Allgemein
Cybersecurity for Space
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.Space is one of the fastest growing military, government, and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations.You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems.The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems.WHAT YOU WILL LEARN* Understand what constitutes a space system and the challenges unique to operations of all spacecraft* Get introduced to various space vehicles and their unique constraints and challenges* Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit* Know the physical and cyber vectors from which threats may manifest* Study the micro- and macro-analysis provided of space system attack scenarios* Be familiar with the high-level problems of cybersecurity in the space domainWHO THIS BOOK IS FORThis book is written for two audiences: those with a background in space operations as well as those in cybersecurity. It offers the guidance needed to understand the unique challenges to space operations that affect the implementation of cybersecurity.DR. JACOB G. OAKLEY spent over seven years in the US Marines and was one of the founding members of the operational arm of the Marine Corps Forces Cyberspace Command at Ft. Meade, Maryland, leaving that unit as the senior Marine Corps operator and a division technical lead. After his enlistment he wrote and taught an advanced computer operations course, eventually returning back to mission support at Ft. Meade. He later left government contracting to do threat emulation and red teaming at a private company for commercial clients, serving as the principal penetration tester and director of penetration testing and cyber operations. He is currently working as a cyber SME for a government customer. He completed his doctorate in IT at Towson University, researching and developing offensive cybersecurity methods, and is the author of Professional Red Teaming: Conducting Successful Cybersecurity Engagements (Apress) as well as Waging Cyber War: Technical Challenges and Operational Constraints (Apress).
Modern Full-Stack Development
Explore what React, Node, TypeScript, Webpack, and Docker have to offer individually, and how they all fit together in modern app development.React is one of the most popular web development tools available today, and Node.js is extremely popular for server-side development. The fact that both utilize JavaScript is a big selling point, but as developers use the language more, they begin to recognize the shortcomings, and that’s where TypeScript comes in and why it’s gaining in popularity quickly. Add Webpack and Docker to the mix, and you’ve got a potent full development stack on which to build applications.You’ll begin by building a solid foundation of knowledge and quickly expand it by constructing two different real-world apps. These aren’t just simple, contrived examples but real apps that you can choose to install on your servers and use for real. By the end, you will have a solid grasp of building apps with React, Node.js, and TypeScript and a good grasp on how Webpack can be used to optimize and organize your code for deployment. You’ll also understand how Docker can be used to run the apps you build in a clear and well-defined way, all of which will be able to springboard you into creating more advanced apps on your own.WHAT YOU'LL LEARN* Get a project started and logically structure it* Construct a user interface with React and Material-UI * Use WebSockets for real-time communication between client and server* Build a REST API with Node and Express as another approach to client-server communication* Package the app with Webpack for optimized delivery* Take a completed app and wrap it up with Docker for easy distribution* Review a host of other ancillary topics including NPM, Semantic versioning, Babel, NoSQL, and moreWHO THIS BOOK IS FORWeb developers with basic knowledge of HTML, JavaScript, CSS, and CLI tools who are interested in and in all aspects of application development, and using TypeScript instead of straight JavaScript.FRANK ZAMMETTI is the author of 12 Apress titles on a variety of web and mobile development topics. He has over 25 years of experience as a developer. You can find him on Twitter @fzammetti.1. Server-Side Action: Node.js and NPM2. A Few More Words: Advanced Node and NPM3. Client-Side Adventures: React4. A Few More Words: Advanced React5. Building a Strong Foundation: TypeScript6. A Few More Words: Advanced TypeScript7. Tying it up in a Bow: Webpack8. Delivering the Goods: MailBag, the Server9. Delivering the Goods: MailBag, the Client10. Time for Fun: BattleJong, the Server11. Tying It Up in a Bow with Webpack12. Bringing the Dev Ship into Harbor With Docker
CCNA Certification Practice Tests
THE DEFINITIVE STUDY GUIDE FOR THE NEW CCNA AND CCNP CERTIFICATIONSCCNA Certification Practice Test: Exam 200-301 is the definitive practice guide for professionals preparing for the new CCNA or CCNP certifications, and for those looking to master the latest technologies in Cisco networking fundamentals. The practice exams, written by 17-year industry professional Jon Buhagiar, explore a broad range of exam objectives essential for passing the certification exam.The CCNA exam provides the certification needed to grow your IT career. Each practice exam in this book is designed to prepare you to pass the CCNA by imparting the skills, knowledge, and practical coursework needed to master all exam topics.This book includes access to six practice tests featuring 1,200 exam questions, as well as two full practice exams. Most importantly, the six practice tests featured in Certification Practice Tests Exam 200-301 cover a variety of topics, including:* Security fundamentals* Automation and programmability* IP services* IP connectivity* Network success* Network fundamentalsIn addition to a plethora of exam topics and plenty of sample questions to prepare you for the CCNA exam, readers will also have access to online test tools featuring additional practice questions and study tools to assist in reinforcing the knowledge you’ve gained with the book.Learn the foundational knowledge you need to pass the CCNA or CCNP and take your career to the next level by preparing with CCNA Certification Practice Tests.ABOUT THE AUTHORJON BUHAGIAR CCNA, MCSA, MCSE, N+, A+, BS/ITM, is Supervisor of Network Operations at Pittsburgh Technical College. In this role, he manages datacenter and network infrastructure operations and IT operations and is involved in project management of projects supporting the quality of education at the college. He also serves as an adjunct instructor in the college’s School of Information Technology department, where he has taught courses for Microsoft and Cisco certification. He has spoken at numerous systems-related conferences, and has authored and edited many Sybex study guide titles. Introduction xvChapter 1 Network Fundamentals (Domain 1) 1Chapter 2 Network Access (Domain 2) 43Chapter 3 IP Connectivity (Domain 3) 87Chapter 4 IP Services (Domain 4) 139Chapter 5 Security Fundamentals (Domain 5) 161Chapter 6 Automation and Programmability (Domain 6) 193Chapter 7 Practice Exam 1 213Chapter 8 Practice Exam 2 235Appendix Answers to Practice Test Questions 255Chapter 1: Network Fundamentals (Domain 1) 256Chapter 2: Network Access (Domain 2) 284Chapter 3: IP Connectivity (Domain 3) 309Chapter 4: IP Services (Domain 4) 342Chapter 5: Security Fundamentals (Domain 5) 355Chapter 6: Automation and Programmability (Domain 6) 375Chapter 7: Practice Exam 1 389Chapter 8: Practice Exam 2 402Index 417
Women of Color in Tech
HIGHLY COMMENDED INTERNATIONAL BUSINESS BOOK FROM THE 2021 BUSINESS BOOK AWARDSNONFICTION BOOK AWARDS SILVER WINNER FROM THE NONFICTION AUTHORS ASSOCIATIONWINNER OF COMPTIA'S 2020 DIVERSITY TECHNOLOGY LEADER SPOTLIGHT AWARDWINNER OF A TECHNOLOGY RISING STAR AWARD FROM THE 2020 WOMEN OF COLOR IN STEM CONFERENCEBREAK THROUGH BARRIERS TO ACHIEVE A REWARDING FUTURE IN TECHWomen of Color in Tech: A Blueprint for Inspiring and Mentoring the Next Generation of Technology Innovators will help you overcome the obstacles that often prevent women of color from pursuing and staying in tech careers. Contrary to popular belief, tech careers are diverse and fun—and they go far beyond just coding. This book will show you that today's tech careers are incredibly dynamic, and you'll learn how your soft skills—communication, public speaking, networking—can help you succeed in tech.This book will guide you through the process of cultivating strong relationships and building a network that will get you were you want to be. You'll learn to identify a strong, knowledgeable support network that you can rely on for guidance or mentorship. This step is crucial in getting young women of color into tech careers and keeping them there.* Build your professional network to get the guidance you need* Find a mentor who understands your goals and your struggles* Overcome negativity and stay motivated through difficult times* Identify and develop the soft skills that you need to get ahead in techRead this book to help bring to life your vision of a future in tech. With practical advice and inspiring stories, you’ll develop the right tools and the right mindset. Whether you're just considering going into tech or you want to take your current career to the next level, Women of Color in Tech will show you how to uncover the resources you need to succeed.SUSANNE TEDRICK is a technical specialist for a leading Fortune 50 technology company. Fiercely committed to increasing participation of women and people of color in STEM educational and professional opportunities, she is a career mentor for the Pathways in Technology Early College High School (P-TECH) Initiative and a volunteer workshop technical assistant for Black Girls Code, a non-profit that empowers girls of color to develop in-demand IT skills and prepare to advance careers in tech. Foreword xxiiiIntroduction xxvCHAPTER 1 THE CURRENT STATE OF WOMEN OF COLOR IN TECH 1The Realities 1What’s Going On? 3Early Childhood 4Primary, Middle, and High School 5College 6The Workplace 8Why You Should Be Here 10My Journey to Tech 10It’s (Slowly) Getting Better 12Support 13Number of Job Opportunities 14Pay 15It’s Fun 15Opportunities to Help Others 16We Need You! 16Tech Career Misconceptions 17Tech Careers Require Constant, Hands-On Programming 18All Tech Careers Require a Four-Year Degree 18All Tech Careers Require Studying Computer Science, Computer Engineering, or Another Specific Field 18All Tech Careers Pay a Ton of Money 19Tech Careers Exist Only at Top Tech Companies 20Tech Careers Are Only for People with Certain Backgrounds, Grades, Etc. 21Creating a Blueprint 25Summary 26CHAPTER 2 THE DIFFERENT FLAVORS OF TECH CAREERS 27Business Analysis 29What They Do 29Top Skills Needed 31Educational Requirements 31For Additional Information 32Consulting 32What They Do 33Top Skills Needed 34Educational Requirements 35For Additional Information 35Computer Networking 36What They Do 37Top Skills 37Educational Requirements 38For Additional Information 38Data Science 39What They Do 40Top Skills 40Educational Requirements 41For Additional Information 41Information Security 42What They Do 42Top Skills 44Educational Requirements 44For Additional Information 45Product Management 45What They Do 46Top Skills 46Educational Requirements 47For Additional Information 47Project Management 47What They Do 48Top Skills 49Educational Requirements 49For Additional Information 50Software Development and Engineering 50What They Do 51Top Skills 52Educational Requirements 53For Additional Information 53Technical Sales 53What They Do 54Top Skills 54Educational Requirements 55For Additional Information 55Technical Support 55What They Do 56Top Skills 56Educational Requirements 57For Additional Information 57User Experience Design 57What They Do 58Top Skills 59Educational Requirements 60For Additional Information 60Web Design 60What They Do 61Top Skills 61Educational Requirements 61For Additional Information 62Where Do You Fit In? 62What Are Your Strengths and Your Weaknesses? 62What Do You Value? 63What Are Your Interests? 65Summary 65CHAPTER 3 INDUSTRY AND OTHER OPTIONS 67Advertising and Marketing 68Civics and Public Interest 69Construction and Manufacturing 71Education 73Finance 75Healthcare 77The US Government 79On Your Own: Entrepreneurism 82What It Takes to Be an Entrepreneur 83Getting Started 84Research Your Market 84Write a (Solid) Business Plan 85Estimate Initial Costs 86Determine Sources of Initial Funding 86Keep Going or Stop? 88Summary 89CHAPTER 4 EMERGING TECHNOLOGIES 91What is an Emerging Technology? 91The Future of Work 92Artificial Intelligence 93The Difference Between Artificial Intelligence, Machine Learning, and Deep Learning 94Why Does It Matter? 95Where Can I Learn More? 96Augmented, Virtual, and Mixed Reality 97Why Does It Matter? 98Where Can I Learn More? 99Blockchain 99Why Does It Matter? 101Where Can I Learn More? 102Cloud Computing 102Service Models 104Deployment Models 106Why Does It Matter? 