Norges billigste bøker

Bøker utgitt av APress

Filter
Filter
Sorter etterSorter Populære
  • av Alex Vasilev
    643

    Learn to create web applications in PHP with minimal previous experience. This book is a practical guide to using PHP for web development.Loaded with examples and step-by-step instructions, each chapter is dedicated to a specific area or function. Yoüll first review the main principles of PHP and what is needed to program and develop in it. Yoüll then study variables, data types, control statements, arrays, and functions, all critical for creating efficient PHP programs. The book then moves on to object-oriented programming (OOP) and how to implement those principles in PHP, as well as inheritance, interfaces, testing, error handling, and exceptions. By the end of PHP by Example, you will have the knowledge and confidence to implement PHP for your web projects both large and small.What Yoüll Learn Understand PHP from the ground up Create scripts and implement them in real-world projects Work with a broad toolkit of ready-made exercises and solutions Investigate the main constructions of the PHP

  • av Temporal Technologies
    460

    Explore the intricate world of developer experience (DevEx) and its impact on the software development process. This book delves into the critical components of DevEx, such as documentation, tooling, API design, developer support, performance, and reliability, providing actionable insights and strategies to help organizations create development environments that foster productivity, collaboration, and satisfaction among developers.The main topics you'll review include the evolution of software development methodologies, the intersection of user experience (UX) and DevEx, and an in-depth exploration of the critical components of DevEx. You'll also look at practical approaches to improving DevEx, real-world examples of organizations that have successfully transformed their developer experience, and a discussion of DevEx's future trends and challenges. These topics are crucial as the software development landscape has become increasingly complex and competitive.Developer experience is no longer a luxury but a necessity for organizations seeking to attract top talent, drive innovation, and stay ahead in the industry. As the line between UX and DevEx continues to blur, it is imperative to understand how these two aspects are intertwined and how they can synergistically contribute to the success of software projects. Moreover, these topics are particularly relevant now, as remote work and distributed teams become more commonplace, making it even more critical for organizations to provide developers with the resources, tools, and support they need to be successful.Developer Experience Unleashed will inspire you to recognize the critical role of DevEx in the software development process and to adopt best practices that foster a synergistic environment where developers and users can thrive together.

  • Spar 10%
    av Venkata Ravi Kumar Yenugula
    700,-

    This book is your one-stop resource on MySQL database installation and server management for administrators. It covers installation, upgrades, monitoring, high availability, disaster recovery, security, and performance and troubleshooting. You will become fluent in MySQL 8.2, the latest version of the highly scalable and robust relational database system.With a hands-on approach, the book offers step-by-step guidance on installing, upgrading, and establishing robust high availability and disaster recovery capabilities for MySQL databases. It also covers high availability with InnoDB and NDB clusters, MySQL routers and enterprise MySQL tools, along with robust security design and performance techniques. Throughout, the authors punctuate concepts with examples taken from their experience with large-scale implementations at companies such as Meta and American Airlines, anchoring this practical guide to MySQL 8.2 administration in the real world.What YouWill LearnUnderstand MySQL architecture and best practices for administration of MySQL serverConfigure high availability, replication, disaster recovery with InnoDB and NDB enginesBack up and restore with MySQL utilities and tools, and configure the database for zero data lossTroubleshoot with steps for real-world critical errors and detailed solutionsWho This Book Is ForTechnical professionals, database administrators, developers, and engineers seeking to optimize MySQL databases for scale, security, and performance

