Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Security

Produkte filtern

Produktbild für Pro Android with Kotlin

Pro Android with Kotlin

Develop Android apps with Kotlin to create more elegant programs than the Java equivalent. This revised book covers the various aspects of a modern Android app that professionals are expected to encounter. You'll use the latest Kotlin APIs as made available in most recent versions of the Android SDK.There are chapters dealing with all the important aspects of the Android platform, including GUI design, file- and data-handling, coping with phone calls, multimedia apps, interaction with location and mapping services, monetizing apps, and much more. Jetpack will also be covered. It is a suite of libraries to help developers follow best practices, reduce boilerplate code, and write code that works consistently across Android versions and devices.Pro Android with Kotlin, Second Edition is an invaluable source for developers wanting to build real-world, state-of-the-art Android apps for modern Android devices using the Kotlin programming language and its APIs as available in the modern Android SDK. After reading this book, you'll come away with the skills and techniques to build modern Android apps that you can sell on Google Play. Free source code is available on this book's Github page as well.WHAT YOU WILL LEARN* Integrate activities, such as intents, services, notifications and more, into your Android apps* Build UIs in Android using layouts, widgets, lists, menus, and action bars* Deal with data in your Android apps using data persistence and cloud access* Design for different Android devices* Create multimedia apps in Android* Secure, deploy, and monetize your Android appsWHO THIS BOOK IS FORProfessional Android app developers.PETER SPÄTH graduated in 2002 as a physicist and soon afterward became an IT consultant, mainly for Java related projects. In 2016 he decided to concentrate on writing books on various subjects, with a primary focus on software development. With a wealth of experience in Java-related languages, the release of Kotlin for building Android Apps made him enthusiastic about writing books for Kotlin development in the Android environment. 1. System.- 2. Application.- 3. Activities.- 4. Services.- 5. Broadcasts 6. Content Providers.- 7. Permissions.- 8. APIs.- 9. User Interface.- 10. Development.- 11. Building.- 12. Communication.- 13. Hardware.- 14. Testing.- 15. Troubleshooting.- 16. Distributing Apps.- 17. Instant Apps.- 18. CLI.

Regulärer Preis: 62,99 €
Produktbild für Boozang from the Trenches

Boozang from the Trenches

Test Automation is a key aspect of delivering high-quality software and reducing time to market. Several tools and approaches are available today, each with its own constraints and specificity. This book introduces Boozang, a codeless web automation tool, using a real-life enterprise project as source for examples.You'll have the opportunity to learn the basic features of Boozang and how to implement end-to-end automated scenarios, mixing GUI and API actions. Integration with JIRA-XRay and Jenkins is also covered to show how Boozang can be used effectively in an enterprise environment. The book is filled with examples that go beyond the Boozang tool, and cover the setup of a test automation project in a real context, with practical solutions as well as open points for which we are still looking for new ideas.YOU WILL LEARN HOW TO:· Install and set up a project with Boozang· Create a modular test suite and use Gherkin to define scenarios· Integrate Boozang with JIRA-XRay and work in a team with code branches· Build a Jenkins pipeline to execute the automated scenarios nightly and reduce the execution time via parallelismTHIS BOOK IS FOR:Testers and test managers, IT projects leads, Release and Delivery Managers, Developers, and Business AnalystsGianni is a simple guy from Livorno (a beautiful port city in Tuscany) who never thought he would end up with a Ph.D. at CERN (European Organization for Nuclear Research, cern.ch) and then working for a prestigious company in Switzerland. But he always knew that at some point in his life, he would have written a book.In his early career as a software developer, he built some C/C++ code but, pretty soon, debugging null pointer exceptions drove him crazy. He then decided he would be better off testing software rather than building it.Wherever he worked, he tried to push for automating tests. Because manual testing, let’s be honest, is not fun, and it can be dangerously repetitive. People at work must have fun, if possible. At Touring Club Suisse, he defined an IT Test Strategy stating “Test automation is developers’ stuff” until he discovered Boozang. And then, in his first two hours of using this tool, he thought, “Man, this is fun!”.Thus, he finally found a good topic for his book.Part 1: Testing web applications in an Enterprise context, why Boozang Chapter 1: Web Test Automation in an Enterprise environmentCHAPTER GOAL: This chapter introduces basic Test Automation concepts that will be used throughout the book. Besides ISTQB standard terminology, I’ll also cover the constraints typical of an Enterprise environment that might not be the same for small startups and IT giants.NO OF PAGES 15SUB -TOPICS1. Common Test Automation challenges2. Test levels, test types and testing roles3. Test automation in agile development4. Test Automation ROI, theory and practiceChapter 2: Selenium, best practices and pain pointsCHAPTER GOAL: This chapter presents the typical approach to testing web applications with coded solutions like Selenium and highlights the main pain points that could undermine a Test Automation initiative's success.NO OF PAGES: 5SUB - TOPICS1. Locators and Page Objects pattern2. Browsers and WebDriver compatibility3. Timing and waits4. Data management5. Reporting and script readability6. Development skillsChapter 3: Meet BoozangCHAPTER GOAL: This chapter introduces Boozang and how it addresses the pain points of a coded solution as described in the previous chapter. It also presents a possible selection approach for selecting an automation tool, particularly the one I followed before adopting Boozang.NO OF PAGES : 11SUB - TOPICS:1. Proof of Concept phase2. Pilot phase3. Why Boozang4. Codeless approach, how important is it?Chapter 4: The TCS projectCHAPTER GOAL: This chapter presents the context of the TCS project used all along the book to provide practical examples. I believe that there is no one size fits all solution for software testing and tools. Therefore, clarifying the context is very important to better understand the examples and consider possible adaptations one will have to make for a different context.NO OF PAGES: 8SUB - TOPICS:1. TCS Organization and Test Automation history2. NIS project introduction3. Test automation stream, NISTA setupChapter 5: How Boozang was bornCHAPTER GOAL: This chapter is a special one about the history behind Boozang. I believe it gives a great idea about this tool's strengths: the two key persons behind it. This input has been kindly provided by Mats Ljunggren.PART 2: Boozang main concepts and use cases Chapter 6: Starting up with BoozangCHAPTER GOAL: One of the advantages of a tool like Boozang versus a coded approach is that setting up your first projects is really easy and fast. Nothing to install, no code or POM files to prepare. This chapter will go over the registration process and the few steps needed to create a project. We will also see how to administer your account and projects and finally show how Boozang works behind the scenes.NO OF PAGES: 22SUB - TOPICS:1. Creating your first project2. The administrative User Interface3. Boozang under the hood4. Practice: NISTA setup part 1Chapter 7: Main concepts and entitiesCHAPTER GOAL: This chapter describes the core objects available in Boozang and starts introducing the Integrated Development Environment (IDE).NO OF PAGES: 38SUB - TOPICS:1. Modules and SubModules2. Application environments3. Tests and Test Suites4. Features and Scenarios5. Searching and bookmarks6. Recording7. Generate and reference Test8. Execution and Reporting9. Projects settings and UI Customization10. Updates from the trenchesChapter 8: Elements location approachCHAPTER GOAL: This chapter describes Boozang’s unique approach for locating WEB GUI elements, one of the features that sets it apart from other tools. Boozang, with its set of locators based on natural language, allows you to focus on the scenario flow rather than the web page DOM.NO OF PAGES: 14SUB - TOPICS:1. Boozang location strategy2. Fine tuning the locators3. Validating the expected resultsChapter 9: Exit conditions, conditional flows, and timersCHAPTER GOAL: The first test you will try with Boozang will be a simple sequential list of actions. But, as soon as you start implementing real scenarios, you will have to use exit conditions, loops, and conditional flows. In combination with this, you may need to adjust the timing of some locators, as some applications may have slow background processes, heavy loading pages, and/or javascripts. In this chapter, we see how to apply these concepts to build solid and reusable building blocks.NO OF PAGES: 21SUB - TOPICS:1. Exit conditions2. Conditional flows3. Loop groups4. TimersChapter 10: Data ManagementCHAPTER GOAL: This is probably one of the most important chapters, as data management is one of the main keys to build reusable components. Boozang is extremely powerful and flexible when it comes to managing test data. But power and flexibility can hide a complexity cost if you don’t use it properly.NO OF PAGES: 13SUB - TOPICS:1. Data management concepts2. Parameters3. Project data ($project)4. Module data ($module)5. Test data ($test)6. Loops ($loop, $group, $action)7. Examples from the trenchesChapter 11: Reporting and troubleshootingCHAPTER GOAL: This chapter covers some standard and more advanced reporting features available in Boozang as well as the best way you can analyze failures with minimal effort.NO OF PAGES: 20SUB - TOPICS:1. Test reports2. Trend reports3. Troubleshooting failuresPART 3: Integrations and Advanced topicsChapter 12: APIs and mixed API/GUI testingCHAPTER GOAL: In today’s world applications are highly interconnected, both with internal and external systems. Restful APIs are becoming the de-facto standard to allow this communication. This chapter explains how to test Restful APIs and create scenarios with both GUI and API actions. Boozang allows you to do API testing as well as mix API calls within your GUI tests.NO OF PAGES: 17SUB - TOPICS:1. Restful APIs2. Why Boozang for testing APIs?3. API Tests in Boozang4. Server side mock with JSON Server5. API Tests from the trenchesChapter 13: Gherkin and Behavior Driven DevelopmentCHAPTER GOAL: This chapter introduces the reader to the Gherkin language and the practice of Behavior Driven Development (BDD), also known as Acceptance Test Driven Development (ATDD).NO OF PAGES: 18SUB - TOPICS:1. Behavior Driven Development2. Gherkin without BDD, pros and cons3. Gherkin language, readability above all,... if possible4. Some good and bad examplesChapter 14: JIRA with Boozang via XRayCHAPTER GOAL: This chapter shows how to effectively manage releases via JIRA, XRAy and Boozang to have a complete quality view on releases when using both manual and automated tests.NO OF PAGES: 17SUB - TOPICS:1. Using JIRA with XRay2. Boozang integration with XRayChapter 15: Jenkins and the Boozang runnerCHAPTER GOAL: This chapter shows how to use Jenkins for scheduling and reporting automated tests results in a CI/CD pipeline. We will see how Boozang can be used with other tools to provide a fully automated pipeline and also how to reduce the execution time through parallel runs.NO OF PAGES: 40SUB - TOPICS:1. Continuous Delivery and the need for automating acceptance tests2. Puppeteer and the Boozang runner3. How to use the Docker runner4. Keeping execution time low with parallel runs5. Reports and log files6. Publishing reports on Jenkins and JIRA7. Complete working pipeline8. Docker in Docker setupChapter 16: Boozang for teamsCHAPTER GOAL: Working with a team increases productivity but brings new challenges. This chapter covers all the Boozang features for collaborative work, but also some specific details on how to effectively collaborate in a Test Automation project.NO OF PAGES: 26SUB - TOPICS:1. Team collaboration2. Explicit lock3. Concurrent development and safe refactoring with branches4. Tests Map5. Quality controlConclusionsAppendix

Regulärer Preis: 62,99 €
Produktbild für Cloud Native Applications with Docker and Kubernetes

Cloud Native Applications with Docker and Kubernetes

This book takes developers on a journey into the cloud with Docker and Kubernetes. It walks you through the basics of Docker containers, how they are built, run, and published, and how the Kubernetes system allows you to use containers to better manage a cloud native application. Additionally, it walks you through various issues in cloud architecture, and how to design a cloud architecture that will work with your application and your team.The book takes a unique approach, getting you immersed in each subject with tutorials, then building up your technical knowledge, and finally backing up and thinking about more big-picture issues. Part one introduces Docker, building and working with Docker images, and covering best practices for Docker Containers. Part two covers the practicalities of "cloud native” and managing a Kubernetes application, including a full working example. The last part covers the design of cloud and microservice architectures, including the use of enterprise message queues, multi-site configurations and the common values that such architectures follow.This approach accelerates learning and keeps you moving forward without leaving you behind. The appendices also contain a wealth of worthwhile reference material for routine cloud application management.WHAT YOU WILL LEARN* Understand Docker and containerization* Gain insight into what Kubernetes is* Master essential cloud architecture design principles* Design and implement notes for building cloud architecturesWHO THIS BOOK IS FORPrimarily developers who are moving to the cloud and want to get a sense of the environment they are getting into, and developers who want to move into a larger role of cloud architecture. Jonathan Bartlett is a senior software developer for McElroy Manufacturing. In his career he has served as senior developer and cloud architect roles for several companies in the biking industry, the music industry, the housing industry, and the medical industry. Jonathan has also taught computer science at the college and high school levels. In his spare time he writes for MindMatters.ai and also writes research papers on artificial intelligence, mathematics, and the applications of information theory to other sciences. Chapter 1. Introduction - what they should expect from the book.PART 1: DOCKERChapter 2. Docker Under the Hood - introduction to the history and technology behind Docker. I find that really understanding Docker containers well requires a brief knowledge of their history and implementation.Chapter 3. A Docker Interactive Tutorial - the basics of building and working with Docker imagesChapter 4. Best Practices for Docker Containers - general tips, Debian vs Alpine, etc.PART 2: KUBERNETESChapter 5. The Cloud Native Philosophy - a general intro to the goals behind “Cloud Native” and KubernetesChapter 6. Getting Started with Kubernetes - showing how to deploy a simple system on Kubernetes with the Kubernetes dashboardChapter 7. Managing Kubernetes with kubectl - an introduction to the kubectl toolChapter 8. The Kubernetes environment - now that the user has some hands-on with Kubernetes, we introduce the components themselvesChapter 9. Basic Kubernetes Management - how to work with YAML filesChapter 10. A Full Kubernetes Cloud Example - full Kubernetes code for a cluster for a Message Board systemChapter 11. Going Further in Kubernetes - a brief introduction to other parts of KubernetesPART 3: CLOUD ARCHITECTUREChapter 12. Cloud Architecture Introduction - why architecting mattersChapter 13. Basic Cloud Architectures - basic architectural diagrams for the most common situationsChapter 14. Microservice Architectures - what microservices are, why they are important, and how to build such an architectureChapter 15. Enterprise Message Queues - what message queues are and how they make micro service architectures more flexible and resilientChapter 16. Architecting Data Stores - various database (and other data store) optionsChapter 17. Multi-Site Configurations - introducing terminology and through processes behind multi-site configurationsChapter 18. Architecture Values - a discussion of common themes for cloud architecturesChapter 19. ConclusionAPPENDICES:1. Navigating the Linux Command Shell2. Installing Applications3. Common kubectl commands4. Kubernetes Storage Options5. Kubernetes Pod Scheduling6. Troubleshooting Kubernetes Clusters

Regulärer Preis: 46,99 €
Produktbild für Serverless Beyond the Buzzword

Serverless Beyond the Buzzword

Know how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.Deployment automation and DevOps also feature heavily in this book, and you will find real-world use cases and examples of Serverless architecture to get you started. It's worth noting that this book is not a development guide; it gives you a comprehensive understanding of what Serverless is so you can make informed decisions for your organization and projects.WHAT YOU’LL LEARN* Understand Serverless architecture and strategy* Understand modern cloud management strategy, governance, and organizational team structure* Handle budget planning and management* Get started with Serverless architecture design* Gain knowledge of best practices and security, as well as data management and DevOps* Study proactive logging, operations, architecture examples, case studies, and moreWHO THIS BOOK IS FORAnyone interested in a deep understanding of Serverless and how it can impact organizations and projects, regardless of their technical level. Strategic insights are provided for entrepreneurs and executives, planning and team insights for project managers, and technical insights for architects and team leads. Cloud consultants working with enterprises can read everything for a full, in-depth understanding of the topic. Other readers, such as less technical CTOs/CIOs, VPs, entrepreneurs, product owners, project managers, etc., can get what they need from the first 5-7 chapters. More technical readers and those experienced with Serverless can skim through the first 3 chapters and start with the security deep dive in Chapter 4.Thomas Smart has been actively involved with digital projects since 2002. His experience crosses many industries and types and sizes of organisations, giving him a wealth of experience and knowledge to draw upon as part of his consulting services. Since 2020 he has worked as a senior consultant for Sourced Singapore, helping large, regulated enterprises evolve their cloud strategy to productively deliver Serverless applications. This experience has provided many new insights for large enterprises and their unique challenges when adopting modern cloud strategies. About the authorAcknowledgementsPrologueWho is this book for?Technical levels used in this bookWhat will you learn?Amazon Web Services (AWS)Second editionChapter 1: Serverless basicsWhat is Serverless architecture?MicroservicesServerless exampleHistory of ServerlessTypes of projectsKey challengesKey benefitsCommon objectionsPublic case studiesChapter 2: StrategyIntroductionTraditional organization structure vs ServerlessCloud Centre of Excellence (CCoE)Cloud controls as compliance guardrailsSupporting toolsServerless adoption: current stateServerless adoption: desired stateServerless adoption: gap analysisApplication suitability for ServerlessEvent StormingPublic case studiesChapter 3: FinancesTotal Cost of Ownership (TCO)The value of paying for utilizationThe cost to develop ServerlessThe cost of migrating applicationsThe cost of maintenance and operationsEstimating the cloud operational costsCollecting the input data for an estimateCalculating the estimateCost managementCost optimizationChapter 4: SecurityShared responsibilityServerless securityPrinciple of Least PrivilegeIAM Policy tipsSecurity for cloud usersSecurity for microservicesUser input validationStoring credentialsEncryptionProtecting DataSecuring DatabasesPrivacy and GDPRSecurity monitoring with ElectricEyeChapter 5: PeopleServerless rolesServerless roles: Solution ArchitectServerless Roles: Cloud Security EngineerServerless Roles: Deployment Automation EngineerServerless roles: Full Stack DeveloperServerless roles: Database EngineerServerless trainingServerless team structureWorking with Serverless vendorsVetting Serverless capabilitiesChapter 6: DevOps & ToolingWhat is DevOps?Infrastructure as CodeAWS CloudFormationAWS CloudFormation planningTerraformAWS Serverless Application Model (SAM)AWS AmplifyAWS Cloud Development Kit (CDK)CDK technical considerationsServerless FrameworkCode RepositoriesGIT SubmodulesDeveloper ToolingCode quality assuranceChapter 7: DataData is a valuable assetDatabase selectionEvent SourcingData tenancyRelational Database Service (RDS)Redshift ServerlessDynamoDBNoSQLServerless NoSQL databasesManaged NoSQL databasesNoSQL databases comparisonIn-memory databasesAppSyncSimple Storage Solution (S3)Elastic File System (EFS)Chapter 8: Logging & TestingLoggingReactive LoggingProactive LoggingLogging format and contentLog types in the cloudCloud logging servicesCloudWatchExporting logs to S3CloudWatch SubscriptionsManaged services for proactive loggingError MonitoringPerformance OptimisationCost TrackingSecurity MonitoringLogging Best PracticesTestingTesting Challenges in ServerlessTypes of TestsAsynchronous TestingRisk Assessment for TestingTest Pyramid vs Test HoneycombContract Testing for ServerlessDeployment PipelineAWS Testing ServicesChapter 9: ArchitectureChallenges & mitigationsAWS: MicroservicesAWS: Application Programming Interface (API)Design patternsMicroservice example architecturesStateless architectureDecoupling microservicesAWS: DecouplingEvent-driven architectureAsynchronous design patternContainersAWS: EdgeAWS: Internet of Things (IoT)AWS: Managed Machine Learning (ML)AWS: Ledger TechnologyAWS: Call CentreWell-Architected FrameworkServerless tipsChapter 10: Case studiesIntroductionProactive loggingServerless data lakeVideo analysisServerless MinecraftDynamic live streamingSEO-friendly website and CMSVirtual hostTrue Serverless containersEpilogueReferences

