Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Agricultural Informatics

Agricultural Informatics

Despite the increasing population (the Food and Agriculture Organization of the United Nations estimates 70% more food will be needed in 2050 than was produced in 2006), issues related to food production have yet to be completely addressed. In recent years, Internet of Things technology has begun to be used to address different industrial and technical challenges to meet this growing need. These Agro-IoT tools boost productivity and minimize the pitfalls of traditional farming, which is the backbone of the world's economy. Aided by the IoT, continuous monitoring of fields provides useful and critical information to farmers, ushering in a new era in farming. The IoT can be used as a tool to combat climate change through greenhouse automation; monitor and manage water, soil and crops; increase productivity; control insecticides/pesticides; detect plant diseases; increase the rate of crop sales; cattle monitoring etc.Agricultural Informatics: Automation Using the IoT and Machine Learning focuses on all these topics, including a few case studies, and they give a clear indication as to why these techniques should now be widely adopted by the agriculture and farming industries.AMITAVA CHOUDHURY PhD is an assistant professor in the school of Computer Science, University of Petroleum & Energy Studies, Dehradun, India.ARINDAM BISWAS PhD is an assistant professor in School of Mines and Metallurgy at Kazi Nazrul University, Asansol, West Bengal, India.MANISH PRATEEK PhD is Professor and Dean, School of Computer Science, at the University of Petroleum and Energy Studies, Dehradun, India.AMLAN CHAKRABARTI PhD is a Full Professor in the A.K. Choudhury School of Information Technology at the University of Calcutta.Preface xiii1 A STUDY ON VARIOUS MACHINE LEARNING ALGORITHMS AND THEIR ROLE IN AGRICULTURE 1Kalpana Rangra and Amitava Choudhury1.1 Introduction 11.2 Conclusions 92 SMART FARMING USING MACHINE LEARNING AND IOT 13Alo Sen, Rahul Roy and Satya Ranjan Dash2.1 Introduction 142.2 Related Work 152.3 Problem Identification 222.4 Objective Behind the Integrated Agro-IoT System 232.5 Proposed Prototype of the Integrated Agro-IoT System 232.6 Hardware Component Requirement for the Integrated Agro-IoT System 262.7 Comparative Study Between Raspberry Pi vs Beaglebone Black 302.8 Conclusions 312.9 Future Work 323 AGRICULTURAL INFORMATICS VIS-À-VIS INTERNET OF THINGS (IOT): THE SCENARIO, APPLICATIONS AND ACADEMIC ASPECTS--INTERNATIONAL TREND & INDIAN POSSIBILITIES 35P.K. Paul3.1 Introduction 363.2 Objectives 363.3 Methods 373.4 Agricultural Informatics: An Account 373.5 Agricultural Informatics & Technological Components: Basics & Emergence 403.6 IoT: Basics and Characteristics 413.7 IoT: The Applications & Agriculture Areas 433.8 Agricultural Informatics & IoT: The Scenario 453.9 IoT in Agriculture: Requirement, Issues & Challenges 493.10 Development, Economy and Growth: Agricultural Informatics Context 503.11 Academic Availability and Potentiality of IoT in Agricultural Informatics: International Scenario & Indian Possibilities 513.12 Suggestions 603.13 Conclusion 604 APPLICATION OF AGRICULTURAL DRONES AND IOT TO UNDERSTAND FOOD SUPPLY CHAIN DURING POST COVID-19 67Pushan Kumar Dutta and Susanta Mitra4.1 Introduction 684.2 Related Work 694.3 Smart Production With the Introduction of Drones and IoT 724.4 Agricultural Drones 754.5 IoT Acts as a Backbone in Addressing COVID-19 Problems in Agriculture 774.6 Conclusion 815 IOT AND MACHINE LEARNING-BASED APPROACHES FOR REAL TIME ENVIRONMENT PARAMETERS MONITORING IN AGRICULTURE: AN EMPIRICAL REVIEW 89Parijata Majumdar and Sanjoy Mitra5.1 Introduction 905.2 Machine Learning (ML)-Based IoT Solution 905.3 Motivation of the Work 915.4 Literature Review of IoT-Based Weather and Irrigation Monitoring for Precision Agriculture 915.5 Literature Review of Machine Learning-Based Weather and Irrigation Monitoring for Precision Agriculture 925.6 Challenges 1125.7 Conclusion and Future Work 1136 DEEP NEURAL NETWORK-BASED MULTI-CLASS IMAGE CLASSIFICATION FOR PLANT DISEASES 117Alok Negi, Krishan Kumar and Prachi Chauhan6.1 Introduction 1176.2 Related Work 1196.3 Proposed Work 1216.4 Results and Evaluation 1246.5 Conclusion 1277 DEEP RESIDUAL NEURAL NETWORK FOR PLANT SEEDLING IMAGE CLASSIFICATION 131Prachi Chauhan, Hardwari Lal Mandoria and Alok Negi7.1 Introduction 1317.2 Related Work 1367.3 Proposed Work 1397.4 Result and Evaluation 1427.5 Conclusion 1448 DEVELOPMENT OF IOT-BASED SMART SECURITY AND MONITORING DEVICES FOR AGRICULTURE 147Himadri Nath Saha, Reek Roy, Monojit Chakraborty and Chiranmay Sarkar8.1 Introduction 1488.2 Background & Related Works 1508.3 Proposed Model 1558.4 Methodology 1608.5 Performance Analysis 1658.6 Future Research Direction 1668.7 Conclusion 1679 AN INTEGRATED APPLICATION OF IOT-BASED WSN IN THE FIELD OF INDIAN AGRICULTURE SYSTEM USING HYBRID OPTIMIZATION TECHNIQUE AND MACHINE LEARNING 171Avishek Banerjee, Arnab Mitra and Arindam Biswas9.1 Introduction 1729.2 Literature Review 1759.3 Proposed Hybrid Algorithms (GA-MWPSO) 1779.4 Reliability Optimization and Coverage Optimization Model 1799.5 Problem Description 1819.6 Numerical Examples, Results and Discussion 1829.7 Conclusion 18310 DECRYPTION AND DESIGN OF A MULTICOPTER UNMANNED AERIAL VEHICLE (UAV) FOR HEAVY LIFT AGRICULTURAL OPERATIONS 189Raghuvirsinh Pravinsinh Parmar10.1 Introduction 19010.2 History of Multicopter UAVs 19210.3 Basic Components of Multicopter UAV 19310.4 Working and Control Mechanism of Multicopter UAV 20710.5 Design Calculations and Selection of Components 21010.6 Conclusion 21811 IOT-ENABLED AGRICULTURAL SYSTEM APPLICATION, CHALLENGES AND SECURITY ISSUES 223Himadri Nath Saha, Reek Roy, Monojit Chakraborty and Chiranmay Sarkar11.1 Introduction 22411.2 Background & Related Works 22611.3 Challenges to Implement IoT-Enabled Systems 23211.4 Security Issues and Measures 24011.5 Future Research Direction 24311.6 Conclusion 24412 PLANE REGION STEP FARMING, ANIMAL AND PEST ATTACK CONTROL USING INTERNET OF THINGS 249Sahadev Roy, Kaushal Mukherjee and Arindam Biswas12.1 Introduction 25012.2 Proposed Work 25412.3 Irrigation Methodology 25712.4 Sensor Connection Using Internet of Things 25912.5 Placement of Sensor in the Field 26312.6 Conclusion 267References 268Index 271

Regulärer Preis: 170,99 €
Produktbild für The Digital Notebook

The Digital Notebook

To keep information snippets in a notebook that can't be lost, that always stays up to date, that does not get dog-ears, can reach any size and takes texts, pictures, videos and sounds, shares and finds them quickly - that would be great! You have such a notebook in Windows 10, but only few use it. If you want to make it communicate with Outlook, take Office OneNote to unfold the whole potential of co-operation. There are only two types of people: the ones who love OneNote and the others who do not know it yet. It's easy to learn. In this booklet you'll find all important topics. With a short introduction to Class Notebook, a special version for education purposes.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €
Produktbild für Office365

Office365

The new office package is continuously changing. New features are supplied frequently and provide new possibilities to users and administrators alike. This booklet supplies all novelties in Word, Excel, Outlook and PowerPoint - and entirely the novelties. It makes it easy for you to make up your mind what's in for you and what new possibilities will be at your disposal. You remain on top of the game!Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €
Produktbild für Splunk Certified Study Guide

Splunk Certified Study Guide

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field extraction, field aliases and macros, and Splunk tags. You will be able to make your own data model and prepare an advanced dashboard in Splunk.In the second part, you will explore the Splunk Admin certification. There will be in-depth coverage of Splunk licenses and user role management, and how to configure Splunk forwarders, indexer clustering, and the security policy of Splunk. You’ll also explore advanced data input options in Splunk as well as .conf file merging logic, btool, various attributes, stanza types, editing advanced data inputs through the .conf file, and various other types of .conf file in Splunk.The concluding part covers the advanced topics of the Splunk Admin certification. You will also learn to troubleshoot Splunk and to manage existing Splunk infrastructure. You will understand how to configure search head, multi-site indexer clustering, and search peers besides exploring how to troubleshoot Splunk Enterprise using the monitoring console and matrix.log. This part will also include search issues and configuration issues. You will learn to deploy an app through a deployment server on your client’s instance, create a server class, and carry out load balancing, socks proxy, and indexer discovery.By the end of the Splunk Certified Study Guide, you will have learned how to manage resources in Splunk and how to use REST API services for Splunk. This section also explains how to set up Splunk Enterprise on the AWS platform and some of the best practices to make them work efficiently together.The book offers multiple choice question tests for each part that will help you better prepare for the exam.WHAT YOU WILL LEARN* Study to pass the Splunk User, Power User, and Admin certificate exams* Implement and manage Splunk multi-site clustering* Design, implement, and manage a complex Splunk Enterprise solution* Master the roles of Splunk Admin and troubleshooting* Configure Splunk using AWSWHO THIS BOOK IS FORPeople looking to pass the User, Power User, and Enterprise Admin exams. It is also useful for Splunk administrators and support engineers for managing an existing deployment.Deep Mehta is a AWS Certified Associate Architect, Docker Certified Associate, Certified Splunk Architect (ongoing), and Certified Splunk User, Power User, and Admin. He’s worked on the Splunk platform since 2017 having experience consulting in the telecommunication, aviation, and healthcare industries. Apart from being passionate about big data technologies, he also loves playing squash and badminton.PART 1: SPLUNK ARCHITECTURE , SPLUNK SPL(SEARCH PROCESSING LANGUAGE) AND SPLUNK KNOWLEDGE OBJECTSGOAL: In this module, readers will be given a detailed idea about current splunk architecture.They will learn how to fire splunk queries using splunk SPL(Search Processing Language) and will look into all the modules provided by splunk to analyze data and will cover all modules necessary to pass power user exam which covers splunk knowledge objects in detail.This module is basic module where we create base for candidate to pass splunk admin exam.Chapter 1: Overview Of SplunkChapter 2: Splunk Search Processing LanguageChapter 3: Macros,Field Extraction and Field AliasesChapter 4: Tags,Lookups and Correlating EventsChapter 5: Datamodels,Pivot and CIM in SplunkChapter 6: Knowledge Manager and Dashboard in SplunkChapter 7: Splunk User/Power User Exam setPART 2: SPLUNK DATA ADMINISTRATION AND SYSTEM ADMINISTRATIONGOAL: In this module data & system administration are designed in a way that will focus on very important topics that will help candidates to pass splunk admin exam.We will study the roles of a splunk admin. In this module, we will understand the concepts behind splunk Licenses and role management, configuring splunk forwarders, clustering in splunk, getting advanced data input and updating .conf file.Chapter 8: Splunk Licenses, Indexes and role ManagementChapter 9: Machine Data using Splunk forwarder and clusteringChapter 10: Splunk Advanced Data InputsChapter 11: Splunk Advanced .Conf file and DiagChapter12: Splunk Admin Exam setPART 3: ADVANCED SPLUNKGOAL: In this part we will explore some features that are very useful for splunk admins in day to day life like infrastructure planning with search head clustering , troubleshooting in splunk,Advanced Deployment, Roles of splunk architect and splunk best practices . By the end of this module, readers will gain a more advanced insight of splunk.Chapter 13: Infrastructure planning with Indexer and Search Head ClusteringChapter 14: Troubleshooting in SplunkChapter 15: Advanced Deployment in SplunkChapter 16: Advanced SplunkChapter 17: Final Practice setChapter 18: Setting up a Splunk Environment with AWS

