Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Allgemein

Produkte filtern

Produktbild für Data Science

Data Science

KNOW-HOW FÜR DATA SCIENTISTS * übersichtliche und anwendungsbezogene Einführung * zahlreiche Anwendungsfälle und Praxisbeispiele aus unterschiedlichen Branchen * Potenziale, aber auch mögliche Fallstricke werden aufgezeigt Data Science steht derzeit wie kein anderer Begriff für die Auswertung großer Datenmengen mit analytischen Konzepten des Machine Learning oder der künstlichen Intelligenz. Nach der bewussten Wahrnehmung der Big Data und dabei insbesondere der Verfügbarmachung in Unternehmen sind Technologien und Methoden zur Auswertung dort gefordert, wo klassische Business Intelligence an ihre Grenzen stößt. Dieses Buch bietet eine umfassende Einführung in Data Science und deren praktische Relevanz für Unternehmen. Dabei wird auch die Integration von Data Science in ein bereits bestehendes Business-Intelligence-Ökosystem thematisiert. In verschiedenen Beiträgen werden sowohl Aufgabenfelder und Methoden als auch Rollen- und Organisationsmodelle erläutert, die im Zusammenspiel mit Konzepten und Architekturen auf Data Science wirken. Diese 2., überarbeitete Auflage wurde um neue Themen wie Feature Selection und Deep Reinforcement Learning sowie eine neue Fallstudie erweitert.

Regulärer Preis: 59,90 €
Produktbild für Design and Development of Efficient Energy Systems

Design and Development of Efficient Energy Systems

There is not a single industry which will not be transformed by machine learning and Internet of Things (IoT). IoT and machine learning have altogether changed the technological scenario by letting the user monitor and control things based on the prediction made by machine learning algorithms. There has been substantial progress in the usage of platforms, technologies and applications that are based on these technologies. These breakthrough technologies affect not just the software perspective of the industry, but they cut across areas like smart cities, smart healthcare, smart retail, smart monitoring, control, and others. Because of these “game changers,” governments, along with top companies around the world, are investing heavily in its research and development. Keeping pace with the latest trends, endless research, and new developments is paramount to innovate systems that are not only user-friendly but also speak to the growing needs and demands of society.This volume is focused on saving energy at different levels of design and automation including the concept of machine learning automation and prediction modeling. It also deals with the design and analysis for IoT-enabled systems including energy saving aspects at different level of operation.The editors and contributors also cover the fundamental concepts of IoT and machine learning, including the latest research, technological developments, and practical applications. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in the area of IoT and machine technology, this is a must-have for any library.SUMAN LATA TRIPATHI, PHD, is a professor at Lovely Professional with more than seventeen years of experience in academics. She has published more than 45 research papers in refereed journals and conferences. She has organized several workshops, summer internships, and expert lectures for students, and she has worked as a session chair, conference steering committee member, editorial board member, and reviewer for IEEE journals and conferences. She has published one edited book and currently has multiple volumes scheduled for publication, including volumes available from Wiley-Scrivener.DUSHYANT KUMAR SINGH, is an assistant professor and Head of Embedded Systems Domain at Lovely Professional University. With a masters degree from Punjab Engineering College, University of Technology, Chandigarh, he has several years of industrial experience and more than ten years of teaching experience.SANJEEVIKUMAR PADMANABAN, PHD, is a faculty member with the Department of Energy Technology, Aalborg University, Esbjerg, Denmark. He has almost ten years of teaching, research and industrial experience and is an associate editor on a number of international scientific refereed journals. He has published more than 300 research papers and has won numerous awards for his research and teaching.P. RAJA is currently working as an assistant professor at Lovely Professional University. His expertise is in VLSI and embedded systems. He has more than 14 years of experience with 5 years in embedded industry. He has 14 publications in UGC-approved and other reputable journals. He also has 10 patents to his credit.Preface xv1 DESIGN OF LOW POWER JUNCTION-LESS DOUBLE-GATE MOSFET 1Namrata Mendiratta and Suman Lata Tripathi1.1 Introduction 11.2 MOSFET Performance Parameters 21.3 Comparison of Existing MOSFET Architectures 31.4 Proposed Heavily Doped Junction-Less Double Gate MOSFET (AJ-DGMOSFET) 31.5 Heavily Doped JL-DG MOSFET for Biomedical Application 81.6 Conclusion 9References 102 VLSI IMPLEMENTATION OF VEDIC MULTIPLIER 13Abhishek Kumar2.1 Introduction 132.2 8x8 Vedic Multiplier 142.3 The Architecture of 8x8 Vedic Multiplier (VM) 162.3.1 Compressor Architecture 172.3.1.1 3:2 Compressor 182.3.1.2 4:3 Compressor 182.3.1.3 5:3 Compressor 182.3.1.4 8:4 Compressor 192.3.1.5 10:4 Compressor 192.3.1.6 12:5 Compressor 202.3.1.7 15:5 Compressor 212.3.1.8 20:5 Compressor 212.4 Results and Discussion 232.4.1 Instance Power 232.4.2 Net Power 242.4.3 8-Bit Multiplier 252.4.4 16-Bit Multiplier 262.4.5 Applications of Multiplier 272.5 Conclusion 28References 283 GAS LEAKAGE DETECTION FROM DRAINAGE TO OFFER SAFETY FOR SANITARY WORKERS 31Dr. D. Jeyabharathi, Dr. D. Kesavaraja and D. Sasireka3.1 Introduction 313.1.1 IOT-Based Sewer Gas Detection 313.1.1.1 IoT Sensors 323.1.2 Objective 323.1.3 Contribution of this Chapter 333.1.4 Outline of the Chapter 333.2 Related Works 333.2.1 Sewer Gas Leakage Detection 333.2.2 Crack Detection 343.3 Methodology 343.3.1 Sewer Gas Detection 343.3.1.1 Proposed Tristate Pattern 353.3.2 Crack Detection 363.3.3 Experimental Setup 373.4 Experimental Results 393.5 Conclusion 40References 404 MACHINE LEARNING FOR SMART HEALTHCARE ENERGY-EFFICIENT SYSTEM 43S. Porkodi, Dr. D. Kesavaraja and Dr. Sivanthi Aditanar4.1 Introduction 434.1.1 IoT in the Digital Age 434.1.2 Using IoT to Enhance Healthcare Services 444.1.3 Edge Computing 444.1.4 Machine Learning 444.1.5 Application in Healthcare 454.2 Related Works 454.3 Edge Computing 474.3.1 Architecture 474.3.2 Advantages of Edge Computing over Cloud Computing 474.3.3 Applications of Edge Computing in Healthcare 484.3.4 Edge Computing Advantages 494.3.5 Challenges 504.4 Smart Healthcare System 504.4.1 Methodology 504.4.2 Data Acquisition and IoT End Device 514.4.3 IoT End Device and Backend Server 514.5 Conclusion and Future Directions 52References 525 REVIEW OF MACHINE LEARNING TECHNIQUES USED FOR INTRUSION AND MALWARE DETECTION IN WSNS AND IOT DEVICES 57Dr. Jeyabharathi, Dr. A. Sherly Alphonse, Ms. E.L. Dhivya Priya and Dr. M. Kowsigan5.1 Introduction 575.2 Types of Attacks 585.3 Some Countermeasures for the Attacks 595.4 Machine Learning Solutions 595.5 Machine Learning Algorithms 595.6 Authentication Process Based on Machine Learning 605.7 Internet of Things (IoT) 625.8 IoT-Based Attacks 625.8.1 Botnets 625.8.2 Man-in-the-Middle 625.9 Information and Identity Theft 625.10 Social Engineering 635.11 Denial of Service 635.12 Concerns 635.13 Conclusion 64References 646 SMART ENERGY-EFFICIENT TECHNIQUES FOR LARGE-SCALE PROCESS INDUSTRIES 67B Koti Reddy and N V Raghavaiah6.1 Pumps Operation 676.1.1 Parts in a Centrifugal Pump 686.1.2 Pump Efficiency 686.1.3 VFD 706.1.4 VFD and Pump Motor 726.1.5 Large HT Motors 736.1.6 Smart Pumps 736.2 Vapour Absorption Refrigeration System 746.2.1 Vapour Compression Refrigeration 746.2.2 Vapour Absorption Refrigeration 756.3 Heat Recovery Equipment 776.3.1 Case Study 776.3.2 Advantages of Heat Recovery 786.4 Lighting System 786.4.1 Technical Terms 786.4.2 Introduction 786.4.3 LED Lighting 796.4.4 Energy-Efficiency Techniques 796.4.5 Light Control with IoT 806.4.5.1 Wipro Scheme 806.4.5.2 Tata Scheme 806.4.6 EU Practices 816.5 Air Conditioners 826.5.1 Technical Terms 826.5.2 Types of Air Conditioners 826.5.3 Star Rating of BEE 836.5.4 EU Practices 836.5.5 Energy-Efficiency Tips 836.5.6 Inverter Air Conditioners 856.5.7 IoT-Based Air Conditioners 856.6 Fans and Other Smart Appliances 866.6.1 BLDC Fan Motors 876.6.2 Star Ratings 876.6.3 Group Drive of Fans 886.6.4 Other Smart Appliances 886.7 Motors 926.7.1 Motor Efficiency 926.7.2 Underrated Operation 936.7.3 Energy-Efficient Motors 946.7.3.1 Energy-Efficiency Ratings of BEE 946.7.3.2 Energy-Efficiency Ratings of IEC 946.7.4 Retrofit of Standard Motors with Energy-Efficient Motors 966.7.5 Other Salient Points 976.7.6 Use of Star-Delta Starter Motor 976.8 Energy-Efficient Transformers 986.8.1 IEC Recommendation 986.8.2 Super Conducting Transformers 99References 997 LINK RESTORATION AND RELAY NODE PLACEMENT IN PARTITIONED WIRELESS SENSOR NETWORK 101Manwinder Singh and Anudeep Gandam7.1 Introduction 1017.2 Related Work 1037.2.1 Existing Techniques 1057.3 Proposed K-Means Clustering Algorithm 1057.3.1 Homogenous and Heterogeneous Network Clustering Algorithms 1057.3.2 Dynamic and Static Clustering 1057.3.2.1 Routing 1067.3.3 Flow Diagram 1067.3.4 Objective Function 1067.4 System Model and Assumption 1087.4.1 Simulation Parameters 1087.4.1.1 Residual Energy 1087.4.1.2 End-to-End Delay 1097.4.1.3 Number of Hops or Hop Count in the Network 1097.5 Results and Discussion 1097.6 Conclusions 114References 1158 FREQUENCY MODULATED PV POWERED MLI FED INDUCTION MOTOR DRIVE FOR WATER PUMPING APPLICATIONS 119Arunkumar S, Mohana Sundaram N and K. Malarvizhi8.1 Introduction 1198.2 PV Panel as Energy Source 1208.2.1 Solar Cell 1208.3 Multi-Level Inverter Topologies 1218.3.1 Types of Inverters Used for Drives 1218.3.2 Multi-Level Inverters 1218.4 Experimental Results and Discussion 1228.4.1 PV Powered H Bridge Inverter-Fed Drive 1238.4.2 PV Powered DCMLI Fed Drive 1268.5 Conclusion and Future Scope 128References 1299 ANALYSIS AND DESIGN OF BIDIRECTIONAL CIRCUITS FOR ENERGY STORAGE APPLICATION 131Suresh K, Sanjeevikumar Padmanaban and S Vivek9.1 Introduction 1319.2 Modes of Operation Based on Main Converters 1339.2.1 Single-Stage Rectification 1349.2.2 Single-Stage Inversion 1359.2.3 Double-Stage Rectification 1379.2.3.1 Duty Mode - Interval -I 1379.2.3.2 Freewheeling Mode - Interval -II 1389.2.4 Double-Stage Inversion 1399.2.4.1 Charging Mode - Interval -I 1409.2.4.2 Duty Mode - Interval -II 1419.3 Proposed Methodology for Three-Phase System 1419.3.1 Control Block of Overall System 1439.3.2 Proposed Carrier-Based PWM Strategy 1449.3.3 Experiment Results 1459.4 Conclusion 148References 14810 LOW-POWER IOT-ENABLED ENERGY SYSTEMS 151Yogini Dilip Borole and Dr. C. G. Dethe10.1 Overview 15110.1.1 Conceptions 15110.1.2 Motivation 15210.1.3 Methodology 15410.2 Empowering Tools 15610.2.1 Sensing Components 15610.2.2 Movers 15910.2.3 Telecommunication Technology 16010.2.4 Internet of Things Information and Evaluation 16610.2.4.1 Distributed Evaluation 16610.2.4.2 Fog Computing (Edge Computing) 16710.3 Internet of Things within Power Region 16710.3.1 Internet of Things along with Vitality Production 16810.3.2 Smart Metropolises 16810.3.3 Intelligent Lattice Network 17110.3.4 Smart Buildings Structures 17210.3.5 Powerful Usage of Vitality in Production 17310.3.6 Insightful Transport 17410.4 Difficulties - Relating Internet of Things 17410.4.1 Vitality Ingestion 17810.4.2 Synchronization via Internet of Things through Sub-Units 17810.4.3 Client Confidentiality 18010.4.4 Safety Challenges 18010.4.5 IoT Standardization and Architectural Concept 18110.5 Upcoming Developments 18210.5.1 IoT and Block Chain 18210.5.2 Artificial Intelligence and IoT 18410.5.3 Green IoT 18510.6 Conclusion 187References 18811 EFFICIENT RENEWABLE ENERGY SYSTEMS 199Prabhansu and Nayan KumarIntroduction 19911.1 Renewable-Based Available Technologies 20011.1.1 Wind Power 20111.1.1.1 Modeling of the Wind Turbine Generator (WTG) 20111.1.1.2 Categorization of Wind Turbine 20211.1.2 Solar Power 20211.1.2.1 PV System 20211.1.2.2 Network-Linked Photovoltaic Grid-Connected PV Set-Up 20311.1.3 Tidal Energy 20311.1.4 Battery Storage System 20411.1.5 Solid Oxide Energy Units for Enhancing Power Life 20411.1.5.1 Common Utility of SOFC 20411.1.5.2 Integrated Solid Oxide Energy Components and Sustainable Power Life 20511.2 Adaptability Frameworks 20611.2.1 Distributed Energy Resources (DER) 20611.2.2 New Age Grid Connection 20911.3 Conclusion 210References 21112 EFFICIENT RENEWABLE ENERGY SYSTEMS 215Dr. Arvind Dhingra12.1 Introduction 21512.1.1 World Energy Scenario 21512.2 Sources of Energy: Classification 21712.3 Renewable Energy Systems 21712.3.1 Solar Energy 21812.3.2 Wind 21812.3.3 Geothermal 21812.3.4 Biomass 21812.3.5 Ocean 21812.3.6 Hydrogen 21812.4 Solar Energy 21812.5 Wind Energy 22312.6 Geothermal Energy 22512.7 Biomass 22612.7.1 Forms of Biomass 22612.8 Ocean Power 22712.9 Hydrogen 22712.10 Hydro Power 22712.11 Conclusion 227References 22713 AGRICULTURE-IOT-BASED SPRINKLER SYSTEM FOR WATER AND FERTILIZER CONSERVATION AND MANAGEMENT 229Dilip Kumar and Ujala Choudhury13.1 Introduction 22913.1.1 Novelty of the Work 23213.1.2 Benefit to Society 23213.2 Development of the Proposed System 23313.3 System Description 23313.3.1 Study of the Crop Under Experiment 23313.3.2 Hardware of the System 23513.3.3 Software of the System 23513.4 Layers of the System Architecture 23613.4.1 Application Layer 23613.4.2 Cloud Layer 23713.4.3 Network Layer 23713.4.4 Physical Layer 23713.5 Calibration 23713.6 Layout of the Sprinkler System 23913.7 Testing 23913.8 Results and Discussion 24113.9 Conclusion 242References 24214 A BEHAVIOUR-BASED AUTHENTICATION TO INTERNET OF THINGS USING MACHINE LEARNING 245Mohit Goyal and Durgesh Srivastava14.1 Introduction 24614.2 Basics of Internet of Things (IoT) 24614.2.1 The IoT Reference Model 24814.2.2 Working of IoT 24914.2.2.1 Device 24914.2.2.2 Connectivity to Cloud 25014.2.2.3 Data Analysis 25014.2.2.4 User Interface 25014.2.3 Utilization of Internet of Things (IoT) 25014.3 Authentication in IoT 25114.3.1 Methods of Authentication 25114.3.1.1 Authentication Based on Knowledge 25214.3.1.2 Authentication Based on Possession 25214.3.1.3 Authentication Based on Biometric 25314.4 User Authentication Based on Behavioral-Biometric 25514.4.1 Machine Learning 25614.4.1.1 Supervised Machine Learning 25614.4.1.2 Unsupervised Machine Learning 25614.4.2 Machine Learning Algorithms 25714.4.2.1 RIPPER 25714.4.2.2 Multilayer Perceptron 25714.4.2.3 Decision Tree 25714.4.2.4 Random Forest 25814.4.2.5 Instance-Based Learning 25814.4.2.6 Bootstrap Aggregating 25814.4.2.7 Naïve Bayes 25814.5 Threats and Challenges in the Current Security Solution for IoT 25814.6 Proposed Methodology 25914.6.1 Collection of Gait Dataset 25914.6.2 Gait Data Preprocessing 25914.6.3 Reduction in Data Size 26014.6.4 Gaits Feature 26014.6.5 Classification 26014.7 Conclusion and Future Work 261References 26115 A FUZZY GOAL PROGRAMMING MODEL FOR QUALITY MONITORING OF FRUITS DURING SHIPMENT OVERSEAS 265Pushan Kr. Dutta, Somsubhra Gupta, Simran Kumari and Akshay Vinayak15.1 Introduction 26515.2 Proposed System 26615.2.1 Problem Statement 26615.2.2 Overview 26615.2.3 System Components 26815.3 Work Process 27115.3.1 System Hardware 27115.3.2 Connections and Circuitry 27115.4 Optimization Framework 27115.4.1 Fuzzy Goal Description 27115.4.2 Characterizing Fuzzy Membership Function 27215.4.3 Construction of FGP Model 27215.4.4 Definition of Variables and Parameters 27315.4.5 Fuzzy Goal Description 27415.5 Creation of Database and Website 27515.5.1 Hosting PHP Application and Creation of MySQL Database 27515.5.2 Creation of API (Application Programming Interfaces) Key 27515.5.2.1 $api_key_value = “3mM44UaC2DjFcV_63GZ14aWJcRDNmYBMsxceu”; 27515.5.2.2 Preparing Mysql Database 27515.5.2.3 Structured Query Language (SQL) 27515.5.2.4 Use of HTTP (Hypertext Transfer Protocol) in Posting Request 27615.5.2.5 Adding a Dynamic Map to the Website 27715.5.2.6 Adding Dynamic Graph to the Website 27715.5.2.7 Adding the Download Option of the Data Set 27815.6 Libraries Used and Code Snipped 27815.7 Mode of Communication 28015.8 Conclusion 280Abbreviations 282References 28216 INTERNET OF THINGS – DEFINITION, ARCHITECTURE, APPLICATIONS, REQUIREMENTS AND KEY RESEARCH CHALLENGES 285Dushyant Kumar Singh, Himani Jerath and P. Raja16.1 Introduction 28516.2 Defining the Term Internet of Things (IoT) 28616.3 IoT Architecture 28716.4 Applications of Internet of Things (IoT) 28916.5 Requirement for Internet of Things (IoT) Implementation 29016.6 Key Research Challenges in Internet of Things (IoT) 29116.6.1 Computing, Communication and Identification 29116.6.2 Network Technology 29216.6.3 Greening of Internet of Things (IoT) 29216.6.4 Security 29316.6.5 Diversity 29316.6.6 Object Safety and Security 29316.6.7 Data Confidentiality and Unauthorized Access 29316.6.8 Architecture 29316.6.9 Network and Routing Information Security 293References 29417 FINFET TECHNOLOGY FOR LOW-POWER APPLICATIONS 297Bindu Madhavi, Suman Lata Tripathi and Bhagwan Shree Ram17.1 Introduction 29717.2 Exiting Multiple-Gate MOSFET Architectures 29917.3 FinFET Design and Analysis 30117.4 Low-Power Applications 30417.4.1 FinFET-Based Digital Circuit Design 30417.4.2 FinFET-Based Memory Design 30417.4.3 FinFET-Based Biosensors 30417.5 Conclusion 305References 30518 AN ENHANCED POWER QUALITY SINGLE-SOURCE LARGE STEP-UP SWITCHED-CAPACITOR BASED MULTI-LEVEL INVERTER CONFIGURATION WITH NATURAL VOLTAGE BALANCING OF CAPACITORS 307Mahdi Karimi, Paria Kargar, Kazem Varesi and Sanjeevikumar Padmanaban18.1 Introduction 30718.2 Suggested Topology 30918.2.1 Circuit Configuration 30918.2.2 Generation of Output Voltage Steps 31018.2.3 Voltage Stress of Switches 32018.3 Cascaded Configuration of Suggested Topology 32018.4 Modulation Technique 32118.5 Power Loss Analysis 32418.5.1 Conduction Losses 32418.5.2 Switching Losses 32618.5.3 Capacitor Losses 32718.6 Design of Capacitors 32818.7 Comparative Analysis 33018.8 Simulation Results 33318.9 Conclusions 336References 336Index 339

