Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Learn Data Mining Through Excel

Learn Data Mining Through Excel

Use popular data mining techniques in Microsoft Excel to better understand machine learning methods.Software tools and programming language packages take data input and deliver data mining results directly, presenting no insight on working mechanics and creating a chasm between input and output. This is where Excel can help.Excel allows you to work with data in a transparent manner. When you open an Excel file, data is visible immediately and you can work with it directly. Intermediate results can be examined while you are conducting your mining task, offering a deeper understanding of how data is manipulated and results are obtained. These are critical aspects of the model construction process that are hidden in software tools and programming language packages.This book teaches you data mining through Excel. You will learn how Excel has an advantage in data mining when the data sets are not too large. It can give you a visual representation of data mining, building confidence in your results. You will go through every step manually, which offers not only an active learning experience, but teaches you how the mining process works and how to find the internal hidden patterns inside the data.WHAT YOU WILL LEARN* Comprehend data mining using a visual step-by-step approach* Build on a theoretical introduction of a data mining method, followed by an Excel implementation* Unveil the mystery behind machine learning algorithms, making a complex topic accessible to everyone* Become skilled in creative uses of Excel formulas and functions* Obtain hands-on experience with data mining and ExcelWHO THIS BOOK IS FORAnyone who is interested in learning data mining or machine learning, especially data science visual learners and people skilled in Excel, who would like to explore data science topics and/or expand their Excel skills. A basic or beginner level understanding of Excel is recommended.HONG ZHOU, PHD is a professor of computer science and mathematics and has been teaching courses in computer science, data science, mathematics, and informatics at the University of Saint Joseph for more than 15 years. His research interests include bioinformatics, data mining, software agents, and blockchain. Prior to his current position, he was as a Java developer in Silicon Valley. Dr. Zhou believes that learners can develop a better foundation of data mining models when they visually experience them step-by-step, which is what Excel offers. He has employed Excel in teaching data mining and finds it an effective approach for both data mining learners and educators.Chapter 1: Excel and Data MiningChapter 2: Linear RegressionChapter 3: K-Means ClusteringChapter 4: Linear discriminant analysisChapter 5: Cross validation and ROCChapter 6: Logistic regressionChapter 7: K-nearest neighborsChapter 8: Naïve Bayes classificationChapter 9: Decision TreesChapter 10: Association analysisChapter 11: Artificial Neural networkChapter 12: Text MiningChapter 13: After Excel

Regulärer Preis: 56,99 €
Produktbild für Essential Visual Studio 2019

Essential Visual Studio 2019

Discover how Visual Studio 2019 can improve your development process.Visual Studio is an integral part of the daily life of millions of developers worldwide. Even as this rich integrated development environment approaches two decades, it has never ceased in innovating ways to make developers’ work life more productive.ESSENTIAL VISUAL STUDIO 2019 offers explicit guidance for the developer who is already familiar with Visual Studio, but might feel a little lost when it comes to understanding the more recent features and advances of the IDE. Busy developers simply don’t have the time to digest and distill what the latest and greatest tools are with each version. As a result, useful process and performance features may be overlooked. This book, by simply focusing on the most recent innovations in Visual Studio and its tangential developer market, is the perfect "go to" for bridging that gap.Be ready to plunge headfirst into key features and advances that have been added, expanded, or improved, and topics such as unit testing, refactoring, Git, debugging, containers, and more. You will procure the basic concepts and value first, before diving into hands-on code that is designed to quickly get you up and running.The goal of this book is to bring the developer up to speed on Visual Studio 2019. It does not focus just on functionality added in Visual Studio 2019, but takes a deep dive into the areas where Visual Studio 2019 changed. That way, even if you’re coming from much earlier versions of Visual Studio, you can easily discern how upgrading to Visual Studio 2019 can make you more productive.WHAT YOU WILL LEARN* Know how the new features and improvements in Visual Studio 2019 can make you more productive* Understand the value of modifications and when they can be used to take full advantage of this powerful IDE* Review changes to Visual Studio over the last two versions and see where the development process is heading* Discover the cloud-based, containerized, dev-ops-aware, and platform-flexible aspects of Visual Studio* Gain clarity on the areas that have the greatest impact to you personallyWHO THIS BOOK IS FORDevelopers who use Visual Studio on a daily basis. Familiarity with earlier versions is helpful, as the book is not a soup-to-nuts survey of the IDE and some basic functions will not be covered.BRUCE JOHNSON is co-founder and partner at ObjectSharp Consulting. He has more than three decades of experience, starting in UNIX, but then moved into the Windows development world. Over the course of his career, he gained expertise in rich client applications, web applications, and APIs, with a dash of database, microservices, and front-end development thrown in. After 20 years, it is almost impossible not to become a full-stack developer.Formerly a Microsoft MVP and MCT, Bruce enjoys teaching and presenting within the developer community. He has spoken hundreds of times at conferences and user groups throughout North America and Europe. He is the author of many books, articles, and columns. He can be reached on Twitter at @LACanuck and LinkedIn at bruce-johnson-95b468.Chapter 1: Installation and IDE DifferencesChapter 2: Assisted CodingChapter 3: Unit TestingChapter 4: Refactoring CodeChapter 5: Using Git in Visual Studio 2019Chapter 6: CollaborationChapter 7: Debugging and ProfilingChapter 8: Language-Specific ImprovementsChapter 9: Azure ToolingChapter 10: Containers and Orchestration

Regulärer Preis: 56,99 €
Produktbild für Pro Angular 9

Pro Angular 9

THIS BOOK HAS ACCOMPANYING ONLINE FILES FOR ANGULAR 9, 10 AND 11; ALL EXAMPLES IN THE BOOK WORK WITHOUT CHANGES IN ANGULAR 10 OR 11.Welcome to this one-stop-shop for learning Angular. Pro Angular is the most concise and comprehensive guide available, giving you the knowledge you need to take full advantage of this popular framework for building your own dynamic JavaScript applications.The fourth edition of this full-color guide explains how to get the most from Angular, starting with an in-depth overview of the MVC pattern and presenting the range of benefits it can offer. From there, you will begin learning how to use Angular in your projects, starting with the nuts-and-bolts concepts, and progressing on to more advanced and sophisticated features. Each topic provides you with precisely enough learning and detail to be effective. In true Adam Freeman style, the most important features are given full court press treatment, while also addressing common problems and how to avoid them.WHAT YOU WILL LEARN:* Get access to accompanying online files for Angular 9, 10 and 11; book examples work without changes in Angular 10 or 11* Gain a solid architectural understanding of the MVC Pattern* Create rich and dynamic web app clients using Angular * Use the ng tools to create and build an Angular project* Extend and customize Angular* Acquire skills to unit test your Angular projectsWHO THIS BOOK IS FOR:This book is for web developers who want to create rich client-side applications. Foundational knowledge of HTML and JavaScript is recommended."Adam's books provide a finely tuned blend of architectural overview, technical depth, and experience-born wisdom. His clear, concise writing style, coupled with project driven real world examples, make me comfortable recommending his books to a broad audience, ranging from developers working with a technology for the first time to seasoned professionals who need to learn a new skill quickly."KEITH DUBLIN, SOLUTION PRINCIPAL, SLALOM CONSULTING“Adam’s books are the print version of a chat bot. His investment in learning how developers learn pays off in dividends, making this one of the most comprehensive resources available. Novices and experienced professionals alike will gain knowledge from the accessible and insightful material.”MARK DONILE, SOFTWARE ENGINEER, MS CSADAM FREEMAN is an experienced IT professional who has held senior positions in a range of companies, most recently serving as chief technology officer and chief operating officer of a global bank. Now retired, he spends his time writing and long-distance running.TOCPart I – Part 1 - Getting Started with Angular1. Getting Ready2. Your First Angular App3. Putting Angular in Context4. HTML and Bootstrap CSS Primer5. JavaScript and TypeScript Primer, Part 16. JavaScript and TypeScript Primer, Part 27. SportsStore: A Real Application8. SportsStore: Orders and Checkout9. SportsStore: Administration10. SportsStore: DeploymentPart II - Angular in Detail11. Creating an Angular Project12. Using Data Bindings13. Using the Built-In Directives14. Using Events and Forms15. Creating Attribute Directives16. Creating Structural Directives17. Understanding Components18. Using and Creating Pipes19. Using Services20. Using Service Providers21. Using and Creating ModulesPart III - Advanced Angular Features22. Creating the Example Project23. Using Reactive Extensions24. Making Asynchronous HTTP Requests25. Routing and Navigation, Part 126. Routing and Navigation, Part 227. Routing and Navigation, Part 328. Using Animation29. Angular Unit Testing

Regulärer Preis: 66,99 €
Produktbild für Pro Power BI Desktop

Pro Power BI Desktop

Deliver eye-catching and insightful business intelligence with Microsoft Power BI Desktop. This new edition has been updated to cover all the latest features of Microsoft’s continually evolving visualization product. New in this edition is help with storytelling—adapted to PCs, tablets, and smartphones—and the building of a data narrative. You will find coverage of templates and JSON style sheets, data model annotations, and the use of composite data sources. Also provided is an introduction to incorporating Python visuals and the much awaited Decomposition Tree visual.PRO POWER BI DESKTOPshows you how to use source data to produce stunning dashboards and compelling reports that you mold into a data narrative to seize your audience’s attention. Slice and dice the data with remarkable ease and then add metrics and KPIs to project the insights that create your competitive advantage. Convert raw data into clear, accurate, and interactive information with Microsoft’s free self-service BI tool.This book shows you how to choose from a wide range of built-in and third-party visualization types so that your message is always enhanced. You will be able to deliver those results on PCs, tablets, and smartphones, as well as share results via the cloud. The book helps you save time by preparing the underlying data correctly without needing an IT department to prepare it for you.WHAT YOU WILL LEARN* Deliver attention-grabbing information, turning data into insight* Find new insights as you chop and tweak your data as never before* Build a data narrative through interactive reports with drill-through and cross-page slicing* Mash up data from multiple sources into a cleansed and coherent data model* Build interdependent charts, maps, and tables to deliver visually stunning information* Create dashboards that help in monitoring key performance indicators of your business* Adapt delivery to mobile devices such as phones and tabletsWHO THIS BOOK IS FORPower users who are ready to step up to the big leagues by going beyond what Microsoft Excel by itself can offer. The book also is for line-of-business managers who are starved for actionable data needed to make decisions about their business. And the book is for BI analysts looking for an easy-to-use tool to analyze data and share results with C-suite colleagues they support.ADAM ASPIN is an independent business intelligence (BI) consultant based in the UK. He has worked with SQL Server for more than 25 years. During this time, he has developed several dozen reporting and analytical systems using Microsoft analytics.A graduate of Oxford University, Adam began his career in publishing before moving into IT. Databases soon became a passion, and his experience in this arena ranges from Access to Oracle and MySQL, with occasional sorties into the world of DB2. He is, however, most at home in the Microsoft universe using SQL Server, SQL Server Analysis Services, SQL Server Reporting Services, SQL Server Integration Services, and Power BI, both on-premises and in Azure.Business Intelligence has been Adam's principal focus for the last 25 years. He has applied his skills for a range of clients in industry sectors such as finance, utilities, telecommunications, insurance, manufacturing, and banking.Adam is a frequent contributor to SQLServerCentral.com and Simple-Talk. He has written numerous articles for various French IT publications. A fluent French speaker, Adam has worked in France and Switzerland for many years. He speaks regularly at events such as SQLBits, SQL Saturdays, and local SQL Server user groups.Adam is the author of the following Apress books: SQL Server Data Integration Recipes; High Impact Data Visualization with Power View, Power Map, and Power BI; Business Intelligence with SQL Server Reporting Services; and Data Mashup with Microsoft Excel (Apress).1. Discovering and Loading Data with Power BI Desktop2. Discovering and Loading File-Based Data with Power BI Desktop3. Discovering and Loading File-Based Data with Power BI Desktop4. DirectQuery and Connect Live5. Loading Data from the Web and the Cloud6. Loading Data from Other Data Sources7. Structuring Imported Data8. Data Transformation and Cleansing9. Restructuring Data10. Complex Data Loads11. Organizing, Managing, and Parameterizing Queries12. The M Language13. Creating a Data Model14. Table Visuals15. Matrix and Card Visuals16. Charts in Power BI Desktop17. Formatting Charts in Power BI Desktop18. Other Types of Visuals19. Third-Party Visuals20. Maps in Power BI Desktop21. Filtering Data22. Using Slicers23. Enhancing Dashboards24. Advanced Dashboarding Techniques25. Appendix A: Sample Data

Regulärer Preis: 79,99 €
Produktbild für Beginning Apache Spark Using Azure Databricks

Beginning Apache Spark Using Azure Databricks

Analyze vast amounts of data in record time using Apache Spark with Databricks in the Cloud. Learn the fundamentals, and more, of running analytics on large clusters in Azure and AWS, using Apache Spark with Databricks on top. Discover how to squeeze the most value out of your data at a mere fraction of what classical analytics solutions cost, while at the same time getting the results you need, incrementally faster.This book explains how the confluence of these pivotal technologies gives you enormous power, and cheaply, when it comes to huge datasets. You will begin by learning how cloud infrastructure makes it possible to scale your code to large amounts of processing units, without having to pay for the machinery in advance. From there you will learn how Apache Spark, an open source framework, can enable all those CPUs for data analytics use. Finally, you will see how services such as Databricks provide the power of Apache Spark, without you having to know anything aboutconfiguring hardware or software. By removing the need for expensive experts and hardware, your resources can instead be allocated to actually finding business value in the data.This book guides you through some advanced topics such as analytics in the cloud, data lakes, data ingestion, architecture, machine learning, and tools, including Apache Spark, Apache Hadoop, Apache Hive, Python, and SQL. Valuable exercises help reinforce what you have learned.WHAT YOU WILL LEARN* Discover the value of big data analytics that leverage the power of the cloud* Get started with Databricks using SQL and Python in either Microsoft Azure or AWS* Understand the underlying technology, and how the cloud and Apache Spark fit into the bigger picture * See how these tools are used in the real world* Run basic analytics, including machine learning, on billions of rows at a fraction of a cost or freeWHO THIS BOOK IS FORData engineers, data scientists, and cloud architects who want or need to run advanced analytics in the cloud. It is assumed that the reader has data experience, but perhaps minimal exposure to Apache Spark and Azure Databricks. The book is also recommended for people who want to get started in the analytics field, as it provides a strong foundation.ROBERT ILIJASON is a 20-year veteran in the business intelligence (BI) segment. He has worked as a contractor for some of Europe’s biggest companies and has conducted large-scale analytics projects within the areas of retail, telecom, banking, government, and more. He has seen his share of analytic trends come and go over the years, but unlike most of them, he strongly believes that Apache Spark in the cloud, especially with Azure Databricks, is a game changer.Chapter 1: Introduction to Large-Scale Data Analytics.- Chapter 2: Spark and Databricks.- Chapter 3: Getting Started with Databricks.- Chapter 4: Workspaces, Clusters, and Notebooks.- Chapter 5: Getting Data into Databricks.- Chapter 6: Querying Data Using SQL.- Chapter 7: The Power of Python.- Chapter 8: ETL and Advanced Data Wrangling.- Chapter 9: Connecting to and from Afar.- Chapter 10: Running in Production.- Chapter 11: Bits and Pieces.

