Allgemein
Modern Data Architecture on Azure
This book is an exhaustive guide to designing and implementing data solutions on Azure. It covers the process of managing data from end to end, starting from data collection all the way through transformation, distribution, and consumption.Modern Data Architecture on Azure begins with an introduction to the fundaments of data management, followed by a demonstration of how to build relational and non-relational data solutions on Azure. Here, you will learn data processing for complex analysis and how to work with CSV and JSON files. Moving forward, you will learn the foundational concepts of big data architecture, along with data management patterns and technology options offered by Azure. From there, you’ll be walked through the data architecture process, including data consortium on Azure, enterprise data governance, and much more. The book culminates with a deep dive into data architecture frameworks with data modeling.After reading this book, you will have a thorough understanding of data design and analytics using Azure, allowing you to collect and analyze massive amounts of data to optimize business performance, forecast future results, and more.WHAT WILL YOU LEARN* Understand the fundamentals of data architecture including data management, data handling ethics, data governance, and metadata management* Analyze and understand business needs to choose the right Azure services and make informed business decisions* Understand Azure Cloud Data design patterns for relational and non-relational data, batch real-time processing, and ETL/ELT pipelines* Modernize data architecture using Azure to leverage data and AI to enable digital transformation by securing and optimizing overall data lifecycle managementWHO IS THIS BOOK FOR:Data solution architects, data engineers, and IT consultants who want to gain a better understanding of modern data architecture design and implementation on Azure.SAGAR LAD is an Azure Data Solution Architect working with a leading multinational software company who has deep expertise in implementing data management and analytics solutions for large enterprises using cloud and artificial intelligence. He is an experienced Azure cloud evangelist with a strong focus on driving cloud adoption for enterprise organizations using Microsoft Cloud Solutions with more than ten years of IT experience. He loves blogging and is an active blogger on Medium, LinkedIn, and the C# Corner developer community. He was awarded the C# Corner MVP in September 2021 for his contributions to the developer community.Chapter 1: Introduction: Fundamentals of Data Management.- Chapter 2: Build Relational & Non-Relational Data Solutions on Azure.- Chapter 3: Building a Big Data Architecture.- Chapter 4: Data Management Patterns & Technology Choices with Azure.- Chapter 5: Data Architecture Process.- Chapter 6: Data Architecture Framework Explained.
Enterprise Social for the Java Platform
Learn everything you need to know about frameworks that help developers to integrate their solutions with social networks or APIs, from general purpose (Facebook, Twitter, Google, Mastodon) to specialized (LinkedIn, Xing, WhatsApp, YouTube, Instagram, Flickr, TikTok) to vertical (eToro, Fitbit, Strava). This book will teach you how to add social media features to web applications or services developed using Java, Jakarta EE, or generally running on a Java Virtual Machine (JVM).Jam-packed with practical examples of social integration into enterprise applications, you’ll learn how to address common requirements such as social login, identity federation, single sign-on via social accounts, OpenID Connect, and mashups. You’ll also see how to leverage Java social frameworks like Facebook Business SDK, Twitter4J, Agorava, Keycloak, and Spring Security.Enterprise Social for the Java Platform is an excellent companion to books covering Jakarta EE Security, Spring Security, portals, and related frameworks. Upon completing it, you’ll be armed with the expertise you need to integrate your own Java enterprise applications with social media networks.WHAT YOU WILL LEARN* Harness the reach and power of social media platforms by integrating your enterprise Java applications with them* Understand social media standards for different platforms* Address common security issuesWHO THIS BOOK IS FORDevelopers, architects, and managers of projects involving the use of APIs or Social Networks.WERNER KEIL is a cloud architect, Eclipse RCP, and a microservice expert for a large bank. He helps Global 500 Enterprises across industries and leading IT vendors. He worked for over 30 years as an IT manager, PM, coach, and SW architect and consultant for the finance, mobile, media, transport, and public sectors. Werner develops enterprise systems using Java, Java/Jakarta EE, Oracle, IBM, Spring or Microsoft technologies, JavaScript, Node, Angular, and dynamic or functional languages. He is a Committer at Apache Foundation, and Eclipse Foundation, a Babel Language Champion, UOMo Project Lead, and active member of the Java Community Process in JSRs such as 321 (Trusted Java), 344 (JSF 2.2), 354 (Money, also Maintenance Lead), 358/364 (JCP.next), 362 (Portlet 3), 363 (Unit-API 1), 365 (CDI 2), 366 (Java EE 8), 375 (Java EE Security), 380 (Bean Validation 2), and 385 (Unit-API 2, also Spec Lead), and was the longest serving Individual Member of the Executive Committee for nine years in a row until 2017. Werner is currently the Community representative in the Jakarta EE Specification Committee. He was among the first five Jakarta EE Ambassadors when it was founded as Java EE Guardians, and is a member of its Leadership Council.Chapter 1: Introduction.- Chapter 2: SocialUse Cases.- Chapter 3: Standardization.- Chapter 4: Social Security.- Chapter 5: Security Frameworks.- Chapter 6: Social Frameworks.- Chapter 7: Social Portals.- Appendix A: References.
Self-Service BI & Analytics
Self-Service BI & Analytics. Planung, Implementierung und Organisation. November 2023.Self-Service im BI- und Analytics-Kontext bedeutet, dass BI-Anwender selbst aktiv werden, um auf bestimmte Daten und Informationsprodukte zuzugreifen. Dabei hängt die Möglichkeit des Self-Service von Umgebungsfaktoren ab, nicht von einzelnen Werkzeugen. Um die Daten nutzen zu können, ist Datenkompetenz bei den Beteiligten erforderlich. Self-Service ist somit als strategischer Prozess zu verstehen, der als Teil der Datenstrategie immer der Unternehmensstrategie folgt und eine Kultur der Transparenz und offenen Kommunikation erfordert.Dieses Buch bietet eine umfassende Einführung in die grundlegenden Konzepte von Self-Service BI & Analytics. Es beschreibt die derzeit gängigen Ansätze mit Fokus auf die Konzeption und Governance von Self-Service. Darüber hinaus werden Lösungen für konkrete Anwendungsfälle vorgestellt. Im Einzelnen werden behandelt:Planung von Self-Service: Was ist vor der Einführung von Self-Service im Kontext einer gesamtheitlichen Datenstrategie, der Organisation und der Unternehmensarchitektur zu beachten? Welche Governance-Anforderungen müssen berücksichtigt werden?Implementierung von Self-Service: Die Entwicklung und der Betrieb von Self-Service-Lösungen werden ebenso aufgezeigt wie die Positionierung gegenüber einer Schatten-IT und die Vermeidung von technischen Schulden.Organisation von Self-Service: BI-Communitys, die Mitarbeiterausbildung und die Etablierung einer Self-Service-Kultur im Unternehmen spielen hier eine wichtige Rolle.Das Buch liefert wertvolle Einblicke und hilfreiche Anregungen für die erfolgreiche Einführung und Realisierung von Self-Service-Initiativen in der Unternehmenspraxis.Michael Kalke implementiert BI-Lösungen seit mehr als zehn Jahren. Zurzeit arbeitet er für die Vaillant Group und etabliert u.a. Self-Service BI.Artur König verantwortet bei der reportingimpulse GmbH die ganzheitliche Umsetzung von Datenprodukten von der Datenquelle bis zum fertigen Datenprodukt im Microsoft-Umfeld. Philipp Baron Freytag von Loringhoven ist ein versierter Marketingexperte und Datenanalyst, der sich seit mehr als 15 Jahren auf die Kombination von Daten, Marketing und Technologie spezialisiert hat.Lars Schreiber arbeitet als Abteilungsleiter für Business Intelligence Services in der Global IT der Pepperl + Fuchs SE. Dr. Thomas Zachrau ist seit über 30 Jahren leidenschaftlich im Bereich Analytics unterwegs. Die Analytik der kundenzentrierten Prozesse liegt ihm besonders am Herzen.Leseprobe (PDF-Link)
Building Your Own JavaScript Framework
JavaScript frameworks play an essential role in web application development; however, no single framework works perfectly for all projects. This book will help you understand existing projects, design new software architecture, and maintain projects as they grow. You’ll go through software architecture principles with JavaScript, along with a guided example of structuring your project and maintenance guidance.This book covers framework planning aspects, enabling you to identify key stakeholders, understand JavaScript API design, and leverage complex abstraction. The second part of the book takes a practical programming approach to building your own framework by showing you how to structure modules and interfaces. As you advance, you’ll discover how to develop data-binding components, work with JavaScript APIs, and much more. While writing a framework is half the job, continuing to develop it requires effort from everyone involved. The concluding chapters help to achieve this by teaching you the crucial aspects of software maintenance and highlighting the constants of framework development.By the end of this book, you’ll have gained a clear understanding of the JavaScript framework landscape, along with the ability to build frameworks for your use cases.