Regulärer Preis: 197,99 €
Produktbild für Equity of Cybersecurity in the Education System

Equity of Cybersecurity in the Education System

Every organization faces cyberthreats, cyberattacks, and technology breaches. Schools are no different.But professors, instructors, educators, and school systems have mostly failed to promote cybersecurity, leaving themselves—and their students—at risk.Joseph O. Esin highlights the serious nature of the problem in this book. He answers questions such as:• What does a well-structured plan to prevent cyber-threats look like?• How can we promote equity of cybersecurity in education system?• Where do cyber threats rank compared with other dangers?• How can high schools, colleges, and universities promote cybersecurity endeavors?The best way to prevent cyberattacks is to create a professional education alliance that promotes meaningful change. High school, colleges, universities, professors, educators, and support personnel must come to the table to make prevention a priority.Get a clear understanding of the problem and respond with meaningful measures with the insights and information in The Equity of Cybersecurity in the Education System.

Regulärer Preis: 4,49 €
Produktbild für Multi-Processor System-on-Chip 1

Multi-Processor System-on-Chip 1

A Multi-Processor System-on-Chip (MPSoC) is the key component for complex applications. These applications put huge pressure on memory, communication devices and computing units. This book, presented in two volumes – Architectures and Applications – therefore celebrates the 20th anniversary of MPSoC, an interdisciplinary forum that focuses on multi-core and multi-processor hardware and software systems. It is this interdisciplinarity which has led to MPSoC bringing together experts in these fields from around the world, over the last two decades.Multi-Processor System-on-Chip 1 covers the key components of MPSoC: processors, memory, interconnect and interfaces. It describes advance features of these components and technologies to build efficient MPSoC architectures. All the main components are detailed: use of memory and their technology, communication support and consistency, and specific processor architectures for general purposes or for dedicated applications. LILIANA ANDRADE is Associate Professor at TIMA Lab, Universite Grenoble Alpes in France. She received her PhD in Computer Science, Telecommunications and Electronics from Universite Pierre et Marie Curie in 2016. Her research interests include system-level modeling/validation of systems-on-chips, and the acceleration of heterogeneous systems simulation. FREDERIC ROUSSEAU is Full Professor at TIMA Lab, Universite Grenoble Alpes in France. His research interests concern Multi-Processor Systems-on-Chip design and architecture, prototyping of hardware/software systems including reconfigurable systems and highlevel synthesis for embedded systems. Foreword xiiiAhmed JERRAYAAcknowledgments xvLiliana ANDRADE and Frédéric ROUSSEAUPART 1. PROCESSORS 1CHAPTER 1. PROCESSORS FOR THE INTERNET OF THINGS 3Pieter VAN DER WOLF and Yankin TANURHAN1.1. Introduction 31.2. Versatile processors for low-power IoT edge devices 41.2.1. Control processing, DSP and machine learning 41.2.2. Configurability and extensibility 61.3. Machine learning inference 81.3.1. Requirements for low/mid-end machine learning inference 101.3.2. Processor capabilities for low-power machine learning inference 141.3.3. A software library for machine learning inference 171.3.4. Example machine learning applications and benchmarks 201.4. Conclusion 231.5. References 24CHAPTER 2. A QUALITATIVE APPROACH TO MANY-CORE ARCHITECTURE 27Benoît DUPONT DE DINECHIN2.1. Introduction 282.2. Motivations and context 292.2.1. Many-core processors 292.2.2. Machine learning inference 302.2.3. Application requirements 322.3. The MPPA3 many-core processor 342.3.1. Global architecture 342.3.2. Compute cluster 362.3.3. VLIW core 382.3.4. Coprocessor 392.4. The MPPA3 software environments 422.4.1. High-performance computing 422.4.2. KaNN code generator 432.4.3. High-integrity computing 462.5. Conclusion 472.6. References 48CHAPTER 3. THE PLURAL MANY-CORE ARCHITECTURE – HIGH PERFORMANCE AT LOW POWER 53Ran GINOSAR3.1. Introduction 543.2. Related works 553.3. Plural many-core architecture 553.4. Plural programming model 563.5. Plural hardware scheduler/synchronizer 583.6. Plural networks-on-chip 613.6.1. Schedule rNoC 613.6.2. Shared memory NoC 613.7. Hardware and software accelerators for the Plural architecture 623.8. Plural system software 633.9. Plural software development tools 653.10. Matrix multiplication algorithm on the Plural architecture 653.11. Conclusion 673.12. References 67CHAPTER 4. ASIP-BASED MULTI-PROCESSOR SYSTEMS FOR AN EFFICIENT IMPLEMENTATION OF CNNS 69Andreas BYTYN, René AHLSDORF and Gerd ASCHEID4.1. Introduction 704.2. Related works 714.3. ASIP architecture 744.4. Single-core scaling 754.5. MPSoC overview 784.6. NoC parameter exploration 794.7. Summary and conclusion 824.8. References 83PART 2. MEMORY 85CHAPTER 5. TACKLING THE MPSOC DATA LOCALITY CHALLENGE 87Sven RHEINDT, Akshay SRIVATSA, Oliver LENKE, Lars NOLTE, Thomas WILD and Andreas HERKERSDORF5.1. Motivation 885.2. MPSoC target platform 905.3. Related work 915.4. Coherence-on-demand: region-based cache coherence 925.4.1. RBCC versus global coherence 935.4.2. OS extensions for coherence-on-demand 945.4.3. Coherency region manager 945.4.4. Experimental evaluations 975.4.5. RBCC and data placement 995.5. Near-memory acceleration 1005.5.1. Near-memory synchronization accelerator 1025.5.2. Near-memory queue management accelerator 1045.5.3. Near-memory graph copy accelerator 1075.5.4. Near-cache accelerator 1105.6. The big picture 1115.7. Conclusion 1135.8. Acknowledgments 1145.9. References 114CHAPTER 6. MMPU: BUILDING A MEMRISTOR-BASED GENERAL-PURPOSE IN-MEMORY COMPUTATION ARCHITECTURE 119Adi ELIAHU, Rotem BEN HUR, Ameer HAJ ALI and Shahar KVATINSKY6.1. Introduction 1206.2. MAGIC NOR gate 1216.3. In-memory algorithms for latency reduction 1226.4. Synthesis and in-memory mapping methods 1236.4.1. SIMPLE 1246.4.2. SIMPLER 1266.5. Designing the memory controller 1276.6. Conclusion 1296.7. References 130CHAPTER 7. REMOVING LOAD/STORE HELPERS IN DYNAMIC BINARY TRANSLATION 133Antoine FARAVELON, Olivier GRUBER and Frédéric PÉTROT7.1. Introduction 1347.2. Emulating memory accesses 1367.3. Design of our solution 1407.4. Implementation 1437.4.1. Kernel module 1437.4.2. Dynamic binary translation 1457.4.3. Optimizing our slow path 1477.5. Evaluation 1497.5.1. QEMU emulation performance analysis 1507.5.2. Our performance overview 1517.5.3. Optimized slow path 1537.6. Related works 1557.7. Conclusion 1577.8. References 158CHAPTER 8. STUDY AND COMPARISON OF HARDWARE METHODS FOR DISTRIBUTING MEMORY BANK ACCESSES IN MANY-CORE ARCHITECTURES 161Arthur VIANES and Frédéric ROUSSEAU8.1. Introduction 1628.1.1. Context 1628.1.2. MPSoC architecture 1638.1.3. Interconnect 1648.2. Basics on banked memory 1658.2.1. Banked memory 1658.2.2. Memory bank conflict and granularity 1668.2.3. Efficient use of memory banks: interleaving 1688.3. Overview of software approaches 1708.3.1. Padding 1708.3.2. Static scheduling of memory accesses 1728.3.3. The need for hardware approaches 1728.4. Hardware approaches 1728.4.1. Prime modulus indexing 1728.4.2. Interleaving schemes using hash functions 1748.5. Modeling and experimenting 1818.5.1. Simulator implementation 1828.5.2. Implementation of the Kalray MPPA cluster interconnect 1828.5.3. Objectives and method 1848.5.4. Results and discussion 1858.6. Conclusion 1918.7. References 192PART 3. INTERCONNECT AND INTERFACES 195CHAPTER 9. NETWORK-ON-CHIP (NOC): THE TECHNOLOGY THAT ENABLED MULTI-PROCESSOR SYSTEMS-ON-CHIP (MPSOCS) 197K. Charles JANAC9.1. History: transition from buses and crossbars to NoCs 1989.1.1.NoC architecture 2029.1.2. Extending the bus comparison to crossbars 2079.1.3. Bus, crossbar and NoC comparison summary and conclusion 2079.2. NoC configurability 2089.2.1. Human-guided design flow 2089.2.2. Physical placement awareness and NoC architecture design 2099.3. System-level services 2119.3.1. Quality-of-service (QoS) and arbitration 2119.3.2. Hardware debug and performance analysis 2129.3.3. Functional safety and security 2129.4. Hardware cache coherence 2159.4.1. NoC protocols, semantics and messaging 2169.5. Future NoC technology developments 2179.5.1. Topology synthesis and floorplan awareness 2179.5.2. Advanced resilience and functional safety for autonomous vehicles 2189.5.3. Alternatives to von Neumann architectures for SoCs 2199.5.4. Chiplets and multi-die NoC connectivity 2219.5.5. Runtime software automation 2229.5.6. Instrumentation, diagnostics and analytics for performance, safety and security 2239.6. Summary and conclusion 2249.7. References 224CHAPTER 10. MINIMUM ENERGY COMPUTING VIA SUPPLY AND THRESHOLD VOLTAGE SCALING 227Jun SHIOMI and Tohru ISHIHARA10.1. Introduction 22810.2. Standard-cell-based memory for minimum energy computing 23010.2.1. Overview of low-voltage on-chip memories 23010.2.2. Design strategy for area- and energy-efficient SCMs 23410.2.3. Hybrid memory design towards energy- and area-efficient memory systems 23610.2.4. Body biasing as an alternative to power gating 23710.3. Minimum energy point tracking 23810.3.1. Basic theory 23810.3.2. Algorithms and implementation 24410.3.3. OS-based approach to minimum energy point tracking 24610.4. Conclusion 24910.5. Acknowledgments 24910.6. References 250CHAPTER 11. MAINTAINING COMMUNICATION CONSISTENCY DURING TASK MIGRATIONS IN HETEROGENEOUS RECONFIGURABLE DEVICES 255Arief WICAKSANA, OlivierMULLER, Frédéric ROUSSEAU and Arif SASONGKO11.1. Introduction 25611.1.1. Reconfigurable architectures 25611.1.2. Contribution 25711.2. Background 25711.2.1. Definitions 25811.2.2. Problem scenario and technical challenges 25911.3. Related works 26111.3.1. Hardware context switch 26111.3.2. Communication management 26211.4. Proposed communication methodology in hardware context switching 26311.5. Implementation of the communication management on reconfigurable computing architectures 26611.5.1. Reconfigurable channels in FIFO 26711.5.2. Communication infrastructure 26811.6. Experimental results 26911.6.1. Setup 26911.6.2. Experiment scenario 27011.6.3. Resource overhead 27111.6.4. Impact on the total execution time 27311.6.5. Impact on the context extract and restore time 27511.6.6. System responsiveness to context switch requests 27611.6.7. Hardware task migration between heterogeneous FPGAs 28011.7. Conclusion 28211.8. References 283List of Authors 287Authors Biographies 291Index 299

