Security
CompTIA Server+ (4. Auflg.)
Serversysteme einrichten und betreiben. Vorbereitung auf die Prüfung SK0-005. 4. Auflage 2023.Die Prüfung CompTIA Server+ richtet sich an IT-Fachleute und Administratoren und weist die Fähigkeiten nach, Server in Rechenzentren sowie in lokalen und hybriden Umgebungen zu installieren, zu verwalten und Fehler zu beheben. Die Zertifizierung ist nicht auf eine einzige Plattform beschränkt, so dass Sie die Aufgaben in jeder Umgebung ausführen können. Das Zertifikat ist international anerkannt.Die Prüfung SK0-005 teilt sich in diese Fachgebiete auf:Server-Hardware: Installation und ManagementServeradministrationSicherheit und Disaster RecoveryFehlerbehebungSie lernen in diesem Buch die Eigenschaften, den Einsatz und die Konfiguration von Servern von Grund auf kennen, sowohl was die Hardware als auch was die spezifischen Betriebs-systeme und Applikationen von Servern anbelangt.Des Weiteren erläutern die Autoren die Planung und die physischen Umgebungsbedingungen von Servern sowie aktuelle Themen wie z.B. Hochverfügbarkeit, Cloud Computing und Skripterstellung. Außerdem werden wichtige Fragen zur Sicherheit, Datensicherung und zum Disaster Recovery ausführlich behandelt.So können Sie sich das für die Zertifizierung benötigte Fachwissen aneignen und ein praxistaugliches Verständnis der Thematik entwickeln, das Sie in Ihrem Arbeitsalltag bei der Server-Administration voranbringt.Aus dem Inhalt:Server-Hardware: Prozessoren, Arbeitsspeicher, BIOS/UEFIStorage-Lösungen und -technologien: SSD, SAS, SATA, Fibre Channel, iSCSIFehlertoleranz: RAID, EnergieversorgungServer installieren und aktualisierenHardware im Netzwerk: Kabel, Netzwerkkarten, ÜbertragungsgeräteTCP/IP: IPv4 und IPv6Serverrollen: Datei- und Druckdienste, Internet- und Maildienste, NetzwerkdiensteNetzwerkbetriebssysteme: Windows Server, UNIX/Linux und deren InstallationKonfigurationsbetrachtungen: Dateisystem, Kontingentierung, Verzeichnisdienste, GruppenrichtlinienServer Management: Remote-Verbindungen, Ereignisprotokolle, MonitoringSpeichertechnologien, Virtualisierung und Cloud-DiensteDeployment- und VirtualisierungsszenarienPhysische, technische und organisatorische SicherheitDatensicherung in Theorie und PraxisDisaster Recovery PlanningUnterhalt und Troubleshooting in der PraxisDie CompTIA Server+-Prüfung: Fragen, Antworten sowie ein Simulationstest in EnglischÜber die Autoren:Roland Cattini ist von Beruf Betriebs- und Elektroingenieur und befasst sich seit Windows NT-Zeiten als Microsoft-Experte mit Servern. Er ist aktiv in der Installation und Weiterbildung, nicht nur selber als MCSE, MCT, MCDBA, MCTS und MCITP, sondern auch als Trainer für Expertenschulungen in der Schweiz.Markus Kammermann, ausgebildeter ICT-Projektleiter und CompTIA Server+-Techniker, ist seit mehr als zwanzig Jahren in der System- und Netzwerktechnik tätig, fast ebenso lang als Ausbilder und Autor. Er engagiert sich zudem als Dozent in der höheren beruflichen Bildung.Michael Zaugg ist der UNIX- und Linux-Spezialist unter den drei Autoren. Er arbeitet als Network- und Security-Manager und betreut mit seinem Team eine ganze Reihe verschiedener Unix- und Linux-Server.Leseprobe (PDF-Link)
Software Development with Go
Gain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics. This book reviews the necessary tools to create container-based cloud solutions with Go, a programming language that was born out of the need to address scalable, high availability cloud computing architecture needs inside Google.Go, also known as Golang, has been adopted across different industries and products with many popular Open Source projects that power cloud computing technologies such as Docker and Kubernetes being written with Go. As the complexity of cloud technology increases, so does the need for people to understand how things work under-the-hood and to fix them when they’re broken.WHAT YOU WILL LEARN* Understand how the various components of a container-based system works* Tackle complex technical issues using Go* Integrate tools that can be used as part of your daily operational needs* Build system-based productsWHO THIS BOOK IS FORDevelopers and Engineers familiar with Go who want to know how different parts of the system work and who want to write command line tools. It will also be beneficial to programmers who already have a system-level understanding and want to use Go to build tools for existing projects and applications.NANIK TOLARAM is a big proponent of open source software with over 20 years of industry experience. He has dabbled in different programming languages, including Java, C, and C++. He has developed products from the ground up working in early startup companies. He is a software engineer at heart, but loves to write technical articles and share his knowledge with others.He learned to program with Go during the COVID 19 pandemic and hasn't looked back.SOFTWARE DEVELOPMENT WITH GOPART 1: SYSTEM PROGRAMMINGChapter 1 - System CallsChapter 2 - System Calls Using GoChapter 3 - Accessing proc File SystemPART 2: CONTAINERSChapter 4 - Simple ContainersChapter 5 - Containers with NetworkingChapter 6 - Docker SecurityPART 3: APPLICATION SECURITYChapter 7 - Gosec and ASTChapter 8 – ScorecardPART 4: NETWORKINGChapter 9 - Simple NetworkingChapter 10 - System NetworkingChapter 11 - Google gopacketChapter 12 - Epoll LibraryPART 5: SECURING LINUXChapter 13 - Vulnerability ScannerChapter 14 – CrowdSecPART 6: TERMINAL USER INTERFACEChapter 15 - ANSI and UIChapter 16 - TUI FrameworkPART 7: LINUX SYSTEMChapter 17 – systemdChapter 18 – cadvisor
Cisco ACI: Zero to Hero
It doesn’t matter if you are completely new to Cisco ACI or you already have some experience with the technology, this book will guide you through the whole implementation lifecycle and provide you with a comprehensive toolset to become confident in any ACI-related task.In the beginning, it’s very important to build strong fundamental knowledge about Cisco ACI components. We'll go through underlay networking based on Nexus 9000 switches and describe the APIC controller cluster acting as the management plane of ACI. By building Access Policies, you'll see how to optimally connect servers, storage, routers, switches, or L4-L7 service devices to ACI. Then we'll properly design and implement Logical Application Policies. You will understand all the fabric forwarding behavior when using different ACI settings and architectures while getting a toolset on how to verify and troubleshoot eventual problems.This book also covers external L2 and L3 connectivity in ACI, more advanced features like integration with virtualization hypervisors and Kubernetes, service chaining of L4-L7 devices using Service Graphs, or practical approach to using REST API automation based on Python and Ansible/Terraform._Cisco ACI: Zero to Hero_ can additionally be used as a valuable source of theoretical and practical knowledge for all candidates preparing for CCIE DC v3.0 Written or Lab exams.WHAT YOU'LL LEARN* Understand network evolution and Cisco ACI components * Underlay ACI networking based on Nexus 9000 switches, APIC controllers, and Application Policy Model* Integrate ACI with virtualization hypervisors and Kubernetes* Dynamically and seamlessly include L4-L7 service devices in communication between ACI endpoints * Build ACI Anywhere: ACI Multi-Tier, Stretched Fabric, Multi-POD, Multi-Site, and Remote Leaf* Utilize ACI REST API with Python, related Cobra SDK, Ansible or Terraform, to develop automation and scripts on top of the ACI platformWHO THIS BOOK IS FORNetwork engineers, architects, network developers, administrators or NOC technicians.JAN JANOVIC, 2x CCIE No. 55858 (R&S|DC) and Cisco Certified Instructor (CCSI #35493), is an IT enthusiast with 10+ years of experience with network design, implementation and support for customers from a wide variety of industry sectors. During the last years, he has focused on data center networking, mainly, but not limited to solutions based on Cisco Nexus platforms – traditional vPC architectures, VXLAN BGP EVPN network fabrics and Cisco ACI Software-Defined Networking. All with an emphasis on mutual technology integration, automation and analytic tools. Another significant part of his job is the delivery of professional training for customers all around Europe.During his university studies, he led a group of students to the successful development of the world's first Open-Source EIGRP implementation for the Quagga Linux package (currently under the name FRRouting). He also contributed to OSPF features there.His technical focus additionally expands to public cloud topics connected with the design and deployment of AWS and Azure solutions.Chapter 1: Introduction: Datacenter Network EvolutionCHAPTER GOAL: To put Cisco ACI as a next gen modern datacenter network in the context of network evolution. Why it even exists in the first place, what it can bring for companies, etc.NO OF PAGES 12SUB -TOPICS1. Datacenter Evolution – From traditional 3 tier network architecture through network virtualization (vPC) to Leaf-Spine routed architectures.2. Explained need for new protocol – VXLAN3. Explained need for network automation – centrally managed software defined networking4. Explained need for datacenter network visibilityChapter 2: ACI Fundamentals – Underlay InfrastructureCHAPTER GOAL: Introduce readers to Cisco ACI, its components and basic concepts. It’s very important to establish strong fundamental knowledge of the technology to later build on. This chapter will focus on Underlay Infrastructure – Nexus 9000 and APICs. It explains all the architectural options when building ACI with design considerations for physical cabling and tips for High-Level Design project phases.NO OF PAGES: 46SUB - TOPICS1. Underlay Networking – Nexus 9000 Family Overview. To make sure readers understand advantages of HW based underlay network, its components and to explain main features of N9K CloudScale ASICs.2. APIC controllers. Connecting APICs to fabric, database sharding, Advantages/disadvantages of various cluster options (3, 5, 7 nodes)3. Introduction to ACI Control-plane and Data-plane concepts used in the underlay networking4. ACI Architectures – Introduction to ACI design options – Multi-Tier Fabric, Stretched Fabric, Multi-Pod, Multi-site, Remote Leaf, and Cloud deployments with Nexus Dashboard Orchestrator.Chapter 3: ACI Fabric Initialization & ManagementCHAPTER GOAL: Show readers how to properly configure all the necessary features of Cisco ACI at the beginning of the fabric deployment (including Multi-POD architecture) together with recommended best-practice global configuration and troubleshooting tips for failures in automatic switch discoveryNO OF PAGES : 72SUB - TOPICS:1. Converting standard NX-OS Leaf switch to ACI mode2. APIC Cluster Initialization and Leaf-Spine Fabric Discovery with troubleshooting3. Out-of-band and In-Band connectivity4. Global Best practice configuration and Fabric Policies (Management Access, DNS, NTP, SNMP, Syslog, MP-BGP, ACI Backup)5. Multi-POD deployment with IPN configuration and troubleshooting.Chapter 4: ACI Fundamentals - Access PoliciesCHAPTER GOAL: Introduce readers to the global Access Policies responsible for encapsulation resources management and Leaf access interface configuration. Proper understanding of Access Policies is key for using them later in Logical Tenant Application Models.NO OF PAGES : 24SUB - TOPICS:1. ACI Access Policies – VLAN Pools, Physical domains, AAEP, Interface Policy Group and Profiles, Switch Policy Group and Profiles. All with verification options.Chapter 5: ACI Fundamentals – Application Policy ModelCHAPTER GOAL: It’s crucial to properly understand main Application Policy Model, all its components and design options, when deploying Cisco ACI. Readers will receive practical information from author’s implementation experience.NO OF PAGES: 62SUB - TOPICS1. Application Policy Model – Description of main objects used for creating tenant application policies on top of common underlay network.2. EPG Design – Various approaches when creating your segmentation with EPGs. Description of microsegmentation possibilities using uEPG and ESGs.3. Contract Design – All aspects of implementing security in ACI fabric using contracts with detailed verification and hardware deployment information.4. Recommended Naming Convention – For ACI deployment, it’s crucial to prepare proper object design and naming convention because user cannot rename most of the object later.Chapter 6: Fabric Forwarding & TroubleshootingCHAPTER GOAL: To describe in detail how forwarding in ACI works. Intra-fabric as well as inter fabric use cases with different Bridge Domain Settings for Layer-2 and Layer-3 traffic.NO OF PAGES: 58SUB - TOPICS1. ACI main forwarding concepts – theory behind VXLAN encapsulation, detailed description of ACI’s control-plane mechanisms, followed by unicast and BUM (ARP) traffic forwarding in L2-L3 Bridge Domain settings.2. Multi-POD forwarding – IPN forwarding of unicast and multicast traffic. PIM/IGMP mechanisms.3. Multi-Site forwarding – ISN forwarding, BGP ingress replication of multicast data.4. Troubleshooting Toolset for Fabric Forwarding – Endpoint Tracker, ELAM, fTriage, SPAN, native Visibility & Troubleshooting Tool and interface drop analysisChapter 7: External Layer 2 & Layer 3 ConnectivityCHAPTER GOAL: Explain how to connect ACI to legacy networks for migration purposes and to provide general external connectivity for its Tenants.NO OF PAGES: 69SUB - TOPICS:1. L3 external connectivity – L3OUT components, configuring routing peering with external network – static/dynamic routing, OSPF, EIGPR, BGP routing protocols, prefix filtering, transit routing with verification and troubleshooting tools.2. L2 external connectivity – Best practices when extending legacy VLANs to ACI, Extending BD vs Extending EPG.Chapter 8: Service Chaining with L4-L7 devicesCHAPTER GOAL: Describe all the available options how to include L4-L7 devices in the data-path between ACI EPGs.NO OF PAGES: 401. ACI Service Graph construction – design options2. Routed mode vs Transparent mode, Two-Arm vs. One-Arm Deployment3. Service Graphs with Policy Based Redirect4. Troubleshooting of Service Graphs5. Symmetric Policy Based RedirectChapter 9: Integrating ACI with Virtualization and Container PlatformsCHAPTER GOAL: Introduce readers to advantages of integrating ACI with VM & Container platforms. Access Policies, vSwitch policies, dynamic VM host discovery.NO OF PAGES:521. Principles of VMware vCenter integration and configuration guide. Troubleshooting tips.2. Integrating ACI with Kubernetes – unique complete guide to spin up the Kubernetes cluster and integrate it to ACI in order to gain detailed visibility and enforce security rules.Chapter 10: ACI Automation and ProgrammabilityCHAPTER GOAL: All REST API related information with practical examples for each automation tool. Chapter covers ACI’s Object Model, Data Formats, REST Operation, Tools to access REST API – cURL, Postman, Python Requests, Cobra SDK, Ansible/Terraform orchestrators.NO OF PAGES: 821. REST API Operation – HTTP Methods, Status codes and YAML/JSON/XML data formats2. ACI Object Information Model – Object hierarchy, how to find necessary information about objects from documentation, CLI, Visore tool, API Inspector3. ACI’s REST API – URL and body construction, Authentication4. GUI/CLI tools to access REST API – cURL, Postman5. Python programming – Consuming REST API using requests library and Cobra SDK6. Ansible and Terraform automation of ACI.7. Advanced API features – pre-signed calls and API subscriptions
