Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Choose Your InfoSec Path

Choose Your InfoSec Path

Cybersecurity is a pressing issue across industries, as well as increasingly important in people’s personal lives. Learning the basic fundamentals is essential in order for companies and individuals to thrive. Although much of the literature around this hot-button topic can seem impenetrable and convoluted to a new learner, Choose Your InfoSec Path is an informative, fun, interactive cybersecurity adventure that has been written specifically with beginners in mind.Step into the shoes of a Chief Information Security Officer (CISO) and find out what could possibly go wrong during a breach. Author Alexander J. Roxon weaves together essential InfoSec concepts with an exciting and fast-paced storyline to make the lessons relatable and easy to understand. Determine what steps your character takes next and affect the outcome of your path. Will you emerge from the breach unscathed? With over 50 different endings, you can explore the what-ifs and experience a new path each time. A supporting glossary makes this book a resource you can return to long after your story is completed.Crucially, the integrity of the cybersecurity concepts is maintained and all events are genuinely plausible from a technical perspective. The book includes commentary to examine key concepts and reflect on decisions. This book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. Learn some of the basics of incident response, how to dampen the effects of a breach, and get the jump on the bad guys. Your journey starts now.WHAT YOU’LL LEARN* Understand some of the basic concepts of incident response.* Experience how a real-life incident can go from zero to chaos very rapidly.* Find out how being proactive can significantly improve how information security breaches play out.* Discover how to dampen the effects of a breach.WHO THIS BOOK IS FORThis book is for those who are interested in understanding what cybersecurity is about but without a high technical barrier of entry. People who like to laugh as well as learn.Alexander J. Roxon likes to take complicated subjects and problems, then make them simpler and less intimidating. Alex works for the Cyber Defense team within Accenture, helping companies implement appropriate cyber security solutions and strategies. In his spare time, he likes to contribute to the industry with things like phishing awareness blogs full of fish puns, or a deck of playing cards designed to teach people about cyber security (The Infosec Deck). Inspired by the Give Yourself Goosebumps series, he decided to write his own interactive story in an effort to make information security more accessible. He is a Systems Security Certified Professional (SSCP) and Factor Analysis Information Risk (FAIR) accredited.

Regulärer Preis: 62,99 €
Produktbild für Integrating D3.js with React

Integrating D3.js with React

Integrate D3.js into a React TypeScript project and create a chart component working in harmony with React. This book will show you how utilize D3 with React to bring life to your charts.Seasoned author Elad Elrom will show you how to create simple charts such as line, bar, donut, scatter, histogram and others, and advanced charts such as a world map and force charts. You'll also learn to share the data across your components and charts using React Recoil state management. Then integrate third-party chart libraries that are built on D3 such as Rechart, Visx, Nivo, React-vi, and Victory and in the end deploy your chart as a server or serverless app on popular platforms.React and D3 are two of the most popular frameworks in their respective areas – learn to bring them together and take your storytelling to the next level.WHAT YOU'LL LEARN* Set up your project with React, TypeScript and D3.js* Create simple and advanced D3.js charts* Work with complex charts such as world and force charts* Integrate D3 data with React state management * Improve the performance of your D3 components* Deploy as a server or serverless app and debug testWHO THIS BOOK IS FORReaders that already have basic knowledge of React, HTML, CSS and JavaScript.ELAD ELROM is a technical coach. As a writer, he authored and co-authored several technical books. Elad consulted for a variety of clients, from large corporations such as AT&T, HBO, Viacom, NBC Universal, and Weight Watchers, to smaller startups. Aside from coding, Elad is also a PADI diving instructor and a pilot.INTEGRATING D3.JS WITH REACT1. Setting Our Technology Stack2. Graphics and Interactions3. Basic Charts: Part 14. Basic Charts: Part 25. Integrating State Management6. World Chart: Part 17. World Chart: Part 28. Force Charts: Part 19. Force Charts: Part 210. Integrating Popular Chart Libraries Built on D311. Performance Knick-Knacks12. Publishing Your React d3 App

Regulärer Preis: 79,99 €
Produktbild für Societal Responsibility of Artificial Intelligence

Societal Responsibility of Artificial Intelligence

The digital world is characterized by its immediacy, its density of information and its omnipresence, in contrast to the concrete world. Significant changes will occur in our society as AI becomes integrated into many aspects of our lives.This book focuses on this vision of universalization by dealing with the development and framework of AI applicable to all. It develops a moral framework based on a neo-Darwinian approach - the concept of Ethics by Evolution - to accompany AI by observing a certain number of requirements, recommendations and rules at each stage of design, implementation and use. The societal responsibility of artificial intelligence is an essential step towards ethical, eco-responsible and trustworthy AI, aiming to protect and serve people and the common good in a beneficial way.JEROME BERANGER is a scientific expert on the ethical approach of the digital revolution and Ethics by Evolution. He is cofounder and CEO of ADELIAA and is also an associate researcher in the Inserm 1295 BIOETHICS team at the University of Toulouse III, France.

Regulärer Preis: 139,99 €
Produktbild für IAPP CIPP / US Certified Information Privacy Professional Study Guide

IAPP CIPP / US Certified Information Privacy Professional Study Guide

PREPARE FOR SUCCESS ON THE IAPP CIPP/US EXAM AND FURTHER YOUR CAREER IN PRIVACY WITH THIS EFFECTIVE STUDY GUIDE - NOW INCLUDES A DOWNLOADABLE SUPPLEMENT TO GET YOU UP TO DATE ON THE 2022 CIPP EXAM!Information privacy has become a critical and central concern for small and large businesses across the United States. At the same time, the demand for talented professionals able to navigate the increasingly complex web of legislation and regulation regarding privacy continues to increase.Written from the ground up to prepare you for the United States version of the Certified Information Privacy Professional (CIPP) exam, Sybex’s IAPP CIPP/US Certified Information Privacy Professional Study Guide also readies you for success in the rapidly growing privacy field.You’ll efficiently and effectively prepare for the exam with online practice tests and flashcards as well as a digital glossary. The concise and easy-to-follow instruction contained in the IAPP/CIPP Study Guide covers every aspect of the CIPP/US exam, including the legal environment, regulatory enforcement, information management, private sector data collection, law enforcement and national security, workplace privacy and state privacy law, and international privacy regulation.* Provides the information you need to gain a unique and sought-after certification that allows you to fully understand the privacy framework in the US* Fully updated to prepare you to advise organizations on the current legal limits of public and private sector data collection and use* Includes access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key termsPerfect for anyone considering a career in privacy or preparing to tackle the challenging IAPP CIPP exam as the next step to advance an existing privacy role, the IAPP CIPP/US Certified Information Privacy Professional Study Guide offers you an invaluable head start for success on the exam and in your career as an in-demand privacy professional.MIKE CHAPPLE, PHD, CIPP/US, is Teaching Professor of Information Technology, Analytics, and Operations at Notre Dame’s Mendoza College of Business. He is a bestselling author of over 25 books and serves as the Academic Director of the University’s Master of Science in Business Analytics program. He holds multiple additional certifications, including the CISSP, CySA+, CISM, PenTest+, and Security+.JOE SHELLEY, M.A., CIPP/US, is currently the Vice President for Libraries and Information Technology at Hamilton College in New York. Among other responsibilities he oversees information security and privacy programs, IT risk management, business intelligence and analytics, and data governance. He has also held certifications and certificates for ITIL, Project Management, and Scrum.Introduction xxiAssessment Test xxxCHAPTER 1 PRIVACY IN THE MODERN ERA 1Introduction to Privacy 2What Is Privacy? 3What Is Personal Information? 4What Isn’t Personal Information? 5Why Should We Care About Privacy? 7Generally Accepted Privacy Principles 8Management 9Notice 10Choice and Consent 10Collection 10Use, Retention, and Disposal 11Access 11Disclosure to Third Parties 12Security for Privacy 13Quality 14Monitoring and Enforcement 14Developing a Privacy Program 15Crafting Strategy, Goals, and Objectives 15Appointing a Privacy Official 17Privacy Roles 18Building Inventories 18Conducting a Privacy Assessment 19Implementing Privacy Controls 20Ongoing Operation and Monitoring 20Online Privacy 21Privacy Notices 21Privacy and Cybersecurity 22Cybersecurity Goals 23Relationship Between Privacy and Cybersecurity 24Privacy by Design 25Summary 26Exam Essentials 26Review Questions 27CHAPTER 2 LEGAL ENVIRONMENT 31Branches of Government 32Legislative Branch 32Executive Branch 33Judicial Branch 34Understanding Laws 36Sources of Law 36Analyzing a Law 41Legal Concepts 43Legal Liability 44Torts and Negligence 45Summary 46Exam Essentials 46Review Questions 48CHAPTER 3 REGULATORY ENFORCEMENT 53Federal Regulatory Authorities 54Federal Trade Commission 54Federal Communications Commission 60Department of Commerce 61Department of Health and Human Services 61Banking Regulators 62Department of Education 63State Regulatory Authorities 63Self-Regulatory Programs 64Payment Card Industry 64Advertising 65Trust Marks 66Safe Harbors 67Summary 67Exam Essentials 68Review Questions 69CHAPTER 4 INFORMATION MANAGEMENT 73Data Governance 74Building a Data Inventory 74Data Classification 75Data Flow Mapping 77Data Lifecycle Management 78Workforce Training 79Cybersecurity Threats 80Threat Actors 80Incident Response 85Phases of Incident Response 86Preparation 87Detection and Analysis 87Containment, Eradication, and Recovery 88Post-incident Activity 88Building an Incident Response Plan 90Data Breach Notification 92Vendor Management 93Summary 94Exam Essentials 94Review Questions 96CHAPTER 5 PRIVATE SECTOR DATA COLLECTION 101FTC Privacy Protection 103General FTC Privacy Protection 103The Children’s Online Privacy Protection Act (COPPA) 104Future of Federal Enforcement 107Medical Privacy 110The Health Insurance Portability and Accountability Act (hipaa) 110The Health Information Technology for Economic and Clinical Health Act 118The 21st Century Cures Act 120Confidentiality of Substance Use Disorder Patient Records Rule 120Financial Privacy 121Privacy in Credit Reporting 121Gramm–Leach–Bliley Act (GLBA) 125Red Flags Rule 128Consumer Financial Protection Bureau 129Educational Privacy 130Family Educational Rights and Privacy Act (FERPA) 130Telecommunications and Marketing Privacy 132Telephone Consumer Protection Act (TCPA) and Telemarketing Sales Rule (TSR) 132The Junk Fax Prevention Act (JFPA) 135Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act 135Telecommunications Act and Customer Proprietary Network Information 137Cable Communications Policy Act 138Video Privacy Protection Act (VPPA) of 1988 139Summary 140Exam Essentials 141Review Questions 143CHAPTER 6 GOVERNMENT AND COURT ACCESS TO PRIVATE SECTOR INFORMATION 147Law Enforcement and Privacy 148Access to Financial Data 149Access to Communications 153National Security and Privacy 157Foreign Intelligence Surveillance Act (FISA) of 1978 157USA-PATRIOT Act 159The USA Freedom Act of 2015 162The Cybersecurity Information Sharing Act of 2015 163Civil Litigation and Privacy 164Compelled Disclosure of Media Information 164Electronic Discovery 166Summary 168Exam Essentials 168Review Questions 170CHAPTER 7 WORKPLACE PRIVACY 175Introduction to Workplace Privacy 176Workplace Privacy Concepts 176U.S. Agencies Regulating Workplace Privacy Issues 177U.S. Antidiscrimination Laws 178Privacy Before, During, and After Employment 181Employee Background Screening 182Employee Monitoring 185Investigation of Employee Misconduct 189Termination of the Employment Relationship 191Summary 193Exam Essentials 193Review Questions 195CHAPTER 8 STATE PRIVACY LAWS 199Federal vs. State Authority 200Financial Data 200Credit History 201California Financial Information Privacy Act 201Data Security 202Recent Developments 204Data Breach Notification Laws 212Elements of State Data Breach Notification Laws 212Key Differences Among States Today 214Recent Developments 215Marketing Laws 216Summary 217Exam Essentials 218Review Questions 219CHAPTER 9 INTERNATIONAL PRIVACY REGULATION 223International Data Transfers 224European Union General Data Protection Regulation 225Adequacy Decisions 228U.S.- EU Safe Harbor and Privacy Shield 228Binding Corporate Rules 230Standard Contractual Clauses 230Other Approved Transfer Mechanisms 231APEC Privacy Framework 231Cross- Border Enforcement Issues 233Global Privacy Enforcement Network 233Resolving Multinational Compliance Conflicts 234Summary 234Exam Essentials 235Review Questions 236APPENDIX ANSWERS TO REVIEW QUESTIONS 241Chapter 1: Privacy in the Modern Era 242Chapter 2: Legal Environment 243Chapter 3: Regulatory Enforcement 245Chapter 4: Information Management 247Chapter 5: Private Sector Data Collection 249Chapter 6: Government and Court Access to Private Sector Information 251Chapter 7: Workplace Privacy 252Chapter 8: State Privacy Laws 254Chapter 9: International Privacy Regulation 256Index 259

