- Table View
- List View
Practical Haskell: A Real World Guide to Programming
by Alejandro Serrano MenaGet a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. This book contains excellent coverage of the Haskell ecosystem and supporting tools, include Cabal and Stack for managing projects, HUnit and QuickCheck for software testing, the Spock framework for developing web applications, Persistent and Esqueleto for database access, and parallel and distributed programming libraries.You’ll see how functional programming is gathering momentum, allowing you to express yourself in a more concise way, reducing boilerplate, and increasing the safety of your code. Haskell is an elegant and noise-free pure functional language with a long history, having a huge number of library contributors and an active community. This makes Haskell the best tool for both learning and applying functional programming, and Practical Haskell takes advantage of this to show off the language and what it can do.What You Will LearnGet started programming with HaskellExamine the different parts of the languageGain an overview of the most important libraries and tools in the Haskell ecosystemApply functional patterns in real-world scenariosUnderstand monads and monad transformersProficiently use laziness and resource managementWho This Book Is ForExperienced programmers who may be new to the Haskell programming language. However, some prior exposure to Haskell is recommended.
Practical Haskell: A Real-World Guide to Functional Programming
by Alejandro Serrano MenaGet a practical, hands-on introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. This updated edition includes more modern treatment of Haskell's web framework and APIs.This book contains excellent coverage of the Haskell ecosystem and supporting tools, including Cabal and Stack for managing projects, HUnit and QuickCheck for software testing, WAI and Elm to develop the back end and front end of web applications, Persistent and Esqueleto for database access, and parallel and distributed programming libraries.You’ll see how functional programming is gathering momentum, allowing you to express yourself in a more concise way, reducing boilerplate, and increasing the safety of your code. Haskell is an elegant and noise-free pure functional language with a long history, having a huge number of library contributors and an active community. This makes Haskell the best tool for both learning and applying functional programming, and Practical Haskell, Third Edition takes advantage of this to show off the language and what it can do. Free source code available on the Apress GitHub page for this book.What You Will LearnGet started programming with HaskellExamine the different parts of the languageGain an overview of the most important libraries and tools in the Haskell ecosystemApply functional patterns in real-world scenariosUnderstand monads and monad transformersProficiently use laziness and resource managementWho This Book Is ForExperienced programmers who may be new to the Haskell programming language. However, some prior exposure to Haskell is recommended.
Practical HDR: A complete guide to creating High Dynamic Range images with your Digital SLR
by David NightingaleHDR is both a technical solution to the limitations of digital camera sensors, and a creative tool that can give any image much more impact - but it is not without its pitfalls, and it's essential to understand these if you want to take full advantage of this innovative technique. The second edition of David Nightingale's successful Practical HDR is completely updated with the latest techniques and technologies in HDR. Practical HDR provides you with an abundance of step-by-step examples that will quickly make you an expert on the theory and practice of shooting and processing HDR images, allowing you to get the best possible results every time. As well as practical advice on shooting and processing, the book also contains a global showcase of inspirational HDR images - you will quickly find that HDR offers unparralleled opportunities for indulging your creative instincts, from photo-realistic to hyper-realism.
Practical HDR (2nd Edition): The Complete Guide To Creating High Dynamic Range Images With Your Digital Slr
by David NightingaleThe first edition of David Nightingale's Practical HDR swiftly established itself as the standard work on this cutting-edge processing technique, garnering rave reviews and reprinting several times. Now, technical advances in the field have expanded HDR's possibilities still further, and this second, expanded edition, revised throughout, will cement David's reputation as the most respected writer in the field.Covering new programs, in particular Adobe CS5's HDR capabilities, and with more killer photos from the world's leading lights in HDR processing, Practical HDR will let the reader create jaw-dropping images that demand a second look.
