Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Embark on a transformative journey into the world of Pester and elevate your PowerShell scripting to new heights of robustness, reliability, and efficiency. This comprehensive beginner's guide provides a hands-on approach to PowerShell testing using Pester, empowering you to enhance your code quality with confidence.The book starts with an introduction to Pester, the powerful testing and mocking framework for PowerShell. You'll gain a solid foundation by exploring Pester's fundamental building blocks. The book guides you through the phases of Pester, helping you write your initial Pester code. You will dive into topics such as tags, assertions with Should and parameter filters, and you will explore advanced techniques such as Test Drive and Test Registry.You will discover the art of mocking in Pester and master its advanced testing methodologies. You will gain insights into working without installed modules and seamlessly integrating Pester with Azure DevOps Pipeline for a streamlined testing process.After reading this book, you will have the knowledge and skills to initiate your own exploration into PowerShell testing with Pester. You will transform your scripts into reliable powerhouses, ensuring the resilience and quality of your PowerShell code. What Will You LearnBuilding blocks and phases of PesterWriting effective Pester testsAssertions, mocking, and advanced testing techniquesIntegration with Azure DevOpsTags, code coverageWho This Book Is ForPowerShell scripters and Pester Framework beginners
The modern digital landscape presents many threats and opportunities, necessitating a robust understanding of cybersecurity. This book offers readers a broad-spectrum view of cybersecurity, providing insights from fundamental concepts to advanced technologies. Beginning with the foundational understanding of the ever-evolving threat landscape, the book methodically introduces many cyber threats. From familiar challenges like malware and phishing to more sophisticated attacks targeting IoT and blockchain, readers will gain a robust comprehension of the attack vectors threatening our digital world.Understanding threats is just the start. The book also delves deep into the defensive mechanisms and strategies to counter these challenges. Readers will explore the intricate art of cryptography, the nuances of securing both mobile and web applications, and the complexities inherent in ensuring the safety of cloud environments. Through meticulously crafted case studies tailored for each chapter, readers will witness theoretical concepts' practical implications and applications. These studies, although fictional, resonate with real-world scenarios, offering a nuanced understanding of the material and facilitating its practical application.Complementing the knowledge are reinforcement activities designed to test and solidify understanding. Through multiple-choice questions, readers can gauge their grasp of each chapter's content, and actionable recommendations offer insights on how to apply this knowledge in real-world settings. Adding chapters that delve into the intersection of cutting-edge technologies like A.I. and cybersecurity ensures that readers are prepared for the present and future of digital security. This book promises a holistic, hands-on, and forward-looking education in cybersecurity, ensuring readers are both knowledgeable and action-ready.What You Will Learn: The vast array of cyber threats, laying the groundwork for understanding the significance of cybersecurity.Various attack vectors, from malware and phishing to DDoS, giving readers a detailed understanding of potential threats.Delve into the psychological aspect of cyber threats, revealing how humans can be manipulated into compromising security.An in-depth look at how information is encrypted and decrypted to preserve its integrity and confidentiality.The essential techniques and technologies that safeguard data while it's being transferred across networks.Strategies and methods to protect online applications from threats.How to safeguard data and devices in an increasingly mobile-first world.Demystify the complexities of cloud environments, offering tools and strategies to ensure data safety.The science behind investigating and analyzing cybercrimes post-incident.How to assess system vulnerabilities and how ethical hacking can identifyweaknesses.Who this book is for: CISOs, Learners, Educators, Professionals, Executives, Auditors, Boards of Directors, and more.
This book is a comprehensive learning guide tailored for professionals who primarily work as non-coders within the Salesforce ecosystem. By providing clear and practical insights, it serves as a roadmap to inspire individuals, regardless of their coding background, to embark on a systematic journey towards acquiring programming skills while navigating the Salesforce platform. This understanding of programming fundamentals is not only valuable for professional growth but also to cover exam preparation for certification as a Salesforce Developer I. Because it includes materials and practical code examples specifically tailored to the exam preparation. In addition the book equips readers with the practical knowledge and confidence to leverage potential of Salesforce's capabilities.This book covers a range of important topics, including Salesforce platform fundamentals and architecture, automatization tools, Apex as a programming language with code examples like triggers, methods, SOQL, SOSL, testing, Lightning web components, deployment tools, and various other subjects, including declarative programming methods by using Flow. Many of these topics are interconnected with relevant code examples or explanations tailored for the Developer I exam as well.Due to retirement and replacement of Workflow and Process Builder with Flow as a more universally applicable declarative tool in recent releases, it is essential to offer an integrated understanding of this context in relation to Apex programmatic methods. It helps for a better understanding of choosing the right methods and tools in certain use cases. Additionally, it's important to provide code examples and explain the structure to help beginners grasp the new Lightning Web Components (LWC) framework as a separate part from the classic Apex methodology.What you will learnValuable insights into Salesforce Apex programming and Lightning Web Components in a straightforward and structured manner.Detailed explanations alongside numerous code examples tailored for non-coders.Salesforce platform fundamentals, the structure of Apex and Lightning Components, and declarative programming, alongside an overview of the capabilities provided by native Salesforce and additional tools. Who This Book is for: Based on estimates, Salesforce Developer Edition (available for free) has a user base of approximately three million individuals. This diverse group includes not only developers but also a significant number ofother users, such as certified Salesforce professionals who do not code. Included are administrators, consultants, marketers, and more. This audience is typically interested in various resources for preparing for the Developer I certification exam. Further, a substantial portion of additional user group comprises individuals who may not currently be assignedto Developer Edition but actively engaged with another Salesforce clouds and seeking additionalguidance and information.