106Where Can I Learn More? 107Internet of Things 108Why Does It Matter? 109Where Can I Learn More? 1103D Printing 110Why Does It Matter? 111Where Can I Learn More? 112Keeping Up with Technology Trends 112Information Sources 113Tools 114Summary 115CHAPTER 5 BUILDING YOUR NETWORK 117The Importance of Building Your Network 117Where to Network 119Mentoring 121Where to Find Mentors 121Blueprints for a Beneficial Mentoring Relationship 121You’ve Found a Mentor—Now What? 124Listen, This Isn’t Working Out 125You Need a Sponsor, Not a Mentor 126Overcoming Social Anxiety 127Strengthening Your Connections 129Summary 130CHAPTER 6 BUILDING YOUR SKILLS 131Skills Gap Analysis: Where Do You Need to Be? 131Exception 1 133Exception 2 133Formal Education (Is It Worth It?) 133Trade Schools 135Massive Online Open Courses 137Boot Camps 138Hackathons 139Conferences and Seminars 140Internships, Externships, and Co-ops 141Volunteering 143Certifications 144Do You Need Certification? 145How to Pay for Skills Training 146Loans 146Student Loans 146Personal Loans 147Credit and Charge Cards 147Use Credit Responsibly and Sparingly 148Grants and Scholarships 148Tuition Reimbursement 149Deferred Tuition Plans and Income Share Agreements 150Crowdfunding 151Summary 152CHAPTER 7 DEMONSTRATING YOUR SKILLS 153Building Your Resume(s) 153Chronological 154Functional 155Combination 156What Every Resume Must Have 157The Heading 158The Body 158What You Can Leave Out 162First Impressions Matter 165Additional Tips and Resources for Resume Writing 166LinkedIn 169The Difference between LinkedIn and Your Resume 170Creating a LinkedIn Profile 171Essential Elements of a LinkedIn Profile 171Additional LinkedIn Tips 174Writing 175Online Publishing Platforms 175Academic and Professional Journals 176Public Speaking 177Public Speaking Misconceptions 178Public Speaking Basics 178Where to Find Speaking Opportunities 180Other Creative Ways to Show What You Know 181GitHub 181Personal Websites 182Building Your Interviewing Skills 184Becoming a Better Interviewee 185Summary 187CHAPTER 8 JOB OFFERS AND NEGOTIATING COMPENSATION 189A Cautionary Tale (or, Don’t Do This!) 189Understanding Compensation and Salary 191Compensation 191Salary 192The Job Offer Process 193Evaluating a Job Offer 194Do You Like the Job and This Company? 195Are Your “Must Haves” Addressed? 196Is the Salary Offered Fair? 197Why Negotiate Your Job Offer? 199More of What You Want, Now 199Solidify Your Negotiation Skills 199Show Employers You Know Your Value 199There Are Few Downsides to Asking 199You May Not Get as Much Later 200You’ll Hurt Your Finances in the Long Run 201Preparing to Negotiate 201Negotiation Dos and Don’ts 202You Didn’t Negotiate! Is It Too Late? 205Additional Resources 205Final Thoughts—It’s Okay to Want (and Ask for) Money 206Summary 207CHAPTER 9 WHEN TIMES GET TOUGH 209The Need for Grid 209The Problem with “Twice as Good” 212Failure 213Impostor Syndrome 216Bias 218Tokenism and Being “The Only” 221Bullying 222Lack of Support and Help 223The Importance of Mental Health 226Allies and When They Fall Short 228The Need for Allyship 228Allies Are Human 229Summary 230CHAPTER 10 THE IMPORTANCE AND JOY OF GIVING BACK 233Why Give Back 233You Make a Difference 233Helping Others See and Know What’s Possible 234Great Rewards 235Building Relationships 237Coping with a Bad Day 237You’ve Been in Their Shoes 238How to Give Back 239Summary 241Index 243
MySQL 8 Query Performance Tuning
Identify, analyze, and improve poorly performing queries that damage user experience and lead to lost revenue for your business. This book will help you make query tuning an integral part of your daily routine through a multi-step process that includes monitoring of execution times, identifying candidate queries for optimization, analyzing their current performance, and improving them to deliver results faster and with less overhead. Author Jesper Krogh systematically discusses each of these steps along with the data sources and the tools used to perform them.MYSQL 8 QUERY PERFORMANCE TUNING aims to help you improve query performance using a wide range of strategies. You will know how to analyze queries using both the traditional EXPLAIN command as well as the new EXPLAIN ANALYZE tool. You also will see how to use the Visual Explain feature to provide a visually-oriented view of an execution plan. Coverage of indexes includes indexing strategies and index statistics, and you will learn how histograms can be used to provide input on skewed data distributions that the optimizer can use to improve query performance. You will learn about locks, and how to investigate locking issues. And you will come away with an understanding of how the MySQL optimizer works, including the new hash join algorithm, and how to change the optimizer’s behavior when needed to deliver faster execution times. You will gain the tools and skills needed to delight application users and to squeeze the most value from corporate computing resources.WHAT YOU WILL LEARN* Monitor query performance to identify poor performers* Choose queries to optimize that will provide the greatest gain* Analyze queries using tools such as EXPLAIN ANALYZE and Visual Explain* Improve slow queries through a wide range of strategies* Properly deploy indexes and histograms to aid in creating fast execution plans* Understand and analyze locks to resolve contention and increase throughputWHO THIS BOOK IS FORDatabase administrators and SQL developers who are familiar with MySQL and need to participate in query tuning. While some experience with MySQL is required, no prior knowledge of query performance tuning is needed.JESPER WISBORG KROGH has worked with MySQL databases since 2006 both as an SQL developer, a database administrator, and for more than eight years as part of the Oracle MySQL Support team. He has spoken at MySQL Connect and Oracle OpenWorld on several occasions, and addition to his books, he regularly blogs on MySQL topics and has authored around 800 documents in the Oracle Knowledge Base. He has contributed to the sys schema and four Oracle Certified Professional (OCP) exams for MySQL 5.6 to 8.0.He earned a PhD in computational chemistry before changing to work with MySQL and other software development in 2006. Jesper lives in Sydney, Australia, and enjoys spending time outdoors walking, traveling, and reading. His areas of expertise include MySQL Cluster, MySQL Enterprise Backup, performance tuning, and the Performance and sys schemas.PART I. GETTING STARTED1. MySQL Performance Tuning2. Query Tuning Methodology3. Benchmarking with Sysbench4. Test DataPART II. SOURCES OF INFORMATION5. The Performance Schema6. The sys Schema7. The Information Schema8. SHOW Statements9. The Slow Query LogPART III. TOOLS10. MySQL Enterprise Monitor11. MySQL Workbench12. MySQL ShellPART IV. SCHEMA CONSIDERATIONS AND THE QUERY OPTIMIZER13. Data Types14. Indexes15. Index Statistics16. Histograms17. The Query Optimizer18. Locking Theory and MonitoringPART V. QUERY ANALYSIS19. Finding Candidate Queries for Optimization20. Analyzing Queries21. Transactions22. Diagnosing Lock ContentionPART VI. IMPROVING THE QUERIES23. Configuration24. Change the Query Plan25. DDL and Bulk Data Load26. Replication27. Caching
PostgreSQL Configuration
Obtain all the skills you need to configure and manage a PostgreSQL database. In this book you will begin by installing and configuring PostgreSQL on a server by focusing on system-level parameter settings before installation. You will also look at key post-installation steps to avoid issues in the future. The basic configuration of PostgreSQL is tuned for compatibility rather than performance. Keeping this in mind, you will fine-tune your PostgreSQL parameters based on your environment and application behavior. You will then get tips to improve database monitoring and maintenance followed by database security for handling sensitive data in PostgreSQL.Every system containing valuable data needs to be backed-up regularly. PostgreSQL follows a simple back-up procedure and provides fundamental approaches to back up your data. You will go through these approaches and choose the right one based on your environment. Running your application with limited resources can be tricky. To achieve this you will implement a pooling mechanism for your PostgreSQL instances to connect to other databases. Finally, you will take a look at some basic errors faced while working with PostgreSQL and learn to resolve them in the quickest manner.WHAT YOU WILL LEARN* Configure PostgreSQL for performanceMonitor and maintain PostgreSQL instances * Implement a backup strategy for your dataResolve errors faced while using PostgreSQLWHO THIS BOOK IS FORReaders with basic knowledge of PostgreSQL who wish to implement key solutions based on their environment.Baji Shaik is a database administrator and developer. He was introduced to databases in 2011 and over the years, has worked with Oracle, PostgreSQL, Postgres Advance Server, RedShift, and Greenplum. He has a wide range of expertise and experience in SQL/NoSQL databases such as Cassandra and DynamoDB. He is a database migration expert and has developed many successful database solutions addressing challenging business requirements for moving databases from on-premises to AWS Cloud using multiple AWS services. Baji has organized a number of PostgreSQL meet-ups and maintains his own technical blog, where he likes to share his knowledge with the community. He co-authored Beginning PostgreSQL on the Cloud, released in March 2018.CHAPTER 01. INSTALLING POSTGRESQL THE RIGHT WAY! (10 PAGES)There are multiple ways you can install PostgreSQL on a server. This chapter will talk about the best ways to do so, focusing on system-level parameter settings before installation as a prerequisite and also post-installation steps to avoid issues in the future.CHAPTER 02. CONFIGURING YOUR DATABASE FOR PERFORMANCE (20 PAGES)PostgreSQL ships with a basic configuration tuned for wide compatibility rather than performance. Although the default settings of PostgreSQL are viable, it is always recommended to tune some basic parameters based on your environment and application behavior.CHAPTER 03. ENABLE LOGGING OF YOUR DATABASE (15 PAGES)Logging is key when you troubleshoot issues of PostgreSQL for security and performance to find out the trends. Default PostgreSQL configuration comes with very minimal logging and it is not always enough to troubleshoot the issues. So, this chapter will explain how to set logging and consequences of high logging and how to deal with it.CHAPTER 04. MONITORING POSTGRESQL INSTANCES (15 PAGES)Good monitoring is a symbol of a peaceful life for an administrator. If you set up monitoring of your databases to alert you whenever an issue comes up, then you need not worry about keeping an eye at your databases' health. This chapter will show you ways to monitor PostgreSQL instances.CHAPTER 05. EXECUTE MAINTENANCE (15 PAGES)Why do you need maintenance? What would you get from it? when do decide "it's time for maintenance"? How do you do it? Is there any way I can improve my maintenance time? This chapter will shed some light on all these questions.CHAPTER 06. SECURING DATABASES (15 PAGES)Security is one of the major concerns for storing sensitive data. It could be one of the reasons customers change their database engines. So, this chapter will talk about how best you can secure your data in PostgreSQL.CHAPTER 07. BACKUP AND RESTORE BEST PRACTICES (15 PAGES)For critical data systems, backup and restore is a very important consideration. However, it's very important to know what factors you should consider before you implement a backup strategy and how to implement one. This chapter talks about developing backup procedures for critical/non-critical data systems and quick restore procedures as well.CHAPTER 08. HIGH AVAILABILITY PROCEDURES (15 PAGES)You may come across some situations where you cannot make your primary working with-in your affordable time window. What do you do in that scenario? Implementing High Availability is always the best practice for such critical applications. This chapter talks about HA implementation and open source tools that can be used with PostgreSQL to implement the same.CHAPTER 09. IMPLEMENTING POOLER (15 PAGES)While running your application with limited resources, then it is highly recommended to use Pooling to connect the database. Performance of a database depends on the parallel connections that it can allow. Huge connections to a database in parallel degrades the database performance. This chapter will teach you to implement a pooler mechanism for your PostgreSQL instances.CHAPTER 10. BASIC ERRORS AND HANDY QUERIES (15 PAGES)Working with PostgreSQL, there are bound to be some errors you might face that takes a lot of time to resolve. And, some times you might need some queries which are based on catalogs to fetch the information. This chapter talks about some of these errors and their resolution so that it can save some time for administrators followed by handy queries to help them perform their daily duties.