Practical HDRI
by Jack HowardPractical HDRI, 2nd Edition, by pro photographer Jack Howard, leads you into the the new frontier of High Dynamic Range Imaging, a multi-shot technique to digitally capture, store, and edit the full luminosity range of a scene in ways not possible in a single captured image. Fully updated for 2010, the 2nd Edition covers the HDR process from image capture through post-processing for web and print. Practical HDRI, 2nd Edition is richly illustrated with step-by-step tutorials for creating professional results using the leading HDR software titles, including the latest versions of Adobe Photoshop, Photomatix Pro, FDRTools, Dynamic Photo HDR, and HDR PhotoStudio. Howard instructs from experience as a photographer and a writer, with an emphasis on making the HDR process work for you. Topics include: Step-by-step tutorials Basic and advanced workflows and workarounds Web and print optimization File management, keywording Advice on cameras, gear and software HDR imaging can be challenging and frustrating for the uninitiated, as it involves both field and computer expertise. However, Jack Howard explains this complex subject matter in a practical way that will not intimidate the beginner, nor bore the experienced photographer. The emphasis is on the creative process and how to make it work for you-rather than the science behind it.
Practical Hexo: A Hands-On Introduction to Building Blogs Using the Hexo Framework
by Alex LibbyLeverage the power of Hexo to quickly produce static blog sites that are efficient and fast. This project-oriented book simplifies the process of setting up Hexo and manipulating content, using little more than a text editor and free software. It will equip you with a starting toolset that you can use to develop future projects, incorporate into your existing workflow and allow you to take your websites to the next level. Hexo is based on JavaScript and Node.js, two of the biggest tools available for developers: you can enhance, extend, and configure Hexo as requirements dictate. With Hexo the art of possible is only limited by the extent of your imagination and the power of JavaScript and Node.js.Practical Hexo gets you quickly acquainted with creating and manipulating blogs using a static site generator approach. You will understand how to use the Hexo framework to rapidly create and deploy blogs that are performant, with the minimum of fuss, then extend and customize your content using plugins and themes. You will work through some practical projects to help solidify your skills, and put them into practice. What You'll LearnImplement the Hexo framework in a projectCustomize and extend contentConsider maintenance requirements and how they compare to other blog systemsApply skills to practical, real-world projectsCreate themes and build pluginsMake changes using other tools and libraries. Who This Book Is For Website developers who are already familiar with JavaScript and keen to learn how to leverage the Hexo framework. Agile development team members, where time is of the essence to deliver results quickly. Developers who want to focus on simplicity, to produce efficient and properly optimized content in modern browsers using tools already in their possession.
Practical Highcharts with Angular: Your Essential Guide to Creating Real-time Dashboards
by Sourabh MishraHighcharts is a popular charting product that provides stunning animated and interactive charts. This concise book examines data analysis and construct the right graph. Nowadays, charting is used by the finance, education, entertainment, sports and real estate sectors to analyse their data. Built on top of of modern Javascript frameworks like jQuery and Angular, Highcharts enables developers to easily construct charts that will work in all modern browsers with pure knowledge of HTML, CSS, and JavaScript. You'll see how to use Highcharts, call backend services for data, and easily construct real-time data dashboards. You'll also learn how you can club your code with jQuery and Angular. This book provides the best solutions for real-time challenges and covers a wide range of charts including line, area, maps, plot, different types of pie chart, Gauge, heat map, Histogram chart, stacked bar, scatter plot and 3D Charts. After reading this book, you'll be able to export your charts in different formats for project-based learning. What You'll Learn Basics of Angular, consuming service through angular and implement highcharts using Angular. Use and export different chart types Work on a real-time data project calling Web API and Ajax calls through the various data sources using Angular.Create interactive styling themes and colors for a dashboard Who This Book Is For Developers, tech leads, architects or students with basic knowledge of HTML, CSS, and JavaScript who want to develop high performing, stunning, smooth, and interactive animated charts for your web products.
Practical Highcharts with Angular: Your Essential Guide to Creating Real-time Dashboards
by Sourabh MishraLearn to create stunning animated and interactive charts using Highcharts and Angular. This updated edition will build on your existing knowledge of HTML, CSS, and JavaScript to develop impressive dashboards that will work in all modern browsers.You will learn how to use Highcharts, call backend services for data, and easily construct real-time data dashboards so you can club your code with jQuery and Angular. This book provides the best solutions for real-time challenges and covers a wide range of charts including line, area, maps, plot, and much more. You will also learn about arc diagrams, bubble series, dependency wheels, and error bar series. After reading this book, you'll be able to export your charts in different formats for project-based learning. Highcharts is one the most useful products worldwide for developing charting on the web, and Angular is well known for speed. Using Highcharts with Angular developers can build fast, interactive dashboards. Get up to speed using this book today. What You’ll LearnCreate interactive animated styling themes and colors for a dashboardWork on a real-time data project using Web API and Ajax calls through different data sourcesExport charts in various formats Who This Book Is For Developers, dev leads, software architects, students or enthusiasts who are already familiar with HTML, CSS, and JavaScript.
