Allgemein
Phishing and Communication Channels
Mitigate the dangers posed by phishing activities, a common cybercrime carried out through email attacks. This book details tools and techniques to protect against phishing in various communication channels.The aim of phishing is to fraudulently obtain sensitive credentials such as passwords, usernames, or social security numbers by impersonating a trustworthy entity in a digital communication.Phishing attacks have increased exponentially in recent years, and target all categories of web users, leading to huge financial losses to consumers and businesses. According to Verizon’s 2020 Data Breach Investigations Report (DBIR), 22% of all breaches in 2019 involved phishing. And 65% of organizations in the USA experience a successful phishing attack.This book discusses the various forms of phishing attacks, the communications most often used to carry out attacks, the devices used in the attacks, and the methods used to protect individuals and organizations from phishing attacks.WHAT YOU WILL LEARN* Understand various forms of phishing attacks, including deceptive, DNS-based, search engine, and contents injection phishing* Know which communications are most commonly used, including email, SMS, voice, blog, wifi, and more* Be familiar with phishing kits (what they are) and how security experts utilize them to improve user awareness* Be aware of the techniques that attackers most commonly use to request information* Master the best solutions (including educational, legal, technical) to protect against phishing attacksWHO THIS BOOK IS FORSecurity professionals who need to educate online users, especially those who deal with banks, online stores, payment systems, governments organizations, social networks and blogs, IT companies, telecommunications companies, and others. The secondary audience includes researchers working to develop novel strategies to fight against phishing activities and undergraduate and graduate instructors of cybersecurity.DR. GUNIKHAN SONOWAL is an Assistant Professor in the Department of Computer Science and Engineering at KL University. His research interests include information security (phishing) and accessibility computing. He received his Bachelor of Science degree (BSc) from Sibsagar College, a Master of Computer Application (MCA) at University of Hyderabad, India, and a PhD in computer science and engineering from Pondicherry University. He has published eight research papers in peer-reviewed journals and international conferences.1: Introduction to Phishing.-2: Types of Phishing.-3: Communication Channels.-4: What Does a Phishing URL Look Like?.-5: Characteristics of a Phishing Website.-6: Phishing Kits.-7: Training Methods for Phishing Detection.-8: Legal Solution: Phishing is Prohibited Under a Number of Laws.-9: Phishing Detection Based on Technology.
Machine Learning with PySpark
Master the new features in PySpark 3.1 to develop data-driven, intelligent applications. This updated edition covers topics ranging from building scalable machine learning models, to natural language processing, to recommender systems.Machine Learning with PySpark, Second Edition begins with the fundamentals of Apache Spark, including the latest updates to the framework. Next, you will learn the full spectrum of traditional machine learning algorithm implementations, along with natural language processing and recommender systems. You’ll gain familiarity with the critical process of selecting machine learning algorithms, data ingestion, and data processing to solve business problems. You’ll see a demonstration of how to build supervised machine learning models such as linear regression, logistic regression, decision trees, and random forests. You’ll also learn how to automate the steps using Spark pipelines, followed by unsupervised models such as K-means and hierarchical clustering. A section on Natural Language Processing (NLP) covers text processing, text mining, and embeddings for classification. This new edition also introduces Koalas in Spark and how to automate data workflow using Airflow and PySpark’s latest ML library.After completing this book, you will understand how to use PySpark’s machine learning library to build and train various machine learning models, along with related components such as data ingestion, processing and visualization to develop data-driven intelligent applicationsWHAT YOU WILL LEARN:* Build a spectrum of supervised and unsupervised machine learning algorithms* Use PySpark's machine learning library to implement machine learning and recommender systems * Leverage the new features in PySpark’s machine learning library* Understand data processing using Koalas in Spark * Handle issues around feature engineering, class balance, bias and variance, and cross validation to build optimally fit modelsWHO THIS BOOK IS FORData science and machine learning professionals. Pramod Singh works at Bain & Company in the Advanced Analytics Group. He has extensive hands-on experience in large scale machine learning, deep learning, data engineering, designing algorithms and application development. He has spent more than 13 years working in the field of Data and AI at different organizations. He’s published four books – Deploy Machine Learning Models to Production, Machine Learning with PySpark, Learn PySpark and Learn TensorFlow 2.0, all for Apress. He is also a regular speaker at major conferences such as O’Reilly’s Strata and AI conferences. Pramod holds a BTech in electrical engineering from B.A.T.U, and an MBA from Symbiosis University. He has also earned a Data Science certification from IIM–Calcutta. He lives in Gurgaon with his wife and 5-year-old son. In his spare time, he enjoys playing guitar, coding, reading, and watching football.Chapter 1: Introduction to Spark 3.1Chapter Goal: The book’s opening chapter introduces the readers to latest changes in PySpark and updates to the framework. This chapter covers the different components of Spark ecosystem. The chapter doubles up as an introduction to the book’s format, including explanation of formatting practices, pointers to the book’s accompanying codebase online, and support contact information. The chapter sets readers’ expectations in terms of the content and structure of the rest of the book. This chapter provides the audience with a set of required libraries and code/data download information so that the user is able to set up their environment appropriately.No of pages -30Sub -Topics1. Data status2. Apache Spark evolution3. Apache Spark fundamentals4. Spark components5. Setting up Spark 3.1Chapter 2: Manage Data with PySparkChapter Goal:This chapter covers the steps right from reading the data, pre-processing and cleaning for machine learning purpose. The chapter showcases the steps to build end to end data handling pipelines to transform and create features for machine learning. It covers simple way to use Koalas in order to leverage pandas in a distributed way in Spark.It also covers the method to automate the data scripts in order to run schedules data jobs using Airflow.No of pages:50Sub - Topics1. Data ingestion2. Data cleaning3. Data transformation4. End- to end data pipelines5. Data processing using koalas in Spark on Pandas DataFrame6. Automate data workflow using AirflowChapter 3: Introduction to Machine LearningChapter Goal:This chapter introduces the readers to basic fundamentals of machine learning. This chapter covers different categories of machine learning and different stages in the machine learning lifecycle. It highlights the method to extract information related to model interpretation to understand the reasoning behind model predictions in PySpark .No of pages: 25Sub - Topics:1. Supervised machine learning2. Unsupervised machine learning3. Model interpretation4. Machine learning lifecycleChapter 4: Linear Regression with PySparkChapter Goal:This chapter covers the fundamentals of linear regression for readers. This chapter then showcases the steps to build feature engineering pipeline and fitting a regression model using PySpark latest machine learning libraryNo of pages:20Sub - Topics:1. Introduction to linear regression2. Feature engineering in PySpark3. Model training4. End-to end pipeline for model predictionChapter 5: Logistic Regression with PySparkChapter Goal:This chapter covers the fundamentals of logistic regression for readers. This chapter then showcases the steps to build feature engineering pipeline and fitting a logistic regression model using PySpark machine learning library on a customer datasetNo of pages:251. Introduction to logistic regression2. Feature engineering in PySpark3. Model training4. End-to end pipeline for model predictionChapter 6: Ensembling with PysparkChapter Goal:This chapter covers the fundamentals of ensembling methods including bagging, boosting and stacking. This chapter then showcases strengths of ensembling methods over other machine learning techniques. In the final part -the steps to build feature engineering pipeline and fitting random forest model using PySpark Machine learning library are coveredNo of pages:301. Introduction to ensembling methods2. Feature engineering in PySpark3. Model training4. End-to end pipeline for model predictionChapter 7: Clustering with PySparkChapter Goal:This chapter introduces the unsupervised part of machine learning - clustering. This chapter covers the steps to build feature engineering pipeline and running a customer segmentation exercise using PySpark machine learning libraryNo of pages:201.Introduction to clustering2. Feature engineering in PySpark3. Segmentation using PysparkChapter 8: Recommendation Engine with PySparkChapter Goal:This chapter focuses on the fundamentals of building scalable recommendation models. This chapter introduces different types of recommendation models that are used widely and then showcases the steps to build data pipeline and training a hybrid recommendation model using PySpark machine learning library for making recommendations to customersNo of pages:251. Introduction to types of recommender systems2. Deep dive into collaborative filtering3. Building recommendation engine using PySparkChapter 9: Advanced Feature Engineering with PySparkChapter Goal:This chapter covers the process to handle sequential data such as customer journey that can be used in prediction as well. This chapter also includes the use of PCA technique for reducing the dimensional space to handful features. At the end -it showcase use of machine learning flow to deploy Spark models in production.No of pages:451.Sequence embeddings for prediction2. Dimensionality reduction3. Model deployment in PySpark
Microsoft Blazor
Build web applications in C# and Microsoft .NET 6 that run in any modern browser and become a full-stack web developer!. Do all these things using the Microsoft Blazor framework and the techniques shown in this book. New in this edition is coverage of the new and improved Razor syntax, communication with the server using SignalR and/or gRPC, the use of virtualization to load large quantities of data efficiently, deployment and ahead-of-time compilation into WASM, new unit testing features, security using OpenID Connect, and more.Reading this book helps you learn to build user interfaces and present data to a user for display and modification, capturing the user’s changes via data binding. The book shows how to access a rich library of .NET functionality such as a component model for building a composable user interface, including how to develop reusable components that can be used across many pages and websites. Also covered is data exchange with a server using REST, SignalR, and gRPC, giving you access to microservices and database services.Blazor provides a fresh take on web development by eliminating the need for you to learn different languages and frameworks for client- and server-side development. Blazor allows C# and .NET to be used on all sides—both server-side and client-side—providing a robust feature set that is well suited toward scalable, enterprise-level applications. With Blazor you can use all your experience in .NET 6 along with thousands existing libraries, right in the browser. This book gets you proficient using this important toolkit for web application development.WHAT YOU WILL LEARN* Build user interfaces and display data for users to edit* Capture user edits and changes via data binding* Transfer data back and forth between server and client* Communicate with microservices and database services using REST, SignalR, or gRPC* Develop reusable components and assemble them into bigger components* Use routing to build single-page applications (SPAs)* Build stable and maintainable software using unit testing* Internationalize your application to reach more users* Secure your Blazor application with OpenID ConnectWHO THIS BOOK IS FORExperienced .NET developers who want to apply their existing skills toward building professional-quality, client-side web applications that run in any browser and web developers who want to step away from JavaScript and its complexities, and instead use a proven technology (C# and .NET6) that is robust toward creating enterprise-quality applications that scale and are reliable, and provide a good user experiencePETER HIMSCHOOT works as a lead trainer, architect, and strategist at U2U. He has a wide interest in software development that includes applications for the web, Windows, and mobile devices. He has trained thousands of developers, is a regular speaker at international conferences, and has been involved in many web and mobile development projects as a software architect. He has been a Microsoft Regional Director (from 2003 to 2019), which is a group of trusted advisors to developer and IT professional audiences, and to Microsoft.1. Introduction to WebAssembly and Blazor2. Data Binding3. Components and Structure for Blazor Applications4. Advanced Components5. Services and Dependency Injection6. Data Storage and Microservices7. Communication with Microservices8. Unit Testing9. Single Page Applications and Routing10. JavaScript Interoperability11. Blazor State Management12. Building Real-Time Applications with Blazor and SignalR13. Efficient Communication with gRPC14. Supporting Multiple Languages in your Blazor Application15. Deploying your Blazor Application16. Security with OpenID Connect17. Securing Blazor WebAssembly
Conflicts, Crimes and Regulations in Cyberspace