This book is your comprehensive introduction to Project Helidon, Oracle's Java-based microservices framework for building cloud-native applications. The book introduces the two flavors of Helidon--Helidon SE and Helidon MP--and shows how to quickly build applications with each one. The book begins by placing the Helidon framework in context and explaining the MicroProfile and Jakarta EE specifications that underlie the building of microservices-based applications. From there, you will learn about the individual components of Helidon SE and Helidon MP, and you will see examples of building applications for both flavors, and for MicroProfile and Jakarta EE. Finally, the book shows how to convert Helidon applications from Java bytecode into native binaries for instant application startup and peak performance. What You Will LearnChoose correctly between Helidon SE and Helidon MPCreate starter applications using the Helidon SE and Helidon MP quick startsCreate server and client applications with Helidon SE componentsCreate a microservices-based application with the MicroProfile specificationsCreate a database application with the Jakarta NoSQL specificationGenerate native code with GraalVM for faster application startup timeWho This Book Is ForJava developers who create microservices applications; those interested in building such applications using the Helidon framework; and developers of microservices applications who want functionality such as native-image support through GraalVM, compatibility with MicroProfile, easy connectivity to database engines, and support for reactive development patterns
Master the art of automated testing using Selenium with Java in this comprehensive guide. Whether you're a beginner or an experienced tester, the book equips you with the knowledge and techniques to build robust and maintainable test suites, ensuring the quality and reliability of your web applications. This book starts introducing the basics of automated testing and the importance of Selenium. It then covers the setup and configuration of the Selenium WebDriver in Java, providing a solid foundation for your testing environment. You'll learn essential aspects of Selenium testing in Java, including working with different browsers, locating web elements using locators, and performing actions on them. From there, you'll explore how to handle dynamic web pages and effective wait mechanisms and verifications to ensure accurate and reliable test results. The book also guides you in setting up Selenium in Java for continuous integration and emphasizes best practices for test codeorganization and maintainability, such as the Page Object Model (POM) and structuring test suites effectively. By the end, you'll have the expertise to address advanced scenarios, such as working with iframes, and know how TestNG enhances Selenium automation, enabling structured tests, data-driven insights, and swift parallel executions. Throughout the book, you'll benefit from real-world examples and practical exercises that reinforce the concepts. The clear explanations and step-by-step guidance make it easy to follow along and apply the knowledge to your own testing projects. What You Will Learn Understand the fundamentals of automated testing and the role of Selenium in web application testing Set up the Selenium WebDriver in Java and configure the testing environment Work with different web browsers and their drivers to perform cross-browser testing Identify and locate web elements using various locators, such as IDs, class names, CSS selectors, and XPath expressions Perform actions on web elements, such as clicking buttons, entering text, submitting forms, and navigating through web pages Handle dynamic pages by implementing effective wait mechanisms, including implicit waits, explicit waits, and fluent waits Verify and assert expected conditions and outcomes using assertions and verification techniques provided by Selenium in Java Apply best practices for test code organization and maintainability, including using the Page Object Model (POM) design pattern Handle advanced scenarios, such as working with iframes, and elevating Selenium automation through TestNG's structured frameworks, data utilization, and parallel processing Who This Book For Software testers, quality assurance professionals, and developers interested in mastering automated testing with Selenium and Java. Suitable for various experience levels. Offers practical insights and techniques to automate web application testing accurately and reliably. Benefits testers, developers, and individuals familiar with Java and web testing, empowering them to write robust, maintainable test code and integrate Selenium seamlessly into their workflows.