Cognitive Virtual Assistants Using Google Dialogflow
Follow a step-by-step, hands-on approach to building production-ready enterprise cognitive virtual assistants using Google Dialogflow. This book provides an overview of the various cognitive technology choices available and takes a deep dive into cognitive virtual agents for handling complex real-life use cases in various industries such as travel and weather.You’ll delve deeper into the advanced features of cognitive virtual assistants implementing features such as input/output context, follow-up intents, actions and parameters, and handling complex multiple intents. You’ll learn how to integrate with third-party messaging platforms by integrating your cognitive bot with Facebook messenger. You’ll also integrate with third-party APIs to enrich your cognitive bots using webhooks.Cognitive Virtual Assistants Using Google Dialogflow takes the complexity out of the cognitive platform and provides rich guidance which you can use when developing your own cognitive bots. The book covers Google Dialogflow in-depth and starts with the basics, serving as a hands-on guide for developers who are starting out on their journey with Google Dialogflow. All the code presented in the book will be available in the form of scripts and configuration files, which allows you to try out the examples and extend them in interesting ways.WHAT YOU WILL LEARN* Develop cognitive bots with Google Dialogflow technology* Use advanced features to handle complex conversation scenarios* Enrich the bot’s conversations by understanding the sentiment of the user* See best practices for developing cognitive bots* Enhance a cognitive bot by integrating with third-party servicesWHO THIS BOOK IS FORAI and ML developers.Navin Sabharwal is an innovator, thought leader, author, and consultant in the areas of AI, machine learning, cloud computing, big data analytics, and software product development. He is responsible for IP development and service delivery in the areas of AI and machine learning, automation products, GCP, cloud computing, public cloud AWS, and Microsoft Azure. Navin has created niche award-winning products and solutions and has filed numerous patents in diverse fields such as IT services, assessment engines, ranking algorithms, capacity planning engines, and knowledge management.Amit Agrawal is a principal data scientist and researcher delivering solutions in the fields of AI and machine learning. He is responsible for designing end-to-end solutions and architecture for enterprise products.Chapter 1: Introduction to Cognitive Virtual BotChapter Goal: To introduce the basics of Cognitive Virtual Bot1.1 What is Cognitive ChatbotChapter 2: Introduction to Google DialogflowChapter Goal: To introduce the basics of Google Dialogflow2.2 What is Google Dialogflow2.3 Use cases for Google Dialogflow2.4 Bot Frameworks2.5 Building your First Bot using Google DialogflowChapter 3: Advanced Concepts of Google DialogflowChapter Goal: Details how to build a chatbot with Google Dialogflow3.1 Input context and output context3.2 Follow up intents3.3 Multiple responses3.4 Contextual entities3.5 Handling combination of intents and entities3.6 Event creation3.7 Enable fulfillment – webhook and inline editor3.8 Slots3.9 Handling intent conflicts3.10 Showcasing the solutions in various formats like Text, HTML and to integrations such as Google Assistant3.11 Multi-lingual chatbots3.12 Prebuilt agentsChapter 4: Use cases for Cognitive Chatbots using Google DialogflowChapter Goal: Provide different use cases and integrations for Cognitive Chatbots using Google Dialogflow.4.1 Chatbot personality via webhook4.2 Simple and complex dialogflow design for travel use case4.3 Integration with Google weather API.4.4 Additional integrations4.5 Intent Identifications – audio, speech responses and sentiment analysis4.6 Integrate Google Dialogflow with other services to enhance the conversational flow and searchChapter 5: Researches in field of Cognitive Virtual ChatbotsChapter Goal: Provides an introduction to the new researches in the areas of Cognitive Virtual Chatbots5.1 Cognitive Virtual Chatbots - research
Microsoft Exchange Server 2019 - Das Handbuch
Das Standardwerk für Administratoren zur neuen Version* Gewinnen Sie einen tiefgehenden Einblick in den Einsatz von Exchange Server 2019.* Voller praxisnaher Beispiele und unschlagbaren Expertentipps* Für Neueinsteiger, Umsteiger und Profis* Alle wichtigen Themen in einem Buch: Grundlagen, Einrichtung, Verwaltung, Compliance, Sicherheit, Hochverfügbarkeit, Migration und ÜberwachungMit dieser komplett aktualisierten Neuauflage seines bekannten Handbuchs führt Thomas Joos Neueinsteiger und Umsteiger durch alle Aspekte der Arbeit mit Microsoft Exchange Server 2019 – inkl. Office 365-Anbindung.Nach einem Überblick über die Neuerungen installieren und konfigurieren Sie den Server und lernen Konzepte und Werkzeuge zu seiner Administration kennen. Sie verstehen, wie Sie mit Connectoren Nachrichtenflüsse aufbauen, wie die Exchange-Datenbanken arbeiten, wie Sie verschiedenste Clients anbinden, Empfänger, Gruppen und Kontakte verwalten und Teamfähigkeit implementieren. Sie lernen, Compliance-konform zu archivieren sowie Maßnahmen zum Schutz vor Spam, Viren und Datenverlust zu treffen u. v. a. m.■ Überblick, Grundlagen und erste SchritteServerrollen, Edge-Transport, Web-App, ReFS und Database Divergence Detection, Virtualisierung, Exchange Admin Center, Exchange Management Shell, Arbeiten via PowerShell■ Einrichtung und VerwaltungE-Mail-Routing und Connectors, Exchange-Datenbankstruktur, PST-Dateien, Client-Anbindung (Desktop, mobil und Web), Verschlüsselung, Empfänger-, Gruppen- und Kontaktverwaltung, Teamwork mit öffentlichen Ordnern■ ComplianceRichtlinieneinhaltung und Archivierung, Data Loss Prevention (DLP), Verwaltung von Informationen (IRM)■ Sicherheit und HochverfügbarkeitEdge-Transport-Server, Viren- und Spamschutz, Verstehen und Verwalten von Berechtigungen, Datensicherung und Wiederherstellung, Hochverfügbarkeit, Exchange mit Office 365■ Migration, Sprachkommunikation und ÜberwachungMigration und Planung einer Exchange 2019-Infrastruktur, Exchange im Verbund, Überwachung und LeistungsoptimierungThomas Joos ist selbstständiger IT-Consultant und seit über 20 Jahren in der IT-Branche tätig. Er schreibt Fachbücher und berät Unternehmen in den Bereichen Active Directory, Exchange Server und IT-Sicherheit. Durch seinen praxisorientierten und verständlichen Schreibstil sind seine Fachbücher für viele IT-Spezialisten eine wichtige Informationsquelle geworden. Neben vielen erfolgreichen Büchern schreibt er für zahlreiche IT-Publikationen wie z. B. c't, Computerwoche und IT-Administrator sowie LinkedIn. Seinen Blog finden Sie auf http://thomasjoos.wordpress.com.
Essential ASP.NET Web Forms Development
Go from beginner to pro using one of the most effective and widely used technology stacks, Microsoft ASP.NET. Beginning with the basics, you will learn how to create interactive, professional-grade, database-driven web applications in no time, using ASP.NET, C#, SQL, Ajax, and JavaScript.ESSENTIAL ASP.NET WEB FORMS DEVELOPMENT is divided into six learning modules and will take you from soup to nuts with ASP.NET. Part I is an introduction to the major concepts, methodologies, and technologies associated with .NET web application development. You will learn about the client-server model, the .NET Framework, the ASP.NET and C# programming languages, and the Visual Studio integrated development environment. Part II teaches you how to develop a single-page .NET web application and add server and data validation controls, laying the foundation for learning languages in the context of an ASP.NET web application. Part III is all about C# operations and shows you how to perform assignment operations, conversion operations, control operations, string operations, arithmetic operations, date and time operations, array operations, collection operations, and file system operations, as well as create custom C# classes in the context of a .NET web application.In Part IV, you dive into a multiple-page .NET web application and learn how to maintain state between pages and create master pages, themes, and navigation controls. Part V shows you how to connect a .NET web application to a SQL Server database. You will learn to read a database schema, program in the SQL language, utilize data binding, perform single- and multiple-row database table maintenance, and write code behind database operations. And finally, Part VI teaches you how to enhance the interactivity of a .NET web application. You will learn how to generate email messages, make use of basic Ajax controls and the Ajax Control Toolkit, and program in the JavaScript language.WHAT YOU WILL LEARN* Delve into the basics of the client-server model, the .NET Framework, the ASP.NET and C# programming languages, and the Visual Studio integrated development environment* Create a page and add server and data validation controls* Develop basic programming skills in the C# language* Maintain state between pages and create master pages, themes, and navigation controls* Read a database schema, program in the SQL language, utilize data binding, perform single- and multiple-row database table maintenance, and write code behind database operations* Generate email messages, make use of basic Ajax controls and the Ajax Control Toolkit, and program in the JavaScript languageWHO THIS BOOK IS FORAnyone who wants to learn how to build ASP.NET web applications. Basic computer skills and the use of a database management system are recommended.Instructor materials and examples are available.ROBERT E. BEASLEY is Professor of Computing at Franklin College in Franklin, Indiana, USA where he teaches a variety of software engineering courses. He received both his BS and MS degrees from Illinois State University and his PhD from the University of Illinois at Urbana-Champaign. He has been developing software since 1981, has been an active software consultant in both the public and private sectors since 1987 and has been teaching software engineering since 1995. He has authored three books on software engineering, contributed chapters to two books, published over 50 articles in refereed journals and conference proceedings, and delivered numerous speeches and keynote addresses at international conferences.PART I – OVERVIEWChapter 1: Web Application DevelopmentPART II – SINGLE-PAGE WEB APPLICATION DEVELOPMENTChapter 2: Page DevelopmentChapter 3: Basic Server ControlsChapter 4: More Server ControlsChapter 5: Data Validation ControlsPART III – C# PROGRAMMINGChapter 6: Assignment OperationsChapter 7: Conversion OperationsChapter 8: Control OperationsChapter 9: String OperationsChapter 10: Arithmetic OperationsChapter 11: Date and Time OperationsChapter 12: Array OperationsChapter 13: Collection OperationsChapter 14: File System OperationsChapter 15: Custom C# ClassesPART IV – MULTIPLE-PAGE WEB APPLICATION DEVELOPMENTChapter 16: State MaintenanceChapter 17: Master PagesChapter 18: ThemesChapter 19: NavigationPART V – DATABASE CONNECTIVITYChapter 20: Database Design, SQL, and Data BindingChapter 21: Single-Row Database Table MaintenanceChapter 22: Multiple-Row Database Table MaintenanceChapter 23: Code-Behind Database OperationsPART VI – ADDITIONAL FUNCTIONALITYChapter 24: Email MessagingChapter 25: Ajax ProgrammingChapter 26: JavaScript Programming
Living with Computers
The computing technology on which we are now so dependent has risen to its position of ascendency so rapidly that few of us have had the opportunity to take a step back and wonder where we are headed. This book urges us to do so.Taking a big-picture perspective on digital technology, Living with Computers leads the reader on a whistle-stop tour of the history of information and information technology. This journey culminates in a deep exploration into the meaning and role of computers in our lives, and what this experience might possibly mean for the future of human society – and the very existence of humanity itself.In the face of the transformative power of computing, this book provokes us to ask big questions. If computers become integrated into our bodies, merging with the information processing of our very DNA, will computing help to shape the evolution of biological life? If artificial intelligence advances beyond the abilities of the human brain, will this overturn our anthropocentrism and lead to a new view of reality? Will we control the computers of the future, or will they control us?These questions can be discomforting, yet they cannot be ignored. This book argues that it is time to reshape our definition of our species in the context of our interaction with computing. For although such science-fiction scenarios are not likely to happen any time soon – and may, in fact, never happen – it is nevertheless vital to consider these issues now if we wish to have any influence over whatever is to come. So, humans, let’s confront our possible destiny!JAMES W. CORTADA is a Senior Research Fellow at the Charles Babbage Institute at the University of Minnesota. He holds a Ph.D. in modern history and worked at IBM in various positions for 38 years, including in IBM’s management research institute, The IBM Institute for Business Value (IBV). He is the author of over a dozen books on management, andnearly two dozen books on the history of information technology. These include the Springer title From Urban Legends to Political Fact-Checking: Online Scrutiny in America, 1990-2015 (with William Aspray).JAMES W. CORTADA is a Senior Research Fellow at the Charles Babbage Institute at the University of Minnesota. He holds a Ph.D. in modern history and worked at IBM in various sales, consulting, management, and executive positions for 38 years, including in IBM’s management research institute, The IBM Institute for Business Value (IBV). There, he led and participated in over three dozen global studies on the use of information and business managerial practices. He is also the author of over a dozen books on the management of business, information technologies, and management. He also authored nearly two dozen books on the history of information technology, its business practices and industry, and about knowledge management. These include the Springer title From Urban Legends to Political Fact-Checking: Online Scrutiny in America, 1990-2015 (with William Aspray). His articles on the history of information have appeared in many of the “journals of record” for each topic he has studied, including Information and Culture, Library and Information History, Business History Review, IEEE Annals of the History of Computing, Enterprise and Society, and Technology and Culture, among others. He serves on the editorial boards of Information and Culture, Library and Information History, and IEEE Annals of the History of Computing.Introduction: Why Listen to Me? Why You Should Take Seriously Your Own Knowledge of Computers.- What Is Computing?.- How Did We Get Here?.- Early Views of Computing.- How People View Computing Today.- How We Might See the End of the Information Age.- Life in a Post-Information Era.- Is It the End of Our World? How to Think About Implications and Challenges.- How to Live with Computers.