CompTIA Security+ Study Guide with over 500 Practice Test Questions
MASTER KEY EXAM OBJECTIVES AND CRUCIAL CYBERSECURITY CONCEPTS FOR THE COMPTIA SECURITY+ SY0-701 EXAM, ALONG WITH AN ONLINE TEST BANK WITH HUNDREDS OF PRACTICE QUESTIONS AND FLASHCARDSIn the newly revised ninth edition of CompTIA Security+ Study Guide: Exam SY0-701, veteran cybersecurity professionals and educators Mike Chapple and David Seidl deliver easy-to-follow coverage of the security fundamentals tested by the challenging CompTIA SY0-701 exam. You’ll explore general security concepts, threats, vulnerabilities, mitigations, security architecture and operations, as well as security program management and oversight.You’ll get access to the information you need to start a new career—or advance an existing one—in cybersecurity, with efficient and accurate content. You’ll also find:* Practice exams that get you ready to succeed on your first try at the real thing and help you conquer test anxiety* Hundreds of review questions that gauge your readiness for the certification exam and help you retain and remember key concepts* Complimentary access to the online Sybex learning environment, complete with hundreds of additional practice questions and flashcards, and a glossary of key terms, all supported by Wiley's support agents who are available 24x7 via email or live chat to assist with access and login questionsPerfect for everyone planning to take the CompTIA SY0-701 exam, as well as those aiming to secure a higher-level certification like the CASP+, CISSP, or CISA, this study guide will also earn a place on the bookshelves of anyone who’s ever wondered if IT security is right for them. It’s a must-read reference!And save 10% when you purchase your CompTIA exam voucher with our exclusive WILEY10 coupon code.ABOUT THE AUTHORSMIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP (Certified Information Systems Security Professional), CySA+ (CompTIA Cybersecurity Analyst), CIPP/US (Certified Information Privacy Professional), CompTIA PenTest+, and CompTIA Security+. Mike provides cybersecurity certification resources at his website, CertMike.com. DAVID SEIDL, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University where he leads an award winning, nationally recognized IT organization. David is a bestselling author who has written over 20 books with a focus on cybersecurity certification and cyberwarfare. Introduction xxxiCHAPTER 1 TODAY’S SECURITY PROFESSIONAL 1Cybersecurity Objectives 2Data Breach Risks 3The DAD Triad 4Breach Impact 5Implementing Security Controls 7Gap Analysis 7Security Control Categories 8Security Control Types 9Data Protection 10Data Encryption 11Data Loss Prevention 11Data Minimization 12Access Restrictions 13Segmentation and Isolation 13Summary 13Exam Essentials 14Review Questions 16CHAPTER 2 CYBERSECURITY THREAT LANDSCAPE 21Exploring Cybersecurity Threats 23Classifying Cybersecurity Threats 23Threat Actors 25Attacker Motivations 31Threat Vectors and Attack Surfaces 32Threat Data and Intelligence 35Open Source Intelligence 35Proprietary and Closed- Source Intelligence 38Assessing Threat Intelligence 39Threat Indicator Management and Exchange 40Information Sharing Organizations 41Conducting Your Own Research 42Summary 42Exam Essentials 43Review Questions 45CHAPTER 3 MALICIOUS CODE 49Malware 50Ransomware 51Trojans 52Worms 54Spyware 55Bloatware 56Viruses 57Keyloggers 59Logic Bombs 60Rootkits 60Summary 62Exam Essentials 62Review Questions 64CHAPTER 4 SOCIAL ENGINEERING AND PASSWORD ATTACKS 69Social Engineering and Human Vectors 70Social Engineering Techniques 71Password Attacks 76Summary 78Exam Essentials 78Review Questions 80CHAPTER 5 SECURITY ASSESSMENT AND TESTING 85Vulnerability Management 87Identifying Scan Targets 87Determining Scan Frequency 89Configuring Vulnerability Scans 91Scanner Maintenance 95Vulnerability Scanning Tools 98Reviewing and Interpreting Scan Reports 101Confirmation of Scan Results 111Vulnerability Classification 112Patch Management 112Legacy Platforms 113Weak Configurations 115Error Messages 115Insecure Protocols 116Weak Encryption 117Penetration Testing 118Adopting the Hacker Mindset 119Reasons for Penetration Testing 120Benefits of Penetration Testing 120Penetration Test Types 121Rules of Engagement 123Reconnaissance 125Running the Test 125Cleaning Up 126Audits and Assessments 126Security Tests 127Security Assessments 128Security Audits 129Vulnerability Life Cycle 131Vulnerability Identification 131Vulnerability Analysis 132Vulnerability Response and Remediation 132Validation of Remediation 132Reporting 133Summary 133Exam Essentials 134Review Questions 136CHAPTER 6 APPLICATION SECURITY 141Software Assurance Best Practices 143The Software Development Life Cycle 143Software Development Phases 144DevSecOps and DevOps 146Designing and Coding for Security 147Secure Coding Practices 148API Security 149Software Security Testing 149Analyzing and Testing Code 150Injection Vulnerabilities 151SQL Injection Attacks 151Code Injection Attacks 155Command Injection Attacks 155Exploiting Authentication Vulnerabilities 156Password Authentication 156Session Attacks 157Exploiting Authorization Vulnerabilities 160Insecure Direct Object References 161Directory Traversal 161File Inclusion 163Privilege Escalation 163Exploiting Web Application Vulnerabilities 164Cross- Site Scripting (XSS) 164Request Forgery 167Application Security Controls 168Input Validation 168Web Application Firewalls 170Parameterized Queries 170Sandboxing 171Code Security 171Secure Coding Practices 173Source Code Comments 174Error Handling 174Hard- Coded Credentials 175Package Monitoring 175Memory Management 176Race Conditions 177Unprotected APIs 178Automation and Orchestration 178Use Cases of Automation and Scripting 179Benefits of Automation and Scripting 179Other Considerations 180Summary 181Exam Essentials 181Review Questions 183CHAPTER 7 CRYPTOGRAPHY AND THE PKI 189An Overview of Cryptography 190Historical Cryptography 191Goals of Cryptography 196Confidentiality 197Integrity 199Authentication 200Non-repudiation 200Cryptographic Concepts 200Cryptographic Keys 201Ciphers 202Modern Cryptography 202Cryptographic Secrecy 202Symmetric Key Algorithms 204Asymmetric Key Algorithms 205Hashing Algorithms 208Symmetric Cryptography 208Data Encryption Standard 208Advanced Encryption Standard 209Symmetric Key Management 209Asymmetric Cryptography 211RSA 212Elliptic Curve 213Hash Functions 214Sha 215md 5 216Digital Signatures 216HMAC 217Public Key Infrastructure 218Certificates 218Certificate Authorities 219Certificate Generation and Destruction 220Certificate Formats 223Asymmetric Key Management 224Cryptographic Attacks 225Brute Force 225Frequency Analysis 225Known Plain Text 226Chosen Plain Text 226Related Key Attack 226Birthday Attack 226Downgrade Attack 227Hashing, Salting, and Key Stretching 227Exploiting Weak Keys 228Exploiting Human Error 228Emerging Issues in Cryptography 229Tor and the Dark Web 229Blockchain 229Lightweight Cryptography 230Homomorphic Encryption 230Quantum Computing 230Summary 231Exam Essentials 231Review Questions 233CHAPTER 8 IDENTITY AND ACCESS MANAGEMENT 237Identity 239Authentication and Authorization 240Authentication and Authorization Technologies 241Authentication Methods 246Passwords 247Multifactor Authentication 251One- Time Passwords 252Biometrics 254Accounts 256Account Types 256Provisioning and Deprovisioning Accounts 257Access Control Schemes 259Filesystem Permissions 260Summary 262Exam Essentials 262Review Questions 264CHAPTER 9 RESILIENCE AND PHYSICAL SECURITY 269Resilience and Recovery in Security Architectures 271Architectural Considerations and Security 273Storage Resiliency 274Response and Recovery Controls 280Capacity Planning for Resilience and Recovery 283Testing Resilience and Recovery Controls and Designs 284Physical Security Controls 285Site Security 285Detecting Physical Attacks 291Summary 291Exam Essentials 292Review Questions 294CHAPTER 10 CLOUD AND VIRTUALIZATION SECURITY 299Exploring the Cloud 300Benefits of the Cloud 301Cloud Roles 303Cloud Service Models 303Cloud Deployment Models 307Private Cloud 307Shared Responsibility Model 309Cloud Standards and Guidelines 312Virtualization 314Hypervisors 314Cloud Infrastructure Components 316Cloud Compute Resources 316Cloud Storage Resources 319Cloud Networking 322Cloud Security Issues 325Availability 325Data Sovereignty 326Virtualization Security 327Application Security 327Governance and Auditing of Third- Party Vendors 328Hardening Cloud Infrastructure 328Cloud Access Security Brokers 328Resource Policies 329Secrets Management 330Summary 331Exam Essentials 331Review Questions 333CHAPTER 11 ENDPOINT SECURITY 337Operating System Vulnerabilities 339Hardware Vulnerabilities 340Protecting Endpoints 341Preserving Boot Integrity 342Endpoint Security Tools 344Hardening Techniques 350Hardening 350Service Hardening 350Network Hardening 352Default Passwords 352Removing Unnecessary Software 353Operating System Hardening 353Configuration, Standards, and Schemas 356Encryption 357Securing Embedded and Specialized Systems 358Embedded Systems 358SCADA and ICS 361Securing the Internet of Things 362Communication Considerations 363Security Constraints