Practical GitOps
Infrastructure as Code (IaC) is gaining popularity and developers today are deploying their application environments through IaC tools to the cloud. However, it can become extremely difficult and time-consuming to manage the state of the infrastructure that has been deployed. This book will provide a complete walkthrough of deploying a SpringBoot application on AWS with multiple environments like production, staging and development. Everything is orchestrated through GitHub Actions and executed through Terraform Cloud to monitor changes in your infrastructure and manage its state.You'll start by reviewing how your infrastructure can be stored in code by spinning up an EC2 server first through the console, then AWS CLI and then using Terraform. You'll then be presented with a practical scenario of setting up a simple EC2 server in a multi-environment (production, staging and development) using GitHub Actions and Terraform Cloud. In the advanced section that follows, this simple EC2 server is expanded into an application that is deployed on an AWS EKS (Elastic Kubernetes Service) using AWS RDS (Relational Database Service) exposed through an AWS ALB (Application Load Balancer) protected using AWS ACM (AWS Certificate Manager), and accessible by setting the AWS Route53.The book then builds up on this infrastructure and demonstrates how it can be deployed in a multi-environment scenario by implementing accounts through AWS organizations. You'll see how to put in restrictions through Service Control Policies, how to protect secrets using AWS Secrets Manager, and how to work with least privileges using IRSA (IAM Roles for Service Accounts). Finally, you'll make the infrastructure more observable using Graphana, Prometheus, and AWS OpenSearch, run security tools, host Route53 zones dynamically based on environments, and implement CloudWatch Alarms for various use cases.ROHIT SALECHA is a technology enthusiast with over 11 years of experience in IT and the Cybersecurity industry. He loves to find security flaws in the web applications and api's, automate boring tasks and tinker around with new tech and help design secure by default systems. Lately, he has become quite smitten by the DevOps technologies and techniques and loves tinkering around with them.PART I - SETTING UP GITOPSCHAPTER 1: WHAT IS GITOPS?1. The Era of DevOps2. Infrastructure as Code3. What is GitOps?CHAPTER 2: INTRODUCTION TO AWS1. Introduction to AWS2. Creating an EC2 machine from AWS Console3. Creating an EC2 machine using aws-cliCHAPTER 3: INTRODUCTION TO TERRAFORM1. Introduction to Terraform2. Basic Syntaxes3. Creating an EC2 machine using TerraformCHAPTER 4: INTRODUCTION TO TERRAFORM CLOUD AND WORKSPACES1. Preparing for Multi-environment2. Introduction to Terraform Workspaces3. Introduction to Terraform Cloud4. Attaching Github Repo to Terraform CloudCHAPTER 5: INTRODUCTION TO GITHUB ACTIONS1. Drawbacks of connecting to Github Repository2. Introducing Github Actions3. Deploying EC2 terraform code using Github Actions4. Multi-environment strategyCHAPTER 6: WORDPRESS ON AWS EKS1. AWS EKS,EFS,RDS Architecture2. Walkthrough of Terraform Code3. Walkthrough of Kubernetes Manifest Files4. Deploying Wordpress in Dev and Prod.PART II - OPERATING WITH GITOPSCHAPTER 7: AUTHENTICATION AND AUTHORIZATION1. Kubernetes Provider Authentication in Terraform2. Exploring the aws-auth ConfigMap3. Understanding IRSA(IAM Roles and Service Accounts)4. Connect AWS IAM Role with Kubernetes Service Account5. AWS User access in KubernetesCHAPTER 8: SECURITY AND SECRET MANAGEMENT1. Implementing HTTPS using AWS ACM2. Storing Database Password in AWS Secrets Manager3. Integrating Security tools in GitOps pipelineCHAPTER 9: BACKUP AND DISASTER RECOVERY1. Database Snapshot in AWS SSM Parameter Store2. Deploying in Another AWS RegionCHAPTER 10: OBSERVABILITY1. Collecting Metrics and Logs2. Performance Monitoring using Graphana/Prometheus3. Log Collection using EFK (Elastic Filebeat and Kibana)
Practical Spring Cloud Function
Unlike other resources that target only programming communities, this book targets both programming and business communities. With programming models shifting more towards no-code and low-code, citizen programmers from the business side will welcome this book as a guide for how to design and optimize their information pipeline while lowering costs for infrastructure. Programmers, on the other hand, will welcome this book's business-centric programming view, which will get them a step closer to fulfilling real business requirements.Practical Spring Cloud Function touches on the themes of portability, scalability, high performance and high availability. Each theme is explored via a real enterprise use case and code. The use cases target industries including energy (oil pipeline sensors), automotive (event-driven connected vehicles), and retail (conversational AI).After reading this book, you'll come away with the know-how to build and deploy cloud-native Java applications effectively and efficiently.WHAT YOU WILL LEARN* Write functions and deploy to Amazon Web Services, Microsoft Azure, Google Cloud, IBM Cloud, and on-prem clouds such as VMWare Tanzu and RedHat OpenShift* Set up locally with KNative on Kubernetes, as well as on AWS, Azure, GCP, Tanzu, and others* Build, test, and deploy a simple example with Spring Cloud Function* Develop an event-driven data pipeline with Spring Cloud Function* Integrate with AI and machine learning models* Apply Spring Cloud Function to the Internet of Things (IoT)* Get industry-specific examples of Spring Cloud Function in actionWHO THIS BOOK IS FORSoftware and cloud-native application developers with prior programming experience in the cloud and/or Spring Framework. DevOps professionals may find this book beneficial as well.Banu Parasuraman is a Cloud Native Technologist with over 30 years of experience in the IT industry. He provides an advisory role to clients who are looking to move to cloud or implement cloud-native platforms such as Kubernetes, Cloud Foundry and the like. He has engaged over 25 select companies spread across different sectors (Retail, Healthcare, Logistics, Banking, Manufacturing, Automotive, Oil & Gas, Pharmaceuticals, Media & Entertainment ...) in USA, Europe and Asia have interacted at every level of an organization. Banu is a key evangelist for Cloud-Native computing encouraging client and architects to undertake this journey as soon as possible to avoid organizational inertia later. He is experienced in most of the popular cloud platforms such as VMWare-VCF, Pivotal-PCF, IBM-OCP, Google-GCP, Amazon-AWS, Microsoft-Azure. Banu has taken part in external speaking engagements targeted at CXOs and Engineers: VMworld, SpringOne, Spring Days, Spring Developer Forum Meetups. Internal speaking engagements: Developer Workshops on Cloud Native Architecture and Development, Customer Workshops on Pivotal Cloud Foundry, enabling Cloud Native sales plays and strategies for sales and teams. Lastly, Banu has numerous blogs on platforms such a Medium and Linkedin to promote adoption of Cloud Native architecture and development.1. Why Spring Cloud FunctionsThis chapter takes the reader through the need for Spring Cloud Functions and KNative. The rationale for Spring Cloud Functions will be elucidated through example implementation on on-prem and cloud infrastructures. The chapter highlights the “code once deploy anywhere” characteristic of Spring Cloud Functions.Subtitles1. Writing functions and deploying to any hyperscaler2. Example code3. Spring Cloud Functions on AWS (EKS, Fargate)4. Spring Cloud Functions on Azure (AKS)5. Spring Cloud Functions on Google (Cloud Run)6. Spring Cloud Functions on VMWare Tanzu (TKG, PKS)7. Spring Cloud Functions on RedHat OpenShift (OCP)2. Getting Started with Spring Cloud FunctionsThis chapter walks the reader through the steps required to get started with Spring Serverless on their platform of choice, either locally, on-prem or on the cloud. Step by Step instructions take the reader through the process of getting the environment set up for coding.Subtitles1. Step by Step: Setup locally with Kubernetes and KNative with Spring Cloud Functions2. Step by Step: Setup on AWS with EKS and KNative with Spring Cloud Functions3. Step by Step: Setup on GCP with Cloud Run/GKE and KNative with Spring Cloud Functions4. Step by Step: Setup on Azure with AKS and KNative with Spring Cloud Functions5. Step by Step: Setup on VMWare Tanzu TKG and KNative6. Step by Step: Setup on RedHat Openshift and KNative3. Coding, testing, and deploying with Spring Cloud FunctionsThis chapter covers the coding, testing, and deploying using your favorite IDE like Eclipse, Eclipse Che, Intelij IDEA, Redhat Code Ready Workspace. The reader will build an example and deploy to their favorite platforma. Building a simple example with Spring Cloud Functionsb. Testing the example will sample datac. Setting up a CI/CD pipeline for deploying to a target platformd. Deploying to the target platfomi. AWSii. GCPiii. Azureiv. VMWare Tanzuv. RedHat Openshift4. Building Event Driven Data pipelines with Spring Cloud FunctionsEvent Driven data pipelines act as a conduit to flow of data based on a specific event. The event can be a purchase order triggered on the website that initiate a data flow chain that includes aggregation of data from various data sources and splitting the data to various consumers. This chapter will discuss the various ways that Spring Spring Serverless can be implemented in the various Cloud providersSubtitles1. Spring Cloud Functions and Spring Cloud Data Flow and Spring Cloud Streams2. Spring Cloud Functions and AWS Glue3. Spring Cloud Functions and Google Cloud Data Flow4. Spring Cloud Functions and Azure Data Factory5. AI/ML Trained Serverless Endpoints with Spring Cloud FunctionsConversational AI models are one of the complex implementations that may lead to heavy use of resources in the cloud. Leveraging Serverless infra and functions can help alleviate the costs by being invoked only when needed. This chapter will help layout the blueprint of how to leverage Spring Serverless with on-prem or cloud-based AI/ML environmentsSubtitles1. Spring Cloud Functions with Google Cloud Functions and Tensor Flow2. Spring Cloud Functions with AWS Glue and AWS Sage or AI/ML3. Spring Cloud Functions with Azure Data Factory and Azure ML4. Spring Cloud Functions with Apache AI/ML on-prem VMWare Tanzu and Openshift6. Spring Cloud Functions and IOTThis chapter will take the reader through blueprints and architect diagrams of how Spring serverless works in conjunction with IOT on various Hyperscalers (Cloud Providers) or SaaS IOT Gateway providers.Subtitles1. Spring Cloud Functions on the Cloud with AWS IOT2. Spring Cloud Functions on the cloud with Azure IOT3. Spring Cloud Functions on the cloud with GCP IOT4. Spring Cloud Functions on-prem with IOT gateway on a SaaS provider (Eg, SmartSense)7. Industry specific examples with Spring Cloud FunctionsThis chapter will provide industry specific examples and use cases that will help the reader understand how Spring Serverless can be leveraged within their specific business use case1. Oil/ Natural gas pipeline tracking with Spring Cloud Functions, IOT and Spring Cloud Data Flow2. Enabling ubiquitous health care with Spring Cloud Functions and Big Data Pipelines3. Connected vehicles with Spring Cloud Functions4. Conversational AI in Retail with Spring Cloud Functions
Pro Android with Kotlin
Develop Android apps with Kotlin to create more elegant programs than the Java equivalent. This revised book covers the various aspects of a modern Android app that professionals are expected to encounter. You'll use the latest Kotlin APIs as made available in most recent versions of the Android SDK.There are chapters dealing with all the important aspects of the Android platform, including GUI design, file- and data-handling, coping with phone calls, multimedia apps, interaction with location and mapping services, monetizing apps, and much more. Jetpack will also be covered. It is a suite of libraries to help developers follow best practices, reduce boilerplate code, and write code that works consistently across Android versions and devices.Pro Android with Kotlin, Second Edition is an invaluable source for developers wanting to build real-world, state-of-the-art Android apps for modern Android devices using the Kotlin programming language and its APIs as available in the modern Android SDK. After reading this book, you'll come away with the skills and techniques to build modern Android apps that you can sell on Google Play. Free source code is available on this book's Github page as well.WHAT YOU WILL LEARN* Integrate activities, such as intents, services, notifications and more, into your Android apps* Build UIs in Android using layouts, widgets, lists, menus, and action bars* Deal with data in your Android apps using data persistence and cloud access* Design for different Android devices* Create multimedia apps in Android* Secure, deploy, and monetize your Android appsWHO THIS BOOK IS FORProfessional Android app developers.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java related projects. In 2016 he decided to concentrate on writing books on various subjects, with a primary focus on software development. With a wealth of experience in Java-related languages, the release of Kotlin for building Android Apps made him enthusiastic about writing books for Kotlin development in the Android environment. 1. System.- 2. Application.- 3. Activities.- 4. Services.- 5. Broadcasts 6. Content Providers.- 7. Permissions.- 8. APIs.- 9. User Interface.- 10. Development.- 11. Building.- 12. Communication.- 13. Hardware.- 14. Testing.- 15. Troubleshooting.- 16. Distributing Apps.- 17. Instant Apps.- 18. CLI.