Regulärer Preis: 56,99 €
Produktbild für Zero Trust Security

Zero Trust Security

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security—moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. ZERO TRUST SECURITY uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization‘s journey to Zero Trust.WHAT YOU WILL LEARN* Understand Zero Trust security principles and why it is critical to adopt them* See the security and operational benefits of Zero Trust* Make informed decisions about where, when, and how to apply Zero Trust security architectures* Discover how the journey to Zero Trust will impact your enterprise and security architecture* Be ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organizationWHO THIS BOOK IS FORSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategistsJASON GARBIS is Senior Vice President of Products at Appgate, a leading provider of Zero Trust secure access solutions. At Appgate, he is responsible for the company's security product strategy and product management. He has over 30 years of product management, engineering, and consulting experience at security and technology firms. He is also co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance, leading research and publication initiatives. He holds a CISSP certification, a BS in computer science from Cornell University, and an MBA from Northeastern University.JERRY W. CHAPMAN is Engineering Fellow, Identity Management at Optiv Security. With over 25 years of industry experience, Jerry has successfully guided numerous clients in the design and implementation of their enterprise IAM strategies, in ways that align with both security and business objectives. His job roles have spanned enterprise architecture, solution engineering, and software architecture and development. As an IAM industry expert, Jerry provides guidance, support, and thought leadership across Optiv cybersecurity practice areas, with a focus on positioning Identity and Data as a core component within enterprise security architectures. He is a key spokesperson for Optiv’s Zero Trust strategy, and frequently speaks at conferences and other industry events. Jerry is active in the technical working group at the Identity Defined Security Alliance (IDSA), where he was the group’s original Technical Architect. Jerry is a certified Forrester Zero Trust Strategist, has a BS in Computer Information Systems from DeVry University and is currently pursuing a degree in Applied Mathematics from Southern New Hampshire University.

Regulärer Preis: 56,99 €
Produktbild für Outlook 365: as your personal Assistant

Outlook 365: as your personal Assistant

Nope, it won't make you a coffee right now. But Outlook can write, sort and tag your mail, find lost items, maybe throw away stuff instantly or re-present it at the time you find it suitable. More than that, Outlook can organize appointments, deliver route planning, present pictures of your contacts and much more.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 1,99 €
Produktbild für GitHub - Eine praktische Einführung

GitHub - Eine praktische Einführung

GitHub - praktisch und anschaulich erklärt. Von den ersten Schritten bis zu eigenen GitHub Actions.GitHub ist derzeit die größte Internetplattform für Open-Source-Entwicklungsprojekte und bietet ein grafisches Webinterface mit vielen Funktionen für die gemeinsame Arbeit sowie interessante Community-Features. Technisch setzt es auf der bekannten Versionsverwaltung Git auf.Aber was ist ein Repository, Branch, Commit, Pull-Request oder Fork? Wie lege ich ein eigenes Projekt an? Was muss ich beim Mergen beachten und wann sind »etwas Git« oder Actions und Apps ein guter nächster Schritt?Einsteiger*innen lernen alle wichtigen Werkzeuge und Begriffe kennen, spielen typische Arbeitsschritte durch und erhalten über die Funktionalität der Plattform hinaus viele Infos und Praxistipps. Mit diesem verständlichen und humorvollen Leitfaden gelingt der unfallfreie Einstieg in die Open-Source-Welt – garantiert.GitHub – die Plattform kennenlernen Die Oberfläche erkunden und einen eigenen Account anlegenDas erste GitHub-Projekt Mit Repositories, Issues und Branches arbeiten, Pull-Requests erstellen und mergenOpen-Source-Lizenzen Unterschiede verstehen und eine passende Lizenz auswählenAuf eigenen und fremden Projekten zusammenarbeiten Projekte für Mitstreiter attraktiver machen, Maintainer einsetzen, Pull-Requests einreichen und Projekte forkenEinstieg in Git Git installieren und wichtige Befehle ausprobierenGit und GitHub im Zusammenspiel Projekte mit GitHub und Git bearbeiten und synchron halten, Repositories forken und Merge-Konflikte lösenMit Actions und Apps effizienter arbeiten Apps und Actions aus dem Marketplace installieren und eine eigene Action programmieren

