Client–Server networking Books
Pearson Education (US) Strategic Monoliths and Microservices
Book SynopsisVaughn Vernon is a champion of simplifying software architecture and development, with an emphasis on reactive methods. He has a unique ability to teach and lead with Domain-Driven Design using lightweight tools to unveil unimagined value. He helps organizations achieve competitive advantages using enduring tools such as architectures, patterns, and approaches, and through partnerships between business stakeholders and software developers. Tomasz Jaskula has 20 years of professional experience as a developer, software architect, team leader, trainer, and technical conference speaker. An IDDD Workshop trainer in both French and Polish, he founded Paris Domain-Driven Design and F# user groups. Jaskula's company, Luteceo (luteceo.fr), spreads good software and architecture practices based on Domain-Driven Design and software craftsmanship. He previously worked for many companies in e-commerce, industry, insurance, and finance, gaining deep experTrade Review"Most books address either the business of software or the technical details of building software. Strategic Monoliths and Microservices provides a comprehensive approach to blending the needs of business and technology in an approachable way. It also dispels many of today's myths while offering practical guidance that any team or organization can apply immediately and with confidence." --James Higginbotham, Executive API Consultant, Founder of LaunchAny, and author of Principles of Web API Design "Digital Transformation cannot succeed as a 'grass roots' effort. Vaughn and Tomasz offer C-level execs a roadmap to software excellence that includes establishing the culture necessary to foster and sustain software innovation. Written with real-world understanding, Vaughn and Tomasz help the reader to appreciate that moving software development from a cost center to a profit center involves tradeoffs that need not sacrifice innovation. A must-read for decision makers." --Tom Stockton, Principal Architect, MAXIMUS "In this book, Vaughn Vernon and Tomasz Jaskuła use their extensive experience with DDD to present a comprehensive guide to using the many different aspects of DDD for modern systems development and modernization. It will be a valuable guide for many technical leaders who need to understand how to use DDD to its full potential." --Eoin Woods, software architect and author "There are common misconceptions and roots of failure around software engineering. One notable example is neglecting the rugged trek towards digital transformation. Such an endeavor comprises breakthrough innovations, failure culture, emphasis on the role of software architecture, as well as on the importance of efficient and effective inter-human communication. Fortunately, the authors offer the necessary help for mastering all hurdles and challenges. What I like most about this book is the holistic view it provides to all stakeholders involved in digital transformation and innovation. Vaughn Vernon and Tomasz Jaskuła introduce a clear path to successful innovation projects. They provide insights, tools, proven best practices, and architecture styles both from the business and engineering viewpoint. Their book sheds light on the implications of digital transformation and how to deal with them successfully. This book deserves to become a must-read for practicing software engineers, executives, as well as senior managers. It will always serve me as a precious source of guidance and as a navigator whenever I am entering uncharted territories." --Michael Stal, Certified Senior Software Architect, Siemens Technology "Digital transformation is a much used but little understood concept. This book provides valuable insight into this topic and how to leverage your existing assets on the journey. Modern technical and social techniques are combined in the context of a single case study. Compelling reading for both business and technology practitioners." --Murat Erder, co-author of Continuous Architecture in Practice (2021) and Continuous Architecture (2015) "Packed with insightful recommendations for every executive leader seeking clarity on the distinction between when to strategically apply a monolith vs. microservice architectural approach for success. Highly encourage every CEO, CIO, CTO, and (S)VP of Software Development to start here with immersing themselves in Vaughn and Tomasz's succinct distillation of the advantages, disadvantages, and allowance for a hybrid combination, and then go become a visionary thought leader in their respective business domain." --Scott P. Murphy, Principal Architect, Maximus, Inc. "A 'must-read' for Enterprise leaders and architects who are planning for or executing a digital transformation! The book is a true guide for ensuring your enterprise software innovation program is successful." --Chris Verlaine, DHL Express Global Aviation IT DevOps Director, Head of DHL Express Global Aviation IT Software Modernization Program " Strategic Monoliths and Microservices is a great resource to connect business value to an evolvable enterprise architecture. I am impressed with how the authors use their deep understanding and experience to guide informed decisions on the modularization journey. Along the way every valuable tool and concept is explained and properly brought into context. Definitely a must-read for IT decision makers and architects. For me this book will be an inspiring reference and a constant reminder to seek the purpose in architecture. The Microservices discussion has reached a completely new maturity level." --Christian Deger, Head of Architecture and Platform at RIO | The Logistics Flow, organizer of over 60 Microservices Meetups "The choice of microservices or monoliths architecture goes far beyond technology. The culture, organization, and communication that exist within a company are all important factors that a CTO must consider carefully in order to successfully build digital systems. The authors explain this extremely well from various perspectives and based on very interesting examples." --Olivier Ulmer, CTO, Groupe La Française "Building a technology engine to move quickly, experiment, and learn is a competitive advantage in today's digital world. Will ' de-jour architecture' help with this endeavor? This amazing book by Vaughn and Tomasz fills a void in the market and re-focuses on the core objectives of software architecture: move fast, experiment, focus on the outcomes that bring value. A reader will come away better suited to decide whether microservices architecture and all the complexity with it is right for them." --Christian Posta, Global Field CTO, Solo.io Table of ContentsForeword xiiiPreface xviiAcknowledgments xxvAbout the Authors xxxi Part I: Transformational Strategic Learning through Experimentation 1 Executive Summary 3 Chapter 1: Business Goals and Digital Transformation 7 Digital Transformation: What Is the Goal? 8 Why Software Goes Wrong 11 Your Enterprise and Conway's Law 18 (Re)Thinking Software Strategy 24 Are Monoliths Bad? 30 Are Microservices Good? 31 Don't Blame Agile 34 Getting Unstuck 36 Summary 37 References 38 Chapter 2: Essential Strategic Learning Tools 39 Making Decisions Early and Late, Right and Wrong 40 Culture and Teams 43 Modules First 51 Deployment Last 55 Everything in Between 57 Where Is Your Spaghetti and How Fast Does It Cook? 70 Strategic Architecture 70 Applying the Tools 72 Summary 75 References 75 Chapter 3: Events-First Experimentation and Discovery 77 Commands and Events 78 Rapid Learning with EventStorming 81 Applying the Tools 92 Summary 99 References 100 Part II: Driving Business Innovation 101 Executive Summary 103 Chapter 4: Reaching Domain-Driven Results 109 Domains and Subdomains 111 Summary 115 References 116 Chapter 5: Contextual Expertise 117 Bounded Context and Ubiquitous Language 117 Core Domain 121 Supporting Subdomains, Generic Subdomains, and Technical Mechanisms 123 Business Capabilities and Contexts 125 Not Too Big, Not Too Small 128 Summary 129 References 130 Chapter 6: Mapping, Failing, and Succeeding--Choose Two 131 Context Mapping 131 Topography Modeling 151 Ways to Fail and Succeed 154 Applying the Tools 158 Summary 163 References 164 Chapter 7: Modeling Domain Concepts 165 Entities 166 Value Objects 167 Aggregates 168 Domain Services 169 Functional Behavior 170 Applying the Tools 173 Summary 173 References 174 Part III: Events-First Architecture 175 Executive Summary 177 Chapter 8: Foundation Architecture 181 Architectural Styles, Patterns, and Decision Drivers 183 Quality Attributes 196 Applying the Tools 206 Summary 207 References 208 Chapter 9: Message- and Event-Driven Architectures 211 Message- and Event-Based REST 216 Event-Driven and Process Management 220 Event Sourcing 223 CQRS 227 Serverless and Function as a Service 229 Applying the Tools 231 Summary 231 References 232 Part IV: The Two Paths for Purposeful Architecture 233 Executive Summary 235 Chapter 10: Building Monoliths Like You Mean It 239 Historical Perspective 241 Right from the Start 244 Right from Wrong 253 Keeping It Right 264 Summary 265 References 266 Chapter 11: Monolith to Microservices Like a Boss 267 Mental Preparation with Resolve 267 Modular Monolith to Microservices 271 Big Ball of Mud Monolith to Microservices 275 Unplugging the Legacy Monolith 286 Summary 287 References 288 Chapter 12: Require Balance, Demand Strategy 289 Balance and Quality Attributes 289 Strategy and Purpose 291 Conclusion 297 References 298 Index 299
£26.99
Pearson Education (US) Cloud Computing
Book SynopsisThomas Erl is a best-selling IT author and series editor of the Pearson Digital Enterprise Series from Thomas Erl. Thomas has authored and co-authored 15 books published by Pearson Education and Prentice Hall dedicated to contemporary business technology and practices. You can find Thomas on the Thomas Erl YouTube channel (youtube.com/@terl). He is also the host of the Real Digital Transformation podcast series (available via Spotify, Apple, Google Podcasts, and most other platforms) and also publishes the weekly LinkedIn newsletter The Digital Enterprise. Over 100 articles and interviews by Thomas have been published in numerous publications, including CEO World, The Wall Street Journal, Forbes, and CIO Magazine. Thomas has also toured over 20 countries as a keynote speaker for various conferences and events. At Arcitura Education (www.arcitura.com), Thomas leads the development of curricula for internatiTable of ContentsForeword About the Authors Acknowledgments Chapter 1: Introduction 1.1 Objectives of This Book 1.2 What This Book Does Not Cover 1.3 Who This Book Is For 1.4 How This Book Is Organized Part I: Fundamental Cloud Computing Chapter 3: Understanding Cloud Computing Chapter 4: Fundamental Concepts and Models Chapter 5: Cloud-Enabling Technology Chapter 6: Understanding Containerization Chapter 7: Understanding Cloud Security and Cybersecurity Part II: Cloud Computing Mechanisms Chapter 8: Cloud Infrastructure Mechanisms Chapter 9: Specialized Cloud Mechanisms Chapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms Chapter 12: Cloud Management Mechanisms Part III: Cloud Computing Architecture Chapter 13: Fundamental Cloud Architectures Chapter 14: Advanced Cloud Architectures Chapter 15: Specialized Cloud Architectures Part IV: Working with Clouds Chapter 16: Cloud Delivery Model Considerations Chapter 17: Cost Metrics and Pricing Models Chapter 18: Service Quality Metrics and SLAs Part V: Appendices Appendix A: Case Study Conclusions Appendix B: Common Containerization Technologies 1.5 Resources Pearson Digital Enterprise Book Series Thomas Erl on YouTube The Digital Enterprise Newsletter on LinkedIn Cloud Certified Professional (CCP) ProgramChapter 2: Case Study Background 2.1 Case Study #1: ATN Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy 2.2 Case Study #2: DTGOV Technical Infrastructure and Environment Business Goals and New Strategy Roadmap and Implementation Strategy 2.3 Case Study #3: Innovartus Technologies Inc. Technical Infrastructure and Environment Business Goals and Strategy Roadmap and Implementation Strategy PART I: FUNDAMENTAL CLOUD COMPUTINGChapter 3: Understanding Cloud Computing 3.1 Origins and Influences A Brief History Definitions Business Drivers Cost Reduction Business Agility Technology Innovations Clustering Grid Computing Capacity Planning Virtualization Containerization Serverless Environments 3.2 Basic Concepts and Terminology Cloud Container IT Resource On Premises Cloud Consumers and Cloud Providers Scaling Horizontal Scaling Vertical Scaling Cloud Service Cloud Service Consumer 3.3 Goals and Benefits Increased Responsiveness Reduced Investments and Proportional Costs Increased Scalability Increased Availability and Reliability 3.4 Risks and Challenges Increased Vulnerability Due to Overlapping Trust Boundaries Increased Vulnerability Due to Shared Security Responsibility Increased Exposure to Cyber Threats Reduced Operational Governance Control Limited Portability Between Cloud Providers Multiregional Compliance and Legal Issues Cost Overruns Chapter 4: Fundamental Concepts and Models 4.1 Roles and Boundaries Cloud Provider Cloud Consumer Cloud Broker Cloud Service Owner Cloud Resource Administrator Additional Roles Organizational Boundary Trust Boundary 4.2 Cloud Characteristics On-Demand Usage Ubiquitous Access Multitenancy (and Resource Pooling) Elasticity Measured Usage Resiliency 4.3 Cloud Delivery Models Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Comparing Cloud Delivery Models Combining Cloud Delivery Models IaaS + PaaS IaaS + PaaS + SaaS Cloud Delivery Submodels 4.4 Cloud Deployment Models Public Clouds Private Clouds Multiclouds Hybrid Clouds Chapter 5: Cloud-Enabling Technology 5.1 Networks and Internet Architecture Internet Service Providers (ISPs) Connectionless Packet Switching (Datagram Networks) Router-Based Interconnectivity Physical Network Transport Layer Protocol Application Layer Protocol Technical and Business Considerations Connectivity Issues Network Bandwidth and Latency Issues Wireless and Cellular Cloud Carrier and Cloud Provider Selection 5.2 Cloud Data Center Technology Virtualization Standardization and Modularity Autonomic Computing Remote Operation and Management High Availability Security-Aware Design, Operation, and Management Facilities Computing Hardware Storage Hardware Network Hardware Carrier and External Networks Interconnection Web-Tier Load Balancing and Acceleration LAN Fabric SAN Fabric NAS Gateways Serverless Environments NoSQL Clustering Other Considerations 5.3 Modern Virtualization Hardware Independence Server Consolidation Resource Replication Operating System–Based Virtualization Hardware-Based Virtualization Containers and Application-Based Virtualization Virtualization Management Other Considerations 5.4 Multitenant Technology 5.5 Service Technology and Service APIs REST Services Web Services Service Agents Service Middleware Web-Based RPC 5.6 Case Study Example Chapter 6: Understanding Containerization 6.1 Origins and Influences A Brief History Containerization and Cloud Computing 6.2 Fundamental Virtualization and Containerization Operating System Basics Virtualization Basics Physical Servers Virtual Servers Hypervisors Virtualization Types Containerization Basics Containers Container Images Container Engines Pods Hosts Host Clusters Host Networks and Overlay Networks Virtualization and Containerization Containerization on Physical Servers Containerization on Virtual Servers Containerization Benefits Containerization Risks and Challenges 6.3 Understanding Containers Container Hosting Containers and Pods Container Instances and Clusters Container Package Management Container Orchestration Container Package Manager vs. Container Orchestrator Container Networks Container Network Scope Container Network Addresses Rich Containers Other Common Container Characteristics 6.4 Understanding Container Images Container Image Types and Roles Container Image Immutability Container Image Abstraction Operating System Kernel Abstraction Operating System Abstraction Beyond the Kernel Container Build Files Container Image Layers How Customized Container Images Are Created 6.5 Multi-Container Types Sidecar Container Adapter Container Ambassador Container Using Multi-Containers Together 6.6 Case Study Example Chapter 7: Understanding Cloud Security and Cybersecurity 7.1 Basic Security Terminology Confidentiality Integrity Availability Authenticity Security Controls Security Mechanisms Security Policies 7.2 Basic Threat Terminology Risk Vulnerability Exploit Zero-Day Vulnerability Security Breach Data Breach Data Leak Threat (or Cyber Threat) Attack (or Cyber Attack) Attacker and Intruder Attack Vector and Surface 7.3 Threat Agents Anonymous Attacker Malicious Service Agent Trusted Attacker Malicious Insider 7.4 Common Threats Traffic Eavesdropping Malicious Intermediary Denial of Service Insufficient Authorization Virtualization Attack Overlapping Trust Boundaries Containerization Attack Malware Insider Threat Social Engineering and Phishing Botnet Privilege Escalation Brute Force Remote Code Execution SQL Injection Tunneling Advanced Persistent Threat (APT) 7.5 Case Study Example 7.6 Additional Considerations Flawed Implementations Security Policy Disparity Contracts Risk Management 7.7 Case Study Example PART II: CLOUD COMPUTING MECHANISMS Chapter 8: Cloud Infrastructure Mechanisms 8.1 Logical Network Perimeter Case Study Example 8.2 Virtual Server Case Study Example 8.3 Hypervisor Case Study Example 8.4 Cloud Storage Device Cloud Storage Levels Network Storage Interfaces Object Storage Interfaces Database Storage Interfaces Relational Data Storage Non-Relational Data Storage Case Study Example 8.5 Cloud Usage Monitor Monitoring Agent Resource Agent Polling Agent Case Study Example 8.6 Resource Replication Case Study Example 8.7 Ready-Made Environment Case Study Example 8.8 Container Chapter 9: Specialized Cloud Mechanisms 9.1 Automated Scaling Listener Case Study Example 9.2 Load Balancer Case Study Example 9.3 SLA Monitor Case Study Example SLA Monitor Polling Agent SLA Monitoring Agent 9.4 Pay-Per-Use Monitor Case Study Example 9.5 Audit Monitor Case Study Example 9.6 Failover System Active–Active Active–Passive Case Study Example 9.7 Resource Cluster Case Study Example 9.8 Multi-Device Broker Case Study Example 9.9 State Management Database Case Study ExampleChapter 10: Cloud Security and Cybersecurity Access-Oriented Mechanisms 10.1 Encryption Symmetric Encryption Asymmetric Encryption Case Study Example 10.2 Hashing Case Study Example 10.3 Digital Signature Case Study Example 10.4 Cloud-Based Security Groups Case Study Example 10.5 Public Key Infrastructure (PKI) System Case Study Example 10.6 Single Sign-On (SSO) System Case Study Example 10.7 Hardened Virtual Server Image Case Study Example 10.8 Firewall Case Study Example 10.9 Virtual Private Network (VPN) Case Study Example 10.10 Biometric Scanner Case Study Example 10.11 Multi-Factor Authentication (MFA) System Case Study Example 10.12 Identity and Access Management (IAM) System Case Study Example 10.13 Intrusion Detection System (IDS) Case Study Example 10.14 Penetration Testing Tool Case Study Example 10.15 User Behavior Analytics (UBA) System Case Study Example 10.16 Third-Party Software Update Utility Case Study Example 10.17 Network Intrusion Monitor Case Study Example 10.18 Authentication Log Monitor Case Study Example 10.19 VPN Monitor Case Study Example 10.20 Additional Cloud Security Access-Oriented Practices and Technologies Chapter 11: Cloud Security and Cybersecurity Data-Oriented Mechanisms 11.1 Digital Virus Scanning and Decryption System Generic Decryption Digital Immune System Case Study Example 11.2 Malicious Code Analysis System Case Study Example 11.3 Data Loss Prevention (DLP) System Case Study Example 11.4 Trusted Platform Module (TPM) Case Study Example 11.5 Data Backup and Recovery System Case Study Example 11.6 Activity Log Monitor Case Study Example 11.7 Traffic Monitor Case Study Example 11.8 Data Loss Protection Monitor Case Study Example Chapter 12: Cloud Management Mechanisms 12.1 Remote Administration System Case Study Example 12.2 Resource Management System Case Study Example 12.3 SLA Management System Case Study Example 12.4 Billing Management System Case Study Example PART III: CLOUD COMPUTING ARCHITECTURE Chapter 13: Fundamental Cloud Architectures 13.1 Workload Distribution Architecture 13.2 Resource Pooling Architecture 13.3 Dynamic Scalability Architecture 13.4 Elastic Resource Capacity Architecture 13.5 Service Load Balancing Architecture 13.6 Cloud Bursting Architecture 13.7 Elastic Disk Provisioning Architecture 13.8 Redundant Storage Architecture 13.9 Multicloud Architecture 13.10 Case Study ExampleChapter 14: Advanced Cloud Architectures 14.1 Hypervisor Clustering Architecture 14.2 Virtual Server Clustering Architecture 14.3 Load-Balanced Virtual Server Instances Architecture 14.4 Nondisruptive Service Relocation Architecture 14.5 Zero Downtime Architecture 14.6 Cloud Balancing Architecture 14.7 Resilient Disaster Recovery Architecture 14.8 Distributed Data Sovereignty Architecture 14.9 Resource Reservation Architecture 14.10 Dynamic Failure Detection and Recovery Architecture 14.11 Rapid Provisioning Architecture 14.12 Storage Workload Management Architecture 14.13 Virtual Private Cloud Architecture 14.14 Case Study ExampleChapter 15: Specialized Cloud Architectures 15.1 Direct I/O Access Architecture 15.2 Direct LUN Access Architecture 15.3 Dynamic Data Normalization Architecture 15.4 Elastic Network Capacity Architecture 15.5 Cross-Storage Device Vertical Tiering Architecture 15.6 Intra-Storage Device Vertical Data Tiering Architecture 15.7 Load-Balanced Virtual Switches Architecture 15.8 Multipath Resource Access Architecture 15.9 Persistent Virtual Network Configuration Architecture 15.10 Redundant Physical Connection for Virtual Servers Architecture 15.11 Storage Maintenance Window Architecture 15.12 Edge Computing Architecture 15.13 Fog Computing Architecture 15.14 Virtual Data Abstraction Architecture 15.15 Metacloud Architecture 15.16 Federated Cloud Application Architecture PART IV: WORKING WITH CLOUDS Chapter 16: Cloud Delivery Model Considerations 16.1 Cloud Delivery Models: The Cloud Provider Perspective Building IaaS Environments Data Centers Scalability and Reliability Monitoring Security Equipping PaaS Environments Scalability and Reliability Monitoring Security Optimizing SaaS Environments Security 16.2 Cloud Delivery Models: The Cloud Consumer Perspective Working with IaaS Environments IT Resource Provisioning Considerations Working with PaaS Environments IT Resource Provisioning Considerations Working with SaaS Services 16.3 Case Study Example Chapter 17: Cost Metrics and Pricing Models 17.1 Business Cost Metrics Up-Front and Ongoing Costs Additional Costs Case Study Example Product Catalog Browser On-Premises Up-Front Costs On-Premises Ongoing Costs Cloud-Based Up-Front Costs Cloud-Based Ongoing Costs 17.2 Cloud Usage Cost Metrics Network Usage Inbound Network Usage Metric Outbound Network Usage Metric Intra-Cloud WAN Usage Metric Server Usage On-Demand Virtual Machine Instance Allocation Metric Reserved Virtual Machine Instance Allocation Metric Cloud Storage Device Usage On-Demand Storage Space Allocation Metric I/O Data Transferred Metric Cloud Service Usage Application Subscription Duration Metric Number of Nominated Users Metric Number of Transactions Users Metric 17.3 Cost Management Considerations Pricing Models Multicloud Cost Management Additional Considerations Case Study Example Virtual Server On-Demand Instance Allocation Virtual Server Reserved Instance Allocation Cloud Storage Device WAN Traffic Chapter 18: Service Quality Metrics and SLAs 18.1 Service Quality Metrics Service Availability Metrics Availability Rate Metric Outage Duration Metric Service Reliability Metrics Mean Time Between Failures (MTBF) Metric Reliability Rate Metric Service Performance Metrics Network Capacity Metric Storage Device Capacity Metric Server Capacity Metric Web Application Capacity Metric Instance Starting Time Metric Response Time Metric Completion Time Metric Service Scalability Metrics Storage Scalability (Horizontal) Metric Server Scalability (Horizontal) Metric Server Scalability (Vertical) Metric Service Resiliency Metrics Mean Time to Switchover (MTSO) Metric Mean Time to System Recovery (MTSR) Metric 18.2 Case Study Example 18.3 SLA Guidelines 18.4 Case Study Example Scope and Applicability Service Quality Guarantees Definitions Usage of Financial Credits SLA Exclusions PART V: APPENDICES Appendix A: Case Study Conclusions A.1 ATN A.2 DTGOV A.3 Innovartus Appendix B: Common Containerization Technologies B.1 Docker Docker Server Docker Client Docker Registry Docker Objects Docker Swarm (Container Orchestrator) B.2 Kubernetes Kubernetes Node (Host) Kubernetes Pod Kubelet Kube-Proxy Container Runtime (Container Engine) Cluster Kubernetes Control Plane 9780138052256 TOC 7/17/2023
£40.49
Manning Publications API Design Patterns
Book SynopsisModern software systems are composed of many servers, services, and other components that communicate through APIs. As a developer, your job is to make sure these APIs are stable, reliable, and easy to use for other developers. API Design Patterns provides you with a unique catalog of design standards and best practices to ensure your APIs are flexible and user-friendly. Fully illustrated with examples and relevant use-cases, this essential guide covers patterns for API fundamentals and real-world system designs, along with quite a few not-so-common scenarios and edge-cases. about the technologyAPI design patterns are a useful set of best practice specifications and common solutions to API design challenges. Using accepted design patterns creates a shared language amongst developers who create and consume APIs, which is especially critical given the explosion of mission-critical public-facing web APIs. API Patterns are still being developed and discovered. This collection, gathered and tested by Google API expert JJ Geewax, is the first of its kind. about the book API Design Patterns draws on the collected wisdom of the API community, including the internal developer knowledge base at Google, laying out an innovative set of design patterns for developing both internal and public-facing APIs. In this essential guide, Google Software Engineer JJ Geewax provides a unique and authoritative catalog of patterns that promote flexibility and ease-of-use in your APIs. Each pattern in the catalog is fully illustrated with its own example API, use-cases for solving common API design challenges, and scenarios for tricky edge issues using a pattern’s more subtle features. With the best practices laid out in this book, you can ensure your APIs are adaptive in the face of change and easy for your clients to incorporate into their projects. what's inside A full case-study of building an API and adding features The guiding principles that underpin most API patterns Fundamental patterns for resource layout and naming Advanced patterns for special interactions and data transformations about the readerAimed at software developers with experience using APIs, who want to start building their own. about the author JJ Geewax is a software engineer at Google, focusing on Google Cloud Platform and API design. He is also the author of Google Cloud Platform in Action.
