Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen

Computer und IT

Produkte filtern

Produktbild für Delivering Applications with VMware App Volumes 4

Delivering Applications with VMware App Volumes 4

Acquire the skills to build an App Volumes environment for a proof of concept, a pilot, or a live production environment. Delivering Applications with VMware App Volumes 4 starts with an in-depth overview of where the solution fits within the market and its key features, introducing you to application layering and VMware App Volumes. Next, it explains how to install the software and use its management consoles to configure App Volumes. You will understand how to build and configure application layers for delivery and will learn to build and configure writeable volumes for user data and user-installed applications.In the advanced management section, you will learn to customize package templates and integrate App Volumes with JMP. Along the way you will understand how to deliver published apps in MS RemoteApp using layered apps for scalability. In the next phase of the book you will install and configure App Volumes for different use cases: VMware Horizon View, VMware ThinApp, Microsoft RDSH, and Citrix Virtual Apps and Desktops.Throughout the chapters, you will be given hints and tips, along with best practices, all seen from the eyes of somebody who works with this technology day in, day out, and in many different types of environments and scenarios.WHAT YOU WILL LEARN* Understand the App Volumes architecture * Master the concept of application layering* Work with App Volumes, application packages, and Writable Volumes WHO THIS BOOK IS FORVMware professionals, system integrators, IT professionals, and consultants.PETER VON OVEN is an experienced technical consultant working closely with customers and partners designing technology solutions, to meet business needs. During his career, Peter has presented at key IT events such as VMworld, IP EXPO, and various VMUGs and CCUG events. He has also worked in senior presales roles and presales management roles for Fujitsu, HP, Citrix, and VMware, and has been awarded VMware vExpert for the last six years in a row. In 2016, Peter founded his own company, Droplet Computing, where he works today as the founder and chief executive officer, helping redefine the way applications are delivered today. He is also an avid author, having now written 13 books and made videos about VMware end-user computing solutions. In his spare time, Peter volunteers as a STEM Ambassador, helping the next generation develop the skills and confidence in building careers in technology.VMware App VolumesChapter 1 INTRODUCING APPLICATION LAYERING AND VMWARE APP VOLUMESCHAPTER GOAL: Introduction to app layering, VMware App Volumes and it’s features and architecture1. Overview of app layering2. Introduction to App Volumes3. App Volumes architecture4. App Volumes featuresNO OF PAGES 20Chapter 2: INSTALLING THE VMWARE APP VOLUMES SOFTWARECHAPTER GOAL: Installing the software and components1. Prerequisites and requirements for installing App Volumes2. Installing the App Volumes Manager3. Installing the App Volumes AgentNO OF PAGES 30Chapter 3: APP VOLUMES MANAGEMENT CONSOLECHAPTER GOAL: Using the management consoles to configure App Volumes1. Initial login and configuration2. Navigating the menu optionsNO OF PAGES 20Chapter 4: CREATING AND PACKAGING APPLICATIONSCHAPTER GOAL: How to build and configure application layers for delivery1. Definition of an App Volumes package2. Creating a provisioning machine – OS optimization tool template3. Creating a package4. Assigning packages5. Package lifecycle managementNO OF PAGES 50Chapter 5: WORKING WITH WRITEABLE VOLUMESCHAPTER GOAL: How to build and configure Writeable volumes for user data and user installed applications1. What is a Writeable Volume?2. Creating a Writeable Volume3. Assigning Writeable Volume to end users and desktops4. Managing Writeable VolumesNO OF PAGES 35Chapter 6: ADVANCED MANAGEMENTCHAPTER GOAL: Configuring the advanced management features of App Volumes1. How to customize package templates2. Advanced agent configurationNO OF PAGES 50Chapter 7: INTEGRATING APP VOLUMES WITH JMPCHAPTER GOAL: Configuring App Volumes to deliver apps with the VMware just in time management platform1. JMP architecture overview2. Configuring App Volumes in the JMP management console3. App Volumes JMP assignmentsNO OF PAGES 20Chapter 8: APP VOLUMES AND MICROSOFT REMOTEAPPCHAPTER GOAL: How to deliver published apps in MS RemoteApp using layered apps for scalability1. Building an application package for RemoteApp2. Configuring the RDSH role3. Creating and configuring RDSH-based packages4. Delivering packages to end usersNO OF PAGES 30Chapter 9: APP VOLUMES INTEGRATION WITH CITRIX VIRTUAL APPSCHAPTER GOAL: How to deliver published apps with Citrix Virtual Apps1. Building an application package for Citrix Virtual Apps2. Configuring the RDSH role for Citrix Virtual Apps3. Configuring RDSH-based packages for Citrix Virtual Apps4. Installing the Citrix Virtual Desktop Agent (VDA)5. Installing the App Volumes Agent6. Creating a Machine Group and Delivery Group7. Testing your applicationsNO OF PAGES 30Chapter 10: APP VOLUMES INTEGRATION WITH VMWARE HORIZON APPSCHAPTER GOAL: How to deliver layered apps with VMware Horizon Apps published apps1. Building an application package for Horizon Apps2. Configuring the RDSH role for Horizon Apps3. Configuring RDSH-based packages for Horizon Apps4. Installing the App Volumes Agent5. Installing the Horizon Agent6. Configuring a Horizon App farm7. Configuring a Horizon App pool8. Assigning packages to the Horizon Apps server9. Testing your applicationsNO OF PAGES 30Chapter 11: APP VOLUMES AND VMWARE VIEW VIRTUAL DESKTOPSCHAPTER GOAL: How to deliver layered apps to virtual desktops delivered by VMware Horizon View1. Building an application package for Horizon View2. Installing the App Volumes Agent3. Installing the Horizon Agent4. Optimizing the image5. Configuring a Horizon desktop pool6. Assigning packages to Horizon View end users7. Testing your applicationsNO OF PAGES 30Chapter 12: APP VOLUMES AND CITRIX VIRTUAL DESKTOPSCHAPTER GOAL: How to deliver layered apps to virtual desktops delivered by Citrix Virtual Desktops1. Building an application package for Citrix Virtual Desktops2. Installing the Citrix Virtual Desktop Agent (VDA3. Optimizing the image4. Creating a Machine Group and Delivery Group5. Testing your applicationsNO OF PAGES 30Chapter 13: DELIVERING THINAPP VIRTUALIZED APPS WITH APP VOLUMESCHAPTER GOAL: How to deliver virtualized and isolated apps as app layers with VMware ThinApp1. Overview of ThinApp app virtualization2. Creating a ThinApp AppStack3. Advanced configuration optionsNO OF PAGES 30Chapter 14: UPGRADING TO APP VOLUMES 4CHAPTER GOAL: How to upgrade from a previous version to the latest version of App Volumes1. Upgrading the App Volumes management console2. Upgrading the App Volumes Agent3. Upgrading AppStacks to App Packages4. MigratingNO OF PAGES 20

Regulärer Preis: 62,99 €
Produktbild für Funktionalität und Standardunterstützung von IoT-Software-Plattformen

Funktionalität und Standardunterstützung von IoT-Software-Plattformen

Derzeit konkurrieren über 450 Anbieter von IoT-Software-Plattformen miteinander, die Komplexität und die unterschiedlichen Eigenschaften dieser Plattformen führen zu einem intransparenten Markt. Folglich stehen Unternehmen, die eine IoT-Anwendung unter Weiternutzung ihrer bestehenden IT-Infrastruktur umsetzen wollen, vor der Herausforderung, die für diesen unternehmensspezifischen Anwendungsfall am besten geeignete IoT-Plattform aus einer Vielzahl von Kandidaten auszuwählen. Vor diesem Hintergrund werden Unternehmen durch das vorliegende Buch in die Lage versetzt, die Funktionalität und Standardunterstützung der am Markt verfügbaren IoT-Plattformen schnell zu verstehen und untereinander zu vergleichen.Sebastian Lempert forscht im Bereich des IoT und hat im März 2020 seine Dissertation zu IoT-Software-Plattformen fertiggestellt.Prof. Dr. Alexander Pflaum erforscht die digitale Transformation von Unternehmen und Branchen, die Auswirkungen der Digitalisierung auf Unternehmen und unternehmensübergreifende Wertschöpfungssysteme sowie die Rolle digitaler Plattformen in Wertschöpfungssystemen. Einleitung und Motivation.- Verwandte Arbeiten.- Methodik.- Einheitliche Beschreibung der Funktionalität und Standardunterstützung von IoT-Software-Plattformen.- Vergleich und Bewertung der Funktionalität und der Standardunterstützung von IoT-Software-Plattformen.- Zusammenfassung und Ausblick.

Regulärer Preis: 4,99 €
Produktbild für SAP, The Agile Way

SAP, The Agile Way

Praxisbewährte Tipps für die erfolgreiche agile Arbeit mit weltweit verteilten SAP-Teams.Der weltweit tätige SAP-Berater und Agile Coach Klaus Wybranietz zerlegt in diesem Buch das hartnäckige Vorurteil: »Ja, Scrum ist toll, aber mit SAP funktioniert das nicht.« Er beweist nämlich seit Jahren das Gegenteil: Scrum und SAP können auf einen Nenner gebracht werden – und das sogar sehr erfolgreich. Denn in seinen Projekten für internationale Großkonzerne hat Klaus Wybranietz immer wieder die Erfahrung gemacht: Selbst über den Globus verteilte SAP-Teams können mit Scrum in der halben Zeit dreimal so effektiv sein.In diesem Buch erklärt der Autor die Entwicklungsstufen, über die er SAP-Teams aus dem klassischen Wasserfalldenken heraus und stattdessen hinein in die agile Performance führt. Das fängt beim Teambuilding trotz Superstars an, führt über den Aufbau von gezielten Kompetenzen und hilfreichen Regelwerken bis hin zum Schaffen echter Kundenwerte durch die Anwendung von Kanban-Metriken. Das alles funktioniert seit vielen Jahren auch mit weltweit verteilten SAP-Teams – »Ja, aber …« hat als Argument somit ausgedient.AUS DEM INHALT //- SAP und Scrum – das geht doch nicht?- Die Grundlagen von Scrum- Mit verteilten SAP-Teams remote arbeiten- Mit agilen SAP-Teams starten- Skalierung mit dem Agile Working Model 4 SAP- Praktiken für fortgeschrittene agile SAP-Teams

Regulärer Preis: 39,99 €
Produktbild für Pro Cryptography and Cryptanalysis with C++20

Pro Cryptography and Cryptanalysis with C++20

Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic encryption), examine internal cryptographic mechanisms, and discover common ways in which the algorithms could be implemented and used correctly in practice.The authors avoid the complexities of the mathematical background by explaining its mathematical basis in terms that a programmer can easily understand. They show how “bad” cryptography creeps in during implementation and what “good” cryptography should look like. They do so by showing and comparing the advantages and disadvantages based on processing time, execution time, and reliability.WHAT YOU WILL LEARN* Understand where and why cryptography is used and how it gets misused * Discover what modern cryptography algorithms and methods are used for * Design and implement advanced cryptographic mechanisms * See how C++20 and its new features are impacting the future of implementing cryptographic algorithms* Practice the basics of public key cryptography, including ECDSA signatures and more* Find out how most of the algorithms can be brokenWHO THIS BOOK IS FORProfessional programmers, developers, and software engineers who are developing cryptography algorithms and security schemes/modules in C++. Prior C++ programming and IDE experience and some basic experience of cryptography concepts (symmetric and asymmetric) highly recommended.MARIUS IULIAN MIHAILESCU, PHD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, “Titu Maiorescu” University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructure, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.STEFANIA LOREDANA NITA, PHD is a software developer at the Institute of Computer Science of the Romanian Academy and a PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.Part I: Foundations1: Introduction2: Cryptography Fundamentals3: Mathematical Background and Its Applicability4: Large Integer Arithmetic5: Floating Point Arithmetic6: New Features in C++207: Secure Coding Guidelines8: Cryptography Libraries in C/C++20Part II: Pro Cryptography9: Elliptic Curve Cryptography10: Lattice-based Cryptography11: earchable Encryption12: Homomorphic Encryption13: (Ring) Learning with Errors Cryptography14: Chaos-based Cryptography15: Big Data Cryptography16:Cloud Computing CryptographyPart III: Pro Cryptanalysis17: Getting Started with Cryptanalysis18: Cryptanalysis Attacks and Techniques19: Linear and Differential Cryptanalysis20: Integral Cryptanalysis21: Brute Force and Buffer Overflow Attacks22: Text Characterization23: Implementation and Practical Approach of Cryptanalysis Methods

Regulärer Preis: 52,99 €
Produktbild für Machine Vision Inspection Systems, Machine Learning-Based Approaches

