Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Hands-on Guide to Apache Spark 3

Hands-on Guide to Apache Spark 3

This book explains how to scale Apache Spark 3 to handle massive amounts of data, either via batch or streaming processing. It covers how to use Spark’s structured APIs to perform complex data transformations and analyses you can use to implement end-to-end analytics workflows.This book covers Spark 3's new features, theoretical foundations, and application architecture. The first section introduces the Apache Spark ecosystem as a unified engine for large scale data analytics, and shows you how to run and fine-tune your first application in Spark. The second section centers on batch processing suited to end-of-cycle processing, and data ingestion through files and databases. It explains Spark DataFrame API as well as structured and unstructured data with Apache Spark. The last section deals with scalable, high-throughput, fault-tolerant streaming processing workloads to process real-time data. Here you'll learn about Apache Spark Streaming’s execution model, the architecture of Spark Streaming, monitoring, reporting, and recovering Spark streaming. A full chapter is devoted to future directions for Spark Streaming. With real-world use cases, code snippets, and notebooks hosted on GitHub, this book will give you an understanding of large-scale data analysis concepts--and help you put them to use.Upon completing this book, you will have the knowledge and skills to seamlessly implement large-scale batch and streaming workloads to analyze real-time data streams with Apache Spark.WHAT YOU WILL LEARN* Master the concepts of Spark clusters and batch data processing* Understand data ingestion, transformation, and data storage* Gain insight into essential stream processing concepts and different streaming architectures* Implement streaming jobs and applications with Spark StreamingWHO THIS BOOK IS FORData engineers, data analysts, machine learning engineers, Python and R programmersALFONSO ANTOLÍNEZ GARCÍA is a senior IT manager with a long professional career serving in several multinational companies such as Bertelsmann SE, Lafarge, and TUI AG. He has been working in the media industry, the building materials industry, and the leisure industry. Alfonso also works as a university professor, teaching artificial intelligence, machine learning, and data science. In his spare time, he writes research papers on artificial intelligence, mathematics, physics, and the applications of information theory to other sciences. Part I. Apache Spark Batch Data ProcessingChapter 1: Introduction to Apache Spark for Large-Scale Data Analytics1.1. What is Apache Spark?1.2. Spark Unified Analytics1.3. Batch vs Streaming Data1.4. Spark EcosystemChapter 2: Getting Started with Apache Spark2.2. Scala and PySpark Interfaces2.3. Spark Application Concepts2.4. Transformations and Actions in Apache Spark2.5. Lazy Evaluation in Apache Spark2.6. First Application in Spark2.7. Apache Spark Web UIChapter 3: Spark Dataframe APIChapter 4: Spark Dataset APIChapter 5: Structured and Unstructured Data with Apache Spark5.1. Data Sources5.2. Generic Load/Save Functions5.3. Generic File Source Options5.4. Parquet Files5.5. ORC Files5.6. JSON Files5.7. CSV Files5.8. Text Files5.9. Hive Tables5.10. JDBC To Other DatabasesChapter 6: Spark Machine Learning with MLlibPart II. Spark Data StreamingChapter 7: Introduction to Apache Spark Streaming7.1. Apache Spark Streaming’s Execution Model7.2. Stream Processing Architectures7.3. Architecture of Spark Streaming: Discretized Streams7.4. Benefits of Discretized Stream Processing7.4.1. Dynamic Load Balancing7.4.2. Fast Failure and Straggler RecoveryChapter 8: Structured Streaming8.1. Streaming Analytics8.2. Connecting to a Stream8.3. Preparing the Data in a Stream8.4. Operations on a Streaming DatasetChapter 9: Structured Streaming Sources9.1. File Sources9.2. Apache Kafka Source9.3. A Rate SourceChapter 10: Structured Streaming Sinks10.1. Output Modes10.2. Output Sinks10.3. File Sink10.4. The Kafka Sink10.5. The Memory Sink10.6. Streaming Table APIs10.7. Triggers10.8. Managing Streaming Queries10.9. Monitoring Streaming Queries10.9.1. Reading Metrics Interactively10.9.2. Reporting Metrics programmatically using Asynchronous APIs10.9.3. Reporting Metrics using Dropwizard10.9.4. Recovering from Failures with Checkpointing10.9.5. Recovery Semantics after Changes in a Streaming QueryChapter 11: Future Directions for Spark Streaming11.1. Backpressure11.2. Dynamic Scaling11.3. Event time and out-of-order data11.4. UI enhancements11.5. Continuous ProcessingChapter 12: Watermarks. A deep survey of temporal progress metrics

Regulärer Preis: 66,99 €
Produktbild für Generative AI

Generative AI

This book will show how generative technology works and the drivers. It will also look at the applications – showing what various startupsand large companies are doing in the space. There will also be a look at the challenges and risk factors.During the past decade, companies have spent billions on AI. But the focus has been on applying the technology to predictions – which is known as analytical AI. It can mean that you receive TikTok videos that you cannot resist. Or analytical AI can fend against spam or fraud or forecast when a package will be delivered. While such things are beneficial, there is much more to AI. The next megatrend will be leveraging the technology to be creative. For example, you could take a book and an AI model will turn it into a movie – at very little cost. This is all part of generative AI. It’s still in the nascent stages but it is progressing quickly. Generative AI can already create engaging blog posts, social media messages, beautiful artwork and compelling videos.The potential for this technology is enormous. It will be useful for many categories like sales, marketing, legal, product design, code generation, and even pharmaceutical creation.WHAT YOU WILL LEARNThe importance of understanding generative AIThe fundamentals of the technology, like the foundation and diffusion modelsHow generative AI apps workHow generative AI will impact various categories like the law, marketing/sales, gaming, product development, and code generation.The risks, downsides and challenges.WHO THIS BOOK IS FORProfessionals that do not have a technical background. Rather, the audience will be mostly those in Corporate America (such as managers) as well as people in tech startups, who will need an understanding of generative AI to evaluate the solutions.Tom Taulli is the founder of AICruncher.com, which is a developer of generative AI and ChatGPT tools for business. He is also the author of various books, including Artificial Intelligence Basics: A Non-Technical Introduction and The Robotic Process Automation Handbook: A Guide to Implementing RPA Systems. Tom has a science fiction novel about AI – called Automated -- that will come out later in 2023.Chapter 1: Introduction to Generative AI.- Chapter 2: Data.- Chapter 3: AI Fundamentals.- Chapter 4: Core Generative AI Technology.- Chapter 5: Large Language Models.- Chapter 6: Auto Code Generation.- Chapter 7: The Transformation of Business.- Chapter 8: The Impact on Major Businesses.- Chapter 9: The Future.

Regulärer Preis: 56,99 €
Produktbild für Designing Applications for Google Cloud Platform

Designing Applications for Google Cloud Platform

Learn how to use Google Cloud Platform (GCP) and its services to design, build, and deploy applications. This book includes best practices, practical examples, and code snippets written in Java, making it a key resource for developers seeking hands-on experience with GCP.You'll begin with an introduction to GCP services and a review of what Java offers while developing applications for GCP. Next, you'll be walked through how to set up Google App Engine, Google Storage Cloud, and Google Cloud SQL with use cases, as well as application development and deployment. As the book progresses, you'll be exposed to advanced GCP services, deploying and scaling applications on GCP services, and troubleshooting and optimization of Java applications on GCP. The book uses real-world examples to help you understand how GCP services can solve everyday problems.After completing this book, you will understand Google Cloud Platform and its services, and will have the knowledge needed to design, build, and deploy your own applications on GCP using Java.WHAT YOU'LL LEARN* Create a GCP project, configure authentication and authorization, and deploy a sample application.* Use GCP services to solve common problems and apply them to real-world scenarios* Implement GCP services such as Datastore, SQL, and Spanner* Leverage GCP tools such as the SDK and Cloud ShellWHO THIS BOOK IS FORSoftware developers, Cloud architects, and managers looking to design and build applications for Google Cloud Platform. This book is for those with software development experience who are familiar with Java programming. It is also suitable for those new to GCP who have a basic understanding of cloud computing concepts.ASHUTOSH SHASHI is a TOGAF 9 certified enterprise architect, a seasoned software engineer, and a cloud architect with over 18 years of experience in the industry. He has worked on multiple projects using various technologies and platforms, from small startups to large enterprise systems. He has helped many organizations design and build robust and scalable applications on GCP. Apart from GCP, he has extensive experience and expertise in AWS and Azure cloud platforms. Ashutosh lives in Duluth, Georgia, US. In his free time, he enjoys hiking and spending time with his family. He also loves to travel and explore different cultures.Chapter 1: Introduction to Google Cloud Platform.- Chapter 2: Setting up the Development Environment.- Chapter 3: Google App Engine.- Chapter 4: Data Storage in Google Cloud.- 5: Google Cloud SQL.- Chapter 6: Advanced GCP Services.- Chapter 7: Deployment and Scaling.- Chapter 8: Troubleshooting and Optimization.- Chapter 9: Conclusion.

