Browse Results

Showing 47,676 through 47,700 of 59,381 results

Randomness and Elements of Decision Theory Applied to Signals

by Monica Borda Romulus Terebes Raul Malutan Ioana Ilea Mihaela Cislariu Andreia Miclea Stefania Barburiceanu

This book offers an overview on the main modern important topics in random variables, random processes, and decision theory for solving real-world problems. After an introduction to concepts of statistics and signals, the book introduces many essential applications to signal processing like denoising, texture classification, histogram equalization, deep learning, or feature extraction. The book uses MATLAB algorithms to demonstrate the implementation of the theory to real systems. This makes the contents of the book relevant to students and professionals who need a quick introduction but practical introduction how to deal with random signals and processes

Ransomware: Penetration Testing and Contingency Planning (Cyber Shorts)

by Ravindra Das

Ransomware is a threat variant that has existed for a very long time, contrary to popular belief. Today, ransomware attacks have become much more covert and stealthier than when they first came out. In this book, the author provides an overview of ransomware and the timeline of its evolution. The author also discusses famous ransomware attacks that have occurred, with a special focus on SolarWinds and critical infrastructure before taking a deep dive into penetration testing and how it can be used to mitigate the risks of a ransomware attack from happening. The author also covers incident response, disaster recovery, and business continuity planning. We even look at an appropriate data backup plan as well.

Ransomware: Defending Against Digital Extortion

by Allan Liska Timothy Gallo

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.Learn how ransomware enters your system and encrypts your filesUnderstand why ransomware use has grown, especially in recent yearsExamine the organizations behind ransomware and the victims they targetLearn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaignsUnderstand how ransom is paid—and the pros and cons of payingUse methods to protect your organization’s workstations and servers

Ransomware Analysis: Knowledge Extraction and Classification for Advanced Cyber Threat Intelligence

by Claudia Lanza Abdelkader Lahmadi Jérôme François

This book presents the development of a classification scheme to organize and represent ransomware threat knowledge through the implementation of an innovative methodology centered around the semantic annotation of domain-specific source documentation. By combining principles from computer science, document management, and semantic data processing, the research establishes an innovative framework to organize ransomware data extracted from specialized source texts in a systematic classification system.Through detailed chapters, the book explores the process of applying semantic annotation to a specialized corpus comprising CVE prose descriptions linked to known ransomware threats. This approach not only organizes but also deeply analyzes these descriptions, uncovering patterns and vulnerabilities within ransomware operations. The book presents a pioneering methodology that integrates CVE descriptions with ATT&CK frameworks, significantly refining the granularity of threat intelligence.The insights gained from a pattern-based analysis of vulnerability-related documentation are structured into a hierarchical model within an ontology framework, enhancing the capability for predictive operations. This model prepares cybersecurity professionals to anticipate and mitigate risks associated with new vulnerabilities as they are cataloged in the CVE list, by identifying recurrent characteristics tied to specific ransomware and related vulnerabilities.With real-world examples, this book empowers its readers to implement these methodologies in their environments, leading to improved prediction and prevention strategies in the face of growing ransomware challenges.

Ransomware and Cybercrime

by Andrew Jenkinson

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies’ cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced. Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security. This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online. There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need—no, we must demand—change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

Ransomware Evolution

by Mohiuddin Ahmed

Ransomware is a type of malicious software that prevents victims from accessing their computers and the information they have stored. Typically, victims are required to pay a ransom, usually using cryptocurrency, such as Bitcoin, to regain access. Ransomware attacks pose a significant threat to national security, and there has been a substantial increase in such attacks in the post-Covid era. In response to these threats, large enterprises have begun implementing better cybersecurity practices, such as deploying data loss prevention mechanisms and improving backup strategies. However, cybercriminals have developed a hybrid variant called Ransomware 2.0. In this variation, sensitive data is stolen before being encrypted, allowing cybercriminals to publicly release the information if the ransom is not paid. Cybercriminals also take advantage of cryptocurrency’s anonymity and untraceability.Ransomware 3.0 is an emerging threat in which cybercriminals target critical infrastructures and tamper with the data stored on computing devices. Unlike in traditional ransomware attacks, cybercriminals are more interested in the actual data on the victims’ devices, particularly from critical enterprises such as government, healthcare, education, defense, and utility providers. State-based cyber actors are more interested in disrupting critical infrastructures rather than seeking financial benefits via cryptocurrency. Additionally, these sophisticated cyber actors are also interested in obtaining trade secrets and gathering confidential information. It is worth noting that the misinformation caused by ransomware attacks can severely impact critical infrastructures and can serve as a primary weapon in information warfare in today’s age. In recent events, Russia’s invasion of Ukraine led to several countries retaliating against Russia. A ransomware group threatened cyber-attacks on the critical infrastructure of these countries. Experts warned that this could be the most widespread ransomware gang globally and is linked to a trend of Russian hackers supporting the Kremlin’s ideology.Ensuring cyber safety from ransomware attacks has become a national security priority for many nations across the world. The evolving variants of ransomware attacks present a wider and more challenging threat landscape, highlighting the need for collaborative work throughout the entire cyber ecosystem value chain. In response to this evolving threat, a book addressing the challenges associated with ransomware is very timely. This book aims to provide a comprehensive overview of the evolution, trends, techniques, impact on critical infrastructures and national security, countermeasures, and open research directions in this area. It will serve as a valuable source of knowledge on the topic.