Machine Vision Inspection Systems, Machine Learning-Based Approaches

Machine Vision Inspection Systems (MVIS) is a multidisciplinary research field that emphasizes image processing, machine vision and, pattern recognition for industrial applications. Inspection techniques are generally used in destructive and non-destructive evaluation industry. Now a day's the current research on machine inspection gained more popularity among various researchers, because the manual assessment of the inspection may fail and turn into false assessment due to a large number of examining while inspection process.This volume 2 covers machine learning-based approaches in MVIS applications and it can be employed to a wide diversity of problems particularly in Non-Destructive testing (NDT), presence/absence detection, defect/fault detection (weld, textile, tiles, wood, etc.), automated vision test & measurement, pattern matching, optical character recognition & verification (OCR/OCV), natural language processing, medical diagnosis, etc. This edited book is designed to address various aspects of recent methodologies, concepts, and research plan out to the readers for giving more depth insights for perusing research on machine vision using machine learning-based approaches.MUTHUKUMARAN MALARVEL obtained his PhD in digital image processing and he is currently working as an associate professor in the Department of Computer Science and Engineering at Chitkara University, Punjab, India. His research interests include digital image processing, machine vision systems, image statistical analysis & feature extraction, and machine learning algorithms. SOUMYA RANJAN NAYAK obtained his PhD in computer science and engineering from the Biju Patnaik University of Technology, India. He has more than a decade of teaching and research experience and currently is working as an assistant professor, Amity University, Noida, India. His research interests include image analysis on fractal geometry, color and texture analysis jointly and separately. PRASANT KUMAR PATTNAIK PhD (Computer Science), Fellow IETE, Senior Member IEEE is a Professor at the School of Computer Engineering, KIIT Deemed to be University, Bhubaneswar, India. He has more than a decade of teaching and research experience. His areas of interest include mobile computing, cloud computing, cyber security, intelligent systems and brain computer interface. SURYA NARAYAN Panda is a Professor and Director Research at Chitkara University, Punjab, India. His areas of interest include cybersecurity, networking, advanced computer networks, machine learning, and artificial intelligence. He has developed the prototype of Smart Portable Intensive Care Unit through which the doctor can provide immediate virtual medical assistance to emergency cases in the ambulance. He is currently involved in designing different healthcare devices for real-time issues using AI and ML. Preface xiii1 MACHINE LEARNING-BASED VIRUS TYPE CLASSIFICATION USING TRANSMISSION ELECTRON MICROSCOPY VIRUS IMAGES 1Kalyan Kumar Jena, Sourav Kumar Bhoi, Soumya Ranjan Nayak and Chittaranjan Mallick1.1 Introduction 21.2 Related Works 31.3 Methodology 41.4 Results and Discussion 61.5 Conclusion 16References 162 CAPSULE NETWORKS FOR CHARACTER RECOGNITION IN LOW RESOURCE LANGUAGES 23C. Abeysinghe, I. Perera and D.A. Meedeniya2.1 Introduction 242.2 Background Study 252.2.1 Convolutional Neural Networks 252.2.2 Related Studies on One-Shot Learning 262.2.3 Character Recognition as a One-Shot Task 262.3 System Design 282.3.1 One-Shot Learning Implementation 312.3.2 Optimization and Learning 312.3.3 Dataset 322.3.4 Training Process 322.4 Experiments and Results 332.4.1 N-Way Classification 342.4.2 Within Language Classification 372.4.3 MNIST Classification 392.4.4 Sinhala Language Classification 412.5 Discussion 412.5.1 Study Contributions 412.5.2 Challenges and Future Research Directions 422.5.3 Conclusion 43References 433 AN INNOVATIVE EXTENDED METHOD OF OPTICAL PATTERN RECOGNITION FOR MEDICAL IMAGES WITH FIRM ACCURACY—4F SYSTEM-BASED MEDICAL OPTICAL PATTERN RECOGNITION 47Dhivya Priya E.L., D. Jeyabharathi, K.S. Lavanya, S. Thenmozhi, R. Udaiyakumar and A. Sharmila3.1 Introduction 483.1.1 Fourier Optics 483.2 Optical Signal Processing 503.2.1 Diffraction of Light 503.2.2 Biconvex Lens 513.2.3 4f System 513.2.4 Literature Survey 523.3 Extended Medical Optical Pattern Recognition 553.3.1 Optical Fourier Transform 553.3.2 Fourier Transform Using a Lens 553.3.3 Fourier Transform in the Far Field 563.3.4 Correlator Signal Processing 563.3.5 Image Formation in 4f System 573.3.6 Extended Medical Optical Pattern Recognition 583.4 Initial 4f System 593.4.1 Extended 4f System 593.4.2 Setup of 45 Degree 593.4.3 Database Creation 593.4.4 Superimposition of Diffracted Pattern 603.4.5 Image Plane 603.5 Simulation Output 603.5.1 MATLAB 603.5.2 Sample Input Images 613.5.3 Output Simulation 613.6 Complications in Real Time Implementation 643.6.1 Database Creation 643.6.2 Accuracy 653.6.3 Optical Setup 653.7 Future Enhancements 65References 654 BRAIN TUMOR DIAGNOSTIC SYSTEM— A DEEP LEARNING APPLICATION 69Kalaiselvi, T. and Padmapriya, S.T.4.1 Introduction 694.1.1 Intelligent Systems 694.1.2 Applied Mathematics in Machine Learning 704.1.3 Machine Learning Basics 724.1.4 Machine Learning Algorithms 734.2 Deep Learning 754.2.1 Evolution of Deep Learning 754.2.2 Deep Networks 764.2.3 Convolutional Neural Networks 774.3 Brain Tumor Diagnostic System 804.3.1 Brain Tumor 804.3.2 Methodology 804.3.3 Materials and Metrics 844.3.4 Results and Discussions 854.4 Computer-Aided Diagnostic Tool 864.5 Conclusion and Future Enhancements 87References 885 MACHINE LEARNING FOR OPTICAL CHARACTER RECOGNITION SYSTEM 91Gurwinder Kaur and Tanya Garg5.1 Introduction 915.2 Character Recognition Methods 925.3 Phases of Recognition System 935.3.1 Image Acquisition 935.3.2 Defining ROI 945.3.3 Pre-Processing 945.3.4 Character Segmentation 945.3.5 Skew Detection and Correction 955.3.6 Binarization 955.3.7 Noise Removal 975.3.8 Thinning 975.3.9 Representation 975.3.10 Feature Extraction 985.3.11 Training and Recognition 985.4 Post-Processing 1015.5 Performance Evaluation 1035.5.1 Recognition Rate 1035.5.2 Rejection Rate 1035.5.3 Error Rate 1035.6 Applications of OCR Systems 1045.7 Conclusion and Future Scope 105References 1056 SURFACE DEFECT DETECTION USING SVM-BASED MACHINE VISION SYSTEM WITH OPTIMIZED FEATURE 109Ashok Kumar Patel, Venkata Naresh Mandhala, Dinesh Kumar Anguraj and Soumya Ranjan Nayak6.1 Introduction 1106.2 Methodology 1136.2.1 Data Collection 1136.2.2 Data Pre-Processing 1136.2.3 Feature Extraction 1156.2.4 Feature Optimization 1166.2.5 Model Development 1196.2.6 Performance Evaluation 1206.3 Conclusion 123References 1247 COMPUTATIONAL LINGUISTICS-BASED TAMIL CHARACTER RECOGNITION SYSTEM FOR TEXT TO SPEECH CONVERSION 129Suriya, S., Balaji, M., Gowtham, T.M. and Rahul, Kumar S.7.1 Introduction 1307.2 Literature Survey 1307.3 Proposed Approach 1347.4 Design and Analysis 1347.5 Experimental Setup and Implementation 1367.6 Conclusion 151References 1518 A COMPARATIVE STUDY OF DIFFERENT CLASSIFIERS TO PROPOSE A GONN FOR BREAST CANCER DETECTION 155Ankita Tiwari, Bhawana Sahu, Jagalingam Pushaparaj and Muthukumaran Malarvel8.1 Introduction 1568.2 Methodology 1578.2.1 Dataset 1578.2.2 Linear Regression 1598.2.2.1 Correlation 1608.2.2.2 Covariance 1608.2.3 Classification Algorithm 1618.2.3.1 Support Vector Machine 1618.2.3.2 Random Forest Classifier 1628.2.3.3 K-Nearest Neighbor Classifier 1638.2.3.4 Decision Tree Classifier 1638.2.3.5 Multi-Layered Perceptron 1648.3 Results and Discussion 1658.4 Conclusion 169References 1699 MEXICAN SIGN-LANGUAGE STATIC-ALPHABET RECOGNITION USING 3D AFFINE INVARIANTS 171Guadalupe Carmona-Arroyo, Homero V. Rios-Figueroa and Martha Lorena Avendaño-Garrido9.1 Introduction 1719.2 Pattern Recognition 1759.2.1 3D Affine Invariants 1759.3 Experiments 1779.3.1 Participants 1799.3.2 Data Acquisition 1799.3.3 Data Augmentation 1799.3.4 Feature Extraction 1819.3.5 Classification 1819.4 Results 1829.4.1 Experiment 1 1829.4.2 Experiment 2 1849.4.3 Experiment 3 1849.5 Discussion 1889.6 Conclusion 189Acknowledgments 190References 19010 PERFORMANCE OF STEPPED BAR PLATE-COATED NANOLAYER OF A BOX SOLAR COOKER CONTROL BASED ON ADAPTIVE TREE TRAVERSAL ENERGY AND OSELM 193S. Shanmugan, F.A. Essa, J. Nagaraj and Shilpa Itnal10.1 Introduction 19410.2 Experimental Materials and Methodology 19610.2.1 Furious SiO2/TiO2 Nanoparticle Analysis of SSBC Performance Methods 19610.2.2 Introduction for OSELM by Use of Solar Cooker 19810.2.3 Online Sequential Extreme Learning Machine (OSELM) Approach for Solar Cooker 19910.2.4 OSELM Neural Network Adaptive Controller on Novel Design 19910.2.5 Binary Search Tree Analysis of Solar Cooker 20010.2.6 Tree Traversal of the Solar Cooker 20510.2.7 Simulation Model of Solar Cooker Results 20610.2.8 Program 20710.3 Results and Discussion 21010.4 Conclusion 212References 21411 APPLICATIONS TO RADIOGRAPHY AND THERMOGRAPHY FOR INSPECTION 219Inderjeet Singh Sandhu, Chanchal Kaushik and Mansi Chitkara11.1 Imaging Technology and Recent Advances 22011.2 Radiography and its Role 22011.3 History and Discovery of X-Rays 22111.4 Interaction of X-Rays With Matter 22211.5 Radiographic Image Quality 22211.6 Applications of Radiography 22511.6.1 Computed Radiography (CR)/Digital Radiography (DR) 22511.6.2 Fluoroscopy 22711.6.3 DEXA 22811.6.4 Computed Tomography 22911.6.5 Industrial Radiography 23111.6.6 Thermography 23411.6.7 Veterinary Imaging 23511.6.8 Destructive Testing 23511.6.9 Night Vision 23511.6.10 Conclusion 236References 23612 PREDICTION AND CLASSIFICATION OF BREAST CANCER USING DISCRIMINATIVE LEARNING MODELS AND TECHNIQUES 241M. Pavithra, R. Rajmohan, T. Ananth Kumar and R. Ramya12.1 Breast Cancer Diagnosis 24212.2 Breast Cancer Feature Extraction 24312.3 Machine Learning in Breast Cancer Classification 24512.4 Image Techniques in Breast Cancer Detection 24612.5 Dip-Based Breast Cancer Classification 24812.6 RCNNs in Breast Cancer Prediction 25512.7 Conclusion and Future Work 260References 26113 COMPRESSED MEDICAL IMAGE RETRIEVAL USING DATA MINING AND OPTIMIZED RECURRENT NEURAL NETWORK TECHNIQUES 263Vamsidhar Enireddy, Karthikeyan C., Rajesh Kumar T. and Ashok Bekkanti13.1 Introduction 26413.2 Related Work 26513.2.1 Approaches in Content-Based Image Retrieval (CBIR) 26513.2.2 Medical Image Compression 26613.2.3 Image Retrieval for Compressed Medical Images 26713.2.4 Feature Selection in CBIR 26813.2.5 CBIR Using Neural Network 26813.2.6 Classification of CBIR 26913.3 Methodology 26913.3.1 Huffman Coding 27013.3.2 Haar Wavelet 27113.3.3 Sobel Edge Detector 27313.3.4 Gabor Filter 27313.3.5 Proposed Hybrid CS-PSO Algorithm 27613.4 Results and Discussion 27713.5 Conclusion and Future Enhancement 28213.5.1 Conclusion 28213.5.2 Future Work 283References 28314 A NOVEL DISCRETE FIREFLY ALGORITHM FOR CONSTRAINED MULTI-OBJECTIVE SOFTWARE RELIABILITY ASSESSMENT OF DIGITAL RELAY 287Madhusudana Rao Nalluri, K. Kannan and Diptendu Sinha Roy14.1 Introduction 28814.2 A Brief Review of the Digital Relay Software 29114.3 Formulating the Constrained Multi-Objective Optimization of Software Redundancy Allocation Problem (CMOO-SRAP) 29314.3.1 Mathematical Formulation 29414.4 The Novel Discrete Firefly Algorithm for Constrained Multi-Objective Software Reliability Assessment of Digital Relay 29714.4.1 Basic Firefly Algorithm 29814.4.2 The Modified Discrete Firefly Algorithm 29914.4.2.1 Generating Initial Population 29914.4.2.2 Improving Solutions 29914.4.2.3 Illustrative Example 30114.4.3 Similarity-Based Parent Selection (SBPS) 30314.4.4 Solution Encoding for the CMOO-SRAP for Digital Relay Software 30514.5 Simulation Study and Results 30514.5.1 Simulation Environment 30514.5.2 Simulation Parameters 30614.5.3 Configuration of Solution Vectors for the CMOOSRAP for Digital Relay 30614.5.4 Results and Discussion 30614.6 Conclusion 317References 317Index 323

Regulärer Preis: 197,99 €
Produktbild für Blockchain for Business

Blockchain for Business

The book focuses on the power of business blockchain. It gives an overview of blockchain in traditional business, marketing, accounting and business intelligence. The book provides a detailed working knowedge of blockchain, user cases of blockchain in business, cryptocurrency and Initial Coin Offering(ICO) along with the risks associated with them. The book also covers the detailed study of decentralization, mining, consensus, smart contracts, concepts and working of distributed ledgers and hyper ledgers as well as many other important concepts. It also details the security and privacy aspects of blockchain.The book is beneficial for readers who are preparing for their business careers, those who are working with small scale businesses and startups, and helpful for business executives, managers, entrepreneurs, bankers, government officials and legal professionals who are looking to blockchain for secure financial transactions. The book will also be beneficial for researchers and students who want to study the latest developments of blockchain.S.S. TYAGI is a Professor of Computer Engineering and Dean at Manav Rachna International Institute of Research & Studies, Faridabad, India. He obtained his PhD from Kururkshetra University in 2010 in Computer Technology. He has more than 28 years of teaching and research experience and has authored many research publications in high indexed journals. SHAVETA BHATIA is Professor of Faculty of Computer Applications, Manav Rachna International Institute of Research & Studies. She has more than 17 years of academic and research experience. She has authored many research papers and published over a span of her teaching career in various reputed journals and conferences. Preface xv1 INTRODUCTION TO BLOCKCHAIN 1Akshay Mudgal1.1 Introduction 11.1.1 Public Blockchain Architecture 51.1.2 Private Blockchain Architecture 51.1.3 Consortium Blockchain Architecture 51.2 The Privacy Challenges of Blockchain 61.3 De-Anonymization 81.3.1 Analysis of Network 91.3.2 Transaction Fingerprinting 91.3.3 DoS Attacks 91.3.4 Sybil Attacks 91.4 Transaction Pattern Exposure 101.4.1 Transaction Graph Analysis 101.4.2 AS-Level Deployment Analysis 101.5 Methodology: Identity Privacy Preservation 101.5.1 Mixing Services 101.5.2 Ring Signature 121.6 Decentralization Challenges Exist in Blockchain 141.7 Conclusion 151.8 Regulatory Challenges 161.9 Obstacles to Blockchain Regulation 161.10 The Current Regulatory Landscape 171.11 The Future of Blockchain Regulation 181.12 Business Model Challenges 191.12.1 Traditional Business Models 191.12.2 Manufacturer 191.12.3 Distributor 201.12.4 Retailer 201.12.5 Franchise 201.13 Utility Token Model 201.13.1 Right 211.13.2 Value Exchange 211.13.3 Toll 211.13.4 Function 211.13.5 Currency 221.13.6 Earning 221.14 Blockchain as a Service 221.15 Securities 231.16 Development Platforms 241.17 Scandals and Public Perceptions 251.17.1 Privacy Limitations 261.17.2 Lack of Regulations and Governance 261.17.3 Cost to Set Up 261.17.4 Huge Consumption of Energy 261.17.5 Public Perception 27References 272 THE SCOPE FOR BLOCKCHAIN ECOSYSTEM 29Manisha Suri2.1 Introduction 302.2 Blockchain as Game Changer for Environment 322.3 Blockchain in Business Ecosystem 382.3.1 Business Ecosystem 392.3.1.1 What Is Business Model? 392.3.1.2 Business Model—Traditional 392.3.2 Are Blockchain Business Models Really Needed? 412.3.2.1 Blockchain Business Model 412.3.2.2 Model 1: Utility Token Model 412.3.2.3 Model 2: BaaS 432.3.2.4 Model 3: Securities 442.3.2.5 Model 4: Development Platforms 452.3.2.6 Model 5: Blockchain-Based Software Products 462.3.2.7 Model 6: Blockchain Professional Services 462.3.2.8 Model 7: Business Model—P2P 472.4 Is Blockchain Business Ecosystem Profitable? 482.5 How Do You “Design” a Business Ecosystem? 492.6 Redesigning Future With Blockchain 532.6.1 Is Earth Prepared for Blockchain? 532.7 Challenges and Opportunities 57References 583 BUSINESS USE CASES OF BLOCKCHAIN TECHNOLOGY 59Vasudha Arora, Shweta Mongia, Sugandha Sharma and Shaveta Malik3.1 Introduction to Cryptocurrency 603.2 What is a Bitcoin? 603.2.1 Bitcoin Transactions and Their Processing 623.2.2 Double Spending Problem 653.2.3 Bitcoin Mining 673.3 Bitcoin ICO 693.3.1 ICO Token 693.3.2 How to Participate in ICO 703.3.3 Types of Tokens 713.4 Advantages and Disadvantages of ICO 723.5 Merchant Acceptance of Bitcoin 73References 754 ETHEREUM 77Shaveta Bhatia and S.S Tyagi4.1 Introduction 784.2 Basic Features of Ethereum 784.3 Difference between Bitcoin and Ethereum 794.4 EVM (Ethereum Virtual Machine) 824.5 Gas 854.5.1 Gas Price Chart 854.6 Applications Built on the Basis of Ethereum 864.7 ETH 874.7.1 Why Users Want to Buy ETH? 874.7.2 How to Buy ETH? 884.7.3 Alternate Way to Buy ETH 884.7.4 Conversion of ETH to US Dollar 894.8 Smart Contracts 904.8.1 Government 904.8.2 Management 914.8.3 Benefits of Smart Contracts 914.8.4 Problems With Smart Contracts 924.8.5 Solution to Overcome This Problem 924.8.6 Languages to Build Smart Contracts 924.9 DApp (Decentralized Application or Smart Contract) 934.9.1 DApp in Ethereum 934.9.2 Applications of DApps 934.10 Conclusion 95References 955 E-WALLET 97Ms. Vishawjyoti5.1 Overview of Wallet Technology 975.2 Types of Wallet 985.2.1 Paper 985.2.2 Physical Bitcoins 995.2.3 Mobile 995.2.4 Web 1005.2.5 Desktop 1005.2.6 Hardware 1005.2.7 Bank 1015.3 Security of Bitcoin Wallets 1015.4 Workings of Wallet Technology 1015.5 Create HD Wallet From Seed 1025.5.1 Initiation 1035.5.2 Steps for Creating an HD Wallet From a 24-Word Seed Phrase Through Particl-qt Tool 1045.5.3 Steps for Encrypting the HD Wallet 1065.5.4 Utilization 1085.5.5 Steps for Generating Address to Access Transactions on the HD Wallet 1085.6 Navigating HD Wallet 1095.7 Conclusion 110References 1106 BLOCKCHAIN AND GOVERNANCE: THEORY, APPLICATIONS AND CHALLENGES 113Bhavya Ahuja Grover, Bhawna Chaudhary, Nikhil Kumar Rajput and Om Dukiya6.1 Introduction 1146.2 Governance: Centralized vs Decentralized 1156.3 Blockchain’s Features Supportive of Decentralization 1176.4 Noteworthy Application Areas for Blockchain-Based Governance 1196.4.1 Public Service Governance 1196.4.2 Knowledge and Shared Governance 1216.4.3 Governance in Supply Chain 1236.4.4 Governance of Foreign Aid 1246.4.5 Environmental Governance 1256.4.6 Corporate Governance 1266.4.7 Economic Governance 1286.5 Scopes and Challenges 1286.6 Conclusion 136References 1377 BLOCKCHAIN-BASED IDENTITY MANAGEMENT 141Abhishek Bhattacharya7.1 Introduction 1417.2 Existing Identity Management Systems and Their Challenges 1427.3 Concept of Decentralized Identifiers 1447.4 The Workflow of Blockchain Identity Management Systems 1457.5 How Does it Contribute to Data Security? 1487.6 Trending Blockchain Identity Management Projects 1507.7 Why and How of Revocation 1527.8 Points to Ponder 1547.8.1 Comparison Between Traditional and Blockchain-Based Identity Management Systems 1567.9 Conclusion 157References 1588 BLOCKCHAIN & IOT: A PARADIGM SHIFT FOR SUPPLY CHAIN MANAGEMENT 159Abhishek Bhattacharya8.1 Introduction 1598.2 Supply Chain Management 1608.2.1 The Aspects of a Supply Chain 1618.2.2 Supply Chain Performance Dimensions 1628.2.3 Supply Chain Migration Towards Digitalization 1638.3 Blockchain and IoT 1648.3.1 What Makes Blockchain Suitable for SCM? 1668.3.1.1 Shared Ledger 1678.3.1.2 Permissions 1688.3.1.3 Consensus 1688.3.1.4 Smart Contracts 1698.3.2 The Role of Blockchain in Achieving the SCM Performance Dimensions 1708.3.3 The Role of IoT in the Implementation of Blockchain Technology 1718.4 Blockchain Technology and IoT Use Cases in Supply Chain Management 1728.5 Benefits and Challenges in Blockchain-Based Supply Chain Management 1738.6 Conclusion 176References 1769 BLOCKCHAIN-ENABLED SUPPLY CHAIN MANAGEMENT SYSTEM 179Sonal Pathak9.1 Introduction 1809.1.1 Supply Chain Management 1809.2 Blockchain Technology 1849.3 Blockchain Technology in Supply Chain Management 1869.4 Elements of Blockchain That Affects Supply Chain 1909.4.1 Bitcoin 1959.5 Challenges in Implementation of Blockchain-Enabled Supply Chain 1979.6 Conclusion 197References 19910 SECURITY CONCERNS OF BLOCKCHAIN 201Neha Jain and Kamiya Chugh10.1 Introduction: Security Concerns of Blockchain 20110.2 Cryptocurrencies Scenarios 20210.3 Privacy Challenges of Blockchain 20310.3.1 Protection Problems in Blockchain 20310.3.2 Privacy-Preserving Mechanisms Analysis 20710.3.3 Data Anonymization-Mixing 20710.4 Decentralization in Blockchain 20810.4.1 Role of Decentralization in Blockchain 20910.4.2 Analysis of PoS and DPoS 21010.4.3 Problems With Decentralization 21010.4.4 Decentralization Recovery Methods 21210.5 Legal and Regulatory Issues in Blockchain 21310.5.1 Legal Value of Blockchain and its Problems 21410.6 Smart Contracts 21810.7 Scandals of Blockchain 22010.7.1 Blockchain Technologies as Stumbling Blocks to Financial Legitimacy 22310.8 Is Blockchain the Rise of Trustless Trust? 22310.8.1 Why Do We Need a System of Trust? 22610.9 Blockchain Model Challenges 227References 22911 ACCEPTANCE AND ADOPTION OF BLOCKCHAIN TECHNOLOGY: AN EXAMINATION OF THE SECURITY & PRIVACY CHALLENGES 231Amandeep Dhaliwal and Sahil Malik11.1 Introduction 23111.1.1 Research Methodology 23311.1.2 Analysis 23311.2 Security Issues of Blockchain 23311.2.1 The Majority Attack (51% Attacks) 23311.2.2 The Fork Problems 23411.2.2.1 Hard Fork 23411.2.2.2 Soft Fork 23511.2.3 Scale of Blockchain 23511.2.4 Time Confirmation of Blockchain Data— Double-Spend Attack/Race Attack 23511.2.5 Current Regulations Problems 23611.2.6 Scalability and Storage Capacity 23611.2.7 DOS Attack/Sybil Attack/Eclipse Attack/Bugs 23711.2.8 Legal Issues 23711.2.9 Security of Wallets 23811.2.10 The Increased Computing Power 23811.3 Privacy Challenges of Bitcoin 23811.3.1 De-Anonymization 23911.3.1.1 Network Analysis 23911.3.1.2 Address Clustering 23911.3.1.3 Transaction Finger Printing 24011.3.2 Transaction Pattern Exposure 24011.3.2.1 Transaction Graph Analysis 24011.3.2.2 Autonomous System-Level Deployment Analysis 24111.4 Blockchain Application-Based Solutions 24111.4.1 Bitcoins 24111.4.2 IoT 24211.4.2.1 MyBit 24211.4.3 Aero Token 24211.4.4 The Chain of Things 24311.4.5 The Modum 24311.4.6 Twin of Things 24311.4.7 The Blockchain of Things 24411.4.8 Blockchain Solutions: Cloud Computing 24411.5 Conclusion and Future Work 245References 24512 DEFICIENCIES IN BLOCKCHAIN TECHNOLOGY AND POTENTIAL AUGMENTATION IN CYBER SECURITY 251Eshan Bajal, Madhulika Bhatia, Lata Nautiyal and Madhurima Hooda12.1 Introduction 25212.2 Security Issues in Blockchain Technology 25212.3 Privacy Challenges 25312.3.1 BGP Hijacking Attack 25512.3.2 BDoS (Blockchain Denial of Service) 25512.3.3 Forcing Other Miners to Stop Mining 25612.4 Decentralization Challenges 25612.5 Regulatory Challenges 26012.5.1 Principles to Follow While Regulating 26212.5.1.1 Flexible to Legal Innovation 26212.5.1.2 Experimentation Should be Encouraged 26312.5.1.3 Focus on the Immediate Implications 26412.5.1.4 Regulators Should Engage in a Transnational Conversation 26412.5.2 Regulatory Strategies 26512.5.2.1 Wait-and-See 26512.5.2.2 Imposing Narrowing and Broadening Guidance 26612.5.2.3 Sandboxing 26612.5.2.4 Issue a New Legislation 26712.5.2.5 Use Blockchain in Regulation 26812.6 Business Model Challenges 26912.7 Scandals and Public Perception 27112.8 Why Blockchain is Trustless 27712.8.1 Trust Mechanism 27812.8.2 Anonymity 27912.8.3 Use in Digital Wallets 27912.8.4 Forgery Resistance 27912.9 Use of Blockchain in Cybersecurity 28012.9.1 Blockchain Database 28112.9.2 DNS Security 28312.9.3 IoT Security 28312.9.4 DDoS Prevention 28612.9.5 CDN (Content Delivery Network) 28612.9.6 SMS Authentication 287References 28813 INTERNET OF THINGS AND BLOCKCHAIN 295Priyanka Sharma13.1 History of ‘Internet of Things’ 29613.2 IoT Devices 29813.3 Sensors and Actuators 30213.4 Cloud and Haze-Based Engineering 30713.5 Blockchain and IoT 31513.6 Edge Computing 32113.7 Contextual Analyses 32413.8 Fate of Blockchain and IoT 332References 33214 BLOCKCHAIN APPLICATIONS 337Boby Singh, Rohit Pahwa, Hari Om Tanwar and Nikita Gupta14.1 Introduction to Blockchain 33714.1.1 Uses of Blockchain in Administration 33914.2 Blockchain in Big Data Predictive Task Automation 34014.2.1 How Can Blockchain Help Big Data? 34114.2.2 Blockchain Use Cases in Big Data 34114.3 Digital Identity Verification 34214.3.1 Why Digital Identity Matters? 34314.3.2 Blockchain (Definition and its Features) 34314.3.3 Why do we Need Blockchain in Digital Identity? 34414.3.4 How Does a Blockchain Works? 34514.3.5 Why is a Blockchain Secure? 34514.3.6 What’s Blockchain Identification Management? 34614.3.7 Advantages 34714.4 Blockchain Government 34814.4.1 Decentralized Government Services 34914.4.2 Liquid Democracy and Random Sample Election 35014.5 Blockchain Science 35114.5.1 FoldingCoin 35114.5.2 GridCoin (GRC) 35214.5.3 Global Public Health 35314.5.4 Bitcoin Genomics 35414.6 Blockchain Health 35514.6.1 Health Coin 35514.6.2 EMR on Blockchain 35514.6.3 Bit Coin Health Notary 35614.7 Blockchain Learning 35714.7.1 Bitcoin MOOCs 35714.7.2 Smart Contract Literacy 35714.7.3 LearnCoin 359References 35915 ADVANCE CONCEPTS OF BLOCKCHAIN 361Raj Kumar15.1 Community Supercomputing 36115.2 Blockchain Genomics 36415.3 Blockchain Learning 36515.4 Community Coin 36615.4.1 Monetary and Non-Monetary Currencies 36715.4.2 Difference Between Monetary and Non-Monetary Assets 36915.4.3 Currency Multiplicity 36915.4.4 List of Some Prominent Alternate Coins is Given Below 37015.5 Demurrage Currencies 371Reading List 371Index 373