Regulärer Preis: 24,90 €
Produktbild für Big Breaches

Big Breaches

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity.WHO THIS BOOK IS FORThose interested in understanding what cybersecurity is all about, the failures have taken place in the field to date, and how they could have been avoided. For existing leadership and management in enterprises and government organizations, existing professionals in the field, and for those who are considering entering the field, this book covers everything from how to create a culture of security to the technologies and processes you can employ to achieve security based on lessons that can be learned from past breaches.DR. NEIL DASWANI is Co-Director of the Stanford Advanced Security Certification program, and is President of Daswani Enterprises, his security consulting and training firm. He has served in a variety of research, development, teaching, and executive management roles at Symantec, LifeLock, Twitter, Dasient, Google, Stanford University, NTT DoCoMo USA Labs, Yodlee, and Telcordia Technologies (formerly Bellcore). At Symantec, he was Chief Information Security Officer (CISO) for the Consumer Business Unit, and at LifeLock he was the company-wide CISO. Neil has served as Executive-in-Residence at Trinity Ventures (funders of Auth0, New Relic, Aruba, Starbucks, and Bulletproof). He is an investor in and advisor to several cybersecurity startup companies and venture capital funds, including Benhamou Global Ventures, Firebolt, Gravity Ranch Ventures, Security Leadership Capital, and Swift VC. Neil is also co-author of Foundations of Security: What Every Programmer Needs to Know (Apress).Neil's DNA is deeply rooted in security research and development. He has dozens of technical articles published in top academic and industry conferences (ACM, IEEE, USENIX, RSA, BlackHat, and OWASP), and he has been granted over a dozen US patents. He frequently gives talks at industry and academic conferences, and has been quoted by publications such as The New York Times, USA Today, and CSO Magazine. He earned PhD and MS degrees in computer science at Stanford University, and he holds a BS in computer science with honors with distinction from Columbia University.DR. MOUDY ELBAYADI has more than 20 years of experience and has worked with a number of high-growth companies and across a variety of industries, including mobile and SaaS consumer services, and security and financial services. Having held C-level positions for leading solution providers, Dr. Elbayadi has a unique 360-degree view of consumer and enterprise SaaS businesses. He has a consistent track record of defining technology and product strategies that accelerate growth.As CTO of Shutterfly, Dr. Elbayadi oversees all technology functions including product development, cybersecurity, DevOps, and machine learning/AI R&D functions. In this capacity he is leading the technology platform transformation. Prior to Shutterfly, Dr. Elbayadi held the position of SVP, Product & Technology for Brain Corp, a San Diego-based AI company creating transformative core technology for the robotics industry.As advisor, Dr. Elbayadi has been engaged by CEOs and senior executives of companies ranging from $10M to $2B in revenues. Representative engagements include public cloud strategy, platform integration and M&A strategy. He has advised numerous VC firms on technology and prospective investments.Dr. Elbayadi earned a doctorate in leadership and change from Antioch University, a master’s degree in organizational leadership from Chapman University, and a master’s degree in business administration from the University of Redlands.PART I: THE BIGGEST BREACHESThe goal of this part is to explain, in plain English, the biggest breaches in recent years, focusing on what has resulted in everything from exposure of the majority of American consumers’ financial identities to a foreign power more than significantly “influencing” the election of our most recent President. The breaches will be covered in reverse chronological order of the years in which the breaches were made public (even though some of them occurred prior), and in the summary section, I’ll also comment on the relevance and implications of the actual years in which the breaches took place.CHAPTER 1: THE FIVE KEY ROOT CAUSESThis chapter reviews the five basic root causes that we’ll see in all the mega-breaches that will be reviewed in subsequent chapters.* Phishing* Malware* Third-party compromise (suppliers, customers, and partners, as well as acquisitions)* Software Vulnerabilities (application security as well as third-party vulnerabilities)* Inadvertent employee mistakesCHAPTER 2: THE CAPITAL ONE BREACH IN 2019On July 29, 2019, court documents were released regarding a security breach at Capital One that exposed data for over 105 million people. A lone hacker gained access to highly sensitive data including names, social security numbers, addresses, and dates of birth. This hack is just one example in which over a hundred million customer records have been exposed to the entire Internet.* The Modern Day Datacenter: The Cloud and Hybrid Clouds* Erratic: Former Amazon Web Services employee* The Firewall Hack* The Ex-Filtration* The Simple Mistakes* The Charges & The FalloutCHAPTER 3: CAMBRIDGE ANALYTICA & FACEBOOKThe goal of this chapter is to cover two issues that both involved Facebook. The first issue is how Cambridge Analytica, a data analytics firm that assisted President Trump's presidential campaign, abused Facebook to harvest data on 70 million U.S. consumers to create psychographic profiles of them and target ads to influence voting. The second issue is how a vulnerability in Facebook’s “View As” feature (that allows users to see how their profiles look to the public) was exploited to allow for the take over of approximately 50 million Facebook accounts. The sections in this chapter will also set the groundwork for the Facebook hacking of the 2016 election by the Russians.* How Facebook Works* How Facebook Makes Money Through Ads* Political Ads* Security Challenges with Ads: Abusive Targeting, Bad Ads, Malvertising, and Click Fraud* Facebook’s Third-Party Apps and APIs* Cambridge Analytica Harvesting* Bungled Remediation of Harvested Data* The “View As…” Vulnerability * Remediation of the “View As…” VulnerabilityCHAPTER 4: THE MARRIOTT HACK IN 2018The Marriott hack disclosed in 2018 has been the second largest breach of all time as it involved 383 million records, and is only second to Yahoo’s hack of 3 billion email accounts which we’ll describe in see Chapter 8. Passport numbers, and the location history of hundreds of millions of people was amongst the data stolen in the breach. Combined with stolen data from the US Government’s Office of Personnel Management breach (described in Chapter 7), one can even derive the location histories or potentially even impersonate some CIA agents and spies.* Marriott and Starwood* DBA Account Takeover* Malware: Remote Access Trojan and Mimikatz* Starwood Guest Reservation Database ExfiltrationCHAPTER 5: THE EQUIFAX HACK IN 2017The credit histories of 145M+ American consumers were stolen in 2017 in the largest breach of financial identity in history.* Vulnerability Management Problems* Apache Struts and CVE-2017-5638* The Overall State of Information Security at Equifax* The Hack* The Blundered Response* The ImpactCHAPTER 6: THE FACEBOOK HACK IN THE 2016 PRESIDENTIAL ELECTIONThis chapter describes the organized Russian disinformation campaign in which Facebook was weaponized to distribute over 5 million paid ads that focused on dividing the American public and influencing votes in the 2016 Presidential election.Dezinformatsiya: Inherently Russian * Lack of Regulatory Oversight for Social Media (as compared to TV advertising)* Russian Facebook Ads* The Internet Research Agency: Kremlin-backed Online Troll Farm (amongst 228 groups)Weaponization of Ad Targeting: Swing States (Pennsylvania, Virginia, and Wisconsin) * Suspicious Advertisers: Over 9,500* Fancy Bear: Indictments of 13 Russian IndividualsCHAPTER 7: THE DEMOCRATIC NATIONAL COMMITTEE HACK IN 2016Just as significant as the disinformation advertising campaign was the infiltration and subsequent leaks of over 150,000 emails from the Democratic National Committee.* Trump’s Request* Massive Phishing Campaign* How John Podesta Got Phished: 60,000 Emails Stolen* Additional Phishing Emails: 150,000 Emails Stolen* Guccifer 2.0* WikiLeaks* Key Emails and Information Leaked* ImpactCHAPTER 8: THE OFFICE OF PERSONNEL MANAGEMENT HACK IN 2015The SF-86 background check files of over 20 million government employees (including CIA, NSA, FBI, and other agents) which also included information about their friends, family, and neighbors, as well as over 5 million fingerprints were stolen and exfiltrated by a foreing nation state.* What was stolen* Impact* Root causes* How it could have been preventedCHAPTER 9: THE YAHOO HACK IN 2013 AND 2014 (MADE PUBLIC IN 2016)The largest breach in the history of the Internet and the world occured in 2013 and 2014 when attackers compromised Yahoo’s email and other systems.* Spear phishing * Malware to grow footprint* Cookie minting* Yahoo Account Management Tool Compromise* Targeting of Politicians and Diplomats* Financial Impact and Verizon Acquisition* Former KGB Agents and IndictmentsCHAPTER 10: HOLISTIC IMPLICATIONS* Political Impact* Financial Impact* Regulatory Impact* Technology ImpactPART II: HOW TO RECOVERFor each of the root causes of breaches, we’ll suggest countermeasures for each going forward. Phishing attacks can be successfully combated with better preventative countermeasures. Malware can unfortunately only be detected better, as no one can altogether stop adversaries from authoring malicious software. Existing software vulnerabilities also cannot be prevented, but their detection, containment, and recovery can be managed much more reliably or automated. Vulnerabilities in new applications, as well as other types of software, can be prevented through the introduction of building codes for software, as well as tools to support the development of software that meets those building codes. Finally, vulnerabilities in third-party suppliers can be recursively managed using the approaches that we’ve outlined here.In this second part of the book, technologies that are critical to the roadmap to recovery are explained in plain English. In addition, the contributions that people in various roles need to make and the processes that need to be put in place by those people will also be covered.CHAPTER 11: BETTER PREVENTATIVE COUNTERMEASURESPassword Managers, Multi-factor Authentication, and Yubico-like Hardware Tokens * Authentication Providers (Current as well as potential future e.g. FIDO Alliance)* Automated Patching: Endpoints, Servers, and IoT. Browsers (e.g., Chrome) are a great example of how this can be done right. Mac OS X updates are also a great example, even if a bit inconvenient sometimes. Servers and IoT need help. Mirai botnet from 2016 exhibits the urgency. IoT Guidelines.* Building Codes for SoftwareCHAPTER 12: DETECTION: IDENTITY MONITORING* Difference between credit monitoring and identity monitoring* Dark Web Monitoring* New Account Creation Vs. Account TakeoverCHAPTER 13: DETECTION: BAD ADS, FAKE NEWS, AND ANTI-MALVERTISINGThe goal of this chapter is to focus on detection of bad ads, fake news, and malware that attempt to enter and distribute itself through the online advertising ecosystem.* Bad Ads* Fake News* Malicious software: cannot be prevented, only detection. Not to mention Turing undecidability.CHAPTER 14: CONTAINMENT AND RECOVERY: HOW TO MAKE THE STOLEN DATA USELESSFor any and all information that has been stolen to date, we should attempt to make the stolen data useless. While that can’t be done for all data, and time will be required for some data (perhaps even a generation or two) to become fully obsolete, as in the case of stolen background information, it is will worth the effort to render certain data to be ineffective. For instance, SSNs are currently treated as secrets and are used for authentication of users. However, since most of the SSNs in the country have been stolen, they should not be treated as secrets, and alternative methods for actual authentication should be used. SSNs can still be used as identifiers, but knowledge of someone’s SSN should not allow you to transact as then. A similar argument can be made for the typical questions asked in KBA (knowledge based answer) quizzes. On the other hard, in addition to something a user knows, something that a user has (the user’s cell phone), or something that the user “is” (such as a biometric fingerprint authentication) should be used to authenticate a user. Apple Touch ID, for instance, is a step in the right direction.CHAPTER 15: CYBERSECURITY INVESTMENTS: MADE TO-DATEOver $45 billion has been invested in cybersecurity companies to date, yet the mega-breaches continue. This chapter covers where all this money has been going, and what defenses have been invested in thus far. The chapter also addresses which of the root causes have received what amounts of investment thus far, and whether or not we’ve seen any reductions in those breaches and why or why not.CHAPTER 16: CYBERSECURITY INVESTMENTS: WHAT’S NEED GOING FORWARDThis chapter analyzes what areas of cybersecurity are ripe for further investment. Areas such as cloud security, and artificial intelligence applications to security have received less private equity and public IPO investment as compared to, say, network security and probably warrant more investment going forward.CHAPTER 17: ADVICE TO LEADERSHIPToday, the most security-savvy organizations have their CSO report directly to the CEO, and have regular reporting on security topics to the board of directors. Some CSOs, for instance, report out the state of the information security program to the audit committee once per quarter, and to the full board of directors once per year. This section provides advice to such leaders on how to explain security either to a board of directors or any level of management in between such that the return on investment for security initiatives can be measured, and explained in English in an understandable fashion, often using analogies where necessary.CHAPTER 18: APPLYING YOUR SKILLS TO THE FIELD OF CYBERSECURITYThis section discusses how professionals in various roles (people managers, project managers, product managers, software developers, IT administrators) can get into the field, as well as apply their skills to make contributions to cybersecurity. There are many opportunities for them to strategically apply their skills but also provide critical tactical support when required.This section provides people managers, project managers, software developers, IT administrators, in addition to product managers advice on how they can best leverage their skill sets to achieve security.CONCLUSION / SUMMARY

Regulärer Preis: 34,99 €
Produktbild für Extending Gatsby

Extending Gatsby

Expand your Gatsby development skills by building a production-ready blog website. This book teaches you how to use Gatsby alongside the latest technologies including MDX, CDN, and Netlify.In this project, you will create a very complex and large blog site with just MDX files and learn to optimize images using CDN for faster website loading. You will also learn to continuously deploy to Netlify enabling you to provide daily site updates easily. To get the most out of this book you should be comfortable with the basics of React and familiar with Gatsby fundamentals as covered in Foundation Gatsby Projects, which provides several stepping stone projects.Rather than cover how to create a simple blog site, Extending Gatsby goes beyond the basics to extend your blogging skills.WHAT YOU'LL LEARN* Develop a production-ready, complex, blogging system site with MDX* Learn to make a complete mobile site* Continuously deploy your site using Netlify* Add functionalities with the powerful Gatsby plugin ecosystemWHO THIS BOOK IS FORThis book is for developers who are familiar with Gatsby and are looking to create an extended blog site. Knowledge of React is expected. You will also need to be familiar with JavaScript concepts and be confident with basic web development.Nabendu Biswas is a full stack JavaScript developer who has been working in the IT industry for the past 15 years and has worked for some of the world’s top development firms and investment banks. He is a passionate tech blogger who publishes on dev.to and medium.com and on thewebdev.tech. He is an all-round nerd, passionate about everything JavaScript, React and Gatsby. You can find him on Twitter @nabendu82.Chapter 1: Setting Up the Blog SiteChapter 2: Adding Gatsby-plugin-mdx to the SiteChapter 3: Adding Author Details to the SiteChapter 4: Adding Functionality to the SiteChapter 5: Adding a Series FeatureChapter 6: Deploying the Site in NetlifyChapter 7: Adding Gatsby Plugins to the SiteChapter 8: New Features and Fixes

Regulärer Preis: 39,99 €
Produktbild für Windows Containers for IT Pros

Windows Containers for IT Pros

This book has everything you need to know about Windows Containers, from an IT pro and ops perspective.Containers are the next big thing in IT infrastructure. More and more, we see companies relying on Kubernetes implementations to run their workloads on-premises, in the cloud, or even in hybrid deployments. IT pros and ops teams are now faced with the challenge of getting up to speed on container architecture, knowing how it differs from virtual machines (VMs), and the best means and practices for managing their applications in containers.WINDOWS CONTAINERS FOR IT PROS explores all of that, from the IT pro experience. You will approach learning about containers through the optics of an author who is accustomed to deploying virtual machines (VMs). You will learn about differences, parallel practices, use cases, and how to get started and go deep into day 2 operations.WHAT YOU WILL LEARN* Architect and deploy Windows Containers leveraging existing skills* Containerize existing applications* Know best practices for managing resources in Windows Containers* Get comfortable moving containers to the cloud with Azure* Understand the options for using containers on AzureWHO THIS BOOK IS FORWindows IT pros and technical professionals deploying Windows Server and server applications today, such as .NET, ASP.NET, IIS, and more. This book assumes little to no experience with scripting as readers deploy their workloads via one of the Windows UIs (Hyper-V, Server Manager, Windows Admin Center, etc.). Knowledge of VMs and infrastructure, such as clustered operating systems, is recommended but not required.VINICIUS RAMOS APOLINARIO is Senior Program Manager on the Windows Container Platform team at Microsoft that builds the container platform that runs on Windows Server and Azure. He has been a Microsoft professional for most of his career and holds multiple certifications from Microsoft, VMware, Exin, and others. Vinicius is passionate about passing on his knowledge and contributes to the community via blogs, events, and articles. He is a published author who is regularly seen out in the community or at trade events presenting on various topics.Chapter 1: Introduction to ContainersChapter 2: Getting Started with Windows Containers and DockerChapter 3: Containerizing Existing ApplicationsChapter 4: Managing Resources in Windows ContainersChapter 5: Container Management with Windows Admin CenterChapter 6: Moving Your Containers to the Cloud with Microsoft Azure

