Security
Overview of Some Voice Over IP Calls and SMS Verifications Services Providers
This book provides brief survey of the some Voice Over IP (VOIP) providers, including the providers that offers free calls to some countries. Then, I will mention some websites that offer virtual phone numbers from around the world to receive activation codes and SMS confirmations online..The report consists from the following parts:1. How does VOIP work?2. Getting free phone number in US or Canada and other countries3. Betamax (Dellmont sarl) VOIP Service Provider.4. Some free websites that can be used to receive SMS online using numbers from some countries.5. Best websites that offer SMS verification, sending SMS and renting number services.6. Inphonex VOIP Provider.7. eFax8. VOIP Frequently asked questions.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator.I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering.I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com
Microsoft Certified Azure Fundamentals Study Guide
QUICKLY PREPS TECHNICAL AND NON-TECHNICAL READERS TO PASS THE MICROSOFT AZ-900 CERTIFICATION EXAMMicrosoft Certified Azure Fundamentals Study Guide: Exam AZ-900 is your complete resource for preparing for the AZ-900 exam. Microsoft Azure is a major component of Microsoft’s cloud computing model, enabling organizations to host their applications and related services in Microsoft’s data centers, eliminating the need for those organizations to purchase and manage their own computer hardware. In addition, serverless computing enables organizations to quickly and easily deploy data services without the need for servers, operating systems, and supporting systems. This book is targeted at anyone who is seeking AZ-900 certification or simply wants to understand the fundamentals of Microsoft Azure. Whatever your role in business or education, you will benefit from an understanding of Microsoft Azure fundamentals.Readers will also get one year of FREE access to Sybex’s superior online interactive learning environment and test bank, including hundreds of questions, a practice exam, electronic flashcards, and a glossary of key terms. This book will help you master the following topics covered in the AZ-900 certification exam:* Cloud concepts* Cloud types (Public, Private, Hybrid)* Azure service types (IaaS, SaaS, PaaS)* Core Azure services* Security, compliance, privacy, and trust* Azure pricing levels* Legacy and modern lifecyclesGrowth in the cloud market continues to be very strong, and Microsoft is poised to see rapid and sustained growth in its cloud share. Written by a long-time Microsoft insider who helps customers move their workloads to and manage them in Azure on a daily basis, this book will help you break into the growing Azure space to take advantage of cloud technologies. JAMES BOYCE is a Sr. Technical Account Manager for Microsoft. He has authored more than 60 books on computer technology, covering topics from Windows Server and client, Microsoft Office, networking, programming, and hardware to AutoCAD and UNIX. A former Contributing Editor for Windows Magazine, he has written for numerous print and online publications and has managed globally dispersed teams supporting Windows Server, SharePoint, and other systems. Jim has also been a college instructor.Introduction xixAssessment Test xxxiiCHAPTER 1 CLOUD CONCEPTS 1Understanding Cloud Computing 2Benefits of Cloud Computing 4Economic Benefits 4Scalability and Elasticity 5High Availability 7Fault Tolerance 7Disaster Recovery 8Human Resources 9Financial Models 9Cloud Computing Models and Responsibilities 10Software-as-a-Service 10Infrastructure-as-a-Service 12Platform-as-a-Service 13Shared Responsibility 15Public, Private, and Hybrid Cloud Models 16Public Cloud 16Private Cloud 17Hybrid Cloud 17Summary 18Exam Essentials 18Review Questions 21CHAPTER 2 AZURE CORE SERVICES 25Core Azure Architectural Components 26Geographies and Regions 26Availability Zones 28Bringing It All Together 30Resources and Resource Groups 31Azure Resource Manager 33Azure Subscriptions and Billing Scope 33Azure Subscriptions 33Azure Billing Accounts 34Billing Scope 35Azure Tenants 37Core Azure Services 37Virtual Machines 38Virtual Machine Scale Sets 39Availability Sets 40Azure App Service 42Azure Container Instances 42Azure Kubernetes Service 43Windows Virtual Desktop 44Core Azure Storage 44Blob Storage 44Blob Storage Tiers 45Disk Storage 45File Storage 46Storage Accounts 46Core Data Services 47Structured and Unstructured Data 47Azure SQL Database 47SQL Managed Instance 48Cosmos DB 48Azure Database for MySQL 49Azure Database for PostgreSQL 49Azure Database Migration Service 49Microsoft Marketplace 50Summary 50Exam Essentials 51Review Questions 53CHAPTER 3 AZURE CORE NETWORKING SERVICES 59Networking Concepts 60Client-Server and Serverless Computing 60Network Addressing 61Domain Name System 61Routing 63Virtual Networks 63Load Balancers 64VPN Gateway 66Azure VPN Gateway 67ExpressRoute 68Content Delivery Networks 69Summary 70Exam Essentials 71Review Questions 72CHAPTER 4 SECURITY, COMPLIANCE, PRIVACY, AND TRUST 75Network Security 77Defense in Depth 77Azure Firewall 78Web Application Firewall 80Network Security Groups 81Application Security Groups 83User-Defined Routes 83Azure DDoS Protection 84Authentication and Authorization 84Azure Active Directory 84Authentication and Authorization 86Azure Multifactor Authentication 87Conditional Access 87Single Sign-On (SSO) 88Security Tools and Features 88Azure Security Center 88Azure Key Vault 90Azure Information Protection 91Azure Advanced Threat Protection 91Azure Sentinel 92Azure Dedicated Hosts 92Azure Governance Methodologies 93Azure Policies 93Azure Initiatives 94Role-Based Access Control 94Resource Locks 97Azure Blueprints 97Microsoft Cloud Adoption Framework for Azure 99Azure Monitoring and Reporting Options 100Azure Monitor 100Azure Service Health 102Azure Advisor 103Compliance and Data ProtectionStandards 105Industry Compliance Standards and Terms 105Microsoft Privacy Statement 106Online Service Terms 107Data Protection Addendum 107Trust Center 107Service Trust Portal 107Compliance Manager 108Azure Government 109Azure China 109Summary 110Exam Essentials 111Review Questions 114CHAPTER 5 AZURE SOLUTIONS 123Internet of Things (IoT) 124Azure IoT Hub 124Azure IoT Central 125Azure Sphere 126Artificial Intelligence 126Azure Machine Learning 127Azure Cognitive Services 128Azure Bot Service 128Serverless Computing 128Azure Functions 129Azure Logic Apps 129DevOps 130Azure DevOps Services 130GitHub and GitHub Actions 130Azure DevTest Labs 131Summary 131Exam Essentials 131Review Questions 133CHAPTER 6 AZURE PRICING, SERVICE LEVELS, AND LIFECYCLE 137Purchasing Azure Services 138Azure Subscriptions 138Purchasing Services 139Factors Affecting Cost 139Billing Zones 141Planning and Managing Azure Costs 141TCO Calculator 141Pricing Calculator 143Managing and Minimizing Azure Cost 144Azure Cost Management + Billing 148Service Level Agreements 149Composite SLAs 150Availability Zones 150Service Lifecycles 151Preview 151General Availability 151Summary 152Exam Essentials 152Review Questions 154CHAPTER 7 CREATING AND MANAGING AZURE RESOURCES 157Azure Management Tools 158Azure Portal 158Azure PowerShell 160Azure CLI 161Azure Cloud Shell 161Azure Mobile App 162Using ARM Templates 163Bringing It All Together 163Creating and Managing Resources 163Creating a Free Subscription 164Creating Resource Groups 165Creating Azure Resources and Services 166Deleting Resources and Services 174Summary 175Exam Essentials 175Review Questions 177Appendix Answers to Review Questions 179Chapter 1: Cloud Concepts 180Chapter 2: Azure Core Services 181Chapter 3: Azure Core Networking Services 184Chapter 4: Security, Compliance, Privacy, and Trust 185Chapter 5: Azure Solutions 189Chapter 6: Azure Pricing, Service Levels, and Lifecycle 190Chapter 7: Creating and Managing Azure Resources 192Index 193
Cloud Technologies
CLOUD TECHNOLOGIESCONTAINS A VARIETY OF CLOUD COMPUTING TECHNOLOGIES AND EXPLORES HOW THE CLOUD CAN ENHANCE BUSINESS OPERATIONSCloud Technologies offers an accessible guide to cloud-based systems and clearly explains how these technologies have changed the way organizations approach and implement their computing infrastructure. The author includes an overview of cloud computing and addresses business-related considerations such as service level agreements, elasticity, security, audits, and practical implementation issues. In addition, the book covers important topics such as automation, infrastructure as code, DevOps, orchestration, and edge computing.Cloud computing fundamentally changes the way organizations think about and implement IT infrastructure. Any manager without a firm grasp of basic cloud concepts is at a huge disadvantage in the modern world. Written for all levels of managers working in IT and other areas, the book explores cost savings and enhanced capabilities, as well as identifies different models for implementing cloud technologies and tackling cloud business concerns. This important book:* Demonstrates a variety of cloud computing technologies and ways the cloud can enhance business operations* Addresses data security concerns in cloud computing relevant to corporate data owners* Shows ways the cloud can save money for a business* Offers a companion website hosting PowerPoint slidesWritten for managers in the fields of business, IT and cloud computing, Cloud Technologies describes cloud computing concepts and related strategies and operations in accessible language. ROGER MCHANEY is a University Distinguished Teaching Scholar and holder of the Daniel D. Burke Chair for Exceptional Faculty in the Department of Management at Kansas State University, USA.Preface xiiiAcknowledgments xvAbout the Companion Website xvii1 WHAT IS CLOUD COMPUTING? 1Why Cloud Computing? 1Cloud Computing’s Focus 2Cost Reduction 2Capacity Planning 4Organizational Agility 5How Is Cloud Computing Hosted? 6Private Cloud Deployment 6Public Cloud Deployment 6Hybrid Cloud Deployment 7What Are the Different Types of Cloud Solutions? 7Software as a Service (SaaS) 8Platform as a Service (PaaS) 9Infrastructure as a Service (IaaS) 10SaaS versus PaaS versus IaaS: A Review 12Recovery as a Service (RaaS) 12What Are General Benefits of Cloud Services? 13What Are General Disadvantages of Cloud Services? 14What Is the History Behind Cloud Computing? 14Historic Perspective of Hardware Related to Cloud Computing 16Historic Perspective of Software Related to Cloud Computing 17SOA Explained in Terms of Lego Blocks 18Summary 20References 21Bibliography 212 WHO USES THE CLOUD? 23Individuals Users 23Public Cloud Subscription Storage for Individuals 24Private Cloud Storage (PCS) for Individuals 25Hosted Personal Cloud Storage Using Third Party Hardware 27Public Cloud versus Personal Cloud Storage 28Small and Medium Enterprise (SME) Users 28How Can Cloud Computing Save SMEs Money? 28What Cloud Computing Features Appeal to SMEs? 32SME Cloud Software 32Accounting Software 32Human Resources (HR) Software 33Customer Relationship Management (CRM) 36Project Management/Task Organization 40Office Software 42Data Analytics 44Social Media 45Purchasing and Procurement 46Help Desk and Service Software 47Enterprise Resource Planning (ERP) 48Corporate Managers and Users 49Organizational Users of Cloud Computing 50PaaS Users 50IaaS Users 51File Storage and Backup Users 51Disaster Recovery Users 51Big Data Analytics Users 51Summary 51References 52Further Reading 52Website Resources 52Accounting Software 52CRM Software 53Data Analytics 53ERP for SMEs 53Help Desk 53HR Software 53Office Software 54Project Management Tools 54Purchasing and Procurement 54Social Media 543 WHAT IS VIRTUALIZATION? 55Hardware Virtualization 56Hypervisors 56Types of Hardware Virtualization 57Hardware Virtualization Vendors and Products 59Hardware Virtualization Benefits 60Operating System Virtualization 62Operating-System-Level Virtualization (Containerization) 62Containerization Software 63Containers versus Virtual Machines 65Container Cloud Practices 66Containers as a Service (CaaS) 67Storage Virtualization 67DAS (Direct Attached Storage) 67SAN (Storage Area Networks) 69NAS (Network Attached Storage) 70Storage Virtualization Techniques 71File- Versus Block-Level Virtualization 72Summary 72References 72Further Reading 724 CAN THE CLOUD HELP OPERATIONS? 75Load Balancing 75Load Balancing Algorithms 77Static Load Balancing Algorithms 77Dynamic Load Balancing Algorithms 78Cloud Load Balancing Algorithms 79Hardware Versus Software Load Balancing 81Cloud-Based Balancing 81Cloud Load Balancing Versus DNS Load Balancing 82Scalability and Elasticity 82Elasticity in Cloud Environments 83Challenges for Elasticity 84Learning Curve 84Response Time 84Monitoring Elastic Applications 85Stakeholder Needs 85Multiple Levels of Cloud Control 85Security 85Privacy and Compliance 86Benefits of Cloud Elasticity 86Ease of Implementation 86Failover and Fault Tolerance 86On-Demand Computing 87Pay Only for What You Use 87Standardization of Server Pool 88Summary 88References 89Further Reading 895 HOW ARE CLOUDS MANAGED? 91Automation 91Orchestration 92Automation Tasks 92Implementing Orchestration with IaC 93IaC Example 95IaC Tools 97Push Approach 97Pull Approach 97Puppet 98Chef 98SaltStack 99Terraform 99Cloud Provider Resource Management 99AWS CloudFormation 99Google Cloud Deployment Manager 100Azure Resource Manager 101Access Control for Resource Management Tools 102Customized Policies 104APIs and SDKs 105APIs 105SaaS APIs 105PaaS APIs 105IaaS APIs 105SDKs 106SDKs and APIs 106Cloud Backup and Replication 106Cloud Backup 107Cloud Backup Processes 108Cloud Backup Drawbacks 109Cloud Backup Vendors 110Cloud Replication 111Replication Technologies 112DRaaS 113Summary 114References 115Further Reading 115Website Resources 116Backup Providers 116DRaaS Providers 116IaC Providers 1176 WHAT ARE CLOUD BUSINESS CONCERNS? 