The study of cyberspace is relatively new within the field of social sciences, yet interest in the subject is significant. Conflicts, Crimes and Regulations in Cyberspace contributes to the scientific debate being brought to the fore by addressing international and methodological issues, through the use of case studies.This book presents cyberspace as a socio-technical system on an international level. It focuses on state and non-state actors, as well as the study of strategic concepts and norms. Unlike global studies, the socio-technical approach and “meso” scale facilitate the analysis of cyberspace in international relations. This is an area of both collaboration and conflict for which specific modes of regulation have appeared. SEBASTIEN-YVES LAURENT is a Professor working in the Faculty of Law and Political Science at the University of Bordeaux, France. His research is in international relations and security studies, with a particular focus on cyber and digital issues.Introduction XiSébastien-Yves LaurentCHAPTER 1 THE UNITED STATES, STATES AND THE FALSE CLAIMS OF THE END OF THE GLOBAL INTERNET 1Sébastien-Yves Laurent1.1 Introduction 11.2 The Creation Of The Internet And The Development Of Cyberspace By The United States 21.2.1 The First International Telecommunications Systems Developed By All States 31.2.2 The Creation And Development Of The Internet By The United States 31.2.3 International Management Controlled By The United States 41.2.4 A Sociotechnical System Bearing A Composite American Ideology 101.2.5 The False Recomposition Of The Global Sociotechnical System: The Global Summits On The Information Society 111.3 Cyberspace Transformed By The Arrival In Force Of States 131.3.1 State Intentions In “National Strategies”: A Global Approach 141.3.2 Russian–American Structural Disagreements On Information Security And Cybersecurity 161.3.3 Discussions On Cybersecurity: The Symbolic International Restoration Of The Coercive State 181.4 Praxis Of State Coercion In Cyberspace 201.4.1 Intelligence And Surveillance Activities In The Digital Environment 211.4.2 Non-Military Cyber Operations 241.4.3 Interstate Digital Conflicts, Secrecy And Coercive Diplomacy 261.5 The Fragmentation Of The Global Internet And The Digital Sovereignty Of States 291.5.1 Linguistic Balkanization: Digital Babel 291.5.2 Political Fragmentation: Alternative Internets 311.6 The Strong Constraint Of Interstate Cooperation For All States 331.6.1 Interstate Agreements On An Embryo Of International Law 331.6.2 State Dependence On International Cooperation For Cybersecurity 341.7 Conclusion 351.8 References 36CHAPTER 2 CYBERSECURITY IN AMERICA: THE US NATIONAL SECURITY APPARATUS AND CYBER CONFLICT MANAGEMENT 43Frédérick Gagnon and Alexis Rapin2.1 Introduction 432.2 Societal And Institutional Dynamics 452.3 Organizational And Bureaucratic Dynamics 492.4 Individual Dynamics 532.5 Conclusion 572.6 References 58CHAPTER 3 SEPARATION OF OFFENSIVE AND DEFENSIVE FUNCTIONS: THE ORIGINALITY OF THE FRENCH CYBERDEFENSE MODEL CALLED INTO QUESTION? 63Alix Desforges3.1 Introduction 633.2 A Model Designed And Developed In Response To The Threats And Challenges Of The Early 2010s 663.2.1 An Organizational Model Apparently Based On Two Main Actors 663.2.2 The Commitment To A Strict Offensive/Defensive Separation 713.3 A Strict Separation Of Offensive And Defensive Functions And Missions: An Obstacle To Better Defense? 753.3.1 A Rapidly Changing Context: An Increasingly Significant Threat From The Most Advanced States 763.3.2 Limits That Have Become Obstacles To Accomplishing Cyberdefense Missions 783.3.3 An Institutionalized Rapprochement Of The Actors Of Defensive And Offensive Parts In The Name Of Cyberdefense Missions: From Mitigation To Obliteration? 823.4 Conclusion 853.5 References 86CHAPTER 4 THE BOUNDARY BETWEEN CYBERCRIME AND CYBERWAR: AN UNCERTAIN NO-MAN’S LAND 89Marc Watin-Augouard4.1 Introduction 894.2 The Field Of Cybercrime Up To The Limits Of The Glass Ceiling 914.2.1 The Field Of Cybercrime: An Attempt At Delimitation 924.2.2 Cybercrime, The “21st Century Crime” 954.2.3 Cyber Conflict At The Edge Of The Glass Ceiling 954.3 War In Cyberspace, Cyber In War 984.3.1 Cyber In War, A Daily Reality 984.3.2 Autonomous Warfare In The Cyber World: The Test Of The Law Of Armed Conflict 994.3.3 Digital Cyber Persuasion 1024.4 Conclusion 1044.5 References 105CHAPTER 5 CYBERDEFENSE, THE DIGITAL DIMENSION OF NATIONAL SECURITY 107Bertrand Warusfel5.1 Introduction 1075.2 Cyberdefense In The Political And Legal Framework Of Digital Security 1085.2.1 A Definition Of Cyberdefense 1085.2.2 Linking Cyberdefense To National Security Strategy 1095.3 The Emergence Of A Coherent Legal Regime For Cyberdefense 1115.3.1 The Legal Basis Of The Permanent Cyberdefense Posture 1115.3.2 Exceptional Instruments For Responding To A Crisis 1125.4 Conclusion 1155.5 References 116CHAPTER 6 OMNIPRESENCE WITHOUT OMNIPOTENCE: THE US CAMPAIGN AGAINST HUAWEI IN THE 5G ERA 117Mark Corcoral6.1 Introduction 1176.2 The Unilateral American Offensive Against Huawei: A Disruptive Campaign Causing Significant Collateral Damage 1196.2.1 Huawei: An “Unusual And Extraordinary” Threat To The United States’ Position In The International Order 1206.2.2 A Political, Legal And Economic Offensive Against Huawei, Causing Significant Collateral Damage 1226.3 The American Diplomatic Offensive: The Limits Of American Rhetorical Coercion Of Their Partners And Allies 1286.3.1 Educating Rather Than Persuading: An Attempt To Rhetorically Coerce Partners And Allies 1296.3.2 Successful Agenda Setting But Limited Rhetorical Coercion 1316.3.3 American Rhetorical Coercion In The Special Relationship 1346.4 The Anti-Huawei Offensive: A Barometer Of American Power? 1376.5 References 139CHAPTER 7 THE ISSUE OF PERSONAL AND SOVEREIGN DATA IN THE LIGHT OF AN EMERGING “INTERNATIONAL LAW OF INTELLIGENCE” 147Fabien Lafouasse7.1 Introduction 1477.2 The Legal Rules Invoked In The Collection Of Personal And Sovereign Data 1507.2.1 Right To Privacy Versus General Communications Surveillance 1507.2.2 Violation Of Territorial Sovereignty Versus Cyberespionage 1537.3 Data Localization In The Light Of International Intelligence Law 1567.3.1 Data Fluidity Versus Data Storage 1567.3.2 Datasphere Versus International Intelligence Law 1597.4 Conclusion 1637.5 Appendix: The Quadrants Of Intelligence Law 1647.6 Sources And References 1657.6.1 Sources 1657.6.2 References 166CHAPTER 8 INTERNATIONAL CYBERSECURITY COOPERATION 169Guillaume Poupard8.1 Current Attack Trends 1698.2 The Multiple Paths Of International Cooperation 1718.3 The Issue Of Attack Attribution 175CHAPTER 9 CYBERDEFENSE AND CYBERSECURITY REGULATIONS IN THE UNITED STATES: FROM THE FAILURE OF THE “COMPREHENSIVE POLICY” TO THE SUCCESS OF THE SECTORAL APPROACH 177Adrien Manniez9.1 Introduction 1779.2 The Identification Of A New Threat And The Impact Of Cyber On How US Security And Defense Policies Are Designed 1789.3 From The Impact Of Cyber On Policy To The Impact Of Politics On Cyber 1819.4 From A Comprehensive Cyber Policy To A Sectoral Approach: The Success Of An Undeclared Regulatory Policy 1909.5 Conclusion 1959.6 References 196List of Authors 199Index 201
Software-Architekturen dokumentieren und kommunizieren
Dokumentation wird oft als lästige Pflicht angesehen und in vielen Softwareprojekten stark vernachlässigt, die Architektur wird manchmal überhaupt nicht beschrieben. Damit das in Ihren Projekten nicht passiert, schlägt dieses Buch praxiserprobte und schlankere Bestandteile für eine wirkungsvolle Architekturdokumentation vor.Anhand eines durchgängigen Beispiels erfahren Sie, wie Sie architekturrelevante Einflussfaktoren erfassen und Ihre Softwarelösung angemessen und ohne Ballast festhalten. Sie lernen nicht nur die Vorgehensweise für das Dokumentieren während des Entwickelns kennen, sondern auch, wie Sie bestehende Systeme im Nachhinein beschreiben. Neben der Methodik diskutiert das Buch auch typische Formate und Werkzeuge wie Wikis, UML-Werkzeuge unter anderem, mit denen Sie Architekturdokumentation erfassen, verwalten und verbreiten kann.Checklisten und Übungsaufgaben geben Ihnen die nötige Sicherheit, um die Architekturdokumentation zu einem integralen Bestandteil Ihres Softwarevorhabens zu machen. Autor:Stefan Zörner arbeitet als Softwarearchitekt und Berater bei embarc in Hamburg. Er wirkt bei Entwurfs- und Umsetzungsfragen mit, unterstützt beim Festhalten von Architektur und beleuchteten Lösungsansätzen in Bewertungen. Sein Wissen und seine Erfahrung teilt er regelmäßig in Vorträgen, Artikeln und Workshops.
Office 2021: Was gibt's Neues?
Neue Office-Versionen bieten eine Fülle von Funktionen. Die meisten sind vertraut und müssen nicht noch einmal neu erklärt werden. Denn spannend sind ja die Neuigkeiten daran! In diesem Heft wird ausschließlich gezeigt, was neu an Office 2021 ist und wie man sich mit den neuen Möglichkeiten die Arbeit erleichtern kann. Und falls man nicht alle Veränderungen mag, findet man hier auch die Wege, sich die vertraute Optik wieder einzurichten.Ina Koys ist langjährige Trainerin für MS-Office-Produkte. Viele Fragen werden in den Kursen immer wieder gestellt, aber selten in Fachbüchern behandelt. Einige davon beantwortet sie jetzt in der Reihe "kurz & knackig".
Beginning 3D Game Assets Development Pipeline
This project-based tutorial covers the creation of 3D assets in a game engine, from concept to implementation. You will learn the 3D pipeline using Maya and Substance Painter, which are industry-standard programs used for content creation in game development. You also will know how to add them and work with them in Unity.The book begins with an overall look at the production of game development and the different roles in creating assets. Then, starting with Maya, you learn how to start with a concept and take it through the entire production pipeline: base mesh, UV mapping, high poly, texturing, rigging, and animation. You will be working on one asset project throughout the entire book to understand how one phase leads to the next one. Lastly, you will cover asset placement and integration into Unity.WHAT YOU WILL LEARN* Build a thorough knowledge of the 3D game asset production workflow* Understand how each phase leads up to the next one* Know how 3D assets are implemented into Unity* Texture, rig, and animate the 3D model* Export and import the 3D asset or model* Understand the iterative design processWHO THIS BOOK IS FOR3D artists, from beginners to specialists, who are interested in learning the 3D production pipeline of game assets as a wholeNOVA VILLANUEVA is Professor of Game Design at Pratt Institute, New York, USA. She has taught game development for more than five years at Pratt, Parsons, and New York’s College of Technology, and is an independent game developer working on The Mills game. She live streams her game development process at twitch.tv/novavillan. Nova has previously worked as a 3D artist for Animatic Media, a 2D artist for the Webby award-winning Mafia Wars game developed by Zynga, and is a published artist featured in the Photoshop Creative magazine. She has an MFA degree in game design from the NYU Game Center in New York and a BS degree in media arts and animation from the Art Institute of Fort Lauderdale, Florida.CHAPTER 1: WHAT IS THE 3D PRODUCTION PIPELINE AND WHY IS IT IMPORTANT?Who this Book is Intended forAbout the 3D Pipeline and How it Fits in the Game Design Process3D Modeling3D TexturingWait! What about Rigging and Animation?Textures before Rigging or Backwards?3D AnimationGame Development WorkflowWorking with a TeamHow to Use this BookNon-Linear Game DevelopmentEmbracing and Utilizing Computer ShortcutsUsing the Right ToolsWhat is Maya?What is Substance Painter?What is Unity?PricingGetting StartedThe Importance of Using ReferenceGathering ReferencesSummaryCHAPTER 2: STARTING WITH MAYAInstalling and Opening MayaWindows InstallationMac InstallationOverview of the InterfaceTop MenuStatus LineMenu SetsShelfChannel BoxAttribute EditorQuick Layout and Outliner ButtonsTime SliderRange SliderPlayback ControlsView PanelMarking MenusHow to Follow along with the StepsCreating PrimitivesTranslate, Rotate, and ScaleTranslateRotateScaleNavigationDuplicate ObjectsDelete ObjectsAdding Edge LoopsPivot ManipulatorMirroring Geometry MethodsDuplicate and ScaleDuplicate SpecialComponent Selection ModeFace, Vertex, and EdgeFace ModeVertex ModeEdge ModeSelectDelete Faces and EdgesTransformScaleRotateExtrude FacesBefore ContinuingShortcutsSet-Up ProjectSetting up the Mech ProjectSummaryCHAPTER 3: CREATING THE BASE MESHBase MeshException to the RuleTopologyN-gonsConcave FacesMetricsImage Plane ReferenceSwitching Between Panel ViewsStarting to ModelSymmetryScaleDeselecting and Inverting ComponentsUsing the Channel Box for TransformationUsing Duplicates to Speed Up ModelingDisplay ModesX-Ray ModeModeling the Leg ConnectorsDuplicating the shapes of the Leg ConnectorsModeling the Foot StabilizersModeling Armor for the Motor UnitsBuilding the BodyShaping the HeadAdding Thickness to the HeadModeling the Head DetailsAdding the Neck ModelPositioning the LegInstancing the MechSummaryCHAPTER 4: PREPARING THE ASSET FOR THE NEXT PHASEAdopting Best PracticesPipeline RequirementsWhat is the Outliner and Why Do We Use it?Using the Outliner for Clean UpWhat is Construction HistoryCleaning Up the HistoryStarting to Use the OutlinerCombining, Naming and Freezing MeshesResetting TransformationsFreezing TransformationsPivot LocationsUsing Instancing for Fast PrototypingGrouping Our AssetSummaryCHAPTER 5: UV Mapping the 3D ModelWhat Are UVs?The Different Ways You Can UV MapWhat is the UV Editor and What is it Used for?Clean Up for UV MappingSetting Up and Using the UV EditorCreating a Basic UV Map for the MechUVing Multiple Meshes SimultaneouslyDeleting History if Our UVed MeshesOptimization of Mesh UVsCutting and Sewing SeamsUnfolding UV ShellsHandling a Real-Life UV Pipeline ScenarioOptimizing and Arranging UVsTexel DensityMoving, Arranging, and Packing UVsIt Always DependsFinal Arrangement and LayoutSummaryCHAPTER 6: CREATING THE HIGH POLY MODELWhat is a High Poly Model?Why Create the Illusion of DepthThe Different Approaches to End Up with a Low and High PolySetting up for the High PolyWhat is the Difference between a Low and High Poly Model?Creating the High PolyAdding Details and Edge Definition to the BodyModeling in a Non-Destructive WayAdding Details to the FeetAdding the Rest of the Mech’s DetailsSummaryCHAPTER 7: TEXTURING THE 3D MODELUsing Floaters to Add Texture DetailsGetting Our Maya Files ReadyWorking With Multiple Texture on a Single ModelExporting the FBX ModelInstalling and Opening Substance 3D PainterOverview of the InterfaceTop MenuToolbarLayersPropertiesViewportTexture Set ListAssetsDisplay SettingsSetting Up to TextureBaking the ModelCreating Textures Using a PBR PipelineStarting to TextureMaskingWorking with Multiple MaterialsAdding Sticker DecalsExporting the TexturesConfiguring Custom Output Texture MapsSummaryCHAPTER 8: RIGGING THE 3D MODELWhat is Rigging?Understanding Mesh AnimationWhat are Joints?Working with JointsCreating JointsArranging JointsMoving JointsMirroring JointsWorking with Control CurvesCreating a Control CurveUsing Kinematics for MovementCreating IKs for the LegsWhat are Constraints?The Importance of Using ConstraintsCreating GroupsSetup the Head ControlSetup the Body ControlSetup the Left and Right FemurSetup the Left and Right TibiaSetup the FeetGrouping SystemSummaryCHAPTER 9: BRINGING THE ASSET TO LIFEIterative DesignAnimating the MechAnimation StatesSet up the Scene for AnimationCreating the Idle the AnimationAdding Keyframes on the MechDeleting KeyframesExporting the Animated MechInstalling and Opening UnityOverview of UnityCreating a New ProjectNavigation in the Scene ViewInterfaceWorking with Assets in UnityUsing the HierarchyUsing the InspectorAdding Textures to Our MechChanging Shaders and Linking Textures to Map SlotsAssigning the Materials to the Mech AssetWorking with Level of DetailsPlaying the SceneWhat about Other Assets?SummaryWrapping it All UpWhere to Go from Here?Staying Inspired
Cloud-Native Microservices with Apache Pulsar
