Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the refereed proceedings of the 15th Software Quality Days Conference, SWQD 2023, held in Munich, Germany, during May 23-25, 2023.The Software Quality Days (SWQD) conference started in 2009 and has grown to the biggest conference on software quality in Europe. The program of the SWQD conference is designed to encompass a stimulating mixture of practical presentations and new research topics in scientific presentations. The guiding conference topic of the SWQD 2023 is ¿Higher Software Quality through Zero Waste Development¿.The 4 full papers and 2 short papers presented in this volume were carefully reviewed and selected from 10 submissions. The volume also contains one invited talk.
More than ever, we depend on software to get through our everyday lives. It's embedded in our smartphones, cars, children's toys, and household appliances (even our toasters), and it's transforming our world. This brave new world of technology offers exciting opportunities, but it has never been more important that we recognize and understand the risks to our security and safety. When software goes bad, the consequences can range from the farcical (such as the HealthCare.gov fiasco, in which a highly-touted government website crashed almost immediately upon being launched) to the tragic (as in the case of the Arizona woman who was killed by a self-driving car that didn't recognize her as a pedestrian).Testing is our line of defence against these software-related catastrophes. Yet, for years, it was seen as an afterthought-a chore that developers only carried out because they had to, and which they tried to complete as cheaply and quickly as possible.In The Book on Testing, Alex Rodov leads the reader on a personal and informal tour of the software-testing landscape, focusing on what happens when it isn't done properly. In easy-to-understand language, he offers real-life examples, as well as insights gained from decades of experience, to demonstrate why it doesn't have to be that way. Testing is difficult and can never be perfect. But if it's done well, we'll all be able to sleep better at night.
Viele der wichtigsten Technologiekonzerne der Welt bieten Lösungen für mobile Applikationen an, die inzwischen auch zum Entwickeln für andere Zielplattformen als iOS und Android nutzbar sind. Sowohl der Begriff App als auch damit verbundene Technologien wachsen über die Welt der mobilen Endgeräte hinaus. Vor diesem Hintergrund präsentiert dieses Buch das nötige Wissen über den gesamten Entwicklungsprozess einer App von der Konzeption bis zur Umsetzung und Inbetriebnahme. In der Konzeption werden empfohlene Methoden des International Requirements Engineering Boards und aus dem Standard Essence genutzt. Für die Umsetzung wiederum werden die Technologien .NET MAUI und ergänzend Comet betrachtet, worüber auch eine optionale einfache Einarbeitung in SwiftUI, Jetpack Compose und Flutter möglich ist.Frühere Versionen dieses Buches sind unter den Titeln ¿Konzeption und Umsetzung mobiler Applikationen¿ und ¿App Engineering¿ für den BoD-Verlag erschienen.
This volume provides a framework for evaluating geospatial software for participatory mapping. The evaluation is based on ten key indicators: ethics, cost, technical level, inclusiveness, data accuracy, data privacy, analytical capacity, visualization capacity, openness, and accessibility (i.e., mobile friendly or offline capabilities). Each application is evaluated by a user and cross analyzed with specific case studies of the software¿s real-world application. This framework does not discriminate against assessing volunteered geographic information (VGI) applications, as a form of participatory mapping, in circumstances that its application is spearheaded by underrepresented groups with the intent to empower and spark political or behavioral change within formal and informal institutions. Each chapter follows a strict template to ensure that the information within the volume can be updated periodically to match the ever-changing technological environment. The book covers ten different mapping applications with the goal of creating a comparative evaluation framework that can be easily interpreted by convening institutions and novice users. This will also help identify gaps in software for participatory mapping which will help to inform application development in the future and updates to current geospatial software.
