Computer und IT
Beginning Arduino Nano 33 IoT
Develop Internet of Things projects with Sketch to build your Arduino programs. This book is a quick reference guide to getting started with Nano 33 IoT, Arduino’s popular IoT board.You’ll learn how to access the Arduino I/O, understand the WiFi and BLE networks, and optimize your board by connecting it to the Arduino IoT Cloud.Arduino Nano 33 IoT is designed to build IoT solutions with supported WiFi and BLE networks. This board can be easily extend through I/O pins, sensors and actuators.Beginning Arduino Nano 33 IoTis the perfect solution for those interested in learning how to use the latest technology and project samples through a practical and content-driven approach.WHAT YOU’LL LEARN* Prepare and set up Arduino Nano 33 IoT board* Operate Arduino Nano 33 IoT board hardware and software* Develop programs to access Arduino Nano 33 IoT board I/O* Build IoT programs with Arduino Nano 33 IoT boardWHO THIS BOOK IS FORMakers, developers, students, and professional of all levels. Agus Kurniawan is a lecturer, IT consultant, and author. He has 15 years of experience in various software and hardware development projects, delivering materials in training and workshops, and technical writing. He has been awarded the Microsoft Most Valuable Professional (MVP) award 16 years in a row.Agus is a lecturer and researcher in the field of networking and security systems at the Faculty of Computer Science, Universitas Indonesia, Indonesia.He can be reached on his Linkedin at @agusk and Twitter at @agusk2010.Chapter 1: Setting up Development EnvironmentChapter goal: to introduce Arduino Nano 33 IoT and set up development environment1.1 Introduction1.2 Review Arduino Nano 33 IoT Board1.3 Set up Development Environment1.4 Hello Arduino: Blinking ProgramChapter 2: Arduino Nano 33 IoT Board DevelopmentChapter goal: to access Arduino Nano 33 IoT I/O and communication protocol2.1 Introduction2.2 Basic Sketch Programming2.3 Digital I/O2.4 Analog I/O2.5 Serial Communication2.6 PWM2.7 SPI2.8 I2CChapter 3: IMU Sensor: Accelerator and GyroscopeChapter goal: to access built-in sensors on Arduino Nano 33 IoT3.1 Introduction3.2 Set up LSM6DS3 Library3.3 Working with Accelerator3.4 Working with GyroscopeChapter 4: Arduino Nano 33 IoT NetworkingChapter goal: to access a network from Arduino Nano 33 IoT board4.1 Introduction4.2 Adding WiFiNINA Library4.3 Scanning WiFi Hotspot4.4 Connecting to a WiFi Network4.5 Building a Simple IoT Application4.6 Real Time Clock (RTC)4.7 Accessing Network Time Protocol (NTP) ServerChapter 5: Arduino IoT CloudChapter goal: to work with Arduino IoT Cloud on Arduino Nano 33 IoT board5.1 Introduction5.2 Setting up Arduino Cloud5.3 Build Arduino IoT Cloud ProjectChapter 6: Bluetooth Low Energy (BLE)Chapter goal: to work with Bluetooth Low Energy (BLE) on Arduino Nano 33 IoT board6.1 Introduction6.2 Setting up Bluetooth Low Energy (BLE)6.3 Demo: Controlling LED with BLE
Blockchain
Wer noch nie über Blockchain gehört hat, würde bestimmt das Buch gerade nicht in der Hand halten. Das Thema ist heiß diskutiert und hat bereits viele Befürworter sowie Gegner. In diesem Buch erwartet Sie eine klare und verständliche Erklärung der Blockchain-Technologie mit ausführlichen Erläuterungen zu deren Entstehung, Technik und Umsetzung. Damit möchten wir die Debatte um Blockchain-Hype versachlichen und Ihnen die Entscheidung überlassen, ob Blockchain für Sie tatsächlich ein Hype oder eine Innovation ist. Christoph Meinel (Univ.-Prof., Dr. sc. nat., Dr. rer. nat., 1954) ist wissenschaftlicher Direktor und Geschäftsführer des Hasso-Plattner-Instituts für Digital Engineering gGmbH (HPI). Christoph Meinel ist ordentlicher Professor (C4) für Informatik und hat den Lehrstuhl für Internet-Technologien und Systeme am HPI inne. Seine besonderen Forschungsinteressen liegen in den Bereichen Internet- und Informationssicherheit und Digitale Bildung. Daneben ist er aktiv in der Innovationsforschung rund um die Stanforder Innovationsmethode des Design Thinking.Tatiana Gayvoronskaya ist seit März 2016 in der Forschung in den Bereichen Blockchain-Technologie, Identitätsmanagement und IT-Sicherheit am Hasso-Plattner-Institut für Digital Engineering gGmbH (HPI) tätig. Zusammen mit Prof. Dr. Christoph Meinel hat sie bereits im Juli 2018 einen MOOC auf OpenHPI-Plattform zum Thema Blockchain erarbeitet und durchgeführt.
Strategie, Planung und Organisation von Testprozessen
Das Buch gibt konkrete Tipps zur erfolgreichen Organisation von Softwaretests. Denn: Für erfolgreiche Testprojekte sind Planung und Konzeption im Vorfeld essentiell. Die richtigen Weichenstellungen verhindern von Anfang an Probleme und zeigen notwendige Handlungsbedarfe im Softwaretest auf. Dieses Werk zeigt neben theoretischen Grundlagen die Umsetzung in der Praxis auf und behandelt dabei typische Probleme. Frank Witte erläutert die entscheidenden Aspekte, die im Testkonzept zu berücksichtigen sind, um den Testprozess optimal zu unterstützen und zu begleiten.FRANK WITTE verfügt über langjährige Erfahrung im Softwaretest in unterschiedlichen Unternehmen und Branchen. Bei jedem neuen Softwareprojekt ist es für ihn erforderlich, Testaktivitäten umfassend zu planen und den Test zu organisieren. Daher hat er bereits mehrere Testkonzepte selbst verfasst und erfahren, worauf es dabei besonders ankommt und welche Probleme bereits im Vorfeld und am Beginn von Testprozessen erkannt, aber auch proaktiv verhindert oder verringert werden können.Testdokumente nach IEEE 829.- Teststrategie.- Testziele.- Testplanung.- Bezeichnung des Testkonzepts und Einleitung.- Testorganisation.- Prozessbeschreibung.-Testobjekte und Testphasen.-Teststufen.- Zu testende Leistungsmerkmale.-Leistungsmerkmale, die nicht getestet werden.-Priorisierung von Testfällen.-Permanente Testorganisation.-Abnahmekriterien .-Kriterien für Testabbruch und Testfortsetzung.-Testrisiken.-Testdaten.-Testdokumentation.-Testaufgaben.-Testumgebung.-Verantwortlichkeiten, Zuständigkeiten und Kommunikation.-Personal, Einarbeitung, Ausbildung.-Zeitplan/ Arbeitsplan.-Planungsrisiken und Unvorhersehbares.-Genehmigung und Freigabe.-Projektorganisation.-Testmethoden.-Reifegrad des Testmanagements.-Besonderheiten der Testorganisation in agilen Projekten.-Künstliche Intelligenz und kognitives Testen.