  • av Alex Libby
    269,-

    Leverage the power of the Shadow DOM API to quickly create encapsulated code that keeps markup and styles separate within websites. Using little more than a text editor or free software, this project-oriented book simplifies the process of creating and manipulating the Shadow DOM API code in the browser for websites or online applications. You'll use a starting toolset to develop future projects, incorporate them into an existing workflow, and allow them to simplify complex components. This makes them more robust and less brittle when used in websites. You'll also see that websites do not have to convert the whole work process immediately; you can incorporate as little or as much as needed of the API, and build on this as your skills develop. We live in an age where speed and simplicity are of the essence. Beginning Shadow DOM API shows you the perfect way to create encapsulated code that can run in multiple frameworks with a minimum of fuss.You You'll LearnImplement the Shadow DOM API in a projectGain an appreciation of pointers using the Shadow DOM APIManage issues and security when using the Shadow DOM APIMake components and code more reusable, while maintaining desired stylingWho This Book Is ForWebsite developers who are already familiar with frameworks that Shadow DOM API, but do not want to have to use the heavy weight of a full-sized framework to add features such as DOM encapsulation to their code.

  • av Bruce Hopkins
    643

    Embrace the future of software development! ChatGPT for Java is the perfect starting point for Java developers to learn how to build intelligent applications using ChatGPT and Open AI APIs.This book takes you from the ground up to demonstrate how to use ChatGPT programmatically. You will learn the basics of ChatGPT and OpenAI APIs, including how to authenticate, send prompts, generate responses, test in the Playground, and handle errors. Each chapter includes practical exercises which demonstrate different API functionalities and bring your concepts to life. You will learn how to AI-enable your own applications using models such as GPT-4, GPT-3.5, Whisper, DALL-E, and many more. As a result, developers will understand that generative AI tools will not replace software development jobs! Instead, you will leverage ChatGPT as your Java AI-pair programmer to increase speed and productivity. You will also learn how ChatGPT can provide powerful Natural Language Processing (NLP) capabilities to your Java apps in order to understand various formats of unstructured text. Step-by-step, you will apply the concepts covered to create your own intelligent chatbots that can automatically process messages from either Slack on Discord. With this book, Java developers will be empowered to take their applications to new heights by leveraging the power of AI as this exciting field continues to evolve and transform.What You Will LearnAuthenticate with the ChatGPT and OpenAI APIs and learn how to engineer and send promptsTest your prompts in the ChatGPT PlaygroundHow to use multiple artificial intelligence models Harness the power the temperature, top_p, and other parameters that can ONLY be accessed by developers to create more unique and engaging responses from ChatGPTCreate intelligent bots for Slack or Discord serversIncorporate context into prompts for betterresponses and apply advanced features of the APIs.Explore future directions for ChatGPT and OpenAI Who This Book Is ForBeginning and intermediate Java developers who have a basic understanding of Java programming concepts and are interested in learning how to add intelligence to their applications by using ChatGPT programmatically. No prior experience with ChatGPT or OpenAI APIs is required.

  • av Abhishek Mishra
    643

    Understand and apply the design patterns outlined in this book to design, develop, and deploy scalable AI solutions that meet your organization's needs and drive innovation in the era of intelligent automation.This book begins with an overview of scalable AI systems and the importance of design patterns in creating robust intelligent solutions. It covers fundamental concepts and techniques for achieving scalability in AI systems, including data engineering practices and strategies. The book also addresses scalable algorithms, models, infrastructure, and architecture considerations. Additionally, it discusses deployment, productionization, real-time and streaming data, edge computing, governance, and ethics in scalable AI. Real-world case studies and best practices are presented, along with insights into future trends and emerging technologies.The book focuses on scalable AI and design patterns, providing an understanding of the challenges involved in developing AI systems that can handle large amounts of data, complex algorithms, and real-time processing. By exploring scalability, you will be empowered to design and implement AI solutions that can adapt to changing data requirements.What You Will LearnDevelop scalable AI systems that can handle large volumes of data, complex algorithms, and real-time processingKnow the significance of design patterns in creating robust intelligent solutionsUnderstand scalable algorithms and models to handle extensive data and computing requirements and build scalable AI systemsBe aware of the ethical implications of scalable AI systemsWho This Book Is ForAI practitioners, data scientists, and software engineers with intermediate-level AI knowledge and experience

  • Spar 10%
    av Morey J Haber
    700,-

    Today, it¿s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it¿s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities¿whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization¿s entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments

  • av Puthiyavan Udayakumar
    798,-

    Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers

  • av Dario Cabianca
    643

    Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios.Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads¿ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate.By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform.Bonus Material: IAM deny policiesWhat You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is ForSoftware engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.