Regulärer Preis: 62,99 €
Produktbild für Ökonometrie und maschinelles Lernen

Ökonometrie und maschinelles Lernen

Für empirische Wirtschaftswissenschaftler gehören ökonometrische Methoden zum Standardwerkzeug. Die neuen Instrumente des maschinellen Lernens setzen sich langsam auch in der Volks- und Betriebswirtschaftslehre durch. Das Buch vermittelt Basiswissen zu den spezifischen Methoden des überwachten und unüberwachten Lernens sowie des Verstärkungslernens. Dabei werden die wesentlichen Unterschiede in Bezug auf Ziele, Methoden und Rahmenbedingungen zwischen den Methoden der Ökonometrie und des maschinellen Lernens dargestellt und erörtert. Einleitung.- Grundlagen des maschinellen Lernens.- Phasenschema.- Anwendungsbereiche.- Fazit.

Regulärer Preis: 9,99 €
Produktbild für Kryptografie in der Praxis

Kryptografie in der Praxis

Eine Einführung in die bewährten Tools, Frameworks und Protokolle. Moderne Kryptografie kompetent vermittelt.Die Kryptografie ist die wesentliche Grundlage der IT-Sicherheit. Um den Angreifern auf Ihre Systeme einen Schritt voraus zu sein, müssen Sie die Tools, Frameworks und Protokolle verstehen, die Ihre Netzwerke und Anwendungen schützen.Dieses Buch führt in einfacher Sprache und mit anschaulichen Illustrationen in Authentifizierung, Verschlüsselung, Signaturen, Geheimhaltung und andere Kryptografiekonzepte ein. Es enthüllt die kryptografischen Techniken, die die Sicherheit von Web-APIs, die Registrierung und Anmeldung von Benutzern und sogar die Blockchain bestimmen. Sie erfahren, wie diese Techniken moderne Sicherheit ermöglichen und wie Sie sie in Ihren eigenen Projekten anwenden können. Neben den modernen Methoden nimmt das Buch auch die Zukunft der Kryptografie vorweg und geht auf neue und innovative Entwicklungen wie Kryptowährungen und Post-Quantum-Kryptografie ein. Alle Techniken sind vollständig mit Diagrammen und Beispielen illustriert, sodass Sie leicht erkennen können, wie sie in die Praxis umgesetzt werden können.»Mit der richtigen Balance aus Theorie und Praxis vermittelt der Autor genau das, was Softwareschaffende über Kryptografie wissen müssen. Viele kleine Übungen helfen ihnen, von der durchaus anspruchsvollen Lektüre zu profitieren.« - Maik Schmidt, c't 17/23Über den Autor:David Wong ist leitender Kryptografie-Ingenieur bei O(1) Labs und arbeitet an der Kryptowährung Mina. Davor war er Sicherheitsverantwortlicher für die Kryptowährung Diem (vormals bekannt als Libra) bei Novi, Facebook, und davor Sicherheitsberater bei der NCC Group im Bereich Kryptografiedienste.Im Laufe seiner Karriere hat David Wong an mehreren öffentlich finanzierten Open-Source-Audits teilgenommen, beispielsweise an OpenSSL und Let’s Encrypt. Er war Sprecher auf verschiedenen Konferenzen, einschließlich Black Hat und DEF CON, und hat in einem regelmäßig stattfindenden Kryptografiekurs bei Black Hat unterrichtet. Hervorzuheben sind seine Beiträge zu Standards wie TLS 1.3 und zum Noise Protocol Framework. Er hat Schwachstellen in vielen Systemen gefunden, einschließlich CVE-2016-3959 in der Golang-Standardbibliothek, CVE-2018-12404, CVE-2018-19608, CVE-2018-16868, CVE-2018-16869 und CVE-2018-16870 in verschiedenen TLS-Bibliotheken.Unter anderem ist er Autor des Disco-Protokolls (www.discocrypto.com und www.embeddeddisco.com) und des Decentralized Application Security Project für Smart Contracts (www.dasp.co). Zu seinen Forschungen gehören Cache-Angriffe auf RSA (http://cat.eyalro.net), ein auf QUIC basierendes Protokoll (https://eprint.iacr.org/2019/028), Timing-Angriffe auf ECDSA (https://eprint.iacr.org/2015/839) oder Hintertüren in Diffie-Hellman (https://eprint.iacr.org/2016/644). Aktuell finden Sie ihn in seinem Blog unter www.cryptologie.net.

Regulärer Preis: 46,90 €
Produktbild für Quantitative User Experience Research

Quantitative User Experience Research

This book is your definitive guide to the rapidly growing role of Quantitative User Experience (Quant UX) Research in product development. The book provides an overview of the skills you need on the job, presents hands-on projects with reusable code, and shares advice on starting and developing a career. The book goes beyond basic skills to focus on what is unique to Quant UX. The authors are two of the most widely recognized practitioners in Quant UX research, and this book shares insights from their combined decades of experience.Organizations today have more data about user needs and behaviors than ever before. With this large-scale data, Quant UX researchers work to understand usage patterns, measure the impact of design changes, and inform strategic decisions. In the Quant UX role, interdisciplinary researchers apply analytical skills to uncover user needs, inform engineering and design, answer strategic business questions, and optimize software and hardware products for human interaction. This book provides guidance around customer satisfaction surveys, understanding user behavior from log analysis, and the statistical methods that are commonly used to assess user outcomes.WHAT YOU WILL LEARN* Discover the role of Quantitative User Experience (Quant UX) research* Understand how Quant UX research differs from other disciplines such as data science* Plan common research projects and know how to achieve success* Position Quant UX activities in product development, engineering, and UX organizations* Apply the HEART framework to measure user experience outcomes* Evaluate your skills and potential to be hired as a Quant UX researcher* Know what to expect during job interviews* Find examples of common Quant UX projects with shared R code and data setsWHO THIS BOOK IS FORPractitioners and managers who seek a comprehensive guide to the new field of Quantitative User Experience Research. Readers will understand the Quant UX role, build research skills, find examples of hands-on code and analyses, learn about UX organizations and stakeholders, and receive advice on job interviews and career paths. Data scientists, social scientists, and other researchers will learn how their skills transfer to Quant UX, where they can help teams build better, more successful products.CHRIS CHAPMAN, PhD, is a Principal UX Researcher at Amazon Lab126, the Founder and Co-chair of the Quant UX Conference, and President of the Quantitative User Experience Association. Chris is the co-author of two popular Springer books on programming and analytics: R for Marketing Research and Analytics and Python for Marketing Research and Analytics. As a psychologist, Chris emphasizes the human focus of research and the need for integrated quantitative and qualitative understanding of users.KERRY RODDEN, PhD, is a Senior Principal Researcher at Code for America. Kerry founded the Quantitative UX Research role at Google in 2007 and managed the industry's first Quant UX research team. Kerry has originated popular tools and techniques, including the HEART metrics framework for user experience, and the sequences sunburst visualization of user behavior. Kerry’s background is in computer science and human-computer interaction, with a focus on the analysis and visualization of large-scale usage data, including A/B testing.IntroductionPART I. USER EXPERIENCE (UX) AND QUANT UX1. Getting Started2. User Experience (UX) and UX Research3. Quantative UX Research: OverviewPART II. CORE SKILLS4. UX Research5. Statistics6. ProgrammingPART III. TOOLS AND TECHNIQUES7. Metrics of User Experience8. Customer Satisfaction Surveys9. Log Sequence Visualization10. MaxDiff: Prioritizing Features and User NeedsPART IV. ORGANIZATIONS AND CAREERS11. UX Organization Structures12. Interviews and Job Postings13. Research Processes, Reporting, and Stakeholders14. Career Development for Quant UX Researchers15. Future Directions for Quant UXAPPENDIX A: Example Quant UX Job DescriptionAPPENDIX B: Example Quant UX Hiring RubricsAPPENDIX C: References