119Monitoring and Console Tools 119Resource Consumption Monitoring 120Planning for Monitoring 121Cloud Monitoring Tools 121Monitoring Challenges 123Cost Monitoring 123Costs Associated with Zombie Resource Instances 126Service Level Agreements (SLAs) 128SLA Sources 129SLA Components 129SLA Metrics 130Other Performance Considerations 133Performance Failure Penalties 133SLA Data Ownership Clause 134Data Ownership 134Data Location 134Data Disposition 136Data Breaches 136Governmental Access Requests 137SLA Revisions 138Transferring SLAs 138More on SLAs 138Billing 139Amazon Billing 140Third Party Billing Tools 141Summary 141References 142Further Reading 142Website Resources 143Cost and Monitoring Software 143Zombie Instance Management Software 1437 HOW ARE BUSINESS APPLICATIONS IN THE CLOUD MANAGED SAFELY? 145Cloud Vulnerabilities 145Cloud Security Architecture 146IaaS Security Architecture 146IaaS Resource Misconfiguration 147IaaS Resource Vulnerabilities 147IaaS Zombies Vulnerabilities 149PaaS Security Architecture 149SaaS Security Architecture 151Access and Identity Control in the Cloud 152Identity Governance 153IAM Considerations for Developers 154Identity Provisioning 155Cloud Licenses 156IAM with Third Party Vendors 156FIM Benefits 158FIM Challenges 158Identity and Access Management Products 159Identity Management Standards 160Summary 163References 164Bibliography 164Website Bibliography 165Identity Management 1658 WHAT IS CLOUD GOVERNANCE? 167IT Governance Overview 167IT Governance Boards 169IT Governance Frameworks 169COBIT 2019 170ITIL (Information Technology Infrastructure Library) 171AS 8015-2015 172ISO/IEC 38500:2015 174CMMI 174FAIR 174IT Governance in the Cloud 176Choosing a Governance Framework 177Cloud Risk Factors Related to Governance 177IT Audit Committees 178IT Auditor 179IT Controls 179End-User Controls 181Shadow IT 183Acceptable Risk 184SOA Governance 185Ensuring Secure Cloud Data 185Cloud Provider Data Safety Measures 187Cloud Encryption 187Symmetric Key Encryption 189Asymmetric Key Encryption 190Other Encryption Methods 191Secure Sockets Layer (SSL) 191Key Management 194Key Management System Products 195Summary 195References 196Further Reading 1969 WHAT OTHER SERVICES RUN IN THE CLOUD? 199DevOps 199DevOps Ingredients 200Ingredient #1: Communication 200Ingredient #2: Collaboration 201Ingredient #3: Flow 201Ingredient #4: Continuous Improvement 202Ingredient #5: Lean Computing 202Ingredient #6: Tool Kit 203Ingredient #7: Quality 203Cloud-Based Problem-Solving Approaches 204DMAIC 204TRIZ 205Microservices 206Cloud Database Applications 209Cloud Data Models 209Cloud Database Typical Features 211DBaaS Product Examples 211Amazon 211Microsoft 211Google 211Other DBaaS Vendors 212Cloud Analytics Services 212Microsoft Power BI Service 214Domo 215IBM Analytics 215Tableau 215Hadoop 216Hadoop in the Cloud 216Apache Spark 217Apache Storm 217Open Source Private Cloud Software 218OpenStack 218OpenStack Components 219Other Services 219Compute Services 220Application Services 220Summary 221References 221Further Reading 221Website Resources 222Data Analytics Tools 222DBaaS 222NoSQL 222SQL 222DevOps 223Hadoop Competitors 223Private Clouds 223Virtual Databases 223NoSQL 223SQL 22310 WHAT IS THE CLOUD FUTURE? 225NoOps 225Everything as a Service (EaaS) 226Zero Knowledge Cloud Storage 226Serverless Architecture 226Multicloud 227Small Business Clouds 227Machine Learning 228Internet of Things (IoT) 229Cloud Computing as a Utility 229Cloud Streaming Services 230Edge Computing 230Fog Computing 231Summary 232References 233Further Reading 233Glossary 235Chapter 1 List of Terms 235Chapter 2 List of Terms 237Chapter 3 List of Terms 240Chapter 4 List of Terms 243Chapter 5 List of Terms 245Chapter 6 List of Terms 248Chapter 7 List of Terms 250Chapter 8 List of Terms 252Chapter 9 List of Terms 256Chapter 10 List of Terms 258Index 261
Networking All-in-One For Dummies
YOUR ULTIMATE ONE-STOP NETWORKING REFERENCEDesigned to replace that groaning shelf-load of dull networking books you’d otherwise have to buy and house, Networking All-in-One For Dummies covers all the basic and not-so-basic information you need to get a network up and running. It also helps you keep it running as it grows more complicated, develops bugs, and encounters all the fun sorts of trouble you expect from a complex system. Ideal both as a starter for newbie administrators and as a handy quick reference for pros, this book is built for speed, allowing you to get past all the basics—like installing and configuring hardware and software, planning your network design, and managing cloud services—so you can get on with what your network is actually intended to do.In a friendly, jargon-free style, Doug Lowe—an experienced IT Director and prolific tech author—covers the essential, up-to-date information for networking in systems such as Linux and Windows 10 and clues you in on best practices for security, mobile, and more. Each of the nine minibooks demystifies the basics of one key area of network management.* Plan and administrate your network * Implement virtualization * Get your head around networking in the Cloud * Lock down your security protocols The best thing about this book? You don’t have to read it all at once to get things done; once you’ve solved the specific issue at hand, you can put it down again and get on with your life. And the next time you need it, it’ll have you covered.DOUG LOWE is Information Technology Director for a civil engineering firm and a prolific technology author. He has been managing networks for more than 30 years and has written more than 50 technology guides, many in the For Dummies series.Introduction 1BOOK 1: GETTING STARTED WITH NETWORKING 5Chapter 1: Welcome to Networking 7Chapter 2: Network Infrastructure 23Chapter 3: Switches, Routers, and VLANs 39Chapter 4: Cybersecurity 55Chapter 5: Servers and Virtualization 67Chapter 6: Cloud Computing 79BOOK 2: UNDERSTANDING NETWORK PROTOCOLS 89Chapter 1: Network Protocols and Standards 91Chapter 2: TCP/IP and the Internet 115Chapter 3: IP Addresses 123Chapter 4: Routing 145Chapter 5: Dhcp 155Chapter 6: Dns 173Chapter 7: TCP/IP Tools and Commands 207BOOK 3: PLANNING A NETWORK 235Chapter 1: Local Area Networks 237Chapter 2: Wide Area Networks 253Chapter 3: Server Architecture 267Chapter 4: Virtualization Architecture 277Chapter 5: Storage Architecture 289Chapter 6: Backup Architecture 301Chapter 7: Hyperconverged Infrastructure 319BOOK 4: IMPLEMENTING A NETWORK 331Chapter 1: Network Hardware 333Chapter 2: Wireless Networks 345Chapter 3: Windows Clients 365Chapter 4: Mac Networking 375Chapter 5: Network Printers 383Chapter 6: Virtual Private Networks 389BOOK 5: IMPLEMENTING VIRTUALIZATION 395Chapter 1: Hyper-V 397Chapter 2: VMware 417Chapter 3: Azure 429Chapter 4: Amazon Web Services 445Chapter 5: Desktop Virtualization 463BOOK 6: IMPLEMENTING WINDOWS SERVER 2019 471Chapter 1: Installing Windows Server 2019 473Chapter 2: Configuring Windows Server 2019 489Chapter 3: Configuring Active Directory 499Chapter 4: Configuring User Accounts 511Chapter 5: Configuring a File Server 533Chapter 6: Using Group Policy 549Chapter 7: Typing Windows Commands 561Chapter 8: Using PowerShell 589BOOK 7: ADMINISTERING MICROSOFT OFFICE 365 609Chapter 1: Getting Started with Office 365 Administration 611Chapter 2: Configuring Exchange Online 631Chapter 3: Administering Teams 651BOOK 8: IMPLEMENTING LINUX 667Chapter 1: Installing a Linux Server 669Chapter 2: Linux Administration 683Chapter 3: Basic Linux Network Configuration 715Chapter 4: Running DHCP and DNS 727Chapter 5: Doing the Samba Dance 739Chapter 6: Running Apache 747Chapter 7: Running Postfix 761Chapter 8: Linux Commands 771BOOK 9: MANAGING A NETWORK 801Chapter 1: Welcome to Network Administration 803Chapter 2: Managing Remotely 817Chapter 3: Managing Network Assets 835Chapter 4: Solving Network Problems 847Chapter 5: Managing Software Deployment 863Chapter 6: Managing Mobile Devices 875BOOK 10: DEALING WITH CYBERSECURITY 889Chapter 1: Securing Your Users 891Chapter 2: Managing Firewalls and Virus Protection 901Chapter 3: Dealing with Spam 921Chapter 4: Managing Disaster Recovery and Business Continuity Planning 935APPENDIXES 943Appendix A: Directory of Useful Websites 945Appendix B: Glossary 953Index 975
IT-Sicherheitsmanagement (3. Auflg.)
Das umfassende Praxishandbuch in 3. Auflage (04/2021) für IT-Security und technischen Datenschutz nach ISO 27001.Daten werden in Public Clouds verlagert und dort verarbeitet, auf Mobiltelefonen gespeichert, über Chat-Apps geteilt oder im Rahmen von Industrie 4.0 in einer Größenordnung erfasst, die bislang kaum denkbar war. IT-Security-Manager müssen die entsprechenden Maßnahmen nicht nur an diese Veränderungen anpassen, sondern auch an die EU-Datenschutz-Grundverordnung, das IT-Sicherheitsgesetz, die Anforderungen von Kunden oder das China Cybersecurity Law. Alle diese Regelungen haben immense Auswirkungen darauf, wie Unternehmen Daten erfassen, verarbeiten, speichern oder austauschen dürfen. In der Fülle und der Bandbreite der neuen Regelungen liegt aber immer auch die Gefahr, etwas falsch zu machen.Dieser Praxisleitfaden wird Ihnen dabei helfen, sich in der riesigen Menge an Einzelthemen und Aufgaben, mit denen sich IT-Security-Manager auseinandersetzen müssen, zurechtzufinden und den richtigen Weg zu wählen, um mit all diesen Anforderungen umzugehen.Jedes Kapitel beschreibt ausführlich jeweils einen Bereich der IT-Security. Die notwendigen theoretischen Grundlagen wechseln sich dabei ab mit Tipps aus der Praxis für die Praxis, mit für den Berufsalltag typischen Fragestellungen, vielen konkreten Beispielen und hilfreichen Checklisten. Alle Teilgebiete werden abschließend in einem Kapitel zusammengeführt, das die Einführung und Weiterentwicklung eines IT-Sicherheitsmanagements auf Basis der ISO-27000-Normen-Familie unter Beachtung der datenschutzrechtlichen Bestimmungen der EU-DSGVO behandelt.So erhalten Sie sowohl einen kompetenten Praxisleitfaden – auch für den Berufseinstieg – als auch ein umfassendes Nachschlagewerk für Ihre tägliche Arbeit.Aus dem Inhalt:Umfang und Aufgabe des IT-Security-ManagementsOrganisation der IT-SecurityIT-ComplianceKundenaudits am Beispiel TISAXVerzahnung von Informationssicherheit und DatenschutzOrganisation von RichtlinienBetrieb der IT-SecurityIT Business Continuity ManagementIT-NotfallmanagementVerfügbarkeitsmanagementTechnische IT-SecurityIT-RisikomanagementSicherheitsmonitoringIT-Security-AuditManagement von Sicherheitsereignissen und IT-ForensikKennzahlenPraxis: Aufbau eines ISMSAwareness und SchulungInhalt & Leseprobe (PDF-Link)
PHP 8 Objects, Patterns, and Practice
Learn how to develop elegant and rock-solid systems using PHP, aided by three key elements: object fundamentals, design principles, and best practices. The 6th edition of this popular book has been fully updated for PHP 8, including attributes, constructor property promotion, new argument and return pseudo-types, and more. It also covers many features new since the last edition including typed properties, the null coalescing operator, and void return types. This book provides a solid grounding in PHP's support for objects, it builds on this foundation to instill core principles of software design and then covers the tools and practices needed to develop, test, and deploy robust code.PHP 8 Objects, Patterns, and Practice begins by covering PHP's object-oriented features. It introduces key topics including class declarations, inheritance, and reflection. The next section is devoted to design patterns. It explains the principles that make patterns powerful. You’ll cover many of the classic design patterns including enterprise and database patterns. The last segment of the book covers the tools and practices that can help turn great code into a successful project. The section shows how to manage multiple developers and releases with git, and how to manage builds and dependencies with Composer. It also explores strategies for automated testing and continuous integration.After reading and using this book, you will have mastered object-oriented enhancements, design patterns, and the essential development tools available for PHP 8.WHAT YOU WILL LEARN* Work with object fundamentals: write classes and methods, instantiate objects, and create powerful class hierarchies using inheritanceMaster advanced object-oriented features, including static methods and properties, managing error conditions with exceptions, and creating abstract classes and interfaces * Understand and use design principles to deploy objects and classes effectively in your projects* Discover a set of powerful patterns that you can implement in your own projects* Guarantee a successful project including unit testing; version control and build, installation, and package management; and continuous integrationWHO THIS BOOK IS FORAnyone with at least a basic knowledge of PHP who wants to use its object-oriented features in their projects. It is also for PHP coders who want to learn about the practices and tools (version control, testing, continuous integration, etc) that can make projects safe, elegant and stable.MATT ZANDSTRA has worked as a web programmer, consultant, and writer for over two decades. He is the author of SAMS Teach Yourself PHP in 24 Hours (three editions) and is a contributor to DHTML Unleashed. He has written articles for Linux Magazine, Zend, IBM DeveloperWorks, and php|architect Magazine, among others. Matt was a senior developer/tech lead at Yahoo and API tech lead at LoveCrafts. Matt works as a consultant advising companies on their architectures and system management, and also develops systems primarily with PHP, and Java. Matt also writes fiction.Part I. Objects.-1. PHP: Design and Management.-2. PHP and Objects.-3. Object Basics.-4. Advanced Features.-5. Object Tools.-6. Objects and Design.-Part II. Patterns.-7. What Are Design Patterns? Why Use Them?.-8. Some Pattern Principles.-9. Generating Objects.-10. Patterns for Flexible Object Programming.-11. Performing and Representing Tasks.-12. Enterprise Patterns.-13. Database Patterns.-Part III. Practice.-14. Good (and Bad) Practice.-15. PHP Standards.-16. PHP Using and Creating Components with Composer.-17. Version Control with Git.-18. Testing.-19. Automated Build with Phing.-20. Vagrant.-21. Continuous Integration.-22. Objects, Patterns, and Practice.-23. App A: Bibliography.-24. App B: A Simple Parser.