Regulärer Preis: 62,99 €
Produktbild für Infrastructure Leader's Guide to Google Cloud

Infrastructure Leader's Guide to Google Cloud

Making fast and accurate technology decisions is critical to staying relevant to your customers. And technology needs to add value back to your organization quicker than ever. Google Cloud offers IT leaders the answer to today’s technology challenges. However, to realize its benefits you must navigate your journey without hitting common pitfalls that lead to stalled and unsuccessful cloud adoption.This book distills the lessons learned from guiding and working with hundreds of organizations on their journey to the cloud. Its goal is to give aspiring and current IT leaders the knowledge required to be an infrastructure leader. That is the term author Jeremy Lloyd uses for the person who can lead your organization's Google Cloud adoption strategy.Of course, cloud adoption isn’t a solo endeavor. Jeremy covers the different generations of IT leaders, the team structure, and the skills required for a successful migration to Google Cloud. This book also covers why you should choose Google Cloud, how to build a business case for the cloud, and defining your adoption/migration/modernization strategies and cloud operating model. Finally, the book covers how to empower your developers to deploy cloud-native applications and how to support day two operations once you have moved to Google Cloud.WHAT YOU WILL LEARN* Use Google Cloud to add value to your organization* Define and lead your Google Cloud adoption strategy * Migrate and modernize your workloads* Operate workloads once in Google Cloud and avoid antipatterns* Understand how the infrastructure team can be enablers for cloud-native developmentWHO THIS BOOK IS FORCurrent infrastructure/IT/technology leaders who need guidance for their Google Cloud adoption, migration, and modernization journey; IT managers, IT team leads and IT professionals aspiring to be the next IT leaders who must learn to navigate more than just technical complexity.JEREMY LLOYD has over 20 years of experience in IT. He has spent the last eight years helping organizations worldwide adopt and migrate to the cloud. During this time, he’s guided and advised technology leaders from some of the world’s most well-known companies on their cloud adoption, migration and modernization strategies. In addition, he is a mentor to technology leaders and a speaker at numerous events across the UK and internationally.CHAPTER 1: INTRODUCTIONChapter Goal: Introduce a concept that there are essentially four types of infrastructure leaders as I know them. Let them build a relationship with one of the four which provides them with a lens upon which to view the current state and the path to progress forwards with GCP. Then inform them of the role that an infrastructure leader plays in a GCP adoption and migration strategy. Lay out the challenges they will face adopting GCP/Cloud. Provide guidance on a fundamental shift from a cost centre to a profit centre.No of pages - 12Sub-Topics1. What does an Infrastructure Leader do? Or Who is an Infrastructure Leader?2. Type of Infrastructure Leaders3. Challenges4. Becoming a profit centreCHAPTER 2: ABOUT GOOGLE & GOOGLE CLOUDChapter Goal: Take the reader on a short journey of the history of Google and bring out the narrative around their values and principles and empower them to lead innovation across every sector they touch. Then bring out the core value proposition of Google Cloud itself, underpinned by evidence to backupNo of pages - 28Sub - Topics1. Google short history2. Introducing Google Cloud Platform3. Google Cloud Platform core components4. Why use Google Cloud PlatformCHAPTER 3: FUTURE OF ITChapter Goal: Orient the reader into understanding that their current state has to change. Back up the messaging with trends and data points they can’t refute.No of pages - 3Sub - TopicsCHAPTER 4: THE FOUR STAGES OF GOOGLE CLOUD PLATFORM ADOPTIONChapter Goal: Label and define the four states of GCP/Cloud adoption. Let the reader understand how and where any experience they currently have sits. Help them understand the considerations to going with one strategy over the others.No of pages - 7Sub - Topics1. Shadow IT2. Tactical Adoption3. Strategic Adoption4. Organisation TransformationCHAPTER 5: BUSINESS CASEChapter Goal: Arm the reader with the information they need to write a rapid or detailed business case to justify adoption and migration to GCP. The aim is to make is simple for them to get the right story that will resonate with their organisation.No of pages - 6Sub - Topics1. Rapid Business Case2. Detailed Business Case3. Integrating with an existing business case templateCHAPTER 6: THE CLOUD STRATEGYChapter Goal: Show them the importance of having a well-defined cloud strategy. Then give them almost a blueprint upon which to follow in how to create one.No of pages - 10Sub - Topics1. Version2. Executive Summary3. Current State4. Financial Models5. Alignment to business strategy6. Guiding Principles7. Security8. Compliance9. Risk Management10. Governance11. Ways of Working12. Objectives and Key Results (OKRs)13. Implementation PlanCHAPTER 7: CLOUD OPERATING MODELChapter Goal: With a defined cloud strategy you need the next layer which is to define what your cloud operating model is. This chapter aims to inform what to consider and how their operating model could look and how to ensure it can evolve as the organisation matures with GCP.No of pages - 6Sub - TopicsCHAPTER 8: MIGRATION STRATEGIESChapter Goal: Inform the reader of the industry used migration approaches and Google Cloud’s take on them.No of pages - 3-5Sub - Topics1. Migration Objectives2. Migration Risk management3. Googlers & Office of the CTO4. Partner Ecosystem5. ActionsCHAPTER 9: MODERNISATION STRATEGIESChapter Goal: Inform the reader about modernisation strategies, Google’s tools and some simple methods to help them quickly decide what to modernise.No of pages - 10Sub - Topics1. Modernisation guardrails2. Modernisation roadmap3. Mainframe Modernisation4. Migration Decision Tree5. ActionsCHAPTER 10: ORGANISATIONAL READINESSChapter Goal: Provide the reader with the considerations across key areas that will help them be prepared for cloud adoption/migration.No of pages - 34Sub - Topics1. Paving the roads for cultural change2. Google Cloud Adoption Framework3. Managing The Hype-cycle4. Skillset5. Cloud Adoption Teams (CMO, CCoE etc)6. Building a Cloud Center of Excellence7. Security Readiness8. Governance Readiness9. Operations ReadinessCHAPTER 11: MIGRATION & MODERNISATION TEAM STRUCTURESChapter Goal: Get the reader to understand the people, skills and ways of working that GCP migration and modernisation requiresNo of pages - 2Sub - TopicsCHAPTER 12: MIGRATIONSChapter Goal: Provide guidance across migration assessment, planning and execution. Inform them what good first mover workloads look like.No of pages - 20-22Sub - Topics1. Introducing The Migration Journey2. Assess3. Plan4. Migrate5. OptimiseCHAPTER 13: CLOUD-NATIVE DEVELOPMENTChapter Goal: The infrastructure leader won’t be responsible for cloud-native development but they can/should play a key role in it’s facilitation. It showcases the considerations across new areas that the infrastructure team should be focusing on.No of pages - 20Sub - Topics1. Cloud-Native Advantages2. Containers3. Integrated Development Environment4. Serverless5. BeyondProdCHAPTER 14 : DAY 2 OPERATIONSChapter Goal: Introduce the concept of Day 2 Operations to the reader. Then give them guidance around what the infrastructure team should be thinking about across each of the sub-topics, all staying within a day 2 operations context.No of pages - 60Sub - Topics1. Day 2 Cloud Challenges2. Cloud Foundations3. Landing Zones4. Compute5. Monitoring, Logging And Alerting6. Availability7. Reliability8. Recoverability9. Financial Operations10. Performance11. Security12. Automation13. Governance and Compliance14. Cloud Marketplace15. GCP Managed Services16. Containers17. Data Analytics18. Open Source19. Support20. Day 2 antipatterns21. DevOps/SRE/CRECHAPTER 15: PRODUCTIVITY AND COLLABORATIONChapter Goal: Introduce a Google concept of BeyondCorp and how that ties in with a GCP migration strategy. Introduce Google Workspace and benefits of using it.No of pages - 8Sub - Topics1. BeyondCorp2. Google Workspace

Regulärer Preis: 46,99 €
Produktbild für IT-Management

IT-Management

Dieses Buch befasst sich mit der Kunst des IT-Managements. Es wird ein einfacher und robuster Rahmen vorgeschlagen, um die wesentlichen Elemente des IT-Managements zu beschreiben und zu strukturieren. Die Autoren legen besonderes Augenmerk auf didaktische Aspekte, um das Behalten der vorgestellten Modelle zu erleichtern und das Nachdenken über die vorgestellten Themen zu fördern. Dank eines Konzentrats an bewährten Praktiken wird jedes Unternehmen schnell in der Lage sein, sein eigenes IT-Ökosystem aufzubauen.DR. LIONEL PILORGET war in verschiedenen IT-Managementpositionen in der Industrie und im Finanzsektor tätig. Zu seinen vielfältigen Aufgaben gehörten die Umsetzung von Richtlinien und Strategien sowie die Leitung von komplexen, strategischen IT-Projekten. Derzeit ist er Leiter Business Analysen und Projektmanagement bei einer Privatbank in der Schweiz. Ausserdem ist er Dozent für den Masterstudiengang "Wirtschaftsinformatik" an der Fachhochschule Nordwestschweiz FHNW.THOMAS SCHELL hat Informatik studiert und sich auf den Bereich Management von IT-Prozessen, -Services und -Organisationen spezialisiert. Dreimal in seiner Karriere hat er klassische IT-Organisationen zu kundenorientierten IT-Dienstleistern umgestaltet. Nach 25 Jahren in der Schweizer Pharma- und Chemieindustrie ist er heute Dozent für IT Service Management an Fachhochschulen in der Schweiz und in Deutschland. Er unterstützt IT-Organisationen als Berater und Trainer für Best-Practice-Frameworks.

Regulärer Preis: 29,99 €
Produktbild für Pro .NET on Amazon Web Services

Pro .NET on Amazon Web Services

This book provides in-depth guidance and best practices for .NET developers new to working with Amazon Web Services. AWS is the world’s most comprehensive and broadly adopted cloud platform, and this book will help you choose from, and use, its extensive collection of cloud services when developing and hosting your .NET applications in the cloud.Pro .NET on Amazon Web Services focuses on the building and deployment of .NET applications on AWS. It demonstrates best practices and provides prescriptive guidance around moving existing .NET Framework, .NET Core, and .NET 5+ applications to AWS. It also offers directions on building new, distributed, and reliable cloud-native applications. You will learn how to take advantage of the various tools available from AWS to build and deploy .NET-based applications. You will also be shown how to take advantage of different AWS services, including various execution platforms and databases that can help your .NET applications to achieve the reliability and scalability that AWS is known for.WHAT YOU WILL LEARN* Develop and deploy Microsoft .NET applications on the Amazon Web Services platform* Take advantage of the various free tools AWS offers for developing and deploying cloud applications* Choose the correct compute service on which to host your application* Choose the right database from the many options that AWS offers* Make AWS service calls from within .NET applications* Secure .NET applications using best practices around AWS Identity and Access Management (IAM)* Migrate existing .NET applications to the AWS platform and take advantage of the services offered* Build modern .NET applications using advanced AWS servicesWHO THIS BOOK IS FOR.NET developers seeking to take advantage of the breadth and depth of functionality in the AWS cloud, as well as developers who, whether new to cloud applications or experienced in the cloud, face challenges in understanding and applying the breadth and depth of services available from AWS when choosing to develop and host their applications. It will also be useful for those interested in extending their application’s functionality through calling AWS services from within their applications, and who want to apply best practices for building and securing modern distributed .NET applications in the Amazon Web Services cloud.BILL PENBERTHY has over 25 years in software development (almost 15 of which is .NET), and brings a pragmatic approach to software development . With much of that time spent in consulting, he has worked on many different projects and used many different designs and approaches. In 2019, he switched to the dark side where he puts his development experience towards being a .NET developer advocate with AWS.STEVE ROBERTS is a Developer Advocate for .NET and PowerShell development at AWS. Based in Seattle, Washington, Steve worked for 8 years as a Senior Development Engineer on the AWS tools for .NET. He was the development lead for the AWS Tools for PowerShell and the AWS Tools for Azure DevOps and contributed to the AWS Toolkits for Visual Studio, and Visual Studio Code, and the AWS SDK for .NET. Prior to joining AWS, Steve had over 20 years’ experience as a developer focused on IDE tools and integrations.PART I. GETTING STARTED1. The Core Essentials2. AWS Tools for .NET3. Additional ToolsPART II. HOSTING YOUR APPLICATIONS4. Virtual Machines5. Containers6. ServerlessPART III. STORING YOUR DATA7. S3 Object Storage8. Microsoft SQL Server9. Other RDS Databases10. NoSQL Databases and AWS11. Purpose-built DatabasesPART IV. MOVING EXISTING APPS TO AWS12. Moving to Virtual Machines.13. Containerizing14. Migrating your Data15. Re-platforming and RefactoringPART V. BUILDING CLOUD NATIVE APPLICATIONS16. Events and Messaging17. Monitoring and Observability

Regulärer Preis: 66,99 €
Produktbild für MySQL Database Service Revealed

MySQL Database Service Revealed

Access all the information you need to begin using the MySQL Database Service (MDS) in the Oracle Cloud Infrastructure (OCI). MDS is Oracle’s new platform as a service (PAAS) offering for open-source database users. This book covers getting started with an account in OCI, gives a brief overview of OCI services available, and provides a short tutorial on MDS. Reading this book helps you take advantage of the powerful OCI features by building your own MySQL database in the cloud.Examples in this book center around running MDS in OCI, and include several of the popular use cases as well as advice on how to implement them. In addition, you will learn more about the related MDS OCI features, such as the high availability features currently available. Finally, you will learn how to back up and restore your data as well as how to get your data into and out of the cloud. The skills you learn in this book will help you get started using MDS and letting Oracle do the heavy lifting of managing MDS operations and implementation.WHAT YOU WILL LEARN* Use Oracle Cloud Infrastructure (OCI)* Deploy MySQL Database Service (MDS) systems in the cloud* Connect your applications to MDS* Back up and recover using the data recovery features of MDS* Employ the newest high availability features of MDSWHO THIS BOOK IS FORSystems engineers, developers, and database professionals who want to learn about the powerful features of the MySQL Database Service (MDS) and how to incorporate cloud-based database storage into their infrastructure and applications. Readers who are new to MySQL will appreciate the tutorial chapter, and those familiar with MySQL will learn the latest features of MDS as well as how to build inexpensive, powerful MySQL database servers in the Oracle Cloud Infrastructure (OCI).CHARLES BELL conducts research in emerging technologies. He is a member of the Oracle MySQL Development team and is one of the principal developers for the MySQL Database Service (MDS) team supporting MySQL as a service in the Oracle Cloud Infrastructure (OCI). He received his Doctor of Philosophy in Engineering from Virginia Commonwealth University in 2005.Dr. Bell is an expert in the database field and has extensive knowledge and experience in software development and systems engineering. His research interests include 3D printers, microcontrollers, database systems, cloud systems, software engineering, Internet of Things, and sensor networks.Dr. Bell lives in a small town in rural Virginia with his loving wife. He spends his limited free time as a practicing Maker, focusing on microcontroller projects and refinement of 3D printers. 1. Getting Started with MySQL in the Cloud2. Oracle Cloud Infrastructure3. A Brief Tutorial of MySQL4. MySQL Database Service5. Backup and Restore6. Point-in-Time Recovery7. Data Import and Export8. High Availability9. OCI Command-Line Interface and Application Programming Interfaces10. Migrating to MDS

Regulärer Preis: 62,99 €
Produktbild für Hacking & Security - Das umfassende Handbuch (3. Auflage)

Hacking & Security - Das umfassende Handbuch (3. Auflage)

Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre IT-Systeme auch wirklich absichern. Dieses umfassende Handbuch ist der Schlüssel dazu. Die Security-Profis rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen – Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern: Hier werden Sie zum Security-Experten!Aus dem Inhalt: Kali LinuxHacking-Tools (nmap, hydra, mimikatz, Metasploit, OpenVas)Externe Sicherheitsüberprüfung & Pen-Tests auf Client und ServerIT-Forensik: Spuren sichern und analysierenWLAN, Bluetooth und Funk abhören, USB-Hacking-DevicesBasisabsicherung: Linux und Windows, Active Directory und SambaCloud-Sicherheit: Microsoft 365, AWS, NextCloudHacking und Security von SmartphonesIntrusion Detection mit SnortWeb-Anwendungen absichern und angreifenExploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr; Inkl. Spectre & MeltdownIoT-Security: Angriffe und sichere EntwicklungLeseprobe (PDF-Link)

Regulärer Preis: 49,90 €
Produktbild für Rechnernetze

Rechnernetze

Wie Daten zwischen Rechnern ausgetauscht werden, ist absolutes Grundlagenwissen im Informatikstudium: Das OSI-Modell und die Grundlagen der paketbasierten Kommunikation müssen Sie kennen, wenn Sie professionell mit Computern arbeiten. Dazu finden Sie in diesem umfassenden Lehrbuch den vollständigen Überblick über moderne Netzwerkthemen: Von der technischen Umsetzung über Algorithmen und Protokolle bis zur Planung und Konzeption von Netzwerkarchitekturen. Aus dem Inhalt: Netzwerke im ÜberblickEthernet und WLANPackete, Verbindungen und RoutingRouting-Algorithmen und Large Scale IP-RoutingBorder Gateway Protocol (BGP)IPv4 und IPv6 und Ihre Begleiter: DNS, ARP, DHCP, SLAACTransportprotokolle: UDP und TCPQueuing und SchedulingQuality of ServiceNetzwerkmanagement mit SNMPSicherheit und praktische Anwendung   Materialien zum Buch ... 25   Geleitwort des Fachgutachters ... 27   1.  Netzwerke im Überblick ... 29        1.1 ... Schichten ... 29        1.2 ... Datenrate, Durchsatz und Bandbreite ... 30        1.3 ... Pakete ... 31        1.4 ... Datagrammweiterleitung ... 33        1.5 ... Topologie ... 37        1.6 ... Routing-Schleifen ... 38        1.7 ... Überlast ... 40        1.8 ... Mehr über Pakete ... 41        1.9 ... LANs und Ethernet ... 42        1.10 ... IP -- Internet Protocol ... 45        1.11 ... DNS ... 54        1.12 ... Transport ... 55        1.13 ... Firewalls ... 61        1.14 ... Einige nützliche Dienstprogramme ... 63        1.15 ... IETF und OSI ... 65        1.16 ... Berkeley Unix ... 69        1.17 ... Epilog ... 70        1.18 ... Übungen ... 70   2.  Ethernet-Grundlagen ... 75        2.1 ... Klassisches 10-Mbit/s-Ethernet ... 76        2.2 ... 100 Mbit/s (Fast) Ethernet ... 93        2.3 ... Gigabit-Ethernet ... 95        2.4 ... Ethernet-Switches ... 96        2.5 ... Epilog ... 101        2.6 ... Übungen ... 102   3.  Weiterführende Ethernet-Themen ... 107        3.1 ... Spanning-Tree-Algorithmus und Redundanz ... 108        3.2 ... Virtuelles LAN (VLAN) ... 114        3.3 ... TRILL und SPB ... 119        3.4 ... Software-Defined Networking ... 122        3.5 ... Epilog ... 132        3.6 ... Übungen ... 132   4.  Drahtlose LANs ... 137        4.1 ... Abenteuer im Funkland ... 137        4.2 ... Wi-Fi ... 143        4.3 ... WiMAX und LTE ... 182        4.4 ... Ortsfeste Drahtlosnetzwerke ... 188        4.5 ... Epilog ... 190        4.6 ... Übungen ... 191   5.  Sonstige LAN-Technologien ... 195        5.1 ... Virtuelle private Netzwerke ... 195        5.2 ... Carrier-Ethernet ... 197        5.3 ... Token Ring ... 198        5.4 ... Virtuelle Verbindungen ... 200        5.5 ... Asynchronous Transfer Mode: ATM ... 204        5.6 ... Epilog ... 208        5.7 ... Übungen ... 208   6.  Verbindungen ... 213        6.1 ... Kodierung und Frames ... 213        6.2 ... Zeitmultiplexverfahren ... 220        6.3 ... Epilog ... 227        6.4 ... Übungen ... 227   7.  Pakete ... 229        7.1 ... Paketverzögerung ... 229        7.2 ... Schwankungen der Paketverzögerung ... 233        7.3 ... Paketgröße ... 234        7.4 ... Fehlererkennung ... 237        7.5 ... Epilog ... 245        7.6 ... Übungen ... 245   8.  Sliding Windows ... 251        8.1 ... Zuverlässige Datenübertragung: Stop-and-Wait ... 251        8.2 ... Die Sliding-Windows-Strategie ... 256        8.3 ... Lineare Flaschenhälse ... 261        8.4 ... Epilog ... 271        8.5 ... Übungen ... 271   9.  IP Version 4 ... 277        9.1 ... Der IPv4-Header ... 279        9.2 ... Schnittstellen ... 282        9.3 ... Spezielle Adressen ... 284        9.4 ... Fragmentierung ... 287        9.5 ... Der klassenlose IP-Delivery-Algorithmus ... 290        9.6 ... IPv4-Subnetze ... 294        9.7 ... Netzwerkadressübersetzung ... 302        9.8 ... Unnummerierte Schnittstellen ... 309        9.9 ... Mobile IP ... 311        9.10 ... Epilog ... 313        9.11 ... Übungen ... 313 10.  IPv4-Begleitprotokolle ... 317        10.1 ... DNS ... 317        10.2 ... Address Resolution Protocol: ARP ... 336        10.3 ... Dynamic Host Configuration Protocol (DHCP) ... 341        10.4 ... Internet Control Message Protocol ... 343        10.5 ... Epilog ... 349        10.6 ... Übungen ... 349 11.  IPv6 ... 351        11.1 ... Der IPv6-Header ... 352        11.2 ... IPv6-Adressen ... 353        11.3 ... Netzwerkpräfixe ... 358        11.4 ... IPv6-Multicast ... 359        11.5 ... IPv6-Erweiterungsheader ... 360        11.6 ... Nachbarschaftserkennung (Neighbor Discovery) ... 364        11.7 ... Zuweisung von IPv6-Hostadressen ... 371        11.8 ... Epilog ... 378        11.9 ... Übungen ... 378 12.  Weitere IPv6-Funktionen ... 381        12.1 ... Weltweit sichtbare Adressen ... 381        12.2 ... ICMPv6 ... 382        12.3 ... IPv6-Subnetze ... 384        12.4 ... IPv6 und IPv4 gemeinsam benutzen ... 386        12.5 ... IPv6-Beispiele ohne Router ... 392        12.6 ... IPv6-Konnektivität über Tunneling ... 395        12.7 ... Konnektivität von IPv6 nach IPv4 ... 400        12.8 ... Epilog ... 402        12.9 ... Übungen ... 402 13.  Routing-Update-Algorithmen ... 405        13.1 ... Distanzvektor-Routing-Update-Algorithmus ... 406        13.2 ... Langsames Konvergenzproblem bei Distanzvektoren ... 413        13.3 ... Minimierung der Streckenkosten ... 415        13.4 ... Schleifenfreie Distanzvektor-Algorithmen ... 418        13.5 ... Link-State-Routing-Update-Algorithmus ... 427        13.6 ... Routing nach anderen Attributen ... 432        13.7 ... ECMP ... 434        13.8 ... Epilog ... 435        13.9 ... Übungen ... 436 14.  IP-Routing im großen Maßstab ... 445        14.1 ... Classless Internet Domain Routing: CIDR ... 446        14.2 ... Hierarchisches Routing ... 449        14.3 ... Routing in früherer Zeit ... 450        14.4 ... Providerbasiertes Routing ... 451        14.5 ... Geografisches Routing ... 458        14.6 ... Epilog ... 459        14.7 ... Übungen ... 459 15.  Border Gateway Protocol (BGP) ... 465        15.1 ... AS-Pfade ... 467        15.2 ... AS-Pfade und Routenaggregation ... 469        15.3 ... Transit-Traffic ... 471        15.4 ... BGP-Filterung und Routing-Policies ... 471        15.5 ... BGP-Tabellengröße ... 474        15.6 ... BGP-Pfadattribute ... 475        15.7 ... BGP und Traffic-Engineering ... 480        15.8 ... BGP und Anycast ... 484        15.9 ... BGP für internes Routing ... 485        15.10 ... BGP-Beziehungen ... 486        15.11 ... Beispiele für BGP-Instabilität ... 492        15.12 ... BGP-Sicherheit und Route Registrys ... 494        15.13 ... Epilog ... 500        15.14 ... Übungen ... 500 16.  UDP-Übertragung ... 503        16.1 ... User Datagram Protocol -- UDP ... 503        16.2 ... Trivial File Transport Protocol, TFTP ... 520        16.3 ... Grundlegende Übertragungsprobleme ... 523        16.4 ... Weitere Anmerkungen zu TFTP ... 531        16.5 ... Remote Procedure Call (RPC) ... 534        16.6 ... Epilog ... 539        16.7 ... Übungen ... 539 17.  Grundlagen des TCP-Transports ... 545        17.1 ... Das Ende-zu-Ende-Prinzip ... 547        17.2 ... TCP-Header ... 547        17.3 ... Aufbau einer TCP-Verbindung ... 549        17.4 ... TCP und WireShark ... 555        17.5 ... TCP-Offloading ... 557        17.6 ... TCP-Simplex-Talk ... 558        17.7 ... TCP und bind() ... 563        17.8 ... TCP-Zustandsdiagramm ... 565        17.9 ... Epilog ... 572        17.10 ... Übungen ... 572 18.  TCP -- Probleme und Alternativen ... 577        18.1 ... Alte Duplikate bei TCP ... 577        18.2 ... TIMEWAIT ... 578        18.3 ... Der dreifache Handshake -- erneut betrachtet ... 580        18.4 ... Anomale TCP-Szenarien ... 583        18.5 ... Schnelleres Öffnen von TCP-Verbindungen ... 584        18.6 ... Path MTU Discovery ... 587        18.7 ... Sliding Windows bei TCP ... 587        18.8 ... Verzögerte ACKs bei TCP ... 588        18.9 ... Nagle-Algorithmus ... 589        18.10 ... Flusssteuerung bei TCP ... 590        18.11 ... Silly-Window-Syndrom ... 591        18.12 ... Zeitüberschreitung und Neuübertragung bei TCP ... 592        18.13 ... KeepAlive ... 594        18.14 ... TCP-Timer ... 594        18.15 ... Varianten und Alternativen ... 595        18.16 ... Epilog ... 608        18.17 ... Übungen ... 608 19.  TCP Reno und Überlastmanagement ... 611        19.1 ... Grundlagen des TCP-Überlastmanagements ... 612        19.2 ... Slow Start ... 618        19.3 ... TCP Tahoe und Fast-Retransmit ... 624        19.4 ... TCP Reno und Fast-Recovery ... 626        19.5 ... TCP NewReno ... 630        19.6 ... Selektive Bestätigungen (SACK) ... 632        19.7 ... TCP und Auslastung der Flaschenhalsverbindung ... 633        19.8 ... Verluste einzelner Pakete ... 638        19.9 ... Annahmen zu TCP und Skalierbarkeit ... 639        19.10 ... TCP-Parameter ... 640        19.11 ... Epilog ... 641        19.12 ... Übungen ... 641 20.  TCP-Dynamik ... 647        20.1 ... Ein erster Blick auf das Queuing ... 647        20.2 ... Flaschenhalsverbindungen mit konkurrierendem Datenverkehr ... 649        20.3 ... TCP Reno -- Fairness mit synchronisierten Verlusten ... 659        20.4 ... Epilog ... 669        20.5 ... Übungen ... 669 21.  Weitere TCP-Dynamiken ... 675        21.1 ... Begriffe der Fairness ... 675        21.2 ... TCP-Reno-Verlustrate und cwnd ... 677        21.3 ... TCP-Freundlichkeit ... 680        21.4 ... Noch einmal AIMD ... 684        21.5 ... Aktives Warteschlangenmanagement ... 686        21.6 ... Das TCP-Problem der hohen Bandbreiten ... 694        21.7 ... Das Problem der verlustbehafteten Verbindungen ... 696        21.8 ... Das Problem der Satelliten-TCP-Verbindungen ... 697        21.9 ... Epilog ... 697        21.10 ... Übungen ... 698 22.  Queuing und Scheduling ... 705        22.1 ... Queuing und Echtzeitdatenverkehr ... 706        22.2 ... Traffic-Management ... 707        22.3 ... Priority Queuing ... 708        22.4 ... Warteschlangenverfahren ... 708        22.5 ... Fair Queuing ... 710        22.6 ... Anwendungen von Fair Queuing ... 730        22.7 ... Hierarchisches Queuing ... 733        22.8 ... Hierarchical Weighted Fair Queuing ... 737        22.9 ... Epilog ... 744        22.10 ... Übungen ... 745 23.  Token-Bucket ... 749        23.1 ... Token-Bucket -- Definition ... 750        23.2 ... Token-Bucket -- Beispiele ... 753        23.3 ... Mehrere Token-Buckets ... 754        23.4 ... GCRA ... 755        23.5 ... Gewährleistung der VoIP-Bandbreite ... 757        23.6 ... Verzögerung begrenzen ... 758        23.7 ... Token-Bucket durch einen Router ... 760        23.8 ... Token-Bucket durch mehrere Router ... 761        23.9 ... Verzögerungsbedingungen ... 762        23.10 ... CBQ ... 765        23.11 ... Linux HTB ... 765        23.12 ... Parekh-Gallager Theorem ... 767        23.13 ... Epilog ... 768        23.14 ... Übungen ... 768 24.  Quality of Service ... 773        24.1 ... Netzneutralität ... 775        24.2 ... Wo die wilden Warteschlangen wohnen ... 775        24.3 ... Echtzeit-Datenverkehr ... 776        24.4 ... Integrated Services/RSVP ... 780        24.5 ... Globales IP-Multicast ... 781        24.6 ... RSVP ... 788        24.7 ... Differentiated Services ... 794        24.8 ... RED with In and Out ... 801        24.9 ... NSIS ... 801        24.10 ... Comcast-System zu Überlaststeuerung ... 802        24.11 ... Real-time Transport Protocol (RTP) ... 804        24.12 ... Multi-Protocol Label Switching (MPLS) ... 810        24.13 ... Epilog ... 814        24.14 ... Übungen ... 814 25.  Netzwerkverwaltung und SNMP ... 817        25.1 ... Netzwerkarchitektur ... 820        25.2 ... SNMP-Grundlagen ... 820        25.3 ... Namen und OIDs unter SNMP ... 823        25.4 ... MIBs ... 825        25.5 ... SNMPv1-Datentypen ... 827        25.6 ... ASN.1-Syntax und SNMP ... 828        25.7 ... SNMP-Tabellen ... 829        25.8 ... SNMP-Operationen ... 835        25.9 ... MIB-Browsing ... 841        25.10 ... MIB-2 ... 842        25.11 ... SNMPv1-Communitys und -Sicherheit ... 853        25.12 ... SNMP und die ASN.1-Kodierung ... 855        25.13 ... Übungen ... 859 26.  Die SNMP-Versionen 2 und 3 ... 863        26.1 ... SNMPv2 ... 863        26.2 ... Erstellung von Tabellenzeilen ... 879        26.3 ... SNMPv3 ... 890        26.4 ... Übungen ... 905 27.  Sicherheit ... 907        27.1 ... Einbruch mit Ausführung von Code ... 909        27.2 ... Stapelüberlauf ... 911        27.3 ... Heap-Überlauf ... 923        27.4 ... Network Intrusion Detection ... 930        27.5 ... Ziele der Kryptografie ... 932        27.6 ... Sichere Hashes ... 934        27.7 ... Verschlüsselung mit gemeinsamem Schlüssel ... 940        27.8 ... Diffie-Hellman-Merkle-Schlüsselaustausch ... 954        27.9 ... Übungen ... 959 28.  Verschlüsselung mit öffentlichem Schlüssel ... 963        28.1 ... RSA ... 963        28.2 ... Vorwärts gerichtete Geheimhaltung ... 967        28.3 ... Vertrauen und der Mann in der Mitte ... 969        28.4 ... Ende-zu-Ende-Verschlüsselung ... 970        28.5 ... SSH und TLS ... 971        28.6 ... IPsec ... 998        28.7 ... DNSSEC ... 1002        28.8 ... Beispiele mit RSA-Schlüssel ... 1016        28.9 ... Übungen ... 1020   Bibliografie ... 1023   Index ... 1033

Regulärer Preis: 59,90 €
Produktbild für Applikationsdesign mit SAP Analytics Cloud