Practical Hive
by Scott Shaw Andreas François Vermeulen Ankur Gupta David KjerrumgaardDive into the world of SQL on Hadoop and get the most out of your Hive data warehouses. This book is your go-to resource for using Hive: authors Scott Shaw, Ankur Gupta, David Kjerrumgaard, and Andreas Francois Vermeulen take you through learning HiveQL, the SQL-like language specific to Hive, to analyze, export, and massage the data stored across your Hadoop environment. From deploying Hive on your hardware or virtual machine and setting up its initial configuration to learning how Hive interacts with Hadoop, MapReduce, Tez and other big data technologies, Practical Hive gives you a detailed treatment of the software. In addition, this book discusses the value of open source software, Hive performance tuning, and how to leverage semi-structured and unstructured data. What You Will Learn Install and configure Hive for new and existing datasets Perform DDL operations Execute efficient DML operations Use tables, partitions, buckets, and user-defined functions Discover performance tuning tips and Hive best practices Who This Book Is For Developers, companies, and professionals who deal with large amounts of data and could use software that can efficiently manage large volumes of input. It is assumed that readers have the ability to work with SQL.
Practical Implementation of a Data Lake: Translating Customer Expectations into Tangible Technical Goals
by Nayanjyoti PaulThis book explains how to implement a data lake strategy, covering the technical and business challenges architects commonly face. It also illustrates how and why client requirements should drive architectural decisions. Drawing upon a specific case from his own experience, author Nayanjyoti Paul begins with the consideration from which all subsequent decisions should flow: what does your customer need? He also describes the importance of identifying key stakeholders and the key points to focus on when starting a new project. Next, he takes you through the business and technical requirement-gathering process, and how to translate customer expectations into tangible technical goals. From there, you’ll gain insight into the security model that will allow you to establish security and legal guardrails, as well as different aspects of security from the end user’s perspective. You’ll learn which organizational roles need to be onboarded into the data lake, their responsibilities, the services they need access to, and how the hierarchy of escalations should work. Subsequent chapters explore how to divide your data lakes into zones, organize data for security and access, manage data sensitivity, and techniques used for data obfuscation. Audit and logging capabilities in the data lake are also covered before a deep dive into designing data lakes to handle multiple kinds and file formats and access patterns. The book concludes by focusing on production operationalization and solutions to implement a production setup. After completing this book, you will understand how to implement a data lake, the best practices to employ while doing so, and will be armed with practical tips to solve business problems. What You Will Learn Understand the challenges associated with implementing a data lakeExplore the architectural patterns and processes used to design a new data lakeDesign and implement data lake capabilitiesAssociate business requirements with technical deliverables to drive success Who This Book Is For Data Scientists and Architects, Machine Learning Engineers, and Software Engineers.
Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT
by Charles J. Brooks Philip A. Craig Jr.A practical roadmap to protecting against cyberattacks in industrial environments In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an authoritative and robust discussion of how to meet modern industrial cybersecurity challenges. The book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam. Full of hands-on explanations and practical guidance, this book also includes: Comprehensive coverage consistent with the National Institute of Standards and Technology guidelines for establishing secure industrial control systems (ICS) Rigorous explorations of ICS architecture, module and element hardening, security assessment, security governance, risk management, and morePractical Industrial Cybersecurity is an indispensable read for anyone preparing for the Global Industrial Cyber Security Professional (GICSP) exam offered by the Global Information Assurance Certification (GIAC). It also belongs on the bookshelves of cybersecurity personnel at industrial process control and utility companies. Practical Industrial Cybersecurity provides key insights to the Purdue ANSI/ISA 95 Industrial Network Security reference model and how it is implemented from the production floor level to the Internet connection of the corporate network. It is a valuable tool for professionals already working in the ICS/Utility network environment, IT cybersecurity personnel transitioning to the OT network environment, and those looking for a rewarding entry point into the cybersecurity field.
Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries
by Sravani BhattacharjeeSkillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world.Key FeaturesGain practical insight into security concepts in the Industrial Internet of Things (IIoT) architectureDemystify complex topics such as cryptography and blockchainComprehensive references to industry standards and security frameworks when developing IIoT blueprintsBook DescriptionSecuring connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of Things Security enables you to develop a comprehensive understanding of the entire spectrum of securing connected industries, from the edge to the cloud.This book establishes the foundational concepts and tenets of IIoT security by presenting real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical know-how on the multi-layered defense techniques including Identity and Access Management (IAM), endpoint security, and communication infrastructure. Stakeholders, including developers, architects, and business leaders, can gain practical insights in securing IIoT lifecycle processes, standardization, governance and assess the applicability of emerging technologies, such as blockchain, Artificial Intelligence, and Machine Learning, to design and implement resilient connected systems and harness significant industrial opportunities.What you will learnUnderstand the crucial concepts of a multi-layered IIoT security frameworkGain insight on securing identity, access, and configuration management for large-scale IIoT deploymentsSecure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivityBuild a concrete security program for your IIoT deploymentExplore techniques from case studies on industrial IoT threat modeling and mitigation approachesLearn risk management and mitigation planningWho this book is forPractical Industrial Internet of Things Security is for the IIoT community, which includes IIoT researchers, security professionals, architects, developers, and business stakeholders. Anyone who needs to have a comprehensive understanding of the unique safety and security challenges of connected industries and practical methodologies to secure industrial assets will find this book immensely helpful. This book is uniquely designed to benefit professionals from both IT and industrial operations backgrounds.
Practical Information Security: A Competency-based Education Course
by Ahmed Aleroud Izzat Alsmadi Robert Burdwell Abdallah Wahbeh Mahmoud Ali Al-Qudah Ahmad Al-OmariThis textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.
Practical Information Security Management
by Tony CampbellCreate appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks. Practical Information Security Management provides a wealth of practical advice for anyone responsible for information security management in the workplace, focusing on the 'how' rather than the 'what'. Together we'll cut through the policies, regulations, and standards to expose the real inner workings of what makes a security management program effective, covering the full gamut of subject matter pertaining to security management: organizational structures, security architectures, technical controls, governance frameworks, and operational security. This book was not written to help you pass your CISSP, CISM, or CISMP or become a PCI-DSS auditor. It won't help you build an ISO 27001 or COBIT-compliant security management system, and it won't help you become an ethical hacker or digital forensics investigator - there are many excellent books on the market that cover these subjects in detail. Instead, this is a practical book that offers years of real-world experience in helping you focus on the getting the job done. What You Will Learn Learn the practical aspects of being an effective information security manager Strike the right balance between cost and risk Take security policies and standards and make them work in reality Leverage complex security functions, such as Digital Forensics, Incident Response and Security Architecture Who This Book Is For Anyone who wants to make a difference in offering effective security management for their business. You might already be a security manager seeking insight into areas of the job that you've not looked at before, or you might be a techie or risk guy wanting to switch into this challenging new career. Whatever your career goals are, Practical Security Management has something to offer you.
Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defense (River Publishers Series in Rapids in Security and Digital Forensics)
by Lyndon MarshallThis book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed. From acquiring software, to the ongoing flaws in email, to the risks of file sharing, and issues surrounding social media and social reputation, Practical Insecurity is the tool you need to maximize your self-protection in the digital world. Everyone has had a brush with cybersecurity—in some way. Our computer has gotten a virus, somebody you know has lost all their company’s data because of ransomware, someone has stolen our identity, a store we do business with has their computer system compromised—including our account—so we are offered free identity protection, and so on. It seems like everyday there is another bit of bad news and it often impacts us. But, the question largely goes unanswered: what can I do as an individual or as the owner of a small business to protect myself against having my security compromised? Practical Insecurity provides the answers.
Practical Internet of Things Networking: Understanding IoT Layered Architecture
by Rolando HerreroThis textbook explores the different protocols and technologies that are key to supporting the most important Internet of Things (IoT) networking scenarios. Intended for upper undergraduate classes, the author presents these protocols and technologies from a perspective of the standard layered architecture with special focus on protocol interaction and functionality. To this end, the book provides a unique step-by-step hands-on approach that enables the reader to use common software tools and network emulators to understand, prototype, and deploy a vast range of use cases. The author shows how these topologies, which rely on standard physical layer technologies like LoRa, NB-IoT, LTE-M, IEEE 802.15.4 and BLE, provide end-to-end IPv6 connectivity and comply with the most important requirements of industrial IoT solutions. The book helps readers learn how to build IoT networks through exercises, lab projects, and examples.
