Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für KI und die Disruption der Arbeit

KI und die Disruption der Arbeit

Mittlerweile ist allen klar geworden: Künstliche Intelligenz wird die Arbeitswelt in Zukunft grundlegend verändern. Schon jetzt zeichnet sich ab, wozu diese Technologie in der Lage ist, aber das ist wohl nichts im Vergleich zu dem, was uns erwartet. Müssen wir Angst vor diesen Veränderungen haben oder dürfen wir sie begrüßen? Sind wir wirklich hilflos einer unaufhaltsamen Macht ausgeliefert? Nein, schließlich sind wir alle, die Expert:innen wie Konsument:innen, auch diejenigen, die diese Entwicklung entfesselt haben und deshalb für ihre Gestaltung mit verantwortlich sind. Dennoch gibt es eine große Unsicherheit und das allgegenwärtige Gefühl des Kontrollverlusts.Dieses Buch wird Ihnen helfen das zu bewerten, was Sie hören, sehen und befürchten. Was viel zu selten geschieht, leistet dieses Buch: Die Betrachtung der anstehenden Veränderungen wird auf eine solide Basis gestellt, die sich schon oft bewährt hat: Wenn wir uns ansehen, woher wir kommen, verstehen wir besser, wohin wir gehen, besser noch, wohin wir wollen sollten. Wenn man verantwortlich mitgestalten will, darf man nicht wie das Kaninchen vor der Schlange verharren, so faszinierend oder erschreckend das alles sein mag.Der Autor überträgt dieses Prinzip auf die Arbeitswelt. Er betrachtet mit Hilfe von Szenarien die Felder, auf denen die größten Umwälzungen zu erwarten sind, und zeigt, dass auch in der Vergangenheit schon oft große Brüche stattgefunden haben. Daraus kann man Schlüsse ziehen und lernen, was die heutigen Entwicklungen bedeuten, welche technischen, ökonomischen und sozialen Triebkräfte diese Innovationen in der Künstlichen Intelligenz und der Robotik vorantreiben. Das erlaubt dem Autor eine mögliche Arbeitswelt der Zukunft zu entwerfen, die eine Welt der gestaltenden und überwiegend überwachenden Tätigkeiten sein könnte. Dies ist nicht als Prognose zu verstehen, sondern als Ergebnis einer technikwissenschaftlich und philosophisch ausgelegten Analyse dessen, was wir mit unseren neuen technischen und organisatorischen Möglichkeiten wollen könnten. Und hier gibt es immer mehrere Alternativen.Um herauszufinden, was wir wollen, lohnt ein Blick auf die Bedeutung der bisherigen Arbeit als Teil unserer Biographie, als Sinn- und Identitätsstiftung, als soziale Teilhabe und nicht zuletzt als Quelle von Eigentum und Wohlstand. Und auch hier gibt es abhängig von Kulturen, geschichtlichen Prozessen und Wirtschaftstheorien völlig unterschiedliche Auffassungen, die Ihnen der Autor so vor Augen führt, dass sie selbst urteilen können.Wenn Sie das Buch gelesen haben, wird Ihnen manches an der derzeitigen Diskussion über die Auswirkungen von KI auf die Arbeitswelt übertrieben vorkommen. Sie werden jedoch besser verstehen, wo die Grenzen der KI liegen, wo unsere eigenen Grenzen liegen, die wir mit KI zu überwinden hoffen und nicht zuletzt, wo wir aus Verantwortung für künftige Generationen Grenzen setzen müssen.Autor:Klaus Kornwachs (geb.1947) studierte Physik, Mathematik und Philosophie. 1979-1992 Fraunhofer-Institut für Arbeitswirtschaft und Organisation, Stuttgart, zuletzt als Leiter der Abteilung für Qualifikationsforschung und Technikfolgenabschätzung, 1991 Forschungspreis der Alcatel SEL-Stiftung für Technische Kommunikation. 1992-2011 Lehrstuhl für Technikphilosophie an der BTU Cottbus. Mitglied der Deutschen Akademie der Technikwissenschaften (acatech), Gastprofessuren in Wien, Budapest, Stuttgart und Dalian (China). Prof. Kornwachs lehrt derzeit an der Universität Ulm, und ist seit 2013 Honorary Professor am Intelligent Urbanization Co-Creation Center der Tongji University, Shanghai. Herausgeber und Autor zahlreicher Fachbücher und Veröffentlichungen

Regulärer Preis: 29,99 €
Produktbild für Business Analysis und Requirements Engineering (3. Auflg.)

Business Analysis und Requirements Engineering (3. Auflg.)

Wir alle wollen schlanke, effektive Geschäftsprozesse und optimale IT-Unterstützung. Wir finden für jedes Problem eine Lösung – wenn wir uns nur genau darauf einigen könnten, was unser Problem ist.Das Verstehen von Problemen und das Formulieren von Anforderungen, was wir gerne anders hätten, ist das Thema dieses Buches.Viele verschiedene Begriffe werden dafür verwendet (Business Analysis, Systemanalyse, Requirements Engineering, ...) und viele Berufsbezeichnungen für die Beteiligten.Dieses Buch zeigt einen integrierten Ansatz zum Umgang mit Anforderungen. Es stellt Ihnen Methoden, Notationen und viele pragmatische Tipps (Best Practices) zur Verfügung, mit denen Anforderungen effektiv zwischen Auftraggebern und Auftragnehmern behandelt werden können – von Entdeckungstechniken über Dokumentationstechniken, Prüftechniken bis hin zu Verwaltungstechniken.Die 3. Auflage ist gemäß den überarbeiteten Lehrplänen der IREB (Certified Professional for Requirements Engineering) aktualisiert.Dr. Peter Hruschka ist einer der Prinzipale der Atlantic Systems Guild (www.systemsguild.com). Peter widmet sein Arbeitsleben dem Technologietransfer, insbesondere für große Hardware-/Software-Systeme. Er ist Mitbegründer von arc42 und req42 – der Heimat für pragmatische Softwarearchitektur und agiles Requirements-Engineering. Peter hat mehr als zehn Bücher und zahlreiche Artikel über Software- und System-Engineering veröffentlicht und unterrichtet und berät weltweit. Peter lebt in Aachen.

