Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Building Secure Firmware

Building Secure Firmware

Use this book to build secure firmware.As operating systems and hypervisors have become successively more hardened, malware has moved further down the stack and into firmware. Firmware represents the boundary between hardware and software, and given its persistence, mutability, and opaqueness to today’s antivirus scanning technology, it represents an interesting target for attackers.As platforms are universally network-connected and can contain multiple devices with firmware, and a global supply chain feeds into platform firmware, assurance is critical for consumers, IT enterprises, and governments. This importance is highlighted by emergent requirements such as NIST SP800-193 for firmware resilience and NIST SP800-155 for firmware measurement.This book covers the secure implementation of various aspects of firmware, including standards-based firmware—such as support of the Trusted Computing Group (TCG), Desktop Management Task Force (DMTF), and Unified Extensible Firmware Interface (UEFI) specifications—and also provides code samples and use cases. Beyond the standards, alternate firmware implementations such as ARM Trusted Firmware and other device firmware implementations (such as platform roots of trust), are covered.WHAT YOU WILL LEARN* Get an overview of proactive security development for firmware, including firmware threat modeling* Understand the details of architecture, including protection, detection, recovery, integrity measurement, and access control* Be familiar with best practices for secure firmware development, including trusted execution environments, cryptography, and language-based defenses* Know the techniques used for security validation and maintenanceWho This Book Is ForGiven the complexity of modern platform boot requirements and the threat landscape, this book is relevant for readers spanning from IT decision makers to developers building firmwareJIEWEN YAO is a principal engineer in the Intel Architecture, Graphics, and Software Group. He has been engaged as a firmware developer for over 15 years. He is a member of the UEFI Security sub team, and the TCG PC Client sub working group. He has presented at industry events such as the Intel Developer Forum, UEFI Plugfest, and RSA conference. He worked with co-author Vincent Zimmer to publish 30 “A Tour Beyond BIOS” technical papers for tianocore.org and firmware.intel.com. He holds 40 US patents.VINCENT ZIMMER is a senior principal engineer in the Intel Architecture, Graphics, and Software Group. He has been engaged as a firmware developer for over 25 years and leads the UEFI Security sub team. He has presented at industry events such as the Open Source Firmware Conference, Linux Fest Northwest, Intel Developer Forum, UEFI Plugfest, Open Compute Project Summit, BlackHat Las Vegas, BSides Seattle, Toorcon, and Cansecwest. In addition to collaborating with Jiewen Yao on many white papers, he has co-authored several books on firmware, papers, and over 400 issued US patents.PART 1: OVERVIEWCHAPTER 1: INTRODUCTION SECURITYThreat ModelDesignValidationCHAPTER 2: INTRODUCTION HOST FIRMWAREIndustry StandardBoot Flow / Phase hand-offMinimal Firmware RequirementHardware ROTCPU/silicon initPCI resource allocation.prepare platform info (memmap/ACPI)Jump to OS.Runtime Interface (SMM, UEFI Runtime, ASL)General Principle - Protect / Detect / RecoveryPART 2: BOOT SECURITYCHAPTER 3: FIRMWARE RESILIENCE - PROTECTIONFlash LockFlash Wear outCapsule Flow (*)Signed UpdateCHAPTER 4: FIRMWARE RESILIENCE - DETECTIONBoot Flow (*)Intel Boot GuardOBB VerificationUEFI Secure BootLocalRemoteTXT- SX(coreboot)CHAPTER 5: FIRMWARE RESILIENCE – RECOVERYRecovery Flow (*)Signed RecoveryTop SwapRollback, SVNsCHAPTER 6: OS/LOADER RESILIENCEPlatform RecoveryOS Recovery(Android Verified Boot)CHAPTER 7: TRUSTED BOOTMeasured Boot Flow (*)SRTM (Boot Guard)DRTM (TXT)TPM1.2/2.0Physical PresenceMOR / Secure MORCHAPTER 8: AUTHENTICATIONUser AuthenticationHDD PasswordOPAL PasswordCHAPTER 9: S3 RESUMES3 resume flow (*)LockBoxCHAPTER 10: DEVICE SECURITYPCI Bus (*)DMA protectionDevice MeasurementDevice AuthenticationDevice firmware updateCHAPTER 11: SILICON SECURITY CONFIGURATIONFlash SPI lockSMM LockBAR LockChapter: Supply Chain (Vincent)OEM/ODM/BIOS vendor/IHVOpen sourceFingerprintingManufacturing flow to shipmentPART 3: DATA SECURITYCHAPTER 12: UEFI KERNELDXE/PEI Core (*)Heap GuardStack GuardNX protectionEnclaveCHAPTER 13: MANAGEMENT MODESMM Core (*)SMM Communication (*)StandaloneMM (*)MMIO ProtectionSecure SMM CommunicationIntel Runtime ResilienceSTM (SMI Transfer Monitor)Chapter: UEFI Variable (Vincent)AuthenticationVariable LockVariable CheckVariable Quota ManagementConfidentialityIntegrity and RollbackTPM BindingRPMBRPMCPART 4: MISCELLANEOUSCHAPTER 14: GENERAL CODING PRACTICEBuffer OverflowBanned APIInteger OverflowSafeInt libChapter: Cryptograph (Vincent)Hash usage in firmwareEncryption usage in firmwareSigning & verification usage in firmwareChapter 15: Compiler Defensive TechnologyStack CookieNon-ExecutableAddress Space RandomizationControl Flow Integrity (CFI) / Control Flow Enforcement (CET)Runtime Check (stack/un-initialized data/integer overflow)Chapter: Race Condition (Vincent)BSP/AP handling in UEFIBSP/AP handling in SMMTOC/TOUCHAPTER 16: INFORMATION LEAKSide ChannelMDSSMMCHAPTER 17: PROGRAMMING LANGUAGEC LanguageRust LanguagePart: Security TestCHAPTER 18: HBFAHardware EmulationSecurity Unit TestFuzzing (AFL)Static analysisCHAPTER 19: CHIPSECConfiguration CheckSMI FuzzingVariable fuzzingWhitelisting/BlacklistingPART 5: OTHERCHAPTER 20: CONCLUSIONPART 6: APPENDICESSecure coding checklistSecure review checklistAPI summaryPART 7: REFERENCES

Regulärer Preis: 56,99 €
Produktbild für Practical System Programming with C

Practical System Programming with C

This book teaches system programming with the latest versions of C through a set of practical examples and problems. It covers the development of a handful of programs, implementing efficient coding examples.Practical System Programming with C contains three main parts: getting your hands dirty with multithreaded C programming; practical system programming using concepts such as processes, signals, and inter-process communication; and advanced socket-based programming which consists of developing a network application for reliable communication.You will be introduced to a marvelous ecosystem of system programming with C, from handling basic system utility commands to communicating through socket programming. With the help of socket programming you will be able to build client-server applications in no time.The “secret sauce” of this book is its curated list of topics and solutions, which fit together through a set of different pragmatic examples; each topic is covered from scratch in an easy-to-learn way. On that journey, you’ll focus on practical implementations and an outline of best practices and potential pitfalls. The book also includes a bonus chapter with a list of advanced topics and directions to grow your skills.WHAT YOU WILL LEARN* Program with operating systems using the latest version of C * Work with Linux* Carry out multithreading with C Examine the POSIX standards* Work with files, directories, processes, and signals* Explore IPC and how to work with itWHO THIS BOOK IS FORProgrammers who have an exposure to C programming and want to learn system programming. This book will help them to learn about core concepts of operating systems with the help of C programming..Sri Manikanta Palakollu is a programmer and software developer with experience in C, C++, Java, and Python as well as Linux, POSIX, and other operating system-level programming. He is a tech reviewer for various tech book publishers. Sri also contributes to various open source projects.1. Introduction to Linux Environment• Getting familiar with Linux Kernel• Linux Kernel V/S Other OS Kernels.• File Handling Utilities• Process Utilities• Network Utilities• Backup Utilities.2. Implementation of Multithreading with C• Introduction to Threads• Threads V/S process• Introduction to Multithreading.• Importance of Multithreading.• Support of Multithreading in C• Creation of threads.• Practical Examples of Multithreading.• Use cases of Multithreading.3. Getting Started with System Programming• Understanding the POSIX Standard.• Introduction to API’s• Importance of API’s• Inbuilt API’s in C4. Files and Directories• Basic concepts in files• Files meta i-nodes• System Calls for Files• I/O Operations for Files• File Permissions.• Soft and Hard Links• System call for Directories.5. Processes and Signals• Introduction to process Environment• Environment Variables• Kernel Support for Processes• Process Creation• Concept of the Zombie process• Concept of Orphan Process• System Calls for Process management• Introduction to Signals• System calls for signals• Types of Signals6. Inter process Communication (IPC)• Introduction to IPC• Types of IPC• Creation of Named PIPES• Creation of UN-Named PIPES• Concept of Message Queues• Implementation of Message Queues• Concept of Semaphore• Implementation of Semaphore.• API for Named and unnamed PIPES• API for Message Queues• API for Semaphore.7. Shared Memory• Introduction to Shared Memory.• Kernel Support for Shared Memory.• Implementation of Shared Memory.• API for Shared Memory.8. Socket Programming• Introduction to Sockets• IPC Over Networks• API for Socket Programming• OSI Layer Protocol• TCP/IP Protocol• Client Server Architecture.• System calls for Socket Programming.• Implementation of Single Client Server Architecture.• Implementation of Multiple Client Server Architecture.9. Advanced Topics and Directions.