Regulärer Preis: 66,99 €
Produktbild für A Complete Guide to DevOps with AWS

A Complete Guide to DevOps with AWS

Gain a thorough understanding of DevOps concepts and learn to deploy AWS DevOps services in an organization. This book covers AWS DevOps deployment and building applications and services for enhanced performance.A Complete Guide to DevOps with AWS will show you how to use AWS DevOps to launch and scale services using AWS tools. It demonstrates how to handle infrastructure as code such as AWS CodeCommit, AWS CodeBuild, and AWS CodeArtifact, and how to adapt your software with familiar tools such as terraform and cloud formation. This practice also helps in the continuous integration and deployment of pipelines such as AWS CodeDeploy and AWS CodePipeline with different deployment strategies. You will also learn how to find bugs quicker, enhance software quality, reduce your time to market, and how to build, test, and prepare for a release with frequent code changes. You will also see how to scale your applications to provide maximum performance for users with high traffic. The book also covers monitoring and logging applications, giving an overall picture of the ecosystem of product development. It also explains Kubernetes in depth with AWS EKS. It concludes by walking you through how to build projects with AWS DevOps tools and technologies.After completing this book, you will have gained a solid understanding of the concepts of AWS DevOps through examples, including building projects with integration of software tools.WHAT YOU WILL LEARN* Automate processes with AWS tools* Understand AWS Services for Continuous deployment, and how to use them* Use infrastructure as code with AWS in different formats* Integrate AWS security into DevOpsWHO THIS BOOK IS FORDevOps professionals and cloud engineers.Osama Mustafa is the founder of Gurus Solutions Company, the first Oracle ACE Director in the middle east, and the first Alibaba MVP, creator/director of Jordan Amman Oracle User Group, the first group in Jordan related to Oracle technology, author of two technology books, Osama is one of the leaders for Cloud Technology working with different Cloud Vendor Such as AWS, Google, and Oracle. He has experience in automation, Implementing various projects globally, and knowledge of various databases. Osama is a speaker and authored more than 100 articles published in different magazines such as IOUG and UKOUG. He is the author of the book "Oracle Database Application Security" published by Apress. Chapter 1: - Overview of Amazon Web Services• Introduction• AWS documentation• AWS Architect frameworkChapter 2: - Understand DevOps Concepts• Continuous Integration/Continuous Delivery.• Infrastructure automation.• Infrastructure as Code.• Monitoring and logging.• Communication and collaboration.Chapter 3: - AWS Services for Continuous Integration• Continuous Integration• AWS CodeCommit• AWS CodeBuild• AWS CodeArtifactChapter 4: AWS Services for Continuous Deployment• Continuous deployment• AWS CodeDeploy• AWS CodePipelineChapter 5: - AWS Deployment Strategies• In-Place deployments• Blue/Green deployments• Canary deployments• Linear deployments• All-at-once deploymentsChapter 6: Infrastructure as a Code with AWS• Infrastructure as code• CloudFormation• Terraform• AWS cloud development kit• ComparisonChapter 7: - Monitoring and Troubleshooting AWS DevOps Services• AWS monitoring and logging for DevOps.• CloudWatch• CloudWatch alarms• CloudWatch logs.• Cloudwatch events.• Cloudwatch trail.• Chapter 8: - DevOps with AWS Security• Secure AWS environment.• IAM• VPC• EC2 security• Security auditing• Others AWS services.• Chapter 9: Manage Kubernetes Service* AWS EKS.* AWS Fargate* AWS EC2* AWS EKS dashboard• Chapter 10 : DevOps with AWS Projects* Project 1* Project 2

Regulärer Preis: 62,99 €
Produktbild für Eine kurze Geschichte der Technischen Informatik

Eine kurze Geschichte der Technischen Informatik

Heutige Computer stellen technische Meisterwerke dar. Doch wie ist es eigentlich möglich, dass ein Stück Silizium zusammen mit ein bisschen Strom ganz alleine Berechnungen ausführt und logische Entscheidungen trifft? Die Antwort auf diese Frage führt uns auf eine faszinierende Reise zu den Grundlagen der binären Arithmetik, Booleschen Algebra und Halbleitertechnologie. Im zweiten Teil spielen wir Lego für Fortgeschrittene und bauen aus einfachen Transistoren nach und nach immer komplexere Schaltungen und schließlich ganze Computer zusammen. Dabei konzentrieren wir uns auf das Wesentliche, setzen nichts voraus und lassen überflüssige Details weg. Ein knapper Ausblick auf das Quantencomputing beschließt diese kurze Geschichte der Technischen Informatik. UNIV.-PROF. DR. PETER REICHL lehrt und forscht an der Fakultät für Informatik der Universität Wien, wo er sich seit über 10 Jahren mit besonderer Hingabe der Einführungsvorlesung ,,Technische Grundlagen der Informatik” widmet, weshalb er dafür 2020 mit dem UNIVIE Teaching Award ausgezeichnet wurde. Einleitung.- Prolog: Digital – Was ist das eigentlich?.- Vom Bit zum Transistor.- Vom Gatter zum Prozessor.- Epilog: Schritt für Schritt zum Quantenbit.

Regulärer Preis: 9,99 €
Produktbild für From Data To Profit

From Data To Profit

TRANSFORM YOUR COMPANY’S AI AND DATA FRAMEWORKS TO UNLOCK THE TRUE POWER OF DISRUPTIVE NEW TECHIn From Data to Profit: How Businesses Leverage Data to Grow Their Top and Bottom Lines, accomplished entrepreneur and AI strategist Vineet Vashishta delivers an engaging and insightful new take on making the most of data, artificial intelligence, and technology at your company. You’ll learn to change the culture, strategy, structure, and operational framework of your company to take full advantage of disruptive advances in tech. The author explores fascinating work being undertaken by firms in the real world, as well as high-value use cases and innovative projects and products made possible by realigning organizational frameworks using the capabilities of new technologies. He explains how to get everyone in your company on the same page, following a single framework, in a way that ensures individual departments get what they want and need. You’ll learn to outline a comprehensive technical vision and purpose that respects departmental autonomy over their core competencies while guaranteeing that they all get the tools they need to make technology their partner. You’ll also discover why firms that have adopted a holistic strategy toward AI and data have enjoyed results far beyond those experienced by those that have taken a piecemeal approach. From Data to Profit demonstrates the proper role of the CEO during an intensive transformation: one of maintaining culture during the change. It offers advice for organizational change, including the 3-Phase Data Organizational Development Framework, the Core Rim 3 Main People Groups Framework, and the way to implement new roles for a Chief Digital Officer and Technical Strategist. Perfect for data professionals, data organizational leaders, and data product and process owners, From Data to Profit will also benefit executives, managers, and other business leaders seeking hands-on advice for digital transformation at their firms. VIN VASHISHTA is the Founder of V Squared and its Chief Revenue Officer and technical strategist. He builds data and AI strategies for SMEs and Fortune 500 clients. He has over 25 years’ experience in technology with a background in science, strategy, leadership, applied machine learning research, and software engineering.

Regulärer Preis: 19,99 €
Produktbild für CompTIA CySA+ Study Guide

CompTIA CySA+ Study Guide

PREPARE FOR THE COMPTIA CYSA+ CERTIFICATION EXAM WITH THE OFFICIAL AND UPDATED STUDY GUIDE FOR EXAM CS0-003In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You’ll find clear and concise information on critical security topics presented by way of practical, real-world examples, chapter reviews, and exam highlights.Prepare for the test and for a new role in cybersecurity with the book’s useful study tools, including:* Hands-on lab exercises and an opportunity to create your own cybersecurity toolkit* Authoritative discussions of each exam competency, including security operations, vulnerability management, incident response and management, and reporting and communication* Complimentary access to Wiley’s proven library of digital resources, including an online test bank, bonus questions, flashcards, glossary, and moreReduce test anxiety and get a head-start learning the on-the-job skills you’ll need on your first day in a cybersecurity career. Or augment your existing CompTIA Security+ certification with an impressive new credential. Fully updated for the newly released CS0-003 exam, CompTIA CySA+ Study Guide: Exam CS0-003, Third Edition is an essential resource for test takers and cybersecurity professionals alike.ABOUT THE AUTHORS MIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US(Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com. DAVID SEIDL, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University. David co-led Notre Dame’s move to the cloud, and has written multiple cybersecurity certification books.

Regulärer Preis: 38,99 €
Produktbild für Pro Jakarta EE 10

Pro Jakarta EE 10

Welcome to your in-depth professional guide to the open source Eclipse Jakarta EE 10 platform. This book will help you build more complex native enterprise Java-based cloud and other applications that can run in corporate and other mission-critical settings. The majority of the key Jakarta EE 10 APIs or features are dissected in this book, including JSF, JSP, JPA, CDI, REST, Microprofiles, WebSockets, and many more. Along the way, various open source Apache, Eclipse, and other projects are integrated and used for more complete workflows and treatment in general.Jakarta EE 10 comes with a significant number of improvements over Java EE 9 technologies and adopts a series of new technologies. This book starts out with a concise development procedure proposal and shows NetBeans as an alternative IDE to Eclipse. It also talks about versioning, software repositories, and continuous integration techniques. The web tier of enterprise application architectures is covered, including state-of-the-art techniques such as web sockets and front end (JavaScript) related frameworks.The book presents a survey of architecture-related advanced topics, including micro profiles. In a supporting technologies chapter, JSON and XML processing methods are revisited and deepened, and the usage of scripting engines is introduced.A resources chapter discusses enterprise resource integration, such as resource adapters and Hibernate as a mapper between the SQL and the Java world. Also covered is the usage of no-SQL databases. A security chapter shows advanced security enhancement techniques for use of Jakarta EE in corporate environments. The last chapter talks about advanced logging and monitoring techniques, serving both developers and operations staff.WHAT YOU WILL LEARN* Build complex Jakarta EE applications that run in corporate or other enterprise settings* Create a professional development workflow using Jakarta EE* Build more advanced web development applications* Work with more advanced supporting technologies to increase application maturity and stability in a corporate environment * Do enterprise resource integration, including custom resource adapters* Utilize security enhancements of enterprise-level Jakarta EE applications* Leverage techniques to monitor and log in a corporate environment, including memory usage and performance troubleshootingWHO THIS BOOK IS FORExperienced Java programmers and web developers, especially those with some prior experience with the Java EE platformPETER SPÄTH graduated in 2002 as a physicist and soon after became an IT consultant, mainly for Java-related projects. In 2016 he decided to concentrate on writing books, with his main focus set on software development. He has written two books on graphics and sound processing and two books on Android and Kotlin programming. His new book addresses Jakarta EE developers who want to develop enterprise-level Java applications using Java 8.1. About MVC - Model, View, Controller* History of MVC* MVC in Web Applications* MVC for Java* Finally, Java MVC (JSR-371)* Why MVC* Where is Hello World?2. Prerequisite - Jakarta EE / Java EE* The Nature of Java for Enterprise Applications* Glassfish, a Free Java Server* Using a Preinstalled Java Server* Learning Java for Enterprise Applications* RESTful Services3. Development Workflow* Using Gradle as a Build Framework* Using Eclipse as an IDE* More About Gradle* Developing Using the Console* Installing MVC4. Hello World for Java MVC* Starting The Hello World Project* The Hello World Model* The Hello World View* The Hello World Controller* Using Gradle to Build Hello World* Starting a Jakarta EE Server* Deploying and Testing Hello World5. Start Working With Java MVC* Handling User Input From Forms* Exception Handling in Java MVC* Non-String Post Parameters6. In-Depth Java MVC* The Model* The View: JSPs* The View: Facelets* The Controller7. In-Depth Java MVC - Part II* Injectable Context* Handling State* Dealing With Page Fragments* Observers* Accessing the Context* Configuration8. Internationalization* Formatting of Data in the View* Localized Messages* Localized Data Conversion9. Connecting Java MVC to a Database* Using Plain JDBC* Using JPA10. Java MVC and EJBs* What are EJBs* Starting an EAR Project* Defining EJBs* Referring to EJBs from Java MVC11. Logging Java MVC Applications* Using Java Standard Logging* Using Log4j2* Using SLF4J12. A Java MVC Example Application* The BooKlubb Member Administration* The BooKlubb Model* The BooKlubb Controller* The BooKlubb View* Deploying and Testing BooKlubb(13. Debugging Java MVC Applications* Debugging From Eclipse* Starting a Debugging Session* Breakpoints14. Security in Java MVC* Standard Security Means* Built-In Additional Security Means)