MCA Modern Desktop Administrator Study Guide
THE MUST-HAVE PREPARATION GUIDE FOR MCA MODERN DESKTOP CERTIFICATION—COVERS THE NEW EXAM MD-101: MANAGING MODERN DESKTOPS!Microsoft’s Modern Desktop integrates Windows 10, Office 365, and advanced security capabilities. Microsoft 365 Certified Associate (MCA) Modern Desktop certification candidates need to be familiar with Microsoft 365 workloads and demonstrate proficiency in deploying, configuring, and maintaining Windows 10 and non-Windows devices and technologies. The new Exam MD-101: Managing Modern Desktops measures candidate’s ability to deploy and update operating systems, manage policies and profiles, manage and protect devices, and manage apps and data. Candidates are required to know how to perform a range of tasks to pass the exam and earn certification.The MCA Modern Desktop Administrator Study Guide: Exam MD-101 provides in-depth examination of the complexities of Microsoft 365. Focusing on the job role of IT administrators, this clear, authoritative guide covers 100% of the new exam objectives. Real-world examples, detailed explanations, practical exercises, and challenging review questions help readers fully prepare for the exam. Sybex's comprehensive online learning environment—in which candidates can access an assessment test, electronic flash cards, a searchable glossary, and bonus practice exams—is included to provide comprehensive exam preparation. Topics include:* Planning and implementing Windows 10 using dynamic deployment and Windows Autopilot* Upgrading devices to Windows 10 and managing updates and device authentication* Managing access polices, compliance policies, and device and user profiles* Implementing and managing Windows Defender and Intune device enrollment* Deploying and updating applications and implementing Mobile Application Management (MAM)The move to Windows 10 has greatly increased the demand for qualified and certified desktop administrators in corporate and enterprise settings. MCA Modern Desktop Administrator Study Guide: Exam MD-101: Managing Modern Desktops is an invaluable resource for IT professionals seeking MCA certification.ABOUT THE AUTHORWILLIAM PANEK, MCP, MCSE, MCSA, MCTS, MCITP, CCNA, is a Five-Time Microsoft MVP Winner. He has taught at Boston University, Clark University, and the University of Maryland, and presently conducts live online classes for StormWind Studios (www.stormwind.com). Will has been a consultant and trainer for the United States Secret Service, Cisco, the United States Air Force, and the United States Army. He also creates training videos to help students prepare for various Microsoft exams. Introduction xixAssessment Test xxxCHAPTER 1 INSTALLING AND UPDATING WINDOWS 10 1Understanding the Basics 2Windows 10 Features 7Understanding the Windows 10 Architecture 8Preparing to Install Windows 10 9Windows 10 Pro 10Windows 10 Enterprise 11Windows 10 Enterprise E3 and E5 12New Install or Upgrade? 12Disk Partitioning 16Language and Locale 17Installing Windows 10 17Performing a Clean Install of Windows 10 18Performing an Upgrade to Windows 10 26Troubleshooting Installation Problems 31Supporting Multiple-Boot Options 33Using Windows Activation 34Understanding Automated Deployment Options 35An Overview of the Microsoft Deployment Toolkit 36An Overview of Unattended Installation 41An Overview of Windows Deployment Services 43An Overview of the System Preparation Tool and Disk Imaging 46Overview of the Windows Assessment and Deployment Kit 50Summary of Windows 10 Deployment Options 51Deploying Unattended Installations 52Using the System Preparation Tool to Prepare an Installation for Imaging 53Using the Deployment Image Servicing and Management Tool 55Using Windows System Image Manager to Create Answer Files 57Deploying with Windows Autopilot 58Windows Autopilot Requirements 59Windows Autopilot Profiles 61Understanding Windows Updates 62Windows Update Process 64Using Windows Update for Business 64Summary 68Exam Essentials 68Review Questions 70CHAPTER 2 MANAGING AUTHENTICATION 73Active Directory vs. Azure Active Directory 74Understanding Active Directory 74Understanding Azure Active Directory 84Managing Hybrid Networks 110Password Hash Synchronization with Azure AD 111Azure Active Directory Pass-through Authentication 111Federation with Azure AD 112Common Identity Scenarios 115Azure AD Connect 116Implementing Active Directory Federation Services 123What is a Claim? 123AD FS in Windows Server 2016 127Configuring a Web Application Proxy 129Active Directory Federation Services Installation 131Using PowerShell Commands 140Summary 145Exam Essentials 146Review Questions 148CHAPTER 3 MANAGING DEVICES 151Understanding File Systems 152File System Selection 153File System Conversion 155Configuring NTFS 157Configuring Disk Storage 159Basic Storage 159Dynamic Storage 160GUID Partition Table 162Cloud-Based Storage 163Using the Disk Management Utility 167Using the Microsoft Management Console 167Understanding the Disk Management Utility 171Managing Storage 185Managing Dynamic Storage 185Windows 10 Devices in Azure 187Compliance Policies 188Device Configuration Profiles 193Summary 196Exam Essentials 197Review Questions 198CHAPTER 4 PLANNING AND MANAGING MICROSOFT INTUNE 201Managing Devices with Microsoft Intune 202Understanding Microsoft Intune Benefits 204Configuring Intune Subscriptions 205Provisioning User Accounts 207Supporting Applications 222Deploying Applications Using Intune 222Supporting Broadband Connectivity 226Understanding Data Synchronization 227Using Mobile Application Management 229Windows Information Protection 231Understanding Updates 238Deploying Software Updates Using Intune 238Using Intune Compliance Reports 243Using Intune Reports 243PowerShell Commands 244Summary 245Exam Essentials 245Review Questions 247CHAPTER 5 MANAGING SECURITY 251Managing Windows Security 252Windows Defender Security Center 253Configuring Windows Firewall 256Understanding the Windows Defender Firewall Basics 256Windows Firewall with Advanced Security 257Managing Security 263Implementing Azure Windows Defender Advanced Threat Protection 263Understanding Windows Defender Application Guard 265Understanding Windows Defender Credential Guard 271Implementing and Managing WindowsDefender Exploit Guard 273Using Windows Defender Application Control 278Summary 278Exam Essentials 279Review Questions 280CHAPTER 6 CONFIGURING AUDITING 283Monitoring Windows 285Introducing Performance Monitor 285Using Other Performance-Monitoring Tools 294Monitor Cloud-Based Tools 302Monitor Azure Device Security 311Summary 314Exam Essentials 315Review Questions 316APPENDIX ANSWERS TO REVIEW QUESTIONS 321Chapter 1: Installing and Updating Windows 10 322Chapter 2: Managing Authentication 322Chapter 3: Managing Devices 323Chapter 4: Planning and Managing Microsoft Intune 324Chapter 5: Managing Security 325Chapter 6: Configuring Auditing 326Index 327
Driving Networked Service Productivity
Christofer F. Daiberl explores how to enhance the productivity of services delivered by a network of co-providers. Harnessing empirical insights and synthesizing contributions from service design, information systems, and engineering, the author develops a systematic productivity improvement technique. The technique supports practitioners to iteratively discover and seize opportunities to enhance productivity for their own organization, customers, and relevant co-providers. Reflecting on the overall results, five general design principles are proposed that support the development of new artifacts fostering truly productive services in a networked world. Christofer F. Daiberl received his PhD from the Friedrich-Alexander-Universität Erlangen-Nürnberg, where he worked as a Research Associate for Prof. Dr. Kathrin M. Möslein at the Chair of Information Systems – Innovation & Value Creation. The concepts of networked service delivery and networked service productivity.- Approaches for improving productivity from a network perspective.- The networked service productivity improvement technique.- Design principles for improving networked service productivity.
Getting Started with Containers in Azure
Deploy and execute Microsoft Azure container and containerized applications on Azure. This second book in author Shimon Ifrah’s series on containers will help you manage and scale containers along with their applications, tools and services.You’ll start by setting up the Azure environment and quickly work through techniques and methods of managing container images with Azure Container Registry (ACR). As you move forward, deploying containerized applications with Azure container instances and Azure Kubernetes Service is discussed in detail, and in the process, you’ll see how to install Docker container host on Azure Virtual Machine.This is followed by a discussion on security in Azure containers where you’ll learn how to monitor containers and containerized applications backed by illustrative examples. Next, you will review how to scale containers along with methods for backing up and restoring containers and containerized applications on Azure. Towards the end, the book demonstrates troubleshooting applications and Docker container host issues in Azure.Getting Started with Containers in Azure will equip you to deploy, manage and secure containerized applications using Azure tools and services for containers.WHAT YOU’LL LEARN* Explore containers on Microsoft Azure.* Store Docker images on Azure Container Registry* Automate deployment of container services using Azure CLI and Azure Cloud Shell * Use Azure Container Instances (ACI) for smaller deployment WHO THIS BOOK IS FORAzure administrators, developers, and architects who want to get started and learn more about containers and containerized applications on Microsoft Azure.Shimon Ifrah is an IT professional with over years of experience in the design, management, and deployment of information technology systems and networks. In the last few years Shimon has been specializing in cloud computing and containerized applications on Amazon AWS and other public cloud providers. Shimon also holds more than 20 vendor certificates from Microsoft, AWS, VMware, and Cisco. During his career in the IT industry he has worked for some of the largest managed services and technology companies in the world helping them administer systems for the largest enterprises. He is based out of Melbourne, Australia.CHAPTER 1: GET STARTED WITH MICROSOFT AZURECHAPTER GOAL: Setup your Microsoft Azure environmentNo of pages: 40SUB -TOPICS1. Setup you Azure tenant2. Setup Azure Cloud Shell3. Secure your account4. Azure Container Services overviewCHAPTER 2: STORE AND MANAGE DOCKER CONTAINER IMAGES ON AZURE CONTAINER REGISTRY (ACR)CHAPTER GOAL: Learn how to manage Container images with Azure ACRNO OF PAGES: 40SUB - TOPICS1. Setup Microsoft Azure Container Registry (ACR)2. Push Docker images to Azure Container Registry (ACR)3. Pull images from Azure Container Registry (ACR)4. Manage and secure Azure Container Registry (ACR)CHAPTER 3: DEPLOY CONTAINERIZED APPLICATIONS WITH AZURE CONTAINER INSTANCES (ACI)CHAPTER GOAL: Learn how to deploy Containers and Containerized Applications with Azure ACINO OF PAGES: 40SUB - TOPICS:1. Set up Azure Container Instances (ACI)2. Deploy Linux and Windows Containers to ACI3. Scale containerized applications on ACI4. Monitor and Manage containerized applications on ACICHAPTER 4: DEPLOY CONTAINERIZED APPLICATIONS WITH AZURE KUBERNETES SERVICE (AKS)CHAPTER GOAL: Learn how to deploy Containers and Containerized Applications with Azure AKSNO OF PAGES:SUB - TOPICS:1. Getting started with AKS2. Setup and configure AKS Networking3. Deploy Kubernetes Dashboard (Web UI) on AKS4. Manage and Secure AKSCHAPTER 5: DEPLOY DOCKER CONTAINER HOST ON AZURE VIRTUAL MACHINEChapter Goal: Learn how to deploy Containers and Containerized Applications on Azure VMNO OF PAGES: 40SUB - TOPICS:1. Install Docker Container host on Ubuntu Linux VM2. Install Docker Container Host on Windows Server 2019 VM3. Deploy and manage containers on Azure VM (Linux and Windows)CHAPTER 6: SECURE YOUR MICROSOFT AZURE CONTAINERSCHAPTER GOAL: Learn how to secure and protect Containers and Containerized Applications on AzureNO OF PAGES: 40SUB - TOPICS:1. Protect and manage accounts on Microsoft Azure using Azure AD2. Use Azure Security Center and Secure Score to protect you tenant3. Secure your Containers with Azure Firewall and Network Security Groups (NSG)CHAPTER 7: SCALE CONTAINERS AND CONTAINERIZED APPLICATIONS ON AZURECHAPTER GOAL:Learn how to scale Containers and Containerized Applications on AzureNO OF PAGES: 40SUB - TOPICS:1. Scale Azure Kubernetes Service (AKS)2. Scale Azure Container Instances (ACI)3. Scale Azure Container Registry (ACR)4. Scale Azure Web Apps for Containers5. Scale Azure Docker Container host VMCHAPTER 8: MONITOR CONTAINERS AND CONTAINERIZED APPLICATIONS ON AZURECHAPTER GOAL: Learn how to Monitor Containers and Containerized Applications on AzureNO OF PAGES: 40SUB - TOPICS:1. Monitor Azure Kubernetes Service (AKS)2. Monitor Azure Container Instances (ACI)3. Monitor Azure Container Registry (ACR)4. Monitor Azure Web Apps for Containers5. Monitor Azure Docker Container host VMCHAPTER 9: BACKUP AND RESTORE CONTAINERS AND CONTAINERIZED APPLICATIONS ON AZURECHAPTER GOAL: Backup and Restore Containers and Containerized Applications on AzureNO OF PAGES: 40SUB - TOPICS:1. Backup Azure Kubernetes Service (AKS)2. Backup Azure Container Instances (ACI)3. Backup Azure Container Registry (ACR)4. Backup Azure Web Apps for Containers5. Backup Azure Docker Container host VMCHAPTER 10: TROUBLESHOOTING CONTAINERS AND CONTAINERIZED APPLICATIONS ON AZUREChapter Goal: Learn how to Troubleshoot Containers and Containerized Applications issues on AzureNO OF PAGES: 40SUB - TOPICS:1. Troubleshoot Azure Kubernetes Service (AKS)2. Troubleshoot Azure Container Instances (ACI)3. Troubleshoot Azure Container Registry (ACR)4. Troubleshoot Azure Web Apps for Containers5. Troubleshoot Azure Docker Container host VM
Practical Highcharts with Angular
Learn to create stunning animated and interactive charts using Highcharts and Angular. Use and build on your existing knowledge of HTML, CSS, and JavaScript to develop impressive dashboards that will work in all modern browsers. You will learn how to use Highcharts, call backend services for data, and easily construct real-time data dashboards. You'll also learn how you can club your code with jQuery and Angular. This book provides the best solutions for real-time challenges and covers a wide range of charts including line, area, maps, plot, different types of pie chart, Gauge, heat map, Histogram, stacked bar, scatter plot and 3D charts. After reading this book, you'll be able to export your charts in different formats for project-based learning. Highcharts is one the most useful products worldwide for develop charting on the web, and Angular is well known for speed. Using Highcharts with Angular, developers can build fast, interactive dashboards. Get up to speed using this book today. You will: * Learn how to develop interactive, animated dashboards * Understand how you can implement Highcharts using Angular * Develop a real-time application with the use of WebAPI, Angular, and Highcharts * Create interactive styling themes and colors for a dashboard Learn to create stunning animated and interactive charts using Highcharts and Angular. Use and build on your existing knowledge of HTML, CSS, and JavaScript to develop impressive dashboards that will work in all modern browsers. You will learn how to use Highcharts, call backend services for data, and easily construct real-time data dashboards. You'll also learn how you can club your code with jQuery and Angular. This book provides the best solutions for real-time challenges and covers a wide range of charts including line, area, maps, plot, different types of pie chart, Gauge, heat map, Histogram, stacked bar, scatter plot and 3d charts. After reading this book, you'll be able to export your charts in different formats for project-based learning. Highcharts is one the most useful products worldwide for develop charting on the web, and Angular is well known for speed. Using Highcharts with Angular, developers can build fast, interactive dashboards. Get up to speed using this book today. What You’ll Learn * How to develop interactive, animated dashboards How you can implement Highcharts using Angular * How to develop a real-time application with the use of WebAPI, Angular, and Highcharts How to create interactive styling themes and colors for a dashboard Who This Book Is For This book is aimed at developers, dev leads, software architects, students or enthusiasts who are already familiar with HTML, CSS, and JavaScript. Sourabh Mishra is an Entrepreneur, Developer, Speaker, Author, Corporate Trainer, and Animator. He is a Microsoft guy; he is very passionate about Microsoft technologies and a true .Net Warrior. Sourabh started his career, when he was just 15 years old. He’s loved computers from childhood. His programming experience includes C/C++, Asp.Net, C#, Vb.net, WCF, Sqlserver, Entity Framework, MVC, Web API, Azure, Jquery, Highcharts, and Angular. Sourabh has been awarded a Microsoft Most Valuable Professional (MVP) status. He has zeal to learn new technologies, sharing his knowledge on several online community forums. He is a founder of “IECE Digital” and “Sourabh Mishra Notes”, an online knowledge sharing platform where one can learn new technologies very easily and comfortably. 1. Getting Started with Highcharts.- 2. Concept of Highcharts.- 3. Integrating Highcharts with Angular.- 4. Different Charting Types.- 6. Working with Real-time Data.- 6. Themes and Additional Features in Highcharts.- 7. Building a Real-time Dashboard.
