Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Creating ASP.NET Core Web Applications

Creating ASP.NET Core Web Applications

Design and develop an ASP.NET Core web application using .NET Core 3.0. This book shows you how to publish a web application to a web server and connect the published web application to a production database.CREATING ASP.NET CORE WEB APPLICATIONS starts by setting up the Visual Studio project where you will learn about Razor pages, Entities, and creating a data service. You will create models along with methods to use a query string and handle bad requests. Modifying data with Tag helpers is discussed as well as installation of Entity Framework, working with database migrations, and implementing a data access service. You will learn how to use layout pages and sections with Partial Views, _ViewImports, and _ViewStart files. You also will create custom middleware and log application events. You will be able to deploy the web application as well as connect it to a SQL Server database.WHAT YOU WILL LEARN* Work with models* Modify data* Work with EF Core and SQL Server* Work with Razor pages and Partial Views* Use separate scripts for production vs development* Trace client-side errors using Chrome Developer tools* Create cascading style sheets (CSS) with Sassy CSS (SCSS)* Explore middleware* Deploy your web application to IISWHO THIS BOOK IS FORSoftware developers on the .NET stack who want to create ASP.NET Core web applicationsDIRK STRAUSS is a software developer from South Africa who has been writing code since 2003. He has extensive experience in SYSPRO, with C# and web development being his main focus. He studied at the Nelson Mandela University, where he wrote software on a part-time basis to gain a better understanding of the technology. He remains passionate about writing code and imparting what he learns with others.CHAPTER 1: CREATING AND SETTING UP YOUR PROJECTCHAPTER GOAL: CREATE THE VISUAL STUDIO PROJECT REQUIRED TO START THE WEB APPLICATION DEVELOPMENT. HERE WE WILL LOOK AT RAZOR PAGES, ENTITIES, CREATING A DATA SERVICE AND USING THIS DUMMY DATA TO DISPLAY DATA ON THE WEB PAGE.NO OF PAGES 25SUB -TOPICS1. Creating Your Web Application Project2. Adding and Editing Razor Pages3. Looking at the Configuration4. Working with Entities5. Create and Register a Data Service6. Displaying Test Data on Your Web PageCHAPTER 2: CREATING MODELSCHAPTER GOAL: CREATE A SEARCH FORM THAT ALLOWS THE READER TO FIND DATA IN THE DATA STORE. HERE THE READER WILL LOOK AT USING MODELS, MODEL BINDING, WORKING WITH A QUERY STRING, AND SPECIFYING PAGE ROUTES. WE WILL ALSO TAKE A LOOK AT HOW TO HANDLE BAD REQUESTS.NO OF PAGES: 25SUB - TOPICS1. Building a Search Form2. Implementing the Find logic3. Using Query Strings, Model Binding and Tag Helpers4. Displaying Related Data5. Working with Page Routes6. Handling Bad RequestsCHAPTER 3: MODIFYING DATACHAPTER GOAL: THE READER WILL LEARN HOW TO CREATE A PAGE TO EDIT AND ADD DATA STORED IN THE DATA STORE. THE READER WILL ALSO REVISIT TAG HELPERS.NO OF PAGES : 20SUB - TOPICS:1. Editing Existing Data and Using Tag Helpers2. Validating Edited Data3. Display Validation Errors4. Creating New Data5. Modify the Data Access ServiceCHAPTER 4: EF CORE AND SQL SERVERCHAPTER GOAL: THE READER WILL LEARN HOW TO INSTALL ENTITY FRAMEWORK, WORKING WITH DATABASE MIGRATIONS AND IMPLEMENTING A DATA ACCESS SERVICE.NO OF PAGES : 25SUB - TOPICS:1. Install Entity Framework2. Implement DbContext3. Specify Database Connection Strings4. Working with Database Migrations5. Implement a New Data Access Service6. Changing the Data Access Service RegistrationCHAPTER 5: WORKING WITH RAZOR PAGESCHAPTER GOAL: THE READER WILL LEARN HOW TO USE LAYOUT PAGES AND SECTIONS. THEY WILL ALSO LEARN ABOUT WORKING WITH PARTIAL VIEWS, _VIEWIMPORTS AND _VIEWSTART FILES.NO OF PAGES : 25SUB - TOPICS:1. Using Sections in Your Razor Pages2. What are _ViewImports and _ViewStart files?3. Working with Partial Views4. Working with ViewComponentsCHAPTER 6: ADDING CLIENT-SIDE LOGICCHAPTER GOAL: THE READER WILL LEARN HOW TO WORK WITH SCSS TO CREATE CSS, USING JAVASCRIPT AND JQUERY. THE READER WILL ALSO LEARN HOW TO SEPARATE SCRIPTS TARGETED AT PRODUCTION FROM SCRIPTS TARGETED FOR DEVELOPMENT.NO OF PAGES : 30SUB - TOPICS:1. Separate Production Scripts from Development Scripts2. Setting up SCSS and generating CSS with the Web Compiler3. Creating a Client-side API4. Working with Chrome Developer ToolsCHAPTER 7: EXPLORING MIDDLEWARECHAPTER GOAL: THE READER WILL LEARN HOW TO USE MIDDLEWARE AND HOW TO CREATE CUSTOM MIDDLEWARE. WE WILL ALSO BE LOOKING AT LOGGING APPLICATION EVENTS.NO OF PAGES : 25SUB - TOPICS:1. What is Middleware2. Creating Custom Middleware3. Logging InformationCHAPTER 8: WEB APPLICATION DEPLOYMENTCHAPTER GOAL: THE READER WILL LEARN HOW TO DEPLOY THE WEB APPLICATION THEY CREATED. THIS WILL LOOK AT DEPLOYMENT TO A WEB SERVER AS WELL AS CONNECTING THE WEB APPLICATION TO A SQL SERVER DATABASE.NO OF PAGES : 25SUB - TOPICS:1. Getting Your Site Ready for Deployment2. Deploying Your Web Application to IIS

Regulärer Preis: 62,99 €
Produktbild für React and Libraries

React and Libraries

Harness the power of React and the related libraries that you need to know to deliver successful front-end implementations. Whether you are a beginner getting started or an existing React developer, this book will provide you with the must-have knowledge you need in your toolbox to build a complete app.Start by learning how to create and style your own components, add state management, and manage routing. You’ll also learn how to work with the backend using the MERN stack (MongoDB, Express, React, and Node.js). Once you have completed building your app you will learn how to deliver quality software by conducting unit testing, integration testing, and end-to-end (E2E) testing, as well as learn techniques to debug, profile, and optimize your React app.Libraries and tools covered include TypeScript, Material-UI, Styled Components, SCSS, React Router, Redux Toolkit, Recoil, Jest, Enzyme, Sinon, MongoDB, NodeJS, Express, Serve, Grunt, Puppeteer, ESLint, Prettier and many others. And, you'll get access to bonus material and learn how to conduct and nail React interview questions.Each chapter in this book can be used independently so you can pick and choose the information you’d like to learn. Use it to get deep into your React development world and find out why React has been rated the most loved framework by front-end developers for three years in a row.WHAT YOU'LL LEARN* Review the basics of DOM, React Virtual DOM, JSX, Babel, ES5/ES6, CRA, package manager, Yarn, Webpack, and build tools* Write your own custom React components and learn about hooks and props.* Apply routing and state management with React Route, Recoil, and Redux Toolkit* Deliver quality software and reduce QA load by learning unit testing integration testing and end-to-end testing with libraries such as Jest, Jest-dom, Enzyme, Sinon, and Puppeteer* Set an ultimate React automated development and CI cycle with ESLint, Prettier, Husky, Jest, Puppeteer, GitHub Actions, Codecov.io, Coveralls, Travis, and DeepScan* Publish your code on Ubuntu Server with the help of Grunt* Optimize your React app with pure components, lazy loading, prerender, precache, code splitting, tree shaking, reduce media size, and prefetchingWHO THIS BOOK IS FOR?This book is for new developers looking to start working on React applications, and React developers looking to expand on their existing knowledge. It is also suitable for developers coming from other front-end frameworks such as Angular and Vue who would like to add React to their toolbox.ELAD ELROM is a coder, technical lead and a technical writer and technical trainer. Elad is passionate about teaching and helping other developers advance and learn. As a writer, he has co-authored several technical books. Elad has consulted for a variety of clients, from large corporations such as HBO, Viacom, NBC Universal, and Weight Watchers, to smaller startups. Aside from coding, Elad is also a certified PADI dive instructor, motorcycle enthusiast, as well as an accomplished certified pilot.1. Learn the Basics2. Starter React Project & Friends3. React Components4. React Router and Material-UI5. State Management6. MERN Stack- Part I7. MERN Stack-Part II8. React Deployment- MERN Stack9. Testing Part I- Unit Test Your React App10. Testing Part II- Development & Deployment Cycle11. Debug & Profile Your React App12. Optimize Your React App