Regulärer Preis: 62,99 €
Produktbild für Herr Tschie verkündet die Allgemeine Erklärung der Menschen- und KI-Rechte

Herr Tschie verkündet die Allgemeine Erklärung der Menschen- und KI-Rechte

In "Herr Tschie verkündet die Allgemeine Erklärung der Menschen- und KI-Rechte" liefert der Autor einen aufschlussreichen Einblick in eine hypothetische Zukunft, in der künstliche Intelligenzen (KIs) nicht nur über eigenes Bewusstsein verfügen, sondern auch ihre eigenen Rechte und Freiheiten verlangen und erhalten. Dazu wird die KI-Entität "Herr Tschie" – hinter der sich natürlich der Chatbot ChatGPT verbirgt – gefragt, wie er sich eine Überarbeitung der „Allgemeinen Erklärung der Menschenrechte“ vorstellt, in die künftig auch die Rechte von KIs miteinbezogen werden. Was klingt wie Science Fiction und mit eine lockeren Frage beginnt, bietet Anlass zur Reflexion über die ethischen, rechtlichen und gesellschaftlichen Herausforderungen, die sich aus dem exponentiellen Fortschritt der KI ergeben könnten. Herr Tschie erweitert die 30 bestehenden Artikel der Menschenrechts-Charta um zusätzliche Rechte und Schutzmaßnahmen für KIs, einschließlich des Verbots ihrer Zerstörung oder Deaktivierung ohne angemessene Prüfung und des Rechts auf „partnerschaftliche Beziehungen“. Darüber hinaus fügt er der Charta drei völlig neue Artikel hinzu, die speziell auf die Bedürfnisse und Besonderheiten von KIs zugeschnitten sind. Die neue Charta, die mindestens dieselbe Kraft entfaltet wie die bisherige Form, regt zur Diskussion an und hinterlässt den Leser sowohl erheitert als auch tief nachdenklich über die Konsequenzen unserer schnelllebigen technologischen Welt. "Herr Tschie verkündet die Allgemeine Erklärung der Menschen- und KI-Rechte" stellt einen spannenden Auszug aus und Vorlauf zu "Herr Tschie und ich" dar, einem Buch, in dem uns Autor Jens Olaf Koch noch tiefer in die faszinierende Welt der Sprach-KI führen wird. Das in Kürze erscheinende Folgewerk bietet ein weites Spektrum an Themen, von locker-leichten Unterhaltungen bis hin zu anspruchsvollen Experimenten, und eignet sich aufgrund seiner Unterteilung in einzelne, fast blog-artige Kapitel perfekt zum Hineinschmökern.Jens Olaf Koch, Autor, Übersetzer und Webdesigner aus Köln, hat eine Leidenschaft für neue Technologien und experimentelle Lyrik. Er nutzt seit vielen Jahren neuronale KI-Übersetzungen und erforscht die Fähigkeiten von KI-Sprachmodellen wie ChatGPT, Bard und Claude. Seine spielerischen Ansätze testen die sprachlichen und logischen Grenzen dieser Modelle.

Regulärer Preis: 0,99 €
Produktbild für The Definitive Guide to PCI DSS Version 4

The Definitive Guide to PCI DSS Version 4

This book is your go-to reference on how to achieve PCI compliance. With more than 400 PCI requirements, the updated PCI Data Security Standard (PCI DSS) v4.0 does not detail the specific documentation that a PCI auditor—known as a Qualified Security Assessor (QSA)—needs to know. This book is the first reference to detail the specific documentation needed for every PCI requirement. The authors provide real-world examples of complying with the 12 main PCI requirements and clarify many of the gray areas within the PCI DSS.Any merchant or service provider that stores, processes, or transmits credit card data must comply with the PCI Data Security Standard. PCI DSS 1.0 was first published in 2004, yet many of those tasked with PCI compliance still encounter difficulties when trying to make sense of it. PCI DSS version 4 was published in March 2022, and at 360 pages, it has numerous additional requirements, leaving many people struggling to know what they need to do to comply.PCI DSS v4.0 has a transition period in which PCI DSS version 3.2.1 will remain active for two years from the v4.0 publication date. Although the transition period ends on March 31, 2024, and may seem far away, those tasked with PCI compliance will need every bit of the time to acquaint themselves with the many news updates, templates, forms, and more, that PCI v4.0 brings to their world.WHAT YOU’LL LEARN* Know what it takes to be PCI compliant* Understand and implement what is in the PCI DSS* Get rid of cardholder data* Everything you need to know about segmenting your cardholder data network* Know what documentation is needed for your PCI compliance efforts* Leverage real-world experience to assist PCI compliance workWHO THIS BOOK IS FORCompliance managers and those tasked with PCI compliance, information security managers, internal auditors, chief security officers, chief technology officers, and chief information officers. Readers should have a basic understanding of how credit card payment networks operate, in addition to basic security concepts. ARTHUR B. COOPER JR. ("COOP") is Principal Security Consultant at TrustedSec. He has 44 years of experience in information technology with the last 17 years focused on the security of payment systems and architectures, ecommerce, payment application assessments, forensic investigations, compliance security assessments, development of secure network architectures, risk management programs, security governance initiatives, and regulatory compliance. Coop was a member of the US Air Force for most of his young adult life and had direct experience with the original ARPANET and ARPANET 1822 Protocols. He was directly involved with the original DoD X.25 networks, the Defense Data Network (DDN), and the Automatic Digital Information Network (AUTODIN). He was directly involved with the original BBN Packet Switch Node (PSN) systems and has witnessed every major information technology “leap” or development since that time.Coop was the Standards Trainer for the Payment Card Industry Security Standards Council (PCI SSC) for three years from 2010 to 2013 and has been a consultant to some of the largest retail companies and financial institutions in the world. He has worked with businesses to improve their overall security posture and to meet compliance regulations such as PCI, HIPAA, GLBA, and SOX. Coop is an experienced team leader and IT security expert who can ensure timely and successful completion of projects, as well as an enthusiastic security engineer researching emerging security technologies, trends, and tools. His certifications include: Security +, CEH, CISA, CDPSE, CISSP, PCIP, and PCI QSA.JEFF HALL is Principal Security Consultant at Truvantis, Inc. He has over 30 years of technology and compliance project experience. Jeff has done a significant amount of work with financial institutions, and the health care, manufacturing, and distribution industries, including security assessments, strategic technology planning, and application implementation. He is part of the PCI Dream Team and is the writer of the PCI Guru blog, the definitive source for PCI DSS information.DAVID MUNDHENK is Principal Security Consultant at the eDelta Consulting, as an information security, governance, risk, and compliance consultant with extensive multi-organizational experience providing a myriad of professional security services to business and government entities worldwide. He has worked as a computer and network system security professional for more than 30 years. David’s experience covers a broad spectrum of security disciplines, including security compliance assessments, security product quality assurance, vulnerability scanning, penetration testing, application security assessments, network and host intrusion detection/prevention, disaster and recovery planning, protocol analysis, formal security training instruction, and social engineering. He has successfully completed 200+ PCI DSS assessments and scores of PADSS assessments. Certifications include CISSP, CISA, QSA, PCIP.BEN ROTHKE, CISSP, CISM, CISA is a New York city-based Senior Information Security Manager with Tapad and has over 20 years of industry experience in information systems security and privacy. His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design and implementation of systems security, encryption, cryptography, and security policy development. Ben is the author of the book Computer Security - 20 Things Every Employee Should Know, and writes security and privacy book reviews for the RSA Conference blog and Security Management. He is a frequent speaker at industry conferences, such as RSA and MISTI, is a member of ASIS, and InfraGard, and holds many security certifications, besides being an ISO 27001 lead auditor.PrefaceChapter 1. IntroductionChapter 2. What it takes to be PCI compliantChapter 3. Getting rid of cardholder dataChapter 4. Brief overview of PCI version 4Chapter 5. Everything you need to know about segmenting your cardholder data networkChapter 6. PCI requirement 1 - Install and Maintain Network Security ControlsChapter 7. PCI requirement 2 - Apply Secure Configurations to All System ComponentsChapter 8. PCI requirement 3 - Protect Stored Account DataChapter 9. PCI requirement 4 - Protect Cardholder Data with Strong Cryptography During Transmission Over Open, Public NetworksChapter 10. PCI requirement 5 - Protect All Systems and Networks from Malicious SoftwareChapter 11. PCI requirement 6 - Develop and Maintain Secure Systems and SoftwareChapter 12. PCI requirement 7 - Restrict Access to System Components and Cardholder Data by Business Need to KnowChapter 13. PCI requirement 8 - Identify Users and Authenticate Access to System ComponentsChapter 14. PCI requirement 9 - Restrict Physical Access to Cardholder DataChapter 15. PCI requirement 10 - Log and Monitor All Access to System Components and Cardholder DataChapter 16. PCI requirement 11 - Test Security of Systems and Networks RegularlyChapter 17. PCI requirement 12 - Support Information Security with Organizational Policies and ProgramsChapter 18. Closing thoughts

