Udvidet returret til d. 31. januar 2025
Filter
Filter
Sorter efterSorter Populære
  • af Pingcheng Ruan
    528,95 - 662,95 kr.

    This book takes readers through the sensational history of blockchains and their potential to revolutionize database systems of the future. In order to demystify blockchains, the book capitalizes on decades of research and field testing of existing database and distributed systems and applies these familiar concepts to the novel blockchain system. It then utilizes this framework to explore the essential block platform underpinning blockchains, which is often misunderstood as a specific attribute of cryptocurrencies rather than the core of the decentralized system independent of application. The book explores the nature of these decentralized systems, which have no single owner and build robustness through a multitude of stakeholder contributions. In this way, blockchains can build trust into existing systems and thus present attractive solutions for various domains across both academia and industry. Despite this, high-impact and real-world applications of blockchain have yet to be realized outside of cryptocurrencies like Bitcoin. The book establishes how this new data system, if properly applied, can disrupt the sector in much the same way databases did so many years ago. The book explores the fundamental technical limitations that may be preventing blockchain from realizing this potential and how to overcome or mitigate them. Readers who are completely new to blockchains will find this book to be a comprehensive survey of the state of the art in blockchain technology. Readers with some experience of blockchains, for example through developing cryptocurrencies, will likely find the book's database perspective enlightening. Finally, researchers already working with blockchain will learn to identify existing gaps in the design space and explore potential solutions for creating the next generation of blockchain systems.

  • af Vinit Kumar Gunjan
    1.716,95 kr.

    This book examines the cyber risks associated with Internet of Things (IoT) and highlights the cyber security capabilities that IoT platforms must have in order to address those cyber risks effectively. The chapters fuse together deep cyber security expertise with artificial intelligence (AI), machine learning, and advanced analytics tools, which allows readers to evaluate, emulate, outpace, and eliminate threats in real time. The book¿s chapters are written by experts of IoT and machine learning to help examine the computer-based crimes of the next decade. They highlight on automated processes for analyzing cyber frauds in the current systems and predict what is on the horizon. This book is applicable for researchers and professionals in cyber security, AI, and IoT.

  • af Rob Botwright
    383,95 kr.

    Are you ready to master the world of Platform as a Service (PaaS) and supercharge your cloud computing skills? Look no further than the "PaaS Mastery" book bundle - your all-in-one guide to Azure Pipelines, Google Cloud, Microsoft Azure, and IBM Cloud.¿¿¿¿ Book 1: PaaS Mastery: Navigating Azure Pipelines and Beyond· Are you curious about Azure Pipelines and how it can revolutionize your application deployment processes?· This book provides hands-on guidance, best practices, and real-world examples to help you harness the power of Azure PaaS.· Whether you're a developer, IT professional, or decision-maker, you'll unlock the secrets to streamlining your application development and deployment.¿¿¿¿ Book 2: Cloud Powerhouse: Mastering PaaS with Google, Azure, and IBM· Dive into the PaaS offerings of three cloud giants: Google Cloud, Microsoft Azure, and IBM Cloud.· Gain the knowledge to leverage their PaaS platforms effectively and discover how they redefine cloud computing.· This volume equips you with the skills to navigate the diverse cloud ecosystems of these powerhouses.¿¿¿¿ Book 3: Platform as a Service Unleashed: A Comprehensive Guide· Delve deep into the unique features and capabilities of Google Cloud, Microsoft Azure, and IBM Cloud.· This book serves as a valuable reference guide, helping you make informed choices about the platform that aligns best with your organization's needs.· It's an essential resource for anyone looking to maximize the potential of PaaS.¿¿¿¿ Book 4: From Novice to Pro: PaaS Mastery Across Clouds· Ready to go from a PaaS novice to a pro? This book is your ultimate guide.· Explore optimization strategies, learn how to combine multiple cloud platforms, and advance your skills in cloud computing.· Whether you're just starting or looking to enhance your expertise, this volume has you covered.Don't miss this opportunity to become a PaaS expert. Get the "PaaS Mastery" book bundle today and elevate your cloud computing skills to new heights. Your journey to PaaS mastery begins here!

  • af Abassin Sidiq
    1.033,95 kr.

    Discover the next generation of BI with this guide to SAP Analytics Cloud! Get your data into the system and see which data models to use in which situations. Next, learn about stories-how to create visualizations for them, publish them, and enhance them. With expanded information on the analytics designer, analytics catalog, and planning models, this fully updated edition is your one-stop shop for all your SAP Analytics Clouds needs! Highlights include: 1) Data modeling 2) Stories 3) Visualizations 4) Dashboards 5) Financial planning 6) Analytics designer 7) Analytics catalog 8) SAP Digital Boardroom 9) SAP Analytics Hub 10) Data integration 11) Administration

  • af Frank Densborn
    733,95 kr.

