Allgemein
IBM Software Systems Integration
Examine the working details for real-world Java programs used for system integration with IBM Software, applying various API libraries (as used by Banking and Insurance companies). This book includes the step-by-step procedure to use the IBM FileNet Case Manager 5.3.3 Case Builder solution and the similar IBM System, IBM Business Automation Workflow to create an Audit System.You'll learn how to implement the workflow with a client Java Message Service (JMS) java method developed with Workflow Custom Operations System Step components. Using IBM Cognos Analytics Version 11.2, you'll be able to create new views for IBM Case Manager Analytics for custom time dimensions. The book also explains the SQL code and procedures required to create example Online Analytical Processing (OLAP) cubes with multi-level time dimensions for IBM Case Manager analytics.IBM Software Systems Integration features the most up to date systems software procedures using tested API calls.WHAT YOU WILL LEARN* Review techniques for generating custom IBM JMS code* Create a new custom view for a multi-level time dimension* See how a java program can provide the IBM FileNet document management API calls for content store folder and document replication* Configure Java components for content engine eventsWHO THIS BOOK IS FORIT consultants, Systems and Solution Architects.ALAN BLUCK has over 45 years IT experience. He has been a Solutions Architect for IBM for over 10 years. Elected as an IBM Champion (2022), he is now the Director and owner of ASB Software Development Limited, an IBM PartnerWorld partner, and a consultancy providing systems architecture for a broad range of services. He is a Member of the British Computer Society (MBCS, CITP).Chapter 1IBM FileNet Case Manager 5.3.3 Case Builder Solution Development Steps for The Audit SystemCHAPTER GOAL: Building the initial IBM Case Manager Audit SolutionNO OF PAGES 90SUB -TOPICSSECTIONS* Bill of Materials* Add a new solution* Add properties and Business Objects* Add Roles* Add properties to the Inbaskets for each role* Add Document class* Add Business Objects* Add Business Object Types as Case propertiesAdd Case Types* Audit Department Task* Add Business Objects to be searched* Audit Solution First Test* Remove the Case Search Business Objects* Edit the Cases Page to allow Case Search to work correctly* Debug the Case Manager Client* Check FileNet Version* Check FileNet Health* Check FileNet Object Store Upgrade Status* Check FileNet Workflow Upgrade StatusFix / Workaround for Error on Case Search * Other Fixes (Recommended)Chapter 2: Configuring Java Custom ComponentsCHAPTER GOAL: CREATION AND CONFIGURATION OF THE JAVA CUSTOMISATIONSNO OF PAGES: 20SUB - TOPICSSECTIONS* Configuring Java Components for Content Engine Events* Custom Code Module java JAR API call development* Adding a Code ModuleCreating a Custom Event Object* Configuring Workflow Subscriptions* Configuring Component Manager for WebSphere control* Component Manager Extension MBean Provider* Creating the Component Manager Custom Service* DbExecute system function* Setting DbExecute connections* Example DB2 Stored procedure* Example Oracle Stored procedure* Example SQL*Server Stored procedureChapter 3: IBM JMS (Java Message Service) Interface Development IBM FileNet 5.5.x WorkflowCHAPTER GOAL: Theexample development of a java jar file for the IBM Java Messaging Service calls and its deployment for use in an IBM Case Manager Workflow.NO OF PAGES : 240SUB - TOPICS:* MQ Series 7.5 Install and Configure* Notification of successful repository load into FileNet* Custom Operations Component Development- JMSMessage Operation* Custom Operations Component Development- Fix list for WebSphere MQ Version 7.5* IBM MQ Series 7.x Fix Pack Installation* Linux: Applying maintenance level updates on WebSphere MQ version* Setting up the client on Windows* Setting up the client on Linux* Sending a message from a client to a server* AuditOperations method parameterisation* AuditOperations.java Code Development* AuditOperations re-build and deploy .jar* Final pre-build test AuditOperations.jar* FileNet Workflow System Component AuditOperations.jar deployment* Checking deployment in the Component Manager and Workflow* Transfer Workflow and set up Workflow subscriptionsChapter 4: A Replication Java Program for IBM FileNet Object StoresCHAPTER GOAL: The development of the java API calls and the configuration required to replicate an IBM FileNet Document Management ObjectStore.NO OF PAGES: 100SUB - TOPICS:* Setting up the Creator Property* Setting Object Store Access Rights* Batch Jobs* Required supporting Library .jar files* The Configuration set up file* Encryption of the administrator user password in a config.xml Configuration file* Update of the Config.xml Start Date* Event Set-up * Folder Class - Update Event and Deletion Events* Document Class - Deletion Events* Unit Test results ( New Folder and Document )* Existing Folder Name and Security updatesNew Folder Name and Document updatesChapter 5: Cognos RTM Custom DevelopmentCHAPTER GOAL: Create a new Custom View for a Multi-level Time DimensionNO OF PAGES: 90SUB - TOPICS:SECTIONS* Creation and test of Multilevel Time Dimension for a new OLAP Database* Update to add Year YearNumber and Month* Update to add Hour* Create a new View for Workflow Tasks* Create a new data stream in Cognos RTM – Task Load Data Stream* Create a new Cube including the Multilevel Time Dimension* Case Attribute Review for Exposed Dimensions* Creation and test of Multilevel Time Dimensions* Create a new Multilevel Time Dimension Cube* Average Age Hours* Average Wait Time Hours* Average Processing Time Hours* Average Ready Time Hours* Average Failed Time HoursCHAPTER 6: PDF Document Creation using iTextCHAPTER GOAL: A Java Program to generate PDF document using the iText libraryNO OF PAGES: 20SUB - TOPICS:SECTIONS1. Adding an Image to a PDF2. Adding a Table to a PDF3. Creating a PdfWriter object4. Creating a PdfDocument object5. Creating the Document object6. Creating an Image object7. Adding image to the documentClosing the Document
Pro SQL Server 2022 Wait Statistics
Use this practical guide to analyze and troubleshoot SQL Server performance using wait statistics. You'll learn to identify precisely why your queries are running slowly. And you'll know how to measure the amount of time consumed by each bottleneck so you can focus attention on making the largest improvements first. This edition is updated to cover analysis of wait statistics current with SQL Server 2022. Whether you are new to wait statistics, or already familiar with them, this book provides a deeper understanding on how wait statistics are generated and what they mean for your SQL Server instance’s performance.The book goes beyond the most common wait types into the more complex and performance-threatening wait types. You’ll learn about per-query wait statistics and session-based wait statistics, and the types of problems they can help you solve. The different wait types are categorized by their area of impact, including CPU, IO, Latching, Locking, and many more.Clear examples are included to help you gain practical knowledge of why and how specific wait times increase or decrease, how they impact your SQL Server’s performance, and what you can do to improve performance. After reading this book, you won’t want to be without the valuable information that wait statistics provide regarding where you should be spending your limited tuning time to maximize performance and value to your business.WHAT YOU'LL LEARN* Understand how the SQL Server engine processes requests* Identify resource bottlenecks in a running SQL Server instance* Locate wait statistics information inside DMVs and Query Store* Analyze the root cause of sub-optimal performance* Diagnose I/O contention and locking contention* Benchmark SQL Server performance* Improve database performance by lowering overall wait time WHO THIS BOOK IS FORDatabase administrators who want to identify and resolve performance bottlenecks, those who want to learn more about how the SQL Server engine accesses and uses resources inside SQL Server, and administrators concerned with achieving—and knowing they have achieved—optimal performance__THOMAS LAROCK has over 20 years of IT experience holding roles such as programmer, developer, analyst, and database administrator. He is a Microsoft Certified Master in SQL Server and a Microsoft Data Platform MVP since 2009. Thomas has spent much of his career working with data and databases, which led to his selection as Technical Advocate for Confio Software in 2010 for the software now known as SolarWinds Database Performance Analyzer (DPA).Currently, Thomas serves as Head Geek for SolarWinds, a company specializing in software for enterprise infrastructure monitoring. This role allows him to work with a variety of customers, helping to solve questions regarding network, application, and database performance tuning and virtualization. You can reach him through his blog (thomaslarock.com/blog) and find him on Twitter @SQLRockstar).ENRICO VAN DE LAAR has been working with data in various formats and sizes for over 15 years. He is a data and advanced analytics consultant for Dataheroes where he helps organizations optimize their data platform environment and helps them with their first steps in the world of advanced analytics. He is a Data Platform MVP since 2014 and a frequent speaker on various data-related events throughout the world. He frequently blogs about technologies such as Microsoft SQL Server and Azure Machine Learning on his blog at enricovandelaar.com. You can contact Enrico on Twitter @evdlaar.PART I: FOUNDATIONS OF WAIT STATISTICS ANALYSIS1. Wait Statistics Internals2. Querying SQL Server Wait Statistics3. The Query Store4. Building a Solid BaselinePART II: WAIT TYPES5. CPU-Related Wait Types6. IO-Related Wait Types7. Backup-Related Wait Types8. Lock-Related Wait Types9. Latch-Related Wait Types10. High-Availability and Disaster-Recovery Wait Types11: Preemptive Wait Types12: Background and Miscellaneous Wait Types13. In-Memory OLTP-Related Wait Types14. Appendix I. Example SQL Server Machine Configurations15. Appendix II. Spinlocks16. Appendix III. Latch Classes
Microsoft Conversational AI-Platform für Entwickler
Erstellen Sie einen Chatbot mit der Microsoft Conversational AI-Plattform. In diesem Buch lernen Sie Schritt für Schritt, wie Sie Zeit und Geld sparen können, indem Sie Chatbots in die Strategie Ihres Unternehmens integrieren. Sie werden lernen, wie Sie jede Phase der Entwicklung beherrschen, von der Zusammenarbeit an einem Chatbot in einem End-to-End-Szenario über die erste Mock-up-Phase bis hin zur Einsatz- und Bewertungsphase. Microsoft hat ein Cloud-Service-Ökosystem für die Ausführung von künstlichen Intelligenz-Workloads in öffentlichen Cloud-Szenarien und eine robuste KI-Plattform aufgebaut, die eine breite Palette von Diensten für konversationelle künstliche Intelligenz-Lösungen wie Chatbots bietet. Die Entwicklung eines Chatbots erfordert nicht nur Programmierkenntnisse von Entwicklern, sondern auch besondere Überlegungen, einschließlich des Inputs von Geschäftsinteressenten wie Fachexperten und Power-Usern. Sie werden anhand von Beispielen lernen, wie Sie eine Reihe von Tools und Diensten nutzen können, um die Kluft zwischen Unternehmen und Technik zu überbrücken.Sie werden lernen, wie Sie Geschäftsanforderungen erfolgreich in umsetzbare IT- und technische Anforderungen umwandeln können. Sie lernen den Bot Framework Composer kennen, der es Power-Usern ermöglicht, die Erstellung eines Chatbots zu initiieren, der dann an das Entwicklungsteam weitergegeben werden kann, um durch Code weitere Funktionen hinzuzufügen. Der Prozess der Aufteilung der Implementierungsaufgaben und des Arbeitsaufwands zwischen Power-Usern, die einen Low-Code- oder No-Code-Ansatz verwenden, und Entwicklern, die die erweiterten Funktionen für den Chatbot entwickeln, wird ebenfalls behandelt.Was Sie lernen werden:* Verstehen Sie Microsofts umfassendes KI-Ökosystem und seine Dienste und Lösungen* Erkennen Sie, welche Lösungen und Dienste in jedem Geschäftsszenario angewendet werden sollten* Entdecken Sie No-Code-/Low-Code-Ansätze für die Erstellung von Chatbots* Entwickeln Sie Chatbots unter Verwendung des Conversational AI Stacks* Richten Sie Geschäft und Entwicklung für verbesserte Chatbot-Ergebnisse und kürzere Markteinführungszeiten ausDieses Buch richtet sich an Entwickler und Power-User, die Chatbots erstellen möchten. Ein Verständnis für die Grundprinzipien des Programmierens moderner Webanwendungen (.NET oder JavaScript) wird vorausgesetzt.STEPHAN BISSER ist technischer Leiter bei Solvion und ein Microsoft MVP für künstliche Intelligenz. In seiner aktuellen Rolle konzentriert er sich auf Conversational AI, Microsoft 365 und Azure. Seine Leidenschaft gilt der Conversational AI Plattform und dem Cognitive-Services-Ökosystem. Stephan und mehrere andere MVPs gründeten die Community-Initiativen BotBuilderCommunity und SelectedTech, die sich auf Bot-Framework-SDKs, Tools und technische Themen im Zusammenhang mit Microsoft 365 und KI konzentrieren.Kapitel 1: Einführung in die Microsoft Conversational AI PlatformKapitel 2: Einführung in das Microsoft Bot FrameworkKapitel 3: Einführung in Azure Cognitive ServicesKapitel 4: Gestaltungsprinzipien eines ChatbotsKapitel 5: Aufbau eines ChatbotsKapitel 6: Testen eines ChatbotsKapitel 7: Veröffentlichung eines ChatbotsKapitel 8: Verbinden eines Chatbots mit Kanälen
Connecting the Internet of Things
Navigating the fragmented IoT connectivity ecosystem of standards, protocols, and architectures can be a challenge. Not to mention scaling a solution to a viable product. This book guides you through this fractured landscape with real world examples and projects that can be leverage for an IoT product.Backed by an overview of IoT use cases and key connectivity elements of IoT solutions, you'll gain an understanding of the breadth of the IoT landscape and the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies. You'll also be able to understand the essentials of connectivity including, hardware, software, and business models.IoT is essential for increasing productivity of many industries and quality of life (making the world smart and autonomous). Both wired and wireless connectivity technologies are essential ingredients in an IoT product. Written by Intel engineers and architects, Connecting the Internet of Things understands that connectivity is a key topic of IoT and comprehensively covers the topic from a system engineering and practical perspective.WHAT YOU'LL LEARN* Understand the trade offs between different wireless technologies and network topologies* Use wireless technologies in IoT products* Examine connectivity technologies and considerations on selecting it for the IoT use cases* Assemble all of the components of a working solution * Scale your solution to a product* Review emerging connectivity technologies for addressing new use cases* Advance and optimize the performance of existing technologiesWHO THIS BOOK IS FORResearchers, managers, strategists, technologists, makers, and students in the embedded and Internet of Things (IoT) space trying to understand and implement connectivity in the devices/platforms.ANIL KUMAR is a Principal Engineer at Intel Corporation. As a System Architect in the Client Computing Group, he works with Intel’s partners to unlock people’s potential by bringing computing devices to market, allowing them to focus, create and connect in ways that matter most to them. Before this role, Anil was responsible for the Connectivity Platform Architecture in the Internet of Things Group (IOTG). In IOTG, he successfully drove platform and chip-level integration of several critical connectivity and communication technologies, resulting in a broad set of IoT applications across different vertical markets.Anil joined Intel in 2007 as a design engineer in the Digital Home Group. He served as Platform Architect for several Intel Architecture-based Media Processors for TV and Set Top Box applications. As the chief architect in Intel Media Group, Anil led several designs that resulted in award-winning consumer electronic device designs at CES (Consumer Electronics Show). The world’s first Google TV devices are based on reference designs created by Anil.Before joining Intel, Anil held design engineering positions at multinational companies such as Fujitsu & Alcatel. Anil’s passion and purpose is driven by taking designs from concept to production. Anil is a co-author of Demystifying Internet of Things Security (Apress 2019).JAFER HUSSAIN is a Senior Product Line Manager in the Network and Edge Group (NEX) at Intel Corporation. Jafer is responsible for the product management of Intel’s Core based Smart and Intelligent AI platforms. In his current role, Jafer engages with Intel’s ecosystem partners to drive Intel’s leadership in various IoT markets.Jafer has previously led the development and integration of wireless connectivity solutions and contributed to the development of wireless connectivity strategy. He also led several customer engagements to drive these solutions to the market.Jafer is an accomplished inventor with multiple patents on embedded systems, wireless technologies, and IoT. He received B.S. in Electrical Engineering from University of Engineering and Technology Taxila, Pakistan, and M.S. in Management of Technology from the National University of Singapore.DR. ANTHONY (TONY) CHUN is head of digital access and an Encore.org/CoGenerate Fellow, at The Bridging Tech Charitable Fund, a nonprofit that is closing the digital divide for K-12 students via computers and connectivity. He recently retired from Intel Corporation, where he was the Wi-Fi product manager in the Internet of Things Group.He joined Intel in 2000 and was a research scientist in Intel Labs where he developed architectures for reconfigurable software defined radios and accelerators.He has co-authored 20 patents in wireless architectures and accelerators. He has co-authored several papers in engineering journals and received best paper awards at the Intel Design Technology and Test Conference 2011 and at the IEEE Computer Society Annual Symposium on VLSI, 2009. He has B.S., M.S. and PhD degrees in Electrical Engineering from Stanford University, Stanford, California.Chapter 1: Introduction to IoT ConnectivityChapter Goal: This chapter provides an overview of key IoT use cases and key connectivity elements of IoT solutions. The reader will get an understanding of the breadth of the IoT landscape.