Security
Pro Android with Kotlin
Develop Android apps with Kotlin to create more elegant programs than the Java equivalent. This revised book covers the various aspects of a modern Android app that professionals are expected to encounter. You'll use the latest Kotlin APIs as made available in most recent versions of the Android SDK.There are chapters dealing with all the important aspects of the Android platform, including GUI design, file- and data-handling, coping with phone calls, multimedia apps, interaction with location and mapping services, monetizing apps, and much more. Jetpack will also be covered. It is a suite of libraries to help developers follow best practices, reduce boilerplate code, and write code that works consistently across Android versions and devices.Pro Android with Kotlin, Second Edition is an invaluable source for developers wanting to build real-world, state-of-the-art Android apps for modern Android devices using the Kotlin programming language and its APIs as available in the modern Android SDK. After reading this book, you'll come away with the skills and techniques to build modern Android apps that you can sell on Google Play. Free source code is available on this book's Github page as well.WHAT YOU WILL LEARN* Integrate activities, such as intents, services, notifications and more, into your Android apps* Build UIs in Android using layouts, widgets, lists, menus, and action bars* Deal with data in your Android apps using data persistence and cloud access* Design for different Android devices* Create multimedia apps in Android* Secure, deploy, and monetize your Android appsWHO THIS BOOK IS FORProfessional Android app developers.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java related projects. In 2016 he decided to concentrate on writing books on various subjects, with a primary focus on software development. With a wealth of experience in Java-related languages, the release of Kotlin for building Android Apps made him enthusiastic about writing books for Kotlin development in the Android environment. 1. System.- 2. Application.- 3. Activities.- 4. Services.- 5. Broadcasts 6. Content Providers.- 7. Permissions.- 8. APIs.- 9. User Interface.- 10. Development.- 11. Building.- 12. Communication.- 13. Hardware.- 14. Testing.- 15. Troubleshooting.- 16. Distributing Apps.- 17. Instant Apps.- 18. CLI.
Boozang from the Trenches
Test Automation is a key aspect of delivering high-quality software and reducing time to market. Several tools and approaches are available today, each with its own constraints and specificity. This book introduces Boozang, a codeless web automation tool, using a real-life enterprise project as source for examples.You'll have the opportunity to learn the basic features of Boozang and how to implement end-to-end automated scenarios, mixing GUI and API actions. Integration with JIRA-XRay and Jenkins is also covered to show how Boozang can be used effectively in an enterprise environment. The book is filled with examples that go beyond the Boozang tool, and cover the setup of a test automation project in a real context, with practical solutions as well as open points for which we are still looking for new ideas.YOU WILL LEARN HOW TO:· Install and set up a project with Boozang· Create a modular test suite and use Gherkin to define scenarios· Integrate Boozang with JIRA-XRay and work in a team with code branches· Build a Jenkins pipeline to execute the automated scenarios nightly and reduce the execution time via parallelismTHIS BOOK IS FOR:Testers and test managers, IT projects leads, Release and Delivery Managers, Developers, and Business AnalystsGianni is a simple guy from Livorno (a beautiful port city in Tuscany) who never thought he would end up with a Ph.D. at CERN (European Organization for Nuclear Research, cern.ch) and then working for a prestigious company in Switzerland. But he always knew that at some point in his life, he would have written a book.In his early career as a software developer, he built some C/C++ code but, pretty soon, debugging null pointer exceptions drove him crazy. He then decided he would be better off testing software rather than building it.Wherever he worked, he tried to push for automating tests. Because manual testing, let’s be honest, is not fun, and it can be dangerously repetitive. People at work must have fun, if possible. At Touring Club Suisse, he defined an IT Test Strategy stating “Test automation is developers’ stuff” until he discovered Boozang. And then, in his first two hours of using this tool, he thought, “Man, this is fun!”.Thus, he finally found a good topic for his book.Part 1: Testing web applications in an Enterprise context, why Boozang Chapter 1: Web Test Automation in an Enterprise environmentCHAPTER GOAL: This chapter introduces basic Test Automation concepts that will be used throughout the book. Besides ISTQB standard terminology, I’ll also cover the constraints typical of an Enterprise environment that might not be the same for small startups and IT giants.NO OF PAGES 15SUB -TOPICS1. Common Test Automation challenges2. Test levels, test types and testing roles3. Test automation in agile development4. Test Automation ROI, theory and practiceChapter 2: Selenium, best practices and pain pointsCHAPTER GOAL: This chapter presents the typical approach to testing web applications with coded solutions like Selenium and highlights the main pain points that could undermine a Test Automation initiative's success.NO OF PAGES: 5SUB - TOPICS1. Locators and Page Objects pattern2. Browsers and WebDriver compatibility3. Timing and waits4. Data management5. Reporting and script readability6. Development skillsChapter 3: Meet BoozangCHAPTER GOAL: This chapter introduces Boozang and how it addresses the pain points of a coded solution as described in the previous chapter. It also presents a possible selection approach for selecting an automation tool, particularly the one I followed before adopting Boozang.NO OF PAGES : 11SUB - TOPICS:1. Proof of Concept phase2. Pilot phase3. Why Boozang4. Codeless approach, how important is it?Chapter 4: The TCS projectCHAPTER GOAL: This chapter presents the context of the TCS project used all along the book to provide practical examples. I believe that there is no one size fits all solution for software testing and tools. Therefore, clarifying the context is very important to better understand the examples and consider possible adaptations one will have to make for a different context.NO OF PAGES: 8SUB - TOPICS:1. TCS Organization and Test Automation history2. NIS project introduction3. Test automation stream, NISTA setupChapter 5: How Boozang was bornCHAPTER GOAL: This chapter is a special one about the history behind Boozang. I believe it gives a great idea about this tool's strengths: the two key persons behind it. This input has been kindly provided by Mats Ljunggren.PART 2: Boozang main concepts and use cases Chapter 6: Starting up with BoozangCHAPTER GOAL: One of the advantages of a tool like Boozang versus a coded approach is that setting up your first projects is really easy and fast. Nothing to install, no code or POM files to prepare. This chapter will go over the registration process and the few steps needed to create a project. We will also see how to administer your account and projects and finally show how Boozang works behind the scenes.NO OF PAGES: 22SUB - TOPICS:1. Creating your first project2. The administrative User Interface3. Boozang under the hood4. Practice: NISTA setup part 1Chapter 7: Main concepts and entitiesCHAPTER GOAL: This chapter describes the core objects available in Boozang and starts introducing the Integrated Development Environment (IDE).NO OF PAGES: 38SUB - TOPICS:1. Modules and SubModules2. Application environments3. Tests and Test Suites4. Features and Scenarios5. Searching and bookmarks6. Recording7. Generate and reference Test8. Execution and Reporting9. Projects settings and UI Customization10. Updates from the trenchesChapter 8: Elements location approachCHAPTER GOAL: This chapter describes Boozang’s unique approach for locating WEB GUI elements, one of the features that sets it apart from other tools. Boozang, with its set of locators based on natural language, allows you to focus on the scenario flow rather than the web page DOM.NO OF PAGES: 14SUB - TOPICS:1. Boozang location strategy2. Fine tuning the locators3. Validating the expected resultsChapter 9: Exit conditions, conditional flows, and timersCHAPTER GOAL: The first test you will try with Boozang will be a simple sequential list of actions. But, as soon as you start implementing real scenarios, you will have to use exit conditions, loops, and conditional flows. In combination with this, you may need to adjust the timing of some locators, as some applications may have slow background processes, heavy loading pages, and/or javascripts. In this chapter, we see how to apply these concepts to build solid and reusable building blocks.NO OF PAGES: 21SUB - TOPICS:1. Exit conditions2. Conditional flows3. Loop groups4. TimersChapter 10: Data ManagementCHAPTER GOAL: This is probably one of the most important chapters, as data management is one of the main keys to build reusable components. Boozang is extremely powerful and flexible when it comes to managing test data. But power and flexibility can hide a complexity cost if you don’t use it properly.NO OF PAGES: 13SUB - TOPICS:1. Data management concepts2. Parameters3. Project data ($project)4. Module data ($module)5. Test data ($test)6. Loops ($loop, $group, $action)7. Examples from the trenchesChapter 11: Reporting and troubleshootingCHAPTER GOAL: This chapter covers some standard and more advanced reporting features available in Boozang as well as the best way you can analyze failures with minimal effort.NO OF PAGES: 20SUB - TOPICS:1. Test reports2. Trend reports3. Troubleshooting failuresPART 3: Integrations and Advanced topicsChapter 12: APIs and mixed API/GUI testingCHAPTER GOAL: In today’s world applications are highly interconnected, both with internal and external systems. Restful APIs are becoming the de-facto standard to allow this communication. This chapter explains how to test Restful APIs and create scenarios with both GUI and API actions. Boozang allows you to do API testing as well as mix API calls within your GUI tests.NO OF PAGES: 17SUB - TOPICS:1. Restful APIs2. Why Boozang for testing APIs?3. API Tests in Boozang4. Server side mock with JSON Server5. API Tests from the trenchesChapter 13: Gherkin and Behavior Driven DevelopmentCHAPTER GOAL: This chapter introduces the reader to the Gherkin language and the practice of Behavior Driven Development (BDD), also known as Acceptance Test Driven Development (ATDD).NO OF PAGES: 18SUB - TOPICS:1. Behavior Driven Development2. Gherkin without BDD, pros and cons3. Gherkin language, readability above all,... if possible4. Some good and bad examplesChapter 14: JIRA with Boozang via XRayCHAPTER GOAL: This chapter shows how to effectively manage releases via JIRA, XRAy and Boozang to have a complete quality view on releases when using both manual and automated tests.NO OF PAGES: 17SUB - TOPICS:1. Using JIRA with XRay2. Boozang integration with XRayChapter 15: Jenkins and the Boozang runnerCHAPTER GOAL: This chapter shows how to use Jenkins for scheduling and reporting automated tests results in a CI/CD pipeline. We will see how Boozang can be used with other tools to provide a fully automated pipeline and also how to reduce the execution time through parallel runs.NO OF PAGES: 40SUB - TOPICS:1. Continuous Delivery and the need for automating acceptance tests2. Puppeteer and the Boozang runner3. How to use the Docker runner4. Keeping execution time low with parallel runs5. Reports and log files6. Publishing reports on Jenkins and JIRA7. Complete working pipeline8. Docker in Docker setupChapter 16: Boozang for teamsCHAPTER GOAL: Working with a team increases productivity but brings new challenges. This chapter covers all the Boozang features for collaborative work, but also some specific details on how to effectively collaborate in a Test Automation project.NO OF PAGES: 26SUB - TOPICS:1. Team collaboration2. Explicit lock3. Concurrent development and safe refactoring with branches4. Tests Map5. Quality controlConclusionsAppendix
Cloud Native Applications with Docker and Kubernetes
This book takes developers on a journey into the cloud with Docker and Kubernetes. It walks you through the basics of Docker containers, how they are built, run, and published, and how the Kubernetes system allows you to use containers to better manage a cloud native application. Additionally, it walks you through various issues in cloud architecture, and how to design a cloud architecture that will work with your application and your team.The book takes a unique approach, getting you immersed in each subject with tutorials, then building up your technical knowledge, and finally backing up and thinking about more big-picture issues. Part one introduces Docker, building and working with Docker images, and covering best practices for Docker Containers. Part two covers the practicalities of "cloud native” and managing a Kubernetes application, including a full working example. The last part covers the design of cloud and microservice architectures, including the use of enterprise message queues, multi-site configurations and the common values that such architectures follow.This approach accelerates learning and keeps you moving forward without leaving you behind. The appendices also contain a wealth of worthwhile reference material for routine cloud application management.WHAT YOU WILL LEARN* Understand Docker and containerization* Gain insight into what Kubernetes is* Master essential cloud architecture design principles* Design and implement notes for building cloud architecturesWHO THIS BOOK IS FORPrimarily developers who are moving to the cloud and want to get a sense of the environment they are getting into, and developers who want to move into a larger role of cloud architecture. Jonathan Bartlett is a senior software developer for McElroy Manufacturing. In his career he has served as senior developer and cloud architect roles for several companies in the biking industry, the music industry, the housing industry, and the medical industry. Jonathan has also taught computer science at the college and high school levels. In his spare time he writes for MindMatters.ai and also writes research papers on artificial intelligence, mathematics, and the applications of information theory to other sciences. Chapter 1. Introduction - what they should expect from the book.PART 1: DOCKERChapter 2. Docker Under the Hood - introduction to the history and technology behind Docker. I find that really understanding Docker containers well requires a brief knowledge of their history and implementation.Chapter 3. A Docker Interactive Tutorial - the basics of building and working with Docker imagesChapter 4. Best Practices for Docker Containers - general tips, Debian vs Alpine, etc.PART 2: KUBERNETESChapter 5. The Cloud Native Philosophy - a general intro to the goals behind “Cloud Native” and KubernetesChapter 6. Getting Started with Kubernetes - showing how to deploy a simple system on Kubernetes with the Kubernetes dashboardChapter 7. Managing Kubernetes with kubectl - an introduction to the kubectl toolChapter 8. The Kubernetes environment - now that the user has some hands-on with Kubernetes, we introduce the components themselvesChapter 9. Basic Kubernetes Management - how to work with YAML filesChapter 10. A Full Kubernetes Cloud Example - full Kubernetes code for a cluster for a Message Board systemChapter 11. Going Further in Kubernetes - a brief introduction to other parts of KubernetesPART 3: CLOUD ARCHITECTUREChapter 12. Cloud Architecture Introduction - why architecting mattersChapter 13. Basic Cloud Architectures - basic architectural diagrams for the most common situationsChapter 14. Microservice Architectures - what microservices are, why they are important, and how to build such an architectureChapter 15. Enterprise Message Queues - what message queues are and how they make micro service architectures more flexible and resilientChapter 16. Architecting Data Stores - various database (and other data store) optionsChapter 17. Multi-Site Configurations - introducing terminology and through processes behind multi-site configurationsChapter 18. Architecture Values - a discussion of common themes for cloud architecturesChapter 19. ConclusionAPPENDICES:1. Navigating the Linux Command Shell2. Installing Applications3. Common kubectl commands4. Kubernetes Storage Options5. Kubernetes Pod Scheduling6. Troubleshooting Kubernetes Clusters