This open access book constitutes the proceedings of the 26th International Conference on Fundamental Approaches to Software Engineering, FASE 2023, which was held during April 22-27, 2023, in Paris, France, as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2023.The 12 regular papers presented in this volume were carefully reviewed and selected from 50 submissions. The proceedings also contain 2 tool papers, 2 NIER papers, and 2 competition papers from the Test-Comp Competition. The papers deal with the foundations on which software engineering is built, including topics like software engineering as an engineering discipline, requirements engineering, software architectures, software quality, model-driven development, software processes, software evolution, AI-based software engineering, and the specification, design, and implementation of particular classes of systems, such as (self-)adaptive, collaborative, AI, embedded, distributed, mobile, pervasive, cyber-physical, or service-oriented applications. .
This book is a comprehensive guide covering modern cloud strategies and leadership approaches for building and scaling organizations to maturity on their cloud adoption journey. The book starts by examining technical topics from the perspective of the cloud leader, who is responsible for cloud teams and accountable for cloud products and platforms within their organization. Through a series of practical insights and real-world examples, you will gain a deep understanding of the key considerations for leading a cloud-driven organization. These considerations include understanding the benefits of digital transformation, managing global tech teams, and delivering excellence through platform ownership. Towards the end of the book, you will explore the latest trends and best practices for strategically innovating and scaling your organization in the cloud. With the knowledge gained from this book, you will be able to harness the power of the cloud to drive business success and gain valuable insights and practical strategies to support and empower the adoption of modern cloud platforms and technologies for your clients and organization. The Cloud Leader's Handbook is a must-read for any Cloud Leader who wants to stay ahead of the curve and achieve success in the rapidly evolving world of cloud computing.What Will You LearnDevelop a strong foundation in the technical aspects of cloud leadershipUnderstand the benefits of digital transformation and how to lead a cloud-driven organization, including managing global tech teams.Discover the bleeding-edge cloud trends that are influencing organizational roadmapsTransition into the role of the modern Cloud Leader by gaining a deeper perspective around what it means to own, manage, administer, govern, and optimize the modern cloud platformLearn how to effectively envision, manage, and deploy modern cloud transformation projects through successful approaches around innovation, strategy, and excellenceWho This Book Is ForExperienced IT professionals and business leaders looking to understand the power of the cloud.
This book discusses the recent research work on designing efficient fault-tolerant synchronization mechanisms for concurrent processes using the relatively new persistent memory technology that combines the low latency benefits of DRAM with the persistence of magnetic disks. The authors include all of the major contributions published to date, and also convey some perspective regarding how the problem itself is evolving. The results are described at a high level to enable readers to gain a quick and thorough understanding of the RME problem and its nuances, as well as various solutions that have been designed to solve the problem under a variety of important conditions and how they compare to each other.
Über den Apple Store kann man zurzeit Millionen mobiler Anwendungen herunterladen. Die Einsatzmöglichkeiten sind vielfältig und die Bandbreite der Anwendungsszenarien bewegt sich von komplexen Computerspielen bis hin zu Geschäftsanwendungen. In den vergangenen Jahren wurden unterschiedliche Entwicklungsparadigmen bereitgestellt, die hinsichtlich verschiedener Aspekte wie zum Beispiel Plattformunabhängigkeit, Performanz, Kosten sowie dem Zugriff auf gerätespezifische, native Funktionen sowohl Vor- als auch Nachteile besitzen. Die Kapitel gehen didaktisch in die Breite und stellen die Entwicklungsparadigmen vor dem Hintergrund einer zentralen Fallstudie gegenüber. Es werden Techniken zur Entwicklung von mobilen Webanwendungen, hybriden Anwendungen, nativen Anwendungen für Android sowie Cross-Plattform-Anwendungen vorgestellt, ohne innerhalb eines Paradigmas zu sehr in die Tiefe zu gehen. Eine Ausnahme bildet das von Google bereitgestellte Flutter-Framework, das sowohl die Entwicklung auf Android- als auch iOS-Geräten unterstützt.Dieses Lehrbuch richtet sich an Studentinnen und Studenten, die bereits mit einer objektorientierten Programmiersprache vertraut sind und wesentliche Aspekte der Programmierung kennen und einen Einblick in das Mobile Computing erlangen möchten.
