Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -If yoüre already a comfortable programmer, familiar with your single board computer and microcontroller, and are ready to refine your projects, then let¿s get started! This book covers advanced methods and techniques for creating, implementing, monitoring and controlling your experiments and projects with your Raspberry Pi and Arduino. Projects will use Python and the Tkinter GUI and will also cover software development for adding real time data display to the Raspberry Pi.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 316 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 248 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Discover the methodologies and best practices for getting started with HashiCorp tools, including Terraform, Vault, and Packer. The book begins with an introduction to the infrastructure-as-code concept while establishing the need for automation and management technologies. Yoüll go over hands-on deployment, configuration, and best practices for Terraform, Packer, Vault, Nomad, and Consul. Yoüll then delve deeper into developing automation code using Terraform for automating AWS/Azure/GCP public cloud tasks; advanced topics include leveraging Vault for secrets management and Packer for image management.Along the way you will also look at Nomad and Consul for managing application orchestration along with network interconnectivity. In each chapter you will cover automated infrastructure and application deployment on the VM/container base ecosystem. The book provides sample code and best-practice guidance for developers and architects to look at infrastructure-as-code adoptionfrom a holistic viewpoint.All the code presented in the book is available in the form of scripts, which allow you to try out the examples and extend them in interesting ways.What You Will LearnGet an overview of the architecture of Terraform, Vault, Packer, Nomad, and ConsulFollow hands-on steps for enabling Terraform, Vault, Packer, Nomad, and ConsulAutomate various services on the public cloud, including AWS, Azure, and GCPWho This Book Is ForDevelopers, architects, and administrators who want to learn about infrastructure-as-code automation.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 260 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Learn to quickly set up Protractor and dive into the amazing possibilities that this tool offers for automating browser interactions for a user for any Angular web application. Software testing is here to stay, and an integral part of this is test automation. Protractor is one of the most evolved test automation frameworks that every software testing professional working with an Angular application should know.You will to automate a vast range of actions that a user takes to interact with the browser. From a simple ¿click¿ to more complex user actions such as frame switches, selecting from drop-downs, and file downloads using Protractor APIs for Angular-based websites. You will also learn about assertions, timeouts, waits, parallel testing frameworks that are available, and the general pros and cons you should be aware of.With over 150 working code samples demonstrating various test scenarios that you require in your day-to-day automation testing, and examples that may be given in interviews, this book will be your practical handbook to all the key Protractor API implementations.What You'll LearnSet up and install Protractor efficientlyImplement Angular-specific locator strategiesAutomate Angular web pagesRun parallel execution using ProtractorExplore all the pros, cons and challenges you may face while using ProtractorUse specific notes around each API to ensure optimum usage and avoid common mistakesWho This Book Is ForIdeal for test engineers who have a basic understanding of test automation with Selenium, developers who want to implement this testing tool for internal testing, Test Managers/IT Project Managers who want to get some general understanding of this tool and its advantages, and students who want to pursue career in test automation.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 224 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Understand the process of setting up a successful cyber threat intelligence (CTI) practice within an established security team. This book shows you how threat information that has been collected, evaluated, and analyzed is a critical component in protecting your organization¿s resources. Adopting an intelligence-led approach enables your organization to nimbly react to situations as they develop. Security controls and responses can then be applied as soon as they become available, enabling prevention rather than response.There are a lot of competing approaches and ways of working, but this book cuts through the confusion. Author Aaron Roberts introduces the best practices and methods for using CTI successfully. This book will help not only senior security professionals, but also those looking to break into the industry. You will learn the theories and mindset needed to be successful in CTI.This book covers the cybersecurity wild west, the merits and limitations ofstructured intelligence data, and how using structured intelligence data can, and should, be the standard practice for any intelligence team. You will understand your organizations¿ risks, based on the industry and the adversaries you are most likely to face, the importance of open-source intelligence (OSINT) to any CTI practice, and discover the gaps that exist with your existing commercial solutions and where to plug those gaps, and much more.What You Will LearnKnow the wide range of cybersecurity products and the risks and pitfalls aligned with blindly working with a vendorUnderstand critical intelligence concepts such as the intelligence cycle, setting intelligence requirements, the diamond model, and how to apply intelligence to existing security informationUnderstand structured intelligence (STIX) and why it¿s important, and aligning STIX to ATT&CK and how structured intelligence helps improve final intelligence reportingKnow how to approach CTI, depending on your budgetPrioritize areas when it comes to funding and the best approaches to incident response, requests for information, or ad hoc reportingCritically evaluate services received from your existing vendors, including what they do well, what they don¿t do well (or at all), how you can improve on this, the things you should consider moving in-house rather than outsourcing, and the benefits of finding and maintaining relationships with excellent vendorsWho This Book Is ForSenior security leaders in charge of cybersecurity teams who are considering starting a threat intelligence team, those considering a career change into cyber threat intelligence (CTI) who want a better understanding of the main philosophies and ways of working in the industry, and security professionals with no prior intelligence experience but have technical proficiency in other areas (e.g., programming, security architecture, or engineering)APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 232 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Implement web applications in Java using the open-source Vaadin framework version 20 and later. This easy-to-follow book covers all the key concepts and steps to become competent with modern versions of Vaadin. The book covers everything from setting up the development environment to implementing advanced features such as Server Push and database connectivity. The book helps you become proficient in the Vaadin framework, prepare for Vaadin certifications, and shows you how to apply the power of the Java programming language in developing applications for the web.