Serverless Beyond the Buzzword
Know how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.Deployment automation and DevOps also feature heavily in this book, and you will find real-world use cases and examples of Serverless architecture to get you started. It's worth noting that this book is not a development guide; it gives you a comprehensive understanding of what Serverless is so you can make informed decisions for your organization and projects.WHAT YOU’LL LEARN* Understand Serverless architecture and strategy* Understand modern cloud management strategy, governance, and organizational team structure* Handle budget planning and management* Get started with Serverless architecture design* Gain knowledge of best practices and security, as well as data management and DevOps* Study proactive logging, operations, architecture examples, case studies, and moreWHO THIS BOOK IS FORAnyone interested in a deep understanding of Serverless and how it can impact organizations and projects, regardless of their technical level. Strategic insights are provided for entrepreneurs and executives, planning and team insights for project managers, and technical insights for architects and team leads. Cloud consultants working with enterprises can read everything for a full, in-depth understanding of the topic. Other readers, such as less technical CTOs/CIOs, VPs, entrepreneurs, product owners, project managers, etc., can get what they need from the first 5-7 chapters. More technical readers and those experienced with Serverless can skim through the first 3 chapters and start with the security deep dive in Chapter 4.Thomas Smart has been actively involved with digital projects since 2002. His experience crosses many industries and types and sizes of organisations, giving him a wealth of experience and knowledge to draw upon as part of his consulting services. Since 2020 he has worked as a senior consultant for Sourced Singapore, helping large, regulated enterprises evolve their cloud strategy to productively deliver Serverless applications. This experience has provided many new insights for large enterprises and their unique challenges when adopting modern cloud strategies. About the authorAcknowledgementsPrologueWho is this book for?Technical levels used in this bookWhat will you learn?Amazon Web Services (AWS)Second editionChapter 1: Serverless basicsWhat is Serverless architecture?MicroservicesServerless exampleHistory of ServerlessTypes of projectsKey challengesKey benefitsCommon objectionsPublic case studiesChapter 2: StrategyIntroductionTraditional organization structure vs ServerlessCloud Centre of Excellence (CCoE)Cloud controls as compliance guardrailsSupporting toolsServerless adoption: current stateServerless adoption: desired stateServerless adoption: gap analysisApplication suitability for ServerlessEvent StormingPublic case studiesChapter 3: FinancesTotal Cost of Ownership (TCO)The value of paying for utilizationThe cost to develop ServerlessThe cost of migrating applicationsThe cost of maintenance and operationsEstimating the cloud operational costsCollecting the input data for an estimateCalculating the estimateCost managementCost optimizationChapter 4: SecurityShared responsibilityServerless securityPrinciple of Least PrivilegeIAM Policy tipsSecurity for cloud usersSecurity for microservicesUser input validationStoring credentialsEncryptionProtecting DataSecuring DatabasesPrivacy and GDPRSecurity monitoring with ElectricEyeChapter 5: PeopleServerless rolesServerless roles: Solution ArchitectServerless Roles: Cloud Security EngineerServerless Roles: Deployment Automation EngineerServerless roles: Full Stack DeveloperServerless roles: Database EngineerServerless trainingServerless team structureWorking with Serverless vendorsVetting Serverless capabilitiesChapter 6: DevOps & ToolingWhat is DevOps?Infrastructure as CodeAWS CloudFormationAWS CloudFormation planningTerraformAWS Serverless Application Model (SAM)AWS AmplifyAWS Cloud Development Kit (CDK)CDK technical considerationsServerless FrameworkCode RepositoriesGIT SubmodulesDeveloper ToolingCode quality assuranceChapter 7: DataData is a valuable assetDatabase selectionEvent SourcingData tenancyRelational Database Service (RDS)Redshift ServerlessDynamoDBNoSQLServerless NoSQL databasesManaged NoSQL databasesNoSQL databases comparisonIn-memory databasesAppSyncSimple Storage Solution (S3)Elastic File System (EFS)Chapter 8: Logging & TestingLoggingReactive LoggingProactive LoggingLogging format and contentLog types in the cloudCloud logging servicesCloudWatchExporting logs to S3CloudWatch SubscriptionsManaged services for proactive loggingError MonitoringPerformance OptimisationCost TrackingSecurity MonitoringLogging Best PracticesTestingTesting Challenges in ServerlessTypes of TestsAsynchronous TestingRisk Assessment for TestingTest Pyramid vs Test HoneycombContract Testing for ServerlessDeployment PipelineAWS Testing ServicesChapter 9: ArchitectureChallenges & mitigationsAWS: MicroservicesAWS: Application Programming Interface (API)Design patternsMicroservice example architecturesStateless architectureDecoupling microservicesAWS: DecouplingEvent-driven architectureAsynchronous design patternContainersAWS: EdgeAWS: Internet of Things (IoT)AWS: Managed Machine Learning (ML)AWS: Ledger TechnologyAWS: Call CentreWell-Architected FrameworkServerless tipsChapter 10: Case studiesIntroductionProactive loggingServerless data lakeVideo analysisServerless MinecraftDynamic live streamingSEO-friendly website and CMSVirtual hostTrue Serverless containersEpilogueReferences
Infrastructure Leader's Guide to Google Cloud
Making fast and accurate technology decisions is critical to staying relevant to your customers. And technology needs to add value back to your organization quicker than ever. Google Cloud offers IT leaders the answer to today’s technology challenges. However, to realize its benefits you must navigate your journey without hitting common pitfalls that lead to stalled and unsuccessful cloud adoption.This book distills the lessons learned from guiding and working with hundreds of organizations on their journey to the cloud. Its goal is to give aspiring and current IT leaders the knowledge required to be an infrastructure leader. That is the term author Jeremy Lloyd uses for the person who can lead your organization's Google Cloud adoption strategy.Of course, cloud adoption isn’t a solo endeavor. Jeremy covers the different generations of IT leaders, the team structure, and the skills required for a successful migration to Google Cloud. This book also covers why you should choose Google Cloud, how to build a business case for the cloud, and defining your adoption/migration/modernization strategies and cloud operating model. Finally, the book covers how to empower your developers to deploy cloud-native applications and how to support day two operations once you have moved to Google Cloud.WHAT YOU WILL LEARN* Use Google Cloud to add value to your organization* Define and lead your Google Cloud adoption strategy * Migrate and modernize your workloads* Operate workloads once in Google Cloud and avoid antipatterns* Understand how the infrastructure team can be enablers for cloud-native developmentWHO THIS BOOK IS FORCurrent infrastructure/IT/technology leaders who need guidance for their Google Cloud adoption, migration, and modernization journey; IT managers, IT team leads and IT professionals aspiring to be the next IT leaders who must learn to navigate more than just technical complexity.JEREMY LLOYD has over 20 years of experience in IT. He has spent the last eight years helping organizations worldwide adopt and migrate to the cloud. During this time, he’s guided and advised technology leaders from some of the world’s most well-known companies on their cloud adoption, migration and modernization strategies. In addition, he is a mentor to technology leaders and a speaker at numerous events across the UK and internationally.CHAPTER 1: INTRODUCTIONChapter Goal: Introduce a concept that there are essentially four types of infrastructure leaders as I know them. Let them build a relationship with one of the four which provides them with a lens upon which to view the current state and the path to progress forwards with GCP. Then inform them of the role that an infrastructure leader plays in a GCP adoption and migration strategy. Lay out the challenges they will face adopting GCP/Cloud. Provide guidance on a fundamental shift from a cost centre to a profit centre.No of pages - 12Sub-Topics1. What does an Infrastructure Leader do? Or Who is an Infrastructure Leader?2. Type of Infrastructure Leaders3. Challenges4. Becoming a profit centreCHAPTER 2: ABOUT GOOGLE & GOOGLE CLOUDChapter Goal: Take the reader on a short journey of the history of Google and bring out the narrative around their values and principles and empower them to lead innovation across every sector they touch. Then bring out the core value proposition of Google Cloud itself, underpinned by evidence to backupNo of pages - 28Sub - Topics1. Google short history2. Introducing Google Cloud Platform3. Google Cloud Platform core components4. Why use Google Cloud PlatformCHAPTER 3: FUTURE OF ITChapter Goal: Orient the reader into understanding that their current state has to change. Back up the messaging with trends and data points they can’t refute.No of pages - 3Sub - TopicsCHAPTER 4: THE FOUR STAGES OF GOOGLE CLOUD PLATFORM ADOPTIONChapter Goal: Label and define the four states of GCP/Cloud adoption. Let the reader understand how and where any experience they currently have sits. Help them understand the considerations to going with one strategy over the others.No of pages - 7Sub - Topics1. Shadow IT2. Tactical Adoption3. Strategic Adoption4. Organisation TransformationCHAPTER 5: BUSINESS CASEChapter Goal: Arm the reader with the information they need to write a rapid or detailed business case to justify adoption and migration to GCP. The aim is to make is simple for them to get the right story that will resonate with their organisation.No of pages - 6Sub - Topics1. Rapid Business Case2. Detailed Business Case3. Integrating with an existing business case templateCHAPTER 6: THE CLOUD STRATEGYChapter Goal: Show them the importance of having a well-defined cloud strategy. Then give them almost a blueprint upon which to follow in how to create one.No of pages - 10Sub - Topics1. Version2. Executive Summary3. Current State4. Financial Models5. Alignment to business strategy6. Guiding Principles7. Security8. Compliance9. Risk Management10. Governance11. Ways of Working12. Objectives and Key Results (OKRs)13. Implementation PlanCHAPTER 7: CLOUD OPERATING MODELChapter Goal: With a defined cloud strategy you need the next layer which is to define what your cloud operating model is. This chapter aims to inform what to consider and how their operating model could look and how to ensure it can evolve as the organisation matures with GCP.No of pages - 6Sub - TopicsCHAPTER 8: MIGRATION STRATEGIESChapter Goal: Inform the reader of the industry used migration approaches and Google Cloud’s take on them.No of pages - 3-5Sub - Topics1. Migration Objectives2. Migration Risk management3. Googlers & Office of the CTO4. Partner Ecosystem5. ActionsCHAPTER 9: MODERNISATION STRATEGIESChapter Goal: Inform the reader about modernisation strategies, Google’s tools and some simple methods to help them quickly decide what to modernise.No of pages - 10Sub - Topics1. Modernisation guardrails2. Modernisation roadmap3. Mainframe Modernisation4. Migration Decision Tree5. ActionsCHAPTER 10: ORGANISATIONAL READINESSChapter Goal: Provide the reader with the considerations across key areas that will help them be prepared for cloud adoption/migration.No of pages - 34Sub - Topics1. Paving the roads for cultural change2. Google Cloud Adoption Framework3. Managing The Hype-cycle4. Skillset5. Cloud Adoption Teams (CMO, CCoE etc)6. Building a Cloud Center of Excellence7. Security Readiness8. Governance Readiness9. Operations ReadinessCHAPTER 11: MIGRATION & MODERNISATION TEAM STRUCTURESChapter Goal: Get the reader to understand the people, skills and ways of working that GCP migration and modernisation requiresNo of pages - 2Sub - TopicsCHAPTER 12: MIGRATIONSChapter Goal: Provide guidance across migration assessment, planning and execution. Inform them what good first mover workloads look like.No of pages - 20-22Sub - Topics1. Introducing The Migration Journey2. Assess3. Plan4. Migrate5. OptimiseCHAPTER 13: CLOUD-NATIVE DEVELOPMENTChapter Goal: The infrastructure leader won’t be responsible for cloud-native development but they can/should play a key role in it’s facilitation. It showcases the considerations across new areas that the infrastructure team should be focusing on.No of pages - 20Sub - Topics1. Cloud-Native Advantages2. Containers3. Integrated Development Environment4. Serverless5. BeyondProdCHAPTER 14 : DAY 2 OPERATIONSChapter Goal: Introduce the concept of Day 2 Operations to the reader. Then give them guidance around what the infrastructure team should be thinking about across each of the sub-topics, all staying within a day 2 operations context.No of pages - 60Sub - Topics1. Day 2 Cloud Challenges2. Cloud Foundations3. Landing Zones4. Compute5. Monitoring, Logging And Alerting6. Availability7. Reliability8. Recoverability9. Financial Operations10. Performance11. Security12. Automation13. Governance and Compliance14. Cloud Marketplace15. GCP Managed Services16. Containers17. Data Analytics18. Open Source19. Support20. Day 2 antipatterns21. DevOps/SRE/CRECHAPTER 15: PRODUCTIVITY AND COLLABORATIONChapter Goal: Introduce a Google concept of BeyondCorp and how that ties in with a GCP migration strategy. Introduce Google Workspace and benefits of using it.No of pages - 8Sub - Topics1. BeyondCorp2. Google Workspace
IT-Management
