EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn to write test-driven microservices, REST APIs, and web service APIs with PHP using the Lumen micro-framework, from the now popular Laravel family. This book shows you how testing APIs can help you write bullet-proof web application services and microservices. In the Lumen Programming Guide you will learn how to use Lumen-a micro-framework by Laravel-to write bullet-proof APIs. Lumen helps you write productive, maintainable APIs using modern application design. You will learn how to write fully-tested APIs and understand essential Lumen concepts used to build a solid foundation for writing API projects.What You Will LearnMaintain your API's database structure through built-in database migrationsWrite tests with factory data in a test databaseRespond with consistent data output in JSONDeal with PHP exceptions by using JSON responsesCreate, read, update, and delete REST resourcesRepresent model associations in API responsesBuild a solid foundation for writing tests with PHPUnit and MockeryValidate dataWho This Book Is ForPHP developers with no Laravel experience. Only a basic understanding of HTTP and writing PHP applications is needed to get started. 272 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 148421157X ISBN 13: 9781484211571
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 35,30
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Will your next doctor be a human being¿or a machine Will you have a choice If you do, what should you know before making it APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 192 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484219457 ISBN 13: 9781484219454
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 37,44
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -This is a book about learning the Scratch language so that you can use it in teaching and other instructional situations. The book explains the visual nature of the language, showing you how to write programs by dragging and dropping visual blocks representing common compute operations.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 392 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 148422180X ISBN 13: 9781484221808
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 40,65
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book, this book is ideal for anyone studying computer security who wants to learn by doing.Using a practical approach, you will understand how stack frames relate to hardware and software theory and the various GNU/Linux distributions, before moving on to Base 2, 8 and 16 notations, executables and libraries. Lastly you will go in-depth to understand the intricacies of stack frames. A vital resource for all computer security students and enthusiasts, add Stack Frames: A Look Inside to your library today.What You Will LearnIn-depth knowledge on activation records offunctions, and how this information can be used.A better understanding on how conventions used by compilers work.Clarify some concepts on libraries and their relationship with executable programs.Get, or recall, technical skills using compilers, debuggers, and other tools.Who This Book Is ForThe book is suitable for college students with a good knowledge of the C language, who are interested in deepening their study of the content and organization of program memory, namely the activation records of functions, as regards possible implications in computer security. A basic knowledge of both the Assembly language and the UNIX operating system is certainly helpful, as well as some practice with compilers and debuggers; but they are not compulsory.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 192 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484221745 ISBN 13: 9781484221747
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 40,65
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn how to integrate full-stack open source big data architecture and to choose the correct technology¿Scala/Spark, Mesos, Akka, Cassandra, and Kafkäin every layer.Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting, aggregating, and crunching large data sets in a timely manner. In many cases now, organizations need more than one paradigm to perform efficient analyses.Big Data SMACK explains each of the full-stack technologies and, more importantly, how to best integrate them. It provides detailed coverage of the practical benefits of these technologies and incorporates real-world examples in every situation. This book focuses on the problems and scenarios solved by the architecture, as well as the solutions provided by every technology. It covers the six main concepts of big data architecture and how integrate, replace, and reinforce every layer:The language: ScalaThe engine: Spark (SQL, MLib, Streaming, GraphX)The container: Mesos, DockerThe view: AkkaThe storage: CassandraThe message broker: KafkaWhat You Will Learn:Make big data architecture without using complex Greek letter architecturesBuild a cheap but effective cluster infrastructureMake queries, reports, and graphs that business demandsManage and exploit unstructured and No-SQL data sourcesUse tools to monitor the performance of your architectureIntegrate all technologies and decide which ones replace and which ones reinforceWho This Book Is For:Developers, data architects, and data scientists looking to integrate the most successful big data open stack architecture and to choose the correct technology in every layerAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 292 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484221869 ISBN 13: 9781484221860