Regulärer Preis: 62,99 €
Produktbild für Practical Glimpse

Practical Glimpse

Learn how to edit images and create compelling digital art with Glimpse, the newest open source alternative to Adobe Photoshop and GIMP. This book explores Glimpse's broad selection of tools and features that can create beautiful (raster) digital art; painting, drawings, and art created from photos by applying one of the many filters to create artistic effects.You will quickly become acquainted with this powerful program and understand how to use workspace tools and layers. You will learn step-by-step how to correct exposure, digitally retouch and repair damaged photos, and handle just about any photo editing task—even colorizing grayscale images. Practice files are provided with step-by-step instructions to jump into photo editing and art creation.Glimpse is a powerful program that is a viable alternative to Adobe Photoshop and other proprietary software. The possibilities of the art one can create are almost limitless—get started with it using this book today.WHAT YOU'LL LEARN* Navigate the Glimpse workspace* Use layers, which are essential in any professional quality image editing program* Work with the varied tools that Glimpse offers* Enhance, retouch, and modify digital images* Restore and repair damaged family photos, and create composites such as replacing backgrounds* Create compelling digital artwork using the drawing tools and by applying artistic filtersWHO THIS BOOK IS FORAnyone desiring to learn serious image editing with Glimpse. It can be used by both fledgling and professional photographers, freelance graphic designers, students, genealogists, and more. Because it’s free, it can be especially advantageous to teachers, students, and small business owners on a budget.PHILLIP WHITT is an author, photo retouch professional and graphic designer. He is the author of several Apress books and video tutorials pertaining to image editing using GIMP and Adobe Photoshop Elements. He has edited, retouched, and restored countless digital images since the late 1990s. He has served both clients from the general public and a number of commercial clients over the years. In addition to over 20 years of image editing and graphic design experience, he also has an Expert Rating Certification in Adobe Photoshop Skills, and VTC certifications in GIMP and Scribus.PART I. ACQUIRING, INSTALLING, AND GETTING TO KNOW GLIMPSE1. An Overview of Glimpse2. Layers, Channels, Paths, and Undo History3. An Overview of the ToolsPART II. WORKING WITH DIGITAL PHOTOS4. Correcting Exposure and Contrast5. Enhancing, Correcting, and Working with Color6. Modifying, Retouching, and Restoring Photos7. Compositing ImagesPART III. CREATING DIGITAL ART.8. Drawing Basics9. Creating Digital Artwork.10. Using Artistic Filters

Regulärer Preis: 46,99 €
Produktbild für Systems and Network Infrastructure Integration

Systems and Network Infrastructure Integration

IT infrastructures are now essential in all areas and sectors of human activity; they are the cornerstone of any information system. Thus, it is clear that the greatest of care must be given to their design, implementation, security and supervision in order to ensure optimum functionality and better performance. Within this context, Systems and Network Infrastructure Integration presents the methodological and theoretical principles necessary to successfully carry out an integration project for network and systems infrastructures. This book is aimed at anyone interested in the field of networks in general. In particular, it is intended for students of fields relating to networks and computer systems who are called upon to integrate their knowledge and skills, gained throughout their academic study, into a comprehensive project to set up a complete infrastructure, while respecting the necessary specifications.SAIDA HELALI is a university lecturer in Information Technology (specializing in networks and information systems) at the Institut Supérieur des Etudes Technologiques de Radès (Tunisia). He holds an ACREDITE master's degree (Analysis, Conception and Research in the Domain of Educational Technology Engineering), which was jointly awarded by the Université de Cergy-Pontoise (France), the Université de MONS (Belgium) and the Université de Genève (Switzerland). In 2017, he was chair of the Tunisian branch of the IEEE Education Society and he is also an acting member of AIPU TUNISIE, an international association about university pedagogy.Preface ixCHAPTER 1. INTRODUCTION TO PROJECT MANAGEMENT 11.1. Introduction 11.2. Project management 21.3. Project management methods and tools 31.3.1. Gantt diagram 51.3.2. RACI (Responsible, Accountable, Consulted, Informed) matrix 51.3.3. The concept of specifications 61.4. Chapter summary 8CHAPTER 2. SIMULATING NETWORK ARCHITECTURES WITH GNS3 92.1. Introduction 92.2. Definition 102.3. Introduction to GNS3 112.3.1. Functionalities of GNS3 122.3.2. Limitations 122.3.3. GNS3 installation 122.3.4. Getting started with GNS3 132.4. Chapter summary 25CHAPTER 3. GREEN IT 273.1. Introduction 273.2. Introduction of concept 283.3. Green IT trigger factors 293.4. Benefits of Green IT 293.5. The lifecycle of ICTs 303.6. Mechanisms and technical solutions for the implementation of a Green IT infrastructure 313.7. Green IT labels and standards 333.8. Some examples of Eco-ICTs 343.9. Chapter summary 36CHAPTER 4. DESIGN OF NETWORK INFRASTRUCTURES 374.1. Introduction 374.2. The founding principles of networks 384.2.1. Definition and preliminaries 384.2.2. Classification of digital data networks 394.2.3. Components of a network 404.2.4. Measuring network performance 454.2.5. Concepts of collision domain/broadcast domain and VLANs 474.3. Methods and models of IT network design 484.3.1. Principles of structured engineering 484.4. Assessment of needs and choice of equipment 544.5. Chapter summary 56CHAPTER 5. NETWORK SERVICES 575.1. Introduction 575.2. DHCP service 585.2.1. Introduction 585.2.2. Operating principle 585.2.3. Renewal of lease 625.2.4. The concept of a DHCP relay 625.3. DNS service 635.3.1. Introduction 635.3.2. Operating principle 635.4. LDAP service 665.4.1. Introduction 665.4.2. LDAP protocol 675.4.3. LDAP directory 685.5. E-mail service 705.5.1. Introduction 705.5.2. Architecture and operating principle. 715.5.3. Protocols involved 725.6. Web server 735.6.1. Introduction 735.6.2. Operating principle 735.6.3. The principle of virtual hosting 745.7. FTP file transfer service 765.7.1. Definition 765.7.2. Operating principle 775.7.3. Types 775.8. Chapter summary 78CHAPTER 6. SYSTEM AND NETWORK SECURITY 796.1. Introduction 796.2. Definitions, challenges and basic concepts 806.3. Threats/attacks 826.3.1. Access attacks 826.3.2. Modification attacks 836.3.3. Saturation attacks 836.3.4. Repudiation attacks 836.4. Security mechanisms 836.4.1. Encryption tools 846.4.2. Antivirus programs 846.4.3. Firewalls/IDS and IPS 846.4.4. VPNs 866.4.5. Other means of security 896.5. Security management systems: norms and security policies 916.5.1. Norms 916.5.2. The idea of security policy 926.6. Chapter summary 93CHAPTER 7. VIRTUALIZATION AND CLOUD COMPUTING 957.1. Introduction 957.2. Virtualization 967.2.1. Definition 967.2.2. Benefits of virtualization 967.2.3. Areas of application 977.2.4. Categories of virtualization 1007.2.5. Limits of virtualization 1037.3. Cloud computing 1037.3.1. Definitions 1037.3.2. Leverage factors and generic principles 1047.3.3. Architecture models 1047.3.4. Types of cloud 1077.3.5. Areas of application 1097.3.6. Advantages and limitations 1107.4. Chapter summary 111CHAPTER 8. QUALITY OF SERVICE AND HIGH AVAILABILITY 1138.1. Introduction 1138.2. Quality of service 1148.2.1. Motivation 1148.2.2. Definition(s) 1158.2.3. Objectives of QoS 1168.2.4. Metrics of QoS 1178.2.5. General principles of QoS 1188.2.6. QoS mechanisms 1208.3. High availability 1418.3.1. Redundancy in the physical layer 1438.3.2. Redundancy in the data link layer 1438.3.3. Redundancy in the network layer 1498.3.4. Redundancy in the application layer 1548.4. Chapter summary 156CHAPTER 9. MONITORING SYSTEMS AND NETWORKS 1579.1. Introduction 1579.2. Main concepts of network and service supervision 1589.2.1. Definition 1589.2.2. Challenges of monitoring 1589.2.3. Typology 1599.3. Monitoring protocols 1619.3.1. SNMP protocol (Simple Network Management Protocol) 1619.3.2. WMI (Windows Management Instrumentation) 1649.3.3. WS-Management (Web Services for Management) 1649.3.4. IPMI (Intelligent Platform Management Interface) 1649.3.5. NetFlow/IPFIX 1659.3.6. Netconf 1659.4. Monitoring tools 1659.4.1. Commercial monitoring solutions (HP OpenView, Tivoli) and software publisher solutions 1669.4.2. Free monitoring solutions 1679.5. Chapter summary 171References 173Index 179