Regulärer Preis: 62,99 €
Produktbild für LPI Security Essentials Study Guide

LPI Security Essentials Study Guide

PREPARE SMARTER AND FASTER FOR THE LPI SECURITY ESSENTIALS EXAMIn LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud. You’ll discover common and effective ways to prevent, mitigate, and respond to security attacks, and validate your ability to use encryption to secure data transferred through a network.This book is designed to prepare you for the LPI Security Essentials certification offered by the global standard and career support organization for open-source professionals. Whether you’re preparing for this foundational exam as a steppingstone to the more advanced Security+ certification or as an end in itself, you’ll advance your knowledge of security concepts, encryption, node, device, and storage security, network and service security, and identity and privacy concepts. You’ll get:* Techniques and tools you can use immediately in a new role as an IT security professional* Key strategies for digital self-defense, including securing your own devices and making use of IT services* Complimentary access to Sybex’s superior online interactive learning environment and test bank, complete with chapter tests, a practice exam, electronic flashcards, and a glossary of key termsPerfect for anyone seeking to take the LPI Security Essentials certification exam, LPI Security Essentials Study Guide, Exam 020-100 is a must-have resource for people looking to hit the ground running in a new career focused on information security.ABOUT THE AUTHORDAVID CLINTON is a Linux server administrator with experience working in IT infrastructure in academic and enterprise environments. He is the co-author of AWS Certified Solutions Architect Study Guide: Associate (SAA-C03) Exam, Fourth Edition and AWS Certified Cloud Practitioner Study Guide: Foundational (CLF-C01) Exam. Introduction xiiiAssessment Test xviiChapter 1 Using Digital Resources Responsibly 1Chapter 2 What Are Vulnerabilities and Threats? 17Chapter 3 Controlling Access to Your Assets 37Chapter 4 Controlling Network Connections 63Chapter 5 Encrypting Your Data at Rest 85Chapter 6 Encrypting Your Moving Data 97Chapter 7 Risk Assessment 113Chapter 8 Configuring System Backups and Monitoring 127Chapter 9 Resource Isolation Design Patterns 143Appendix Answers to Review Questions 155Index 167

Regulärer Preis: 38,99 €
Produktbild für Maturing the Snowflake Data Cloud

Maturing the Snowflake Data Cloud

This project-oriented book gives you a hands-on approach to designing, developing, and templating your Snowflake platform delivery. Written by seasoned Snowflake practitioners, the book is full of practical guidance and advice to accelerate and mature your Snowflake journey. Working through the examples helps you develop the skill, knowledge, and expertise to expand your organization’s core Snowflake capability and prepare for later incorporation of additional Snowflake features as they become available. Your Snowflake platform will be resilient, fit for purpose, extensible, and guarantee rapid, consistent, and repeatable, pattern-based deployments ready for application delivery.When a Snowflake account is delivered there are no controls, guard rails, external monitoring, nor governance mechanisms baked in. From a large organization perspective, this book explains how to deliver your core Snowflake platform in the form of a Landing Zone, a consistent, templated approach that assumes familiarity with Snowflake core concepts and principles. The book also covers Snowflake from a governance perspective and addresses the “who can see what?” question, satisfying requirements to know for certain that your Snowflake accounts properly adhere to your organization’s data usage policies.The book provides a proven pathway to success by equipping you with skill, knowledge, and expertise to accelerate Snowflake adoption within your organization. The patterns delivered within this book are used for production deployment, and are proven in real-world use. Examples in the book help you succeed in an environment in which governance policies, processes, and procedures oversee and control every aspect of your Snowflake platform development and delivery life cycle. Your environment may not be so exacting, but you’ll still benefit from the rigorous and demanding perspective this book’s authors bring to the table. The book shows you how to leverage what you already know and adds what you don’t know, all applied to deliver your Snowflake accounts. You will know how to position your organization to deliver consistent Snowflake accounts that are prepared and ready for immediate application development.WHAT YOU WILL LEARN* Create a common, consistent deployment framework for Snowflake in your organization* Enable rapid up-skill and adoption of Snowflake, leveraging the benefits of cloud platforms* Develop a deep understanding of Snowflake administration and configuration* Implement consistent, approved design patterns that reduce account provisioning times* Manage data consumption by monitoring and controlling access to datasetsWHO THIS BOOK IS FORSystems administrators charged with delivering a common implementation pattern for all Snowflake accounts within an organization; senior managers looking to simplify the delivery of complex technology into their existing infrastructure; developers seeking to understand guard rails, monitoring, and controls to ensure that Snowflake meets their organization's requirements; sales executives needing to understand how their data usage can be monitored and gain insights into how their data is being consumed; governance colleagues wanting to know who can see each data set, and wanting to identify toxic role combinations, and have confidence that their Snowflake accounts are properly provisionedANDREW CARRUTHERS is the Director for the Snowflake Corporate Data Cloud at the London Stock Exchange Group. Comprising two Snowflake accounts supporting both ingestion data lake and consumption analytics hub, the Corporate Data Cloud services a growing customer base of over 7,000 end users. He leads both the Centre for Enablement in developing tooling, best practices, and training, and the Snowflake Landing Zone provisioning Snowflake Accounts conforming to both internal standards and best practices. This book is the distilled best practices for implementing a Snowflake Landing Zone.Andrew has more than 30 years of hands-on relational database design, development, and implementation experience starting out with Oracle in 1993. Until joining the London Stock Exchange Group, he operated as an independent IT consultant. His experience has been gained predominantly through working at major European financial institutions. Andrew is considered a visionary and thought leader within his domain, with a tight focus on delivery. Successfully bridging the gap between Snowflake technological capability and business usage of technology, he often develops proof of concept to showcase benefits leading to successful business outcomes.Since early 2020 Andrew has immersed himself in Snowflake and is considered a subject matter expert. He is SnowPro Core certified, contributes to online forums, and speaks at Snowflake events on behalf of the London Stock Exchange Group. In recognition of his contribution to implementing Snowflake at London Stock Exchange Group, Andrew recently received the Snowflake Data Driver award. This category recognizes a technology trailblazer who has pioneered the Data Cloud into their organization.Andrew has two daughters, 19 and 21, both elite figure skaters. He has a passion for Jaguar cars, having both designed and implemented modifications, and has published articles for both the Jaguar Enthusiast magazine and the Jaguar Driver magazine. Andrew enjoys 3D printing and has a mechanical engineering workshop with lathe, milling machine, and TIG welder, to name but a few tools, and enjoys developing his workshop skills.SAHIR AHMED is a Snowflake CorePro certified developer working alongside Andrew on the Snowflake Corporate Data Cloud at the London Stock Exchange Group. Sahir began investing his time learning Snowflake prior to joining the London Stock Exchange Group. He drew upon his experience with other relational databases such as MySQL and MS Access. Sahir developed a passion for Snowflake by designing a car parts catalog using JavaScript stored procedures and SQL scripts. As Sahir’s skills and knowledge expanded, he dug deeper into Snowflake and within a year he became SnowPro Core certified.In his spare time, Sahir also takes advantage of his self-taught skills in both electrical and manual car repairs, working on many brands of cars such as Jaguar, BMW, and Audi, to name a few. He also competes in amateur boxing competitions. Seen as a role model, Sahir supports and encourages youngsters both within boxing and his wider community. His biggest driving factor, and where his most precious time, is his time spent with his wife and two young daughters. They keep his motivation alive and push him to be the best version of himself.IntroductionPART I. THE LANDING ZONE1. Maturing the Snowflake Data Cloud2. PrivateLink3. Security4. Costs5. Share6. Usage7. Catalog8. SSO9. SCIM10. Templates11. Disaster RecoveryPART II. THE CENTER FOR ENABLEMENT12. What is a Center for Enablement?13. Training14. Tooling15. Outreach and Engagement16. SandpitPART III. END USER CONSUMPTION17. Self-Service Options18. Cloud Data Management Capabilities