Regulärer Preis: 62,99 €
Produktbild für How to avoid mistakes

How to avoid mistakes

Nobody intends to make mistakes. Still, they happen. Sometimes users may not be aware of requirements or make typos. What begins as a small error, later leads to unnecessary work that costs time, money, and nerves. Here, you’ll learn how to guide users in a way that makes errors less likely or even impossible. Or to inform them on input what’s required. In other cases, you may want to prepare data for decision making in a way that one does not need actual typing anymore. And of course, there are the new cloud functionalities of Excel 365 opening new dimensions of co-operations. All of this is explained here.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 1,99 €
Produktbild für Hands-on GitHub Actions

Hands-on GitHub Actions

Implement continuous integration/continuous delivery (CI/CD) workflows for any application you develop through GitHub Actions. This book will give you an in-depth idea of implementation patterns, solutions for different technology builds, guidelines to implement your own custom components as actions, and usage of features available with GitHub Actions workflows, to set up CI/CD for your repositories.Hands-on GitHub Actions starts with an introduction to GitHub actions that gives an overview on CI/CD followed by an introduction to its workflows. Next, you will learn how to use variables in a GitHub workflow along with tokens via a REST API. Further, you will explore artifacts and caching dependencies in GitHub and use artifacts in subsequent jobs. Using self-hosted runners is discussed next where you will set up your own hardware and software to run GitHub actions. You will go through publishing packages and migrate to Azure DevOps Pipelines. Along the way, you will use Redis service and PostgreSQL service containers and create custom actions. Finally, you will work with GitHub apps and understand the syntax reference for GitHub Actions and workflows.WHAT YOU WILL LEARN* Create workflows for any platform and any language with GitHub Actions* Develop custom GitHub actions to enhance features and usage of database and service containersUse hosted runners and create self-hosted runners for GitHub workflows * Use GitHub Package registry with GitHub Actions to share and use packagesWHO THIS BOOK IS FORDevOps teams who want to build quality CI/CD workflows.CHAMINDA CHANDRASEKARA is a Microsoft Most Valuable Professional (MVP) for Visual Studio ALM and Scrum Alliance Certified ScrumMaster®, and focuses on and believes in continuous improvement of the software development life cycle. He is the Cloud Development and DevOps Architect at eKriegers (Pvt) Ltd. Chaminda is an active Microsoft Community Contributor (MCC) who is well recognized for his contributions in Microsoft forums, TechNet galleries, wikis, and Stack Overflow and he contributes extensions to Azure DevOps Server and Services (former VSTS/TFS) in the Microsoft Visual Studio Marketplace. He also contributes to other open source projects in GitHub. Chaminda has published six books with Apress.PUSHPA HERATH is a Microsoft Most Valuable Professional (MVP) working as a Senior DevOps Engineer at 99x. She has many years of experience in Azure DevOps Server and Services (formerly VSTS/TFS), Azure cloud platform and QA Automation. She is an expert in DevOps currently leading Sri Lanka DevOps community, and she has shown in depth knowledge in Azure cloud platform tools in her community activities. She has published four books with Apress and spoken in community evets as well as in the youtube channel of her Sri Lanka DevOps community. Pushpa blogs on technology at DevOps Adventure.CHAPTER 1: INTRODUCTION TO GITHUB ACTIONSCHAPTER GOAL: Give conceptual overview on CI CD while elaborating on the need of software delivery automation and basic concepts of GitHub Actions.NO OF PAGES: 15SUB -TOPICS1. Introducing Concepts (CI/CD)2. Why we need SW Delivery Automation?3. What are GitHub Actions?4. Identifying core concepts in GitHub Actions5. GitHub hosted runners.CHAPTER 2: GETTING STARTED WITH GITHUB ACTIONS WORKFLOWSCHAPTER GOAL: Introduction to GitHub Actions workflows.NO OF PAGES: 25SUB - TOPICS1. Using preconfigured workflow templates2. Using Marketplace Actions to create workflows3. Building a .NET Core Web App with GitHub Actions4. Understanding the structure of a Workflow (jobs, actions, set job dependencies etc.)5. Setting up continuous integration using GitHub actionsCHAPTER 3: VARIABLES AND SECRETS WITH GITHUB ACTIONSCHAPTER GOAL: Lessons to provide hands-on guidance using variables and secrets in a GitHib workflow.NO OF PAGES : 15SUB - TOPICS:1. Defining and using variables2. Understanding the default variables usage3. Naming conventions for variables4. Defining and using secretsCHAPTER 4: USING TOKENSCHAPTER GOAL: Understanding the use of system token and the personal access tokens to work with GitHub repos and issues via the REST API in GitHub Actions workflow.NO OF PAGES: 15SUB - TOPICS:1. Using GITHUB_TOKEN2. Creating a Personal Access Token3. Using Personal Access Token in workflowCHAPTER 5: ARTIFACTS AND CACHING DEPENDENCIESNO OF PAGES: 20SUB - TOPICS:1. Storing content in Artifacts2. Using artifacts in subsequent jobs3. Uploading to external artifact store and using them in other workflows4. Deleting artifacts5. Caching workflow dependencies (compare caching and artifacts, using cache action and matching cache keys)6. Limitations and eviction policy in cachingCHAPTER 6: USING SELF-HOSTED RUNNERSCHAPTER GOAL: Setting up your own hardware and software to run GitHub actions..NO OF PAGES: 30SUB - TOPICS:1. Understanding self-hosted runners2. Configuring and adding/removing self-hosted runners GitHub.3. Self-hosted runners with proxy4. Using labels to organize self-hosted runners5. Using self-hosted runners in workflows6. Monitoring and access control for self-hosted runnersCHAPTER 7: PUBLISHING PACKAGES AND MIGRATING FROM AZURE DEVOPS PIPELINESCHAPTER GOAL: How to create and publish packages in GitHub actions and migrating pipelines from Azure DevOps pipelines.NO OF PAGES: 20SUB - TOPICS:1. Creating and publishing build artifacts as nuget2. Using custom packages in workflows3. Using GitHub Packages4. Migrating Azure PipelinesCHAPTER 8: USING DATABASE AND SERVICE CONTAINERSCHAPTER GOAL: Hands on lessons on using Redis service containers and PostgreSQL service containers.NO OF PAGES: 20SUB - TOPICS:1. Running Redis jobs on containers2. Running Redis jobs on runner machine3. Using Redis service container4. Running PostgreSQL jobs on containers5. Running PostgreSQL jobs on runner machine6. Using PostgreSQL service containerCHAPTER 9: CREATING CUSTOM ACTIONSCHAPTER GOAL: Step by step guidance to create your own GitHub actions.NO OF PAGES: 20SUB - TOPICS:1. Understanding action types2. Steps to create a simple action3. Creating Docker container action4. Publishing actions to marketplaceCHAPTER 10: GITHUB APPSCHAPTER GOAL: Using and creating GitHub Apps in workflows.NO OF PAGES: 30SUB - TOPICS:1. Understanding GitHub Actions and Apps2. Creating GitHub Apps3. Using GitHub AppsCHAPTER 11: SYNTAX REFERENCE FOR GITHUB ACTIONS AND WORKFLOWSCHAPTER GOAL: Syntax guide for GitHub Actions and Workflows.NO OF PAGES: 15SUB - TOPICS:1. Understanding Workflow Syntax2. Triggers for Workflows3. Using context and expressions4. Workflow commands

Regulärer Preis: 46,99 €
Produktbild für .NET Developer's Guide to Augmented Reality in iOS

.NET Developer's Guide to Augmented Reality in iOS

Attention .NET developers, here is your starting point for learning how to create and publish augmented reality (AR) apps for iOS devices.This book introduces and explores iOS augmented reality mobile app development specifically for .NET developers. The continued adoption and popularity of Xamarin, a tool that allows cross-platform mobile application development, opens up many app publishing opportunities to .NET developers that were never before possible, including AR development.You will use Xamarin to target Apple’s augmented reality framework, ARKit, to develop augmented reality apps in the language you prefer—C#. Begin your journey with a foundational introduction to augmented reality, ARKit, Xamarin, and .NET. You will learn how this remarkable collaboration of technologies can produce fantastic experiences, many of them never before tried by .NET developers. From there you will dive into the fundamentals and then explore various topics and AR features. Throughout your learning, proof of concepts will be demonstrated to reinforce learning.After reading this book you will have the fundamentals you need, as well as an understanding of the overarching concepts that combine them. You will come away with an understanding of the wide range of augmented reality features available for developers, including the newest features included in the latest versions of ARKit.WHAT YOU WILL LEARN* Create rich commercial and personal augmented reality mobile apps* Explore the latest capabilities of ARKit* Extend and customize chapter examples for building your own amazing apps* Graduate from traditional 2D UI app interfaces to immersive 3D AR interfacesWHO THIS BOOK IS FORDevelopers who want to learn how to use .NET and C# to create augmented reality apps for iOS devices. It is recommended that developers have some Xamarin experience and are aware of the cross-platform options available to .NET. A paid Apple developer account is not needed to experiment with the AR code samples on your devices.LEE ENGLESTONE is an innovative, hands-on software development manager and technical lead, based in Stockport, England. He has been a .NET developer for many years, writing code for Windows, web, mobile, cloud, and augmented reality applications in his spare time. He believes that there are many new exciting opportunities for developers in the area of augmented reality and is excited to share them with his fellow .NET developers. In recognition of his community contributions, he has been awarded a Microsoft MVP in Developer Technologies.CHAPTER 1 - SETTING UP YOUR ENVIRONMENTCHAPTER 2 - BASIC CONCEPTSCHAPTER 3 - NODES, GEOMETRIES, MATERIALS, AND ANCHORSCHAPTER 4 - BUILT IN AR GUIDESCHAPTER 5 - ANIMATIONSCHAPTER 6 - CONSTRAINTSCHAPTER 7 - LIGHTINGCHAPTER 8 - VIDEO AND SOUNDCHAPTER 9 - PLANE DETECTIONCHAPTER 10 - IMAGE DETECTIONCHAPTER 11 - FACE TRACKING AND EXPRESSION DETECTIONCHAPTER 12 - TOUCH GESTURES AND INTERACTIONCHAPTER 13 - 3D MODELSCHAPTER 14 - PHYSICSCHAPTER 15 - OBJECT DETECTIONCHAPTER 16 - BODY TRACKINGCHAPTER 17 - PUBLISHING TO THE APP STORE

Regulärer Preis: 62,99 €
Produktbild für Getting Inside Java - Beginners Guide

Getting Inside Java - Beginners Guide

ABOUT THE BOOK:This textbook was written with two primary objectives. The first is to introduce the Java programming language. Java is a practical and still-current software tool; it remains one of the most popular programming languages in existence, particularly in areas such as embedded systems. Java facilitates writing code that is very efficient and powerful and, given the ubiquity of Java compilers, can be easily ported to many different platforms. Also, there is an enormous code-base of Java programs developed, and many systems that will need to be maintained and extended for many years to come. The second key objective is to introduce the basic concepts of OOPs.Hope, It will be helpful. All the Best!-Prem KumarABOUT THE AUTHOR:Destiny drew Prem Kumar towards computers when the IT industry was just making a big evolution in India. Having completed his education from Silli Polytechnic in Computer Science Engineering. He moved on with his higher studies from Gandhi Institute for Technology, Bhubaneshwar.Prem has a passion for exploring IT knowledge and is founder of well-growing, a startup company "F5 Developers". He is a much sought after speaker on various technology subjects and is a regular columnist for Open Source and OSE Hub. His current affiliations include being a Founder of F5 Developers, a multi-service provider company including the subsidiary companies of F5, i.e, THOR, F5 Initiative and OSE Hub. In recognition to his contribution Microsoft awarded him the prestigious “Microsoft Technology Associate” award in 2019 for Java Programming. He can be reached at premkmr1611@gmail.com.

