Norges billigste bøker

Bøker utgitt av APress

Filter
Filter
Sorter etterSorter Populære
  • - Infrastructure as Python
    av Moshe Zadka
    725

  • av Maris Sekar
    670,-

    Use artificial intelligence (AI) techniques to build tools for auditing your organization. This is a practical book with implementation recipes that demystify AI, ML, and data science and their roles as applied to auditing. You will learn about data analysis techniques that will help you gain insights into your data and become a better data storyteller. The guidance in this book around applying artificial intelligence in support of audit investigations helps you gain credibility and trust with your internal and external clients. A systematic process to verify your findings is also discussed to ensure the accuracy of your findings.Machine Learning for Auditors provides an emphasis on domain knowledge over complex data science know how that enables you to think like a data scientist. The book helps you achieve the objectives of safeguarding the confidentiality, integrity, and availability of your organizational assets. Data science does not need to be an intimidating concept for audit managers and directors. With the knowledge in this book, you can leverage simple concepts that are beyond mere buzz words to practice innovation in your team. You can build your credibility and trust with your internal and external clients by understanding the data that drives your organization.What You Will LearnUnderstand the role of auditors as trusted advisorsPerform exploratory data analysis to gain a deeper understanding of your organizationBuild machine learning predictive models that detect fraudulent vendor payments and expensesIntegrate data analytics with existing and new technologiesLeverage storytelling to communicate and validate your findings effectivelyApply practical implementation use cases within your organizationWho This Book Is ForAI Auditing is for internal auditors who are looking to use data analytics and data science to better understand their organizational data. It is for auditors interested in implementing predictive and prescriptive analytics in support of better decision making and risk-based testing of your organizational processes. 

  • Spar 11%
    av Chanchal Chatterjee
    506,-

    Learn to use adaptive algorithms to solve real-world streaming data problems. This book covers a multitude of data processing challenges, ranging from the simple to the complex. At each step, you will gain insight into real-world use cases, find solutions, explore code used to solve these problems, and create new algorithms for your own use.Authors Chanchal Chatterjee and Vwani P. Roychowdhury begin by introducing a common framework for creating adaptive algorithms, and demonstrating how to use it to address various streaming data issues. Examples range from using matrix functions to solve machine learning and data analysis problems to more critical edge computation problems. They handle time-varying, non-stationary data with minimal compute, memory, latency, and bandwidth. Upon finishing this book, you will have a solid understanding of how to solve adaptive machine learning and data analytics problems and be able to derive new algorithms for your own use cases. You will also come away with solutions to high volume time-varying data with high dimensionality in a low compute, low latency environment.What You Will LearnApply adaptive algorithms to practical applications and examplesUnderstand the relevant data representation features and computational models for time-varying multi-dimensional dataDerive adaptive algorithms for mean, median, covariance, eigenvectors (PCA) and generalized eigenvectors with experiments on real dataSpeed up your algorithms and put them to use on real-world stationary and non-stationary dataMaster the applications of adaptive algorithms on critical edge device computation applicationsWho This Book Is ForMachine learning engineers, data scientist and architects, software engineers and architects handling edge device computation and data management.

  • Spar 13%
    av Vinit Jain
    616,-

    Understand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features.Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure.Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues.This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network.What You Will LearnUnderstand the architecture of Wireshark on different operating systemsAnalyze Layer 2 and 3 traffic framesAnalyze routing protocol trafficTroubleshoot using Wireshark GraphsWho This Book Is ForNetwork engineers, security specialists, technical support engineers, consultants, and cyber security engineers

  • Spar 13%
    av Stephen Rylander
    616,-

    Master how to implement a repeatable software construction system. This book closely examines how a system is designed to tie a series of activities together that are needed when building software-intensive systems. Software construction and operations don't get enough attention as a repeatable system. The world is stuck in agile backlog grooming sessions, and quality is not increasing. Companies' budgets are shrinking, and teams need a way to get more done with less, consistently. This topic is very relevant to our current economic conditions and continuing globalization trends. A reason we constantly need more hands-on-the-keyboards is because of all the waste created in development cycles. We need more literature on how to "e;do software"e; not just write software.  These goals are accomplished using the concept of evolutions, much like the Navy SEALS train their team members.  For LIFT, the evolutions are: Plan, Build, Test, Release, Operate and Manage.  The entire purpose of the book is instructing professionals how to use these distinct evolutions while remaining agile. And then, inside of each evolution, to explicitly break down the inputs to the evolution, outputs and series of activities taking place. Patterns of Software Construction clearly outlines how together this becomes the system.What You Will LearnOptimize each evolution of a software delivery cycleReview best practices of planning, highest return in the build cycle, and ignored practices in test, release, and operate Apply the highest return techniques during the software build evolutionWho This Book is ForManagers, developers, tech lead, team lead, aspiring engineer, department leaders in corporations, executives, small business owner, IT Director

