Browse Results

Showing 44,451 through 44,475 of 59,381 results

Practical Salesforce Architecture: Understanding and Deploying the Salesforce Ecosystem for the Enterprise

by Paul McCollum

Once renowned as a customer relationship management tool, Salesforce has evolved into a cloud-first application and capability ecosystem. With dedicated components for tasks such as middleware, big data, reporting, ETL, data loading, and API orchestration, Salesforce has become more prevalent in modern architectures.This concise yet comprehensive guide provides an overview of Salesforce architecture for enterprise architects and Salesforce ecosystem architects. Author Paul McCollum, Salesforce Technical Architect at Accenture, provides a roadmap for integrating major elements of the Salesforce ecosystem with planned or existing enterprise architecture. You'll learn how to use these components to address the diverse needs of different organizations.Many companies today are adding or building multicloud capabilities and incorporating various elements from the Salesforce ecosystem. With this book, you'll learn:Strengths, weaknesses, and growth areas of Salesforce's enterprise architecture domain featuresHow Salesforce compares to other cloud providersMethods for using the Salesforce ecosystem effectively to address your organization's needsHow to integrate Salesforce with planned or existing enterprise architecturesWays to manage and forecast performance, complexity, and ease of operation across the Salesforce platform

Practical Salesforce.com Development Without Code

by Philip Weinmeister

Are you facing a challenging Salesforce. com problem--say, relating to automation, configuration, formulation, or reporting--that you can't quite crack? Or maybe you are hoping to infuse some creativity into your solution design strategy to solve problems faster or make solutions more efficient? Practical Salesforce. com Development Without Code shows you how to unlock the power of the Force. com platform to solve real business problems--and all without writing a line of code. Adhering to Salesforce. com's 'clicks, not code' mantra, Salesforce. com expert Phil Weinmeister walks you through different business problems and identifies effective, creative--and proven--approaches to solutions using the platform's declarative framework. If you are a Salesforce. com administrator, analyst, consultant, or developer, you can attest to the insatiable appetite of users for new functionality. Your clients expect solutions--and now. By adopting Practical Salesforce. com Development Without Code as your guide, you will learn how to deliver business solutions within Salesforce. com by combining analysis, creativity, and logic with some of its core elements, including validation rules, workflow rules, and formula fields. In addition, Weinmeister dissects and explains the most useful functions and features for developers, and shows you how to use them. Among other things, you will learn how to: Build objects, fields, and relationships to establish a sensible data modelAutomate business processes by using workflow rules and flows (Visual Workflow)Utilize functions and develop formulas effectively for a variety of business needsDevelop intricate approval processes to handle exception scenariosEmploy publisher actions to drive additional functionality from the Chatter feedManage your data using Data LoaderBest of all, Weinmeister uses real-life business scenarios and visuals to keep you engaged and learning something new with every page you read. Practical Salesforce. com Development Without Code will help you absorb the principles behind dozens of creative and thoughtful ways to solve your business problems. Applying the lessons learned from this how-to guide will ultimately save you time and ensure that your clients or internal customers are well satisfied and productive

Practical Salesforce Development Without Code: Building Declarative Solutions on the Salesforce Platform

by Philip Weinmeister

Use this hands-on guide to build powerful solutions on the Salesforce platform without using a single line of code. This revised and expanded second edition includes Process Builder, Flow Builder, Lightning App Builder, Lightning Bolt Solutions, and more.Practical Salesforce Development Without Code shows you how to unlock the power of the Salesforce platform to solve real business problems. Adhering to Salesforce's "clicks, not code" mantra, Salesforce expert Phil Weinmeister walks Salesforce newcomers and veterans through different business problems and identifies effective—and proven—approaches to solutions using the platform's declarative framework.By adopting this book as your guide, you will learn how to deliver business solutions within Salesforce by combining analysis, creativity, and logic with core elements such as validation rules, workflow rules, processes, flows, formula fields, and Lightning apps. In addition, Weinmeister dissects and explains the most useful functions and features for declarative developers and shows you how to use them. Best of all, Weinmeister uses real-life business scenarios and visuals. Applying the lessons learned from this how-to guide will ultimately save you time and ensure that your clients or internal customers are enabled, equipped, and empowered. What You'll Learn Build objects, fields, and relationships to establish a sensible data modelAutomate business processes by using Workflow, Process Builder, and FlowUtilize functions and develop formulas effectively for a variety of business needsDevelop approval processes to handle exception scenariosEmploy actions to easily create efficient and relevant user experiencesManage your environments and deploy your solutions Who This Book Is forBusiness analysts, Salesforce administrators, and Salesforce developers