Regulärer Preis: 139,99 €
Produktbild für Smart and Sustainable Intelligent Systems

Smart and Sustainable Intelligent Systems

The world is experiencing an unprecedented period of change and growth through all the electronic and technilogical developments and everyone on the planet has been impacted. What was once ‘science fiction’, today it is a reality.This book explores the world of many of once unthinkable advancements by explaining current technologies in great detail. Each chapter focuses on a different aspect - Machine Vision, Pattern Analysis and Image Processing - Advanced Trends in Computational Intelligence and Data Analytics - Futuristic Communication Technologies - Disruptive Technologies for Future Sustainability. The chapters include the list of topics that spans all the areas of smart intelligent systems and computing such as: Data Mining with Soft Computing, Evolutionary Computing, Quantum Computing, Expert Systems, Next Generation Communication, Blockchain and Trust Management, Intelligent Biometrics, Multi-Valued Logical Systems, Cloud Computing and security etc. An extensive list of bibliographic references at the end of each chapter guides the reader to probe further into application area of interest to him/her.NAMITA GUPTA is the Head of Computer Science and Engineering Department at Maharaja Agrasen Institute of Technology, GGSIP University, Delhi, India. She has more than 20 years of teaching experience and has played active role in research and project development. Her current areas of interest and research includes data mining, databases and machine learning.PRASENJIT CHATTERJEE is an associate professor in the Mechanical Engineering Department at MCKV Institute of Engineering, India. He has more than 80 research papers in various international SCI journals. Dr. Chatterjee is one of the developers of a new multiple-criteria decision-making method called Measurement of Alternatives and Ranking according to Compromise Solution (MARCOS).TANUPRIYA CHOUDHURY received his PhD degree in the year 2016 and is an associate professor in Dept. of Computer Science and Engineering at UPES Dehradun, India. His areas of interests include human computing, soft computing, cloud computing, and data mining. He has filed 14 patents till date and received 16 copyrights from MHRD for his own software. He has authored more than 85 research papers.

Regulärer Preis: 217,99 €
Produktbild für Building Secure Cars

Building Secure Cars

BUILDING SECURE CARSEXPLORES HOW THE AUTOMOTIVE INDUSTRY CAN ADDRESS THE INCREASED RISKS OF CYBERATTACKS AND INCORPORATE SECURITY INTO THE SOFTWARE DEVELOPMENT LIFECYCLEWhile increased connectivity and advanced software-based automotive systems provide tremendous benefits and improved user experiences, they also make the modern vehicle highly susceptible to cybersecurity attacks. In response, the automotive industry is investing heavily in establishing cybersecurity engineering processes. Written by a seasoned automotive security expert with abundant international industry expertise, Building Secure Cars: Assuring the Automotive Software Development Lifecycle introduces readers to various types of cybersecurity activities, measures, and solutions that can be applied at each stage in the typical automotive development process.This book aims to assist auto industry insiders build more secure cars by incorporating key security measures into their software development lifecycle. Readers will learn to better understand common problems and pitfalls in the development process that lead to security vulnerabilities. To overcome such challenges, this book details how to apply and optimize various automated solutions, which allow software development and test teams to identify and fix vulnerabilities in their products quickly and efficiently. This book balances technical solutions with automotive technologies, making implementation practical. Building Secure Cars is:* One of the first books to explain how the automotive industry can address the increased risks of cyberattacks, and how to incorporate security into the software development lifecycle* An optimal resource to help improve software security with relevant organizational workflows and technical solutions* A complete guide that covers introductory information to more advanced and practical topics* Written by an established professional working at the heart of the automotive industry* Fully illustrated with tables and visuals, plus real-life problems and suggested solutions to enhance the learning experienceThis book is written for software development process owners, security policy owners, software developers and engineers, and cybersecurity teams in the automotive industry. All readers will be empowered to improve their organizations’ security postures by understanding and applying the practical technologies and solutions inside. DR. DENNIS KENGO OKA is an automotive cybersecurity expert with more than 15 years of global experience in the automotive industry. He received his Ph.D. in Computer Science and Engineering, with a focus on automotive security, from Chalmers University of Technology in Sweden. In the past, Dennis has worked with Volvo Car Corporation in Sweden where he bootstrapped automotive security research for remote diagnostics and over-the-air updates on vehicles. He has also worked for the Bosch Group in Japan serving both Japanese and global customers. Specifically, Dennis co-launched the automotive security practice (ESCRYPT) in Japan and was the Head of Engineering and Consulting Asia-Pacific. Dennis has also been involved in several automotive standardization activities, including the development of fuzz testing guidelines and cybersecurity testing frameworks. He has over 60 publications consisting of conference papers, journal articles, and book chapters, and is a frequent public speaker at international automotive and cybersecurity conferences and events.Preface xiAbout the Author xiii1 OVERVIEW OF THE CURRENT STATE OF CYBERSECURITY IN THE AUTOMOTIVE INDUSTRY 11.1 Cybersecurity Standards, Guidelines, and Activities 31.2 Process Changes, Organizational Changes, and New Solutions 61.3 Results from a Survey on Cybersecurity Practices in the Automotive Industry 81.3.1 Survey Methods 81.3.2 Report Results 91.3.2.1 Organizational Challenges 91.3.2.2 Technical Challenges 101.3.2.3 Product Development and Security Testing Challenges 111.3.2.4 Supply Chain and Third-Party Components Challenges 111.3.3 How to Address the Challenges 121.3.3.1 Organizational Takeaways 121.3.3.2 Technical Takeaways 131.3.3.3 Product Development and Security Testing Takeaways 131.3.3.4 Supply Chain and Third-Party Components Takeaways 131.3.3.5 Getting Started 141.3.3.6 Practical Examples of Organizations Who Have Started 151.4 Examples of Vulnerabilities in the Automotive Industry 161.5 Chapter Summary 18References 192 INTRODUCTION TO SECURITY IN THE AUTOMOTIVE SOFTWARE DEVELOPMENT LIFECYCLE 232.1 V-Model Software Development Process 242.2 Challenges in Automotive Software Development 252.3 Security Solutions at each Step in the V-Model 262.3.1 Cybersecurity Requirements Review 272.3.2 Security Design Review 272.3.3 Threat Analysis and Risk Assessment 272.3.4 Source Code Review 282.3.5 Static Code Analysis 282.3.6 Software Composition Analysis 292.3.7 Security Functional Testing 292.3.8 Vulnerability Scanning 292.3.9 Fuzz Testing 302.3.10 Penetration Testing 302.3.11 Incident Response and Updates 312.3.12 Continuous Cybersecurity Activities 322.3.13 Overall Cybersecurity Management 322.4 New Technical Challenges 322.5 Chapter Summary 34References 353 AUTOMOTIVE-GRADE SECURE HARDWARE 373.1 Need for Automotive Secure Hardware 393.2 Different Types of HSMs 413.3 Root of Trust: Security Features Provided by Automotive HSM 433.3.1 Secure Boot 443.3.2 Secure In-Vehicle Communication 453.3.3 Secure Host Flashing 463.3.4 Secure Debug Access 473.3.5 Secure Logging 473.4 Chapter Summary 48References 484 NEED FOR AUTOMATED SECURITY SOLUTIONS IN THE AUTOMOTIVE SOFTWARE DEVELOPMENT LIFECYCLE 514.1 Main Challenges in the Automotive Industry 534.2 Automated Security Solutions During the Product Development Phases 554.2.1 Static Code Analysis 554.2.2 Software Composition Analysis 574.2.3 Security Testing 584.2.4 Automation and Traceability During Software Development 594.3 Solutions During Operations and Maintenance Phases 594.3.1 Cybersecurity Monitoring, Vulnerability Management, Incident Response, and OTA Updates 594.4 Chapter Summary 61References 615 STATIC CODE ANALYSIS FOR AUTOMOTIVE SOFTWARE 635.1 Introduction to MISRA and AUTOSAR Coding Guidelines 685.2 Problem Statement: MISRA and AUTOSAR Challenges 755.3 Solution: Workflow for Code Segmentation, Guideline Policies, and Deviation Management 795.3.1 Step 1: Segment the Codebase into Different Categories/Components Based on Risk 805.3.2 Step 2: Specify Guideline Policies (Set of Guidelines to Apply) Depending on Risk Categories 815.3.3 Step 3: Perform the Scan and Plan the Approach for Prioritization of Findings 825.3.4 Step 4: Prioritize Findings Based on the Risk Categories and Guideline Policies and Determine How to Handle Each Finding, e.g. Fix or Leave as Deviation 835.3.5 Step 5: Follow a Defined Deviation Management Process, Including Approval Steps 845.3.6 Step 6: Report on MISRA or AUTOSAR Coding Guidelines Compliance Including Deviations 865.4 Chapter Summary 87References 886 SOFTWARE COMPOSITION ANALYSIS IN THE AUTOMOTIVE INDUSTRY 916.1 Software Composition Analysis: Benefits and Usage Scenarios 956.2 Problem Statement: Analysis of Automotive Software Open-Source Software Risks 986.2.1 Analysis Results 986.2.1.1 zlib 996.2.1.2 libpng 996.2.1.3 OpenSSL 996.2.1.4 curl 996.2.1.5 Linux Kernel 1006.2.2 Discussion 1006.3 Solution: Countermeasures on Process and Technical Levels 1016.3.1 Fully Inventory Open-Source Software 1016.3.2 Use Appropriate Software Composition Analysis Approaches 1026.3.3 Map Open-Source Software to Known Security Vulnerabilities 1026.3.4 Identify License, Quality, and Security Risks 1036.3.5 Create and Enforce Open-Source Software Risk Policies 1046.3.6 Continuously Monitor for New Security Threats and Vulnerabilities 1046.3.7 Define and Follow Processes for Addressing Vulnerabilities in Open-Source Software 1056.3.8 How to Get Started 1066.4 Chapter Summary 107References 1087 OVERVIEW OF AUTOMOTIVE SECURITY TESTING APPROACHES 1117.1 Practical Security Testing 1157.1.1 Security Functional Testing 1177.1.2 Vulnerability Scanning 1197.1.3 Fuzz Testing 1217.1.4 Penetration Testing 1227.2 Frameworks for Security Testing 1257.3 Focus on Fuzz Testing 1297.3.1 Fuzz Engine 1307.3.2 Injector 1347.3.3 Monitor 1367.4 Chapter Summary 140References 1418 AUTOMATING FUZZ TESTING OF IN-VEHICLE SYSTEMS BY INTEGRATING WITH AUTOMOTIVE TEST TOOLS 1458.1 Overview of HIL Systems 1478.2 Problem Statement: SUT Requires External Input and Monitoring 1508.3 Solution: Integrating Fuzz Testing Tools with HIL Systems 1528.3.1 White-Box Approach for Fuzz Testing Using HIL System 1578.3.1.1 Example Test Setup Using an Engine ECU 1598.3.1.2 Fuzz Testing Setup for the Engine ECU 1618.3.1.3 Fuzz Testing Setup Considerations 1658.3.2 Black-Box Approach for Fuzz Testing Using HIL System 1668.3.2.1 Example Target System Setup Using Engine and Body Control Modules 1688.3.2.2 Fuzz Testing Setup Using Duplicate Engine and Body Control Modules 1718.3.2.3 Fuzz Testing Setup Considerations 1758.4 Chapter Summary 176References 1779 IMPROVING FUZZ TESTING COVERAGE BY USING AGENT INSTRUMENTATION 1799.1 Introduction to Agent Instrumentation 1829.2 Problem Statement: Undetectable Vulnerabilities 1839.2.1 Memory Leaks 1849.2.2 Core Dumps and Zombie Processes 1859.2.3 Considerations for Addressing Undetectable Vulnerabilities 1879.3 Solution: Using Agents to Detect Undetectable Vulnerabilities 1879.3.1 Overview of the Test Environment 1889.3.2 Modes of Operation 1899.3.2.1 Synchronous Mode 1909.3.2.2 Asynchronous Mode 1919.3.2.3 Hybrid Approach 1929.3.3 Examples of Agents 1939.3.3.1 Agent Core Dump 1939.3.3.2 Agent Log Tailer 1949.3.3.3 Agent Process Monitor 1949.3.3.4 Agent PID 1949.3.3.5 Agent Address Sanitizer 1959.3.3.6 Agent Valgrind 1959.3.3.7 An Example config.json Configuration File 1969.3.4 Example Results from Agent Instrumentation 1979.3.4.1 Bluetooth Fuzz Testing 1989.3.4.2 Wi-Fi Fuzz Testing 1999.3.4.3 MQTT Fuzz Testing 2019.3.4.4 File Format Fuzz Testing 2039.3.5 Applicability and Automation 2069.4 Chapter Summary 207References 20810 AUTOMATING FILE FUZZING OVER USB FOR AUTOMOTIVE SYSTEMS 21110.1 Need for File Format Fuzzing 21310.2 Problem Statement: Manual Process for File Format Fuzzing 21510.3 Solution: Emulated Filesystems to Automate File Format Fuzzing 21610.3.1 System Architecture Overview 21710.3.2 Phase One Implementation Example: Prepare Fuzzed Files 21910.3.3 Phase Two Implementation Example: Automatically Emulate Filesystems 22310.3.4 Automating User Input 22810.3.5 Monitor for Exceptions 23110.4 Chapter Summary 236References 23711 AUTOMATION AND TRACEABILITY BY INTEGRATING APPLICATION SECURITY TESTING TOOLS INTO ALM SYSTEMS 24111.1 Introduction to ALM Systems 24211.2 Problem Statement: Tracing Secure Software Development Activities and Results to Requirements and Automating Application Security Testing 24511.3 Solution: Integrating Application Security Testing Tools with ALM Systems 24811.3.1 Concept 24911.3.1.1 Static Code Analysis – Example 24911.3.1.2 Software Composition Analysis – Example 25011.3.1.3 Vulnerability Scanning – Example 25011.3.1.4 Fuzz Testing – Example 25011.3.1.5 Concept Overview 25111.3.2 Example Implementation 25211.3.2.1 Defensics 25211.3.2.2 code Beamer ALM 25211.3.2.3 Jenkins 25211.3.2.4 SUT 25311.3.2.5 Implementation Overview 25311.3.3 Considerations 25811.4 Chapter Summary 262References 26412 CONTINUOUS CYBERSECURITY MONITORING, VULNERABILITY MANAGEMENT, INCIDENT RESPONSE, AND SECURE OTA UPDATES 26712.1 Need for Cybersecurity Monitoring and Secure OTA Updates 26812.2 Problem Statement: Software Inventory, Monitoring Vulnerabilities, and Vulnerable Vehicles 27112.3 Solution: Release Management, Monitoring and Tracking, and Secure OTA Updates 27212.3.1 Release Management 27312.3.2 Monitoring and Tracking 27612.3.2.1 Solutions in Other Industries 27612.3.2.2 Solutions in the Automotive Industry 27712.3.2.3 Example Automotive SOC Overview 27712.3.2.4 Example Automotive SOC Workflow 27912.3.2.5 Newly Detected Vulnerabilities in Open-Source Software – Example 27912.3.3 Secure OTA Updates 28012.3.3.1 Identify Vulnerable Vehicles Targeted for OTA Updates 28112.3.3.2 Perform Secure OTA Updates 28112.3.3.3 Target Systems for OTA Updates 28212.3.3.4 Overview of Secure OTA Update Process for ECUs 28312.3.3.5 Standardization and Frameworks for OTA Updates 28412.4 Chapter Summary 285References 28613 SUMMARY AND NEXT STEPS 289Index 293

