Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Machine Learning Applications

Machine Learning Applications

MACHINE LEARNING APPLICATIONSPRACTICAL RESOURCE ON THE IMPORTANCE OF MACHINE LEARNING AND DEEP LEARNING APPLICATIONS IN VARIOUS TECHNOLOGIES AND REAL-WORLD SITUATIONSMachine Learning Applications discusses methodological advancements of machine learning and deep learning, presents applications in image processing, including face and vehicle detection, image classification, object detection, image segmentation, and delivers real-world applications in healthcare to identify diseases and diagnosis, such as creating smart health records and medical imaging diagnosis, and provides real-world examples, case studies, use cases, and techniques to enable the reader’s active learning. Composed of 13 chapters, this book also introduces real-world applications of machine and deep learning in blockchain technology, cyber security, and climate change. An explanation of AI and robotic applications in mechanical design is also discussed, including robot-assisted surgeries, security, and space exploration. The book describes the importance of each subject area and detail why they are so important to us from a societal and human perspective. Edited by two highly qualified academics and contributed to by established thought leaders in their respective fields, Machine Learning Applications includes information on:* Content based medical image retrieval (CBMIR), covering face and vehicle detection, multi-resolution and multisource analysis, manifold and image processing, and morphological processing* Smart medicine, including machine learning and artificial intelligence in medicine, risk identification, tailored interventions, and association rules* AI and robotics application for transportation and infrastructure (e.g., autonomous cars and smart cities), along with global warming and climate change* Identifying diseases and diagnosis, drug discovery and manufacturing, medical imaging diagnosis, personalized medicine, and smart health recordsWith its practical approach to the subject, Machine Learning Applications is an ideal resource for professionals working with smart technologies such as machine and deep learning, AI, IoT, and other wireless communications; it is also highly suitable for professionals working in robotics, computer vision, cyber security and more. INDRANATH CHATTERJEE is a Professor in the Department of Computer Engineering, at Tongmyong University, South Korea. He received his PhD from University of Delhi, India and has authored several books and numerous, research papers. His areas of research are AI, computer vision, computation neuroscience and medical imaging. SHEETAL ZALTE is an Assistant Professor in the Department of Computer Science at Shivaji University, India. She earned her PhD from Shivaji University, India, and has published many research papers. Her research area is mobile adhoc networks.* Statistical similarity in machine learning* Development of machine learning-based methodologies for adaptive intelligent e-learning systems and time series analysis techniques* Time-series forecasting for stock market using convolutional neural networks.* Comparative study for applicability of color histograms for CBIR used for crop leaf disease detection.* Stock Index Forecasting Using RNN-Long Short Term Memory* Study and analysis of machine learning models for detection of phishing URLs* Real-world applications of blockchain technology in internet of things* Advanced persistent threat: Korean cyber security knack model impost and applicability* Integration of Blockchain Technology and Internet of Things: Challenges and its Solutions10. Machine learning techniques for swot analysis of online education system11. Crop yield and soil moisture prediction using machine learning algorithms.12. Multi-rate signal processing in WSN for channel capacity and energy efficiency using machine learning.13. Introduction to mechanical design of AI-based robotic system

Regulärer Preis: 100,99 €
Produktbild für Deploy Container Applications Using Kubernetes

Deploy Container Applications Using Kubernetes

Navigate through the Kubernetes landscape to create and deploy container-based applications. This book will show you how to choose between the various available container-based operating systems, and how to design a better continuous integration pipeline for your container images, where to store them, and how to scan and secure them.In the first half of the book, you'll learn the practical tips on how to setup the system for visibility and troubleshooting, how to reduce the attack vector and reduce risks. The second half of the book focuses on Kubernetes, the popular container orchestration system. You'll see how to setup your Kubernetes for practical applications such as show/chargeback using tagging, efficient use of namespaces and pods, various isolation layers. It also shows you how to integrate with popular implementations of K8S such as AWS EKS (Elastic Container Service), GCP Google Kubernetes Engine (GKE) in touch points such as authentication and authorization, optimization, logging and troubleshooting tools, etc.By practicing the scenarios given in this book, you will be able to make better design choices that are appropriate for the constraints you are working with. Deploy Container Applications Using Kubernetes is your go-to resource for an optimal deployment of workloads using containers and Kubernetes in both public and private cloud settings.WHAT YOU'LL LEARN* Understand the various design choices, their pros and cons* Build a better CI/CD pipeline for your containers and Kubernetes* Deploy your first container application in a public cloud K8S engine* Improve your existing K8S deployment for efficiency and eleganceWHO THIS BOOK IS FORIT Platform Architects, System Engineers/, and System AdministratorsShiva Subramanian is a servant leader (lead by example) with focus on business software engineering gained though 20 plus years of progressive roles in Atari (PacMan Champ!), Basic/Pascal/Fortran, dBase/FoxPro, VisualBasic/VisualC++, Infrastructure (Windows NT/Linux), Software Development, Information Security, Architecture, Team leadership, Management, Business Partnerships, Contributing to P&L, Launching new business, Creating & Leading global SW Dev Teams to Containers, Docker, CGroups, Kubernetes (K8S), Jenkins, Cloud (AWS/GCP/Azure), Java, SpringBoot, Redis, MongoDB, JSON, Scala.He has 20 years experience in the BFSI sector in areas such as core banking solutions, payment networks, electronic billpay/bill presentment solutions, Anti-Money Laundering solutions, loan origination platforms, credit-union platforms, teller/customer/branch management systems, investment banking platforms (APL), mobile commerce (SMS banking) and bank intelligence platforms (BI/BW) just to name a few knowledge domains. Chapter 1. Running your first container applicationChapter 2.Introducing KubernetesChapter 3.A Closer Look at KubernetesChapter 4. Scaling the deployment.- Chapter 5.Node management and RBACChapter 6. Artifact Repository and Container Registry.- Chapter 7. AWS EKSChapter 8.Installing and configuring command line tools to work with AWS EKS service.-Chapter 9. Data-PersistenceChapter 10.Networking and IngressChapter 11. Kubernetes Tools

Regulärer Preis: 56,99 €
Produktbild für Discovering Cybersecurity

Discovering Cybersecurity

The contemporary IT landscape is littered with various technologies that vendors claim will “solve” an organization’s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization’s mission.This book introduces major technologies that are employed in today’s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.WHAT YOU WILL LEARN* Authentication technologies, including secure password storage and how hackers “crack” password lists* Access control technology, such as BLP, BIBA, and more recent models such as RBAC and ABAC* Core cryptography technology, including AES encryption and public key signatures* Classical host security technologies that protect against malware (viruses, trojans, ransomware)* Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systems* Web security technologies, including cookies, state, and session defenses, and threats that try to subvert them* Email and social media security threats such as spam, phishing, social media, and other email threatsWHO THIS BOOK IS FORProfessionals with no technical training in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.SETH JAMES NIELSON, PHD is the founder and chief scientist of Crimson Vista, a cybersecurity engineering company. He advises clients from startups to Fortune 50 companies on security matters. Dr. Nielson also teaches cybersecurity courses at the University of Texas at Austin. He has authored or co-authored papers on topics such as IoT security, hacking portable chemical manufacturing systems, and methods for teaching computer security to students. Dr. Nielson also co-authored the Apress book, Practical Cryptography in Python. CHAPTER 1: THE PSYCHOLOGY OF CYBERSECURITY TECHNOLOGYCHAPTER 2: AUTHENTICATION TECHFoundations of AuthenticationThe Big Three – Something You Know, Have, or AreSecure Password StorageHow Hackers “Crack” Password ListsCHAPTER 3: ACCESS CONTROL TECHFoundations of Access ControlsMandatory vs Discretionary Access ControlsBLP, BIBA, and Other ModelsRBAC and ABACCHAPTER 4: CORE CRYPTOGRAPHY TECHFoundations of CryptographySymmetric CryptographyAsymmetric CryptographyCertificates and PKICHAPTER 5: CRYPTOGRAPHY APPLICATION TECHFoundations of Cryptographic ApplicationsSecuring Data-At-RestSecuring Data-In-MotionSecuring Data-In-UseSecuring Composite StatesCHAPTER 6: CLASSICAL HOST SECURITY TECHFoundations of Host SecurityMalware: Viruses, Trojans, RansomwareHost HardeningHost IDSTechnological LimitsCHAPTER 7: CLASSICAL NETWORK SECURITY TECHFoundations of Network SecurityBorder Security: Gateways, Firewalls, ProxiesVirtual Private Network (VPN)Network IDS and IPSPhysical SecurityTechnological LimitsCHAPTER 8: WEB SECURITY TECHFoundations of Web SecurityTLSCookies, State, and Session DefensesAPI SecurityDomain Name SecurityCHAPTER 9: EMAIL AND SOCIAL MEDIA SECURITY TECHFoundations of Overlay SecurityEmail-borne MalwareSpam, Phishing, and Other Email ThreatsSocial Media ThreatsCHAPTER 10: CLOUD SECURITY TECHFoundations of Cloud SecurityAuthenticating and Authorizing Across DomainsMultitenancy Security for Storage and OperationsAvailabilityIncident ResponseCHAPTER 11: MODERN SECURITY TECHFoundations of Classic Security LimitationsAdvanced Persistent ThreatsZero-trust NetworkingDeception TechnologiesData Privacy TechniquesCHAPTER 12: BLOCKCHAIN TECHFoundations of Blockchain TechnologyPeer-to-Peer TechnologyDistributed LedgersPublic and Private LedgersLimitations of the TechnologyCryptocurrenciesCHAPTER 13: CURRENT EVENTS AND FUTURE TRENDSTODO: Decided closer to end-of-bookAPPENDIX A: REVIEW OF COMPUTER BASICSAPPENDIX B: REVIEW OF NETWORKING BASICS

