Browse Results

Showing 53,251 through 53,275 of 61,611 results

Integrating Serverless Architecture: Using Azure Functions, Cosmos DB, and SignalR Service

by Rami Vemula

Design, develop, build, and deliver an end-to-end serverless architecture by leveraging Azure services, frameworks, and tools. This book offers a holistic approach, guiding you through the design and development of a Twitter Bot application, while leveraging Azure Functions.Integrating Serverless Architecture begins with an overview of serverless computing and getting started with Azure Functions. Here, you will create a Twitter bot function which scans Twitter for the latest tweets and makes use of dependency injection. Further, you will learn about Azure Cosmos DB where you will cover its change feed mechanism and the repository pattern. You will create a Cosmos DB trigger-based tweet notifier function, which will broadcast the latest tweets to connected clients. You will explore the basics of Azure Service Bus and create a tweet scheduler function, which will prioritize different keywords for the Twitter bot function. Along the way, you will debug, deliver, and test the functions in the Azure environment.This book shows you how to secure your Azure Function secrets with the help of Azure Key Vault. To further your understanding of the technology, you will learn logging and exception handling in Azure Functions.Later in the book, you will build a Twitter bot web application by using ASP.NET Core and Materialize CSS, which will interact with several HTTP-based Azure Functions. The Twitter bot web application allows users to log in through the Twitter Identity Provider, subscribe to different keywords/hashtags, and browse the latest tweets based on subscriptions. You will get started with SignalR Service and integrate it with Azure Functions and web applications. Towards the end you will go through app service authentication on Azure Functions and discover how to configure continuous integration and delivery to Azure Functions. After reading this book, you will be able to understand the steps involved in design, development, and delivery of a workflow using Azure Functions.What You Will LearnDesign and develop a Twitter bot application using Azure Functions with Azure Web App Service as the front endLeverage Azure Cosmos DB as data storage and trigger notifications using its change feed mechanismStore and retrieve secrets from Azure Key VaultIntegrate Azure Functions with Azure SignalR Service to broadcast real-time messagesSecure Azure Functions by enabling Twitter identity authentication using built-in App Service authenticationBuild a continuous integration and continuous delivery pipeline for Azure Functions using Visual Studio Team Services (VSTS)Who This Book Is ForDevelopers, software engineers, and architects who design and manage infrastructures and build applications by leveraging Microsoft cloud services.

Mastering Hibernate

by Ramin Rad

Learn how to correctly utilize the most popular Object-Relational Mapping tool for your Enterprise application About This Book * Understand the internals of Hibernate and its architecture, and how it manages Entities, Events, Versioning, Filters, and Cache * Observe how Hibernate bridges the gap between object-oriented concepts and relational models * Discover how Hibernate can address architectural concerns such as Transaction, Database Multi-tenancy, Clustering, and Database Shards Who This Book Is For Mastering Hibernate is intended for those who are already using or considering using Hibernate as the solution to address the problem of Object Relational Mapping. If you are already using Hibernate, this book will help you understand the internals and become a power user of Hibernate. What You Will Learn * Understand the internals of a Hibernate session and how Entities are managed * Declare better mapping between entity classes and database tables * Manage entity associations and collections * Fetch data not just by entity ID, but also using HQL, Criteria Objects, Filters, and Native SQL * Observe the first and second level caches and find out how to manage them * Collect statistics and metrics data for further observation * Make your application work with multi-tenant databases In Detail Hibernate has been so successful since its inception that it even influenced the Java Enterprise Edition specification in that the Java Persistence API was dramatically changed to do it the Hibernate way. Hibernate is the tool that solves the complex problem of Object Relational Mapping. It can be used in both Java Enterprise applications as well as .Net applications. Additionally, it can be used for both SQL and NoSQL data stores. Some developers learn the basics of Hibernate and hit the ground quickly. But when demands go beyond the basics, they take a reactive approach instead of learning the fundamentals and core concepts. However, the secret to success for any good developer is knowing and understanding the tools at your disposal. It's time to learn about your tool to use it better This book first explores the internals of Hibernate by discussing what occurs inside a Hibernate session and how Entities are managed. Then, we cover core topics such as mapping, querying, caching, and we demonstrate how to use a wide range of very useful annotations. Additionally, you will learn how to create event listeners or interceptors utilizing the improved architecture in the latest version of Hibernate. Style and approach This book takes a close look at the core topics, and helps you understand the complex topics by showing you examples and giving you in-depth discussions.