Regulärer Preis: 52,99 €
Produktbild für Cyber Breach Response That Actually Works

Cyber Breach Response That Actually Works

YOU WILL BE BREACHED—THE ONLY QUESTION IS WHETHER YOU'LL BE READYA cyber breach could cost your organization millions of dollars—in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise.This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you’ll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations.* Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program* Discover how incident response fits within your overall information security program, including a look at risk management* Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization* Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices* Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in courtIn addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events.ANDREW GORECKI is a cybersecurity professional with experience across various IT and cybersecurity disciplines, including engineering, operations, and incident response. Originally from Europe, he provided consulting services across various industry sectors in the U.S., the UK, and other European countries. At the time of writing, he manages a team of incident response consultants within the X-Force IRIS competency of IBM Security where he leads investigations into large-scale breaches for Fortune 500 organizations, delivers proactive incident response services, and provides executive-level consulting on building and optimizing incident response programs. Foreword xxiiiIntroduction xxvCHAPTER 1 UNDERSTANDING THE BIGGER PICTURE 1Evolving Threat Landscape 2Identifying Threat Actors 2Cyberattack Lifecycle 4Cyberattack Preparation Framework 5Cyberattack Execution Framework 6Defining Cyber Breach Response 8Events, Alerts, Observations, Incidents, and Breaches 9Events 9Alerts 9Observations 10Incidents 10Breaches 11What is Cyber Breach Response? 12Identifying Drivers for Cyber Breach Response 13Risk Management 13Conducting Risk Management 13Risk Assessment Process 14Managing Residual Risk 17Cyber Threat Intelligence 18What is Cyber Threat Intelligence? 18Importance of Cyber Threat Intelligence 19Laws and Regulations 20Compliance Considerations 20Compliance Requirements for Cyber Breach Response 21Changing Business Objectives 22Incorporating Cyber Breach Response into aCybersecurity Program 23Strategic Planning 23Designing a Program 24Implementing Program Components 25Program Operations 26Continual Improvement 27Strategy Development 27Strategic Assessment 28Gap Analysis 28Maturity Assessment 30Strategy Definition 32Vision and Mission Statement 32Goals and Objectives 33Establishing Requirements 33Defining a Target Operating Model 35Developing a Business Case and Executive Alignment 35Strategy Execution 37Enacting an Incident Response Policy 37Assigning an Incident Response Team 38Creating an Incident Response Plan 38Documenting Legal Requirements 38Roadmap Development 39Governance 40Establishing Policies 40Enterprise Security Policy 41Issue-Specific Policies 41Identifying Key Stakeholders 42Executive Leadership 42Project Steering Committee 42Chief Information Security Officer 43Stakeholders with Interest in Cyber Breach Response 43Business Alignment 44Continual Improvement 44Necessity to Determine if the Program is Effective 45Changing Threat Landscape 45Changing Business Objectives 45Summary 46Notes 47CHAPTER 2 BUILDING A CYBERSECURITY INCIDENT RESPONSE TEAM 51Defining a CSIRT 51CSIRT History 52The Role of a CSIRT in the Enterprise 52Defining Incident Response Competencies and Functions 55Proactive Functions 55Developing and Maintaining Procedures 56Conducting Incident Response Exercises 56Assisting with Vulnerability Identification 57Deploying, Developing, and Tuning Tools 58Implementing Lessons Learned 59Reactive Functions 59Digital Forensics and Incident Response 59Cyber Threat Intelligence 60Malware Analysis 60Incident Management 61Creating an Incident Response Team 61Creating an Incident Response Mission Statement 62Choosing a Team Model 62Centralized Team Model 63Distributed Team Model 64Hybrid Team Model 65An Integrated Team 66Organizing an Incident Response Team 66Tiered Model 66Competency Model 68Hiring and Training Personnel 69Technical Skills 69Soft Skills 71Pros and Cons of Security Certifications 72Conducting Effective Interviews 73Retaining Incident Response Talent 74Establishing Authority 75Full Authority 75Shared Authority 76Indirect Authority 76No Authority 76Introducing an Incident Response Team to the Enterprise 77Enacting a CSIRT 78Defining a Coordination Model 78Communication Flow 80Incident Officer 80Incident Manager 81Assigning Roles and Responsibilities 82Business Functions 82Human Resources 82Corporate Communications 83Corporate Security 83Finance 84Other Business Functions 85Legal and Compliance 85Legal Counsel 85Compliance Functions 86Information Technology Functions 87Technical Groups 87Disaster Recovery 88Outsourcing Partners and Vendors 89Senior Management 89Working with Outsourcing Partners 90Outsourcing Considerations 91Proven Track Record of Success 91Offered Services and Capabilities 91Global Support 92Skills and Experience 92Outsourcing Costs and Pricing Models 92Establishing Successful Relationships with Vendors 93Summary 94Notes 95CHAPTER 3 TECHNOLOGY CONSIDERATIONS IN CYBER BREACH INVESTIGATIONS 97Sourcing Technology 98Comparing Commercial vs. Open Source Tools 98Commercial Tools 98Open Source Software 98Other Considerations 99Developing In-House Software Tools 100Procuring Hardware 101Acquiring Forensic Data 102Forensic Acquisition 102Order of Volatility 103Disk Imaging 103System Memory Acquisition 105Tool Considerations 106Forensic Acquisition Use Cases 107Live Response 108Live Response Considerations 109Live Response Tools 109Live Response Use Cases 112Incident Response Investigations in Virtualized Environments 113Traditional Virtualization 115Cloud Computing 115Forensic Acquisition 115Log Management in Cloud Computing Environments 117Leveraging Network Data in Investigations 118Firewall Logs and Network Flows 118Proxy Servers and Web Gateways 120Full-Packet Capture 120Identifying Forensic Evidence in Enterprise Technology Services 123Domain Name System 123Dynamic Host Confi guration Protocol 125Web Servers 125Databases 126Security Tools 127Intrusion Detection and Prevention Systems 127Web Application Firewalls 127Data Loss Prevention Systems 128Antivirus Software 128Endpoint Detection and Response 129Honeypots and Honeynets 129Log Management 130What is Logging? 130What is Log Management? 132Log Management Lifecycle 133Collection and Storage 134Agent-Based vs. Agentless Collection 134Log Management Architectures 135Managing Logs with a SIEM 137What is SIEM? 138SIEM Considerations 139Summary 140Notes 141CHAPTER 4 CRAFTING AN INCIDENT RESPONSE PLAN 143Incident Response Lifecycle 143Preparing for an Incident 144Detecting and Analyzing Incidents 145Detection and Triage 146Analyzing Incidents 146Containment, Eradication, and Recovery 147Containing a Breach 147Eradicating a Threat Actor 148Recovering Business Operations 149Post-Incident Activities 149Understanding Incident Management 150Identifying Process Components 151Defining a Process 151Process Controls 153Process Enablers 155Process Interfaces 155Roles and Responsibilities 158Service Levels 159Incident Management Workfl ow 160Sources of Incident Notifi cations 160Incident Classifi cation and Documentation 162Incident Categorization 163Severity Assignment 163Capturing Incident Information 167Incident Escalations 169Hierarchical Escalations 169Functional Escalation 169Creating and Managing Tasks 169Major Incidents 170Incident Closure 171Crafting an Incident Response Playbook 171Playbook Overview 171Identifying Workfl ow Components 173Detection 173Analysis 174Containment and Eradication 176Recovery 176Other Workflow Components 177Post-Incident Evaluation 177Vulnerability Management 177Purpose and Objectives 178Vulnerability Management Lifecycle 178Integrating Vulnerability Management and Risk Management 180Lessons Learned 180Lessons-Learned Process Components 181Conducting a Lessons-Learned Meeting 183Continual Improvement 184Continual Improvement Principles 184The Deming Cycle 184DIKW Hierarchy 185The Seven-Step Improvement Process 187Step 1: Define a Vision for Improvement 188Step 2: Define Metrics 188Step 3: Collect Data 189Step 4: Process Data 190Step 5: Analyze Information 191Step 6: Assess Findings and Create Plan 191Step 7: Implement the plan 192Summary 192Notes 193CHAPTER 5 INVESTIGATING AND REMEDIATING CYBER BREACHES 195Investigating Incidents 196Determine Objectives 197Acquire and Preserve Data 198Perform Analysis 200Contain and Eradicate 202Conducting Analysis 202Digital Forensics 203Digital Forensics Disciplines 203Timeline Analysis 205Other Considerations in Digital Forensics 206Cyber Threat Intelligence 207Cyber Threat Intelligence Lifecycle 208Identifying Attacker Activity with Cyber Threat Intelligence 209Categorizing Indicators 212Malware Analysis 214Classifying Malware 214Static Analysis 216Dynamic Analysis 217Malware Analysis and Cyber Threat Intelligence 217Threat Hunting 218Prerequisites to Threat Hunting 218Threat Hunting Lifecycle 219Reporting 221Evidence Types 223System Artifacts 223Persistent Artifacts 223Volatile Artifacts 225Network Artifacts 226Security Alerts 227Remediating Incidents 228Remediation Process 229Establishing a Remediation Team 230Remediation Lead 231Remediation Owner 232Remediation Planning 233Business Considerations 233Technology Considerations 234Logistics 235Assessing Readiness 235Consequences of Alerting the Attacker 236Developing an Execution Plan 237Containment and Eradication 238Containment 238Eradication 239Monitoring for Attacker Activity 240Summary 241Notes 242CHAPTER 6 LEGAL AND REGULATORY CONSIDERATIONS IN CYBER BREACH RESPONSE 243Understanding Breaches from a Legal Perspective 244Laws, Regulations, and Standards 244United States 245European Union 246Standards 246Materiality in Financial Disclosure 247Cyber Attribution 248Motive, Opportunity, Means 248Attributing a Cyber Attack 249Engaging Law Enforcement 251Cyber Insurance 252Collecting Digital Evidence 252What is Digital Evidence? 253Digital Evidence Lifecycle 253Information Governance 254Identification 254Preservation 255Collection 255Processing 255Reviewing 256Analysis 256Production 257Presentation 258Admissibility of Digital Evidence 258Federal Rules of Evidence 258Types of Evidence 260Direct Evidence 260Circumstantial Evidence 260Admission of Digital Evidence in Court 261Evidence Rules 261Hearsay Rule 261Business Records Exemption Rule 262Best Evidence 262Working with Legal Counsel 263Attorney-Client Privilege 263Attorney Work-Product 264Non-testifying Expert Privilege 264Litigation Hold 265Establishing a Chain of Custody 265What is a Chain of Custody? 266Establishing a Defensible Protocol 266Traditional Forensic Acquisition 267Live Response and Logical Acquisition 268Documenting a Defensible Protocol 269Documentation 269Accuracy 270Auditability and Reproducibility 270Collection Methods 270Data Privacy and Cyber Breach Investigations 271What is Data Privacy? 271Handling Personal Data During Investigations 272Enacting a Policy to Support Investigations 272Cyber Breach Investigations and GDPR 273Data Processing and Cyber Breach Investigations 274Establishing a Lawful Basis for the Processing of Personal Data 275Territorial Transfer of Personal Data 276Summary 277Notes 278Index 281

Regulärer Preis: 28,99 €
Produktbild für Microsoft Dynamics 365 Business Central

Microsoft Dynamics 365 Business Central

Das Anwenderbuch für den kompakten Einstieg in Microsoft Dynamics 365 Business Central!Als integrierte Unternehmenslösung unterstützt Microsoft Dynamics 365 Business Central durchgängig die Geschäftsprozesse in Unternehmen. Der Buchaufbau orientiert sich an den Unternehmensbereichen Beschaffung, Vertrieb, Lager, Produktion und Produktionsplanung sowie Finanzmanagement.Ausgehend von der Bedienung des Systems, Aspekten zur Systemeinrichtung und zugrunde liegenden Konzepten erklären die Autoren am Beispiel der verschiedenen Rollen, wie Sie die zentralen Geschäftsabläufe im Unternehmen abwickeln – vom Einkauf über die Produktion bis hin zum Vertrieb.Neben dem Umgang mit der Software lernen Sie auch, wie Geschäftsprozesse in Dynamics 365 Business Central abgebildet werden. Mithilfe von Schrittanleitungen lösen Sie zentrale Aufgaben im jeweiligen Fachgebiet und vertiefen Ihre neu erworbenen Kenntnisse. Michaela Gayer ist als Microsoft Certified Trainer für Microsoft Dynamics NAV tätig. Sie arbeitet bereits seit den 1990er Jahren mit dem Produkt und sammelte dabei Erfahrung in Programmierung, Consulting, Projektleitung, Verkauf und Training. Seit 2013 ist sie auch erfolgreich als Autorin für Videotrainings tätig.Christian Hauptmann ist freiberuflicher Trainer und Berater für Dynamics NAV in Österreich und Deutschland. Er arbeitet seit 20 Jahren mit Microsoft Dynamics NAV in zahlreichen Projekten und verfügt über umfangreiches Wissen in den verschiedenen Bereichen der ERP-Software.Jürgen Ebert arbeitet seit fast 25 Jahren als Berater, Trainer und Programmierer im Microsoft Dynamics NAV-Umfeld. Seit mehr als 10 Jahren ist er selbstständiger Microsoft Certified Business Management Solutions Specialist.Zu seinen Kunden zählen Marktführer in ihrer Branche ebenso wie „hidden champions“.