£43.19
Microsoft Press,U.S. Code Complete
Book SynopsisSteve McConnell is recognized as one of the premier authors and voices in the development community. He is Chief Software Engineer of Construx Software and was the lead developer of Construx Estimate and of SPC Estimate Professional, winner of Software Development magazine's Productivity Award. He is the author of several books, including Code Complete and Rapid Development, both honored with Software Development magazine's Jolt Award.Table of ContentsWelcome to software construction Metaphors for a richer understanding of software development Measure twice, cut once: Upstream prerequisites Key construction decisions Design in construction Working classes High-Quality routines Defensive programming The Pseudocode programming process General issues in using variables The power of variable names Fundamental data types Unusual data types Organizing straight-line code Using conditionals Controlling loops Unusual control structures Table driven methods General control issues The software-quality landscape Collaborative construction Developer testing Debugging refactoring Code tuning strategies How program size affects construction Integration Programming tools Layout & style Self documenting code Personal character Themes in software craftsmanship
£34.42
Pearson Education (US) Building Data Centers with VXLAN BGP EVPN: A
Book SynopsisThe complete guide to building and managing next-generation data center network fabrics with VXLAN and BGP EVPN This is the only comprehensive guide and deployment reference for building flexible data center network fabrics with VXLAN and BGP EVPN technologies. Writing for experienced network professionals, three leading Cisco experts address everything from standards and protocols to functions, configurations, and operations. The authors first explain why and how data center fabrics are evolving, and introduce Cisco’s fabric journey. Next, they review key switch roles, essential data center network fabric terminology, and core concepts such as network attributes, control plane details, and the associated data plane encapsulation. Building on this foundation, they provide a deep dive into fabric semantics, efficient creation and addressing of the underlay, multi-tenancy, control and data plane interaction, forwarding flows, external interconnectivity, and service appliance deployments. You’ll find detailed tutorials, descriptions, and packet flows that can easily be adapted to accommodate customized deployments. This guide concludes with a full section on fabric management, introducing multiple opportunities to simplify, automate, and orchestrate data center network fabrics. Learn how changing data center requirements have driven the evolution to overlays, evolved control planes, and VXLAN BGP EVPN spine-leaf fabrics Discover why VXLAN BGP EVPN fabrics are so scalable, resilient, and elastic Implement enhanced unicast and multicast forwarding of tenant traffic over the VXLAN BGP EVPN fabric Build fabric underlays to efficiently transport uni- and multi-destination traffic Connect the fabric externally via Layer 3 (VRF-Lite, LISP, MPLS L3VPN) and Layer 2 (VPC) Choose your most appropriate Multi-POD, multifabric, and Data Center Interconnect (DCI) options Integrate Layer 4-7 services into the fabric, including load balancers and firewalls Manage fabrics with POAP-based day-0 provisioning, incremental day 0.5 configuration, overlay day-1 configuration, or day-2 operations Table of Contents Introduction xv Chapter 1 Introduction to Programmable Fabric 1 Today’s Data Center Challenges and Requirements 2 The Data Center Fabric Journey 3 Cisco Open Programmable Fabric 10 Fabric-Related Terminology 13 Data Center Network Fabric Properties 14 Server or Endpoint Connectivity Options 15 Summary 17 References 17 Chapter 2 VXLAN BGP EVPN Basics 21 Overlays 23 Introduction to VXLAN 27 VXLAN Flood and Learn (F&L) 30 Introduction to BGP EVPN with VXLAN 32 MP-BGP Features and Common Practices 34 IETF Standards and RFCs 37 Host and Subnet Route Distribution 40 Host Deletion and Move Events 46 Summary 48 References 49 Chapter 3 VXLAN/EVPN Forwarding Characteristics 53 Multidestination Traffic 54 Leveraging Multicast Replication in the Underlying Network 55 Using Ingress Replication 58 VXLAN BGP EVPN Enhancements 60 ARP Suppression 60 Distributed IP Anycast Gateway 65 Integrated Route and Bridge (IRB) 69 Endpoint Mobility 73 Virtual PortChannel (vPC) in VXLAN BGP EVPN 76 DHCP 81 Summary 85 References 85 Chapter 4 The Underlay 87 Underlay Considerations 88 MTU Considerations 91 IP Addressing 93 IP Unicast Routing 99 OSPF as an Underlay 100 IS-IS as an Underlay 102 BGP as an Underlay 103 IP Unicast Routing Summary 106 Multidestination Traffic 107 Unicast Mode 107 Multicast Mode 109 PIM Any Source Multicast (ASM) 112 BiDirectional PIM (PIM BiDir) 114 Summary 119 References 119 Chapter 5 Multitenancy 121 Bridge Domains 123 VLANs in VXLAN 124 Layer 2 Multitenancy: Mode of Operation 129 VLAN-Oriented Mode 130 BD-Oriented Mode 131 VRF in VXLAN BGP EVPN 132 Layer 3 Multitenancy: Mode of Operation 134 Summary 137 References 138 Chapter 6 Unicast Forwarding 139 Intra-Subnet Unicast Forwarding (Bridging) 139 Non-IP Forwarding (Bridging) 147 Inter-Subnet Unicast Forwarding (Routing) 149 Routed Traffic to Silent Endpoints 158 Forwarding with Dual-Homed Endpoint 164 IPv6 167 Summary 169 Chapter 7 Multicast Forwarding 171 Layer 2 Multicast Forwarding 171 IGMP in VXLAN BGP EVPN Networks 174 Layer 2 Multicast Forwarding in vPC 178 Layer 3 Multicast Forwarding 182 Summary 184 References 184 Chapter 8 External Connectivity 185 External Connectivity Placement 185 External Layer 3 Connectivity 189 U-Shaped and Full-Mesh Models 190 VRF Lite/Inter-AS Option A 192 LISP 195 MPLS Layer 3 VPN (L3VPN) 200 External Layer 2 Connectivity 203 Classic Ethernet and vPC 204 Extranet and Shared Services 206 Local/Distributed VRF Route Leaking 207 Downstream VNI Assignment 210 Summary 212 Reference 212 Chapter 9 Multi-Pod, Multifabric, and Data Center Interconnect (DCI) 213 Contrasting OTV and VXLAN 213 Multi-Pod 219 Interconnection at the Spine Layer 227 Interconnection at the Leaf Layer 227 Multifabric 228 Inter-pod/Interfabric 231 Interfabric Option 1: Multi-Pod 232 Interfabric Option 2: Multifabric 233 Interfabric Option 3 (Multisite for Layer 3) 235 Interfabric Option 4 (Multisite for Layer 2) 236 Summary 238 References 238 Chapter 10 Layer 4—7 Services Integration 241 Firewalls in a VXLAN BGP EVPN Network 242 Routing Mode 242 Bridging Mode 244 Firewall Redundancy with Static Routing 245 Static Route Tracking at a Service Leaf 248 Static Routing at a Remote Leaf 248 Physical Connectivity 249 Inter-Tenant/Tenant-Edge Firewall 250 Services-Edge Design 254 Intra-Tenant Firewalls 254 Mixing Intra-Tenant and Inter-Tenant Firewalls 260 Application Delivery Controller (ADC) and Load Balancer in a VXLAN BGP EVPN Network 262 One-Armed Source-NAT 262 Direct VIP Subnet Approach 263 Indirect VIP Subnet Approach 264 Return Traffic 265 Service Chaining: Firewall and Load Balancer 267 Summary 271 References 271 Chapter 11 Introduction to Fabric Management 273 Day-0 Operations: Automatic Fabric Bring-Up 275 In-Band Versus Out-of-Band POAP 276 Other Day-0 Considerations 278 Day-0.5 Operations: Incremental Changes 279 Day-1 Operations: Overlay Services Management 280 Virtual Topology System (VTS) 282 Nexus Fabric Manager (NFM) 282 Data Center Network Manager (DCNM) 283 Compute Integration 283 Day-2 Operations: Monitoring and Visibility 285 VXLAN OAM (NGOAM) 294 Summary 299 References 299 Appendix A VXLAN BGP EVPN Implementation Options 303 9781587144677, TOC, 3/16/17
£37.82
Microsoft Press,U.S. Microsoft Azure Security Infrastructure
Book SynopsisImplement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You’ll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement–so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: • Understand cloud security boundaries and responsibilities • Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection • Explore Azure’s defense-in-depth security architecture • Use Azure network security patterns and best practices • Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security • Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines • Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information • Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite • Effectively model threats and plan protection for IoT systems • Use Azure security tools for operations, incident response, and forensic investigationTable of ContentsChapter 1 Cloud security Cloud security considerations Compliance Risk management Identity and access management Operational security Endpoint protection Data protection Shared responsibility Cloud computing Distributed responsibility in public cloud computing Assume breach and isolation Azure security architecture Azure design principles Chapter 2 Identity protection in Azure Authentication and authorization Azure hierarchy Role-Based Access Control On-premises integration Azure AD Connect Federation Suspicious activity identification Identity protection User risk policy Sign-in risk policy Notification enabling Vulnerabilities Multi-Factor Authentication Azure Multi-Factor Authentication implementation Azure Multi-Factor Authentication option configuration Chapter 3 Azure network security Anatomy of Azure networking Virtual network infrastructure Network access control Routing tables Remote access (Azure gateway/point-to-site VPN/ RDP/Remote PowerShell/SSH) Cross-premises connectivity Network availability Network logging Public name resolution Network security appliances Reverse proxy Azure Network Security best practices Subnet your networks based on security zones Use Network Security Groups carefully Use site-to-site VPN to connect Azure Virtual Networks Configure host-based firewalls on IaaS virtual machines Configure User Defined Routes to control traffic Require forced tunneling Deploy virtual network security appliances Create perimeter networks for Internet-facing devices Use ExpressRoute Optimize uptime and performance Disable management protocols to virtual machines Enable Azure Security Center Extend your datacenter into Azure Chapter 4 Data and storage security Virtual machine encryption Azure Disk Encryption Storage encryption File share wire encryption Hybrid data encryption Authentication Wire security Data at rest Rights management Database security Azure SQL Firewall SQL Always Encrypted Row-level security Transparent data encryption Cell-level encryption Dynamic data masking Chapter 5 Virtual machine protection with Antimalware Understanding the Antimalware solution Antimalware deployment Antimalware deployment to an existing VM Antimalware deployment to a new VM n
£23.39
Pearson Education (US) Practice of Cloud System Administration The
Book SynopsisThomas A. Limoncelli is an internationally recognized author, speaker, and system administrator with more than twenty years of experience at companies like Google, Bell Labs, and StackExchange.com. Strata R. Chalup has more than twenty-five years of experience in Silicon Valley, focusing on IT strategy, best-practices, and scalable infrastructures at firms that include Apple, Sun, Cisco, McAfee, and Palm. Christina J. Hogan has more than twenty years of experience in system administration and network engineering, from Silicon Valley to Italy and Switzerland. She has a master's degree in computer science, a doctorate in aeronautical engineering, and has been part of a Formula 1 racing team.Table of Contents Part I: Design: Building It Chapter 1: Designing in a Distributed World Chapter 2: Designing for Operations Chapter 3: Selecting a Service Platform Chapter 4: Application Architectures Chapter 5: Design Patterns for Scaling Chapter 6: Design Patterns for Resiliency Part II: Operations: Running It Chapter 7: Operations in a Distributed World Chapter 8: DevOps Culture Chapter 9: Service Delivery: The Build Phase Chapter 10: Service Delivery: The Deployment Phase Chapter 11: Upgrading Live Services Chapter 12: Automation Chapter 13: Design Documents Chapter 14: Oncall Chapter 15: Disaster Preparedness Chapter 16: Monitoring Fundamentals Chapter 17: Monitoring Architecture and Practice Chapter 18: Capacity Planning Chapter 19: Creating KPIs Chapter 20: Operational Excellence
£30.37
The Pragmatic Programmers Agile Web Development with Rails 7
Book SynopsisRails 7 completely redefines what it means to produce fantastic user experiences and provides a way to achieve all the benefits of single-page applications - at a fraction of the complexity. Rails 7 integrates the Hotwire frameworks of Stimulus and Turbo directly as the new defaults, together with that hot newness of import maps. The result is a toolkit so powerful that it allows a single individual to create modern applications upon which they can build a competitive business. The way it used to be. Ruby on Rails helps you produce high-quality, beautiful-looking web applications quickly - you concentrate on creating the application, and Rails takes care of the details. Rails 7 brings many improvements, and this edition is updated to cover the new features and changes in best practices. We start with a step-by-step walkthrough of building a real application, and in-depth chapters look at the built-in Rails features. Follow along with an extended tutorial as you write a web-based store application. Eliminate tedious configuration and housekeeping, seamlessly incorporate JavaScript, send and receive emails, manage background jobs with ActiveJob, and build real-time features using WebSockets and ActionCable. Test your applications as you write them using the built-in unit, integration, and system testing frameworks, internationalize your applications, and deploy your applications easily and securely. Rails 1.0 was released in December 2005. This book was there from the start, and didn't just evolve alongside Rails, it evolved with Rails. It has been developed in consultation with the Rails core team. In fact, Rails itself is tested against the code in this book. What You Need: All you need is a Windows, Mac OS X, or Linux machine to do development on. This book will take you through the steps to install Rails and its dependencies. If you aren't familiar with the Ruby programming language, this book contains a chapter that covers the basics necessary to understand the material in the book.
£45.59
Manning Publications Learn Kubernetes in a Month of Lunches
Book SynopsisIn Learn Kubernetes in a Month of Lunches you'll go from "what's a Pod?" to automatically scaling clusters of containers and components in just 22 hands-on lessons, each short enough to fit into a lunch break. Every lesson is task-focused and covers an essential skill on the road to Kubernetes mastery. You'll learn how to smooth container management with Kubernetes, including securing your clusters, and upgrades and rollbacks with zero downtime. No development stack, platform, or background is assumed. Author Elton Stoneman describes all patterns generically, so you can easily apply them to your applications and port them to other projects! about the technologyCreate apps that perform identically on your laptop, data center, and cloud! Kubernetes provides a consistent method for deploying applications on any platform, making it easy to grow. By efficiently orchestrating Docker containers, Kubernetes simplifies tasks like rolling upgrades, scaling, and self-healing. about the book Learn Kubernetes in a Month of Lunches is your guide to getting up and running with Kubernetes. You'll progress from Kubernetes basics to essential skills, learning to model, deploy, and manage applications in production. Exercises demonstrate how Kubernetes works with multiple languages and frameworks. You'll also practice with new apps, legacy code, and serverless functions. what's inside Deploying applications on Kubernetes clusters Understanding the Kubernetes app lifecycle, from packaging to rollbacks Self-healing and scalable apps Using Kubernetes as a platform for new technologies about the readerFor readers familiar with Docker and containerization. about the author Elton Stoneman is a Docker Captain, a 11-time Microsoft MVP, and the author of Learn Docker in a Month of Lunches.