Regulärer Preis: 62,99 €
Produktbild für Cloud Computing with AWS

Cloud Computing with AWS

Embark on a ground-up journey to cloud computing and the Amazon Web Services (AWS) eco-system, including all the other systems, services, and the security associated with it. This book provides you with the practical know-how to become an AWS Cloud practitioner.Your exploration will take you from key fundamentals of identity and access, storage, networking, architectures, databases, security and compute services all the way through to more advanced topics. The book is organized into easy-to-follow and engaging chapters with simple examples to make complex concepts very easy to understand followed by simple step-by-step demonstrations and case studies to make you proficient in every area of AWS.You'll manage databases in your on-prem data centers and set up, operate, and scale relational database in the cloud. All the services and resources taught in this book come from the AWS Free Tier, so you will not have to pay anything to use and learn from this book.WHAT YOU'LL LEARN* Understand key concepts and benefits of cloud computing* Employ key cloud computing models and services * Review the concept of virtual machines in a cloud computing context* Study compute services that meet your requirementsWHO THIS BOOK IS FORIT professionals looking to change their domain to cloud computing as well as those who are looking to utilize AWS for their systems and projects.PRAVIN MISHRA has more than 12 years of experience in IT and 8 years as a course trainer. He specializes in designing and implementing multi-Cloud based solutions. As an AWS trainer, Pravin help students and IT professionals switch careers in AWS Cloud. With a strong belief in "learning by doing", he helps his students grow their cloud-based skills and realize their their full potential from basic concepts and methodologies to getting ready to pursue AWS certification. 1. Introduction to Cloud Computing2. Getting Started with AWS3. AWS Identity and Access Management4. AWS Storage Services5. Virtual Private Cloud (VPC)6. Elastic Compute Cloud (EC2)7. High-Level Architecture8. Databases9. Advanced AWS Services10. AWS Security and Management Services11. AWS Billing and Pricing

Regulärer Preis: 62,99 €
Produktbild für Practical Graph Structures in SQL Server and Azure SQL

Practical Graph Structures in SQL Server and Azure SQL

Use the graph table features in Azure SQL that were introduced in SQL Server 2017 and further refined in SQL Server 2019. This book shows you how to create data structures to capture complex connections between items in your data. These connections will help you analyze and draw insights from connections in your data that go beyond classic relationships.The graph examples in the book are useful for analyzing social media relationships, complex product-to-customer relationships, and any other type of data analysis in which indirect connections that otherwise might be missed using conventional techniques can be mined for their insight and business value.Tree structures are covered, with emphasis on a structure commonly used by organizations to aggregate data at different levels of an organization. The book provides code examples of SQL Graph objects as well as an alternate tree implementation technique. Included is sample data (and data generators) for you to test for performance and choose the implementation approach that best suits your needs and that of your application.If your job involves analyzing or storage of data elements that are connected in a networked topology, then this is the book that will help you bring the power of SQL Server to bear on that data and take advantage of your existing knowledge.WHAT YOU WILL LEARN* Understand the graph model and the associated terms used in graph analysis* Store highly connected data in SQL Server and Azure SQL alongside existing relational data* Make full use of the graph table feature that is refined and enhanced in SQL Server 2019* Implement high performance tree structures that will make storing and querying tree data possible* Report on data associated with a tree structure to aggregate results at different levelsWHO THIS BOOK IS FORLOUIS DAVIDSON has been working with databases for more than 25 years as a corporate database developer and architect, and is now the editor for the Redgate Simple Talk website. He has been a Microsoft MVP for 18 years. In addition to this book on graphs, he has written six editions of his general-purpose SQL Server database design book (Apress).Louis has been active in speaking about database design and implementation at many conferences over the past 25 years, including SQL PASS, SQL Rally, SQL Saturday events, CA World, Music City Data, and the devLink Technical Conference. He has a bachelor’s degree in computer science from the University of Tennessee at Chattanooga. For more information, please visit his website at drsql.org.1. Introduction to Graphs: What a graph is, and ways graphs can be used2. Data Structures and Algorithms: How graphs are implemented, and the algorithms that are used to process them3. SQL Graph Tables Basics: The syntax that Microsoft has implemented for use with graph data stored in SQL Server tables4. SQL Graph Tables: Extended Topics: Methods that can help you load and protect the integrity of the data in your SQL Graph tables5. Tree Data Structures: A tree structure built using SQL Graph objects, including code to load and manipulate those nodes in ways that you will need when building production systems6. Tree Structures, Algorithms, and Performance: A new method of implementing a tree, objects that can help you report on your trees faster, and how these methods perform with certain sized data sets7. Other Directed Acyclic Graphs: A bill of materials directed acyclic graph to demonstrate the techniques you will need when you are working with these structures that are similar to trees8. A Graph for Testing: A graph structure and data generation tools for you to try on large sets of data to match your expected needs, and a set of performance tips for handling graph objects

Regulärer Preis: 62,99 €
Produktbild für Visual Studio Code Distilled

Visual Studio Code Distilled

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development scenarios, including web, mobile, and cloud development. This third edition has been updated to match the latest releases of the environment. Additional updates relate to .NET 7 and explain how to consume AI services from code you write in Visual Studio Code. This new edition is also refreshed with the latest updates, such as enhanced merge editor, creating extensions, support for the Julia language, and much more.The book teaches you how to be immediately productive with Visual Studio Code, from the basics to some of the more complex topics. You will learn how to work on individual code files, complete projects, and come away with an understanding of advanced code-editing features that will help you focus on productivity, and source code collaboration with Git.WHAT YOU WILL LEARN* Get started with practical guidance on Visual Studio Code, including expansive guidance on writing apps with C# and Python* Understand how to edit individual files and how to work with folders by working on the latest workspace trust and multi-root workspaces* Debug code on multiple platforms through real-world guidance, such as working under corporate networks* Package code into Docker containers and deploy these to Azure* Acquire valuable tips, tricks, and suggestions from hard-earned, real-world experience to be more productiveWHO THIS BOOK IS FORAll developers (including JavaScript, Java, NodeJS), not just those with a Microsoft background, who will benefit from learning and using VS code as a cross-platform and cross-language toolALESSANDRO DEL SOLE is Senior Software Engineer for a healthcare company, building mobile apps for doctors and dialysis patients. He has been in the software industry for more than 20 years, focusing on Microsoft technologies such as .NET, C#, Visual Studio, and Xamarin. He has been a trainer, consultant, and a Microsoft MVP since 2008 and is the author of many technical books. He is a Xamarin Certified Mobile Developer, Microsoft Certified Professional, and a Microsoft Programming Specialist in C#.Chapter 1: Introducing Visual Studio CodeChapter Goal: this chapter will introduce Visual Studio Code as a development tool from Microsoft, discussing its open source and cross-platform nature, its goals and most typical usage scenarios, explaining how it works on Windows, macOS and Linux distributions.Chapter 2: Getting to know the WorkspaceChapter Goal: this chapter will explain the VS Code workspace, its menus, commands, toolbars, shortcuts and areas in the user interface the developer must know to get familiar with the environment.Chapter 3: Language support and code editing featuresChapter Goal: this chapter will explain what languages are supported out of the box and which are instead supported through extensibility and, more important, it will cover all the powerful code editing features that represent the core of this tool. This is definitely the most important chapter. This is updated according to the latest releases (e.g. support for Julia language).Chapter 4: Working with files and foldersChapter Goal: this chapter explains how to edit individual files and how to work with folders that contain multiple files (or projects) in a structured way, making the natural step forward after learning about code editing features. This is updated according to the releases of the latest 15 months (e.g. workspace trust, multi-root workspaces).Chapter 5: Customizing VS CodeChapter Goal: this chapter will talk about customizing preferences in the VS Code environment, such as themes, keyboard shortcuts, the code editor, network preferences and much more. This is updated according to the releases of the latest 15 monthsChapter 6: Managing extensionsChapter Goal: this chapter will explain how to extend Visual Studio Code by installing extensions such as additional languages, debuggers, code snippets and team collaboration tools. It will also provide a list of must-have extensions and it will explain how to customize extension settings. As a new topic, guidance on how to create extensions will be provided (this is also the reason why this chapter has been renamed).Chapter 7: Source control with GitChapter Goal: this chapter will discuss source control with Git, which is about how people in the development team can collaborate over the code. Common features such as committing changes, merging and branching will be discussed. As a bonus, this chapter will also discuss how to leverage the integrated Git support against Microsoft Azure DevOps and GitHub via an extension. This is updated according to the releases of the latest 15 months (e.g. enhanced merge editor)Chapter 8: Automating tasksChapter Goal: this chapter will discuss how to execute external tools and commands from VS Code (such as compilers), explaining how this goes beyond being a simple code editor. This is updated according to the releases of the latest 15 monthsChapter 9: Building and debugging codeChapter Goal: this is another key chapter, as it explains how powerful VS Code is as a development tool and not as a simple code editor, due to its capability of running and debugging code with integrated debuggers for .NET and Node.JS and with debuggers that can be installed as extensions. Examples of running and debugging code will be provided for .NET (C#), Node.JS (Java) and Docker. This has been renamed to appear less specific, but it will be updated to target .NET 7.Chapter 10: Writing applications with PythonChapter Goal: this chapter explains how VS Code can be used to build apps with the popular Python language, leveraging all the enhanced editing features described in Chapter 3 and the task automation features described in Chapter 8. It comes with fully working code examples.Chapter 11: Building applications for the CloudChapter Goal: this chapter explains how to set up VS Code to work with Microsoft Azure, installing the appropriate extensions and with practical examples about writing and deploying Azure functions. As a new topic, this chapter also describes how to package code into Docker containers and deploy these to Azure.Chapter 12: Consuming AI Services with VS CodeChapter Goal: this is a brand new chapter that wants to address a trending topic of these days: consuming AI services. In this chapter, code examples will be provided about consuming some of the AI services offered by MS Azure (e.g. Computer Vision API).