Robotic Process Automation using UiPath StudioX
Learn about Robotic Processing Automation (RPA) and how to build bots using UiPath. This book uses hands-on examples to explain the basics of UiPath and then walks you through real-world prototypes for testing your knowledge.Organizations around the world are implementing RPA in some capacity, and there is a shortage of RPA developers in the market. Analysts predict that the RPA market size will be worth $4 Billion by 2025. With UiPath as one of the three major players in the RPA market, professionals and students can use this book to get ahead of the curve.This book helps you kick-start your automation journey with a special focus on one of the most popular RPA tools: UiPath. Robotic Process Automation using UiPath explains in detail the various features and functionalities of the RPA platform including development, debugging, and error handling.WHAT YOU'LL LEARN* Create robots from scratch, using one of the market leaders in RPA* Develop automation apps and deploy them to all the computers in your department* Build, test and perform enterprise automation tasks with UiPath* Understand the key building blocks and components of UiPath * Apply UiPath programming techniques to deploy robot configurations* Review email Automation* Automate Excel and PDF interactionsWHO THIS BOOK IS FORRPA developers and business users alike, bringing the power and skill set of automation to anyone interested in citizen-led development, specifically UiPath StudioX. The simple exercises and no-code platform require no prior programming or RPA knowledge to follow along with this beginner's guide.ADEEL JAVED is an intelligent automation architect, an author, and a speaker. He helps organizations automate work using low-code, business process management (BPM), robotic process automation (RPA), analytics, integrations and ML. He loves exploring new technologies and writing about them. He published his first book, "Building Arduino Projects for the Internet of Things", with Apress back in 2015. He shares his thoughts on various technology trends on his personal blog (adeeljaved.com).ANUM SUNDRANI is a business systems analyst and technology enthusiast who specializes in Business Process Management and Robotic Process Automation. Anum is a Certified Appian Analyst, Tableau Author, Six Sigma Green Belt and Scrum Master, alongside her several trainings in the areas of RPA development and the automation delivery lifecycle. She has an inquisitive eye for simplifying complex business processes and has focused on implementing automation solutions for business users since 2017.NADIA MALIK is a Presales Engineer with a background in software development. She has started her journey as a Software Engineer at IBM developing Cloud storage applications and then joining the UiPath rocket-ship in June of 2018 helping customers design, implement, and provide training in robotics process automation. Today she continues to evangelize RPA and mentor young women in STEM.SIDNEY MADISON PRESCOTT is a senior technology leader, keynote speaker, and robotics evangelist specializing in the creation of Robotic Process Automation Centers of Excellence for Fortune 500 companies. Sidney currently heads up the Global Intelligent Automation initiative at music streaming powerhouse Spotify. In addition to her enterprise technology expertise, Sidney is an executive board member for three global non-profit organizations, where she contributes valuable automation insights to enhance overall program objectives. To round out her career accolades, Sidney was also named a global recipient of the 2020 Top 50 Technology Visionaries award.Part I: IntroductionChapter 1. Robotic Process Automation Overview* Overview* Benefits* Market trends* Major vendors* Real-life use cases* Attended/unattendedChapter 2. UiPath StudioX Overview* Download* Install* Interface OverviewPart II: Activities – Your Building BlocksGoal of this section is to list down each activity under these tiles in UiPath StudioX, provide a brief description of what that activity does, screenshots of different configurations, quick examples. Essentially make this as the ultimate reference material.Chapter 3. Common ActivitiesChapter 4. UI AutomationChapter 5. Outlook AutomationChapter 6. Word AutomationChapter 7. Excel AutomationChapter 8. CSV AutomationChapter 9. File AutomationPart III: Building PrototypesGoal of this section is to build couple of real-life prototypes that uses knowledge acquired in prior sections. We have already developed two sample target applications, one browser-based, the other windows-based.Chapter 10. Real-life prototype 1 (Inventory Management)* Outlook Automation* CSV Automation* UI Automation (Browser)* File AutomationChapter 11. Real-life prototype 2 (Order Management)* UI Automation (App)* Excel Automation* Word Automation* File AutomationChapter 12. Real-life prototype 3 (Excel Management)* Excel AutomationPart IV: Scaling UpGoal of this section/chapter is to help people think about next steps. Most organizations have difficulty scaling up the concepts of citizen development.Chapter 13. Scaling RPA – high-level ideas
Sicherheit und Prüfung von SAP-Systemen
Sie wollen sichergehen, dass Ihre SAP-Systeme alle Sicherheitsanforderungen erfüllen und ordnungsgemäß konfiguriert sind? Dann führt kein Weg an diesem Standardwerk vorbei. Der Autor zeigt Ihnen Schritt für Schritt, wie Sie bei der Prüfung vorgehen müssen, und vermittelt Ihnen das nötige Hintergrundwissen. Alle Prüfungsthemen werden systematisch und verständlich behandelt – aktuell zu SAP S/4HANA. Aus dem Inhalt: Umgang mit dem SAP-SystemWerkzeuge zur PrüfungAufbau von SAP-Systemen und -LandschaftenAllgemeine SystemsicherheitProtokollierungSichere Remote Function CallsOrdnungsmäßige VerbuchungsvorgängeBenutzerauswertungenSichere EigenentwicklungenBerechtigungen für SAP-Fiori-AnwendungenSicherheit von SAP HANA Einleitung ... 25 1. Umgang mit dem SAP-System und Werkzeuge zur Prüfung ... 31 1.1 ... Transaktionen und SAP-Fiori-Apps ... 31 1.2 ... Reports ... 35 1.3 ... Anzeigen von Tabellen ... 43 1.4 ... Das Benutzerinformationssystem ... 59 1.5 ... Listen als PDF-Datei speichern ... 62 1.6 ... Nutzung der Zugriffsstatistik für Prüfungen ... 63 1.7 ... Tabelleninhalte mit dem QuickViewer auswerten ... 71 1.8 ... SQL-Trace ... 80 1.9 ... Audit Information System ... 84 1.10 ... SAP Access Control ... 90 1.11 ... SAP Enterprise Threat Detection ... 103 1.12 ... Zugriff auf SAP HANA für Prüfer ... 115 2. Aufbau von SAP-Systemen und Systemlandschaften ... 125 2.1 ... SAP NetWeaver und SAP-Komponenten ... 125 2.2 ... Technischer Aufbau von SAP-Systemen ... 131 2.3 ... Systemlandschaften ... 139 2.4 ... Das Mandantenkonzept ... 145 2.5 ... Sicherheit im Mandanten 000 ... 163 3. Allgemeine Systemsicherheit ... 175 3.1 ... Grundlagen für die Prüfung der Systemsicherheit ... 175 3.2 ... Anmeldesicherheit ... 183 3.3 ... Das Notfallbenutzerkonzept ... 206 3.4 ... Sperren von Transaktionscodes ... 210 3.5 ... Logische Betriebssystemkommandos ... 214 3.6 ... Drucken und Speichern ... 223 3.7 ... Batch-Input ... 232 3.8 ... Funktionen von SAP Business Warehouse ... 241 4. Protokollierungskomponenten ... 249 4.1 ... Security-Audit-Log ... 249 4.2 ... Systemprotokollierung ... 271 4.3 ... Protokollierung von Tabellenänderungen ... 278 4.4 ... Protokollierung über Änderungsbelege ... 304 4.5 ... Versionsverwaltung ... 313 4.6 ... Lesezugriffsprotokollierung ... 320 4.7 ... Zugriffsstatistik ... 331 4.8 ... Weitere Protokollkomponenten ... 342 4.9 ... Systemüberwachung mit SAP Enterprise Threat Detection ... 351 5. Remote Function Calls ... 365 5.1 ... Funktionsbausteine ... 365 5.2 ... RFC-Verbindungen ... 376 5.3 ... Trusted Systems ... 383 5.4 ... Zugriff von externen Programmen ... 391 6. Der Verbuchungsvorgang ... 403 6.1 ... Das Prinzip der Verbuchung ... 403 6.2 ... Abgebrochene Buchungen ... 414 6.3 ... Die Belegnummernvergabe ... 419 7. Benutzerauswertungen ... 429 7.1 ... Organisatorische Regelungen ... 429 7.2 ... Die SAP-Standardbenutzer ... 433 7.3 ... Der Benutzerstammsatz ... 442 7.4 ... Referenzbenutzer ... 459 7.5 ... Benutzergruppen ... 465 7.6 ... Sammelbenutzer ... 471 7.7 ... Benutzervermessungsdaten ... 474 7.8 ... Initialkennwörter und Benutzersperren ... 480 7.9 ... Benutzerstammsätze sperren und löschen ... 492 7.10 ... Kennwortverschlüsselung ... 499 7.11 ... Angemeldete Benutzer ... 505 7.12 ... Die Änderungshistorie zu Benutzern ... 509 8. Customizing des SAP-Systems ... 515 8.1 ... Das ABAP Dictionary ... 515 8.2 ... Das Konzept der Tabellensteuerung ... 526 8.3 ... Zugriffe auf Tabellen ... 546 8.4 ... Berechtigungen für Tabellen und Views ... 558 8.5 ... Tabellenzugriffe auf Spalten und Feldwerte einschränken (GTB-Rollen) ... 574 9. Entwicklung in SAP-Systemen ... 587 9.1 ... Entwicklerrichtlinien ... 587 9.2 ... Entwickler- und Objektschlüssel ... 590 9.3 ... Systemänderbarkeit ... 598 9.4 ... Das Transportsystem ... 604 9.5 ... Eigenentwicklungen in ABAP ... 629 9.6 ... Transaktionen ... 667 9.7 ... Berechtigungen zur Anwendungsentwicklung ... 675 10. Berechtigungskonzept in ABAP-Systemen ... 687 10.1 ... Funktionsweise des Berechtigungskonzepts ... 688 10.2 ... Das Berechtigungskonzept in SAP S/4HANA ... 712 10.3 ... Konzepte zum SAP-Berechtigungswesen ... 731 10.4 ... Customizing zum Berechtigungskonzept ... 750 10.5 ... Prüfung von Zugriffsrechten ... 768 10.6 ... Trace von Benutzerberechtigungen ... 787 10.7 ... Berechtigungen für Prüfer ... 794 11. Praktische Prüfung von Berechtigungen ... 797 11.1 ... Zugriffsrechte im Bereich der Berechtigungsverwaltung ... 797 11.2 ... Gesetzeskritische Berechtigungen ... 805 11.3 ... Kritische Basisberechtigungen ... 808 11.4 ... Berechtigungen für das Hacking von SAP-Systemen ... 815 11.5 ... Customizing-Berechtigungen ... 824 11.6 ... Analyse der Qualität des Berechtigungskonzepts ... 838 11.7 ... Analyse von Berechtigungen in SAP Business Warehouse ... 850 12. SAP HANA ... 867 12.1 ... Einführung in SAP HANA ... 867 12.2 ... Systemsicherheit in SAP HANA ... 876 12.3 ... Anmeldesicherheit ... 891 12.4 ... Benutzerverwaltung in SAP HANA ... 898 12.5 ... SAP HANA XSA ... 912 12.6 ... Das Berechtigungskonzept von SAP HANA ... 924 12.7 ... Das Rollenkonzept von SAP HANA ... 939 12.8 ... Analyse des SAP-HANA-Berechtigungskonzepts ... 950 12.9 ... Auditing in SAP HANA ... 963 A. Leitfäden zur SAP-Systemsicherheit ... 979 B. Glossar ... 981 Der Autor ... 989 Index ... 991
SAP S/4HANA Finance
Schlanke Prozesse, aussagekräftige Finanzberichte! Erfahren Sie, welche Vorteile das Zusammenwachsen von FI und CO für Sie hat und welche Funktionen SAP S/4HANA für die Finanzabteilungen bereithält. Darüber hinaus werden Sie mit den wichtigsten Erfolgsfaktoren für die Migration bekannt gemacht. Egal, ob Sie im (IT-)Management, in der Beratung oder in der Finanzabteilung tätig sind: Sie lernen in diesem Buch die Möglichkeiten von SAPs neuer Finanzsoftware kennen. Verständlich und aktuell zu Release 2020. Aus dem Inhalt: SAP HANA und die In-Memory-TechnologieGeschäftspartnerkonzept (Business Partner)SAP FioriFinanzbuchhaltungKostenrechnung/ControllingUniversal Journal und Central FinanceMaterial LedgerErgebnisrechnung (CO-PA)Planung/SAP BPCReportingKonsolidierungAbschlussarbeiten/Financial Closing Einleitung ... 15 1. Einführung in SAP S/4HANA ... 21 1.1 ... In-Memory-Technologie ... 22 1.2 ... SAP Fiori ... 39 2. Versionen von SAP S/4HANA Finance ... 61 2.1 ... SAP Business Suite powered by SAP HANA ... 63 2.2 ... SAP Simple Finance Add-on ... 64 2.3 ... SAP S/4HANA Finance ... 65 2.4 ... SAP S/4HANA ... 66 3. Finanzbuchhaltung ... 73 3.1 ... Grundlegende Änderungen mit SAP S/4HANA Finance ... 74 3.2 ... Auswirkungen auf bestehendes Customizing im Finanzwesen ... 96 3.3 ... Auswirkungen auf bestehendes Customizing in der CO-FI-Echtzeitintegration ... 107 3.4 ... Verwendung zentraler Geschäftspartner ... 109 3.5 ... Anlagenbuchhaltung in SAP S/4HANA ... 112 3.6 ... Cash Management in SAP S/4HANA ... 127 3.7 ... Accruals Management in SAP S/4HANA ... 139 3.8 ... Advanced Compliance Reporting ... 143 4. Controlling ... 147 4.1 ... Sachkonten und Kostenarten ... 148 4.2 ... Kostenstellen, Aufträge und Projekte ... 160 4.3 ... Profit-Center, Funktionsbereiche und Segmente ... 172 4.4 ... Kostenträgerrechnung und Material-Ledger ... 183 4.5 ... Ergebnisrechnung (CO-PA) ... 197 5. Planung ... 221 5.1 ... Finanzplanung und Reporting ... 222 5.2 ... Finanzplanung mit SAP BPC Optimized for SAP S/4HANA ... 227 5.3 ... Finanzplanung mit SAP Analytics Cloud for Planning ... 238 5.4 ... Die neue Planungstabelle ACDOCP ... 248 5.5 ... Zusammenspiel zwischen neuen und alten Planungstransaktionen ... 249 6. Reporting ... 257 6.1 ... Mehrdimensionales Berichtswesen über das Universal Journal ... 258 6.2 ... SAP Fiori im Berichtswesen ... 273 6.3 ... Klassische Berichte in den SAP S/4HANA (Compatibility Views) ... 287 7. Konsolidierung (Group Reporting) ... 297 7.1 ... Einführung ... 297 7.2 ... Wesentliche Merkmale und Grundprinzipien ... 299 7.3 ... Prozess der Konsolidierung ... 308 8. Finanzabschluss ... 337 8.1 ... Finanzabschlussplanung ... 339 8.2 ... Abschlussvorbereitung ... 369 8.3 ... Abschlussausführung ... 373 8.4 ... Abschlussüberwachung und analyse ... 386 8.5 ... Financial Close Manager -- Smart Business Cockpit mit SAP Fiori ... 390 8.6 ... SAP S/4HANA Cloud for Advanced Financial Closing ... 392 9. Szenarien für die Datenmigration ... 409 9.1 ... Datenbereinigung ... 410 9.2 ... Vorbereitungen für eine SAP S/4HANA Conversion ... 416 9.3 ... Migration auf den zentralen Geschäftspartner ... 429 9.4 ... Schritte für die Migration der Rechnungswesendaten ... 437 9.5 ... Übersicht über die Upgrade-Pfade von SAP ERP auf SAP S/4HANA Finance ... 470 9.6 ... Neuimplementierung von SAP S/4HANA ... 477 9.7 ... Aufbau eines Central-Finance-Systems ... 478 9.8 ... Kompatibilitätsumfangsmatrix für die On-Premise-Version von SAP S/4HANA ... 481 10. Die Digitalisierung der Finanzfunktion ... 483 10.1 ... Aktuelle Herausforderungen der Finanzabteilungen ... 484 10.2 ... IT-Systeme im Wandel ... 491 10.3 ... Die Digitalisierung von Routinetätigkeiten im Finanzwesen ... 501 10.4 ... Die Digitalisierung strategischer Tätigkeiten im Finanzwesen ... 507 10.5 ... Neue Erwartungen an die Finanzfunktion ... 513 10.6 ... Vernetzung ... 517 10.7 ... Datensicherheit ... 520 Anhang ... 525 A. Methoden und Tools zur Umsetzung der digitalen Innovationen ... 526 B. Wichtige SAP-Hinweise ... 534 C. Weiterführende Informationsquellen ... 544 D. Änderungen am Datenmodell ... 548 E. Änderungen an Transaktionen ... 557 Das Autorenteam ... 561 Index ... 564
Verwaltung von Windows 10 mit Gruppenrichtlinien und Intune (5. Auflg.)