Regulärer Preis: 7,83 €
Produktbild für AWS for Solutions Architects

AWS for Solutions Architects

One of the most popular cloud platforms in the world, Amazon Web Services (AWS) offers hundreds of services with thousands of features to help you build scalable cloud solutions; however, it can be overwhelming to navigate the vast number of services and decide which ones best suit your requirements. Whether you are an application architect, enterprise architect, developer, or operations engineer, this book will take you through AWS architectural patterns and guide you in selecting the most appropriate services for your projects. AWS for Solutions Architects is a comprehensive guide that covers the essential concepts that you need to know for designing well-architected AWS solutions that solve the challenges organizations face daily. You'll get to grips with AWS architectural principles and patterns by implementing best practices and recommended techniques for real-world use cases. The book will show you how to enhance operational efficiency, security, reliability, performance, and cost-effectiveness using real-world examples. By the end of this AWS book, you'll have gained a clear understanding of how to design AWS architectures using the most appropriate services to meet your organization's technological and business requirements.

Regulärer Preis: 29,99 €
Produktbild für Versionsverwaltung mit Git

Versionsverwaltung mit Git

* Von grundlegenden Funktionen über die Handhabung von Branches und Remote-Repositorys bis zu Tipps und Tricks für (nicht nur) alltägliche Funktionen * Auswahl sinnvoller Workflows und Einsatz in Teams * Git-Repositorys hosten mit GitHub und GitLab Git ist in der Softwareentwicklung bereits weit verbreitet – sowohl in Firmen als auch in Open-Source-Projekten. Zum Einstieg lernen Anfänger häufig nur die wichtigsten Befehle, die schnell nicht mehr ausreichen, vor allem wenn die ersten Fehler auftreten. Dieses Buch behandelt einerseits die gängigen Befehle, die Sie beim täglichen Arbeiten mit Git brauchen. Andererseits geht es dem Autor auch darum, dass Sie Git als Ganzes verstehen, um es effektiv im Entwicklungsprozess einsetzen zu können. Der Fokus des Buchs liegt auf dem praktischen Arbeiten mit Git. Sie lernen anhand eines Projekts, welche Befehle es gibt, wie diese arbeiten und wie Sie auftretende Probleme lösen können. Neben alltäglichen Funktionen finden Sie auch seltener gebrauchte Kommandos, die aber ebenfalls wichtig sind. Dabei legt der Autor großen Wert auf die Einbindung und Anpassung des Entwicklungsprozesses. Im zweiten Teil des Buchs werden fortgeschrittene Themen behandelt. Der Schwerpunkt liegt auf dem Einsatz von Git in Teams. Darunter etwa das Hosten verteilter Repositorys mit GitHub und GitLab. Ein weiteres Kapitel behandelt die Workflows, die je nach Anzahl der beteiligten Personen, Branches und Repositorys eines Projekts variieren. Darüber hinaus gibt Ihnen der Autor hilfreiche Informationen für den Umstieg von Subversion, einen Überblick über grafische Git-Programme, Hinweise für eine langfristig nachvollziehbare Git-Historie sowie eine Einführung in DevOps, wofür Git die technische Grundlage bildet. Ein Kapitel zu häufig gestellten Fragen rundet diesen Praxiseinstieg ab. Das Buch richtet sich sowohl an blutige Einsteiger als auch an erfahrene Leser. Aus dem Inhalt: * Konfiguration * Arbeiten mit Branches * Verteilte Repositorys * Hosting mit GitHub und GitLab * Workflows * Hooks * Umstieg von Subversion * Zahlreiche Tipps für die tägliche Arbeit * Grafische Clients * Tipps für nachvollziehbare Git-Historien * Frequently Asked Questions * Einstieg in DevOps * Befehlsreferenz

Regulärer Preis: 29,99 €
Produktbild für Building Custom Tasks for SQL Server Integration Services

Building Custom Tasks for SQL Server Integration Services

Build custom SQL Server Integration Services (SSIS) tasks using Visual Studio Community Edition and C#. Bring all the power of Microsoft .NET to bear on your data integration and ETL processes, and for no added cost over what you’ve already spent on licensing SQL Server. New in this edition is a demonstration deploying a custom SSIS task to the Azure Data Factory (ADF) Azure-SSIS Integration Runtime (IR).All examples in this new edition are implemented in C#. Custom task developers are shown how to implement custom tasks using the widely accepted and default language for .NET development.Why are custom components necessary? Because even though the SSIS catalog of built-in tasks and components is a marvel of engineering, gaps remain in the available functionality. One such gap is a constraint of the built-in SSIS Execute Package Task, which does not allow SSIS developers to select SSIS packages from other projects in the SSIS Catalog. Examples in this book show how to create a custom Execute Catalog Package task that allows SSIS developers to execute tasks from other projects in the SSIS Catalog. Building on the examples and patterns in this book, SSIS developers may create any task to which they aspire, custom tailored to their specific data integration and ETL needs.WHAT YOU WILL LEARN* Configure and execute Visual Studio in the way that best supports SSIS task development* Create a class library as the basis for an SSIS task, and reference the needed SSIS assemblies* Properly sign assemblies that you create in order to invoke them from your task* Implement source code control via Azure DevOps, or your own favorite tool set* Troubleshoot and execute custom tasks as part of your own projects* Create deployment projects (MSIs) for distributing code-complete tasks* Deploy custom tasks to Azure Data Factory Azure-SSIS IRs in the cloud* Create advanced editors for custom task parametersWHO THIS BOOK IS FORFor database administrators and developers who are involved in ETL projects built around SQL Server Integration Services (SSIS). Readers do not need a background in software development with C#. Most important is a desire to optimize ETL efforts by creating custom-tailored tasks for execution in SSIS packages, on-premises or in ADF Azure-SSIS IRs.ANDY LEONARD is Chief Data Engineer at Enterprise Data & Analytics, an SSIS trainer, consultant, developer of the Data Integration Lifecycle Management (DILM) Suite, a Business Intelligence Markup Language (Biml) developer, and BimlHero. He is a SQL Server database and data warehouse developer, community mentor, engineer, and occasional farmer. He is co-author of Apress books SQL Server Integration Services Design Patterns and The Biml Book, and author of the Apress book Data Integration Life Cycle Management with SSIS and the Stairway to Integration Services series at SQLServerCentral.com.1. The Story of This Book2. Preparing the Environment3. Creating the Assembly Project4. Check-In the Project Code5. Signing the Assembly6. Preparing to Build7. Coding the Task8. Coding a Simple Task Editor9. Signing and Binding10. Expanding Editor Functionality11. Minimal Coding for the Complex Editor12. Editor Integration13. Implement Views and Properties14. Implement New Connection15. Implement Use32bit, Synchronized, and LoggingLevel SettingsView Properties16. Refactoring SourceConnection17. Refactoring the SSIS Package Hierarchy18. Instrumentation and Validation19. Crushing Bugs20. Adding Synchronous Execution Properties21. Testing the Task22. Building the Setup Project23. Using the Execute Catalog Package Task in an SSIS Framework24. Deploying to Azure-SSIS25. Test the Task in Azure Data Factory26. Notes from my Experience

Regulärer Preis: 46,99 €
Produktbild für Der Computer erscheint im Holozän

Der Computer erscheint im Holozän

Die sieben Weltwunder wurden bereits in der Antike beschrieben, etwa zur selben Zeit wie die mechanische Rechenhilfe Abacus, ein Zählrahmen mit Holz- oder Glasperlen. Dieses Buch beschreibt und diskutiert die sieben Weltwunder der IT, ohne die unsere digitale Wirtschaft und Gesellschaft kaum überlebensfähig scheint: Computermaus, Datenbanken, Kryptografie, Graphgrammatiken, Internet, Blockchain und Soft Computing.Jedes Weltwunder der IT wird kurz charakterisiert, bevor Anwendungsoptionen für Wirtschaft und Gesellschaft exemplarisch aufgezeigt und gewürdigt werden.Das Werk richtet sich an alle, die sich mit der digitalen Transformation auseinandersetzen. Es soll helfen, digitale Entwicklungen im eigenen Unternehmen, in der Verwaltung oder im öffentlichen wie im privaten Leben zu positionieren und zu reflektieren.ANDREAS MEIER hat Musik an der Musikakademie in Wien und Mathematik an der ETH in Zürich studiert, wo er doktorierte und habilitierte. Er arbeitete in internationalen Forschungsinstitutionen und Organisationen und war an der Universität Fribourg, Schweiz für eBusiness und eCommerce verantwortlich. Er gründete und leitete das Forschungszentrum Fuzzy Management Methods (FMsquare.org).FABRICE TSCHUDI hat Kommunikationswissenschaften an der Universität Fribourg und Wirtschaftsinformatik an der Universität Bern studiert. Er setzt sich für eine Vision von digitalen Systemen ein, die zu einer lebensdienlichen Wirtschaft und Gesellschaft im Sinne von nachhaltigem Wohlergehen beitragen. Er begleitet Organisationen auf dem Weg zu „wertvoller Digitalisierung“ und ist überzeugt, dass partizipative Lern- und Arbeitsformate hierfür ein zentraler Erfolgsfaktor sind.De septem mundi miraculis - Vom Abacus zur digitalen Rechenmaschine - Die 7 Weltwunder der IT - Wo führt die Reise hin? - Literatur

Regulärer Preis: 49,99 €
Produktbild für Microsoft Conversational AI Platform for Developers

