123 resultater (0,29328 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Snowflake Access Control - Jessica Megan Larson - Bog - APress - Plusbog.dk

Snowflake Access Control - Jessica Megan Larson - Bog - APress - Plusbog.dk

Understand the different access control paradigms available in the Snowflake Data Cloud and learn how to implement access control in support of data privacy and compliance with regulations such as GDPR, APPI, CCPA, and SOX. The information in this book will help you and your organization adhere to privacy requirements that are important to consumers and becoming codified in the law. You will learn to protect your valuable data from those who should not see it while making it accessible to the analysts whom you trust to mine the data and create business value for your organization. Snowflake is increasingly the choice for companies looking to move to a data warehousing solution, and security is an increasing concern due to recent high-profile attacks. This book shows how to use Snowflake's wide range of features that support access control, making it easier to protect data access from the data origination point all the way to the presentation and visualization layer.Reading this book helps you embrace the benefits of securing data and provide valuable support for data analysis while also protecting the rights and privacy of the consumers and customers with whom you do business. What You Will LearnIdentify data that is sensitive and should be restrictedImplement access control in the Snowflake Data CloudChoose the right access control paradigm for your organizationComply with CCPA, GDPR, SOX, APPI, and similar privacy regulationsTake advantage of recognized best practices for role-based access controlPrevent upstream and downstream services from subverting your access controlBenefit from access control features unique to the Snowflake Data CloudWho This Book Is ForData engineers, database administrators, and engineering managers who wantto improve their access control model; those whose access control model is not meeting privacy and regulatory requirements; those new to Snowflake who want to benefit from access control features that are unique to the platform; technology leaders in organizations that have just gone public and are now required to conform to SOX reporting requirements

DKK 434.00
1

Industrial Robotics Control - Fabrizio Frigeni - Bog - APress - Plusbog.dk

Industrial Robotics Control - Fabrizio Frigeni - Bog - APress - Plusbog.dk

Build a complete control system for industrial robots, learning all the theory and practical tips from the perspective of an automation engineer. Explore the details of kinematics, trajectories, and motion control, and then create your own circuit board to drive the electric motors and move the robot. After covering the theory, readers can put what they''ve learned in practice by programming a control firmware for the robot. Each software component is described in detail, from the HMI and the interpreter of motion commands, to the servo loop controller at the core of each servo drive. In particular, the author presents the commutation algorithm and the servo loop controller for brushless synchronous motors, which are typically employed in robotics applications. Readers will also learn how to calibrate the robot, commission it to the end-user, and design a digital twin to test and monitor the entire workcell in a safe simulated environment. Finally, the book delves into hardware, covering how to select and use electric motors and encoders, how to build servo drives and motion controllers, and how to design your own PCBs. Different electronic components and their application circuits are analyzed, showing the advantages and drawbacks of each. By the end of the book you should be able to design and build electronic boards and write their core firmware to control any kind of industrial robot for all sorts of different practical applications. What you''ll learn - Solve kinematics models of robots - Generate safe paths and optimal motion trajectories - Create a digital twin of your robot to test and monitor its movements - Master the electronic commutation and closed-loop control of brushless motors - Design electronics circuit boards for motion applications Who This Book Is For Robotics engineers (and students) who want to understand the theory behind the control of robotics arms, from the kinematic models of their axes to the electronic commutation of their motors. Some basic calculus and linear algebra is required for the understanding of the geometrical framework, while some electronics foundations are helpful to grasp the details of the circuits design.