Ein praktischer Leitfaden in 5. Auflage, 03/2021.Die 5. Auflage des Gruppenrichtlinien-Bestsellers wurde für das aktuelle Feature Release von Windows überarbeitet und um Themen wie die Windows-10-Verwaltung über Microsoft Intune und Auditing ergänzt. Das Buch ist Grundlagen-, Praxis- und Nachschlagewerk in einem. Berücksichtigt werden sowohl die Gruppenrichtlinien-Einstellungen in Windows 10 als auch die Windows Server-Versionen 2019, 2016, 2012 und 2008 R2.Gruppenrichtlinien-Know-how für Einsteiger und Profis:Einsteiger führt das Buch von der Basisverwaltung von Gruppenrichtlinien bis hin zur Entwicklung eigener Vorlagen durch alle wichtigen Themen.Profis finden in diesem Buch Informationen zur Planung von Gruppenrichtlinien, zur Verwaltung (PowerShell und AGMP), zur Erweiterung (per Fremdhersteller-Tools) sowie zur Automatisierung mit PowerShell.Eine Fülle von Beispielen aus der administrativen Praxis zeigt Ihnen, wo Sie welche Einstellungen vornehmen können, wie sich diese auswirken und wie Sie in Ihrer täglichen Arbeit dadurch Zeit sparen können. Zahlreiche Tipps und Hinweise helfen Ihnen bei der Fehlersuche und Problembehebung und warnen Sie vor typischen Fallen.
Die ultimative QNAP NAS Bibel - Das Praxisbuch - mit vielen Insider Tipps und Tricks - komplett in Farbe
Die ultimative QNAP NAS BibelDieses Praxisbuch zu den hochwertigen NAS-Systemen des Anbieters QNAP bietet einen umfassenden Einblick in das Thema der Network-Attached-Storage-Geräte. Dieses Buch begleitet Sie von Anfang an durch das Abenteuer NAS: Falls Sie noch kein Gerät haben, bekommen Sie Entscheidungshilfen für den Kauf, und eine anschauliche Schrittanleitung führt Sie durch den Installationsvorgang. Wenn Sie Ihr NAS schon eingerichtet haben, finden Sie viele praktische Hinweise für die optimale und sichere Konfiguration, die Einrichtung eines eigenen Mailservers, die Verwendung als Fotospeicher, Musikarchiv und weitere spannende Funktionen.Aus dem Inhalt:- Kaufberatun - die richtige Hardware für Ihre Ansprüche- Installation des QNAP NAS- Benutzer- und Zugriffsrechte einrichten- Lokaler und mobiler Zugriff auf Ihre Daten- Musik und Filme mit dem NAS speichern und abspielen- Sicherheit und Systemwartung- Benutzer- und Zugriffsrechte einrichten- Zugriff aus dem lokalen Netzwerk- Mobiler Zugriff von unterwegs- Musik mit dem NAS speichern und abspielen- Filme und TV mit Video Station streamen- Backup-Zentrale für Ihre Geräte- NAS und Geräte per Cloud synchronisieren- Den eigenen Mailserver auf dem NAS einrichtenDer AutorWolfram Gieseke ist langjähriger Sachbuchautor zu IT-Themen. Seine Anfang der 1990er Jahre gestartete Autorentätigkeit umfasst mit über 100 Werken das gesamte Spektrum von Einstiegsliteratur zu den Themen Betriebssysteme und Anwendungen bis hin zu Fachliteratur in den Bereichen Netzwerksicherheit und Programmierung.
Beginning Power Apps
Transform the way your business works with easy-to-build apps. With this updated and expanded second edition, you can build business apps that work with your company's systems and databases, without having to enlist the expertise of costly, professionally trained software developers.In this new edition, business applications expert Tim Leung offers step-by-step guidance on how you can improve all areas of your business. He shows how you can replace manual or paper processes with modern apps that run on phone or tablet devices. For administrative and back-office operations, he covers how to build apps with workflow and dashboard capabilities. To facilitate collaboration with customers and clients, you’ll learn how to build secure web portals with data entry capabilities, including how to customize those portals with code.This hands-on new edition has 10 new chapters—including coverage on model-driven and portal apps, artificial intelligence, building components using the Power Apps Component Framework, using PowerShell for administration, and more—complete with context, explanatory screenshots, and non-technical terminology.WHAT YOU WILL LEARN* Create offline capable mobile apps and responsive web apps* Carry out logic, data access, and data entry through formulas* Embellish apps with charting, file handling, photo, barcode, and location features* Set up Common Data Service, SharePoint, and SQL data sources* Use AI to predict outcomes, recognize images, and analyze sentiment * Integrate apps with external web services and automate tasks with Power Automate * Build reusable code and canvas components, make customizations with JavaScript* Transfer apps and data, and secure, administer, and monitor Power Apps environmentsWHO THIS BOOK IS FORBeginners and non-developers, and assumes no prior knowledge of Power AppsTIM LEUNG is a software developer with more than 10 years of experience in designing and building large-scale commercial applications. He is a recognized expert in the field of rapid application development and his previous publication with Apress, Visual Studio LightSwitch, covers this topic in depth. Tim is a Microsoft certified developer, a chartered member of the British Computer Society, and holds a degree in information technology.PART I: POWER APP FUNDAMENTALSChapter 1: Introducing Power AppsChapter 2: Subscribing to Power AppsChapter 3: Creating Your First AppChapter 4: Sharing AppsChapter 5: Using FormulasPART II: WORKING WITH DATAChapter 6: Setting Up SharePoint, SQL, and moreChapter 7: Working with Tables and RowsChapter 8: Searching and Retrieving DataPART III: DEVELOPING CANVAS APPSChapter 9: Canvas App DesignChapter 10: Using Simple ControlsChapter 11: Using Table/Record Data ControlsPART IV: DEVELOPING MODEL DRIVEN AND PORTAL APPSChapter 12: Building a Dataverse DatabaseChapter 13:Developing Model-Driven AppsChapter 14: Building Portal AppsChapter 15: Retrieving Data from Portal Apps.PART V: ENHANCING APPSChapter 16: Working with Images and MediaChapter 17: Storing and Retrieving FilesChapter 18: Integrating Maps and Location ServicesChapter 19: Charting DataChapter 20: Adding Artificial Intelligence to AppsPART VI: REUSABILITYChapter 21: Building Reusable Canvas ComponentsChapter 22: Building Reusable Code ComponentsPART VII: OFFLINE AND INTEGRATIONChapter 23: Working OfflineChapter 24: Creating Custom Data ConnectorsPART VIII: ADMINISTRATIONChapter 25: Using Power AutomateChapter 26: Transferring Apps and DataChapter 27: Administering SecurityAppendix A - Sample App Data Structure
Microgrid Technologies
Microgrid technology is an emerging area, and it has numerous advantages over the conventional power grid. A microgrid is defined as Distributed Energy Resources (DER) and interconnected loads with clearly defined electrical boundaries that act as a single controllable entity concerning the grid. Microgrid technology enables the connection and disconnection of the system from the grid. That is, the microgrid can operate both in grid-connected and islanded modes of operation. Microgrid technologies are an important part of the evolving landscape of energy and power systems.Many aspects of microgrids are discussed in this volume, including, in the early chapters of the book, the various types of energy storage systems, power and energy management for microgrids, power electronics interface for AC & DC microgrids, battery management systems for microgrid applications, power system analysis for microgrids, and many others.The middle section of the book presents the power quality problems in microgrid systems and its mitigations, gives an overview of various power quality problems and its solutions, describes the PSO algorithm based UPQC controller for power quality enhancement, describes the power quality enhancement and grid support through a solar energy conversion system, presents the fuzzy logic-based power quality assessments, and covers various power quality indices.The final chapters in the book present the recent advancements in the microgrids, applications of Internet of Things (IoT) for microgrids, the application of artificial intelligent techniques, modeling of green energy smart meter for microgrids, communication networks for microgrids, and other aspects of microgrid technologies.Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in the area of microgrids, this is a must-have for any library.C. SHARMEELA, PhD, is an associate professor in the Department of EEE, CEG campus, Anna University, Chennai, India. She has 20 years of teaching experience at both the undergraduate and postgraduate levels and has done a number of research projects and consultancy work in renewable energy, power quality and design of power quality compensators for various industries. She is currently working on future books for the Wiley-Scrivener imprint.P. SIVARAMAN has an M.E. in power systems engineering from Anna University, Chennai and is an assistant engineering manager at a leading engineering firm in India He has more than six years of experience in the field of power system studies and related areas and is an expert in many power systems simulation software programs. He is also currently working on other projects to be published under the Wiley-Scrivener imprint.P. SANJEEVIKUMAR, PhD, is a faculty member with the Department of Energy Technology, Aalborg University, Esbjerg, Denmark. He is a fellow in multiple professional societies and associations and is an editor and contributor for multiple science and technical journals in this field. Like his co-editors, he is also currently working on other projects for Wiley-Scrivener.JENS BO HOLM-NIELSEN currently works at the Department of Energy Technology, Aalborg University and is Head of the Esbjerg Energy Section. Through his research, he helped establish the Center for Bioenergy and Green Engineering in 2009 and serves as the head of the research group. He has vast experience in the field of bio-refineries and biogas production and has served as the technical advisory for many industries in this field.Foreword xxiAcknowledgements xxiii1 A COMPREHENSIVE REVIEW ON ENERGY MANAGEMENT IN MICRO-GRID SYSTEM 1Sanjay Kumar, R. K. Saket, P. Sanjeevikumar and Jens Bo Holm-Nielsen1.1 Introduction 21.2 Generation and Storage System in MicroGrid 61.2.1 Distributed Generation of Electrical Power 61.2.2 Incorporation of Electric Car in Micro-Grid as a Device for Backup 71.2.3 Power and Heat Integration in Management System 81.2.4 Combination of Heat and Electrical Power System 91.3 System of Energy Management 101.3.1 Classification of MSE 101.3.1.1 MSE Based on Conventional Sources 101.3.1.2 MSE Based on SSE 101.3.1.3 MSE Based on DSM 111.3.1.4 MSE Based on Hybrid System 111.3.2 Steps of MSE During Problem Solving 111.3.2.1 Prediction of Uncertain Parameters 121.3.2.2 Uncertainty Modeling 121.3.2.3 Mathematical Formulation 121.3.2.4 Optimization 131.3.3 Micro-Grid in Islanded Mode 131.3.3.1 Objective Functions and Constraints of System 131.3.4 Micro-Grid Operation in Grid-Connected Mode 141.3.4.1 Objective Functions and Constraints of the Systems 141.4 Algorithms Used in Optimizing Energy Management System 161.5 Conclusion 19References 202 POWER AND ENERGY MANAGEMENT IN MICROGRID 25Jayesh J. Joglekar2.1 Introduction 252.2 Microgrid Structure 262.2.1 Selection of Source for DG 272.2.1.1 Phosphoric Acid Fuel Cell (PAFC) 272.2.1.2 Mathematical Modeling of PAFC Fuel Cell 272.3 Power Flow Management in Microgrid 312.4 Generalized Unified