Microsoft Conversational AI Platform for Developers

Build a chatbot using the Microsoft Conversational AI platform. This book will teach you, step by step, how to save time and money by including chatbots in your enterprise's strategy. You will learn how to be proficient at every phase of development, from collaboration on a chatbot in an end-to-end scenario, to the first mock-up phase, and on through to the deployment and evaluation phases.Microsoft built a cloud service ecosystem for running artificial intelligence workloads in public cloud scenarios and a robust AI platform that offers a broad range of services targeting conversational artificial intelligence solutions such as chatbots.Building a chatbot requires not just developer coding skills but special considerations, including input from business stakeholders such as domain matter experts and power users. You will learn by example how to use a great set of tools and services to bridge the gap between business and engineering.You will learn how to successfully morph business requirements into actionable IT and engineering requirements. You will learn about Bot Framework Composer, which allows power users to initiate the building of a chatbot that can then be handed over to the development team to add capabilities through code. Coverage is given to the process of sharing implementation tasks and workloads between power users, who are using a low-code or no-code approach, and developers, who are building out the enhanced features for the chatbot.WHAT YOU WILL LEARN* Understand Microsoft’s comprehensive AI ecosystem and its services and solutions* Recognize which solutions and services should be applied in each business scenario* Discover no-code/low-code approaches for building chatbots* Develop chatbots using the conversational AI stack* Align business and development for improved chatbot outcomes and reduced time-to-marketWHO THIS BOOK IS FORDevelopers and power users who want to build chatbots. An understanding of the core principles of writing code (.NET or JavaScript) for modern web applications is expected.STEPHAN BISSER is a technical lead at Solvion and a Microsoft MVP for artificial intelligence based in Austria. In his current role, he focuses on conversational AI, Microsoft 365, and Azure. He is passionate about the conversational AI platform and the entire Microsoft Bot Framework and Azure Cognitive Services ecosystem. Stephan and several other MVPs founded the Bot Builder Community, which is a community initiative helping Bot Framework developers with code samples and extensions. Together with Thomy Gölles, Rick Van Rousselt, and Albert-Jan Schot, Stephan is hosting SelectedTech, where they publish webinars and videos on social media around SharePoint, Office365 and the Microsoft AI ecosystem. In addition, he blogs regularly and is a contributing author to Microsoft AI MVP Book.Chapter 1: Introduction to the Microsoft Conversational AI PlatformChapter 2: Introduction to the Microsoft Bot FrameworkChapter 3: Introduction to Azure Cognitive ServicesChapter 4: Design Principles of a ChatbotChapter 5: Building a ChatbotChapter 6: Testing a ChatbotChapter 7: Publishing a ChatbotChapter 8: Connecting a Chatbot with Channels

Regulärer Preis: 62,99 €
Produktbild für Trends im Cloud Computing. Wie sich mit Competitive Intelligence Prognosen zur Zukunft der Cloud stellen lassen

Trends im Cloud Computing. Wie sich mit Competitive Intelligence Prognosen zur Zukunft der Cloud stellen lassen

Der Aufstieg von Cloud Computing hat zu einem fundamentalen Wandel innerhalb der Informations- und Kommunikationsbranche geführt und stellt ein neues Paradigma für die Verwaltung und Bereitstellung von Services über das Internet dar. Aufgrund seines hohen Potenzials ist der Cloud-Computing-Markt von einem enormen Wettbewerb geprägt. Um in einem solchen Markt wettbewerbsfähig zu bleiben, ist es wichtig, die Wettbewerber und die eigene Organisation zu analysieren. Man nennt diesen Prozess der Wissensgenerierung auch Competitive Intelligence.Welche Ziele verfolgt Competitive Intelligence und wie läuft der Prozess ab? Welche Servicemodelle gibt es im Bereich des Cloud Computing? Wie entwickeln sich der Markt und die Kundenanforderungen?Matteo Sihorsch untersucht die Trends des Cloud-Computing-Marktes und die Vorlieben der Cloud-Nutzer. Mit Hilfe von Competitive Intelligence leitet er daraus Handlungsempfehlungen für IT-Anbieter hinsichtlich weiterer Produktentwicklungen ab.Aus dem Inhalt:- Cloud Services;- Digitalisierung;- Software-as-a-Service;- Private Cloud;- Public Cloud;- Hybrid Cloud

Regulärer Preis: 29,99 €
Produktbild für CWNA Certified Wireless Network Administrator Study Guide

