Browse Results

Showing 14,401 through 14,425 of 53,470 results

Dependable Software Engineering. Theories, Tools, and Applications: 7th International Symposium, SETTA 2021, Beijing, China, November 25–27, 2021, Proceedings (Lecture Notes in Computer Science #13071)

by Shengchao Qin Jim Woodcock Wenhui Zhang

This book constitutes the proceedings of the 7th International Symposium on Dependable Software Engineering, SETTA 2021, held in Beijing, China, in November 2021. The 16 full papers in this volume were carefully reviewed and selected from 39 submissions, and are presented with 3 abstracts of keynote speeches. They deal with latest research results and ideas on bridging the gap between formal methods and software engineering.

Dependable Software Engineering. Theories, Tools, and Applications: 8th International Symposium, SETTA 2022, Beijing, China, October 27-29, 2022, Proceedings (Lecture Notes in Computer Science #13649)

by Jean-Pierre Talpin Wei Dong

This book constitutes the proceedings of the 8th International Symposium on Dependable Software Engineering, SETTA 2022, held in Beijing, China, in October 2022.The 11 full papers and 3 short papers in this volume were carefully reviewed and selected from 29 submissions, and are presented with 3 abstracts of keynote speeches. They deal with latest research results and ideas on bridging the gap between formal methods and software engineering.

Dependable Software Engineering. Theories, Tools, and Applications: 4th International Symposium, Setta 2018, Beijing, China, September 4-6, 2018, Proceedings (Lecture Notes in Computer Science #10998)

by Zijiang Yang Markus Müller-Olm Xinyu Feng

This book constitutes the proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2018, held in Beijing, China, in September 2018. The 9 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The purpose of SETTA is to provide an international forum for researchers and practitioners to share cutting-edge advancements and strengthen collaborations in the field of formal methods and its interoperability with software engineering for building reliable, safe, secure, and smart systems.

Dependency Injection: Design patterns using Spring and Guice

by Dhananjay Prasanna

Dependency Injection is an in-depth guide to the current best practices forusing the Dependency Injection pattern-the key concept in Spring and therapidly-growing Google Guice. It explores Dependency Injection, sometimescalled Inversion of Control, in fine detail with numerous practical examples.Developers will learn to apply important techniques, focusing on their strengthsand limitations, with a particular emphasis on pitfalls, corner-cases, and bestpractices.This book is written for developers and architects who want to understandDependency Injection and successfully leverage popular DI technologies such asSpring, Google Guice, PicoContainer, and many others. The book exploresmany small examples of anchor concepts and unfolds a larger example to showthe big picture.Written primarily from a Java point-of-view, this book is appropriate for anydeveloper with a working knowledge of object-oriented programming in Java,Ruby, or C#. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

Dependency Injection in .NET Core 2.0

by Tadit Dash Marino Posadas

Inject dependencies and write highly maintainable and flexible code using the new .NET Core DI Engine About This Book • Identify when to use the constructors, parameters, setters, or Interface Injection, for best results • Build dependencies not only for MVC within .NET but also for other frontend tools such as Angular • Create specific components or services to cover discrete and separate pieces of functionality and call them when needed. Who This Book Is For C# and .NET developers who have no idea what DI is and would like to understand how to implement it in their applications. What You Will Learn • Understand the concept of DI and its implications in modern software construction • Learn how DI is already implemented in today's frameworks. • Analyze how DI can be used with current software to improve maintainability and scalability. • Learn the use of DI in .NET Core • Get used to the possibilities that DI offers the ASP.NET Core developer in different scenarios. • Learn about good practices and refactoring legacy code. In Detail .NET Core provides more control than ever over web application architectures. A key point of this software architecture is that it's based on the use of Dependency Injection as a way to properly implement the Dependency Inversion principle proposed in the SOLID principles established by Robert C. Martin. With the advent of .NET Core, things have become much simpler with Dependency Injection built into the system. This book aims to give you a profound insight into writing loosely-coupled code using the latest features available in .NET Core. It talks about constructors, parameter, setters, and interface injection, explaining in detail, with the help of examples, which type of injection to use in which situation. It will show you how to implement a class that creates other classes with associated dependencies, also called IoC containers, and then create dependencies for each MVC component of ASP.NET Core. You'll learn to distinguish between IoC containers, the use of Inversion of Control, and DI itself, since DI is just a way of implementing IoC via these containers. You'll also learn how to build dependencies for other frontend tool such as Angular. You will get to use the in-built services offered by .NET Core to create your own custom dependencies. Towards the end, we'll talk about some patterns and anti-patterns for Dependency Injection along with some techniques to refactor legacy applications and inject dependencies. Style and Approach Filled with examples, this book will take you through various techniques for injecting dependencies into your applications with or without the use of frameworks.