    It's time to start your migration to SAP S/4HANA, using this all-in-one resource! Get to know the migration paths, processes, and tools. First, explore on-premise, cloud, and hybrid deployment scenarios. Then, understand the steps involved in new implementations and system conversions. Finally, get step-by-step instructions for all the relevant migration tools. From basic concepts to implementation processes, you'll find everything you need to plan, prepare, and kickstart your SAP S/4HANA migration! Highlights include: 1) Cloud, on-premise, and hybrid scenarios 2) SEAMAP 3) Brownfield migration (system conversion) 4) Greenfield implementation (new implementation) 5) Data migration 6) RISE with SAP 7) Software Update Manager (SUM) 8) SAP Discovery Center 9) SAP AppHaus 10) SAP Business Technology Platform (SAP BTP) 11) SAP S/4HANA Cloud 12) Hyperscalers

  • af Raghu Boddu
    1.288,95 kr.

    Easier audits, protection again fraud, streamlined process controls-this is why you need SAP Process Control in your organization. With this comprehensive guide, see how to implement and configure the solution, from maintaining connectors to defining master data. Follow step-by-step instructions to use control evaluation procedures, report on and remediate ad hoc issues, and automate controls with continuous controls monitoring (CCM). With information on using standard reports, enabling SAP Fiori apps, and adding SAP Financial Compliance Management to your landscape, this SAP Process Control guide has everything you need! Highlights include: 1) Internal controls 2) Governance 3) Configuration 4) Master data 5) Control evaluation 6) Ad hoc issues 7) Continuous controls monitoring (CCM) 8) Policy lifecycle 9) Reporting 10) SAP Fiori 11) SAP Financial Compliance Management

  • af Chuzo Ninagawa
    1.601,95 kr.

    This book describes new energy service controls of VRF (Variable Refrigerant Flow) air-conditioners, i.e., distributed-type air-conditioners for commercial buildings in the near future, in the context of the energy savings for CO2 reduction and the reform of the electric power system. In other words, this book introduces the state-of-the-art technology of the next-generation distributed building air-conditioning energy service system, from IoT cloud control to AI optimal control, as well as standards for the smart grid supply and demand adjustment market. Rather than simple saving energy by On Off operations or shifting set- temperatures, the author proposes technology that sends numerical commands for the air-conditioner inverters directly from the cloud. By using this innovative IoT method, this book describes how to realizes the AI optimal cloud control as a cluster of air-conditioners while machine-learning of each air conditioner's situation.

  • af Dmitry Vostokov
    813,95 kr.

    A pattern language to cover from a small debugging trace to a distributed log with billions of messages from hundreds of computers, thousands of components, threads, and processes.

  • af David Jambor
    543,95 kr.

    Implement, automate, build, operate, and optimize databases and other data-persistent technologies efficiently by leveraging the right set of DevOps best practicesKey Features:Implement core operational capabilities via automated pipelines, including testing and rollbacksCreate infrastructure, deploy software, test execution, and monitor operations using the as-code strategyAutomate common implementation patterns for databases with declarative orchestration frameworksPurchase of the print or Kindle book includes a free PDF eBookBook Description:In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You'll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You'll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you'll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.What You Will Learn:Apply DevOps best practices to data-persistent technologiesGet to grips with architectural-level design and implementationExplore the modern data journey and data modeling with database technologyMaster the operation of large-scale systems with zero-touch automationAchieve speed, resilience, security, and operability at different scalesDesign DevOps teams with end-to-end ownership modelsWho this book is for:This book is for newcomers as well as seasoned SREs, DevOps engineers, and system engineers who are interested in large-scale systems with a heavy focus on data-persistent technologies. Database administrators looking to level up in the world of DevOps will also find this book helpful. Experience with cloud Infrastructure, basic development, and operations will help you get the most out of this book.

  • af Piti Champeethong
    543,95 kr.