Practical Scala DSLs: Real-World Applications Using Domain Specific Languages

by Pierluigi Riti

Build domain specific languages (DSLs) using Java's most popular functional programming language: Scala. This book introduces the basics of Scala and DSLs using a series of practical examples. In Practical Scala DSLs, you'll learn to create pragmatic and complete code examples that explain the actual use of DSLs with Scala: a web API and microservices; a custom language; a mobile app; a Forex system; a game; and cloud applications. At the end of this unique book, you'll be able to describe the differences between external and internal DSLs; understand when and how to apply DSLs; create DSLs using Scala; and even create a DSL using another programming language. What You'll Learn Build DSLs in Scala Write a web API and microservices Create a custom language Apply DSLs to mobile apps development, a Forex trading system, game development, and more Discover the role of DSLs in cloud development Integrate DSLs as part of a DevOps program or structure Build internal and external DSLs Who This Book Is For Experienced Java coders with at least some prior experience with Scala. You may be new to DSLs.

Practical Security: Simple Practices for Defending Your Systems

by Roman Zabicki

Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basics of good security now, and you'll have a solid foundation if you bring in a dedicated security staff later. Identify the weaknesses in your system, and defend against the attacks most likely to compromise your organization, without needing to become a trained security professional. Computer security is a complex issue. But you don't have to be an expert in all the esoteric details to prevent many common attacks. Attackers are opportunistic and won't use a complex attack when a simple one will do. You can get a lot of benefit without too much complexity, by putting systems and processes in place that ensure you aren't making the obvious mistakes. Secure your systems better, with simple (though not always easy) practices. Plan to patch often to improve your security posture. Identify the most common software vulnerabilities, so you can avoid them when writing software. Discover cryptography - how it works, how easy it is to get wrong, and how to get it right. Configure your Windows computers securely. Defend your organization against phishing attacks with training and technical defenses. Make simple changes to harden your system against attackers. What You Need: You don't need any particular software to follow along with this book. Examples in the book describe security vulnerabilities and how to look for them. These examples will be more interesting if you have access to a code base you've worked on. Similarly, some examples describe network vulnerabilities and how to detect them. These will be more interesting with access to a network you support.

Practical Security Automation and Testing: Tools and techniques for automated security scanning and testing in DevSecOps

by Tony Hsiang-Chih Hsu

Your one stop guide to automating infrastructure security using DevOps and DevSecOpsKey FeaturesSecure and automate techniques to protect web, mobile or cloud servicesAutomate secure code inspection in C++, Java, Python, and JavaScriptIntegrate security testing with automation frameworks like fuzz, BDD, Selenium and Robot FrameworkBook DescriptionSecurity automation is the automatic handling of software security assessments tasks. This book helps you to build your security automation framework to scan for vulnerabilities without human intervention.This book will teach you to adopt security automation techniques to continuously improve your entire software development and security testing. You will learn to use open source tools and techniques to integrate security testing tools directly into your CI/CD framework. With this book, you will see how to implement security inspection at every layer, such as secure code inspection, fuzz testing, Rest API, privacy, infrastructure security, and web UI testing. With the help of practical examples, this book will teach you to implement the combination of automation and Security in DevOps. You will learn about the integration of security testing results for an overall security status for projects.By the end of this book, you will be confident implementing automation security in all layers of your software development stages and will be able to build your own in-house security automation platform throughout your mobile and cloud releases.What you will learnAutomate secure code inspection with open source tools and effective secure code scanning suggestionsApply security testing tools and automation frameworks to identify security vulnerabilities in web, mobile and cloud servicesIntegrate security testing tools such as OWASP ZAP, NMAP, SSLyze, SQLMap, and OpenSCAPImplement automation testing techniques with Selenium, JMeter, Robot Framework, Gauntlt, BDD, DDT, and Python unittestExecute security testing of a Rest API Implement web application security with open source tools and script templates for CI/CD integrationIntegrate various types of security testing tool results from a single project into one dashboardWho this book is forThe book is for software developers, architects, testers and QA engineers who are looking to leverage automated security testing techniques.