Regulärer Preis: 33,99 €
Produktbild für Mastering Microsoft Teams

Mastering Microsoft Teams

Do you need to learn how to use Microsoft Teams? Are you questioning how to drive user adoption, govern content, and manage access for your Teams deployment? Either way, the second edition of this bestseller is your one-stop-shop to learning everything you need to know to find success with Microsoft Teams.Microsoft’s popular chat-based collaboration software has many rich features that enable teams to be more efficient, and save valuable time and resources. However, as with all software, there is a learning curve and pitfalls that should be avoided.Begin by learning the core components and use cases for Teams. From there, the authors guide you through ideas to create governance and adoption plans that make sense for your organization or customer. Wrap up with an understanding of features and services in progress, and a roadmap to the future of the product.WHAT YOU WILL LEARN* Implement, use, and manage Microsoft Teams* Understand how Teams drives productivity and engagement by combining the functionality of Microsoft 365 Groups, SharePoint, OneDrive, Outlook, and other services in one location* Govern, explain, and use Teams in your organization* Use Teams in a structured way to reduce users’ time spent in meetings* Know the pitfalls to avoid that may create challenges in your usage of Teams* Become familiar with the functionality and components of Teams via walk-throughs, including opportunities for automating business processes in Teams* See how educators and students can use Teams to improve remote learning* Be aware of business productivity in a remote world with Microsoft VivaWHO THIS BOOK IS FORAnyone who wants to learn Microsoft Teams. To get the most out of the book, a basic understanding of Microsoft 365 and a subscription, including a Microsoft Teams license, is useful.MELISSA HUBBARD specializes in driving productivity, collaboration, and communication in the modern workplace. She is a former Microsoft MVP and early adopter of Microsoft Teams, with a background in project management and the implementation of collaboration and business process automation solutions. She is particularly passionate about the topic areas of user adoption, governance, and trainingMATTHEW J. BAILEY is a Microsoft MVP and Microsoft Certified Trainer (MCT) for Noteworthy Technology Training, specializing in SharePoint, Microsoft 365 (including Teams), Azure, and Power BI. He combines his business expertise and his technical knowledge to resolve corporate challenges. He is a highly regarded presenter, avid blogger, and author, most recently of The SharePoint Business Analyst Guide.D’ARCE HESS is a Microsoft MVP who specializes in the creation of custom portals and experiences in SharePoint, Microsoft Teams and Microsoft 365. As a UI/UX designer and developer, she uses industry and Microsoft best practices as a base for creating solutions that simplify processes, and drive user adoption and governance from the start. She has worked with Fortune 500 companies and has become a trusted partner to her clients in the industries of healthcare, pharmaceuticals, legal, travel and tourism, and entertainment. She loves to volunteer in the community and is the leader of the Rhode Island SharePoint & Microsoft 365 User Group.MÅRTEN HELLEBRO is an Office Apps and Services MVP focused on Microsoft Teams and an expert in enterprise voice. As an infrastructure, migration, and user adoption lead, Mårten has extensive experience managing numerous Teams and Skype for Business implementation projects. He regularly speaks at Microsoft conferences and organizes one of the largest Microsoft Teams conference in the Nordics “Teamsdagen”. He also runs the Microsoft Teams blog msteamsswe.se, and co-hosts the Teams podcast “Teamspodden“.Chapter 1: Introduction to Microsoft TeamsChapter 2: Working in TeamsChapter 3: Communicating in TeamsChapter 4: Meetings in TeamsChapter 5: User Adoption in TeamsChapter 6: GovernanceChapter 7: Automating Business Processes in TeamsChapter 8: Known Challenges and the FutureChapter 9: Teams for EducationChapter 10: Introduction to Microsoft Viva

Regulärer Preis: 46,99 €
Produktbild für ABAP in Eclipse

ABAP in Eclipse

Master Advanced Business Application Programming (ABAP) Development Tools by installing, customizing, and using them in Eclipse.The book begins by describing the installation and customization of ABAP Development Tools in Eclipse and how to adjust the IDE to meet your requirements. You will discover the ABAP Development Tools functionality that helps you be more efficient in programming in the ABAP language, including refactoring, markers, quick fixes, unit testing, and much more. Moving on, you will cover the available Eclipse plugins that you can use with ABAP Development Tools to make Eclipse even more developer-friendly: ABAP Continuous Integration and ABAP Extensions. Finally, you will learn how to create your own Eclipse plugin that is integrated with ABAP Development Tools.This book is perfect for every ABAP developer who wants to get started with ABAP Development Tools in Eclipse, as well as experienced ADT users who would like to take advantage of hidden functions or external extensions for ADT and Eclipse.WHAT YOU WILL LEARN* Install and configure your ABAP in Eclipse to meet your personal requirements* Discover the functionalities of ABAP in Eclipse that will accelerate your development* Use additional extensions to make your work with Eclipse more enjoyable* Create your own plugin that works with ABAP in EclipseWHO THIS BOOK IS FORABAP developers that want or need to switch to Eclipse and current ABAP in Eclipse users who want to learn its possibilities and hidden features.Łukasz is IT manager for SAP applications at Hager Group. He has been active in the SAP community for more than ten years. He mostly shares his knowledge on his blog (Abap Blog). He is a creator of the following Eclipse plugins: ABAP Favorites, ABAP Extensions, and ABAP Quick Fix. He also shares his ABAP projects or frameworks on GitHub as fidley; these include: Fast ALV Grid, JSON2ABAPType, Customers, and ALV Grid in a Nutshell. He was a speaker at the last four #sitWROs and attended a few others around Europe. SAP Developer Hero 2016 and SAP Champion from 2019. He can also teach you how to brew a beer. Chapter 1: Installation, Basic ConfigurationCHAPTER GOAL: PROVIDE INFORMATION ABOUT HOW TO GET STARTED WITH ABAP IN ECLIPSESUB -TOPICS1. How to install Eclipse & ABAP Development Tools2. How to create ABAP Projects and structure of the project explorer3. Perspectives4. Standard Eclipse and ADT Views5. Eclipse PreferencesChapter 2: Eclipse and ADT PreferencesCHAPTER GOAL: EXPLAIN POSSIBILITIES OF CONFIGURATION OF YOUR ECLIPSE ENVIRONMENTSUB -TOPICS1. Update sites2. Debug preferences3. ABAP Development Preferences4. Syntax highlighting5. Eclipse PreferencesChapter 3: How to Use ABAP in Eclipse to Accelerate your WorkCHAPTER GOAL: DESCRIBE ALL KNOWN FUNCTIONALITIES OF ABAP IN ECLIPSE THAT WILL MAKE THE DEVELOPER LIFE EASIERSUB - TOPICS1. Refactoring2. Quick fixes3. Completion assistant4. Markers5. Formatting, Formatting of block6. Block Selection7. ATC8. Unit Test9. etc.. all functionalities of10. Shortcuts CheatSheetChapter 4: Eclipse Extensions that will make the differenceCHAPTER GOAL: DESCRIPTION OF ECLIPSE PLUGINS FOR ABAP AND GLOBAL, THAT CAN ENHANCE HUGELY THE WORK WITH ADTNO OF PAGES :SUB - TOPICS:1. ABAP CI plugin2. abapGit Plugin3. ABAP Favorites4. ABAP Extensions5. ABAP Quick Fixes6. ABAP Tags7. Darkest Dark8. Any Edit9. etc.Chapter 5: CHAPTER GOAL: EXPLAIN THE WAY OF CREATION OF ECLIPSE PLUGINSSUB - TOPICS:1. Basic information about creating an Eclipse plugin2. Creation of Eclipse plugin with TreeView or Table control and testing it3. Explanation of features and update sitesChapter 6: Extending ABAP Development ToolsCHAPTER GOAL: SHOW EXAMPLE OF SIMPLE ECLIPSE PLUGIN THAT WORKS WITH ABAP DEVELOPMENT TOOLS TO SUPPORT THE DEVELOPER & HOW TO CREATE YOUR OWN QUICK FIXES FOR ATC CHECKSSUB - TOPICS:1. Creation of Eclipse plugins calling ABAP backend2. Creating quick fix for ATC Checks

