Browse Results

Showing 1,851 through 1,875 of 62,969 results

Adopting .NET 5: Understand modern architectures, migration best practices, and the new features in .NET 5

by Hammad Arif Habib Qureshi

A practical guide to building and upgrading new and legacy applications on cloud-native platforms using architectural best practices with .NET 5, C# 9, microservices, and ML.NETKey FeaturesGet up to speed with .NET 5's new improvements and featuresDiscover how to improve existing code design and enhance software maintainabilityExplore explanations and techniques for making programs easier to understand and changeBook Description.NET 5 is the unification of all .NET technologies in a single framework that can run on all platforms and provide a consistent experience to developers, regardless of the device, operating system (OS), or cloud platform they choose. By updating to .NET 5, you can build software that can quickly adapt to the rapidly changing demands of modern consumers and stay up to date on the latest technology trends in .NET. This book provides a comprehensive overview of all the technologies that will form the future landscape of .NET using practical examples based on real-world scenarios, along with best practices to help you migrate from legacy platforms. You'll start by learning about Microsoft's vision and rationale for the unification of the platforms. Then, you'll cover all the new language enhancements in C# 9. As you advance, you'll find out how you can align yourself with modern technology trends, focusing on everything from microservices to orchestrated containerized deployments. Finally, you'll learn how to effectively integrate machine learning in .NET code. By the end of this .NET book, you'll have gained a thorough understanding of the .NET 5 platform, together with a readiness to adapt to future .NET release cycles, and you'll be able to make architectural decisions about porting legacy systems and code bases to a newer platform.What you will learnExplore the key performance improvement areas when migrating to modern architecturesUnderstand app design and development using .NET 5Discover how to shift from legacy to modern application design using microservices and cloud-native architectureExplore common migration pitfalls and make the right decisions in situations where multiple options are availableUnderstand the process of deploying .NET 5 code on serverless and containerized hosts, along with its benefitsFind out what ML.NET has to offer and build .NET apps that use machine learning servicesWho this book is forThis book is for experienced developers as well as software architects who are looking to gain knowledge of the new features and capabilities of .NET 5, along with guidance on modern architectural patterns. If you're a developer who has previously worked on .NET, WPF, ASP.NET, Entity Framework, or other popular .NET libraries, this book will help you understand the migration process for their modern counterparts. Although experience with .NET Core is not required, working knowledge of the C# language and .NET framework is assumed.

Adopting Artificial Intelligence Tools in Higher Education: Student Assessment

by Thangavel Murugan Karthikeyan Periasamy A. M. Abirami

This edited volume explores the adoption of artificial intelligence (AI) tools in higher education, specifically focusing on student assessment. It examines the integration of various AI tools within higher education, discussing the challenges and opportunities they present and the innovative solutions they offer.The chapters explore various issues surrounding the use of AI in higher education and propose potential solutions. The book begins with a systematic exploration of AI's potential, presenting innovative ways to ensure fair and accurate assessments that enhance the overall quality of education. It highlights the benefits of AI-powered grading systems that streamline assessment processes, provide timely feedback, and promote fair evaluations. The text discusses how machine learning algorithms can revolutionize assessment methods, allowing individualized, adaptive testing tailored to each student's unique needs. Furthermore, it examines natural language processing (NLP) techniques for evaluating student essays by analyzing linguistic features such as grammar and semantic coherence. Moreover, it highlights AI-powered virtual assistants offering personalized feedback and learning recommendations. Case studies illustrate successful AI assessment implementations and methods for improving AI-based evaluations. The book also addresses engagement and success in the post-COVID-19 context. It raises concerns about plagiarism and academic integrity, comparing AI solutions to traditional methods while exploring the challenges associated with adopting AI in education. Educators, administrators, academics, and technology experts working in institutes of higher learning will find this volume compelling. It is also suitable for students taking courses in educational technology, e-learning, and digital learning.