Regulärer Preis: 116,99 €
Produktbild für Augmented Exploitation

Augmented Exploitation

Artificial Intelligence is a seemingly neutral technology, but it is increasingly used to manage workforces and make decisions to hire and fire employees. Its proliferation in the workplace gives the impression of a fairer, more efficient system of management. A machine can't discriminate, after all._Augmented Exploitation_ explores the reality of the impact of AI on workers' lives. While the consensus is that AI is a completely new way of managing a workplace, the authors show that, on the contrary, AI is used as most technologies are used under capitalism: as a smokescreen that hides the deep exploitation of workers.Going beyond platform work and the gig economy, the authors explore emerging forms of algorithmic governance and AI-augmented apps that have been developed to utilise innovative ways to collect data about workers and consumers, as well as to keep wages and worker representation under control. They also show that workers are not taking this lying down, providing case studies of new and exciting form of resistance that are springing up across the globe.FiguresSeries PrefaceAcknowledgementsIntroduction: AI: Making it, Faking it, Breaking it - Phoebe V. Moore and Jamie WoodcockPART I - MAKING IT1. AI Trainers: Who is the Smart Worker Today? - Phoebe V. Moore2. Work Now, Profit Later: AI Between Capital, Labour and Regulation - Toni Prug and Paško Bilić3. Delivering Food on Bikes: Between Machinic Subordination and Autonomy in the Algorithmic Workplace - Benjamin Herr4. Putting the Habitus to Work: Digital Prosumption, Surveillance and Distinction - Eduard Müller5. The Power of Prediction: People Analytics at Work - Uwe Vormbusch and Peter KelsPART II - FAKING IT6. Manufacturing Consent in the Gig Economy - Luca Perrig7. Automated and Autonomous? Technologies Mediating the Exertion and Perception of Labour Control - Beatriz Casas González8. Can Robots Produce Customer Confidence? Contradictions Among Automation, New Mechanisms of Control and Resistances in the Banking Labour Process - Giorgio BoccardoPART III - BREAKING IT9. It Gets Better With Age: AI and the Labour Process in Old and New Gig-Economy Firms - Adam Badger10. Self-Tracking and Sousveillance at Work: Insights from Human-Computer Interaction and Social Science - Marta E. Cecchinato, Sandy J. J. Gould and Frederick Harry Pitts11. Breaking Digital Atomisation: Resistant Cultures of Solidarity in Platform-Based Courier Work - Heiner Heiland and Simon Schaupp12. Resisting the Algorithmic Boss: Guessing, Gaming, Reframing and Contesting Rules in App-Based Management - Joanna Bronowicka and Mirela IvanovaNotes on ContributorsIndex

Regulärer Preis: 13,99 €
Produktbild für Beginning Entity Framework Core 5

Beginning Entity Framework Core 5

Use the code-driven approach of Entity Framework Core 5 to build a functional web application that accesses a database on the backend server. This book covers the common use cases of Entity Framework that a developer needs to master in order to begin building applications that run against a database. Throughout the book you will be shown how to use Entity Framework Core 5 by implementing a simple ASP.NET Core Razor Pages line-of-business application. This example application will be similar to those you might write yourself and deploy to your users on a web or intranet site via a browser.This book takes a code-first approach in which your database will be created and seeded programmatically. You won’t need to create the database through your database engine’s interface. Instead, you will be shown how to define your data model in Entity Framework, and then let Entity Framework do the work of creating your database and schema for you. From there you will learn how to seed your database with example data, then to implement the common, so-called CRUD operations consisting of creating, retrieving, updating, and deleting rows of data. By the end of the book you will have built a well-designed application that you can use as the basis for future applications that you create in your job.WHAT YOU WILL LEARN* Download and install Entity Framework Core 5* Perform create, read, update, and delete (CRUD) operations* Create and seed a database with example data using Entity Framework Core 5* Incrementally add new database functionality through Entity Framework Core 5 migrations* Recognize when to take advantage of new features introduced in Entity Framework Core 5* Deliver line-of-business applications using ASP.NET Core that run in a browserWHO THIS BOOKS IS FORDevelopers who are familiar with C# and the .NET Framework who want to learn database access using Entity Framework Core 5. For developers creating web-based, line-of-business applications who want to create those applications more quickly and efficiently when databases are involved.ERIC VOGEL is a seasoned contributor to Visual Studio Magazine and Senior Software Developer at Red Cedar Solutions Group. He has been developing .NET framework web and desktop solutions for 13 years. He holds a bachelor of science degree in computer science from Michigan State University. He is Acting President of the Greater Lansing User Group for .NET. IntroductionPART I. GETTING STARTED1. Installation2. Project StructurePART II. CORE FEATURES3. Entities4. Database Context5. Creating a Database from Code6. Seeding Data7. Getting Data8. Inserting Data9. Updating Data10. Deleting Data11. Navigation PropertiesPART III. ADVANCED FEATURES12. Aggregations13. Stored Procedures14. MigrationsPART IV. A MODEL WEB APPLICATION15. Authentication on the Web16. Displaying Data on the Web17. Inserting Data on the Web18. Updating Data on the Web19. Deleting Data on the Web20. Reporting on the Web21. Authorization on the WebPART V. LEARNING MORE22 Delving Deeper23 Conclusion

Regulärer Preis: 62,99 €
Produktbild für Beginning Power Apps

Beginning Power Apps

Transform the way your business works with easy-to-build apps. With this updated and expanded second edition, you can build business apps that work with your company's systems and databases, without having to enlist the expertise of costly, professionally trained software developers.In this new edition, business applications expert Tim Leung offers step-by-step guidance on how you can improve all areas of your business. He shows how you can replace manual or paper processes with modern apps that run on phone or tablet devices. For administrative and back-office operations, he covers how to build apps with workflow and dashboard capabilities. To facilitate collaboration with customers and clients, you’ll learn how to build secure web portals with data entry capabilities, including how to customize those portals with code.This hands-on new edition has 10 new chapters—including coverage on model-driven and portal apps, artificial intelligence, building components using the Power Apps Component Framework, using PowerShell for administration, and more—complete with context, explanatory screenshots, and non-technical terminology.WHAT YOU WILL LEARN* Create offline capable mobile apps and responsive web apps* Carry out logic, data access, and data entry through formulas* Embellish apps with charting, file handling, photo, barcode, and location features* Set up Common Data Service, SharePoint, and SQL data sources* Use AI to predict outcomes, recognize images, and analyze sentiment * Integrate apps with external web services and automate tasks with Power Automate * Build reusable code and canvas components, make customizations with JavaScript* Transfer apps and data, and secure, administer, and monitor Power Apps environmentsWHO THIS BOOK IS FORBeginners and non-developers, and assumes no prior knowledge of Power AppsTIM LEUNG is a software developer with more than 10 years of experience in designing and building large-scale commercial applications. He is a recognized expert in the field of rapid application development and his previous publication with Apress, Visual Studio LightSwitch, covers this topic in depth. Tim is a Microsoft certified developer, a chartered member of the British Computer Society, and holds a degree in information technology.PART I: POWER APP FUNDAMENTALSChapter 1: Introducing Power AppsChapter 2: Subscribing to Power AppsChapter 3: Creating Your First AppChapter 4: Sharing AppsChapter 5: Using FormulasPART II: WORKING WITH DATAChapter 6: Setting Up SharePoint, SQL, and moreChapter 7: Working with Tables and RowsChapter 8: Searching and Retrieving DataPART III: DEVELOPING CANVAS APPSChapter 9: Canvas App DesignChapter 10: Using Simple ControlsChapter 11: Using Table/Record Data ControlsPART IV: DEVELOPING MODEL DRIVEN AND PORTAL APPSChapter 12: Building a Dataverse DatabaseChapter 13:Developing Model-Driven AppsChapter 14: Building Portal AppsChapter 15: Retrieving Data from Portal Apps.PART V: ENHANCING APPSChapter 16: Working with Images and MediaChapter 17: Storing and Retrieving FilesChapter 18: Integrating Maps and Location ServicesChapter 19: Charting DataChapter 20: Adding Artificial Intelligence to AppsPART VI: REUSABILITYChapter 21: Building Reusable Canvas ComponentsChapter 22: Building Reusable Code ComponentsPART VII: OFFLINE AND INTEGRATIONChapter 23: Working OfflineChapter 24: Creating Custom Data ConnectorsPART VIII: ADMINISTRATIONChapter 25: Using Power AutomateChapter 26: Transferring Apps and DataChapter 27: Administering SecurityAppendix A - Sample App Data Structure

Regulärer Preis: 56,99 €
Produktbild für Quantum Machine Learning with Python

Quantum Machine Learning with Python

Quickly scale up to Quantum computing and Quantum machine learning foundations and related mathematics and expose them to different use cases that can be solved through Quantum based algorithms.This book explains Quantum Computing, which leverages the Quantum mechanical properties sub-atomic particles. It also examines Quantum machine learning, which can help solve some of the most challenging problems in forecasting, financial modeling, genomics, cybersecurity, supply chain logistics, cryptography among others.You'll start by reviewing the fundamental concepts of Quantum Computing, such as Dirac Notations, Qubits, and Bell state, followed by postulates and mathematical foundations of Quantum Computing. Once the foundation base is set, you'll delve deep into Quantum based algorithms including Quantum Fourier transform, phase estimation, and HHL (Harrow-Hassidim-Lloyd) among others.You'll then be introduced to Quantum machine learning and Quantum deep learning-based algorithms, along with advanced topics of Quantum adiabatic processes and Quantum based optimization. Throughout the book, there are Python implementations of different Quantum machine learning and Quantum computing algorithms using the Qiskit toolkit from IBM and Cirq from Google Research.WHAT YOU'LL LEARN* Understand Quantum computing and Quantum machine learning* Explore varied domains and the scenarios where Quantum machine learning solutions can be applied* Develop expertise in algorithm development in varied Quantum computing frameworks* Review the major challenges of building large scale Quantum computers and applying its various techniquesWHO THIS BOOK IS FORMachine Learning enthusiasts and engineers who want to quickly scale up to Quantum Machine LearningSantanu Pattanayak works as a staff machine learning specialist at Qualcomm Corp R&D and is an author of the book “Pro Deep Learning with TensorFlow” published by Apress. He has around 12 years of work experience and has worked at GE, Capgemini, and IBM before joining Qualcomm. He graduated with a degree in electrical engineering from Jadavpur University, Kolkata and is an avid math enthusiast. Santanu has a master’s degree in data science from Indian Institute of Technology (IIT), Hyderabad. He also participates in Kaggle competitions in his spare time where he ranks in top 500. Currently, he resides in Bangalore with his wife.QUANTUM MACHINE LEARNING WITH PYTHONChapter 1: Introduction to Quantum Mechanics and Quantum ComputingChapter Goal: Introduce the concept of Quantum mechanics and Quantum computing to the readersNo of pages 50-60Sub-Topics1. Introduction to Quantum computing2. Quantum bit and its realization3. Quantum superposition and Quantum entanglement4. Bloch Sphere representation of Qubit5. Stern Gerlach Experiment6. Bell State7. Dirac Notations8. Single Qubit Gates9. Multiple Qubit Gates10. Quantum No Cloning Theorem11. Measurement in different basis12. Quantum Teleportation13. Quantum parallelism with Deuth Jozsa14. Reversibility of quantum computingChapter 2: Mathematical Foundations and Postulates of Quantum ComputingChapter Goal: Lays the mathematical foundation along with the postulates of Quantum computingNo of pages 50-60Sub -Topics1. Topics from Linear algebra2. Pauli Operators3. Linear Operators and their properties4. Hermitian Operators5. Normal Operators6. Unitary Operators7. Spectral Decomposition8. Linear Operators on Tensor Product of Vectors9. Exponential Operator10. Commutator Anti commutator Operator11. Postulates of Quantum Mechanics12. Measurement Operators13. Heisenberg Uncertainty Principle14. Density Operators and Mixed States15. Solovay-Kitaev Theorem and Universality of Quantum gatesChapter 3: Introduction to Quantum AlgorithmsChapter Goal: Introduce to the readers Quantum algorithms to express the Quantum computing supremacy over classical computationNo of pages: 70-80Sub - Topics:1. Introduction to Cirq and Qiskit2. Bell State creation and measurement in Cirq and qiskit3. Quantum teleportation Implementation4. Quantum Random Number generator5. Deutsch Jozsa Implementation8. Hadamard Sampling6. Bernstein Vajirani Algorithm Implementation7. Bell’s Inequality Implementation8. Simon’s Algorithm of secret string search Implementation9 Grover’s Algorithm Implementation10. Algorithmic complexity in Quantum and Classical computing paradigmChapter 4: Quantum Fourier Transform Related AlgorithmsGoal: Introduce to the readers Quantum Fourier related algorithmsNo of pages: 60-70Sub - Topics:1. Fourier Series2. Fourier Transform3. Discrete Fourier Transform4. Quantum Fourier Transform(QFT)5. QFT implementation6. Hadamard Transform as Fourier Transform7. Quantum Phase Estimation(QPE)8. Quantum Phase Estimation Implementation9. Error Analysis in Quantum Phase Estimation10. Shor’s Period Finding Algorithm and Factoring11. Period Finding Implementation12. Prime Factoring and ImplementationPART 2Chapter 5: Introduction to Quantum Machine LearningGoal: Introduce to the readers Quantum machine learning paradigmNo of pages: 60-70Sub - Topics:1. Harrow, Hassidim and Lloyd Algorithm (HHL) for solving Linear Equation2. HHL algorithm Implementation3. Quantum Linear Regression and Implementation4. Quantum SWAP Test for dot product Computation5. Quantum SWAP Test Implementation6. Quantum Amplitude Scaling7. Quantum Euclidean Distance Computation8. Quantum Euclidean Distance Implementation9. Quantum K means10. Quantum K means Implementation11. Quantum Random Access Memory(QRAM)12. Quantum Principle Component Analysis13. Quantum Support Vector Machines14. Quantum Least Square Support Vector Machines(LS -SVM)15. Least Square SVM ImplementationChapter 6: Quantum Deep Learning and Quantum Optimization Based AlgorithmsGoal: Introduce to the readers Quantum deep learning algorithms and Quantum Optimization Based AlgorithmsNo of pages: 40-50Sub - Topics:1. Quantum Neural network and Implementation2. Quantum Convolutional Neural Network and Implementation3. Variational Quantum Eigen solvers(VQE)4. Graph Coloring Problem using VQE5. Travelling Salesman problem using VQEChapter 7: Quantum Adiabatic Processes and Quantum based Optimization.