£43.19
McGraw-Hill Education - Europe RHCSARHCE Red Hat Linux Certification Practice
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Donât Let the Real Test Be Your First Test!RHCSA/RHCE Red Hat Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) features 100+ hands-on labs, four complete practice exams, and three virtual machines. To help you understand the material, the labs and practice exams are accompanied by in-depth answer explanations. This practical guide covers all official objectives for Exams EX200 and EX300 and is the perfect companion to RHCSA/RHCE Red Hat Linux Certification Study Guide, Sixth Edition.Covers all exam topics, including: Virtual Machines and Automated Installations â Fundamental Command Line Skills â RHCSA-Level Security Options â The Boot Process â Linux Filesystem Administration â Package Table of ContentsChapter 1: Prepare for Red Hat Hands-on CertificationsChapter 2: Virtual Machines and Automated InstallationsChapter 3: Fundamental Command Line SkillsChapter 4: RHCSA-Level Security OptionsChapter 5: The Boot ProcessChapter 6: Linux Filesystem Administration Chapter 7: Package ManagementChapter 8: User AdministrationChapter 9: RHCSA-Level System Administration TasksChapter 10: A Security PrimerChapter 11: System Services and SELinuxChapter 12: RHCE Administrative TasksChapter 13: Electronic MailChapter 14: The Apache Web ServerChapter 15: The Samba File ServerChapter 16: More File Sharing Services Chapter 17: Administrative Services: DNS, NTP, and Logging AppendicesAppendix A: Prepare a System for the Sample ExamsAppendix B: RHCSA: Sample Exam 1 Appendix C: RHCSA: Sample Exam 2Appendix D: RHCE: Sample Exam 1 Appendix E: RHCE: Sample Exam 2Appendix F: About the DVD
£20.80
Pearson Education (US) Microsoft Azure Monitoring Management
Book SynopsisAvinash Valiramani is an IT Infrastructure and Cloud Architect with more than 16 years of expertise in areas of Microsoft Technologies such as Microsoft Azure, Microsoft 365, Windows Server, Active Directory, Microsoft Exchange, SCCM, Intune, and Hyper-V. He is a certified Architect on Azure Infrastructure, Azure Artificial Intelligence, Azure Security, and Microsoft365. He has been working primarily with large to mid-size enterprises globally in designing their Cloud Architecture, planning migration strategies and executing complex implementations. Avinash is publishing four books as part of the Microsoft Azure Best Practices series, including this current one, collating real-world experiences to deliver a comprehensive and concise experience for new and budding technologists. Avinash also holds certifications in Amazon AWS, Barracuda, Citrix, VMware, and many other IT/Security industry certifications to complement his Microsoft expertise. He has authored a course on Azure VTable of ContentsIntroduction to Azure monitoring and management services Chapter 1 Azure Backup Chapter 2 Azure Site Recovery Chapter 3 Azure Migrate Chapter 4 Azure Monitor Chapter 5 Azure Network Watcher Chapter 6 Azure Portal Chapter 7 Azure Cloud Shell Chapter 8 Azure Service Health Chapter 9 Azure Cost Management
£27.19
Pearson Education (US) Microsoft Azure Storage
Book SynopsisTable of ContentsChapter 1 Azure Blob Storage Chapter 2 Azure Files Chapter 3 Azure Managed Disks Chapter 4 Azure Queue Storage Chapter 5 Azure Data Box Chapter 6 Azure Data Share
£27.19
Pearson Education (US) Microsoft Azure Sentinel
Book SynopsisYuri Diogenes, MsC holds a Master of Science in cybersecurity intelligence and forensics investigation from UTICA College and is currently working on his Ph.D. in cybersecurity leadership from Capitol Technology University. Yuri has been working at Microsoft since 2006 and currently is a principal program manager for the CxE Microsoft Defender for Cloud Team. Yuri has published a total of 26 books, mostly about information security and Microsoft technologies. Yuri is also a professor at EC-Council University, where he teaches in the Bachelor of Cybersecurity Program. Yuri is an MBA and holds many IT/Security industry certifications, such as CISSP, MITRE ATT&CK Cyber Threat Intelligence Certified, ECND, ECEH, ECSA, ECHFI, CompTIA Security+, CySA+, Network+, CASP, and CyberSec First Responder. You can follow Yuri on Twitter at @yuridiogenes. Nicholas DiCola is the Vice President of Customers at Zero Networks, where he leads the customer engineeTable of ContentsCHAPTER 1: Security challenges for SecOps CHAPTER 2: Introduction to Microsoft Sentinel CHAPTER 3: Analytics CHAPTER 4: Incident management CHAPTER 5: Hunting CHAPTER 6: Notebooks CHAPTER 7: Automating response CHAPTER 8: Data visualization CHAPTER 9: Data connectors APPENDIX A: Introduction to Kusto Query Language APPENDIX B: Microsoft Sentinel for managed security service providers
£23.99
Pearson Education (US) Insiders Guide to Cloud Computing An
Book SynopsisDavid Linthicum is on most top-10 lists of technology innovators and influencers, including cloud computing, edge computing, AI, and security technology. David is a best-selling author of more than 15 books and more than 7,000 published articles. He is also the originator of many business-related technology concepts, including enterprise application integration (EAI). He's an innovator within service-oriented architecture (SOA), and now cloud computing and the use of cloud computing for digital transformations. With his remarkable ability to design, explain, and implement technology solutions to solve existing business problems and create new opportunities, David rose rapidly through the corporate ranks from programmer to CEO, with stops in between that helped inform his holistic view of enterprises. Based in Washington, DC, David currently serves Global 2,000 clients as Deloitte's Chief Cloud Strategy Officer, where he drives new innovations anTable of ContentsChapter 1: How “Real” Is the Value of Cloud Computing? 2 What We Thought We Knew.. . . . . . . . . . . . . . . . . . . . . . . . 2 What Could Go Wrong?.. . . . . . . . . . . . . . . . . . . . . . . . . 12 What Went Right?.. . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Chapter 2: The Realities and Opportunities of Cloud-Based Storage Services That Your Cloud Provider Will Not Tell You About 22 Cloud Storage Evolves.. . . . . . . . . . . . . . . . . . . . . . . . . 22 Junk Data on Premises Moved to the Cloud Is Still Junk Data.. . . . . . . . . 23 Secrets to Finding the Best Cloud Storage Value. . . . . . . . . . . . . . . 33 The Future of Cloud Storage. . . . . . . . . . . . . . . . . . . . . . . 43 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Chapter 3: The Realities and Opportunities of Cloud-Based Compute Services That Your Cloud Provider Will Not Tell You About 44 The Trade-offs of Multitenancy.. . . . . . . . . . . . . . . . . . . . . . 45 CPU Performance, Meet the Internet. . . . . . . . . . . . . . . . . . . . 51 Paying Too Much for Cloud Compute? Here's Why.. . . . . . . . . . . . . . 57 Picking the Right Operating Systems.. . . . . . . . . . . . . . . . . . . 58 Picking the Right Memory Configurations.. . . . . . . . . . . . . . . . . . 59 The Concept of Reserved Instances.. . . . . . . . . . . . . . . . . . . . 59 Going Off-brand. . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Chapter 4: Innovative Services and Public Clouds: What Do You Really Pay For? 64 AI/ML.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Serverless.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 DevOps/DevSecOps.. . . . . . . . . . . . . . . . . . . . . . . . . . 75 Analytics.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Edge and IoT.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Emerging Technologies.. . . . . . . . . . . . . . . . . . . . . . . . . 87 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Chapter 5: Containers, Container Orchestration, and Cloud Native Realities 88 Containers.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Container Orchestration and Clustering.. . . . . . . . . . . . . . . . . . 93 Cloud Native. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Technology Meets Reality.. . . . . . . . . . . . . . . . . . . . . . . . 108 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Chapter 6: The Truths Behind Multicloud That Few Understand 110 Hybrid Cloud Realities. . . . . . . . . . . . . . . . . . . . . . . . . 110 The Move to Plural Public Clouds.. . . . . . . . . . . . . . . . . . . . 113 Multicloud Upside Realities.. . . . . . . . . . . . . . . . . . . . . . . 118 Multicloud Downside Realities.. . . . . . . . . . . . . . . . . . . . . . 124 Key Concepts for Multicloud Success. . . . . . . . . . . . . . . . . . . 127 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Chapter 7: Cloud Security Meets the Real World 132 An Insider's Guide to Cloud Security Fundamentals.. . . . . . . . . . . . . 133 What Cloud Security Worked.. . . . . . . . . . . . . . . . . . . . . . 137 What Cloud Security Didn't Work. . . . . . . . . . . . . . . . . . . . . 139 The Rise of Non-Native Cloud Security.. . . . . . . . . . . . . . . . . . 144 The Rise of Proactive Security.. . . . . . . . . . . . . . . . . . . . . . 147 The Rise of Security Automation.. . . . . . . . . . . . . . . . . . . . . 149 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Chapter 8: Cloud Computing and Sustainability: Fact Versus Fiction 152 Initial Thinking: Cloud Data Centers, Bad.. . . . . . . . . . . . . . . . . 155 The Politics of Sustainability.. . . . . . . . . . . . . . . . . . . . . . . 158 Finally, Sharing Is Possible.. . . . . . . . . . . . . . . . . . . . . . . 159 Green Application Development?. . . . . . . . . . . . . . . . . . . . . 166 Multicloud as a Sustainability Weapon?.. . . . . . . . . . . . . . . . . . 167 What Is Your Real Impact?.. . . . . . . . . . . . . . . . . . . . . . . 169 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Chapter 9: The Evolution of the Computing Market 172 Forced March to the Cloud?. . . . . . . . . . . . . . . . . . . . . . . 173 More Consumption, but Prices Stay Static.. . . . . . . . . . . . . . . . . 177 The Power of a Few Players.. . . . . . . . . . . . . . . . . . . . . . . 178 The Emergence of Commoditization.. . . . . . . . . . . . . . . . . . . 183 The Emergence of System Repatriation.. . . . . . . . . . . . . . . . . . 186 The Rise of Federated Cloud Applications and Data.. . . . . . . . . . . . . 188 Traditional Systems Remain…Why?.. . . . . . . . . . . . . . . . . . . 192 Battle for Human Talent. . . . . . . . . . . . . . . . . . . . . . . . . 193 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Chapter 10: Here's the Future of Cloud Computing from an Insider's Perspective…Be Prepared 198 Continued Rise of Complex Cloud Deployments.. . . . . . . . . . . . . . 199 Refocus on Cross-Cloud Systems.. . . . . . . . . . . . . . . . . . . . 202 Changing Skills Demands.. . . . . . . . . . . . . . . . . . . . . . . . 214 Cloud Security Shifts Focus.. . . . . . . . . . . . . . . . . . . . . . . 217 Cloud Computing Becomes Local.. . . . . . . . . . . . . . . . . . . . 219 Industry Clouds Become Important.. . . . . . . . . . . . . . . . . . . . 220 Where Is Edge Computing?.. . . . . . . . . . . . . . . . . . . . . . . 221 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Chapter 11: Wrapping Things Up: Miscellaneous Insider Insights 224 Cloud Can Make Life Better.. . . . . . . . . . . . . . . . . . . . . . . 224 Changes in the Skills Mix.. . . . . . . . . . . . . . . . . . . . . . . . 233 The Objectives Change.. . . . . . . . . . . . . . . . . . . . . . . . . 236 The Market Absorbs the Weak, and the Weak Emerge Again.. . . . . . . . . 237 Cloud Technology Continues to Be a Value Multiplier.. . . . . . . . . . . . 240 Call to Action.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241 9780137935697, TOC, 2/23/2023
£18.39
Vijay Madisetti Cloud Computing A HandsOn Approach
£34.00
John Wiley & Sons Inc Design and Analysis of Security Protocol for
Book SynopsisThe purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.Table of ContentsPreface xiii 1 History and Generations of Security Protocols 1Bright Keswani, Poonam Keswani and Rakhi Purohit 1.1 Introduction 2 1.2 Network Security 2 1.3 Historical Background of Network Security and Network Timeline 4 1.4 Internet Architecture and Security Aspects 5 1.4.1 IPv4 and IPv6 Architecture 6 1.4.1.1 Structure of IPv4 6 1.4.1.2 IPv6 Architecture 7 1.4.2 Attack Through IPv4 8 1.4.2.1 Internet Attacks Common Methods 8 1.4.2.2 Internet Security Technology 10 1.4.3 IPv6 IP Security Issues 11 1.5 Different Aspects of Security of the Network 12 1.6 Evolution of Security Protocols for Network 13 1.6.1 Understanding the Key Components of Network Security 13 1.6.2 A Deep Defense Strategy 14 1.6.3 How Does the Next Generation Network Security System Work Best 15 1.7 Network Security Protocols 17 1.7.1 Application Layer 17 1.7.1.1 Good Privacy (PGP) 17 1.7.1.2 Email/Multipurpose Security (S/MIME) 18 1.7.1.3 HTTP Secure (S-HTTP) 18 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer 19 1.7.1.5 Secure E-Commerce (SET) 19 1.7.1.6 Kerberos 19 1.7.2 Transport Layer 20 1.7.2.1 Secure Sockets Layer (SSL) 20 1.7.2.2 Transport Layer Security (TLS) 21 1.7.3 Network Layer 21 1.7.3.1 Internet Protocol Security (IPSec) 22 1.7.3.2 Virtual Private Network (VPN) 23 1.7.4 Data Link Layer 24 1.7.4.1 Point-to-Point Protocol (PPP) 24 1.7.4.2 Remote Authentication User Service (RADIO) 24 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) 25 1.8 Current Evolution of Red Security 25 1.8.1 Hardware Development 25 1.8.2 Software Development 27 1.9 Future Security Trends 27 References 27 2 Evolution of Information Security Algorithms 29Anurag Jagetiya and C. Rama Krishna 2.1 Introduction to Conventional Encryption 30 2.2 Classical Encryption Techniques 31 2.2.1 Substitution Based 32 2.2.1.1 Caesar Cipher 32 2.2.1.2 Monoalphabetic Cipher 32 2.2.1.3 Playfair Cipher 33 2.2.1.4 Polyalphabetic Cipher 35 2.2.2 Transposition Based 36 2.2.2.1 Simple Columnar 36 2.2.2.2 Rail Fence Cipher 37 2.3 Evolutions of Modern Security Techniques 38 2.3.1 Stream Cipher Algorithms 38 2.3.1.1 One Time Pad (OTP) 40 2.3.1.2 RC-4 41 2.3.1.3 A5/1 43 2.3.2 Block Cipher Algorithms 44 2.3.2.1 Feistel Cipher Structure 46 2.3.2.2 Data Encryption Standard (DES) 48 2.3.2.3 Triple Data Encryption Standard (TDES) 56 2.3.2.4 International Data Encryption Algorithm (IDEA) 58 2.3.2.5 Blowfish 60 2.3.2.6 CAST-128 62 2.4 Conclusion 66 References 67 Practice Set 67 Review Questions and Exercises 70 3 Philosophy of Security by Cryptostakes Schemes 79Hemant Kumar Saini 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) 79 3.2 RSA Algorithm 81 3.3 Security Analysis of RSA 84 3.4 Exponentiation in Modular Arithmetic 85 3.5 Distribution of Public Keys 87 3.6 Distribution of Secret Keys Using Public Key Cryptosystems 89 3.7 Discrete Logarithms 91 3.8 Diffie–Hellman Key Exchange 91 3.9 Review Exercise 93 References 94 4 Zero-Share Key Management for Secure Communication Across a Channel 95P. R. Mahalingam and K. A. Fasila 4.1 Introduction 95 4.2 Background 96 4.3 Zero-Share Key Management System 98 4.4 Simulation 100 4.5 Complexity and Analysis 103 4.6 Conclusion and Future Trends 106 References 107 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate 109Dharmendra G. Bhatti and Paresh V. Virparia 5.1 Introduction 109 5.1.1 Soft Computing for Intrusion Detection 111 5.1.2 False Positive 112 5.1.3 Reasons of False Positive 113 5.2 Existing Technology and Its Review 115 5.3 Research Design 118 5.3.1 Conceptual Framework 118 5.3.2 Preprocessing Module 121 5.3.3 Alert Monitoring Module 123 5.4 Results With Implications 124 5.4.1 Preprocessing Module Benchmark 126 5.4.2 Alert Monitoring Module Benchmark 129 5.4.3 Overall Benchmark 130 5.4.4 Test Bed Network Benchmark 131 5.5 Future Research and Conclusion 133 References 135 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis 141Rajdeep Chakraborty and J.K. Mandal 6.1 Introduction 141 6.2 Recursively Paired Arithmetic Technique (RPAT) 142 6.2.1 An Example of RPAT 144 6.2.2 Options of RPAT 145 6.2.3 Session Key Generation 146 6.3 Implementation and Simulation 147 6.4 Cryptanalysis 150 6.5 Simulation Based Results 152 6.6 Applications 152 6.7 Conclusion 153 Acknowledgment 153 References 153 7 Security Protocol for Multimedia Streaming 155N. Brindha, S. Deepa and S. Balamurugan 7.1 Introduction 156 7.1.1 Significance of Video Streaming 156 7.2 Existing Technology and Its Review 162 7.3 Methodology and Research Design 166 7.4 Findings 167 7.5 Future Research and Conclusion 169 References 169 8 Nature Inspired Approach for Intrusion Detection Systems 171Mohd Shahid Husain 8.1 Introduction 171 8.1.1 Types of Intrusion Detection Systems 172 8.2 Approaches Used for Intrusion Detection Systems 173 8.2.1 Intrusion Detection and Prevention Systems 173 8.2.2 Performance Criteria of Intrusion Detection Systems 174 8.3 Intrusion Detection Tools 175 8.4 Use of Machine Learning to Build Dynamic IDS/IPS 176 8.5 Bio-Inspired Approaches for IDS 178 8.6 Conclusion 179 References 181 9 The Socio-Behavioral Cipher Technique 183Harshit Bhatia, Rahul Johari and Kalpana Gupta 9.1 Introduction 183 9.2 Existing Technology 184 9.3 Methodology 186 9.3.1 Key Arrangement 187 9.3.2 Key Selection 188 9.3.3 Mathematical Operations 189 9.3.4 Algorithm 191 9.3.5 Encryption Operation 192 9.3.6 Decryption Operation 193 9.3.7 Mathematical Modeling 201 9.4 Conclusion: Future Scope and Limitations 205 References 208 10 Intrusion Detection Strategies in Smart Grid 211P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan 10.1 Introduction 212 10.2 Role of Smart Grid 212 10.3 Technical Challenges Involved in Smart Grid 213 10.4 Intrusion Detection System 216 10.5 General Architecture of Intrusion Detection System 217 10.6 Basic Terms in IDS 218 10.7 Capabilities of IDS 219 10.8 Benefits of Intrusion Detection Systems 219 10.9 Types of IDS 220 10.10 IDS in a Smart Grid Environment 222 10.10.1 Smart Meter 223 10.10.2 Metering Module 223 10.10.3 Central Access Control 224 10.10.4 Smart Data Collector 224 10.10.5 Energy Distribution System 225 10.10.6 SCADA Controller 225 10.11 Security Issues of Cyber-Physical Smart Grid 225 10.12 Protecting Smart Grid From Cyber Vulnerabilities 227 10.13 Security Issues for Future Smart Grid 229 10.14 Conclusion 230 References 230 11 Security Protocol for Cloud-Based Communication 235R. Suganya and S. Sujatha 11.1 Introduction 236 11.2 Existing Technology and Its Review 237 11.3 Methodology (To Overcome the Drawbacks of Existing Protocols) 238 11.4 Findings: Policy Monitoring Techniques 238 11.5 Future Research and Conclusion 240 Reference 241 12 Security Protocols for Mobile Communications 243Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S. 12.1 Introduction 244 12.2 Evolution of Mobile Communications 246 12.3 Global System for Mobiles (GSM) 248 12.4 Universal Mobile Telecommunications System (UMTS) 250 12.5 Long Term Evolution (LTE) 251 12.6 5G Wireless Systems 254 12.7 LoRA 257 12.8 5G Integrated With LoRA 258 12.9 Physical Layer Security and RFID Authentication 259 12.10 Conclusion 259 References 260 13 Use of Machine Learning in Design of Security Protocols 265M. Sundaresan and D. Boopathy 13.1 Introduction 266 13.2 Review of Related Literature 269 13.3 Joint and Offensive Kinetic Execution Resolver 271 13.3.1 Design of JOKER Protocol 273 13.3.2 Procedure 276 13.3.3 Procedure 278 13.3.4 Simulation Details and Parameters 279 13.3.4.1 Packet Delivering Ratio Calculation 279 13.3.4.2 Packet Loss Ratio Calculation 279 13.3.4.3 Latency (Delay) Calculation 279 13.3.4.4 Throughput Calculation 280 13.4 Results and Discussion 280 13.5 Conclusion and Future Scope 283 References 283 14 Privacy and Authentication on Security Protocol for Mobile Communications 287Brajesh Kumar Gupta “Mewadev” 14.1 Introduction 288 14.2 Mobile Communications 289 14.3 Security Protocols 291 14.4 Authentication 294 14.5 Next Generation Networking 298 14.6 Conclusion 302 References 303 15 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing 305Anjana Sangwan 15.1 Introduction 305 15.2 Need of Cloud Communication 306 15.3 Application 309 15.4 Cloud Communication Platform 310 15.5 Security Measures Provided by the Cloud 310 15.6 Achieving Security With Cloud Communications 312 15.7 Cryptographic Protocols for Secure Cloud Computing 314 15.8 Security Layer for the Transport Protocol 315 15.9 Internet Protocol Security (IPSec) 317 15.9.1 How IPsec Works 318 15.10 Kerberos 320 15.11 Wired Equivalent Privacy (WEP) 326 15.11.1 Authentication 326 15.12 WiFi Protected Access (WPA) 327 15.13 Wi-Fi Protected Access II and the Most Current Security Protocols 328 15.13.1 Wi-Fi Protected Access 329 15.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages 329 15.14 Wired Equivalent Privacy (WEP) 329 15.15 Wi-Fi Protected Access (WPA) 330 15.16 Conclusions 330 References 331 Index 333
£164.66
John Wiley & Sons Inc Windows Server Administration Fundamentals
