Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Security

Produkte filtern

Produktbild für VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide

VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide

Includes online interactive learning environment with: * 2 custom practice exams * More than 60 electronic flashcards * Searchable key term glossary Everything You Need to Prepare for Exam 2V0-21.19, Updated for vSphere 6.7 The VCP6-DCV VMware Certified Professional Data Center Virtualization on vSphere 6.7 Study Guide is an indispensable resource for anyone preparing to take exam 2V0-21.19. Sybex's proven learning approach and valuable tools ensure you'll feel thoroughly confident when the day of the exam arrives. Readers can also leverage additional resources and training materials provided through the Sybex online learning environment. Most importantly, this guide teaches you practical skills that you'll apply as a VMware professional. It doesn't merely prepare you for exam 2V0-21.19. It prepares you for your career. Coverage of 100% of all exam objectives in this Study Guide means you'll be ready for: * Configuring and Administering vSphere Security, Networking, and Storage * Upgrading a vSphere Deployment * Administering and Managing vSphere Resources * Backing up and Recovering a vSphere Deployment * Troubleshooting a vSphere Deployment * Deploying and Customizing ESXi Hosts * Configuring and Administering vSphere and vCenter Availability Solutions * Administering and Managing vSphere Virtual Machines ABOUT THE VCP-DCV PROGRAM The VMware Certified Professional-Datacenter Virtualization 2020 (VCP-DCV 2020) program prepares VCP candidates to configure, manage, and troubleshoot a VSphere 6.7 infrastructure. Because candidates must complete VMware's authorized training course, as well as the exam, it's important to prepare with the best tools and resources available. Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, visit www.wiley.com/go/sybextestprep, register to receive your unique PIN, and instantly gain access to: Interactive test bank with 2 practice exams. Practice exams help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam. More than 300 online questions total. More than 60 electronic flashcards to reinforce learning and last-minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared Master vSphere 6 virtualization with hands-on practice and bonus preview exams VCP6-DCV: VMware Certified Professional-Data Center Virtualization on vSphere 6 Study Guide is your ultimate guide to preparing for exam 2VO-621. This Study Guide provides 100% coverage of all exam objectives and offers a unique set of study tools including assessment tests, objective map, real-world scenarios, hands-on exercises, and much more so you can be confident come exam day. You will also receive access to the superior Sybex interactive online learning environment that provides additional study tools including electronic flashcards and bonus practice exams. More than just a study guide, this book bridges the gap between exam prep and real-world on the job skills by focusing on the key information VMware professionals need to do the job. You'll master the vCenter Server and ESXi from planning and installation through upgrade and security, and develop an in-depth understanding of vSphere networking and storage, vApp deployment, service level establishment, troubleshooting, monitoring implementation, and so much more. * Study 100% of exam 2V0-621 objectives * Practice your skills with hands-on exercises * Gain professional insight from real-world scenarios * Test your understanding with review questions, practice tests, and more Virtualization is the number-one IT priority for organizations across public and private sectors, and VMware is the dominant force in the virtualization space. The VCP6-DCV certification gives you a highly marketable credential in terms of employment, but first you must pass this challenging exam. VCP6-DCV gives you the power of Sybex exam prep and the skills you need to excel at the job. ABOUT THE AUTHORS Jon Hall is a Certification Development, Technical Training, and Education Services Management Professional with over a decade of experience working for VMware Education Services. He assisted in the development of numerous VMware certifications, and currently holds 13 VMware certifications, along with certifications from HP, Cisco, and others. Joshua Andrews is a VMware expert, blogger, and certification enthusiast. He currently holds numerous VMware certifications, including VCP6-DCV, VCAP6-DCV, VCIX-DCV, and VCIX-NV. He has also received the VMware vExpert designation every year since 2012. Introduction xxi Assessment Test xxxi Chapter 1 What’s New in vSphere 6.7 1 Accessing vSphere 2 VMware vSphere Client 2 Application Programming Interface 8 Topology and UI Updates for VCSA 8 External Platform Services Controller 8 Update Manager 10 Storage Updates 18 Persistent Memory 19 Remote Direct Memory Access 19 vSAN 20 Security Updates 22 Virtual Machines 24 Content Library 24 Per-VM EVC 40 Summary 41 Exam Essentials 42 Review Questions 43 Chapter 2 Configuring and Administering Security in a vSphere Datacenter 47 Configuring and Administering Role-Based Access Controls 49 What Is a Privilege? 49 What Is a Task? 49 What Is a Role? 50 Assigning Permissions 54 Viewing and Exporting Group and User Permissions 70 Securing ESXi Hosts and the vCenter Server 72 Hardening ESXi Hosts 72 Hardening vCenter Server 87 Configuring and Enabling SSO and Identity Sources 88 vCenter Single Sign-On 89 Platform Services Controller 91 Configuring vCenter Single Sign-On 93 Securing Virtual Machines 96 Secure Boot 96 Virtual Machine Encryption 96 Virtual Machine Hardening 106 vSphere Network Security 117 Summary 118 Exam Essentials 118 Review Questions 119 Chapter 3 Networking in vSphere 123 Understanding vSphere Networking 124 Standard Switches 125 Virtual Distributed Switches 127 Using dvPort Groups 138 Working with Virtual Adapters 144 Custom TCP/IP Stacks 147 Long-Distance vMotion 151 Migrating Virtual Machines to or from a vDS 151 Performance and Reliability 151 Link Aggregation 152 Load Balancing and Failover Policies 153 Traffic Shaping 154 TCP Segmentation Offload 155 Jumbo Frames 155 Network Isolation 158 Automatic Rollback 159 Monitoring and Mirroring 163 Using NetFlow 164 Understanding Network I/O Control 165 Configuring NIOC Reservations, Shares, and Limits 166 Summary 170 Exam Essentials 171 Review Questions 172 Chapter 4 Storage in vSphere 177 Managing vSphere Integration with Physical Storage 178 Adding an NFS Datastore 179 Using Block Storage 186 Configuring the Software iSCSI Initiator 187 Binding VMkernels to the Software iSCSI Initiator 189 Scanning for Changes 192 Storage Filters 193 Thin Provisioning 194 Storage Multipathing and Failover 196 Configuring and Upgrading VMFS and NFS 203 Configuring VMFS Datastores 207 Raw Device Mapping and Bus Sharing 214 Configuring Software-Defined Storage 217 Virtual Storage Area Network 217 Virtual Volumes 225 Storage Policy–Based Management 229 Enabling and Configuring Storage I/O Control 230 Summary 233 Exam Essentials 234 Review Questions 235 Chapter 5 Upgrading a vSphere Deployment 239 Upgrading from vSphere 5.5 240 Upgrading a vCenter Server on Windows 244 Verify Basic Compatibility and Download the Installer 245 Prepare the Database for Upgrade 245 Prepare for Upgrading the Content Library 247 Verify Network Prerequisites, Load Balancer, and ESXI Hosts 247 Starting the vCenter on Windows Upgrade 247 Migrating to the vCenter Server Appliance 252 Upgrading Using the Command Line 252 Upgrading Using the Graphical Interface 253 Upgrading ESXi Hosts and Virtual Machines 264 Using the Update Manager Download Service 264 Using vSphere Update Manager 265 Summary 284 Exam Essentials 285 Review Questions 286 Chapter 6 Allocating Resources in a vSphere Datacenter 291 Administering and Managing vSphere 6.x Resources 293 Configuring Multilevel Resource Pools 295 Reservations, Limits, and Shares 296 Resource Pool Administration Exercises 303 Using Tags and Custom Attributes 308 Configuring vSphere DRS and Storage DRS Clusters 315 Distributed Resource Scheduler 316 Predictive DRS 318 Network-Aware DRS 320 Storage DRS 322 Establishing Affinity and Anti-Affinity 322 DRS Cluster Administration Exercises 324 Summary 342 Exam Essentials 343 Review Questions 344 Chapter 7 Backing Up and Recovering a vSphere Deployment 349 VCSA Backup and Restore 350 Backing Up Virtual Machines by Using VDP 357 Installing VDP 358 Creating Backup Jobs 361 Restoring from Backup 365 Deploying Proxy Servers 368 Replicating Virtual Machines 376 Deploying a Replication Appliance 376 Configuring Replication 378 Recovering Replicated VMs 382 Summary 387 Exam Essentials 387 Review Questions 388 Chapter 8 Troubleshooting a vSphere Deployment 393 Troubleshooting vCenter and ESXi 394 vCenter Connectivity and Services 394 vCenter Certificates 399 vCenter Log Files 399 ESXi Troubleshooting 403 ESXi Monitoring 407 Troubleshooting Storage and Networking 413 Storage Issues 413 Storage Performance 416 Storage DRS and I/O Control 417 Network Issues 418 Troubleshooting Upgrades 421 Troubleshooting Virtual Machines 421 Troubleshooting HA and DRS 425 Summary 426 Exam Essentials 427 Review Questions 428 Chapter 9 Deploying and Customizing ESXi Hosts 433 Configuring Auto Deploy 434 Enabling PXE Boot 435 Configuring DHCP 435 Configuring TFTP 436 Enabling Auto Deploy 437 Adding Deploy Rules 440 Adding a Custom Image and Profile 442 Stateless Caching and Stateful Installs 442 Employing Host Profiles 452 Creating and Using Host Profiles 453 Importing and Exporting Host Profiles 457 Advanced Profile Modifications 458 Using Answer Files 461 Summary 468 Exam Essentials 468 Review Questions 469 Chapter 10 Ensuring High Availability for vSphere Clusters and the VCSA 475 Configuring vSphere Cluster High Availability 476 HA Failures and Responses 477 Host Isolation 478 Heartbeat Datastores 479 Advanced Options 480 Configuring VMCP 482 Monitoring Virtual Machines 483 Admission Control 486 vCenter Server Appliance High Availability 499 Summary 511 Exam Essentials 512 Review Questions 514 Chapter 11 Administering and Managing vSphere Virtual Machines 519 Virtual Machine Advanced Settings 520 Virtual Machine Configuration File 522 Advanced Virtual Machine Options 528 Content Library 537 VMware Converter 546 Summary 558 Exam Essentials 558 Review Questions 559 Appendix Answers to Review Questions 565 Chapter 1: What’s New in vSphere 6.7 566 Chapter 2: Configuring and Administering Security in a vSphere Datacenter 567 Chapter 3: Networking in vSphere 569 Chapter 4: Storage in vSphere 570 Chapter 5: Upgrading a vSphere Deployment 571 Chapter 6: Allocating Resources in a vSphere Datacenter 573 Chapter 7: Backing Up and Recovering a vSphere Deployment 575 Chapter 8: Troubleshooting a vSphere Deployment 577 Chapter 9: Deploying and Customizing ESXi Hosts 578 Chapter 10: Ensuring High Availability for vSphere Clusters and the VCSA 579 Chapter 11: Administering and Managing vSphere Virtual Machines 581 Index 583

Regulärer Preis: 38,99 €
Produktbild für Hacking und Bug Hunting

Hacking und Bug Hunting

Bugs in Websites aufspüren, Gutes tun, Spaß dabei haben ... und Geld verdienen Ein praktischer Leitfaden für die Suche nach Softwarefehlern Ein Blick hinter die Kulissen: Sie sehen, wie professionelle Bughunter vorgehen Eine Anleitung, wie man mit Bughunting Geld verdient Lernen Sie, wie Hacker Websites knacken und wie auch Sie das tun können. Dieses Buch ist ein praktischer Leitfaden für die Suche nach Software-Bugs. Egal ob Sie in die Cybersicherheit einsteigen, um das Internet zu einem sichereren Ort zu machen, oder ob Sie als erfahrener Entwickler sichereren Code schreiben wollen – Peter Yaworski, ein überzeugter "Ethical Hacker", zeigt Ihnen, wie es geht. Sie lernen die gängigsten Arten von Bugs kennen, wie Cross-Site-Scripting, unsichere Objekt-Referenzen oder Server-Side Request-Forgery. Echte Fallbeispiele aufgedeckter und entlohnter Schwachstellen in Anwendungen von Twitter, Facebook, Google und Uber zeigen erstaunliche Hacks, und sie erfahren, wie Hacker bei Überweisungen Race Conditions nutzen, URL-Parameter verwenden, um unbeabsichtigt Tweets zu liken, und vieles mehr. Sie lernen: - wie Angreifer Websites kompromittieren - wo Sie mit der Suche nach Bugs anfangen - welche Funktionalitäten üblicherweise mit Schwachstellen assoziiert werden - wie Sie Bug-Bounty-Programme finden - wie Sie effektive Schwachstellen-Reports verfassen "Hacking und Bug-Hunting" ist eine faszinierende und umfassende Einführung in die Sicherheit von Webanwendungen, mit Geschichten von der vordersten Schwachstellenfront und praktischen Erkenntnissen. Mit Ihrem neu gewonnenen Wissen um die Websicherheit und Schwachstellen können Sie das Web zu einem sichereren Ort machen—und dabei noch Geld verdienen.