Boozang from the Trenches
Test Automation is a key aspect of delivering high-quality software and reducing time to market. Several tools and approaches are available today, each with its own constraints and specificity. This book introduces Boozang, a codeless web automation tool, using a real-life enterprise project as source for examples.You'll have the opportunity to learn the basic features of Boozang and how to implement end-to-end automated scenarios, mixing GUI and API actions. Integration with JIRA-XRay and Jenkins is also covered to show how Boozang can be used effectively in an enterprise environment. The book is filled with examples that go beyond the Boozang tool, and cover the setup of a test automation project in a real context, with practical solutions as well as open points for which we are still looking for new ideas.YOU WILL LEARN HOW TO:· Install and set up a project with Boozang· Create a modular test suite and use Gherkin to define scenarios· Integrate Boozang with JIRA-XRay and work in a team with code branches· Build a Jenkins pipeline to execute the automated scenarios nightly and reduce the execution time via parallelismTHIS BOOK IS FOR:Testers and test managers, IT projects leads, Release and Delivery Managers, Developers, and Business AnalystsGianni is a simple guy from Livorno (a beautiful port city in Tuscany) who never thought he would end up with a Ph.D. at CERN (European Organization for Nuclear Research, cern.ch) and then working for a prestigious company in Switzerland. But he always knew that at some point in his life, he would have written a book.In his early career as a software developer, he built some C/C++ code but, pretty soon, debugging null pointer exceptions drove him crazy. He then decided he would be better off testing software rather than building it.Wherever he worked, he tried to push for automating tests. Because manual testing, let’s be honest, is not fun, and it can be dangerously repetitive. People at work must have fun, if possible. At Touring Club Suisse, he defined an IT Test Strategy stating “Test automation is developers’ stuff” until he discovered Boozang. And then, in his first two hours of using this tool, he thought, “Man, this is fun!”.Thus, he finally found a good topic for his book.Part 1: Testing web applications in an Enterprise context, why Boozang Chapter 1: Web Test Automation in an Enterprise environmentCHAPTER GOAL: This chapter introduces basic Test Automation concepts that will be used throughout the book. Besides ISTQB standard terminology, I’ll also cover the constraints typical of an Enterprise environment that might not be the same for small startups and IT giants.NO OF PAGES 15SUB -TOPICS1. Common Test Automation challenges2. Test levels, test types and testing roles3. Test automation in agile development4. Test Automation ROI, theory and practiceChapter 2: Selenium, best practices and pain pointsCHAPTER GOAL: This chapter presents the typical approach to testing web applications with coded solutions like Selenium and highlights the main pain points that could undermine a Test Automation initiative's success.NO OF PAGES: 5SUB - TOPICS1. Locators and Page Objects pattern2. Browsers and WebDriver compatibility3. Timing and waits4. Data management5. Reporting and script readability6. Development skillsChapter 3: Meet BoozangCHAPTER GOAL: This chapter introduces Boozang and how it addresses the pain points of a coded solution as described in the previous chapter. It also presents a possible selection approach for selecting an automation tool, particularly the one I followed before adopting Boozang.NO OF PAGES : 11SUB - TOPICS:1. Proof of Concept phase2. Pilot phase3. Why Boozang4. Codeless approach, how important is it?Chapter 4: The TCS projectCHAPTER GOAL: This chapter presents the context of the TCS project used all along the book to provide practical examples. I believe that there is no one size fits all solution for software testing and tools. Therefore, clarifying the context is very important to better understand the examples and consider possible adaptations one will have to make for a different context.NO OF PAGES: 8SUB - TOPICS:1. TCS Organization and Test Automation history2. NIS project introduction3. Test automation stream, NISTA setupChapter 5: How Boozang was bornCHAPTER GOAL: This chapter is a special one about the history behind Boozang. I believe it gives a great idea about this tool's strengths: the two key persons behind it. This input has been kindly provided by Mats Ljunggren.PART 2: Boozang main concepts and use cases Chapter 6: Starting up with BoozangCHAPTER GOAL: One of the advantages of a tool like Boozang versus a coded approach is that setting up your first projects is really easy and fast. Nothing to install, no code or POM files to prepare. This chapter will go over the registration process and the few steps needed to create a project. We will also see how to administer your account and projects and finally show how Boozang works behind the scenes.NO OF PAGES: 22SUB - TOPICS:1. Creating your first project2. The administrative User Interface3. Boozang under the hood4. Practice: NISTA setup part 1Chapter 7: Main concepts and entitiesCHAPTER GOAL: This chapter describes the core objects available in Boozang and starts introducing the Integrated Development Environment (IDE).NO OF PAGES: 38SUB - TOPICS:1. Modules and SubModules2. Application environments3. Tests and Test Suites4. Features and Scenarios5. Searching and bookmarks6. Recording7. Generate and reference Test8. Execution and Reporting9. Projects settings and UI Customization10. Updates from the trenchesChapter 8: Elements location approachCHAPTER GOAL: This chapter describes Boozang’s unique approach for locating WEB GUI elements, one of the features that sets it apart from other tools. Boozang, with its set of locators based on natural language, allows you to focus on the scenario flow rather than the web page DOM.NO OF PAGES: 14SUB - TOPICS:1. Boozang location strategy2. Fine tuning the locators3. Validating the expected resultsChapter 9: Exit conditions, conditional flows, and timersCHAPTER GOAL: The first test you will try with Boozang will be a simple sequential list of actions. But, as soon as you start implementing real scenarios, you will have to use exit conditions, loops, and conditional flows. In combination with this, you may need to adjust the timing of some locators, as some applications may have slow background processes, heavy loading pages, and/or javascripts. In this chapter, we see how to apply these concepts to build solid and reusable building blocks.NO OF PAGES: 21SUB - TOPICS:1. Exit conditions2. Conditional flows3. Loop groups4. TimersChapter 10: Data ManagementCHAPTER GOAL: This is probably one of the most important chapters, as data management is one of the main keys to build reusable components. Boozang is extremely powerful and flexible when it comes to managing test data. But power and flexibility can hide a complexity cost if you don’t use it properly.NO OF PAGES: 13SUB - TOPICS:1. Data management concepts2. Parameters3. Project data ($project)4. Module data ($module)5. Test data ($test)6. Loops ($loop, $group, $action)7. Examples from the trenchesChapter 11: Reporting and troubleshootingCHAPTER GOAL: This chapter covers some standard and more advanced reporting features available in Boozang as well as the best way you can analyze failures with minimal effort.NO OF PAGES: 20SUB - TOPICS:1. Test reports2. Trend reports3. Troubleshooting failuresPART 3: Integrations and Advanced topicsChapter 12: APIs and mixed API/GUI testingCHAPTER GOAL: In today’s world applications are highly interconnected, both with internal and external systems. Restful APIs are becoming the de-facto standard to allow this communication. This chapter explains how to test Restful APIs and create scenarios with both GUI and API actions. Boozang allows you to do API testing as well as mix API calls within your GUI tests.NO OF PAGES: 17SUB - TOPICS:1. Restful APIs2. Why Boozang for testing APIs?3. API Tests in Boozang4. Server side mock with JSON Server5. API Tests from the trenchesChapter 13: Gherkin and Behavior Driven DevelopmentCHAPTER GOAL: This chapter introduces the reader to the Gherkin language and the practice of Behavior Driven Development (BDD), also known as Acceptance Test Driven Development (ATDD).NO OF PAGES: 18SUB - TOPICS:1. Behavior Driven Development2. Gherkin without BDD, pros and cons3. Gherkin language, readability above all,... if possible4. Some good and bad examplesChapter 14: JIRA with Boozang via XRayCHAPTER GOAL: This chapter shows how to effectively manage releases via JIRA, XRAy and Boozang to have a complete quality view on releases when using both manual and automated tests.NO OF PAGES: 17SUB - TOPICS:1. Using JIRA with XRay2. Boozang integration with XRayChapter 15: Jenkins and the Boozang runnerCHAPTER GOAL: This chapter shows how to use Jenkins for scheduling and reporting automated tests results in a CI/CD pipeline. We will see how Boozang can be used with other tools to provide a fully automated pipeline and also how to reduce the execution time through parallel runs.NO OF PAGES: 40SUB - TOPICS:1. Continuous Delivery and the need for automating acceptance tests2. Puppeteer and the Boozang runner3. How to use the Docker runner4. Keeping execution time low with parallel runs5. Reports and log files6. Publishing reports on Jenkins and JIRA7. Complete working pipeline8. Docker in Docker setupChapter 16: Boozang for teamsCHAPTER GOAL: Working with a team increases productivity but brings new challenges. This chapter covers all the Boozang features for collaborative work, but also some specific details on how to effectively collaborate in a Test Automation project.NO OF PAGES: 26SUB - TOPICS:1. Team collaboration2. Explicit lock3. Concurrent development and safe refactoring with branches4. Tests Map5. Quality controlConclusionsAppendix
Cloud Native Applications with Docker and Kubernetes
This book takes developers on a journey into the cloud with Docker and Kubernetes. It walks you through the basics of Docker containers, how they are built, run, and published, and how the Kubernetes system allows you to use containers to better manage a cloud native application. Additionally, it walks you through various issues in cloud architecture, and how to design a cloud architecture that will work with your application and your team.The book takes a unique approach, getting you immersed in each subject with tutorials, then building up your technical knowledge, and finally backing up and thinking about more big-picture issues. Part one introduces Docker, building and working with Docker images, and covering best practices for Docker Containers. Part two covers the practicalities of "cloud native” and managing a Kubernetes application, including a full working example. The last part covers the design of cloud and microservice architectures, including the use of enterprise message queues, multi-site configurations and the common values that such architectures follow.This approach accelerates learning and keeps you moving forward without leaving you behind. The appendices also contain a wealth of worthwhile reference material for routine cloud application management.WHAT YOU WILL LEARN* Understand Docker and containerization* Gain insight into what Kubernetes is* Master essential cloud architecture design principles* Design and implement notes for building cloud architecturesWHO THIS BOOK IS FORPrimarily developers who are moving to the cloud and want to get a sense of the environment they are getting into, and developers who want to move into a larger role of cloud architecture. Jonathan Bartlett is a senior software developer for McElroy Manufacturing. In his career he has served as senior developer and cloud architect roles for several companies in the biking industry, the music industry, the housing industry, and the medical industry. Jonathan has also taught computer science at the college and high school levels. In his spare time he writes for MindMatters.ai and also writes research papers on artificial intelligence, mathematics, and the applications of information theory to other sciences. Chapter 1. Introduction - what they should expect from the book.PART 1: DOCKERChapter 2. Docker Under the Hood - introduction to the history and technology behind Docker. I find that really understanding Docker containers well requires a brief knowledge of their history and implementation.Chapter 3. A Docker Interactive Tutorial - the basics of building and working with Docker imagesChapter 4. Best Practices for Docker Containers - general tips, Debian vs Alpine, etc.PART 2: KUBERNETESChapter 5. The Cloud Native Philosophy - a general intro to the goals behind “Cloud Native” and KubernetesChapter 6. Getting Started with Kubernetes - showing how to deploy a simple system on Kubernetes with the Kubernetes dashboardChapter 7. Managing Kubernetes with kubectl - an introduction to the kubectl toolChapter 8. The Kubernetes environment - now that the user has some hands-on with Kubernetes, we introduce the components themselvesChapter 9. Basic Kubernetes Management - how to work with YAML filesChapter 10. A Full Kubernetes Cloud Example - full Kubernetes code for a cluster for a Message Board systemChapter 11. Going Further in Kubernetes - a brief introduction to other parts of KubernetesPART 3: CLOUD ARCHITECTUREChapter 12. Cloud Architecture Introduction - why architecting mattersChapter 13. Basic Cloud Architectures - basic architectural diagrams for the most common situationsChapter 14. Microservice Architectures - what microservices are, why they are important, and how to build such an architectureChapter 15. Enterprise Message Queues - what message queues are and how they make micro service architectures more flexible and resilientChapter 16. Architecting Data Stores - various database (and other data store) optionsChapter 17. Multi-Site Configurations - introducing terminology and through processes behind multi-site configurationsChapter 18. Architecture Values - a discussion of common themes for cloud architecturesChapter 19. ConclusionAPPENDICES:1. Navigating the Linux Command Shell2. Installing Applications3. Common kubectl commands4. Kubernetes Storage Options5. Kubernetes Pod Scheduling6. Troubleshooting Kubernetes Clusters
Serverless Beyond the Buzzword
Know how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.Deployment automation and DevOps also feature heavily in this book, and you will find real-world use cases and examples of Serverless architecture to get you started. It's worth noting that this book is not a development guide; it gives you a comprehensive understanding of what Serverless is so you can make informed decisions for your organization and projects.WHAT YOU’LL LEARN* Understand Serverless architecture and strategy* Understand modern cloud management strategy, governance, and organizational team structure* Handle budget planning and management* Get started with Serverless architecture design* Gain knowledge of best practices and security, as well as data management and DevOps* Study proactive logging, operations, architecture examples, case studies, and moreWHO THIS BOOK IS FORAnyone interested in a deep understanding of Serverless and how it can impact organizations and projects, regardless of their technical level. Strategic insights are provided for entrepreneurs and executives, planning and team insights for project managers, and technical insights for architects and team leads. Cloud consultants working with enterprises can read everything for a full, in-depth understanding of the topic. Other readers, such as less technical CTOs/CIOs, VPs, entrepreneurs, product owners, project managers, etc., can get what they need from the first 5-7 chapters. More technical readers and those experienced with Serverless can skim through the first 3 chapters and start with the security deep dive in Chapter 4.Thomas Smart has been actively involved with digital projects since 2002. His experience crosses many industries and types and sizes of organisations, giving him a wealth of experience and knowledge to draw upon as part of his consulting services. Since 2020 he has worked as a senior consultant for Sourced Singapore, helping large, regulated enterprises evolve their cloud strategy to productively deliver Serverless applications. This experience has provided many new insights for large enterprises and their unique challenges when adopting modern cloud strategies. About the authorAcknowledgementsPrologueWho is this book for?Technical levels used in this bookWhat will you learn?Amazon Web Services (AWS)Second editionChapter 1: Serverless basicsWhat is Serverless architecture?MicroservicesServerless exampleHistory of ServerlessTypes of projectsKey challengesKey benefitsCommon objectionsPublic case studiesChapter 2: StrategyIntroductionTraditional organization structure vs ServerlessCloud Centre of Excellence (CCoE)Cloud