The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime

by Renee Dudley Daniel Golden

A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.“What Michael Lewis did for baseball in Moneyball, Renee Dudley and Daniel Golden do brilliantly for the world of ransomware and hackers. Cinematic, big in scope, and meticulously reported, this book is impossible to put down.” —Doug Stanton, New York Times bestselling author of In Harm’s Way and Horse SoldiersScattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team’s sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys.The Ransomware Hunting Team traces the adventures of these unassuming heroes and how they have used their skills to save millions of ransomware victims from paying billions of dollars to criminals. Working tirelessly from bedrooms and back offices, and refusing payment, they’ve rescued those whom the often hapless FBI has been unwilling or unable to help. Foremost among them is Michael Gillespie, a cancer survivor and cat lover who got his start cracking ransomware while working at a Nerds on Call store in the town of Normal, Illinois. Other teammates include the brilliant, reclusive Fabian Wosar, a high school dropout from Germany who enjoys bantering with the attackers he foils, and his protégé, the British computer science prodigy Sarah White. Together, they have established themselves as the most effective force against an escalating global threat. This book follows them as they put their health, personal relationships, and financial security on the line to navigate the technological and moral challenges of combating digital hostage taking.Urgent, uplifting, and entertaining, Renee Dudley and Daniel Golden’s The Ransomware Hunting Team is a real-life technological thriller that illuminates a dangerous new era of cybercrime.

Ransomware Protection Playbook

by Roger A. Grimes

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization’s, data.

Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks

by Nihad A. Hassan

Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response plan to minimize ransomware damage and recover normal operations quickly.Ransomware is a category of malware that can encrypt your computer and mobile device files until you pay a ransom to unlock them. Ransomware attacks are considered the most prevalent cybersecurity threats today—the number of new ransomware variants has grown 30-fold since 2015 and they currently account for roughly 40% of all spam messages. Attacks have increased in occurrence from one every 40 seconds to one every 14 seconds. Government and private corporations are targets. Despite the security controls set by organizations to protect their digital assets, ransomware is still dominating the world of security and will continue to do so in the future. Ransomware Revealed discusses the steps to follow if a ransomware infection occurs, such as how to pay the ransom through anonymous payment methods, perform a backup and restore your affected files, and search online to find a decryption tool to unlock (decrypt) your files for free. Mitigation steps are discussed in depth for both endpoint devices and network systems.What You Will LearnBe aware of how ransomware infects your systemComprehend ransomware components in simple termsRecognize the different types of ransomware familiesIdentify the attack vectors employed by ransomware to infect computer systemsKnow how to prevent ransomware attacks from successfully comprising your system and network (i.e., mitigation strategies)Know what to do if a successful ransomware infection takes placeUnderstand how to pay the ransom as well as the pros and cons of payingSet up a ransomware response plan to recover from such attacks Who This Book Is For Those who do not specialize in the cybersecurity field (but have adequate IT skills) and want to fully understand the anatomy of ransomware threats. Although most of the book's content will be understood by ordinary computer users, it will also prove useful for experienced IT users aiming to understand the ins and outs of ransomware threats without diving deep into the technical jargon of the internal structure of ransomware.