Dieses Buch befasst sich mit der Kunst des IT-Managements. Es wird ein einfacher und robuster Rahmen vorgeschlagen, um die wesentlichen Elemente des IT-Managements zu beschreiben und zu strukturieren. Die Autoren legen besonderes Augenmerk auf didaktische Aspekte, um das Behalten der vorgestellten Modelle zu erleichtern und das Nachdenken über die vorgestellten Themen zu fördern. Dank eines Konzentrats an bewährten Praktiken wird jedes Unternehmen schnell in der Lage sein, sein eigenes IT-Ökosystem aufzubauen.DR. LIONEL PILORGET war in verschiedenen IT-Managementpositionen in der Industrie und im Finanzsektor tätig. Zu seinen vielfältigen Aufgaben gehörten die Umsetzung von Richtlinien und Strategien sowie die Leitung von komplexen, strategischen IT-Projekten. Derzeit ist er Leiter Business Analysen und Projektmanagement bei einer Privatbank in der Schweiz. Ausserdem ist er Dozent für den Masterstudiengang "Wirtschaftsinformatik" an der Fachhochschule Nordwestschweiz FHNW.THOMAS SCHELL hat Informatik studiert und sich auf den Bereich Management von IT-Prozessen, -Services und -Organisationen spezialisiert. Dreimal in seiner Karriere hat er klassische IT-Organisationen zu kundenorientierten IT-Dienstleistern umgestaltet. Nach 25 Jahren in der Schweizer Pharma- und Chemieindustrie ist er heute Dozent für IT Service Management an Fachhochschulen in der Schweiz und in Deutschland. Er unterstützt IT-Organisationen als Berater und Trainer für Best-Practice-Frameworks.
Pro .NET on Amazon Web Services
This book provides in-depth guidance and best practices for .NET developers new to working with Amazon Web Services. AWS is the world’s most comprehensive and broadly adopted cloud platform, and this book will help you choose from, and use, its extensive collection of cloud services when developing and hosting your .NET applications in the cloud.Pro .NET on Amazon Web Services focuses on the building and deployment of .NET applications on AWS. It demonstrates best practices and provides prescriptive guidance around moving existing .NET Framework, .NET Core, and .NET 5+ applications to AWS. It also offers directions on building new, distributed, and reliable cloud-native applications. You will learn how to take advantage of the various tools available from AWS to build and deploy .NET-based applications. You will also be shown how to take advantage of different AWS services, including various execution platforms and databases that can help your .NET applications to achieve the reliability and scalability that AWS is known for.WHAT YOU WILL LEARN* Develop and deploy Microsoft .NET applications on the Amazon Web Services platform* Take advantage of the various free tools AWS offers for developing and deploying cloud applications* Choose the correct compute service on which to host your application* Choose the right database from the many options that AWS offers* Make AWS service calls from within .NET applications* Secure .NET applications using best practices around AWS Identity and Access Management (IAM)* Migrate existing .NET applications to the AWS platform and take advantage of the services offered* Build modern .NET applications using advanced AWS servicesWHO THIS BOOK IS FOR.NET developers seeking to take advantage of the breadth and depth of functionality in the AWS cloud, as well as developers who, whether new to cloud applications or experienced in the cloud, face challenges in understanding and applying the breadth and depth of services available from AWS when choosing to develop and host their applications. It will also be useful for those interested in extending their application’s functionality through calling AWS services from within their applications, and who want to apply best practices for building and securing modern distributed .NET applications in the Amazon Web Services cloud.BILL PENBERTHY has over 25 years in software development (almost 15 of which is .NET), and brings a pragmatic approach to software development . With much of that time spent in consulting, he has worked on many different projects and used many different designs and approaches. In 2019, he switched to the dark side where he puts his development experience towards being a .NET developer advocate with AWS.STEVE ROBERTS is a Developer Advocate for .NET and PowerShell development at AWS. Based in Seattle, Washington, Steve worked for 8 years as a Senior Development Engineer on the AWS tools for .NET. He was the development lead for the AWS Tools for PowerShell and the AWS Tools for Azure DevOps and contributed to the AWS Toolkits for Visual Studio, and Visual Studio Code, and the AWS SDK for .NET. Prior to joining AWS, Steve had over 20 years’ experience as a developer focused on IDE tools and integrations.PART I. GETTING STARTED1. The Core Essentials2. AWS Tools for .NET3. Additional ToolsPART II. HOSTING YOUR APPLICATIONS4. Virtual Machines5. Containers6. ServerlessPART III. STORING YOUR DATA7. S3 Object Storage8. Microsoft SQL Server9. Other RDS Databases10. NoSQL Databases and AWS11. Purpose-built DatabasesPART IV. MOVING EXISTING APPS TO AWS12. Moving to Virtual Machines.13. Containerizing14. Migrating your Data15. Re-platforming and RefactoringPART V. BUILDING CLOUD NATIVE APPLICATIONS16. Events and Messaging17. Monitoring and Observability
MySQL Database Service Revealed
Access all the information you need to begin using the MySQL Database Service (MDS) in the Oracle Cloud Infrastructure (OCI). MDS is Oracle’s new platform as a service (PAAS) offering for open-source database users. This book covers getting started with an account in OCI, gives a brief overview of OCI services available, and provides a short tutorial on MDS. Reading this book helps you take advantage of the powerful OCI features by building your own MySQL database in the cloud.Examples in this book center around running MDS in OCI, and include several of the popular use cases as well as advice on how to implement them. In addition, you will learn more about the related MDS OCI features, such as the high availability features currently available. Finally, you will learn how to back up and restore your data as well as how to get your data into and out of the cloud. The skills you learn in this book will help you get started using MDS and letting Oracle do the heavy lifting of managing MDS operations and implementation.WHAT YOU WILL LEARN* Use Oracle Cloud Infrastructure (OCI)* Deploy MySQL Database Service (MDS) systems in the cloud* Connect your applications to MDS* Back up and recover using the data recovery features of MDS* Employ the newest high availability features of MDSWHO THIS BOOK IS FORSystems engineers, developers, and database professionals who want to learn about the powerful features of the MySQL Database Service (MDS) and how to incorporate cloud-based database storage into their infrastructure and applications. Readers who are new to MySQL will appreciate the tutorial chapter, and those familiar with MySQL will learn the latest features of MDS as well as how to build inexpensive, powerful MySQL database servers in the Oracle Cloud Infrastructure (OCI).CHARLES BELL conducts research in emerging technologies. He is a member of the Oracle MySQL Development team and is one of the principal developers for the MySQL Database Service (MDS) team supporting MySQL as a service in the Oracle Cloud Infrastructure (OCI). He received his Doctor of Philosophy in Engineering from Virginia Commonwealth University in 2005.Dr. Bell is an expert in the database field and has extensive knowledge and experience in software development and systems engineering. His research interests include 3D printers, microcontrollers, database systems, cloud systems, software engineering, Internet of Things, and sensor networks.Dr. Bell lives in a small town in rural Virginia with his loving wife. He spends his limited free time as a practicing Maker, focusing on microcontroller projects and refinement of 3D printers. 1. Getting Started with MySQL in the Cloud2. Oracle Cloud Infrastructure3. A Brief Tutorial of MySQL4. MySQL Database Service5. Backup and Restore6. Point-in-Time Recovery7. Data Import and Export8. High Availability9. OCI Command-Line Interface and Application Programming Interfaces10. Migrating to MDS
Hacking & Security - Das umfassende Handbuch (3. Auflage)
Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre IT-Systeme auch wirklich absichern. Dieses umfassende Handbuch ist der Schlüssel dazu. Die Security-Profis rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen – Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern: Hier werden Sie zum Security-Experten!Aus dem Inhalt: Kali LinuxHacking-Tools (nmap, hydra, mimikatz, Metasploit, OpenVas)Externe Sicherheitsüberprüfung & Pen-Tests auf Client und ServerIT-Forensik: Spuren sichern und analysierenWLAN, Bluetooth und Funk abhören, USB-Hacking-DevicesBasisabsicherung: Linux und Windows, Active Directory und SambaCloud-Sicherheit: Microsoft 365, AWS, NextCloudHacking und Security von SmartphonesIntrusion Detection mit SnortWeb-Anwendungen absichern und angreifenExploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr; Inkl. Spectre & MeltdownIoT-Security: Angriffe und sichere EntwicklungLeseprobe (PDF-Link)
Rechnernetze
Wie Daten zwischen Rechnern ausgetauscht werden, ist absolutes Grundlagenwissen im Informatikstudium: Das OSI-Modell und die Grundlagen der paketbasierten Kommunikation müssen Sie kennen, wenn Sie professionell mit Computern arbeiten. Dazu finden Sie in diesem umfassenden Lehrbuch den vollständigen Überblick über moderne Netzwerkthemen: Von der technischen Umsetzung über Algorithmen und Protokolle bis zur Planung und Konzeption von Netzwerkarchitekturen. Aus dem Inhalt: Netzwerke im ÜberblickEthernet und WLANPackete, Verbindungen und RoutingRouting-Algorithmen und Large Scale IP-RoutingBorder Gateway Protocol (BGP)IPv4 und IPv6 und Ihre Begleiter: DNS, ARP, DHCP, SLAACTransportprotokolle: UDP und TCPQueuing und SchedulingQuality of ServiceNetzwerkmanagement mit SNMPSicherheit und praktische Anwendung Materialien zum Buch ... 25 Geleitwort des Fachgutachters ... 27 1. Netzwerke im Überblick ... 29 1.1 ... Schichten ... 29 1.2 ... Datenrate, Durchsatz und Bandbreite ... 30 1.3 ... Pakete ... 31 1.4 ... Datagrammweiterleitung ... 33 1.5 ... Topologie ... 37 1.6 ... Routing-Schleifen ... 38 1.7 ... Überlast ... 40 1.8 ... Mehr über Pakete ... 41 1.9 ... LANs und Ethernet ... 42 1.10 ... IP -- Internet Protocol ... 45 1.11 ... DNS ... 54 1.12 ... Transport ... 55 1.13 ... Firewalls ... 61 1.14 ... Einige nützliche Dienstprogramme ... 63 1.15 ... IETF und OSI ... 65 1.16 ... Berkeley Unix ... 69 1.17 ... Epilog ... 70 1.18 ... Übungen ... 70 2. Ethernet-Grundlagen ... 75 2.1 ... Klassisches 10-Mbit/s-Ethernet ... 76 2.2 ... 100 Mbit/s (Fast) Ethernet ... 93 2.3 ... Gigabit-Ethernet ... 95 2.4 ... Ethernet-Switches ... 96 2.5 ... Epilog ... 101 2.6 ... Übungen ... 102 3. Weiterführende Ethernet-Themen ... 107 3.1 ... Spanning-Tree-Algorithmus und Redundanz ... 108 3.2 ... Virtuelles LAN (VLAN) ... 114 3.3 ... TRILL und SPB ... 119 3.4 ... Software-Defined Networking ... 122 3.5 ... Epilog ... 132 3.6 ... Übungen ... 132 4. Drahtlose LANs ... 137 4.1 ... Abenteuer im Funkland ... 137 4.2 ... Wi-Fi ... 143 4.3 ... WiMAX und LTE ... 182 4.4 ... Ortsfeste Drahtlosnetzwerke ... 188 4.5 ... Epilog ... 190 4.6 ... Übungen ... 191 5. Sonstige LAN-Technologien ... 195 5.1 ... Virtuelle private Netzwerke ... 195 5.2 ... Carrier-Ethernet ... 197 5.3 ... Token Ring ... 198 5.4 ... Virtuelle Verbindungen ... 200 5.5 ... Asynchronous Transfer Mode: ATM ... 204 5.6 ... Epilog ... 208 5.7 ... Übungen ... 208 6. Verbindungen ... 213 6.1 ... Kodierung und Frames ... 213 6.2 ... Zeitmultiplexverfahren ... 220 6.3 ... Epilog ... 227 6.4 ... Übungen ... 227 7. Pakete ... 229 7.1 ... Paketverzögerung ... 229 7.2 ... Schwankungen der Paketverzögerung ... 233 7.3 ... Paketgröße ... 234 7.4 ... Fehlererkennung ... 237 7.5 ... Epilog ... 245 7.6 ... Übungen ... 245 8. Sliding Windows ... 251 8.1 ... Zuverlässige Datenübertragung: Stop-and-Wait ... 251 8.2 ... Die Sliding-Windows-Strategie ... 256 8.3 ... Lineare Flaschenhälse ... 261 8.4 ... Epilog ... 271 8.5 ... Übungen ... 271 9. IP Version 4 ... 277 9.1 ... Der IPv4-Header ... 279 9.2 ... Schnittstellen ... 282 9.3 ... Spezielle Adressen ... 284 9.4 ... Fragmentierung ... 287 9.5 ... Der klassenlose IP-Delivery-Algorithmus ... 290 9.6 ... IPv4-Subnetze ... 294 9.7 ... Netzwerkadressübersetzung ... 302 9.8 ... Unnummerierte Schnittstellen ... 309 9.9 ... Mobile IP ... 311 9.10 ... Epilog ... 313 9.11 ... Übungen ... 313 10. IPv4-Begleitprotokolle ... 317 10.1 ... DNS ... 317 10.2 ... Address Resolution Protocol: ARP ... 336 10.3 ... Dynamic Host Configuration Protocol (DHCP) ... 341 10.4 ... Internet Control Message Protocol ... 343 10.5 ... Epilog ... 349 10.6 ... Übungen ... 349 11. IPv6 ... 351 11.1 ... Der IPv6-Header ... 352 11.2 ... IPv6-Adressen ... 353 11.3 ... Netzwerkpräfixe ... 358 11.4 ... IPv6-Multicast ... 359 11.5 ... IPv6-Erweiterungsheader ... 360 11.6 ... Nachbarschaftserkennung (Neighbor Discovery) ... 364 11.7 ... Zuweisung von IPv6-Hostadressen ... 371 11.8 ... Epilog ... 378 11.9 ... Übungen ... 378 12. Weitere IPv6-Funktionen ... 381 12.1 ... Weltweit sichtbare Adressen ... 381 12.2 ... ICMPv6 ... 382 12.3 ... IPv6-Subnetze ... 384 12.4 ... IPv6 und IPv4 gemeinsam benutzen ... 386 12.5 ... IPv6-Beispiele ohne Router ... 392 12.6 ... IPv6-Konnektivität über Tunneling ... 395 12.7 ... Konnektivität von IPv6 nach IPv4 ... 400 12.8 ... Epilog ... 402 12.9 ... Übungen ... 402 13. Routing-Update-Algorithmen ... 405 13.1 ... Distanzvektor-Routing-Update-Algorithmus ... 406 13.2 ... Langsames Konvergenzproblem bei Distanzvektoren ... 413 13.3 ... Minimierung der Streckenkosten ... 415 13.4 ... Schleifenfreie Distanzvektor-Algorithmen ... 418 13.5 ... Link-State-Routing-Update-Algorithmus ... 427 13.6 ... Routing nach anderen Attributen ... 432 13.7 ... ECMP ... 434 13.8 ... Epilog ... 435 13.9 ... Übungen ... 436 14. IP-Routing im großen Maßstab ... 445 14.1 ... Classless Internet Domain Routing: CIDR ... 446 14.2 ... Hierarchisches Routing ... 449 14.3 ... Routing in früherer Zeit ... 450 14.4 ... Providerbasiertes Routing ... 451 14.5 ... Geografisches Routing ... 458 14.6 ... Epilog ... 459 14.7 ... Übungen ... 459 15. Border Gateway Protocol (BGP) ... 465 15.1 ... AS-Pfade ... 467 15.2 ... AS-Pfade und Routenaggregation ... 469 15.3 ... Transit-Traffic ... 471 15.4 ... BGP-Filterung und Routing-Policies ... 471 15.5 ... BGP-Tabellengröße ... 474 15.6 ... BGP-Pfadattribute ... 475 15.7 ... BGP und Traffic-Engineering ... 480 15.8 ... BGP und Anycast ... 484 15.9 ... BGP für internes Routing ... 485 15.10 ... BGP-Beziehungen ... 486 15.11 ... Beispiele für BGP-Instabilität ... 492 15.12 ... BGP-Sicherheit und Route Registrys ... 494 15.13 ... Epilog ... 500 15.14 ... Übungen ... 500 16. UDP-Übertragung ... 503 16.1 ... User Datagram Protocol -- UDP ... 503 16.2 ... Trivial File Transport Protocol, TFTP ... 520 16.3 ... Grundlegende Übertragungsprobleme ... 523 16.4 ... Weitere Anmerkungen zu TFTP ... 531 16.5 ... Remote Procedure Call (RPC) ... 534 16.6 ... Epilog ... 539 16.7 ... Übungen ... 539 17. Grundlagen des TCP-Transports ... 545 17.1 ... Das Ende-zu-Ende-Prinzip ... 547 17.2 ... TCP-Header ... 547 17.3 ... Aufbau einer TCP-Verbindung ... 549 17.4 ... TCP und WireShark ... 555 17.5 ... TCP-Offloading ... 557 17.6 ... TCP-Simplex-Talk ... 558 17.7 ... TCP und bind() ... 563 17.8 ... TCP-Zustandsdiagramm ... 565 17.9 ... Epilog ... 572 17.10 ... Übungen ... 572 18. TCP -- Probleme und Alternativen ... 577 18.1 ... Alte Duplikate bei TCP ... 577 18.2 ... TIMEWAIT ... 