CWNA Certified Wireless Network Administrator Study Guide

THE #1 SELLING WI-FI NETWORKING REFERENCE GUIDE IN THE WORLDThe CWNA: Certified Wireless Network Administrator Study Guide is the ultimate preparation resource for the CWNA exam. Fully updated to align with the latest version of the exam, this book features expert coverage of all exam objectives to help you pass the exam. But passing the exam is just a first step. For over 16 years, the CWNA Study Guide has helped individuals jump-start their wireless networking careers. Wireless networking professionals across the globe use this book as their workplace reference guide for enterprise Wi-Fi technology.Owning this book provides you with a foundation of knowledge for important Wi-Fi networking topics, including:* Radio frequency (RF) fundamentals* 802.11 MAC and medium access* Wireless LAN topologies and architecture* WLAN design, troubleshooting and validation* Wi-Fi networking security The book authors have over 40 years of combined Wi-Fi networking expertise and provide real-world insights that you can leverage in your wireless networking career. Each of the book’s 20 chapters breaks down complex topics into easy to understand nuggets of useful information. Each chapter has review questions that help you gauge your progress along the way. Additionally, hands-on exercises allow you to practice applying CWNA concepts to real-world scenarios. You also get a year of free access to the Sybex online interactive learning environment, which features additional resources and study aids, including bonus practice exam questions.The CWNA certification is a de facto standard for anyone working with wireless technology. It shows employers that you have demonstrated competence in critical areas, and have the knowledge and skills to perform essential duties that keep their wireless networks functioning and safe. The CWNA: Certified Wireless Network Administrator Study Guide gives you everything you need to pass the exam with flying colors.DAVID D. COLEMAN, CWNE #4, David D. Coleman, CWNE #4, is a technology evangelist and public speaker who specializes in Wi-Fi and cloud technologies. David is also Director of Product Marketing for Extreme Networks. He is the author of numerous books, white papers and videos about Wi-Fi technology. DAVID A. WESTCOTT, CWNE #7, is an independent consultant and WLAN technical trainer of thirty years. He provides vendor and custom wireless training to government agencies, corporations and universities around the world.Foreword xxxvIntroduction xxxviiAssessment Test lviCHAPTER 1 OVERVIEW OF WIRELESS STANDARDS, ORGANIZATIONS, AND FUNDAMENTALS 1History of Wireless Local Area Networks 3Standards Organizations 5Federal Communications Commission 5International Telecommunication Union Radiocommunication Sector 6Institute of Electrical and Electronics Engineers 8Internet Engineering Task Force 9Wi-Fi Alliance 11International Organization for Standardization 21Core, Distribution, and Access 22Communications Fundamentals 24Communication Terminology 24Understanding Carrier Signals 25Understanding Keying Methods 27Summary 33Exam Essentials 33Review Questions 34CHAPTER 2 IEEE 802.11 STANDARD AND AMENDMENTS 39Original IEEE 802.11 Standard 42IEEE 802.11-2020 Ratified Amendments 44802.11a-1999 45802.11b-1999 46802.11d-2001 47802.11e-2005 47802.11g-2003 48802.11h-2003 50802.11i-2004 52802.11j-2004 53802.11k-2008 53802.11n-2009 54802.11p-2010 55802.11r-2008 55802.11s-2011 56802.11u-2011 57802.11v-2011 58802.11w-2009 58802.11y-2008 59802.11z-2010 59802.11aa-2012 59802.11ac-2013 59802.11ad-2012 60802.11ae-2012 61802.11af-2014 61802.11ah-2016 62802.11ai-2016 63802.11aj-2018 63802.11ak-2018 63802.11aq-2018 63IEEE 802.11 Draft Amendments 63802.11ax (High Efficiency) 64802.11ay (Next-Generation 60 GHz) 65802.11az (Next-Generation Positioning) 65802.11ba (Wake-Up Radio) 65802.11bb (Light Communications) 65802.11bc (Enhanced Broadcast Service) 65802.11bd (Enhancements for Next-Generation V2X) 65802.11be (Extremely High Throughput) 66Defunct Amendments 66802.11F 66802.11T 67IEEE Task Group m 68Summary 69Exam Essentials 69Review Questions 70CHAPTER 3 RADIO FREQUENCY FUNDAMENTALS 75What is a Radio Frequency Signal? 77Radio Frequency Characteristics 78Wavelength 78Frequency 83Amplitude 85Phase 86Radio Frequency Behaviors 87Wave Propagation 87Absorption 88Reflection 89Scattering 91Refraction 91Diffraction 92Loss (Attenuation) 94Free Space Path Loss 96Multipath 98Gain (Amplification) 101RF Analysis Tools 102Summary 103Exam Essentials 103Review Questions 104CHAPTER 4 RADIO FREQUENCY COMPONENTS, MEASUREMENTS, AND MATHEMATICS 109Components of RF Communications 112Transmitter 112Antenna 113Receiver 114Intentional Radiator 114Equivalent Isotropically Radiated Power 114Units of Power and Comparison 115Watt 116Milliwatt 117Decibel 117Decibels Relative to an Isotropic Radiator (dBi) 120Decibels Relative to a Half-Wave Dipole Antenna (dBd) 120Decibels Relative to 1 Milliwatt (dBm) 121Inverse Square Law 122RF Mathematics 123Rule of 10s and 3s 124RF Math Summary 129Noise Floor 130Signal-to-Noise Ratio 130Signal-to-Interference-Plus-Noise Ratio 131Received Signal Strength Indicator 131Link Budget 135Fade Margin/System Operating Margin 138Summary 140Exam Essentials 142Review Questions 143CHAPTER 5 RADIO FREQUENCY SIGNAL AND ANTENNA CONCEPTS 147Azimuth and Elevation Charts (Antenna Radiation Envelopes) 150Interpreting Polar Charts 152Beamwidth 155Antenna Types 157Omnidirectional Antennas 158Downtilt Omnidirectional Antennas 161Semidirectional Antennas 162Highly Directional Antennas 164Sector Antennas 166Antenna Arrays 167Visual Line of Sight 169RF Line of Sight 169Fresnel Zone 170Earth Bulge 174Antenna Polarization 175Antenna Diversity 176Multiple-Input, Multiple-Output 177MIMO Antennas 178Antenna Connection and Installation 179Voltage Standing Wave Ratio 179Signal Loss 181Antenna Mounting 181Antenna Accessories 187Cables 188Connectors 188Splitters 189Amplifiers 189Attenuators 190Lightning Arrestors 191Grounding Rods and Wires 192Regulatory Compliance 192Summary 194Exam Essentials 194Review Questions 195CHAPTER 6 WIRELESS NETWORKS AND SPREAD SPECTRUM TECHNOLOGIES 199Throughput vs. Bandwidth 201Narrowband and Spread Spectrum 202Multipath Interference 204Frequency-Hopping Spread Spectrum 205Hopping Sequence 206Dwell Time 207Hop Time 207Modulation 207Direct-Sequence Spread Spectrum 208DSSS Data Encoding 208Modulation 209Transmit Spectrum Mask 210Orthogonal Frequency-Division Multiplexing 211Convolutional Coding 212Modulation 213Transmit Spectrum Mask 215Orthogonal Frequency-Division Multiple Access 217Industrial, Scientific, and Medical Bands 218900 MHz ISM Band 2182.4 GHz ISM Band 2195.8 GHz ISM Band 2195 GHz Unlicensed National Information Infrastructure Bands 220U-NII-1 220U-NII-2A 221U-NII-2C 221U-NII-3 222U-NII-4 22260 GHz for Wi-Fi 223Below 1 GHz 2242.4 GHz Channels 2245 GHz Channels 227Long-Term Evolution in 5 GHz 2316 GHz Channels 2326 GHz Incumbents 235Automated Frequency Coordination 2366 GHz Worldwide 2376 GHz Wi-Fi Considerations 238Summary 239Exam Essentials 239Review Questions 240CHAPTER 7 WIRELESS LAN TOPOLOGIES 245Wireless Networking Topologies 247Wireless Wide Area Network 248Wireless Metropolitan Area Network 248Wireless Personal Area Network 249Wireless Local Area Network 250802.11 Stations 251Client Station 252Access Point Station 252Integration Service 252Distribution System 253Wireless Distribution System 254802.11 Service Sets 255Service Set Identifier 256Basic Service Set 256Basic Service Area 257Basic Service Set Identifier 258Multiple Basic Service Set Identifiers 259Extended Service Set 261Independent Basic Service Set 262Personal Basic Service Set 264Mesh Basic Service Set 264QoS Basic Service Set 266802.11 Configuration Modes 267Access Point Modes 267Client Station Modes 268Summary 269Exam Essentials 269Review Questions 271CHAPTER 8 802.11 MEDIUM ACCESS 275CSMA/CA vs. CSMA/CD 276Collision Detection 277Distributed Coordination Function 278Physical Carrier Sense 279Virtual Carrier Sense 280Pseudo-Random Backoff Timer 283Interframe Space 285Hybrid Coordination Function 286Enhanced Distributed Channel Access 287HCF Controlled Channel Access 288Wi-Fi Multimedia 288Airtime Fairness 290Summary 292Exam Essentials 292Review Questions 293CHAPTER 9 802.11 MAC 297Packets, Frames, and Bits 299Data-Link Layer 300MAC Service Data Unit 300MAC Protocol Data Unit 300Physical Layer 301PLCP Service Data Unit 301PLCP Protocol Data Unit 302802.11 and 802.3 Interoperability 302802.11 MAC Header 303Frame Control Field 304Duration/ID Field 306MAC Layer Addressing 307Sequence Control Field 314QoS Control Field 315HT Control Field 315802.11 Frame Body 315802.11 Trailer 316802.11 State Machine 317Management Frames 318Beacon 318Authentication 325Association 326Reassociation 329Disassociation 331Deauthentication 331Action Frame 331Control Frames 333ACK Frame 333Block Acknowledgment 335PS-Poll 336RTS/CTS 336CTS-to-Self 338Protection Mechanisms 338Data Frames 341QoS and Non-QoS Data Frames 342Non-Data Carrying Frames 343Power Management 344Legacy Power Management 345WMM-Power Save and U-APSD 347MIMO Power Management 349802.11ax Power Management 349Summary 350Exam Essentials 350Review Questions 352CHAPTER 10 MIMO TECHNOLOGY: HT AND VHT 357MIMO 360Radio Chains 362Spatial Multiplexing 363MIMO versus SISO diversity 366Maximal Ratio Combining 366Space-Time Block Coding 367Cyclic Shift Diversity 368Transmit Beamforming 368Explicit Beamforming 370Multi-User MIMO 371Multi-User Beamforming 373Channels 37620 MHz Channels 37640 MHz Channels 377Forty MHz Intolerant 37980 MHz and 160 MHz Channels 380Guard Interval 382256-QAM Modulation 384802.11n/ac PPDUs 388Non-HT 388HT Mixed 388VHT 389802.11n/ac MAC 390A-MSDU 390A-MPDU 391Block Acknowledgment 392Power Management 392Modulation and Coding Scheme 394802.11ac Data Rates 397HT/VHT Protection Mechanisms 399HT Protection Modes (0–3) 399Wi-Fi Alliance Certification 400Summary 403Exam Essentials 403Review Questions 405CHAPTER 11 WLAN ARCHITECTURE 409WLAN Client Devices 411802.11 Radio Form Factors 412802.11 Radio Chipsets 418Client Utilities 418Management, Control, and Data Planes 421Management Plane 422Control Plane 422Data Plane 423WLAN Architecture 423Autonomous WLAN Architecture 423Centralized Network Management Systems 425Centralized WLAN Architecture 427Distributed WLAN Architecture 434Hybrid WLAN Architecture 436Specialty WLAN Infrastructure 437Enterprise WLAN Branch Routers 437WLAN Mesh Access Points 438WLAN Bridges 439Real-Time Location Systems 441VoWiFi 443Cloud Networking 445Application Programming Interface 448Transport and Data Formats 449WLAN APIs 450Common Applications 450Infrastructure Management 451Protocols for Management 452Summary 456Exam Essentials 457Review Questions 458CHAPTER 12 POWER OVER ETHERNET (POE) 463History of PoE 464Nonstandard PoE 465IEEE 802.3af 465IEEE Std 802.3-2005, Clause 33 465IEEE 802.3at-2009 465IEEE Std 802.3-2018, Clause 33 466IEEE 802.3bt-2018 466PoE Devices 467Powered Device 467Power-Sourcing Equipment 469Endpoint PSE 470Midspan PSE 476Planning and Deploying PoE 484Power Planning 484Redundancy 487Downgrade PoE Capabilities 488802.3bt Power Considerations 488Summary 490Exam Essentials 491Review Questions 492CHAPTER 13 WLAN DESIGN CONCEPTS 497WLAN Coverage Design 499Received Signal 500Signal-to-Noise Ratio 501Dynamic Rate Switching 503Transmit Power 504Roaming Design 505Primary and Secondary Coverage 508Fast Secure Roaming 509Layer 3 Roaming 510Channel Design 512Adjacent Channel Interference 5122.4 GHz Channel Reuse 513Co-Channel Interference 5165 GHz Channel Reuse 519DFS Channels 52140 MHz Channel Design 527Static Channels and Transmit Power vs. Adaptive RF 529Single-Channel Architecture 531Capacity Design 534High-Density 535Band Steering 539Load Balancing 542Airtime Consumption 543Voice vs. Data 546Dual 5 GHz and Software-Defined Radios 5486 GHz WLAN Design 551Client Considerations 552Coverage Considerations 5536 GHz Channel Reuse 5536 GHz AP Discovery 5546 GHz Wi-Fi Security 556Physical Environment 557Antennas 558Outdoor Design 562Summary 563Exam Essentials 564Review Questions 565CHAPTER 14 SITE SURVEY AND VALIDATION 569WLAN Site Survey and Design Interview 572Customer Briefing 572Business Requirements 573Capacity and Coverage Requirements 574Existing Wireless Network 576Upgrading an Existing WLAN 577Infrastructure Connectivity 578Security Expectations 580Guest Access 581Aesthetics 581Outdoor Surveys 582Vertical Market Considerations 582Government 583Education 583Healthcare 583Retail 584Warehouses and Manufacturing 584Multi-Tenant Buildings 585Legacy AP-on-a-Stick Survey 585Spectrum Analysis 586Coverage Analysis 590Hybrid Survey 595Initial Site Visit 595Predictive Design 597Validation Survey 599Capacity and Throughput 601Roaming 602Delay and Jitter 603Connectivity 603Aesthetics 603Site Survey Tools 604Indoor Site Survey Tools 604Outdoor Site Survey Tools 607Documents and Reports 609Forms and Customer Documentation 610Deliverables 612Additional Reports 613Summary 614Exam Essentials 615Review Questions 616CHAPTER 15 WLAN TROUBLESHOOTING 621Five Tenets of WLAN Troubleshooting 623Troubleshooting Best Practices 623Troubleshoot the OSI Model 625Most Wi-Fi Problems Are Client Issues 627Proper WLAN Design Reduces Problems 628WLAN Always Gets the Blame 629Layer 1 Troubleshooting 629WLAN Design 629Transmit Power 630RF Interference 630Drivers 634PoE 635Firmware Bugs 635Layer 2 Troubleshooting 636Layer 2 Retransmissions 636RF Interference 639Low SNR 639Adjacent Channel Interference 640Hidden Node 641Mismatched Power 646Multipath 648Security Troubleshooting 648PSK Troubleshooting 649802.1X/EAP Troubleshooting 651VPN Troubleshooting 659Roaming Troubleshooting 661Channel Utilization 665Layers 3–7 Troubleshooting 667WLAN Troubleshooting Tools 671WLAN Discovery Applications 671Spectrum Analyzers 672Protocol Analyzers 673Throughput Test Tools 675Standard IP Network Test Commands 677Secure Shell 678Summary 679Exam Essentials 679Review Questions 680CHAPTER 16 WIRELESS ATTACKS, INTRUSION MONITORING, AND POLICY 687Wireless Attacks 688Rogue Wireless Devices 689Peer-to-Peer Attacks 692Eavesdropping 693Encryption Cracking 697KRACK Attack 698Kr00k Vulnerability 698Authentication Attacks 699MAC Spoofing 701Management Interface Exploits 701Wireless Hijacking 702Denial-of-Service Attacks 703Vendor-Specific Attacks 705Social Engineering 706Intrusion Monitoring 706Wireless Intrusion Prevention System 706Rogue Detection and Mitigation 709Spectrum Analyzers 712Wireless Security Policies 712General Security Policies 713Functional Security Policies 713Legislative Compliance 714802.11 Wireless Policy Recommendations 715Summary 716Exam Essentials 717Review Questions 718CHAPTER 17 802.11 NETWORK SECURITY ARCHITECTURE 723802.11 Security Basics 725Data Privacy and Integrity 726Authentication, Authorization, and Accounting 728Segmentation 728Monitoring and Policy 729Legacy 802.11 Security 729Legacy Authentication 730Static WEP Encryption 731MAC Filters 735SSID Cloaking 735Robust Security 736Robust Security Network 737Authentication and Authorization 738PSK Authentication 738Proprietary PSK Authentication 741Simultaneous Authentication of Equals 743802.1X/EAP Framework 746EAP Types 749Dynamic Encryption-Key Generation 7514-Way Handshake 752WLAN Encryption 754TKIP Encryption 755CCMP Encryption 756GCMP Encryption 756Management Frame Protection 757WPA2 757WPA3 758WPA3-Personal 758WPA3-Enterprise 759Enhanced Open 7616 GHz Wi-Fi Security 762Traffic Segmentation 763VLANs 763RBAC 765VPN Wireless Security 766VPN 101 767Layer 3 VPNs 768SSL VPNs 768VPN Deployment 768Summary 770Exam Essentials 770Review Questions 772CHAPTER 18 BRING YOUR OWN DEVICE (BYOD) AND GUEST ACCESS 777Mobile Device Management 780Company-Issued Devices vs. Personal Devices 781MDM Architecture 782MDM Enrollment 784MDM Profiles 788MDM Agent Software 790Over-the-Air Management 791Application Management 793Self-Service Device Onboarding for Employees 795Dual-SSID Onboarding 796Single-SSID Onboarding 796MDM vs. Self-Service Onboarding 797Guest WLAN Access 798Guest SSID 798Guest VLAN 799Guest Firewall Policy 800Captive Web Portals 801Client Isolation, Rate Limiting, and Web Content Filtering 804Guest Management 805Guest Self-Registration 806Employee Sponsorship 808Social Login 809Encrypted Guest Access 810Hotspot 2.0 and Passpoint 811Access Network Query Protocol 811Hotspot 2.0 Architecture 813802.1X/EAP and Hotspot 2.0 814Online Sign-Up 815Roaming Agreements 816Network Access Control 816Posture 817OS Fingerprinting 818AAA 820RADIUS Change of Authorization 821Single Sign-On 822Summary 824Exam Essentials 825Review Questions 826CHAPTER 19 802.11AX: HIGH EFFICIENCY (HE) 831802.11ax = Wi-Fi 6 833Wi-Fi Traffic Congestion 834HE Overview 836Multi-User 837OFDMA 838Subcarriers 839Resource Units 840Trigger Frames 844Downlink OFDMA 847Uplink OFDMA 848Buffer Status Reports 849Operating Mode Indication 850MU-MIMO 851BSS Color and Spatial Reuse 855OBSS 855BSS Color 857Spatial Reuse Operation 858Target Wake Time 861Additional 802.11ax PHY and MAC Capabilities 8621024-QAM 862Long Symbol Time and Guard Intervals 863802.11ax PHY headers 86420 MHz-Only 865Multi-TID AMPDU 867Wi-Fi 6 Key Questions 867Clients 867Multi-Gig Ethernet 868Power over Ethernet 8704×4:4 vs. 8×8:8 87180 MHz and 160 MHz Channels 872Wi-Fi CERTIFIED 6 873Summary 874Review Questions 875CHAPTER 20 WLAN DEPLOYMENT AND VERTICAL MARKETS 879Deployment Considerations for Commonly Supported WLAN Applications and Devices 881Data 881Voice 882Video 882Real-Time Location Services 883iBeacon Proximity 883Mobile Devices 885Corporate Data Access and End-User Mobility 885Network Extension to Remote Areas 886Bridging: Building-to-Building Connectivity 887Wireless ISP: Last-Mile Data Delivery 888Small Office/Home Office 888Temporary Office Networking 889Branch Offices 890Teleworker Wi-Fi 890Educational/Classroom Use 891Industrial: Warehousing and Manufacturing 892Retail 892Healthcare 894Municipal Networks 895Hotspots: Public Network Access 895Stadium Networks 897Transportation Networks 897Law Enforcement Networks 898First-Responder Networks 899Managed Service Providers 900Fixed Mobile Convergence 900WLAN and Health 901Internet of Things 901WLAN Vendors 902Summary 904Exam Essentials 904Review Questions 905APPENDIX A ANSWERS TO REVIEW QUESTIONS 909Chapter 1: Overview of Wireless Standards, Organizations, and Fundamentals 910Chapter 2: IEEE 802.11 Standard and Amendments 911Chapter 3: Radio Frequency Fundamentals 914Chapter 4: Radio Frequency Components, Measurements, and Mathematics 915Chapter 5: Radio Frequency Signal and Antenna Concepts 918Chapter 6: Wireless Networks and Spread Spectrum Technologies 919Chapter 7: Wireless LAN Topologies 922Chapter 8: 802.11 Medium Access 924Chapter 9: 802.11 MAC 926Chapter 10: MIMO Technology: HT and VHT 929Chapter 11: WLAN Architecture 932Chapter 12: Power over Ethernet (PoE) 934Chapter 13: WLAN Design Concepts 937Chapter 14: Site Survey and Validation 940Chapter 15: WLAN Troubleshooting 943Chapter 16: Wireless Attacks, Intrusion Monitoring, and Policy 946Chapter 17: 802.11 Network Security Architecture 948Chapter 18: Bring Your Own Device (BYOD) and Guest Access 951Chapter 19: 802.11ax: High Efficiency (HE) 954Chapter 20: WLAN Deployment and Vertical Markets 957APPENDIX B ABBREVIATIONS AND ACRONYMS 961Certifications 962Organizations and Regulations 962Measurements 963Technical Terms 964Index 981