Regulärer Preis: 152,99 €
Produktbild für Deep Learning with Swift for TensorFlow

Deep Learning with Swift for TensorFlow

ABOUT THIS BOOKDiscover more insight about deep learning algorithms with Swift for TensorFlow. The Swift language was designed by Apple for optimized performance and development whereas TensorFlow library was designed by Google for advanced machine learning research. Swift for TensorFlow is a combination of both with support for modern hardware accelerators and more. This book covers the deep learning concepts from fundamentals to advanced research. It also introduces the Swift language for beginners in programming. This book is well suited for newcomers and experts in programming and deep learning alike. After reading this book you should be able to program various state-of-the-art deep learning algorithms yourself.The book covers foundational concepts of machine learning. It also introduces the mathematics required to understand deep learning. Swift language is introduced such that it allows beginners and researchers to understand programming and easily transit to Swift for TensorFlow, respectively. You will understand the nuts and bolts of building and training neural networks, and build advanced algorithms.WHAT YOU’LL LEARN• Understand deep learning concepts• Program various deep learning algorithms• Run the algorithms in cloudWHO THIS BOOK IS FOR• Newcomers to programming and/or deep learning, and experienced developers.• Experienced deep learning practitioners and researchers who desire to work in user space instead of library space with a same programming language without compromising the speedRahul Bhalley is an independent machine intelligence researcher. He was the co-founder of a short-lived deep learning startup in 2018. He has published research papers in areas such as speech processing and generative modeling. He actively contributes to open source projects related to deep learning on GitHub. He has also worked with Apple's Swift and shares Google's vision of making it easy for others to understand deep learning with Swift.Chapter 1: Machine Learning BasicsChapter 2: Essential MathChapter 3: Differential ProgrammingChapter 4: TensorFlow BasicsChapter 5: Neural NetworksChapter 6: Computer Vision

Regulärer Preis: 62,99 €
Produktbild für TensorFlow 2.x in the Colaboratory Cloud

TensorFlow 2.x in the Colaboratory Cloud

Use TensorFlow 2.x with Google's Colaboratory (Colab) product that offers a free cloud service for Python programmers. Colab is especially well suited as a platform for TensorFlow 2.x deep learning applications. You will learn Colab’s default install of the most current TensorFlow 2.x along with Colab’s easy access to on-demand GPU hardware acceleration in the cloud for fast execution of deep learning models. This book offers you the opportunity to grasp deep learning in an applied manner with the only requirement being an Internet connection. Everything else—Python, TensorFlow 2.x, GPU support, and Jupyter Notebooks—is provided and ready to go from Colab.The book begins with an introduction to TensorFlow 2.x and the Google Colab cloud service. You will learn how to provision a workspace on Google Colab and build a simple neural network application. From there you will progress into TensorFlow datasets and building input pipelines in support of modeling and testing. You will find coverage of deep learning classification and regression, with clear code examples showing how to perform each of those functions. Advanced topics covered in the book include convolutional neural networks and recurrent neural networks.This book contains all the applied math and programming you need to master the content. Examples range from simple to relatively complex when necessary to ensure acquisition of appropriate deep learning concepts and constructs. Examples are carefully explained, concise, accurate, and complete to perfectly complement deep learning skill development. Care is taken to walk you through the foundational principles of deep learning through clear examples written in Python that you can try out and experiment with using Google Colab from the comfort of your own home or office.WHAT YOU WILL LEARN* Be familiar with the basic concepts and constructs of applied deep learning* Create machine learning models with clean and reliable Python code* Work with datasets common to deep learning applications* Prepare data for TensorFlow consumption* Take advantage of Google Colab’s built-in support for deep learning* Execute deep learning experiments using a variety of neural network models* Be able to mount Google Colab directly to your Google Drive account* Visualize training versus test performance to see model fitWHO THIS BOOK IS FORReaders who want to learn the highly popular TensorFlow 2.x deep learning platform, those who wish to master deep learning fundamentals that are sometimes skipped over in the rush to be productive, and those looking to build competency with a modern cloud service tool such as Google ColabDR. DAVID PAPER is a full professor at Utah State University (USU) in the Management Information Systems department. He has over 30 years of higher education teaching experience. At USU, he has over 26 years teaching in the classroom and distance education over satellite. Dr. Paper has taught a variety of classes at the undergraduate, graduate, and doctorate levels, but he specializes in technology education. He has competency in several programming languages, but his focus is currently on deep learning (Python) and database programming (PyMongo). Dr. Paper has published three technical books for industry professionals, including Web Programming for Business: PHP Object-Oriented Programming with Oracle, Data Science Fundamentals for Python and MongoDB (Apress), and Hands-on Scikit-Learn for Machine Learning Applications: Data Science Fundamentals with Python (Apress). He has authored more than 100 academic publications. Besides growing up in family businesses, Dr. Paper has worked for Texas Instruments, DLS, Inc., and the Phoenix Small Business Administration. He has performed IS consulting work for IBM, AT&T, Octel, Utah Department of Transportation, and the Space Dynamics Laboratory. 1. Introduction to Deep Learning2. Build Your First Neural Network with Google Colab3. Working with TensorFlow Data4. Working with Other Data5. Classification6. Regression7. Convolutional Neural Networks8. Automated Text Generation9. Sentiment Analysis10. Time Series Forecasting with RNNs

Regulärer Preis: 56,99 €
Produktbild für Hands-on Question Answering Systems with BERT

Hands-on Question Answering Systems with BERT

Get hands-on knowledge of how BERT (Bidirectional Encoder Representations from Transformers) can be used to develop question answering (QA) systems by using natural language processing (NLP) and deep learning.The book begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural language understanding with tokenization, stemming, and lemmatization, and bag of words. Next, you’ll look at neural networks for NLP starting with its variants such as recurrent neural networks, encoders and decoders, bi-directional encoders and decoders, and transformer models. Along the way, you’ll cover word embedding and their types along with the basics of BERT.After this solid foundation, you’ll be ready to take a deep dive into BERT algorithms such as masked language models and next sentence prediction. You’ll see different BERT variations followed by a hands-on example of a question answering system.Hands-on Question Answering Systems with BERT is a good starting point for developers and data scientists who want to develop and design NLP systems using BERT. It provides step-by-step guidance for using BERT.WHAT YOU WILL LEARN* Examine the fundamentals of word embeddings* Apply neural networks and BERT for various NLP tasksDevelop a question-answering system from scratch* Train question-answering systems for your own dataWHO THIS BOOK IS FORAI and machine learning developers and natural language processing developers.Navin is the chief architect for HCL DryICE Autonomics. He is an innovator, thought leader, author, and consultant in the areas of AI, machine learning, cloud computing, big data analytics, and software product development. He is responsible for IP development and service delivery in the areas of AI and machine learning, automation, AIOPS, public cloud GCP, AWS, and Microsoft Azure. Navin has authored 15+ books in the areas of cloud computing , cognitive virtual agents, IBM Watson, GCP, containers, and microservices.Amit Agrawal is a senior data scientist and researcher delivering solutions in the fields of AI and machine learning. He is responsible for designing end-to-end solutions and architecture for enterprise products. He has also authored and reviewed books in the area of cognitive virtual assistants.Chapter 1: Introduction to Natural Language ProcessingChapter Goal: To introduce basics of natural language processing1.1 What is natural language processing1.2 What is natural language understanding1.3 Natural language processing tasks1.3.1 Tokenization1.3.2 Stemming and lemmatization1.3.3 Bag of words1.3.4 Word / Sentence vectorizationChapter 2: Introduction to Word EmbeddingsChapter Goal: To introduce the basics of word embeddings3.1 What is word embeddings3.2 Different methods of word embeddings3.2.1 Word2vec3.2.2 Glove3.2.3 Elmo3.2.4 Universal sentence encoders3.2.5 BERT3.3 Bidirectional Encoder Representations from Transformers (BERT)3.3.1 BERT – base3.3.2 BERT - largeChapter 3: BERT Algorithms ExplainedChapter Goal: Details on BERT model algorithms4.1 Masked language model4.2 Next sentence prediction (NSP)4.3 Text classification using BERT4.4 Various types of BERT based models4.4.1 ALBERT4.4.2 ROBERT4.4.3 DistilBERTChapter 4: BERT Model Applications - Question Answering SystemChapter Goal: Details on question answering system5.1 Introduction5.2 Types of QA systems5.3 QA system design using BERT5.4 DrQA system5.5 DeepPavlov QA systemChapter 5: BERT Model Applications - Other tasksChapter Goal: Details on NLP tasks performed by BERT.6.1 Introduction6.2 Other NLP Tasks:6.2.1 Sentiment analysis6.2.2. Named entity recognition6.2.3 Tag generation6.2.4 Classification6.2.5 Text summarization6.2.6 Language translationChapter 6: Future of BERT modelsChapter Goal: Provides an introduction to the new advances in the areas NLP using BERT7.1 BERT - Future capabilities

Regulärer Preis: 46,99 €
Produktbild für Intelligent Data Analytics for Terror Threat Prediction