Regulärer Preis: 39,99 €
Produktbild für A Guide to UX Design and Development

A Guide to UX Design and Development

Gain a thorough understanding of the two pillars of any User Experience project: the mission and the process. The mission is to keep the user in mind at each step or milestone as the developer progresses through the project. The process is how that mission is accomplished through collaboration and the use of research, design and development technologies. This book walks you through a developer's journey through the UX process, from start to finish.A Guide to UX Design and Development concentrates on the intersection of what is called “DesignOps” and “DevOps.” That intersection is where collaboration between all members of the team, including stakeholders and clients, occurs and neither DesignOps nor DevOps can go beyond being considered just buzzwords if they instead silo design and development. To highlight the UX Mission and illustrate the responsibility developers also hold for the user experience, authors Tom Green and Joseph Labrecque take you through a hypothetical project involving the development of a parking app for a municipal parking authority. As the book progresses, they concentrate on the developer's journey through the whole project from discovery to product release. In this journey, you will see how developers can make an impact and contribute to the user experience.This will include such topics as why there is a need for both a user journey map and a technical journey map. The authors explain why prototyping is not as complicated as it is made out to be because it is simply an early low-cost and disposable minimal viable product that gives the developer a deep understanding of the project's intent in support of the UX Mission. You will also explore the creation and use of design systems and why the developer's role is just as important as the people who create the design system. The role and responsibility of the developer in user testing is discussed in the context of a variety of testing and assessment methods conducted to achieve the UX mission.Finally, you’ll gain an understanding of how design and development deliverables are negotiated, prepared and sent out for research at each step of the process, and how the developer is involved.WHAT YOU WILL LEARN* Understand the evolving role of the developer in a team-based environment* Learn the five stages of the UX process * Discover the importance of collaboration and communication with stakeholders, designers, and developers at every stage of the process* Learn a variety of design and development documents created during the UX processWHO THIS BOOK IS FORDevelopers and designers involved in the UX Process, as well as developers trying to make sense of the confusing amount of information out there regarding their role in the UX process.TOM GREEN is a retired Professor of Interactive Multimedia through the School of Media Studies and IT at the Humber Institute of Technology and Advanced Education in Toronto, Canada. He has created over a dozen UX-based courses for LinkedIn Learning. One course--UX Design for Non-Designers, released 2 years ago--has been completed by over 35,000 learners throughout the world. Tom has written numerous books on UX design software for, among others, Apress, Que, Pearson Education, friendsofED, and New Riders. Along with his work with LinkedIn Learning, Tom has developed video-based training courses for Infinite Skills, Envato, Video2Brain, and others. He was the Graphics Software expert with the former About.com and has written hundreds of articles and tutorials for a variety of magazines and websites over the past 20 years. He has spoken and lectured at more than 50 international conferences and over a dozen universities throughout China and the U.S., including the University of Wisconsin, the Central Academy of Fine Arts in Beijing, WuHan Institute of Technology, and Shenzhen Polytechnic. In his spare time, you can catch him hiking a local trail or paddling across a lake in Northern Ontario.JOSEPH LABRECQUE is a creative developer, designer, and educator with nearly two decades of experience creating expressive web, desktop, and mobile solutions. He joined the University of Colorado Boulder College of Media, Communication, and Information as faculty with the Department of Advertising, Public Relations and Media Design in Autumn 2019. His teaching focuses on creative software, digital workflows, user interaction, and design principles and concepts. Before joining the faculty at CU Boulder, he was associated with the University of Denver as adjunct faculty and as a senior interactive software engineer, user interface developer, and digital media designer.Labrecque has authored a number of books and video course publications on design and development technologies, tools, and concepts through publishers which include LinkedIn Learning, Apress, Peachpit, Packt, and Adobe. He has spoken at large design and technology conferences such as Adobe MAX and for a variety of smaller creative communities. He is also the founder of Fractured Vision Media, LLC, a digital media production studio and distribution vehicle for a variety of creative works.Joseph is an Adobe Education Leader, Adobe Community Expert, and member of Adobe Partners by Design. He holds a bachelor’s degree in communication from Worcester State University and a master’s degree in digital media studies from the University of Denver.CHAPTER 1: THE UX PROJECT PROCESSGOALS:· Developan understanding the User Experience Design is broken into two parts- Mission and Process- and where Mission and Process intersect is where collaboration occurs.· Develop an understanding the User Experience Design is broken into two parts- Mission and Process- and where Mission and Process intersect is where collaboration occurs.· Present a Five-Step process involved in The UX project Process.· Understand the deliverables and documentation required for each phase of the UX Process.SUB TOPIC* The UX Mission* Why UX projects fail* The Collaborative UX Process* A brief review of the UX ProcessUX Process Deep Dive * ConclusionCHAPTER 2: DEFINING THE PROBLEMGOALS:· Learn the importance of research to define the problem or the potential market and users.· Discover the role of the developer in the research process.· Learn research is a continuous process in an Agile workflow.· Understand the deliverables and documentation required for each phase of the UX Process.SUB TOPIC* Why research is important for developers* The research process is continuous* Research and systems impact* Artifacts and deliverables* The Developer’s role in the research phase* ConclusionCHAPTER 3: DETERMINING THE SCOPE AND MVPGOALS:· Learn How to think big start small· Discover the raison d'etre of your product· Learn and prioritize high impact high urgency features· Understand how feature creep sets into a product’s Ethos· Understand and build a feedback loop after launchSUB TOPIC* Why scaling our view matters* How to define your product purpose and reason to exist* Diagram the prioritization matrix* Mind the customer gap* Generate new ideas grounded in user behaviours* ConclusionCHAPTER 4: THE PROTOTYPING PROCESSGOALS:· Understand the purpose of a prototype and its many uses.· Present an overview of the various prototyping tools and processes.· Discover the role of the developer in the prototyping process.· Learn prototypes are both a deliverable and are disposable.SUB TOPIC* What is a prototype?* The prototyping tools* Prototyping and collaboration* User Testing the prototype.* ConclusionCHAPTER 5: A VISIT TO THE LIBRARY: DESIGN SYSTEMS/CODE LIBRARYGOALS:· Learn why a Design System is the “single source of truth.”· Learn what is contained in a Design System.· Discover the role of the developer in the construction of a design system.· Understand the importance of getting the support of the organization.SUB TOPIC* What is a Design System?* Create an inventory of the elements for the design system* Establish the key rules and principles* Building the team.Build the elements contained in the Design System * The Developer’s role in the development of the Pattern Library* ConclusionCHAPTER 6: UX DESIGNGOALS:· Provide the developer with an understanding of the role of UX Design in the UX process.· Understand the skills and habits of UX Designers.· Discover how to proactively work with a UX Designer.· Learn how User Testing is a continuing process in the UX Design process.SUB TOPIC* What is UX Design.* The UX Designer’s dance between data and design* UX Design is a team-based sport.* Artifacts and deliverables* User Testing is an iterative process.* Conclusion.CHAPTER 7: UI DESIGNGOALS:· Understand UI Design is both visual and interaction design.· Discover the collaborative role of the developer in the UI Design process.· Understand how visual hierarchy and UI patterns are determined and created.· Learn the variety of UI design documents created that lead to the final designSUB TOPIC* UI Design is a process that supports the UX Mission* Understanding Users and their needs.* Developing a visual hierarchy and UI patterns* Developing and testing UI elements* The visual element principles of UI DesignUI Design is a Team Sport. * Conclusion.CHAPTER 8: DEVELOPMENTGOALS:· Learn the importance of structuring data· Discover the interplay Designers and Developers riff product interaction ideas with every ideation· Understand software sketching in an agile workflow· Understand and chose your process flow wisely (Basic, Agile, Scrum, and CMMI)SUB TOPIC* Opportunity for discovery of new interactions with data structure understanding* Co creation of Interactions with designers and developers* Software sketching is digital doodling in agile process* Agile process flow on the road to Getting the right design and the design right* ConclusionCHAPTER 9: DEALING WITH USER TESTINGGOALS:· Learn why User Testing is important.· Learn how to set usability testing goals.· Discover the variety of User Testing approaches.· Understand how what should be tested and when is decided.SUB TOPIC* Why research and testing is important.* User Testing goals and metrics* Choosing a test and who will participate.* The scripted test* Card Sorting Test* A/B Testing* How to test Mobile and Web projects.* Conclusion.CHAPTER 10: HANDOFF TO THE DEVELOPERGOALS:· Learn what UI elements are handed off to the developer.· Discover the importance of the designer/developer relationship in the process.· Learn why properly preparing content for platforms accelerates the development process.· Understand the role of the prototype in an efficient development process.SUB TOPIC* Preparing for handoff.* All platforms are not created equally.* How the Design System and the UI elements come together* The front end and back end come together.* Consistent feedback and iteration are critical.* ConclusionCHAPTER 11: RELEASE INTO THE WILD AND BEYONDGOALS:· Learn the importance user feedback once product launches.· Sculpt Analytics to make invisible insights visible.· Learn that products initially ship “good enough”.· Understand the Roadmap to future featuresSUB TOPIC* Early Adopters will help our understanding of product pivot* Visualizing with data insights crystalizes blind spots* Be agnostic different methodologies optimize for different goals* Ecosystems and scaling future features* Conclusion

Regulärer Preis: 62,99 €
Produktbild für Pro Spring 6

Pro Spring 6

Master the Spring Framework, its fundamentals and core topics, and share the authors’ insights and real-world experiences. This book goes well beyond the basics: you'll learn how to leverage the latest Spring Framework 6 to build the various tiers and parts of today's modern, complex enterprise Java applications systems, top to bottom, including data access, SQL generation with jOOQ, persistence with Hibernate, transactions, set up security, classic web and presentation tiers and adding in some reactivity. Spring 6 will be based on the latest available Long Term Support (LTS) release, Java 17. So, you will be able to do the following in your Spring applications: use records, use new utility methods in String class; utilize Local-Variable Syntax for Lambda Parameters; Nested Based Access Control, and more. Integrating Spring with the most used frameworks and libraries is covered in this book, such as Testcontainers, Hibernate, jOOQ, Kafka and many others.A full sample application allows you to apply many of the technologies and techniques covered in Pro Spring 6 and see how they work together. This book updates the perennial bestseller with the latest that Spring Framework 6 has to offer. Now in its sixth edition, this popular title is by far the most comprehensive and definitive treatment of Spring available. After reading this book, you'll be armed with the power of Spring to build complex applications, top to bottom. The agile, lightweight, open-source Spring Framework continues to be the de facto leading enterprise Java application development framework for today's Java programmers and developers.WHAT YOU WILL LEARN* What’s new in Spring Framework 6 and how to use it with the latest LTS version of Java, Java 17* How to integrate Spring with the most renowned and practical frameworks and dependencies* How to build complex enterprise cloud-native applications using Spring 6* How to master data access, persistence and transactions* How to use with Spring Batch, Integration and other key Spring projectsTHIS BOOK IS FORExperienced Java and enterprise Java developers and programmers. Some experience with Spring highly recommended.IULIANA COSMINA is a Spring Certified Web Developer and is also Spring Certified Core Spring Professional. She is a Spring certified expert, as defined by Pivotal, the makers of Spring Framework, Boot and other tools. She has authored books with Apress on Core Spring certification and Spring Certified web development. She is a Lead Engineer at Cloudsoft, Edinburgh and is an active coder and software contributor on Apache Brooklyn, GitHub, StackOverflow and more.ROB HARROP is a software consultant specializing in delivering high-performance, highly-scalable enterprise applications. He is an experienced architect with a particular flair for understanding and solving complex design issues. With a thorough knowledge of both Java and .NET, Harrop has successfully deployed projects across both platforms. He also has extensive experience across a variety of sectors, retail and government in particular. Harrop is the author of five books, including Pro Spring, a widely-acclaimed, comprehensive resource on the Spring Framework.CHRIS SCHAEFER is a Principle Software Developer for Spring project at Pivotal, the makers of Spring Framework, Boot and other Spring tools.CLARENCE HO is the Senior Java Architect of a HK-based software consultancy firm, SkywideSoft Technology Limited. Having been worked in the IT field for over 20 years, Clarence had been the team leader of many in-house application development projects, as well as providing consultancy services on enterprise solutions to clients.Chapter 1: Introducing SpringChapter 2: Getting StartedChapter 3: Introducing IoC and DI in SpringChapter 4: Advanced Spring Configuration and Spring BootChapter 5: Spring AOPChapter 6: Spring JDBCChapter 7: Spring with HibernateChapter 8: Spring with JPAChapter 9: Spring Transaction ManagementChapter 10: Spring Data with SQL and NoSQL databasesChapter 11: Validation, Formatting and Type ConversionChapter 12: Task Scheduling - some new things might be needed here.Chapter 13: Spring RemotingChapter 14: Spring Native and Other GoodiesChapter 15: Spring MVCChapter 16: Spring REST SupportChapter 17: Securing Spring Web ApplicationsChapter 18: Monitoring Spring ApplicationsChapter 19: Spring WebSocket SupportChapter 20: Reactive Spring