Practical Machine Learning with AWS
Successfully build, tune, deploy, and productionize any machine learning model, and know how to automate the process from data processing to deployment.This book is divided into three parts. Part I introduces basic cloud concepts and terminologies related to AWS services such as S3, EC2, Identity Access Management, Roles, Load Balancer, and Cloud Formation. It also covers cloud security topics such as AWS Compliance and artifacts, and the AWS Shield and CloudWatch monitoring service built for developers and DevOps engineers. Part II covers machine learning in AWS using SageMaker, which gives developers and data scientists the ability to build, train, and deploy machine learning models. Part III explores other AWS services such as Amazon Comprehend (a natural language processing service that uses machine learning to find insights and relationships in text), Amazon Forecast (helps you deliver accurate forecasts), and Amazon Textract.By the end of the book, you will understand the machine learning pipeline and how to execute any machine learning model using AWS. The book will also help you prepare for the AWS Certified Machine Learning—Specialty certification exam.WHAT YOU WILL LEARN* Be familiar with the different machine learning services offered by AWS * Understand S3, EC2, Identity Access Management, and Cloud Formation* Understand SageMaker, Amazon Comprehend, and Amazon Forecast* Execute live projects: from the pre-processing phase to deployment on AWSWHO THIS BOOK IS FORMachine learning engineers who want to learn AWS machine learning services, and acquire an AWS machine learning specialty certificationHIMANSHU SINGH is Technology Lead and Senior NLP Engineer at Legato Healthcare (an Anthem Company). He has seven years of experience in the AI industry, primarily in computer vision and natural language processing. He has authored three books on machine learning. He has an MBA from Narsee Monjee Institute of Management Studies, and a postgraduate diploma in Applied Statistics.Part-I – Introduction to Amazon Web Services (100 Pages)Chapter 1: AWS Concepts and TechnologiesIntroduction to services like S3, EC2, Identity Access Management, Roles, Load Balancer, Cloud Formation, etc.Chapter 2: AWS Billing and PricingUnderstanding AWS pricing, billing, group and tagging, etc.Chapter 3: AWS Cloud SecurityDescription about AWS compliance and artifacts, AWS Shield, Cloudwatch, Cloud Trail, etc.Part-II – Machine Learning in AWS (300 Pages)Chapter 4: Data Collection and PreparationConcepts include AWS data stores, migration and helper tools. It also includes pre-processing concepts like encoding, feature engineering, missing values removal, etc.Chapter 5: Data Modelling and AlgorithmsIn this section, we will talk about all the algorithms that AWS supports, including regression, clustering, classification, image, and text analytics, etc. We will then look at Sagemaker service and how to make models using it.Chapter 6: Data Analysis and VisualizationThis chapter talks about the relationship between variables, data distributions, the composition of data, etc.Chapter 7: Model Evaluation and OptimizationThis chapter talks about the monitoring of training jobs, evaluating the model accuracy, and fine-tuning models.Chapter 8: Implementation and OperationIn this chapter, we’ll look at the deployment of models, security, and monitoring.Chapter 9: Building a Machine Learning WorkflowIn this chapter, we’ll look at the machine learning workflow in AWS .Part-IV – Projects (100 Pages)Chapter 10: Project – Building skills with AlexaChapter 11: Project - Time series forecasting using Amazon forecastChapter 12: Project – Modelling and deployment using XGBoost in SagemakerChapter 13: Text classification using Amazon comprehend and textractChapter 14: Building a complete project pipeline
Pro Cryptography and Cryptanalysis
Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography.Modern cryptography is the lifeboat of a secure infrastructure. From global economies and governments, to meeting everyday consumer needs, cryptography is ubiquitous, and used in search, design, data, artificial intelligence, and other fields of information technology and communications. Its complexity can lead to misconfiguration, misuse, and misconceptions. For developers who are involved in designing and implementing cryptographic operations in their applications, understanding the implications of the algorithms, modes, and other parameters is vital.PRO CRYPTOGRAPHY AND CRYPTANALYSIS is for the reader who has a professional need or personal interest in developing cryptography algorithms and security schemes using C# and .NET. You will learn how to implement advanced cryptographic algorithms (such as Elliptic Curve Cryptography Algorithms, Lattice-based Cryptography, Searchable Encryption, Homomorphic Encryption), and come away with a solid understanding of the internal cryptographic mechanisms, and common ways in which the algorithms are correctly implemented in real practice. With the new era of quantum computing, this book serves as a stepping stone to quantum cryptography, finding useful connections between current cryptographic concepts and quantum related topics.WHAT YOU WILL LEARN* Know when to enlist cryptography, and how it is often misunderstood and misused* Explore modern cryptography algorithms, practices, and properties* Design and implement usable, advanced cryptographic methods and mechanisms* Understand how new features in C# and .NET impact the future of cryptographic algorithms* Use the cryptographic model, services, and System.Security.Cryptography namespace in .NET* Modernize your cryptanalyst mindset by exploiting the performance of C# and .NET with its weak cryptographic algorithms* Practice the basics of public key cryptography, including ECDSA signatures* Discover how most algorithms can be brokenWHO THIS BOOK IS FORInformation security experts, cryptologists, software engineers, developers, data scientists, and academia who have experience with C#, .NET, as well as IDEs such as Visual Studio, VS Code, or Mono. Because this book is for an intermediate to advanced audience, readers should also possess an understanding of cryptography (symmetric and asymmetric) concepts.MARIUS IULIAN MIHAILESCU, PHD is CEO of Dapyx Solution Ltd., a company focused on security- and cryptography-related research. He has authored and co-authored more than 50 articles, journal contributions, and conference proceedings, and three books related to security and cryptography. He lectures at well-known national and international universities, teaching courses on programming, cryptography, information security, and other technical topics. He holds a PhD (thesis on applied cryptography over biometrics data) and two MSc in information security and software engineering.STEFANIA LOREDANA NITA, PHD is a software developer and researcher at the Institute for Computers. Prior to that she was an assistant lecturer at the University of Bucharest, where she taught courses on advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 papers and journals, most recently Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption, as well as two books. She holds a PhD (thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption), an MSc in software engineering and two BSc in computer science and mathematics.PART I: FOUNDATIONAL TOPICSChapter 1: Cryptography FundamentalsChapter 2: Mathematical Background and Its ApplicabilityChapter 3: Large Integer ArithmeticChapter 4: Floating-Point ArithmeticChapter 5: What's New in C# 8.0Chapter 6: Secure Coding GuidelinesChapter 7: .NET Cryptography ServicesChapter 8: Overview of System.Cryptography NamespaceChapter 9: Cryptography Libraries in C# and .NETPART II: CRYPTOGRAPHYChapter 10: Elliptic-Curve CryptographyChapter 11: Lattice-based CryptographyChapter 12: Searchable EncryptionChapter 13: Homomorphic EncryptionChapter 14: (Ring) Learning with Errors CryptographyChapter 15: Chaos-based CryptographyChapter 16: Big Data CryptographyChapter 17: Cloud Computing CryptographyPART III: PRO CRYPTANALYSISChapter 18: Getting Started with CryptanalysisChapter 19: Cryptanalysis Attacks and TechniquesChapter 20: Linear and Differential CryptanalysisChapter 21: Integral CryptanalysisChapter 22: AttacksChapter 23: Text CharacterizationChapter 24: Implementation and Practical Approach of Cryptanalysis Methods
Azure DevOps for Web Developers
Explore the architecture, product offerings, and the various stages of implementation processes in Azure DevOps. The book starts with the basic concepts of DevOps and moves on to discuss project management in Azure DevOps. Next, you will learn requirement management and version control in DevOps. Along the way, you will go through test management followed by continuous integration and build automation with more details on code quality and security implementations.Moving forward, you will learn release pipeline and infrastructure as code implementation including ARM-based environment provisioning and execution. Finally, you’ll cover DevOps architecture blueprints used for deploying your web applications to different platforms .After reading this book, you will be able to understand each stage of Azure DevOps and master its implementation.WHAT YOU WILL LEARN* Understand the various concepts of Azure DevOps* Apply DevOps concepts in a variety of application contexts including web applications, containers, and database* Understand the implementation of end-to-end DevOps in Azure* Work with the different DevOps design patterns and architectures in AzureWHO IS THIS BOOK FOR:Developers and architects working with Azure.For over a dozen years AMBILY has worked on cloud adoption and accelerating software delivery through DevOps. As the head of Azure, DevOps, and UI practice at TCS HiTech Industry she supports major public and private sector companies across the globe in their cloud journey and DevOps implementation. Ambily blogs about her experiences and speaks at conferences to share what she has learned.Blog at https://ambilykk.com/CHAPTER 1: DEVOPS BASICS AND VARIATIONSCovers the basic concepts of DevOps and how the journey or explain the maturity model of DevOps in an organization. This roughly cover the concepts like DevOps Team, DevOps Practices,DevOps Variations- DevOps 1.0, DevOps 2.0, SecDevOps and Intelligent DevOpsCHAPTER 2: PROJECT MANAGEMENT USING AZURE DEVOPSThis chapter talks about organization and project. Start with creation of Azure DevOps organization, user management, Security policies, permissions, Azure AD integration, etc. Then, step into a single project and explain project level permissions, areas, iterations, process, etc.CHAPTER 3: REQUIREMENT MANAGEMENT USING AZURE DEVOPSExplain the usage of different work items like Epic, features, product backlog, spring backlog, etc. How the requirements are tracked in the systemCHAPTER 4: VERSION CONTROL USING AZURE DEVOPSExplain the version control system, possibilities to integrate with external systems, how to work offline and online mode, etc. Branching and merging strategy followed by various teams.CHAPTER 5: TEST MANAGEMENT USING AZURE DEVOPSThis chapter focus of the Test plans which should be executed to verify the implementations.CHAPTER 6: CONTINUOUS INTEGRATION AND BUILD AUTOMATIONDiscuss about the concept of Continuous Integration with the help of web application and database project. Also, explain more about the code quality and security implementations in build configuration.CHAPTER 7: RELEASE PIPELINE AND CONTINUOUS DEPLOYMENTThis chapter focus on the release pipeline and Infrastructure as a code implementation. Covers ARM based environment provisioning, execution of automated test scripts, implementation of quality gates and approval flows, and release to various environments.CHAPTER 8: CONTINUOUS FEEDBACK AND OTHER FEATURESExplains the Integration of AppInsights back to the DevOps backlog, alert configurations, collaboration features.CHAPTER 9: DEVOPS ARCHITECTURE BLUEPRINTSThis chapter covers architecture blueprints for commonly used Azure product catalogs.CHAPTER 10: DEVOPS FOR SUPPORT TEAMThis chapter covers more about the Swarming support model and various architecture options.
