Browse Results

Showing 83,276 through 83,300 of 83,310 results

Mindful Design: A Survival Guide for Responsible Product Designers (Design Thinking)

by Scott Riley

Learn to create seamless designs backed by a responsible understanding of the human mind. This new edition is fully updated and reworked to employ a realistic, challenging, and practical approach to interface design, presenting state of the art scientific studies in behavioral sciences, interface design and the psychology of design. All with modern, up-to-date examples and screenshots. The practical portion of this edition has been completely reworked, giving you the chance to follow along with a real, proven design process that has produced several successful products imbued with the principles of mindful, responsible design.You'll examine how human behavior can be used to integrate your product design into lifestyle, rather than interrupt it, and make decisions for the good of those that are using your product. You will also learn about the neurological aspects and limitations of human vision and perception; about our attachment to harmony and dissonance; and about our brain’s propensity towards pattern recognition and how we perceive the world around us. In the second half of the book, you’ll follow along with the key phases of a design project, implementing what you have learned in an end-to-end, practical setting. Design is a responsibility, but not enough designers understand the human mind or the process of thought. Mindful Design, Second Edition introduces the areas of brain science that matter to designers, and passionately explains how those areas affect each human’s day-to-day experiences with products and interfaces, providing a battle-tested toolkit to help you make responsible design decisions. What You'll Learn Review how attention and distraction work and the cost of attentional switchingUse Gestalt principles to communicate visual groupingEnsure your underlying models make sense to your audienceUse time, progression, and transition to create a compositionCarefully examine controlling behavior through reductionist and behaviorist motivation concepts Apply the theoretical knowledge to practical, mindful interface design Who This Book Is For The primary audience for this book is professional designers who wish to learn more about the human mind and how to apply that to their work. The book is also useful for design-focused product owners and startup founders who wish to apply ethical thinking to a team, or when bootstrapping their products. The secondary audience is design students who are either studying a ‘traditional’ visual design course, or a UX/interaction design course who have a desire to learn how they might be able to apply mindful design to their early careers. Finally, a tertiary audience for this book would be tutors involved in teaching design, or peripheral, courses who may wish to incorporate its teachings into their lectures, workshops or seminars.

Introduction to Python Network Automation Volume I - Laying the Groundwork: The Essential Skills for Growth

by Brendan Choi

Welcome to Introduction to Python Network Automation Volume I: Laying the Groundwork. In this first part of our comprehensive guide, you'll embark on a transformative journey into the world of network automation. Whether you're new to the IT field or seeking to strengthen your existing skills, this book serves as your roadmap to mastering the foundational skills essential for success in network automation. You'll begin your exploration by delving into the fundamentals of Python network automation, laying a solid foundation for your learning journey. Equipped with essential Python skills, you'll leverage them for network administration tasks, particularly on the Windows platform. Reinforce your understanding through targeted exercises designed to enhance your proficiency and navigate the complexities of VMware Workstation as you master virtualization techniques crucial for setting up your network automation environment. You’ll then venture into Linux fundamentals, learning to set up and configure server environments tailored for network automation tasks while gaining a deep understanding of file systems and TCP/IP services in Linux. Explore the power of regular expressions as you streamline network automation tasks with precision and efficiency. Discover GNS3, a vital tool for network emulation, enabling you to test and validate network designs and put your skills to the test by tackling real-world network challenges in a comprehensive lab scenario. This book provides the essential knowledge and practical experience needed to thrive in the rapidly evolving field of network automation. Whether you're new to network automation or seeking to strengthen your existing skills, this book will unlock the vast potential of network automation and empower you to excel in this exciting field. What You'll Learn Learn Python fundamentals and effective network automation strategies. Use Python for various network administration tasks, improving efficiency. Understand Linux basics and IP service installation techniques. Apply regular expressions in Python for data processing. Create a network automation lab with VMware Workstation for hands-on practice. Who This Book Is For IT engineers and developers, network managers and students, who would like to learn network automation using Python.

