Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This is a crisp, practical, and hands-on guide to moving mission-critical workloads to Azure. This book focuses on the process and technology aspects of Azure security coupled with pattern-oriented, real-world examples. You will implement modernized security controls, catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentiality and integrity of your infrastructure, applications, and data.The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn how to set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture.After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure.What Will You LearnUnderstand security boundaries required to implement Azure's defense-in-depth security architectureUnderstand Azure Active Directory security modelMaster design patterns relating to network, infrastructure, and softwareAutomate security monitoring with advanced observability and gain practical insights on how this can be implemented with Azure Monitor and Azure SentinelWho Is This Book ForDevelopers and IT consultants/architects who are working on Azure.
Improve the video multimedia services you work on or develop using tools from video service technologies such as Netflix, Disney+, YouTube, and Skype. This book introduces you to the core technologies that enable Metaverse XR (eXtended Reality) services and advanced video multimedia streaming services.First, you'll find out about the current and future trends in Metaverse and video streaming services. XR is a combination of technologies that include MR, AR, VR, voice recognition systems, haptic and 3D-motion UIs, as well as head mounted displays) like Microsoft Hololens 2 and Oculus Quest 2. You'll review metaverse services XR applications and learn more about the core XR feature extraction technologies. With XR capabilities mastered, you can move into the main technologies for video streaming services like Netflix, Disney+, and YouTube. You'll also about video formats, such as H.264, MPEG-4 AVC, H.265, MPEG-5, and MPEG-DASH. As well as online hosting services like content delivery network (CDN), mobile CDN, and Amazon Web Services (AWS). Additional details on content aging and updating operations along with CDN popularity predictions and contents update techniques, such as, Least Recently Used (LRU) and east Frequently Used (LFU) strategies are introduced. All these technologies enable fast, efficient, reliable, and adaptable video streaming services. They also allow for video conferencing services like Zoom, Skype and WebEx. By the time you've finished reading, you'll understand how these technologies converge into the Metaverse and and offer a wide variety of development opportunities for video streaming. What You'll LearnIncorporate core AI techniques and extraction XR algorithmsEnable fast, efficient, and reliable video streaming in your product, service, or appUpdate content with CDN popularity predictionsExplore the Netflix Open Connect CDN model and characteristics Understand the operations of modern video and multimedia systemsBecome a leader in metaverse and video multimedia services and products.Who This Book Is ForDevelopers, product managers, hobbyists, and students interested in learning how Metaverse XR and video streaming work and can be developed.
Learn how to use the features of Visual Studio 2022 and utilize the IDE correctly to make it your one-stop solution for creating quality code. Learn what's new in VS 2022 and explore the existing features of Visual Studio so you can become a more efficient programmer. This revised edition covers the latest features of Visual Studio 2022 and how to use them. The book includes new topics like Subword Navigation, Multi-caret Editing, how to enable Code Cleanup on Save, using breakpoints, and new debugging features such as temporary breakpoints and dependent breakpoints. The book also looks at some of the new Git features such as Multi-repo Support, Comparing Branches, Checkout Commit, and line Staging.Getting Started with Visual Studio 2022 begins with an overview of Visual Studio and explores features such as Visual Studio Live Share, Visual Studio Search, Solution Filters, and Intellicode. The author also provides a look at the different Visual Studio project templates and shows you how to create code snippets, as well as how to manage NuGet and nmp packages. You will also see how to create a cross-platform MAUI application as well as how to use SQLite in an MAUI application. Moving ahead, you will learn how to debug your code using breakpoints to step into specific methods, use data tips, and utilize the Debugger Display attribute. You will then move on to learn unit testing and explore the tools provided by Visual Studio to create and run unit tests. The book also covers source control integration in Visual Studio and how to use GitHub to implement a source control strategy for your projects.What You Will LearnCreate and use code snippets in Visual Studio 2022Use the new debugging features in Visual StudioUtilize diagnostic tools and the Immediate window for code debuggingGenerate unit tests with IntelliTestHarness the new Git features in Visual Studio to make managing source code easierWork with MAUI appsWho This Book Is ForBeginners and software developers working on the .NET stack.
Discover what needs to happen in enterprise-architecture practice-and not just its outcomes, but also the activities from which those outcomes would arise. This book reveals how business and enterprise architects can deliver fast solutions to an always-on-the-go business world.To begin, you'll review a new technique called "e;context-space mapping,"e; which provides a structured method for sense-making across the entire context of an enterprise. Throughout the book, you'll concentrate on the routine practices that underpin each of the architecture disciplines. Working step-by-step through a real 10-day architecture project, this book explores the activities that underpin the strategy, structures and solutions in the real-time turmoil of an enterprise architect's everyday work. You'll explore how and why and when the various documents, artefacts and items of 'theory-stuff' come into the practice - all those mainstream methods, frameworks, models, metamodels and other information sources. In the end, Everyday Enterprise Architecture will help you develop the skills, judgment, and awareness to keep enhancing the value of your architectural projects. What You'll LearnWork on architectures at "e;business-speed"e;Adapt architectures for different tasksGather, use, and manage architectural informationWho This Book Is ForEnterprise and business architects.