Learn the principles of good software design and then turn those principles into great code. This book introduces you to software engineering -- from the application of engineering principles to the development of software. You'll see how to run a software development project, examine the different phases of a project, and learn how to design and implement programs that solve specific problems. This book is also about code construction -- how to write great programs and make them work. This new third edition is revamped to reflect significant changes in the software development landscape with updated design and coding examples and figures. Extreme programming takes a backseat, making way for expanded coverage of the most crucial agile methodologies today: Scrum, Lean Software Development, Kanban, and Dark Scrum. Agile principles are revised to explore further functionalities of requirement gathering. The authors venture beyond imperative and object-oriented languages, exploring the realm of scripting languages in an expanded chapter on Code Construction. The Project Management Essentials chapter has been revamped and expanded to incorporate "SoftAware Development" to discuss the crucial interpersonal nature of joint software creation. Whether you're new to programming or have written hundreds of applications, in this book you'll re-examine what you already do, and you'll investigate ways to improve. Using the Java language, you'll look deeply into coding standards, debugging, unit testing, modularity, and other characteristics of good programs. You Will Learn Modern agile methodologies How to work on and with development teams How to leverage the capabilities of modern computer systems with parallel programming How to work with design patterns to exploit application development best practices How to use modern tools for development, collaboration, and source code controls Who This Book Is For Early career software developers, or upper-level students in software engineering courses
This book teaches you how to evaluate a distributed system from the perspective of immutable objects. You will understand the problems in existing designs, know how to make small modifications to correct those problems, and learn to apply the principles of immutable architecture to your tools. Most software components focus on the state of objects. They store the current state of a row in a relational database. They track changes to state over time, making several basic assumptions: there is a single latest version of each object, the state of an object changes sequentially, and a system of record exists.This is a challenge when it comes to building distributed systems. Whether dealing with autonomous microservices or disconnected mobile apps, many of the problems we try to solve come down to synchronizing an ever-changing state between isolated components. Distributed systems would be a lot easier to build if objects could not change.After reading The Art of Immutable Architecture, you will come away with an understanding of the benefits of using immutable objects in your own distributed systems. You will learn a set of rules for identifying and exchanging immutable objects, and see a collection of useful theorems that emerges and ensures that the distributed systems you build are eventually consistent. Using patterns, you will find where the truth converges, see how changes are associative, rather than sequential, and come to feel comfortable understanding that there is no longer a single source of truth. Practical hands-on examples reinforce how to build software using the described patterns, techniques, and tools. By the end of the book, you will possess the language and resources needed to analyze and construct distributed systems with confidence. The assumptions of the past were sufficient for building single-user, single-computer systems. But as we expand to multiple devices, shared experiences, and cloud computing, they work against us. It is time for a new set of assumptions. Start with immutable objects, and build better distributed systems. What You Will LearnEvaluate a distributed system from the perspective of immutable objects Recognize the problems in existing designs, and make small modifications to correct them Start a new system from scratch, applying patternsApply the principles of immutable architecture to your tools, including SQL databases, message queues, and the network protocols that you already use Discover new tools that natively apply these principles Who This Book Is ForSoftware architects and senior developers. It contains examples in SQL and languages such as JavaScript and C#. Past experience with distributed computing, data modeling, or business analysis is helpful.
This guide covers the fundamental technical principles and various business applications of Generative AI for planning, developing, and evaluating AI-driven products. It equips you with the knowledge you need to harness the potential of Generative AI for enhancing business creativity and productivity.The book is organized into three sections: text-based, senses-based, and rationale-based. Each section provides an in-depth exploration of the specific methods and applications of Generative AI. In the text-based section, you will find detailed discussions on designing algorithms to automate and enhance written communication, including insights into the technical aspects of transformer-based Natural Language Processing (NLP) and chatbot architecture, such as GPT-4, Claude 2, Google Bard, and others. The senses-based section offers a glimpse into the algorithms and data structures that underpin visual, auditory, and multisensory experiences, including NeRF, 3D Gaussian Splatting, Stable Diffusion, AR and VR technologies, and more. The rationale-based section illuminates the decision-making capabilities of AI, with a focus on machine learning and data analytics techniques that empower applications such as simulation models, agents, and autonomous systems.In summary, this book serves as a guide for those seeking to navigate the dynamic landscape of Generative AI. Whether you're a seasoned AI professional or a business leader looking to harness the power of creative automation, these pages offer a roadmap to leverage Generative AI for your organization's success.What You Will LearnWhat are the technical elements that constitute the makeup of Generative AI products?What are the practical applications of Generative AI?How can algorithms be designed to automate and improve written communication?What are the latest Generative AI architectures and algorithms?Who This Book Is ForData scientists, data analysts, decision makers, and business executives interested in gaining an understanding of Generative AI products
Data science is expanding across industries at a rapid pace, and the companies first to adopt best practices will gain a significant advantage. To reap the benefits, decision makers need to have a confident understanding of data science and its application in their organization. This third edition delves into the latest advancements in AI, particularly focusing on large language models (LLMs), with clear distinctions made between AI and traditional data science, including AI's ability to emulate human decision-making. Author Stylianos Kampakis introduces you to the critical aspect of ethics in AI, an area of growing importance and scrutiny. The narrative examines the ethical considerations intrinsic to the development and deployment of AI technologies, including bias, fairness, transparency, and accountability. You'll be provided with the expertise and tools required to develop a solid data strategy that is continuously effective. Ethics and legal issues surrounding data collection and algorithmic bias are some common pitfalls that Kampakis helps you avoid, while guiding you on the path to build a thriving data science culture at your organization. This updated edition also includes plenty of case studies, tools for project assessment, and expanded content for hiring and managing data scientists. Data science is a language that everyone at a modern company should understand across departments. Friction in communication arises most often when management does not connect with what a data scientist is doing or how impactful data collection and storage can be for their organization. The Decision Maker's Handbook to Data Science bridges this gap and readies you for both the present and future of your workplace in this engaging, comprehensive guide. What You Will Learn Integrate AI with other innovative technologies Explore anticipated ethical, regulatory, and technical landscapes that will shape the future of AI and data scienceDiscover how to hire and manage data scientistsBuild the right environment in order to make your organization data-driven Who This Book Is For Startup founders, product managers, higher level managers, and any other non-technical decision makers who are thinking to implement data science in their organization and hire data scientists. A secondary audience includes people looking for a soft introduction into the subject of data science.