Apply different enterprise integration and processing strategies available with Pulsar, Apache's multi-tenant, high-performance, cloud-native messaging and streaming platform. This book is a comprehensive guide that examines using Pulsar Java libraries to build distributed applications with message-driven architecture.You'll begin with an introduction to Apache Pulsar architecture. The first few chapters build a foundation of message-driven architecture. Next, you'll perform a setup of all the required Pulsar components. The book also covers work with Apache Pulsar client library to build producers and consumers for the discussed patterns.You'll then explore the transformation, filter, resiliency, and tracing capabilities available with Pulsar. Moving forward, the book will discuss best practices when building message schemas and demonstrate integration patterns using microservices. Security is an important aspect of any application; the book will cover authentication and authorization in Apache Pulsar such as Transport Layer Security (TLS), OAuth 2.0, and JSON Web Token (JWT). The final chapters will cover Apache Pulsar deployment in Kubernetes. You'll build microservices and serverless components such as AWS Lambda integrated with Apache Pulsar on Kubernetes.After completing the book, you'll be able to comfortably work with the large set of out-of-the-box integration options offered by Apache Pulsar.WHAT YOU'LL LEARN* Examine the important Apache Pulsar components * Build applications using Apache Pulsar client libraries* Use Apache Pulsar effectively with microservices* Deploy Apache Pulsar to the cloudWHO THIS BOOK IS FORCloud architects and software developers who build systems in the cloud-native technologies.RAHUL SHARMA is a software developer with around 17 years of experience in Java/J2EE and Python applications. Being an open-source enthusiast, he has contributed to various projects like Apache Crunch, and so on. In his career, he has worked with companies of various sizes, from enterprises to start-ups. He has worked on Kubernetes and microservices extensively for enterprises.MOHAMMAD ATYAB is a software developer with more than 13 years of developing products. He has worked in various languages primarily Java/J2EE, Python, C++. He has a passion of building products and has created web based scalable applications in chat bots, ecommerce, marketing and financial domains. He has worked in large enterprises as well as startups and worked extensively in the areas of Big Data and AI.DATA PROCESSING WITH APACHE PULSARChapter 1: Introduction to Apache PulsarChapter 2: Working with MessagesChapter 3: Working with Pulsar FunctionsChapter 4: Schema RegistryChapter 5: Build Microservices using PulsarChapter 6: Pulsar ConnectersChapter 7: Pulsar SecurityChapter 8: Deploy Pulsar on Kubernetes
Stylish F# 6
Why just get by in F# when you can program in style. This book goes beyond syntax and into design. It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code. This second edition, fully updated for .NET 6 and F# 6, includes all new coverage of anonymous records, the task {} computation expression, and the relationship between types and modules.Stylish F# 6 covers every design decision that a developer makes in constructing F# programs, helping you make the most educated and valuable design choices at every stage of code development. You will learn about the design of types and function signatures, the benefits of immutability, and the uses of partial function application. You will understand best practices for writing APIs to be used by F#, C#, and other languages. Each carefully vetted design choice is supported with compelling examples, illustrations, and rationales.WHAT YOU WILL LEARN* Know why, when, and how to code in immutable style* Use collection functions, piping, and function composition to build working software quickly* Be aware of the techniques available to bring error handling into the mainstream of program logic* Optimize F# code for maximum performance* Identify and implement opportunities to use function injection to improve program design* Appreciate the methods available to handle unknown data values* Understand asynchronous and parallel programming in F#, and how it differs from C# asynchronous programming* Exploit records and anonymous records as low-overhead, easily comparable containers for structured dataWHO THIS BOOK IS FORAny developer who writes F# code and wants to write it betterKIT EASON is a software developer and educator with more than 20 years of experience. He has been programming in F# since 2011 and is employed at Perpetuum Ltd., working on an extensive network of energy-harvesting vibration sensors fitted to railway rolling stock and infrastructure. Kit is an avid F# user who is passionate about teaching others. He has contributed to several publications, including Apress books Beginning F# and F# Deep Dives. He often teaches on the topic of F# and his popular videos appear on Udemy and Pluralsight. Chapter 1: The Sense of StyleChapter 2: Designing Functions Using TypesChapter 3: Missing DataChapter 4: Working Effectively with Collection FunctionsChapter 5: Immutability and MutationChapter 6: Pattern MatchingChapter 7: Record TypesChapter 8: ClassesChapter 9: Programming With FunctionsChapter 10: Asynchronous and Parallel ProgrammingChapter 11: Railway Oriented ProgrammingChapter 12: PerformanceChapter 13: Layout and NamingChapter 14: Summary
Build Your Own 2D Game Engine and Create Great Web Games
Develop a 2D game engine that will give you the experience and core understanding of foundational concepts for building complex and fun 2D games that can be played across the Internet via popular web browsers. This book is organized so that the chapters follow logical steps of building a game engine and integrates concepts accordingly.Build Your Own 2D Game Engine and Create Great Web Games isolates and presents relevant concepts from software engineering, computer graphics, mathematics, physics, game development and game design in the context of building a 2D game engine from scratch. In this edition, all the code is based on updated versions of JavaScript with HTML5 and WebGL2: you will analyze the source code needed to create a game engine that is suitable for implementing typical casual 2D videogames. You will also learn about physics and particle system. The discussion of physics component includes rotations and popular physical materials such as wood, mud, and ice. The discussion of particle component has popular presets such as fire, smoke, and dust.By the end of the book, you will understand the core concepts and implementation details of a typical 2D game engine, learn insights into how these concepts affect game design and game play, and have access to a versatile 2D game engine that they can expand upon or utilize to build their own 2D games from scratch with HTML5, JavaScript, and WebGL2.WHAT YOU WILL LEARN* Understand essential concepts for building 2D games* Grasp the basic architecture of 2D game engines* Understand illumination models in 2D games* Learn basic physics used in 2D games* Find out how these core concepts affect game design and game play* Learn to design and develop 2D interactive gamesWHO IS THIS BOOK FORGame enthusiasts, hobbyists, and anyone with little to no experience who are interested in building interactive games but are unsure of how to begin. This can also serve as a textbook for a junior- or senior-level "Introduction to Game Engine" course in a Computer Science department.Kelvin Sung is a Professor with the Computing and Software Systems Division at University of Washington Bothell (UWB). He received his Ph.D. in Computer Science from the University of Illinois at Urbana‐Champaign. Kelvin's background is in computer graphics, hardware, and machine architecture. He came to UWB from Alias|Wavefront (now part of Autodesk), where he played a key role in designing and implementing the Maya Renderer, an Academy Award‐winning image generation system. At UWB, funded by Microsoft Research and the National Science Foundation, Kelvin’s work focuses on the intersection of video game mechanics, solutions to real‐world problems, and mobile technologies. Together with his students and colleagues, Kelvin has co‐authored five books: one in computer graphics (Essentials of Interactive Computer Graphics: Concepts and Implementations, A.K. Peters, 2008), and the others in 2D game engines (Learn 2D Game Development with C# , APress, 2013; Build Your Own 2D Game Engine; Create Great Web Games, Apress, October 2015; Building a 2D Game Physics Engine, APress, 2016; and Basic Math for Game Development with Unity 3D, Apress 2019).Jebediah Pavleas is a graduate student in the Computer Science and Software Engineering program at the University of Washington Bothell (UWB) as well as an intern on the NExT Enable team at Microsoft Research. He is also the coauthor of the book Learn 2D Game Development with C#. He received a bachelor’s of science degree in 2012 and was the recipient of the Chancellor’s Medal for his class. During his time as an undergraduate, he took great interest in both computer graphics and games. His projects included an interactive math application that utilizes Microsoft’s Kinect sensor to teach algebra, a 2D role-playing game designed to teach students introductory programming concepts, and a web site where students can compete in various mini-games to control checkpoints around campus. Relating to these projects, he coauthored publications in IEEE Computers and The Journal of Computing Sciences in Colleges (CCSC). When not working toward his graduate degree, he enjoys designing, building, and playing games of all kinds as well as adapting technology for improved accessibility.Matthew Munson is a graduate student in the Computer Science and Software Engineering program at the University of Washington Bothell. He received undergraduate degrees in Computer Science and Software Engineering and Mechanical Engineering at the University of Washington Bothell in 2020. Matthew is interested in operating system development, networking, and embedded systems. As a research assistant Matthew used cloud computing to analyze years of audio data recorded by hydrophones off the Oregon coast. This data was used to study the effects of climate change and shipping noise on marine mammals. Currently, Matthew is working on a networked augmented reality library that focuses on allowing users to view the same virtual scene from different perspectives.Jason Pace has contributed to a wide range of games as a Producer, Designer, and Creative Director over 15 years in the interactive entertainment industry, from ultra-casual puzzlers to Halo. As a Designer Jason builds game mechanics and systems that start from a simple palette of core interactions (known as the core gameplay loop), progressively introducing variety and complexity to create interactive experiences that engage and delight players while maintaining focus on what makes each unique game fun.CHAPTER 1: INTRODUCTIONSub-Topics· Introduction to the IDE· Development environment setup· Guide to use the book· ReferencesCHAPTER 2: WORKING WITH HTML5 AND WEBGL2Sub - Topics· HTML5 canvas for drawing· Project organization· Elementary drawing with WebGL2· Abstraction with JavaScript objects· Working with shaders and controlling the colorCHAPTER 3: TRANSFORMATION AND WORLD COORDINATESub-Topics:· Renderable: encapsulating drawing· Transforming a renderable object· Encapsulating the transform operator· View and projection transform and the viewport· The cameraCHAPTER 4: COMMON COMPONENTS OF A GAME ENGINESub-Topics:· The game loop· Keyboard input· Resource management and asynchronous loading· Game levels and scene files· Scene objects· Audio supportCHAPTER 5: WORKING WITH TEXTURE, SPRITES, AND FONTSSub-Topics:· Texture mapping and texture coordinates· Drawing with sprite sheets· Sprite animations· Fonts and drawing of textCHAPTER 6: BEHAVIORS AND COLLISIONSSub-Topics:· Abstraction of game objects· Elementary behavior: chasing· Collision between game objects· Per-pixel accurate collisionsCHAPTER 7: CAMERA MANIPULATIONSSub-Topics:· Basic camera manipulations· Manipulation with interpolations· Camera shake effect· Working with multiple cameras· Mouse input through the camerasChapter 8: Illumination and ShadowSub-Topics:· Ambient light· Point light sources· Multiple light sources and distance attenuation· Diffuse reflections and normal mapping· Specular reflections and materials· Directional and spot lights· Simulation of shadowsCHAPTER 9: PHYSICSSub - Topics:· Physics engine and rigid shapes· Broad-phase collision detection· Collision information and separation axis theorem· Collision between rectangles and circles· Movement and symplectic Euler integration· Resolving collisions· Support for rotations· Physics engine presets: wood, mud, ice, and dirtCHAPTER 10: PARTICLE SYSTEMS AND STENCILINGSub-Topics:· Particles and effects· Particle emitters· Particle system presets: fire, smoke, snow, dust, and explosion· StencilsCHAPTER 11: SUPPORTING CAMERA BACKGROUNDSub-Topics:· Tiling of the background· Motion parallax· Layer managementCHAPTER 12: BUILDING A SAMPLE GAME: FROM DESIGN TO COMPLETIONSub-Topics:· Game concept and design· Integrating a setting: layout and playable space· Additional elements: interaction model and audio
Natural Language Processing Projects
Leverage machine learning and deep learning techniques to build fully-fledged natural language processing (NLP) projects. Projects throughout this book grow in complexity and showcase methodologies, optimizing tips, and tricks to solve various business problems. You will use modern Python libraries and algorithms to build end-to-end NLP projects.The book starts with an overview of natural language processing (NLP) and artificial intelligence to provide a quick refresher on algorithms. Next, it covers end-to-end NLP projects beginning with traditional algorithms and projects such as customer review sentiment and emotion detection, topic modeling, and document clustering. From there, it delves into e-commerce related projects such as product categorization using the description of the product, a search engine to retrieve the relevant content, and a content-based recommendation system to enhance user experience. Moving forward, it explains how to build systems to find similar sentences using contextual embedding, summarizing huge documents using recurrent neural networks (RNN), automatic word suggestion using long short-term memory networks (LSTM), and how to build a chatbot using transfer learning. It concludes with an exploration of next-generation AI and algorithms in the research space.By the end of this book, you will have the knowledge needed to solve various business problems using NLP techniques.WHAT YOU WILL LEARN* Implement full-fledged intelligent NLP applications with Python* Translate real-world business problem on text data with NLP techniques* Leverage machine learning and deep learning techniques to perform smart language processing* Gain hands-on experience implementing end-to-end search engine information retrieval, text summarization, chatbots, text generation, document clustering and product classification, and moreWHO THIS BOOK IS FORData scientists, machine learning engineers, and deep learning professionals looking to build natural language applications using PythonAKSHAY R KULKARNIis a renowned AI and machine learning (ML) evangelist and thought leader. He has consulted with Fortune 500 and global enterprises to drive AI and data science-led strategic transformations. Akshay has experience building and scaling AI and ML businesses and creating significant impact. He is currently Manager of Data Science & AI at Publicis Sapient on their core data science and AI team where he is part of strategy and transformation interventions through AI. He manages high-priority growth initiatives around data science and works on AI engagements by applying state-of-the-art techniques. He is a Google Developers Expert–Machine Learning, published author of books on NLP and deep learning, and a regular speaker at major AI and data science conferences (including Strata, O’Reilly AI Conf, and GIDS). Akshay is a visiting faculty member for some of the top graduate institutes in India. In 2019, he was featured as one of Top40 under 40 Data Scientists in India. In his spare time, he enjoys reading, writing, and coding, and help aspiring data scientists. He lives in Bangalore with his family.ADARSHA SHIVANANDA is a senior data scientist on Indegene's Product and Technology team where he works on building machine learning and artificial intelligence (AI) capabilities for pharma products. He aims to build a pool of exceptional data scientists within and outside of the organization to solve problems through training programs, and