Pro Microsoft Power BI Administration
Manage Power BI within organizations. This book helps you systematize administration as Microsoft shifts Power BI from a self-service tool to an enterprise tool. You will learn best practices for many Power BI administrator tasks. And you will know how to manage artifacts such as reports, users, work spaces, apps, and gateways. The book also provides experience-based guidance on governance, licensing, and managing capacities.Good management includes policies and procedures that can be applied consistently and even automatically across a broad user base. This book provides a strategic road map for the creation and implementation of policies and procedures that support Power BI best practices in enterprises. Effective governance depends not only on good policies, but also on the active and timely monitoring of adherence to those policies. This book helps you evaluate the tools to automate and simplify the most common administrative and monitoring tasks, freeing up administrators to provide greater value to the organization through better user training and awareness initiatives.WHAT YOU WILL LEARN* Recognize the roles and responsibilities of the Power BI administrator* Manage users and their work spaces* Know when to consider using Power BI Premium* Govern your Power BI implementation and manage Power BI tenants* Create an effective security strategy for Power BI in the enterprise* Collaborate and share consistent views of the data across all users* Follow a life cycle management strategy for rollout of dashboards and reports* Create internal training resources backed up by accurate documentation* Monitor Power BI to better understand risks and compliance manage costs, and track implementation WHO THIS BOOK IS FORIT professionals tasked with maintaining their corporate Power BI environments, Power BI administrators and power users interested in rolling out Power BI more widely in their organizations, and IT governance professionals tasked with ensuring adherence to policies and regulationsÁSGEIR GUNNARSSON is a data platform MVP and Chief Consultant at Datheos. He works on business intelligence solutions using the whole of the Microsoft BI stack. Ásgeir has been working in BI since 2007 both as a consultant and internal employee. Before turning to BI, he worked as a technical trainer and he currently teaches BI courses at the Continuing Education Department of the University of Iceland. Ásgeir speaks regularly at events both domestic and internationally and is the group leader of the Icelandic PASS Group as well as the Icelandic Power BI user group. He is passionate about data and loves solving problems with BI.MICHAEL JOHNSON is a data platform MVP from Johannesburg, South Africa where he works as a business intelligence architect. Outside of work, Michael runs the local SQL Server User Group and provides Power BI presentations and training both locally and abroad.PART I. GOVERNANCE1. Introduction to Governance and Governance Strategies2. Power BI Licensing3. Collaboration4. Laws and Policies5. Application Lifecycle Management6. Training7. DocumentationPART II. ADMINISTRATION8. Introduction to Power BI Administration9. Managing the Tenant10. Administering Power BI Capacities11. Workspace Administration12. Managing Users and Security13. Datasets & Dataflows14. On-premises Data Gateway15. Power BI Administration Tools16. Monitoring
Vorkurs Informatik für Dummies
Möchten Sie Informatik studieren und sich vorbereiten, um peinliche Wissenslücken zu vermeiden? Dann ist dieses Buch genau das richtige für Sie! Es verschafft Ihnen einen verständlichen und strukturierten Einblick in die Grundlagen der Informatik. Von der notwendigen Mathematik über erste Programmierschritte mit Python und Java bis zu Kryptografie, Datenbanken und Theoretischer Informatik ist alles dabei. Der Autor kennt die typischen Probleme und Verständnishürden der Erstsemester und hilft Ihnen, einen guten Start ins Informatikstudium zu finden. Und dazu brauchen Sie außer Schulmathe und Interesse für Informatik keinerlei Vorkenntnisse. Also los geht?s, starten Sie gut vorbereitet ins Studium. Hans Werner Lang studierte Informatik an der Universität Kiel und promovierte dort 1990 zu einem Thema aus dem Bereich "Parallele Architekturen und Algorithmen". Von 1994 bis 2017 war er Professor für Informatik an der Hochschule Flensburg und hat in dieser Zeit zahlreiche Vorlesungen zur Informatik gehalten.EINLEITUNG 19Über dieses Buch 19Konventionen in diesem Buch 19Was Sie nicht lesen müssen 20Törichte Annahmen über den Leser 20Wie dieses Buch aufgebaut ist 21Teil I: Programmieren 21Teil II: Algorithmen 21Teil III: Mathematik 21Teil IV: Codierung 22Teil V: Praktische Informatik 22Teil VI: Theoretische Informatik 22Teil VII: Top-Ten-Teil 23Symbole, die in diesem Buch verwendet werden 23Wie es weitergeht 24Bitte und Danke sagen 24TEIL I: PROGRAMMIEREN 25KAPITEL 1 PROGRAMMIEREN IN JAVA27Wertzuweisung 27Variablen deklarieren 28Wozu Datentypen? 28Einen Wert zuweisen 29Einen Wert überschreiben 30Numerische Datentypen und Operationen 31Typumwandlung bei numerischen Datentypen 32Bedingte Anweisung 33If-Anweisung 33If-Else-Anweisung 34Flussdiagramme zeichnen 35Datentyp boolean 36Boolesche Operationen 38Kommentare 39Zum Üben 39KAPITEL 2 PROGRAMMSCHLEIFEN, DATENFOLGEN UND ZEICHENKETTEN41While-Schleife 41Fakultäten berechnen 43Programmschleifen entwerfen 44Iterationsschema aufstellen 44Iterationsgleichungen ableiten 44Regeln für das Aufstellen der Iterationsgleichungen 45Iterationsgleichungen in eine While-Schleife umsetzen 45For-Schleife 46Arrays 47Array erzeugen 47Array durchlaufen 48Strings 49Strings verketten 50String-Methoden anwenden 50Zum Üben 52Iterationsschema aufstellen und in While-Schleife umsetzen 52Primzahlen mit dem Sieb des Eratosthenes 52KAPITEL 3 FUNKTIONEN55Funktionen definieren und aufrufen 55Funktionsdefinition 56Funktionsaufruf 57So funktioniert ein Stack 58Lokale Variablen benutzen 59Funktionen mit mehreren Parametern 60Funktionen ohne Parameter 61Funktionen ohne Rückgabewert 61Rekursive Funktionen 63Ausführung einer rekursiven Funktion 63Zum Üben 66Ziehung der Lottozahlen 66KAPITEL 4 OBJEKTORIENTIERT PROGRAMMIEREN69Klasse und Objekt 69Attribute und Methoden 69Kommentare und Benennungen 70Bruchrechnung 70Methoden 71Rechenoperationen mit Brüchen 73Bruch normalisieren 74Bruch kürzen 75Objektorientierung in Java 76Zum Üben 76TEIL II: ALGORITHMEN 77KAPITEL 5 ALGORITHMUS79Typische Anweisungsformen 79Algorithmisch denken 80KAPITEL 6 BINÄRE SUCHE81Suchstrategie 81Logarithmus 82Algorithmus binäre Suche 83Zum Üben 84KAPITEL 7 EINFACHES SORTIEREN85Minimum einer Datenfolge bestimmen 85Selectionsort 86Array sortieren 87Programm 87Zeitkomplexität 88Analyse von Selectionsort 89KAPITEL 8 ZEITKOMPLEXITÄT VON ALGORITHMEN91Zeitkomplexität 92Untere und obere Schranken 92Schlechtester Fall 93Asymptotische Analyse 93O-Notation 94Zum Üben 95KAPITEL 9 MERGESORT97Divide-and-Conquer-Strategie 97Ablauf von Mergesort 98Verschmelzen zweier sortierter Hälften eines Arrays 98Implementierung 99Zeitkomplexität 101Untere Schranke für das Sortieren 101Zum Üben 102KAPITEL 10 KÜRZESTE WEGE IN EINEM GRAPHEN103Idee des Verfahrens 103Greedy-Strategie 105Umsetzung in einen Algorithmus 105KAPITEL 11 KÜRZESTE RUNDREISE 107Problem des Handlungsreisenden 108Die Mengen P und NP 108Nichtdeterministischer Algorithmus 109Polynomielle Zeitkomplexität 110NP-vollständige Probleme 111Erfüllbarkeitsproblem (SAT) 112Reduktion von SAT auf CLIQUE 112TEIL III: MATHEMATIK 115KAPITEL 12 LOGIK117Logische Aussagen 117Logische Verknüpfungen 118Formale Logik 120Allgemeingültige Aussagen 121Gesetze der Logik 121Logik im Alltag 123Entweder Oder oder Entweder-Oder 123Wenn-dann in der Umgangssprache 123Die Tücken der logischen Folgerung 124Prädikate 125Quantoren 125Zum Üben 127KAPITEL 13 MENGE129Mengen bilden 129Teilmenge 131Die leere Menge 132Potenzmenge 134Mengen verknüpfen 134Komplement 135Gesetze der Mengenlehre 136Duale Gesetze 136Zum Üben 137KAPITEL 14 RELATION139Kartesisches Produkt 139Relation als Teilmenge eines kartesischen Produkts 140Schreibweise von Relationen 141Relationen anschaulich darstellen 141Eigenschaften von Relationen 143Beispiele dieser Eigenschaften 143Ordnungsrelation und Äquivalenzrelation 144Operationen auf Relationen 145n-stellige Relationen 146Wozu brauchen wir das? 146Zum Üben 147KAPITEL 15 ABBILDUNG149Abbildung als spezielle Relation 149Schreibweise für Abbildungen 151Wertetabelle einer Abbildung 151Funktion 152Verknüpfungen 153Wertetabelle einer Verknüpfung 153Verknüpfungstafel 154Eigenschaften von Abbildungen 154Injektive Abbildung 154Surjektive Abbildung 155Wertetabellen von injektiven und surjektiven Abbildungen 156Bijektive Abbildung 157Mächtigkeit von Mengen 157Folgen 158Endliche Folgen 158Zum Üben 159KAPITEL 16 GRAPH161Knoten und Kanten 161Pfad 162Baum 163Ungerichteter Graph 164Markierte Graphen 165Zum Üben 166KAPITEL 17 TEILBARKEIT UND MODULO-RECHNUNG167Teilbarkeit 167Ist null durch null teilbar? 168Teiler einer Zahl 169Größter gemeinsamer Teiler 169Primzahlen 170Modulo-Rechnung 171Modulo n rechnen 173Zum Üben 174KAPITEL 18 GRUPPEN, RINGE UND KÖRPER175Die Gruppenaxiome 175Elemente verknüpfen 176Halbgruppe 177Gruppe 178Die Gruppe 𝕫∗n179Ring 180Körper 181Zum Üben 181KAPITEL 19 BEWEISTECHNIKEN183Direkter Beweis 183Äquivalente Umformung 183Direkte Umformung 184Kontraposition 184Beweis durch Widerspruch 185Es gibt unendlich viele Primzahlen 185Varianten des Widerspruchsbeweises 186√2 ist irrational 186Gaußsche Summenformel 187Beweis durch Induktion 187Dominoeffekt 188Zum Üben 190TEIL IV: CODIERUNG 191KAPITEL 20 BOOLESCHE FUNKTIONEN193Boolesche Funktionen darstellen 194Boolesche Funktionen minimieren 195Algebraische Umformung 195KV-Diagramm 196Blöcke mit Einsen zusammenfassen 197Drei und vier Argumentvariablen 197Anwendung 199Realisierung mit Nand-Verknüpfungen 200Zum Üben 201KAPITEL 21 ZAHLENDARSTELLUNG 203Zahlensysteme zur Basis b 203Zwischen Zahl und Darstellung hin und her rechnen 204Programme 206Zahlensysteme zu anderer Basis 207Ganze Zahlen im Binärsystem 207Betrag-Vorzeichen-Darstellung 208Exzess-Darstellung 208Einerkomplement-Darstellung 209Zweierkomplement-Darstellung 209Kommazahlen im Binärsystem 210Rechnen mit Kommazahlen 211Genauigkeit von Gleitkommazahlen 211Zum Üben 212KAPITEL 22 EINFACHE CODES213Blockcodes 214Hamming-Abstand 216Fehlererkennung 216Binärcode mit Paritätsbit 217KAPITEL 23 DATEN KOMPRIMIEREN219Konstruktion des Huffman-Baums 219Konstruktion des Huffman-Codes 221Eigenschaften des Huffman-Codes 221Informationsgehalt eines Textes 222Zum Üben 222KAPITEL 24 FEHLER ERKENNEN MIT CRC223Idee des Verfahrens 223Polynom 224Polynomdivision 225Der CRC-Algorithmus 225Erkennung von Fehlern 226Zum Üben 227TEIL V: PRAKTISCHE INFORMATIK 229KAPITEL 25 DATENBANKEN231Datenbankrelationen 232Attribut 233Schlüssel 234Datenbankentwurf 235Entitäten und Beziehungen 235Schlüssel und