    Leverage Azure Pipelines to build, test, monitor, and deploy CI/CD solutions on Azure, AWS, and Flutter mobile apps while integrating with tools like Jenkins and SonarQube using best practicesKey Features:Develop automated end-to-end CI/CD solutions with Azure PipelinesLearn how to implement and configure your pipeline using real-world examples and scenariosGain the skills you need to efficiently develop and deploy your organization's softwarePurchase of the print or Kindle book includes a free PDF eBookBook Description:Continuous integration and continuous delivery (CI/CD) are ubiquitous concepts in modern development. Azure Pipelines is one of the most popular services that you can utilize for CI/CD, and this book shows you how it works by taking you through the process of building and automating CI/CD systems using Azure Pipelines and YAML, simplifying integration with Azure resources and reducing human error.You'll begin by getting an overview of Azure Pipelines and why you should use it. Next, the book helps you get to grips with build and release pipelines, and then builds upon this by introducing the extensive power of YAML syntax, which you can use to implement and configure any task you can think of. As you advance, you'll discover how to integrate Infrastructure as Code tools, such as Terraform, and perform code analysis with SonarQube. In the concluding chapters, you'll delve into real-life scenarios and hands-on implementation tasks with Microsoft Azure services, AWS, and cross-mobile application with Flutter, Google Firebase, and more.By the end of this book, you'll be able to design and build CI/CD systems using Azure Pipelines with consummate ease, write code using YAML, and configure any task that comes to mind.What You Will Learn:Create multiple jobs, stages, and tasks on the Azure DevOps portalUse YAML syntax for Node.js, .NET, Docker, and SQL Server tasksAutomate microservice applications on Azure Kubernetes Service (AKS) clustersDeploy Docker applications on AWS container servicesUse SonarQube and Jenkins for security and artifactsImplement CI/CD on Flutter-based mobile applicationsUtilize Azure Key Vault secrets in Azure PipelinesBuild a Node.js application in Azure Container InstancesWho this book is for:This book is for DevOps engineers, release engineers, SREs, application developers, and sysadmins looking to manage CI/CD using Azure Pipelines with the help of real-world use cases. A clear understanding of cloud computing services on Azure and AWS, DevOps, and CI/CD concepts, along with knowledge of building and deploying web and mobile applications automatically on cloud is assumed.

  • af Steve Suehring
    488,95 kr.

    "How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes? This practical guide helps you answer those questions and more. Author Steve Suehring provides unique content to help practitioners and leadership successfully implement DevOps and DevSecOps. Learning DevSecOps emphasizes prerequisites that lead to success through best practices and then takes you through some of the tools and software used by successful DevSecOps-enabled organizations. You'll learn how DevOps and DevSecOps can eliminate the walls that stand between development, operations, and security so that you can tackle the needs of other teams early in the development lifecycle. This book helps you: Learn why DevSecOps is about culture and processes, with tools to support the processes; Understand why DevSecOps practices are key elements to deploying software in a 24-7 environment; Deploy software using a DevSecOps toolchain and create scripts to assist; Integrate processes from other teams earlier in the software development lifecycle; Help team members learn the processes important for successful software development"--

  • af Rob Botwright
    433,95 kr.

    Unlock the Power of Cloud Infrastructure with "IaaS Mastery" Book Bundle!Are you ready to conquer the dynamic world of cloud infrastructure? Look no further than the "IaaS Mastery: Infrastructure as a Service" book bundle, your comprehensive guide to mastering cloud technology with a focus on the industry's leading providers.Discover What's Inside:Book 1 - IaaS Fundamentals: A Beginner's Guide to Cloud Infrastructure Begin your journey with a solid foundation. Learn the essentials of cloud computing and understand the core principles of Infrastructure as a Service. Perfect for newcomers and those seeking a refresher on cloud basics.Book 2 - Mastering IaaS: Building Scalable Cloud Solutions with AWS and GCE Dive into practical applications with Amazon Web Services (AWS) and Google Cloud Engine (GCE). Gain hands-on experience in creating scalable and resilient cloud solutions using these renowned platforms.Book 3 - Advanced IaaS Architectures: Optimizing Microsoft Azure for Enterprises Elevate your expertise with a deep dive into Microsoft Azure. Explore advanced topics such as high-performance networks, scalable compute solutions, security measures, and automation tailored for enterprise workloads.Book 4 - IaaS Expertise: Harnessing the Power of IBM Cloud for Enterprise Solutions Unleash the potential of IBM Cloud as a tool for enterprise transformation. Discover infrastructure offerings, networking strategies, security features, and advanced automation capabilities. Real-world enterprise success stories provide valuable insights.Why Choose "IaaS Mastery"?· Comprehensive Coverage: From beginner to expert, this bundle covers everything you need to know about IaaS.· Hands-On Experience: Practical examples and real-world scenarios ensure you're ready to apply your knowledge.· Top Cloud Providers: Learn from the best-AWS, GCE, Microsoft Azure, and IBM Cloud.· Enterprise Focus: Equip yourself with skills tailored for the demands of large organizations.· Future-Proof Your Career: Cloud technology is the future; stay ahead of the curve with this invaluable resource.Don't miss this opportunity to become an IaaS expert. Whether you're an IT professional, aspiring cloud enthusiast, or business leader, "IaaS Mastery" empowers you with the knowledge and skills to succeed in the digital age. Purchase the bundle today and embark on your journey to mastering cloud infrastructure!