Regulärer Preis: 56,99 €
Produktbild für Developing Web Components with TypeScript

Developing Web Components with TypeScript

Create professional and progressive web apps with the native HTML API on the latest technology stack. This book describes the basics of web components and how to create them using plain JavaScript as well as how to make professional applications based on web components using TypeScript.Developing Web Components with TypeScript looks at APIs using examples, techniques, and tricks. You will start with a brief introduction to web components, including slots and templates, handling custom events, and styling components with or without shadow DOM. Then, it introduces TypeScript as part of the tool set. It shows the internal construction of a professional thin library. It also helps you learn how to deal with web components in real-life projects; this includes techniques such as creating a single-page app without framework code. All code samples used here are supported by all modern browsers for you to follow along. Library code and examples are available on GitHub.WHAT YOU WILL LEARN* Create isolated web components using shadow DOM, slots, and templates* Understand the advantage of an enhanced toolset, especially TypeScript* Pick up styles and customizations* Master professional web apps using native APIs* Understand the life cycle of a componentWHO THIS BOOK IS FORProfessional developers who want to move from desktop to web and away from fat frameworks to achieve their goal.JÖRG KRAUSE has been working with software and software technology since the early 1980s, beginning with a ZX 81 and taking his first steps as a programmer in BASIC and assembly language. He studied information technology at Humboldt University, Berlin, but left early, in the 1990s, to start his own company. He has worked with Internet technology and software development since the early days when CompuServe and FidoNet dominated. He has worked with Microsoft technologies and software since Windows 95. In 1998, he worked on one of the first commercial e-commerce solutions and wrote his first book. Due to its wide success, he started working as a freelance consultant and author in order to share his experience and knowledge with others. He has written several books for Apress, Hanser, Addison Wesley, and other major publishers along with several self-published books—a total of over 60 titles. He also publishes articles in magazines and speaks at major conferences in Germany. Currently, Jörg works as an independent consultant, software developer, and author in Berlin, Germany.In his occasional spare time, Jörg enjoys reading thrillers and science fiction novels and going on a round of golf.Follow him on Twitter at @JOERGISGEEK for updates and insights.CHAPTER 1: IntroductionCHAPTER 2: Making Web ComponentsCHAPTER 3: Shadow DOMCHAPTER 4: EventsCHAPTER 5: TemplatesCHAPTER 6: SlotsCHAPTER 7: Components and StylesCHAPTER 8: Making Single Page AppsCHAPTER 9: Professional Web ComponentsAPPENDIX A - Component Library Documentation

Regulärer Preis: 62,99 €
Produktbild für Red Hat Certified Engineer (RHCE) Study Guide

Red Hat Certified Engineer (RHCE) Study Guide

Study the material in this book to prepare for the RHCE exam EX294 and to learn how using Ansible within your own environment improves system administration productivity.This book covers all of the objectives of the exam and extends further, ensuring that you know how to use Ansible to manage Linux. The book uses CentOS, a Red Hat-based distribution, and Ubuntu instead of using a single Red Hat distribution. By using the two distributions, you will understand the power of Ansible and how easily you can deal with multiple platforms, which is crucial for your understanding of Ansible in the real world.The book assumes no previous knowledge of Ansible but some knowledge of Linux system administration from the command line. You will learn how to manage Linux systems that are installed with different distributions, including CentOS Enterprise Linux 8 and Ubuntu 18.04. You will be able to manage these systems using ad hoc commands from the command line as well as creating Ansible playbooks that can be replayed reliably many times. To save on the code that you have to create, you will learn how to use Ansible Galaxy to search for and download roles and collections that are pre-written to manage elements of your Linux installations. By the end of this book, you will be able to write efficient and effective YAML playbooks to manage your entire estate.WHAT YOU WILL LEARN* Prepare systems so that password-less access can be used with Ansible remotely* Use ad hoc commands to quickly configure systems* Use and format YAML files correctly* Create playbooks that grow in their complexity as your experience develops* Ensure that services are restarted on configuration changesWHO THIS BOOK IS FORThose who want to prepare for the RHCE exam EX294 and readers who want to learn how to use Ansible to improve the productivity of their system administration. This book will help you prepare yourself for the exam as well as your real-life administration needs.ANDREW MALLETT is a well-known Linux consultant and trainer, and his YouTube Channel has over 65K subscribers and more than 1,000 videos. Working mainly online now, he has authored courses on both Pluralsight and Udemy, and regularly teaches classes online to a worldwide audience. Andrew is familiar with Linux and UNIX and has worked with them for over 20 years. Scripting and automation is one of his passions as he is inherently lazy and will always seek the most effective way of getting the job done. The Urban Penguin, his alter ego, is a UK-based company where he creates his work and currently employs five people.Chapter 1: Understanding Ansible and the Red Hat RHCECHAPTER GOAL: HELP THE READER IDENTIFY THE COURSE OF THE BOOK AND WHAT THEY NEED TO FOLLOW ALONGNO OF PAGES 10SUB -TOPICS1. Ansible and Red Hat2. Red Hat Certifications3. Lab systems used in the book4. Investigating the Lab Systems5. Installing Ansible on CentOS 86. Installing Ansible on Ubuntu 18.04Chapter 2: Working with the Ansible ConfigurationCHAPTER GOAL: GAIN AND UNDERSTANDING A CREATE ANSIBLE CONFIGURATION FILE AND ENFORCE THEIR USE WITH READ ONLY VARIABLESNO OF PAGES: 10SUB - TOPICS1. Identify the version of Ansible and the location of the configuration file used2. Understanding the Ansible configuration hierarchy3. Configuring read-only variables4. Printing Ansible configurations5. Creating basic configurationChapter 3: Creating an Ansible InventoryCHAPTER GOAL: THE INVENTORY IS A LIST OF HOSTS THAT WILL BE MANAGED FOR THAT PROJECT. THE READER WILL LEARN TO CREATE THE INVENTORY BOTH MANAUALYY AND AUTOMATED SEARCHES. INVENTORY GROUPS ALLOW FOR MORE DIRECTED TARGETING OF TASKS.No of pages : 10SUB - TOPICS:1. Adding hosts to the inventory2. Using NMAP to discover SSH hosts and add to inventory3. Creating inventory groups4. Printing inventory entries5. Implementing host and group variablesChapter 4: Using ad-hoc commands and Ansible preparationChapter Goal: Allow the reader to start using ansible and prepare for more automated useNO OF PAGES: 10SUB - TOPICS:1. Generating a local ssh key pair2. Testing Ansible connections3. Using Ansible to distribute the user’s public key4. Enabling password-less access to sudo5. Gaining invaluable help on Ansible modules6. Creating and removing users with AnsibleChapter 5: Writing YAML and Basic PlaybooksChapter Goal: Playbooks are written n YAML so it is important to understand how to write YAML files and basic playbooksNO OF PAGES: 10SUB - TOPICS:1. Understanding YAML files2. Configuring the VIM text editor for YAML3. Using Microsoft Visual Code to edit YAML files4. Creating a simple Ansible playbook5. Using facts in playbooksChapter 6: Managing Users in Ansible PlaybooksChapter Goal: Something that is to understand and user is to create and manage users with Ansible. The user password needs to be encrypted and we can generate encrypted passwords in many ways including Python and CNO OF PAGES: 15SUB - TOPICS:1. Using playbooks to create and remove users2. Creating multiple users with loops3. Using variables in playbooks4. Using logic in the playbook5. Using Python the generate passwords6. Creating a C program to generate passwords7. Managing user passwords in Ansible8. Creating a dedicated Ansible user accountChapter 7: Working with Variables and FactsChapter Goal: Playbooks can be more useful when we make use of system facts and variables. This is especially important when working with different OS familiesNO OF PAGES: 10SUB - TOPICS:1. Linux distribution differences2. Catering for Red Hat and Debian families3. Deploying Apache to CentOS and Ubuntu4. Creating administrators in both CentOS and UbuntuChapter 8: Working with Files and TemplatesCHAPTER GOAL: BEING ABLE TO DELIVER COMPLETE FILES OR EDIT FILES OR REALLY NEEDED TO MAKE ANSIBLE USABLE. WE CAN ALSO USE TEMPLATE FOR GREAT CUSTOMIZATIONS.NO OF PAGES: 10SUB - TOPICS:1. Copying files using the copy module2. Editing files using the lineinfile module3. Creating Jinja2 templates4. Deploying customized message of the day files in LinuxChapter 9: Managing Services using AnsibleCHAPTER GOAL: THE SERVICE MODULE IS QUITE SIMPLE BUT THIS MAKES A GREAT PLACE TO INTRODUCE HANDLERS TO RESTART SERVICES AS FILES CHANGENO OF PAGES: 10SUB - TOPICS:1. The service module and the systemd module2. Using handlers to restart services3. Securing the SSH Server in CentOS and Ubuntu4. Deploying customized message of the day files in LinuxChapter 10: Securing Sensitive Data with Ansible VaultChapter Goal: Sensitive data, such as passwords should not be stored in clear text. Ansible vault is the solutionNO OF PAGES: 10SUB - TOPICS:1. Obscuring clear text data2. Creating encrypted files with Ansible vault3. Creating users with vault dataChapter 11: Implementing a Full Apache DeploymentCHAPTER GOAL: DEPLOYING APACHE IS MORE THAN SIMPLY INSTALLING THE WEB SERVER AND STARTING THE SERVER. THIS IS WHERE ANSIBLE REALLY COMES INTO ITS OWN. THE PLAYBOOK CAN EASILY BE WRITTEN TO BOTH DOCUMENT AND EXECUTE EACH AND EVERY ELEMENT OF THE DEPLOYMENT WITHOUT ANYTHING BEING MISSED.No of pages: 15SUB - TOPICS:1. Identifying the tasks required in installing and configuring Apache2. Create inventory groups and variables3. Create handler to restart service4. Install Apache5. Configure ServerName directive6. Secure the DocumentRoot7. Create web page8. Open firewalld and ufw ports9. Enable the Apache serviceChapter 12: Simplifying Playbooks Using RolesCHAPTER GOAL: A SINGLE PLAYBOOK CAN BECOME A HEFTY DOCUMENT, CRATING ROLES GIVES YOU A MORE MODULAR APPROACH TO LARGER DEPLOYMENTSNO OF PAGES: 10SUB - TOPICS:1. Centralizing code in roles2. Using Ansible Galaxy to Create Roles3. Migrating the Apache playbook to a role4. Deploying the roleChapter 13: Downloading RolesCHAPTER GOAL: AS WELL AS ROLES THAT WE CAN CREATE WE CAN MAKE USE OF PRE-CREATED ROLES AND COLLECTIONS THAT WE CAN INSTALLNO OF PAGES: 10SUB - TOPICS:1. Understanding Roles and Collections2. Searching roles from the command line and the web3. Downloading the PHP collections4. Deploying the PHP role to webserver5. Downloading the MySQL collection6. Deploying the MySQL roleChapter 14: Configuring Storage with AnsibleCHAPTER GOAL: A MAIN CONFIGURATION TASK IN LINUX IS TO CREATE AND MANAGE STORAGE, WE SHOW HOW WE CAN AUTOMATE THIS WITH ANSIBLENo of pages: 10SUB - TOPICS:1. Partitioning disks2. Managing LVM volume groups3. Managing LVM volumes4. Creating file-systems5. Mounting filesystems6. Managing VDO in CentOS 8 with AnsibleChapter 15: Managing Scheduled Tasks with AnsibleCHAPTER GOAL: ANOTHER FEATURE OF ADMINISTRATION AND THE EX294 EXAM IS TO BE ABLE TO MANAGE SCHEDULED TASKS WITH ANSIBLENO OF PAGES: 5SUB - TOPICS:1. Scheduled tasks in Linux2. Creating cron entries using Ansible3. Creating irregular tasks with using at and Ansible

Regulärer Preis: 46,99 €
Produktbild für Trends In Cybersecurity

Trends In Cybersecurity

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Regulärer Preis: 2,51 €
Produktbild für Advanced Gatsby Projects

Advanced Gatsby Projects

Roll your sleeves up and master advanced topics in Gatsby development by building two production-ready websites. This project-focused book teaches you how to use Gatsby alongside the latest technologies including Snipcart, and Firebase. It builds off of Foundation Gatsby Projects and it's recommended that you complete that first if you are new to Gatsby.In the first project, you will create a fully functional e-commerce site for a restaurant using Snipcart. Lastly, you’ll learn to build a recipe site using the Firebase database.Many Gatsby tutorials out there today only cover how to create a simple blog site – get ahead of the crowd using this book today.WHAT YOU'LL LEARN* Create an e-commerce site in no time using Snipcart with Gatsby* Work with the Firebase database from Google in a Gatsby site* Deploy all sites in Netlify* Add functionalities with the powerful Gatsby plugin ecosystemWHO THIS BOOK IS FORAnyone who wants to create a site using Gatsby, though knowledge of React and Gatsby is expected. You will need to be familiar with JavaScript concepts and be confident with basic web development. It is advisable to complete Foundation Gatsby Projects first if you have no Gatsby experience.NABENDU BISWAS is a full stack JavaScript developer who has been working in the IT industry for the past 15 years and has worked for some of the world’s top development firms and investment banks. He is a passionate tech blogger who publishes on dev.to and medium.com and on thewebdev.tech. He is an all-round nerd, passionate about everything JavaScript, React and Gatsby. You can find him on Twitter @nabendu82.PART 1: CREATING AN ECOMMERCE WEB SITE WITH SNIPCART:Chapter 1: Setting up the eCommerce SiteChapter 2: Adding Core Features to the SiteChapter 3: Setting Up ContentfulChapter 4: Using Webhooks at the SiteChapter 5: Making the Site Dynamic with SnipcartPART 2: CREATING A RECIPE WEBSITE WITH FIREBASEChapter 6: Setting up the Recipe SiteChapter 7: Displaying Recipes from FirebaseChapter 8: Displaying Images from FirebaseChapter 9: Deploying the Recipe Site in NetlifyChapter 10: Adding a Disqus Commenting System

Regulärer Preis: 52,99 €
Produktbild für Gatsby E-Commerce

Gatsby E-Commerce

Leverage the power of Gatsby to quickly produce e-commerce sites that are efficient, fast, and secure. This project-oriented book simplifies the process of setting up a Gatsby e-commerce site from start to finish, providing a starting toolset that you can use to develop future projects and incorporate into your existing workflows.You'll learn to reduce reliance on tools that are bloated, prone to being hacked, and not the most efficient, and move over to the newest framework on the block. You'll also see how to use the Gatsby framework to rapidly create and deploy e-commerce sites that are performant and secure, with the minimum of fuss.Understand how to source data, build a catalog, add a blog, finesse your site (including performance), implement the checkout and payment processes with the help of third-party tools such as Stripe, and deploy to production. Finally, you'll learn how to migrate existing WooCommerce sites to Gatsby, and adapt for mobile.Gatsby is fast and does away with the need for databases, thereby removing one of the biggest weak spots in any e-commerce site. It is based on Node.js and JavaScript, making it easy to extend and customize as requirements dictate. Learn to make your customers’ lives easier and simpler using this book today.WHAT YOU'LL LEARN* Implement e-commerce sites using Gatsby* Explore some of the options for architecting an e-commerce site using this framework* Gain an appreciation of pointers around maintenance requirements and ancillary needs (such as SEO)* Compare your site to others that use different tools* Work through a project from start to finish, understanding what can be achieved using Gatsby, and where other tools may need to be brought into playWHO THIS BOOK IS FOR* Developers already familiar with JavaScript, who are keen to learn how to leverage the Gatsby framework to quickly create the basis of an e-commerce offer (from scratch, or using data tools such as WooCommerce to support a transition), with little more than a text editor. * Developers who want to focus on simplicity, to produce efficient and properly optimized e-commerce sites in modern browsers using tools already in their possession.* Those in agile development teams, where time is of the essence, and the pressure is on to deliver results quickly. ALEX LIBBY is a front-end engineer and seasoned computer book author, who hails from England. His passion for all things Open Source dates back to the days of his degree studies, where he first came across web development, and has been hooked ever since. His daily work involves extensive use of JavaScript, HTML and CSS to manipulate existing website content; Alex enjoys tinkering with different open source libraries to see how they work. He has spent a stint maintaining the jQuery Tools library, and enjoys writing about Open Source technologies, principally for front end UI development.PART 1Chapter 1. Getting StartedChapter 2. Laying the FoundationsPART 2Chapter 3. Styling the ShopChapter 4. Sourcing DataChapter 5. Building the CatalogChapter 6. Checkout and Order ProcessingPART 3Chapter 7. Adding a BlogChapter 8. Finessing our siteChapter 9. Testing and OptimizationChapter 10. Deployment into ProductionPART 4Chapter 11. Migrating from WooCommerceChapter 12. Adapting for MobileChapter 13. Updating the Payment Process