  • Spar 10%
    av Zeeshan Chawdhary
    700,-

    Explore the latest version of Laravel and its ecosystem, including Laravel Nova, Telescope, Horizon, and Vapor. This is book completes the App development trinity - Backend, Website, and Mobile Apps. As a bonus, you'll learn to build Desktop Apps for Windows, MacOS and Linux using NativePHP.You'll start by reviewing the Laravel ecosystem and then move on to building some real-world applications. These applications are production-ready using Laravel's best practices and modern frontend frameworks like React and Vue.js. The first app is a modular CMS (PickleCMS), along with a website that consumes the content. Next, you'll build an eCommerce mobile app (Commercify) using Laravel. Finally, you'll build a Travel App (TripoNama).Along the way, you'll study related topics that apply to your applications, including search with Laravel Scout, generating PDFs, logging, browser automation with Dusk, consuming and building REST and GraphQL APIs. Practical Laravel 11 isnot just another documentation tool, it's a must-have companion for Laravel enthusiasts.You will:Build a GraphQL API to use in real-world applications.Work with testing and browser automation tools. Consume and expose APIs with Laravel.Write Artisan commands that run on the CLI.Build a blogging system and WYSIWYG page editor.

  • Spar 10%
    - A Comprehensive Guide to Version Control, Project Management, and Teamwork for the New Developer
    av Mariot Tsitoara
    700,-

  • Spar 10%
    - Developing with FreeRTOS, libopencm3 and GCC
    av Warren Gay
    700,-

  • av Chuck Easttom
    871

    This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.What Will You LearnUnderstand Windows architectureRecover deleted files from Windows and the recycle binUse volatility and PassMark volatility workbenchUtilize Windows PowerShell scripting for forensic applicationsWho This Book Is ForWindows administrators, forensics practitioners, and those wanting to enter the field of digital forensics

  • av Debashish Roy
    599,-

    This transformative book explores the power of artificial intelligence (AI) in revolutionizing the utilities industry. It covers crucial topics such as intelligent grids, decentralized energy resources, customer engagement, electric vehicle integration, and more, providing a comprehensive and practical guide to successfully navigate the energy transition.In today's world, the urgency of addressing climate change and transitioning to sustainable energy systems is undeniable. With approximately 60 percent of global greenhouse gas emissions attributed to the energy sector, utilities play a vital role in achieving sustainability goals. The traditional utility business model faces disruption from renewable energy, changing consumer expectations, and regulatory shifts. Embracing AI emerges as a key solution to optimize operations, enhance grid reliability, and meet evolving customer demands.Through compelling case studies and industry-specific use cases, you will discover how AI drives innovation, improves operational efficiency, and contributes to a greener and more sustainable world. As the demand for cleaner and more sustainable energy practices grows, this book demonstrates how AI can support utilities in meeting these demands, making them more resilient, agile, and customer-centric.Whether you're a seasoned industry expert or a curious student, this book equips you with the knowledge and insights to embrace sustainability, navigate the complex energy landscape, leverage AI to shape a positive future, and join the movement towards a greener world, empowered by AI's potential in the utilities industry.What You Will LearnUnderstand the challenges and opportunities for utilities in the context of climate change, energy poverty, and the evolving business landscapeDiscover how rapid transformation is needed in the utilities sector to overcome challenges and leverage opportunities for a sustainable futureGain insight into the role of technology, particularly artificial intelligence (AI), as a critical tool for utilities in their transformation journeyBe aware of how AI can be applied in building the future utility industry, including its potential impact on energy efficiency, intelligent energy ecosystems, community engagement, and new business modelsGain knowledge of the adoption of AI and machine learning technologies in the utility industry, including the current state, barriers, significant influencing factors, and an AI adoption maturity model for utilitiesRecognize the sustainability imperative for utilities and how AI can help in achieving sustainable energy practicesBecome familiar with the transformation of power generation, microgrids, intelligent transmission and distribution systems, utilities retail, mobility through electric vehicles, and the integration of distributed energy resources (DER) using AIGain insight into the potential of AI in addressing challenges and driving innovation in the energy ecosystem, such as optimizing power generation assets, enhancing grid intelligence, improving customer service, and enabling clean energy awareness in the metaverse