This professional guide to Java-based cloud native apps DevOps dives deeper into building and deploying production ready cloud native apps using the increasingly popular open source Eclipse MicroProfile framework, Jakarta EE 10 APIs and the most popular Kubernetes container orchestration tool.After a quick overview of Jakarta EE and MicroProfile, Pro Cloud Native Java EE Apps starts you on your way by walking you through a cloud-native Jakarta EE-based application case study that will be forged piece-by-piece over the course of the book. Next, you'll interject dependencies and data persistence capabilities as microservices to go with the case study app that you are building. Next, you'll employ the REST API using Jakarta REST APIs and the MicroProfile RESTClient. You'll also explore ways to add resilience to your app, keep count with metrics, check on your app's health, secure your app, and test and complete your production-ready cloud-native app. Finally, you'll dive into migrating a monolith to become a production ready cloud-native app. After reading this book, you'll be able to build your own production ready cloud-native Java app using Jakarta EE and MicroProfile. What You Will LearnBuild and deploy a production-ready cloud-native Java app using MicroProfile, Jakarta EE and KubernetesMigrate a monolith app to become a cloud-native appEmploy Jakarta EE APIs such as Persistence, CDI and moreLeverage the MicroProfile frameworkExplore configurations, resilience, metrics, health, security, and more for your cloud-native appsWho This Book Is ForThose software developers and programmers with at least some prior experience using Jakarta EE, MicroProfile. At least some prrior Java experience is expected.
Know how to use the new capabilities and cloud integrations in SQL Server 2022. This book covers the many innovative integrations with the Azure Cloud that make SQL Server 2022 the most cloud-connected edition ever. The book covers cutting-edge features such as the blockchain-based Ledger for creating a tamper-evident record of changes to data over time that you can rely on to be correct and reliable. You'll learn about built-in Query Intelligence capabilities to help you to upgrade with confidence that your applications will perform at least as fast after the upgrade than before. In fact, you'll probably see an increase in performance from the upgrade, with no code changes needed. Also covered are innovations such as contained availability groups and data virtualization with S3 object storage.New cloud integrations covered in this book include Microsoft Azure Purview and the use of Azure SQL for high availability and disaster recovery. The book covers Azure Synapse Link with its built-in capabilities to take changes and put them into Synapse automatically.Anyone building their career around SQL Server will want this book for the valuable information it provides on building SQL skills from edge to the cloud. What You Will LearnKnow how to use all of the new capabilities and cloud integrations in SQL Server 2022Connect to Azure for disaster recovery, near real-time analytics, and securityLeverage the Ledger to create a tamper-evident record of data changes over timeUpgrade from prior releases and achieve faster and more consistent performance with no code changesAccess data and storage in different and new formats, such as Parquet and S3, without moving the data and using your existing T-SQL skillsExplore new application scenarios using innovations with T-SQL in areas such as JSON and time seriesWho This Book Is ForSQL Server professionals who want to upgrade their skills to the latest edition of SQL Server; those wishing to take advantage of new integrations with Microsoft Azure Purview (governance), Azure Synapse (analytics), and Azure SQL (HA and DR); and those in need of the increased performance and security offered by Query Intelligence and the new Ledger
Apply best practices for deploying and administering HCL Workload automation (HWA) to meet the automation requirements of the digitally transformed platform. This book will provide detailed architecture and deployment options to achieve this goal.Workload automation focuses on real-time processing, predefined event-driven triggers, and situational dependencies. It offers centralized control of managing multiple tasks, making it possible to schedule enterprise-wide tasks. You'll see how it supports the timely completion of tasks and is beneficial for processes that need to happen at a specific time or need to occur as a result of another event. HWA increases efficiency, reduces the turnaround time for workflows, and reduces errors along with delays in end-to-end processes. You'll review proven ways to deliver batch optimization and modernization requirements, and see how solutions can be aligned with the DevSecOps delivery model. Workload Automation Using HWA presents information on how to use the tool and has numerous use cases and implementation procedures to guide every workload automation deployment requirement. What You'll LearnAutomate and integrate your complex workload, workflow, and business processes across automation platforms, ERP systems, and business applicationsUnderstand event-driven batch automationPractice alignment of the workload automation solution with the DevSecOps principlesWho This Book Is ForSolution Architects, Infrastructure Architects, Technical Architects, Enterprise Architects, Workload Automation Tool Administrators or SME's, Schedulers, Application owners, Automation Specialists, Service Delivery Managers
Learn to use the Ansible open source IT automation tool to automate your VMware infrastructure. This book contains all of the obvious and not-so-obvious best practices of Ansible automation. Each lesson summarizes a specific use case for the modern VMware infrastructure and is focused on a single module from the most important parameter, including live demo of code and real-life usage.You'll configure the Ansible Controller to interact with VMware infrastructure using the "e;community.VMware"e; Ansible documentation collection and the appropriate Python libraries. Next, learn how to automate the creation of a virtual machine manually and from a template, start and stop using the shutdown and forced-power off a Virtual Machine, take and delete and snapshot, add a new hard disk and expand a currently attached hard disk, as well as gather information for data centers, clusters, host systems, and virtual machines.By the end of this book, you'll be well-versed in efficiently maintaining a VMware infrastructure with Ansible Automation. You'll also be able to save time and reduce manual errors using simple human-readable automation technology.What You'll LearnAutomate your VMware infrastructure using Ansible codeInstall Ansible in operating systems such as RedHat, Ubuntu, Fedora, etc.Write and execute your first Ansible Playbook code Troubleshoot the most common error messagesWho This Book Is For IT professionals of every industry who would like a jargon-free understanding of Ansible technology, including VMware, Linux, and Windows Systems Administrators, DevOps professionals, thought leaders, and infrastructure-as-code enthusiasts.