Practical Security for Agile and DevOps

by Mark S. Merkow

This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it. This is an excellent perspective for students who want to learn about securing application development. After having made all the rookie mistakes, the author realized that software security is a human factors issue rather than a technical or process issue alone. Throwing technology into an environment that expects people to deal with it but failing to prepare them technically and psychologically with the knowledge and skills needed is a certain recipe for bad results. Practical Security for Agile and DevOps is a collection of best practices and effective implementation recommendations that are proven to work. The text leaves the boring details of software security theory out of the discussion as much as possible to concentrate on practical applied software security that is useful to professionals. It is as much a book for students’ own benefit as it is for the benefit of their academic careers and organizations. Professionals who are skilled in secure and resilient software development and related tasks are in tremendous demand. This demand will increase exponentially for the foreseeable future. As students integrate the text’s best practices into their daily duties, their value increases to their companies, management, community, and industry. The textbook was written for the following readers: Students in higher education programs in business or engineering disciplines AppSec architects and program managers in information security organizations Enterprise architecture teams with a focus on application development Scrum Teams including: Scrum Masters Engineers/developers Analysts Architects Testers DevOps teams Product owners and their management Project managers Application security auditors Agile coaches and trainers Instructors and trainers in academia and private organizations

Practical Security Properties on Commodity Computing Platforms: The uber eXtensible Micro-Hypervisor Framework (SpringerBriefs in Computer Science)

by Amit Vasudevan

This SpringerBrief discusses the uber eXtensible Micro-hypervisor Framework (uberXMHF), a novel micro-hypervisor system security architecture and framework that can isolate security-sensitive applications from other untrustworthy applications on commodity platforms, enabling their safe co-existence. uberXMHF, in addition, facilitates runtime monitoring of the untrustworthy components, which is illustrated in this SpringerBrief. uberXMHF focuses on three goals which are keys to achieving practical security on commodity platforms: (a) commodity compatibility (e.g., runs unmodified Linux and Windows) and unfettered access to platform hardware; (b) low trusted computing base and complexity; and (c) efficient implementation.uberXMHF strives to be a comprehensible, practical and flexible platform for performing micro-hypervisor research and development. uberXMHF encapsulates common hypervisor core functionality in a framework that allows developers and users to build custom micro-hypervisor based (security-sensitive) applications (called "uberapps"). The authors describe several uberapps that employ uberXMHF and showcase the framework efficacy and versatility. These uberapps span a wide spectrum of security applications including application compartmentalization and sandboxing, attestation, approved code execution, key management, tracing, verifiable resource accounting, trusted-path and on-demand I/O isolation.The authors are encouraged by the end result - a clean, barebones, low trusted computing base micro-hypervisor framework for commodity platforms with desirable performance characteristics and an architecture amenable to manual audits and/or formal reasoning. Active, open-source development of uberXMHF continues.The primary audience for this SpringerBrief is system (security) researchers and developers of commodity system software. Practitioners working in system security deployment mechanisms within industry and defense, as well as advanced-level students studying computer science with an interest in security will also want to read this SpringerBrief.