controls as compliance guardrailsSupporting toolsServerless adoption: current stateServerless adoption: desired stateServerless adoption: gap analysisApplication suitability for ServerlessEvent StormingPublic case studiesChapter 3: FinancesTotal Cost of Ownership (TCO)The value of paying for utilizationThe cost to develop ServerlessThe cost of migrating applicationsThe cost of maintenance and operationsEstimating the cloud operational costsCollecting the input data for an estimateCalculating the estimateCost managementCost optimizationChapter 4: SecurityShared responsibilityServerless securityPrinciple of Least PrivilegeIAM Policy tipsSecurity for cloud usersSecurity for microservicesUser input validationStoring credentialsEncryptionProtecting DataSecuring DatabasesPrivacy and GDPRSecurity monitoring with ElectricEyeChapter 5: PeopleServerless rolesServerless roles: Solution ArchitectServerless Roles: Cloud Security EngineerServerless Roles: Deployment Automation EngineerServerless roles: Full Stack DeveloperServerless roles: Database EngineerServerless trainingServerless team structureWorking with Serverless vendorsVetting Serverless capabilitiesChapter 6: DevOps & ToolingWhat is DevOps?Infrastructure as CodeAWS CloudFormationAWS CloudFormation planningTerraformAWS Serverless Application Model (SAM)AWS AmplifyAWS Cloud Development Kit (CDK)CDK technical considerationsServerless FrameworkCode RepositoriesGIT SubmodulesDeveloper ToolingCode quality assuranceChapter 7: DataData is a valuable assetDatabase selectionEvent SourcingData tenancyRelational Database Service (RDS)Redshift ServerlessDynamoDBNoSQLServerless NoSQL databasesManaged NoSQL databasesNoSQL databases comparisonIn-memory databasesAppSyncSimple Storage Solution (S3)Elastic File System (EFS)Chapter 8: Logging & TestingLoggingReactive LoggingProactive LoggingLogging format and contentLog types in the cloudCloud logging servicesCloudWatchExporting logs to S3CloudWatch SubscriptionsManaged services for proactive loggingError MonitoringPerformance OptimisationCost TrackingSecurity MonitoringLogging Best PracticesTestingTesting Challenges in ServerlessTypes of TestsAsynchronous TestingRisk Assessment for TestingTest Pyramid vs Test HoneycombContract Testing for ServerlessDeployment PipelineAWS Testing ServicesChapter 9: ArchitectureChallenges & mitigationsAWS: MicroservicesAWS: Application Programming Interface (API)Design patternsMicroservice example architecturesStateless architectureDecoupling microservicesAWS: DecouplingEvent-driven architectureAsynchronous design patternContainersAWS: EdgeAWS: Internet of Things (IoT)AWS: Managed Machine Learning (ML)AWS: Ledger TechnologyAWS: Call CentreWell-Architected FrameworkServerless tipsChapter 10: Case studiesIntroductionProactive loggingServerless data lakeVideo analysisServerless MinecraftDynamic live streamingSEO-friendly website and CMSVirtual hostTrue Serverless containersEpilogueReferences
Infrastructure Leader's Guide to Google Cloud
Making fast and accurate technology decisions is critical to staying relevant to your customers. And technology needs to add value back to your organization quicker than ever. Google Cloud offers IT leaders the answer to today’s technology challenges. However, to realize its benefits you must navigate your journey without hitting common pitfalls that lead to stalled and unsuccessful cloud adoption.This book distills the lessons learned from guiding and working with hundreds of organizations on their journey to the cloud. Its goal is to give aspiring and current IT leaders the knowledge required to be an infrastructure leader. That is the term author Jeremy Lloyd uses for the person who can lead your organization's Google Cloud adoption strategy.Of course, cloud adoption isn’t a solo endeavor. Jeremy covers the different generations of IT leaders, the team structure, and the skills required for a successful migration to Google Cloud. This book also covers why you should choose Google Cloud, how to build a business case for the cloud, and defining your adoption/migration/modernization strategies and cloud operating model. Finally, the book covers how to empower your developers to deploy cloud-native applications and how to support day two operations once you have moved to Google Cloud.WHAT YOU WILL LEARN* Use Google Cloud to add value to your organization* Define and lead your Google Cloud adoption strategy * Migrate and modernize your workloads* Operate workloads once in Google Cloud and avoid antipatterns* Understand how the infrastructure team can be enablers for cloud-native developmentWHO THIS BOOK IS FORCurrent infrastructure/IT/technology leaders who need guidance for their Google Cloud adoption, migration, and modernization journey; IT managers, IT team leads and IT professionals aspiring to be the next IT leaders who must learn to navigate more than just technical complexity.JEREMY LLOYD has over 20 years of experience in IT. He has spent the last eight years helping organizations worldwide adopt and migrate to the cloud. During this time, he’s guided and advised technology leaders from some of the world’s most well-known companies on their cloud adoption, migration and modernization strategies. In addition, he is a mentor to technology leaders and a speaker at numerous events across the UK and internationally.CHAPTER 1: INTRODUCTIONChapter Goal: Introduce a concept that there are essentially four types of infrastructure leaders as I know them. Let them build a relationship with one of the four which provides them with a lens upon which to view the current state and the path to progress forwards with GCP. Then inform them of the role that an infrastructure leader plays in a GCP adoption and migration strategy. Lay out the challenges they will face adopting GCP/Cloud. Provide guidance on a fundamental shift from a cost centre to a profit centre.No of pages - 12Sub-Topics1. What does an Infrastructure Leader do? Or Who is an Infrastructure Leader?2. Type of Infrastructure Leaders3. Challenges4. Becoming a profit centreCHAPTER 2: ABOUT GOOGLE & GOOGLE CLOUDChapter Goal: Take the reader on a short journey of the history of Google and bring out the narrative around their values and principles and empower them to lead innovation across every sector they touch. Then bring out the core value proposition of Google Cloud itself, underpinned by evidence to backupNo of pages - 28Sub - Topics1. Google short history2. Introducing Google Cloud Platform3. Google Cloud Platform core components4. Why use Google Cloud PlatformCHAPTER 3: FUTURE OF ITChapter Goal: Orient the reader into understanding that their current state has to change. Back up the messaging with trends and data points they can’t refute.No of pages - 3Sub - TopicsCHAPTER 4: THE FOUR STAGES OF GOOGLE CLOUD PLATFORM ADOPTIONChapter Goal: Label and define the four states of GCP/Cloud adoption. Let the reader understand how and where any experience they currently have sits. Help them understand the considerations to going with one strategy over the others.No of pages - 7Sub - Topics1. Shadow IT2. Tactical Adoption3. Strategic Adoption4. Organisation TransformationCHAPTER 5: BUSINESS CASEChapter Goal: Arm the reader with the information they need to write a rapid or detailed business case to justify adoption and migration to GCP. The aim is to make is simple for them to get the right story that will resonate with their organisation.No of pages - 6Sub - Topics1. Rapid Business Case2. Detailed Business Case3. Integrating with an existing business case templateCHAPTER 6: THE CLOUD STRATEGYChapter Goal: Show them the importance of having a well-defined cloud strategy. Then give them almost a blueprint upon which to follow in how to create one.No of pages - 10Sub - Topics1. Version2. Executive Summary3. Current State4. Financial Models5. Alignment to business strategy6. Guiding Principles7. Security8. Compliance9. Risk Management10. Governance11. Ways of Working12. Objectives and Key Results (OKRs)13. Implementation PlanCHAPTER 7: CLOUD OPERATING MODELChapter Goal: With a defined cloud strategy you need the next layer which is to define what your cloud operating model is. This chapter aims to inform what to consider and how their operating model could look and how to ensure it can evolve as the organisation matures with GCP.No of pages - 6Sub - TopicsCHAPTER 8: MIGRATION STRATEGIESChapter Goal: Inform the reader of the industry used migration approaches and Google Cloud’s take on them.No of pages - 3-5Sub - Topics1. Migration Objectives2. Migration Risk management3. Googlers & Office of the CTO4. Partner Ecosystem5. ActionsCHAPTER 9: MODERNISATION STRATEGIESChapter Goal: Inform the reader about modernisation strategies, Google’s tools and some simple methods to help them quickly decide what to modernise.No of pages - 10Sub - Topics1. Modernisation guardrails2. Modernisation roadmap3. Mainframe Modernisation4. Migration Decision Tree5. ActionsCHAPTER 10: ORGANISATIONAL READINESSChapter Goal: Provide the reader with the considerations across key areas that will help them be prepared for cloud adoption/migration.No of pages - 34Sub - Topics1. Paving the roads for cultural change2. Google Cloud Adoption Framework3. Managing The Hype-cycle4. Skillset5. Cloud Adoption Teams (CMO, CCoE etc)6. Building a Cloud Center of Excellence7. Security Readiness8. Governance Readiness9. Operations ReadinessCHAPTER 11: MIGRATION & MODERNISATION TEAM STRUCTURESChapter Goal: Get the reader to understand the people, skills and ways of working that GCP migration and modernisation requiresNo of pages - 2Sub - TopicsCHAPTER 12: MIGRATIONSChapter Goal: Provide guidance across migration assessment, planning and execution. Inform them what good first mover workloads look like.No of pages - 20-22Sub - Topics1. Introducing The Migration Journey2. Assess3. Plan4. Migrate5. OptimiseCHAPTER 13: CLOUD-NATIVE DEVELOPMENTChapter Goal: The infrastructure leader won’t be responsible for cloud-native development but they can/should play a key role in it’s facilitation. It showcases the considerations across new areas that the infrastructure team should be focusing on.No of pages - 20Sub - Topics1. Cloud-Native Advantages2. Containers3. Integrated Development Environment4. Serverless5. BeyondProdCHAPTER 14 : DAY 2 OPERATIONSChapter Goal: Introduce the concept of Day 2 Operations to the reader. Then give them guidance around what the infrastructure team should be thinking about across each of the sub-topics, all staying within a day 2 operations context.No of pages - 60Sub - Topics1. Day 2 Cloud Challenges2. Cloud Foundations3. Landing Zones4. Compute5. Monitoring, Logging And Alerting6. Availability7. Reliability8. Recoverability9. Financial Operations10. Performance11. Security12. Automation13. Governance and Compliance14. Cloud Marketplace15. GCP Managed Services16. Containers17. Data Analytics18. Open Source19. Support20. Day 2 antipatterns21. DevOps/SRE/CRECHAPTER 15: PRODUCTIVITY AND COLLABORATIONChapter Goal: Introduce a Google concept of BeyondCorp and how that ties in with a GCP migration strategy. Introduce Google Workspace and benefits of using it.No of pages - 8Sub - Topics1. BeyondCorp2. Google Workspace
IT-Management
Dieses Buch befasst sich mit der Kunst des IT-Managements. Es wird ein einfacher und robuster Rahmen vorgeschlagen, um die wesentlichen Elemente des IT-Managements zu beschreiben und zu strukturieren. Die Autoren legen besonderes Augenmerk auf didaktische Aspekte, um das Behalten der vorgestellten Modelle zu erleichtern und das Nachdenken über die vorgestellten Themen zu fördern. Dank eines Konzentrats an bewährten Praktiken wird jedes Unternehmen schnell in der Lage sein, sein eigenes IT-Ökosystem aufzubauen.DR. LIONEL PILORGET war in verschiedenen IT-Managementpositionen in der Industrie und im Finanzsektor tätig. Zu seinen vielfältigen Aufgaben gehörten die Umsetzung von Richtlinien und Strategien sowie die Leitung von komplexen, strategischen IT-Projekten. Derzeit ist er Leiter Business Analysen und Projektmanagement bei einer Privatbank in der Schweiz. Ausserdem ist er Dozent für den Masterstudiengang "Wirtschaftsinformatik" an der Fachhochschule Nordwestschweiz FHNW.THOMAS SCHELL hat Informatik studiert und sich auf den Bereich Management von IT-Prozessen, -Services und -Organisationen spezialisiert. Dreimal in seiner Karriere hat er klassische IT-Organisationen zu kundenorientierten IT-Dienstleistern umgestaltet. Nach 25 Jahren in der Schweizer Pharma- und Chemieindustrie ist er heute Dozent für IT Service Management an Fachhochschulen in der Schweiz und in Deutschland. Er unterstützt IT-Organisationen als Berater und Trainer für Best-Practice-Frameworks.
Pro .NET on Amazon Web Services
This book provides in-depth guidance and best practices for .NET developers new to working with Amazon Web Services. AWS is the world’s most comprehensive and broadly adopted cloud platform, and this book will help you choose from, and use, its extensive collection of cloud services when developing and hosting your .NET applications in the cloud.Pro .NET on Amazon Web Services focuses on the building and deployment of .NET applications on AWS. It demonstrates best practices and provides prescriptive guidance around moving existing .NET Framework, .NET Core, and .NET 5+ applications to AWS. It also offers directions on building new, distributed, and reliable cloud-native applications. You will learn how to take advantage of the various tools available from AWS to build and deploy .NET-based applications. You will also be shown how to take advantage of different AWS services, including various execution platforms and databases that can help your .NET applications to achieve the reliability and scalability that AWS is known for.WHAT YOU WILL LEARN* Develop and deploy Microsoft .NET applications on the Amazon Web Services platform* Take advantage of the various free tools AWS offers for developing and deploying cloud applications* Choose the correct compute service on which to host your application* Choose the right database from the many options that AWS offers* Make AWS service calls from within .NET applications* Secure .NET applications using best practices around AWS Identity and Access Management (IAM)* Migrate existing .NET applications to the AWS platform and take advantage of the services offered* Build modern .NET applications using advanced AWS servicesWHO THIS BOOK IS FOR.NET developers seeking to take advantage of the breadth and depth of functionality in the AWS cloud, as well as developers who, whether new to cloud applications or experienced in the cloud, face challenges in understanding and applying the breadth and depth of services available from AWS when choosing to develop and host their applications. It will also be useful for those interested in extending their application’s functionality through calling AWS services from within their applications, and who want to apply best practices for building and securing modern distributed .NET applications in the Amazon Web Services cloud.BILL PENBERTHY has over 25 years in software development (almost 15 of which is .NET), and brings a pragmatic approach to software development . With much of that time spent in consulting, he has worked on many different projects and used many different designs and approaches. In 2019, he switched to the dark side where he puts his development experience towards being a .NET developer advocate with AWS.STEVE ROBERTS is a Developer Advocate for .NET and PowerShell development at AWS. Based in Seattle, Washington, Steve worked for 8 years as a Senior Development Engineer on the AWS tools for .NET. He was the development lead for the AWS Tools for PowerShell and the AWS Tools for Azure DevOps and contributed to the AWS Toolkits for Visual Studio, and Visual Studio Code, and the AWS SDK for .NET. Prior to joining AWS, Steve had over 20 years’ experience as a developer focused on IDE tools and integrations.PART I. GETTING STARTED1. The Core Essentials2. AWS Tools for .NET3. Additional ToolsPART II. HOSTING YOUR APPLICATIONS4. Virtual Machines5. Containers6. ServerlessPART III. STORING YOUR DATA7. S3 Object Storage8. Microsoft SQL Server9. Other RDS Databases10. NoSQL Databases and AWS11. Purpose-built DatabasesPART IV. MOVING EXISTING APPS TO AWS12. Moving to Virtual Machines.13. Containerizing14. Migrating your Data15. Re-platforming and RefactoringPART V. BUILDING CLOUD NATIVE APPLICATIONS16. Events and Messaging17. Monitoring and Observability
MySQL Database Service Revealed