  • af Rob Botwright
    433,95 kr.

    Unlock the World of Virtualization with the "Virtualization Power Pack: Novice To Ninja"¿¿¿¿ Are you ready to transform your IT skills and career prospects?Introducing the ultimate virtualization bundle that will take you from a novice to a virtualization ninja! The "Virtualization Power Pack" is your gateway to mastering four leading virtualization technologies: VMware, VirtualBox, Parallels Desktop, and Citrix Hypervisor.¿¿¿¿ Book 1 - Virtualization Essentials: A Beginner's Guide to VMware· Begin your journey with a solid foundation in virtualization.· Explore core concepts and dive into VMware, a leading virtualization platform.· Master the fundamentals, install VMware, and create your first virtual machine.· Gain confidence as you tackle common issues and troubleshoot with ease.¿¿¿¿ Book 2 - Mastering VirtualBox: Building and Managing Virtual Environments· Elevate your virtualization skills by delving into VirtualBox, a versatile platform.· Learn to install VirtualBox, create virtual machines, and manage virtual environments.· Unlock the power to handle a wide array of virtualization challenges.· Take your expertise to the next level.¿¿¿¿ Book 3 - Advanced Virtualization with Parallels Desktop: Optimizing for Productivity and Performance· Seamlessly integrate Parallels Desktop with macOS for maximum productivity.· Implement advanced storage management techniques.· Optimize performance to unlock the full potential of virtualization on Apple hardware.· Become a virtuoso in the world of macOS virtualization.¿¿¿¿ Book 4 - Citrix Hypervisor Mastery: Expert Techniques for Virtualization Professionals· Conquer the enterprise-grade Citrix Hypervisor.· Explore advanced storage, networking, and high availability strategies.· Master snapshots, cloning, and backup techniques for large-scale environments.· Rise to the challenge of managing complex virtualization infrastructures.¿¿¿¿ Why Choose the "Virtualization Power Pack"?· Comprehensive Knowledge: Gain expertise in four key virtualization technologies.· Career Advancement: Enhance your IT career prospects and stay competitive in the job market.· Business Optimization: Streamline operations and reduce costs through virtualization.· Versatility: Whether you're a beginner or an expert, this bundle caters to your needs.¿¿¿¿ Bonus: Get access to exclusive resources, updates, and support to ensure your virtualization journey is smooth and successful.¿ Don't miss this opportunity to become a virtualization ninja! Transform your sk

  • af Rob Botwright
    433,95 kr.

    Introducing "IaC Mastery: Infrastructure as Code" - Your Ultimate Guide to Terraform, AWS, Azure, and Kubernetes! Are you ready to unlock the full potential of Infrastructure as Code (IaC) and revolutionize your cloud infrastructure management? Look no further! Dive into the world of IaC with our exclusive book bundle, featuring four comprehensive volumes that will take you from a beginner to an expert in Terraform, AWS, Azure, and Kubernetes.Book 1: Getting Started with IaC· Learn to create, manage, and scale infrastructure as code with Terraform.·   Get hands-on experience with Terraform configuration and syntax.· Start your IaC adventure on the right foot!Book 2: Cloud Infrastructure Orchestration with AWS and IaC· Dive into the world of Amazon Web Services (AWS) and master the art of IaC.· Set up your AWS environment for efficient IaC management.· Orchestrate AWS resources seamlessly and securely!Book 3: Azure IaC Mastery: Advanced Techniques and Best Practices· Explore the Azure cloud ecosystem and elevate your IaC skills.· ¿¿¿¿¿ Dive deep into advanced IaC techniques tailored for Azure.· Master networking, security, and optimization strategies.Book 4: Kubernetes Infrastructure as Code: Expert Strategies and Beyond· Sail into the Kubernetes world and unlock expert strategies.· Learn to manage Kubernetes resources as code.· Discover advanced tactics for scaling and optimizing your clusters.Don't miss out on this opportunity to become an IaC master! Whether you're just starting your IaC journey or looking to enhance your expertise, our book bundle has you covered. Embrace the future of infrastructure management and stay at the forefront of innovation.Get your "IaC Mastery: Infrastructure as Code" book bundle today and embark on a transformative journey to cloud infrastructure excellence. Your future in IaC starts here!