Regulärer Preis: 32,90 €
Produktbild für Hands-on Azure Pipelines

Hands-on Azure Pipelines

Build, package, and deploy software projects, developed with any language targeting any platform, using Azure pipelines.The book starts with an overview of CI/CD and the need for software delivery automation. It further delves into the basic concepts of Azure pipelines followed by a hands-on guide to setting up agents on all platforms enabling software development in any language. Moving forward, you will learn to set up a pipeline using the classic Visual Editor using PowerShell scripts, a REST API, building edit history, retention, and much more. You’ll work with artifact feeds to store deployment packages and consume them in a build. As part of the discussion you’ll see the implementation and usage of YAML (Yet Another Markup Language) build pipelines. You will then create Azure release pipelines in DevOps and develop extensions for Azure pipelines. Finally, you will learn various strategies and patterns for developing pipelines and go through some sample lessons on building and deploying pipelines.After reading Hands-on Azure Pipelines, you will be able to combine CI and CD to constantly and consistently test and build your code and ship it to any target.WHAT YOU WILL LEARN* Work with Azure build-and-release pipelines * Extend the capabilities and features of Azure pipelines* Understand build, package, and deployment strategies, and versioning and patterns with Azure pipelines* Create infrastructure and deployment that targets commonly used Azure platform services* Build and deploy mobile applications * Use quick-start Azure DevOps projectsWHO THIS BOOK IS FORSoftware developers and test automation engineers who are involved in the software delivery process.CHAMINDA CHANDRASEKARA is a Microsoft Most Valuable Professional (MVP) for Visual Studio ALM and Scrum Alliance Certified ScrumMaster®, and focuses on and believes in continuous improvement of the software development lifecycle. He works as a Senior Engineer - DevOps at Xameriners, Singapore. Chaminda is an active Microsoft Community Contributor (MCC) who is well recognized for his contributions in Microsoft forums, TechNet galleries, wikis, and Stack Overflow and he contributes extensions to Azure DevOps Server and Services (former VSTS/TFS) in the Microsoft Visual Studio Marketplace. He also contributes to other open source projects in GitHub. Chaminda has published five books with Apress.PUSHPA HERATH is a DevOps engineer at Xamariners. She has many years of experience in Azure DevOps Server and Services (formerly VSTS/TFS), Azure cloud platform and QA Automation. She is an expert in DevOps currently leading the DevOps community in Sri Lanka, and she has shown in depth knowledge in Azure cloud platform tools in her community activities. She has published three books with Apress and spoken in community evets as well as in the you tube channel of her Sri Lanka DevOps community.CHAPTER 1: UNDERSTANDING THE IMPORTANCE OF SOFTWARE DELIVERY AUTOMATIONCHAPTER GOAL: Give conceptual overview on CI CD while elaborating on the need of software delivery automation.NO OF PAGES: 10SUB -TOPICS1. Introducing Concepts (CI/CD)2. Why we need SW Delivery Automation?CHAPTER 2: OVERVIEW OF AZURE PIPELINESCHAPTER GOAL: Introduction to components in Azure Pipelines enabling you to follow the lessons from chapter 3.NO OF PAGES: 30Sub - Topics1. Introducing Pools and Agents (Explain purpose and usage (no need to go into setup details), +Security)2. Deployment Groups (Explain purpose and usage (no need to go into setup details), +Security)3. Build Pipelines (Explain purpose and usage (no need to go into setup details), +Security)4. Release Pipelines (Explain purpose and usage (no need to go into setup details), +Security)5. Task Groups (Explain purpose and usage (no need to go into setup details), +Security)6. Library (Variables) (Explain purpose and usage (no need to go into setup details), +Security)7. Parallel Pipelines and BillingCHAPTER 3: SETTING UP POOLS, DEPLOYMENT GROUPS AND AGENTSCHAPTER GOAL: Lessons to provide hand-on guidance on setting up agents on all platforms enabling building software developed with any language.NO OF PAGES : 40SUB - TOPICS:1. Setting up pools and permissions (scopes, Capabilities)2. Adding agents to pools (three pools Linux, mac and windows – add each type)3. Enable .NET core builds in Linux Agents4. Setting up Deployment Groups and permissions (scopes)5. Adding agent to Deployment groups (roles)CHAPTER 4: CREATING BUILD PIPELINES – CLASSIC – PART1CHAPTER GOAL: Step by step guidance to setting up a build pipeline using Classic Visual Editor.NO OF PAGES: 50SUB - TOPICS:1. Using Source Control Providers (show integration with each type and explain all options for each type such as tag sources and other options)2. Using a Template (Explain few commonly used templates)3. Using Multiple jobs – Adding Build jobs, Selecting Pools, setting up Demands, timeouts, mention parallelism, conditions are later lesson, Dependency settings with sample4. Using Tasks (Explain adding Tasks, find tasks in marketplace (install marketplace task in next lesson))5. Installing tasks from marketplace (Explain how to when you have rights, explain how to request to install task admin approve and install as well as decline)6. Build phase and Task Control Conditions – Explain using condition types, custom conditions in detail using a sample7. Parallelism - multi configuration and multi agents – show with samplesCHAPTER 5: CREATING BUILD PIPELINES – CLASSIC – PART2CHAPTER GOAL: Step by step guidance to setting up a build pipeline using Classic Visual Editor.NO OF PAGES: 40SUB - TOPICS:1. Using Variables – System, pipeline and group, scoping variables, queue time variable value change2. Setting up triggers and path filters for a build – show how it works CI, PR etc, path filters, scheduled builds3. Format Build number and apply custom formats with PowerShell4. Enable, paused and disabled builds -explain in detail with sample5. Link work items and Create work items on failures6. Using build status badge7. Build job scope, timeouts and demands8. Build edit history, compare and restore9. RetentionCHAPTER 6: CREATING BUILD PIPELINES – CLASSIC – PART 3CHAPTER GOAL: Step by step guidance to setting up a build pipeline using Classic Visual Editor.NO OF PAGES: 30SUB - TOPICS:1. Queuing builds and enable debugging mode for more diagnostic information2. Setting variable values in PowerShell scripts3. Accessing secret variable values in PowerShell4. Using OAuth tokens in builds (show example of REST API call , mention REST API details are later chapter)5. Creating and using task groups (include export and import as well)6. Using agentless phases – provide few usable task examples7. Publishing Artifacts – as server, as shared path (mention package as nuget later)8. Exporting and importing build definitionsCHAPTER 7: USING ARTIFACTSCHAPTER GOAL: Usage of artifact feeds to store deployment packages and usage of artifact feeds to keep packages related to development and consuming them in builds.NO OF PAGES: 40SUB - TOPICS:1. Creating and publishing build artifacts as nuget2. Using nuget packages from azure artifacts in VS, and in VS Code3. Using nuget packages in Azure Artifact feed in builds4. Creating and Consuming npm packages5. Creating and Consuming maven packages6. Creating and consuming gradle packages7. Creating and Consuming python packages8. Azure CLI to use feeds9. New Public feedsCHAPTER 8: CREATING AND USING YAML BUILD PIPELINESCHAPTER GOAL: Hands on lessons on implementing YAML based build pipelines giving all essential information on implementing configurations and pilines as code.No of pages: 40SUB - TOPICS:Will be defined laterCHAPTER 9: CREATING AZURE RELEASE PIPELINES – PART1Chapter Goal: Step by step guidance to setting up release pipelines with Azure DevOps.NO OF PAGES: 40SUB - TOPICS:1. Service Connections – Explain different types2. Using Templates to Create Pipelines (explain few common templates)3. Adding Artifacts for Release Pipeline (explain each artifact type)4. Setting up Artifact Triggers (continuous deployment triggers, artifact filters)5. Adding Stage (templated or empty, add vs clone, after release, manual triggers, after stage trigger (show parallel and different stage sequence setup options for pipelines), (partial succeeded) and artifact filters)6. Scheduled deployments for a stage (how it works samples)7. Pull request triggers in artifacts and Pull request deployment in stages8. Deployment queue settings (how it works sample should be shown)CHAPTER 10: CREATING AZURE RELEASE PIPELINES – PART2CHAPTER GOAL: Step by step guidance to setting up release pipelines with Azure DevOps.NO OF PAGES: 50SUB - TOPICS:1. Defining Gates (show examples for each gate type)2. Post deployment Options (approval and auto redeploy, gates just mention)3. Agent Job (Pools and specifications, demands samples, execution plan (multi config, multi agent as well) samples, timeouts, Artifact downloads, Oauth, Run job conditions)4. Deployment group job (Deployment group, how it works for required tags samples, targets to deploy multiple, one at a time samples, maximum parallel settings how it works samples, timeouts, artifacts, Oauth, run job conditions)5. Agentless Jobs – Explain usage of possible tasks – manual, delay, invoke azure function, quires, alerts, publishing to service bus – show samples for each6. Using variables – Scoping and using group variables as well7. Release Options – Release number, all integration options explain with sample for each8. History, compare, restore9. Export, import pipelinesCHAPTER 11: USING REST API AND DEVELOPING EXTENSIONS FOR AZURE PIPELINESCHAPTER GOAL: How to extend the capabilities and features of Azure Pipelines using the REST APIs and the extension development is discussed in this chapter.NO OF PAGES: 30SUB - TOPICS:1. Build and Release Management REST APIs - introduce get, post, put etc. with PS and typescript2. Developing extensions for Azure Pipelines – Develop a simple pipeline extension3. Deploying and distributing Azure Pipeline extensions – sharing privately and enable to use publiclyCHAPTER 12: USEFUL PIPELINE STRATEGIES AND PATTERNSCHAPTER GOAL: Guidance in pipeline development strategies and patterns with Azure build and release pipelines.NO OF PAGES: 25SUB - TOPICS:Will define later.CHAPTER 13: COMMONLY USED BUILD AND DEPLOYMENT PIPELINES – SAMPLES AND INTEGRATIONSCHAPTER GOAL: Few useful samples lessons on building and release commonly used applications to Azure platform.NO OF PAGES: 50SUB - TOPICS:1. Deploying infrastructure with Azure Pipelines – Creating Azure resources such as, resource groups, app service plans, storage accounts, web apps, function apps, APIM, Cosmos, SQL, ACR, AKS (provide open source code samples developed by us integrated with pipelines)2. Using Terraform with Azure Pipelines3. Deploying function apps and web apps – including configuration management options4. Deploying mobile apps5. Deploying Azure Databases – SQL, Cosmos6. Deploying Containerized Applications (web apps, AKS)7. Using SonarQube and Azure Build Pipelines for Code Analysis8. Integrating with Jenkins9. Integrating with Octopus deploy10. Generating quick start projects with Azure DevOps Projects (specially focus on java, python, node etc. and targeting Azure platforms)11. Generating release notes12. Visualizing Pipelines status with Dashboards in Azure DevOps

Regulärer Preis: 66,99 €
Produktbild für Cloud Computing For Dummies

Cloud Computing For Dummies

* Adopt a hybrid and multicloud strategy * Rethink DevOps with containers and microservices * Incorporate security into your cloud environment Plan your cloud computing strategy Are you ready to execute a cloud computing plan? You need a strategy to prepare for the future, and this book comes to the rescue. Authors Daniel Kirsch and. Judith Hurwitz share insights by honing in on topics like multicloud architecture, microservices, hybrid infrastructure, DevOps, and Software as a Service. This book is ideal for anyone who needs to understand the emerging approaches to cloud computing. Inside... * Understanding cloud architecture * Using a hybrid computing approach * Explaining the economics of cloud computing * Planning your cloud strategy * Developing a security strategy * Understanding containers and microservices Get your head—and your business—into the Cloud  Cloud computing is no longer just a clever new toy in the world of IT infrastructure. Despite the nebulous name, it’s become a real and important part of our information architecture—and tech professionals who ignore it or try to skim their way through risk falling behind rapidly. The new edition of Cloud Computing For Dummies gets you up to speed fast, clarifying your Cloud options, showing you where can save you time and money, giving you ways to frame your decisions, and helping you avoid weeks of research.  In a friendly, easy-to-follow style, Cloud Computing For Dummies, 2nd Edition demystifies the Cloud’s virtual landscape, breaking up a complex and multi-layered topic into simple explanations that will make the various benefits clear and ultimately guide you toward making the most appropriate choices for your organization.   * Know the business case for the Cloud  * Understand hybrid and multi-cloud options  * Develop your Cloud strategy  * Get tips on best practices  The Cloud is everywhere, and it can deliver amazing benefits to our lives and businesses. Get a much clearer vision of exactly how with Cloud Computing For Dummies—and you’ll begin to see that the sky really is the limit!     Introduction 1 Part 1: Understanding Cloud Concepts 5 Chapter 1: Understanding the Cloud 7 Chapter 2: Embracing the Business Imperative 21 Part 2: Examining Architectural Considerations 31 Chapter 3: Architectural Considerations for the Cloud Environment 33 Chapter 4: Managing a Hybrid and Multicloud Environment 43 Chapter 5: Standards in a Multicloud World 59 Chapter 6: A Closer Look at Cloud Services 73 Part 3: Understanding Cloud Models 87 Chapter 7: Introducing All Types of Clouds 89 Chapter 8: Using Infrastructure as a Service 107 Chapter 9: Using Software as a Service 121 Chapter 10: Standing on Platform as a Service 135 Part 4: Managing in a Multicloud World 147 Chapter 11: Planning for DevOps in the Cloud 149 Chapter 12: Managing Multicloud Workloads 165 Chapter 13: Managing Data Storage in the Cloud 177 Part 5: Developing Your Cloud Strategy 189 Chapter 14: Managing and Integrating Data in the Cloud 191 Chapter 15: Promoting Cloud Security and Governance 207 Chapter 16: Breaking Down Cloud Economics 225 Chapter 17: Planning Your Cloud Strategy 241 Part 6: The Part of Tens 253 Chapter 18: Ten Cloud Resources 255 Chapter 19: Ten Cloud Do’s and Don’ts 261 Glossary 267 Index 281 Daniel Kirsch, Managing Director of Hurwitz & Associates, is a thought leader, researcher, author, and consultant in cloud, AI, and security. Judith Hurwitz, President of Hurwitz & Associates, is a consultant, thought leader, and coauthor of 10 books including Augmented Intelligence, Cognitive Computing and Big Data Analytics, and Hybrid Cloud for Dummies

