Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
In this book I give you my honest views on the good and dark sides of Windows 11. There are more features, issues, hacks and tricks hiding in Windows 11 than most people will ever know. I unveiled some of them in this book.I've been a Windows user for over 20 years, and after further exploring two early builds of Windows 11, at first I had to admit that it looks rather nice, and is better than Windows 10.But I soon discovered there's a lot more than meets the eye. So I strongly advise you read this book first to help you decide if you should install or upgrade your OS to Windows 11.These are some of what you'll learn in this book:The new features and major changes since the Windows 11 insider preview was released.Why Microsoft's system health-check application, and the hardware constraints they plan to include in Windows 11 are shameful, and how they can affect your system and you.Why I suspect the rollout of Windows 11 will be relatively slow, and why it will take quite a long time before lots of people start using it.Apps experiencing troubles with Windows 11 and why Microsoft is unable to find a fix.8 Windows 11 troubles Microsoft is currently investigatingThe Microsoft's policy and how it will affect Windows 11 users when Windows 10 support ends on October 14th, 2025.How to quickly and reliably check if your system can run Windows 11.Two methods to install Windows 11 step by step (for Windows and Linux-based systems with backup and restore options for programs and files).A work around to install Windows 11 on non-supported hardware.How to dual boot your PC with Windows 11 and 10 step by step.And so much more...
Learn how to effectively utilize the Bash shell in your programming. This refreshed and expanded third edition has been updated to Bash 5.2, and many scripts have been rewritten to make them more idiomatically Bash, taking better advantage of features specific to Bash. It is easy to read, understand, and will teach you how to get to grips with Bash programming without drowning you in pages and pages of syntax.Using this book you will be able to use the shell efficiently, make scripts run faster using expansion and external commands, and understand how to overcome many common mistakes that cause scripts to fail. This book is perfect for all beginning Linux and Unix system administrators who want to be in full control of their systems, and really get to grips with Bash programming.The Bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of Shell internals, Shell programs can perform as snappily as utilities written in C or other compiled languages. And you will see how, without assuming UNIX lore, you can write professional Bash programs through standard programming techniques.What You'll Learn Use the Bash shell to write utilities and accomplish most programming tasksReplace many external commands with shell parameter expansion making scripts very fastAvoid many common mistakes that cause scripts to failSee how Bash¿s read line and history libraries can save typing when getting user inputBuild shell scripts that get information from the WebWho This Book Is ForDevelopers, programmers, and open source enthusiasts who want to write scripts using Bash on multiple platforms
The complete guide for system administrators to install, manage, secure, and squeeze return on investment from their Windows Server 2022 infrastructurePurchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesDesign and implement Microsoft Server 2022 in an enterprise environment and use Windows Server to create secure and efficient networksConcentrated learning on Windows core infrastructure technologiesDiscover how to harden and secure your Windows Server infrastructureBook DescriptionWritten by a 10-time Microsoft MVP award winner with over 20 years of IT experience, Mastering Windows Server 2022 is a hands-on guide to administer any Windows Server environment. Whether new to the server world or working to keep your existing skills sharp, this book aims to be referenced on a regular basis instead of gathering dust on your shelf.Updated with Server 2022 content, this book covers a wide variety of information pertaining to your role as a server administrator. We will expand upon versions and licensing models for this OS, and explore the 'single pane of glass' administration methodology by utilizing tools like Server Manager, PowerShell, and even Windows Admin Center. This book is primarily focused on Windows Server 2022 LTSC version, but follow along as we discuss the latest news for SAC server releases as this impacts Containers, Nano Server, and general OS release cadence.This book covers a range of remote access technologies, and even teaches management of PKI and certificates. You will be empowered to virtualize your