Beginning C: From Beginner to Pro

by German Gonzalez-Morris Ivor Horton

Learn how to program using C, beginning from first principles and progressing through step-by-step examples. This seventh edition is fully updated to reflect new features of C23, and addresses deprecated functions and features that are no longer supported.You’ll discover that C is a foundation language that every programmer ought to know. Beginning C is written by renowned author Ivor Horton and expert programmer German Gonzalez-Morris. This book increases your programming expertise by guiding you through the development of fully working C applications that use what you've learned in a practical context. Examples of how to use deprecated functions are also provided, along with new examples for replacing them when a simple solution is possible.By the end of the book you'll be confident in your skills with all facets of the widely-used and powerful C language and be able to strike out on your own by trying the exercises included at the end of each chapter. All you need are this book and any of the widely available C compilers, and you'll soon be writing real C programs. What You Will Learn Discover the C programming languageProgram using C starting with first steps, then making decisionsUse loops, arrays, strings, text, pointers, functions, I/O, and moreCode applications with strings and textStructure your programs efficientlyWork with data, files, facilities, and more Who This Book Is For Those new to C programming who may or may not have some prior programming experience.

Practical Web Accessibility: A Comprehensive Guide to Digital Inclusion

by Ashley Firth

Everyone deserves to use the Internet. An estimated 1.3 billion people experience significant disability. That’s 16percent of the world’s population, or one in six of us. At the same time, over 96 percent of the one million most popular websites have an accessibility issue. Add to this the massive rise in legal cases around sites not being accessible, including Beyoncé, Disney, and Netflix, and you have an important topic that more and more people are starting to engage with.In this updated and revamped second edition of the Amazon technology chart-topping Practical Web Accessibility, you’ll be guided through a broad range of disabilities and access needs. You’ll understand the ways these users typically engage with the web, the barriers they often face, and practical advice on how your websites and content can be compliant, but more than that, inclusive and enjoyable to use. There’s also a new chapter on “Outsourcing Accessibility,” exploring third party “bolt-on” tools, “build your own website” platforms like Wix, and popular design systems. You‘ll explore whether they’re helpful or detrimental in the fight to make the web more accessible.Throughout this book you’ll learn to test for, spot, and fix web accessibility issues for a wide range of physical and mental impairments. Featuring content from the latest compliance frameworks, including the newly released WCAG 2.2 and exploratory concepts in WCAG 3, you’ll see how to go beyond the basic requirements in order to help your users. You’ll also learn that an accessible approach won’t just help people with disabilities, it will improve your website for everyone.This book comes complete with practical examples you can use in your own sites, along with a brand-new approach to auditing and improving a website’s accessibility, and a team’s approach to it, based on tools created by the author and refined over years as a consultant — The FAIR framework and ACCESS checklist. With these tools, you can set up processes for yourself and your team that will drastically improve the accessibility of your sites and, importantly, keep them that way in the future. Suitable for those of any profession or experience level, Practical Web Accessibility gives you all the information you need to ensure that your sites are truly accessible for the modern, inclusive web. If you would like to learn about web accessibility in a clear and actionable way, this book is for you.What You Will LearnA greater understanding of a vast range of disabilities that have online access needs, and the issues they typically face accessing content online.Ways to apply the practical steps required to cater for those needs.How to take your sites, and colleagues, on a journey from being inaccessible to accessible.The importance of accessibility in your designs, code, content, and more.The best ways to test andimprove your sites, so you can be compliant, and truly accessible. Who This Book Is For Anyone, regardless of what they do, who wants to learn how to make websites and their content more accessible for those with disabilities. In the world of web, the book has been used by front and backend developers, designers, product and project managers, team and business leaders.