Adopting Artificial Intelligence Tools in Higher Education: Teaching and Learning

by Thangavel Murugan Karthikeyan Periasamy A. M. Abirami

This book offers a modern exploration of the intersection of technology and education. It examines the prospects of integrating different AI tools into higher education and explores the challenges, opportunities, and innovative solutions for the different issues surrounding the use of AI in higher education.Each chapter discusses a different area where AI can enhance the educational landscape, such as AI integration in higher education and immersive virtual reality-based learning environments. The book also emphasizes student-centered learning, AI-powered frameworks for academic excellence, and learner-centric pedagogies. Furthermore, it delves into the role of AI in personalized learning in STEM courses, the development of AI-based tutoring systems, and the use of machine learning to identify students’ mental health status. The volume concludes with "Dynamic Horizon," which examines how AI and gamification are shaping higher education.This book is essential for educators, administrators, researchers, and policymakers who want to leverage AI to create an adaptive, personalized, and engaging learning environment. Adopting Artificial Intelligence Tools in Higher Education provides valuable insights into the future of education, paving the way for a more empowered and enlightened academic world.

Adopting Biometric Technology: Challenges and Solutions

by Ravindra Das

Many types of security technologies are currently in use, with biometrics being one of the latest and most cutting-edge forms that has been produced for mass application. Biometrics, while intriguing, is often broached with hesitation and poor understanding. Adopting Biometric Technology: Challenges and Solutions advocates increased implementation of biometric technology areas of the world where it has been least accepted, particularly in the United States. This book looks at several specific applications of biometric technology, challenging issues that have obstructed the use of biometrics in security and offering realistic solutions for increasing its worldwide utilization. It is divided into three sections, with the first discussing societal barriers against the adoption of biometric technology in security. The second section presents case studies of specific applications, such as e-passports and e-voting, that have already been implemented and could be expanded into regions where usage is low. The third section lays out a case for the general practicality and value that biometrics offers to relevant business sectors, including the benefits of implementing the currently controversial technology in place of the conventional forms of verification. While biometric technology has been poorly accepted and adopted in the United States as well as other developed nations, it is already a popular tool in developing nations in Asia, Africa, and Eastern Europe. Adopting Biometric Technology examines the societal resistance hindering the broader usage of biometrics and provides practical solutions for overcoming those barriers while showing how its increased application would be overall advantageous.

Adopting Elixir: From Concept to Production

by Bruce Tate Jose Valim Ben Marx

Adoption is more than programming. Elixir is an exciting new language, but to successfully get your application from start to finish, you're going to need to know more than just the language. The case studies and strategies in this book will get you there. Learn the best practices for the whole life of your application, from design and team-building, to managing stakeholders, to deployment and monitoring. Go beyond the syntax and the tools to learn the techniques you need to develop your Elixir application from concept to production. Learn real-life strategies from the people who built Elixir and use it successfully at scale. See how Ben Marx and Bleacher Report maintain one of the highest-traffic Elixir applications by selling the concept to management and delivering on that promise. Find out how Bruce Tate and icanmakeitbetter hire and train Elixir engineers, and the techniques they've employed to design and ensure code consistency since Elixir's early days. Explore customer challenges in deploying and monitoring distributed applications with Elixir creator Jose Valim and Plataformatec. Make a business case and build a team before you finish your first prototype. Once you're in development, form strategies for organizing your code and learning the constraints of the runtime and ecosystem. Convince stakeholders, both business and technical, about the value they can expect. Prepare to make the critical early decisions that will shape your application for years to come. Manage your deployment with all of the knobs and gauges that good DevOps teams demand. Decide between the many options available for deployment, and how to best prepare yourself for the challenges of running a production application. This book picks up where most Elixir books leave off. It won't teach you to program Elixir, or any of its tools. Instead, it guides you through the broader landscape and shows you a holistic approach to adopting the language. What You Need: This book works with any version of Elixir.