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 348 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam¿a qualification that tests the cybersecurity professional¿s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs.You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation.This book uses a unique ¿lesson¿ format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more.What You Will learnUnderstand the concepts associated with FootprintingPerform active and passive reconnaissanceIdentify enumeration countermeasuresBe familiar with virus types, virus detection methods, and virus countermeasuresKnow the proper order of steps used to conduct a session hijacking attackIdentify defensive strategies against SQL injection attacksAnalyze internal and external network traffic using an intrusion detection systemWho This Book Is ForSecurity professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants,security engineers, and moreAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 228 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Customer experience engineering applied to the engineering department is rare, but needed. Most companies keep support, UX, engineering, product, and CX separate. To address this gap, this book highlights roles and techniques that are proven to accelerate issue detection and prevention by 30% or more.With the author's vast experience in tech support, he has developed techniques and skills that allow engineers to gain customer insights faster and through new and insightful sources that are within their reach. You will develop a deep understanding of the impact of issues; understand and optimize the speed of the engineering feedback loop (issue resolution time); and develop the ability to calculate the cost of the issues or customer friction to the business (in aggregate and on a case-by-case basis).Organizations can save significant money and add additional revenue by addressing customer friction proactively in collaboration with product, engineering, and site reliability engineering (SRE) functions and reduce the average time of an issue resolution by 80%.The cross-functional leadership, mentoring, and engineering techniques yoüll learn from this proactive stance are very valuable and teachable, and this book will show you the path forward.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 152 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization¿s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization.This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigueand confusion. Throughout the book you will learn how to secure your applications using Azure¿s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 172 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Focus on implementing end-to-end projects using Python and leverage state-of-the-art algorithms. This book teaches you to efficiently use a wide range of natural language processing (NLP) packages to: implement text classification, identify parts of speech, utilize topic modeling, text summarization, sentiment analysis, information retrieval, and many more applications of NLP.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 312 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Address the most common integration challenges, by understanding the ins and outs of the choices and exemplifying the solutions with practical examples on how to create cloud native applications using Apache Camel. Camel will be our main tool, but we will also see some complementary tools and plugins that can make our development and testing easier, such as Quarkus, and tools for more specific use cases, such as Apache Kafka and Keycloak.You will learn to connect with databases, create REST APIs, transform data, connect with message oriented software (MOMs), secure your services, and test using Camel. You will also learn software architecture patterns for integration and how to leverage container platforms, such as Kubernetes. This book is suitable for those who are eager to learn an integration tool that fits the Kubernetes world, and who want to explore the integration challenges that can be solved using containers.What You Will LearnFocus on how to solve integration challengesUnderstand the basics of the Quarkus as it¿s the foundation for the applicationAcquire a comprehensive view on Apache CamelDeploy an application in KubernetesFollow good practicesWho This Book Is ForJava developers looking to learn Apache Camel; Apache Camel developers looking to learn more about Kubernetes deployments; software architects looking to study integration patterns for Kubernetes based systems; system administrators (operations teams) looking to get a better understand of how technologies are integrated.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 292 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Gain practical guidance for implementing data models on the SAP BW/4HANA platform using modern modeling concepts. You will walk through the various modeling scenarios such as exposing HANA tables and views through BW/4HANA, creating virtual and hybrid data models, and integrating SAP and non-SAP data into a single data model.Data Modeling with SAP BW/4HANA 2.0 gives you the skills you need to use the new SAP BW/HANA features and objects, covers modern modelling concepts, and equips you with the practical knowledge of how to use the best of the HANA and BW/4HANA worlds.What You Will LearnDiscover the new modeling features in SAP BW/4HANACombine SAP HANA and SAP BW/4HANA artifactsLeverage virtualization when designing and building data modelsBuild hybrid data models combining InfoObject, OpenODS, and a field-based approachIntegrate SAP and non-SAP data into single modelWho This Book Is ForBI consultants, architects, developers, and analysts working in the SAP BW/4HANA environment.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 288 pp. Englisch.