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security #85)

by Matthew Ryan

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major attacks beginning in 2013, and how the advent of cryptocurrencies provided the catalyst for the development and increased profitability of ransomware, sparking a phenomenal rise in the number and complexity of ransomware attacks. This book analyzes why the speed of technology adoption has been a fundamental factor in the continued success of financially motivated cybercrime, and how the ease of public access to advanced encryption techniques has allowed malicious actors to continue to operate with increased anonymity across the internet. This anonymity has enabled increased collaboration between attackers, which has aided the development of new ransomware attacks, and led to an increasing level of technical complexity in ransomware attacks. This book highlights that the continuous expansion and early adoption of emerging technologies may be beyond the capacity of conventional risk managers and risk management frameworks.Researchers and advanced level students studying or working in computer science, business or criminology will find this book useful as a reference or secondary text. Professionals working in cybersecurity, cryptography, information technology, financial crime (and other related topics) will also welcome this book as a reference.

A Raphael Madonna and Child Oil Painting: A Forensic Analytical Evaluation

by Howell G. Edwards

This book presents a comprehensive forensic analysis of an oil painting depicting a Madonna and Child in a tondo format, previously thought to be a Victorian copy. Detailed historical and scientific studies confirm that this painting was, in fact, created by Raphael around 1512 as a study for his renowned Sistine Madonna, commissioned by Pope Julius II as an altarpiece for the monastic church of San Sisto in Piacenza. The painting underwent rigorous forensic examination, combining historical research with both invasive and non-invasive scientific imaging techniques. The analysis utilized advanced physical and chemical instrumentation to determine the painting's authenticity and accurate chronological placement. A comparative review of published chemical analyses of pigments, dyes, and substrates used in Raphael’s works from collections worldwide is included. Additionally, this study explores the innovative use of artificial intelligence (AI) for facial comparison between the figures in the tondo painting, the Sistine Madonna, and other Raphael artworks. These AI-generated insights provide novel information about the identities of Raphael’s models and shed light on his working techniques, as well as those of his associates.

RaphaelJS: Graphics and Visualization on the Web

by Chris Wilson

Create beautiful, interactive images on the Web with RaphaëlJS, the JavaScript library that lets you draw Scalable Vector Graphics (SVG) right in the browser. With this concise guide, you’ll quickly learn how to paint the screen with shapes and colors that you can turn into lively, animated graphics and visualizations.Author Chris Wilson (Time.com) shows you how to create Raphaël objects and manipulate them with animation, transformations, and other techniques, using just a few lines of code. Packed with working examples, sample code, and cool hands-on projects, RaphaëlJS is ideal for new and experienced JavaScript programmers alike.Create images that work on browsers new and old, as well as mobile devicesStart with the basics—shapes, colors, transformations, sets, and textLearn how to build custom curves and shapes with pathsCode animations that move through space, follow paths, or change directionMake your artwork come alive through user interactionBind a dataset to a collection of visual objects—the basis of data visualizationLearn techniques to make your detailed visuals stand out on screens of any size

Rapid Application Development with AWS Amplify: Build cloud-native mobile and web apps from scratch through continuous delivery and test automation

by Adrian Leung

Get to grips with the AWS Amplify framework and use it to build scalable cloud-native progressive web apps with React and cross-platform mobile apps with React Native in TypeScriptKey FeaturesExplore the capabilities of AWS Amplify with popular app frameworks for both web and mobile app platformsBuild your first cloud-native web and mobile applications using AWS AmplifyLeverage AWS Amplify to design GraphQL APIs for your web and mobile applicationsBook DescriptionAWS Amplify is a modern toolkit that includes a command line interface (CLI); libraries for JS, iOS, and Android programming; UI component libraries for frameworks like React, Angular, and Vue.js for web development, and React Native and Flutter for mobile development. You'll begin by learning how to build AWS Amplify solutions with React and React Native with TypeScript from scratch, along with integrating it with existing solutions. This book will show you the fastest way to build a production-ready minimum viable product (MVP) within days instead of years. You'll also discover how to increase development speed without compromising on quality by adopting behavior-driven development (BDD) and Cypress for end-to-end test automation, as well as the Amplify build pipeline (DevOps or CI/CD pipeline) to ensure optimal quality throughout continuous test automation and continuous delivery. As you advance, you'll work with React to determine how to build progressive web apps (PWAs) with Amplify and React Native for cross-platform mobile apps. In addition to this, you'll find out how to set up a custom domain name for your new website and set up the AWS Amplify Admin UI for managing the content of your app effectively. By the end of this AWS book, you'll be able to build a full-stack AWS Amplify solution all by yourself.What you will learnBuild React and React Native apps with Amplify and TypeScriptExplore pre-built Amplify UI components for rapid prototypingAdd user management with Amplify authentication to your appUse Amplify GraphQL to create a blog postDiscover how to upload photos to Amplify StorageEnable DevOps with the Amplify pipeline for your appGet to grips with BDD and test automation with Cypress and CucumberSet up a custom domain name for your website and manage app content with the Amplify Admin UIWho this book is forThis book is for developers and tech companies looking to develop cloud-native products rapidly with the AWS ecosystem. Web and mobile developers with little-to-no experience in TypeScript programming will also find this book helpful. Although no prior experience with AWS or TypeScript is required, basic familiarity with modern frameworks such as React and React Native is useful.