Regulärer Preis: 26,99 €
Produktbild für Networking For Dummies

Networking For Dummies

SET UP A SECURE NETWORK AT HOME OR THE OFFICEFully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you’ll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more.From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data—this #1 bestselling guide covers it all.* Build a wired or wireless network* Secure and optimize your network* Set up a server and manage Windows user accounts* Use the cloud—safely Written by a seasoned technology author—and jam-packed with tons of helpful step-by-step instructions—this is the book network administrators and everyday computer users will turn to again and again.DOUG LOWE is the bestselling author of Networking For Dummies and Networking All-in-One Desk Reference For Dummies. His 50+ books include more than 30 in the For Dummies series. He has demystified everything from Microsoft Office and memory management to client/server computing and creating web pages. INTRODUCTION 1About This Book 1Foolish Assumptions 2Icons Used in This Book 3Beyond the Book 3Where to Go from Here 4PART 1: GETTING STARTED WITH NETWORKING 5CHAPTER 1: LET’S NETWORK! 7Defining a Network 8Why Bother with a Network? 11Sharing files 11Sharing resources 11Sharing programs 12Sharing messages 12Servers and Clients 13Dedicated Servers and Peers 13What Makes a Network Tick? 15It’s Not a Personal Computer Anymore! 16The Network Administrator 17What Have They Got That You Don’t Got? 18CHAPTER 2: CONFIGURING WINDOWS AND MAC CLIENTS 21Configuring Windows Network Connections 22Joining a Windows Computer to a Domain 27Configuring Mac Network Settings 29Joining a Mac Computer to a Domain 33CHAPTER 3: LIFE ON THE NETWORK 37Distinguishing between Local Resources and Network Resources 38What’s in a Name? 38Logging on to the Network 40Understanding Shared Folders 42Four Good Uses for a Shared Folder 43Store files that everybody needs 43Store your own files 44Make a temporary resting place for files on their way to other users 44Back up your local hard drive 45Oh, the Network Places You’ll Go 45Mapping Network Drives 47Using a Network Printer 50Adding a network printer 51Printing to a network printer 52Playing with the print queue 53Logging off the Network 55CHAPTER 4: MORE WAYS TO USE YOUR NETWORK 57Sharing Your Stuff 57Enabling File and Printer Sharing 58Sharing a Folder 59Using the Public Folder 61Sharing a Printer 62Using Microsoft Office on a Network 64Accessing network files 64Using workgroup templates 65Networking an Access database 67Working with Offline Files 68PART 2: DESIGNING YOUR NETWORK 73CHAPTER 5: PLANNING A NETWORK 75Making a Network Plan 75Being Purposeful 76Taking Stock 77What you need to know 77Programs that gather information for you 79To Dedicate or Not to Dedicate: That Is the Question 80File servers 81Print servers 81Web servers 82Mail servers 82Database servers 83Application servers 83License servers 83Choosing a Server Operating System 83Planning the Infrastructure 84Drawing Diagrams 84CHAPTER 6: DEALING WITH TCP/IP 87Understanding Binary 88Counting by ones 88Doing the logic thing 89Introducing IP Addresses 90Networks and hosts 90The dotted-decimal dance 91Classifying IP Addresses 91Class A addresses 92Class B addresses 93Class C addresses 93Subnetting 94Subnets 95Subnet masks 96The great subnet roundup 97Private and public addresses 98Understanding Network Address Translation 98Configuring Your Network for DHCP 99Understanding DHCP 100DHCP servers 100Understanding scopes 101Feeling excluded? 102Reservations suggested 103How long to lease? 104Managing a Windows Server 2019 DHCP Server 104Configuring a Windows DHCP Client 105Using DNS 106Domains and domain names 106Fully qualified domain names 108Working with the Windows DNS Server 109Configuring a Windows DNS Client 110CHAPTER 7: OH, WHAT A TANGLED WEB WE WEAVE: CABLES AND SWITCHES 111What Is Ethernet? 112All about Cable 114Cable categories 116What’s with the pairs? 117To shield or not to shield 117When to use plenum cable 118Sometimes solid, sometimes stranded 118Installation guidelines 119The tools you need 120Pinouts for twisted-pair cables 121RJ-45 connectors 122Crossover cables 124Wall jacks and patch panels 124Understanding Switches 126Comparing managed and unmanaged switches 126Daisy-chaining switches 128Stacking switches 128Looking at distribution switches and access switches 129Powering Up with Power over Ethernet 130Looking at Three Types of Network Rooms 131CHAPTER 8: SETTING UP A WIRELESS NETWORK 133Diving into Wireless Networking 134A Little High School Electronics 135Waves and frequencies 135Wavelength and antennas 137Spectrums and the FCC 137Eight-Oh-Two-Dot-Eleventy Something: Understanding Wireless Standards 139Home on the Range 140Using Wireless Network Adapters 141Setting Wireless Access Points 142Infrastructure mode 142Multifunction WAPs 143Roaming Capabilities 144Wireless bridging 144Ad-hoc networks 145Configuring a Wireless Access Point 145Basic configuration options 146DHCP configuration 146Connecting to a Wireless Network 147Paying Attention to Wireless Network Security 149CHAPTER 9: CONNECTING TO THE INTERNET 155Connecting to the Internet 155Connecting with cable or DSL 156Connecting with high-speed private lines 157Sharing an Internet connection 158Securing Your Connection with a Firewall 159Using a firewall 159Comparing residential gateways to firewall routers 161Looking at the built-in Windows firewall 161Providing a Backup Internet Connection 163PART 3: WORKING WITH SERVERS 165CHAPTER 10: VIRTUALIZING YOUR NETWORK 167Understanding Virtualization 167Understanding Hypervisors 169Understanding Virtual Disks 171Understanding Network Virtualization 173Looking at the Benefits of Virtualization 174Choosing Virtualization Hosts 176Understanding Windows Server 2019 Licensing 176Introducing Hyper-V 178Understanding the Hyper-V hypervisor 178Understanding virtual disks 179Enabling Hyper-V 180Getting Familiar with Hyper-V 181Creating a Virtual Switch 182Creating a Virtual Disk 184Creating a Virtual Machine 188Installing an Operating System 192CHAPTER 11: SETTING UP A WINDOWS SERVER 195Planning a Windows Server Installation 196Checking system requirements 196Reading the release notes 196Considering your licensing options 196Deciding your TCP/IP configuration 197Choosing workgroups or domains 197Running Setup 198Adding Server Roles and Features 203Creating a New Domain 208CHAPTER 12: MANAGING WINDOWS USER ACCOUNTS 213Understanding How Active Directory Is Organized 214Objects 214Domains 215Organizational units 215Trees 216Forests 216Understanding Windows User Accounts 216Local accounts versus domain accounts 216User account properties 217Creating a New User 217Setting User Properties 220Changing the user’s contact information 220Setting account options 221Specifying logon hours 223Restricting access to certain computers 223Setting the user’s profile information 224Resetting User Passwords 225Disabling and Enabling User Accounts 226Deleting a User 226Working with Groups 227Creating a group 227Adding a member to a group 228Creating a Logon Script 230CHAPTER 13: MANAGING NETWORK STORAGE 231Understanding Disk Storage 231Hard disk drives 231Solid state drives to the rescue! 234It’s a RAID! 234Three ways to attach disks to your servers 236Focusing on File Servers 237Understanding permissions 237Understanding shares 239Managing Your File Server 240Using the New Share Wizard 241Sharing a folder without the wizard 245Granting permissions 247PART 4: MANAGING YOUR NETWORK 251CHAPTER 14: WELCOME TO NETWORK MANAGEMENT 253What a Network Administrator Does 254Choosing the Part-Time Administrator 255The Three “Ups” of Network Management 256Managing Network Users 257Acquiring Software Tools for Network Administrators 258Building a Library 259Pursuing Certification 260Helpful Bluffs and Excuses 261CHAPTER 15: SUPPORTING YOUR USERS 263Establishing the Help Desk’s Charter 264Tracking Support Tickets 265Deciding How to Communicate with Users 267Using Remote Assistance 268Enabling Remote Assistance 269Inviting someone to help you via a Remote Assistance session 270Responding to a Remote Assistance invitation 273Creating a Knowledge Base 275Creating a Self-Service Help Portal 275Using Satisfaction Surveys 276Tracking Help Desk Performance 278Using Help Desk Management Software 279CHAPTER 16: USING GROUP POLICY 281Understanding Group Policy 281Enabling Group Policy Management on Windows Server 2019 282Creating Group Policy Objects 283Filtering Group Policy Objects 289Forcing Group Policy Updates 292CHAPTER 17: MANAGING SOFTWARE DEPLOYMENT 293Understanding Software Licenses 294Using a License Server 297Deploying Network Software 298Deploying software manually 298Running Setup from a network share 299Installing silently 300Creating an administrative installation image 301Pushing out software with Group Policy 302Keeping Software Up to Date 302CHAPTER 18: MANAGING MOBILE DEVICES 305The Many Types of Mobile Devices 306Considering Security for Mobile Devices 307Managing iOS Devices 308Understanding the iPhone 308Understanding the iPad 309Integrating iOS devices with Exchange 309Configuring an iOS device for Exchange email 311Managing Android Devices 314Looking at the Android OS 314Perusing Android’s core applications 315Integrating Android with Exchange 316PART 5: SECURING YOUR NETWORK 317CHAPTER 19: WELCOME TO CYBERSECURITY NETWORK 319Do You Need Security? 320The Three Pillars of Cybersecurity 321Two Approaches to Security 322Physical Security: Locking Your Doors 323Securing User Accounts 324Obfuscating your usernames 324Using passwords wisely 325Generating passwords For Dummies 326Secure the Administrator account 328Managing User Security 328User accounts 329Built-in accounts 330User rights 331Permissions (who gets what) 331Group therapy 332User profiles 333Logon scripts 334Securing the Human Firewall 334CHAPTER 20: HARDENING YOUR NETWORK 337Firewalls 337The Many Types of Firewalls 339Packet filtering 339Stateful packet inspection (SPI) 341Circuit-level gateway 342Application gateway 342Next-generation firewall 343Virus Protection 343What is a virus? 343Antivirus programs 345Safe computing 346Patching Things Up 346CHAPTER 21: SECURING YOUR EMAIL 349Defining Spam 350Sampling the Many Flavors of Spam 351Using Antispam Software 352Understanding Spam Filters 353Looking at Three Types of Antispam Software 356On-premises antispam 356Antispam appliances 357Cloud-based antispam services 358Minimizing Spam 359CHAPTER 22: BACKING UP YOUR DATA 3613-2-1: The Golden Rule of Backups 361How Often Should You Back Up Your Data? 363Choosing Where to Back Up Your Data 364Establishing Two Key Backup Objectives 365Backing Up to Tape 366Understanding Backup Software 367Examining File-Based Backups 368Full backups 369Copy backups 370Incremental backups 370Differential backups 371Backup and Virtualization 371Verifying Tape Reliability 373Keeping Backup Equipment Clean and Reliable 374Setting Backup Security 375CHAPTER 23: PLANNING FOR DISASTER 377Assessing Different Types of Disasters 378Environmental disasters 379Deliberate disasters 379Disruption of services 380Equipment failure 380Other disasters 381Analyzing the Impact of a Disaster 381Developing a Business Continuity Plan 382Holding a Fire Drill 383PART 6: MORE WAYS TO NETWORK 385CHAPTER 24: ACCOMMODATING REMOTE USERS 387Using Outlook Web App 388Using a Virtual Private Network 389Looking at VPN security 390Understanding VPN servers and clients 391Connecting with Remote Desktop Connection 393Enabling Remote Desktop Connection 394Connecting remotely 395Using keyboard shortcuts for Remote Desktop 397CHAPTER 25: LIFE IN CLOUD CITY 399Introducing Cloud Computing 400Looking at the Benefits of Cloud Computing 401Detailing the Drawbacks of Cloud Computing 402Examining Three Basic Kinds of Cloud Services 403Applications 404Platforms 404Infrastructure 405Public Clouds versus Private Clouds 405Introducing Some of the Major Cloud Providers 406Amazon 406Google 407Microsoft 407Getting into the Cloud 408CHAPTER 26: GOING HYBRID 409What Is a Hybrid Cloud? 409What Are the Benefits of Hybrid Cloud? 411Elasticity 411Flexibility 412Agility 412Innovation 412Operational efficiency 412Integrating Identity 413Azure Active Directory 413Single sign-on 414Looking at Hybrid Cloud Virtualization Platforms 416PART 7: THE PART OF TENS 419CHAPTER 27: TEN NETWORKING COMMANDMENTS 421I Thou Shalt Back Up Thy Data Religiously 421II Thou Shalt Protect Thy Network from Infidels 422III Thou Shalt Train Up Thy Users in the Ways of Safe Computing 422IV Thou Shalt Keepeth Thy Network Drive Pure and Cleanse It of Old Files 423V Thou Shalt Not Tinker with Thine Network Configuration unless Thou Knowest What Thou Art Doing 423VI Thou Shalt Not Covet Thy Neighbor’s Network 423VII Thou Shalt Not Take Down Thy Network without Proper Notification 424VIII Thou Shalt Keep an Adequate Supply of Spare Parts 424IX Thou Shalt Not Steal Thy Neighbor’s Program without a License 424X Thou Shalt Write Down Thy Network Configuration upon Tablets of Stone 425CHAPTER 28: TEN BIG NETWORK MISTAKES 427Skimping on Hardware 427Turning Off or Restarting a Server Computer While Users Are Logged On 428Deleting Important Files on the Server 429Copying a File from the Server, Changing It, and Then Copying It Back 429Sending Something to the Printer Again Just Because It Didn’t Print the First Time 430Assuming That the Server Is Safely Backed Up 430Connecting to the Internet without Considering Security Issues 430Plugging in a Wireless Access Point without Asking 431Thinking You Can’t Work Just Because the Network Is Down 431Running Out of Space on a Server 432Always Blaming the Network 433CHAPTER 29: TEN THINGS YOU SHOULD KEEP IN YOUR CLOSET 435Duct Tape 435Tools 436Patch Cables 436Cable Ties and Velcro 436Twinkies 437Replacement Parts 437Cheap Network Switches 438The Complete Documentation of the Network on Tablets of Stone 438The Network Manuals and Disks 438Ten Copies of This Book 439Index 441

Regulärer Preis: 22,99 €
Produktbild für Learn Java for Android Development

Learn Java for Android Development

Gain the essential Java language skills necessary for using the Android SDK platform to build Java-based Android apps. This book includes the latest Java SE releases that Android supports, and is geared towards the Android SDK version 10. It includes new content including JSON documents, functional programming, and lambdas as well as other language features important for migrating Java skills to Android development.Android is still the world's most popular mobile platform and because this technology is still mostly based on Java, you should first obtain a solid grasp of the Java language and its APIs in order to improve your chances of succeeding as an effective Android apps developer. Learn Java for Android Development, 4th Editionhelps you do that.Each of the book’s chapters provides an exercise section that gives you the opportunity to reinforce your understanding of the chapter’s material. Answers to the book’s more than 500 exercises are provided in an appendix. Once you finish, you will be ready to begin your Android app development journey using Java.WHAT YOU WILL LEARN* Discover the latest Java programming language features relevant to Android SDK development* Apply inheritance, polymorphism, and interfaces to Android development* Use Java collections, concurrency, I/O, networks, persistence, functional programming, and data access in Android apps* Parse, create, and transform XML and JSON documents* Migrate your Java skills for mobile development using the Android platformWHO THIS BOOK IS FORProgrammers with at least some prior Java programming experience looking to get into mobile Java development with the Android platform.PETER SPÄTH consults, trains/teaches, and writes books on various subjects, with a primary focus on software development. With a wealth of experience in Java-related languages, the release of Kotlin for building Android apps made him enthusiastic about writing books for Kotlin development in the Android environment. He also graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java-related projects.JEFF FRIESEN is a freelance tutor and software developer with an emphasis on Java (and now Android). In addition to authoring Learn Java for Android Development and co-authoring Android Recipes, Jeff has written numerous articles on Java and other technologies for JavaWorld, informIT, Java.net, and DevSource.1: Getting Started with JavaTalking about ART and licensing here2: Learning Language Fundamentals3: Discovering Classes and Objects4: Discovering Inheritance, Polymorphism, and Interfaces5: Mastering Advanced Language Features, Part 16: Mastering Advanced Language Features, Part 27: Exploring the Basic APIs, Part18: Exploring the Basic APIs, Part29: Functional Programming and Lambdas10: Exploring the Collections Framework11: Exploring the Concurrency Utilities12: Performing Classic I/O13: Accessing Networks14: Migrating to New I/O15: Accessing Databases16: Parsing, Creating, and Transforming XML Documents17: Working With JSON DocumentsA. Solutions to Exercises

Regulärer Preis: 99,99 €
Produktbild für Algorithmen in Python

Algorithmen in Python

Inhalt Algorithmen gehören zum Rüstzeug guter Entwickler und Programmierer. Dieses Buch stellt Ihnen eine Vielzahl an problemlösenden Techniken für den Programmieralltag vor und zeigt, wie Sie diese Techniken in Ihre Anwendungen implementieren. Dabei lernen Sie 32 Klassiker der Informatik kennen, vom einfachen Such-Algorithmus bis zu genetischen Algorithmen und neuronalen Netzen in der KI. Randvoll mit Codebeispielen in Python sowie Profitipps für Programmierer. Selbst wenn Ihnen einiges bekannt vorkommen wird, es warten zahlreiche Aha-Erlebnisse auf Sie. Ideal für alle, die ihre ersten Schritte in der Programmierung hinter sich haben und jetzt voll durchstarten wollen! - Programmieren trainieren mit bekannten und modernen Klassikern - Von der Suche bis zu k-Means, vom Dreizeiler bis zur dynamischen Programmierung und KI - Für Studium, Coding-Katas, Workouts oder in Eigeninitiative - Titel der amerikanischen Originalausgabe: "Classic Computer Science Problems in Python"

Regulärer Preis: 29,90 €
Produktbild für Configuration of a Simple Samba File Server, Quota and Schedule Backup

Configuration of a Simple Samba File Server, Quota and Schedule Backup

This work is a step-by-step how to guide for configuring Samba file server, Quota andscheduled backup of important files. The paper provides an installation guide for,1. Samba server.2. Quota.3. Scheduled backup of important files.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 4,49 €
Produktbild für IoT mit SAP

IoT mit SAP

Wie können Sie das Internet der Dinge (IoT) gewinnbringend nutzen? Dieser praktische Leitfaden führt Sie durch das Angebot der SAP-IoT-Plattform – immer orientiert an typischen Anwendungsfällen in Industrie und Wirtschaft. Sie erfahren, welche IoT-Services Ihnen auf der SAP Cloud Platform und mit SAP Leonardo zur Verfügung stehen und wie Sie diese einsetzen, um Ihre eigene Architektur aufzusetzen. Darüber hinaus lernen Sie SAP-Standardlösungen für Asset Management und Real-Time Track and Trace kennen, die Sie direkt implementieren können. Aus dem Inhalt: ReferenzarchitekturDigitaler ZwillingEdge ComputingSAP Cloud PlatformSAP Leonardo IoTDigital Supply ChainSAP Asset Intelligence Network (AIN)SAP Predictive Maintenance and ServiceSicherheit und Backend-AnbindungImplementierungsbeispiele für kundeneigene IoT-LösungenUse Cases und Projektmethoden   Vorwort ... 15   Einleitung ... 17   1.  Was ist das Internet der Dinge? ... 25        1.1 ... Das Internet der Dinge in Alltag und Industrie ... 25        1.2 ... Internet der Dinge: Begriffsabgrenzungen ... 33        1.3 ... Historische Entwicklung des Internets der Dinge ... 37        1.4 ... Weiterentwicklung und Potenzial des Internets der Dinge ... 43   2.  Technische Grundlagen und Komponenten ... 47        2.1 ... Eigenschaften von IoT-Systemen ... 48        2.2 ... Architektur von IoT-Systemen ... 63        2.3 ... Funktionale Anforderungen an IoT-Systeme ... 81        2.4 ... Computing-Konzepte im Umfeld von IoT-Systemen ... 93   Die SAP-IoT-Plattform ... 99   3.  IoT im Kontext von SAP ... 101        3.1 ... IoT in der SAP-Strategie ... 101        3.2 ... Einführung in die SAP-IoT-Plattform ... 116        3.3 ... Marktpositionierung der SAP-IoT-Plattform ... 130   4.  SAP Cloud Platform ... 137        4.1 ... Erste Schritte mit der SAP Cloud Platform ... 137        4.2 ... Integrationsservices ... 144        4.3 ... Services für Datenspeicherung und -verwaltung ... 172        4.4 ... Services für Benutzeroberflächen und Sicherheit ... 176        4.5 ... Services für Entwicklung und Betrieb ... 184   5.  IoT-Services der SAP Cloud Platform ... 195        5.1 ... SAP Cloud Platform IoT ... 196        5.2 ... SAP Leonardo IoT ... 206   6.  SAP Edge Services ... 229        6.1 ... Komponenten und Funktionen der SAP Edge Services ... 230        6.2 ... SAP Edge Services installieren und testen ... 237   SAP-IoT-Standardlösungen für die digitale Supply Chain ... 249   7.  Asset Management: digitaler Service, Wartung und Instandhaltung ... 251        7.1 ... Industrietrends und Kernkonzepte ... 252        7.2 ... Digitale Prozesse und neue Geschäftsmodelle ... 259        7.3 ... SAP Intelligent Asset Management Suite ... 265        7.4 ... Integration mit den Backend-Systemen ... 288        7.5 ... Kundenbeispiele ... 292   8.  Realtime Track and Trace in der Logistik ... 295        8.1 ... Industrietrends und Anforderungen ... 296        8.2 ... Echtzeit-Logistikmanagement mit SAP ... 305        8.3 ... Relevante IoT-Technologien ... 313        8.4 ... Partner- und Kundenbeispiele ... 319   Individuelle IoT-Lösungen mit SAP ... 327   9.  Füllstand von Behältern überwachen und Nachschub anstoßen ... 329        9.1 ... Softwarearchitektur und Integration ... 330        9.2 ... Nutzen und betriebswirtschaftliche Relevanz des Szenarios ... 351 10.  Pay per Use und Abonnement-Modelle ... 353        10.1 ... Softwarearchitektur und Integration ... 354        10.2 ... Nutzen und betriebswirtschaftliche Relevanz des Szenarios ... 378 11.  Edge Computing bei speziell zu schützenden Geräten ... 379        11.1 ... Softwarearchitektur und Integration ... 380        11.2 ... Nutzen und betriebswirtschaftliche Relevanz des Szenarios ... 399 12.  IoT-Szenarien mit Objekterkennung ... 401        12.1 ... Objekterkennung, neuronale Netze und künstliche Intelligenz ... 402        12.2 ... Softwarearchitektur und Integration ... 405        12.3 ... Nutzen und betriebswirtschaftliche Relevanz ... 419   IoT-Projekte mit SAP-Software umsetzen ... 421 13.  Vorbereitung eines IoT-Projekts ... 423        13.1 ... Den passenden Use Case finden ... 424        13.2 ... Den passenden IoT-Hardwarehersteller auswählen ... 444        13.3 ... Bestehende Hardware integrieren ... 448        13.4 ... Strategische Partnerschaften schließen ... 452 14.  Methoden zur Durchführung eines IoT-Projekts ... 465        14.1 ... Design Thinking ... 466        14.2 ... Agil zum Projekterfolg ... 476        14.3 ... Aufbau eines digitalen Geschäftsmodells ... 485        14.4 ... Sicherheit von IoT-Systemen ... 490   A.  Literatur und Quellenverzeichnis ... 495   B.  Das Autorenteam ... 509   Index ... 511