Fremdschlüssel 236Entity-Relationship-Diagramm 237Datenbankanfragen 238Index 240Datenbankmanagementsystem 242Zum Üben 242KAPITEL 26 COMPUTERNETZE243Adressen 243Protokoll 244Protokolle im täglichen Leben 244Protokollstapel 245Schnittstellen 246Protokolle in der Informatik 246KAPITEL 27 VERSCHLÜSSELN MIT ÖFFENTLICHEM SCHLÜSSEL 249Diffie-Hellman-Schlüsselvereinbarung 250Ablauf des Verfahrens 251Problem des diskreten Logarithmus 251Public-Key-Verschlüsselung 252RSA-Verfahren 253Schlüssel erzeugen 254Sicherheit 254Berechnungsverfahren 254Primzahltest 254Schnelle Exponentiation 255Größter gemeinsamer Teiler 257Zum Üben 257TEIL VI: THEORETISCHE INFORMATIK 259KAPITEL 28 BERECHENBARKEIT261Das Halteproblem 262Praktisch nicht berechenbar 263KAPITEL 29 REGULÄRE SPRACHEN265Regulärer Ausdruck 266Reguläre Operationen 266Endlicher Automat 268Arbeitsweise des Automaten 269Formale Definition 270Deterministisch und nichtdeterministisch 271Simulation eines nichtdeterministischen endlichen Automaten 273Teilmengenkonstruktion 275Endliche Automaten und reguläre Sprachen 276Sprachen, die nicht regulär sind 277Zum Üben 278KAPITEL 30 KONTEXTFREIE GRAMMATIK UND STACKAUTOMAT279Kontextfreie Grammatik 279Wörter ableiten 280Eine Sprache erzeugen 281Wörter reduzieren 281Rechtslineare Grammatik 282Noch ein Beispiel 283Stackautomat 283Erkennung von Wörtern 285Zum Üben 286KAPITEL 31 SPRACHKLASSEN UND TURINGMASCHINEN289Hierarchie der Sprachklassen 289Die Sprachklassen L0 und L1 290Grammatiken für L0 290Grammatiken für L1 290Turingmaschine 292Formale Definition 293Arbeitsweise der Turingmaschine 293Turingtabelle 294Mit Turingmaschinen erkennbare Sprachen 295Entscheidbare Sprachen 295Nichtdeterministische und deterministischeTuringmaschinen 296KAPITEL 32 PARSER UND COMPILER299Grammatik als Ausgangspunkt 299Parser für arithmetische Ausdrücke 300Compiler für arithmetische Ausdrücke 303Basisfunktionen für Parser und Compiler 304Zum Üben 307TEIL VII: TOP-10-TEIL 309KAPITEL 33 VIER MAL SIEBEN311Die 7 elementarsten Begriffe 311Die 7 verrücktesten Dinge 312Die 7 cleversten Algorithmen 313Die 7 bedeutendsten Informatik-Pioniere 315TEIL VIII: ANHANG 317ANHANG A: LÖSUNGEN ZU DEN ÜBUNGSAUFGABEN319Teil I: Programmieren 319Teil II: Algorithmen 323Teil III: Mathematik 325Teil IV: Codierung 329Teil V: Praktische Informatik 331Teil VI: Theoretische Informatik 333ANHANG B: ZUM WEITERLESEN337Literaturverzeichnis 341Stichwortverzeichnis 345
Artificial Neural Networks with TensorFlow 2
Develop machine learning models across various domains. This book offers a single source that provides comprehensive coverage of the capabilities of TensorFlow 2 through the use of realistic, scenario-based projects.After learning what's new in TensorFlow 2, you'll dive right into developing machine learning models through applicable projects. This book covers a wide variety of ANN architectures—starting from working with a simple sequential network to advanced CNN, RNN, LSTM, DCGAN, and so on. A full chapter is devoted to each kind of network and each chapter consists of a full project describing the network architecture used, the theory behind that architecture, what data set is used, the pre-processing of data, model training, testing and performance optimizations, and analysis.This practical approach can either be used from the beginning through to the end or, if you're already familiar with basic ML models, you can dive right into the application that interests you. Line-by-line explanations on major code segments help to fill in the details as you work and the entire project source is available to you online for learning and further experimentation. With Artificial Neural Networks with TensorFlow 2 you'll see just how wide the range of TensorFlow's capabilities are.WHAT YOU'LL LEARN* Develop Machine Learning Applications* Translate languages using neural networks* Compose images with style transferWHO THIS BOOK IS FORBeginners, practitioners, and hard-cored developers who want to master machine and deep learning with TensorFlow 2. The reader should have working concepts of ML basics and terminologies.POORNACHANDRA SARANG has 30+ years of IT experience and is an experienced author. His work has always focused on state-of-the-art and emerging technologies. He has provided consulting services to—Sun Microsystems, Microsoft, Oracle, and Hewlett-Packard. He has been a Ph.D. advisor for Computer Science and is currently on a Thesis Advisory Committee for students pursuing Ph.D. in Computer Engineering—setting the course curriculum for both under-graduate and post-graduate courses in Computer Science/Engineering. He has delivered seminars, written articles, and provided consulting recently on Machine Learning and Deep Learning. He maintains a machine learning blog at education.abcom.com. Chapter 1: TensorFlowIntroductionWhat's new in TensorFlow 2Chapter 2: A Quick Start on TensorFlowHello World for TensorFlow using Google ColabChapter 3: TensorFlow Keras Integrationtf.kerasImage ClassificationChapter 4: TensorFlow HubTransfer LearningTensorFlow Hub and KerasChapter 5: RegressionPredicting Continuous Value OutputChapter 6: EstimatorsSolving Classification Problems Using EstimatorsChapter 7: Distributed TrainingDescribing tf.distribute.StrategyChapter 8: TextText ClassificationGeneration with RNNChapter 9: Language TranslationThe seq2seq model for language translationChapter 10: Language UnderstandingUsing Transformer ModelChapter 11: Image CaptioningAttention-based model for captioning imagesChapter 12: Time Series ForecastingUsing RNNsForecasting a univariate/multivariate time seriesChapter 13: Style TransferComposing an image in the style of another imageChapter 14: Image Generation using GANIntroduction to GANGenerating images using a DCGANChapter 15: Image TranslationColorizing B&W images
Red Hat and IT Security
Use Red Hat’s security tools to establish a set of security strategies that work together to help protect your digital data. You will begin with the basic concepts of IT security and DevOps with topics such as CIA triage, security standards, network and system security controls and configuration, hybrid cloud infrastructure security, and the CI/CD process. Next, you will integrate and automate security into the DevOps cycle, infrastructure, and security as code. You will also learn how to automate with Red Hat Ansible Automation Platform and about hybrid cloud infrastructure.The later chapters will cover hyper-converged infrastructure and its security, Red Hat Smart Management, predictive analytics with Red Hat Insights, and Red Hat security auditing to ensure best security practices. Lastly, you will see the different types of case studies with real-world examples.Red Hat and IT Security will help you get a better understanding of IT security concepts from a network and system administration perspective. It will help you to understand how the IT infrastructure landscape can change by implementing specific security best practices and integrating Red Hat products and solutions to counter against modern cybersecurity threats.WHAT YOU WILL LEARN● Understand IT infrastructure security and its best practices● Implement hybrid cloud infrastructure● Realign DevOps process into DevSecOps, emphasizing security● Implement automation in IT infrastructure services using Red Hat Ansible● Explore Red Hat Smart Management, predictive analytics, and auditingWHO THIS BOOK IS FORIT professionals handling network/system administration or the IT infrastructure of an organization. DevOps professionals and cybersecurity analysts would find the book useful.Rithik Chatterjee graduated as an electronics and telecommunications engineer. As he was interested in the networking domain, he completed his course in IT infrastructure management. Later on, he was accredited as a Red Hat Certified System Administrator and Red Hat Certified Engineer. Working for a startup, his responsibilities included network/system administration, IT security, information security, and DevOps. Having gained a better understanding of the IT landscape, his interest and goals leaned towards cybersecurity leading to his training and certification as an EC-Council Certified Ethical Hacker.His hobbies include landscape and wildlife photography, blogging, reading, and watching anime. To pursue his hobby of writing he developed his own blogging website (Inspirio Scripts), also encouraging budding authors like him to pen their thoughts.CHAPTER 1: INTRODUCTION TO IT SECURITYChapter Goal: Introduction to IT Security conceptsSub-Topics:Networking basicsSystem administration and IT InfrastructureStandardizing security in Red Hat Enterprise LinuxConclusionCHAPTER 2: RED HAT HYBRID CLOUD INFRASTRUCTUREChapter Goal: To understand the concepts and technologies related to cloud infrastructure and automating the security process.Sub - Topics:Basics of Cloud InfrastructureIntroduction to Hybrid Cloud ArchitectureOrchestration with Red Hat OpenShiftBuilding Hybrid Cloud with Red Hat Cloud SuiteCHAPTER 3: SECURITY IN DEVOPS AND AUTOMATIONChapter Goal: To grasp and gain a better understanding of the importance of security in DevOps and automation using Red Hat technologiesSub - Topics:Difference between DevOps and DevSecOpsAutomation with Red Hat Ansible Automation PlatformDevSecOps Integration with Red Hat OpenShiftInfrastructure as Code and Security as CodeBenefits of Red Hat ConsultingCHAPTER 4: RED HAT HYPERCONVERGED INFRASTRUCTUREChapter Goal: To learn about the advantages of using a hyper-converged infrastructure and how to ensure its security.Sub - Topics:What is a hyper-converged infrastructure?Red Hat Hyperconverged Infrastructure for VirtualizationOpen & Scalable Red Hat VirtualizationFlexibility with Red Hat Gluster StorageRed Hat Hyperconverged Infrastructure for CloudCloud Computing with Red Hat OpenStack PlatformScalability with Red Hat Ceph StorageHyperconverged Infrastructure Security best practicesCHAPTER 5: RED HAT SMART MANAGEMENT AND RED HAT INSIGHTSChapter Goal: To learn how to manage Red Hat Infrastructure across every environment and also learn about predictive analytics and how it improves the security of any infrastructureSub - Topics:Introduction to Red Hat SatelliteInfrastructure Controlling with Red Hat Smart ManagementLearn how to evaluate vulnerabilities and verify compliancePredictive analytics using Red Hat InsightsCHAPTER 6: RED HAT SECURITY AUDITINGChapter Goal: Learn about the importance and best practices of Security Auditing in Red Hat Enterprise LinuxSub - Topics:System AuditingRed Hat security auditing best practicesConclusionCHAPTER 7: CASE STUDIESChapter Goal: Learn about some of the real-world examples regarding IT Security and ramifications caused due to security negligence.Sub - Topics:Learn more about the real-world case studies related to some of the impacting IT and cybersecurity incidents and what the technological world has learned from them.