This book is a comprehensive guide for those navigating through the complexities of enterprise software development. For fresh graduates, transitioning from college projects to real-world applications can be overwhelming. This book acts as a roadmap, helping you bridge the gap and become industry-ready. It's like an intensive internship in book form, equipping readers with the skills and knowledge needed for modern tech roles.But it's not just for newcomers. Even experienced developers can get caught up in old routines and miss out on new tools and techniques. With the rise of AI and automation tools like ChatGPT and Copilot, the development landscape is rapidly changing. The core of "CodeMosaic" revolves around practical application. Using .NET, Angular, and other Microsoft technologies as foundational pillars, you'll embark on a hands-on journey. From understanding the basics to crafting a Global Events Dashboard, CodeMosaic offers a holistic learning experience. By the end, you won't just be a developer; you'll be well-equipped to tackle the challenges of today's digital world.What You'll LearnAgile methodologies and Azure DevOps for streamlined project management.Gain a thorough understanding of smart development from design to deployment.Master software development with .NET and Angular, along with effective version control using Git.Enhance your coding and design skills using GitHub Copilot, GPT technologies, and AI-driven prompt engineering.Who This Book Is For Experienced developers looking for new tools and techniques, and recent graduates, transitioning from college projects to real-world applications.
Gain a theoretical understanding to the most popular libraries in deep reinforcement learning (deep RL). This new edition focuses on the latest advances in deep RL using a learn-by-coding approach, allowing readers to assimilate and replicate the latest research in this field. New agent environments ranging from games, and robotics to finance are explained to help you try different ways to apply reinforcement learning. A chapter on multi-agent reinforcement learning covers how multiple agents compete, while another chapter focuses on the widely used deep RL algorithm, proximal policy optimization (PPO). You'll see how reinforcement learning with human feedback (RLHF) has been used by chatbots, built using Large Language Models, e.g. ChatGPT to improve conversational capabilities.You'll also review the steps for using the code on multiple cloud systems and deploying models on platforms such as Hugging Face Hub. The code is in Jupyter Notebook, which canbe run on Google Colab, and other similar deep learning cloud platforms, allowing you to tailor the code to your own needs. Whether it's for applications in gaming, robotics, or Generative AI, Deep Reinforcement Learning with Python will help keep you ahead of the curve.What You'll LearnExplore Python-based RL libraries, including StableBaselines3 and CleanRL Work with diverse RL environments like Gymnasium, Pybullet, and Unity MLUnderstand instruction finetuning of Large Language Models using RLHF and PPOStudy training and optimization techniques using HuggingFace, Weights and Biases, and Optuna Who This Book Is ForSoftware engineers and machine learning developers eager to sharpen their understanding of deep RL and acquire practical skills in implementing RL algorithms fromscratch.
Take a high-level tour of SAP oDATA integrations with frontend technologies like Angular using the SAP Mobile Services Platform. This book will give you a different perspective on executing SAP transactions on iOS using Angular instead of SAP-provided Fiori-based applications. You'll start by learning about SAP supply chain processes such as Goods Receipt, Transfer Posting, Goods Issue, and Inventory Search. You'll then move on to understanding the thought process involved in integrating SAP's backend (SAP ECC) with Angular iOS app using SAP Mobile Services running on SAP BTP. All this will serve as a guide tailored to SAP functional and technical consultants actively engaged in client-facing roles. You'll follow a roadmap for modernizing and streamlining supply chain operations by leveraging Angular iOS apps. Digital Transformation of SAP Supply Chain Processes provides the essential tools for businesses looking to stay competitive in today's technology-driven landscape. What You Will Learn Study the fundamental procedures to set up the Authorization Endpoint, Token Endpoint, and base URL within SAP Mobile Services.Manage attachments in mobile applications and store them in an external content repository. Gain proficiency in testing OData services using the POSTMAN API client with OAuth protocol.Acquire knowledge about the JSON messages, CORS protocol, and X-CSRF token exchange.Link Zebra Printers through the Zebra Native Printing app on iOS App to print SAP forms on mobile printers. Who This Book Is For SAP Consultants with an interest in the Digital Transformation of SAP Supply Chain Processes to iOS-based SAP transactions.
Take a 360 degree tour of the engineering manager's role and responsibilities. This book brings them to life with practical scenarios and references, and ensures their relevance to your daily work.From upkeeping technical skills, to managing people and stakeholders, to ensuring timely deliverables, the job of the engineering manager is fast-paced, complex, and often short on learning resources. Fear not, this book has you covered with tips on managing evolving processes, delivering impactful projects in a timely manner, setting goals and priorities among product and technical initiatives, and helping your team focus and deliver.The Complete Engineering Manager will leave you with a broader perspective and deeper skill set to apply to engineering management. What You Will LearnBuild a compelling roadmap with your product manager and set strategy, direction, and goals with your teamIdentify what's working and not working for your engineering teamEvolve your team's development, delivery, and technical processes to improve their efficiency Recognize priorities that matter the most for you, your team, and your organizationPrioritize aggressively between product and technical initiativeAdopt modern engineering management practices such as utilizing AIWho This Book is ForNew, aspiring, and experienced engineering managers who are looking for resources to address challenges in their role.