Adopting Open Source Software

by Jay P. Kesan Brian Fitzgerald Barbara Russo Maha Shaikh Giancarlo Succi

Government agencies and public organizations often consider adopting open source software (OSS) for reasons of transparency, cost, citizen access, and greater efficiency in communication and delivering services. Adopting Open Source Software offers five richly detailed real-world case studies of OSS adoption by public organizations. The authors analyze the cases and develop an overarching, conceptual framework to clarify the various enablers and inhibitors of OSS adoption in the public sector. The book provides a useful resource for policymakers, practitioners, and academics. The five cases of OSS adoption include a hospital in Ireland; an IT consortium serving all the municipalities of the province of Bozen-Bolzano, Italy; schools and public offices in the Extremadura region of Spain; the Massachusetts state government's open standards policy in the United States; and the ICT department of the Italian Chamber of Deputies. The book provides a comparative analysis of these cases around the issues of motivation, strategies, technologies, economic and social aspects, and the implications for theory and practice.

Adopting Open Source Software: A Practical Guide

by Jay P. Kesan Brian Fitzgerald Barbara Russo Maha Shaikh Giancarlo Succi

A rich case-study analysis of open source software adoption by public organizations in different countries and settings.Government agencies and public organizations often consider adopting open source software (OSS) for reasons of transparency, cost, citizen access, and greater efficiency in communication and delivering services. Adopting Open Source Software offers five richly detailed real-world case studies of OSS adoption by public organizations. The authors analyze the cases and develop an overarching, conceptual framework to clarify the various enablers and inhibitors of OSS adoption in the public sector. The book provides a useful resource for policymakers, practitioners, and academics.The five cases of OSS adoption include a hospital in Ireland; an IT consortium serving all the municipalities of the province of Bozen-Bolzano, Italy; schools and public offices in the Extremadura region of Spain; the Massachusetts state government's open standards policy in the United States; and the ICT department of the Italian Chamber of Deputies. The book provides a comparative analysis of these cases around the issues of motivation, strategies, technologies, economic and social aspects, and the implications for theory and practice.

Adopting and Adapting Innovation in Japan's Digital Transformation (Economics, Law, and Institutions in Asia Pacific)

by Anshuman Khare William W. Baber

This book explores how the business transformation taking place in Japan is influenced by the digital revolution. The chapters present approaches and examples from sectors commonly understood to be visible arenas of digital transformation—3D printing and mobility, for instance—as well as some from not-so-obvious sectors, such as retail, services, and fintech.Business today is facing unprecedented change especially due to the adoption of new, digital technologies, with a noticeable transformation of manufacturing and services. The changes have been brought by advanced robotics, the emergence of artificial intelligence, and digital networks that are growing in size and capability as the number of connected devices explodes. In addition, there are advanced manufacturing and collaborative connected platforms, including machine-to-machine communications. Adoption of digital technology has caused process disruptions in both the manufacturing and services sectors and led to new business models and new products. While examining the preparedness of the Japanese economy to embrace these changes, the book explores the impact of digitally influenced changes on some selected sectors from a Japanese perspective. It paints a big picture in explaining how a previously manufacturing-centric, successful economy adopts change to retain and rebuild success in the global environment. Japan as a whole is embracing, yet also avoiding—innovating but also restricting—various forms of digitalization of life and work. The book, with its 12 chapters, is a collaborative effort of individuals contributing diverse points of view as technologists, academics, and managers.

Adoption of Data Analytics in Higher Education Learning and Teaching (Advances in Analytics for Learning and Teaching)

by David Gibson Dirk Ifenthaler

The book aims to advance global knowledge and practice in applying data science to transform higher education learning and teaching to improve personalization, access and effectiveness of education for all. Currently, higher education institutions and involved stakeholders can derive multiple benefits from educational data mining and learning analytics by using different data analytics strategies to produce summative, real-time, and predictive or prescriptive insights and recommendations. Educational data mining refers to the process of extracting useful information out of a large collection of complex educational datasets while learning analytics emphasizes insights and responses to real-time learning processes based on educational information from digital learning environments, administrative systems, and social platforms. This volume provides insight into the emerging paradigms, frameworks, methods and processes of managing change to better facilitate organizational transformation toward implementation of educational data mining and learning analytics. It features current research exploring the (a) theoretical foundation and empirical evidence of the adoption of learning analytics, (b) technological infrastructure and staff capabilities required, as well as (c) case studies that describe current practices and experiences in the use of data analytics in higher education.