Regulärer Preis: 56,99 €
Produktbild für Machtwechsel der Intelligenzen

Machtwechsel der Intelligenzen

Das Buch führt dem am gesellschaftlichen Leben interessierten Leser allgemein verständlich vor Augen, wie KI funktioniert und wie sie alle Lebensräume dramatisch verändern wird. Von der Geschichte der KI über ihre Techniken und ihre vielfältigen Anwendungsfelder bis zu ihren ethisch-philosophischen Implikationen werden alle relevanten Aspekte ausführlich dargestellt. Der Autor bleibt dabei nicht im Deskriptiven, sondern nimmt auch mit klaren Worten kritisch Stellung zur KI-Entwicklung. Für den Leser sind die Ausführungen als fachliches Stützkorsett angelegt, um gegenüber den KI-Experten als kundiger Counterpart auftreten zu können. Die letzten beiden Kapitel entführen den Leser in die Zukunft des Lebens mit der Super-KI. Mit gewagten Szenarien alarmiert der Autor den Leser auf vergnügliche Weise, welch atemberaubende und gesellschaftlich hochexplosive Perspektiven sich mit der KI verbinden und welche ethischen und philosophischen Fragestellungen sich daraus ergeben. PROF. DR. GÜNTER CISEK, der große Organisationen wie IMF und Weltbank berät und regelmäßig Gastprofessuren in Asien übernimmt, thematisiert mit Sprachwitz gesellschaftskritische Themen stets mit großer kosmopolitischer Erfahrung und interdisziplinärem Ansatz. Der Leser kann sich stets darauf verlassen, dass er nicht nur beschreibt und analysiert, sondern gesellschaftskritisch auch stets wertend Stellung bezieht. Wie viel und was für künstliche Intelligenz verträgt der Mensch?.-Weißt Du, wie es ward? - Die Geschichte der KI.-Wie funktioniert KI? - Techniken der KI.-Wie realisiert sich KI? - KI bestimmt unser Leben.-Kaufst Du noch oder „influenzt“ Du schon? – Handel 4.0.-Wohin mit der „Sozialbrache“? – Industrie 4.0.-Wie verändert sich unser Miteinander? - Gesellschaftliche Implikationen der KI.-Paradiesische Zeiten oder das Ende der Welt? - Die Zukunft mit KI.

Regulärer Preis: 49,99 €
Produktbild für Practical WebDriverIO

Practical WebDriverIO

Learn how to quickly set up the test automation tool WebdriverIO, one of the major Node.js-based test frameworks. Software testing is here to stay, and an integral part of this is test automation. Dive into the amazing possibilities that WebDriverIO offers to automate browser interactions for a user of any web application.You will learn to automate a vast range of actions that a user takes to interact with the browser. From a simple click to more complex user actions such as frame switches, selecting from drop-downs, and file downloads using WebDriverIO APIs. You will also learn about assertions, timeouts, waits, parallel testing frameworks, and the general pros and cons of WebDriverIO.With over 150 working code samples demonstrating various test scenarios that you require in your day-to-day automation testing, this book is your practical handbook to WebDriverIO.WHAT YOU'LL LEARN* Set up and install WebdriverIO efficiently* Run parallel execution using WebdriverIO* Review the pros, cons and challenges you may face with WebdriverIO* Ensure optimum usage and avoid common mistakesWHO THIS BOOK IS FORThis book is ideal for test engineers who have a basic understanding of test automation with Selenium, developers who want to implement this testing tool for internal testing, Test Managers/IT Project Managers who want to get some general understanding of this tool and its advantage, and students who want to pursue career in test automation.SHASHANK SHUKLA has been working in software testing for over a decade and is passionate about tools and technology that can be leveraged to enrich the testing experience and optimize the quality of delivery. This is his first book.1. Getting Started2. Web Locators3. Browser APIs4. Element APIs and WebdriverIO Assertions5. Additional WebDriverIO Methods6. Other Useful APIs7. Waits8. Timeouts9. Framework Options and Design Pattern10. Assertions11. Configuration File12. Conclusion

Regulärer Preis: 62,99 €
Produktbild für IT und IT-Sicherheit in Begriffen und Zusammenhängen

IT und IT-Sicherheit in Begriffen und Zusammenhängen

Verloren im Dschungel der vielen Begriffe und Modewörter in der IT und der IT-Sicherheit? Genervt von ausschweifenden Internet-Texten, unverständlichen Insider-Beiträgen und fragwürdigen Darstellungen? Dieses Kompendium informiert zweckdienlich, präzise und objektiv. Die Begriffe werden leicht verständlich erklärt. Die thematische Sortierung lädt zum Weiterlesen ein, sodass Sie sich mühelos ein kleines oder größeres Teilgebiet erschließen können. Mit Hilfe alphabetischer Verzeichnisse für Fachbegriffe und kommentierte Abkürzungen finden Sie schnell den gesuchten Begriff. Die Texte versuchen niemals zu überzeugen oder gar etwas anzubieten oder zu verkaufen, wie man es häufig im Internet findet. Das Buch ist ein Kompendium, das Sie nicht komplett lesen müssen und doch alles bietet.Umfang und Themenwahl sind einzigartig: IT-Sicherheit, Informationstechnik und Netze, marktgängige IT-Services, Produktionsprozesse, Sicherheitsprodukte, etwas Kryptografie sowie vieles über Verträge und Geschäfte.PROF. DR. EBERHARD VON FABER arbeitet als Chief Security Advisor, IT Services, bei T-Systems. Er verfügt über fast 30 Jahre Industrieerfahrung auf dem Gebiet der IT-Sicherheit und lehrt als Professor für IT-Sicherheit an der Technischen Hochschule Brandenburg. Seine Spezialthemen sind Sicherheitsarchitekturen und die Interaktion in industriellen Liefernetzwerken für mehr und bessere Informationssicherheit. Allgemeine IT-Sicherheit - Identitäts- und Zugriffsmanagement (IAM) - IT/TK-Services und Informationstechnologie - IT-Verfahren, Abläufe und Prozesse - Produkte und Produktgruppen der IT-Sicherheit - Kunden, Verträge und Geschäfte - Kryptografie.

Regulärer Preis: 46,99 €
Produktbild für Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Creating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection

Microsoft Azure, commonly referred to as Azureis a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through Microsoft-managed data centers. It provides software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS) and supports many different programming languages, tools, and frameworks, including both Microsoft-specific and third-party software and systems. The major benefit of a remote desktop connection is being able to connect to your data from anywhere in the world. Your data is in one place that is easy to see and you no longer have to have software installed on your own computer.Azure is one of the best virtual computers and networks providers for remote desktop (RDP) connections. When you create Azure account, you pay as you go. You purchase Azure services with pay-as-you-go pricing. You pay only for what you use each month, with no upfront commitment, and cancel anytime. You must add your credit/debit card for billing to use pay as you go subscription.But I was looking for totally free subscription where I dont need to add my credit card for billing. I found there are two possible options for that:1) A sandbox gives you access to Azure resources. Your Azure subscription will not be charged. The sandbox may only be used to complete training on Microsoft Learn. Creating the Azure Virtual machines using sandbox which is learning subscription, you can connect to the VM via RDP port but you cannot access to Internet through the Internet Explorer. 2) Alternatively Microsoft Azure provides a free $100 credit for students accounts registered through university emails (free student subscription for around one year). There is internet access in the VM machine under this type of subscription.Azure documentations is too deep and it is hard to be understand creating and managing virtual computers and networks in Auzre for remote access connection by any beginner. So, I tried to outline in this report the most important topics as reference guide to assist the user to create and manage virtual computers and networks in Azure for remote access connection in simplified and clear way. This report will include the following parts:1.Getting free Azure subscription through Sandbox Microsoft Learn subscription (No credit card needed)2.Free 12 months, then pay-as-you-go Azure account subscription (Credit card needed) 3.Student subscription (No debit/credit cards needed)4.How to get university email5.Virtual networks and virtual machines in Azure6.Quick start for PowerShell in Azure Cloud Shell7.Quick start with Azure PowerShell8.Installing Azure CLI on Windows and creating virtual machine9.Creating a Windows virtual machine in Azure10.Quick start to create a Linux virtual machine in the Azure portal11.Tutorial to create a NAT Gateway using the Azure portal and test the NAT service12.What is Azure Network Watcher?13.Network Watcher Agent14.Troubleshoot connections with Azure Network Watcher using the Azure portal15.Troubleshoot Azure VM connectivity problems16.Quick start to configure Load Balancer17.Quick start to configure VPN Gateway using Azure portal18.Tutorial to connect to a virtual machine using Azure Bastion19.Exercise to create Window Virtual Machine 20.Exercise to create Ubuntu Virtual MachineI am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 6,49 €
Produktbild für Integration of Cloud Computing with Internet of Things