  • af Ahmed M. Anter
    1.703,95 kr.

    This book aims to gather high-quality research papers on developing theories, frameworks, architectures, and algorithms for solving complex challenges in smart healthcare applications for real industry use. It explores the recent theoretical and practical applications of metaheuristics and optimization in various smart healthcare contexts. The book also discusses the capability of optimization techniques to obtain optimal parameters in ML and DL technologies. It provides an open platform for academics and engineers to share their unique ideas and investigate the potential convergence of existing systems and advanced metaheuristic algorithms. The book's outcome will enable decision-makers and practitioners to select suitable optimization approaches for scheduling patients in crowded environments with minimized human errors.The healthcare system aims to improve the lives of disabled, elderly, sick individuals, and children. IoT-based systems simplify decision-making and task automation, offering an automated foundation. Nature-inspired metaheuristics and mining algorithms are crucial for healthcare applications, reducing costs, increasing efficiency, enabling accurate data analysis, and enhancing patient care. Metaheuristics improve algorithm performance and address challenges in data mining and ML, making them essential in healthcare research. Real-time IoT-based healthcare systems can be modeled using an IoT-based metaheuristic approach to generate optimal solutions.Metaheuristics are powerful technologies for optimization problems in healthcare systems. They balance exact methods, which guarantee optimal solutions but require significant computational resources, with fast but low-quality greedy methods. Metaheuristic algorithms find better solutions while minimizing computational time. The scientific community is increasingly interested in metaheuristics, incorporating techniques from AI, operations research, and soft computing. New metaheuristicsoffer efficient ways to address optimization problems and tackle unsolved challenges. They can be parameterized to control performance and adjust the trade-off between solution quality and resource utilization. Metaheuristics manage the trade-off between performance and solution quality, making them highly applicable to real-time applications with pragmatic objectives.

  • af Kashif Naseer Qureshi
    1.992,95 kr.

    This book first discusses cyber security fundamentals then delves into security threats and vulnerabilities, security vigilance, and security engineering for Internet of Everything (IoE) networks. After an introduction, the first section covers the security threats and vulnerabilities or techniques to expose the networks to security attacks such as repudiation, tampering, spoofing, and elevation of privilege. The second section of the book covers vigilance or prevention techniques like intrusion detection systems, trust evaluation models, crypto, and hashing privacy solutions for IoE networks. This section also covers the security engineering for embedded and cyber-physical systems in IoE networks such as blockchain, artificial intelligence, and machine learning-based solutions to secure the networks. This book provides a clear overview in all relevant areas so readers gain a better understanding of IoE networks in terms of security threats, prevention, and other security mechanisms.

  • af HenkJan de Vries
    543,95 kr.

    Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey FeaturesDiscover how to use Okta for complete identity and access management in your organizationExplore agentless desktop single sign-on, multifactor authentication, and lifecycle management for enhanced securityLearn about no-code and low-code automation functionalities, also known as Okta WorkflowsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionIdentity and access management (IAM) is a set of policies and technologies used to ensure an organization's security, by carefully assigning roles and access to users and devices. This book will get you up and running with Okta, an IAM service that can help you manage both employees and customers.The book begins by helping you understand how Okta can be used as an IAM platform, before teaching you about Universal Directory and how to integrate with other directories and apps, as well as set up groups and policies for Joiner, Mover, and Leaver flows.This updated edition helps you to explore agentless desktop single sign-on (SSO) and multifactor authentication (MFA) solutions, and showing how to utilize Okta to meet NIST requirements. The chapters also walk you through Okta Workflows, low-/no-code automation functionalities, and custom API possibilities used to improve lifecycle management. Finally, you'll delve into API access auditing and management, where you'll discover how to leverage Advanced Server Access (ASA) for your cloud servers.By the end of this book, you'll have learned how to implement Okta to enhance your organization's security and be able to use the book as a reference guide for the Okta certification exam.What you will learnGet a clear overview of Okta's advanced featuresIntegrate Okta with directories and applications using hands-on instructionsGet practical recommendations on managing policies for SSO, MFA, and lifecycle managementDiscover how to manage groups and group rules for Joiner, Mover, Leaver events in Okta using examplesManage your Okta tenants using APIs and oversee API access with OktaSet up and manage your organization's Okta environment, ensuring a secure IAM practiceFind out how to extend your Okta experience with Workflows and ASAWho this book is forIf you are an IT consultant, business decision-maker, system administrator, system and security engineer, or anyone looking to use Okta to plan, design, and implement identity and access management solutions, this book is for you. A basic understanding of authentication and authorization is necessary to understand the topics present in this book.Table of ContentsIAM and OktaWorking with Universal DirectoryUsing Single Sign-On for a Great End User ExperienceIncreasing Security with Adaptive Multifactor AuthenticationAutomating Using Lifecycle ManagementCustomizing Your Okta GUIOkta WorkflowsAPI Access ManagementManaging Access with Advanced Server Access

  • af Christian Cachin
    780,95 - 1.217,95 kr.