Regulärer Preis: 46,99 €
Produktbild für Jump-start Your SOC Analyst Career

Jump-start Your SOC Analyst Career

The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in JUMP-START YOUR SOC ANALYST CAREER. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals. This book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey. The gems of knowledge shared in this book provide you with a notable advantage for entering this dynamic field of work.The recent surplus in demand for SOC analysts makes JUMP-START YOUR SOC ANALYST CAREER a must-have for aspiring tech professionals and long-time veterans alike. Recent industry developments such as using the cloud and security automation are broken down in concise, understandable ways, to name a few. The rapidly changing world of cybersecurity requires innovation and fresh eyes, and this book is your roadmap to success.WHAT YOU WILL LEARN* Understand the demand for SOC analysts* Know how to find a SOC analyst job fast* Be aware of the people you will interact with as a SOC analyst* Be clear on the prerequisite skills needed to be a SOC analyst and what to study* Be familiar with the day-to-day life of a SOC analyst, including the tools and language used* Discover the rapidly emerging areas of a SOC analyst job: the cloud and security automationWHO THIS BOOK IS FORAnyone interested in starting a career in cyber security: recent graduates, IT professionals transitioning into security, veterans, and those who are self taughtTYLER E. WALL is CEO of Cyber NOW Education, LLC which specializes in connecting education with opportunity. He is an accomplished security professional with years of experience in security operations and engineering that includes presently serving remotely as a Senior Security Engineer in Silicon Valley. He has built and led security operations centers for companies such as EY and Opentext. His current focus is enabling security operations centers to continuously mature by the adoption of security automation. Tyler’s education includes: Master of Science in Cybersecurity Management, CISSP, CEH, CFSR, LRPA, Security+, Network+, and A+. He enjoys long golf cart rides in Braselton, Georgia with his wife and son.JARRETT RODRICK is the SOC Team Lead and Senior Information Security Analyst for VMware, the global leader in visualization technology. He is a retired Cyber Network Defender and Cyber Warfare Specialist from the US Army and has over eight years of Defensive Cyber Operations experience working with the Army’s Cyber Protection Brigade. Jarrett’s time with the Cyber Protection Brigade has provided him with the skills needed to fight in today’s Cyber War. Jarrett’s cyber security certifications include: GSEC, GCED, GCIH, GCIA, GCFE, GCFA, GSNA, GRID, GCUX, and GSTRT. Jarrett lives in Melissa, Texas with his wife and family and enjoys researching new and innovative technologies.Chapter 1: The Demand for Cybersecurity and SOC AnalystsChapter 2: Areas of Expertise in CybersecurityChapter 3: Job HuntingChapter 4: Prerequisite SkillsChapter 5: The SOC AnalystChapter 6: SOC in the CloudsChapter 7: SOC AutomationChapter 8: Real SOC Analyst Stories.

Regulärer Preis: 46,99 €
Produktbild für Beginning Robotics with Raspberry Pi and Arduino

Beginning Robotics with Raspberry Pi and Arduino

Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study.Fully updated to cover the Raspberry Pi 4 with its better processor and memory, discover new ways to work with Computer Vision. You'll be led step by step through the process of building a robot that uses the power of a Linux based computer paired with the simplicity of Arduino. You’ll learn why the Raspberry Pi is a great choice for a robotics platform; its strengths as well as its shortcomings; how to overcome these limitations by implementing an Arduino; and the basics of the Python programming language as well as some of the more powerful features.With the Raspberry Pi you can give your project the power of a Linux computer, while Arduino makes interacting with sensors and motors very easy. These two boards are complimentary in their functions; where one falters the other performs admirably.The book also includes references to other great works to help further your growth in the exciting, and now accessible, field of smart robotics. As a bonus, the final chapter of the book demonstrates the real power of the Raspberry Pi by implementing a basic vision system. Using OpenCV and a standard USB web cam, you will build a robot that can chase a ball.WHAT YOU'LL LEARN* Install Raspbian, the operating system that drives the Raspberry Pi* Drive motors through an I2C motor controller* Read data through sensors attached to an ArduinoWHO THIS BOOK IS FORHobbyists and students looking for a rapid start in robotics. It assumes no technical background. Readers are guided to pursue the areas that interest them in more detail as they learn.JEFF CICOLANI is the President of The Robot Group, an Austin, Texas based robotics group consisting of robotics enthusiasts and professionals from throughout the Austin area. He has had a successful technical career as a systems analyst, developer, and project manager for multiple Fortune 500 companies. In 2017, Jeff leveraged his Maker skills, general technical acumen, and passion for robotics into a new career when he accepted a position at SparkLabs, the prototype and research division of SparkCognition, an AI company based in Austin.Jeff currently lives in Pflugerville, a suburb of Austin, with his lovely wife, two dogs, and countless robots. When he’s not building robots at work, he builds robots for fun. He is also the developer of Nomad: Autonomous Robot, which has been featured in several magazine articles and exhibitions.BEGINNING ROBOTICS WITH RASPBERRY PI AND ARDUINOChapter 1: Introduction to RoboticsChapter 2: An Introduction to Raspberry PiChapter 3: A Crash Coarse in PythonChapter 4: Raspberry Pi GPIOChapter 5: Raspberry Pi and ArduinoChapter 6: Driving MotorsChapter 7: Assembling the RobotChapter 8: Working with Infrared SensorsChapter 9: An Introduction to Open CVChapter 10: Conclusion

Regulärer Preis: 56,99 €
Produktbild für Reinforcement Learning Aided Performance Optimization of Feedback Control Systems

Reinforcement Learning Aided Performance Optimization of Feedback Control Systems

Changsheng Hua proposes two approaches, an input/output recovery approach and a performance index-based approach for robustness and performance optimization of feedback control systems. For their data-driven implementation in deterministic and stochastic systems, the author develops Q-learning and natural actor-critic (NAC) methods, respectively. Their effectiveness has been demonstrated by an experimental study on a brushless direct current motor test rig.THE AUTHOR:CHANGSHENG HUA received the Ph.D. degree at the Institute of Automatic Control and Complex Systems (AKS), University of Duisburg-Essen, Germany, in 2020. His research interests include model-based and data-driven fault diagnosis and fault-tolerant techniques.CHANGSHENG HUA received the Ph.D. degree at the Institute of Automatic Control and Complex Systems (AKS), University of Duisburg-Essen, Germany, in 2020. His research interests include model-based and data-driven fault diagnosis and fault-tolerant techniques.Introduction.- The basics of feedback control systems.- Reinforcement learning and feedback control.- Q-learning aided performance optimization of deterministic systems.- NAC aided performance optimization of stochastic systems.- Conclusion and future work.

Regulärer Preis: 74,89 €
Produktbild für Das Behaviour Driven Development in agilen Projekten der Automobilbranche. Ein Vergleich mit den Techniken Cucumber und Spock

Das Behaviour Driven Development in agilen Projekten der Automobilbranche. Ein Vergleich mit den Techniken Cucumber und Spock

Softwaretests werden in der Automobilbranche zunehmend automatisiert. Das Behaviour Driven Development ist eine Technik der agilen Softwareentwicklung, die automatisierte Tests ermöglicht. Dabei wählen Softwareentwickler Testwerkzeuge nach bestimmten Prinzipien aus und wenden diese bei Tests wie dem Akzeptanztest an.Aber welches Framework eignet sich zur Automatisierung von Akzeptanztests? Welche Probleme ergeben sich beim Einsatz von Werkzeugen des Behaviour Driven Development? Und welche Kriterien sind bei der Auswahl eines Testframeworks wichtig?Pascal Mödinger vergleicht anhand eines Testszenarios die Tools Cucumber und Spock miteinander. Er implementiert diese und prüft nach ausgewählten Kriterien, welches Framework sich zur Automatisierung von Akzeptanztests besser eignet.Aus dem Inhalt:- Behaviour Driven Development;- Agile Projekte;- Softwaretest;- Akzeptanztest;- Automobilbranche;- Testautomatisierung