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 53,49
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn to write test-driven microservices, REST APIs, and web service APIs with PHP using the Lumen micro-framework, from the now popular Laravel family. This book shows you how testing APIs can help you write bullet-proof web application services and microservices.In the Lumen Programming Guide you will learn how to use Lumen¿a micro-framework by Laravel¿to write bullet-proof APIs. Lumen helps you write productive, maintainable APIs using modern application design. You will learn how to write fully-tested APIs and understand essential Lumen concepts used to build a solid foundation for writing API projects.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 272 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484216601 ISBN 13: 9781484216606
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 58,84
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -This book is your concise guide to Ansible, the simple way to automate apps and IT infrastructure. In less than 250 pages, this book takes you from knowing nothing about configuration management to understanding how to use Ansible in a professional setting.You will learn how to create an Ansible playbook to automatically set up an environment, ready to install an open source project. Yoüll extract common tasks into roles that you can reuse across all your projects, and build your infrastructure on top of existing open source roles and modules that are available for you to use. You will learn to build your own modules to perform actions specific to your business. By the end you will create an entire cluster of virtualized machines, all of which have your applications and all their dependencies installed automatically. Finally, you'll test your Ansible playbooks.Ansible can do as much or as little as you want it to. Ansible: From Beginner to Pro will teach you the key skills you need to be an Ansible professional. Yoüll be writing roles and modules and creating entire environments without human intervention in no time at all ¿ add it to your library today.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 192 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484219899 ISBN 13: 9781484219898
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 69,54
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn SQL Server Reporting Services and become current with the 2016 edition. Develop interactive, dynamic reports that combine graphs, charts, and tabular data into attractive dashboards and reports to delight business analysts and other users of corporate data. Deliver mobile reports to anywhere and any device. Build vital knowledge of Reporting Services at a time when Microsoft's dominance in business intelligence is on the rise.Beginning SQL Server Reporting Services turns novices into skilled report developers. The book begins by explaining how to set up the development environment. It then walks you through creating your first reports using the built-in wizard. After showing what is possible, the book breaks down and explains the skills needed to create reports from scratch. And not just reports! But also dashboards with charts, graphs, and maps. Each chapter builds on knowledge gained in the previous chapters with step-by-step tutorials.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 352 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484221397 ISBN 13: 9781484221396
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 69,54
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking.What You Will Learn:Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threatsPrepare for and pass such common audits as PCI-DSS, SSAE-16, and ISO 27001Calibrate the scope, and customize security controls to fit into an organization¿s cultureImplement the most challenging processes, pointing out common pitfalls and distractionsFrame security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your adviceWho This Book Is For:IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e.g., former military security professionals, law enforcement professionals, and physical security professionals)APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 348 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 148421983X ISBN 13: 9781484219836
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over the lifetime of an application.Expert Oracle Indexing and Access Paths is about the one database structure at the heart of almost all performance concerns: the index. Database system performance is one of the top concerns in information technology today. Administrators struggle to keep up with the explosion of access and activity driven by the proliferation of computing into everything from phones to tablets to PCs in our increasingly connected world. At the heart of any good-performing database lies a sound indexing strategy that makes appropriate use of indexing, and especially of the vendor-specific indexing features onoffer.Few databases fully exploit the wealth of data access mechanisms provided by Oracle. Expert Oracle Indexing and Access Paths helps by bringing together information on indexing and how to use it into one blissfully short volume that you can read quickly and have at your fingertips for reference. Learn the different types of indexes available and when each is best applied. Recognize when queries aren¿t using indexes as you intend. Manage your indexing for maximum performance. Confidently use the In Memory column store feature as an alternate access path to improve performance. Let Expert Indexing in Oracle Database 12c be your guide to deep mastery of the most fundamental performance optimization structure in Oracle Database.Explains how indexes help performance, and sometimes hinder it tooDemystifies the various index choices so that you can chose rightlyDescribes the database administration chores associated with indexesDemonstrates the use of the In Memory column store as an alternate access path to the dataWhat You Will LearnAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 280 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 148422177X ISBN 13: 9781484221778