• Purpose of this book• Background and Terminology• Key IoT use caseso Smart citieso Asset trackingo Smart factorieso Industrialo Transportationo Digital surveillance systemso Retailo Medicalo Indoor location• End-to-end IoT building blockso Things/devices/sensorso Edge/Gateway/Fogo Cloud• IoT Stakeholders/Value Chaino Chip Vendorso Module Vendorso System Integratorso ODMso ISVso End CustomersChapter 2: Considerations in choosing a connectivity technologyChapter Goals: This chapter highlights the fragmentation of connectivity standards and solutions and the challenge in navigating the many standards and technologies and also discusses the tradeoffs between different wireless technologies and network topologies. Also, this chapter provides the motivation for using wireless technologies in IoT products as well as challenges.• Compute and connect are integral functions that are fully integrated in single SoC-for lower cost and low power solutions• Benefits of wireless• Seamless wireless connectivity for mobility applications• Remote Commissioning, ease of deployment, OTA update, device identification• Challenges of Wireless Connectivity• Fragmentation of the IoT Ecosystemo Discussion of IoT Framework Open Connectivity Foundation etc.o Interoperability (open standards)• Coexistence and interference• Wireless security is vital• Certification (Industry, regulatory, operator)o Certified labs• Antenna design challenges• Considerations in choosing a connectivity technologyo Energy/power/cost tradeoffso Selection of network architectures and topologieso Wireless standards and alignment to use cases-how to choose the right wireless protocol for the jobo Selection criteria-range, data rate, power, security, latency, capacity, etc.• Wireless Standard BodiesSubchapter Goal: Overview of Connectivity standards including 15.4, ZigBee, Thread, 6LoWPAN, wi-fi, BT, LTE, 5G etc. and which is appropriate for each use case; include cost considerationso WiFi Allianceo BT SIGo ZigBee Allianceo Thread Groupo Dot doto Z-Waveo 3GPP (ITU-T)Chapter Goals: The following chapters (3 to 10) provide a deep dive on each connectivity technology and considerations on selecting it for the IoT use casesChapter 3: Wi-Fi• Wi-Fi mesh• WiFi 802.11a/b/g/n/ac• WiFi 6Chapter 4: Bluetooth• BLE• BT mesh• BT direction finding• BT beaconsChapter 5: 802.15.4 (unlicensed)• ZigBee• ThreadChapter 6: LPWAN• Lora• SigFoxChapter 7: Cellular Technologies• NB IoT• 3G• 4G LTE• CBRS (Private LTE) / OnGoChapter 8: 5G• eMBB• mMTC• urLLC• 5G TSNChapter 9: Ethernet• TSN• Industrial Ethernet TechnologiesChapter 10: GNSSChapter 11: IoT Connectivity Frameworks and StacksChapter Goal: This chapter goes into detail on how to assemble all of the components of a working solution and discusses how to scale your solution to a product• Software stacks, drivers, operating systems, RTOS• Gateway architecture including protocolso IoT protocols CoAP MQTT OPCUA• RF: antenna, PA, etc.• Coexistence• Environmental considerations, reliability, long life etc.• Security and privacy• Managing the network• Certification• Putting it together• How to integrate and validate (chip vs pre-certified module)• Scaling from project to product• Putting it together: Sample Projects• Go through the earlier examples and discuss the complete productsChapter 12: The Future of IoT ConnectivityChapter Goal: This chapter discusses emerging connectivity technologies for addressing new use cases as well as advancing and optimizing the performance of existing technologies• Things/sensors (low power, battery powered, low compute, need wireless connectivity, small memory footprint, small RTOS footprint)• Software defined radio• What is coming next?• Future technologies: Wi-Fi 7, etc.• Next steps for the reader• Where to get more informationReferencesIndex
MCA Microsoft 365 Certified Associate Modern Desktop Administrator Complete Study Guide with 900 Practice Test Questions
COMPLETE, UPDATED STUDY GUIDE FOR MCA MODERN DESKTOP ADMINISTRATOR CERTIFICATION EXAMS, MD-100 AND MD-101. COVERS NEW WINDOWS 11, SERVICES, TECHNOLOGIES, AND MORE!MCA Microsoft 365 Certified Associate Modern Desktop Administrator Complete Study Guide, Second Edition, is your all-in-one guide to preparing for the exams that will earn you the MCA Modern Desktop Administrator certification! In this book, well-known Windows guru and five-time Microsoft MVP, William Panek, guides you through the latest versions of the Windows Client exam (MD-100) and the Managing Modern Desktops exam (MD-101). This one-stop resource covers 100% of the objectives for both exams, providing real world scenarios, hands-on exercises, and challenging review questions. You’ll also dive deeper into some of the more complex topics and technologies, including deploying, maintaining, and upgrading Windows; managing devices and data; configuring storage and connectivity; managing apps and data; and more.* Learn everything you need to know to pass the MD-100 and MD-101 exams* Earn your MCA Modern Desktop Administrator certification to launch or advance your career* Access exercises, review questions, flashcards, and practice exams, in the book and online* Master all of the test objectives for the latest exam versions—updated for Windows 11With this study guide, you also get access to Sybex’s superior online learning environment, including an assessment test, hundreds of practice exams, flashcards, searchable glossary, and videos for many of the chapter exercises. This is the perfect test prep resource for admins preparing for certification and anyone looking to upgrade their existing skills to Microsoft’s latest desktop client. ABOUT THE AUTHORWILLIAM PANEK is a Five-Time Microsoft MVP Winner. He has taught at Boston University, Clark University, and the University of Maryland, and presently conducts live online classes for StormWind Studios (www.stormwindstudios.com). Will has been a consultant and trainer for the United States Secret Service, Cisco, the United States Air Force, and the United States Army. He also creates training videos to help students prepare for various Microsoft exams. Introduction xxixAssessment Test – MD- 100 xliiiAssessment Test – MD- 101 xlixAnswers to Assessment Test – MD- 100 lvAnswers to Assessment Test – MD- 101 lviiiPART I EXAM MD-100 1CHAPTER 1 WINDOWS CLIENT INSTALLATION 3Understanding the Basics 4Windows 10/11 Features 9Windows 10 vs. Windows 11 11What Has Been Changed in Windows 11? 12Windows 10 and 11 Architecture 13Preparing to Install Windows 14Windows Home 15Windows Pro 15Windows Enterprise 16Windows 10 Enterprise E3 and E 5 17Windows Client Requirements 18New Installation or Upgrade? 20Disk Partitioning 24Language and Region Pack 25Installing Windows 10 25Performing a Clean Installation of Windows 10 26Performing an Upgrade to Windows 10 from Windows 8.1 36Installing Windows 11 41Performing a Clean Installation of Windows 11 42Performing an Upgrade to Windows 11from Windows 10 43Troubleshooting Installation Problems 43Supporting Multiple- Boot Options 45Using Windows Activation 47Understanding Automated Deployment Options 48An Overview of the Microsoft Deployment Toolkit 48An Overview of Unattended Installation 54An Overview of Windows Deployment Services 56An Overview of the System Preparation Tool and Disk Imaging 59Overview of the Windows Assessment and Deployment Kit 63Windows Configuration Designer 64Summary of Windows Client Deployment Options 64Deploying Unattended Installations 66Using the System Preparation Tool to Prepare an Installation for Imaging 67Using Windows Configuration Designer to Create a Disk Image 69Using the Deployment Image Servicing and Management Tool 71Using Windows System Image Manager to Create Answer Files 73Windows Update 74The Update Process 75Using Windows Update 76Using Windows Update for Business 78Delivery Optimization 81Using Command- Line Options 83Installing Microsoft Store Updates 83Summary 85Exam Essentials 86Video Resources 87Review Questions 88CHAPTER 2 CONFIGURING USERS 93Understanding User Accounts 94Account Types 95Built- In Accounts 96Local and Domain User Accounts 97Working with User Accounts 98Using the Local Users and Groups Utility 98Using the User Accounts Option in Control Panel 101Creating New Users 102Disabling User Accounts 107Deleting User Accounts 108Renaming User Accounts 109Changing a User’s Password 110Using Windows Hello, Pictures, and Biometrics 111Using Device Guard 112Understanding Windows Defender Credential Guard 114Configuring Device Health Attestation 116Managing User Properties 117Managing User Group Membership 117Setting Up User Profiles, Logon Scripts, and Home Folders 119Troubleshooting User Account Authentication 126Managing and Creating Groups 127Using Built- In Groups 127Creating Groups 131Managing Group Membership 133Deleting Groups 135Managing Security Using GPOs and LGPOs 135Understanding the GPO and LGPO Basics 135Using the Group Policy Result Tool 137Managing and Applying LGPOs 138Configuring Local Security Policies 140Using Account Policies 141Using Local Policies 147Configuring User Account Control 155Privilege Elevation 156Managing Credentials by Using Credential Manager 157Local Administrator Password Solutions (LAPS) 159Registry and File Virtualization 165Understanding Smart Cards 165Configuring Remote Management 167Remote Assistance 168Easy Connect 168Remote Desktop 173Quick Assist 176Windows Admin Center 180Enabling PowerShell Remoting 182Configuring a VPN Connection 182Transparent Caching 185Broadband Tethering 185Using PowerShell 186Summary 189Exam Essentials 189Video Resources 190Review Questions 191CHAPTER 3 MANAGING DATA 197Managing File and Folder Security 198Folder Options/File Explorer Options 199Understanding Dynamic Access Control 203Securing Access to Files and Folders 204Determining and Viewing Effective Permissions for NTFS 208Determining NTFS Permissions for Copied or Moved Files 211Managing Network Access 211Creating and Managing Shared Folders 211Configuring Share Permissions 213Cloud- Based Storage 214Configuring OneDrive 215Understanding Hardware Security 220Using BitLocker Drive Encryption 221Features of BitLocker 222Windows 7 vs. Windows 10/11 224Using the BitLocker Administration and Monitoring Utility 227Use Configuration Manager to Manage BitLocker Drive Encryption (BDE) 228Understanding Smart Cards 229Summary 230Exam Essentials 231Video Resources 231Review Questions 232CHAPTER 4 MANAGING THE WINDOWS CLIENT ENVIRONMENT 239Managing Windows 240Manipulating the Desktop Environment 241Configuring Personalization 251Using Control Panel 259Using the Microsoft Management Console 270Using the System Settings 272Understanding the Settings Window 273Using PowerShell 277Configuring Mobility Options 279Configuring Offline Files and Synchronization 279Configuring Power Policies 281Managing Windows 10/11 Services 288Configuring Internet Browsers 291Cortana 291Browser Controls 293Pinning Sites to the Taskbar 293Searchable Address Bar 293Security and Privacy Enhancements 293Using the Browser’s Compatibility Mode 294Using Enhanced Security Mode in Edge 295Using InPrivate Browsing 297Configuring Internet Options 297Manage and Use Hyper- V on Windows Client 303Hyper- V System Requirements 304Enabling the Hyper- V Role 304Opening the Hyper- V Manager 305Changing Configuration on an Existing Virtual Machine 311Deleting Virtual Machines 313Manage Virtual Switches 314Managing Virtual Hard Disks 316PowerShell Commands 322Windows Sandbox 325Summary 328Exam Essentials 329Video Resources 329Review Questions 330CHAPTER 5 CONFIGURING SECURITY AND DEVICES 335Configuring Disk Storage 336Basic Storage 337Dynamic Storage 337GUID Partition Table 339Using the Disk Management Utility 340Understanding the Disk Management Utility 340Managing Storage 355Managing Dynamic Storage 355Understanding Filesystems 358Filesystem Selection 358Filesystem Conversion 361Configuring NTFS 361Configuring Hardware 365Understanding Devices 365Using Device Manager 366Installing and Updating Device Drivers 370Driver Signing 379Managing I/O Devices 381Configuring Removable Storage Devices 381Managing Printers 385Configuring Windows Defender Firewall 401Understanding the Windows Defender Firewall Basics 401Windows Defender Firewall with Advanced Security 403Managing Windows Security 408Windows Security Center 408Summary 411Exam Essentials 412Video Resources 412Review Questions 413CHAPTER 6 CONFIGURING NETWORK CONNECTIVITY 419Understanding the Basics 420Peer- to- Peer Networks 420On- Site Active Directory Networks 422Cloud- Based Azure Active Directory 424Other Microsoft Networking Terms and Roles 424Configuring NIC Devices 427Configuring a Network Adapter 428Troubleshooting a Network Adapter 434Configuring Wireless NIC Devices 434Configuring Wi- Fi Direct 442Understanding TCP/IP 445Benefits and Features of TCP/IP 446Basics of IP Addressing and Configuration 448Using IPv6 Addresses 452Configuring TCP/IP on Windows 10 463Testing Your IP Configuration 467Configuring Windows Client on a Network 468Configure VPN Clients 470Create a VPN Profile 471Configure and Manage Certificates on Client Devices 475Summary 478Exam Essentials 479Video Resources 479Review Questions 480CHAPTER 7 CONFIGURING RECOVERY 485Understanding Recovery 487Knowing the Startup/Boot Options 488Starting in Safe Mode 489Enabling Boot Logging 492Using Other Startup Setting Options 494Understanding System Restore 495Using the System Image Recovery 497Using the Startup Repair Tool 498Maintaining Windows 10/11 with Backup and Restore 498Creating a Backup 499Restoring Files from a Backup 500Recovering Files from OneDrive 501Using the WBAdmin Command Utility 502Using Advanced Backup Options 503Using System Protection 505Creating Restore Points 506Restoring Restore Points 507Cleaning Up Old Restore Points 507Storage Sense 508Using the Recycle Bin 510Monitoring Windows 511Introducing Performance Monitor 511Using Other