Regulärer Preis: 49,99 €
Produktbild für Pro ASP.NET Core 3

Pro ASP.NET Core 3

Now in its 8th edition, PRO ASP.NET CORE has been thoroughly updated for ASP.NET Core 3 and online for ASP.NET Core 5 and .NET 5.0. This comprehensive, full-color guide is the only book you need to learn ASP.NET Core development.Professional developers get ready to produce leaner applications for the ASP.NET Core platform. This edition puts ASP.NET Core 3 into context, and takes a deep dive into the tools and techniques required to build modern, extensible web applications. New features and capabilities such as MVC 3, Razor Pages, Blazor Server, and Blazor WebAssembly are covered, along with demonstrations of how they can be applied in practice.Following the same popular format and style found in previous editions, author Adam Freeman explains how to get the most out of ASP.NET Core 3. Starting with the nuts-and-bolts topics, he teaches readers about middleware components, built-in services, request model binding, and more. Moving along, he introduces increasingly more complex topics and advanced features, including endpoint routing and dependency injection.Written for professionals wanting to incorporate the latest functionality of ASP.NET Core 3 into their projects, this book also serves as a complete reference on ASP.NET Core. Beginners with some background in Microsoft web development will also greatly benefit from the in-depth coverage provided throughout.WHAT YOU WILL LEARN:* Build a solid foundation and skill set for working with the entire ASP.NET Core platform* Apply ASP.NET Core 3 and ASP.NET Core 5 features in your developer environment; plentiful reusable templates* See how to create RESTful web services, web applications, and client-side applications* Leverage existing knowledge to efficiently get up and running with new programming modelsADAM FREEMAN is an experienced IT professional who has held senior positions in a range of companies, most recently serving as chief technology officer and chief operating officer of a global bank. Now retired, he spends his time writing and long-distance running.“The Rolls-Royce of ASP.NET books, (or if you’re American, the Cadillac). Very thorough!”LES JACKSON, MCSD, DOTNET PLAYBOOK“The author’s instruction is direct, easy to understand and supplemented with clear code examples... Whether you are a beginner learning ASP.NET Core 3.1 app development, or an experienced professional ready to master advanced concepts, I consider this book a 'must have' for you!"JEREMY LIKNESS, SENIOR PROGRAM MANAGER, MICROSOFT“…the best single resource for teaching MVC web apps using ASP.NET. “CHARLES CARTER, MSCS, MSWE, JD, CLOUD APPLICATION DEVELOPMENT INSTRUCTOR, MICROSOFT SOFTWARE AND SYSTEMS ACADEMYADAM FREEMAN is an experienced IT professional who has held senior positions in a range of companies, most recently serving as chief technology officer and chief operating officer of a global bank. Now retired, he spends his time writing and long-distance running.Part 11. Putting ASP.NET Core into Context2. Getting Started3. Your First ASP.NET Core Application4. Using the Development Tools5. Essential C# Features6. Unit Testing ASP.NET Core Applications7. SportsStore8. SportsStore: Navigation & Cart9. SportsStore: Completing the Cart10. SportsStore: Adminstration11. SportsStore: Security & DeploymentPart 212. Understanding the ASP.NET Core Platform13. Using URL Routing14. Using Dependency Injection15. Using the Platform Features, Part 116. Using the Platform Features, Part 217. Working with DataPart 318. Creating the Example Project19. Creating RESTFul Web Services20. Advanced Web Service Features21. Using Controllers with Views22. Using Controllers with Views, Part 223. Using Razor Pages24. Using View Components25. Using Tag Helpers26. Using the Built-In Tag Helpers27. Using the Forms Tag Helpers28. Using Model Binding29. Using Model Validation30. Using Filters31. Creating Form ApplicationsPart 432. Creating the Example Application33. Using Blazor Server, Part 134. Using Blazor Server Part 235. Advanced Blazor Features36. Blazor Forms and Data37. Blazor Web Assembly38. Using ASP.NET Core Identity39. Applying ASP.NET Core Identity

Regulärer Preis: 66,99 €
Produktbild für Building Single Page Applications in .NET Core 3

Building Single Page Applications in .NET Core 3

Attention .NET developers who no longer want to use JavaScript for your front end. Quickly and efficiently learn how to use C# for your single-page application (SPA) thanks to Blazor.Today’s reality is that most modern applications are web-based and if you want the same user experience as a desktop application, you need to be able to create a single-page application. While there are multiple frameworks and libraries to choose from (including Angular, React, and VueJS), you still need to know how to code in JavaScript. But now there is another option from Microsoft. Blazor is an open-source framework that enables developers to create web applications using C# and HTML, and everything you need to get started is covered in this guide. You will learn the steps, through build-along coding examples, that will allow you to use the same language for both the front end and the back end of your application.This book is designed to get you comfortable creating a single-page application in the shortest time possible. Get ready to create a complete business application that teaches and reinforces the skills you need in a Blazor production environment.WHAT YOU WILL LEARN* Develop the front end of an application using C# and .NET Core* Use this quick-start for .NET developers who need to improve their application with a single-page front end* Take a code-first approach that models an actual business application* Gain insights for developing a high-functioning and maintainable application* Study guidance on repurposing your .NET skill setWHO THIS BOOK IS FORC# and .NET developers who have some experience in web developmentMICHELE APONTE is a programmer working with Java, .NET, and JavaScript at software and IT consulting companies in his native Italy since 1993. Combining his training, consulting, and development skills, in 2013 Michele founded “Blexin” to help customers migrate older software and systems to new technologies in order to improve their businesses. Passionate about programming, Michele embraces sharing with the community. He founded DotNetCampania, a Microsoft User Group in 2008, and has organized many regional conferences. Recognized as a Microsoft MVP, he often presents on Microsoft and JavaScript topics at tech conferences throughout Italy. Chapter 1: The Case for BlazorChapter 2: Blazor Server vs Blazor WebAssemblyChapter 3: Create Your Single Page ApplicationChapter 4: Build Your Reusable Blazor LibraryChapter 5: Deploy Your Application

Regulärer Preis: 56,99 €
Produktbild für Modern Data Mining Algorithms in C++ and CUDA C

Modern Data Mining Algorithms in C++ and CUDA C

Discover a variety of data-mining algorithms that are useful for selecting small sets of important features from among unwieldy masses of candidates, or extracting useful features from measured variables.As a serious data miner you will often be faced with thousands of candidate features for your prediction or classification application, with most of the features being of little or no value. You’ll know that many of these features may be useful only in combination with certain other features while being practically worthless alone or in combination with most others. Some features may have enormous predictive power, but only within a small, specialized area of the feature space. The problems that plague modern data miners are endless. This book helps you solve this problem by presenting modern feature selection techniques and the code to implement them. Some of these techniques are:* Forward selection component analysis* Local feature selection* Linking features and a target with a hidden Markov model* Improvements on traditional stepwise selection* Nominal-to-ordinal conversionAll algorithms are intuitively justified and supported by the relevant equations and explanatory material. The author also presents and explains complete, highly commented source code.The example code is in C++ and CUDA C but Python or other code can be substituted; the algorithm is important, not the code that's used to write it.WHAT YOU WILL LEARN* Combine principal component analysis with forward and backward stepwise selection to identify a compact subset of a large collection of variables that captures the maximum possible variation within the entire set.* Identify features that may have predictive power over only a small subset of the feature domain. Such features can be profitably used by modern predictive models but may be missed by other feature selection methods.* Find an underlying hidden Markov model that controls the distributions of feature variables and the target simultaneously. The memory inherent in this method is especially valuable in high-noise applications such as prediction of financial markets.* Improve traditional stepwise selection in three ways: examine a collection of 'best-so-far' feature sets; test candidate features for inclusion with cross validation to automatically and effectively limit model complexity; and at each step estimate the probability that our results so far could be just the product of random good luck. We also estimate the probability that the improvement obtained by adding a new variable could have been just good luck. Take a potentially valuable nominal variable (a category or class membership) that is unsuitable for input to a prediction model, and assign to each category a sensible numeric value that can be used as a model input.WHO THIS BOOK IS FORIntermediate to advanced data science programmers and analysts.Timothy Masters has a PhD in statistics and is an experienced programmer. His dissertation was in image analysis. His career moved in the direction of signal processing, and for the last 25 years he's been involved in the development of automated trading systems in various financial markets.1) Introduction 72) Forward Selection Component Analysis 11A) Introduction to Forward Selection Component Analysis 12B) The Mathematics and Code Examples 16Maximizing the Explained Variance 18Code for the Variance Maximization Criterion 20Backward Refinement 24Multi-Threading Backward Refinement 28Orthogonalizing Ordered Components 36C) Putting It All Together 39Components From a Forward-Only Subset 44Components From a Backward Refined Subset 46D) An Example With Contrived Variables 483) Local Feature Selection 53A) Intuitive Overview of the Algorithm 54What This Algorithm Reports 60B) A Brief Detour: the Simplex Algorithm 62The Linear Programming Problem 63Interfacing to the Simplex Class 64A Little More Detail 67C) A More Rigorous Approach to LFS 69Intra-Class and Inter-Class Separation 73Computing the Weights 77Maximizing Inter-Class Separation 81Minimizing Intra-Class Separation 86Testing a Trial Beta 88A Quick Note on Threads 93D) CUDA Computation of Weights 94Integrating the CUDA Code Into the Algorithm 95Initializing the CUDA Hardware 97Computing Differences from the Current Case 100 Computing the Distance Matrix 102Computing the Minimum Distances 104Computing the Terms for the Weight Equation 112Transposing the Term Matrix 113Summing the Terms For the Weights 114Moving the Weights to the Host 116E) An Example of Local Feature Selection 117F) A Note on Run Time 1184) Memory in Time Series Features 119A) A Gentle Mathematical Overview 122The Forward Algorithm 123The Backward Algorithm 128Correct Alpha and Beta, For Those Who Care 131B) Some Mundane Computations 136Means and Covariances 136Densities 138The Multivariate Normal Density Function 139C) Starting Parameters 141 Outline of the Initialization Algorithm 141Perturbing Means 142Perturbing Covariances 143Perturbing Transition Probabilities 144A Note on Random Number Generators 145D) The Complete Optimization Algorithm 146Computing State Probabilities 147Updating the Means and Covariances 151Updating Initial and Transition Probabilities 153 E) Assessing HMM Memory in a Time Series 159F) Linking Features to a Target 164Linking HMM States to the Target 173A Contrived and Inappropriate Example 183A Sensible and Practical Example 1865) Stepwise Selection on Steroids 189A) The Feature Evaluation Model 192Code For the Foundation Model 193B) The Cross-Validated Performance Measure 198C) The Stepwise Algorithm 201Finding the First Variable 207Adding a Variable to an Existing Model 210D) Demonstrating the Algorithm Three Ways 2146) Nominal-to-Ordinal Conversion 217A) Implementation Overview 221B) Testing For a Legitimate Relationship 222C) An Example From Equity Price Changes 223D) Code for Nominal-to-Ordinal Conversion 227The Constructor 228Printing the Table of Counts 232Computing the Mapping Function 234Monte-Carlo Permutation Tests 2377) Index 353

Regulärer Preis: 66,99 €
Produktbild für Robust Methods for Dense Monocular Non-Rigid 3D Reconstruction and Alignment of Point Clouds

Robust Methods for Dense Monocular Non-Rigid 3D Reconstruction and Alignment of Point Clouds

Vladislav Golyanik proposes several new methods for dense non-rigid structure from motion (NRSfM) as well as alignment of point clouds. The introduced methods improve the state of the art in various aspects, i.e. in the ability to handle inaccurate point tracks and 3D data with contaminations. NRSfM with shape priors obtained on-the-fly from several unoccluded frames of the sequence and the new gravitational class of methods for point set alignment represent the primary contributions of this book.ABOUT THE AUTHOR:VLADISLAV GOLYANIK is currently a postdoctoral researcher at the Max Planck Institute for Informatics in Saarbrücken, Germany. The current focus of his research lies on 3D reconstruction and analysis of general deformable scenes, 3D reconstruction of human body and matching problems on point sets and graphs. He is interested in machine learning (both supervised and unsupervised), physics-based methods as well as new hardware and sensors for computer vision and graphics (e.g., quantum computers and event cameras).VLADISLAV GOLYANIK is currently a postdoctoral researcher at the Max Planck Institute for Informatics in Saarbrücken, Germany. The current focus of his research lies on 3D reconstruction and analysis of general deformable scenes, 3D reconstruction of human body and matching problems on point sets and graphs. He is interested in machine learning (both supervised and unsupervised), physics-based methods as well as new hardware and sensors for computer vision and graphics (e.g., quantum computers and event cameras).Scalable Dense Non-rigid Structure from Motion.- Shape Priors in Dense Non-rigid Structure from Motion.- Probabilistic Point Set Registration with Prior Correspondences.- Point Set Registration Relying on Principles of Particle Dynamics.

Regulärer Preis: 96,29 €
Produktbild für Don't Teach Coding

Don't Teach Coding

THE DEFINITIVE RESOURCE FOR UNDERSTANDING WHAT CODING IS, DESIGNED FOR EDUCATORS AND PARENTSEven though the vast majority of teachers, parents, and students understand the importance of computer science in the 21st century, many struggle to find appropriate educational resources. Don't Teach Coding: Until You Read This Book fills a gap in current knowledge by explaining exactly what coding is and addressing why and how to teach the subject. Providing a historically grounded, philosophically sensitive description of computer coding, this book helps readers understand the best practices for teaching computer science to their students and their children.The authors, experts in teaching computer sciences to students of all ages, offer practical insights on whether coding is a field for everyone, as opposed to a field reserved for specialists. This innovative book provides an overview of recent scientific research on how the brain learns coding, and features practical exercises that strengthen coding skills. Clear, straightforward chapters discuss a broad range of questions using principles of computer science, such as why we should teach students to code and is coding a science, engineering, technology, mathematics, or language? Helping readers understand the principles and issues of coding education, this book:* Helps those with no previous background in computer science education understand the questions and debates within the field* Explores the history of computer science education and its influence on the present* Views teaching practices through a computational lens* Addresses why many schools fail to teach computer science adequately* Explains contemporary issues in computer science such as the language wars and trends that equate coding with essential life skills like reading and writingDon't Teach Coding: Until You Read This Book is a valuable resource for K-12 educators in computer science education and parents wishing to understand the field to help chart their children’s education path.STEPHEN R. FOSTER, PHD, is a researcher, author, and co-founder of several social enterprises with a mission to teach teachers how to teach coding. An expert in video game end-user programming and computer science education, Stephen has coded to generate peer-reviewed scientific results, coded to build educational technology solutions for teachers and students, and coded to bootstrap educational startups and non-profit organizations. LINDSEY D. HANDLEY, PHD, is a teacher, researcher, entrepreneur, author, and co-founder, with Stephen Foster, of ThoughtSTEM and MetaCoders.org, which have helped hundreds of thousands of beginning coders. She is a passionate advocate of both using science to improve education and of improving the teaching of science worldwide. About the Authors xiAcknowledgments xiiiINTRODUCTION 1Who is This Book For? 3Let’s Do It! 3CHAPTER 1: PROLOGUES 5A Wizard’s Tale 5The Sorting of Wizards 5The Call to Action 10A Language Without 10Our Strange Protagonists 10(cons 'Apple 'Soft) 13Tower of Babel 15Confessions 16Penances 17A Language Within 17Installing Languages 17Writing in Tongues 19Kiss, Gift, Poison 20Nova: Va o no va? 22Hello, Hello, Hello 23Languages Without 25Tongueless Languages 27Babbage’s Calculus Club 29Diffs 31Finite Descriptions of the Infinite 31Bottling the Human Will 33Machines Anchor Language 35Now That It’s Out of Our System 39Languages Within 40Signed Languages 42Silent Battles 43Our Strange Citizens of Broca’s Area 49CHAPTER 2: BEGINNINGS 51A Wizard’s Tale 51The Leap of Faith 51The Forge 53They Slept 56A Language Without 56Syntax – Building Materials 59A Meta-Linguistic Meander 60Back to Syntax 62Semantics: “When your eyes see this, do this with your mind . . . ” 63Checking Assumptions 65We Have a “Language.” Now What? 66A Language Within 66Cats 66Stories and Back Stories 71Ab(stract) 74Shortest Path: Dijkstra to You 75A Brave New Syntax 79Languages Without 81The Unwritten, Unwritable Backstory 83Three Old Friends: Language, Math, Algorithms 84Algorithms of Antiquity 88A Brief Story of Stories 90Languages Within 91Foreign Language: A Friend, Perhaps a Mentor 96Zapping Broca’s Area 97More Monkey Business 98CHAPTER 3: MIDDLES 101A Wizard’s Tale 101Purgatory 101Descent 103Ascent 105A Language Without 106(Stories (Within Stories)) 106Order Word 111Easing the Transition 113Magic Tricks 114A Language Within 122Implicit Learning 122Animation 122Napoleon’s Risky Maneuver 126Noughts and Crosses 131Round Stories; Square Frames 132Languages Without 133Illusions of Mind 133Dactylonomy: Digits to Digital 134Externalization 137The Spark of the Pascaline 139The Best of all Possible Languages 141Automatons 144King Ludd 147The Song for the Luddites 149Languages Within 152The Machine Within 152Potions for the Mind 152Science and Schools 154Mindset 156Metacognition 158Deliberate Practice 160Second LanguageAcquisition 160Krash Course 162Fluency and Expertise 164What It Feels Like to Upgrade Your Own Wetware 166Meta-teaching 168A Universal Educational Language 169The Loop of Being Human 173CHAPTER 4: ENDS 175A Wizard’s Tale 176Learn to Teach; Teach to Learn 176Montage 178Loop Back 183The Beginning 184A Language Without 184Our Road Thus Far 184Definitions 185Becoming the Machine 187Loops 188Mad Libs 190Turing Completeness 191Ifs 196Extending Language 199A Language Within 200So lernt man lernen: Der Weg zum Erfolg 200Designing Your Deck 207The System 210Unburdening Yourself 213Parting Exercises 214Languages Without 215The Flood and the Tower 215Soft is the New Hard, and the Old Hard 216Abstraction’s Arrow 218Languages Within 224The Education Bottleneck 224History’s First Coding Students 225(environment (mind (fluency))) 228Co-Authoring the EdTech Story 233Babbages and Lovelaces of Education 238This Final Section Has No Name 240CONCLUSION 241Next Steps: Learning Sciences 241Next Steps: Languages to Learn 242Next Steps: Coding 242Next Steps: Software Engineering 242Next Steps: Hacker Culture 243Next Steps: History 243Naming Things: Computer Science 244Naming Things: Philosophy of Mind 245Naming Things: Learning Science 245Thank You 246Bibliography 247Index 259