Regulärer Preis: 79,90 €
Produktbild für Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory

Quick Configuration of Openldap and Kerberos In Linux and Authenicating Linux to Active Directory

This paper is a step-by-step how to guide for configuring of Openldap server, Kerberos server and shows the procedure for authentication of Linux Machine to Active Directory. The paper provides an installation guide for,1.OpenLDAP server and client.2.Kerberos server and client.3.Procedure for authenticating Linux Machine to Active Directory.I am Dr. Hidaia Mahmoud Mohamed Alassouli. I completed my PhD degree in Electrical Engineering from Czech Technical University by February 2003, and my M. Sc. degree in Electrical Engineering from Bahrain University by June 1995. I completed also one study year of most important courses in telecommunication and computer engineering courses in Islamic university in Gaza. So, I covered most important subjects in Electrical Engineering, Computer Engineering and Telecommunications Engineering during my study. My nationality is Palestinian from gaza strip.I obtained a lot of certified courses in MCSE, SPSS, Cisco (CCNA), A+, Linux.I worked as Electrical, Telecommunicating and Computer Engineer in a lot of institutions. I worked also as a computer networking administrator. I had considerable undergraduate teaching experience in several types of courses in many universities. I handled teaching the most important subjects in Electrical and Telecommunication and Computer Engineering. I could publish a lot of papers a top-tier journals and conference proceedings, besides I published a lot of books in Publishing and Distribution houses.I wrote a lot of important Arabic articles on online news websites. I also have my own magazine website that I publish on it all my articles: http:// www.anticorruption.000space.comMy personal website: www.hidaia-alassouli.000space.comEmail: hidaia_alassouli@hotmail.com

Regulärer Preis: 4,49 €
Produktbild für IoT Development for ESP32 and ESP8266 with JavaScript

IoT Development for ESP32 and ESP8266 with JavaScript

This book introduces a new approach to embedded development, grounded in modern, industry-standard JavaScript. Using the same language that powers web browsers and Node.js, the Moddable SDK empowers IoT developers to apply many of the same tools and techniques used to build sophisticated websites and mobile apps.The Moddable SDK enables you to unlock the full potential of inexpensive microcontrollers like the ESP32 and ESP8266. Coding for these microcontrollers in C or C++ with the ESP-IDF and Arduino SDKs works for building basic products but doesn't scale to handle the increasingly complex IoT products that customers expect. The Moddable SDK adds the lightweight XS JavaScript engine to those traditional environments, accelerating development with JavaScript while keeping the performance benefits of a native SDK.Building user interfaces and communicating over the network are two areas where JavaScript really shines. _IoT Development for ESP32 and ESP8266 with JavaScript_ shows you how to build responsive touch screen user interfaces using the Piu framework. You'll learn how easy it is to securely send and receive JSON data over Wi-Fi with elegant JavaScript APIs for common IoT protocols, including HTTP/HTTPS, WebSocket, MQTT, and mDNS. You'll also learn how to integrate common sensors and actuators, Bluetooth Low Energy (BLE), file systems, and more into your projects, and you'll see firsthand how JavaScript makes it easier to combine these diverse technologies.If you're an embedded C or C++ developer who has never worked in JavaScript, don't worry. This book includes an introduction to the JavaScript language just for embedded developers experienced with C or C++.WHAT YOU'LL LEARN* Building, installing, and debugging JavaScript projects on the ESP32 and ESP8266* Using modern JavaScript for all aspects of embedded development with the Moddable SDK* Developing IoT products with animated user interfaces, touch input, networking, BLE, sensors, actuators, and moreWHO THIS BOOK IS FOR* Professional embedded developers who want the speed, flexibility, and power of web development in their embedded software work* Makers who want a faster, easier way to build their hobby projects* Web developers working in JavaScript who want to extend their skills to hardware productsPETER HODDIE is an engineer and entrepreneur focused on client software. He is recognized for crafting compact and efficient code that pushes the boundaries of user experience on consumer hardware. The software he and his teams have built has powered mass-market consumer products from companies including Apple, Palm, Sling, HP, and Sony. Peter recognizes that the first users of any product are the developers creating it, and that those developers cannot build compelling consumer products on a foundation that’s unstable, complex, or confusing. He therefore champions investments in great tools and a simple runtime architecture.Peter has founded several companies, including Kinoma, which merged into Marvell Semiconductor. He led QuickTime development at Apple during the 1990s as a Distinguished Engineer. He contributed to the development of the QuickTime file format and its adoption by ISO into the MPEG-4 standard. He is currently a member of the JavaScript language standards committee (ECMA TC39) and chair of ECMA TC53 for "Smart wearable systems and sensor-based devices". Peter is particularly proud of his work putting both the KinomaJS framework and Darwin Streaming Server into open source. He continues to come to terms with the 10 patents that bear his name.LIZZIE PRADER is an engineer whose educational background is in theoretical computer science, but is currently better described as an engineer focused on developers’ needs. She recognizes the importance of customer support during all stages of a project, and enjoys working with developers to smooth the on-ramp to embedded development. Working with users of all skill levels—from professional engineers to makers and hobbyists to absolute programming beginners—has made her an advocate of well-organized documentation and readable code.Prior to Moddable, Lizzie worked as a developer relations engineer at Kinoma. Her main goal was to help customers get the most out of Kinoma’s software and hardware prototyping products, both through direct contact with developers and by creating a variety of resources including sample code, tutorials, and blog postsChapter 1: Getting StartedThe goal of this section is to get the reader set-up with the hardware, development environment, and their basic JavaScript skills. This equips them to run the examples in the remaining chapters.Chapter 2: NetworkingThe goal of this section is to teach the reader how to use Wi-Fi to communicate with cloud services and other devices. It provides guidance on when it is appropriate to use the various network services. It also explains how to use standard JSON to communicate with network services.Chapter 3: Bluetooth Low Energy (BLE)This is the only chapter which only applies to the ESP32, as the ESP8266 does not have BLE hardwareChapter 4: Files and DataThis section explains how to access and store data. In addition to introducing the file system, it explains why a file system isn’t always the best choice for an IoT product and introduces alternativesChapter 5: Working with hardware (Sensors and actuators)This section introduces the hardware protocols supported by the Moddable SDK and gets the reader started with a few sensors and actuators. In addition to demonstrating how to use a few specific sensors, it provides guidance on how to build JavaScript modules for other off-the-shelf sensors. This chapter introduces Timers, a common tool for working with hardware used to delay operations and perform periodic actions.Chapter 6: Graphics for IoTThis chapter explains why graphical user interfaces are a valuable addition to IoT products. It introduces the fundamentals of working with graphics on MCUs that were not designed to support graphics. The reader will learn about key performance bottlenecks so that they will have the knowledge needed to build modern graphical displays for their IoT projects using the ESP8266 and ESP32. The chapter also describes the relationship between the Commodetto Graphics Library and the Piu User Interface framework so the reader can choose the tool that is best for their project.Chapter 7: Commodetto Graphics LibraryThis section introduces use of the Commodetto graphics library to build user displays. It contains examples of using each graphic operation provided by the Poco rendering engine.Chapter 8: Piu User Interface FrameworkThis section provides an overview of the Piu user interface framework and examples of the most commonly used objects from the Piu APIChapter 9: Adding native codeThis section describes how to increase the performance and features of the reader’s IoT projects through the strategic use of native C code. It teaches how to integrate C code into a JavaScript application. It provides guidance on when it is appropriate to use C code, by explaining the benefits and risks of using native code.Chapter 10: SecurityChapter 11: What’s Next?This section covers a few advanced topics and provides links to additional developer resources. The goal is to provide readers with the information necessary to move on to developing more complex and customizable applications.

Regulärer Preis: 56,99 €
Produktbild für Securing Critical Infrastructures

Securing Critical Infrastructures

This book explains the modern techniques required to protect a cyber security critical infrastructure. Three fundamental techniques are presented, namely: network access control, physical access control, encryption and decryption techniques.Dr. Kamara had won two awards for community building in higher education and is an author of two other books:The Implications of Internet Usage, 2013The Impacts of Cognitive Theory on Human and Computer Science Development, 2016

Regulärer Preis: 3,49 €
Produktbild für Preisfindung und Konditionstechnik mit SAP

Preisfindung und Konditionstechnik mit SAP

Geht nicht gibt’s nicht! In diesem Buch lernen Sie, wie Sie die Preisfindung in Ihrem Unternehmen einrichten und optimieren, um sowohl alltägliche als auch fortgeschrittene Anforderungen zu erfüllen. Das Autorenteam führt Sie von den Grundlagen der Konditionstechnik über das Standard-Customizing bis tief in die kundenindividuellen Anpassungen, die Ihnen das SAP-System ermöglicht. Sie erfahren, wie Sie mit Konditionssätzen, Kalkulationsschemata und Co. arbeiten. Nutzen Sie die detaillierten Informationen zu Formeln und Bedingungen, und setzen Sie auch die kniffligsten Wünsche der Vertriebskollegen in SD um. Aus dem Inhalt: Einsatzgebiete und Elemente der KonditionstechnikKonditionsstammdaten der PreisfindungAuswertungen und ArbeitsvorräteCustomizing der PreisfindungArbeiten mit KonditionssätzenPreisfindung im VertriebsbelegKalkulationsschemata und KonditionsartenWichtige Programme der PreisfindungTypische Praxisanforderungen an die PreisfindungBonusabwicklungKonditionssteckbriefe   Einleitung ... 21 Teil I.  Konditionstechnik ... 27   1.  Einsatzgebiete und Elemente der Konditionstechnik ... 29        1.1 ... Eigenschaften von Konditionen ... 30        1.2 ... Einsatzgebiete der Konditionstechnik (Konditionsverwendung) ... 31        1.3 ... Ausgewählte Einsatzgebiete (Verwendungen) ... 33        1.4 ... Anwendungsbereiche der Konditionstechnik (Konditionsapplikation) ... 37        1.5 ... Elemente der Konditionstechnik im Überblick ... 40        1.6 ... Feldkatalog und Kommunikationsstrukturen ... 42        1.7 ... Konditionstabellen ... 43        1.8 ... Zugriffsfolgen ... 45        1.9 ... Konditionsarten ... 56        1.10 ... Konditionsstammdaten ... 57        1.11 ... Kalkulationsschemata ... 62        1.12 ... Findungsanalyse ... 63        1.13 ... Bedingungen ... 64        1.14 ... Gesamtablauf im Überblick ... 66        1.15 ... Fazit ... 67   2.  Konditionsstammdaten der Preisfindung ... 69        2.1 ... Konditionspflege über die Konditionsart ... 69        2.2 ... Konditionspflege über Bereichsmenüs ... 74        2.3 ... Konditionspflege über den Index ... 78        2.4 ... Absprachen ... 79        2.5 ... Preisvereinbarungen ... 83        2.6 ... Fazit ... 84   3.  Auswertungen und Arbeitsvorräte ... 85        3.1 ... Konditionslisten ... 85        3.2 ... Arbeitsvorräte in der Rolle »Vertriebsmitarbeiter im Innendienst« ... 92        3.3 ... Konditionsinfo ... 98        3.4 ... Nettopreisliste ... 99        3.5 ... Performanceoptimierte Preisliste ... 101        3.6 ... Fazit ... 129 Teil II.  Preisfindung ... 131   4.  Customizing der Preisfindung ... 133        4.1 ... Umsetzung eines ersten kundenindividuellen Preisfindungsszenarios ... 133        4.2 ... Elemente der Preisfindung im Detail ... 149        4.3 ... Kundenindividuelle Anpassungen und Kundennamensräume ... 168        4.4 ... Beispiel für die Umsetzung komplexerer Anforderungen ... 172        4.5 ... Konfigurierbare Formeln und Parameter ... 175        4.6 ... Anbindung an die Ergebnis- und Marktsegmentrechnung (COPA) ... 199        4.7 ... Fazit ... 200   5.  Arbeiten mit Konditionssätzen ... 203        5.1 ... Freigabestatus ... 203        5.2 ... Massenänderungen/Anlegen mit Bezug ... 208        5.3 ... Kopieren von Konditionen ... 212        5.4 ... Konditionspflege mit Bereichsmenüs ... 216        5.5 ... Weitere Funktionen innerhalb der Konditionspflege ... 218        5.6 ... Fazit ... 223   6.  Preisfindung im Vertriebsbeleg ... 225        6.1 ... Positionskonditionsbild ... 225        6.2 ... Kopfkonditionsbild ... 234        6.3 ... Vordefinierte Preiselemente in der Positionsübersicht ... 237        6.4 ... Preisvereinbarungen ... 238        6.5 ... Preisfindung beim Anlegen von Belegen mit Referenz ... 242        6.6 ... Preisfindung bei Miet- und Wartungsverträgen (periodischer Fakturierungsplan) ... 243        6.7 ... Preisfindung bei Festbetragverträgen (Meilensteinfakturierungsplan) ... 247        6.8 ... Preisfindung bei der Aufwandsabrechnung ... 252        6.9 ... Fazit ... 253   7.  Spezielle Funktionen der Preisfindung ... 255        7.1 ... Gruppenkonditionen ... 255        7.2 ... Konditionsausschluss ... 258        7.3 ... Konditionsupdate ... 263        7.4 ... Steuerermittlung im Vertrieb ... 266        7.5 ... Naturalrabatt im Vertrieb ... 272        7.6 ... Kosten des Verkaufsvorgangs ... 275        7.7 ... Währungsumrechnungen im Vertrieb ... 279        7.8 ... Druckaufbereitung des Preisfindungsergebnisses ... 287        7.9 ... Fazit ... 292 Teil III.  Weiterführende technische Grundlagen, Tipps und Tricks ... 293   8.  Ausgewählte Kalkulationsschemata und Konditionsarten ... 295        8.1 ... Ausgewählte Kalkulationsschemata ... 297        8.2 ... Ausgewählte Konditionsarten des Standardschemas ... 313        8.3 ... Fazit ... 317   9.  Besonderheiten der Konditionstechnik in der Preisfindung ... 319        9.1 ... Schnittstellen, Tabellen und Zusammenhänge ... 320        9.2 ... Datenermittlung über Konditionen ... 325        9.3 ... Felder mit Mehrfachbelegung ... 345        9.4 ... Fazit ... 349 10.  Wichtige Programme der Preisfindung ... 351        10.1 ... Funktionsbaustein PRICING ... 352        10.2 ... Funktionsbaustein PRICING_COMPLETE ... 364        10.3 ... Funktionsbaustein PRICING_COPY ... 374        10.4 ... Datenablage des Preisfindungsergebnisses ... 375        10.5 ... Funktionsbaustein PRICING_REFRESH ... 376        10.6 ... Dialoganbindung/weitere Funktionsbausteine ... 377        10.7 ... Zusammenhang der Komponenten der Preisfindung ... 378        10.8 ... Fazit ... 379 11.  Systemanpassungen mit Bedingungen, Formeln und User-Exits ... 381        11.1 ... Preisfindungsarten ... 383        11.2 ... Bedingungen ... 384        11.3 ... Ein Beispiel für den Einsatz der Formeln ... 388        11.4 ... Konditionsformeln ... 393        11.5 ... Sonderlogik der Preisfindungsart F in der Routine »xkomv_bewerten« ... 403        11.6 ... Preisfindungsergebnis in KOMP ... 405        11.7 ... Steuerungskennzeichen »xkomv-ksteu« ... 411        11.8 ... User-Exits ... 413        11.9 ... Erweiterungen der Tabelle KONV ... 420        11.10 ... Performanceaspekte ... 421        11.11 ... Fehlermeldungen/Fehlerbehandlung ... 422        11.12 ... Fazit ... 424 12.  Typische Praxisanforderungen an die Preisfindung und ihre Lösung ... 425        12.1 ... Budgetierungsanforderungen ... 426        12.2 ... Konditionen wurden nicht gefunden -- woran liegt das? ... 436        12.3 ... Rundung ... 438        12.4 ... Preise mit mehr als zwei Nachkommastellen ... 439        12.5 ... Behandlung von Frachtzuschlägen ... 440        12.6 ... Berechtigungsabhängigkeit des Konditionsbildes ... 444        12.7 ... Aufnahme neuer Zwischensummenfelder ... 444        12.8 ... Stammdatenfelder datumsabhängig pflegen ... 444        12.9 ... Kopierte Konditionen und anschließende Mengenänderung ... 449        12.10 ... Gesteigerte Preise in Retouren und Gutschriften ... 455        12.11 ... Kennzahlen für Reporting und Analyse ... 457        12.12 ... Konditionssatzspezifische Bedingungen ... 473        12.13 ... Fazit ... 485 13.  Preisfindung in ausgewählten Applikationen ... 487        13.1 ... Preisfindung im Kundenauftrag ... 488        13.2 ... Preisfindung in der Faktura ... 494        13.3 ... Preisfindung in der Bestellung ... 495        13.4 ... Preisfindung im Rechnungswesen ... 499        13.5 ... Steuerberechnung in der Finanzbuchhaltung ... 500        13.6 ... Preisfindung in der Transportabwicklung (Frachtkalkulation) ... 506        13.7 ... Fazit ... 507 14.  Performance und Test ... 509        14.1 ... SAP-Tabellenpuffer ... 510        14.2 ... Konditions-Prestep und Zugriffsoptimierung ... 511        14.3 ... Reihenfolge der Felder in den Konditionstabellen ... 513        14.4 ... Einsatz von Bedingungen ... 514        14.5 ... Gruppenkonditionen und Formeln ... 514        14.6 ... Besonderheiten in Kundenauftrag und Faktura ... 515        14.7 ... Analyse-Tools ... 522        14.8 ... Testen ... 523        14.9 ... Fazit ... 526 15.  Preisfindung in SAP S/4HANA ... 527        15.1 ... Überblick über SAP S/4HANA ... 527        15.2 ... Unterschiede und Gemeinsamkeiten von SAP ERP und SAP S/4HANA ... 530        15.3 ... Migration nach SAP S/4HANA ... 541        15.4 ... Preisfindung in SAP S/4HANA Cloud ... 545        15.5 ... Fazit ... 554 Teil IV.  Bonusabwicklung im Vertrieb ... 555 16.  Bonusabwicklung im Vertrieb ... 557        16.1 ... Übersicht über die Bonusabwicklung ... 557        16.2 ... Elemente der Bonusabwicklung im Detail ... 579        16.3 ... Erweiterte Bonusverarbeitung ... 599        16.4 ... Systemanpassungen im Bonusumfeld ... 610        16.5 ... Typische Praxisanforderungen ... 616        16.6 ... Fazit ... 619   Anhang ... 621   A.  Konditionssteckbriefe ... 622   B.  SAP-CRM-Anbindung ... 670   C.  Die Autoren ... 674   Index ... 676