  • av Spiro Buzharovski
    616,-

    Create your own crypto currency by implementing blockchain technology using Java. This step-by-step guide will teach you how to create a user interface using Java FX and implement SQLite DB using JDBC Driver for the blockchain.Introducing Blockchain with Java includes numerous exercises and test questions to help you solidify what you have learned as you progress through the book, and provides ideas on expanding the codebase to make it your own. You will have access to a fully-functioning repository with Java code.Upon completing this book, you will have the knowledge necessary to program your own blockchains with Java and you will have a completed project for your portfolio. What You Will LearnKnow the most important theoretical concepts of the blockchainCode the blockchain in JavaCreate a user interface with JavaFXImplement SQLite DB using JDBC DriverCreate a P2P multi-threaded app Create your own cryptocurrency app with full functionalityImplement blockchain technology on a P2P network from scratch using Java, JavaFX, and SQLWho This Book Is ForAnyone with a basic level knowledge of: Java or similar object-oriented programming language, FXML or HTML or similar markup language, and SQL

  • Spar 16%
    av Ashwin Pajankar
    651

    Here is the perfect comprehensive guide for readers with basic to intermediate level knowledge of machine learning and deep learning. It introduces tools such as NumPy for numerical processing, Pandas for panel data analysis, Matplotlib for visualization, Scikit-learn for machine learning, and Pytorch for deep learning with Python. It also serves as a long-term reference manual for the practitioners who will find solutions to commonly occurring scenarios.The book is divided into three sections. The first section introduces you to number crunching and data analysis tools using Python with in-depth explanation on environment configuration, data loading, numerical processing, data analysis, and visualizations. The second section covers machine learning basics and Scikit-learn library. It also explains supervised learning, unsupervised learning, implementation, and classification of regression algorithms, and ensemble learning methods in an easy manner with theoretical and practical lessons. The third section explains complex neural network architectures with details on internal working and implementation of convolutional neural networks. The final chapter contains a detailed end-to-end solution with neural networks in Pytorch.After completing Hands-on Machine Learning with Python, you will be able to implement machine learning and neural network solutions and extend them to your advantage. What You'll LearnReview data structures in NumPy and Pandas Demonstrate machine learning techniques and algorithmUnderstand supervised learning and unsupervised learning Examine convolutional neural networks and Recurrent neural networksGet acquainted with scikit-learn and PyTorchPredict sequences in recurrent neural networks and long short term memory Who This Book Is ForData scientists, machine learning engineers, and software professionals with basic skills in Python programming.

  • av Virgilio Viegas
    780,-

    Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure.The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.).To connect the book with the real world, a number of well-known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you.What You Will LearnUnderstand corporate IT security controls, including governance, policies, procedures, and security awarenessKnow cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scansUnderstand technical IT security controls for unmanaged and managed devices, and perimeter controlsImplement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and moreWho This Book Is ForIT security managers, chief information security officers, information security practitioners, and IT auditors will use the book as a reference and support guide to conduct gap analyses and audits of their organizations' IT security controls implementations.

  • av Scott Haines
    725

    Leverage Apache Spark within a modern data engineering ecosystem. This hands-on guide will teach you how to write fully functional applications, follow industry best practices, and learn the rationale behind these decisions. With Apache Spark as the foundation, you will follow a step-by-step journey beginning with the basics of data ingestion, processing, and transformation, and ending up with an entire local data platform running Apache Spark, Apache Zeppelin, Apache Kafka, Redis, MySQL, Minio (S3), and Apache Airflow.Apache Spark applications solve a wide range of data problems from traditional data loading and processing to rich SQL-based analysis as well as complex machine learning workloads and even near real-time processing of streaming data. Spark fits well as a central foundation for any data engineering workload. This book will teach you to write interactive Spark applications using Apache Zeppelin notebooks, write and compile reusable applications and modules, and fully test both batch and streaming. You will also learn to containerize your applications using Docker and run and deploy your Spark applications using a variety of tools such as Apache Airflow, Docker and Kubernetes.Reading this book will empower you to take advantage of Apache Spark to optimize your data pipelines and teach you to craft modular and testable Spark applications. You will create and deploy mission-critical streaming spark applications in a low-stress environment that paves the way for your own path to production. What You Will LearnSimplify data transformation with Spark Pipelines and Spark SQLBridge data engineering with machine learningArchitect modular data pipeline applications Build reusable application components and libraries Containerize your Spark applications for consistency and reliabilityUse Docker and Kubernetes to deploy your Spark applicationsSpeed up application experimentation using Apache Zeppelin and Docker Understand serializable structured data and data contracts Harness effective strategies for optimizing data in your data lakes Build end-to-end Spark structured streaming applications using Redis and Apache Kafka Embrace testing for your batch and streaming applications Deploy and monitor your Spark applications Who This Book Is ForProfessional software engineers who want to take their current skills and apply them to new and exciting opportunities within the data ecosystem, practicing data engineers who are looking for a guiding light while traversing the many challenges of moving from batch to streaming modes, data architects who wish to provide clear and concise direction for how best to harness and use Apache Spark within their organization, and those interested in the ins and outs of becoming a modern data engineer in today's fast-paced and data-hungry world