of Embedded Systems 364Asset Management 365Summary 368Exam Essentials 369Review Questions 371CHAPTER 12 NETWORK SECURITY 375Designing Secure Networks 377Infrastructure Considerations 380Network Design Concepts 380Network Segmentation 383Zero Trust 385Network Access Control 387Port Security and Port- Level Protections 388Virtual Private Networks and Remote Access 390Network Appliances and Security Tools 392Deception and Disruption Technology 399Network Security, Services, and Management 400Secure Protocols 406Using Secure Protocols 406Secure Protocols 407Network Attacks 410On- Path Attacks 411Domain Name System Attacks 412Credential Replay Attacks 414Malicious Code 415Distributed Denial- of- Service Attacks 415Summary 418Exam Essentials 419Review Questions 421CHAPTER 13 WIRELESS AND MOBILE SECURITY 425Building Secure Wireless Networks 426Connection Methods 427Wireless Network Models 431Attacks Against Wireless Networks and Devices 432Designing a Network 435Controller and Access Point Security 438Wi- Fi Security Standards 438Wireless Authentication 440Managing Secure Mobile Devices 442Mobile Device Deployment Methods 442Hardening Mobile Devices 444Mobile Device Management 444Summary 448Exam Essentials 449Review Questions 450CHAPTER 14 MONITORING AND INCIDENT RESPONSE 455Incident Response 457The Incident Response Process 458Training 462Threat Hunting 463Understanding Attacks and Incidents 464Incident Response Data and Tools 466Monitoring Computing Resources 466Security Information and Event Management Systems 466Alerts and Alarms 469Log Aggregation, Correlation, and Analysis 470Rules 471Benchmarks and Logging 478Reporting and Archiving 478Mitigation and Recovery 479Secure Orchestration, Automation, and Response (SOAR) 479Containment, Mitigation, and Recovery Techniques 479Root Cause Analysis 482Summary 483Exam Essentials 484Review Questions 485CHAPTER 15 DIGITAL FORENSICS 489Digital Forensic Concepts 490Legal Holds and e- Discovery 491Conducting Digital Forensics 493Acquiring Forensic Data 493Acquisition Tools 497Validating Forensic Data Integrity 500Data Recovery 502Forensic Suites and a Forensic Case Example 503Reporting 507Digital Forensics and Intelligence 508Summary 508Exam Essentials 509Review Questions 511CHAPTER 16 SECURITY GOVERNANCE AND COMPLIANCE 515Security Governance 518Corporate Governance 518Governance, Risk, and Compliance Programs 520Information Security Governance 520Types of Governance Structures 521Understanding Policy Documents 521Policies 522Standards 524Procedures 526Guidelines 528Exceptions and Compensating Controls 529Monitoring and Revision 530Change Management 531Change Management Processes and Controls 532Version Control 534Documentation 535Personnel Management 535Least Privilege 535Separation of Duties 535Job Rotation and Mandatory Vacations 536Clean Desk Space 536Onboarding and Offboarding 536Nondisclosure Agreements 537Social Media 537Third- Party Risk Management 537Vendor Selection 537Vendor Assessment 538Vendor Agreements 538Vendor Monitoring 539Winding Down Vendor Relationships 540Complying with Laws and Regulations 540Common Compliance Requirements 541Compliance Reporting 541Consequences of Noncompliance 542Compliance Monitoring 543Adopting Standard Frameworks 543NIST Cybersecurity Framework 544NIST Risk Management Framework 546ISO Standards 547Benchmarks and Secure Configuration Guides 549Security Awareness and Training 550User Training 551Ongoing Awareness Efforts 553Summary 554Exam Essentials 555Review Questions 557CHAPTER 17 RISK MANAGEMENT AND PRIVACY 561Analyzing Risk 563Risk Identification 564Risk Assessment 565Risk Analysis 567Managing Risk 570Risk Mitigation 571Risk Avoidance 572Risk Transference 572Risk Acceptance 573Risk Tracking 574Risk Register 575Risk Reporting 576Disaster Recovery Planning 577Disaster Types 577Business Impact Analysis 578Privacy 578Data Inventory 579Information Classification 580Data Roles and Responsibilities 581Information Life Cycle 583Privacy Enhancing Technologies 584Privacy and Data Breach Notification 585Summary 585Exam Essentials 585Review Questions 587Appendix Answers to Review Questions 591Chapter 1: Today’s Security Professional 592Chapter 2: Cybersecurity Threat Landscape 593Chapter 3: Malicious Code 595Chapter 4: Social Engineering and Password Attacks 597Chapter 5: Security Assessment and Testing 600Chapter 6: Application Security 602Chapter 7: Cryptography and the PKI 604Chapter 8: Identity and Access Management 605Chapter 9: Resilience and Physical Security 607Chapter 10: Cloud and Virtualization Security 609Chapter 11: Endpoint Security 611Chapter 12: Network Security 614Chapter 13: Wireless and Mobile Security 616Chapter 14: Monitoring and Incident Response 619Chapter 15: Digital Forensics 621Chapter 16: Security Governance and Compliance 623Chapter 17: Risk Management and Privacy 626Index 629
JavaScript for Web Developers
Learn the basics of JavaScript to enhance your web pages. This book focuses on modern JavaScript programming and encourages a well-organized approach to programming in general.JavaScript for Web Developers explains each foundational concept of the language, followed by a practical implementation of that lesson to reinforce what you’ve learned. Author Mark Simon starts with the basics of JavaScript programming, followed by a tutorial on manipulating HTML elements. You will then learn to work with forms, along with CSS and Event Listeners. Hands-on projects will not only solidify each concept in your mind, but they will also give you greater confidence and help you absorb best practices. The book concludes with coverage of Ajax, which will enable you to send and retrieve data from a server asynchronously without interfering with the display and behavior of an existing web page.After reading this book, you will be able to use JavaScript to design and program your own web applications.WHAT WILL YOU LEARN* Understand the basics of JavaScript programming* Manipulate and modify web pages with JavaScript* Use JavaScript to interact with HTML and CSS* Work with data and understand the basics of working with AjaxWHO IS THIS BOOK FORBeginning web developers with little to no experience using JavaScript. MARK SIMON has been involved in training and education since the beginning of his career. He started as a teacher of mathematics but soon moved into IT consultancy and training because computers are much easier to work with than high school students! He has worked with and trained in several programming and coding languages, and currently focuses on web development and database languages. When not involved in work, you will generally find Mark listening to or playing music, reading, or just wandering about.Chapter 1: Working With JavaScript.- Chapter 2: Project — A Simple Guessing Game.- Chapter 3: Manipulating HTML Elements.- Chapter 4: Project — Creating a Slide Show.- Chapter 5: Working with Forms.- Chapter 6: Project — Creating a Custom Calculator Form.- Chapter 7: Interacting with CSS and Event Listeners.- Chapter 8: Project— Showing and Hiding Content.- Chapter 9: Project— Building a Lightbox Gallery.- Chapter 10: Project - An Introduction to Ajax.
Coding Clean, Reliable, and Safe REST APIs with ASP.NET Core 8
Learn ASP.NET Core APIs delivered in its latest version of the Microsoft Framework: .NET 8. This book will show you how to develop APIs with ASP.NET Core 8. Author Anthony Giretti will reveal all you need to know about HTTP protocol, REST architecture style, and ASP.NET Core 8.You will learn what reflexes and mindset a developer must have to approach the development of an API of medium complexity. By performing CRUD operations on a SQL Server database, you will see how to set up a clean and reliable application with industry best practices (clean code, security, observability, optimization and testing).After completing Coding Clean, Reliable, and Safe REST APIs with ASP.NET Core 8, you will be able to develop many kinds of APIs that require a senior developer level of knowledge and provide your customers with high-quality APIs.WHAT YOU WILL LEARN* Discover the latest version of ASP.NET Core 8* Code REST APIs with minimal APIs* Become familiar with clean code principles* Optimize performances with caching, background tasks and more* Make APIs resilient by handling SQL and HttpClient transient errors* Understand the importance of observability* Implement Authentication and Authorization* Grasp OWASP principles* Protect sensitive data* Master unit testing best practicesWHO THIS BOOK IS FORBeginner and intermediate professionals wishing to build clean, reliable and safe ASP.NET Core APIs and elevate their skills to a senior developer level.Anthony Giretti is a passionate developer who always likes to learn new technologies. He is a Microsoft MVP (awarded six times) and got certified in MCSD in 2016. He is a senior developer/architect at Marchex in Toronto, Canada. A specialist in Web technologies (17 years experience), including .NET, his expertise in IT and his passion for sharing his knowledge allows him to understand any web project and help other developers achieve their projects. He loves to deal with performance constraints, high availability, and optimization challenges.