Applikationsdesign mit SAP Analytics Cloud

Lernen Sie, wie Sie mit dem Analytics Designer maßgeschneiderte und flexible analytische Applikationen in SAP Analytics Cloud entwickeln, bereitstellen und überwachen. Die Autoren führen Sie durch die einzelnen Schritte der Anwendungsentwicklung und zeigen Ihnen, wie Sie die Applikationen an die Bedürfnisse der Anwender*innen anpassen. Aus dem Inhalt: ArchitekturDatenmodellierung und -anbindungEntwicklungsumgebungSkripte und WizardsBI-ApplikationenPlanungsapplikationenPredictive AnalysisStandard- und Custom Widgets   Materialien zum Buch ... 25   Geleitwort des Fachgutachters ... 27   1.  Netzwerke im Überblick ... 29        1.1 ... Schichten ... 29        1.2 ... Datenrate, Durchsatz und Bandbreite ... 30        1.3 ... Pakete ... 31        1.4 ... Datagrammweiterleitung ... 33        1.5 ... Topologie ... 37        1.6 ... Routing-Schleifen ... 38        1.7 ... Überlast ... 40        1.8 ... Mehr über Pakete ... 41        1.9 ... LANs und Ethernet ... 42        1.10 ... IP -- Internet Protocol ... 45        1.11 ... DNS ... 54        1.12 ... Transport ... 55        1.13 ... Firewalls ... 61        1.14 ... Einige nützliche Dienstprogramme ... 63        1.15 ... IETF und OSI ... 65        1.16 ... Berkeley Unix ... 69        1.17 ... Epilog ... 70        1.18 ... Übungen ... 70   2.  Ethernet-Grundlagen ... 75        2.1 ... Klassisches 10-Mbit/s-Ethernet ... 76        2.2 ... 100 Mbit/s (Fast) Ethernet ... 93        2.3 ... Gigabit-Ethernet ... 95        2.4 ... Ethernet-Switches ... 96        2.5 ... Epilog ... 101        2.6 ... Übungen ... 102   3.  Weiterführende Ethernet-Themen ... 107        3.1 ... Spanning-Tree-Algorithmus und Redundanz ... 108        3.2 ... Virtuelles LAN (VLAN) ... 114        3.3 ... TRILL und SPB ... 119        3.4 ... Software-Defined Networking ... 122        3.5 ... Epilog ... 132        3.6 ... Übungen ... 132   4.  Drahtlose LANs ... 137        4.1 ... Abenteuer im Funkland ... 137        4.2 ... Wi-Fi ... 143        4.3 ... WiMAX und LTE ... 182        4.4 ... Ortsfeste Drahtlosnetzwerke ... 188        4.5 ... Epilog ... 190        4.6 ... Übungen ... 191   5.  Sonstige LAN-Technologien ... 195        5.1 ... Virtuelle private Netzwerke ... 195        5.2 ... Carrier-Ethernet ... 197        5.3 ... Token Ring ... 198        5.4 ... Virtuelle Verbindungen ... 200        5.5 ... Asynchronous Transfer Mode: ATM ... 204        5.6 ... Epilog ... 208        5.7 ... Übungen ... 208   6.  Verbindungen ... 213        6.1 ... Kodierung und Frames ... 213        6.2 ... Zeitmultiplexverfahren ... 220        6.3 ... Epilog ... 227        6.4 ... Übungen ... 227   7.  Pakete ... 229        7.1 ... Paketverzögerung ... 229        7.2 ... Schwankungen der Paketverzögerung ... 233        7.3 ... Paketgröße ... 234        7.4 ... Fehlererkennung ... 237        7.5 ... Epilog ... 245        7.6 ... Übungen ... 245   8.  Sliding Windows ... 251        8.1 ... Zuverlässige Datenübertragung: Stop-and-Wait ... 251        8.2 ... Die Sliding-Windows-Strategie ... 256        8.3 ... Lineare Flaschenhälse ... 261        8.4 ... Epilog ... 271        8.5 ... Übungen ... 271   9.  IP Version 4 ... 277        9.1 ... Der IPv4-Header ... 279        9.2 ... Schnittstellen ... 282        9.3 ... Spezielle Adressen ... 284        9.4 ... Fragmentierung ... 287        9.5 ... Der klassenlose IP-Delivery-Algorithmus ... 290        9.6 ... IPv4-Subnetze ... 294        9.7 ... Netzwerkadressübersetzung ... 302        9.8 ... Unnummerierte Schnittstellen ... 309        9.9 ... Mobile IP ... 311        9.10 ... Epilog ... 313        9.11 ... Übungen ... 313 10.  IPv4-Begleitprotokolle ... 317        10.1 ... DNS ... 317        10.2 ... Address Resolution Protocol: ARP ... 336        10.3 ... Dynamic Host Configuration Protocol (DHCP) ... 341        10.4 ... Internet Control Message Protocol ... 343        10.5 ... Epilog ... 349        10.6 ... Übungen ... 349 11.  IPv6 ... 351        11.1 ... Der IPv6-Header ... 352        11.2 ... IPv6-Adressen ... 353        11.3 ... Netzwerkpräfixe ... 358        11.4 ... IPv6-Multicast ... 359        11.5 ... IPv6-Erweiterungsheader ... 360        11.6 ... Nachbarschaftserkennung (Neighbor Discovery) ... 364        11.7 ... Zuweisung von IPv6-Hostadressen ... 371        11.8 ... Epilog ... 378        11.9 ... Übungen ... 378 12.  Weitere IPv6-Funktionen ... 381        12.1 ... Weltweit sichtbare Adressen ... 381        12.2 ... ICMPv6 ... 382        12.3 ... IPv6-Subnetze ... 384        12.4 ... IPv6 und IPv4 gemeinsam benutzen ... 386        12.5 ... IPv6-Beispiele ohne Router ... 392        12.6 ... IPv6-Konnektivität über Tunneling ... 395        12.7 ... Konnektivität von IPv6 nach IPv4 ... 400        12.8 ... Epilog ... 402        12.9 ... Übungen ... 402 13.  Routing-Update-Algorithmen ... 405        13.1 ... Distanzvektor-Routing-Update-Algorithmus ... 406        13.2 ... Langsames Konvergenzproblem bei Distanzvektoren ... 413        13.3 ... Minimierung der Streckenkosten ... 415        13.4 ... Schleifenfreie Distanzvektor-Algorithmen ... 418        13.5 ... Link-State-Routing-Update-Algorithmus ... 427        13.6 ... Routing nach anderen Attributen ... 432        13.7 ... ECMP ... 434        13.8 ... Epilog ... 435        13.9 ... Übungen ... 436 14.  IP-Routing im großen Maßstab ... 445        14.1 ... Classless Internet Domain Routing: CIDR ... 446        14.2 ... Hierarchisches Routing ... 449        14.3 ... Routing in früherer Zeit ... 450        14.4 ... Providerbasiertes Routing ... 451        14.5 ... Geografisches Routing ... 458        14.6 ... Epilog ... 459        14.7 ... Übungen ... 459 15.  Border Gateway Protocol (BGP) ... 465        15.1 ... AS-Pfade ... 467        15.2 ... AS-Pfade und Routenaggregation ... 469        15.3 ... Transit-Traffic ... 471        15.4 ... BGP-Filterung und Routing-Policies ... 471        15.5 ... BGP-Tabellengröße ... 474        15.6 ... BGP-Pfadattribute ... 475        15.7 ... BGP und Traffic-Engineering ... 480        15.8 ... BGP und Anycast ... 484        15.9 ... BGP für internes Routing ... 485        15.10 ... BGP-Beziehungen ... 486        15.11 ... Beispiele für BGP-Instabilität ... 492        15.12 ... BGP-Sicherheit und Route Registrys ... 494        15.13 ... Epilog ... 500        15.14 ... Übungen ... 500 16.  UDP-Übertragung ... 503        16.1 ... User Datagram Protocol -- UDP ... 503        16.2 ... Trivial File Transport Protocol, TFTP ... 520        16.3 ... Grundlegende Übertragungsprobleme ... 523        16.4 ... Weitere Anmerkungen zu TFTP ... 531        16.5 ... Remote Procedure Call (RPC) ... 534        16.6 ... Epilog ... 539        16.7 ... Übungen ... 539 17.  Grundlagen des TCP-Transports ... 545        17.1 ... Das Ende-zu-Ende-Prinzip ... 547        17.2 ... TCP-Header ... 547        17.3 ... Aufbau einer TCP-Verbindung ... 549        17.4 ... TCP und WireShark ... 555        17.5 ... TCP-Offloading ... 557        17.6 ... TCP-Simplex-Talk ... 558        17.7 ... TCP und bind() ... 563        17.8 ... TCP-Zustandsdiagramm ... 565        17.9 ... Epilog ... 572        17.10 ... Übungen ... 572 18.  TCP -- Probleme und Alternativen ... 577        18.1 ... Alte Duplikate bei TCP ... 577        18.2 ... TIMEWAIT ... 578        18.3 ... Der dreifache Handshake -- erneut betrachtet ... 580        18.4 ... Anomale TCP-Szenarien ... 583        18.5 ... Schnelleres Öffnen von TCP-Verbindungen ... 584        18.6 ... Path MTU Discovery ... 587        18.7 ... Sliding Windows bei TCP ... 587        18.8 ... Verzögerte ACKs bei TCP ... 588        18.9 ... Nagle-Algorithmus ... 589        18.10 ... Flusssteuerung bei TCP ... 590        18.11 ... Silly-Window-Syndrom ... 591        18.12 ... Zeitüberschreitung und Neuübertragung bei TCP ... 592        18.13 ... KeepAlive ... 594        18.14 ... TCP-Timer ... 594        18.15 ... Varianten und Alternativen ... 595        18.16 ... Epilog ... 608        18.17 ... Übungen ... 608 19.  TCP Reno und Überlastmanagement ... 611        19.1 ... Grundlagen des TCP-Überlastmanagements ... 612        19.2 ... Slow Start ... 618        19.3 ... TCP Tahoe und Fast-Retransmit ... 624        19.4 ... TCP Reno und Fast-Recovery ... 626        19.5 ... TCP NewReno ... 630        19.6 ... Selektive Bestätigungen (SACK) ... 632        19.7 ... TCP und Auslastung der Flaschenhalsverbindung ... 633        19.8 ... Verluste einzelner Pakete ... 638        19.9 ... Annahmen zu TCP und Skalierbarkeit ... 639        19.10 ... TCP-Parameter ... 640        19.11 ... Epilog ... 641        19.12 ... Übungen ... 641 20.  TCP-Dynamik ... 647        20.1 ... Ein erster Blick auf das Queuing ... 647        20.2 ... Flaschenhalsverbindungen mit konkurrierendem Datenverkehr ... 649        20.3 ... TCP Reno -- Fairness mit synchronisierten Verlusten ... 659        20.4 ... Epilog ... 669        20.5 ... Übungen ... 669 21.  Weitere TCP-Dynamiken ... 675        21.1 ... Begriffe der Fairness ... 675        21.2 ... TCP-Reno-Verlustrate und cwnd ... 677        21.3 ... TCP-Freundlichkeit ... 680        21.4 ... Noch einmal AIMD ... 684        21.5 ... Aktives Warteschlangenmanagement ... 686        21.6 ... Das TCP-Problem der hohen Bandbreiten ... 694        21.7 ... Das Problem der verlustbehafteten Verbindungen ... 696        21.8 ... Das Problem der Satelliten-TCP-Verbindungen ... 697        21.9 ... Epilog ... 697        21.10 ... Übungen ... 698 22.  Queuing und Scheduling ... 705        22.1 ... Queuing und Echtzeitdatenverkehr ... 706        22.2 ... Traffic-Management ... 707        22.3 ... Priority Queuing ... 708        22.4 ... Warteschlangenverfahren ... 708        22.5 ... Fair Queuing ... 710        22.6 ... Anwendungen von Fair Queuing ... 730        22.7 ... Hierarchisches Queuing ... 733        22.8 ... Hierarchical Weighted Fair Queuing ... 737        22.9 ... Epilog ... 744        22.10 ... Übungen ... 745 23.  Token-Bucket ... 749        23.1 ... Token-Bucket -- Definition ... 750        23.2 ... Token-Bucket -- Beispiele ... 753        23.3 ... Mehrere Token-Buckets ... 754        23.4 ... GCRA ... 755        23.5 ... Gewährleistung der VoIP-Bandbreite ... 757        23.6 ... Verzögerung begrenzen ... 758        23.7 ... Token-Bucket durch einen Router ... 760        23.8 ... Token-Bucket durch mehrere Router ... 761        23.9 ... Verzögerungsbedingungen ... 762        23.10 ... CBQ ... 765        23.11 ... Linux HTB ... 765        23.12 ... Parekh-Gallager Theorem ... 767        23.13 ... Epilog ... 768        23.14 ... Übungen ... 768 24.  Quality of Service ... 773        24.1 ... Netzneutralität ... 775        24.2 ... Wo die wilden Warteschlangen wohnen ... 775        24.3 ... Echtzeit-Datenverkehr ... 776        24.4 ... Integrated Services/RSVP ... 780        24.5 ... Globales IP-Multicast ... 781        24.6 ... RSVP ... 788        24.7 ... Differentiated Services ... 794        24.8 ... RED with In and Out ... 801        24.9 ... NSIS ... 801        24.10 ... Comcast-System zu Überlaststeuerung ... 802        24.11 ... Real-time Transport Protocol (RTP) ... 804        24.12 ... Multi-Protocol Label Switching (MPLS) ... 810        24.13 ... Epilog ... 814        24.14 ... Übungen ... 814 25.  Netzwerkverwaltung und SNMP ... 817        25.1 ... Netzwerkarchitektur ... 820        25.2 ... SNMP-Grundlagen ... 820        25.3 ... Namen und OIDs unter SNMP ... 823        25.4 ... MIBs ... 825        25.5 ... SNMPv1-Datentypen ... 827        25.6 ... ASN.1-Syntax und SNMP ... 828        25.7 ... SNMP-Tabellen ... 829        25.8 ... SNMP-Operationen ... 835        25.9 ... MIB-Browsing ... 841        25.10 ... MIB-2 ... 842        25.11 ... SNMPv1-Communitys und -Sicherheit ... 853        25.12 ... SNMP und die ASN.1-Kodierung ... 855        25.13 ... Übungen ... 859 26.  Die SNMP-Versionen 2 und 3 ... 863        26.1 ... SNMPv2 ... 863        26.2 ... Erstellung von Tabellenzeilen ... 879        26.3 ... SNMPv3 ... 890        26.4 ... Übungen ... 905 27.  Sicherheit ... 907        27.1 ... Einbruch mit Ausführung von Code ... 909        27.2 ... Stapelüberlauf ... 911        27.3 ... Heap-Überlauf ... 923        27.4 ... Network Intrusion Detection ... 930        27.5 ... Ziele der Kryptografie ... 932        27.6 ... Sichere Hashes ... 934        27.7 ... Verschlüsselung mit gemeinsamem Schlüssel ... 940        27.8 ... Diffie-Hellman-Merkle-Schlüsselaustausch ... 954        27.9 ... Übungen ... 959 28.  Verschlüsselung mit öffentlichem Schlüssel ... 963        28.1 ... RSA ... 963        28.2 ... Vorwärts gerichtete Geheimhaltung ... 967        28.3 ... Vertrauen und der Mann in der Mitte ... 969        28.4 ... Ende-zu-Ende-Verschlüsselung ... 970        28.5 ... SSH und TLS ... 971        28.6 ... IPsec ... 998        28.7 ... DNSSEC ... 1002        28.8 ... Beispiele mit RSA-Schlüssel ... 1016        28.9 ... Übungen ... 1020   Bibliografie ... 1023   Index ... 1033