Performance- Monitoring Tools 521Manage the Registry 531Summary 532Exam Essentials 533Video Resources 533Review Questions 534PART II EXAM MD- 101 539CHAPTER 8 DEPLOY WINDOWS CLIENT 541Plan a Windows Client Deployment 542Microsoft Endpoint Manager (MEM) Overview 542Endpoint Analytics 544Deploying with Windows Autopilot 551Windows Autopilot Requirements 552Configure Device Registration for Autopilot 557Windows Autopilot Profiles 559Provision Windows Devices by Using Autopilot 563Troubleshoot an Autopilot Deployment 564Using Microsoft Deployment Toolkit (MDT) 567Planning MDT Deployments 567MDT Configuration Options 568Plan and Implement PXE Boot by Using Windows Deployment Services (WDS) 569Summary 576Exam Essentials 576Video Resources 577Review Questions 578CHAPTER 9 MANAGING IDENTITY AND ACCESS 585Active Directory vs. Azure Active Directory 586Understanding Active Directory 586Understanding Azure Active Directory 597Managing Hybrid Networks 625Password Hash Synchronization with Azure AD 625Azure Active Directory Pass-Through Authentication 626Federation with Azure AD 627Common Identity Scenarios 630Azure AD Connect 631Configure Enterprise State Roaming in Azure AD 638Requirements of Enterprise State Roaming 638Enable Enterprise State Roaming 639Plan and Implement Conditional Access Policies 639Create a Conditional Access Policy 642Troubleshooting Conditional Access 643Using PowerShell Commands 645Summary 647Exam Essentials 648Video Resources 649Review Questions 650CHAPTER 10 PLANNING AND MANAGING MICROSOFT INTUNE 655Managing Devices with Microsoft Intune 656Understanding Microsoft Intune Benefits 658Configuring Intune Subscriptions 658Provisioning User Accounts 665Setting Administrator Accounts 665Supporting Applications 687Deploying Applications Using Intune 687Supporting Broadband Connectivity 694Understanding Data Synchronization 695Using Mobile Application Management 697Understanding Updates 699Deploying Software Updates Using Intune 699Using Intune Compliance Reports 705Using Intune Reports 705Implement App Protection and App Configuration Policies 706PowerShell Commands 710Summary 711Exam Essentials 711Video Resources 712Review Questions 713CHAPTER 11 MANAGING DEVICES 719Compliance Policies 721Conditional Access 721Plan Device Compliance Policies 723Device Configuration Profiles 728Summary 740Exam Essentials 741Video Resources 741Review Questions 742CHAPTER 12 MANAGING SECURITY 747Windows Security 748Planning and Implementing Endpoint Protection 749Endpoint Security 751Managing Endpoint Security in Microsoft Intune 752Implementing Microsoft Defender for Endpoint 759Understanding Microsoft Defender Application Guard 771Understanding Microsoft Defender Credential Guard 780Implementing and Managing Microsoft Defender Exploit Guard 783Using Windows Defender Application Control 787Summary 788Exam Essentials 789Video Resources 790Review Questions 791CHAPTER 13 MONITORING DEVICES 797Monitoring Windows 799Monitor Cloud- Based Tools 799Monitor Azure Device Security 809Monitor Devices by Using Endpoint Manager Admin Center 813Monitoring Devices by Using Endpoint Analytics 818Summary 820Exam Essentials 820Video Resources 820Review Questions 821Appendix Answers to Review Questions 827Chapter 1: Windows Client Installation 828Chapter 2: Configuring Users 830Chapter 3: Managing Data 833Chapter 4: Managing the Windows Client Environment 836Chapter 5: Configuring Security and Devices 840Chapter 6: Configuring Network Connectivity 843Chapter 7: Configuring Recovery 846Chapter 8: Deploy Windows Client 850Chapter 9: Managing Identity and Access 855Chapter 10: Planning and Managing Microsoft Intune 858Chapter 11: Managing Devices 862Chapter 12: Managing Security 865Chapter 13: Monitoring Devices 869Index 873
Die Kunst der agilen Entwicklung (2. Auflage)
Grundlagen, Methoden und PraktikenUm agile Entwicklung zu meistern, müssen Sie im Team lernen, unzählige Möglichkeiten von Moment zu Moment zu bewerten und intuitiv die beste Vorgehensweise auszuwählen.Dieses Buch beschreibt umfassend und praxisorientiert die Grundlagen, Methoden und Praktiken agiler Softwareentwicklung. James Shore gibt wertvolle Ratschläge für den Projektstart, inkrementellen Entwurf, Continuous Integration, iterative Planung und testgetriebene Entwicklung sowie die Bereitstellung und Refactoring von Software, die aus über zwei Jahrzehnten Erfahrung mit Agilität stammen. Er bringt den State of the Art aus Extreme Programming, Scrum, Lean, DevOps und mehr in ein zusammenhängendes Ganzes und vermittelt darüber hinaus, dass Agilität zu meistern auch bedeutet, in Abhängigkeit von Projektgegebenheiten und der Organisation, in der Software entwickelt wird, Praktiken anzupassen.Diese 2. Auflage ist vollständig überarbeitet und von Grund auf neu geschrieben worden und berücksichtigt dabei die Weiterentwicklung auf dem Gebiet der agilen Entwicklung der letzten 14 Jahre. Neu aufgenommen wurden Themen wie agile Skalierung, DevOps, die Arbeit mit Remote-Teams sowie das Agile Fluency Model zur Einführung und Anpassung von Agilität an die Bedürfnisse des Unternehmens. Autor:James Shore leitet seit 1999 Teams, die agile Entwicklung praktizieren. Er kombiniert ein tiefes Verständnis der agilen Ideen mit jahrzehntelanger praktischer Erfahrung in der Entwicklung und nutzt diese Erfahrung, um Menschen dabei zu unterstützen, zu verstehen, wie alle Aspekte von Agilität zusammenpassen, um herausragende Ergebnisse zu erzielen. James hat den Gordon Pask Award der Agile Alliance für Beiträge zur agilen Praxis erhalten, ist Moderator mehrerer Screencasts zur Softwareentwicklung und Mitbegründer des Agile Fluency Model. Er ist online unter jamesshore.com zu finden.Zielgruppe: Programmierer*innenSoftwareentwickler*innenProduktverantwortlicheProjektmanager*innenQualitätsverantwortlicheManagementStudierende
Cybersecurity All-in-One For Dummies
OVER 700 PAGES OF INSIGHT INTO ALL THINGS CYBERSECURITYCybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems—and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization.* Explore the basics of cybersecurity at home and in business* Learn how to secure your devices, data, and cloud-based assets* Test your security to find holes and vulnerabilities before hackers do* Create a culture of cybersecurity throughout an entire organizationThis For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide. This All-in-One gathers the expertise of the leading For Dummies authors in the world of cybersecurity, including JOSEPH STEINBERG, author of Cybersecurity For Dummies; KEVIN BEAVER, author of Hacking For Dummies; TED COOMBS, author of Cloud Security For Dummies; and IRA WINKLER, author of Security Awareness For Dummies. BOOK 1: CYBERSECURITY BASICS 5Chapter 1: What Exactly Is Cybersecurity? 7Chapter 2: Getting to Know Common Cyberattacks 23Chapter 3: The Bad Guys You Must Defend Against 49BOOK 2: PERSONAL CYBERSECURITY 69Chapter 1: Evaluating Your Current Cybersecurity Posture 71Chapter 2: Enhancing Physical Security 93Chapter 3: Cybersecurity Considerations When Working from Home 103Chapter 4: Securing Your Accounts 113Chapter 5: Passwords 131Chapter 6: Preventing Social Engineering Attacks 147BOOK 3: SECURING A BUSINESS 169Chapter 1: Securing Your Small Business 171Chapter 2: Cybersecurity and Big Businesses 195Chapter 3: Identifying a Security Breach 211Chapter 4: Recovering from a Security Breach 229Chapter 5: Backing Up 249Chapter 6: Resetting Your Device 277Chapter 7: Restoring from Backups 287BOOK 4: SECURING THE CLOUD 311Chapter 1: Clouds Aren’t Bulletproof 313Chapter 2: Getting Down to Business 333Chapter 3: Developing Secure Software 349Chapter 4: Restricting Access 377Chapter 5: Implementing Zero Trust 407Chapter 6: Using Cloud Security Services 429BOOK 5: TESTING YOUR SECURITY 451Chapter 1: Introduction to Vulnerability and Penetration Testing 453Chapter 2: Cracking the Hacker Mindset 473Chapter 3: Developing Your Security Testing Plan 485Chapter 4: Hacking Methodology 497Chapter 5: Information Gathering 507Chapter 6: Social Engineering 513Chapter 7: Physical Security 529BOOK 6: ENHANCING CYBERSECURITY AWARENESS 541Chapter 1: Knowing How Security Awareness Programs Work 543Chapter 2: Creating a Security Awareness Strategy 553Chapter 3: Determining Culture and Business Drivers 559Chapter 4: Choosing the Best Tools for the Job 573Chapter 5: Measuring Performance 589Chapter 6: Assembling Your Security Awareness Program 601Chapter 7: Running Your Security Awareness Program 621Chapter 8: Implementing Gamification 641Index 655
Practical Debugging at Scale
Overhaul your debugging techniques and master the theory and tools needed to debug and troubleshoot cloud applications in production environments. This book teaches debugging skills that universities often avoid, but that typically consume as much as 60% of our time as developers. The book covers the use of debugger features such as tracepoints, object marking, watch renderers, and more. Author Shai Almog presents a scientific approach to debugging that is grounded in theory while being practical enough to help you to chase stubborn bugs through the maze of a Kubernetes deployment.Practical Debugging at Scale assumes a polyglot environment as is common for most enterprises, but focuses on JVM environments. Most of the tooling and techniques described are applicable to Python, Node, and other platforms, as well as to Java and other JVM languages. The book specifically covers debugging in production, an often-neglected discipline but an all too painful reality. You’ll learn modern techniques around observability, monitoring, logging, and full stack debugging that you can put to immediate use in troubleshooting common ailments in production environments.YOU WILL LEARN:* The scientific method underlying the process of debugging* Debugger capabilities such as tracepoints and marker objects* The correct use of less understood features such as exception breakpoints* Techniques for tracing issues in production Kubernetes environments* Observability and monitoring to resolve production problems* Industry best practices for common tooling such as logging * Profiling to understand performance and memory problems WHO THIS BOOK IS FORDevelopers in Java and JVM-related languages who want to improve their debugging skills and production reliability; and developers of cloud applications who are facing the pain of production bugs that are hard to replicate and fixSHAI ALMOG is an entrepreneur, open source hacker, speaker, author, blogger, Java rockstar, and more. He is a former Sun (later Oracle) developer with more than 30 years of experience. Shai has built JVMs, development tools, mobile phone environments, banking systems, startup/enterprise backends, user interfaces, development frameworks, and much more. He speaks at conferences all over the world and has shared the stage with luminaries such as James Gosling (father of Java). Shai is an award-winning, highly rated speaker with deep technical experience to share and he has a knack for engaging his audience. IntroductionPART I. BASICS1. Know Your Debugger2. The Checklist3. The Auxiliary Tools4. Logging, Testing, and Fail Fast5. Time Travel DebuggingPART II. THE MODERN PRODUCTION ENVIRONMENT6. Debugging Kubernetes7. Serverless Debugging8. Fullstack Debugging9. Observability and Monitoring10. Developer ObservabilityPART III. IN PRACTICE11. Tools of Learning12. Performance and Memory13. Security14. Bug Strategies
Apply Data Science
This book offers an introduction to the topic of data science based on the visual processing of data. It deals with ethical considerations in the digital transformation and presents a process framework for the evaluation of technologies. It also explains special features and findings on the failure of data science projects and presents recommendation systems in consideration of current developments. Machine learning functionality in business analytics tools is compared and the use of a process model for data science is shown.The integration of renewable energies using the example of photovoltaic systems, more efficient use of thermal energy, scientific literature evaluation, customer satisfaction in the automotive industry and a framework for the analysis of vehicle data serve as application examples for the concrete use of data science. The book offers important information that is just as relevant for practitioners as for students and teachers.PROF. DR THOMAS BARTON is a professor at Worms University of Applied Sciences. His focus is on the development of operational applications, e-business, cloud computing and data science.PROF. DR CHRISTIAN MÜLLER is a professor at the Technical University of Wildau. His focus is on operations research, simulation of business processes and internet technologies. Introduction.- Introduction to Data Science.- Systems, Tools and Methods.- Applications.
Pro Deep Learning with TensorFlow 2.0
This book builds upon the foundations established in its first edition, with updated chapters and the latest code implementations to bring it up to date with Tensorflow 2.0.Pro Deep Learning with TensorFlow 2.0 begins with the mathematical and core technical foundations of deep learning. Next, you will learn about convolutional neural networks, including new convolutional methods such as dilated convolution, depth-wise separable convolution, and their implementation. You’ll then gain an understanding of natural language processing in advanced network architectures such as transformers and various attention mechanisms relevant to natural language processing and neural networks in general. As you progress through the book, you’ll explore unsupervised learning frameworks that reflect the current state of deep learning methods, such as autoencoders and variational autoencoders. The final chapter covers the advanced topic of generative adversarial networks and their variants, such as cycle consistency GANs and graph neural network techniques such as graph attention networks and GraphSAGE.Upon completing this book, you will understand the mathematical foundations and concepts of deep learning, and be able to use the prototypes demonstrated to build new deep learning applications.WHAT YOU WILL LEARN* Understand full-stack deep learning using TensorFlow 2.0* Gain an understanding of the mathematical foundations of deep learning * Deploy complex deep learning solutions in production using TensorFlow 2.0* Understand generative adversarial networks, graph attention networks, and GraphSAGEWHO THIS BOOK IS FOR:Data scientists and machine learning professionals, software developers, graduate students, and open source enthusiasts.SANTANU PATTANAYAK works as a Senior Staff Machine Learning Specialist at Qualcomm Corp R&D and is the author of Quantum Machine Learning with Python, published by Apress. He has more than 16 years of experience, having worked at GE, Capgemini, and IBM before joining Qualcomm. He graduated with a degree in electrical engineering from Jadavpur University, Kolkata and is an avid math enthusiast. Santanu has a master’s degree in data science from the Indian Institute of Technology (IIT), Hyderabad. He also participates in Kaggle competitions in his spare time, where he ranks in the top 500. Currently, he resides in Bangalore with his wife.Chapter 1: Mathematical FoundationsChapter Goal: Setting the mathematical base for machine learning and deep learning .No of pages 100Sub -Topics1. Linear algebra2. Calculus3. Probability4. Formulation of machine learning algorithms and optimization techniques.Chapter 2: Introduction to Deep learning Concepts and Tensorflow 2.0Chapter Goal: Setting the foundational base for deep learning and introduction to Tensorflow 2.0 programming paradigm.No of pages: 75Sub - Topics:5. Deep learning and its evolution.6. Evolution of the learning techniques: from perceptron based learning to back-propagation7. Different deep learning objectives functions for supervised and unsupervised learning.8. Tensorflow 2.09. GPUChapter 3: Convolutional Neural networksChapter Goal: The mathematical and technical aspects of convolutional neural networkNo of pages: 801. Convolution operation2. Analog and digital signal3. 2D and 3D convolution, dilation and depth-wise separable convolution4. Common image processing filter5. Convolutional neural network and components6. Backpropagation through convolution and pooling layers7. Translational invariance and equivariance8. Batch normalization9. Image segmentation and localization methods (Moved from advanced Neural Network to here, to make room for Graph Neural Networks )Chapter 4: Deep learning for Natural Language ProcessingChapter Goal: Deep learning methods and natural language processing No of pages:Sub - Topics:1. Vector space model2. Word2Vec3. Introduction to recurrent neural network and LSTM4. Attention5. Transformer network architecturesChapter 5: Unsupervised Deep Learning MethodsChapter Goal: Foundations for different unsupervised deep learning techniquesNo of pages: 60Sub - Topics:1. Boltzmann distribution2. Bayesian inference3. Restricted Boltzmann machines4. Auto Encoders and variation methodsChapter 6: Advanced Neural NetworksChapter Goal: Generative adversarial networks and graph neural networksNo of pages: 70Sub - Topics:1. Introduction to generative adversarial networks2. CycleGAN, LSGAN Wasserstein GAN3. Introduction to graph neural network4. Graph attention network and graph SAGEChapter 7: Reinforcement LearningChapter Goal: Reinforcement Learning using Deep LearningNo of pages: 50Sub - Topics:1. Introduction to reinforcement learning and MDP formulation2. Value based methods3. DQN4. Policy based methods5. Reinforce and actor critic network in policy based formulations6. Transition-less reinforcement learning and bandit methods