Technical debt is an often-overlooked problem that the software industry needs to take more seriously. All organizations are impacted by it, most wish that they had less of it, but need help in understanding the nature of the beast. This book aims to clear up any misconceptions and show you how to implement a sound technical debt management program to suit your company's needs.You'll learn the greatest challenge in solving the technical debt dilemma is not to find solutions to it, but rather to find solutions to the human and organizational issues that lead to that debt. For example, convincing senior stakeholders of the importance of addressing technical debt, getting stakeholders to acknowledge how their actions lead to unintentional debt, and enabling teams to prioritize technical debt over short-term goals. Therefore, this book is divided into three parts: defining technical debt, understanding technical debt, and tackling technical debt. It begins by explaining why technical debt should not be considered a technical problem, but rather a problem of how trade-off decisions are made. You'll then examine how making decisions using the affect heuristic, more commonly known as a "gut feeling," can lead to unnecessary technical debt, followed by some techniques for combating your vulnerability to this trap.Reducing your organization's level of technical debt is not easy. Taming Your Dragon will show you how to implement a technical debt management program.What You Will LearnReview a new paradigm that based on technical debt being a combination of trade-off problems and system problemsUnderstand the many ways that technical debt adversely affects an organization's ability to deliver IT changeCreate an effective process for addressing technical debtSee why analogies are importantWho This Book Is For Software teams supporting DevOps, managers, and other business stakeholders looking to implement a technical debt management program.
The interest in sustainability and environmental, social, and governance (ESG) from stakeholders across all sectors is growing and will continue to do so as we are in the most pivotal decade for meeting the global goals on climate change and sustainable development. This book is a compendium of the international agreements, regulatory advancements, and current practicum to inform a 360-degree viewpoint of the organizations, frameworks, and stakeholders that shape the evolving landscape.Written in a straightforward and conversational tone, yoüll embark on a knowledge journey on the progression of ESG and sustainability and how it directly shapes and informs current practice. The book provides insights, discussion, and topical briefings as a side-by-side reader to accompany the rise of ESG and sustainability in business and the markets. You will learn about the origins of sustainability in treaties and policy, the differentiation of ESG, sustainability, and social responsibility, and the emerging trends. Readers will examine the respective roles of the corporation, the financial and investment sector, the international bodies, the business interest groups, the NGOs and the philanthropic community.What were once regarded as ¿nice-to-have¿ initiatives with voluntary reporting have moved into the regulated sphere with mandatory public disclosures and reporting requirements on greenhouse gas emissions, climate risk and transition planning, biodiversity and nature-related impacts, supply chain transparency, human rights, human capital, and board diversity. The ESG and Sustainability Deskbook for Business threads the needle with best practices, case studies, and takeaways to illustrate the applications and to enhance understanding.
Learn to create web applications in PHP with minimal previous experience. This book is a practical guide to using PHP for web development.Loaded with examples and step-by-step instructions, each chapter is dedicated to a specific area or function. Yoüll first review the main principles of PHP and what is needed to program and develop in it. Yoüll then study variables, data types, control statements, arrays, and functions, all critical for creating efficient PHP programs. The book then moves on to object-oriented programming (OOP) and how to implement those principles in PHP, as well as inheritance, interfaces, testing, error handling, and exceptions. By the end of PHP by Example, you will have the knowledge and confidence to implement PHP for your web projects both large and small.What Yoüll Learn Understand PHP from the ground up Create scripts and implement them in real-world projects Work with a broad toolkit of ready-made exercises and solutions Investigate the main constructions of the PHP
Explore the intricate world of developer experience (DevEx) and its impact on the software development process. This book delves into the critical components of DevEx, such as documentation, tooling, API design, developer support, performance, and reliability, providing actionable insights and strategies to help organizations create development environments that foster productivity, collaboration, and satisfaction among developers.The main topics you'll review include the evolution of software development methodologies, the intersection of user experience (UX) and DevEx, and an in-depth exploration of the critical components of DevEx. You'll also look at practical approaches to improving DevEx, real-world examples of organizations that have successfully transformed their developer experience, and a discussion of DevEx's future trends and challenges. These topics are crucial as the software development landscape has become increasingly complex and competitive.Developer experience is no longer a luxury but a necessity for organizations seeking to attract top talent, drive innovation, and stay ahead in the industry. As the line between UX and DevEx continues to blur, it is imperative to understand how these two aspects are intertwined and how they can synergistically contribute to the success of software projects. Moreover, these topics are particularly relevant now, as remote work and distributed teams become more commonplace, making it even more critical for organizations to provide developers with the resources, tools, and support they need to be successful.Developer Experience Unleashed will inspire you to recognize the critical role of DevEx in the software development process and to adopt best practices that foster a synergistic environment where developers and users can thrive together.