  • av Lee Harding
    711,-

    Accelerate your Salesforce implementation to provide benefits to your business more rapidly while maintaining control and improving quality.Salesforce has become one of the most influential business tools in our modern age. What started as the world's most comprehensive customer relationship management (CRM) system available in the market place has now morphed over the years into an ecosystem of tools and services that enable you to run your entire business platform.  This book gives you a method (a set of governance processes) that provides a complete view of how to govern and manage any Salesforce implementation. It breaks the architectural components of the Salesforce platform into manageable sections, allowing you to navigate and understand how to govern your Salesforce implementation in a consistent manner with an approach that is structured, repeatable, and clearly defined.   Salesforce Platform Governance Method is divided into nine distinct phases which have been chosen based on how the Salesforce platform is architected. This is relevant today because every organization that implements Salesforce will face the same issues around governance, integration, development, and security and the majority of organizations will find, through trial and error, a solution to govern these components. This book will help Salesforce professionals and enterprise organizations as well as small and mid-sized businesses (SMBs) navigate these topics and ultimately have a successful and fully integrated, secure Salesforce implementation.  What You Will LearnGovern the application architecture on the Salesforce platform, including general architecture, localization and global deployments, workflow and process, formulas and files, and socialGovern the data architecture, including design and data optimization, performance, predictive and actual data volumes, and data movementGovern the identity and access management aspects of the application and Salesforce platformGovern the low-level platform capabilities delivered through Lightning, Visualforce, and ApexHandle community implementations that bring specific features into the Salesforce platform for consideration and governanceCreate checklists for the governance steps, laid out in the method, and for any tooling recommendations that can help simplify the process of governance Who This Book Is ForPeople responsible for maintaining a Salesforce SaaS instance or developing changes for that Salesforce instance. Readers should have a basic understanding of the Salesforce platform and a desire to introduce a level of control around the changes being made, reduce issues on their Salesforce instance, and improve quality while increasing the throughput of changes they want to introduce into the platform.

  • av Nico Vermeir
    741,-

    Welcome to .NET 6, Microsoft's unified framework that converges the best of the modern and traditional .NET Framework. This book will introduce you to the new aspects of Microsoft's fully supported .NET 6 Framework and will teach you how to get the most out of it. You will learn about the progress to one unified .NET, including MAUI and the revival of desktop development. You will dive into Roslyn, Blazor, CLI, Containers, Cloud, and much more, using a "e;framework first"e; learning approach. You will begin by learning what each tool is, its practical uses, and how to apply it and then you will try it out on your own for learning reinforcement. And, of course, there will be plenty of code samples using C# 10.Introducing .NET 6 is aimed at .NET developers, both junior developers and those coming from the .NET framework, who want to understand everything the modern framework has to offer, besides the obvious programming languages. While you will still see a lot of fabulous C# 10 throughout the book, the focus of this learning is all about .NET and its tooling.What You Will LearnBecome a more versatile developer by knowing the variety of options available to you in the .NET 6 framework and its powerful toolingKnow the different front-end frameworks .NET offers, such as UWP, WPF, and WinForms, and how they stack up to each otherUnderstand the different communication protocols, such as REST and gRPC, for your back-end servicesDiscover the secrets of cloud-native development, such as serverless computing with Azure Functions and deploying containers to Azure Container ServicesMaster the command line, take your skill set to the cloud, and containerize your .NET 6 app Who This Book Is ForBoth students and more experienced developers, C# developers who want to learn more about the framework they use, developers who want to be more productive by diving deeper into the tooling that .NET 6 brings to the fold, developers who need to make technical decisions. A working knowledge of C# is recommended to follow the examples used in the book.