DKK 385.00
1

Keeping Your AI Under Control - Anand Tamboli - Bog - APress - Plusbog.dk

Keeping Your AI Under Control - Anand Tamboli - Bog - APress - Plusbog.dk

Much of our daily lives intertwine with artificial intelligence. From watching movies recommended by our entertainment streaming service, to interacting with customer service chatbots, to autotagging photos of friends in our social media apps, AI plays an invisible part in enriching our lives. While AI may be seen as a panacea for enterprise advancement and consumer convenience, it is still an emerging technology, and its explosive growth needs to be approached with proper care and preparation. How do we tackle the challenges it presents, and how do we make sure that it does precisely what it is supposed to do? In Keeping Your AI Under Control , author Anand Tamboli explores the inherent risk factors of the widespread implementation of artificial intelligence. The author delves into several real-life case studies of AI gone wrong, including Microsoft''s 2016 chatbot disaster, Uber''s autonomous vehicle fatally wounding a pedestrian, and an entire smart home in Germany dangerously malfunctioning because of one bad lightbulb. He expertly addresses the need to challenge our current assumptions about the infallibility of technology. The importance of data governance, rigorous testing before roll-out, a chain of human accountability, ethics, and much more are all detailed in Keeping Your AI Under Control . Artificial intelligence will not solve all of our problems for good, but it can (and will) present us with new solutions. These solutions can only be achieved with proper planning, continued maintenance, and above all, a foundation of attuned human supervision. What You Will Learn - Understand various types of risks involved in developing and using AI solutions - Identify, evaluate, and quantify risks pragmatically - Utilize AI insurance to support residual risk management Who This Book Is For Progressive businesses that are on a journey to use AI (buyers/customers), technical and financial leaders in AI solution companies (solution vendors), AI system integrators (intermediaries), project and technology leads of AI deployment projects, technology purchase decision makers, CXOs and legal officers (solution users).

DKK 307.00
1

Hands-on Azure Repos - Pushpa Herath - Bog - APress - Plusbog.dk

Android Apps Security - Sheran Gunasekera - Bog - APress - Plusbog.dk

Advanced Home Automation Using Raspberry Pi - Rishabh Jain - Bog - APress - Plusbog.dk

Advanced Home Automation Using Raspberry Pi - Rishabh Jain - Bog - APress - Plusbog.dk

Build a versatile home automation system from scratch. There are many ways of controlling home appliances with your smartphones, voice, gestures, etc. This book dives into the many options for for communicating with appliances wirelessly and we''ll discuss and implement the leading protocols in the field. In first few chapters, you will develop a basic understanding of the Raspberry Pi and how one can control it wirelessly from anywhere in the world. Then you''ll get to know about the local server for your home automation projects and control the Raspberry Pi GPIOs using smartphone and web apps. Every appliance will be able to talk to each other, as well, with the help of mesh networking, which you''ll learn to implement. The user interface is also an important aspect of handling all the appliances, so you''ll create your own user dashboard using OpenHAB. From there, you can monitor all the appliances and sensor data in one environment. Next, implement your own custom voice assistant to control your appliances and perform basic tasks like playing music, checking weather, etc. You''ll also integrate a smart door bell into your system using image processing so that you can restrict an unknown person''s entry. Finally, we''ll combine all the knowledge that we have learned to make a fully versatile home automation project controlled using voice, gestures, and image processing. Throughout this whole project, Raspberry Pi will be your master server or node and other devices will be connected wirelessly using wi-fi/Bluetooth modules. Create a smart home with fully custom interfaces to do exactly what you need! What You''ll Learn - Create a user interface using openHAB - Implement the MQTT protocol - Install Alexa and Google Home API to control appliances wirelessly Who This Book Is For Enthusiasts with a working knowledge of the Raspberry Pi, electronic engineering, and Python programming. This book will also interest hobbyists and students from Computer Science or related disciplines.

DKK 476.00
1

Snowflake Security - Ben Herzberg - Bog - APress - Plusbog.dk

Snowflake Security - Ben Herzberg - Bog - APress - Plusbog.dk

This book is your complete guide to Snowflake security, covering account security, authentication, data access control, logging and monitoring, and more. It will help you make sure that you are using the security controls in a right way, are on top of access control, and making the most of the security features in Snowflake. Snowflake is the fastest growing cloud data warehouse in the world, and having the right methodology to protect the data is important both to data engineers and security teams. It allows for faster data enablement for organizations, as well as reducing security risks, meeting compliance requirements, and solving data privacy challenges. There are currently tens of thousands of people who are either data engineers/data ops in Snowflake-using organizations, or security people in such organizations. This book provides guidance when you want to apply certain capabilities, such as data masking, row-level security, column-level security, tackling rolehierarchy, building monitoring dashboards, etc., to your organizations. What You Will LearnImplement security best practices for SnowflakeSet up user provisioning, MFA, OAuth, and SSOSet up a Snowflake security modelDesign roles architectureUse advanced access control such as row-based security and dynamic maskingAudit and monitor your Snowflake Data CloudWho This Book Is ForData engineers, data privacy professionals, and security teams either with security knowledge (preferably some data security knowledge) or with data engineering knowledge; in other words, either “Snowflake people” or “data people” who want to get security right, or “security people” who want to make sure that Snowflake gets handled right in terms of security