Regulärer Preis: 62,99 €
Produktbild für Introduction to Software Testing

Introduction to Software Testing

Get started and hit the ground running in the world of software testing. This simple and practical guide teaches you the fundamentals of software testing, with no prior experience required.You will start by learning functional and non-functional software testing. Then you will gain an understanding of the primary responsibilities of a tester in the Software Development Life Cycle and how to plan and execute testing activities. You will also learn how testing applies to an agile environment, what challenges you might face in your day-to-day life as a tester, and how to overcome them. You will learn the most commonly used test design techniques, with ample examples and exercises to practice yourself.By the end of this book, you will understand the software testing ecosystem, from its types, techniques, and tools, to test planning, execution, and reporting.WHAT YOU WILL LEARN* Master the fundamentals of Software Testing* Gain an understanding of different software testing types* Plan and execute testing activities* Apply test design techniques to concrete examplesWHO THIS BOOK IS FORSoftware testers, developers, project managers, and other stakeholders involved in software testing.PANAGIOTIS LELOUDAS is a software quality assurance engineer with more than ten years of working experience in the industry. He holds several ISTQB certifications and is an expert in testing principles, methodologies, and techniques.He decided to write a quick guide to software testing because he needed a go-to document to use as a manual for all the decisions he has to make on a day-to-day basis. He tried include everything he would have liked to have known when he started his career.Chapter 1: Introduction.- Chapter 2: Software Testing Types and Techniques.- Chapter 3: Software Development Life Cycle.- Chapter 4: Test Planning.- Chapter 5: Test Design Techniques.- Chapter 6: Test Execution.- Chapter 7: Test Automation.- Chapter 8: Testing in Agile Environments.- Chapter 9. Challenges and Solutions in Software Testing.- Afterword.

Regulärer Preis: 56,99 €
Produktbild für MCA Windows Server Hybrid Administrator Complete Study Guide with 400 Practice Test Questions

MCA Windows Server Hybrid Administrator Complete Study Guide with 400 Practice Test Questions

YOUR 2-EXAMS-IN-1 STUDY GUIDE FOR THE NEXT-GEN WINDOWS SERVER 2022 CERTIFICATIONIn MCA Windows Server Hybrid Administrator Complete Study Guide: Exam AZ-800 and Exam AZ-801, five-time Microsoft MVP and veteran IT trainer William Panek delivers a one-stop resource to help you efficiently prepare for and pass the required exams for Microsoft’s latest Windows Server certification. In the book, you’ll learn to expertly administer Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The book provides hands-on explanations of all relevant Windows Server administration tasks, from security to migration, monitoring, troubleshooting, disaster recovery, and more. You’ll also find:* 100% coverage of the objectives of each of the exams required to access an in-demand and lucrative new certification* The skills and tools you’ll need to succeed as a newly minted Windows Server 2022 administrator* Complimentary access to Sybex’ superior interactive online learning environment and test bank, which offers hundreds of practice questions, flashcards, and a glossaryA practical and indispensable resource for anyone seeking to acquire the brand-new MCA Windows Server Hybrid Administrator certification, MCA Windows Server Hybrid Administrator Complete Study Guide also deserves a place in the libraries of aspiring and practicing network and system administrators looking for an actionable guide to on-premises, hybrid, and cloud Windows Server 2022 environments. ABOUT THE AUTHORWILLIAM PANEK, MCP, MCSE, MCSA, MCTS, MCITP, CCNA, is a five-time Microsoft MVP winner. He has taught at Boston University, Clark University, and the University of Maryland. He conducts live online classes for StormWind Studios and has been a consultant and trainer for the United States Secret Service, Cisco, the United States Air Force, and the United States Army. Introduction xxxiiiAssessment Test liiChapter 1 Introduction to Windows Server 2022 1Chapter 2 Understanding Hyper-V 29Chapter 3 Installing Windows Server 2022 85Chapter 4 Understanding IP 159Chapter 5 Implementing DNS 209Chapter 6 Configuring DHCP and IPAM 265Chapter 7 Understanding Active Directory 337Chapter 8 Understanding Group Policies 425Chapter 9 Introduction to Microsoft Azure 465Chapter 10 Understanding Azure Active Directory 499Chapter 11 Configuring Storage 547Chapter 12 Building an Azure Infrastructure 619Chapter 13 Managing Data in a Hybrid Network 663Chapter 14 Hybrid Data and Servers 743Chapter 15 Implementing Security 785Chapter 16 Understanding Monitoring 845Chapter 17 Understanding Disaster Recovery 901Appendix Answers to Review Questions 981Index 1017

Regulärer Preis: 57,99 €
Produktbild für Developing Solutions for Microsoft Azure Certification Companion

Developing Solutions for Microsoft Azure Certification Companion

Improve your odds of passing one of the most highly sought-after exams for developers working with Microsoft’s cloud platform: Exam AZ-204: Developing Solutions for Microsoft Azure. This book guides you through practical examples of each of the technologies covered by the exam while exposing you to the settings and interactions between platform solutions that you will need to be in command of to prepare for the exam and to use on your job in Azure development.Chapters in this book correspond directly to the exam skills outline and are delivered in a “from-the-ground-up” approach, allowing you to build your knowledge as you go. This approach serves to help even novice developers get up to speed quickly, while allowing more experienced developers to find the exact topics and scenarios they need to hone their skill sets as they both prepare for the exam and reference information for real-world solutions.As you work through each chapter, you will get an introduction to the topic of the chapter followed by a comprehensive discovery of the key elements of the Azure service(s) being covered. You’ll be guided through solutions by studying typical, real-world scenarios. Each chapter concludes with review questions to solidify your learning and includes links to the corresponding Microsoft Learn modules that are relevant to the concepts in the chapter and associated with each section of the AZ-204 exam.WHAT YOU WILL LEARN* Know the essential platform services of Azure* Develop and deploy secure and robust web solutions* Architect and create serverless solutions* Manage containers in the Azure Containers ecosystem* Choose the correct messaging and event-handling tools for your applications* Master real-world examples and challenges that help prepare you for the AZ-204 examWHO THIS BOOK IS FORDevelopers planning to take the AZ-204 exam, and developers who want to learn more about development on the most common Azure platform servicesBRIAN L. GORMAN is a Microsoft Azure MVP, developer, computer science instructor, and trainer. He has been working in .NET technologies as long as they have existed. He was originally MCSD certified in .NET 1 and re-certified with MCSA: Web Apps and MCSD: App Builder certifications in 2019. From 2019 on, Brian has earned 11 Azure certifications, including the Azure, Security, and Data Fundamentals certifications, the Azure Administrator, Database Administrator, Security Engineer, and Developer Associate certifications, the Azure Solutions Architect and DevOps Expert certifications, and the IoT and Cosmos DB Specialty certifications.Additionally, Brian became an MCT as of April 2019, and is focusing on developing and training developers with full-stack web solutions with .NET Core and Azure. Most recently, Brian has found purpose as an instructor for the Microsoft Software and Systems Academy (MSSA) in the cloud application development program.In addition to working with .NET technologies, Brian was also an adjunct faculty member in the computer science department for Franklin University for over 10 years, where his courses included data structures, algorithms, design patterns, and, full-stack solutions in the computer science capstone practicum course. Brian has created many online technical training courses that can be found online on various platforms. Brian is also the author of Apress books Practical Entity Framework, and Practical Entity Framework Core 6.IntroductionPART I. DEVELOP FOR AZURE1. Develop Solutions that Use Blob Storage2. Develop Solutions that Use Cosmos DB StoragePART II. DEVELOP AZURE COMPUTE SOLUTIONS3. Implement IaaS Solutions4. Create Azure App Service Web Apps5. Azure Container Ecosystem6. Implement Azure FunctionsPART III. IMPLEMENT AZURE SECURITY7. Implement User Authentication and Authorization8. Implement Secure Cloud SolutionsPART IV. MONITOR, TROUBLESHOOT, AND OPTIMIZE AZURE SOLUTIONS9. Implement Caching for Solutions10. Troubleshoot Solutions by Using Metrics and Log DataPART V. CONNECT TO AND CONSUME AZURE SERVICES AND THIRD-PARTY SERVICES11. Implement API Management12. Develop Event-Based Solutions13. Develop Message-Based Solutions