Speed Metrics Guide: Choosing the Right Metrics to Use When Evaluating Websites

by Matthew Edgar

Faster websites offer a better user experience and typically have higher conversion rates. It can be challenging to know where to invest to meaningfully improve a website's speed. Investing correctly to improve speed starts with understanding how to correctly measure speed and knowing how to use those measurements to identify the biggest opportunities. Speed Metrics Guide helps marketers, SEOs, business leaders, designers, and everybody else involved in website performance select the right metrics to use to optimize their website's speed. Each chapter examines a specific metric, discusses what it measures, why the metric matters and what tactics will help improve that metric. What You'll LearnThe best metrics and tools to help you measure website speed, including Google's Core Web VitalsHow and when to best use each metricWhere each metric fits within the website loading processHow to use each metric to find different ways of improving website speed Who This book Is ForNon-technical audience, including marketers, SEOs, designers, and UX professionals.

Scalable AI and Design Patterns: Design, Develop, and Deploy Scalable AI Solutions

by Abhishek Mishra

Understand and apply the design patterns outlined in this book to design, develop, and deploy scalable AI solutions that meet your organization's needs and drive innovation in the era of intelligent automation.This book begins with an overview of scalable AI systems and the importance of design patterns in creating robust intelligent solutions. It covers fundamental concepts and techniques for achieving scalability in AI systems, including data engineering practices and strategies. The book also addresses scalable algorithms, models, infrastructure, and architecture considerations. Additionally, it discusses deployment, productionization, real-time and streaming data, edge computing, governance, and ethics in scalable AI. Real-world case studies and best practices are presented, along with insights into future trends and emerging technologies.The book focuses on scalable AI and design patterns, providing an understanding of the challenges involved in developing AI systems that can handle large amounts of data, complex algorithms, and real-time processing. By exploring scalability, you will be empowered to design and implement AI solutions that can adapt to changing data requirements.What You Will LearnDevelop scalable AI systems that can handle large volumes of data, complex algorithms, and real-time processingKnow the significance of design patterns in creating robust intelligent solutionsUnderstand scalable algorithms and models to handle extensive data and computing requirements and build scalable AI systemsBe aware of the ethical implications of scalable AI systemsWho This Book Is ForAI practitioners, data scientists, and software engineers with intermediate-level AI knowledge and experience

The Business of Hacking: Creating, Developing, and Maintaining an Effective Penetration Testing Team

by Michael Butler Jacob G. Oakley

There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that.The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you’ll learn How to handle and ongoing develop client relationships in a high end industryTeam management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing.How to identify, understand, and over-deliver on client expectations.How to staff and develop talent within the team.Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities.The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.

An Introduction to PHP: Learn PHP 8 to Create Dynamic Websites

by Mark Simon

Use PHP to enhance your web pages. This book shows you how PHP programming works, and how to write and organize PHP code. The book starts with steps to download and install a setup for a sample website that will form the basis for upcoming chapters. You start by writing PHP code and learn how to mix it with HTML and manage the code. From there, you will learn about dynamic content, along with a deep dive into form processing and sending email. Saving uploaded data and uploading files is discussed next. You will learn how to configure your PHP project and develop a library. You will then learn how to create an image catalog and manage data on your web page. By the end of the book, you will understand how to work with cookies, sessions, and logging in, followed by an example of creating a simple blog that reiterates the concepts developed in the previous chapters.After reading this book, you will be able to configure, create, and manage your dynamic website.What Will You LearnKnow the basics of programming with the PHP languageUse PHP to generate dynamic web pagesWork with SQL databasesWork with forms to upload text data and binary filesUse tips and tricks to write clean and maintainable codeWho This Book Is ForWeb developers and students learning to develop and maintain PHP code on their website