Regulärer Preis: 89,90 €
Produktbild für SAP Integrated Business Planning

SAP Integrated Business Planning

Mit diesem Buch steuern Sie Ihre Supply Chain schnell und lückenlos. Zunächst lernen Sie die verschiedenen Prozesse, Bestandteile sowie die Konfiguration von SAP Integrated Business Planning for Supply Chain im Detail kennen. Anschließend zeigen Ihnen die Autoren, wie Sie das Tool für die bereichsübergreifende Echtzeitplanung und -analyse Ihrer gesamten Lieferkette einsetzen. Best Practices unterstützen Sie bei Ihrem Implementierungsprojekt. Aus dem Inhalt: User Interfaces von SAP IBPVerwendung von Stamm- und BewegungsdatenExcel-Konfiguration Sales and Operations PlanningDemand PlanningInventory PlanningSupply and Response PlanningSupply Chain Control Tower AnalyticsSAP JamZeit- und auftragsbasierte SchnittstellenBest Practices: Rapid Deployment Solutions   Einleitung ... 15   1.  Betriebswirtschaftliche Einordnung ... 19        1.1 ... Prozesse der Supply-Chain-Planung ... 19        1.2 ... Überblick über SAP IBP ... 27        1.3 ... Integrierte Beispiele (Best Practice) ... 38   2.  Benutzeroberflächen ... 45        2.1 ... Browserbasierte Benutzeroberflächen (Web UIs) ... 45        2.2 ... Microsoft Excel ... 61   3.  Grundlagen der übergreifenden Konfiguration ... 101        3.1 ... Attribute ... 101        3.2 ... Stammdatentypen ... 106        3.3 ... Zeitprofile ... 116        3.4 ... Planungsbereiche ... 131        3.5 ... Planungsebenen ... 156        3.6 ... Kennzahlen ... 161        3.7 ... Versionen ... 168        3.8 ... Planungsoperatoren ... 170        3.9 ... Globale Konfiguration ... 176        3.10 ... Aktivierung von Planungsmodellen ... 178   4.  Sales and Operations Planning mit SAP IBP ... 185        4.1 ... Überblick und Ziele ... 185        4.2 ... Funktionen von SAP IBP für Sales and Operations ... 189        4.3 ... Der S&OP-Prozess mit SAP IBP ... 205        4.4 ... Konfiguration und Einstellungen in SAP IBP für Sales and Operations ... 224   5.  Absatzplanung mit SAP IBP für Demand ... 251        5.1 ... Überblick und Ziele ... 251        5.2 ... Klassische Absatzplanung mit SAP IBP für Demand ... 254        5.3 ... Demand Sensing mit SAP IBP für Demand ... 271        5.4 ... Konfiguration von SAP IBP für Demand ... 277   6.  Bestandsplanung mit SAP IBP für Inventory ... 313        6.1 ... Einführung in die Bestandsplanung ... 313        6.2 ... Konfiguration von SAP IBP für Inventory ... 317   7.  Demand-Driven Materials Requirement Planning ... 379        7.1 ... Überblick und Ziele ... 379        7.2 ... Der DDMRP-Prozess mit SAP IBP ... 381        7.3 ... SAP IBP für Demand-Driven Replenishment konfigurieren ... 384   8.  Bestätigungs- und Beschaffungsplanung mit SAP IBP für Response and Supply ... 405        8.1 ... Basiseinstellungen ... 407        8.2 ... Priorisierung der Bedarfe ... 424        8.3 ... Beschaffungs- und Kontingentierungsplanung ... 427        8.4 ... Bestätigungsplanung ... 439        8.5 ... Deployment ... 443        8.6 ... Simulations- und Szenarioplanung ... 444        8.7 ... Konfiguration der Response-and-Supply-Planung ... 446   9.  SAP Supply Chain Control Tower ... 511        9.1 ... SAP Supply Chain Control Tower -- Ziele und Funktionen ... 511        9.2 ... Konfiguration des SAP Supply Chain Control Towers ... 521 10.  SAP Jam ... 539        10.1 ... Integration von SAP Jam in SAP IBP ... 540        10.2 ... Funktionen von SAP Jam ... 549 11.  Datenintegration in SAP IBP ... 561        11.1 ... Zeitreihenbasierte Integration ... 562        11.2 ... Auftragsbasierte Integration ... 590        11.3 ... Integration mit SAP Ariba ... 615   Das Autorenteam ... 619   Index ... 621

Regulärer Preis: 79,90 €
Produktbild für Controlling in SAP S/4HANA

Controlling in SAP S/4HANA

Mit diesem Buch meistern Sie die tägliche Arbeit im Controlling mit SAP S/4HANA! Anhand anschaulicher Beispiele leitet es Sie durch den Wertefluss im SAP-System: Sie lernen, wie Sie eine aussagekräftige Kostenstellenrechnung aufbauen sowie Ihre Produkte und Dienstleistungen kalkulieren. Außerdem erfahren Sie, was das Zusammenwachsen von FI und CO für Sie bedeutet und welche neuen Planungs-, Analyse- und Reportingmöglichkeiten Ihnen zur Verfügung stehen. Viele praktische Beispiele und Tipps unterstützen Sie dabei, die Möglichkeiten des Systems voll auszuschöpfen. Aus dem Inhalt: Stammdaten und OrganisationsstrukturenUniversal JournalGemeinkostencontrollingKostenstellenrechnungInnenauftragsrechnungProduktkostenplanungKostenträgerrechnungErgebniscontrollingDeckungsbeitragsrechnung   Vorwort ... 13   Einleitung ... 15   1.  Integration von Controlling und Finanzbuchhaltung ... 21        1.1 ... Verschmelzung des Controllings mit der Finanzbuchhaltung im Universal Journal ... 22        1.2 ... Verknüpfung von Stammdaten der Finanzbuchhaltung und des Controllings ... 24        1.3 ... Zusammenfassung ... 27   2.  Organisationsstruktur in Controlling und Finanzbuchhaltung ... 29        2.1 ... Organisationsstrukturen in der Finanzbuchhaltung ... 30        2.2 ... Organisationsstrukturen im Controlling ... 38        2.3 ... Zusammenfassung ... 47   3.  Werteflüsse in das Controlling ... 49        3.1 ... Schnittstellen zur Finanzbuchhaltung ... 49        3.2 ... Schnittstellen zur Materialwirtschaft ... 60        3.3 ... Schnittstellen zur Produktion ... 75        3.4 ... Schnittstellen zum Vertrieb ... 82        3.5 ... Zusammenfassung ... 91   4.  Stammdaten anlegen und pflegen ... 93        4.1 ... Kostenarten ... 94        4.2 ... Bilanz-/GuV-Strukturen, Gruppen und Hierarchien für Kostenarten anlegen und pflegen ... 109        4.3 ... Kostenstellen gruppieren ... 113        4.4 ... Kostenstellen anlegen und pflegen ... 117        4.5 ... Leistungsarten anlegen und pflegen ... 129        4.6 ... Statistische Kennzahlen anlegen und pflegen ... 134        4.7 ... Innenaufträge anlegen und pflegen ... 137        4.8 ... Projekte anlegen und pflegen ... 150        4.9 ... Zusammenfassung ... 161   5.  Gemeinkosten-Controlling ... 163        5.1 ... Kostenstellenrechnung ... 163        5.2 ... Innenaufträge ... 203        5.3 ... Zusammenfassung ... 270   6.  Produktkosten-Controlling ... 271        6.1 ... Produktkostenkalkulation ... 272        6.2 ... Kostenträgerrechnung ... 349        6.3 ... Reporting im Produktkosten-Controlling ... 382        6.4 ... Zusammenfassung ... 404   7.  Ergebnisrechnung ... 405        7.1 ... Einführung in die Ergebnisrechnung ... 406        7.2 ... Grundeinstellungen ... 413        7.3 ... Istwertefluss ... 450        7.4 ... Reporting ... 516        7.5 ... Predictive Accounting in SAP S/4HANA ... 524        7.6 ... Zusammenfassung ... 533   Anhang ... 535        A ... Glossar ... 537        B ... Transaktionen und SAP-Fiori-Apps ... 547        C ... Weiterführende Informationsquellen ... 553        D ... Die Autorinnen ... 559   Index ... 561

Regulärer Preis: 79,90 €
Produktbild für User Experience mit SAP

User Experience mit SAP

Benutzerfreundliche, anforderungsorientierte SAP-Oberflächen? Nichts leichter als das! In diesem Buch lernen Sie Methoden und Best Practices kennen, mit denen der Fokus der Entwicklung von Anfang an auf den Erwartungen der Anwender liegt. Die Autoren zeigen Ihnen, wie Sie mit SAP-Fiori-Design und modernen SAP-Technologien Anwendungen erstellen, die der digitalen Transformation in Ihrem Unternehmen den Weg bereiten. Aus dem Inhalt: User Experience, Usability und DesignUX-Fehlgriffe und was man daraus lernen kannKonzepte von SAP Fiori 3.0Methoden und TechnikenDesigngetriebene EntwicklungPrototyping, Umsetzung und EvaluationSAP Screen PersonasSAP Fiori ElementsSAP Mobile Cards und Mobile Development Kit (MDK)SAP Cloud Platform SDK for iOSSAP CoPilot und SAP Conversational AIAugmented Reality und weitere UI-Trends   Vorwort ... 15   Einleitung ... 17 TEIL I  Einführung ... 23   1.  Was ist eigentlich User Experience? ... 25        1.1 ... User Experience, Usability und UI-Design ... 26        1.2 ... User Experience in Zeiten von Marken, Innovationen und Social Media ... 34        1.3 ... Zusammenfassung ... 36   2.  Dos and Don'ts: Faktoren für gute User Experience ... 37        2.1 ... Drei Beispiele für User Experience und was man daraus lernen kann ... 38        2.2 ... Einflussfaktoren für User Experience ... 50        2.3 ... Gute User Experience ist kein Zufall ... 53        2.4 ... Zusammenfassung ... 58   3.  SAPs Weg zur neuen User Experience ... 61        3.1 ... Rückblick: die Zeit vor SAP Fiori ... 61        3.2 ... SAP Fiori - SAP entdeckt User Experience ... 69        3.3 ... SAP Fiori 2.0 - die SAP S/4HANA User Experience ... 81        3.4 ... SAP Fiori 3 - konsistent, intelligent und integriert ... 88        3.5 ... Zusammenfassung ... 95 TEIL II  UX-Strategie, -Methoden und -Techniken ... 97   4.  Mit Experience Management zum intelligenten Unternehmen ... 99        4.1 ... SAP S/4HANA als Mittelpunkt der Intelligent Suite ... 100        4.2 ... Neuer Kurs für Ihre UX-Strategie ... 111        4.3 ... Zusammenfassung ... 119   5.  Die passende UX-Strategie ... 121        5.1 ... Blaupause für den UX-Designprozess ... 122        5.2 ... Die Rolle des UX-Designers ... 131        5.3 ... Design Thinking und ein nutzerorientierter Designprozess ... 135        5.4 ... UX-Methoden ... 137        5.5 ... Stolpersteine umgehen ... 156        5.6 ... Zusammenfassung ... 159   6.  Ein Blick in den SAP-Baukasten ... 161        6.1 ... SAP-UI-Technologien und UX-Werkzeuge im Überblick ... 162        6.2 ... SAP Cloud Platform ... 168        6.3 ... Wichtige UI-Technologien ... 172        6.4 ... Werkzeuge ... 180        6.5 ... Einstiegspunkte und Clients ... 184        6.6 ... Auswahl der richtigen UX-Technologie ... 188        6.7 ... Zusammenfassung ... 189 TEIL III  User Experience gestalten ... 191   7.  Klassische Transaktionen mit SAP Screen Personas transformieren ... 193        7.1 ... Einsatzszenarien und Zielgruppe von SAP Screen Personas ... 194        7.2 ... Mit SAP Screen Personas arbeiten ... 208        7.3 ... Praxisbeispiel: Redesign einer SAP-Transaktion für Instandhaltungsprozesse ... 222        7.4 ... Zusammenfassung ... 235   8.  Vorgefertigte User Experience: SAP Fiori Elements und SAP Build ... 237        8.1 ... Einführung in SAP Fiori Elements ... 238        8.2 ... Entwicklung von Apps mit SAP Fiori Elements ... 255        8.3 ... Praxisbeispiel: Entwicklung einer Raumplanungs-App ... 271        8.4 ... Zusammenfassung ... 291   9.  Eigene SAP-Fiori-Apps entwickeln ... 293        9.1 ... Standard oder Eigenentwicklung? Einsatzmöglichkeiten für SAP-Fiori-Design und SAPUI5 ... 294        9.2 ... Praxisbeispiel 1: High-Fidelity-Prototyping mit Axure RP und SAP Fiori Design Stencils ... 308        9.3 ... Praxisbeispiel 2: Design von SAP-Fiori-Apps für das Smart-Carrier-Projekt ... 316        9.4 ... Zusammenfassung ... 329 10.  SAP aus der Brieftasche: SAP Mobile Cards und Mobile Development Kit ... 331        10.1 ... Einführung in die SAP Cloud Platform Mobile Services ... 332        10.2 ... Eine OData-Service-Applikation zur Datenanbindung anlegen ... 335        10.3 ... Mobile Cards entwickeln ... 340        10.4 ... Cross-Plattform-Apps mit dem Mobile Development Kit entwickeln ... 352        10.5 ... Praxisbeispiel: Gestaltung eines innovativen Prozesses zur effizienten Raumnutzung ... 362        10.6 ... Zusammenfassung ... 370 11.  Eine mobile iOS-App: SAP Cloud Platform SDK for iOS ... 373        11.1 ... Besonderheiten der mobilen Entwicklung ... 374        11.2 ... Einführung in das SAP Cloud Platform SDK for iOS ... 384        11.3 ... Praxisbeispiel: Design einer Produktkatalog-App für iOS ... 409        11.4 ... Zusammenfassung ... 431 TEIL IV  Design- und Technologietrends für die User Experience der Zukunft ... 433 12.  Smarte Assistenten im Geschäftsumfeld: SAP Conversational AI ... 435        12.1 ... Conversational User Experience ... 436        12.2 ... SAP Conversational AI ... 439        12.3 ... Praxisbeispiel: Entwicklung eines Chatbots mit SAP Conversational AI ... 443        12.4 ... Von SAP CoPilot zu SAP Conversational AI ... 450        12.5 ... Best Practices für die Designphase von Conversational-UX-Anwendungen ... 452        12.6 ... Zusammenfassung ... 456 13.  User Experience für Geschäftsanwendungen der Zukunft ... 459        13.1 ... Interaktion per Stift ... 460        13.2 ... Interaktion mit virtuellen Objekten ... 465        13.3 ... Zusammenfassung ... 486   A.  Weiterführende Literatur und Quellen ... 489   B.  Die Autoren ... 497   Index ... 499

