Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Wireless Sensor Network (WSN) is an infrastructure-less wireless network that is deployed in a large number of wireless sensors in an ad-hoc manner that is used to monitor the system, physical or environmental conditions.Sensor nodes are used in WSN with the onboard processor that manages and monitors the environment in a particular area. They are connected to the Base Station which acts as a processing unit in the WSN System. The base Station in a WSN System is connected through the Internet to share data.
This book offers the latest research results on blockchain technology and its application for cybersecurity in cyber-physical systems (CPS). It presents crucial issues in this field and provides a sample of recent advances and insights into the research progress. Practical use of blockchain technology is addressed as well as cybersecurity and cyber threat challenges and issues. This book also offers readers an excellent foundation on the fundamental concepts and principles of blockchain based cybersecurity for cyber-physical systems. It guides the reader through the core ideas with expert ease.Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology, and maybe more so in the future. This book covers various case studies and applications of blockchain in various cyber-physical fields, such as smart cities, IoT, healthcare, manufacturing, onlinefraud, etc.This book is one of the first reference books covering the application of blockchain technology for cybersecurity in cyber-physical systems (CPS). Researchers working in the cybersecurity field and advanced-level students studying this field will find this book useful as a reference. Decision-makers, managers and professionals also working in this field will want to purchase this book.
This book provides in-depth knowledge in the areas of convergence of cloud-IoT technologies and industry 4.0 with society 5.0, machine-to-machine communication, machine-to-person communication, techno-psychological perspective of society 5.0, sentiment analysis of smart digital societies, multi-access edge computing for 5G networks, discovery & location reporting of multi-access edge enabled clients/servers, m-health systems, enhancing the concert of M-health technologies in smart societies, supervising communication services in smart societies, life quality enhancement in smart city societies, multiple disease infection predictions, and societal opinion mining algorithms for smart cities societies using cloud-IoT integrated intelligent machine / deep learning technologies to the readers in the distributive environment. In this book, the authors have mandatorily discussed the implementation of cloud-IoT based machine learning technologies like clustering technique, Naïve Bayes classifier, artificial neural network (ANN), Firefly algorithm, Rough set classifiers, support vector machine classifier, decision tree classifier, ensemble classifier, random forest, and deep learning algorithms to analyze the behavior of intelligent machines and human habits using automated data scheduling and smart digital networks.At present, we live in a self-motivated and dynamic global society where technologies and challenges are unexpectedly changing overnight. These rapid changes in globalization and technological advances are creating new market forces every day. Therefore, day-to-day innovation is essential for any business or institution to survive and flourish in such an atmosphere. Though, innovation is no longer just to create value to do good to individuals, societies, or organizations. The utmost purpose of innovation is to create a smart futuristic society where people can enjoy the best quality of life using natural resources and manmade technologies including cloud-IoT technologies, and industry 4.0. Hence, the innovators and their innovations must search for intelligent solutions to tackle major socio-technical problems and remove barriers of rural, urban and smart city societies.The smart digitization and intelligent implementation of manufacturing development processes are the necessities for today¿s rural, urban, and smart city industries. All types of industries including development, manufacturing, and research are presently shifting from bunch production to customized production. The fast advancements in manufacturing technologies have an in-depth impact on all types of societies including societies of rural areas, urban areas, and smart cities. Industry 4.0 includes the Internet of Things (IoT), Industrial Internet, Smart Manufacturing, Cloud-based computing, and Manufacturing Technologies. The objective of this book is to establish linkage between the Industry 4.0 components and various rural, urban & smart city societies (including society 5.0) to bring actual prosperity where human values, peace of mind, human relations, man-machine-relations, and calmness will have utmost preference. These objectives can be achieved by the integration of human societal values, and social opinion mining (SOM) approaches with the existing technologies.