  • Spar 10%
    - A Friendly Introduction to the C Programming Language
    av Slobodan Dmitrovic
    700,-

    Learn the C programming language easily and in a straightforward way. This book teaches the basics of C, the C Standard Library, and modern C standards. No previous programming experience is required.C is a language that is as popular today as it was decades ago. C covers a wide variety of domains. It can be used to program a microcontroller, or to develop an entire operating system. This book is an effort to introduce the reader to the C programming language in a concise and easy to follow manner.The author takes you through the C programming language, the Standard Library, and the C standards basics. Each chapter is the right balance of theory and code examples. After reading and using this book, you'll have the essentials to start programming in modern C.What You Will LearnThe C programming language fundamentalsThe C Standard Library fundamentalsNew C Standards featuresThe basics of types, operators, statements, arrays, functions, and structsThe basics of pointers, memory allocation, and memory manipulationTake advantage of best practices in C Who This Book Is For Beginner or novice programmers who wish to learn the C programming language. No prior programming experience is required.

  • av Padraig Houlahan
    527

    Create interactive and data-driven dashboards using Python. This hands-on guide is a practical resource for those (with modest programming skills) in scientific and engineering fields looking to leverage Python's power for data visualization and analysis in a user-friendly dashboard format.Yoüll begin by gaining a fundamental understanding of Python programming, including data types, lists, dictionaries, and data structures. The book then delves into the world of reactive programming with Plotly and Dash, offering a hands-on approach to building interactive web-based dashboards. Next, yoüll see how to work with online data, how to scrape and clean datasets, and keep files up-to-date. The book also guides you through planning a dashboard prototype, outlining project tasks, trends, forecasts, spectra, and other design considerations. It concludes with a discussion of how the dashboard can be used for data visualization of real data, explaining the usefulness of tools such as spectra.By providing detailed examples for download and customization, Prototyping Python Dashboards for Scientists and Engineers will equip you with the skills needed to jumpstart your own development efforts.What Yoüll LearnDesign a dashboard with PythonConvert and filter Excel formatted files to produce CSV filesCreate browser-served graphics with PLOTLYGenerate polynomial trend lines for forecastingBuild a Unix service to share your dashboardWho This Book Is ForScientists, engineers, students, programmers, and data enthusiasts who aspire to harness Python's potential for data visualization and analysis through the creation of interactive dashboards. Many will be pragmatic programmers with modest skills and limited resources who mainly want to see a working solution they could emulate.

  • av Maryna Mishchenko
    585

    Build and maintain effective, collaborative, and motivated software development teams. This book addresses the challenges in doing so, like communication gaps, trust issues, and motivation problems, and provides strategies to overcome them. You'll be introduced to the Radical Therapy Dev philosophy, a holistic approach designed to optimize software development teams for better performance and overall well-being. This book highlights common pain points in software development and offers solutions to resolving much of the issues in teams. It offers strategies for implementation, focusing on adaptability and accountability, while also promoting community-supported standards. And, the book reveals why an emphasis on fostering a growth mindset, mentorship programs, and junior-intern initiatives promotes continuous learning and collaboration.With the rise of remote work, you'll see why hiring globally while thinking locally is gaining popularity. You'll also gain insights into removing barriers to remote work, along with tools and policies for remote collaboration. Additionally, the book explores the concept of cloud-native software development and its benefits. Radical Therapy for Software Development Teams critiques the traditional "agile" methodology, identifying its shortcomings while extracting valuable lessons that can still be applied effectively. What You Will LearnAddress communication gaps, foster trust, and nurture a growth mindset among team membersAvoid common feedback mistakes, recognize accomplishments, and implement a reward systemImprove software development practices and team dynamics Take a scientific approach to project management rather than traditional requirements gatheringBreak Down Communication BarriersWho This Book is ForSoftware development professionals