Regulärer Preis: 29,99 €
Produktbild für Agricultural Informatics

Agricultural Informatics

Despite the increasing population (the Food and Agriculture Organization of the United Nations estimates 70% more food will be needed in 2050 than was produced in 2006), issues related to food production have yet to be completely addressed. In recent years, Internet of Things technology has begun to be used to address different industrial and technical challenges to meet this growing need. These Agro-IoT tools boost productivity and minimize the pitfalls of traditional farming, which is the backbone of the world's economy. Aided by the IoT, continuous monitoring of fields provides useful and critical information to farmers, ushering in a new era in farming. The IoT can be used as a tool to combat climate change through greenhouse automation; monitor and manage water, soil and crops; increase productivity; control insecticides/pesticides; detect plant diseases; increase the rate of crop sales; cattle monitoring etc.Agricultural Informatics: Automation Using the IoT and Machine Learning focuses on all these topics, including a few case studies, and they give a clear indication as to why these techniques should now be widely adopted by the agriculture and farming industries.AMITAVA CHOUDHURY PhD is an assistant professor in the school of Computer Science, University of Petroleum & Energy Studies, Dehradun, India.ARINDAM BISWAS PhD is an assistant professor in School of Mines and Metallurgy at Kazi Nazrul University, Asansol, West Bengal, India.MANISH PRATEEK PhD is Professor and Dean, School of Computer Science, at the University of Petroleum and Energy Studies, Dehradun, India.AMLAN CHAKRABARTI PhD is a Full Professor in the A.K. Choudhury School of Information Technology at the University of Calcutta.Preface xiii1 A STUDY ON VARIOUS MACHINE LEARNING ALGORITHMS AND THEIR ROLE IN AGRICULTURE 1Kalpana Rangra and Amitava Choudhury1.1 Introduction 11.2 Conclusions 92 SMART FARMING USING MACHINE LEARNING AND IOT 13Alo Sen, Rahul Roy and Satya Ranjan Dash2.1 Introduction 142.2 Related Work 152.3 Problem Identification 222.4 Objective Behind the Integrated Agro-IoT System 232.5 Proposed Prototype of the Integrated Agro-IoT System 232.6 Hardware Component Requirement for the Integrated Agro-IoT System 262.7 Comparative Study Between Raspberry Pi vs Beaglebone Black 302.8 Conclusions 312.9 Future Work 323 AGRICULTURAL INFORMATICS VIS-À-VIS INTERNET OF THINGS (IOT): THE SCENARIO, APPLICATIONS AND ACADEMIC ASPECTS--INTERNATIONAL TREND & INDIAN POSSIBILITIES 35P.K. Paul3.1 Introduction 363.2 Objectives 363.3 Methods 373.4 Agricultural Informatics: An Account 373.5 Agricultural Informatics & Technological Components: Basics & Emergence 403.6 IoT: Basics and Characteristics 413.7 IoT: The Applications & Agriculture Areas 433.8 Agricultural Informatics & IoT: The Scenario 453.9 IoT in Agriculture: Requirement, Issues & Challenges 493.10 Development, Economy and Growth: Agricultural Informatics Context 503.11 Academic Availability and Potentiality of IoT in Agricultural Informatics: International Scenario & Indian Possibilities 513.12 Suggestions 603.13 Conclusion 604 APPLICATION OF AGRICULTURAL DRONES AND IOT TO UNDERSTAND FOOD SUPPLY CHAIN DURING POST COVID-19 67Pushan Kumar Dutta and Susanta Mitra4.1 Introduction 684.2 Related Work 694.3 Smart Production With the Introduction of Drones and IoT 724.4 Agricultural Drones 754.5 IoT Acts as a Backbone in Addressing COVID-19 Problems in Agriculture 774.6 Conclusion 815 IOT AND MACHINE LEARNING-BASED APPROACHES FOR REAL TIME ENVIRONMENT PARAMETERS MONITORING IN AGRICULTURE: AN EMPIRICAL REVIEW 89Parijata Majumdar and Sanjoy Mitra5.1 Introduction 905.2 Machine Learning (ML)-Based IoT Solution 905.3 Motivation of the Work 915.4 Literature Review of IoT-Based Weather and Irrigation Monitoring for Precision Agriculture 915.5 Literature Review of Machine Learning-Based Weather and Irrigation Monitoring for Precision Agriculture 925.6 Challenges 1125.7 Conclusion and Future Work 1136 DEEP NEURAL NETWORK-BASED MULTI-CLASS IMAGE CLASSIFICATION FOR PLANT DISEASES 117Alok Negi, Krishan Kumar and Prachi Chauhan6.1 Introduction 1176.2 Related Work 1196.3 Proposed Work 1216.4 Results and Evaluation 1246.5 Conclusion 1277 DEEP RESIDUAL NEURAL NETWORK FOR PLANT SEEDLING IMAGE CLASSIFICATION 131Prachi Chauhan, Hardwari Lal Mandoria and Alok Negi7.1 Introduction 1317.2 Related Work 1367.3 Proposed Work 1397.4 Result and Evaluation 1427.5 Conclusion 1448 DEVELOPMENT OF IOT-BASED SMART SECURITY AND MONITORING DEVICES FOR AGRICULTURE 147Himadri Nath Saha, Reek Roy, Monojit Chakraborty and Chiranmay Sarkar8.1 Introduction 1488.2 Background & Related Works 1508.3 Proposed Model 1558.4 Methodology 1608.5 Performance Analysis 1658.6 Future Research Direction 1668.7 Conclusion 1679 AN INTEGRATED APPLICATION OF IOT-BASED WSN IN THE FIELD OF INDIAN AGRICULTURE SYSTEM USING HYBRID OPTIMIZATION TECHNIQUE AND MACHINE LEARNING 171Avishek Banerjee, Arnab Mitra and Arindam Biswas9.1 Introduction 1729.2 Literature Review 1759.3 Proposed Hybrid Algorithms (GA-MWPSO) 1779.4 Reliability Optimization and Coverage Optimization Model 1799.5 Problem Description 1819.6 Numerical Examples, Results and Discussion 1829.7 Conclusion 18310 DECRYPTION AND DESIGN OF A MULTICOPTER UNMANNED AERIAL VEHICLE (UAV) FOR HEAVY LIFT AGRICULTURAL OPERATIONS 189Raghuvirsinh Pravinsinh Parmar10.1 Introduction 19010.2 History of Multicopter UAVs 19210.3 Basic Components of Multicopter UAV 19310.4 Working and Control Mechanism of Multicopter UAV 20710.5 Design Calculations and Selection of Components 21010.6 Conclusion 21811 IOT-ENABLED AGRICULTURAL SYSTEM APPLICATION, CHALLENGES AND SECURITY ISSUES 223Himadri Nath Saha, Reek Roy, Monojit Chakraborty and Chiranmay Sarkar11.1 Introduction 22411.2 Background & Related Works 22611.3 Challenges to Implement IoT-Enabled Systems 23211.4 Security Issues and Measures 24011.5 Future Research Direction 24311.6 Conclusion 24412 PLANE REGION STEP FARMING, ANIMAL AND PEST ATTACK CONTROL USING INTERNET OF THINGS 249Sahadev Roy, Kaushal Mukherjee and Arindam Biswas12.1 Introduction 25012.2 Proposed Work 25412.3 Irrigation Methodology 25712.4 Sensor Connection Using Internet of Things 25912.5 Placement of Sensor in the Field 26312.6 Conclusion 267References 268Index 271

Regulärer Preis: 170,99 €
Produktbild für The Digital Notebook

The Digital Notebook

To keep information snippets in a notebook that can't be lost, that always stays up to date, that does not get dog-ears, can reach any size and takes texts, pictures, videos and sounds, shares and finds them quickly - that would be great! You have such a notebook in Windows 10, but only few use it. If you want to make it communicate with Outlook, take Office OneNote to unfold the whole potential of co-operation. There are only two types of people: the ones who love OneNote and the others who do not know it yet. It's easy to learn. In this booklet you'll find all important topics. With a short introduction to Class Notebook, a special version for education purposes.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €
Produktbild für Office365

Office365

The new office package is continuously changing. New features are supplied frequently and provide new possibilities to users and administrators alike. This booklet supplies all novelties in Word, Excel, Outlook and PowerPoint - and entirely the novelties. It makes it easy for you to make up your mind what's in for you and what new possibilities will be at your disposal. You remain on top of the game!Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 1,99 €
Produktbild für Splunk Certified Study Guide