DKK 391.00
1

Beginning Perl Programming - William "bo" Rothwell - Bog - APress - Plusbog.dk

Beginning Perl Programming - William "bo" Rothwell - Bog - APress - Plusbog.dk

Get started with Perl 5 and learn the important core concepts of Perl programming, such as variables, flow control, expressions, and I/O. Additionally, this book covers pattern matching and shows that Perl is extremely flexible and powerful, and that it isn''t afraid of the cloud. After reading and using this book, you''ll be able to start writing your own powerful scripts to solve many web and programming problems. This is a book for those of us who believed that we didn''t need to learn Perl, and now we know it is more ubiquitous than ever. You''ll see that Perl has evolved into a multipurpose, multiplatform language present absolutely everywhere: heavy-duty web applications, the cloud, systems administration, natural language processing, and financial engineering. This book provides valuable insight into Perl''s role regarding all of these tasks and more giving you a great start in your Perl programming adventure. What You Will Learn - Perform operations on scalar values - Use scalar, array, and associative array variables - Work with flow control statements such as if, unless, while, until, for, and foreach - Read and write directly to files with file handles - Use conditional expressions such as numeric and string comparison, regular expressions, file testing, and Perl statements - Format output with format statements - Search for and replace sub-strings within a string using regular expressions - Master Perl utilities such as split, join, index and more - Control the file system and processes from within a Perl script - Build functions for tasks including handling the scope of variables - Import existing modules into your Perl script Who This Book Is For Those who are new to Perl.

DKK 476.00
1

Rational Cybersecurity for Business - Dan Blum - Bog - APress - Plusbog.dk

Rational Cybersecurity for Business - Dan Blum - Bog - APress - Plusbog.dk

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn - Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy - - Develop a consistent accountability model, information risk taxonomy, and risk management framework - - Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend - - Tailor a control baseline to your organization''s maturity level, regulatory requirements, scale, circumstances, and critical assets - - Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more - Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities - Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger - - Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan - Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business

DKK 385.00
1

MATLAB Machine Learning Recipes - Stephanie Thomas - Bog - APress - Plusbog.dk

MATLAB Machine Learning Recipes - Stephanie Thomas - Bog - APress - Plusbog.dk

Harness the power of MATLAB to resolve a wide range of machine learning challenges. This new and updated third edition provides examples of technologies critical to machine learning. Each example solves a real-world problem, and all code provided is executable. You can easily look up a particular problem and follow the steps in the solution. This book has something for everyone interested in machine learning. It also has material that will allow those with an interest in other technology areas to see how machine learning and MATLAB can help them solve problems in their areas of expertise. The chapter on data representation and MATLAB graphics includes new data types and additional graphics. Chapters on fuzzy logic, simple neural nets, and autonomous driving have new examples added. And there is a new chapter on spacecraft attitude determination using neural nets. Authors Michael Paluszek and Stephanie Thomas show how all of these technologies allow you to build sophisticated applications to solve problems with pattern recognition, autonomous driving, expert systems, and much more. What You Will LearnWrite code for machine learning, adaptive control, and estimation using MATLABUse MATLAB graphics and visualization tools for machine learningBecome familiar with neural netsBuild expert systemsUnderstand adaptive controlGain knowledge of Kalman FiltersWho This Book Is ForSoftware engineers, control engineers, university faculty, undergraduate and graduate students, hobbyists.

DKK 476.00
1

Tactical Wireshark - Kevin Cardwell - Bog - APress - Plusbog.dk

Tactical Wireshark - Kevin Cardwell - Bog - APress - Plusbog.dk

Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these conversations to identify the IP and TCP information of interest. Next, you''ll be walked through a review of the different methods malware uses, from inception through the spread across and compromise of a network of machines. The process from the initial "click" through intrusion, the characteristics of Command and Control (C2), and the different types of lateral movement will be detailed at the packet level. In the final part of the book, you''ll explore the network capture file and identification of data for a potential forensics extraction, including inherent capabilities for the extraction of objects such as file data and other corresponding components in support of a forensics investigation. After completing this book, you will have a complete understanding of the process of carving files from raw PCAP data within the Wireshark tool. What You Will Learn - Use Wireshark to identify intrusions into a network - Exercise methods to uncover network data even when it is in encrypted form - Analyze malware Command and Control (C2) communications and identify IOCs - Extract data in a forensically sound manner to support investigations - Leverage capture file statistics to reconstruct network events Who This Book Is For Network analysts, Wireshark analysts, and digital forensic analysts.