  • av Albert Danial
    780,-

    MATLAB can run Python code!Python for MATLAB Development shows you how to enhance MATLAB with Python solutions to a vast array of computational problems in science, engineering, optimization, statistics, finance, and simulation. It is three books in one:A thorough Python tutorial that leverages your existing MATLAB knowledge with a comprehensive collection of MATLAB/Python equivalent expressionsA reference guide to setting up and managing a Python environment that integrates cleanly with MATLABA collection of recipes that demonstrate Python solutions invoked directly from MATLAB  This book shows how to call Python functions to enhance MATLAB's capabilities. Specifically, you'll see how Python helps MATLAB:Run faster with numbaDistribute work to a compute cluster with daskFind symbolic solutions to integrals, derivatives, and series summations with SymPyOverlay data on maps with CartopySolve mixed-integer linear programming problems with PuLPInteract with Redis via pyredis, PostgreSQL via psycopg2, and MongoDB via pymongoRead and write file formats that are not natively understood by MATLAB, such as SQLite, YAML, and iniWho This Book Is ForMATLAB developers who are new to Python and other developers with some prior experience with MATLAB, R, IDL, or Mathematica.

  • - Prototyping Experiments for Makers
    av John C. Shovic
    475

    Build your own Internet of Things (IoT) projects for prototyping and proof-of-concept purposes. This book contains the tools needed to build a prototype of your design, sense the environment, communicate with the Internet (over the Internet and Machine to Machine communications) and display the results.Raspberry Pi IoT Projects provides several IoT projects and designs are shown from the start to the finish including an IoT Heartbeat Monitor, an IoT Swarm, IoT Solar Powered Weather Station, an IoT iBeacon Application and a RFID (Radio Frequency Identification) IoT Inventory Tracking System. The software is presented as reusable libraries, primarily in Python and C with full source code available. Raspberry Pi IoT Projects: Prototyping Experiments for Makers is also a valuable learning resource for classrooms and learning labs.What You'll Learnbuild IOT projects with the Raspberry PiTalk to sensors with the Raspberry PiUse iBeacons with the IOT Raspberry PiCommunicate your IOT data to the InternetBuild security into your IOT deviceWho This Book Is ForPrimary audience are those with some technical background, but not necessarily engineers. It will also appeal to technical people wanting to learn about the Raspberry Pi in a project-oriented method. 

  • av Steve Prentice
    325,-

    People who discuss digital transformation often focus on new technology with a presumption that the working population will embrace it enthusiastically. But human beings are still instinctively dominated by fear, a single complicating reflex which will always be the default response.Workplace fear comes in many forms, including the fear of change, the fear of looking stupid, and the fear of working relationships, and in all cases these fears have deep roots that extend far below having to learn a new technology. It¿s about the fear of losing a job, a livelihood, and an identity.The results of such fear can have enormous repercussions on an organization, including increased vulnerability to ransomware and cyberattack, increased employee turnover, loss of competitiveness, loss of market share, resistance, sabotage, discrimination, and litigation.Steve Prentice is an expert in the relationship between people,technology, and change. This book will demonstrate to managers and employees alike the various types of fear that can occur in the workplace in the context of digital transformation, how these fears can impact productivity, team dynamics, and corporate health, and most importantly, how to overcome them.Using case studies of digital transformation successes and failures, Steve describes:How fear grows in the body and mindHow fear radiates and spreads through groups and teamsHow fear interacts with technology, change, and digital transformationHow ignoring or suppressing fear leads to tangible risks to an organization¿s futureHow to address and manage fear individually and as a groupHow the demands of modern employees have changedHow managers can prepare themselves for the new normalWho This Book Is For Managers who wish to look underthe hood and understand how people respond to the changes in their immediate world, and why most of those responses are negative. It will also be an uplifting read for individual employees who seek to understand why they, or their colleagues or managers, generally respond negatively to changes, or who struggle with conflict and relationships in the workplace and how to create an action plan to improve the situation.