Go Crazy
Go beyond the basics of Go and build complete applications using open-source libraries or the Go programming language by Google. This book will take you deep into the memory lane of the Go language with crunchy details straight from outer space.The applications in this book include the framework for a 2D Go-based game, an image random generator Rest API, financial time series handling for trading, a Kubernetes operator, a Blockchain coding and more. You'll also get refreshers on Go constructs and useful code tricks to build performant projects, and develop an HTTP based cloud ready image generator.Each chapter will be organized in the following format: what the particular application looks like; requirements and user stories of our example program; an introduction to the Go libraries or frameworks used; and the actual implementation of the example program, including common pitfalls and their solutions.Go Crazy will open your eyes to a new world of practical applications for Go. After reading the book, you will be able to apply your Golang knowledge to build your own crazy projects. Free source code will be available on this book's Apress GitHub page.WHAT YOU'LL LEARN* Compile and inline other programming languages, including GPU coding.* Handle Kubernetes clusters via your own operator* Write Go to code against Ethereum based block chains. * Write intelligent bot code to get you rich and famous.WHO THIS BOOK IS FORGo programmers both experienced and novice.Nicolas Modrzyk is the technical guru of Karabiner Software a successful consulting company located in the ever-dynamic Tokyo, Japan, with its mix of ancestral culture, and its future-oriented movement. He is also an active contributor to the Open-Source community in various projects for Imaging, AI and Cloud Computing. As both an engineer and a consultant, Nico has been involved in both sides of selling and designing large scale applications, managing enormous clusters of databases through handwritten middleware, enabling Japanese leaders and pushing international boundaries. Nico is an ardent advocate of Agile methods and is focused on getting the job done right to satisfy clients. He also knows how to say no to customer, and discuss requests to make the product less robust, and convoluted. At the same time, he loves to push both team members, and friends, to challenge themselves and define and reach their clearly goals. To gather culture, and different point of views, he has been meeting people and living in various countries such as France, Ireland, Japan, China, Korea and India as well as the US of A. Nico is the author of a few programming books, available on Amazon. You can talk to Nico in French, English and Japanese, and you can get along with him in Spanish and Chinese. He recently picked up a saxophone to honor his grand-father and his uncle, in the hope to match their skill with a brass instrument. He will be ready for a jazz session together whenever you are.
Fundamentals of Trace and Log Analysis
This book will help you analyze traces and logs from different software environments and communicate analysis results using a pattern language that covers everything from a small debugging log to a distributed trace with billions of messages from hundreds of computers, thousands of software components, threads, and processes.The book begins with the basic terminology of operating systems and programming, the foundation for understanding trace and log analysis. It then talks about patterns that help describe problems from a user’s view and patterns for errors and failures. Then, the book covers a range of trace patterns that group messages, and explores how logs depict software activities. It even examines specific message patterns and how they connect in a single trace. Moving forward, you’ll review patterns for multiple traces and logs and how to evaluate them. In this way, you can use similar methods to find problems across a wide variety of software. The book also provides guidance for analyzing issues on systems such as Windows, macOS, Linux, Android, iOS, and other types of computers, including those in networks and the Internet of Things, regardless of their system differences.Upon completing this book, you will be able to navigate the complexities of trace and log analysis and apply uniform diagnostics and anomaly detection pattern language across diverse software environments to help you troubleshoot, debug, and fix issues.WHAT YOU WILL LEARN* Understand pattern language for trace and log analysis* Gain a pattern-oriented methodology for trace and log analysis applicable to various domains, including cybersecurity* Master the fundamentals of operating systems and programming related to trace and log analysis* Understand observed behavior in traces and logs, which aids incident response, diagnostics, root cause analysis, troubleshooting, and debuggingWHO THIS BOOK IS FORSoftware technical support engineers, system and network administrators, software developers, testers, DevOps and DevSecOps, digital forensics and malware analysts, security incident response engineers, data analysts, and data mining practitioners. DMITRY VOSTOKOV is an internationally recognized expert, speaker, educator, scientist, inventor, and author. He founded the pattern-oriented software diagnostics, forensics, and prognostics discipline (Systematic Software Diagnostics) and Software Diagnostics Institute (DA+TA: DumpAnalysis.org + TraceAnalysis.org). Vostokov has also authored multiple books on software diagnostics, anomaly detection and analysis, software, and memory forensics, root cause analysis and problem-solving, memory dump analysis, debugging, software trace and log analysis, reverse engineering, and malware analysis. He has over thirty years of experience in software architecture, design, development, and maintenance in various industries, including leadership, technical, and people management roles. In his spare time, he presents multiple topics on Debugging.TV and explores Software Narratology and its further development as Narratology of Things and Diagnostics of Things (DoT), Software Pathology, and Quantum Software Diagnostics. His current interest areas are theoretical software diagnostics and its mathematical and computer science foundations, application of formal logic, artificial intelligence, machine learning, and data mining to diagnostics and anomaly detection, software diagnostics engineering and diagnostics-driven development, diagnostics workflow, and interaction. Recent interest areas also include cloud native computing, security, automation, functional programming, applications of category theory to software development and big data, and artificial intelligence diagnostics.
Ethical Hacking Workshop
The Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools.By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively.Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. Hands-on exercises at the end of each chapter will ensure that you solidify what you’ve learnt and get experience with the tools.By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.
Cloud-Native Development and Migration to Jakarta EE
Cloud-Native Development and Migration to Jakarta EE will help you unlock the secrets of Jakarta EE's evolution as you explore the migration and modernization of your applications. You’ll discover how to make your code compatible with the latest Jakarta EE version and how to leverage its modern features effectively.First, you’ll navigate the realm of cloud-native development as you demystify containers and get introduced to the Eclipse MicroProfile, a powerful tool in your toolkit. Next, you’ll take the bold step of transitioning your applications from local hardware to the limitless possibilities of the cloud. By following the author’s expert guidance to deploy your Jakarta EE applications on Microsoft Azure, you’ll gain hands-on experience in managing cloud resources.In the final leg of your journey, you’ll explore the world of serverless architecture. You’ll learn to design and run services that are truly serverless, harnessing the potential of the event-driven paradigm for scalability and cost-efficiency.By the end of this book, you’ll have mastered Jakarta EE and become a proficient cloud-native developer. Join us on this exciting journey of transformation and innovation as you pave the way for the future of Jakarta EE and cloud-native development.
Integral Methods in Science and Engineering
This volume contains a collection of articles on state-of-the-art developments in the construction of theoretical integral techniques and their application to specific problems in science and engineering. Chapters in this book are based on talks given at the Seventeenth International Conference on Integral Methods in Science and Engineering, held virtually in July 2022, and are written by internationally recognized researchers. This collection will be of interest to researchers in applied mathematics, physics, and mechanical, electrical, and petroleum engineering, as well as graduate students in these disciplines and other professionals for whom integration is an essential working tool.Computational modelling based on RIBEM method for the numerical solution of convection-diffusion equations (Al-Bayati).- Two-operator Boundary-Domain Integral Equations for Variable-Coefficient Dirichlet Problem in 2D with General Right-Hand Side (Ayele).- Implementation of Thermal Effects in Neutron Interactions in a Physical Monte Carlo Simulator (Bodmann).- On the Parameter Significance in Pandemic Modelling (Bodmann).- On a Variational Principle for Equilibrium Free Energy Functional of Simple Liquids (Brikov).- Use of variants of seismic signal approximations by proposed sets of functions for statistical structural analysis (Brikov).- Topics on Space Weather: Operational Numerical Prediction for Electron Content (de Campos Velho).- Ray-tracing the Ulam way (Chappell).- The Robin Boundary Value Problem for an Unbounded Plate with a Hole (Constanda).- A Mathematical Model Of Cell Clustering (Harris).- A revisit to a double-periodic perforated Neumann waveguide: opening spectral gaps(Pérez-Martínez).- Spectral homogenization problems in linear elasticity: the averaged Robin reaction matrix (Pérez-Martínez).- Time harmonic oscillations of a porous-elastic body with an application to modelling the spinal cord (Harris).- The Poly-Cauchy Operator, Whitney Arrays, and Fatou Theorems for Polyanalytic Functions in Uniformly Rectifiable Domains (Mitrea).- The influence of the refractive index and absorption coefficients in the solution of the radiative conductive transfer equation in Cartesian geometry (Ladeia).- Boundary Value Problems for Elliptic Systems onWeighted Morrey Spaces in Rough Domains (M. Mitrea).- Recipes for Computer Implementation of a Response Matrix Spatial Spectral Nodal Method for Three-dimensional Discrete Ordinates Neutral Particle Transport Modeling (Barros).- On Maximum Principles for Weak Solutions of some Parabolic Systems (Mikhailov).- Boundary integral equations analysis of bones resorption effect on stresses state near dentalimplants (Perelmuter).- Mathematical Modeling of Partially Miscible Water Alternating Gas Injection Using Geometric Thermodynamic Variables (Puime Pires).- Generalised model of wear in contact problems: the case of oscillatory load (Ponomarev).- On the philosophical foundations of an optimization algorithm inspired by human social behavior under a dynamical status distribution (de Oliveira).- On applications of the optimization algorithm DySDO (de Oliveira).- On the influence of the signal to noise ratio on the reconstruction of the non-linear transfer function in signal amplification (Bodmann).- An Analytic Solution for the Transient Three-Dimensional Advection–Diffusion Equation with Non-Fickian Closure by an Integral Transform Technique (Buske).- Failure Analysis of Composite Pipes Subjected to Bending: Classical Laminated Plate Theory vs. 3D Elasticity Solution (O. Menshykov).- The analytical formulation GILTT applied in a model of contaminant transport in porous media (Buske).- An Existence Result for a Class of Integral Equations via Graph-Contractions (Younis).- Some Convergence Results on the Periodic Unfolding Operator in Orlicz Setting (Zappale).- Three-Phase Flow Zero-Net Liquid Holdup in Gas-Liquid Cylindrical Cyclone (GLCC⃝c ) (Shoham).- Error Propagation in Dynamic Iterations Applied to Linear Systems of Differential Equations (Zubik-Kowal).