Intelligent Data Analytics for Terror Threat Prediction

Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis.This book provides innovative insights that will help obtain interventions to undertake emerging dynamic scenarios of criminal activities. Furthermore, it presents emerging issues, challenges and management strategies in public safety and crime control development across various domains. The book will play a vital role in improvising human life to a great extent. Researchers and practitioners working in the fields of data mining, machine learning and artificial intelligence will greatly benefit from this book, which will be a good addition to the state-of-the-art approaches collected for intelligent data analytics. It will also be very beneficial for those who are new to the field and need to quickly become acquainted with the best performing methods. With this book they will be able to compare different approaches and carry forward their research in the most important areas of this field, which has a direct impact on the betterment of human life by maintaining the security of our society. No other book is currently on the market which provides such a good collection of state-of-the-art methods for intelligent data analytics-based models for terror threat prediction, as intelligent data analytics is a newly emerging field and research in data mining and machine learning is still in the early stage of development.SUBHENDU KUMAR PANI received his PhD from Utkal University Odisha, India in 2013. He is a professor in the Department of Computer Science & Engineering, Orissa Engineering College (OEC), Bhubaneswar, India. He has published more than 50 articles in international journals, authored 5 books and edited 2 volumes. SANJAY KUMAR SINGH is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Varanasi. He has published more than 130 international publications, 4 edited books and 2 patents. LALIT GARG received his PhD from the University of Ulster, UK in Computing and Information Engineering. He is a senior lecturer in Computer Information Systems, University of Malta, Malta. RAM BILAS PACHORI received his PhD degree in Electrical Engineering from the Indian Institute of Technology (IIT) Kanpur, India in 2008. He is now a professor of Electrical Engineering, IIT Indore, India. He has more than 170 publications which include journal papers, conference papers, books, and book chapters. XIAOBO ZHANG obtained his Master of Computer Science, Doctor of Engineering (Control Theory and Control Engineering) and is now working in the Internet of Things Department of Automation, Guangdong University of Technology, China. He has published more than 30 journal articles, edited 3 books, and has applied for more than 40 invention patents and obtained 6 software copyrights. Preface xv1 RUMOR DETECTION AND TRACING ITS SOURCE TO PREVENT CYBER-CRIMES ON SOCIAL MEDIA 1Ravi Kishore Devarapalli and Anupam Biswas1.1 Introduction 21.2 Social Networks 41.2.1 Types of Social Networks 41.3 What is Cyber-Crime? 71.3.1 Definition 71.3.2 Types of Cyber-Crimes 71.3.2.1 Hacking 71.3.2.2 Cyber Bullying 71.3.2.3 Buying Illegal Things 81.3.2.4 Posting Videos of Criminal Activity 81.3.3 Cyber-Crimes on Social Networks 81.4 Rumor Detection 91.4.1 Models 91.4.1.1 Naïve Bayes Classifier 101.4.1.2 Support Vector Machine 131.4.2 Combating Misinformation on Instagram 141.5 Factors to Detect Rumor Source 151.5.1 Network Structure 151.5.1.1 Network Topology 161.5.1.2 Network Observation 161.5.2 Diffusion Models 181.5.2.1 SI Model 181.5.2.2 SIS Model 191.5.2.3 SIR Model 191.5.2.4 SIRS Model 201.5.3 Centrality Measures 211.5.3.1 Degree Centrality 211.5.3.2 Closeness Centrality 211.5.3.3 Betweenness Centrality 221.6 Source Detection in Network 221.6.1 Single Source Detection 231.6.1.1 Network Observation 231.6.1.2 Query-Based Approach 251.6.1.3 Anti-Rumor-Based Approach 261.6.2 Multiple Source Detection 261.7 Conclusion 27References 282 INTERNET OF THINGS (IOT) AND MACHINE TO MACHINE (M2M) COMMUNICATION TECHNIQUES FOR CYBER CRIME PREDICTION 31Jaiprakash Narain Dwivedi2.1 Introduction 322.2 Advancement of Internet 332.3 Internet of Things (IoT) and Machine to Machine (M2M) Communication 342.4 A Definition of Security Frameworks 382.5 M2M Devices and Smartphone Technology 392.6 Explicit Hazards to M2M Devices Declared by Smartphone Challenges 412.7 Security and Privacy Issues in IoT 432.7.1 Dynamicity and Heterogeneity 432.7.2 Security for Integrated Operational World with Digital World 442.7.3 Information Safety with Equipment Security 442.7.4 Data Source Information 442.7.5 Information Confidentiality 442.7.6 Trust Arrangement 442.8 Protection in Machine to Machine Communication 482.9 Use Cases for M2M Portability 522.10 Conclusion 53References 543 CRIME PREDICTIVE MODEL USING BIG DATA ANALYTICS 57Hemanta Kumar Bhuyan and Subhendu Kumar Pani3.1 Introduction 583.1.1 Geographic Information System (GIS) 593.2 Crime Data Mining 603.2.1 Different Methods for Crime Data Analysis 623.3 Visual Data Analysis 633.4 Technological Analysis 653.4.1 Hadoop and MapReduce 653.4.1.1 Hadoop Distributed File System (HDFS) 653.4.1.2 MapReduce 653.4.2 Hive 673.4.2.1 Analysis of Crime Data using Hive 673.4.2.2 Data Analytic Module With Hive 683.4.3 Sqoop 683.4.3.1 Pre-Processing and Sqoop 683.4.3.2 Data Migration Module With Sqoop 683.4.3.3 Partitioning 683.4.3.4 Bucketing 683.4.3.5 R-Tool Analyse Crime Data 693.4.3.6 Correlation Matrix 693.5 Big Data Framework 693.6 Architecture for Crime Technical Model 723.7 Challenges 733.8 Conclusions 74References 754 THE ROLE OF REMOTE SENSING AND GIS IN MILITARY STRATEGY TO PREVENT TERROR ATTACKS 79Sushobhan Majumdar4.1 Introduction 804.2 Database and Methods 814.3 Discussion and Analysis 824.4 Role of Remote Sensing and GIS 834.5 Cartographic Model 834.5.1 Spatial Data Management 854.5.2 Battlefield Management 854.5.3 Terrain Analysis 864.6 Mapping Techniques Used for Defense Purposes 874.7 Naval Operations 884.7.1 Air Operations 894.7.2 GIS Potential in Military 894.8 Future Sphere of GIS in Military Science 894.8.1 Defense Site Management 904.8.2 Spatial Data Management 904.8.3 Intelligence Capability Approach 904.8.4 Data Converts Into Information 904.8.5 Defense Estate Management 914.9 Terrain Evolution 914.9.1 Problems Regarding the Uses of Remote Sensing and GIS 914.9.2 Recommendations 924.10 Conclusion 92References 935 TEXT MINING FOR SECURE CYBER SPACE 95Supriya Raheja and Geetika Munjal5.1 Introduction 955.2 Literature Review 975.2.1 Text Mining With Latent Semantic Analysis 1005.3 Latent Semantic Analysis 1015.4 Proposed Work 1025.5 Detailed Work Flow of Proposed Approach 1045.5.1 Defining the Stop Words 1065.5.2 Stemming 1075.5.3 Proposed Algorithm: A Hybrid Approach 1095.6 Results and Discussion 1115.6.1 Analysis Using Hybrid Approach 1115.7 Conclusion 115References 1156 ANALYSES ON ARTIFICIAL INTELLIGENCE FRAMEWORK TO DETECT CRIME PATTERN 119R. Arshath Raja, N. Yuvaraj and N.V. Kousik6.1 Introduction 1206.2 Related Works 1216.3 Proposed Clustering for Detecting Crimes 1226.3.1 Data Pre-Processing 1236.3.2 Object-Oriented Model 1246.3.3 MCML Classification 1246.3.4 GAA 1246.3.5 Consensus Clustering 1246.4 Performance Evaluation 1246.4.1 Precision 1256.4.2 Sensitivity 1256.4.3 Specificity 1316.4.4 Accuracy 1316.5 Conclusions 131References 1327 A BIOMETRIC TECHNOLOGY-BASED FRAMEWORK FOR TACKLING AND PREVENTING CRIMES 133Ebrahim A.M. Alrahawe, Vikas T. Humbe and G.N. Shinde7.1 Introduction 1347.2 Biometrics 1357.2.1 Biometric Systems Technologies 1377.2.2 Biometric Recognition Framework 1417.2.3 Biometric Applications/Usages 1427.3 Surveillance Systems (CCTV) 1447.3.1 CCTV Goals 1467.3.2 CCTV Processes 1467.3.3 Fusion of Data From Multiple Cameras 1497.3.4 Expanding the Use of CCTV 1497.3.5 CCTV Effectiveness 1507.3.6 CCTV Limitations 1507.3.7 Privacy and CCTV 1507.4 Legality to Surveillance and Biometrics vs. Privacy and Human Rights 1517.5 Proposed Work (Biometric-Based CCTV System) 1537.5.1 Biometric Surveillance System 1547.5.1.1 System Component and Flow Diagram 1547.5.2 Framework 1567.6 Conclusion 158References 1598 RULE-BASED APPROACH FOR BOTNET BEHAVIOR ANALYSIS 161Supriya Raheja, Geetika Munjal, Jyoti Jangra and Rakesh Garg8.1 Introduction 1618.2 State-of-the-Art 1638.3 Bots and Botnets 1668.3.1 Botnet Life Cycle 1668.3.2 Botnet Detection Techniques 1678.3.3 Communication Architecture 1688.4 Methodology 1718.5 Results and Analysis 1758.6 Conclusion and Future Scope 177References 1779 SECURING BIOMETRIC FRAMEWORK WITH CRYPTANALYSIS 181Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma and Martin Sagayam9.1 Introduction 1829.2 Basics of Biometric Systems 1849.2.1 Face 1859.2.2 Hand Geometry 1869.2.3 Fingerprint 1879.2.4 Voice Detection 1879.2.5 Iris 1889.2.6 Signature 1899.2.7 Keystrokes 1899.3 Biometric Variance 1929.3.1 Inconsistent Presentation 1929.3.2 Unreproducible Presentation 1929.3.3 Fault Signal/Representational Accession 1939.4 Performance of Biometric System 1939.5 Justification of Biometric System 1959.5.1 Authentication (“Is this individual really the authenticate user or not?”) 1959.5.2 Recognition (“Is this individual in the database?”) 1969.5.3 Concealing (“Is this a needed person?”) 1969.6 Assaults on a Biometric System 1969.6.1 Zero Effort Attacks 1979.6.2 Adversary Attacks 1989.6.2.1 Circumvention 1989.6.2.2 Coercion 1989.6.2.3 Repudiation 1989.6.2.4 DoB (Denial of Benefit) 1999.6.2.5 Collusion 1999.7 Biometric Cryptanalysis: The Fuzzy Vault Scheme 1999.8 Conclusion & Future Work 203References 20510 THE ROLE OF BIG DATA ANALYSIS IN INCREASING THE CRIME PREDICTION AND PREVENTION RATES 209Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal and G.N. Shinde10.1 Introduction: An Overview of Big Data and Cyber Crime 21010.2 Techniques for the Analysis of BigData 21110.3 Important Big Data Security Techniques 21610.4 Conclusion 219References 21911 CRIME PATTERN DETECTION USING DATA MINING 221Dipalika Das and Maya Nayak11.1 Introduction 22111.2 Related Work 22211.3 Methods and Procedures 22411.4 System Analysis 22711.5 Analysis Model and Architectural Design 23011.6 Several Criminal Analysis Methods in Use 23311.7 Conclusion and Future Work 235References 23512 ATTACKS AND SECURITY MEASURES IN WIRELESS SENSOR NETWORK 237Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan and Aditya Khamparia12.1 Introduction 23812.2 Layered Architecture of WSN 23912.2.1 Physical Layer 23912.2.2 Data Link Layer 23912.2.3 Network Layer 24012.2.4 Transport Layer 24012.2.5 Application Layer 24112.3 Security Threats on Different Layers in WSN 24112.3.1 Threats on Physical Layer 24112.3.1.1 Eavesdropping Attack 24112.3.1.2 Jamming Attack 24212.3.1.3 Imperil or Compromised Node Attack 24212.3.1.4 Replication Node Attack 24212.3.2 Threats on Data Link Layer 24212.3.2.1 Collision Attack 24312.3.2.2 Denial of Service (DoS) Attack 24312.3.2.3 Intelligent Jamming Attack 24312.3.3 Threats on Network Layer 24312.3.3.1 Sybil Attack 24312.3.3.2 Gray Hole Attack 24312.3.3.3 Sink Hole Attack 24412.3.3.4 Hello Flooding Attack 24412.3.3.5 Spoofing Attack 24412.3.3.6 Replay Attack 24412.3.3.7 Black Hole Attack 24412.3.3.8 Worm Hole Attack 24512.3.4 Threats on Transport Layer 24512.3.4.1 De-Synchronization Attack 24512.3.4.2 Flooding Attack 24512.3.5 Threats on Application Layer 24512.3.5.1 Malicious Code Attack 24512.3.5.2 Attack on Reliability 24612.3.6 Threats on Multiple Layer 24612.3.6.1 Man-in-the-Middle Attack 24612.3.6.2 Jamming Attack 24612.3.6.3 Dos Attack 24612.4 Threats Detection at Various Layers in WSN 24612.4.1 Threat Detection on Physical Layer 24712.4.1.1 Compromised Node Attack 24712.4.1.2 Replication Node Attack 24712.4.2 Threat Detection on Data Link Layer 24712.4.2.1 Denial of Service Attack 24712.4.3 Threat Detection on Network Layer 24812.4.3.1 Black Hole Attack 24812.4.3.2 Worm Hole Attack 24812.4.3.3 Hello Flooding Attack 24912.4.3.4 Sybil Attack 24912.4.3.5 Gray Hole Attack 25012.4.3.6 Sink Hole Attack 25012.4.4 Threat Detection on the Transport Layer 25112.4.4.1 Flooding Attack 25112.4.5 Threat Detection on Multiple Layers 25112.4.5.1 Jamming Attack 25112.5 Various Parameters for Security Data Collection in WSN 25212.5.1 Parameters for Security of Information Collection 25212.5.1.1 Information Grade 25212.5.1.2 Efficacy and Proficiency 25312.5.1.3 Reliability Properties 25312.5.1.4 Information Fidelity 25312.5.1.5 Information Isolation 25412.5.2 Attack Detection Standards in WSN 25412.5.2.1 Precision 25412.5.2.2 Germane 25512.5.2.3 Extensibility 25512.5.2.4 Identifiability 25512.5.2.5 Fault Forbearance 25512.6 Different Security Schemes in WSN 25612.6.1 Clustering-Based Scheme 25612.6.2 Cryptography-Based Scheme 25612.6.3 Cross-Checking-Based Scheme 25612.6.4 Overhearing-Based Scheme 25712.6.5 Acknowledgement-Based Scheme 25712.6.6 Trust-Based Scheme 25712.6.7 Sequence Number Threshold-Based Scheme 25812.6.8 Intrusion Detection System-Based Scheme 25812.6.9 Cross-Layer Collaboration-Based Scheme 25812.7 Conclusion 264References 26413 LARGE SENSING DATA FLOWS USING CRYPTIC TECHNIQUES 269Hemanta Kumar Bhuyan13.1 Introduction 27013.2 Data Flow Management 27113.2.1 Data Flow Processing 27113.2.2 Stream Security 27213.2.3 Data Privacy and Data Reliability 27213.2.3.1 Security Protocol 27213.3 Design of Big Data Stream 27313.3.1 Data Stream System Architecture 27313.3.1.1 Intrusion Detection Systems (IDS) 27413.3.2 Malicious Model 27513.3.3 Threat Approaches for Attack Models 27613.4 Utilization of Security Methods 27713.4.1 System Setup 27813.4.2 Re-Keying 27913.4.3 New Node Authentication 27913.4.4 Cryptic Techniques 28013.5 Analysis of Security on Attack 28013.6 Artificial Intelligence Techniques for Cyber Crimes 28113.6.1 Cyber Crime Activities 28213.6.2 Artificial Intelligence for Intrusion Detection 28213.6.3 Features of an IDPS 28413.7 Conclusions 284References 28514 CYBER-CRIME PREVENTION METHODOLOGY 291Chandra Sekhar Biswal and Subhendu Kumar Pani14.1 Introduction 29214.1.1 Evolution of Cyber Crime 29414.1.2 Cybercrime can be Broadly Defined as Two Types 29614.1.3 Potential Vulnerable Sectors of Cybercrime 29614.2 Credit Card Frauds and Skimming 29714.2.1 Matrimony Fraud 29714.2.2 Juice Jacking 29814.2.3 Technicality Behind Juice Jacking 29914.3 Hacking Over Public WiFi or the MITM Attacks 29914.3.1 Phishing 30014.3.2 Vishing/Smishing 30214.3.3 Session Hijacking 30314.3.4 Weak Session Token Generation/Predictable Session Token Generation 30414.3.5 IP Spoofing 30414.3.6 Cross-Site Scripting (XSS) Attack 30514.4 SQLi Injection 30614.5 Denial of Service Attack 30714.6 Dark Web and Deep Web Technologies 30914.6.1 The Deep Web 30914.6.2 The Dark Web 31014.7 Conclusion 311References 312Index 313