datacenter with Hyper-V, and deploy your own Remote Desktop Services "farm". Learn about Server Core, built-in redundancy, and explore troubleshooting skills. All this on top of chapters about core infrastructure technologies such as Active Directory, DNS, DHCP, and Group Policy.What you will learnBuild a Windows Server from the ground up and implement your own PKIManage your servers with Server Manager, PowerShell, and Windows Admin CenterSecure your network and data with modern technologies in Windows Server 2022Understand containers and where Nano Server fits into the equationDiscover new ways to integrate your datacenter with Microsoft AzureVirtualize your datacenter with Hyper-VRound out your understanding of Active Directory, DNS, DHCP, and Group PolicyDeploy Remote Desktop Services in your environmentWho this book is forAnyone interested in Windows Server administration will benefit from this book. If you are proficient in Microsoft infrastructure technologies and have worked with prior versions of Windows Server, then there are some focused topics on the aspects that are brand new and only available in Server 2022. On the other hand, if you are currently in a desktop support role looking to advance, or fresh into the IT workforce, care was taken in the pages of this book to ensure that you will receive a rounded understanding of Windows Server core capabilities that translate into any environmentTable of ContentsGetting Started with Windows Server 2022Installing and Managing Windows Server 2022Active DirectoryDNS and DHCPGroup PolicyCertificatesNetworking with Windows Server 2022Remote AccessHardening and SecurityServer CorePowerShellRedundancy in Windows Server 2022ContainersHyper-VRemote Desktop ServicesTroubleshooting
Reimagine different generative AI as useful creative prototyping tools that can be used to augment your own creative process and projects. Gain a deeper understanding of how generative AI can elevate your creative future. You will acquire a comprehensive understanding of how AI works, uncover tools that can enhance your AI interactions, learn how to extract maximum potential from AI-produced content, and experiment with methods for assessing, refining, and boosting the content to transform your creative projects. You'll also explore how creative professionals from varied disciplines are employing generative AI in their workflows to produce distinctive contributions to the world. Each chapter provides examples of how designers and other creative individuals can utilize these technological wonders, adopting various prototyping techniques to fast-track and optimize design processes and workflows. Creators from all disciplines can tap into the vast capabilities and benefits of generative AI, enabling them to rapidly experiment and prototype their ideas.You Will Learn:Understand how generative AI can support your own creative processLearn tools to get the most out of text-text, text-image, and text-video generative AIAugment your design practices using generative AIDraw inspiration from AI generated content to create unique creative workImprove and streamline creatives processes and workflowsWho This Book Is ForDigital media professionals who want to access off-the shelf creative tools to improve and accelerate their creativity and workflow.Designers and engineers who are looking at novel ways to improve their prototyping and testing processes.Students who want to use AI to rapidly generate ideas to support them in prototyping assignments.Instructors interested in pointing their students to a variety of accessible AI resources to manage their own creativity.
Der ultimative Münsterführer Das Ulmer Münster ist einer der berühmtesten Sakralbauten des Landes: Alles Wissenswerte zur prachtvollen Kirche und dem höchsten Kirchturm der Welt. Entdecken Sie die faszinierende Geschichte und die kunstvollen Schätze des Ulmer Münsters - eines der beeindruckendsten Kirchenbauwerke Europas. Das Buch " Das Ulmer Münster " nimmt Sie mit auf eine Reise durch die Jahrhunderte und zeigt Ihnen die vielfältigen Facetten dieser bedeutenden Sehenswürdigkeit .Erfahren Sie mehr über die Architektur und die Baugeschichte des Münsters, die eng mit der Stadtgeschichte Ulms verbunden ist. Entdecken Sie die zahlreichen Kunstwerke , die das Münster beherbergt, darunter den berühmten "Schiefen Turm" und das monumentale Chorgestühl aus dem 15. Jahrhundert. Stimmungsvolle Aufnahmen entführen den Leser zu einem Streifzug durch den spätgotischen Bau . Gleichzeitig lenken sie den Blick auf künstlerisch wertvolle Details und gewähren Einblick in Bereiche, die für die Öffentlichkeit nicht zugänglich sind.Ob Sie bereits einmal dort waren oder sich einfach für Kunst und Geschichte interessieren - dieses Buch ist ein Muss für jeden, der das Ulmer Münster besser kennenlernen möchte.
Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFLPurchase of the print or Kindle book includes a free PDF eBookKey Features:Understand the vulnerability landscape and useful tools such as QEMU and AFLExplore use cases to find vulnerabilities and execute unknown firmwareCreate your own firmware emulation and fuzzing environment to discover vulnerabilitiesBook Description:Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software.The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. You'll learn to combine these powerful tools to create your own emulation and fuzzing environment and then use it to discover vulnerabilities in various systems, such as iOS, Android, and Samsung's Mobile Baseband software, Shannon. After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses.By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines.What You Will Learn:Understand the difference between emulation and virtualizationDiscover the importance of emulation and fuzzing in cybersecurityGet to grips with fuzzing an entire operating systemDiscover how to inject a fuzzer into proprietary firmwareKnow the difference between static and dynamic fuzzingLook into combining QEMU with AFL and AFL++Explore Fuzz peripherals such as modemsFind out how to identify vulnerabilities in OpenWrtWho this book is for:This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.
Arguably one of the most highly regarded and widely used enterprise-level operating systems available today is the Red Hat Enterprise Linux (typically shortened to RHEL and pronounced rell) distribution. Not only is it considered to be among the most stable and reliable operating systems, but it is also backed by the considerable resources and technical skills of Red Hat, Inc. Red Hat Enterprise Linux 9 Essentials is designed to provide detailed information on the installation, use, and administration of the Red Hat Enterprise Linux 9 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates using App Streams. Additional installation topics, such as dual booting with Microsoft Windows, are also covered, together with all important security topics, such as configuring a firewall and user and group administration. For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers, and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.
Rocky Linux 9 Essentials is designed to provide detailed information on the installation, use, and administration of the Rocky Linux 9 distribution. For beginners, the book covers topics such as operating system installation, the basics of the GNOME desktop environment, configuring email and web servers, and installing packages and system updates. Additional installation topics, such as dual booting with Microsoft Windows, are also covered, together with all important security topics, such as configuring a firewall and user and group administration. For the experienced user, topics such as remote desktop access, the Cockpit web interface, logical volume management (LVM), disk partitioning, swap management, KVM virtualization, Secure Shell (SSH), Linux Containers, and file sharing using both Samba and NFS are covered in detail to provide a thorough overview of this enterprise class operating system.
You know the basics. Your Swift code flows with logic and ease. This isn't your first time building a workable app for iOS platforms. Now, it's time to build a magical app for iOS platforms! Move beyond what you mastered in the best-selling Beginning iPhone Development with SwiftUI. Debug Swift code, use multi-threaded programming with Grand Central Dispatch, pass data between view controllers, and design apps functional in multiple languages.Not only will your apps run like magic under the hood but, with the new standard of SwiftUI, you'll add animations, scaling, multiscreen support, and so much more to your interfaces. You'll also see how to integrate audio and video files in your apps, access the camera and send pictures to and from the Photos library, use location services to pinpoint your user's position on a map, and display web pages in-app. Don't just stop at flawless code and stickily engaging interfaces. Give your apps a mind with Apple's advanced frameworks for machine learning, facial and text recognition, and augmented reality.Pro iPhone Development with SwiftUI enlightens you to the world of rich design, solid code, and thoughtful processing needed to make apps that wow. Integrate all these extraordinary iOS features and embrace the world of possibilities in the Swift programming language with SwiftUI. What You Will LearnSave and retrieve data when apps close or get pushed in the backgroundRecognize speech with Apple's advanced frameworks Create augmented reality appsUnderstand spoken commands with SiriWho This Book is ForAspiring iOS app developers familiar with the Apple Swift programming language and/or the iOS SDK, but ready to move to the next level.
Tame the power of Apple¿s new user interface toolkit, SwiftUI. This revised and expanded Seventh Edition covers the basic information you need to get up and running quickly to turn your great ideas into working iOS apps with stunningly interactive interfaces using SwiftUI. New chapters cover expandable text fields, multidate pickers, using gauges, progress views and variable SF symbol icons, creating chats, and using the navigation stack and split view.Yoüll start with basic designs and then explore more sophisticated ones. Assuming little or no working knowledge of the Swift programming language, and written in a friendly, easy-to-follow style, this book offers a comprehensive course in iPhone and iPad programming. The book provides a gentle introduction to using Xcode and then guides you though the creation of your first simple application. Yoüll create user interfaces for that application using multiple screens in two different ways¿using Navigation View and Tab Bars.Then integrate all the interface elements iOS users have come to know and love, such as buttons, switches, pickers, toolbars, and sliders with less effort and more efficiency. Yoüll also learn about touch gestures, lists, and grids for displaying data on a user interface. And yoüll even go beyond those simple controls to liven up any user interface with simple animation techniques. Spice your designs up with movement, scaling, and resizing, including spring and bounce effects!Once yoüre ready, move on to Pro iPhone Development with Swift UI to learn more of the unique aspects of iOS programming and the Swift language. What You Will LearnDiscover the basics of designing a user interface using SwiftUIBuild cool, crisp user interfaces that use animationDisplay data in lists and outlinesOrganize user interfaces in forms and groups Who This Book isFor Aspiring iOS app developers new to the Apple Swift programming language and/or the iOS SDK.