578 18.3 ... Der dreifache Handshake -- erneut betrachtet ... 580 18.4 ... Anomale TCP-Szenarien ... 583 18.5 ... Schnelleres Öffnen von TCP-Verbindungen ... 584 18.6 ... Path MTU Discovery ... 587 18.7 ... Sliding Windows bei TCP ... 587 18.8 ... Verzögerte ACKs bei TCP ... 588 18.9 ... Nagle-Algorithmus ... 589 18.10 ... Flusssteuerung bei TCP ... 590 18.11 ... Silly-Window-Syndrom ... 591 18.12 ... Zeitüberschreitung und Neuübertragung bei TCP ... 592 18.13 ... KeepAlive ... 594 18.14 ... TCP-Timer ... 594 18.15 ... Varianten und Alternativen ... 595 18.16 ... Epilog ... 608 18.17 ... Übungen ... 608 19. TCP Reno und Überlastmanagement ... 611 19.1 ... Grundlagen des TCP-Überlastmanagements ... 612 19.2 ... Slow Start ... 618 19.3 ... TCP Tahoe und Fast-Retransmit ... 624 19.4 ... TCP Reno und Fast-Recovery ... 626 19.5 ... TCP NewReno ... 630 19.6 ... Selektive Bestätigungen (SACK) ... 632 19.7 ... TCP und Auslastung der Flaschenhalsverbindung ... 633 19.8 ... Verluste einzelner Pakete ... 638 19.9 ... Annahmen zu TCP und Skalierbarkeit ... 639 19.10 ... TCP-Parameter ... 640 19.11 ... Epilog ... 641 19.12 ... Übungen ... 641 20. TCP-Dynamik ... 647 20.1 ... Ein erster Blick auf das Queuing ... 647 20.2 ... Flaschenhalsverbindungen mit konkurrierendem Datenverkehr ... 649 20.3 ... TCP Reno -- Fairness mit synchronisierten Verlusten ... 659 20.4 ... Epilog ... 669 20.5 ... Übungen ... 669 21. Weitere TCP-Dynamiken ... 675 21.1 ... Begriffe der Fairness ... 675 21.2 ... TCP-Reno-Verlustrate und cwnd ... 677 21.3 ... TCP-Freundlichkeit ... 680 21.4 ... Noch einmal AIMD ... 684 21.5 ... Aktives Warteschlangenmanagement ... 686 21.6 ... Das TCP-Problem der hohen Bandbreiten ... 694 21.7 ... Das Problem der verlustbehafteten Verbindungen ... 696 21.8 ... Das Problem der Satelliten-TCP-Verbindungen ... 697 21.9 ... Epilog ... 697 21.10 ... Übungen ... 698 22. Queuing und Scheduling ... 705 22.1 ... Queuing und Echtzeitdatenverkehr ... 706 22.2 ... Traffic-Management ... 707 22.3 ... Priority Queuing ... 708 22.4 ... Warteschlangenverfahren ... 708 22.5 ... Fair Queuing ... 710 22.6 ... Anwendungen von Fair Queuing ... 730 22.7 ... Hierarchisches Queuing ... 733 22.8 ... Hierarchical Weighted Fair Queuing ... 737 22.9 ... Epilog ... 744 22.10 ... Übungen ... 745 23. Token-Bucket ... 749 23.1 ... Token-Bucket -- Definition ... 750 23.2 ... Token-Bucket -- Beispiele ... 753 23.3 ... Mehrere Token-Buckets ... 754 23.4 ... GCRA ... 755 23.5 ... Gewährleistung der VoIP-Bandbreite ... 757 23.6 ... Verzögerung begrenzen ... 758 23.7 ... Token-Bucket durch einen Router ... 760 23.8 ... Token-Bucket durch mehrere Router ... 761 23.9 ... Verzögerungsbedingungen ... 762 23.10 ... CBQ ... 765 23.11 ... Linux HTB ... 765 23.12 ... Parekh-Gallager Theorem ... 767 23.13 ... Epilog ... 768 23.14 ... Übungen ... 768 24. Quality of Service ... 773 24.1 ... Netzneutralität ... 775 24.2 ... Wo die wilden Warteschlangen wohnen ... 775 24.3 ... Echtzeit-Datenverkehr ... 776 24.4 ... Integrated Services/RSVP ... 780 24.5 ... Globales IP-Multicast ... 781 24.6 ... RSVP ... 788 24.7 ... Differentiated Services ... 794 24.8 ... RED with In and Out ... 801 24.9 ... NSIS ... 801 24.10 ... Comcast-System zu Überlaststeuerung ... 802 24.11 ... Real-time Transport Protocol (RTP) ... 804 24.12 ... Multi-Protocol Label Switching (MPLS) ... 810 24.13 ... Epilog ... 814 24.14 ... Übungen ... 814 25. Netzwerkverwaltung und SNMP ... 817 25.1 ... Netzwerkarchitektur ... 820 25.2 ... SNMP-Grundlagen ... 820 25.3 ... Namen und OIDs unter SNMP ... 823 25.4 ... MIBs ... 825 25.5 ... SNMPv1-Datentypen ... 827 25.6 ... ASN.1-Syntax und SNMP ... 828 25.7 ... SNMP-Tabellen ... 829 25.8 ... SNMP-Operationen ... 835 25.9 ... MIB-Browsing ... 841 25.10 ... MIB-2 ... 842 25.11 ... SNMPv1-Communitys und -Sicherheit ... 853 25.12 ... SNMP und die ASN.1-Kodierung ... 855 25.13 ... Übungen ... 859 26. Die SNMP-Versionen 2 und 3 ... 863 26.1 ... SNMPv2 ... 863 26.2 ... Erstellung von Tabellenzeilen ... 879 26.3 ... SNMPv3 ... 890 26.4 ... Übungen ... 905 27. Sicherheit ... 907 27.1 ... Einbruch mit Ausführung von Code ... 909 27.2 ... Stapelüberlauf ... 911 27.3 ... Heap-Überlauf ... 923 27.4 ... Network Intrusion Detection ... 930 27.5 ... Ziele der Kryptografie ... 932 27.6 ... Sichere Hashes ... 934 27.7 ... Verschlüsselung mit gemeinsamem Schlüssel ... 940 27.8 ... Diffie-Hellman-Merkle-Schlüsselaustausch ... 954 27.9 ... Übungen ... 959 28. Verschlüsselung mit öffentlichem Schlüssel ... 963 28.1 ... RSA ... 963 28.2 ... Vorwärts gerichtete Geheimhaltung ... 967 28.3 ... Vertrauen und der Mann in der Mitte ... 969 28.4 ... Ende-zu-Ende-Verschlüsselung ... 970 28.5 ... SSH und TLS ... 971 28.6 ... IPsec ... 998 28.7 ... DNSSEC ... 1002 28.8 ... Beispiele mit RSA-Schlüssel ... 1016 28.9 ... Übungen ... 1020 Bibliografie ... 1023 Index ... 1033
Applikationsdesign mit SAP Analytics Cloud
Lernen Sie, wie Sie mit dem Analytics Designer maßgeschneiderte und flexible analytische Applikationen in SAP Analytics Cloud entwickeln, bereitstellen und überwachen. Die Autoren führen Sie durch die einzelnen Schritte der Anwendungsentwicklung und zeigen Ihnen, wie Sie die Applikationen an die Bedürfnisse der Anwender*innen anpassen. Aus dem Inhalt: ArchitekturDatenmodellierung und -anbindungEntwicklungsumgebungSkripte und WizardsBI-ApplikationenPlanungsapplikationenPredictive AnalysisStandard- und Custom Widgets Materialien zum Buch ... 25 Geleitwort des Fachgutachters ... 27 1. Netzwerke im Überblick ... 29 1.1 ... Schichten ... 29 1.2 ... Datenrate, Durchsatz und Bandbreite ... 30 1.3 ... Pakete ... 31 1.4 ... Datagrammweiterleitung ... 33 1.5 ... Topologie ... 37 1.6 ... Routing-Schleifen ... 38 1.7 ... Überlast ... 40 1.8 ... Mehr über Pakete ... 41 1.9 ... LANs und Ethernet ... 42 1.10 ... IP -- Internet Protocol ... 45 1.11 ... DNS ... 54 1.12 ... Transport ... 55 1.13 ... Firewalls ... 61 1.14 ... Einige nützliche Dienstprogramme ... 63 1.15 ... IETF und OSI ... 65 1.16 ... Berkeley Unix ... 69 1.17 ... Epilog ... 70 1.18 ... Übungen ... 70 2. Ethernet-Grundlagen ... 75 2.1 ... Klassisches 10-Mbit/s-Ethernet ... 76 2.2 ... 100 Mbit/s (Fast) Ethernet ... 93 2.3 ... Gigabit-Ethernet ... 95 2.4 ... Ethernet-Switches ... 96 2.5 ... Epilog ... 101 2.6 ... Übungen ... 102 3. Weiterführende Ethernet-Themen ... 107 3.1 ... Spanning-Tree-Algorithmus und Redundanz ... 108 3.2 ... Virtuelles LAN (VLAN) ... 114 3.3 ... TRILL und SPB ... 119 3.4 ... Software-Defined Networking ... 122 3.5 ... Epilog ... 132 3.6 ... Übungen ... 132 4. Drahtlose LANs ... 137 4.1 ... Abenteuer im Funkland ... 137 4.2 ... Wi-Fi ... 143 4.3 ... WiMAX und LTE ... 182 4.4 ... Ortsfeste Drahtlosnetzwerke ... 188 4.5 ... Epilog ... 190 4.6 ... Übungen ... 191 5. Sonstige LAN-Technologien ... 195 5.1 ... Virtuelle private Netzwerke ... 195 5.2 ... Carrier-Ethernet ... 197 5.3 ... Token Ring ... 198 5.4 ... Virtuelle Verbindungen ... 200 5.5 ... Asynchronous Transfer Mode: ATM ... 204 5.6 ... Epilog ... 208 5.7 ... Übungen ... 208 6. Verbindungen ... 213 6.1 ... Kodierung und Frames ... 213 6.2 ... Zeitmultiplexverfahren ... 220 6.3 ... Epilog ... 227 6.4 ... Übungen ... 227 7. Pakete ... 229 7.1 ... Paketverzögerung ... 229 7.2 ... Schwankungen der Paketverzögerung ... 233 7.3 ... Paketgröße ... 234 7.4 ... Fehlererkennung ... 237 7.5 ... Epilog ... 245 7.6 ... Übungen ... 245 8. Sliding Windows ... 251 8.1 ... Zuverlässige Datenübertragung: Stop-and-Wait ... 251 8.2 ... Die Sliding-Windows-Strategie ... 256 8.3 ... Lineare Flaschenhälse ... 261 8.4 ... Epilog ... 271 8.5 ... Übungen ... 271 9. IP Version 4 ... 277 9.1 ... Der IPv4-Header ... 279 9.2 ... Schnittstellen ... 282 9.3 ... Spezielle Adressen ... 284 9.4 ... Fragmentierung ... 287 9.5 ... Der klassenlose IP-Delivery-Algorithmus ... 290 9.6 ... IPv4-Subnetze ... 294 9.7 ... Netzwerkadressübersetzung ... 302 9.8 ... Unnummerierte Schnittstellen ... 309 9.9 ... Mobile IP ... 311 9.10 ... Epilog ... 313 9.11 ... Übungen ... 313 10. IPv4-Begleitprotokolle ... 317 10.1 ... DNS ... 317 10.2 ... Address Resolution Protocol: ARP ... 336 10.3 ... Dynamic Host Configuration Protocol (DHCP) ... 341 10.4 ... Internet Control Message Protocol ... 343 10.5 ... Epilog ... 349 10.6 ... Übungen ... 349 11. IPv6 ... 351 11.1 ... Der IPv6-Header ... 352 11.2 ... IPv6-Adressen ... 353 11.3 ... Netzwerkpräfixe ... 358 11.4 ... IPv6-Multicast ... 359 11.5 ... IPv6-Erweiterungsheader ... 360 11.6 ... Nachbarschaftserkennung (Neighbor Discovery) ... 364 11.7 ... Zuweisung von IPv6-Hostadressen ... 371 11.8 ... Epilog ... 378 11.9 ... Übungen ... 378 12. Weitere IPv6-Funktionen ... 381 12.1 ... Weltweit sichtbare Adressen ... 381 12.2 ... ICMPv6 ... 382 12.3 ... IPv6-Subnetze ... 384 12.4 ... IPv6 und IPv4 gemeinsam benutzen ... 386 12.5 ... IPv6-Beispiele ohne Router ... 392 12.6 ... IPv6-Konnektivität über Tunneling ... 395 12.7 ... Konnektivität von IPv6 nach IPv4 ... 400 12.8 ... Epilog ... 402 12.9 ... Übungen ... 402 13. Routing-Update-Algorithmen ... 405 13.1 ... Distanzvektor-Routing-Update-Algorithmus ... 406 13.2 ... Langsames Konvergenzproblem bei Distanzvektoren ... 413 13.3 ... Minimierung der Streckenkosten ... 415 13.4 ... Schleifenfreie Distanzvektor-Algorithmen ... 418 13.5 ... Link-State-Routing-Update-Algorithmus ... 427 13.6 ... Routing nach anderen Attributen ... 432 13.7 ... ECMP ... 434 13.8 ... Epilog ... 435 13.9 ... Übungen ... 436 14. IP-Routing im großen Maßstab ... 445 14.1 ... Classless Internet Domain Routing: CIDR ... 446 14.2 ... Hierarchisches Routing ... 449 14.3 ... Routing in früherer Zeit ... 450 14.4 ... Providerbasiertes Routing ... 451 14.5 ... Geografisches Routing ... 458 14.6 ... Epilog ... 459 14.7 ... Übungen ... 459 15. Border Gateway Protocol (BGP) ... 465 15.1 ... AS-Pfade ... 467 15.2 ... AS-Pfade und Routenaggregation ... 469 15.3 ... Transit-Traffic ... 471 15.4 ... BGP-Filterung und Routing-Policies ... 471 15.5 ... BGP-Tabellengröße ... 474 15.6 ... BGP-Pfadattribute ... 475 15.7 ... BGP und Traffic-Engineering ... 480 15.8 ... BGP und Anycast ... 484 15.9 ... BGP für internes Routing ... 485 15.10 ... BGP-Beziehungen ... 486 15.11 ... Beispiele für BGP-Instabilität ... 492 15.12 ... BGP-Sicherheit und Route Registrys ... 494 15.13 ... Epilog ... 500 15.14 ... Übungen ... 500 16. UDP-Übertragung ... 503 16.1 ... User Datagram Protocol -- UDP ... 503 16.2 ... Trivial File Transport Protocol, TFTP ... 520 16.3 ... Grundlegende Übertragungsprobleme ... 523 16.4 ... Weitere Anmerkungen zu TFTP ... 531 16.5 ... Remote Procedure Call (RPC) ... 534 16.6 ... Epilog ... 539 16.7 ... Übungen ... 539 17. Grundlagen des TCP-Transports ... 545 17.1 ... Das Ende-zu-Ende-Prinzip ... 547 17.2 ... TCP-Header ... 547 17.3 ... Aufbau einer TCP-Verbindung ... 549 17.4 ... TCP und WireShark ... 555 17.5 ... TCP-Offloading ... 557 17.6 ... TCP-Simplex-Talk ... 558 17.7 ... TCP und bind() ... 563 17.8 ... TCP-Zustandsdiagramm ... 565 17.9 ... Epilog ... 572 17.10 ... Übungen ... 572 18. TCP -- Probleme und Alternativen ... 577 18.1 ... Alte Duplikate bei TCP ... 577 18.2 ... TIMEWAIT ... 578 18.3 ... Der dreifache Handshake -- erneut betrachtet ... 580 18.4 ... Anomale TCP-Szenarien ... 583 18.5 ... Schnelleres Öffnen von TCP-Verbindungen ... 584 18.6 ... Path MTU Discovery ... 587 18.7 ... Sliding Windows bei TCP ... 587 18.8 ... Verzögerte ACKs bei TCP ... 588 18.9 ... Nagle-Algorithmus ... 589 18.10 ... Flusssteuerung bei TCP ... 590 18.11 ... Silly-Window-Syndrom ... 591 18.12 ... Zeitüberschreitung und Neuübertragung bei TCP ... 592 18.13 ... KeepAlive ... 594 18.14 ... TCP-Timer ... 594 18.15 ... Varianten und Alternativen ... 595 18.16 ... Epilog ... 608 18.17 ... Übungen ... 608 19. TCP Reno und Überlastmanagement ... 611 19.1 ... Grundlagen des TCP-Überlastmanagements ... 612 19.2 ... Slow Start ... 618 19.3 ... TCP Tahoe und Fast-Retransmit ... 624 19.4 ... TCP Reno und Fast-Recovery ... 626 19.5 ... TCP NewReno ... 630 19.6 ... Selektive Bestätigungen (SACK) ... 632 19.7 ... TCP und Auslastung der Flaschenhalsverbindung ... 633 19.8 ... Verluste einzelner Pakete ... 638 19.9 ... Annahmen zu TCP und Skalierbarkeit ... 639 19.10 ... TCP-Parameter ... 640 19.11 ... Epilog ... 641 19.12 ... Übungen ... 641 20. TCP-Dynamik ... 647 20.1 ... Ein erster Blick auf das Queuing ... 647 20.2 ... Flaschenhalsverbindungen mit konkurrierendem Datenverkehr ... 649 20.3 ... TCP Reno -- Fairness mit synchronisierten Verlusten ... 659 20.4 ... Epilog ... 669 20.5 ... Übungen ... 669 21. Weitere TCP-Dynamiken ... 675 21.1 ... Begriffe der Fairness ... 675 21.2 ... TCP-Reno-Verlustrate und cwnd ... 677 21.3 ... TCP-Freundlichkeit ... 680 21.4 ... Noch einmal AIMD ... 684 21.5 ... Aktives Warteschlangenmanagement ... 686 21.6 ... Das TCP-Problem der hohen Bandbreiten ... 694 21.7 ... Das Problem der verlustbehafteten Verbindungen ... 696 21.8 ... Das Problem der Satelliten-TCP-Verbindungen ... 697 21.9 ... Epilog ... 697 21.10 ... Übungen ... 698 22. Queuing und Scheduling ... 705 22.1 ... Queuing und Echtzeitdatenverkehr ... 706 22.2 ... Traffic-Management ... 707 22.3 ... Priority Queuing ... 708 22.4 ... Warteschlangenverfahren ... 708 22.5 ... Fair Queuing ... 710 22.6 ... Anwendungen von Fair Queuing ... 730 22.7 ... Hierarchisches Queuing ... 733 22.8 ... Hierarchical Weighted Fair Queuing ... 737 22.9 ... Epilog ... 744 22.10 ... Übungen ... 745 23. Token-Bucket ... 749 23.1 ... Token-Bucket -- Definition ... 750 23.2 ... Token-Bucket -- Beispiele ... 753 23.3 ... Mehrere Token-Buckets ... 754 23.4 ... GCRA ... 755 23.5 ... Gewährleistung der VoIP-Bandbreite ... 757 23.6 ... Verzögerung begrenzen ... 758 23.7 ... Token-Bucket durch einen Router ... 760 23.8 ... Token-Bucket durch mehrere Router ... 761 23.9 ... Verzögerungsbedingungen ... 762 23.10 ... CBQ ... 765 23.11 ... Linux HTB ... 765 23.12 ... Parekh-Gallager Theorem ... 767 23.13 ... Epilog ... 768 23.14 ... Übungen ... 768 24. Quality of Service ... 773 24.1 ... Netzneutralität ... 775 24.2 ... Wo die wilden Warteschlangen wohnen ... 775 24.3 ... Echtzeit-Datenverkehr ... 776 24.4 ... Integrated Services/RSVP ... 780 24.5 ... Globales IP-Multicast ... 781 24.6 ... RSVP ... 788 24.7 ... Differentiated Services ... 794 24.8 ... RED with In and Out ... 801 24.9 ... NSIS ... 801 24.10 ... Comcast-System zu Überlaststeuerung ... 802 24.11 ... Real-time Transport Protocol (RTP) ... 804 24.12 ... Multi-Protocol Label Switching (MPLS) ... 810 24.13 ... Epilog ... 814 24.14 ... Übungen ... 814 25. Netzwerkverwaltung und SNMP ... 817 25.1 ... Netzwerkarchitektur ... 820 25.2 ... SNMP-Grundlagen ... 820 25.3 ... Namen und OIDs unter SNMP ... 823 25.4 ... MIBs ... 825 25.5 ... SNMPv1-Datentypen ... 827 25.6 ... ASN.1-Syntax und SNMP ... 828 25.7 ... SNMP-Tabellen ... 829 25.8 ... SNMP-Operationen ... 835 25.9 ... MIB-Browsing ... 841 25.10 ... MIB-2 ... 842 25.11 ... SNMPv1-Communitys und -Sicherheit ... 853 25.12 ... SNMP und die ASN.1-Kodierung ... 855 25.13 ... Übungen ... 859 26. Die SNMP-Versionen 2 und 3 ... 863 26.1 ... SNMPv2 ... 863 26.2 ... Erstellung von Tabellenzeilen ... 879 26.3 ... SNMPv3 ... 890 26.4 ... Übungen ... 905 27. Sicherheit ... 907 27.1 ... Einbruch mit Ausführung von Code ... 909 27.2 ... Stapelüberlauf ... 911 27.3 ... Heap-Überlauf ... 923 27.4 ... Network Intrusion Detection ... 930 27.5 ... Ziele der Kryptografie ... 932 27.6 ... Sichere Hashes ... 934 27.7 ... Verschlüsselung mit gemeinsamem Schlüssel ... 940 27.8 ... Diffie-Hellman-Merkle-Schlüsselaustausch ... 954 27.9 ... Übungen ... 959 28. Verschlüsselung mit öffentlichem Schlüssel ... 963 28.1 ... RSA ... 963 28.2 ... Vorwärts gerichtete Geheimhaltung ... 967 28.3 ... Vertrauen und der Mann in der Mitte ... 969 28.4 ... Ende-zu-Ende-Verschlüsselung ... 970 28.5 ... SSH und TLS ... 971 28.6 ... IPsec ... 998 28.7 ... DNSSEC ... 1002 28.8 ... Beispiele mit RSA-Schlüssel ... 1016 28.9 ... Übungen ... 1020 Bibliografie ... 1023 Index ... 1033
