Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für How JavaScript Works

How JavaScript Works

JavaScript is a complicated language with a lot of misinformation surrounding how it works. This book provides a comprehensive introduction to JavaScript, from how it works at a technical level to how it is used to create websites and applications. Everything you need to know to start a career in JavaScript development is covered here.How JavaScript Works begins with a practical introduction of the basics before moving into the technical underpinnings of JavaScript, detailing everything you need to know, including variables, memory storage, functions, classes, types, maps, sets and APIs. Once you’ve fully absorbed these key topics. author Jonathan Simpson will show you how to put them into practice, demonstrating how they are employed for modern web development. You’ll learn how to use JavaScript with HTML and CSS to construct web pages and applications, how to change CSS with JavaScript, and how to utilize Fetch and asynchronous operations.Upon completing this book, you will have the foundational knowledge necessary to continue your journey to becoming a professional JavaScript developer.WHAT YOU WILL LEARN:* Gain insight into the technical essentials of JavaScript and how it works* Learn advanced concepts and such as memory storage and how classes, functions and objects actually work* Explore the basic mathematical underpinnings of JavaScript* Understand how JavaScript is used to manipulate HTML and CSS* Obtain the tools and knowledge needed to start your career in web developmentWHO THIS BOOK IS FOR:Anyone interested in a web development career, as well as those who may have already embarked on their careers, but who want to deepen their technical understanding of JavaScript and how it works.JONATHON SIMPSON studied at UCL and is a Product Owner at Revolut and has more than than 12 years of web development experience working on a wide range of products and services. Jonathon also owns and operates a popular software engineering blog focusing on JavaScript.Ch1 Introduction to JavaScript.- Ch2 Variables, Comments, and Logical Statements.- Ch3 Introduction to Objects, Arrays.- Ch4 Loops and Iterables.- Ch5 References, Values, and Memory Management.- Ch6 Functions and Classes.- Ch7 Types.- Ch8 Manipulating and Interacting with HTML.- Ch9 Maps and Sets.- Ch10 Fetching Data, APIs and Promises.- Ch11 Errors and the Console.- Ch12 Maps and Sets.- Ch13 Websockets.- Conclusion.- Appendix.

Regulärer Preis: 39,99 €
Produktbild für Visual Studio Extensibility Development

Visual Studio Extensibility Development

Master Visual Studio extensibility for an enhanced Visual Studio IDE experience. This book is a comprehensive guide that covers every facet of developing, debugging, and publishing extensions that amplify your productivity, tooling, and analysis within the Visual Studio IDE.This new edition is updated for Visual Studio 2022, which is the latest and greatest version of Visual Studio. Since the last edition, Artificial Intelligence (AI) has taken the world by the storm. This revised edition demonstrates how AI can take your extensions to unparalleled heights using ChatGPT.The book begins with an introduction to the essential concepts of Visual Studio, including data structures and design patterns before diving into the fundamentals of the Visual Studio extensibility model. Here you will learn the anatomy of a VSIX and how extensions are discovered and loaded in Visual Studio. Next, you will explore the extensibility model and see how various extensions, such as menus, commands, and tool windows can be plugged into Visual Studio. Moving forward, you’ll cover developing VS extensions and how they can be made configurable by customizing the UI and options page, and you’ll learn to develop a VS extension that leverages ChatGPT. Next, you will see how to extend the most often used component of Visual Studio, the code editor, before creating your own sample code snippets and templates. This is followed by a demonstration of how to deploy extensions using continuous integration (CI). Finally, you will learn tips and tricks for Visual Studio and its extensibility, along with a few highly valuable extensions.After reading Visual Studio Extensibility Development, you will be able to develop, debug, customize, and deploy extensions in Visual Studio IDE.WHAT YOU WILL LEARN* Master the art of personalizing extensions through the creation of dedicated tools option pages* Extend commands, editor, and tool window of Visual Studio* Seamlessly integrate artificial intelligence in Visual Studio extensions* Create project templates, item templates, and code snippets to streamline your development process* Enhance IntelliSense for your custom project needs* Publish your extension in the Visual Studio marketplaceWHO THIS BOOK IS FORDevelopers, Programmers, Engineers, Architects, Instructors, Innovators, Students and Technology enthusiasts leveraging Visual Studio IDE. RISHABH VERMA is a Microsoft certified professional and works at Google India as a Senior Developer Relations Engineer working on Google Cloud C# SDK development. An electronic engineer by education, he has 15+ years of hardcore development experience on the .NET technology stack. He is passionate about creating tools, Visual Studio extensions, and utilities to increase developer productivity. His interests are .NET Compiler Platform (Roslyn), Visual Studio extensibility, code generation and .NET Core. He is a member of .NET foundation, and has authored books on .NET Core 2.0 and .NET Core 3.1 prior to this title.

Regulärer Preis: 54,99 €
Produktbild für Getting Started with Containers in Azure

Getting Started with Containers in Azure

Master the skills needed to deploy container services on Microsoft Azure using Terraform. This book will take you through the entire process of designing, deploying, and managing container services such as Azure Kubernetes Service (AKS), Azure Container Instances (ACI), Azure Container Registry (ACR), and Azure Web App for Containers.In this fully updated second edition, Author Shimon Ifrah demonstrates how to use Terraform, PowerShell and Azure CLI to provision and manage container services in Azure. As you’ll be using Terraform as the main tool for deployment, a basic knowledge of Terraform is a prerequisite. In addition, you will see how Azure DevOps services can be used to deploy infrastructure and container services with Terraform using Azure Pipelines without using the Azure Portal. The book concludes with a tutorial on how to use Azure Defender for Cloud to safeguard Terraform and infrastructure-as-code against malicious threats, so you can deliver secure applications.Upon completing this book, you will have a thorough understanding of how to use Terraform to deploy secure and efficient cloud applications on Azure.WHAT YOU WILL LEARN* Leverage Terraform for the deployment of containerized services* Understand Azure DevOps Pipelines and Repos to deploy infrastructure and container services.* Safeguard your infrastructure-as-code and detect vulnerabilities using Azure Defender for the cloudWHO THIS BOOK IS FORAzure administrators, developers, and architects who want to get started and learn more about containers and containerized applications on Microsoft Azure.SHIMON IFRAH is a Solution Architect, writer, tech blogger, and author with over 15 years of experience in the design, management, and deployment of information technology systems, applications, and networks. In the last decade, Shimon has specialized in cloud computing and containerized applications on Microsoft Azure, Microsoft 365, Azure DevOps, and .NET. Shimon also holds over 20 vendor certificates from Microsoft, AWS, VMware, Oracle, and Cisco. During his career in the IT industry, he has worked for some of the world's largest managed services and technology companies, assisting them in designing and managing systems used by millions of people every day. He is based in Melbourne, Australia.

Regulärer Preis: 62,99 €
Produktbild für Enterprise AI in the Cloud

Enterprise AI in the Cloud

EMBRACE EMERGING AI TRENDS AND INTEGRATE YOUR OPERATIONS WITH CUTTING-EDGE SOLUTIONSEnterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions. If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide. The author shows you how to start an enterprise-wide AI transformation effort, taking you all the way through to implementation, with clearly defined processes, numerous examples, and hands-on exercises. You’ll also discover best practices on optimizing cloud infrastructure for scalability and automation.Enterprise AI in the Cloud helps you gain a solid understanding of:* AI-FIRST STRATEGY: Adopt a comprehensive approach to implementing corporate AI systems in the cloud and at scale, using an AI-First strategy to drive innovation* STATE-OF-THE-ART USE CASES: Learn from emerging AI/ML use cases, such as ChatGPT, VR/AR, blockchain, metaverse, hyper-automation, generative AI, transformer models, Keras, TensorFlow in the cloud, and quantum machine learning* PLATFORM SCALABILITY AND MLOPS (ML OPERATIONS): Select the ideal cloud platform and adopt best practices on optimizing cloud infrastructure for scalability and automation* AWS, AZURE, GOOGLE ML: Understand the machine learning lifecycle, from framing problems to deploying models and beyond, leveraging the full power of Azure, AWS, and Google Cloud platforms* AI-DRIVEN INNOVATION EXCELLENCE: Get practical advice on identifying potential use cases, developing a winning AI strategy and portfolio, and driving an innovation culture* ETHICAL AND TRUSTWORTHY AI MASTERY: Implement Responsible AI by avoiding common risks while maintaining transparency and ethics* SCALING AI ENTERPRISE-WIDE: Scale your AI implementation using Strategic Change Management, AI Maturity Models, AI Center of Excellence, and AI Operating ModelWhether you're a beginner or an experienced AI or MLOps engineer, business or technology leader, or an AI student or enthusiast, this comprehensive resource empowers you to confidently build and use AI models in production, bridging the gap between proof-of-concept projects and real-world AI deployments.With over 300 review questions, 50 hands-on exercises, templates, and hundreds of best practice tips to guide you through every step of the way, this book is a must-read for anyone seeking to accelerate AI transformation across their enterprise.RABI JAY is a recognized IT expert with over 15 years of experience working in roles such as VP of Architecture, Digital Platform Strategy Lead, and Global Alliance Manager at Deloitte Consulting, as well as at HCL America and SapientRazorfish. He has been instrumental in driving large-scale, enterprise-level Cloud and AI transformations across diverse industries like retail, telecom, finance, and tech. He holds sought-after certifications in AWS Machine Learning, AWS Solutions Architect, and Microsoft Azure. You can connect with Rabi through his authoritative LinkedIn newsletter, Enterprise AI Transformation. Introduction xviiPART I: INTRODUCTIONChapter 1: Enterprise Transformation with AI in the Cloud 3Chapter 2: Case Studies of Enterprise AI in the Cloud 19PART II: STRATEGIZING AND ASSESSING FOR AIChapter 3: Addressing the Challenges with Enterprise AI 31Chapter 4: Designing AI Systems Responsibly 41Chapter 5: Envisioning and Aligning Your AI Strategy 50Chapter 6: Developing An AI Strategy and Portfolio 57Chapter 7: Managing Strategic Change 66PART III: PLANNING AND LAUNCHING A PILOT PROJECTChapter 8: Identifying Use Cases for Your AI/ml Project 79Chapter 9: Evaluating AI/ml Platforms and Services 106Chapter 10: Launching Your Pilot Project 152PART IV: BUILDING AND GOVERNING YOUR TEAMChapter 11: Empowering Your People Through Org Change Management 163Chapter 12: Building Your Team 173PART V: SETTING UP INFRASTRUCTURE AND MANAGING OPERATIONSChapter 13: Setting Up An Enterprise AI Cloud Platform Infrastructure 187Chapter 14: Operating Your AI Platform with Mlops Best Practices 217PART VI: PROCESSING DATA AND MODELINGChapter 15: Process Data and Engineer Features in The Cloud 243Chapter 16: Choosing Your AI/ml Algorithms 268Chapter 17: Training, Tuning, and Evaluating Models 315PART VII: DEPLOYING AND MONITORING MODELSChapter 18: Deploying Your Models Into Production 345Chapter 19: Monitoring Models 361Chapter 20: Governing Models for Bias and Ethics 377PART VIII: SCALING AND TRANSFORMING AIChapter 21: Using the AI Maturity Framework to Transform Your Business 391Chapter 22: Setting Up Your AI Coe 407Chapter 23: Building Your AI Operating Model and Transformation Plan 416PART IX: EVOLVING AND MATURING AIChapter 24: Implementing Generative AI Use Cases With Chatgpt for the Enterprise 433Chapter 25: Planning for the Future of AI 465Chapter 26: Continuing Your AI Journey 479Index 485