Book SynopsisDid you know, 91% of hiring managers consider certification as part of their hiring requirements? IT Professionals who are new to the industry need a strong foundational understanding of the fundamentals before moving on towards more challenging technology certifications. This book covers everything you need to know about understanding how to manage windows servers and storage along with monitoring and troubleshooting servers as well. Written to the Windows Server Administration Fundamentals MTA Certification, it is a recommended entry point into IT certification. This book covers the basics of Windows Server Administration. Each chapter closes with a quiz to make sure you can practice exam questions and test your knowledge begore moving to the next section. We start by discussing what a server is and does by providing an in-depth overview including installation of Windows Server 2016. There are sections dedicated to the following: Preforming configurations and managing your WindowsTable of ContentsIntroduction xv Lesson 1 Server Overview 1 Understanding What a Server Does 3 Installing Windows Server 2016 31 Skill Summary 53 Knowledge Assessment 55 Competency Assessment 57 Proficiency Assessment 58 Lesson 2 Managing Windows Server 2016 59 Configuring Windows Server 2016 60 Configuring and Optimizing User Account Control (UAC) 69 Networking with Windows Server 2016 72 Managing Devices and Device Drivers 78 Managing Through Group Policies 86 Using Microsoft Management Console and Administrative Tools 86 Installing Programs, Roles and Features 91 Managing Services 94 Understanding the Registry 121 Managing Server Core 124 Summary Skill Matrix 126 Knowledge Assessment 128 Competency Assessment 130 Proficiency Assessment 131 Lesson 3 Managing Storage 133 Identifying Storage Technologies 134 Looking at Network Attached Storage and Storage Area Networks 140 Understanding Disk Structure 145 Using Disk Management Tools 149 Understanding Distributed File System (DFS) 159 Skill Summary 161 Knowledge Assessment 163 Competency Assessment 165 Proficiency Assessment 166 Lesson 4 Monitoring and Troubleshooting Servers 167 Managing IT 169 Introducing Troubleshooting Methodology 172 Using the Event Viewer 175 Booting the System 178 Understanding Performance 188 Introducing Business Continuity 200 Understanding Backups 204 Recovering Servers with WinRE 214 Skill Summary 219 Knowledge Assessment 222 Competency Assessment 224 Proficiency Assessment 224 Lesson 5 Essential Services 227 Naming Resolution 229 DHCP Services 234 Introducing Directory Services with Active Directory 237 Skill Summary 262 Knowledge Assessment 264 Competency Assessment 266 Proficiency Assessment 266 Lesson 6 File and Print Services 269 Introducing NTFS 270 Sharing Drives and Folders 282 Looking at Printers 286 Enabling Auditing 295 Skill Summary 299 Knowledge Assessment 302 Competency Assessment 304 Proficiency Assessment 305 Lesson 7 Popular Windows Network Services and Applications 307 Introducing the Web Server 309 Understanding Remote Access 324 Introducing Remote Administration 329 Understanding Server Virtualization 332 Skill Summary 342 Knowledge Assessment 344 Competency Assessment 346 Proficiency Assessment 347 Appendix Answer Key 349 Lesson 1: Server Overview 350 Lesson 2: Managing Windows 2016 352 Lesson 3: Managing Storage 354 Lesson 4: Monitoring and Troubleshooting Servers 357 Lesson 5: Essential Services 359 Lesson 6: File and Print Services 362 Lesson 7: Popular Windows Network Services and Applications 364 Index 369
£24.79
John Wiley & Sons Inc From Traditional Fault Tolerance to Blockchain
Book SynopsisTable of ContentsList of Figures xiii List of Tables xix Acknowledgments xxi Preface xxiii References xxix 1 Introduction 1 1.1 Basic Concepts and Terminologies for Dependable Computing 2 1.1.1 System Models 2 1.1.2 Threat Models 3 1.1.3 Dependability Attributes and Evaluation Metrics 6 1.2 Means to Achieve Dependability 9 1.2.1 Fault Avoidance 9 1.2.2 Fault Detection and Diagnosis 9 1.2.3 Fault Removal 10 1.2.4 Fault Tolerance 11 1.3 System Security 13 References 18 2 Logging and Checkpointing 21 2.1 System Model 22 2.1.1 Fault Model 23 2.1.2 Process State and Global State 23 2.1.3 Piecewise Deterministic Assumption 26 2.1.4 Output Commit 26 2.1.5 Stable Storage 27 2.2 Checkpoint-Based Protocols 27 2.2.1 Uncoordinated Checkpointing 27 2.2.2 Tamir and Sequin Global Checkpointing Protocol 29 2.2.3 Chandy and Lamport Distributed Snapshot Protocol 35 2.2.4 Discussion 38 2.3 Log Based Protocols 40 2.3.1 Pessimistic Logging 42 2.3.2 Sender-Based Message Logging 51 References 60 3 Recovery-Oriented Computing 63 3.1 System Model 65 3.2 Fault Detection and Localization 68 3.2.1 Component Interactions Modeling and Anomaly Detection 72 3.2.2 Path Shapes Modeling and Root Cause Analysis 76 3.2.3 Inference-Based Fault Diagnosis 80 3.3 Microreboot 89 3.3.1 Microrebootable System Design Guideline 90 3.3.2 Automatic Recovery with Microreboot 91 3.3.3 Implications of the Microrebooting Technique 92 3.4 Overcoming Operator Errors 93 3.4.1 The Operator Undo Model 94 3.4.2 The Operator Undo Framework 95 References 99 4 Data and Service Replication 103 4.1 Service Replication 105 4.1.1 Replication Styles 107 4.1.2 Implementation of Service Replication 109 4.2 Data Replication 111 4.3 Optimistic Replication 116 4.3.1 System Models 117 4.3.2 Establish Ordering among Operations 119 4.3.3 State Transfer Systems 122 4.3.4 Operation Transfer System 126 4.3.5 Update Commitment 131 4.4 CAP Theorem 136 4.4.1 2 out 3 139 4.4.2 Implications of Enabling Partition Tolerance 140 References 143 5 Group Communication Systems 147 5.1 System Model 149 5.2 Sequencer Based Group Communication System 152 5.2.1 Normal Operation 153 5.2.2 Membership Change 157 5.2.3 Proof of Correctness 165 5.3 Sender Based Group Communication System 166 5.3.1 Total Ordering Protocol 167 5.3.2 Membership Change Protocol 174 5.3.3 Recovery Protocol 183 5.3.4 The Flow Control Mechanism 190 5.4 Vector Clock Based Group Communication System 192 References 197 6 Consensus and the Paxos Algorithms 199 6.1 The Consensus Problem 200 6.2 The Paxos Algorithm 202 6.2.1 Algorithm for Choosing a Value 202 6.2.2 Algorithm for Learning a Value 204 6.2.3 Proof of Correctness 204 6.2.4 Reasoning of the Paxos Algorithm 206 6.3 Multi-Paxos 212 6.3.1 Checkpointing and Garbage Collection 213 6.3.2 Leader Election and View Change 214 6.4 Dynamic Paxos 216 6.4.1 Dynamic Paxos 217 6.4.2 Cheap Paxos 220 6.5 Fast Paxos 227 6.5.1 The Basic Steps 228 6.5.2 Collision Recovery, Quorum Requirement, and Value Selection Rule 229 6.6 Implementations of the Paxos Family Algorithms 235 6.6.1 Hard Drive Failures 236 6.6.2 Multiple Coordinators 236 6.6.3 Membership Changes 237 6.6.4 Limited Disk Space for Logging 241 References 242 7 Byzantine Fault Tolerance 245 7.1 The Byzantine Generals Problem 246 7.1.1 System Model 247 7.1.2 The Oral Message Algorithms 250 7.1.3 Proof of Correctness for the Oral Message Algorithms 260 7.2 Practical Byzantine Fault Tolerance 261 7.2.1 System Model 262 7.2.2 Overview of the PBFT Algorithm 263 7.2.3 Normal Operation of PBFT 265 7.2.4 Garbage Collection 267 7.2.5 View Change 268 7.2.6 Proof of Correctness 271 7.2.7 Optimizations 273 7.3 Fast Byzantine Agreement 277 7.4 Speculative Byzantine Fault Tolerance 278 7.4.1 The Agreement Protocol 279 7.4.2 The View Change Protocol 283 7.4.3 The Checkpointing Protocol 288 7.4.4 Proof of Correctness 288 References 290 8 Cryptocurrency and Blockchain 295 8.1 History of Cryptocurrency 295 8.2 Bitcoin 298 8.2.1 Decentralized Network and Architecture 301 8.2.2 Self-Contained Cryptography 302 8.2.3 Decentralized Data Structure 304 8.2.4 Decentralized Algorithms 313 8.3 Ethereum 317 8.3.1 Ethereum Computing Model 318 8.3.2 Block and Consensus 326 8.3.3 Tokenization 340 8.4 Attacks on Blockchain 342 References 347 9 Consensus Algorithms for Blockchain 349 9.1 Model on Blockchain Consensus 353 9.1.1 Requirements on Puzzle Design 354 9.1.2 Zero-Knowledge Proof 355 9.2 Proof of Work 356 9.3 Proof of Resources 357 9.3.1 Using Storage as Resource 357 9.3.2 Using Computing as Resource 359 9.4 Virtual Mining 360 9.4.1 PeerCoin PoS 360 9.4.2 Fixed-Epoch Time Based PoS Schemes 368 9.4.3 Proof of Elapsed Time 371 References 375 10 Blockchain Applications 377 10.1 The Value of Blockchain 378 10.1.1 Non-Functional Benefits 379 10.1.2 Functional Benefits 382 10.2 Blockchain-Enabled Cyber-Physical Systems 383 10.2.1 Cyber-Physical Systems 383 10.2.2 Application Categories 385 10.2.3 Blockchain-Enabled Operations in CPS 390 10.3 On Blockchain Throughput 398 10.3.1 On-Chain Approach 399 10.3.2 Off-Chain Approach 402 10.4 A Critical Look on Blockchain from Economy Perspective 408 10.4.1 Blockchain Technology from the Economic View 409 10.4.2 Economic Functions of Blockchain 412 10.4.3 Blockchain as a Financial Infrastructure 416 References 419 Index 427
£169.16
John Wiley & Sons Inc Microgrid Technologies
Book SynopsisMicrogrid technology is an emerging area, and it has numerous advantages over the conventional power grid. A microgrid is defined as Distributed Energy Resources (DER) and interconnected loads with clearly defined electrical boundaries that act as a single controllable entity concerning the grid. Microgrid technology enables the connection and disconnection of the system from the grid. That is, the microgrid can operate both in grid-connected and islanded modes of operation. Microgrid technologies are an important part of the evolving landscape of energy and power systems. Many aspects of microgrids are discussed in this volume, including, in the early chapters of the book, the various types of energy storage systems, power and energy management for microgrids, power electronics interface for AC & DC microgrids, battery management systems for microgrid applications, power system analysis for microgrids, and many others. The middle section of the book presents the power quality problTable of ContentsForeword xxi Acknowledgements xxiii 1 A Comprehensive Review on Energy Management in Micro-Grid System 1Sanjay Kumar, R. K. Saket, P. Sanjeevikumar and Jens Bo Holm-Nielsen 1.1 Introduction 2 1.2 Generation and Storage System in MicroGrid 6 1.2.1 Distributed Generation of Electrical Power 6 1.2.2 Incorporation of Electric Car in Micro-Grid as a Device for Backup 7 1.2.3 Power and Heat Integration in Management System 8 1.2.4 Combination of Heat and Electrical Power System 9 1.3 System of Energy Management 10 1.3.1 Classification of MSE 10 1.3.1.1 MSE Based on Conventional Sources 10 1.3.1.2 MSE Based on SSE 10 1.3.1.3 MSE Based on DSM 11 1.3.1.4 MSE Based on Hybrid System 11 1.3.2 Steps of MSE During Problem Solving 11 1.3.2.1 Prediction of Uncertain Parameters 12 1.3.2.2 Uncertainty Modeling 12 1.3.2.3 Mathematical Formulation 12 1.3.2.4 Optimization 13 1.3.3 Micro-Grid in Islanded Mode 13 1.3.3.1 Objective Functions and Constraints of System 13 1.3.4 Micro-Grid Operation in Grid-Connected Mode 14 1.3.4.1 Objective Functions and Constraints of the Systems 14 1.4 Algorithms Used in Optimizing Energy Management System 16 1.5 Conclusion 19 References 20 2 Power and Energy Management in Microgrid 25Jayesh J. Joglekar 2.1 Introduction 25 2.2 Microgrid Structure 26 2.2.1 Selection of Source for DG 27 2.2.1.1 Phosphoric Acid Fuel Cell (PAFC) 27 2.2.1.2 Mathematical Modeling of PAFC Fuel Cell 27 2.3 Power Flow Management in Microgrid 31 2.4 Generalized Unified Power Flow Controller (GUPFC) 33 2.4.1 Mathematical Modeling of GUPFC 34 2.5 Active GUPFC 38 2.5.1 Active GUPFC Control System 39 2.5.1.1 Series Converter 40 2.5.1.2 Shunt Converter 42 2.5.2 Simulation of Active GUPFC With General Test System 43 2.5.3 Simulation of Active GUPFC With IEEE 9 Bus Test System 43 2.5.3.1 Test Case: 1—Without GUPFC and Without Fuel Cell 45 2.5.3.2 Test Case: 2—Without GUPFC and With Fuel Cell 47 2.5.3.3 Test Case: 3—With GUPFC and Without Fuel Cell 48 2.5.3.4 Test Case: 4—With GUPFC and With Fuel Cell 49 2.5.3.5 Test Case: 5—With Active GUPFC 49 2.5.4 Summary 52 2.6 Appendix General Test System 53 2.6.1 IEEE 9 Bus Test System 53 References 55 3 Review of Energy Storage System for Microgrid 57G.V. Brahmendra Kumar and K. Palanisamy 3.1 Introduction 58 3.2 Detailed View of ESS 60 3.2.1 Configuration of ESS 60 3.2.2 Structure of ESS With Other Devices 60 3.2.3 ESS Classifications 62 3.3 Types of ESS 62 3.3.1 Mechanical ESS 62 3.3.2 Flywheel ESS 63 3.3.3 CAES System 64 3.3.4 PHS System 65 3.3.5 CES Systems 66 3.3.6 Hydrogen Energy Storage (HES) 67 3.3.7 Battery-Based ESS 68 3.3.8 Electrical Energy Storage (EES) System 71 3.3.8.1 Capacitors 71 3.3.8.2 Supercapacitors (SCs) 72 3.3.9 SMES 73 3.3.10 Thermal Energy Storage Systems (TESS) 74 3.3.10.1 SHS 75 3.3.10.2 Latent 75 3.3.10.3 Absorption 75 3.3.10.4 Hybrid ESS 76 3.4 Comparison of Current ESS on Large Scale 77 3.5 Importance of Storage in Modern Power Systems 77 3.5.1 Generation Balance and Fluctuation in Demand 77 3.5.2 Intermediate Penetration of Renewable Energy 77 3.5.3 Use of the Grid 80 3.5.4 Operations on the Market 80 3.5.5 Flexibility in Scheduling 80 3.5.6 Peak Shaving Support 80 3.5.7 Improve the Quality of Power 81 3.5.8 Carbon Emission Control 81 3.5.9 Improvement of Service Efficiency 81 3.5.10 Emergency Assistance and Support for Black Start 81 3.6 ESS Issues and Challenges 81 3.6.1 Selection of Materials 82 3.6.2 ESS Size and Cost 82 3.6.3 Energy Management System 83 3.6.4 Impact on the Environment 83 3.6.5 Issues of Safety 83 3.7 Conclusion 84 Acknowledgment 85 References 85 4 Single Phase Inverter Fuzzy Logic Phase Locked Loop 91Maxwell Sibanyoni, S.P. Daniel Chowdhury and L.J. Ngoma 4.1 Introduction 91 4.2 PLL Synchronization Techniques 92 4.2.1 T/4 Transport Delay PLL 95 4.2.2 Inverse Park Transform PLL 96 4.2.3 Enhanced PLL 97 4.2.4 Second Order Generalized Integrator Orthogonal Signal Generator Synchronous Reference Frame (SOGI-OSG SRF) PLL 98 4.2.5 Cascaded Generalized Integrator PLL (CGI-PLL) 99 4.2.6 Cascaded Delayed Signal Cancellation PLL 100 4.3 Fuzzy Logic Control 101 4.4 Fuzzy Logic PLL Model 103 4.4.1 Fuzzification 103 4.4.2 Inference Engine 105 4.4.3 Defuzzification 108 4.5 Simulation and Analysis of Results 110 4.5.1 Test Signal Generator 110 4.5.2 Proposed SOGI FLC PLL Performance Under Fault Conditions 113 4.5.2.1 Test Case 1 113 4.5.2.2 Test Case 2 114 4.5.2.3 Test Case 3 115 4.5.2.4 Test Case 4 115 4.5.2.5 Test Case 5 116 4.5.2.6 Test Case 6 117 4.6 Conclusion 118 Acknowledgment 118 References 119 5 Power Electronics Interfaces in Microgrid Applications 121Indrajit Sarkar 5.1 Introduction 122 5.2 Microgrid Classification 122 5.2.1 AC Microgrid 122 5.2.2 DC Microgrids 124 5.2.3 Hybrid Microgrid 126 5.3 Role of Power Electronics in Microgrid Application 127 5.4 Power Converters 128 5.4.1 DC/DC Converters 128 5.4.2 Non-Isolated DC/DC Converters 129 5.4.2.1 Maximum Power Point Tracking (MPPT) 130 5.4.3 Isolated DC/DC Converters 135 5.4.4 AC to DC Converters 137 5.4.5 DC to AC Converters 139 5.5 Conclusion 143 References 143 6 Reconfigurable Battery Management System for Microgrid Application 145Saravanan, S., Pandiyan, P., Chinnadurai, T., Ramji, Tiwari., Prabaharan, N., Senthil Kumar, R. and Lenin Pugalhanthi, P. 6.1 Introduction 146 6.2 Individual Cell Properties 147 6.2.1 Modeling of Cell 147 6.2.1.1 Second Order Model 147 6.2.2 Simplified Non-Linear Model 148 6.3 State of Charge 149 6.4 State of Health 150 6.5 Battery Life 150 6.6 Rate Discharge Effect 151 6.7 Recovery Effect 152 6.8 Conventional Methods and its Issues 152 6.8.1 Series Connected 152 6.8.2 Parallel Connected 154 6.9 Series-Parallel Connections 154 6.10 Evolution of Battery Management System 155 6.10.1 Necessity for Reconfigurable BMS 156 6.10.2 Conventional R-BMS Methods 156 6.10.2.1 First Design 157 6.10.2.2 Series Topology 158 6.10.2.3 Self X Topology 158 6.10.2.4 Dependable Efficient Scalable Architecture Method 159 6.10.2.5 Genetic Algorithm-Based Method 160 6.10.2.6 Graph-Based Technique 161 6.10.2.7 Power Tree-Based Technique 162 6.11 Modeling of Reconfigurable-BMS 163 6.12 Real Time Design Aspects 164 6.12.1 Sensing Module Stage 165 6.12.2 Control Module Stage 165 6.12.2.1 Health Factor of Reconfiguration 166 6.12.2.2 Reconfiguration Time Delay and Transient Load Supply 166 6.12.3 Actuation Module 167 6.12.3.1 Order of Switching 167 6.12.3.2 Stress and Faults of Switches 169 6.12.3.3 Determining Number of Cells in a Module 170 6.13 Opportunities and Challenges 171 6.13.1 Modeling and Simulation 171 6.13.2 Hardware Design 171 6.13.3 Granularity 171 6.13.4 Hardware Overhead 172 6.13.5 Intelligent Algorithms 172 6.13.6 Distributed Reconfigurable Battery Systems 172 6.14 Conclusion 173 References 173 7 Load Flow Analysis for Micro Grid 177P. Sivaraman, Dr. C. Sharmeela and Dr. S. Elango 7.1 Introduction 177 7.1.1 Islanded Mode of Operation 178 7.1.2 Grid Connected Mode of Operation 178 7.2 Load Flow Analysis for Micro Grid 179 7.3 Example 179 7.3.1 Power Source 180 7.4 Energy Storage System 180 7.5 Connected Loads 182 7.6 Reactive Power Compensation 182 7.7 Modeling and Simulation 182 7.7.1 Case 1 182 7.7.2 Case 2 184 7.7.3 Case 3 187 7.7.4 Case 4 189 7.7.5 Case 5 191 7.8 Conclusion 193 References 195 8 AC Microgrid Protection Coordination 197Ali M. Eltamaly, Yehia Sayed Mohamed, Abou-Hashema M. El-Sayed and Amer Nasr A. Elghaffar 8.1 Introduction 197 8.2 Fault Analysis 200 8.2.1 Symmetrical Fault Analysis 201 8.2.2 Single Line to Ground Fault 202 8.2.3 Line-to-Line Fault 204 8.2.4 Double Line-to-Ground Fault 206 8.3 Protection Coordination 208 8.3.1 Overcurrent Protection 209 8.3.2 Directional Overcurrent/Earth Fault Function 211 8.3.3 Distance Protection Function 214 8.3.4 Distance Acceleration Scheme 217 8.3.5 Under/Over Voltage/Frequency Protection 219 8.4 Conclusion 221 Acknowledgment 224 References 224 9 A Numerical Approach for Estimating Emulated Inertia With Decentralized Frequency Control of Energy Storage Units for Hybrid Renewable Energy Microgrid System 227Shubham Tiwari, Jai Govind Singh and Weerakorn Ongsakul 9.1 Introduction 228 9.2 Proposed Methodology 231 9.2.1 Response in Conventional Grids 231 9.2.2 Strategy for Digital Inertia Emulation in Hybrid Renewable Energy Microgrids 232 9.2.3 Proposed Mathematical Formulation for Estimation of Digital Inertia Constant for Static Renewable Energy Sources 235 9.3 Results and Discussions 238 9.3.1 Test System 238 9.3.2 Simulation and Study of Case 1 241 9.3.2.1 Investigation of Scenario A 241 9.3.2.2 Investigation of Scenario B 243 9.3.2.3 Discussion for Case 1 245 9.3.3 Simulation and Study of Case 2 246 9.3.3.1 Investigation of Scenario A 246 9.3.3.2 Investigation of Scenario B 248 9.3.3.3 Discussion for Case 2 250 9.3.4 Simulation and Study for Case 3 250 9.3.4.1 Discussion for Case 3 251 9.4 Conclusion 252 References 253 10 Power Quality Issues in Microgrid and its Solutions 255R. Zahira, D. Lakshmi and C.N. Ravi 10.1 Introduction 256 10.1.1 Benefits of Microgrid 257 10.1.2 Microgrid Architecture 257 10.1.3 Main Components of Microgrid 258 10.2 Classification of Microgrids 258 10.2.1 Other Classifications 259 10.2.2 Based on Function Demand 259 10.2.3 By AC/DC Type 259 10.3 DC Microgrid 260 10.3.1 Purpose of the DC Microgrid System 260 10.4 AC Microgrid 261 10.5 AC/DC Microgrid 262 10.6 Enhancement of Voltage Profile by the Inclusion of RES 263 10.6.1 Sample Microgrid 263 10.7 Power Quality in Microgrid 267 10.8 Power Quality Disturbances 270 10.9 International Standards for Power Quality 270 10.10 Power Quality Disturbances in Microgrid 271 10.10.1 Modeling of Microgrid 271 10.11 Shunt Active Power Filter (SAPF) Design 272 10.11.1 Reference Current Generation 274 10.12 Control Techniques of SAPF 276 10.13 SPWM Controller 277 10.14 Sliding Mode Controller 277 10.15 Fuzzy-PI Controller 278 10.16 GWO-PI Controller 279 10.17 Metaphysical Description of Optimization Problems With GWO 281 10.18 Conclusion 284 References 285 11 Power Quality Improvement in Microgrid System Using PSO-Based UPQC Controller 287T. Eswara Rao, Krishna Mohan Tatikonda, S. Elango and J. Charan Kumar 11.1 Introduction 288 11.2 Microgrid System 289 11.2.1 Wind Energy System 290 11.2.1.1 Modeling of Wind Turbine System 290 11.2.2 Perturb and Observe MPPT Algorithm 291 11.2.3 MPPT Converter 291 11.3 Unified Power Quality Conditioner 293 11.3.1 UPQC Series Converter 293 11.3.2 UPQC Shunt APF Controller 295 11.4 Particle Swarm Optimization 297 11.4.1 Velocity Function 297 11.4.2 Analysis of PSO Technique 298 11.5 Simulation and Results 299 11.5.1 Case 1: With PI Controller 300 11.5.2 Case 2: With PSO Technique 301 11.6 Conclusion 304 References 305 12 Power Quality Enhancement and Grid Support Using Solar Energy Conversion System 309CH. S. Balasubrahmanyam, Om Hari Gupta and Vijay K. Sood 12.1 Introduction 309 12.2 Renewable Energy and its Conversion Into Useful Form 312 12.3 Power System Harmonics and Their Cause 313 12.4 Power Factor (p.f.) and its Effects 316 12.5 Solar Energy System With Power Quality Enhancement (SEPQ) 317 12.6 Results and Discussions 320 12.6.1 Mode-1 (SEPQ as STATCOM) 320 12.6.2 Mode-2 (SEPQ as Shunt APF) 320 12.6.3 Mode-3 (SEPQ as D-STATCOM) 322 12.7 Conclusion 326 References 327 13 Power Quality Improvement of a 3-Phase-3-Wire Grid-Tied PV-Fuel Cell System by 3-Phase Active Filter Employing Sinusoidal Current Control Strategy 329Rudranarayan Senapati, Sthita Prajna Mishra, Rajendra Narayan Senapati and Priyansha Sharma 13.1 Introduction 330 13.2 Active Power Filter (APF) 333 13.2.1 Shunt Active Power Filter (ShPF) 334 13.2.1.1 Configuration of ShPF 334 13.2.2 Series Active Power Filter (SAF) 335 13.2.2.1 Configuration of SAF 336 13.3 Sinusoidal Current Control Strategy (SCCS) for APFs 337 13.4 Sinusoidal Current Control Strategy for ShPF 342 13.5 Sinusoidal Current Control Strategy for SAF 349 13.6 Solid Oxide Fuel Cell (SOFC) 353 13.6.1 Operation 354 13.6.2 Anode 355 13.6.3 Electrolyte 355 13.6.4 Cathode 356 13.6.5 Comparative Analysis of Various Fuel Cells 356 13.7 Simulation Analysis 356 13.7.1 Shunt Active Power Filter 358 13.7.1.1 ShPF for a 3-φ 3-Wire (3P3W) System With Non-Linear Loading 358 13.7.1.2 For a PV-Grid System (Constant Irradiance Condition) 360 13.7.1.3 For a PV-SOFC Integrated System 364 13.7.2 Series Active Power Filter 366 13.7.2.1 SAF for a 3-φ 3-Wire (3P3W) System With Non-Linear Load Condition 366 13.7.2.2 For a PV-Grid System (Constant Irradiance Condition) 368 13.7.2.3 For a PV-SOFC Integrated System 370 13.8 Conclusion 373 References 373 14 Application of Fuzzy Logic in Power Quality Assessment of Modern Power Systems 377V. Vignesh Kumar and C.K. Babulal 14.1 Introduction 378 14.2 Power Quality Indices 379 14.2.1 Total Harmonic Distortion 379 14.2.2 Total Demand Distortion 380 14.2.3 Power and Power Factor Indices 380 14.2.4 Transmission Efficiency Power Factor (TEPF) 381 14.2.5 Oscillation Power Factor (OSCPF) 382 14.2.6 Displacement Power Factor (DPF) 383 14.3 Fuzzy Logic Systems 383 14.4 Development of Fuzzy Based Power Quality Evaluation Modules 384 14.4.1 Stage I: Fuzzy Logic Based Total Demand Distortion 385 14.4.1.1 Performance of FTDDF Under Sinusoidal Situations 388 14.4.1.2 Performance of FTDDF Under Nonsinusoidal Situations 389 14.4.2 Stage II—Fuzzy Representative Quality Power Factor (FRQPF) 390 14.4.2.1 Performance of FRQPF Under Sinusoidal and Nonsinusoidal Situations 393 14.4.3 Stage III—Fuzzy Power Quality Index (FPQI) Module 395 14.4.3.1 Performance of FPQI Under Sinusoidal and Nonsinusoidal Situations 397 14.5 Conclusion 401 References 401 15 Applications of Internet of Things for Microgrid 405Vikram Kulkarni, Sarat Kumar Sahoo and Rejo Mathew 15.1 Introduction 405 15.2 Internet of Things 408 15.2.1 Architecture and Design 409 15.2.2 Analysis of Data Science 410 15.3 Smart Micro Grid: An IoT Perspective 410 15.4 Literature Survey on the IoT for SMG 411 15.4.1 Advanced Metering Infrastructure Based on IoT for SMG 414 15.4.2 Sub-Systems of AMI 414 15.4.3 Every Smart Meter Based on IoT has to Provide the Following Functionalities 416 15.4.4 Communication 417 15.4.5 Cloud Computing Applications for SMG 418 15.5 Cyber Security Challenges for SMG 419 15.6 Conclusion 421 References 423 16 Application of Artificial Intelligent Techniques in Microgrid 429S. Anbarasi, S. Ramesh, S. Sivakumar and S. Manimaran 16.1 Introduction 430 16.2 Main Problems Faced in Microgrid 431 16.3 Application of AI Techniques in Microgrid 431 16.3.1 Power Quality Issues and Control 432 16.3.1.1 Preamble of Power Quality Problem 432 16.3.1.2 Issues with Control and Operation of MicroGrid Systems 433 16.3.1.3 AI Techniques for Improving Power Quality Issues 434 16.3.2 Energy Storage System With Economic Power Dispatch 438 16.3.2.1 Energy Storage System in Microgrid 438 16.3.2.2 Need for Intelligent Approaches in Energy Storage System 440 16.3.2.3 Intelligent Methodologies for ESS Integrated in Microgrid 441 16.3.3 Energy Management System 444 16.3.3.1 Description of Energy Management System 444 16.3.3.2 EMS and Distributed Energy Resources 445 16.3.3.3 Intelligent Energy Management for a Microgrid 446 16.4 Conclusion 448 References 449 17 Mathematical Modeling for Green Energy Smart Meter for Microgrids 451Moloko Joseph Sebake and Meera K. Joseph 17.1 Introduction 451 17.1.1 Smart Meter 452 17.1.2 Green Energy 453 17.1.3 Microgrid 453 17.1.4 MPPT Solar Charge Controller 454 17.2 Related Work 454 17.3 Proposed Technical Architecture 456 17.3.1 Green Energy Smart Meter Architecture 456 17.3.2 Solar Panel 456 17.3.3 MPPT Controller 456 17.3.4 Battery 457 17.3.5 Solid-State Switch 457 17.3.6 Electrical Load 457 17.3.7 Solar Voltage Sensor 457 17.3.8 Batter Voltage Sensor 458 17.3.9 Current Sensor 458 17.3.10 Microcontroller 458 17.3.11 Wi-Fi Module 458 17.3.12 GSM/3G/LTE Module 459 17.3.13 LCD Display 459 17.4 Proposed Mathematical Model 459 17.5 Results 462 Conclusion 468 References 469 18 Microgrid Communication 471R. Sandhya and C. Sharmeela 18.1 Introduction 471 18.2 Reasons for Microgrids 473 18.3 Microgrid Control 474 18.4 Control Including Communication 474 18.5 Control with No Communication 475 18.6 Requirements 478 18.7 Reliability 478 18.8 Microgrid Communication 479 18.9 Microgrid Communication Networks 481 18.9.1 Wi-Fi 481 18.9.2 WiMAX-Based Network 482 18.9.3 Wired and Wireless-Based Integrated Network 482 18.9.4 Smart Grids 482 18.10 Key Aspects of Communication Networks in Smart Grids 483 18.11 Customer Premises Network (CPN) 483 18.12 Architectures and Technologies Utilized in Communication Networks Within the Transmission Grid 485 References 487 19 Placement of Energy Exchange Centers and Bidding Strategies for Smartgrid Environment 491Balaji, S. and Ayush, T. 19.1 Introduction 491 19.1.1 Overview 491 19.1.2 Energy Exchange Centers 492 19.1.3 Energy Markets 493 19.2 Local Energy Centers and Optimal Placement 495 19.2.1 Problem Formulation (Clustering of Local Energy Market) 496 19.2.2 Clustering Algorithm 496 19.2.3 Test Cases 497 19.2.4 Results and Discussions 498 19.2.5 Conclusions for Simulations Based on Modified K Means Clustering for Optimal Location of EEC 501 19.3 Local Energy Markets and Bidding Strategies 503 19.3.1 Prosumer Centric Retail Electricity Market 504 19.3.2 System Modeling 505 19.3.2.1 Prosumer Centric Framework 505 19.3.2.2 Electricity Prosumers 505 19.3.2.3 Modeling of Utility Companies 507 19.3.2.4 Modeling of Distribution System Operator (DSO) 507 19.3.2.5 Supply Function Equilibrium 507 19.3.2.6 Constraints 508 19.3.3 Solution Methodology 509 19.3.3.1 Game Theory Approach 509 19.3.3.2 Relaxation Algorithm 511 19.3.3.3 Bi-Level Algorithm 511 19.3.3.4 Simulation Results 512 19.3.3.5 Nikaido-Isoda Formulation 513 19.3.4 Case Study 513 19.3.4.1 Plots 514 19.3.4.2 Anti-Dumping 514 19.3.4.3 Macro-Control 514 19.3.4.4 Sensitivity Analysis 514 Conclusion 517 References 518 Index 521
£164.66
John Wiley & Sons Inc Mastering Windows Server 2022 with Azure Cloud
Book SynopsisExtend your on-premises Windows Server deployments to the cloud with Azure In Mastering Windows Server 2022 with Azure Cloud Services: IaaS, PaaS, and SaaS, 5-time Microsoft MVP Winner William Panek delivers a comprehensive and practical blueprint for planning, implementing, and managing environments that include Azure IaaS-hosted Windows Server-based workloads. You'll learn to use the expansive, hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, PaaS, and SaaS, and how to manage and secure Azure virtual machines running Windows Server 2022. This book also offers: Foundational explanations of core Azure capabilities, including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) Explorations of the tools you'll need to implement Azure solutions, including Windows Admin Center and PowerShell Examples of implementing identity in Hybrid scenarioTable of ContentsIntroduction xxi Chapter 1 Understanding Windows Server 2022 1 Features and Advantages of Windows Server 2022 1 Deciding Which Windows Server 2022 Version to Use 6 Deciding on the Type of Installation 13 Removed Features 17 The Bottom Line 20 Chapter 2 Understanding Virtualization 21 Introduction to Virtualization 21 Hyper-V Features 23 Hyper-V Architecture 28 Hyper-V Operating Systems 29 Linux and FreeBSD Image Deployments 29 Virtualization in Azure 30 The Bottom Line 30 Chapter 3 Installing and Configuring Hyper-V 31 Hyper-V Installation and Configuration 31 Hyper-V Requirements 31 Install the Hyper-V Role 32 Hyper-V in Server Manager 35 Using Hyper-V Manager 35 Configure Hyper-V Settings 36 Manage Virtual Switches 38 Managing Virtual Hard Disks 40 Configuring Virtual Machines 45 Creating and Managing Virtual Machines 45 Linux and FreeBSD Image Deployments 56 PowerShell Commands 59 The Bottom Line 62 Chapter 4 Installing Windows Server 2022 63 Installing the Windows Server 2022 OS 63 Installing with the Desktop Experience 63 Installing Windows Server 2022 Server Core 68 Activating and Servicing Windows 71 Key Management Service 71 Automatic Virtual Machine Activation 73 Active Directory-Based Activation 74 Servicing Windows Server 2022 74 Configuring Windows Server Updates 75 Windows Update 76 Using Windows Server Update Services 80 Understanding Features On Demand 93 The Bottom Line 94 Chapter 5 Understanding IP 97 Understanding TCP/IP 97 Details of the TCP/IP Model 97 How TCP/IP Layers Communicate 98 Understanding Port Numbers 98 Understanding IP Addressing 100 The Hierarchical IP Addressing Scheme 100 Understanding Network Classes 101 Subnetting a Network 104 Implementing Subnetting 105 An Easier Way to Apply Subnetting 110 Applying Subnetting the Traditional Way 114 Working with Classless Inter-Domain Routing 121 Supernetting 124 Understanding IPv6 124 IPv6 History and Need 124 New and Improved IPv6 Concepts 125 IPv6 Addressing Concepts 127 IPv6 Integration/Migration 132 The Bottom Line 136 Chapter 6 Implementing DNS 137 Introducing DNS 137 HOSTS File 138 Understanding Servers, Clients, and Resolvers 142 Understanding the DNS Process 142 Introducing DNS Database Zones 147 Understanding Primary Zones 148 Understanding Secondary Zones 149 Understanding Active Directory Integrated DNS 150 Understanding Stub Zones 152 GlobalName Zones 153 Zone Transfers and Replication 153 Advantages of DNS in Windows Server 2022 156 Background Zone Loading 157 Support for IPv6 Addresses 157 Support for Read-Only Domain Controllers 157 DNS Socket Pools 158 DNS Cache Locking 158 Response Rate Limiting 158 Unknown Record Support 159 IPv6 Root Hints 159 DNS Security Extensions 159 DNS Devolution 161 Record Weighting 161 Netmask Ordering 161 DnsUpdateProxy Group 161 DNS Policies 161 Introducing DNS Record Types 162 Start of Authority (SOA) Records 162 Name Server Records 164 Host Record 164 Alias Record 165 Pointer Record 165 Mail Exchanger Record 166 Service Record 166 Configuring DNS 167 Installing DNS 167 Load Balancing with Round Robin 168 Configuring a Caching-Only Server 168 Setting Zone Properties 168 Configuring Zones for Dynamic Updates 172 Delegating Zones for DNS 173 DNS Forwarding 174 Manually Creating DNS Records 175 DNS Aging and Scavenging 176 DNS PowerShell Commands 176 The Bottom Line 179 Chapter 7 Understanding Active Directory 181 Verifying the File System 181 Resilient File System (ReFS) 182 NTFS 183 Verifying Network Connectivity 185 Basic Connectivity Tests 185 Tools and Techniques for Testing Network Configuration 186 Understanding Active Directory 188 Domains 188 Trees 188 Forests 189 Understanding Domain and Forest Functionality 189 About the Domain Functional Level 190 About Forest Functionality 191 Planning the Domain Structure 193 Installing Active Directory 193 Improved Active Directory Features 194 Read-Only Domain Controllers 194 Active Directory Prerequisites 194 The Installation Process 194 Installing Additional Domain Controllers by Using Install from Media 201 Verifying Active Directory Installation 201 Using Event Viewer 201 Using Active Directory Administrative Tools 203 Testing from Clients 204 Creating and Configuring Application Data Partitions 206 Creating Application Data Partitions 206 Managing Replicas 207 Removing Replicas 208 Using ntdsutil to Manage Application Data Partitions 208 Configuring DNS Integration with Active Directory 210 The Bottom Line 211 Chapter 8 Administering Active Directory 213 Active Directory Overview 213 Understanding Active Directory Features 214 Understanding Security Principals 215 An Overview of OUs 216 The Purpose of OUs 217 Benefits of OUs 217 Planning the OU Structure 217 Logical Grouping of Resources 218 Understanding OU Inheritance 219 Delegating Administrative Control 220 Applying Group Policies 221 Creating OUs 221 Managing OUs 224 Moving, Deleting, and Renaming OUs 225 Administering Properties of OUs 225 Delegating Control of OUs 227 Creating and Managing Active Directory Objects 228 Overview of Active Directory Objects 229 Managing Object Properties 235 Understanding Groups 238 Filtering and Advanced Active Directory Features 240 Moving, Renaming, and Deleting Active Directory Objects 241 Resetting an Existing Computer Account 242 Understanding Dynamic Access Control 243 Managing Security and Permissions 244 Publishing Active Directory Objects 245 Making Active Directory Objects Available to Users 245 Publishing Printers 245 Publishing Shared Folders 246 PowerShell for Active Directory 247 The Bottom Line 248 Chapter 9 Configuring DHCP 249 Understanding DHCP 249 Introducing the DORA Process 250 Advantages and Disadvantages of DHCP 251 Ipconfig Lease Options 252 Understanding Scope Details 253 Installing and Authorizing DHCP 255 Installing DHCP 255 Introducing the DHCP Snap-In 256 Authorizing DHCP for Active Directory 257 Creating and Managing DHCP Scopes 259 Creating a New Scope in IPv4 259 Creating a New Scope in IPv6 267 Changing Scope Properties (IPv4 and IPv6) 269 Changing Server Properties 270 Managing Reservations and Exclusions 272 Setting Scope Options for IPv4 274 Activating and Deactivating Scopes 276 Creating a Superscope for IPv4 276 Creating IPv4 Multicast Scopes 277 Integrating Dynamic DNS and IPv4 DHCP 279 Using DHCP Failover Architecture 281 Working with the DHCP Database Files 281 Working with Advanced DHCP Configuration Options 283 Implement DHCPv6 283 Configure High Availability for DHCP, Including DHCP Failover and Split Scopes 284 Configure DHCP Name Protection 286 PowerShell Commands 287 The Bottom Line 289 Chapter 10 Building Group Policies 291 Introducing Group Policy 291 Understanding Group Policy Settings 292 The Security Settings Section of the GPO 295 Client-Side Extensions 296 Group Policy Objects 296 Group Policy Inheritance 297 Planning a Group Policy Strategy 298 Implementing Group Policy 298 Creating GPOs 299 Linking Existing GPOs to Active Directory 301 Forcing a GPO to Update 302 Managing Group Policy 303 Managing GPOs 303 Security Filtering of a Group Policy 304 Delegating Administrative Control of GPOs 306 Controlling Inheritance and Filtering Group Policy 307 Assigning Script Policies 308 Understanding the Loopback Policy 310 Managing Network Configuration 310 Configuring Network Settings 311 Automatically Enrolling User and Computer Certificates in Group Policy 311 Redirecting Folders 313 Managing GPOs with Windows PowerShell Group Policy Cmdlets 314 Item-Level Targeting 315 Back Up, Restore, Import, Copy, and Migration Tables 316 The Bottom Line 319 Chapter 11 Advanced Group Policy Options 321 Deploying Software Through a GPO 321 The Software Management Life Cycle 322 The Windows Installer 323 Deploying Applications 326 Implementing Software Deployment 328 Preparing for Software Deployment 328 Software Restriction Policies 329 Using AppLocker 329 Group Policy Slow Link Detection 329 Publishing and Assigning Applications 329 Applying Software Updates 331 Verifying Software Installation 332 Configuring Automatic Updates in Group Policy 332 Configuring Software Deployment Settings 333 The Software Installation Properties Dialog Box 333 Removing Programs 335 Microsoft Windows Installer Settings 337 Troubleshooting Group Policies 337 RSoP in Logging Mode 338 RSoP in Planning Mode 342 Using the gpresult.exe Command 342 Using the Group Policy Infrastructure Status Dashboard 343 The Bottom Line 343 Chapter 12 Understanding Cloud Concepts 345 Understand Cloud Concepts 345 Cloud Advantages 345 Understanding CapEx vs. OpEx 346 Understanding Different Cloud Concepts 348 Understanding the difference between IaaS, PaaS, and SaaS 349 Infrastructure as a Service 350 Platform as a Service 350 Software as a Service 351 Compare and Contrast the Service Types 352 The Bottom Line 353 Chapter 13 Configuring Azure 355 Understanding Azure Benefits 355 Azure Benefits 355 Understanding the Azure Dashboards 357 Using the Azure Dashboard 357 Configuring the Azure Portal Settings 366 The Bottom Line 372 Chapter 14 Understanding Azure Active Directory 373 Azure Active Directory 373 Understanding Azure AD 373 Self-Service Password Reset 392 The Bottom Line 394 Chapter 15 Creating a Hybrid Network 395 Creating a Hybrid Network 395 Password Hash Synchronization with Azure AD 396 Azure Active Directory Pass-Through Authentication 396 Federation with Azure AD 397 Common Identity Scenarios 399 Azure AD Connect 400 Implement Active Directory Federation Services 405 What Is a Claim? 406 AD FS in Windows Server 2022 409 Configuring a Web Application Proxy 411 Active Directory Federation Services Installation 413 AD FS and AD Connect 421 Planning Azure AD Authentication Options 423 Azure AD Multi-Factor Authentication 423 Azure AD Connect Sync—Understand and Customize Synchronization 426 Creating an Azure Recovery Policy 427 Model Apps 427 Automate Tasks in Recovery Plans 428 Run a Test Failover on Recovery Plans 429 Create a Recovery Plan 429 The Bottom Line 432 Chapter 16 Understanding Microsoft Endpoint 433 Using Microsoft Endpoint Manager 433 Understanding AutoPilot 440 Autopilot Benefits 441 Autopilot Prerequisites 441 Deployment Scenarios 443 Planning for Secure Applications Data on Devices 446 Configuring Managed Apps for Mobile Application Management (MAM) 446 Protecting Enterprise Data using Windows Information Protection (WIP) 449 The Bottom Line 458 Chapter 17 Configuring Security 459 Managing Windows Security 459 Windows Defender Security Center 460 Configuring Windows Firewall 463 Understanding Windows Firewall Basics 463 Windows Firewall with Advanced Security 464 Managing Security 469 Implementing Azure Windows Defender Advanced Threat Protection 469 Understanding Windows Defender Application Guard 471 Understanding Windows Defender Credential Guard 476 Implementing and Managing Windows Defender Exploit Guard 478 Using Windows Defender Application Control 481 The Bottom Line 482 Chapter 18 Creating Azure Policies 483 Azure Devices and Policies 483 Compliance Policies 484 Device Configuration Profiles 489 PowerShell Commands 492 The Bottom Line 494 Appendix The Bottom Line 495
£35.62
John Wiley & Sons Inc Convergence of Deep Learning in CyberIoT Systems