Regulärer Preis: 56,99 €
Produktbild für The Art of Reinforcement Learning

The Art of Reinforcement Learning

Unlock the full potential of reinforcement learning (RL), a crucial subfield of Artificial Intelligence, with this comprehensive guide. This book provides a deep dive into RL's core concepts, mathematics, and practical algorithms, helping you to develop a thorough understanding of this cutting-edge technology.Beginning with an overview of fundamental concepts such as Markov decision processes, dynamic programming, Monte Carlo methods, and temporal difference learning, this book uses clear and concise examples to explain the basics of RL theory. The following section covers value function approximation, a critical technique in RL, and explores various policy approximations such as policy gradient methods and advanced algorithms like Proximal Policy Optimization (PPO).This book also delves into advanced topics, including distributed reinforcement learning, curiosity-driven exploration, and the famous AlphaZero algorithm, providing readers with a detailed account of these cutting-edge techniques.With a focus on explaining algorithms and the intuition behind them, The Art of Reinforcement Learning includes practical source code examples that you can use to implement RL algorithms. Upon completing this book, you will have a deep understanding of the concepts, mathematics, and algorithms behind reinforcement learning, making it an essential resource for AI practitioners, researchers, and students.WHAT YOU WILL LEARN* Grasp fundamental concepts and distinguishing features of reinforcement learning, including how it differs from other AI and non-interactive machine learning approaches* Model problems as Markov decision processes, and how to evaluate and optimize policies using dynamic programming, Monte Carlo methods, and temporal difference learning* Utilize techniques for approximating value functions and policies, including linear and nonlinear value function approximation and policy gradient methods* Understand the architecture and advantages of distributed reinforcement learning* Master the concept of curiosity-driven exploration and how it can be leveraged to improve reinforcement learning agents* Explore the AlphaZero algorithm and how it was able to beat professional Go playersWHO THIS BOOK IS FORMachine learning engineers, data scientists, software engineers, and developers who want to incorporate reinforcement learning algorithms into their projects and applications.MICHAEL HU is a skilled software engineer with over a decade of experience in designing and implementing enterprise-level applications. He's a passionate coder who loves to delve into the world of mathematics and has a keen interest in cutting-edge technologies like machine learning and deep learning, with a particular interest in deep reinforcement learning. He has build various open-source projects on Github, which closely mimic the state-of-the-art reinforcement learning algorithms developed by DeepMind, such as AlphaZero, MuZero, and Agent57. Fluent in both English and Chinese, Michael currently resides in the bustling city of Shanghai, China.I Foundation 11 Introduction 31.1 AI Breakthrough in Games . . . . . . . . . . . . . . . . . . . . . . . . 41.2 What is Reinforcement Learning . . . . . . . . . . . . . . . . . . . . . 91.3 Agent-Environment in Reinforcement Learning . . . . . . . . . . . . . 101.4 Examples of Reinforcement Learning . . . . . . . . . . . . . . . . . . 151.5 Common terms in Reinforcement Learning . . . . . . . . . . . . . . . 171.6 Why study Reinforcement Learning . . . . . . . . . . . . . . . . . . . 201.7 The Challenges in Reinforcement Learning . . . . . . . . . . . . . . . 232 Markov Decision Processes 292.1 Overview of MDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292.2 Model Reinforcement Learning Problem using MDP . . . . . . . . . . 312.3 Markov Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352.4 Markov Reward Process . . . . . . . . . . . . . . . . . . . . . . . . . 372.5 Markov Decision Process . . . . . . . . . . . . . . . . . . . . . . . . . 432.6 Alternative Bellman Equations for Value Functions . . . . . . . . . . 542.7 Optimal Policy and Optimal Value Functions . . . . . . . . . . . . . 563 Dynamic Programming 613.1 Policy Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623.2 Policy Improvement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673.3 Policy Iteration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703.4 General Policy Iteration . . . . . . . . . . . . . . . . . . . . . . . . . 743.5 Value Iteration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 744 Monte Carlo Methods 794.1 Monte Carlo Policy Evaluation . . . . . . . . . . . . . . . . . . . . . 804.2 Incremental Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86iiiContents iv4.3 Exploration vs. Exploitation . . . . . . . . . . . . . . . . . . . . . . . 894.4 Monte Carlo Control (Policy Improvement) . . . . . . . . . . . . . . . 935 Temporal Di↵erence Learning 995.1 Temporal Di↵erence Learning . . . . . . . . . . . . . . . . . . . . . . 995.2 Temporal Di↵erence Policy Evaluation . . . . . . . . . . . . . . . . . 1005.3 Simplified ✏-greedy policy for Exploration . . . . . . . . . . . . . . . . 1075.4 TD Control - SARSA . . . . . . . . . . . . . . . . . . . . . . . . . . . 1095.5 On-policy vs. O↵-policy . . . . . . . . . . . . . . . . . . . . . . . . . 1115.6 Q-learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1195.7 Double Q-learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1255.8 N-step Bootstrapping . . . . . . . . . . . . . . . . . . . . . . . . . . . 130II Value Function Approximation 1436 Linear Value Function Approximation 1456.1 The Challenge of Large-scale MDPs . . . . . . . . . . . . . . . . . . . 1456.2 Value Function Approximation . . . . . . . . . . . . . . . . . . . . . . 1486.3 Stochastic Gradient Descent . . . . . . . . . . . . . . . . . . . . . . . 1526.4 Linear Value Function Approximation . . . . . . . . . . . . . . . . . . 1597 Nonlinear Value Function Approximation 1717.1 Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1727.2 Training Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . 1837.3 Policy Evaluation with Neural Networks . . . . . . . . . . . . . . . . 1887.4 Naive Deep Q-learning . . . . . . . . . . . . . . . . . . . . . . . . . . 1907.5 Deep Q-learning with Experience Replay and Target Network . . . . 1917.6 DQN for Atari Games . . . . . . . . . . . . . . . . . . . . . . . . . . 2008 Improvement to DQN 2118.1 DQN with Double Q-learning . . . . . . . . . . . . . . . . . . . . . . 2118.2 Prioritized Experience Replay . . . . . . . . . . . . . . . . . . . . . . 2148.3 Advantage function and Dueling Network Architecture . . . . . . . . 219III Policy Approximation 2259 Policy Gradient Methods 2279.1 Policy-based methods . . . . . . . . . . . . . . . . . . . . . . . . . . . 2289.2 Policy Gradient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2319.3 REINFORCE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2379.4 REINFORCE with Baseline . . . . . . . . . . . . . . . . . . . . . . . 2399.5 Actor-Critic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2439.6 Using Entropy to Encourage Exploration . . . . . . . . . . . . . . . . 24910 Problems with Continuous Action Space 25510.1 The Challenges of Problems with Action Space Problems . . . . . . . 25610.2 MuJoCo Environments . . . . . . . . . . . . . . . . . . . . . . . . . . 25710.3 Policy Gradient for Problems with Continuous Action Space . . . . . 26011 Advanced Policy Gradient Methods 26711.1 Problems with the standard Policy Gradients methods . . . . . . . . 26711.2 Policy Performance Bounds . . . . . . . . . . . . . . . . . . . . . . . 27011.3 Proximal Policy Optimization . . . . . . . . . . . . . . . . . . . . . . 277IV Advanced Topics 28712 Distributed Reinforcement Learning 28912.1 Why use Distributed Reinforcement Learning . . . . . . . . . . . . . 28912.2 General Distributed Reinforcement Learning Architecture . . . . . . . 29012.3 Data Parallelism for Distributed Reinforcement Learning . . . . . . . 29813 Curiosity-Driven Exploration 30113.1 Hard-to-explore problems vs. Sparse Reward problems . . . . . . . . 30213.2 Curiosity-Driven Exploration . . . . . . . . . . . . . . . . . . . . . . . 30313.3 Random Network Distillation . . . . . . . . . . . . . . . . . . . . . . 30514 Planning with a Model - AlphaZero 31714.1 Why We Need to Plan in Reinforcement Learning . . . . . . . . . . . 31714.2 Monte Carlo Tree Search . . . . . . . . . . . . . . . . . . . . . . . . . 32014.3 AlphaZero . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

Regulärer Preis: 62,99 €
Produktbild für Frontend Development with JavaFX and Kotlin

Frontend Development with JavaFX and Kotlin

Build elegant, responsive, and stable Java Virtual Machine-based client applications (Fat Clients) with modern user interfaces. This book introduces JavaFX as a frontend technology and utilizes Kotlin instead of Java for coding program artifacts to boost code expressiveness and maintainability. Author Peter Späth employs a hands-on approach, providing practical examples and code to demonstrate each concept. Mid-level Java programming knowledge and a basic understanding of Kotlin are the only prerequisites; experience with JavaFX and frontend coding is not essential.JavaFX is a modern frontend programming toolkit equipped with containers, menus, buttons, sliders, text fields, and various other controls necessary for communicating with your users, all of which are covered here. Despite its name, JavaFX applications can be coded with programming languages other than Java. The central requirement is that any language targeting JavaFX compiles to artifacts runnable on a Java Virtual Machine. Over the course of this book, you’ll learn firsthand why Kotlin, with its elegant and concise syntax, is a perfect match.After completing Frontend Development With JavaFX and Kotlin, you will be able to build frontends of mid-to-high level complexity, depending on present Java skills, and use Kotlin as a language for addressing GUI programming needs and accessing the JavaFX API.WHAT YOU WILL LEARN* Create a JavaFX + Kotlin development pipeline for Gradle, Eclipse and IntelliJ* Use JavaFX scenes, stages, and nodes/controls* Master JavaFX event handling, effects, and animation using Kotlin* Understand the JavaFX Concurrency Framework and Kotlin Coroutines for JavaFXWHO THIS BOOK IS FORLow- to mid-level Java or Kotlin developers with or without JavaFX experience who wish to learn how to build JavaFX applications with Kotlin.Peter Späth graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects. In 2016, he decided to concentrate on writing books on various aspects, but with the main focus on software development. With two books about graphics and sound processing, three books on Android app development, and a beginner’s book on Jakarta EE development, the author continues his effort in writing software development-related literature.Chapter 1: Getting started.- Chapter 2: Properties, Bindings, and Observable Collections.- Chapter 3: Stages and Scenes.- Chapter 4 : Nodes and Controls.- Chapter 5 : Lists and Tables.- Chapter 6 : Event Handling.- Chapter 7: Effects and Animation.- Chapter 8: Concurrency.