Regulärer Preis: 46,99 €
Produktbild für Flame Game Development

Flame Game Development

Reimagine your development process and create, test, and deploy your mobile, web, desktop, and embedded apps from a single codebase. This book shows you how to leverage Flame, the modular Flutter game engine, to build cross-platform 2D games.  With Flutter, you can create all kinds of apps by making subtle changes to projects at the code level. Guided by a practical project-based approach, you'll begin by downloading and installing the game engine. You'll then move on to creating widgets in Flutter and components within our game, such as player, enemy, background, consumables, etc. The book also shows you how to add sprites, render images, setup animation, and much more. Flame Game Development is perfect for the novice eager to gain hands-on knowledge of this exciting game engine's library to create a simple 2D game.  What You'll Learn * Apply Flutter coding skills to game development * Developgames that can be played on all platforms * Create your first 2D game using Flame Who This Book Is For Beginners who want to learn how to develop games on Flame and create their first 2D game with Flutter. Chapter 1: Create a Project in Flutter and Add Flame.- Chapter 2: Flame Basics.- Chapter 3: Flame Fundamentals.- Chapter 4: Game One: Meteor Shower.- Chapter 5: Background in Color and Image.- Chapter 6: Tiled Background.- Chapter 7: Game Two, Jump Between Tiles.- Chapter 8: Game Two, Many Experiments.- Chapter 9: Game Three, Move XY.- Chapter 10: Game Three, Enemies.- Chapter 11: Game Four, Plants vs Zombies.- Chapter 12: Game Four, Many Experiments.- Chapter 13: Game Five, Parallax Backgrounds.-Chapter 14: Audio.

Regulärer Preis: 56,99 €
Produktbild für Enterprise AI in the Cloud

Enterprise AI in the Cloud

EMBRACE EMERGING AI TRENDS AND INTEGRATE YOUR OPERATIONS WITH CUTTING-EDGE SOLUTIONSEnterprise AI in the Cloud: A Practical Guide to Deploying End-to-End Machine Learning and ChatGPT Solutions is an indispensable resource for professionals and companies who want to bring new AI technologies like generative AI, ChatGPT, and machine learning (ML) into their suite of cloud-based solutions. If you want to set up AI platforms in the cloud quickly and confidently and drive your business forward with the power of AI, this book is the ultimate go-to guide. The author shows you how to start an enterprise-wide AI transformation effort, taking you all the way through to implementation, with clearly defined processes, numerous examples, and hands-on exercises. You'll also discover best practices on optimizing cloud infrastructure for scalability and automation.Enterprise AI in the Cloud helps you gain a solid understanding of:* AI-FIRST STRATEGY: Adopt a comprehensive approach to implementing corporate AI systems in the cloud and at scale, using an AI-First strategy to drive innovation* STATE-OF-THE-ART USE CASES: Learn from emerging AI/ML use cases, such as ChatGPT, VR/AR, blockchain, metaverse, hyper-automation, generative AI, transformer models, Keras, TensorFlow in the cloud, and quantum machine learning* PLATFORM SCALABILITY AND MLOPS (ML OPERATIONS): Select the ideal cloud platform and adopt best practices on optimizing cloud infrastructure for scalability and automation* AWS, AZURE, GOOGLE ML: Understand the machine learning lifecycle, from framing problems to deploying models and beyond, leveraging the full power of Azure, AWS, and Google Cloud platforms* AI-DRIVEN INNOVATION EXCELLENCE: Get practical advice on identifying potential use cases, developing a winning AI strategy and portfolio, and driving an innovation culture* ETHICAL AND TRUSTWORTHY AI MASTERY: Implement Responsible AI by avoiding common risks while maintaining transparency and ethics* SCALING AI ENTERPRISE-WIDE: Scale your AI implementation using Strategic Change Management, AI Maturity Models, AI Center of Excellence, and AI Operating ModelWhether you're a beginner or an experienced AI or MLOps engineer, business or technology leader, or an AI student or enthusiast, this comprehensive resource empowers you to confidently build and use AI models in production, bridging the gap between proof-of-concept projects and real-world AI deployments.With over 300 review questions, 50 hands-on exercises, templates, and hundreds of best practice tips to guide you through every step of the way, this book is a must-read for anyone seeking to accelerate AI transformation across their enterprise.RABI JAY is a recognized IT expert with over 15 years of experience working in roles such as VP of Architecture, Digital Platform Strategy Lead, and Global Alliance Manager at Deloitte Consulting, as well as at HCL America and SapientRazorfish. He has been instrumental in driving large-scale, enterprise-level Cloud and AI transformations across diverse industries like retail, telecom, finance, and tech. He holds sought-after certifications in AWS Machine Learning, AWS Solutions Architect, and Microsoft Azure. You can connect with Rabi through his authoritative LinkedIn newsletter, Enterprise AI Transformation. Introduction xviiPART I: INTRODUCTIONChapter 1: Enterprise Transformation with AI in the Cloud 3Chapter 2: Case Studies of Enterprise AI in the Cloud 19PART II: STRATEGIZING AND ASSESSING FOR AIChapter 3: Addressing the Challenges with Enterprise AI 31Chapter 4: Designing AI Systems Responsibly 41Chapter 5: Envisioning and Aligning Your AI Strategy 50Chapter 6: Developing An AI Strategy and Portfolio 57Chapter 7: Managing Strategic Change 66PART III: PLANNING AND LAUNCHING A PILOT PROJECTChapter 8: Identifying Use Cases for Your AI/ml Project 79Chapter 9: Evaluating AI/ml Platforms and Services 106Chapter 10: Launching Your Pilot Project 152PART IV: BUILDING AND GOVERNING YOUR TEAMChapter 11: Empowering Your People Through Org Change Management 163Chapter 12: Building Your Team 173PART V: SETTING UP INFRASTRUCTURE AND MANAGING OPERATIONSChapter 13: Setting Up An Enterprise AI Cloud Platform Infrastructure 187Chapter 14: Operating Your AI Platform with Mlops Best Practices 217PART VI: PROCESSING DATA AND MODELINGChapter 15: Process Data and Engineer Features in The Cloud 243Chapter 16: Choosing Your AI/ml Algorithms 268Chapter 17: Training, Tuning, and Evaluating Models 315PART VII: DEPLOYING AND MONITORING MODELSChapter 18: Deploying Your Models Into Production 345Chapter 19: Monitoring Models 361Chapter 20: Governing Models for Bias and Ethics 377PART VIII: SCALING AND TRANSFORMING AIChapter 21: Using the AI Maturity Framework to Transform Your Business 391Chapter 22: Setting Up Your AI Coe 407Chapter 23: Building Your AI Operating Model and Transformation Plan 416PART IX: EVOLVING AND MATURING AIChapter 24: Implementing Generative AI Use Cases With Chatgpt for the Enterprise 433Chapter 25: Planning for the Future of AI 465Chapter 26: Continuing Your AI Journey 479Index 485