Cognitive Computing
Mit diesem Buch führen die Herausgeber den Begriff „Cognitive Computing“ ein. Unter Cognitive Computing werden verschiedene Technologieansätze wie künstliche neuronale Netze, Fuzzy-Systeme und evolutionäres Rechnen zusammengefasst mit dem Ziel, die kognitiven Fähigkeiten eines Menschen (Denken, Lernen, Schlussfolgern etc.) mithilfe von Computermodellen zu simulieren. Nebst den theoretischen Grundlagen widmet sich das Herausgeberwerk der Vielfalt verschiedener Anwendungsmöglichkeiten und zeigt erste Erfahrungen aus Pionierprojekten. Das Buch richtet sich gleichermaßen an Studierende, Fachleute aller Fachrichtungen sowie den interessierten Anwender. Es hilft dem Leser, die Bedeutungsvielfalt des Begriffs Cognitive Computing zu verstehen und verschiedene Einsatzmöglichkeiten im eigenen Umfeld zu erkennen und zu bewerten.EDY PORTMANN ist Professor für Informatik und Förderprofessor der Schweizerischen Post am Human-IST Institut der Universität Freiburg i. Üe. Zu seinen transdisziplinären Forschungsschwerpunkten zählt das Thema Cognitive Computing sowie die Anwendung dessen auf Städte. Er studierte Wirtschaftsinformatik, Betriebs- und Volkswirtschaftslehre und promovierte in Informatik. Er war u. a. bei Swisscom, PwC und EY tätig. Zudem forschte Edy Portmann an den Universitäten Singapur, Berkeley und Bern.SARA D’ONOFRIO ist Informatik-Doktorandin am Human-IST Institut der Universität Freiburg i.Üe. Sie hat einen zweisprachigen Bachelorabschluss in Betriebswirtschaftslehre, einen Masterabschluss mit Spezialisierung in Wirtschaftsinformatik und einen CAS in Hochschuldidaktik. Des Weiteren besuchte sie Weiterbildungskurse an unterschiedlichen europäischen Universitäten und nahm an verschiedenen Tagungen in Europa, Südamerika und Kanada teil. Ihre Forschungsinteressen sind Cognitive Computing, Innovation Management, Mensch-Maschine-Interaktion und Smart Cities.Cognitive Computing vs. Künstliche Intelligenz - Kreative Systeme - Mensch-Maschinen-Interaktion - Praktische Anwendungsfälle
Designing a HIPAA-Compliant Security Operations Center
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats.Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats.Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book.WHAT YOU WILL LEARN* Know what threat intelligence is and how you can make it useful* Understand how effective vulnerability management extends beyond the risk scores provided by vendors* Develop continuous monitoring on a budget* Ensure that incident response is appropriate* Help healthcare organizations comply with HIPAAWHO THIS BOOK IS FORCybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.ERIC C. THOMPSON is the author of two previous Apress books: Building a HIPAA Compliant Cybersecurity Program and Cybersecurity Incident Response. He is certified by GIAC in intrusion analysis, incident handling, network forensics, and detection. He is currently Director of Information Security and IT Compliance at Blue Health Intelligence, a company focused on data analytics in the healthcare payer space. He has Implemented and matured all elements of security operations. He is a passionate user of many open-source solutions and loves working with new implementations of Snort, Zeek, and SOF-ELK. He also has significant experience assessing and managing cyber risks and complying with HIPAA.
Cyber-Sicherheit für Dummies
Steht auf Ihrer To-Do-Liste auch, dass Sie unbedingt Ihre privaten Daten besser schützen müssen? Dieses Buch führt Sie in die Grundlagen der Cyber-Sicherheit ein. Sie erfahren zuerst einmal, welche Bedrohungen es überhaupt gibt, wie Sie sie erkennen, wie Sie sich vor Ihnen schützen und was Sie unbedingt tun sollten. Und falls Sie dann doch von einem Angriff betroffen sind, wie Sie Ihre Daten wiederherstellen. Dieses Buch hilft Ihnen auch, von vornherein Schwachstellen in Ihren Systemen und Geräten zu erkennen, sodass Cyber-Kriminelle erst gar keine Chance haben. Joseph Steinberg ist Berater für Cyber-Sicherheit und neue Technologien. Er leitet seit über zwei Jahrzehnten Unternehmen in der Informationssicherheitsbranche, schreibt den offiziellen Leitfaden, aus dem viele Chief Information Security Officers (CISOs) für ihre Zertifizierungsprüfungen lernen, und wird als einer der Top-3-Cyber-Sicherheits-Influencer weltweit betrachtet. Seine Erfindungen im Zusammenhang mit der Cyber-Sicherheit haben zu über 150 US-Patentanmeldungen geführt.Über den Autor 9EINLEITUNG23Über dieses Buch 23Wie dieses Buch aufgebaut ist 24Törichte Annahmen über den Leser 24Konventionen in diesem Buch 25Symbole, die in diesem Buch verwendet werden 25Wie es weitergeht 25TEIL I: ERSTE SCHRITTE IN CYBERSICHERHEIT 27KAPITEL 1 WAS IST EIGENTLICH CYBERSICHERHEIT? 29Cybersicherheit definieren 29Entwicklung von Cybersicherheit 30Technologischer Wandel 31Gesellschaftlicher Wandel 33Wandel von Geschäftsmodellen 34Politischer Wandel 34Risiken mit Cybersicherheit minimieren 38Die Ziele von Cybersicherheit: Die CIA-Triade 38Risiken für den Menschen 39KAPITEL 2 DIE HÄUFIGSTEN CYBERANGRIFFE41Angriffe, die Ihnen Schaden zufügen 41Denial-of-Service-Angriffe (DoS) 42Distributed-Denial-of-Service-Angriffe (DDoS) 42Botnetze und Zombies 44Datenzerstörungsangriffe 44Identitätsmissbrauch 45Fake-Websites 45Phishing 46Spear-Phishing 46CEO-Fraud 46Smishing 47Vishing 47Tampering 47Abfangen von Daten 48Datendiebstahl 49Diebstahl persönlicher Daten 49Diebstahl geschäftlicher Daten 49Malware 51Viren 51Würmer 51Trojaner 51Ransomware 52Scareware 53Spyware 53Kryptominer 53Adware 54Blended Malware 54Zero-Day-Malware 54Poisoned-Web-Service-Angriffe 54Poisoning-Angriffe auf Netzwerkinfrastrukturen 55Malvertising 56Drive-by-Downloads 56Diebstahl von Passwörtern 57Mangelnde Wartung als Einfallstor 58Fortgeschrittene Angriffe 58Opportunistische Angriffe 59Gezielte Angriffe 59Gemischte Angriffe (opportunistisch und gezielt) 60KAPITEL 3 DEN FEIND KENNENLERNEN 61Von bösen und von guten Jungs 61Böse Jungs, die nichts Gutes im Schilde führen 63Script-Kiddies 63Hacker, die keine Kiddies sind 63Nationen und Staaten 64Wirtschaftsspione 64Kriminelle 64Hacktivisten 65Hacker und ihre bunten Hüte 66Wie Hacker Geld verdienen 67Direkter Finanzbetrug 67Indirekter Finanzbetrug 68Ransomware 70Kryptominer 71Umgang mit nicht-bösartigen Bedrohungen 71Menschliches Versagen 71Externe Katastrophen 73Angreifer abwehren 77Risiken mit verschiedenen Methoden begegnen 78TEIL II: IHRE PERSÖNLICHE SICHERHEIT VERBESSERN 79KAPITEL 4 BEWERTUNG IHRER AKTUELLEN SICHERHEITSLAGE81Die Bestandsaufnahme 81Heimcomputer 82Mobilgeräte 82Gaming-Systeme 83Geräte aus dem Universum des Internets der Dinge 83Netzwerkausrüstung 83Arbeitsumgebung 84Social Engineering 84Risiken erkennen 84Gefahrenabwehr 84Verteidigung des Perimeters 85Router mit Firewall 85Sicherheitssoftware 87Physischer Schutz Ihres Computers 87Backups 88Gefahr erkannt, Gefahr gebannt 88Wiederherstellen 88Aus Fehlern lernen 88Bewertung Ihrer aktuellen Sicherheitsmaßnahmen 88Software 89Hardware 90Versicherung 90Wissen ist Macht 91Privatsphäre 91Erst nachdenken, dann teilen 91Erst nachdenken, dann posten 92Allgemeine Tipps zum Schutz der Privatsphäre 93Sicheres Onlinebanking 95Smart und sicher 96KAPITEL 5 PHYSISCHE SICHERHEIT VERBESSERN99Die Bedeutung des physischen Schutzes verstehen 99Bestandsaufnahme 100Ortsfeste Geräte 101Mobile Geräte 101Gefährdete Daten identifizieren 102Einen Plan für physische Sicherheit erstellen 103Physische Sicherheit umsetzen 104Sicherheit für mobile Geräte 106Mitwisser sind die größte Gefahr 106TEIL III: SCHÜTZEN SIE SICH – VOR SICH SELBST 109KAPITEL 6 IHRE KONTEN SICHERN111Wiegen Sie sich nicht in falscher Sicherheit – Sie sind ein Ziel! 111Externe Konten sichern 112Daten in Nutzerkonten sichern 112Seriöse Anbieter 113Offizielle Apps und vertrauenswürdige Softwarequellen 113Root und Jailbreak – keine gute Idee 113Sparsam mit sensiblen Daten umgehen 113Sichere Zahlungsdienstleister nutzen 114Konten überwachen und Verdächtiges melden 114Passwortstrategie und Zwei-Faktor-Authentifizierung 114Abmelden, bitte! 116Mein Computer, mein Telefon 117Getrennte Computer und getrennte Browser 117Geräte sichern 117Software aktualisieren 117Aufgepasst bei öffentlichen WLAN-Netzwerken 118Sich selbst Grenzen setzen 119Benachrichtigungen aktivieren 119Wer war bei meinem Konto angemeldet? 119Auf Betrugsalarm reagieren 120Verschlüsselte Websites besuchen 120Vor Social Engineering schützen 121Links sind tabu 121Social Media mit Sinn und Verstand 122Datenschutzerklärungen lesen 122Daten schützen bei Anbietern, mit denen Sie interagiert haben 123Daten schützen bei Anbietern, mit denen Sie nicht interagiert haben 124KAPITEL 7 PASSWÖRTER127Passwörter – die ursprüngliche Authentifizierung 127Einfache Passwörter vermeiden 128Überlegungen zum Thema Passwörter 128Leicht zu erratende Passwörter 129Komplizierte Passwörter sind nicht immer besser 130Unterschiedliche Passwörter für unterschiedliche Zwecke 130Was ist ein sensibles Konto? 131Passwörter mehrfach verwenden – ab und zu erlaubt 131Mit Passwortmanagern das Gedächtnis entlasten 131Einprägsame und starke Passwörter 132Passwörter ändern – wann und wie oft 133Passwort nach einem Vorfall ändern 134Passwörter an Menschen weitergeben 135Passwörter speichern 135Passwörter übermitteln 135Alternativen für Passwörter finden 136Biometrische Authentifizierung 136SMS-basierte Authentifizierung 138App-basierte Einmalpasswörter 138Authentifizierung mit Hardware-Token 138USB-basierte Authentifizierung 139KAPITEL 8 SOCIAL ENGINEERING VERHINDERN141Technologie ist nicht vertrauenswürdig 141Formen von Social-Engineering-Angriffen 141Die sechs Prinzipien des Social Engineerings 145Freigiebigkeit in den sozialen Medien 146Kalender und Reisepläne 146Finanzinformationen 147Persönliche Informationen 147Berufliche Informationen 149Medizinische oder juristische Ratschläge 149Standort 149Vorsicht bei viralen Trends 150Falsche Kontakte in den sozialen Netzwerken 150Foto 151Verifizierung 151Gemeinsame Freunde oder Kontakte 151Relevante Beiträge 152Anzahl der Kontakte 152Branche und Wohnort 152Ähnliche Anfragen 153Duplikate 153Kontaktinformationen 153LinkedIn-Premium-Status und -Empfehlungen 153Gruppenaktivitäten 154Stimmen die Verhältnisse? 154Was macht einen Menschen zum Menschen? 154Klischeehafte Namen 155Kenntnisse 155Rechtschreibung 155Verdächtige Laufbahn 155Prominente 156Sicherheit durch falsche Informationen 156Sicherheitssoftware 157Allgemeine Cyberhygiene 157KAPITEL 9 CYBERSICHERHEIT FÜR SELBSTSTÄNDIGE UND FREIBERUFLER159Cybersicherheit ist Ihre Verantwortung 159Versicherung gegen Cyberschäden 159Gesetze und Vorschriften einhalten 160Datenschutzgrundverordnung 160Bundesdatenschutzgesetz 161Internetzugriff regeln 161Gastzugang 161Eingehende Verbindungen 162Gegen DoS-Angriffe verteidigen 164Website mit HTTPS 164Fernzugriff auf Systeme 164Vorsicht bei IoT-Geräten 164Verschiedene Netzwerke 165Vorsicht bei Kartenzahlung 165Gegen Stromausfall sichern 165KAPITEL 10 NEUE TECHNOLOGIEN BRINGEN NEUE GEFAHREN167Das Internet der Dinge 167Kryptowährungen und Blockchain 169Künstliche Intelligenz 171Wachsender Bedarf für Cybersicherheit 172Einsatz als Cybersicherheitstool 173Einsatz als Hacking-Tool 173Virtual Reality erleben 174Augmented Reality erleben 175TEIL IV: EINEN SICHERHEITSVORFALL HÄNDELN 177KAPITEL 11 EINEN SICHERHEITSVORFALL ERKENNEN179Offensichtliche Vorfälle erkennen 179Ransomware 180Defacement 180Angebliche Zerstörung von Daten 181Versteckte Vorfälle erkennen 182Verlangsamtes Gerät 182Kein Start des Task-Managers 183Kein Start des Registrierungs-Editors 183Probleme mit Latenz 184Verbindungsprobleme und Buffering 184Geänderte Geräteeinstellungen 185Versand und Empfang seltsamer E-Mails 186Versand und Empfang seltsamer Textnachrichten 186Neue und unbekannte Software 186Akkuprobleme und Hitzeentwicklung 186Veränderte Dateien 187Ungewöhnliche Darstellung von Websites 187Unerwarteter Proxy-Server 187Fehlerhafte Programme und Apps 188Deaktivierte Sicherheitsprogramme 188Erhöhter Datenverbrauch und Anzahl der SMS 188Erhöhter Netzwerkverkehr 189Ungewöhnliche geöffnete Ports 189Häufige Systemabstürze 190Ungewöhnlich hohe Telefonrechnung 190Zugriffsanforderung durch unbekannte Programme 190Aktivierung externer Geräte 191Wer hat die Kontrolle über Ihr Gerät? 