Practical Shader Development: Vertex and Fragment Shaders for Game Developers

by Kyle Halladay

It’s time to stop thinking that shaders are magical. You can use shaders to turn data into stunning visual effects, and get your hands dirty by building your own shader with this step-by-step introduction to shader development for game and graphics developers. Learn how to make shaders that move, tint, light up, and look awesome, all without cracking open a math textbook.Practical Shader Development teaches the theory behind how shaders work. The book also shows you how to apply that theory to create eye-popping visual effects. You’ll learn to profile and optimize those effects to make sure your projects keep running quickly with all their new visuals. You’ll learn good theory, good practices, and without getting bogged down in the math. Author Kyle Halladay explains the fundamentals of shader development through simple examples and hands-on experiments. He teaches you how to find performance issues in shaders you are using and then how to fix them. Kyle explains (and contrasts) how to use the knowledge learned from this book in three of the most popular game engines today. What You'll LearnUnderstand what shaders are and how they workGet up to speed on the nuts and bolts of writing vertex and fragment shadersUtilize color blending and know how blend equations workKnow the coordinate spaces used when rendering real-time computer graphicsUse simple math to animate characters, simulate lights, and create a wide variety of visual effectsFind and fix performance problems in shadersSee how three popular game engines (Unity, UE4, Godot) handle shadersWho This Book Is ForProgrammers who are interested in writing their own shaders but do not know where to start, anyone who has ever seen shader code on a forum and wished they knew how to modify it just a little bit to fit into their own projects, and game developers who are tired of using the default shaders found in the game engines they are using. The book is especially useful for those who have been put off by existing shader tutorials which introduce complex math and graphics theory before ever getting something on the screen.

Practical SharePoint 2013 Enterprise Content Management

by Steve Goodyear

Practical SharePoint 2013 Enterprise Content Management is the first book to guide you through planning and designing each phase of your information life cycle with SharePoint 2013. Author and SharePoint expert Steve Goodyear walks you through how to analyze and plan enterprise content management (ECM) solutions for an effective and end-to-end information design based on your organization''s needs and business requirements. Inside, you will develop a full understanding of how SharePoint 2013 manages content including identifying and understanding your organization''s information within SharePoint, collaborating on transitory content, and capturing and controlling your records. You''ll get practical advice and best practice instruction for each phase of the information life cycle to guide you on designing your ECM strategy and implementing your own ECM solution. You learn how to: Apply a content life cycle model to analyze and understand your organization''s information Design your file plan with content routing rules for your SharePoint records repository Plan and configure your eDiscovery portal and manage discovery cases Design solutions to interface and integrate with external records management systems Identify your organization''s information security requirements Design content types and implement an enterprise content type hub to organize your information Practical SharePoint 2013 Enterprise Content Management is for you if you are a SharePoint architect, administrator, consultant, or project manager, and you implement SharePoint solutions that relate to one or more aspects of the information life cycle involved with ECM. What you''ll learn Apply a content life cycle model to analyze and understand your organization''s information Plan and configure your SharePoint 2013 enterprise eDiscovery portal and manage discovery cases Design your file plan with content routing rules for your SharePoint records repository Design solutions to interface and integrate with external records management systems Design content types and implement an enterprise content type hub to categorize and organize your information Identify your organization''s information security requirements Who this book is for Practical SharePoint 2013 Enterprise Content Management is for you if you are a SharePoint architect, administrator, consultant, or project manager, and you implement SharePoint solutions that relate to one or more aspects of the information life cycle involved with ECM. This book is also for you if you are an enterprise architect or a records manager and you want to learn how ECM fits in SharePoint. This book is definitely for you if you want to learn how to analyze, design, and implement an ECM solution on SharePoint 2013. Table of Contents Introduction Part I: Planning and Analyzing Your Information Lifecycle Chapter 1: Overview of Enterprise Content Management Chapter 2: SharePoint 2013 ECM Features Chapter 3: Analyzing Your Information Life Cycle Chapter 4: Designing Your Information Architecture Part II: Managing Your Transitory Content Chapter 5: Configuring SharePoint for Your Collaboration Content Chapter 6: Classifying and Organizing Your Content Chapter 7: Publishing Your Web Content Chapter 8: Designing Your Electronic Form Processes Part III: Designing Your Information Discovery Chapter 9: Implementing Enterprise Search Chapter 10: Planning Social Computing Chapter 11: Managing eDiscovery and Discovery Cases Chapter 12: Securing Your Content Part IV: Designating and Managing Your Records Chapter 13: Designing Your File Plan Chapter 14: Implementing Your Records Repository Chapter 15: Managing Content Retention and Disposition Chapter 16: Integrating with Other Records Repositories

Practical Signcryption

by Alexander W. Dent Moti Yung Yuliang Zheng

In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented signcryption, an area of cryptography that studies systems that simultaneously provide origin authentication, integrity protection and confidentiality for data. Signcryption schemes combine the features of digital signature schemes with those of public-key encryption schemes and aim to provide security guarantees in a way that is provably correct and significantly less computationally expensive than the "encrypt-then-sign" method most commonly adopted in public-key cryptography. This is the first comprehensive book on signcryption, and brings together leading authors from the field of cryptography in a discussion of the different methods for building efficient and secure signcryption schemes, and the ways in which these schemes can be used in practical systems. Chapters deal with the theory of signcryption, methods for constructing practical signcryption schemes, and the advantages of using such schemes in practical situations. The book will be of benefit to cryptography researchers, graduate students and practitioners.