Regulärer Preis: 46,99 €
Produktbild für API Management

API Management

APIs are the enablers for a thriving ecosystem that can drive revenue growth and ROIs for any organization. This book will cover all relevant topics and trends that enterprise architects need to know to build and govern APIs as a product.The second edition of the API Management builds on the foundation established in the first edition to cover recent advances in API development as well as the principles and best practices of building API as a product. It has been updated to cover the latest and emerging trends in API architecture, design, and implementation covering the use of gRPC, graphQL, microservices and service mesh to building and manage a scalable API platform. New chapters cover how to build an effective API strategy for digital transformation and implement an API-First architecture to build and deliver APIs as a Product.Any software architect or developer looking to adopt and build APIs for digital transformation and excellence within their organization will find this book to be an invaluable resource.WHAT YOU WILL LEARN* Understand API Management Architecture and Design best practices* How to build an effective API strategy and build APIs as product* How to design, build and test APIs using API-First approach* How to implement API Security* What are the latest API technology trends and adoption across industryWHO THIS BOOK IS FORCxOs, software architects, and developers who are looking to implement APIs within their organization for digital transformation initiatives.Brajesh is Sr. Director with Fresh Gravity, leading their API Management and Integration practice. He has more than 25 years of industry experience specializing in API Management and Cloud Integration space. He has led many large-scale Digital Transformation projects helping enterprises across industries in laying out API First strategy and executed some of them on multi-cloud platforms. . His innovations are patented and granted across four countries in areas like API Assessment and data veracity. He is a Google-certified Cloud Security architect and MIT-certified Application Security Architect. Before Fresh Gravity he worked with Accenture, Apigee, and Wipro as a Global API capability lead, Principal Architect, and Lead integration architect.Chapter 1: Introduction to APIsChapter Goal: This chapter introduces APIs and their importance in today’s digital economy for all digital transformation programs. We look at some of the associated and similar technologies like SOA, iPaas, and Microservices and understand their differences and relationship with API. The second edition will make updates to the examples for popular public APIs, types of APIs, introduction to iPaas platform for APIs, and some ofNo of pages 12 to 15 pagesChapter 2: Introduction to API ManagementChapter Goal: This chapter discusses the need for an API Management platform for an enterprise. It focuses on the capabilities required for an API management platform viz. API Gateway, Developer Portal, and API Analytics. The second edition of the book will highlight the recent advancements and trends in API Management and new capabilities added to API Management platform products.No of pages: 12 to 15 pagesSub - Topics1. API Gateway2. API Developer Portal3. API Analytics4. Service MeshChapter 3: Designing RESTful APIsChapter Goal: This chapter will cover the concepts and best practices for designing RESTful APIs that developer love. It will introduce the audience to the right use of HTTP verbs, HTTP status codes, versioning guidelines, and resource naming conventions for building restful APIs.No of pages : 18 to 20 pagesSub - Topics:1. REST API Design Principles2. API Naming conventions3. HTTP Verbs and Error codes4. API Design Best PracticesChapter 4: API DocumentationChapter Goal: This chapter will discuss the importance of documentation for APIs and the best practices for documenting APIs. It will discuss the various standards out there for documentation and the differences. Advances and differences in API documentation standards like OAS. RAML and Async APIs will be covered. The 2nd edition of the book will introduce the changes in the API document standardsNo of pages:12 to 15 pagesSub - Topics:1. Importance of good API documentation2. Open API Specifications3. RAML4. Async APIsChapter 5: API Architecture PatternsChapter Goal: This chapter focuses on the various patterns for developing and managing scalable APIs. It discusses the patterns for API Implementation, Traffic Management, API Security, API Deployments, and API Adoption. The 2nd edition will cover the new patterns for the development scalable APIsNo of pages: 20 to 25 pagesSub - Topics:1. API Traffic Management Patterns2. API Security Patterns3. API deployment patterns4. API Operations and adoption patternsChapter 6: API Version ManagementChapter Goal: This chapter will highlight the importance and approaches for versioning APIs for easier life cycle management.Chapter 7: API SecurityChapter Goal: This chapter will discuss the various approaches and technologies available for implementing robust end-to-end security for APIs. The 2nd edition will also focus on the latest advances in API security like WAAP and protection against BoT attacksNo of pages:25 to 30 pagesSub - Topics:1. API Authentication and Authorization2. OAuth3. Open Id Connect4. JwT tokens5. Preventing BoT attacks6. WAAP (Web Application and API Protection)Chapter 8: API MonetizationChapter Goal: This chapter will highlight the various API monetization models and the concepts around creating an API Monetization package. The chapter will also cover some of the pitfalls to avoid while selecting the monetization model. The 2nd edition will update this chapter to cover the pitfalls to avoid while monetizing APIsNo of pages: 8 to 10 pagesSub - Topics:1. API Monetization approach2. API Monetization Models3. Pitfalls to avoid while Monetizing APIsChapter 9: API Testing StrategyChapter Goal: This chapter will focus on the right approach to test APIs with interface testing, functional integration testing, security testing, and load and performance testing. The chapter will also look at some of the popular tools for API testing.No of pages: 12 to 15 pagesSub - Topics:1. API Testing approach2. Best practices for API testing3. API Testing toolsChapter 10: API AnalyticsChapter Goal: This chapter will focus on the various stakeholders and metrics/dashboards to look at for monitoring the performance of APIs.No of pages: 5 to 8 pagesSub - Topics:5. API Analytics6. App Analytics7. Developer AnalyticsChapter 11: API Developer PortalChapter Goal: This chapter will focus on the need for building a rich and user-friendly Developer Portal. It will highlight the necessary components and functionalities to be implemented in a Developer Portal. The 2nd edition of this chapter will introduce the best practices to follow and advanced capabilities that should be built to accelerate the adoption of APIs using the Developer PortalNo of pages: 12 to 15 pagesSub - Topics:1. API Publications2. Developer Onboarding3. API dashboards4. Forums and Blogs5. SupportChapter 12: API GovernanceChapter Goal: This chapter will look into the various personas and their roles in the API lifecycle. It will look at the scope and aim of API Governance. The various API governance models will be discussed in this chapter. The 2nd edition will highlight the best practices to follow for an effective API governanceNo of pages: 8 to 10 pagesSub - Topics:1. API Lifecycle2. Personals and Roles3. API Governance Models4. Best practices for effective API GovernanceChapter 13: Building an effective API StrategyChapter Goal: This new chapter in the 2nd edition will focus on the approach to building an effective API strategy for an organization. It will highlight the components that should be part of the enterprise API strategy.No of pages: 5 to 8 pagesSub - Topics:1. API Business Strategy2. API Technology Strategy3. API Ecosystem StrategyChapter 14: Building an API-First ArchitectureChapter Goal: This new chapter in the 2nd edition will focus on the principles and approaches for building an API-First architecture. It will cover the API principles for API exposure, and various patterns for building scalable and decoupled APIs like orchestration, choreography, event-driven approach, service mesh, service registryNo of pages: 20 to 25 pagesChapter 15: Modern API Architecture StylesChapter Goal: This new chapter in the 2nd edition will introduce the readers to some of the latest advancements in technology for building APIs like graphQL, and gRPC. It will look at the various criteria for making the right technology choices for architecting APIsNo of pages: 10 to 12 pagesSub - Topics:1. graphQL2. gRPCChapter 16: Build APIs as a ProductChapter Goal: This new chapter in the 2nd edition will focus on the principles for building APIs as a product that customers will love. It will also discuss the approaches and best practices to be followed for creating an API Product and launching it in the marketNo of pages: 10 to 12 pagesSub - Topics:1. Pillars of a product mindset2. Guide to API Product Management PrinciplesChapter 17: API Maturity ModelChapter Goal: This new chapter in the 2nd edition will talk about the maturity levels of an enterprise APIs program. It also provides a roadmap that organizations may adopt to evolve and mature their APIs to meet the growing business needsNo of pages: 8 to 10 pagesSub - Topics: 1. API Architecture maturity2. API Governance maturity3. API Developer Community Maturity4. API Development Process Maturity5. API Operations Maturity

Regulärer Preis: 56,99 €
Produktbild für Analyzing Websites

Analyzing Websites

From a cluster of interconnected HTML pages to online service platforms, websites are constantly changing in form and function. These transformations have led, on the one hand, to human and social sciences renewing or inventing analytical methodologies; and on the other hand, to a reconsideration of the practices of non-specialists and digital professionals.The Web factory is equally included on the agenda of communication training, according to an alternative approach that is complementary to the one that has been implemented for computer scientists.From these two perspectives and drawing upon several case studies, Analyzing Websites presents epistemological and methodological contributions from researchers in Information and Communication Sciences exploring websites as sociotechnical, semi-discursive and communicational devices. This study covers website design as well as their integration into the digital strategies of organizations in the public, associative and private sectors.LUC MASSOU is a professor in Information and Communication Sciences at Université de Lorraine, France, and a member of CREM.PATRICK MPONDO-DICKA is a lecturer in Information and Communication Sciences at Université Toulouse Jean-Jaurès, France, and a member of LERASS.NATHALIE PINÈDE is a professor in Information and Communication Sciences at Université Bordeaux Montaigne, France, and a member of MICA.Foreword xiiiSébastien ROUQUETTEIntroduction xviiLuc MASSOU, Patrick MPONDO-DICKA and Nathalie PINÈDEPART 1 WEBSITES AS A SOCIO-TECHNICAL DEVICE 1CHAPTER 1 OBSERVING THE WEB THROUGH THE LENS OF WEBSITES 3Camille ALLOING1.1 Introduction 31.2 The website as a space and an architecture 51.3 The pioneer Web (before 2000) 71.4 The citation Web (from 2000 to 2005) 121.5 The Web known as Web 2.0 (from 2005 to 2010) 151.6 The social Web (from 2010 to 2015) 191.7 An affective and artificial Web (2015 to the present) 231.8 Conclusion 241.9 References 26CHAPTER 2 IS THE WEB A SEMIODISCURSIVE OBJECT? 29Christine BARATS and Julia BONACCORSI2.1 Introduction 292.2 How to do relevant data sets with Web data? The making of a complex object of research 312.2.1 Sociotechnical devices and the construction of the object 312.2.2 From the research question to the data sets: knowledge and documentation of the device 342.2.3 Notional tools for semiodiscursive approaches 382.3 Standing the test of time: surveys and methods 422.3.1 Tangled temporalities 422.3.2 Defining the right way to select and collect data sets 442.3.3 From the notion of corpus to the notion of digital corpus 462.4 Violence against data: issues of interpretation 492.4.1 Formatting of issues by research instrumentation 492.4.2 Limits and challenges of interpretation: taking the illusion of immediacy and standardization of meaning into account 512.5 Conclusion 522.6 References 53CHAPTER 3 EXPERTISE FROM WEBSITES: PEDAGOGICAL PERSPECTIVES IN INFORMATION AND COMMUNICATION 57Luc MASSOU3.1 Introduction 573.2 What is the role of website expertise in information and communication? 583.2.1 Example of a 3-year educational program 593.2.2 From analysis to website expertise 623.3 What are the benefits of semio-rhetorical, critical and socio-technical approaches for the learner? 653.3.1 An "external" expertise to put results into perspective 663.3.2 Several points in common with our scientific analyses 673.4 Conclusion 703.5 Appendices 723.6 References 76Part 2 The Website as a Semiodiscursive Device 81CHAPTER 4 SEMIOTICS OF DIGITAL DESIGN: FROM ETHOS TO ETHICS 83Nicole PIGNIER4.1 Introduction 834.2 Semiotics of webdesign: from 2004 to 2021 854.2.1 A realistic or hyper-realistic form of multimodal writing 854.2.2 A mythical or symbolic multimodal writing 874.2.3 A readable and redundant multimodal writing 884.2.4 A reality-removing and subversive multimodal writing 904.2.5 The semiotic functions of Web interfaces 914.3 Beyond its ethos, the ethical aim of digital design 924.3.1 Divergences between ethos and ethics 934.3.2 Websites in a tense relationship with other players in digital design 944.4 Interrogating the semiotic interrelations between the strata of digital design 954.4.1 The notions of prefiguration, configuration and figuration 954.4.2 Semiotic interrelationships between the strata 974.4.3 Digital design: from ethos to ethics 984.5 Conclusion 1014.6 References 103CHAPTER 5 SOCIAL SEMIOTIC APPROACH OF PRESS WEBSITES: GENESIS OF A METHOD 105Alexandra SAEMMER and Nolwenn TRÉHONDART5.1 Introduction 1055.2 Epistemological and methodological issues 1075.2.1 Genesis of a method 1075.2.2 Foundational concepts 1095.2.3 Semiotic tools introduced in the field 1105.3 The first field: a critical decoding of interfaces 1125.3.1 Experimental protocol 1125.3.2 Spontaneous opinions and impressions from viewing BFM TV's website 1135.3.3 Identification of editorial units and first interpretations 1145.3.4 Debating and choosing hypotheses 1175.4 Second field: toward a social semiotic approach of websites 1185.5 Interpretative hypotheses and interpretative filters 1205.5.1 "BFM, the information supermarket", from the lens of an anti-capitalist viewpoint and professional habits 1205.5.2 The "sexist, right-wing BFM", through the prism of a feminist and intersectional perspective 1225.5.3 "BFM as a counter-power", through the lens of a complicit or critical adherence to the state media 1245.6 Conclusion 1255.7 Appendices 1275.8 References 128CHAPTER 6 ANALYZING THE MOBILIZATION AGAINST THE LPR ON TWITTER: THEORETICAL ISSUES AND METHODOLOGICAL CHALLENGES 131Justine SIMON6.1 Introduction 1316.2 Multidimensional approach to digital social networks 1346.2.1 Shedding light on the notion of hypertextualized discourse 1346.2.2 Shared images and participatory culture 1346.2.3 Interdiscursivity, narrativity and argumentativity 1386.3 Ethical questions and methodological challenges 1406.3.1 Ethical concerns 1406.3.2 Methodological challenges 1436.4 Presentation of the six sub-corpora 1476.4.1 Sub-corpus 1: the narrating Twitter user 1486.4.2 Sub-corpus 2: the narrator-character Twitter user 1496.4.3 Sub-corpus 3: calls to action 1526.4.4 Sub-corpus 4: sharing visual gags and interactive mini-stories 1526.4.5 Sub-corpus 5: sharing of inter-iconic images and double narratives 1546.4.6 Sub-corpus 6: oppositions of discourse/counter-discourse 1576.5 Outlook and analytical perspectives 1586.6 Conclusion 1596.7 References 161CHAPTER 7 METAPHOR AND ANALYSIS OF WEBSITES: TRANSFORMATIONS OF A MEDIA OBJECT 167Pergia GKOUSKOU7.1 Introduction 1677.2 Uses of metaphors for analyzing websites and digital communications 1687.2.1 The "website" object: between documents, media and devices 1687.2.2 The place of metaphor in the analysis of the "website" object 1727.2.3 Metaphor and intermediality 1737.2.4 Metaphors, remediatization and strategies of digital communications 1757.3 Websites that visualize open data: making sense using the metaphor as inquiry 1787.3.1 Hypermedia maps in data visualization 1797.3.2 The metaphor of the mosaic in data visualization 1827.3.3 Metaphor as a framework for action: involvement of the Internet user and a sense of transparency 1837.4 Conclusion 1867.5 References 187Part 3 The Website as a Communication Device 191CHAPTER 8 THEMATIC ANALYSIS OF HYPERLINKS: A TAXONOMIC APPROACH 193Nathalie PINÈDE8.1 Introduction 1938.2 Analytical framework for an info-communicational reading of websites 1948.3 The interest of a taxonomic reading grid for websites 1998.4 Presentation of the methodological approach 2028.4.1 Corpus of university websites 2038.4.2 A semiodiscursive and taxonomic analysis of web pages 2048.5 Primary results 2068.5.1 Analysis of the main menus of the home pages 2068.5.2 Generic approach to the HLU corpus 2108.5.3 Informational profiles from the taxonomy of the HLUs 2138.5.4 A closer look at a class: "User profiles" 2198.6 Conclusion 2218.7 Appendices 2238.8 References 227CHAPTER 9 THE DOCUMEDIALITY OF CROSS-BORDER ORGANIZATIONS 231Marie-Hélène HERMAND9.1 Introduction 2319.2 Theoretical and methodological anchoring in semiotics applied to the media 2339.3 First step: create a reading of three cross-border organizational models through the lens of documentality 2359.3.1 Within the European Union (EU): the documentality of the Euroregions-fluids 2359.3.2 On the borders of the EU: the documentality of the Euroregion buffers 2379.3.3 In Southern Africa: the documentality of ecoregions 2389.4 Step two: build a corpus of websites from the three cross-border organizational models considered 2399.4.1 The website of the Tyrol Alto Adige Trentino Euroregion 2399.4.2 The website of the Danube-Cris-Mures-Tisa Euroregion 2409.4.3 The website of Kavango-Zambezi Transfrontier Conservation Area 2439.5 Stage three: identify the memory processes to unravel the skein of cross-border narratives presented to audiences 2449.5.1 Call for a shared memory: anchoring within a territory-symbol 2449.5.2 Call for a shared history: anchoring within a legitimate quest 2489.5.3 The call for a shared heritage: an anchoring in shared living 2509.6 Step four: qualitatively comparing the results 2559.7 Conclusion 2599.8 References 261CHAPTER 10 "TELL US YOUR DATA", BETWEEN EUPHEMIZATION, STANDARDIZATION, AND DIGITAL POETICS 265Camille RONDOT10.1 Introduction 26510.2 Epistemological and methodological issues 26810.2.1 Performance, notoriety and visibility: a disruptive discourse 26810.2.2 Empowered skills: a discourse on the method as a foundational basis 27210.2.3 From social data to consumer knowledge: information rhetoric 27510.3 A poetics of the visible and the audible 27610.3.1 Revealing the visible and making ordinary conversations speak 27610.3.2 Revealing what is visible through surveillance: between euphemized discourse and the desire to create a panopticon 27910.4 Conclusion 28310.5 References 285List of Authors 287Index 289