Regulärer Preis: 43,99 €
Produktbild für Computer Vision Using Deep Learning

Computer Vision Using Deep Learning

Organizations spend huge resources in developing software that can perform the way a human does. Image classification, object detection and tracking, pose estimation, facial recognition, and sentiment estimation all play a major role in solving computer vision problems.This book will bring into focus these and other deep learning architectures and techniques to help you create solutions using Keras and the TensorFlow library. You'll also review mutliple neural network architectures, including LeNet, AlexNet, VGG, Inception, R-CNN, Fast R-CNN, Faster R-CNN, Mask R-CNN, YOLO, and SqueezeNet and see how they work alongside Python code via best practices, tips, tricks, shortcuts, and pitfalls. All code snippets will be broken down and discussed thoroughly so you can implement the same principles in your respective environments.Computer Vision Using Deep Learning offers a comprehensive yet succinct guide that stitches DL and CV together to automate operations, reduce human intervention, increase capability, and cut the costs.WHAT YOU'LL LEARN* Examine deep learning code and concepts to apply guiding principals to your own projects* Classify and evaluate various architectures to better understand your options in various use cases* Go behind the scenes of basic deep learning functions to find out how they workWHO THIS BOOK IS FORProfessional practitioners working in the fields of software engineering and data science. A working knowledge of Python is strongly recommended. Students and innovators working on advanced degrees in areas related to computer vision and Deep Learning.VAIBHAV VERDHAN is a seasoned data science professional with rich experience spanning across geographies and retail, telecom, manufacturing, health-care and utilities domain. He is a hands-on technical expert and has led multiple engagements in Machine Learning and Artificial Intelligence. He is a leading industry expert, is a regular speaker at conferences and meet-ups and mentors students and professionals. Currently he resides in Ireland and is working as a Principal Data Scientist.Chapter 1 Introduction to Computer Vision and Deep Learning.- Chapter 2 Nuts and Bolts of Deep Learning for Computer Vision.- Chapter 3 Image Classification using LeNet.- Chapter 4 VGGNet and AlexNext Networks.- Chapter 5 Object Detection Using Deep Learning.- Chapter 6 Facial Recognition and Gesture Recognition.- Chapter 7 Video Analytics Using Deep Learning.- Chapter 8 End-to-end Model Development.- Appendix.

Regulärer Preis: 56,99 €
Produktbild für Künstliche Intelligenz

Künstliche Intelligenz

Künstliche Intelligenz (KI) ist heute schon in unserem Alltag präsent und wird uns zukünftig in nahezu allen Lebensbereichen begegnen – von der bildgestützten Diagnose in der Medizin über das autonome Fahren und die intelligente Maschinenwartung in der Industrie bis hin zur Sprachsteuerung im smarten Zuhause. Die Potenziale der KI sind enorm, gleichzeitig kursieren viele Mythen, Ungewissheiten und Herausforderungen, die es zu meistern gilt.Dieses Buch adressiert daher die breite Öffentlichkeit – von interessierten Bürgerinnen und Bürgern bis hin zur Leitungsebene in Unternehmen, die ein besseres und tieferes technisches Verständnis von KI-Technologien aufbauen und deren Folgen abschätzen möchten.In verständlicher Sprache werden mathematische Grundlagen, Begriffe und Methoden erläutert. Eine abschließende Diskussion der Chancen und Herausforderungen hilft den Leserinnen und Lesern, die Entwicklungen zu bewerten, sie zu entmystifizieren und ihre Relevanz für die Zukunft zu erkennen.DR. GERHARD PAAẞ ist Diplom-Mathematiker mit Promotion in Makroökonomie an der Uni Bonn. Seine Forschungsschwerpunkte liegen im Bereich der neuronalen Netze, des Textmining und der Statistik. Als Wissenschaftler in der Gesellschaft für Mathematik und Datenverarbeitung und Gruppenleiter im Fraunhofer-Institut für Intelligente Analyse- und Informationssysteme IAIS war er an zahlreichen Forschungs- und Industrieprojekten zum Maschinellen Lernen beteiligt. In den letzten Jahren ist er v. a. als Dozent in Schulungen für KI und Tiefe Neuronale Netzwerke tätig.DR. DIRK HECKER ist stellvertretender Institutsleiter des Fraunhofer IAIS. Er studierte und promovierte im Bereich Geo-Informatik an den Universitäten Köln und Bonn. Seit vielen Jahren beschäftigt sich Dirk Hecker mit Aspekten der Digitalisierung und deren Einfluss auf Wirtschaft und Gesellschaft. Er ist in zahlreichen Direktorien sowie Leitungskreisen diverser bundesweiter KI-Initiativen tätig.Was ist intelligent an Künstlicher Intelligenz und was kann sie? - Grundbegriffe und Methoden des Maschinellen Lernens - Wie Tiefe Neuronale Netze Zusammenhänge erfassen und Strategien lernen - Wie KI Bilder erkennt, Texte analysiert und gesprochene Sprache versteht - Kann KI kreativ sein und Emotionen lernen? - Chancen, Herausforderungen und Risiken für Wirtschaft und Gesellschaft

Regulärer Preis: 42,79 €
Produktbild für Security by Design

Security by Design

Der Softwareingenieur von heute muss die grundlegende Disziplin der Entwicklung sicherer informationstechnischer Systeme verstehen. Nicht, weil es eine ein „gute Idee“ ist, sondern weil unsere Arbeits- und Lebenswelten zunehmend auf die Funktionsfähigkeit und die Sicherheit hochkomplexer und dynamischer informationstechnischer Infrastrukturen angewiesen sind. Die Vorstellung, dass die Sicherheit informationstechnischer Systeme etwas Besonderes ist, ist ein Trugschluss. Tatsächlich ist Sicherheit nur ein Aspekt der Zuverlässigkeit. Wir können keine zuverlässigen Anwendungen und Systeme haben, wenn diese nicht sicher sind.Vor diesem Hintergrund gehen die Autoren der Frage nach, ob und in welchem Ausmaß die mit dem Einsatz der Artefakte der digitalen Revolution einhergehenden Risiken beherrschbar bleiben, und welche Möglichkeiten wir bereits heute haben, die Eindämmung von Risiken und Gefahren schon beim Entwurf informationstechnischer Systeme zu berücksichtigen. Die Antwort ist ein systematischer praxis- und modellbasierter Ansatz für das Security-Engineering von Informationssystemen.DR. ARMIN LUNKEIT ist Informatiker und widmet sich seit mehr als 20 Jahren der Entwicklung und dem Einsatz sicherheitskritischer Anwendungen und Systeme. Er hat sich in diesem Zeitraum intensiv mit der Integration des Security Engineerings in die Systementwicklung auseinandergesetzt und dazu mehrere Artikel veröffentlicht.DR. WOLF ZIMMER ist Physiker und war mehr als 25 Jahre in der Softwareentwicklung und Strategieberatung eines weltweit agierenden IT-Unternehmens tätig. Er hat in diesem Umfeld bereits mehrere Bücher und Artikel veröffentlicht.Was ist das Problem? - Der IT-Sicherheitsstack - Systems Engineering ist Security Engineering - Modell-basiertes Design - Die SmartFit AG - Fragile Kryptografie - The Proof of the Pudding is in the eating - Die Vermessung der (Un-)Sicherheit - Ausblick

Regulärer Preis: 62,99 €