Power Flow Controller (GUPFC) 332.4.1 Mathematical Modeling of GUPFC 342.5 Active GUPFC 382.5.1 Active GUPFC Control System 392.5.1.1 Series Converter 402.5.1.2 Shunt Converter 422.5.2 Simulation of Active GUPFC With General Test System 432.5.3 Simulation of Active GUPFC With IEEE 9 Bus Test System 432.5.3.1 Test Case: 1—Without GUPFC and Without Fuel Cell 452.5.3.2 Test Case: 2—Without GUPFC and With Fuel Cell 472.5.3.3 Test Case: 3—With GUPFC and Without Fuel Cell 482.5.3.4 Test Case: 4—With GUPFC and With Fuel Cell 492.5.3.5 Test Case: 5—With Active GUPFC 492.5.4 Summary 522.6 Appendix General Test System 532.6.1 IEEE 9 Bus Test System 53References 553 REVIEW OF ENERGY STORAGE SYSTEM FOR MICROGRID 57G.V. Brahmendra Kumar and K. Palanisamy3.1 Introduction 583.2 Detailed View of ESS 603.2.1 Configuration of ESS 603.2.2 Structure of ESS With Other Devices 603.2.3 ESS Classifications 623.3 Types of ESS 623.3.1 Mechanical ESS 623.3.2 Flywheel ESS 633.3.3 CAES System 643.3.4 PHS System 653.3.5 CES Systems 663.3.6 Hydrogen Energy Storage (HES) 673.3.7 Battery-Based ESS 683.3.8 Electrical Energy Storage (EES) System 713.3.8.1 Capacitors 713.3.8.2 Supercapacitors (SCs) 723.3.9 SMES 733.3.10 Thermal Energy Storage Systems (TESS) 743.3.10.1 SHS 753.3.10.2 Latent 753.3.10.3 Absorption 753.3.10.4 Hybrid ESS 763.4 Comparison of Current ESS on Large Scale 773.5 Importance of Storage in Modern Power Systems 773.5.1 Generation Balance and Fluctuation in Demand 773.5.2 Intermediate Penetration of Renewable Energy 773.5.3 Use of the Grid 803.5.4 Operations on the Market 803.5.5 Flexibility in Scheduling 803.5.6 Peak Shaving Support 803.5.7 Improve the Quality of Power 813.5.8 Carbon Emission Control 813.5.9 Improvement of Service Efficiency 813.5.10 Emergency Assistance and Support for Black Start 813.6 ESS Issues and Challenges 813.6.1 Selection of Materials 823.6.2 ESS Size and Cost 823.6.3 Energy Management System 833.6.4 Impact on the Environment 833.6.5 Issues of Safety 833.7 Conclusion 84Acknowledgment 85References 854 SINGLE PHASE INVERTER FUZZY LOGIC PHASE LOCKED LOOP 91Maxwell Sibanyoni, S.P. Daniel Chowdhury and L.J. Ngoma4.1 Introduction 914.2 PLL Synchronization Techniques 924.2.1 T/4 Transport Delay PLL 954.2.2 Inverse Park Transform PLL 964.2.3 Enhanced PLL 974.2.4 Second Order Generalized Integrator Orthogonal Signal Generator Synchronous Reference Frame (SOGI-OSG SRF) PLL 984.2.5 Cascaded Generalized Integrator PLL (CGI-PLL) 994.2.6 Cascaded Delayed Signal Cancellation PLL 1004.3 Fuzzy Logic Control 1014.4 Fuzzy Logic PLL Model 1034.4.1 Fuzzification 1034.4.2 Inference Engine 1054.4.3 Defuzzification 1084.5 Simulation and Analysis of Results 1104.5.1 Test Signal Generator 1104.5.2 Proposed SOGI FLC PLL Performance Under Fault Conditions 1134.5.2.1 Test Case 1 1134.5.2.2 Test Case 2 1144.5.2.3 Test Case 3 1154.5.2.4 Test Case 4 1154.5.2.5 Test Case 5 1164.5.2.6 Test Case 6 1174.6 Conclusion 118Acknowledgment 118References 1195 POWER ELECTRONICS INTERFACES IN MICROGRID APPLICATIONS 121Indrajit Sarkar5.1 Introduction 1225.2 Microgrid Classification 1225.2.1 AC Microgrid 1225.2.2 DC Microgrids 1245.2.3 Hybrid Microgrid 1265.3 Role of Power Electronics in Microgrid Application 1275.4 Power Converters 1285.4.1 DC/DC Converters 1285.4.2 Non-Isolated DC/DC Converters 1295.4.2.1 Maximum Power Point Tracking (MPPT) 1305.4.3 Isolated DC/DC Converters 1355.4.4 AC to DC Converters 1375.4.5 DC to AC Converters 1395.5 Conclusion 143References 1436 RECONFIGURABLE BATTERY MANAGEMENT SYSTEM FOR MICROGRID APPLICATION 145Saravanan, S., Pandiyan, P., Chinnadurai, T., Ramji, Tiwari., Prabaharan, N., Senthil Kumar, R. and Lenin Pugalhanthi, P.6.1 Introduction 1466.2 Individual Cell Properties 1476.2.1 Modeling of Cell 1476.2.1.1 Second Order Model 1476.2.2 Simplified Non-Linear Model 1486.3 State of Charge 1496.4 State of Health 1506.5 Battery Life 1506.6 Rate Discharge Effect 1516.7 Recovery Effect 1526.8 Conventional Methods and its Issues 1526.8.1 Series Connected 1526.8.2 Parallel Connected 1546.9 Series-Parallel Connections 1546.10 Evolution of Battery Management System 1556.10.1 Necessity for Reconfigurable BMS 1566.10.2 Conventional R-BMS Methods 1566.10.2.1 First Design 1576.10.2.2 Series Topology 1586.10.2.3 Self X Topology 1586.10.2.4 Dependable Efficient Scalable Architecture Method 1596.10.2.5 Genetic Algorithm-Based Method 1606.10.2.6 Graph-Based Technique 1616.10.2.7 Power Tree-Based Technique 1626.11 Modeling of Reconfigurable-BMS 1636.12 Real Time Design Aspects 1646.12.1 Sensing Module Stage 1656.12.2 Control Module Stage 1656.12.2.1 Health Factor of Reconfiguration 1666.12.2.2 Reconfiguration Time Delay and Transient Load Supply 1666.12.3 Actuation Module 1676.12.3.1 Order of Switching 1676.12.3.2 Stress and Faults of Switches 1696.12.3.3 Determining Number of Cells in a Module 1706.13 Opportunities and Challenges 1716.13.1 Modeling and Simulation 1716.13.2 Hardware Design 1716.13.3 Granularity 1716.13.4 Hardware Overhead 1726.13.5 Intelligent Algorithms 1726.13.6 Distributed Reconfigurable Battery Systems 1726.14 Conclusion 173References 1737 LOAD FLOW ANALYSIS FOR MICRO GRID 177P. Sivaraman, Dr. C. Sharmeela and Dr. S. Elango7.1 Introduction 1777.1.1 Islanded Mode of Operation 1787.1.2 Grid Connected Mode of Operation 1787.2 Load Flow Analysis for Micro Grid 1797.3 Example 1797.3.1 Power Source 1807.4 Energy Storage System 1807.5 Connected Loads 1827.6 Reactive Power Compensation 1827.7 Modeling and Simulation 1827.7.1 Case 1 1827.7.2 Case 2 1847.7.3 Case 3 1877.7.4 Case 4 1897.7.5 Case 5 1917.8 Conclusion 193References 1958 AC MICROGRID PROTECTION COORDINATION 197Ali M. Eltamaly, Yehia Sayed Mohamed, Abou-Hashema M. El-Sayed and Amer Nasr A. Elghaffar8.1 Introduction 1978.2 Fault Analysis 2008.2.1 Symmetrical Fault Analysis 2018.2.2 Single Line to Ground Fault 2028.2.3 Line-to-Line Fault 2048.2.4 Double Line-to-Ground Fault 2068.3 Protection Coordination 2088.3.1 Overcurrent Protection 2098.3.2 Directional Overcurrent/Earth Fault Function 2118.3.3 Distance Protection Function 2148.3.4 Distance Acceleration Scheme 2178.3.5 Under/Over Voltage/Frequency Protection 2198.4 Conclusion 221Acknowledgment 224References 2249 A NUMERICAL APPROACH FOR ESTIMATING EMULATED INERTIA WITH DECENTRALIZED FREQUENCY CONTROL OF ENERGY STORAGE UNITS FOR HYBRID RENEWABLE ENERGY MICROGRID SYSTEM 227Shubham Tiwari, Jai Govind Singh and Weerakorn Ongsakul9.1 Introduction 2289.2 Proposed Methodology 2319.2.1 Response in Conventional Grids 2319.2.2 Strategy for Digital Inertia Emulation in Hybrid Renewable Energy Microgrids 2329.2.3 Proposed Mathematical Formulation for Estimation of Digital Inertia Constant for Static Renewable Energy Sources 2359.3 Results and Discussions 2389.3.1 Test System 2389.3.2 Simulation and Study of Case 1 2419.3.2.1 Investigation of Scenario A 2419.3.2.2 Investigation of Scenario B 2439.3.2.3 Discussion for Case 1 2459.3.3 Simulation and Study of Case 2 2469.3.3.1 Investigation of Scenario A 2469.3.3.2 Investigation of Scenario B 2489.3.3.3 Discussion for Case 2 2509.3.4 Simulation and Study for Case 3 2509.3.4.1 Discussion for Case 3 2519.4 Conclusion 252References 25310 POWER QUALITY ISSUES IN MICROGRID AND ITS SOLUTIONS 255R. Zahira, D. Lakshmi and C.N. Ravi10.1 Introduction 25610.1.1 Benefits of Microgrid 25710.1.2 Microgrid Architecture 25710.1.3 Main Components of Microgrid 25810.2 Classification of Microgrids 25810.2.1 Other Classifications 25910.2.2 Based on Function Demand 25910.2.3 By AC/DC Type 25910.3 DC Microgrid 26010.3.1 Purpose of the DC Microgrid System 26010.4 AC Microgrid 26110.5 AC/DC Microgrid 26210.6 Enhancement of Voltage Profile by the Inclusion of RES 26310.6.1 Sample Microgrid 26310.7 Power Quality in Microgrid 26710.8 Power Quality Disturbances 27010.9 International Standards for Power Quality 27010.10 Power Quality Disturbances in Microgrid 27110.10.1 Modeling of Microgrid 27110.11 Shunt Active Power Filter (SAPF) Design 27210.11.1 Reference Current Generation 27410.12 Control Techniques of SAPF 27610.13 SPWM Controller 27710.14 Sliding Mode Controller 27710.15 Fuzzy-PI Controller 27810.16 GWO-PI Controller 27910.17 Metaphysical Description of Optimization Problems With GWO 28110.18 Conclusion 284References 28511 POWER QUALITY IMPROVEMENT IN MICROGRID SYSTEM USING PSO-BASED UPQC CONTROLLER 287T. Eswara Rao, Krishna Mohan Tatikonda, S. Elango and J. Charan Kumar11.1 Introduction 28811.2 Microgrid System 28911.2.1 Wind Energy System 29011.2.1.1 Modeling of Wind Turbine System 29011.2.2 Perturb and Observe MPPT Algorithm 29111.2.3 MPPT Converter 29111.3 Unified Power Quality Conditioner 29311.3.1 UPQC Series Converter 29311.3.2 UPQC Shunt APF Controller 29511.4 Particle Swarm Optimization 29711.4.1 Velocity Function 29711.4.2 Analysis of PSO Technique 29811.5 Simulation and Results 29911.5.1 Case 1: With PI Controller 30011.5.2 Case 2: With PSO Technique 30111.6 Conclusion 304References 30512 POWER QUALITY ENHANCEMENT AND GRID SUPPORT USING SOLAR ENERGY CONVERSION SYSTEM 309CH. S. Balasubrahmanyam, Om Hari Gupta and Vijay K. Sood12.1 Introduction 30912.2 Renewable Energy and its Conversion Into Useful Form 31212.3 Power System Harmonics and Their Cause 31312.4 Power Factor (p.f.) and its Effects 31612.5 Solar Energy System With Power Quality Enhancement (SEPQ) 31712.6 Results and Discussions 32012.6.1 Mode-1 (SEPQ as STATCOM) 32012.6.2 Mode-2 (SEPQ as Shunt APF) 32012.6.3 Mode-3 (SEPQ as D-STATCOM) 32212.7 Conclusion 326References 32713 POWER QUALITY IMPROVEMENT OF A 3-PHASE-3-WIRE GRID-TIED PV-FUEL CELL SYSTEM BY 3-PHASE ACTIVE FILTER EMPLOYING SINUSOIDAL CURRENT CONTROL STRATEGY 329Rudranarayan Senapati, Sthita Prajna Mishra, Rajendra Narayan Senapati and Priyansha Sharma13.1 Introduction 33013.2 Active Power Filter (APF) 33313.2.1 Shunt Active Power Filter (ShPF) 33413.2.1.1 Configuration of ShPF 33413.2.2 Series Active Power Filter (SAF) 33513.2.2.1 Configuration of SAF 33613.3 Sinusoidal Current Control Strategy (SCCS) for APFs 33713.4 Sinusoidal Current Control Strategy for ShPF 34213.5 Sinusoidal Current Control Strategy for SAF 34913.6 Solid Oxide Fuel Cell (SOFC) 35313.6.1 Operation 35413.6.2 Anode 35513.6.3 Electrolyte 35513.6.4 Cathode 35613.6.5 Comparative Analysis of Various Fuel Cells 35613.7 Simulation Analysis 35613.7.1 Shunt Active Power Filter 35813.7.1.1 ShPF for a 3-φ 3-Wire (3P3W) System With Non-Linear Loading 35813.7.1.2 For a PV-Grid System (Constant Irradiance Condition) 36013.7.1.3 For a PV-SOFC Integrated System 36413.7.2 Series Active Power Filter 36613.7.2.1 SAF for a 3-φ 3-Wire (3P3W) System With Non-Linear Load Condition 36613.7.2.2 For a PV-Grid System (Constant Irradiance Condition) 36813.7.2.3 For a PV-SOFC Integrated System 37013.8 Conclusion 373References 37314 APPLICATION OF FUZZY LOGIC IN POWER QUALITY ASSESSMENT OF MODERN POWER SYSTEMS 377V. Vignesh Kumar and C.K. Babulal14.1 Introduction 37814.2 Power Quality Indices 37914.2.1 Total Harmonic Distortion 37914.2.2 Total Demand Distortion 38014.2.3 Power and Power Factor Indices 38014.2.4 Transmission Efficiency Power Factor (TEPF) 38114.2.5 Oscillation Power Factor (OSCPF) 38214.2.6 Displacement Power Factor (DPF) 38314.3 Fuzzy Logic Systems 38314.4 Development of Fuzzy Based Power Quality Evaluation Modules 38414.4.1 Stage I: Fuzzy Logic Based Total Demand Distortion 38514.4.1.1 