Adoption of Emerging Information and Communication Technology for Sustainability

by Ewa Ziemba Jarosław

This book represents an important voice in the discourse on the adoption of emerging ICT for sustainability. It focuses on how emerging ICT acts as a crucial enabler of sustainability, offering new forward-looking approaches to this field. The book explores how emerging ICT adoption drives sustainability efforts in business and public organizations, promoting ecological, economic, social, cultural, and political sustainability. The book's theoretical discussions, conceptual approaches, empirical studies, diverse perspectives, and views make it a valuable and comprehensive reference work. Appealing to both researchers and practitioners, this book provides significant areas for research and practice related to the contribution of emerging ICT adoption to sustainability. It also suggests vital considerations for programming and building sustainable development-driven emerging ICT adoption. Readers will find answers to important contemporary questions, such as: What are the concepts, frameworks, models, and approaches to enhance sustainable development through the adoption of emerging ICT? How does the adoption of emerging ICT influence sustainability? How can emerging ICT be adopted to enhance sustainability? What are the current practices and successful cases of emerging ICT adoption for sustainability? What factors influence emerging ICT adoption to enhance sustainability?

Adoption of LMS in Higher Educational Institutions of the Middle East (Advances in Science, Technology & Innovation)

by Hassan Qudrat-Ullah Rashid A. Khan

This book discusses the adoption of learning management systems (LMS) in higher education institutions. It presents influential predictors that may impact instructors’ behavioral intention to adopt learning management systems in the context of Arab culture, as well as a unique model of technology acceptance that draws on and combines previous technology adoption models (i.e., a modified unified theory of acceptance and use of technology model – UTAUT2). Moreover, this study extends the UTAUT2 model by including Hofstede’s (1980) cultural dimensions, and technology awareness as the moderators of the model. It also describes the explanatory technique approach used to collect quantitative data from the instructors at higher education institutions in Saudi Arabia and were analyzed with structural equation modeling using SPSS/Amos software. The findings revealed that facilitating conditions were the strongest predictor of behavioral intention to adopt an LMS, followed by performance expectancy and hedonic motivation, technology awareness, and cultural dimensions exerted a moderating influence on instructors’ behavioral intention to use LMS in their teaching. By including new constructs, this becomes the first study of its kind exploring instructors’ use of LMS in Higher Educational Institutions of Saudi Arabia and other countries of the Middle East. It offers practical insights for a broad range of researchers and professionals at higher education institutions and serves as a reference guide for designers of learning management systems (e.g., blackboard systems), policymakers, and the Ministry of Education staff.

Advance Compression and Watermarking Technique for Speech Signals (SpringerBriefs in Speech Technology)

by Rohit Thanki Komal Borisagar Surekha Borra

This book introduces methods for copyright protection and compression for speech signals. The first method introduces copyright protection of speech signal using watermarking; the second introduces compression of the speech signal using Compressive Sensing (CS). Both methods are tested and analyzed. The speech watermarking method uses technology such as Finite Ridgelet Transform (FRT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD). The performance of the method is evaluated and compared with existing watermarking methods. In the speech compression method, the standard Compressive Sensing (CS) process is used for compression of the speech signal. The performance of the proposed method is evaluated using various transform bases like Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Singular Value Decomposition (SVD), and Fast Discrete Curvelet Transform (FDCuT).