Euro-Par 2019: 25th International Conference on Parallel and Distributed Computing, Göttingen, Germany, August 26–30, 2019, Proceedings (Lecture Notes in Computer Science #11725)

by Ramin Yahyapour

This book constitutes the proceedings of the 25th International Conference on Parallel and Distributed Computing, Euro-Par 2019, held in Göttingen, Germany, in August 2019. The 36 full papers presented in this volume were carefully reviewed and selected from 142 submissions. They deal with parallel and distributed computing in general, focusing on support tools and environments; performance and power modeling, prediction and evaluation; scheduling and load balancing; high performance architectures and compilers; data management, analytics and deep learning; cluster and cloud computing; distributed systems and algorithms; parallel and distributed programming, interfaces, and languages; multicore and manycore parallelism; theory and algorithms for parallel computation and networking; parallel numerical methods and applications; accelerator computing; algorithms and systems for bioinformatics; and algorithms and systems for digital humanities.

Modeling and Simulation with Compose and Activate

by Stephen L. Campbell Ramine Nikoukhah

This book provides a tutorial in the use of Compose and Activate, software packages that provide system modeling and simulation facilities. Advanced system modeling software provide multiple ways of creating models: models can be programmed in specialized languages, graphically constructed as block-diagrams and state machines, or expressed mathematically in equation-based languages. Compose and Activate are introduced in this text in two parts. The first part introduces the multi-language environment of Compose and its use for modeling, simulation and optimization. The second describes the graphical system modeling and optimization with Activate, an open-system environment providing signal-based modeling as well as physical system component-based modeling. Throughout both parts are applied examples from mechanical, biological, and electrical systems, as well as control and signal processing systems. This book will be an invaluable addition with many examples both for those just interested in OML and those doing industrial scale modeling, simulation, and design. All examples are worked using the free basic editions of Activate and Compose that are available.

AspectJ in Action: Enterprise AOP with Spring Applications

by Raminvas Laddad

To allow the creation of truly modular software, OOP has evolved into aspect-oriented programming. AspectJ is a mature AOP implementation for Java, now integrated with Spring.AspectJ in Action, Second Edition is a fully updated, major revision of Ramnivas Laddad's best-selling first edition. It's a hands-on guide for Java developers. After introducing the core principles of AOP, it shows you how to create reusable solutions using AspectJ 6 and Spring 3. You'll master key features including annotation-based syntax, load-time weaver, annotation-based crosscutting, and Spring-AspectJ integration. Building on familiar technologies such as JDBC, Hibernate, JPA, Spring Security, Spring MVC, and Swing, you'll apply AOP to common problems encountered in enterprise applications.This book requires no previous experience in AOP and AspectJ, but it assumes you're familiar with OOP, Java, and the basics of Spring."Clear, concisely worded, well-organized ... a pleasure to read."-From the Foreword by Rod Johnson, Creator of the Spring Framework"This book teaches you how to think in aspects. It is essential reading for both beginners who know nothing about AOP and experts who think they know it all."- Andrew Eisenberg, AspectJ Development Tools Project Committer"Ramnivas showcases how to get the best out of AspectJ and Spring."-Andy Clement, AspectJ Project Lead"One of the best Java books in years."-Andrew Rhine, Software Engineer, eSecLending"By far the best reference for Spring AOP and AspectJ."-Paul Benedict, Software Engineer, Argus Health Systems"Ramnivas expertly demystifies the awesome power of aspect-oriented programming."-Craig Walls, author of Spring in Action

5G Outlook – Innovations and Applications: Innovations And Applications (River Publishers Series In Communications Ser.)