Regulärer Preis: 89,90 €
Produktbild für Getting Started with Visual Studio 2022

Getting Started with Visual Studio 2022

Learn how to use the features of Visual Studio 2022 and utilize the IDE correctly to make it your one-stop solution for creating quality code. Learn what's new in VS 2022 and explore the existing features of Visual Studio so you can become a more efficient programmer.This revised edition covers the latest features of Visual Studio 2022 and how to use them. The book includes new topics like Subword Navigation, Multi-caret Editing, how to enable Code Cleanup on Save, using breakpoints, and new debugging features such as temporary breakpoints and dependent breakpoints. The book also looks at some of the new Git features such as Multi-repo Support, Comparing Branches, Checkout Commit, and line Staging.Getting Started with Visual Studio 2022 begins with an overview of Visual Studio and explores features such as Visual Studio Live Share, Visual Studio Search, Solution Filters, and Intellicode. The author also provides a look at the different Visual Studio project templates and shows you how to create code snippets, as well as how to manage NuGet and nmp packages. You will also see how to create a cross-platform MAUI application as well as how to use SQLite in an MAUI application. Moving ahead, you will learn how to debug your code using breakpoints to step into specific methods, use data tips, and utilize the Debugger Display attribute. You will then move on to learn unit testing and explore the tools provided by Visual Studio to create and run unit tests. The book also covers source control integration in Visual Studio and how to use GitHub to implement a source control strategy for your projects.WHAT YOU WILL LEARN* Create and use code snippets in Visual Studio 2022* Use the new debugging features in Visual Studio* Utilize diagnostic tools and the Immediate window for code debugging* Generate unit tests with IntelliTest* Harness the new Git features in Visual Studio to make managing source code easier* Work with MAUI appsWHO THIS BOOK IS FORBeginners and software developers working on the .NET stack.DIRK STRAUSS has over 17 years of experience programming with C# and Visual Studio. Working for various companies throughout his career, he has been privileged to work with and learn from some of the most brilliant developers in the industry. He has authored several books on topics ranging from Visual Studio and C# to ASP.NET Core. Passionate about writing code, he loves learning new tech and imparting what he learns to others.CHAPTER 1: GETTING TO KNOW VISUAL STUDIO 2022- Installing Visual Studio- Visual Studio 2022 System Requirements- Visual Studio is 64-bit- Full .NET 6.0 Support- Using Workloads- Exploring the IDE- The Solution Explorer- Toolbox- The Code Editor- New Razor Editor- Hot Reload- Navigating Code- Navigate Forward and Backward Commands- Navigation Bar- Find All References- Find Files Faster- Reference Highlighting- Go To Commands- Go To Definition- Peek Definition- Subword Navigation- Features and Productivity Tips- Track Active Item in Solution Explorer- Hidden Editor Context Menu- Open in File Explorer- Finding Keyboard Shortcut Mappings- Clipboard History- Go To Window- Navigate to Last Edit Location- Multi-caret Editing- Sync Namespaces to Match Your Folder Structure- Paste JSON as Classes- Enable Code Cleanup on Save- Add Missing Using on Paste- Features in Visual Studio 2022- Visual Studio Search- Solution Filters- Visual Studio IntelliCode- Whole Line Completions- Quick Actions- Visual Studio Live ShareCHAPTER 2: WORKING WITH VISUAL STUDIO 2022- Visual Studio Project Types- Various Project Templates - MAUI- Creating a MAUI Application- Consuming REST Services in MAUI- Using SQLite in a MAUI app- Managing NuGet Packages- Using NuGet in Visual Studio- Hosting Your Own NuGet Feeds- Managing nmp Packages- Creating Project Templates- Creating and Using Code Snippets- Creating Code Snippets- Using Bookmarks and Code Shortcuts- Bookmarks- Code Shortcuts- Adding Custom Tokens- The Server Explorer- Running SQL Queries- Visual Studio Windows- C# Interactive- Code Metrics Results- Send Feedback- Personalising Visual Studio- Document Management Customisations- Visual Studio ThemesCHAPTER 3: DEBUGGING YOUR CODE- Working with Breakpoints- Setting a Breakpoint- Conditional Breakpoints and Actions- Temporary Breakpoints- Dependant Breakpoints- Dragging Breakpoints- Force Run to Cursor- Manage Breakpoints with Labels- Exporting Breakpoints- Using DataTips- Visualizing Complex Data Types- Using the Watch Window- The DebuggerDisplay Attribute- Evaluate Functions Without Side Effects- Format Specifiers- Diagnostic Tools- CPU Usage- Memory Usage- The Events View- The Right Tool for the Right Project Type- Immediate Window- Attaching to a Running Process- Attach to a Remote Process- Reattaching to a Process- Remote Debugging- System Requirements- Download and Install Remote Tools- Running Remote Tools- Start Remote DebuggingCHAPTER 4: UNIT TESTING- Creating and Running Unit Tests- Create and Run a Test Playlist- Testing Timeouts- Using Live Unit Tests- Using IntelliTest to Generate Unit Tests- Focus IntelliTest Code Exploration- How to Measure Code Coverage in Visual StudioCHAPTER 5: SOURCE CONTROL- Create a GitHub Account- Create and Clone a Repository- Cloning a Repository- Create a Branch from Your Code- Creating and Handling Pull Requests- Working with Stashes- Multi-repo Support- Git Commit Graph- Compare Branches- Checkout Commit- Multi-repo Branching- Line Staging

Regulärer Preis: 56,99 €
Produktbild für Technik der IP-Netze

Technik der IP-Netze

- Umfassende Informationen – das lückenlose Standardwerk zu den Prinzipien der Kommunikation im Internet mit über 700 Bildern.- Ausgewogenheit von Theorie und Praxis – technische Aspekte der IP-Netze werden detailliert und zugleich praxisorientiert dargestellt.- Aktuell und zukunftsweisend – die präsentierten Themen vertiefen die aktuellen Trends der Internettechnik und -sicherheit sowie zukünftige Anforderungen.- Neu in der 5. Auflage: Zeitsynchronisation in Netzen und Überblick über das QUIC-Protokoll- Ihr exklusiver Vorteil: E-Book inside beim Kauf des gedruckten BuchesIn IP-Netzen laufen komplexe Vorgänge bei der Übermittlung von Daten in Form von IP-Paketen ab. Das massive Internet-Wachstum und die dabei entstandenen Anforderungen haben zu zahlreichen Weiterentwicklungen geführt – hervorzuheben sind u. a. das Internetprotokoll IPv6, die Techniken MPLS und GMPLS, mehrere Arten von Virtual Networks, Distributed Layer 2 / 3 Switching und Internet of Things.Dieses Buch enthält eine systematische Darstellung der TCP / IP-Protokollfamilie sowie von Routing-Prinzipien in klassischen IP- wie auch in IPv6-Netzen.Es erläutert außerdem die Konzepte zum Aufbau von IP-Netzen auf Basis unterschiedlicher Netztechnologien (speziell Virtual Networks) sowie zur Unterstützung der Mobilität. Zudem enthält es eine umfangreiche Darstellung der technologischen Grundlagen des Internet of Things.Das Buch eignet sich nicht nur als Lehrbuch für Studierende unterschiedlicher Fachrichtungen und für Neueinsteiger:innen, sondern auch als Nachschlagewerk für Praktiker:innen. Im Buch sind die relevanten Quellen ins Internet verlinkt, sodass es sich auch als »Informations-Hub« für das Selbststudium einsetzen lässt.AUS DEM INHALT //- Netzwerkgrundlagen und IT-Security; Protokolle: IPv4, ICMP, IGMP, TCP, UDP, SCTP, QUIC- Netzdienst-Protokolle: DNS, DHCP, NAT, IPsec, TLS (1.3)- Protokolle für die Echtzeitkommunikation: RTP, RTCP, SIP, SDP, NTP, PTP- IPv6-Support-Protokolle: ICMPv6, NDP, DHCPv6- Migration zu IPv6: 6to4, 6rd, ISATAP, NAT64 und Translation IPv4 IPv6- Routing-Protokolle: RIP, OSPF und BGP-4; Multicast-Routing nach PIM und MSDP- IP-Netze mit MPLS, GMPLS und Traffic Engineering- VPNs, Mobility Support und Distributed Layer 2/3 Switching- Internet of Things mit 6loWPAN, RPL und CoAP Prof. Dr.-Ing. Anatol Badach ist ehemaliger Professor im FB Angewandte Informatik der Hochschule Fulda. Seine Schwerpunkte sind Netzwerktechnologien und -protokolle, VoIP, Next Generation Networking sowie Internet of Things.Prof. Dr. Erwin Hoffmann ist Vertretungs-Professor für Informatik an der Frankfurt University of Applied Sciences. Schwerpunkte sind Netzwerke, verteilte Systeme sowie IT-Security und ihre Implementierung.

Regulärer Preis: 69,99 €
Produktbild für Ansible for VMware by Examples

Ansible for VMware by Examples

Learn to use the Ansible open source IT automation tool to automate your VMware infrastructure. This book contains all of the obvious and not-so-obvious best practices of Ansible automation. Each lesson summarizes a specific use case for the modern VMware infrastructure and is focused on a single module from the most important parameter, including live demo of code and real-life usage.You'll configure the Ansible Controller to interact with VMware infrastructure using the “community.VMware” Ansible documentation collection and the appropriate Python libraries. Next, learn how to automate the creation of a virtual machine manually and from a template, start and stop using the shutdown and forced-power off a Virtual Machine, take and delete and snapshot, add a new hard disk and expand a currently attached hard disk, as well as gather information for data centers, clusters, host systems, and virtual machines.By the end of this book, you'll be well-versed in efficiently maintaining a VMware infrastructure with Ansible Automation. You'll also be able to save time and reduce manual errors using simple human-readable automation technology.WHAT YOU'LL LEARN* Automate your VMware infrastructure using Ansible code* Install Ansible in operating systems such as RedHat, Ubuntu, Fedora, etc.* Write and execute your first Ansible Playbook code * Troubleshoot the most common error messagesWHO THIS BOOK IS FORIT professionals of every industry who would like a jargon-free understanding of Ansible technology, including VMware, Linux, and Windows Systems Administrators, DevOps professionals, thought leaders, and infrastructure-as-code enthusiasts.Luca Berton is an Ansible Automation Engineer of Red Hat, based in Brno - Czech Republic. With more than 15 years of experience as a System Administrator, he has strong expertise in Infrastructure Hardening and Automation. Enthusiast of the Open Source supports the community sharing his knowledge in different events of public access. Geek by nature, Linux by choice, Fedora of course.Chapter 1: Ansible For Beginners With ExamplesCHAPTER GOAL: Description of the Ansible Technology and how to write and execute your first Ansible Playbook code.NO OF PAGES: 5 0SUB - TOPICS* What is AnsibleGetting Started * Inventory* Playbook* Variables, Fact and Magic Variables* Vault* Conditional and LoopHandler * Role* Ansible Best PracticesChapter 2: Install AnsibleCHAPTER GOAL: How to install Ansible in the most common Operating System step by stepNO OF PAGES : 20SUB - TOPICS:* ansible community vs ansible-core packages * Ansible installation in RedHat Enterprise Linux (RHEL) 8 * Ansible installation in Ubuntu 22.04 LTS * Ansible installation in Fedora 36 * Ansible installation in CentOS 9 Stream * Ansible installation in Windows * Ansible installation in SUSE SLES (Linux Enterprise Server) 15 Ansible installation with PIPAnsible installation in RedHat Enterprise Linux (RHEL) 9* Ansible installation in Amazon Linux 2 (AWS EC2) * Ansible installation in Debian 11 Chapter 3: Ansible For VMwareCHAPTER GOAL: How to automate your VMware infrastructure using Ansible code and troubleshoot the most common error messagesNO OF PAGES: 70SUB - TOPICS:* Configure Ansible For VMware Configure a Python Virtual Environment for Ansible VMwareAnsible troubleshooting - VMware f ailed to Import PyVmomi * Ansible troubleshooting - VMware Unknown error while connecting to vCenter or ESXi * Ansible troubleshooting - VMware certificate verify failed connecting to vCenter or ESXi* Create a VMware virtual machine * Deploy a VMware virtual machine from a template * Start a VMware virtual machine * Stop a VMware virtual machine * Take a VMware virtual machine snapshot * Delete a VMware virtual machine snapshot * Add a new hard disk to VMware virtual machine * Expand a virtual disk in VMware virtual machine * Gather VMware Hosts information of a cluster* Get VMware virtual machine UUID* Ansible Dynamic Inventory For VMware* Get VMware vSphere Virtual Machine Running Host* Get VMware datastore status* Upload a file to the VMware datastore* Get VMware Guest Tools status* Upgrade VMware Guest Tools* Live Migration of a VMware Virtual Machine using vMotion* Change the boot devices order of a VMware virtual machineChapter 4: Conclusion

Regulärer Preis: 62,99 €
Produktbild für Introducing Cisco Unified Computing System

Introducing Cisco Unified Computing System

The Cisco Unified Computing System (UCS) can be found in the majority of data centers across the world. However, getting hands-on practice to learn this infrastructure can be difficult, as many companies will push to have it production-ready as soon as possible. Home-labs are also cost-prohibitive, cumbersome, electricity-hungry, and noisy.So, how do you get hands-on experience? With Unified Computing System Platform Emulator (UCSPE) and this book. UCSPE is free and can run on a laptop. Using it along with this book, you will learn how to set up, manage and troubleshoot a UCS, including the fabric interconnects, chassis and IOMs, and servers through the GUI and the CLI. All from the comfort of your own home. Introducing Cisco Unified Computing System will show you how to set up a UCS (comparing the UCSPE to a real-world deployment), customize the hardware, configure the UCS system, and secure it.You'll start by creating an organization and then the policies to control storage, networking, boot options, maintenance policies, and server pools. Once you have the required policies you'll use them to create service profiles (using the policies) and templates and assign these to the blade and rack-mount servers in the virtual environment. You'll also be looking at real-life scenarios such as upgrades (and downgrades), northbound networking, and Storage Area Networking (SAN) connectivity. Using the GUI and the CLI you'll look at real-world examples that data center engineers may encounter.WHAT YOU'LL LEARN* Set up the Cisco UCSPE on VMWare* Create UCS service profiles* Secure the UCS system* Troubleshoot the UCSWHO THIS BOOK IS FORDatacenter and network engineers and individuals studying for the CCNA and CCNP Cisco data center qualification.STUART FORDHAM, CCIE 49337, is the Network Manager and Infrastructure Team Leader for SmartCommunications SC Ltd, which is the only provider of a cloud-based, next-generation customer communications platform. Stuart has written a series of books on SD-WAN, BGP, MPLS, VPNs, and NAT, as well as a CCNA study guide and a Cisco ACI Cookbook. He lives in the UK with his wife and twin sons.Chapter 1: Setting up UCSPE ( Cisco UCS Platform Emulator)CHAPTER GOAL: TO SET UP UCSPENO OF PAGES 20SUB -TOPICS1. Downloading UCSPE2. Importing UCSPE into VMWare3. Starting UCSPE4. Real-world UCS setupChapter 2: The hardware chapterCHAPTER GOAL: AN EXPLANATION OF THE DIFFERENT HARDWARE THAT MAKES UP A UCS (Cisco Unified Computing System)NO OF PAGES: 20SUB - TOPICS1. The Fabric Interconnect2. Chassis and IOMs3. FEX4. Blade servers5. Rackmount serversChapter 3: Northbound Networking and SANCHAPTER GOAL: TO UNDERSTAND THE UCS IN RELATION TO THE REST OF THE NETWORKNO OF PAGES: 10SUB - TOPICS1. Physical connectivity and port-channels2. VLANsChapter 4: PoliciesCHAPTER GOAL: TO CREATE THE POLICIES WE NEED FOR CHAPTER 4NO OF PAGES : 20SUB - TOPICS:1. Policies2. Storage Policies3. Dynamic vNIC connection policies3. vNIC/vHBA Placementpolicies4. vMedia policies5. Server boot policies6. Maintenance Policies7. Server Pool policies8. Operation policiesChapter 5: Service Profiles and TemplatesCHAPTER GOAL: TO USE THE POLICIES WE HAVE TO CREATE SERVICE PROFILES AND ASSIGN THEM TO OUR SERVERSNO OF PAGES: 30SUB - TOPICS:1. Creating an Organization2. Creating a Service Profile Template3. Creating a Service Profile from a template4. Assigning templatesChapter 6: UCS SecurityCHAPTER GOAL: TO SECURE OUR UCS ENVIRONMENTNO OF PAGES: 20SUB - TOPICS1. AAA2. Hardening the web interface3. Hardening SSHChapter 7: TroubleshootingCHAPTER GOAL: TO SECURE OUR UCS ENVIRONMENTNO OF PAGES: 20SUB - TOPICS1. Error messages2. SNMP3. Call-home

Regulärer Preis: 56,99 €
Produktbild für Creating Business Applications with Microsoft 365