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn to trade algorithmically with your existing brokerage, from data management, to strategy optimization, to order execution, using free and publicly available data. Connect to your brokerage¿s API, and the source code is plug-and-play.Automated Trading with R explains automated trading, starting with its mathematics and moving to its computation and execution. You will gain a unique insight into the mechanics and computational considerations taken in building a back-tester, strategy optimizer, and fully functional trading platform.The platform built in this book can serve as a complete replacement for commercially available platforms used by retail traders and small funds. Software components are strictly decoupled and easily scalable, providing opportunity to substitute any data source, trading algorithm, or brokerage. This book will:Provide a flexible alternative to common strategy automation frameworks, like Tradestation, Metatrader, and CQG, to small funds and retail tradersOffer an understanding of the internal mechanisms of an automated trading systemStandardize discussion and notation of real-world strategy optimization problemsWhat You Will LearnUnderstand machine-learning criteria for statistical validity in the context of time-seriesOptimize strategies, generate real-time trading decisions, and minimize computation time while programming an automated strategy in R and using its package libraryBest simulate strategy performance in its specific use case to derive accurate performance estimatesUnderstand critical real-world variables pertaining to portfolio management and performance assessment, including latency, drawdowns, varying trade size, portfolio growth, and penalization of unused capitalWho This Book Is ForTraders/practitioners at the retail or small fund level with at least an undergraduate background in finance or computer science; graduate level finance or data science studentsAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 236 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484221540 ISBN 13: 9781484221549
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend.News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine¿they will ask for much more.Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences.Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now¿before your hospital becomes the next victim.What You Will Learn:Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attackIdentify possible ways hackers can hack hospital and healthcare facility equipmentRecognize the cyber-attack vectors¿or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcomeDetect and prevent man-in-the-middle or denial-of-service cyber-attacksFind and prevent hacking of the hospital database and hospital web applicationWho This Book Is For:Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionalsAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 156 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484220587 ISBN 13: 9781484220580
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner.DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets.Implementing DirectAccess with Windows Server 2016 provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book:Explains how the technology works and the specific IT pain points that it addressesIncludes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016Addresses real-world deployment scenarios for small and large organizationsContains valuable tips, tricks, and implementation best practices for security and performanceAPress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 308 pp. Englisch.
Idioma: Inglés
Publicado por Apress, Apress Sep 2016, 2016
ISBN 10: 1484214838 ISBN 13: 9781484214831
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 106,99
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Learn SAP's real estate management integrated solution to effectively manage the real estate portfolio at your organization. You will configure SAP REFX for business scenarios covering solutions from master data to financial posting and reporting. You will address all phases of the real estate life cycle, including real estate acquisition or disposal, portfolio management, and property and technical management.APress in Springer Science + Business Media, Heidelberger Platz 3, 14197 Berlin 248 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 24,60
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This concise book shows you how to create PHP command line interface (CLI) scripts, including user interaction and scripts to automate and assist your workflow. Learn to quickly create useful and effective command line software and scripts using the world's most popular web scripting language, PHP. Enjoy the benefits of writing CLI scripts in PHP: save money by redeploying existing skills, not learning new ones. Save time and increase productivity by using a high-level language. Make money by providing your clients with a full-stack service. What You'll Learn Learn about the PHP CLI SAPIFind out how to use it to run PHP scripts off-lineEasily deal with user input and console outputWork with helper libraries and softwareFind out the differences between programming for the web and for the CLI Who This Book Is ForExperienced PHP programmers and web developers. 62 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 35,30