This proceeding features papers from EAI Mobility IoT 2022 ¿ the 9th International Conference on Mobility, IoT and Smart Cities, which took place December 15-16, 2022, Bratislava, Slovakia and online. The conference focuses on innovative technologies influencing industry and connectivity sectors in industrial, urban, social and sustainable development. The papers cover many topics in mobility, including car manufacturing, e-mobility, smart cities, smart factories (Industry 4.0), smart logistics, social mobility, technological innovations, sustainability, multicultural development, Internet of Things sectors, etc. The papers are applicable to researchers, academics, students, and professionals.
This book focuses on the integration of IoT and computer aided systems for the development of smart buildings. The scope of the book includes, but is not restricted to, advanced technologies for monitoring, energy management, smart gardening, protection, safety, assisted living, and intelligent operations. The authors cover the wide aspects of interconnected smart services with convenient interfacing to the end-users. The features of this book include discussion on various aspects of IoT and computer aided systems for smart architecture designs and innovative object interconnections. The book also provides highlights on the applications of IoT in the development of intelligent structures for technology-enabled lifestyles. Furthermore, it provides prominent scopes for future inventions in the field of electrical engineering, building system management, and computer-aided advancements. The content of this book is useful to graduate and post-graduate students, researchers, and professionals working on the concept of smart building, smart city, and smart environments.
This book provides a hands-on experience in software and hardware engineering of IoT devices in edge and cloud computing systems, by putting in practice state-of-the-art concepts of hardware devices, networking and computing software. It proposes a Network of Things Engineering (NoTE) Lab, with seven hands-on lab modules covering topics ranging from ¿Interfacing sensors and actuators¿ and ¿Connecting IoT and Edge with MQTT" to ¿Data pipelining in cloud computing¿. All tools and software used in the NoTE Lab are free and open source, and available to the readers. Specifically, Arduino-based boards that support a variety of low-cost sensors and actuators are used in IoT context. In edge computing, NoTE Lab implements off-the-shelf single board computers, Raspberry Pis with corresponding software and hardware. For cloud, well-known and widely used cloud computing open-source tools (e.g., Kubernetes) are deployed, where readers can learn the basics of monitoring and managing containersin cloud computing. Three communication protocols are used in the end-to-end setup, including MQTT, AMQP and HTTP. This lab book is a "must experiment with" for anybody in academia and industry participating in the fascinating IoT-edge-cloud continuum development.
This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.
In today¿s digital transformation environments, a rigorous cybersecurity approach to effective risk management ¿ including contingency planning, outlining immediate actions, preparing post-breach responses ¿ is central to defending organizations¿ interconnected computer systems, networks, and infrastructure resources from malicious cyber-attacks.Specifically, cybersecurity technologies, processes, and practices need to be generalized and applied to intrusion detection and prevention measures. This entails analyzing profiles of cyber-attackers and building cyber-attack models for behavior simulation that can effectively counter such attacks. This comprehensive volume aims to cover all essential aspects of cybersecurity in digital transformation and to provide a framework for considering the many objectives and requirements involved. In addition to introducing theoretical foundations, the work also offers practical techniques for defending against malicious cybercriminals.Topics and features:Explores cybersecurity¿s impact on the dynamics of interconnected, complex cyber- and physical systems, infrastructure resources, and networksProvides numerous examples of applications and best practicesConsiders methods that organizations can use to assess their cybersecurity awareness and/or strategyDescribes anomaly intrusion detection, a key tool in thwarting both malware and theft (whether by insiders or external parties) of corporate dataAddresses cyber-attacker profiles, cyber-attack models and simulation, cybersecurity ontology, access-control mechanisms, and policies for handling ransomware attacksDiscusses the NIST Cybersecurity Framework, MITRE Adversarial Tactics, Techniques and Common Knowledge, CIS Critical Security Controls, and the ISA/IEC 62442 Cybersecurity StandardGathering all the relevant information, this practical guide is eminently suitable as a self-study resource for engineers, scientists, computer scientists, and chief information officers. Further, with its many examples of best practices, it can serve as an excellent text for graduate-level courses and research into cybersecurity.Dietmar P. F. Möller, a retired full professor, is affiliated with the Institute for Mathematics at Clausthal University of Technology, Germany. He was an author of several other Springer titles, including Guide to Automotive Connectivity and Cybersecurity.