Book SynopsisCONVERGENCE OF DEEP LEARNING IN CYBER-IOT SYSTEMS AND SECURITY In-depth analysis of Deep Learning-based cyber-IoT systems and security which will be the industry leader for the next ten years. The main goal of this book is to bring to the fore unconventional cryptographic methods to provide cyber security, including cyber-physical system security and IoT security through deep learning techniques and analytics with the study of all these systems. This book provides innovative solutions and implementation of deep learning-based models in cyber-IoT systems, as well as the exposed security issues in these systems. The 20 chapters are organized into four parts. Part I gives the various approaches that have evolved from machine learning to deep learning. Part II presents many innovative solutions, algorithms, models, and implementations based on deep learning. Part III covers security and safety aspects with deep learning. Part IV details cyber-physical systems as welTable of ContentsPreface xvii Part I: Various Approaches from Machine Learning to Deep Learning 1 1 Web-Assisted Noninvasive Detection of Oral Submucous Fibrosis Using IoHT 3 Animesh Upadhyaya, Vertika Rai, Debdutta Pal, Surajit Bose and Somnath Ghosh 1.1 Introduction 3 1.2 Literature Survey 6 1.2.1 Oral Cancer 6 1.3 Primary Concepts 7 1.3.1 Transmission Efficiency 7 1.4 Propose Model 9 1.4.1 Platform Configuration 9 1.4.2 Harvard Architectural Microcontroller Base Wireless Communication Board 10 1.4.2.1 NodeMCU ESP8266 Microcontroller 10 1.4.2.2 Gas Sensor 12 1.4.3 Experimental Setup 13 1.4.4 Process to Connect to Sever and Analyzing Data on Cloud 14 1.5 Comparative Study 16 1.6 Conclusion 17 References 17 2 Performance Evaluation of Machine Learning and Deep Learning Techniques: A Comparative Analysis for House Price Prediction 21 Sajeev Ram Arumugam, Sheela Gowr, Abimala, Balakrishna and Oswalt Manoj 2.1 Introduction 22 2.2 Related Research 23 2.2.1 Literature Review on Comparing the Performance of the ML/DL Algorithms 23 2.2.2 Literature Review on House Price Prediction 25 2.3 Research Methodology 26 2.3.1 Data Collection 27 2.3.2 Data Visualization 27 2.3.3 Data Preparation 28 2.3.4 Regression Models 29 2.3.4.1 Simple Linear Regression 29 2.3.4.2 Random Forest Regression 30 2.3.4.3 Ada Boosting Regression 31 2.3.4.4 Gradient Boosting Regression 32 2.3.4.5 Support Vector Regression 33 2.3.4.6 Artificial Neural Network 34 2.3.4.7 Multioutput Regression 36 2.3.4.8 Regression Using Tensorflow—Keras 37 2.3.5 Classification Models 39 2.3.5.1 Logistic Regression Classifier 39 2.3.5.2 Decision Tree Classifier 39 2.3.5.3 Random Forest Classifier 41 2.3.5.4 Naïve Bayes Classifier 41 2.3.5.5 K-Nearest Neighbors Classifier 42 2.3.5.6 Support Vector Machine Classifier (SVM) 43 2.3.5.7 Feed Forward Neural Network 43 2.3.5.8 Recurrent Neural Networks 44 2.3.5.9 LSTM Recurrent Neural Networks 44 2.3.6 Performance Metrics for Regression Models 45 2.3.7 Performance Metrics for Classification Models 46 2.4 Experimentation 47 2.5 Results and Discussion 48 2.6 Suggestions 60 2.7 Conclusion 60 References 62 3 Cyber Physical Systems, Machine Learning & Deep Learning— Emergence as an Academic Program and Field for Developing Digital Society 67 P. K. Paul 3.1 Introduction 68 3.2 Objective of the Work 69 3.3 Methods 69 3.4 Cyber Physical Systems: Overview with Emerging Academic Potentiality 70 3.5 ml and dl Basics with Educational Potentialities 72 3.5.1 Machine Learning (ML) 72 3.5.2 Deep Learning 73 3.6 Manpower and Developing Scenario in Machine Learning and Deep Learning 74 3.7 dl & ml in Indian Context 79 3.8 Conclusion 81 References 82 4 Detection of Fake News and Rumors in the Social Media Using Machine Learning Techniques With Semantic Attributes 85 Diganta Saha, Arijit Das, Tanmay Chandra Nath, Soumyadip Saha and Ratul Das 4.1 Introduction 86 4.2 Literature Survey 87 4.3 Proposed Work 88 4.3.1 Algorithm 89 4.3.2 Flowchart 90 4.3.3 Explanation of Approach 91 4.4 Results and Analysis 92 4.4.1 Datasets 92 4.4.2 Evaluation 93 4.4.2.1 Result of 1st Dataset 93 4.4.2.2 Result of 2nd Dataset 94 4.4.2.3 Result of 3rd Dataset 94 4.4.3 Relative Comparison of Performance 95 4.5 Conclusion 95 References 96 Part II: Innovative Solutions Based on Deep Learning 99 5 Online Assessment System Using Natural Language Processing Techniques 101 S. Suriya, K. Nagalakshmi and Nivetha S. 5.1 Introduction 102 5.2 Literature Survey 103 5.3 Existing Algorithms 108 5.4 Proposed System Design 111 5.5 System Implementation 115 5.6 Conclusion 120 References 121 6 On a Reference Architecture to Build Deep-Q Learning-Based Intelligent IoT Edge Solutions 123 Amit Chakraborty, Ankit Kumar Shaw and Sucharita Samanta 6.1 Introduction 124 6.1.1 A Brief Primer on Machine Learning 124 6.1.1.1 Types of Machine Learning 124 6.2 Dynamic Programming 128 6.3 Deep Q-Learning 129 6.4 IoT 130 6.4.1 Azure 130 6.4.1.1 IoT on Azure 130 6.5 Conclusion 144 6.6 Future Work 144 References 145 7 Fuzzy Logic-Based Air Conditioner System 147 Suparna Biswas, Sayan Roy Chaudhuri, Ayusha Biswas and Arpan Bhawal 7.1 Introduction 147 7.2 Fuzzy Logic-Based Control System 149 7.3 Proposed System 149 7.3.1 Fuzzy Variables 149 7.3.2 Fuzzy Base Class 154 7.3.3 Fuzzy Rule Base 155 7.3.4 Fuzzy Rule Viewer 156 7.4 Simulated Result 157 7.5 Conclusion and Future Work 163 References 163 8 An Efficient Masked-Face Recognition Technique to Combat with COVID- 19 165 Suparna Biswas 8.1 Introduction 165 8.2 Related Works 167 8.2.1 Review of Face Recognition for Unmasked Faces 167 8.2.2 Review of Face Recognition for Masked Faces 168 8.3 Mathematical Preliminaries 169 8.3.1 Digital Curvelet Transform (DCT) 169 8.3.2 Compressive Sensing–Based Classification 170 8.4 Proposed Method 171 8.5 Experimental Results 173 8.5.1 Database 173 8.5.2 Result 175 8.6 Conclusion 179 References 179 9 Deep Learning: An Approach to Encounter Pandemic Effect of Novel Corona Virus (COVID-19) 183 Santanu Koley, Pinaki Pratim Acharjya, Rajesh Mukherjee, Soumitra Roy and Somdeep Das 9.1 Introduction 184 9.2 Interpretation With Medical Imaging 185 9.3 Corona Virus Variants Tracing 188 9.4 Spreading Capability and Destructiveness of Virus 191 9.5 Deduction of Biological Protein Structure 192 9.6 Pandemic Model Structuring and Recommended Drugs 192 9.7 Selection of Medicine 195 9.8 Result Analysis 197 9.9 Conclusion 201 References 202 10 Question Answering System Using Deep Learning in the Low Resource Language Bengali 207 Arijit Das and Diganta Saha 10.1 Introduction 208 10.2 Related Work 210 10.3 Problem Statement 215 10.4 Proposed Approach 215 10.5 Algorithm 216 10.6 Results and Discussion 219 10.6.1 Result Summary for TDIL Dataset 219 10.6.2 Result Summary for SQuAD Dataset 219 10.6.3 Examples of Retrieved Answers 220 10.6.4 Calculation of TP, TN, FP, FN, Accuracy, Precision, Recall, and F1 score 221 10.6.5 Comparison of Result with other Methods and Dataset 222 10.7 Analysis of Error 223 10.8 Few Close Observations 223 10.9 Applications 224 10.10 Scope for Improvements 224 10.11 Conclusions 224 Acknowledgments 225 References 225 Part III: Security and Safety Aspects with Deep Learning 231 11 Secure Access to Smart Homes Using Biometric Authentication With RFID Reader for IoT Systems 233 K.S. Niraja and Sabbineni Srinivasa Rao 11.1 Introduction 234 11.2 Related Work 235 11.3 Framework for Smart Home Use Case With Biometric 236 11.3.1 RFID-Based Authentication and Its Drawbacks 236 11.4 Control Scheme for Secure Access (CSFSC) 237 11.4.1 Problem Definition 237 11.4.2 Biometric-Based RFID Reader Proposed Scheme 238 11.4.3 Reader-Based Procedures 240 11.4.4 Backend Server-Side Procedures 240 11.4.5 Reader Side Final Compute and Check Operations 240 11.5 Results Observed Based on Various Features With Proposed and Existing Methods 242 11.6 Conclusions and Future Work 245 References 246 12 MQTT-Based Implementation of Home Automation System Prototype With Integrated Cyber-IoT Infrastructure and Deep Learning–Based Security Issues 249 Arnab Chakraborty 12.1 Introduction 250 12.2 Architecture of Implemented Home Automation 252 12.3 Challenges in Home Automation 253 12.3.1 Distributed Denial of Service and Attack 254 12.3.2 Deep Learning–Based Solution Aspects 254 12.4 Implementation 255 12.4.1 Relay 256 12.4.2 DHT 11 257 12.5 Results and Discussions 262 12.6 Conclusion 265 References 266 13 Malware Detection in Deep Learning 269 Sharmila Gaikwad and Jignesh Patil 13.1 Introduction to Malware 270 13.1.1 Computer Security 270 13.1.2 What Is Malware? 271 13.2 Machine Learning and Deep Learning for Malware Detection 274 13.2.1 Introduction to Machine Learning 274 13.2.2 Introduction to Deep Learning 276 13.2.3 Detection Techniques Using Deep Learning 279 13.3 Case Study on Malware Detection 280 13.3.1 Impact of Malware on Systems 280 13.3.2 Effect of Malware in a Pandemic Situation 281 13.4 Conclusion 283 References 283 14 Patron for Women: An Application for Womens Safety 285 Riya Sil, Snatam Kamila, Ayan Mondal, Sufal Paul, Santanu Sinha and Bishes Saha 14.1 Introduction 286 14.2 Background Study 286 14.3 Related Research 287 14.3.1 A Mobile-Based Women Safety Application (I safe App) 287 14.3.2 Lifecraft: An Android-Based Application System for Women Safety 288 14.3.3 Abhaya: An Android App for the Safety of Women 288 14.3.4 Sakhi—The Saviour: An Android Application to Help Women in Times of Social Insecurity 289 14.4 Proposed Methodology 289 14.4.1 Motivation and Objective 290 14.4.2 Proposed System 290 14.4.3 System Flowchart 291 14.4.4 Use-Case Model 291 14.4.5 Novelty of the Work 294 14.4.6 Comparison with Existing System 294 14.5 Results and Analysis 294 14.6 Conclusion and Future Work 298 References 299 15 Concepts and Techniques in Deep Learning Applications in the Field of IoT Systems and Security 303 Santanu Koley and Pinaki Pratim Acharjya 15.1 Introduction 304 15.2 Concepts of Deep Learning 307 15.3 Techniques of Deep Learning 308 15.3.1 Classic Neural Networks 309 15.3.1.1 Linear Function 309 15.3.1.2 Nonlinear Function 309 15.3.1.3 Sigmoid Curve 310 15.3.1.4 Rectified Linear Unit 310 15.3.2 Convolution Neural Networks 310 15.3.2.1 Convolution 311 15.3.2.2 Max-Pooling 311 15.3.2.3 Flattening 311 15.3.2.4 Full Connection 311 15.3.3 Recurrent Neural Networks 312 15.3.3.1 LSTMs 312 15.3.3.2 Gated RNNs 312 15.3.4 Generative Adversarial Networks 313 15.3.5 Self-Organizing Maps 314 15.3.6 Boltzmann Machines 315 15.3.7 Deep Reinforcement Learning 315 15.3.8 Auto Encoders 316 15.3.8.1 Sparse 317 15.3.8.2 Denoising 317 15.3.8.3 Contractive 317 15.3.8.4 Stacked 317 15.3.9 Back Propagation 317 15.3.10 Gradient Descent 318 15.4 Deep Learning Applications 319 15.4.1 Automatic Speech Recognition (ASR) 319 15.4.2 Image Recognition 320 15.4.3 Natural Language Processing 320 15.4.4 Drug Discovery and Toxicology 321 15.4.5 Customer Relationship Management 322 15.4.6 Recommendation Systems 323 15.4.7 Bioinformatics 324 15.5 Concepts of IoT Systems 325 15.6 Techniques of IoT Systems 326 15.6.1 Architecture 326 15.6.2 Programming Model 327 15.6.3 Scheduling Policy 329 15.6.4 Memory Footprint 329 15.6.5 Networking 332 15.6.6 Portability 332 15.6.7 Energy Efficiency 333 15.7 IoT Systems Applications 333 15.7.1 Smart Home 334 15.7.2 Wearables 335 15.7.3 Connected Cars 335 15.7.4 Industrial Internet 336 15.7.5 Smart Cities 337 15.7.6 IoT in Agriculture 337 15.7.7 Smart Retail 338 15.7.8 Energy Engagement 339 15.7.9 IoT in Healthcare 340 15.7.10 IoT in Poultry and Farming 340 15.8 Deep Learning Applications in the Field of IoT Systems 341 15.8.1 Organization of DL Applications for IoT in Healthcare 342 15.8.2 DeepSense as a Solution for Diverse IoT Applications 343 15.8.3 Deep IoT as a Solution for Energy Efficiency 346 15.9 Conclusion 346 References 347 16 Efficient Detection of Bioweapons for Agricultural Sector Using Narrowband Transmitter and Composite Sensing Architecture 349 Arghyadeep Nag, Labani Roy, Shruti, Soumen Santra and Arpan Deyasi 16.1 Introduction 350 16.2 Literature Review 353 16.3 Properties of Insects 355 16.4 Working Methodology 357 16.4.1 Sensing 357 16.4.1.1 Specific Characterization of a Particular Species 357 16.4.2 Alternative Way to Find Those Previously Sensing Parameters 357 16.4.3 Remedy to Overcome These Difficulties 358 16.4.4 Take Necessary Preventive Actions 358 16.5 Proposed Algorithm 359 16.6 Block Diagram and Used Sensors 360 16.6.1 Arduino Uno 361 16.6.2 Infrared Motion Sensor 362 16.6.3 Thermographic Camera 362 16.6.4 Relay Module 362 16.7 Result Analysis 362 16.8 Conclusion 363 References 363 17 A Deep Learning–Based Malware and Intrusion Detection Framework 367 Pavitra Kadiyala and Kakelli Anil Kumar 17.1 Introduction 367 17.2 Literature Survey 368 17.3 Overview of the Proposed Work 371 17.3.1 Problem Description 371 17.3.2 The Working Models 371 17.3.3 About the Dataset 371 17.3.4 About the Algorithms 373 17.4 Implementation 374 17.4.1 Libraries 374 17.4.2 Algorithm 376 17.5 Results 376 17.5.1 Neural Network Models 377 17.5.2 Accuracy 377 17.5.3 Web Frameworks 377 17.6 Conclusion and Future Work 379 References 380 18 Phishing URL Detection Based on Deep Learning Techniques 381 S. Carolin Jeeva and W. Regis Anne 18.1 Introduction 382 18.1.1 Phishing Life Cycle 382 18.1.1.1 Planning 383 18.1.1.2 Collection 384 18.1.1.3 Fraud 384 18.2 Literature Survey 385 18.3 Feature Generation 388 18.4 Convolutional Neural Network for Classification of Phishing vs Legitimate URLs 388 18.5 Results and Discussion 391 18.6 Conclusion 394 References 394 Web Citation 396 Part IV: Cyber Physical Systems 397 19 Cyber Physical System—The Gen Z 399 Jayanta Aich and Mst Rumana Sultana 19.1 Introduction 399 19.2 Architecture and Design 400 19.2.1 Cyber Family 401 19.2.2 Physical Family 401 19.2.3 Cyber-Physical Interface Family 402 19.3 Distribution and Reliability Management in CPS 403 19.3.1 CPS Components 403 19.3.2 CPS Models 404 19.4 Security Issues in CPS 405 19.4.1 Cyber Threats 405 19.4.2 Physical Threats 407 19.5 Role of Machine Learning in the Field of CPS 408 19.6 Application 411 19.7 Conclusion 411 References 411 20 An Overview of Cyber Physical System (CPS) Security, Threats, and Solutions 415 Krishna Keerthi Chennam, Fahmina Taranum and Maniza Hijab 20.1 Introduction 416 20.1.1 Motivation of Work 417 20.1.2 Organization of Sections 417 20.2 Characteristics of CPS 418 20.3 Types of CPS Security 419 20.4 Cyber Physical System Security Mechanism—Main Aspects 421 20.4.1 CPS Security Threats 423 20.4.2 Information Layer 423 20.4.3 Perceptual Layer 424 20.4.4 Application Threats 424 20.4.5 Infrastructure 425 20.5 Issues and How to Overcome Them 426 20.6 Discussion and Solutions 427 20.7 Conclusion 431 References 431 Index 435
£153.00
John Wiley & Sons Inc Blockchain Technology in Corporate Governance
Book SynopsisBLOCKCHAIN TECHNOLOGY IN CORPORATE GOVERANCE This book investigates the recent applications of blockchain technology in financial services, energy sector, and summarizes regulatory responses, to set the scene for future work on corporate governance. This edited book highlights the current governance framework for the blockchain and its development as a self-governing framework. It discusses blockchain technology's effectiveness in developing solutions for supply chains, trade finance, and banking. Moreover, it shows how banking and financial institutions are the major beneficiaries of this decentralized technology. Furthermore, the book outlines the link between company governance theories, regulatory, ethical, and social controls, and blockchain adoption. It also investigates the recent applications of blockchain technology in financial services, the health sector, and the energy sector. Audience The book is specially designed for researchers, industriTable of ContentsForeword xvii Preface xix Acknowledgment xxi 1 Role of Blockchain Technology in the Modern Era 1Kuldeep Singh Kaswan, Jagjit Singh Dhatterwal, Kiran Sood and Balamurugan Balusamy Part 1: Blockchain: Opportunities for Healthcare 4.0 29 2 BTCG4: Blockchain Technology in Electronic Healthcare Systems 31Amrinder Singh and Geetika Madaan 3 Blockchain Technology and Healthcare: Towards Combating COVID-19 57Reena Malik and Sonal Trivedi 4 Blockchain-Based Energy-Efficient Heterogeneous Sensor Networks in Healthcare System 75R. Janarthanan and J. Venkatesh 5 Development of a Safe Health Framework Using a Temporary Blockchain Technique 99J. Venkatesh and R. Janarthanan 6 Data Consistency, Transparency, and Privacy in Healthcare Systems Using Blockchain Technology 125Kalaiselvi Rajendiran, Akshaya Sridhar and Ananda Vayaravel Cassinadane Part 2: Blockchain in the Energy@Sector 143 7 Application of Blockchain Technology in Sustainable Energy@Systems 145Navdeep Kaur, Suman Bhullar and Navneet Seth 8 Revamping Energy Sector with a Trusted Network: Blockchain@Technology 163Alain Aoun, Mazen Ghandour, Adrian Ilinca and Hussein Ibrahim Part 3: The Impact of Blockchain on the Financial Industry 197 9 Process Innovation and Unification of KYC Document Management System with Blockchain in Banking 199Priya Jindal, Jasmine Kaur and Kiran Sood 10 Applying Blockchain Technology to Address NPA Issues During the COVID-19 Pandemic 217Jasmine Kaur, Priya Jindal and Kiran Sood 11 Blockchain and Smart Contracts for Insurance Industry 239Rupa Khanna Malhotra, Chandan Gupta and Priya Jindal 12 How Blockchain Can Transform the Financial Services Industry 253Aashima and Birajit Mohanty 13 The Impact of Blockchain Technology and COVID-19 on the Global Banking Industry 283Jyoti Verma and Gagandeep 14 Blockchain-Based Framework -- A Scientific Tool for Developing a Robust Banking System 303Minakshi Thaman Part 4: Blockchain Applications and Sustainability Issues 325 15 Advanced Cryptographic Technologies in Blockchain 327Osheen Oberoi and Sahil Raj 16 Network Security Issues in Blockchain Architectures 353Keshav Kaushik 17 A Comprehensive Report on Blockchain Technology, Its Applications, and Open Research Challenges 369Shilpi Garg, Rajesh Kumar Kaushal and Naveen Kumar 18 New Blockchain Taxonomies and Trust Models Impacting Business@Performance 387Hani El Chaarani, Zouhour EL Abiad and Hebatallah Abd El Salam Badawy References 408 Index 413
£133.20
John Wiley & Sons Inc CompTIA Server Study Guide
Book SynopsisTable of ContentsIntroduction xxiii Assessment Test liv Answers to Assessment Test lxi Chapter 1 Server Hardware 1 Racking 3 Enclosure Sizes 3 Unit Sizes 3 Rack Layout 5 Power Cabling 14 Voltage 15 Redundant Power 18 Power Connector Types 23 Cable Management 25 Network Cabling 26 Redundant Networking 26 Twisted Pair 27 Fiber 30 Gigabit 31 10 GigE 31 Small Form- Factor Pluggable (SFP) 32 Sfp+ 32 Quad Small Form- Factor Pluggable (QSFP) 33 Cable Management 33 Server Chassis Types 35 Server Components 42 NICs 55 Summary 57 Exam Essentials 57 Review Questions 59 Chapter 2 Installing and Configuring Servers 63 Installing Server Operating Systems 67 Minimum Operating System (OS) Requirements 67 Hardware Compatibility List (HCL) 68 Installations 68 Partition and Volume Types 73 File System Types 75 Configuring and Maintaining Server Functions and Features 76 Server Roles Requirements 77 Data Migration and Transfer 96 Administrative Interfaces 97 The Purpose and Operation of Virtualization 98 Host vs. Guest 98 Virtual Networking 99 Resource Allocation and Provisioning 103 Management Interfaces for Virtual Machines 108 Cloud Models 110 Summary 111 Exam Essentials 111 Review Questions 112 Chapter 3 Server Maintenance 115 Given a Scenario, Perform Server Hardware Maintenance 117 Out- of- Band Management 117 Local Hardware Administration 122 Components 125 Drives 126 Hot- Swappable Hardware 129 Basic Input/Output System (BIOS)/Unified Extensible Firmware Interface (UEFI) 131 Explain Licensing Concepts 132 Models 132 Open Source 134 Subscription 135 License vs. Maintenance and Support 135 Volume Licensing 136 License Count Validation 136 Version Compatibility 136 Summary 137 Exam Essentials 137 Review Questions 138 Chapter 4 Storage Technologies and Asset Management 143 Given a Scenario, Deploy and Manage Storage 146 RAID Levels and Types 146 Capacity Planning 151 Hard Drive Media Types 153 Interface Types 157 Shared Storage 161 Explain the Importance of Asset Management and Documentation 165 Asset Management 166 Documentation Management 169 Document Availability 175 Secure Storage of Sensitive Documentation 175 Summary 175 Exam Essentials 176 Review Questions 177 Chapter 5 Identifying Fault Tolerance Requirements 181 Clustering 182 Active–Active 182 Active–Passive 183 Failover/Failback 183 Proper Patching Procedures 184 Heartbeat 184 Fault Tolerance 184 Server- Level Redundancy vs. Component Redundancy 185 Redundant Server Network Infrastructure 185 Load Balancing 185 Network Interface Card (NIC) Teaming and Redundancy 186 Summary 191 Exam Essentials 191 Review Questions 192 Chapter 6 Securing the Server 197 Summarize Physical Security Concepts 200 Physical Access Controls 200 Environmental Controls 206 Explain Data Security Risks and Mitigation Strategies 210 Security Risks 210 Mitigation Strategies 223 Given a Scenario, Apply Server Hardening Methods 226 OS Hardening 226 Application Hardening 228 Host Security 228 Hardware Hardening 230 Summary 238 Exam Essentials 238 Review Questions 239 Chapter 7 Securing Server Data and Network Access 243 Summarize Data Security Concepts 246 Encryption Paradigms 246 Vpn 248 IPsec 248 Retention Policies 249 Data Storage 249 UEFI/BIOS Passwords 250 Bootloader Passwords 251 Business Impact 251 Explain Important Concepts Pertaining to Identity and Access Management for Server Administration 252 User Accounts 252 Permissions and Access Controls 256 Auditing 261 Multifactor Authentication (MFA) 264 Single Sign- on (SSO) 265 Summarize Proper Server Decommissioning Concepts 265 Proper Removal Procedures 265 Media Destruction 266 Media Retention Requirements 268 Cable Remediation 268 Electronics Recycling 268 Summary 269 Exam Essentials 269 Review Questions 270 Chapter 8 Networking and Scripting 275 Given a Scenario, Configure Servers to Use Network Infrastructure Services 277 IP Configuration 277 Virtual Local Area Network (VLAN) 277 Default Gateways 279 Name Resolution 279 Addressing Protocols 285 Firewall 287 Static vs. Dynamic 293 MAC Addresses 296 Summarize Scripting Basics for Server Administration 297 Script Types 297 Environment Variables 299 Comment Syntax 299 Basic Script Constructs 299 Basic Data Types 301 Common Server Administration Scripting Tasks 301 Summary 302 Exam Essentials 303 Review Questions 304 Chapter 9 Disaster Recovery 309 Explain the Importance of Backups and Restores 311 Backup Methods 311 Backup Frequency 313 Media Rotation 313 Backup Media Types 315 File- Level vs. System- State Backup 317 Restore Methods 317 Backup Validation 318 Media Inventory Before Restoration 319 Explain the Importance of Disaster Recovery 319 Site Types 319 Replication 320 Testing 323 Summary 323 Exam Essentials 324 Review Questions 325 Chapter 10 Troubleshooting Hardware and Software Issues 329 Explain the Troubleshooting Theory and Methodology 334 Identify the Problem and Determine the Scope 334 Establish a Theory of Probable Cause (Question the Obvious) 336 Test the Theory to Determine the Cause 337 Establish a Plan of Action to Resolve the Problem 337 Implement the Solution or Escalate 338 Verify Full System Functionality and, if Applicable, Implement Preventive Measures 338 Perform a Root Cause Analysis 338 Document Findings, Actions, and Outcomes Throughout the Process 339 Given a Scenario, Troubleshoot Common Hardware Failures 339 Common Problems 339 Causes of Common Problems 351 Tools and Techniques 359 Given a Scenario, Troubleshoot Common OS and Software Problems 363 Common Problems 363 Causes of Common Problems 369 OS and Software Tools and Techniques 374 Summary 387 Exam Essentials 387 Review Questions 389 Chapter 11 Troubleshooting Network Connectivity and Security Issues 393 Given a Scenario, Troubleshoot Network Connectivity Issues 396 Common Problems 396 Causes of Common Problems 402 Tools and Techniques 411 Given a Scenario, Troubleshoot Security Problems 419 Common Problems 420 Causes of Common Problems 421 Security Tools 433 Summary 439 Exam Essentials 440 Review Questions 441 Chapter 12 Troubleshooting Storage Issues 445 Given a Scenario, Troubleshoot Storage Problems 447 Common Problems 447 Causes of Common Problems 458 Tools and Techniques 467 Summary 489 Exam Essentials 489 Review Questions 490 Appendix Answers to Review Questions 495 Chapter 1: Server Hardware 496 Chapter 2: Installing and Configuring Servers 497 Chapter 3: Server Maintenance 499 Chapter 4: Storage Technologies and Asset Management 501 Chapter 5: Identifying Fault Tolerance Requirements 502 Chapter 6: Securing the Server 504 Chapter 7: Securing Server Data and Network Access 506 Chapter 8: Networking and Scripting 508 Chapter 9: Disaster Recovery 509 Chapter 10: Troubleshooting Hardware and Software Issues 511 Chapter 11: Troubleshooting Network Connectivity and Security Issues 513 Chapter 12: Troubleshooting Storage Issues 515 Index 517
