Browse Results

Showing 43,451 through 43,475 of 61,570 results

Practical Hexo: A Hands-On Introduction to Building Blogs Using the Hexo Framework

by Alex Libby

Leverage the power of Hexo to quickly produce static blog sites that are efficient and fast. This project-oriented book simplifies the process of setting up Hexo and manipulating content, using little more than a text editor and free software. It will equip you with a starting toolset that you can use to develop future projects, incorporate into your existing workflow and allow you to take your websites to the next level. Hexo is based on JavaScript and Node.js, two of the biggest tools available for developers: you can enhance, extend, and configure Hexo as requirements dictate. With Hexo the art of possible is only limited by the extent of your imagination and the power of JavaScript and Node.js.Practical Hexo gets you quickly acquainted with creating and manipulating blogs using a static site generator approach. You will understand how to use the Hexo framework to rapidly create and deploy blogs that are performant, with the minimum of fuss, then extend and customize your content using plugins and themes. You will work through some practical projects to help solidify your skills, and put them into practice. What You'll LearnImplement the Hexo framework in a projectCustomize and extend contentConsider maintenance requirements and how they compare to other blog systemsApply skills to practical, real-world projectsCreate themes and build pluginsMake changes using other tools and libraries. Who This Book Is For Website developers who are already familiar with JavaScript and keen to learn how to leverage the Hexo framework. Agile development team members, where time is of the essence to deliver results quickly. Developers who want to focus on simplicity, to produce efficient and properly optimized content in modern browsers using tools already in their possession.

Practical Highcharts with Angular: Your Essential Guide to Creating Real-time Dashboards

by Sourabh Mishra

Highcharts is a popular charting product that provides stunning animated and interactive charts. This concise book examines data analysis and construct the right graph. Nowadays, charting is used by the finance, education, entertainment, sports and real estate sectors to analyse their data. Built on top of of modern Javascript frameworks like jQuery and Angular, Highcharts enables developers to easily construct charts that will work in all modern browsers with pure knowledge of HTML, CSS, and JavaScript. You'll see how to use Highcharts, call backend services for data, and easily construct real-time data dashboards. You'll also learn how you can club your code with jQuery and Angular. This book provides the best solutions for real-time challenges and covers a wide range of charts including line, area, maps, plot, different types of pie chart, Gauge, heat map, Histogram chart, stacked bar, scatter plot and 3D Charts. After reading this book, you'll be able to export your charts in different formats for project-based learning. What You'll Learn Basics of Angular, consuming service through angular and implement highcharts using Angular. Use and export different chart types Work on a real-time data project calling Web API and Ajax calls through the various data sources using Angular.Create interactive styling themes and colors for a dashboard Who This Book Is For Developers, tech leads, architects or students with basic knowledge of HTML, CSS, and JavaScript who want to develop high performing, stunning, smooth, and interactive animated charts for your web products.

Practical Highcharts with Angular: Your Essential Guide to Creating Real-time Dashboards

by Sourabh Mishra

Learn to create stunning animated and interactive charts using Highcharts and Angular. This updated edition will build on your existing knowledge of HTML, CSS, and JavaScript to develop impressive dashboards that will work in all modern browsers.You will learn how to use Highcharts, call backend services for data, and easily construct real-time data dashboards so you can club your code with jQuery and Angular. This book provides the best solutions for real-time challenges and covers a wide range of charts including line, area, maps, plot, and much more. You will also learn about arc diagrams, bubble series, dependency wheels, and error bar series. After reading this book, you'll be able to export your charts in different formats for project-based learning. Highcharts is one the most useful products worldwide for developing charting on the web, and Angular is well known for speed. Using Highcharts with Angular developers can build fast, interactive dashboards. Get up to speed using this book today. What You’ll LearnCreate interactive animated styling themes and colors for a dashboardWork on a real-time data project using Web API and Ajax calls through different data sourcesExport charts in various formats Who This Book Is For Developers, dev leads, software architects, students or enthusiasts who are already familiar with HTML, CSS, and JavaScript.