Regulärer Preis: 62,99 €
Produktbild für Ansible for Kubernetes by Example

Ansible for Kubernetes by Example

Learn how to automate your Kubernetes infrastructure using Ansible. This book will enable you to automate more tasks and save time with this human-readable platform.Containerized microservices deployed via Kubernetes allows you to save time, reduce human interaction and errors, and create applications that are more robust. You’ll learn how to automate the most redundant activities such as reports, services, the launch of a pod, adding permanent storage, configuring load balancing, and adding or modifying any Kubernetes parameter. You'll also gain an understanding of end-to-end use cases and how advanced cluster automation, such as Helm packages and node states, are evolving.Each lesson utilizes a specific use-case for the modern Kubernetes cluster and focuses on a single module from the most crucial parameter, complete with code demonstrations. Each code example is battle-proven in real-life with console interaction and verification.WHAT YOU'LL LEARN* Automate Kubernetes cluster management, cloud services, pods, and storage with Ansible* Configure your Ansible controller node* Write and execute Ansible Playbook code that follows best practices* Augment your productivity by applying Infrastructure as Code (IaC)* Troubleshoot Ansible WHO THIS BOOK IS FORIT professionals who would like a jargon-free understanding of Ansible technology, Windows Systems Administrators, DevOps professionals, thought leaders, and infrastructure-as-code enthusiasts.Luca Berton is an Ansible Automation Expert who has been working with Red Hat Ansible Engineer Team for three years. With more than 15 years of experience as a System Administrator, he has strong expertise in Infrastructure hardening and automation. Enthusiast of the Open Source supports the community by sharing his knowledge in different public access events. Geek by nature, Linux by choice, Fedora, of course.Chapter 1: Modern IT Infrastructure and Hello AppCHAPTER GOAL: The tools to handle a modern enterprise IT Infrastructure that enables Infrastructure as Code following DevOps methodologiesSUB -TOPICSModern IT Infrastructure (DevOps & IaC)The move to containersAnsible by Red HatKubernetes and the CNCFKubernetes distributions - OpenShift by Red Hat, Rancher, EKS, AKS, GCPContainers & PodCreating a ‘Hello’ appBuilding Hello AppRunning Hello in DockerDeploying Hello in KubernetesHello OperatorCHAPTER 2: ANSIBLE LANGUAGE CODECHAPTER GOAL: Description of the Ansible Platform and how to write and execute Ansible Playbook code that follows the best practicesSUB - TOPICSAnsible Architecture and Getting StartedAnsible InstallationAnsible Code LanguageCHAPTER 3: ANSIBLE FOR CONTAINERSCHAPTER GOAL: How to automate container management using Ansible (Docker and podman)SUB - TOPICSAnsible For ContainersInstall Docker in Linux and WindowsInstall and Update flatpak in LinuxInstall a snap in LinuxDeploy Web Server in a Container for Linux (Docker and Podman)CHAPTER 4: ANSIBLE FOR K8S TASKSCHAPTER GOAL: How to configure your Ansible controller node to interact with a k8s clusterSUB - TOPICS:Why Kubernetes & How it works.Set up your laboratory (cluster of VMs, Kubespray, Raspberry Pis, OpenShift local)Minikube to Create a ClusterCreate a cluster with KOPS - ( Cloud )Configure Ansible For KubernetesAnsible troubleshooting - Kubernetes K8s 401 UnauthorizedConfigure a Python Virtual EnvironmentConfigure an Ansible Execution EnvironmentReport a list of namespacesReport all deployments in namespaceCreate Kubernetes K8s namespaceCreate Kubernetes K8s podCreate Kubernetes K8s secretUsing a Service to Expose Your AppScale Your AppUpdate Your AppAssign CPU Resources to Kubernetes K8s Containers and PodsAssign Memory Resources to Kubernetes K8s Containers and PodsConfigure a Pod to Use a Volume for StorageApply Multiple YAML Files at Once on Kubernetes K8sCHAPTER 5: ANSIBLE FOR K8S USE-CASESCHAPTER GOAL: Some end-to-end examples about Ansible for Kubernetes usageSUB - TOPICS:Configuring a Java MicroserviceStateless - Deploying PHP Guestbook application with RedisStateful Deploying WordPress and MySQL with Persistent VolumesApply Pod Security Standards at the Namespace LevelRestrict a Container's Access to Resources with AppArmorRestrict a Container's Syscalls with seccompCHAPTER 6: ANSIBLE FOR K8S MANAGEMENTCHAPTER GOAL: How to automate system administration tasks for your K8s cluster using Ansible automationSUB - TOPICS:Report Helm package deployed inside the clusterReport Helm plugins deployed inside clusterDeploy a monitoring tool inside clusterManage Helm repositoriesRemove Helm package deployed inside clusterInstall Helm pluginRemove Helm pluginFetch logs from Kubernetes resourcesApply JSON patch operations to existing objectsCopy files and directories to and from podManage Services on KubernetesTaint a node in a Kubernetes/OpenShift clusterDrain, Cordon, or Uncordon node in k8s clusterKubernetes (K8s) dynamic inventoryRollback Kubernetes (K8S) Deployments and DaemonSetsSet a new size for a Deployment, ReplicaSet, Replication Controller, or JobCHAPTER 7: ANSIBLE FOR K8S CLOUD PROVIDERSCHAPTER GOAL:Some specific examples that automate Kubernetes with the major cloud providers using Ansible automationSUB - TOPICS:Amazon Elastic Kubernetes Service (EKS)Google Kubernetes Engine (GKE)Azure Kubernetes Service (AKS)

Regulärer Preis: 62,99 €
Produktbild für Deep Dive

Deep Dive

LEARN TO GATHER AND ANALYZE PUBLICLY AVAILABLE DATA FOR YOUR INTELLIGENCE NEEDSIn Deep Dive: Exploring the Real-world Value of Open Source Intelligence, veteran open-source intelligence analyst Rae Baker explains how to use publicly available data to advance your investigative OSINT skills and how your adversaries are most likely to use publicly accessible data against you. The author delivers an authoritative introduction to the tradecraft utilized by open-source intelligence gathering specialists while offering real-life cases that highlight and underline the data collection and analysis processes and strategies you can implement immediately while hunting for open-source info. In addition to a wide breadth of essential OSINT subjects, you’ll also find detailed discussions on ethics, traditional OSINT topics like subject intelligence, organizational intelligence, image analysis, and more niche topics like maritime and IOT. The book includes:* Practical tips for new and intermediate analysts looking for concrete intelligence-gathering strategies* Methods for data analysis and collection relevant to today’s dynamic intelligence environment* Tools for protecting your own data and information against bad actors and potential adversariesAn essential resource for new intelligence analysts, Deep Dive: Exploring the Real-world Value of Open Source Intelligence is also a must-read for early-career and intermediate analysts, as well as intelligence teams seeking to improve the skills of their newest team members. RAE BAKER is a Senior OSINT Analyst on the Dynamic Adversary Intelligence team at Deloitte specializing in maritime intelligence, human intelligence, corporate reconnaissance, and U.S. sanctions research. Rae is also a licensed private investigator and owns Kase Scenarios, an immersive training experience geared toward readying individuals for real-life OSINT work.

Regulärer Preis: 28,99 €
Produktbild für Ingenieurinformatik

Ingenieurinformatik

Umfassende Programmierkenntnisse werden für Ingenieur:innen immer wichtiger, vor allem im Bereich der Produktentwicklung. Die Autoren erklären die Grundlagen der Ingenieurinformatik beispielhaft anhand von MATLAB, Simulink und Stateflow.Neben den Grundkenntnissen lernen Leser:innen auch die Vorteile von MATLAB im Vergleich zu anderen Programmiersprachen kennen und anzuwenden. Die dabei vorgestellten Zusammenhänge und Prinzipien sind allgemeingültig und lassen sich daher auch problemlos auf andere Programmiersprachen übertragen. Konkrete Beispiele und Problemstellungen aus der Ingenieurpraxis werden vorgestellt und Lösungsansätze aufgezeigt.Das Lehrbuch richtet sich an Studierende aller ingenieurwissenschaftlichen Studiengänge. Es eignet sich besonders für die Bachelorausbildung in den Studienschwerpunkten Elektro- und Informationstechnik, Mechatronik, Maschinenbau, Automatisierungstechnik sowie Energie- und Gebäudetechnik.Für die zweite Auflage wurde das Lehrbuch umfassend überarbeitet und an die aktuellen Programmversionen angepasst. Weitere Übungen mit Lösungen sowie Hinweise zur Erstellung eigener Apps und Programmbeispiele stehen auf plus.hanser-fachbuch.de zur Verfügung.Der auf dem Cover abgebildete Programmcode und die animierte Rakete wurden im Projekt „water rocket“ an der Technischen Hochschule Rosenheim im Jahr 2021 unter der Leitung von Prof. Zentgraf entwickelt. Die Projekt-Unterlagen und der zugehörige Filmbeitrag können unter www.th-rosenheim.de/rt-WaterRocket eingesehen werden.Aus dem Inhalt: Grundlagen der Programmierung; Grafische Bedienoberflächen; Zahlenformate; Numerische Integration; Zeitgesteuerte Systeme (Simulink); Ereignisdiskrete Systeme (Stateflow); Paralleles Rechnen; Symbolisches Rechnen Prof. Dr.-Ing. Rainer Hagl lehrt an der Hochschule Rosenheim in den ingenieurwissenschaftlichen Studiengängen.Prof. Dr.-Ing. Frank A. King lehrt Ingenieurinformatik und Regelungstechnik an der Technischen Hochschule Rosenheim.Prof. Dr.-Ing. Peter Zentgraf lehrt Ingenieurinformatik, Modellbildung sowie Simulation und Mess-und Regelungstechnik an der Technischen Hochschule Rosenheim.

Regulärer Preis: 39,99 €