Regulärer Preis: 197,99 €
Produktbild für CompTIA Security+ Review Guide

CompTIA Security+ Review Guide

LEARN THE INS AND OUTS OF THE IT SECURITY FIELD AND EFFICIENTLY PREPARE FOR THE COMPTIA SECURITY+ EXAM SY0-601 WITH ONE EASY-TO-FOLLOW RESOURCECompTIA Security+ Review Guide: Exam SY0-601, Fifth Edition helps you to efficiently review for the leading IT security certification—CompTIA Security+ SY0-601. Accomplished author and security expert James Michael Stewart covers each domain in a straightforward and practical way, ensuring that you grasp and understand the objectives as quickly as possible.Whether you’re refreshing your knowledge or doing a last-minute review right before taking the exam, this guide includes access to a companion online test bank that offers hundreds of practice questions, flashcards, and glossary terms.Covering all five domains tested by Exam SY0-601, this guide reviews:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and ComplianceThis newly updated Fifth Edition of CompTIA Security+ Review Guide: Exam SY0-601 is not just perfect for anyone hoping to take the SY0-601 Exam, but it is also an excellent resource for those wondering about entering the IT security field.JAMES MICHAEL STEWART holds variety of certifications, including: Security+, Network+, A+, CySA+, PenTest+, CASP+, CTT+, CEH, CHFI, ECSA, ECIH, CND, CEI, CISSP, CISM, and CFR. He has been working with computers and technology for over thirty years. His work focuses on security, certification, and various operating systems. Michael has been teaching job skill and certification courses for over 25 years, such as CISSP, ethical hacking/penetration testing, computer forensics, and Security+. He has taught hundreds of classes, accumulating over 16,000 hours of instruction. His most recent publications include the CISSP Study Guide, 9th Edition. Michael has also contributed to many other security focused materials including exam preparation guides, practice exams, video instruction, and courseware. He has developed certification courseware and training materials as well as presented these materials in the classroom. Michael graduated in 1992 from the University of Texas at Austin. Introduction xixCHAPTER 1 THREATS, ATTACKS, AND VULNERABILITIES 11.1 Compare and contrast different types of social engineering techniques 51.2 Given a scenario, analyze potential indicators to determine the type of attack 201.3 Given a scenario, analyze potential indicators associated with application attacks 371.4 Given a scenario, analyze potential indicators associated with network attacks 571.5 Explain different threat actors, vectors, and intelligence sources 801.6 Explain the security concerns associated with various types of vulnerabilities 911.7 Summarize the techniques used in security assessments 991.8 Explain the techniques used in penetration testing 109Review Questions 118CHAPTER 2 ARCHITECTURE AND DESIGN 1232.1 Explain the importance of security concepts in an enterprise environment 1282.2 Summarize virtualization and cloud computing concepts 1392.3 Summarize secure application development, deployment, and automation concepts 1522.4 Summarize authentication and authorization design concepts 1672.5 Given a scenario, implement cybersecurity resilience 1832.6 Explain the security implications of embedded and specialized systems 1962.7 Explain the importance of physical security controls 2082.8 Summarize the basics of cryptographic concepts 220Review Questions 240CHAPTER 3 IMPLEMENTATION 2453.1 Given a scenario, implement secure protocols 2483.2 Given a scenario, implement host or application security solutions 2623.3 Given a scenario, implement secure network designs 2803.4 Given a scenario, install and configure wireless security settings 3043.5 Given a scenario, implement secure mobile solutions 3153.6 Given a scenario, apply cybersecurity solutions to the cloud 3303.7 Given a scenario, implement identity and account management controls 3363.8 Given a scenario, implement authentication and authorization solutions 3443.9 Given a scenario, implement public key infrastructure 355Review Questions 370CHAPTER 4 OPERATIONS AND INCIDENT RESPONSE 3754.1 Given a scenario, use the appropriate tool to assess organizational security 3774.2 Summarize the importance of policies, processes, and procedures for incident response 3984.3 Given an incident, utilize appropriate data sources to support an investigation 4094.4 Given an incident, apply mitigation techniques or controls to secure an environment 4184.5 Explain the key aspects of digital forensics 422Review Questions 435CHAPTER 5 GOVERNANCE, RISK, AND COMPLIANCE 4415.1 Compare and contrast various types of controls 4435.2 Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture 4465.3 Explain the importance of policies to organizational security 4565.4 Summarize risk management processes and concepts 4695.5 Explain privacy and sensitive data concepts in relation to security 486Review Questions 494APPENDIX ANSWERS TO REVIEW QUESTIONS 499Chapter 1: Threats, Attacks, and Vulnerabilities 500Chapter 2: Architecture and Design 505Chapter 3: Implementation 508Chapter 4: Operations and Incident Response 511Chapter 5: Governance, Risk, and Compliance 514Index 519

Regulärer Preis: 20,99 €
Produktbild für Laptops For Dummies

Laptops For Dummies

THE LATEST ON GETTING THE MOST FROM LAPTOPS AND TABLETSNot that long ago, laptops were seen as luxuries. Now they're practically an essential for many people, and—as faster computing power and super-sharp displays make many of them the equal of a desktop—the new wave of lightweight laptops is increasingly replacing the home PC with its bulky tower and multiple cords. Plus, you can use your laptop when chilling on the couch or venturing out for a quick coffee!In this fully updated edition of Laptops For Dummies, bestselling tech writer Dan Gookin takes a friendly walk through everything you need to know, from the basics (if you're new to laptops) all the way up to the latest hardware and tech updates—including the recent release of Windows 10. Along the way you'll learn how to synchronize your laptop with other machines, coordinate email pickup across devices, and beef up your security. You'll also learn how to* Choose the right laptop* Check out tablet options* Troubleshoot problems* Maintain and upgradeWhether you're choosing a new laptop or want to maximize what you're getting from the one you have, Laptops For Dummies has you covered, wherever you want to work—or play!DAN GOOKIN combined his love of writing with his gizmo fetish nearly 30 years ago, and has written more than 170 books explaining technology in a fun, non-threatening way. In 1991 he penned DOS For Dummies, launching the entire For Dummies franchise. Dan's books have 12 million copies in print and have been translated into more than 30 languages. INTRODUCTION 1About This Book 1And Just Who Are You? 2Icons Used in This Book 2Where to Go from Here 3PART 1: THIS LAPTOP THING 5CHAPTER 1: THE PORTABLE COMPUTING QUEST 7The History of Portable Computing 7The Xerox Dynabook 9The Osborne 1 9The loveable luggables 9The Model 100 10The lunch buckets 13Dawn of the PC laptop 13The search for light 15Modern Laptops 17The notebook 17The subnotebook 18The tablet PC 18CHAPTER 2: A LAPTOP OF YOUR OWN 21Do You Need a Laptop? 21Why you need a laptop 22Why you don’t need a laptop 23Laptop Shopping 23Things to ignore when buying a laptop 24Things to heed when buying a laptop 24Software for Your Laptop 25The operating system 25Other software 26Laptop Hardware Buying Decisions 26Important laptop hardware guts 26Communications options 28The green laptop 28Service, Support, and Warranty 29The Final Step: Buying Your Laptop 30PART 2: SAY HELLO TO YOUR LAPTOP 31CHAPTER 3: FROM LAPTOP BOX TO LAP 33Laptop Box 101 33Removing the laptop from the box 34“How long should I keep the box?” 36Submitting the warranty 36Set Up Your Laptop 36Finding a place for the laptop 37Charging the battery 38“Should I plug the laptop into a UPS?” 39Bye-Bye, Old Laptop 40Deciding when to retire an old laptop 40Disposing of the old laptop 40What to Do Next 41CHAPTER 4: TO TURN ON A LAPTOP 43Turn On Your Laptop 43Step 1: Open the lid 44Step 2: Adjust the lid for optimal viewing 45Step 3: Locate the power button 45Step 4: Punch the power button 46It’s Windows! 47Running Windows for the first time 48Activating Windows 49Signing in to Windows 49What’s Next? 51Migrating your files 51Reinstalling your programs 53Adding other accounts 54CHAPTER 5: TO TURN OFF A LAPTOP 55End Your Laptop Day 55Keeping the laptop on all the time 56Finding the shutdown options 56Shutting down your laptop 58Restarting Windows 59Putting Mr Laptop to sleep 60Hibernating the laptop 61Locking Windows 62Signing out of Windows 62Switching to another user 63Shutting down when the laptop doesn’t want to 63Shutdown Options and Configuration 63Setting the power button’s function 63Determining what happens when you shut the lid 65Activating hibernation 66CHAPTER 6: TRADITIONAL LAPTOP TOUR 67Around Your Laptop 67Locating removable storage slots 68Attaching the laptop to something sturdy 69Keeping the air circulating 69Discovering the webcam 69The Pluggable-Innable Holes 70Look at the Pretty Lights! 71This Isn’t Your Daddy’s Keyboard 73Exploring the keyboard layout 73Finding the secret numeric keypad 74Having fun with the Fn key 75This Isn’t Your Momma’s Mouse 76Using a touchpad 77Obtaining a real mouse 78CHAPTER 7: THE TABLET PC TOUR 81Tablet PC Types 82The Tablet PC Tour 83The Pen Is Mightier than the Mouse 85Introducing the digital pen 85Using the pen as a mouse 87Touchscreen Text Typing 88Summoning the touch keyboard 88Exploring the touch keyboard varieties 88Typing control-key combinations 91Scribbling text on the screen 91Windows Does the Tablet PC 92Special Tablet PC Software 94CHAPTER 8: YOUR LAPTOP AND WINDOWS 95The Big Windows Picture 95Viewing the desktop 96Exploring the Start button menu 97Working on the taskbar 98Visiting with the Action Center 100Using the supersecret shortcut menu 101Shouting at Cortana 101Windows and Your Stuff 101Exploring your laptop’s storage 101Accessing your User Profile folder 103Finding programs 104Settings and Options 105Opening the Settings app 105Visiting the Control Panel 106Using the Quick Settings 107Accessing the Windows Mobility Center 108PART 3: OUT AND ABOUT WITH MR LAPTOP 109CHAPTER 9: YOU AND YOUR LAPTOP 111User Accounts 111Accessing your user account info 112Eschewing an online account 112Setting an account PIN 114Changing your user account picture 115Adding online accounts 116The Perfect Display 117Setting the display resolution 117Changing the desktop wallpaper 117Adding a screen saver 118Setting the display orientation 119Adjusting screen brightness 120Removable Storage 120Adding storage 121Using the AutoPlay notification 121Controlling AutoPlay settings 122Ejecting media and storage devices 123The Software Side 124Adding new software 124Removing software 125CHAPTER 10: PORTABLE POWER 127The Battery Will Get a Charge Out of This! 127Using the battery (or not) 128Locating the laptop’s battery 128Monitoring the battery 130Charging the battery 131Using a second battery 131Replacing the battery 132When the Power Gets Low 132Setting low-battery warnings 132Using the Battery Saver 134Reviewing the power management plan 136CHAPTER 11: THE PRINTING CHAPTER 137The Great Printer Hunt 137Finding printers in Windows 137Connecting a printer directly to your laptop 139Adding a network or wireless printer 140“What is the default printer?” 141Something Needs Printing 142Printing a document 142Stopping a printer run amok 144Printing when you don’t have a printer 145Printing a PDF document 145A Portable Printer for Your Laptop 146CHAPTER 12: EXPANDING YOUR LAPTOP’S UNIVERSE 149USB Expansion Options 149Understanding the USB thing 150Attaching and removing a USB gizmo 151Dealing with USB-powered devices 152Using a USB hub 153Perusing potential USB goodies 154The Bluetooth Thing 155Checking for Bluetooth 155Pairing with a Bluetooth gizmo 156The Laptop Becomes a Desktop 157Using a full-size keyboard and mouse 158Adding a monitor 158Running the laptop with its lid closed 159CHAPTER 13: O THE PLACES YOU’LL GO 161In the Bag 162Features to look for 162Things to pack in your laptop bag 163Things to do before you leave 164Flying with Mr Laptop 164Is your laptop case one carry-on bag or half a carry-on bag? 164Laptop inspection 165All aboard! 165Airplane mode 166Air power 167In-flight Wi-Fi 167Café Computing 168Find a good seat 168Other tips ’n’ stuff 169In a Hotel Room 169Mind the Laptop’s Temperature 170CHAPTER 14: PRESENTATION INFORMATION 171The Show Must Go On 171Giving the dog-and-pony show 171Setting up your presentation 173Printing out a slide show 175To Create a Better Slide Show 176Starting your presentation 176Driving home your point 177Building a better presentation 178Keeping your audience awake 178Selling a presentation 179CHAPTER 15: A LAPTOP AT PLAY 181The Laptop Media Player 181Exploring Windows Media Player 181Running the Photos app 183Using the Groove Music app 184Expand the Laptop’s Media Universe 185Ripping music from a CD 186Uploading pictures and videos from a phone or camera 187Taking a picture 189Media Sharing 190Copying media to your OneDrive 190Adding media from your OneDrive 191Connecting to a network media player 192Sharing your laptop’s media 193Laptop Phone Calls 194eBooks on Your Laptop 195PART 4: LAPTOP NETWORKING 197CHAPTER 16: THE NETWORKING THING 199The Big Networking Picture 199Make the Network Connection 202Connecting the laptop to a wired network 203Accessing a Wi-Fi network 203Connecting to a hidden Wi-Fi network 205Tethering to a smartphone 206Break the Network Connection 207Disconnecting from a wired network 207Releasing the Wi-Fi connection 207CHAPTER 17: NETWORK LIFE IN LAPTOP LAND 209Network Configuration 209Locating network central 209Setting the network security 211Controlling the Wi-Fi radio 212Forgetting a Wi-Fi connection 213Getting the laptop’s MAC address 214Your Laptop, Windows, and the Network 215Setting your laptop’s network name 215Exploring the network 217Checking the sharing status 219Sharing a folder 219CHAPTER 18: YOUR FILES FROM AFAR 223Files from Here to There 223Walking files between computers 223Using octopus net to connect computers 224Quickly transferring files over Ethernet 225Using the Windows Sync Center 225Cloud Storage Synchronization 225Understanding cloud storage 226Exploring cloud storage options 228Synchronizing cloud storage files 228Sharing a file from cloud storage 230PART 5: SECURITY AND MAINTENANCE 231CHAPTER 19: INTERNET SAFETY 233Security Central 233Viewing the Action Center 234Checking the Windows Security Center 235Keep Windows Up-to-Date 237Checking the update status 237Postponing an update 237The Malware Scourge 238Doing a virus scan 238Dealing with a quarantined file 240Behind the Firewall 240Finding the firewall 241Dealing with a firewall warning 242Safe and Private Browsing 243Browsing in secret 243Purging your web browsing history 244Location Information 244General Security Settings 245CHAPTER 20: A MORE SECURE LAPTOP 247The Hot Laptop 247Before Your Laptop Is Stolen 248Marking your laptop 249Registering the laptop and its software 249Paying attention to your environment 249Attaching the old ball-and-chain 250Protect Your Data with a Strong Password 251Back Up Your Data 253Preparing for backup 254Configuring File History 254Checking the backup schedule 256Restoring an older version 257Restoring more than a single file 259The Laptop Reset 261CHAPTER 21: LAPTOP TROUBLESHOOTING 263The Universal Quick-Fix 264Restarting the laptop 264Signing out of Windows 264The Windows Troubleshooter 265Restore the System 267Doing a system restore 267Restoring the previous version of Windows 268Common Problems and Solutions 269“The keyboard is wacky!” 269Touchpad touchiness 269“My laptop won’t wake up” 270Power management woes 270“The battery won’t charge” 270CHAPTER 22: LAPTOP MAINTENANCE AND UPGRADING 271New Laptop Hardware 271How ’bout Some New Software? 272Upgrading your software 272Upgrading to a new version of Windows 273Laptop Maintenance 274Maintaining the storage system 274Keeping it clean 274Grooming the keyboard 275Cleansing the screen 275PART 6: THE PART OF TENS 277CHAPTER 23: TEN BATTERY TIPS AND TRICKS 279Don’t Drop the Battery, Get It Wet, Short It, Play Keep-Away with It, Open It, Burn It, or Throw It Away 279Reduce the Screen’s Brightness 280Power Down the Hard Drive 280Add RAM to Prevent Virtual Memory Disk Swapping 281Keep Memory Empty 282Guard the Battery’s Terminals 283Avoid Extreme Temperatures 283Store the Battery if You Don’t Plan to Use It 283Understand That Batteries Drain Over Time! 284Deal with the Low-Battery Warning 284CHAPTER 24: TEN HANDY LAPTOP ACCESSORIES 287Laptop Bag or Travel Case 288Spare Battery 288External Storage 288Cooling Pad 288Minivac 289USB Lamp 289Full-Size Keyboard and External Mouse 290Privacy Screen Filter 290ID Card or Return Service Sticker 291Theft-Prevention System 292CHAPTER 25: TEN THINGS TO THROW IN YOUR LAPTOP BAG 293Power Cord and Brick 293Spare Battery 294Mouse or Digital Pen 294Screen Wipes and Cleaner 294Laptop Lock 294Removable Media 295Headphones 295Office Supplies 295Cables, Cables, Cables 296Not the End of the List 296Index 297

Regulärer Preis: 22,99 €
Produktbild für CompTIA Security+ Practice Tests

CompTIA Security+ Practice Tests

GET READY FOR A CAREER IN IT SECURITY AND EFFICIENTLY PREPARE FOR THE SY0-601 EXAM WITH A SINGLE, COMPREHENSIVE RESOURCECompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601.Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and CompliancePerfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.ABOUT THE AUTHORDAVID SEIDL, CYSA+, CISSP, GPEN, GCIH, is the co-author of CompTIA Security+ Study Guide: Exam SY0-601, CompTIA CySA+ Study Guide: Exam CS0-002, CompTIA CySA+ Practice Tests: Exam CS0-002, and CompTIA PenTest+ Study Guide: Exam PT0-001. David is Vice President for Information Technology and CIO at Miami University. Previously, he led the University of Notre Dame security team as Director of Information Security and has served in a variety of technical and IT security roles. Introduction xixChapter 1 Threats, Attacks, and Vulnerabilities 1Chapter 2 Architecture and Design 45Chapter 3 Implementation 81Chapter 4 Operations and Incident Response 129Chapter 5 Governance, Risk, and Compliance 159Appendix Answers and Explanations 185Index 299

Regulärer Preis: 27,99 €
Produktbild für IoT Projects with Arduino Nano 33 BLE Sense