Practical Hive

by Scott Shaw Ankur Gupta Andreas François Vermeulen David Kjerrumgaard

Dive into the world of SQL on Hadoop and get the most out of your Hive data warehouses. This book is your go-to resource for using Hive: authors Scott Shaw, Ankur Gupta, David Kjerrumgaard, and Andreas Francois Vermeulen take you through learning HiveQL, the SQL-like language specific to Hive, to analyze, export, and massage the data stored across your Hadoop environment. From deploying Hive on your hardware or virtual machine and setting up its initial configuration to learning how Hive interacts with Hadoop, MapReduce, Tez and other big data technologies, Practical Hive gives you a detailed treatment of the software. In addition, this book discusses the value of open source software, Hive performance tuning, and how to leverage semi-structured and unstructured data. What You Will Learn Install and configure Hive for new and existing datasets Perform DDL operations Execute efficient DML operations Use tables, partitions, buckets, and user-defined functions Discover performance tuning tips and Hive best practices Who This Book Is For Developers, companies, and professionals who deal with large amounts of data and could use software that can efficiently manage large volumes of input. It is assumed that readers have the ability to work with SQL.

Practical IPv6 for Windows Administrators

by Edward Horley

Practical IPv6 for Windows Administrators is a handy guide to implementing IPv6 in a Microsoft Windows environment. This is the book you need if you are a Microsoft Windows Administrator confronted with IPv6 and in need of a quick resource to get up and going. The book covers the current state of IPv6 and its support in Microsoft Windows. It provides best-practices and other guidance toward successful implementation. This book is especially written with the goal of translating your current expertise in IPv4 into the new realm of IPv6. Special attention is given to dual-stack configurations, helping you to run IPv4 and IPv6 side-by-side and support both protocol versions during a transition period. Practical IPv6 for Windows Administrators is also a fast reference you can look at to get something done quickly. It covers IPv6 addressing, management of IPv6 from Powershell, Advanced Firewall configuration, and use of IPv6 in Hyper-V and virtual networking environments. You'll find practical examples showing how IPv6 integrates with all the standard tools you use for IPv4 today, tools like DNS and DHCP. You'll also find insider knowledge on IPv6 that can help avert stumbling points on the road to deployment. Provides a quick path from IPv4 expertise to IPv6 implementation Gives best-practices specific to Windows on IPv6 and dual stack networks Is chock full of practical examples showing how to manage IPv6 on Windows What you'll learn Understand IPv6 addressing and how it works in Windows Implement best practices involving IPv6 for Exchange, IIS, and SharePoint Manage IPv6 from PowerShell and the Windows Advanced Firewall Deploy IPv6 from virtual networking environments such as in Hyper-V Integrate IPv6 into Windows Server functions such as DNS, DHC, and Active Directory Take advantage of IPv6 transition technologies that are supported in Windows Who this book is for Practical IPv6 for Windows Administrators is ideal for those working with Microsoft Windows operating systems who need to implement IPv6. The book is is designed for Microsoft Windows Administrators, but is also useful for developers, network engineers, and storage administrators who are involved in the architecture of Windows solutions. Table of Contents IPv6: The Big Picture IPv6 Support in Windows IPv6 Addressing IPv6 Best Practices in Windows IPv6 and PowerShell IPv6 and Advanced Firewall IPv6 in Hyper-V and Virtual Networking IPv6 and DNS IPv6 and DHCP Miscellaneous IPv6 Items

Practical IT Service Management

by Thejendra BS

This book shows you how to set up a technical service management structure, using the best practice framework established by the IT Infrastructure Library. The ITIL system is the most widely accepted approach to technical IT service management worldwide. It teaches technical support staff how to provide the efficient IT services that are vital to your company's success.

Practical Implementation of a Data Lake: Translating Customer Expectations into Tangible Technical Goals

by Nayanjyoti Paul

This book explains how to implement a data lake strategy, covering the technical and business challenges architects commonly face. It also illustrates how and why client requirements should drive architectural decisions. Drawing upon a specific case from his own experience, author Nayanjyoti Paul begins with the consideration from which all subsequent decisions should flow: what does your customer need? He also describes the importance of identifying key stakeholders and the key points to focus on when starting a new project. Next, he takes you through the business and technical requirement-gathering process, and how to translate customer expectations into tangible technical goals. From there, you’ll gain insight into the security model that will allow you to establish security and legal guardrails, as well as different aspects of security from the end user’s perspective. You’ll learn which organizational roles need to be onboarded into the data lake, their responsibilities, the services they need access to, and how the hierarchy of escalations should work. Subsequent chapters explore how to divide your data lakes into zones, organize data for security and access, manage data sensitivity, and techniques used for data obfuscation. Audit and logging capabilities in the data lake are also covered before a deep dive into designing data lakes to handle multiple kinds and file formats and access patterns. The book concludes by focusing on production operationalization and solutions to implement a production setup. After completing this book, you will understand how to implement a data lake, the best practices to employ while doing so, and will be armed with practical tips to solve business problems. What You Will Learn Understand the challenges associated with implementing a data lakeExplore the architectural patterns and processes used to design a new data lakeDesign and implement data lake capabilitiesAssociate business requirements with technical deliverables to drive success Who This Book Is For Data Scientists and Architects, Machine Learning Engineers, and Software Engineers.

Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT

by Charles J. Brooks Philip A. Craig Jr.

A practical roadmap to protecting against cyberattacks in industrial environments In Practical Industrial Cybersecurity: ICS, Industry 4.0, and IIoT, veteran electronics and computer security author Charles J. Brooks and electrical grid cybersecurity expert Philip Craig deliver an authoritative and robust discussion of how to meet modern industrial cybersecurity challenges. The book outlines the tools and techniques used by practitioners in the industry today, as well as the foundations of the professional cybersecurity skillset required to succeed on the SANS Global Industrial Cyber Security Professional (GICSP) exam. Full of hands-on explanations and practical guidance, this book also includes: Comprehensive coverage consistent with the National Institute of Standards and Technology guidelines for establishing secure industrial control systems (ICS) Rigorous explorations of ICS architecture, module and element hardening, security assessment, security governance, risk management, and morePractical Industrial Cybersecurity is an indispensable read for anyone preparing for the Global Industrial Cyber Security Professional (GICSP) exam offered by the Global Information Assurance Certification (GIAC). It also belongs on the bookshelves of cybersecurity personnel at industrial process control and utility companies. Practical Industrial Cybersecurity provides key insights to the Purdue ANSI/ISA 95 Industrial Network Security reference model and how it is implemented from the production floor level to the Internet connection of the corporate network. It is a valuable tool for professionals already working in the ICS/Utility network environment, IT cybersecurity personnel transitioning to the OT network environment, and those looking for a rewarding entry point into the cybersecurity field.

Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries

by Sravani Bhattacharjee

Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world.Key FeaturesGain practical insight into security concepts in the Industrial Internet of Things (IIoT) architectureDemystify complex topics such as cryptography and blockchainComprehensive references to industry standards and security frameworks when developing IIoT blueprintsBook DescriptionSecuring connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of Things Security enables you to develop a comprehensive understanding of the entire spectrum of securing connected industries, from the edge to the cloud.This book establishes the foundational concepts and tenets of IIoT security by presenting real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical know-how on the multi-layered defense techniques including Identity and Access Management (IAM), endpoint security, and communication infrastructure. Stakeholders, including developers, architects, and business leaders, can gain practical insights in securing IIoT lifecycle processes, standardization, governance and assess the applicability of emerging technologies, such as blockchain, Artificial Intelligence, and Machine Learning, to design and implement resilient connected systems and harness significant industrial opportunities.What you will learnUnderstand the crucial concepts of a multi-layered IIoT security frameworkGain insight on securing identity, access, and configuration management for large-scale IIoT deploymentsSecure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivityBuild a concrete security program for your IIoT deploymentExplore techniques from case studies on industrial IoT threat modeling and mitigation approachesLearn risk management and mitigation planningWho this book is forPractical Industrial Internet of Things Security is for the IIoT community, which includes IIoT researchers, security professionals, architects, developers, and business stakeholders. Anyone who needs to have a comprehensive understanding of the unique safety and security challenges of connected industries and practical methodologies to secure industrial assets will find this book immensely helpful. This book is uniquely designed to benefit professionals from both IT and industrial operations backgrounds.