Practical Simulations for Machine Learning: Using Synthetic Data for AI

by Paris Buttfield-Addison Mars Buttfield-Addison Tim Nugent Jon Manning

Simulation and synthesis are core parts of the future of AI and machine learning. Consider: programmers, data scientists, and machine learning engineers can create the brain of a self-driving car without the car. Rather than use information from the real world, you can synthesize artificial data using simulations to train traditional machine learning models.That's just the beginning.With this practical book, you'll explore the possibilities of simulation- and synthesis-based machine learning and AI, concentrating on deep reinforcement learning and imitation learning techniques. AI and ML are increasingly data driven, and simulations are a powerful, engaging way to unlock their full potential.You'll learn how to:Design an approach for solving ML and AI problems using simulations with the Unity engineUse a game engine to synthesize images for use as training dataCreate simulation environments designed for training deep reinforcement learning and imitation learning modelsUse and apply efficient general-purpose algorithms for simulation-based ML, such as proximal policy optimizationTrain a variety of ML models using different approachesEnable ML tools to work with industry-standard game development tools, using PyTorch, and the Unity ML-Agents and Perception Toolkits

Practical Site Reliability Engineering

by Pethuru Raj Saravanan Pitchaimani Babu Jayaraj

This book will be a learning guide to help software developers, IT operational guys, DevOps engineers, performance specialists, and system engineers to understand how the emerging domain of SRE comes handy in automating and accelerating the process of designing, developing, debugging, deploying and delivering highly reliable applications and services.

Practical Sitecore 8 Configuration and Strategy: A User Guide for Sitecore's Content and Marketing Capabilities

by Phillip Wicklund

Sitecore was recently recognized as one of the most reputable/reliable web content management solutions (WCMS) in the marketplace. Thousands of companies use Sitecore to help manage their web and mobile digital properties. Sitecore is a very large, complex platform that performs many robust functions and capabilities.As such, marketers and end users often have a hard time coming up to speed on the technology. Practical Sitecore 8 Configuration and Strategy: A User Guide for Sitecore's Content and Marketing Capabilities provides that opportunity. The flow of the book will take newbies step-by-step on how to configure Sitecore content, personalization, and marketing automation capabilities. Sprinkled in through the book will be callouts that highlight strategies and best practices—taking the book beyond just the “how to” step-by-step procedures that can be found elsewhere. Practical Sitecore 8 Configuration and Strategy:Brings you up to speed on Sitecore without requiring a training class.Provides the information in a clear, logical outline that takes users from simple, foundational concepts to more advanced concepts at the end.Rounds out existing sources of documentation with strategies and best practices from real-world experience.What You'll LearnHow to manage content in SitecoreHow to create web forms and landing pagesHow to optimize the site through personalization and A/B/N testingHow to use Sitecore for your marketing campaignsHow to leverage analytics for custom measurement/engagement strategiesHow to create a robust governance plan for your Sitecore propertiesWho This Book Is ForThe key target audience for this book are content administrators (content authoring, forms development, etc.) and digital marketers (campaigns, analytics, marketing automation, experience optimization, etc.) using the Sitecore platform.