always wants to stay ahead of the curve. Previously, he worked with Tredence Analytics and IQVIA. Adarsha has worked extensively in the pharma, healthcare, retail, and marketing domains. He lives in Bangalore and loves to read and teach data science.ANOOSH KULKARNI is a data scientist and senior consultant focused on artificial intelligence (AI). He has worked with global clients across multiple domains and helped them solve their business problems using machine learning (ML), natural language processing (NLP), and deep learning. Presently, he is working with Subex AI labs. Previously, he was a data scientist at one of the leading ecommerce companies in the UAE. Anoosh is passionate about guiding and mentoring people in their data science journey. He leads data science/machine learning meet ups in Bangalore and helps aspiring data scientists navigate their careers. He also conducts ML/AI workshops at universities and is actively involved in conducting webinars, talks, and sessions on AI and data science. He lives in Bangalore with his family. Chapter 1: Natural Language Processing & Artificial Intelligence OverviewChapter Goal: This is an introductory chapter. This chapter provides a quick refresher of the topics to be covered in this book. Since this book teaches projects surrounding a specific area of technology, we will provide a brief introduction to the key concepts required for these projects. We will not be working on a specific project, rather discuss some important concepts without going into details. The depth on each of these topics will be covered in the specific chaptersNo of pages: 25Sub - Topics:1. Artificial intelligence paradigm2. NLP and AI life cycle3. NLP concepts (TF-IDF, word embeddings, many more)4. Machine learning concepts (supervised learning, classification, unsupervised learning)5. Deep learning concepts (CNN, RNN, LSTM)Chapter 2: Product360 - Sentiment, Emotion & Trend Capturing SystemChapter Goal: Sentiment analysis involves finding the polarity of a sentence and labels it as positive, negative or neutral. Emotion detection involves identifying emotions(sad, anger, happy, etc) from the sentences. Data is extracted from social media like Twitter, Facebook etc. and Ecommerce website, processed and analyzed using different NLP techniques will provide a 360 degree view of that product which enables better decision making. This chapter introduces sentiment analysis to the reader and the various techniques that can be used to analyze text. We will apply sentiment, emotion and trend analysis on reviews data for any E-commerce website like Amazon, Zomato, and IMDb, etc. which contains millions of customer reviews and star ratings. For this task, we will use Python libraries such as Vader, Textblob, etc.No of pages: 30Sub - Topics1. Text mining and various available libraries.2. Data preprocessing.3. Data cleaning tricks, optimized feature engineering4. EDA5. Sentiment analysis6. Emotion and trend analysisChapter 3: TED Talks Segmentation & Topics Extraction Using Machine LearningChapter Goal: Document clustering is an unsupervised learning process for grouping documents. For example, there are number of e-books and they have to be grouped to build a structure around them saves time while finding the books. Articles grouping, product clustering are the other few examples. Once we identify the clusters, it is important to understand the properties of clusters. So, Topic modeling is performed to extract topics from a set of documents and articles to understand the content of the documents using keywords and be able to tag the articles or documents using those topics.In this chapter will see how to group TED talks based on description using various clustering techniques like K-Means and Hierarchical clustering. Then we will perform topic modeling using Latent Dirichlet Allocation (LDA) to understand what defines each cluster. Important libraries include Gensim, NLTK, Scikit-learn and word2vec for this problem. We will use over 100k articles from different American publications.No of pages: 30Sub - Topics1. Data understanding and pre-processing2. Computing TF-IDF3. K-Means and hierarchical clustering4. Evaluation and visualization5. Topic modeling using Latent Dirichlet AllocationChapter 4: Enhancing E-commerce Through Advanced Search Engine and Recommendation SystemChapter Goal: An information retrieval system will search product descriptions based on a search query text and gives the results. Search engines are the most common and best use case of information retrieval models. The concept of information retrieval started from a string or word comparison, but it won’t be accurate as it doesn’t capture semantics. Advanced deep learning techniques made information retrieval work more accurately.Recommender systems are everywhere and used to create a personalized recommendations to increase the user experience. There are many types of recommender systems from collaborative filtering to graph-based. But the one dependent on Natural language processing is content-based recommender systems. It leverages the content of the item or the demographics of the user to recommend and this information is purely in the form of text. In this chapter, we will use advanced deep learning and word embedding techniques to search and recommend items/products to customers and libraries like SciKit-learn, NLTK, Keras, Word2vec, etc. We will use Flipkart e-commerce sample data which has the product name and its description.No of pages: 30Sub - Topics:1. Information retrieval, word embeddings for IR, similarity scoring.2. Content-based recommendation systems working3. Data understanding and preprocessing4. Search engine using word embeddings5. Recommender system using KNNChapter 5: E-Commerce Product Categorization Model Using Deep learningChapter Goal: Most of the time, classification problems won’t be binary rather they will be multiclass. For example, categorizing the retail products based on the description, categorizing the call center complaints, etc. Complexity increases as the number of classes increases. Let’s solve this problem by using deep learning techniques. We leverage deep neural networks using the Keras library. Feature engineering techniques like TF-IDF and word embeddings are considered. We will use product description data for an E-commerce company to categorize the products.No of pages: 25Sub - Topics:1. Text pre-processing2. Text to features using TF-IDF and word embeddings3. Multi-class classification using deep neural networks4. Parameter tuning and optimizationChapter 6: Movie Genre TaggingChapter Goal: Categorizing movies into genres is one of the classic AI problems. Online movie booking platforms, review websites like IMDB would tag movies into respective genres. The genre can be action, adventure, comedy, romance and so on.Our goal here is to tag possible movie genres given the description of the movie. Machine/model has to predict all possible classes(genres) the movie would belong to. We have solved simple multi-class classification but, in this chapter, let's explore how to solve a multi-label learning and classification problem.No of pages: 25Sub - Topics:1. Text processing2. Data preparation for modeling3. Text to features4. Multi-label classification using different algorithms5. Parameter tuning and evaluationChapter 7: Content Recommendation for the Marketing CampaignChapter Goal: A content recommendation engine collects and analyzes data based on users' behavior on marketing content. This data is then used to offer personalized and relevant marketing materials. We can tailor the subjects of the emails based on historical interactions. We will use deep learning techniques using Keras along with word embeddings.No of pages: 25Sub - Topics: 1. Why content recommendation2. Feature engineering3. Open rate to find the right contentChapter 8: Quora Question Pair SimilarityChapter Goal: Over 100 million people visit Quora every month, so it's no surprise that many people ask similarly worded questions. Multiple questions with the same intent can cause seekers to spend more time finding the best answer to their question and make writers feel they need to answer multiple versions of the same question. The goal of this chapter is to predict which of the provided pairs of questions contain two questions with the same meaning using advanced deep learning techniques. Keras will be used to find the similarity score.No of pages: 25Sub - Topics:1. Why predicting the similar questions?2. Text pre processing3. Word embeddings4. Finding similar questionsChapter 9: Resume Parsing & Shortlisting with Machine LearningChapter Goal: In the recruitment industry, millions of people are uploading resumes and applying for jobs every day on thousands of employment platforms. Businesses have their openings listed on these platforms and job seekers come to apply. Every business has a dedicated recruitment team that manually goes through the applicant's resumes and extracts relevant data to see if they are a fit. To automate this task, this project tries to converts an unstructured form of resume data into a structured format. It's a model that analyses and extracts resume data, returns the machine-readable output and ranks the top resume’s that are best match to the given job description. This helps to store and analyze data automatically.No of pages: 25Sub - Topics:1. Resume parsing using various NLP techniques2. NER3. Shortlisting and ranking resumesChapter 10: Building Chatbot Using Transfer learningChapter Goal: Question Answering (QA) System - also termed as “Chatbot” is very useful as most of the deep learning-related problems can be modeled as a question answering problem. Consequently, the field is one of the most researched fields in computer science today. The last few years have seen considerable developments and improvement in the state of the art, much of which can be credited to the upcoming of deep learning. In this chapter, we will build end to end QA system using NLTK, modern deep learning algorithms, and transfer learning.No of pages: 25Sub - Topics:1. Q&A system explained2. Q&A architecture3. Natural Language Understanding4. Learn possible approaches and algorithms5. How to use transfer learning6. Fine Tuning and optimizing the network7. End to end implementation and evaluationChapter 11: Summarization System Using RNNChapter Goal: With the ever-growing data, reading the whole document is just time-consuming. We need to summarize the huge text corpus to make life easier. Text summarization is the process of creating a short summary of a longer document with accurate meaning. It’s widely used in headlines generation, summarizing the reviews, etc. There are many approaches to solve this problem like feature-based, graph-based, using sentence embeddings, etc. Abstractive methods like deep learning and reinforcement learning are providing excellent results since it generates an entirely new sentence which captures the meaning of source document. In this chapter, we will discuss all these Extractive and Abstractive methods to summarize the text. We will be using NLTK, Gensim, SciKit-learn, and Keras libraries.No of pages: 30Sub - Topics:1. Text summarization using Extractive methods2. Abstractive methods3. Text summarization using deep learning4. Text summarization using reinforcement learningChapter 12: Automated Text Generation Using LSTM and EncodersChapter Goal: Text Generation is a type of Language Modelling problem. Language Modelling is the core problem for several natural language processing tasks such as speech to text, conversational system, and text summarization. A trained language model learns the likelihood of occurrence of a word based on the previous sequence of words used in the text. Language models can be operated at the character level, n-gram level, sentence level, or even paragraph level. In this chapter, we will create a language model for generating natural language text by implement and training state-of-the-art recurrent neural network. We will use the Python programming language for this purpose. The objective of this model is to generate new text, given that some input text is present. We will start building the architecture. We will be using NLTK, Gensim, SciKit-learn and Keras libraries.No of pages: 25Sub - Topics: 1. Text generation concepts and application2. Text generation architecture3. Text preprocessing and feature engineering4. Building the LSTM network model5. Seq2Seq modelsChapter 13: Future of NLP & Next-Gen Artificial IntelligenceChapter Goal: In this chapter, let's summarize what we learned so far in this book. We started from basics, traditional tasks to advanced text generation problems. We implemented and explored how deep learning is perfect for natural language understanding. We learned classification, information retrieval systems, Q&A systems, and also text generation. We will also explore why deep learning and other next-gen AI algorithms like GANS, Capsule networks, Differentiable Neural Computers, Unsupervised/Semi-supervised Deep Learning, Attention Networks, Transfer Learning, Deep Reinforcement Learning, Meta-Learning, is uniquely suited to NLP or their short comes, and how these algorithms would evolve and give state-of-the-art results in a slew of tasks under NLU and NLG.No of pages: 12Sub - Topics:1. What did we learn2. Future of NLP3. Next-Gen learning algorithms for NLP4. Deep reinforcement learning5. What are the current challenges in NLP?6. Research directions to solve the challenges7. Current research in the NLP world
Building Multiplayer Games in Unity