£35.62
John Wiley & Sons Inc MCA Windows Server Hybrid Administrator Complete
Book SynopsisYour 2-exams-in-1 study guide for the next-gen Windows Server 2022 certification In MCA Windows Server Hybrid Administrator Complete Study Guide: Exam AZ-800 and Exam AZ-801, five-time Microsoft MVP and veteran IT trainer William Panek delivers a one-stop resource to help you efficiently prepare for and pass the required exams for Microsoft's latest Windows Server certification. In the book, you'll learn to expertly administer Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The book provides hands-on explanations of all relevant Windows Server administration tasks, from security to migration, monitoring, troubleshooting, disaster recovery, and more. You'll also find: 100% coverage of the objectives of each of the exams required to access an in-demand and lucrative new certificationThe skills and tools you'll need to succeed as a newly minted Windows Server 2022 administratorComplimentary access to Sybex' superior interactive online learning environment and test bank, which offers hundreds of practice questions, flashcards, and a glossaryA practical and indispensable resource for anyone seeking to acquire the brand-new MCA Windows Server Hybrid Administrator certification, MCA Windows Server Hybrid Administrator Complete Study Guide also deserves a place in the libraries of aspiring and practicing network and system administrators looking for an actionable guide to on-premises, hybrid, and cloud Windows Server 2022 environments.Table of ContentsIntroduction xxxiii Assessment Test lii Chapter 1 Introduction to Windows Server 2022 1 Chapter 2 Understanding Hyper-V 29 Chapter 3 Installing Windows Server 2022 85 Chapter 4 Understanding IP 159 Chapter 5 Implementing DNS 209 Chapter 6 Configuring DHCP and IPAM 265 Chapter 7 Understanding Active Directory 337 Chapter 8 Understanding Group Policies 425 Chapter 9 Introduction to Microsoft Azure 465 Chapter 10 Understanding Azure Active Directory 499 Chapter 11 Configuring Storage 547 Chapter 12 Building an Azure Infrastructure 619 Chapter 13 Managing Data in a Hybrid Network 663 Chapter 14 Hybrid Data and Servers 743 Chapter 15 Implementing Security 785 Chapter 16 Understanding Monitoring 845 Chapter 17 Understanding Disaster Recovery 901 Appendix Answers to Review Questions 981 Index 1017
£52.50
John Wiley & Sons Inc Virtualization Essentials
Book SynopsisLearn the fundamental concepts and skills by building your own virtual machine Virtualization is more important than ever, it''s how the Cloud works! As virtualization continues to expand, millions of companies all over the world are leveraging virtualization. IT professionals need a solid understanding of virtualization concepts and software to compete in today''s job market. The updated new edition of Virtualization Essentials teaches you the core concepts and skills necessary to work with virtualization environments. Designed for new and aspiring IT professionals alike, this practical guide offers an applied, real-world approach to help you develop the necessary skill set to work in Cloud computing, the DevOps space, and the rest of the virtual world. Virtualization Essentials simplifies complex concepts to ensure that you fully understand what virtualization is and how it works within the computing environment. Step by step, you'll learn how to builTable of ContentsIntroduction xv Chapter 1 Understanding Virtualization 1 Describing Virtualization 1 Microsoft Windows Drives Server Growth 3 Explaining Moore’s Law 7 Understanding the Importance of Virtualization 10 Examining Today’s Trends 12 Virtualization and Cloud Computing 15 Hyperconverged Infrastructure 16 Understanding Virtualization Software Operation 17 Virtualizing Servers 17 Virtualizing Desktops 18 Virtualizing Applications 19 Chapter 2 Understanding Hypervisors 23 Describing a Hypervisor 23 Exploring the History of Hypervisors 24 Understanding Type 1 Hypervisors 25 Understanding Type 2 Hypervisors 27 Understanding the Role of a Hypervisor 28 Holodecks and Traffic Cops 28 Resource Allocation 30 Comparing Today’s Hypervisors 31 VMware ESX 31 Citrix Hypervisor (Xen) 33 Microsoft Hyper- V 35 Other Solutions 36 Chapter 3 Understanding Virtual Machines 39 Describing a Virtual Machine 39 Examining CPUs in a Virtual Machine 42 Examining Memory in a Virtual Machine 43 Examining Network Resources in a Virtual Machine 44 Examining Storage in a Virtual Machine 45 Understanding How a Virtual Machine Works 47 Working with Virtual Machines 49 Understanding Virtual Machine Clones 50 Understanding Templates 51 Understanding Snapshots 52 Understanding OVF 53 Understanding Containers 54 Chapter 4 Creating a Virtual Machine 57 Performing P2V Conversions 57 Investigating the Physical- to- Virtual Process 58 Hot and Cold Cloning 59 Loading Your Environment 60 Loading VMware Workstation Player 61 Exploring VMware Workstation Player 66 Loading VirtualBox 70 Building a New Virtual Machine 75 Thinking About VM Configuration 76 Creating a First VM 77 Chapter 5 Installing Windows on a Virtual Machine 83 Loading Windows into a Virtual Machine 83 Installing Windows 11 84 Installing VMware Tools 97 Understanding Configuration Options 102 Optimizing a New Virtual Machine 107 Chapter 6 Installing Linux on a Virtual Machine 111 Loading Linux into a Virtual Machine 111 Exploring Oracle VM VirtualBox 112 Installing Linux into a Virtual Machine 115 Installing VirtualBox Guest Additions 126 Understanding Configuration Options 129 Optimizing a New Linux Virtual Machine 135 Chapter 7 Managing CPUs for a Virtual Machine 139 Understanding CPU Virtualization 139 Configuring VM CPU Options 143 Tuning Practices for VM CPUs 145 Choosing Multiple vCPUs vs a Single vCPU 145 Hyperthreading 146 Working with Intel and AMD Servers 147 Chapter 8 Managing Memory for a Virtual Machine 151 Understanding Memory Virtualization 151 Configuring VM Memory Options 154 Tuning Practices for VM Memory 156 Calculating Memory Overhead 157 Memory Optimizations 158 Chapter 9 Managing Storage for a Virtual Machine 165 Understanding Storage Virtualization 165 Configuring VM Storage Options 171 Tuning VM Storage 179 Chapter 10 Managing Networking for a Virtual Machine 187 Understanding Network Virtualization 187 Configuring VM Network Options 198 Tuning Practices for Virtual Networks 203 Chapter 11 Copying a Virtual Machine 207 Cloning a Virtual Machine 207 Working with Templates 217 Saving a Virtual Machine State 221 Creating a Snapshot 224 Merging Snapshots 228 Chapter 12 Managing Additional Devices in Virtual Machines 231 Using Virtual Machine Tools 231 Understanding Virtual Devices 234 Configuring a CD/DVD Drive 234 Configuring a Floppy Disk Drive 235 Configuring a Sound Card 239 Configuring USB Devices 240 Configuring Graphic Displays 242 Configuring Other Devices 243 Chapter 13 Understanding Availability 249 Increasing Availability 249 Protecting a Virtual Machine 252 Protecting Multiple Virtual Machines 256 Protecting Data Centers 261 Chapter 14 Understanding Applications in a Virtual Machine 265 Examining Virtual Infrastructure Performance Capabilities 265 Deploying Applications in a Virtual Environment 270 Understanding Virtual Appliances and vApps 279 Open Stack and Containers 281 Cloud and the Future of Virtualization 282 Appendix: Answers to Additional Exercises 285 Glossary 295 Index 301
£26.24
O'Reilly Media TestDriven Infrastructure with Chef
Book SynopsisSince this book first appeared in mid-2011, infrastructure testing has begun to flourish in the web ops world. In this revised and expanded edition, author Stephen Nelson-Smith brings you up to date on this rapidly evolving discipline, including the philosophy driving it and a growing array of tools
£20.99
O'Reilly Media Learning Chef
Book SynopsisGet a hands-on introduction to the Chef, the configuration management tool for solving operations issues in enterprises large and small. Ideal for developers and sysadmins new to configuration management, this guide shows you to automate the packaging and delivery of applications in your infrastructure.
£23.99
O'Reilly Media Head First Kotlin
Book SynopsisHead First Kotlin is a complete introduction to coding in Kotlin. This hands-on book helps you learn the Kotlin language with a unique method that goes beyond syntax and how-to manuals and teaches you how to think like a great Kotlin developer.
£47.99
Createspace Cloud Computing A HandsOn Approach
£47.50
Microsoft Press,U.S. From IT Pro to Cloud Pro Microsoft Office 365 and
Book SynopsisModernize your IT skills for the new world of cloud computing! Whether you are an IT administrator, developer, or architect, cloud technologies are transforming your role. This guide brings together the knowledge you need to transition smoothly to Microsoft Office 365 cloud-only and hybrid environments. Microsoft MVP Ben Curry and leading cloud architect Brian Laws present specific, up-to-date guidance on administering key cloud technologies, including Microsoft Office 365, SharePoint Online, Azure AD, and OneDrive for Business. Microsoft cloud technology experts Ben Curry and Brian Laws show you how to: Anticipate and respond to the ways cloud technologies change your responsibilities, such as scripting key management tasks via Windows PowerShell Understand today’s new mix of essential “Cloud Pro” skills related to infrastructure, scripting, security, and networking Master modern cloud administration for Office 365 cloud and hybrid environments to deliver content and services, any time, on any device, from anywhere, and across organizational boundaries Administer and configure SharePoint Online, including services, site collections, and hybrid features Help secure client devices via Mobile Device Management for Office 365 Centrally manage user profiles, groups, apps, and social features Bridge Office 365 and on-premises environments to share identities and data Enforce governance, security, and compliance Table of ContentsContents Chapter 1 Getting started as an Office 365 cloud pro Becoming a cloud pro Living in a tenant world The rapid pace of change Preparing the network Getting started with Office 365 Chapter 2 PowerShell 101 for cloud pros Beyond the browser with Office 365 Microsoft Windows PowerShell fundamentals Prepare your environment for Office 365 PowerShell How to connect via PowerShell Work with Office 365 using PowerShell Chapter 3 Working with Azure Active Directory for Office 365 Azure Active Directory Identity scenarios Identity sync with Azure Active Directory Connect Configuring identity federation with Office 365 Chapter 4 SharePoint Online administration and configuration SharePoint Online architecture Understanding licensing, update channels, and tenant types Configuring SharePoint Online Site Collection administration Managed Metadata Service Search settings Chapter 5 Managing the client: OneDrive for Business, Office ProPlus, and Mobile Device Management for Office 365 Office 365 and the client Managing OneDrive for Business Managing Office ProPlus Protecting your data through Mobile Device Management for Office 365 Chapter 6 Hybrid Office 365 Hybrid Office 365 scenarios and considerations SharePoint hybrid solutions Publishing on-premises applications through Azure AD Surfacing on-premises data through Power BI Chapter 7 Social capabilities, Office 365 Groups, and apps Socializing in the cloud world Yammer Office 365 Groups Diving into Delve Office 365 Video Portal Know your roadmap Chapter 8 Managing governance, security, and compliance Service assurance Permissions Alerts Governance Chapter 9 Migrating content to SharePoint Online Use a methodology Migration scenarios and scope Migrating SharePoint and My Site content Change management and communication Running a migration project
£24.69
Manning Publications GraphQL in Action
Book SynopsisReduce bandwidth demands on your APIs by getting only the results you need—all in a single request! The GraphQL query language simplifies interactions with web servers, enabling smarter API queries that can hugely improve the efficiency of data requests. In GraphQL in Action, you’ll learn how to bring those benefits to your own APIs, giving your clients the power to ask for exactly what they need from your server, no more, no less. Practical and example-driven, GraphQL in Action teaches everything you need to get started with GraphQL—from design principles and syntax right through to performance optimization. When you’re done, you’ll have all the skills you need to get started writing and using scalable data APIs with GraphQL. Key Features · Define a GraphQL schema for relational and document databases · Query services and other APIs efficiently · Optimize GraphQL resolvers with data caching and batching · Cache a data graph for clients · Design GraphQL fragments that match UI components' data Requirements For web developers familiar with building client-server applications. About the technology By organizing data as types and fields, GraphQL gives apps complete control over what they’re requesting, resulting in faster transfer roundtrips, errors that are easier to spot, and virtually no need for clients to write time-consuming manual parsing code. Samer Buna has over 20 years of experience in software development including front-ends, back-ends, mobile apps, API design, databases, and scalability. He operates jsComplete.com.
£39.99
Manning Publications Data Engineeringon Azure
Book SynopsisThere's a big gap between running machine learning and data processes as prototypes, and deploying them to a production cloud environment. Data Engineering on Azure reveals the architectural, operational, and data management techniques that power cloud-based data infrastructure built on the Microsoft Azure platform. Data Engineering on Azure teaches you to build a scalable and robust data platform to industry-leading standards. All examples are based on the production big data platform that powers Microsoft's customer growth operations. You'll learn techniques and best practices that author Vlad Riscutia and his team use on a daily basis, including automation and DevOps, running a reliable machine learning pipeline, and managing your data inventory. Examples are illustrated with Azure. The patterns and techniques are transferable to other cloud platforms. About the TechnologyBuild secure, stable data platforms that can scale to loads of any size. When a project moves from the lab into production, you need confidence that it can stand up to real-world challenges. This book teaches you to design and implement cloud-based data infrastructure that you can easily monitor, scale, and modify. Trade Review"A definitive and complete guide on data engineering, with clear and easy-to-reproduce examples." Kelum Prabath Senanayake, Echoworx "An all-in-one Azure book, covering all a solutions architect or engineer needs to think about." Albert Nogués, Danone "A meaningful journey through the Azure ecosystem. You'll be building pipelines and joining components quickly!" Todd Cook, Appen "A gateway into the world of Azure for machine learning and DevOps engineers." Krzysztof Kamyczek, Luxoft
£39.99
Manning Publications Think Distributed Systems
£46.28
ISTE Ltd and John Wiley & Sons Inc Home Area Networks and IPTV
Book SynopsisThe field of Home Area Networks (HAN), a dedicated residential subset of LAN technologies for home-based use, is fast becoming the next frontier for the communications industry. This book describes the various technologies involved in the implementation of a HAN: high-speed Internet connections, indoor implementations, services, software, and management packages. It also reviews multimedia applications (which are increasingly the most important and complex aspects of most HANs) with a detailed description of IPTV technology. It highlights the main technologies used for HANs: information transmission by means of copper pairs, coaxial cables, fiber optics, and Wi-Fi radio systems, as well as the software systems necessary for the processing and management of these data communications. These technologies – examples of which include the well-known 802.11 family of standards, and less widespread applications such as the HomePlug powerline standard – are highly relevant to multimedia, remote healthcare, remote working, energy, and device management in the home. The book is written for engineers working in the field, or who are interested in high-speed communication technologies and their actual or potential use in the home or in the small – medium size enterprise (SME) commercial environment.Table of ContentsChapter 1. Services Offered by Home Area Networks 1 1.1. Why home networking? 1 1.2. Service convergence 2 1.3. IP or non-IP home area networks 8 1.4. Bibliography 11 1.5. Appendix: the uses of very high bit rates 11 Chapter 2. Receiving Television via Internet: IPTV 19 2.1. Introduction 20 2.2. Digital TV formats (DVB and MPEG standards) 20 2.3. Digital TV transmission through IP 29 2.4. IPTV: elements of the network 33 2.5. Set-top box (STB) hardware and software design 50 2.6. Bibliography 53 2.7. Appendix: notes on digital television 53 Chapter 3. Household Internet Connections 61 3.1. Network cables 61 3.2. Internet access by means of outdoor PLC 91 3.3. Fiber optics to the home (FTTH) 98 3.4. xDSL networks 120 3.5. High bit rate radio: satellite, WiMAX and LTE 144 3.6. Bibliography 152 Chapter 4. Home Area Network Technologies 155 4.1. Copper pair cables 155 4.2. The home network in coaxial cable 157 4.3. Home networks using indoor power line communications 160 4.4. LTE femtocells 165 4.5. Plastic optical fibers 167 4.6. WiFi home area networks 175 4.7. Home gateway 204 4.8. Bibliography 206 Chapter 5. Software Structure used in Home Area Networks 207 5.1. Characteristics of Home Area Networks 207 5.2. The digital leisure network: UPNP/DLNA 211 5.3. Home systems networks 226 Chapter 6. Software Structures in Use for Home Area Networks 237 6.1. Service gateways 237 6.2. Security in home systems and multimedia networks 242 6.3. Bibliography 245 Chapter 7. Service Platforms 247 7.1. Service platform for a managed network 247 7.2. Internet kiosk on an unmanaged network 252 7.3. Sharing resources 255 Glossary 259 Index 271
£132.00
Vibrant Publishers Cloud Computing Interview Questions You'll Most
Book Synopsis
£25.12
Wiley-VCH Verlag GmbH Microsoft SharePoint 2016 für Dummies