Regulärer Preis: 52,99 €
Produktbild für ChatGPT for Beginners

ChatGPT for Beginners

If you’re a complete newbie who’s wondering exactly what ChatGPT is, what is does, and how it can be a valuable resource for non-coders, this is the book for you. With a comprehensive exploration of ChatGPT’s features, foundations, and applications, this guide will serve as a valuable resource for beginners venturing into the world of conversational AI.ChatGPT for Beginners has four parts. Part one provides a step-by-step introduction to using ChatGPT, from accessing the OpenAI website and creating an account to starting conversations, changing responses, and getting conversation summaries. Part two delves into the foundations of the large language model that powers ChatGPT. It covers topics such as the definition of ChatGPT, its knowledge domains, the basics of natural language processing, machine learning techniques applied to language processing, and the role of neural networks in ChatGPT’s operation. Part three covers a wide range of practical applications, from letter writing to business content creation, text translation, language learning, recruitment processes, artistic content creation, and fostering innovation and creativity. Part four examines the strengths and limitations of ChatGPT, addressing ethical considerations related to data security, bias, and partiality. It also delves into the future advancements and challenges that lie ahead for ChatGPT, providing insights into the developing landscape of conversational AI.After completing this book, you will be able to harness the full potential of ChatGPT. Whether you are a student, professional, or are just curious about the capabilities of this AI technology, this book will serve as your essential companion in unlocking the possibilities of ChatGPT.WHAT YOU WILL LEARN* Access ChatGPT, create an account, and initiate conversations* Understand what ChatGPT is, its knowledge domains, and how it works through natural language processing, machine learning, and neural networks* Ask relevant questions to ChatGPT, and obtain quality responses* Manage the degree of randomness in the responses using parameters such as temperature, frequency, and presenceWHO THIS BOOK IS FORStudents, professionals, and anyone else curious about the capabilities of ChatGPT.ERIC SARRION is a trainer, a developer, and an independent consultant. He has been involved in all kinds of IT projects for over 30 years. He is also a long-time author of web development technologies and is renowned for the clarity of his explanations and examples. He resides in Paris, France.

Regulärer Preis: 34,99 €
Produktbild für AWS IoT With Edge ML and Cybersecurity

AWS IoT With Edge ML and Cybersecurity

In an era where the fusion of connectivity and technology is redefining industries, this book is a must-have guide for aspiring technologists and seasoned professionals alike. This meticulously crafted handbook guides you through every aspect of AWS IoT, touching upon vital spheres such as edge computing, machine learning, and industrial IoT, with a distinct spotlight on cybersecurity.Over the course of this book, industry veteran Syed Rehad unveils the secrets to setting up your AWS IoT environment and walks you through advanced concepts such as leveraging MQTT, mastering Digital Twin implementation, and plumbing the depths of edge machine learning. Whether you're experimenting with virtual devices or hands-on with Raspberry Pi setups, this book will steer you towards innovation and a transformative journey where technology meets intelligence and security, all under the expansive umbrella of AWS IoT.WHAT YOU WILL LEARN* AWS MASTERY: Dive deep into AWS IoT essentials, from setup to hands-on SDK tools* ADVANCED CONNECTIVITY: Explore advanced MQTT features and the potential of AWS IoT Core MQTT clients* DEVICE INTEGRATION: Master AWS IoT device creation, connection, and deployment, blending the digital and physical* DIGITAL TWIN: Unleash IoT's future with AWS IoT device shadow, capitalizing on digital twin technology* DEVICE MANAGEMENT: Transform remote oversight using secure IoT tunnelling and innovative actions* EDGE DEVELOPMENT: Merge IoT and Machine Learning via AWS IoT Greengrass, spotlighting image classification* DATA TO INSIGHTS: Swiftly move from raw data to actionable insights leveraging Amazon Timestream* IOT CYBERSECURITY: Strengthen your defenses using AWS IoT Device Defender, Zero Trust principles, and Machine Learning (ML) Detect to prepare for and counter threatsWHO THIS BOOK IS FORIoT developers and enthusiasts, professionals who want to implement IoT solutions in industrial scenarios, system architects and designers interested in edge machine learning, business intelligence analysts, and cybersecurity professionals.SYED REHAN has established himself as a luminary in the world of cloud technologies over the course of a career spanning 18+ years in the fields of development, IoT, and cybersecurity. Having joined AWS in 2017, Syed has been at the forefront of their initiatives, consistently driving innovation and contributing to the platform's evolution. His rich portfolio includes numerous insightful blogs, workshops and authoritative whitepapers for AWS, showcasing his deep expertise and thought leadership in the industry.Syed has graced the main stage as a speaker at AWS re:Invent and numerous global conferences, shedding light on the rapidly evolving landscapes of cybersecurity, IoT, and cloud technologies.Presently, Syed serves as a Senior Global Cybersecurity Specialist in the AWS IoT Core Security Foundation team. His collaborative spirit has been reflected in his instrumental role with the product teams in launching pivotal services like AWS IoT Device Defender and AWS IoT Greengrass.Syed's trailblazing journey is marked with several firsts. He was among the initial cohort of specialist solution architects for AWS IoT in EMEA, and he also earned the honor of being the first specialist Solution Architect for Amazon Connect.Syed's legacy in AWS and the cloud domain is a blend of vast experience, innovation, unwavering passion and leadership, a legacy that continues to inspire and guide the next generation of tech enthusiasts.

Regulärer Preis: 56,99 €
Produktbild für CompTIA Security+ Practice Tests

CompTIA Security+ Practice Tests

PREPARE FOR THE SECURITY+ CERTIFICATION EXAM CONFIDENTLY AND QUICKLYCompTIA Security+ Practice Tests: Exam SY0-701, Third Edition, prepares you for the newly updated CompTIA Security+ exam. You’ll focus on challenging areas and get ready to ace the exam and earn your Security+ certification. This essential collection of practice tests contains study questions covering every single objective domain included on the SY0-701. Comprehensive coverage of every essential exam topic guarantees that you’ll know what to expect on exam day, minimize test anxiety, and maximize your chances of success.You’ll find 1000 practice questions on topics like general security concepts, threats, vulnerabilities, mitigations, security architecture, security operations, and security program oversight. You’ll also find:* Complimentary access to the Sybex test bank and interactive learning environment* Clear and accurate answers, complete with explanations and discussions of exam objectives* Material that integrates with the CompTIA Security+ Study Guide: Exam SY0-701, Ninth EditionThe questions contained in CompTIA Security+ Practice Tests increase comprehension, strengthen your retention, and measure overall knowledge. It’s an indispensable part of any complete study plan for Security+ certification.

Regulärer Preis: 28,99 €
Produktbild für Cloud-native Computing (2. Auflage)

Cloud-native Computing (2. Auflage)

Cloud-native Computing. Software Engineering von Diensten und Applikationen für die Cloud. In 2., aktualisierter Auflage. Dezember 2023. Märkte verändern sich immer schneller, Kundenwünsche stehen im Mittelpunkt – viele Unternehmen sehen sich Herausforderungen gegenüber, die nur digital beherrschbar sind. Um diese Anforderungen zu bewältigen, bietet sich der Einsatz von Cloud-native-Technologien an. Dabei reicht es jedoch nicht aus, einen Account bei einem Cloud-Anbieter anzulegen. Es geht auch darum, die unterschiedlichen Faktoren zu verstehen, die den Erfolg von Cloud-native-Projekten beeinflussen.Das Buch beleuchtet den Cloud-native-Wandel aus unterschiedlichen Perspektiven: von der Unternehmenskultur, der Cloud-Ökonomie und der Einbeziehung der Kunden (Co-Creation) über das Projektmanagement (Agilität) und die Softwarearchitektur bis hin zu Qualitätssicherung (Continuous Delivery), Betrieb (DevOps) und Sicherheit. Anhand von realen Praxisbeispielen wird gezeigt, was bei der Umsetzung in unterschiedlichen Branchen gut und was schlecht gelaufen ist und welche Best Practices sich daraus ableiten lassen. Dabei wird auch die Migration von Legacy-Code berücksichtigt.IT-Architekten vermittelt dieses Buch zudem das grundlegende Wissen, um Cloud-native-Technologien und die DevOps-Kultur in ihrem Projekt oder im gesamten Unternehmen einzuführen. Nane Kratzke ist Professor für Informatik an der Technischen Hochschule Lübeck und befasst sich seit mehr als 10 Jahren in Forschung, Beratung und Lehre mit Cloud-nativen Technologien.Leseprobe (PDF-Link)