Regulärer Preis: 142,99 €
Produktbild für Künstliche Intelligenz (KI) und Arbeit

Künstliche Intelligenz (KI) und Arbeit

Dies ist ein Handbuch für Unternehmen, Verbände und Beratungsgesellschaften, die die Potenziale von KI-Systemen in kleinen und mittleren Unternehmen erschließen wollen. Wie muss KI in Unternehmen eingeführt werden, um die Potenziale von KI gleichermaßen für Unternehmen und Beschäftigte zu nutzen? Im Buch geht es um die Frage, wie man KI-gestützte Arbeitssysteme so gestalten kann, dass sie den Anforderungen seitens der Technik, der Organisation und der Beschäftigten gerecht werden. Das Handbuch bietet praxisnahe Vorgehensweisen, die den aktuellen Stand der Wissenschaft mit Erfahrungen aus der betrieblichen Praxis verbinden. Der Leser erhält wertvolle Tipps und Strategien für die Zukunft der Arbeit. Ein Muss für alle, die die Chancen von KI nutzen wollen, ohne die Bedürfnisse der Beschäftigten zu vernachlässigen. Das IFAA – INSTITUT FÜR ANGEWANDTE ARBEITSWISSENSCHAFT E. V. in Düsseldorf ist das Forschungsinstitut der Metall- und Elektroindustrie zur Gestaltung der Arbeitswelt. Das ifaa verknüpft Kompetenz in Arbeitswissenschaft und Betriebsorganisation mit Erfahrungen aus der betrieblichen Praxis. Es beteiligt sich an praxisrelevanten Forschungs- und Verbundprojekten und bereitet die gewonnenen Erkenntnisse für den Transfer in die Praxis auf. Es vermittelt Erkenntnisse der Forschung und hilft den Partnern vor Ort, die Erkenntnisse, Methoden und Konzepte in den Betrieben umzusetzen. Das Themen- und Leistungsspektrum des ifaa umfasst u.a. Arbeits- und Leistungsfähigkeit, betriebliches Gesundheitsmanagement, Arbeitszeitgestaltung, Entgelt und Vergütung, Prozessoptimierung, Nachhaltigkeitsmanagement sowie Digitalisierung und künstliche Intelligenz. Bei seinen Arbeiten erforscht und gestaltet das ifaa Veränderungen der Arbeitswelt, die auf demografische, gesellschaftliche, ökonomische und technologische Ursachen zurückzuführen sind.TEIL 1 - ALLGEMEINE EINFÜHRUNG: Einführung.- Klassifizierung von Künstlicher Intelligenz.- Bedarfsdarstellung aus der Praxis.- Roadmap für den Weg zur eigenen KI-Lösung.- TEIL 2 - PRAXISTEIL / UMSETZUNG DER ROADMAP: Ermittlung des individuellen KI-Bedarfs.- Entwicklung und Pilotierung.- Anwendung und Pflege im Serienbetrieb.- Ausblick / Weiterentwicklungsperspektiven.

Regulärer Preis: 19,99 €
Produktbild für Practical Spring LDAP

Practical Spring LDAP

This revised edition is your practical, hands-on guide to developing Java-based enterprise applications with big data or batches of data using the Spring LDAP and the Spring Data LDAP frameworks. The book covers these popular Spring project modules and explains the purpose and fundamental concepts of LDAP before giving a comprehensive tour of the latest version of Spring LDAP and Spring Data LDAP as found in Spring Framework 6.The book provides a detailed treatment of LDAP controls and the new features of Spring LDAP such as Object Directory Mapping and LDIF parsing. LDAP has become the de facto standard for storing and accessing information in enterprises. Despite its widespread adoption, developers often struggle when it comes to using this technology effectively. The traditional Java LDAP and JNDI approaches have proven to be painful and have resulted in complex, less modular applications. The Spring LDAP framework provides an ideal alternative.After reading and using this book, you'll come away with a level of comfort for working with large batches of data or big data in your enterprise Spring applications development.WHAT YOU'LL LEARN* Explore "What is Java LDAP?" and understand the Spring LDAP and Spring Data LDAP frameworks* Search LDAP resources* Sort and page your LDAP results* Dive into object directory mapping* Handle LDAP transactions and moreWHO THIS BOOK IS FORIntermediate to advanced Java and Spring software developers; programmers with at least some prior experience in Java, especially the Spring FrameworkBALAJI VARANASI is a software development manager and technology entrepreneur. He has over 13 years of experience architecting and developing Java/.NET applications and, more recently, iPhone apps. During this period, he has worked in the areas of security, web accessibility, search, and enterprise portals. He has a master's degree in computer science and serves as adjunct faculty, teaching programming and information system courses. When not programming, he enjoys spending time with his lovely wife in Salt Lake City, Utah.ANDRES SACCO has been working as a developer since 2007 in different languages, including Java, PHP, Node.js, Scala, and Kotlin. His background is mostly in Java and the libraries or frameworks associated with this language. At most of the companies he worked for, he researched new technologies to improve the performance, stability, and quality of the applications of each company. In 2017, he started to find new ways to optimize the transference of data between applications to reduce the cost of infrastructure. He suggested some actions, some applicable in all of the manual microservices and others in just a few. All of this work includes creating a series of theoric-practical projects (available on Manning.com). Recently, he co-authored an Apress book on Beginning Scala 3. He also, published a set of theoric-practical projects about uncommon ways of testing, such as architecture tests and chaos engineering.