  • av Michael Inden
    741,-

    Augment your knowledge of Python with this entertaining learning guide, which features 100 exercises and programming puzzles and solutions. Python Challenges will help prepare you for your next exam or a job interview, and covers numerous practical topics such as strings, data structures, recursion, arrays, and more.Each topic is addressed in its own separate chapter, starting with an introduction to the basics and followed by 10 to 15 exercises of various degrees of difficulty, helping you to improve your programming skills effectively. Detailed sample solutions, including the algorithms used for all tasks, are included to maximize your understanding of each area. Author Michael Inden also describes alternative solutions and analyzes possible pitfalls and typical errors.Three appendices round out the book: the first covers the Python command line interpreter, which is often helpful for trying out the code snippets and examples in the book, followed by an overview of Pytest for unit testing and checking the solutions. The last explains the O notation for estimating performance.After reading this book, you'll be prepared to take the next step in your career or tackle your next personal project. All source code is freely available for download via the Apress website.What You Will Learn Improve your Python knowledge by solving enjoyable but challenging programming puzzles Solve mathematical problems, recursions, strings, arrays and more Manage data processing and data structures like lists, sets, maps Handle advanced recursion as well as binary trees, sorting and searching Gamify key fundamentals for fun and easier reinforcement Who this book is for:Programmers, software developers who are either professionals or makers, as well as students and teachers. At least some prior experience with the Python programming is recommended.

  • av Umberto Michelucci
    741,-

    Understand how neural networks work and learn how to implement them using TensorFlow 2.0 and Keras. This new edition focuses on the fundamental concepts and at the same time on practical aspects of implementing neural networks and deep learning for your research projects.This book is designed so that you can focus on the parts you are interested in. You will explore topics as regularization, optimizers, optimization, metric analysis, and hyper-parameter tuning. In addition, you will learn the fundamentals ideas behind autoencoders and generative adversarial networks.All the code presented in the book will be available in the form of Jupyter notebooks which would allow you to try out all examples and extend them in interesting ways. A companion online book is available with the complete code for all examples discussed in the book and additional material more related to TensorFlow and Keras. All the code will be available in Jupyter notebook format and can be opened directly in Google Colab (no need to install anything locally) or downloaded on your own machine and tested locally.You will: * Understand the fundamental concepts of how neural networks work* Learn the fundamental ideas behind autoencoders and generative adversarial networks* Be able to try all the examples with complete code examples that you can expand for your own projects* Have available a complete online companion book with examples and tutorials.This book is for:Readers with an intermediate understanding of machine learning, linear algebra, calculus, and basic Python programming. 

  • av Mohammed Moreb
    725

    Leverage foundational concepts and practical skills in mobile device forensics to perform forensically sound criminal investigations involving the most complex mobile devices currently available on the market. Using modern tools and techniques, this book shows you how to conduct a structured investigation process to determine the nature of the crime and to produce results that are useful in criminal proceedings. You'll walkthrough the various phases of the mobile forensics process for both Android and iOS-based devices, including forensically extracting, collecting, and analyzing data and producing and disseminating reports. Practical cases and labs involving specialized hardware and software illustrate practical application and performance of data acquisition (including deleted data) and the analysis of extracted information. You'll also gain an advanced understanding of computer forensics, focusing on mobile devices and other devices not classifiable as laptops, desktops, or servers. This book is your pathway to developing the critical thinking, analytical reasoning, and technical writing skills necessary to effectively work in a junior-level digital forensic or cybersecurity analyst role.  What You'll LearnAcquire and investigate data from mobile devices using forensically sound, industry-standard toolsUnderstand the relationship between mobile and desktop devices in criminal and corporate investigationsAnalyze backup files and artifacts for forensic evidenceWho This Book Is ForForensic examiners with little or basic experience in mobile forensics or open source solutions for mobile forensics. The book will also be useful to anyone seeking a deeper understanding of mobile internals.

  • av Vangos Pterneas
    670,-

    Know how to program the Microsoft Kinect and use the device for applications that interact directly with humans through gestures and motion. This book covers the mathematics and theoretical background needed for depth sensing, motion tracking, and object recognition while maintaining a practical focus on getting things done. You will learn to track the human body in three-dimensional space, analyze the human motion, and remove the background to isolate the person being tracked. You will see how to recognize objects and voice, and transform between the three-dimensional physical space and a computer's two-dimensional screen.The book is written with real-world applications in mind. It provides step-by-step tutorials and source code for common use cases. The author has worked with startups and Fortune 500 companies, and all of the examples are taken directly from the industry. The book's practical focus simplifies the core principles, removes the clutter, and allows developers to start writing code right away. Also covered is the use of Azure Cognitive Services on Microsoft's cloud platform and their use for object and voice recognition, enabling your applications to "e;see"e; objects and respond to their environment.What You Will LearnVisualize color, depth, and body dataCalculate angles between different body jointsAnalyze human motion and create fitness applicationsRecognize objects and voice using cloud-powered artificial intelligenceRemove the background from a scene to create virtual worldsWho This Book Is ForDevelopers who want to build demanding Kinect apps and games, and those who are looking for a careful balance between theoretical knowledge and practical application that favors the practical. Readers should have a basic knowledge of C# and some familiarity with the Unity3D engine. 

