, technical support staff, and administrators with an interest or stake in the subject. SHREYAS SUBRAMANIAN, PHD, is a principal data scientist at AWS, one of the largest organizations building and providing large language models for enterprise use. He is currently advising both internal Amazon teams and large enterprise customers on building, tuning, and deploying Generative AI applications at scale. Shreyas runs machine learning-focused cost optimization workshops, helping them reduce the costs of machine learning applications on the cloud. Shreyas also actively participates in cutting-edge research and development of advanced training, tuning and deployment techniques for foundation models.

Regulärer Preis: 38,99 €
Produktbild für Identity Attack Vectors

Identity Attack Vectors

Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement.In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization’s entire Identity Fabric.WHAT YOU WILL LEARN* Understand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vector* Implement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accounts* Know the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak link* Build upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystem* Plan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWHO THIS BOOK IS FORManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environmentsMOREY J. HABER is the Chief Security Officer at BeyondTrust. He has more than 25 years of IT industry experience and has authored four books: Privileged Attack Vectors, Asset Attack Vectors, Identity Attack Vectors, and Cloud Attack Vectors. He is a founding member of the industry group Transparency in Cyber, and in 2020 was elected to the Identity Defined Security Alliance (IDSA) Executive Advisory Board. Morey currently oversees BeyondTrust security and governance for corporate and cloud-based solutions and regularly consults for global periodicals and media. He originally joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition where he served as a Product Owner and Solutions Engineer since 2004. Prior to eEye, he was Beta Development Manager for Computer Associates, Inc. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook.DARRAN ROLLS is CISO and Chief Technology Officer at SailPoint, where he is responsible for directing the company’s technology strategies and security operations, and is co-author of Asset Attack Vectors. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology management solutions for vulnerability, and privileged and remote access. In 2004, he joined eEye as Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures for Fortune 500 clients. Prior to eEye, he was Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and named customer accounts. He began his career as Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelor of Science degree in Electrical Engineering from the State University of New York at Stony Brook. He has a long history in identity management and security at companies such as Tivoli Systems, IBM, Waveset Technologies, and Sun Microsystems. He has helped design, build, and deliver innovative, ground-breaking technology solutions that have defined and shaped the Identity and Access Management (IAM) industry. He frequently speaks at industry events and to customers about IAM and next-generation enterprise security solutions.Chapter 1: Introduction: The Machine.- Chapter 2: Introduction.- Chapter 3:.- Chapter 4:.- Chapter 5: Identity Access Denied.- Chapter 6: Understanding Enterprise Identity.- Chapter 7. Identity and Access Management.- Chapter 8: Privileged Access Management (PAM).- Chapter 9: Identity Threat Detection and Response.- Chapter 10: Indicators of Compromise.- Chapter 11: Identity Attack Vectors.- Chapter 12: The Identity Cyber Kill Chain.- Chapter 13: Six Steps to Identity Security.- Chapter 14: Emerging Identity Security Threats.- Chapter 15: Complexity Inherent in the IAM System.- Chapter 16: Identity Technical Debt.- Chapter 17: Identity Digital Transformation.- Chapter 18: Just in Time Access Management.- Chapter 19: Zero Trust for Identity Security.- Chapter 20: Identity Obfuscation.- Chapter 21: Regulatory Compliance.- Chapter 22: Key Takeaways.- Chapter 23: A Final Thought on Vendors.- Chapter 24: Conclusion.- Appendix A: Identity Security Sample RFP Questions.- Appendix B: Zero Trust Department of Defense (DoD) Framework.