Regulärer Preis: 59,99 €
Produktbild für Business Intelligence mit Excel (3. Auflage)

Business Intelligence mit Excel (3. Auflage)

Business Intelligence mit Excel. Datenanalyse und Reporting mit Power Query, Power Pivot und Power BI Desktop. In 3., aktualisierter Auflage. Dezember 2023.Die benutzerfreundlichen BI-Tools von Microsoft Excel sind die erste Wahl im Management und Controlling, Sie helfen, Trends und Risiken zu erkennen, Zusammenhänge zu begreifen und Entscheidungsgrundlagen zu verbessern. Bereiten Sie Unternehmensdaten auf verbunden mit intelligentem Reporting und Visualisierung. Dabei können Sie die Analysen ständig, sofort und auf allen Medien verfügbar halten.Dieses Praxisbuch vermittelt die Grundlagen für den Einstieg in Business Intelligence. Es erklärt Begriffe und Methoden und zeigt, wie Daten aus unterschiedlichen Quellen mit Microsoft Excel importiert, transformiert und visualisiert werden. Lernen Sie, mit Power Query und der Skriptsprache M Daten aufzubereiten und üben Sie den Aufbau von Datenmodellen mit Power Pivot und DAX. Anschauliche Visualisierungen, Berichte und Dashboards erstellen Sie mit PivotTables, PivotCharts und Power BI. Ignatz Schels ist Technik-Informatiker, zertifizierter Projektfachmann (GPM / IPMA) und Excel-Experte der Spitzenklasse. Er programmiert Praxislösungen mit VBA und erstellt Access-Datenbanken. Viele seiner zahlreichen Fachbücher für Controller und Projektmanager sind Bestseller.

Regulärer Preis: 44,99 €
Produktbild für IT-Dokumentation im Wandel

IT-Dokumentation im Wandel

Jedes Unternehmen muss sich heute mit Digitalisierung und digitalem Wandel beschäftigen. Diese Entwicklungen haben zwangsläufig auch Einfluss auf die Ausgestaltung der IT-Dokumentation. Sie muss zum einen an den Anforderungen zunehmender Digitalisierung ausgerichtet werden und diese wirkungsvoll unterstützen. Zum anderen ist die IT-Dokumentation nach wie vor ein wichtiges Management- und Compliance-Werkzeug. Dieses Buch unterstützt Sie bei der Anpassung Ihrer IT-Dokumentation an die Erfordernisse der digitalen Transformation. Hierbei werden die Anforderungen betrachtet, die sich aus veränderten Prozessen und Methoden sowie steigende regulatorische Vorgaben ergeben. Ausgehend von der traditionellen IT-Dokumentation wird auf die aktuellen Entwicklungen eingegangen. Im Fokus steht hierbei die Dokumentation für ausgewählte Aufgabenbereiche der IT-Organisationen wie • Sicherheitsmanagement, • Notfallmanagement, • System- und Architekturbetrieb, • Softwareentwicklung, • Dienstleistersteuerung. Darüber hinaus werden die Einsatzmöglichkeiten geeigneter Dokumentationswerkzeuge beleuchtet. Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten Buches

Regulärer Preis: 49,99 €
Produktbild für Agile Testing (3. Auflage)

Agile Testing (3. Auflage)

Agile Testing. Der agile Weg zur Qualität. In 3., überarbeiteter Auflage. Dezember 2023.Der Trend zu agilen Vorgehen ist ungebrochenDieser Trend geht auch am Softwaretest nicht spurlos vorüber. Nachdem die Bedeutung des Tests in agilen Projekten unumstritten ist, treten jetzt vor allem die Professionalisierung und die Integration der einzelnen Mitarbeiter in den rollenübergreifenden Tätigkeiten des agilen Vorgehens in den Vordergrund.Die klassischen Rollenbilder des Tests verschwimmen und gehen ineinander über. Die Eigenverantwortung der Tester steigt. Für den klassischen Tester bedeutet dies eine Bereicherung und Aufwertung seiner Rolle, da er auch Aufgaben und Tätigkeiten anderer Professionen übernimmt.Der Stellenwert des TeamsDie Crux mit den Werkzeugen in agilen ProjektenDie sieben schlechtesten Ideen für die TestautomatisierungTestmethoden im agilen UmfeldTester: Generalist vs. Spezialist?Welches sind nun aber die Aufgaben des Softwaretests in agilen Projekten? Wie sind diese in unterschiedlichen agilen Vorgehensweisen – wie etwa Scrum oder Kanban – zu organisieren? Welche Bedeutung haben Testwerkzeuge in diesem Kontext? Wie grenzen sich die Verantwortlichkeiten gegeneinander ab oder wirken synergetisch zusammen?Auf diese sehr konkreten Fragen, die sich im operativen Projektgeschehen immer wieder stellen, liefert dieses Buch mögliche Antworten, ergänzt durch bewährte Ansätze aus der Praxis.Manfred Baumgartner, Martin Klonk, Helmut Pichler, Richard Seidl und Siegfried Tanczos sind seit langer Zeit im Bereich des Software-Tests tätig. In den letzten Jahren hatten sie die Chance, immer mehr agile Projekte aus den unterschiedlichsten Branchen kennenzulernen und zu begleiten. So treffen hier Erfahrungen aus der Telekommunikations-, Medizintechnik-, Banken-, Energieversorger- und Luftfahrtbranche aufeinander.Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten Buches Manfred Baumgartner ist seit Beginn seiner beruflichen Laufbahn im Bereich der Software-Qualitätssicherung tätig und arbeitet als Berater bei der Nagarro GmbH in Wien.Christian Mastnak leitet die globale „Agile Testing Practice“ von Nagarro und implementiert innovative QA-Lösungen für internationale Kunden mit besonderen Ansprüchen an Agilität und Effizienz.Richard Seidl ist seit über 20 Jahren als Softwaretest-Experte und Agile Quality Coach in Deutschland und Österreich tätig.Leseprobe (PDF-Link)

Regulärer Preis: 44,99 €
Produktbild für Angular for Business

Angular for Business

Written from author Michael D. Callaghan's personal experience teaching Angular to web development teams, this book will serve as a practical guide to help you adopt Angular for your organization.This book consists of a series of essays related to Angular development, adoption, and the wider eco-system designed to appeal to experienced web developers and managers who have some experience with Angular and are looking to adopt and integrate it into their business for their web development projects.You'll begin with an introduction to Angular15, along with associated frameworks and tools such as Typescript, Firebase RxJS and Docker. You'll then explore Angular components, progressive Web Apps (PWA’s) APIs, Test-driven development, testing, security and the basics of agile project management. This includes how to train your team and effectively communicate with management and key stake-holders within your organization while transitioning onto an Angular workflow.WHAT YOU'LL LEARN* Advocate for Angular from within your organization * Create a simple "no-code" Angular component* Keep up with Angular releases for enterprise projects * Understand service APIs from both the producer and consumer point of view* Test APIs quickly and using Firebase* Implement the basics of agile project managementWHO THIS BOOK IS FORExperienced web developers and managers with some knowledge of Angular and the related JavaScript eco-system who are looking at adopting Angular for enterprise projects and those who need to get co-workers up to speed with an Angular-based workflow.MICHAEL D. CALLAGHAN is a software developer and tech lead with more than twenty years’ experience, primarily in Microsoft and Linux environments, the past 10 years of which has been spent assembling, mentoring, and leading development teams. Most recently specialized in designing and leading the development of web-based and mobile applications, utilizing light-weight components and open frameworks, using Agile, test-driven methodologies.PART I:CORE CONCEPTS.- 1: A Gentle Introduction to Angular.- 2: A Brief Introduction to Typescript.- 3: Angular CLI Quick Reference.- 4: Making a Simple Angular Component.- 5: Offline Networks.- 6: Custom Angular Checkboxes with [(ngModel)] Support.- 7: Error Handling Strategies for Handling Data 8: Upgrading Angular.- 9: Understanding Service API’s.- 10: Deploy with Azure with ng Deploy.- 11: Hosting an API.- 12: Progressive Web Applications (PWAs).- 13: RxJS: To Use or Not to Use?.- PART II: TESTING AND DEBUGGING.- 14: Test-Driven Development with Angular.- 15: Unit Testing Strategies.- 16: Debugging with Docker Containers.- PART III: THE COMMAND LINE.- 17: What Do All Those Symbols Mean?.- PART IV: SOURCE CONTROL.- 18: Fixing Broken Git Commits.- 19: Archiving Your Git Repositories.- PART V: COMMUNICATION AND TRAINING.- 20: How We Learn and Teach.- 21: Slow Down to be Noticed.- 22: Watch Your Language.- 23: Agile Planning and Management with Trello.- PART VI: OTHER TOPICS.- 24: Automate Screenshots with Protractor.- 25: Image Repositories.