Viele der wichtigsten Technologiekonzerne der Welt bieten Lösungen für mobile Applikationen an, die inzwischen auch zum Entwickeln für andere Zielplattformen als iOS und Android nutzbar sind. Sowohl der Begriff App als auch damit verbundene Technologien wachsen über die Welt der mobilen Endgeräte hinaus. Vor diesem Hintergrund präsentiert dieses Buch das nötige Wissen über den gesamten Entwicklungsprozess einer App von der Konzeption bis zur Umsetzung und Inbetriebnahme. In der Konzeption werden empfohlene Methoden des International Requirements Engineering Boards und aus dem Standard Essence genutzt. Für die Umsetzung wiederum werden die Technologien .NET MAUI und ergänzend Comet betrachtet, worüber auch eine optionale einfache Einarbeitung in SwiftUI, Jetpack Compose und Flutter möglich ist.Frühere Versionen dieses Buches sind unter den Titeln ¿Konzeption und Umsetzung mobiler Applikationen¿ und ¿App Engineering¿ für den BoD-Verlag erschienen.
Über den Apple Store kann man zurzeit Millionen mobiler Anwendungen herunterladen. Die Einsatzmöglichkeiten sind vielfältig und die Bandbreite der Anwendungsszenarien bewegt sich von komplexen Computerspielen bis hin zu Geschäftsanwendungen. In den vergangenen Jahren wurden unterschiedliche Entwicklungsparadigmen bereitgestellt, die hinsichtlich verschiedener Aspekte wie zum Beispiel Plattformunabhängigkeit, Performanz, Kosten sowie dem Zugriff auf gerätespezifische, native Funktionen sowohl Vor- als auch Nachteile besitzen. Die Kapitel gehen didaktisch in die Breite und stellen die Entwicklungsparadigmen vor dem Hintergrund einer zentralen Fallstudie gegenüber. Es werden Techniken zur Entwicklung von mobilen Webanwendungen, hybriden Anwendungen, nativen Anwendungen für Android sowie Cross-Plattform-Anwendungen vorgestellt, ohne innerhalb eines Paradigmas zu sehr in die Tiefe zu gehen. Eine Ausnahme bildet das von Google bereitgestellte Flutter-Framework, das sowohl die Entwicklung auf Android- als auch iOS-Geräten unterstützt.Dieses Lehrbuch richtet sich an Studentinnen und Studenten, die bereits mit einer objektorientierten Programmiersprache vertraut sind und wesentliche Aspekte der Programmierung kennen und einen Einblick in das Mobile Computing erlangen möchten.
Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guidePurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain practical knowledge to conquer the AZ-801 certification and tackle real-world challengesLearn to secure Windows Server in on-premises and hybrid infrastructuresLeverage hands-on examples to monitor and troubleshoot Windows Server environmentsBook Description:Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career.With this book, you'll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you'll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server.You'll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You'll also learn how to monitor and troubleshoot Windows Server environments.By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.What You Will Learn:Understand the core exam objectives and successfully pass the AZ-801 examSecure Windows Server for on-premises and hybrid infrastructures using security best practicesImplement, manage, and monitor Windows Server high availability features successfullyConfigure and implement disaster recovery services using Hyper-V features, Azure Recovery Services, and Azure Site RecoveryExplore how to migrate various servers, workloads, and tools from previous versions of Windows Server to 2022Monitor and troubleshoot Windows Server environments in both on-premises and cloud workloads using Windows Server tools, Windows Admin Center, and Azure servicesWho this book is for:This book is for Cloud and Datacenter Management administrators and engineers, Enterprise Architects, Microsoft 365 Administrators, Network Engineers, and anyone seeking to gain additional working knowledge with Windows Server operating systems and managing on-premises, hybrid and cloud workloads with administrative tools. To get started, you'll need to have a basic understanding of how to configure advanced Windows Server services utilizing existing on-premises technology in combination with hybrid and cloud technologies.