  • af Bart Mennink
    944,95 kr.

    This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.

  • af Sujeet Shenoi
    1.697,95 - 1.706,95 kr.

  • af Diego Pacheco
    483,95 kr.

    Long path to better systems that last longer and make engineers and customers happierThis book is a comprehensive guide to designing scalable and maintainable software written by an expert. It covers the principles, patterns, anti-patterns, trade-offs, and concepts that software developers and architects need to understand to design software that is both scalable and maintainable.The book begins by introducing the concept of monoliths and discussing the challenges associated with scaling and maintaining them. It then covers several anti-patterns that can lead to these challenges, such as lack of isolation and internal shared libraries.The next section of the book focuses on the principles of good software design, such as loose coupling and encapsulation. It also covers several software architecture patterns that can be used to design scalable and maintainable monoliths, such as the layered architecture pattern and the microservices pattern.The final section of the book guides how to migrate monoliths to distributed systems. It also covers how to test and deploy distributed systems effectively.WHAT YOU WILL LEARN¿ Understand the challenges of monoliths and the common anti-patterns that lead to them.¿ Learn the principles of good software design, such as loose coupling and encapsulation.¿ Discover software architecture patterns that can be used to design scalable and maintainable monoliths.¿ Get guidance on how to migrate monoliths to distributed systems.¿ Learn how to test and deploy distributed systems effectively. WHO THIS BOOK IS FORThis book is for software developers, architects, system architects, DevOps engineers, site reliability engineers, and anyone who wants to learn about the principles and practices of modernizing software architectures. The book is especially relevant for those who are working with legacy systems or want to design new systems that are scalable, resilient, and maintainable.

  • af Agrawal Agrawal
    483,95 kr.

    Harness the power of SAP IBP to forecast demand, optimize supply, and manage inventory with precision. Explore the intricacies of SAP S/4HANA Manufacturing, streamlining production planning, execution, and quality management.

  • af Paul Olushile
    543,95 kr.

    Unlock the power of Linux with this quick-start guide to leveling up your admin skills, packed with clear explanations and hands-on examplesKey FeaturesExplore Linux commands for mounting, file manipulation, and running Linux on the cloudLearn commands for checking and configuring network card statistics, firewall rules, and interfacesUnderstand how to utilize SELinux in keeping systems adequately hardened and avoiding various security risksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe role of a system administrator is ever-evolving, with the Linux command line at its core. This makes Linux command-line mastery an essential skill to demonstrate your ability to efficiently manage and maintain systems efficiently. Essential Linux Commands addresses a diverse range of topics, including package management, file manipulation, networking strategies, system monitoring, and diagnostic tools. Each command is intricately explained to eliminate any ambiguity, ensuring ease of implementation in real-world scenarios.This book explains how to use SELinux to maintain security, run Linux machines on AWS Cloud, and transfer and download files to remote systems. With the help of practical examples and use cases, you'll not only gain a thorough understanding of a command's syntax but also grasp its functional breadth and limitations. The book also explores commands frequently used by system administrators to check network card statistics and firewall rules.Whether you're a beginner or an experienced administrator, this book is an invaluable resource, filling in the gaps in your skill set and helping you improve your skills and expertise in Linux administration.What you will learnExecute commands to launch applications, control services, and change network settingsDevelop your skills to use commands for package management, file manipulation, and networkingGet clear explanations and practical examples for each commandDiscover tips and techniques to use the Linux command line effectivelyGet to grips with troubleshooting common problems and fixing errorsMaster best practices to manage and maintain Linux systemsDevelop expertise in system performance, security, and Linux in the cloudWho this book is forThis book is for system administrators, IT professionals, and students who want to enhance their knowledge of Linux administration and improve their skills in this field. Whether you're just starting out in system administration or have years of experience, this book is an invaluable resource for mastering the Linux command line and becoming a more proficient system administrator. Essential Linux Commands is also well-suited for individuals interested in expanding their Linux know-how and its applications in various industries and environments.Table of ContentsGetting Server up and runningLinux Users&Groups CommandsFile Compression and Archival CommandsFormat and Disk Space commandsLinux Permissions CommandsLinux Mount and Manipulation CommandsFile Content and Conversion CommandsLinux SWAP CommandsLinux Monitoring and Debugging CommandsLinux IPTABLES and Network CommandsFile-Transfer, Download and Managing Log filesExploring Linux SecurityLinux In The Cloud

  • af Hoeteck Wee
    836,95 - 939,95 kr.