Programming for Game Design: A Hands-On Guide with Godot

by Wallace Wang Tonnetta Walcott

Create video game elements using the Godot game engine, gaining practical experience in programming and video game development. The Godot game engine uses a simplified programming language called GDScript, which closely resembles Python. By learning GDScript, you can focus more on learning the basics of programming. You’ll explore concepts such as variables and data structures variables used to store information about video game objects that can be manipulated using a keyboard or a mouse. You’ll also learn about user interface design, branching statements, and looping statements, enabling you to actively engage in programming and create your own interactive games. By the end of the book, you’ll have a solid understanding of how video game elements work and how the basic principles of programming work as well. By programming simple video game elements in the Godot game engine, you’ll learn both programming and the principles of 2D video game design.What You Will LearnUnderstand the basics of programming by creating simple video game elements in the Godot game engine.Explore variables and data structures to actively store and modify information about video game objects.Gain a deeper understanding of user interface design.Master simplified programming languages like GDScript.Who This Book Is For Aspiring programmers and game enthusiasts seeking an engaging introduction to programming through video game creation.

Windows Forensics: Understand Analysis Techniques for Your Windows

by William Butler Chuck Easttom Jessica Phelan Ramya Sai Bhagavatula Sean Steuber Karely Rodriguez Victoria Indy Balkissoon Zehra Naseer

This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.What Will You LearnUnderstand Windows architectureRecover deleted files from Windows and the recycle binUse volatility and PassMark volatility workbenchUtilize Windows PowerShell scripting for forensic applicationsWho This Book Is ForWindows administrators, forensics practitioners, and those wanting to enter the field of digital forensics

Beginning STM32: Developing with FreeRTOS, libopencm3, and GCC (Maker Innovations Series)

by Warren Gay

See how using FreeRTOS and libopencm3 instead of the Arduino software environment will help you develop multi-tasking applications that go beyond Arduino norms. This updated version includes expanded coverage of software setup for Windows 10 and 11, additional TM32 hardware capabilities, including clear explanations of "totem pole outputs" versus "open drain outputs," and a new section on project showcasing an interrupt-driven approach for processing USART data.Each chapter contains clear explanations of the STM32 hardware capabilities to help get you started with the device, including GPIO and several other ST Microelectronics peripherals like USB and CAN bus controller. You’ll learn how to download and set up the libopencm3 + FreeRTOS development environment, using GCC. With everything set up, you’ll leverage FreeRTOS to create tasks, queues, and mutexes. You’ll also learn to work with the I2C bus to add GPIO using the PCF8574 chip. And how to create PWM output for RC control using hardware timers.You'll be introduced to new concepts that are necessary to master the STM32, such as how to extend code with GCC overlays using an external Winbond ​W25Q32 flash chip. Your knowledge is tested at the end of each chapter with exercises. Upon completing this book, you’ll be ready to work with any of the devices in the STM32 family. Beginning STM32, Second Edition provides the professional, student, or hobbyist a way to learn about ARM without costing an arm!What You'll Learn Initialize and use the libopencm3 drivers and handle interruptsUse DMA to drive a SPI based OLED displaying an analog meterRead PWM from an RC control using hardware timersUnderstand STM32 capabilities, including USB controller, RTC, DMA, CAN bus, and more Who This Book Is ForExperienced embedded engineers, students, hobbyists and makers wishing to explore the ARM architecture, going beyond Arduino limits.

VMware vSphere Essentials: A Practical Approach to vSphere Deployment and Management

by Luciano Patrão

This book fills a vacuum in the market for high-quality information on a VMware vSphere system and offers a thorough introduction to VMware virtualization. Written for novices and those seeking more information about vSphere, this book walks you through its key concepts and technology, such as vSphere infrastructure creation, maintenance, and performance for beginners and advanced users.You'll take a step-by-step approach to guarantee you grasp the fundamental concepts and practical procedures required to construct and manage virtual machines in a VMware vSphere system. You'll explore the key components of vSphere with detail and explanation for each feature, including the hypervisor, networking, storage, and high availability, unravelling their intricacies and highlighting best practices.This book provides full VMware knowledge to develop, set up, and maintain vSphere environments that meet modern computing needs. It also features advanced topics, such as resource optimization, performance monitoring, advanced settings, and automation, empowering you to take your virtualization skills to the next level. VMware vSphere Essentials uses a unique step-by-step instructions designed to provide a high-level understanding, accompanied by illustrative images. What You'll LearnEnhance network efficiency with advanced vSphere LACP setupConfigure and manage virtual machines in vSphereImplement vSphere networking and storage Explore advanced vSphere features, such as DRS, HA, and fault toleranceMaster seamless VM migration techniquesOptimize hardware utilization with direct path I/O passthroughWho This Book Is ForSystem administrators, advanced vSphere administrators, and IT professionals pursuing VMware certifications