IoT Projects with Arduino Nano 33 BLE Sense

Get started with the extremely versatile and powerful Arduino Nano 33 BLE Sense, a smart device based on the nRF52840 from Nordic semiconductors. This book introduces you to developing with the device.You'll learn how to access Arduino I/O such as analog and digital I/O, serial communication, SPI and I2C. The book also covers how to access sensor devices on Arduino Nano 33 BLE Sense, how to interact with other external devices over BLE, and build embedded Artificial Intelligence applications.Arduino Nano 33 BLE Sense consists of multiple built-in sensors such as 9-axis inertial, humidity, temperature, barometric, microphone, gesture, proximity, light color and light intensity sensors. With this book, you'll see how this board supports the Bluetooth Low Energy (BLE) network, enabling interactions with other devices over the network.WHAT YOU’LL LEARN* Prepare and set up Arduino Nano 33 BLE Sense board* Operate Arduino Nano 33 BLE Sense board hardware and software* Develop programs to access Arduino Nano 33 BLE Sense board I/O* Build IoT programs with Arduino Nano 33 BLE Sense boardWHO THIS BOOK IS FORMakers, developers, students, and professionals at any level interested in developing with the Arduino Nano 33 BLE Sense board.Agus Kurniawan is a lecturer, IT consultant, and author. He has 15 years of experience in various software and hardware development projects, delivering materials in training and workshops, and technical writing. He has been awarded the Microsoft Most Valuable Professional (MVP) award 16 years in a row.Agus is a lecturer and researcher in the field of networking and security systems at the Faculty of Computer Science, Universitas Indonesia, Indonesia.He can be reached on his Linkedin at @agusk and Twitter at @agusk2010.Chapter 1: Setting up Development EnvironmentChapter goal: to introduce Arduino Nano 33 BLE Sense and set up development environment1.1 Introduction1.2 Review Arduino Nano 33 BLE Sense Board1.3 Set up Development Environment1.4 Hello Arduino: Blinking ProgramChapter 2: Arduino Nano 33 BLE Sense Board DevelopmentChapter goal: to access Arduino Nano 33 BLE Sense I/O and communication protocol2.1 Introduction2.2 Basic Sketch Programming2.3 Digital I/O2.4 Analog I/O2.5 Serial Communication2.6 PWM2.7 SPI2.8 I2CChapter 3: Sensor ProgrammingChapter goal: to access built-in sensors on Arduino Nano 33 BLE Sense3.1 Introduction3.2 Working with Digital Microphone3.3 Working with Gesture Sensor3.4 Working with Barometer3.5 Working with Temperature and Relative HumidityChapter 4: Bluetooth Low Energy (BLE)Chapter goal: to work with Bluetooth Low Energy (BLE) on Arduino Nano 33 BLE Sense board4.1 Introduction4.2 Setting up Bluetooth Low Energy (BLE)4.3 Demo: Controlling LED with BLEChapter 5: Embedded Artificial IntelligenceChapter goal: to build Embedded Artificial Intelligence on Arduino Nano 33 BLE Sense board5.1 Introduction5.2 Setting up TensorFlow Lite5.3 Demo: Embedded Artificial Intelligence

Regulärer Preis: 56,99 €
Produktbild für Microsoft Excel Functions Quick Reference

Microsoft Excel Functions Quick Reference

This condensed syntax reference presents the essential Excel function syntax in a well-organized format that can be used as a quick and handy reference. You can use it to improve your Excel knowledge and increase your productivity. It will help you upgrade the quality of your data analysis, dashboards, models, and templates.The Microsoft Excel Functions Quick Reference helps you set up workbooks, enter data, and format it for easier viewing. It starts by giving an overview of Excel functions explaining the different types of Excel functions available followed by an understanding of string functions and date functions. It then covers time, lookup, aggregate, and logical functions along with practice problems. Further, you will see math functions and information functions in Excel. You will also be able to create sophisticated forecast worksheets, key performance indicators (KPIs), and timelines. Each function in the text is illustrated by helpful, illuminating examples.With this book by your side, you'll always have the answer to your Excel function syntax questions.WHAT YOU WILL LEARN* Work with basic Excel functions* Use the LOOKUP function* Take advantage of new functions in information functions* Create a mega formulaWHO THIS BOOK IS FORAdministrators, analysts, and anyone else working with Microsoft Excel.Mandeep has more than 20 years of experience in administration, operations, software development, and reporting. He mostly works with cross-functional teams in ensuring operational and service excellence. Mandeep has worked with Capgemini for more than ten years and is currently working as a freelancer in conducting various training in MS Office and providing data services.CHAPTER 1 – WHAT IS AN EXCEL FUNCTION?· Excel formula definition· How to use an Excel formula· Different types of Excel functionsCHAPTER 2 –TEXT FUNCTIONS· LEFT· RIGHT· MID· UPPER· LOWER· PROPER· TRIM· LEN· FIND· SEARCH· CONCATENATE/&· VALUE· TEXT· EXACT· REPLACE· SUBSTITUTECHAPTER 3 – DATE FUNCTIONS· TODAY· DAY· MONTH· YEAR· DATE· EDATE· EOMONTH· WEEKDAY· WEEKNUM· DATEVALUE· NETWORKDAYS· DATEDIFCHAPTER 4 – TIME FUNCTIONS· NOW· HOUR· MINUTE· SECOND· TIMEVALUECHAPTER 5 – LOOKUP FUNCTIONS· VLOOKUP· HLOOKUP· MATCH· INDEX· CHOOSECHAPTER 6 – AGGREGATE FUNCTIONS· SUM· SUMIF· SUMIFS· SUMPRODUCT· SUBTOTAL· COUNT· COUNTIF· COUNTIFS· AVERAGE· AVERAGEIF· AVERAGEIFS· AGGREGATECHAPTER 7 – LOGICAL FUNCTIONS· IF· IFS· AND· OR· NOT· IFERROR· IFNA· SWITCHCHAPTER 8 – REFERENCE FUNCTIONS· INDIRECT· ADDRESS· OFFSET· ROW· ROWS· COLUMN· COLUMNSCHAPTER 9 – MATH FUNCTIONS· ABS· INT· TRUNC· ROUND· ODD· EVEN· POWER· PRODUCTCHAPTER 10 – INFORMATION FUNCTIONS· CELL· ISBLANK· ISERROR· ISEVEN· ISODD· ISFORMULA· ISLOGICAL· ISNA· ISNONTEXT· ISNUMBER· ISTEXT· N· TYPECHAPTER 11 – MEGA-FORMULA· What is Mega formula?· How to create a mega formula· ExamplesCHAPTER 12 – ARRAY FORMULA· What is an array formula?· Advantages and disadvantages· ExamplesAppendix A – Formula Reference ready reckoner

Regulärer Preis: 46,99 €
Produktbild für Requirements Engineering für Dummies

Requirements Engineering für Dummies

Für den Erfolg von Softwareprojekten ist es entscheidend, sich erstmal klar zu machen, wozu das System überhaupt dienen soll und wie es dafür beschaffen sein muss. Klingt eigentlich selbstverständlich, und doch scheitern Projekte oft gerade an der Anforderungsanalyse. Das Buch "Requirements Engineering für Dummies" beschreibt verständlich und pragmatisch, wie Sie vorgehen sollten - und zwar sowohl für klassische als auch für agile Projekte. Es liefert Ihnen Techniken, wie Sie Ziele bestimmen und Releases sinnvoll zusammenstellen, wie Sie Anforderungen erheben und verstehen, wie Sie mit Änderungen umgehen und wie Sie Fallstricke vermeiden. Das Buch ist auch geeignet zur Vorbereitung auf die CPRE-FL-Prüfung. Dr. Marcus Winteroll ist Mitglied der oose Innovative Informatik eG, einem Anbieter von Schulungen und Workshops zu Software & Systems Engineering in Hamburg. Als Trainer und Berater beschäftigt er sich mit der Analyse sowie Verbesserung von Geschäfts- und Entwicklungsprozessen. Dazu setzt er auf agile Methoden; aber auch die klassischen Vorgehensweisen sind ihm aus seiner langjährigen Erfahrung als Requirements Engineer, Projektleiter, Prozessmanager, Qualitätssicherer und Entwickler vertraut. Seine gesammelten Erfahrungen teilt er auf Konferenzen und als Autor von Fachartikeln.Über den Autor 13EINLEITUNG 25Über dieses Buch 25Konventionen in diesem Buch 26Was Sie nicht lesen müssen 26Törichte Annahmen über die Leser 26Wie dieses Buch aufgebaut ist 26Teil I: Requirements Engineering verstehen 27Teil II: Vorgehen im Requirements Engineering 27Teil III: Anforderungsanalyse 27Teil IV: Requirements Management 27Teil V: Der Top-Ten-Teil 27Symbole, die in diesem Buch verwendet werden 27Wie es weitergeht 28TEIL I: REQUIREMENTS ENGINEERING VERSTEHEN 29KAPITEL 1 DAS IST REQUIREMENTS ENGINEERING 31Warum uns Requirements Engineering weiterhelfen kann 31Aufgaben im Requirements Engineering 34Wer das Requirements Engineering macht 36Der Requirements Engineer 37Wer sonst noch das Requirements Engineering macht 37Viele Arten von Anforderungen 38Funktionale Anforderungen 38Nichtfunktionale Anforderungen 39Randbedingungen 40Abstraktionsstufen von Anforderungen 41Möglichkeiten der Zertifizierung 42Zertifikate des IREB 43Zertifikate des IIBA 44PMI Professional in Business Analysis (PMI-PBA) 45KAPITEL 2 EINBETTUNG DES REQUIREMENTS ENGINEERING47Das Zusammenspiel mit den übrigen Beteiligten 47Die Kunden des Requirements Engineering 48Wer sonst noch so wichtig ist: die Stakeholder 48Die Basis vieler Anforderungen: die Geschäftsprozesse 49Das Anforderungsdokument: eines für alle? 50Requirements Engineering im klassischen Vorgehen: alles klar 52Was zu erwarten ist 52Was nicht zu erwarten ist 52Requirements Engineering in agilen Projekten: just in time 53Beliebte Missverständnisse beim agilen Requirements Engineering 53Was agiles Vorgehen vom klassischen unterscheidet 54Klassisch, agil, Festpreis, Aufwandspreis –nicht jede Kombination ist sinnvoll 56Klassisch und Festpreis 56Agil und Aufwandspreis 56Agil und Festpreis 57Klassisch und Aufwandspreis 57Alles im Überblick 57KAPITEL 3 FALLSTRICKE59Was wir von den Kunden erwarten dürfen – und sie von uns 59Wer nimmt die Anforderungen auf? 60Der Projektleiter als Requirements Engineer 60Der Product Owner als Requirements Engineer 61Entwickler als Requirements Engineers 61Kunde und Nutzer als Requirements Engineers 62Die richtige Detaillierung von Anforderung 63Umgang mit Änderungen 64Dokumentation von Anforderungen 66TEIL II: VORGEHEN IM REQUIREMENTS ENGINEERING 69KAPITEL 4 VORGEHEN IN KLASSISCHEN PROJEKTEN71Einordnung in den Projektablauf 71Der Ablauf 73KAPITEL 5 VORGEHEN IN AGILEN PROJEKTEN77Direkte Kommunikation statt Dokumentation 78Der Wert gibt den Takt an 79Das Ziel immer vor Augen 80Die Vorbereitungsphase 80Requirements Engineering in Scrum 82Scrum kurz erklärt 82Wo das Requirements Engineering in Scrum stattfindet 84Das Product Backlog weiterentwickeln: Refinement 86Fertig heißt fertig: die Definition of Done 88Welche Rolle für die Anforderungen zuständig ist 89Wenn mehrere Teams an einem System arbeiten 90Fortwährende Analyse statt Änderungsmanagement 91Die Unterschiede zwischen klassischem und agilem Requirements Engineering 92KAPITEL 6 ANPASSUNG DES REQUIREMENTS-ENGINEERING-PROZESSES93Einflussfaktoren 93Facetten des Requirements-Engineering-Prozesses 94Zeitfacette 95Zweckfacette 96Zielfacette 96Konfiguration des Prozesses 97TEIL III: ANFORDERUNGSANALYSE 99KAPITEL 7 AN DIE ANFORDERUNGEN HERANKOMMEN101Stakeholderanalyse 102Stakeholder identifizieren 103Stakeholder verstehen 105Maßnahmen zur Einbindung der Stakeholder 110Zusätzliche Anforderungsquellen 111Anforderungen ermitteln 112Von geheimen und selbstverständlichen Anforderungen: das Kano-Modell 113Wer fragt, gewinnt: die Befragungstechniken 115Anforderungen gemeinsam erheben: Kooperationstechniken 121Schauen Sie genau hin: Beobachtungstechniken 123Systemarchäologie und der Blick zurück: artefaktbasierte Techniken 126Recycling im Requirements Engineering: die Wiederverwendung von Anforderungen 127Seien Sie kreativ: Entwurfs- und Ideenfindungstechniken 128Hypothesen bilden und ausprobieren 133Techniken, die Sie zusätzlich unterstützen 134Welche Technik Ihnen weiterhilft 135Konflikte und der Umgang damit 138Analyse von Konflikten 138Auflösung von Konflikten 139KAPITEL 8 WAS UNS ZU BEGINN KLAR SEIN SOLLTE 145Wohin soll die Reise gehen? Das Ziel klar vor Augen 145Auf die Verpackung kommt es an: der Produktkarton 147Alles auf einem Blick: das Product Vision Board 150Auf die Schnelle: das Fahrstuhlgespräch 152Den Überblick gewinnen 153Den Kontext des Systems verstehen 154Wie das System verwendet werden soll: Anwendungsfälle 156Der Überblick über die ganze Geschichte: Story Map 159Releases schneiden 164Werden Sie zum Minimalisten: das Minimale Marktfähige Release 164Von der Story Map zum Releaseplan 167KAPITEL 9 FUNKTIONALE ANFORDERUNGEN VERSTEHEN UND BESCHREIBEN175Die Systemverwendung mit Anwendungsfällen beschreiben 176Wer das System zu welchem Zweck verwendet: das Anwendungsfalldiagramm 178Anwendungsfälle Schritt für Schritt: Abläufe beschreiben 180Anwendungsfälle mit Anwendungsfällen erweitern 192Die Geschichten der Nutzer: User Stories 196Die Akzeptanzkriterien einer User Story 198Wie kleine User Stories große ersetzen 201Anwendungsfälle oder User Stories? 205Anwendungsfälle klassisch 205Von der Story Map über Anwendungsfälle zu den User Stories 205KAPITEL 10 WEITERE ASPEKTE FUNKTIONALER ANFORDERUNGEN209Fachliche Begriffe begreifen 210Alle wichtigen Begriffe auf einem Blick: das Glossar 210Der Zusammenhang zwischen den fachlichen Gegenständen im Fachklassenmodell 212Das sind ja Zustände 220Die Zustände fachlicher Gegenstände 220Das System bekommt Zustände 225Wie das Geschäft zu regeln ist 232Prototypen 243Die natürliche Sprache 247Man kann nicht alles verstehen 248Tipps zum Umgang mit der Sprache 248Ein Bausatz für Sätze: Satzschablonen 250Die Sprache und nichts als die Sprache 254KAPITEL 11 NICHTFUNKTIONALE ANFORDERUNGEN UND RANDBEDINGUNGEN257Die Bedeutung der nichtfunktionalen Anforderungen 258Nichtfunktionale Anforderungen verstehen 260Nichtfunktionale Anforderungen ermitteln 265Nichtfunktionale Anforderungen in der agilen Entwicklung 270Was schon vorher feststeht: die Randbedingungen 273KAPITEL 12 WER WEIẞ, OB DAS AUCH SO STIMMT – ANFORDERUNGEN PRÜFEN277Was gibt es denn da zu prüfen? 278Vorgehen im klassischen Requirements Engineering 279Qualitätskriterien zur Verifikation und Validierung 279Vorgehen im agilen Requirements Engineering 281Techniken für die Prüfung 282Reviewtechniken 282Explorative Validierungstechniken 284Prinzipien der Überprüfung 286KAPITEL 13 ANFORDERUNGEN FESTHALTEN289Zweck der Dokumentation 289Der richtige Zeitpunkt 292Hilfreiche Regeln 294Arten der Dokumentation 295Dokumente 296Modelle 302Anforderungssammlungen im Requirements-Management-Tool 304Product Backlog 305Story Map 306Formularvorlagen für Anforderungen 306TEIL IV: REQUIREMENTS MANAGEMENT 309KAPITEL 14 ANFORDERUNGEN ORGANISIEREN311Requirements Management im agilen Vorgehen 312Der Lebenszyklus einer Anforderung 314Versionierung 316Attribute einer Anforderung 317Kann man so oder so sehen: Sichtweisen 318Konfigurationen 320KAPITEL 15 IST DAS WIRKLICH WICHTIG? – PRIORISIERUNG VON ANFORDERUNGEN323Was wichtig ist 324Ad-hoc-Priorisierungstechniken 325Priorisierung mittels Stufen 325Ranking 326Top-Ten-Technik 326Kauf dir ein Feature 326Analytische Priorisierungstechniken 327Wiegers’sche Priorisierungsmatrix 327Kano-Modell 330Vorgehen 330KAPITEL 16 DIE ANFORDERUNGEN VERFOLGEN 333Zweck der Verfolgbarkeit 333Verfolgbarkeit darstellen 335Methodisches Verfolgen 338KAPITEL 17 UMGANG MIT ÄNDERUNGEN341Ganz normal und doch unbeliebt 341Der Änderungsprozess und seine Bestandteile 342KAPITEL 18 WERKZEUGE IM REQUIREMENTS ENGINEERING: UNTERSTÜTZUNG UND LAST347Arten von Werkzeugen 348Office-Tools 348Requirements-Management-Tools 349Modellierungstools 350Was schon da ist: Bugtracker und Wiki 351Lowtech-Tools 351Kombinationen von Tools 352Einführung von Werkzeugen 352TEIL V: DER TOP-TEN-TEIL 355KAPITEL 19 ZEHN PRINZIPIEN DES REQUIREMENTS ENGINEERING357Zusammenarbeit: Requirements Engineering allein funktioniert nicht 357Wertorientierung: Anforderungen sind kein Selbstzweck 358Stakeholder: Es geht darum, ihren Bedarf zu erfüllen 358Gemeinsames Verständnis: Die Basis für erfolgreiche Systementwicklung 358Kontext: Notwendig, um Systeme zu verstehen 359Problem, Anforderung, Lösung: Eine untrennbare Verbindung 359Validierung: Ungeprüfte Anforderungen sind nutzlos 360Evolution: Änderungen sind normal 360Innovation: Mehr vom Gleichen reicht nicht 361Systematische und disziplinierte Arbeit: Ohne geht es nicht 361KAPITEL 20 ZEHN BELIEBTE FEHLER IM REQUIREMENTS ENGINEERING 363Die Suche nach dem Schuldigen 363Lösungen beschreiben anstatt Probleme zu verstehen 364Anforderungen einfach vom Altsystem übernehmen 364Die Nutzer beschreiben die Anforderungen 364Wir arbeiten agil und dokumentieren nichts 365Entweder keine oder unverständliche Systemdokumentationen 365User Stories sind allein dazu da, die bestehenden Anforderungen in das Backlog aufzunehmen 365Agil und Modellierung geht nicht zusammen 366Fachleute und Entwickler sprechen nicht miteinander 366Das Requirements Engineering läuft nicht, also brauchen wir ein Tool 366KAPITEL 21 ZEHN ONLINE-QUELLEN369IREB-Lehrpläne, Handbücher und Glossar 369Requirements Engineering Magazine 369Scrum-Guide 369Online Browsing Platform der ISO 370V-Modell 370UML-Spezifikation 370UML-Übersicht 371DMN-Spezifikation 371Übersicht über Requirements-Tools 371Übersicht über UML-Tools 371Stichwortverzeichnis 375