  • af Rob Botwright
    433,95 kr.

    Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!What's Inside:¿¿¿¿ Book 1 - Burp Suite Fundamentals: A Novice's Guide to Web Application Security: Dive into the world of web application security and learn the basics of identifying vulnerabilities. Harness the power of Burp Suite to secure your web applications effectively.¿¿¿¿ Book 2 - Mastering Burp Suite: Pen Testing Techniques for Web Applications: Take your skills to the next level with advanced pen testing techniques. Become proficient in leveraging Burp Suite to identify vulnerabilities, execute precise attacks, and secure web applications.¿¿¿¿ Book 3 - Penetration Testing Beyond Web: Network, Mobile & Cloud with Burp Suite: Extend your expertise beyond web applications as you explore network, mobile, and cloud security. Adapt Burp Suite to assess and fortify diverse digital landscapes.¿¿¿¿ Book 4 - Burp Suite Ninja: Advanced Strategies for Ethical Hacking and Security Auditing: Ascend to the status of a security auditing ninja. Learn advanced strategies, customization techniques, scripting, and automation to identify vulnerabilities, craft comprehensive security reports, and develop effective remediation strategies.Why Choose "Burp Suite: Novice to Ninja?"¿¿¿¿¿ Comprehensive Knowledge: Covering web applications, networks, mobile devices, and cloud environments, this bundle provides a 360-degree view of cybersecurity.¿¿¿¿ Expert Guidance: Benefit from insider tips, advanced techniques, and practical insights shared by experienced cybersecurity professionals.¿¿¿¿ Hands-On Learning: Each book offers practical exercises and real-world scenarios, allowing you to apply your knowledge effectively.¿¿¿¿ Four Books in One: Get access to a wealth of information with four comprehensive books, making it a valuable resource for beginners and experts alike.¿¿¿¿ Versatile Skills: Master Burp Suite, one of the most popular tools in the industry, and adapt it to various cybersecurity domains.¿¿¿¿ Career Advancement: Whether you're an aspiring professional or a seasoned expert, this bundle will help you enhance your skills and advance your cybersecurity career.¿¿¿¿ Stay Ahead: Keep up with the ever-evolving cybersecurity landscape and stay ahead of emerging threats.Don't miss this opportunity to become a cybersecurity champion. With the "Burp Suite: Novice to Ninja" bundle, you'll gain the knowledge, skills, and confidence needed to excel in the world of ethical hacking and security auditing. Secure your digital future - get your bundle now!

  • af Rob Botwright
    433,95 kr.

    Introducing the "Cloud Security & Forensics Handbook: Dive Deep into Azure, AWS, and GCP" Book Bundle!¿¿¿¿ Are you ready to master cloud security and forensics in Azure, AWS, and GCP? This comprehensive 4-book bundle has you covered!¿¿¿¿ Book 1: Cloud Security Essentials - Perfect for beginners, this guide will walk you through the fundamental principles of cloud security. You'll learn about shared responsibility models, identity management, encryption, and compliance, setting a solid foundation for your cloud security journey.¿¿¿¿ Book 2: Mastering Cloud Security - Take your skills to the next level with advanced strategies for securing your cloud resources. From network segmentation to DevSecOps integration, you'll discover cutting-edge techniques to defend against evolving threats.¿¿¿¿ Book 3: Cloud Security and Forensics - When incidents happen, you need to be prepared. This book focuses on digital forensics techniques tailored to cloud environments, helping you investigate and mitigate security incidents effectively.¿¿¿¿ Book 4: Expert Cloud Security and Compliance Automation - Automation is the future of cloud security, and this book shows you how to implement it. Learn about security policy as code, compliance scanning, and orchestration to streamline your security operations.¿¿¿¿ With the rapid adoption of cloud computing, organizations need professionals who can navigate the complexities of securing cloud environments. Whether you're new to cloud security or a seasoned expert, this bundle provides the knowledge and strategies you need.¿¿¿¿ Cloud architects, security professionals, compliance officers, and digital forensics investigators will all benefit from these invaluable resources. Stay ahead of the curve and protect your cloud assets with the insights provided in this bundle.¿¿¿¿ Secure your future in the cloud with the "Cloud Security & Forensics Handbook"! Don't miss out-grab your bundle today and embark on a journey to becoming a cloud security and forensics expert.