Beginning Git and GitHub: Version Control, Project Management and Teamwork for the New Developer

by Mariot Tsitoara

Learn the fundamentals of version control through step-by-step tutorials that will teach you the ins-and-outs of Git. This updated version introduces Github workflows, and contains new chapters on how to make Git and GitHub truly yours, covers additional common problems and how to solve them, along with new features of Github pull requests. Divided into three parts – Version Control, Project Management and Teamwork – this book reveals what waits for you in the real world and how to resolve the problems you may run into. Once past the basics of Git, you'll see how to manage a software project, and finally how to utilize Git and GithHub to work effectively as a team. You'll examine how to plan, follow and execute a project with GitHub, and then apply those concepts to real-world situations. Workaround the pitfalls that most programmers fall into when driving a project with Git by using proven tactics to avoid them. You will also be taught the easiest and quickest ways to resolve merge conflicts. A lot of modern books on Git don’t go into depth about non-technical topics. Beginning Git and GitHub is your complete guide to how Git and GitHub work in a professional team environment and will help you cover all the bases right at the start of your career. What You'll Learn Review basic and advanced concepts of GitApply Project Management skills using GitHub Solve conflicts or, ideally, avoid them altogether Use advanced concepts for a more boosted workflow Who This book Is For New developers, developers that have never worked in a team environment before, developers with basic knowledge of Git or GitHub, or anyone who works with text documents.

Modern C for Absolute Beginners: A Friendly Introduction to the C Programming Language

by Slobodan Dmitrović

Learn the basics of C, the C standard library, and modern C standards. Complete with modern, up-to-date examples and screenshots, this new edition is fully updated and reworked with the latest C23 standards and features. C is a language that is as popular today as it was decades ago. It can be used to program a microcontroller or to develop an entire operating system. Author Slobodan Dmitrović takes you on a journey through the C programming language, the standard library, and the C standards basics. Each chapter is the right balance of theory and code examples. Written in a concise and easy-to-follow manner, this book will provide you all the essentials needed to start programming in modern C. What You Will LearnUnderstand C programming language and C standard library fundamentalsWork with new C standards featuresStudy the basics of types, operators, statements, arrays, functions, and structsReview the fundamentals of pointers, memory allocation, and memory manipulationTake advantage of best practices in CWho This Book Is For Beginner or novice programmers who wish to learn the C programming language. No prior programming experience is required.

Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition

by Morey J. Haber Darran Rolls

Today, it’s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it’s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities—whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization’s entire Identity Fabric. What You Will Learn Understand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectors Who This Book Is For Management and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments

Google Cloud Platform: Learn and Apply Security Design Concepts to Ace the Exam (Certification Study Companion Series)

by Dario Cabianca

Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios. Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads’ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate. By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform. Bonus Material: IAM deny policies What You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is For Software engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.