  • av Stefania Loredana Nita
    539,-

    Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction to Java 17's new features and updates, a roadmap for Jakarta EE 10 security mechanisms, a unique presentation of the "e;hot points"e; (advantages and disadvantages) from the Java Cryptography Architecture (JCA), and more.The book dives into the classical simple cryptosystems that form the basis of modern cryptography, with fully working solutions (encryption/decryption operations). Pseudo-random generators are discussed as well as real-life implementations. Hash functions are covered along with practical cryptanalysis methods and attacks, asymmetric and symmetric encryption systems, signature and identification schemes.The book wraps up with a presentation of lattice-based cryptography and the NTRU framework library. Modern encryption schemes for cloud and big data environments (homomorphic encryption and searchable encryption) also are included. After reading and using this book, you will be proficient with crypto algorithms and know how to apply them to problems you may encounter.   What You Will Learn Develop programming skills for writing cryptography algorithms in Java Dive into security schemes and modules using Java Explore "e;good"e; vs "e;bad"e; cryptography based on processing execution times and reliability Play with pseudo-random generators, hash functions, etc. Leverage lattice-based cryptography methods, the NTRU framework library, and more  Who This Book Is ForThose who want to learn and leverage cryptography and cryptanalysis using Java. Some prior Java and/or algorithm programming exposure is highly recommended.

  • av Philip Weinmeister
    495,-

    Whether you are brand new to the world of digital experiences on the Salesforce platform or you are looking to take your Experience Cloud (previously "e;Community Cloud"e;) knowledge to the next level, this detailed guide will help you build and manage a Salesforce site by leveraging the declarative power of the platform with clicks, not code.Each Salesforce site/community is a part of a widespread ecosystem, with thousands of sites and millions of users active today on Experience Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways.Author Philip Weinmeister, Salesforce MVP and the only recipient of the "e;Community Cloud MVP"e; Trailblazer award from Salesforce, leads you through the ins and outs of Salesforce Experience Cloud and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform.This completely revised edition updates all content to reflect the new "e;experience-centric"e; branding and a slew of platform updates from the last few years (including screenshots, terminology, features, etc.). Net new content includes Salesforce CMS, the Experience Cloud Consultant certification exam, and Mobile Publisher, among other topics.The book takes you through the entire process: from planning and designing a site to configuration/build, setup, and administration, all the way to deployment. Detailed explanations are provided for key components, templates, and features such as Experience Builder, Audience Targeting, Lightning Bolts, and much more.What You Will LearnPlan and design a site using Experience CloudConceptualize how employees, partners, and customers use and benefit from Salesforce sitesUse Experience Builder and Lightning components within an Experience Builder templateApply topics and knowledge articles to a site to increase value and adoptionBuild and display rich content within a site using Salesforce CMSCreate dynamic and personalized user experiences with audience targetingBuild, export, and import unique templates with the Lightning Bolt solution frameworkProvide site data for members or site managersWho This Book Is ForSalesforce administrators, developers, functional architects, business analysts, and site/community managers.

  • av Stephen Haunts
    413,-

    Unlock your potential and understand how you can have an audience hanging on to your every word. Entrepreneurs and business professionals often have to pitch their products and projects to an audience - whether at a conference stage, meetup group, to VC firms or even at the office to their peers and leaders. Through this book, you will learn how to plan, rehearse, and deliver the perfect presentation for your needs. You'll review different presentation styles, how to craft and structure a talk and how to make it engaging for the audience. If you've ever wondered how you can be chosen to speak at a conference, this book will show you how and go in depth on how to craft a winning talk synopsis and proposal to stand out over the competition. You'll also examine many other details that go into giving a presentation such as face and hand gesturing, pre-performance rituals like visualization techniques, time management , addressing technical difficulties, preparing for question-and-answer sessions, gathering feedback, the differences between in person events and online talks/webinars and how to mold your presentation to the medium. Powerful Presentations will show you how to perfect your public speaking and presentation skills.What You'll LearnExplore the design and structure of presentations that retain an audience's attentionPrepare for a talk, including rehearsal, but also failure contingency planning for things like projectors, Wi-Fi, demo failure, etc.Review all of the useful tools and services available to help you develop and deliver a great presentationWho This Book Is For Professionals who want to design and deliver talks in their chosen fields of expertise, whether that be a software developer or an entrepreneur. 