Discover key information buried in the noise of data by learning a variety of anomaly detection techniques and using the Python programming language to build a robust service for anomaly detection against a variety of data types. The book starts with an overview of what anomalies and outliers are and uses the Gestalt school of psychology to explain just why it is that humans are naturally great at detecting anomalies. From there, you will move into technical definitions of anomalies, moving beyond "e;I know it when I see it"e; to defining things in a way that computers can understand.The core of the book involves building a robust, deployable anomaly detection service in Python. You will start with a simple anomaly detection service, which will expand over the course of the book to include a variety of valuable anomaly detection techniques, covering descriptive statistics, clustering, and time series scenarios. Finally, you will compare your anomaly detection service head-to-head with a publicly available cloud offering and see how they perform.The anomaly detection techniques and examples in this book combine psychology, statistics, mathematics, and Python programming in a way that is easily accessible to software developers. They give you an understanding of what anomalies are and why you are naturally a gifted anomaly detector. Then, they help you to translate your human techniques into algorithms that can be used to program computers to automate the process. You'll develop your own anomaly detection service, extend it using a variety of techniques such as including clustering techniques for multivariate analysis and time series techniques for observing data over time, and compare your service head-on against a commercial service.What You Will LearnUnderstand the intuition behind anomaliesConvert your intuition into technical descriptions of anomalous dataDetect anomalies using statistical tools, such as distributions, variance and standard deviation, robust statistics, and interquartile rangeApply state-of-the-art anomaly detection techniques in the realms of clustering and time series analysisWork with common Python packages for outlier detection and time series analysis, such as scikit-learn, PyOD, and tslearnDevelop a project from the ground up which finds anomalies in data, starting with simple arrays of numeric data and expanding to include multivariate inputs and even time series dataWho This Book Is ForFor software developers with at least some familiarity with the Python programming language, and who would like to understand the science and some of the statistics behind anomaly detection techniques. Readers are not required to have any formal knowledge of statistics as the book introduces relevant concepts along the way.
Get your daily work done efficiently using this comprehensive guide for SQL Server DBAs that covers all that a practicing database administrator needs to know. Updated for SQL Server 2022, this edition includes coverage of new features, such as Ledger, which provides an immutable record of table history to protect you against malicious data tampering, and integration with cloud providers to support hybrid cloud scenarios. You'll also find new content on performance optimizations, such as query pan feedback, and security controls, such as new database roles, which are restructured for modern ways of working. Coverage also includes Query Store, installation on Linux, and the use of containerized SQL.Pro SQL Server 2022 Administration takes DBAs on a journey that begins with planning their SQL Server deployment and runs through installing and configuring the instance, administering and optimizing database objects, and ensuring that data is secure and highly available. Readers will learn how to perform advanced maintenance and tuning techniques, and discover SQL Server's hybrid cloud functionality.This book teaches you how to make the most of new SQL Server 2022 functionality, including integration for hybrid cloud scenarios. The book promotes best-practice installation, shows how to configure for scalability and high availability, and demonstrates the gamut of database-level maintenance tasks, such as index maintenance, database consistency checks, and table optimizations. What You Will LearnIntegrate SQL Server with Azure for hybrid cloud scenariosAudit changes and prevent malicious data changes with SQL Server's LedgerSecure and encrypt data to protect against embarrassing data breachesEnsure 24 x 7 x 365 access through high availability and disaster recovery features in today's hybrid worldUse Azure tooling, including Arc, to gain insight into and manage your SQL Server enterpriseInstall and configure SQL Server on Windows, Linux, and in containers Perform routine maintenance tasks, such as backups and database consistency checks Optimize performance and undertake troubleshooting in the Database EngineWho This Book Is ForSQL Server DBAs who manage on-premise installations of SQL Server. This book is also useful for DBAs who wish to learn advanced features, such as integration with Azure, Query Store, Extended Events, and Policy-Based Management, or those who need to install SQL Server in a variety of environments.
Understand and write programs in Go, a multi-paradigm language with built-in features for concurrent programming. This book enables developers to build software that is simple, reliable, and efficient. It'll also help beginners to start programming Go-based applications.Beginning Go Programming begins by explaining the programming fundamentals of the Go language, including basic syntax, data type and structures, and the use of functions and methods. Next, it covers string formatting, Unicode data handling, and how to use regular expressions in Go. Further, it discusses how to encode and decode JSON formatted data for Go applications, and how to work with HTTP in Go. It concludes by exploring concurrency and covering the most powerful features of Go, as well as tips and tricks related to it. After reading this book and working through its practical examples, you will be ready to begin programming your own Go-based applications.What You Will LearnUnderstand the fundamentals of the Go programming languageMaster the different features of Go and how to implement real-life scenarios using the languageWork with text in Go, such as string formatting and Unicode data handlingWork with HTTP in GoWho This Book Is ForProgrammers and developers looking to learn Go programming language concepts for efficient application building.