Regulärer Preis: 52,99 €
Produktbild für Understanding Microsoft Teams Administration

Understanding Microsoft Teams Administration

This book provides solutions, best practices, tips, and workarounds to plan, design, customize, implement, and manage Microsoft Teams in any environment. This revised edition has been updated to reflect all the latest techniques and products, including migration from Skype for Business On-Prem to Microsoft Teams, along with Teams for Education, which includes a range of features and tools that enable teachers and students to collaborate, communicate, and learn in a virtual environment.The book begins with an overview of Microsoft Teams, including its architecture, teams/channels, audio/video meetings, and the phone system. The authors then take you deeper into deployment and management of teams, clients, guests and external access, and live events, followed by a walk-through of network assessment and bandwidth planning for Teams. Here, you will learn about deployment of quality of service and how to configure your phone systems using direct routing and calling plans. Moving forward, you will learn Microsoft Teams administration and policy management along with the migration process of Skype from Business On-Prem to Microsoft Teams. To wrap things up, the authors demonstrate some troubleshooting techniques for call quality issues in Teams, and walk you through various features of Teams for Education and how to utilize them.By the time you turn the last page of Understanding Microsoft Teams Administration, you'll be fully equipped to configure, customize, and control Teams with confidence. Don't just adapt to the future of collaboration—lead it.WHAT YOU WILL LEARN* Kickstart your journey: Get acquainted with the Teams architecture, from teams and channels to audio/video conferencing and beyond* Master the mechanics: Dive deep into deployment, including crucial aspects like guest access, such as events, and network assessment* Elevate call quality: Learn the nuts and bolts of Quality of Service (QoS) and phone systems, including direct routing and calling plans* Admin like a pro: Gain insights into robust policy management, and understand how to navigate the Teams admin portal with finesse* Get a grip on network assessment and bandwidth planning tailored specifically for Teams* Unlock secrets of quality of service, direct routing, and customized calling plans* Migration simplified: Seamlessly shift from Skype for Business On-Prem to Teams without missing a beat* Edu-tech unveiled: Explore Teams for Education and how its myriad features can enrich virtual learning experiences for teachers and students alike* What's new: A dedicated chapter exclusively covering Microsoft Teams for Education, focusing on empowering both educators and studentsWHO THIS BOOK IS FORAdministrators and technical consultants focused on Microsoft Teams. This book serves as an invaluable resource for those looking to optimize team collaboration and communication within their organizations.Balu Ilag is a luminary in the realm of unified communications and collaboration technologies. With an impressive career spanning over 17 years, Balu has carved a niche for himself in messaging, telecom, and modern workplace collaboration. He currently serves as an Office 365 and Collaboration Specialist at Juniper Networks, where he wears multiple hats—from product administration and development to strategic guidance for enterprise customers.Balu holds a plethora of distinguished certifications which reinforce his expertise in the field. He is a Microsoft Certified Trainer (MCT), Microsoft 365 Certified Teams Administrator Associate, and a Microsoft Certified Solutions Expert (MCSE) in communication and productivity. These credentials not only highlight his grasp over Microsoft technologies but also signify his commitment to continuous learning and excellence.An avid writer, Balu has authored an array of blog posts on his blog site www.bloguc.com that serve as a treasure trove of insights on unified communication and collaboration technologies. Whether you're looking for a comprehensive how-to guide or best practices for troubleshooting, chances are Balu has penned a blog post about it. His writings reflect his deep understanding of the complexities involved in modern workplace technologies, making them an invaluable resource for professionals and enthusiasts alike.VIJAY IREDDY is a highly skilled technology professional passionate about innovation and digital transformation. He has extensive experience and expertise with a range of Microsoft and UC Certifications, including being certified as a Teams Administrator Associate, Support Specialist, and Collaboration Communication System engineer.As a Modern Communications Architect at Cyclotron, Vijay works with organizations to evaluate their existing communication and collaboration platforms and helps them transition to the modern Microsoft Teams platform. He has a proven track record of implementing Microsoft Teams with industry-specific best practices while ensuring governance and security. He is dedicated to delivering effective solutions that meet each organization's unique needs and staying up-to-date with the latest technological advancements to help his clients achieve their business goals.Chapter 1: Microsoft Teams Overview.- Chapter 2: Managing and controlling Microsoft Teams.- Chapter 3: Organization Readiness for Microsoft Teams.- Chapter 4: Teams Audio Conferencing and Phone system management.- Chapter 5: Microsoft Teams Governance and lifecycle management.- Chapter 6: Migration from Skype for Business (Lync) on-prem and online to Microsoft Teams.- Chapter 7: Microsoft Teams troubleshooting approaches.- Chapter 8: Teams Reporting and Monitoring. – Chapter 9: Microsoft Teams for Education. - Chapter 10: Microsoft Teams Learning to the Next Level and Get Certified.

Regulärer Preis: 62,99 €
Produktbild für Building Real-Time Marvels with Laravel

Building Real-Time Marvels with Laravel

Dive into the diverse facets of the Laravel ecosystem. This comprehensive guide will put you on the fast track to becoming an expert in Laravel development.Starting with the fundamentals, you’ll explore essential concepts, enabling you to grasp the framework's structure. Subsequent chapters cover intricate topics, such as advanced routing techniques, database management, and eloquent object relational mapping (ORM), allowing developers to build robust applications. The book offers comprehensive insights into building secure applications with authentication and authorization mechanisms, as well as constructing efficient APIs and employing caching techniques for enhanced performance.Chapters on real-time applications and queues offer practical knowledge to optimize application responsiveness. Advanced package development and performance monitoring provide valuable tools for developing high-quality Laravel packages and debugging. You’ll also gain expertise in internationalization, front-end development, and database optimization.Building Real-Time Marvels with Laravel doesn't shy away from the latest trends, featuring chapters on serverless computing, progressive web applications (PWAs), and UI/UX design patterns. It also emphasizes security, DevOps, and infrastructure automation. Bonus appendixes feature a handy Laravel cheat sheet, recommended resources, and a glossary of essential terms, making it a comprehensive reference for Laravel enthusiasts.WHAT YOU WILL LEARN* Gain a comprehensive understanding of advanced routing, database management with eloquent ORM, authentication, and API development.* Study caching, database query optimization, queuing, and scaling strategies for high-traffic applications* Explore advanced middleware, real-time applications, testing, and package development WHO THIS BOOK IS FORIntermediate to advanced developers.SIVA SELVARAJ work focuses on modern technologies and industry best practices. These topics include frontend development techniques using HTML5, CSS3, and JavaScript frameworks; implementing responsive web design and optimizing user experience across devices; building dynamic web applications with server-side languages such as PHP, WordPress, and Laravel; and Database management and integration using SQL and MySQL databases He loves to share his extensive knowledge and experience to empower readers to tackle complex challenges and create highly functional and visually appealing websites.Chapter 1: Understanding the Laravel Ecosystem.- Chapter 2: Advanced Routing Techniques.- Chapter 3: Database Management and Eloquent ORM.- Chapter 4: Authentication and Authorization.- Chapter 5: Building APIs with Laravel.- Chapter 6: Caching and Performance Optimization.- Chapter 7: Advanced Middleware Techniques.- Chapter 8: Real-Time Applications with Laravel.- Chapter 9: Testing and Test-Driven Development.- Chapter 10: Queues and Job Scheduling.- Chapter 11: Advanced Package Development.-Chapter 12: Performance Monitoring and Debugging.- Chapter 13: Scaling Laravel Applications.- Chapter 14: Security Best Practices.- Chapter 15: Advanced Performance Optimization.- Chapter 16: Continuous Integration and Deployment.- Chapter 17: Laravel and Microservices.- Chapter 18: Advanced Laravel Debugging and Troubleshooting.-Chapter 19: Building Internationalized Applications with Laravel.- Chapter 20: Advanced Frontend Development with Laravel.- Chapter 21: Advanced Error Handling and Exception Management.- Chapter 22: Advanced Database Techniques and Optimization.- Chapter 23: Laravel and Serverless Computing.- Chapter 24: Building Progressive Web Applications (PWAs) with Laravel.- Chapter 25: Advanced UI/UX Design Patterns for Laravel.- Chapter 26: Advanced Analytics and Reporting in Laravel.- Chapter 27: Building Microservices with Laravel and Docker.- Chapter 28: Advanced Third-Party Integrations.- Chapter 29: Securing Laravel Applications.- Chapter 30: Advanced DevOps and Infrastructure Automation Appendix A: Laravel Cheat Sheet .- Appendix B: Recommended Resources.- Appendix C: Glossary of Terms

Regulärer Preis: 56,99 €
Produktbild für Lean Game Development

Lean Game Development

Master Lean UX and Lean Startup techniques to improve your agile game development experience beyond Scrum. This updated version of the book focuses on applying lean and agile methodologies to the game development process and features improved examples, applied techniques, and a whole new section explaining how to test a game in Unity with CI.You'll see how to define a minimum viable product (MVP) for games with Lean Canvas, allowing customers to iterate over it and collect feedback for improvement at every cycle. All of these are achieved while still using standard Agile techniques. The first part of the book explains the ideation process of a game and how lean methodologies allow developers, especially small studios, to avoid scope creep. Next, it it provides guidance on creating MVPs and using player feedback to iterate and improve games. The book then discusses continual improvement (CI) methods. A crucial part of CI is generation of Lean Canvas.Lean Game Development, Second Edition shows you how to iterate until you develop a game that satisfies developers, gamers, and your studio's financial goals.WHAT YOU'LL LEARN* Study lean and agile methodologies to enhance the game development process * Find out how to improve the way game productions define value and iterate over it* Apply development strategies to enrich the game development processWHO THIS BOOK IS FORPeople from all sectors of the gaming industry will find the book useful in planning their project in a more iterative way, unloading the management burden on the development process and collecting feedback to improve the game content as early as possible.Julia Naomi Rosenfield Boeira has been a software engineer for over a decade, focusing on Game Development and Online Service. Currently, she works as a team lead at Ubisoft; previously she worked as an online engineer. She has also worked with premium agile consultancy companies such as Thoughtworks and is extremely active on GitHub with focus on Game Development and Rust.Chapter 1: IntroductionSub –Topics• Why lean game development, not agile game development?• How do lean and agile relate to the game world?• Games and software relate much more deeply.• What kind of game is software development?• Where did it go wrong?• SummaryChapter 2: First steps with LeanSub – Topics• Seven key principles of lean• Lean inception• Lean PMO• Lean DevOps• Kanban• How can you take advantage of Scrum• Continuous integration• Going from build-measure-learn to lean game• Looking deeper at the inception• Test driven development• Lean and Games• SummaryChapter 3: An Inception in practiceSub - Topics:• How and why, we did an Inception• How was our inception?• Prioritizing ideas• Persona development• Next Steps with lean• How does the game look like from the inception perspective• SummaryChapter 4: Do we really need a MVPSub - Topics:• MVP and MVG Defined• Building Prototypes• The Product Owner role in MVP/prototype• Getting more from less• Recognizing when a game is not viable• Thinking simpler first• From MVP Canvas to Lean Game Development• MVGs and prototypes of Super Jujuba Sisters• SummaryChapter 5: Examples of MVGsSub - Topics:• Guerrilla Games: From Killzone FPS to open world Horizon Zero Dawn- Conception- Thunderjaw (core mechanic example)- Open World- Vegetation System- Proof of Concept- Pre-production- Production• Archero: Casual Games as a Great Lean Process• Dead cells: Quick feedback loop- Dead cells Core Concept- Expanding to multiplayer- Pivoting Tower Defense- MVPChapter 6: Generating HypothesisSub - Topics:• When hypothesis are not created from the InceptionChapter 7: Test Driven DeveopmentSub - Topics:• TDD defined• Tests are good, but then why there is so much poorly tested code?• Applying TDD to games• Next steps to improve TDDChapter 8: Continuous IntegrationSub - Topics:• Why continuous integration• Using continuous integration• Code versioning• Automated build• SummaryChapter 9: The world between Design and BuildSub - Topics:• A little bit about Design• A little bit about Build• Pretty Beautiful, but how is it done?• SummaryChapter 10: Test, Code, TestSub - Topics:• Testing types• Test cases• Coding game art work• Coding the game software• Test automation• SummaryChapter 11: Measuring and AnalyzingSub - Topics:• Ways of measuring• Feedback• More on feedback• Other ways of measuring• Measuring through hypothesis• Analyzing• SummaryChapter 12: Creating ideas for iteratingSub - Topics:• Action Items• The features are OK, but the game is not fun• The Game is fun but very difficult to play• Rethink the limitations on Game Development• Tying things together• SummaryChapter 13: Consolidating Knowledge before ExpandingSub - Topics• Automated testing• Agile methodologies• Art and Iteration process• Avoiding Time Waste• Continuous Delivery• SummaryChapter 14: More about gamesChapter 15: Example game using Automated testing for game developmentSub - Topics• Setting up Unity for testing.• Creating testing scenes and objects• Setting up a CI for Unity• Testing Gameplay, how to test character controllers• More testing scenarios for games• How to test ECS with Bevy Engine• Summary