Take a deep dive into creating large-scale, multiplayer games with Unity 3D, using Mirror Networking and a variety of powerful transports. You will learn the fundamentals of RPC/Command multiplayer architecture and dig deeper into networking and data persistence to achieve scalable, highly performant, large-scale, multiplayer games in Unity.This book explains how to develop multiplayer games using Unity within a commercial or enterprise environment. You will take a look at the networking fundamentals behind multiplayer games, including packets and the importance of keeping packets small. Next, you will look into Mirror Networking and see how to leverage a variety of transport layers to achieve large-scale, multiplayer games. Using Unity 3D as the core focus, you will get an understanding of the RPC/Command architecture and how you can utilize different authoritative structures to best suit your needs. You will also learn how to scale your architecture and explore industry-leading methods of deploying your game to the masses. You will also get a solid understanding of networking principles.The book wraps up with advice from leading experts who shed light on past mistakes and provide valuable insights for your next project. This book breaks down daunting concepts into easy-to-understand pieces of knowledge to help you create your first multiplayer game. It is a must-read for any developer looking to understand multiplayer games and networking.WHAT YOU WILL LEARN● Learn advanced multiplayer concepts and how to use them● Understand the key concepts for creating multiplayer virtual experiences● Know the basics of computer networking and how to employ them● Deploy large, scalable multiplayer infrastructures for your games● Gain insights from other industry professionalsWho Is This Book ForIntermediate to advanced Unity 3D developers looking to understand multiplayer networking and deploying large-scale products. Having a solid understanding of C# and Unity is required, and having an understanding or prior experience with networking principles such as IPv4 would be advantageous.DYLAN ENGELBRECHT is a Unity specialist. Born and raised in South Africa, he has worked at the top enterprise VR development studio in South Africa, and he’s currently working at the largest game development studio on the continent. He has in-depth knowledge of commercial and enterprise game development, with work showcased by invite at Comic-Con Africa and rAge Expo. He is an avid gamer who enjoys immersive experiences and real-time strategy games.Chapter 1: IntroductionSub-Topics● Why you should care about the contents of this book● Prerequisites & ResourcesChapter 2: The Messenger Pigeon, Packets, and a Trip Around the WorldSub-Topics● Introduction to networking● Understanding packets● How packets of data get transported across the world● IPV4 and UDP● The transport layer● The firewall● The importance of keeping your packets smallChapter 2: A Hall of Mirrors and ApathySub-Topics● What is Mirror Networking● Understand where Mirror comes from and why it was created● Learn the limitations of Mirror● Break some of those limitations with Apathy● What is Apathy and where to get it?● The client, the server, and the hostChapter 3: The Chain of CommandSub-Topics:● Game server architecture● Authority● Understanding the chain of command● Remote Procedure Calls (RPC’s)● Commands● Syncvars● Syncvar Hooks● Mirror Events● Creating our first multiplayer gameChapter 4: Memory of a GoldfishSub-Topics:● What are database engines?● Relational vs non-relational databases● A few popular relational database engines with their pros and cons● A few popular non-relational database engines with their pros and cons● Designing the database● Connecting to the database from your game server● Storing information● Retrieving information● Serving information to your playersChapter 5: Scaling Up, A LotSub-Topics: ● The cloud● AWS● Google Cloud● Azure● Unity Multiplay● Hosting your databases● Understanding the bottleneck● How Apex Legends created the perfect launch● Stress testing and stress clients● Things to consider, like securityChapter 6: Insights From the MastersSub-Topics:● 10 Mini-stories and interviews of game developersChapter 7: Challenge What You KnowSub-Topics:● 2 beginner multiplayer challenges● 2 intermediate multiplayer challenges with user data persistence● 1 advanced multiplayer challenge with user and world data persistenceChapter 8: ConclusionSub-Topics:● Next steps for the reader● Best wishes and thanks
Windows 11 für Senioren
- Texte schreiben, Dateien Speichern, Im Internet surfen, E-Mails versenden, Fotos verwalten- Schritt für Schritt erklärt, leicht nachvolziehbar, mit viele Bildern und BeispielenLernen Sie von Anfang an den sicheren Umgang mit Ihrem PC, Laptop oder Tablet! Mit diesem Handbuch gelingt nicht nur Senioren, sondern allen Computerneulingen der mühelose Einstieg in Windows 11, auch ganz ohne Vorkenntnisse. Anhand leicht nachvollziehbarer Schritt-für-Schritt-Anleitungen sowie mit vielen Beispielen und Bildern erklären die beiden erfahrenen Autorinnen alle notwendigen Techniken, Funktionen und noch vieles mehr. Schon nach kurzer Zeit schreiben und speichern Sie z. B. Briefe, tauschen E-Mails aus, verwalten und bearbeiten Ihre Fotos und surfen im Internet. Legen Sie das Buch mit seinem praktischen Querformat zum Üben vor Ihre Tastatur und freuen Sie sich über schnelle Lernerfolge!Aus dem Inhalt:- Einstellungen und erster Start von Windows 11- Die verschiedenen Apps öffnen und beenden- Einen Brief gestalten und drucken- Dateien speichern und Ordnung halten- Im Internet surfen und E-Mails versenden- Fotos betrachten, bearbeiten und verwalten- Termine eintragen – Erinnerungen erhalten- Bildschirmanzeige individuell anpassen & vergrößern- Glossar mit ausführlichen Begriffserklärungen
Advanced Unity Game Development
Jump start your Unity game development journey with a detailed review of a complete, professionally built game using Unity, C#, and Visual Studio. Gain invaluable experience with code structure, project structure, centralization of game state data, controlled initialization of script components, AI opponents, multiple input sources, player preferences, a full HUD and menu system, music and sound effects, level/track building, and more.Author Victor Brusca walks you through the game’s code, scripts, and overall structure, all the while showing you how the code works within the Unity engine to define a complete, refined game. Starting with game specifications, the book covers base classes, basic interaction classes, advanced interaction classes, helper classes, input classes, and abstraction of raw input. Next, you'll dive into the menu system and see how a full, complete menu and HUD are coded and set up in the project through a detailed review of the code and working examples. Subsequently, you’ll gain insight on player and game state management, and the author will demystify the component-based structure of Unity games by demonstrating how to maintain order and centralization. Lastly, you will review pertinent build and project settings while learning techniques to profile and check the performance of your games, and tie it all together by building a new racetrack for the included game project.On completing this book, you’ll have gained experience through the detailed review of a hover car racing game using C#, Unity Coding, Visual Studio, Unity C# Project Management, Unity Environment, Unity Project Management and more.WHAT YOU WILL LEARN* Understand Unity project design and implementation with regard to code base and scene hierarchy/game objects* Learn to implement game mechanics connected to Unity scene game objects with working demonstrations* Review professional topics, such as AI opponents, data persistence, menu systems, etc., and implement in the included project* Create a complete game from ground up using prefab models and the code reviewed throughout the textWHO THIS BOOK IS FORReaders with some coding experience, an understanding of classes in an OOP language, and solid experience using the Unity Editor. The code is reviewed and explained in detail on a class-by-class basis while also providing an overview of the overall structure of the code base, project, and scenes.Victor Brusca is an experienced software developer specializing in building cross-platform applications and APIs. He regards himself as a self-starter with a keen eye for detail, an obsessive protection of systems/data, and a desire to write well-documented, well-encapsulated code. With over 14 years' software development experience, he has been involved in game and game engine projects on J2ME, T-Mobile SideKick, WebOS, Windows Phone, Xbox 360, Android, iOS, and web platforms.Chapter 1: Introduction and Getting StartedSub-Topics:Setting Up Your EnvironmentPlaying Hover Racers/Getting ReadyChapter ConclusionChapter 2: Game SpecificationsSub-Topics:Model: Car, Track, SensorModel: Car, Boost, Jump, Bounce ModifiersChapter ConclusionChapter 3: Base ClassSub-Topics:Class Review TemplateClass Review: BaseScriptStatic/Constants/Read-Only Class Members: BaseScriptClass Fields: BaseScriptPertinent Method Outline/Class Header: BaseScriptSupport Method Details: BaseScriptMainMethod Details: BaseScriptDemonstration: BaseScriptChapter ConclusionChapter 4: Interaction ClassesSub-Topics:Class Review: BounceScriptClass Fields: BounceScriptPertinent Method Outline/Class Headers: BounceScriptSupport Method Details: BounceScriptDemonstration: BounceScriptClass Review: Road ScriptClass Fields: RoadScriptPertinent Method Outline/Class Headers: RoadScriptSupport Method Details: RoadScriptMain Method Details: RoadScriptDemonstration: RoadScriptClass Review: WaypointCheckClass Fields: WaypointCheckPertinent Method Outline/Class Headers: WaypointCheckSupport Method Details: WaypointCheckMain Method Details: WaypointCheckDemonstration: WaypointCheckClass Review: TrackHelpScriptPertinent Method Outline/Class Headers: TrackHelpScriptSupport Method Details: TrackHelpScriptMain Method Details: TrackHelpScriptDemonstration: TrackHelpScriptChapter ConclusionChapter 5: Advanced Interaction ClassesSub-Topics:Class Review: CollideScriptStatic/Constants/Read-Only Class Members: CollideScriptClass Fields: CollideScriptPertinent Method Outline/Class Headers: CollideScriptSupport Method Details: CollideScriptMain Method Details: CollideScriptDemonstration: CollideScriptClass Review: CarSensorScriptStatic/Constants/Read-Only Class Members: CarSensorScriptClass Fields: CarSensorScriptPertinent Method Outline/Class Headers: CarSensorScriptSupport Method Details: CarSensorScriptMain Method Details: CarSensorScriptDemonstration: CarSensorScriptChapter ConclusionChapter 6: Helper ClassesSub-Topics:Class Review: DestroyScriptClass Review: WaterResetScriptPertinent Method Outline/Class Headers: WaterResetScriptSupport Method Details: WaterResetScriptMain Method Details: WaterResetScriptDemonstration: WaterResetScriptClass Review: EngineWhineScriptStatic/Constants/Read-Only Class Members: EngineWhineScriptClass Fields: EngineWhineScriptPertinent Method Outline/Class Headers: EngineWhineScriptMain Method Details: EngineWhineScriptDemonstration: EngineWhineScriptClass Review: LapTimeClass Review: LapTimeManagerStatic/Constants/Read-Only Class Members: LapTimeManagerClass Fields: LapTimeManagerPertinent Method Outline/Class Headers: LapTimeManagerSupport Method Details: LapTimeManagerMain Method Details: LapTimeManagerDemonstration: LapTimeManagerClass Review: PopupMsgTrackerDemonstration: PopupMsgTrackerClass Review: UtilitiesStatic Class Members: UtilitiesDemonstration: UtilitiesClass Review: CameraFollowXzStatic/Constants/Read-Only Class Members: CameraFollowXzClass Fields: CameraFollowXzPertinent Method Outline/Class Headers: CameraFollowXzMain Method Details: CameraFollowXzDemonstration: CameraFollowXzClass Review: WaypointCompareDemonstration: WaypointCompareChapter ConclusionChapter 7: Input ClassesSub-Topics:Class Review: CharacterMotorMovementClass Review: CharacterMotorJumpingClass Review: CharacterMotorSlidingClass Review: CharacterMotorClass Fields: CharacterMotorPertinent Method Outline/Class Headers: CharacterMotorSupport Method Details: CharacterMotorMain Method Details: CharacterMotorDemonstration: CharacterMotorClass Review: FPSInputControllerClass Fields: FPSInputControllerPertinent Method Outline/Class Headers: FPSInputControllerMain Methods Details: FPSInputControllerDemonstration: FPSInputControllerClass Review: MouseLookNewEnumerations: MouseLookNewClass Fields: MouseLookNewPertinent Method Outline/Class Headers: MouseLookNewMain Method Details: MouseLookNewDemonstration: MouseLookNewClass Review: GameState (Touch Input Snippet Only)Chapter ConclusionChapter 8: Menu System ClassesSub-Topics:Class Review: BasePromptScriptClass Fields: BasePromptScriptPertinent Method Outline/Class Headers: BasePromptScriptSupport Method Details: BasePromptScriptMain Method Details: BasePromptScriptDemonstration: BasePromptScriptClass Review: GamePauseMenuPertinent Method Outline/Class Headers: GamePauseMenuSupport Method Details: GamePauseMenuMain Method Details: GamePauseMenuDemonstration: GamePauseMenuClass Review: GameHelpMenuClass Fields: GameHelpMenuPertinent Method Outline/Class Headers: GameHelpMenuSupport Method Details: GameHelpMenuInput Handler Support Method Details: GameHelpMenuMain Method Details: GameHelpMenuDemonstration:GameHelpMenuRemaining Menu ClassesChapter ConclusionChapter 9: Player and Game State Classes Part 1Sub-Topics:Class Review: PlayerInfoClass Review: TrackScriptClass Review: PlayerStateStatic/Constants/Read-Only Class Members: PlayerStateClass Fields: PlayerStatePertinent Method Outline/Class Header: PlayerStateSupport Method Details: PlayerStateMain Method Details: PlayerStateDemonstration: PlayerStateChapter 10: Player and Game State Classes Part 2Sub-Topics:Class Review: GameStateEnumerations: GameStateStatic/Constant/Read-Only Class Members: GameStateClass Fields: GameStatePertinent Method Outline/Class Headers: GameStateSupport Method Details: GameStateMain Method Details: GameStateDemonstration: GameStateChapter ConclusionChapter 11: Making it ProfessionalSub-Topics:Build SettingsGeneric Platform SettingsPC, Mac, and Linux Desktop SettingsUniversal Windows Platform (UWP) SettingsiOS SettingsAndroid SettingsWebGL SettingsInput MappingUI / Menu SystemData PersistenceMemory ManagementSounds and MusicStatic ObjectsTags and LayersAI OpponentsCamerasProject SettingsChapter ConclusionChapter 12: Adding a New RacetrackSub-Topics:Track Environment and Cleanup ScriptHover Racers and the GameState ObjectTrack and Waypoint ObjectsJumps, Boosts, Menu Screens, and MoreChapter ConclusionChapter 13: ConclusionSub-Topics:AccomplishmentsAcknowledgementsWhere You Go From HereSaying Goodbye
Azure Cloud Security for Absolute Beginners
Implement cloud security with Azure security tools, configurations and policies that address the needs of businesses and governments alike. This book introduces you to the most important security solutions available in Azure and provides you with step-by-step guidance to effectively set up security and deploy an application on top of Azure platform services, as well as on top of Azure infrastructure.Author PUSHPA HERATH begins by teaching you the fundamentals of Azure security. An easy to follow exploration of management groups, subscriptions, management locks and Azure policies further elaborate the concepts underlying Azure cloud security. Next, you will learn about Azure Active Directory (AAD) and the utilization of AAD in application and infrastructure security. Essential aspects of maintaining secure application keys and certificates are further explained in the context of Azure Key Vault. New application security implementations such as Azure configurations and Azure Defender for Azure storage are discussed, as are key platform security factors. Network security groups, gateways, load balancers, virtual networks and firewall configurations are all demonstrated in detail. Finally, you’ll learn how to create a much more secure environment through Azure App Service Environment in the context of securing infrastructure. If you want to learn the basics of securing Azure, Azure Cloud Security for Absolute Beginners is for you.After reading the book, you will be able to begin implementing secure cloud solutions with Microsoft Azure.WHAT WILL YOU LEARN* Get up and running quickly securing Azure* Master the basic language of Azure security* Understand the security features available in Azure cloud* Configure and maintain Azure cloud security features* Secure Azure PaaS Services* Learn identity and access management options in Azure CloudWHO IS THIS BOOK FORCloud engineers, DevOps engineers, software developers and architects who are asked to manage or are involved in the Azure infrastructure management but have not had all that much experience with security. PUSHPA HERATH is a Microsoft Most Valuable Professional (MVP) in development technologies and an author, blogger and speaker at technical community events. She is the Senior DevOps Engineer at 99x (Pvt) Ltd. She has many years of experience in DevOps with Azure DevOps, Octopus, JIRA and many other DevOps tools. She icurrently leads the DevOps community in Sri Lanka, and she has shown in depth knowledge in Azure cloud platform tools in her community activities. She is an expert on functional test automation using Selenium and BDD.Pushpa blogs on technology, and has experience with Microsoft tools (C#, Azure DevOps, SQL Server, and Azure) and other tools (Octopus, Jira, BitBucket, MAQS, Sikuli). She has published five books with Apress and spoken at community events and published videos on the Sri Lanka DevOps community YouTube channel.CHAPTER 1: UNDERSTANDING THE IMPORTANCE OF DATA/APPLICATION SECURITYCHAPTER GOAL: Give general overview on importance of data securityNO OF PAGES: 5SUB -TOPICS1. Introduction to security2. Introduction to Azure security fundamentalsCHAPTER 2: OVERVIEW OF BASIC AZURE SECURITY