Learn to deploy simple and complex applications that are beyond the scope of default Intune application deployment scenarios and limitations. This book will help you deploy applications using a PowerShell script. The book starts with PowerShell Cmdlets to get an understanding of deployment through PowerShell scripts. Next, you will learn how to work with msiexec where you will learn which properties of your MSI can be set and what values can be passed to them, even if you do not know what the properties and values initially are. Further, you will learn how to install and uninstall a Setup.exe and how to determine the silent switches, along with MSI extraction methods. You will then learn detection rules using PowerShell, including how to detect by registry or application version and build numbers as well as using custom PowerShell detection rules. You will then gain an understanding of the location to run the script. Moving forward, you will go through installing a program by calling MSI or Setup.exe using PowerShell and how to handle spaces in the filenames. Following this, you will go through how to deploy the various script types in Intune; whether it is a standard script, or if the whole script is a function or contains functions, or if it has an entry point. Deployment Templates and application preparation in Intune are discussed next, along with the process to create the .Intunewin with the Intune Winapp Util. You will then learn how to uninstall previous applications before a new deployment. You'll also be walked through useful snippets and examples of deployment where you will be able to utilize all the aspects of deployment in Intune discussed in prior chapters. After reading the book, you will be able to manage application deployments and detection rules using PowerShell with Microsoft Intune.What You Will Learn:How to find valid properties and values to use with msiexecUsing PowerShell for detection ruleDeploying using a template for reliable and repeatable deploymentsHow to create the Windows App (Win32) App Who Is This Book For:I.T Professionals who manage application deployments using Microsoft Intune.
Get a hands-on introduction to Transformer architecture using the Hugging Face library. This book explains how Transformers are changing the AI domain, particularly in the area of natural language processing.This book covers Transformer architecture and its relevance in natural language processing (NLP). It starts with an introduction to NLP and a progression of language models from n-grams to a Transformer-based architecture. Next, it offers some basic Transformers examples using the Google colab engine. Then, it introduces the Hugging Face ecosystem and the different libraries and models provided by it. Moving forward, it explains language models such as Google BERT with some examples before providing a deep dive into Hugging Face API using different language models to address tasks such as sentence classification, sentiment analysis, summarization, and text generation.After completing Introduction to Transformers for NLP, you will understand Transformer concepts and be able to solve problems using the Hugging Face library.What You Will LearnUnderstand language models and their importance in NLP and NLU (Natural Language Understanding)Master Transformer architecture through practical examplesUse the Hugging Face library in Transformer-based language modelsCreate a simple code generator in Python based on Transformer architectureWho This Book Is ForData Scientists and software developers interested in developing their skills in NLP and NLU (Natural Language Understanding)
Learn how to automate processes, visualize your data, and improve productivity using Power Apps, Power Automate, Power BI, SharePoint, Forms, Teams, and more. This book will help you build complete solutions that often involve storing data in SharePoint, creating a front-end application in Power Apps or Forms, adding additional functionality with Power Automate, and effective reports and dashboards in Power BI.This new edition greatly expands the focus on Power Apps, Power BI, Power Automate, and Teams, along with SharePoint and Microsoft Forms. It starts with the basics of programming and shows how to build a simple email application in .NET, HTML/JavaScript, Power Apps on its own, and Power Apps and Power Automate in combination. It then covers how to connect Power Apps to SharePoint, create an approval process in Power Automate, visualize surveys in Power BI, and create your own survey solution with the combination of a number of Microsoft 365 tools. You'll work with an extended example that shows how to use Power Apps and SharePoint together to create your own help ticketing system.This book offers a deep dive into Power BI, including working with JSON, XML, and Yes/No data, as well as visualizing learning data and using it to detect inconsistencies between Excel files. You'll also see how to connect to Remedy and to the help system you will have created. Under author Jeffrey Rhodes's guidance, you'll delve into the Power Apps collection to learn how to avoid dreaded "e;delegation"e; issues with larger data sets. Back on applications, you will create a training class sign-up solution to only allow users to choose classes with available seats. Digging deeper into Teams, you'll learn how to send chats, posts, and "e;adaptive cards"e; from Power Automate. Rounding things out, you'll save Forms attachments to SharePoint with Power Automate, create your own "e;Employee Recognition"e; app with all of the Power Platform and Teams, add or edit weekly status reports, and learn how to create reservation and scoring applications.After reading the book, you will be able to build powerful applications using Power Apps, Power Automate, Power BI, SharePoint, Forms, and Teams. What You Will LearnCreate productivity-enhancing applications with Power Apps, Power Automate, SharePoint, Forms, and/or TeamsTransform and visualize data with Power BI to include custom columns, measures, and pivotsAvoid delegation issues and tackle complicated Power Apps issues like complex columns, filtering, and ForAll loopsBuild scheduled or triggered Power Automate flows to schedule Teams Meetings, send emails, launch approvals, and much moreWho This Book Is ForBusiness and application developers.