Rapid Application Development with OutSystems: Create applications with OutSystems up to seven times faster than with traditional technologies

by Ricardo Pereira Paulo Moreira Taiji Hagino

Discover best practices to create simple, robust, and scalable software solutions quickly and securely, and focus on what's important - the business and the end customerKey FeaturesDiscover strategies and tips for low-code and no-code development with the help of useful examplesBuild enterprise-scale reactive web and mobile applicationsExplore the benefits of low-code developmentBook DescriptionOutSystems is a software development platform that speeds up the build phase by abstracting code and making almost everything visual. This means replacing textual language with visual artifacts that avoid lexical errors and speed up code composition using accelerators and predefined templates.The book begins by walking you through the fundamentals of the technology, along with a general overview of end-to-end web and mobile software development. You'll learn how to configure your personal area in the cloud and use the OutSystems IDE to connect with it. The book then shows you how to build a web application based on the best architectural and developmental practices in the market, and takes the same approach for the mobile paradigm. As you advance, you'll find out how to develop the same application, and the great potential of reusing code from one paradigm in another and the symbiosis between them is showcased.The only application that'll differ from the application in the exercise is the one used in business process technology (BPT), with a focus on a common market use case.By the end of this OutSystems book, you'll be able to develop enterprise-level applications on the web and mobile, integrating them with third parties and other systems on the market. You'll also understand the concepts of performance, security, and software construction and be able to apply them effectively.What you will learnGet to grips with the OutSystems infrastructureDevelop reactive web and mobile applications in OutSystems using best practices in Service StudioDefine and design Architecture Canvas (3-Layer Canvas) for your applicationsIntegrate with external systems in OutSystemsEnhance applications with BPTManage and monitor your applications in the OutSystems infrastructureWho this book is forThis book is for back-end developers, tech leaders, UX/UI developers, frontend developers, (in general, full-stack developers), tech companies, and enterprises looking to learn how to develop web and mobile software quickly and disruptively by leveraging OutSystems, one of the most low-code platforms in the market. An IT background is not mandatory; however, experience in SQL, JavaScript, HTML, CSS, and C# is required to get started with this book.

Rapid BeagleBoard Prototyping with MATLAB and Simulink

by Dr Xuewu Dai Dr Fei Qin

This book is a fast-paced guide with practical, hands-on recipes which will show you how to prototype Beagleboard-based audio/video applications using Matlab/Simlink and Sourcery Codebench on a Windows host.Beagleboard Embedded Projects is great for students and academic researchers who have practical ideas and who want to build a proof-of-concept system on an embedded hardware platform quickly and efficiently. It is also useful for product design engineers who want to ratify their applications and reduce the time-to-market. It is assumed that you are familiar with Matlab/Simulink and have some basic knowledge of computer hardware. Experience in Linux is favoured but not necessary, as our software development is purely on a Windows host.

Rapid Development

by Steve Mcconnell

Corporate and commercial software-development teams all want solutions for one important problem--how to get their high-pressure development schedules under control. In RAPID DEVELOPMENT, author Steve McConnell addresses that concern head-on with overall strategies, specific best practices, and valuable tips that help shrink and control development schedules and keep projects moving. Inside, you'll find: A rapid-development strategy that can be applied to any project and the best practices to make that strategy work Candid discussions of great and not-so-great rapid-development practices--estimation, prototyping, forced overtime, motivation, teamwork, rapid-development languages, risk management, and many othersA list of classic mistakes to avoid for rapid-development projects, including creeping requirements, shortchanged quality, and silver-bullet syndromeCase studies that vividly illustrate what can go wrong, what can go right, and how to tell which direction your project is goingRAPID DEVELOPMENT is the real-world guide to more efficient applications development.