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Will your next doctor be a human being-or a machine Will you have a choice If you do, what should you know before making it This book introduces the reader to the pitfalls and promises of artificial intelligence (AI) in its modern incarnation and the growing trend of systems to 'reach off the Web' into the real world. The convergence of AI, social networking, and modern computing is creating an historic inflection point in the partnership between human beings and machines with potentially profound impacts on the future not only of computing but of our world and species.AI experts and researchers James Hendler-co-originator of the Semantic Web (Web 3.0)-and Alice Mulvehill-developer of AI-based operational systems for DARPA, the Air Force, and NASA-explore the social implications of AI systems in the context of a close examination of the technologies that make them possible. The authors critically evaluate the utopian claims and dystopian counterclaims of AI prognosticators.Social Machines: The Coming Collision of Artificial Intelligence, Social Networking, and Humanity is your richly illustrated field guide to the future of your machine-mediated relationships with other human beings and with increasingly intelligent machines.What Readers Will LearnWhat the concept of a social machine is and how the activities of non-programmers are contributing to machine intelligenceHow modern artificial intelligence technologies, such as Watson, are evolving and how they process knowledge from both carefully produced information (such as Wikipedia and journal articles) and from big data collectionsThe fundamentals of neuromorphic computing, knowledge graph search, and linked data, as well as the basic technology concepts that underlie networking applications such as Facebook and TwitterHow the change in attitudes towards cooperative work on the Web, especially in the younger demographic, is critical to the future of Web applicationsWho This Book Is ForGeneral readers and technically engaged developers, entrepreneurs, and technologists interested in the threats and promises of the accelerating convergence of artificial intelligence with social networks and mobile web technologies. 192 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 37,44
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This is a book about learning the Scratch language so that you can use it in teaching and other instructional situations. The book explains the visual nature of the language, showing you how to write programs by dragging and dropping visual blocks representing common compute operations.Scratch is visual language that even young children can master. and makes computer programming as easy as dragging and dropping graphical blocks that represent programming commands, eliminating the traditional stumbling blocks of typing and syntax errors. With a drag-and-drop interface that runs in any web browser, and on devices from iPads to PCs to Macs to Microsoft Surface tablets, Scratch is an easily accessible way to enter the world of computer programming. This book teaches how to use Scratch in a fun and simple way that relies on examples and learning by doing. Progressing from simple three-block scripts that move a character across the screen to complex projects that involve motion, sound, and user input, this book:Imparts a thorough understanding of the Scratch interface.Shows how to create a range of Scratch projects, including simple games.Builds a solid foundation for future programming in other languagesWhat You Will LearnNavigate the Scratch interfaceCreate sprites and backdropsLearn programming skills good in all languagesProgram simple games and animationsShare programs with friends worldwideWho This Book Is ForScratch for Absolute Beginners is intended for complete beginners to the world of computer programming and the Scratch language. Learning to program in Scratch is an easy and fun way for anybody seven years and older to learn about computer programming. Scratch's drag-and-drop interface in a web browser makes the book easy and accessible to young children and adults alike. 392 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 40,65
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Learn how to integrate full-stack open source big data architecture and to choose the correct technology-Scala/Spark, Mesos, Akka, Cassandra, and Kafka-in every layer.Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting, aggregating, and crunching large data sets in a timely manner. In many cases now, organizations need more than one paradigm to perform efficient analyses.Big Data SMACK explains each of the full-stack technologies and, more importantly, how to best integrate them. It provides detailed coverage of the practical benefits of these technologies and incorporates real-world examples in every situation. This book focuses on the problems and scenarios solved by the architecture, as well as the solutions provided by every technology. It covers the six main concepts of big data architecture and how integrate, replace, and reinforce every layer:The language: ScalaThe engine: Spark (SQL, MLib, Streaming, GraphX)The container: Mesos, DockerThe view: AkkaThe storage: CassandraThe message broker: KafkaWhat You Will Learn:Make big data architecture without using complex Greek letter architecturesBuild a cheap but effective cluster infrastructureMake queries, reports, and graphs that business demandsManage and exploit unstructured and No-SQL data sourcesUse tools to monitor the performance of your architectureIntegrate all technologies and decide which ones replace and which ones reinforceWho This Book Is For:Developers, data architects, and data scientists looking to integrate the most successful big data open stack architecture and to choose the correct technology in every layer 292 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 40,65