Getting Started with Visual Studio 2022
Learn how to use the features of Visual Studio 2022 and utilize the IDE correctly to make it your one-stop solution for creating quality code. Learn what's new in VS 2022 and explore the existing features of Visual Studio so you can become a more efficient programmer.This revised edition covers the latest features of Visual Studio 2022 and how to use them. The book includes new topics like Subword Navigation, Multi-caret Editing, how to enable Code Cleanup on Save, using breakpoints, and new debugging features such as temporary breakpoints and dependent breakpoints. The book also looks at some of the new Git features such as Multi-repo Support, Comparing Branches, Checkout Commit, and line Staging.Getting Started with Visual Studio 2022 begins with an overview of Visual Studio and explores features such as Visual Studio Live Share, Visual Studio Search, Solution Filters, and Intellicode. The author also provides a look at the different Visual Studio project templates and shows you how to create code snippets, as well as how to manage NuGet and nmp packages. You will also see how to create a cross-platform MAUI application as well as how to use SQLite in an MAUI application. Moving ahead, you will learn how to debug your code using breakpoints to step into specific methods, use data tips, and utilize the Debugger Display attribute. You will then move on to learn unit testing and explore the tools provided by Visual Studio to create and run unit tests. The book also covers source control integration in Visual Studio and how to use GitHub to implement a source control strategy for your projects.WHAT YOU WILL LEARN* Create and use code snippets in Visual Studio 2022* Use the new debugging features in Visual Studio* Utilize diagnostic tools and the Immediate window for code debugging* Generate unit tests with IntelliTest* Harness the new Git features in Visual Studio to make managing source code easier* Work with MAUI appsWHO THIS BOOK IS FORBeginners and software developers working on the .NET stack.DIRK STRAUSS has over 17 years of experience programming with C# and Visual Studio. Working for various companies throughout his career, he has been privileged to work with and learn from some of the most brilliant developers in the industry. He has authored several books on topics ranging from Visual Studio and C# to ASP.NET Core. Passionate about writing code, he loves learning new tech and imparting what he learns to others.CHAPTER 1: GETTING TO KNOW VISUAL STUDIO 2022- Installing Visual Studio- Visual Studio 2022 System Requirements- Visual Studio is 64-bit- Full .NET 6.0 Support- Using Workloads- Exploring the IDE- The Solution Explorer- Toolbox- The Code Editor- New Razor Editor- Hot Reload- Navigating Code- Navigate Forward and Backward Commands- Navigation Bar- Find All References- Find Files Faster- Reference Highlighting- Go To Commands- Go To Definition- Peek Definition- Subword Navigation- Features and Productivity Tips- Track Active Item in Solution Explorer- Hidden Editor Context Menu- Open in File Explorer- Finding Keyboard Shortcut Mappings- Clipboard History- Go To Window- Navigate to Last Edit Location- Multi-caret Editing- Sync Namespaces to Match Your Folder Structure- Paste JSON as Classes- Enable Code Cleanup on Save- Add Missing Using on Paste- Features in Visual Studio 2022- Visual Studio Search- Solution Filters- Visual Studio IntelliCode- Whole Line Completions- Quick Actions- Visual Studio Live ShareCHAPTER 2: WORKING WITH VISUAL STUDIO 2022- Visual Studio Project Types- Various Project Templates - MAUI- Creating a MAUI Application- Consuming REST Services in MAUI- Using SQLite in a MAUI app- Managing NuGet Packages- Using NuGet in Visual Studio- Hosting Your Own NuGet Feeds- Managing nmp Packages- Creating Project Templates- Creating and Using Code Snippets- Creating Code Snippets- Using Bookmarks and Code Shortcuts- Bookmarks- Code Shortcuts- Adding Custom Tokens- The Server Explorer- Running SQL Queries- Visual Studio Windows- C# Interactive- Code Metrics Results- Send Feedback- Personalising Visual Studio- Document Management Customisations- Visual Studio ThemesCHAPTER 3: DEBUGGING YOUR CODE- Working with Breakpoints- Setting a Breakpoint- Conditional Breakpoints and Actions- Temporary Breakpoints- Dependant Breakpoints- Dragging Breakpoints- Force Run to Cursor- Manage Breakpoints with Labels- Exporting Breakpoints- Using DataTips- Visualizing Complex Data Types- Using the Watch Window- The DebuggerDisplay Attribute- Evaluate Functions Without Side Effects- Format Specifiers- Diagnostic Tools- CPU Usage- Memory Usage- The Events View- The Right Tool for the Right Project Type- Immediate Window- Attaching to a Running Process- Attach to a Remote Process- Reattaching to a Process- Remote Debugging- System Requirements- Download and Install Remote Tools- Running Remote Tools- Start Remote DebuggingCHAPTER 4: UNIT TESTING- Creating and Running Unit Tests- Create and Run a Test Playlist- Testing Timeouts- Using Live Unit Tests- Using IntelliTest to Generate Unit Tests- Focus IntelliTest Code Exploration- How to Measure Code Coverage in Visual StudioCHAPTER 5: SOURCE CONTROL- Create a GitHub Account- Create and Clone a Repository- Cloning a Repository- Create a Branch from Your Code- Creating and Handling Pull Requests- Working with Stashes- Multi-repo Support- Git Commit Graph- Compare Branches- Checkout Commit- Multi-repo Branching- Line Staging
Technik der IP-Netze
- Umfassende Informationen – das lückenlose Standardwerk zu den Prinzipien der Kommunikation im Internet mit über 700 Bildern.- Ausgewogenheit von Theorie und Praxis – technische Aspekte der IP-Netze werden detailliert und zugleich praxisorientiert dargestellt.- Aktuell und zukunftsweisend – die präsentierten Themen vertiefen die aktuellen Trends der Internettechnik und -sicherheit sowie zukünftige Anforderungen.- Neu in der 5. Auflage: Zeitsynchronisation in Netzen und Überblick über das QUIC-Protokoll- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesIn IP-Netzen laufen komplexe Vorgänge bei der Übermittlung von Daten in Form von IP-Paketen ab. Das massive Internet-Wachstum und die dabei entstandenen Anforderungen haben zu zahlreichen Weiterentwicklungen geführt – hervorzuheben sind u. a. das Internetprotokoll IPv6, die Techniken MPLS und GMPLS, mehrere Arten von Virtual Networks, Distributed Layer 2 / 3 Switching und Internet of Things.Dieses Buch enthält eine systematische Darstellung der TCP / IP-Protokollfamilie sowie von Routing-Prinzipien in klassischen IP- wie auch in IPv6-Netzen.Es erläutert außerdem die Konzepte zum Aufbau von IP-Netzen auf Basis unterschiedlicher Netztechnologien (speziell Virtual Networks) sowie zur Unterstützung der Mobilität. Zudem enthält es eine umfangreiche Darstellung der technologischen Grundlagen des Internet of Things.Das Buch eignet sich nicht nur als Lehrbuch für Studierende unterschiedlicher Fachrichtungen und für Neueinsteiger:innen, sondern auch als Nachschlagewerk für Praktiker:innen. Im Buch sind die relevanten Quellen ins Internet verlinkt, sodass es sich auch als »Informations-Hub« für das Selbststudium einsetzen lässt.AUS DEM INHALT //- Netzwerkgrundlagen und IT-Security; Protokolle: IPv4, ICMP, IGMP, TCP, UDP, SCTP, QUIC- Netzdienst-Protokolle: DNS, DHCP, NAT, IPsec, TLS (1.3)- Protokolle für die Echtzeitkommunikation: RTP, RTCP, SIP, SDP, NTP, PTP- IPv6-Support-Protokolle: ICMPv6, NDP, DHCPv6- Migration zu IPv6: 6to4, 6rd, ISATAP, NAT64 und Translation IPv4 IPv6- Routing-Protokolle: RIP, OSPF und BGP-4; Multicast-Routing nach PIM und MSDP- IP-Netze mit MPLS, GMPLS und Traffic Engineering- VPNs, Mobility Support und Distributed Layer 2/3 Switching- Internet of Things mit 6loWPAN, RPL und CoAP Prof. Dr.-Ing. Anatol Badach ist ehemaliger Professor im FB Angewandte Informatik der Hochschule Fulda. Seine Schwerpunkte sind Netzwerktechnologien und -protokolle, VoIP, Next Generation Networking sowie Internet of Things.Prof. Dr. Erwin Hoffmann ist Vertretungs-Professor für Informatik an der Frankfurt University of Applied Sciences. Schwerpunkte sind Netzwerke, verteilte Systeme sowie IT-Security und ihre Implementierung.
Ansible for VMware by Examples
Learn to use the Ansible open source IT automation tool to automate your VMware infrastructure. This book contains all of the obvious and not-so-obvious best practices of Ansible automation. Each lesson summarizes a specific use case for the modern VMware infrastructure and is focused on a single module from the most important parameter, including live demo of code and real-life usage.You'll configure the Ansible Controller to interact with VMware infrastructure using the “community.VMware” Ansible documentation collection and the appropriate Python libraries. Next, learn how to automate the creation of a virtual machine manually and from a template, start and stop using the shutdown and forced-power off a Virtual Machine, take and delete and snapshot, add a new hard disk and expand a currently attached hard disk, as well as gather information for data centers, clusters, host systems, and virtual machines.By the end of this book, you'll be well-versed in efficiently maintaining a VMware infrastructure with Ansible Automation. You'll also be able to save time and reduce manual errors using simple human-readable automation technology.WHAT YOU'LL LEARN* Automate your VMware infrastructure using Ansible code* Install Ansible in operating systems such as RedHat, Ubuntu, Fedora, etc.* Write and execute your first Ansible Playbook code * Troubleshoot the most common error messagesWHO THIS BOOK IS FORIT professionals of every industry who would like a jargon-free understanding of Ansible technology, including VMware, Linux, and Windows Systems Administrators, DevOps professionals, thought leaders, and infrastructure-as-code enthusiasts.Luca Berton is an Ansible Automation Engineer of Red Hat, based in Brno - Czech Republic. With more than 15 years of experience as a System Administrator, he has strong expertise in Infrastructure Hardening and Automation. Enthusiast of the Open Source supports the community sharing his knowledge in different events of public access. Geek by nature, Linux by choice, Fedora of course.Chapter 1: Ansible For Beginners With ExamplesCHAPTER GOAL: Description of the Ansible Technology and how to write and execute your first Ansible Playbook code.NO OF PAGES: 5 0SUB - TOPICS* What is AnsibleGetting Started * Inventory* Playbook* Variables, Fact and Magic Variables* Vault* Conditional and LoopHandler * Role* Ansible Best PracticesChapter 2: Install AnsibleCHAPTER GOAL: How to install Ansible in the most common Operating System step by stepNO OF PAGES : 20SUB - TOPICS:* ansible community vs ansible-core packages * Ansible installation in RedHat Enterprise Linux (RHEL) 8 * Ansible installation in Ubuntu 22.04 LTS * Ansible installation in Fedora 36 * Ansible installation in CentOS 9 Stream * Ansible installation in Windows * Ansible installation in SUSE SLES (Linux Enterprise Server) 15 Ansible installation with PIPAnsible installation in RedHat Enterprise Linux (RHEL) 9* Ansible installation in Amazon Linux 2 (AWS EC2) * Ansible installation in Debian 11 Chapter 3: Ansible For VMwareCHAPTER GOAL: How to automate your VMware infrastructure using Ansible code and troubleshoot the most common error messagesNO OF PAGES: 70SUB - TOPICS:* Configure Ansible For VMware Configure a Python Virtual Environment for Ansible VMwareAnsible troubleshooting - VMware f ailed to Import PyVmomi * Ansible troubleshooting - VMware Unknown error while connecting to vCenter or ESXi * Ansible troubleshooting - VMware certificate verify failed connecting to vCenter or ESXi* Create a VMware virtual machine * Deploy a VMware virtual machine from a template * Start a VMware virtual machine * Stop a VMware virtual machine * Take a VMware virtual machine snapshot * Delete a VMware virtual machine snapshot * Add a new hard disk to VMware virtual machine * Expand a virtual disk in VMware virtual machine * Gather VMware Hosts information of a cluster* Get VMware virtual machine UUID* Ansible Dynamic Inventory For VMware* Get VMware vSphere Virtual Machine Running Host* Get VMware datastore status* Upload a file to the VMware datastore* Get VMware Guest Tools status* Upgrade VMware Guest Tools* Live Migration of a VMware Virtual Machine using vMotion* Change the boot devices order of a VMware virtual machineChapter 4: Conclusion
Introducing Cisco Unified Computing System
The Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy.So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it.You'll start by creating an organization and then the policies to control storage, networking, boot options, maintenance policies, and server pools. Once you have the required policies you'll use them to create service profiles (using the policies) and templates and assign these to the blade and rack-mount servers in the virtual environment. You'll also be looking at real-life scenarios such as upgrades (and downgrades), northbound networking, and Storage Area Networking (SAN) connectivity. Using the GUI and the CLI you'll look at real-world examples that data center engineers may encounter.WHAT YOU'LL LEARN* Set up the Cisco UCSPE on VMWare* Create UCS service profiles* Secure the UCS system* Troubleshoot the UCSWHO THIS BOOK IS FORDatacenter and network engineers and individuals studying for the CCNA and CCNP Cisco data center qualification.STUART FORDHAM, CCIE 49337, is the Network Manager and Infrastructure Team Leader for SmartCommunications SC Ltd, which is the only provider of a cloud-based, next-generation customer communications platform. Stuart has written a series of books on SD-WAN, BGP, MPLS, VPNs, and NAT, as well as a CCNA study guide and a Cisco ACI Cookbook. He lives in the UK with his wife and twin sons.Chapter 1: Setting up UCSPE ( Cisco UCS Platform Emulator)CHAPTER GOAL: TO SET UP UCSPENO OF PAGES 20SUB -TOPICS1. Downloading UCSPE2. Importing UCSPE into VMWare3. Starting UCSPE4. Real-world UCS setupChapter 2: The hardware chapterCHAPTER GOAL: AN EXPLANATION OF THE DIFFERENT HARDWARE THAT MAKES UP A UCS (Cisco Unified Computing System)NO OF PAGES: 20SUB - TOPICS1. The Fabric Interconnect2. Chassis and IOMs3. FEX4. Blade servers5. Rackmount serversChapter 3: Northbound Networking and SANCHAPTER GOAL: TO UNDERSTAND THE UCS IN RELATION TO THE REST OF THE NETWORKNO OF PAGES: 10SUB - TOPICS1. Physical connectivity and port-channels2. VLANsChapter 4: PoliciesCHAPTER GOAL: TO CREATE THE POLICIES WE NEED FOR CHAPTER 4NO OF PAGES : 20SUB - TOPICS:1. Policies2. Storage Policies3. Dynamic vNIC connection policies3. vNIC/vHBA Placementpolicies4. vMedia policies5. Server boot policies6. Maintenance Policies7. Server Pool policies8. Operation policiesChapter 5: Service Profiles and TemplatesCHAPTER GOAL: TO USE THE POLICIES WE HAVE TO CREATE SERVICE PROFILES AND ASSIGN THEM TO OUR SERVERSNO OF PAGES: 30SUB - TOPICS:1. Creating an Organization2. Creating a Service Profile Template3. Creating a Service Profile from a template4. Assigning templatesChapter 6: UCS SecurityCHAPTER GOAL: TO SECURE OUR UCS ENVIRONMENTNO OF PAGES: 20SUB - TOPICS1. AAA2. Hardening the web interface3. Hardening SSHChapter 7: TroubleshootingCHAPTER GOAL: TO SECURE OUR UCS ENVIRONMENTNO OF PAGES: 20SUB - TOPICS1. Error messages2. SNMP3. Call-home