Advance Concepts of Image Processing and Pattern Recognition: Effective Solution for Global Challenges (Transactions on Computer Systems and Networks)

by Krishna Kumar Narendra Kumar Celia Shahnaz Mazin Abed Mohammed Ram Shringar Raw

The book explains the important concepts and principles of image processing to implement the algorithms and techniques to discover new problems and applications. It contains numerous fundamental and advanced image processing algorithms and pattern recognition techniques to illustrate the framework. It presents essential background theory, shape methods, texture about new methods, and techniques for image processing and pattern recognition. It maintains a good balance between a mathematical background and practical implementation. This book also contains the comparison table and images that are used to show the results of enhanced techniques. This book consists of novel concepts and hybrid methods for providing effective solutions for society. It also includes a detailed explanation of algorithms in various programming languages like MATLAB, Python, etc. The security features of image processing like image watermarking and image encryption etc. are also discussed in this book. This book will be useful for those who are working in the field of image processing, pattern recognition, and security for digital images. This book targets researchers, academicians, industry, and professionals from R&D organizations, and students, healthcare professionals working in the field of medical imaging, telemedicine, cybersecurity, data scientist, artificial intelligence, image processing, digital hospital, intelligent medicine.

Advance Excel Student Workbook

by NIIT Yuva Jyoti Ltd.

The Advanced Word Student Workbook is a comprehensive guide designed to help learners develop proficiency in advanced features of Microsoft Word. The workbook covers a range of topics, including formatting techniques, referencing, macros, data management, and document customization. With practical examples and step-by-step exercises, the book emphasizes hands-on learning to build strong technical skills. Developed by NIIT Foundation, it supports skill-building for students and professionals seeking to enhance their digital literacy. The workbook is part of NIIT’s initiative to make high-quality learning accessible and is distributed in accessible formats for learners with print disabilities.

Advance Metadata Fair: The Retention and Disclosure of 4G, 5G and Social Media Location Information, for Law Enforcement and National Security, and the Impact on Privacy in Australia (Law, Governance and Technology Series #44)

by Stanley Shanapinda

This book outlines the legal powers of a major Western nation – Australia – to collect and use location information. Mobile service and social media service providers now have the ability to track, record and store more precise location information. Unlike 4G, 5G mobile communications require that cell towers and antennas be in much closer proximity; as a result, the location data can reveal more personal and sensitive information about individual citizens. Despite this aspect, service providers are required to disclose the data to the authorities, without the need for a judicial warrant. This book was written from the perspective of big location data software analytics, a capability that makes it possible to combine various location data points to create a profile on a given individual’s movements, habits, and political, religious and ideological orientation. In this regard, privacy is poorly protected. The rationale used to justify the powers was enforcing serious crimes – terrorism offences. Location data can now be retained for at least two years and be collected to investigate even minor offences. This can be done without the person being reasonably suspected of a criminal offence – when the individual is simply determined to be a person of interest. This poses legal risks to vulnerable communities. And yet, such investigative techniques are deemed lawful and reasonable. At a time when national security is so broadly defined to include economic issues, which in turn overlap with climate change and environmental protection, these legal powers should be reassessed. The book clarifies the complex rules that every citizen must know in order to have agency. Further, it calls upon authorities to reflect and to self-regulate, by making the conscious decision to surrender some of their powers to review by the independent judiciary. Without the requirement for a judicial warrant or judicial review, the powers are unfairly broad. The book pursues an interdisciplinary approach to assess the functionality of mobile telecommunications in direct relation to law enforcement powers and existing judicial precedents. Further, it offers a unifying techno-legal perspective on a complex issue touching on modern privacy law and communications technologies.