  • af Jörg Schwenk
    528,95 - 710,95 kr.

    Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in IT security and as a reference guide for Internet security. It describes important Internet standards in a language close to real-world cryptographic research and covers the essential cryptographic standards used on the Internet, from WLAN encryption to TLS and e-mail security. From academic and non-academic research, the book collects information about attacks on implementations of these standards (because these attacks are the main source of new insights into real-world cryptography). By summarizing all this in one place, this useful volume can highlight cross-influences in standards, as well as similarities in cryptographic constructions.Topics and features:* Covers the essential standards in Internet cryptography* Integrates work exercises and problems in each chapter* Focuses especially on IPsec, secure e-mail and TLS* Summarizes real-world cryptography in three introductory chapters* Includes necessary background from computer networks* Keeps mathematical formalism to a minimum, and treats cryptographic primitives mainly as blackboxes* Provides additional background on web security in two concluding chaptersOffering a uniquely real-world approach to Internet cryptography, this textbook/reference will be highly suitable to students in advanced courses on cryptography/cryptology, as well as eminently useful to professionals looking to expand their background and expertise.Professor Dr. Jorg Schwenk holds the Chair for Network and Data Security at the Ruhr University in Bochum, Germany. He (co-)authored about 150 papers on the book's topics, including for conferences like ACM CCS, Usenix Security, IEEE S&P, and NDSS.

  • af Kevin Daimi
    1.121,95 - 1.617,95 kr.

    This book provides an essential compilation of relevant and cutting edge academic and industry work on key Blockchain topics. This book concentrates on a wide range of advances related to Blockchains which include, among others, Blockchain principles, architecture and concepts with emphasis on key and innovative theories, methodologies, schemes and technologies of Blockchain, Blockchain platforms and architecture, Blockchain protocols, sensors and devices for Blockchain, Blockchain foundations, and reliability analysis of Blockchain-based systems.  Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity application experts in the listed fields and edited by prominent cybersecurity applications researchers and specialists.

  • af Bob Chaput
    326,95 kr.

    "This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust."-Paul Connelly, First CISO at the White House and HCA HealthcareThis book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it's time to leverage your ECRM program and cybersecurity strategy in the same way.The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator,including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board's three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate,and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.

  • af Andrew Eliasz
    418,95 kr.

    These days the term Real-Time Operating System (RTOS) is used when referring to an operating system designed for use in embedded microprocessors or controllers. The ¿Real Time¿ part refers to the ability to implement applications that can rapidly responding to external events in a deterministic and predictable manner. RTOS-based applications have to meet strict deadline constraints while meeting the requirements of the application. One way of ensuring that urgent operations are handled reliably is to set task priorities on each task and to assign higher priorities to those tasks that need to respond in a more timely manner.Another feature of real-time applications is the careful design and implementation of the communication and synchronization between the various tasks. The Zephyr RTOS was developed by Wind River Systems, and subsequently open sourced. Its design and implementation are oriented towards the development of time critical IoT (Internet of Things) and IIoT (Industrial Internet of Things) applications, and, consequently it has a rich feature set for building both wireless and wired networking applications. However, with a rich feature set comes a fairly steep learning curve.This book covers the foundations of programming embedded systems applications using Zephyr's Kernel services. After introducing the Zephyr architecture as well as the Zephyr build and configuration processes, the book will focus on multi-tasking and inter-process communication using the Zephyr Kernel Services API. By analogy with embedded Linux programming books, this book will be akin a Linux course that focuses on application development using the Posix API. In this case, however, it will be the Zephyr Kernel Services API that will be the API being used as well as the Posix API features supported by Zephyr.What Yoüll learnAn Overview of the Cortex-M Architecture.Advanced data structures and algorithms programming (linked lists, circular buffers and lists).How to build Zephyr Applications, including setting up a Command Line Zephyr Development Environment on Linux.Task scheduling and pre-emption patterns used in Real Time Operating Systems.Scheduling, Interrupts and Synchronization, including threads, scheduling, and system threads.Overview of Symmetric Multiprocessing (SMP) and Zephyr support for SMP. Memory management, including memory heaps, memory slabs, and memory pools.Who This Book Is ForEmbedded Systems programmers, IoT and IIoT developers, researchers, BLE application developers (Industrial Control Systems, Smart Sensors, Medical Devices, Smart Watches, Manufacturing, Robotics). Also of use to undergraduate and masters in computer science and digital electronics courses.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.