Softwareentwicklung erfordert ¿ ausgehend von informellen Problemstellungen ¿ Spezifikationen unter Festlegung der Daten- und Rechenstrukturen, Implementierungen und die Verifikation der Korrektheit. Zur Bewältigung dieser Aufgaben hat die Informatik eine Reihe grundlegender Ansätze und Methoden entwickelt, die in zwei Bänden in einem einheitlichen Rahmen zusammengefasst und an Beispielen erläutert werden. Der erste Band widmet sich der Spezifikationen von Daten- und Rechenstrukturen, der Spezifikation und Implementierung sowie dem Nachweis der Korrektheit funktionaler, prozeduraler und objektorientierter Programme. Der zweite Band dieses umfassenden und zugleich grundlagenorientierten Werkes behandelt softwareintensive Systeme und ihre Darstellung durch Zustandsmaschinen, nebenläufige Programme mit gemeinsamen Variablen, Datenflussprogramme, Schnittstellspezifikation, Zeitfluss, Architektur verteilter Systeme, Prozessmodellierung, Verfeinerung und spezifische Formalismen wie CSP, TLAund prädikative Spezifikation.Dies schließt unter anderem auch Themen wie Korrektheitsbeweise in Hinblick auf Sicherheit und Lebendigkeit sowie schrittweise Verfeinerung ein. Insbesondere werden im Buch die Grundlagen für eine wissenschaftlich abgesicherte Entwicklung von Programmen gelegt.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
"Modern C# is a comprehensive guide to the best practices for effectively using C# to create value types and write better programs. The book explores the core features of the memory and object models of C#, using practical examples and real-world context"--
"Effective, repeatable, and insightful analytics are key to ROI in customer relationship management systems. Many organizations, however, lack the automated reporting tools they need to run their businesses and instead choose to massage the data in Excel. But there's a better way. Salesforce's standard reporting tools provide a rich set of features that, when combined, support a wide variety of analytics needs."--Provided by publisher.
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.The 7 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 18 submissions. The workshop presents papers with topics such as security and trust access control, cryptographic protocols, identity management, security metrics, and privacy.
This book constitutes the refereed proceedings of the 29th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2023, which took place in Barcelona, Spain, during April 17-20, 2023.The 12 full technical design and scientific evaluation papers, 8 short research previews and vision papers, and 5 experience reports presented in this volume were carefully reviewed and selected from 78 submissions.They were organized in topical sections as follows: Requirements communication and conceptualization; NLP and machine learning for AI; RE for artificial intelligence; crowd RE; and RE in practice.
This book constitutes the proceedings of the 7th International Conference on Smart Computing and Communication, SmartCom 2022, held in New York City, NY, USA, during November 18¿20, 2022.The 64 papers included in this book were carefully reviewed and selected from 312 submissions. SmartCom 2023 focus on recent booming developments in Web-based technologies and mobile applications which have facilitated a dramatic growth in the implementation of new techniques, such as cloud computing, edge computing, big data, pervasive computing, Internet of Things, security and privacy, blockchain, Web 3.0, and social cyber-physical systems.The conference gathered all high-quality research/industrial papers related to smart computing and communications and aimed at proposing a reference guideline for further research.