Regulärer Preis: 62,99 €
Produktbild für Mastering Voice Interfaces

Mastering Voice Interfaces

Build great voice apps of any complexity for any domain by learning both the how's and why's of voice development. In this book you’ll see how we live in a golden age of voice technology and how advances in automatic speech recognition (ASR), natural language processing (NLP), and related technologies allow people to talk to machines and get reasonable responses. Today, anyone with computer access can build a working voice app. That democratization of the technology is great. But, while it’s fairly easy to build a voice app that runs, it's still remarkably difficult to build a great one, one that users trust, that understands their natural ways of speaking and fulfills their needs, and that makes them want to return for more.We start with an overview of how humans and machines produce and process conversational speech, explaining how they differ from each other and from other modalities. This is the background you need to understand the consequences of each design and implementation choice as we dive into the core principles of voice interface design. We walk you through many design and development techniques, including ones that some view as advanced, but that you can implement today. We use the Google development platform and Python, but our goal is to explain the reasons behind each technique such that you can take what you learn and implement it on any platform.Readers of Mastering Voice Interfaces will come away with a solid understanding of what makes voice interfaces special, learn the core voice design principles for building great voice apps, and how to actually implement those principles to create robust apps. We’ve learned during many years in the voice industry that the most successful solutions are created by those who understand both the human and the technology sides of speech, and that both sides affect design and development. Because we focus on developing task-oriented voice apps for real users in the real world, you’ll learn how to take your voice apps from idea through scoping, design, development, rollout, and post-deployment performance improvements, all illustrated with examples from our own voice industry experiences.WHAT YOU WILL LEARN* Create truly great voice apps that users will love and trust* See how voice differs from other input and output modalities, and why that matters* Discover best practices for designing conversational voice-first applications, and the consequences of design and implementation choices* Implement advanced voice designs, with real-world examples you can use immediately.* Verify that your app is performing well, and what to change if it doesn't Who This Book Is ForAnyone curious about the real how’s and why’s of voice interface design and development. In particular, it's aimed at teams of developers, designers, and product owners who need a shared understanding of how to create successful voice interfaces using today's technology. We expect readers to have had some exposure to voice apps, at least as users.Ann Thymé-Gobbel's career has focused on how people use speech and natural language to communicate with each other and with technology. After completing her PhD in cognitive science and linguistics from UC San Diego, she's held a broad set of voice-related UI/UX design roles in both large corporations and small start-ups, working with diverse teams in product development, client project engagements, and R&D. Her past work includes design, data analysis and establishing best practices at Nuance, voice design for mobile and in-home devices at Amazon Lab 126, and creating natural language conversations for multimodal healthcare apps at 22otters. Her research has covered automatic language detection, error correction, and discourse structure. She is currently Director of UI/UX Design at Loose Cannon Systems, the team bringing to market Milo, a handsfree wearable communicator. Ann never stops doing research: she collects and analyzes data at every opportunity and enjoys sharing her findings with others, having presented and taught at conferences internationally.Charles Jankowski has over 30 years’ experience in industry and academia developing applications and algorithms for real-world users incorporating advanced speech recognition, speaker verification, and natural language technologies. He has used state-of-the-art machine learning processes and techniques for data analysis, performance optimization, and algorithm development. Charles has highly in-depth technical experience with state-of-the-art technologies, effective management of cross-functional teams for all facets of application deployment, and outstanding relationships with clients. Currently, he is Director of NLP at Brain Technologies, creating the Natural iOS application with which you can “Say it and Get it.” Previously he was Director of NLP and Robotics at CloudMinds, Director of Speech and Natural Language at 22otters, Senior Speech Scientist at Performance Technology Partners, and Director of Professional Services at Nuance. He has also been an independent consultant. Charles holds S.B., S.M., and Ph.D. degrees from MIT, all in electrical engineering.PART 1 – Voice System FoundationsChapter 1: Say Hello to Voice SystemsChapter goal: Introduce the reader to voice-first technology, its core concepts, and typical phases of development through an explanatory background for the current state and challenges of voice.No of pages - 20Sub-topics1. Voice-first, voice-only, and conversational everything2. Introduction to voice technology components (Speech to text, Natural languageunderstanding, Dialog management, Natural language generation, Text to speech)3. The phases of voice development success (Plan, Design, Build, Test, Deploy &Assess, Iterate)4. Hope is not a strategy – but to plan & execute isChapter 2: Keeping Voice in MindChapter goal: Explain to the reader how humans and computers “talk” and “listen.”What’s easy and hard for the human user and the technology in a dialog, and why.No of pages - 15Sub-topics1. Why voice is different2. Hands-on: A pre-coding thought experiment3. Voice dialog and its participants• The Human: spoken natural language understanding• The Computer: voice system recognition and interpretation• Human-computer voice dialog - Successful voice-first development is all aboutcoordinating human abilities with the technology to allow conversations betweentwo very different dialog participants.Chapter 3: Running a Voice Implementation—and Noticing IssuesChapter goal: Allow the reader to put into practice their newly learned foundation byimplementing and running a simple voice application in the Google Assistant framework,and experiencing how quickly even a simple voice interaction needs improvement.No of pages - 15Sub-topics1. Hands-on: Preparing a restaurant finder2. Introducing voice platforms3. Hands-on: Implementing the restaurant finderBasic setup, Specifying a first intent, Doing something, What the user says,What the VUI says, Connecting Dialogflow to Actions on Google, Testingthe app, Saving the voice interaction4. Google’s voice development ecosystem, and why we're using it here5. The pros and cons of relying on tools6. Hands-on: Making changes - testing and iterating (Adding phrases to handle the same meaning, additional content, and more specific)PART 2 – Planning Voice System InteractionsChapter 4: Defining your Vision: Building What, How, and Why for WhomChapter goal: Introduce voice-focused requirement discovery, highlighting differencesfrom other modalities and devices and showingNo of pages - 25Sub-topics1. Functional requirements: What are you building? (General and detailed functionality)2. Non-functional business requirements: Why are you building it? (Purpose, underlyingservice and existing automation, branding and terminology, data needs, access andavailability, legal and business constraints)3. Non-functional user requirements: Who will use it and what do they want? (Userpopulation demographics and characteristics, engagement patterns, mental modelsand domain knowledge, environment and state of mind)4. Non-functional system requirements; How will you build it? (Available options forrecognizer, parser, and interpreter, external data sources, data storage and data access, other system concerns)Chapter 5: From Discovery to UX and UI Design: Tools of the Voice-First TradeChapter goal: Show how to turn discovery findings into high-level architectural designs,using flows diagrams, sample dialogs, and detailed dialog management specs.No of pages - 20Sub-topics1. Where to find early user data on any budget (online research, crowd sourcing, dialogparticipant observation, focus groups, interviews, and surveys)2. How discovery results feed into VUI design decisions (dialog manager graphs)3. Capturing and documenting VUI design (dialog flows, sample dialogs, detaileddesign specifications, VUI design documentation approaches)4. Prototyping and testing your assumptions (early voice UX and prototypingapproaches)PART 3 – Building Voice System InteractionsChapter 6: Applying Human 'Rules of Dialog' to Reach Conversation ResolutionChapter goal: Learn that voice-first dialogs have resolutions. Learn how to design andimplement fully specified requests in the 3 core dialog types: question-answer, actionrequests, and task completion requests.No of pages - 30Sub-topics1. Dialog acts, games and turns – and Grice2. Question answering3. Action requests4. Task completion requests5. Fully specified request (Single slot and Multi-slot requests)6. Determining dialog acts based on feature discovery7. Dialog completion (Responding to 'goodbye' and 'thanks')Chapter 7: Resolving Incomplete Requests Through DisambiguationChapter goal: Explain how to handle incomplete and ambiguous requests, includingcommon disambiguation methods (yes/no, A/B sets, lists and menus) and when to apply each.No of pages - 30Sub-topics1. Incomplete requests - how to reach completeness2. Ambiguous requests3. Disambiguation methods (Logic-based assumptions, Yes/No questions, A/B sets,Static lists, Dynamic lists, Open sets, Menus)4. Testing on the device to find and solve issues5. Toward code independence: using webhooks (fulfillment, contexts, contextparameters, and follow-up)Chapter 8: Conveying Reassurance with Confidence and ConfirmationChapter goal: Teach the importance of conveying reassurance and how to apply different confirmation strategies. Introduce discourse markers and backchannels.No of pages - 30Sub-topics1. Conveying reassurance and shared certainty - Setting expectations2. Webhooks, Take 2 (Dialogflow system architecture, webhook request and response,Implementing the webhook)3. Confirmation methods (Non-verbal confirmation, Generic acknowledgment, Implicitand Explicit confirmations)4. Confirmation placement – confirming slots versus intents5. Disconfirmation: dealing with “no”6. Additional reassurance techniques and pitfalls (System pronunciation, Backchannels,Discourse markers, VUI architecture)7. Choosing the right reassurance methodChapter 9: Helping Users Succeed Through ConsistencyChapter goal: Explore how to navigate an audio interaction that is by nature fleeting andsequential. Provide design and implementation that incorporates consistency throughcorrectly scoped global commands, landmarks, non-verbal audio.No of pages - 20Sub-topics1. Universals (Uses: clarification and additional information, allow a do-over, providean exit)2. Navigation (Landmarks, Non-verbal audio, Content playback navigation, Listnavigation)3. Consistency, variation and randomization (built-in global intents, consistency acrossVUIs and frameworksChapter 10: Creating Robust Coverage for Speech-to-Text ResolutionChapter goal: Teach the nuts and bolts of the computer-side of "listening," starting withthe mapping of sounds to words and how to create solid synonym coverage. Topicsinclude different approaches to recognition, including regular expressions and statisticalmodels, dictionaries, domain knowledge, normalizing, and bootstrapping.No of pages - 25Sub-topics1. Recognition is speech-to-text interpretation2. Recognition engines3. Grammar concepts (Coverage, Recognition space, Static or dynamic, End-pointing,Multiple hypotheses)4. Types of grammars (Rule-based grammars, Statistical models, Hot words, Wakewords and invocation names)5. Working with grammars (Writing rule-based regular expressions)6. How to succeed with grammars (Bootstrapping, Normalizing punctuation andspellings, Handling unusual pronunciations, Using domain knowledge, the strengthsand limitations of STT)7. A simple example (Sample phrases in Dialogflow, Regular expressions in thewebhook)8. Limitations on grammar creation and useChapter 11: Reaching Understanding Through Parsing and Intent ResolutionChapter goal: Explore the second part of computer "listening": interpreting the meaning.Topics cover intent resolution, parsing and multiple passes, the use of tagging guides and middle layers.No of pages - 20Sub-topics1. From words to meaning (NLP, NLU)2. Parsing3. Machine learning and NLU4. Ontologies, knowledge bases and content databases5. Intents (Intent tagging and tagging guides, Middle layers: semantic tags versus systemendpoints)6. Putting it all together (Matching wide or narrow, Multiple grammars, multiple passes)7. A simple example (The Stanford Parser revisited, Determining intent, Machinelearning and using knowledge)Chapter 12: Applying Accuracy Strategies to Avoid MisunderstandingsChapter goal: Explain how misunderstandings happen and how to avoid them throughtechniques that minimize errors and the need to start over. Topics include design andimplementation of a wide set of robustness techniques, including powerful advancedtechniques.No of pages - 25Sub-topics1. Accuracy robustness underlying concepts2. Accuracy robustness strategies (Examples, Providing help, Just-in-time information,Hidden options and "none of those", Recognize-and-reject, One-step-correction,Tutorials, Spelling, Narrowing recognition space)3. Advanced techniques (Multi-tiered behavior and confidence scores, N-best and skiplists, Probabilities, Contextual latency)Chapter 13: Choosing Strategies to Recover from MiscommunicationChapter goal: Explore how to recover when miscommunication happens. Show how torecover and get users back on track quickly, and when to stop trying. Topics includedesign and implementation of several recovery strategies.No of pages - 15Sub-topics1. Recovery from what?2. Recovery strategies (Meaningful contextual prompts, Escalating prompts, Taperedprompts, Rapid reprompt, Backoff strategies)3. When to stop trying (Max error counts, Transfers)4. Choosing recovery strategy (Recognition, intent, or fulfillment errors)Chapter 14: Using Context and Data to Create Smarter ConversationsChapter goal: Explain why context is king in spoken conversation. Show how to accessand update data from various sources, and how to use that data within and across dialogs to create smarter interactions. Topics focus on how to design and implement context aware dialogs using anaphora, proactive behaviors, proximity, geo-location, domain knowledge, and other powerful methods.No of pages - 25Sub-topics1. Why there’s no conversation without context2. Reading and writing data (External accounts and services)3. Persistence within and across conversations4. Context-aware and context-dependent dialogs (Discourse markers andacknowledgments, Anaphora resolution, Follow-up dialogs and linked requests,Proactive behaviors, Topic, domain and world knowledge, Geo location-basedbehavior, Proximity and relevance, Number and type of devices, Time and day, Useridentity, preferences and account types, User utterance wording, System conditions5. Tracking context in modular and multiturn dialogsChapter 15: Creating Secure Personalized ExperiencesChapter goal: Cover personalization and customization. Topics include identification,authentication, privacy and security concerns, system persona audio, and working withTTS versus recorded prompts.No of pages - 25Sub-topics1. The importance of knowing who’s talking2. Individualized targeted behaviors (Concepts in personalization and customization,Implementing individualized experiences3. Authorized secure access4. Approaches to identification and authentication (Implementing secure gated access)5. Privacy and security concerns6. System persona (Defining and implementing a system persona, How persona affectsdialogs7. System voice audio (TTS or voice talent, generated or recorded, Finding and workingwith voice talents, One or several voices, Prompt management)8. Emotion and style9. Voice for specific user groupsPART 4 – Verifying and Deploying Voice System InteractionsChapter 16: Testing and Measuring Performance in Voice SystemsChapter goal: Explain the do’s and don’ts of QA testing a voice system. Topics includeuser testing methods that work best for voice, the code needed to support them, and how to improve system performance based on findings.No of pages - 20Sub-topics1. Testing voice system performance (Recognition testing, Dialog traversal: functionalend-to-end testing, Wake word and speech detection testing, Additional systemintegration testing)2. Testing usability and task completion (Voice usability testing concepts, Wizard of Ozstudies)3. Tracking and measuring performance (Recognition performance metrics, Taskcompletion metrics, User satisfaction metrics)Chapter 17: Tuning and Deploying Voice SystemsChapter goal: Show how to improve, or tune, voice solutions before and after deploying a voice system. Teach what real user data says about the system performance, what to log and track, how to measure accuracy, and how to interpret the data.No of pages - 25Sub-topics1. Tuning: what is it and why do you do it? (Why recognition accuracy isn’t enough,Analyzing causes of poor system performance)2. Tuning types and approaches (Log-based versus transcription-based tuning, Coveragetuning, Recognition accuracy tuning, Finding and using recognition accuracy data,Task completion tuning, Dialog tuning, Prioritizing tuning efforts)3. Mapping observations to the right remedy (Reporting and using tuning results)4. How to maximize deployment success (Know when to tune, Understand tuningcomplexities to avoid pitfalls)

Regulärer Preis: 66,99 €
Produktbild für Database-Driven Web Development

Database-Driven Web Development

Learn to operate at a professional level with HTML, CSS, DOM, JavaScript, PERL and the MySQL database. With plain language explanations and step-by-step examples, you will understand the key facets of web development that today’s employers are looking for. Encapsulating knowledge that is usually found in many books rather than one, this is your one-stop tutorial to becoming a web professional.You will learn how to use the PERL scripting language and the MySQL database to create powerful web applications. Each chapter will become progressively more challenging as you progress through experimentation and ultimately master database-driven web development via the web applications studied in the last chapters.Including practical tips and guidance gleaned from 20+ years of working as a web developer, Thomas Valentine provides you with all the information you need to prosper as a professional database-driven web professional.WHAT YOU'LL LEARN* Leverage standard web technologies to benefit a database-driven approach* Create an effective web development workstation with databases in mind* Use the PERL scripting language and the MySQL database effectively* Maximize the Apache Web Server WHO THIS BOOK IS FORThe primary audience for this book are those who know already know web development basics and web developers who want to master database driven web development. The skills required to understand the concepts put forth are a working knowledge of PERL and basic MySQL.THOMAS VALENTINE has 20 years of experience as both a professional web developer and writer. He is a LAMP, Perl, PHP and MySQL web developer, programmer and expert. He writes for various magazines and web sites and has been a technical consultant for large scale, database driven web sites such as FedEx.ca and Texas Instruments (ti.com).Chapter 1 (Formerly 6 and 7) - Database-Driven Web Development FundamentalsChapter 2 (Formerly 8 through 10) - Perl CGI and MySQL EssentialsChapter 3 (Formerly 11) - Essential MySQL SkillsChapter 4 (Formerly 13) - Nuts and BoltsChapter 5 (Originally 5, then 1) – Practical JavaScript Concepts and ProjectsChapter 6 - Images: Uploads and Scripted ManipulationChapter 7 (Formerly Chapter 15) – Installing and Using the PERL ServerChapter 8 (Formerly 16) – Installing and Using the MySQL Database ServerChapter 9 (Formerly 17) – Installing and Using the Apache Web ServerChapter 10 (Formerly 18) – A Database Driven Menu System