191Neue Standardsuchmaschine 191Geändertes Gerätepasswort 191Aufdringliche Popups 191Neue Browser-Add-Ons 193Neue Browser-Startseite 193Blockierung von E-Mails durch Spamfilter 193Zugriff auf problematische Websites 194Ungewöhnliche Unterbrechungen 194Geänderte Spracheinstellungen 194Unerklärliche Geräteaktivitäten 194Unerklärliche Online-Aktivitäten 194Plötzliche Neustarts 195Bekanntes Datenleck 195Weiterleitung zur falschen Website 195Ein brennendes Festplattenlämpchen 195Anderes abnormales Verhalten 195KAPITEL 12 NACH EINEM SICHERHEITSVORFALL 197Vorsicht ist besser als Nachsicht 197Ruhig und besonnen handeln 197Einen Profi engagieren 198Maßnahmen ohne professionelle Unterstützung 198Schritt 1: Was ist passiert (oder passiert gerade)? 199Schritt 2: Den Angriff eindämmen 199Schritt 3: Den Angriff beenden und beseitigen 201Beschädigte Software neu installieren 204Neustart und Scan 204Problematische Wiederherstellungspunkte löschen 205Einstellungen wiederherstellen 205System neu aufsetzen 206Umgang mit gestohlenen Daten 206Lösegeld zahlen – oder nicht? 208Lehren für die Zukunft 208Umgang mit Datenlecks eines Anbieters 208Grund für die Mitteilung 209Vorfälle rufen Betrüger auf den Plan 209Passwörter 210Zahlungsdaten 210Dokumente von Behörden 211Dokumente von Uni oder Arbeitgeber 211Konten in den sozialen Medien 211TEIL V: BACKUPS UND WIEDERHERSTELLUNG 213KAPITEL 13 BACKUPS215Backups sind Pflicht und keine Kür 215Verschiedene Formen von Backups 216Vollständige Systemsicherung 216Wiederherstellungsimage 217Später erstellte Systemimages 217Original-Installationsmedien 217Heruntergeladene Software 218Vollständiges Daten-Backup 218Inkrementelles Backup 219Differenzielles Backup 219Gemischte Backups 220Kontinuierliche Backups 220Partielle Backups 220Backups von Ordnern 221Backups von Laufwerken 222Backups von virtuellen Laufwerken 222Ausnahmen 223Programminterne Backup-Funktionen 224Backup-Tools kennenlernen 224Backup-Software 224Laufwerksspezifische Backup-Software 225Windows-Sicherung 225Smartphone- und Tablet-Backup 226Manuelles Kopieren von Dateien oder Ordnern 226Automatisiertes Kopieren von Dateien oder Ordnern 227Backups von Drittanbietern 227Der richtige Aufbewahrungsort für Backups 228Lokale Aufbewahrung 228Offsite-Aufbewahrung 228Cloud-Backups 229Netzwerkspeicherung 229Verschiedene Aufbewahrungsorte 230Tabus für die Aufbewahrung von Backups 230Verschlüsselung von Backups 231Häufigkeit von Backups 232Backups entsorgen 232Backups testen 234Backups von Kryptowährungen 234Backups von Passwörtern 235Ein Bootmedium erstellen 235KAPITEL 14 GERÄTE ZURÜCKSETZEN 237Die zwei Arten des Zurücksetzens 237Soft Reset 238Hard Reset 240Ein Gerät nach einem Hard Reset neu einrichten 245KAPITEL 15 AUS BACKUPS WIEDERHERSTELLEN247Der Tag der Wiederherstellung wird kommen 247Warten Sie mit der Wiederherstellung! 248Eine vollständige Systemsicherung wiederherstellen 248Wiederherstellung auf dem gleichen Gerät 249Wiederherstellung auf einem anderen Gerät 249Wiederherstellungsimages 250Wiederherstellung aus später erstellen Systemimages 250Sicherheitssoftware installieren 251Original-Installationsmedien 251Heruntergeladene Software 251Wiederherstellung aus einem vollständigen Daten-Backup 252Wiederherstellung aus inkrementellen Backups 253Inkrementelle Backups von Daten 253Inkrementelle Backups von Systemen 254Wiederherstellung aus differenziellen Backups 254Wiederherstellung aus kontinuierlichen Backups 255Wiederherstellung aus partiellen Backups 255Wiederherstellung aus Ordner-Backups 256Wiederherstellung von Laufwerk-Backups 256Wiederherstellung aus virtuellen Laufwerken 257Umgang mit gelöschten Dateien 258Ausschluss von Dateien und Ordnern 258Wiederherstellung aus programminternen Backups 259Archive verstehen 259Viele Dateien in einer Datei 260Alte Daten 260Alte Datei-, Ordner- oder Backup-Versionen 260Wiederherstellung mit Backup-Tools 261Wiederherstellung aus dem Dateiversionsverlauf 262Rückkehr zu einem Wiederherstellungspunkt 262Wiederherstellung aus einem Smartphone-/Tablet-Backup 262Wiederherstellung aus einem manuellen Datei- oder Ordner-Backup 263Wiederherstellung von Backups bei Cloudanbietern 264Backups an ihren Ort zurückbringen 264Netzwerkspeicherung 264Wiederherstellung aus verschiedenen Backups 265Wiederherstellung auf anderem Gerät testen 265Wiederherstellung aus verschlüsselten Backups 265Wiederherstellung von Kryptowährungen 265Booten von einem Bootmedium 266TEIL VI: DER TOP-TEN-TEIL 267KAPITEL 16 ZEHN TIPPS ZUR VERBESSERUNG IHRER CYBERSICHERHEIT 269Sie sind ein Ziel! 269Sicherheitssoftware benutzen 270Sensible Daten verschlüsseln 270Backups, Backups, Backups 271Eigene Anmeldedaten 272Auf sichere Authentifizierung achten 272Vorsicht im Umgang mit sozialen Netzwerken 272Netzwerk aufteilen 273Öffentliches WLAN sicher nutzen 273Einen Experten engagieren 273KAPITEL 17 ZEHN ERKENNTNISSE AUS FÜNF SICHERHEITSVORFÄLLEN275Die Hotelkette Marriott 275Der Einzelhändler Target 276Die Filmstudios Sony Pictures 277Die Regierungsbehörde OPM 278Die Krankenversicherung Anthem 279KAPITEL 18 ZEHN TIPPS FÜR DIE NUTZUNG EINES ÖFFENTLICHEN WLANS281Das Handy als mobilen Hotspot nutzen 281WLAN-Verbindung bei Nichtbenutzung deaktivieren 281Keine sensiblen Aufgaben 282Keine Passwörter zurücksetzen 282Einen VPN-Dienst nutzen 282Tor-Browser verwenden 282Verschlüsseln 282Netzwerkfreigaben deaktivieren 282Sicherheitssoftware installieren 283Öffentlich ist nicht gleich öffentlich 283Stichwortverzeichnis 285
Hacking Connected Cars
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars. Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle’s systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity. * Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide * Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability * Conduct penetration testing using the same tactics, techniques, and procedures used by hackers From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars—all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure. About the Author v Acknowledgments vii Foreword xv Introduction xix Part I Tactics, Techniques, and Procedures 1 Chapter 1 Pre-Engagement 3 Penetration Testing Execution Standard 4 Scope Definition 6 Architecture 7 Full Disclosure 7 Release Cycles 7 IP Addresses 7 Source Code 8 Wireless Networks 8 Start and End Dates 8 Hardware Unique Serial Numbers 8 Rules of Engagement 9 Timeline 10 Testing Location 10 Work Breakdown Structure 10 Documentation Collection and Review 11 Example Documents 11 Project Management 13 Conception and Initiation 15 Definition and Planning 16 Launch or Execution 22 Performance/Monitoring 23 Project Close 24 Lab Setup 24 Required Hardware and Software 25 Laptop Setup 28 Rogue BTS Option 1: OsmocomBB 28 Rogue BTS Option 2: BladeRF + YateBTS 32 Setting Up Your WiFi Pineapple Tetra 35 Summary 36 Chapter 2 Intelligence Gathering 39 Asset Register 40 Reconnaissance 41 Passive Reconnaissance 42 Active Reconnaissance 56 Summary 59 Chapter 3 Threat Modeling 61 STRIDE Model 63 Threat Modeling Using STRIDE 65 Vast 74 Pasta 76 Stage 1: Define the Business and Security Objectives 77 Stage 2: Define the Technical Scope 78 Stage 3: Decompose the Application 79 Stage 4: Identify Threat Agents 80 Stage 5: Identify the Vulnerabilities 82 Stage 6: Enumerate the Exploits 82 Stage 7: Perform Risk and Impact Analysis 83 Summary 85 Chapter 4 Vulnerability Analysis 87 Passive and Active Analysis 88 WiFi 91 Bluetooth 100 Summary 105 Chapter 5 Exploitation 107 Creating Your Rogue BTS 108 Configuring NetworkinaPC 109 Bringing Your Rogue BTS Online 112 Hunting for the TCU 113 When You Know the MSISDN of the TCU 113 When You Know the IMSI of the TCU 114 When You Don’t Know the IMSI or MSISDN of the TCU 114 Cryptanalysis 117 Encryption Keys 118 Impersonation Attacks 123 Summary 132 Chapter 6 Post Exploitation 133 Persistent Access 133 Creating a Reverse Shell 134 Linux Systems 136 Placing the Backdoor on the System 137 Network Sniffing 137 Infrastructure Analysis 138 Examining the Network Interfaces 139 Examining the ARP Cache 139 Examining DNS 141 Examining the Routing Table 142 Identifying Services 143 Fuzzing 143 Filesystem Analysis 148 Command-Line History 148 Core Dump Files 148 Debug Log Files 149 Credentials and Certificates 149 Over-the-Air Updates 149 Summary 150 Part II Risk Management 153 Chapter 7 Risk Management 155 Frameworks 156 Establishing the Risk Management Program 158 SAE J3061 159 ISO/SAE AWI 21434 163 HEAVENS 164 Threat Modeling 166 STRIDE 168 PASTA 171 TRIKE 175 Summary 176 Chapter 8 Risk-Assessment Frameworks 179 HEAVENS 180 Determining the Threat Level 180 Determining the Impact Level 183 Determining the Security Level 186 EVITA 187 Calculating Attack Potential 189 Summary 192 Chapter 9 PKI in Automotive 193 VANET 194 On-board Units 196 Roadside Unit 196 PKI in a VANET 196 Applications in a VANET 196 VANET Attack Vectors 197 802.11p Rising 197 Frequencies and Channels 197 Cryptography 198 Public Key Infrastructure 199 V2X PKI200 IEEE US Standard 201 Certificate Security 201 Hardware Security Modules 201 Trusted Platform Modules 202 Certificate Pinning 202 PKI Implementation Failures 203 Summary 203 Chapter 10 Reporting 205 Penetration Test Report 206 Summary Page 206 Executive Summary 207 Scope 208 Methodology 209 Limitations 211 Narrative 211 Tools Used 213 Risk Rating 214 Findings 215 Remediation 217 Report Outline 217 Risk Assessment Report 218 Introduction 219 References 220 Functional Description 220 Head Unit 220 System Interface 221 Threat Model 222 Threat Analysis 223 Impact Assessment 224 Risk Assessment 224 Security Control Assessment 226 Example Risk Assessment Table 229 Summary 230 Index 233 Alissa Knight has worked in cybersecurity for more than 20 years. For the past ten years, she has focused her vulnerability research into hacking connected cars, embedded systems, and IoT devices for clients in the United States, Middle East, Europe, and Asia. She continues to work with some of the world’s largest automobile manufacturers and OEMs on building more secure connected cars. Alissa is the Group CEO of Brier & Thorn and is also the managing partner at Knight Ink, where she blends hacking with content creation of written and visual content for challenger brands and market leaders in cybersecurity. As a serial entrepreneur, Alissa was the CEO of Applied Watch and Netstream, companies she sold in M&A transactions to publicly traded companies in international markets. Her passion professionally is meeting and learning from extraordinary leaders around the world and sharing her views on the disruptive forces reshaping global markets. Alissa’s long-term goal is to help as many organizations as possible develop and execute on their strategic plans and focus on their areas of increased risk, bridging silos to effectively manage risk across organizational boundaries, and enable them to pursue intelligent risk taking as a means to long-term value creation. You can learn more about Alissa on her homepage at http://www.alissaknight.com, connect with her on LinkedIn, or follow her on Twitter @alissaknight.