Access all the information you need to begin using the MySQL Database Service (MDS) in the Oracle Cloud Infrastructure (OCI). MDS is Oracle’s new platform as a service (PAAS) offering for open-source database users. This book covers getting started with an account in OCI, gives a brief overview of OCI services available, and provides a short tutorial on MDS. Reading this book helps you take advantage of the powerful OCI features by building your own MySQL database in the cloud.Examples in this book center around running MDS in OCI, and include several of the popular use cases as well as advice on how to implement them. In addition, you will learn more about the related MDS OCI features, such as the high availability features currently available. Finally, you will learn how to back up and restore your data as well as how to get your data into and out of the cloud. The skills you learn in this book will help you get started using MDS and letting Oracle do the heavy lifting of managing MDS operations and implementation.WHAT YOU WILL LEARN* Use Oracle Cloud Infrastructure (OCI)* Deploy MySQL Database Service (MDS) systems in the cloud* Connect your applications to MDS* Back up and recover using the data recovery features of MDS* Employ the newest high availability features of MDSWHO THIS BOOK IS FORSystems engineers, developers, and database professionals who want to learn about the powerful features of the MySQL Database Service (MDS) and how to incorporate cloud-based database storage into their infrastructure and applications. Readers who are new to MySQL will appreciate the tutorial chapter, and those familiar with MySQL will learn the latest features of MDS as well as how to build inexpensive, powerful MySQL database servers in the Oracle Cloud Infrastructure (OCI).CHARLES BELL conducts research in emerging technologies. He is a member of the Oracle MySQL Development team and is one of the principal developers for the MySQL Database Service (MDS) team supporting MySQL as a service in the Oracle Cloud Infrastructure (OCI). He received his Doctor of Philosophy in Engineering from Virginia Commonwealth University in 2005.Dr. Bell is an expert in the database field and has extensive knowledge and experience in software development and systems engineering. His research interests include 3D printers, microcontrollers, database systems, cloud systems, software engineering, Internet of Things, and sensor networks.Dr. Bell lives in a small town in rural Virginia with his loving wife. He spends his limited free time as a practicing Maker, focusing on microcontroller projects and refinement of 3D printers. 1. Getting Started with MySQL in the Cloud2. Oracle Cloud Infrastructure3. A Brief Tutorial of MySQL4. MySQL Database Service5. Backup and Restore6. Point-in-Time Recovery7. Data Import and Export8. High Availability9. OCI Command-Line Interface and Application Programming Interfaces10. Migrating to MDS
Hacking & Security - Das umfassende Handbuch (3. Auflage)
Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre IT-Systeme auch wirklich absichern. Dieses umfassende Handbuch ist der Schlüssel dazu. Die Security-Profis rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen – Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern: Hier werden Sie zum Security-Experten!Aus dem Inhalt: Kali LinuxHacking-Tools (nmap, hydra, mimikatz, Metasploit, OpenVas)Externe Sicherheitsüberprüfung & Pen-Tests auf Client und ServerIT-Forensik: Spuren sichern und analysierenWLAN, Bluetooth und Funk abhören, USB-Hacking-DevicesBasisabsicherung: Linux und Windows, Active Directory und SambaCloud-Sicherheit: Microsoft 365, AWS, NextCloudHacking und Security von SmartphonesIntrusion Detection mit SnortWeb-Anwendungen absichern und angreifenExploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr; Inkl. Spectre & MeltdownIoT-Security: Angriffe und sichere EntwicklungLeseprobe (PDF-Link)
Rechnernetze
Wie Daten zwischen Rechnern ausgetauscht werden, ist absolutes Grundlagenwissen im Informatikstudium: Das OSI-Modell und die Grundlagen der paketbasierten Kommunikation müssen Sie kennen, wenn Sie professionell mit Computern arbeiten. Dazu finden Sie in diesem umfassenden Lehrbuch den vollständigen Überblick über moderne Netzwerkthemen: Von der technischen Umsetzung über Algorithmen und Protokolle bis zur Planung und Konzeption von Netzwerkarchitekturen. Aus dem Inhalt: Netzwerke im ÜberblickEthernet und WLANPackete, Verbindungen und RoutingRouting-Algorithmen und Large Scale IP-RoutingBorder Gateway Protocol (BGP)IPv4 und IPv6 und Ihre Begleiter: DNS, ARP, DHCP, SLAACTransportprotokolle: UDP und TCPQueuing und SchedulingQuality of ServiceNetzwerkmanagement mit SNMPSicherheit und praktische Anwendung Materialien zum Buch ... 25 Geleitwort des Fachgutachters ... 27 1. Netzwerke im Überblick ... 29 1.1 ... Schichten ... 29 1.2 ... Datenrate, Durchsatz und Bandbreite ... 30 1.3 ... Pakete ... 31 1.4 ... Datagrammweiterleitung ... 33 1.5 ... Topologie ... 37 1.6 ... Routing-Schleifen ... 38 1.7 ... Überlast ... 40 1.8 ... Mehr über Pakete ... 41 1.9 ... LANs und Ethernet ... 42 1.10 ... IP -- Internet Protocol ... 45 1.11 ... DNS ... 54 1.12 ... Transport ... 55 1.13 ... Firewalls ... 61 1.14 ... Einige nützliche Dienstprogramme ... 63 1.15 ... IETF und OSI ... 65 1.16 ... Berkeley Unix ... 69 1.17 ... Epilog ... 70 1.18 ... Übungen ... 70 2. Ethernet-Grundlagen ... 75 2.1 ... Klassisches 10-Mbit/s-Ethernet ... 76 2.2 ... 100 Mbit/s (Fast) Ethernet ... 93 2.3 ... Gigabit-Ethernet ... 95 2.4 ... Ethernet-Switches ... 96 2.5 ... Epilog ... 101 2.6 ... Übungen ... 102 3. Weiterführende Ethernet-Themen ... 107 3.1 ... Spanning-Tree-Algorithmus und Redundanz ... 108 3.2 ... Virtuelles LAN (VLAN) ... 114 3.3 ... TRILL und SPB ... 119 3.4 ... Software-Defined Networking ... 122 3.5 ... Epilog ... 132 3.6 ... Übungen ... 132 4. Drahtlose LANs ... 137 4.1 ... Abenteuer im Funkland ... 137 4.2 ... Wi-Fi ... 143 4.3 ... WiMAX und LTE ... 182 4.4 ... Ortsfeste Drahtlosnetzwerke ... 188 4.5 ... Epilog ... 190 4.6 ... Übungen ... 191 5. Sonstige LAN-Technologien ... 195 5.1 ... Virtuelle private Netzwerke ... 195 5.2 ... Carrier-Ethernet ... 197 5.3 ... Token Ring ... 198 5.4 ... Virtuelle Verbindungen ... 200 5.5 ... Asynchronous Transfer Mode: ATM ... 204 5.6 ... Epilog ... 208 5.7 ... Übungen ... 208 6. Verbindungen ... 213 6.1 ... Kodierung und Frames ... 213 6.2 ... Zeitmultiplexverfahren ... 220 6.3 ... Epilog ... 227 6.4 ... Übungen ... 227 7. Pakete ... 229 7.1 ... Paketverzögerung ... 229 7.2 ... Schwankungen der Paketverzögerung ... 233 7.3 ... Paketgröße ... 234 7.4 ... Fehlererkennung ... 237 7.5 ... Epilog ... 245 7.6 ... Übungen ... 245 8. Sliding Windows ... 251 8.1 ... Zuverlässige Datenübertragung: Stop-and-Wait ... 251 8.2 ... Die Sliding-Windows-Strategie ... 256 8.3 ... Lineare Flaschenhälse ... 261 8.4 ... Epilog ... 271 8.5 ... Übungen ... 271 9. IP Version 4 ... 277 9.1 ... Der IPv4-Header ... 279 9.2 ... Schnittstellen ... 282 9.3 ... Spezielle Adressen ... 284 9.4 ... Fragmentierung ... 287 9.5 ... Der klassenlose IP-Delivery-Algorithmus ... 290 9.6 ... IPv4-Subnetze ... 294 9.7 ... Netzwerkadressübersetzung ... 302 9.8 ... Unnummerierte Schnittstellen ... 309 9.9 ... Mobile IP ... 311 9.10 ... Epilog ... 313 9.11 ... Übungen ... 313 10. IPv4-Begleitprotokolle ... 317 10.1 ... DNS ... 317 10.2 ... Address Resolution Protocol: ARP ... 336 10.3 ... Dynamic Host Configuration Protocol (DHCP) ... 341 10.4 ... Internet Control Message Protocol ... 343 10.5 ... Epilog ... 349 10.6 ... Übungen ... 349 11. IPv6 ... 351 11.1 ... Der IPv6-Header ... 352 11.2 ... IPv6-Adressen ... 353 11.3 ... Netzwerkpräfixe ... 358 11.4 ... IPv6-Multicast ... 359 11.5 ... IPv6-Erweiterungsheader ... 360 11.6 ... Nachbarschaftserkennung (Neighbor Discovery) ... 364 11.7 ... Zuweisung von IPv6-Hostadressen ... 371 11.8 ... Epilog ... 378 11.9 ... Übungen ... 378 12. Weitere IPv6-Funktionen ... 381 12.1 ... Weltweit sichtbare Adressen ... 381 12.2 ... ICMPv6 ... 382 12.3 ... IPv6-Subnetze ... 384 12.4 ... IPv6 und IPv4 gemeinsam benutzen ... 386 12.5 ... IPv6-Beispiele ohne Router ... 392 12.6 ... IPv6-Konnektivität über Tunneling ... 395 12.7 ... Konnektivität von IPv6 nach IPv4 ... 400 12.8 ... Epilog ... 402 12.9 ... Übungen ... 402 13. Routing-Update-Algorithmen ... 405 13.1 ... Distanzvektor-Routing-Update-Algorithmus ... 406 13.2 ... Langsames Konvergenzproblem bei Distanzvektoren ... 413 13.3 ... Minimierung der Streckenkosten ... 415 13.4 ... Schleifenfreie Distanzvektor-Algorithmen ... 418 13.5 ... Link-State-Routing-Update-Algorithmus ... 427 13.6 ... Routing nach anderen Attributen ... 432 13.7 ... ECMP ... 434 13.8 ... Epilog ... 435 13.9 ... Übungen ... 436 14. IP-Routing im großen Maßstab ... 445 14.1 ... Classless Internet Domain Routing: CIDR ... 446 14.2 ... Hierarchisches Routing ... 449 14.3 ... Routing in früherer Zeit ... 450 14.4 ... Providerbasiertes Routing ... 451 14.5 ... Geografisches Routing ... 458 14.6 ... Epilog ... 459 14.7 ... Übungen ... 459 15. Border Gateway Protocol (BGP) ... 465 15.1 ... AS-Pfade ... 467 15.2 ... AS-Pfade und Routenaggregation ... 469 15.3 ... Transit-Traffic ... 471 15.4 ... BGP-Filterung und Routing-Policies ... 471 15.5 ... BGP-Tabellengröße ... 474 15.6 ... BGP-Pfadattribute ... 475 15.7 ... BGP und Traffic-Engineering ... 480 15.8 ... BGP und Anycast ... 484 15.9 ... BGP für internes Routing ... 485 15.10 ... BGP-Beziehungen ... 486 15.11 ... Beispiele für BGP-Instabilität ... 492 15.12 ... BGP-Sicherheit und Route Registrys ... 494 15.13 ... Epilog ... 500 15.14 ... Übungen ... 500 16. UDP-Übertragung ... 503 16.1 ... User Datagram Protocol -- UDP ... 503 16.2 ... Trivial File Transport Protocol, TFTP ... 520 16.3 ... Grundlegende Übertragungsprobleme ... 523 16.4 ... Weitere Anmerkungen zu TFTP ... 531 16.5 ... Remote Procedure Call (RPC) ... 534 16.6 ... Epilog ... 539 16.7 ... Übungen ... 539 17. Grundlagen des TCP-Transports ... 545 17.1 ... Das Ende-zu-Ende-Prinzip ... 547 17.2 ... TCP-Header ... 547 17.3 ... Aufbau einer TCP-Verbindung ... 549 17.4 ... TCP und WireShark ... 555 17.5 ... TCP-Offloading ... 557 17.6 ... TCP-Simplex-Talk ... 558 17.7 ... TCP und bind() ... 563 17.8 ... TCP-Zustandsdiagramm ... 565 17.9 ... Epilog ... 572 17.10 ... Übungen ... 572 18. TCP -- Probleme und Alternativen ... 577 18.1 ... Alte Duplikate bei TCP ... 577 18.2 ... TIMEWAIT ... 578 18.3 ... Der dreifache Handshake -- erneut betrachtet ... 580 18.4 ... Anomale TCP-Szenarien ... 583 18.5 ... Schnelleres Öffnen von TCP-Verbindungen ... 584 18.6 ... Path MTU Discovery ... 587 18.7 ... Sliding Windows bei TCP ... 587 18.8 ... Verzögerte ACKs bei TCP ... 588 18.9 ... Nagle-Algorithmus ... 589 18.10 ... Flusssteuerung bei TCP ... 590 18.11 ... Silly-Window-Syndrom ... 591 18.12 ... Zeitüberschreitung und Neuübertragung bei TCP ... 592 18.13 ... KeepAlive ... 594 18.14 ... TCP-Timer ... 594 18.15 ... Varianten und Alternativen ... 595 18.16 ... Epilog ... 608 18.17 ... Übungen ... 608 19. TCP Reno und Überlastmanagement ... 611 19.1 ... Grundlagen des TCP-Überlastmanagements ... 612 19.2 ... Slow Start ... 618 19.3 ... TCP Tahoe und Fast-Retransmit ... 624 19.4 ... TCP Reno und Fast-Recovery ... 626 19.5 ... TCP NewReno ... 630 19.6 ... Selektive Bestätigungen (SACK) ... 632 19.7 ... TCP und Auslastung der Flaschenhalsverbindung ... 633 19.8 ... Verluste einzelner Pakete ... 638 19.9 ... Annahmen zu TCP und Skalierbarkeit ... 639 19.10 ... TCP-Parameter ... 640 19.11 ... Epilog ... 641 19.12 ... Übungen ... 641 20. TCP-Dynamik ... 647 20.1 ... Ein erster Blick auf das Queuing ... 647 20.2 ... Flaschenhalsverbindungen mit konkurrierendem Datenverkehr ... 649 20.3 ... TCP Reno -- Fairness mit synchronisierten Verlusten ... 659 20.4 ... Epilog ... 669 20.5 ... Übungen ... 669 21. Weitere TCP-Dynamiken ... 675 21.1 ... Begriffe der Fairness ... 675 21.2 ... TCP-Reno-Verlustrate und cwnd ... 677 21.3 ... TCP-Freundlichkeit ... 680 21.4 ... Noch einmal AIMD ... 684 21.5 ... Aktives Warteschlangenmanagement ... 686 21.6 ... Das TCP-Problem der hohen Bandbreiten ... 694 21.7 ... Das Problem der verlustbehafteten Verbindungen ... 696 21.8 ... Das Problem der Satelliten-TCP-Verbindungen ... 697 21.9 ... Epilog ... 697 21.10 ... Übungen ... 698 22. Queuing und Scheduling ... 705 22.1 ... Queuing und Echtzeitdatenverkehr ... 706 22.2 ... Traffic-Management ... 707 22.3 ... Priority Queuing ... 708 22.4 ... Warteschlangenverfahren ... 708 22.5 ... Fair Queuing ... 710 22.6 ... Anwendungen von Fair Queuing ... 730 22.7 ... Hierarchisches Queuing ... 733 22.8 ... Hierarchical Weighted Fair Queuing ... 737 22.9 ... Epilog ... 744 22.10 ... Übungen ... 745 23. Token-Bucket ... 749 23.1 ... Token-Bucket -- Definition ... 750 23.2 ... Token-Bucket -- Beispiele ... 753 23.3 ... Mehrere Token-Buckets ... 754 23.4 ... GCRA ... 755 23.5 ... Gewährleistung der VoIP-Bandbreite ... 757 23.6 ... Verzögerung begrenzen ... 758 23.7 ... Token-Bucket durch einen Router ... 760 23.8 ... Token-Bucket durch mehrere Router ... 761 23.9 ... Verzögerungsbedingungen ... 762 23.10 ... CBQ ... 765 23.11 ... Linux HTB ... 765 23.12 ... Parekh-Gallager Theorem ... 767 23.13 ... Epilog ... 768 23.14 ... Übungen ... 768 24. Quality of Service ... 773 24.1 ... Netzneutralität ... 775 24.2 ... Wo die wilden Warteschlangen wohnen ... 775 24.3 ... Echtzeit-Datenverkehr ... 776 24.4 ... Integrated Services/RSVP ... 780 24.5 ... Globales IP-Multicast ... 781 24.6 ... RSVP ... 788 24.7 ... Differentiated Services ... 794 24.8 ... RED with In and Out ... 801 24.9 ... NSIS ... 801 24.10 ... Comcast-System zu Überlaststeuerung ... 802 24.11 ... Real-time Transport Protocol (RTP) ... 804 24.12 ... Multi-Protocol Label Switching (MPLS) ... 810 24.13 ... Epilog ... 814 24.14 ... Übungen ... 814 25. Netzwerkverwaltung und SNMP ... 817 25.1 ... Netzwerkarchitektur ... 820 25.2 ... SNMP-Grundlagen ... 820 25.3 ... Namen und OIDs unter SNMP ... 823 25.4 ... MIBs ... 825 25.5 ... SNMPv1-Datentypen ... 827 25.6 ... ASN.1-Syntax und SNMP ... 828 25.7 ... SNMP-Tabellen ... 829 25.8 ... SNMP-Operationen ... 835 25.9 ... MIB-Browsing ... 841 25.10 ... MIB-2 ... 842 25.11 ... SNMPv1-Communitys und -Sicherheit ... 853 25.12 ... SNMP und die ASN.1-Kodierung ... 855 25.13 ... Übungen ... 859 26. Die SNMP-Versionen 2 und 3 ... 863 26.1 ... SNMPv2 ... 863 26.2 ... Erstellung von Tabellenzeilen ... 879 26.3 ... SNMPv3 ... 890 26.4 ... Übungen ... 905 27. Sicherheit ... 907 27.1 ... Einbruch mit Ausführung von Code ... 909 27.2 ... Stapelüberlauf ... 911 27.3 ... Heap-Überlauf ... 923 27.4 ... Network Intrusion Detection ... 930 27.5 ... Ziele der Kryptografie ... 932 27.6 ... Sichere Hashes ... 934 27.7 ... Verschlüsselung mit gemeinsamem Schlüssel ... 940 27.8 ... Diffie-Hellman-Merkle-Schlüsselaustausch ... 954 27.9 ... Übungen ... 959 28. Verschlüsselung mit öffentlichem Schlüssel ... 963 28.1 ... RSA ... 963 28.2 ... Vorwärts gerichtete Geheimhaltung ... 967 28.3 ... Vertrauen und der Mann in der Mitte ... 969 28.4 ... Ende-zu-Ende-Verschlüsselung ... 970 28.5 ... SSH und TLS ... 971 28.6 ... IPsec ... 998 28.7 ... DNSSEC ... 1002 28.8 ... Beispiele mit RSA-Schlüssel ... 1016 28.9 ... Übungen ... 1020 Bibliografie ... 1023 Index ... 1033
Applikationsdesign mit SAP Analytics Cloud