Regulärer Preis: 27,99 €
Produktbild für iPad Portable Genius

iPad Portable Genius

INCREASE YOUR IPAD IQ WITH THIS GENIUS-LEVEL GUIDE TO THE APPLE IPADIf you want to squeeze every last bit of incredible from your Apple iPad we've got you covered with this newly revised iPad Portable Genius. Want to learn how to connect to a network? How to configure your tablet? How to surf the web more comfortably? All while keeping your identity and accounts private and secure?With the iPad Portable Genius as your guide, you'll unlock the full potential of your iPad in no time at all. You'll learn how to:* Get the most out of sending and receiving your email* Have fun with your images and take crystal-clear photos every time* Shoot and edit video right on your iPad* Manage your busy schedule with calendarsPerfect for anyone looking to save time and reveal the true power and flexibility of their iPad, the iPad Portable Genius, Fourth Edition contains all the new, engaging, and extensively illustrated info you need to master your tablet.PAUL MCFEDRIES is president of Logophilia Limited, a technical writing company. Over the past 40 years, Paul has programmed everything from mainframes to desktops to bar code scanners, and his nearly 100 books have sold more than four million copies worldwide. Visit him at www.paulmcfedries.com.Fun, hip, and straightforward, the PORTABLE GENIUS series gives forward-thinking technology users helpful information in handy, compact books that are easy to navigate and don't skimp on the essentials. Collect the whole series and make the most of your digital lifestyle.Acknowledgments iiiIntroduction xCHAPTER 1 HOW DO GET STARTED WITH MY IPAD? 2Using the Top Button 4Sleeping and waking the iPad 5Turning the iPad off and back on again 5Making a purchase 6Using the Home Button 7Setting the Volume 8Working with the Touchscreen 8Understanding touchscreen gestures 9Searching for stuff on your iPad 9Switching from one app to another 11Shutting down an app 11Typing on the touchscreen keyboard 12Editing with Your iPad 14Editing text 14Selecting, copying, and pasting text 15Copying and pasting an image 17Undoing an edit 17Configuring iPad from the Control Center 18CHAPTER 2 HOW DO I CONNECT TO A NETWORK? 20Making Wi-Fi Network Connections 22Displaying nearby Wi-Finetworks automatically 23Making a connection to a hidden Wi-Fi network 23Working with Wi-Fi Connections 24Checking Wi-Fi security 25Using Wi-Fi to transfer a file from your Mac to your iPad 25Preventing your iPad from automatically joining a known network connection 26Shutting off the Wi-Fi antenna 26Tethering to an iPhone Internet Connection 27Working with Cellular-Enabled iPads 29Tracking cellular data usage 29Shutting off the LTE antenna 29Preventing your iPad from using cellular data 30Controlling app access to cellular data 30Disabling data roaming 30Switching to Low Data Mode 31Activating Airplane Mode 31Connecting Bluetooth Devices 32Making your iPad discoverable 32Pairing with a Bluetooth keyboard 33Pairing with Bluetooth headphones 34Selecting paired headphones as the audio output device 34Unpairing your iPad from a Bluetooth device 35CHAPTER 3 HOW DO I CONFIGURE MY IPAD? 36Customizing the iPad Home Screen 38Rearranging the Home screen icons 38Storing multiple app icons in an app folder 39Adding a web page icon to the Home screen 40Dealing with App Notifications 41Opening the Notification Center 41Working with notifications 42Configuring an app’s notifications 43Configuring Do Not Disturb settings 45Trying Out a Few More Useful iPad Customizations 46Changing your iPad’s name 46Customizing iPad sounds 46Customizing the iPad keyboard 47Configuring the Siri voice assistant 51Configuring and using multitasking 52Controlling your iPad’s privacy settings 54Configuring your iPad to use Apple Pay 54CHAPTER 4 HOW CAN I GET MORE OUT OF WEB SURFING? 56Surfing with the Touchscreen 58Utilizing Pro Tips for Easier Web Browsing 59Browsing with tabs 59Opening a tab in the foreground 61Working with iCloud tabs 62Viewing a page without distractions 62Requesting a website’s desktop version 63Working with bookmarks 64Adding pages to your Reading List 67Revisiting pages using the History list 67Dealing with Forms 68Filling in forms faster with AutoFill 69Storing website login data 70Storing website logins manually 72Enhancing Web Browsing Privacy 73Deleting sites from your browsing history 73Removing website data 74Browsing privately 75Making Safari Even Easier and Better 76Switching the default search engine 76Searching for text in a web page 76Searching the web with Siri 77Sharing a link via AirDrop 78CHAPTER 5 HOW DO I MAKE THE MOST OF EMAIL? 80Managing Your Accounts 82Adding an email account manually 82Changing the default account 84Disabling an account 85Removing an account 85Switching from one account to another 86Configuring Some Useful Mail Settings 86Creating a custom email signature 86Thwarting spammers by disabling remote images 87Stopping messages from getting organized by thread 88Customizing Mail’s swipe options 89Working with Email Messages 89Adding iCloud folders 89Attaching a document from iCloud Drive 90Formatting message text 90Maintaining messages with swipe gestures 91Marking every message as read 92Controlling email with Siri voice commands 92CHAPTER 6 HOW CAN I HAVE FUN WITH PHOTOS? 94Browsing and Viewing Your Photos 96Navigating and manipulating photos 97Creating a photo album 98Marking a photo as a favorite 98Streaming photos to Apple TV 98Editing a Photo 99Enhancing color and brightness 99Cropping and straightening a photo 100Applying a filter to a photo 102Adjusting the lighting in a photo 102Using the Cameras 103Launching the Camera app 104Taking a photo 104Learning the Camera app’s features 105Focusing your shot 106Locking the exposure and focus 106Zooming in and out of the shot 107Shooting live photos 108Shooting a panoramic photo 108Shooting a photo with a time delay 110Reducing blurry iPad photos 110CHAPTER 7 HOW CAN I CREATE VIDEO ON MY IPAD? 112Recording Video 114Recording video on your iPad 114Shooting a time-lapse video 116Setting the recording format for video and slow motion 116Editing Recorded Video 117Creating Videos with the Clips App 118Creating a Clips video 119Adding a new Clips project 122Making Movies with iMovie 122Creating a new iMovie project 122Opening a project for editing 123Importing media into your project 124Working with video clips 126Working with your project 131CHAPTER 8 HOW DO I MANAGE MY CONTACTS? 134Getting Started with Contacts 136Creating a Contact 137Editing a Contact 138Assigning phone numbers to a contact 138Assigning email addresses to a contact 140Assigning web addresses to a contact 140Assigning social media data to a contact 141Assigning physical addresses to a contact 142Adding a photo to a contact 143Deleting a contact 144Getting More Out of Contacts 145Creating a custom field label 145Adding fields to a contact 145Deleting fields from a contact 146Creating a new contact from a vCard 147Sending and receiving a contact via AirDrop 148Sorting contacts 149Syncing contacts 149CHAPTER 9 HOW DO I TRACK MY EVENTS AND APPOINTMENTS? 150Getting Started with the Calendar App 152Tracking Your Events 153Adding an event to your calendar 154Editing an event 154Repeating an event 155Converting an event to an all-day event 156Adding an alert to an event 157Getting More Out of the Calendar App 158Setting the default calendar 159Subscribing to a calendar 159Controlling events with Siri voice commands 160Handling Microsoft Exchange meeting requests 161Working with Reminders 162Creating a time reminder 162Creating a location reminder 163Creating a new list and setting the default list 164Completing a reminder 164Deleting a reminder 165Setting reminders with Siri voice commands 165CHAPTER 10 HOW CAN I NAVIGATE MY WORLD WITH IPAD? 166Working with Location Services 168Controlling how apps access Location Services 168Shutting off Location Services 170Mapping Locations 171Searching for a location 171Marking a location 173Flying over your destination 174Mapping your current location 174Mapping a contact’s address 176Mapping an address from an email 177Saving a location as a favorite 177Sharing a map 178Mapping locations with Siri voice commands 178Navigating with Maps 178Getting directions to a location 179Getting live traffic information 180Getting directions with Siri voice commands 181CHAPTER 11 HOW DO I PROTECT MY IPAD? 182Locking Your iPad 184Locking your iPad with a passcode 184Locking your iPad with a fingerprint 186Locking your iPad with facial recognition 188Configuring Your Tablet to Sleep Automatically 190Backing Up Your Tablet 190Setting Restrictions on a Child’s iPad 191CHAPTER 12 HOW DO I SOLVE IPAD PROBLEMS? 194Troubleshooting iPad Problems: A Quick Guide 196Troubleshooting iPad Problems Step-by-Step 196Step 1: Shut down whatever app you’re using 197Step 2: Restore a changed setting 198Step 3: Shut down and then restart your iPad 198Step 4: Reboot the iPad hardware 200Step 5: Recharge your iPad 200Step 6: Check for iPadOS updates 200Step 7: Free up storage space 201Step 8: Check your Wi-Fi connection 202Step 9: Reset your settings 204Step 10: Erase and restore your content and settings 205Index 208

Regulärer Preis: 12,99 €
Produktbild für Mobile Device Management in Zeiten von mobilem Arbeiten. Wie Unternehmen mobile Endgeräte erfolgreich in bestehende IT-Infrastrukturen integrieren

Mobile Device Management in Zeiten von mobilem Arbeiten. Wie Unternehmen mobile Endgeräte erfolgreich in bestehende IT-Infrastrukturen integrieren

In Unternehmen geht der Trend immer mehr zum Homeoffice und Remote Work. Viele Unternehmen erlauben es den Mitarbeitern, private Endgeräte wie Smartphones oder Tablets für Firmenzwecke zu nutzen. Für Unternehmen bedeutet dies jedoch eine Gefährdung ihrer Firmendaten. Mobile Device Management-Systeme können dabei helfen, mögliche Sicherheitslücken zu schließen. Welche technischen Anforderungen stellen Mobile Device Management-Systeme an Unternehmen? Wie sicher ist Mobile Device Management und welche Chancen und Risiken gibt es? Und welche rechtlichen Aspekte müssen Unternehmen beim Verwalten von mobilen Geräten beachten? Der Autor Timmy Lutz klärt die wichtigsten Fragen zum Thema Mobile Device Management. Er nimmt die aktuelle Mobile Device Management Software in den Blick und erläutert, wie Unternehmen das richtige System für sich finden. Dabei gibt er praktische Tipps für eine erfolgreiche Implementierung in Unternehmen. Aus dem Inhalt: - Mobile Security Management; - Bring your own Device; - Betriebssystem; - Firmendaten; - Datensicherheit; - IT-Infrastruktur