Dependency Injection Principles, Practices, and Patterns

by Mark Seemann Steven van Deursen

SummaryDependency Injection Principles, Practices, and Patterns teaches you to use DI to reduce hard-coded dependencies between application components. You'll start by learning what DI is and what types of applications will benefit from it. Then, you'll work through concrete scenarios using C# and the .NET framework to implement DI in your own projects. As you dive into the thoroughly-explained examples, you'll develop a foundation you can apply to any of the many DI libraries for .NET and .NET Core.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyDependency Injection (DI) is a great way to reduce tight coupling between software components. Instead of hard-coding dependencies, such as specifying a database driver, you make those connections through a third party. Central to application frameworks like ASP.NET Core, DI enables you to better manage changes and other complexity in your software.About the BookDependency Injection Principles, Practices, and Patterns is a revised and expanded edition of the bestselling classic Dependency Injection in .NET. It teaches you DI from the ground up, featuring relevant examples, patterns, and anti-patterns for creating loosely coupled, well-structured applications. The well-annotated code and diagrams use C# examples to illustrate principles that work flawlessly with modern object-oriented languages and DI libraries.What's InsideRefactoring existing code into loosely coupled codeDI techniques that work with statically typed OO languagesIntegration with common .NET frameworksUpdated examples illustrating DI in .NET CoreAbout the ReaderFor intermediate OO developers.About the AuthorsMark Seemann is a programmer, software architect, and speaker who has been working with software since 1995, including six years with Microsoft. Steven van Deursen is a seasoned .NET developer and architect, and the author and maintainer of the Simple Injector DI library.Table of ContentsPART 1 Putting Dependency Injection on the mapThe basics of Dependency Injection: What, why, and howWriting tightly coupled code Writing loosely coupled codePART 2 CatalogDI patternsDI anti-patternsCode smellsPART 3 Pure DIApplication compositionObject lifetimeInterceptionAspect-Oriented Programming by designTool-based Aspect-Oriented ProgrammingPART 4 DI ContainersDI Container introductionThe Autofac DI ContainerThe Simple Injector DI ContainerThe Microsoft.Extensions.DependencyInjection DI Container

Dependency Injection with AngularJS

by Alex Knol

This book is a practical, hands-on approach to using dependency injection and implementing test-driven development using AngularJS. Dependency Injection with AngularJS is aimed at developers who are aware of AngularJS but need to get started with using it in real life applications. Also, developers who want to get into test-driven development with AngularJS can use this book as practical guide. Even if you know about dependency injection, it can serve as a good reference on how it is used within AngularJS. Readers are expected to have some experience with JavaScript.

Dependent, Distracted, Bored: Affective Formations in Networked Media

by Susanna Paasonen

A new approach to understanding the culture of ubiquitous connectivity, arguing that our dependence on networked infrastructure does not equal addiction.In this book, Susanna Paasonen takes on a dominant narrative repeated in journalistic and academic accounts for more than a decade: that we are addicted to devices, apps, and sites designed to distract us, that drive us to boredom, with detrimental effect on our capacities to focus, relate, remember, and be. Paasonen argues instead that network connectivity is a matter of infrastructure and necessary for the operations of the everyday. Dependencies on it do not equal addiction but speak to the networks within which our agency can take shape.