Creating Business Applications with Microsoft 365

Learn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You’ll work with an extended example that shows how to use Power Apps and SharePoint together to create your own help ticketing system.This book offers a deep dive into Power BI, including working with JSON, XML, and Yes/No data, as well as visualizing learning data and using it to detect inconsistencies between Excel files. You’ll also see how to connect to Remedy and to the help system you will have created. Under author Jeffrey Rhodes’s guidance, you’ll delve into the Power Apps collection to learn how to avoid dreaded "delegation" issues with larger data sets. Back on applications, you will create a training class sign-up solution to only allow users to choose classes with available seats. Digging deeper into Teams, you’ll learn how to send chats, posts, and "adaptive cards" from Power Automate. Rounding things out, you’ll save Forms attachments to SharePoint with Power Automate, create your own "Employee Recognition" app with all of the Power Platform and Teams, add or edit weekly status reports, and learn how to create reservation and scoring applications.After reading the book, you will be able to build powerful applications using Power Apps, Power Automate, Power BI, SharePoint, Forms, and Teams.WHAT YOU WILL LEARN* Create productivity-enhancing applications with Power Apps, Power Automate, SharePoint, Forms, and/or Teams* Transform and visualize data with Power BI to include custom columns, measures, and pivots* Avoid delegation issues and tackle complicated Power Apps issues like complex columns, filtering, and ForAll loops* Build scheduled or triggered Power Automate flows to schedule Teams Meetings, send emails, launch approvals, and much moreWHO THIS BOOK IS FORBusiness and application developers. JEFFREY RHODES is a founder and Chief Technical Officer of Platte Canyon Multimedia Software Corporation, a leader in developing commercial e-learning software. He graduated at the top of his class at the Air Force Academy, where he earned a bachelor's degree in electrical engineering. Jeff received a master’s degree in economics from the London School of Economics, which he attended under a British Marshall Scholarship. He is the author of Creating Business Applications with Office 365: Techniques in SharePoint, PowerApps, Power BI, and More, Programming for e-Learning Developers: ToolBook, Flash, JavaScript, and Silverlight, VBTrain.Net: Creating Computer and Web Based Training with Visual Basic .NET. He also co-wrote The ToolBook Companion. He lives in Colorado Springs with his wife Sue and is the proud father of his sons Derek and Michael.CHAPTER 1. PROGRAMMING IN THE POWER PLATFORMIn this chapter, we will cover the basics of programming: properties, methods, and events. We will then look at how their implementation differs between in each of the Power Platform applications compared with traditional environments like .NET (Windows Forms and ASP.NET) and JavaScript. For Power Apps, we will see how you can set the properties of other objects directly but instead need to make the value of what you want to change (such as the text of a button) a variable and then change the value of that variable elsewhere in the application. We will also explore its Visual Basic-like syntax. In Power Automate, we will look at the different types of actions (variables, loop, parallel branches, conditions, etc.). Finally, in Power BI we will look at the Power Query M formula language.CHAPTER 2. UPDATING A SHAREPOINT LIST USING POWER APPSCHAPTER 3. CREATING AN APPROVAL PROCESS WITH POWER AUTOMATECHAPTER 4. CREATING A SURVEY RESPONSE DASHBOARD WITH MICROSOFT POWER BICHAPTER 5. CREATING A SURVEY SOLUTION WITH MICROSOFT FORMS, FLOW, SHAREPOINT, AND POWER BICHAPTER 6. POWER BI CHALLENGES WITH JSON, XML, AND YES/NO DATACHAPTER 7. POWER BI CASE STUDY: MONITORING BMC REMEDY HELP TICKETSCHAPTER 8. BUILDING A HELP TICKETING SYSTEM IN POWERAPPS AND SHAREPOINT – NEW TICKET FORMCHAPTER 9. CONTINUING THE HELP TICKETING SYSTEM – TECHNICIAN FORMCHAPTER 10. USING POWER BI FOR THE HELP TICKETING SYSTEMCHAPTER 11. OVERCOMING POWER APPS DELEGATION ISSUES WITH SHAREPOINT DATA SOURCESIn this chapter, we look at how to use the technique described in https://tinyurl.com/twzvbgl to overcome delegation limits in Power Apps using a SharePoint data source. We also implement a corresponding Power Automate Flow to copy the ID value to a numeric column each time we create a record.CHAPTER 12. CREATING A CLASS SIGN-UP SOLUTION IN SHAREPOINT AND POWER APPSCHAPTER 13. VISUALIZING LEARNING MANAGEMENT DATA FROM SQL SERVER USING POWER BIThis chapter gives several examples of connecting to multiple tables in a SQL Server database in order to visualize test score, completion, assignments and similar learning management data. It demonstrates custom columns, merging tables, slicers, and much more.CHAPTER 14. DYNAMIC INFORMATION IN POWER APPS AND SENDING AN ADAPTIVE CARD TO TEAMS USING POWER AUTOMATEIn this chapter, we create linked SharePoint lists that display status levels, colors, and associated steps. We then read these lists from PowerApps to create a status display that we display in a tab in Teams. Finally, we create a Power Automate flow so that each time the status changes, we automatically post that to our Teams channel.CHAPTER 15. DYNAMICALLY SETTING OBJECT PROPERTIES IN POWER APPS BASED ON A SHAREPOINT LISTIn this chapter, we explore how to approximate dynamic object references/reflection in Power Apps. We take an "Actions" list in SharePoint and use it to set Text, Tooltip, and Visible properties of each corresponding button in Power Apps.CHAPTER 16. UPLOADING FILES FROM POWERAPPS TO SHAREPOINT AND EMAILING LINKS USING POWER AUTOMATEIn this chapter, we see how to upload multiple attachments from Power Apps to a SharePoint document library using Power Automate. While we are in Power Automate, we create an email of links to these documents and email it to the designated recipient.CHAPTER 17. WORKING WITH SHAREPOINT LOOKUP COLUMNS IN POWER BIIn this chapter, we explore how to use the FieldValuesAsText functionality in Power BI to get the data from within a SharePoint Lookup column. We also explore creating custom columns and filtering by Content Type.CHAPTER 18. JOINING SHAREPOINT/EXCEL TABLES IN POWER BIThis chapter shows two different examples on how to join data in Power BI to make effective visualizations. The first example shows how to access lookup columns in SharePoint lists by doing a join on the lists once you bring them into Power BI. The second one is an extended example on how to verify data between two Excel spreadsheets that share a common value. We first show how to accomplish the task with Microsoft Access with a join query and a set of custom columns that reflect whether columns between the two spreadsheets actually match. We then show how it is easier and more reproducible with later data to do the same thing with Power BI using a merge query.CHAPTER 19. COPYING MICROSOFT FORMS ANSWERS TO SHAREPOINT USING POWER AUTOMATE AND THEN SHOWING THE MOST CURRENT SUBMISSION IN POWER BIIn this chapter, we take a simple Microsoft Form, copy each entry to SharePoint with Power Automate, and then visualize the data in Power BI. The main insight on the Power BI side is to show only the most recent form submission by grouping within Power BI, creating a MaxDate column, and then filtering.CHAPTER 20. COPYING MICROSOFT FORMS ATTACHMENTS TO A SHAREPOINT LIST ITEM USING POWER AUTOMATEIn this chapter, we see how to create a group form in Microsoft Forms, create an associated SharePoint List to hold the data, use Power Automate to copy the form responses to the list, and, most importantly, copy each file uploaded with the form and attach it to the corresponding list item.CHAPTER 21. CREATING AN EMPLOYEE RECOGNITION APP IN POWER APPS, POWER AUTOMATE, POWER BI, TEAMS, AND SHAREPOINTIn this chapter, we demonstrate how to create a Power Apps and Power Automate employee recognition solution that can post the recognition to a Teams channel, send a Teams chat, and/or send via email. We try to make it optional for submitters to include their information, finding it works for chats and email but not posts. We store the information in SharePoint and then use Power BI to visualize the values demonstrated and other data.CHAPTER 22. CREATING A RESERVATIONS BOOKING SOLUTION IN POWER APPS AND SHAREPOINTIn this chapter, we demonstrate how to create a SharePoint list of available appointments and then use Power Apps to allow users to select an available appointment and make that not available to anyone else. It also shows how to allow users to edit or delete their appointments (or those created on their behalf).CHAPTER 23. CREATING A SCORING APPLICATION IN POWER APPS AND SHAREPOINTIn this chapter, we create a scoring application where we patch three different SharePoint records at the same time. Along the way, we use cascading drop-down lists, collections, data tables, and variables.

Regulärer Preis: 56,99 €
Produktbild für Workload Automation Using HWA

Workload Automation Using HWA

Apply best practices for deploying and administering HCL Workload automation (HWA) to meet the automation requirements of the digitally transformed platform. This book will provide detailed architecture and deployment options to achieve this goal.Workload automation focuses on real-time processing, predefined event-driven triggers, and situational dependencies. It offers centralized control of managing multiple tasks, making it possible to schedule enterprise-wide tasks. You'll see how it supports the timely completion of tasks and is beneficial for processes that need to happen at a specific time or need to occur as a result of another event.HWA increases efficiency, reduces the turnaround time for workflows, and reduces errors along with delays in end-to-end processes. You'll review proven ways to deliver batch optimization and modernization requirements, and see how solutions can be aligned with the DevSecOps delivery model. Workload Automation Using HWA presents information on how to use the tool and has numerous use cases and implementation procedures to guide every workload automation deployment requirement.WHAT YOU'LL LEARN* Automate and integrate your complex workload, workflow, and business processes across automation platforms, ERP systems, and business applications* Understand event-driven batch automation* Practice alignment of the workload automation solution with the DevSecOps principlesWHO THIS BOOK IS FORSolution Architects, Infrastructure Architects, Technical Architects, Enterprise Architects, Workload Automation Tool Administrators or SME’s, Schedulers, Application owners, Automation Specialists, Service Delivery ManagersNAVIN SABHARWAL, currently is the Chief Architect and Head of Strategy for Autonomics, named ‘DRYiCE’ at HCL Technologies. He is responsible for innovation, presales, and delivery of award-winning autonomics platforms for HCL Technologies. Navin is an innovator, thought leader, author and a consultant in areas of AI and Machine Learning, Cloud Computing, Big Data Analytics, Software Product Development, Engineering and R&D. He is responsible for IP Development & Service Delivery in the Areas of AI and Machine Learning, Automation products, Cloud Computing, Public Cloud AWS, Microsoft Azure, VMWare Private Cloud, Microsoft Private Cloud, Data Center Automation, Analytics for IT Operations, IT Service Management.SUBRAMANI KASIVISWANATHAN is the Solution architect for Application Performance Management and Workload Automation Solutions, also leading the Engineering and R&D function, having overall 16 years of IT experience and 6 years of experience in Academics, currently working as Practice Lead in HCL DRYiCE, responsible for creating solutions catering to APM and Workload Automation, responsible and accountable for the Research and Development in autonomics platform.Chapter 1: Introduction to Workload AutomationSub –Topics1. Workload Automation Concepts2. Introduction to HCL Workload Automation3. HCL Workload Automation strengths4. Common HCL Workload Automation terminologyChapter 2: HCL Workload Automation ArchitectureSub –Topics1. HWA components2. HWA communication path3. Architecture TypesChapter 3: HCL Workload Automation DeploymentsSub - Topics1. Deployment Options4. Planning Deployments5. Stand-Alone Architecture6. High Availability Architecture7. Disaster Recovery Architecture8. Containerized deployments9. Deployment on Kubernetes clusters10. Workload Automation on HCL SofyChapter 4: Workload Design and Monitoring using DWC and CLIChapter 5: Use Case: HWA for managed file transfersChapter 6: Use Case: HWA integration with SAPChapter 7: Use Case: Automate job executions on Microsoft SQL serverChapter 8: Use Case: Working with RESTful Web ServicesChapter 9: Use Case: Submit, orchestrate and monitor jobs on a Kubernetes clusterChapter 10: Use Case: HWA Integration with Hadoop Distributed File SystemChapter 11: Use Case: HWA Integration with Apache SparkChapter 12: Use Case 1: HWA Integration with ServiceNow Use Case 2: Auto Remediation of Job failuresChapter 13: Tool Administration and best practicesChapter 14: Alerting and Troubleshooting issuesChapter 15: HWA ReportingChapter 16: HWA SecurityChapter 17: HWA tuning for best performanceChapter 18: Alignment of HWA with DevSecOps Delivery model.

Regulärer Preis: 62,99 €
Produktbild für Data Science mit SAP HANA

Data Science mit SAP HANA

Mit SAP HANA und SAP HANA Cloud ist viel mehr möglich, als Sie denken! In diesem Buch erfahren Sie, wie Sie APL und PAL einsetzen können, um komplexe Auswertungen vorzunehmen und Vorhersagen zu treffen. Praktische Beispiele zu Klassifizierung, Regression u.v.m. zeigen Ihnen die vielfältigen Möglichkeiten auf und lassen sich direkt auf Ihre Anwendungsfälle übertragen. Aus dem Inhalt: Was ist Data Science?SAP HANA, SAP HANA Cloud und SAP Data Warehouse CloudPython, R und SQLUnivariate und Multivariate AnalyseAutomated Predictive Library Predictive Analytics LibraryGeodaten-, Graph- und TextanalyseTrainieren und Anwenden von Data-Science-ModellenIntegration in Geschäftsprozesse und Geschäftsanwendungen   Vorworte ... 11   Einleitung ... 15   1.  Einführung ... 19        1.1 ... Themenabgrenzung ... 20        1.2 ... Data Science in der SAP-Welt ... 27   2.  SAP HANA als Data-Science-Umgebung ... 37        2.1 ... SAP HANA ... 38        2.2 ... SAP HANA Client ... 64        2.3 ... Python-Entwicklungsumgebung ... 64   3.  Erste Schritte ... 71        3.1 ... Python ... 71        3.2 ... Die R-Programmiersprache ... 84        3.3 ... Die SQL-Sprache für SAP HANA ... 89   4.  Explorative Datenanalyse und Datenvorbereitung ... 99        4.1 ... Analyse einer Tabelle ... 100        4.2 ... Analyse einzelner Variablen ... 105        4.3 ... Analyse mehrerer Variablen ... 111        4.4 ... Datenvorbereitung ... 114   5.  Automated Predictive Library ... 129        5.1 ... Einführung in die APL ... 131        5.2 ... Klassifizierung mit der APL ... 133        5.3 ... Regression mit der APL ... 173        5.4 ... Zeitreihen mit der APL ... 186        5.5 ... Weitere Informationen ... 211   6.  Predictive Analysis Library ... 213        6.1 ... Einführung in die PAL ... 214        6.2 ... Klassifizierung mit der PAL ... 216        6.3 ... Regression mit der PAL ... 229        6.4 ... Zeitreihen mit der PAL ... 236        6.5 ... Cluster-Analyse ... 253        6.6 ... Survival Analysis ... 260        6.7 ... Ausreißeranalyse ... 282        6.8 ... Automated Machine Learning ... 289        6.9 ... State-enabled Deployment ... 299   7.  Spezialisierte Analyse-Engines ... 301        7.1 ... Geodatenanalyse ... 302        7.2 ... Graphanalyse ... 317        7.3 ... Textanalyse ... 328   8.  Deployment-Optionen ... 341        8.1 ... SAP Data Intelligence ... 342        8.2 ... Cloud Foundry ... 357        8.3 ... Kyma ... 363   9.  Tipps und Tricks ... 377   Anhang ... 397   A.  Checkliste ... 397   Die Autoren ... 401   Index ... 403

Regulärer Preis: 89,90 €
Produktbild für QNAP NAS

QNAP NAS

Mit diesem umfassenden Handbuch richten Sie Ihr NAS genau nach Ihren Bedürfnissen ein. Wollen Sie Dokumente oder Fotos über Ihre persönliche Cloud teilen, Medien in Ihrem Netzwerk streamen oder einfach sicheren Netzwerkspeicher auf allen Ihren Geräten nutzen? Kein Problem mit den Geräten von QNAP und dem Fachwissen unseres Autorenteams. In zahlreichen konkreten Anwendungsszenarien zeigen sie Ihnen, wie Sie Ihr NAS ideal nutzen und sicher administrieren. Aus dem Inhalt: Alles für den sicheren StartRAID-KonfigurationenSingle-Sign-on über VerzeichnisdiensteZugriff aus dem InternetSynchronisation mit QsyncSichere Backups von Windows und macOSDaten suchen, finden und katalogisierenMultimedia von A-Z: Fotos, Videos, MusikVPN-Konfigurationen: klassisch mit openVPN oder modern mit WireGuardCollaboration und Dienste fürs TeamDie eigene Cloud mit NextCloud einrichtenVirtuelle Maschinen und Docker-Container   Vorwort ... 17   1.  Einrichtung des Geräts ... 21        1.1 ... Ersteinrichtung des NAS ... 21        1.2 ... Die Einrichtung des Speicherplatzes ... 35        1.3 ... Das Bedienkonzept des QTS ... 47        1.4 ... Benutzerkonten erstellen ... 57   2.  Grundlegende Funktionen ... 63        2.1 ... Die Systemsteuerung ... 63        2.2 ... File Station und der Umgang mit Dateien ... 76        2.3 ... Freigabeordner erstellen und benutzen ... 82        2.4 ... Die persönlichen Home-Verzeichnisse aktivieren ... 87        2.5 ... Die Dateidienste für den Dateizugriff über eine Netzwerkverbindung ... 89        2.6 ... Das App Center ... 119   3.  Das NAS sicher betreiben ... 127        3.1 ... Die Optionen des Moduls »Sicherheit« ... 127        3.2 ... Die Servicebindung ... 133        3.3 ... Der Malware Remover ... 134        3.4 ... Die QuFirewall ... 137        3.5 ... Der Security Counselor ... 144        3.6 ... Die Zwei-Schritt-Verifizierung verwenden ... 148        3.7 ... Den Zustand der Festplatten überprüfen ... 151   4.  Über das Internet auf das NAS zugreifen ... 155        4.1 ... Generelles zum Zugriff über das Internet ... 155        4.2 ... Der Dienst myQNAPcloud ... 161        4.3 ... Eigene SSL-Zertifikate verwenden ... 189   5.  Software für Clients ... 193        5.1 ... Allgemeines ... 193        5.2 ... Desktop-Apps ... 195        5.3 ... Mobile Apps ... 210   6.  Nützliche Dienste von Drittanbietern ... 221        6.1 ... Das Content-Management-System WordPress installieren und benutzen ... 221        6.2 ... MariaDB und phpMyAdmin ... 229        6.3 ... VirtualHere USB Server ... 236   7.  Alles auf Anfang ... 245        7.1 ... Backup der Einstellungen und Wiederherstellung ... 245        7.2 ... Einstellungen zurücksetzen ... 248   8.  Alles synchron ... 253        8.1 ... Qsync - PC und NAS synchronisieren ... 253        8.2 ... HybridMount - Externe Quelle und NAS synchronisieren ... 270   9.  Sicher ist sicher: Backups ... 287        9.1 ... Backupkonzept erstellen ... 287        9.2 ... Windows-Rechner auf NAS sichern mit NetBak Replicator ... 293        9.3 ... Macs auf NAS sichern mit Time Machine ... 310        9.4 ... NAS sichern mit Hybrid Backup Sync ... 321        9.5 ... Hyper Data Protector: Virtuelle Maschinen sichern ... 332        9.6 ... Boxafe - Sicherung von Google und Microsoft 365 ... 347        9.7 ... Zusammenfassung ... 363 10.  Hardware-Upgrades und Performance-Gewinn ... 365        10.1 ... Ein NAS-Gehäuse ersetzen ... 365        10.2 ... Umzug - von klein nach groß! ... 369        10.3 ... Performance-Gewinn durch 10-GbE-Netzwerkkarte ... 375        10.4 ... Performance-Gewinn durch Cache-Beschleunigung (SSD-Cache) ... 382 11.  Multimedia von A bis Z ... 391        11.1 ... Zentrale Steuerung: Die Multimedia Console ... 391        11.2 ... Einen Ordner für die Medien anlegen und einbinden ... 399        11.3 ... Streaming mit dem DLNA-/UPnP-Medienserver ... 402        11.4 ... Photo Station ... 409        11.5 ... Music Station ... 436        11.6 ... Video Station ... 455        11.7 ... Plex Media Server ... 477 12.  QVR Pro: Videoüberwachung mit dem NAS ... 485        12.1 ... Surveillance Station vs. QVR Pro ... 485        12.2 ... Funktionsweise von QVR Pro ... 486        12.3 ... Lizenzierung ... 488        12.4 ... Installation ... 489        12.5 ... Einen Aufnahmespeicher einrichten ... 490        12.6 ... Einbindung von Kameras ... 492        12.7 ... Aufnahmezeitpläne festlegen ... 497        12.8 ... Aufnahmen und Livebilder mit QVR Pro Client ... 499        12.9 ... Bewegungen erkennen und auf Ereignisse reagieren ... 506        12.10 ... Fazit ... 510 13.  Dateiserver und Verzeichnisdienste ... 511        13.1 ... Qsync im Unternehmensumfeld ... 511        13.2 ... Verzeichnisdienst und Domänencontroller ... 530        13.3 ... Dateiserver ... 553 14.  Mit Dateien und Dokumenten arbeiten ... 561        14.1 ... Dateien suchen und finden mit Qsirch ... 561        14.2 ... Dateikategorisierung und -bearbeitung mit Qfiling ... 568        14.3 ... Texterkennung für gescannte Dokumente ... 577 15.  Collaboration - Dienste für Ihr Team ... 583        15.1 ... ownCloud - File Sharing ... 583        15.2 ... Mattermost - Chat-System ... 596        15.3 ... Notes Station 3.0 - Notizen ... 612 16.  Virtuell und sicher ... 619        16.1 ... Virtualisierung verstehen: Virtuelle Maschinen und Docker-Container ... 619        16.2 ... Virtualization Station ... 624        16.3 ... Container Station ... 640 17.  Alles unter Kontrolle - Überwachung mit QRM+ ... 653        17.1 ... Was heißt Überwachung bzw. System-Monitoring? ... 653        17.2 ... Funktionsumfang von QRM+ ... 654        17.3 ... Systemvoraussetzungen ... 655        17.4 ... Installation der App auf dem NAS ... 655        17.5 ... Start und Orientierung ... 656        17.6 ... Einbinden von Clients ... 658        17.7 ... Geräteverwaltung ... 664        17.8 ... Alarme definieren ... 670        17.9 ... Einstellungen ... 674        17.10 ... Fazit ... 675 18.  VPN ... 677        18.1 ... Wozu Sie VPN benötigen ... 677        18.2 ... So funktionieren VPN-Verbindungen ... 678        18.3 ... VPN-Protokolle ... 683        18.4 ... QVPN Service installieren ... 683        18.5 ... Ihr NAS als WireGuard-VPN-Server ... 684        18.6 ... Ihr NAS als OpenVPN-Server ... 695        18.7 ... NAS als VPN-Client einrichten ... 700   Index ... 702