Practical Information Security Management

by Tony Campbell

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information security practice, hire the right people, and strike the best balance between security controls, costs, and risks. Practical Information Security Management provides a wealth of practical advice for anyone responsible for information security management in the workplace, focusing on the 'how' rather than the 'what'. Together we'll cut through the policies, regulations, and standards to expose the real inner workings of what makes a security management program effective, covering the full gamut of subject matter pertaining to security management: organizational structures, security architectures, technical controls, governance frameworks, and operational security. This book was not written to help you pass your CISSP, CISM, or CISMP or become a PCI-DSS auditor. It won't help you build an ISO 27001 or COBIT-compliant security management system, and it won't help you become an ethical hacker or digital forensics investigator - there are many excellent books on the market that cover these subjects in detail. Instead, this is a practical book that offers years of real-world experience in helping you focus on the getting the job done. What You Will Learn Learn the practical aspects of being an effective information security manager Strike the right balance between cost and risk Take security policies and standards and make them work in reality Leverage complex security functions, such as Digital Forensics, Incident Response and Security Architecture Who This Book Is For Anyone who wants to make a difference in offering effective security management for their business. You might already be a security manager seeking insight into areas of the job that you've not looked at before, or you might be a techie or risk guy wanting to switch into this challenging new career. Whatever your career goals are, Practical Security Management has something to offer you.

Practical Information Security: A Competency-based Education Course

by Ahmed Aleroud Izzat Alsmadi Robert Burdwell Abdallah Wahbeh Mahmoud Ali Al-Qudah Ahmad Al-Omari

This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Practical Insecurity: The Layman's Guide to Digital Security and Digital Self-defense (River Publishers Series in Rapids in Security and Digital Forensics)

by Lyndon Marshall

This book provides practical advice for everyone on how to effectively secure yourself, your devices, and your privacy in an era where all of those things seem doomed. From acquiring software, to the ongoing flaws in email, to the risks of file sharing, and issues surrounding social media and social reputation, Practical Insecurity is the tool you need to maximize your self-protection in the digital world. Everyone has had a brush with cybersecurity—in some way. Our computer has gotten a virus, somebody you know has lost all their company’s data because of ransomware, someone has stolen our identity, a store we do business with has their computer system compromised—including our account—so we are offered free identity protection, and so on. It seems like everyday there is another bit of bad news and it often impacts us. But, the question largely goes unanswered: what can I do as an individual or as the owner of a small business to protect myself against having my security compromised? Practical Insecurity provides the answers.

Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server

by Robert La Lau

Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.After a chapter explaining the most important Unix basics, you will start with a vanilla server as delivered by a hosting provider and by the end of the book, you will have a fully functional and well-secured enterprise class internet server. You will also be equipped with the expertise needed to keep your server secured and up to date. All configuration examples are given for FreeBSD, Debian and CentOS, so you are free to choose your operating system. No single blueprint exists for an internet server, and an important part of the work of a system administrator consists of analyzing, interpreting and implementing specific wishes, demands and restrictions from different departments and viewpoints within an organization. Practical Internet Server Configuration provides the information you need to succeed as a sysadmin. What You'll Learn Configure DNS using Bind 9Set up Apache and NginxCustomize a mail server: IMAP (Dovecot) and SMTP (Postfix), spam filtering includedAuthenticate mail users using LDAPInstall and maintain MariaDB and PostgreSQL databasesPrepare SSL/TLS certificates for the encryption of web, mail and LDAP trafficSynchronize files, calendars and address books between devicesBuild a firewall: PF for FreeBSD and nftables for Linux Who This Book Is For This book can be used by aspiring and beginning system administrators who are working on personal servers, or more experienced system administrators who may know Unix well but need a reference book for the more specialized work that falls outside the daily routine. Basic understanding of Unix and working on the command line is necessary.

Practical Internet of Things Networking: Understanding IoT Layered Architecture

by Rolando Herrero

This textbook explores the different protocols and technologies that are key to supporting the most important Internet of Things (IoT) networking scenarios. Intended for upper undergraduate classes, the author presents these protocols and technologies from a perspective of the standard layered architecture with special focus on protocol interaction and functionality. To this end, the book provides a unique step-by-step hands-on approach that enables the reader to use common software tools and network emulators to understand, prototype, and deploy a vast range of use cases. The author shows how these topologies, which rely on standard physical layer technologies like LoRa, NB-IoT, LTE-M, IEEE 802.15.4 and BLE, provide end-to-end IPv6 connectivity and comply with the most important requirements of industrial IoT solutions. The book helps readers learn how to build IoT networks through exercises, lab projects, and examples.

Practical Internet of Things Security

by Brian Russell Drew Van Duren

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book * Learn to design and implement cyber security strategies for your organization * Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem * Learn best practices to secure your data from device to the cloud * Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn * Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments * Build a rock-solid security program for IoT that is cost-effective and easy to maintain * Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture * See how the selection of individual components can affect the security posture of the entire system * Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem * Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In Detail With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Style and approach This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.

Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem

by Brian Russell Drew Van Duren

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world Key FeaturesLearn best practices to secure your data from the device to the cloudUse systems security engineering and privacy-by-design principles to design a secure IoT ecosystemA practical guide that will help you design and implement cyber security strategies for your organizationBook DescriptionWith the advent of the Internet of Things (IoT), businesses have to defend against new types of threat. The business ecosystem now includes the cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces. It therefore becomes critical to ensure that cybersecurity threats are contained to a minimum when implementing new IoT services and solutions. This book shows you how to implement cybersecurity solutions, IoT design best practices, and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. In this second edition, you will go through some typical and unique vulnerabilities seen within various layers of the IoT technology stack and also learn new ways in which IT and physical threats interact. You will then explore the different engineering approaches a developer/manufacturer might take to securely design and deploy IoT devices. Furthermore, you will securely develop your own custom additions for an enterprise IoT implementation. You will also be provided with actionable guidance through setting up a cryptographic infrastructure for your IoT implementations. You will then be guided on the selection and configuration of Identity and Access Management solutions for an IoT implementation. In conclusion, you will explore cloud security architectures and security best practices for operating and managing cross-organizational, multi-domain IoT deployments.What you will learnDiscuss the need for separate security requirements and apply security engineering principles on IoT devicesMaster the operational aspects of planning, deploying, managing, monitoring, and detecting the remediation and disposal of IoT systemsUse Blockchain solutions for IoT authenticity and integrityExplore additional privacy features emerging in the IoT industry, such as anonymity, tracking issues, and countermeasuresDesign a fog computing architecture to support IoT edge analyticsDetect and respond to IoT security incidents and compromisesWho this book is forThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure the security of their organization's data when connected through the IoT. Business analysts and managers will also find this book useful.

Practical Internet of Things with JavaScript: Build standalone exciting IoT projects with Raspberry Pi 3 and JavaScript (ES5/ES6)

by Arvind Ravulavaru

End to end solutions for IoT enthusiasts and web developers Key Features Leverage the capability of IoT with the combination of Raspberry Pi 3 and JavaScript (ES5/ES6) Develop a health monitoring device along with some cool projects like Smart Agriculture & Raspberry Pi 3 based surveillance. A practical book which will help you build Mobile/Web/Desktop apps that will show how to manage and monitor data from sensors and actuators in real time. Book Description In this world of technology upgrades, IoT is currently leading with its promise to make the world a more smarter and efficient place. This book will show you how to build simple IoT solutions that will help you to understand how this technology works. We would not only explore the IoT solution stack, but we will also see how to do it with the world’s most misunderstood programming language - JavaScript. Using Raspberry Pi 3 and JavaScript (ES5/ES6) as the base to build all the projects, you will begin with learning about the fundamentals of IoT and then build a standard framework for developing all the applications covered in this book. You will then move on to build a weather station with temperature, humidity and moisture sensors and further integrate Alexa with it. Further, you will build a smart wearable for understanding the concept of fall detection. You will then extend it with the 'If This Then That' (IFTTT) rules engine to send an email on fall detection. Finally, you will be working with the Raspberry Pi 3 camera module and surveillance with a bit of facial detection using Amazon Rekognition platform. At the end of the book, you will not only be able to build standalone exciting IoT applications but also learn how you can extend your projects to another level. What you will learn Integrate sensors and actuators with the cloud and control them for your Smart Weather Station. Develop your very own Amazon Alexa integrating with your IoT solution Define custom rules and execute jobs on certain data events using IFTTT Build a simple surveillance solutions using Amazon Recognition & Raspberry Pi 3 Design a fall detection system and build a notification system for it. Use Amazon Rekognition for face detection and face recognition in your Surveillance project Who this book is for This book targets IoT enthusiasts and web developers who would like to build IoT-based applications with Raspberry Pi, Arduino and JavaScript. Some knowledge about electronics and familiarity with programming concepts (JavaScript - ES5/ES6) is expected.

Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

by Fotios Chantzis Ioannis Stais Paulino Calderon Evangelos Deirmentzoglou Beau Woods

The definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You&’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you&’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks. You&’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems. You&’ll also learn how to: • Write a DICOM service scanner as an NSE module • Hack a microcontroller through the UART and SWD interfaces • Reverse engineer firmware and analyze mobile companion apps • Develop an NFC fuzzer using Proxmark3 • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill The tools and devices you&’ll use are affordable and readily available, so you can easily practice what you learn. Whether you&’re a security researcher, IT team member, or hacking hobbyist, you&’ll find Practical IoT Hacking indispensable in your efforts to hack all the things REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming

Practical Issues of Intelligent Innovations (Studies in Systems, Decision and Control #140)

by Janusz Kacprzyk Vassil Sgurev Vladimir Jotsov

This book presents recent advances in the field of intelligent systems. Composed of fourteen selected chapters, it covers a wide range of research that varies from applications in industrial data science to those in applied science. Today the word INNOVATION is more and more connected with the words INTELLIGENT and SECURITY, as such the book discusses the theory and applications of hot topics such as big data, education applications of robots with different levels of autonomy, knowledge-based modeling and control of complex dynamical systems, sign-based synthesis of behavior, security issues with intelligent systems, innovative intelligent control design, neuromorphic computation, data-driven classification, intelligent modeling and measurement innovations, multisensor data association, personal education assistants, a modern production architecture, study of peer review and scientometrics, intelligent research on bug report data, and clustering non-Gaussian data. The broad and varied research discussed represents the mainstream of contemporary intelligent innovations that are slowly but surely changing the world.

Practical Iterative Learning Control with Frequency Domain Design and Sampled Data Implementation

by Danwei Wang Yongqiang Ye Bin Zhang

This book is on the iterative learning control (ILC) with focus on the design and implementation. We approach the ILC design based on the frequency domain analysis and address the ILC implementation based on the sampled data methods. This is the first book of ILC from frequency domain and sampled data methodologies. The frequency domain design methods offer ILC users insights to the convergence performance which is of practical benefits. This book presents a comprehensive framework with various methodologies to ensure the learnable bandwidth in the ILC system to be set with a balance between learning performance and learning stability. The sampled data implementation ensures effective execution of ILC in practical dynamic systems. The presented sampled data ILC methods also ensure the balance of performance and stability of learning process. Furthermore, the presented theories and methodologies are tested with an ILC controlled robotic system. The experimental results show that the machines can work in much higher accuracy than a feedback control alone can offer. With the proposed ILC algorithms, it is possible that machines can work to their hardware design limits set by sensors and actuators. The target audience for this book includes scientists, engineers and practitioners involved in any systems with repetitive operations.

Practical JAMstack: Blazing Fast, Simple, and Secure Web Development, the Modern Way

by Frank Zammetti

Learn what JAMstack is all about, what those three big letters in the front mean and why it’s so beneficial. This book shows you how to create sites and apps on the JAMstack using GatsbyJS, a tool made specifically for generating them. As part of that, you’ll learn about React, one of the hottest front-end development tools out there today. You will build three separate projects, starting with a relatively simple site to get your feet wet, then a more robust and dynamic application to see more advanced topics like API usage and data storage. Finally, you’ll build a game on the JAMstack to get a whole different perspective on how all the pieces can fit together. JAMstack, a modern take on best practices, is taking the web development world by storm and allowing developers to create web site and apps that are blazingly fast and highly secure. In many ways JAMstack is a throwback to web development of yesteryear, all while providing a simpler development experience that is streamlined by many years of best practices being brought to bear. What You'll Learn Review the principles of JAMstack: Javascript, APIs and MarkupUse React to build a front-endSet up a GitHub account and hosting using GitHub PagesHost in Netlify (the creators of JAMstack!)Understand Netlify functions and FaunaDB for persistent data storageExplore GraphQL usage for querying dataWork with the Phaser game library Who This Book Is ForWeb developers with some HTML, CSS and JavaScript experience, who want to apply best practices to build web sites that have no back-end server infrastructure while still providing dynamic content along with a streamlined development process. Architects who just want to learn JAMstack, even if they aren’t going to be hacking code all day.