Deploy Container Applications Using Kubernetes: Implementations with microk8s and AWS EKS

by Shiva Subramanian

Navigate through the Kubernetes landscape to create and deploy container-based applications. This book will show you how to choose between the various available container-based operating systems, and how to design a better continuous integration pipeline for your container images, where to store them, and how to scan and secure them. In the first half of the book, you'll learn the practical tips on how to setup the system for visibility and troubleshooting, how to reduce the attack vector and reduce risks. The second half of the book focuses on Kubernetes, the popular container orchestration system. You'll see how to setup your Kubernetes for practical applications such as show/chargeback using tagging, efficient use of namespaces and pods, various isolation layers. It also shows you how to integrate with popular implementations of K8S such as AWS EKS (Elastic Container Service), GCP Google Kubernetes Engine (GKE) in touch points such as authentication and authorization, optimization, logging and troubleshooting tools, etc. By practicing the scenarios given in this book, you will be able to make better design choices that are appropriate for the constraints you are working with. Deploy Container Applications Using Kubernetes is your go-to resource for an optimal deployment of workloads using containers and Kubernetes in both public and private cloud settings. What You'll LearnUnderstand the various design choices, their pros and consBuild a better CI/CD pipeline for your containers and KubernetesDeploy your first container application in a public cloud K8S engineImprove your existing K8S deployment for efficiency and eleganceWho This Book Is ForIT Platform Architects, System Engineers/, and System Administrators

Deploy Containers on AWS: With EC2, ECS, and EKS

by Shimon Ifrah

Start deploying, managing, and scaling containerized applications into AWS container infrastructure using Docker on Amazon EC2, Amazon Elastic Container Service (ECS), and AWS Elastic Kubernetes Service (EKS). This step by step practical book will cover all the available container services on AWS and review the usage of each one based on your required scale and cost. Further, you will see how to set up each environment and finally deploy, manage, and scale containerized applications on each one. In the chapter about Elastic Kubernetes Service (EKS), you will learn the process of building and managing Kubernetes clusters on AWS and see how to provision hosts in a matter of minutes, while deploying containers in seconds and making them available globally.Deploy Containers on AWS shows you how to get started with AWS container offerings and manage production or test environments of containerized applications using a hands-on approach with step-by-step instructions.What You Will LearnDeploy and manage containers with Docker on Amazon EC2Store and retrieve container images using the Amazon EC2 container registryOrchestrate containers with Amazon Elastic Container Service (ECS)Run Kubernetes-managed infrastructure on AWS (EKS)Monitor, manage, back up, and restore containers on AWSWho This Book Is ForDevelopers, cloud and systems administrators, and architects

Deploy Machine Learning Models to Production: With Flask, Streamlit, Docker, and Kubernetes on Google Cloud Platform

by Pramod Singh

Build and deploy machine learning and deep learning models in production with end-to-end examples.This book begins with a focus on the machine learning model deployment process and its related challenges. Next, it covers the process of building and deploying machine learning models using different web frameworks such as Flask and Streamlit. A chapter on Docker follows and covers how to package and containerize machine learning models. The book also illustrates how to build and train machine learning and deep learning models at scale using Kubernetes.The book is a good starting point for people who want to move to the next level of machine learning by taking pre-built models and deploying them into production. It also offers guidance to those who want to move beyond Jupyter notebooks to training models at scale on cloud environments. All the code presented in the book is available in the form of Python scripts for you to try the examples and extend them in interesting ways.What You Will LearnBuild, train, and deploy machine learning models at scale using KubernetesContainerize any kind of machine learning model and run it on any platform using DockerDeploy machine learning and deep learning models using Flask and Streamlit frameworksWho This Book Is ForData engineers, data scientists, analysts, and machine learning and deep learning engineers

Deployable Machine Learning for Security Defense: First International Workshop, MLHat 2020, San Diego, CA, USA, August 24, 2020, Proceedings (Communications in Computer and Information Science #1271)

by Gang Wang Arridhana Ciptadi Ali Ahmadzadeh

This book constitutes selected papers from the First International Workshop on Deployable Machine Learning for Security Defense, MLHat 2020, held in August 2020. Due to the COVID-19 pandemic the conference was held online. The 8 full papers were thoroughly reviewed and selected from 13 qualified submissions. The papers are organized in the following topical sections: understanding the adversaries; adversarial ML for better security; threats on networks.

Deployable Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August 15, 2021, Proceedings (Communications in Computer and Information Science #1482)

by Gang Wang Arridhana Ciptadi Ali Ahmadzadeh

This book constitutes selected and extended papers from the Second International Workshop on Deployable Machine Learning for Security Defense, MLHat 2021, held in August 2021. Due to the COVID-19 pandemic the conference was held online. The 6 full papers were thoroughly reviewed and selected from 7 qualified submissions. The papers are organized in topical sections on machine learning for security, and malware attack and defense.