Linux Containers and Virtualization
This book is a practical, comprehensive guide to creating secure and efficient Linux containers using the Rust programming language. It utilizes a hands-on approach to teach Rust's programming constructs, security features, and its application in containerization.Author Shashank Mohan Jain starts with a gentle introduction to Rust to help you grasp the language's core concepts, syntax, and unique memory safety guarantees. He then transitions into the realm of Linux container development, where Rust shines as a robust and secure language for building containerized applications. Through hands-on examples, you will gain a deep understanding of how to harness Rust's features to create lightweight and secure Linux containers and how to leverage its strong type system and ownership model to eliminate common bugs and ensure memory safety in containerized applications. As you progress, you’ll explore the intricacies of working with system resources, networking, and interacting with the host operating system while maintaining isolation and security within the containers, as well as how Rust's concurrency model can build performant and responsive containerized applications. The book also covers advanced topics such as secure configuration handling, logging, and handling authentication within your containerized environment.After completing this book, you will be well-versed in Rust programming, equipped to create efficient and secure Linux containers, and confident in your ability to develop containerized applications for a variety of use cases.WHAT YOU WILL LEARN* Understand the basics of the Rust programming language* Understand Rust's security features* Create Linux constructs like namespaces in Rust* Develop your own container runtime using RustWHO THIS BOOK IS FORDevelopers, Architects and SREs working with cloud applications and dealing with container based workloads. SHASHANK MOHAN JAIN has been working in the IT industry for more than twenty years, mainly in the areas of cloud computing and distributed systems. He has a keen interest in virtualization techniques, security, and complex systems. Shashank has thirty-nine software patents (many yet to be published) to his name in the area of cloud computing, IoT, and machine learning. He is a speaker at multiple reputed cloud conferences. Shashank holds Sun, Microsoft, and Linux kernel certifications. Chapter 1: Virtualization Basics.- Chapter 2: Hypervisor.- Chapter 3: Namespaces.- Chapter 4: Cgroups.- Chapter 5: Layered File Systems.- Chapter 6: Creating a Simple Container Framework.- Chapter 7: Introduction to Rust.- Chapter 8: Containers in Rust.
Procedural Programming with PostgreSQL PL/pgSQL
Learn the fundamentals of PL/PGSQL, the programming language of PostgreSQL which is most robust Open Source Relational Database. This book provides practical insights into developing database code objects such as functions and procedures, with a focus on effectively handling strings, numbers, and arrays to achieve desired outcomes, and transaction management.The unique approach to handling Triggers in PostgreSQL ensures that both functionality and performance are maintained without compromise. You'll gain proficiency in writing inline/anonymous server-side code within the limitations, along with learning essential debugging and profiling techniques. Additionally, the book delves into statistical analysis of PL/PGSQL code and offers valuable knowledge on managing exceptions while writing code blocks.Finally, you'll explore the installation and configuration of extensions to enhance the performance of stored procedures and functions.WHAT YOU'LL LEARN* Understand the PL/PGSQL concepts* Learn to debug, profile, and optimize PL/PGSQL code* Study linting PL/PGSQL code* Review transaction management within PL/PGSQL code* Work with developer friendly features like operators, casts, and aggregatorsWHO IS THIS BOOK FORApp developers, database migration consultants, and database administrators.BAJI SHAIK is a Senior Database Consultant with AWS Professional Services. He was introduced to databases in 2011 and over the years have worked with Oracle, PostgreSQL, Postgres Advance Server, RedShift, and Greenplum. His background spans a wide depth and breadth of expertise and experience in SQL/NoSQL database technologies. He is a Database Migration Expert and has developed many successful database solutions addressing challenging business requirements for moving databases from on-premises to Amazon RDS and Aurora PostgreSQL/MySQL and worked on tuning the RDS/Aurora PostgreSQL/MySQL databases to perform up to the mark. He is an author, having written several books on PostgreSQL. A few of his recent works include “PostgreSQL Configuration”, “Beginning PostgreSQL on the Cloud”, and “PostgreSQL Development Essentials“. Furthermore, he has delivered several conferences, and workshop sessions and published many blogs within the AWS blog community.DINESH CHEMUDURU is working as Principal Architect (OSS). He also worked at AWS as a database consultant and he has done many database migrations successfully. He contributed to a few Open Source solutions and built extensions around PostgreSQL. He loves to code in Flutter/Golang/C++ and deploys them into Kubernetes.PART ONE:Chapter 1: Introduction to PostgreSQL procedural languagesChapter 2 Introduction to PL/PGSQLChapter 3 Introduction to variablesChapter 4 Variable’s data typesChapter 5 Dealing with StringsChapter 6 Dealing with NumbersChapter 7 Dealing with ArraysChapter 8 Control StatementsChapter 9 ExpressionsChapter 10 SQL ExecutionPART TWO:Chapter 11 Writing FUNCTIONS/PROCEDURESChapter 12 Defining own OPERATORSChapter 13 Writing own CastingChapter 14 AggregatorsChapter 15 Handling ExceptionsChapter 16 TriggersChapter 17 Writing anonymous code blocksChapter 18 Return ValuesChapter 19 ParametersChapter 20 CURSORSPART THREE:Chapter 21 PL/PGSQL essential extensionsChapter 22 plpgsql_check extensionChapter 23 orafce extensionChapter 24 pldbgapi extensionChapter 25 plprofiler extension
Zero Trust Overview and Playbook Introduction
Zero Trust is cybersecurity for the digital era and cloud computing, protecting business assets anywhere on any network. By going beyond traditional network perimeter approaches to security, Zero Trust helps you keep up with ever-evolving threats.The playbook series provides simple, clear, and actionable guidance that fully answers your questions on Zero Trust using current threats, real-world implementation experiences, and open global standards.The Zero Trust playbook series guides you with specific role-by-role actionable information for planning, executing, and operating Zero Trust from the boardroom to technical reality.This first book in the series helps you understand what Zero Trust is, why it’s important for you, and what success looks like. You’ll learn about the driving forces behind Zero Trust – security threats, digital and cloud transformations, business disruptions, business resilience, agility, and adaptability. The six-stage playbook process and real-world examples will guide you through cultural, technical, and other critical elements for success.By the end of this book, you’ll have understood how to start and run your Zero Trust journey with clarity and confidence using this one-of-a-kind series that answers the why, what, and how of Zero Trust!