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -Learn best practices and the proper use of Azure management tools, such as Azure Portal, Azure PowerShell, Azure CLI, and ARM templates, which are time-saving tools that support daily administration tasks such as monitoring, alerting, backups, security, and more. This book explores common Azure services, including Azure networking, virtual machines, app services, backup, monitoring, and other tools of the trade that IT professionals use on a regular basis. And you will come away with a strong understanding of these services and how to use them.While Microsoft Azure is no longer ¿the new cloud on the block,¿ it continues to be one of the fastest-growing platforms with regard to features, integrations, and capabilities. Over the last decade, it has undergone significant changes and amassed a large following, but many of its users, especially those who transitioned from traditional admin tasks to modern cloud computing, are not reaping its full benefits.Management inthe cloud, while seemingly simpler in some ways, is not without its own set of complexities and headaches. Admins want to streamline it where it makes sense and allocate the right resources to the right job in order to keeps cost in check, but where does one begin Pro Azure Administration and Automation is a comprehensive guide that is chock full of time-saving recipes and scripts you can rely on to learn about day-to-day Azure administration and automation.What You Will LearnAttain theoretical and practical knowledge on deploying and managing AzureGain an understanding of services, their relationship with other services, and their configuration parametersAdopt a modern mindset, transitioning from a traditional IT admin mindset to a cloud admin proUnderstand how everything in the cloud is billable and learn how to factor it into choicesApply in-chapter PowerShell scripts andARM templates which can be re-purposedKnow when it makes sense to be more involved in tasks (for example, automation and scripting)Who This Book Is ForIT professionals who are responsible for the day-to-day tasks in Azure as well as cloud management and planningAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 288 pp. Englisch.
Taschenbuch. Zustand: Neu. Neuware -Work with Db2 to write SQL and access databases using optimized code for the fastest response. This book will give you complete documentation on DB2 via Python for the IBM_db module and provide a number of examples for the usage of each module API.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 232 pp. Englisch.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This Open Access book is a must-have for anyone interested in real-time rendering. Ray tracing is the holy grail of gaming graphics, simulating the physical behavior of light to bring real-time, cinematic-quality rendering to even the most visually intense games. Ray tracing is also a fundamental algorithm used for architecture applications, visualization, sound simulation, deep learning, and more.Ray Tracing Gems II is written by industry experts with a particular focus on ray tracing, and it offers a practical means to master the new capabilities of current and future GPUs with the latest graphics APIs.What You'll Learn:The latest ray tracing techniques for developing real-time applications in multiple domainsCase studies from developers and studios who have shipped products that use real-time ray tracing.Guidance, advice and best practices for rendering applications with various GPU-based ray tracing APIs (DirectX Raytracing, Vulkan Ray Tracing)High performance graphics for 3D graphics, virtual reality, animation, and moreWho This Book Is For:Game and graphics developers who are looking to leverage the latest hardware and software tools for real-time rendering and ray tracing to enhance their applications across a variety of disciplines.
Taschenbuch. Zustand: Neu. Neuware -Get started with Azure Cognitive Services and its APIs that expose machine learning as a service. This book introduces the suite of Azure Cognitive Services and helps you take advantage of the proven machine learning algorithms that have been developed by experts and made available through Cognitive Services, easily integrating those algorithms into your own applications without having to develop the algorithms from scratch. The book also shows you how to use the algorithms provided by Cognitive Services to accelerate data analysis and development within your organization.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 328 pp. Englisch.