  • Spar 13%
    av David R. Heffelfinger
    616,-

    Develop, configure, and deploy Java cloud-native applications using Payara Micro. This book demystifies Java cloud-native application development using standard Microprofile APIs and covers Payara-specific features such as automatic clustering and application initialization performance improvements. You will learn how to improve startup performance by taking advantage of class data sharing, and configure cloud-native applications via standard development tools such as Maven and Gradle. The book also clarifies how to develop functionality necessary in a cloud environment, such as health checks and request tracing, using MicroProfile APIs. The book begins by showing how to develop microservices using RESTful web services, followed by how to create microservice clients using MicroProfile and the REST client API. Dependency Injection via Jakarta Context and Dependency Injection (CDI) is also covered. Various approaches to application configuration are covered as well, including property files, environment variables, and system properties. You will learn to configure fault tolerance and high availability, generate system and custom application metrics, and generate health checks to automatically improve overall application health. You will know how to trace the flow of a request across service boundaries with OpenTracing. You will be able to make future maintenance easily through generating documentation, including how to automatically update documentation as your code is updated. Additionally, you will learn how to secure cloud applications and to automatically cluster applications and improve application startup performance.What You Will LearnDevelop microservices using standard Java APIsImplement cloud functionality such as request tracing and health checksDeploy applications as thin archives and as uber archivesConfigure applications via Maven and GradleGenerate custom metrics for capacity planning and proactive discovery of issuesImplement features in support of high availability and fault toleranceSecure your applications with Jason Web TokensTake advantage of Payara's own cloud platform for easy deploymentWho This Book Is ForJava developers who wish to develop cloud-native applications and microservices, and Java EE application developers who wish to transition to developing cloud-native applications that are lightweight and easily deployed

  • av Hugo Filipe Oliveira Rocha
    804

    In the simplest terms, event-driven architectures are like onions; they are manageable as a single layer (like a monolith) but when you get into them, they begin to cascade apart and you quickly realize that there are many complex layers (distributed microservices architecture). And that's when the tears begin.This prescriptive guide takes you through the steps of moving a platform with millions of users from a monolith to a microservices event-driven architecture. You will learn about the challenges and complexities that arise in high-throughput environments that often contain upwards of hundreds of microservices. This book is designed to be your single best resource for learning how to apply event-driven architectures in real-world scenarios and offers hundreds of patterns to overcome the common and not so common challenges.While event-driven architectures have been the standard for decoupled, pluggable, evolutionary architectures for years, they have only recently been adopted by enterprises for the purpose of distributed microservices and there is little information about adopting them. Using them at scale can save valuable resources, but requires different considerations, including the added complexity of supporting several moving parts and getting the event schema right from the start in order to avoid large restructuring later on.Author Hugo Rocha understands that these kinds of challenges, as well as many others, need to be considered from the beginning, and helps teach you the mindset needed to create a deliberate strategy upfront. This book offers learning approaches and patterns to get you up to speed in order to sustainably build and manage event-driven architectures.What You Will LearnUnderstand the real-world challenges of event-driven architectures and the patterns to deal with those challenges and the trade-offs of each solutionLeverage the advantages of event-driven architectures to build scalable solutions and address legacy applicationsPlan successful future implementations to avoid common pitfalls and apply proven patterns to deal with challenges in a real-world platform with millions of usersDecide whether event-driven solutions are the right choice for the requirements at handDiscuss and understand advanced concepts about event-driven architectures Who Is This Book ForSoftware engineers and software architects. Anyone currently working with microservice architectures, primarily event-driven microservices, will greatly benefit from this book. Readers working with monoliths will benefit, as the book explores migration from a monolithic application to an event-driven microservice architecture.