by Ramjee Prasad

5G Outlook - Innovations and Applications is a collection of the recent research and development in the area of the Fifth Generation Mobile Technology (5G), the future of wireless communications. Plenty of novel ideas and knowledge of the 5G are presented in this book as well as divers applications from health science to business modeling. The authors of different chapters contributed from various countries and organizations. The chapters have also been presented at the 5th IEEE 5G Summit held in Aalborg on July 1, 2016. The book starts with a comprehensive introduction on 5G and its need and requirement. Then millimeter waves as a promising spectrum to 5G technology is discussed. The book continues with the novel and inspiring ideas for the future wireless communication usage and network. Further, some technical issues in signal processing and network design for 5G are presented. Finally, the book ends up with different applications of 5G in distinct areas. Topics widely covered in this book are: • 5G technology from past to present to the future• Millimeter- waves and their characteristics• Signal processing and network design issues for 5G• Applications, business modeling and several novel ideas for the future of 5G

6G Visions for a Sustainable and People-centric Future: From Communications to Services, the CONASENSE Perspective (River Publishers Series in Communications and Networking)

by Ramjee Prasad Rute C. Sofia

6G is currently under definition, being often addressed from a plain telecommunications perspective as an evolutionary paradigm that represents an extension of 5G. Having as a horizon 2030, 6G initiatives are being deployed across the globe to further ignite the development of 6G services. At its philosophical core, 6G embodies the "human in the loop" principle. The research effort being developed towards 6G requires an interdisciplinary approach that ignites discussion across different key technological sectors, ranging from communications up to services and business cases. The contributions of this book to research in the field concern an evolutionary and interdisciplinary design of 6G as a paradigm that can be addressed by working together four different computational areas: communications; satellites and navigation; sensing; services. The book is derived from initial brainstorming that was developed during the 11th CONASENSE Symposium held in October 2021 in fortiss, Munich, Germany. Several international experts contribute to an overview of 6G key challenges, new networking trends and challenges to be overcome, and advanced 6G services. The book starts with a perspective on 6G challenges and use-cases beyond the 2030 horizon, to then continue to address the role of non-terrestrial networks and cognitive, service-centric satellite networks in future 6G services. Still with focus on 6G adaptive networking, the book continues with a debate on the need to integrate social awareness based on an interdisciplinary approach in network operations. Then, specific examples of advanced services (quantum imaging and holography; localization of the Internet of remote things) are discussed. The book is, therefore, intended to assist in developing critical thinking to back up novel networking, applications, and services towards 6G.

Cyber Security: The Lifeline of Information and Communication Technology (Springer Series in Wireless Technology)

by Ramjee Prasad Vandana Rohokale

This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are growing exponentially. This book discusses a variety of problems and solutions including: • Internet of things and Machine to Machine Communication; • Infected networks such as Botnets; • Social media and networking; • Cyber Security for Smart Devices and Smart Grid • Blockchain Technology and • Artificial Intelligence for Cyber Security Given its scope, the book offers a valuable asset for cyber security researchers, as well as industry professionals, academics, and students.

Globalization of Mobile and Wireless Communications

by Sudhir Dixit Ramjee Prasad Tero Ojanpera Richard Van Nee

Globalization of Mobile and Wireless Communications is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and performed research work of leading experts in the field. Topics of discussion are related but not limited to spectrum-efficient radio interface technologies, enabling technologies for reconfigurability, wireless sensor networks, cognitive networks, coherent wireless transmission, algorithmic design, middleware for novel services and applications. The material has been edited to provide a vision for the future of mobile and wireless, towards a dynamic communication system that breaks down the barriers between communications means; and evolves and integrates business models and culture to match the technological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined.

My personal Adaptive Global NET (MAGNET)

by Ramjee Prasad

The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, finds in this book the first confirmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the first work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book reflects how the project itself has been structured. My personal Adaptive Global NET (MAGNET) summarize all the steps taken from the introduction of a user-centric perspective until the implementation of PN-Fs (Federation of Personal Networks), outlining the applications and commercialisations of the new concepts carried out of the project. The intent of My personal Adaptive Global NET (MAGNET) is to disseminate the concept of PN and PN-F along with the activities and achievement carried out in MAGNET/MAGNET Beyond to encourage new project and academic initiatives toward personalized, ubiquitous communications.