Regulärer Preis: 139,99 €
Produktbild für Learn Rails 6

Learn Rails 6

Effectively learn and apply software development and engineering techniques to web application development using Rails 6 with this accelerated tutorial. This book teaches modern engineering practices including git flow, containerization, debugging, testing, and deployment. Along the way, you’ll see how to build a social network application and then deploy it on a cloud provider such as Amazon Web Services.After reading and using this book, you'll be able to effectively build and deploy your Rails application to the cloud. You’ll also have used the Ruby on Rails framework to carry out the rapid development of an idea into a product without sacrificing quality.WHAT YOU WILL LEARN* Use the Ruby on Rails 6 web development framework* Integrate Docker with your Ruby on Rails code* Apply software engineering techniques to learning the Rails framework* Design, build, and deploy a social networking application to the Amazon cloudWHO THIS BOOK IS FORBeginners with at least some prior programming experience. Ruby experience is helpful, but not required.ADAM NOTODIKROMO (formerly Adam Pahlevi Baihaqi) is a software engineer committed to creating working and technically well-written apps. With his colleagues in Indonesia and Germany, he is building their company together: Sonasign. He lives in Meguro, Tokyo to enjoy bowls of Yokohama-style ramen and also dry tantanmen. He works with kind teammates at Autify.PART 1: INTRODUCTION TO RUBY AND RAILSCHAPTER 1: HELLO, RAILS· The world before the Rails· Favorite things I gained from Rails· Increased Signal-to-Noise ratio· Testability since Day 1· Programmer happiness· Installing Docker on Windows· Installing Docker on Ubuntu Linux· Installing Docker on MacOS· Creating simple containerized Rails app· MVC architecture· Deploying to Heroku· Git workflowCHAPTER 2: RUBY QUICK CRASH COURSE· What kind of a language is Ruby?· Interactive console· Number· String· Making a Class· Public functions· Private and protected membership· Instance variables· Constants· Building on a Module· Everything is an Object· Date· Array· Hash· Symbol (after having experience building Hash with Symbol vs String)· Instantiating other objects· Make your own Block (simple way to introduce yield & block, and learn build simple DSL)· Thread· Meta-programmingPart 2: Building a Social Network· What are we building?· Use case diagram· Entity diagramCHAPTER 3: BUILDING THE MODELS· User model· Inserting data· Updating data· Seeking data· Destroying data· Unit-test the model with RSpec· Complex Query· Status model and Has One-to-One relationship· Friendship model and Many-to-Many relationship· Testing up the relationships· Adding validations· Updating table schemaCHAPTER 4: LOGIN CAPABILITIES· Installing Devise· Routing· Layout· Building Sign in and Sign up form· Wiring up the Sign out· Testing up the requestCHAPTER 5: BUILDING POST AND TIMELINE· Building the Timeline· Introduction to Helper· Post a Status!· Integration testing with Capybara· Debugging with PryCHAPTER 6: ADD AS FRIEND· AJAX request· Sending friendship request· Confirming friendship request· Sending email· Background processingCHAPTER 7: DEPLOYING TO AWS· Making an Amazon account· Making an ElasticBeanstalk instance· Setting up deploy script· Seeing it online· How to associate it with a domain name?CHAPTER 8: WHAT NEXT?· Mobile App?· API controllers· Staging environment

Regulärer Preis: 79,99 €
Produktbild für DevOps

DevOps

DevOps, eine Zusammensetzung aus den Begriffen DEVelopment und IT OPerations, ist ein Ansatz, der in vielen Start-ups, aber auch in großen Konzernen erfolgreich ist. DevOps definiert das Zusammenspiel von IT-Entwicklung, IT-Betrieb und dem Kunden mithilfe von Kultur, Werkzeugen und Prozessen neu. Dieses essential vermittelt das Wichtigste, was man dazu wissen muss. Die Autoren sind DevOps-Master und beschäftigen sich seit vielen Jahren mit DevOps sowie der Optimierung von IT-Services.Jürgen Halstenberg ist als Berater und Trainer bei der Maxpert GmbH seit vielen Jahren Teil der DevOps-Community in Deutschland.Dr. Bernd Pfitzinger ist Senior Experte bei der Toll Collect GmbH, Buchautor und Autor zahlreicher Veröffentlichungen.Dr. Thomas Jestädt ist IT-Manager, Buchautor und Lehrbeauftragter an der Technischen Universität Berlin.Einleitung - wozu DevOps?. - Was ist DevOps? - Everything is a Remix. - DevOps-Aktivitäten. - Kulturelle organisationale und kommunikative Aspekte von DevOps. - Wie führt man DevOps ein? - oder: Machen ist wie Wollen, nur krasser!. - DevOps - Kritik. - Zusammenfassung.

Regulärer Preis: 4,99 €
Produktbild für Eigene Chatbots programmieren für Dummies Junior

Eigene Chatbots programmieren für Dummies Junior

In diesem Buch lernst du Schritt für Schritt, wie du mit dem kostenlosen MIT App Inventor einen Chatbot entwickelst. Du erfährst zuerst, was Chatbots eigentlich sind und dass diese als Alexa, Siri, Bixby, Cortana und Google schon um uns sind. Du gehst der Frage nach, auf welche Weise Chatbots intelligent sind. Die erste Chatbot-App, die du nach Anleitung entwickelst, beantwortet eine einfache Frage von dir. Am Ende erzählt der Chatbot Witze. Weitere Beispiele zeigen dir, was sonst noch alles möglich ist: Der Chatbot wird immer schlauer und geht immer besser auf seinen Chatpartner ein. Bestens geeignet für Kinder und Jugendliche ab 10 Jahren. Nadine Bergner ist Professorin für Didaktik der Informatik an der TU Dresden. Sie gründete 2010 das InfoSphere - Schülerlabor Informatik an der RWTH Aachen. Unter ihrer Leitung wurden fast 40 Informatikmodule für Schülerinnen und Schüler der Klassenstufen 3 bis 13 entwickelt, die von Eintagesworkshops bis hin zu einwöchigen Feriencamps reichen. Tausende Kinder und Jugendliche nahmen an den Workshops teil.Thiemo Leonhardt ist Postdoc an der TU Dresden im Bereich "Didaktik der Informatik". Sein wissenschaftliches Interesse gilt insbesondere den Themen e-Learning, Simulationen, Kompetenzentwicklung durch Lernspiele und Educational Datamining.EINLEITUNG 5Hallo, zukünftige Chatbot-Entwicklerin oder zukünftiger Chatbot-Entwickler! 5Über den MIT App Inventor 2 5Über dieses Buch 6Über dich 7Über die Symbole, die wir in diesem Buch verwenden 8KAPITEL 1: WAS SIND CHATBOTS? 9Was ist ein Chatbot? 10Smart Home – alles ist vernetzt 12Sind Chatbots intelligent? 13KAPITEL 2: DEIN ERSTER CHATBOT 15Account anlegen, einloggen, starten 16Starte dein erstes Chatbot-Projekt! 24Ein Chatbot muss bedient werden können: Das Design 25Mit Chatbots reden – die Funktionalität 34Schritt für Schritt zum ersten Gespräch 44Option 1: Den Chatbot auf deinem Smartphone oder Tablet testen 44Option 2: Nur das Design deines Chatbots mittels Emulator testen 50Übers Ziel hinaus – noch mehr Möglichkeiten 52KAPITEL 3: CHATBOTS FÜR EINSTEIGER 53Der Sprachverzerrer 54Der Musik-Chatbot 64Der Sensor-Chatbot 87Sensor-Chatbot mit Beschleunigungssensor 95Sensor-Chatbot mit Lichtsensor 102KAPITEL 4: FÜR FORTGESCHRITTENE 108Schnick-Schnack-Schnuck-Chatbot 109Spieldesign 110Der Chatbot spielt mit 113Timer-Chatbot 125Die Zeitanzeige 126Sensoren für den Timer-Chatbot 130Kommandos geben 132KAPITEL 5: CHATBOTS FÜR PROFIS 146Der Witze-Chatbot 147Das Design 147Die Programmierung 149Der Quiz-Chatbot 153Weitere Ideen 157KAPITEL 6: BLICK ZU DEN PROFIS 159Programmieren mit Tastatur 160Bis zum nächsten Mal 160Zum Wiederfinden 161Über die Autoren 165

Regulärer Preis: 12,99 €
Produktbild für Essential Excel 2019

Essential Excel 2019

Create, edit, sort, analyze, summarize, and format data as well as graph it in Excel 2019. Chock full of visuals, user-friendly instructions, and reader exercises, this in-depth guide makes it easy for you to get on the bandwagon taking advantage of this powerful software and what it can do. ESSENTIAL EXCEL 2019 doesn’t mess around. It provides the most clear and concise, but complete, information you need to successfully use the expansive features of Excel in your work environment.The second edition of this soup-to-nuts book delivers essential how-to and reference information for users who are new to Excel, those who want to continue building their Excel skills, or anyone who wants to get up to speed on the latest changes and features in Excel 2019. It is heavy on the practical examples and light on the theory, providing a step-by-step process of what you need to do when you are working with Excel. You will begin with the basics, advancing as each chapter builds on knowledge from previous chapters. You will appreciate real-life examples and exercises that reinforce what you have learned, and upon finishing the book, you will have the confidence to use much more than the typical 10% that most people use in Excel.WHAT YOU WILL LEARN* Create amazing visualizations of your data* Get up to speed on easy and accurate methods for entering data* Extract the information you want from imported data; manipulate and format it to meet your needs* Export your results to other programs or share with others in the cloud* Organize, summarize, filter, and consolidate your data in multiple ways* Audit, validate, and protect your dataWHO THIS BOOK IS FORAnyone new to Excel or looking to take better advantage of the advanced features of the platformDAVID SLAGER has been a computer programmer for four decades, with a focus on Excel. He also was head of the computer department of a college for many years. He is currently a software manager. David has worked with spreadsheets since their introduction. As a consultant, he developed major e-learning training projects for agriculture and steel businesses and designed a simulation program that trained feed market managers to use analytics to improve their market position. He enjoys working with analytics and solving problems and has taught learners of all ages and levels. David holds an MS in Education, specializing in Instructional Media Development, a BA in Organizational Management, and an associate’s degree in Accounting, as well as many certifications.ANNETTE SLAGER has been involved in data management and employee training in the non-profit and higher education sectors. She has been responsible for coordinating donor stewardship events and processes, and in overseeing information entered into the donor/alumni data system. She has transitioned systems from manual accounting and processing to shared databases, and created learning manuals and training for employees. Annette has a bachelor’s degree in English Literature and a post-baccalaureate certificate in Technical Writing.Chapter 1 – Becoming Acquainted with ExcelChapter 2 – Navigating and Working with WorksheetsChapter 3 – Best Ways to Enter Data and Edit DataChapter 4: Formatting and Aligning DataChapter 5: Different Ways of Viewing and Printing Your WorkbookChapter 6: Understanding BackstageChapter 7: Creating and Using FormulasChapter 8: Excel’s Pre-existing FunctionsChapter 9: Auditing, Validating, and Protecting Your DataChapter 10: Using Hyperlinks, Combining Text, and Working with theStatus BarChapter 11: Transferring and Duplicating Data to Other LocationsChapter 12: Working with TablesChapter 13: Working with ChartsChapter 14: Importing DataChapter 15: Using PivotTables and PivotChartsChapter 16: Geography and Stock Data TypesChapter 17: Enhancing Workbooks with MultimediaChapter 18: Icons, 3D Images and Object GroupingChapter 19: Automating Tasks with Macros