Practical Internet of Things Security
by Drew Van Duren Brian RussellA practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book * Learn to design and implement cyber security strategies for your organization * Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem * Learn best practices to secure your data from device to the cloud * Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn * Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments * Build a rock-solid security program for IoT that is cost-effective and easy to maintain * Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture * See how the selection of individual components can affect the security posture of the entire system * Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem * Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In Detail With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Style and approach This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.
Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem, 2nd Edition
by Brian Russell Drew Van DurenA practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected worldKey FeaturesLearn best practices to secure your data from the device to the cloudUse systems security engineering and privacy-by-design principles to design a secure IoT ecosystemA practical guide that will help you design and implement cyber security strategies for your organizationBook DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces. It therefore becomes critical to ensure that cybersecurity threats are contained to a minimum when implementing new IoT services and solutions.This book shows you how to implement cybersecurity solutions, IoT design best practices, and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.In this second edition, you will go through some typical and unique vulnerabilities seen within various layers of the IoT technology stack and also learn new ways in which IT and physical threats interact. You will then explore the different engineering approaches a developer/manufacturer might take to securely design and deploy IoT devices. Furthermore, you will securely develop your own custom additions for an enterprise IoT implementation. You will also be provided with actionable guidance through setting up a cryptographic infrastructure for your IoT implementations. You will then be guided on the selection and configuration of Identity and Access Management solutions for an IoT implementation. In conclusion, you will explore cloud security architectures and security best practices for operating and managing cross-organizational, multi-domain IoT deployments.What you will learnDiscuss the need for separate security requirements and apply security engineering principles on IoT devicesMaster the operational aspects of planning, deploying, managing, monitoring, and detecting the remediation and disposal of IoT systemsUse Blockchain solutions for IoT authenticity and integrityExplore additional privacy features emerging in the IoT industry, such as anonymity, tracking issues, and countermeasuresDesign a fog computing architecture to support IoT edge analyticsDetect and respond to IoT security incidents and compromisesWho this book is forThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure the security of their organization's data when connected through the IoT. Business analysts and managers will also find this book useful.
Practical Internet of Things with JavaScript (ES5/ES6): Build standalone exciting IoT projects with Raspberry Pi 3 and JavaScript (ES5/ES6)
by Arvind Ravulavaru Vijaya Kumar SudaKey Features Leverage the capability of IoT with the combination of Raspberry Pi 3 and JavaScript (ES5/ES6) Develop a health monitoring device along with some cool projects like Smart Agriculture & Raspberry Pi 3 based surveillance. A practical book which will help you build Mobile/Web/Desktop apps that will show how to manage and monitor data from sensors and actuators in real time. Book Description In this world of technology upgrades, IoT is currently leading with its promise to make the world a more smarter and efficient place. This book will show you how to build simple IoT solutions that will help you to understand how this technology works. We would not only explore the IoT solution stack, but we will also see how to do it with the world’s most misunderstood programming language - JavaScript. Using Raspberry Pi 3 and JavaScript (ES5/ES6) as the base to build all the projects, you will begin with learning about the fundamentals of IoT and then build a standard framework for developing all the applications covered in this book. You will then move on to build a weather station with temperature, humidity and moisture sensors and further integrate Alexa with it. Further, you will build a smart wearable for understanding the concept of fall detection. You will then extend it with the 'If This Then That' (IFTTT) rules engine to send an email on fall detection. Finally, you will be working with the Raspberry Pi 3 camera module and surveillance with a bit of facial detection using Amazon Rekognition platform. At the end of the book, you will not only be able to build standalone exciting IoT applications but also learn how you can extend your projects to another level. What you will learn Integrate sensors and actuators with the cloud and control them for your Smart Weather Station. Develop your very own Amazon Alexa integrating with your IoT solution Define custom rules and execute jobs on certain data events using IFTTT Build a simple surveillance solutions using Amazon Recognition & Raspberry Pi 3 Design a fall detection system and build a notification system for it. Use Amazon Rekognition for face detection and face recognition in your Surveillance project
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