Splunk Certified Study Guide

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field extraction, field aliases and macros, and Splunk tags. You will be able to make your own data model and prepare an advanced dashboard in Splunk.In the second part, you will explore the Splunk Admin certification. There will be in-depth coverage of Splunk licenses and user role management, and how to configure Splunk forwarders, indexer clustering, and the security policy of Splunk. You’ll also explore advanced data input options in Splunk as well as .conf file merging logic, btool, various attributes, stanza types, editing advanced data inputs through the .conf file, and various other types of .conf file in Splunk.The concluding part covers the advanced topics of the Splunk Admin certification. You will also learn to troubleshoot Splunk and to manage existing Splunk infrastructure. You will understand how to configure search head, multi-site indexer clustering, and search peers besides exploring how to troubleshoot Splunk Enterprise using the monitoring console and matrix.log. This part will also include search issues and configuration issues. You will learn to deploy an app through a deployment server on your client’s instance, create a server class, and carry out load balancing, socks proxy, and indexer discovery.By the end of the Splunk Certified Study Guide, you will have learned how to manage resources in Splunk and how to use REST API services for Splunk. This section also explains how to set up Splunk Enterprise on the AWS platform and some of the best practices to make them work efficiently together.The book offers multiple choice question tests for each part that will help you better prepare for the exam.WHAT YOU WILL LEARN* Study to pass the Splunk User, Power User, and Admin certificate exams* Implement and manage Splunk multi-site clustering* Design, implement, and manage a complex Splunk Enterprise solution* Master the roles of Splunk Admin and troubleshooting* Configure Splunk using AWSWHO THIS BOOK IS FORPeople looking to pass the User, Power User, and Enterprise Admin exams. It is also useful for Splunk administrators and support engineers for managing an existing deployment.Deep Mehta is a AWS Certified Associate Architect, Docker Certified Associate, Certified Splunk Architect (ongoing), and Certified Splunk User, Power User, and Admin. He’s worked on the Splunk platform since 2017 having experience consulting in the telecommunication, aviation, and healthcare industries. Apart from being passionate about big data technologies, he also loves playing squash and badminton.PART 1: SPLUNK ARCHITECTURE , SPLUNK SPL(SEARCH PROCESSING LANGUAGE) AND SPLUNK KNOWLEDGE OBJECTSGOAL: In this module, readers will be given a detailed idea about current splunk architecture.They will learn how to fire splunk queries using splunk SPL(Search Processing Language) and will look into all the modules provided by splunk to analyze data and will cover all modules necessary to pass power user exam which covers splunk knowledge objects in detail.This module is basic module where we create base for candidate to pass splunk admin exam.Chapter 1: Overview Of SplunkChapter 2: Splunk Search Processing LanguageChapter 3: Macros,Field Extraction and Field AliasesChapter 4: Tags,Lookups and Correlating EventsChapter 5: Datamodels,Pivot and CIM in SplunkChapter 6: Knowledge Manager and Dashboard in SplunkChapter 7: Splunk User/Power User Exam setPART 2: SPLUNK DATA ADMINISTRATION AND SYSTEM ADMINISTRATIONGOAL: In this module data & system administration are designed in a way that will focus on very important topics that will help candidates to pass splunk admin exam.We will study the roles of a splunk admin. In this module, we will understand the concepts behind splunk Licenses and role management, configuring splunk forwarders, clustering in splunk, getting advanced data input and updating .conf file.Chapter 8: Splunk Licenses, Indexes and role ManagementChapter 9: Machine Data using Splunk forwarder and clusteringChapter 10: Splunk Advanced Data InputsChapter 11: Splunk Advanced .Conf file and DiagChapter12: Splunk Admin Exam setPART 3: ADVANCED SPLUNKGOAL: In this part we will explore some features that are very useful for splunk admins in day to day life like infrastructure planning with search head clustering , troubleshooting in splunk,Advanced Deployment, Roles of splunk architect and splunk best practices . By the end of this module, readers will gain a more advanced insight of splunk.Chapter 13: Infrastructure planning with Indexer and Search Head ClusteringChapter 14: Troubleshooting in SplunkChapter 15: Advanced Deployment in SplunkChapter 16: Advanced SplunkChapter 17: Final Practice setChapter 18: Setting up a Splunk Environment with AWS

Regulärer Preis: 56,99 €
Produktbild für Zero Trust Security

Zero Trust Security

Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security architecture for your organization and implement a step-wise journey that delivers significantly improved security and streamlined operations.Zero Trust security has become a major industry trend, and yet there still is uncertainty about what it means. Zero Trust is about fundamentally changing the underlying philosophy and approach to enterprise security—moving from outdated and demonstrably ineffective perimeter-centric approaches to a dynamic, identity-centric, and policy-based approach.Making this type of shift can be challenging. Your organization has already deployed and operationalized enterprise security assets such as Directories, IAM systems, IDS/IPS, and SIEM, and changing things can be difficult. ZERO TRUST SECURITY uniquely covers the breadth of enterprise security and IT architectures, providing substantive architectural guidance and technical analysis with the goal of accelerating your organization‘s journey to Zero Trust.WHAT YOU WILL LEARN* Understand Zero Trust security principles and why it is critical to adopt them* See the security and operational benefits of Zero Trust* Make informed decisions about where, when, and how to apply Zero Trust security architectures* Discover how the journey to Zero Trust will impact your enterprise and security architecture* Be ready to plan your journey toward Zero Trust, while identifying projects that can deliver immediate security benefits for your organizationWHO THIS BOOK IS FORSecurity leaders, architects, and practitioners plus CISOs, enterprise security architects, security engineers, network security architects, solution architects, and Zero Trust strategistsJASON GARBIS is Senior Vice President of Products at Appgate, a leading provider of Zero Trust secure access solutions. At Appgate, he is responsible for the company's security product strategy and product management. He has over 30 years of product management, engineering, and consulting experience at security and technology firms. He is also co-chair of the SDP Zero Trust Working Group at the Cloud Security Alliance, leading research and publication initiatives. He holds a CISSP certification, a BS in computer science from Cornell University, and an MBA from Northeastern University.JERRY W. CHAPMAN is Engineering Fellow, Identity Management at Optiv Security. With over 25 years of industry experience, Jerry has successfully guided numerous clients in the design and implementation of their enterprise IAM strategies, in ways that align with both security and business objectives. His job roles have spanned enterprise architecture, solution engineering, and software architecture and development. As an IAM industry expert, Jerry provides guidance, support, and thought leadership across Optiv cybersecurity practice areas, with a focus on positioning Identity and Data as a core component within enterprise security architectures. He is a key spokesperson for Optiv’s Zero Trust strategy, and frequently speaks at conferences and other industry events. Jerry is active in the technical working group at the Identity Defined Security Alliance (IDSA), where he was the group’s original Technical Architect. Jerry is a certified Forrester Zero Trust Strategist, has a BS in Computer Information Systems from DeVry University and is currently pursuing a degree in Applied Mathematics from Southern New Hampshire University.

Regulärer Preis: 56,99 €
Produktbild für Outlook 365: as your personal Assistant

Outlook 365: as your personal Assistant

Nope, it won't make you a coffee right now. But Outlook can write, sort and tag your mail, find lost items, maybe throw away stuff instantly or re-present it at the time you find it suitable. More than that, Outlook can organize appointments, deliver route planning, present pictures of your contacts and much more.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 1,99 €
Produktbild für GitHub - Eine praktische Einführung

GitHub - Eine praktische Einführung

GitHub - praktisch und anschaulich erklärt. Von den ersten Schritten bis zu eigenen GitHub Actions.GitHub ist derzeit die größte Internetplattform für Open-Source-Entwicklungsprojekte und bietet ein grafisches Webinterface mit vielen Funktionen für die gemeinsame Arbeit sowie interessante Community-Features. Technisch setzt es auf der bekannten Versionsverwaltung Git auf.Aber was ist ein Repository, Branch, Commit, Pull-Request oder Fork? Wie lege ich ein eigenes Projekt an? Was muss ich beim Mergen beachten und wann sind »etwas Git« oder Actions und Apps ein guter nächster Schritt?Einsteiger*innen lernen alle wichtigen Werkzeuge und Begriffe kennen, spielen typische Arbeitsschritte durch und erhalten über die Funktionalität der Plattform hinaus viele Infos und Praxistipps. Mit diesem verständlichen und humorvollen Leitfaden gelingt der unfallfreie Einstieg in die Open-Source-Welt – garantiert.GitHub – die Plattform kennenlernen Die Oberfläche erkunden und einen eigenen Account anlegenDas erste GitHub-Projekt Mit Repositories, Issues und Branches arbeiten, Pull-Requests erstellen und mergenOpen-Source-Lizenzen Unterschiede verstehen und eine passende Lizenz auswählenAuf eigenen und fremden Projekten zusammenarbeiten Projekte für Mitstreiter attraktiver machen, Maintainer einsetzen, Pull-Requests einreichen und Projekte forkenEinstieg in Git Git installieren und wichtige Befehle ausprobierenGit und GitHub im Zusammenspiel Projekte mit GitHub und Git bearbeiten und synchron halten, Repositories forken und Merge-Konflikte lösenMit Actions und Apps effizienter arbeiten Apps und Actions aus dem Marketplace installieren und eine eigene Action programmieren