Land Acquisition, Industrialization and Livelihoods: A case study on JSW Bengal Steel Plant

by Ramkrishna Maiti Sumanta Prakash Shee

This book provides an assessment of the impacts of human intervention on the natural environment and peoples' livelihoods through land-use conversion due to industrialization. Problems of land acquisition and the execution thereof have varying consequences that depend on the specific geographical as well as socio-political contexts in which they occur. This book covers a specific study of JSW Bengal Steel Ltd., which in 2014 planned to set up a 10.0 million ton per year integrated steel plant at the upper catchment of Sundra basin, the tributary of the Shilabati that ultimately pours to the river Rupnarayan, located at Salboni Block of Paschim Medinipur, West Bengal, India. The project was ultimately put on hold, but caused many lingering environmental and socioeconomic problems due to the acquisition of formerly productive lands. The book examines this case to generate a database on the different aspects of land acquisition and its negative impacts on the geomorphology and hydrological of non-timber forest products, agricultural impacts resulting in livelihood changes, policy dimensions of land acquisition, and the impacts of delays in project implementation through a comparative analysis between projects-affected areas and non-project areas. The book will appeal to environmental managers and industry workers, as well as students and researchers in environmental economics, anthropology, and human geography.

PrimeFaces Blueprints

by Sudheer Jonna Ramkumar Pillai

If you are a Java developer with experience of frontend UI development, and want to take the plunge to develop stunning UI applications with the most popular JSF framework, PrimeFaces, then this book is for you. For those with entrepreneurial aspirations, this book will provide valuable insights into how to utilize successful business models.

Quantum Game Simulation (Emergence, Complexity and Computation #36)

by Ramon Alonso-Sanz

This book addresses two disciplines that have traditionally occupied completely different realms: quantum information and computation, and game theory. Helping readers connect these fields, it appeals to a wide audience, including computer scientists, engineers, mathematicians, physicists, biologists or economists. The book is richly illustrated and basic concepts are accessible to readers with basic training in science. As such it is useful for undergraduate students as well as established academicians and researchers. Further, the didactic and tutorial-like style makes it ideal supplementary reading for courses on quantum information and computation, game theory, cellular automata and simulation.

Multi-Objective Optimization in Computer Networks Using Metaheuristics

by Yezid Donoso Ramon Fabregat

Metaheuristics are widely used to solve important practical combinatorial optimization problems. Many new multicast applications emerging from the Internet-such as TV over the Internet, radio over the Internet, and multipoint video streaming-require reduced bandwidth consumption, end-to-end delay, and packet loss ratio. It is necessary to design an

Hacking With Kali Linux: A Step By Step Guide For You To Learn The Basics Of Cybersecurity And Hacking (Cybersecurity And Hacking)

by Ramon Nastase

This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do in order to protect yourself from all kind of hacking techniques.

The Facebook Guide to Small Business Marketing

by Ramon Ray

The guide for marketing a small business on Facebook The number one social networking site offers the opportunity to reach more than 350 million registered users with your advertising message. Owners of small and local businesses will benefit from these tips and best practices provided by Facebook insiders. Learn new ways to attract customers, create a business profile, and take advantage of Facebook's many marketing features. With more than 350 million registered users, Facebook opens a worldwide forum for small businesses that were once dependent on local traffic alone This guide to small business marketing on Facebook, is packed with information from Facebook's staff Guides you through creating a profile for your business, taking advantage of Facebook's unique marketing features, following best practices, and getting the best return on your investment Packed with insider tips and creative marketing ideas If you have a small or local business, you can't go wrong with the marketing advice in The Facebook Guide to Small Business Marketing.