Next-Generation Machine Learning with Spark
Access real-world documentation and examples for the Spark platform for building large-scale, enterprise-grade machine learning applications.The past decade has seen an astonishing series of advances in machine learning. These breakthroughs are disrupting our everyday life and making an impact across every industry.NEXT-GENERATION MACHINE LEARNING WITH SPARK provides a gentle introduction to Spark and Spark MLlib and advances to more powerful, third-party machine learning algorithms and libraries beyond what is available in the standard Spark MLlib library. By the end of this book, you will be able to apply your knowledge to real-world use cases through dozens of practical examples and insightful explanations.WHAT YOU WILL LEARN* Be introduced to machine learning, Spark, and Spark MLlib 2.4.x* Achieve lightning-fast gradient boosting on Spark with the XGBoost4J-Spark and LightGBM libraries* Detect anomalies with the Isolation Forest algorithm for Spark* Use the Spark NLP and Stanford CoreNLP libraries that support multiple languages* Optimize your ML workload with the Alluxio in-memory data accelerator for Spark* Use GraphX and GraphFrames for Graph Analysis* Perform image recognition using convolutional neural networks* Utilize the Keras framework and distributed deep learning libraries with Spark WHO THIS BOOK IS FORData scientists and machine learning engineers who want to take their knowledge to the next level and use Spark and more powerful, next-generation algorithms and libraries beyond what is available in the standard Spark MLlib library; also serves as a primer for aspiring data scientists and engineers who need an introduction to machine learning, Spark, and Spark MLlib.BUTCH QUINTO is founder and Chief AI Officer at Intelvi AI, an artificial intelligence company that develops cutting-edge solutions for the defense, industrial, and transportation industries. As Chief AI Officer, Butch heads strategy, innovation, research, and development. Previously, he was the Director of Artificial Intelligence at a leading technology firm and Chief Data Officer at an AI startup. As Director of Analytics at Deloitte, Butch led the development of several enterprise-grade AI and IoT solutions as well as strategy, business development, and venture capital due diligence. He has more than 20 years of experience in various technology and leadership roles in several industries including banking and finance, telecommunications, government, utilities, transportation, e-commerce, retail, manufacturing, and bioinformatics. Butch is the author of Next-Generation Big Data (Apress) and a member of the Association for the Advancement of Artificial Intelligence and the American Association for the Advancement of Science.
Beginning Microsoft Power BI
Analyze company data quickly and easily using Microsoft’s powerful data tools. Learn to build scalable and robust data models, clean and combine different data sources effectively, and create compelling and professional visuals.BEGINNING POWER BIis a hands-on, activity-based guide that takes you through the process of analyzing your data using the tools that that encompass the core of Microsoft’s self-service BI offering. Starting with Power Query, you will learn how to get data from a variety of sources, and see just how easy it is to clean and shape the data prior to importing it into a data model. Using Power BI tabular and the Data Analysis Expressions (DAX), you will learn to create robust scalable data models which will serve as the foundation of your data analysis. From there you will enter the world of compelling interactive visualizations to analyze and gain insight into your data. You will wrap up your Power BI journey by learning how to package and share your reports and dashboards with your colleagues.Author Dan Clark takes you through each topic using step-by-step activities and plenty of screen shots to help familiarize you with the tools. THIS THIRD EDITION covers the new and evolving features in the Power BI platform and new chapters on data flows and composite models. This book is your hands-on guide to quick, reliable, and valuable data insight.WHAT YOU WILL LEARN* Simplify data discovery, association, and cleansing* Build solid analytical data models* Create robust interactive data presentations* Combine analytical and geographic data in map-based visualizations* Publish and share dashboards and reportsWHO THIS BOOK IS FORBusiness analysts, database administrators, developers, and other professionals looking to better understand and communicate with dataDAN CLARK is a senior business intelligence (BI) and programming consultant specializing in Microsoft technologies. He is focused on learning new BI and data technologies and training others on how to best implement the technology. Dan has published several books and numerous articles on .NET programming and BI development. He is a regular speaker at various developer and database conferences and user group meetings and enjoys interacting with the Microsoft communities. In a previous life, Dan was a physics teacher. He is still inspired by the wonder and awe of studying the universe and figuring out why things behave the way they do.Chapter 1: Introducing Power BIChapter 2: Importing Data into Power BI DesktopChapter 3: Data Munging with Power QueryChapter 4: Creating the Data ModelChapter 5: Creating Calculations with DAXChapter 6: Creating Measures with DAXChapter 7: Incorporating Time IntelligenceChapter 8: Creating Reports with Power BI DesktopChapter 9: Publishing Reports and Creating Dashboards in the Power BI PortalChapter 10: Introducing Power Pivot in ExcelChapter 11: Data Analysis with Pivot Tables and ChartsChapter 12: Creating a Complete SolutionChapter 13: Advanced Topics in Power QueryChapter 14: Advanced Topics in Power BI DesktopChapter 15: Advanced Topics in Power BI Data Modeling
Robotic Process Automation (RPA) im Unternehmen. Erfolgsfaktoren und Empfehlungen für die Einführung
Zahlreiche Aufgaben eines Unternehmens folgen einem strukturierten Ablauf und könnten automatisiert werden. Allerdings treten sie zu selten auf, um den Automatisierungsaufwand zu rechtfertigen. Mit Robotic Process Automation (RPA) soll sich dies ändern: Indem ein Roboter die Eingaben auf einer bestehenden Benutzeroberfläche emuliert, sind keine Änderungen in der Zielapplikation notwendig. Die Automatisierung ist so zeitnah und kostengünstig möglich.Bisher haben viele Unternehmen positive Erfahrungen mit RPA gemacht. Dem stehen jedoch auch eine Reihe gescheiterter Projekte gegenüber. Welche Faktoren entscheiden über Erfolg und Misserfolg bei der Einführung eines RPA-Systems? Björn Freivogel erklärt, wie die Einführung einer Robotic Process Automation gelingt.Dazu gibt er zunächst einen Überblick über das Thema RPA und stellt die Merkmale sowie Funktionsweise von RPA-Systemen vor. Darauf aufbauend untersucht er, welche Eigenschaften geeignete Prozesse haben sollten und wie wichtig eine systematische Auswahl von Prozesskandidaten ist. Freivogel fasst in seiner Publikation nicht nur die theoretischen Grundlagen zusammen, sondern gibt auch praktische Empfehlungen für die RPA-Einführung im Unternehmen.Aus dem Inhalt:- Robotic Desktop Automation;- Agilität;- Agile Vorgehensmethodik;- Business Process Management System;- BPMS
The Internet of Things
PROVIDES COMPREHENSIVE COVERAGE OF THE CURRENT STATE OF IOT, FOCUSING ON DATA PROCESSING INFRASTRUCTURE AND TECHNIQUESWritten by experts in the field, this book addresses the IoT technology stack, from connectivity through data platforms to end-user case studies, and considers the tradeoffs between business needs and data security and privacy throughout. There is a particular emphasis on data processing technologies that enable the extraction of actionable insights from data to inform improved decision making. These include artificial intelligence techniques such as stream processing, deep learning and knowledge graphs, as well as data interoperability and the key aspects of privacy, security and trust. Additional aspects covered include: creating and supporting IoT ecosystems; edge computing; data mining of sensor datasets; and crowd-sourcing, amongst others. The book also presents several sections featuring use cases across a range of application areas such as smart energy, transportation, smart factories, and more. The book concludes with a chapter on key considerations when deploying IoT technologies in the enterprise, followed by a brief review of future research directions and challenges.The Internet of Things: From Data to Insight* Provides a comprehensive overview of the Internet of Things technology stack with focus on data driven aspects from data modelling and processing to presentation for decision making* Explains how IoT technology is applied in practice and the benefits being delivered.* Acquaints readers that are new to the area with concepts, components, technologies, and verticals related to and enabled by IoT* Gives IoT specialists a deeper insight into data and decision-making aspects as well as novel technologies and application areas* Analyzes and presents important emerging technologies for the IoT arena* Shows how different objects and devices can be connected to decision making processes at various levels of abstractionThe Internet of Things: From Data to Insight will appeal to a wide audience, including IT and network specialists seeking a broad and complete understanding of IoT, CIOs and CIO teams, researchers in IoT and related fields, final year undergraduates, graduate students, post-graduates, and IT and science media professionals.EDITED BYJOHN DAVIES, PHD, is Chief Researcher in BT's Research & Innovation Department, UK, where he leads a team focused on Internet of Things technologies. He is a Fellow of the British Computer Society and a Chartered Engineer as well as a Visiting Professor at the Open University and has published over 100 scientific articles. CAROLINA FORTUNA, PHD, is a Research Fellow at the Jo??ef Stefan Institute, Slovenia. She received her PhD in Computer Science in 2013, was a postdoctoral research associate at Ghent University, 2014-2015 and a Visitor at Stanford University in 2017. She has authored over 60 peer reviewed papers, technically led EU-funded research projects and is a consultant to industry. About the Editors xiList of Contributors xiiiAcknowledgments xvii1 INTRODUCTION 1John Davies and Carolina Fortuna1.1 Stakeholders in IoT Ecosystems 31.2 Human and IoT Sensing, Reasoning, and Actuation: An Analogy 41.3 Replicability and Re-use in IoT 51.4 Overview 6References 72 CONNECTING DEVICES: ACCESS NETWORKS 9Paul Putland2.1 Introduction 92.2 Overview of Access Networks 102.2.1 Existing Technologies are Able to Cover a Number of IoT Scenarios 102.3 Low-Power Wide Area Network (LPWAN) 122.3.1 Long-Range (LoRa) Low-Power Wide Area Network 142.3.2 Sigfox Low-Power Wide Area Network 142.3.3 Weightless Low-Power Wide Area Network 152.4 Cellular Technologies 152.4.1 Emerging 5G Cellular Technology 162.5 Conclusion 18References 183 EDGE COMPUTING 21Mohammad Hossein Zoualfaghari, Simon Beddus, and Salman Taherizadeh3.1 Introduction 213.2 Edge Computing Fundamentals 223.2.1 Edge Compute Strategies 223.2.2 Network Connectivity 253.3 Edge Computing Architecture 253.3.1 Device Overview 253.3.2 Edge Application Modules 263.3.3 IoT Runtime Environment 263.3.4 Device Management 273.3.5 Secure Runtime Environment 273.4 Implementing Edge Computing Solutions 283.4.1 Starter Configuration 283.4.2 Developer Tools 283.4.3 Edge Computing Frameworks 293.5 Zero-Touch Device On-boarding 303.6 Applying Edge Computing 323.7 Conclusions 33References 334 DATA PLATFORMS: INTEROPERABILITY AND INSIGHT 37John Davies and Mike Fisher4.1 Introduction 374.2 IoT Ecosystems 384.3 Context 404.4 Aspects of Interoperability 414.4.1 Discovery 414.4.2 Access Control 434.4.3 Data Access 444.5 Conclusion 48References 495 STREAMING DATA PROCESSING FOR IOT 51Carolina Fortuna and Timotej Gale5.1 Introduction 515.2 Fundamentals 525.2.1 Compression 525.2.2 Dimensionality Reduction 525.2.3 Summarization 535.2.4 Learning and Mining 535.2.5 Visualization 535.3 Architectures and Languages 545.4 Stream Analytics and Spectrum Sensing 565.4.1 Real-Time Notifications 575.4.2 Statistical Reporting 575.4.3 Custom Applications 585.5 Summary 59References 606 APPLIED MACHINE VISION AND IOT 63V. García, N. Sánchez, J.A. Rodrigo, J.M. Menéndez, and J. Lalueza6.1 Introduction: Machine Vision and the Proliferation of Smart Internet of Things Driven Environments 636.2 Machine Vision Fundamentals 656.3 Overview of Relevant Work: Current Trends in Machine Vision in IoT 676.3.1 Improved Perception for IoT 676.3.2 Improved Interpretation and Learning for IoT 686.4 A Generic Deep Learning Framework for Improved Situation Awareness 696.5 Evaluating the Impact of Deep Learning in Different IoT Related Verticals 706.5.1 Sensing Critical Infrastructures Using Cognitive Drone-Based Systems 706.5.2 Sensing Public Spaces Using Smart Embedded Systems 716.5.3 Preventive Maintenance Service Comparison Based on Drone High-Definition Images 726.6 Best Practice 746.7 Summary 75References 757 DATA REPRESENTATION AND REASONING 79Maria Maleshkova and Nicolas Seydoux7.1 Introduction 797.2 Fundamentals 807.3 Semantic IoT and Semantic WoT (SWoT) 817.4 Semantics for IoT Integration 827.4.1 IoT Ontologies and IoT-O 837.4.2 The Digital Twin Approach 857.5 Use Case 877.6 Summary 88References 898 CROWDSOURCING AND HUMAN-IN-THE-LOOP FOR IOT 91Luis-Daniel Ibáñez, Neal Reeves, and Elena Simperl8.1 Introduction 918.2 Crowdsourcing 928.3 Human-in-the-Loop 958.4 Spatial Crowdsourcing 978.5 Participatory Sensing 998.6 Conclusion 100References 1019 IOT SECURITY: EXPERIENCE IS AN EXPENSIVE TEACHER 107Paul Kearney9.1 Introduction 1079.2 Why is IoT Security Different from IT Security? 