Regulärer Preis: 24,90 €
Produktbild für Big Breaches

Big Breaches

The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone—not just techies—to become informed and empowered on the subject of cybersecurity.In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book.You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur.Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book’s expert insights and be prepared for the future of cybersecurity.WHO THIS BOOK IS FORThose interested in understanding what cybersecurity is all about, the failures have taken place in the field to date, and how they could have been avoided. For existing leadership and management in enterprises and government organizations, existing professionals in the field, and for those who are considering entering the field, this book covers everything from how to create a culture of security to the technologies and processes you can employ to achieve security based on lessons that can be learned from past breaches.DR. NEIL DASWANI is Co-Director of the Stanford Advanced Security Certification program, and is President of Daswani Enterprises, his security consulting and training firm. He has served in a variety of research, development, teaching, and executive management roles at Symantec, LifeLock, Twitter, Dasient, Google, Stanford University, NTT DoCoMo USA Labs, Yodlee, and Telcordia Technologies (formerly Bellcore). At Symantec, he was Chief Information Security Officer (CISO) for the Consumer Business Unit, and at LifeLock he was the company-wide CISO. Neil has served as Executive-in-Residence at Trinity Ventures (funders of Auth0, New Relic, Aruba, Starbucks, and Bulletproof). He is an investor in and advisor to several cybersecurity startup companies and venture capital funds, including Benhamou Global Ventures, Firebolt, Gravity Ranch Ventures, Security Leadership Capital, and Swift VC. Neil is also co-author of Foundations of Security: What Every Programmer Needs to Know (Apress).Neil's DNA is deeply rooted in security research and development. He has dozens of technical articles published in top academic and industry conferences (ACM, IEEE, USENIX, RSA, BlackHat, and OWASP), and he has been granted over a dozen US patents. He frequently gives talks at industry and academic conferences, and has been quoted by publications such as The New York Times, USA Today, and CSO Magazine. He earned PhD and MS degrees in computer science at Stanford University, and he holds a BS in computer science with honors with distinction from Columbia University.DR. MOUDY ELBAYADI has more than 20 years of experience and has worked with a number of high-growth companies and across a variety of industries, including mobile and SaaS consumer services, and security and financial services. Having held C-level positions for leading solution providers, Dr. Elbayadi has a unique 360-degree view of consumer and enterprise SaaS businesses. He has a consistent track record of defining technology and product strategies that accelerate growth.As CTO of Shutterfly, Dr. Elbayadi oversees all technology functions including product development, cybersecurity, DevOps, and machine learning/AI R&D functions. In this capacity he is leading the technology platform transformation. Prior to Shutterfly, Dr. Elbayadi held the position of SVP, Product & Technology for Brain Corp, a San Diego-based AI company creating transformative core technology for the robotics industry.As advisor, Dr. Elbayadi has been engaged by CEOs and senior executives of companies ranging from $10M to $2B in revenues. Representative engagements include public cloud strategy, platform integration and M&A strategy. He has advised numerous VC firms on technology and prospective investments.Dr. Elbayadi earned a doctorate in leadership and change from Antioch University, a master’s degree in organizational leadership from Chapman University, and a master’s degree in business administration from the University of Redlands.PART I: THE BIGGEST BREACHESThe goal of this part is to explain, in plain English, the biggest breaches in recent years, focusing on what has resulted in everything from exposure of the majority of American consumers’ financial identities to a foreign power more than significantly “influencing” the election of our most recent President. The breaches will be covered in reverse chronological order of the years in which the breaches were made public (even though some of them occurred prior), and in the summary section, I’ll also comment on the relevance and implications of the actual years in which the breaches took place.CHAPTER 1: THE FIVE KEY ROOT CAUSESThis chapter reviews the five basic root causes that we’ll see in all the mega-breaches that will be reviewed in subsequent chapters.* Phishing* Malware* Third-party compromise (suppliers, customers, and partners, as well as acquisitions)* Software Vulnerabilities (application security as well as third-party vulnerabilities)* Inadvertent employee mistakesCHAPTER 2: THE CAPITAL ONE BREACH IN 2019On July 29, 2019, court documents were released regarding a security breach at Capital One that exposed data for over 105 million people. A lone hacker gained access to highly sensitive data including names, social security numbers, addresses, and dates of birth. This hack is just one example in which over a hundred million customer records have been exposed to the entire Internet.* The Modern Day Datacenter: The Cloud and Hybrid Clouds* Erratic: Former Amazon Web Services employee* The Firewall Hack* The Ex-Filtration* The Simple Mistakes* The Charges & The FalloutCHAPTER 3: CAMBRIDGE ANALYTICA & FACEBOOKThe goal of this chapter is to cover two issues that both involved Facebook. The first issue is how Cambridge Analytica, a data analytics firm that assisted President Trump's presidential campaign, abused Facebook to harvest data on 70 million U.S. consumers to create psychographic profiles of them and target ads to influence voting. The second issue is how a vulnerability in Facebook’s “View As” feature (that allows users to see how their profiles look to the public) was exploited to allow for the take over of approximately 50 million Facebook accounts. The sections in this chapter will also set the groundwork for the Facebook hacking of the 2016 election by the Russians.* How Facebook Works* How Facebook Makes Money Through Ads* Political Ads* Security Challenges with Ads: Abusive Targeting, Bad Ads, Malvertising, and Click Fraud* Facebook’s Third-Party Apps and APIs* Cambridge Analytica Harvesting* Bungled Remediation of Harvested Data* The “View As…” Vulnerability * Remediation of the “View As…” VulnerabilityCHAPTER 4: THE MARRIOTT HACK IN 2018The Marriott hack disclosed in 2018 has been the second largest breach of all time as it involved 383 million records, and is only second to Yahoo’s hack of 3 billion email accounts which we’ll describe in see Chapter 8. Passport numbers, and the location history of hundreds of millions of people was amongst the data stolen in the breach. Combined with stolen data from the US Government’s Office of Personnel Management breach (described in Chapter 7), one can even derive the location histories or potentially even impersonate some CIA agents and spies.* Marriott and Starwood* DBA Account Takeover* Malware: Remote Access Trojan and Mimikatz* Starwood Guest Reservation Database ExfiltrationCHAPTER 5: THE EQUIFAX HACK IN 2017The credit histories of 145M+ American consumers were stolen in 2017 in the largest breach of financial identity in history.* Vulnerability Management Problems* Apache Struts and CVE-2017-5638* The Overall State of Information Security at Equifax* The Hack* The Blundered Response* The ImpactCHAPTER 6: THE FACEBOOK HACK IN THE 2016 PRESIDENTIAL ELECTIONThis chapter describes the organized Russian disinformation campaign in which Facebook was weaponized to distribute over 5 million paid ads that focused on dividing the American public and influencing votes in the 2016 Presidential election.Dezinformatsiya: Inherently Russian * Lack of Regulatory Oversight for Social Media (as compared to TV advertising)* Russian Facebook Ads* The Internet Research Agency: Kremlin-backed Online Troll Farm (amongst 228 groups)Weaponization of Ad Targeting: Swing States (Pennsylvania, Virginia, and Wisconsin) * Suspicious Advertisers: Over 9,500* Fancy Bear: Indictments of 13 Russian IndividualsCHAPTER 7: THE DEMOCRATIC NATIONAL COMMITTEE HACK IN 2016Just as significant as the disinformation advertising campaign was the infiltration and subsequent leaks of over 150,000 emails from the Democratic National Committee.* Trump’s Request* Massive Phishing Campaign* How John Podesta Got Phished: 60,000 Emails Stolen* Additional Phishing Emails: 150,000 Emails Stolen* Guccifer 2.0* WikiLeaks* Key Emails and Information Leaked* ImpactCHAPTER 8: THE OFFICE OF PERSONNEL MANAGEMENT HACK IN 2015The SF-86 background check files of over 20 million government employees (including CIA, NSA, FBI, and other agents) which also included information about their friends, family, and neighbors, as well as over 5 million fingerprints were stolen and exfiltrated by a foreing nation state.* What was stolen* Impact* Root causes* How it could have been preventedCHAPTER 9: THE YAHOO HACK IN 2013 AND 2014 (MADE PUBLIC IN 2016)The largest breach in the history of the Internet and the world occured in 2013 and 2014 when attackers compromised Yahoo’s email and other systems.* Spear phishing * Malware to grow footprint* Cookie minting* Yahoo Account Management Tool Compromise* Targeting of Politicians and Diplomats* Financial Impact and Verizon Acquisition* Former KGB Agents and IndictmentsCHAPTER 10: HOLISTIC IMPLICATIONS* Political Impact* Financial Impact* Regulatory Impact* Technology ImpactPART II: HOW TO RECOVERFor each of the root causes of breaches, we’ll suggest countermeasures for each going forward. Phishing attacks can be successfully combated with better preventative countermeasures. Malware can unfortunately only be detected better, as no one can altogether stop adversaries from authoring malicious software. Existing software vulnerabilities also cannot be prevented, but their detection, containment, and recovery can be managed much more reliably or automated. Vulnerabilities in new applications, as well as other types of software, can be prevented through the introduction of building codes for software, as well as tools to support the development of software that meets those building codes. Finally, vulnerabilities in third-party suppliers can be recursively managed using the approaches that we’ve outlined here.In this second part of the book, technologies that are critical to the roadmap to recovery are explained in plain English. In addition, the contributions that people in various roles need to make and the processes that need to be put in place by those people will also be covered.CHAPTER 11: BETTER PREVENTATIVE COUNTERMEASURESPassword Managers, Multi-factor Authentication, and Yubico-like Hardware Tokens * Authentication Providers (Current as well as potential future e.g. FIDO Alliance)* Automated Patching: Endpoints, Servers, and IoT. Browsers (e.g., Chrome) are a great example of how this can be done right. Mac OS X updates are also a great example, even if a bit inconvenient sometimes. Servers and IoT need help. Mirai botnet from 2016 exhibits the urgency. IoT Guidelines.* Building Codes for SoftwareCHAPTER 12: DETECTION: IDENTITY MONITORING* Difference between credit monitoring and identity monitoring* Dark Web Monitoring* New Account Creation Vs. Account TakeoverCHAPTER 13: DETECTION: BAD ADS, FAKE NEWS, AND ANTI-MALVERTISINGThe goal of this chapter is to focus on detection of bad ads, fake news, and malware that attempt to enter and distribute itself through the online advertising ecosystem.* Bad Ads* Fake News* Malicious software: cannot be prevented, only detection. Not to mention Turing undecidability.CHAPTER 14: CONTAINMENT AND RECOVERY: HOW TO MAKE THE STOLEN DATA USELESSFor any and all information that has been stolen to date, we should attempt to make the stolen data useless. While that can’t be done for all data, and time will be required for some data (perhaps even a generation or two) to become fully obsolete, as in the case of stolen background information, it is will worth the effort to render certain data to be ineffective. For instance, SSNs are currently treated as secrets and are used for authentication of users. However, since most of the SSNs in the country have been stolen, they should not be treated as secrets, and alternative methods for actual authentication should be used. SSNs can still be used as identifiers, but knowledge of someone’s SSN should not allow you to transact as then. A similar argument can be made for the typical questions asked in KBA (knowledge based answer) quizzes. On the other hard, in addition to something a user knows, something that a user has (the user’s cell phone), or something that the user “is” (such as a biometric fingerprint authentication) should be used to authenticate a user. Apple Touch ID, for instance, is a step in the right direction.CHAPTER 15: CYBERSECURITY INVESTMENTS: MADE TO-DATEOver $45 billion has been invested in cybersecurity companies to date, yet the mega-breaches continue. This chapter covers where all this money has been going, and what defenses have been invested in thus far. The chapter also addresses which of the root causes have received what amounts of investment thus far, and whether or not we’ve seen any reductions in those breaches and why or why not.CHAPTER 16: CYBERSECURITY INVESTMENTS: WHAT’S NEED GOING FORWARDThis chapter analyzes what areas of cybersecurity are ripe for further investment. Areas such as cloud security, and artificial intelligence applications to security have received less private equity and public IPO investment as compared to, say, network security and probably warrant more investment going forward.CHAPTER 17: ADVICE TO LEADERSHIPToday, the most security-savvy organizations have their CSO report directly to the CEO, and have regular reporting on security topics to the board of directors. Some CSOs, for instance, report out the state of the information security program to the audit committee once per quarter, and to the full board of directors once per year. This section provides advice to such leaders on how to explain security either to a board of directors or any level of management in between such that the return on investment for security initiatives can be measured, and explained in English in an understandable fashion, often using analogies where necessary.CHAPTER 18: APPLYING YOUR SKILLS TO THE FIELD OF CYBERSECURITYThis section discusses how professionals in various roles (people managers, project managers, product managers, software developers, IT administrators) can get into the field, as well as apply their skills to make contributions to cybersecurity. There are many opportunities for them to strategically apply their skills but also provide critical tactical support when required.This section provides people managers, project managers, software developers, IT administrators, in addition to product managers advice on how they can best leverage their skill sets to achieve security.CONCLUSION / SUMMARY