Practical Smart Device Design and Construction: Understanding Smart Technologies and How to Build Them Yourself

by Christopher Harrold

With the rapid development of the Internet of Things, a gap has emerged in skills versus knowledge in an industry typically segmented into hardware versus software. Practitioners are now expected to possess capabilities across the spectrum of hardware and software skills to create these smart devices.This book explores these skill sets in an instructive way, beginning at the foundations of what makes “smart” technology smart, addressing the basics of hardware and hardware design, software, user experiences, and culminating in the considerations and means of building a fully formed smart device, capable of being used in a commercial capacity, versus a DIY project. Practical Smart Device Design and Construction includes a set of starter projects designed to encourage the novice to build and learn from doing. Each project also includes a summary guiding you where to go next, and how to tie the practical, hands-on experience together with what they have learned to take the next step on their own.What You'll LearnPractical smart device design and construction considerations such as size, power consumption, wiring needs, analog vs digital, and sensor types and usesMethods and tools for creating their own designs such as circuit board designs; and wiring and prototyping toolsHands-on guidance through their own prototype projects and building it alongside the projects in this bookSoftware considerations for speed versus ease, security, and basics of programming and data analytics for smart devicesWho This Book Is ForThose with some technical skills, or at least a familiarity with technical topics, who are looking for the means and skills to start experimenting with combined hardware and software projects in order to gain familiarity and comfort with the smart device space.

Practical Smoothing: The Joys of P-splines

by Paul H.C. Eilers Brian D. Marx

This is a practical guide to P-splines, a simple, flexible and powerful tool for smoothing. P-splines combine regression on B-splines with simple, discrete, roughness penalties. They were introduced by the authors in 1996 and have been used in many diverse applications. The regression basis makes it straightforward to handle non-normal data, like in generalized linear models. The authors demonstrate optimal smoothing, using mixed model technology and Bayesian estimation, in addition to classical tools like cross-validation and AIC, covering theory and applications with code in R. Going far beyond simple smoothing, they also show how to use P-splines for regression on signals, varying-coefficient models, quantile and expectile smoothing, and composite links for grouped data. Penalties are the crucial elements of P-splines; with proper modifications they can handle periodic and circular data as well as shape constraints. Combining penalties with tensor products of B-splines extends these attractive properties to multiple dimensions. An appendix offers a systematic comparison to other smoothers.

Practical Social Engineering: A Primer for the Ethical Hacker

by Joe Gray

A guide to hacking the human element.Even the most advanced security teams can do little to defend against an employee clicking a malicious link, opening an email attachment, or revealing sensitive information in a phone call. Practical Social Engineering will help you better understand the techniques behind these social engineering attacks and how to thwart cyber criminals and malicious actors who use them to take advantage of human nature.Joe Gray, an award-winning expert on social engineering, shares case studies, best practices, open source intelligence (OSINT) tools, and templates for orchestrating and reporting attacks so companies can better protect themselves. He outlines creative techniques to trick users out of their credentials, such as leveraging Python scripts and editing HTML files to clone a legitimate website. Once you&’ve succeeded in harvesting information about your targets with advanced OSINT methods, you&’ll discover how to defend your own organization from similar threats. You&’ll learn how to: Apply phishing techniques like spoofing, squatting, and standing up your own web server to avoid detection Use OSINT tools like Recon-ng, theHarvester, and Hunter Capture a target&’s information from social media Collect and report metrics about the success of your attack Implement technical controls and awareness programs to help defend against social engineering Fast-paced, hands-on, and ethically focused, Practical Social Engineering is a book every pentester can put to use immediately.

Practical Social Network Analysis with Python (Computer Communications and Networks)

by K. G. Srinivasa Ankith Mohan Krishna Raj P.M.

This book focuses on social network analysis from a computational perspective, introducing readers to the fundamental aspects of network theory by discussing the various metrics used to measure the social network. It covers different forms of graphs and their analysis using techniques like filtering, clustering and rule mining, as well as important theories like small world phenomenon. It also presents methods for identifying influential nodes in the network and information dissemination models. Further, it uses examples to explain the tools for visualising large-scale networks, and explores emerging topics like big data and deep learning in the context of social network analysis.With the Internet becoming part of our everyday lives, social networking tools are used as the primary means of communication. And as the volume and speed of such data is increasing rapidly, there is a need to apply computational techniques to interpret and understand it. Moreover, relationships in molecular structures, co-authors in scientific journals, and developers in a software community can also be understood better by visualising them as networks.This book brings together the theory and practice of social network analysis and includes mathematical concepts, computational techniques and examples from the real world to offer readers an overview of this domain.