This book is your one-stop resource on MySQL database installation and server management for administrators. It covers installation, upgrades, monitoring, high availability, disaster recovery, security, and performance and troubleshooting. You will become fluent in MySQL 8.2, the latest version of the highly scalable and robust relational database system.With a hands-on approach, the book offers step-by-step guidance on installing, upgrading, and establishing robust high availability and disaster recovery capabilities for MySQL databases. It also covers high availability with InnoDB and NDB clusters, MySQL routers and enterprise MySQL tools, along with robust security design and performance techniques. Throughout, the authors punctuate concepts with examples taken from their experience with large-scale implementations at companies such as Meta and American Airlines, anchoring this practical guide to MySQL 8.2 administration in the real world.What YouWill LearnUnderstand MySQL architecture and best practices for administration of MySQL serverConfigure high availability, replication, disaster recovery with InnoDB and NDB enginesBack up and restore with MySQL utilities and tools, and configure the database for zero data lossTroubleshoot with steps for real-world critical errors and detailed solutionsWho This Book Is ForTechnical professionals, database administrators, developers, and engineers seeking to optimize MySQL databases for scale, security, and performance
Embrace the future of software development! ChatGPT for Java is the perfect starting point for Java developers to learn how to build intelligent applications using ChatGPT and Open AI APIs.This book takes you from the ground up to demonstrate how to use ChatGPT programmatically. You will learn the basics of ChatGPT and OpenAI APIs, including how to authenticate, send prompts, generate responses, test in the Playground, and handle errors. Each chapter includes practical exercises which demonstrate different API functionalities and bring your concepts to life. You will learn how to AI-enable your own applications using models such as GPT-4, GPT-3.5, Whisper, DALL-E, and many more. As a result, developers will understand that generative AI tools will not replace software development jobs! Instead, you will leverage ChatGPT as your Java AI-pair programmer to increase speed and productivity. You will also learn how ChatGPT can provide powerful Natural Language Processing (NLP) capabilities to your Java apps in order to understand various formats of unstructured text. Step-by-step, you will apply the concepts covered to create your own intelligent chatbots that can automatically process messages from either Slack on Discord. With this book, Java developers will be empowered to take their applications to new heights by leveraging the power of AI as this exciting field continues to evolve and transform.What You Will LearnAuthenticate with the ChatGPT and OpenAI APIs and learn how to engineer and send promptsTest your prompts in the ChatGPT PlaygroundHow to use multiple artificial intelligence models Harness the power the temperature, top_p, and other parameters that can ONLY be accessed by developers to create more unique and engaging responses from ChatGPTCreate intelligent bots for Slack or Discord serversIncorporate context into prompts for betterresponses and apply advanced features of the APIs.Explore future directions for ChatGPT and OpenAI Who This Book Is ForBeginning and intermediate Java developers who have a basic understanding of Java programming concepts and are interested in learning how to add intelligence to their applications by using ChatGPT programmatically. No prior experience with ChatGPT or OpenAI APIs is required.
Understand and apply the design patterns outlined in this book to design, develop, and deploy scalable AI solutions that meet your organization's needs and drive innovation in the era of intelligent automation.This book begins with an overview of scalable AI systems and the importance of design patterns in creating robust intelligent solutions. It covers fundamental concepts and techniques for achieving scalability in AI systems, including data engineering practices and strategies. The book also addresses scalable algorithms, models, infrastructure, and architecture considerations. Additionally, it discusses deployment, productionization, real-time and streaming data, edge computing, governance, and ethics in scalable AI. Real-world case studies and best practices are presented, along with insights into future trends and emerging technologies.The book focuses on scalable AI and design patterns, providing an understanding of the challenges involved in developing AI systems that can handle large amounts of data, complex algorithms, and real-time processing. By exploring scalability, you will be empowered to design and implement AI solutions that can adapt to changing data requirements.What You Will LearnDevelop scalable AI systems that can handle large volumes of data, complex algorithms, and real-time processingKnow the significance of design patterns in creating robust intelligent solutionsUnderstand scalable algorithms and models to handle extensive data and computing requirements and build scalable AI systemsBe aware of the ethical implications of scalable AI systemsWho This Book Is ForAI practitioners, data scientists, and software engineers with intermediate-level AI knowledge and experience
Today, it¿s easier for threat actors to simply log in versus hack in. As cyberattacks continue to increase in volume and sophistication, it¿s not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities¿whether human or machine, to initiate or progress their attack. Detecting and defending against these malicious activities should be the basis of all modern cybersecurity initiatives.This book details the risks associated with poor identity security hygiene, the techniques that external and internal threat actors leverage, and the operational best practices that organizations should adopt to protect against identity theft, account compromises, and to develop an effective identity and access security strategy. As a solution to these challenges, Identity Security has emerged as a cornerstone of modern Identity and Access Management (IAM) initiatives. Managing accounts, credentials, roles, entitlements, certifications, and attestation reporting for all identities is now a security and regulatory compliance requirement. In this book, you will discover how inadequate identity and privileged access controls can be exploited to compromise accounts and credentials within an organization. You will understand the modern identity threat landscape and learn how role-based identity