In introducing the National Security Commission on AI's final report, Eric Schmidt, former Google CEO, and Robert Work, former Deputy Secretary of Defense, wrote: "e;The human talent deficit is the government's most conspicuous AI deficit and the single greatest inhibitor to buying, building, and fielding AI-enabled technologies for national security purposes."e; Drawing upon three decades of leading hundreds of advanced analytics and AI programs and projects in government and industry, Chris Whitlock and Frank Strickland address in this book the primary variable in the talent deficit, i.e., large numbers of qualified AI leaders.The book quickly moves from a case for action to leadership principles and practices for effectively integrating AI into programs and driving results in AI projects. The chapters convey 37 axioms - enduring truths for developing and deploying AI - and over 100 leader practices set among 50 cases and examples, 40 of which focus on AI in national security. Emphasizing its impact and practical nature, LTG (ret.) Ken Tovo, former commander of U.S. Army special forces, characterized the book as "e;the Ranger Handbook for AI implementation!"e;Whether you are a senior or mid-level leader who lacks hands-on experience with AI, or an AI practitioner who lacks leadership experience, this book will equip you to lead AI programs, projects, people, and technology. As the Honorable Robert Work wrote in the foreword: "e;This book is not the last word on leading AI in the national security enterprise, but I believe it is an essential starting point."e;You will:Review axioms or enduring truths at work in six dimensions of AI: program, budget, project, data science, people, and technologyApply best practices-such as decision frameworks, processes, checklists-for leading work in each of the six dimensions.See how the axioms and best practices are contextualized to national security missions.
Learn the Spring Boot 3 micro framework and build your first Java-based cloud-native applications and microservices. Spring Boot is the lightweight, nimbler cousin to the bigger Spring Framework, with plenty of "e;bells and whistles."e; This updated edition includes coverage of Spring Native, which will help you speed up your Spring Boot applications, as well as messaging with Spring Boot, Spring GraphQL, Spring Data JDBC and reactive relational database connectivity (R2DBC) with SQL.This new edition also covers enhancements to actuator endpoints, MongoDB 4.0 support, layered JAR and WAR support, support to build OCI images using Cloud Native Build Packs, changes to the DataSource initialization mechanism, and how bean validation support has moved to a separate spring-boot-validation-starter module. This book will teach you how to work with relational and NoSQL databases for data accessibility using Spring Boot with Spring Data, how to persist data with the Java Persistence APIs (JPA), MyBatis, and much more. You'll learn how to enhance your native cloud or web applications with other APIs such as REST and how to build reactive web applications using Spring Boot with WebFlux. Finally, you'll learn how to test applications using JUnit 5, as well as how to secure and deploy your application or service to cloud providers like Heroku. After reading Beginning Spring Boot 3, you'll have the skills needed to start building your own Spring Boot cloud-native, Java-based applications and microservices with confidence, and to take the next steps in your career. What You Will LearnExplore the Spring Boot 3 micro framework using Spring Native for faster, better performanceBuild cloud-native Java applications and microservices with Spring BootWork with relational and NoSQL databases using Boot with Spring DataCreate reactive web applications using Spring's WebFluxSecure, test, and deploy applications and servicesWho This Book Is ForIT professionals such as cloud architects, infrastructure administrators, and network/cloud operators
In this handy, quick reference book you'll be introduced to several R data science packages, with examples of how to use each of them. All concepts will be covered concisely, with many illustrative examples using the following APIs: readr, dibble, forecasts, lubridate, stringr, tidyr, magnittr, dplyr, purrr, ggplot2, modelr, and more.With R 4 Data Science Quick Reference, you'll have the code, APIs, and insights to write data science-based applications in the R programming language. You'll also be able to carry out data analysis. All source code used in the book is freely available on GitHub.. What You'll LearnImplement applicable R 4 programming language specification featuresImport data with readrWork with categories using forcats, time and dates with lubridate, and strings with stringrFormat data using tidyr and then transform that data using magrittr and dplyrWrite functions with R for data science, data mining, and analytics-based applicationsVisualize data with ggplot2 and fit data to models using modelrWho This Book Is ForProgrammers new to R's data science, data mining, and analytics packages. Some prior coding experience with R in general is recommended.
New programmers start here...this book introduces students or aspiring professionals to the world of computer programming using JavaScript and related technologies. This book doesn't just teach the basics of programming, but also all of the tools that new programmers need to get started, including the basics of making web pages and how the Internet works. Programming for Absolute Beginners offers practice problems, activities, and a host of resources to get new programmers started, plus a large glossary of terms introduced in the book and that a new programmer might encounter when learning on their own. No special software is required; this book will help you regardless of what your computer setup is, and source code will be freely available via GitHub.What You Will LearnHow computers workHow computers communicate over networksHow web pages are built with HTML and CSSHow JavaScript worksHow JavaScript interacts with web pagesIntermediate JavaScript topics such as recursion and scopingUsing JavaScript for network communication Who This Book Is ForAnyone wanting to begin computer programming, including students who need to learn the fundamentals and early professionals who want to go back and revisit the basics.