Regulärer Preis: 19,99 €
Produktbild für Artificial Intelligence for Business

Artificial Intelligence for Business

Artificial Intelligence for Business: A Roadmap for Getting Started with AI will provide the reader with an easy to understand roadmap for how to take an organization through the adoption of AI technology. It will first help with the identification of which business problems and opportunities are right for AI and how to prioritize them to maximize the likelihood of success. Specific methodologies are introduced to help with finding critical training data within an organization and how to fill data gaps if they exist. With data in hand, a scoped prototype can be built to limit risk and provide tangible value to the organization as a whole to justify further investment. Finally, a production level AI system can be developed with best practices to ensure quality with not only the application code, but also the AI models. Finally, with this particular AI adoption journey at an end, the authors will show that there is additional value to be gained by iterating on this AI adoption lifecycle and improving other parts of the organization. JEFFREY L. COVEYDUC is Vice President and Master Inventor at IBM. His diverse background consists of positions that encompass the creation of innovative, technologically advanced global AI solutions and client adoption. JASON L. ANDERSON is a Partner and CTO with the data consultancy, Comp Three, where he established a new AI line of business. He is also a former IBM Cognitive Architect and Master Inventor. He received both BS and MS degrees in Computer Science from California Polytechnic State University, SLO. Preface ixAcknowledgments xiCHAPTER 1 INTRODUCTION 1Case Study #1: FANUC Corporation 2Case Study #2: H&R Block 4Case Study #3: BlackRock, Inc. 5How to Get Started 6The Road Ahead 10Notes 11CHAPTER 2 IDEATION 13An Artificial Intelligence Primer 13Becoming an Innovation-Focused Organization 23Idea Bank 25Business Process Mapping 27Flowcharts, SOPs, and You 28Information Flows 29Coming Up with Ideas 31Value Analysis 31Sorting and Filtering 34Ranking, Categorizing, and Classifying 35Reviewing the Idea Bank 37Brainstorming and Chance Encounters 38AI Limitations 41Pitfalls 44Action Checklist 45Notes 46CHAPTER 3 DEFINING THE PROJECT 47The What, Why, and How of a Project Plan 48The Components of a Project Plan 49Approaches to Break Down a Project 53Project Measurability 62Balanced Scorecard 63Building an AI Project Plan 64Pitfalls 66Action Checklist 69CHAPTER 4 DATA CURATION AND GOVERNANCE 71Data Collection 73Leveraging the Power of Existing Systems 81The Role of a Data Scientist 81Feedback Loops 82Making Data Accessible 84Data Governance 85Are You Data Ready? 89Pitfalls 90Action Checklist 94Notes 94CHAPTER 5 PROTOTYPING 97Is There an Existing Solution? 97Employing vs. Contracting Talent 99Scrum Overview 101User Story Prioritization 103The Development Feedback Loop 105Designing the Prototype 106Technology Selection 107Cloud APIs and Microservices 110Internal APIs 112Pitfalls 112Action Checklist 114Notes 114CHAPTER 6 PRODUCTION 117Reusing the Prototype vs. Starting from a Clean Slate 117Continuous Integration 119Automated Testing 124Ensuring a Robust AI System 128Human Intervention in AI Systems 129Ensure Prototype Technology Scales 131Cloud Deployment Paradigms 133Cloud API’s SLA 135Continuing the Feedback Loop 135Pitfalls 135Action Checklist 137Notes 137CHAPTER 7 THRIVING WITH AN AI LIFECYCLE 139Incorporate User Feedback 140AI Systems Learn 142New Technology 144Quantifying Model Performance 145Updating and Reviewing the Idea Bank 147Knowledge Base 148Building a Model Library 150Contributing to Open Source 155Data Improvements 157With Great Power Comes Responsibility 158Pitfalls 159Action Checklist 161Notes 161CHAPTER 8 CONCLUSION 163The Intelligent Business Model 164The Recap 164So What are You Waiting For? 168APPENDIX A AI EXPERTS 169AI Experts 169Chris Ackerson 169Jeff Bradford 173Nathan S. Robinson 175Evelyn Duesterwald 177Jill Nephew 179Rahul Akolkar 183Steven Flores 187APPENDIX B ROADMAP ACTION CHECKLISTS 191Step 1: Ideation 191Step 2: Defining the Project 191Step 3: Data Curation and Governance 192Step 4: Prototyping 192Step 5: Production 193Thriving with an AI Lifecycle 193APPENDIX C PITFALLS TO AVOID 195Step 1: Ideation 195Step 2: Defining the Project 196Step 3: Data Curation and Governance 199Step 4: Prototyping 203Step 5: Production 204Thriving with an AI Lifecycle 206Index 209

Regulärer Preis: 25,99 €
Produktbild für Modern Big Data Architectures

Modern Big Data Architectures

PROVIDES AN UP-TO-DATE ANALYSIS OF BIG DATA AND MULTI-AGENT SYSTEMSThe term Big Data refers to the cases, where data sets are too large or too complex for traditional data-processing software. With the spread of new concepts such as Edge Computing or the Internet of Things, production, processing and consumption of this data becomes more and more distributed. As a result, applications increasingly require multiple agents that can work together. A multi-agent system (MAS) is a self-organized computer system that comprises multiple intelligent agents interacting to solve problems that are beyond the capacities of individual agents. Modern Big Data Architectures examines modern concepts and architecture for Big Data processing and analytics.This unique, up-to-date volume provides joint analysis of big data and multi-agent systems, with emphasis on distributed, intelligent processing of very large data sets. Each chapter contains practical examples and detailed solutions suitable for a wide variety of applications. The author, an internationally-recognized expert in Big Data and distributed Artificial Intelligence, demonstrates how base concepts such as agent, actor, and micro-service have reached a point of convergence—enabling next generation systems to be built by incorporating the best aspects of the field. This book:* Illustrates how data sets are produced and how they can be utilized in various areas of industry and science* Explains how to apply common computational models and state-of-the-art architectures to process Big Data tasks* Discusses current and emerging Big Data applications of Artificial IntelligenceModern Big Data Architectures: A Multi-Agent Systems Perspective is a timely and important resource for data science professionals and students involved in Big Data analytics, and machine and artificial learning.DOMINIK RYŻKO is an Assistant Professor at the Institute of Computer Science at Warsaw University of Technology. His research interests include Big Data and Distributed Artificial Intelligence. He is widely published, serves on program committees at international conferences, and is Vice President of artificial intelligence and analytics at Adform, a global ad-tech platform provider. He also spent three years at Allegro Group as the Chief Data Scientist where he oversaw Data Science activities, design and methodology of experiments, and model building. List of Figures ixList of Tables xiPreface xiiiAcknowledgments xvAcronyms xviiCHAPTER 1 INTRODUCTION 11.1 Motivation 11.2 Assumptions 31.3 For Whom is This Book? 41.4 Book Structure 4CHAPTER 2 EVOLUTION OF IT ARCHITECTURES AND PARADIGMS 72.1 Evolution of IT Architectures 72.1.1 Monolith 72.1.2 Service Oriented Architecture 92.1.3 Microservices 122.2 Actors and Agents 152.2.1 Actors 152.2.2 Agents 172.3 From ACID to BASE, CAP, and NoSQL – The Database (R)evolution 222.4 The Cloud 242.5 From Distributed Sensor Networks to the Internet of Things and Cyber-Physical Systems 272.6 The Rise of Big Data 28CHAPTER 3 SOURCES OF DATA 313.1 The Internet 323.1.1 The Semantic Web 323.1.2 Linked Data 353.1.3 Knowledge Graphs 363.1.4 Social Media 383.1.5 Web Mining 383.2 Scientific Data 403.2.1 Biomedical Data 403.2.2 Physics and Astrophysics Data 413.2.3 Environmental Sciences 443.3 Industrial Data 453.3.1 Smart Factories 453.3.2 SmartGrid 473.3.3 Aviation 473.4 Internet of Things 48CHAPTER 4 BIG DATA TASKS 514.1 Recommender Systems 514.2 Search 524.3 Ad-tech and RTB Algorithms 554.4 Cross-Device Graph Generation 574.5 Forecasting and Prediction Systems 584.6 Social Media Big Data 594.7 Anomaly and Fraud Detection 614.8 New Drug Discovery 634.9 Smart Grid Control and Monitoring 644.10 IoT and Big Data Applications 65CHAPTER 5 CLOUD COMPUTING 675.1 Cloud Enabled Architectures 675.1.1 Cloud Management Platforms 675.1.2 Efficient Cloud Computing 735.1.3 Distributed Storage Systems 755.2 Agents and the Cloud 825.2.1 Multi-agent Versus Cloud Paradigms 835.2.2 Agents in the Cloud 83CHAPTER 6 BIG DATA ARCHITECTURES 876.1 Big Data Computation Models 876.1.1 MapReduce 876.1.2 Directed Acyclic Graph Models 896.1.3 All-Pairs 926.1.4 Very Large Bitmap Operations 936.1.5 Message Passing Interface 946.1.6 Graphical Processing Unit Computing 956.2 Publish-Subscribe Systems 976.3 Stream Processing 996.3.1 Information Flow Processing Concepts 996.3.2 Stream Processing Systems 1016.4 Higer Level Big Data Architectures 1106.4.1 Spark 1106.4.2 Lambda 1126.4.3 Multi-Agent View of the Lambda Architecture 1136.4.4 Questioning the Lambda 1156.5 Industry and Other Approaches 1166.6 Actor and Agent-Based Big Data Architectures 118CHAPTER 7 BIG DATA ANALYTICS, MINING, AND MACHINE LEARNING 1217.1 To SQL or Not to SQL 1227.1.1 SQL Hadoop Interfaces 1237.1.2 From Shark to SparkSQL 1257.2 Big Data Mining and Machine Learning 1287.2.1 Graph Mining 1337.2.2 Agent Based Machine Learning and Data Mining 134CHAPTER 8 PHYSICALLY DISTRIBUTED SYSTEMS – MOBILE CLOUD, INTERNET OF THINGS, EDGE COMPUTING 1378.1 Mobile Cloud 1388.2 Edge and Fog Computing 1458.2.1 Business Case: Mobile Context Aware Recommender System 1478.3 Internet of Things 1488.3.1 IoT Fundamentals 1488.3.2 IoT and the Cloud 1518.3.3 MAS in IoT 156CHAPTER 9 SUMMARY 159Bibliography 161Index 179

Regulärer Preis: 41,99 €
Produktbild für Die Digitalisierung der Controlling-Funktion

Die Digitalisierung der Controlling-Funktion

Der digitale Wandel hat die Unternehmen fest im Griff. Auf die Controlling-Funktion wirkt sich die Digitalisierung mehrdimensional aus und verändert Controlling-Prozesse, Controlling-Methoden sowie das Rollenbild des Controllers. Dieses Herausgeberwerk zeigt auf, wie die Chancen der Digitalisierung für die Controlling-Funktion wertschöpfend genutzt werden können. Die Autoren beschreiben einzelne Dimensionen der Digitalisierung im Controlling und vermitteln notwendige Grundlagen und Konzepte. Fallbeispiele aus der Controlling-Praxis ergänzen die theoretischen Grundlagen und zeigen branchenübergreifende Lösungsansätze auf.  

Regulärer Preis: 39,99 €
Produktbild für Recent Advances in Hybrid Metaheuristics for Data Clustering