COMPONENTSCHAPTER GOAL: Introduction to various security components in Azure and how to utilize them.NO OF PAGES: 15SUB - TOPICS1. Introduction to Azure Management groups and subscriptions2. Azure Management locks3. Introduction to Azure policiesCHAPTER 3: INTRODUCTION TO AZURE ACTIVE DIRECTORYCHAPTER GOAL: Lessons to provide hand-on guidance on user access control of the organization using Azure Active Directory.NO OF PAGES : 30SUB - TOPICS:1. Adding users and groups to the AD2. Manage External Identities3. Enable two factor authentications4. Roles and Administrative units in Azure AD5. Managing Enterprise applications6. Introduction to AD devices7. Azure AD app registration8. Adding custom domainsCHAPTER 4: WORKING WITH AZURE KEY VAULTCHAPTER GOAL: Step by step guidance to setting up and using azure key vault to achieve several security requirements in the organization.NO OF PAGES: 15SUB - TOPICS:1. Setting up Key vault2. Key vault access control3. Using KV to save Keys4. Using KV to secure Secrets5. Using KV to keep certificates6. Key vault access policies7. KV networking and securityCHAPTER 5: ENSURE AZURE APPLICATION SECURITYCHAPTER GOAL: Step by step guidance to setting up various security components which helps to secure application hosted in AzureNO OF PAGES: 40SUB - TOPICS:1. Keep configurations in central location using Azure Configuration2. Authentication and authorization in Azure App Service3. How to secure application with web application firewall in Azure4. Application Security groupsCHAPTER 6: ENSURE DATA SECURITY WITH AZURE STORAGESCHAPTER GOAL: Overview on how data storage security works in AzureNO OF PAGES: 30SUB - TOPICS:1. Setting up azure storage2. Azure storage encryption3. Azure defender for azure storageCHAPTER 7: ENSURE SECURITY USING AZURE VIRTUAL NETWORKSCHAPTER GOAL: Step by step guide on how to setup virtual networks to enhance the security of the data and infrastructure.NO OF PAGES: 40SUB - TOPICS:1. Network security groups2. Azure VPN gateways3. Azure Load balancer4. Azure SubnetsCHAPTER 8: WORKING WITH AZURE APPLICATION GATEWAYCHAPTER GOAL: Hands on lessons on implementing Azure Application gateway to enhance the security of the dataSUB - TOPICS:1. Setting up Azure Application gateway2. Secure Web App using App gateway3. Secure Virtual Machine using App gatewayCHAPTER 9: SECURING DATA WITH AZURE FIREWALLCHAPTER GOAL: Step by step guidance to setting up azure firewall and configure it to secure dataNO OF PAGES: 40SUB - TOPICS:1. Setting up Azure Firewall2. Setting up policies3. Setting up rulesCHAPTER 10: CREATING APP SERVICE ENVIRONMENT TO ENHANCE SECURITYCHAPTER GOAL: Step by step guidance to setting up App service environment and using it to secure applicationsNO OF PAGES: 50SUB - TOPICS:1. Setting up Azure Application service environment2. Deploy applications to app service environmentCHAPTER 11: SECURE INFRASTRUCTURES IN AZURECHAPTER GOAL: Explains different security features available with few of the azure resourcesNO OF PAGES: 30SUB - TOPICS:1. Secure Azure Virtual machine using Bastian2. Secure Azure Virtual machine using encrypted firewall rules3. Azure SQL server security components
More Java 17
Work with the essential and advanced features of the Java 17 release. This book covers features such as annotations, reflection, and generics. These topics are then complemented by details of how to use lambda expressions, allowing you to build powerful and efficient Java programs. Furthermore, added to this edition you'll find topics on network programming, Java RMI, the process API, and custom runtime images. The authors provide a multitude of diagrams and complete programs to help you visualize and better understand the topics covered in this book.More Java 17, Third Edition starts with a series of chapters on the essential language features provided by Java before moving on to Java module development and packaging, and improved interop with other languages. After reading this book, you'll have the know-how of a professional Java programmer and be able to tackle most projects with confidence.This book's source code can be accessed at github.com/Apress/more-java-17.WHAT YOU WILL LEARN* Use essential and advanced features of the Java language* Code Java annotations* Work with reflection and generics* Manage streams with the Stream APIWHO THIS BOOK IS FORThose new to Java programming who are continuing the Java learning journey; it is recommended that you read an introductory Java programming book first, such as Java 17 for Absolute Beginners, from Apress.KISHORI SHARAN has earned a master of science in computer information systems degree from Troy State University, Alabama. He is a Sun Certified Java 2 programmer. He has vast experience in providing training to professional developers in Java, JSP, EJB, and web technology. He possesses over ten years of experience in implementing enterprise-level Java applications.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects. In 2016, he decided to concentrate on writing books on various aspects, but with a main focus on software development. With two books about graphics and sound processing, three books on Android app development, and a beginner’s book on Jakarta EE development, the author continues his effort in writing software development-related literature.1. Annotations2. Inner Classes3. Reflection4. Generics5. Lambda Expressions6. Threads7. Input Output8. Working with Archive Files9. New Input Output NIO10. New Input Output 2.011. Garbage Collection12. Collections13. Streams14. Implementing Services15. The Module API16. Breaking Module Encapsulation17. Reactive Streams18. Stack Walking19. Network Programming20. JDBC API21. Java Remote Method Invocation22. Java Native Interface23. Process API24. Packaging Modules25. Custom Runtime Images
Practical Entity Framework Core 6
Take a developer journey that paves the way to enterprise-level database access from .NET and C# using the object-relational mapper (ORM) of choice. This second edition is revised to cover Entity Framework Core 5 and 6 (EF) and includes new content on table-per-type mapping, LINQ improvements (filtered includes), many-to-many navigation changes, split queries, simple logging using the DBCommandInterceptor, and other improvements available in EF Core 6. Real-world examples and considerations are presented in this book to help you create robust and efficient database solutions. Throughout the text, actual problems, questions, and common pitfalls are provided to help you recognize optimal solutions for maximum success in the different application scenarios you might encounter.PRACTICAL ENTITY FRAMEWORK CORE 6 focuses on the code first approach to developing a database. Taking the code first approach allows the entire database to be built and maintained in code using EF Core 6 so there is never a situation in which you cannot restore the database schema. Additionally, the code first approach creates an entirely transparent record of changes to the database that is easily tracked in source control systems such as GitHub. Emphasis throughout the book is on leaving you well positioned to architect and lead data development efforts for your organization.WHAT YOU WILL LEARN* Build robust and maintainable databases using a code first approach* Create and execute stored procedures, triggers, and functions* Analyze and optimize performance of database queries* Ensure data integrity through keys, constraints, and relationships* Encrypt your database columns at rest with TDE and Always-On Encryption * Leverage the FluentAPI and attributes for entity configurationWHO THIS BOOK IS FOR.NET developers who work with enterprise-level applications and need to interact with data structures and data within the back end data store, developers who want to take a code first approach to building database applications to prevent conflicts and optimize efficiency, and those who are moving into full-stack roles, or into senior and architectural roles, and will be responsible for database design and implementationBRIAN GORMAN is a Microsoft Azure MVP, developer, computer science instructor, and trainer, and has been working in .NET technologies as long as they have existed. He was originally MCSD certified in .NET 1 and re-certified with MCSA: Web Apps and MCSD: App Builder certifications in 2019. From 2019 to 2021, Brian has earned nine Azure certifications, including Azure and Data Fundamentals, Azure Administrator, Database Administrator, Security Engineer and Developer Associate certifications, Azure Solutions Architect and DevOps Expert certifications, and an IoT Specialty certification.Additionally, Brian became an MCT as of April 2019, and is focusing on developing and training developers with full-stack web solutions with .NET Core and Azure. Most recently, Brian has been employed as a Senior Training Architect with Opsgility.In addition to working with .NET technologies, Brian has been an adjunct faculty member in the computer science department for Franklin University for the last 11 years, where his courses have included data structures, algorithms, design patterns, and, more recently, full-stack solutions in the capstone practicum course.IntroductionPART I. GETTING STARTED1. Introduction to Entity Framework2. Working with an Existing Database3. Entity Framework: Code FirstPART II. BUILDING THE DATA SOLUTION4. Models and the Data Context5. Constraints, Keys, and Relationships6. Data Access (Create, Read, Update, Delete)7. Stored Procedures, Views, and Functions8. Sorting, Filtering, and PagingPART III. ENHANCING THE DATA SOLUTION9. LINQ for Queries and Projections10. Encryption of Data11. Repository and Unit of Work Patterns12. Unit Testing, Integration Testing, and Mocking13. Asynchronous Data Operations and Multiple Database ContextsPART IV. RECIPES FOR SUCCESS14. .NET 5 and EFCore515. .NET 6 and EF Core 616. Appendix A: Troubleshooting
Behavior Analysis and Modeling of Traffic Participants
A ROAD TRAFFIC PARTICIPANT IS A PERSON WHO DIRECTLY PARTICIPATES IN ROAD TRAFFIC, SUCH AS VEHICLE DRIVERS, PASSENGERS, PEDESTRIANS, OR CYCLISTS, HOWEVER, TRAFFIC ACCIDENTS CAUSE NUMEROUS PROPERTY LOSSES, BODILY INJURIES, AND EVEN DEATHS TO THEM. To bring down the rate of traffic fatalities, the development of the intelligent vehicle is a much-valued technology nowadays. It is of great significance to the decision making and planning of a vehicle if the pedestrians' intentions and future trajectories, as well as those of surrounding vehicles, could be predicted, all in an effort to increase driving safety. Based on the image sequence collected by onboard monocular cameras, we use the Long Short-Term Memory (LSTM) based network with an enhanced attention mechanism to realize the intention and trajectory prediction of pedestrians and surrounding vehicles.However, although the fully automatic driving era still seems far away, human drivers are still a crucial part of the road‒driver‒vehicle system under current circumstances, even dealing with low levels of automatic driving vehicles. Considering that more than 90 percent of fatal traffic accidents were caused by human errors, thus it is meaningful to recognize the secondary task while driving, as well as the driving style recognition, to develop a more personalized advanced driver assistance system (ADAS) or intelligent vehicle. We use the graph convolutional networks for spatial feature reasoning and the LSTM networks with the attention mechanism for temporal motion feature learning within the image sequence to realize the driving secondary-task recognition.Moreover, aggressive drivers are more likely to be involved in traffic accidents, and the driving risk level of drivers could be affected by many potential factors, such as demographics and personality traits. Thus, we will focus on the driving style classification for the longitudinal car-following scenario. Also, based on the Structural Equation Model (SEM) and Strategic Highway Research Program 2 (SHRP 2) naturalistic driving database, the relationships among drivers' demographic characteristics, sensation seeking, risk perception, and risky driving behaviors are fully discussed. Results and conclusions from this short book are expected to offer potential guidance and benefits for promoting the development of intelligent vehicle technology and driving safety.* Acknowledgments* Introduction* Trajectory Prediction of the Surrounding Vehicle* Predictions of the Intention and Future Trajectory of the Pedestrian* Driver Secondary Driving Task Behavior Recognition* Car-Following Driving Style Classification* Driving Behavior Analysis Based on Naturalistic Driving Data* Bibliography* Authors' Biographies
Rethinking Virtual Places
HOW WOULD THE HUMANITIES CHANGE IF WE GRAPPLED WITH THE WAYS IN WHICH DIGITAL AND VIRTUAL PLACES ARE DESIGNED, EXPERIENCED, AND CRITIQUED?In Rethinking Virtual Places, Erik Malcolm Champion draws from the fields of computational sciences and other place-related disciplines to argue for a more central role for virtual space in the humanities. For instance, recent developments in neuroscience could improve our understanding of how people experience, store, and recollect place-related encounters. Similarly, game mechanics using virtual place design might make digital environments more engaging and learning content more powerful and salient. In addition, Champion provides a brief introduction to new and emerging software and devices and explains how they help, hinder, or replace our traditional means of designing and exploring places.Perfect for humanities scholars fascinated by the potential of virtual space, Rethinking Virtual Places challenges both traditional and recent evaluation methods to address the complicated problem of understanding how people evaluate and engage with the notion of place.Erik Malcolm Champion is Honorary Professor at the Centre for Digital Humanities Research at Australian National University, Canberra; Honorary Research Fellow at the University of Western Australia; and Emeritus Professor, Curtin University. He is author of Organic Design in Twentieth-Century Nordic Architecture; Critical Gaming: Interactive History and Virtual Heritage; and Playing with the Past. He is editor of The Phenomenology of Real and Virtual Places; Game Mods: Design, Theory and Criticism; and (with Agiatis Benardou, Costis Dallas, and Lorna Hughes) Cultural Heritage Infrastructures in Digital Humanities.ForewordAcknowledgmentsIntroduction: Rethinking Virtual Places1. A Potted History of Virtual Reality2. Dead, Dying, Failed Worlds3. Architecture: Places Without People4. Theories of Place & Cyberspace5. Rats & Goosebumps: Mind, Body & Embodiment6. Games are not Interactive Places7. Do Serious Gamers Learn From Place?8. Cultural Places9. Evaluating Sense of Place, Virtual Places & Virtual Worlds10. Place-Making Interfaces & PlatformsConclusion: Dwelling, Culture, CareGlossaryIndex
NSX-T Logical Routing