Practical Software Development Techniques

by Edward Crookshanks

This book provides an overview of tools and techniques used in enterprise software development, many of which are not taught in academic programs or learned on the job. This is an ideal resource containing lots of practical information and code examples that you need to master as a member of an enterprise development team. This book aggregates many of these "on the job" tools and techniques into a concise format and presents them as both discussion topics and with code examples. The reader will not only get an overview of these tools and techniques, but also several discussions concerning operational aspects of enterprise software development and how it differs from smaller development efforts. For example, in the chapter on Design Patterns and Architecture, the author describes the basics of design patterns but only highlights those that are more important in enterprise applications due to separation of duties, enterprise security, etc. The architecture discussion revolves has a similar emphasis - different teams may manage different aspects of the application''s components with little or no access to the developer. This aspect of restricted access is also mentioned in the section on logging. Theory of logging and discussions of what to log are briefly mentioned, the configuration of the logging tools is demonstrated along with a discussion of why it''s very important in an enterprise environment. What you''ll learn Version control in a team environment Debugging, logging, and refactoring Unit testing, build tools, continuous integration An overview of business and functional requirements Enterprise design patterns and architecture Who this book is for Student and software developers who are new to enterprise environments and recent graduates who want to convert their academic experience into real-world skills. It is assumed that the reader is familiar with Java, . NET, C++ or another high-level programming language. The reader should also be familiar with the differences between console applications, GUI applications and service/daemon applications. Table of Contents 1: Version Control 2: Unit Testing and Test Driven Development 3: Refactoring 4: Build Tools and Continuous Integration 5: Debugging 6: Development Methodologies and SDLC 7: Design Patterns and Architecture 8: Software Requirements 9: Just Enough SQL Appendix A: Enterprise Considerations and Other Topics Appendix B: Discussion Questions Appendix C: Database details Appendix D: Bibliography

Practical Solutions for Diverse Real-World NLP Applications (Signals and Communication Technology)

by Mourad Abbas

This book unveils the most advanced techniques and innovative applications in the natural language processing (NLP) field. It uncovers the secrets to enhancing language understanding, and presents practical solutions to different NLP tasks, as text augmentation, paraphrase generation, and restoring spaces and punctuation in multiple languages. It unlocks the potential of hierarchical multi-task learning for cross-lingual phoneme recognition, and allows readers to explore more real-world applications such as error correction, aggregating industrial security findings as well as predicting music emotion values from social media conversations. "Practical Solutions for Diverse Real-World NLP Applications" is the suitable guidebook for researchers, students, and practitioners as it paves the way for them by delivering invaluable insights and knowledge.

Practical Speech User Interface Design (Human Factors and Ergonomics)

by James R. Lewis

Although speech is the most natural form of communication between humans, most people find using speech to communicate with machines anything but natural. Drawing from psychology, human-computer interaction, linguistics, and communication theory, Practical Speech User Interface Design provides a comprehensive yet concise survey of practical speech

Practical Splunk Search Processing Language: A Guide for Mastering SPL Commands for Maximum Efficiency and Outcome

by Karun Subramanian

Use this practical guide to the Splunk operational data intelligence platform to search, visualize, and analyze petabyte-scale, unstructured machine data. Get to the heart of the platform and use the Search Processing Language (SPL) tool to query the platform to find the answers you need. With more than 140 commands, SPL gives you the power to ask any question of machine data. However, many users (both newbies and experienced users) find the language difficult to grasp and complex. This book takes you through the basics of SPL using plenty of hands-on examples and emphasizes the most impactful SPL commands (such as eval, stats, and timechart). You will understand the most efficient ways to query Splunk (such as learning the drawbacks of subsearches and join, and why it makes sense to use tstats). You will be introduced to lesser-known commands that can be very useful, such as using the command rex to extract fields and erex to generate regular expressions automatically. In addition, you will learn how to create basic visualizations (such as charts and tables) and use prescriptive guidance on search optimization. For those ready to take it to the next level, the author introduces advanced commands such as predict, kmeans, and cluster.What You Will LearnUse real-world scenarios (such as analyzing a web access log) to search, group, correlate, and create reports using SPL commandsEnhance your search results using lookups and create new lookup tables using SPL commandsExtract fields from your search results Compare data from multiple time frames in one chart (such as comparing your current day application performance to the average of the past 30 days) Analyze the performance of your search using Job Inspector and identify execution costs of various components of your search Who This Book Is ForApplication developers, architects, DevOps engineers, application support engineers, network operations center analysts, security operations center (SOC) analysts, and cyber security professionals who use Splunk to search and analyze their machine data