by Robert La LauLearn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.After a chapter explaining the most important Unix basics, you will start with a vanilla server as delivered by a hosting provider and by the end of the book, you will have a fully functional and well-secured enterprise class internet server. You will also be equipped with the expertise needed to keep your server secured and up to date. All configuration examples are given for FreeBSD, Debian and CentOS, so you are free to choose your operating system. No single blueprint exists for an internet server, and an important part of the work of a system administrator consists of analyzing, interpreting and implementing specific wishes, demands and restrictions from different departments and viewpoints within an organization. Practical Internet Server Configuration provides the information you need to succeed as a sysadmin. What You'll Learn Configure DNS using Bind 9Set up Apache and NginxCustomize a mail server: IMAP (Dovecot) and SMTP (Postfix), spam filtering includedAuthenticate mail users using LDAPInstall and maintain MariaDB and PostgreSQL databasesPrepare SSL/TLS certificates for the encryption of web, mail and LDAP trafficSynchronize files, calendars and address books between devicesBuild a firewall: PF for FreeBSD and nftables for Linux Who This Book Is For This book can be used by aspiring and beginning system administrators who are working on personal servers, or more experienced system administrators who may know Unix well but need a reference book for the more specialized work that falls outside the daily routine. Basic understanding of Unix and working on the command line is necessary.
A Practical Introduction to Computer Vision with OpenCV
by Kenneth Dawson-HoweExplains the theory behind basic computer vision and provides a bridge from the theory to practical implementation using the industry standard OpenCV librariesComputer Vision is a rapidly expanding area and it is becoming progressively easier for developers to make use of this field due to the ready availability of high quality libraries (such as OpenCV 2). This text is intended to facilitate the practical use of computer vision with the goal being to bridge the gap between the theory and the practical implementation of computer vision. The book will explain how to use the relevant OpenCV library routines and will be accompanied by a full working program including the code snippets from the text. This textbook is a heavily illustrated, practical introduction to an exciting field, the applications of which are becoming almost ubiquitous. We are now surrounded by cameras, for example cameras on computers & tablets/ cameras built into our mobile phones/ cameras in games consoles; cameras imaging difficult modalities (such as ultrasound, X-ray, MRI) in hospitals, and surveillance cameras. This book is concerned with helping the next generation of computer developers to make use of all these images in order to develop systems which are more intuitive and interact with us in more intelligent ways. Explains the theory behind basic computer vision and provides a bridge from the theory to practical implementation using the industry standard OpenCV librariesOffers an introduction to computer vision, with enough theory to make clear how the various algorithms work but with an emphasis on practical programming issuesProvides enough material for a one semester course in computer vision at senior undergraduate and Masters levels Includes the basics of cameras and images and image processing to remove noise, before moving on to topics such as image histogramming; binary imaging; video processing to detect and model moving objects; geometric operations & camera models; edge detection; features detection; recognition in imagesContains a large number of vision application problems to provide students with the opportunity to solve real problems. Images or videos for these problems are provided in the resources associated with this book which include an enhanced eBook
A Practical Introduction to Enterprise Network and Security Management
by Bongsik ShinComputer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful professional career. A Practical Introduction to Enterprise Network and Security Management contains 12 chapters of the correct amount of coverage for a semester or quarter. It balances introductory and fairly advanced subjects on computer networking and cybersecurity to deliver effectively technical and managerial knowledge. It explains sometimes challenging concepts in a manner that students can follow with careful reading. A Practical Introduction to Enterprise Network and Security Management is designed to offer impactful, hands-on learning experiences without relying on a computer lab. First, each chapter comes with practical exercise questions. In the class setting, they are good as individual or group assignments. Many of them are based on simulated or real cases, and take advantage of actual industry products and systems for a reader to better relate theories to practice. Second, there are a number of information-rich screen shots, figures, and tables in each chapter carefully constructed to solidify concepts and thus enhance visual learning. A Practical Introduction to Enterprise Network and Security Management Is written for students studying management information systems, accounting information systems, or computer science in a semester of 15 to 16 weeks, and exposed to the subject for the first time Takes advantage of many real cases and examples, and actual industry products and services (software, hardware, and configurations) so that students can better relate concepts and theories to practice Explains subjects in a systematic, but very practical manner that students can follow through Provides students with practical understanding of both computer networking and cybersecurity Contains highly practical exercise questions, which can be individual or group assignments within or without the class, included in each chapter to reinforce learning. In addition to the thorough technical details, managerial issues including, enterprise network planning, design, and management from the practitioner’s perspective are embedded throughout the text to assist balanced learning. Bearing in mind of the critical importance of security in today’s enterprise networks, the text discusses the implications of network design and management on enterprise security whenever appropriate. Lastly, to reinforce knowledge in security management further, two chapters introduce the fundamentals of cybersecurity in terms of threat types and defense techniques.