Regulärer Preis: 34,99 €
Produktbild für Extending Gatsby

Extending Gatsby

Expand your Gatsby development skills by building a production-ready blog website. This book teaches you how to use Gatsby alongside the latest technologies including MDX, CDN, and Netlify.In this project, you will create a very complex and large blog site with just MDX files and learn to optimize images using CDN for faster website loading. You will also learn to continuously deploy to Netlify enabling you to provide daily site updates easily. To get the most out of this book you should be comfortable with the basics of React and familiar with Gatsby fundamentals as covered in Foundation Gatsby Projects, which provides several stepping stone projects.Rather than cover how to create a simple blog site, Extending Gatsby goes beyond the basics to extend your blogging skills.WHAT YOU'LL LEARN* Develop a production-ready, complex, blogging system site with MDX* Learn to make a complete mobile site* Continuously deploy your site using Netlify* Add functionalities with the powerful Gatsby plugin ecosystemWHO THIS BOOK IS FORThis book is for developers who are familiar with Gatsby and are looking to create an extended blog site. Knowledge of React is expected. You will also need to be familiar with JavaScript concepts and be confident with basic web development.Nabendu Biswas is a full stack JavaScript developer who has been working in the IT industry for the past 15 years and has worked for some of the world’s top development firms and investment banks. He is a passionate tech blogger who publishes on dev.to and medium.com and on thewebdev.tech. He is an all-round nerd, passionate about everything JavaScript, React and Gatsby. You can find him on Twitter @nabendu82.Chapter 1: Setting Up the Blog SiteChapter 2: Adding Gatsby-plugin-mdx to the SiteChapter 3: Adding Author Details to the SiteChapter 4: Adding Functionality to the SiteChapter 5: Adding a Series FeatureChapter 6: Deploying the Site in NetlifyChapter 7: Adding Gatsby Plugins to the SiteChapter 8: New Features and Fixes

Regulärer Preis: 39,99 €
Produktbild für Windows Containers for IT Pros

Windows Containers for IT Pros

This book has everything you need to know about Windows Containers, from an IT pro and ops perspective.Containers are the next big thing in IT infrastructure. More and more, we see companies relying on Kubernetes implementations to run their workloads on-premises, in the cloud, or even in hybrid deployments. IT pros and ops teams are now faced with the challenge of getting up to speed on container architecture, knowing how it differs from virtual machines (VMs), and the best means and practices for managing their applications in containers.WINDOWS CONTAINERS FOR IT PROS explores all of that, from the IT pro experience. You will approach learning about containers through the optics of an author who is accustomed to deploying virtual machines (VMs). You will learn about differences, parallel practices, use cases, and how to get started and go deep into day 2 operations.WHAT YOU WILL LEARN* Architect and deploy Windows Containers leveraging existing skills* Containerize existing applications* Know best practices for managing resources in Windows Containers* Get comfortable moving containers to the cloud with Azure* Understand the options for using containers on AzureWHO THIS BOOK IS FORWindows IT pros and technical professionals deploying Windows Server and server applications today, such as .NET, ASP.NET, IIS, and more. This book assumes little to no experience with scripting as readers deploy their workloads via one of the Windows UIs (Hyper-V, Server Manager, Windows Admin Center, etc.). Knowledge of VMs and infrastructure, such as clustered operating systems, is recommended but not required.VINICIUS RAMOS APOLINARIO is Senior Program Manager on the Windows Container Platform team at Microsoft that builds the container platform that runs on Windows Server and Azure. He has been a Microsoft professional for most of his career and holds multiple certifications from Microsoft, VMware, Exin, and others. Vinicius is passionate about passing on his knowledge and contributes to the community via blogs, events, and articles. He is a published author who is regularly seen out in the community or at trade events presenting on various topics.Chapter 1: Introduction to ContainersChapter 2: Getting Started with Windows Containers and DockerChapter 3: Containerizing Existing ApplicationsChapter 4: Managing Resources in Windows ContainersChapter 5: Container Management with Windows Admin CenterChapter 6: Moving Your Containers to the Cloud with Microsoft Azure

Regulärer Preis: 62,99 €
Produktbild für How to avoid mistakes

How to avoid mistakes

Nobody intends to make mistakes. Still, they happen. Sometimes users may not be aware of requirements or make typos. What begins as a small error, later leads to unnecessary work that costs time, money, and nerves. Here, you’ll learn how to guide users in a way that makes errors less likely or even impossible. Or to inform them on input what’s required. In other cases, you may want to prepare data for decision making in a way that one does not need actual typing anymore. And of course, there are the new cloud functionalities of Excel 365 opening new dimensions of co-operations. All of this is explained here.Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €
Produktbild für Hands-on GitHub Actions