Recent Advances in Hybrid Metaheuristics for Data Clustering

AN AUTHORITATIVE GUIDE TO AN IN-DEPTH ANALYSIS OF VARIOUS STATE-OF-THE-ART DATA CLUSTERING APPROACHES USING A RANGE OF COMPUTATIONAL INTELLIGENCE TECHNIQUESRecent Advances in Hybrid Metaheuristics for Data Clustering offers a guide to the fundamentals of various metaheuristics and their application to data clustering. Metaheuristics are designed to tackle complex clustering problems where classical clustering algorithms have failed to be either effective or efficient. The authors—noted experts on the topic—provide a text that can aid in the design and development of hybrid metaheuristics to be applied to data clustering. The book includes performance analysis of the hybrid metaheuristics in relationship to their conventional counterparts. In addition to providing a review of data clustering, the authors include in-depth analysis of different optimization algorithms. The text offers a step-by-step guide in the build-up of hybrid metaheuristics and to enhance comprehension. In addition, the book contains a range of real-life case studies and their applications. This important text:* Includes performance analysis of the hybrid metaheuristics as related to their conventional counterparts* Offers an in-depth analysis of a range of optimization algorithms* Highlights a review of data clustering* Contains a detailed overview of different standard metaheuristics in current use* Presents a step-by-step guide to the build-up of hybrid metaheuristics* Offers real-life case studies and applicationsWritten for researchers, students and academics in computer science, mathematics, and engineering, Recent Advances in Hybrid Metaheuristics for Data Clustering provides a text that explores the current data clustering approaches using a range of computational intelligence techniques. SOURAV DE, PhD, is an Associate Professor of Computer Science and Engineering at Cooch Behar Government Engineering College, West Bengal, India. SANDIP DEY, PhD, is an Assistant Professor of Computer Science at Sukanta Mahavidyalaya, Dhupguri, Jalpaiguri, India. SIDDHARTHA BHATTACHARYYA, PhD, is a Professor of Computer Science and Engineering at CHRIST (Deemed to be University), Bangalore, India. List of Contributors xiiiSeries Preface xvPreface xvii1 METAHEURISTIC ALGORITHMS IN FUZZY CLUSTERING 1Sourav De, Sandip Dey, and Siddhartha Bhattacharyya1.1 Introduction 11.2 Fuzzy Clustering 11.2.1 Fuzzy c-means (FCM) clustering 21.3 Algorithm 21.3.1 Selection of Cluster Centers 31.4 Genetic Algorithm 31.5 Particle Swarm Optimization 51.6 Ant Colony Optimization 61.7 Artificial Bee Colony Algorithm 71.8 Local Search-Based Metaheuristic Clustering Algorithms 71.9 Population-Based Metaheuristic Clustering Algorithms 81.9.1 GA-Based Fuzzy Clustering 81.9.2 PSO-Based Fuzzy Clustering 91.9.3 Ant Colony Optimization–Based Fuzzy Clustering 101.9.4 Artificial Bee Colony Optimization–Based Fuzzy Clustering 101.9.5 Differential Evolution–Based Fuzzy Clustering 111.9.6 Firefly Algorithm–Based Fuzzy Clustering 121.10 Conclusion 13References 132 HYBRID HARMONY SEARCH ALGORITHM TO SOLVE THE FEATURE SELECTION FOR DATA MINING APPLICATIONS 19Laith Mohammad Abualigah, Mofleh Al-diabat, Mohammad Al Shinwan, Khaldoon Dhou, Bisan Alsalibi, Essam Said Hanandeh, and Mohammad Shehab2.1 Introduction 192.2 Research Framework 212.3 Text Preprocessing 222.3.1 Tokenization 222.3.2 StopWords Removal 222.3.3 Stemming 232.3.4 Text Document Representation 232.3.5 TermWeight (TF-IDF) 232.4 Text Feature Selection 242.4.1 Mathematical Model of the Feature Selection Problem 242.4.2 Solution Representation 242.4.3 Fitness Function 242.5 Harmony Search Algorithm 252.5.1 Parameters Initialization 252.5.2 Harmony Memory Initialization 262.5.3 Generating a New Solution 262.5.4 Update Harmony Memory 272.5.5 Check the Stopping Criterion 272.6 Text Clustering 272.6.1 Mathematical Model of the Text Clustering 272.6.2 Find Clusters Centroid 272.6.3 Similarity Measure 282.7 k-means text clustering algorithm 282.8 Experimental Results 292.8.1 Evaluation Measures 292.8.1.1 F-measure Based on Clustering Evaluation 302.8.1.2 Accuracy Based on Clustering Evaluation 312.8.2 Results and Discussions 312.9 Conclusion 34References 343 ADAPTIVE POSITION–BASED CROSSOVER IN THE GENETIC ALGORITHM FOR DATA CLUSTERING 39Arnab Gain and Prasenjit Dey3.1 Introduction 393.2 Preliminaries 403.2.1 Clustering 403.2.1.1 k-means Clustering 403.2.2 Genetic Algorithm 413.3 RelatedWorks 423.3.1 GA-Based Data Clustering by Binary Encoding 423.3.2 GA-Based Data Clustering by Real Encoding 433.3.3 GA-Based Data Clustering for Imbalanced Datasets 443.4 Proposed Model 443.5 Experimentation 463.5.1 Experimental Settings 463.5.2 DB Index 473.5.3 Experimental Results 493.6 Conclusion 51References 574 APPLICATION OF MACHINE LEARNING IN THE SOCIAL NETWORK 61Belfin R. V., E. Grace Mary Kanaga, and Suman Kundu4.1 Introduction 614.1.1 Social Media 614.1.2 Big Data 624.1.3 Machine Learning 624.1.4 Natural Language Processing (NLP) 634.1.5 Social Network Analysis 644.2 Application of Classification Models in Social Networks 644.2.1 Spam Content Detection 654.2.2 Topic Modeling and Labeling 654.2.3 Human Behavior Analysis 674.2.4 Sentiment Analysis 684.3 Application of Clustering Models in Social Networks 684.3.1 Recommender Systems 694.3.2 Sentiment Analysis 704.3.3 Information Spreading or Promotion 704.3.4 Geolocation-Specific Applications 704.4 Application of Regression Models in Social Networks 714.4.1 Social Network and Human Behavior 714.4.2 Emotion Contagion through Social Networks 734.4.3 Recommender Systems in Social Networks 744.5 Application of Evolutionary Computing and Deep Learning in Social Networks 744.5.1 Evolutionary Computing and Social Network 754.5.2 Deep Learning and Social Networks 754.6 Summary 76Acknowledgments 77References 785 PREDICTING STUDENTS’ GRADES USING CART, ID3, AND MULTICLASS SVM OPTIMIZED BY THE GENETIC ALGORITHM (GA): A CASE STUDY 85Debanjan Konar, Ruchita Pradhan, Tania Dey, Tejaswini Sapkota, and Prativa Rai5.1 Introduction 855.2 Literature Review 875.3 Decision Tree Algorithms: ID3 and CART 885.4 Multiclass Support Vector Machines (SVMs) Optimized by the Genetic Algorithm (GA) 905.4.1 Genetic Algorithms for SVM Model Selection 925.5 Preparation of Datasets 935.6 Experimental Results and Discussions 955.7 Conclusion 96References 966 CLUSTER ANALYSIS OF HEALTH CARE DATA USING HYBRID NATURE-INSPIRED ALGORITHMS 101Kauser Ahmed P, Rishabh Agrawal6.1 Introduction 1016.2 RelatedWork 1026.2.1 Firefly Algorithm 1026.2.2 k-means Algorithm 1036.3 Proposed Methodology 1046.4 Results and Discussion 1066.5 Conclusion 110References 1117 PERFORMANCE ANALYSIS THROUGH A METAHEURISTIC KNOWLEDGE ENGINE 113Indu Chhabra and Gunmala Suri7.1 Introduction 1137.2 Data Mining and Metaheuristics 1147.3 Problem Description 1157.4 Association Rule Learning 1167.4.1 Association Mining Issues 1167.4.2 Research Initiatives and Projects 1167.5 Literature Review 1177.6 Methodology 1197.6.1 Phase 1: Pattern Search 1207.6.2 Phase 2: Rule Mining 1207.6.3 Phase 3: Knowledge Derivation 1217.7 Implementation 1217.7.1 Test Issues 1217.7.2 System Evaluation 1217.7.2.1 Indicator Matrix Formulation 1227.7.2.2 Phase 1: Frequent Pattern Derivation 1237.7.2.3 Phase 2: Association Rule Framing 1237.7.2.4 Phase 3: Knowledge Discovery Through Metaheuristic Implementation 1237.8 Performance Analysis 1247.9 Research Contributions and Future Work 1257.10 Conclusion 126References 1268 MAGNETIC RESONANCE IMAGE SEGMENTATION USING A QUANTUM-INSPIRED MODIFIED GENETIC ALGORITHM (QIANA) BASED ON FRCM 129Sunanda Das, Sourav De, Sandip Dey, and Siddhartha Bhattacharyya8.1 Introduction 1298.2 Literature Survey 1318.3 Quantum Computing 1338.3.1 Quoit-Quantum Bit 1338.3.2 Entanglement 1338.3.3 Measurement 1338.3.4 Quantum Gate 1348.4 Some Quality Evaluation Indices for Image Segmentation 1348.4.1 F(I) 1348.4.2 F’(I) 1358.4.3 Q(I) 1358.5 Quantum-Inspired Modified Genetic Algorithm (QIANA)–Based FRCM 1358.5.1 Quantum-Inspired MEGA (QIANA)–Based FRCM 1368.6 Experimental Results and Discussion 1398.7 Conclusion 147References 1479 A HYBRID APPROACH USING THE K-MEANS AND GENETIC ALGORITHMS FOR IMAGE COLOR QUANTIZATION 151Marcos Roberto e Souza, Anderson Carlos Sousa e Santos, and Helio Pedrini9.1 Introduction 1519.2 Background 1529.3 Color Quantization Methodology 1549.3.1 Crossover Operators 1579.3.2 Mutation Operators 1589.3.3 Fitness Function 1589.4 Results and Discussions 1599.5 Conclusions and Future Work 168Acknowledgments 168References 168Index 173

Regulärer Preis: 114,99 €
Produktbild für Machine Vision Inspection Systems, Image Processing, Concepts, Methodologies, and Applications

Machine Vision Inspection Systems, Image Processing, Concepts, Methodologies, and Applications

This edited book brings together leading researchers, academic scientists and research scholars to put forward and share their experiences and research results on all aspects of an inspection system for detection analysis for various machine vision applications. It also provides a premier interdisciplinary platform to present and discuss the most recent innovations, trends, methodology, applications, and concerns as well as practical challenges encountered and solutions adopted in the inspection system in terms of image processing and analytics of machine vision for real and industrial application.Machine vision inspection systems (MVIS) utilized all industrial and non-industrial applications where the execution of their utilities based on the acquisition and processing of images. MVIS can be applicable in industry, governmental, defense, aerospace, remote sensing, medical, and academic/education applications but constraints are different. MVIS entails acceptable accuracy, high reliability, high robustness, and low cost. Image processing is a well-defined transformation between human vision and image digitization, and their techniques are the foremost way to experiment in the MVIS. The digital image technique furnishes improved pictorial information by processing the image data through machine vision perception. Digital image pro­cessing has widely been used in MVIS applications and it can be employed to a wide diversity of problems particularly in Non-Destructive testing (NDT), presence/absence detection, defect/fault detection (weld, textile, tiles, wood, etc.,), automated vision test & measurement, pattern matching, optical character recognition & verification (OCR/OCV), barcode reading and traceability, medical diagnosis, weather forecasting, face recognition, defence and space research, etc. This edited book is designed to address various aspects of recent methodologies, concepts and research plan out to the readers for giving more depth insights for perusing research on machine vision using image processing techniques.MUTHUKUMARAN MALARVEL obtained his PhD in Digital Image Processing and he is currently working as an Associate Professor in the Department of Computer Science and Engineering at Chitkara University, Punjab, India. His research interests include digital image processing, machine vision systems, image statistical analysis & feature extraction, and machine learning algorithms. SOUMYA RANJAN NAYAK obtained his PhD in computer science and engineering from the Biju Patnaik University of Technology, India. He has more than a decade of teaching and research experience and currently is working as an Assistant Professor, Amity University, Noida, India. His research interests include image analysis on fractal geometry, color and texture analysis jointly and separately. SURYA NARAYAN PANDA is a Professor and Director Research at Chitkara University, Punjab, India. His areas of interest include Cybersecurity, Networking, Advanced Computer Networks, Machine Learning, and Artificial Intelligence. He has developed the prototype of Smart Portable Intensive Care Unit through which the doctor can provide immediate virtual medical assistance to emergency cases in the ambulance. He is currently involved in designing different healthcare devices for real-time issues using AI and ML. PRASANT KUMAR PATTNAIK Ph.D. (Computer Science), Fellow IETE, Senior Member IEEE is a Professor at the School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, India. He has more than a decade of teaching and research experience. His areas of interest include Mobile Computing, Cloud Computing, Cyber Security, Intelligent Systems and Brain Computer Interface. NITTAYA MUANGNAK is a lecturer at Kasetsart University, Thailand. Her PhD research has been on medical image analysis, particularly retinal fundus image, at Sirindhorn International Institute of Technology, Thammasat University in Thailand. Preface xi1 LAND-USE CLASSIFICATION WITH INTEGRATED DATA 1D. A. Meedeniya, J. A. A. M Jayanetti, M. D. N. Dilini, M. H. Wickramapala and J. H. Madushanka1.1 Introduction 21.2 Background Study 31.2.1 Overview of Land-Use and Land-Cover Information 31.2.2 Geographical Information Systems 41.2.3 GIS-Related Data Types 41.2.3.1 Point Data Sets 41.2.3.2 Aerial Data Sets 51.2.4 Related Studies 61.3 System Design 61.4 Implementation Details 101.4.1 Materials 101.4.2 Preprocessing 111.4.3 Built-Up Area Extraction 111.4.4 Per-Pixel Classification 121.4.5 Clustering 141.4.6 Segmentation 141.4.7 Object-Based Image Classification 161.4.8 Foursquare Data Preprocessing and Quality Analysis 201.4.9 Integration of Satellite Images with Foursquare Data 211.4.10 Building Block Identification 211.4.11 Overlay of Foursquare Points 221.4.12 Visualization of Land Usage 231.4.13 Common Platform Development 231.5 System Evaluation 251.5.1 Experimental Evaluation Process 251.5.2 Evaluation of the Classification Using Base Error Matrix 281.6 Discussion 311.6.1 Contribution of the Proposed Approach 311.6.2 Limitations of the Data Sets 321.6.3 Future Research Directions 331.7 Conclusion 34References 352 INDIAN SIGN LANGUAGE RECOGNITION USING SOFT COMPUTING TECHNIQUES 37Ashok Kumar Sahoo, Pradeepta Kumar Sarangi and Parul Goyal2.1 Introduction 372.2 Related Works 382.2.1 The Domain of Sign Language 392.2.2 The Data Acquisition Methods 412.2.3 Preprocessing Steps 422.2.3.1 Image Restructuring 432.2.3.2 Skin Color Detection 432.2.4 Methods of Feature Extraction Used in the Experiments 442.2.5 Classification Techniques 452.2.5.1 K-Nearest Neighbor 452.2.5.2 Neural Network Classifier 452.2.5.3 Naive Baÿes Classifier 462.3 Experiments 462.3.1 Experiments on ISL Digits 462.3.1.1 Results and Discussions on the First Experiment 472.3.1.2 Results and Discussions on Second Experiment 492.3.2 Experiments on ISL Alphabets 512.3.2.1 Experiments with Single-Handed Alphabet Signs 512.3.2.2 Results of Single-Handed Alphabet Signs 522.3.2.3 Experiments with Double-Handed Alphabet Signs 532.3.2.4 Results on Double-Handed Alphabets 542.3.3 Experiments on ISL Words 582.3.3.1 Results on ISL Word Signs 592.4 Summary 63References 633 STORED GRAIN PEST IDENTIFICATION USING AN UNMANNED AERIAL VEHICLE (UAV)-ASSISTED PEST DETECTION MODEL 67Kalyan Kumar Jena, Sasmita Mishra, Sarojananda Mishra and Sourav Kumar Bhoi3.1 Introduction 683.2 Related Work 693.3 Proposed Model 703.4 Results and Discussion 723.5 Conclusion 77References 784 OBJECT DESCRIPTOR FOR MACHINE VISION 85Aparna S. Murthy and Salah Rabba4.1 Outline 854.2 Chain Codes 874.3 Polygonal Approximation 894.4 Moments 924.5 HU Invariant Moments 964.6 Zernike Moments 974.7 Fourier Descriptors 984.8 Quadtree 994.9 Conclusion 102References 1145 FLOOD DISASTER MANAGEMENT: RISKS, TECHNOLOGIES, AND FUTURE DIRECTIONS 115Hafiz Suliman Munawar5.1 Flood Management 1155.1.1 Introduction 1155.1.2 Global Flood Risks and Incidents 1165.1.3 Causes of Floods 1185.1.4 Floods in Pakistan 1195.1.5 Floods in Australia 1215.1.6 Why Floods are a Major Concern 1235.2 Existing Disaster Management Systems 1245.2.1 Introduction 1245.2.2 Disaster Management Systems Used Around the World 1245.2.2.1 Disaster Management Model 1255.2.2.2 Disaster Risk Analysis System 1265.2.2.3 Geographic Information System 1265.2.2.4 Web GIS 1265.2.2.5 Remote Sensing 1275.2.2.6 Satellite Imaging 1275.2.2.7 Global Positioning System for Imaging 1285.2.3 Gaps in Current Disaster Management Technology 1285.3 Advancements in Disaster Management Technologies 1295.3.1 Introduction 1295.3.2 AI and Machine Learning for Disaster Management 1305.3.2.1 AIDR 1305.3.2.2 Warning Systems 1305.3.2.3 QCRI 1315.3.2.4 The Concern 1315.3.2.5 BlueLine Grid 1315.3.2.6 Google Maps 1325.3.2.7 RADARSAT-1 1325.3.3 Recent Research in Disaster Management 1325.3.4 Conclusion 1375.4 Proposed System 1375.4.1 Image Acquisition Through UAV 1385.4.2 Preprocessing 1385.4.3 Landmarks Detection 1385.4.3.1 Buildings 1395.4.3.2 Roads 1395.4.4 Flood Detection 1405.4.4.1 Feature Matching 1405.4.4.2 Flood Detection Using Machine Learning 1415.4.5 Conclusion 143References 1436 TEMPORAL COLOR ANALYSIS OF AVOCADO DIP FOR QUALITY CONTROL 147Homero V. Rios-Figueroa, Micloth López del Castillo-Lozano, Elvia K. Ramirez-Gomez and Ericka J. Rechy-Ramirez6.1 Introduction 1476.2 Materials and Methods 1486.3 Image Acquisition 1496.4 Image Processing 1506.5 Experimental Design 1506.5.1 First Experimental Design 1506.5.2 Second Experimental Design 1516.6 Results and Discussion 1516.6.1 First Experimental Design (RGB Color Space) 1516.6.2 Second Experimental Design (L*a*b* Color Space) 1526.7 Conclusion 156References 1567 IMAGE AND VIDEO PROCESSING FOR DEFECT DETECTION IN KEY INFRASTRUCTURE 159Hafiz Suliman Munawar7.1 Introduction 1607.2 Reasons for Defective Roads and Bridges 1617.3 Image Processing for Defect Detection 1627.3.1 Feature Extraction 1627.3.2 Morphological Operators 1637.3.3 Cracks Detection 1647.3.4 Potholes Detection 1657.3.5 Water Puddles Detection 1667.3.6 Pavement Distress Detection 1677.4 Image-Based Defect Detection Methods 1697.4.1 Thresholding Techniques 1707.4.2 Edge Detection Techniques 1707.4.3 Wavelet Transform Techniques 1717.4.4 Texture Analysis Techniques 1717.4.5 Machine Learning Techniques 1727.5 Factors Affecting the Performance 1727.5.1 Lighting Variations 1737.5.2 Small Database 1737.5.3 Low-Quality Data 1737.6 Achievements and Issues 1737.6.1 Achievements 1747.6.2 Issues 1747.7 Conclusion 174References 1758 METHODOLOGY FOR THE DETECTION OF ASYMPTOMATIC DIABETIC RETINOPATHY 179Jaskirat Kaur and Deepti Mittal8.1 Introduction 1808.2 Key Steps of Computer-Aided Diagnostic Methods 1818.3 DR Screening and Grading Methods 1838.4 Key Observations from Literature Review 1888.5 Design of Experimental Methodology 1898.6 Conclusion 192References 1939 OFFLINE HANDWRITTEN NUMERAL RECOGNITION USING CONVOLUTION NEURAL NETWORK 197Abhisek Sethy, Prashanta Kumar Patra and Soumya Ranjan Nayak9.1 Introduction 1989.2 Related Work Done 1999.3 Data Set Used for Simulation 2019.4 Proposed Model 2029.5 Result Analysis 2049.6 Conclusion and Future Work 207References 20910 A REVIEW ON PHISHING—MACHINE VISION AND LEARNING APPROACHES 213Hemamalini Siranjeevi, Swaminathan Venkatraman and Kannan Krithivasan10.1 Introduction 21310.2 Literature Survey 21410.2.1 Content-Based Approaches 21410.2.2 Heuristics-Based Approaches 21510.2.3 Blacklist-Based Approaches 21510.2.4 Whitelist-Based Approaches 21610.2.5 CANTINA-Based Approaches 21610.2.6 Image-Based Approaches 21610.3 Role of Data Mining in Antiphishing 21710.3.1 Phishing Detection 21910.3.2 Phishing Prevention 22010.3.3 Training and Education 22210.3.4 Phishing Recovery and Avoidance 22210.3.5 Visual Methods 22310.4 Conclusion 224Acknowledgments 224References 224Index 231