Performance of FTDDF Under Sinusoidal Situations 38814.4.1.2 Performance of FTDDF Under Nonsinusoidal Situations 38914.4.2 Stage II—Fuzzy Representative Quality Power Factor (FRQPF) 39014.4.2.1 Performance of FRQPF Under Sinusoidal and Nonsinusoidal Situations 39314.4.3 Stage III—Fuzzy Power Quality Index (FPQI) Module 39514.4.3.1 Performance of FPQI Under Sinusoidal and Nonsinusoidal Situations 39714.5 Conclusion 401References 40115 APPLICATIONS OF INTERNET OF THINGS FOR MICROGRID 405Vikram Kulkarni, Sarat Kumar Sahoo and Rejo Mathew15.1 Introduction 40515.2 Internet of Things 40815.2.1 Architecture and Design 40915.2.2 Analysis of Data Science 41015.3 Smart Micro Grid: An IoT Perspective 41015.4 Literature Survey on the IoT for SMG 41115.4.1 Advanced Metering Infrastructure Based on IoT for SMG 41415.4.2 Sub-Systems of AMI 41415.4.3 Every Smart Meter Based on IoT has to Provide the Following Functionalities 41615.4.4 Communication 41715.4.5 Cloud Computing Applications for SMG 41815.5 Cyber Security Challenges for SMG 41915.6 Conclusion 421References 42316 APPLICATION OF ARTIFICIAL INTELLIGENT TECHNIQUES IN MICROGRID 429S. Anbarasi, S. Ramesh, S. Sivakumar and S. Manimaran16.1 Introduction 43016.2 Main Problems Faced in Microgrid 43116.3 Application of AI Techniques in Microgrid 43116.3.1 Power Quality Issues and Control 43216.3.1.1 Preamble of Power Quality Problem 43216.3.1.2 Issues with Control and Operation of MicroGrid Systems 43316.3.1.3 AI Techniques for Improving Power Quality Issues 43416.3.2 Energy Storage System With Economic Power Dispatch 43816.3.2.1 Energy Storage System in Microgrid 43816.3.2.2 Need for Intelligent Approaches in Energy Storage System 44016.3.2.3 Intelligent Methodologies for ESS Integrated in Microgrid 44116.3.3 Energy Management System 44416.3.3.1 Description of Energy Management System 44416.3.3.2 EMS and Distributed Energy Resources 44516.3.3.3 Intelligent Energy Management for a Microgrid 44616.4 Conclusion 448References 44917 MATHEMATICAL MODELING FOR GREEN ENERGY SMART METER FOR MICROGRIDS 451Moloko Joseph Sebake and Meera K. Joseph17.1 Introduction 45117.1.1 Smart Meter 45217.1.2 Green Energy 45317.1.3 Microgrid 45317.1.4 MPPT Solar Charge Controller 45417.2 Related Work 45417.3 Proposed Technical Architecture 45617.3.1 Green Energy Smart Meter Architecture 45617.3.2 Solar Panel 45617.3.3 MPPT Controller 45617.3.4 Battery 45717.3.5 Solid-State Switch 45717.3.6 Electrical Load 45717.3.7 Solar Voltage Sensor 45717.3.8 Batter Voltage Sensor 45817.3.9 Current Sensor 45817.3.10 Microcontroller 45817.3.11 Wi-Fi Module 45817.3.12 GSM/3G/LTE Module 45917.3.13 LCD Display 45917.4 Proposed Mathematical Model 45917.5 Results 462Conclusion 468References 46918 MICROGRID COMMUNICATION 471R. Sandhya and C. Sharmeela18.1 Introduction 47118.2 Reasons for Microgrids 47318.3 Microgrid Control 47418.4 Control Including Communication 47418.5 Control with No Communication 47518.6 Requirements 47818.7 Reliability 47818.8 Microgrid Communication 47918.9 Microgrid Communication Networks 48118.9.1 Wi-Fi 48118.9.2 WiMAX-Based Network 48218.9.3 Wired and Wireless-Based Integrated Network 48218.9.4 Smart Grids 48218.10 Key Aspects of Communication Networks in Smart Grids 48318.11 Customer Premises Network (CPN) 48318.12 Architectures and Technologies Utilized in Communication Networks Within the Transmission Grid 485References 48719 PLACEMENT OF ENERGY EXCHANGE CENTERS AND BIDDING STRATEGIES FOR SMARTGRID ENVIRONMENT 491Balaji, S. and Ayush, T.19.1 Introduction 49119.1.1 Overview 49119.1.2 Energy Exchange Centers 49219.1.3 Energy Markets 49319.2 Local Energy Centers and Optimal Placement 49519.2.1 Problem Formulation (Clustering of Local Energy Market) 49619.2.2 Clustering Algorithm 49619.2.3 Test Cases 49719.2.4 Results and Discussions 49819.2.5 Conclusions for Simulations Based on Modified K Means Clustering for Optimal Location of EEC 50119.3 Local Energy Markets and Bidding Strategies 50319.3.1 Prosumer Centric Retail Electricity Market 50419.3.2 System Modeling 50519.3.2.1 Prosumer Centric Framework 50519.3.2.2 Electricity Prosumers 50519.3.2.3 Modeling of Utility Companies 50719.3.2.4 Modeling of Distribution System Operator (DSO) 50719.3.2.5 Supply Function Equilibrium 50719.3.2.6 Constraints 50819.3.3 Solution Methodology 50919.3.3.1 Game Theory Approach 50919.3.3.2 Relaxation Algorithm 51119.3.3.3 Bi-Level Algorithm 51119.3.3.4 Simulation Results 51219.3.3.5 Nikaido-Isoda Formulation 51319.3.4 Case Study 51319.3.4.1 Plots 51419.3.4.2 Anti-Dumping 51419.3.4.3 Macro-Control 51419.3.4.4 Sensitivity Analysis 514Conclusion 517References 518Index 521
Android Software Internals Quick Reference
Use this handy field guide as a quick reference book and cheat sheet for all of the techniques you use or reference day to day. Covering up to Android 11, this Android Java programming reference guide focuses on non-UI elements with a security focus. You won’t see Android UI development, nor will you see low-level C or kernel techniques. Instead, this book focuses on easily digestible, useful, and interesting techniques in Java and the Android system.This reference guide was created out of the need for myself to jot down all the useful techniques I commonly reached for, and so I’m now sharing these techniques with you, whether you are an Android internals software engineer or security researcher.WHAT YOU WILL LEARN* Discover the differences between and how to access application names, package names, IDs, and unique identifiers in Android* Quickly reference common techniques such as storage, the activity lifecycle, and permissions* Debug using the Android shell* Work with Android's obfuscation and encryption capabilities* Extract and decompile Android applications* Carry out Android reflection and dex class loadingWHO THIS BOOK IS FORProgrammers, developers, and admins with at least prior Android and Java experience.JAMES STEVENSON has been working in the programming and computer security industry for over 4 years, and for most of that has been working as an Android software engineer. Prior to this, James graduated with a BSc in Computer Security in 2017.James has featured articles on both personal websites as well as industry platforms such as InfoSecurity Magazine - covering topics from security principles, android programming and security, and cyber terrorism.At the time of writing James is a full-time security researcher, part-time Ph.D. student, and occasional conference speaker. Outside of Android internals James’ research has also focused on offender profiling and cybercrime detection capabilities. For more information and contact details visit https://JamesStevenson.me.Introduction 1What is this book 1What this book is not 2About the author: 2Special Thanks: 3Contents 4Android Versions 9Fundamentals 13Android Sandbox 13Activities 13Services 14Broadcast Receivers 14Content providers 15Manifest 15Permissions 16Context 16The Activity Lifecycle 184 of 153Android Users 20Application Names, Android Package Name, and ID23Summary 23Java Package Name 24Package ID 25Application ID 26Application Name 30Storage 32Partitions 32External and Internal Storage 36General Files 43Databases 46Shared Preferences 54File Providers 57Assets Folder 60Resources 62Android Unique Identifiers 63Phone Number 63SIM Serial Number 64International Mobile Subscriber Identity (IMSI) 66IMEI and MEID: 67Device Serial Number 68MAC Address 69Android ID (Secure Settings Android ID - SSAID) 705 of 153The Android Shell 71Running commands programmatically 76Obfuscation and Encryption 78Logging 78ProGuard 83Public Key / Certificate Pinning 89AES Encryption 93Applications and Services 95Creating an application without a UI and Launcher95Long-Running Services 101Creating an Android Launcher 129Reflection and Dex Class Loading 136Reflection 136Dex Class Loading 146
Verwaltung von Windows 10 mit Gruppenrichtlinien und Intune
• Der kompakte Leitfaden für die praktische Arbeit mit Gruppenrichtlinien • Eigene Gruppenrichtlinienvorlagen erstellen • Für Profis: AGPM, PowerShell und DSC • Zahlreiche Beispiele aus der administrativen Praxis Die 5. Auflage des Gruppenrichtlinien-Bestsellers wurde für das aktuelle Feature Release von Windows überarbeitet und um Themen wie die Windows-10-Verwaltung über Microsoft Intune und Auditing ergänzt. Das Buch ist Grundlagen-, Praxis- und Nachschlagewerk in einem. Berücksichtigt werden sowohl die Gruppenrichtlinien-Einstellungen in Windows 10 als auch die Windows Server-Versionen 2019, 2016, 2012 und 2008 R2. Gruppenrichtlinien-Know-how für Einsteiger und Profis - Einsteiger führt das Buch von der Basisverwaltung von Gruppenrichtlinien bis hin zur Entwicklung eigener Vorlagen durch alle wichtigen Themen. - Profis finden in diesem Buch Informationen zur Planung von Gruppenrichtlinien, zur Verwaltung (PowerShell und AGMP), zur Erweiterung (per Fremdhersteller-Tools) sowie zur Automatisierung mit PowerShell. Eine Fülle von Beispielen aus der administrativen Praxis zeigt Ihnen, wo Sie welche Einstellungen vornehmen können, wie sich diese auswirken und wie Sie in Ihrer täglichen Arbeit dadurch Zeit sparen können. Zahlreiche Tipps und Hinweise helfen Ihnen bei der Fehlersuche und Problembehebung und warnen Sie vor typischen Fallen.
Machine Learning mit Python und Keras, TensorFlow 2 und Scikit-learn
* DATENANALYSE MIT AUSGEREIFTEN STATISTISCHEN MODELLEN DES MACHINE LEARNINGS* ANWENDUNG DER WICHTIGSTEN ALGORITHMEN UND PYTHON-BIBLIOTHEKEN WIE NUMPY, SCIPY, SCIKIT-LEARN, KERAS, TENSORFLOW 2, PANDAS UND MATPLOTLIB* BEST PRACTICES ZUR OPTIMIERUNG IHRER MACHINE-LEARNING-ALGORITHMENMit diesem Buch erhalten Sie eine umfassende Einführung in die Grundlagen und den effektiven Einsatz von Machine-Learning- und Deep-Learning-Algorithmen und wenden diese anhand zahlreicher Beispiele praktisch an. Dafür setzen Sie ein breites Spektrum leistungsfähiger Python-Bibliotheken ein, insbesondere Keras, TensorFlow 2 und Scikit-learn. Auch die für die praktische Anwendung unverzichtbaren mathematischen Konzepte werden verständlich und anhand zahlreicher Diagramme anschaulich erläutert.Die dritte Auflage dieses Buchs wurde für TensorFlow 2 komplett aktualisiert und berücksichtigt die jüngsten Entwicklungen und Technologien, die für Machine Learning, Neuronale Netze und Deep Learning wichtig sind. Dazu zählen insbesondere die neuen Features der Keras-API, das Synthetisieren neuer Daten mit Generative Adversarial Networks (GANs) sowie die Entscheidungsfindung per Reinforcement Learning.Ein sicherer Umgang mit Python wird vorausgesetzt.AUS DEM INHALT:* Trainieren von Lernalgorithmen und Implementierung in Python* Gängige Klassifikationsalgorithmen wie Support Vector Machines (SVM), Entscheidungsbäume und Random Forest* Natural Language Processing zur Klassifizierung von Filmbewertungen* Clusteranalyse zum Auffinden verborgener Muster und Strukturen in Ihren Daten* Deep-Learning-Verfahren für die Bilderkennung* Datenkomprimierung durch Dimensionsreduktion* Training Neuronaler Netze und GANs mit TensorFlow 2* Kombination verschiedener Modelle für das Ensemble Learning* Einbettung von Machine-Learning-Modellen in Webanwendungen* Stimmungsanalyse in Social Networks* Modellierung sequenzieller Daten durch rekurrente Neuronale Netze* Reinforcement Learning und Implementierung von Q-Learning-Algorithmen
IT Service Management (3. Auflg.)