  • av Tonnetta Walcott
    643

    Create video game elements using the Godot game engine, gaining practical experience in programming and video game development. The Godot game engine uses a simplified programming language called GDScript, which closely resembles Python. By learning GDScript, you can focus more on learning the basics of programming. Yoüll explore concepts such as variables and data structures variables used to store information about video game objects that can be manipulated using a keyboard or a mouse. Yoüll also learn about user interface design, branching statements, and looping statements, enabling you to actively engage in programming and create your own interactive games. By the end of the book, yoüll have a solid understanding of how video game elements work and how the basic principles of programming work as well. By programming simple video game elements in the Godot game engine, yoüll learn both programming and the principles of 2D video game design.What You Will LearnUnderstand the basics of programming by creating simple video game elements in the Godot game engine.Explore variables and data structures to actively store and modify information about video game objects.Gain a deeper understanding of user interface design.Master simplified programming languages like GDScript.Who This Book Is For Aspiring programmers and game enthusiasts seeking an engaging introduction to programming through video game creation.

  • av Kadhar
    643

    Today¿s industries are faced with a growing demand for vision systems due to their non-invasive characteristics in inspecting product quality. These systems identify surface defects and faults, and verify components¿ orientation and their measurements, etc. This book explores the vision techniques needed to design and develop your own industrial vision system with the help of Raspberry Pi.Yoüll start by reviewing basic concepts and applications of machine vision systems, followed by the preliminaries of Python, OpenCV, required libraries, and installing OpenCV for Python on Raspberry Pi. These are used when implementing image processing for the system applications. Yoüll then look at interfacing techniques and some of the challenges industrial vision systems encounter, such as lighting and camera angles. Algorithms and image processing techniques are also discussed, along with machine learning and deep learning techniques. Later chapters explain the use of GUI apps and real-time applications of Industrial vision systems. Each chapter concludes with examples and demo implementations to facilitate your knowledge of the concepts. By the end of the book, yoüll be able to build and deploy computer vision applications with Python, OpenCV, and Raspberry Pi.What You'll LearnBuild and deploy industrial vision system using Raspberry Pi and Python programmingExplore computer vision techniques using Raspberry Pi and OpenCVImplement popular vision techniques for industrial applications in real timeReview modern image processing techniques such as image segmentation, thresholding, and contoursWho This Book Is ForRaspberry Pi and Python enthusiasts interested in computer vision applications; educators, industrialists, and industrial solution providers who want to design vision-based testing products with the help of Raspberry Pi

  • av Matthew Edgar
    527

    Faster websites offer a better user experience and typically have higher conversion rates. It can be challenging to know where to invest to meaningfully improve a website's speed. Investing correctly to improve speed starts with understanding how to correctly measure speed and knowing how to use those measurements to identify the biggest opportunities. Speed Metrics Guidehelps marketers, SEOs, business leaders, designers, and everybody else involved in website performance select the right metrics to use to optimize their website's speed. Each chapter examines a specific metric, discusses what it measures, why the metric matters and what tactics will help improve that metric. What You'll LearnThe best metrics and tools to help you measure website speed, including Google's Core Web VitalsHow and when to best use each metricWhere each metric fits within the website loading processHow to use each metric to find different ways of improving website speedWho This book Is ForNon-technical audience, including marketers, SEOs, designers, and UX professionals.