Regulärer Preis: 170,99 €
Produktbild für SQL Server Database Programming with Visual Basic.NET

SQL Server Database Programming with Visual Basic.NET

A GUIDE TO THE PRACTICAL ISSUES AND APPLICATIONS IN DATABASE PROGRAMMING WITH UPDATED VISUAL BASIC.NETSQL Server Database Programming with Visual Basic.NET offers a guide to the fundamental knowledge and practical techniques for the design and creation of professional database programs that can be used for real-world commercial and industrial applications. The author—a noted expert on the topic—uses the most current version of Visual Basic.NET, Visual Basic.NET 2017 with Visual Studio.NET 2017. In addition, he introduces the updated SQL Server database and Microsoft SQL Server 2017 Express. All sample program projects can be run in the most updated version, Visual Basic.NET 2019 with Visual Studio.NET 2019.Written in an accessible, down-to-earth style, the author explains how to build a sample database using the SQL Server management system and Microsoft SQL Server Management Studio 2018. The latest version of ASP.NET, ASP.NET 4.7, is also discussed to provide the most up-to-date Web database programming technologies. This important book:* Offers illustrative practical examples and detailed descriptions to aid in comprehension of the material presented* Includes both fundamental and advanced database programming techniques* Integrates images into associated database tables using a DevExpress UI tools -WindowsUIWritten for graduate and senior undergraduate students studying database implementations and programming courses, SQL Server Database Programming with Visual Basic.NET shows how to develop professional and practical database programs in Visual Basic.NET 2017/Visual Basic.NET 2019.YING BAI, PHD, is a Professor in the Department of Computer Science and Engineering at Johnson C. Smith University (JCSU). He has published multiple books with Wiley-IEEE Press including Practical Microcontroller Engineering with ARM Technology, Practical Database Programming with Visual C#.NET and Practical Database Programming with Java. About the Author xixPreface xxiAcknowledgment xxiiiAbout the Companion Website xxivCHAPTER 1 INTRODUCTION 11.1 Outstanding Features About This Book 21.2 This Book is For 21.3 What This Book Covers 21.4 How This Book is Organized and How to Use This Book 51.5 How to Use Source Codes and Sample Database 61.6 Instructors and Customers Supports 8CHAPTER 2 INTRODUCTION TO DATABASES 9Ying Bai and Satish Bhalla2.1 What are Databases and Database Programs? 102.1.1 File Processing System 102.1.2 Integrated Databases 112.2 Develop a Database 122.3 Sample Database 132.3.1 Relational Data Model 132.3.2 Entity-Relationship Model (ER) 172.4 Identifying Keys 182.5 Define Relationships 182.6 ER Notation 222.7 Data Normalization 232.7.1 First Normal Form (1NF) 232.7.2 Second Normal Form (2NF) 242.7.3 Third Normal Form (3NF) 262.8 Database Components in Some Popular Databases 282.8.1 Microsoft Access Databases 282.8.2 SQL Server Databases 292.8.3 Oracle Databases 322.9 Create Microsoft SQL Server 2017 Express Sample Database 352.9.1 Create the LogIn Table 362.9.2 Create the Faculty Table 372.9.3 Create Other Tables 392.9.4 Create Relationships Among Tables 452.9.4.1 Create Relationship Between the LogIn and the Faculty Tables 462.9.4.2 Create Relationship Between the LogIn and the Student Tables 492.9.4.3 Create Relationship Between the Faculty and the Course Tables 502.9.4.4 Create Relationship Between the Student and the StudentCourse Tables 502.9.4.5 Create Relationship Between the Course and the StudentCourse Tables 512.9.5 Store Images to the SQL Server 2017 Express Database 532.10 Chapter Summary 61Homework 63CHAPTER 3 INTRODUCTION TO ADO.NET 673.1 The ADO and ADO.NET 673.2 Overview of the ADO.NET 693.3 The Architecture of the ADO.NET 703.4 The Components of ADO.NET 713.4.1 The Data Provider 723.4.1.1 The ODBC Data Provider 733.4.1.2 The OLEDB Data Provider 733.4.1.3 The SQL Server Data Provider 743.4.1.4 The Oracle Data Provider 743.4.2 The Connection Class 743.4.2.1 The Open() Method of the Connection Class 773.4.2.2 The Close() Method of the Connection Class 773.4.2.3 The Dispose() Method of the Connection Class 783.4.3 The Command and the Parameter Classes 783.4.3.1 The Properties of the Command Class 793.4.3.2 The Constructors and Properties of the Parameter Class 793.4.3.3 Parameter Mapping 803.4.3.4 The Methods of the ParameterCollection Class 823.4.3.5 The Constructor of the Command Class 833.4.3.6 The Methods of the Command Class 843.4.4 The DataAdapter Class 873.4.4.1 The Constructor of the DataAdapter Class 873.4.4.2 The Properties of the DataAdapter Class 873.4.4.3 The Methods of the DataAdapter Class 883.4.4.4 The Events of the DataAdapter Class 883.4.5 The DataReader Class 903.4.6 The DataSet Component 923.4.6.1 The DataSet Constructor 943.4.6.2 The DataSet Properties 943.4.6.3 The DataSet Methods 943.4.6.4 The DataSet Events 943.4.7 The DataTable Component 973.4.7.1 The DataTable Constructor 983.4.7.2 The DataTable Properties 983.4.7.3 The DataTable Methods 993.4.7.4 The DataTable Events 1003.4.8 ADO.NET Entity Framework 1023.4.8.1 Advantages of Using the Entity Framework 6 1043.4.8.2 The ADO.NET 4.3 Entity Data Model 1063.4.8.3 Using Entity Framework 6 Entity Data Model Wizard 1103.5 Chapter Summary 118Homework 120CHAPTER 4 INTRODUCTION TO LANGUAGE INTEGRATED QUERY (LINQ) 1234.1 Overview of Language Integrated Query 1234.1.1 Some Special Interfaces Used in LINQ 1244.1.1.1 The IEnumerable and IEnumerable(Of T) Interfaces 1244.1.1.2 The IQueryable and IQueryable(Of T) Interfaces 1254.1.2 Standard Query Operators 1264.1.3 Deferred Standard Query Operators 1274.1.4 Non-Deferred Standard Query Operators 1314.2 Introduction to LINQ Query 1354.3 The Architecture and Components of LINQ 1374.3.1 Overview of LINQ to Objects 1384.3.2 Overview of LINQ to DataSet 1394.3.3 Overview of LINQ to SQL 1394.3.4 Overview of LINQ to Entities 1404.3.5 Overview of LINQ to XML 1404.4 LINQ to Objects 1414.4.1 LINQ and ArrayList 1424.4.2 LINQ and Strings 1434.4.2.1 Query a String to Determine the Number of Numeric Digits 1444.4.2.2 Sort Lines of Structured Text By any Field in the Line 1454.4.3 LINQ and File Directories 1474.4.3.1 Query the Contents of Files in a Folder 1484.4.4 LINQ and Reflection 1504.5 LINQ to DataSet 1524.5.1 Operations to DataSet Objects 1524.5.1.1 Query Expression Syntax 1534.5.1.2 Method-Based Query Syntax 1544.5.1.3 Query the Single Table 1574.5.1.4 Query the Cross Tables 1594.5.1.5 Query Typed DataSet 1624.5.2 Operations to DataRow Objects Using the Extension Methods 1654.5.3 Operations to DataTable Objects 1694.6 LINQ to SQL 1704.6.1 LINQ to SQL Entity Classes and DataContext Class 1714.6.1.1 Add LINQ to Data Reference 1714.6.1.2 Add LINQ To SQL Tools 1714.6.2 LINQ to SQL Database Operations 1754.6.2.1 Data Selection Query 1754.6.2.2 Data Insertion Query 1774.6.2.3 Data Updating Query 1784.6.2.4 Data Deletion Query 1794.6.3 LINQ to SQL Implementations 1824.7 LINQ to Entities 1824.7.1 The Object Services Component 1834.7.2 The ObjectContext Component 1834.7.3 The ObjectQuery Component 1844.7.4 LINQ to Entities Flow of Execution 1844.7.5 Implementation of LINQ to Entities 1864.8 LINQ to XML 1874.8.1 LINQ to XML Class Hierarchy 1874.8.2 Manipulate XML Elements 1884.8.2.1 Creating XML from Scratch 1884.8.2.2 Insert XML 1904.8.2.3 Update XML 1914.8.2.4 Delete XML 1924.8.3 Manipulate XML Attributes 1924.8.3.1 Add XML Attributes 1924.8.3.2 Get XML Attributes 1934.8.3.3 Delete XML Attributes 1934.8.4 Query XML with LINQ to XML 1944.8.4.1 Standard Query Operators and XML 1944.8.4.2 XML Query Extensions 1954.8.4.3 Using Query Expressions with XML 1964.8.4.4 Using XPath and XSLT with LINQ to XML 1964.8.4.5 Mixing XML and Other Data Models 1974.9 Visual Basic.NET Language Enhancement for LINQ 1994.9.1 Lambda Expressions 1994.9.2 Extension Methods 2014.9.3 Implicitly Typed Local Variables 2054.9.4 Query Expressions 2064.10 Chapter Summary 208Homework 209CHAPTER 5 DATA SELECTION QUERY WITH VISUAL BASIC.NET 215PART I DATA QUERY WITH VISUAL STUDIO.NET DESIGN TOOLS AND WIZARDS 2165.1 A Completed Sample Database Application Example 2165.2 Visual Studio.NET Design Tools and Wizards 2195.2.1 Data Components in the Toolbox Window 2205.2.1.1 The DataSet 2205.2.1.2 DataGridView 2215.2.1.3 BindingSource 2225.2.1.4 BindingNavigator 2225.2.1.5 TableAdapter 2235.2.1.6 TableAdapter Manager 2235.2.2 Data Source Window 2235.2.2.1 Add New Data Sources 2245.2.2.2 Data Source Configuration Wizard 2245.2.2.3 DataSet Designer 2285.3 Query Data from SQL Server Database Using Design Tools and Wizards 2315.3.1 Application User Interface 2315.3.1.1 The LogIn Form 2325.3.1.2 The Selection Form 2325.3.1.3 The Faculty Form 2325.3.1.4 The Course Form 2345.3.1.5 The Student Form 2345.4 Use Visual Studio Wizards and Design Tools to Query and Display Data 2365.4.1 Query and Display Data using the DataGridView and Detail Controls 2365.4.1.1 View the Entire Table 2385.4.1.2 View Each Record or the Specified Columns with Detail View 2415.4.2 Use DataSet Designer to Edit the Structure of the DataSet 2435.4.3 Bind Data to the Associated Controls in LogIn Form 2455.4.4 Develop Codes to Query Data Using the Fill() Method 2495.4.5 Use Return a Single Value to Query Data for LogIn Form 2515.4.6 Develop the Codes for the Selection Form 2545.4.7 Query Data from the Faculty Table for the Faculty Form 2565.4.8 Develop Codes to Query Data from the Faculty Table 2585.4.8.1 Develop Codes to Query Data Using the TableAdapter Method 2585.4.8.2 Develop Codes to Query Data Using the LINQ to DataSet Method 2615.4.9 Query Data from the Course Table for the Course Form 2625.4.9.1 Build the Course Queries Using the Query Builder 2635.4.9.2 Bind Data Columns to the Associated Controls in the Course Form 2655.4.9.3 Develop Codes to Query Data for the Course Form 267PART II DATA QUERY WITH RUNTIME OBJECTS 2715.5 Introduction to Runtime Objects 2725.5.1 Procedure of Building a Data-Driven Application Using Runtime Object 2745.6 Query Data from SQL Server Database Using Runtime Object 2745.6.1 Access to SQL Server Database 2745.6.2 Declare Global Variables and Runtime Objects 2765.6.3 Query Data Using Runtime Objects for the LogIn Form 2785.6.3.1 Connect to the Data Source with the Runtime Object 2785.6.3.2 Coding for Method 1: Using the TableAdapter to Query Data 2795.6.3.3 Coding for Method 2: Using the DataReader to Query Data 2815.6.4 The Coding for the Selection Form 2835.6.5 Query Data Using Runtime Objects for the Faculty Form 2845.6.5.1 Using Three Query Methods to Retrieve Images from SQL Server Database 2905.6.6 Query Data Using Runtime Objects for the Course Form 2905.6.6.1 Retrieve Data from Multiple Tables Using Tables JOINS 2935.6.7 Query Data Using Runtime Objects for the Student Form 3015.6.7.1 Query Student Data Using Stored Procedures 3025.6.7.2 Query Data Using Stored Procedures for Student Form 3065.6.7.3 Query Data Using More Complicated Stored Procedures 3155.7 Chapter Summary 320Homework 321CHAPTER 6 DATA INSERTING WITH VISUAL BASIC.NET 327PART I INSERT DATA WITH VISUAL BASIC.NET DESIGN TOOLS AND WIZARDS 3286.1 Insert Data Into a Database 3286.1.1 Insert New Records into a Database Using the TableAdapter.Insert Method 3296.1.2 Insert New Records into a Database Using the TableAdapter.Update Method 3296.2 Insert Data into the SQL Server Database Using a Sample Project InsertWizard 3306.2.1 Create InsertWizard Project Based on the SelectWizard Project 3306.2.2 Application User Interfaces 3316.2.3 Validate Data Before the Data Insertion 3316.2.3.1 Visual Basic Collection and .NET Framework Collection Classes 3316.2.3.2 Validate Data Using