Regulärer Preis: 79,99 €
Produktbild für Software-Prüfung

Software-Prüfung

Die Prüfung der Software – nicht nur des Codes, sondern auch aller Dokumente – ist nach der systematischen Entwicklung die wichtigste Voraussetzung, um gute Software-Produkte zu schaffen. Daran hat sich seit der ersten Auflage dieses Buches im Jahre 1991 nichts geändert, seit der gründlichen Überarbeitung für die fünfte Auflage im Jahre 2003 erst recht nicht.Unser Thema hat durch die Lancierung des Zertifizierungsschemas für Software-Tester in den letzten Jahren eine grössere Öffentlichkeit erhalten. In Deutschland vom German Testing Board e.V. (GTB) und in der Schweiz vom SAQ Swiss Testing Board (STB) erteilte Zertifikate basieren auf dem innerhalb des International Software Testing Qualifications Board (ISTQB) abgestimmten Schema. Mit der Überarbeitung für diese Auflage haben wir die wenigen Lücken gegenüber dem Lehrplan des Basiszertifikats (Foundation Level), die wir finden konnten, geschlossen. Was über den Lehrplan hinaus geht, haben wir, soweit wir es weiterhin für gut und gültig halten, nicht gestrichen.Die grundlegenden Aussagen zur Software-Prüfung haben Bestand. Das Buch wendet sich an die Praktiker. Wenn sie die Inhalte erlernen, können sie sich zertifizieren lassen. Wenn sie die Inhalte beherzigen, können sie ihren Unternehmen mehr Nutzen bringen und haben auch selbst mehr von der Arbeit: Kompetent verrichtete Arbeit führt zum Erfolg, und der macht Spass.

Regulärer Preis: 22,99 €
Produktbild für Building Better PowerShell Code

Building Better PowerShell Code

Learn to write better PowerShell code via short, example-driven tips. This book covers tips to make your PowerShell scripts faster and easier to read all while following proven best practices. Written by a six-time Microsoft MVP and one of the first Microsoft PowerShell MVPs with over a decade of PowerShell experience, Building Better PowerShell Code gives you easily digestible tips you can begin using immediately.The book starts with an overview of some of the most important tips the author can muster which segues into a deeper dive with dozens of examples throughout the book. It takes you through tips such as using community modules, writing better comments, thinking of PowerShell functions as building blocks, and more. You will also see how to use parameters the right way and how to create simple logging code to easily record script activity.You will learn not only how to write better code, but also how to implement some mindset tricks, such as being explicit and specific with code and how to write code that reads well. You’ll get into error handling and also how to make your scripts more secure. Finally, you’ll examine the concept of building PowerShell tools and how to build scripts for speed.Other tips and best practices include:* Building Pester tests* Improving performance through parallel processing * Writing cross-platform scripts* Using filtering properly After reading this book and applying these tips, you will have an expert coding mindset and be able to build PowerShell code that’s efficient, readable, and compliant with many best practices.WHAT YOU WILL LEARN* Implement error handling* Create a logging function* Use regular expressions to search stringsImplement parallel processingWHO THIS BOOK IS FORPowerShell script developers.Adam Bertram is a 20+ year veteran of IT and an experienced online business professional. He’s a consultant, Microsoft MVP, blogger, trainer, published author and content marketer for multiple technology companies.INTRODUCTIONCHAPTER 1. DO THE BASICSPlan Before you CodeDon’t Reinvent the WheelBuild Functions as Building BlocksBuild Re-usable ToolsDon’t Focus Purely on PerformanceBuild Pester testsImplement Error handlingBuild Manageable CodeDon’t Skimp on SecurityLog Script ActivityParameterize EverythingLimit Script and Function InputMaintain Coding StandardsCode in ContextReturn Informative OutputUnderstand Your CodeUse Version ControlWrite for Cross PlatformWrite for the Next PersonUse a Code EditorCHAPTER 2. DON’T REINVENT THE WHEELUse Community ModulesLeverage Others’ workCHAPTER 3: USE VISUAL STUDIO CODEPowerShell Integrated Scripting EnvironmentUsing Visual studio over PowerShell ISECHAPTER 4. PLAN BEFORE YOU CODEWrite Comments Before CodingUse your Code as a Todo ListCHAPTER 5. CREATE BUILDING BLOCKS WITH FUNCTIONSWrite Functions with One, Single GoalBuild Functions with Pipeline SupportSave Commonly-Used, Interactive Functions to Your ProfileCHAPTER 6. PARAMETERIZE EVERYTHINGDon’t Hardcode. Always Use ParametersUse Parameter Sets When All Parameters Should Not be Used at OnceUse a PSCredential Object Rather than a Separate Username and PasswordCHAPTER 7. LOG SCRIPT ACTIVITYUse a Logging FunctionClean up Verbose MessagesCHAPTER 8. BUILD WITH MANAGEABILITY IN MINDDRY: Don’t Repeat YourselfDon’t Store Configuration Items in CodeAlways Remove Dead CodeCHAPTER 9. BE SPECIFICUse Strict ModeDon’t Ignore ErrorsValidate Input ParametersExplicitly Define Parameter TypesEnforce Mandatory ParametersUse the #requires Statement .CHAPTER 10. WRITE FOR THE NEXT PERSONGive your Variables Meaningful NamesString SubstitutionDon’t use Aliases in a ScriptPut functions in Alphabetical Order in a ModuleExplain Regular Expressions with CommentsWrite Comment-Based HelpWeigh the Difference Between Performance and ReadabilityCHAPTER 11. HANDLE ERRORS GRACEFULLYForce Hard-Terminating ErrorsAvoid Using $?Copy $Error[0] to your Own VariableCHAPTER 12. DON’T SKIMP ON SECURITYSign ScriptsUse Scriptblock LoggingNever Store Sensitive Information in Clear Text in CodeDon’t use Invoke-ExpressionUse PowerShell Constrained Language ModeCHAPTER 13. STICK TO POWERSHELLUse Native PowerShell Where PossibleUse PowerShell standard cmdlet namingCHAPTER 14. BUILD TOOLSCode for PortablityWrap Command-Line Utilities in Functions .Force Functions to Return Common Object TypesEnsure Module Functions Cover all the VerbsCHAPTER 15. RETURN STANDARDIZED, INFORMATIVE OUTPUTUse Progress Bars WiselyLeave the Format Cmdlets to the ConsoleUse Write-VerboseUse Write-InformationEnsure a Command Returns One Type of ObjectOnly Return Necessary Information to the PipelineCHAPTER 16. BUILD SCRIPTS FOR SPEEDUse an ArrayList or GenericList .NET Class when Elements Need to be Added to an ArrayUse a Regular Expression to Search Multiple String ValuesDon’t use Write-Host in BulkDon’t use the PipelineUse the .foreach() and .where() Methods .Use Parallel Processing .Use the .NET StreamReader Class When Reading Large Text FilesCHAPTER 17: USE VERSION CONTROLCreate repositories based on a purposeCommit Code changes based on small goalsCreate a branch based on the futureCHAPTER 18. BUILD TESTSLearn the Pester BasicsLeverage Infrastructure TestsAutomate Pester TestsUse PSScriptAnalyzerCHAPTER 19. MISCELLANEOUS TIPSWrite for Cross Platform .Don’t Query the Win32_Product CIM ClassCreate a Shortcut to run PowerShell as Administrator . .Store ‘Formatable’ Strings for Use LaterUse Out-GridView for GUI-based Sorting and FilteringDon’t Make Automation Scripts InteractiveCHAPTER 20. SUMMARY