Daten- und Informationsqualität
Dieses Buch war das erste deutsche Buch zum Thema Daten- und Informationsqualität und ist mittlerweile ein Klassiker. Es wurde für die fünfte Auflage um neue Inhalte erweitert, aktualisiert und an zahlreichen Stellen überarbeitet. Von Wissenschaftlern und Praktikern geschrieben, präsentiert es den aktuellen Stand aus Forschung und Anwendung und ist somit ein Muss für alle IT-Profis.PROF. DR. KNUT HILDEBRAND ist als Hochschullehrer an der Hochschule Weihenstephan-Triesdorf mit dem Forschungsschwerpunkt Stammdatenqualität und Stammdatenmanagement tätig. Zudem war er Mitglied der Gesellschaft für Informations- und Datenqualität e.V. (DGIQ).DR. MARCUS GEBAUEr ist als Head of Department Information Technology bei der Hannover Rück AG tätig. Zudem war er Gründungsmitglied und Vorsitzender des Vorstands der Deutschen Gesellschaft für Informations- und Datenqualität e.V. (DGIQ).PROF. MICHAEL MIELKE ist Leiter Digitalisierung & Innovation DB AG, DB Training HD.l4, Leiter Campus 4.0 (www.campus40.de). Er lehrt Data Science an der FH Kiel, der HNU und der FOM und ist als Autor für die DIN ISO 8000 tätig, Zudem war er Gründungsmitglied und Präsident der Deutschen Gesellschaft für Informations- und Datenqualität e.V.Informationsqualität - Grundlagen - Methoden - Techniken - Management - Tools - Organisation - Data Governance - Praxisbeispiele
Getting Started with Containers in Google Cloud Platform
Deploy, manage, and secure containers and containerized applications on Google Cloud Platform (GCP). This book covers each container service in GCP from the ground up and teaches you how to deploy and manage your containers on each service.You will start by setting up and configuring GCP tools and the tenant environment. You then will store and manage Docker container images with GCP Container Registry (ACR). Next, you will deploy containerized applications with GCP Cloud Run and create an automated CI/CD deployment pipeline using Cloud Build. The book covers GCP’s flagship service, Google Kubernetes Service (GKE), and deployment of a Kubernetes cluster using clear steps and considering GCP best practices using the GCP management console and gcloud command-line tool. Also covered is monitoring containers and containerized applications on GCP with Cloud Monitoring, and backup and restore containers and containerized applications on GCP.By the end of the book, you will know how to get started with GCP container services and understand the fundamentals of each service and the supporting services needed to run containers in a production environment. This book also assists you in transferring your skills from AWS and Azure to GCP using the knowledge you have acquired on each platform and leveraging it to gain more skills.WHAT YOU WILL LEARN* Get started with Google Cloud Platform (GCP)* Store Docker images on GCP Container Registry * Deploy Google Kubernetes Engine (GKE) cluster* Secure containerized applications on GCP* Use Cloud Build to deploy containers * Use GCP Batch for batch job processing on KubernetesWHO THIS BOOK IS FORGoogle Cloud administrators, developers, and architects who want to get started and learn more about containers and containerized applications on Google Cloud Platform (GPC)SHIMON IFRAH is an IT professional with 15+ years of experience in the design, management, and deployment of information technology systems and networks. In recent years, he has been specializing in cloud computing and containerized applications on Microsoft Azure, Amazon AWS, and Google Cloud Platform (GCP). He holds more than 20 vendor certificates from Microsoft, AWS, VMware, and Cisco. During his career in the IT industry, he has worked for some of the largest managed services and technology companies in the world, helping them administer systems for the largest enterprises. He is based out of Melbourne, Australia. Chapter 1: Get Started with Google Cloud Platform (GCP)Chapter Goal: Setup and configure GCP tools and tenant environmentNo of pages: 40Sub -Topics1. Set up your Google Cloud Platform (GCP) tenant2. Understanding GCP projects3. Understanding cloud shell4. Secure and manage your GCP account (projects and more)5. GCP Services overviewChapter 2: Store and Manage Docker Container Images with GCP Container Registry (ACR)Chapter Goal: Here we learn how to Store Docker Container images on GCP Container registryNo of pages: 40Sub - Topics1. Setup GCP Container Registry2. Push Docker images to Container Registry3. Pull images from GCP Container Registry4. Manage and secure GCP Container RegistryChapter 3: Deploy Containerized Applications with GCP Cloud RunChapter Goal: This chapter explains how to deploy containers and containerized applications on GCP cloud runNo of pages: 40Sub - Topics:1. Set up GCP cloud run 2. Deploy containers with cloud run3. Use cloud build and git to deploy containers4. Scale containerized applications on cloud run5. Monitor and manage containerized applications on cloud runChapter 4: Deploy Containerized Applications with Google Kubernetes Engine (GKE)Chapter Goal: This chapters explains how to deploy containers and containerized applications with GKENo of pages:Sub - Topics:1. Getting started with GKE2. Setup and configure GKE networking and storage3. Deploy Kubernetes dashboard (Web UI) on GKE4. Manage and secure GKE5. Run Batch jobs on Kubernetes with batch (beta)Chapter 5: Deploy Docker Containers on GCP Compute EngineChapter Goal: This chapter explains how to deploy containers and containerized applications on GCP compute engineNo of pages: 40Sub - Topics:1. Install Docker container host on Ubuntu Linux VM2. Install Docker container host on Windows server 2019 VM3. Deploy containers on GCP compute engine using GCP container-optimized OSChapter 6: Secure your GCP Environment and ContainersChapter Goal: This chanpters explains how to secure and protect containers and containerized applications on GCPNo of pages: 40Sub - Topics:1. Introduction to GCP identify infrastructure2. Setup organization policies3. Roles, service accounts and auditing capabilities4. GCP networking and firewalls configurationChapter 7: Scale Containers and Containerized Applications on GCPChapter Goal: This chapter explains how to scale containers and containerized applications on GCPNo of pages: 40Sub - Topics:1. Scale Google Kubernetes Service (GKE)2. Scale cloud run and cloud build containers3. Scale GCP Container Registry4. Scale compute engine hosts and containersChapter 8: Monitor Containers and Containerized Applications on GCP with Stackdriver MonitoringChapter Goal: Learn how to Monitor Containers and Containerized Applications on GCPNo of pages: 40Sub - Topics:1. Monitor Google Kubernetes Service (GKE)2. Monitor cloud run containers3. Monitor compute engine resources4. GCP cost management and toolsChapter 9: Backup and Restore Containers and Containerized Applications on GCPChapter Goal: This chapter explains how to backup and restore containers and containerized applications on GCPNo of pages: 40Sub - Topics:1. Backup persistent storage disks2. Backup compute engine resources3. Manage cloud storage and file storeChapter 10: Troubleshooting Containers and Containerized Applications on GCPChapter Goal: This chapters explains how to troubleshoot containers and containerized applications issues on GCPNo of pages: 40Sub - Topics:1. Troubleshoot Google Kubernetes Service (GKE)2. Troubleshoot cloud run and cloud build deployments3. Troubleshoot GCP Container Registry5. Troubleshoot compute engine resource
Datengetriebenes Qualitätsmanagement
Die Gesellschaft für Qualitätswissenschaft e.V. GQW hat sich seit ihrer Gründung im Dezember 1994 dem Ziel verschrieben, die Qualitätswissenschaft in Lehre und Forschung zu fördern und den Wissenstransfer in die industrielle Anwendung zu unterstützen. Seit 1998 werden hierzu im Rahmen von Jahrestagungen Forschungs- und Entwicklungsergebnisse vorgestellt, die für die Qualitätswissenschaft aktuelle und relevante Themen aufgreifen. Die Jahrestagung 2019 der Gesellschaft für Qualitätswissenschaft e.V. (GQW) fand unter der Leitung von Prof. Dr.-Ing. Robert H. Schmitt am 30. Oktober in Aachen statt. Der Themenschwerpunkt adressierte die Potenziale der gesteigerten Datenverfügbarkeit und von Data Analytics für die Qualitätswissenschaft. Der Tagungsband beinhaltet die eingereichten und begutachteten Beiträge, die im Rahmen der Tagung präsentiert worden sind.