Regulärer Preis: 64,99 €
Produktbild für The Cloud Leader's Handbook

The Cloud Leader's Handbook

This book is a comprehensive guide covering modern cloud strategies and leadership approaches for building and scaling organizations to maturity on their cloud adoption journey.The book starts by examining technical topics from the perspective of the cloud leader, who is responsible for cloud teams and accountable for cloud products and platforms within their organization. Through a series of practical insights and real-world examples, you will gain a deep understanding of the key considerations for leading a cloud-driven organization.These considerations include understanding the benefits of digital transformation, managing global tech teams, and delivering excellence through platform ownership. Towards the end of the book, you will explore the latest trends and best practices for strategically innovating and scaling your organization in the cloud.With the knowledge gained from this book, you will be able to harness the power of the cloud to drive business success and gain valuable insights and practical strategies to support and empower the adoption of modern cloud platforms and technologies for your clients and organization.The Cloud Leader's Handbook is a must-read for any Cloud Leader who wants to stay ahead of the curve and achieve success in the rapidly evolving world of cloud computing.WHAT WILL YOU LEARN* Develop a strong foundation in the technical aspects of cloud leadership* Understand the benefits of digital transformation and how to lead a cloud-driven organization, including managing global tech teams.* Discover the bleeding-edge cloud trends that are influencing organizational roadmaps* Transition into the role of the modern Cloud Leader by gaining a deeper perspective around what it means to own, manage, administer, govern, and optimize the modern cloud platform* Learn how to effectively envision, manage, and deploy modern cloud transformation projects through successful approaches around innovation, strategy, and excellenceWHO THIS BOOK IS FORExperienced IT professionals and business leaders looking to understand the power of the cloud.RON C. L'ESTEVE is an accomplished author, technology leader, and digital innovation strategist based in Illinois, USA. He is renowned for his impactful books and award-winning articles on Data & AI Architecture and Engineering. With deep technical skills and extensive experience leading modern Cloud Data & AI initiatives for a multitude of global clients, Ron possesses a wealth of knowledge and expertise in his field.As a trusted advisor with several Cloud certifications, Ron has played a pivotal role in some of the most significant and impactful Cloud implementations globally. He has held senior leadership positions at multiple global organizations and has been instrumental in scaling key cloud architectures, defining technology and business intelligence roadmap and strategy, and challenging customers to grow by deeply understanding the fluid business opportunities.Ron has enabled change by translating complex challenges into high-quality and sustainable technical solutions that promote digital innovation and transformation. His insights and strategic thinking have helped clients achieve their goals and realize their potential. Ron's commitment to excellence and innovation is reflected in his track record of delivering high-impact solutions that drive real-world outcomes and impact.Part I: Leadership Essentials.- 1. The Art of Cloud Leadership.- 2. Influencing Change and Driving Cloud Adoption.- 3. Managing Teams in the Digital Age.- 4. Supporting Employee Health & Turnover.- Part II: Innovation Strategies.- 5. Adopting a Cloud Platform.- 6. Democratizing Data & Democratizing Analytics.- 7. Applying DevOps.- 8. New Horizons in Distributed Cloud Computing.- 9. Impacts of Modern AI and ML Trends.- Part III: Platform Ownership.- 10. Owning a Portfolio of Agile Cloud Products.- 11.Designing a Secure Data Lake.- 12. Administering and Auditing the Cloud.- 13. Collaborating with Cloud Vendors and Providers.- Part IV: Delivery Excellence.- 14. Creating a Technology Delivery Roadmap.- 15. Cloud Transformation Roles and Responsibilities.- 16. Delivering Strategic Cloud Innovation and Excellence.- 17. Managing Agile Cloud Projects.- 18. Achieving Digital Transformation Success.

Regulärer Preis: 46,99 €
Produktbild für Handbook of Computational Sciences

Handbook of Computational Sciences

THE HANDBOOK OF COMPUTATIONAL SCIENCES IS A COMPREHENSIVE COLLECTION OF RESEARCH CHAPTERS THAT BRINGS TOGETHER THE LATEST ADVANCES AND TRENDS IN COMPUTATIONAL SCIENCES AND ADDRESSES THE INTERDISCIPLINARY NATURE OF COMPUTATIONAL SCIENCES, WHICHREQUIRE EXPERTISE FROM MULTIPLE DISCIPLINES TO SOLVE COMPLEX PROBLEMS.This edited volume covers a broad range of topics, including computational physics, chemistry, biology, engineering, finance, and social sciences. Each chapter provides an in-depth discussion of the state-of-the-art techniques and methodologies used in the respective field. The book also highlights the challenges and opportunities for future research in these areas. The volume pertains to applications in the areas of imaging, medical imaging, wireless and WS networks, IoT with applied areas, big data for various applicable solutions, etc. This text delves deeply into the core subject and then broadens to encompass the interlinking, interdisciplinary, and cross-disciplinary sections of other relevant areas. Those areas include applied, simulation, modeling, real-time, research applications, and more. AUDIENCEBecause of the book’s multidisciplinary approach, it will be of value to many researchers and engineers in different fields including computational biologists, computational chemists, and physicists, as well as those in life sciences, neuroscience, mathematics, and software engineering. AHMED A. ELNGAR, PHD, is the founder and head of Scientific Innovation Research Group (SIRG) and assistant professor of Computer Science at the Faculty of Computers and Information, Beni-Suef University, Egypt. VIGNESHWAR. M., is head of R & D and Academic Initiatives, Cybase Technologies, Coimbatore, Tamil Nadu, India. He has around 9 years in industry & research and 8 years in academia. He has an M.E., degree in computer science and engineering, and has published more than 110 international/national conference and journal publications as well as numerous awards. KRISHNA KANT SINGH, PHD, is an associate professor in the Faculty of Engineering & Technology, Jain (Deemed-to-be University), Bengaluru, India. Dr. Singh has acquired BTech, MTech, and PhD (IIT Roorkee) in the area of machine learning and remote sensing. He has authored more than 50 technical books and research papers in international conferences and SCIE journals. ZDZISLAW POLKOWSKI, PHD, is a professor in the Faculty of Technical Sciences, Jan Wyzykowski University, Polkowice, Poland. He has published more than 75 research articles in peer-reviewed journals.

Regulärer Preis: 190,99 €
Produktbild für Innovative Engineering with AI Applications

Innovative Engineering with AI Applications

INNOVATIVE ENGINEERING WITH AI APPLICATIONSINNOVATIVE ENGINEERING WITH AI APPLICATIONS DEMONSTRATES HOW WE CAN INNOVATE IN DIFFERENT ENGINEERING DOMAINS AS WELL AS HOW TO MAKE MOST BUSINESS PROBLEMS SIMPLER BY APPLYING AI TO THEM.Engineering advancements combined with artificial intelligence (AI), have resulted in a hyper-connected society in which smart devices are not only used to exchange data but also have increased capabilities. These devices are becoming more context-aware and smarter by the day. This timely book shows how organizations, who want to innovate and adapt, can enter new markets using expertise in various emerging technologies (e.g. data, AI, system architecture, blockchain), and can build technology-based business models, a culture of innovation, and high-performing networks. The book specifies an approach that anyone can use to better architect, design, and more effectively build things that are technically novel, useful, and valuable, and to do so efficiently, on-time, and repeatable. AUDIENCEThe book is essential to AI product developers, business leaders in all industries and organizational domains. Researchers, academicians, and students in the AI field will also benefit from reading this book. ANAMIKA AHIRWAR, PHD, is an associate professor at the Compucom Institute of Information Technology & Management, Jaipur, India. She has about 20 years of experience in teaching and research and has published more than 45 research papers in reputed national/international journals and conferences, authored several books as well as five patents. PIYUSH KUMAR SHUKLA, PHD, is an associate professor in the Department of Computer Science & Engineering, University Institute of Technology, Bhopal, India. He has about 15 years of experience in teaching and research, is the author of 3 books, more than 50 articles and book chapters in international publications, as well as 15 Indian patents. MANISH SHRIVASTAVA, PHD, is the Principal of the Chameli Devi Institute of Technology & Management, Indore, India. He has published more than 100 articles in international journals and spent 7 years as a software engineer. PRITI MAHESHWARY, PHD, is a professor in the Department of CSE and Head of the Centre for Excellence in Internet of Things and Advance Computing Lab, Rabindranath Tagore University, Bhopal, India. BHUPESH GOUR, PHD, is a professor in the Department of Computer Science and Engineering at Lakshmi Narain College of Technology in Bhopal, India. He has 22 years of experience in academia as well as the software industry. He has published more than 50 articles in national and international journals, as well as four patents.

Regulärer Preis: 190,99 €
Produktbild für Pro T-SQL 2022

Pro T-SQL 2022

Learn how to write and design simple and efficient T-SQL code. This is a hands-on book that teaches you how to write better T-SQL with examples and straightforward explanations. New in this edition is coverage of Parameter Sensitive Plan (PSP) optimization, Azure Synapse Link for real-time analytics, integration with S3-compatible object storage, and SQL Ledger tables based on blockchain. You’ll learn to improve your T-SQL design in ways that provide faster performance, stronger security, and easier comprehension. The book identifies common anti-patterns in writing T-SQL and instructs you on how to change your code so you can be more confident in writing T-SQL code that is reliable and performs well.Pro T-SQL 2022 is focused on the problems that developers are faced with and must solve in delivering successful applications. The content begins from a foundation of writing T-SQL that is clear and understandable. The book then takes you through writing SQL that performs well, is easy to manage through coding standards and version control, can be maintained and modified as business requirements change over time, scales as your business grows, and takes advantage of the full range of security features built into the SQL Server and Azure SQL database engines.WHAT YOU WILL LEARN* Choose the correct data types and database objects when designing your T-SQL* Write T-SQL that accesses your data efficiently and uses hardware effectively* Implement source control and testing methods to streamline your deployment process.* Design T-SQL that is flexible and can be enhanced or modified with little effort* Plan for long-term data management, including growth and purging of older data* Enhance database security through features such as encryption, data masking, row-level security, and the SQL Ledger blockchain table typeWHO THIS BOOK IS FORDatabase developers who want to improve the efficiency of their applications with better T-SQL; developers who want to know more about T-SQL so they can be prepared to solve complex problems more easily; data professionals who want to write high-quality T-SQL that performs well, is flexible to changing needs, and is easy for others to understandELIZABETH NOBLE is a Microsoft Data Platform MVP and Director of Database Development in the metro Atlanta area. When ze was introduced to hir first database over 10 years ago, ze found the career ze wanted to pursue. Hir passion is to help others improve the quality and speed of deploying database changes through automation. When ze is not trying to automate database development, ze can be found spending time with zir dogs, painting, paddle boarding, or throwing axes. IntroductionPART I. BUILDING UNDERSTANDABLE T-SQL1. Data Types2. Database Objects3. Standardizing T-SQL4. Designing T-SQLPART II. BUILDING PERFORMANT T-SQL5. Set-Based Design6. Hardware Usage7. Execution Plans8. Optimize T-SQLPART III. BUILDING MANAGEABLE T-SQL9. Coding Standards10. Source Control11. Testing12. DeploymentPART IV. BUILDING MAINTAINABLE T-SQL13. Functional Design14. Logging15. EnhancementPART V. BUILDING SCALABLE T-SQL16. Managing Data Growth17. Managing Data Long TermPART VI. BUILDING SECURE T-SQL18. Implementing Security Features19. Implementing Encryption

Regulärer Preis: 79,99 €
Produktbild für Technology Assessment of Dual-Use ICTs

Technology Assessment of Dual-Use ICTs

Information and Communication Technologies (ICTs) are important to human, national, and even international security. IT research, artifacts, and knowledge that can be applied in military and civilian contexts, used as part of weapon systems, or cause significant harm are referred to as dual-use. Advances in artificial intelligence (AI), robotics, cybersecurity, and open source intelligence (OSINT) raise questions about their dual-use risks. But how can dual-use of such disparate technologies be assessed? Case studies are still lacking on how to assess dual-use ICT and how to enable sensitive and responsible dual-use design. To address the research gap, this cumulative dissertation uses Technology Assessment (TA) as an epistemological framework to bring together approaches of Critical Security Studies (CSS) as well as Value Sensitive Design (VSD) from the field of Human-Computer Interaction (HCI). As a result, the dissertation systematizes the dual-use risks and scenarios of the selected ICTs and derives organizational and design implications.ABOUT THE AUTHOR:THEA RIEBE is a post-doctoral researcher at the Chair of Science and Technology for Peace and Security (PEASEC) in the Department of Computer Science at the TU Darmstadt. She did her interdisciplinary PhD on technology assessment of dual-use technologies in computer science, combining approaches from critical security research, and human-computer interaction. Introduction.- Theoretical Background and Related Work.- Research Design.- Results.- Discussion.- Conclusion.- Measuring Spillover Effects from Defense to Civilian Sectors: A Quantitative Approach Using LinkedIn.- Dual-Use and Trustworthy? A Mixed Methods Analysis of AI Diffusion between Civilian and Defense R&D.- Meaningful Human Control of LAWS: The CCW-Debate and its Implications for Value-Sensitive Design.- U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance.- Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response.- Computer Emergency Response Teams and the German Cyber Defense: An Analysis of CERTs on Federal and State Level.- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey.- CySecAlert: An Alert Generation System for Cyber Security Events Using Open Source Intelligence Data.- Bibliography.