Creating Business Applications with Microsoft 365
Learn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You’ll work with an extended example that shows how to use Power Apps and SharePoint together to create your own help ticketing system.This book offers a deep dive into Power BI, including working with JSON, XML, and Yes/No data, as well as visualizing learning data and using it to detect inconsistencies between Excel files. You’ll also see how to connect to Remedy and to the help system you will have created. Under author Jeffrey Rhodes’s guidance, you’ll delve into the Power Apps collection to learn how to avoid dreaded "delegation" issues with larger data sets. Back on applications, you will create a training class sign-up solution to only allow users to choose classes with available seats. Digging deeper into Teams, you’ll learn how to send chats, posts, and "adaptive cards" from Power Automate. Rounding things out, you’ll save Forms attachments to SharePoint with Power Automate, create your own "Employee Recognition" app with all of the Power Platform and Teams, add or edit weekly status reports, and learn how to create reservation and scoring applications.After reading the book, you will be able to build powerful applications using Power Apps, Power Automate, Power BI, SharePoint, Forms, and Teams.WHAT YOU WILL LEARN* Create productivity-enhancing applications with Power Apps, Power Automate, SharePoint, Forms, and/or Teams* Transform and visualize data with Power BI to include custom columns, measures, and pivots* Avoid delegation issues and tackle complicated Power Apps issues like complex columns, filtering, and ForAll loops* Build scheduled or triggered Power Automate flows to schedule Teams Meetings, send emails, launch approvals, and much moreWHO THIS BOOK IS FORBusiness and application developers. JEFFREY RHODES is a founder and Chief Technical Officer of Platte Canyon Multimedia Software Corporation, a leader in developing commercial e-learning software. He graduated at the top of his class at the Air Force Academy, where he earned a bachelor's degree in electrical engineering. Jeff received a master’s degree in economics from the London School of Economics, which he attended under a British Marshall Scholarship. He is the author of Creating Business Applications with Office 365: Techniques in SharePoint, PowerApps, Power BI, and More, Programming for e-Learning Developers: ToolBook, Flash, JavaScript, and Silverlight, VBTrain.Net: Creating Computer and Web Based Training with Visual Basic .NET. He also co-wrote The ToolBook Companion. He lives in Colorado Springs with his wife Sue and is the proud father of his sons Derek and Michael.CHAPTER 1. PROGRAMMING IN THE POWER PLATFORMIn this chapter, we will cover the basics of programming: properties, methods, and events. We will then look at how their implementation differs between in each of the Power Platform applications compared with traditional environments like .NET (Windows Forms and ASP.NET) and JavaScript. For Power Apps, we will see how you can set the properties of other objects directly but instead need to make the value of what you want to change (such as the text of a button) a variable and then change the value of that variable elsewhere in the application. We will also explore its Visual Basic-like syntax. In Power Automate, we will look at the different types of actions (variables, loop, parallel branches, conditions, etc.). Finally, in Power BI we will look at the Power Query M formula language.CHAPTER 2. UPDATING A SHAREPOINT LIST USING POWER APPSCHAPTER 3. CREATING AN APPROVAL PROCESS WITH POWER AUTOMATECHAPTER 4. CREATING A SURVEY RESPONSE DASHBOARD WITH MICROSOFT POWER BICHAPTER 5. CREATING A SURVEY SOLUTION WITH MICROSOFT FORMS, FLOW, SHAREPOINT, AND POWER BICHAPTER 6. POWER BI CHALLENGES WITH JSON, XML, AND YES/NO DATACHAPTER 7. POWER BI CASE STUDY: MONITORING BMC REMEDY HELP TICKETSCHAPTER 8. BUILDING A HELP TICKETING SYSTEM IN POWERAPPS AND SHAREPOINT – NEW TICKET FORMCHAPTER 9. CONTINUING THE HELP TICKETING SYSTEM – TECHNICIAN FORMCHAPTER 10. USING POWER BI FOR THE HELP TICKETING SYSTEMCHAPTER 11. OVERCOMING POWER APPS DELEGATION ISSUES WITH SHAREPOINT DATA SOURCESIn this chapter, we look at how to use the technique described in https://tinyurl.com/twzvbgl to overcome delegation limits in Power Apps using a SharePoint data source. We also implement a corresponding Power Automate Flow to copy the ID value to a numeric column each time we create a record.CHAPTER 12. CREATING A CLASS SIGN-UP SOLUTION IN SHAREPOINT AND POWER APPSCHAPTER 13. VISUALIZING LEARNING MANAGEMENT DATA FROM SQL SERVER USING POWER BIThis chapter gives several examples of connecting to multiple tables in a SQL Server database in order to visualize test score, completion, assignments and similar learning management data. It demonstrates custom columns, merging tables, slicers, and much more.CHAPTER 14. DYNAMIC INFORMATION IN POWER APPS AND SENDING AN ADAPTIVE CARD TO TEAMS USING POWER AUTOMATEIn this chapter, we create linked SharePoint lists that display status levels, colors, and associated steps. We then read these lists from PowerApps to create a status display that we display in a tab in Teams. Finally, we create a Power Automate flow so that each time the status changes, we automatically post that to our Teams channel.CHAPTER 15. DYNAMICALLY SETTING OBJECT PROPERTIES IN POWER APPS BASED ON A SHAREPOINT LISTIn this chapter, we explore how to approximate dynamic object references/reflection in Power Apps. We take an "Actions" list in SharePoint and use it to set Text, Tooltip, and Visible properties of each corresponding button in Power Apps.CHAPTER 16. UPLOADING FILES FROM POWERAPPS TO SHAREPOINT AND EMAILING LINKS USING POWER AUTOMATEIn this chapter, we see how to upload multiple attachments from Power Apps to a SharePoint document library using Power Automate. While we are in Power Automate, we create an email of links to these documents and email it to the designated recipient.CHAPTER 17. WORKING WITH SHAREPOINT LOOKUP COLUMNS IN POWER BIIn this chapter, we explore how to use the FieldValuesAsText functionality in Power BI to get the data from within a SharePoint Lookup column. We also explore creating custom columns and filtering by Content Type.CHAPTER 18. JOINING SHAREPOINT/EXCEL TABLES IN POWER BIThis chapter shows two different examples on how to join data in Power BI to make effective visualizations. The first example shows how to access lookup columns in SharePoint lists by doing a join on the lists once you bring them into Power BI. The second one is an extended example on how to verify data between two Excel spreadsheets that share a common value. We first show how to accomplish the task with Microsoft Access with a join query and a set of custom columns that reflect whether columns between the two spreadsheets actually match. We then show how it is easier and more reproducible with later data to do the same thing with Power BI using a merge query.CHAPTER 19. COPYING MICROSOFT FORMS ANSWERS TO SHAREPOINT USING POWER AUTOMATE AND THEN SHOWING THE MOST CURRENT SUBMISSION IN POWER BIIn this chapter, we take a simple Microsoft Form, copy each entry to SharePoint with Power Automate, and then visualize the data in Power BI. The main insight on the Power BI side is to show only the most recent form submission by grouping within Power BI, creating a MaxDate column, and then filtering.CHAPTER 20. COPYING MICROSOFT FORMS ATTACHMENTS TO A SHAREPOINT LIST ITEM USING POWER AUTOMATEIn this chapter, we see how to create a group form in Microsoft Forms, create an associated SharePoint List to hold the data, use Power Automate to copy the form responses to the list, and, most importantly, copy each file uploaded with the form and attach it to the corresponding list item.CHAPTER 21. CREATING AN EMPLOYEE RECOGNITION APP IN POWER APPS, POWER AUTOMATE, POWER BI, TEAMS, AND SHAREPOINTIn this chapter, we demonstrate how to create a Power Apps and Power Automate employee recognition solution that can post the recognition to a Teams channel, send a Teams chat, and/or send via email. We try to make it optional for submitters to include their information, finding it works for chats and email but not posts. We store the information in SharePoint and then use Power BI to visualize the values demonstrated and other data.CHAPTER 22. CREATING A RESERVATIONS BOOKING SOLUTION IN POWER APPS AND SHAREPOINTIn this chapter, we demonstrate how to create a SharePoint list of available appointments and then use Power Apps to allow users to select an available appointment and make that not available to anyone else. It also shows how to allow users to edit or delete their appointments (or those created on their behalf).CHAPTER 23. CREATING A SCORING APPLICATION IN POWER APPS AND SHAREPOINTIn this chapter, we create a scoring application where we patch three different SharePoint records at the same time. Along the way, we use cascading drop-down lists, collections, data tables, and variables.
Workload Automation Using HWA
Apply best practices for deploying and administering HCL Workload automation (HWA) to meet the automation requirements of the digitally transformed platform. This book will provide detailed architecture and deployment options to achieve this goal.Workload automation focuses on real-time processing, predefined event-driven triggers, and situational dependencies. It offers centralized control of managing multiple tasks, making it possible to schedule enterprise-wide tasks. You'll see how it supports the timely completion of tasks and is beneficial for processes that need to happen at a specific time or need to occur as a result of another event.HWA increases efficiency, reduces the turnaround time for workflows, and reduces errors along with delays in end-to-end processes. You'll review proven ways to deliver batch optimization and modernization requirements, and see how solutions can be aligned with the DevSecOps delivery model. Workload Automation Using HWA presents information on how to use the tool and has numerous use cases and implementation procedures to guide every workload automation deployment requirement.WHAT YOU'LL LEARN* Automate and integrate your complex workload, workflow, and business processes across automation platforms, ERP systems, and business applications* Understand event-driven batch automation* Practice alignment of the workload automation solution with the DevSecOps principlesWHO THIS BOOK IS FORSolution Architects, Infrastructure Architects, Technical Architects, Enterprise Architects, Workload Automation Tool Administrators or SME’s, Schedulers, Application owners, Automation Specialists, Service Delivery ManagersNAVIN SABHARWAL, currently is the Chief Architect and Head of Strategy for Autonomics, named ‘DRYiCE’ at HCL Technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL Technologies. Navin is an innovator, thought leader, author and a consultant in areas of AI and Machine Learning, Cloud Computing, Big Data Analytics, Software Product Development, Engineering and R&D. He is responsible for IP Development & Service Delivery in the Areas of AI and Machine Learning, Automation products, Cloud Computing, Public Cloud AWS, Microsoft Azure, VMWare Private Cloud, Microsoft Private Cloud, Data Center Automation, Analytics for IT Operations, IT Service Management.SUBRAMANI KASIVISWANATHAN is the Solution architect for Application Performance Management and Workload Automation Solutions, also leading the Engineering and R&D function, having overall 16 years of IT experience and 6 years of experience in Academics, currently working as Practice Lead in HCL DRYiCE, responsible for creating solutions catering to APM and Workload Automation, responsible and accountable for the Research and Development in autonomics platform.Chapter 1: Introduction to Workload AutomationSub –Topics1. Workload Automation Concepts2. Introduction to HCL Workload Automation3. HCL Workload Automation strengths4. Common HCL Workload Automation terminologyChapter 2: HCL Workload Automation ArchitectureSub –Topics1. HWA components2. HWA communication path3. Architecture TypesChapter 3: HCL Workload Automation DeploymentsSub - Topics1. Deployment Options4. Planning Deployments5. Stand-Alone Architecture6. High Availability Architecture7. Disaster Recovery Architecture8. Containerized deployments9. Deployment on Kubernetes clusters10. Workload Automation on HCL SofyChapter 4: Workload Design and Monitoring using DWC and CLIChapter 5: Use Case: HWA for managed file transfersChapter 6: Use Case: HWA integration with SAPChapter 7: Use Case: Automate job executions on Microsoft SQL serverChapter 8: Use Case: Working with RESTful Web ServicesChapter 9: Use Case: Submit, orchestrate and monitor jobs on a Kubernetes clusterChapter 10: Use Case: HWA Integration with Hadoop Distributed File SystemChapter 11: Use Case: HWA Integration with Apache SparkChapter 12: Use Case 1: HWA Integration with ServiceNow Use Case 2: Auto Remediation of Job failuresChapter 13: Tool Administration and best practicesChapter 14: Alerting and Troubleshooting issuesChapter 15: HWA ReportingChapter 16: HWA SecurityChapter 17: HWA tuning for best performanceChapter 18: Alignment of HWA with DevSecOps Delivery model.
Data Science mit SAP HANA
Mit SAP HANA und SAP HANA Cloud ist viel mehr möglich, als Sie denken! In diesem Buch erfahren Sie, wie Sie APL und PAL einsetzen können, um komplexe Auswertungen vorzunehmen und Vorhersagen zu treffen. Praktische Beispiele zu Klassifizierung, Regression u.v.m. zeigen Ihnen die vielfältigen Möglichkeiten auf und lassen sich direkt auf Ihre Anwendungsfälle übertragen. Aus dem Inhalt: Was ist Data Science?SAP HANA, SAP HANA Cloud und SAP Data Warehouse CloudPython, R und SQLUnivariate und Multivariate AnalyseAutomated Predictive Library Predictive Analytics LibraryGeodaten-, Graph- und TextanalyseTrainieren und Anwenden von Data-Science-ModellenIntegration in Geschäftsprozesse und Geschäftsanwendungen Vorworte ... 11 Einleitung ... 15 1. Einführung ... 19 1.1 ... Themenabgrenzung ... 20 1.2 ... Data Science in der SAP-Welt ... 27 2. SAP HANA als Data-Science-Umgebung ... 37 2.1 ... SAP HANA ... 38 2.2 ... SAP HANA Client ... 64 2.3 ... Python-Entwicklungsumgebung ... 64 3. Erste Schritte ... 71 3.1 ... Python ... 71 3.2 ... Die R-Programmiersprache ... 84 3.3 ... Die SQL-Sprache für SAP HANA ... 89 4. Explorative Datenanalyse und Datenvorbereitung ... 99 4.1 ... Analyse einer Tabelle ... 100 4.2 ... Analyse einzelner Variablen ... 105 4.3 ... Analyse mehrerer Variablen ... 111 4.4 ... Datenvorbereitung ... 114 5. Automated Predictive Library ... 129 5.1 ... Einführung in die APL ... 131 5.2 ... Klassifizierung mit der APL ... 133 5.3 ... Regression mit der APL ... 173 5.4 ... Zeitreihen mit der APL ... 186 5.5 ... Weitere Informationen ... 211 6. Predictive Analysis Library ... 213 6.1 ... Einführung in die PAL ... 214 6.2 ... Klassifizierung mit der PAL ... 216 6.3 ... Regression mit der PAL ... 229 6.4 ... Zeitreihen mit der PAL ... 236 6.5 ... Cluster-Analyse ... 253 6.6 ... Survival Analysis ... 260 6.7 ... Ausreißeranalyse ... 282 6.8 ... Automated Machine Learning ... 289 6.9 ... State-enabled Deployment ... 299 7. Spezialisierte Analyse-Engines ... 301 7.1 ... Geodatenanalyse ... 302 7.2 ... Graphanalyse ... 317 7.3 ... Textanalyse ... 328 8. Deployment-Optionen ... 341 8.1 ... SAP Data Intelligence ... 342 8.2 ... Cloud Foundry ... 357 8.3 ... Kyma ... 363 9. Tipps und Tricks ... 377 Anhang ... 397 A. Checkliste ... 397 Die Autoren ... 401 Index ... 403