End-to-end solutions and options for test architecture and methodologies. Achieve better quality and faster projects in an enjoyable way taking your career to the next level.Key Features:- Explore the full test architecture spectrum- Discover a range of challenging automation applications with real-world scenarios- Learn with easy-to-follow start-up examples including DevOps for testing, AI, XR, and cloudBook Description:From simple websites to complex applications, delivering quality is crucial for achieving customer satisfaction. How to Test a Time Machine provides step-by-step explanations of essential concepts and practical examples to show you how you can leverage your company's test architecture from different points in the development life cycle.You'll begin by determining the most effective system for measuring and improving the delivery of quality applications for your company, and then learn about the test pyramid as you explore it in an innovative way. You'll also cover other testing topics, including cloud, AI, and VR for testing.Complete with techniques, patterns, tools, and exercises, this book will help you enhance your understanding of the testing process. Regardless of your current role within development, you can use this book as a guide to learn all about test architecture and automation and become an expert and advocate for quality assurance.By the end of this book, you'll be able to deliver high-quality applications by implementing the best practices and testing methodologies included in the book.What You Will Learn:- Identify quality maturity and processes to get your product to the next quality level- Learn how to think out of the box for testing- Learn about types of tests and how to apply them from a unique perspective- Understand how to apply different technologies into testing- Cool code exercises and tools that could be of use for practicing and polishing your testing skills- Own quality and use it for career growthWho this book is for:This book is for test owners, developers, managers, manual QAs, SDETS, team leads, and systems engineers who wish to get started or improve the current QA systems. Test owners looking for inspiration and out-of-the-box solutions for challenging issues will also find this book useful.Table of Contents- Introduction - Finding Your QA Level- The Secret Passages of the Test Pyramid - The Base of the Pyramid- The Secret Passages of the Test Pyramid -- The Middle of the Pyramid- The Secret Passages of the Test Pyramid - The Top of the Pyramid- Testing Automation Patterns- Continuous Testing - CI/CD and Other DevOps Concepts You Should Know- Mathematics and Algorithms in Testing- Artificial Intelligence is the New Intelligence- Having Your Head up in the Clouds- Traveling Across Realities- How to Test a Time Machine (and Other Hard-to-Test Applications)- Taking Your Testing to the Next Level- Appendix - Self-Assessment
Dieses Buch hat sich als Basis fur den Einsatz von Visual Basic fur Studierende aller Fachbereiche und in der Praxis bestens bewahrt. Hier lernen Sie die grundlegenden Programmiertechniken anhand einfacher Beispiele in Verbindung mit Visual Basic kennen und einsetzen. Alle eingefuhrten Sprachelemente gelten fur die Versionen Visual Basic 6.0, VB .NET und Visual Basic for Application (VBA). Die vermittelten Kenntnisse dienen sowohl als Basis fur weiterfuhrende VB-Programme als auch fur die Einarbeitung in andere Sprachen. Schritte der Programmentwicklung, Algorithmen-Entwurfe, Unterprogrammtechniken und die Nutzung komplexer Datentypen werden vollstandig anhand von leicht nachvollziehbaren Beispielaufgaben erlautert. Inklusive Objekt-orientierter Programmierung - das Buch zeigt, wie es geht.
The refereed proceedings of the 15th International Conference on Computer Aided Verification, CAV 2003, held in Boulder, CO, USA in July 2003.The 32 revised full papers and 9 tool papers presented were carefully reviewed and selected from a total of 102 submissions. The papers are organized in topical sections on bounded model checking; symbolic model checking; games, trees, and counters; tools; abstraction; dense time; infinite state systems; applications; theorem proving; automata-based verification; invariants; and explicit model checking.
This book constitutes the refereed post-conference proceedings the 14th TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2022, which was held in Sydney, NSW, Australia, on September 5, 2022.The 5 revised full papers presented were carefully selected from 12 submissions. The conference focuses on Pick and Mix Isolation Levels; Benchmarking considerations for Trustworthy and Responsible AI (Panel); Preliminary Scaling Characterization with TPCx-AI and New Initiatives.
This book, AICON 2022, constitutes the post-conference proceedings of the 4th EAI International Conference on Artificial Intelligence for Communications and Networks, AICON 2022, held in Hiroshima, Japan, in November 30- December 1, 2022. The 9 full papers and 4 short papers were carefully reviewed and selected from 36 submissions. The papers detail research in the areas of AI and communication systems related to intelligent systems and computational intelligence for communication and networks. They are organized in topical sections on AI and networks; machine learning; and evolutionary computation.