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware - Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book, this book is ideal for anyone studying computer security who wants to learn by doing. Using a practical approach, you will understand how stack frames relate to hardware and software theory and the various GNU/Linux distributions, before moving on to Base 2, 8 and 16 notations, executables and libraries. Lastly you will go in-depth to understand the intricacies of stack frames. A vital resource for all computer security students and enthusiasts, add Stack Frames: A Look Inside to your library today. What You Will Learn In-depth knowledge on activation records of functions, and how this information can be used.A better understanding on how conventions used by compilers work.Clarify some concepts on libraries and their relationship with executable programs.Get, or recall, technical skills using compilers, debuggers, and other tools. Who This Book Is For The book is suitable for college students with a good knowledge of the C language, who are interested in deepening their study of the content and organization of program memory, namely the activation records of functions, as regards possible implications in computer security. A basic knowledge of both the Assembly language and the UNIX operating system is certainly helpful, as well as some practice with compilers and debuggers; but they are not compulsory. 192 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 58,84
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This bookis yourconcise guideto Ansible, the simple way to automate apps and IT infrastructure. In less than 250 pages, this book takes you from knowing nothing about configuration management tounderstandinghow to use Ansible in a professional setting.You will learn how to create an Ansible playbook to automatically set up an environment, ready to install an open source project. You'll extract common tasks into roles that you can reuse across all your projects, and build your infrastructure on top of existing open source roles and modules that are available for you to use. You will learn to build your own modules to perform actions specific to your business. By the end you will create an entire cluster of virtualized machines, all of which have your applications and all their dependencies installed automatically. Finally, you'll test your Ansible playbooks.Ansible can do as much or as little as you want it to. Ansible: From Beginner to Pro will teach you the key skills you need to be an Ansible professional. You'll be writing roles and modules and creating entire environments without human intervention in no time at all - add it to your library today.What You Will LearnLearn why Ansible is so popular and how to download and install itCreate a playbook that automatically downloads and installs a popular open source projectUse open source roles to complete common tasks, and write your own specific to your businessExtend Ansible by writing your own modulesTest your infrastructure using Test Kitchen and ServerSpecWho This Book Is ForDevelopers that currently create development and production environments by hand. If you find yourself running apt-get installregularly, this book is for you. Ansible adds reproducibility and saves you time all at once. Ansible: From Beginner to Pro is great for any developer wanting to enhance their skillset and learn new tools. 192 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 64,19
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Pull back the curtain on making fun and innovative costumes and accessories incorporating technologies like low-cost microprocessors, sensors and programmable LEDs. Fashion tech can require skills in design, pattern-making, sewing, electronics, and maybe 3D printing. Besides the tech skills, making a good costume or accessory also requires knowledge of the intangibles of what makes a good costume. This bookis a collaboration between two technologists and a veteran teacher, costumer, and choreographer. Regardless of whether you are coming at this from the theater costuming, sewing, or electronics side, the authors will help you get started with the other skills you need.More than just a book of projects (although it has those too), Practical Fashion Tech teaches why things are done a certain way to impart the authors' collective wealth of experience. Whether you need a book for a wearable tech class or you just want to get started making fantastic costumes and wearables on your own,Practical Fashion Techwill get you there.What you will learn:The fundamentals of both the sewing and the technology aspects of wearable tech for fashionHow to make a memorable costume that reacts to its wearer or environmentIdeas for using this book as a textbookWho this is for:Electronics enthusiasts, hipsters, costume designers, teachers, and students who want to learn how to make fashion or cosplay wearables. Cosplay fans wanting to incorporate sensors and more into their costumes. 268 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 69,54