  • - The First Journey
    av Brendan Choi
    1 092,-

  • av Daniel Ilett
    711,-

    Understand what shaders are and what they're used for: Shaders are often seen as mystical and difficult to develop, even by skilled programmers, artists, and developers from other game design disciplines. This book dispels that idea by building up your shader knowledge in stages, starting with fundamental shader mathematics and how shader development mindset differs from other types of art and programming, and slowly delves into topics such as vertex and fragment shaders, lighting, depth-based effects, texture mapping, and Shader Graph.This book presents each of these topics with a comprehensive breakdown, the required theory, and some practical applications for the techniques learned during each chapter. The HLSL (High Level Shading Language) code and Shader Graphs will be provided for each relevant section, as well as plenty of screenshots.By the end of this book, you will have a good understanding of the shader development pipeline and you will be fully equipped to start making your own aesthetic and performant shader effects for your own games!You Will Learn To. Use shaders across Unity's rendering pipelines. Write shaders and modify their behavior with C# scripting. Use Shader Graph for codeless development. Understand the important math behind shaders, particularly space transformations. Profile the performance of shaders to identify optimization targets

  • av Raphael Neves
    548,-

    In today's business landscape, software engineering teams must deliver innovation faster than ever. However, outdated management approaches centered on tools and metrics rather than people strangle velocity and creativity. Legacy leaders cling to rigid structures mismatched with market dynamics, draining effort and morale from burnt-out teams.The Engineering Leadership Playbook provides a modern framework to unlock your team's potential through empathy, clarity, and empowerment. Unlike traditional leadership books fixated on delivery metrics, Raphael Neves offers a refreshing people-oriented leadership model tailored to nuances of engineering culture.With 15+ years leading high-growth tech teams, Raphael demystifies how to balance autonomy with alignment, reconstruct feedback models on psychological safety, and sustain excellence amidst uncertainty. You'll learn his proven conflict resolution blueprint for defusing clashes through mutual understanding while tangibly tracking progress. Additionally, his continuous feedback system grounded in evidence spotlights gaps early while accelerating strengths.This playbook moves systematically from foundational concepts like emotional intelligence and leading by example into team development frameworks around high-impact coaching, mentorship, and performance reviews. The method is brought full circle through innovation catalysts that maintain creative momentum at scale.Step-by-step, Raphael unpacks human-centered leadership aligned with accelerating market realities. Apply his engineering management playbook, and your teams will thrive fuelled by vision, trust, and care. What You'll Learn A modern, human-centered framework to empower engineering teams through clarity, trust, and purpose. Techniques to match coaching and mentoring styles to individual motivations and development needs. A customizable 9-box talent assessment model grounded in objective competency evidence. Conflict resolution blueprint focused on mutual understanding and win-win integrative solutions. Methodologies to sustain growth mindsets, celebrate experimentation, and extract learnings from setbacks. Systems to provide caring yet candid career feedback tailored to team members' personalities. Frameworks to secure executive buy-in, influence without authority, and craft compelling narratives. Engineering hiring practices focused on competencies over credentials to diversify innovation perspectives. Approaches for compassionate yet accountable performance management grounded in structure. Processes to create mentorship programs for individual learning styles and career ambitions.Who This Book Is ForAspiring engineering leaders seeking management fundamentals, new managers transitioning into people leadership, and experienced executives refreshing approaches to performance and innovation. Its practical takeaways scale across software teams from lean startups to large enterprises.