Regulärer Preis: 39,90 €
Produktbild für SAP-Personalwirtschaft

SAP-Personalwirtschaft

Dieses Handbuch bringt Sie sicher durch den Personaler-Alltag mit SAP. Ausführliche Klick-Anleitungen unterstützen Sie bei allen Aufgaben in SAP ERP HCM. Alle zentralen HR-Bereiche werden verständlich erläutert: Personaladministration, Reporting, Zeitwirtschaft, Entgeltabrechnung und Reisekostenmanagement. Die 6. Auflage unseres HR-Bestsellers wurde komplett aktualisiert und um Informationen zu SAP-Fiori-Apps und weiteren neuen Funktionen ergänzt. Aus dem Inhalt: Grundlagen und NavigationAufbau von SAP ERP HCMPersonaladministrationReports und QuerysZeitwirtschaftPersonalabrechnungOrganisations- und VeranstaltungsmanagementReisemanagementEmployee und Manager Self-Services (ESS und MSSHCM Prozesse und FormulareSAP SucessFactorsSAP Concur   Einleitung ... 19   1.  Was ist SAP? ... 23        1.1 ... Das Unternehmen SAP SE ... 23        1.2 ... SAP-Softwareprodukte ... 24        1.3 ... Weiterentwicklung und Anpassung des Systems ... 28        1.4 ... Aufbau von SAP ERP HCM ... 29        1.5 ... Zusammenfassung ... 33   2.  Grundlagen und Navigation ... 35        2.1 ... Am SAP-System anmelden ... 35        2.2 ... SAP-GUI-Fenster ... 39        2.3 ... Vom SAP-System abmelden ... 55        2.4 ... Im SAP-System navigieren ... 57        2.5 ... Datenpflege ... 65        2.6 ... Benutzervorgaben ... 69        2.7 ... Mit Reports arbeiten ... 74        2.8 ... Drucken ... 83        2.9 ... Mit SAP-Fiori-Apps arbeiten ... 90        2.10 ... Zusammenfassung ... 106        2.11 ... Übungsaufgaben zu Kapitel 2 ... 106   3.  Personaladministration ... 109        3.1 ... Bedeutung der Stammdaten für SAP ERP HCM ... 110        3.2 ... Funktion der Personaladministration ... 113        3.3 ... Infotypkonzept ... 114        3.4 ... Infotyppflege am Beispiel des Infotyps 0006 (Anschriften) ... 119        3.5 ... Maßnahmenkonzept ... 133        3.6 ... Einstellungsmaßnahme ausführen ... 135        3.7 ... Ausgewählte Maßnahmen ausführen ... 170        3.8 ... Tipps und Tricks ... 176        3.9 ... Zusammenfassung ... 187        3.10 ... Übungsaufgaben zu Kapitel 3 ... 188   4.  Pflege ausgewählter Infotypen ... 191        4.1 ... Zahlungsrelevante Infotypen ... 191        4.2 ... Infotypen für die Schweiz ... 203        4.3 ... Infotypen für Österreich ... 206        4.4 ... Sonstige Infotypen ... 209        4.5 ... Zusammenfassung ... 217        4.6 ... Übungsaufgaben zu Kapitel 4 ... 218   5.  Reports und Querys in der Personaladministration ... 219        5.1 ... Auswertungen -- Grundlagen und Werkzeuge ... 219        5.2 ... Reports über Personalstammdaten ... 222        5.3 ... Querys über Personalstammdaten ... 245        5.4 ... Zusammenfassung ... 263        5.5 ... Übungsaufgaben zu Kapitel 5 ... 264   6.  Zeitwirtschaft ... 265        6.1 ... Überblick ... 265        6.2 ... Zeitdaten pflegen ... 269        6.3 ... Zeitabrechnung und Zeitnachweis ... 296        6.4 ... Tagesgeschäft im Arbeitsvorrat ... 306        6.5 ... Time Manager's Workplace (TMW) ... 314        6.6 ... Zeitdaten ... 320        6.7 ... Zusammenfassung ... 324        6.8 ... Übungsaufgaben zu Kapitel 6 ... 325   7.  Personalabrechnung ... 327        7.1 ... Überblick ... 328        7.2 ... Voraussetzungen in den Stammdaten ... 333        7.3 ... Abrechnungskonzeption und Abrechnungsergebnisse ... 334        7.4 ... Abrechnungssimulation und Entgeltnachweis ... 339        7.5 ... Abrechnungsstatus und Abrechnungsverwaltungssatz ... 350        7.6 ... Ablauf der Personalabrechnung am Beispiel des deutschen Abrechnungsverfahrens ... 355        7.7 ... Auswertungen in der Personalabrechnung ... 400        7.8 ... Besonderheiten für Österreich und die Schweiz ... 405        7.9 ... Abrechnungsprozess mit dem Payroll Control Center (PCC) ... 407        7.10 ... Entsendung (A1-Bescheinigung) ... 410        7.11 ... Voraussetzung in den Stammdaten ... 410        7.12 ... Zusammenfassung ... 413        7.13 ... Übungsaufgaben zu Kapitel 7 ... 414   8.  Organisationsmanagement ... 415        8.1 ... Überblick ... 416        8.2 ... Organisationsstruktur pflegen ... 422        8.3 ... Ausgewählte Daten pflegen ... 445        8.4 ... Auswertungen im Organisationsmanagement ... 448        8.5 ... Zusammenfassung ... 455        8.6 ... Übungsaufgaben zu Kapitel 8 ... 455   9.  Veranstaltungsmanagement ... 457        9.1 ... Unterstützte Prozesse des Veranstaltungsmanagements ... 458        9.2 ... Dynamische Menüs ... 458        9.3 ... Veranstaltungsvorbereitung ... 460        9.4 ... Veranstaltungsangebot ... 477        9.5 ... Tägliche Aufgaben im Veranstaltungsmanagement ... 492        9.6 ... Wiederkehrende Arbeiten ... 512        9.7 ... Standardauswertungen im Infosystem ... 520        9.8 ... Weitere SAP-Learning-Management-Systeme ... 529        9.9 ... Zusammenfassung ... 538        9.10 ... Übungsaufgaben zu Kapitel 8 ... 539 10.  Reisemanagement ... 541        10.1 ... Voraussetzung in den Stammdaten ... 542        10.2 ... Reisedaten im Reisemanager erfassen ... 546        10.3 ... Verschiedene Status einer Reise ... 561        10.4 ... Übung: Reisen genehmigen ... 564        10.5 ... Übung: Reisekostennachweis drucken ... 567        10.6 ... Zahlung und Buchung ... 571        10.7 ... Reisedaten in SAP Enterprise Portal erfassen ... 571        10.8 ... Reisedaten in SAP Concur erfassen ... 583        10.9 ... Zusammenfassung ... 589        10.10 ... Übungsaufgaben zu Kapitel 10 ... 590 11.  Employee und Manager Self-Services in SAP ERP HCM ... 593        11.1 ... Voraussetzungen ... 594        11.2 ... Unterscheidung der Oberflächentechnologien ... 595        11.3 ... ESS und MSS mit WebDynpro ... 596        11.4 ... ESS und MSS mit SAP Fiori ... 611        11.5 ... Zusammenfassung ... 625 12.  HCM Prozesse und Formulare ... 627        12.1 ... Grundlagen und Vorüberlegungen ... 627        12.2 ... Komponenten von HCM Prozesse und Formulare ... 628        12.3 ... Ablaufmuster der Prozesse ... 639        12.4 ... Nachvollziehbarkeit der Prozesse ... 647        12.5 ... Prozessbeispiele ... 651        12.6 ... Zusammenfassung ... 655 13.  Einführung in SAP SuccessFactors ... 657        13.1 ... Funktionen von SAP SuccessFactors ... 659        13.2 ... Ein Einblick in SAP SuccessFactors ... 667        13.3 ... Zusammenfassung ... 680 14.  Hilfe-Funktionen ... 681        14.1 ... Online-Hilfen ... 681        14.2 ... Hilfe-Funktionen des Systems ... 691        14.3 ... Zusammenfassung ... 694        14.4 ... Übungsaufgaben zu Kapitel 14 ... 694   Anhang ... 697   A.  Wichtige Transaktionscodes ... 697   Das Autorenteam ... 701   Index ... 703

Regulärer Preis: 79,90 €
Produktbild für SAP-Geschäftspartner und Customer-Vendor-Integration

SAP-Geschäftspartner und Customer-Vendor-Integration

Lernen Sie das Geschäftspartner-Konzept von SAP S/4HANA kennen, und meistern Sie die Customer-Vendor-Integration. Sie erfahren, welche Einstellungen Sie vor der Integration treffen müssen und wie Sie Ihre Geschäftspartnerdaten erfolgreich synchronisieren. Ob Migrations- oder Greenfieldprojekt – Antje Diekhoff und Mathias Cararo zeigen Ihnen, wie es geht. Aus dem Inhalt: GrundkonzeptIntegration von Kunden und Lieferanten (CVI)Customizing und ErweiterungGP-Rollen und -ArtenNummernkreise und GruppierungenDatenstrukturTransaktionenErweiterung des GeschäftspartnersStammdatensynchronisationBerechtigungskonzeptGreenfield- und Migrationsprojekte   Einleitung ... 19   I.  Grundlagen ... 27   1.  Grundkonzept des SAP-Geschäftspartners ... 29        1.1 ... Der Geschäftspartner in SAP S/4HANA ... 29        1.2 ... Grundlegende Begriffe ... 34        1.3 ... Fazit ... 42   2.  Mögliche Fragestellungen im Vorfeld einer Customer-Vendor-Integration ... 43        2.1 ... Grundlagen der Customer-Vendor-Integration ... 43        2.2 ... Zusammenführung von Kunden und Lieferanten ... 47        2.3 ... Nummernvergabe ... 49        2.4 ... Ansprechpartner ... 56        2.5 ... Mögliche Vorabvalidierung ... 61        2.6 ... Fazit ... 78   3.  Ablauf der Customer-Vendor-Integration ... 81        3.1 ... Grundlagen der Stammdatensynchronisation ... 82        3.2 ... Vorbereitung ... 84        3.3 ... Synchronisation ... 95        3.4 ... Das Synchronisationscockpit (Transaktion MDS_LOAD_COCKPIT) ... 107        3.5 ... Nacharbeiten mit Transaktion MDS_PPO2 ... 111        3.6 ... Umsetzungsoptionen im SAP-System ... 113        3.7 ... Fazit ... 116 II.  Customizing und Erweiterung des Geschäftspartners ... 117   4.  Customizing des Geschäftspartners im Rahmen der Customer-Vendor-Integration ... 119        4.1 ... Aktivierung von Business Functions ... 120        4.2 ... Aktivierung zusätzlicher Geschäftspartner-Funktionen ... 122        4.3 ... Grundeinstellungen ... 124        4.4 ... Anlage von Geschäftspartner-Rollen im kundenspezifischen Namensraum ... 135        4.5 ... Geschäftspartner-Rollengruppierung ... 142        4.6 ... Geschäftspartner-Rollenausschlussgruppen ... 145        4.7 ... Nummernkreise und Gruppierungen ... 145        4.8 ... Feldmodifikation ... 151        4.9 ... Adressfindung ... 153        4.10 ... Anreden ... 156        4.11 ... Steuernummer ... 159        4.12 ... Personen ... 164        4.13 ... Organisation ... 165        4.14 ... Geschäftspartner-Beziehung ... 172        4.15 ... Ansprechpartner ... 175        4.16 ... Aktive Verwendung des Geschäftspartners in einem SAP-ERP-System ... 180        4.17 ... Fazit ... 184   5.  Customizing des Geschäftspartners in SAP S/4HANA ... 185        5.1 ... Aktivierungsstatus für Funktionen ... 187        5.2 ... Geschäftspartner-Rollen ... 188        5.3 ... Anwendungstransaktionen ... 200        5.4 ... Notizen ... 205        5.5 ... Nummernkreise und Gruppierungen ... 209        5.6 ... Geschäftspartner-Art ... 213        5.7 ... Feldmodifikation ... 215        5.8 ... Berechtigungsverwaltung ... 228        5.9 ... Adressfindung ... 232        5.10 ... Weitere Customizing-Einstellungen ... 241        5.11 ... Geschäftspartner-Beziehungen ... 262        5.12 ... Datenverteilung ... 268        5.13 ... Fazit ... 269   6.  Datenstrukturen des Geschäftspartners ... 271        6.1 ... Übersicht der Tabellen im Paket S_BUPA_GENERAL ... 273        6.2 ... Geschäftspartner-Tabellen ... 274        6.3 ... Massenänderung von Geschäftspartnern ... 282        6.4 ... Standardfelder, die in einem SAP-ERP-System nicht zur Verfügung stehen ... 289        6.5 ... Fazit ... 294   7.  Mit Geschäftspartnern arbeiten ... 295        7.1 ... Prüfen synchronisierter Stammdaten in einem SAP-ERP-System ... 295        7.2 ... Anlage und Änderung von Stammdaten in einem SAP-S/4HANA-System ... 306        7.3 ... Fazit ... 322   8.  Erweiterung des Geschäftspartners per Business Data Toolset ... 325        8.1 ... Das BDT im Detail ... 326        8.2 ... Aufnahme eines kundenspezifischen Feldes in den Geschäftspartner ... 334        8.3 ... Fazit ... 354 III.  Vorbereitung und Durchführung der Stammdatensynchronisation ... 355   9.  Customizing der Stammdatensynchronisation für die Customer-Vendor-Integration ... 357        9.1 ... Synchronisationssteuerung und vorbereitende Schritte ... 358        9.2 ... Customizing zur Customer-Vendor-Integration ... 367        9.3 ... Fazit ... 393 10.  Customizing der Stammdatensynchronisation bei Nutzung des Geschäftspartners ... 395        10.1 ... Synchronisationssteuerung und vorbereitende Schritte ... 396        10.2 ... Customizing der Customer-Vendor-Integration ... 399        10.3 ... Fazit ... 411 11.  Durchführung der Stammdatensynchronisation ... 413        11.1 ... Finale Prüfung der CVI-Voraussetzungen ... 414        11.2 ... Arbeiten mit der Transaktion MDS_LOAD_COCKPIT ... 420        11.3 ... Ablauf der Synchronisation ... 425        11.4 ... Handhabung des PPO und Nachsynchronisation ... 435        11.5 ... Fazit ... 446 12.  Fehlerbehandlung und Besonderheiten bei der Synchronisation ... 449        12.1 ... Fehlermeldung aufgrund des CVI-Customizings ... 449        12.2 ... Fehlermeldung aufgrund von inkonsistenten Stammdaten ... 452        12.3 ... Fehlermeldung aufgrund unterschiedlicher Ursachen ... 461        12.4 ... Fehlermeldungen bei Zusammenführung von Debitor und Kreditor in einen gemeinsamen Geschäftspartner ... 464        12.5 ... Nutzung des PPO nach Abschluss der CVI ... 466        12.6 ... Fazit ... 468 13.  Der Geschäftspartner bei einer Neueinführung von SAP S/4HANA ... 469        13.1 ... Nummernvergabe bei einer Neueinführung ... 469        13.2 ... Geschäftspartner für das SAP Credit Management ... 482        13.3 ... Migration der Geschäftspartner-Daten ... 488        13.4 ... Fazit ... 498 IV.  Weitere Einstellungen und Empfehlungen ... 501 14.  Berechtigungen und Schnittstellen ... 503        14.1 ... Berechtigungskonzept ... 503        14.2 ... Berechtigungen für SAP-Fiori-Apps ... 516        14.3 ... Fazit ... 523 15.  Besonderheiten weiterer SAP-Systeme im Rahmen der Customer-Vendor-Integration ... 525        15.1 ... Betriebsstämme in SAP Retail ... 525        15.2 ... CVI beim Einsatz von HCM-Systemen ... 530        15.3 ... CVI bei der Live-Integration von SAP Customer Relationship Management ... 533        15.4 ... Fazit ... 534 16.  Projektplan für ein CVI-Projekt ... 537        16.1 ... Vorbereitung ... 538        16.2 ... Aufbau des Sandbox-Systems ... 539        16.3 ... Prüfung und Integrationstest ... 543        16.4 ... Synchronisation des Produktivsystems ... 543        16.5 ... Nachbearbeitung ... 544        16.6 ... Fazit ... 545   A.  Übersichtstabellen ... 547   Das Autorenteam ... 561   Index ... 563