Hands-on GitHub Actions

Implement continuous integration/continuous delivery (CI/CD) workflows for any application you develop through GitHub Actions. This book will give you an in-depth idea of implementation patterns, solutions for different technology builds, guidelines to implement your own custom components as actions, and usage of features available with GitHub Actions workflows, to set up CI/CD for your repositories.Hands-on GitHub Actions starts with an introduction to GitHub actions that gives an overview on CI/CD followed by an introduction to its workflows. Next, you will learn how to use variables in a GitHub workflow along with tokens via a REST API. Further, you will explore artifacts and caching dependencies in GitHub and use artifacts in subsequent jobs. Using self-hosted runners is discussed next where you will set up your own hardware and software to run GitHub actions. You will go through publishing packages and migrate to Azure DevOps Pipelines. Along the way, you will use Redis service and PostgreSQL service containers and create custom actions. Finally, you will work with GitHub apps and understand the syntax reference for GitHub Actions and workflows.WHAT YOU WILL LEARN* Create workflows for any platform and any language with GitHub Actions* Develop custom GitHub actions to enhance features and usage of database and service containersUse hosted runners and create self-hosted runners for GitHub workflows * Use GitHub Package registry with GitHub Actions to share and use packagesWHO THIS BOOK IS FORDevOps teams who want to build quality CI/CD workflows.CHAMINDA CHANDRASEKARA is a Microsoft Most Valuable Professional (MVP) for Visual Studio ALM and Scrum Alliance Certified ScrumMaster®, and focuses on and believes in continuous improvement of the software development life cycle. He is the Cloud Development and DevOps Architect at eKriegers (Pvt) Ltd. Chaminda is an active Microsoft Community Contributor (MCC) who is well recognized for his contributions in Microsoft forums, TechNet galleries, wikis, and Stack Overflow and he contributes extensions to Azure DevOps Server and Services (former VSTS/TFS) in the Microsoft Visual Studio Marketplace. He also contributes to other open source projects in GitHub. Chaminda has published six books with Apress.PUSHPA HERATH is a Microsoft Most Valuable Professional (MVP) working as a Senior DevOps Engineer at 99x. She has many years of experience in Azure DevOps Server and Services (formerly VSTS/TFS), Azure cloud platform and QA Automation. She is an expert in DevOps currently leading Sri Lanka DevOps community, and she has shown in depth knowledge in Azure cloud platform tools in her community activities. She has published four books with Apress and spoken in community evets as well as in the youtube channel of her Sri Lanka DevOps community. Pushpa blogs on technology at DevOps Adventure.CHAPTER 1: INTRODUCTION TO GITHUB ACTIONSCHAPTER GOAL: Give conceptual overview on CI CD while elaborating on the need of software delivery automation and basic concepts of GitHub Actions.NO OF PAGES: 15SUB -TOPICS1. Introducing Concepts (CI/CD)2. Why we need SW Delivery Automation?3. What are GitHub Actions?4. Identifying core concepts in GitHub Actions5. GitHub hosted runners.CHAPTER 2: GETTING STARTED WITH GITHUB ACTIONS WORKFLOWSCHAPTER GOAL: Introduction to GitHub Actions workflows.NO OF PAGES: 25SUB - TOPICS1. Using preconfigured workflow templates2. Using Marketplace Actions to create workflows3. Building a .NET Core Web App with GitHub Actions4. Understanding the structure of a Workflow (jobs, actions, set job dependencies etc.)5. Setting up continuous integration using GitHub actionsCHAPTER 3: VARIABLES AND SECRETS WITH GITHUB ACTIONSCHAPTER GOAL: Lessons to provide hands-on guidance using variables and secrets in a GitHib workflow.NO OF PAGES : 15SUB - TOPICS:1. Defining and using variables2. Understanding the default variables usage3. Naming conventions for variables4. Defining and using secretsCHAPTER 4: USING TOKENSCHAPTER GOAL: Understanding the use of system token and the personal access tokens to work with GitHub repos and issues via the REST API in GitHub Actions workflow.NO OF PAGES: 15SUB - TOPICS:1. Using GITHUB_TOKEN2. Creating a Personal Access Token3. Using Personal Access Token in workflowCHAPTER 5: ARTIFACTS AND CACHING DEPENDENCIESNO OF PAGES: 20SUB - TOPICS:1. Storing content in Artifacts2. Using artifacts in subsequent jobs3. Uploading to external artifact store and using them in other workflows4. Deleting artifacts5. Caching workflow dependencies (compare caching and artifacts, using cache action and matching cache keys)6. Limitations and eviction policy in cachingCHAPTER 6: USING SELF-HOSTED RUNNERSCHAPTER GOAL: Setting up your own hardware and software to run GitHub actions..NO OF PAGES: 30SUB - TOPICS:1. Understanding self-hosted runners2. Configuring and adding/removing self-hosted runners GitHub.3. Self-hosted runners with proxy4. Using labels to organize self-hosted runners5. Using self-hosted runners in workflows6. Monitoring and access control for self-hosted runnersCHAPTER 7: PUBLISHING PACKAGES AND MIGRATING FROM AZURE DEVOPS PIPELINESCHAPTER GOAL: How to create and publish packages in GitHub actions and migrating pipelines from Azure DevOps pipelines.NO OF PAGES: 20SUB - TOPICS:1. Creating and publishing build artifacts as nuget2. Using custom packages in workflows3. Using GitHub Packages4. Migrating Azure PipelinesCHAPTER 8: USING DATABASE AND SERVICE CONTAINERSCHAPTER GOAL: Hands on lessons on using Redis service containers and PostgreSQL service containers.NO OF PAGES: 20SUB - TOPICS:1. Running Redis jobs on containers2. Running Redis jobs on runner machine3. Using Redis service container4. Running PostgreSQL jobs on containers5. Running PostgreSQL jobs on runner machine6. Using PostgreSQL service containerCHAPTER 9: CREATING CUSTOM ACTIONSCHAPTER GOAL: Step by step guidance to create your own GitHub actions.NO OF PAGES: 20SUB - TOPICS:1. Understanding action types2. Steps to create a simple action3. Creating Docker container action4. Publishing actions to marketplaceCHAPTER 10: GITHUB APPSCHAPTER GOAL: Using and creating GitHub Apps in workflows.NO OF PAGES: 30SUB - TOPICS:1. Understanding GitHub Actions and Apps2. Creating GitHub Apps3. Using GitHub AppsCHAPTER 11: SYNTAX REFERENCE FOR GITHUB ACTIONS AND WORKFLOWSCHAPTER GOAL: Syntax guide for GitHub Actions and Workflows.NO OF PAGES: 15SUB - TOPICS:1. Understanding Workflow Syntax2. Triggers for Workflows3. Using context and expressions4. Workflow commands

Regulärer Preis: 46,99 €
Produktbild für .NET Developer's Guide to Augmented Reality in iOS

.NET Developer's Guide to Augmented Reality in iOS

Attention .NET developers, here is your starting point for learning how to create and publish augmented reality (AR) apps for iOS devices.This book introduces and explores iOS augmented reality mobile app development specifically for .NET developers. The continued adoption and popularity of Xamarin, a tool that allows cross-platform mobile application development, opens up many app publishing opportunities to .NET developers that were never before possible, including AR development.You will use Xamarin to target Apple’s augmented reality framework, ARKit, to develop augmented reality apps in the language you prefer—C#. Begin your journey with a foundational introduction to augmented reality, ARKit, Xamarin, and .NET. You will learn how this remarkable collaboration of technologies can produce fantastic experiences, many of them never before tried by .NET developers. From there you will dive into the fundamentals and then explore various topics and AR features. Throughout your learning, proof of concepts will be demonstrated to reinforce learning.After reading this book you will have the fundamentals you need, as well as an understanding of the overarching concepts that combine them. You will come away with an understanding of the wide range of augmented reality features available for developers, including the newest features included in the latest versions of ARKit.WHAT YOU WILL LEARN* Create rich commercial and personal augmented reality mobile apps* Explore the latest capabilities of ARKit* Extend and customize chapter examples for building your own amazing apps* Graduate from traditional 2D UI app interfaces to immersive 3D AR interfacesWHO THIS BOOK IS FORDevelopers who want to learn how to use .NET and C# to create augmented reality apps for iOS devices. It is recommended that developers have some Xamarin experience and are aware of the cross-platform options available to .NET. A paid Apple developer account is not needed to experiment with the AR code samples on your devices.LEE ENGLESTONE is an innovative, hands-on software development manager and technical lead, based in Stockport, England. He has been a .NET developer for many years, writing code for Windows, web, mobile, cloud, and augmented reality applications in his spare time. He believes that there are many new exciting opportunities for developers in the area of augmented reality and is excited to share them with his fellow .NET developers. In recognition of his community contributions, he has been awarded a Microsoft MVP in Developer Technologies.CHAPTER 1 - SETTING UP YOUR ENVIRONMENTCHAPTER 2 - BASIC CONCEPTSCHAPTER 3 - NODES, GEOMETRIES, MATERIALS, AND ANCHORSCHAPTER 4 - BUILT IN AR GUIDESCHAPTER 5 - ANIMATIONSCHAPTER 6 - CONSTRAINTSCHAPTER 7 - LIGHTINGCHAPTER 8 - VIDEO AND SOUNDCHAPTER 9 - PLANE DETECTIONCHAPTER 10 - IMAGE DETECTIONCHAPTER 11 - FACE TRACKING AND EXPRESSION DETECTIONCHAPTER 12 - TOUCH GESTURES AND INTERACTIONCHAPTER 13 - 3D MODELSCHAPTER 14 - PHYSICSCHAPTER 15 - OBJECT DETECTIONCHAPTER 16 - BODY TRACKINGCHAPTER 17 - PUBLISHING TO THE APP STORE

Regulärer Preis: 62,99 €
Produktbild für Getting Inside Java - Beginners Guide

Getting Inside Java - Beginners Guide

ABOUT THE BOOK:This textbook was written with two primary objectives. The first is to introduce the Java programming language. Java is a practical and still-current software tool; it remains one of the most popular programming languages in existence, particularly in areas such as embedded systems. Java facilitates writing code that is very efficient and powerful and, given the ubiquity of Java compilers, can be easily ported to many different platforms. Also, there is an enormous code-base of Java programs developed, and many systems that will need to be maintained and extended for many years to come. The second key objective is to introduce the basic concepts of OOPs.Hope, It will be helpful. All the Best!-Prem KumarABOUT THE AUTHOR:Destiny drew Prem Kumar towards computers when the IT industry was just making a big evolution in India. Having completed his education from Silli Polytechnic in Computer Science Engineering. He moved on with his higher studies from Gandhi Institute for Technology, Bhubaneshwar.Prem has a passion for exploring IT knowledge and is founder of well-growing, a startup company "F5 Developers". He is a much sought after speaker on various technology subjects and is a regular columnist for Open Source and OSE Hub. His current affiliations include being a Founder of F5 Developers, a multi-service provider company including the subsidiary companies of F5, i.e, THOR, F5 Initiative and OSE Hub. In recognition to his contribution Microsoft awarded him the prestigious “Microsoft Technology Associate” award in 2019 for Java Programming. He can be reached at premkmr1611@gmail.com.