1089.3 What is Being Done to Address IoT Security Challenges? 1109.3.1 Governments 1109.3.2 Standards Bodies 1119.3.3 Industry Groups 1129.4 Picking the Low-Hanging Fruit 1139.4.1 Basic Hygiene Factors 1139.4.2 Methodologies and Compliance Frameworks 1159.4.3 Labeling Schemes and Consumer Advice 1169.5 Summary 117References 11810 IOT DATA PRIVACY 121Norihiro Okui, Vanessa Bracamonte, Shinsaku Kiyomoto, and Alistair Duke10.1 Introduction 12110.2 Basic Concepts in IoT Data Privacy 12210.2.1 What is Personal Data? 12210.2.2 General Requirements for Data Privacy 12310.2.3 Personal Data and IoT 12410.2.4 Existing Privacy Preservation Approaches 12610.2.5 Toward a Standards-Based Approach in Support of PIMS Business Models 12810.3 A Data Handling Framework Based on Consent Information and Privacy Preferences 12910.3.1 A Data Handling Framework 12910.3.2 Privacy Preference Manager (PPM) 13010.3.3 Implementation of the Framework 13110.4 Standardization for a User-Centric Data Handling Architecture 13210.4.1 Introduction to oneM2M 13210.4.2 PPM in oneM2M 13310.5 Example Use Cases 13310.5.1 Services Based on Home Energy Data 13310.5.2 HEMS Service 13310.5.3 Delivery Service 13410.6 Conclusions 137References 13711 BLOCKCHAIN: ENABLING TRUST ON THE INTERNET OF THINGS 141Giampaolo Fiorentino, Carmelita Occhipinti, Antonello Corsi, Evandro Moro, John Davies, and Alistair Duke11.1 Introduction 14111.2 Distributed Ledger Technologies and the Blockchain 14311.2.1 Distributed Ledger Technology Overview 14311.2.2 Basic Concepts and Architecture 14511.2.2.1 Consensus Algorithm 14811.2.3 When to Deploy DLT 14911.3 The Ledger of Things: Blockchain and IoT 15011.4 Benefits and Challenges 15011.5 Blockchain Use Cases 15211.6 Conclusion 154References 15412 HEALTHCARE 159Duarte Gonçalves-Ferreira, Joana Ferreira, Bruno Oliveira, Ricardo Cruz-Correia, and Pedro Pereira Rodrigues12.1 Internet of Things in Healthcare Settings 15912.1.1 Monitoring Patient Status in Hospitals 16012.1.2 IoT from Healthcare to Everyday Life 16012.1.3 Systems Interoperability 16112.2 BigEHR: A Federated Repository for a Holistic Lifelong Health Record 16312.2.1 Why a Federated Design? 16412.2.2 System Architecture 16412.3 Gathering IoT Health-Related Data 16512.3.1 From Inside the Hospitals 16612.3.2 Feeding Data from Outside Sources 16612.4 Extracting Meaningful Information from IoT Data 16712.4.1 Privacy Concerns 16712.4.2 Distributed Reasoning 16712.5 Outlook 168Acknowledgments 169References 16913 SMART ENERGY 173Artemis Voulkidis, Theodore Zahariadis, Konstantinos Kalaboukas, Francesca Santori, and Matev? Vučnik13.1 Introduction 17313.2 Use Case Description 17513.2.1 The Role of 5G in the Smart Grid IoT Context 17713.3 Reference Architecture 17813.4 Use Case Validation 18213.4.1 AMI-Based Continuous Power Quality Assessment System 18313.5 Conclusion 187Acknowledgment 187References 18714 ROAD TRANSPORT AND AIR QUALITY 189Charles Carter and Chris Rushton14.1 Introduction 18914.2 The Air Pollution Challenge 19114.3 Road Traffic Air Pollution Reduction Strategies 19314.4 Monitoring Air Pollution Using IoT 19414.5 Use Case: Reducing Emissions Through an IoT-Based Advanced Traffic Management System 19614.6 Limitations of Average Speed Air Quality Modeling 20114.7 Future Roadmap and Summary 202References 20315 CONCLUSION 207John Davies and Carolina Fortuna15.1 Origins and Evolution 20715.2 Why Now? 20715.2.1 Falling Costs and Miniaturization 20815.2.2 Societal Challenges and Resource Efficiency 20815.2.3 Information Sharing Comes of Age 20815.2.4 Managing Complexity 20815.2.5 Technological Readiness 20815.3 Maximizing the Value of Data 20915.4 Commercial Opportunities 20915.5 A Glimpse of the Future 210References 212Index 213
Practical Oracle SQL
Write powerful queries using as much of the feature-rich Oracle SQL language as possible, progressing beyond the simple queries of basic SQL as standardized in SQL-92.Both standard SQL and Oracle’s own extensions to the language have progressed far over the decades in terms of how much you can work with your data in a single, albeit sometimes complex, SQL statement. If you already know the basics of SQL, this book provides many examples of how to write even more advanced SQL to huge benefit in your applications, such as:* Pivoting rows to columns and columns to rows* Recursion in SQL with MODEL and WITH clauses* Answering Top-N questions* Forecasting with linear regressions* Row pattern matching to group or distribute rows* Using MATCH_RECOGNIZE as a row processing engineThe process of starting from simpler statements in SQL, and gradually working those statements stepwise into more complex statements that deliver powerful results, is covered in each example. By trying out the recipes and examples for yourself, you will put together the building blocks into powerful SQL statements that will make your application run circles around your competitors.WHAT YOU WILL LEARN* Take full advantage of advanced and modern features in Oracle SQL* Recognize when modern SQL constructs can help create better applications* Improve SQL query building skills through stepwise refinement* Apply set-based thinking to process more data in fewer queries* Make cross-row calculations with analytic functions* Search for patterns across multiple rows using row pattern matching* Break complex calculations into smaller steps with subquery factoringWHO THIS BOOK IS FOROracle Database developers who already know some SQL, but rarely use features of the language beyond the SQL-92 standard. And it is for developers who would like to apply the more modern features of Oracle SQL, but don’t know where to start. The book also is for those who want to write increasingly complex queries in a stepwise and understandable manner. Experienced developers will use the book to develop more efficient queries using the advanced features of the Oracle SQL language.KIM BERG HANSEN is a database developer from Middelfart in Denmark. As a youngster he originally wanted to work with electronics, and he tried computer programming and discovered that the programs he wrote worked well—unlike the electronics projects he soldered that often failed. This led to a VIC-20 with 5 kilobytes RAM and many hours programming in Commodore Basic.Having discovered his talent, Kim financed computer science studies at Odense University with a summer job as sheriff of Legoredo, while learning methodology and programming in Modula-2 and C. From there he moved into consulting as a developer making customizations to ERP software. That gave him his first introduction to Oracle SQL and PL/SQL, with which he has worked extensively since the year 2000.His professional passion is to work with data inside the database utilizing the SQL language to the fullest to achieve the best application experience for his application users. With a background fitting programs into 5 KB RAM, Kim hates to waste computing resources unnecessarily.Kim shares his experience and knowledge by blogging at the kibeha.dk website, presenting at various Oracle User Group conferences, and being the SQL quizmaster at the Oracle Dev Gym. His motivation comes from peers who say “now I understand” after his explanations, and from end users who “can’t live without” his application coding. He is a certified Oracle OCE in SQL, and an Oracle ACE Director.Outside the coding world, Kim is married, loves to cook, and is a card-carrying member of the Danish Beer Enthusiasts Association.PART I. CORE SQL1. Correlating Inline Views2. Pitfalls of Set Operations3. Divide and Conquer with Subquery Factoring4. Tree Calculations with Recursion5. Functions Defined Within SQL6. Iterative Calculations with Multidimensional Data7. Unpivoting Columns to Rows8. Pivoting Rows to Columns9. Splitting Delimited Text10. Creating Delimited TextPART II. ANALYTIC FUNCTIONS11. Analytic Partitions, Ordering and Windows12. Answering Top-N Questions13. Ordered Subsets with Rolling Sums14. Analyzing Activity Logs with Lead15. Forecasting with Linear Regression16. Rolling Sums to Forecast Reaching MinimumsPART III. ROW PATTERN MATCHING17. Up and Down Patterns18. Grouping Data Through Patterns19. Merging Date Ranges20. Finding Abnormal Peaks21. Bin Fitting22. Counting Children in Trees
Erforschung und Entwicklung von Communities
DIESES BUCH UNTERSUCHT DIE ENTWICKLUNG VON COMMUNITIES MIT HILFE DES GABEK®-VERFAHRENSWas hält Gemeinschaften zusammen? Diese Frage erforscht dieses Buch über die Entwicklung von Communities. Wichtiges Werkzeug ist dabei das Verfahren GABEK® (GAnzheitliche BEwältigung von Komplexität). Es analysiert u. a. Konzepte, Ontologien, Wertvorstellungen, Meinungen über Ursachen und Wirkungen sowie emotionale Einstellungen, die die Mitglieder einer Community verbinden. Durch eine softwareunterstützte Textanalyse werden sie in Form linguistischer Netze systematisiert. Diese Netze werden wiederum als Meinungslandkarten in unterschiedlichen Komplexitätsstufen dargestellt.Das Buch zeigt, wie Sie auf diese Weise Denk- und Handlungsmuster ableiten, die bei der Entwicklung von Communities oder auch bei der Organisationsentwicklung eine große Rolle spielen. Durch qualitative Textanalysen ermöglicht GABEK das Verständnis der Gesamtsituation und die Theoriebildung. Das Verfahren erleichtert die Konfliktlösung und eine Ausrichtung der Community auf strategische Ziele und Zukunftsvisionen, die von den meisten Betroffenen akzeptiert werden, auch wenn es um Erneuerung und Reformen geht.THEORETISCHE GRUNDLAGEN WERDEN MIT ANWENDUNGSBEISPIELEN VERKNÜPFTNach einer kurzen Beschreibung der qualitativen Methoden des GABEK-Verfahrens, untersucht dieses Buch die Entwicklung von Communities am Beispiel des Stadtteils Tepito in Mexico City. Anschließend befasst sich dieses Werk mit speziellen Themen, die mit der Gemeinschaftsbildung verbunden sind wie etwa:* Sinn- und Bedeutungszusammenhänge* Begriffsanalysen durch Bedeutungszusammenhänge* Von Begriffsnetzen zu Ontologien durch Komplexitätsreduktion* Linguistische Gestaltbildung* Bewusste und unbewusste Wissensverarbeitung* Problemlösung durch den simulierten DialogUm die Entwicklung von Communities aufschlussreich zu untersuchen, liefert Ihnen dieses Buch neben theoretischen Grundlagen auch immer wieder konkrete Anwendungsbeispiele des Verfahrens GABEK, das Sie bei der Entscheidungsfindung und Organisationsentwicklung unterstützt. Abschließend beschreibt der Autor eine Zukunftsvision über die Entwicklung von Communities durch ein System der dynamischen Wissensorganisation. Auf diese Weise zeigt Ihnen dieses Werk mögliche Wege zu einer zukunftsorientierten Entwicklung von Organisationen, Gemeinden, Regionen oder Vereinen und Interessensgemeinschaften auf.PROF. DR. JOSEF ZELGER studierte Philosophie, Psychologie, Theologie und Physik an der Universität Innsbruck. Von 1983 bis 2005 war er als Professor für Philosophie an der geisteswissenschaftlichen Fakultät der Universität Innsbruck tätig. Er war Mitbegründer und über fast drei Jahrzehnte Mitherausgeber der philosophischen Fachzeitschrift CONCEPTUS.