Essenz der Informatik
Diese erweiterte 2. Auflage richtet sich an die regelmäßigen Benutzer von IT, also Berufstätige sowie Schüler, Studierende und Lehrer. Das Buch beschreibt das relevante Universum der Informatik und der Informationstechnologie, von den grundlegenden Prinzipien bis zur sozialen und gesellschaftspolitischen Bedeutung.Neu und erweitert sind u. a. Themen zu virtuellen Welten, zum Metaversum, zu digitalen Zwillingen sowie zu Aspekten von Verwaltung und Digitalisierung. Anhand zahlreicher Beispiele sowie Illustrationen und Grafiken wird die relevante IT-Umgebung der modernen Nichtfachperson dargestellt. Büroapplikationen, soziale Medien, Spiele und Hardwaretrends sowie die verwendeten Devices werden erklärt und in Zusammenhang gebracht.In einem Kapitel werden die ersten Grundlagen zur Programmierung der sehr populären Blocksprache Scratch gelegt. Zu jedem Kapitel werden zehn Fragen zum Inhalt gestellt, um dem Leser oder der Leserin eine Stütze zum gelesenen Inhalt zu geben und die Kompetenzen zu erweitern.DER INHALT* Ganz kurze Geschichte der IT* Alles ist Zahl* Computer als Hardware* Betriebssystem und Benutzeroberfläche* Netzwerke* Datenorganisation* IT-Entwicklung* IT-Organisation* Programmierung* Applikationen* Cloud-Computing* Sicherheit* Information und Medien* Künstliche Intelligenz* Virtuelle Welten* IT, Digitalisierung und GesellschaftCLAUDIO FRANZETTI hat nach dem Studium der Ingenieurwissenschaften an der ETH Zürich als Forschungsingenieur bei BBC und ABB im Bereich Computational Fluid Dynamics gearbeitet und intensive Erfahrungen in der Simulation auf Großrechnern erlangt. Nach einem Betriebswirtschaftsstudium an der Hochschule St. Gallen hat er im Bereich Finanzen bei Versicherungen und Banken gearbeitet, wo er auch für quantitative Risikoberechnungen und zum Teil für die Gesamt-IT zuständig war. Ganz kurze Geschichte der IT - Alles ist Zahl - Computer als Hardware - Betriebssystem und Benutzeroberfläche - Netzwerke - Datenorganisation - IT-Entwicklung - IT-Organisation - Programmierung - Applikationen - Cloud-Computing - Sicherheit - Information und Medien - Künstliche Intelligenz - Virtuelle Welten - IT, Digitalisierung und Gesellschaft
Build Autonomous Mobile Robot from Scratch using ROS
Start from scratch and build a variety of features for autonomous mobile robots both in simulation and hardware. This book will show you how to simulate an autonomous mobile robot using ROS and then develop its hardware implementation.You'll start by gaining an understanding of the basic theoretical concepts underlying the development of autonomous robots, including history, mathematics, electronics, mechanical aspects, 3D modelling, 3D printing, Linux, and programming. In subsequent chapters, you will learn how to describe kinematics, simulate and visualize the robot, how to interface Arduino with ROS, tele-operate the robot, perform mapping, autonomous navigation, add additional sensors, sensor fusion, laser scan matching, web interface, and more. Not only will you learn theoretical aspects, you’ll also review the hardware realization of mobile robots.Projects start with a very basic two-wheeled mobile robot and progress to complex features such as mapping, navigation, sensor fusion, autodocking, and web interface. Upon completing this book, you’ll have incorporated important robot algorithms including SLAM, Path Finding, Localization, and Kalman Filters – and you will be ready to start designing and building your own autonomous robots.WHAT YOU WILL LEARN* Design and build your customized physical robot with autonomous navigation capability* Create a map of your house using the robot’s lidar scanner* Command the robot to go to any accessible location on the map* Interact with the robot using a mobile app, joystick, keyboard, push-button, or remote computer* Monitor robot updates via LCD, a mobile app, sound, and status LEDs* Automate delivery of small payloads and return to home base* Utilize autodocking to home base for battery charging* Leverage sensor fusion to improve accuracy* Interface with the robot via the Web to monitor and control it remotelyWHO THIS BOOK IS FORComplete beginners who want to build customized robots from scratch. No experience is expected, although basic programming knowledge could be handy.RAJESH SUBRAMANIAN is a robotics engineer by profession and founder of ThunDroids LLP (a robotics manufacturing and service firm). He has more than 7 years of experience in the industry and research area. He holds a post-graduate degree from the University of Queensland, Australia and a research degree from Edith Cowan University, Australia. Rajesh has worked with humanoid service robots, mobile robots, robot arms, and modular robots as part of both industry and academics, and published a research paper on modular robots at the IEEE TENCON 2013 international conference. He also works as a robotics educator and has published courses on autonomous robots.CHAPTER 1: INTRODUCTION TO ROBOTICS· Basic Mathematics for Robotics· Basic Electronics· Basic 3D Modelling and 3D Printing· Basic Linux· Basic Programming· Basic Robotics Algorithms· Robot Navigation Basicso Odometryo Transformso Sensor Datao Mapo SLAMo Localizationo Path planners▪ Global▪ Localo Drive Systems▪ Differential Drive▪ Skid Steer▪ Ackermann▪ Holonomic etc.o Actuator ControlCHAPTER 2: SETTING UP YOUR COMPUTER· Installing Linux· Installing ROS· Installing IDECHAPTER 3: ROS FRAMEWORK· Why ROS· ROS Architecture· ROS Installation· ROS File System· Creating a workspace and building it· Publisher/Subscriber· Services· Actions· Implementing publishers/subscribers, services, and actions using python· Basic ROS commands· Coordinate Transformation (TF)· ROS Debugging Tools· ROS Navigation StackCHAPTER 4: ROBOT SIMULATION· Rviz and Gazebo· Turtlesim – A cute virtual turtleo Simulating turtle in Turtlesimo Controlling turtle in Turtlesim· Turtlebot – Autonomous Mobile Robot o Simulating Turtlebot in Gazeboo Visualizing Turtlebot in Rvizo Controlling Turtlebot· PR2 – Autonomous Mobile Manipulator Roboto Simulating PR2 in Gazebo o Visualizing PR2 in Rvizo Controlling PR2CHAPTER 5: ARDUINO AND ROS· What is Arduino· Basic Arduino Programming· Examples· Interfacing Arduino with ROSCHAPTER 6: BUILDING BUMBLEBOT: A SIMPLE 2-WHEELED ROBOT· Part I – Simulationo Building robot modelo Design robot parts using a 3D modeling softwareo Add the designed parts to URDF fileo Visualize the robot in Rvizo Load the robot into a virtual world in Gazebo simulator o Teleoperate the virtual robot using keyboardo Teleoperate the virtual robot using joysticko Teleoperate the virtual robot using android device· Part II – Hardwareo 3D Print the robot parts o Electronic components o Wiringo Assemblingo Configuring Single Board Computer for autonomous navigation o Configuring Arduino to control peripheralso Interfacing Arduino with ROSo Interfacing Lidar with ROSo Interfacing Motors with ROSo Interfacing Encoders with ROSo Interfacing other electronic devices (LEDs, LCD, Buzzer, Switch, etc) with ROS o Motor gear ratio calculationo Write your own motor controller and ROS interfaceo Differential driver and Odometryo Tele operation using ROSo Odometry correction – rotation and translationCHAPTER 7: ENABLING BUMBLEBOT TO PERFORM MAPPING AND AUTONOMOUS NAVIGATION· Part I – Simulationo Map buildingo Autonomous navigation· Part II – Hardwareo Map buildingo Autonomous navigation· Part III – Navigation TuningCHAPTER 8: ADDITIONAL SENSORS AND SENSOR FUSION IN BUMBLEBOT· Part I – Adding lidar based odometry· Part II – Adding IMU based odometryo IMU Calibrationo Interfacing with ROS· Part III - Sensor fusion for robustness and accuracyCHAPTER 9: AUTONOMOUS DELIVERY USING BUMBLEBOT· Building delivery applications using Python· Defining user interaction· Defining status behaviorsCHAPTER 10: BONUS MATERIALS: WEB INTERFACE AND AUTONOMOUS DOCKING USING BUMBLEBOT· Web interfaceo Building basic web page for robot control using html and javascripto Commanding robot using various controls in the web pageo Monitor status of the robot in the web page· Autonomous Dockingo Camera Calibrationo Camera Interfacing with ROSo AutodockingAudience: Beginner
Official Google Cloud Certified Professional Machine Learning Engineer Study Guide
EXPERT, GUIDANCE FOR THE GOOGLE CLOUD MACHINE LEARNING CERTIFICATION EXAMIn Google Cloud Certified Professional Machine Learning Study Guide, a team of accomplished artificial intelligence (AI) and machine learning (ML) specialists delivers an expert roadmap to AI and ML on the Google Cloud Platform based on new exam curriculum. With Sybex, you’ll prepare faster and smarter for the Google Cloud Certified Professional Machine Learning Engineer exam and get ready to hit the ground running on your first day at your new job as an ML engineer. The book walks readers through the machine learning process from start to finish, starting with data, feature engineering, model training, and deployment on Google Cloud. It also discusses best practices on when to pick a custom model vs AutoML or pretrained models with Vertex AI platform. All technologies such as Tensorflow, Kubeflow, and Vertex AI are presented by way of real-world scenarios to help you apply the theory to practical examples and show you how IT professionals design, build, and operate secure ML cloud environments. The book also shows you how to:* Frame ML problems and architect ML solutions from scratch* Banish test anxiety by verifying and checking your progress with built-in self-assessments and other practical tools* Use the Sybex online practice environment, complete with practice questions and explanations, a glossary, objective maps, and flash cardsA can’t-miss resource for everyone preparing for the Google Cloud Certified Professional Machine Learning certification exam, or for a new career in ML powered by the Google Cloud Platform, this Sybex Study Guide has everything you need to take the next step in your career. ABOUT THE AUTHORSMONA is an AI/ML specialist in the Google Public Sector. She is the author of Natural Language Processing with AWS AI Services and a frequent speaker at cloud computing and machine learning events. She was a Sr. AI/ML specialist SA at AWS before joining Google. She has 14 Certifications and has created courses for AWS AI/ML Certification Speciality Exam readiness. She has authored 17 articles on AI/ML and also co-authored a research paper on CORD-19 Neural Search, which won an award at the AAAI Conference on Artificial Intelligence PRATAP RAMAMURTHY is an AI/ML Specialist Customer Engineer in Google Cloud. Previously, he worked as a Sr. Principal Solution Architect at H2O.ai and before that was a Partner Solution Architect at AWS. He has authored several research papers and holds 3 patents.