Azure Arc Systems Management: Governance and Administration of Multi-cloud and Hybrid IT Estates

by Ramona Maxwell

This book is for enterprise and solution architects, systems integrators, and anyone managing enterprise-scale, multi-cloud or hybrid IT landscapes. The book examines usage of Azure Arc for governance and systems management with security as an overarching theme. It is not an implementation manual but provides high-level guidance on best practices and links to detailed guidance. It offers insight into the types of problems that Azure Arc can solve, and will help you determine whether it is the right choice for your organization.Modern enterprise computing is an astonishing luxury land filled with never-before-seen hosting options on commercial clouds as well as advancements in the areas of private cloud and edge computing. The challenge with this plethora of choices is to manage and coordinate large IT estates which may bridge multiple public clouds and private datacenters. Visibility of operations to achieve security, cost control, and efficiency is often difficult to achieve. Data management is another area which is particularly fraught with complexity and risk.Industry leaders have made serious investments in the design of control plane products to address these gaps with varying approaches and degrees of success. Azure Arc is designed to provide a consolidated view of assets such as databases and Kubernetes installations across major cloud providers, edge locations, and customer-owned datacenters. It facilitates deployment of new infrastructure, patching and upgrades, monitoring, policy, and security controls for assets living on-premises or in competitor clouds as if they were native to Azure. While competitive products exist, at this writing none have the flexibility and reach of Arc to effectively manage very large hybrid estates.Readers will appreciate the author’s approach of walking through typical enterprise computing scenarios while listing industry- or scenario-specific challenges that are difficult to overcome, and then reinforcing understanding by restating the challenges while explaining how Azure Arc can be utilized to remediate them.What You Will LearnDiscover what Azure Arc is, the types of problems it is intended to solve, and how to map your requirements to its capabilitiesStreamline and secure large Arc-enabled Kubernetes deployments via modern GitOps practicesUse Azure Arc to consolidate management across a broad range of hybrid and multi-cloud ecosystems through policy-driven governanceApply monitoring and automation to defend systems against security threats that are beyond the ability of manual administration to deflectUncover practical guidance that is written in a way that makes basic precepts approachable to non-technical stakeholders and then branches out into areas that will offer advanced readers new insights and consolidate a broad topic into a usable directionWho This BookIs ForEnterprise and solution architects, systems integrators, and anyone else looking to solve enterprise-scale administration problems across a multi-cloud or hybrid architecture

Mobile and Wireless Communications with Practical Use-Case Scenarios

by Ramona Trestian

The growing popularity of advanced multimedia-rich applications along with the increasing affordability of high-end smart mobile devices has led to a massive growth in mobile data traffic that puts significant pressure on the underlying network technology. However, no single network technology will be equipped to deal with this explosion of mobile data traffic. While wireless technologies had a spectacular evolution over the past years, the present trend is to adopt a global heterogeneous network of shared standards that enables the provisioning of quality of service and quality of experience to the end-user. To this end, enabling technologies like machine learning, Internet of Things and digital twins are seen as promising solutions for next generation networks that will enable an intelligent adaptive interconnected environment with support for prediction and decision making so that the heterogeneous applications and users' requirements can be highly satisfied. The aim of this textbook is to provide the readers with a comprehensive technical foundation of the mobile communication systems and wireless network design, and operations and applications of various radio access technologies. Additionally, it also introduces the reader to the latest advancements in technologies in terms of Internet of Things ecosystems, machine learning and digital twins for IoT-enabled intelligent environments. Furthermore, this textbook also includes practical use-case scenarios using Altair WinProp Software as well as Python, TensorFlow and Jupyter as support for practice-based laboratory sessions.

Quantum Key Distribution: An Introduction with Exercises (Lecture Notes in Physics #988)

by Ramona Wolf

This textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk.The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required.

Simulating Science: Computer Simulations as Scientific Instruments (Synthese Library #479)

by Ramón Alvarado

This book provides a philosophical framework to understand computer simulations as scientific instruments. This is in sharp contrast to existing philosophical approaches on the subject, which have historically understood computer simulations as either formal abstractions or as broadly construed empirical practices. In order to make its case, the volume contains a thorough examination of conventional philosophical approaches as well as their respective limitations. Yet, also, unlike other accounts of computer simulations from the perspective of the philosophy of science, this book incorporates insights from the philosophy of technology and the history of science. Hence, the book offers philosophers of science, technologists and other researchers interested in the topic, a thorough overview of the philosophical issues regarding the design, development and deployment of computer simulations in science and science-based policy making.