This book presents the best-selected research papers presented at the 3rd International Conference on Activity and Behavior Computing (ABC 2021), during 20-22 October 2021. The book includes works related to the field of vision- and sensor-based human action or activity and behavior analysis and recognition. It covers human activity recognition (HAR), action understanding, gait analysis, gesture recognition, behavior analysis, emotion, and affective computing, and related areas. The book addresses various challenges and aspects of human activity recognition-both in sensor-based and vision-based domains. It can be considered as an excellent treasury related to the human activity and behavior computing.
This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed.The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized.Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection.Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhängiges Landeszentrum für Datenschutz) in Kiel, Germany.
Cyber security providers are facing a continuous stream of new, sophisticated cyberattacks on cyber critical infrastructures worldwide. These cyberattacks are often triggered by malware and ransomware. This book presents a collection of selected papers addressing malware detection, which is necessary to create reliable and resilient cyber and computer security mechanisms.
Salesforce Field Service (formerly Field Service Lightning) connects customers, workforce, and products on a single platform to deliver exceptional on-site services. This book guides Field Service enthusiasts in creating, managing, and automating support with use cases and real-time examples.You will learn Salesforce Field Service which will help you better manage your customers, internal users, and field technicians. As you advance, yoüll learn the whole end-to-end life cycle of creating work orders, associating service appointments to work orders, scheduling and dispatching service appointments to field technicians, and completing the work orders.By the end of this book, yoüll be able to implement, test and deploy Salesforce Field Service for both Desktop and Mobile apps.What yoüll learn· Basics of Field Service· Field Service objects and data model· Field Service schedulingand optimization· Configuring Salesforce Field Service· Managing Salesforce Field Service capabilities· Configuring and using the Field Service Mobile App· Deploying and testing Salesforce Field Service· Salesforce Field Service KPIs and ReportingWho This Book Is forThis book is for Salesforce admins, developers, and consultants who are looking to learn and implement Salesforce Field Service. A basic understanding of Salesforce is assumed. Coding or programming experience is not required.
If you're working with SAP S/4HANA, you need to know the ins and outs of the system. Master SAP S/4HANA's technical and application architecture with this book! See how the foundation is built: the backend data models, the frontend user experience, the analytics and extension capabilities, integration options, and more. Then learn about SAP S/4HANA's core application areas, from finance to logistics. Finally, see what SAP S/4HANA architecture looks like in the cloud. Get ready to master SAP S/4HANA from the ground up! In this book, you'll learn about:a. Technical Foundation See what makes a modern ERP solution. Learn about SAP S/4HANA's technical backbone, including the underlying programming models. Then walk through core concepts: the SAP Fiori user experience, analytics, intelligent technologies, integration, extensions, and more. b. Business Architecture Explore SAP S/4HANA's line of business landscape. Take a tour of the master data structure and individual application areas like sales, service, sourcing and procurement, logistics, warehouse management, and finance. c. Cloud ConsiderationsPop the hood of SAP S/4HANA Cloud. Discover cloud-specific architecture features, from scoping to outputs to identity and access management. Learn about cloud operations for SAP S/4HANA Cloud and SAP S/4HANA Cloud, private edition.Highlights include:1) Technical and application architecture2) Programming models3) Analytics4) Extensibility5) Integration6) Master data7) Sales and service8) Sourcing and procurement9) Logistics and manufacturing10) Finance and governance11) Identity and access management12) On-premise and cloud
Looking to tap into advanced planning and scheduling? Then this is the book for you! Get detailed guidance for setting up and using PP-DS in SAP S/4HANA. Follow step-by-step instructions for configuring master data, heuristics, planning procedures, data transfer, and detailed scheduling. Then put your system to use: trigger planning runs, evaluate results, perform alert monitoring, and more. With insights into deployment, migration, and advancements in the simplified system, this is the comprehensive guide you need!