Official Google Cloud Certified Professional Machine Learning Engineer Study Guide
EXPERT, GUIDANCE FOR THE GOOGLE CLOUD MACHINE LEARNING CERTIFICATION EXAMIn Google Cloud Certified Professional Machine Learning Study Guide, a team of accomplished artificial intelligence (AI) and machine learning (ML) specialists delivers an expert roadmap to AI and ML on the Google Cloud Platform based on new exam curriculum. With Sybex, you’ll prepare faster and smarter for the Google Cloud Certified Professional Machine Learning Engineer exam and get ready to hit the ground running on your first day at your new job as an ML engineer. The book walks readers through the machine learning process from start to finish, starting with data, feature engineering, model training, and deployment on Google Cloud. It also discusses best practices on when to pick a custom model vs AutoML or pretrained models with Vertex AI platform. All technologies such as Tensorflow, Kubeflow, and Vertex AI are presented by way of real-world scenarios to help you apply the theory to practical examples and show you how IT professionals design, build, and operate secure ML cloud environments. The book also shows you how to:* Frame ML problems and architect ML solutions from scratch* Banish test anxiety by verifying and checking your progress with built-in self-assessments and other practical tools* Use the Sybex online practice environment, complete with practice questions and explanations, a glossary, objective maps, and flash cardsA can’t-miss resource for everyone preparing for the Google Cloud Certified Professional Machine Learning certification exam, or for a new career in ML powered by the Google Cloud Platform, this Sybex Study Guide has everything you need to take the next step in your career. ABOUT THE AUTHORSMONA is an AI/ML specialist in the Google Public Sector. She is the author of Natural Language Processing with AWS AI Services and a frequent speaker at cloud computing and machine learning events. She was a Sr. AI/ML specialist SA at AWS before joining Google. She has 14 Certifications and has created courses for AWS AI/ML Certification Speciality Exam readiness. She has authored 17 articles on AI/ML and also co-authored a research paper on CORD-19 Neural Search, which won an award at the AAAI Conference on Artificial Intelligence PRATAP RAMAMURTHY is an AI/ML Specialist Customer Engineer in Google Cloud. Previously, he worked as a Sr. Principal Solution Architect at H2O.ai and before that was a Partner Solution Architect at AWS. He has authored several research papers and holds 3 patents.
Burp Suite Cookbook
With its many features, easy-to-use interface, and flexibility, Burp Suite is the top choice for professionals looking to strengthen web application and API security.This book offers solutions to challenges related to identifying, testing, and exploiting vulnerabilities in web applications and APIs. It provides guidance on identifying security weaknesses in diverse environments by using different test cases. Once you’ve learned how to configure Burp Suite, the book will demonstrate the effective utilization of its tools, such as Live tasks, Scanner, Intruder, Repeater, and Decoder, enabling you to evaluate the security vulnerability of target applications. Additionally, you’ll explore various Burp extensions and the latest features of Burp Suite, including DOM Invader.By the end of this book, you’ll have acquired the skills needed to confidently use Burp Suite to conduct comprehensive security assessments of web applications and APIs.
Master React in 5 Days
Do you dream of learning React without spending months in endless tutorials? Then this book is for you! In just five days, you will acquire the fundamental skills to start developing exceptional applications using this revolutionary technology. Whether you prefer to follow the book independently or alongside other online resources, it will provide you with a solid foundation to harness the full potential of React.Immerse yourself in an accelerated learning method that will allow you to make giant strides. Chapters are carefully designed to teach you the essential concepts of React, such as components, props, state, events, lifecycle, and hooks, without wasting time on complex explanations. Thanks to a clear and accessible writing style, you'll be able to dive into the intricacies of React from the first page. Code examples are accompanied by detailed explanations, enabling you to quickly grasp the subtleties of this technology. You don't need to be an expert in programming; the book is suitable for all levels, from beginners to more experienced developers looking to get up and running with React.You'll create React applications, reinforcing your understanding and consolidating your skills. You will be amazed at how quickly you progress with this hands-on approach that includes practical exercises to apply what you learn immediately. Don't wait any longer and dive into this exciting adventure right now. Master React in 5 Days will open the doors to a world of endless possibilities in web development.WHAT YOU'LL LEARN* Create React components* Study JavaScript XML (JSX) syntax and handling events* Understand React hooks* Manage lists and states WHO THIS BOOK IS FORProgrammers and web developer students with knowledge of JavaScriptERIC SARRION is a trainer, web developer, and an independent consultant. He has been involved in all kinds of IT projects for over 30 years. He is also a long-time author of web development technologies and is renowned for the clarity of his explanations and examples. He resides in Paris, France.
Machine Readable Me
As we go about our day-to-day lives, digital information about who we are is gathered from all angles via biometric scans, passport applications, and, of course, social media. This data can never fully capture our complex, fluid identities over decades of our lives. Yet, this data populates numerous databases we may not even be aware of that can make life-or-death decisions such as who is allowed access to welfare benefits or who is granted food parcels as they pass war-torn borders.Machine Readable Me considers how and why data that is gathered about us is increasingly limiting what we can and can't do in our lives and, crucially, what the alternatives are.Zara Rahman is a British-Bangladeshi researcher and writer based in Berlin whose interests lie at the intersection of power, technology and justice. For over a decade, she has worked in civil society to support activists from around the world to support context-driven and thoughtful uses of technology and data. She has held fellowships at Stanford University and the Harvard Kennedy School, and is a trustee at Saheli, a charity providing support and refuge to women of colour fleeing domestic abuse.
CompTIA A+ Practice Test Core 2 (220-1102)
The CompTIA A+ Core 2 certification validates the knowledge you need to support common operating systems and software installations. This book tests the skills essential for you to secure computing environments and troubleshoot common computing issues, while adhering to operational procedures through practice questions.Using proven techniques to test a candidate's knowledge of Core 2 (220-1102) exam objectives, this book will ensure that you're well-prepared to pass the exam on your first attempt. The chapters in this book comprise multiple-choice questions at the same level of difficulty as those you’ll find in the official exam. All the questions are broken down into different chapters according to each exam domain, finishing with a 90-question mock exam to prepare you to confidently take the real exam. The chapters are designed in a way to not only test your knowledge, but also your ability to handle pressure during the exam.By the end of this practice test book, you’ll be well-prepared to pass the CompTIA A+ Core 2 exam with confidence.