Regulärer Preis: 62,99 €
Produktbild für Extending  Kubernetes

Extending Kubernetes

Rely on this comprehensive guide to understand the extension patterns and discover the extension plugins for Kubernetes.In this book, state-of-the-art extension patterns and extension points of Kubernetes are covered in depth with real-life use cases and examples. There are comprehensive discussions in the text on all possible aspects of Kubernetes, starting from end-user to the fully-automated controller development. The book focuses on creating applications that work on Kubernetes and also interact and operate Kubernetes itself.The book starts with a recap of Kubernetes, its rich configuration options, extension patterns, and points. The journey of extending Kubernetes starts with the CLI tool plugins. By the end of this section, you will be able to create and manage kubectl plugins. Then, the API access plugins with authentication and authorization webhooks are presented. In this section, you will learn how to extend and interfere with the API flow of Kubernetes. You then move on to learn how to extend Kubernetes API with new resources and controllers. You will make Kubernetes API work for you by creating a Kubernetes operator. Extensions for Kubernetes schedulers are covered to create a custom scheduler and run it side-by-side with the default scheduler. Finally, the last extension points will be discussed for the infrastructure, such as networking or storage. At the end of the text, you will learn the upcoming extension points. This book is designed to cover all the extension points of Kubernetes with state-of-the-art implementations.This book is intended for those who wish to understand Kubernetes in depth and go further by making Kubernetes work for their custom requirements. By the end of this book, readers with a cloud-native mindset will broaden their vision to create future-proof applications. Rather than focus on overwhelming theoretical information and YAML files for Kubernetes resources, readers are provided with the philosophy behind Kubernetes extensions. With real-life examples and hands-on development steps, you will be more confident in working with Kubernetes.WHAT YOU WILL LEARN* Know the Kubernetes extension patterns and available extension points * Be familiar with the philosophy behind Kubernetes extensions and how they should be integrated into the clusters* Design Kubernetes extensions and make Kubernetes work for you* Develop, deploy, and operate plugins for Kubernetes ranging from the CLI tool to custom resources, schedulers, infrastructure, and more * Study real-life use cases for extending Kubernetes with code examplesWHO THIS BOOK IS FORSoftware engineers, developers, DevOps engineers, cloud security analysts, architects, and managers who have Kubernetes in their short- and long-term plansONUR YILMAZ is a senior software engineer at a multinational enterprise software company. He is a Certified Kubernetes Administrator (CKA) and works on Kubernetes and cloud management systems. He is a keen supporter of cutting-edge technologies, including Docker, Kubernetes, and cloud-native applications. He is the author of multiple books on Kubernetes, Docker, serverless architectures, and cloud-native continuous integration and delivery. He has one master and two bachelor degrees in the engineering field.Chapter 1: IntroductionCHAPTER GOAL: Provide an introduction to Kubernetes, configuration options, extension patterns, and extension points with real-life use casesNO OF PAGES: 25-30SUB-TOPICS:1. Kubernetes Recap2. Configuring Kubernetes Cluster3. Kubernetes Extension Patterns4. Kubernetes Extension PointsChapter 2: kubectl pluginsCHAPTER GOAL: Understand how to extend Kubernetes CLI tool, kubectl, for the custom requirements. How to develop, install and release new plugins for kubectlNO OF PAGES: 30-35SUB-TOPICS:* kubectl Installation and Usage* kubectl Plugin Design* Create Your First kubectl Plugin* Plugin Repository and LifecycleCHAPTER 3: API FLOW EXTENSIONSCHAPTER GOAL: Understand the flow of Kubernetes API server to handle requests. Learn how to extend the flow with authentication, authorization, and admission controls.NO OF PAGES: 25-30SUB -TOPICS:* Authentication WebhooksAuthorization Webhooks * Dynamic Admission ControlCHAPTER 4: EXTENDING KUBERNETES APICHAPTER GOAL: Discuss how Kubernetes API can be extended with custom resources and the automation of the custom resources, namely operators.NO OF PAGES: 50-55SUB-TOPICS:* Kubernetes API Overview* Kubernetes Client Libraries* Custom Resources in Kubernetes* Operator Pattern in Kubernetes* kubebuilder Framework* Operators in ActionCHAPTER 5: SCHEDULER EXTENSIONSCHAPTER GOAL: Learn how Kubernetes scheduling mechanism works and how it could be extended. Write, deploy, and use a custom scheduler for Kubernetes cluster.NO OF PAGES: 35-40SUB-TOPICS:* Kubernetes Scheduler OverviewDevelop and Deploy a Custom Scheduler * Configure and Manage Multiple Schedulers CHAPTER 6: INFRASTRUCTURE EXTENSIONSCHAPTER GOAL: Discover how Kubernetes interacts with the infrastructure in terms of storage and networking. Learn how to extend Kubernetes clusters with new pod networking and volume drivers.NO OF PAGES: 25-30SUB-TOPICS:* Storage Plugins* Network Plugins (They are still in development, and in alpha stage, if they become stable, it is an excellent asset to have in the book) CHAPTER 7: UPCOMING EXTENSION POINTSCHAPTER GOAL: Summarize the extension points of Kubernetes and discuss the upcoming trends and libraries in the market.NO OF PAGES: 20-25

Regulärer Preis: 62,99 €
Produktbild für Demystifying the Azure Well-Architected Framework

Demystifying the Azure Well-Architected Framework

Use the Azure well-architected framework to deploy your workloads in Azure and align them with Microsoft recommended best practices. This book takes a deep dive into the five architecture elements (cost optimization, performance efficiency, operational excellence, reliability, and security) and provides practical guidance on incorporating them into your architecture.The book starts with an introduction to the relevance of the well-architectured framework and why it should form the baseline of your design decisions when deploying applications in Azure. You will learn how customers can optimize the cost of deployment in Azure and understand all aspects of implementation. The book takes you through the practices and processes to be followed to run applications smoothly and you will understand the end-to-end process of design, deployment, and monitoring. You will go through paradigms for designing environments to meet different performance demands. The book covers how to build resilient and highly available applications in Azure with a sample configuration for monitoring. And you will learn how to enable security to ensure confidentiality and integrity of workloads in Azure.After reading this book, you will know the practical nuances of designing high-performing applications in the Microsoft cloud.WHAT YOU WILL LEARN* Understand the five pillars of the well-architected framework* Use tools and services to optimize cost* Design for performance efficiency* Deal with threat vectors in the cloudWHO THIS BOOK IS FORSolution architects and cloud teams in AzureSHIJIMOL AMBI KARTHIKEYAN has more than 15 years of experience in data center management, server administration, virtualization, and cloud technologies. She is currently working as Technical Delivery Manager focusing on Azure infrastructure, automation, DevOps, serverless, and related technologies. She is a tech enthusiast and loves writing about the latest developments in IT infrastructure and cloud computing on her blog (thetechnologychronicle).CHAPTER 1: AZURE WELL-ARCHITECTED FRAMEWORK: THE WHAT AND WHY?CHAPTER GOAL: This chapter will introduce readers to the relevance of well-architected framework and why it should form the baseline of all their design decisions while deploying applications in AzureNO OF PAGES : 10SUB -TOPICS1. Digital transformation through Azure2. Why do you need a framework for architecture excellence?3. What is Azure Well architected framework?4. The five pillars of Azure well architected framework5. Practical annotationsCHAPTER 2: COST OPTIMIZATION: RETURN ON YOUR CLOUD INVESTMENTChapter Goal: This chapter will focus on how customers can optimize cost of deployments in Azure, covering practical aspects of implementationNO OF PAGES: 30SUB - TOPICS1. How to design for optimal ROI2. Tools and services for optimizing cost3. Understand the tradeoffs4. Configure reports for visibilityCHAPTER 3: OPERATIONAL EXCELLENCE: KEEP THE LIGHTS ONCHAPTER GOAL: This chapter will focus on framework, practices and processes to be followed to ensure that applications run without disruption. It will cover end to end processes starting from the design, deployment and ongoing monitoringNO OF PAGES :30SUB - TOPICS:1. Start with the application design2. Adopt “Everything as code”3. Enable peak performance for deployment ecosystem4. Always “Shift Left” for testing5. Integrated monitoringCHAPTER 4: PERFORMANCE EFFICIENCY: MEET THE DEMAND SPIKESCHAPTER GOAL: This chapter will explore the paradigms for designing environments to meet varying performance demands. The practical considerations of scalability for the same will be explainedNO OF PAGES:30SUB - TOPICS:1. Design principles for performance efficiency2. Make best use of cloud scalability3. Identify bottlenecks through testing4. Monitoring metrics for performanceCHAPTER 5: RELIABILITY: BUILD RESILIENT APPLICATIONS IN THE CLOUDCHAPTER GOAL: This chapter will focus on considerations for building resilient and highly available applications in Azure, with sample configuration for monitoringNO OF PAGES:30SUB - TOPICS:1. Best practices for building resilient applications2. Popular adoption strategies3. How to meet the defined SLAs4. Testing and monitoringCHAPTER 6: SECURITY: PROTECT YOUR WORKLOADS IN THE CLOUDCHAPTER GOAL: This chapter will cover the practical aspects of enabling security to ensure confidentiality and integrity of workloads in AzureNO OF PAGES:30SUB - TOPICS:1. Understanding threat vectors in the cloud2. Adaptable security for new world threats3. Secure compute, storage , network and code4. Identity is the new security perimeter5. Azure Native security tools for your SOC team

Regulärer Preis: 62,99 €
Produktbild für Pro PHP 8 MVC

Pro PHP 8 MVC

Examine the building blocks that make any good MVC framework using PHP 8. This book exposes all the considerations that many developers take for granted when using a popular framework, and teaches you how to make this MVC framework your own.You'll quickly get started writing your first bit of framework code, then, you build a variety of examples using aspects of an MVC framework, including a router, a template engine, a database library, a persistence engine (ORM), and a testing framework. In the next section, you'll implement sessions, caches, file systems, queues, logging, and mail. You'll wrap up by building a larger scale sample web application: a sales website for a company that sells rockets.Along the way, this book lays bare all the secret parts of MVC to take with you to apply to your own PHP-based MVC projects.WHAT YOU WILL LEARN* Build PHP-based web applications using the model view controller (MVC) architecture * Write your first bit of framework code* Compare the code you write with how the popular frameworks do the same kinds of thingsCreate various aspects of applications, engines, and other frameworks * Wrap up with a sample case study applicationWHO THIS BOOK IS FORExperienced PHP and web developers. Some prior experience with PHP and web development at least recommended.Christopher Pitt is an experienced PHP and JavaScript/CSS web developer and writer, working at SilverStripe. He usually works on application architecture, though sometimes you’ll find him building compilers or robots. He is also the author of several web development books and is a contributor on various open source projects such as AdonisJs and Masonite.1: Ways to Use PHP2: Writing Our First Bit of Code3: Building a Router4: Building a Template Engine5: Building a Validator6: Building a Database Library7: Building an Object-Relational Mapper Library8: Building a Dependency Injection Container9: Testing Our Framework10: Config, Cache, Sessions, Filesystems11: Queues, Logging, Emails12: Publishing Your CodeAfterword: Wrapping Up

Regulärer Preis: 62,99 €
Produktbild für Implementing Machine Learning for Finance