Regulärer Preis: 106,99 €
Produktbild für Domain Storytelling

Domain Storytelling

Fachliche Anforderungen in der Softwareentwicklung: Verstehen und verstanden werden- fachliche motivierte Grenzen in Domänen finden, um Software und Teams danach zu organisieren- Anforderungen aus Domain Stories ableiten- Domain Storytelling mit Event Storming, User Story Mapping und anderen Methoden der agilen Softwareentwicklung kombinierenGeschichtenerzählen ist tief in der menschlichen Kommunikation verankert – das gilt auch im Zeitalter der Software. "Fachliche Geschichten" zu erzählen und zu visualisieren macht Geschäftsprozesse und Fachwissen greifbar.Dieses Buch zeigt, wie Sie mit einfachen Mitteln fachlich stimmige Anwendungssoftware entwickeln können. Domain Storytelling hilft, das Fachwissen aus den Köpfen der Anwender*innen in die Köpfe von Entwickler*innen, Product Owners, Produktmanagement und Business Analysts zu transportieren. Es bringt die Beteiligten in Workshops zusammen, um sich über Aufgaben und Prozesse im Unternehmen abzustimmen. Das Ergebnis wird in einer einfachen Bildsprache dokumentiert.Die Autoren erläutern an verständlichen Beispielen, wie Domain Storys entstehen und wie man Domain Storytelling für Domain-Driven Design, die Anforderungsermittlung und weitere Zwecke einsetzen kann.Stefan Hofer hat in Österreich Software Engineering studiert und einen Doktortitel in Informatik an der Universität Hamburg erworben. Seit 2005 arbeitet er für die WPS – Workplace Solutions GmbH. Requirements Enginee-ring und Domain-Driven Design bilden seine Themenschwerpunkte. Stefan ist auf Mastodon (@hofstef@social.wps.de), Twitter (@hofstef) und per E-Mail (stefan@domainstorytelling.org) erreichbar. Henning Schwentner beschäftigt sich mit Computern, seit er Anfang der 90er-Jahre einen Amiga 500 zum Geburtstag bekam. Er hatte das Glück, diese Leidenschaft zum Beruf zu machen, und arbeitet als Coder, Coach und Consultant bei WPS – Workplace Solutions. Er hilft Teams dabei, Struk-tur in ihre bestehende Software zu bringen oder neue Systeme mit einer nachhaltigen Architektur von Grund auf aufzubauen. Henning ist der Au-tor von Domain-Driven Transformation und LeasingNinja.io, der Übersetzer von Domain-Driven Design kompakt und Mitorganisator des ComoCamps. Er schreibt im Fediverse als @hschwentner@social.wps.de, twittert als @hschwentner und liest E-Mails, die an henning@domainstorytelling.org ge-richtet sind. Henning ist stolzer Vater von sechs Kindern in einer ganz be-sonderen Patchwork-Situation.

Regulärer Preis: 34,90 €
Produktbild für Praxishandbuch Terraform

Praxishandbuch Terraform

Erprobtes Praxiswissen für die Infrastruktur-Provisionierung mit Terraform- International bekanntes Standardwerk in der 3. Auflage - von Mitchell Hashimoto, dem Entwickler von Terraform und Mitbegründer von HashiCorp empfohlen- Vermittelt über grundlegende Funktionen hinaus Patterns und Best Practices; inklusive Hilfestellungen zum Testen, zur Wiederverwendbarkeit von Code oder zu Team-Workflows.- Niedrigschwelliges Ausprobieren der Codebeispiele durch Open-Source-Beispiele auf GitHub und AWS umfangreiches Trial-Angebot.Terraform hat sich in der DevOps-Welt zu einem Schlüsselwerkzeug entwickelt. Es ermöglicht Mitarbeiter:innen in DevOps, Administration und Entwicklung, IT-Infrastruktur mithilfe von Code und Skripten für eine Vielzahl von Cloud- und Virtualisierungsplattformen wie AWS, Google Cloud Plattform, Azure u.v.a. zu definieren, bereitzustellen und zu managen.Die Übersetzung der dritten Auflage zeigt Ihnen den schnellstmöglichen Einstieg, um mit Terraform loszulegen. Yevgeniy (Jim) Brikman, Mitbegründer von Gruntwork, demonstriert anhand von aussagekräftigen Codebeispielen, wie Sie mit der einfachen, deklarativen Programmiersprache von Terraform das Bereitstellen und das Managen von IT-Infrastruktur mit nur wenigen Befehlen umsetzen. Mit diesem Praxishandbuch eignen sich erfahrene Sysadmins, DevOps Engineers, aber auch Entwickler:innen belastbare Terraform-Grundlagen an. Sie werden in kurzer Zeit den Betrieb eines vollständigen IT-Stacks – auch bei massivem Datenaufkommen oder für ein großes Entwicklerteam – erfolgreich bewältigen.Yevgeniy (Jim) Brikman ist Mitbegründer der Firma Gruntwork, das sich das Ziel gesetzt hat, die Erstellung von Software zehnmal einfacher zu machen. Er ist mehrfacher Autor und war als Software-Engineer bei LinkedIn, TripAdvisor, Cisco und Thomson Financial tätig. Weitere Informationen finden Sie unter ybrikman.com.

Regulärer Preis: 44,90 €
Produktbild für Optimierungsmethoden

Optimierungsmethoden

Das Buch gibt eine breite Übersicht über die wichtigsten Optimierungsmethoden, wobei die Verfahren beispielhaft erläutert und mit über 400 Abbildungen illustriert werden. Im ersten Teil des Buches werden verschiedene Klassen von Optimierungsproblemen vorgestellt. Gegenstand des zweiten Teils sind klassische Methoden zur Lösung von Optimierungsproblemen. Im dritten Teil werden naturanaloge Optimierungsmethoden behandelt, darunter physikbasierende Algorithmen, evolutionäre Algorithmen, schwarmintelligente Methoden sowie Optimierungsverfahren, die durch das Immunsystem inspiriert sind. Der letzte Teil des Buches befasst sich mit der Optimierung neuronaler Netze und gibt eine Einführung in ein neues vielversprechendes Forschungsgebiet der KI-basierten, selbstlernenden Optimierungsalgorithmen. PROF. DR. RALF HOLLSTEIN lehrte an der Universität Paderborn und bis zu seiner Emeritierung an der TH Bingen im Bereich Mathematik und Computational Intelligence. Klassen von Optimierungsproblemen - Klassische Optimierungsmethoden - Naturanaloge Optimierungen - Optimierung von neuronalen Netzen - Neuronale kombinatorische Optimierung

Regulärer Preis: 46,99 €
Produktbild für Digital Transformation and Public Policies

Digital Transformation and Public Policies

The extent of digitalization and the use of digital tools no longer need to be demonstrated. While companies have been integrating the challenges of such a transformation for more than 20 years, the public sector is lagging behind.Digital Transformation and Public Policies studies the mechanisms of the digital transformation of public organizations. It explores how this new deal, driven mainly by platforms, resonates with new public policies and how digital technology is redrawing the relationship between the governors and the governed.This book, the result of transdisciplinary collaboration between researchers, aims to answer these questions by focusing on several cases: public innovation policies, health data and social policies with fiscal microsimulation devices. Valérie Revest is Professor of Economics at the Université Jean Moulin Lyon 3, iaelyon School of Management – Magellan, France. Her research focuses on the financing of innovation, digital platforms and the transformation of public innovation policies.Isabelle Liotard is a lecturer in economics at the Université Sorbonne Paris Nord – CEPN, France. Her research focuses on the digital economy, innovation and the effects of digital transformation on companies and the public sector.

Regulärer Preis: 142,99 €
Produktbild für Cybercrime During the SARS-CoV-2 Pandemic

Cybercrime During the SARS-CoV-2 Pandemic

The SARS-CoV-2 pandemic has had an undeniable impact on cybercrime. The initial crisis quickly became a global catastrophe with multiple consequences in economics, health, and political and social fields. This book explores how this global emergency has influenced cybercrime. Indeed, since feeding off new vulnerabilities, thanks to the effects of the pandemic crisis in various states around the world, cybercrime has increased and evolved.In 2020, the world was already dealing with numerous tensions and the effects of the global crisis have therefore only tended to exacerbate the issues that relate to cybercrime. For example, radicalization and identity theft has found an environment in which they thrive: the Internet. Criminals have been able to adapt their modus operandi, their targets and their attack vectors. However, on the plus side, the response of law enforcement and public authorities, in terms of the legal, policing and policy side of cybercrime, has also been adapted in order to better combat the increase in this phenomenon. Daniel Ventre has a PhD in Political Science and conducts his research at the CESDIP laboratory, CNRS, Université Paris Saclay, France. His work focuses on cybersecurity and cyberdefense policies.Hugo Loiseau has a PhD in Political Science and is a professor at l’École de politique appliquée at the Université de Sherbrooke, Canada. His research focuses on the political and international issues involving cybersecurity.