Design and Deploy Microsoft Defender for IoT: Leveraging Cloud-based Analytics and Machine Learning Capabilities

by Puthiyavan Udayakumar Dr. R. Anandan

Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers

Mastering MySQL Administration: High Availability, Security, Performance, and Efficiency

by Y V Ravi Kumar Arun Kumar Samayam Naresh Kumar Miryala

This book is your one-stop resource on MySQL database installation and server management for administrators. It covers installation, upgrades, monitoring, high availability, disaster recovery, security, and performance and troubleshooting. You will become fluent in MySQL 8.2, the latest version of the highly scalable and robust relational database system.With a hands-on approach, the book offers step-by-step guidance on installing, upgrading, and establishing robust high availability and disaster recovery capabilities for MySQL databases. It also covers high availability with InnoDB and NDB clusters, MySQL routers and enterprise MySQL tools, along with robust security design and performance techniques. Throughout, the authors punctuate concepts with examples taken from their experience with large-scale implementations at companies such as Meta and American Airlines, anchoring this practical guide to MySQL 8.2 administration in the real world.What YouWill LearnUnderstand MySQL architecture and best practices for administration of MySQL serverConfigure high availability, replication, disaster recovery with InnoDB and NDB enginesBack up and restore with MySQL utilities and tools, and configure the database for zero data lossTroubleshoot with steps for real-world critical errors and detailed solutionsWho This Book Is ForTechnical professionals, database administrators, developers, and engineers seeking to optimize MySQL databases for scale, security, and performance

Introduction to One Digital Identity: Strategies, Innovations, and Future Trends

by Shivakumar R. Goniwada

Explore the dynamics of digital identity, a crucial component in today’s modern technology-driven era. This engaging book offers a deep understanding of how digital identity is evolving rapidly, why it’s so significant, and offers organizations, regulatory bodies, and academicians the strategies needed to adopt secure decentralized digital identity features effectively. It’s a must-read for those aiming to grasp the intricacies of digital identity and leverage it for future innovation and security.The book begins by redefining digital identity, examining its evolution and the profound impact it has on both individuals and organizations. It then delves into the development of digital identity strategies, laying the foundation for future digital transformations. Covering a wide range of topics, the book discusses the innovation, challenges, and technological exploration in digital identity. A special focus is given to biometric technologies and the implementation of decentralized digital identities, addressing critical areas such as identity governance, blockchain, AI and advanced biometrics. The book also investigates the implications of digital identity across various industries, including cross border travel, healthcare, social media, finance, metaverse, IoT etc. finally the book provides not only emerging trends but offers a glimpse into the future digital identity. Whether you’re a tech professional, business leader, student or simply keen on understanding the impact of digital advancements, this book promises to offer insightful perspectives and practical solutions for navigating the complex world of digital identity. It underscores the importance of identity in spearheading digital innovation, making it a key resource for anyone looking to stay ahead in the digital landscape. As you reach its conclusion, you’ll be equipped with a wealth of knowledge and insights that are crucial in today’s digital era.What You'll LearnDigital identity strategies and their role in shaping the future of digital identityDifferent facets of digital identitySpecifics of biometric technologies and decentralized digital identity Industry specific digital identity and its implementationCrucial aspects of privacy, ethics, and secure in the context of digital identityWho This Book Is ForSoftware professionals, security practitioners, architects, senior managers, executives, and students who are interested in digital identity.

PHP by Example: A Practical Guide to Creating Web Applications with PHP

by Alex Vasilev

Learn to create web applications in PHP with minimal previous experience. This book is a practical guide to using PHP for web development. Loaded with examples and step-by-step instructions, each chapter is dedicated to a specific area or function. You’ll first review the main principles of PHP and what is needed to program and develop in it. You’ll then study variables, data types, control statements, arrays, and functions, all critical for creating efficient PHP programs. The book then moves on to object-oriented programming (OOP) and how to implement those principles in PHP, as well as inheritance, interfaces, testing, error handling, and exceptions. By the end of PHP by Example, you will have the knowledge and confidence to implement PHP for your web projects both large and small. What You’ll Learn Understand PHP from the ground up Create scripts and implement them in real-world projects Work with a broad toolkit of ready-made exercises and solutions Investigate the main constructions of the PHP