Implementing Machine Learning for Finance

Bring together machine learning (ML) and deep learning (DL) in financial trading, with an emphasis on investment management. This book explains systematic approaches to investment portfolio management, risk analysis, and performance analysis, including predictive analytics using data science procedures.The book introduces pattern recognition and future price forecasting that exerts effects on time series analysis models, such as the Autoregressive Integrated Moving Average (ARIMA) model, Seasonal ARIMA (SARIMA) model, and Additive model, and it covers the Least Squares model and the Long Short-Term Memory (LSTM) model. It presents hidden pattern recognition and market regime prediction applying the Gaussian Hidden Markov Model. The book covers the practical application of the K-Means model in stock clustering. It establishes the practical application of the Variance-Covariance method and Simulation method (using Monte Carlo Simulation) for value at risk estimation. It also includes market direction classification using both the Logistic classifier and the Multilayer Perceptron classifier. Finally, the book presents performance and risk analysis for investment portfolios.By the end of this book, you should be able to explain how algorithmic trading works and its practical application in the real world, and know how to apply supervised and unsupervised ML and DL models to bolster investment decision making and implement and optimize investment strategies and systems.WHAT YOU WILL LEARN* Understand the fundamentals of the financial market and algorithmic trading, as well as supervised and unsupervised learning models that are appropriate for systematic investment portfolio management* Know the concepts of feature engineering, data visualization, and hyperparameter optimization* Design, build, and test supervised and unsupervised ML and DL models* Discover seasonality, trends, and market regimes, simulating a change in the market and investment strategy problems and predicting market direction and prices* Structure and optimize an investment portfolio with preeminent asset classes and measure the underlying riskWHO THIS BOOK IS FORBeginning and intermediate data scientists, machine learning engineers, business executives, and finance professionals (such as investment analysts and traders)TSHEPO CHRIS NOKERI harnesses big data, advanced analytics, and artificial intelligence to foster innovation and optimize business performance. In his functional work, he has delivered complex solutions to companies in the mining, petroleum, and manufacturing industries. He initially completed a bachelor’s degree in information management. He then graduated with an honors degree in business science at the University of the Witwatersrand on a TATA Prestigious Scholarship and a Wits Postgraduate Merit Award. They unanimously awarded him the Oxford University Press Prize. He has authored the Apress book Data Science Revealed: With Feature Engineering, Data Visualization, Pipeline Development, and Hyperparameter Tuning.Chapter 1: Introduction to the Financial Markets and Algorithmic TradingForeign exchange market- Exchange rate- Exchange rates quotationThe Interbank marketThe retail marketBrokerage- Understanding leverage and margin- Contract for difference tradingThe share marketRaising capital- Public listing- Stock exchange- Share tradingSpeculative nature of foreign exchange marketTechniques for speculating market movementAlgorithmic trading- Supervised machine learningThe parametric method- The non-parametric methodBinary classificationMulticlass classification- The ensemble method- Unsupervised learning - Deep learning- Dimension reductionChapter 2: Forecasting Using ARIMA, SARIMA and Additive ModelTime series in actionSplit data into training and test dataTest for stationaryTest for white noiseAutocorrelation functionPartial autocorrelation functionThe moving averages smoothing techniqueThe exponential smoothing techniqueRate of returnThe ARIMA ModelARIMA Hyperparameter Optimization- Develop the ARIMA model- Forecast prices using the ARIMA modelThe SARIMA model- Develop SARIMA model- Forecast using the SARIMA modelAdditive model- Develop the additive model- Forecast prices the additive model- Seasonal decompositionConclusionChapter 3: Univariate Time Series using Recurrent Neural NetsWhat is deep learning?Activation functionLoss functionOptimize an artificial neural networkThe sequential data problemThe recurrent net modelThe recurrent net problemThe LSTM modelGatesUnfolded LSTM networkStacked LSTM networkLSTM in action- Split data into training, test and validation- Normalize data- Develop LSTM model- Forecasting using the LSTM- Model evaluation- Training and validation loss across epochs - Training and validation accuracy across epochsConclusionChapter 4: Discover Market RegimesHMMHMM application in finance- Develop GaussianHMMMean and varianceExpected returns and volumesConclusionsChapter 5: Stock ClusteringInvestment Portfolio DiversificationStock market volatilityK-Means clusteringK-Means in practiceConclusionsChapter 6: Future Price Prediction using Linear RegressionLinear Regression in PracticeDetect missing valuesPearson correlationCovariancePairwise scatter plotEigen matrixSplit data into training and test data.Normalize dataLeast squares model hyperparameter optimizationStep 1: Fit least squares model with default hyperparametersStep 2: Determine the mean and standard deviation of the cross-validation scoresStep 3: Determine Hyper-parameters that yield the best score.Develop least squares modelFind an interceptFind the estimated coefficientTest least squares model performance using SciKit-LearnPlotting actual values and predicted valuesConclusionChapter 7: Stock Market SimulationUnderstanding value at riskEstimate VAR using the Variance-Covariance MethodUnderstanding Monte CarloApplication of Monte Carlo simulation in finance- Run Monte Carlo simulation- Plot simulationsConclusionsChapter 8: Market Trend Classification using ML and DLClassification in practiceData preprocessingSplit Data into training and test dataLogistic regression- Finalize a logistic classifier- Evaluate a logistic classifier- Learning curveMultilayer layer perceptron- Architecture- Finalize model- Training and validation loss across epochs- Training and validation accuracy across epochsConclusionsChapter 9: Investment Portfolio and Risk AnalysisInvestmentInvestment AnalysisInvestment Risk ManagementInvestment Portfolio Management Pyfolio in actionPerformance statisticsDrawbackRate of returnsAnnual rate of returnRolling returns- Monthly rate of returnsConclusions

Regulärer Preis: 56,99 €
Produktbild für How to Make a Game

How to Make a Game

Get a head start on making your games efficiently by avoiding common design and development pitfalls. Video games combine art and programming; this unique position has opened up opportunities for many pitfalls. This book takes you through the fundamentals of game making and the usual mistakes and bad practices that can harm your games.We start with the common difficulties and challenges, ways to find the gaps, and game design. Next, we discuss game engines and other tools you need to choose while making a game, how you should choose them, and the design documents you need to make. We also cover simple but important tweaks in game mechanics as well as the look and feel of your game. We will also discuss conventions for naming, code structuring, project structuring, and coding.Your thought process will be guided in a way that you can look for the proper approach to make a successful game. The book sheds light upon how to improve the overall game experience and finalize the game for release. Along the journey, we will explore some interesting stories of games and mythology as well.By the end of the book, you will know about the basic life cycle of a game development process and how to not make a game.WHAT YOU WILL LEARN* Discover the fundamentals of game design * See some intermediate coding tricks to make your games better* Grasp the pitfalls to avoid while designing and programming games* Master the different conventions and practices for file naming and structuring your projects WHO THIS BOOK IS FORPeople who want to make games. Basic programming experience is assumed.MINHAZ-US-SALAKEEN FAHME is the co-founder and CEO of Battery Low Interactive Ltd—a company that makes wishes come true. It started as a game studio in 2015 and over the years, grew into a bunch of wings- each working dedicatedly on serious games; web and app development; business and marketing solutions using augmented reality and virtual reality; digital marketing; and small-scale indie games. With their outreach campaigns, Battery Low has reached half a million kids with the experience of immersive technology for the first time. Fahme also conducts sessions on AR, VR, MR, game design, entrepreneurship, career, and leadership for youth and entrepreneurs in educational institutions, national, and international events. He is a blogger and game designer/writer by passion while cats, travels, live concerts, epic fantasies keep him running.TANIMUL HAQUE KHAN is the head of the Unity department of Brain Station 23, a service-based company. He along with his team has been providing AR/VR enterprise solutions since 2018. He has been working with Unity technologies since 2015. He has played an uncountable number of games across multiple platforms mostly on PC and console. He is one of the most well-recognized Unity developers in Bangladesh. Aside from the tech industry he has also co-founded the very first cat cafe in Bangladesh known as Capawcino.Chapter 1: Don'tChapter Goal: In this chapter, you will get introduced to the core difficulties and challenges of the game making journey.Chapter 2: The Fault in Our StarsChapter Goal: This chapter will discuss the first encounters with games as well as the process of finding the gaps and lacking. We will also discuss game analysis in this chapter.Chapter 3: Don't Reinvent the WheelChapter Goal: We will discuss the game engine and the purpose they serve as powerful and necessary tools in game development.Chapter 4: Choose Your ArsenalChapter Goal: We will learn about game engines in greater detail including their pros n cons by building a RPG.Chapter 5: It's All in My Head/ Don't Keep It All in Your HeadChapter Goal: Learn to make Game Design Document, writing practices, and hurdles that may be stopping you from writing it.Chapter 6: A Stitch in Time Saves NineChapter Goal: This chapter teaches conventions of file naming, structuring, project structuring, coding (with some examples)Chapter 7: Git GoodChapter Goal: We will learn about version controlChapter 8: Get Smart!Chapter Goal: This chapter shows the ill effects of hard code. This would enable you to differentiate between good and bad approaches towards code and learn how to eliminate them.Chapter 9: Game Design - The Three musketeers!Chapter Goal: You will learn the overall journey of game design, understanding all the components, their role, and how to roll them properly.Chapter 10: Game Feel and EffectsChapter Goal: We will learn about camera effect, audio effect, particle effect in this chapter.Chapter 11: Input MattersChapter Goal: Learn about choosing input styles properly.Chapter 12: Help!Chapter Goal: This chapter will helping you transcend through reality (pseudo code), dynamic difficulty.Chapter 13: Platform Choosing (Pros n Cons)Chapter Goal: This chapter will help you choose the right platform to publish your game.Chapter 14: The Great Filter/Fermi ParadoxChapter Goal: In this chapter, you will learn how to test your game and how to approach publishing and assessing the success.Chapter 15: Gameover - The Myth of Sisyphus/Insanity Loop/Core LoopChapter Goal: In the final chapter, we will evaluate all we have learnt by studying this game, its success, and the future

Regulärer Preis: 56,99 €
Produktbild für Pro Power BI Theme Creation

Pro Power BI Theme Creation

Use JSON theme files to standardize the look of Power BI dashboards and reports. This book shows how you can create theme files using the Power BI Desktop application to define high-level formatting attributes for dashboards as well as how to tailor detailed formatting specifications for individual dashboard elements in JSON files. Standardize the look of your dashboards and apply formatting consistently over all your reports. The techniques in this book provide you with tight control over the presentation of all aspects of the Power BI dashboards and reports that you create.Power BI theme files use JSON (JavaScript Object Notation) as their structure, so the book includes a brief introduction to JSON as well as how it applies to Power BI themes. The book further includes a complete reference to all the current formatting definitions and JSON structures that are at your disposal for creating JSON theme files. Finally, the book includes dozens of theme files, from the simple to the most complex, that you can adopt and adapt to suit your own requirements.WHAT YOU WILL LEARN* Produce designer output without manually formatting every individual visual in a Power BI dashboard* Standardize presentation for families of dashboard types* Switch presentation styles in a couple of clicks* Save dozens, or hundreds, of hours laboriously formatting dashboards* Define enterprise-wide presentation standards* Retroactively apply standard styles to existing dashboardsWHO THIS BOOK IS FORPower BI users who want to save time by defining standardized formatting for their dashboards and reports, IT professionals who want to create corporate standards of dashboard presentation, and marketing and communication specialists who want to set organizational standards for dashboard deliveryADAM ASPIN is an independent business intelligence consultant based in the United Kingdom. He has worked with SQL Server for over 25 years, and now focuses on Power BI. During this time, he has developed several dozen BI and analytics systems based on the Microsoft BI product suite. Adam has been creating JSON theme files since the feature was first introduced in Power BI Desktop, and has delivered corporate Power BI themes for dozens of clients across Europe.Adam is a graduate of Oxford University. He has applied his skills for a range of clients in finance, banking, utilities, telecoms, construction, and retail. He is the author of Apress books: SQL Server Data Integration Recipes; Business Intelligence with SQL Server Reporting Services; High Impact Data Visualization in Excel with Power View, 3D Maps, Get and Transform and Power BI; Pro Power BI Desktop; and Data Mashup with Microsoft Excel Using Power Query and M. 1. Introduction to Power BI Themes2. Create and Customize a Theme In Power BI Desktop3. High-Level Theme Definition4. Default Visual Styles5. Object Visual Styles6. Card and Table Visual Styles7. Classic Chart Visual Styles8. Complex Chart Visual Styles9. Other Chart Visual Styles10. Maps11. Miscellaneous Visual Styles12. Dashboard Styling13. Cascading Styles

Regulärer Preis: 66,99 €
Produktbild für Encountering Technology

Encountering Technology

Technology has changed the world. Most of us love technology. It has evolved. It has become more complex. We now carry a combined computer, telephone and camera in the form of a smartphone. It’s hard to believe that a smartphone contains, in addition to other technology, billions of transistors.In this fascinating book the author, George Gerstman, shares his story of technology that he has seen evolve over his lifetime. Encountering Technology takes you from the 1940s to the present, with photographs showing much of the technology that Gerstman used and enjoyed. The book includes scores of examples of the technology, such as digital computers that Gerstman programmed during the 1950s which weighed tons and weren’t nearly as powerful as the computer in an iPhone, radios that he listened to before television became popular, the advent of video games, the evolution of the Internet, film cameras that he used before digital cameras were invented, and so much more. Gerstman describes how he personally encountered the digital revolution.Encountering Technology directs you through the most popular technology of the past 80 years. The book is a must-read for everyone with any interest in television, telephones, radios, computers, cameras, the Internet, watches, video, or other technology. Using photographs and clear narrative, Gerstman describes engrossing aspects of the technical devices. His background in electrical engineering and patent law, as well as being a consumer, has given him insights that are certain to inform and excite the reader.