Lernen Sie, wie Sie mit dem Analytics Designer maßgeschneiderte und flexible analytische Applikationen in SAP Analytics Cloud entwickeln, bereitstellen und überwachen. Die Autoren führen Sie durch die einzelnen Schritte der Anwendungsentwicklung und zeigen Ihnen, wie Sie die Applikationen an die Bedürfnisse der Anwender*innen anpassen. Aus dem Inhalt: ArchitekturDatenmodellierung und -anbindungEntwicklungsumgebungSkripte und WizardsBI-ApplikationenPlanungsapplikationenPredictive AnalysisStandard- und Custom Widgets Materialien zum Buch ... 25 Geleitwort des Fachgutachters ... 27 1. Netzwerke im Überblick ... 29 1.1 ... Schichten ... 29 1.2 ... Datenrate, Durchsatz und Bandbreite ... 30 1.3 ... Pakete ... 31 1.4 ... Datagrammweiterleitung ... 33 1.5 ... Topologie ... 37 1.6 ... Routing-Schleifen ... 38 1.7 ... Überlast ... 40 1.8 ... Mehr über Pakete ... 41 1.9 ... LANs und Ethernet ... 42 1.10 ... IP -- Internet Protocol ... 45 1.11 ... DNS ... 54 1.12 ... Transport ... 55 1.13 ... Firewalls ... 61 1.14 ... Einige nützliche Dienstprogramme ... 63 1.15 ... IETF und OSI ... 65 1.16 ... Berkeley Unix ... 69 1.17 ... Epilog ... 70 1.18 ... Übungen ... 70 2. Ethernet-Grundlagen ... 75 2.1 ... Klassisches 10-Mbit/s-Ethernet ... 76 2.2 ... 100 Mbit/s (Fast) Ethernet ... 93 2.3 ... Gigabit-Ethernet ... 95 2.4 ... Ethernet-Switches ... 96 2.5 ... Epilog ... 101 2.6 ... Übungen ... 102 3. Weiterführende Ethernet-Themen ... 107 3.1 ... Spanning-Tree-Algorithmus und Redundanz ... 108 3.2 ... Virtuelles LAN (VLAN) ... 114 3.3 ... TRILL und SPB ... 119 3.4 ... Software-Defined Networking ... 122 3.5 ... Epilog ... 132 3.6 ... Übungen ... 132 4. Drahtlose LANs ... 137 4.1 ... Abenteuer im Funkland ... 137 4.2 ... Wi-Fi ... 143 4.3 ... WiMAX und LTE ... 182 4.4 ... Ortsfeste Drahtlosnetzwerke ... 188 4.5 ... Epilog ... 190 4.6 ... Übungen ... 191 5. Sonstige LAN-Technologien ... 195 5.1 ... Virtuelle private Netzwerke ... 195 5.2 ... Carrier-Ethernet ... 197 5.3 ... Token Ring ... 198 5.4 ... Virtuelle Verbindungen ... 200 5.5 ... Asynchronous Transfer Mode: ATM ... 204 5.6 ... Epilog ... 208 5.7 ... Übungen ... 208 6. Verbindungen ... 213 6.1 ... Kodierung und Frames ... 213 6.2 ... Zeitmultiplexverfahren ... 220 6.3 ... Epilog ... 227 6.4 ... Übungen ... 227 7. Pakete ... 229 7.1 ... Paketverzögerung ... 229 7.2 ... Schwankungen der Paketverzögerung ... 233 7.3 ... Paketgröße ... 234 7.4 ... Fehlererkennung ... 237 7.5 ... Epilog ... 245 7.6 ... Übungen ... 245 8. Sliding Windows ... 251 8.1 ... Zuverlässige Datenübertragung: Stop-and-Wait ... 251 8.2 ... Die Sliding-Windows-Strategie ... 256 8.3 ... Lineare Flaschenhälse ... 261 8.4 ... Epilog ... 271 8.5 ... Übungen ... 271 9. IP Version 4 ... 277 9.1 ... Der IPv4-Header ... 279 9.2 ... Schnittstellen ... 282 9.3 ... Spezielle Adressen ... 284 9.4 ... Fragmentierung ... 287 9.5 ... Der klassenlose IP-Delivery-Algorithmus ... 290 9.6 ... IPv4-Subnetze ... 294 9.7 ... Netzwerkadressübersetzung ... 302 9.8 ... Unnummerierte Schnittstellen ... 309 9.9 ... Mobile IP ... 311 9.10 ... Epilog ... 313 9.11 ... Übungen ... 313 10. IPv4-Begleitprotokolle ... 317 10.1 ... DNS ... 317 10.2 ... Address Resolution Protocol: ARP ... 336 10.3 ... Dynamic Host Configuration Protocol (DHCP) ... 341 10.4 ... Internet Control Message Protocol ... 343 10.5 ... Epilog ... 349 10.6 ... Übungen ... 349 11. IPv6 ... 351 11.1 ... Der IPv6-Header ... 352 11.2 ... IPv6-Adressen ... 353 11.3 ... Netzwerkpräfixe ... 358 11.4 ... IPv6-Multicast ... 359 11.5 ... IPv6-Erweiterungsheader ... 360 11.6 ... Nachbarschaftserkennung (Neighbor Discovery) ... 364 11.7 ... Zuweisung von IPv6-Hostadressen ... 371 11.8 ... Epilog ... 378 11.9 ... Übungen ... 378 12. Weitere IPv6-Funktionen ... 381 12.1 ... Weltweit sichtbare Adressen ... 381 12.2 ... ICMPv6 ... 382 12.3 ... IPv6-Subnetze ... 384 12.4 ... IPv6 und IPv4 gemeinsam benutzen ... 386 12.5 ... IPv6-Beispiele ohne Router ... 392 12.6 ... IPv6-Konnektivität über Tunneling ... 395 12.7 ... Konnektivität von IPv6 nach IPv4 ... 400 12.8 ... Epilog ... 402 12.9 ... Übungen ... 402 13. Routing-Update-Algorithmen ... 405 13.1 ... Distanzvektor-Routing-Update-Algorithmus ... 406 13.2 ... Langsames Konvergenzproblem bei Distanzvektoren ... 413 13.3 ... Minimierung der Streckenkosten ... 415 13.4 ... Schleifenfreie Distanzvektor-Algorithmen ... 418 13.5 ... Link-State-Routing-Update-Algorithmus ... 427 13.6 ... Routing nach anderen Attributen ... 432 13.7 ... ECMP ... 434 13.8 ... Epilog ... 435 13.9 ... Übungen ... 436 14. IP-Routing im großen Maßstab ... 445 14.1 ... Classless Internet Domain Routing: CIDR ... 446 14.2 ... Hierarchisches Routing ... 449 14.3 ... Routing in früherer Zeit ... 450 14.4 ... Providerbasiertes Routing ... 451 14.5 ... Geografisches Routing ... 458 14.6 ... Epilog ... 459 14.7 ... Übungen ... 459 15. Border Gateway Protocol (BGP) ... 465 15.1 ... AS-Pfade ... 467 15.2 ... AS-Pfade und Routenaggregation ... 469 15.3 ... Transit-Traffic ... 471 15.4 ... BGP-Filterung und Routing-Policies ... 471 15.5 ... BGP-Tabellengröße ... 474 15.6 ... BGP-Pfadattribute ... 475 15.7 ... BGP und Traffic-Engineering ... 480 15.8 ... BGP und Anycast ... 484 15.9 ... BGP für internes Routing ... 485 15.10 ... BGP-Beziehungen ... 486 15.11 ... Beispiele für BGP-Instabilität ... 492 15.12 ... BGP-Sicherheit und Route Registrys ... 494 15.13 ... Epilog ... 500 15.14 ... Übungen ... 500 16. UDP-Übertragung ... 503 16.1 ... User Datagram Protocol -- UDP ... 503 16.2 ... Trivial File Transport Protocol, TFTP ... 520 16.3 ... Grundlegende Übertragungsprobleme ... 523 16.4 ... Weitere Anmerkungen zu TFTP ... 531 16.5 ... Remote Procedure Call (RPC) ... 534 16.6 ... Epilog ... 539 16.7 ... Übungen ... 539 17. Grundlagen des TCP-Transports ... 545 17.1 ... Das Ende-zu-Ende-Prinzip ... 547 17.2 ... TCP-Header ... 547 17.3 ... Aufbau einer TCP-Verbindung ... 549 17.4 ... TCP und WireShark ... 555 17.5 ... TCP-Offloading ... 557 17.6 ... TCP-Simplex-Talk ... 558 17.7 ... TCP und bind() ... 563 17.8 ... TCP-Zustandsdiagramm ... 565 17.9 ... Epilog ... 572 17.10 ... Übungen ... 572 18. TCP -- Probleme und Alternativen ... 577 18.1 ... Alte Duplikate bei TCP ... 577 18.2 ... TIMEWAIT ... 578 18.3 ... Der dreifache Handshake -- erneut betrachtet ... 580 18.4 ... Anomale TCP-Szenarien ... 583 18.5 ... Schnelleres Öffnen von TCP-Verbindungen ... 584 18.6 ... Path MTU Discovery ... 587 18.7 ... Sliding Windows bei TCP ... 587 18.8 ... Verzögerte ACKs bei TCP ... 588 18.9 ... Nagle-Algorithmus ... 589 18.10 ... Flusssteuerung bei TCP ... 590 18.11 ... Silly-Window-Syndrom ... 591 18.12 ... Zeitüberschreitung und Neuübertragung bei TCP ... 592 18.13 ... KeepAlive ... 594 18.14 ... TCP-Timer ... 594 18.15 ... Varianten und Alternativen ... 595 18.16 ... Epilog ... 608 18.17 ... Übungen ... 608 19. TCP Reno und Überlastmanagement ... 611 19.1 ... Grundlagen des TCP-Überlastmanagements ... 612 19.2 ... Slow Start ... 618 19.3 ... TCP Tahoe und Fast-Retransmit ... 624 19.4 ... TCP Reno und Fast-Recovery ... 626 19.5 ... TCP NewReno ... 630 19.6 ... Selektive Bestätigungen (SACK) ... 632 19.7 ... TCP und Auslastung der Flaschenhalsverbindung ... 633 19.8 ... Verluste einzelner Pakete ... 638 19.9 ... Annahmen zu TCP und Skalierbarkeit ... 639 19.10 ... TCP-Parameter ... 640 19.11 ... Epilog ... 641 19.12 ... Übungen ... 641 20. TCP-Dynamik ... 647 20.1 ... Ein erster Blick auf das Queuing ... 647 20.2 ... Flaschenhalsverbindungen mit konkurrierendem Datenverkehr ... 649 20.3 ... TCP Reno -- Fairness mit synchronisierten Verlusten ... 659 20.4 ... Epilog ... 669 20.5 ... Übungen ... 669 21. Weitere TCP-Dynamiken ... 675 21.1 ... Begriffe der Fairness ... 675 21.2 ... TCP-Reno-Verlustrate und cwnd ... 677 21.3 ... TCP-Freundlichkeit ... 680 21.4 ... Noch einmal AIMD ... 684 21.5 ... Aktives Warteschlangenmanagement ... 686 21.6 ... Das TCP-Problem der hohen Bandbreiten ... 694 21.7 ... Das Problem der verlustbehafteten Verbindungen ... 696 21.8 ... Das Problem der Satelliten-TCP-Verbindungen ... 697 21.9 ... Epilog ... 697 21.10 ... Übungen ... 698 22. Queuing und Scheduling ... 705 22.1 ... Queuing und Echtzeitdatenverkehr ... 706 22.2 ... Traffic-Management ... 707 22.3 ... Priority Queuing ... 708 22.4 ... Warteschlangenverfahren ... 708 22.5 ... Fair Queuing ... 710 22.6 ... Anwendungen von Fair Queuing ... 730 22.7 ... Hierarchisches Queuing ... 733 22.8 ... Hierarchical Weighted Fair Queuing ... 737 22.9 ... Epilog ... 744 22.10 ... Übungen ... 745 23. Token-Bucket ... 749 23.1 ... Token-Bucket -- Definition ... 750 23.2 ... Token-Bucket -- Beispiele ... 753 23.3 ... Mehrere Token-Buckets ... 754 23.4 ... GCRA ... 755 23.5 ... Gewährleistung der VoIP-Bandbreite ... 757 23.6 ... Verzögerung begrenzen ... 758 23.7 ... Token-Bucket durch einen Router ... 760 23.8 ... Token-Bucket durch mehrere Router ... 761 23.9 ... Verzögerungsbedingungen ... 762 23.10 ... CBQ ... 765 23.11 ... Linux HTB ... 765 23.12 ... Parekh-Gallager Theorem ... 767 23.13 ... Epilog ... 768 23.14 ... Übungen ... 768 24. Quality of Service ... 773 24.1 ... Netzneutralität ... 775 24.2 ... Wo die wilden Warteschlangen wohnen ... 775 24.3 ... Echtzeit-Datenverkehr ... 776 24.4 ... Integrated Services/RSVP ... 780 24.5 ... Globales IP-Multicast ... 781 24.6 ... RSVP ... 788 24.7 ... Differentiated Services ... 794 24.8 ... RED with In and Out ... 801 24.9 ... NSIS ... 801 24.10 ... Comcast-System zu Überlaststeuerung ... 802 24.11 ... Real-time Transport Protocol (RTP) ... 804 24.12 ... Multi-Protocol Label Switching (MPLS) ... 810 24.13 ... Epilog ... 814 24.14 ... Übungen ... 814 25. Netzwerkverwaltung und SNMP ... 817 25.1 ... Netzwerkarchitektur ... 820 25.2 ... SNMP-Grundlagen ... 820 25.3 ... Namen und OIDs unter SNMP ... 823 25.4 ... MIBs ... 825 25.5 ... SNMPv1-Datentypen ... 827 25.6 ... ASN.1-Syntax und SNMP ... 828 25.7 ... SNMP-Tabellen ... 829 25.8 ... SNMP-Operationen ... 835 25.9 ... MIB-Browsing ... 841 25.10 ... MIB-2 ... 842 25.11 ... SNMPv1-Communitys und -Sicherheit ... 853 25.12 ... SNMP und die ASN.1-Kodierung ... 855 25.13 ... Übungen ... 859 26. Die SNMP-Versionen 2 und 3 ... 863 26.1 ... SNMPv2 ... 863 26.2 ... Erstellung von Tabellenzeilen ... 879 26.3 ... SNMPv3 ... 890 26.4 ... Übungen ... 905 27. Sicherheit ... 907 27.1 ... Einbruch mit Ausführung von Code ... 909 27.2 ... Stapelüberlauf ... 911 27.3 ... Heap-Überlauf ... 923 27.4 ... Network Intrusion Detection ... 930 27.5 ... Ziele der Kryptografie ... 932 27.6 ... Sichere Hashes ... 934 27.7 ... Verschlüsselung mit gemeinsamem Schlüssel ... 940 27.8 ... Diffie-Hellman-Merkle-Schlüsselaustausch ... 954 27.9 ... Übungen ... 959 28. Verschlüsselung mit öffentlichem Schlüssel ... 963 28.1 ... RSA ... 963 28.2 ... Vorwärts gerichtete Geheimhaltung ... 967 28.3 ... Vertrauen und der Mann in der Mitte ... 969 28.4 ... Ende-zu-Ende-Verschlüsselung ... 970 28.5 ... SSH und TLS ... 971 28.6 ... IPsec ... 998 28.7 ... DNSSEC ... 1002 28.8 ... Beispiele mit RSA-Schlüssel ... 1016 28.9 ... Übungen ... 1020 Bibliografie ... 1023 Index ... 1033
Getting Started with Visual Studio 2022
Learn how to use the features of Visual Studio 2022 and utilize the IDE correctly to make it your one-stop solution for creating quality code. Learn what's new in VS 2022 and explore the existing features of Visual Studio so you can become a more efficient programmer.This revised edition covers the latest features of Visual Studio 2022 and how to use them. The book includes new topics like Subword Navigation, Multi-caret Editing, how to enable Code Cleanup on Save, using breakpoints, and new debugging features such as temporary breakpoints and dependent breakpoints. The book also looks at some of the new Git features such as Multi-repo Support, Comparing Branches, Checkout Commit, and line Staging.Getting Started with Visual Studio 2022 begins with an overview of Visual Studio and explores features such as Visual Studio Live Share, Visual Studio Search, Solution Filters, and Intellicode. The author also provides a look at the different Visual Studio project templates and shows you how to create code snippets, as well as how to manage NuGet and nmp packages. You will also see how to create a cross-platform MAUI application as well as how to use SQLite in an MAUI application. Moving ahead, you will learn how to debug your code using breakpoints to step into specific methods, use data tips, and utilize the Debugger Display attribute. You will then move on to learn unit testing and explore the tools provided by Visual Studio to create and run unit tests. The book also covers source control integration in Visual Studio and how to use GitHub to implement a source control strategy for your projects.WHAT YOU WILL LEARN* Create and use code snippets in Visual Studio 2022* Use the new debugging features in Visual Studio* Utilize diagnostic tools and the Immediate window for code debugging* Generate unit tests with IntelliTest* Harness the new Git features in Visual Studio to make managing source code easier* Work with MAUI appsWHO THIS BOOK IS FORBeginners and software developers working on the .NET stack.DIRK STRAUSS has over 17 years of experience programming with C# and Visual Studio. Working for various companies throughout his career, he has been privileged to work with and learn from some of the most brilliant developers in the industry. He has authored several books on topics ranging from Visual Studio and C# to ASP.NET Core. Passionate about writing code, he loves learning new tech and imparting what he learns to others.CHAPTER 1: GETTING TO KNOW VISUAL STUDIO 2022- Installing Visual Studio- Visual Studio 2022 System Requirements- Visual Studio is 64-bit- Full .NET 6.0 Support- Using Workloads- Exploring the IDE- The Solution Explorer- Toolbox- The Code Editor- New Razor Editor- Hot Reload- Navigating Code- Navigate Forward and Backward Commands- Navigation Bar- Find All References- Find Files Faster- Reference Highlighting- Go To Commands- Go To Definition- Peek Definition- Subword Navigation- Features and Productivity Tips- Track Active Item in Solution Explorer- Hidden Editor Context Menu- Open in File Explorer- Finding Keyboard Shortcut Mappings- Clipboard History- Go To Window- Navigate to Last Edit Location- Multi-caret Editing- Sync Namespaces to Match Your Folder Structure- Paste JSON as Classes- Enable Code Cleanup on Save- Add Missing Using on Paste- Features in Visual Studio 2022- Visual Studio Search- Solution Filters- Visual Studio IntelliCode- Whole Line Completions- Quick Actions- Visual Studio Live ShareCHAPTER 2: WORKING WITH VISUAL STUDIO 2022- Visual Studio Project Types- Various Project Templates - MAUI- Creating a MAUI Application- Consuming REST Services in MAUI- Using SQLite in a MAUI app- Managing NuGet Packages- Using NuGet in Visual Studio- Hosting Your Own NuGet Feeds- Managing nmp Packages- Creating Project Templates- Creating and Using Code Snippets- Creating Code Snippets- Using Bookmarks and Code Shortcuts- Bookmarks- Code Shortcuts- Adding Custom Tokens- The Server Explorer- Running SQL Queries- Visual Studio Windows- C# Interactive- Code Metrics Results- Send Feedback- Personalising Visual Studio- Document Management Customisations- Visual Studio ThemesCHAPTER 3: DEBUGGING YOUR CODE- Working with Breakpoints- Setting a Breakpoint- Conditional Breakpoints and Actions- Temporary Breakpoints- Dependant Breakpoints- Dragging Breakpoints- Force Run to Cursor- Manage Breakpoints with Labels- Exporting Breakpoints- Using DataTips- Visualizing Complex Data Types- Using the Watch Window- The DebuggerDisplay Attribute- Evaluate Functions Without Side Effects- Format Specifiers- Diagnostic Tools- CPU Usage- Memory Usage- The Events View- The Right Tool for the Right Project Type- Immediate Window- Attaching to a Running Process- Attach to a Remote Process- Reattaching to a Process- Remote Debugging- System Requirements- Download and Install Remote Tools- Running Remote Tools- Start Remote DebuggingCHAPTER 4: UNIT TESTING- Creating and Running Unit Tests- Create and Run a Test Playlist- Testing Timeouts- Using Live Unit Tests- Using IntelliTest to Generate Unit Tests- Focus IntelliTest Code Exploration- How to Measure Code Coverage in Visual StudioCHAPTER 5: SOURCE CONTROL- Create a GitHub Account- Create and Clone a Repository- Cloning a Repository- Create a Branch from Your Code- Creating and Handling Pull Requests- Working with Stashes- Multi-repo Support- Git Commit Graph- Compare Branches- Checkout Commit- Multi-repo Branching- Line Staging
Technik der IP-Netze
- Umfassende Informationen – das lückenlose Standardwerk zu den Prinzipien der Kommunikation im Internet mit über 700 Bildern.- Ausgewogenheit von Theorie und Praxis – technische Aspekte der IP-Netze werden detailliert und zugleich praxisorientiert dargestellt.- Aktuell und zukunftsweisend – die präsentierten Themen vertiefen die aktuellen Trends der Internettechnik und -sicherheit sowie zukünftige Anforderungen.- Neu in der 5. Auflage: Zeitsynchronisation in Netzen und Überblick über das QUIC-Protokoll- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesIn IP-Netzen laufen komplexe Vorgänge bei der Übermittlung von Daten in Form von IP-Paketen ab. Das massive Internet-Wachstum und die dabei entstandenen Anforderungen haben zu zahlreichen Weiterentwicklungen geführt – hervorzuheben sind u. a. das Internetprotokoll IPv6, die Techniken MPLS und GMPLS, mehrere Arten von Virtual Networks, Distributed Layer 2 / 3 Switching und Internet of Things.Dieses Buch enthält eine systematische Darstellung der TCP / IP-Protokollfamilie sowie von Routing-Prinzipien in klassischen IP- wie auch in IPv6-Netzen.Es erläutert außerdem die Konzepte zum Aufbau von IP-Netzen auf Basis unterschiedlicher Netztechnologien (speziell Virtual Networks) sowie zur Unterstützung der Mobilität. Zudem enthält es eine umfangreiche Darstellung der technologischen Grundlagen des Internet of Things.Das Buch eignet sich nicht nur als Lehrbuch für Studierende unterschiedlicher Fachrichtungen und für Neueinsteiger:innen, sondern auch als Nachschlagewerk für Praktiker:innen. Im Buch sind die relevanten Quellen ins Internet verlinkt, sodass es sich auch als »Informations-Hub« für das Selbststudium einsetzen lässt.AUS DEM INHALT //- Netzwerkgrundlagen und IT-Security; Protokolle: IPv4, ICMP, IGMP, TCP, UDP, SCTP, QUIC- Netzdienst-Protokolle: DNS, DHCP, NAT, IPsec, TLS (1.3)- Protokolle für die Echtzeitkommunikation: RTP, RTCP, SIP, SDP, NTP, PTP- IPv6-Support-Protokolle: ICMPv6, NDP, DHCPv6- Migration zu IPv6: 6to4, 6rd, ISATAP, NAT64 und Translation IPv4 IPv6- Routing-Protokolle: RIP, OSPF und BGP-4; Multicast-Routing nach PIM und MSDP- IP-Netze mit MPLS, GMPLS und Traffic Engineering- VPNs, Mobility Support und Distributed Layer 2/3 Switching- Internet of Things mit 6loWPAN, RPL und CoAP Prof. Dr.-Ing. Anatol Badach ist ehemaliger Professor im FB Angewandte Informatik der Hochschule Fulda. Seine Schwerpunkte sind Netzwerktechnologien und -protokolle, VoIP, Next Generation Networking sowie Internet of Things.Prof. Dr. Erwin Hoffmann ist Vertretungs-Professor für Informatik an der Frankfurt University of Applied Sciences. Schwerpunkte sind Netzwerke, verteilte Systeme sowie IT-Security und ihre Implementierung.