Regulärer Preis: 79,90 €
Produktbild für Bestandsoptimierung mit SAP

Bestandsoptimierung mit SAP

Behalten Sie Ihre Lagerkosten im Griff, ohne die Lieferfähigkeit zu gefährden: Marc Hoppe zeigt Ihnen, wie Sie Ihr SAP-System einsetzen, um Ihre Bestände in den Griff zu bekommen. Von der Bestandsanalyse über Disposition bis zum Bestandscontrolling werden alle Stellschrauben für ein optimales Bestandsmanagement behandelt. Aus dem Inhalt: StammdatenSAP FioriABC-/XYZ-AnalyseBestandsanalyseAbsatzplanungMRP LiveLosgrößenRückstands- und FehlteilemanagementLagerfertigungsstrategienVerfügbarkeitsprüfung (ATP und aATP)LieferserviceSicherheitsbestände   Einleitung ... 19   1.  Warum sind Bestände notwendig? ... 29        1.1 ... Unterschiedliche Bestandsphilosophien ... 29        1.2 ... Bestand als Stellschraube gegen Unsicherheiten ... 36        1.3 ... Was tun gegen Unsicherheiten? ... 39   2.  Einfluss der Stammdaten auf die Bestände ... 45        2.1 ... Stammdaten in SAP-ERP-Systemen ... 47        2.2 ... Fehlerhafte Stammdaten in SAP-ERP-Systemen ... 50        2.3 ... Stammdatenqualität analysieren ... 55        2.4 ... Stammdatenqualität verbessern ... 62   3.  Materialklassifizierung/Materialsegmentierung ... 69        3.1 ... Analyse- bzw. Klassifizierungsmethoden ... 69        3.2 ... Multidimensionale Kombination der Analysemethoden ... 97        3.3 ... Multidimensionale Analysen mit dem MRP Monitor ... 104        3.4 ... Fazit ... 158   4.  Absatzplanung und Prognose ... 159        4.1 ... Einfluss der Absatzplanung auf Bestände ... 159        4.2 ... Einflussparameter auf die Prognose ... 163        4.3 ... Auswahl der Prognoseverfahren ... 191        4.4 ... Prognoseverfahren im Detail ... 206        4.5 ... Prognoseprozess ... 226        4.6 ... Prognosegenauigkeit/Prognosefehler ... 235        4.7 ... Forecasting & Monitoring Tool ... 255        4.8 ... Fazit ... 273   5.  Disposition ... 275        5.1 ... Dispositionslogik ... 275        5.2 ... Verbrauchsgesteuerte Disposition ... 355        5.3 ... Demand-Driven Planning mit SAP-Add-ons für SAP S/4HANA und SAP ERP ... 365        5.4 ... Demand-Driven Planning mit der bedarfsorientierten Wiederbeschaffung (BWB) für SAP S/4HANA ... 388        5.5 ... Werksübergreifende Disposition mit dem CPP-Verfahren ... 415        5.6 ... Disposition mit dem Kanban-Verfahren ... 436        5.7 ... Ein- und Auslaufsteuerung von Materialien ... 447        5.8 ... Optimierungspotenziale in der Disposition ... 462        5.9 ... Strategische versus operative Disposition ... 479        5.10 ... Operative Disposition mit dem SAP-Add-on MRP Exception Monitor (ERM) und Advanced MD04 (aMD04) ... 487        5.11 ... Fazit ... 504   6.  Lieferservice und Sicherheitsbestände ... 505        6.1 ... Zusammenhang zwischen Bestand und Servicegrad ... 505        6.2 ... Lieferbereitschaft ... 508        6.3 ... SAP-Add-on Service Level Monitor (SLC Monitor) ... 522        6.4 ... Verfügbarkeitsprüfung (ATP) mit SAP ... 527        6.5 ... Wiederbeschaffungszeit ... 534        6.6 ... SAP-Add-on Wiederbeschaffungszeit-Monitor (WBZ-Monitor) ... 539        6.7 ... Sicherheitsbestand ... 550        6.8 ... SAP-Add-on Simulation Sicherheitsbestände ... 581        6.9 ... SAP-Add-on Dynamic Safety Stock Consideration ... 595        6.10 ... Fazit ... 603   7.  Losgrößen ... 605        7.1 ... Wie beeinflussen die Losgrößen die Bestände? ... 605        7.2 ... Statische Losgrößenverfahren in SAP ERP und SAP S/4HANA ... 607        7.3 ... Periodische Losgrößenverfahren in SAP ERP und SAP S/4HANA ... 617        7.4 ... Wirtschaftliche Losgrößenverfahren in SAP ERP und SAP S/4HANA ... 627        7.5 ... Restriktionen in der Losgrößenberechnung ... 646        7.6 ... Auswahl von Losgrößenverfahren ... 648        7.7 ... Berechnung der Ausschussmenge im Rahmen der Losgrößenberechnung ... 651        7.8 ... Bestellmengenoptimierung mit dem SAP-Add-on Simulation von Losgrößen ... 652        7.9 ... Fazit ... 659   8.  Rückstands- und Fehlteilemanagement in der Produktion ... 661        8.1 ... Wie beeinflussen Rückstände in der Produktion die Bestände? ... 662        8.2 ... Warum entstehen Rückstände in der Produktionsplanung? ... 668        8.3 ... Reduzierung von Rückständen - First-come-first-served-Steuerung (FCFS) ... 676        8.4 ... Rückstandsanalyse mit dem SAP-Add-on Capacity Requirements Planning Cockpit ... 702        8.5 ... Kapazitätsabgleich mit dem SAP-Add-on Lean Manufacturing Planning and Control ... 710        8.6 ... Fehlteilemanagement in der Produktion mit dem SAP-Add-on MRP Exception Monitor (ERM) ... 725        8.7 ... Fazit ... 746   9.  Bestandscontrolling ... 747        9.1 ... Warum Bestandsüberwachung? ... 747        9.2 ... Einführung in das Logistikcontrolling ... 748        9.3 ... Kennzahlensystem des Supply Chain Councils ... 750        9.4 ... Wichtige Kennzahlen aus der Sicht des Einkaufs ... 755        9.5 ... Einkaufscontrolling mit der SAP-Beratungslösung Einkaufsmonitor und SAP Analytics Cloud ... 767        9.6 ... Wichtige Kennzahlen aus Sicht der Disposition ... 778        9.7 ... Bestandscontrolling mit dem SAP-Add-on Bestandscontrollingcockpit und SAP Analytics Cloud ... 800        9.8 ... Wichtige Kennzahlen aus Sicht der Produktion ... 821        9.9 ... Kalkulation von Bestandspotenzialen ... 837        9.10 ... Fazit ... 838   Anhang ... 839        A ... Literaturverzeichnis ... 839        B ... Add-ons zu SAP ERP und SAP S/4HANA ... 845   Der Autor ... 859   Index ... 861

Regulärer Preis: 89,90 €
Produktbild für Arduino-Workshops (2. Auflg.)

Arduino-Workshops (2. Auflg.)

Eine praktische Einführung mit 65 Projekten in aktualisierter 2. Auflage.In »Arduino-Workshops« erfahren Sie, wie diese Add-ons funktionieren und wie man sie einsetzt. Sie starten mit einem Überblick über das Arduino-System und gehen dann rasch zu den verschiedenen elektronischen Komponenten und Konzepten über. Zahlreiche Beispielprojekte vertiefen das Gelernte Schritt für Schritt und helfen Ihnen, dieses Wissen anzuwenden. Je tiefer Sie in die Materie eindringen, desto raffinierter und anspruchsvoller werden die Projekte.Unter den 65 Projekten des Buches finden sich nützliche Dinge wie:ein digitales Thermometer mit LCD-Anzeigeein GPS-Logger, der Daten Ihrer Reise für Google Maps aufzeichnetein handliches Testgerät zum Messen von Batteriespannungeneine Tastatursperre, die nur mit Geheimcode aufgehoben werden kannAußerdem lernen Sie, Spielzeug und Spiele zu entwickeln, beispielsweise:eine elektronische Version des klassischen sechsseitigen Würfelsein binäres Quiz, das Ihre Fähigkeiten zur Umwandlung von Zahlen testetein Fahrzeug mit Fernbedienung und Kollisionserkennung»Arduino-Workshops« führt Sie in die Welt der Mikroelektronik ein und lehrt Sie die Tricks und Design-Prinzipien eines erfahrenen Profis.Über den Autor:John Boxall ist seit über 26 Jahren in den Bereichen Elektronikdesign, Vertrieb und E-Commerce tätig. In seiner Freizeit schreibt er Arduino-Tutorials und veröffentlicht regelmäßig Reviews zu Arduino-Projekten und -Zubehör bei www.tronixstuff.com.

Regulärer Preis: 34,90 €
Produktbild für Cybersecurity in Intelligent Networking Systems

Cybersecurity in Intelligent Networking Systems

CYBERSECURITY IN INTELLIGENT NETWORKING SYSTEMSHELP PROTECT YOUR NETWORK SYSTEM WITH THIS IMPORTANT REFERENCE WORK ON CYBERSECURITY Cybersecurity and privacy are critical to modern network systems. As various malicious threats have been launched that target critical online services—such as e-commerce, e-health, social networks, and other major cyber applications—it has become more critical to protect important information from being accessed. Data-driven network intelligence is a crucial development in protecting the security of modern network systems and ensuring information privacy. Cybersecurity in Intelligent Networking Systems provides a background introduction to data-driven cybersecurity, privacy preservation, and adversarial machine learning. It offers a comprehensive introduction to exploring technologies, applications, and issues in data-driven cyber infrastructure. It describes a proposed novel, data-driven network intelligence system that helps provide robust and trustworthy safeguards with edge-enabled cyber infrastructure, edge-enabled artificial intelligence (AI) engines, and threat intelligence. Focusing on encryption-based security protocol, this book also highlights the capability of a network intelligence system in helping target and identify unauthorized access, malicious interactions, and the destruction of critical information and communication technology. Cybersecurity in Intelligent Networking Systems readers will also find:* Fundamentals in AI for cybersecurity, including artificial intelligence, machine learning, and security threats* Latest technologies in data-driven privacy preservation, including differential privacy, federated learning, and homomorphic encryption* Key areas in adversarial machine learning, from both offense and defense perspectives* Descriptions of network anomalies and cyber threats* Background information on data-driven network intelligence for cybersecurity* Robust and secure edge intelligence for network anomaly detection against cyber intrusions* Detailed descriptions of the design of privacy-preserving security protocolsCybersecurity in Intelligent Networking Systems is an essential reference for all professional computer engineers and researchers in cybersecurity and artificial intelligence, as well as graduate students in these fields. SHENGJIE XU, PHD, is an IEEE member and is an Assistant Professor in the Management Information Systems Department at San Diego State University, USA. YI QIAN, PHD, is an IEEE Fellow and is a Professor in the Department of Electrical and Computer Engineering at the University of Nebraska-Lincoln, USA. ROSE QINGYANG HU, PHD, is an IEEE Fellow. She is also a Professor with the Electrical and Computer Engineering Department and the Associate Dean for Research of the College of Engineering, Utah State University, USA. ContentsPreface xiiiAcknowledgments xviiAcronyms xix1 Cybersecurity in the Era of Artificial Intelligence 11.1 Artificial Intelligence for Cybersecurity . 21.1.1 Artificial Intelligence 21.1.2 Machine Learning 41.1.3 Data-Driven Workflow for Cybersecurity . 61.2 Key Areas and Challenges 71.2.1 Anomaly Detection . 81.2.2 Trustworthy Artificial Intelligence . 101.2.3 Privacy Preservation . 101.3 Toolbox to Build Secure and Intelligent Systems . 111.3.1 Machine Learning and Deep Learning . 121.3.2 Privacy-Preserving Machine Learning . 141.3.3 Adversarial Machine Learning . 151.4 Data Repositories for Cybersecurity Research . 161.4.1 NSL-KDD . 171.4.2 UNSW-NB15 . 17v1.4.3 EMBER 181.5 Summary 182 Cyber Threats and Gateway Defense 192.1 Cyber Threats . 192.1.1 Cyber Intrusions . 202.1.2 Distributed Denial of Services Attack . 222.1.3 Malware and Shellcode . 232.2 Gateway Defense Approaches 232.2.1 Network Access Control 242.2.2 Anomaly Isolation 242.2.3 Collaborative Learning . 242.2.4 Secure Local Data Learning 252.3 Emerging Data-Driven Methods for Gateway Defense 262.3.1 Semi-Supervised Learning for Intrusion Detection 262.3.2 Transfer Learning for Intrusion Detection 272.3.3 Federated Learning for Privacy Preservation . 282.3.4 Reinforcement Learning for Penetration Test 292.4 Case Study: Reinforcement Learning for Automated Post-BreachPenetration Test . 302.4.1 Literature Review 302.4.2 Research Idea 312.4.3 Training Agent using Deep Q-Learning 322.5 Summary 34vi3 Edge Computing and Secure Edge Intelligence 353.1 Edge Computing . 353.2 Key Advances in Edge Computing . 383.2.1 Security 383.2.2 Reliability . 413.2.3 Survivability . 423.3 Secure Edge Intelligence . 433.3.1 Background and Motivation 443.3.2 Design of Detection Module 453.3.3 Challenges against Poisoning Attacks . 483.4 Summary 494 Edge Intelligence for Intrusion Detection 514.1 Edge Cyberinfrastructure . 514.2 Edge AI Engine 534.2.1 Feature Engineering . 534.2.2 Model Learning . 544.2.3 Model Update 564.2.4 Predictive Analytics . 564.3 Threat Intelligence 574.4 Preliminary Study . 574.4.1 Dataset 574.4.2 Environment Setup . 594.4.3 Performance Evaluation . 59vii4.5 Summary 635 Robust Intrusion Detection 655.1 Preliminaries 655.1.1 Median Absolute Deviation . 655.1.2 Mahalanobis Distance 665.2 Robust Intrusion Detection . 675.2.1 Problem Formulation 675.2.2 Step 1: Robust Data Preprocessing 685.2.3 Step 2: Bagging for Labeled Anomalies 695.2.4 Step 3: One-Class SVM for Unlabeled Samples . 705.2.5 Step 4: Final Classifier . 745.3 Experiment and Evaluation . 765.3.1 Experiment Setup 765.3.2 Performance Evaluation . 815.4 Summary 926 Efficient Preprocessing Scheme for Anomaly Detection 936.1 Efficient Anomaly Detection . 936.1.1 Related Work . 956.1.2 Principal Component Analysis . 976.2 Efficient Preprocessing Scheme for Anomaly Detection . 986.2.1 Robust Preprocessing Scheme . 996.2.2 Real-Time Processing 103viii6.2.3 Discussions 1036.3 Case Study . 1046.3.1 Description of the Raw Data 1056.3.2 Experiment 1066.3.3 Results 1086.4 Summary 1097 Privacy Preservation in the Era of Big Data 1117.1 Privacy Preservation Approaches 1117.1.1 Anonymization 1117.1.2 Differential Privacy . 1127.1.3 Federated Learning . 1147.1.4 Homomorphic Encryption 1167.1.5 Secure Multi-Party Computation . 1177.1.6 Discussions 1187.2 Privacy-Preserving Anomaly Detection . 1207.2.1 Literature Review 1217.2.2 Preliminaries . 1237.2.3 System Model and Security Model 1247.3 Objectives and Workflow . 1267.3.1 Objectives . 1267.3.2 Workflow . 1287.4 Predicate Encryption based Anomaly Detection . 1297.4.1 Procedures 129ix7.4.2 Development of Predicate . 1317.4.3 Deployment of Anomaly Detection 1327.5 Case Study and Evaluation . 1347.5.1 Overhead . 1347.5.2 Detection . 1367.6 Summary 1378 Adversarial Examples: Challenges and Solutions 1398.1 Adversarial Examples . 1398.1.1 Problem Formulation in Machine Learning 1408.1.2 Creation of Adversarial Examples . 1418.1.3 Targeted and Non-Targeted Attacks . 1418.1.4 Black-Box and White-Box Attacks 1428.1.5 Defenses against Adversarial Examples 1428.2 Adversarial Attacks in Security Applications 1438.2.1 Malware 1438.2.2 Cyber Intrusions . 1438.3 Case Study: Improving Adversarial Attacks Against MalwareDetectors 1448.3.1 Background 1448.3.2 Adversarial Attacks on Malware Detectors 1458.3.3 MalConv Architecture 1478.3.4 Research Idea 1488.4 Case Study: A Metric for Machine Learning Vulnerability toAdversarial Examples . 1498.4.1 Background 1498.4.2 Research Idea 1508.5 Case Study: Protecting Smart Speakers from Adversarial VoiceCommands . 1538.5.1 Background 1538.5.2 Challenges 1548.5.3 Directions and Tasks 1558.6 Summary 157xi

Regulärer Preis: 104,99 €