Regulärer Preis: 52,99 €
Produktbild für Deep Dive into Power Automate

Deep Dive into Power Automate

Understand the basics of flow and learn how to implement guidelines in real-life scenarios, including Robotic Process Automation (RPA) capabilities. This book covers the evolution of flow and how it is transformed to a full-fledged RPA (such as Power Automate).The book starts with an introduction to flow and its transformation to Process Automation. You will learn how to create a Power Automate environment and demonstrate different types of flows within it. Author Goloknath Mishra takes you through various types of cloud flows and their best practices. Desktop Flows (RPA) or Power Automate Desktop (PAD) is discussed and the author teaches you its architecture, installation steps, and how to manage, schedule, and share a desktop. You will learn about Business Process Flow, Process Advisors, and AI Builder. You also will go through licensing considerations in Power Automate and AI Builder, and demonstrate all of your learnings through a mini project.After reading the book, you will have gained expertise in Power Automate and be able to implement its guidelines and solve problems at your organization.WHAT WILL YOU LEARN* Know the difference between Intelligent Process Automation (IPA) and Robotic Process Automation (RPA)* Understand the different types of flows in Power Automate* Create various types of cloud flows, Desktop flows, Business Process flows, and AI Builder models* Study common use cases and be aware of Power Automate best practicesWHO THIS BOOK IS FORBusiness executives, citizen developers, IT professionals, and computer scientists who wish to efficiently automate monotonous workGOLOKNATH MISHRA is a Microsoft Most Valuable Professional (MVP), Microsoft Certified Trainer (MCT), and a Power Platform Solution Architect Expert with over 14 years of experience in digital transformation using Microsoft Tech Stack as an enabler. He has worked with various organizations in different domains and is currently associated with NCS Group, Singapore as Senior IT Architect.During his tenure of work, he was involved in enterprise solution architecture and design, delivery management (Scaled Agile, Agile and Waterfall), pre-sales, project management, client consulting and business analysis.He is active in the tech community and participates in different Microsoft programs. He is an instructor, speaker, blogger, and YouTuber. He runs the Microsoft User Group in Singapore and Odisha focusing on Microsoft Dynamics 365 and Power Platform. He is also one of the founding members of #PowerPlatformClassmates.

Regulärer Preis: 56,99 €
Produktbild für Hardware and Software Projects Troubleshooting

Hardware and Software Projects Troubleshooting

Learn how to create good requirements when designing hardware and software systems. While this book emphasizes writing traditional “shall” statements, it also provides guidance on use case design and creating user stories in support of agile methodologies. The book surveys modelling techniques and various tools that support requirements collection and analysis. You’ll learn to manage requirements, including discussions of document types and digital approaches using spreadsheets, generic databases, and dedicated requirements tools. Good, clear examples are presented, many related to real-world work the author has performed during his career. More importantly, you will learn how these techniques can prevent the problems that occur during requirements development. Most of all, you will learn how good requirements governance will greatly increase the success of development projects by getting all people involved to eliminate the adverse impacts to requirements throughout the development lifecycle.Hardware and Software Projects Troubleshooting covers techniques for defining user needs, so you can determine which combination of approaches to use for your projects. You’ll also learn how to analyze the different development methodologies so that you can determine the advantages and disadvantages of different requirements approaches and implement them correctly as your needs evolve. Unlike most requirements books, this one teaches writing both hardware and software requirements because many projects include both areas. To exemplify this approach, two example projects are developed throughout the book, one focusing on hardware, and the other on software.WHAT YOU WILL LEARN* Focus on how to eliminate or mitigate requirements problems* Understand the 14 techniques for capturing all requirements* Address software and hardware needs; because most projects involve both* Ensure all statements meet the 16 attributes of a good requirement* Differentiate the 19 different functional types of requirements, and the 31 non-functional types* Write requirements properly based on extensive examples of good ‘shall’ statements, user stories, and use cases* Employ modelling techniques to mitigate the imprecision of words* Install requirements governance to significantly improve project successWHO THIS BOOK IS FORRequirements engineers who want to improve and master their craft, as well as students and those employed in government or other organizations at all levels. GEORGE KOELSCH was a systems engineer who retired to West Virginia. He started writing requirements 47 years ago while in the US Army and had continued that work for his last 33 years as a contractor for the Federal Government. He became an efficiency expert during a five-year stint as an Industrial Engineer at Michelin Tire Corporation, and he then applied that new skill to system engineering to tailor the lifecycle development process. He was among the first requirement engineers in the DC metro area to employ such a technique. Koelsch has authored more than ten non-fiction articles on computers, coin collecting, stamp collecting, and high-energy physics. This is the second time he has combined his two passions, system engineering and writing.

Regulärer Preis: 49,99 €
Produktbild für Wärmepumpen - Grundlagen, Planung, Betrieb

Wärmepumpen - Grundlagen, Planung, Betrieb

Modernes Heizen für die Zukunft. Jetzt erhältlich im heise shop, Dezember 2023.Muss Ihre Gas- oder Öl-Heizung ersetzt werden? Was tun bei einem Neubau? Und brauchen Sie unbedingt eine PV-Anlage auf dem Dach, die den nötigen Strom produziert? Wenn Sie ein Haus besitzen oder einen Neubau planen, müssen Sie sich mit diesen Fragen beschäftigen – oder der nächste Winter wird ziemlich kalt. Fachleute sind sich einig: der Wärmepumpe gehört die Zukunft. Michael Kofler und Tobias Otta geben Ihnen einen Überblick zu allen Fragen rund um das Heizen mit einer Wärmepumpe. Sie erläutern verständlich, worauf Sie bei der Planung achten müssen. So verstehen Sie die Technik und können anhand von zahlreichen Beispielszenarien die richtige Entscheidung für Ihr Zuhause treffen. Aus dem Inhalt:Von der fossilen Heizung zur WärmepumpeGrundlagen und FunktionsweiseIntegration in die HeizungsanlageBrauchwasserwärmepumpenKühlen mit der WärmepumpeFörderungen, Gesetze, BetriebPhotovoltaikBeispielszenarien mit Kosten-/NutzenrechnungenDie Autoren:Michael Kofler hat Elektrotechnik studiert und beschäftigt sich seit Jahren intensiv mit allen Themen rund um die private Energie- und Wärmewende.Ob privat mit dem Lastenrad zum Kindergarten oder seit 15 Jahren als Ingenieur in der Heizungsbranche: Tobias Otta steht für die Energiewende und einen nachhaltigen Lebensstil.

Regulärer Preis: 39,90 €
Produktbild für KI 2.023 Die Evolution des Denkens

KI 2.023 Die Evolution des Denkens

Künstliche Intelligenz hält immer mehr Einzug in unser tägliches Leben. Dabei ist es ein viel diskutiertes Thema mit den unterschiedlichsten Ansichten und Prognosen. Doch was steckt hinter all dem? Was ist Künstliche Intelligenz? Warum gibt es so viele Anhänger, die eine wundervolle Zukunft erwarten während andere grosse Gefahren sehen?Dieses Buch vertieft die Thematik, zeigt Zusammenhänge auf, liefert die technisch und wissenschaftlichen Hintergründe. Es zeigt einen Überblick über die gegenwärtige Situation und gibt Prognosen für die künftige Entwicklung. Welche Auswirkungen sind für die Gesellschaft zu erwarten und wie ändert sich unser Alltag? Und es zeigt auf, wie mittels der Künstlichen Intelligenz eine Veränderung, die Evolution des Denkens stattfindet.Dipl. Ing Uwe Irmer:Dipl. Ing. Uwe Irmer studierte Elektrotechnik und Wirtschaftsingenieur mit den Schwerpunkten Energietechnik, Informatik und Projektmanagement. Seit 1990 in vielen nationalen und internationalen Projekten der Fachbereiche Energieverteilung, Informationssicherheit und IT Architektur tätig, befasst er sich seit 1992 mit dem Thema Informationssicherheit und forscht auf den Gebieten Projektmanagement, Informationssicherheit, IT Forensics, Künstliche Intelligenz und Cloud Technologie.

Regulärer Preis: 54,99 €
Produktbild für Hacking und Cyber Security mit KI

Hacking und Cyber Security mit KI

Erforschen Sie die faszinierende Welt der Cyber-Sicherheit! Das umfassende Buch für Einsteiger und Interessierte. Cyber-Sicherheit ist heute relevanter denn je. Die heutige Zeit erfordert ein tiefes Verständnis für Cyber-Sicherheit. Das Buch „Hacking und Cyber Security mit KI“ begleitet Sie auf Ihrer Reise, um die Grundlagen zu verstehen und sich vor modernen digitalen Bedrohungen zu schützen. Lernen Sie von einem Experten: Der Autor Florian Dalwigk hat umfassende Erfahrung im Bereich der Informatik. Nach einem dualen Informatik-Studium bei der Landeshauptstadt München sowie in der IT-Abteilung eines Krankenhauses und einer Behörde hat er sich als renommierter Sicherheitsforscher etabliert. Mit über 90.000 Abonnenten auf seinem YouTube-Kanal ist er eine prominente Figur in der IT-Community. Schritt für Schritt zur Cyber-Sicherheit: In diesem Buch werden komplexe Themen der Cyber-Sicherheit verständlich erklärt. Von KI-gestützten Angriffen von Hackern bis hin zur Erkennung von Phishing-Mails. Angriffe auf KI-Modelle und darauf basierende Anwendungen werden aufgedeckt – von Prompt-Injection bis Model Stealing. Sie erhalten eine klare Einführung in das aufstrebende Gebiet des Prompt-Engineering, das Ihnen ermöglicht, Hacking-Tools wie gobuster, hydra, fcrackzip und Passwort-Cracker zu beherrschen und anzupassen.Dieses Buch ist nicht nur ideal für Einsteiger, es ist auch eine wertvolle Ressource für Technologie-Enthusiasten und Sicherheitsinteressierte. Ihre Vorteile auf einen Blick: Klar strukturiert: Perfekt für Einsteiger, um sich Schritt für Schritt in die Welt der Cyber-Sicherheit einzufinden. Verständliche Erklärungen: Komplexe Konzepte werden verständlich dargestellt, begleitet von anschaulichen Beispielen. Umfassende Einsichten: Von KI-gestützten Angriffen bis zum Prompt-Engineering, hier finden Sie alle Werkzeuge, die Sie benötigen. Expertenwissen: Florian Dalwigk, ein angesehener Sicherheitsforscher, teilt sein fundiertes Wissen mit Ihnen. Digitale Kompetenz: Tauchen Sie ein und entdecken Sie, wie Sie die Welt der Cyber-Sicherheit beherrschen können. Sparen Sie sich teure Kurse und verbessern Sie Ihre Kenntnisse von digitaler Sicherheit bequem von Zuhause aus. Machen Sie sich bereit für ein Abenteuer in der Cyberwelt und bestellen Sie jetzt „Hacking und Cyber Security mit KI“ von Florian Dalwigk.Florian André Dalwigk ist Informatiker. Bereits während seines Studiums hat er Studenten in zahlreichen Tutorien geholfen. Nach seinem Studium der Informatik hat er in der IT eines großen Kankenhauses und bei einer Bundesbehörde gearbeitet. Sein fachlicher Schwerpunkt liegt in den Bereichen "IT Sicherheit" und "Datenanalyse". Seit April 2022 ist er als freiberuflicher Autor, YouTuber und Video-Journalist tätig.