Ansible for VMware by Examples
Learn to use the Ansible open source IT automation tool to automate your VMware infrastructure. This book contains all of the obvious and not-so-obvious best practices of Ansible automation. Each lesson summarizes a specific use case for the modern VMware infrastructure and is focused on a single module from the most important parameter, including live demo of code and real-life usage.You'll configure the Ansible Controller to interact with VMware infrastructure using the “community.VMware” Ansible documentation collection and the appropriate Python libraries. Next, learn how to automate the creation of a virtual machine manually and from a template, start and stop using the shutdown and forced-power off a Virtual Machine, take and delete and snapshot, add a new hard disk and expand a currently attached hard disk, as well as gather information for data centers, clusters, host systems, and virtual machines.By the end of this book, you'll be well-versed in efficiently maintaining a VMware infrastructure with Ansible Automation. You'll also be able to save time and reduce manual errors using simple human-readable automation technology.WHAT YOU'LL LEARN* Automate your VMware infrastructure using Ansible code* Install Ansible in operating systems such as RedHat, Ubuntu, Fedora, etc.* Write and execute your first Ansible Playbook code * Troubleshoot the most common error messagesWHO THIS BOOK IS FORIT professionals of every industry who would like a jargon-free understanding of Ansible technology, including VMware, Linux, and Windows Systems Administrators, DevOps professionals, thought leaders, and infrastructure-as-code enthusiasts.Luca Berton is an Ansible Automation Engineer of Red Hat, based in Brno - Czech Republic. With more than 15 years of experience as a System Administrator, he has strong expertise in Infrastructure Hardening and Automation. Enthusiast of the Open Source supports the community sharing his knowledge in different events of public access. Geek by nature, Linux by choice, Fedora of course.Chapter 1: Ansible For Beginners With ExamplesCHAPTER GOAL: Description of the Ansible Technology and how to write and execute your first Ansible Playbook code.NO OF PAGES: 5 0SUB - TOPICS* What is AnsibleGetting Started * Inventory* Playbook* Variables, Fact and Magic Variables* Vault* Conditional and LoopHandler * Role* Ansible Best PracticesChapter 2: Install AnsibleCHAPTER GOAL: How to install Ansible in the most common Operating System step by stepNO OF PAGES : 20SUB - TOPICS:* ansible community vs ansible-core packages * Ansible installation in RedHat Enterprise Linux (RHEL) 8 * Ansible installation in Ubuntu 22.04 LTS * Ansible installation in Fedora 36 * Ansible installation in CentOS 9 Stream * Ansible installation in Windows * Ansible installation in SUSE SLES (Linux Enterprise Server) 15 Ansible installation with PIPAnsible installation in RedHat Enterprise Linux (RHEL) 9* Ansible installation in Amazon Linux 2 (AWS EC2) * Ansible installation in Debian 11 Chapter 3: Ansible For VMwareCHAPTER GOAL: How to automate your VMware infrastructure using Ansible code and troubleshoot the most common error messagesNO OF PAGES: 70SUB - TOPICS:* Configure Ansible For VMware Configure a Python Virtual Environment for Ansible VMwareAnsible troubleshooting - VMware f ailed to Import PyVmomi * Ansible troubleshooting - VMware Unknown error while connecting to vCenter or ESXi * Ansible troubleshooting - VMware certificate verify failed connecting to vCenter or ESXi* Create a VMware virtual machine * Deploy a VMware virtual machine from a template * Start a VMware virtual machine * Stop a VMware virtual machine * Take a VMware virtual machine snapshot * Delete a VMware virtual machine snapshot * Add a new hard disk to VMware virtual machine * Expand a virtual disk in VMware virtual machine * Gather VMware Hosts information of a cluster* Get VMware virtual machine UUID* Ansible Dynamic Inventory For VMware* Get VMware vSphere Virtual Machine Running Host* Get VMware datastore status* Upload a file to the VMware datastore* Get VMware Guest Tools status* Upgrade VMware Guest Tools* Live Migration of a VMware Virtual Machine using vMotion* Change the boot devices order of a VMware virtual machineChapter 4: Conclusion
Beyond Accessibility Compliance
Take a deep look at accessibility as it applies to mobile and wearables. This book covers topics within the accessibility domain that are rarely covered or understood, despite the fact that nearly half of the world’s population uses smartphones. Moreover, by 2025, 72% of smartphone users are expected to only use smartphones to access the internet. And yet, accessibility is often an afterthought instead of a core principle of product development. This book changes that.You will begin by exploring the current landscape and policy frameworks, looking at the software product lifecycle and how to embed inclusion from the start. You’ll learn the nuances of mobile accessibility as it applies to mobile devices, wearables, and IoT. From there you’ll move onto automated testing, accessibility and inclusion, and the next frontiers of emerging technology including AR and VR. There will be notes at the end of programming examples to help those in orthogonal roles, such as project management, understand the basics and the language to better communicate with their engineering counterparts.Over 1 billion people in the world live with some form of disability so it's imperative you devise a comprehensive game plan to make your digital products accessible for all. Beyond Accessibility Compliance is your guide to understanding the current landscape of assistive technology and how emerging techniques are changing the way we think about personalization and accessibility.WHAT YOU'LL LEARN* See how people with the most common forms of disabilities use digital products* Review the basics of the product development lifecycle and how to embed accessibility * Explore tangible answers as to how accessibility pertains to unique roles* Understand the difference between compliance and usability* Make data visualizations accessible for blind users* Implement code-level changes to address gaps in accessibility * Build a campus programs and course material inclusive for people with disabilitiesWHO THIS BOOK IS FORCurrent developers, designers, and others building technology products with basic knowledge of front-end development. This book is also suitable for students in computer science, engineering, HCI, and related fields. Sections that are not engineering-specific are applicable to design, user research, communication, and business students who are looking to pursue careers in technology.Sukriti Chadha is a mobile developer turned product manager who currently works at Spotify. She is the only product manager responsible for accessibility across all platforms. Additionally, she works on scalable mobile infrastructure to enable reliable shipping of Spotify’s mobile apps to its over 300 million users globally.Sukriti started as a mobile developer at Yahoo Finance in 2016. When her father lost vision in one of his eyes due to complications from diabetes, it inspired her to patent, launch and open source technology that allows people with visual impairments to use charts and interpret data using music, haptics, and voice synthesis. She also developed a system for haptic navigation for people with hearing impairments.Sukriti is an invited expert at W3C with WCAG (Web Content Accessibility Guidelines), as well as the Mobile Accessibility Task Force, the industry working group that sets the guidelines that are the ISO standard for accessibility and the basis for the Americans with Disabilities Act (ADA). Her work has been presented at several conferences including CSUN (the largest annual accessibility conference), A Future Date Conference, Product-Led Festival, Mobile Growth by Branch.io, and MProduct Con. Her project on automated mobile testing for accessibility also won the Product-Led Alliance award for the most impactful project.Sukriti is an active member of Teach Access, a collaboration of accessibility experts, industry leaders and academics with companies such as Google, Microsoft, Facebook and Wal-Mart to further the understanding of inclusion and accessibility among high-school and college students. As part of this initiative, she regularly collaborates with university professors who have expressed a desire to have a book like this as foundation for their design and CS courses.She has been invited as a judge for innovation awards at CES (Consumer Electronics Show); Remarkable Accelerator, Australia; and Pursuit Hackathon. She also regularly peer reviews academic papers for HCI and accessibility journals including ICETM, Web4All and the 32nd Annual Australian HCI Conference.Sukriti has a Bachelor of Science degree in Electrical Engineering and certificate in Finance from Princeton University. She is also a private pilot and certified yoga instructor.Chapter 1: Introduction - The Billion People Question Motivation, terminology, current landscape and laying the groundwork for positive action 1.1 Motivation 1.2 What is a disability 1.3 What is accessibility? What is inclusion? What is the difference? 1.4 Power in numbers 1.5 The rich history of innovation because of people with disabilities 1.6 Policy and Regulations 1.7 Challenges and Opportunities Chapter 2: Measuring Impact How can we measure the impact of something we haven’t built and vice versa? 2.1 Measuring impact 2.2 Functional needs by type of disability and examples of assistive technologiesChapter 3: Roles and Responsibilities Understanding roles and responsibilities and nuances of non-web platforms 3.1 The Software Product Lifecycle: Embedding inclusion from the start (WIP) ○ User Experience ○ Design ○ Engineering ○ Product Management ○ Customer Experience ○ Data Science ○ Quality Assurance ○ Business stakeholders ○ Legal, Privacy and Security 3.2 Nuances of mobile accessibility 3.2.2 Mobile devices 3.2.3 Wearables 3.2.4 IoT 3.3 The IDE experience 3.4 Incorporation in code reviews 3.5 Web implementation resources Chapter 4: Automated and Manual Testing How automated and manual testing closes the loop on sustainable accessibility efforts ○ 4.1 Automated testing on mobile ○ 4.2 Automated testing on web ○ 4.3 Manual testing checklists and frameworks ○ 4.4 Customer service: How to help customers and escalate critical issues ○ 4.5 Marketing, social media and inclusion Chapter 5: Compliance vs Inclusion Compliance vs inclusion 5.1 Unpacking WCAG guidelines 5.2 When it is okay to deviate from guidelines 5.3 Case study: Accessible Data Visualization for Blind Users Chapter 6: Emerging Technologies ○ 6.1 AI and personalization for accessibility ○ 6.3 Multimodal, multisensory I/O case studies ○ 6.2 How XR (AR, VR and MR) can solve some of the biggest challenges ○ 6.4 Conferences, open source projects and other avenues for innovation Chapter 7 Teaching Accessibility and Inclusion ○ 7.1 Building inclusive course content: leading by example ○ 7.2 UDL (Universal Design for Learning) and applications ○ 7.3 VPATs and what should one look for ○ 7.4 Remote learning practices
Introducing Cisco Unified Computing System
The Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy.So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it.You'll start by creating an organization and then the policies to control storage, networking, boot options, maintenance policies, and server pools. Once you have the required policies you'll use them to create service profiles (using the policies) and templates and assign these to the blade and rack-mount servers in the virtual environment. You'll also be looking at real-life scenarios such as upgrades (and downgrades), northbound networking, and Storage Area Networking (SAN) connectivity. Using the GUI and the CLI you'll look at real-world examples that data center engineers may encounter.WHAT YOU'LL LEARN* Set up the Cisco UCSPE on VMWare* Create UCS service profiles* Secure the UCS system* Troubleshoot the UCSWHO THIS BOOK IS FORDatacenter and network engineers and individuals studying for the CCNA and CCNP Cisco data center qualification.STUART FORDHAM, CCIE 49337, is the Network Manager and Infrastructure Team Leader for SmartCommunications SC Ltd, which is the only provider of a cloud-based, next-generation customer communications platform. Stuart has written a series of books on SD-WAN, BGP, MPLS, VPNs, and NAT, as well as a CCNA study guide and a Cisco ACI Cookbook. He lives in the UK with his wife and twin sons.Chapter 1: Setting up UCSPE ( Cisco UCS Platform Emulator)CHAPTER GOAL: TO SET UP UCSPENO OF PAGES 20SUB -TOPICS1. Downloading UCSPE2. Importing UCSPE into VMWare3. Starting UCSPE4. Real-world UCS setupChapter 2: The hardware chapterCHAPTER GOAL: AN EXPLANATION OF THE DIFFERENT HARDWARE THAT MAKES UP A UCS (Cisco Unified Computing System)NO OF PAGES: 20SUB - TOPICS1. The Fabric Interconnect2. Chassis and IOMs3. FEX4. Blade servers5. Rackmount serversChapter 3: Northbound Networking and SANCHAPTER GOAL: TO UNDERSTAND THE UCS IN RELATION TO THE REST OF THE NETWORKNO OF PAGES: 10SUB - TOPICS1. Physical connectivity and port-channels2. VLANsChapter 4: PoliciesCHAPTER GOAL: TO CREATE THE POLICIES WE NEED FOR CHAPTER 4NO OF PAGES : 20SUB - TOPICS:1. Policies2. Storage Policies3. Dynamic vNIC connection policies3. vNIC/vHBA Placementpolicies4. vMedia policies5. Server boot policies6. Maintenance Policies7. Server Pool policies8. Operation policiesChapter 5: Service Profiles and TemplatesCHAPTER GOAL: TO USE THE POLICIES WE HAVE TO CREATE SERVICE PROFILES AND ASSIGN THEM TO OUR SERVERSNO OF PAGES: 30SUB - TOPICS:1. Creating an Organization2. Creating a Service Profile Template3. Creating a Service Profile from a template4. Assigning templatesChapter 6: UCS SecurityCHAPTER GOAL: TO SECURE OUR UCS ENVIRONMENTNO OF PAGES: 20SUB - TOPICS1. AAA2. Hardening the web interface3. Hardening SSHChapter 7: TroubleshootingCHAPTER GOAL: TO SECURE OUR UCS ENVIRONMENTNO OF PAGES: 20SUB - TOPICS1. Error messages2. SNMP3. Call-home
Creating Business Applications with Microsoft 365