Book SynopsisEin Portal, das den Austausch und die Kollaboration enorm fördert, in dem alle wichtigen Informationen verfügbar sind und auf das man jederzeit und überall zugreifen kann - das ist Microsoft SharePoint. Ken Withee beschreibt in diesem Buch die vielen Möglichkeiten, die SharePoint bietet, und zeigt, wie Sie Arbeitsabläufe innerhalb Ihrer Firma optimieren. Ansprechpartner, Dokumente, Grafiken - alles ist übersichtlich und sicher hinterlegt. Projekte werden über Project Server gemeinsam organisiert. Die Version 2016 ist noch enger mit Office 365 verknüpft, der Zugriff auf die Daten ist bequem und einfach möglich.Table of ContentsÜber die Autoren 9 Einführung 23 Über dieses Buch 24 Törichte Annahmen über den Leser 24 Symbole, die in diesem Buch verwendet werden 25 Wie es weitergeht 26 Teil I Erste Schritte mit SharePoint 2016 27 Kapitel 1 SharePoint 2016 kennenlernen 29 SharePoint verstehen 29 Na gut, was genau ist denn nun SharePoint? 29 Ein Produkt von Microsoft 31 Viele verschiedene Definitionen für SharePoint 31 Mehr als nur eine Website 34 Die Bausteine von SharePoint 34 Ein erster Blick auf eine SharePoint-Site 35 Die Terminologie von SharePoint 37 Branding 37 Business Connectivity Services 37 Business Intelligence 37 eDiscovery 38 Identitätsverwaltung 38 Mobile Endgeräte 39 Datensatzverwaltung und Compliance 39 Suchen 40 Social Media 40 Web-Content-Management 40 Kapitel 2 Einführung in SharePoint Online 43 SharePoint Online kennenlernen 43 Warum SharePoint Online so populär wurde 45 Unterschiede zwischen SharePoint Online und lokalem SharePoint 45 Vorteile von SharePoint Online 47 Datencenter und Hardware 47 Softwareplattform 48 Datensicherung, Redundanz und Sicherheit 48 Kapitel 3 Die Funktionalitäten von SharePoint 49 Websitevorlagen 49 Zeig mir die Apps 51 Der Umgang mit Webseiten 51 Wiki-Seite 52 Webpartseite 52 Veröffentlichungsseite 52 Webparts verstehen 52 SharePoint-Features 53 SharePoint-Tools 54 Integration in Office 2016 54 Teil II Hinein ins Vergnügen mit SharePoint 2016 55 Kapitel 4 Die Teamwebsite 57 Eine SharePoint-Site erstellen 57 Eine SharePoint-Site anfordern 59 Die Teamwebsite im Browser anzeigen 60 Auf Teamwebsites in Office 365 zugreifen 62 Einführung in die SharePoint-Teamwebsite 64 Dokumente hochladen 65 Die Website freigeben 66 Organisation ist alles 67 Das Aussehen und Logo der Website ändern 67 Synchronisieren und zusammenarbeiten 68 Kapitel 5 Mit Webseiten arbeiten 69 Das Menüband 69 Webseiten in SharePoint 70 Die Wiki-Seite auswählen 70 Die Webpartseite auswählen 71 Wiki-Seite versus Webpartseite 72 Eine neue Wiki-Seite erstellen 72 Medien hinzufügen 74 Wiki-Seiten verwalten 75 Wiki-Seiten in Kategorien einordnen 76 Eine neue Webpartseite erstellen 78 Kapitel 6 Der Umgang mit Webparts 79 Ein Webpart in eine Webseite einfügen 79 Das richtige Webpart auswählen 81 Eigenschaften von Webparts ändern 85 Die Eigenschaften von Webparts 85 Eigenschaften von Webparts bearbeiten 86 Webparts minimieren oder löschen 86 Webparts verbinden 88 Kapitel 7 Der Umgang mit Apps 91 Einführung in SharePoint-Apps 91 Apps in eine Website einfügen 92 Zugriff auf App-Einstellungen 92 Allgemeine Einstellungen konfigurieren 96 Titel, Beschreibung und Navigation ändern 97 Versionsverwaltungseinstellungen 97 Erweiterte Einstellungen 100 Überprüfungseinstellungen 104 Bewertungseinstellungen 105 Benutzergruppenadressierung 106 Formulareinstellungen 106 Kapitel 8 Benutzerdefinierte Apps erstellen 107 Die benutzerdefinierte App planen 107 Eine benutzerdefinierte App erstellen 108 Spalten zu einer App hinzufügen 109 Spaltentypen kennenlernen 112 Dateneinträge überprüfen 114 Arbeiten mit der Titelspalte 116 Eine Kalkulationstabelle als App importieren 117 Apps der neuen Dimension: Berechnete Spalten und Nachschlagespalten 119 Eine berechnete Spalte anlegen 119 Eine Nachschlagespalte pflegen 121 Apps aus dem SharePoint Store herunterladen 122 Kapitel 9 Daten in Apps anzeigen 125 Die Ansicht der Ansicht 125 Die Formate von Ansichten 127 Eine Standardansicht erstellen 128 Spalten für die Ansicht auswählen 130 Apps durch Ansichten filtern 131 Ergebnisse gruppieren 132 App-Daten schnell mit QuickEdit bearbeiten 134 Ansichtsformatvorlage auswählen 136 App-Daten in einer Datenblattansicht verwalten 137 Ad-hoc-Ansichten 138 Eine Kalenderansicht erstellen 139 Aufgaben in einer Diagrammansicht anzeigen 140 Vorhandene Ansichten verwalten 141 Die Ansichten modifizieren 141 Die Standardansicht einstellen 142 Andere integrierte SharePoint-Ansichten 142 Ansichten in Webparts anzeigen 142 Teil III Werden Sie SharePoint-Administrator 145 Kapitel 10 Websiteeinstellungen 147 Die Websiteeinstellungen finden 147 Websiteeinstellungen 149 Benutzer und Berechtigungen 150 Web-Designer-Kataloge 150 Websiteverwaltung 152 Suchen 153 Aussehen und Verhalten 154 Websiteaktionen 156 Websitesammlungsverwaltung 156 Kapitel 11 Die Navigation für die Website konfigurieren 159 So wird Navigation in SharePoint konfiguriert 159 Die SharePoint-Navigation konfigurieren 160 Globale Navigation konfigurieren 160 Aktuelle Navigation konfigurieren 163 Statische Navigation konfigurieren 164 Navigation mit Webparts 166 Die verwaltete Navigation 167 Kapitel 12 SharePoint-Features 169 SharePoint-Features aus der Vogelperspektive 169 Features ein- und ausschalten 170 Häufig benutzte Features 171 SharePoint durch Features erweitern 172 Kapitel 13 Aussehen und Verhalten der Website ändern 173 Der Abschnitt Aussehen und Verhalten in den Websiteeinstellungen 173 Das Websitesymbol ändern 174 Den Look der Website ändern 176 Schriftarten 178 Benutzerfreundlichkeit 179 Die Vorteile der durchkomponierten Looks 180 Die Navigation der Teamwebsite ändern 180 Globale Navigation mit der oberen Navigationsleiste 182 Lokale Navigation mit der Schnellstartleiste 184 Kapitel 14 Sicherheit für die SharePoint-Site 187 SharePoint-Gruppen verwenden 187 Benutzer zu einer Gruppe hinzufügen 188 Die Berechtigungsstruktur verstehen 190 Sicherheit für die Websitesammlung 191 Sicherheit für Apps, Ordner, Dokumente und Elemente 193 Eigene Berechtigungen für eine Unterwebsite anlegen 193 Berechtigungen entfernen 194 Eigene Berechtigungen für eine App oder ein Dokument anlegen 195 Berechtigungsszenarios verwalten 197 Die Berechtigungen einer Gruppe anzeigen 197 Die Berechtigungen eines Nutzers prüfen 198 Administratorzugriff erteilen 200 Websiteberechtigungen anzeigen 201 SharePoint-Designerzugriff verwalten 204 Teil IV SharePoint macht sozial und mobil 205 Kapitel 15 Persönliches Profil und eigene Inhalte 207 Ihre persönlichen Inhalte mit OneDrive organisieren 207 Inhalte auf OneDrive speichern 209 Dokumente auf OneDrive hochladen oder erstellen 210 SharePoint-Aktivitäten im Newsfeed zusammenfassen 212 Einem Dokument auf einer anderen Website folgen 214 Bloggen 215 Lieblingswebsites im Auge behalten 216 Selbstdarstellung mit Profil 218 Ein ganzheitliches Profil 219 Das Profil ausfüllen 219 Kapitel 16 Getting Social 223 Mit dem Menüband Dinge freigeben und verfolgen 224 Für sich und andere Dinge kategorisieren 225 Informationen freigeben mit Blogs und Wikis 227 Eine Blogwebsite erstellen 227 Ein Blog mit Inhalt füttern 229 Zusammenarbeiten und Dokumente erstellen mit Wikis 229 Über Diskussionsrunden kommunizieren 232 Eine Diskussionsrunden-App erstellen 233 Ein Thema beginnen und beantworten 233 Durch Feeds, Microblogs und RSS mit anderen in Verbindung bleiben 234 Durch Feeds und Microblogs in Verbindung bleiben 235 RSS-Feeds anzeigen 236 RSS-Feeds mit Outlook lesen 238 RSS-Feeds anderer Websites anzeigen 238 Warn mich 241 In Sync mit Skype for Business 244 Kapitel 17 SharePoint macht mobil 247 SharePoint-Ansicht auf einem mobilen Gerät 247 Ansichten für kleine Bildschirme erstellen 248 Geräte über Kanäle ansteuern 249 Inhalt auf ein Smartphone pushen 249 Standorte verfolgen 250 Office-Dokumente auf dem Smartphone oder Tablet anzeigen 250 Teil V Content Management im Unternehmen 253 Kapitel 18 Inhalte freigeben und genehmigen 255 Dokumente freigeben 255 Dokumente in eine App laden 256 Ein einzelnes Dokument hochladen 257 Mehrere Dokumente hochladen 258 Dokumente in einen Ordner hochladen 262 Mit Dokumenten arbeiten 264 Verwendung der Auslassungszeichen 264 Eigenschaften eines Dokuments bearbeiten 266 Dokumente ein- und auschecken 267 Einen Link auf Ihr Dokument versenden 269 Dokumente im Browser anzeigen 270 Office 2016 verwenden 270 Gelöschte Dokumente wiederherstellen 271 Inhaltsgenehmigung konfigurieren 273 Die Inhaltsgenehmigung einschalten 274 Genehmigende Personen ausfindig machen 276 Der Genehmigungsprozess 276 Ablehnung: Nicht nur für strenge Eltern 277 Benachrichtigung bei Genehmigung oder Ablehnung erhalten 278 Kapitel 19 Suchen und Finden mit der Suchfunktion 279 So funktioniert die Suche in SharePoint 279 Inhalte suchen 280 Mit Anführungszeichen nach Zeichenfolgen suchen 280 Suchen mit Platzhaltern 281 Begriffe ein- und ausschließen 281 Zusammengesetzte Suchabfragen mit booleschen Operatoren 282 Klammerausdrücke 282 Begriffe in der Nähe suchen 283 Verschiedene Begriffe, dieselbe Bedeutung 283 Suchergebnisse anzeigen und verfeinern 284 Die Suche – des Benutzers bester Freund 285 Inhalte aus Suchergebnissen ausklammern 291 Analysedaten zu Suchvorgängen anzeigen 292 Eine Suchcenter-Website hinzufügen 292 Kapitel 20 Dokumente und Datensätze archivieren 295 Begriffsdefinitionen 295 Informationsverwaltungsrichtlinien erstellen 296 Ein Datenarchiv einrichten 300 Inhaltsorganisation verwenden 301 Datensätze an Ort und Stelle verwalten 304 Datensätze zur Beweissicherung in den Haltestatus versetzen 306 Kapitel 21 Mit Workflows alles unter Kontrolle 309 Loslegen mit SharePoint-Workflows 309 Workflows in SharePoint 2016 verstehen 310 Loslegen mit dem SharePoint Designer 313 Verbindung zu einer SharePoint-Site herstellen 313 Einen Workflow erstellen 314 Den Out-of-Box-Genehmigungsworkflow wiederentdecken 317 Inhaltsgenehmigung oder Genehmigungsworkflows verwenden? 317 Genehmigungsworkflows konfigurieren 318 Einen Genehmigungsworkflow einrichten 318 Optionen für den Genehmigungsworkflow 321 Einen Workflow starten 322 Ein Element genehmigen 324 Den Status von Workflows in einer App überprüfen 326 Den Status eines Genehmigungsworkflows überprüfen 326 Teil VI Office 365 und SharePoint Online 329 Kapitel 22 Eine öffentliche Website erstellen 331 Eine öffentliche Website erstellen 331 GoDaddy 332 Wix 332 Mit einer vorhandenen, öffentlichen SharePoint Online-Website arbeiten 333 Webseiten aktualisieren und hinzufügen 333 Was soll Ihre Website enthalten? 333 Eine neue Seite hinzufügen 334 Seiten bearbeiten 336 Eigenschaften der Seite aktualisieren 337 Das Aussehen und Design der Website ändern 337 Eine Vanity-Domäne verwenden 338 Kapitel 23 In SharePoint Online ein Kundenportal erstellen 341 Ihr Kundenportal planen 341 Das Portal absichern 343 Benutzerkonten verwalten 345 Ihr Portal in Betrieb nehmen 349 Teil VII Der Top-Ten-Teil 351 Kapitel 24 Zehn wichtige SharePoint 2016-Themen 353 Schnell mit SharePoint loslegen 353 Das Video »Was ist neu in SharePoint 2016« 353 Einblicke in SharePoint 2016 353 Planen von SharePoint 2016 354 Installieren und Konfigurieren von SharePoint 355 SharePoint 2016 betreiben und warten 355 SharePoint-Entwicklung 356 Workflow 357 SharePoint ausprobieren 357 Auf dem neuesten Stand bleiben: Der SharePoint-Blog 358 Kapitel 25 Zehn Elemente der Governance 359 Misserfolg ist keine Option (wegsehen und pfeifen auch nicht!) 359 Holen Sie sich Unterstützung vom Management 360 Bilden Sie eine schlagkräftige Governance-Arbeitsgruppe 360 Finden Sie das richtige Maß 360 Deins, Meins, Unser: Entscheiden, wem was gehört 361 Schauen Sie sich die Richtlinien für soziale Netzwerke (noch einmal) an 361 Design und Branding 362 Die Inhaltsverwaltung 362 Webparts wiederverwenden 362 Bleiben Sie aktuell: Weboperationsmanagement 363 Kapitel 26 Zehn Wege, ein SharePoint-Guru zu werden 365 Informationen von der Quelle bekommen 365 SharePoint-Blogs lesen 366 Lokale Benutzergruppen entdecken 367 Ein virtuelles Labor bauen 368 Auf einem soliden Fundament aufbauen 368 Von anderen »borgen« 369 Lassen Sie sich zertifizieren 369 Einen Blick unter die Haube werfen 369 Noch tiefer graben 370 Eine SharePoint-Website auseinandernehmen 370 Stichwortverzeichnis 371
£23.70
Wiley-VCH Verlag GmbH Windows Server für Dummies
Book SynopsisGanz gleich, ob Sie Einsteiger oder Umsteiger sind: Dieses Buch verschafft Ihnen einen guten Einblick in Windows Server und die Möglichkeiten, die Ihnen das komfortable und flexible Serverbetriebssystem von Microsoft gibt. Das Buch zeigt Ihnen, wie Sie das Betriebssystem installieren, aktivieren und einrichten, wie Sie Rollen und Features anlegen und verwalten, wie Sie eine Domäne erstellen und betreiben, wie Sie DNS und DHCP einrichten, wie Sie mit Hyper-V virtualisieren und vor allem wie Sie Ihre Daten sichern und die Prozesse überwachen. Willkommen in der Windows-Server-Welt!Table of ContentsÜber die Autoren 7 Einführung 17 Über dieses Buch 17 Was Sie nicht lesen müssen 18 Törichte Annahmen über den Leser 18 Wie dieses Buch aufgebaut ist 18 Teil I – Die Grundlagen des Windows-Servers 19 Teil II – Einrichtung und wichtige Rollen 19 Teil III – Das richtige Leben: Windows Server im Einsatz 19 Teil IV – Der Top-Ten- Teil 20 Symbole, die in diesem Buch verwendet werden 20 Wie es weitergeht 20 Teil I: Windows-Server- rundlagen 23 Kapitel 1 Windows-Server- Grundlagen 25 Das kleine 1x1 der Server 25 Hardware-Anforderungen 27 Hardware Compatibility List – HCL 29 Darf es ein bisschen mehr sein? Sizing des Servers 30 Kapitel 2 Wer zählt die Versionen und Editionen? 33 Server-Geschichte: Windows NT Server bis 2019 33 Windows Server 2019: Neuerungen und Vorteile 35 Editionen, Versionen und Service-Kanäle 36 Andere Welten (1): Windows-Subsystem für Linux 37 Andere Welten (2): Container, Docker, Kubernetes 39 Windows Server 2022 – die kommende Generation 40 Kapitel 3 Cloud und lokal 43 Installation: Cloud oder lokal? 43 Windows Server in der Azure Cloud 44 Alternative Cloud-Anbieter und deren Anbindungen 46 KAMP DHP 47 VPN-Zugriff in die Cloud 52 Kapitel 4 Fenster oder Konsole? 55 Windows-Oberfläche versus Kommandozeile 55 Was die Eingabeaufforderung so kann 57 Kommandozeile: Arbeiten direkt »am Prompt« 59 Kapitel 5 PowerShell und der Server 61 Wichtige PowerShell-Grundlagen 62 Begriffe und Besonderheiten der PowerShell 63 Erste Schritte zum eigenen Skript 67 Einige Informationen zu Objekten 67 Wichtig für viele Zwecke: Vergleichsoperatoren 70 Verzweigungen und Schleifen 73 Wie Sie ein Skript »zum Laufen« bringen 78 PowerShell in der Server-Verwaltung einsetzen 80 Prozesse finden und überwachen 80 Drucker im Griff behalten 83 Das Netzwerk und dessen Geräte 86 Teil II: Einrichtung und wichtige Rollen 93 Kapitel 6 Installation von Windows Server 95 Die Frage nach dem Boot-Medium 95 Schritt für Schritt: die Installation 97 Alternative: Core-Server installieren 101 Kapitel 7 Active Directory 105 Was ist überhaupt ein Active Directory? 106 Grundbegriffe rund um das Active Directory 107 Installation einer Active-Directory- Domäne 108 Erste Benutzer und Computer 113 Administrative Konten 118 Weiteren Domänencontroller in einer Domäne installieren 121 Replikation 126 Betriebsmasterrollen 128 Entfernung eines Domänencontrollers 130 Active-Directory- Verwaltung über den Client 132 Active-Directory- Papierkorb 133 Active-Directory- Verwaltungscenter 134 Gruppen, Benutzer, Container und OUs 136 Erstellung von Gruppen 138 Benutzer Gruppen zuweisen 140 Benutzerkontentypen 143 Standardbenutzerkonten und Gruppen 143 Rechte und Privilegien 145 Kapitel 8 DNS und DHCP 147 Grundlagen der Namensauflösung 147 Basiseinrichtung des DNS-Server- Diensts 150 DNS-Konfiguration 155 DNS-Stammhinweise wiederherstellen 157 Verwalten von DNS-Einträgen 158 Anlage einer Reverse-Lookupzone 159 Anlage eines Hosteintrags 160 Primärer und sekundärer DNS-Server 161 Zoneneigenschaften 165 Batch-Export von DNS-Einträgen 168 Microsoft-DNS- Server- Historie 170 Allgemeine DNS-Sicherheit 172 DNS absichern mit DNSSEC und DANE 172 Konfiguration von DNSSEC 173 Grundlagen von DHCP 178 APIPA 179 Installieren eines DHCP-Servers 180 DHCP-Reservierungen 183 DHCP-Optionen 186 DHCP-Failover 187 IPAM 190 Kapitel 9 Speicherdienste – Datei-Server 195 Platten und Storage 196 RAID, iSCSI-Zielserver und iSCSI-Initiator 196 iSCSI-Zielspeicheranbieter 201 Server für NFS 203 Freigaben, Datei-Server, Ressourcenmanager 207 Datendeduplizierung 214 DFS-Namespaces 217 DFS-Replikation 219 Grundlagen zu BranchCache für Datei-Server 221 Grundlagen zu Arbeitsordnern 223 Kapitel 10 Erweiterte Ressourcenfreigaben 225 Versteckte und administrative Freigaben 225 Dateifreigaben organisieren 228 Laufwerkfreigabe per Gruppenrichtlinie zuordnen 228 Lassen Sie sich nicht ausschließen 230 Vor Blicken schützen – ABE 231 Dynamic Access Control 233 Prüfung des effektiven Zugriffs 241 Kapitel 11 Hyper-V 245 Virtualisierung: Begriffe und Bestandteile 245 Vorteile beim Einsatz von Hyper-V 246 Einrichtung der Hyper-V- Rolle 247 Hyper-V konfigurieren 250 Manager für virtuelle Switches 254 Einrichten eines virtuellen Switches 255 Virtueller Switch und die PowerShell 257 Kapitel 12 Virtuelle Computer einsetzen 261 Anlegen einer virtuellen Maschine 261 Konfiguration der virtuellen Maschine 266 Kapitel 13 Windows und Linux als Gastsystem 277 Virtuelle Computer mit der PowerShell im Griff 283 Ein genauerer Blick auf die Prüfpunkte 285 Erstellen eines Prüfpunkts 286 Anwenden eines Prüfpunkts 288 Löschen eines Prüfpunkts 290 Ubuntu-Linux als Gastsystem 291 Kapitel 14 Druckdienste 297 Begrifflichkeiten 299 Installation von Druck-und Dokumentendiensten 301 Druckerserver in der Druckerverwaltung hinzufügen 305 Arbeiten mit Druckfiltern 305 Drucker in der Druckerverwaltung hinzufügen 307 Drucker bereitstellen 311 Drucker im-und exportieren 313 Druckaufträge im Spooler ansehen 314 Line Printer Daemon und Line Printer Remote 315 Druckertreiberisolation 316 Internetdrucken 317 Teil III: Windows-Server im Einsatz 321 Kapitel 15 Domänen-Beitritt 323 Vorbedingungen für den Domänen-Beitritt 323 Einbinden in die Domäne 327 Offline einer Domäne beitreten 329 Gruppenrichtlinien 333 Gruppenrichtlinienobjekt verknüpfen 338 Gruppenrichtlinienobjekt löschen 339 Gruppenrichtlinien und Gruppen 340 WMI-Filter 342 WMI Query Language 344 Zielgruppenadressierung 346 Administrative Vorlagen 349 Central Store 351 Handlungsempfehlung für Gruppenrichtlinien 352 Praktische Empfehlungen 354 Anmeldung am Computer verweigern 354 Desktophintergrundbild festlegen 357 Sicherheitsrelevante Gruppenrichtlinien 359 Standardbrowser per Gruppenrichtlinie 362 Office-VBA per Gruppenrichtlinie ausschalten 363 Softwareinstallation per Gruppenrichtlinie 365 Entfernen eines Pakets und Updates 367 Loopback 368 Programme per GPO sperren 368 Troubleshooting für Gruppenrichtlinien 370 Kapitel 17 Überwachung des Server-Betriebs 373 Der Server-Manager 373 Verwalten des lokalen Servers 377 Lokalen Server konfigurieren 379 Überblick über das Tools-Menü 381 Kapitel 18 Das Windows Admin Center 385 Was ist das Windows Admin Center (WAC)? 385 Installation 387 Konfiguration und erster Einsatz 390 Grundsätzliche Einstellungen und Erweiterungen 394 Weitere Einstellungen und Features 399 Kapitel 19 Windows-Server- Updates 405 Einstellungen und Features für die Updates 406 Update-Richtlinien verändern 414 Update-Einstellungen mittels sconfig ändern 416 Kapitel 20 Backup 419 Grundlagen der Sicherung und Wiederherstellung 420 Windows-Server- Sicherung 422 Einrichten von Backup-Jobs 423 Recovery-Medium nutzen 425 Einzelne Dateien wiederherstellen 426 Worum handelt es sich beim Azure-Backup- Dienst? 427 Kapitel 21 Ausfälle und deren Vermeidung 431 Vermeidung von Ausfällen 432 Windows aktuell halten 433 Applikationen aktuell halten 434 RAM-Test 435 Festplattenspeicherplatz beachten 436 Monitoring 437 PRTG 438 Nagios und Nagios XI 438 Syspectr 439 Kapitel 22 Fernzugriffe 441 Konsolenzugriffe 442 Microsoft Management Console (MMC) 445 Remote Desktop (RDP) 446 Dritthersteller-Tools 447 Kapitel 23 Troubleshooting 451 Erst die Ereignisanzeige – dann der Rest! 453 Eigene Dokumentationen 454 Server-Manager als Hilfestellung 455 IPv6 unterdrücken 456 Wo finde ich Unterstützung? 458 Teil IV: Der Top-Ten- Teil 461 Kapitel 24 Die 10 besten Server-Tools 463 Veeam Backup & Replication Community Edition 463 AD Replication Status Tool 463 Specops Password Auditor für Active Directory 463 Winscp 463 Microsoft Security Compliance Toolkit 1 0 (SCT) 464 WiseDateman Password Control 464 WireShark 464 RSAT 464 SysMon 464 SysInternals Suite (komplett) 464 Stichwortverzeichnis 467
£23.70
Wiley-VCH Verlag GmbH Linux-Server für Dummies
Book SynopsisLinux-Server aufsetzen, administrieren und absichern: Arnold Willemer zeigt Ihnen in diesem Buch, wie Sie Ihren Debian/GNU Linux oder Ubuntu Server von Anfang an gut im Griff haben. Schritt für Schritt erklärt er Ihnen, wie Sie den Server installieren, Laufwerke und Netzwerke einrichten und Benutzerkonten anlegen. Außerdem lernen Sie, wie Sie effizient mit der Shell arbeiten und per Remote-Zugriff administrieren. Einen weiteren großen Themenkomplex bildet die Sicherung von Daten, die Systemdiagnose sowie das Härten des Servers gegen Angreifer von außen. In weiteren Kapiteln erfahren Sie, wie Sie Datenbanken anlegen oder einen Dateiserver mit SAMBA einrichten. Und auch Mail- und Webserver kommen nicht zu kurz. Alle Themen werden anschaulich und von Grund auf erklärt, sodass Sie den Beschreibungen auch dann leicht folgen können, wenn Sie bisher noch nicht mit Linux-Servern gearbeitet haben. Zudem eignet sich dieses Buch auch hervorragend als Nachschlagewerk. So gerüstet steht Ihrem sicheren und performanten Server nichts mehr im Weg!Table of ContentsEinleitung 21 Teil I: Grundlagen von Linux 27 Kapitel 1: Linux 29 Kapitel 2: Die Shell 59 Kapitel 3: Editoren 67 Kapitel 4: Shell-Skripte 83 Kapitel 5: Administration per Fernsteuerung 95 Kapitel 6: Diagnose 103 Teil II: Hardware 111 Kapitel 7: Laufwerke, Datenspeicher und Dateisysteme 113 Kapitel 8: Netzwerk 137 Teil III: Datenbanken 163 Kapitel 9: Datenbanken 165 Teil IV: Internet-Server 179 Kapitel 10: Der Webserver Apache 181 Kapitel 11: Der Mailserver 197 Teil V: Dateiserver 213 Kapitel 12: SAMBA – die Windows-Connection 215 Kapitel 13: NFS – Network File System 229 Kapitel 14: Die eigene Cloud mit Nextcloud 243 Teil VI: Services im Intranet 259 Kapitel 15: Verzeichnisdienstprotokoll LDAP 261 Kapitel 16: Gemeinsam Texte im Wiki schreiben 269 Teil VII: Sicherheit 281 Kapitel 17: Verschlüsselung 283 Kapitel 18: Datensicherung 291 Teil VIII: Labor und virtuelle Maschinen 305 Kapitel 19: Netzwerklabor mit VirtualBox 307 Kapitel 20: Virtueller Router 319 Kapitel 21: Virtueller Server 331 Kapitel 22: Docker 337 Teil IX: Der Top-Ten-Teil 347 Kapitel 23: Die Top-10, warum man Linux als Server verwendet 349 Abbildungsverzeichnis 353 Stichwortverzeichnis 357
£22.46
Deployment Artist AB Deployment Fundamentals Vol 5: Building a Real-World Infrastructure with Windows Server
£52.25