This book is a one-stop guide for IT professionals with a background in traditional and software-defined networks looking to expand or hone their skill set and has been developed through a combination of extensive research and testing in both development and production environments. It provides reliable information on a fundamental component of NSX-T, logical routing.A comprehensive understanding of this capability will help IT professionals with design, implementation, troubleshooting, and enhancements.The book starts with an introduction to the foundational components of the NSX-T platform and how NSX-T fits into the software-defined data center. The focus then moves to tunnel endpoints, which is a critical aspect of the NSX-T platform, and the differences between overlays and underlays are explained. Once the basics are covered, it provides a detailed description of how NSX-T components communicate.Next, the book introduces logical routing and its components and provides a better understanding of how these components function with one another. Several packet walks are illustrated to explain NSX-T logical routing behavior in different scenarios. After mastering logical routing, it explains how NSX-T ensures data plane availability, which is explored at various layers of NSX-T.Finally, the book explores the concepts and intricacies of routing into and out of the NSX-T environment. It deep dives into utilizing the Border Gateway Protocol (BGP), Open Shortest Path First (OSPF), and Static Routing.WHAT YOU WILL LEARN* Know how VMware NSX-T endpoints communicate* Understand how NSX-T logical routing works* Know how NSX-T provides high availability for the data plane* Understand how NSX-T operates with static and dynamic routing protocols* Configure the platformWHO THIS BOOK IS FORReaders with an intermediate to advanced skill set who wish to further their knowledge, those who focus on datacenter technology, those planning to move to a software-defined datacenter to transform the way their current datacenter works, and anyone looking to learn about VMware NSX-T and how it operatesSHASHANK MOHAN (Shank) is the ANZ Professional Services Practice Lead for Networking at VMware. He brings over a decade of experience in IT infrastructure and architecture, with a specialization in networking, virtual cloud networking (VCN), and VMware Cloud Foundation (VCF).Shank is a VMware Advanced Professional in Network Virtualization, a vExpert in NSX and Security, and NSX Advanced Load Balancer (AVI), he is also CISCO and AWS certified.Shank was born and raised in Sydney, Australia but now prefers the calm and cold capital city, Canberra. Between firmware upgrades and breaking his home lab, he makes time for weightlifting, gardening, and most importantly, his family. While Shank is a first-time author, he is a serial blogger. If you’d like to get in touch or continue to learn about virtualization, look up https://www.lab2prod.com.au/.Chapter 1: IntroductionThe Modern-Day Software-Defined Data CenterSoftware-Defined Datacenter ArchitectureVMware NSX-T: SDDC NetworkingThe Basics of NSX-TSummaryChapter 2: Tunnel EndpointsOverlay NetworkingNSX-T Transport Node CommunicationTransport Node TypesWhat Is a Tunnel Endpoint?Tunnel Endpoint CommunicationRouted Transport VLANsTunnel Endpoint ConfigurationTunnel Endpoint FailureSummaryChapter 3: Remote Tunnel EndpointsA Solution for Multiple SitesNSX-T Federation ComponentsSummaryChapter 4: Logical RoutingWhat Is Logical Routing?NSX-T Logical ComponentsLogical Routing ArchitecturePacket Flow Within the NSX-T FabricSummaryChapter 5: Data Plane AvailabilityEdge Cluster Deployment ConsiderationsEdge Failure TypesBidirectional Forwarding Detection (BFD)Equal Cost Multipathing (ECMP)SummaryChapter 6: Datacenter RoutingChapter ObjectivesCommunication with the Physical NetworkNSX-T and BGPNSX-T and OSPFNSX-T and Static RoutingDeterministic PeeringBidirectional Forwarding Detection (BFD)Unicast Reverse Path Forwarding (uRPF)Summary
Introducing Blockchain Applications
Deepen your understanding of blockchain technology and develop your own blockchain applications. This book provides a thorough review of distribution-based systems on blockchain technology, starting from the fundamental concepts that underlie it, all the way through the implementation of a blockchain network for business purposes.Author JOSEPH THACHIL GEORGE begins by introducing you to blockchain and some basic concepts of technology, including distributed systems, systems of systems, cyber-physical systems, the Byzantine Consensus, the CAP theorem, and cryptographic techniques. Next, he analyzes the structure of blocks and smart contracts and the mother of all blockchain platforms, Bitcoin. That sets the stage for an examination of transaction structure, validation, and flow, from creation to registration in the ledger and structure of the blocks, the Nakamoto consensus, and finally forks. From there, you’ll experience a deep dive into Ethereum; including the concepts of Gas and Message, smart contracts and the Ethereum virtual machine. From there, you’ll learn about the Ethereum consensus protocol, Ethereum Casper, and the Ethereum Proof-of-Stake algorithm. You’ll then see how blockchain can be connected to a distributed system, followed by a demonstration of how you can model a distributed system using Blockly4SoS and Kilobots. The concluding chapters offer a practical example that combines distributed systems with blockchain technology.After reading this book, you will understand how to implement blockchain technology in a distributed system and be able to leverage this knowledge in your own projects.WHAT YOU WILL LEARN* Learn the concept of blockchains by way of a practical example * Grasp the connection between distributed systems and blockchain technology* Learn the design of blockchain with hyperledger fabric* Learn the design of cyber-physical systems in a distributed environment WHO IS THIS BOOK FORDevelopers who are enthusiastic about the design and implementation of distributed systems.Joseph Thachil George is a Technical Consultant for International Game Technology (IGT), Rome, Italy. Additionally, Joseph is pursuing doctorate (PhD) in Computer Science and Engineering at the University of Lisbon, Portugal. He has completed M.S. in Cyber Security from the Università degli Studi di Firenze, Italy. In addition, he is also part of the research group (DISIA) of the University of Florence, Italy, and the research group (INESC-ID Lisbon) of the University of Lisbon, Portugal. His research interests cover dynamic malware analysis, Blockchain technology - hyperledger fabric, and cyber security. In IGT, he has been a part of various project related to game configuration and integration in various platform. Specialized in Java and spring boot-based projects. He has also worked in various companies in India, Angola, Portugal, and UK; he has seven years of experience in various IT companies.1: INTRODUCING BLOCKCHAIN APPLICATIONS THROUGH DISTRIBUTED SYSTEMS2: INTRODUCTION TO BLOCKCHAIN3: BITCOIN4: ETHEREUM5: PROOF OF STAKE: CONSENSUS OF THE FUTURE6: HYPERLEDGER FABRIC7: CONSENSUS ALGORITHMS FOR BLOCKCHAINS8: SAMPLE PROJECT EXERCISE: CONSENSUS ALGORITHMS FOR BLOCKCHAINS9: REAL-TIME SYSTEMS10: SCHEDULING IN REAL-TIME SYSTEMS11: ENGINEERING BASED ON MODELS12: BLOCKLY 4 SOS13: PROJECT: CYBER PHYSICAL SYSTEMS14: PROJECT USING MATLAB: SMART FARM15: PLATOON PROJECT16: BLOCKCHAIN TECHNOLOGY AND DISTRIBUTED SYSTEMS FUTURE SCOPE AND B-COIN PROJECT17: AI AND BLOCKCHAIN: MONITORING AUTONOMOUS VEHICLES MANAGEMENT PROJECT18: SUMMARY
Participatory Design
THIS BOOK INTRODUCES PARTICIPATORY DESIGN TO RESEARCHERS AND STUDENTS IN HUMAN–COMPUTER INTERACTION (HCI). Grounded in four strong commitments, the book discusses why and how Participatory Design is important today. The book aims to provide readers with a practical resource, introducing them to the central practices of Participatory Design research as well as to key references. This is done from the perspective of Scandinavian Participatory Design. The book is meant for students, researchers, and practitioners who are interested in Participatory Design for research studies, assignments in HCI classes, or as part of an industry project. It is structured around 11 questions arranged in 3 main parts that provide the knowledge needed to get started with practicing Participatory Design. Each chapter responds to a question about defining, conducting, or the results of carrying out Participatory Design. The authors share their extensive experience of Participatory Design processes and thinking by combining historical accounts, cases, how-to process descriptions, and reading lists to guide further readings so as to grasp the many nuances of Participatory Design as it is practiced across sectors, countries, and industries.* Preface* Part I: Participatory Design: Definition and History* Can You Define Participatory Design for Me?* What is Participatory Design?* What Can We Learn from the History of Participatory Design?* When and Where Is Participatory Design Done?* Part II: The Participatory Design Toolbox* What Are the Activities and Methods of Participatory Design?* What Are the Tools nd Materials of Participatory Design?* How Is Participatory Design Organized* How Does One Get Started on Participatory Design and Stay on Track?* Part III: Participatory DesignResults* What Are the Results of Participatory Design?* How Does One Sustain Participatory Design Initiatives?* Why Is Participatory Design Important Today?* Bibliography* Authors' Biographies
Machine Learning Techniques and Analytics for Cloud Security
MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITYTHIS BOOK COVERS NEW METHODS, SURVEYS, CASE STUDIES, AND POLICY WITH ALMOST ALL MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY SOLUTIONSThe aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment. Machine learning algorithms can also be used to meet various cloud security issues, such as effective intrusion detection systems, zero-knowledge authentication systems, measures for passive attacks, protocols design, privacy system designs, applications, and many more. The book also contains case studies/projects outlining how to implement various security features using machine learning algorithms and analytics on existing cloud-based products in public, private and hybrid cloud respectively. AUDIENCEResearch scholars and industry engineers in computer sciences, electrical and electronics engineering, machine learning, computer security, information technology, and cryptography. RAJDEEP CHAKRABORTY obtained his PhD in CSE from the University of Kalyani. He is currently an assistant professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Garia, Kolkata, India. He has several publications in reputed international journals and conferences and has authored a book on hardware cryptography. His field of interest is mainly in cryptography and computer security.ANUPAM GHOSH obtained his PhD in Engineering from Jadavpur University. He is currently a professor in the Department of Computer Science and Engineering, Netaji Subhash Engineering College, Kolkata. He has published more than 80 papers in reputed international journals and conferences. His field of interest is mainly in AI, machine learning, deep learning, image processing, soft computing, bioinformatics, IoT, data mining. JYOTSNA KUMAR MANDAL obtained his PhD in CSE from Jadavpur University He has more than 450 publications in reputed international journals and conferences. His field of interest is mainly in coding theory, data and network security, remote sensing & GIS-based applications, data compression error corrections, information security, watermarking, steganography and document authentication, image processing, visual cryptography, MANET, wireless and mobile computing/security, unify computing, chaos theory, and applications. ContentsPrefacePART I: CONCEPTUAL ASPECTS ON CLOUD AND APPLICATIONS OF MACHINE LEARNING 11 HYBRID CLOUD: A NEW PARADIGM IN CLOUD COMPUTING 3Moumita Deb and Abantika Choudhury1.1 Introduction 31.2 Hybrid Cloud 51.2.1 Architecture 61.2.2 Why Hybrid Cloud is Required? 61.2.3 Business and Hybrid Cloud 71.2.4 Things to Remember When Deploying Hybrid Cloud 81.3 Comparison Among Different Hybrid Cloud Providers 91.3.1 Cloud Storage and Backup Benefits 111.3.2 Pros and Cons of Different Service Providers 111.3.2.1 AWS Outpost 121.3.2.2 Microsoft Azure Stack 121.3.2.3 Google Cloud Anthos 121.3.3 Review on Storage of the Providers 131.3.3.1 AWS Outpost Storage 131.3.3.2 Google Cloud Anthos Storage 131.3.4 Pricing 151.4 Hybrid Cloud in Education 151.5 Significance of Hybrid Cloud Post-Pandemic 151.6 Security in Hybrid Cloud 161.6.1 Role of Human Error in Cloud Security 181.6.2 Handling Security Challenges 181.7 Use of AI in Hybrid Cloud 191.8 Future Research Direction 211.9 Conclusion 22References 22xixv2 RECOGNITION OF DIFFERENTIALLY EXPRESSED GLYCAN STRUCTURE OF H1N1 VIRUS USING UNSUPERVISED LEARNING FRAMEWORK 25Shillpi Mishrra2.1 Introduction 252.2 Proposed Methodology 272.3 Result 282.3.1 Description of Datasets 292.3.2 Analysis of Result 292.3.3 Validation of Results 312.3.3.1 T-Test (Statistical Validation) 312.3.3.2 Statistical Validation 332.3.4 Glycan Cloud 372.4 Conclusions and Future Work 38References 393 SELECTION OF CERTAIN CANCER MEDIATING GENES USING A HYBRID MODEL LOGISTIC REGRESSION SUPPORTED BY PRINCIPAL COMPONENT ANALYSIS (PC-LR) 41Subir Hazra, Alia Nikhat Khurshid and Akriti3.1 Introduction 413.2 Related Methods 443.3 Methodology 463.3.1 Description 473.3.2 Flowchart 493.3.3 Algorithm 493.3.4 Interpretation of the Algorithm 503.3.5 Illustration 503.4 Result 513.4.1 Description of the Dataset 513.4.2 Result Analysis 513.4.3 Result Set Validation 523.5 Application in Cloud Domain 563.6 Conclusion 58References 59PART II: CLOUD SECURITY SYSTEMS USING MACHINE LEARNING TECHNIQUES 614 COST-EFFECTIVE VOICE-CONTROLLED REAL-TIME SMART INFORMATIVE INTERFACE DESIGN WITH GOOGLE ASSISTANCE TECHNOLOGY 63Soumen Santra, Partha Mukherjee and Arpan Deyasi4.1 Introduction 644.2 Home Automation System 654.2.1 Sensors 654.2.2 Protocols 664.2.3 Technologies 664.2.4 Advantages 674.2.5 Disadvantages 674.3 Literature Review 674.4 Role of Sensors and Microcontrollers in Smart Home Design 684.5 Motivation of the Project 704.6 Smart Informative and Command Accepting Interface 704.7 Data Flow Diagram 714.8 Components of Informative Interface 724.9 Results 734.9.1 Circuit Design 734.9.2 LDR Data 764.9.3 API Data 764.10 Conclusion 784.11 Future Scope 78References 785 SYMMETRIC KEY AND ARTIFICIAL NEURAL NETWORK WITH MEALY MACHINE: A NEOTERIC MODEL OF CRYPTOSYSTEM FOR CLOUD SECURITY 81Anirban Bhowmik, Sunil Karforma and Joydeep Dey5.1 Introduction 815.2 Literature Review 855.3 The Problem 865.4 Objectives and Contributions 865.5 Methodology 875.6 Results and Discussions 915.6.1 Statistical Analysis 935.6.2 Randomness Test of Key 945.6.3 Key Sensitivity Analysis 955.6.4 Security Analysis 965.6.5 Dataset Used on ANN 965.6.6 Comparisons 985.7 Conclusions 99References 996 AN EFFICIENT INTRUSION DETECTION SYSTEM ON VARIOUS DATASETS USING MACHINE LEARNING TECHNIQUES 103Debraj Chatterjee6.1 Introduction 1036.2 Motivation and Justification of the Proposed Work 1046.3 Terminology Related to IDS 1056.3.1 Network 1056.3.2 Network Traffic 1056.3.3 Intrusion 1066.3.4 Intrusion Detection System 1066.3.4.1 Various Types of IDS 1086.3.4.2 Working Methodology of IDS 1086.3.4.3 Characteristics of IDS 1096.3.4.4 Advantages of IDS 1106.3.4.5 Disadvantages of IDS 1116.3.5 Intrusion Prevention System (IPS) 1116.3.5.1 Network-Based Intrusion Prevention System (NIPS) 1116.3.5.2 Wireless Intrusion Prevention System (WIPS) 1126.3.5.3 Network Behavior Analysis (NBA) 1126.3.5.4 Host-Based Intrusion Prevention System (HIPS) 1126.3.6 Comparison of IPS With IDS/Relation Between IDS and IPS 1126.3.7 Different Methods of Evasion in Networks 1136.4 Intrusion Attacks on Cloud Environment 1146.5 Comparative Studies 1166.6 Proposed Methodology 1216.7 Result 1226.8 Conclusion and Future Scope 125References 1267 YOU ARE KNOWN BY YOUR MOOD: A TEXT-BASED SENTIMENT ANALYSIS FOR CLOUD SECURITY 129Abhijit Roy and Parthajit Roy7.1 Introduction 1297.2 Literature Review 1317.3 Essential Prerequisites 1337.3.1 Security Aspects 1337.3.2 Machine Learning Tools 1357.3.2.1 Naïve Bayes Classifier 1357.3.2.2 Artificial Neural Network 1367.4 Proposed Model 1367.5 Experimental Setup 1387.6 Results and Discussions 1397.7 Application in Cloud Security 1427.7.1 Ask an Intelligent Security Question 1427.7.2 Homomorphic Data Storage 1427.7.3 Information Diffusion 1447.8 Conclusion and Future Scope 144References 1458 THE STATE-OF-THE-ART