This is a short book on purpose. I don't want to overwhelm you with technical detail. I go slow and easy, so you can build up an intuition about what cloud computing really is, one idea at a time.When you finish reading, you'll understand cloud computing. When you hear someone say some new cool thing uses cloud computing, you'll understand exactly what they mean. That's a promise. What you'll learnLeverage cloud computing practices to successfully build a cost-effective cloud environment.Select the most ideal cloud service model, and execute suitable cloud design strategies for your company.Implement cloud computing solutions efficiently and effectively.Use case patterns for cloud models and types.Best practices for adopting cloud computing.You will understand different main cloud computing types such as infrastructure-as-a-service, platform-as-a-service, software-as-a-service. In addition, you will also get an overview of modern cloud computing types such as data-as-a-service, desktop-as-a-service, and function-as-a-service. The book also provides good detail about different cloud deployment models: public cloud, private cloud, hybrid cloud, community cloud, multi-cloud, and multitenancy.
This book constitutes the refereed proceedings of the 8th International Conference on Security Standardisation Research, SSR 2023, held in Lyon, France, on April 22-23, 2023.The papers broadly cover cryptographic techniques, network security, identity management, security processes, standardization procedures, and more in the area of existing and newly developed security standards..
¿This book constitutes the refereed proceedings of the 13th International Conference, on Applications and Techniques in Information Security, ATIS 2022, held in Manipal, India, December 30-31, 2022.The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies.
Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention. Illustriert durch zahlreiche Screenshots von Erpresserschreiben, Darknetseiten & Verhandlungschats. Mit Gastbeiträgen von N. Weyerstall, Dr. Malek und C. Kurtz sowie von betroffenen Unternehmen.Dieses Buch ist mehr als nur eine Notfallanleitung für den eingetretenen Krisenfall. Um die eigene Verteidigung zu planen, lohnt es sich, den Ernstfall gedanklich durchzuspielen.
This edited book covers advances, trends and future opportunities in the security framework of social media-computing. The authors focus on how to protect social media platforms, and present methods for making social media computing more reliable and effective to achieve trusted IoT-based social computing with Blockchain technology.
Ace the AZ 801 exam and master advanced Windows Server and Infrastructure-as-a-Service workload administration with this comprehensive guidePurchase of the print or Kindle book includes a free PDF eBookKey Features:Gain practical knowledge to conquer the AZ-801 certification and tackle real-world challengesLearn to secure Windows Server in on-premises and hybrid infrastructuresLeverage hands-on examples to monitor and troubleshoot Windows Server environmentsBook Description:Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 helps you master various cloud and data center management concepts in detail, helping you grow your expertise in configuring and managing Windows Server in on-premises, hybrid, and cloud-based workloads. Throughout the book, you'll cover all the topics needed to pass the AZ-801 exam and use the skills you acquire to advance in your career.With this book, you'll learn how to secure your on-premises Windows Server resources and Azure IaaS workloads. First, you'll explore the potential vulnerabilities of your resources and learn how to fix or mitigate them. Next, you'll implement high availability Windows Server virtual machine workloads with Hyper-V Replica, Windows Server Failover Clustering, and Windows File Server.You'll implement disaster recovery and server migration of Windows Server in on-premises and hybrid environments. You'll also learn how to monitor and troubleshoot Windows Server environments.By the end of this book, you'll have gained the knowledge and skills required to ace the AZ-801 exam, and you'll have a handy, on-the-job desktop reference guide.What You Will Learn:Understand the core exam objectives and successfully pass the AZ-801 examSecure Windows Server for on-premises and hybrid infrastructures using security best practicesImplement, manage, and monitor Windows Server high availability features successfullyConfigure and implement disaster recovery services using Hyper-V features, Azure Recovery Services, and Azure Site RecoveryExplore how to migrate various servers, workloads, and tools from previous versions of Windows Server to 2022Monitor and troubleshoot Windows Server environments in both on-premises and cloud workloads using Windows Server tools, Windows Admin Center, and Azure servicesWho this book is for:This book is for Cloud and Datacenter Management administrators and engineers, Enterprise Architects, Microsoft 365 Administrators, Network Engineers, and anyone seeking to gain additional working knowledge with Windows Server operating systems and managing on-premises, hybrid and cloud workloads with administrative tools. To get started, you'll need to have a basic understanding of how to configure advanced Windows Server services utilizing existing on-premises technology in combination with hybrid and cloud technologies.