Regulärer Preis: 142,99 €
Produktbild für Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion

Google Cloud Platform (GCP) Professional Cloud Network Engineer Certification Companion

While many guides exist to help software engineers learn cloud networking design and architecture concepts, and even prepare for cloud network certifications on AWS and Azure, far fewer resources are available covering the Google Cloud Platform (GCP) Professional Cloud Network Engineer certification exam. Well, look no further! This self-paced guide book is designed to help engineers learn cloud networking best practices on GCP, and prepare for the GCP Professional Cloud Network Engineer certification exam.You will waste no time when you use this study companion. It lets you dive in and learn how GCP differs from other public cloud providers (AWS and Microsoft Azure). You will understand GCP's unique ability to allow virtual private clouds (VPCs) that span across multiple regions. You will know how to leverage GCP as a competitive advantage in the IT engineering community. Key concepts covered on the exam are called out and applied in each chapter of this book, giving you both practice and reinforcement, a far more effective learning tool than rote learning or similar approaches typically enlisted in exam preparation.Enterprises are looking for developers with Google networking skills. Now is the time to skill up! This book shows you how to leverage GCP’s developer-focused, user-friendly approach to understand how the networking components enabling the popular 1B-user Google products (e.g., Gmail, Google Search, YouTube, Google Workspace (formerly G-Suite), Google Maps, Google Photos, and many others) work behind the scenes.WHAT YOU WILL LEARNIn addition to preparing for the GCP Professional Cloud Network Engineer certification exam, you will learn how to:* Architect and design a virtual private cloud* Implement a virtual private cloud* Configure network services* Implement hybrid connectivity* Implement network security* Manage network operations* Optimize network resourcesWHO THIS BOOK IS FORSoftware engineers (network, DevOps, SecOps, DataOps, engineers skilled with SDLC), software architects (solution, security, data, infrastructure, cloud, those skilled with TOGAF), and IT professionals. Prerequisites: While this study companion is intended to be self-contained, a basic knowledge of cloud computing along with hands-on experience with a minimum of two modern programming languages (Java, C#) is beneficial in order for readers to fully achieve the objectives of the book.DARIO CABIANCA is a computer scientist (PhD, University of Milan), author, and Cloud Architect. He has worked with a variety of global enterprises for more than two decades and possesses more than 11 cloud certifications. He used his own fail-proof techniques to prepare and pass GCP, Azure, and AWS exams. He is excited to share his knowledge to help readers of his study companion book prepare for the GCP Professional Cloud Network Engineer certification exam, and also come away equipped with the necessary tools and knowledge to be confident and successful on the job.1. Exam Overview1.1. Exam Subject Areas1.2. Exam Format1.3. Supplemental Study Materials1.4. Sign up for a Free Tier1.5. Register for the Exam1.5.1. Schedule the Exam1.5.2. Rescheduling and Cancellation Policy1.5.3. Exam Results1.5.4. Retake Policy1.6. Summary2. Designing, planning, and prototyping a Google Cloud network2.1. Designing an overall network architecture2.1.1. High availability, failover, and disaster recovery strategies2.1.2. DNS strategy (e.g., on-premises, Cloud DNS)2.1.3. Security and data exfiltration requirements2.1.4. Load balancing2.1.5. Applying quotas per project and per VPC2.1.6. Hybrid connectivity (e.g., Google private access for hybrid connectivity)2.1.7. Container networking2.1.8. SaaS, PaaS, and IaaS services2.2. Designing Virtual Private Cloud (VPC) instances2.2.1. VPC Specifications2.2.2. Subnets2.2.3. IP address management and brin your own IP (BYOIP)2.2.4. Standalone vs. Shared VPC2.2.5. Multiple vs. single2.2.6. Regional vs. multi-regional2.2.7. VPC Network Peering2.2.8. Firewalls (e.g., service account-based, tag-based)2.2.9. Custom routes2.3. Designing a hybrid and multi-cloud network2.3.1. Drivers for Hybrid and Multi-cloud strategy2.3.2. Overall goals2.3.3. Designing a Hybrid and Multi-cloud strategy2.3.4. Dedicated Interconnect vs. Partner Interconnect2.3.5. Direct vs. Carrier Peering2.3.6. IPsec VPN2.3.7. Bandwidth and constraints provided by hybrid connectivity solutions2.3.8. Cloud Router2.3.9. Multi-cloud and Hybrid topologies2.3.10. Regional vs. global VPC routing mode2.3.11. Failover and Disaster Recovery strategy2.3.12. Accessing Google Services/APIs privately from on-premises locations2.3.13. IP address management across on-premises locations and cloud2.4. Designing an IP addressing plan for Google Kubernetes Engine2.4.1. GKE VPC-native clusters2.4.2. Optimizing GKE IP ranges2.4.3. Expanding GKE IP ranges2.4.4. Public and private cluster nodes2.4.5. Control plane public vs. private endpoints2.5. Summary2.6. Exam questions3. Implementing Virtual Private Cloud (VPC) instances3.1. Configuring VPC resources3.1.1. Creating VPCs3.1.2. Creating subnets3.1.3. Listing subnets3.1.4. Listing VPCs3.1.5. Deleting VPCs3.2. Configuring VPC Network Peering3.3. Creating a Shared VPC network and sharing subnets with other projects3.3.1. Host and service project concepts3.3.2. Shared VPC deep dive3.3.3. Assigning roles to principals3.3.4. Creating the shared VPC3.3.5. Creating the service projects3.3.6. Enabling Compute API for service and host projects3.3.7. Enabling host project3.3.8. Attaching service projects3.3.9. Assigning individual subnet-level roles to service projects3.4. Using a Shared VPC3.4.1. Listing usable subnets3.4.2. Creating VMs3.4.3. Verifying VMs connectivity3.4.4. Deleting VMs3.5. Sharing subnets using folders3.6. Configuring API access to Google services (e.g., Private Google Access, public interfaces)3.6.1. Configuring Private Google Access (PGA)3.6.2. Configuring Private Service Connect (PSC)3.7. Expanding VPC subnet ranges after creation3.8. Configuring routing3.8.1. Static vs. dynamic routing3.8.2. Global vs. regional dynamic routing3.8.3. Routing policies using tags and priority3.8.4. Internal load balancer as a next hop3.8.5. Custom route import/export over VPC Network Peering3.9. Configuring and maintaining Google Kubernetes Engine clusters. Considerations include:3.9.1. VPC-native clusters using alias IPs3.9.2. Clusters with Shared VPC3.9.3. Creating Cluster Network Policies3.9.4. Private clusters and private control plane endpoints3.9.5. Adding authorized networks for cluster control plane endpoints3.10. Configuring and managing firewall rules. Considerations include:3.10.1. Target network tags and service accounts3.10.2. Rule priority3.10.3. Protocols and Ports3.10.4. Direction3.10.5. Firewall rule logs3.10.6. Summary4. Implementing VPC Service Controls4.1. Creating and configuring access levels and service perimeters4.2. Service perimeter deep dive4.3. VPC accessible services4.4. Perimeter bridges4.5. Audit logging4.6. Dry run mode4.7. Dry-run perimeter deep dive4.8. Exam questions5. Configuring load balancing5.1. Google Cloud load balancers family5.2. Backend services and network endpoint groups (NEGs)5.3. Firewall rules to allow traffic and health checks to backend services5.4. Health checks for backend services and target instance groups5.5. Configuring backends and backend services with balancing method (e.g., RPS, CPU, Custom), session affinity, and capacity scaling/scaler5.6. TCP and SSL proxy load balancers5.7. Load balancers (e.g., External TCP/UDP Network Load Balancing, Internal TCP/UDP Load Balancing, External HTTP(S) Load Balancing, Internal HTTP(S) Load Balancing)5.8. Protocol forwarding5.9. Accommodating workload increases using autoscaling vs. manual scaling5.10. Configuring Google Cloud Armor policies. Considerations include:5.11. Security policies5.12. Web application firewall (WAF) rules (e.g., SQL injection, cross-site scripting, remote file inclusion)5.13. Attaching security policies to load balancer backends5.14. Configuring Cloud CDN. Considerations include:5.15. Enabling and disabling5.16. Cloud CDN5.17. Cache keys5.18. Invalidating cached objects5.19. Signed URLs5.20. Custom origins6. Configuring advanced networking services6.1. Configuring and maintaining Cloud DNS6.1.1. Managing zones and records6.1.2. Migrating to Cloud DNS6.1.3. DNS Security Extensions (DNSSEC)6.1.4. Forwarding and DNS server policies6.1.5. Integrating on-premises DNS with Google Cloud6.1.6. Split-horizon DNS6.1.7. DNS peering6.1.8. Private DNS logging6.2. Configuring Cloud NAT6.2.1. Addressing6.2.2. Port allocations6.2.3. Customizing timeouts6.2.4. Logging and monitoring6.2.5. Restrictions per organization policy constraints6.3. Configuring network packet inspection6.3.1. Packet Mirroring in single and multi-VPC topologies6.3.2. Capturing relevant traffic using Packet Mirroring source and traffic filters6.3.3. Routing and inspecting inter-VPC traffic using multi-NIC VMs (e.g., next-generation firewall appliances)6.3.4. Configuring an internal load balancer as a next hop for highly available multi-NIC VM routing7. Implementing hybrid interconnectivity7.1. Configuring Cloud Interconnect7.1.1. Dedicated Interconnect connections and VLAN attachments7.1.2. Partner Interconnect connections and VLAN attachments7.2. Configuring a site-to-site IPsec VPN7.2.1. High availability VPN (dynamic routing)7.2.2. Classic VPN (e.g., route-based routing, policy-based routing)7.3. Configuring Cloud Router7.3.1. Border Gateway Protocol (BGP) attributes (e.g., ASN, route priority/MED, link-local addresses)7.3.2. Custom route advertisements via BGP7.3.3. Deploying reliable and redundant Cloud Routers8. Managing network operations8.1. Logging and monitoring with Google Cloud’s operations suite8.1.1. Reviewing logs for networking components (e.g., VPN, Cloud Router, VPC Service Controls)8.2. Monitoring networking components (e.g., VPN, Cloud Interconnect connections and interconnect attachments, Cloud Router, load balancers, Google Cloud Armor, Cloud NAT)8.3. Managing and maintaining security8.4. Firewalls (e.g., cloud-based, private)8.5. Diagnosing and resolving IAM issues (e.g., Shared VPC, security/network admin)8.6. Maintaining and troubleshooting connectivity issues8.6.1. Draining and redirecting traffic flows with HTTP(S) Load Balancing8.6.2. Monitoring ingress and egress traffic using VPC Flow Logs8.6.3. Monitoring firewall logs and Firewall Insights8.6.4. Managing and troubleshooting VPNs8.6.5. Troubleshooting Cloud Router BGP peering issues8.7. Monitoring, maintaining, and troubleshooting latency and traffic flow8.8. Testing network throughput and latency8.9. Diagnosing routing issues8.10. Using Network Intelligence Center to visualize topology, test connectivity, and monitor performance