Aus der Praxis für die Praxis. In 3. Auflage 03/2021.Ein erfolgreich eingeführtes und gelebtes IT Service Management ist für ein Unternehmen ein essenzieller Faktor. Eine schlechte Service-Verfügbarkeit, große Ausfälle wichtiger Informatik-Komponenten oder -Services sowie generell eine zu teure IT können den Unternehmenserfolg massiv beeinträchtigen. Meistens werden in solchen Fällen teure IT-Berater eingekauft, die dem Unternehmen helfen, das IT Service Management inklusive der IT-Kosten zu optimieren.Fritz Kleiner zeigt in dieser aktualisierten Neuauflage basierend auf seinem Erfahrungsschatz als Managing Senior Consultant und Principal, wie Sie IT Service Management ganzheitlich in einem Unternehmen einführen und betreiben können. Anhand vieler Praxisbeispiele erfahren Sie, wie Sie IT-Dienstleistungen standardisieren, IT Service Management in der Führungsebene verankern oder Business IT Services bilden. Besondere Schwerpunkte sind dabei u.a. das Etablieren der Prozesse des IT Service Managements wie Request Fulfillment, Availability Management oder Business Relationship Management.Mit diesem Handbuch verstehen Sie das IT Service Management-Konzept von Grund auf und werden es weitgehend erfolgreich selbstständig im Unternehmen etablieren können.Aus dem Inhalt:Fundierter Überblick über IT Service ManagementEinführung eines IT Service ManagementsEine Prozess-Management-Struktur entwickelnTools und Hilfsmittel einsetzenStandardisierung der IT-DienstleistungenBusiness IT Services und IT Services aufbauenRequest FulfillmentIT Service Management in der FührungsebeneChange ManagementIncident ManagementAvailability ManagementRisk ManagementBusiness Relationship ManagementTransition Planning und SupportDeployment ManagementContinual ImprovementInhalt & Leseprobe (PDF-Link)
Heimautomation mit Arduino, ESP8266 und Raspberry Pi
Das eigene Heim als Smart Home für Heimwerker, Bastler und Maker.Mit diesem umfassenden Praxis-Handbuch erfahren Sie, wie Sie Ihr Heim selbst automatisieren können.Anhand zahlreicher Beispiele lernen Sie Schritt für Schritt die Umsetzung verschiedener Projekte wie z.B. 433-MHz-Sender und -Empfänger, IoT-Gateway mit 433 MHz, drahtlose Infrarot-Fernsteuerung für den Fernseher, Wettermodul, drahtlose Klingel, Strom- und Briefkastenwächter und Aquarium-Timer.Der Autor zeigt Ihnen die praktischen Einsatzmöglichkeiten verschiedener Sensoren und Aktoren im Smart Home wie Licht-, Umwelt- und Barometersensor. Dabei werden zum einen selbst gebaute einfache Elektronik-Module mit Arduino, ESP8266 und Wemos-Modulen realisiert und über eine Schaltzentrale mit Raspberry Pi gesteuert. Zum anderen werden fertige Module wie Bewegungsmelder, Kontakte oder Rauchmelder über einfache Gateways ins System integriert. Dabei wird für die Zentrale Node-Red verwendet, um die Daten und Zustände zu verarbeiten und zu visualisieren.Jedes einzelne Projekt wird mit Stückliste und Steckbrett-Aufbau ausführlich dargestellt und beschrieben.Dieses Buch richtet sich an Bastler und Maker, die bereits etwas Erfahrung mit Arduino und Raspberry Pi gesammelt haben und nun praktische Anwendungen in ihrem Heim aufbauen möchten.Inhalte & Projekte:IoT-Hardware mit Arduino, ESP8266 und Raspberry PiArduino IDE und Node-RedDie Protokolle HTTP und MQTTArduino als SensormodulSchaltmodule mit Tasmota-FirmwareNode-Red als SchaltzentraleWettermodul mit Licht-, Umwelt- und Barometersensor433-MHz-Sender und -EmpfängerIoT-Gateway mit 433 MHzESP8266 als RF-GatewayNode-Red-Schaltzentrale mit Arduino-InterfaceDrahtlose Infrarot-Fernsteuerung für den FernseherDrahtlose KlingelAnalog-Wandler-ModulHomeautomation-PlattformenBriefkastenwächterStromwächterAquarium-TimerLeuchtstreifensteuerungInhalt & Leseprobe (PDF-Link)
Integrierte Werteflüsse mit SAP S/4HANA
Mit diesem Buch optimieren Sie den Wertefluss von der Beschaffung über die Produktion bis hin zum Vertrieb. Andrea Hölzlwimmer weiß genau, wo Probleme in der Integration zwischen MM, PP, SD und FI/CO auftreten, und hilft Ihnen, Ihre Prozesse perfekt aufeinander abzustimmen. Viele Beispiele und Tipps aus der Praxis unterstützen Sie dabei, Optimierungspotenziale zu nutzen und die Kosten zu senken. Profitieren Sie von der Erfahrung, die die Autorin in zahlreichen Optimierungsprojekten gesammelt hat. Praktische Beispiele und eine verständliche Sprache machen es Ihnen leicht, die Abläufe in Ihrem Unternehmen zu verbessern. Diese 4. Auflage ist aktuell zu SAP S/4HANA und behandelt alle wichtigen Neuerungen: Material Ledger, CO-PA u.v.m. Aus dem Inhalt: KreditorenstammRechnungsprüfungPreiskalkulationWarenausgangBesteuerungPlankalkulationPeriodenabschlussErgebnisrechnungMaterial LedgerWerteflüsse zusammenführen Einleitung ... 13 1. Konzept der integrierten Werteflüsse ... 21 1.1 ... Der Begriff »integrierter Wertefluss« ... 21 1.2 ... Definition von Unternehmensprozessen ... 26 1.3 ... Wechselwirkung von Prozessgestaltung und Controllingphilosophie ... 27 1.4 ... Zusammenfassung ... 29 2. Grundlagen der Integration im SAP-System ... 31 2.1 ... Aufbau von SAP-S/4HANA-Systemen ... 32 2.2 ... Entitätenmodell ... 35 2.3 ... Anforderungen der parallelen Rechnungslegung ... 46 2.4 ... Werteflussorientiertes Stammdatenkonzept ... 51 2.5 ... Geschäftspartner ... 67 2.6 ... Zusammenfassung ... 80 3. Beschaffungsprozess ... 83 3.1 ... Beschaffungsprozess und Belegfluss ... 84 3.2 ... Bestellung als Basis des Beschaffungsprozesses ... 86 3.3 ... Fortschreibung von Obligos ... 95 3.4 ... Integration von MM und FI/CO ... 101 3.5 ... Wareneingang ... 128 3.6 ... Rechnungsprüfung ... 130 3.7 ... WE/RE-Konto ... 144 3.8 ... Einkaufskontenabwicklung ... 152 3.9 ... Integration der Kreditorenbuchhaltung ... 153 3.10 ... Darstellung der Umsatzsteuer ... 168 3.11 ... Einbehalt von Quellensteuer ... 172 3.12 ... Zusammenfassung ... 176 4. Vertriebsprozess ... 179 4.1 ... Vertriebsprozess und Belegfluss ... 180 4.2 ... Kundenauftrag als Basis der weiteren Kontierung ... 182 4.3 ... Preiskalkulation als Basis der Wertermittlung ... 189 4.4 ... Warenausgang ... 199 4.5 ... Besteuerung von Verkäufen ... 203 4.6 ... Darstellung von Forderungen ... 216 4.7 ... Abbildung von Umsatzerlösen ... 232 4.8 ... Zusammenfassung ... 255 5. Produktionsprozess ... 257 5.1 ... Produktionsprozess und Belegfluss ... 259 5.2 ... Relevante Stammdaten ... 261 5.3 ... Customizing der Kalkulationsvariante ... 274 5.4 ... Produktkostenplanung ... 301 5.5 ... Kostenträgerrechnung ... 320 5.6 ... Projektfertigung ... 376 5.7 ... Unterstützung der Produktkostenrechnung durch das Material-Ledger ... 392 5.8 ... Zusammenfassung ... 402 6. Der Abschlussprozess im SAP-System ... 405 6.1 ... Vorbereitende Tätigkeiten ... 405 6.2 ... Tätigkeiten in der Anlagenbuchhaltung ... 411 6.3 ... Periodensteuerung ... 426 6.4 ... Fremdwährungsbewertung ... 431 6.5 ... Umgliederung von Forderungen und Verbindlichkeiten ... 437 6.6 ... Wertberichtigung auf Forderungen ... 440 6.7 ... Saldovortrag ... 440 6.8 ... Manuelle Buchungen ... 442 6.9 ... Umlagen und Verteilungen ... 443 6.10 ... Abrechnung ... 451 6.11 ... Abstimmung ... 453 6.12 ... Konsolidierungsvorbereitung ... 457 6.13 ... Zusammenfassung ... 469 7. Zusammenführen der Werteflüsse ... 471 7.1 ... Berichtswesen im Finanzwesen ... 472 7.2 ... Berichtswesen im Controlling ... 477 7.3 ... Berichtswesen in der Ergebnisrechnung ... 478 7.4 ... Aufbau der Deckungsbeitragsrechnung ... 493 7.5 ... Zusammenfassung ... 535 8. Beispiele aus der Praxis ... 537 8.1 ... Redesign der Ergebnisrechnung ... 537 8.2 ... SAP-ERP-Optimierung bei einem Energieversorger ... 548 8.3 ... Upgrade von SAP ERP auf SAP S/4HANA ... 557 8.4 ... Zusammenfassung ... 566 Anhang ... 567 A. Beispiel für einen Abschlussplan ... 569 B. Transaktionen und Menüpfade ... 577 C. Die Autorin ... 605 Index ... 607
Produktionsplanung mit SAP S/4HANA in der Prozessindustrie
Effektiv planen in der Prozessindustrie! Mit diesem Buch lernen Sie alle Funktionen von PP-PI in SAP S/4HANA detailliert kennen und erfahren, wie Sie Ihre Prozesse im System abbilden. Viele Beispiele und Tipps aus der Pharma-, Chemie- und Lebensmittelindustrie unterstützen Sie bei der Auftragsabwicklung, dem Reporting sowie der Koordination und Dokumentation Ihrer Prozesse. Auch der Einsatz von SAP Digital Manufacturing Cloud und die Integration mit anderen SAP-Komponenten und Drittanbietersystemen werden ausführlich erklärt. Aus dem Inhalt: StammdatenProzessauftragsabwicklungProzesskoordinationProduktionsprozesse mit PP-PIReportingProzessdatendokumentationIntegration in andere SAP-KomponentenSchnittstellen und Anbindung von FremdsystemenSAP Digital Manufacturing Cloud (DMC)SAP Extended Warehouse Management (EWM)Embedded Production Planning/Detailed Scheduling (ePP/DS) Einleitung ... 15 1. Einführung in die Produktionsplanung und -steuerung in der Prozessindustrie ... 19 1.1 ... Abgrenzung zwischen PP und PP-PI ... 20 1.2 ... Integration von PP-PI in andere SAP S/4HANA-Komponenten ... 29 1.3 ... Integration von PP-PI in andere SAP-Lösungen ... 31 1.4 ... Zusammenfassung ... 32 2. Stammdaten ... 33 2.1 ... Materialien ... 34 2.2 ... Ressourcen ... 39 2.3 ... Integrierte Stammdatenpflege über Fertigungsversionen ... 55 2.4 ... Struktur und Pflege von Planungsrezepten ... 62 2.5 ... Zusammenfassung ... 96 3. Produktionssteuerung über Prozessaufträge ... 97 3.1 ... Struktur eines Prozessauftrags ... 97 3.2 ... Lebenszyklus eines Prozessauftrags ... 101 3.3 ... Erforderliche Customizing-Objekte einrichten ... 104 3.4 ... Eröffnung eines Prozessauftrags ... 115 3.5 ... Prozessplanung und Auftragsfreigabe ... 131 3.6 ... Materialbereitstellung mit MM und WM ... 152 3.7 ... Materialbereitstellung mit EWM ... 166 3.8 ... Rückmeldung von Prozessaufträgen ... 171 3.9 ... Warenbewegungen zum Prozessauftrag ... 194 3.10 ... Auftragspapiere drucken ... 202 3.11 ... Prozessauftragsabschluss und Archivierung ... 212 3.12 ... Zusammenfassung ... 217 4. Erweiterte Funktionen für die Produktionsabwicklung ... 219 4.1 ... Berücksichtigung von Schichten ... 219 4.2 ... Verteilung von Materialdifferenzen aus der Produktion ... 230 4.3 ... Zusammenfassung ... 236 5. Prozesskoordination ... 237 5.1 ... Elemente und Funktionsweise der Prozesskoordination ... 238 5.2 ... Steuerrezepte ... 242 5.3 ... Prozessmeldungen ... 256 5.4 ... Prozessvorgaben ... 278 5.5 ... XSteps ... 289 5.6 ... SAP-Herstellanweisungen ... 320 5.7 ... Zusammenfassung ... 341 6. Produktionsprozesse mit PP-PI ... 343 6.1 ... Zweistufige prozessindustriespezifische Herstellung ... 343 6.2 ... Kuppel- und Nebenprodukte ... 350 6.3 ... Regulierte Produktion ... 355 6.4 ... Zusammenfassung ... 363 7. Reporting ... 365 7.1 ... Prozessauftragsinformationssystem ... 365 7.2 ... Massenbearbeitung ... 378 7.3 ... Weitere Berichte aus dem Produktionsumfeld ... 394 7.4 ... Zusammenfassung ... 402 8. Integration ... 403 8.1 ... Integration mit QM ... 404 8.2 ... Integration mit SAP APO und ePP/DS ... 429 8.3 ... Integration mit SAP MII ... 453 8.4 ... Anbindung von Fremdsystemen mit der PI-PCS-Schnittstelle ... 476 8.5 ... Integration mit der SAP Rezeptentwicklung ... 485 8.6 ... SAP Digital Manufacturing Cloud ... 499 8.7 ... Zusammenfassung ... 514 9. Prozessdatendokumentation ... 517 9.1 ... Auftragsprotokoll ... 517 9.2 ... Elektronisches Chargenprotokoll ... 521 9.3 ... Zusammenfassung ... 527 Anhang ... 529 A ... Transaktionsverzeichnis ... 529 B ... Das Autorenteam ... 541 Index ... 545
Unternehmensplanung mit SAP Analytics Cloud
Nutzen Sie integrierte Daten für eine fundierte Entscheidungsfindung! Mit diesem Buch lernen Sie, die Planungsfunktionen von SAP Analytics Cloud einzusetzen. Sie werden Schritt für Schritt durch die Datenmodellierung und den Umgang mit Storys geführt: Ein durchgängiges, mit Screenshots illustriertes Beispiel veranschaulicht die praktische Arbeit mit SAP Analytics Cloud. Dazu gehören die Berechtigungen genauso wie der von SAP zur Verfügung gestellte vordefinierte Planungs-Content. Sie lernen auch, wie Sie alle an der Planung Beteiligten mit Kollaborationstools ins Boot holen und Machine-Learning-Werkzeuge für eine vorausschauende Planung verwenden. Aus dem Inhalt: DatenmodellierungErstellung einer StoryBerechtigungs- und SperrkonzeptPlanungskalender und KollaborationAnalytics DesignerSAP Analytics Cloud Add-in für Microsoft 365Planungs-Content Einleitung ... 13 1. Planung mit SAP Analytics Cloud ... 19 1.1 ... SAP Analytics Cloud im Überblick ... 20 1.2 ... Integrierte Unternehmensplanung ... 31 1.3 ... Weitere Produkte im Umfeld der Planung ... 35 1.4 ... Beispiel: Umsatzplanung ... 40 1.5 ... Zusammenfassung ... 43 2. Datenmodellierung ... 45 2.1 ... Einführung ... 46 2.2 ... Die Modellierungsumgebung ... 49 2.3 ... Merkmalsbeziehungen ... 74 2.4 ... Datenintegration ... 77 2.5 ... Zusammenfassung ... 90 3. Planungsintegration in die Story ... 93 3.1 ... Die Story als Umgebung zur Plandatenerfassung ... 94 3.2 ... Die Versionsverwaltung ... 101 3.3 ... Das Planungs-Panel ... 108 3.4 ... Mit der Tabelle arbeiten ... 113 3.5 ... Zusammenfassung ... 151 4. Fortgeschrittene Planungsfunktionen ... 153 4.1 ... Werttreiberbäume ... 154 4.2 ... Datenaktionen ... 168 4.3 ... Kopierschritt ... 180 4.4 ... Modellübergreifender Kopierschritt ... 186 4.5 ... Allokation ... 194 4.6 ... Erweiterte Formeln ... 205 4.7 ... Eingebettete Datenaktionsschritte ... 241 4.8 ... Zusammenfassung ... 245 5. Predictive Planning ... 247 5.1 ... Einführung ... 248 5.2 ... Smart Predict ... 249 5.3 ... Zeitreihenanalyse ... 254 5.4 ... Klassifikation ... 265 5.5 ... Regressionsanalyse ... 273 5.6 ... Zusammenfassung ... 279 6. Steuerung von Planungsprozessen ... 281 6.1 ... Berechtigungskonzept ... 282 6.2 ... Datensperren ... 314 6.3 ... Planungskalender ... 321 6.4 ... Kollaboration ... 351 6.5 ... Auditierfunktionen ... 353 6.6 ... Zusammenfassung ... 359 7. Kundenindividuelle Planungsanwendungen ... 361 7.1 ... Analytics Designer ... 362 7.2 ... Benutzerdefinierte Widgets ... 397 7.3 ... SAP Analytics Cloud, Add-in für Microsoft Office ... 407 7.4 ... Zusammenfassung ... 420 8. Vordefinierter Planungs-Content ... 423 8.1 ... Die Business-Content-Bibliothek ... 424 8.2 ... Integrierte Finanzplanung für SAP S/4HANA ... 431 8.3 ... Zusammenfassung ... 457 Anhang ... 459 A ... Glossar ... 459 B ... Der Autor ... 465 Index ... 467