Digital Transformation of SAP Supply Chain Processes: Build Mobile Apps Using SAP BTP and SAP Mobile Services

by Pranay Gupta

Take a high-level tour of SAP oDATA integrations with frontend technologies like Angular using the SAP Mobile Services Platform. This book will give you a different perspective on executing SAP transactions on iOS using Angular instead of SAP-provided Fiori-based applications. You’ll start by learning about SAP supply chain processes such as Goods Receipt, Transfer Posting, Goods Issue, and Inventory Search. You’ll then move on to understanding the thought process involved in integrating SAP's backend (SAP ECC) with Angular iOS app using SAP Mobile Services running on SAP BTP. All this will serve as a guide tailored to SAP functional and technical consultants actively engaged in client-facing roles. You’ll follow a roadmap for modernizing and streamlining supply chain operations by leveraging Angular iOS apps. Digital Transformation of SAP Supply Chain Processes provides the essential tools for businesses looking to stay competitive in today's technology-driven landscape. What You Will Learn Study the fundamental procedures to set up the Authorization Endpoint, Token Endpoint, and base URL within SAP Mobile Services.Manage attachments in mobile applications and store them in an external content repository. Gain proficiency in testing OData services using the POSTMAN API client with OAuth protocol.Acquire knowledge about the JSON messages, CORS protocol, and X-CSRF token exchange.Link Zebra Printers through the Zebra Native Printing app on iOS App to print SAP forms on mobile printers. Who This Book Is For SAP Consultants with an interest in the Digital Transformation of SAP Supply Chain Processes to iOS-based SAP transactions.

CodeMosaic: Learn AI-Driven Development and Modern Best Practices for Enterprise

by Arpit Dwivedi

This book is a comprehensive guide for those navigating through the complexities of enterprise software development. For fresh graduates, transitioning from college projects to real-world applications can be overwhelming. This book acts as a roadmap, helping you bridge the gap to become industry-ready. It's like an intensive internship in book form, equipping readers with the skills and knowledge needed for modern tech roles. But it's not just for newcomers. Even experienced developers can get caught up in old routines and miss out on new tools and techniques. With the rise of AI and automation tools like ChatGPT and Copilot, the development landscape is rapidly changing. The core of the book revolves around practical application. Using .NET, Angular, and other Microsoft technologies as foundational pillars, you’ll embark on a hands-on journey. From understanding the basics to designing and deploying a full-stack web application, CodeMosaic offers a holistic learning experience. By the end, you won't just be a developer; you'll be well-equipped to tackle the challenges of today's digital world. What You'll Learn Review Agile methodologies and Azure DevOps for streamlined project management. Gain a thorough understanding of smart development from design to deployment. Master software development with .NET and Angular, along with effective version control using Git. Enhance your coding and design skills using GitHub Copilot, GPT technologies, and AI-driven prompt engineering. Who This Book Is For Experienced developers looking for new tools and techniques, and recent graduates, transitioning from college projects to real-world applications.

Understanding Generative AI Business Applications: A Guide to Technical Principles and Real-World Applications

by Irena Cronin

This guide covers the fundamental technical principles and various business applications of Generative AI for planning, developing, and evaluating AI-driven products. It equips you with the knowledge you need to harness the potential of Generative AI for enhancing business creativity and productivity.The book is organized into three sections: text-based, senses-based, and rationale-based. Each section provides an in-depth exploration of the specific methods and applications of Generative AI. In the text-based section, you will find detailed discussions on designing algorithms to automate and enhance written communication, including insights into the technical aspects of transformer-based Natural Language Processing (NLP) and chatbot architecture, such as GPT-4, Claude 2, Google Bard, and others. The senses-based section offers a glimpse into the algorithms and data structures that underpin visual, auditory, and multisensory experiences, including NeRF, 3D Gaussian Splatting,Stable Diffusion, AR and VR technologies, and more. The rationale-based section illuminates the decision-making capabilities of AI, with a focus on machine learning and data analytics techniques that empower applications such as simulation models, agents, and autonomous systems.In summary, this book serves as a guide for those seeking to navigate the dynamic landscape of Generative AI. Whether you’re a seasoned AI professional or a business leader looking to harness the power of creative automation, these pages offer a roadmap to leverage Generative AI for your organization’s success.What You Will LearnWhat are the technical elements that constitute the makeup of Generative AI products?What are the practical applications of Generative AI?How can algorithms be designed to automate and improve written communication?What are the latest Generative AI architectures and algorithms?Who This Book Is ForData scientists, data analysts, decision makers, and business executives interested in gaining an understanding of Generative AI products