Regulärer Preis: 79,99 €
Produktbild für Enhancing Adobe Acrobat Forms with JavaScript

Enhancing Adobe Acrobat Forms with JavaScript

Take your PDF forms to the next level! In this book, you’ll learn various ways to further improve your PDF forms using simple JavaScript coding. You’ll also discover how a few lines of code can speed up your workflow when working with multiple PDFs in Action Wizard.Enhancing Adobe Acrobat Forms with JavaScript covers up-to-date, real working examples that you can easily download and practice with and edit to suit your own projects. This book also shows workarounds and solutions to various form issues you might encounter. Feel empowered by it and improve your PDF documents!JavaScript has been a part of Adobe Acrobat for many versions. However, few people use its features and focus mainly on using basic form properties, never delving deeper into Acrobat’s full capabilities. While information on the web can be helpful, if you don’t know enough about how to use JavaScript in Acrobat you will be left with poor results. JavaScript can be difficult to learn, but it does not need to be scary. This book explains in simple steps for beginner to intermediate level so that you can take full advantage of Acrobat’s capabilities for your own projects.WHAT YOU WILL LEARN• Learn simplified field notation and basic JavaScript for Acrobat• Work with buttons that can be used for navigation• Improve form navigation and printing of forms• Add various types of alerts and custom validations to improve client-entered-data• Learn the basics of how to prepare a form for e-signingWHO IS THIS BOOK FORThis book is for anyone who needs to create forms for clients or websites. Students, lawyers, accountants, and human resources will be able to take their work to the next level by streamlining their workflow and utilizing advanced JavaScript features in Adobe Acrobat.Jennifer Harder has worked in the graphic design industry for over fifteen years. She has a degree in graphic communications and is currently teaching Acrobat, and Adobe Creative Cloud courses at Langara College. She is also author of several Apress books and related videos.Part 1: Basic Form ImprovementsChapter 1: A Fundamental Forms PrimerSub -Topics:• Forms Review• Fields Refresher• Properties Refreshero Text Box Field Properties and New Date Field Propertieso Dropdown Propertieso List Box Propertieso Check Box Propertieso Radio Button Propertieso Button Properties and Image Propertieso Digital Signature Propertieso Barcode Properties• Tab Properties Refresher• Setting Field Tab Order using the menu options• Clearing a Form while workingChapter 2: Introduction to ActionsSub – Topics:• Getting Started• Rating Forms Value Averaging and Sum: Working with Text Fieldso The Validate Tab• Page 2 of Project: The Calculate Tab for the Grand Total Using Sum• Sum and Averaging Using Check Boxes or Radio Buttons with Text Fieldso Using Radio Buttons on Page 3 of the Projecto Using Check Boxes on Page 3 of the Projecto Learning how check boxes can become radio buttons• Basic Action Button Triggers for Reset Buttons and Printing Buttonso Reset Buttono Print Form ButtonChapter 3: Creating a QR Code Custom StampSub - Topics:• Customizing Your QR Code Stamp• QR Code Creation• Using the Stamp Tool• Final Thoughts: QR Code for Professional PrintingChapter 4: Buttons, Navigation, Form and Non-Form ActionsSub - Topics:• Creating a Button Icono Example of a Button as a Label Only• Non-Form Properties Actionso Pageso Bookmarkso Web Hyperlinkso Rich Media Non-Form Navigation Buttonso Layers Basic Actionso Other Non-Form Actions• Triggers for Actions• Choose an Action That Requires No Code• Newsletter Navigation with Buttons• Form Navigation with a Button as Helpful Hint• Adding a Comb of Characters• Before Comb and After Comb• More Action Triggers to Show and Hideo Hide and Clear Fields Button• Set Layer Visibilityo Using Bookmarkso Using ButtonsPart 2: Simplified Field Notation and Basic JavaScriptChapter 5: Introduction to Simplified Field Notation and JavaScriptSub - Topics:• Getting Started• Text Field, Date, and Dropdown Menu Propertieso Action Tabo Format Tabo Validate Tabo Calculate Tabo Check Box, Radio Button, Image Field, and Button Propertieso List Box Propertieso Digital Signature Propertieso Barcode Propertieso Global Document JavaScripto Web Links and Referenceso Regular Forms vs. E-Sign Forms• JavaScript and Acrobat on the Document LevelChapter 6: Basic and Complex CalculationsSub - Topics:• Getting Started• Sum Value• Simplified Field Notation• JavaScript Custom Calculation Script• Resetting Your Field of Focus• Final Thoughtso The Final Line of Code (Setting the 0 value to blank)o Dropdown AlternativesChapter 7: Format CalculationsSub - Topics:• Number Formatting• Formatting with a Percentageo A Workaround for the Percentage• Date Formatting• Time Formatting• Final Thoughtso Dropdown AlternativesChapter 8: Various JavaScript Alerts, Notes and Time StampsSub - Topics:• Alert Types• Create a Document JavaScript• Viewer Version and Validation Alert• Document Actionso Document Will Closeo Document Will Print• Alerts Working with Buttons• Adding a Comment Note, Signature, and Time StampChapter 9: Create Help for Clients with Rollover Text and AlertsSub - Topics:• The Rollover Methodo Mouse Entero Mouse Exito Extra Non-Custom JavaScript Check Box Exampleo How to Show, Hide Fields with JavaScript• The Default Text Method• The Alert Methodo Customer’s Full Nameo Dateo Customer Order Codeo Customer’s Company Name• How to Duplicate Text for multiple fields and make fields read only with JavaScript• Final ThoughtsChapter 10: Various Types of Formatting with JavaScriptSub - Topics:• Adding Global Formatting to Text Fields• Color Properties• Multi-Line Buttons• Multi-Line Text• Complex Formatting Using Check Boxes and Text Fields• Rich Text Formatting for Text Fields and Comments• Silent Printing• Options for Submit Button using email• Final ThoughtsPart 3: Working with More Complex FormsChapter 11: Validation with Text Boxes, Alerts and Radio ButtonsSub - Topics:• Money Transfer Example• Changing the Shipping Price Using Radio Buttons• Additional Checkbox and Radio Button examples with JavaScript and Text Fields and how to change data.• Text Field Validation with Regular Expressionso Telephone Validationo Name Validationo Account Number Validationo Email and URL Validationo Another Phone and Date Example with Two Variables• Final ThoughtsChapter 12: Working with Dropdown MenusSub - Topics:• Current Skills Request Form• Parts Order Form• Final Thoughtso Load a Lengthy Single Dropdown or List MenuChapter 13: Working with List BoxesSub - Topics:• List Box Priority List with Control Buttonso The Add Buttono The Delete Buttono The Clear or Reset Buttono The Up Buttono The Down Button• Check Box, Dropdown, and List Box Example 1• Check Box, List Box, and Multi-Dropdown Example 2• Button Slide Show Variationo Extra Example Priority List Improved• Final Thoughtso Hidden Fieldso Using List Boxes for Number RatingChapter 14: Advanced Navigation: The Popup MenuSub – Topics:• The Popup Menu Example• Final ThoughtsPart 4: Beyond the BasicsChapter 15: Action Wizard and JavaScriptSub – Topics:• Working with Action Wizardo Reuse JavaScript from Chapter 8• Is It a Custom Action or a Custom Command?o Create and Manage Custom CommandsChapter 16: Multi-State Check BoxesSub - Topics:• The Problem of Multi-State Check Boxes• Bonus Star Rating Idea• Select All or Deselect All Check Boxes at OnceChapter 17: Importing an Image into a ButtonSub - Topics:• Creating the ButtonChapter 18: Multiple FormattingSub - Topics:• The Problem of Multiple Formatting• Option 1: Do It Yourselfo Price Scripto No Price Scripto Adding a Degree Symbol and Formatting range• Option 2: Call a ProfessionalChapter 19: Digital Signatures and BarcodesSub - Topics:• Digital Signatures and Security• BarcodesChapter 20: What are E-Signature Forms and Web Forms?Sub - Topics:• A brief Look at E- Signatures and Resources• What are Web Forms, do they have JavaScript? and related ResourcesPart 5: Putting It into PracticeChapter 21: Homework AssignmentsSub - Topics:• Homework Assignment 1: Show and Hide• Homework Assignment 2: Working with JavaScript to Create Formulaso Area of a Circle (A = π r 2 )o Field: CircumferenceRow1 Circumference of a Circle (C = 2 π r )o Field: VolumeRow1 Volume of a Sphere (V = 4/3 π r3 )o Field: FahrenheitRow1 Celsius to Fahrenheit to Formula. (°C x 9/5) + 32 = °F.o Field: CelsiusRow1_2 Fahrenheit to Celsius Formula. (°F - 32) x 5/9 = °C• Homework Assignment 3: Custom Validation and Regular Expressions• Homework Assignment 4: Personal Dropdown Menu and Definitions Text Box

Regulärer Preis: 66,99 €
Produktbild für Introduction to Prescriptive AI

Introduction to Prescriptive AI

Gain a working knowledge of prescriptive AI, its history, and its current and future trends. This book will help you evaluate different AI-driven predictive analytics techniques and help you incorporate decision intelligence into your business workflow through real-world examples.The book kicks off with an introduction to decision intelligence and provides insight into prescriptive AI and how it can be woven into various business strategies and frameworks. You'll then be introduced to different decision intelligence methodologies and how to implement them, along with advantages and limitations of each. Digging deeper, the authors then walk you through how to perform simulations and interpret the results. A full chapter is devoted to embedding decision intelligence processes and outcomes into your business workflow using various applications. The book concludes by exploring different cognitive biases humans are prone to, and how those biases can be eliminated by combining machine and human intelligence.Upon completing this book, you will understand prescriptive AI, tools, and techniques and will be ready to incorporate them into your business workflow.WHAT YOU WILL LEARN* Implement full-fledged decision intelligence applications using Python* Leverage the tools, techniques, and methodologies for prescriptive AI* Understand how prescriptive AI can be used in different domains through practical examples* Interpret results and integrate them into your decision makingWHO THIS BOOK IS FORData Scientists and Machine Learning Engineers, as well as business professionals who want to understand how AI-driven decision intelligence can help grow their business.AKSHAY R. KULKARNI is an artificial intelligence (AI) and machine learning (ML) evangelist and a thought leader. He has consulted several Fortune 500 and global enterprises to drive AI and data science–led strategic transformations. He is a Google developer, an author, and a regular speaker at major AI and data science conferences (including the O’Reilly Strata Data & AI Conference and Great International Developer Summit (GIDS)) . He is a visiting faculty member at some of the top graduate institutes in India. In 2019, he was featured as one of India’s “top 40 under 40” data scientists. In his spare time, Akshay enjoys reading, writing, coding, and helping aspiring data scientists. He lives in Bangalore with his family.ADARSHA SHIVANANDA is a data science and MLOps leader. He is working on creating world-class MLOps capabilities to ensure continuous value delivery from AI. He aims to build a pool of exceptional data scientists within and outside organizations to solve problems through training programs. He always wants to stay ahead of the curve. Adarsha has worked extensively in the pharma, healthcare, CPG, retail, and marketing domains. He lives in Bangalore and loves to read and teach data science.AVINASH MANURE is a seasoned Machine Learning Professional with 10+ years of experience building, deploying, and maintaining state-of-the-art machine learning solutions across different industries. He has 6+ years of experience leading and mentoring high-performance teams in developing ML systems catering to different business requirements. He is proficient in deploying complex machine learning and statistical modeling algorithms/techniques for identifying patterns and extracting valuable insights for key stakeholders and organizational leadership.Chapter 1: Decision Intelligence Overview.- Chapter 2: Decision Intelligence Requirements.- Chapter 3: Decision Intelligence Methodologies.- Chapter 4: Interpreting Results from Different Methodologies.- Chapter 5: Augmenting Decision Intelligence Results into the Business Workflow.- Chapter 6: Actions, Biases and Human-in-the-Loop.- Chapter 7: Case Studies.