Regulärer Preis: 9,99 €
Produktbild für Konzeption eines IT-basierten Entscheidungsunterstützungssystems für die Gestaltung dezentraler Datenhaltungen in analytischen Informationssystemen

Konzeption eines IT-basierten Entscheidungsunterstützungssystems für die Gestaltung dezentraler Datenhaltungen in analytischen Informationssystemen

Der steigende Stellenwert von Daten als Ressource und die zunehmende Ausweitung des Aufgabenspektrums der IT-basierten Entscheidungsunterstützung verändern die logischen Architekturen analytischer Informationssysteme. Insbesondere die Datenhaltungen entwickeln sich vermehrt von zentralen Konstrukten hin zu dezentralen Konglomeraten verschiedenster Speicheransätze. Die zunehmend heterogenen Technologien und die häufig unzureichenden Erfahrungen mit neuartigen Konzepten erhöhen die Komplexität in der Planung und dem Betrieb analytischer Systemlandschaften. Das Ziel dieser Arbeit ist daher die Konzeption eines IT-basierten Entscheidungsunterstützungssystems für die Gestaltung dezentraler Datenhaltungen in analytischen Informationssystemen. Es wird ein Fachkonzept für die Überführung von Architekturansätzen aus realen Umgebungen in abstrahierte Architekturmuster sowie für die fallspezifische Ableitung von Handlungsempfehlungen entwickelt, prototypisch als Software-Werkzeug implementiert und evaluiert. Das hierbei entwickelte Verständnis eines Architekturmusters ermöglicht durch die Kombination von fachlichen-orientierten analytischen Capabilitites und technischen Aspekten eine ganzheitliche und systematische Unterstützung von IT-Architekturentscheidungen.   Der Autor Julian Ereth ist als Forscher im Themenbereich Business Intelligence & Analytics (BIA) aktiv. Darüber hinaus ist er als Solution Architect beratend in der freien Wirtschaft tätig. Der steigende Stellenwert von Daten als Ressource und die zunehmende Ausweitung des Aufgabenspektrums der IT-basierten Entscheidungsunterstützung verändern die logischen Architekturen analytischer Informationssysteme. Insbesondere die Datenhaltungen entwickeln sich vermehrt von zentralen Konstrukten hin zu dezentralen Konglomeraten verschiedenster Speicheransätze. Die zunehmend heterogenen Technologien und die häufig unzureichenden Erfahrungen mit neuartigen Konzepten erhöhen die Komplexität in der Planung und dem Betrieb analytischer Systemlandschaften. Das Ziel dieser Arbeit ist daher die Konzeption eines IT-basierten Entscheidungsunterstützungssystems für die Gestaltung dezentraler Datenhaltungen in analytischen Informationssystemen. Es wird ein Fachkonzept für die Überführung von Architekturansätzen aus realen Umgebungen in abstrahierte Architekturmuster sowie für die fallspezifische Ableitung von Handlungsempfehlungen entwickelt, prototypisch als Software-Werkzeug implementiertund evaluiert. Das hierbei entwickelte Verständnis eines Architekturmusters ermöglicht durch die Kombination von fachlichen-orientierten analytischen Capabilitites und technischen Aspekten eine ganzheitliche und systematische Unterstützung von IT-Architekturentscheidungen. Einleitung.- Grundlagen und Bezugsrahmen.- Empirische Exploration.- Entwicklung eines Fachkonzepts.- Prototypische Umsetzung und Evaluation.- Schlussbetrachtung.- Literaturverzeichnis. Julian Ereth ist als Forscher im Themenbereich Business Intelligence & Analytics (BIA) aktiv. Darüber hinaus ist er als Solution Architect beratend in der freien Wirtschaft tätig.  

Regulärer Preis: 49,99 €
Produktbild für The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry

The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry

THE POWER OF ARTIFICIAL INTELLIGENCE FOR THE NEXT-GENERATION OIL AND GAS INDUSTRYCOMPREHENSIVE RESOURCE DESCRIBING HOW OPERATIONS, OUTPUTS, AND OFFERINGS OF THE OIL AND GAS INDUSTRY CAN IMPROVE VIA ADVANCEMENTS IN AIThe Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry describes the proven and promising digital technologies and tools available to empower the oil and gas industry to be future-ready. It shows how the widely reported limitations of the oil and gas industry are being nullified through the application of breakthrough digital technologies and how the convergence of digital technologies helps create new possibilities and opportunities to take this industry to its next level. The text demonstrates how scores of proven digital technologies, especially in AI, are useful in elegantly fulfilling complicated requirements such as process optimization, automation and orchestration, real-time data analytics, productivity improvement, employee safety, predictive maintenance, yield prediction, and accurate asset management for the oil and gas industry. The text differentiates and delivers sophisticated use cases for the various stakeholders, providing easy-to-understand information to accurately utilize proven technologies towards achieving real and sustainable industry transformation. The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry includes information on:* How various machine and deep learning (ML/DL) algorithms, the prime modules of AI, empower AI systems to deliver on their promises and potential* Key use cases of computer vision (CV) and natural language processing (NLP) as they relate to the oil and gas industry* Smart leverage of AI, the Industrial Internet of Things (IIoT), cyber physical systems, and 5G communication* Event-driven architecture (EDA), microservices architecture (MSA), blockchain for data and device security, and digital twinsClearly expounding how the power of AI and other allied technologies can be meticulously leveraged by the oil and gas industry, The Power of Artificial Intelligence for the Next-Generation Oil and Gas Industry is an essential resource for students, scholars, IT professionals, and business leaders in many different intersecting fields. PETHURU RAJ CHELLIAH, PHD, is the Vice President and Chief Architect at Reliance Jio Platforms Ltd. In Bangalore, India. VENKATRAMAN JAYASANKAR is the Lead Solutions Architect (Upstream) at a leading oil and gas company. MATS AGERSTAM is a Principal Engineer at Intel’s Network and Edge Group, Portland, Oregon, USA. B. SUNDARAVADIVAZHAGAN, PHD, is a Professor with the Department of Information Technology at the University of Technology and Applied Sciences Al Mussanah, Oman. ROBIN CYRIAC, PHD, is a Professor with the Department of Information Technology at the University of Technology and Applied Sciences Al Mussanah, Oman. About the Authors xxiiiForeword xxvPreface xxvii1 A PERSPECTIVE OF THE OIL AND GAS INDUSTRY 11.1 Exploration and Production 21.2 Midstream Transportation 41.3 Downstream–Refining and Marketing 61.4 Meaning of Different Terms of Products Produced by the Oil and Gas Industry 71.5 Oil and Gas Pricing 161.6 A Note on Renewable Energy Sources 171.7 Environmental Impact 201.8 Uses of Hydrogen 202 ARTIFICIAL INTELLIGENCE (AI) FOR THE FUTURE OF THE OIL AND GAS (O&G) INDUSTRY 232.1 Introduction 232.2 The Emergence of Digitization Technologies and Tools 242.3 Demystifying Digitalization Technologies and Tools 252.4 Briefing the Potentials of Artificial Intelligence (AI) 252.5 AI for the Oil and Gas (O&G) Industry 272.6 Computer Vision (CV)-Enabled Use Cases 342.7 Natural Language Processing (NLP) Use Cases 362.8 Robots in the Oil and Gas Industry 362.9 Drones in the Oil and Gas Industry 372.10 AI Applications for the Oil and Gas (O&G) Industry 392.11 Better Decision-Making Using AI 412.12 Cloud AI vs. Edge AI for the Oil and Gas Industry 442.13 AI Model Optimization Techniques 472.14 Conclusion 483 ARTIFICIAL INTELLIGENCE FOR SOPHISTICATED APPLICATIONS IN THE OIL AND GAS INDUSTRY 513.1 Introduction 513.2 Oil and Gas Industry 523.3 Artificial Intelligence 543.4 Lifecycle of Oil and Gas Industry 543.5 Applications of AI in Oil and Gas industry 563.6 Chatbots 563.7 Optimized Procurement 593.8 Drilling, Production, and Reservoir Management 613.9 Inventory Management 623.10 Well Monitoring 643.11 Process Excellence and Automation 643.12 Asset Tracking and Maintenance/Digital Twins 653.13 Optimizing Production and Scheduling 673.14 Emission Tracking 683.15 Logistics Network Optimizations 693.16 Conclusion 704 DEMYSTIFYING THE OIL AND GAS EXPLORATION AND EXTRACTION PROCESS 734.1 Process of Crude Oil Formation 734.2 Composition of Crude Oil 744.3 Crude Oil Classification 744.4 Crude Oil Production Process 764.5 Oil Exploration 774.6 Oil Extraction 784.7 Processing of Crude Oil 814.8 Overview of Refining 884.9 Marketing and Distribution of Oil and Gas 924.10 End of Production 934.11 Factors Influencing the Timing of Oil and Gas Exploration and Production 934.12 Non-revenue Benefits of the Oil and Gas Industry 954.13 Conclusion 955 EXPLAINING THE MIDSTREAM ACTIVITIES IN THE OIL AND GAS DOMAIN 975.1 Introduction 975.2 Role of Midstream Sector in Oil and Gas Industry 985.3 Midstream Oil and Gas Operations 995.4 Technological Advancements in Midstream Sector 1045.5 Midstream Sector Challenges 1115.6 Conclusion 1146 THE SIGNIFICANCE OF THE INDUSTRIAL INTERNET OF THINGS (IIOT) FOR THE OIL AND GAS SPACE 1176.1 Overview of IIoT 1176.2 Technical Innovators of Industrial Internet 1256.3 IoT for Oil and Gas Sector 1276.4 Rebellion of IoT in the Oil and Gas Sector 1326.5 Oil and Gas Remote Monitoring Systems 1366.6 Advantages of IIOT for the Oil and Gas Industry 1426.7 Conclusion 1447 THE POWER OF EDGE AI TECHNOLOGIES FOR REAL-TIME USE CASES IN THE OIL AND GAS DOMAIN 1477.1 Introduction 1477.2 Demystifying the Paradigm of Artificial Intelligence (AI) 1487.3 Describing the Phenomenon of Edge Computing 1497.4 Delineating Edge Computing Advantages 1517.5 Demarcating the Move Toward Edge AI 1547.6 Why Edge AI Gains Momentum? 1557.7 The Enablers of Edge AI 1607.8 5G-Advanced Communication 1607.9 Why Edge AI is Being Pursued with Alacrity? 1647.10 Edge AI Frameworks and Accelerators 1657.11 Conclusion 1758 AI-ENABLED ROBOTS FOR AUTOMATING OIL AND GAS OPERATIONS 1778.1 Briefing the Impending Digital Era 1778.2 Depicting the Digital Power 1788.3 Robotics: The Use Cases 1818.4 Real-Life Examples of Robotic Solutions in the Oil and Gas Industry 1848.5 The Advantages of Robotic Solutions 1908.6 The Dawn of the Internet of Robotic Things 1948.7 Conclusion 1979 AI-EMPOWERED DRONES FOR VERSATILE OIL AND GAS USE CASES 1999.1 Introduction 1999.2 The Upstream Process 2009.3 The Midstream Process 2019.4 The Downstream Process 2029.5 Navigation Technologies for Drones 2029.6 Drones Specialities and Successes 2069.7 The Emergence of State-of-the-Art Drones 2099.8 Drones in the Oil and Gas Industry 2159.9 AI-Enabled Drone Services 2179.10 AI Platforms for Drones 2199.11 Conclusion 22210 THE IMPORTANCE OF ARTIFICIAL INTELLIGENCE FOR THE OIL AND GAS INDUSTRY 22410.1 Introduction 22410.2 Reducing Well/Equipment Downtime 22510.3 Optimizing Production and Scheduling 22810.4 Detecting Anomalies by Enabling Automation in Assets using Robots 23010.5 Inspection and Cleanliness of Reactors, Heat Exchangers, and Its Components 23310.6 AI-Enabled Training and Safety 23410.7 Summary 23411 ILLUSTRATING THE 5G COMMUNICATION CAPABILITIES FOR THE FUTURE OF THE OIL AND GAS INDUSTRY 23711.1 Introduction to 5G Communication 23711.2 5G Architecture 24311.3 Antennas For 5G 24611.4 5G Use Cases 24711.5 5G and Digitalization in Oil and Gas 25211.6 5G Smart Monitoring Instruments 25911.7 Conclusion 26012 DELINEATING THE CLOUD AND EDGE-NATIVE TECHNOLOGIES FOR INTELLIGENT OIL AND GAS SYSTEMS 26312.1 Introduction 26312.2 Cloud Native Technologies – Motivation 26412.3 Containers 26512.4 Microservices 26812.5 Continuous Integration, Continuous Deployment (CI/CD) 27412.6 Edge Computing 27712.7 Conclusion 29213 EXPLAINING THE INDUSTRIAL IOT STANDARDIZATION EFFORTS TOWARD INTEROPERABILITY 29313.1 Introduction 29313.2 Different Aspects of Interoperability 29313.3 ISA95 29413.4 SCADA (Supervisory Control and Data Acquisition) 29613.5 The Choice of Network Technology 29613.6 OPAF 30213.7 OPC-UA 30513.8 DDS 31013.9 Integration with Telemetry and Big Data 31113.10 IEC Standards used in the OPAF 31113.11 RedFish 31213.12 The FieldComm Group 31414 DIGITAL TWINS FOR THE DIGITALLY TRANSFORMED O&G INDUSTRY 31614.1 Digital Twins (DTs) 31614.2 Digital Twins in Manufacturing 31614.3 Digital Twins in Process Efficiency 31714.4 Digital Twins and Quality Assurance 31714.5 Digital Twins and Supply Chain 31714.6 Digital Twins and Predictive Maintenance 31714.7 Industry 4.0 31814.8 Digital Twin Concept 31914.9 Standards and Interoperability 32014.10 IDTA Standard 32114.11 Digital Twin Consortium 32214.12 Digital Twin in O&G 32214.13 DT Complexity and Trade-offs 32314.14 Architectural Concepts 32314.15 Simulations 32414.16 Digital Twins vs. Simulations 32714.17 Digital Twin Products 32814.18 Digital Twins and Manufacturing in the Future 32915 IOT EDGE SECURITY METHODS FOR SECURE AND SAFE OIL AND GAS ENVIRONMENTS 33115.1 Introduction 33115.2 Protecting Data 33215.3 Past Examples of Security Attacks 33215.4 Security Foundation 33415.5 Cryptographic Hash Function 33715.6 Keyed Hash Message Authentication Code 33815.7 Public Key Infrastructure (PKI) 33815.8 Digital Signatures 34015.9 Threat Analysis and Understanding Adversaries 34115.10 Trusted Computing Base 34215.11 Edge Security and RoT (Root of Trust) 34215.12 DICE – Device Identifier Composition Engine 34315.13 Boot Integrity 34315.14 Data Sanitization 34515.15 Total Memory Encryption 34615.16 Secure Device Onboarding 34715.17 Attestation 35015.18 Defense in Depth 35215.19 Zero Trust Architecture (ZTA) 35415.20 Security Hardened Edge Compute Architectures 35416 SECURING THE ENERGY INDUSTRY WITH AI-POWERED CYBERSECURITY SOLUTIONS 35616.1 Introduction 35616.2 Energy Industry 35716.3 Present and Future of Energy Industry Supply Chain 35916.4 Cybersecurity 36116.5 Digitizing of the Energy Industry 36416.6 MITRE ATT&CK Framework 36716.7 CVE 36816.8 CWE 37016.9 CAPEC 37016.10 CPE 37016.11 Cybersecurity Framework 37016.12 NIST Framework 37116.13 Zero-Day Vulnerability 37216.14 Machine Learning 37316.15 Artificial Intelligence 37416.16 Fusing AI into Cybersecurity 37516.17 Threat Modeling in AI 37916.18 Incident Response 38216.19 Fire Sale Scenario 38316.20 Conclusion 38417 EXPLAINABLE ARTIFICIAL INTELLIGENCE (XAI) FOR THE TRUST AND TRANSPARENCY OF THE OIL AND GAS SYSTEMS 38717.1 Introduction 38717.2 The Growing Power of Artificial Intelligence 38817.3 The Challenges and Concerns of Artificial Intelligence 39017.4 About the Need for AI Explainability 39117.5 AI Explainability: The Problem It Solves 39217.6 What is the AI Explainability Challenges? 39317.7 The Importance of Explainable AI 39317.8 The Importance of Model Interpretation 39617.9 Briefing Feature Importance Scoring Methods 40117.10 Local Interpretable Model-agnostic Explanations (LIME) 40217.11 SHAP Explainability Algorithm 40417.12 Conclusion 40718 BLOCKCHAIN FOR ENHANCED EFFICIENCY, TRUST, AND TRANSPARENCY IN THE OIL AND GAS DOMAIN 40918.1 Introduction 40918.2 The Brewing Challenges of the Oil and Gas Industry 41018.3 About the Blockchain Technology 41318.4 Blockchain-Powered Use Cases for the Oil and Gas Industry 41518.5 Blockchain for Improved Trust 41618.6 Sensor-Enabled Invoicing 41718.7 Transportation Tracing 41818.8 Data Storage and Management 41918.9 Digital Oil and Gas: Strengthening and Simplifying Supply Chain 41918.10 Commodity Trading 42118.11 Land Record Management 42118.12 Financial Reconciliation 42218.13 Oil Wells and Equipment Maintenance 42318.14 Waste Management and Recycling 42318.15 Tracking Carbon Footprint 42418.16 Improved Pipeline Inspection 42418.17 Other Miscellaneous Advantages of Blockchain 42518.18 Blockchain Challenges 42518.19 Conclusion 42619 AI-INSPIRED DIGITAL TWINS FOR THE OIL AND GAS DOMAIN 42819.1 How to Ensure Certainty Using DT for AI 43219.2 Tools Needed to Develop Digital Twins 43419.3 Digital Twin Implementation Approach at a High Level 43419.4 Digital Twin of Oil and Gas Production 44119.5 Solution Approach 44219.6 Future of Digital Twins 44320 FUTURE DIRECTIONS OF GREEN HYDROGEN AND OTHER FUELING SOURCES 44720.1 Introduction 44720.2 Green Hydrogen Technologies 44820.3 Current and Future Industrial Applications of Hydrogen 44920.4 The Exploitation of Hydrogen Fuel in a Future System 45020.5 Green Hydrogen: Fuel of the Future 45120.6 Extraction of Hydrogen with Diagrammatic Representation 45320.7 Hydrogen Fuel System Advantages and Disadvantages 45420.8 AI-Based Approach for Emerging Green Hydrogen Technologies for Sustainability 45520.9 Challenges of Hydrogen with AI Technologies 45820.10 The Expected Use and Forecast for Hydrogen Fuel Cells in the Future 45820.11 Conclusion 459Bibliography 460Index 461