Numerical Methods Using Kotlin
This in-depth guide covers a wide range of topics, including chapters on linear algebra, root finding, curve fitting, differentiation and integration, solving differential equations, random numbers and simulation, a whole suite of unconstrained and constrained optimization algorithms, statistics, regression and time series analysis. The mathematical concepts behind the algorithms are clearly explained, with plenty of code examples and illustrations to help even beginners get started.In this book, you'll implement numerical algorithms in Kotlin using NM Dev, an object-oriented and high-performance programming library for applied and industrial mathematics. Discover how Kotlin has many advantages over Java in its speed, and in some cases, ease of use. In this book, you’ll see how it can help you easily create solutions for your complex engineering and data science problems.After reading this book, you'll come away with the knowledge to create your own numerical models and algorithms using the Kotlin programming language.WHAT YOU WILL LEARN* Program in Kotlin using a high-performance numerical library* Learn the mathematics necessary for a wide range of numerical computing algorithms* Convert ideas and equations into code* Put together algorithms and classes to build your own engineering solutions* Build solvers for industrial optimization problems* Perform data analysis using basic and advanced statisticsWHO THIS BOOK IS FORProgrammers, data scientists, and analysts with prior experience programming in any language, especially Kotlin or Java.HAKSUN LI, PHD, is founder of NM Group, a scientific and mathematical research company. He has the vision of “Making the World Better Using Mathematics”. Under his leadership, the firm serves worldwide brokerage houses and funds, multinational corporations and very high net worth individuals. Haksun is an expert in options trading, asset allocation, portfolio optimization and fixed-income product pricing. He has coded up a variety of numerical software, including SuanShu (a library of numerical methods), NM Dev (a library of numerical methods), AlgoQuant (a library for financial analytics), NMRMS (a portfolio management system for equities), and supercurve (a fixed-income options pricing system). Prior to this, Haksun was a quantitative trader/quantitative analyst with multiple investment banks. He has worked in New York, London, Tokyo, and Singapore. Additionally, Haksun is the vice dean of the Big Data Finance and Investment Institute of Fudan University, China. He was an adjunct professor with multiple universities. He has taught at the National University of Singapore (mathematics), Nanyang Technological University (business school), Fudan University (economics), as well as Hong Kong University of Science and Technology (mathematics). Dr. Haksun Li has a B.S. and M.S. in pure and financial mathematics from the University of Chicago, and an M.S. and a PhD in computer science and engineering from the University of Michigan, Ann Arbor.1: Introduction to Numerical Methods in Kotlin.-2: Linear Algebra.-3: Finding Roots of Equations.-4: Finding Roots of Systems of Equations.-5: Curve Fitting and Interpolation.-6: Numerical Differentiation and Integration.-7: Ordinary Differential Equations.-8: Partial Differential Equations.-9: Unconstrained Optimization.-10: Constrained Optimization.-11: Heuristics.-12: Basic Statistics.-13: Random Numbers and Simulation.-14: Linear Regression.-15: Time Series Analysis.-References.Table of ContentsAbout the Authors...........................................................................................................iPreface............................................................................................................................ii1. Why Kotlin?..............................................................................................................61.1. Kotlin in 2022.....................................................................................................61.2. Kotlin vs. C++....................................................................................................61.3. Kotlin vs. Python................................................................................................61.4. Kotlin in the future .............................................................................................62. Data Structures.......................................................................................................72.1. Function...........................................................................................................72.2. Polynomial ......................................................................................................73. Linear Algebra .......................................................................................................83.1. Vector and Matrix ...........................................................................................83.1.1. Vector Properties .....................................................................................83.1.2. Element-wise Operations.........................................................................83.1.3. Norm ........................................................................................................93.1.4. Inner product and angle ...........................................................................93.2. Matrix............................................................................................................103.3. Determinant, Transpose and Inverse.............................................................103.4. Diagonal Matrices and Diagonal of a Matrix................................................103.5. Eigenvalues and Eigenvectors.......................................................................103.5.1. Householder Tridiagonalization and QR Factorization Methods..........103.5.2. Transformation to Hessenberg Form (Nonsymmetric Matrices)...........104. Finding Roots of Single Variable Equations .......................................................114.1. Bracketing Methods ......................................................................................114.1.1. Bisection Method ...................................................................................114.2. Open Methods...............................................................................................114.2.1. Fixed-Point Method ...............................................................................114.2.2. Newton’s Method (Newton-Raphson Method) .....................................114.2.3. Secant Method .......................................................................................114.2.4. Brent’s Method ......................................................................................115. Finding Roots of Systems of Equations...............................................................125.1. Linear Systems of Equations.........................................................................125.2. Gauss Elimination Method............................................................................125.3. LU Factorization Methods ............................................................................125.3.1. Cholesky Factorization ..........................................................................125.4. Iterative Solution of Linear Systems.............................................................125.5. System of Nonlinear Equations.....................................................................126. Curve Fitting and Interpolation............................................................................146.1. Least-Squares Regression .............................................................................146.2. Linear Regression..........................................................................................146.3. Polynomial Regression..................................................................................146.4. Polynomial Interpolation...............................................................................146.5. Spline Interpolation .......................................................................................147. Numerical Differentiation and Integration...........................................................157.1. Numerical Differentiation .............................................................................157.2. Finite-Difference Formulas...........................................................................157.3. Newton-Cotes Formulas................................................................................157.3.1. Rectangular Rule....................................................................................157.3.2. Trapezoidal Rule....................................................................................157.3.3. Simpson’s Rules.....................................................................................157.3.4. Higher-Order Newton-Coles Formulas..................................................157.4. Romberg Integration .....................................................................................157.4.1. Gaussian Quadrature..............................................................................157.4.2. Improper Integrals..................................................................................158. Numerical Solution of Initial-Value Problems....................................................168.1. One-Step Methods.........................................................................................168.2. Euler’s Method..............................................................................................168.3. Runge-Kutta Methods...................................................................................168.4. Systems of Ordinary Differential Equations.................................................169. Numerical Solution of Partial Differential Equations..........................................179.1. Elliptic Partial Differential Equations...........................................................179.1.1. Dirichlet Problem...................................................................................179.2. Parabolic Partial Differential Equations........................................................179.2.1. Finite-Difference Method ......................................................................179.2.2. Crank-Nicolson Method.........................................................................179.3. Hyperbolic Partial Differential Equations.....................................................1710..................................................................................................................................1811..................................................................................................................................1912. Random Numbers and Simulation ....................................................................2012.1. Uniform Distribution .................................................................................2012.2. Normal Distribution...................................................................................2012.3. Exponential Distribution............................................................................2012.4. Poisson Distribution ..................................................................................2012.5. Beta Distribution........................................................................................2012.6. Gamma Distribution ..................................................................................2012.7. Multi-dimension Distribution ....................................................................2013. Unconstrainted Optimization ............................................................................2113.1. Single Variable Optimization ....................................................................2113.2. Multi Variable Optimization .....................................................................2114. Constrained Optimization .................................................................................2214.1. Linear Programming..................................................................................2214.2. Quadratic Programming ............................................................................2214.3. Second Order Conic Programming............................................................2214.4. Sequential Quadratic Programming...........................................................2214.5. Integer Programming.................................................................................2215. Heuristic Optimization......................................................................................2315.1. Genetic Algorithm .....................................................................................2315.2. Simulated Annealing .................................................................................2316. Basic Statistics..................................................................................................2416.1. Mean, Variance and Covariance................................................................2416.2. Moment......................................................................................................2416.3. Rank...........................................................................................................2417. Linear Regression .............................................................................................2517.1. Least-Squares Regression..........................................................................2517.2. General Linear Least Squares....................................................................2518. Time Series Analysis ........................................................................................2618.1. Univariate Time Series..............................................................................2618.2. Multivariate Time Series ...........................................................................2618.3. ARMA .......................................................................................................2618.4. GARCH .....................................................................................................2618.5. Cointegration .............................................................................................2619. Bibliography .....................................................................................................2720. Index .....................................................................................................