Learn how to use Google Cloud Platform (GCP) and its services to design, build, and deploy applications. This book includes best practices, practical examples, and code snippets written in Java, making it a key resource for developers seeking hands-on experience with GCP. You'll begin with an introduction to GCP services and a review of what Java offers while developing applications for GCP. Next, you'll be walked through how to set up Google App Engine, Google Storage Cloud, and Google Cloud SQL with use cases, as well as application development and deployment. As the book progresses, you'll be exposed to advanced GCP services, deploying and scaling applications on GCP services, and troubleshooting and optimization of Java applications on GCP. The book uses real-world examples to help you understand how GCP services can solve everyday problems.After completing this book, you will understand Google Cloud Platform and its services, and will have the knowledge needed to design, build, and deploy your own applications on GCP using Java.What You'll LearnCreate a GCP project, configure authentication and authorization, and deploy a sample application.Use GCP services to solve common problems and apply them to real-world scenariosImplement GCP services such as Datastore, SQL, and SpannerLeverage GCP tools such as the SDK and Cloud ShellWho This Book Is ForSoftware developers, Cloud architects, and managers looking to design and build applications for Google Cloud Platform. This book is for those with software development experience who are familiar with Java programming. It is also suitable for those new to GCP who have a basic understanding of cloud computing concepts.
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently grown in feasibility thanks to significant advances in ML combined with big data collection and analysis capabilities. Since the use of ML entails understanding which techniques can be best used for specific tasks to ensure comprehensive security, the book provides an overview of the current state of the art of ML techniques for security and a detailed taxonomy of security tasks and corresponding ML techniques that can be used for each task. It also covers challenges for the use of ML for security tasks and outlines research directions. While many recent papers have proposed approaches for specific tasks, such as software security analysis and anomaly detection, these approaches differ in many aspects, such as with respect to the types of features in the model and the dataset used for training the models. In a way that no other available work does, this book provides readers with a comprehensive view of the complex area of ML for security, explains its challenges, and highlights areas for future research. This book is relevant to graduate students in computer science and engineering as well as information systems studies, and will also be useful to researchers and practitioners who work in the area of ML techniques for security tasks.
This book explores the rise of technology-centered urban planning and the diffusion of these practices around the world. Seven axes of urban planning have been selected to highlight how data and technology currently work and how these systems can be improved going forward. Each aspect is explored in its own chapter that combines narrative description, illustrations, and case studies to show how technology currently shapes our cities and how this may impact the urban environments. Topics include infrastructure, mobility, energy use and distribution, work, public health, and knowledge transfer among others. The book also demonstrates how these aspects are tied to and affect the four pillars of sustainability: environment, society, economy, and culture.
This book gathers the latest advances, innovations, and applications in the field of sensing technology, as presented by international researchers and engineers at the 15th International Conference on Sensing Technology (ICST), held in Sydney, Australia on December 5¿7, 2022. Contributions include a wide range of topics such as: vision sensing, sensor signal processing, sensors phenomena and modelling, sensor characterization, smart sensors and sensor fusion, electromagnetic, chemical and physical sensors, electronic nose technology, biosensors, nano sensors, wireless sensors and WSN, Internet of Things, optical sensors, sensor arrays, intelligent sensing, Internet-based and remote data acquisition. The contributions, which were selected by means of a rigorous international peer-review process, present a wealth of exciting ideas that will open novel research directions and foster multidisciplinary collaboration among different specialists.