Deploying AI in the Enterprise: IT Approaches for Design, DevOps, Governance, Change Management, Blockchain, and Quantum Computing

by Eberhard Hechler Martin Oberhofer Thomas Schaeck

Your company has committed to AI. Congratulations, now what? This practical book offers a holistic plan for implementing AI from the perspective of IT and IT operations in the enterprise. You will learn about AI’s capabilities, potential, limitations, and challenges. This book teaches you about the role of AI in the context of well-established areas, such as design thinking and DevOps, governance and change management, blockchain, and quantum computing, and discusses the convergence of AI in these key areas of the enterprise.Deploying AI in the Enterprise provides guidance and methods to effectively deploy and operationalize sustainable AI solutions. You will learn about deployment challenges, such as AI operationalization issues and roadblocks when it comes to turning insight into actionable predictions. You also will learn how to recognize the key components of AI information architecture, and its role in enabling successful and sustainable AI deployments. And you will come away with an understanding of how to effectively leverage AI to augment usage of core information in Master Data Management (MDM) solutions.What You Will LearnUnderstand the most important AI concepts, including machine learning and deep learningFollow best practices and methods to successfully deploy and operationalize AI solutionsIdentify critical components of AI information architecture and the importance of having a planIntegrate AI into existing initiatives within an organizationRecognize current limitations of AI, and how this could impact your businessBuild awareness about important and timely AI researchAdjust your mindset to consider AI from a holistic standpointGet acquainted with AI opportunities that exist in various industriesWho This Book Is ForIT pros, data scientists, and architects who need to address deployment and operational challenges related to AI and need a comprehensive overview on how AI impacts other business critical areas. It is not an introduction, but is for the reader who is looking for examples on how to leverage data to derive actionable insight and predictions, and needs to understand and factor in the current risks and limitations of AI and what it means in an industry-relevant context.

Deploying and Managing a Cloud Infrastructure

by Salman Ul Haq Abdul Salam Zafar Gilani

Learn in-demand cloud computing skills from industry expertsDeploying and Managing a Cloud Infrastructure is an excellent resource for IT professionals seeking to tap into the demand for cloud administrators. This book helps prepare candidates for the CompTIA Cloud+ Certification (CV0-001) cloud computing certification exam. Designed for IT professionals with 2-3 years of networking experience, this certification provides validation of your cloud infrastructure knowledge.With over 30 years of combined experience in cloud computing, the author team provides the latest expert perspectives on enterprise-level mobile computing, and covers the most essential topics for building and maintaining cloud-based systems, including:Understanding basic cloud-related computing concepts, terminology, and characteristicsIdentifying cloud delivery solutions and deploying new infrastructureManaging cloud technologies, services, and networksMonitoring hardware and software performanceFeaturing real-world examples and interactive exercises, Deploying and Managing Cloud Infrastructure delivers practical knowledge you can apply immediately. And, in addition, you also get access to a full set of electronic study tools including:Interactive Test EnvironmentElectronic FlashcardsGlossary of Key TermsNow is the time to learn the cloud computing skills you need to take that next step in your IT career.

Deploying Enterprise Systems: How to Select, Configure, Build, Deploy, and Maintain a Successful ES in Your Organization

by David Mattson

This book focuses on topics that business managers and project teams in global enterprises need to understand and follow to successfully deploy an Enterprise System (ES) for their organization. It explains: Why this type of software product will appeal to global organizations with the promise to replace their older individual systems with a single integrated ES and how an ES allows companies to integrate their unique operations with a single system of many integrated modules that are designed to provide prebuilt and tested applications; New concepts, steps, risks, and methods that an organization should follow to successfully create and deploy an ES; and the top 10 reasons that ES projects fail and the practices to manage these risks. In addition, the book describes a new Implementation Model and methods to ensure success in deploying an ES across a firm with several divisions, international operations, product lines, and infrastructure. Essentially, this book: Describes, in non-technical terms, what business functions this new software product will improve Shows how an enterprise should use this software product to accomplish their goals to install and use this new technology to upgrade their older systems Explains what an organization’s management and project teams should avoid during selecting, planning, and implementing their ES to avoid common mistakes Describes the skills and experience (including IT and general management) the Project Manager must have to lead the project team(s) to implement this advanced system.