Wireshark for Network Forensics
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view.You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same.The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments.WHAT YOU'LL LEARN* Review Wireshark analysis and network forensics* Study traffic capture and its analytics from mobile devices* Analyze various access technology and cloud traffic* Write your own dissector for any new or proprietary packet formats* Capture secured application traffic for analysisWHO THIS BOOK IS FORIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud OperatorsNagendra Kumar Nainar (CCIE#20987) is a Principal Engineer with Cisco Customer Experience(CX) Organization (Formerly TAC), focusing on Enterprise customers. He is the co-inventor of more than 130 patent applications in different technologies including Virtualization/Container technologies. He is the co-author of multiple Internet RFCs, various Internet drafts and IEEE papers. Nagendra also co-authored multiple technical books with leading publishers such as Cisco Press and Packt Publication. He is a guest lecturer in North Carolina State University and a speaker in different network forums.ASHISH PANDA (CCIE#33270) is a Senior Technical Leader with Cisco Systems Customer Experience CX Organization primarily focused on handling complex service provider network design and troubleshooting escalations. He has 19+ years of rich experience in network design, operation, and troubleshooting with various large enterprises and service provider networks (ISP, satellite, MPLS, 5G, and cloud) worldwide. He is a speaker at various Cisco internal and external events and is very active in the network industry standard bodies.CHAPTER 1: WIRESHARK PRIMER· Introduction to Wireshark Architecture· Wireshark Package installation and Usage· Wireshark Cloud Services· Version and feature parity· Basic Analysis and filtering· Data stream and Graphs· SummaryCHAPTER 2: PACKET CAPTURE AND ANALYSIS§ Native Tool based Traffic Capture§ Wireshark tool based Traffic Capture§ Wireless Capture Modes and Configurations· High volume packet analysis (size based, capture filters)· Wireshark command line tool· Mobile devices Traffic CaptureCHAPTER 3: CAPTURING SECURED APPLICATION FOR ANALYSIS· Introduction to Secured Applications· Secure DNS· HTTPS· mTLS· IPsec, ISAKMP, Kerberos· SNMPv3· WEP, and WPA/WPA2/WPA3CHAPTER4: WIRELESS PACKET CAPTURE AND ANALYSIS· Basics of Wireless Technology· Wireless packet types (data, control, auth)· Wireless operational aspects and effect on wireshark capture· Effect of Wireshark modes (monitor, promiscuous) on wireless capture· Setting up Wireshark 802.11 captures for various OS types· Decoding beacons/WEP/WPA/WPA2· Wireless packet analysisCHAPTER 5: MULTIMEDIA CAPTURE AND ANALYSIS· Introduction to Multimedia Applications· Export Objects (file, images applications) from data stream· video content extraction and replay (RTP / RTSP)· mpeg live streams capture and replay· VoIP call analysis and replayCHAPTER 6: CLOUD AND CLOUD-NATIVE TRAFFIC CAPTURE· Introduction and Cloud and Cloud Native Applications· Native and Wireshark Captures in AWS· Native and Wireshark Captures in GCP· Native and Wireshark Captures in Azure· LXC and Namespace based capture· Kubernetes POD captureCHAPTER 7: BLUETOOTH PROTOCOL CAPTURE AND ANALYSIS· Introduction to Bluetooth and Usecase· HCIDump captures· Bluetooth protocol analysisCHAPTER 8: WIRESHARK ANALYSIS AND NETWORK FORENSIC· Networking protocol operation analysis· Analyzing network throughput issues, performance degradations· Network security attack identification , post mortems, prevention· Discovering malwares, covert communications· Packet replaysCHAPTER 9: WRITING YOUR OWN DISSECTOR· Wireshark Dissectors· Use Case Example· Dissector Example
Agile Model-Based Systems Engineering Cookbook
Agile MBSE can help organizations manage change while ensuring system correctness and meeting customers’ needs. But deployment challenges have changed since our first edition. The Agile Model-Based Systems Engineering Cookbook’s second edition focuses on workflows – or recipes – that will help MBSE practitioners and team leaders address practical situations that are part of deploying MBSE as part of an agile development process across the enterprise. In this 2nd edition, the Cameo MagicDraw Systems Modeler tool – the most popular tool for MBSE – is used in examples (models are downloadable by readers). Written by a world-renowned expert in MBSE, this book will take you through systems engineering workflows in the Cameo Systems Modeler SysML modeling tool and show you how they can be used with an agile and model-based approach. You’ll start with the key concepts of agile methods for systems engineering. Next, each recipe will take you through initiating a project, outlining stakeholder needs, defining and analyzing system requirements, specifying system architecture, performing model-based engineering trade studies, all the way to handling systems specifications off to downstream engineering. By the end of this MBSE book, you’ll learn how to implement systems engineering workflows and create systems engineering models.
Modern Deep Learning for Tabular Data
Deep learning is one of the most powerful tools in the modern artificial intelligence landscape. While having been predominantly applied to highly specialized image, text, and signal datasets, this book synthesizes and presents novel deep learning approaches to a seemingly unlikely domain – tabular data. Whether for finance, business, security, medicine, or countless other domain, deep learning can help mine and model complex patterns in tabular data – an incredibly ubiquitous form of structured data.Part I of the book offers a rigorous overview of machine learning principles, algorithms, and implementation skills relevant to holistically modeling and manipulating tabular data. Part II studies five dominant deep learning model designs – Artificial Neural Networks, Convolutional Neural Networks, Recurrent Neural Networks, Attention and Transformers, and Tree-Rooted Networks – through both their ‘default’ usage and their application to tabular data. Part III compounds the power of the previously covered methods by surveying strategies and techniques to supercharge deep learning systems: autoencoders, deep data generation, meta-optimization, multi-model arrangement, and neural network interpretability. Each chapter comes with extensive visualization, code, and relevant research coverage.Modern Deep Learning for Tabular Data is one of the first of its kind – a wide exploration of deep learning theory and applications to tabular data, integrating and documenting novel methods and techniques in the field. This book provides a strong conceptual and theoretical toolkit to approach challenging tabular data problems.WHAT YOU WILL LEARN* Important concepts and developments in modern machine learning and deep learning, with a strong emphasis on tabular data applications.* Understand the promising links between deep learning and tabular data, and when a deep learning approach is or isn’t appropriate.* Apply promising research and unique modeling approaches in real-world data contexts.* Explore and engage with modern, research-backed theoretical advances on deep tabular modeling* Utilize unique and successful preprocessing methods to prepare tabular data for successful modelling.WHO THIS BOOK IS FORData scientists and researchers of all levels from beginner to advanced looking to level up results on tabular data with deep learning or to understand the theoretical and practical aspects of deep tabular modeling research. Applicable to readers seeking to apply deep learning to all sorts of complex tabular data contexts, including business, finance, medicine, education, and security.ANDRE YE is a deep learning researcher with a focus on building and training robust medical deep computer vision systems for uncertain, ambiguous, and unusual contexts. He has published another book with Apress, Modern Deep Learning Design and Applications, and writes short-form data science articles on his blog. In his spare time, Andre enjoys keeping up with current deep learning research and jamming to hard metal.ANDY WANG is a researcher and technical writer passionate about data science and machine learning. With extensive experiences in modern AI tools and applications, he has competed in various professional data science competitions while gaining hundreds and thousands of views across his published articles. His main focus lies in building versatile model pipelines for different problem settings including tabular and computer-vision related tasks. At other times while Andy is not writing or programming, he has a passion for piano and swimming.○ Section 1: Machine Learning and Tabular Data■ Chapter 1 – Introduction to Machine Learning■ Chapter 2 – Data Tools○ Section 2: Applied Deep Learning Architectures■ Chapter 3 – Artificial Neural Networks■ Chapter 4 – Convolutional Neural Networks■ Chapter 5 – Recurrent Neural Networks■ Chapter 6 – Attention Mechanism■ Chapter 7 – Tree-based Neural Networks○ Section 3: Deep Learning Design and Tools■ Chapter 8 – Autoencoders■ Chapter 9 – Data Generation■ Chapter 10 – Meta-optimization■ Chapter 11 – Multi-model arrangement■ Chapter 12 – Deep Learning Interpretability○ Appendix A
Green IT - Status Quo und Anwendungsmöglichkeiten in Unternehmen
In Anbetracht des stetig voranschreitenden Klimawandels rücken Bestrebungen zur Reduzierungder Umweltbelastung immer mehr in den Fokus der Öffentlichkeit, so auch in derInformations- und Kommunikationstechnik. Aufgrund des veränderten Konsumverhaltensund vielerorts gesetzlicher Aspekte werden im Rahmen unternehmerischer EntscheidungenMaßnahmen zur Reduzierung des eigenen Umwelteinflusses immer stärker gewichtet.Das Konzept der Green IT bietet Unternehmen verschiedene Anwendungsmöglichkeitenim Zusammenhang mit der Informations- und Kommunikationstechnik mit dem Ziel, deneigenen Grad der Nachhaltigkeit zu fördern. Diese Bachelorarbeit führt das Konzept derGreen IT auf Basis der Literatur ein und definiert einen aktuellen Zustand, den StatusQuo der Green IT. Es werden außerdem Anwendungsmöglichkeiten der Green ITfür Unternehmen identifiziert und eingeordnet. Durch die Erhebung von Daten und Forschungsergebnissenaus der Literatur wird die Relevanz der Anwendungsmöglichkeitenbelegt und eine ökologische sowie ökonomische Bewertung durchgeführt. Diese Arbeitzeigt, dass insbesondere die Nutzung von Videokonferenzen und die nachhaltige Beschaffungvon Hardware ökologisch sowie ökonomisch effektive Anwendungsmöglichkeiten derGreen IT für Unternehmen sind. Es ist erkennbar, dass Unternehmen durch den Einsatzvon Informations- und Kommunikationstechnik Ressourcen einsparen und damit ihre Umweltbelastungverringern sowie einen Beitrag zum Schutz der Umwelt leisten können.