Regulärer Preis: 79,90 €
Produktbild für Developing Inclusive Mobile Apps

Developing Inclusive Mobile Apps

By failing to consider those with needs different to ourselves, we are telling these people they are not welcome in our app, and therefore that technology as a whole, is not for them. This is not hyperbole—23% of people in the US with a registered disability aren't online at all, that's three times more likely than the general population. When asked why they're not online, disabled respondents say their disability prevents them or that using the internet is too hard.To help your apps combat the issue of digital exclusion, this book covers considerations and tools mobile developers, or anyone creating mobile experiences, can use to make mobile work better for those with disabilities—mental or physical—and how to create a better experience for everyone.Software is not made up of cold, unthinking algorithms. Software is a craft in the truest sense of the word, and one of the greatest tools you can have as a craftsperson is empathy for the people who will be using your app. Each one of whom is an individual with different abilities, experiences, knowledge, and circumstances.WHAT YOU'LL LEARN* Create mobile experiences that work for as many people as possible* Incorporate a worldview of accessibility and customer service into your design* Work with accessibility tools and techniques commonly available for developersWHO THIS BOOK IS FORMobile developers working solo or as part of a team. UX designers, quality engineers, product owners, and anybody working in mobile.ROB WHITAKER is an iOS software development engineer at Capital One UK with a passion for improving digital experiences for everyone. He actively observes how people use technology, and considers how we can all make those interactions better. Currently he’s working on a project to make the Capital One UK app the first mobile app certified by the RNIB (Royal National Institute for Blind People).Chapter 1: What is Accessibility?• Intro to accessibility - great accessibility is a great experience for everyone• Intro to disability - ie, its not all visual• Why mobile is the best for accessible innovationChapter 2: What is Digital Inclusion?• Brief history of accessible thinking• Inclusive design & the persona spectrum• EmpathyChapter 3: Accessibility Tools on Android• Brief overview of the accessibility features & tools built into Android. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 4: Accessibility Tools for iOS• Brief overview of the accessibility features & tools built into iOS. What these mean for users, and how to leverage them as developers• Including code snippetsChapter 5: Ensuring good accessibility• User research• Testing with accessibility toolsChapter 6: Visual Impairments• Practical tips for improving the experience for people with visual impairments• Including code snippetsChapter 7: Motor issues• Practical tips for improving the experience for people with motor issues• Including code snippetsChapter 8: Deaf & Hard of Hearing• Practical tips for improving the experience for people with auditory impairments• Including code snippetsChapter 9: Anxiety & Mental Health• Practical tips for improving the experience for people with visual mental health issues• Including code snippetsChapter 10: Dyslexia, Autism and Learning Difficulties• Practical tips for improving the experience for people with learning difficulties• Including code snippetsChapter 11: Poor Digital Skills• Good accessibility is not just about disability, but ability too• What skills are essential for digital life, and how do we measure up• Practical tips for improving the experience for people with poor digital skillsChapter 12: Life Circumstances• Good accessibility is not just about disability, but people's circumstances too• How circumstances such as low income, poor education etc can affect your digital interactions• Practical tips for improving the experience for people with with difficult life circumstancesChapter 13: Age, Gender & Sexuality• Theres a huge gap in digital use between 18 year olds, and those aged 60+.• How do we make sure we're not prejudicing based on age or experience, gender or sexuality when creating softwareChapter 14: Internationalization

Regulärer Preis: 56,99 €
Produktbild für Cloud Debugging and Profiling in Microsoft Azure

Cloud Debugging and Profiling in Microsoft Azure

Use this collection of best practices and tips for assessing the health of a solution. This book provides detailed techniques and instructions to quickly diagnose aspects of your Azure cloud solutions.The initial chapters of this book introduce you to the many facets of Microsoft Azure, explain why and how building for the cloud differs from on-premise development, and outline the need for a comprehensive strategy to debugging and profiling in Azure. You learn the major types of blades (FaaS, SaaS, PaaS, IaaS), how different views can be created for different scenarios, and you will become familiar with the Favorites section, Cost Management & Billing blade, support, and Cloud Shell. You also will know how to leverage Application Insights for application performance management, in order to achieve a seamless cloud development experience. Application Insights, Log Analytics, and database storage topics are covered. The authors further guide you on identity security with Azure AD and continuous delivery with CI and CD covered in detail along with the capabilities of Azure DevOps. And you are exposed to external tooling and trouble shooting in a production environment.After reading this book, you will be able to apply methods to key Azure services, including App Service (Web Apps, Function Apps,and Logic Apps), Cloud Services, Azure Container Service, Azure Active Directory, Azure Storage, Azure SQL Database, Cosmos DB, Log Analytics, and many more.WHAT YOU WILL LEARN* Debug and manage the performance of your applications* Leverage Application Insights for application performance management* Extend and automate CI/CD with the help of various build tools, including Azure DevOps, TeamCity, and Cake bootstrapperWHO THIS BOOK IS FORApplication developers, designers, and DevOps personnel who want to find a one-stop shop in best practices for managing their application’s performance in the cloud and for debugging the issues accordinglyJEFFREY CHILBERTO is a software consultant specializing in the Microsoft technical stack, including Azure, BizTalk, MVC, WCF, and SQL Server. He has enterprise development experience in a wide range of industries, including banking, telecommunications, and healthcare in the USA, Europe, Australia, and New Zealand.SJOUKJE ZAAL is a managing consultant, Microsoft Cloud architect, and Microsoft Azure MVP with over 15 years of experience providing architecture, development, consultancy, and design expertise. She works at Capgemini, a global leader in consulting, technology services, and digital transformation.GAURAV ARORAA is a serial entrepreneur and startup mentor. He has a MPhil in computer science, and is a Microsoft MVP award recipient. He is a lifetime member of the Computer Society of India (CSI), an advisory member and senior mentor of IndiaMentor, certified as a Scrum trainer/coach, ITIL-F certified, and PRINCE-F and PRINCE-P certified. He is an open source developer, and a contributor to the Microsoft TechNet community. Recently, he was awarded the Icon of the Year for Excellence in Mentoring Technology Startups for the 2018-19 by Radio City, which is a Jagran Initiative, for his extraordinary work during his career of 22 years in the industry and the field of technology mentoring.ED PRICE is Senior Program Manager in Engineering at Microsoft, with an MBA in technology management. He ran Microsoft customer feedback programs for Azure Development and Visual Studio. He also was a technical writer at Microsoft for six years, helped lead TechNet Wiki, and now leads efforts to publish key guidance from AzureCAT (Customer Advisory Team).CHAPTER 1: Building Solutions in the Azure CloudCHAPTER GOAL: The first chapter will introduce the reader to the many facets of Microsoft Azure, why and how building for the cloud differs from on-prem development, and the need for a comprehensive strategy to debugging and profiling in Azure.We will cover the major types of blades (FaaS, SaaS, PaaS, IaaS).NO OF PAGES: 20SUB -TOPICS1. Microsoft Azure overview2. FaaS (Functions as a Service/Code as a Service) – a tour of Azure Functions and Logic Apps3. SaaS (Software as a Service) – Web Apps, Office3654. PaaS (Platform as a Service) – Cloud Services5. IaaS (Infrastructure as a Service) – Virtual Machines, SQL ServerChapter 2: The Azure PortalCHAPTER GOAL: The different Azure blades have many common features. This chapter will explore the Azure portal and some of the common features. The dashboard will be explained and how different views can be created for different scenarios. The Favorites section, the Cost Management & Billing blade, support, and Cloud Shell will all be introduced. The goal of the chapter is to get the reader comfortable with navigating the portal and feeling less overwhelmed, especially if this is the first time they’ve used the portal.NO OF PAGES: 35SUB - TOPICS1. Azure portal – what is a blade?2. Dashboard3. Navigation – favorites, subscription filtering, and searching4. You’re not alone – help and support5. Cost management6. Cloud shellChapter 3: Services in the CloudCHAPTER GOAL: Using examples in Azure Functions and Logic Apps, this chapter will provide an example of building an Azure Function and calling it from a Logic App. The logging and debugging capabilities will be explored in the appropriate blades.NO OF PAGES: 25SUB - TOPICS1. What is serverless?2. Azure Functions* Logic Apps* Using tags for billing Chapter 4: Application Insights and Log AnalyticsCHAPTER GOAL: Using the example built in Chapter 2, we will apply Application Insights and use it to monitor the solution.NO OF PAGES: 20SUB - TOPICS:1. Application Insights overview2. Adding to Azure Functions3. Adding Log Analytics to a Logic AppChapter 5: Databases and StorageCHAPTER GOAL: Building upon chapters 1 and 2, persistent storage will be incorporated into the example. Different implementations will be explored, including Azure SQL Database, Azure Cosmos DB, and Azure Storage Tables.NO OF PAGES: 25SUB - TOPICS:1. Azure SQL Database2. Azure Cosmos DB3. Azure Storage TablesCHAPTER 6: Azure Web AppCHAPTER GOAL: An Azure Web App will now be added to the example, and we’ll expand on the Application Insights capabilities, including custom events.NO OF PAGES: 20SUB – TOPICS:1. Overview of the Web App (functional)2. App Service blade overview – default and adding new graphs3. Diagnose and solve problemsChapter 7: Identity Security with Azure ADCHAPTER GOAL: Azure AD security will be added to the solution. OpenID will be used to secure the Azure Web App. The Logic App and Azure Function will be secured to only be accessible from the Web App (not directly to the user).NO OF PAGES: 20SUB – TOPICS:1. Overview of Azure AD2. Tracking user activity3. AD Connect Health4. AD reportingChapter 8: Continuous DeliveryCHAPTER GOAL: CI, CD will be covered. Capabilities of VSTS (covering Git, TFVC) will be shown, with the help of Build and Deployment. The chapter will focus on getting a better understanding of the state of a solution under change. What is currently deployed and where is it? How does VSTS and the Azure portal relate, and how can you get a complete view of the solution?NO OF PAGES: 25SUB – TOPICS:1. Introduction to VSTS2. Projects and dashboards3. Code – TFVC4. Code – Git5. Work, Wiki, Test – How these can be used to better understand the development process6. Build7. ReleaseChapter 9: External ToolingCHAPTER GOAL: Extend and automate CI, CD with the help of various build tools, viz. VSTS, TeamCity, and Cake bootstrapper.NO OF PAGES: 15SUB – TOPICS:1. Azure portal dashboard – widgets2. VSTS – pluginsChapter 10: Visualizing the Health of a SolutionCHAPTER GOAL: We cover troubleshooting in a production environment.NO OF PAGES: 18SUB – TOPICS:1. Remote combining reports for a complete picture2. Combining reports for a complete picture3. Disaster recovery and versioning of applications in a solution4. Enterprise reporting

Regulärer Preis: 66,99 €
Produktbild für Das Internet der Dinge und Künstliche Intelligenz als Game Changer

Das Internet der Dinge und Künstliche Intelligenz als Game Changer

Das Internet der Dinge (IoT) und Künstliche Intelligenz (KI) bieten im Zuge der Digitalisierung große Chancen für innovative Geschäftsmodelle und Produktivitätssteigerungen von Unternehmen. Diese Chancen nutzen gegenwärtig vor allem die großen Digital-Champions und Startups. Umfassend und aktuell greifen die Autoren diese Herausforderung für etablierte Unternehmen auf. Zentrale These des Buches ist, dass diese digitalen Technologien die Spielregeln des Wettbewerbs grundlegend verändern und zu Game Changern werden. Die Autoren belegen dies in vier Blöcken: Im ersten Teil erläutern sie wichtige Begriffe. Im zweiten Teil beschreiben Timothy Kaufmann und Hans-Gerd Servatius die Entwicklung zum neuen Management 4.0-Paradigma und dessen Bausteine. Der dritte Teil beschäftigt sich mit dem Wandel der Informations- und Kommunikationstechnik hin zu einer durch IoT- und KI-Technologien geprägten digitalen Architektur. Der abschließende vierte Teil skizziert die Bausteine einer Innovationspolitik 4.0 für den digitalen Wandel, die den Rahmen für Management- und Architektur-Innovationen liefert.Dank klarer Gliederung, anschaulicher Erläuterung der neuen Konzepte und zahlreicher Beispiele aus der Praxis ist das Buch eine wichtige Orientierungshilfe für alle, die nach erfolgreichen Wegen zu einem Management 4.0 und einer digitalen Architektur suchen.TIMOTHY KAUFMANN arbeitet bei SAP als Business Development Director für neue Technologien. Er ist Mitinitiator der Open Industry 4.0 Alliance.PROF. DR. HANS-GERD SERVATIUS ist geschäftsführender Gesellschafter des Innovationsspezialisten Competivation. Daneben lehrt er an der Universität Stuttgart und der RWTH Aachen. Er ist Autor mehrerer Bücher und zahlreicher Fachartikel.Digitale Technologien verändern den Wettbewerb.- Das neue Management 4.0-Paradigma.- Digitale Geschäftsmodelle gemeinsam mit IoT- und KI-Plattformpartnern.- Integration der Objectives and Key Results (OKR-) Methode in agile Strategie- und Innovationsprozesse.- Digitaler Wandel in einer evolutionären Organisation.- Produktivitätssteigerung mit Künstlicher Intelligenz.- Eine IT-Architektur 4.0 unterstützt IoT und KI.- IoT- und KI-Architekturen.- Datengetriebene Services und die Architektur 4.0.- Geschäftsprozesse und die Architektur 4.0.- Das Wertversprechen und die Architektur 4.0.- IoT- und KI-Innovationsökosysteme und die Architektur 4.0.- Auf dem Weg zu einer Innovationspolitik 4.0.