IN ZERO-KNOWLEDGE AUTHENTICATION PROOF FOR CLOUD 149Priyanka Ghosh8.1 Introduction 1498.2 Attacks and Countermeasures 1538.2.1 Malware and Ransomware Breaches 1548.2.2 Prevention of Distributing Denial of Service 1548.2.3 Threat Detection 1548.3 Zero-Knowledge Proof 1548.4 Machine Learning for Cloud Computing 1568.4.1 Types of Learning Algorithms 1568.4.1.1 Supervised Learning 1568.4.1.2 Supervised Learning Approach 1568.4.1.3 Unsupervised Learning 1578.4.2 Application on Machine Learning for Cloud Computing 1578.4.2.1 Image Recognition 1578.4.2.2 Speech Recognition 1578.4.2.3 Medical Diagnosis 1588.4.2.4 Learning Associations 1588.4.2.5 Classification 1588.4.2.6 Prediction 1588.4.2.7 Extraction 1588.4.2.8 Regression 1588.4.2.9 Financial Services 1598.5 Zero-Knowledge Proof: Details 1598.5.1 Comparative Study 1598.5.1.1 Fiat-Shamir ZKP Protocol 1598.5.2 Diffie-Hellman Key Exchange Algorithm 1618.5.2.1 Discrete Logarithm Attack 1618.5.2.2 Man-in-the-Middle Attack 1628.5.3 ZKP Version 1 1628.5.4 ZKP Version 2 1628.5.5 Analysis 1648.5.6 Cloud Security Architecture 1668.5.7 Existing Cloud Computing Architectures 1678.5.8 Issues With Current Clouds 1678.6 Conclusion 168References 1699 A ROBUST APPROACH FOR EFFECTIVE SPAM DETECTION USING SUPERVISED LEARNING TECHNIQUES 171Amartya Chakraborty, Suvendu Chattaraj, Sangita Karmakar and Shillpi Mishrra9.1 Introduction 1719.2 Literature Review 1739.3 Motivation 1749.4 System Overview 1759.5 Data Description 1769.6 Data Processing 1769.7 Feature Extraction 1789.8 Learning Techniques Used 1799.8.1 Support Vector Machine 1799.8.2 k-Nearest Neighbors 1809.8.3 Decision Tree 1809.8.4 Convolutional Neural Network 1809.9 Experimental Setup 1829.10 Evaluation Metrics 1839.11 Experimental Results 1859.11.1 Observations in Comparison With State-of-the-Art 1879.12 Application in Cloud Architecture 1889.13 Conclusion 189References 19010 AN INTELLIGENT SYSTEM FOR SECURING NETWORK FROM INTRUSION DETECTION AND PREVENTION OF PHISHING ATTACK USING MACHINE LEARNING APPROACHES 193Sumit Banik, Sagar Banik and Anupam Mukherjee10.1 Introduction 19310.1.1 Types of Phishing 19510.1.1.1 Spear Phishing 19510.1.1.2 Whaling 19510.1.1.3 Catphishing and Catfishing 19510.1.1.4 Clone Phishing 19610.1.1.5 Voice Phishing 19610.1.2 Techniques of Phishing 19610.1.2.1 Link Manipulation 19610.1.2.2 Filter Evasion 19610.1.2.3 Website Forgery 19610.1.2.4 Covert Redirect 19710.2 Literature Review 19710.3 Materials and Methods 19910.3.1 Dataset and Attributes 19910.3.2 Proposed Methodology 19910.3.2.1 Logistic Regression 20210.3.2.2 Naïve Bayes 20210.3.2.3 Support Vector Machine 20310.3.2.4 Voting Classification 20310.4 Result Analysis 20410.4.1 Analysis of Different Parameters for ML Models 20410.4.2 Predictive Outcome Analysis in Phishing URLs Dataset 20510.4.3 Analysis of Performance Metrics 20610.4.4 Statistical Analysis of Results 2100.4.4. 1 ANOVA: Two-Factor Without Replication 21010.4.4.2 ANOVA: Single Factor 21010.5 Conclusion 210References 211PART III: CLOUD SECURITY ANALYSIS USING MACHINE LEARNING TECHNIQUES 21311 CLOUD SECURITY USING HONEYPOT NETWORK AND BLOCKCHAIN: A REVIEW 215Smarta Sangui * and Swarup Kr Ghosh11.1 Introduction 21511.2 Cloud Computing Overview 21611.2.1 Types of Cloud Computing Services 21611.2.1.1 Software as a Service 21611.2.1.2 Infrastructure as a Service 21811.2.1.3 Platform as a Service 21811.2.2 Deployment Models of Cloud Computing 21811.2.2.1 Public Cloud 21811.2.2.2 Private Cloud 21811.2.2.3 Community Cloud 21911.2.2.4 Hybrid Cloud 21911.2.3 Security Concerns in Cloud Computing 21911.2.3.1 Data Breaches 21911.2.3.2 Insufficient Change Control and Misconfiguration 21911.2.3.3 Lack of Strategy and Security Architecture 22011.2.3.4 Insufficient Identity, Credential, Access, and Key Management 22011.2.3.5 Account Hijacking 22011.2.3.6 Insider Threat 22011.2.3.7 Insecure Interfaces and APIs 22011.2.3.8 Weak Control Plane 22111.3 Honeypot System 22111.3.1 VM (Virtual Machine) as Honeypot in the Cloud 22111.3.2 Attack Sensing and Analyzing Framework 22211.3.3 A Fuzzy Technique Against Fingerprinting Attacks 22311.3.4 Detecting and Classifying Malicious Access 22411.3.5 A Bayesian Defense Model for Deceptive Attack 22411.3.6 Strategic Game Model for DDoS Attacks in Smart Grid 22611.4 Blockchain 22711.4.1 Blockchain-Based Encrypted Cloud Storage 22811.4.2 Cloud-Assisted EHR Sharing via Consortium Blockchain 22911.4.3 Blockchain-Secured Cloud Storage 23011.4.4 Blockchain and Edge Computing–Based Security Architecture 23011.4.5 Data Provenance Architecture in Cloud Ecosystem Using Blockchain 23111.6 Comparative Analysis 23311.7 Conclusion 233References 23412 MACHINE LEARNING–BASED SECURITY IN CLOUD DATABASE—A SURVEY 239Utsav Vora, Jayleena Mahato, Hrishav Dasgupta, Anand Kumar and Swarup Kr Ghosh12.1 Introduction 23912.2 Security Threats and Attacks 24112.3 Dataset Description 24412.3.1 NSL-KDD Dataset 24412.3.2 UNSW-NB15 Dataset 24412.4 Machine Learning for Cloud Security 24512.4.1 Supervised Learning Techniques 24512.4.1.1 Support Vector Machine 24512.4.1.2 Artificial Neural Network 24712.4.1.3 Deep Learning 24912.4.1.4 Random Forest 25012.4.2 Unsupervised Learning Techniques 25112.4.2.1 K-Means Clustering 25212.4.2.2 Fuzzy C-Means Clustering 25312.4.2.3 Expectation-Maximization Clustering 25312.4.2.4 Cuckoo Search With Particle Swarm Optimization (PSO) 25412.4.3 Hybrid Learning Techniques 25612.4.3.1 HIDCC: Hybrid Intrusion Detection Approach in Cloud Computing 25612.4.3.2 Clustering-Based Hybrid Model in Deep Learning Framework 25712.4.3.3 K-Nearest Neighbor–Based Fuzzy C-Means Mechanism 25812.4.3.4 K-Means Clustering Using Support Vector Machine 26012.4.3.5 K-Nearest Neighbor–Based Artificial Neural Network Mechanism 26012.4.3.6 Artificial Neural Network Fused With Support Vector Machine 26112.4.3.7 Particle Swarm Optimization–Based Probabilistic Neural Network 26112.5 Comparative Analysis 26212.6 Conclusion 264References 26713 MACHINE LEARNING ADVERSARIAL ATTACKS: A SURVEY BEYOND 271Chandni Magoo and Puneet Garg13.1 Introduction 27113.2 Adversarial Learning 27213.2.1 Concept 27213.3 Taxonomy of Adversarial Attacks 27313.3.1 Attacks Based on Knowledge 27313.3.1.1 Black Box Attack (Transferable Attack) 27313.3.1.2 White Box Attack 27413.3.2 Attacks Based on Goals 27513.3.2.1 Target Attacks 27513.3.2.2 Non-Target Attacks 27513.3.3 Attacks Based on Strategies 27513.3.3.1 Poisoning Attacks 27513.3.3.2 Evasion Attacks 27613.3.4 Textual-Based Attacks (NLP) 27613.3.4.1 Character Level Attacks 27613.3.4.2 Word-Level Attacks 27613.3.4.3 Sentence-Level Attacks 27613.4 Review of Adversarial Attack Methods 27613.4.1 L-bfgs 27713.4.2 Feedforward Derivation Attack (Jacobian Attack) 27713.4.3 Fast Gradient Sign Method 27813.4.4 Methods of Different Text-Based Adversarial Attacks 27813.4.5 Adversarial Attacks Methods Based on Language Models 28413.4.6 Adversarial Attacks on Recommender Systems 28413.4.6.1 Random Attack 28413.4.6.2 Average Attack 28613.4.6.3 Bandwagon Attack 28613.4.6.4 Reverse Bandwagon Attack 28613.5 Adversarial Attacks on Cloud-Based Platforms 28713.6 Conclusion 288References 28814 PROTOCOLS FOR CLOUD SECURITY 293Weijing You and Bo Chen14.1 Introduction 29314.2 System and Adversarial Model 29514.2.1 System Model 29514.2.2 Adversarial Model 29514.3 Protocols for Data Protection in Secure Cloud Computing 29614.3.1 Homomorphic Encryption 29714.3.2 Searchable Encryption 29814.3.3 Attribute-Based Encryption 29914.3.4 Secure Multi-Party Computation 30014.4 Protocols for Data Protection in Secure Cloud Storage 30114.4.1 Proofs of Encryption 30114.4.2 Secure Message-Locked Encryption 30314.4.3 Proofs of Storage 30314.4.4 Proofs of Ownership 30514.4.5 Proofs of Reliability 30614.5 Protocols for Secure Cloud Systems 30914.6 Protocols for Cloud Security in the Future 30914.7 Conclusion 310References 311PART IV: CASE STUDIES FOCUSED ON CLOUD SECURITY 31315 A STUDY ON GOOGLE CLOUD PLATFORM (GCP) AND ITS SECURITY 315Agniswar Roy, Abhik Banerjee and Navneet Bhardwaj15.1 Introduction 31515.1.1 Google Cloud Platform Current Market Holding 31615.1.1.1 The Forrester Wave 31715.1.1.2 Gartner Magic Quadrant 31715.1.2 Google Cloud Platform Work Distribution 31715.1.2.1 SaaS 31815.1.2.2 PaaS 31815.1.2.3 IaaS 31815.1.2.4 On-Premise 31815.2 Google Cloud Platform’s Security Features Basic Overview 31815.2.1 Physical Premises Security 31915.2.2 Hardware Security 31915.2.3 Inter-Service Security 31915.2.4 Data Security 32015.2.5 Internet Security 32015.2.6 In-Software Security 32015.2.7 End User Access Security 32115.3 Google Cloud Platform’s Architecture 32115.3.1 Geographic Zone 32115.3.2 Resource Management 32215.3.2.1 Iam 32215.3.2.2 Roles 32315.3.2.3 Billing 32315.4 Key Security Features 32415.4.1 Iap 32415.4.2 Compliance 32515.4.3 Policy Analyzer 32615.4.4 Security Command Center 32615.4.4.1 Standard Tier 32615.4.4.2 Premium Tier 32615.4.5 Data Loss Protection 32915.4.6 Key Management 32915.4.7 Secret Manager 33015.4.8 Monitoring 33015.5 Key Application Features 33015.5.1 Stackdriver (Currently Operations) 33015.5.1.1 Profiler 33015.5.1.2 Cloud Debugger 33015.5.1.3 Trace 33115.5.2 Network 33115.5.3 Virtual Machine Specifications 33215.5.4 Preemptible VMs 33215.6 Computation in Google Cloud Platform 33215.6.1 Compute Engine 33215.6.2 App Engine 33315.6.3 Container Engine 33315.6.4 Cloud Functions 33315.7 Storage in Google Cloud Platform 33315.8 Network in Google Cloud Platform 33415.9 Data in Google Cloud Platform 33415.10 Machine Learning in Google Cloud Platform 33515.11 Conclusion 335References 33716 CASE STUDY OF AZURE AND AZURE SECURITY PRACTICES 339Navneet Bhardwaj, Abhik Banerjee and Agniswar Roy16.1 Introduction 33916.1.1 Azure Current Market Holding 34016.1.2 The Forrester Wave 34016.1.3 Gartner Magic Quadrant 34016.2 Microsoft Azure—The Security Infrastructure 34116.2.1 Azure Security Features and Tools 34116.2.2 Network Security 34216.3 Data Encryption 34216.3.1 Data Encryption at Rest 34216.3.2 Data Encryption at Transit 34216.3.3 Asset and Inventory Management 34316.3.4 Azure Marketplace 34316.4 Azure Cloud Security Architecture 34416.4.1 Working 34416.4.2 Design Principles 34416.4.2.1 Alignment of Security Policies 34416.4.2.2 Building a Comprehensive Strategy 34516.4.2.3 Simplicity Driven 34516.4.2.4 Leveraging Native Controls 34516.4.2.5 Identification-Based Authentication 34516.4.2.6 Accountability 34516.4.2.7 Embracing Automation 34516.4.2.8 Stress on Information Protection 34516.4.2.9 Continuous Evaluation 34616.4.2.10 Skilled Workforce 34616.5 Azure Architecture 34616.5.1 Components 34616.5.1.1 Azure Api Gateway 34616.5.1.2 Azure Functions 34616.5.2 Services 34716.5.2.1 Azure Virtual Machine 34716.5.2.2 Blob Storage 34716.5.2.3 Azure Virtual Network 34816.5.2.4 Content Delivery Network 34816.5.2.5 Azure SQL Database 34916.6 Features of Azure 35016.6.1 Key Features 35016.6.1.1 Data Resiliency 35016.6.1.2 Data Security 35016.6.1.3 BCDR Integration 35016.6.1.4 Storage Management 35116.6.1.5 Single Pane View 35116.7 Common Azure Security Features 35116.7.1 Security Center 35116.7.2 Key Vault 35116.7.3 Azure Active Directory 35216.7.3.1 Application Management 35216.7.3.2 Conditional Access 35216.7.3.3 Device Identity Management 35216.7.3. 4 Identity Protection 35316.7.3.5 Azure Sentinel 35316.7.3.6 Privileged Identity Management 35416.7.3.7 Multifactor Authentication 35416.7.3.8 Single Sign On 35416.8 Conclusion 355References 35517 NUTANIX HYBRID CLOUD FROM SECURITY PERSPECTIVE 357Abhik Banerjee, Agniswar Roy, Amar Kalvikatte and Navneet Bhardwaj17.1 Introduction 35717.2 Growth of Nutanix 35817.2.1 Gartner Magic Quadrant 35817.2.2 The Forrester Wave 35817.2.3 Consumer Acquisition 35917.2.4 Revenue 35917.3 Introductory Concepts 36117.3.1 Plane Concepts 36117.3.1.1 Control Plane 36117.3.1.2 Data Plane 36117.3.2 Security Technical Implementation Guides 36217.3.3 SaltStack and SCMA 36217.4 Nutanix Hybrid Cloud 36217.4.1 Prism 36217.4.1.1 Prism Element 36317.4.1.2 Prism Central 36417.4.2 Acropolis 36517.4.2.1 Distributed Storage Fabric 36517.4.2.2 Ahv 36717.5 Reinforcing AHV and Controller VM 36717.6 Disaster Management and Recovery 36817.6.1 Protection Domains and Consistent Groups 36817.6.2 Nutanix DSF Replication of OpLog 36917.6.3 DSF Snapshots and VmQueisced Snapshot Service 37017.6.4 Nutanix Cerebro 37017.7 Security and Policy Management on Nutanix Hybrid Cloud 37117.7.1 Authentication on Nutanix 37217.7.2 Nutanix Data Encryption 37217.7.3 Security Policy Management 37317.7.3.1 Enforcing a Policy 37417.7.3.2 Priority of a Policy 37417.7.3.3 Automated Enforcement 37417.8 Network Security and Log Management 37417.8.1 Segmented and Unsegmented Network 37517.9 Conclusion 376References 376PART V: POLICY ASPECTS 37918 A DATA SCIENCE APPROACH BASED ON USER INTERACTIONS TO GENERATE ACCESS CONTROL POLICIES FOR LARGE COLLECTIONS OF DOCUMENTS 381Jedidiah Yanez-Sierra, Arturo Diaz-Perez and Victor Sosa-Sosa18.1 Introduction 38118.2 Related Work 38318.3 Network Science Theory 38418.4 Approach to Spread Policies Using Networks Science 38718.4.1 Finding the Most Relevant Spreaders 38818.4.1.1 Weighting Users 38918.4.1.2 Selecting the Top � Spreaders 39018.4.2 Assign and Spread the Access Control Policies 39018.4.2.1 Access Control Policies 39118.4.2.2 Horizontal Spreading 39118.4.2.3 Vertical Spreading (Bottom-Up) 39218.4.2.4 Policies Refinement 39518.4.3 Structural Complexity Analysis of CP-ABE Policies 39518.4.3.1 Assessing the WSC for ABE Policies 39618.4.3.2 Assessing the Policies Generated in the Spreading Process 39718.4.4 Effectiveness Analysis 39818.4.4.1 Evaluation Metrics 39918.4.4.2 Adjusting the Interaction Graph to Assess Policy Effectiveness 40018.4.4.3 Method to Complement the User Interactions (Synthetic Edges Generation) 40018.4.5 Measuring Policy Effectiveness in the User Interaction Graph 40318.4.5.1 Simple Node-Based Strategy 40318.4.5.2 Weighted Node-Based Strategy 40418.5 Evaluation 40518.5.1 Dataset Description 40518.5.2 Results of the Complexity Evaluation 40618.5.3 Effectiveness Results From the Real Edges 40718.5.4 Effectiveness Results Using Real and Synthetic Edges 40818.5.4.1 Results of the Effectiveness Metrics for the Enhanced G + Graph 41018.6 Conclusions 413References 41419 AI, ML, & ROBOTICS IN ISCHOOLS: AN ACADEMIC ANALYSIS FOR AN INTELLIGENT SOCIETAL SYSTEMS 417P. K. Paul19.1 Introduction 41719.2 Objective 41919.3 Methodology 42019.3.1 iSchools, Technologies, and Artificial Intelligence, ML, and Robotics 42019.4 Artificial Intelligence, ML, and Robotics: An Overview 42719.5 Artificial Intelligence, ML, and Robotics as an Academic Program: A Case on iSchools—North American Region 42819.6 Suggestions 43119.7 Motivation and Future Works 43519.8 Conclusion 435References 436Index 439
Handbuch Infrastructure as Code
CLOUD-INFRASTRUKTUREN ERFOLGREICH AUTOMATISIEREN: STRATEGIEN FÜR DIE PRAXIS * Mithilfe von Patterns und Antipatterns Automatisierung verstehen und erfolgreich umsetzen * Pseudocode-Beispiele veranschaulichen die konkrete Umsetzung * Diese Auflage beschreibt neben dem Managen von Servern jetzt auch komplexe Container-Plattformen Kief Morris von ThoughtWorks zeigt in diesem Praxisbuch, wie Sie die von DevOps-Teams entwickelte Prinzipien, Praktiken und Patterns effektiv verwenden, um in der Cloud sicher und flexibel Infrastruktur zu managen. Es vermittelt, wie nicht nur Server, sondern auch komplexe Container-Plattformen (Stacks) aufgesetzt werden. Sie erfahren, wie sie mithilfe von Cloud- und Automatisierungstechnologien Änderungen einfach, sicher und schnell vornehmen. Sie lernen, wie Sie nahezu alles als Code definieren und setzen Praktiken aus dem Softwaredesign ein, um ein System aus kleinen, lose gekoppelten Elementen aufzubauen. Zielgruppen sind Mitarbeiterinnen und Mitarbeiter in der Systemadministration, Infrastruktur-Entwicklung, Softwareentwicklung und Architektur.