Software Development with Go
Gain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics. This book reviews the necessary tools to create container-based cloud solutions with Go, a programming language that was born out of the need to address scalable, high availability cloud computing architecture needs inside Google.Go, also known as Golang, has been adopted across different industries and products with many popular Open Source projects that power cloud computing technologies such as Docker and Kubernetes being written with Go. As the complexity of cloud technology increases, so does the need for people to understand how things work under-the-hood and to fix them when they’re broken.WHAT YOU WILL LEARN* Understand how the various components of a container-based system works* Tackle complex technical issues using Go* Integrate tools that can be used as part of your daily operational needs* Build system-based productsWHO THIS BOOK IS FORDevelopers and Engineers familiar with Go who want to know how different parts of the system work and who want to write command line tools. It will also be beneficial to programmers who already have a system-level understanding and want to use Go to build tools for existing projects and applications.NANIK TOLARAM is a big proponent of open source software with over 20 years of industry experience. He has dabbled in different programming languages, including Java, C, and C++. He has developed products from the ground up working in early startup companies. He is a software engineer at heart, but loves to write technical articles and share his knowledge with others.He learned to program with Go during the COVID 19 pandemic and hasn't looked back.SOFTWARE DEVELOPMENT WITH GOPART 1: SYSTEM PROGRAMMINGChapter 1 - System CallsChapter 2 - System Calls Using GoChapter 3 - Accessing proc File SystemPART 2: CONTAINERSChapter 4 - Simple ContainersChapter 5 - Containers with NetworkingChapter 6 - Docker SecurityPART 3: APPLICATION SECURITYChapter 7 - Gosec and ASTChapter 8 – ScorecardPART 4: NETWORKINGChapter 9 - Simple NetworkingChapter 10 - System NetworkingChapter 11 - Google gopacketChapter 12 - Epoll LibraryPART 5: SECURING LINUXChapter 13 - Vulnerability ScannerChapter 14 – CrowdSecPART 6: TERMINAL USER INTERFACEChapter 15 - ANSI and UIChapter 16 - TUI FrameworkPART 7: LINUX SYSTEMChapter 17 – systemdChapter 18 – cadvisor
Beginning Spring Data
Use the popular Spring Data project for data access and persistence using various Java-based APIs such as JDBC, JPA, MongoDB, and more.This book shows how to easily incorporate data persistence and accessibility into your microservices, cloud-native applications, and monolithic enterprise applications. It also teaches you how to perform unit and performance testing of a component that accesses a database. And it walks you through an example of each type of SQL and NoSQL database covered.After reading this book, you’ll be able to create an application that interacts with one or multiple types of databases, and conduct unit and performance testing to analyze possible problems. Source code is available on GitHub.WHAT YOU’LL LEARN* Become familiar with the Spring Data project and its modules for data access and persistence* Explore various SQL and NoSQL persistence types* Uncover the persistence and domain models, and handle transaction management for SQL* Migrate database changes and versioning for SQL* Dive into NoSQL persistence with Redis, MongoDB, Neo4j, and Cassandra* Handle reactive database programming and access with R2DBC and MongoDB* Conduct unit, integration, and performance testing, and moreWHO THIS BOOK IS FORExperienced Java software application developers; programmers with experience using the Spring framework or the Spring Boot micro frameworkANDRES SACCO is a Technical Lead at Prisma. He has experience using languages such as Java, PHP, and NodeJs. He also has experience using Spring. In his previous job, Andres helped find alternative ways to optimize the transference of data between microservices, which reduced the cost of infrastructure by 55%. He also has written internal courses about new technologies and articles on Medium. Andres shares his knowledge of using different types of databases, depending on the situation. He has experience with various types of testing, to search for problems in queries or repositories that access the database. Part I - IntroductionChapter 1: Architecture of the ApplicationsChapter 2: Spring Basics and BeyondChapter 3: Spring Data and Persistence TypesPart II - SQL PersistenceChapter 4: Persistence and Domain ModelChapter 5: Transaction ManagementChapter 6: Versioning or Migrate the Changes of the DatabasePart III - NO-SQL PersistenceChapter 7: Redis key/value DatabaseChapter 8: MongoDB Document DatabaseChapter 9: Neo4j Graph DatabaseChapter 10: Cassandra wide-column DatabaseChapter 11: Reactive access w/R2DBC and MongoDBChapter 12: Unit/Integration TestingChapter 13: Performance TestingChapter 14: Best PracticesPart I - IntroductionThis part or section contains all the introduction about the basics of the Spring and the architecture of theapplication to use the persistence.Chapter 1: Architecture of the applicationsChapter Goal: In this chapter, the readers will see the different ways of structuring one application and thebest practices to organize all the things related to persistence like the use of DAO (repositories on Spring).• Small history of the methods of persistence (Plain query using the class of Java, ORM)• Different types of architectureso Layerso Hexagonal or onion• Persistence design patterso DAO (Repositories in Spring)o Data Transfer Object (DTO)Chapter 2: Spring basics and beyondChapter Goal: In this chapter, the readers will see the different ways of structuring one application and thebest practices to organize all the things related to persistence like the use of DAO (repositories on Spring).• Spring’s Architecture• Dependency Injection and Inversion of Control• Basic Application SetupChapter 3: Spring Data and different types of persistenceChapter Goal: This chapter will provide a full explanation about Spring Data, how it works and what this librarydoes behind the scenes.• How the Spring Data works• How the Repositories workso Using interfaceso Defining a custom implementationPart II - SQL persistenceThis part or section contains the information about different aspects of the persistence of databases whichhave a rigid schema. Also, the readers will see different strategies of deploying the changes on the schemas.Chapter 4: Persistence and domain modelChapter Goal: In this chapter, the readers will learn the basics about persistence and how it works behind thescenes. Also, the readers will see how to create validations in the schema like the size of the column and thedifferent types of relationship between entities.• JPA configuration using annotationso Entity, Ido Types of relationshipso Pre-update, pre-persist• Ways to define the querieso Using specificationso Define SQL• How validate the schema• Types of InherenceChapter 5: Transaction managementChapter Goal: In this chapter, the readers will learn the basics of the transactions and some concepts of ACID.• Definition of ACID• Isolation Levels• Transactional levelsChapter 6: Versioning or migrate the changes of the databaseChapter Goal: In this chapter the readers will see different tools or strategies to include the changes of thedatabases, e.g use Liquibase/Flyway, running the scripts manually, or using the auto-update of the Spring.Also, this chapter will include some mechanism to move the data from one column to another using featureflags.• Mechanism to migrate the changes• Tools to versioning the changeso Liquibaseo Flyway• Using Feature Flags to new featureso What is a Feature flag?o Benefits of use this approacho Common librariesPart III - NO-SQL persistenceIn this section the idea is to cover one example of each type of the databases NO-SQL like key/value,document, graph, and wide-column database. The idea is not to cover all more than one example of a type ofdatabase because most of them have certain operations similar.Chapter 7: Redis key/value databaseChapter Goal: In this chapter, the readers will see how to run a database and save the information using aspecific key. Also, this chapter will show the readers to create a serializer to persist data that is complex andsome best practices like persist the information in async mode.The last point is how to configure the TTL in the information that the readers persist in the database.• What is Redis and which are the benefits?• Connecting with multiples Redis• Persist synchronous or asynchronous• Object Mapping and ConversionChapter 8: MongoDB Document databaseChapter Goal: In this chapter, the readers will see how to run a mongo database and how to persist theinformation with the definition of the entities using the different operations that are permitted on MongoDB.• What is a document store?• Setting up a Mongo• Access using repositories• Manage transactions in a programmatic wayChapter 9: Neo4j Graph databaseChapter Goal: In this chapter, the readers will see how to run a database and how to create different types ofqueries. Also the reader will see the different aspects of the persistence of the information and the use ofreactive approach.• Modeling the problem as a Grapho Cases of usero Benefits• Persisting the domain• Manage transactionsChapter 10: Cassandra wide-column databaseChapter Goal: In this chapter, the readers will see how to configure the database on Spring and thedeclaration of the entities that need to be used to persist the information. Also, the different ways topersist or modify the information on Cassandra.The last point is how to configure the TTL in the information that the readers persist in the database.• What is Cassandra and how works?• Configuration for Cassandra• Access using repositories• Defining a TTLPart IV – Advanced, testing and best practicesThis part covers some aspects of any type of database to create different types of tests and validate theperformance of the queries. Also, this section covers some best practices to reduce the possible problems ormistakes in the applications that access a database.Chapter 11: Reactive accessChapter Goal: This chapter needs to cover how you can access and obtain the information in a reactive way.• What is reactive access?• Modifying queries to be reactiveo R2DBCo MongoDBChapter 12: Unit/Integration testingChapter Goal: This chapter needs to cover more in detail how you can write unit tests without using anexistent database but using the same motor of the database, to do this the reader will use Test Cointainerswith Junit 5 which is the standard to write unit tests.• Unit Testing with Mocks• Integration Testing with a Databaseo What is Test containers?o Test Containers vs embeddedo How you can use it?o Possible problems in the pipelineChapter 13: Performance testingChapter Goal: In this chapter the reader will use some tools like Gatling or QuickPerform to see how tocreate a performance test and analyze if the queries have some issue related with the use ofCPU/memory.• How check or analyze the performance of the queries?• Analyzing the complexity of queries• Performance test of an endpoint that access to a DBChapter 14: Best practicesChapter Goal: In this chapter the reader will know some strategies to improve the performance of thedatabase including some mechanism of cache to reduce the number of times that anyone accesses toobtain information.• Access to the information◦ Master-slave• Using cache to reduce the accessed to DB• Compress the information• Lazy Loading Issues• Pagination and ways to reduce the response
PHP 8 Basics
Take advantage of PHP 8's powerful features to create basic web applications, solve code tests (required for most job interviews nowadays), and begin moving towards more advanced PHP concepts. This book provides an introduction to PHP 8, including modules, attributes, JIT compiler, and union types, as well as related frameworks such as Symfony.You will explore fundamental PHP concepts through both practical and hands-on examples. You'll not only gain a solid understanding of PHP fundamentals, but will also be prepared to handle new concepts and technologies as they emerge.After working through the book and its associated demo code, you will be able to build your first basic web application.WHAT YOU WILL LEARN* Develop web applications with PHP 8* Use Vagrant, Docker, JSON API and more* Work with data, form data, arrays, objections, exceptions, regex, and more* Utilize PHP frameworks like Laravel and SymfonyWHO THIS BOOK IS FORThose new to PHP 8 or PHP in general. Some prior experience in web development and DB handling is recommended.GUNNARD ENGEBRETH began coding at the age of 11 through a “Learning BASIC” book given to him by his father. Technology was changing fast and Gunnard rode the wave from 1200 to 56k baud modems. Logging in to BBSs, Prodigy, Compuserve, Delphi and IRC he could see the world changing and he wanted to be a part of it. He soon got involved in the ansi/demo scene, making several application generators for many groups in the 90’s. Visual Basic was the next language of choice allowing him to develop “tools” for online systems such as AOL. This introduced many aspects of development, security and UI while they were still in their infancy. Once the WWW arrived via Mindspring in Atlanta, Ga. Gunnard quickly joined in the race for the web. Learning HTML, PERL and Linux (Slackware at the time) he began to build his skill-set which lead to a full-time Sysadmin position at the age of 20 (2000) at Activegrams/Silverpop. Gunnard has moved around the IT industry from SAN/NAS storage at IBM to custom Wordpress sites for marketing companies, but one thing has stayed the same, a passion for learning and problem solving. Gunnard also DJ’s Drum and Bass as Section31, Playing drums and baking bread.SATEJ KUMAR SAHU works in the role of Senior Enterprise Architect at Honeywell. He is passionate about technology, people, and nature. He believes through technology and conscientious decision making, each of us has the power to make this world a better place. In his free time, he can be found reading books, playing basketball, and having fun with friends and family.Chapter 1: Getting StartedChapter 2: PHP FundimentalsChapter 3: Functions and ClassesChapter 4: DataChapter 5: Form dataChapter 6: ArraysChapter 7: Cookies and SessionsChapter 8: ObjectsChapter 9: Exceptions, Validation, Regular expressionsChapter 10: PHP & MySQL working togetherChapter 11: Basic Database DesignChapter 12: Creating a DB with PHP and MYsqlChapter 13: Basic Website with DBChapter 14: Basic JSON APIChapter 15: Intro to PHP FrameworksChapter 16: Intro to LaravelChapter 17: Intro to SymfonyChapter 18: Basic Symfony applicationChapter 19: Symfony Json APIChapter 20: Intro to Zend / Laminas ProjectChapter 21: Basic Zend / Laminas Project applicationChapter 22: Zend / Laminas Project JSON APIChapter 23: Intro to Slim PHPChapter 24: Basic Slim PHP applicationChapter 25: Slim PHP JSON APIChapter 26 or appendix: Wordpress developmentChapter 27 or appendix: Shopify development