the Generic Collection 3326.2.4 Initialization Coding Process for the Data Insertion 3356.2.5 Build the Insert Query 3366.2.5.1 Configure the TableAdapter and Build the Data Inserting Query 3366.2.6 Develop Codes to Insert Data Using the TableAdapter.Insert Method 3376.2.7 Develop Codes to Insert Data Using the TableAdapter.Update Method 3416.2.8 Insert Data into the Database Using the Stored Procedures 3456.2.8.1 Create the Stored Procedure Using the TableAdapter Query Configuration Wizard 3466.2.8.2 Modify the Codes to Perform the Data Insertion Using the Stored Procedure 346PART II DATA INSERTION WITH RUNTIME OBJECTS 3506.3 The General Run Time Objects Method 3516.4 Insert Data into the SQL Server Database Using the Run Time Object Method 3526.4.1 Insert Data into the Faculty Table for the SQL Server Database 3536.4.1.1 Validate Data Before the Data Insertion 3536.4.1.2 Insert Data into the Faculty Table 3556.4.1.3 Validate Data After the Data Insertion 3576.5 Insert Data into the Database Using Stored Procedures 3606.5.1 Insert Data into the SQL Server Database Using Stored Procedures 3606.5.1.1 Develop Stored Procedures in SQL Server Database 3616.5.1.2 Develop Codes to Call Stored Procedures to Insert Data into the Course Table 3636.6 Insert Data into the Database Using the LINQ To SQL Method 3686.6.1 Insert Data Into the SQL Server Database Using the LINQ to SQL Queries 3696.7 Chapter Summary 369Homework 370CHAPTER 7 DATA UPDATING AND DELETING WITH VISUAL BASIC.NET 377PART I DATA UPDATING AND DELETING WITH VISUAL STUDIO.NET DESIGN TOOLS AND WIZARDS 3787.1 Update or Delete Data Against Databases 3787.1.1 Updating and Deleting Data from Related Tables in a DataSet 3797.1.2 Update or Delete Data Against Database Using TableAdapter DBDirect Methods - TableAdapter.Update and TableAdapter.Delete 3797.1.3 Update or Delete Data Against Database Using TableAdapter.Update Method 3807.2 Update and Delete Data For Microsoft SQL Server Database 3817.2.1 Create a New Project Based on the InsertWizard Project 3817.2.2 Application User Interfaces 3827.2.3 Validate Data Before the Data Updating and Deleting 3827.2.4 Build the Update and Delete Queries 3827.2.4.1 Configure the TableAdapter and Build the Data Updating Query 3837.2.4.2 Build the Data Deleting Query 3847.2.5 Develop Codes to Update Data Using the TableAdapter DBDirect Method 3857.2.5.1 Modifications of the Codes 3857.2.5.2 Creations of the Codes 3857.2.6 Develop Codes to Update Data Using the TableAdapter.Update Method 3877.2.7 Develop Codes to Delete Data Using the TableAdapter DBDirect Method 3887.2.8 Develop Codes to Delete Data Using the TableAdapter.Update Method 3907.2.9 Validate the Data After the Data Updating and Deleting 391PART II DATA UPDATING AND DELETING WITH RUNTIME OBJECTS 3957.3 The Run Time Objects Method 3957.4 Update and Delete Data for SQL Server Database Using the Run Time Objects 3967.4.1 Update Data Against the Faculty Table in the SQL Server Database 3977.4.1.1 Develop Codes to Update the Faculty Data 3977.4.1.2 Validate the Data Updating 3997.4.2 Delete Data from the Faculty Table in the SQL Server Database 3997.4.2.1 Develop Codes to Delete Data 3997.4.2.2 Validate the Data Deleting 4017.5 Update and Delete Data against SQL Server Database Using Stored Procedures 4047.5.1 Modify an Existing Project to Create Our New Project 4057.5.2 Create the Codes to Update and Delete Data from the Course Table 4057.5.2.1 Develop Two Stored Procedures in the SQL Server Database 4077.5.2.2 Call the Stored Procedures to Perform the Data Updating and Deleting 4097.5.3 Update and Delete Data against Databases Using the LINQ to SQL Query 4127.5.3.1 Update and Delete Data Using LINQ to SQL Query for Student Table 4137.5.3.2 Create a New Object of the DataContext Class for Student Form 4147.5.3.3 Develop the Codes for the Select Button Click Event Procedure 4157.5.3.4 Develop the Codes for the Insert Button Click Event Procedure 4167.5.3.5 Develop the Codes for the Update Button Click Event Procedure 4197.5.3.6 Develop the Codes for the Delete Button Click Event Procedure 4197.5.3.7 Run the Project to Test Data Updating and Deleting Actions for Student Table 4217.6 Chapter Summary 423Homework 423CHAPTER 8 ACCESSING DATA IN ASP.NET 4298.1 What is .NET Framework? 4308.2 What is ASP.NET? 4318.2.1 ASP.NET Web Application File Structure 4338.2.2 ASP.NET Execution Model 4338.2.3 What is Really Happened When a Web Application is Executed? 4348.2.4 The Requirements to Test and Run the Web Project 4358.3 Develop ASP.NET Web Application to Select Data from SQL Server Databases 4358.3.1 Create the User Interface – LogIn Form 4368.3.2 Develop the Codes to Access and Select Data from the Database 4388.3.3 Validate the Data in the Client Side 4428.3.4 Create the Second User Interface – Selection Page 4438.3.5 Develop the Codes to Open the Other Page 4448.3.6 Modify the Codes in the LogIn Page to Transfer to the Selection Page 4468.3.7 Create the Third User Interface – Faculty Page 4478.3.8 Develop the Codes to Select the Desired Faculty Information 4488.3.8.1 Develop the Codes for the Page_Load Event Procedure 4498.3.8.2 Develop the Codes for the Select Button Click Event Procedure 4508.3.8.3 Develop the Codes for Other Procedures 4528.3.9 Create the Fourth User Interface – Course Page 4548.3.9.1 The AutoPostBack Property of the List Box Control 4578.3.10 Develop the Codes to Select the Desired Course Information 4578.3.10.1 Coding for the Course Page Loading and Ending Event Procedures 4588.3.10.2 Coding for the Select Button’s Click Event Procedure 4598.3.10.3 Coding for the SelectedIndexChanged Event Procedure of the CourseList Box 4618.3.10.4 Coding for Other User Defined Subroutine Procedures 4638.4 Develop ASP.NET Web Application to Insert Data Into SQL Server Databases 4658.4.1 Develop the Codes to Perform the Data Insertion Function 4668.4.2 Develop the Codes for the Insert Button Click Event Procedure 4668.4.3 Validate the Data Insertion 4738.5 Develop Web Applications to Update and Delete Data in SQL Server Databases 4738.5.1 Modify the Codes for the Faculty Page 4748.5.2 Develop the Codes for the Update Button Click Event Procedure 4758.5.3 Develop the Codes for the Delete Button Click Event Procedure 4798.5.3.1 Relationships Between Five Tables in Our Sample Database 4808.5.3.2 Data Deleting Sequence 4818.5.3.3 Use the Cascade Deleting Option to Simplify the Data Deleting 4818.5.3.4 Create the Stored Procedure to Perform the Data Deleting 4838.5.3.5 Develop the Codes to Call the Stored Procedure to Perform the Data Deleting 4868.6 Develop ASP.NET Web Applications with LINQ to SQL Query 4898.6.1 Create a New Object of the DataContext Class 4918.6.2 Develop the Codes for the Data Selection Query 4928.6.3 Develop the Codes for the Data Insertion Query 4938.6.4 Develop the Codes for the Data Updating and Deleting Queries 4968.7 Chapter Summary 500Homework 500CHAPTER 9 ASP.NET WEB SERVICES 5059.1 What are Web Services and Their Components? 5069.2 Procedures to Build a Web Service 5089.2.1 The Structure of a Typical Web Service Project 5089.2.2 The Real Considerations When Building a Web Service Project 5099.2.3 Introduction to Windows Communication Foundation (WCF) 5099.2.3.1 What is the WCF? 5109.2.3.2 WCF Data Services 5109.2.3.3 WCF Services 5119.2.3.4 WCF Clients 5119.2.3.5 WCF Hosting 5129.2.3.6 WCF Visual Studio Templates 5129.2.4 Procedures to Build an ASP.NET Web Service 5139.3 Build ASP.NET Web Service Project to Access SQL Server Database 5149.3.1 Files and Items Created in the New Web Service Project 5159.3.2 A Feeling of the Hello World Web Service Project As it Runs 5189.3.3 Modify the Default Namespace 5209.3.4 Create a Base Class to Handle Error Checking for Our Web Service 5229.3.5 Create a Customer Returned Class to Hold All Retrieved Data 5229.3.6 Add Web Methods into Our Web Service Class 5249.3.7 Develop the Codes for Web Methods to Perform the Web Services 5249.3.7.1 Web Service Connection Strings 5249.3.7.2 Modify the Existing HelloWorld Web Method 5279.3.7.3 Develop the Codes to Perform the Database Queries 5289.3.7.4 Develop the Codes for Subroutines Used in the Web Method 5309.3.8 Develop the Stored Procedure to Perform the Data Query 5339.3.8.1 Develop the Stored Procedure WebSelectFacultySP 5339.3.8.2 Add Another Web Method to Call the Stored Procedure 5349.3.9 Use DataSet as the Returning Object for the Web Method 5369.3.10 Build Windows-based Web Service Clients to Consume the Web Services 5389.3.10.1 Create a Web Service Proxy Class 5399.3.10.2 Develop the Graphic User Interface for the Windows-based Client Project 5419.3.10.3 Develop the Code to Consume the Web Service 5419.3.11 Build Web-based Web Service Clients to Consume the Web Service 5489.3.11.1 Create a New Web Site Project and Add an Existing Web Page 5489.3.11.2 Add a Web Service Reference and Modify the Web Form Window 5499.3.11.3 Modify the Designer and Codes for the Related Event Procedures 5509.3.12 Deploy the Completed Web Service to Production Servers 5559.3.12.1 Publish the Desired Web Service 5579.4 Build ASP.NET Web Service Project to Insert Data Into SQL Server Database 5599.4.1 Create a New Web Service Project WebServiceSQLInsert 5599.4.2 Develop Four Web Service Methods 5609.4.2.1 Develop Codes for the First Web Method SetSQLInsertSP 5619.4.2.2 Develop Codes for User Defined Functions and Subroutine Procedures 5639.4.2.3 Develop the Second Web Method GetSQLInsert 5659.4.2.4 Develop the Third Web Method SQLInsertDataSet 5689.4.2.5 Develop the Fourth Web Method GetSQLInsertCourse 5729.4.3 Build Windows-based Web Service Clients to Consume the Web Services 5789.4.3.1 Create a Windows-Based Consume Project and a Web Service Proxy Class 5789.4.3.2 Develop the Graphic User Interface for the Client Project 5799.4.3.3 Develop the Code to Consume the Web Service 5819.4.4 Build Web-based Web Service Clients to Consume the Web Services 5949.4.4.1 Create a New Web Site Project and Add an Existing Web Page 5949.4.4.2 Add a Web Service Reference and Modify the Web Form Window 5959.4.4.3 Modify the Codes for the Related Event Procedures 5969.5 Build ASP.NET Web Service to Update and Delete Data for SQL Server Database 6069.5.1 Modify the Default Namespace and Add Database Connection String 6079.5.2 Create Our Customer-Built Base and Returned Classes 6089.5.3 Create a Web Method to Call Stored Procedure to Update Student Records 6099.5.4 Create a Web Method to Call Stored Procedure to Delete Student Records 6119.5.5 Develop Two Stored Procedures WebUpdateStudentSP and WebDeleteStudentSP 6139.5.5.1 Develop the Stored Procedure WebUpdateStudentSP 6139.5.5.2 Develop the Stored Procedure WebDeleteStudentSP 6169.6 Build Windows-Based Web Service Clients to Consume the Web Services 6189.6.1 Modify the Student Form Window 6189.6.2 Add a New Web Reference to Our Client Project 6199.6.3 Build the Codes to the Update Button Click Event Procedure 6209.6.4 Build the Codes to the Delete Button Click Event Procedure 6219.7 Build Web-Based Web Service Clients to Consume the Web Services 6249.7.1 Create a New Web Site Application Project and Add an Existing Web Page 6259.7.2 Add a Web Service Reference and Modify the Web Form Window 6259.7.3 Modify the Codes Inside the Back Button Click Event Procedure 6269.7.4 Add the Codes to the Update Button Click Event Procedure 6269.7.5 Develop Codes for the Delete Button Click Event Procedure 6289.8 Chapter Summary 631Homework 632Appendix A: Install and Configure SQL Server 2017 Express Database 637Appendix B: Download and Install DevExpress .NET UI Controls 649Appendix C: Download & Install FrontPage Server Extension for Windows 10 651Appendix D: How to Use Sample Database 655Index 657