Practical Spring Cloud Function: Developing Cloud-Native Functions for Multi-Cloud and Hybrid-Cloud Environments

by Banu Parasuraman

Unlike other resources that target only programming communities, this book targets both programming and business communities. With programming models shifting more towards no-code and low-code, citizen programmers from the business side will welcome this book as a guide for how to design and optimize their information pipeline while lowering costs for infrastructure. Programmers, on the other hand, will welcome this book's business-centric programming view, which will get them a step closer to fulfilling real business requirements. Practical Spring Cloud Function touches on the themes of portability, scalability, high performance and high availability. Each theme is explored via a real enterprise use case and code. The use cases target industries including energy (oil pipeline sensors), automotive (event-driven connected vehicles), and retail (conversational AI). After reading this book, you'll come away with the know-how to build and deploy cloud-native Java applications effectively and efficiently. What You Will LearnWrite functions and deploy to Amazon Web Services, Microsoft Azure, Google Cloud, IBM Cloud, and on-prem clouds such as VMWare Tanzu and RedHat OpenShiftSet up locally with KNative on Kubernetes, as well as on AWS, Azure, GCP, Tanzu, and othersBuild, test, and deploy a simple example with Spring Cloud FunctionDevelop an event-driven data pipeline with Spring Cloud FunctionIntegrate with AI and machine learning modelsApply Spring Cloud Function to the Internet of Things (IoT)Get industry-specific examples of Spring Cloud Function in actionWho This Book Is For Software and cloud-native application developers with prior programming experience in the cloud and/or Spring Framework. DevOps professionals may find this book beneficial as well.

Practical Spring LDAP

by Balaji Varanasi

Practical Spring LDAP is your guide to developing Java-based enterprise applications using the Spring LDAP Framework. This book explains the purpose and fundamental concepts of LDAP before giving a comprehensive tour of the latest version, Spring LDAP 1. 3. 2. It provides a detailed treatment of LDAP controls and the new features of Spring LDAP 1. 3. 2 such as Object Directory Mapping and LDIF parsing. LDAP has become the de-facto standard for storing and accessing information in enterprises. Despite its widespread adoption, developers often struggle when it comes to using this technology effectively. The traditional JNDI approach has proven to be painful and has resulted in complex, less modular applications. The Spring LDAP Framework provides an ideal alternative.

Practical Spring LDAP: Using Enterprise Java-Based LDAP in Spring Data and Spring Framework 6

by Balaji Varanasi Andres Sacco

This revised edition is your practical, hands-on guide to developing Java-based enterprise applications with big data or batches of data using the Spring LDAP and the Spring Data LDAP frameworks. The book covers these popular Spring project modules and explains the purpose and fundamental concepts of LDAP before giving a comprehensive tour of the latest version of Spring LDAP and Spring Data LDAP as found in Spring Framework 6. The book provides a detailed treatment of LDAP controls and the new features of Spring LDAP such as Object Directory Mapping and LDIF parsing. LDAP has become the de facto standard for storing and accessing information in enterprises. Despite its widespread adoption, developers often struggle when it comes to using this technology effectively. The traditional Java LDAP and JNDI approaches have proven to be painful and have resulted in complex, less modular applications. The Spring LDAP framework provides an ideal alternative.After reading and using this book, you'll come away with a level of comfort for working with large batches of data or big data in your enterprise Spring applications development.What You'll LearnExplore "What is Java LDAP?" and understand the Spring LDAP and Spring Data LDAP frameworksSearch LDAP resourcesSort and page your LDAP resultsDive into object directory mappingHandle LDAP transactions and moreWho This Book Is ForIntermediate to advanced Java and Spring software developers; programmers with at least some prior experience in Java, especially the Spring Framework

Refine Search

Showing 44,451 through 44,475 of 59,381 results