QNAP NAS
Mit diesem umfassenden Handbuch richten Sie Ihr NAS genau nach Ihren Bedürfnissen ein. Wollen Sie Dokumente oder Fotos über Ihre persönliche Cloud teilen, Medien in Ihrem Netzwerk streamen oder einfach sicheren Netzwerkspeicher auf allen Ihren Geräten nutzen? Kein Problem mit den Geräten von QNAP und dem Fachwissen unseres Autorenteams. In zahlreichen konkreten Anwendungsszenarien zeigen sie Ihnen, wie Sie Ihr NAS ideal nutzen und sicher administrieren. Aus dem Inhalt: Alles für den sicheren StartRAID-KonfigurationenSingle-Sign-on über VerzeichnisdiensteZugriff aus dem InternetSynchronisation mit QsyncSichere Backups von Windows und macOSDaten suchen, finden und katalogisierenMultimedia von A-Z: Fotos, Videos, MusikVPN-Konfigurationen: klassisch mit openVPN oder modern mit WireGuardCollaboration und Dienste fürs TeamDie eigene Cloud mit NextCloud einrichtenVirtuelle Maschinen und Docker-Container Vorwort ... 17 1. Einrichtung des Geräts ... 21 1.1 ... Ersteinrichtung des NAS ... 21 1.2 ... Die Einrichtung des Speicherplatzes ... 35 1.3 ... Das Bedienkonzept des QTS ... 47 1.4 ... Benutzerkonten erstellen ... 57 2. Grundlegende Funktionen ... 63 2.1 ... Die Systemsteuerung ... 63 2.2 ... File Station und der Umgang mit Dateien ... 76 2.3 ... Freigabeordner erstellen und benutzen ... 82 2.4 ... Die persönlichen Home-Verzeichnisse aktivieren ... 87 2.5 ... Die Dateidienste für den Dateizugriff über eine Netzwerkverbindung ... 89 2.6 ... Das App Center ... 119 3. Das NAS sicher betreiben ... 127 3.1 ... Die Optionen des Moduls »Sicherheit« ... 127 3.2 ... Die Servicebindung ... 133 3.3 ... Der Malware Remover ... 134 3.4 ... Die QuFirewall ... 137 3.5 ... Der Security Counselor ... 144 3.6 ... Die Zwei-Schritt-Verifizierung verwenden ... 148 3.7 ... Den Zustand der Festplatten überprüfen ... 151 4. Über das Internet auf das NAS zugreifen ... 155 4.1 ... Generelles zum Zugriff über das Internet ... 155 4.2 ... Der Dienst myQNAPcloud ... 161 4.3 ... Eigene SSL-Zertifikate verwenden ... 189 5. Software für Clients ... 193 5.1 ... Allgemeines ... 193 5.2 ... Desktop-Apps ... 195 5.3 ... Mobile Apps ... 210 6. Nützliche Dienste von Drittanbietern ... 221 6.1 ... Das Content-Management-System WordPress installieren und benutzen ... 221 6.2 ... MariaDB und phpMyAdmin ... 229 6.3 ... VirtualHere USB Server ... 236 7. Alles auf Anfang ... 245 7.1 ... Backup der Einstellungen und Wiederherstellung ... 245 7.2 ... Einstellungen zurücksetzen ... 248 8. Alles synchron ... 253 8.1 ... Qsync - PC und NAS synchronisieren ... 253 8.2 ... HybridMount - Externe Quelle und NAS synchronisieren ... 270 9. Sicher ist sicher: Backups ... 287 9.1 ... Backupkonzept erstellen ... 287 9.2 ... Windows-Rechner auf NAS sichern mit NetBak Replicator ... 293 9.3 ... Macs auf NAS sichern mit Time Machine ... 310 9.4 ... NAS sichern mit Hybrid Backup Sync ... 321 9.5 ... Hyper Data Protector: Virtuelle Maschinen sichern ... 332 9.6 ... Boxafe - Sicherung von Google und Microsoft 365 ... 347 9.7 ... Zusammenfassung ... 363 10. Hardware-Upgrades und Performance-Gewinn ... 365 10.1 ... Ein NAS-Gehäuse ersetzen ... 365 10.2 ... Umzug - von klein nach groß! ... 369 10.3 ... Performance-Gewinn durch 10-GbE-Netzwerkkarte ... 375 10.4 ... Performance-Gewinn durch Cache-Beschleunigung (SSD-Cache) ... 382 11. Multimedia von A bis Z ... 391 11.1 ... Zentrale Steuerung: Die Multimedia Console ... 391 11.2 ... Einen Ordner für die Medien anlegen und einbinden ... 399 11.3 ... Streaming mit dem DLNA-/UPnP-Medienserver ... 402 11.4 ... Photo Station ... 409 11.5 ... Music Station ... 436 11.6 ... Video Station ... 455 11.7 ... Plex Media Server ... 477 12. QVR Pro: Videoüberwachung mit dem NAS ... 485 12.1 ... Surveillance Station vs. QVR Pro ... 485 12.2 ... Funktionsweise von QVR Pro ... 486 12.3 ... Lizenzierung ... 488 12.4 ... Installation ... 489 12.5 ... Einen Aufnahmespeicher einrichten ... 490 12.6 ... Einbindung von Kameras ... 492 12.7 ... Aufnahmezeitpläne festlegen ... 497 12.8 ... Aufnahmen und Livebilder mit QVR Pro Client ... 499 12.9 ... Bewegungen erkennen und auf Ereignisse reagieren ... 506 12.10 ... Fazit ... 510 13. Dateiserver und Verzeichnisdienste ... 511 13.1 ... Qsync im Unternehmensumfeld ... 511 13.2 ... Verzeichnisdienst und Domänencontroller ... 530 13.3 ... Dateiserver ... 553 14. Mit Dateien und Dokumenten arbeiten ... 561 14.1 ... Dateien suchen und finden mit Qsirch ... 561 14.2 ... Dateikategorisierung und -bearbeitung mit Qfiling ... 568 14.3 ... Texterkennung für gescannte Dokumente ... 577 15. Collaboration - Dienste für Ihr Team ... 583 15.1 ... ownCloud - File Sharing ... 583 15.2 ... Mattermost - Chat-System ... 596 15.3 ... Notes Station 3.0 - Notizen ... 612 16. Virtuell und sicher ... 619 16.1 ... Virtualisierung verstehen: Virtuelle Maschinen und Docker-Container ... 619 16.2 ... Virtualization Station ... 624 16.3 ... Container Station ... 640 17. Alles unter Kontrolle - Überwachung mit QRM+ ... 653 17.1 ... Was heißt Überwachung bzw. System-Monitoring? ... 653 17.2 ... Funktionsumfang von QRM+ ... 654 17.3 ... Systemvoraussetzungen ... 655 17.4 ... Installation der App auf dem NAS ... 655 17.5 ... Start und Orientierung ... 656 17.6 ... Einbinden von Clients ... 658 17.7 ... Geräteverwaltung ... 664 17.8 ... Alarme definieren ... 670 17.9 ... Einstellungen ... 674 17.10 ... Fazit ... 675 18. VPN ... 677 18.1 ... Wozu Sie VPN benötigen ... 677 18.2 ... So funktionieren VPN-Verbindungen ... 678 18.3 ... VPN-Protokolle ... 683 18.4 ... QVPN Service installieren ... 683 18.5 ... Ihr NAS als WireGuard-VPN-Server ... 684 18.6 ... Ihr NAS als OpenVPN-Server ... 695 18.7 ... NAS als VPN-Client einrichten ... 700 Index ... 702
SAP-Personalwirtschaft
Dieses Handbuch bringt Sie sicher durch den Personaler-Alltag mit SAP. Ausführliche Klick-Anleitungen unterstützen Sie bei allen Aufgaben in SAP ERP HCM. Alle zentralen HR-Bereiche werden verständlich erläutert: Personaladministration, Reporting, Zeitwirtschaft, Entgeltabrechnung und Reisekostenmanagement. Die 6. Auflage unseres HR-Bestsellers wurde komplett aktualisiert und um Informationen zu SAP-Fiori-Apps und weiteren neuen Funktionen ergänzt. Aus dem Inhalt: Grundlagen und NavigationAufbau von SAP ERP HCMPersonaladministrationReports und QuerysZeitwirtschaftPersonalabrechnungOrganisations- und VeranstaltungsmanagementReisemanagementEmployee und Manager Self-Services (ESS und MSSHCM Prozesse und FormulareSAP SucessFactorsSAP Concur Einleitung ... 19 1. Was ist SAP? ... 23 1.1 ... Das Unternehmen SAP SE ... 23 1.2 ... SAP-Softwareprodukte ... 24 1.3 ... Weiterentwicklung und Anpassung des Systems ... 28 1.4 ... Aufbau von SAP ERP HCM ... 29 1.5 ... Zusammenfassung ... 33 2. Grundlagen und Navigation ... 35 2.1 ... Am SAP-System anmelden ... 35 2.2 ... SAP-GUI-Fenster ... 39 2.3 ... Vom SAP-System abmelden ... 55 2.4 ... Im SAP-System navigieren ... 57 2.5 ... Datenpflege ... 65 2.6 ... Benutzervorgaben ... 69 2.7 ... Mit Reports arbeiten ... 74 2.8 ... Drucken ... 83 2.9 ... Mit SAP-Fiori-Apps arbeiten ... 90 2.10 ... Zusammenfassung ... 106 2.11 ... Übungsaufgaben zu Kapitel 2 ... 106 3. Personaladministration ... 109 3.1 ... Bedeutung der Stammdaten für SAP ERP HCM ... 110 3.2 ... Funktion der Personaladministration ... 113 3.3 ... Infotypkonzept ... 114 3.4 ... Infotyppflege am Beispiel des Infotyps 0006 (Anschriften) ... 119 3.5 ... Maßnahmenkonzept ... 133 3.6 ... Einstellungsmaßnahme ausführen ... 135 3.7 ... Ausgewählte Maßnahmen ausführen ... 170 3.8 ... Tipps und Tricks ... 176 3.9 ... Zusammenfassung ... 187 3.10 ... Übungsaufgaben zu Kapitel 3 ... 188 4. Pflege ausgewählter Infotypen ... 191 4.1 ... Zahlungsrelevante Infotypen ... 191 4.2 ... Infotypen für die Schweiz ... 203 4.3 ... Infotypen für Österreich ... 206 4.4 ... Sonstige Infotypen ... 209 4.5 ... Zusammenfassung ... 217 4.6 ... Übungsaufgaben zu Kapitel 4 ... 218 5. Reports und Querys in der Personaladministration ... 219 5.1 ... Auswertungen -- Grundlagen und Werkzeuge ... 219 5.2 ... Reports über Personalstammdaten ... 222 5.3 ... Querys über Personalstammdaten ... 245 5.4 ... Zusammenfassung ... 263 5.5 ... Übungsaufgaben zu Kapitel 5 ... 264 6. Zeitwirtschaft ... 265 6.1 ... Überblick ... 265 6.2 ... Zeitdaten pflegen ... 269 6.3 ... Zeitabrechnung und Zeitnachweis ... 296 6.4 ... Tagesgeschäft im Arbeitsvorrat ... 306 6.5 ... Time Manager's Workplace (TMW) ... 314 6.6 ... Zeitdaten ... 320 6.7 ... Zusammenfassung ... 324 6.8 ... Übungsaufgaben zu Kapitel 6 ... 325 7. Personalabrechnung ... 327 7.1 ... Überblick ... 328 7.2 ... Voraussetzungen in den Stammdaten ... 333 7.3 ... Abrechnungskonzeption und Abrechnungsergebnisse ... 334 7.4 ... Abrechnungssimulation und Entgeltnachweis ... 339 7.5 ... Abrechnungsstatus und Abrechnungsverwaltungssatz ... 350 7.6 ... Ablauf der Personalabrechnung am Beispiel des deutschen Abrechnungsverfahrens ... 355 7.7 ... Auswertungen in der Personalabrechnung ... 400 7.8 ... Besonderheiten für Österreich und die Schweiz ... 405 7.9 ... Abrechnungsprozess mit dem Payroll Control Center (PCC) ... 407 7.10 ... Entsendung (A1-Bescheinigung) ... 410 7.11 ... Voraussetzung in den Stammdaten ... 410 7.12 ... Zusammenfassung ... 413 7.13 ... Übungsaufgaben zu Kapitel 7 ... 414 8. Organisationsmanagement ... 415 8.1 ... Überblick ... 416 8.2 ... Organisationsstruktur pflegen ... 422 8.3 ... Ausgewählte Daten pflegen ... 445 8.4 ... Auswertungen im Organisationsmanagement ... 448 8.5 ... Zusammenfassung ... 455 8.6 ... Übungsaufgaben zu Kapitel 8 ... 455 9. Veranstaltungsmanagement ... 457 9.1 ... Unterstützte Prozesse des Veranstaltungsmanagements ... 458 9.2 ... Dynamische Menüs ... 458 9.3 ... Veranstaltungsvorbereitung ... 460 9.4 ... Veranstaltungsangebot ... 477 9.5 ... Tägliche Aufgaben im Veranstaltungsmanagement ... 492 9.6 ... Wiederkehrende Arbeiten ... 512 9.7 ... Standardauswertungen im Infosystem ... 520 9.8 ... Weitere SAP-Learning-Management-Systeme ... 529 9.9 ... Zusammenfassung ... 538 9.10 ... Übungsaufgaben zu Kapitel 8 ... 539 10. Reisemanagement ... 541 10.1 ... Voraussetzung in den Stammdaten ... 542 10.2 ... Reisedaten im Reisemanager erfassen ... 546 10.3 ... Verschiedene Status einer Reise ... 561 10.4 ... Übung: Reisen genehmigen ... 564 10.5 ... Übung: Reisekostennachweis drucken ... 567 10.6 ... Zahlung und Buchung ... 571 10.7 ... Reisedaten in SAP Enterprise Portal erfassen ... 571 10.8 ... Reisedaten in SAP Concur erfassen ... 583 10.9 ... Zusammenfassung ... 589 10.10 ... Übungsaufgaben zu Kapitel 10 ... 590 11. Employee und Manager Self-Services in SAP ERP HCM ... 593 11.1 ... Voraussetzungen ... 594 11.2 ... Unterscheidung der Oberflächentechnologien ... 595 11.3 ... ESS und MSS mit WebDynpro ... 596 11.4 ... ESS und MSS mit SAP Fiori ... 611 11.5 ... Zusammenfassung ... 625 12. HCM Prozesse und Formulare ... 627 12.1 ... Grundlagen und Vorüberlegungen ... 627 12.2 ... Komponenten von HCM Prozesse und Formulare ... 628 12.3 ... Ablaufmuster der Prozesse ... 639 12.4 ... Nachvollziehbarkeit der Prozesse ... 647 12.5 ... Prozessbeispiele ... 651 12.6 ... Zusammenfassung ... 655 13. Einführung in SAP SuccessFactors ... 657 13.1 ... Funktionen von SAP SuccessFactors ... 659 13.2 ... Ein Einblick in SAP SuccessFactors ... 667 13.3 ... Zusammenfassung ... 680 14. Hilfe-Funktionen ... 681 14.1 ... Online-Hilfen ... 681 14.2 ... Hilfe-Funktionen des Systems ... 691 14.3 ... Zusammenfassung ... 694 14.4 ... Übungsaufgaben zu Kapitel 14 ... 694 Anhang ... 697 A. Wichtige Transaktionscodes ... 697 Das Autorenteam ... 701 Index ... 703
SAP-Geschäftspartner und Customer-Vendor-Integration
Lernen Sie das Geschäftspartner-Konzept von SAP S/4HANA kennen, und meistern Sie die Customer-Vendor-Integration. Sie erfahren, welche Einstellungen Sie vor der Integration treffen müssen und wie Sie Ihre Geschäftspartnerdaten erfolgreich synchronisieren. Ob Migrations- oder Greenfieldprojekt – Antje Diekhoff und Mathias Cararo zeigen Ihnen, wie es geht. Aus dem Inhalt: GrundkonzeptIntegration von Kunden und Lieferanten (CVI)Customizing und ErweiterungGP-Rollen und -ArtenNummernkreise und GruppierungenDatenstrukturTransaktionenErweiterung des GeschäftspartnersStammdatensynchronisationBerechtigungskonzeptGreenfield- und Migrationsprojekte Einleitung ... 19 I. Grundlagen ... 27 1. Grundkonzept des SAP-Geschäftspartners ... 29 1.1 ... Der Geschäftspartner in SAP S/4HANA ... 29 1.2 ... Grundlegende Begriffe ... 34 1.3 ... Fazit ... 42 2. Mögliche Fragestellungen im Vorfeld einer Customer-Vendor-Integration ... 43 2.1 ... Grundlagen der Customer-Vendor-Integration ... 43 2.2 ... Zusammenführung von Kunden und Lieferanten ... 47 2.3 ... Nummernvergabe ... 49 2.4 ... Ansprechpartner ... 56 2.5 ... Mögliche Vorabvalidierung ... 61 2.6 ... Fazit ... 78 3. Ablauf der Customer-Vendor-Integration ... 81 3.1 ... Grundlagen der Stammdatensynchronisation ... 82 3.2 ... Vorbereitung ... 84 3.3 ... Synchronisation ... 95 3.4 ... Das Synchronisationscockpit (Transaktion MDS_LOAD_COCKPIT) ... 107 3.5 ... Nacharbeiten mit Transaktion MDS_PPO2 ... 111 3.6 ... Umsetzungsoptionen im SAP-System ... 113 3.7 ... Fazit ... 116 II. Customizing und Erweiterung des Geschäftspartners ... 117 4. Customizing des Geschäftspartners im Rahmen der Customer-Vendor-Integration ... 119 4.1 ... Aktivierung von Business Functions ... 120 4.2 ... Aktivierung zusätzlicher Geschäftspartner-Funktionen ... 122 4.3 ... Grundeinstellungen ... 124 4.4 ... Anlage von Geschäftspartner-Rollen im kundenspezifischen Namensraum ... 135 4.5 ... Geschäftspartner-Rollengruppierung ... 142 4.6 ... Geschäftspartner-Rollenausschlussgruppen ... 145 4.7 ... Nummernkreise und Gruppierungen ... 145 4.8 ... Feldmodifikation ... 151 4.9 ... Adressfindung ... 153 4.10 ... Anreden ... 156 4.11 ... Steuernummer ... 159 4.12 ... Personen ... 164 4.13 ... Organisation ... 165 4.14 ... Geschäftspartner-Beziehung ... 172 4.15 ... Ansprechpartner ... 175 4.16 ... Aktive Verwendung des Geschäftspartners in einem SAP-ERP-System ... 180 4.17 ... Fazit ... 184 5. Customizing des Geschäftspartners in SAP S/4HANA ... 185 5.1 ... Aktivierungsstatus für Funktionen ... 187 5.2 ... Geschäftspartner-Rollen ... 188 5.3 ... Anwendungstransaktionen ... 200 5.4 ... Notizen ... 205 5.5 ... Nummernkreise und Gruppierungen ... 209 5.6 ... Geschäftspartner-Art ... 213 5.7 ... Feldmodifikation ... 215 5.8 ... Berechtigungsverwaltung ... 228 5.9 ... Adressfindung ... 232 5.10 ... Weitere Customizing-Einstellungen ... 241 5.11 ... Geschäftspartner-Beziehungen ... 262 5.12 ... Datenverteilung ... 268 5.13 ... Fazit ... 269 6. Datenstrukturen des Geschäftspartners ... 271 6.1 ... Übersicht der Tabellen im Paket S_BUPA_GENERAL ... 273 6.2 ... Geschäftspartner-Tabellen ... 274 6.3 ... Massenänderung von Geschäftspartnern ... 282 6.4 ... Standardfelder, die in einem SAP-ERP-System nicht zur Verfügung stehen ... 289 6.5 ... Fazit ... 