Regulärer Preis: 42,99 €
Produktbild für Mastering VMware NSX for vSphere

Mastering VMware NSX for vSphere

A CLEAR, COMPREHENSIVE GUIDE TO VMWARE’S LATEST VIRTUALIZATION SOLUTIONMastering VMware NSX for vSphere is the ultimate guide to VMware’s network security virtualization platform. Written by a rock star in the VMware community, this book offers invaluable guidance and crucial reference for every facet of NSX, with clear explanations that go far beyond the public documentation. Coverage includes NSX architecture, controllers, and edges; preparation and deployment; logical switches; VLANS and VXLANS; logical routers; virtualization; edge network services; firewall security; and much more to help you take full advantage of the platform’s many features.More and more organizations are recognizing both the need for stronger network security and the powerful solution that is NSX; usage has doubled in the past year alone, and that trend is projected to grow—and these organizations need qualified professionals who know how to work effectively with the NSX platform. This book covers everything you need to know to exploit the platform’s full functionality so you can:* Step up security at the application level* Automate security and networking services* Streamline infrastructure for better continuity* Improve compliance by isolating systems that handle sensitive dataVMware’s NSX provides advanced security tools at a lower cost than traditional networking. As server virtualization has already become a de facto standard in many circles, network virtualization will follow quickly—and NSX positions VMware in the lead the way vSphere won the servers. NSX allows you to boost security at a granular level, streamline compliance, and build a more robust defense against the sort of problems that make headlines. Mastering VMware NSX for vSphere helps you get up to speed quickly and put this powerful platform to work for your organization.ELVER SENA SOSA is a data center solutions architect with 20 years' networking experience. He is the author of two VMWare Press VCP certification books, holds VCDX-NV and VCI certifications from VMWare, and he is a frequent speaker and blogger well known in the VMware community. Introduction xviiCHAPTER 1 ABSTRACTING NETWORK AND SECURITY 1Networks: 1990s 1Colocation 2Workload-to-Server Ratio 3Inefficient Resource Allocation 3The Long Road to Provisioning 3Data Centers Come of Age 4Data Center Workloads 4Workloads Won’t Stay Put 5VMWARE 6Virtualization 6What is Happening in There? 6Portability 8Virtualize Away 8Extending Virtualization to Storage 9Virtual Networking and Security 9NSX to the Rescue 10The Bottom Line 13CHAPTER 2 NSX ARCHITECTURE AND REQUIREMENTS 15NSX Network Virtualization 16Planes of Operation 16NSX Manager Role and Function 18ESXi Hosts 19vCenter Server 20vSphere Distributed Switch 21NSX VIBs 23Competitive Advantage: IOChain 24IOChain Security Features 24NSX Controllers 25NSX Controller Clustering 26NSX Controller Roles 26NSX Edge 28ESG Sizing 30NSX Role-Based Access Control 30Overlay and Underlay Networks 32Replication Modes for Traffic Going to Multiple Destinations 34The Bottom Line 36CHAPTER 3 PREPARING NSX 39NSX Manager Prerequisites 39Open Ports and Name Resolution 40Minimum Resource Requirements for NSX Data Center Appliances 40vSphere HA and DRS 41IP Addressing and Port Groups 43Installing the Client Integration Plug-in 44Installing NSX Manager 44Associating NSX Manager to vCenter 46Adding AD/LDAP to NSX 47Linking Multiple NSX Managers Together (Cross- vCenter NSX) 51Multi-site Consistency with Universal Components 51Primary and Secondary NSX Managers 53Preparing ESXi Clusters for NSX 54Creating a Universal Transport Zone on the Primary NSX Manager 56vSphere Distributed Switches Membership 57Adding Secondary NSX Managers 58The Bottom Line 59CHAPTER 4 DISTRIBUTED LOGICAL SWITCH 61vSphere Standard Switch (vSS) 62Traffic Shaping 63Understanding Port Groups 64NIC Teaming 65Ensuring Security 66Virtual Distributed Switch (vDS) 67Virtual eXtensible LANs (VXLANs) 68Employing Logical Switches 71Three Tables That Store VNI Information 73Collecting VNI Information 74Centralized MAC Table 75VTEP Table 76We Might as Well Talk about ARP Now 79Filling In the L2 and L3 Headers 79Switch Security Module 81Understanding Broadcast, Unknown Unicast, and Multicast 83Layer 2 Flooding 83Replication Modes 83Deploying Logical Switches 84Creating a Logical Switch 85The Bottom Line 85CHAPTER 5 MARRYING VLANS AND VXLANS 87Shotgun Wedding: Layer 2 Bridge 87Architecture 88Challenges 89Deployment 90Under the Hood 102Layer 2 VPN 102NSX Native L2 Bridging 103Hardware Switches to the Rescue 103Hardware VTEPs 103Deployment 104Under the Hood 104The Bottom Line 105CHAPTER 6 DISTRIBUTED LOGICAL ROUTER 107Distributed Logical Router (DLR) 107Control Plane Smarts 108Logical Router Control Virtual Machine 108Understanding DLR Efficiency 111Another Concept to Consider 115Let’s Get Smart about Routing 117OSPF 119Border Gateway Protocol (BGP) 120Oh Yeah, Statics Too 123Deploying Distributed Logical Routers 125The Bottom Line 134CHAPTER 7 NFV: ROUTING WITH NSX EDGES 137Network Function Virtualization: NSX Has It Too 137This is Nice: Edge HA A 138Adding HA 139Let’s Do Routing Like We Always Do 140Deploying the Edge Services Gateway 144Configuring BGP 151Configuring OSPF 154Configuring Static Routes 155Routing with the DLR and ESG 156Using CLI Commands 156Default Behaviors to Be Aware Of 157Equal Cost Multi-Path Routing157The Bottom Line 160CHAPTER 8 MORE NVF: NSX EDGE SERVICES GATEWAY 163ESG Network Placement 163Network Address Translation 164Configuring Source NAT 166Configuring Destination NAT 166Configuring SNAT on the ESG 167Configuring DNAT on the ESG 169ESG Load Balancer 171Configuring an ESG Load Balancer 173Layer 2 VPN (If You Must) 178Secure Sockets Layer Virtual Private Network 179Split Tunneling 180Configuring SSL VPN 180Internet Protocol Security VPN 187Understanding NAT Traversal 188Configuring IPsec Site-to-Site VPN with the ESG 188Round Up of Other Services 190DHCP Service 191Configuring the ESG as a DHCP Server 192DHCP Relay 194Configuring the DLR for DHCP Relay 196DNS Relay 198Configuring DNS Relay on the ESG 199The Bottom Line 200CHAPTER 9 NSX SECURITY, THE MONEY MAKER 203Traditional Router ACL Firewall 203I Told You about the IOChain 204Slot 2: Distributed Firewall 206Under the Hood 207Adding DFW Rules 210Segregating Firewall Rules 214IP Discovery 215Gratuitous ARP Used in ARP Poisoning Attacks 216Why is My Traffic Getting Blocked? 218Great, Now It’s Being Allowed 219Identity Firewall: Rules Based on Who Logs In 220Distributing Firewall Rules to Each ESXi Host: What’s Happening? 220The Bottom Line 222CHAPTER 10 SERVICE COMPOSER AND THIRD-PARTY APPLIANCES 223Security Groups 224Dynamic Inclusion 225Static Inclusion 226Static Exclusion 226Defining a Security Group through Static Inclusion 227Defining a Security Group through Dynamic Inclusion 229Customizing a Security Group with Static Exclusion 231Defining a Security Group Using Security Tags 231Adding to DFW Rules 233Service Insertion 236IOChain, the Gift that Keeps on Giving 236Layer 7 Stuff: Network Introspection 236Guest Introspection 237Service Insertion Providers 238Security Policies 239Creating Policies 239Enforcing Policies 243The Bottom Line 245CHAPTER 11 VREALIZE AUTOMATION AND REST APIS 247vRealize Automation Features 247vRA Editions 249Integrating vRA and NSX 250vRealize Automation Endpoints 250Associating NSX Manager with vRealize Automation 252Network Profiles 253vRA External, Routed, and NAT Network Profiles 255Reservations 258vRealize Orchestrator Workflows 261Creating a Blueprint for One Machine261Adding NSX Workflow to a Blueprint 264Creating a Request Service in the vRA Catalog 265Configuring an Entitlement 268Deploying a Blueprint that Consumes NSX Services 271REST APIs 273NSX REST API GET Request 275NSX REST API POST Request 275NSX REST API DELETE Request 276The Bottom Line 277APPENDIX THE BOTTOM LINE 279Chapter 1: Abstracting Network and Security 279Chapter 2: NSX Architecture and Requirements 280Chapter 3: Preparing NSX 280Chapter 4: Distributed Logical Switch 281Chapter 5: Marrying VLANs and VXLANs 283Chapter 6: Distributed Logical Router 284Chapter 7: NFV: Routing with NSX Edges 286Chapter 8: More NVF: NSX Edge Services Gateway 287Chapter 9: NSX Security, the Money Maker 289Chapter 10: Service Composer and Third-Party Appliances 290Chapter 11: vRealize Automation and REST APIs 291Index 293

Regulärer Preis: 38,99 €
Produktbild für Tribe of Hackers Security Leaders

Tribe of Hackers Security Leaders

TRIBAL KNOWLEDGE FROM THE BEST IN CYBERSECURITY LEADERSHIPThe Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security.Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including:* What’s the most important decision you’ve made or action you’ve taken to enable a business risk?* How do you lead your team to execute and get results?* Do you have a workforce philosophy or unique approach to talent acquisition?* Have you created a cohesive strategy for your information security program or business unit?Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.MARCUS J. CAREY is a cybersecurity researcher and inventor with patents in cryptography and cybersecurity and over 25 years of experience in protecting the public, private, and government sectors. He was the Founder and CEO of Threatcare which was acquired by ReliaQuest. Follow Marcus on Twitter at @marcusjcarey. JENNIFER JIN graduated from The University of Texas at Austin in 2017 and started her first job at Threatcare soon after. She became Threatcare's Head of Communications and Marketing before Threatcare was acquired by ReliaQuest. Jennifer is now the Product Marketing Manager at Mio and is the co-author of Tribe of Hackers. Follow Jennifer on Twitter at @jen_jin. Acknowledgments viiIntroduction viii01 Marcus J. Carey 102 Ian Anderson 603 James Arlen 1404 Mark Arnold 2505 Andrew Bagrin 3106 Zate Berg 3607 Tash Bettridge 4608 Philip Beyer 5009 Kyle Bubp 5810 Joanna Burkey 6411 Bill Burns 7012 Lesley Carhart 7813 Christopher Caruso 8314 Mike Chapple 9115 Steve Christey Coley 9816 Jim Christy 10217 Chris Cochran 11018 Edward Contreras 11419 Dan Cornell 11720 Mary Ann Davidson 12421 Kimber Dowsett 13222 David Evenden 13623 Martin Fisher 14124 Chris Hadnagy 14725 Andrew Hay 15326 Mark Hillick 15727 Terence Jackson 16528 Tanya Janca 16829 David Kennedy 17430 Joe Krull 18031 Robert M. Lee 18832 Rafal Los 19433 Tracy Z. Maleeff 19934 Jeffrey Man 20235 Angela Marafino 20936 James Medlock 21237 Kent Nabors 22138 Charles Nwatu 22839 Greg Ose 23240 Edward Prevost 23941 Ray [REDACTED] 24442 Stephen A. Ridley 24943 David Rook 25544 Marina Segal 25945 Khalil Sehnaoui 26246 Jackie Singh 26747 Dan Tentler 27148 Eugene Teo 27449 Dominique West 27950 Jake Williams 28351 Wirefall 288Appendix: Recommended Reading 293

Regulärer Preis: 16,99 €
Produktbild für Penetration Testing For Dummies

Penetration Testing For Dummies

TARGET, TEST, ANALYZE, AND REPORT ON SECURITY VULNERABILITIES WITH PEN TESTINGPen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking.Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.* The different phases of a pen test from pre-engagement to completion* Threat modeling and understanding risk* When to apply vulnerability management vs penetration testing* Ways to keep your pen testing skills sharp, relevant, and at the top of the gameGet ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!ROBERT SHIMONSKI is an ethical hacker and a professional IT leader who has led numerous efforts to architect, design, strategize and implement enterprise solutions that must remain secure. Rob has been involved in security and technology operations for over 25 years and has written his books from the trenches of experience.

Regulärer Preis: 19,99 €
Produktbild für Knockout Networking for Financial Advisors and Other Sales Producers

Knockout Networking for Financial Advisors and Other Sales Producers

90% of financial advisors fail at being financial advisors. Why? Because advisors, brokers, reps, and agents need to see more people to make more sales appointments. And nobody in their firm, agency, branch, or shop trains them how! Knockout Networking for Financial Advisors is the only book written for sales producers in the financial services industry focused on making more connections through networkingIn the wake of the COVID 19 pandemic, networking, developing relationships, generating referrals, and making important connections are as important as ever. The ideas and approaches in Knock Out Networking for Financial Advisors can be applied immediately to virtual meetings, online networking groups, social media, podcasts, and of course, phone calls. The problem is, most advisors and sales producers are not born networkers; they develop the skills and confidence through education, training, practice, and having a positive attitude.Knockout Networking for Financial Advisors covers everything you need to know about going to the right places (virtual or not!), saying the right things, and meeting the right people―essential skills for a financial advisor or sales producer that's serious about making more and better connections! The result? More prospects, more referrals, and more business.Author Michael Goldberg is a networking specialist, speaker, trainer, author (and boxer!) focused on helping financial advisors, brokers, agents, reps, wholesalers, and other sales producers grow their business or practice through networking.In this �must read if you�re a financial advisor� book, you will learn how to:* Confidently meet and greet new people in business settings* Further define your Target Market to establish more and better connections* Deliver a �knockout� elevator speech (not a script!)* Generate more prospects and referrals from current client base* Establish important relationships generating more business opportunitiesBottom line, networking is the most effective way to attract more prospects, more referrals, and more business to your corner. Remember�keep the left up!MICHAEL GOLDBERG is a networking expert specializing in helping financial advisors, brokers, agents, reps, product wholesalers, and other sales producers grow their business. His clients include Morgan Stanley, Merrill Lynch, John Hancock Investments, Northern Trust, Griffin Capital, SAP, Brother International, Rabobank, Guardian Life, Jackson National, State Farm Insurance, and Chubb. Michael is also a two-time TEDx speaker, a Certified Speaking Professional and an award-winning adjunct professor at Rutgers University. Preface xiPART 1 OPENING ROUNDS 1CHAPTER 1 NETWORKING IS THE KEY TO A SUCCESSFUL CAREER (ESPECIALLY IN FINANCIAL SERVICES) 3Why Financial Advisors Should Network 3Top Producers Should Network Too 6Why Financial Advisors Don’t Network 8CHAPTER 2 WHAT IS NETWORKING? HAVING A NETWORKING MINDSET 17Six Reasons for Networking 18Why Understanding the Six Reasons for Networking is Important 23What is Networking Anyway? 28CHAPTER 3 WHY YOU WON’T CONNECT WITH EVERYONE: THE ONE-THIRDER DYNAMIC 37One-Thirder Dynamic 39Two-Thirder Dynamic 42Focus on the One-Thirders! 43Zero-Thirder Dynamic 44Mirror Image 46Sometimes You Can Reduce the Fraction 47PART 2 THE RULES OF NETWORKING™ 49CHAPTER 4 NO SELLING EVER: KEEP BOBBING AND WEAVING 51The Cost of Selling at a Networking Event 54Trade Shows: An Exception to the Rule 60CHAPTER 5 EVERYONE IS NOT A PROSPECT: DON’T WASTE YOUR PUNCHES 63What is a Prospect Anyway? 65True and Probable Referral Sources 69Natural Market 71Prospecting is Important! 73CHAPTER 6 FOCUS ON A TARGET MARKET: HIT THOSE FOCUS MITTS 75How I Discovered My Target Market 76Do You Have the Right Formula? 81How to Discover, Establish, and Develop Your Target Market 84Why Advisors Resist Having a Target Market 90Remember, Stay Focused! 92CHAPTER 7 CREATE (AND USE!) YOUR ELEVATOR SPEECH: THE PEEC STATEMENT™ 93Profession 96Expertise 99Environments 101Call to Action 103The Rules of the PEEC Statement 106Sample PEEC Statements 112CHAPTER 8 BUSINESS CARDS BREED BUSINESS: AND OTHER RULES OF NETWORKING™ 115Have Your Business Cards and Other Tools of the Trade 116It is Never About You 119Always Be Positive, Professional, and Respectful 120Look the Part 121Know about Contacts, Leads, and Referrals 122Count Your Chickens and Eggs 124Eat and Drink Strategically 124Initiate Conversations by Introducing Yourself and Asking Questions 125Have a Goal and a Plan 126Listen More, Talk Less 127Keep Your Eyes Focused on Your Conversation 127Introduce Others with Passion 128Implement a Time Limit 129Intend to Follow Up 130Terminate Conversations Politely 131It’s a We Thing, Not a Me Thing 132Get to Know: The Know, Like, and Trust Factor 133Have Fun! 133PART 3 WHERE TO GO, WHAT TO SAY, AND WHO TO MEET 135CHAPTER 9 WHERE TO GO? CHAMBERS, ASSOCIATIONS, AND OTHER HIGH-POTENTIAL EVENTS 137Not All Events are Created Equal 138Hard Contact Meetings 140Soft Contact Meetings 142You Can’t Just Show Up 153CHAPTER 10 WHAT TO SAY? HOW TO START A CONVERSATION, ASK GOOD QUESTIONS, AND CONNECT 155What Prevents Us from Listening? 156Four-Step Process for Active Listening 157Initiate Conversations by Introducing Yourself and Asking Questions 159CHAPTER 11 WHO WILL YOU MEET? THE FACES OF NETWORKING 167The Faces of Networking 168People Seldom Change 175PART 4 SPECIAL TOPICS 177CHAPTER 12 HOW TO HANDLE AWKWARD SITUATIONS: FORGETTING NAMES AND OTHER WEIRD MOMENTS 179How Do I Introduce Myself? 180How Do I Introduce Others in a Conversation Without Being Rude? 182How Do I Introduce Others and Walk Away? 182What Should I Do If I Forget Someone’s Name? 183How Do I Ask Someone for a Business Card? 185How Do I Take Notes on Someone’s Business Card? 186How Do I Know When to End a Conversation? 187What If I’ve Done Something Embarrassing or Stupid? 189CHAPTER 13 KNOCKOUT LINKEDIN STRATEGIES: BOOM! 191Step 1: Define Your LinkedIn Marketing Goals 194Step 2: Pick Your Target Market on LinkedIn 195Step 3: Create the Right Messaging for Social Media 196Step 4: Tell Your Story to Engage People 197Step 5: Optimize Your LinkedIn Profile to Five Stars 197Step 6: Set Up the Right Networking Dashboards to Track LinkedIn Success 198Step 7: Post Something of Value Each Day on LinkedIn 199Step 8: Engage with Your First- and Second-Degree LinkedIn Network 200Step 9: Reach Out Via Direct Message to Your LinkedIn Connections 200The Bottom Line 201CHAPTER 14 GENERATING MORE REFERRALS: WHY DON’T YOU GET MORE? 203Reasons You’re Not Getting Referrals 204Knockout Ways to Generate More Referrals 210CHAPTER 15 ONE-ON-ONE NETWORKING MEETINGS: HOW TO PUNCH UP YOUR TIME OVER COFFEE 219Best Practices 221Your PUNCH Card 222Important Points to Keep in Mind 227One-on-One Meeting PUNCH Card 230PART 5 DEVELOPING AND IMPLEMENTING YOUR NETWORKING SYSTEM 231CHAPTER 16 THE FOUR PHASES OF NETWORKING: PREPARATION, PRESENTATION, FOLLOW-UP, MAINTENANCE 233Preparation 234Presentation 240Follow-up 247Maintenance (OOSIOOM) 250CHAPTER 17 WHAT NOW? 90-DAY GOALS: PUTTING YOUR “DAILY FIGHT PLAN” INTO ACTION! 255Goals 258Objectives or Tasks 262Business and Networking Examples 263Daily Fight Plan (DFP) 264Daily Fight PlanTM 267Final Round 268Acknowledgments 271About the Author 273Index 275