Regulärer Preis: 36,99 €
Produktbild für CompTIA Security+ Study Guide

CompTIA Security+ Study Guide

LEARN THE KEY OBJECTIVES AND MOST CRUCIAL CONCEPTS COVERED BY THE SECURITY+ EXAM SY0-601 WITH THIS COMPREHENSIVE AND PRACTICAL STUDY GUIDE! AN ONLINE TEST BANK OFFERS 650 PRACTICE QUESTIONS AND FLASHCARDS!The Eighth Edition of the CompTIA Security+ Study Guide Exam SY0-601 efficiently and comprehensively prepares you for the SY0-601 Exam. Accomplished authors and security experts Mike Chapple and David Seidl walk you through the fundamentals of crucial security topics, including the five domains covered by the SY0-601 Exam:* Attacks, Threats, and Vulnerabilities* Architecture and Design* Implementation* Operations and Incident Response* Governance, Risk, and ComplianceThe study guide comes with the Sybex online, interactive learning environment offering 650 practice questions! Includes a pre-assessment test, hundreds of review questions, practice exams, flashcards, and a glossary of key terms. The book is written in a practical and straightforward manner, ensuring you can easily learn and retain the material.Perfect for everyone planning to take the SY0-601 Exam—as well as those who hope to secure a high-level certification like the CASP+, CISSP, or CISA—the study guide also belongs on the bookshelves of everyone who has ever wondered if the field of IT security is right for them. It's a must-have reference!ABOUT THE AUTHORSMIKE CHAPPLE, PHD, SECURITY+, CYSA+, CISSP, is Teaching Professor of IT, Analytics, and Operations at the University of Notre Dame. He's a cybersecurity professional and educator with over 20 years of experience. Mike provides cybersecurity certification resources at his website, CertMike.com. DAVID SEIDL, SECURITY+, CYSA+, CISSP, PENTEST+, is Vice President for Information Technology and CIO at Miami University. David co-led Notre Dame's move to the cloud and has written multiple cybersecurity certification books. Introduction xxvAssessment Test xxxviCHAPTER 1 TODAY’S SECURITY PROFESSIONAL 1Cybersecurity Objectives 2Data Breach Risks 3The DAD Triad 3Breach Impact 5Implementing Security Controls 7Security Control Categories 7Security Control Types 8Data Protection 9Summary 12Exam Essentials 12Review Questions 14CHAPTER 2 CYBERSECURITY THREAT LANDSCAPE 19Exploring Cybersecurity Threats 20Classifying Cybersecurity Threats 20Threat Actors 22Threat Vectors 28Threat Data and Intelligence 30Open Source Intelligence 31Proprietary and Closed-Source Intelligence 33Assessing Threat Intelligence 35Threat Indicator Management and Exchange 36Public and Private Information Sharing Centers 37Conducting Your Own Research 38Summary 38Exam Essentials 39Review Questions 40CHAPTER 3 MALICIOUS CODE 45Malware 46Ransomware 47Trojans 47Worms 48Rootkits 48Backdoors 49Bots 50Keyloggers 52Logic Bombs 53Viruses 53Fileless Viruses 53Spyware 54Potentially Unwanted Programs (PUPs) 55Malicious Code 55Adversarial Artificial Intelligence 57Summary 58Exam Essentials 59Review Questions 61CHAPTER 4 SOCIAL ENGINEERING, PHYSICAL, AND PASSWORD ATTACKS 65Social Engineering 66Social Engineering Techniques 67Influence Campaigns 72Password Attacks 72Physical Attacks 74Summary 76Exam Essentials 76Review Questions 78CHAPTER 5 SECURITY ASSESSMENT AND TESTING 83Vulnerability Management 84Identifying Scan Targets 84Determining Scan Frequency 86Configuring Vulnerability Scans 87Scanner Maintenance 92Vulnerability Scanning Tools 95Reviewing and Interpreting Scan Reports 96Validating Scan Results 106Security Vulnerabilities 107Patch Management 107Legacy Platforms 108Weak Configurations 109Error Messages 110Insecure Protocols 111Weak Encryption 112Penetration Testing 113Adopting the Hacker Mindset 114Reasons for Penetration Testing 115Benefits of Penetration Testing 115Penetration Test Types 116Rules of Engagement 118Reconnaissance 119Running the Test 120Cleaning Up 120Training and Exercises 120Summary 122Exam Essentials 122Review Questions 124CHAPTER 6 SECURE CODING 129Software Assurance Best Practices 130The Software Development Life Cycle 130Software Development Phases 131Software Development Models 133DevSecOps and DevOps 136Designing and Coding for Security 138Secure Coding Practices 138API Security 139Code Review Models 139Software Security Testing 143Analyzing and Testing Code 143Injection Vulnerabilities 144SQL Injection Attacks 145Code Injection Attacks 148Command Injection Attacks 149Exploiting Authentication Vulnerabilities 150Password Authentication 150Session Attacks 151Exploiting Authorization Vulnerabilities 154Insecure Direct Object References 154Directory Traversal 155File Inclusion 156Privilege Escalation 157Exploiting Web Application Vulnerabilities 157Cross-Site Scripting (XSS) 158Request Forgery 160Application Security Controls 161Input Validation 162Web Application Firewalls 163Database Security 163Code Security 166Secure Coding Practices 168Source Code Comments 168Error Handling 168Hard-Coded Credentials 170Memory Management 170Race Conditions 171Unprotected APIs 172Driver Manipulation 172Summary 173Exam Essentials 173Review Questions 175CHAPTER 7 CRYPTOGRAPHY AND THE PUBLIC KEY INFRASTRUCTURE 179An Overview of Cryptography 180Historical Cryptography 181Goals of Cryptography 186Confidentiality 187Integrity 188Authentication 188Nonrepudiation 189Cryptographic Concepts 189Cryptographic Keys 189Ciphers 190Modern Cryptography 191Cryptographic Secrecy 191Symmetric Key Algorithms 192Asymmetric Key Algorithms 193Hashing Algorithms 196Symmetric Cryptography 197Data Encryption Standard 197Triple DES 199Advanced Encryption Standard 200Symmetric Key Management 200Asymmetric Cryptography 203RSA 203Elliptic Curve 204Hash Functions 205SHA 206MD5 207Digital Signatures 207HMAC 208Digital Signature Standard 209Public Key Infrastructure 209Certificates 209Certificate Authorities 211Certificate Generation and Destruction 212Certificate Formats 215Asymmetric Key Management 216Cryptographic Attacks 217Emerging Issues in Cryptography 220Tor and the Dark Web 220Blockchain 220Lightweight Cryptography 221Homomorphic Encryption 221Quantum Computing 222Summary 222Exam Essentials 222Review Questions 224CHAPTER 8 IDENTITY AND ACCESS MANAGEMENT 229Identity 230Authentication and Authorization 231Authentication and Authorization Technologies 232Directory Services 236Authentication Methods 237Multifactor Authentication 237One-Time Passwords 239Biometrics 241Knowledge-Based Authentication 243Managing Authentication 244Accounts 245Account Types 245Account Policies and Controls 245Access Control Schemes 248Filesystem Permissions 249Summary 251Exam Essentials 252Review Questions 253CHAPTER 9 RESILIENCE AND PHYSICAL SECURITY 257Building Cybersecurity Resilience 258Storage Resiliency: Backups and Replication 260Response and Recovery Controls 266Physical Security Controls 269Site Security 269Summary 278Exam Essentials 279Review Questions 281CHAPTER 10 CLOUD AND VIRTUALIZATION SECURITY 285Exploring the Cloud 286Benefits of the Cloud 287Cloud Roles 289Cloud Service Models 289Cloud Deployment Models 293Shared Responsibility Model 295Cloud Standards and Guidelines 298Virtualization 300Hypervisors 300Cloud Infrastructure Components 302Cloud Compute Resources 302Cloud Storage Resources 304Cloud Networking 307Cloud Security Issues 311Availability 311Data Sovereignty 311Virtualization Security 312Application Security 312Governance and Auditing 313Cloud Security Controls 313Cloud Access Security Brokers 314Resource Policies 314Secrets Management 316Summary 316Exam Essentials 316Review Questions 318CHAPTER 11 ENDPOINT SECURITY 323Protecting Endpoints 324Preserving Boot Integrity 325Endpoint Security Tools 326Hardening Endpoints and Systems 332Service Hardening 333Operating System Hardening 335Hardening the Windows Registry 336Configuration, Standards, and Schemas 336Disk Security and Sanitization 338File Manipulation and Other Useful Command-Line Tools 341Scripting, Secure Transport, and Shells 343Securing Embedded and Specialized Systems 344Embedded Systems 345SCADA and ICS 346Securing the Internet of Things 348Specialized Systems 349Communication Considerations 350Security Constraints of Embedded Systems 351Summary 352Exam Essentials 354Review Questions 356CHAPTER 12 NETWORK SECURITY 361Designing Secure Networks 363Network Segmentation 365Network Access Control 366Port Security and Port-Level Protections 367Port Spanning/Port Mirroring 369Virtual Private Network 370Network Appliances and Security Tools 371Network Security, Services, and Management 377Deception and Disruption 382Secure Protocols 383Using Secure Protocols 383Secure Protocols 384Attacking and Assessing Networks 389On-Path Attacks 389Domain Name System Attacks 391Layer 2 Attacks 393Distributed Denial-of-Service Attacks 394Network Reconnaissance and Discovery Tools and Techniques 398Summary 411Exam Essentials 412Review Questions 414CHAPTER 13 WIRELESS AND MOBILE SECURITY 419Building Secure Wireless Networks 420Connectivity Methods 421Wireless Network Models 425Attacks Against Wireless Networks 426Designing a Network 430Controller and Access Point Security 432Wi-Fi Security Standards 433Wireless Authentication 434Managing Secure Mobile Devices 436Mobile Device Deployment Methods 436Mobile Device Management 438Specialized Mobile Device Security Tools 442Summary 442Exam Essentials 443Review Questions 445CHAPTER 14 INCIDENT RESPONSE 449Incident Response 450The Incident Response Process 451Attack Frameworks and Identifying Attacks 457Incident Response Data and Tools 461Security Information and Event Management Systems 462Alerts and Alarms 464Correlation and Analysis 465Rules 465Mitigation and Recovery 473Summary 477Exam Essentials 478Review Questions 480CHAPTER 15 DIGITAL FORENSICS 485Digital Forensic Concepts 486Legal Holds and e-Discovery 487Conducting Digital Forensics 488Acquiring Forensic Data 489Acquisition Tools 493Validating Forensic Data Integrity 496Data Recovery 499Forensic Suites and a Forensic Case Example 499Reporting 504Digital Forensics and Intelligence 504Summary 505Exam Essentials 505Review Questions 507CHAPTER 16 SECURITY POLICIES, STANDARDS, AND COMPLIANCE 511Understanding Policy Documents 512Policies 512Standards 515Procedures 517Guidelines 518Exceptions and Compensating Controls 519Personnel Management 520Least Privilege 520Separation of Duties 521Job Rotation and Mandatory Vacations 521Clean Desk Space 522Onboarding and Offboarding 522Nondisclosure Agreements 522Social Media 522User Training 522Third-Party Risk Management 523Winding Down Vendor Relationships 524Complying with Laws and Regulations 524Adopting Standard Frameworks 525NIST Cybersecurity Framework 525NIST Risk Management Framework 528ISO Standards 529Benchmarks and Secure Configuration Guides 531Security Control Verification and Quality Control 531Summary 533Exam Essentials 534Review Questions 535CHAPTER 17 RISK MANAGEMENT AND PRIVACY 539Analyzing Risk 540Risk Identification 541Risk Calculation 542Risk Assessment 543Managing Risk 547Risk Mitigation 547Risk Avoidance 549Risk Transference 549Risk Acceptance 549Risk Analysis 550Disaster Recovery Planning 552Disaster Types 552Business Impact Analysis 553Privacy 553Sensitive Information Inventory 554Information Classification 554Data Roles and Responsibilities 556Information Lifecycle 557Privacy Enhancing Technologies 557Privacy and Data Breach Notification 558Summary 559Exam Essentials 559Review Questions 560APPENDIX ANSWERS TO REVIEW QUESTIONS 565Chapter 1: Today’s Security Professional 566Chapter 2: Cybersecurity Threat Landscape 567Chapter 3: Malicious Code 569Chapter 4: Social Engineering, Physical, and Password Attacks 572Chapter 5: Security Assessment and Testing 574Chapter 6: Secure Coding 576Chapter 7: Cryptography and the Public Key Infrastructure 578Chapter 8: Identity and Access Management 579Chapter 9: Resilience and Physical Security 582Chapter 10: Cloud and Virtualization Security 584Chapter 11: Endpoint Security 586Chapter 12: Network Security 589Chapter 13: Wireless and Mobile Security 591Chapter 14: Incident Response 594Chapter 15: Digital Forensics 596Chapter 16: Security Policies, Standards, and Compliance 598Chapter 17: Risk Management and Privacy 600Index 603

Regulärer Preis: 35,99 €
Produktbild für Sketch

Sketch

Apps und Websites erstellen mit der Sketch-App.Mit der Sketch-App setzen Sie Apps für Web und mobile Geräte effizienter und intuitiver um. Und dieses umfassende Handbuch hilft Ihnen dabei, Sketch in allen Details kennenzulernen und in der Praxis richtig anzuwenden. Mit den Tipps und Workshops von Micha Kafka starten Sie bei App-Design und Webgestaltung richtig durch: vektorbasiertes Arbeiten, Pages und Artboards anlegen, Objekte ausrichten, Farb- und Schriftoptionen nutzen, mit Symbolen arbeiten, mit Sketch Mirror Layouts in Echtzeit testen, Layouts exportieren u.v.m. Immer im Blick: Gutes Design, UX und Usability. So werden Sie als App-Designer und Web-Designer noch besser, sparen Zeit und überzeugen mit modernen Designs.Leseprobe (PDF-Link)

Regulärer Preis: 39,90 €
Produktbild für Content Design (2. Auflg.)

Content Design (2. Auflg.)

Das Handbuch für Conversion-orientierte Content Marketer, Webdesigner & Unternehmer.Die Autoren erklären Ihnen, wie Sie mit psychologischen Triggern aus Besuchern Ihrer Website Newsletter-Abonnenten, Leads und Kunden machen und wie Sie durch Content-Optimierung nachhaltig Ihre Umsätze steigern. Sie erhalten eine Übersicht über die Voraussetzungen für erfolgreiches Content Design sowie eine klar strukturierte Einführung in die Gestaltung und Konzeption digitaler Inhalte – insbesondere Text, Bild, Video und Audio. Profitieren Sie nicht nur vom Expertenwissen der Autoren, sondern auch von erfahrenen Marketingverantwortlichen bei Facebook, Zalando, Pixum und LogMeIn. Mithilfe der Tipps zur Content- und Conversion-Optimierung sowie passenden Tool-Empfehlungen haben Sie alles was Sie brauchen, um Ihr eigenes Content Marketing auf den nächsten Level zu heben.Mit ihrem Buch richten sich Robert Weller und Ben Harmanus sowohl an Einsteiger als auch an erfahrene Online-Marketing-Manager, die nicht nur einzelne Aufgaben schnell umsetzen, sondern den Zusammenhang von Content und Design in Bezug auf das Marketing in seiner Vielschichtigkeit verstehen wollen. Zahlreiche visuelle Beispiele, bewährte Tipps aus der Marketingpraxis sowie Erfahrungsberichte, Worksheets und Checklisten helfen dabei.

Regulärer Preis: 44,99 €
Produktbild für Convolutional Neural Networks with Swift for Tensorflow

Convolutional Neural Networks with Swift for Tensorflow

Dive into and apply practical machine learning and dataset categorization techniques while learning Tensorflow and deep learning. This book uses convolutional neural networks to do image recognition all in the familiar and easy to work with Swift language.It begins with a basic machine learning overview and then ramps up to neural networks and convolutions and how they work. Using Swift and Tensorflow, you'll perform data augmentation, build and train large networks, and build networks for mobile devices. You’ll also cover cloud training and the network you build can categorize greyscale data, such as mnist, to large scale modern approaches that can categorize large datasets, such as imagenet.Convolutional Neural Networks with Swift for Tensorflow uses a simple approach that adds progressive layers of complexity until you have arrived at the current state of the art for this field.WHAT YOU'LL LEARN* Categorize and augment datasets* Build and train large networks, including via cloud solutions* Deploy complex systems to mobile devicesWHO THIS BOOK IS FORDevelopers with Swift programming experience who would like to learn convolutional neural networks by example using Swift for Tensorflow as a starting point. BRETT KOONCE is the CTO of Quarkworks, a mobile consulting agency. He's a developer with five years experience creating apps for iOS and Android. His team has worked on dozens of apps that are used by millions of people around the world. Brett knows the pitfalls of development and can help you avoid them. Whether you want to build something from scratch, port your app from iOS to Android (or vice versa) or accelerate your velocity, Brett can help.Chapter 1: MNIST: 1D Neural NetworkChapter 2: MNIST: 2D Neural NetworkChapter 3: CIFAR: 2D Nueral Network with BlocksChapter 4: VGG NetworkChapter 5: Resnet 34Chapter 6: Resnet 50Chapter 7: SqueezeNetChapter 8: MobileNrt v1Chapter 9: MobileNet v2Chapter 10: Evolutionary StrategiesChapter 11: MobileNet v3Chapter 12: Bag of TricksChapter 13: MNIST RevisitedChapter 14: You are Here

Regulärer Preis: 56,99 €
Produktbild für Design Patterns in .NET Core 3

Design Patterns in .NET Core 3

Implement design patterns in .NET Core 3 using the latest versions of the C# and F# languages. This book provides a comprehensive overview of the field of design patterns as they are used in today’s developer toolbox. This new edition introduces topics such as Functional Builder, Asynchronous Factory Method, Generic Value Adapter, and new Composite Proxies, including one that attempts to solve the SoA/AoS problem.Using the C# and F# programming languages, DESIGN PATTERNS IN .NET CORE 3 explores the classic design pattern implementations and discusses the applicability and relevance of specific language features for implementing patterns. You will learn by example, reviewing scenarios where patterns are applicable. MVP and patterns expert Dmitri Nesteruk demonstrates possible implementations of patterns, discusses alternatives and pattern inter-relationships, and illustrates the way that a dedicated refactoring tool (ReSharper) can be used to implement design patterns with ease.WHAT YOU WILL LEARN* Become familiar with the latest pattern implementations available in C# 8 and F# 5* Know how to better reason about software architecture* Understand the process of refactoring code to patterns* Refer to researched and proven variations of patterns* Study complete, self-contained examples, including many that cover advanced scenarios* Use the latest implementations of C# and Visual Studio/Rider/ReSharperWHO THIS BOOK IS FORDevelopers who have some experience in the C# language and want to expand their comprehension of the art of programming by leveraging design approaches to solving modern problemsDMITRI NESTERUK is a quantitative analyst, developer, course and book author, and an occasional conference speaker. His interests lie in software development and integration practices in the areas of computation, quantitative finance, and algorithmic trading. His technological interests include C# and C++ programming as well as high-performance computing using technologies such as CUDA and FPGAs. He has been a C# MVP from 2009 to 2018.PART I: INTRODUCTION.-Chapter 1: The SOLID Design PrinciplesChapter 2: The Functional PerspectivePART II: CREATIONAL PATTERNSChapter 3: BuilderChapter 4: FactoriesChapter 5: PrototypeChapter 6: SingletonPART III: STRUCTURAL PATTERNSChapter 7: AdapterChapter 8: BridgeChapter 9: CompositeChapter 10: DecoratorChapter 11: FaçadeChapter 12: FlyweightChapter 13: ProxyPART IV: BEHAVIORAL PATTERNSChapter 14: Chain of ResponsibilityChapter 15: CommandChapter 16: InterpreterChapter 17: IteratorChapter 18: MediatorChapter 19: MementoChapter 20: Null ObjectChapter 21: ObserverChapter 22: StateChapter 23: StrategyChapter 24: Template MethodChapter 25: Visitor

Regulärer Preis: 46,99 €
Produktbild für Practical Linux with Raspberry Pi OS

Practical Linux with Raspberry Pi OS

Quickly start programming with Linux while learning the Raspberry Pi OS—the Linux distribution designed specifically for low-cost Raspberry Pis. This short guide reviews Linux commands, GUI, and shell scripting in a holistic manner by diving into both advanced and day-to-day tasks using the Raspberry Pi OS.You'll comfortably work with the Linux command prompt, and explore the RPi OS GUI and all its base applications. Then move into writing your own programs with shell-programming and using high-level languages such as C, C++, and Python 3. You’ll also study hardware and GPIO programming. Use Python 3 for GPIO programming to drive LEDs and pushbuttons.Examples are written in Shell, C, C++, and Python 3. Graphical output is displayed in helpful screenshots that capture just what you’ll see when working in this environment. All code examples are well tested on actual Raspberry Pi boards. After reading this book and following the examples, you’ll be able to write programs for demonstration in your academic/industrial research work, business environment, or just your circle of friends for fun!WHAT YOU'LL LEARN* Navigate the core aspects of Linux and programming on a Linux platform* Install Raspberry Pi OS on a Raspberry Pi* Program in Shell, C, C++, and Python* Redirect Io and work with the crontabWHO THIS BOOK IS FORLinux enthusiasts, software engineers, researchers, business analysts, and managers working with the low-cost Raspberry Pi.Ashwin Pajankar holds a Master of Technology from IIIT Hyderabad, and has over 25 years of programming experience. He started his journey in programming and electronics at the tender age of 7 with BASIC programming language and is now proficient in Assembly programming, C, C++, Java, Shell Scripting, and Python. Other technical experience includes single board computers such as Raspberry Pi and Banana Pro, and Arduino.He is currently a freelance online instructor teaching programming bootcamps to more than 60,000 students from tech companies and colleges. His Youtube channel has an audience of 10000 subscribers and he has published more than 15 books on programming and electronics with many international publications.PRACTICAL LINUX WITH RASPBERRY PI OSChapter 1: Introduction to Raspberry PiChapter 2: Getting ReadyChapter 3: Directory Commands and Text EditorsChapter 4: More CommandsChapter 5: Useful Unix Commands and ToolsChapter 6: Shell ScriptingChapter 7: I/O Redirection and CronChapter 8: Introduction to High Level Programming LanguagesChapter 9: Programming with Python 3 GPIOChapter 10: Exploring Raspberry Pi OS GUIAppendix: Additional Tools

Regulärer Preis: 56,99 €