A Practical Introduction to Enterprise Network and Security Management
by Bongsik ShinA Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity. Although much of the focus is on technical concepts, managerial issues related to enterprise network and security planning and design are explained from a practitioner’s perspective. Because of the critical importance of cybersecurity in today’s enterprise networks, security-related issues are explained throughout the book, and four chapters are dedicated to fundamental knowledge. Challenging concepts are explained so readers can follow through with careful reading. This book is written for those who are self-studying or studying information systems or computer science in a classroom setting. If used for a course, it has enough material for a semester or a quarter. FEATURES Provides both theoretical and practical hands-on knowledge and learning experiences for computer networking and cybersecurity Offers a solid knowledge base for those preparing for certificate tests, such as CompTIA and CISSP Takes advantage of actual cases, examples, industry products, and services so students can relate concepts and theories to practice Explains subjects in a systematic and practical manner to facilitate understanding Includes practical exercise questions that can be individual or group assignments within or without a classroom Contains several information-rich screenshots, figures, and tables carefully constructed to solidify concepts and enhance visual learning The text is designed for students studying information systems or computer science for the first time. As a textbook, this book includes hands-on assignments based on the Packet Tracer program, an excellent network design and simulation tool from Cisco. Instructor materials also are provided, including PowerPoint slides, solutions for exercise questions, and additional chapter questions from which to build tests.
A Practical Introduction to Hardware/Software Codesign
by Patrick R. SchaumontThis book provides a systematic introduction to the topic of Hardware-Software Codesign. The material emphasizes the basic ideas, and the practical aspects of Hardware-Software Codesign. The book developed from a course on the topic of Hardware-Software Codesign, organized by the author at Virginia Tech. It is separated into four differenct sections; Basic Concepts, Custom Architectures, Hardware/Software Interfaces, and Applications. The author covers many concepts including the various forms of expressing computations, sequential and parallel implementations, control-flow and data-flow, control dependency and data dependency, latency and throughput as well as the architecture design space of hardware data paths, finite state machines, micro-programmed machines, instruction-set processors, system-on-chip, and on-chip buses. The material also includes the different forms of hardware/software interfaces, their impact on performance, hardware cost, and software complexity. The book contains information on hardware/software integration of components on top of hardware/software interfaces as well as design methodology and design flows for hardware-software codesign including performance evaluation, verification and synthesis of hardware and software implementations. Problems are included at the end of each chapter and a solutions manual will be available for instructors.
A Practical Introduction to Supply Chain
by David PheaseyIn many businesses, supply chain people are trapped in reactive roles where they source, contract, purchase, receive, warehouse, and ship as a service. However, in some businesses suppliers contribute to improvement programs, technology, funding, marketing, logistics, and engineering expertise. Breaking into a proactive supply chain role takes broad thinking, a talent for persuasion, and the courage to go after it. This book supplies proven methods to help you do so.A Practical Introduction to Supply Chain describes how to run an efficient supply chain that exceeds expectations in terms of cost, quality, and supplier delivery. It explains the need to integrate systems, the flow of information, and the way in which people work together between commercial purchasing, materials management, and distribution parts of the supply chain.Sharing powerful insights from the perspective of a supply chain manager, the book details practical techniques drawn from the author’s decades of experience. It presents methods that apply directly to supply chains involving a physical product, manufactured internally or outsourced, as well as physical operations such as oilfield services.This book demonstrates how to make a supply chain organization work in practice—contributing more to business success than traditional purchasing and logistics organizations can. In addition to writing about practical supply chain issues and approaches, the author also describes proven methods he used while working with client teams on assignments. He also details some of the ways his teams used to manage the people part of the change.