DKK 519.00
1

Beginning Git and GitHub - Mariot Tsitoara - Bog - APress - Plusbog.dk

Beginning Git and GitHub - Mariot Tsitoara - Bog - APress - Plusbog.dk

Learn the fundamentals of version control through step-by-step tutorials that will teach you the ins-and-outs of Git. This book is your complete guide to how Git and GitHub work in a professional team environment. Divided into three parts - Version Control, Project Management and Teamwork - this book reveals what waits for you in the real world and how to resolve the problems you may run into. Once past the basics of Git, you''ll see how to manage a software project, and finally how to utilize Git and GithHub to work effectively as a team. You''ll examine how to plan, follow and execute a project with GitHub, and then apply those concepts to real-world situations. Workaround the pitfalls that most programmers fall into when driving a project with Git by using proven tactics to avoid them. You will also be taught the easiest and quickest ways to resolve merge conflicts. A lot of modern books on Git don''t go into depth about non-technical topics. Beginning Git and GitHub will help you cover all the bases right at the start of your career. What You''ll Learn - Review basic and advanced concepts of Git - Apply Project Management skills using GitHub - Solve conflicts or, ideally, avoid them altogether - Use advanced concepts for a more boosted workflow Who This book Is For New developers, developers that have never worked in a team environment before, developers with basic knowledge of Git or GitHub, or anyone who works with text documents.

DKK 446.00
1

Beginning Breadboarding - Jennifer Fox - Bog - APress - Plusbog.dk

Beginning Breadboarding - Jennifer Fox - Bog - APress - Plusbog.dk

Using fun, hands-on projects, learn what a circuit is and how it works! This book uses a common tool in electronics, the breadboard, to build your way to an understanding of circuits, circuit components, and the basics of computers. You''ll master current, voltage, and resistance. With that you can control outputs like lights and motors as well as inputs like switches and sensors. You''ll also discover the difference between analog and digital electrical signals while studying both electricity and computers. Dabble in electrical engineering, whether you are interested in building things with electronics or learning to program simple, physical systems. Build your own electronic projects to learn how electronics work. And also how computers store information and process requests. You''ll work with simple, low-cost tools like conductive tape before developing up to working with breadboards and discovering the components to build more complex systems. With Beginning Breadboarding , makers of all ages and backgrounds can learn to build real-life physical computing systems and projects. Have fun building something with tangible results while learning all the theory you need to make new projects of your own! What You''ll Learn - Rapidly prototype circuits with breadboards - Use common components to make simple electronic devices - Share electrical energy and control the flow of electricity through components Who This Book Is For Makers, seeking a fun, hands-on introduction to technology, electronics, and computers. Those who have little to no knowledge of the subject, but want to learn electronics or know more about computers.

DKK 519.00
1

Beginning AWS Security - Tasha Penwell - Bog - APress - Plusbog.dk

Beginning AWS Security - Tasha Penwell - Bog - APress - Plusbog.dk

Improve cloud security within your organization by leveraging AWS’s Shared Responsibility Model, Well-Architected Framework, and the Cloud Adoption Framework. This book will show you to use these tools to make the best decisions for securing your cloud environment. You’ll start by understanding why security is important in the cloud and then review the relevant services offered to meet an organization’s needs. You’ll then move on to the finer points of building a secure architecture and take a deep look into the differences of responsibility of managed services and those that allow customers more control. With multiple AWS services available, organizations must weigh the tradeoffs between those that provide granular control (IaaS), a managed service (PaaS), delivering applications remotely over the internet instead of locally on machines (SaaS). This book will help you to identify the appropriate resources and show you how to implement them to meet an organization’s business, technical, and security perspective in the Cloud Adoption Framework. Finally, you'll see how organizations can launch a secure and optimized cloud architecture and use monitoring tools to be proactive in security measures. With Beginning AWS Security, you'll understand frameworks, models, and the services needed to build a secure architecture. You will:Review the similarities and differences between cloud and traditional computing. See how security changes when using on-site, hybrid, and cloud modelsDevelop an understanding that security is not “one and done” Reinforce the need for updates and monitoring as a continued part of AWS securityWho This Book Is ForCloud computing architects, security professionals, security engineers, and software professionals interested in Cloud security.