Small business marketers don't need to understand technical minutia of websites or the high-level social media strategies of national consumer brands. They need to understand how to build successful marketing machines that they can sustain with the resources they have available. This book will help small-business B2B marketers build a strong digital presence that will drive growth. Most B2B buyers are about two-thirds of the way through their purchase process before they are willing to engage with a salesperson. Therefore, having a strong digital presence is the difference between making your prospect's short list and your prospect not even knowing you exist. Most critically, a strong digital presence relies on content written from your audience's perspective. This book provides insight and information about the questions that are critical to their business and that you can help them solve. It is the key to capturing their attention, gaining their trust, and winning their business. Marketing can't work its magic alone. It needs the support of strong branding and must provide support to well-executed sales processes. Marketing for Small B2B Businesses will dive into the relationship between each of these areas. What You'll LearnBuild a website that serves as the hub of your marketingEstablish a content promotion plan that puts your content in front of the right audienceDevelop strategies and tactical plans for finding the channels best suited to your message such as social media and email marketing Create effective content in a timely manner with the resources you have availableTrack what is working and what needs improvement via an analytics platform to consistently produce strong marketing returnsWho This Book Is ForThe primary audience is B2B small business owners and B2B small business marketing leaders.
Diagnose, troubleshoot and repair any type of problems on your PC from startup and file access to cloud services and the issues caused by hybrid-work. This book contains everything you need to know to keep PC systems running optimally, and to repair problems quickly and efficiently.This book provides a deep dive into the Windows OS, detailing what everything is, and how it works. You will learn about the in-built, additional, and third-party tools and utilities you can use to create reliable, robust and secure PC systems.Further, you will learn how to configure Windows 11 so as to avoid problems occurring, and how to support every type of end user, working from home, or in any part of the world, speaking any language, and taking into account other factors such as ability or personal barriers.You will discover the support tools and support ecosystem you can use to create and manage effective support tracking and remote access. You will discover how to get detailed events and reliability information, and how to manage update channels. You will deep dive into Windows 11 operating system and folder structure and learn app and software troubleshooting, process and service troubleshooting, network and internet troubleshooting and hardware and peripherals troubleshooting.Finally, you will learn more advanced troubleshooting techniques like security and encryption troubleshooting and using PowerShell scripting to repair problems. Further, you will also learn how to manually remove malware and ransomware, registry troubleshooting and startup and repair troubleshooting. By the end, you will know how to troubleshoot complex problems and diagnose hardware problems in a PC. You will be able to troubleshoot and repair any type of problem on a Windows 11 PC. What Will You LearnHow to support home and hybrid-workers using their own PCsUsing scripting and PowerShell to troubleshoot and repair systemsManaging networking and internet access to minimize downtimeManaging installation and troubleshoot for updates and patchesWho Is This Book ForIT Pros and system administrators who have to maintain small or large networks of connected PCs locally at their organization, or with hybrid workers.
Almost all web developers today have plenty of experience with building regular web page apps, but a lot of that knowledge doesn't transfer over when it comes to creating browser extensions. This book provides a complete reference for how to build modern browser extensions. Creating and deploying a browser extension is more like building a mobile app than a website. When you start building an extension you'll often find there are a large number of new concepts and idiosyncrasies to wrangle with. This book reveals how to successfully navigate around these obstacles and how to take advantage of the limited resources available. You'll see how a browser extensions work, their component pieces, and how to build and deploy them. Additionally, you'll review all the tricky bits of extension development that most developers have to learn through trial and error. The current transition from manifest v2 to v3 is of special interest, and an entire chapter will be dedicated to this subject. By the end of this book, you will have a rich understanding of what browser extensions are, how they work, all the pitfalls to avoid, and the most efficient ways of building them.What You'll LearnExamine the different components of browser extensions and how they behaveReview common pitfalls developers encounter when building browser extensions and how to avoid themDevelop, deploy, and manage a published browser extensionBuild a browser extension using modern JavaScript frameworksWho This Book Is ForDevelopers tasked with building a supplementary browser extension to go alongside their existing product. This book also targets people that have at least a basic understanding of the fundamentals of web development and wish to quickly understand how they can roll out a browser extension.
If you are asking yourself Why are my engineers unable to deliver?, Why are so many engineers leaving? or Why is our software riddled with bugs?, then you've come to the right place. This book acts as a concise, practical guide on how to lead successful agile projects in a remote environment. The authors draw from industry experience and a wide range of fields and disciplines--from software engineering to criminology and sociology--to teach you how to maintain technical oversight, manage deadlines, and calibrate expectations, while also creating and maintaining a healthy remote work environment. You will gain both practical tips grounded in reality, while learning why such tips work by navigating the background on which they are founded--from Broken Window Theory, Labeling Theory to the Dunning-Kruger. Leadership Paradigms for Remote Agile Development will show you how to avoid the most common mistakes and pitfalls that cause engineering projects to fail while at the same time maintaining high ethical standards. What You'll LearnManage feedback, reduce bureaucracy, create and adapt processes Understand what to look for in new hiresCarve out a solid road to success for any type of software projectWho This Book Is ForAnyone who is in, or wishes to move into, an IT leadership position, such as senior software engineers, founders, engineering managers, or team/tech leads.
This book introduces the Kotlin programming skills and techniques necessary for building applications. You'll learn how to migrate your Java programming skills to Kotlin, a Java Virtual Machine (JVM) programming language.The book starts with a quick tour of the Kotlin language and gradually walks you through the language in greater detail over the course of succeeding chapters. You'll learn Kotlin fundamentals like generics, functional programming, type system, debugging, and unit testing. Additionally, with the book's freely downloadable online appendices, you'll discover how to use Kotlin for building Spring Boot applications, data persistence, and microservices. What You Will LearnLearn the Kotlin language, its functions, types, collections, generics, classes, and moreDive into higher-order functions, generics, debugging, and unit testingApply the fundamentals of Kotlin to Spring Boot Add Hibernate to your Spring Boot application for persistence and data accessibility Take advantage of functional programming available in KotlinWho This Book Is ForJava developers who are new to Kotlin and want to leverage Kotlin, particularly for building Spring Boot apps.