Regulärer Preis: 62,99 €
Produktbild für Automatic Speech Recognition and Translation for Low Resource Languages

Automatic Speech Recognition and Translation for Low Resource Languages

AUTOMATIC SPEECH RECOGNITION AND TRANSLATION FOR LOW-RESOURCE LANGUAGESTHIS BOOK IS A COMPREHENSIVE EXPLORATION INTO THE CUTTING-EDGE RESEARCH, METHODOLOGIES, AND ADVANCEMENTS IN ADDRESSING THE UNIQUE CHALLENGES ASSOCIATED WITH ASR AND TRANSLATION FOR LOW-RESOURCE LANGUAGES. Automatic Speech Recognition and Translation for Low Resource Languages contains groundbreaking research from experts and researchers sharing innovative solutions that address language challenges in low-resource environments. The book begins by delving into the fundamental concepts of ASR and translation, providing readers with a solid foundation for understanding the subsequent chapters. It then explores the intricacies of low-resource languages, analyzing the factors that contribute to their challenges and the significance of developing tailored solutions to overcome them. The chapters encompass a wide range of topics, ranging from both the theoretical and practical aspects of ASR and translation for low-resource languages. The book discusses data augmentation techniques, transfer learning, and multilingual training approaches that leverage the power of existing linguistic resources to improve accuracy and performance. Additionally, it investigates the possibilities offered by unsupervised and semi-supervised learning, as well as the benefits of active learning and crowdsourcing in enriching the training data. Throughout the book, emphasis is placed on the importance of considering the cultural and linguistic context of low-resource languages, recognizing the unique nuances and intricacies that influence accurate ASR and translation. Furthermore, the book explores the potential impact of these technologies in various domains, such as healthcare, education, and commerce, empowering individuals and communities by breaking down language barriers. AUDIENCEThe book targets researchers and professionals in the fields of natural language processing, computational linguistics, and speech technology. It will also be of interest to engineers, linguists, and individuals in industries and organizations working on cross-lingual communication, accessibility, and global connectivity. L. ASHOK KUMAR, PHD, is a professor in the Department of Electrical and Electronics Engineering, PSG of Technology, Tamil Nadu, India. He has published more than 175 papers in international and national journals and received 26 awards for his PhD project on wearable electronics at national and international levels. He has created eight Centres of Excellence at PSG in collaboration with government agencies and industries such as the Centre for Audio Visual Speech Recognition and the Centre for Excellence in Solar Thermal Systems. Twenty-three out of 27 of his products have been technologically transferred to government funding agencies. D. KARTHIKA RENUKA, PHD, is a professor at PSG of Technology, Tamil Nadu, India. Her main areas of study focus on data mining, evolutionary algorithms, and machine learning. She is a recipient of the Indo-U.S. Fellowship for Women in STEMM. She has organized two international conferences on The Innovation of Computing Techniques and Information Processing and Remote Computing.BHARATHI RAJA CHAKRAVARTHI, PHD, is an assistant professor in the School of Computer Science, University of Galway, Ireland. His studies focus on multimodal machine learning, abusive/offensive language detection, bias in natural language processing tasks, inclusive language detection, and multilingualism. He has published many papers in international journals and conferences. He is an associate editor of the journal Expert System with Application and an editorial board member for Computer Speech & Language. THOMAS MANDL, PHD, is a professor of Information Science and Language Technology, University of Hildesheim, Germany. His research interests include information retrieval, human-computer interaction, and internationalization of information technology and he has published more than 300 papers on these topics. He coordinated tracks at the Cross Language Evaluation Forum (CLEF), the European information retrieval evaluation initiative. Thomas Mandl is the co-chair at FIRE, the evaluation initiative for Indian languages, since 2020 and coordinates the HASOC track on hate speech detection.