DKK 290.00
1

Intermediate C Programming for the PIC Microcontroller - Hubert Henry Ward - Bog - APress - Plusbog.dk

Intermediate C Programming for the PIC Microcontroller - Hubert Henry Ward - Bog - APress - Plusbog.dk

Delve into the exciting world of embedded programming with PIC microcontrollers in C. The key to learning how to program is to understand how the code works - and that is what you''ll learn here. Following C Programming for the PIC Microcontroller , this book continues exploring the coding required to control the PIC microcontroller and can be used as a standalone single reference, or paired with the previous title to enhance your programming skills. You''ll see how to control the position of a servo motor and use the compare aspect of the CCP module to create a square wave with varying frequency. You''ll also work with the capture aspect of the CCP to determine the frequency of a signal inputted to the PIC and use external and internal interrupts. This book breaks down the programs with line-by-line analysis to give you a deep understanding of the code. After reading it you''ll be able to use all three aspects of the Capture, Compare and PWM module; work with different types of interrupts; create useful projects with the 7 segment display; and use the LCD and push button keyboard. What You''ll Learn - Create a small musical keyboard with the PIC - Manage a stepper motor with the PIC - Use the main features of the MPLABX IDE - Interface the PIC to the real world - Design and create useful programs based around the PIC18F4525 Who This Book Is For Engineering students and hobbyist who want to try their hand at embedded programming the PIC micros.

DKK 509.00
1

Build Your Own Car Dashboard with a Raspberry Pi - Joseph Coburn - Bog - APress - Plusbog.dk

Build Your Own Car Dashboard with a Raspberry Pi - Joseph Coburn - Bog - APress - Plusbog.dk

Create your own car engine control unit (ECU) with a simple Raspberry PI while building the necessary skills to produce future more advanced projects. Once you''ve worked through the projects in this book, you''ll have a smart car and the coding knowledge needed to develop advanced hardware and software projects. Start by understanding how the Pi works, and move on to how to build hardware projects, use the GPIO pins, and install the system. Then add to that a solid understanding of software development principles and best practices, along with a good grasp of Python (v3.6+) and Python/software best practices. More than just how to code in Python, you''ll learn what it takes to write production grade software, defensive code, testing, deployments, version control, and more. Internalize industry best practices while going further with valuable software development techniques such as defensive programming. The concepts introduced are essential to ensuring that software can function under unexpected circumstances. Can you imagine what would happen if your mobile phone could not cope with a call from an unknown number, or you had to set you microwave in increments of 6 seconds? While testing avoids edge cases such as these, defensive programming is one of the building blocks of software development. What You''ll Learn - Hone test driven development in Python skills - Debug software and hardware project installations - Work with the GPIO ports of the Pi to feed your software real-world hardware information Who This Book Is For People who like working on cars and want to learn Raspberry Pi and software development but don’t know where to start.

DKK 495.00
1

Learn Electronics with Raspberry Pi - Stewart Watkiss - Bog - APress - Plusbog.dk

Learn Electronics with Raspberry Pi - Stewart Watkiss - Bog - APress - Plusbog.dk

Updated for the recent Raspberry Pi boards, including the Raspberry Pi 4, this new edition offers an all new digital logic circuits project, explaining the theory behind how digital electronics work while creating a new project for measuring temperature. Raspberry Pi is everywhere, it''s inexpensive, and it''s a wonderful tool for teaching about electronics and programming. This book demonstrates how to make a variety of cool projects using the Pi with programming languages like Scratch and Python, with no experience necessary. You''ll see how the Pi works, how to work with Raspbian Linux on the Pi, and how to design and create electronic circuits. You''ll create projects like an arcade game, disco lights, and infrared transmitter, and an LCD display. You''ll also learn how to control Minecraft''s Steve with a joystick and how to build a Minecraft house with a Pi, and even how to control a LEGO train with a Pi. And, you''ll build your own robot, including how to solder and even design a printed circuit board. Learning electronics can be tremendous fun - your first flashing LED circuit is a reason to celebrate! But where do you go from there, and how can you move into more challenging projects without spending a lot of money on proprietary kits? Learn Electronics with Raspberry Pi shows you how to, and a lot more. What You''ll Learn - Design and build electronic circuits - Make fun projects like an arcade game, a robot, and a Minecraft controller - Program the Pi with Scratch and Python Who This Book Is For Makers, students, and teachers who want to learn about electronics and programming with the fun and low-cost Raspberry Pi.