assignments, entitlements, and auditing strategies can be used to mitigate the threats across an organization¿s entire Identity Fabric. What You Will LearnUnderstand the concepts behind an identity and how its associated credentials and accounts can be leveraged as an attack vectorImplement an effective identity security strategy to manage identities and accounts based on roles and entitlements, including the most sensitive privileged accountsKnow the role that identity security controls play in the cyber kill chain and how privileges should be managed as a potential weak linkBuild upon industry standards and strategies such as Zero Trust to integrate key identity security technologies into a corporate ecosystemPlan for a successful identity and access security deployment; create an implementation scope and measurable risk reduction; design auditing, discovery, and regulatory reporting; and develop oversight based on real-world strategies to prevent identity attack vectorsWho This Book Is ForManagement and implementers in IT operations, security, and auditing looking to understand and implement an Identity and Access Management (IAM) program and manage privileges in these environments
Microsoft Defender for IoT helps organizations identify and respond to threats aimed at IoT devices, increasingly becoming targets for cyberattacks. This book discusses planning, deploying, and managing your Defender for IoT system. The book is a comprehensive guide to IoT security, addressing the challenges and best practices for securing IoT ecosystems.The book starts with an introduction and overview of IoT in Azure. It then discusses IoT architecture and gives you an overview of Microsoft Defender. You also will learn how to plan and work with Microsoft Defender for IoT, followed by deploying OT Monitoring. You will go through air-gapped OT sensor management and enterprise IoT monitoring. You also will learn how to manage and monitor your Defender for IoT systems with network alerts and data. After reading this book, you will be able to enhance your skills with a broader understanding of IoT and Microsoft Defender for IoT-integrated best practices to design, deploy, and manage a secure enterprise IoT environment using Azure.What You Will LearnUnderstand Microsoft security services for IoTGet started with Microsoft Defender for IoTPlan and design a security operations strategy for the IoT environmentDeploy security operations for the IoT environmentManage and monitor your Defender for IoT SystemWho This Book Is ForCybersecurity architects and IoT engineers
Written in a simple and developer-focused style, this book gives you the tools and knowledge you need to ace the GCP Professional Cloud Security Engineer certification exam. The approach is two-fold: introducing and implementing all GCP cloud security concepts and controls based on the certification exam objectives, and demonstrating how these concepts can be applied to real-world scenarios.Your study begins with cloud identities in GCP and different identity types (user accounts, service accounts, groups, and domains) and how separation of duties is implemented with access controls and Identity and Access Management (IAM). Emphasis is placed on the unique GCP approach to managing resources, with its clear distinction between resource ownership and resource billing. Following the defense in depth principle, the book shifts focus to network security and introduces different types of constructs that enable micro-segmentation, as they are implemented in a software-defined network. A chapter devoted to data protection is included. You will learn how to leverage the Data Loss Prevention (DLP) application programming interface (API) to prevent access to your workloads¿ sensitive data from unauthorized use. Examples on how to use the DLP API are provided using the Go language, which is becoming widely adopted in the developer community due to its simplicity, and high-performance networking and multi-processing capabilities. Encryption at rest, in use, and in transit is covered with an overview on how GCP implements confidential computing. The book concludes with an examination of the GCP services you need to know to monitor, audit, and ensure compliance with the laws and regulations where your workloads and infrastructure operate.By the end of the book, you will have acquired the knowledge and confidence to pass the GCP Professional Cloud Security Engineer certification exam and to successfully design, architect, and engineer security solutions with the Google Cloud Platform.Bonus Material: IAM deny policiesWhat You Will Learn Understand the five security principles and how to use them to drive the development of modern security architectures in Google Cloud Secure identities with Cloud Identity and Identity & Access Management (IAM) Secure the network with segmentation and private connectivity Protect sensitive data with the Data Loss Prevention (DLP) API and encryption Monitor, log, audit, and troubleshoot security incidents with the Google Cloud Operations Suite Ensure compliance and address regulatory concerns Who This Book Is ForSoftware engineers specializing in DevOps, SecOps, and DataOps, who possess expertise in the Software Development Life Cycle (SDLC) methodologies within Agile teams. It also targets software architects with proficiency in various domains such as security, network, solution, data, infrastructure, cloud, and enterprise architecture.
Explore the latest version of Laravel and its ecosystem, including Laravel Nova, Telescope, Horizon, and Vapor. This is book completes the App development trinity - Backend, Website, and Mobile Apps. As a bonus, you'll learn to build Desktop Apps for Windows, MacOS and Linux using NativePHP.You'll start by reviewing the Laravel ecosystem and then move on to building some real-world applications. These applications are production-ready using Laravel's best practices and modern frontend frameworks like React and Vue.js. The first app is a modular CMS (PickleCMS), along with a website that consumes the content. Next, you'll build an eCommerce mobile app (Commercify) using Laravel. Finally, you'll build a Travel App (TripoNama).Along the way, you'll study related topics that apply to your applications, including search with Laravel Scout, generating PDFs, logging, browser automation with Dusk, consuming and building REST and GraphQL APIs. Practical Laravel 11 isnot just another documentation tool, it's a must-have companion for Laravel enthusiasts.You will:Build a GraphQL API to use in real-world applications.Work with testing and browser automation tools. Consume and expose APIs with Laravel.Write Artisan commands that run on the CLI.Build a blogging system and WYSIWYG page editor.