Regulärer Preis: 6,99 €
Produktbild für Data Engineering 4.0

Data Engineering 4.0

Digitale Systeme und Infrastrukturen werden in der Regel gemeinsam oder wie im öffentlichen Sprachgebrauch üblich, „geteilt“ genutzt.Das gilt sowohl für die Systeme und Infrastrukturen selbst, als auch für Daten, die häufig als das Öl der Digitalisierung bezeichnet werden.In industriellen Nutzungen sind Daten in den meisten Fällen eine geschäftskritische Ressource und können nicht, wie im privaten Nutzungsumfeld, bedingungslos und uneigennützig Dritten überlassen werden. Dennoch ist das Teilen von Daten für industrielle Anwendungen gewünscht und häufig auch zwingend notwendig, aber ebenso häufig unzulässig und gefährlich. Genauso zwingend wie das Teilen von Daten ist in industriellen Anwendungen das nutzungsgerechte und passgerechte Zusammenführen von Daten unterschiedlicher Bedeutung zu Daten-Konglomeraten.Um die digitale Souveränität gemeinsam berechtigter Nutzer von Daten gewährleisten zu können, muss zur Bewältigung dieser beiden Aufgaben ein systematisches Data Engineering bereitgestellt werden.HERBERT WEBEr war Universitätsprofessor im Fachbereich Informatik der Technischen Universität Berlin sowie Gründer und langjähriger Leiter des Fraunhofer-Instituts für Software und Systemtechnik. Informationen und Informationsmodelle.- Informationsmodellierung für industrielle Anwendungen.- Methoden der Informationsmodellierung.- Kompositionale konstruierte Informationsmodelle.- Extensionale Konstruktionen.- Intensionale Konstruktionen.- Das HERMES Komponentenmodell.- Zusammenfassung.

Regulärer Preis: 49,99 €
Produktbild für Multi-Site Network and Security Services with NSX-T

Multi-Site Network and Security Services with NSX-T

Know the basics of network security services and other stateful services such as NAT, gateway and distributed firewalls (L2-L7), virtual private networks (VPN), load balancing (LB), and IP address management. This book covers these network and security services and how NSX-T also offers integration and interoperability with various other products that are not only created by VMware, but are also referred by VMware as third-party integrated vendors.With the integration of VMware vRealize Automation, you can automate full application platforms consisting of multiple virtual machines with network and security services orchestrated and fully automated.From the operational perspective, this book provides best practices on how to configure logging, notification, and monitoring features and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure.Another key part of this book is the explanation of multi-site capabilities and how network and security services can be offered across multiple on-premises locations with a single management pane. Interface with public cloud services also is included. The current position of NSX-T operation in on-premises private clouds and the position and integration with off-premises public clouds are covered as well.This book provides a good understanding of integrations with other software to bring the best out of NSX-T and offer even more features and capabilities.WHAT YOU WILL LEARN* Understand the NSX-T security firewall and advanced security* Become familiar with NAT, DNS, DHCP, and load balancing features* Monitor your NSX-T environment* Be aware of NSX-T authentication and authorization possibilities* Understand integration with cloud automation platforms* Know what multi-cloud integrations are possible and how to integrate NSX-T with the public cloudWHO THIS BOOK IS FORVirtualization administrators, system integratorsIWAN HOOGENDOORN started his IT career in 1999 as a help desk agent. Soon after, he started to learn Microsoft products and obtained MCP, MCSA, MCDBA, and MCSE certifications. While working as a Microsoft Systems Engineer, Iwan developed additional skills and knowledge in computer networking. Networking became a passion in his life. This passion resulted in learning networking with Cisco products. One of Iwan's dreams was to work for Cisco. But before this could happen, he first needed to finish his bachelor's degree in ICT, which he completed in 2009. In early 2010, he started working for his dream company, Cisco. After finishing his master's degree (part-time) in computer science at the University of Amsterdam and becoming a CCIE (#13084) in six different technology areas, Iwan wanted to learn something new, and that was virtualization. Because networking was something that ran through his veins, network virtualization was the next logical step. So he decided to learn VMware NSX.Iwan got the opportunity to work for VMware in 2016 as Senior NSX PSO Consultant. In his time at VMware, he gained more knowledge on private and public clouds and the related products that VMware developed to build the Software-Defined Data Center (SDDC). As new technology is growing at a rapid pace (especially within VMware and the VMware cloud space), Iwan is trying to keep up.After working for four years as Senior NSX PSO Consultant (primarily with VMware NSX-v and NSX-T), Iwan was promoted to Staff SDDC Consultant, focusing on the full SDDC stack that includes Hyperscaler offerings on the main public clouds such as AWS (VMC on AWS), Microsoft (Azure VMware Solution), and Google (Google Cloud VMware Engine).Iwan is certified on multiple VMware products, including NSX, and he is actively working together with VMware certification to develop network-related exams for VMware. Next to his VMware certifications, Iwan is also AWS and TOGAF certified.Iwan is the author of the Apress book, Getting Started with NSX-T: Logical Routing and Switching.· CHAPTER 1o Title: NSX-T SECURITY | FIREWALLo Chapter Goal: The theory about the Basic Security Services offered by NSX-T followed by the deployment’s details and steps with proper verification.o Number of Pages: 20o Subtopics:§ Gateway Firewalls§ Distributed Firewall§ Security Profiles§ Time-Based Firewall Policy· CHAPTER 2o Title: NSX-T ADVANCED SECURITYo Chapter Goal: The theory about the Advanced Security Services/features offered by NSX-T.o Number of Pages: 20o Subtopics:§ Distributed IDS§ Layer-7 Context Profiles§ Identity based Firewall§ Bare Metal Server Security· CHAPTER 3o Title: NSX-T SERVICE INSERTIONo Chapter Goal: The theory about the Security Services/features offered by 3rd Party vendors from VMware’s perspective and how the integration works.o Number of Pages: 15o Subtopics:§ East/West Third-party service insertion§ North/South Third-party service insertion§ End-Point Protection§ Network Introspection Settings· CHAPTER 4o Title: NETWORK ADDRESS TRANSLATION (NAT), DNS AND DHCPo Chapter Goal: Know the difference between SNAT and DNAT and explanation on how to configure NAT, DNS and DHCP IP address Management using the internal NSX-T.o Number of Pages: 20o Subtopics:§ SNAT§ DNAT§ Configure NAT Services§ DNS Zone§ DNS Forwarding Zone§ DHCP Profile§ IP Address Pool§ IP Address Block· CHAPTER 5o Title: LOAD BALANCING (LB)o Chapter Goal: Discuss Load Balancing capabilities and configuration.o Number of Pages: 30o Subtopics:§ Load Balancing Concepts§ Distributed Load Balancer§ Setting up the Load Balancer Components· CHAPTER 6o Title: VIRTUAL PRIVATE NETWORK (VPN)o Chapter Goal: Know the differ types of VPN and how to configure and monitor them.o Number of Pages: 25o Subtopics:§ IPSEC (L3 VPN)§ L2 VPN§ Configuration of VPN· L3· L4§ Monitoring of VPN sessions· CHAPTER 7o Title: NSX-T MONITORINGo Chapter Goal: Tools to verify the Routing and Routing performance.o Number of Pages: 30o Subtopics:§ Network Monitoring§ Logging§ vRealize Network insight integration§ IPFIX§ Network Performance Testing using IPERF Tools§ Monitoring / Events and Alarms§ Logging§ vRealize Log insight integration§ vRealize Operations integration§ Other Operation Tools Integration· CHAPTER 8o Title: AUTHENTICATION AND AUTHORIZATIONo Chapter Goal: Information on how to integrate NSX-T with an external LDAP server and create user (groups) with different roles and rights (RBAC).o Number of Pages: 15o Subtopics:§ vIDM Integration & LDAP Integration§ LDAP only integration§ RBAC· CHAPTER 9o Title: MULTI-SITE AND FEDERATIONo Chapter Goal: Design Principles regarding Multi Site routingo Number of Pages: 40o Subtopics:§ Multi-Site Capabilities§ NSX-T Federation overview§ Networking with Federation§ Security with Federation§ Backup & Restore with Federation· CHAPTER 10o Title: PUBLIC CLOUD INTEGRATIONo Chapter Goal: NSX-T is also used in all major Public Clouds. This chapter gives you an overview on what is deployed there and how NSX-T can be consumed in these Public Clouds.o Number of Pages: 30o Subtopics:§ Forwarding Policies§ VMC on AWS§ Azure VMware Solution (AVS)§ Google Cloud VMware Engine· CHAPTER 11o Title:CLOUD MANAGEMENT PLATFORM INTEGRATION & AUTOMATIONo Chapter Goal: Get familiar on the out-of-the-box automation capabilities and vRO extensibility.o Number of Pages: 20o Subtopics:§ vCloud Director· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ vRealize Automation / vRealize Orchestration· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ NSX-T API Capabilities