Deploying Microsoft 365 Teamwork: Expert tips, techniques, and practices to pass the MS-300 exam on the first attempt

by Aaron Guilmette

Prepare to achieve Microsoft 365 Certified Teamwork Administrator Associate certification by learning essential SharePoint Online concepts, and answering self-assessment questions to test your knowledge Key Features Cover essential topics based on the MS-300 exam, and learn with the help of detailed explanations Understand the collaborative features of SharePoint, both on-premises and as part of the Office 365 service Work through practice questions relating to business use cases for SharePoint Server and Online Book Description The Microsoft MS-300 exam is designed to test the knowledge and skills of administrators in deploying, configuring, and managing SharePoint Online, SharePoint Server, SharePoint Hybrid, OneDrive for Business, and Teams. This book offers up-to-date coverage of the important topics based on the MS-300 exam and features question answers and insider tips to help you prepare for certification. Written in a clear, succinct way, the book starts by helping you configure and manage SharePoint Online. You'll then delve into OneDrive for Business, right from managing users and groups, through to monitoring sharing and security. Further chapters will guide you through working with Teams, with an emphasis on managing identity authentication, resolving issues with the service, and even observing usage patterns. Later, you'll get up to speed with workload integrations, covering the Yammer business communications platform, before moving on to understand how to integrate Microsoft Stream with SharePoint, Teams, and Yammer. Finally, you'll learn to develop data governance and user adoption strategies. By the end of this book, you'll be well-versed with SharePoint Online and have learned the essential techniques and concepts you need to know in order to pass the MS-300 certification exam. What you will learn Discover the different Microsoft services and features that make up Office 365 Configure cloud services for your environment and extend your infrastructure's capabilities Understand site architecture, site settings, and hub settings in SharePoint Online Explore business connectivity services for view and access options in SharePoint Online Configure Yammer to integrate with Office 365 groups, SharePoint, and Teams Deploy SharePoint Online, OneDrive for Business, and Microsoft Teams successfully, including bots and connectors Who this book is for This book is for SharePoint developers, administrators, or those who want to explore Microsoft's teamwork solution platforms and pass the certification exam to boost their career as Microsoft Teamwork Administrator Associates. Anyone who has achieved Microsoft's entry-level admin certification and wants to progress to intermediate certification will also find this book useful.

Deploying Microsoft® Forefront® Protection 2010 for Exchange Server

by Yuri Diogenes Thomas W. Shinder

Get focused, real-world guidance for planning and implementing Forefront Protection for Exchange Server--and help protect enterprise e-mail from viruses, spam, phishing, and policy violations. Guided by key members of the Microsoft Forefront team, you'll delve into system components, features, and capabilities, and step through essential planning and design considerations. Deployment scenarios for Forefront Protection for Exchange include the Edge server, to inspect e-mail moving into and out of the corporate network; Exchange Hub Transport Server, to inspect e-mail moving within the organization; and mailbox servers, to inspect the contents of the user e-mail boxes and provide real-time protection against malicious attachments.

Deploying Microsoft® Forefront® Threat Management Gateway 2010

by Yuri Diogenes Thomas W. Shinder

Get the focused, scenario-based guidance you need to plan and deploy Forefront Threat Management Gateway (TMG) as your network perimeter firewall. The evolution of Microsoft ISA Server, Forefront TMG provides multiple layers of continuously updated protections against the latest Web-based threats, including URL filtering, antimalware inspection, and intrusion prevention. Led by two members of the Microsoft Forefront team, you'll get pragmatic, inside insights into system components and capabilities; identify software, hardware, and business requirements; and step through essential planning and design considerations, including network topology, remote access, publishing rules, performance, administration, and more.

Deploying Microsoft® Forefront® Unified Access Gateway 2010

by Yuri Diogenes Thomas W. Shinder

Plan, design, and deploy Forefront United Access (UAG) with insights straight from the Forefront team at Microsoft. Forefront Unified Access Gateway (UAG)--the evolution of the Microsoft Intelligent Application Gateway (IAG)--delivers a more robust and transparent solution for inbound access from anywhere. This pragmatic guide drills into system components and capabilities, identifies software and hardware requirements, and provides scenario-based advice for planning and design, including policy control and availability and scalability considerations. You'll learn how to plan and deploy an SSL VPN solution for your environment, and how to publish applications through Forefront UAG, including Microsoft Exchange Server, SharePoint® 2010, and Windows Server® 2008 Remote Desktop Services.