Getting Started with NSX-T: Logical Routing and Switching
This primer on NSX-T helps you understand the capabilities and features of NSX-T, how to configure and manage NSX-T, and integrate NSX-T with other software. The book is the first in a series that will teach you the basics of NSX-T, which is an update of VMware's original software-defined networking (SDN) architecture aimed at making networks agile and flexible.You will become familiar with VMware's software-defined data center (SDDC) ecosystem and how NSX-T fits in. You will understand NSX-T components such as NSX-T Manager, NSX-T Edge Transport Nodes, and NSX-T Host Transport Nodes. And you will learn how to install and configure network services such as East/West and North/South routing capabilities, layer two switching, VRF, EVPN, multicast, and layer two bridging.The book provides best practices on how to configure routing and switching features, and teaches you how to get the required visibility of not only your NSX-T platform but also your NSX-T-enabled network infrastructure.The book explains security, advanced network features, and multi-site capabilities and demonstrates how network and security services can be offered across multiple on-premise locations with a single pane of glass for networking and security policy management. The interface with public cloud services is discussed and the book explains NSX-T operation in an on-premise private cloud and positioning and integrating NSX-T on a public cloud (off premises).WHAT YOU WILL LEARN* Understand how NSX-T fits in the VMware SDDC ecosystem* Know what NSX-T is, its components, and the terminology used* Install NSX-T* Configure NSX-T network services* Manage the NSX-T networkWHO THIS BOOK IS FORVirtualization administrators, system integrators, and network administratorsIWAN HOOGENDOORN started his IT career in 1999 as a help desk agent. He began learning Microsoft products and obtained MCP, MCSA, MCDBA, and MCSE certifications.While working as a Microsoft Systems Engineer, he developed additional skills and knowledge in computer networking with Cisco products. He dreamed of working for Cisco but first needed to finish his bachelor's degree in ICT, which he completed in 2009.In 2010, Iwan began working for his dream company, Cisco. After finishing his master's degree in computer science at the University of Amsterdam and becoming a CCIE (#13084) in six different technology areas, he wanted to learn something new and network virtualization was the next logical step.Iwan decided to learn VMware NSX and got the opportunity to work for VMware in 2016 as a Senior NSX PSO Consultant. In his time at VMware, he gained more knowledge on private and public clouds and the related products that VMware developed to build the Software-Defined Data Center (SDDC).After working for four years as a Senior NSX PSO Consultant (primarily with VMware NSX-v and NSX-T), Iwan was promoted to Staff SDDC Consultant focusing on the full SDDC stack, including Hyperscaler offerings on public clouds such as AWS (VMC on AWS), Microsoft (Azure VMware Solution), and Google (Google Cloud VMware Engine).Iwan is certified on multiple VMware products, including NSX, and is actively working with VMware certification to develop network-related exams for VMware. He is also AWS and TOGAF certified.· CHAPTER 1o Title: NSX-T AND THE VMWARE SDDC ECOSYSTEMo Chapter Goal: Provide information on the SDDC and what the position is of NSX-T.o Number of Pages: 5o Subtopics:§ The VMware’s SDDC ecosystem§ Compute§ Storage§ Software Defined Networking· CHAPTER 2o Title: AN INTRODUCTION TO NSX-To Chapter Goal: Provide information on the product, the problem that can be solved and use-cases that can be satisfied.o Number of Pages: 10o Subtopics:§ NSX-T Components§ NSX-T Use Cases· CHAPTER 3o Title: THE NSX-T INSTALLATION ON A VSPHERE ENVIRONMENTo Chapter Goal: Explain the components of NSX-T and how these are deployed including the prerequisites.o Number of Pages: 20o Subtopics:§ NSX-T Installation Planning & Prerequisites§ NSX-T Manager Installation§ Edge Transport Installation (VM)§ Edge Transport Installation (BM)§ Host Transport Node Installation (ESXi)· CHAPTER 4o Title: TIER-0 GATEWAYSo Chapter Goal: Configure North/South Routing using the T0 Gateway with different kind of features.o Number of Pages: 20o Subtopics:§ Deploy a T0 Gateway§ Configure Routing§ Configure Multicast§ IPv6 Routing§ T0 High Availability§ VRF Deployment§ EVPN Deployment· CHAPTER 5o Title: TIER-1 GATEWAYSo Chapter Goal: Create and Configure T1 Gateways.o Number of Pages: 5o Subtopics:§ Deploy a T0 Gateway§ Configure Routing· CHAPTER 6o Title: SEGMENTSo Chapter Goal: Create and Configure L2 Segments with various service capabilities.o Number of Pages: 10o Subtopics:§ Attach segments§ DHCP & DHCP Static Binds§ L2 Bridging§ Add a Metadata Proxy Server· CHAPTER 7o Title: HOST SWITCHESo Chapter Goal: Explanation on the interrogability with the vSphere Distributed Switch and the defense between the N-VDS.o Number of Pages: 5o Subtopics:§ NSX-T with the vSphere Distributed Switch§ NSX-T N-VDS§ Enhanced Networking StackCHAPTER 8o Title: VIRTUAL PRIVATE NETWORK (VPN)o Chapter Goal: Know the differ types of VPN and how to configure and monitor them.o Number of Pages: 10o Subtopics:§ IPSEC (L3 VPN)§ L2 VPN§ Configuration of VPN· L3· L4§ Monitoring of VPN sessions· CHAPTER 9o Title: NETWORK ADDRESS TRANSLATION (NAT)o Chapter Goal: Know the difference between SNAT and DNAT and explanation on how to configure NAT.o Number of Pages: 5o Subtopics:§ SNAT§ DNAT§ Configure NAT Services· CHAPTER 10o Title: LOAD BALANCING (LB)o Chapter Goal: Discuss Load Balancing capabilities and configuration.o Number of Pages: 10o Subtopics:§ Load Balancing Concepts§ Distributed Load Balancer§ Setting up the Load Balancer Components· CHAPTER 11o Title: IP ADDRESS MANAGEMENT (IPAM)o Chapter Goal: DNS and DHCP IP address Management using the internal NSX-T Tools.o Number of Pages: 5o Subtopics:§ DNS Zone§ DNS Forwarding Zone§ DHCP Profile§ IP Address Pool§ IP Address Block· CHAPTER 12o Title: NETWORK SETTINGSo Chapter Goal: Getting to know the Network setting that can be configured to finetune your network services.o Number of Pages: 10o Subtopics:§ Multicast§ VNI Pools§ Gateway Settings§ Gateway QoS Profile§ BFD Profile§ IP Discovery Profiles§ MAC Discovery Profiles· CHAPTER 13o Title: SECURITYo Chapter Goal: The theory about the Security Services offered by NSX-T followed by the deployment’s details and steps with proper verification.o Number of Pages: 35o Subtopics:§ Identity based Firewall§ Layer-7 Context Profiles§ Gateway Firewalls§ Distributed Firewall§ Distributed IDS§ East/West Third-party service insertion§ North/South Third-party service insertion§ Security Profiles§ Time-Based Firewall Policy§ Network Introspection Settings§ End-Point Protection§ Bare Metal Server Security· CHAPTER 14o Title: MULTI-SITEo Chapter Goal: Design Principles regarding Multi Site routingo Number of Pages: 30o Subtopics:§ Multi-Site Capabilities§ NSX-T Federation overview§ Networking with Federation§ Security with Federation§ Backup & Restore with Federation· CHAPTER 15o Title: SYSTEM OPERATIONSo Chapter Goal: Monitoring of the NSX-T Fabric using different VMware related tools.o Number of Pages: 15o Subtopics:§ Monitoring / Events and Alarms§ Logging§ vRealize Log insight integration§ vRealize Operations integration§ Other Operation Tools Integration· CHAPTER 16o Title: NETWORK OPERATIONSo Chapter Goal: Tools to verify the Routing and Routing performance.o Number of Pages: 10o Subtopics:§ Network Monitoring§ Logging§ vRealize Network insight integration§ IPFIX§ Network Performance Testing using IPERF Tools· CHAPTER 17o Title: AUTHENTICATION AND AUTHORIZATIONo Chapter Goal: Information on how to integrate NSX-T with an external LDAP server and create user (groups) with different roles and rights (RBAC).o Number of Pages: 5o Subtopics:§ vIDM Integration & LDAP Integration§ LDAP only integration§ RBAC· CHAPTER 18o Title: PUBLIC CLOUD INTEGRATIONo Chapter Goal: NSX-T is also used in all major Public Clouds. This chapter gives you an overview on what is deployed there and how NSX-T can be consumed in these Public Clouds.o Number of Pages: 10o Subtopics:§ Forwarding Policies§ VMC on AWS§ Azure VMware Solution (AVS)§ Google Cloud VMware Engine· CHAPTER 19o Title: AUTOMATIONo Chapter Goal: Get familiar on the out-of-the-box automation capabilities and vRO extensibility.o Number of Pages: 20o Subtopics:§ vCloud Director· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ vRealize Automation / vRealize Orchestration· Allowing Tenants to Create / Use NSX-T Related automated network and security Services§ NSX-T API Capabilities
Heimautomation mit IP-Symcon
Der Begleiter für Ihr smartes Zuhause - integrieren, steuern, automatisieren. Mit IP-Symcon können Sie sich ein smartes Zuhause schaffen, das Ihnen das Leben deutlich erleichtert. Dieses Handbuch zeigt Ihnen, wie Sie mit IP-Symcon und Ihrer Hardware ein durchdachtes System zur Heimautomation aufbauen. Sie lernen, wie Sie IP-Symcon konfigurieren sowie Automatisierungsregeln und Visualisierungen einrichten. Planungshilfen und ein ausführlicher Überblick zur Hardware helfen Ihnen, die richtigen Entscheidungen für Ihr Projekt »Smart Home« zu treffen. Eine Einführung in die Grundlagen der Haussteuerung, Anleitungen zu Skripten sowie Sicherheitstipps zu Backup und Systemausfall machen das Buch zum idealen Ratgeber für die Heimautomation mit IP-Symcon. Aus dem Inhalt: Was heißt Smart? Heimautomatisierung im ÜberblickPlanung der Hard- und SoftwareDie Hardware: Vom Netzwerk bis zu den SchaltaktorenWas Sie mit IP-Symcon alles umsetzen könnenIP-Symcon einrichten und konfigurierenInstanzen und ObjekteSysteme einbindenAktionen automatisierenSprachsteuerung und VisualisierungKlimasteuerung und PhotovoltaikSicherheit: Vom Backup bis zur Ausfallsicherung Leseprobe (PDF-Link)
Konzernabschluss mit SAP S/4HANA for Group Reporting
Dieses Buch bietet Ihnen einen umfassenden Einblick in die Funktionen, Einstellungen und Einsatzmöglichkeiten der neuen Konsolidierungslösung von SAP. Ein durchgehendes Praxisbeispiel zeigt Ihnen Schritt für Schritt, wie Sie Stammdaten pflegen, Einzelabschlüsse übernehmen und die Konsolidierung durchführen. Inkl. Vergleich der On-Premise- und der Cloud-Edition. Aus dem Inhalt: Grundlagen und AlleinstellungsmerkmaleIntegration in SAP S/4HANAArchitektur und Schnittstellen DatenmodellStammdatenÜbernahme von EinzelabschlüssenDurchführung der KonsolidierungSelf-Services in der CloudExterne BerichterstattungMigration Danksagung ... 15 Einleitung ... 17 1. Einführung in SAP S/4HANA for Group Reporting ... 21 1.1 ... Konsolidierungslogik ... 22 1.2 ... Etablierte SAP-Lösungen für den Konzernabschluss ... 24 1.3 ... Bereitstellung und Benutzeroberfläche ... 41 1.4 ... Mehrwert und Vorteile ... 53 1.5 ... Neue Möglichkeiten durch SAP S/4HANA for Group Reporting ... 60 2. Architektur, Schnittstellen und Datenmodell ... 67 2.1 ... Architektur von SAP S/4HANA for Group Reporting ... 68 2.2 ... Schnittstellen zu vor- und nachgelagerten Anwendungen ... 73 2.3 ... Optionale Komponenten ... 76 2.4 ... Bedienkonzept von SAP S/4HANA for Group Reporting ... 86 2.5 ... Funktionale Grundlagen ... 87 2.6 ... Konfiguration der Konsolidierungslogik ... 98 2.7 ... Berichtsdimensionen ... 102 2.8 ... Berichtspositionen ... 109 3. Einführung in die Fallstudie und Aktivierung des Group Reportings ... 111 3.1 ... Einführung in die Fallstudie ... 111 3.2 ... SAP S/4HANA for Group Reporting aktivieren ... 114 3.3 ... Globale Parameter ... 119 3.4 ... Globale Systemeinstellungen ... 124 3.5 ... Konsolidierungs-Ledger ... 127 3.6 ... Sicht ... 130 3.7 ... Versionen ... 132 3.8 ... Positionsplan ... 138 3.9 ... Felder für Konsolidierungsdaten ... 140 4. Stammdaten der Konzernberichterstattung ... 147 4.1 ... Fallstudie: Unternehmensstrukturen und Konzernkontenplan ... 149 4.2 ... Implementierung der Unternehmensstrukturen ... 154 4.3 ... Implementierung des Konzernkontenplans ... 180 5. Übernahme und Prozessierung der Einzelabschlüsse ... 225 5.1 ... Fallstudie: Meldung und Verarbeitung der Einzelgesellschaften ... 226 5.2 ... Aufbau des Datenmonitors ... 237 5.3 ... Beleghafte Buchungen ... 244 5.4 ... Saldovortrag ... 249 5.5 ... Datenerfassung zur Übernahme der Einzelabschlüsse ... 254 5.6 ... Ermittlung des Jahresüberschusses ... 271 5.7 ... Validierungen ... 276 5.8 ... Währungsumrechnung ... 296 5.9 ... Intercompany-Matching und -Abstimmung ... 317 6. Erstellung von Konzernabschlüssen ... 347 6.1 ... Fallstudie: Automatisierung der Konsolidierung ... 347 6.2 ... Konzernaufrechnungen ... 351 6.3 ... Vorbereitung für Konsolidierungskreisänderungen ... 373 6.4 ... Manuelle Konzernbuchungsbelege ... 385 6.5 ... Kapitalkonsolidierung ... 390 6.6 ... Aufbau des Konsolidierungsmonitors ... 438 7. Group Reporting in SAP S/4HANA Cloud ... 443 7.1 ... SAP S/4HANA und Group Reporting aus der Cloud ... 445 7.2 ... Wesentliche Unterschiede zur On-Premise-Edition von SAP S/4HANA ... 448 7.3 ... Konfiguration des Group Reportings in SAP S/4HANA Cloud ... 463 7.4 ... Zusätzliche Funktionalitäten des Group Reportings in SAP S/4HANA Cloud ... 475 8. Berichtswesen in SAP S/4HANA for Group Reporting ... 497 8.1 ... Anforderungen an die Konzernberichterstattung ... 498 8.2 ... Berichterstattung via Webbrowser und Microsoft Office als Embedded Analytics ... 499 8.3 ... Embedded Analytics ... 502 8.4 ... Bedienung des analytischen Berichtswesens ... 505 8.5 ... Regelbasierte Berichte ... 512 8.6 ... Reporting-Logik, Reporting-Sichten und Matrixkonsolidierung ... 523 8.7 ... Erstellung von Berichten ... 531 8.8 ... SAP Analytics Cloud und Group Reporting ... 541 8.9 ... SAP Analysis for Microsoft Office und Group Reporting ... 550 9. Migration ... 557 9.1 ... Altdatenübernahme ... 557 9.2 ... Statistik der vorgangsbasierten Kapitalkonsolidierung ... 559 9.3 ... Altdatenübernahme für das Intercompany-Matching ... 560 10. Zusammenfassung und Ausblick ... 561 10.1 ... Zusammenfassung ... 561 10.2 ... Ausblick ... 562 Das Autorenteam ... 565 Index ... 567