294 7. Mit Geschäftspartnern arbeiten ... 295 7.1 ... Prüfen synchronisierter Stammdaten in einem SAP-ERP-System ... 295 7.2 ... Anlage und Änderung von Stammdaten in einem SAP-S/4HANA-System ... 306 7.3 ... Fazit ... 322 8. Erweiterung des Geschäftspartners per Business Data Toolset ... 325 8.1 ... Das BDT im Detail ... 326 8.2 ... Aufnahme eines kundenspezifischen Feldes in den Geschäftspartner ... 334 8.3 ... Fazit ... 354 III. Vorbereitung und Durchführung der Stammdatensynchronisation ... 355 9. Customizing der Stammdatensynchronisation für die Customer-Vendor-Integration ... 357 9.1 ... Synchronisationssteuerung und vorbereitende Schritte ... 358 9.2 ... Customizing zur Customer-Vendor-Integration ... 367 9.3 ... Fazit ... 393 10. Customizing der Stammdatensynchronisation bei Nutzung des Geschäftspartners ... 395 10.1 ... Synchronisationssteuerung und vorbereitende Schritte ... 396 10.2 ... Customizing der Customer-Vendor-Integration ... 399 10.3 ... Fazit ... 411 11. Durchführung der Stammdatensynchronisation ... 413 11.1 ... Finale Prüfung der CVI-Voraussetzungen ... 414 11.2 ... Arbeiten mit der Transaktion MDS_LOAD_COCKPIT ... 420 11.3 ... Ablauf der Synchronisation ... 425 11.4 ... Handhabung des PPO und Nachsynchronisation ... 435 11.5 ... Fazit ... 446 12. Fehlerbehandlung und Besonderheiten bei der Synchronisation ... 449 12.1 ... Fehlermeldung aufgrund des CVI-Customizings ... 449 12.2 ... Fehlermeldung aufgrund von inkonsistenten Stammdaten ... 452 12.3 ... Fehlermeldung aufgrund unterschiedlicher Ursachen ... 461 12.4 ... Fehlermeldungen bei Zusammenführung von Debitor und Kreditor in einen gemeinsamen Geschäftspartner ... 464 12.5 ... Nutzung des PPO nach Abschluss der CVI ... 466 12.6 ... Fazit ... 468 13. Der Geschäftspartner bei einer Neueinführung von SAP S/4HANA ... 469 13.1 ... Nummernvergabe bei einer Neueinführung ... 469 13.2 ... Geschäftspartner für das SAP Credit Management ... 482 13.3 ... Migration der Geschäftspartner-Daten ... 488 13.4 ... Fazit ... 498 IV. Weitere Einstellungen und Empfehlungen ... 501 14. Berechtigungen und Schnittstellen ... 503 14.1 ... Berechtigungskonzept ... 503 14.2 ... Berechtigungen für SAP-Fiori-Apps ... 516 14.3 ... Fazit ... 523 15. Besonderheiten weiterer SAP-Systeme im Rahmen der Customer-Vendor-Integration ... 525 15.1 ... Betriebsstämme in SAP Retail ... 525 15.2 ... CVI beim Einsatz von HCM-Systemen ... 530 15.3 ... CVI bei der Live-Integration von SAP Customer Relationship Management ... 533 15.4 ... Fazit ... 534 16. Projektplan für ein CVI-Projekt ... 537 16.1 ... Vorbereitung ... 538 16.2 ... Aufbau des Sandbox-Systems ... 539 16.3 ... Prüfung und Integrationstest ... 543 16.4 ... Synchronisation des Produktivsystems ... 543 16.5 ... Nachbearbeitung ... 544 16.6 ... Fazit ... 545 A. Übersichtstabellen ... 547 Das Autorenteam ... 561 Index ... 563
Bestandsoptimierung mit SAP
Behalten Sie Ihre Lagerkosten im Griff, ohne die Lieferfähigkeit zu gefährden: Marc Hoppe zeigt Ihnen, wie Sie Ihr SAP-System einsetzen, um Ihre Bestände in den Griff zu bekommen. Von der Bestandsanalyse über Disposition bis zum Bestandscontrolling werden alle Stellschrauben für ein optimales Bestandsmanagement behandelt. Aus dem Inhalt: StammdatenSAP FioriABC-/XYZ-AnalyseBestandsanalyseAbsatzplanungMRP LiveLosgrößenRückstands- und FehlteilemanagementLagerfertigungsstrategienVerfügbarkeitsprüfung (ATP und aATP)LieferserviceSicherheitsbestände Einleitung ... 19 1. Warum sind Bestände notwendig? ... 29 1.1 ... Unterschiedliche Bestandsphilosophien ... 29 1.2 ... Bestand als Stellschraube gegen Unsicherheiten ... 36 1.3 ... Was tun gegen Unsicherheiten? ... 39 2. Einfluss der Stammdaten auf die Bestände ... 45 2.1 ... Stammdaten in SAP-ERP-Systemen ... 47 2.2 ... Fehlerhafte Stammdaten in SAP-ERP-Systemen ... 50 2.3 ... Stammdatenqualität analysieren ... 55 2.4 ... Stammdatenqualität verbessern ... 62 3. Materialklassifizierung/Materialsegmentierung ... 69 3.1 ... Analyse- bzw. Klassifizierungsmethoden ... 69 3.2 ... Multidimensionale Kombination der Analysemethoden ... 97 3.3 ... Multidimensionale Analysen mit dem MRP Monitor ... 104 3.4 ... Fazit ... 158 4. Absatzplanung und Prognose ... 159 4.1 ... Einfluss der Absatzplanung auf Bestände ... 159 4.2 ... Einflussparameter auf die Prognose ... 163 4.3 ... Auswahl der Prognoseverfahren ... 191 4.4 ... Prognoseverfahren im Detail ... 206 4.5 ... Prognoseprozess ... 226 4.6 ... Prognosegenauigkeit/Prognosefehler ... 235 4.7 ... Forecasting & Monitoring Tool ... 255 4.8 ... Fazit ... 273 5. Disposition ... 275 5.1 ... Dispositionslogik ... 275 5.2 ... Verbrauchsgesteuerte Disposition ... 355 5.3 ... Demand-Driven Planning mit SAP-Add-ons für SAP S/4HANA und SAP ERP ... 365 5.4 ... Demand-Driven Planning mit der bedarfsorientierten Wiederbeschaffung (BWB) für SAP S/4HANA ... 388 5.5 ... Werksübergreifende Disposition mit dem CPP-Verfahren ... 415 5.6 ... Disposition mit dem Kanban-Verfahren ... 436 5.7 ... Ein- und Auslaufsteuerung von Materialien ... 447 5.8 ... Optimierungspotenziale in der Disposition ... 462 5.9 ... Strategische versus operative Disposition ... 479 5.10 ... Operative Disposition mit dem SAP-Add-on MRP Exception Monitor (ERM) und Advanced MD04 (aMD04) ... 487 5.11 ... Fazit ... 504 6. Lieferservice und Sicherheitsbestände ... 505 6.1 ... Zusammenhang zwischen Bestand und Servicegrad ... 505 6.2 ... Lieferbereitschaft ... 508 6.3 ... SAP-Add-on Service Level Monitor (SLC Monitor) ... 522 6.4 ... Verfügbarkeitsprüfung (ATP) mit SAP ... 527 6.5 ... Wiederbeschaffungszeit ... 534 6.6 ... SAP-Add-on Wiederbeschaffungszeit-Monitor (WBZ-Monitor) ... 539 6.7 ... Sicherheitsbestand ... 550 6.8 ... SAP-Add-on Simulation Sicherheitsbestände ... 581 6.9 ... SAP-Add-on Dynamic Safety Stock Consideration ... 595 6.10 ... Fazit ... 603 7. Losgrößen ... 605 7.1 ... Wie beeinflussen die Losgrößen die Bestände? ... 605 7.2 ... Statische Losgrößenverfahren in SAP ERP und SAP S/4HANA ... 607 7.3 ... Periodische Losgrößenverfahren in SAP ERP und SAP S/4HANA ... 617 7.4 ... Wirtschaftliche Losgrößenverfahren in SAP ERP und SAP S/4HANA ... 627 7.5 ... Restriktionen in der Losgrößenberechnung ... 646 7.6 ... Auswahl von Losgrößenverfahren ... 648 7.7 ... Berechnung der Ausschussmenge im Rahmen der Losgrößenberechnung ... 651 7.8 ... Bestellmengenoptimierung mit dem SAP-Add-on Simulation von Losgrößen ... 652 7.9 ... Fazit ... 659 8. Rückstands- und Fehlteilemanagement in der Produktion ... 661 8.1 ... Wie beeinflussen Rückstände in der Produktion die Bestände? ... 662 8.2 ... Warum entstehen Rückstände in der Produktionsplanung? ... 668 8.3 ... Reduzierung von Rückständen - First-come-first-served-Steuerung (FCFS) ... 676 8.4 ... Rückstandsanalyse mit dem SAP-Add-on Capacity Requirements Planning Cockpit ... 702 8.5 ... Kapazitätsabgleich mit dem SAP-Add-on Lean Manufacturing Planning and Control ... 710 8.6 ... Fehlteilemanagement in der Produktion mit dem SAP-Add-on MRP Exception Monitor (ERM) ... 725 8.7 ... Fazit ... 746 9. Bestandscontrolling ... 747 9.1 ... Warum Bestandsüberwachung? ... 747 9.2 ... Einführung in das Logistikcontrolling ... 748 9.3 ... Kennzahlensystem des Supply Chain Councils ... 750 9.4 ... Wichtige Kennzahlen aus der Sicht des Einkaufs ... 755 9.5 ... Einkaufscontrolling mit der SAP-Beratungslösung Einkaufsmonitor und SAP Analytics Cloud ... 767 9.6 ... Wichtige Kennzahlen aus Sicht der Disposition ... 778 9.7 ... Bestandscontrolling mit dem SAP-Add-on Bestandscontrollingcockpit und SAP Analytics Cloud ... 800 9.8 ... Wichtige Kennzahlen aus Sicht der Produktion ... 821 9.9 ... Kalkulation von Bestandspotenzialen ... 837 9.10 ... Fazit ... 838 Anhang ... 839 A ... Literaturverzeichnis ... 839 B ... Add-ons zu SAP ERP und SAP S/4HANA ... 845 Der Autor ... 859 Index ... 861
Arduino-Workshops (2. Auflg.)
Eine praktische Einführung mit 65 Projekten in aktualisierter 2. Auflage.In »Arduino-Workshops« erfahren Sie, wie diese Add-ons funktionieren und wie man sie einsetzt. Sie starten mit einem Überblick über das Arduino-System und gehen dann rasch zu den verschiedenen elektronischen Komponenten und Konzepten über. Zahlreiche Beispielprojekte vertiefen das Gelernte Schritt für Schritt und helfen Ihnen, dieses Wissen anzuwenden. Je tiefer Sie in die Materie eindringen, desto raffinierter und anspruchsvoller werden die Projekte.Unter den 65 Projekten des Buches finden sich nützliche Dinge wie:ein digitales Thermometer mit LCD-Anzeigeein GPS-Logger, der Daten Ihrer Reise für Google Maps aufzeichnetein handliches Testgerät zum Messen von Batteriespannungeneine Tastatursperre, die nur mit Geheimcode aufgehoben werden kannAußerdem lernen Sie, Spielzeug und Spiele zu entwickeln, beispielsweise:eine elektronische Version des klassischen sechsseitigen Würfelsein binäres Quiz, das Ihre Fähigkeiten zur Umwandlung von Zahlen testetein Fahrzeug mit Fernbedienung und Kollisionserkennung»Arduino-Workshops« führt Sie in die Welt der Mikroelektronik ein und lehrt Sie die Tricks und Design-Prinzipien eines erfahrenen Profis.Über den Autor:John Boxall ist seit über 26 Jahren in den Bereichen Elektronikdesign, Vertrieb und E-Commerce tätig. In seiner Freizeit schreibt er Arduino-Tutorials und veröffentlicht regelmäßig Reviews zu Arduino-Projekten und -Zubehör bei www.tronixstuff.com.
Cybersecurity in Intelligent Networking Systems
CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMSHELP PROTECT YOUR NETWORK SYSTEM WITH THIS IMPORTANT REFERENCE WORK ON CYBERSECURITY Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social networks, and other major cyber applications—it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy. Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology. Cybersecurity in Intelligent Networking Systems readers will also find:* Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats* Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption* Key areas in adversarial machine learning, from both offense and defense perspectives* Descriptions of network anomalies and cyber threats* Background information on data-driven network intelligence for cybersecurity* Robust and secure edge intelligence for network anomaly detection against cyber intrusions* Detailed descriptions of the design of privacy-preserving security protocolsCybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields. SHENGJIE XU, PHD, is an IEEE member and is an Assistant Professor in the Management Information Systems Department at San Diego State University, USA. YI QIAN, PHD, is an IEEE Fellow and is a Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln, USA. ROSE QINGYANG HU, PHD, is an IEEE Fellow. She is also a Professor with the Electrical and Computer Engineering Department and the Associate Dean for Research of the College of Engineering, Utah State University, USA. ContentsPreface xiiiAcknowledgments xviiAcronyms xix1 Cybersecurity in the Era of Artificial Intelligence 11.1 Artificial Intelligence for Cybersecurity . 21.1.1 Artificial Intelligence 21.1.2 Machine Learning 41.1.3 Data-Driven Workflow for Cybersecurity . 61.2 Key Areas and Challenges 71.2.1 Anomaly Detection . 81.2.2 Trustworthy Artificial Intelligence . 101.2.3 Privacy Preservation . 101.3 Toolbox to Build Secure and Intelligent Systems . 111.3.1 Machine Learning and Deep Learning . 121.3.2 Privacy-Preserving Machine Learning . 141.3.3 Adversarial Machine Learning . 151.4 Data Repositories for Cybersecurity Research . 161.4.1 NSL-KDD . 171.4.2 UNSW-NB15 . 17v1.4.3 EMBER 181.5 Summary 182 Cyber Threats and Gateway Defense 192.1 Cyber Threats . 192.1.1 Cyber Intrusions . 202.1.2 Distributed Denial of Services Attack . 222.1.3 Malware and Shellcode . 232.2 Gateway Defense Approaches 232.2.1 Network Access Control 242.2.2 Anomaly Isolation 242.2.3 Collaborative Learning . 242.2.4 Secure Local Data Learning 252.3 Emerging Data-Driven Methods for Gateway Defense 262.3.1 Semi-Supervised Learning for Intrusion Detection 262.3.2 Transfer Learning for Intrusion Detection 272.3.3 Federated Learning for Privacy Preservation . 282.3.4 Reinforcement Learning for Penetration Test 292.4 Case Study: Reinforcement Learning for Automated Post-BreachPenetration Test . 302.4.1 Literature Review 302.4.2 Research Idea 312.4.3 Training Agent using Deep Q-Learning 322.5 Summary 34vi3 Edge Computing and Secure Edge Intelligence 353.1 Edge Computing . 353.2 Key Advances in Edge Computing . 383.2.1 Security 383.2.2 Reliability . 413.2.3 Survivability . 423.3 Secure Edge Intelligence . 433.3.1 Background and Motivation 443.3.2 Design of Detection Module 453.3.3 Challenges against Poisoning Attacks . 483.4 Summary 494 Edge Intelligence for Intrusion Detection 514.1 Edge Cyberinfrastructure . 514.2 Edge AI Engine 534.2.1 Feature Engineering . 534.2.2 Model Learning . 544.2.3 Model Update 564.2.4 Predictive Analytics . 564.3 Threat Intelligence 574.4 Preliminary Study . 574.4.1 Dataset 574.4.2 Environment Setup . 594.4.3 Performance Evaluation . 59vii4.5 Summary 635 Robust Intrusion Detection 655.1 Preliminaries 655.1.1 Median Absolute Deviation . 655.1.2 Mahalanobis Distance 665.2 Robust Intrusion Detection . 675.2.1 Problem Formulation 675.2.2 Step 1: Robust Data Preprocessing 685.2.3 Step 2: Bagging for Labeled Anomalies 695.2.4 Step 3: One-Class SVM for Unlabeled Samples . 705.2.5 Step 4: Final Classifier . 745.3 Experiment and Evaluation . 765.3.1 Experiment Setup 765.3.2 Performance Evaluation . 815.4 Summary 926 Efficient Preprocessing Scheme for Anomaly Detection 936.1 Efficient Anomaly Detection . 936.1.1 Related Work . 956.1.2 Principal Component Analysis . 976.2 Efficient Preprocessing Scheme for Anomaly Detection . 986.2.1 Robust Preprocessing Scheme . 996.2.2 Real-Time Processing 103viii6.2.3 Discussions 1036.3 Case Study . 1046.3.1 Description of the Raw Data 1056.3.2 Experiment 1066.3.3 Results 1086.4 Summary 1097 Privacy Preservation in the Era of Big Data 1117.1 Privacy Preservation Approaches 1117.1.1 Anonymization 1117.1.2 Differential Privacy . 1127.1.3 Federated Learning . 1147.1.4 Homomorphic Encryption 1167.1.5 Secure Multi-Party Computation . 1177.1.6 Discussions 1187.2 Privacy-Preserving Anomaly Detection . 1207.2.1 Literature Review 1217.2.2 Preliminaries . 1237.2.3 System Model and Security Model 1247.3 Objectives and Workflow . 1267.3.1 Objectives . 1267.3.2 Workflow . 1287.4 Predicate Encryption based Anomaly Detection . 1297.4.1 Procedures 129ix7.4.2 Development of Predicate . 1317.4.3 Deployment of Anomaly Detection 1327.5 Case Study and Evaluation . 1347.5.1 Overhead . 1347.5.2 Detection . 1367.6 Summary 1378 Adversarial Examples: Challenges and Solutions 1398.1 Adversarial Examples . 1398.1.1 Problem Formulation in Machine Learning 1408.1.2 Creation of Adversarial Examples . 1418.1.3 Targeted and Non-Targeted Attacks . 1418.1.4 Black-Box and White-Box Attacks 1428.1.5 Defenses against Adversarial Examples 1428.2 Adversarial Attacks in Security Applications 1438.2.1 Malware 1438.2.2 Cyber Intrusions . 1438.3 Case Study: Improving Adversarial Attacks Against MalwareDetectors 1448.3.1 Background 1448.3.2 Adversarial Attacks on Malware Detectors 1458.3.3 MalConv Architecture 1478.3.4 Research Idea 1488.4 Case Study: A Metric for Machine Learning Vulnerability toAdversarial Examples . 1498.4.1 Background 1498.4.2 Research Idea 1508.5 Case Study: Protecting Smart Speakers from Adversarial VoiceCommands . 1538.5.1 Background 1538.5.2 Challenges 1548.5.3 Directions and Tasks 1558.6 Summary 157xi