Deploying .NET Applications: A Lifecycle Guide

by Microsoft Corporation

Help ensure consistent success in deploying Microsoft® .NET Framework-based applications with expert guidance, recommendations, and technical information that span the deployment life cycle. Drawing on the knowledge of Microsoft development teams and the field experience of external consultants, this guide shares proven practices for planning, implementing, and maintaining .NET applications, including orchestration among project stakeholders, and technical issues unique to working in the .NET environment. Developers and IT professionals can use the guide whether they're just beginning their deployment planning, currently implementing a deployment strategy, or updating a solution that has already been rolled out to the production environment. PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers--delivering accurate, real-world information that's been technically validated and tested.

Deploying Node.js

by Sandro Pasquali

If you are an intermediate or advanced developer deploying your Node.js applications, then this book is for you. If you have already built a Node application or module and want to take your knowledge to the next level, this book will help you find your way.

Deploying OpenStack

by Ken Pepple

OpenStack was created with the audacious goal of being the ubiquitous software choice for building public and private cloud infrastructures. In just over a year, it's become the most talked-about project in open source. This concise book introduces OpenStack's general design and primary software components in detail, and shows you how to start using it to build cloud infrastructures. If you're a developer, technologist, or system administrator familiar with cloud offerings such as Rackspace Cloud or Amazon Web Services, Deploying OpenStack shows you how to obtain and deploy OpenStack software in a few controlled scenarios. Learn about OpenStack Compute (known as "Nova"), OpenStack Object Store ("Swift"), and OpenStack Image Service ("Glance") Understand common pitfalls in architecting, deploying, and implementing your cloud infrastructure with OpenStack Determine which version of the OpenStack code base best suits your deployment needs Define your deployment scenario and finalize key design choices Install Nova on a single node with either the StackOps distro or an Ubuntu package Be familiar with important configuration options and important administrative commands

Deploying Rails with Docker, Kubernetes and ECS

by Pablo Acuña

Learn how to use the power of Docker and Kubernetes to deploy your Rails applications easily and efficiently. Deploying Rails with Docker, Kubernetes and ECS shows you how to set up the project, push it to DockerHub, manage services and set up an efficient continuous integration environment. Every concept is clearly explained alongside a full Ruby on Rails application deployment. You’ll also learn how to deploy via Docker using Amazon EC2 Container Service.Docker and Kubernetes are increasing in popularity every day, but what if you want to leverage their benefits for your Rails application? This is the quick guide you need.What You Will LearnCreate a Rails API application using Rails 5 and PostgreSQL, and Dockerize itWrite and test templates to run the application with KubernetesCreate a Kubernetes cluster in Amazon Web Services and run yourInspect and troubleshoot problems in the clusterAutomatize the the whole deployment process with JenkinsWho This Book Is ForThis book is for anyone who wants to understand how to effectively deploy a Rails application using Docker and Kubernetes. You will need to understand Rails and have basic knowledge of what Docker and Kubernetes are used for.

Deploying Raspberry Pi in the Classroom

by Guy Hart-Davis

Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face. Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom. Teachers and IT administrators at schools will see how to set up the hardware and software swiftly on your own or with the help of your students. Step-by-step instructions and practical examples walk you through building your Raspberry Pi workstations and your network, managing the computers and the network, and troubleshooting any problems that arise. This book offers several points to involve your students through hands-on activities. These activities are designed to benefit your beginner and older or more able students alike. Make Deploying Raspberry Pi in the Classroom a part of you instructional library today. What you will learn Put an easily-manageable computer on each desk for students to learn Internet use and essential office software skills Image, configure, and plan a classroom deployment of Raspberry Pi computers Manage your classroom Raspberry Pi computers and keeping them up and running smoothly and efficiently Who this book is for Primary audience would be teachers and IT administrators at schools or colleges. It will also appeal to administrators at social clubs or organizations that provide less formal tuition or simply provide Internet access.

Refine Search

Showing 14,401 through 14,425 of 53,470 results