Regulärer Preis: 46,99 €
Produktbild für Angewandte Data Science

Angewandte Data Science

Die Anwendungen der Disziplin Data Science erweitern und wandeln sich stetig. In diesem Buch geben Insider aus Praxis, Wissenschaft und Lehre detailliert die Ergebnisse ihrer Data-Science-Projekte, Methodenwissen sowie Knowhow zu Vorgehensweisen und Prozessmodellen an den Leser weiter. Dabei wird ein weit gespannter Querschnitt an konkreten Anwendungen beschrieben, erklärt und illustriert: von der Nutzung generativer KI-Systeme über quantitative Textanalyse, Predictive Policing, Erklärbarkeit von Machine-Learning-Modellen, experimentelle Datenanalyse in der Spektroskopie bis hin zu Datenvisualisierung, Strukturgleichungsmodellen und Varianzanalyse.Das Buch richtet sich an jeden, der sowohl am konkreten Einsatz von Datenwissenschaft, Statistik, Maschinellem Lernen und Künstlicher Intelligenz als auch am zugehörigen theoretischen Hintergrund interessiert ist. Praktikern, Studierenden und Lehrenden dürfte es von besonderem Nutzen sein: eine Vielzahl an Abbildungen, Diagrammen und Illustrationen ergänzen die reichhaltigen Textinformationen; Links zu Webseiten und Webapplikationen verweisen auf online verfügbare weitere Informationsquellen und Data-Science-Werkzeuge.LOTHAR B. BLUM lehrt als Hochschuldozent interaktives Informationsdesign, Datenvisualisierung und Advanced Analytics. Er ist Principal UX Designer beim Cloudsoftwareunternehmen Infor sowie Co-Founder und Organisator der Data Science Darmstadt Meetups.Einflüsse der Corona-Pandemie auf die deutsche Presse-Sprache.- Predictive Policing.- Am Anfang war der Prompt.- Erklärbarkeit als Schlüssel für den verantwortungsvollen Umgang mit KI. - Strukturgleichungsmodelle versus Varianzanalyse.- Was ist schon normal in diesen Zeiten? - Sankey-Diagramm reloaded.- Jenseits der Algorithmen.- A Scalable Architecture for Smart Genomic Data Analysis in Medical Laboratories.- Die Sieben V der Daten.– Scope Creep, GUI, Skalierung.

Regulärer Preis: 29,99 €
Produktbild für Pro Cryptography and Cryptanalysis with C++23

Pro Cryptography and Cryptanalysis with C++23

Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption. You'll also examine internal cryptographic mechanisms and discover common ways in which the algorithms can be implemented and used correctly in practice.The authors explain the mathematical basis of cryptographic algorithms in terms that a programmer can easily understand. They also show how “bad” cryptography can creep in during implementation and what “good” cryptography should look like by comparing advantages and disadvantages based on processing time, execution time, and reliability.WHAT YOU WILL LEARN* Discover what modern cryptographic algorithms and methods are used for * Design and implement advanced cryptographic mechanisms * See how C++23 and its new features are impact the implementation of cryptographic algorithms* Practice the basics of public key cryptography, including ECDSA signatures and more* See how most of the algorithms can be brokenWHO THIS BOOK IS FORProfessional programmers, developers, and software engineers who are developing cryptography algorithms and security schemes/modules in C++. Prior C++ programming and IDE experience and some basic experience of cryptography concepts (symmetric and asymmetric) highly recommended.MARIUS IULIAN MIHAILESCU, PHD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.STEFANIA LOREDANA NITA, PHD is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.Part I: Foundations1: Introduction2: Cryptography Fundamentals3: Mathematical Background and Its Applicability4: Large Integer Arithmetic5: Floating Point Arithmetic6: New Features in C++237: Secure Coding Guidelines8: Cryptography Libraries in C/C++23Part II: Pro Cryptography9: Elliptic Curve Cryptography10: Lattice-based Cryptography11: earchable Encryption12: Homomorphic Encryption13: (Ring) Learning with Errors Cryptography14: Chaos-based Cryptography15: Big Data Cryptography16:Cloud Computing CryptographyPart III: Pro Cryptanalysis17: Getting Started with Cryptanalysis18: Cryptanalysis Attacks and Techniques19: Linear and Differential Cryptanalysis20: Integral Cryptanalysis21: Brute Force and Buffer Overflow Attacks22: Text Characterization23: Implementation and Practical Approach of Cryptanalysis Methods

Regulärer Preis: 66,99 €
Produktbild für How to Catch a Phish

How to Catch a Phish

Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments.Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change.Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely.This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity.YOU WILL LEARN HOW TO:* Safely save email messages as attachments for analysis* Identify what information is in an email header* Review header information and extract key indicators or patterns used for detection* Identify signs of a suspicious or malicious email message* Detect the tactics that attackers use in phishing emails* Safely examine email links and attachments* Use a variety of free and simple tools to analyze email messagesWHO THIS BOOK IS FORCybersecurity professionals and interested computer security enthusiasts currently holding or aspiring to obtain positions such as IT Security Analyst, Network Defender, Security Operations Center Analyst, or Help Desk Technician. Readers should have a general understanding of how email works and some ways that attackers use this platform for initial access.Nick Oles is a cybersecurity expert with over 15 years of operational experience in military, industry, and academic environments. He has worked on incident response and threat hunting teams and consulted with Fortune 150 organizations, small businesses, and US Department of Defense entities. Nick has served his country for over a decade in the cyber and special operations communities, earning multiple military accolades, completing worldwide deployments, and serving in joint special operations environments. He has advised award-winning academic centers on cyber-program development and management, as well as created and taught academic and certification courses on a variety of cybersecurity topics. Nick has detected, analyzed, and responded to thousands of security incidents over his career. He continues to actively contribute to the cybersecurity community and teach students at all skill levels while still serving his country.CHAPTER 1. HOW EMAIL WORKS1.1 Understanding Email Architecture1.2 Basic Components of an email message1.2.1 Email Header1.2.2 Email ContentCHAPTER 2. PHISHING TACTICS AND TECHNIQUES2.1 How phishers get you to click2.1.1 Elicitation and enticement2.1.2 Key indicators of suspicious messagesCHAPTER 3. PICERL PROCESS EXPLAINED3.1 Preparation3.2 Identification3.3 Containment3.4 Eradication3.5 Remediation3.6 Lessons LearnedCHAPTER 4. ANALYZING MESSAGE CONTENTCHAPTER 5. EMBEDDED LINK ANALYSIS5.1 Process safely extract and find links5.2 Tools to submit links for analysisCHAPTER 6. ATTACHMENT ANALYSIS6.1 How to handle attachments6.2 Tools used to analyze attachmentsCHAPTER 7. LOG SEARCHING AND RESPONSE7.1 Key logs records to search7.2 Response verbiage and communicationCHAPTER 8. MITIGATION AND LESSONS LEARNED

Regulärer Preis: 26,99 €
Produktbild für The Active Defender

The Active Defender

IMMERSE YOURSELF IN THE OFFENSIVE SECURITY MINDSET TO BETTER DEFEND AGAINST ATTACKSIn The Active Defender: Immersion in the Offensive Security Mindset, Senior Information Security Forensic Analyst Dr. Catherine J. Ullman delivers an expert treatment of the Active Defender approach to information security. In the book, you’ll learn to understand and embrace the knowledge you can gain from the offensive security community. You’ll become familiar with the hacker mindset, which allows you to gain emergent insight into how attackers operate and better grasp the nature of the risks and threats in your environment. The author immerses you in the hacker mindset and the offensive security culture to better prepare you to defend against threats of all kinds. You’ll also find:* Explanations of what an Active Defender is and how that differs from traditional defense models* Reasons why thinking like a hacker makes you a better defender* Ways to begin your journey as an Active Defender and leverage the hacker mindsetAn insightful and original book representing a new and effective approach to cybersecurity, The Active Defender will be of significant benefit to information security professionals, system administrators, network administrators, and other tech professionals with an interest or stake in their organization’s information security. CATHERINE J. ULLMAN is a security researcher, speaker, and Principal Technology Architect, Security at the University at Buffalo. She is a DFIR specialist and expert in incident management, intrusion detection, investigative services, and personnel case resolution. She offers security awareness training in an academic setting and is a well-known presenter at information security conferences, including DEF CON and Blue Team Con.