Regulärer Preis: 56,99 €
Produktbild für Monitoring Cloud-Native Applications

Monitoring Cloud-Native Applications

Introduce yourself to the nuances of modern monitoring for cloud-native applications running on Kubernetes clusters. This book will help you get started with the concepts of monitoring, introduce you to popular open-source monitoring tools, and help with finding the correct set of use cases for their implementation. It covers the in-depth technical details of open-source software used in modern monitoring systems that are tailor made for environments running microservices.Monitoring Cloud-Native Applications is divided into two parts. Part 1 starts with an introduction to cloud-native applications and the foundational concepts of monitoring. It then walks you through the various aspects of monitoring containerized workloads using Kubernetes as the de-facto orchestration platform. You will dive deep into the architecture of a modern monitoring system and look at its individual components in detail.Part 2 introduces you to popular open-source tools which are used by enterprises and startups alike and are well established as the tools of choice for industry stalwarts. First off, you will look at Prometheus and understand its architecture and usage. You will also learn about InfluxDB, formerly called TICK Stack (Telegraf, InfluxDB, Chronograf, and Kapacitor). You will explore the technical details of its architecture and the use cases which it solves. In the next chapter, you will be introduced to Grafana, a multi-platform open source analytics and interactive visualization tool that can help you with visualization of data and dashboards.After reading this book, you will have a much better understanding of key terminologies and general concepts around monitoring and observability. You will also be able to select a suitable monitoring solution from the bouquet of open-source monitoring solutions available for applications, microservices, and containers. Armed with this knowledge, you will be better prepared to design and lead a successful agile operations team.What You Will LearnMonitor and observe of metrics, events, logs, and tracesCarry out infrastructure and application monitoring for microservices architectureAnalyze and visualize collected dataUse alerting, reporting, and automated actions for problem resolutionWho This Book Is ForDevOps administrators, cloud administrators, and site reliability engineers (SREs) who manage and monitor applications and cloud infrastructure on a day-to-day basis within their organizations.MAINAK CHAKRABORTY works as a senior solutions architect at a leading public cloud company, specializing in cloud management and automation tools. He has been instrumental in shaping the cloud journey of customers across industry segments whether they be established enterprises or born-in-the-cloud startups. Mainak is an open source enthusiast and regularly presents at industry technical events on his favorite topics of automation, cloud native applications, and cloud computing.AJIT PRATAP KUNDAN stands at the leading edge of the innovative technologies of todays’ information technology world. He’s worked with HPE, VMware, Novell, Redington, and PCS and helped their customers in transforming their datacenters through software-defined services. Ajit is a valued author on cloud technologies and has authored two books VMware Cross-Cloud Architecture and Intelligent Automation with VMware published by Packt and has reviewed one book Deep Learning with Pytorch.PART I: INTRODUCTION TO MONITORINGCHAPTER 1: BASIC CONCEPTS OF MONITORINGCHAPTER GOAL: This chapter is about the foundational concepts of monitoring and the associated terminology. It starts with explaining why monitoring is important and also discusses the parameters which can be monitored. We will take a look at the different ways in which monitoring can be done —some systems generate data continuously and others produce data when some event happens. It is most useful for identifying and investigating problems within your systems.No of pages: 20 PagesSub -Topics:1. Overview of Monitoring Concepts2. Proactive and Reactive Monitoring3. Importance of Observability4. What to Monitor – Infrastructure, Application and Services5. Advanced Monitoring of Business KPIs and User ExperienceCHAPTER 2: COLLECTION OF EVENTS, LOGS AND METRICSCHAPTER GOAL: This chapter will explain the difference between Events, Logs and Metrics. It also goes into the details of collection of telemetry from Work Metric and Resource Metric. We will take a look at which data to collect and how to collect that data.No of pages: 40 PagesSub - Topics1. Granularity and Resolution – observations at fixed time interval2. Types of Metrics – Histograms, Gauges, Counters and Timers3. Statistical functions – Count, Sum, Average etc.4. Work Metric – Throughput, Success, Error, Performance5. Resource Metric – Utilization, Saturation, Errors, Availability6. Introduction to Telegraf, collectd, statdCHAPTER 3: ARCHITECTURE OF A MODERN MONITORING SYSTEMCHAPTER GOAL: In this chapter we would take a look at the architecture of a modern monitoring system, its components and the integrations. We would look at how to configure a modern monitoring system, how to manage the collected data, run a query on the data, integrations with alerting tools and the reporting of the analysis.No of pages : 20 PagesSub - Topics:1. Architecture and Components2. Data management3. Query Engine4. Alerting Tools5. VisualizationPART 2- OPEN SOURCE MONITORING TOOLSCHAPTER 4: PROMETHEUSCHAPTER GOAL: This chapter will introduce Prometheus as an open-source monitoring and alerting tool. We will cover the basic concepts, installation and configuration and integration with other tools. We will also look at the use cases which can be delivered with Prometheus and its advantages when compared to Open Source tools like Graphite.No of pages: 50Sub - Topics:1. Introduction to Prometheus2. Architecture and Data Model3. Installation and Configuration4. Instrumenting Prometheus5. Integrations with other solutionsCHAPTER 5: TICK PLATFORMCHAPTER GOAL: We would take a look at Open Source TICK Stack collectively, Telegraf, InfluxDB, Chronograf and Kapacitor. The TICK Stack is a loosely coupled yet tightly integrated set of open source projects designed to handle massive amounts of time-stamped information to support the metrics analysis needs.No of pages: 50Sub - Topics:1. Architecture of TICK Stack2. Deep Dive into Telegraf3. Introduction to Influx DB4. Chronograf and Kapacitor5. Use cases delivered by Tick StackCHAPTER 6: ELASTIC STACK – ELASTIC SEARCHCHAPTER GOAL: In this chapter we will take a look at the open source Elastic Stack – formerly known as the ELK Stack, to understand the practical application of this tool. We would understand the primary areas where we can use it and how is it different from other tools available in the market today.No of pages: 50Sub - Topics:1. Introduction to Elastic Search, Log Stash and Kibana2. Architecture and Data Model3. Installation and Configuration4. Integrations with other solutionsPart 3- Visualization and DashboardsPART 3- VISUALIZATION AND DASHBOARDSCHAPTER 7: ANALYZE AND INVESTIGATECHAPTER GOAL: This chapter is focused on explaining the techniques around choosing the right set of graphs for visualizing your data, specifically time series data. It is important to know the different types, how they work and when to use them. We will also look at how to find a co-relation amongst millions of metrics and arrive at a resolution.No of pages: 20CHAPTER 8: TYPE OF TIME SERIES GRAPHSCHAPTER GOAL: This chapter is focused on explaining the techniques around choosing the right set of visualization for your data, specifically time series data. It is important to know the different types, how they work and when to use them.No of pages: 20Sub - Topics:1. Line Graphs2. Stacked Area Graphs3. Bar Graphs4. Heat MapsCHAPTER 9:TYPE OF SUMMARY GRAPHSCHAPTER GOAL: This chapter will cover summary graphs, which are visualizations that flatten a particular span of time to provide a summary window into your infrastructure. For each graph type, we’ll explain how it works and when to use it. But first, we’ll quickly discuss two concepts that are necessary to understand infrastructure summary graphs: aggregation across time (which you can think of as “time flattening” or “snapshotting”), and aggregation across space.NO OF PAGES: 20SUB - TOPICS:1. Single Value Summaries2. Toplists3. Change Graphs4. Host Maps5. DistributionsCHAPTER 10:GRAPHANACHAPTER GOAL: In this chapter will take a look at Open Source Grafana tool which allows users to query, visualize, alert on and understand metrics wherever they might be stored. It can integrate with Graphite, Influx DB, Prometheus, AWS CloudWatch etc. as a data source and can act as a single visualization option to help better understand your environment.NO OF PAGES: 50PART 4 - ACTING ON THE DATACHAPTER 11:ALERTING AND NOTIFICATIONSChapter Goal: The chapter is focused on how to start your journey to notifications – set up alerts with a simple click or perform complex anomaly detection based on machine learning algorithms. We will look at sending alerts to popular services like Slack, SMS and PagerDuty. We will also explain using automatic action on alerts through orchestration and how to create custom triggers to perform any action.NO OF PAGES: 20SUB - TOPICS:1. False Alarms2. Notifications3. Setup integration with alerting tools4. Setup integration with ITSM tools5. Automated actions

Regulärer Preis: 79,99 €
Produktbild für Test-Driven Development with React

Test-Driven Development with React

Learn to use accelerated test-driven development (TDD) to build a React application from scratch. This book explains how your React components will be integrated, and how to refactor code to make it more concise and flexible.With TDD you can develop a robust test suite to catch bugs, and develop modular, flexible code. Applying your understanding of how HTML, CSS, and JavaScript work in the browser you'll build a web application called Bookish using TDD and mainstream React stack technologies such as React, React-router, and Redux.Using higher code quality you'll be able to write executable documentation using Cucumber. This is just one of many essentials in maintaining a practical TDD workflow in your daily workload. Test-Driven Development with React highlights best practices and design patterns that will enable you to write more maintainable and reusable React components.WHAT YOU'LL LEARN* Manage your application’s state using Redux* Employ professional techniques for backend services* Use Cypress as an end-to-end testing framework* Utilize React-testing-library for unit and integration testsWHO THIS BOOK IS FORIdeal for web application developers who wants to learn how to write high quality code using Test-Driven Development.Juntao Qiu is a senior web application developer at ThoughtWorks. Over the past ten years, he has helped his clients to build solid, extensible and high-quality web applications on a range of projects including traditional web applications using jQuery and JSP (Java Server Pages) to single page applications (SPAs) using Backbone, AngularJS, and React. Juntao knows how to handle the complexity of real-world projects by applying appropriate methodologies including writing clean code and effective automation tests.He also is a technical author who has already published two books in the Chinese language: JavaScript Core Concepts and Practices (2013) and Lightweight Web Application Development (2015). He is passionate about writing blogs and speaking at events. He has a real passion for clean code, refactoring, and Test-Driven Development.Additionally, he does Muay Thai and Boxing in his spare time.* A Very Brief History of Test-Driven Development* Test-Driven Development (TDD)Techniques that can help implement TDD * Summary* Further readingReferences* Getting Started with Jest* Set up the environment* Jest at first glance* Using matchers in Jest* Mock & Stub* Summary* Test-Driven Development 101* Writing tests* Triangulation method* How to implement tasking with TDD* Summary* Project Setup* Application RequirementsCreate the project * Summary* Creating the Book List* Acceptance tests for book list* Talk to the book server* Adding a loading indicator* Implementing Book Detail View* Acceptance testsUnit tests * Testing data* User Interface refinementHandling default value * One last? change* Searching by Keyword* Acceptance test* Moving forward* Summary* State Management* State management* Implementing State Management* Reducer* Integration test for redux store* Migration the application* Summary* Further readings* References* Managing Book Reviews* Business requirements* End to end test* Add more fields* Review Editing* Behaviour-Driven Development* Play with Cucumber* Live Document with CucumberTest Report * SummaryAppendix: Design the State Shape of Your Application* Error handling* The data shapeAppendix: Background of Testing Strategies* Different layers of tests

Regulärer Preis: 56,99 €
Produktbild für SAP S/4HANA Embedded Analytics

SAP S/4HANA Embedded Analytics

Imagine you are a business user, consultant, or developer about to enter an SAP S/4HANA implementation project. You are well-versed with SAP’s product portfolio and you know that the preferred reporting option in S/4HANA is embedded analytics. But what exactly is embedded analytics? And how can it be implemented? And who can do it: a business user, a functional consultant specialized in financial or logistics processes? Or does a business intelligence expert or a programmer need to be involved? Good questions!This book will answer these questions, one by one. It will also take you on the same journey that the implementation team needs to follow for every reporting requirement that pops up: start with assessing a more standard option and only move on to a less standard option if the requirement cannot be fulfilled. In consecutive chapters, analytical apps delivered by SAP, apps created using Smart Business Services, and Analytical Queries developed either using tiles or in a development environment are explained in detail with practical examples. The book also explains which option is preferred in which situation. The book covers topics such as in-memory computing, cloud, UX, OData, agile development, and more.Author Freek Keijzer writes from the perspective of an implementation consultant, focusing on functionality that has proven itself useful in the field. Practical examples are abundant, ranging from “codeless” to “hardcore coding.”WHAT YOU WILL LEARN* Know the difference between static reporting and interactive querying on real-time data* Understand which options are available for analytics in SAP S/4HANA* Understand which option to choose in which situation* Know how to implement these optionsWho This Book is ForSAP power users, functional consultants, developersFREEK KEIJZER has a background in science (physics), industry (manufacturing, process industry) and ICT (SAP system integration), holding various project management, people management, and specialist positions. He holds degrees in natural sciences (PhD) and information management (MIM). In 1996, he became involved in an SAP implementation, initially as an R/3 key user, later as internal project leader, interim manager of the support organization, and (international) information manager. Since 2001, he has focused on SAP BI consultancy, working for three consultancy firms and more than 50 clients. His responsibilities as a consultant include product development, team competence development, sales support, and resourcing. Freek's specialties (technical) include SAP Business Intelligence, Hana, NetWeaver, and ERP integration. His roles include project leader, lead consultant, business consultant, (interim) manager, and scrum master.Since 2015, Freek has been a brewer/owner of the Rubelijn craft beer brand.CHAPTER 1: BEFORE THE WORK STARTSCHAPTER GOAL: Miscellaneous intro topics.NO OF PAGES: 40SUB -TOPICS1. Business Intelligence: the art of enriching data2. HANA changing the OLTP versus OLAP game3. Cloud flavors: SaaS versus IaaS4. The latest thing: CDS-views5. Frontend: Fiori and UI56. SAP’s BI portfolio7. S/4HANA and Embedded AnalyticsCHAPTER 2: NO WORK: USE WHAT IS DELIVEREDCHAPTER GOAL: S/4HANA comes with rich analytical apps that can be used immediately. This chapter focuses on the content delivered by SAP.NO OF PAGES: 20SUB - TOPICS1. Discover analytical apps2. Activate them3. Use themCHAPTER 3: SOME WORK: SMART BUSINESS SERVICECHAPTER GOAL: S/4HANA has built-in functions for codeless creation of simple analytical apps. Target group of these functions are power users, but in practice functional (non-BI) consultants are most suitable to use this functionality.Functions are made available as a group of Fiori-tiles under the product name “Smart Business Service”.NO OF PAGES : 30SUB - TOPICS:1. Tiles “KPI Design”2. Tiles “Report Design”3. Tile “Analysis Path Framework Modeling”4. The end-result: again tilesCHAPTER 4: MORE WORK: BUILDING ANALYTICAL QUERIES USING TILESCHAPTER GOAL: S/4HANA comes with tiles to create so-called “Analytical Queries” starting from SAP-delivered CDS-views. Analytical Queries are not static reports, but versatile, interactive queries on real-time data.For the SaaS version of S/4HANA, this is the only option to create Analytical Queries.NO OF PAGES: 40SUB - TOPICS:1. Discovery of SAP-delivered CDS-views with tile “View Browser”2. Enriching CDS-views with tiles “Custom CDS Views”3. Building an Analytical Query with tile “Custom Analytical Query”4. Running the query with tile “Query Browser”5. How to navigate within an Analytical Query.6. Creating a dedicated tile for the queryCHAPTER 5: MOST WORK: BUILDING ANALYTICAL QUERIES IN A DEVELOPMENT ENVIRONMENTCHAPTER GOAL: Starting from real-life business requirements, often the conclusion is reached that SAP-delivered CDS-views won’t do the trick. For a SaaS version of S/4HANA, the process following this conclusion is called “managing expectations”. For an on-premise version, a development environment can be applied. And then … the sky is the limit! Development can start not only from SAP-delivered CDS-views but also from tables.NO OF PAGES: 60SUB - TOPICS:1. Layered approach towards the analytical query2. Data-integration3. “Cube-view”4. Analytical query5. Examples transaction data6. Examples master data7. Example: Replacing custom ABAP-report by analytical query8. Performance considerations; balance between performance and support-friendliness9. Access and data authorizationCHAPTER 6: EXTENSIBILITY, ODATA AND BEYONDCHAPTER GOAL: Miscellaneous outro topics related to Embedded AnalyticsNO OF PAGES: 20SUB - TOPICS:1. S/4HANA Extensibility2. OData and APIs3. Agile development and Devops4. Ideal skill-set for an Embedded Analytics expert