Regulärer Preis: 7,83 €
Produktbild für AWS for Solutions Architects

AWS for Solutions Architects

One of the most popular cloud platforms in the world, Amazon Web Services (AWS) offers hundreds of services with thousands of features to help you build scalable cloud solutions; however, it can be overwhelming to navigate the vast number of services and decide which ones best suit your requirements. Whether you are an application architect, enterprise architect, developer, or operations engineer, this book will take you through AWS architectural patterns and guide you in selecting the most appropriate services for your projects. AWS for Solutions Architects is a comprehensive guide that covers the essential concepts that you need to know for designing well-architected AWS solutions that solve the challenges organizations face daily. You'll get to grips with AWS architectural principles and patterns by implementing best practices and recommended techniques for real-world use cases. The book will show you how to enhance operational efficiency, security, reliability, performance, and cost-effectiveness using real-world examples. By the end of this AWS book, you'll have gained a clear understanding of how to design AWS architectures using the most appropriate services to meet your organization's technological and business requirements.

Regulärer Preis: 29,99 €
Produktbild für Versionsverwaltung mit Git

Versionsverwaltung mit Git

* Von grundlegenden Funktionen über die Handhabung von Branches und Remote-Repositorys bis zu Tipps und Tricks für (nicht nur) alltägliche Funktionen * Auswahl sinnvoller Workflows und Einsatz in Teams * Git-Repositorys hosten mit GitHub und GitLab Git ist in der Softwareentwicklung bereits weit verbreitet – sowohl in Firmen als auch in Open-Source-Projekten. Zum Einstieg lernen Anfänger häufig nur die wichtigsten Befehle, die schnell nicht mehr ausreichen, vor allem wenn die ersten Fehler auftreten. Dieses Buch behandelt einerseits die gängigen Befehle, die Sie beim täglichen Arbeiten mit Git brauchen. Andererseits geht es dem Autor auch darum, dass Sie Git als Ganzes verstehen, um es effektiv im Entwicklungsprozess einsetzen zu können. Der Fokus des Buchs liegt auf dem praktischen Arbeiten mit Git. Sie lernen anhand eines Projekts, welche Befehle es gibt, wie diese arbeiten und wie Sie auftretende Probleme lösen können. Neben alltäglichen Funktionen finden Sie auch seltener gebrauchte Kommandos, die aber ebenfalls wichtig sind. Dabei legt der Autor großen Wert auf die Einbindung und Anpassung des Entwicklungsprozesses. Im zweiten Teil des Buchs werden fortgeschrittene Themen behandelt. Der Schwerpunkt liegt auf dem Einsatz von Git in Teams. Darunter etwa das Hosten verteilter Repositorys mit GitHub und GitLab. Ein weiteres Kapitel behandelt die Workflows, die je nach Anzahl der beteiligten Personen, Branches und Repositorys eines Projekts variieren. Darüber hinaus gibt Ihnen der Autor hilfreiche Informationen für den Umstieg von Subversion, einen Überblick über grafische Git-Programme, Hinweise für eine langfristig nachvollziehbare Git-Historie sowie eine Einführung in DevOps, wofür Git die technische Grundlage bildet. Ein Kapitel zu häufig gestellten Fragen rundet diesen Praxiseinstieg ab. Das Buch richtet sich sowohl an blutige Einsteiger als auch an erfahrene Leser. Aus dem Inhalt: * Konfiguration * Arbeiten mit Branches * Verteilte Repositorys * Hosting mit GitHub und GitLab * Workflows * Hooks * Umstieg von Subversion * Zahlreiche Tipps für die tägliche Arbeit * Grafische Clients * Tipps für nachvollziehbare Git-Historien * Frequently Asked Questions * Einstieg in DevOps * Befehlsreferenz

Regulärer Preis: 29,99 €
Produktbild für Building Custom Tasks for SQL Server Integration Services

Building Custom Tasks for SQL Server Integration Services

Build custom SQL Server Integration Services (SSIS) tasks using Visual Studio Community Edition and C#. Bring all the power of Microsoft .NET to bear on your data integration and ETL processes, and for no added cost over what you’ve already spent on licensing SQL Server. New in this edition is a demonstration deploying a custom SSIS task to the Azure Data Factory (ADF) Azure-SSIS Integration Runtime (IR).All examples in this new edition are implemented in C#. Custom task developers are shown how to implement custom tasks using the widely accepted and default language for .NET development.Why are custom components necessary? Because even though the SSIS catalog of built-in tasks and components is a marvel of engineering, gaps remain in the available functionality. One such gap is a constraint of the built-in SSIS Execute Package Task, which does not allow SSIS developers to select SSIS packages from other projects in the SSIS Catalog. Examples in this book show how to create a custom Execute Catalog Package task that allows SSIS developers to execute tasks from other projects in the SSIS Catalog. Building on the examples and patterns in this book, SSIS developers may create any task to which they aspire, custom tailored to their specific data integration and ETL needs.WHAT YOU WILL LEARN* Configure and execute Visual Studio in the way that best supports SSIS task development* Create a class library as the basis for an SSIS task, and reference the needed SSIS assemblies* Properly sign assemblies that you create in order to invoke them from your task* Implement source code control via Azure DevOps, or your own favorite tool set* Troubleshoot and execute custom tasks as part of your own projects* Create deployment projects (MSIs) for distributing code-complete tasks* Deploy custom tasks to Azure Data Factory Azure-SSIS IRs in the cloud* Create advanced editors for custom task parametersWHO THIS BOOK IS FORFor database administrators and developers who are involved in ETL projects built around SQL Server Integration Services (SSIS). Readers do not need a background in software development with C#. Most important is a desire to optimize ETL efforts by creating custom-tailored tasks for execution in SSIS packages, on-premises or in ADF Azure-SSIS IRs.ANDY LEONARD is Chief Data Engineer at Enterprise Data & Analytics, an SSIS trainer, consultant, developer of the Data Integration Lifecycle Management (DILM) Suite, a Business Intelligence Markup Language (Biml) developer, and BimlHero. He is a SQL Server database and data warehouse developer, community mentor, engineer, and occasional farmer. He is co-author of Apress books SQL Server Integration Services Design Patterns and The Biml Book, and author of the Apress book Data Integration Life Cycle Management with SSIS and the Stairway to Integration Services series at SQLServerCentral.com.1. The Story of This Book2. Preparing the Environment3. Creating the Assembly Project4. Check-In the Project Code5. Signing the Assembly6. Preparing to Build7. Coding the Task8. Coding a Simple Task Editor9. Signing and Binding10. Expanding Editor Functionality11. Minimal Coding for the Complex Editor12. Editor Integration13. Implement Views and Properties14. Implement New Connection15. Implement Use32bit, Synchronized, and LoggingLevel SettingsView Properties16. Refactoring SourceConnection17. Refactoring the SSIS Package Hierarchy18. Instrumentation and Validation19. Crushing Bugs20. Adding Synchronous Execution Properties21. Testing the Task22. Building the Setup Project23. Using the Execute Catalog Package Task in an SSIS Framework24. Deploying to Azure-SSIS25. Test the Task in Azure Data Factory26. Notes from my Experience

Regulärer Preis: 46,99 €
Produktbild für Der Computer erscheint im Holozän

Der Computer erscheint im Holozän

Die sieben Weltwunder wurden bereits in der Antike beschrieben, etwa zur selben Zeit wie die mechanische Rechenhilfe Abacus, ein Zählrahmen mit Holz- oder Glasperlen. Dieses Buch beschreibt und diskutiert die sieben Weltwunder der IT, ohne die unsere digitale Wirtschaft und Gesellschaft kaum überlebensfähig scheint: Computermaus, Datenbanken, Kryptografie, Graphgrammatiken, Internet, Blockchain und Soft Computing.Jedes Weltwunder der IT wird kurz charakterisiert, bevor Anwendungsoptionen für Wirtschaft und Gesellschaft exemplarisch aufgezeigt und gewürdigt werden.Das Werk richtet sich an alle, die sich mit der digitalen Transformation auseinandersetzen. Es soll helfen, digitale Entwicklungen im eigenen Unternehmen, in der Verwaltung oder im öffentlichen wie im privaten Leben zu positionieren und zu reflektieren.ANDREAS MEIER hat Musik an der Musikakademie in Wien und Mathematik an der ETH in Zürich studiert, wo er doktorierte und habilitierte. Er arbeitete in internationalen Forschungsinstitutionen und Organisationen und war an der Universität Fribourg, Schweiz für eBusiness und eCommerce verantwortlich. Er gründete und leitete das Forschungszentrum Fuzzy Management Methods (FMsquare.org).FABRICE TSCHUDI hat Kommunikationswissenschaften an der Universität Fribourg und Wirtschaftsinformatik an der Universität Bern studiert. Er setzt sich für eine Vision von digitalen Systemen ein, die zu einer lebensdienlichen Wirtschaft und Gesellschaft im Sinne von nachhaltigem Wohlergehen beitragen. Er begleitet Organisationen auf dem Weg zu „wertvoller Digitalisierung“ und ist überzeugt, dass partizipative Lern- und Arbeitsformate hierfür ein zentraler Erfolgsfaktor sind.De septem mundi miraculis - Vom Abacus zur digitalen Rechenmaschine - Die 7 Weltwunder der IT - Wo führt die Reise hin? - Literatur

Regulärer Preis: 49,99 €