  • av Stephen Smith
    643

    Gain the skills required to dive into the fundamentals of the RISC-V instruction set architecture. This book explains the basics of code optimization, as well as how to interoperate with C and Python code, thus providing the starting points for your own projects as you develop a working knowledge of assembly language for various RISC-V processors.The RISC-V processor is the new open-source CPU that is quickly gaining popularity and this book serves as an introduction to assembly language programming for the processor in either 32- or 64-bit mode. Yoüll see how to write assembly language programs for several single board computers, including the Starfive Visionfive 2 and the Espressif ESP32-C3 32-bit RISC-V microcontroller. The book also covers running RISC-V Linux with the QEMU emulator on and Intel/AMD based PC or laptop and all the tools required to do so.Moving on, yoüll examine the basics of the RISC-V hardware architecture, all the groups of RISC-V assembly language instructions and understand how data is stored in the computer¿s memory. In addition, yoüll learn how to interface to hardware such as GPIO ports. With RISC-V Assembly Language Programming yoüll develop enough background to use the official RISC-V reference documentation for your own projects.What You'll LearnProgram basic RISC-V Assembly LanguageSee how data is represented and stored in a RISC-V based computerMake operating system calls from Assembly Language and include other software libraries in projectsInterface to various hardware devicesComprehend code containing Assembly LanguageReverse engineer and hack codeUse the official RISC-V reference documentationWho This Book Is ForThose who have already learned to program in a higher-level language like Python, Java, C# or even C and now wish to learn Assembly Language programming.

  • Spar 10%
    av Ronald McCollam
    700,-

  • av David Johnston
    871

    This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140, SP800 documents, and related international specs such as AIS31, GM/T-0005-2021, etc.). It also covers how to perform compliance testing. By the end of the book, you will know how to interact with accredited certification labs and with related industry forums (CMUF, ICMC). In short, the book covers everything you need to know to make sound designs.There is a process for FIPS-140 (Federal Information Processing Standard) certification for cryptographic products sold to the US government. And there are parallel certifications in other countries, resulting in a non-trivial and complex process. A large market of companies has grown to help companies navigate the FIPS-140 certification process. And there are accredited certification labs you must contract toget the certification.Although this was once a fairly niche topic, it is no longer so. Other industries¿banking, military, healthcare, air travel, and more¿have adopted FIPS certification for cryptographic products. The demand for these services has grown exponentially. Still, the available skills pool has not grown. Many people are working on products with zero usable information on what to do to meet these standards and achieve certification or even understand if such certification applies to their products.What You Will LearnWhat is FIPS-140? What is the SP800 standard?What is certification? What does it look like? What is it suitable for?What is NIST? What does it do?What do accredited certification labs do?What do certification consultants do?Where and when is certification required?What do FIPS-140 modules look like?What are the sub-components of FIPS-140 modules (RNGs, PUFs, crypto functions)? How does certification work for them?What are the physical primitives (RNGs, PUFs, key stores) and how do you handle the additional complexity of certifying them under FIPS?What are the compliance algorithms (AES, SP800-90 algos, SHA, ECDSA, key agreement, etc.)?How do you design for certification (BIST, startup tests, secure boundaries, test access, zeroization, etc.)?How do you get CAVP certificates (cert houses, ACVTs)?How do you get CMVP certifications (cert houses, required documents, design information, security policy, etc.)?Who This Book Is ForHardware and software engineers or managers of engineering programs that include any form of cryptographic functionality, including silicon vendors, library vendors, OS vendors, and system integrators

  • - The Ultimate Guide to Building Efficient Queries
    av Anna Bailliekova, Boris Novikov & Henrietta Dombrovskaya
    585

    Intermediate-Advanced user level

  • av Ahmed F Sheikh
    725

    The CompTIA Linux+ Certification" book - the ultimate guide to mastering Linux system administration in preparation for the CompTIA Linux+ Certification. Whether you're a beginner or an experienced professional, this comprehensive resource is designed to equip you with the knowledge and skills needed to excel in the world of Linux.With its comprehensive coverage, this book delves into essential Linux concepts, commands, and techniques, providing you with a complete reference guide. You'll review how to customize and navigate the shell environment, write powerful scripts, configure user interfaces, perform administrative tasks, configure system services, establish network connections, and secure your system. No stone is left unturned in this in-depth exploration of Linux administration.What sets this book apart is its practical approach. Real-world scenarios and practical applications take center stage, ensuring that you not only understand the theory but also know how to apply it effectively.Troubleshooting common issues becomes second nature as you gain the skills to diagnose and resolve system problems with ease. You'll discover industry best practices and standards, enabling you to optimize systems, implement robust security measures, and adhere to compliance regulations.You Will Learn:¿    Linux operating systems, including installation, configuration, and management of Linux-based servers and systems. ¿    Essential administrative tasks, such as user and group management, file system administration, network configuration, and security implementation.¿    Insights into troubleshooting common Linux issues, enabling readers to diagnose and resolve system problems effectively.¿    Practical techniques for identifying and addressing system errors, performance bottlenecks, network connectivity issues, and other challenges that may arise in a Linux environment.¿    Industry best practices and standards in Linux administration.¿    System optimization, backup and recovery strategies, security practices, and adherence to compliance regulations.