Rapid Development: Taming Wild Software Schedules

by Steve M. Mcconnell

Get your development schedules under control and on track! Corporate and commercial software-development teams all want solutions for one important problem--how to get their high-pressure development schedules under control.

Rapid Game Development Using Cocos2d-JS

by Hemanth Kumar Abdul Rahman

Get a gentle introduction to the Cocos2d-JS framework to begin working with sprite manipulations, animations, and other 2d game development topics. This book covers environment setup and getting started with a framework that works seamlessly across all browsers. Rapid Game Development Using Cocos2d-JS teaches you the overall architecture of Cocos2d-JS and explains the internal working of the framework. You will dive deep into sprites, the most important entity in Cocos2d-JS, animation APIs, and primitive shapes. You'll also learn about the Cocos2d-JS UI system to get a head start in 2d game development. Finally, you'll discover the features of Chipmunk (the built-in physics engine) with full examples. What You'll Learn Get a simple head start in Cocos2d-JS Gain an architectural overview of the different blocks of the framework Master sprites, spritesheets, and frame animation Work with the event system in Cocos2d-JS Discover the animation APIs in Cocos2d-JS Leverage the built-in physics engine Who This Book Is For Beginners looking to develop cross-platform mobile/web games with cocos2d-js, developers with intermediate skills on cocos2d-js looking for the reference.

Rapid Graphs with Tableau 8: The Original Guide for the Accidental Analyst

by Stephen McDaniel Eileen McDaniel

Tired of boring spreadsheets and data overload from confusing graphs? Master the art of visualization with Rapid Graphs with Tableau 8! Tableau insiders Stephen and Eileen McDaniel expertly provide a hands-on case study approach and more than 225 illustrations that will teach you how to quickly explore and understand your data to make informed decisions in a wide variety of real-world situations. Rapid Graphs with Tableau 8 includes best practices of visual analytics for ideas on how to communicate your findings with audience-friendly graphs, tables and maps."A picture is worth a thousand words" is a common saying that is more relevant today than ever as data volumes grow and the need for easy access to answers becomes more critical. This book covers the core of Tableau capabilities in easy-to-follow examples, updated and expanded for Version 8. Learn how to be successful with Tableau from the team that started the original training program as the founding Tableau Education Partner! "A must read for anyone interested in Tableau. Clear explanations, practical advice and beautiful examples!"Elissa Fink – Chief Marketing Officer, Tableau Software

A Rapid Introduction to Adaptive Filtering (SpringerBriefs in Electrical and Computer Engineering)

by Hernan Rey Leonardo Rey Vega

In this book, the authors provide insights into the basics of adaptive filtering, which are particularly useful for students taking their first steps into this field. They start by studying the problem of minimum mean-square-error filtering, i.e., Wiener filtering. Then, they analyze iterative methods for solving the optimization problem, e.g., the Method of Steepest Descent. By proposing stochastic approximations, several basic adaptive algorithms are derived, including Least Mean Squares (LMS), Normalized Least Mean Squares (NLMS) and Sign-error algorithms. The authors provide a general framework to study the stability and steady-state performance of these algorithms. The affine Projection Algorithm (APA) which provides faster convergence at the expense of computational complexity (although fast implementations can be used) is also presented. In addition, the Least Squares (LS) method and its recursive version (RLS), including fast implementations are discussed. The book closes with the discussion of several topics of interest in the adaptive filtering field.

Rapid Java Persistence and Microservices: Persistence Made Easy Using Java EE8, JPA and Spring

by Raj Malhotra

Gain all the essentials you need to create scalable microservices, which will help you solve real challenges when deploying services into production. This book will take you through creating a scalable data layer with polygot persistence. You’ll cover data access and query patterns in Spring and JPA in high-performance environments. As part of this topic, you’ll see the advantages of multiple persistence frameworks in Java and especially the easy persistence offered by NoSQL databases and reactive web solutions. The last few chapters present advanced concepts that are useful for very high-performance real-time applications: you’ll implement applications using Spring’s good support for Web sockets in their raw form as well as for connecting to message brokers such as RabbitMQ. This can be useful for applications such as navigation systems and gaming platforms.What You Will LearnBuild end-to-end modern applications using microservices, persistence essentials, reactive web, and other high-performance concepts Master Spring’s configuration optionsSecure microservices efficiently Monitor your services post deployment Who This Book Is For Java developers and architects interested in microservices.