Integration of Cloud Computing with Internet of Things

The book aims to integrate the aspects of IoT, Cloud computing and data analytics from diversified perspectives. The book also plans to discuss the recent research trends and advanced topics in the field which will be of interest to academicians and researchers working in this area. Thus, the book intends to help its readers to understand and explore the spectrum of applications of IoT, cloud computing and data analytics.Here, it is also worth mentioning that the book is believed to draw attention on the applications of said technology in various disciplines in order to obtain enhanced understanding of the readers. Also, this book focuses on the researches and challenges in the domain of IoT, Cloud computing and Data analytics from perspectives of various stakeholders.MONIKA MANGLA PhD is an Assistant Professor in the Department of Computer Engineering at Lokmanya Tilak College of Engineering (LTCoE), Mumbai, India. Her research areas include IoT, cloud computing, algorithms and optimization, location modelling and machine learning.SUNEETA SATPATHY PhD is an Associate Professor in the Department of Computer Science & Engineering at College of Engineering Bhubaneswar (CoEB), Bhubaneswar. Her research interests include computer forensics, cybersecurity, data fusion, data mining, big data analysis, and decision mining.BHAGIRATHI NAYAK has 25 years of experience in the areas of computer science and engineering and database designing. Prof. Nayak earned his PhD in Computer Science from IIT Kharagpur. He is currently associated with Sri Sri University, Cuttack as head of the Department of Information & Communication Technology. He has obtained five patents in the area of computer science and engineering and his areas of interest are data mining, big data analytics, artificial intelligence and machine learning.SACHI NANDAN MOHANTY obtained his PhD from IIT Kharagpur in 2015 and is now an Associate Professor in the Department of Computer Science & Engineering at ICFAI Foundation for Higher Education Hyderabad. Dr. Mohanty’s research areas include data mining, big data analysis, cognitive science, fuzzy decision making, brain-computer interface, and computational intelligence.Preface xvAcknowledgement xvii1 INTERNET OF THINGS: A KEY TO UNFASTEN MUNDANE REPETITIVE TASKS 1Hemanta Kumar Palo and Limali Sahoo1.1 Introduction 11.2 The IoT Scenario 21.3 The IoT Domains 31.3.1 The IoT Policy Domain 31.3.2 The IoT Software Domain 51.3.2.1 IoT in Cloud Computing (CC) 51.3.2.2 IoT in Edge Computing (EC) 61.3.2.3 IoT in Fog Computing (FC) 101.3.2.4 IoT in Telecommuting 111.3.2.5 IoT in Data-Center 121.3.2.6 Virtualization-Based IoT (VBIoT) 121.4 Green Computing (GC) in IoT Framework 121.5 Semantic IoT (SIoT) 131.5.1 Standardization Using oneM2M 151.5.2 Semantic Interoperability (SI) 181.5.3 Semantic Interoperability (SI) 191.5.4 Semantic IoT vs Machine Learning 201.6 Conclusions 21References 212 MEASURES FOR IMPROVING IOT SECURITY 25Richa Goel, Seema Sahai, Gurinder Singh and Saurav Lall2.1 Introduction 252.2 Perceiving IoT Security 262.3 The IoT Safety Term 272.4 Objectives 282.4.1 Enhancing Personal Data Access in Public Repositories 282.4.2 Develop and Sustain Ethicality 282.4.3 Maximize the Power of IoT Access 292.4.4 Understanding Importance of Firewalls 292.5 Research Methodology 302.6 Security Challenges 312.6.1 Challenge of Data Management 322.7 Securing IoT 332.7.1 Ensure User Authentication 332.7.2 Increase User Autonomy 332.7.3 Use of Firewalls 342.7.4 Firewall Features 352.7.5 Mode of Camouflage 352.7.6 Protection of Data 352.7.7 Integrity in Service 362.7.8 Sensing of Infringement 362.8 Monitoring of Firewalls and Good Management 362.8.1 Surveillance 362.8.2 Forensics 372.8.3 Secure Firewalls for Private 372.8.4 Business Firewalls for Personal 372.8.5 IoT Security Weaknesses 372.9 Conclusion 37References 383 AN EFFICIENT FOG-BASED MODEL FOR SECURED DATA COMMUNICATION 41V. Lakshman Narayana and R. S. M. Lakshmi Patibandla3.1 Introduction 413.1.1 Fog Computing Model 423.1.2 Correspondence in IoT Devices 433.2 Attacks in IoT 453.2.1 Botnets 453.2.2 Man-In-The-Middle Concept 453.2.3 Data and Misrepresentation 463.2.4 Social Engineering 463.2.5 Denial of Service 463.2.6 Concerns 473.3 Literature Survey 483.4 Proposed Model for Attack Identification Using Fog Computing 493.5 Performance Analysis 523.6 Conclusion 54References 544 AN EXPERT SYSTEM TO IMPLEMENT SYMPTOM ANALYSIS IN HEALTHCARE 57Subhasish Mohapatra and Kunal Anand4.1 Introduction 574.2 Related Work 594.3 Proposed Model Description and Flow Chart 604.3.1 Flowchart of the Model 604.3.1.1 Value of Symptoms 604.3.1.2 User Interaction Web Module 604.3.1.3 Knowledge-Base 604.3.1.4 Convolution Neural Network 604.3.1.5 CNN-Fuzzy Inference Engine 614.4 UML Analysis of Expert Model 624.4.1 Expert Module Activity Diagram 634.4.2 Ontology Class Collaboration Diagram 654.5 Ontology Model of Expert Systems 664.6 Conclusion and Future Scope 67References 685 AN IOT-BASED GADGET FOR VISUALLY IMPAIRED PEOPLE 71Prakash, N., Udayakumar, E., Kumareshan, N., Srihari, K. and Sachi Nandan Mohanty5.1 Introduction 715.2 Related Work 735.3 System Design 745.4 Results and Discussion 825.5 Conclusion 845.6 Future Work 84References 846 IOT PROTOCOL FOR INFERNO CALAMITY IN PUBLIC TRANSPORT 87Ravi Babu Devareddi, R. Shiva Shankar and Gadiraju Mahesh6.1 Introduction 876.2 Literature Survey 896.3 Methodology 946.3.1 IoT Message Exchange With Cloud MQTT Broker Based on MQTT Protocol 986.3.2 Hardware Requirement 986.4 Implementation 1036.4.1 Interfacing Diagram 1056.5 Results 1066.6 Conclusion and Future Work 108References 1097 TRAFFIC PREDICTION USING MACHINE LEARNING AND IOT 111Daksh Pratap Singh and Dolly Sharma7.1 Introduction 1117.1.1 Real Time Traffic 1117.1.2 Traffic Simulation 1127.2 Literature Review 1127.3 Methodology 1137.4 Architecture 1167.4.1 API Architecture 1177.4.2 File Structure 1177.4.3 Simulator Architecture 1187.4.4 Workflow in Application 1227.4.5 Workflow of Google APIs in the Application 1227.5 Results 1227.5.1 Traffic Scenario 1227.5.1.1 Low Traffic 1247.5.1.2 Moderate Traffic 1247.5.1.3 High Traffic 1257.5.2 Speed Viewer 1257.5.3 Traffic Simulator 1267.5.3.1 1st View 1267.5.3.2 2nd View 1287.5.3.3 3rd View 1287.6 Conclusion and Future Scope 128References 1298 APPLICATION OF MACHINE LEARNING IN PRECISION AGRICULTURE 131Ravi Sharma and Nonita Sharma8.1 Introduction 1318.2 Machine Learning 1328.2.1 Supervised Learning 1338.2.2 Unsupervised Learning 1338.2.3 Reinforcement Learning 1348.3 Agriculture 1348.4 ML Techniques Used in Agriculture 1358.4.1 Soil Mapping 1358.4.2 Seed Selection 1408.4.3 Irrigation/Water Management 1418.4.4 Crop Quality 1438.4.5 Disease Detection 1448.4.6 Weed Detection 1458.4.7 Yield Prediction 1478.5 Conclusion 148References 1499 AN IOT-BASED MULTI ACCESS CONTROL AND SURVEILLANCE FOR HOME SECURITY 153Yogeshwaran, K., Ramesh, C., Udayakumar, E., Srihari, K. and Sachi Nandan Mohanty9.1 Introduction 1539.2 Related Work 1559.3 Hardware Description 1569.3.1 Float Sensor 1589.3.2 Map Matching 1589.3.3 USART Cable 1599.4 Software Design 1619.5 Conclusion 162References 16210 APPLICATION OF IOT IN INDUSTRY 4.0 FOR PREDICTIVE ANALYTICS 165Ahin Banerjee, Debanshee Datta and Sanjay K. Gupta10.1 Introduction 16510.2 Past Literary Works 16810.2.1 Maintenance-Based Monitoring 16810.2.2 Data Driven Approach to RUL Finding in Industry 16910.2.3 Philosophy of Industrial-IoT Systems and its Advantages in Different Domain 17310.3 Methodology and Results 17610.4 Conclusion 179References 18011 IOT AND ITS ROLE IN PERFORMANCE ENHANCEMENT IN BUSINESS ORGANIZATIONS 183Seema Sahai, Richa Goel, Parul Bajaj and Gurinder Singh11.1 Introduction 18311.1.1 Scientific Issues in IoT 18411.1.2 IoT in Organizations 18511.1.3 Technology and Business 18711.1.4 Rewards of Technology in Business 18711.1.5 Shortcomings of Technology in Business 18811.1.6 Effect of IoT on Work and Organization 18811.2 Technology and Productivity 19011.3 Technology and Future of Human Work 19311.4 Technology and Employment 19411.5 Conclusion 195References 19512 AN ANALYSIS OF CLOUD COMPUTING BASED ON INTERNET OF THINGS 197Farhana Ajaz, Mohd Naseem, Ghulfam Ahamad, Sparsh Sharma and Ehtesham Abbasi12.1 Introduction 19712.1.1 Generic Architecture 19912.2 Challenges in IoT 20212.3 Technologies Used in IoT 20312.4 Cloud Computing 20312.4.1 Service Models of Cloud Computing 20412.5 Cloud Computing Characteristics 20512.6 Applications of Cloud Computing 20612.7 Cloud IoT 20712.8 Necessity for Fusing IoT and Cloud Computing 20712.9 Cloud-Based IoT Architecture 20812.10 Applications of Cloud-Based IoT 20812.11 Conclusion 209References 20913 IMPORTANCE OF FOG COMPUTING IN EMERGING TECHNOLOGIES-IOT 211Aarti Sahitya13.1 Introduction 21113.2 IoT Core 21213.3 Need of Fog Computing 227References 23014 CONVERGENCE OF BIG DATA AND CLOUD COMPUTING ENVIRONMENT 233Ranjan Ganguli14.1 Introduction 23314.2 Big Data: Historical View 23414.2.1 Big Data: Definition 23514.2.2 Big Data Classification 23614.2.3 Big Data Analytics 23614.3 Big Data Challenges 23714.4 The Architecture 23814.4.1 Storage or Collection System 24014.4.2 Data Care 24014.4.3 Analysis 24014.5 Cloud Computing: History in a Nutshell 24114.5.1 View on Cloud Computing and Big Data 24114.6 Insight of Big Data and Cloud Computing 24114.6.1 Cloud-Based Services 24214.6.2 At a Glance: Cloud Services 24414.7 Cloud Framework 24514.7.1 Hadoop 24514.7.2 Cassandra 24614.7.2.1 Features of Cassandra 24614.7.3 Voldemort 24714.7.3.1 A Comparison With Relational Databases and Benefits 24714.8 Conclusions 24814.9 Future Perspective 248References 24815 DATA ANALYTICS FRAMEWORK BASED ON CLOUD ENVIRONMENT 251K. Kanagaraj and S. Geetha15.1 Introduction 25115.2 Focus Areas of the Chapter 25215.3 Cloud Computing 25215.3.1 Cloud Service Models 25315.3.1.1 Software as a Service (SaaS) 25315.3.1.2 Platform as a Service (PaaS) 25415.3.1.3 Infrastructure as a Service (IaaS) 25515.3.1.4 Desktop as a Service (DaaS) 25615.3.1.5 Analytics as a Service (AaaS) 25715.3.1.6 Artificial Intelligence as a Service (AIaaS) 25815.3.2 Cloud Deployment Models 25915.3.3 Virtualization of Resources 26015.3.4 Cloud Data Centers 26115.4 Data Analytics 26315.4.1 Data Analytics Types 26315.4.1.1 Descriptive Analytics 26315.4.1.2 Diagnostic Analytics 26415.4.1.3 Predictive Analytics 26515.4.1.4 Prescriptive Analytics 26515.4.1.5 Big Data Analytics 26515.4.1.6 Augmented Analytics 26615.4.1.7 Cloud Analytics 26615.4.1.8 Streaming Analytics 26615.4.2 Data Analytics Tools 26615.5 Real-Time Data Analytics Support in Cloud 26615.6 Framework for Data Analytics in Cloud 26815.6.1 Data Analysis Software as a Service (DASaaS) 26815.6.2 Data Analysis Platform as a Service (DAPaaS) 26815.6.3 Data Analysis Infrastructure as a Service (DAIaaS) 26915.7 Data Analytics Work-Flow 26915.8 Cloud-Based Data Analytics Tools 27015.8.1 Amazon Kinesis Services 27115.8.2 Amazon Kinesis Data Firehose 27115.8.3 Amazon Kinesis Data Streams 27115.8.4 Amazon Textract 27115.8.5 Azure Stream Analytics 27115.9 Experiment Results 27215.10 Conclusion 272References 27416 NEURAL NETWORKS FOR BIG DATA ANALYTICS 277Bithika Bishesh16.1 Introduction 27716.2 Neural Networks—An Overview 27816.3 Why Study Neural Networks? 27916.4 Working of Artificial Neural Networks 27916.4.1 Single-Layer Perceptron 27916.4.2 Multi-Layer Perceptron 28016.4.3 Training a Neural Network 28116.4.4 Gradient Descent Algorithm 28216.4.5 Activation Functions 28416.5 Innovations in Neural Networks 28816.5.1 Convolutional Neural Network (ConvNet) 28816.5.2 Recurrent Neural Network 28916.5.3 LSTM 29116.6 Applications of Deep Learning Neural Networks 29216.7 Practical Application of Neural Networks Using Computer Codes 29316.8 Opportunities and Challenges of Using Neural Networks 29316.9 Conclusion 296References 29617 META-HEURISTIC ALGORITHMS FOR BEST IOT CLOUD SERVICE PLATFORM SELECTION 299Sudhansu Shekhar Patra, Sudarson Jena, G.B. Mund, Mahendra Kumar Gourisaria and Jugal Kishor Gupta17.1 Introduction 29917.2 Selection of a Cloud Provider in Federated Cloud 30117.3 Algorithmic Solution 30717.3.1 TLBO Algorithm (Teaching-Learning-Based Optimization Algorithm) 30717.3.1.1 Teacher Phase: Generation of a New Solution 30817.3.1.2 Learner Phase: Generation of New Solution 30917.3.1.3 Representation of the Solution 30917.3.2 JAYA Algorithm 30917.3.2.1 Representation of the Solution 31117.3.3 Bird Swarm Algorithm 31117.3.3.1 Forging Behavior 31317.3.3.2 Vigilance Behavior 31317.3.3.3 Flight Behavior 31317.3.3.4 Representation of the Solution 31317.4 Analyzing the Algorithms 31417.5 Conclusion 316References 31618 LEGAL ENTANGLEMENTS OF CLOUD COMPUTING IN INDIA 319Sambhabi Patnaik and Lipsa Dash18.1 Cloud Computing Technology 31918.2 Cyber Security in Cloud Computing 32218.3 Security Threats in Cloud Computing 32318.3.1 Data Breaches 32318.3.2 Denial of Service (DoS) 32318.3.3 Botnets 32318.3.4 Crypto Jacking 32418.3.5 Insider Threats 32418.3.6 Hijacking Accounts 32418.3.7 Insecure Applications 32418.3.8 Inadequate Training 32518.3.9 General Vulnerabilities 32518.4 Cloud Security Probable Solutions 32518.4.1 Appropriate Cloud Model for Business 32518.4.2 Dedicated Security Policies Plan 32518.4.3 Multifactor Authentication 32518.4.4 Data Accessibility 32618.4.5 Secure Data Destruction 32618.4.6 Encryption of Backups 32618.4.7 Regulatory Compliance 32618.4.8 External Third-Party Contracts and Agreements 32718.5 Cloud Security Standards 32718.6 Cyber Security Legal Framework in India 32718.7 Privacy in Cloud Computing—Data Protection Standards 32918.8 Recognition of Right to Privacy 33018.9 Government Surveillance Power vs Privacy of Individuals 33218.10 Data Ownership and Intellectual Property Rights 33318.11 Cloud Service Provider as an Intermediary 33518.12 Challenges in Cloud Computing 33718.12.1 Classification of Data 33718.12.2 Jurisdictional Issues 33718.12.3 Interoperability of the Cloud 33818.12.4 Vendor Agreements 33918.13 Conclusion 339References 34119 SECURING THE PHARMA SUPPLY CHAIN USING BLOCKCHAIN 343Pulkit Arora, Chetna Sachdeva and Dolly Sharma19.1 Introduction 34319.2 Literature Review 34519.2.1 Current Scenario 34619.2.2 Proposal 34719.3 Methodology 34919.4 Results 35419.5 Conclusion and Future Scope 358References 358Index 361

Regulärer Preis: 197,99 €
Produktbild für Data Science Revealed

Data Science Revealed

Get insight into data science techniques such as data engineering and visualization, statistical modeling, machine learning, and deep learning. This book teaches you how to select variables, optimize hyper parameters, develop pipelines, and train, test, and validate machine and deep learning models. Each chapter includes a set of examples allowing you to understand the concepts, assumptions, and procedures behind each model.The book covers parametric methods or linear models that combat under- or over-fitting using techniques such as Lasso and Ridge. It includes complex regression analysis with time series smoothing, decomposition, and forecasting. It takes a fresh look at non-parametric models for binary classification (logistic regression analysis) and ensemble methods such as decision trees, support vector machines, and naive Bayes. It covers the most popular non-parametric method for time-event data (the Kaplan-Meier estimator). It also covers ways of solving classification problems using artificial neural networks such as restricted Boltzmann machines, multi-layer perceptrons, and deep belief networks. The book discusses unsupervised learning clustering techniques such as the K-means method, agglomerative and Dbscan approaches, and dimension reduction techniques such as Feature Importance, Principal Component Analysis, and Linear Discriminant Analysis. And it introduces driverless artificial intelligence using H2O.After reading this book, you will be able to develop, test, validate, and optimize statistical machine learning and deep learning models, and engineer, visualize, and interpret sets of data.WHAT YOU WILL LEARN* Design, develop, train, and validate machine learning and deep learning models* Find optimal hyper parameters for superior model performance* Improve model performance using techniques such as dimension reduction and regularization* Extract meaningful insights for decision making using data visualizationWHO THIS BOOK IS FORBeginning and intermediate level data scientists and machine learning engineersTSHEOP CHRIS NOKERI harnesses advanced analytics and artificial intelligence to foster innovation and optimize business performance. He has delivered complex solutions to companies in the mining, petroleum, and manufacturing industries. He completed a bachelor’s degree in information management and graduated with an honors degree in business science at the University of the Witwatersrand on a TATA Prestigious Scholarship and a Wits Postgraduate Merit Award. He also was awarded the Oxford University Press Prize. Section 1: Parametric MethodsChapter 1: An Introduction to Simple Linear RegressionChapter goal: Introduces the reader to parametric and understand the underlying assumptions of regression.Subtopics• Regression assumptions.• Detecting missing values.• Descriptive analysis.• Understand correlation.o Plot Pearson correlation matrix.• Determine covariance.o Plot covariance matrix.• Create and reshape arrays.• Split data into training and test data.• Normalize data.• Find best hyper-parameters for a model.• Build your own model.• Review model performance.o Mean Absolute Error.o Mean Squared Error.o Root Mean Squared Error.o R-squared.o Plotting Actual Values vs. Predicted Values.• Residual diagnosis.o Normal Q-Q Plot.o Cook’s D Influence Plot.o Plotting predicted values vs. residual values.o Plotting Fitted Values vs. Residual Values.o Plotting Leverage Values vs. Residual Values.o Plotting Fitted Values vs. Studentized Residual Values.o Plotting Leverage Values vs. Studentized Residual Values.Chapter 2: Advanced Parametric MethodsChapter goal: Highlights methods of dealing with the problem of under-fitting and over-fitting.Subtopics• Issue of multi-collinearity.• Explore methods of dealing with the problem under-fitting and over-fitting.• Understand Ridge, RidgeCV and Lasso regression models.• Find best hyper-parameters for a model.• Build regularized models.• Compare performance of different regression methods.o Mean Absolute Error.o Mean Squared Error.o Root Mean Squared Error.o R-squared.o Plotting actual values vs. predicted values.Chapter 3: Time Series AnalysisChapter goal: Covers a model for identifying trends and patterns in sequential data and how to forecast a series.• What is time series analysis?• Underlying assumptions of time series analysis.• Different types of time series analysis models.• The ARIMA model.• Test of stationary.o Conduct an ADF Fuller Test.• Test of white noise.• Test of correlation.o Plot Lag Plot.o Plot Lag vs Autocorrelation Plot.o Plot ACF.o Plot PACF.• Understand trends, seasonality and trends.o Plot seasonal components.• Smoothen a time series using Moving Average, Standard Deviation and Exponential techniques.o Plot smoothened time series.• Determine rate of return and rolling rate of return.• Determine parameters of ARIMA model.• Build ARIMA model.• Forecast ARIMA.o Plot forecast.• Residual diagnosisChapter 4: High Quality Time SeriesChapter goal: Explores Prophet for better series forecast.• Difference between statsmodel and Prophet.• Understand components in Prophet.• Data preprocessing.• Develop a model using Prophet.• Forecast a series.o Plot forecasted.o Plot seasonal components.• Evaluate model performance using Prophet.Chapter 4: Logistic RegressionChapter goal: Introduces reader to logistic regression – a powerful classification model.Subtopics• Find missing values• Understand correlation.o Plotting Pearson correlation matrix.• Determine covariance.o Plotting covariance matrix.• PCA for dimension reduction.o Plotting scree plot.• Normalize data.• Hyper-parameter tuning.• Create a pipeline.• Develop a Logit model.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot learning curve.Chapter 5: Dimension Reduction and Multivariate Analysis using Linear DiscriminantChapter goal: Discusses the difference between linear discriminant analysis and logistic regression and how linear discriminant analysis can be used for other purposes other than classification.Subtopics• Difference between logistic regression and discriminant analysis.• Purpose of discriminant analysis.• Model fitting.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot learning curve.Section 2: Ensemble methodsChapter 6: Finding Hyper Lanes Using Support Vector MachineChapter goal: Highlights ways of finding hyper lanes using Linear Support Vector Chain including its pros and cons.• Understand support vector machine.• Find hyper lanes using SVM.• Scenarios in which SVM performs better.• Disadvantages of SVM. • Model fitting.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC curveo Find AUC.o Plot Precision Recall curve.o Find APS.o Plot learning curve.Chapter 7: Classification Using Decision TreeChapter goal: Explores how decision trees are formed and visualized them.Subtopics• Discussing entropy.• Information gain• Structure of decision trees• Visualizing decision trees• Modelling fitting• Model evaluation.o Tabulating classification report.o Tabulating confusion matrix.o Plotting ROC curveo Finding AUC.o Plotting Precision Recall curve.o Finding APS.o Plotting learning curve.Chapter 8: Back to the ClassicChapter goal: Gives an overview of this classical algorithm and explain why it is still relevant up to this date.Subtopics• The Naïve Bayes theorem.• Unpacking Gaussian Naïve Bayes.• Model fitting.• Hyper-parameter tuning.• Create a pipeline.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot learning curve.Section 3: Non-Parametric MethodsChapter 9: Finding Similarities and Dissimilarities Using Cluster AnalysisChapter goal: Explain clustering and explore three main clustering algorithms (K-Means, Agglomerative and DBSCAN).• An introduction to cluster analysis.• Types of clustering algorithms.• Normalize data.• Dimension reduction using PCA.o Finding number of components• Find number of clusters.o Elbow curve.• Clustering K-Means.• Fit K-Means model.• Plot K-Means clusters.• Clustering using Agglomerative algorithm.o Techniques of calculating similarities/dissimilarities• Fit Agglomerative.• Plot Agglomerative clusters.• Clustering using Density-Based Spatial Clustering Algorithm with Noise (DBSCAN)• Fit DBSCAN.• Plot DBSCAN clusters.Chapter 10: Survival AnalysisChapter: Provides an overview of survival analysis (a model used commonly used in medical and insurance industries) by detailing the commonly used estimator – Kaplan Meier Fitter.Subtopics• Create a survival table.• The survival function.• An introduction to the Kaplan Meier Estimator.• Finding confidence intervals.• Tabulating cumulative density estimates.• Tabulating survival function estimates.• Plotting survival curve.• Plotting cumulative density.• Model evaluation.Chapter 11: Neural NetworksChapter goal: Discusses the fundamentals of neural networks and ways of optimizing networks for better accuracy.Subtopics• Forward propagation.• Backward propagation.• Forward pass.• Backward pass.• Cost function.• Gradient.• The vanishing gradient problem.• Other functions.• Optimizing networks.• Bernoulli Restricted Boltzmann Machine.• Multi-Layer Perceptron.• Regularizing networks.• Dropping layers.• Model evaluation.• Model evaluation.o Tabulate classification report.o Tabulate confusion matrix.o Plot ROC Curveo Find AUC.o Plot Precision Recall Curve.o Find APS.o Plot training and validation loss across epochs.o Plot training and validation accuracy across epochs.Chapter 12: Driverless AI Using H2OChapter goal: Covers a new library that helps organizations accelerate their adoption of AI.• How H2O works.• Data processing.• Model training.• Model evaluation.• AutoML.