Regulärer Preis: 18,99 €
Produktbild für SQL Server 2019 für Administratoren

SQL Server 2019 für Administratoren

Mit dem Microsoft SQL Server verwalten Sie große Datenmengen sicher und effizient. Wie die Administration in Produktivumgebungen gelingt, zeigt Ihnen dieses Praxishandbuch. Ob es um die hybride Nutzung in der Cloud geht oder um die richtige Wartung, Backups & Replikation, Skalierbarkeit, Hochverfügbarkeit oder Monitoring: Hier finden Sie alle relevanten Themenbereiche erklärt. Anschauliche Workshops und praxisnahe Hinweise lassen sich direkt auf Ihre tägliche Arbeit einsetzen. Aus dem Inhalt: Installation und KonfigurationServer-SicherheitBackup und RecoveryPowerShell und T-SQLAutomatisierungSkalierbarkeitReplikationHochverfügbarkeitslösungenÜberwachung (Monitoring)Troubleshooting und Performance-TuningKomponenten für Entwickler (Master Data Services, StreamInsight)Integration Services, Reporting Services, Analysis ServicesPraxisworkshops   Vorwort ... 25   1.  Die Versionsgeschichte von SQL Server ... 29        1.1 ... Entwicklung bis Microsoft SQL Server 2005 ... 30        1.2 ... Von Microsoft SQL Server 2008 zu SQL Server 2014 ... 32        1.3 ... SQL Server 2016 -- wichtige Neuerungen im Überblick ... 40        1.4 ... SQL Server 2017 -- wichtige Neuerungen im Überblick ... 43        1.5 ... SQL Server 2019 -- Aussichten auf die Neuerungen im Überblick ... 48   2.  Zukunftssicherheit, Stabilität und Performance im Enterprise-Bereich ... 65        2.1 ... Kapazitätsplanung von Prozessor, Speicher und I/O ... 65        2.2 ... Erfassen von Leistungs- und Baseline-Daten ... 66        2.3 ... Sequenzieller und Random I/O ... 68        2.4 ... Dimensionierung des E/A-Subsystems ... 69        2.5 ... RAID und SAN -- Konfiguration ... 70        2.6 ... SQL Server und virtuelle Umgebungen -- was ist zu beachten? ... 75        2.7 ... Ausblick auf zukünftige Technologien -- Storage im Netz ... 76   3.  Die SQL-Server-Editionen im Überblick ... 79        3.1 ... Standard Edition ... 79        3.2 ... Business Intelligence Edition ... 80        3.3 ... Enterprise Edition ... 80        3.4 ... Parallel Data Warehouse und Data Warehouse Fast Track Edition ... 80        3.5 ... Spezielle Editionen ... 81        3.6 ... Microsoft Azure SQL-Datenbank ... 84        3.7 ... Zusammenfassung ... 88   4.  Installation von SQL Server und Aktualisierung auf neue Versionen ... 89        4.1 ... Überlegungen zur Installation ... 90        4.2 ... Vorbereitung -- Was Sie vor der Installation erledigen sollten ... 94        4.3 ... Die vollständige Installation ... 95        4.4 ... Durchführen einer unbeaufsichtigten Installation ... 120        4.5 ... Installation einer Instanz unter Linux ... 127        4.6 ... Installation einer Instanz in der Cloud ... 133   5.  Konfigurieren von SQL Server ... 135        5.1 ... Der SQL Server-Konfigurations-Manager ... 135        5.2 ... Die SQL-Server-Protokolle ... 138        5.3 ... SQL-Server-Startparameter ... 145        5.4 ... »sqlcmd« -- das Tool für die Kommandozeile ... 148        5.5 ... Die Konfiguration der Instanz ... 150        5.6 ... Konfigurieren von SQL Server mit der PowerShell ... 156        5.7 ... SQL-Server-Agent-Grundkonfiguration ... 158        5.8 ... Konfiguration von SQL Server mithilfe der Richtlinienverwaltung (policy management) ... 160        5.9 ... Hilfsprogramm-Kontrollpunkte (Utility Control Point, UCP) ... 166   6.  Die SQL-Server-Systemdatenbanken im Überblick ... 181        6.1 ... Aufbau und Funktionsweise von SQL-Server-Systemdatenbanken ... 182        6.2 ... Verschieben (Move) von Systemdatenbanken ... 184        6.3 ... Neuerstellen von Systemdatenbanken ... 187        6.4 ... Konfigurieren von Systemdatenbanken ... 190   7.  Grundlegendes Know-how für Administratoren und Entwickler ... 195        7.1 ... SQL Server verwalten -- SQL Server Management Studio (SSMS) ... 195        7.2 ... Dynamische Verwaltungssichten (Dynamic Management Views, DMV), Katalogsichten ... 209        7.3 ... Datenbanken anlegen ... 215        7.4 ... T-SQL -- Die wichtigsten Befehle für den Administrator ... 222        7.5 ... Views -- Daten aus anderen Perspektiven ... 225        7.6 ... Benutzerdefinierte Funktionen ... 227        7.7 ... Gespeicherte Prozeduren ... 229        7.8 ... Wichtige gespeicherte Prozeduren ... 235        7.9 ... Trigger ... 239        7.10 ... Interessante T-SQL-Neuerungen für Entwickler ... 250        7.11 ... SQL Server 2014 -- T-SQL Enhancements ... 250        7.12 ... SQL Server 2016/2017 -- T-SQL Enhancements ... 250        7.13 ... SQL Server 2019 -- T-SQL Enhancements ... 253        7.14 ... Dynamische Datenmaskierung (Dynamic Data Masking, DDM) ... 253        7.15 ... UTF-8-Unterstützung ab SQL Server 2019 ... 267   8.  PowerShell ... 269        8.1 ... Warum PowerShell? ... 269        8.2 ... Was bietet PowerShell? ... 270        8.3 ... Wie wird PowerShell installiert und aufgerufen? ... 271        8.4 ... Beispiel: Anzeigen der Instanzen von SQL Server in HTML ... 276        8.5 ... DBATOOLS -- PowerShell-Skripte für den Administrator ... 277        8.6 ... SQLWATCH -- ein Open-Source-Monitoring-Projekt ... 277   9.  Backup und Restore ... 279        9.1 ... Sicherungsverfahren ... 279        9.2 ... Wiederherstellungsmodelle (Recovery Model): Ein Überblick über die Backup-Möglichkeiten ... 281        9.3 ... Sicherung von Dateigruppen ... 287        9.4 ... Systemdatenbanken richtig sichern und wiederherstellen ... 287        9.5 ... Datenbank-Snapshots: Datenbankzustände konservieren und wiederherstellen ... 287        9.6 ... Backup-Strategie ... 292        9.7 ... Medien ... 295        9.8 ... Workshops: Datenbanken mit verschiedenen Methoden richtig sichern ... 299 10.  SQL-Server-Sicherheit ... 321        10.1 ... Das SQL-Server-Authentifizierungskonzept ... 321        10.2 ... Serverrollen ... 330        10.3 ... Authentifizierungsstufe »Datenbank« -- Datenbankberechtigungen ... 337        10.4 ... Eigenständige Datenbanken ... 349        10.5 ... Berechtigungen auf allen Ebenen ... 356        10.6 ... Schemas ... 374        10.7 ... Datenverschlüsselung mit Zertifikaten und Schlüsseln ... 378        10.8 ... Verbindungsserver/Delegation (Linked Server) ... 394        10.9 ... Eine Einführung in SQL-Server-Container ... 400 11.  Automatisieren von administrativen Aufgaben ... 405        11.1 ... Der SQL Server Agent ... 406        11.2 ... Erstellen von Aufträgen und Ausführen von SSIS-Paketen ... 406        11.3 ... Wartungspläne (Maintenance Plans) und T-SQL-Skripte ... 414        11.4 ... Konfigurieren des SQL Server Agents ... 424        11.5 ... Was sind Proxy-Konten, und welche Bedeutung kommt ihnen zu? ... 430        11.6 ... Automatische Optimierung (automatic tuning options) ... 430        11.7 ... Machine Learning Services ... 432 12.  Einrichten von Warnungen und Benachrichtigungen ... 433        12.1 ... Konfigurieren von Datenbank-E-Mail ... 433        12.2 ... Einrichten von Warnungen ... 447        12.3 ... Anlegen von Operatoren ... 452        12.4 ... Warnungen zu Leistungsstatus, Fehlernummern und WMI ... 455 13.  Skalierbarkeit von SQL Server ... 457        13.1 ... Verteilen der SQL-Server-Dienste ... 458        13.2 ... SQL Server und NLB-Cluster ... 459        13.3 ... Skalierung der Analysis Services ... 462        13.4 ... Skalierbare freigegebene Datenbanken ... 463        13.5 ... Skalierbarkeit von Datenbanken mit Hilfe der Peer-to-Peer-Transaktionsreplikation ... 464        13.6 ... AlwaysOn -- nicht nur ein Thema für Hochverfügbarkeit ... 464        13.7 ... Service Broker -- Skalierung für Entwickler ... 465        13.8 ... Workshop -- SQL Server in der Cloud installieren ... 470 14.  Verteilung von Daten -- Replikation ist kein Hexenwerk ... 487        14.1 ... Einführung in die Replikation ... 487        14.2 ... Die Rollenverteilung bei einer Replikation ... 492        14.3 ... Replikationsarten ... 493 15.  Hochverfügbarkeitslösungen ... 517        15.1 ... Hochverfügbarkeit -- was ist das eigentlich genau? ... 518        15.2 ... Lastenausgleich durch Network Load Balancing (NLB) ... 519        15.3 ... Failover-Cluster ... 521        15.4 ... Clusterarten ... 525        15.5 ... Datenbankspiegelung ... 526        15.6 ... Protokollversand ... 535        15.7 ... Kombinieren von Lösungen für hohe Verfügbarkeit ... 537        15.8 ... AlwaysOn -- Mission Critical, die neue Hochverfügbarkeitslösung ... 539        15.9 ... SSIS und AlwaysOn ... 543        15.10 ... Workshop I: Einrichten einer Datenbankspiegelung ... 543        15.11 ... Workshop II: Einrichten des Protokollversands ... 554        15.12 ... Workshop III: Einrichten von AlwaysOn ... 562 16.  Überwachen von SQL Server ... 581        16.1 ... Überwachen der SQL-Server-Aktivität mit SQL Server Monitor ... 581        16.2 ... Ablaufverfolgung von SQL Server mit dem Profiler ... 585        16.3 ... Erweiterte Ereignisse (Extended Events) ... 592        16.4 ... Die Windows-Leistungsüberwachung (Performance Monitor) ... 599        16.5 ... Synchronisation von Windows-Leistungsüberwachungs- und SQL-Server-Profiler-Dateien ... 603        16.6 ... SQLdiag ... 605        16.7 ... SQL-Server-Auditing ... 608        16.8 ... Konfigurieren des Datenauflisters (Data Collection) ... 617 17.  Hilfreiche Tools von Drittherstellern ... 631        17.1 ... Monitoring ... 631        17.2 ... Backup ... 632        17.3 ... Analyse ... 633        17.4 ... DBA-Tätigkeiten ... 634        17.5 ... Die Onlinegemeinde ... 635 18.  Problembehebung und Performance-Tuning ... 637        18.1 ... Richtiges Verwalten von Daten ... 637        18.2 ... Daten lesen und schreiben ... 639        18.3 ... Wie werden Abfragen ausgeführt? ... 641        18.4 ... Der Datenbankoptimierungsratgeber ... 646        18.5 ... Ressourcenkontrolle (Resource Governor) ... 667        18.6 ... Indizes: Wichtiges Mittel für eine gute Performance ... 673        18.7 ... Statistiken und Wartungspläne (maintenance plans) ... 683        18.8 ... Datenkomprimierung ... 685        18.9 ... Change Data Capture ... 688        18.10 ... Datenbankoperationen ... 692        18.11 ... Parallelitätsprobleme (Deadlocks) ... 700        18.12 ... Partitionierung -- wenn Tabellen sehr groß werden ... 704        18.13 ... In-Memory OLTP (Online Transaction Processing) ... 707        18.14 ... Zusammenfassung der Performancethemen ... 716 19.  Applikations- und Multiserver-Verwaltung ... 719        19.1 ... Vorteile und Einsatz der Multiserver-Verwaltung ... 719        19.2 ... DAC -- Datenebenenanwendung (data-tier application) ... 727        19.3 ... Registrierte SQL Server und Servergruppen ... 734        19.4 ... Zentraler Verwaltungsserver (Central Management Server) ... 740 20.  Weitere Komponenten für Entwickler und Anwender ... 745        20.1 ... Master Data Services ... 745        20.2 ... StreamInsight ... 749        20.3 ... Data Quality Services ... 756        20.4 ... Columnstore-Indizes (Columnstore Indexes) ... 760 21.  ETL-Prozesse mit den Integration Services ... 763        21.1 ... Möglichkeiten zum Massenimport ... 764        21.2 ... Der Import/Export-Assistent ... 768        21.3 ... SSIS-Anwendungen: Erstellen von DTSX-Paketen mit den SQL Server Data Tools ... 772        21.4 ... Erstellen von Wartungsplänen mit den SQL Server Data Tools ... 803 22.  Parallel Data Warehouse (PDW) ... 805        22.1 ... Grundlagen und Schlüsselmerkmale ... 805        22.2 ... Auch in Azure gibt es DWH-Lösungen ... 806        22.3 ... Symmetrisches Multiprocessing ... 807        22.4 ... Massive parallele Verarbeitung ... 807        22.5 ... Parallel Data Warehouse -- Architektur ... 809        22.6 ... Parallel Data Warehouse -- Knoten ... 811        22.7 ... Datenlayout -- PDW-Schemadesign ... 814        22.8 ... Verwaltung ... 816 23.  Die Reporting Services ... 817        23.1 ... Neuerungen in den Reporting Services ... 817        23.2 ... Bereitstellung und Skalierung der Reporting Services ... 819        23.3 ... Installation und Konfiguration im einheitlichen Modus ... 822        23.4 ... Workshops ... 837 24.  Analysis Services -- Datenanalyse für jedermann ... 863        24.1 ... Beispielszenario für ein Analysis-Services-Projekt ... 863        24.2 ... Was sind die SQL Server Analysis Services (SSAS)? ... 865        24.3 ... Microsoft Excel und Analysis Services ... 872        24.4 ... Das Sicherheitskonzept der Analysis Services ... 872        24.5 ... SQL Server -- PowerPivot und DAX ... 874        24.6 ... PolyBase ... 875        24.7 ... Machine Learning und R ... 877 25.  Big Data -- Analysewerkzeuge für SQL Server ... 879        25.1 ... Daten und der Umgang damit ... 879        25.2 ... Was ist eigentlich Big Data? ... 879        25.3 ... Microsoft Big Data Cluster für SQL Server ... 880        25.4 ... Bereitstellung von Big Data Clusters für SQL Server ... 881        25.5 ... Fazit ... 881   Aussichten: Was bringt die Zukunft? ... 883   Anhang: Deutsch - Englisch/Englisch - Deutsch ... 887   Index ... 923

Regulärer Preis: 49,90 €