Rapid Mashup Development Tools

by Florian Daniel Martin Gaedke

This book constitutes revised selected papers from the Second International Rapid Mashup Challenge, RMC 2016, held in Lugano, Switzerland in June 2016. The 6 papers presented in this volume were carefully reviewed and selected from 8 submissions. They are post-challenge extensions of the selected short participation proposals. The 2016 edition of the Challenge is the second installment of a series of challenges that aim to engage researchers and practitioners in a competition for the best mashup approach.

Rapid Mashup Development Tools

by Florian Daniel Cesare Pautasso

This book constitutes the refereed proceedings of theFirst International Rapid Mashup Challenge, RMC 2015, held on June 23, 2015, inRotterdam, The Netherlands, in conjunction with the 15th International Conferenceon Web Engineering, ICWE 2015. The 2015 edition of the challenge is the firstinstallment of a series of challenges that aim to engage researchers andpractitioners in a competition for the best mashup approach. The 6 thoroughlyreviewed contributions contained in this volume are extended versions of theinitial proposals that served the authors to express their interest toparticipate in the challenge. The initial proposals have been used by thechallenge organizers to select participants based on the interestingness andmaturity of the proposals.

Rapid One-of-a-kind Product Development

by Yiliu Tu Shane Shengquan Xie

Rapid One-of-a-kind Product Development discusses research in the development of new enabling technologies for small and medium companies. Scientific advancements presented include a novel product data modelling scheme to model product design, manufacturability and knowledge under a common data object; customised product development in a distributed environment; and new adaptive scheduling methods for the optimal production of a wide variety of customised products, taking into consideration all of the possible changes from customers and the uncertainties in manufacturing. The book also includes research towards a computer aided customer interface, which allows customer requirements and changes to be processed and integrated with technical designs in real time; adaptive and concurrent CAD methods and algorithms; and product modelling and system integration technologies. The reader will learn how to: * translate customer requirements to technical attributes; * develop new and innovative products to meet customer requirements and expectations; * evaluate and optimise a project design; * design production systems and use them efficiently; and * manage a variety of customised products. Rapid One-of-a-kind Product Development demonstrates how to develop new methods, tools and algorithms to address the problems in a mass customisation environment. It is a valuable source of information for researchers and engineers in the fields of design and manufacturing.

Rapid Product Development with n8n: Practical guide to creating digital products on the web using workflow automation and n8n

by Jason McFeetors Tanay Pant

Learn n8n to reduce costs, improve efficiency, and increase productivity in your development processKey FeaturesDiscover best practices, advantages, and case studies from the n8n teamExplore practical techniques to build market-ready low-code solutions using n8n and BubbleLearn how to develop enterprise-scale web applications without any engineering supportBook DescriptionExplore how n8n enables you to connect different systems and cloud services without having to hire specialists or develop technical skill sets across multiple tech stacks. This book will show you how n8n can reduce the time required to develop new products, helping you bring them to the market quickly compared to building a whole development team.This official n8n guide will assist you with adopting and integrating n8n in your development workflow in the best possible manner. You'll begin by learning where n8n fits in the tech stack of your business and how it provides opportunities for reducing cost as well as increasing efficiency and revenue. Once you've identified opportunities where you can leverage n8n's connectivity and automation functionality within your working environment, you'll progress to building an n8n-based toolset that will increase the profitability of your operations.By the end of this product development book, you'll be able to identify real-world opportunities to generate income, improve efficiencies, and then build tools to capitalize on these opportunities.What you will learnIdentify opportunities to use n8n in your organization and develop a business use caseUnderstand how to use APIs and webhooks with n8nBuild a custom production-ready API endpoint for your n8n applicationsCreate an end-to-end web application by connecting an API to the frontendAutomate your digital processes based on time and external triggersDevelop complex business applications rapidly using a low-code approachWho this book is forThis book is for web developers and low code enthusiasts who have basic knowledge of JavaScript as well as some basic understanding of web concepts such as APIs and webhooks. Developers looking for a digital platform to enable rapid prototyping and automation for their workflow will find this book useful.

Refine Search

Showing 47,676 through 47,700 of 59,381 results