Regulärer Preis: 19,99 €
Produktbild für Künstliche Intelligenz und Data Science in Theorie und Praxis

Künstliche Intelligenz und Data Science in Theorie und Praxis

Dieser Sammelband verbindet theoretische Grundlagen und praktische Anwendungen von Künstlicher Intelligenz (KI) und Data Science: Anerkannte Experten stellen in ihren Beiträgen den aktuellen Stand in Forschung und Wirtschaft dar – und bieten so einen einzigartigen Überblick über aktuelle Konzepte und ihre Umsetzung in Unternehmen.Im ersten Teil des Buchs werden die Methoden und Algorithmen skizziert, die sich größtenteils aus einer Kombination von Statistik und Informatik ergeben und auf Verfahren des Maschinellen Lernens bis hin zu Deep Learning und KI basieren. Im zweiten Teil wird die konzeptionelle Umsetzung in der Praxis skizziert: Hier wird insbesondere aufgezeigt, welche Herausforderungen in der Praxis auftreten – ob nun bei der Einbettung der Daten-Use-Cases in eine Gesamtstrategie oder bei der Produktivsetzung, Weiterentwicklung und dem Betrieb von Daten-basierten Lösungen. Der dritte Teil zeigt das breite Potpourri von Data Science in der Praxis: Branchengrößenwie Allianz, ADAC, BMW, Deutsche Bahn, Lufthansa, REWE, RTL, St. Galler Stadtwerke, SwissRe und viele weitere zeigen konkret, welche Erfahrungen sie bei ihren Projekten gesammelt haben. Fachartikel von über 20 namhaften Unternehmen decken die spezifischen Anforderungen ihrer jeweiligen Branchen ab.Das Buch möchte die interdisziplinäre Diskussion und Kooperation zwischen Wissenschaft und Wirtschaft fördern und richtet sich daher an verschiedene Lesergruppen:* Studierende und Absolventen, die Orientierung für die eigene Laufbahn suchen.* Forschende und Lehrende, die einen Einblick in praxisrelevante Einsatzgebiete erhalten möchten.* Anwender, Praktiker und Entscheider, die sich über Chancen und Herausforderungen von KI in der Praxis informieren möchten.ANDREAS GILLHUBER ist Co-CEO bei der Alexander Thamm GmbH, einer führenden Beratung für Data Science, KI und ML im deutschsprachigen Raum.GÖRAN KAUERMANN ist Universitätsprofessor an der Ludwigs-Maximilians-Universität München und hat dort den Elite-Studiengang Data Science eingerichtet.WOLFGANG HAUNER ist als Leiter Group Data Analytics der Allianz SE global verantwortlich für Daten- und Analytics-Lösungen für die Allianz Unternehmensgruppe.Vorwort.- Grundlagen von Data Science.- Data Science in der Praxis.- Beispiele aus der Praxis-Ausblick/Wohin geht die Reise.

Regulärer Preis: 42,99 €
Produktbild für Data Wrangling

Data Wrangling

DATA WRANGLINGWRITTEN AND EDITED BY SOME OF THE WORLD’S TOP EXPERTS IN THE FIELD, THIS EXCITING NEW VOLUME PROVIDES STATE-OF-THE-ART RESEARCH AND LATEST TECHNOLOGICAL BREAKTHROUGHS IN DATA WRANGLING, ITS THEORETICAL CONCEPTS, PRACTICAL APPLICATIONS, AND TOOLS FOR SOLVING EVERYDAY PROBLEMS.Data wrangling is the process of cleaning and unifying messy and complex data sets for easy access and analysis. This process typically includes manually converting and mapping data from one raw form into another format to allow for more convenient consumption and organization of the data. Data wrangling is increasingly ubiquitous at today’s top firms. Data cleaning focuses on removing inaccurate data from your data set whereas data wrangling focuses on transforming the data’s format, typically by converting “raw” data into another format more suitable for use. Data wrangling is a necessary component of any business. Data wrangling solutions are specifically designed and architected to handle diverse, complex data at any scale, including many applications, such as Datameer, Infogix, Paxata, Talend, Tamr, TMMData, and Trifacta. This book synthesizes the processes of data wrangling into a comprehensive overview, with a strong focus on recent and rapidly evolving agile analytic processes in data-driven enterprises, for businesses and other enterprises to use to find solutions for their everyday problems and practical applications. Whether for the veteran engineer, scientist, or other industry professional, this book is a must have for any library. M. NIRANJANAMURTHY, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He earned his PhD in computer science at JJTU, Rajasthan, India. He has over 11 years of teaching experience and two years of industry experience as a software engineer. He has published several books, and he is working on numerous books for Scrivener Publishing. He has published over 60 papers for scholarly journals and conferences, and he is working as a reviewer in 22 scientific journals. He also has numerous awards to his credit. Kavita Sheoran, PhD, is an associate professor in the Computer Science Department, MSIT, Delhi, and she earned her PhD in computer science from Gautam Buddha University, Greater Noida. With over 17 years of teaching experience, she has published various papers in reputed journals and has published two books. GEETIKA DHAND, PhD, is an associate professor in the Department of Computer Science and Engineering at Maharaja Surajmal Institute of Technology. After earning her PhD in computer science from Manav Rachna International Institute of Research and Studies, Faridabad, she has taught for over 17 years. She has published one book and a number of papers in technical journals. PRABHJOT KAUR has over 19 years of teaching experience and has earned two PhDs for her work in two different research areas. She has authored two books and more than 40 research papers in reputed journals and conferences. She also has one patent to her credit.

Regulärer Preis: 168,99 €
Produktbild für Predicting the Unknown

Predicting the Unknown

As a society, we’re in a constant struggle to control uncertainty and predict the unknown. Quite often, we think of scientific fields and theories as being separate from each other. But a more careful investigation can uncover the common thread that ties many of those together. From ChatGPT, to Amazon’s Alexa, to Apple’s Siri, data science, and computer science have become part of our lives. In the meantime, the demand for data scientists has grown, as the field has been increasingly called the “sexiest profession.”This book attempts to specifically cover this gap in literature between data science, machine learning and artificial intelligence (AI). How was uncertainty approached historically, and how has it evolved since? What schools of thought exist in philosophy, mathematics, and engineering, and what role did they play in the development of data science? It uses the history of data science as a stepping stone to explain what the future might hold.Predicting the Unknown provides the framework that will help you understand where AI is headed, and how to best prepare for the world that’s coming in the next few years, both as a society and within a business. It is not technical and avoids equations or technical explanations, yet is written for the intellectually curious reader, and the technical expert interested in the historical details that can help contextualize how we got here.WHAT YOU’LL LEARN* Explore the bigger picture of data science and see how to best anticipate future changes in that field* Understand machine learning, AI, and data science* Examine data science and AI through engaging historical and human-centric narratives WHO IS THIS BOOK FORBusiness leaders and technology enthusiasts who are trying to understand how to think about data science and AIDr. Stylianos (Stelios) Kampakis is a data scientist, data science educator and blockchain expert with more than 10 years of experience. He has worked with decision makers from companies of all sizes: from startups to organizations like the US Navy, Vodafone ad British Land. His work expands multiple sectors including fintech (fraud detection and valuation models), sports analytics, health-tech, general AI, medical statistics, predictive maintenance and others. He has worked with many different types of technologies, from statistical models, to deep learning to blockchain and he has two patents pending to his name. He has also helped many people follow a career in data science and technology.He is a member of the Royal Statistical Society, honorary research fellow at the UCL Centre for Blockchain Technologies, a data science advisor for London Business School, and CEO of The Tesseract Academy and tokenomics auditor at Hacken. As a well-known data-science educator, he has published two books, both of them getting 5 stars on Amazon. His personal website gets more than 10k visitors per month, and he is also a data science influencer on LinkedIn.PREFACEAuthor’s note to the curious readerPROLOGUECHAPTER ONE – WHERE ARE WE NOW? A BRIEF HISTORY OF UNCERTAINTYNot all uncertainty is created equalCHAPTER TWO - TRUTH, LOGIC AND THE PROBLEM OF INDUCTIONThe first black swanCHAPTER THREE - SWANS AND SPACE INVADERSOccam’s razor, space invaders and lizard peopleCHAPTER FOUR - PROBABILITY: TO BAYES, OR NOT TO BAYES?Frequentist or Bayesian?The formulation of Bayes’ theoremAfter LaplaceCHAPTER FIVE - WHAT’S MATHS GOT TO DO WITH IT? THE POWER OF PROBABILITY DISTRIBUTIONSOther Distribution ModelsIssues with this view of uncertaintyBounds and limitsCHAPTER SIX - ALTERNATIVE IDEAS: FUZZY LOGIC AND INFORMATION THEORYInformation Theory – Measuring UncertaintyCHAPTER SEVEN – STATISTICS: THE OLDEST KID ON THE BLOCKDescriptive vs Inferential StatisticsHypothesis Testing: Significant or Not?What the p?Statistical modelling: A useful abstractionCHAPTER EIGHT - MACHINE LEARNING: INSIDE THE BLACK BOXData Science and History of Machine LearningChoose Your Learning Type: Supervised, Unsupervised, Reinforcement, or Other?The Bias-Variance Trade-OffMachine Learning vs Statistics: Why the ‘Dumb’ Approach WorksMachine Learning ShortcomingsCHAPTER NINE - CAUSALITY: UNDERSTANDING THE ‘WHY’How to Approach Causality?Causality in our MindCHAPTER TEN - FORECASTING, AND PREDICTING THE FUTURE: THE FOX AND THE TRUMPA brief history of forecastingForecasting in practice: Newton and the madness of men, Trump, Brexit, and losing money through mathematical modellingHow to do forecasting: A story of foxes and hedgehogsCHAPTER ELEVEN - THE LIMITS OF PREDICTION (PART A): A FUTILE PURSUIT?Learning theory: what can we know about what we don’t know?Monte Carlo Simulations: What Does a Casino Have to do with Science?CHAPTER TWELVE - THE LIMITS OF PREDICTION (PART B): GAME THEORY, AGENT-BASED MODELLING AND COMPLEXITY (ACTIONS AND REACTIONS)Agent-based Modelling: Crafting artificial WorldsComplexity Theory: Simulation vs the Limits of PredictionStudying Complexity is a Complex EndeavourLearning from Complexity: The Limits of Computation are the Limits of UncertaintyCHAPTER THIRTEEN - UNCERTAINTY IN US: HOW THE HUMAN MIND HANDLES UNCERTAINTYUncertainty and our MindUncertainty and our BrainCHAPTER FOURTEEN - BLOCKCHAIN: UNCERTAINTY IN TRANSACTIONSThe Internet of TrustHow Blockchain WorksFrom Crypto-Anarchism to Drug Trafficking: The unconventional Beginnings of an interesting TechnologyI Can’t Trust you, but I Can Trust the BlockchainCHAPTER FIFTEEN - ECONOMIES OF PREDICTION: A NEW INDUSTRIAL REVOLUTIONUncertainty brokersIndustries of incomplete InformationPrediction Industries and AutomationThe global Economy against UncertaintyEPILOGUE: THE CERTAINTY OF UNCERTAINTY

Regulärer Preis: 62,99 €