Regulärer Preis: 56,99 €
Produktbild für Beginning R 4

Beginning R 4

Learn how to use R 4, write and save R scripts, read in and write out data files, use built-in functions, and understand common statistical methods. This in-depth tutorial includes key R 4 features including a new color palette for charts, an enhanced reference counting system (useful for big data), and new data import settings for text (as well as the statistical methods to model text-based, categorical data).Each chapter starts with a list of learning outcomes and concludes with a summary of any R functions introduced in that chapter, along with exercises to test your new knowledge. The text opens with a hands-on installation of R and CRAN packages for both Windows and macOS. The bulk of the book is an introduction to statistical methods (non-proof-based, applied statistics) that relies heavily on R (and R visualizations) to understand, motivate, and conduct statistical tests and modeling.Beginning R 4 shows the use of R in specific cases such as ANOVA analysis, multiple and moderated regression, data visualization, hypothesis testing, and more. It takes a hands-on, example-based approach incorporating best practices with clear explanations of the statistics being done.You will:* Acquire and install R and RStudio* Import and export data from multiple file formats* Analyze data and generate graphics (including confidence intervals)* Interactively conduct hypothesis testing* Code multiple and moderated regression solutionsWHO THIS BOOK IS FORProgrammers and data analysts who are new to R. Some prior experience in programming is recommended.MATT WILEY is a tenured, associate professor of mathematics with awards in both mathematics education and honor student engagement. He earned degrees in pure mathematics, computer science, and business administration through the University of California and Texas A&M systems. He serves as director for Victoria College’s quality enhancement plan and managing partner at Elkhart Group Limited, a statistical consultancy. With programming experience in R, C++, Ruby, Fortran, and JavaScript, he has always found ways to meld his passion for writing with his joy of logical problem solving and data science. From the boardroom to the classroom, Matt enjoys finding dynamic ways to partner with interdisciplinary and diverse teams to make complex ideas and projects understandable and solvable.JOSHUA F. WILEY is a lecturer in the Monash Institute for Cognitive and Clinical Neurosciences and School of Psychological Sciences at Monash University and a senior partner at Elkhart Group Limited, a statistical consultancy. He earned his PhD from the University of California, Los Angeles, and his research focuses on using advanced quantitative methods to understand the complex interplays of psychological, social, and physiological processes in relation to psychological and physical health. In statistics and data science, Joshua focuses on biostatistics and is interested in reproducible research and graphical displays of data and statistical models. Through consulting at Elkhart Group Limited and former work at the UCLA Statistical Consulting Group, he has supported a wide array of clients ranging from graduate students, to experienced researchers, and biotechnology companies. He also develops or co-develops a number of R packages including varian, a package to conduct Bayesian scale-location structural equation models, and MplusAutomation, a popular package that links R to the commercial Mplus software.1: Installing R2: Installing Packages and Using Libraries3: Data Input and Output4: Working with Data5: Data and Samples6: Descriptive Statistics7: Understanding Probability and Distribution8: Correlation and Regression9: Confidence Intervals10: Hypothesis Testing11: Multiple Regression12: Moderated Regression13: Analysts of VarianceBibliography

Regulärer Preis: 62,99 €
Produktbild für SQL Server Data Automation Through Frameworks

SQL Server Data Automation Through Frameworks

Learn to automate SQL Server operations using frameworks built from metadata-driven stored procedures and SQL Server Integration Services (SSIS). Bring all the power of Transact-SQL (T-SQL) and Microsoft .NET to bear on your repetitive data, data integration, and ETL processes. Do this for no added cost over what you’ve already spent on licensing SQL Server. The tools and methods from this book may be applied to on-premises and Azure SQL Server instances. The SSIS framework from this book works in Azure Data Factory (ADF) and provides DevOps personnel the ability to execute child packages outside a project—functionality not natively available in SSIS.Frameworks not only reduce the time required to deliver enterprise functionality, but can also accelerate troubleshooting and problem resolution. You'll learn in this book how frameworks also improve code quality by using metadata to drive processes. Much of the work performed by data professionals can be classified as “drudge work”—tasks that are repetitive and template-based. The frameworks-based approach shown in this book helps you to avoid that drudgery by turning repetitive tasks into "one and done" operations. Frameworks as described in this book also support enterprise DevOps with built-in logging functionality.WHAT YOU WILL LEARN* Create a stored procedure framework to automate SQL process execution* Base your framework on a working system of stored procedures and execution logging* Create an SSIS framework to reduce the complexity of executing multiple SSIS packages* Deploy stored procedure and SSIS frameworks to Azure Data Factory environments in the cloudWHO THIS BOOK IS FORDatabase administrators and developers who are involved in enterprise data projects built around stored procedures and SQL Server Integration Services (SSIS). Readers should have a background in programming along with a desire to optimize their data efforts by implementing repeatable processes that support enterprise DevOps.ANDY LEONARD is Chief Data Engineer at Enterprise Data & Analytics, creator and Data Philosopher at DILM (Data Integration Lifecycle Management) Suite, an Azure Data Factory and SQL Server Integration Services trainer and consultant, and a BimlHero. He is a SQL Server database and data warehouse developer, community mentor, engineer, and farmer. Andy is co-author of SQL Server Integration Services Design Patterns, Data Integration Life Cycle Management with SSIS, and The Biml Book.KENT BRADSHAW is the founder or Tudor Data Solutions, LLC. With over 40 years of IT experience, he is a SQL Server database/ETL developer and database architect with a background is in Medicaid claims, public schools, government, retail, and insurance systems. In 2011, Kent founded Tudor Data Solutions, LLC to pursue new development opportunities which led to his association with Andy Leonard and Enterprise Data & Analytics. In 2017, Kent received the MPP certification for Data Science.PART I: STORED PROCEDURE-BASED DATABASE FRAMEWORKS1. Stored Procedures 1012. Automation with Stored Procedures3. Stored Procedure Orchestrators4. A Stored Procedure-Base Metadata-Driven FrameworkPART II: SSIS FRAMEWORKS5. A Simple Custom File-Based SSIS Framework6. Framework Execution Engine7. Framework Logging8. Azure-SSIS Integration Runtime9. Deploy A Simple Custom File-Based Azure-SSIS Framework10. Framework Logging in ADF11. Fault Tolerance in the ADF Framework

Regulärer Preis: 46,99 €
Produktbild für Learn Blockchain by Building One

Learn Blockchain by Building One

As cryptocurrencies and their underlying data structure, blockchains, become further intertwined in our daily lives, a full understanding of them is essential to anyone who wants to keep up and remain informed of the future of finance. There is no better learning method than a hands-on one, and Learn Blockchain by Building One offers just that.Develop your own blockchain using Python with step-by-step instructions from author Daniel van Flymen, an expert in the field. You will come away with a confident working knowledge of popular cryptocurrencies such as Bitcoin and Ethereum and which foundations make them work. Through helpful exercises and real-world examples, you will understand the core concepts of peer-to-peer networking, proof of work, hashing, encryption, and digital signatures.Learn Blockchain by Building One gives you timely, real-world lessons in blockchain and cryptocurrencies that you will need as our modern society becomes increasingly digitally sophisticated. The lasting implications of such technology, including the security of personal transactions and the role of government regulation, are not to be underestimated. Stay ahead of the curve and become a confident blockchain builder now!WHAT YOU WILL LEARN* Develop a fully-fledged blockchain in Python* Obtain a ground-up understanding of of Proof of Work* Grasp core cryptographic concepts, such as hashing, encryption, and digital signatures* Understand how gossip protocols and peer-to-peer networking works by implementing a TCP client-server* Realize the differences and trade-offs between popular blockchains such as Bitcoin and EthereumWHO THIS BOOK IS FORThis book is aimed at intermediate programmers in any area from finance to academia. Readers should be comfortable reading and writing basic Python.Daniel van Flymen is currently a Director of Engineering at Candid in New York City. As a seasoned Python veteran, he’s a regular code contributor to popular open source projects, and is a guest on the Software Engineering Daily podcast, having been on popular episodes such as Understanding Bitcoin Transactions and Blockchain Engineering. He frequently writes on Medium and has a number of popular articles, such as “Learn Blockchains by Building One” and “Learn Blockchains using Spreadsheets.” He is passionate about making Bitcoin accessible to everyone through education.

Regulärer Preis: 46,99 €
Produktbild für AI and UX

AI and UX

As venture capital and industrial resources are increasingly poured into rapid advances in artificial intelligence, the actual usage and success of AI depends on a satisfactory experience for the user. UX will play a significant role in the adoption of AI technologies across markets, and AI and UX explores just what these demands will entail.Great effort has been put forth to continuously make AI “smarter.” But, will smarter always equal more successful AI? It is not just about getting a product to market, but about getting the product into a user’s hands in a form that will be embraced. This demands examining the product from the perspective of the user. Authors Gavin Lew and Robert Schumacher have written AI and UX to examine just how product managers and designers can best strike this balance. From exploring the history of the parallel journeys of AI and UX, to investigating past product examples and failures, to practical expert knowledge on how to best execute a positive user experience, AI and UX examines all angles of how AI can best be developed within a UX framework.The new world of AI necessitates an equally new UX lens through which to see all potential products. While massive inroads have created strides in AI technology, it must be accessible and easy to use for the consumer. Innovators in the field need to shift thinking from “it works” to “it works well,” which makes all the difference in increasing adoption. Let your users enhance your data, and let the UX of your product do the selling for you. AI and UX is your roadmap for the future.WHAT YOU'LL LEARN* Understand how the usage and success of AI depends on a great user experience * Discover how technology can advance beyond “it works” to “it works well,” which subsequently increases its adoption* Determine what ways can we let the users enhance the data to make AI better attuned to their needs* Realize how you can make humans smarter in their interactions with AIWHO THIS BOOK IS FORThose interested in AI and future implications; these can be futurists, technophiles, or product designers and product managers working on AI productsGAVIN LEW has 25 years of experience in the corporate and academic environment. He founded User Centric and grew the company to be the largest private UX consultancy in the United States. After selling the company, he continued to lead a North American UX team to become one of the most profitable business units of the parent organization. He is a frequent presenter at national and international conferences and the inventor of several patents. He is an adjunct professor at DePaul and Northwestern Universities. Gavin has a Masters in Experimental Psychology from Loyola University, and is currently the Managing Partner of Bold Insight, part of ReSight Global, a globally funded UX consulting practice across North America, Europe and Asia.ROBERT M. SCHUMACHER, JR. has more than 30 years of experience in academic, agency and corporate worlds. He co-owned User Centric with Gavin from its early stages until it was sold to GfK in 2012. While at User Centric, Bob helped found the User Experience Alliance, a global alliance of UX agencies. As well he founded User Experience Ltd, a UX agency in Beijing. He is Co-founder, co-owner, and Managing Partner of Bold Insight, part of ReSight Global, a global UX company. He has several patents and dozens of technical publications, including user interface standards for health records for the US government. He also is an Adjunct Professor at Northwestern University. Bob has a Ph.D. in Cognitive and Experimental Psychology from the University of Illinois at Urbana-Champaign.1. Introduction to AI and UX2. AI and UX: Parallel Journeys3. AI-Enabled Products are Emerging All around Us4. Garbage In; Garbage Out5. Applying a UX Framework