DKK 476.00
1

Information Assurance and Risk Management Strategies - Bradley Fowler - Bog - APress - Plusbog.dk

Information Assurance and Risk Management Strategies - Bradley Fowler - Bog - APress - Plusbog.dk

Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technology’s recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrators and cybersecurity practitioners, author Bradley Fowler first walks you through how to assess known risks in your organization, understand why using a risk mitigation security strategy control profile is essential, and how to create one for your organization. You will then learn how to develop a risk factor table, outlining descriptions for each risk factor within your organization and which software applications you’ll need to rely on for daily business communication and operations. You will also see how to assess and categorize the level of risk within each technology tool, as well as the impact of an information security breach on the organization. As you progress through the book, you'll review privacy issues relating to your organization, develop and manage a privacy compliance risk profile, and develop and manage a privacy compliance control profile. Additionally, you will gain insight into creating a privacy compliance risk mitigation strategy that helps protect your organization even as security threats evolve. Take the first step to safeguarding your company’s highly valuable information assets today! What You'll LearnUnderstand what information assurance is and how it relates to risk management strategiesAssess, develop, implement, and manage risk management strategies for corporate information systems, technology, and cloud environmentsDevelop and utilize information usage profiles and risk factor tablesUnderstand the value of data encryption and usage of private and public key exchange for information assurance and security Who This Book Is ForInformation system and cloud architects responsible for developing, implementing, and managing corporate information systems and cloud environments.

DKK 476.00
1

Introductory Programs with the 32-bit PIC Microcontroller - Hubert Ward - Bog - APress - Plusbog.dk

Introductory Programs with the 32-bit PIC Microcontroller - Hubert Ward - Bog - APress - Plusbog.dk

Embark on a journey into the world of embedded programming. This book introduces you to the 32bit PIC and will teach you how the main functions of C programming work and can be used with a PIC micro. A one-stop reference for the would-be embedded programmer, you''ll explore the electronics needed for a variety of programs as well as how to use different devices with the PIC. The book starts with downloading the environment and creating a simple project, one that uses different oscillators, Phase Lock Loop, and circuitry needed to create the different system clocks-an easy entry point to this exciting environment. You''ll also review the MPLABX integrated development environment (IDE) and see how to program the 32Bit PIC, which can be adapted to different PICs. Throughout subsequent chapters, you''ll learn how to use a range of programs that use PIC modules such as the SPI, I2C, UART communication modules, the ADC module, the Capture, Compare, and Pulse Width Modulation module, and the RTCC, Real Time Clock and Calendar Module. What You''ll Learn - Create a project in MPLABX - Configure the different clock frequencies that are used in the 32bit PIC - Build a variable delay subroutine to be used in a simple traffic lights program - Use the MAX 7219 driver IC to control the 8by8 matrix display - Program an I2C expander module to control the display on a LCD Who This Book Is For Readers who want to try their hand at embedded programming, newcomers to programming the PIC 32, programmers who want to look into using MPLAB Harmony 3, and programmers who want to understand how C instructions work with respect to 32bit PIC. Also students who are studying for an engineering qualification.