  • av Manuel Leithner
    469

    Create mods using the popular game Farming Simulator with Lua, a versatile scripting language that can run on various platforms and applications. This open access book is best suited for programmers who want to learn how to use Lua to write scripts that can enhance and extend the gameplay experience.You'll start by reviewing the basics of programming in Lua and then move on to advanced topics, such as object-oriented programming, vehicle and placeable specializations, network synchronization, and creating custom user interfaces. With step-by-step instructions and detailed explanations, you'll see how to create scripts that modify game mechanics and add new features to the game.The practical examples and projects are ideal for providing hands-on experience with Lua scripting. Whether you are a creator looking to take your skills to the next level or a game developer interested in learning a new programming language, Scripting Farming Simulator with Luais the ultimate guide to mastering Lua scripting.What You'll LearnUnderstand the fundamentals of programming in LUAImplement a basic ¿Hello-World¿ modAdd a new graphical user interface to your modUse hook scripts to extend base game featuresPublish your mod on the official Farming Simulator ModHub Who This Book Is ForCreators who want to add new features to Farming Simulator; game developers who want to learn a new programming language for modding purposes, and anyone who wants to expand their knowledge of programming and scripting.

  • Spar 10%
    av Marten Deinum
    700,-

    Solve all your Spring Boot 3 micro-framework problems using complete, real-world Java-based code snippets and examples inspired by various problems and corresponding solutions to those problems . When you start a new project, yoüll be able to copy the code and configuration files from this book, and then modify them for your own specific software programming needs. This can save you a great deal of work over creating a project from scratch.Spring Boot 3 Recipes has been revised to include new features like the new Spring Native, newly repackaged Spring Data, Spring Kafka for messaging and more on Kubernetes/deployment than in the previous edition. It includes Java 17 long term support code and Jakarta EE 9+ code as a base for Spring Boot 3. This handy code reference takes advantage of these things as it introduces you to VMWare's Spring Boot 3 and Spring Native. Quickly, it dives into code snippets on how to apply and integrate SpringBoot 3 with the Spring MVC web framework, web sockets and WebFlux for the rapid development of web applications, web services, microservices and more. You'll also get solutions to common problems with data persistence, integrating Spring Boot with batch processing, algorithmic programming via Spring Batch, and much more. These enable you to enhance or round out your web applications or microservices with a data and/or transaction-tier to boot. Other recipes cover topics such as using and integrating Boot with Spring's enterprise services, Spring Integration, testing, monitoring and more.At the end of the book, you'll have the code snippets and packages to deploy your Spring Boot-created microservices or applications on a cloud platform like Amazon using the popular Kubernetes container. Finally, this code reference is a must have for your Spring library. What You'll LearnGet reusable code recipes and snippets for the Spring Boot 3 micro-framework Discover how Spring Boot 3 integrates with other Spring APIs, tools, and frameworksAccess Spring MVC, web sockets and WebFlux for easier web developmentWork with microservices for web services development and integration with your Spring Boot applicationsAdd persistence and a data tier seamlessly to make your Spring Boot web application do moreIntegrate enterprise services via Spring Integration and Jakarta EE to create a more complex Java application using Spring BootWho This Book Is ForThis book is for experienced Java and Spring software programmers, developers.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.