Asp.Net Core and Azure with Raspberry Pi 4
Take your Raspberry Pi further with Asp.net and Microsoft Azure. Run .Net Core applications on Raspberry Pi and turn your Pi into an IoT hub or use it for Edge and Central computing.The future leans towards IoT. We live in a world where everything is connected. Running the Raspberry PI with .Net core applications opens a world of possibilities. Asp.Net Core offers an amazing open-source web framework that enables you to build cloud-ready IoT apps. What if we add the power of Microsoft Azure to it? You’ll be able to use the power of Asp.Net Core and Microsoft Azure with your Pi!Once the initial setup is complete, you'll move on to a real-world scenario—running your applications inside a Raspberry Pi. Develop an application that sends automated data to the Microsoft Azure IoT hub then retrieve it using the Azure extensions we have. You will also set up the Azure IoT Edge and Azure IoT Central to make our application ready for production scenarios.You will:• Set up Raspbian OS on the Raspberry Pi• Develop a .Net core application and run it in the Pi• Create and use Azure resources such as Azure IoT Hub, Azure IoT Edge, and Azure IoT CentralSIBEESH VENU is a passionate learner and writer and advocates life-long learning. He has been awarded Most Valuable Professional from Microsoft 5 times for Azure and Developer Technologies. He’s the author of more than 400 articles in his blog sibeeshpassion.com.Chapter 1: Getting to Know Your Raspberry PI : In this chapter we will learn about the Raspberry PI and its features.· About the design· Capacity· Ports· Cables· AdditionalChapter 2: Introduction to Windows 10 IoT Core : In this chapter we will discover features of Windows 10 IoT Core· History· Revisions· Features· Other possible optionsChapter 3: Setting Up Windows 10 IoT Core on Raspberry PI 4· Initial downloads and prerequisites· Set up· Image files· IoT Core dashboard tools and featuresChapter 4: Developing a Background Application for Windows 10 IoT Core: In this chapter we will develop an application in Visual Studio· Tools· CodesChapter 5: Install A Custom Background Application on Raspberry PI· Ways to install applicationso Using dashboard applicationo Using FFUo What is FFUChapter 6: Setting Up Azure Resources: In this chapter we will set up our Azure resources· What are Azure resource groupso Best practice for naming conventionso Cost analysis· Azure IoT Hubo What is IoT Hub?o Adding deviceso Set up· Azure Signal R· Azure Functionso Develop appo Deploy appo What is Azure Func· Configure Signal Ro Develop appo Deployo BroadcastChapter 7: Configure Everything and Demo
Beginning Java MVC 1.0
Get started with using the new Java MVC 1.0 framework for model, view, and controller development for building modern Java-based web, native, and microservices applications.Beginning Java MVC teaches you the basics, then dives in to models, views, controllers. Next, you learn data binding, events, application types, view engines, and more. You will be given practical examples along the way to reinforce what you have learned. Furthermore, you'll work with annotations, internationalization, security, and deployment.After reading this book, you'll have the know how to build your first full Java-based MVC application.WHAT YOU WILL LEARN* Discover the Java MVC 1.0 APIs and how to use themMaster the Model, View and Controller design pattern * Carry out data binding * Write events* Work with view enginesWHO THIS BOOK IS FORThose new to Java MVC 1.0. Some prior experience with Java programming recommended, especially with JSF or Struts. Peter Späth graduated in 2002 as a physicist and soon afterwards became an IT consultant, mainly for Java-related projects. In 2016 he decided to concentrate on writing books, with his main focus set on software development. With two books about graphics and sound processing and two books for Android and Kotlin programming, his new book addresses beginning Jakarta EE developers willing to develop enterprise-level Java applications with Java EE 8.1. About MVC - Model, View, Controller* History of MVC* MVC in Web Applications* MVC for Java* Finally, Java MVC (JSR-371)* Why MVC* Where is Hello World?2. Prerequisite - Jakarta EE / Java EE* The Nature of Java for Enterprise Applications* Glassfish, a Free Java Server* Using a Preinstalled Java Server* Learning Java for Enterprise Applications* RESTful Services3. Development Workflow* Using Gradle as a Build Framework* Using Eclipse as an IDE* More About Gradle* Developing Using the Console* Installing MVC4. Hello World for Java MVC* Starting The Hello World Project* The Hello World Model* The Hello World View* The Hello World Controller* Using Gradle to Build Hello World* Starting a Jakarta EE Server* Deploying and Testing Hello World5. Start Working With Java MVC* Handling User Input From Forms* Exception Handling in Java MVC* Non-String Post Parameters6. In-Depth Java MVC* The Model* The View: JSPs* The View: Facelets* The Controller7. In-Depth Java MVC - Part II* Injectable Context* Persisating State* Dealing With Page Fragments* Observers* Configuration8. Internationalization* Language Resources* Adding Localized Messages to the Session* Formatting of Data in the View* Using JSF for Formatting* Localized Data Conversion9. Java MVC and EJBs* About Session EJBs* Defining EJBs* Accessing EJBs* EJB Projects* EJBs with Dependencies* Asynchronous EJB Invocation* Timer EJBs10. Connecting Java MVC to a Database* Abstracting Away Database Access With JPA* Setting up a SQL Database* Creating a DataSource* Preparing the Member Registration Application* Adding EclipseLink as ORM* Controllers* Adding Data Access Objects* Updating the View* Adding Entities* Adding Relations11. Logging Java MVC Applications* System Streams* JDK Logging in Glassfish* Using JDK Standard Logging For Other Servers* Adding Log4j Logging to Your Application12. A Java MVC Example Application* The BooKlubb Database* The BooKlubb Eclipse Project* The BooKlubb Infrastructure Classes* Configure BooKlubb Database Access* The BooKlub Internationalization* The BooKlubb Entity Classes* BooKlubb Database Access Via DAOs* The BooKlubb Model* The BooKlubb Controller* The BooKlubb View* Deploying and Testing BooKlubbAppendix* Solutions to The Exercises
Practical Machine Learning in JavaScript
Build machine learning web applications without having to learn a new language. This book will help you develop basic knowledge of machine learning concepts and applications.You’ll learn not only theory, but also dive into code samples and example projects with TensorFlow.js. Using these skills and your knowledge as a web developer, you’ll add a whole new field of development to your tool set. This will give you a more concrete understanding of the possibilities offered by machine learning. Discover how ML will impact the future of not just programming in general, but web development specifically.Machine learning is currently one of the most exciting technology fields with the potential to impact industries from health to home automation to retail, and even art. Google has now introduced TensorFlow.js—an iteration of TensorFlow aimed directly at web developers. Practical Machine Learning in JavaScript will help you stay relevant in the tech industry with new tools, trends, and best practices.WHAT YOU'LL LEARN* Use the JavaScript framework for ML* Build machine learning applications for the web* Develop dynamic and intelligent web contentWHO THIS BOOK IS FORWeb developers and who want a hands-on introduction to machine learning in JavaScript. A working knowledge of the JavaScript language is recommended.CHARLIE GERARD is a Senior front-end developer at Netlify, a Google Developer Expert in Web Technologies, and a Mozilla Tech Speaker. She is passionate about exploring the possibilities of the web and spends her personal time building interactive prototypes using hardware, creative coding, and machine learning. She has been diving into ML in JavaScript for over a year and built a variety of projects. She’s excited to share what she’s learned and help more developers get started.Chapter 1: Introduction to Machine Learning• Definition• Explanation of concepts• Algorithms• Examples of impactChapter 2: Basics of Tensorflow.js• What is Tensorflow.js?• FeaturesChapter 3: Building an Image Classifier• Using a pre-trained model• Creating a custom model• Saving and loading a modelChapter 4: Building a Sentiment Analysis System• Train a model with text data• Create text-based ML applicationsChapter 5: Experimenting with Inputs• Using ML with electronics data• Using audio dataChapter 6: Deploying ModelsChapter7: Ethics in AI
Building Native Web Components