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Learn SQL Server Reporting Services and become current with the 2016 edition. Develop interactive, dynamic reports that combine graphs, charts, and tabular data into attractive dashboards and reports to delight business analysts and other users of corporate data. Deliver mobile reports to anywhere and any device. Build vital knowledge of Reporting Services at a time when Microsoft's dominance in business intelligence is on the rise.Beginning SQL Server Reporting Servicesturns novices into skilled report developers. The book begins by explaining how to set up the development environment. It then walks you through creating your first reports using the built-in wizard. After showing what is possible, the book breaks down and explains the skills needed to create reports from scratch. And not just reports! But also dashboards with charts, graphs, and maps. Each chapter builds on knowledge gained in the previous chapters with step-by-step tutorials. Beginning SQL Server Reporting Servicesboosts your skills and provides you additional career options. Don't be without those options. Grab and read this book today. Build reports with and without the built-in wizard. Build interactive features such as drill-through reports. Build dashboards full of charts, graphs, and maps. Build mobile reports. What You Will LearnSet up your development environment.Organized projects and share components among reports.Create report using a wizard.Create reports from scratch, including grouping levels, parameters, and drill through features.Build interactive dashboard with graphs, charts, and maps.Deploy and manage reports for use by others in the business.Who This Book Is ForDatabase professionals of all experience levels who have some experience in databases and want to make the leap into business intelligence reporting. The book is an excellent choice for those needing to add Reporting Services to their current list of skills, or who are looking for a skill set that is in demand for in order to break into IT. 352 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 69,54
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in organizational consulting, diplomacy, change management, risk analysis, and out-of-the-box thinking.What You Will Learn:Build a security program that will fit neatly into an organization and change dynamically to suit both the needs of the organization and survive constantly changing threatsPrepare for and pass such common audits as PCI-DSS, SSAE-16, and ISO 27001Calibrate the scope, and customize security controls to fit into an organization's cultureImplement the most challenging processes, pointing out common pitfalls and distractionsFrame security and risk issues to be clear and actionable so that decision makers, technical personnel, and users will listen and value your adviceWho This Book Is For:IT professionals moving into the security field; new security managers, directors, project heads, and would-be CISOs; and security specialists from other disciplines moving into information security (e.g., formermilitarysecurity professionals, law enforcement professionals, and physical securityprofessionals) 348 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Speed up the execution of important database queries by making good choices about which indexes to create. Choose correct index types for different scenarios. Avoid indexing pitfalls that can actually have indexes hurting performance rather than helping. Maintain indexes so as to provide consistent and predictable query response over the lifetime of an application.Expert Oracle Indexing and Access Pathsis about the one database structure at the heart of almost all performance concerns: the index. Database system performance is one of the top concerns in information technology today. Administrators struggle to keep up with the explosion of access and activity driven by the proliferation of computing into everything from phones to tablets to PCs in our increasingly connected world. At the heart of any good-performing database lies a sound indexing strategy that makes appropriate use of indexing, and especially of the vendor-specific indexing features on offer.Few databases fully exploit the wealth of data access mechanisms provided by Oracle.Expert Oracle Indexing and Access Pathshelps by bringing together information on indexing and how to use it into one blissfully short volume that you can read quickly and have at your fingertips for reference. Learn the different types of indexes available and when each is best applied. Recognize when queries aren't using indexes as you intend. Manage your indexing for maximum performance. Confidently use the In Memory column store feature as an alternate access path to improve performance. Let Expert Indexing in Oracle Database 12c be your guide to deep mastery of the most fundamental performance optimization structure in Oracle Database.Explains how indexes help performance, and sometimes hinder it tooDemystifies the various index choices so that you can chose rightlyDescribes the database administration chores associated with indexesDemonstrates the use of the In Memory column store as an alternate access path to the dataWhat You Will LearnCreate an overall indexing strategy to guide your decisionsChoose the correct indexing mechanisms for your applicationsManage and maintain indices to avoid degradation and preserve efficiencyTake better advantage of underused index types such as index-organized tablesChoose the appropriate columns to index, with confidenceBlend partitioning and materialized views into your indexing strategyWho This Book Is ForAll levels of database administrators and application developers who are struggling with the database performance and scalability challenge. Any database administrator involved with indexing, which is any database administrator period, will appreciate the wealth of advice packed into this gem of a book. 280 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend.News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine-they will ask for much more.Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences.Cybersecurity for Hospitals and Healthcare Facilitiesis a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now-before your hospital becomes the next victim.What You Will Learn:Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attackIdentify possible ways hackers can hack hospital and healthcare facility equipmentRecognize the cyber-attack vectors-or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcomeDetect and prevent man-in-the-middle or denial-of-service cyber-attacksFind and prevent hacking of the hospital database and hospital web applicationWho This Book Is For:Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals 156 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Learn to trade algorithmically with your existing brokerage, from data management, to strategy optimization, to order execution, using free and publicly available data. Connect to your brokerage's API, and the source code is plug-and-play.Automated Trading with Rexplains automated trading, starting with its mathematics and moving to its computation and execution. You will gain a unique insight into the mechanics and computational considerations taken in building a back-tester, strategy optimizer, and fully functional trading platform.The platform built in this book can serve as a complete replacement for commercially available platforms used by retail traders and small funds. Software components are strictly decoupled and easily scalable, providing opportunity to substitute any data source, trading algorithm, or brokerage. This book will:Provide a flexible alternative to common strategy automation frameworks, like Tradestation, Metatrader, and CQG, to small funds and retail tradersOffer an understanding of the internal mechanisms of an automated trading systemStandardize discussion and notation of real-world strategy optimization problemsWhat You Will LearnUnderstand machine-learning criteria for statistical validity in the context of time-seriesOptimize strategies, generate real-time trading decisions, and minimize computation time while programming an automated strategy in R and using its package libraryBest simulate strategy performance in its specific use case to derive accurate performance estimatesUnderstand critical real-world variables pertaining to portfolio management and performance assessment, including latency, drawdowns, varying trade size, portfolio growth, and penalization of unused capitalWho This Book Is ForTraders/practitioners at the retail or small fund level with at least an undergraduate background in finance or computer science; graduate level finance or data science students 236 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 80,24
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Learn how to design, plan, implement, and support a secure remote access solution using DirectAccess in Windows Server 2016. Remote Access has been included in the Windows operating system for many years. With each new operating system release, new features and capabilities have been included to allow network engineers and security administrators to provide remote access in a secure and cost-effective manner.DirectAccess in Windows Server 2016 provides seamless and transparent, always on remote network connectivity for managed Windows devices. DirectAccess is built on commonly deployed Windows platform technologies and is designed to streamline and simplify the remote access experience for end users. In addition, DirectAccess connectivity is bidirectional, allowing administrators to more effectively manage and secure their field-based assets.Implementing DirectAccess with Windows Server 2016provides a high-level overview of how DirectAccess works. The vision and evolution of DirectAccess are outlined and business cases and market drivers are explained. DirectAccess is evaluated against traditional VPN and this book describes the Windows platform technologies that underpin this solution. In addition, this book:Explains how the technology works and the specific IT pain points that it addressesIncludes detailed, prescriptive guidance for those tasked with implementing DirectAccess using Windows Server 2016Addresses real-world deployment scenarios for small and large organizationsContains valuable tips, tricks, and implementation best practices for security and performanceWhat you'll learnA high-level understanding of the various remote access technologies included in Windows Server 2016.Common uses cases for remote access, and how best to deploy them in a secure, stable, reliable, and highlyavailable manner.Valuable insight in to design best practices and learn how to implement DirectAccess and VPN with Windows Server 2016 according to deployment best practices.Who This Book Is ForIT administrators, network, and security administrators and engineers, systems management professionals, compliance auditors, and IT executive management (CIO, CISO) are the target audience for this title. 308 pp. Englisch.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 90,94
Cantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware 608 pp. Deutsch.