  • av Steve Scargall
    591,-

    Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand how persistent memory brings together several new software/hardware requirements, and offers great promise for better performance and faster application startup times-a huge leap forward in byte-addressable capacity compared with current DRAM offerings.This revolutionary new technology gives applications significant performance and capacity improvements over existing technologies. It requires a new way of thinking and developing, which makes this highly disruptive to the IT/computing industry. The full spectrum of industry sectors that will benefit from this technology include, but are not limited to, in-memory and traditional databases, AI, analytics, HPC, virtualization, and big data.   Programming Persistent Memory describes the technology and why it is exciting the industry. It covers the operating system and hardware requirements as well as how to create development environments using emulated or real persistent memory hardware. The book explains fundamental concepts; provides an introduction to persistent memory programming APIs for C, C++, JavaScript, and other languages; discusses RMDA with persistent memory; reviews security features; and presents many examples. Source code and examples that you can run on your own systems are included.What You'll LearnUnderstand what persistent memory is, what it does, and the value it brings to the industryBecome familiar with the operating system and hardware requirements to use persistent memoryKnow the fundamentals of persistent memory programming: why it is different from current programming methods, and what developers need to keep in mind when programming for persistenceLook at persistent memory application development by example using the Persistent Memory Development Kit (PMDK)Design and optimize data structures for persistent memoryStudy how real-world applications are modified to leverage persistent memoryUtilize the tools available for persistent memory programming, application performance profiling, and debuggingWho This Book Is ForC, C++, Java, and Python developers, but will also be useful to software, cloud, and hardware architects across a broad spectrum of sectors, including cloud service providers, independent software vendors, high performance compute, artificial intelligence, data analytics, big data, etc.  

  • av David Golding
    444

    CakePHP is a leading PHP–based web app development framework. When asking a question on forums or chat rooms, many CakePHP beginners get little help from the experts. Simple questions can get a response like, “Well, just read the online manual and API.” Unfortunately, the online manual is depreciated, and who wants to absorb a programming language or framework from an API? Beginning CakePHP will do the following: Lead you from a basic setup of CakePHP to building a couple applications that will highlight CakePHP’s functionality and capabilities without delving too deeply into the PHP language, but rather what the CakePHP framework can offer the developer. Teach you to use CakePHP by incorporating advanced features into your web development projects. Target beginners of CakePHP or web frameworks in general as well as experienced developers with limited exposure to CakePHP. A secondary audience may include developers undecided on adopting CakePHP or business managers trying to assess the value of incorporating CakePHP into their toolbox.

  • Spar 11%
    av Will McGugan
    816

    Like music and movies, video games are rapidly becoming an integral part of our lives. Over the years, you’ve yearned for every new gaming console, mastered each blockbuster within weeks after its release, and have even won a local gaming competition or two. But lately you’ve been spending a lot of time thinking about a game idea of your own, or are exploring the possibility of making a career of this vibrant and growing industry. But where should you begin?Beginning Game Development with Python and Pygame is written with the budding game developer in mind, introducing games development through the Python programming language and the popular Pygame games development library. Authored by industry veteran and Python expert Will McGugan, who worked on the MotorStorm game for PlayStation 3, you’ll be privy to insights that will not only help you to exploit Pygame to its maximum potential, but also make you a more creative and knowledgeable games developer all round. Learn how to create advanced games by taking advantage of the popular open source Python programming language and Pygame games development library Learn about coding gaming preferences, sound, visual effects, and joystick/keyboard interaction Discover the concepts that are crucial to success in today's gaming industry, such as support for multiple platforms, and granting users the ability to extend and customize your games

  • av Joseph Sack
    857,-

    SQL Server 2000 is the leading relational database for the Windows platform. It’s a full-featured, enterprise-class database server, but its ease of use and maintenance makes it suitable whether youre a junior, part-time, or advanced database administrator or developer. SQL Server expert and author Joseph Sack covers all SQL Server 2000 features, so you’ll be able to rely on this book when you’re in the field and need quick, effective solutions.Included are hundreds of practical recipes that describe and demonstrate the utility of a feature or functionwith the minimum necessary background theory. This quick and effective reference highlights the specifics of every SQL Server command or process. Further, this special signature edition contains a searchable PDF of the book, making it ideal to use as both a desktop reference, and a client-site field guide.

  • av Geir Olsen
    409

    Since the announcement of Visual Basic .NET, a lot has been made of its powerful object-oriented features. However, very little discussion has been devoted to the practice of object-oriented programming at its most fundamental level—that is, building classes. The truth is, whatever code you write in Visual Basic .NET, you are writing classes that fall within the class hierarchy of the .NET Framework. Visual Basic .NET Class Design Handbook was conceived as a guide to help you design these classes effectively, by looking at what control you have over your classes and how Visual Basic .NET turns your class definitions into executable code. This book will give you a deep and thorough understanding of the implications of all the decisions you can make in designing a class, so you are equipped to develop classes that are robust, flexible, and reusable. In short, this book will take you from a theoretical understanding of the basic principles of object-oriented programming to the ability to write well-designed classes in actual applications.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.