Start developing single-page applications (SPAs) with modern architecture. This book shows you how to create, design, and publish native web components, ultimately allowing you to piece together those elements in a modern JavaScript framework.Building Native Web Components dives right in and gets you started building your first web component. You’ll be introduced to native web component design systems and frameworks and discuss component-driven development to understand its importance in large-scale companies. You’ll then move on to building web components using templates and APIs, and custom event lifecycles. Techniques and best practices for moving data, customizing, and distributing components are also covered. Throughout, you’ll develop a foundation to start using Polymer, Vue.js, and Firebase in your day-to-day work.Confidently apply modern patterns and develop workflows to build agnostic software pieces that can be reused in SPAs. Building Native Web Components is your guide to developing small and autonomous web components that are focused, independent, reusable, testable, and works with all JavaScript frameworks, modern browsers, and libraries.WHAT YOU WILL LEARN* Incorporate component-driven development (CDD) and design systems into your workflow* Build apps with reusable UI components that are agnostic to JavaScript frameworks* Utilize Polymer and Vue.js in your day-to-day work* Publish your UI components in npm (Node Package Manager)WHO THIS BOOK IS FORThe book is intended for Intermediate–Advanced level readers interested in single-page applications (SPAs), as well as Polymer, Vue.js, and Firebase.CARLOS ROJAS is an engineer with over 10 years of experience building digital products. He is focused on front-end technologies (HTML, CSS, JS, Angular, React, Polymer, and Vue.js) and edge web technologies such as web components, WebXR and Progressive Web Apps. He also has experience working with Fortune 500 companies and fast-changing business environments such as startups.He enjoys sharing knowledge with talks in meetups, videos on YouTube, other books published by Apress, and his personal blog https://medium.com/@carlosrojas_o, helping startups and companies to run workflows to make excellent digital products. As such, his books aim to convey the love he has for the construction of scalable, high-quality products.CHAPTER 1: WEB COMPONENTSChapter Goal: Understand the history of the web components as well as the concept and its core technologies.Sub-Topics* What is a web component?* History of the component* Browser support for web components* Core technologies* Custom elements* SummaryCHAPTER 2: MAKING YOUR FIRST WEB COMPONENTChapter Goal: We are going to build a simple component learning some critical concepts along the way.Sub-Topics* Getting started* CDD* Micro frameworks* Design systems* Development* SummaryCHAPTER 3: HTML TEMPLATEChapter Goal: We will Cover the template features provided by web component API and build a simple dropdown component using these APIs. The template API provides many low-level features needed to create UI componentsSub-Topics* Introducing HTML templates* Creating and using templates* Content slot API* Named slots* Creating a web component* SummaryCHAPTER 4: COMMUNICATIONChapter Goal: With web Components, we typically pass data into components by setting properties or attributes. Learn techniques and best practices when moving data to components.Sub-Topics:* Introducing communication between components * Component properties* Component events* Communicating a web component * Component custom attributes* SummaryCHAPTER 5: COMPONENT LIFECYCLEChapter Goal: We will cover the custom element lifecycleSub-Topics:* Introducing web components lifecycle* JavaScript class constructor and connect callback* Disconnected callback* Attribute changed callback* Adopted callback* SummaryCHAPTER 6: CUSTOMIZING COMPONENT WITH SHADOW DOMChapter Goal: In this chapter, we are going to cover how to style Web Components.Sub-Topics:* Introducing shadow DOM* Global styles* CSS encapsulation* CSS custom properties* Dynamic CSS custom properties* Theming Web Components* Summary CHAPTER 7: COMPONENT HIERARCHY AND ARCHITECTUREChapter Goal: We will learn how components can communicate with each other and where the web platform falls a bit short in aiding application architecture.Sub-Topics:* Component Data Flow* Note List* Note Detail* SummaryCHAPTER 8: DISTRIBUTING WEB COMPONENTChapter Goal: We are going to distribute web components with cross-browser support.Sub-Topics:* Publishing with npm* Polyfills* Browser Support* Installing Webpack and Babel* Webpack* SummaryCHAPTER 9: POLYMERChapter Goal: We are going to use this amazing library to introduce flexibility in our web componentsSub-Topics:* Getting started* Foundations* Building with Polymer* SummaryCHAPTER 10: BUILDING AN APP WITH WEB COMPONENTS AND VUE.JSChapter Goal: We will learn some concepts of Vue.js to use all our new skills to build from scratch a complete AppSub-Topics:* Vue.js concepts* Implementation* NoteBook data service* NoteBook routing* Notebook HTTP communication* SummaryChapter 11: PublishingChapter Goal: We are going to publish our App in the webSub-Topics:* Adding Firebase authentication * Preparing for production* Sending to Firebase hosting* Adding a domain name* Summary
Konfliktmanagement für Sicherheitsprofis
Ob Datenschützer oder IT-Sicherheitsbeauftragte – Sicherheitsprofis müssen häufig schlechte Nachrichten überbringen oder unpopuläre Maßnahmen durchsetzen. Um nicht in der „Buhmann-Falle“ zu landen, sind starke kommunikative Fähigkeiten gefragt. Der Autor stellt typische Kommunikationssituationen dar und zeigt auf, mit welchen Mitteln Entscheidungsträger und Mitarbeiter für Security-Themen gewonnen werden können. Ein eigener Abschnitt ist der Frage gewidmet, wie man bestehende Konflikte und Krisen übersteht und gestärkt aus ihnen hervorgeht. SEBASTIAN KLIPPER ist Geschäftsführer und Gründer des Security-Dienstleisters CycleSEC und ist seit 2002 auf Informations- und IT-Sicherheit spezialisiert. Neben seiner Tätigkeit als Managing Security Consultant ist er Fachbuchautor und Autor von Studienmaterialien für die Wilhelm Büchner Hochschule in Darmstadt. Seit 2015 ist er Mitglied im Normungsgremium für die ISO/IEC 27000 Normenreihe beim Deutschen Institut für Normung (DIN). Er hält mehrere Zertifizierungenim Bereich der Informations- und IT-Sicherheit, darunter T.I.S.P. Teletrust Information SecurityProfessional, PECB Certified ISO/IEC 27001 Master und Certified IT-Security Manager. Willkommen auf der Security-Bühne – Arten von Security-Konflikten – Konfliktprävention – Sicherheits-„Hebel“ – Konflikte in Projekten – Krisenbewältigung – Leitsätze zum Konfliktmanagement
Getting Structured Data from the Internet
Utilize web scraping at scale to quickly get unlimited amounts of free data available on the web into a structured format. This book teaches you to use Python scripts to crawl through websites at scale and scrape data from HTML and JavaScript-enabled pages and convert it into structured data formats such as CSV, Excel, JSON, or load it into a SQL database of your choice.This book goes beyond the basics of web scraping and covers advanced topics such as natural language processing (NLP) and text analytics to extract names of people, places, email addresses, contact details, etc., from a page at production scale using distributed big data techniques on an Amazon Web Services (AWS)-based cloud infrastructure. It book covers developing a robust data processing and ingestion pipeline on the Common Crawl corpus, containing petabytes of data publicly available and a web crawl data set available on AWS's registry of open data.GETTING STRUCTURED DATA FROM THE INTERNET also includes a step-by-step tutorial on deploying your own crawlers using a production web scraping framework (such as Scrapy) and dealing with real-world issues (such as breaking Captcha, proxy IP rotation, and more). Code used in the book is provided to help you understand the concepts in practice and write your own web crawler to power your business ideas.WHAT YOU WILL LEARN* Understand web scraping, its applications/uses, and how to avoid web scraping by hitting publicly available rest API endpoints to directly get data* Develop a web scraper and crawler from scratch using lxml and BeautifulSoup library, and learn about scraping from JavaScript-enabled pages using Selenium* Use AWS-based cloud computing with EC2, S3, Athena, SQS, and SNS to analyze, extract, and store useful insights from crawled pages* Use SQL language on PostgreSQL running on Amazon Relational Database Service (RDS) and SQLite using SQLalchemy* Review sci-kit learn, Gensim, and spaCy to perform NLP tasks on scraped web pages such as name entity recognition, topic clustering (Kmeans, Agglomerative Clustering), topic modeling (LDA, NMF, LSI), topic classification (naive Bayes, Gradient Boosting Classifier) and text similarity (cosine distance-based nearest neighbors)* Handle web archival file formats and explore Common Crawl open data on AWS* Illustrate practical applications for web crawl data by building a similar website tool and a technology profiler similar to builtwith.com* Write scripts to create a backlinks database on a web scale similar to Ahrefs.com, Moz.com, Majestic.com, etc., for search engine optimization (SEO), competitor research, and determining website domain authority and ranking* Use web crawl data to build a news sentiment analysis system or alternative financial analysis covering stock market trading signals* Write a production-ready crawler in Python using Scrapy framework and deal with practical workarounds for Captchas, IP rotation, and moreWHO THIS BOOK IS FORPrimary audience: data analysts and scientists with little to no exposure to real-world data processing challenges, secondary: experienced software developers doing web-heavy data processing who need a primer, tertiary: business owners and startup founders who need to know more about implementation to better direct their technical teamJAY M. PATEL is a software developer with over 10 years of experience in data mining, web crawling/scraping, machine learning, and natural language processing (NLP) projects. He is a co-founder and principal data scientist of Specrom Analytics, providing content, email, social marketing, and social listening products and services using web crawling/scraping and advanced text mining.Jay worked at the US Environmental Protection Agency (EPA) for five years where he designed workflows to crawl and extract useful insights from hundreds of thousands of documents that were parts of regulatory filings from companies. He also led one of the first research teams within the agency to use Apache Spark-based workflows for chem and bioinformatics applications such as chemical similarities and quantitative structure activity relationships. He developed recurrent neural networks and more advanced LSTM models in Tensorflow for chemical SMILES generation.Jay graduated with a bachelor's degree in engineering from the Institute of Chemical Technology, University of Mumbai, India and a master of science degree from the University of Georgia, USA. Jay serves as an editor of a publication titled Web Data Extraction and also blogs about personal projects, open source packages, and experiences as a startup founder on his personal site, jaympatel.com.