Advance Numerical Techniques to Solve Linear and Nonlinear Differential Equations (River Publishers Series in Mathematical, Statistical and Computational Modelling for Engineering)

by Mangey Ram Geeta Arora

Real-world issues can be translated into the language and concepts of mathematics with the use of mathematical models. Models guided by differential equations with intuitive solutions can be used throughout engineering and the sciences. Almost any changing system may be described by a set of differential equations. They may be found just about anywhere you look in fields including physics, engineering, economics, sociology, biology, business, healthcare, etc. The nature of these equations has been investigated by several mathematicians over the course of hundreds of years and, consequently, numerous effective methods for solving them have been created. It is often impractical to find a purely analytical solution to a system described by a differential equation because either the system itself is too complex or the system being described is too vast. Numerical approaches and computer simulations are especially helpful in such systems. The content provided in this book involves real-world examples, explores research challenges in numerical treatment, and demonstrates how to create new numerical methods for resolving problems. Theories and practical applications in the sciences and engineering are also discussed. Students of engineering and applied mathematics, as well as researchers and engineers who use computers to solve problems numerically or oversee those who do, will find this book focusing on advance numerical techniques to solve linear and nonlinear differential equations useful.

Advance in Structural Bioinformatics (Advances in Experimental Medicine and Biology #827)

by Dongqing Wei Qin Xu Tangzhen Zhao Hao Dai

This text examines in detail mathematical and physical modeling, computational methods and systems for obtaining and analyzing biological structures, using pioneering research cases as examples. As such, it emphasizes programming and problem-solving skills. It provides information on structure bioinformatics at various levels, with individual chapters covering introductory to advanced aspects, from fundamental methods and guidelines on acquiring and analyzing genomics and proteomics sequences, the structures of protein, DNA and RNA, to the basics of physical simulations and methods for conformation searches. This book will be of immense value to researchers and students in the fields of bioinformatics, computational biology and chemistry. Dr. Dongqing Wei is a Professor at the Department of Bioinformatics and Biostatistics, College of Life Science and Biotechnology, Shanghai Jiaotong University, Shanghai, China. His research interest is in the general area of structural bioinformatics.

Advanced AI Techniques and Applications in Bioinformatics (Smart and Intelligent Computing in Engineering)

by Loveleen Gaur, Arun Solanki, Samuel Fosso Wamba and Noor Zaman Jhanjhi

The advanced AI techniques are essential for resolving various problematic aspects emerging in the field of bioinformatics. This book covers the recent approaches in artificial intelligence and machine learning methods and their applications in Genome and Gene editing, cancer drug discovery classification, and the protein folding algorithms among others. Deep learning, which is widely used in image processing, is also applicable in bioinformatics as one of the most popular artificial intelligence approaches. The wide range of applications discussed in this book are an indispensable resource for computer scientists, engineers, biologists, mathematicians, physicians, and medical informaticists. Features: Focusses on the cross-disciplinary relation between computer science and biology and the role of machine learning methods in resolving complex problems in bioinformatics Provides a comprehensive and balanced blend of topics and applications using various advanced algorithms Presents cutting-edge research methodologies in the area of AI methods when applied to bioinformatics and innovative solutions Discusses the AI/ML techniques, their use, and their potential for use in common and future bioinformatics applications Includes recent achievements in AI and bioinformatics contributed by a global team of researchers

Advanced AI and Internet of Health Things for Combating Pandemics (Internet of Things)

by Mufti Mahmud Mohamed Lahby Jyoti Sekhar Banerjee Virginia Pilloni

This book presents the latest research, theoretical methods, and novel applications in the field of Health 5.0. The authors focus on combating COVID-19 or other pandemics through facilitating various technological services. The authors discuss new models, practical solutions, and technological advances related to detecting and analyzing COVID-19 or other pandemic based on machine intelligence models and communication technologies. The aim of the coverage is to help decision-makers, managers, professionals, and researchers design new paradigms considering the unique opportunities associated with computational intelligence and Internet of Medical Things (IoMT). This book emphasizes the need to analyze all the information through studies and research carried out in the field of computational intelligence, communication networks, and presents the best solutions to combat COVID and other pandemics.