¿Diese erweiterte 2. Auflage richtet sich an die regelmäßigen Benutzer von IT, also Berufstätige sowie Schüler, Studierende und Lehrer. Das Buch beschreibt das relevante Universum der Informatik und der Informationstechnologie, von den grundlegenden Prinzipien bis zur sozialen und gesellschaftspolitischen Bedeutung. Neu und erweitert sind u. a. Themen zu virtuellen Welten, zum Metaversum, zu digitalen Zwillingen sowie zu Aspekten von Verwaltung und Digitalisierung. Anhand zahlreicher Beispiele sowie Illustrationen und Grafiken wird die relevante IT-Umgebung der modernen Nichtfachperson dargestellt. Büroapplikationen, soziale Medien, Spiele und Hardwaretrends sowie die verwendeten Devices werden erklärt und in Zusammenhang gebracht.In einem Kapitel werden die ersten Grundlagen zur Programmierung der sehr populären Blocksprache Scratch gelegt. Zu jedem Kapitel werden zehn Fragen zum Inhalt gestellt, um dem Leser oder der Leserin eine Stütze zum gelesenen Inhalt zu geben und die Kompetenzen zu erweitern.Der InhaltGanz kurze Geschichte der IT · Alles ist Zahl · Computer als Hardware · Betriebssystem und Benutzeroberfläche · Netzwerke · Datenorganisation · IT-Entwicklung · IT-Organisation · Programmierung · Applikationen · Cloud-Computing · Sicherheit · Information und Medien · Künstliche Intelligenz · Virtuelle Welten · IT, Digitalisierung und GesellschaftDie ZielgruppenAlle Professionals mit Interesse an IT und InformatikSachbearbeiter mit BüroarbeitsplatzSchüler, Lehrer, ElternDer AutorClaudio Franzetti hat nach dem Studium der Ingenieurwissenschaften an der ETH Zürich als Forschungsingenieur bei BBC und ABB im Bereich Computational Fluid Dynamics gearbeitet und intensive Erfahrungen in der Simulation auf Großrechnern erlangt. Nach einem Betriebswirtschaftsstudium an der Hochschule St. Gallen hat er im Bereich Finanzen bei Versicherungen und Banken gearbeitet, wo er auch für quantitative Risikoberechnungen und zum Teil für die Gesamt-IT zuständig war.
With industrial systems becoming ever more mechanized and reliant on advanced technology, the complexity of equipment, especially in risky industries is increasing on a daily basis. This title offers the knowledge required by safety professionals to provide and maintain the safety of engineering complex systems.
Prepare for Microsoft Exam DP-500 and demonstrate your real-world ability to design, create, and deploy enterprise-scale data analytics solutions. Designed for business intelligence developers, architects, data analysts, and other professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Enterprise Data Analyst Associate level. Focus on the expertise measured by these objectives: Implement and manage a data analytics environment Query and transform data Implement and manage data models Explore and visualize data This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are a business intelligence developer, architect, data engineer, data architect, data analyst, or another professional with Power BI and Azure experience. About the ExamExam DP-500 focuses on knowledge needed to govern and administer data analytics environments; integrate analytics platforms into existing IT infrastructure; manage the analytics development lifecycle; query data with Azure Synapse Analytics; ingest and transform data with Power BI; design and build tabular models; optimize enterprise-scale data models; explore data with Azure Synapse Analytics; and visualize data with Power BI. About Microsoft CertificationPassing this exam fulfills your requirements for the Microsoft Certified: Azure Enterprise Data Analyst Associate certification, demonstrating your knowledge of designing, creating, and deploying enterprise-scale data analytics solutions. Responsibilities include performing advanced data analytics at scale, collecting enterprise-level requirements for data analytics solutions that include Azure and Microsoft Power BI, advising on data governance and configuration for Power BI administration, monitoring data usage, and optimizing solution performance. See full details at: microsoft.com/learn
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.