Practical Git
Practice your Git skills using exercises in your own environment. This book introduces concepts in an abstract visual way, and then enforces this learning through exercises - the Git katas.You will start with basic interactions such as commits and branches, and move on to both internals and collaborative workflows. Best practices are introduced and rehearsed throughout with hands-on exercises. Each topic is supplemented with interactive Git exercises that can be solved using any Git client – either the ubiquituous CLI or one of the many graphical clients so you'll learn in the environment you work in.The importance of Git is hard to overstate – it is used by 90% of software engineers worldwide and is the de facto standard for version control. Honing your Git skills is guaranteed to make you a better and more efficient developer. Building software can be stressful, but it doesn’t need to be. Practical Git will give you the Git skills you need, and help keep your Git skills sharp. Add it to your library today.WHAT YOU'LL LEARN* Use Git through scripted exercises and the Git katas * Understand Git’s graph model* Troubleshoot common and rare scenarios you may face* Select and apply the right Git tool for the task* Maintain and collaborate on Git repositories* Tweak Git to gain the most from this powerful toolWHO THIS BOOK IS FORAnyone who is currently using Git in a copy-paste fashion. It will take you from using Git to knowing Git.JOHAN ABILDSKOV works as a DevOps Transformation Lead at Eficode in Denmark. He spends his time consulting on DevOps tooling and culture. Git has a special place in his heart. He teaches Git, talks about Git, and maintains the Git katas (https://github.com/eficode-academy/git-katas). He is a huge geek and a teacher at heart. He has spoken at multiple DevOpsDays, and at Git Merge several times. He was on the All Things Git podcast with Ed Thomson, talking about teaching Git. He is active in meetup groups and in the DevOpsDays community, as well as speaking at both external and internal events at companies. You can find him on Twitter @RandomSort.1. Git intuition2. Building Commits3. Linear History4. Complex Branching5. Collaboration6. Manipulating History7. Customizing Git8. Additional Git Features9. Git Internals
SQL Server 2019 AlwaysOn
Get a fast start to using AlwaysOn, the SQL Server solution to high-availability and disaster recovery. This third edition is newly-updated to cover the 2019 editions of both SQL Server and Windows Server and includes strong coverage of implementing AlwaysOn Availability Groups on both Windows and Linux operating systems. The book provides a solid and accurate understanding of how to implement systems requiring consistent and continuous uptime, as well as how to troubleshoot those systems in order to keep them running and reliable. This edition is updated to account for all new major functionality and also includes coverage of implementing atypical configurations, such as clusterless and domain-independent Availability Groups, distributed Availability Groups, and implementing Availability Groups on Azure.The book begins with an introduction to high-availability and disaster recovery concepts such as Recovery Point Objectives (RPOs), Recovery Time Objectives (RTOs), availability levels, and the cost of downtime. You’ll then move into detailed coverage of implementing and configuring the AlwaysOn feature set in order to meet the business objectives set by your organization. Content includes coverage on implementing clusters, building AlwaysOn failover clustered instances, and configuring AlwaysOn Availability Groups.SQL SERVER 2019 ALWAYSONis chock full of real-world advice on how to build and configure the most appropriate topology to meet the high-availability and disaster recovery requirements you are faced with, as well as how to use AlwaysOn Availability Groups to scale-out read-only workloads. This is a practical and hands-on book to get you started quickly in using one of the most talked-about SQL Server feature sets.WHAT YOU WILL LEARN* Understand high availability and disaster recovery in SQL Server 2019* Build and configure a Windows Cluster in Windows Server 2019* Create and configure an AlwaysOn failover clustered instance* Implement AlwaysOn Availability Groups and appropriately configure them* Implement AlwaysOn Availability Groups on Linux servers* Configure Availability Groups on Azure IaaS* Administer AlwaysOn technologies post implementation* Understand typical configurations, such as clusterless and distributed Availability GroupsWHO THIS BOOK IS FORFor Microsoft SQL Server database administrators who interested in growing their knowledge and skills in SQL Server’s high-availability and disaster recovery feature set.PETER A. CARTER is a SQL Server expert with over a decade of experience in developing, administering, and architecting SQL Server platforms and data-tier applications. Peter was awarded an MCC by Microsoft in 2011, and it sits alongside his array of MCTS, MCITP, MCSA and MCSE certifications in SQL Server from version 2005 onward. His passion for SQL Server shows through in everything he does, and his goal is that his passion for the technology will inspire others.1. High Availability and Disaster Recovery Concepts2. Understanding High Availability and Disaster Recovery Technologies3. Implementing A Cluster4. Implementing an AlwaysOn Failover Clustered Instance5. Implementing AlwaysOn Availability Groups on Windows6. Implementing AlwaysOn Availability Groups on Linux7. Atypical Availability Group Implementations8. Administering AlwaysOn9. Monitoring AlwaysOn Availability Groups10. Troubleshooting AlwaysOn
70 Tips and Tricks for Mastering the CISSP Exam
Learn how to think and apply knowledge in a practical way. Tackling the CISSP exam is vastly different from simply understanding the subject matter. Even the most experienced security professionals can fail because the questions are tricky and ask the test taker to pick the best of the options given.The CISSP exam conducted by ISC2 is the hardest and most rewarded cybersecurity examination. The test has several domains and sub-domains and covers a wide range of topics on security, including cyber and physical building security fields. It also covers breaches, discovery of breaches, and how to report data breaches.Because the subject area is vast and the questions are almost never repeated, it is hard for the exam taker to memorize or quickly discover the correct solution. The four options given as answers typically have two very close matches to the question. With quick analysis, it is possible to discover from the verbiage of a question what is truly being asked and learn how to find the closest possible solution without spending too much time on each question.WHAT YOU WILL LEARN* Think outside the box (the CISSP exam demands this of candidates)* Quickly discern the gist of a question, eliminate the distractors, and select the correct answer* Understand the use of words such as MOST, BEST, FIRST, LAST in the questions* Select the correct answer when multiple options look like possible solutionsWHO THIS BOOK IS FORExperienced security practitioners, managers, and executives interested in proving their knowledge across a wide array of security practices and principles, including chief information security officers, chief information officers, directors of security, IT directors and managers, security systems engineers, security analysts, security managers, security auditors, security architects, security consultants, private contractors, and network architectsR. SARMA DANTURTHI, PHD, PMP, CISSP has a doctoral degree in engineering from the University of Memphis, Memphis, TN, USA and has taught graduate-level courses in engineering, microprocessors, and computer science. He has been in the IT field for several years and his earlier experience included designing processor-level boards with interfaces and programming with various languages such as C and C++. His current experience includes design, coding, cyber security, leading project teams, and project management. He has published several papers in peer-reviewed journals, and has written book chapters on software interfaces, modeling, IT security, and simulation. His interests include evolving cyber security, cloud computing, intelligent interfaces, and mobile application development. Besides being proficient in various programming languages, he has certifications in Java, Project Management Institute's PMP, CompTIA Sec+, and ISC2 CISSP.
MonoGame Mastery
Master the art of game creation with MonoGame—the cross-platform framework of choice for independent developers. Learn the various aspects needed to create your next game by covering MonoGame framework specifics, engine creation, graphics, patterns, and more.The MonoGame framework provides an incredible canvas for the programmer to create their next 2D game, and this book teaches you to make the most of it. You will start from the ground up, beginning with the basics of what MonoGame is, the pipeline, and then how to build a reusable game engine on top of the framework. You will deep dive into various components of each aspect of a game, including graphics, input, audio, and artificial intelligence. The importance of game tooling is also covered. By the end, you will have a mastery level of understanding of how to create a 2D game using MonoGame.With a fully functional 2D game, aspiring developers will have the ideal blueprint to tackle their next fully featured game. The material covered is applicable for almost any 2D game project ranging from side scrolling adventures to fighting games.WHAT YOU WILL LEARN* Learn to build a game with the MonoGame framework.* Understand game engine architecture and how to build an engine onto the MonoGame framework.* Grasp common design patterns used in game development and in fully featured engines, such as Unity.WHO THIS BOOK IS FORBeginner to advanced MonoGame programmer would find this book helpful. The audience is expected to have a working knowledge of C#.JARRED CAPELLMAN has been professionally developing software for over 13 years and is a Director of Engineering at SparkCognition in Austin, Texas. He started making QBasic text-based games when he was nine years old. He learned C++ a few years later before studying OpenGL with the eventual goal of entering the gaming industry. Though his goal of professionally developing games didn’t come to fruition, he continued deep diving into frameworks such as MonoGame, Vulkan, and DirectX as an important part of his free time. When not programming, he enjoys writing music and is working on his DSc in Cybersecurity, focusing on applying Machine Learning to security threats.LOUIS SALIN has been a developer for more than 15 years in a wide variety of fields, developing on Windows in the early days in C, C++, and eventually C# before working as a developer on Linux-based web applications using different scripting languages, such as Ruby or Python. His early love for coding comes from all the time he spent as a kid copying video games written in Basic from books borrowed from the library. He wrote his first game in high school and took many classes in computer graphics.
Pro Microsoft Teams Development
Leverage the Microsoft Teams developer platform to integrate and build your apps in Teams.Busy developers will want to integrate it with other applications, both existing and new ones. Use this practical, hands-on guide to get you started building amazing custom solutions on and for Microsoft Teams, the new collaboration workspace in Office 365 and the fastest growing app in Microsoft history.Get ready to learn how to interact with data inside of Teams and how to surface your data on top of Teams, so that it is easily searchable and better supports people in their day-to-day jobs. Teams development expert Rick Van Rousselt starts at the beginning, helping you set up your environment, and takes you step by step through the process. You will begin with low code, simple integrations, and progress in your learning to increasingly more complex, multi-faceted applications that use every aspect of the extension capabilities of Teams.And a bonus for developers is that integrating your own apps into the Teams developer platform is an excellent opportunity for those apps to get more visibility and usage.WHAT YOU WILL LEARN* Understand the different development extension points and frameworks that are available in the Teams developer platform* Create custom tabs, bots, connectors, messaging extensions, and webhooks* Set up your development environment and speed up the development process* Enlist best practices and easy wins that will make an application stand out inside the Teams ecosystem* Explore advanced scenarios where the integrations of Office 365 meet inside of Microsoft TeamsWHO THIS BOOK IS FORDevelopers (front end, back end, C#, or Node.js) and architects. Readers should be familiar with C# or Node.js and tools such as Visual Studio or Visual Studio Code and have some experience with Microsoft Teams. Beyond that, no further knowledge is required because the book starts at the beginning, setting up a development environment.RICK VAN ROUSSELT is a managing partner at Advantive, a Microsoft Gold Partner. He is an Office Apps and Services Microsoft MVP who has been working with SharePoint since 2007, eventually transitioning to Office 365. With a strong focus on development, his current position has given him a diverse skill set and expertise in Office 365, Azure, and all related technologies. His inquisitive disposition motivates him to continuously gain knowledge and share what he learns with those interested in learning the same technologies. He is often pounding pavement in the global tech community, speaking at events such as Microsoft Ignite, ESPC, Collaboration, SharePoint Saturdays, and more, most recently on the topic of Teams development.PART I: BEFORE YOU CAN START BUILDINGChapter 1: What’s requiredChapter 2: Additional toolsChapter 3: Make it easy on yourselfPart II: TabsChapter 4: Teams Client JavaScript SDKChapter 5: Static and configurable tabsChapter 6: Authentication inside tabsChapter 7: Integrating Teams and SharePointPART III: BOTSChapter 8: Introducing BotsChapter 9: Natural Language Processing BotsChapter 10: Activity Feed BotsChapter 11: Teams specific bot integrationsChapter 12: Calling and media botsPART IV: WEBHOOKSChapter 13: Incoming webhooksChapter 14: Outgoing webhooksPART V: MESSAGING EXTENSIONSChapter 15: Search Based ExtensionsChapter 16: Action-based extensionsPART VI: DEVELOPING AGAINST MICROSOFT TEAMSChapter 17: Microsoft Graph for TeamsChapter 18: PowerShell for TeamsPART VII: APPENDICESChapter 19: Appendix A: Advanced Teams developmentChapter 20: Appendix B: Add your solution to the Microsoft Teams app store