Practical JIRA Administration: Using JIRA Effectively: Beyond the Documentation

by Matthew B. Doar

If you're familiar with JIRA for issue tracking, bug tracking, and other uses, you know it can sometimes be tricky to set up and manage. In this concise book, software toolsmith Matt Doar clarifies some of the more confusing aspects by answering difficult and frequently asked questions about JIRA administration.Practical JIRA Administration shows you how JIRA is intended to be used, making it an ideal supplement to the extensive documentation already available. The book’s chapters are loosely connected, so you can go straight to the information that best serves your needs.Understand the difference between JIRA groups and JIRA project rolesDiscover what JIRA schemes do, and learn how to maintain themUse a consistent configuration approach to help you use JIRA as a platformCreate a workflow from scratchAdd, modify, and deactivate usersPrepare for a JIRA upgrade, and troubleshoot if necessaryGet remote access to JIRA via email, SQL, REST, and other methods

Practical JIRA Plugins: Using JIRA Effectively: Custom Development

by Matthew B. Doar

One advantage of using JIRA for issue tracking, bug tracking, or project management is the ability to extend this tool with hundreds of plugins from the JIRA community. In this concise book, software toolsmith Matt Doar—the author of Practical JIRA Administration—shows you how to create and maintain your own JIRA plugins to meet the specific needs of a project.This book uses detailed examples to clarify some of the more confusing aspects of JIRA plugins, and serves as an ideal supplement to the extensive documentation already available.Use JIRA’s Plugin SDK, and learn several aspects common to all pluginsCreate your own custom field type, using a JIRA pluginDelve into advanced aspects of custom field plugins, and discover how searching for values in custom fields worksCreate JIRA plugins to use with workflows, and learn about conditions, validators, and post-functionsStore data using the PropertySet interface and the Active Objects pluginUpgrade a plugin and upload it to Atlassian Plugin Exchange (PAC)

Practical JSF in Java EE 8: Web Applications ​in Java for the Enterprise

by Michael Müller

Master the Java EE 8 and JSF (JavaServer Faces) APIs and web framework with this practical, projects-driven guide to web development. This book combines theoretical background with a practical approach by building four real-world applications. By developing these JSF web applications, you'll take a tour through the other Java EE technologies such as JPA, CDI, Security, WebSockets, and more.In Practical JSF in Java EE 8, you will learn to use the JavaServer Faces web framework in Java EE 8 to easily construct a web-based user interface from a set of reusable components. Next, you add JSF event handling and then link to a database, persist data, and add security and the other bells and whistles that the Java EE 8 platform has to offer.After reading this book you will have a good foundation in Java-based web development and will have increased your proficiency in sophisticated Java EE 8 web development using the JSF framework.What You Will Learn Use the Java EE 8 and the JavaServer Faces APIs to build Java-based web applications through four practical real-world case studies Process user input with JSF and the expression language by building a calculator application Persist data using JSF templating and Java Persistence to manage an inventory of books Create and manage an alumni database using JSF, Ajax, web services and Java EE 8's security features. Who This Book Is For Those new to Java EE 8 and JSF. Some prior experience with Java is recommended.

Practical Java Machine Learning: Projects with Google Cloud Platform and Amazon Web Services

by Mark Wickham

Build machine learning (ML) solutions for Java development. This book shows you that when designing ML apps, data is the key driver and must be considered throughout all phases of the project life cycle. Practical Java Machine Learning helps you understand the importance of data and how to organize it for use within your ML project. You will be introduced to tools which can help you identify and manage your data including JSON, visualization, NoSQL databases, and cloud platforms including Google Cloud Platform and Amazon Web Services.Practical Java Machine Learning includes multiple projects, with particular focus on the Android mobile platform and features such as sensors, camera, and connectivity, each of which produce data that can power unique machine learning solutions. You will learn to build a variety of applications that demonstrate the capabilities of the Google Cloud Platform machine learning API, including data visualization for Java; document classification using the Weka ML environment; audio file classification for Android using ML with spectrogram voice data; and machine learning using device sensor data.After reading this book, you will come away with case study examples and projects that you can take away as templates for re-use and exploration for your own machine learning programming projects with Java.What You Will LearnIdentify, organize, and architect the data required for ML projectsDeploy ML solutions in conjunction with cloud providers such as Google and AmazonDetermine which algorithm is the most appropriate for a specific ML problemImplement Java ML solutions on Android mobile devicesCreate Java ML solutions to work with sensor dataBuild Java streaming based solutionsWho This Book Is ForExperienced Java developers who have not implemented machine learning techniques before.

Refine Search

Showing 43,451 through 43,475 of 61,570 results