Fintech and Cryptocurrency
FINTECH AND CRYPTOCURRENCYDIVE INTO THE WORLD OF FINTECH AND CRYPTOCURRENCY THROUGH THE ENGAGING PERSPECTIVES OF THIS DIVERSE GROUP OF AUTHORS AND UNCOVER THE INTRICATE CONNECTIONS BETWEEN TECHNOLOGY, FINANCE, AND CRYPTOCURRENCY THAT MAKE THIS A MUST-HAVE FOR ANYONE INTRIGUED BY THE FUTURE OF DIGITAL SOCIETY.Digital currencies, decentralization of money, and the growth of new technologies like blockchain, the Internet of Things, and machine learning have produced new opportunities and difficulties for banking and finance, as well as users of these services in electronic commerce. New banking and finance technologies may improve operational efficiency, risk management, compliance, and client pleasure, but they can decrease barriers and introduce new concerns, such as cybersecurity risk. Cryptocurrencies with smart contracts for payments and trading, as well as AI systems with adaptive algorithms that allow picture and speech recognition, expert judgement, group categorization, and forecasting in a variety of fields, are instances of increased automation. Simultaneously, the potentials pose risks and raise regulatory concerns. The rise of blockchain technology and its widespread use have had a significant impact on the operation and management of digital systems. At the same time, researchers and practitioners have paid close attention to digital finance. Blockchain’s first applications were limited to the production of digital currency, but it has now been expanded to include financial and commercial applications. Innovative digital finance has had a huge impact on business and society since it has been extensively adopted by businesses and consumers. As a result, the goal of this edited book is to expand and deepen our knowledge of the business possibilities of novel blockchain and digital financial applications. MOHD NAVED, PHD, is an associate professor with a career spanning over a decade in the fields of business analytics, data science, and artificial intelligence. He has over 80 publications in reputed scholarly journals and books, and his research focuses on the applications of these disciplines in various industries. V. AJANTHA DEVI, PHD, is a distinguished researcher and holds the position of Research Head at AP3 Solutions, located in Chennai, Tamil Nadu, India. She earned her Ph.D. from the University of Madras in 2015, marking the inception of her impressive academic journey. She has over 45 papers published in prestigious international journals and conference proceedings, and she has authored, co-authored and edited numerous books. She holds five Australian patents and one Indian patent, and she has won numerous awards. ADITYA KUMAR GUPTA, PHD, is an associate professor at Amity University, Noida, India, with over 20 years of experience in both academia and industry. He is the editor of the Amity Case Research Journal, and he has been a reviewer for many scientific journals. Preface xvii1 EVOLUTION OF FINTECH IN FINANCIAL ERA 1Tanya Kumar and Satveer Kaur1.1 Introduction 11.2 Review of Literature 21.3 Objectives and Research Methodology 41.4 Working of FinTech 41.5 Tools and Techniques used in FinTech 51.6 Future Framework of FinTech 71.7 Evolution of FinTech in Financial World 71.8 Discussion and Conclusion 92 DIGITAL TRANSFORMATION OF FINANCIAL SERVICES IN THE ERA OF FINTECH 13Ayesha Siddiqui, Arti Yadav and Najib H.S. Farhan2.1 Introduction 132.2 Review of Literature 162.3 Digital Transformation: A Conceptual Overview 202.4 FinTech Ecosystem 212.5 Role of Fintech and Digital Transformation with Respect to Financial Services 242.6 Conclusion 273 RESHAPING BANKING WITH DIGITAL TECHNOLOGIES 35Ankita Srivastava and Aishwarya Kumar3.1 Banking and Artificial Intelligence (AI) 353.2 Fintech Evolution 383.3 AI Opportunities in Fintech 403.4 Reshaping the Banking 443.5 Insurance 523.6 Challenges Faced by Fintech in Banking 5353 3.7 Conclusion 544 ADOPTION OF FINTECH: A PARADIGM SHIFT AMONG MILLENNIALS AS A NEXT NORMAL BEHAVIOUR 59Pushpa A., Jaheer Mukthar K. P., Ramya U., Edwin Hernan Ramirez Asis and William Rene Dextre Martinez4.1 Introduction 604.2 Statement of the Problem and Research Questions 754.3 Research Questions and Objectives 764.4 Conceptual Framework and Proposed Model 774.5 Conclusion 835 A COMPREHENSIVE STUDY OF CRYPTOCURRENCIES AS A FINANCIAL ASSET: MAJOR TOPICS AND MARKET TRENDS 91Gioia Arnone and Ajantha Devi Vairamani5.1 Introduction 915.2 Literature Review 925.3 Methodology 955.4 Findings 965.5 Cryptocurrencies as a Major Financial Asset 975.6 What is the Value of Cryptocurrencies? Current Market Trends 985.7 Conclusion 1006 CUSTOMERS' SATISFACTION AND CONTINUANCE INTENTION TO ADOPT FINTECH SERVICES: DEVELOPING COUNTRIES' PERSPECTIVE 105Song Bee Lian and Liew Chee Yoong6.1 Introduction 1066.2 Understanding the Fintech Phenomenon in Developing Countries 1086.3 Literature Review 1096.4 Research Methodology 1156.5 Results 1206.7 Theoretical and Practical Implications 1266.8 Conclusion 1277 FINTECH APPS: AN INTEGRAL TOOL IN TITIVATING BANKING OPERATIONS 137Arun Prakash A., Leelavathi R., Rupashree R. and V.G. Jisha7.1 Introduction 1387.2 Objectives 1427.3 Statement of the Problem 1437.4 Need for the Study 1447.5 Review of Literature 1447.6 Proposed Model 1457.7 Lending APPS 1457.8 Investment Apps 1457.9 Payment Apps 1477.10 Insurance Apps 1487.11 Persuading Factors that Increase the Usage of Fin-Tech Apps 1497.12 Methodology 1507.13 Results and Discussions 1517.14 Multiple Linear Regression 1527.15 Structural Equation Modelling 1547.16 Conclusion 155 References 1558 ANALYTICAL STUDY OF FIN-TECH IN BANKING: A UTILITY MODEL 157Neha Kamboj and Mamta Sharma8.1 Introduction 1588.2 Literature Analysis and Development of Hypothesis 1608.3 Research Design 1638.4 Empirical Results 1658.5 Conclusion 1699 IS DIGITAL CURRENCY A PAYMENT DISRUPTION MECHANISM? 173Vanishree Mysore Ramkrishna and Vyshnavi Loganathan9.1 Introduction 1739.2 Review of Literature 1759.3 Methodology and Sampling 1779.4 Results and Discussion 1799.5 Acceptance of CBDC 1859.6 Conclusion 18810 INVESTOR SENTIMENT DRIVING CRYPTO-TRADE IN INDIA 193Sushant Waghmare and Dipesh Uike10.1 Introduction 19410.2 Review of Literature 19510.3 Research Methodology 20010.4 Data Analysis & Interpretation 20110.5 Conclusions, Suggestions & Recommendations 21411 APPLICATIONS OF DIGITAL TECHNOLOGIES AND ARTIFICIAL INTELLIGENCE IN CRYPTOCURRENCY - A MULTI-DIMENSIONAL PERSPECTIVE 221W. Jaisingh, Preethi N. and R. K. Kavitha11.1 Introduction 22211.2 State-of-the-Art Review 22311.3 Application Areas of Cryptocurrencies 22411.4 Financial Transaction Using Blockchain Technology 22911.5 An Analysis of Cryptocurrency Mining Using a Hybrid Approach 23411.6 Forecasting Cryptocurrency Price Using Convolutional Neural Networks 23711.7 Blockchain Technology and Cryptocurrencies for the Collaborative Economy 24011.8 Conclusions 24312 A STUDY ON THE INFLUENCE OF PERSONALITY ON SAVINGS AND INVESTMENT IN CRYPTOS 251K. Manimekalai, T. Satheeshkumar and G. Manokaran12.1 Introduction 25212.2 Literature Review 25312.3 Objectives of the Research 26012.4 Methodolgy 26012.5 Discussion 26813 DEEP NEURAL NETWORK IN SECURITY: A NOVEL ROBUST CAPTCHA MODEL 277Manasi Chhibber, Rashmi Gandhi, Aakanshi Gupta and Ashok Kumar Yadav13.1 Introduction 27713.2 Literature Review 27913.3 Proposed Approach 28313.3.1 Data Pre-Processing and Exploratory Analysis 28313.4 Results and Discussions 28913.5 Conclusion 30014 CUSTOMER'S PERCEPTION OF VOICE BOT ASSISTANCE IN THE BANKING INDUSTRY IN MALAYSIA 303Manimekalai Jambulingam, Indhumathi Sinnasamy and Magiswary Dorasamy14.1 Introduction 30314.2 Problem Statement 30414.3 What is a Voice Bot? 30514.4 Call to Action 31514.5 Literature Review 31614.6 Research Methodology 31714.7 Descriptive Analysis 31814.8 Discussion and Conclusion 32115 APPLICATION OF TECHNOLOGY ACCEPTANCE MODEL (TAM) IN FINTECH MOBILE APPLICATIONS FOR BANKING 325Tabitha Durai and F. Lallawmawmi15.1 Introduction 32615.2 Methods and Measures 33415.3 Results 33615.4 Discussion 34415.5 Conclusion 34616 UPSURGE OF ROBO ADVISORS: INTEGRATING CUSTOMER ACCEPTANCE 351C. Nagadeepa, Reenu Mohan, Antonio Peregrino Huaman Osorio and Willian Josue Fernandez Celestino16.1 Introduction 35116.2 Chatbots 35516.3 Robo-Advisor 35616.4 Acceptance of Robo-Advisor 37416.5 Conclusion 37917 SUPER APPS: THE NATURAL PROGRESSION IN FIN-TECH 383Kavitha D., Uma Maheswari B. and Sujatha R.17.1 Introduction 38317.2 Journey from an App to a Super App 38517.3 Super App vs. A Vertically Integrated App 38517.4 Architecture and Design of Super Apps 38617.5 Business Models of Super Apps 39017.6 The Super App Market Space and the Business Models 39117.7 Factors Contributing to the Success of Super Apps 39717.8 Super Apps in Fin-Tech and their Role in the Financial Services Segment 40017.9 Role of Super Apps in Financial Inclusion 40317.10 Benefits of Super Apps in the Financial Services Sector 40517.11 Risks due to Super Apps in the Financial System 40617.12 Regulatory Measures to Mitigate the Risks 40817.13 The Future of Super Apps 40817.14 Conclusion 410References 411Index 413