Software Development, Design, and Coding: With Patterns, Debugging, Unit Testing, and Refactoring

by John F. Dooley Vera A. Kazakova

Learn the principles of good software design and then turn those principles into great code. This book introduces you to software engineering — from the application of engineering principles to the development of software. You'll see how to run a software development project, examine the different phases of a project, and learn how to design and implement programs that solve specific problems. This book is also about code construction — how to write great programs and make them work. This new third edition is revamped to reflect significant changes in the software development landscape with updated design and coding examples and figures. Extreme programming takes a backseat, making way for expanded coverage of the most crucial agile methodologies today: Scrum, Lean Software Development, Kanban, and Dark Scrum. Agile principles are revised to explore further functionalities of requirement gathering. The authors venture beyond imperative and object-oriented languages, exploring the realm of scripting languages in an expanded chapter on Code Construction. The Project Management Essentials chapter has been revamped and expanded to incorporate "SoftAware Development” to discuss the crucial interpersonal nature of joint software creation. Whether you're new to programming or have written hundreds of applications, in this book you'll re-examine what you already do, and you'll investigate ways to improve. Using the Java language, you'll look deeply into coding standards, debugging, unit testing, modularity, and other characteristics of good programs. You Will Learn Modern agile methodologies How to work on and with development teams How to leverage the capabilities of modern computer systems with parallel programming How to work with design patterns to exploit application development best practices How to use modern tools for development, collaboration, and source code controls Who This Book Is For Early career software developers, or upper-level students in software engineering courses

The Art of Immutable Architecture: Theory and Practice of Data Management in Distributed Systems

by Michael L. Perry

This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable architecture to your tools.Most software components focus on the state of objects. They store the current state of a row in a relational database. They track changes to state over time, making several basic assumptions: there is a single latest version of each object, the state of an object changes sequentially, and a system of record exists.This is a challenge when it comes to building distributed systems. Whether dealing with autonomous microservices or disconnected mobile apps, many of the problems we try to solve come down to synchronizing an ever-changing state between isolated components. Distributed systems would be a lot easier to build if objects could not change.After reading The Art of Immutable Architecture, you will come away with an understanding of the benefits of using immutable objects in your own distributed systems. You will learn a set of rules for identifying and exchanging immutable objects, and see a collection of useful theorems that emerges and ensures that the distributed systems you build are eventually consistent. Using patterns, you will find where the truth converges, see how changes are associative, rather than sequential, and come to feel comfortable understanding that there is no longer a single source of truth. Practical hands-on examples reinforce how to build software using the described patterns, techniques, and tools. By the end of the book, you will possess the language and resources needed to analyze and construct distributed systems with confidence. The assumptions of the past were sufficient for building single-user, single-computer systems. But aswe expand to multiple devices, shared experiences, and cloud computing, they work against us. It is time for a new set of assumptions. Start with immutable objects, and build better distributed systems.What You Will LearnEvaluate a distributed system from the perspective of immutable objects Recognize the problems in existing designs, and make small modifications to correct them Start a new system from scratch, applying patternsApply the principles of immutable architecture to your tools, including SQL databases, message queues, and the network protocols that you already use Discover new tools that natively apply these principles Who This Book Is ForSoftware architects and senior developers. It contains examples in SQL and languages such as JavaScript and C#. Past experience with distributed computing, data modeling, or business analysis is helpful.

Refine Search

Showing 83,276 through 83,300 of 83,310 results