DKK 519.00
1

Kubernetes - Philippe Martin - Bog - APress - Plusbog.dk

Kubernetes - Philippe Martin - Bog - APress - Plusbog.dk

Master all the concepts and tools necessary to start administering a Kubernetes cluster and deploying applications to production. You will cover the entire curricula of the two Kubernetes certifications (for application developers and administrators). The initial chapters guide you through deployment of a Kubernetes cluster on virtual machines and explore the different components of the control plane. Next, you will work with the kubectl command-line tool; namespaces, labels, selectors, and annotations-common resources used through the Kubernetes API. The following chapters describe the principle of controllers and detail how workload controllers work as well as the possibilities for configuring deployed applications. You will also learn how to deploy a scalable and self-healing application, how pods are scheduled to nodes, how parts of the application can communicate, and how the application is discoverable from the outside. Next, you will cover security concerns describing the different authentication methods, the RBAC authorization mode, security contexts, network policies, and how to secure container images. You will also cover using persistent volumes for your containers to store long-term data, monitoring your clusters and applications and implementing design patterns for multi-container pods. The concluding chapters guide you through the upgrade of your deployed cluster. After reading this book, you will have enough knowledge to deploy a complex application using a Kubernetes cluster and be ready for the certification exams. What You Will Learn - Deploy a Kubernetes cluster with kubeadm and learn how the control plane works - Discover how the Kubernetes API is structured - Deploy secure, auto-scaled, and self-healing applications - Master the kubectl command-line tool Who This Book Is For Administrators and application developers with good knowledge of micro-services development and deployment.

DKK 468.00
1

Pro Azure Governance and Security - Peter De Tender - Bog - APress - Plusbog.dk

Pro Azure Governance and Security - Peter De Tender - Bog - APress - Plusbog.dk

Any IT professional can tell you that managing security is a top priority and even more so when working in the cloud. Access to accurate and timely security information is critical, but governance and control must first be enabled. This guide shows you how to take advantage of Azure''s vast and powerful built-in security tools and capabilities for your application workloads. Pro Azure Governance and Security offers a comprehensive look at the governance features available with Microsoft Azure and demonstrates how to integrate them with your hybrid and Azure environments, drawing on the author''s experiences from years in the field. Learn about the array of controls implemented within Microsoft Azure from two valuable perspectives: the customer and Microsoft operations. Beginning with the top-level subscription hierarchy, learn about the most important built-in Azure security services and features, as well as how to use Azure Policies and Blueprints as a means for security and governance. A series of hands-on exercises teaches you the concepts of Azure Governance: how to enable and deploy Azure Security Center, integrate RBAC (role-based access control), and set up Azure Operations and Monitoring. Get introduced to the new Azure Sentinel solution that offers SIEM as a service for security incident management and proactive hunting. What You''ll Learn - Understand different architectural designs for implementing Azure Security - Operate and monitor an Azure environment - Deploy Azure Governance, Policies, and Blueprints - Discover key Azure features that enhance security - Implement and confidently access Azure Security Center - Get to know Azure Sentinel Who This Book Is For Technical engineers, consultants, solution and cloud architects, IT managers, and SecOps teams who need to understand how to integrate governance, security, and compliance in hybrid and Azure environments. A basic understanding of Azure or other public cloud platforms is beneficial, but not required.

DKK 468.00
1

Beginning Unreal Game Development - David Nixon - Bog - APress - Plusbog.dk

Beginning Unreal Game Development - David Nixon - Bog - APress - Plusbog.dk

Get started creating video games using Unreal Engine 4 (UE4) and learning the fundamentals of game development. Through hands-on, step-by-step tutorials, you will learn to design engaging environments and a build solid foundation for more complex games. Discover how to utilize the 3D game design software behind the development of immensely popular games for PC, console, and mobile. Beginning Unreal Game Development steers you through the fundamentals of game development with UE4 to design environments that both engage the player and are aesthetically pleasing. Author David Nixon shows you how to script logic, define behaviors, store data, and create characters. You will learn to create user interfaces, such as menus, load screens, and head-up displays (HUDs), and manipulate audio to add music, sound effects, and dialogue to your game. The book covers level editors, actor types, blueprints, character creation and control, and much more. Throughout the book, you''ll put theory into practice and create an actual game using a series of step-by-step tutorials. With a clear, step-by-step approach, Beginning Unreal Game Development builds up your knowledge of Unreal Engine 4 so you can start creating and deploying your own 3D video games in no time. What You Will Learn - Learn the fundamentals of game design - Understand how to use Unreal Engine 4 - Design amazing levels for your characters to play in - Script logic to control the behavior of the world you create Who This Book Is For This book is for beginners with no prior game design or programming experience. It is also intended for video game enthusiasts who are brand-new to the world of game development and want to learn how to design a game from scratch using UE4.

DKK 468.00
1