Regulärer Preis: 46,99 €
Produktbild für Creating Game Environments in Blender 3D

Creating Game Environments in Blender 3D

Discover how to create a simple game environment in Blender 3D, from modeling and texturing game assets, to placing them in a scene. You’ll export and import game assets as well as look at open-source game engines that will work with your game assets. Creating Game Environments in Blender 3D introduces the power of Blender 3D when creating a low poly game environment.The book starts by discussing the basics of game terminology, such as knowing the difference between low poly and high poly assets and the types of game you’re likely to work on. You’ll also take a brief look at Blender's background and installation. The following chapters talk about the process for creating a simple game environment. This is discussed in detail along with a sample project. These chapters discuss the common tools for starting a game environment and the methods for enhancing your game environment, such as color fundamentals. The final chapter shows how you can export the game assets you created in Blender, how you can import game assets in Blender, and how to evaluate the different game engines available.This book shows you the exciting side of creating a game environment while showing the power of Blender. After reading it, you will feel confident about creating a game environment.WHAT YOU WILL LEARN* Use Blender to create low poly game environments* Work with the common Blender tools for game environment design and developmentDiscover how to use Blender features in depth * Compare the Eevee and Cycles game engines WHO THIS BOOK IS FORGame environment artists who want to use Blender 3D to create a game environment. Some previous exposure to game design and development would be helpful, but not required.Ezra Thess Mendoza Guevarra graduated with a bachelor of science in information technology from STI College, the Philippines. Though she graduated with knowledge in web development, her passion for the arts that started in her childhood never faded away. In 2016, she got interested in 3D modeling.Despite being epileptic, she continues to pursue her dreams and “break the walls”. A researcher and a passionate artist, Ezra is currently using her skills as both freelance writer and artist.CHAPTER 1: GETTING STARTEDChapter Goal: The goal of this chapter is to introduce the readers to some of the fundamentals that will help them to create a game environment they desire.Sub-Topics* What is a game environment?* What does a game environment artist do?* What is game asset?* Skills and tools that can help you in creating a game environment* Types of games* Low poly vs high poly* About Blender and its installationCHAPTER 2: LET’S CREATE!Chapter Goal: The goal of this chapter is to introduce readers to the features of Blender for modeling game assets together with a sample project.Sub-Topics* In-depth learning of modeling workspace* Common tools for modeling a game environmentCHAPTER 3: COLOR IT!Chapter Goal: The goal of this chapter is to introduce readers to texturing a low poly asset along with a sample project.Sub-Topics* Color fundamentals* In-depth learning of UV workspace* In-depth learning of Texture Paint workspace* Common tools for texturing a game environmentCHAPTER 4: TEXTURE IT!CHAPTER 5: THE FINALEChapter Goal: This chapter shows the reader how to export and import game assets from Blender as well as introduces the different game engines where the reader can use their created game environment.Sub-Topics:* Process of exporting game assets* Types of file format* Game engines* Importing game assets for modification

Regulärer Preis: 62,99 €
Produktbild für The Common Lisp Condition System

The Common Lisp Condition System

Discover the functioning and example uses of the Common Lisp condition system. This book supplements already existing material for studying Common Lisp as a language by providing detailed information about the Lisp condition system and its control flow mechanisms; it also describes an example ANSI-conformant implementation of the condition system.In part 1 of The Common Lisp Condition System, the author introduces the condition system using a bottom-up approach, constructing it piece by piece. He uses a storytelling approach to convey the foundation of the condition system, dynamically providing code to alter the behavior of an existing program. Later, in part 2, you’ll implement a full and complete ANSI-conformant condition system while examining and testing each piece of code that you write.Throughout, the author demonstrates how to extend Lisp using Lisp itself by using the condition system as an example. This is done while paying proper attention to the CL restart subsystem, giving it attention on a par with the handler subsystem. After reading and using this book, you'll have learned about the inner functioning of the condition system, how to use it in your own Common Lisp coding and applications, and how to implement it from scratch, should such a need arise.WHAT YOU WILL LEARN* Examine the condition system and see why it is important in Common Lisp* Construct the condition system from scratch using foundational mechanisms provided by Common Lisp* Program the condition system and its control flow mechanisms to achieve practical results* Implement all parts of a condition system: conditions, restarts, handler- and restart-binding macros, signalling mechanisms, assertions, a debugger, and moreWHO THIS BOOK IS FORBeginning and intermediate Lisp programmers, as well as intermediate programmers of other programming languages.MICHAŁ "PHOE" HERDA is a programmer with contributions to multiple parts of the Common Lisp ecosystem: CL implementations, existing and widely-used CL utilities, documentation, and some of the new library ideas that he slowly pushes forwards and works on. The book The Common Lisp Condition System is his first work -- an attempt to create a tutorial on the condition system that was missing, even all the years after which ANSI Common Lisp was standardized.1: Basic Concepts2: Introducing the Condition System3: Implementing the Common Lisp Condition System4: Wrapping UpAppendix A: Implementation of Dynamic Variables in CAppendix B: Additional Utilities for Working with Common Lisp ConditionsAppendix C: Lisp Macros 101Appendix D: Condition System Reference

Regulärer Preis: 46,99 €
Produktbild für A Human Algorithm

A Human Algorithm

Regulärer Preis: 13,19 €
Produktbild für Ist das intelligent oder kann das weg?

Ist das intelligent oder kann das weg?

Alle reden über Künstliche Intelligenz, aber was ist das eigentlich? Und soll man vielleicht Angst haben, wenn Siri, Alexa & Co. unser Leben mit ungebetenen Ratschlägen durcheinanderbringen? Wir brauchen Aufklärung, und zwar humorvolle mit Tiefgang! Dafür gibt es keinen besseren als Jaromir Konecny. Er zeigt, wie wichtig KI-Programme sind und wo sie bereits jetzt eingesetzt werden. Und er stellt klar, was an KI völlig harmlos ist und wo die eigentlichen Probleme liegen. Ein informatives und zugleich unterhaltsames Buch mit vielen Anekdoten aus Forschung und Anwendung und garantiert ohne Formeln und Gleichungen.

Regulärer Preis: 14,99 €
Produktbild für Vom Monolithen zu Microservices

Vom Monolithen zu Microservices

Bestehende Systeme erfolgreich in eine Microservices-Architektur umgestaltenUnerlässliches Expertenwissen für Organisationen, die ihre Codebasis modernisieren wollen Autor des geschätzten Grundlagenwerks »Building Microservices« Orientierung und Anleitung für den anspruchsvollen Migrationsprozess Wie entflechtet man ein monolithisches System und überführt es in eine Microservices-Architektur? Und wie erhält man gleichzeitig den normalen Betrieb aufrecht? Sam Newman, Autor des viel beachteten Titels »Building Microservices«, beschreibt Szenarien und erprobte Strategien, um bestehende Systeme erfolgreich zu migrieren: von der ersten Planung bis zum Zerlegen von Anwendung und Datenbank. Newman greift hierbei auf viele anschauliche Beispiele zurück, stellt aufschlussreiche Pattern für die Migration vor und gibt praktische Ratschläge. Für Organisationen, die ihre Codebasis in Richtung einer Microservices-Architektur überführen und nicht komplett neu aufbauen wollen Unterstützt Unternehmen bei der Frage, ob und wann sie migrieren und wo sie konkret beginnen sollten Befasst sich mit der Integration und Migration von Legacy-Systemen und der Kommunikation mit diesen Systemen Stellt Migrationspattern vor und beschreibt, wo und wie sie am besten eingesetzt werden Bietet Beispiele für die Datenbankmigration und begleitende Synchronisationsstrategien Beschreibt das Zerlegen von Anwendungen einschließlich einer Reihe von Refaktorisierungspattern

Regulärer Preis: 34,90 €
Produktbild für Linux Containers and Virtualization

Linux Containers and Virtualization

Get a novel perspective on Linux containers and understand the world of virtualization. This book takes you down the rabbit hole to discover what lies below the API. You’ll go on a journey of virtualization and see how containers are realized in the Linux world. Linux Containers and Virtualization details the data structures within the Linux kernel which make up Linux containers.You will start with the fundamentals of virtualization including how different resources such as memory, CPU, network, and storage are virtualized. Then you will move on to hypervisors and virtualization using the Kernel virtual Machine (KVM) and Quick Emulator (QEMU). Next, you will learn about Linux namespace, cgroups, and layered file systems, which are the essential building blocks of Linux containers. The explanation traverses the Linux kernel codebase to show how these are realized in the Linux kernel. In the final chapter, you will code your own container by applying the concepts learnt in the previous chapters.On completion of the book, you will have the knowledge to start coding a Linux container.WHAT YOU WILL LEARN* Understand the basics of virtualization* Discover how the Linux kernel supports virtualization * See how the evolution of the Linux kernel and CPUs led to the creation of containerization technologies* Develop the ability to create your own container frameworkWHO THIS BOOK IS FORDevelopers working on virtualized software deployment and containers. Architects designing platforms based on a container runtime as well as DevOps professionals who want to get a microscopic view on how containers and virtualization work would find the book useful.SHASHANK MOHAN JAIN has been working in the IT industry for around 20 years mainly in the areas of cloud computing and distributed systems. He has keen interests in virtualization techniques, security, and complex systems. Shashank has 25 software patents (many yet to be published) to his name in the area of cloud computing, IoT, and machine learning. He is a speaker at multiple reputed cloud conferences. Shashank holds Sun, Microsoft, and Linux kernel certifications.CHAPTER 1: VIRTUALIZATION BASICSVM Based VirtualizationContainer Based VirtualizationHypervisorMemory VirtualizationCPU VirtualizationIO VirtualizationCHAPTER 2: HYPERVISORVt-xQEMUSteps to Create VM Using KVM ModuleVhost Base Data communicationA Small Detour on What is an EventfdAlternative Virtualization MechanismsSummary of Alternate Virtualization ApproachesCHAPTER 3: NAMESPACESNamespace TypesAdd a Device to a NamespaceCHAPTER 4: CGROUPSCreate a Sample CgroupCgroup TypesCHAPTER 5: LAYERED FILE SYSTEMSUnion File SystemCHAPTER 6: CREATING A CONTAINER YOURSELF UTS NamespaceGoLang InstallationContainer with NamespaceAdding More NamespacesGetting Shell With-In ContainerProviding Root File SystemMount Proc File SystemEnabling Networking for the ContainerEnabling Cgroups for Container