Elevate your Linux-powered system with Yocto Projects, enhancing its stability and resilience efficiently and economically - now upgraded to the latest Yocto Project versionPurchase of the print or Kindle book includes a free PDF eBookKey Features:- Optimize your Yocto Project tools to develop efficient Linux-based projects- Follow a practical approach to learning Linux development using Yocto Project- Employ the best practices for embedded Linux and Yocto Project developmentBook Description:The Yocto Project is the industry standard for developing dependable embedded Linux projects. It stands out from other frameworks by offering time-efficient development with enhanced reliability and robustness.With Embedded Linux Development Using Yocto Project, you'll acquire an understanding of Yocto Project tools, helping you perform different Linux-based tasks. You'll gain a deep understanding of Poky and BitBake, explore practical use cases for building a Linux subsystem project, employ Yocto Project tools available for embedded Linux, and uncover the secrets of SDK, recipe tool, and others. This new edition is aligned with the latest long-term support release of the aforementioned technologies and introduces two new chapters, covering optimal emulation in QEMU for faster product development and best practices.By the end of this book, you'll be well-equipped to generate and run an image for real hardware boards. You'll gain hands-on experience in building efficient Linux systems using the Yocto Project.What You Will Learn:- Understand the basic Poky workflows concepts along with configuring and preparing the Poky build environment- Learn with the help of up-to-date examples in the latest version of Yocto Project- Configure a build server and customize images using Toaster- Generate images and fit packages into created images using BitBake- Support the development process by setting up and using Package feeds- Debug Yocto Project by configuring Poky- Build an image for the BeagleBone Black, RaspberryPi 4, and Wandboard, and boot it from an SD cardWho this book is for:If you are an embedded Linux developer and want to broaden your knowledge about the Yocto Project with examples of embedded development, then this book is for you. Professionals looking for new insights into working methodologies for Linux development will also find plenty of helpful information in this book.Table of Contents- Meeting the Yocto Project- Baking Our First Poky Based System- Using Toaster to Bake an Image- Meeting the BitBake tool- Grasping the BitBake Tool- Detailing the Temporary Build Directory- Assimilating Packaging Support- Diving into BitBake Metadata- Developing with the Yocto Project- Debugging with the Yocto Project- Exploring External Layers- Creating Custom Layers- Customizing Existing Recipes- Achieving GPL Compliance- Booting Our Custom Embedded Linux- Speeding Up Product Development Through Emulation - QEMU- Best Practices
"Explores the history of Android attacks and covers static and dynamic approaches to analyzing real malware specimens, machine-learning techniques to detect malicious apps, and how to identify banking trojans, ransomware, and SMS fraud"--
This book provides Kafka administrators, site reliability engineers, and DataOps and DevOps practitioners with a list of real production issues that can occur in Kafka clusters and how to solve them. The production issues covered are assembled into a comprehensive troubleshooting guide for those engineers who are responsible for the stability and performance of Kafka clusters in production, whether those clusters are deployed in the cloud or on-premises. This book teaches you how to detect and troubleshoot the issues, and eventually how to prevent them.Kafka stability is hard to achieve, especially in high throughput environments, and the purpose of this book is not only to make troubleshooting easier, but also to prevent production issues from occurring in the first place. The guidance in this book is drawn from the author's years of experience in helping clients and internal customers diagnose and resolve knotty production problems and stabilize their Kafka environments. The book is organized into recipe-style troubleshooting checklists that field engineers can easily follow when under pressure to fix an unstable cluster. This is the book you will want by your side when the stakes are high, and your job is on the line. What You Will LearnMonitor and resolve production issues in your Kafka clustersProvision Kafka clusters with the lowest costs and still handle the required loadsPerform root cause analyses of issues affecting your Kafka clustersKnow the ways in which your Kafka cluster can affect its consumers and producersPrevent or minimize data loss and delays in data streamingForestall production issues through an understanding of common failure pointsCreate checklists for troubleshooting your Kafka clusters when problems occurWho This Book Is ForSite reliability engineers tasked with maintaining stability of Kafka clusters, Kafka administrators who troubleshoot production issues around Kafka, DevOps and DataOps experts who are involved with provisioning Kafka (whether on-premises or in the cloud), developers of Kafka consumers and producers who wish to learn more about Kafka