Getting Started with Microsoft Viva
Use the power of analytics, knowledge management, and discovery for improved employee retention and insight to the unique collaborative and learning needs of your organization using Viva, Microsoft’s new employee experience platform.This book introduces you to the four central tenets of Microsoft Viva, a platform designed to improve communication, knowledge, learning, and insight within an organization. The authors, all Microsoft MVPs and early users of Viva, share their first-hand experiences and knowledge to teach you how to configure, utilize, and adopt Viva Topics, Viva Connections, Viva Learning, and Viva Insights to drive knowledge management and discovery within an organization.In Part I, you will learn how to classify data and topics within your organization, and learn how the use of AI can bring to life the discovery of knowledge and information related to people and other topics, allowing for better understanding and clarity of the content you see every day. In Part II, you will learn how to bring the power of SharePoint Syntex and Viva Topics into Microsoft Teams.In Part III, you will learn how to build a shared learning portal in Microsoft Teams using your own training materials, or bringing in third-party resources such as LinkedIn Learning and Skillsoft to connect directly to your employees. Managers will appreciate the ability to assign learning topics to users and gain the skills needed to create a fundamental process around learning consolidation. In Part IV, you will be introduced to Viva Insights, and understand how to discover vital analytics for individuals, managers, and leaders. You will also learn how it supports your company’s greatest asset, your employees.WHAT YOU WILL LEARN* Understand the basics of Viva to get up and running in no time* Configure each vertical of Microsoft Viva* Know the roles and pre-requisites for installation and configuration* Organize and think about your content for discovery and relationships* Deliver learning through an optimized experience for managers and users* Leverage the power of SharePoint within Teams using Viva ConnectionsWHO THIS BOOK IS FORManagement, end users, and system administrators who want to step up their knowledge management, better train and retain employees, and improve access to internal content. The book is designed for businesses that want to transform the way they learn about content and people within their organization, with the end objective of making their business grow and thrive.D’ARCE HESS is a Senior Cloud Architect at CloudWay. For more than 10 years, she has specialized in the creation of custom portals and experiences in SharePoint, Microsoft Teams, and Office365. As a UI/UX Designer and Developer, D’arce uses industry and Microsoft best practices as a base for creating solutions that simplify processes, drive user adoption, and governance from the start. As a recognized Microsoft MVP, she has worked with Fortune 500 companies and become a trusted partner to her clients in the industries of healthcare, pharmaceuticals, legal, travel & tourism and entertainment. She loves to volunteer in the community and is the leader of the Rhode Island SharePoint User Group.ALBERT-JAN SCHOT, also known as Appie, lives and breathes Microsoft 365 and it has become second nature to him. He has numerous certifications. With his extensive knowledge, Albert-Jan is a valuable source of information for colleagues. He not only enjoys stepping up to the challenge of designing, developing, and building innovative cloud solutions, but he also has consultancy and training experience. He is active on a range of forums, including blogs as well as on Twitter where he shares his knowledge and passion with others. Over the years, he has presented at several national and international user groups and events.TRACY VAN DER SCHYFF is an Office Servers and Business Applications MVP. She has published more than a thousand thought leadership and technical articles focused on Microsoft 365 and produced hundreds of training videos to teach and support the Microsoft Community. An international keynote and conference speaker, her passion is to "facilitate the evolution of human capabilities" and she does this by sharing her Microsoft 365, Change Management, Adoption, and Training knowledge enthusiastically.PART 1: MICROSOFT VIVA INTRODUCTIONChapter 1: Introduction to Microsoft VivaChapter 2: The Gears That Deliver Microsoft VivaChapter 3: Features & LicensingPART II: MICROSOFT VIVA LEARNINGChapter 4: Microsoft 365 AdoptionChapter 5: Introduction to Microsoft Viva LearningChapter 6: Viva Learning for AdministratorsChapter 7: Viva Learning for Employees & ManagersPART 3: MICROSOFT VIVA CONNECTIONSChapter 8: The IntranetChapter 9: Introduction to Microsoft Viva ConnectionsChapter 10: Preparation and SetupPART 4: MICROSOFT VIVA TOPICSChapter 11: Introduction to Viva TopicsChapter 12: Configuring Viva TopicsChapter 13: Topics Role in Knowledge ManagementChapter 14: Viva Topics Roles and ResponsibilitiesChapter 15: Creating and Working with Topics and Topic PagesPART 5: MICROSOFT VIVA INSIGHTSChapter 16: Employee WellbeingChapter 17: Licensing Viva Insights and Viva Insights CapacityChapter 18: Personal InsightsChapter 19: Manager InsightsChapter 20: Leader InsightsChapter 21: Advanced InsightsAppendix: Hyperlink Resources for Book
Blockchain for Teens
Similar to the Internet in the 1990s, Blockchain promises to revolutionize the world by reforming current business models. This book is a beginner-friendly guide for teens looking to build a basic foundation in Blockchain technologies.You'll start with an introduction to Blockchain, learn about the main features, and understand decentralization. Additionally, you'll get to know the current monetary system, major concepts in cryptography, and an overview of cryptocurrency. The book then explores various topics in Bitcoin, including its history, the consensus mechanism and the mining process.You'll also be introduced to non-fungible tokens (NFT)s, one of Blockchain’s most well-known technologies, and delve into its different aspects, including the top NFT marketplaces. There is also a chapter about the Metaverse, another groundbreaking technology that will influence society throughout the next decade. You'll see how Crypto and NFTs enhance the Metaverse, and the relationship between Blockchain and the Metaverse.At the end of the book you'll review topics from previous chapters in a discussion on the future of Blockchain and conclude with an overview of real-life examples of Blockchain across various industries.WHAT YOU'LL LEARN* Examine the basics of Bitcoin and Ethereum* Create your very own Bitcoin wallet* Understand the concept of NFTs and build your first token* Explore the Metaverse in Blockchain* Envision the future of BlockchainTHIS BOOK IS FORTeens who are looking to build a basic understanding of Blockchain technologies.Brian Wu holds a computer science Master's degree and is a senior blockchain architect and consultant. Brian has over 18 years of hands-on experience across various technologies, including Blockchain, Big Data, Cloud, System, Infrastructure, and UI. He has worked on more than 50 projects in his career.He has written several books, published by O'Reilly and Packt, on popular fields within blockchain, including: "Learn Ethereum (First edition)" "Hands-On Smart Contract Development with Hyperledger Fabric V2", "Hyperledger cookbook," "Blockchain Quick Start Guide," "Security Tokens and Stablecoins Quick Start Guide," "Blockchain By Example," and "Seven NoSQL Databases in a Week."Chapter 1: Blockchain: A Groundbreaking TechnologyCHAPTER GOAL:This chapter will talk about the basics of Blockchain. We will discuss how the current monetary system works and how Blockchain technology impacts money, business, and the modern world. Then, we will move on to fundamentals of cryptography. After that, readers will gain a solid understanding of the concept of consensus algorithms. At the end of the chapter, we will provide an overview of cryptocurrency.NO OF PAGES 25SUB -TOPICS1. What is Blockchain?1. The current monetary system2. The basics of cryptography3. Consensus algorithms4. Understanding cryptocurrencyChapter 2: Bitcoin: The Future of MoneyCHAPTER GOAL:This chapter will familiarize the reader with an overview of Bitcoin. We will also cover the history behind this phenomenon. Next, the reader will learn how Bitcoin works and analyze how Bitcoin is currently being used in businesses. By the end of the chapter, the reader will create their very own Bitcoin wallet.NO OF PAGES: 25 -30SUB - TOPICS1. What is Bitcoin?2. The history of Bitcoin3. How Bitcoin works4. The role of Bitcoin in business5. Taking control of your first Bitcoin walletChapter 3: Ethereum: A Gateway to Cryptocurrency CHAPTER GOAL:This chapter will introduce the core features of Ethereum, including the consensus. Then, the reader will explore the smart contract and tokens, as well as create a smart contract. Then, we will explore decentralized applications. We will also take a look at business in the age of Ethereum. At the end, the reader will learn how to use an Ethereum wallet.NO OF PAGES: 25-30SUB - TOPICS1. Getting to know Ethereum2. The history of Ethereum3. How Ethereum works4. Smart contract and tokens5. Writing your first smart contract6. Decentralized Applications (Dapps)7. Business in the age of Ethereum8. Taking control of your first Ethereum walletChapter 4: NFTs: Crypto as CollectiblesCHAPTER GOAL:This chapter will explain the topic of NFTs, provide an overview of how they work, and examine famous examples of NFTs. The reader will delve into the popular marketplace of NFTs. By the end of chapter, we will learn how to create an NFT, as well as discuss what the future of NFTs may look like.NO OF PAGES : 25 -30SUB - TOPICS:1. What are NFTs?2. How NFTs work3. Famous examples of NFT4. NFT market place5. Creating your own NFT6. The future of NFTChapter 5: Metaverse: The World ReimaginedCHAPTER GOAL:In this chapter, readers will come to understand what the Metaverse is and the history behind it. Then, the reader will take a deeper look at Crypto and NFTs in the Metaverse. Lastly, we will provide an overview of the Metaverse in the world of Blockchain.NO OF PAGES: 25SUB - TOPICS:1. What is the Metaverse?2. The history of the Metaverse3. Crypto and NFTs in the Metaverse4. Blockchain and the MetaverseChapter 6: The Future of BlockchainCHAPTER GOAL:In this chapter, we learn about the evolution of the Internet from Web 1.0, 2.0 and 3.0. Then, we will discuss some use cases of Blockchain across various industries, including finance, healthcare, education, At the end of the bookand the supply chain. We end off with a discussion of how Artificial Intelligence is used in Blockchain.NO OF PAGES: 25SUB - TOPICS:1. The Evolution of the Internet2. Blockchain in Finance3. Blockchain in Healthcare4. Blockchain in Education5. Blockchain in Supply chain6. AI in Blockchain
Introducing ReScript
This book serves as a succinct guide on ReScript, a functional language for building web applications. Using examples of ReScript language features along with explanations of fundamental concepts in functional programming, this book will show web developers with a background in JavaScript how to effectively use ReScript to its full potential.In Introducing ReScript, you'll learn how to use features in ReScript that JavaScript lacks, such as type inference, null-safety, algebraic data types, pattern matching, and more. Along the way, you'll pick up functional programming concepts like immutability and higher-order functions. You'll also gain a sense of how ReScript works under the hood and how to leverage interoperability between ReScript and JavaScript.Whether you're a web developer interested in dabbling with functional programming or you just want to learn how to write safer and cleaner code for web applications, this book is a great way for you to get started with ReScript.WHAT YOU WILL LEARN* Use ReScript to write clean, safe, and elegant software* Understand the features of ReScript that set it apart from JavaScript, such as type inference, null-safety, and algebraic data types* Explore functional programming concepts like immutabhigher-orderr order functions, and pattern matching* Use popular JavaScript libraries and frameworks in your ReScript code and integrate ReScript code into JavaScript codebasesWHO THIS BOOK IS FORWeb developers that want a strictly typed, safer alternative to JavaScript, as well as web developers interested in learning functional programming and leveraging the elegant and powerful functional features in ReScript.Danny Yang is a professional software engineer at Meta working on infrastructure for WhatsApp. He has previously worked on Facebook Messenger, including the web interface which was written in ReScript. His technical interests include functional programming, compilers, and data visualization, which he writes about on his blog.Chapter 1, IntroChapter Goal: Learn what functional programming is, and the background of the ReScript language● What is ReScript?● Why should you learn ReScript?● What is functional programming?● Why should you learn functional programming?Chapter 2, BasicsChapter Goal: Learn the basic features of ReScript, like expressions and operators- Development environment setup- Hello, World in ReScript- Expressions- Operators- If expressions- Let expressions- Printing and debuggingChapter 3, FunctionsChapter Goal: learn how functions work in ReScript- Defining a function- Applying a function- Polymorphic functions- Anonymous functionsChapter 4, Lists and ArraysChapter Goal: learn the data structures for ordered data in ReScript, learn about immutable data structures- Building a list- Accessing a list- Mutating a list- Arrays and mutability- IterationChapter 5, Records and ObjectsChapter Goal: learn the ways to represent composite data types in ReScript- Records- ObjectsChapter 6, Pattern Matching and DestructuringChapter Goal: learn one of ReScript's most powerful features and how to work with the shape of your data- Pattern matching/switch- Destructuring with let- Destructuring in functionsChapter 7, Algebraic Data TypesChapter Goal: learn how represent complex data in ReScript's type system- Variants- Polymorphic Variants- Options- TuplesChapter 8, Higher Order ProgrammingChapter Goal:- Higher order functions- Map- Filter- Reduce- Generalizing to other data structures- Piping- CurryingChapter 9, ModulesChapter Goal: Introduce modules in ReScript, and how they can be used for higher order programming- What are modules- Scope/visibility- Signature- Import/Export- FunctorsChapter 10, Using ReScript in ProductionChapter Goal: learn about ReScript's interoperability with JavaScript- Calling ReScript from JavaScript- Calling JavaScript from ReScript- Embedding JavaScript in ReScript- Working with DOM- Working with JSON- Runtime representation