Regulärer Preis: 194,99 €
Produktbild für Metaheuristics for Machine Learning

Metaheuristics for Machine Learning

METAHEURISTICS FOR MACHINE LEARNINGTHE BOOK UNLOCKS THE POWER OF NATURE-INSPIRED OPTIMIZATION IN MACHINE LEARNING AND PRESENTS A COMPREHENSIVE GUIDE TO CUTTING-EDGE ALGORITHMS, INTERDISCIPLINARY INSIGHTS, AND REAL-WORLD APPLICATIONS.The field of metaheuristic optimization algorithms is experiencing rapid growth, both in academic research and industrial applications. These nature-inspired algorithms, which draw on phenomena like evolution, swarm behavior, and neural systems, have shown remarkable efficiency in solving complex optimization problems. With advancements in machine learning and artificial intelligence, the application of metaheuristic optimization techniques has expanded, demonstrating significant potential in optimizing machine learning models, hyperparameter tuning, and feature selection, among other use-cases. In the industrial landscape, these techniques are becoming indispensable for solving real-world problems in sectors ranging from healthcare to cybersecurity and sustainability. Businesses are incorporating metaheuristic optimization into machine learning workflows to improve decision-making, automate processes, and enhance system performance. As the boundaries of what is computationally possible continue to expand, the integration of metaheuristic optimization and machine learning represents a pioneering frontier in computational intelligence, making this book a timely resource for anyone involved in this interdisciplinary field. Metaheuristics for Machine Learning: Algorithms and Applications serves as a comprehensive guide to the intersection of nature-inspired optimization and machine learning. Authored by leading experts, this book seamlessly integrates insights from computer science, biology, and mathematics to offer a panoramic view of the latest advancements in metaheuristic algorithms. You’ll find detailed yet accessible discussions of algorithmic theory alongside real-world case studies that demonstrate their practical applications in machine learning optimization. Perfect for researchers, practitioners, and students, this book provides cutting-edge content with a focus on applicability and interdisciplinary knowledge. Whether you aim to optimize complex systems, delve into neural networks, or enhance predictive modeling, this book arms you with the tools and understanding you need to tackle challenges efficiently. Equip yourself with this essential resource and navigate the ever-evolving landscape of machine learning and optimization with confidence. AUDIENCEThe book is aimed at a broad audience encompassing researchers, practitioners, and students in the fields of computer science, data science, engineering, and mathematics. The detailed but accessible content makes it a must-have for both academia and industry professionals interested in the optimization aspects of machine learning algorithms. KANAK KALITA, PHD, is a professor in the Department of Mechanical Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, Avadi, India. He has more than 190 articles in international and national journals and 5 edited books. Dr. Kalita’s research interests include machine learning, fuzzy decision-making, metamodeling, process optimization, finite element method, and composites. NARAYANAN GANESH, PHD, is an associate professor at the Vellore Institute of Technology Chennai Campus. His extensive research encompasses a range of critical areas, including software engineering, agile software development, prediction and optimization techniques, deep learning, image processing, and data analytics. He has published over 30 articles and written 8 textbooks and has been recognized for his contributions to the field with two international patents from Australia. S. BALAMURUGAN, PHD, is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents.

Regulärer Preis: 168,99 €
Produktbild für Beginning Shadow DOM API

Beginning Shadow DOM API

Leverage the power of the Shadow DOM API to quickly create encapsulated code that keeps markup and styles separate within websites. Using little more than a text editor or free software, this project-oriented book simplifies the process of creating and manipulating the Shadow DOM API code in the browser for websites or online applications.You'll use a starting toolset to develop future projects, incorporate them into an existing workflow, and allow them to simplify complex components. This makes them more robust and less brittle when used in websites. You'll also see that websites do not have to convert the whole work process immediately; you can incorporate as little or as much as needed of the API, and build on this as your skills develop.We live in an age where speed and simplicity are of the essence. _Beginning Shadow DOM API_ shows you the perfect way to create encapsulated code that can run in multiple frameworks with a minimum of fuss.YOU YOU'LL LEARN* Implement the Shadow DOM API in a project* Gain an appreciation of pointers using the Shadow DOM API* Manage issues and security when using the Shadow DOM API* Make components and code more reusable, while maintaining desired stylingWHO THIS BOOK IS FORWebsite developers who are already familiar with frameworks that Shadow DOM API, but do not want to have to use the heavy weight of a full-sized framework to add features such as DOM encapsulation to their code.ALEX LIBBY is a frontend developer and seasoned computer book author, who hails from England. His passion for all things open-source dates back to his student days, when he first came across web development, and has been hooked ever since. His daily work involves extensive use of JavaScript, HTML, and CSS to manipulate existing website content; Alex enjoys tinkering with different open-source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library, and enjoys writing about open-source technologies, principally for front-end UI development.1.Getting Started.- 2. Creating Components.- 3. Applying Shadow DOM API in Apps.- 4. Supporting other Frameworks.

Regulärer Preis: 24,99 €