Regulärer Preis: 46,99 €
Produktbild für Oracle Database Transactions and Locking Revealed

Oracle Database Transactions and Locking Revealed

Access much-needed information for building scalable, high-concurrency applications and deploying them against the Oracle Database. This new edition is updated to be current with Oracle Database 19. It includes a new chapter with troubleshooting recipes to help you quickly diagnose and resolve locking problems that are urgent and block production.Good transaction design is an important facet of highly-concurrent applications that are run by hundreds, even thousands, of users who are executing transactions at the same time. Transaction design, in turn, relies on a good understanding of how the database engine manages the locking of resources to prevent access conflicts and data loss that might otherwise result from concurrent access to data in the database. This book provides a solid and accurate explanation of how locking and concurrency are dealt with by Oracle Database. You will learn how the Oracle Database architecture accommodates user transactions, and how you can write code to mesh with the way in which Oracle Database is designed to operate.ORACLE DATABASE TRANSACTIONS AND LOCKING REVEALED covers in detail the various lock types, and also different locking schemes such as pessimistic and optimistic locking. Then you will learn about transaction isolation and multi-version concurrency, and how the various lock types support Oracle Database’s transactional features. You will learn tips for transaction design, as well as some bad practices and habits to avoid. Coverage is also given to redo and undo, and their role in concurrency. The book is loaded with insightful code examples that drive home each concept. This is an important book that anyone developing highly-concurrent applications will want to have handy on their shelf.WHAT YOU WILL LEARN* Avoid application lockups due to conflicts over accessing the same resource* Understand how Oracle prevents one application from overwriting another’s modifications* Create transaction designs that mesh with how Oracle Database is designed* Build high-throughput applications supporting thousands of concurrent users* Design applications to take full advantage of Oracle’s powerful database engine* Gain a fundamental knowledge of Oracle’s transaction and locking architecture* Develop techniques to quickly diagnose and resolve common locking issuesWHO THIS BOOK IS FOROracle developers and database administrators faced with troubleshooting and solving deadlocks, locking contention, and similar problems that are encountered in high-concurrency environments; and application developers wanting to design their applications to excel at multi-user concurrency by taking full advantage of Oracle Database’s multi-versioning and concurrency supportDARL KUHN is a senior-level database administrator with decades of experience. He handles all facets of database administration from design and development to production support. He enjoys documenting and sharing knowledge and has authored several books on Oracle technology.THOMAS KYTE is a former vice president of the Core Technologies Group at Oracle Corporation. He is the same Tom who created the "Ask Tom" website and the Oracle Magazine column of the same name. He has a long history of answering questions about the Oracle database and tools that developers and database administrators struggle with every day.1. Getting Started2. Locking and Blocking3. Locks, Latches, and Mutexes4. Concurrency and Multiversioning5. Transactions6. Redo and Undo7. Investigating Redo8. Investigating Undo9. Troubleshooting

Regulärer Preis: 62,99 €
Produktbild für Alice and Bob Learn Application Security

Alice and Bob Learn Application Security

LEARN APPLICATION SECURITY FROM THE VERY START, WITH THIS COMPREHENSIVE AND APPROACHABLE GUIDE!Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects.Topics include:* Secure requirements, design, coding, and deployment* Security Testing (all forms)* Common Pitfalls* Application Security Programs* Securing Modern Applications* Software Developer Security HygieneAlice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs.Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader's ability to grasp and retain the foundational and advanced topics contained within.TANYA JANCA, also known as SheHacksPurple, is the founder of We Hack Purple, an online learning academy dedicated to teaching everyone how to create secure software. With over twenty years of IT and coding experience, she has won numerous awards and worked as a developer, pentester, and AppSec Engineer. She was named Hacker of the Year by the Cybersecurity Woman of the Year 2019 Awards and is the Founder of WoSEC International, #CyberMentoringMonday, and OWASP DevSlop.Foreword xxiIntroduction xxiiiPART I WHAT YOU MUST KNOW TO WRITE CODE SAFE ENOUGH TO PUT ON THE INTERNET 1CHAPTER 1 SECURITY FUNDAMENTALS 3The Security Mandate: CIA 3Confidentiality 4Integrity 5Availability 5Assume Breach 7Insider Threats 8Defense in Depth 9Least Privilege 11Supply Chain Security 11Security by Obscurity 13Attack Surface Reduction 14Hard Coding 15Never Trust, Always Verify 15Usable Security 17Factors of Authentication 18Exercises 20CHAPTER 2 SECURITY REQUIREMENTS 21Requirements 22Encryption 23Never Trust System Input 24Encoding and Escaping 28Third-Party Components 29Security Headers: Seatbelts for Web Apps 31Security Headers in Action 32X-XSS-Protection 32Content-Security-Policy (CSP) 32X-Frame-Options 35X-Content-Type-Options 36Referrer-Policy 36Strict-Transport-Security (HSTS) 37Feature-Policy 38X-Permitted-Cross-Domain-Policies 39Expect-CT 39Public Key Pinning Extension for HTTP (HPKP) 41Securing Your Cookies 42The Secure Flag 42The HttpOnly Flag 42Persistence 43Domain 43Path 44Same-Site 44Cookie Prefixes 45Data Privacy 45Data Classification 45Passwords, Storage, and Other Important Decisions 46HTTPS Everywhere 52TLS Settings 53Comments 54Backup and Rollback 54Framework Security Features 54Technical Debt = Security Debt 55File Uploads 56Errors and Logging 57Input Validation and Sanitization 58Authorization and Authentication 59Parameterized Queries 59URL Parameters 60Least Privilege 60Requirements Checklist 61Exercises 63CHAPTER 3 SECURE DESIGN 65Design Flaw vs. Security Bug 66Discovering a Flaw Late 67Pushing Left 68Secure Design Concepts 68Protecting Sensitive Data 68Never Trust, Always Verify/Zero Trust/Assume Breach 70Backup and Rollback 71Server-Side Security Validation 73Framework Security Features 74Security Function Isolation 74Application Partitioning 75Secret Management 76Re-authentication for Transactions (Avoiding CSRF) 76Segregation of Production Data 77Protection of Source Code 77Threat Modeling 78Exercises 82CHAPTER 4 SECURE CODE 83Selecting Your Framework and Programming Language 83Example #1 85Example #2 85Example #3 86Programming Languages and Frameworks: The Rule 87Untrusted Data 87HTTP Verbs 89Identity 90Session Management 91Bounds Checking 93Authentication (AuthN) 94Authorization (AuthZ) 96Error Handling, Logging, and Monitoring 99Rules for Errors 100Logging 100Monitoring 101Exercises 103CHAPTER 5 COMMON PITFALLS 105OWASP 105Defenses and Vulnerabilities Not Previously Covered 109Cross-Site Request Forgery 110Server-Side Request Forgery 112Deserialization 114Race Conditions 115Closing Comments 117Exercises 117PART II WHAT YOU SHOULD DO TO CREATE VERY GOOD CODE 119CHAPTER 6 TESTING AND DEPLOYMENT 121Testing Your Code 121Code Review 122Static Application Security Testing (SAST) 123Software Composition Analysis (SCA) 125Unit Tests 126Infrastructure as Code (IaC) and Security as Code (SaC) 128Testing Your Application 129Manual Testing 130Browsers 131Developer Tools 131Web Proxies 132Fuzzing 133Dynamic Application Security Testing (DAST) 133VA/Security Assessment/PenTest 135Testing Your Infrastructure 141Testing Your Database 141Testing Your APIs and Web Services 142Testing Your Integrations 143Testing Your Network 144Deployment 145Editing Code Live on a Server 146Publishing from an IDE 146“Homemade” Deployment Systems 147Run Books 148Contiguous Integration/Continuous Delivery/Continuous Deployment 148Exercises 149CHAPTER 7 AN APPSEC PROGRAM 151Application Security Program Goals 152Creating and Maintaining an Application Inventory 153Capability to Find Vulnerabilities in Written, Running, and Third-Party Code 153Knowledge and Resources to Fix the Vulnerabilities 154Education and Reference Materials 155Providing Developers with Security Tools 155Having One or More Security Activities During Each Phase of Your SDLC 156Implementing Useful and Effective Tooling 157An Incident Response Team That Knows When to Call You 157Continuously Improve Your Program Based on Metrics, Experimentation, and Feedback 159Metrics 159Experimentation 161Feedback from Any and All Stakeholders 161A Special Note on DevOps and Agile 162Application Security Activities 162Application Security Tools 164Your Application Security Program 165Exercises 166CHAPTER 8 SECURING MODERN APPLICATIONS AND SYSTEMS 167APIs and Microservices 168Online Storage 171Containers and Orchestration 172Serverless 174Infrastructure as Code (IaC) 175Security as Code (SaC) 177Platform as a Service (PaaS) 178Infrastructure as a Service (IaaS) 179Continuous Integration/Delivery/Deployment 180Dev(Sec)Ops 180DevSecOps 182The Cloud 183Cloud Computing 183Cloud Native 184Cloud Native Security 185Cloud Workflows 185Modern Tooling 186IAST Interactive Application Security Testing 186Runtime Application Security Protection 187File Integrity Monitoring 187Application Control Tools (Approved Software Lists) 187Security Tools Created for DevOps Pipelines 188Application Inventory Tools 188Least Privilege and Other Policy Automation 189Modern Tactics 189Summary 191Exercises 191PART III HELPFUL INFORMATION ON HOW TO CONTINUE TO CREATE VERY GOOD CODE 193CHAPTER 9 GOOD HABITS 195Password Management 196Remove Password Complexity Rules 196Use a Password Manager 197Passphrases 198Don’t Reuse Passwords 198Do Not Implement Password Rotation 199Multi-Factor Authentication 199Incident Response 200Fire Drills 201Continuous Scanning 202Technical Debt 202Inventory 203Other Good Habits 204Policies 204Downloads and Devices 204Lock Your Machine 204Privacy 205Summary 206Exercises 206CHAPTER 10 CONTINUOUS LEARNING 207What to Learn 208Offensive = Defensive 208Don’t Forget Soft Skills 208Leadership != Management 209Learning Options 209Accountability 212Create Your Plan 213Take Action 214Exercises 214Learning Plan 216CHAPTER 11 CLOSING THOUGHTS 217Lingering Questions 218When Have You Done Enough? 218How Do You Get Management on Board? 220How Do You Get Developers on Board? 221Where Do You Start? 222Where Do You Get Help? 223Conclusion 223APPENDIX A RESOURCES 225Introduction 225Chapter 1: Security Fundamentals 225Chapter 2: Security Requirements 226Chapter 3: Secure Design 227Chapter 4: Secure Code 228Chapter 5: Common Pitfalls 228Chapter 6: Testing and Deployment 229Chapter 7: An AppSec Program 229Chapter 8: Securing Modern Applications and Systems 230Chapter 9: Good Habits 231Chapter 10: Continuous Learning 231APPENDIX B ANSWER KEY 233Chapter 1: Security Fundamentals 233Chapter 2: Security Requirements 235Chapter 3: Secure Design 236Chapter 4: Secure Code 238Chapter 5: Common Pitfalls 241Chapter 6: Testing and Deployment 242Chapter 7: An AppSec Program 244Chapter 8: Securing Modern Applications and Systems 245Chapter 9: Good Habits 247Chapter 10: Continuous Learning 248Index 249