In May 1917, William and Elizebeth Friedman were asked by the U.S. Army to begin training officers in cryptanalysis and to decrypt intercepted German diplomatic and military communications. In June 1917, Herbert Yardley convinced the new head of the Army¿s Military Intelligence Division to create a code and cipher section for the Army with himself as its head. These two seminal events were the beginning of modern American cryptology, the growth of which culminated 35 years later with the creation of the National Security Agency. Each running their own cryptologic agencies in the 1920s, the Friedman-Yardley relationship was shattered after Yardley published a tell-all book about his time in military intelligence. Yet in the end, the work they all started in 1917 led directly to the modern American intelligence community. As they got older, they became increasingly irrelevant in the burgeoning American cryptologic fraternity. Topics and features:* Examines the lives of three remarkable and pioneering cryptologists* Offers fascinating insights into spies, codes and ciphers, rumrunners, poker, and military history* Sheds new light on interesting parts of the cryptologists¿ careers¿especially Elizebeth Friedman, whose work during World War II has just begun to be explored* Recounts several good stories, i.e., What if the Friedmans had gone to work for Herbert Yardley in his new Cipher Bureau in 1919? What if Yardley had moved back to Washington to work for William Friedman a decade later? This enjoyable book has wide appeal for: general readers interested in the evolution of American cryptology, American historians (particularly of World War I, the inter-war period, and World War II signals intelligence), and historians of¿and general readers interested in¿American military intelligence. It also can be used as an auxiliary text or recommended reading in introductory or survey courses in history or on the related topics.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 ¿ 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing (ICRIC 2021), held on June 8-9, 2021 by Eotvos Lorand University (ELTE), Budapest, Hungary in association with many Universities; WSG Poland, Knowledge University, ERBIL. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.
Elevate your Linux-powered system with Yocto Projects, enhancing its stability and resilience efficiently and economically - now upgraded to the latest Yocto Project versionPurchase of the print or Kindle book includes a free PDF eBookKey Features:- Optimize your Yocto Project tools to develop efficient Linux-based projects- Follow a practical approach to learning Linux development using Yocto Project- Employ the best practices for embedded Linux and Yocto Project developmentBook Description:The Yocto Project is the industry standard for developing dependable embedded Linux projects. It stands out from other frameworks by offering time-efficient development with enhanced reliability and robustness.With Embedded Linux Development Using Yocto Project, you'll acquire an understanding of Yocto Project tools, helping you perform different Linux-based tasks. You'll gain a deep understanding of Poky and BitBake, explore practical use cases for building a Linux subsystem project, employ Yocto Project tools available for embedded Linux, and uncover the secrets of SDK, recipe tool, and others. This new edition is aligned with the latest long-term support release of the aforementioned technologies and introduces two new chapters, covering optimal emulation in QEMU for faster product development and best practices.By the end of this book, you'll be well-equipped to generate and run an image for real hardware boards. You'll gain hands-on experience in building efficient Linux systems using the Yocto Project.What You Will Learn:- Understand the basic Poky workflows concepts along with configuring and preparing the Poky build environment- Learn with the help of up-to-date examples in the latest version of Yocto Project- Configure a build server and customize images using Toaster- Generate images and fit packages into created images using BitBake- Support the development process by setting up and using Package feeds- Debug Yocto Project by configuring Poky- Build an image for the BeagleBone Black, RaspberryPi 4, and Wandboard, and boot it from an SD cardWho this book is for:If you are an embedded Linux developer and want to broaden your knowledge about the Yocto Project with examples of embedded development, then this book is for you. Professionals looking for new insights into working methodologies for Linux development will also find plenty of helpful information in this book.Table of Contents- Meeting the Yocto Project- Baking Our First Poky Based System- Using Toaster to Bake an Image- Meeting the BitBake tool- Grasping the BitBake Tool- Detailing the Temporary Build Directory- Assimilating Packaging Support- Diving into BitBake Metadata- Developing with the Yocto Project- Debugging with the Yocto Project- Exploring External Layers- Creating Custom Layers- Customizing Existing Recipes- Achieving GPL Compliance- Booting Our Custom Embedded Linux- Speeding Up Product Development Through Emulation - QEMU- Best Practices
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.