This book is your comprehensive guide to Windows forensics. It covers the process of conducting or performing a forensic investigation of systems that run on Windows operating systems. It also includes analysis of incident response, recovery, and auditing of equipment used in executing any criminal activity.The book covers Windows registry, architecture, and systems as well as forensic techniques, along with coverage of how to write reports, legal standards, and how to testify. It starts with an introduction to Windows followed by forensic concepts and methods of creating forensic images. You will learn Windows file artefacts along with Windows Registry and Windows Memory forensics. And you will learn to work with PowerShell scripting for forensic applications and Windows email forensics. Microsoft Azure and cloud forensics are discussed and you will learn how to extract from the cloud. By the end of the book you will know data-hiding techniques in Windows and learn about volatility and a Windows Registry cheat sheet.What Will You LearnUnderstand Windows architectureRecover deleted files from Windows and the recycle binUse volatility and PassMark volatility workbenchUtilize Windows PowerShell scripting for forensic applicationsWho This Book Is ForWindows administrators, forensics practitioners, and those wanting to enter the field of digital forensics
This transformative book explores the power of artificial intelligence (AI) in revolutionizing the utilities industry. It covers crucial topics such as intelligent grids, decentralized energy resources, customer engagement, electric vehicle integration, and more, providing a comprehensive and practical guide to successfully navigate the energy transition.In today's world, the urgency of addressing climate change and transitioning to sustainable energy systems is undeniable. With approximately 60 percent of global greenhouse gas emissions attributed to the energy sector, utilities play a vital role in achieving sustainability goals. The traditional utility business model faces disruption from renewable energy, changing consumer expectations, and regulatory shifts. Embracing AI emerges as a key solution to optimize operations, enhance grid reliability, and meet evolving customer demands.Through compelling case studies and industry-specific use cases, you will discover how AI drives innovation, improves operational efficiency, and contributes to a greener and more sustainable world. As the demand for cleaner and more sustainable energy practices grows, this book demonstrates how AI can support utilities in meeting these demands, making them more resilient, agile, and customer-centric.Whether you're a seasoned industry expert or a curious student, this book equips you with the knowledge and insights to embrace sustainability, navigate the complex energy landscape, leverage AI to shape a positive future, and join the movement towards a greener world, empowered by AI's potential in the utilities industry.What You Will LearnUnderstand the challenges and opportunities for utilities in the context of climate change, energy poverty, and the evolving business landscapeDiscover how rapid transformation is needed in the utilities sector to overcome challenges and leverage opportunities for a sustainable futureGain insight into the role of technology, particularly artificial intelligence (AI), as a critical tool for utilities in their transformation journeyBe aware of how AI can be applied in building the future utility industry, including its potential impact on energy efficiency, intelligent energy ecosystems, community engagement, and new business modelsGain knowledge of the adoption of AI and machine learning technologies in the utility industry, including the current state, barriers, significant influencing factors, and an AI adoption maturity model for utilitiesRecognize the sustainability imperative for utilities and how AI can help in achieving sustainable energy practicesBecome familiar with the transformation of power generation, microgrids, intelligent transmission and distribution systems, utilities retail, mobility through electric vehicles, and the integration of distributed energy resources (DER) using AIGain insight into the potential of AI in addressing challenges and driving innovation in the energy ecosystem, such as optimizing power generation assets, enhancing grid intelligence, improving customer service, and enabling clean energy awareness in the metaverse
Learn the C programming language easily and in a straightforward way. This book teaches the basics of C, the C Standard Library, and modern C standards. No previous programming experience is required.C is a language that is as popular today as it was decades ago. C covers a wide variety of domains. It can be used to program a microcontroller, or to develop an entire operating system. This book is an effort to introduce the reader to the C programming language in a concise and easy to follow manner.The author takes you through the C programming language, the Standard Library, and the C standards basics. Each chapter is the right balance of theory and code examples. After reading and using this book, you'll have the essentials to start programming in modern C.What You Will LearnThe C programming language fundamentalsThe C Standard Library fundamentalsNew C Standards featuresThe basics of types, operators, statements, arrays, functions, and structsThe basics of pointers, memory allocation, and memory manipulationTake advantage of best practices in C Who This Book Is For Beginner or novice programmers who wish to learn the C programming language. No prior programming experience is required.
Create interactive and data-driven dashboards using Python. This hands-on guide is a practical resource for those (with modest programming skills) in scientific and engineering fields looking to leverage Python's power for data visualization and analysis in a user-friendly dashboard format.Yoüll begin by gaining a fundamental understanding of Python programming, including data types, lists, dictionaries, and data structures. The book then delves into the world of reactive programming with Plotly and Dash, offering a hands-on approach to building interactive web-based dashboards. Next, yoüll see how to work with online data, how to scrape and clean datasets, and keep files up-to-date. The book also guides you through planning a dashboard prototype, outlining project tasks, trends, forecasts, spectra, and other design considerations. It concludes with a discussion of how the dashboard can be used for data visualization of real data, explaining the usefulness of tools such as spectra.By providing detailed examples for download and customization, Prototyping Python Dashboards for Scientists and Engineers will equip you with the skills needed to jumpstart your own development efforts.What Yoüll LearnDesign a dashboard with PythonConvert and filter Excel formatted files to produce CSV filesCreate browser-served graphics with PLOTLYGenerate polynomial trend lines for forecastingBuild a Unix service to share your dashboardWho This Book Is ForScientists, engineers, students, programmers, and data enthusiasts who aspire to harness Python's potential for data visualization and analysis through the creation of interactive dashboards. Many will be pragmatic programmers with modest skills and limited resources who mainly want to see a working solution they could emulate.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.