Build solid software with modern and safe concurrency features. Concurrency is one of the hardest problems in computer science. For years, computer scientists and engineers have developed different strategies for dealing with concurrency. However, the original concurrency primitives are complicated and difficult to understand, and even harder to implement.Using the new async/await APIs in Swift, this book will explain how your code can abstract a lot of the complexity with a simpler interface so you never have to deal with concurrency primitives such as semaphores, locks, and threads yourself. This will allow you to write concurrent code that is easier to read, easier to write, and easier to maintain. These new APIs are deeply ingrained into Swift, offering compile-level features that will keep you from writing dangerous concurrent code.You'll start by exploring why concurrency is hard to implement in a traditional system. Explaining the definition of concurrency and what its primitives are will help you understand why they are hard to use correctly. These concepts will become clearer as you work through the sample projects. The book's focus then shifts exclusively to the new APIs, helping you understand how the integration of the system with the language itself makes it easier for you to write concurrent code without overstepping the bounds of the concurrency safe zone.By the end of the book, you'll have a solid foundation for working safely with concurrent code using the new async/await APIs.What You'll LearnUnderstand concurrency and its traditional problems Work with the new async/await API and all its features, from the basic usage and await keywords, to task groups and async sequences.Implement modern and safe concurrent code that you can start using right awayWho This Book Is For Experienced iOS developers at a semi-senior or senior level. Knowledge on the Grand Central Dispatch is a bonus, but not required.
Get inspired to explore the depths of the DevOps field. In today's rapidly transforming world, Infrastructure as Code (IaC) has emerged as an effective approach to maintain, scale, and deploy software systems. This book offers a mixture of foundational IaC concepts and practical examples to give you hands-on experience.You will first gain an understanding of DevOps culture as well as how to adapt to IaC. Introduction to Infrastructure as Code begins by reviewing the innovative features that DevOps in general, and IaC in particular, have to offer for adoption and growth for different verticals. With this solid base established, you will then learn the importance, processes, and outcome of building infrastructure solutions.Authors Sneh Pandya and Riya Guha Thakurta then provide hands-on examples utilizing IaC platforms, open source tools, and essential considerations such as security, scalability, and deployments. Each chapter focuses on one vertical (i.e., foundations, architecture patterns, securing infrastructure, preparing for deployment), how it impacts the DevOps toolchain in a holistic manner, and how it can be used to build solutions specific to that vertical, with a detailed walkthrough of code, environments, and other tools. After completing this book, you'll have launched your own infrastructure solution through an open source stack consisting of platforms and tools such as Terraform, Chef, and Puppet.What You Will LearnUnderstand the fundamentals of DevOps and Infrastructure as CodePrepare for the ever-evolving ecosystem of modular infrastructure and the needs of the futureAvoid potential pitfalls and breakdowns while working with infrastructureBuild scalable and efficient IaC solutions that work at a small, medium, and large scale in a real-life environmentUnderstand and be responsibly aware of security concerns related to the domain, and how to address themWho Is This Book ForBeginners interested in building a career in DevOps as well as professionals looking to gain expertise and advance their career with greater knowledge of IaC. including Technical Product Managers, and Architects.
Web3 is the next evolution for the World Wide Web based on Blockchain technology. This book will equip entrepreneurs with the best preparation for the megatrend of Web3 by reviewing its core concepts such as DAOs, tokens, dApps, and Ethereum.With Web2, much of the valuable data and wealth has been concentrated with a handful of mega tech operators like Apple, Facebook, Google and Amazon. This has made it difficult for startups to get an edge. It has also meant that users have had little choice but to give up their value data for free. Web3 aims to upend this model using a decentralized approach that is on the blockchain and crypto. This allows for users to become stakeholders in the ecosystem. Along with exploring core concepts of Web3 like DAOs, tokens, dApps, and Ethereum, this book will also examine the main categories that are poised for enormous opportunities. They include infrastructure, consumer apps, enterprise apps, and the metaverse. For each of these, I will have use cases of successful companies. How To Create a Web3 Startup covers the unique funding strategies, the toolsets needed, the talent required, the go-to-market approaches, and challenges faced. What You'll LearnWork with the dev stack componentsExamine the success factors for infrastructure, consumer, enterprise, verticals, and the MetaverseUnderstand the risks of Web3, like the regulatory structure and security breachesWho This Book Is ForStartup entrepreneurs and those looking to work in the Web3 industry.