The Enterprise Linux Administrator
Learn the basics, followed by the more advanced skills you will need to become an Enterprise Linux administrator. This book will prepare you to use Linux effectively with a clearer understanding of what is needed to successfully leverage new opportunities.After building a solid Linux knowledge foundation, you will learn how three major community Linux distributions are installed, configured, and used. The book will then guide you through all the different configurations a Linux administrator should know, along with some useful exercises for you to practice.Moving on, you will look at Enterprise Linux distributions, and how they are installed and configured. This will be the step that will elevate you from being a Linux administrator to an enterprise Linux administrator. You will also learn how an enterprise Linux administrator configures Linux security, high availability, automation, and large-scale Linux deployments. These skills are required when working in larger Linux estates. Finally, you'll review backups, recovery, and some general troubleshooting.By the end of this book, you'll not only learn how to become an Enterprise Linux administrator but will also learn what certifications are vital when competing for new career opportunities.WHAT YOU'LL LEARN* Install your own Linux environment* Study the basics to configuring Linux* Become an Enterprise Linux administrator and how to get there* Review comprehensive examples on how to use LinuxWHO THIS BOOK IS FORThose in the IT industry who have no Linux training or experience who wish to learn how to manage a Linux systemKen Hitchcock currently is a Senior Architect working for Red Hat, with over twenty years of experience in IT. He has spent the last eleven years predominantly focused on Red Hat products, certificating himself as a Red Hat Architect along the way. The last eleven years have been paramount in his understanding of how large Linux estates should be managed and in the spirit of openness, was inspired to share his knowledge and experiences in this book. Originally from Durban, South Africa, he now lives in the south of England where he hopes to not only continue inspiring all he meets but also to continue improving himself and the industry he works in. Part 1 - Requirements and Linux Background (35 pages)This section is a complete introduction to Linux. Its history, what the Operating system is, the different common distributions and how Linux differs from other Operating systems available today.Chapter 1 : Requirements (10 pages)* Explanation of what skills and knowledge is required before starting in the Linux world.* Recommended reading and studying materials.Chapter 2 : Origins and Brief History. (10 pages)* Unix past and evolution.* Linux history and how “Free” software shaped the OpenSource world.Chapter 3: Linux Explained. (15 pages)* Basics of the Operating system.* Common Linux distributionsMany uses of Linux* Differences between other Operating systems and Linux.Part 2: Getting Started (100 pages)This section is to start getting hands on Linux and learning how to install.Chapter 4: Installing Linux for the First Time (65 pages)* Where to get Linux. (5)Different vendors* Community* Licensing* Using virtualization. (5)* Windows Virtualization* Exercise* Libvirt* Exercise* Installing Ubuntu. (15)* How to create Linux installation media.* Basic Installation* Custom installations.* Exercise* Installing Fedora (15)* How to create Linux installation media.* Basic Installation* Custom installations.Exercise* Installing OpenSuse (15)* How to create Linux installation media.* Basic Installation* Custom installations.Exercise* Upgrading Linux (10)* What Linux distributions can be upgraded.* ExerciseChapter 5: Using Linux for the first time (35)* Accessing Linux (10)* Console* SSH* Web console* ExerciseCommand line (10)* Command line basics.* Command line shortcuts.* Different commands in different distributions.* Exercise* Desktop basics (15)* Installing different desktops.* Enabling and Disabling Desktops* ExercisePart 3: Configuring Linux (153)Chapter 6: Access Control (25)* SSH and SSHD configuration (8)* Configuration files and starting services.* Enabling access through Firewall.* ExerciseUsers & Groups (8)* Creating users and groups.* Exercise* Managing sudo.* Exercise* File & directory permissions. (9)* Chmod, chown, chgrp* AclsExerciseChapter 7: Package Installation (40)Installing packages (20)* Different package management systems.* Exercise* Manual package installation.* Exercise* Repository configuration.* Exercise* System patching (20)* Errata* Exercise* System updates* Exercise* Rollback* ExerciseChapter 8: Network configuration (25)* Network basics in Linux (17)* Configure network configuration with command line.* Configuring Network configuration with graphical tools.* Configure Network configuration with Desktop.* Exercise* Network tools (8)* Tools available and how to use them.* ExerciseChapter 9: Disk Configuration (40)* Disk management (30)* Tools available* Command line* Graphical* Exercise* LVM* Create, extend, migrate, destroy* Raid, mirror, HA* ExerciseFilesystem management (10)* Filesystem types* Creating, extending, resizing* ExerciseChapter 10: Service Management (23)* Basic management (10)* Starting, stopping and viewing services* Exercise* Systemd. (5)* Explained* Exercise* Creating a new service. (8)* Creating service files.* Enabling and disabling them.* ExercisePart 4: Enterprise Linux (200)Chapter 11: Example use cases for Linux (30)* Building a web server. (15)* Package installation* Configuring application configuration files* Firewall configuration.* SELinux configuration* Custom configuration.Automated configuration.* Exercise* Building a file server. (15)* Package installation* Configuring application configuration files* Firewall configuration* SELinux configuration* Custom configuration.Automated configuration.* ExerciseChapter 12: Security (46)* Firewall (10)* Explained* Command line configuration* Console & Web UI configuration* Exercise* SELinux (6)* Explained* Command line configuration.* Custom configuration* ExerciseHardening (15)* Explained.* Different standards.* Scanning* OpenSCAPAutomated remediation.* Exercise* Encryption (15)* Explained* Encryption methodsNetwork encryption* Certificates* Recovery* ExerciseChapter 13: High Availability (20)* Basic HA* Explained.* Ubuntu HA* Basic guide to simple HA* ExerciseRHEL HA* Basic guide to simple HA* Exercise* Suse HA* Basic guide to simple HA* ExerciseChapter 14: Scripting & Automation (24)* Basic shell scripting (12)* Explained.* Different interpreters.Examples* Exercise* Ansible (12)* Explained* ExamplesUse cases* Tools* ExerciseChapter 15: Enterprise Linux Distributions (60)* Red Hat enterprise Linux (20)* Brief history* Installing RHELEstate management basics* Subscriptions & Support* Training & Certifications* Ubuntu (20)* Brief History* Installing Ubuntu* Estate management basics* Subscriptions & SupportTraining & certifications* Suse (20)* Brief History* Installing Ubuntu* Estate management basicsSubscriptions & Support* Training & certificationsChapter 16: Deployment at Scale (20)* Methods (5)* Kickstart* Image clone* OtherTools (15)* What can be used to deploy Linux systems at scale.* Automation to learn* Ansible* SaltPuppet* Kickstart* Terraform* Image clone* ExamplesTraining* CertificationsPart 5: When Linux has Problems (65)Chapter 17: Troubleshooting Linux (35)* Logging (20)* Logs, where to find errors* Journalctl* Increasing verbosity* Understanding ErrorsRemote logging* Monitoring (10)* Tools* Local vs remote* Finding help (5)* Tools* Getting supportChapter 18: Recovering from Disaster (20)* Reinstalling* Knowing when to start over.* Things to consider.* Recovery mode* Booting into single user mode* Fixing kernel issues* Resolving disk or mount issues.* ExerciseRescue mode* Recovering using rescue disks* ExerciseChapter 19: Backup and Restore (10)* What to backup* Explained* exerciseWhat to restore* What to restore* ExerciseT
Reinforcement Learning for Finance
This book introduces reinforcement learning with mathematical theory and practical examples from quantitative finance using the TensorFlow library.Reinforcement Learning for Finance begins by describing methods for training neural networks. Next, it discusses CNN and RNN – two kinds of neural networks used as deep learning networks in reinforcement learning. Further, the book dives into reinforcement learning theory, explaining the Markov decision process, value function, policy, and policy gradients, with their mathematical formulations and learning algorithms. It covers recent reinforcement learning algorithms from double deep-Q networks to twin-delayed deep deterministic policy gradients and generative adversarial networks with examples using the TensorFlow Python library. It also serves as a quick hands-on guide to TensorFlow programming, covering concepts ranging from variables and graphs to automatic differentiation, layers, models, and loss functions.After completing this book, you will understand reinforcement learning with deep q and generative adversarial networks using the TensorFlow library.WHAT YOU WILL LEARN* Understand the fundamentals of reinforcement learning* Apply reinforcement learning programming techniques to solve quantitative-finance problems* Gain insight into convolutional neural networks and recurrent neural networks* Understand the Markov decision processWHO THIS BOOK IS FORData Scientists, Machine Learning engineers and Python programmers who want to apply reinforcement learning to solve problems.Samit Ahlawat is a Senior Vice President in Quantitative Research, Capital Modeling at J.P. Morgan Chase in New York, US. In his current role, he is responsible for building trading strategies for asset management and for building risk management models. His research interests include artificial intelligence, risk management and algorithmic trading strategies. He has given CQF institute talks on artificial intelligence, has authored several research papers in finance and holds a patent for facial recognition technology. In his spare time, he contributes to open source code. Chapter 1 Overview1.1 Methods for Training Neural NetworksChapter 2 Convolutional Neural Networks2.1 A Simple CNN2.2 Identifying Technical Patterns in Security PricesChapter 3 Recurrent Neural Networks3.1 LSTM Network3.2 LSTM Application: Correlation in Asset ReturnsChapter 4 Reinforcement Learning4.1 Basics4.2 Methods For Estimating MDP 4.3 Value Estimation Methods4.4 Policy Learning4.5 Actor-Critic Algorithms4.6; Implementation of algorithms to quantitative finance using TensorFlow - 1Chapter 5 Recent Advances in Reinforcement Learning Algorithms5.1 Double Deep Q-Network: DDQN5.2 Dueling Double Deep Q-Network5.3 Noisy Networks5.4 Deterministic Policy Gradient
Pro Oracle SQL Development
Write SQL statements that are more powerful, simpler, and faster using the advanced features of Oracle SQL. This updated second edition includes the newest advanced features: improved data structures (such as more JSON support and more table options), improved automated processes (such as automatic indexing), and improved SQL language extensions (such as polymorphic table functions, SQL macros, and the multilingual engine).PRO ORACLE SQL DEVELOPMENT is for anyone who already knows Oracle SQL and is ready to take their skills to the next level. This book provides a clearer way of thinking about SQL by building sets, and it provides practical advice for using complex features while avoiding anti-patterns that lead to poor performance and wrong results. Relevant theories, real-world best practices, and style guidelines help you get the most out of Oracle SQL.Many developers, testers, analysts, and administrators use Oracle databases frequently, but their queries are limited because they do not take advantage of Oracle’s advanced features. This book inspires you to achieve more with your Oracle SQL statements by creating your own style for writing simple, yet powerful, SQL. It teaches you how to think about and solve performance problems in Oracle SQL, and it covers enough advanced topics to put you on the path to becoming an Oracle expert.WHAT YOU'LL LEARN* Solve challenging problems with declarative SQL instead of procedural languages* Write SQL statements that are large and powerful, but also elegant and fast* Create development environments that are simple, scalable, and conducive to learning* Visualize and understand SQL more intuitively* Apply advanced syntax, objects, and architecture* Avoid SQL anti-patterns that accumulate technical debt* Tune SQL statements with multiple strategies that can significantly improve performanceWHO THIS BOOK IS FORDevelopers, testers, analysts, and administrators who want to harness the full power of Oracle SQL to solve their problems as simply and as quickly as possible; traditional database professionals looking for new ways of thinking about the language they have used for so long; and modern full stack developers who need an explanation of how a database can be much more than simply a place to store dataJON HELLER is an expert SQL and PL/SQL programmer with 20 years of Oracle experience. He has worked as a database developer, analyst, and administrator. In his spare time, he is active on Stack Overflow where he is a top user in the Oracle and PL/SQL tags. He enjoys creating open-source software. He has a Master of Computer Science degree from North Carolina State University, and lives in Iowa with his wife and two sons.PART I: LEARN HOW TO LEARNChapter 1: Understand Relational DatabasesChapter 2: Create an Efficient Database Development ProcessChapter 3: Increase Confidence and Knowledge with TestingChapter 4: Find Reliable SourcesChapter 5: Master the Entire StackPART II: WRITE POWERFUL SQL WITH SETS AND ADVANCED FEATURESChapter 6: Build Sets with Inline Views and ANSI Join SyntaxChapter 7: Query the Database with Advanced SELECT FeaturesChapter 8: Modify Data with Advanced DMLChapter 9: Improve the Database with Advanced Schema ObjectsChapter 10: Optimize the Database with Oracle ArchitecturePART III: WRITE ELEGANT SQL WITH PATTERNS AND STYLESChapter 11: Stop Coding and Start WritingChapter 12: Write Large SQL StatementsChapter 13: Write Beautiful SQL StatementsChapter 14: Use SQL More Often with Basic Dynamic SQLChapter 15: Avoid Anti-PatternsPART IV: IMPROVE SQL PERFORMANCEChapter 16: Understand SQL Performance with Algorithm AnalysisChapter 17: Understand SQL Tuning TheoriesChapter 18: Improve SQL PerformancePART V: SOLVE ANYTHING WITH ORACLE SQLChapter 19: Solve Challenging Problems with Arcane SQL FeaturesChapter 20: Use SQL More Often with Advanced Dynamic SQLChapter 21: Level Up Your Skills with PL/SQLPART VI: APPENDIXESAppendix A: SQL Style Guide Cheat SheetAppendix B: Computer Science Topics