Learn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You’ll work with an extended example that shows how to use Power Apps and SharePoint together to create your own help ticketing system.This book offers a deep dive into Power BI, including working with JSON, XML, and Yes/No data, as well as visualizing learning data and using it to detect inconsistencies between Excel files. You’ll also see how to connect to Remedy and to the help system you will have created. Under author Jeffrey Rhodes’s guidance, you’ll delve into the Power Apps collection to learn how to avoid dreaded "delegation" issues with larger data sets. Back on applications, you will create a training class sign-up solution to only allow users to choose classes with available seats. Digging deeper into Teams, you’ll learn how to send chats, posts, and "adaptive cards" from Power Automate. Rounding things out, you’ll save Forms attachments to SharePoint with Power Automate, create your own "Employee Recognition" app with all of the Power Platform and Teams, add or edit weekly status reports, and learn how to create reservation and scoring applications.After reading the book, you will be able to build powerful applications using Power Apps, Power Automate, Power BI, SharePoint, Forms, and Teams.WHAT YOU WILL LEARN* Create productivity-enhancing applications with Power Apps, Power Automate, SharePoint, Forms, and/or Teams* Transform and visualize data with Power BI to include custom columns, measures, and pivots* Avoid delegation issues and tackle complicated Power Apps issues like complex columns, filtering, and ForAll loops* Build scheduled or triggered Power Automate flows to schedule Teams Meetings, send emails, launch approvals, and much moreWHO THIS BOOK IS FORBusiness and application developers. JEFFREY RHODES is a founder and Chief Technical Officer of Platte Canyon Multimedia Software Corporation, a leader in developing commercial e-learning software. He graduated at the top of his class at the Air Force Academy, where he earned a bachelor's degree in electrical engineering. Jeff received a master’s degree in economics from the London School of Economics, which he attended under a British Marshall Scholarship. He is the author of Creating Business Applications with Office 365: Techniques in SharePoint, PowerApps, Power BI, and More, Programming for e-Learning Developers: ToolBook, Flash, JavaScript, and Silverlight, VBTrain.Net: Creating Computer and Web Based Training with Visual Basic .NET. He also co-wrote The ToolBook Companion. He lives in Colorado Springs with his wife Sue and is the proud father of his sons Derek and Michael.CHAPTER 1. PROGRAMMING IN THE POWER PLATFORMIn this chapter, we will cover the basics of programming: properties, methods, and events. We will then look at how their implementation differs between in each of the Power Platform applications compared with traditional environments like .NET (Windows Forms and ASP.NET) and JavaScript. For Power Apps, we will see how you can set the properties of other objects directly but instead need to make the value of what you want to change (such as the text of a button) a variable and then change the value of that variable elsewhere in the application. We will also explore its Visual Basic-like syntax. In Power Automate, we will look at the different types of actions (variables, loop, parallel branches, conditions, etc.). Finally, in Power BI we will look at the Power Query M formula language.CHAPTER 2. UPDATING A SHAREPOINT LIST USING POWER APPSCHAPTER 3. CREATING AN APPROVAL PROCESS WITH POWER AUTOMATECHAPTER 4. CREATING A SURVEY RESPONSE DASHBOARD WITH MICROSOFT POWER BICHAPTER 5. CREATING A SURVEY SOLUTION WITH MICROSOFT FORMS, FLOW, SHAREPOINT, AND POWER BICHAPTER 6. POWER BI CHALLENGES WITH JSON, XML, AND YES/NO DATACHAPTER 7. POWER BI CASE STUDY: MONITORING BMC REMEDY HELP TICKETSCHAPTER 8. BUILDING A HELP TICKETING SYSTEM IN POWERAPPS AND SHAREPOINT – NEW TICKET FORMCHAPTER 9. CONTINUING THE HELP TICKETING SYSTEM – TECHNICIAN FORMCHAPTER 10. USING POWER BI FOR THE HELP TICKETING SYSTEMCHAPTER 11. OVERCOMING POWER APPS DELEGATION ISSUES WITH SHAREPOINT DATA SOURCESIn this chapter, we look at how to use the technique described in https://tinyurl.com/twzvbgl to overcome delegation limits in Power Apps using a SharePoint data source. We also implement a corresponding Power Automate Flow to copy the ID value to a numeric column each time we create a record.CHAPTER 12. CREATING A CLASS SIGN-UP SOLUTION IN SHAREPOINT AND POWER APPSCHAPTER 13. VISUALIZING LEARNING MANAGEMENT DATA FROM SQL SERVER USING POWER BIThis chapter gives several examples of connecting to multiple tables in a SQL Server database in order to visualize test score, completion, assignments and similar learning management data. It demonstrates custom columns, merging tables, slicers, and much more.CHAPTER 14. DYNAMIC INFORMATION IN POWER APPS AND SENDING AN ADAPTIVE CARD TO TEAMS USING POWER AUTOMATEIn this chapter, we create linked SharePoint lists that display status levels, colors, and associated steps. We then read these lists from PowerApps to create a status display that we display in a tab in Teams. Finally, we create a Power Automate flow so that each time the status changes, we automatically post that to our Teams channel.CHAPTER 15. DYNAMICALLY SETTING OBJECT PROPERTIES IN POWER APPS BASED ON A SHAREPOINT LISTIn this chapter, we explore how to approximate dynamic object references/reflection in Power Apps. We take an "Actions" list in SharePoint and use it to set Text, Tooltip, and Visible properties of each corresponding button in Power Apps.CHAPTER 16. UPLOADING FILES FROM POWERAPPS TO SHAREPOINT AND EMAILING LINKS USING POWER AUTOMATEIn this chapter, we see how to upload multiple attachments from Power Apps to a SharePoint document library using Power Automate. While we are in Power Automate, we create an email of links to these documents and email it to the designated recipient.CHAPTER 17. WORKING WITH SHAREPOINT LOOKUP COLUMNS IN POWER BIIn this chapter, we explore how to use the FieldValuesAsText functionality in Power BI to get the data from within a SharePoint Lookup column. We also explore creating custom columns and filtering by Content Type.CHAPTER 18. JOINING SHAREPOINT/EXCEL TABLES IN POWER BIThis chapter shows two different examples on how to join data in Power BI to make effective visualizations. The first example shows how to access lookup columns in SharePoint lists by doing a join on the lists once you bring them into Power BI. The second one is an extended example on how to verify data between two Excel spreadsheets that share a common value. We first show how to accomplish the task with Microsoft Access with a join query and a set of custom columns that reflect whether columns between the two spreadsheets actually match. We then show how it is easier and more reproducible with later data to do the same thing with Power BI using a merge query.CHAPTER 19. COPYING MICROSOFT FORMS ANSWERS TO SHAREPOINT USING POWER AUTOMATE AND THEN SHOWING THE MOST CURRENT SUBMISSION IN POWER BIIn this chapter, we take a simple Microsoft Form, copy each entry to SharePoint with Power Automate, and then visualize the data in Power BI. The main insight on the Power BI side is to show only the most recent form submission by grouping within Power BI, creating a MaxDate column, and then filtering.CHAPTER 20. COPYING MICROSOFT FORMS ATTACHMENTS TO A SHAREPOINT LIST ITEM USING POWER AUTOMATEIn this chapter, we see how to create a group form in Microsoft Forms, create an associated SharePoint List to hold the data, use Power Automate to copy the form responses to the list, and, most importantly, copy each file uploaded with the form and attach it to the corresponding list item.CHAPTER 21. CREATING AN EMPLOYEE RECOGNITION APP IN POWER APPS, POWER AUTOMATE, POWER BI, TEAMS, AND SHAREPOINTIn this chapter, we demonstrate how to create a Power Apps and Power Automate employee recognition solution that can post the recognition to a Teams channel, send a Teams chat, and/or send via email. We try to make it optional for submitters to include their information, finding it works for chats and email but not posts. We store the information in SharePoint and then use Power BI to visualize the values demonstrated and other data.CHAPTER 22. CREATING A RESERVATIONS BOOKING SOLUTION IN POWER APPS AND SHAREPOINTIn this chapter, we demonstrate how to create a SharePoint list of available appointments and then use Power Apps to allow users to select an available appointment and make that not available to anyone else. It also shows how to allow users to edit or delete their appointments (or those created on their behalf).CHAPTER 23. CREATING A SCORING APPLICATION IN POWER APPS AND SHAREPOINTIn this chapter, we create a scoring application where we patch three different SharePoint records at the same time. Along the way, we use cascading drop-down lists, collections, data tables, and variables.
Workload Automation Using HWA
Apply best practices for deploying and administering HCL Workload automation (HWA) to meet the automation requirements of the digitally transformed platform. This book will provide detailed architecture and deployment options to achieve this goal.Workload automation focuses on real-time processing, predefined event-driven triggers, and situational dependencies. It offers centralized control of managing multiple tasks, making it possible to schedule enterprise-wide tasks. You'll see how it supports the timely completion of tasks and is beneficial for processes that need to happen at a specific time or need to occur as a result of another event.HWA increases efficiency, reduces the turnaround time for workflows, and reduces errors along with delays in end-to-end processes. You'll review proven ways to deliver batch optimization and modernization requirements, and see how solutions can be aligned with the DevSecOps delivery model. Workload Automation Using HWA presents information on how to use the tool and has numerous use cases and implementation procedures to guide every workload automation deployment requirement.WHAT YOU'LL LEARN* Automate and integrate your complex workload, workflow, and business processes across automation platforms, ERP systems, and business applications* Understand event-driven batch automation* Practice alignment of the workload automation solution with the DevSecOps principlesWHO THIS BOOK IS FORSolution Architects, Infrastructure Architects, Technical Architects, Enterprise Architects, Workload Automation Tool Administrators or SME’s, Schedulers, Application owners, Automation Specialists, Service Delivery ManagersNAVIN SABHARWAL, currently is the Chief Architect and Head of Strategy for Autonomics, named ‘DRYiCE’ at HCL Technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL Technologies. Navin is an innovator, thought leader, author and a consultant in areas of AI and Machine Learning, Cloud Computing, Big Data Analytics, Software Product Development, Engineering and R&D. He is responsible for IP Development & Service Delivery in the Areas of AI and Machine Learning, Automation products, Cloud Computing, Public Cloud AWS, Microsoft Azure, VMWare Private Cloud, Microsoft Private Cloud, Data Center Automation, Analytics for IT Operations, IT Service Management.SUBRAMANI KASIVISWANATHAN is the Solution architect for Application Performance Management and Workload Automation Solutions, also leading the Engineering and R&D function, having overall 16 years of IT experience and 6 years of experience in Academics, currently working as Practice Lead in HCL DRYiCE, responsible for creating solutions catering to APM and Workload Automation, responsible and accountable for the Research and Development in autonomics platform.Chapter 1: Introduction to Workload AutomationSub –Topics1. Workload Automation Concepts2. Introduction to HCL Workload Automation3. HCL Workload Automation strengths4. Common HCL Workload Automation terminologyChapter 2: HCL Workload Automation ArchitectureSub –Topics1. HWA components2. HWA communication path3. Architecture TypesChapter 3: HCL Workload Automation DeploymentsSub - Topics1. Deployment Options4. Planning Deployments5. Stand-Alone Architecture6. High Availability Architecture7. Disaster Recovery Architecture8. Containerized deployments9. Deployment on Kubernetes clusters10. Workload Automation on HCL SofyChapter 4: Workload Design and Monitoring using DWC and CLIChapter 5: Use Case: HWA for managed file transfersChapter 6: Use Case: HWA integration with SAPChapter 7: Use Case: Automate job executions on Microsoft SQL serverChapter 8: Use Case: Working with RESTful Web ServicesChapter 9: Use Case: Submit, orchestrate and monitor jobs on a Kubernetes clusterChapter 10: Use Case: HWA Integration with Hadoop Distributed File SystemChapter 11: Use Case: HWA Integration with Apache SparkChapter 12: Use Case 1: HWA Integration with ServiceNow Use Case 2: Auto Remediation of Job failuresChapter 13: Tool Administration and best practicesChapter 14: Alerting and Troubleshooting issuesChapter 15: HWA ReportingChapter 16: HWA SecurityChapter 17: HWA tuning for best performanceChapter 18: Alignment of HWA with DevSecOps Delivery model.
Data Science mit SAP HANA
Mit SAP HANA und SAP HANA Cloud ist viel mehr möglich, als Sie denken! In diesem Buch erfahren Sie, wie Sie APL und PAL einsetzen können, um komplexe Auswertungen vorzunehmen und Vorhersagen zu treffen. Praktische Beispiele zu Klassifizierung, Regression u.v.m. zeigen Ihnen die vielfältigen Möglichkeiten auf und lassen sich direkt auf Ihre Anwendungsfälle übertragen. Aus dem Inhalt: Was ist Data Science?SAP HANA, SAP HANA Cloud und SAP Data Warehouse CloudPython, R und SQLUnivariate und Multivariate AnalyseAutomated Predictive Library Predictive Analytics LibraryGeodaten-, Graph- und TextanalyseTrainieren und Anwenden von Data-Science-ModellenIntegration in Geschäftsprozesse und Geschäftsanwendungen Vorworte ... 11 Einleitung ... 15 1. Einführung ... 19 1.1 ... Themenabgrenzung ... 20 1.2 ... Data Science in der SAP-Welt ... 27 2. SAP HANA als Data-Science-Umgebung ... 37 2.1 ... SAP HANA ... 38 2.2 ... SAP HANA Client ... 64 2.3 ... Python-Entwicklungsumgebung ... 64 3. Erste Schritte ... 71 3.1 ... Python ... 71 3.2 ... Die R-Programmiersprache ... 84 3.3 ... Die SQL-Sprache für SAP HANA ... 89 4. Explorative Datenanalyse und Datenvorbereitung ... 99 4.1 ... Analyse einer Tabelle ... 100 4.2 ... Analyse einzelner Variablen ... 105 4.3 ... Analyse mehrerer Variablen ... 111 4.4 ... Datenvorbereitung ... 114 5. Automated Predictive Library ... 129 5.1 ... Einführung in die APL ... 131 5.2 ... Klassifizierung mit der APL ... 133 5.3 ... Regression mit der APL ... 173 5.4 ... Zeitreihen mit der APL ... 186 5.5 ... Weitere Informationen ... 211 6. Predictive Analysis Library ... 213 6.1 ... Einführung in die PAL ... 214 6.2 ... Klassifizierung mit der PAL ... 216 6.3 ... Regression mit der PAL ... 229 6.4 ... Zeitreihen mit der PAL ... 236 6.5 ... Cluster-Analyse ... 253 6.6 ... Survival Analysis ... 260 6.7 ... Ausreißeranalyse ... 282 6.8 ... Automated Machine Learning ... 289 6.9 ... State-enabled Deployment ... 299 7. Spezialisierte Analyse-Engines ... 301 7.1 ... Geodatenanalyse ... 302 7.2 ... Graphanalyse ... 317 7.3 ... Textanalyse ... 328 8. Deployment-Optionen ... 341 8.1 ... SAP Data Intelligence ... 342 8.2 ... Cloud Foundry ... 357 8.3 ... Kyma ... 363 9. Tipps und Tricks ... 377 Anhang ... 397 A. Checkliste ... 397 Die Autoren ... 401 Index ... 403