Regulärer Preis: 52,99 €
Produktbild für Productizing Quantum Computing

Productizing Quantum Computing

Leverage the benefits of quantum computing by identifying business use cases and understanding how to design and develop quantum products and services. This book will guide you to effectively productize quantum computing, including best practices, recommendations, and proven methods to help you navigate the challenges and risks of this emerging technology.The book starts with a thorough introduction to quantum computing, followed by its various algorithms and applications. You will then learn how to build a strong foundation in classical computing, seek practical experience, and stay up-to-date with the latest developments in the field. Moving forward, you will gain an understanding of how to conduct market research to identify business opportunities for quantum computing products and services. The authors then guide you through the process of developing a quantum roadmap and integrating quantum computing into an existing system. This is concluded by a demonstration of howto manage quantum computing projects and how to address their risks and challenges.After reading this book, you will understand quantum computing and how it can be applied to real-world business problems.WHAT YOU WILL LEARN* Identify business use cases for quantum computing and understand the potential benefits and risks of quantum applications* Design and develop quantum products and services by identifying quantum algorithms, programming in quantum languages, and leveraging quantum simulators and hardware* Integrate quantum computing into existing systems* Integrate quantum algorithms with classical algorithmsWHO THIS BOOK IS FORProduct managers, developers, and entrepreneurs who wish to use the potential of quantum computing for their businesses.DHAIRYYA AGARWAL is a product manager at Microsoft. He is based out of Mountain View, California where he is honing his product management skill set by solving problems in the email and collaboration security space. He received his master’s degree from Carnegie Mellon University in Software Management. He has delivered on many initiatives focused on improving retention, activation, and engagement. He has also worked across 0 to 1 products to enable businesses to enter a new markets.SHALINI D is a quantum AI researcher at Fractal QuantumAI Lab researching quantum algorithms at the intersection of quantum chemistry and quantum machine learning. Previously, she worked at Infosys as a systems engineer, where she worked as a core customization API developer. She has completed her naster's in quantum technology from CSIC-Universidad Internacional Menendez Pelayo, Spain. Her research areas include semiconductor spin qubits, quantum machine learning, and quantum chemistry. She has taught quantum computing, from basic to advanced levels, at many universities, including Vellore Institute of Technology, India. She has also delivered several talks at various universities. Her Udemy course on the Qiskit Developer Exam is the highest-rated and bestseller globally.SRINJOY GANGULY is a quantum AI research scientist at Fractal QuantumAI Lab and a clinical Professor of Practice for Quantum Technology at Woxsen University. He is also an Associate Supervisor (adjunct) at the University of Southern Queensland in Australia, supervising PhD students in Quantum Machine Learning. He is an IBM Qiskit Advocate and an IBM Quantum Educator with over 5+ years of experience in quantum technologies. He is the author of the book Quantum Computing with Silq Programming, and has published several research papers in quantum chemistry, quantum machine learning, and quantum NLP. He possesses a triple master's in Quantum Technologies, Quantum Computing Technology and Artificial Intelligence (AI) from CSIC-UIMP, Spain, Universidad Politecnica de Madrid and the University of Southampton, respectively. His research interests include superconducting quantum circuits, hybrid superconducting-semiconducting heterostructures (1D & 2D), topological quantum computing, spin qubits, quantum machine learning, quantum chemistry, quantum natural language processing and quantum AI. Chapter 1: Introduction to Quantum Computing.- Chapter 2: Quantum Algorithms and Applications.- Chapter 3: Continue Learning About Quantum Computing.- Chapter 4: Assessing the Market and Competitive Landscape.- Chapter 5: Designing Quantum Products and Services.- Chapter 6: Developing a Quantum Roadmap.- Chapter 7:Integrating Quantum Computing into an Existing System.- Chapter 8:Releasing Quantum Computing-based Products.- Chapter 9: Challenges and Risk in Productizing Quantum Computing.

Regulärer Preis: 54,99 €
Produktbild für CISSP Exam Certification Companion

CISSP Exam Certification Companion

This is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand for certified information security professionals continues to increase, and the CISSP exam is widely recognized as one of the most challenging and comprehensive information security certification exams. This book will provide readers with the practice and exam strategies they need to pass the CISSP exam and launch their careers in information security. It covers all of the topics tested on the exam, including security management practices, access control systems and methodology; laws, regulations, standards, and compliance; and telecommunications and network security.In addition to providing practice questions, this book also includes background information on the CISSP exam, including the exam format, content, and best ways to study for the exam. It is designed to be user friendly and easy to follow, with clear explanations and examples for all the practice questions.WHAT YOU WILL LEARN* Gain a comprehensive understanding of the CISSP Common Body of Knowledge (CBK)* Gain background information on the CISSP exam, including the exam format, content, and best ways to study for the exam* Develop the critical thinking skills that are essential for success on the CISSP exam* Master test-taking strategies for successfully passing the CISSP exam* Prepare through a realistic simulation of the actual CISSP examWHO THIS BOOK IS FOR:Individuals preparing for the Certified Information Systems Security Professional (CISSP) exam—someone who has a background in information technology or information security and is looking to pass the CISSP exam and become a CISSP-certified professional.Secondary audiences include information technology professionals looking to expand their knowledge and skills in the field of information security, individuals interested in pursuing a career in information security and considering the CISSP certification, and current or aspiring information security managers who want to advance their careers and take on more responsibilities in their organizations.MOHAMED ALY BOUKE, PhD, CISSP, is an acclaimed cybersecurity expert, educator, and IT certification specialist with over a decade of multifaceted experience. He currently holds dual roles: Cybersecurity Researcher at University of Putra Malaysia and Senior Instructor at Certangle, LLC. His scholarly contributions span Cyber Security, Machine Learning, and Network Security research. Renowned for his pedagogical prowess, Dr. Bouke has conducted numerous training sessions for IT certifications, including ISACA, (ISC)², CompTIA, and Microsoft. Many students have successfully passed their certification exams under his guidance, cementing his reputation as an IT certification expert.Aside from his rich academic background—which encompasses participating in many conferences and generating an extensive array of publications in cybersecurity and artificial intelligence— Dr. Bouke is also a respected reviewer for prestigious journals and publishers such as Packt Publishing, Elsevier, and IEEE.On the corporate front, he has utilized his training expertise with well-regarded companies such as KnowledgeHut. His comprehensive consulting experience encompasses collaborations with international organizations focused on strengthening their cybersecurity infrastructure.Holding multiple certifications, including CISSP, Dr. Bouke brings to this book not only a wealth of theoretical understanding but also practical, hands-on experience. Intended as a comprehensive guide, this book emerges as an indispensable resource for cybersecurity professionals at all stages of their careers. For additional learning resources and insightful tips, visit Dr. Bouke's website, bukacert.com.Chapter 1: Introduction.- Chapter 2: CISSP Exam Format and Content.- Chapter 3: Security and Risk Management.- Chapter 4: Asset Security.- Chapter5: Security Architecture and Engineering.- Chapter 6: Communications and Network Security.- Chapter 7: Identity and Access Management.- Chapter 8: Security Assessment and Testing.- Chapter 9: Security Operations.- Chapter 10: Software Development Security.- Chapter 11: Test-taking Strategies and Tips.- Chapter 12: Conclusion.

Regulärer Preis: 62,99 €
Produktbild für From PHP to Ruby on Rails

From PHP to Ruby on Rails

Are you a PHP developer looking to take your first steps into the world of Ruby development? From PHP to Ruby on Rails will help you leverage your existing knowledge to gain expertise in Ruby on Rails. With a focus on bridging the gap between PHP and Ruby, this guide will help you develop the Ruby mindset, set up your local environment, grasp the syntax, master scripting, explore popular Ruby frameworks, and find out about libraries and gems.This book offers a unique take on Ruby from the perspective of a seasoned PHP developer who initially refused to learn other technologies, but never looked back after taking the leap. As such, it teaches with a language-agnostic approach that will help you feel at home in any programming language without learning everything from scratch. This approach will help you avoid common mistakes such as writing Ruby as if it were PHP and increase your understanding of the programming ecosystem as a whole.By the end of this book, you'll have gained a solid understanding of Ruby, its ecosystem, and how it compares to PHP, enabling you to build robust and scalable applications using Ruby on Rails.

Regulärer Preis: 27,59 €
Produktbild für Das verflixte Selbst

Das verflixte Selbst

Menschen schreiben sich ein Selbst zu. Die Wissenschaften haben Mühe zu sagen, was das ist und wie es zustande kommt. Sie sind sich aber sicher, dass wir es haben und brauchen. Für Forscher ist es jedoch kaum greifbar und deshalb ein verflixtes Problem. Daran wird die Entwicklung einer starken KI scheitern, Menschen bleiben etwas anderes.Einleitung.- Die Stunde Null.- Vorteile der Sterblichkeit.- Die Erfindung des Selbst.- Ohne Selbsttäuschung geht es nicht Nagelprobe.- Moral.- Warum der Liberalismus einen Neustart braucht.

Regulärer Preis: 19,99 €
Produktbild für Die digitale Transformation in der Filmindustrie

Die digitale Transformation in der Filmindustrie

In einer sich ständig wandelnden Welt beleuchtet der Leitfaden die ökonomischen, kulturellen und organisatorischen Aspekte der digitalen Transformation in der Filmindustrie. Es wird untersucht, wie Streaming-Plattformen Geschäftsmodelle beeinflussen und welche Vorteile Produzenten daraus ziehen können. Mit Beiträgen von Alexander Thul und René Jamm, entwickelt im Dialog mit Branchenexperten, bietet das Buch Strategien und Kenntnisse, um in der digitalen Medienlandschaft erfolgreich zu navigieren und von der digitalen Transformation zu profitieren.