Digitize your business operations both internally and externally with a well-structured app design. Customers today turn to mobile when searching for their future vendor. This book is your step-by-step guide through the process of building mobile apps that will meet your company's needs as well as the needs of your staff. See exactly how applying certain basic principles work and make them serve your goals by troubleshooting common mobile app design, usability, and promotion issues. You'll start by listing the advantages of what makes a mobile app an ideal platform and resource for growing your market and revenue. As many companies burn money on failed mobile app projects, you'll review the best practices on how to outline your app ideas and create a mobile product roadmap. You'll then explore the process of starting mobile app development¿from an initial idea to the final product. Yoüll look at the setbacks in development that can cost you a successful outcome, andreview proven practices and features that lead to success no matter what industry you operate in. Yoüll also understand the dynamics of mobile app development, and the best ways to ensure that your mobile app serves your company¿s goal for further growth. At the end, yoüll future proof your app and weigh the pros and cons of potentially outsourcing mobile development. Mobile App Development for Businesses puts theory into practical use for developing internal and external mobile apps. What You'll LearnLaunch and position your app in the marketDevelop apps for internal and external audiencesCollect and incorporate user feedbackSee why any great business today starts with a solid digital foundationWho This Book Is ForEntrepreneurs, business owners, directors, and executives wishing to grow their businesses and expand their reach in the market. Previous technological experience is helpful but not required.
This book constitutes the proceedings of the 7th International Conference on Smart Computing and Communication, SmartCom 2022, held in New York City, NY, USA, during November 18¿20, 2022.The 64 papers included in this book were carefully reviewed and selected from 312 submissions. SmartCom 2023 focus on recent booming developments in Web-based technologies and mobile applications which have facilitated a dramatic growth in the implementation of new techniques, such as cloud computing, edge computing, big data, pervasive computing, Internet of Things, security and privacy, blockchain, Web 3.0, and social cyber-physical systems.The conference gathered all high-quality research/industrial papers related to smart computing and communications and aimed at proposing a reference guideline for further research.
This book constitutes the refereed proceedings of the 19th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2022, held in Izola, Slovenia, in September 2022. The 4 full papers presented in this book were carefully reviewed and selected from 22 submissions. In addition, this book includes 6 work-in-progress papers, 4 new ideas paper, and two invited papers. This series of conferences serves as a meeting place to bring together distributed systems expertise (e.g., in resource allocation, quality of service management, and energy consumption) with economics expertise (focusing on both micro- and macro-economic modelling and analysis) for creating effective solutions in this space.
C differs from most programming languages in its use of expressions, pointers, and arrays. For those learning C, pointers are the greatest source of confusion. The primary aim of this text is to provide working models of how pointers are used in C as well as an introduction to their use in C++. Most beginners falter on the use of pointers. Many try to avoid pointers completely, but quickly find that pointers are used extensively throughout C programs. Some attain a partial understanding of pointers which, at first, gets them by. However, when faced with complex programming tasks, they find that pointers become a necessity. In most programming languages one learns about pointers only after most other topics have been discussed. Pointers are just one more added feature of the language. In C and in C++, however, pointers are used with every feature. There are pointers to variables, pointers as parameters, pointers as arrays, pointers to structures, and even pointers to pointers. With each feature pointers are used differently. The way pointers work with variables is very different from the way pointers work with arrays. In this text, you learn pointers as you learn each feature of the language. With variables, you learn pointers to variables; with parameters, pointers to parameters; with functions: pointers to functions; with arrays, pointers in arrays; with structures, pointers to structures. In addition, for C++ you will learn pointers to objects, to class members, and derived objects. Such an approach provides an understanding of the many different ways pointers are used throughout the language. The text is arranged in five sections. The first section focuses on the basic structure of the language. Variables, functions, and expressions are carefully examined. The second section deals with arrays. Arrays form an exception in C. Unlike structures they are not data objects. They are completely managed by pointers. The third section describes data structures and file management. The chapter on data structures introduces basic concepts such as linked lists and trees. A special examination is made of recursion and how it operates with lists, trees, and b-trees. The chapters on file management discuss the different types of files with special emphasis on record files b-tree indexes. The fourth section provides an introduction to C++, covering classes and objects, their use with pointers, as well as operator overloading and inheritance. The fifth section covers additional topics greater detail such as the pre-processor and bitwise operations.