RedakBot

by Ramón Kadel

Der Journalismus ist im Wandel – nicht nur aufgrund des Medienstrukturwandels durch Digitalisierung und Internet, sondern auch aufgrund neuer Technologien, die erstmals sogar ein Stück weit die Existenzberechtigung des Berufsbilds infrage stellen. Werden Journalisten also durch künstliche Intelligenz ersetzt? Nein! Denn KI im Journalismus ist ein „Frenemy“: Freund und Feind zugleich. Freund, wenn man sich auf den KI-Journalismus vorbereitet, Feind für diejenigen, die ihr Mindset nicht ändern können und die neuen Technologien ausschließlich als Bedrohung sehen. Mit der Lektüre dieses Buches sollen Journalisten und Redakteure sowie Volontäre und Studenten im Bereich der Kommunikationswissenschaften konkrete Ideen im Kopf haben, wie sie sich auf die Zeit des KI-Journalismus erfolgreich vorbereiten. Es regt an, innovativ zu sein, und von den neuen Möglichkeiten, die redaktionelle Bots bieten, zu partizipieren – und schließlich zu profitieren. Die Frage ist nicht, ob „RedakBots“ unsere Arbeitswelt verändern, sondern wann dies passiert. Das Buch bereitet darauf vor.

Advances in Cryptology -- CRYPTO 2012: 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Lecture Notes in Computer Science #7417)

by Reihaneh Safavi-Naini Ran Canetti

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Architectural, Energy and Information Engineering: Proceedings of the 2015 International Conference on Architectural, Energy and Information Engineering (AEIE 2015), Xiamen, China, May 19-20, 2015

by Ran Chen Wen-Pei Sung

This proceedings volume brings together selected peer-reviewed papers presented at the 2015 International Conference on Architectural, Energy and Information Engineering (AEIE 2015), held July 15-16, 2015 in Hong Kong, China. The proceedings are divided into two parts, Architectural, Energy and Environmental Engineering and Information Enginee

Inbound Marketing and SEO: Insights from the Moz Blog

by Rand Fishkin Thomas Høgenhaven

As the SEO industry undergoes a shift and Google continues to change its algorithm, successful SEO practitioners need to increase their knowledge of a wide range of inbound marketing channels. The Moz Blog is the go-to place for the latest thought leadership on the shifts in inbound marketing and SEO. This book cherry-picks and updates the most popular articles for the key inbound marketing disciplines, mixing them with some brand-new essays. Rand Fishkin and Thomas Høgenhaven have produced a masterfully edited anthology packed with information to provide the best possible insight into these marketing channels. The popular Moz blog is a top resource for cutting-edge information on SEO techniques: Co-compiled and co-edited by Moz CEO and co-founder Rand Fishkin, this book is an anthology of articles selected to provide the best possible overview of current SEO and inbound marketing techniques and trends Covers channels of online marketing, content marketing, social media, outreach, conversion rate optimization, and analytics, as well as search engine optimization Focuses on leveraging existing platforms like social media sites and community for inbound marketing success Inbound Marketing and SEO is a must-have for marketers in today's online world.

Mastering UNIX Shell Scripting Second Edition

by Randal K. Michael

UNIX expert Randal K. Michael guides you through every detail of writing shell scripts to automate specific tasks. Each chapter begins with a typical, everyday UNIX challenge, then shows you how to take basic syntax and turn it into a shell scripting solution. Covering Bash, Bourne, and Korn shell scripting, this updated edition provides complete shell scripts plus detailed descriptions of each part. UNIX programmers and system administrators can tailor these to build tools that monitor for specific system events and situations, building solid UNIX shell scripting skills to solve real-world system administration problems.

Refine Search

Showing 53,251 through 53,275 of 61,611 results