Regulärer Preis: 9,99 €
Produktbild für Mapping the Enterprise

Mapping the Enterprise

One of the hardest tasks strategists and enterprise architects face is mapping an enterprise in a form that creates and supports making sense of the whole. This book introduces an alternate approach to create consistency at every level by modelling the enterprise as services with the Enterprise Canvas.This new model type that can be used to describe just about anything in any area and at any level of the enterprise, and that acts as a consistent frame for all the other models that we need in our architectures. It is also simple enough to scribble on the back of a napkin - and engage all of your stakeholders in the enterprise-scale conversations you need. There is also a simple notation for Enterprise Canvas that is suitable for use in service-design toolsets.The book teaches the use of architectural techniques to describe any aspect of the enterprise. It will help you identify the business reasons and business value for every activity, and you will also learn how to align strategy, tactics and operations to enterprise vision and values. By the end of this book, you will understand how an enterprise works as a web of services, and what needs to be done to make your enterprise work in the best possible way.WHAT YOU'LL LEARN* Gain insight into the concepts of service to enhance agility, adaptability and resilience.* Understand how to enhance efficiency and effectiveness throughout the enterprise.* Grasp how an enterprise is made up of services that each serve an overall set of needs WHO THIS BOOK IS FOREnterprise architects, Business architects, IT architects and process designers. TOM GRAVES has been an independent consultant for more than four decades, in systems development, business transformation, enterprise architecture and knowledge management. His clients in Europe, Australasia and the Americas cover a broad range of industries including small-business, banking, utilities, manufacturing, logistics, engineering, media, telecoms, research, defense and government. He has a special interest in whole-enterprise architectures for non-profit, social, government and commercial enterprises.Chapter 1: What is the Enterprise Canvas?.- Chapter 2: The Nature of Service.- Chapter 3: Service Context and Market.- Chapter 4: Service Vision and Values.- Chapter 5: Service Layers.- Chapter 6: Service Actors and Other Entities.- Chapter 7: Service Roles and Relationships.- Chapter 8: Service Structure.- Chapter 9: Service Flows.- Chapter 10: Service Guidance.- Chapter 11: Service investors and Beneficiaries.- Chapter 12: Service Decomposition.- Chapter 13: Service Content.- Chapter 14: Services as Systems.- Chapter 15: Example Patterns.- Chapter 16: Integration with Architectures.- Chapter 17: Rethinking Vision Bottom-up.- Appendix A: Enterprise Canvas – a Visual Summary.- Appendix B: Working with Business Model Canvas.- Appendix C: Enterprise Canvas Notation.- Appendix D: Sources and Resources.

Regulärer Preis: 46,99 €
Produktbild für Learning VMware Workstation for Windows

Learning VMware Workstation for Windows

Master VMware Workstation to create and run virtual machines, containers, and Kubernetes clusters simultaneously on physical devices without having to reformat or dual boot the underlying device. This book provides a practical, step-by-step guide to creating and managing virtual machines using VMware Workstation, a software solution that provides a type-2 hypervisor, or desktop hypervisor, that runs on x64 Windows and Linux-based operating systems. This book focuses on the Windows version.You’ll start with an overview of hypervisors and desktop hypervisors. You'll then look at resources, such as CPU, memory, and networking, and how they are configured in a virtual environment. In the final chapters, you’ll learn how to configure Workstation Pro to run and manage virtual machines before going on to build example virtual machines, including how to build a nested vSphere environment. Once built you’ll see how to manage these virtual machines, before finally upgrading your VMware Workstation Pro environment.In the end, you’ll learn how to build and manage different virtual machines running on different operating systems and build an ESXi lab environment with VMware Workstation.WHAT YOU'LL LEARN* Examine hypervisors and desktop hypervisors* Understand how to install and configure VMware Workstation* Gain practical knowledge on building and managing virtual machines on different OSs* Support and troubleshoot VMware Workstation environments.WHO THIS BOOK IS FORDevelopers, IT professionals that remote, home, and BYODPeter von Oven is an experienced technical consultant working closely with customers, partners, and vendors in designing technology solutions, to meet business needs and deliver outcomes. During his career, Peter has presented at key IT events such as VMworld, IP EXPO, and various VMUGs and CCUG events across the UK. He has also worked in senior presales roles and presales management roles for Fujitsu, HP, Citrix, and VMware, and has been awarded VMware vExpert for the last nine years in a row and vExpert EUC for the last three consecutive years. In 2021, Peter added the vExpert Desktop Hypervisor award to his portfolio of awards. In 2016, Peter founded his own company specializing in application delivery. Today he works with partners and vendors helping drive and deliver innovative technology solutions. He is also an avid author, having now written 18 books and made videos about VMware end-user computing solutions. In his spare time, Peter volunteers as a STEM Ambassador, working with schools and colleges, helping the next generation develop the skills and confidence in building careers in technology. He is also a serving Royal Air Force Reservist working as an instructor with the Air Cadet organization.1. Introduction to hypervisors2. Introduction to VMware Workstation3. Configuring CPU resources4. Configuring Storage Resources5. Configuring Network Resources6. Virtual hardware7. Installing VMware Workstation8. A guided tour of the UI9. Creating a Windows VM10. Installing VMware vSphere11. Configuring VM options12. Managing and working with existing VMs13. Upgrading to a new version of Workstation

Regulärer Preis: 56,99 €
Produktbild für Unleashing The Power of ChatGPT

Unleashing The Power of ChatGPT

Explore the role ChatGPT can play in business, including operations, marketing, sales, and delivery. This concise book illustrates how ChatGPT is changing the way individuals interact with machines and how you can take advantage of its capabilities for business.The book starts with an overview of ChatGPT and its impact in the realm of of conversational AI. You will then dive into the technical aspects of ChatGPT and gain an understanding of how machine learning algorithms and natural language processing work in the background. Various business applications of ChatGPT are then discussed, followed by how it can get integrated into your business operations. To wrap things up, you will gain insight into the data and privacy elements that need to be considered while using ChatGPT, and how to maintain its integrity.After completing this book, you will understand the ChatGPT framework and how to integrate it into your own ventures.WHAT YOU WILL LEARN* Understand the various technologies and techniques utilized in ChatGPT* Gain insight into the future of human-machine interaction* Analyze the advantages and disadvantages of ChatGPT for your industry* Explore the ethical implications of using AI WHO THIS BOOK IS FORTech enthusiasts who are passionate about artificial intelligence (AI), machine learning, and human-machine interaction.CHARLES WAGHMARE has worked for a global energy leader since 2019 as a Business Analyst in the Microsoft 365 space. Before that, he worked at Capgemini for eight years in various roles, including Yammer Community Manager and manager of the Drupal-based Enterprise Knowledge Management system. He also developed a knowledge management platform for the Digital Customer Experience (DCX) organization using SharePoint Online to manage Client references and knowledge assets related to Artificial Intelligence and customer experience (CX), using Microsoft Azure Chatbots to automate processes, develop proactive conversations with users, and create new use cases.Charles also worked for ATOS (erstwhile SIEMENS Information Systems limited) for five years. During his tenure there, he was Community Manager of SAP-based communities, where he utilized Technoweb 2.0 – a Yammer-like platform and on-premises SharePoint. Also, Charles was global rollout manager for a structured document-management system built in on-premises SharePoint.Charles loves reading motivational books in his spare time, his favorite being The Monk who sold his Ferrari.Chapter 1: Introduction to ChatGPT.- Chapter 2: Understand ChatGPT’s Underlying Technology. - Chapter 3: Real World Applications for ChatGPT.-Chapter 4: Enhancing Business Communication with ChatGPT.- Chapter 5: Implementing AI Conversation in Business.- Chapter 6: Security and Ethical Considerations When Using ChatGPT.

Regulärer Preis: 26,99 €
Produktbild für Pro Spring Security

Pro Spring Security

Build and deploy secure Spring Framework and Spring Boot-based enterprise Java applications with the Spring Security Framework. This book explores a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.Pro Spring Security, Third Edition has been updated to incorporate the changes in Spring Framework 6 and Spring Boot 3. It is an advanced tutorial and reference that guides you through the implementation of the security features for a Java web application by presenting consistent examples built from the ground up.This book also provides you with a broader look into Spring security by including up-to-date use cases such as building a security layer for RESTful web services and JSON Web Token applications.WHAT YOU WILL LEARN* Explore the scope of security and how to use the Spring Security Framework* Master Spring security architecture and design * Secure the web tier in Spring * Work with alternative authentication providers* Take advantage of business objects and logic security* Extend Spring security with other frameworks and languages* Secure the service layer* Secure the application with JSON Web TokenWHO THIS BOOK IS FORExperienced Spring and Java developers with prior experience in building Spring Framework or Boot-based applicationsMASSIMO NARDONE has more than 27 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He has been programming and teaching how to program with Android, Perl, PHP, Java, VB, Python, C/C++, and MySQL for more than 27 years. He holds an M.Sc. degree in computing science from the University of Salerno, Italy. Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.His technical skills include Security, OT/IoT/IIoT, Android, Cloud, Java, MySQL, Drupal, Cobol, Perl, web and mobile development, MongoDB, D3, Joomla!, Couchbase, C/C++, WebGL, Python, Pro Rails, Django CMS, Jekyll, and Scratch. He has served as a visiting lecturer and supervisor for exercises at the Networking Laboratory of the Helsinki University of Technology (Aalto University).He stays current to industry and security trends, attending events, being part of a board such as the ISACA Finland Chapter Board, ISF, Nordic CISO Forum, Android Global Forum, etc.He holds four international patents (PKI, SIP, SAML, and Proxy areas). He currently works as a Cyber Security Freelancer for IT/OT and IoT. He has reviewed more than 55 IT books for different publishers and has coauthored Pro JPA 2 in Java EE 8 (Apress, 2018), Beginning EJB in Java EE 8 (Apress, 2018), and Pro Android Games (Apress, 2015).CARLO SCARIONI is a passionate software developer, motivated by learning and applying innovative and interesting software development tools, techniques, and methodologies. He has worked for more than 18 years in the field and moved across multiple languages, paradigms, and subject areas. He also has many years of experience working with Java and its ecosystem. He has been in love with Spring since the beginning and he is fascinated by how Spring allows building complex applications out of discrete, focused modules and by the clever use of decorators to add cross-cutting functionalities. In the last few years he has been working mostly with data engineering solutions. He has been creating solutions around the use of modern data stack components in cloud environments, while at the same time developing software using technologies such as Spark, Python, and others.