Advanced API Security: OAuth 2.0 and Beyond

by Prabath Siriwardena

Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs. Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of exploitation. This book teaches you about TLS Token Binding, User Managed Access (UMA) 2.0, Cross Origin Resource Sharing (CORS), Incremental Authorization, Proof Key for Code Exchange (PKCE), and Token Exchange. Benefit from lessons learned from analyzing multiple attacks that have taken place by exploiting security vulnerabilities in various OAuth 2.0 implementations. Explore root causes, and improve your security practices to mitigate against similar future exploits. Security must be an integral part of any development project. This book shares best practices in designing APIs for rock-solid security. API security has evolved since the first edition of this book, and the growth of standards has been exponential. OAuth 2.0 is the most widely adopted framework that is used as the foundation for standards, and this book shows you how to apply OAuth 2.0 to your own situation in order to secure and protect your enterprise APIs from exploitation and attack. What You Will LearnSecurely design, develop, and deploy enterprise APIsPick security standards and protocols to match business needsMitigate security exploits by understanding the OAuth 2.0 threat landscapeFederate identities to expand business APIs beyond the corporate firewallProtect microservices at the edge by securing their APIsDevelop native mobile applications to access APIs securelyIntegrate applications with SaaS APIs protected with OAuth 2.0Who This Book Is ForEnterprise security architects who are interested in best practices around designing APIs. The book is also for developers who are building enterprise APIs and integrating with internal and external applications.

Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

by Prabath Siriwardena

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs. API adoption in both consumer and enterprises has gone beyond predictions. It has become the &‘coolest&’ way of exposing business functionalities to the outside world. Both your public and private APIs, need to be protected, monitored and managed. Security is not an afterthought, but API security has evolved a lot in last five years. The growth of standards, out there, has been exponential. That's where AdvancedAPI Security comes in--to wade through the weeds and help you keep the bad guys away while realizing the internal and external benefits of developing APIs for your services. Our expert author guides you through the maze of options and shares industry leading best practices in designing APIs for rock-solid security. The book will explain, in depth, securing APIs from quite traditional HTTP Basic Authentication to OAuth 2.0 and the standards built around it. Build APIs with rock-solid security today with Advanced API Security.Takes you through the best practices in designing APIs for rock-solid security.Provides an in depth tutorial of most widely adopted security standards for API security.Teaches you how to compare and contrast different security standards/protocols to find out what suits your business needs the best.

Advanced ASP.NET Core 3 Security: Understanding Hacks, Attacks, and Vulnerabilities to Secure Your Website

by Scott Norberg

Incorporate security best practices into ASP.NET Core. This book covers security-related features available within the framework, explains where these feature may fall short, and delves into security topics rarely covered elsewhere. Get ready to dive deep into ASP.NET Core 3.1 source code, clarifying how particular features work and addressing how to fix problems. For straightforward use cases, the ASP.NET Core framework does a good job in preventing certain types of attacks from happening. But for some types of attacks, or situations that are not straightforward, there is very little guidance available on how to safely implement solutions. And worse, there is a lot of bad advice online on how to implement functionality, be it encrypting unsafely hard-coded parameters that need to be generated at runtime, or articles which advocate for certain solutions that are vulnerable to obvious injection attacks. Even more concerning is the functions in ASP.NET Core that are not as secure as they should be by default.Advanced ASP.NET Core 3 Security is designed to train developers to avoid these problems. Unlike the vast majority of security books that are targeted to network administrators, system administrators, or managers, this book is targeted specifically to ASP.NET developers. Author Scott Norberg begins by teaching developers how ASP.NET Core works behind the scenes by going directly into the framework's source code. Then he talks about how various attacks are performed using the very tools that penetration testers would use to hack into an application. He shows developers how to prevent these attacks. Finally, he covers the concepts developers need to know to do some testing on their own, without the help of a security professional. What You Will Learn Discern which attacks are easy to prevent, and which are more challenging, in the frameworkDig into ASP.NET Core 3.1 source code to understand how the security services workEstablish a baseline for understanding how to design more secure softwareProperly apply cryptography in software developmentTake a deep dive into web security conceptsValidate input in a way that allows legitimate traffic but blocks malicious traffic Understand parameterized queries and why they are so important to ASP.NET CoreFix issues in a well-implemented solution Know how the new logging system in ASP.NET Core falls short of security needsIncorporate security into your software development process Who This Book Is ForSoftware developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET Core. A basic understanding of web technologies such as HTML, JavaScript, and CSS is assumed, as is knowledge of how to create a website, and how to read and write C#. You do not need knowledge of security concepts, even those that are often covered in ASP.NET Core documentation.