Regulärer Preis: 62,99 €
Produktbild für Transactional Machine Learning with Data Streams and AutoML

Transactional Machine Learning with Data Streams and AutoML

Understand how to apply auto machine learning to data streams and create transactional machine learning (TML) solutions that are frictionless (require minimal to no human intervention) and elastic (machine learning solutions that can scale up or down by controlling the number of data streams, algorithms, and users of the insights). This book will strengthen your knowledge of the inner workings of TML solutions using data streams with auto machine learning integrated with Apache Kafka.Transactional Machine Learning with Data Streams and AutoML introduces the industry challenges with applying machine learning to data streams. You will learn the framework that will help you in choosing business problems that are best suited for TML. You will also see how to measure the business value of TML solutions. You will then learn the technical components of TML solutions, including the reference and technical architecture of a TML solution.This book also presents a TML solution template that will make it easy for you to quickly start building your own TML solutions. Specifically, you are given access to a TML Python library and integration technologies for download. You will also learn how TML will evolve in the future, and the growing need by organizations for deeper insights from data streams.By the end of the book, you will have a solid understanding of TML. You will know how to build TML solutions with all the necessary details, and all the resources at your fingertips.WHAT YOU WILL LEARN* Discover transactional machine learningMeasure the business value of TML * Choose TML use cases* Design technical architecture of TML solutions with Apache Kafka* Work with the technologies used to build TML solutions* Build transactional machine learning solutions with hands-on code together with Apache Kafka in the cloudWHO THIS BOOK IS FORData scientists, machine learning engineers and architects, and AI and machine learning business leaders.Sebastian Maurice is founder and CTO of OTICS Advanced Analytics Inc. and has over 25 years of experience in AI and machine learning. Previously, Sebastian served as Associate Director within Gartner Consulting focusing on artificial intelligence and machine learning. He was instrumental in developing and growing Gartner’s AI consulting business. He has led global teams to solve critical business problems with machine learning in oil and gas, retail, utilities, manufacturing, finance, and insurance. Dr. Maurice also brings deep experience in oil and gas (upstream) and was one of the first in Canada to apply machine learning to oil production optimization, which resulted in a Canadian patent: #2864265.Sebastian is also a published author with seven publications in international peer-reviewed journals and books. One of his publications (International Journal of Engineering Education, 2004) was cited as landmark work in the area of online testing technology. He also developed the world’s first Apache Kafka connector for transactional machine learning: MAADS-VIPER.Dr. Maurice received his PhD in electrical and computer engineering from the University of Calgary, and has a master’s in electrical engineering, and a master’s in agricultural economics, with bachelors in pure mathematics and bachelors (hon) in economics.Dr. Maurice also teaches a course on data science at the University of Toronto and actively helps to develop AI course content at the University of Toronto. He is also active in the AI community and an avid blogger and speaker. He also sits on the AI advisory board at McMaster University.Chapter 1: Introduction: Big data, Auto Machine Learning and Data StreamsChapter 2: Transactional Machine LearningChapter 3: Industry Challenges with Data Streams and AutoMLChapter 4: The Business Value of Transactional Machine LearningChapter 5: The Technical Components and Architecture for Transactional Machine LearningOverview of a TML SolutionChapter 6: Template for Transactional Machine Learning SolutionsCHAPTER 7: Visualize Your TML Model Insights: Optimization, Predictions and AnomaliesChapter 8: Evolution and Opportunities For Transactional Machine Learning in Almost Every IndustryChapter 9: Conclusion and Final Thoughts.

Regulärer Preis: 66,99 €
Produktbild für Learn to Program with Kotlin

Learn to Program with Kotlin

Teach yourself programming starting with the basics and progressing to a series of exciting projects using Kotlin, one of today's hottest programming languages. This book starts with the absolute basics and then introduces just enough syntax to get into some fascinating projects. These include text processing: a statistical analysis of Jane Austen's novels, solving anagrams, and working with palindromes; image processing: cropping and resizing images, and pixel transformation; and computer vision: finding digits, parsing images, and reading speed signs.The projects are developed in tiny steps and complete solutions are provided. Some of these projects include core data science concepts, giving you skills in one of the most important areas of modern programming. Along the way you’ll cover functional programming, object-oriented programming (OOP), refactoring, and writing unit tests.After reading Learn to Program with Kotlin, you'll come away with practical insights and code to get you started right away with programming using Kotlin for your own projects.WHAT YOU WILL LEARN* Gain the basics of Kotlin using the IntelliJ Java IDE* Implement OOP with Kotlin along with unit testing and code refactoring using a series of text-related projects* Harness functional programming with Kotlin by building an image-processing library* Write software to locate and read speed signs in photosWHO IS THIS BOOK FORAnyone who wants to learn how to program or code from scratch. Also great for experienced programmers who want to know more about Kotlin. Tim Lavers is a senior software engineer at KPMG with expertise in Java, Kotlin, and other programming languages employed for data engineering and enterprise software projects. He is also a mathematical hobbyist in his spare time.PART 1 - BASICSThe very basics of programming in Kotlin using the IntelliJ code editor.Chapter 1: Getting StartedChapter 2: Simple patternsChapter 3: Arrays and loopsChapter 4: Binary choicesChapter 5: IntegersChapter 6: Values and variablesChapter 7: StringsChapter 8: Data structuresChapter 9: The file systemPART II - TEXTObject-Oriented Programming, Unit Testing and code refactoring through a series of fascinating text-related projects.Chapter 10: Project AustenChapter 11: AnagramsChapter 12: PalindromesChapter 13: Word switchPART III - IMAGESThis part of the book introduces Functional Programming by building a basic image processing library.The culmination of this is a CGI (Computer Generated Imagery) project.Chapter 14: Colour picturesChapter 15: Pixel transformationsChapter 16: Cropping and resizing imagesChapter 17: Project DinoPART IV - VISIONWe cap it all of with a project in which we write software to locate and read speed signs in photos.Chapter 18: OverviewChapter 19: Finding digitsChapter 20: Parsing the imagesChapter 21: Reading speed signs

Regulärer Preis: 56,99 €
Produktbild für The Fast-Track Guide to VXLAN BGP EVPN Fabrics

The Fast-Track Guide to VXLAN BGP EVPN Fabrics

Master the day-to-day administration and maintenance procedures for existing VXLAN fabrics. In this book you’ll discuss common issues and troubleshooting steps to help you keep your environment in stable operation. The Fast-Track Guide to VXLAN BGP EVPN Fabrics is a guide for network engineers and architects who can’t spend too much time learning everything about VXLAN. It has been created with the end goal of providing you with a straightforward approach to understand, implement, administer, and maintain VXLAN BGP EVPN-based data center networks.Using this book, you will understand Virtual Extensible LAN (VXLAN) as a technology that combines network virtualization and service provider class network attributes to solve the performance and scalability limitations in a three-tier design. You will learn to combine multiple links and provide equal-cost multipathing to effortlessly scale speed requirements without being worried about potential loops.You will learn VXLAN BGP EVPN configuration procedures with graphical step-by-step examples. You will be introduced to foundational concepts in VXLAN without the need to go over hundreds of documentation pages. This book is a clear and precise guide to implementing a spine and leaf architecture running with VXLAN. It explains how to perform day-to-day maintenance and administration tasks after implementing your first VXLAN fabric. It also explains how to integrate external devices such as firewalls, routers, and load balancers to VXLAN; how to leverage your VXLAN fabric; and how to create multiple tenant networks to secure your critical infrastructure.WHAT YOU WILL LEARN* Discover the advantages of a VXLAN spine and leaf fabric over a traditional three-tier network design* Work with the BGP L2VPN EVPN control plane VXLAN* Examine the purpose of underlay and overlay in VXLAN* Use multitenancy and tenant anycast gateways* Connect your VXLAN fabric to external networksWHO THIS BOOK IS FORSenior network engineers, solutions architects, and data center engineers.Rene Cardona, CCIEx2 - PCNSE is a truly passionate and dedicated IT professional with a major focus in the network security and datacenter realm. His experience is vastly diverse, from working with SMBs to performing large-scale datacenter infrastructure architecture designs for major corporations in the public and private sector. He has a pronounced emphasis on detail. You will not see him spending time with people that don’t truly appreciate and have a passion for technology and are not willing to spend nights and weekends devoted to learning and working with it.Chapter 1: Introduction to Spine and Leaf TopologiesCHAPTER GOAL: Get the audience familiarized with the concepts and introduce them to the foundational aspects of software defined networking and BGP EVPN for the Data Center which drives today's major cloud computing environments.No of pages: 30- 40 PagesSUB -TOPICS1. Spine and Leaf Topology Advantages.2. Underlay Networking3. Overlay Networking4. Spine and Leaf Fabric Traffic flowChapter 2: Logical Components of Spine and Leaf ArchitectureChapter Goal: Review one by one each logical component and its role in the VXLAN BGP EVPN fabricNO OF PAGES: 50 pagesSUB - TOPICS1. Broadcast, Unknow Unicast and Multicast (BUM)2. OSPF Point-to-Point for underlay - Option 13. IS-IS Point-to-Point for underlay - Option 24. Multicast (PIM Sparse) and Rendezvous Points (RPs)5. BGP L2VPN EVPN Address FamilyChapter 3: Encapsulating Layer2 over Layer3 with VXLANChapter Goal: Discuss the main aspect of VXLAN and how it solves the performance and scalability issues of STPNo of pages: 20 pagesSUB - TOPICS:1. VTEP and VTEP (NVE) Interface2. EVPN Route-Target3. L2VNI and L3VNIs4. VXLAN packet flowChapter 4: VXLAN Fabric Features Chapter Goal: Review the available fabric features in VXLAN BGP EVPN which provides data center class virtualized switching and routing capabilities. No of pages: 20SUB - TOPICS:1. Fabric Anycast Gateways2. Multi-tenancy with VRF's.3. BGP IPv4 Unicast Address Family4. Route Leaking between VRF's.Chapter 5: VXLAN Fabric to External Networks Chapter Goal: Discuss how we can integrate a VXLAN Spine and Leaf Fabric to an external network by designating border leaf’s. No of pages: 20 pagesSUB - TOPICS:1. Route Redistribution from OSPF to BGP IPv42. Route Redistribution from BGP IPv4 to OSPF3. Dynamic Routing protocols under VRFs (or VRF Lite).4. Default Route Advertisement.CHAPTER 6: VXLAN FABRIC TOPOLOGY DESIGNSCHAPTER GOAL: Discuss the VXLAN Architecture design types available for each required case.No of pages: 15 pagesSUB - TOPICS:1. VXLAN MultiPod2. VXLAN MultiSite and Border Gateway Leafs (BGW)3. VXLAN Ingress Replication (Head-End)CHAPTER 7: VXLAN FABRIC CONFIGURATION TEMPLATES.CHAPTER GOAL: Sample configuration templates to deploy different VXLAN architectures.No of pages: 10 pagesSUB - TOPICS:1. VXLAN Spine and Leaf Fabric (Standalone)2. VXLAN MultiPod Spine and Leaf (Dual topology)3. VXLAN MultiSite Spine and Leaf Fabric.4. VXLAN Ingress Replication - No Spines

Regulärer Preis: 56,99 €
Produktbild für Text Processing for Students

Text Processing for Students

Long and structured texts can be tricky. Not only regarding the technical content, also regarding layout and usability. Still, everything can integrate smoothly and look professional, if everything is properly prepared. Here, we are looking at all the parts required for technical and scientific texts: Styles, figures, tables of content, covers and oversized items to be printed crosswise. Additionally, ways to co-operate and meanwhile keep track of changes. Now, every author can concentrate solely on the factual content!Ina Koys is an experienced instructor for Microsoft Office. Many questions are frequently asked in trainings, but seldom covered in books. Now she answers some of them in her originally German "short & spicy" series. A little accent will add to the fun :-)

Regulärer Preis: 3,99 €