Regulärer Preis: 107,99 €
Produktbild für The Ultimate Guide to Functions in Power Query

The Ultimate Guide to Functions in Power Query

This book is a complete guide to using functions in Power Query and is designed to help users of all skill levels learn and master its various functions.The Ultimate Guide to Functions in Power Query begins with an introduction to Power Query and an overview of the different types of functions available, along with detailed explanations of how to use each of them. You’ll see how to leverage power functions to process and transform large datasets from various sources and learn advanced techniques such as creating custom functions and using conditional statements. The book also covers best practices for using functions, including tips on how to optimize query performance and troubleshoot common errors. Using practical example applications, Author Omid Motamedisedeh demonstrates how to optimize your data processing workflows, saving time and boosting productivity.By the end of the book, readers will have a deep understanding of Power Query functions and be able to apply their knowledge to a wide range of data analysis tasks.WHAT YOU WILL LEARN* Master the fundamentals of Power Query, including how to load and transform data from various sources* Understand all the functions available in Power Query, including text, date/time, logical, numeric, and more* Use functions to transform data and perform complex calculations* Employ advanced techniques such as custom functions, conditional statements, and working with parameters* Optimize query performance, handle errors, and use the M language effectively* Use real-world examples and exercises to hone your skills and gain practical experience with the toolWHO THIS BOOK IS FORAnyone who wants to learn how to use functions in Power Query to transform and analyze data. This includes data analysts, business analysts, Excel users, and data scientists. Readers should have a basic understanding of Excel and data analysis concepts, but may be new to Power Query and functions.OMID MOTAMEDISEDEH is a freelance data and business intelligence analyst with a PhD in Industrial Engineering. He’s currently working towards his second PhD at Queensland University of Technology. Omid has authored six books in the field of Excel in Farsi, along with several articles in industry journals (Electric Power Systems Research, Journal of Building Engineering, Energy, Neural Computing and Applications, and more). His primary reason for writing his first book in English is the lack of a comprehensive and complete reference for Power Query functions. He decided to fill this gap by writing one himself.Chapter 1: Introduction to Power Query.- Chapter 2: Data Types.- Chapter 3: Number Functions.- Chapter 4: Text Functions.- Chapter 5: Date and Time Functions.- Chapter 6: List Functions.- Chapter 7: Record Functions.- Chapter 8: Table Functions.- Chapter 9: Extracting from Data Sources.- Chapter 10: Other Functions.

Regulärer Preis: 49,99 €
Produktbild für Low-Code Development with Appsmith

Low-Code Development with Appsmith

This book will show you how to harness the power of Appsmith, an open-source low-code platform with a large set of integration tools and an active community.The book begins with an introduction to Appsmith and its features. As you explore the platform, you will learn about widgets, UI Canvas, and data stores, among other things. Authors Rahul Sharma and Rajat Arora then show you how to build customizations and navigation workflows, as well as how to handle error handling, debugging, and troubleshooting with Appsmith. You will also learn efficient monitoring and authentication for deploying production-ready systems. Low-Code Development with AppSmith provides examples, realistic scenarios, and explanations of the tools you'll need to build successful low-code apps, helping you gain practical skills.Upon completing this book, you will be able to use Appsmith to build low-code solutions that suit your business requirements.WHAT YOU WILL LEARN* Understand low-code development and the factors driving its adoption* Solve your business's most pressing issues with Appsmith* Gain an understanding of the key concepts of app development, such as data management, APIs, troubleshooting, and debugging* Model different design patterns for low-code developmentWHO THIS BOOK IS FORAnyone interested in designing technical solutions with minimal programming. This book assumes a basic understanding of object-oriented programming and JavaScript.RAHUL SHARMA is an architect with18 years of experience developing Java/J2EE and Python applications. He has worked in a variety of organizations ranging from enterprises to startups. He has experience with various architectures, including monolith, distributed, Big data, and streaming.RAJAT ARORA is a hands-on programmer with over ten years of experience building software in the fintech domain. He has worked with both monolith and microservices-based architectures using .NET and Java technology stacks. He is currently working as an Engineering Manager.Chapter 1: Introduction to Appsmith.- Chapter 2: Working with the Appsmith Platform.- Chapter 3: Working with Data.- Chapter 4: Building Application Flows.- Chapter 5: Integration with Web Services.- Chapter 6: Access Control.- Chapter 7: Error Handling and Troubleshooting.- Chapter 8: Monitoring Appsmith.- Chapter 9: Implementation Patterns with Appsmith.- Chapter 10: Working with Appsmith Cloud.

Regulärer Preis: 52,99 €
Produktbild für A Beginner's Guide to SSD Firmware

A Beginner's Guide to SSD Firmware

Explore the concepts and techniques that are essential for designing, optimizing, and maintaining SSD (solid state drive) firmware. This book discusses the role of firmware in the functioning of SSDs and the importance of keeping firmware up to date to ensure optimal performance and security.The book starts with an introduction to SSD firmware and its role in SSDs. You will then learn basic NAND operations and common firmware features, followed by various design considerations and best practices for optimizing and maintaining SSD firmware. Moving ahead, you will learn some of the advanced features that are included in modern SSD firmware, such as wear leveling algorithms, garbage collection algorithms, error prevention and correction methods, and algorithms to reduce write amplification. User data flow and exception handling are discussed next, along with performance and debugging. To wrap things up, you will gain insight into possible future developments and innovations in SSD firmware.After reading this book, you will have a solid understanding of the key concepts and techniques that are crucial to designing, optimizing, and maintaining SSD firmware.WHAT WILL YOU LEARN* Understand the fundamentals of NAND flash memory, including its architecture, operation, and limitations* Explore the basics and evolution of firmware, specifically in the context of SSDs* Grasp the basics of firmware, including its purpose, structure, and development process* Survey the specific features of SSD firmware, such as wear leveling, error correction, and garbage collection* Understand performance criteria for SSDs* Master the art of designing a fundamental SSD firmware, encompassing host interfaces and vital requirementsWHO IS THIS BOOK FOR:Engineers involved in designing and developing firmware.GOPI KUPPAN THIRUMALAI is a highly experienced embedded design engineer with a proven track record of success in the industry. He has over 15 years of experience in a variety of domains, including wireless networks, software, automotive, and storage. He is an expert in client and data center SSD design and implementation, and has a history of leading and mentoring teams to achieve their goals.. He is also an outdoor enthusiast and enjoys hiking, fitness, reading books and cooking.1. Introduction to SSD firmware.- 2. Understanding the role of firmware in SSDs.- 3. The history and evolution of SSD firmware.- 4. Basic of Flash Memory.- 5. 3D Vertical NAND.- 6. Basic understanding of NAND Flash Interface.- 7. Common SSD firmware features.- 8. SSD firmware design considerations.- 9. Flash Translation Layer – FTL.- 10. User Data Flow.- 11. Throttling.- 12. Exception Handling.- 13. Performance.- 14. Debugging.- 15. Future developments and innovations in SSD firmware.- 16. Closing.- Bibliography.

Regulärer Preis: 46,99 €
Produktbild für Softwarearchitektur für Dummies

Softwarearchitektur für Dummies

TRAGFÄHIGE LITERATUR FÜR IHRE SOFTWAREARCHITEKTURENBesuchen Sie eine Veranstaltung zu Softwarearchitektur oder stehen Sie in einem Projekt vor Architekturentscheidungen und wollen daher die aktuellen Architekturansätze verstehen? Dann hilft Ihnen dieses Buch. Holger Gast erläutert zunächst die grundlegenden Elemente von Architekturen und führt die technischen Hintergründe aus. Er erklärt Ihnen danach die klassischen Stile und Patterns und geht schließlich auf Cloud-Architekturen ein. Durchgängig legt er den Fokus auf konkrete Softwarestrukturen statt auf Theorie und ermöglicht Ihnen so einen verständlichen und zügigen Einstieg in das Thema. SIE ERFAHREN* Wie Sie Entscheidungen zum Aufbau einer Anwendung treffen* Wann bestimmte Architekturen oder Frameworks für Ihr Projekt geeignet sind* Welche Herausforderungen Sie bei der Erstellung oder Weiterentwicklung einer Anwendung lösen müssenHOLGER GAST studierte in Tübingen Informatik, promo-vierte zu Programmiersprachen und habilitierte sich zur Software-Korrektheit. Seit 2006 gibt er an der Universität Tübingen Vorlesungen und Seminare zu Softwarearchitektur und -design und leitet seit 2014 das Steinbeis-Beratungszentrum Agile-Entwicklung von Informationssystemen.

Regulärer Preis: 24,99 €