Advanced ASP.NET Core 8 Security: Move Beyond ASP.NET Documentation and Learn Real Security

by Scott Norberg

Most .NET developers do not incorporate security best practices when creating websites. The problem? Even if you use all of the best practices that the ASP.NET team recommends, you are still falling short in several key areas due to issues within the framework itself. And most developers don’t use all of the best practices that are recommended. If you are interested in truly top-notch security, available sources don’t give you the information you need. Most blogs and other books simply state how to use the configurations within ASP.NET, but do not teach you security as understood by security professionals. Online code samples aren't much help because they are usually written by developers who aren’t incorporating security practices. This book solves those issues by teaching you security first, going over software best practices as understood by security professionals, not developers. Then it teaches you how security is implemented in ASP.NET. With that foundation, it dives into specific security-related functionality and discusses how to improve upon the default functionality with working code samples. And you will learn how security professionals build software security programs so you can continue building software security best practices into your own Secure Software Development Life Cycle (SSDLC). What You’ll Learn Know how both attackers and professional defenders approach web security Establish a baseline of security for understanding how to design more secure software Discern which attacks are easy to prevent, and which are more challenging, in ASP.NET Dig into ASP.NET source code to understand how the security services work Know how the new logging system in ASP.NET falls short of security needs Incorporate security into your software development process Who This Book Is For Software developers who have experience creating websites in ASP.NET and want to know how to make their websites secure from hackers and security professionals who work with a development team that uses ASP.NET. To get the most out of this book, you should already have a basic understanding of web programming and ASP.NET, including creating new projects, creating pages, and using JavaScript. Topics That Are New to This Edition This edition has been updated with the following changes: Best practices and code samples updated to reflect security-related changes in ASP.NET 8 Improved examples, including a fully-functional website incorporating security suggestions Best practices for securely using Large Language Models (LLMs) and AI Expansions and clarifications throughout

Advanced ActionScript 3: Design Patterns

by Ben Smith

Advanced ActionScript 3 is a fresh look and new approach to utilizing valuable, structural techniques and methods that are commonly used in the field of rich interactive application development. With each method broken down into different strategized explanations, you'll find the approach most suitable for you. Whether it is an example you can utilize as-is, or one you can start with and develop further, you will have a glossary of definitions and organizational concepts at your fingertips.Object-oriented programming (OOP) and design patterns are not new to the field, but can often be overlooked in their value. They are, at times, not only overwhelming to learn, but difficult to put into practice. However, they are useful because they create a structure that can be broken down, rebuilt, and reused.This edition has been fully updated to reflect modern coding standards and practices.Provides the building blocks required for the implementation of OOPAddresses problems and concerns regarding OOPOffers solutions on how to approach and utilize OOP

Advanced Adobe Photoshop CS5 Revealed

by Chris Botello

Discover all that Photoshop CS5 has to offer with ADVANCED ADOBE PHOTOSHOP CS5 REVEALED. This book teaches advanced design techniques using one of the most popular photo-editing programs on the market. Using step-by-step tutorials, readers work with curves, levels, blending modes, painting and drawing tools, and the latest Photoshop special effects to create professional-quality designs and images. They are challenged not only as Photoshop users but as designers, following the steps a designer would take to complete real-world projects. They also see what works in a design and what doesn't. Readers then take their craft to the next level by using the advanced end-of-chapter learning projects. The book's full-color interior and highly visual design make this the ideal book for learning advanced design techniques using the latest version of Adobe Photoshop.

Refine Search

Showing 1,851 through 1,875 of 62,969 results