Regulärer Preis: 33,99 €
Produktbild für Smart Mobility

Smart Mobility

MIT DIESEM BUCH GELINGT DER EINSTIEG IN DAS TRENDTHEMA „SMART MOBILITY“Dieses Buch bietet Ihnen einen umfassenden Zugang zum aktuellen Trendthema Smart Mobility. Die thematisch vielfältigen Beiträge maßgeblicher Expertinnen und Experten – zusammengetragen von Herausgeberin Barbara Flügge – beleuchten u. a. folgende Schwerpunkte:• Sozio-ökologische und sozio-ökonomische Aspekte der Mobilität• Die Anforderungen von Anbietern und Nachfragern• Mobilitätsansprüche ganzer Ökosysteme (Stadt, Land und Ballungsräume)• Anwendbarkeit digitaler Lösungen für die Lebensbereiche jedes EinzelnenMit diesem Setup setzt das Buch wirkungsvoll die Ausgangssituation in der Smart Mobility in den Kontext von unterschiedlichsten Nutzungsszenarien und Initiativen. Die Beiträge erläutern einzelne Bausteine Intelligenter Mobilität (BIM) und Vorgehensmodelle. Zudem liefert Ihnen dieses Herausgeberwerk zahlreiche praxisorientierte Handlungsempfehlungen und Best Practices, die Ihnen die Analyse-, Planungs- und Umsetzungsphasen von Mobilitätsvorhaben erleichtern.Damit richtet sich dieses Buch über Smart Mobility in erster Linie an:a) Chief Digital Officersb) Entscheider in öffentlichen Verwaltungen und in der Privatwirtschaftc) Innovationstreiber und Entrepreneure aus der Praxisd) Projektleiter und -mitarbeiter – sei es im Personen- oder FrachtverkehrDIE GEGENWART UND ZUKUNFT IM BLICKUm Ihnen den Einstieg zu erleichtern, geben Ihnen die Beiträge zunächst einen Überblick über das große Themenfeld der Smart Mobility. Hier erfahren Sie, welche Vorgehensweisen sich zur Bewertung von Mobilität eignen, wodurch sich das Kauf- und Nutzverhalten im Personenverkehr heutzutage auszeichnet und wie Sie ein sicheres sowie nachhaltiges Verkehrsmanagement gestalten können. Weitere inhaltliche Schwerpunkte dieses Buchs sind:• Indoor- und Outdoor-Navigation in Smart Mobility-Szenarien• Inter- und multimodale Routenplanung• Smart Ticketing• Mobilitätsrelevante Diagnostik• Bausteine Intelligenter Mobilität für die Zukunft• Das Smart Mobility VorgehensmodellEIN UMFASSENDES GRUNDLAGENWERKMit der zweiten aktualisierten Auflage bringt Ihnen dieses Buch den Themenkomplex der Smart Mobility anschaulich und nachvollziehbar näher. Die inhaltliche Mischung aus theoretischem Basiswissen sowie aktuellen Trends (wie z. B. Mega Cities oder Zero Traffic) und hilfreichen Checklisten machen dieses Werk zu einem nachvollziehbaren und anschaulichen Grundlagenwerk für alle Themeninteressierten. BARBARA FLÜGGE, Gründerin der digital value creators (DVC) GmbH, erarbeitet Transformationsstrategien unter Einsatz digitaler Technologien und Services und setzt diese mit Entscheidern und Belegschaft in physischen, digitalen und virtuellen Räumen um. Das Beratungsangebot öffnet Märkte für private und öffentliche Auftraggeber unabhängig von Größe und Industriefokus. Durch Konsensfindung, dem Service Design Modell und dem Ecosystems Thinking Ansatz von DVC gelingen nachhaltige Smart Cities und Smart Mobility Vorhaben.Trendthema Smart Mobility - Mobil im digitalen Ökosystem - Smart Mobility im Einsatz - Die Zukunft der Mobilität - Handlungsempfehlungen

Regulärer Preis: 29,99 €
Produktbild für Advanced Analytics in Power BI with R and Python

Advanced Analytics in Power BI with R and Python

This easy-to-follow guide provides R and Python recipes to help you learn and apply the top languages in the field of data analytics to your work in Microsoft Power BI. Data analytics expert and author Ryan Wade shows you how to use R and Python to perform tasks that are extremely hard, if not impossible, to do using native Power BI tools. For example, you will learn to score Power BI data using custom data science models and powerful models from Microsoft Cognitive Services.The R and Python languages are powerful complements to Power BI. They enable advanced data transformation techniques that are difficult to perform in Power BI in its default configuration but become easier by leveraging the capabilities of R and Python. If you are a business analyst, data analyst, or a data scientist who wants to push Power BI and transform it from being just a business intelligence tool into an advanced data analytics tool, then this is the book to help you do that.WHAT YOU WILL LEARN* Create advanced data visualizations via R using the ggplot2 package* Ingest data using R and Python to overcome some limitations of Power Query* Apply machine learning models to your data using R and Python without the need of Power BI premium capacity* Incorporate advanced AI in Power BI without the need of Power BI premium capacity via Microsoft Cognitive Services, IBM Watson Natural Language Understanding, and pre-trained models in SQL Server Machine Learning Services * Perform advanced string manipulations not otherwise possible in Power BI using R and PythonWHO THIS BOOK IS FORPower users, data analysts, and data scientists who want to go beyond Power BI’s built-in functionality to create advanced visualizations, transform data in ways not otherwise supported, and automate data ingestion from sources such as SQL Server and Excel in a more concise wayRYAN WADE is a data analytic professional with over 20 years of experience. His education and work experience enable him to have a holistic view of analytics from a technical and business viewpoint. He has an MCSE with an emphasis on BI reporting and Microsoft R. He has an advanced understanding of R, Python, DAX, T-SQL, M, and VBA. He knows how to leverage those programming languages for on-premise and cloud-based data analytics solutions using the Microsoft Data Platform.Ryan is a data analytics enthusiast and has spoken at R meetups, Python meetups, SQLSaturdays, TDWI Conference, and PASS Summit about various data analytics topics. He is the developer of a comprehensive online course for ExcelTv showing how to implement R in Power BI for advanced data analytics and data visualization.PART I. CREATING CUSTOM DATA VISUALIZATIONS USING R1. The Grammar of Graphics2. Creating R custom visuals in Power BI using ggplot2PART II. INGESTING DATA INTO THE POWER BI DATA MODEL USING R AND PYTHON3. Reading CSV Files4. Reading Excel Files5. Reading SQL Server Data6. Reading Data into the Power BI Data Model via an APIPART III. TRANSFORMING DATA USING R AND PYTHON7. Advanced String Manipulation and Pattern Matching8. Calculated Columns using R and PythonPART IV. MACHINE LEARNING & AI IN POWER BI USING R AND PYTHON9. Applying Machine Learning and AI to your Power BI Data Models10. Productionizing Data Science Models and Data Wrangling Scripts.

Regulärer Preis: 56,99 €