According to the World Economic Forum, creativity is considered to be the third-most-important skill for employees, behind complex problem-solving and critical thinking. This book will help you rethink your creativity and its value in the work life, giving you access to intellectual, emotional, and reputational benefits that were previously unattainable. Based on a collection of interviews and research, this book translates the latest findings on the creative beliefs, confidence, and mindset into digestible thoughts for experts with an itch for improvement and innovation in domains like technology, entrepreneurship, and education. It brings a new perspective to creativity by focusing on how individuals can understand their creativity and what the implications are on what they want to achieve. How to Develop Your Creative Identity at Work is based on the most recent creativity research, which analyzes how creativity plays an important part in the individual's sense of identity. What You'll LearnUnderstand how personal beliefs about the innate creativity are influenced by past experiencesSee how the creator's personality can be shaped through new habits of curiosity, emotional risk-taking and insightEstablish a creative communication style that enables others to navigate smoothly through the challenging moments in a feedback conversationBecome an ambitious person with a sense of meaning in the work you do Identify all the familiar and less familiar in-house creative experts Who This Book Is ForThe primary reader is a knowledgeable expert, in a creative or less creative role, who is curious to bring a better fit between their inner experiences and the external environment. The secondary audience are the experts in roles like learning and development, people and culture change, and team leads who are interested in facilitating a space where employees feel safe to share their original ideas and express their curiosity.
Learn how to program in modern C, from the basics through the advanced topics required for proficiency. This book is the fastest path to C fluency for anyone experienced in a general-purpose programming language. From start to finish, code examples highlight the idioms and best practices behind efficient, robust programs in a variety of areas.The book opens with a thorough coverage of syntax, built-in data types and operations, and program structure. C has quirks and presents challenges, which are covered in detail. The coverage of advanced features is what sets this book apart from others. Among the advanced topics covered are floating-point representation in the IEEE 754 standard; embedded assembly language in C code for overflow detection; regular expressions, assertions, and internationalization; WebAssembly through C; and software libraries for C and other clients. Memory efficiency and safety are the two major challenges in C programming, and you'll explore these challenges through a series of C examples. Arrays and structures, which are the means to high-level data representation, are covered in connection with pointers, which provide efficiency. The book again uses code examples in covering networking and wire-level security; concurrency (multiprocessing and multithreading); instruction-level parallelism; and interprocess communication through shared memory and files, pipes, message queues, and signals. Many books introduce C, but few also explain how to use it properly and optimally. Essential C does just that.What You'll LearnAccelerate your path to C mastery with this book for experienced programmersRefresh your approach to program structure and data typesDive into aggregates and pointers using modern C languageRevisit storage classes and scopeDive into concurrency (multiprocessing and multithreading) and instruction-level parallelismFinish with regular expressions, assertions, signals, locales and more Who This Book Is For Professional programmers or software developers who has prior experience with C or in general wanting an accelerated learning guide to modern C programming language.
Master the tricks and techniques of business analytics consulting, specifically applicable to small-to-medium businesses (SMEs). Written to help you hone your business analytics skills, this book applies data science techniques to help solve problems and improve upon many aspects of a business' operations. SMEs are looking for ways to use data science and analytics, and this need is becoming increasingly pressing with the ongoing digital revolution. The topics covered in the books will help to provide the knowledge leverage needed for implementing data science in small business. The demand of small business for data analytics are in conjunction with the growing number of freelance data science consulting opportunities; hence this book will provide insight on how to navigate this new terrain.This book uses a do-it-yourself approach to analytics and introduces tools that are easily available online and are non-programming based. Data science will allow SMEs to understand their customer loyalty, market segmentation, sales and revenue increase etc. more clearly. Data Science and Analytics for SMEs is particularly focused on small businesses and explores the analytics and data that can help them succeed further in their business. What You'll LearnCreate and measure the success of their analytics projectStart your business analytics consulting careerUse solutions taught in the book in practical uses cases and problems Who This Book Is ForBusiness analytics enthusiasts who are not particularly programming inclined, small business owners and data science consultants, data science and business students, and SME (small-to-medium enterprise) analysts
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS). You will know how to add the highest levels of protection for sensitive data using Always Encrypted to encrypt data also in memory and be protected even from users with the highest levels of access to the database. The book demonstrates actions you can take today to start protecting your data without changing any code in your applications, and the steps you can subsequently take to modify your applications to support implementing a gold standard in data protection.The book highlights work that Microsoft has been doing since 2016 to make encryption more accessible, by making TDE available in the standard edition, and the introduction of Always Encrypted that requires minimal work on your part to implement powerful and effective encryption, protecting your data and meeting regulatory requirements. The book teaches you how to work with the encryption technologies in SQL Server with the express goal of helping you understand those technologies on an intuitive level. You'll come away with a deep level of understanding that allows you to answer questions and speak as an expert. The book's aim is to make you as comfortable in deploying encryption in SQL Server as you would be in driving your car to buy groceries. Those with a data security mindset will appreciate the discussion of how each feature protects you and what it protects you from, as well as how to implement things in the most secure manner. Database administrators will appreciate the high level of detail around managing encryption over time and the effect of encryption on database performance. All readers will appreciate the advice on how to avoid common pitfalls, ensuring that your projects to implement encryption run smoothly.What You Will LearnArchitect an effective encryption strategy for new applicationsRetrofit encryption into your existing applicationsEncrypt data at rest, in memory, and in transitManage key and certificate life cycles, including backup and restoreRecover encrypted databases in case of server failureWork with encryption in cloud-based scenariosWho This Book Is ForDatabase developers, architects, and administrators who want to work with encryption in SQL Server; those who want to maintain encryption whether data is at rest or being transmitted over the network; and those who wish to encrypt their data even when in the server's own memory. Readers should be familiar with SQL Server, but no existing knowledge of encryption is assumed.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.