Regulärer Preis: 56,99 €
Produktbild für Symmetric Cryptography, Volume 1

Symmetric Cryptography, Volume 1

Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components and their most relevant constructions. Second, it describes and provides insights on the most popular cryptanalysis and proof techniques for analyzing the security of the above algorithms. A selected number of future directions, such as post-quantum security or design of ciphers for modern needs and particular applications, are also discussed.We believe that the two volumes of this work will be of interest to researchers, to master’s and PhD students studying or working in the field of cryptography, as well as to all professionals working in the field of cybersecurity.CHRISTINA BOURA is an associate professor at the University of Versailles, France, who works on symmetric cryptography. She is a well-recognized member of the cryptographic community, having served on many program committees and as editor-in-chief of the ToSC IACR journal.MARÍA NAYA-PLASENCIA is a research director at Inria, France, who also works on symmetric cryptography. She obtained an ERC grant in 2016 and the Young Researcher Prize from Inria-Académie des Sciences in 2019, and has given several invited keynote talks.Preface xiChristina BOURA and María NAYA-PLASENCIAPART 1 DESIGN OF SYMMETRIC-KEY ALGORITHMS 1CHAPTER 1 INTRODUCTION TO DESIGN IN SYMMETRIC CRYPTOGRAPHY 3Joan DAEMEN1.1 Introduction 31.2 Cryptographic building blocks 31.2.1 The block cipher and its variants 41.3 Differentially uniform functions 51.4 Arbitrary-length schemes 51.4.1 Modes and constructions 61.4.2 Dedicated schemes 71.4.3 Modes and constructions versus primitives 71.5 Iterated (tweakable) block ciphers and permutations 81.5.1 Cryptanalysis and safety margin 81.5.2 Designing the round function of primitives 91.6 A short history 101.6.1 The data encryption standard 101.6.2 The block cipher FEAL 111.6.3 Differential and linear cryptanalysis 111.6.4 The block cipher IDEA 121.6.5 The advanced encryption standard 121.6.6 Cache attacks 131.6.7 KECCAK 141.6.8 Lightweight cryptography 151.7 Acknowledgments 151.8 References 15CHAPTER 2 THE DESIGN OF STREAM CIPHERS 21Chaoyun LI and Bart PRENEEL2.1 Introduction 212.1.1 What is a synchronous additive stream cipher? 212.1.2 Generic construction 232.1.3 Generic attacks 242.1.4 Open competitions 252.1.5 Standards 262.2 Constructions based on FSRs 272.2.1 LFSR-based constructions 272.2.2 NFSR-based constructions 282.3 Table-based constructions 292.4 Block ciphers and permutations in stream cipher mode 292.4.1 Block cipher modes OFB and CTR 302.4.2 Permutations in stream cipher mode 302.5 Authenticated encryption (AE) 312.5.1 Block ciphers and permutations in stream cipher modes 322.6 Emerging low-complexity stream ciphers 332.7 References 34CHAPTER 3 BLOCK CIPHERS 39Orr DUNKELMAN3.1 General purpose block ciphers 413.1.1 Feistel block ciphers 423.1.2 Substitution permutation networks 433.2 Key schedule algorithms 443.3 Generic attacks 463.4 Tweakable block ciphers 483.5 Some positive results concerning security 493.6 The case of algebraic ciphers 513.7 References 53CHAPTER 4 HASH FUNCTIONS 55Gilles VAN ASSCHE4.1 Definitions and requirements 554.1.1 An ideal model: the random oracle 574.1.2 Expressing security claims 584.2 Design of hash functions 604.2.1 The Merkle-Damgård construction 604.2.2 Fixing the Merkle-Damgård construction 614.2.3 Building a compression function 624.2.4 Indifferentiability 644.2.5 The sponge construction 654.2.6 KECCAK, SHA-3 and beyond 674.3 Tree hashing 684.4 References 69CHAPTER 5 MODES OF OPERATION 73Gaëtan LEURENT5.1 Encryption schemes 735.1.1 Cipher block chaining 745.1.2 Counter mode 755.2 Message authentication codes 755.2.1 CBC-MAC 765.2.2 PMAC 775.2.3 Hash-based MACs 775.2.4 Wegman-Carter MACs and GMAC 785.3 Security of modes: generic attacks 785.3.1 The birthday bound 795.3.2 Generic attack against iterated MACs 795.3.3 Generic attack against Wegman-Carter MACs 805.3.4 Generic attack against CBC 805.3.5 Generic attack against CTR 805.3.6 Small block sizes 815.3.7 Misuse 815.3.8 Limitations of encryption 825.4 References 83CHAPTER 6 AUTHENTICATED ENCRYPTION SCHEMES 87Maria EICHLSEDER6.1 Introduction 876.2 Security notions 886.3 Design strategies for authenticated encryption 896.3.1 Generic composition 916.3.2 Dedicated primitive-based designs 926.3.3 Fully dedicated designs 946.3.4 Standards and competitions 956.4 References 96CHAPTER 7 MDS MATRICES 99Gaëtan LEURENT7.1 Definition 997.1.1 Differential and linear properties 1007.1.2 Near-MDS matrices 1017.2 Constructions 1017.3 Implementation cost 1027.3.1 Optimizing the implementation of a matrix 1037.3.2 Implementation of the inverse matrix 1047.4 Construction of lightweight MDS matrices 1047.4.1 Choice of the field or ring 1057.4.2 MDS matrices with the lowest XOR count 1057.4.3 Iterative MDS matrices 1067.4.4 Involutory MDS matrices 1077.5 References 108CHAPTER 8 S-BOXES 111Christina BOURA8.1 Important design criteria 1138.1.1 Differential properties 1138.1.2 Linear properties 1158.1.3 Algebraic properties 1168.1.4 Other properties 1178.2 Popular S-boxes for different dimensions 1178.2.1 S-boxes with an odd number of variables 1188.2.2 4-bit S-boxes 1188.2.3 8-bit S-boxes 1198.3 Further reading 1198.4 References 119CHAPTER 9 RATIONALE, BACKDOORS AND TRUST 123Léo PERRIN9.1 Lifecycle of a cryptographic primitive 1249.1.1 Design phase 1249.1.2 Public cryptanalysis 1259.1.3 Deployment? 1259.1.4 The limits of this process 1269.2 When a selection process fails 1269.2.1 Under-engineered algorithms 1279.2.2 Primitives with hidden properties 1289.3 Can we trust modern algorithms? 1319.3.1 Standardization and normalization 1319.3.2 Some rules of thumb 1329.4 References 133PART 2 SECURITY PROOFS FOR SYMMETRIC-KEY ALGORITHMS 135CHAPTER 10 MODELING SECURITY 137Bart MENNINK10.1 Different types of adversary models 13710.2 When is an attack considered successful? 13810.3 Random oracle 13810.4 Distinguishing advantage 13910.5 Understanding the distinguishing advantage 14110.5.1 Adversarial complexity 14110.5.2 Claiming security 14210.5.3 Breaking claims 14310.6 Adaptation to block ciphers 14310.6.1 Distinguishing advantage 14410.6.2 Security of AES 14510.7 Acknowledgments 14610.8 References 146CHAPTER 11 ENCRYPTION AND SECURITY OF COUNTER MODE 147Bart MENNINK11.1 Block encryption 14711.1.1 Padding 14811.1.2 Cipher block chaining 14911.2 Stream encryption 15011.2.1 Output feedback mode 15111.2.2 Counter mode 15211.3 Provable security of modes: the case of counter mode 15311.4 Acknowledgments 15611.5 References 156CHAPTER 12 MESSAGE AUTHENTICATION AND AUTHENTICATED ENCRYPTION 159Tetsu IWATA12.1 Message authentication 15912.1.1 WCS construction 16012.1.2 Provable security 16112.2 Authenticated encryption 16412.2.1 GCM, Galois/counter mode 16412.2.2 Provable security 16612.3 References 169CHAPTER 13 H-COEFFICIENTS TECHNIQUE 171Yannick SEURIN13.1 The H-Coefficients technique 17113.2 A worked out example: the three-round Feistel construction 17613.3 The Even-Mansour construction 17813.3.1 H-coefficients security proof 17913.3.2 Extension to multiple rounds 18113.4 References 182CHAPTER 14 CHI-SQUARE METHOD 183Mridul NANDI14.1 Introduction 18314.2 Preliminaries 18514.2.1 PRF-security definition 18514.2.2 Hypergeometric distribution 18614.3 Truncation of random permutation 18714.3.1 PRF-security of truncation 18814.4 XOR of random permutations 19014.5 Other applications of the chi-squared method 19214.6 Acknowledgments 19314.7 References 193PART 3 APPENDICES 195Appendix 1 Data Encryption Standard (DES) 197Christina BOURAAppendix 2 Advanced Encryption Standard (AES) 205Christina BOURA and Orr DUNKELMANAppendix 3 PRESENT 217Christina BOURAAppendix 4 KECCAK 223Christina BOURAList of Authors 231Index 233Summary of Volume 2 239

Regulärer Preis: 142,99 €
Produktbild für Hands-on Test-Driven Development

Hands-on Test-Driven Development

Learn to properly test Ruby and Ruby on Rails applications by first writing failing tests, and then by implementing application code to make the failing tests pass. This book will teach you how to employ test-driven development (TDD) using RSpec while building a blog from start to finish. By the end of the book, you will be ready to deploy their fully tested blog to their own production web server using the latest versions of Ruby 3 and Ruby on Rails 7.The biggest challenge with learning and becoming comfortable with test-driven development is that software engineers often cannot imagine what writing a failing test looks like in practice. They write their implementation code first, and only then think about writing tests around their implementation code. This leads to tests that pass by accident, or tests that do not actually test anything. This book will give you the confidence to write tests in the RSpec domain-specific language. You will see your tests fail "properly" before proceeding with writing any implementation code to get them to pass.This book covers the latest techniques for writing RSpec tests, including "system" specs, and the often overlooked "view" specs, and how to integrate RSpec with other tools like Capybara, headless Chrome, and the new web driver gem. It also covers FactoryBot for mock test data and offers experienced advice on how to avoid creating tests that fail randomly.WHAT YOU WILL LEARN* Build a blog application from start to finish using test driven development* Install and explore popular tools used in professional Ruby software engineering* Evaluate the benefits of effective testing in RSpec* Explore Capistrano for advanced user interface testingWHO IS THIS BOOK FORBeginner to intermediate Ruby software engineers who are interested in learning to use TDD with RSpec to test and build web applications using Ruby on Rails. Readers should have some basic experience with Ruby and Ruby on Rails and have read the "Getting Started with Rails" guide, or something similar. GREG DONALD has been a professional software engineer since 1996 and has worked with Ruby on Rails since 2006. Prior to that, he worked on many Perl and PHP projects, often finding the lack of tests made them hard to maintain and extend. After having seen the results of software written using different testing methods, he became a test driven development enthusiast and practitioner, determining no other method would ever be more successful in producing quality software than TDD. He decided to write this book to promote TDD and share his positive experiences using it.Chapter 1: Intro.- Chapter 2: What is Test-Driven Development?.- Chapter 3: Getting started with Ruby.- Chapter 4: Getting started with Ruby on Rails.- Chapter 5: Setting up RSpec and FactoryBot.- Chapter 6: Adding Initial Models.- Chapter 7: Creating Pages.- Chapter 8: Build Homepage Contents.- Chapter 9: Side Bar Contents.- Chapter 10: Page Tags.- Chapter 11: Images.- Chapter 12: User Authentication.- Chapter 13: Administration.- Chapter 14: Odds and Ends.- Chapter 15: Deploy to Production.

Regulärer Preis: 56,99 €