Regulärer Preis: 56,99 €
Produktbild für Creating ASP.NET Core Web Applications

Creating ASP.NET Core Web Applications

Design and develop an ASP.NET Core web application using .NET Core 3.0. This book shows you how to publish a web application to a web server and connect the published web application to a production database.CREATING ASP.NET CORE WEB APPLICATIONS starts by setting up the Visual Studio project where you will learn about Razor pages, Entities, and creating a data service. You will create models along with methods to use a query string and handle bad requests. Modifying data with Tag helpers is discussed as well as installation of Entity Framework, working with database migrations, and implementing a data access service. You will learn how to use layout pages and sections with Partial Views, _ViewImports, and _ViewStart files. You also will create custom middleware and log application events. You will be able to deploy the web application as well as connect it to a SQL Server database.WHAT YOU WILL LEARN* Work with models* Modify data* Work with EF Core and SQL Server* Work with Razor pages and Partial Views* Use separate scripts for production vs development* Trace client-side errors using Chrome Developer tools* Create cascading style sheets (CSS) with Sassy CSS (SCSS)* Explore middleware* Deploy your web application to IISWHO THIS BOOK IS FORSoftware developers on the .NET stack who want to create ASP.NET Core web applicationsDIRK STRAUSS is a software developer from South Africa who has been writing code since 2003. He has extensive experience in SYSPRO, with C# and web development being his main focus. He studied at the Nelson Mandela University, where he wrote software on a part-time basis to gain a better understanding of the technology. He remains passionate about writing code and imparting what he learns with others.CHAPTER 1: CREATING AND SETTING UP YOUR PROJECTCHAPTER GOAL: CREATE THE VISUAL STUDIO PROJECT REQUIRED TO START THE WEB APPLICATION DEVELOPMENT. HERE WE WILL LOOK AT RAZOR PAGES, ENTITIES, CREATING A DATA SERVICE AND USING THIS DUMMY DATA TO DISPLAY DATA ON THE WEB PAGE.NO OF PAGES 25SUB -TOPICS1. Creating Your Web Application Project2. Adding and Editing Razor Pages3. Looking at the Configuration4. Working with Entities5. Create and Register a Data Service6. Displaying Test Data on Your Web PageCHAPTER 2: CREATING MODELSCHAPTER GOAL: CREATE A SEARCH FORM THAT ALLOWS THE READER TO FIND DATA IN THE DATA STORE. HERE THE READER WILL LOOK AT USING MODELS, MODEL BINDING, WORKING WITH A QUERY STRING, AND SPECIFYING PAGE ROUTES. WE WILL ALSO TAKE A LOOK AT HOW TO HANDLE BAD REQUESTS.NO OF PAGES: 25SUB - TOPICS1. Building a Search Form2. Implementing the Find logic3. Using Query Strings, Model Binding and Tag Helpers4. Displaying Related Data5. Working with Page Routes6. Handling Bad RequestsCHAPTER 3: MODIFYING DATACHAPTER GOAL: THE READER WILL LEARN HOW TO CREATE A PAGE TO EDIT AND ADD DATA STORED IN THE DATA STORE. THE READER WILL ALSO REVISIT TAG HELPERS.NO OF PAGES : 20SUB - TOPICS:1. Editing Existing Data and Using Tag Helpers2. Validating Edited Data3. Display Validation Errors4. Creating New Data5. Modify the Data Access ServiceCHAPTER 4: EF CORE AND SQL SERVERCHAPTER GOAL: THE READER WILL LEARN HOW TO INSTALL ENTITY FRAMEWORK, WORKING WITH DATABASE MIGRATIONS AND IMPLEMENTING A DATA ACCESS SERVICE.NO OF PAGES : 25SUB - TOPICS:1. Install Entity Framework2. Implement DbContext3. Specify Database Connection Strings4. Working with Database Migrations5. Implement a New Data Access Service6. Changing the Data Access Service RegistrationCHAPTER 5: WORKING WITH RAZOR PAGESCHAPTER GOAL: THE READER WILL LEARN HOW TO USE LAYOUT PAGES AND SECTIONS. THEY WILL ALSO LEARN ABOUT WORKING WITH PARTIAL VIEWS, _VIEWIMPORTS AND _VIEWSTART FILES.NO OF PAGES : 25SUB - TOPICS:1. Using Sections in Your Razor Pages2. What are _ViewImports and _ViewStart files?3. Working with Partial Views4. Working with ViewComponentsCHAPTER 6: ADDING CLIENT-SIDE LOGICCHAPTER GOAL: THE READER WILL LEARN HOW TO WORK WITH SCSS TO CREATE CSS, USING JAVASCRIPT AND JQUERY. THE READER WILL ALSO LEARN HOW TO SEPARATE SCRIPTS TARGETED AT PRODUCTION FROM SCRIPTS TARGETED FOR DEVELOPMENT.NO OF PAGES : 30SUB - TOPICS:1. Separate Production Scripts from Development Scripts2. Setting up SCSS and generating CSS with the Web Compiler3. Creating a Client-side API4. Working with Chrome Developer ToolsCHAPTER 7: EXPLORING MIDDLEWARECHAPTER GOAL: THE READER WILL LEARN HOW TO USE MIDDLEWARE AND HOW TO CREATE CUSTOM MIDDLEWARE. WE WILL ALSO BE LOOKING AT LOGGING APPLICATION EVENTS.NO OF PAGES : 25SUB - TOPICS:1. What is Middleware2. Creating Custom Middleware3. Logging InformationCHAPTER 8: WEB APPLICATION DEPLOYMENTCHAPTER GOAL: THE READER WILL LEARN HOW TO DEPLOY THE WEB APPLICATION THEY CREATED. THIS WILL LOOK AT DEPLOYMENT TO A WEB SERVER AS WELL AS CONNECTING THE WEB APPLICATION TO A SQL SERVER DATABASE.NO OF PAGES : 25SUB - TOPICS:1. Getting Your Site Ready for Deployment2. Deploying Your Web Application to IIS

Regulärer Preis: 62,99 €
Produktbild für React and Libraries

React and Libraries

Harness the power of React and the related libraries that you need to know to deliver successful front-end implementations. Whether you are a beginner getting started or an existing React developer, this book will provide you with the must-have knowledge you need in your toolbox to build a complete app.Start by learning how to create and style your own components, add state management, and manage routing. You’ll also learn how to work with the backend using the MERN stack (MongoDB, Express, React, and Node.js). Once you have completed building your app you will learn how to deliver quality software by conducting unit testing, integration testing, and end-to-end (E2E) testing, as well as learn techniques to debug, profile, and optimize your React app.Libraries and tools covered include TypeScript, Material-UI, Styled Components, SCSS, React Router, Redux Toolkit, Recoil, Jest, Enzyme, Sinon, MongoDB, NodeJS, Express, Serve, Grunt, Puppeteer, ESLint, Prettier and many others. And, you'll get access to bonus material and learn how to conduct and nail React interview questions.Each chapter in this book can be used independently so you can pick and choose the information you’d like to learn. Use it to get deep into your React development world and find out why React has been rated the most loved framework by front-end developers for three years in a row.WHAT YOU'LL LEARN* Review the basics of DOM, React Virtual DOM, JSX, Babel, ES5/ES6, CRA, package manager, Yarn, Webpack, and build tools* Write your own custom React components and learn about hooks and props.* Apply routing and state management with React Route, Recoil, and Redux Toolkit* Deliver quality software and reduce QA load by learning unit testing integration testing and end-to-end testing with libraries such as Jest, Jest-dom, Enzyme, Sinon, and Puppeteer* Set an ultimate React automated development and CI cycle with ESLint, Prettier, Husky, Jest, Puppeteer, GitHub Actions, Codecov.io, Coveralls, Travis, and DeepScan* Publish your code on Ubuntu Server with the help of Grunt* Optimize your React app with pure components, lazy loading, prerender, precache, code splitting, tree shaking, reduce media size, and prefetchingWHO THIS BOOK IS FOR?This book is for new developers looking to start working on React applications, and React developers looking to expand on their existing knowledge. It is also suitable for developers coming from other front-end frameworks such as Angular and Vue who would like to add React to their toolbox.ELAD ELROM is a coder, technical lead and a technical writer and technical trainer. Elad is passionate about teaching and helping other developers advance and learn. As a writer, he has co-authored several technical books. Elad has consulted for a variety of clients, from large corporations such as HBO, Viacom, NBC Universal, and Weight Watchers, to smaller startups. Aside from coding, Elad is also a certified PADI dive instructor, motorcycle enthusiast, as well as an accomplished certified pilot.1. Learn the Basics2. Starter React Project & Friends3. React Components4. React Router and Material-UI5. State Management6. MERN Stack- Part I7. MERN Stack-Part II8. React Deployment- MERN Stack9. Testing Part I- Unit Test Your React App10. Testing Part II- Development & Deployment Cycle11. Debug & Profile Your React App12. Optimize Your React App

Regulärer Preis: 46,99 €
Produktbild für Jump-start Your SOC Analyst Career

Jump-start Your SOC Analyst Career

The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights and practical tips in JUMP-START YOUR SOC ANALYST CAREER. The lessons revealed equip you for interview preparation, tackling day one on the job, and setting long-term development goals. This book highlights personal stories from five SOC professionals at various career levels with keen advice that is immediately applicable to your own journey. The gems of knowledge shared in this book provide you with a notable advantage for entering this dynamic field of work.The recent surplus in demand for SOC analysts makes JUMP-START YOUR SOC ANALYST CAREER a must-have for aspiring tech professionals and long-time veterans alike. Recent industry developments such as using the cloud and security automation are broken down in concise, understandable ways, to name a few. The rapidly changing world of cybersecurity requires innovation and fresh eyes, and this book is your roadmap to success.WHAT YOU WILL LEARN* Understand the demand for SOC analysts* Know how to find a SOC analyst job fast* Be aware of the people you will interact with as a SOC analyst* Be clear on the prerequisite skills needed to be a SOC analyst and what to study* Be familiar with the day-to-day life of a SOC analyst, including the tools and language used* Discover the rapidly emerging areas of a SOC analyst job: the cloud and security automationWHO THIS BOOK IS FORAnyone interested in starting a career in cyber security: recent graduates, IT professionals transitioning into security, veterans, and those who are self taughtTYLER E. WALL is CEO of Cyber NOW Education, LLC which specializes in connecting education with opportunity. He is an accomplished security professional with years of experience in security operations and engineering that includes presently serving remotely as a Senior Security Engineer in Silicon Valley. He has built and led security operations centers for companies such as EY and Opentext. His current focus is enabling security operations centers to continuously mature by the adoption of security automation. Tyler’s education includes: Master of Science in Cybersecurity Management, CISSP, CEH, CFSR, LRPA, Security+, Network+, and A+. He enjoys long golf cart rides in Braselton, Georgia with his wife and son.JARRETT RODRICK is the SOC Team Lead and Senior Information Security Analyst for VMware, the global leader in visualization technology. He is a retired Cyber Network Defender and Cyber Warfare Specialist from the US Army and has over eight years of Defensive Cyber Operations experience working with the Army’s Cyber Protection Brigade. Jarrett’s time with the Cyber Protection Brigade has provided him with the skills needed to fight in today’s Cyber War. Jarrett’s cyber security certifications include: GSEC, GCED, GCIH, GCIA, GCFE, GCFA, GSNA, GRID, GCUX, and GSTRT. Jarrett lives in Melissa, Texas with his wife and family and enjoys researching new and innovative technologies.Chapter 1: The Demand for Cybersecurity and SOC AnalystsChapter 2: Areas of Expertise in CybersecurityChapter 3: Job HuntingChapter 4: Prerequisite SkillsChapter 5: The SOC AnalystChapter 6: SOC in the CloudsChapter 7: SOC AutomationChapter 8: Real SOC Analyst Stories.

Regulärer Preis: 46,99 €