Regulärer Preis: 65,99 €
Produktbild für DevSecOps for .NET Core

DevSecOps for .NET Core

Automate core security tasks by embedding security controls and processes early in the DevOps workflow through DevSecOps. You will not only learn the various stages in the DevOps pipeline through examples of solutions developed and deployed using .NET Core, but also go through open source SDKs and toolkits that will help you to incorporate automation, security, and compliance.The book starts with an outline of modern software engineering principles and gives you an overview of DevOps in .NET Core. It further explains automation in DevOps for product development along with security principles to improve product quality. Next, you will learn how to improve your product quality and avoid code issues such as SQL injection prevention, cross-site scripting, and many more. Moving forward, you will go through the steps necessary to make security, compliance, audit, and UX automated to increase the efficiency of your organization. You’ll see demonstrations of the CI phase of DevOps, on-premise and hosted, along with code analysis methods to verify product quality. Finally, you will learn network security in Docker and containers followed by compliance and security standards.After reading DevSecOps for .NET Core, you will be able to understand how automation, security, and compliance works in all the stages of the DevOps pipeline while showcasing real-world examples of solutions developed and deployed using .NET Core 3.WHAT YOU WILL LEARN* Implement security for the .NET Core runtime for cross-functional workloads * Work with code style and review guidelines to improve the security, performance, and maintenance of components* Add to DevOps pipelines to scan code for security vulnerabilities* Deploy software on a secure infrastructure, on Docker, Kubernetes, and cloud environmentsWHO THIS BOOK IS FORSoftware engineers and developers who develop and maintain a secure code repository.Afzaal Ahmad Zeeshan is a software engineer based in Rabwah, Pakistan, and likes .NET Core for regular day development. He has experience with cloud, mobile, and API development. Afzaal Ahmad has experience with the Azure platform and likes to build cross-platform libraries/software with .NET Core. He has been awarded MVP Award by Alibaba Cloud for cloud expertise and has been recognized as a Microsoft MVP for his work in the field of software development twice, four times as a CodeProject MVP for technical writing and mentoring, and four times as a C# Corner MVP in the same field. CHAPTER 1: MODERN SOFTWARE ENGINEERINGCHAPTER GOAL: THIS CHAPTER WILL OUTLINE THE MODERN SOFTWARE ENGINEERING PRINCIPLES AND INTRODUCE DEVOPS AS WELL AS REQUIREMENTS AND RESPONSIBILITIES OF A SOFTWARE ENGINEERING TEAM TO PUBLISH QUALITY SOFTWARE.NO OF PAGES 20SUB -TOPICS1. Software Design2. Solutions on the Internet3. Multicultural Customers4. Changing Market5. Security and Compliance RequirementsCHAPTER 2: DEVOPS WITH SECURITYCHAPTER GOAL: THIS IS A PRACTICAL TOPIC AND DISCUSSES DEVOPS PIPELINES AS A MODE OF AUTOMATION FOR SOFTWARE PRODUCTION AND OUTLINES IMPORTANT TASKS IN DEVOPS WHERE AUTOMATION CAN INJECT SECURITY PRINCIPLES TO IMPROVE PRODUCT QUALITY.NO OF PAGES: 20-25SUB - TOPICS1. DevOps in a Nutshell2. Securing Software3. Quality Assurance4. Pre-commit testing5. HTTP vs SSHCHAPTER 3: WRITING SECURE CODECHAPTER GOAL: THIS CHAPTER DISCUSSES THE DEVELOPMENT PHASE OF DEVOPS PIPELINE AND OUTLINES HOW TO IMPROVE SOFTWARE QUALITY AND DECREASE FRICTION IN LATER STAGES BY PREVENTING KNOWN VULNERABILITIES AND CODE FLAWS BEFORE HAND. DURING THIS CHAPTER WE WILL EXPLORE CODE ISSUES SUCH AS SQL INJECTION PREVENTION, CROSS-SITE SCRIPTING, AND OTHER SIMILAR ISSUES.NO OF PAGES : 45SUB - TOPICS:1. Write Less, Write Secure2. Developer Training3. Runtime Selection and Configuration4. Microservices: Separation of Concerns5. Authentication in ServicesCHAPTER 4: AUTOMATING EVERYTHING AS CODECHAPTER GOAL: WE DISCUSS THE STEPS NECESSARY TO MAKE SECURITY, COMPLIANCE, AUDIT, AND UX AUTOMATED TO DECREASE DECOUPLING AND FRICTION IN THE DEPARTMENTS, AND INTRODUCE KEY FACTORS THAT HELP IMPROVE BUILD AND HOSTING ENVIRONMENTS, WHICH WILL BE DISCUSSED IN DETAIL IN LATER CHAPTER.No of pages:40-45SUB - TOPICS:1. Version Control and Audit2. Hosted Code Storage3. Infrastructure as Code4. Automating Security5. Compliance and Policies6. Risk and Bugs AnalysisCHAPTER 5: SECURING BUILD SYSTEMS FOR DEVOPSCHAPTER GOAL: In this chapter we demonstrate the CI phase of DevOps and utilize our build systems; hosted and on-premises, to apply security and compliance checks throughout the task, we apply code analysis methods to verify quality of product and discusses different approaches to host package archives for deployment.NO OF PAGES: 451. On-Premises vs Hosted CI/CD2. Code Analysis Methods3. Archive Caching and Hashing4. Automated DeploymentsCHAPTER 6: AUTOMATING PRODUCTION ENVIRONMENTS FOR QUALITYChapter Goal: This chapter focuses on production hosting environments and their security, such as container and host platform security, network ports scanning, firewall and application gateways to prevent unauthorized access. We also explore how to extract sensitive information out of source code and configuration files using external services to improve privacy.NO OF PAGES: 401. Host Platforms2. Docker and Containers3. Network Security4. Configuration and Credentials5. System Failure and Post-mortems6. Infrastructure RollbacksCHAPTER 7: COMPLIANCE AND SECURITYCHAPTER GOAL: THIS CHAPTER ENLISTS INTERNATIONAL STANDARDS AND THEIR REQUIREMENTS BY A SOFTWARE PRODUCT, SUCH AS GDPR, AND HOW TEAMS CAN TACKLE THESE IN THEIR PRODUCTS USING AUTOMATED AUDITS.NO OF PAGES: 151. Audit2. GDPR Requirements3. DevOps Audit Toolkit4. Automated Issue Tracking

Regulärer Preis: 62,99 €
Produktbild für The SQL Server DBA's Guide to Docker Containers

The SQL Server DBA's Guide to Docker Containers

Get introduced to the world of Docker containers from a SQL Server DBA’s perspective. This book explains container technology and how it can improve the deployment of your SQL Server databases without infrastructure lock-in. You will be equipped with the right technical skills to guide stakeholders in your business as they adopt and adapt to new technologies to improve time-to-market and competitiveness. You will learn how to build a lab environment at home on which to build skills that transfer directly into your day job.This book teaches you how to install and configure Docker on both Windows Server and Linux operating systems. You will learn the most common Docker commands that you need to know as a DBA to deploy and manage SQL Server on containers. Support for SQL Server on Linux is new, and this book has your back with guidance on creating Docker images specifically for deployment to a Linux platform. Included is coverage of key Linux commands needed to manage SQL Server on that operating system. By the end of the book you will have learned how to create your own custom SQL Server container images with configuration settings that are specific to your organization, that are capable of being deployed to both Windows Server and Linux.WHAT YOU WILL LEARN* Create Docker containers for agile deployment of SQL Server* Run multiple SQL Server instances on a single Linux machine* Deploy custom images specific to your organization’s needs* Know the benefits and architecture of container technology* Install and configure Docker on Windows Server and Linux * Manage and persist SQL Server data in Docker containersWHO THIS BOOK IS FORIntermediate to senior SQL Server DBAs who are familiar with SQL Server on Windows and want to build their existing skills to deploy and manage SQL Server on Linux and through Docker containers. Readers should have a grasp of relational database concepts and be comfortable with the Transact-SQL language.EDWIN M. SARMIENTO is Managing Director of 15C, a consulting company that specializes in designing, implementing, and managing high-availability infrastructures. Proud of his heritage as a Filipino, Edwin now lives in Ottawa, Canada and specializes in high availability, disaster recovery, and system infrastructure. He is a former Microsoft Data Platform MVP of 12 years standing and is a Microsoft Certified Master for SQL Server. He is very passionate about technology, and has interests in music, neuroscience, social psychology, professional and organizational development, leadership, and management matters when not working with databases. Edwin strives continually to live up to his primary mission statement: To help people and organizations grow and develop their full potential. 1. Introduction to Containers2. Install and Configure Docker on Windows Server 20163. Install and Configure Docker on Linux4. The Docker Ecosystem5. Docker Images and Containers6. Managing and Administering Containers7. Persisting Data8. Working with SQL Server on Linux9. Creating Custom SQL Server on Windows Container Images10. Creating Custom SQL Server on Linux Container Images11. Guide to Docker Networking for SQL Server DBAs12. Appendix A. Building a Personal Lab Environment

Regulärer Preis: 66,99 €
Produktbild für Understanding System.IO for .NET Core 3

Understanding System.IO for .NET Core 3

Take full advantage of the .NET APIs in System.IO to achieve fundamental I/O operations and produce better quality software.You’ll start with the basics of creating a .NET Core custom library for System.IO. You will learn the purpose and benefits of a custom cross-platform .NET Core library along with the implementation architecture of the custom library components. Moving forward, you will learn how to use the .NET APIs of System.IO for getting information about resources. Here, you will go through drives, directories, files, and much more in the .NET API.You’ll discuss manipulation of resources and the environment, where you will learn how to build custom IO actions for resource manipulation followed by its properties and security. Next, you will learn special .NET API operations with System.IO with demonstrations on working with collection of resources, directories, files, and system information. Finally, you will go through the managed and unmanaged streams in the .NET API such as memory stream, file stream, and much more.After reading Understanding System.IO for .NET Core 3, you will be able to work with different features of .System.IO in .NET Core and implement its internal and commercial tools for different I/O scenarios.WHAT YOU WILL LEARNDiscover the inner workings of the System.IO BCL implementation on the .NET Core platform * Work with System.IO mechanisms available through the .NET Core platform* Write a custom library that encapsulates .NET APIs from System.IODesign and implement various tools in System.IOWHO THIS BOOK IS FORDevelopers with prior experience of working in .NET or .NET Core.ROGER VILLELA is a software engineer and entrepreneur with almost 30 years of experience in the industry and works as an independent professional. Currently, he is focused on his work as a book author and technical educator and specializes in the inner works of orthogonal features of the following Microsoft development platforms:* Microsoft Windows base services* Microsoft Universal Windows Platform (UWP)* Microsoft WinRT* Microsoft .NET Framework implementation of the runtime environment (CLR)His work is based on Microsoft Visual Studio (Microsoft Windows) using the following programming languages, extensions, and projections:* C/C++* Assembly (Intel IA-32/Intel 64 (x64/amd64))* Component extensions for runtimes (C++/CLI and C++/CX)Chapter 1 – About .NET CoreChapter 2 – Overview of Architecture for ImplementationChapter 3 – Custom Data Types for a Custom LibraryChapter 4 – Custom Collections for a Custom LibraryChapter 5 – Custom Collections – About C++ Templates, and .NET GenericsChapter 6 – Custom Collections and System.IO organizationChapter 7 – Unmanaged data types and System.IO

Regulärer Preis: 52,99 €
Produktbild für Microsoft Blazor

Microsoft Blazor

Build web applications in C# and Microsoft .NET that run in any modern browser. This second edition is updated to work with the release version of Blazor and covers Blazor’s use in creating both server-side and WebAssembly Blazor applications. Developers are able to use all their experience in .NET along with thousands of existing libraries, right in the browser.There is important new coverage in this edition on the new and improved Razor syntax, how to easily validate user input with Blazor validation, and how to build complex interacting components with Cascading Properties and Templated Components. You will learn how to build user interfaces and present data to a user for display and modification, capturing the user’s changes via data binding. The book shows you how to access a rich library of .NET functionality such as a component model for building a composable user interface, including how to develop reusable components that can be used across many pages and websites. Also covered is data exchange with a server, giving you access to microservices and database services.Blazor provides a fresh take on web development by eliminating the need for you to learn different languages and frameworks for client- and server-side development. Blazor allows C# and .NET to be used on all sides, providing a robust feature set that is well suited toward scalable, enterprise-level applications. This book gets you started using this important new toolkit for web application development.WHAT YOU WILL LEARN* Build user interfaces and display data for users to edit* Capture the user’s changes via data binding* Transfer data back and forth between server and client* Communicate with microservices and database services* Develop reusable components and assemble them into bigger components* Use routing to build single-page applications (SPAs)* Build Blazor libraries that are reusable across applicationsWHO THIS BOOK IS FORExperienced .NET developers who want to apply their existing skills toward building professional-quality, client-side web applications that run in any browser. The book is for web developers who want to step away from JavaScript and its complexities, and instead use a proven technology (.NET) that is robust toward creating enterprise-quality applications that scale and are reliable, that provide good user experience.PETER HIMSCHOOT works as a lead trainer, architect, and strategist at U2U Training. He has a wide interest in software development that includes applications for the web, Windows, and mobile devices. He has trained thousands of developers, is a regular speaker at international conferences, and has been involved in many web and mobile development projects as a software architect. He has been a Microsoft Regional Director (from 2003 to 2019), which is a group of trusted advisors to developer and IT professional audiences, and to Microsoft.1. Your First Blazor Project2. Data Binding3. Components and Structure for Blazor Applications4. Services and Dependency Injection5. Data Storage and Microservices6. Communication with Microservices7. Single Page Applications and Routing8. JavaScript Interoperability

Regulärer Preis: 46,99 €
Produktbild für Internet, Cyber- und IT-Sicherheit von A-Z

Internet, Cyber- und IT-Sicherheit von A-Z

Die wichtigsten Begriffe zu Internet, Cyber-Risiken, IT-Sicherheit und Datenschutz. Kurz, aktuell, prägnant und einfach zu verstehen. Finden Sie hier schnell und ohne lange Texte lesen zu müssen die Bedeutung von aktuellen und in Zukunft wichtig werdenden Begriffen wie Blockchain, GDPR, Quantencomputer, WannaCry, Hacking, Ransomware oder Künstlicher Intelligenz. Dieses Standardwerk ist schnell zur Hand und darf heutzutage auf keinem Schreibtisch fehlen.Dr. Ron Porath ist technischer Berater und Experte für Internet, Cyber- und IT-Sicherheit sowie Artificial Intelligence. Er unterstützt sowohl Privatpersonen, als auch kleine und großen Unternehmen bei der Auswahl und Implementation von IT-Sicherheitslösungen, bei der Wissensvermittlung und der Entwicklung von Software und Algorithmen.Lexikon mit mehr als 2600 aktuellen und in Zukunft wichtig werdenden Begriffen zu Internet, Cyber- und IT-Sicherheit .-Tipps zum eigenen Schutz vor Cyberattacken.-Häufig benötigte Tabellen, wie ASCII-Tabelle, RegEx-Übersicht, Markdown-Übersicht sowie HTTP Status Codes.

Regulärer Preis: 62,99 €
Produktbild für The Definitive Guide to Masonite

The Definitive Guide to Masonite

Build fast and effective applications using Masonite, a Python-based framework. This book covers creating a digital home assistant application, but it’s certainly not the only kind of application you could build. By working on this kind of project, you’ll cover the broad range of topics and requirements you’re likely to find as you establish your own web empire.You’ll see how Masonite is a developer-centric Python framework, which provides all the tools you’ll need to build powerful and maintainable web applications. After reading and using this book, you'll have the tools to make and deploy your own web ecommerce application from scratch using the Masonite framework.WHAT YOU WILL LEARN* Customize your request and response cycle with middleware, route groups, and headers* Add security into your application and protect against possible vulnerabilities* Create and control your application’s maintenance features from a terminal* Manage a database, so your teammates and environments will always be in sync* Represent relational database data with object-oriented programming techniques* Read and write from the file system* Process large datasets and slow operations in the background* Add real-time features and recurring tasks to your applicationWHO THIS BOOK IS FORWeb developers new to the Masonite framework. Some prior Python experience is helpful but is not required.Christopher Pitt is a developer and writer, working at SilverStripe. He usually works on application architecture, though sometimes you’ll find him building compilers or robots. He is also the author of several web development books and is a contributor on various open source projects such as AdonisJs and Masonite.1. Getting started2. Routing3. The Service Container4. Accepting data through forms5. Using a database6. Security7. Authentication8. Middleware9. Helpers10. Doing Work in the Background11. Adding Websockets with Pusher12. Testing13. Deploying

Regulärer Preis: 46,99 €