Leverage Defender for IoT for understanding common attacks and achieving zero trust for IoT and OT devicesPurchase of the print or Kindle book includes a free PDF eBookKey Features:Identify and resolve cybersecurity challenges in the IoT and OT worldsFamiliarize yourself with common attack vectors in the IoT and OT domainsDive into Defender for IoT, understand its capabilities, and put it to practiceBook Description:The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges.The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You'll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you'll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust.By the end of this security book, you'll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.What You Will Learn:Discover security challenges faced in IoT and OT environmentsUnderstand the security issues in Industry 4.0Explore Microsoft Defender for IoT and learn how it aids in securing the IoT/OT industryFind out how to deploy Microsoft Defender for IoT along with its prerequisitesUnderstand the importance of continuous monitoringGet familiarized with vulnerability management in the IoT and OT worldsDive into risk assessment as well as threat monitoring and huntingAchieve zero trust for IoT devicesWho this book is for:This book is for industrial security, IoT security, and IT security professionals. Security engineers, including pentesters, security architects, and ethical hackers, who want to ensure the security of their organization's data when connected with the IoT will find this book useful.
GCC 8.0 GNU Compiler Collection Internals documents the internals of the GNU compilers, including how to port them to new targets and some information about how to write front ends for new languages. It corresponds to the compilers (GCC) version 8.0.1. The use of the GNU compilers is documented in a separate manual. See Section "Introduction" in Using the GNU Compiler Collection (GCC).This manual is mainly a reference manual rather than a tutorial. It discusses how to contribute to GCC (see Chapter 1 [Contributing], page 3), the characteristics of the machines supported by GCC as hosts and targets (see Chapter 2 [Portability], page 5), how GCC relates to the ABIs on such systems (see Chapter 3 [Interface], page 7), and the characteristics of the languages for which GCC front ends are written (see Chapter 5 [Languages], page 59). It then describes the GCC source tree structure and build system, some of the interfaces to GCC front ends, and how support for a target system is implemented in GCC.This manual is available online for free at gnu.org. This manual is printed in grayscale.
Learn how to build cloud-native microservices with Helidon - an open-source Java framework from Oracle. This book will show you how to take full advantage of the cloud by optimizing applications with fast start times, low memory consumption, and a small disk footprint. The open-source Helidon framework provides all that, and more. It¿s based on Java 17, giving you full access to new code features. This book reveals how Helidon also supports modern enterprise Java standards such as MicroProfile. Plus, you'll see how Helidon lets you use GraalVM to build lightning-fast native executables, and its unique reactive layer allows you to develop efficient low-level APIs.Each chapter in the book teaches a new Helidon concept through practical examples based on real-life use-cases. Yoüll learn how to add observability and security to your microservices, how to work with databases, and call other services. You'll also look at all MicroProfile 5.0 platform specifications aswell as some stand-alone specs such as Messaging and Long Running Actions. Best of all, everything covered in this book makes it a great study guide for the upcoming Oracle Helidon certification - the perfect way to prove your new skills to a prospective employer!What You'll LearnPackage microservices using JLink and GraalVMDeploy microservices to Kubernetes Review MicroProfile 5.0 specifications in detailUnderstand the basics of Helidon Reactive APIsWho This Book Is ForDevelopers and architects who want to start developing cloud-native applications; developers who already use different Java framework and want to learn about Helidon; those interested in developing portable applications using MicroProfile and Jakarta EE
This book constitutes the refereed proceedings of the 12th International Development Informatics Association Conference, IDIA 2022, held in Mbombela, South Africa, in November 2022. The 20 revised full papers presented in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections on¿ theories and practices in digital-for-development ecosystems; emerging technologies for transformation, inclusion and sustainable development; privacy and security in digital-for-development ecosystems; human-computer interaction (HCI) for digital inclusion; artificial intelligence (AI) for good.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.