Pro Active Directory Certificate ServicesIn order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of cryptography, digital signatures, encryption, TLS, and S/MIME. It is also important to understand the concepts behind public key infrastructure (PKI). This book teaches you all the required background knowledge you need. Then it takes you deeper, step by step, teaching you how to deploy Certificate Services and configure it to issue various digital certificate types, complete with examples of using these certificates with IIS, Outlook, and Windows.
Microsoft-based networks - on-premises, hybrid, and cloud-based networks - are used in companies of all sizes. Within them, there are many applications of digital certificates that can be created and managed by Microsoft Certificate Services. As security is more important than ever, and cryptography and PKI are fundamental to so many of these defenses, understanding Microsoft Certificate Services is becoming an increasingly more desirable ...
SQL Server Source Control BasicsFew software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone coordinate database upgrades with changes to the application. We also run the risk that our "ad hoc" database patching will cause inconsistencies and data loss. Source control can and should play a key role in the database development and deployment process, and this book will show you exactly how to get started. It provides 'just enough' detail about the core components of a source control system and how to incorporate that system into the database development and deployment processes, covering: Database Source Control architecture - what to include, how to structure the components Collaborative editing - teamwork on a database project, while ...
Artificial Intelligence Programming with PythonIn Practical Artificial Intelligence Programming with Python: From Zero to Hero, veteran educator and photophysicist Dr. Perry Xiao delivers a thorough introduction to one of the most exciting areas of computer science in modern history. The book demystifies artificial intelligence and teaches readers its fundamentals from scratch in simple and plain language and with illustrative code examples.
Divided into three parts, the author explains artificial intelligence generally, machine learning, and deep learning. It tackles a wide variety of useful topics, from classification and regression in machine learning to generative adversarial networks. He also includes: Fulsome introductions to MATLAB, Python, AI, machine learning, and deep learning; Expansive discussions on supervised and unsupervised machine learning, as well as semi-supervised learning; Practical AI and Python "cheat sheet" quick references.
This hands-on AI programming guide is perfect for anyone with a basic knowledg ...
Python for CybersecurityPython For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and other stakeholders today.
Offering downloadable sample code, the book is written to help you discover how to use Python in a wide variety of cybersecurity situations, including: Reconnaissance, resource development, initial access, and execution; Persistence, privilege escalation, defense evasion, and credential access; Discovery, lateral movement, collection, and command and control; Exfiltration and impact.
Each chapter includes discussions of several techniques and sub-techniques that could be used to achieve an attacker's objectives in any of these use cases. The ideal resource for anyone with a professional or personal interest in cybersecurity, ...
User TestedWith so many digital experiences touching our lives - and businesses - it's understandable to feel like you're drowning in data. There's a dashboard or chart for just about everything, but data alone can't help you understand and empathize with your customers. No amount of it will take you inside their heads, help you see the world through their eyes, or let you experience what it's really like to be your customer. Only human insight from real people can do that.
User Tested gives both individual contributors and executives an approachable, pragmatic playbook for stepping beyond standard business metrics and infusing real human insight into every business decision, design, and experience.
In this book, you'll: Learn how businesses became obsessed with data - but disconnected from their customers - and why that's not sustainable; Get the basics about how to capture human insight through user testing, including how to find the right people, ask the right questions, and make sense o ...
PHP & MySQLLearn PHP, the programming language used to build sites like Facebook, Wikipedia and WordPress, then discover how these sites store information in a database (MySQL) and use the database to create the web pages.
This full-color book is packed with inspiring code examples, infographics and photography that not only teach you the PHP language and how to work with databases, but also show you how to build new applications from scratch. It demonstrates practical techniques that you will recognize from popular sites where visitors can: Register as a member and log in; Create articles, posts and profiles that are saved in a database; Upload their own images and files; Automatically receive email notifications; Like and comment on posts.
To show you how to apply the skills you learn, you will build a complete content management system, enhanced with features that are commonly seen on social networks.
Written by best-selling HTML & CSS and JavaScript & jQuery author Jon Duckett, this ...
Using .NET Core, Docker, and Kubernetes SuccinctlyTerms like container and Docker, unknown to Microsoft programmers until now, have recently become essential in technical discussions about the development, distribution, and management of our applications. Containers can solve some of programmers' everyday problems, but a challenge with them is managing their lifecycles and the communication among them. So we need to choose a container technology, with Docker being the most commonly used, and an orchestrator, with Kubernetes being the best choice today. In Using .NET Core, Docker, and Kubernetes Succinctly, Michele Aponte will walk you through using Docker and Kubernetes with a .NET Core example application. ...
The Svelte HandbookSvelte is an exciting Web framework that offers a fresh new take on how to build Web applications.
If you are already experienced in React, Vue, Angular or other frontend frameworks you might be pleasantly surprised by Svelte.
My first impression with Svelte was that it all feels so much more like plain JavaScript than working with other frameworks. Sure, you have some rules and there are templates that are not 100% JavaScript (they look more like HTML) but most of the things that are complicated with other frameworks are very simple and lightweight with Svelte.
And my first impression has been confirmed by further usage of the framework and its ecosystem of tools.
Compared to React, Vue, Angular and other frameworks, an app built using Svelte is compiled beforehand so you don't have to serve the whole framework to every one of your site visitors. As a result, the fruition of the experience is smoother, consumes less bandwidth, and everything feels faster and more lightweig ...
Modern Computer Architecture and Organization, 2nd EditionAre you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures, but are overwhelmed by the complexity of modern systems? This step-by-step guide will teach you how modern computer systems work with the help of practical examples and exercises. You'll gain insights into the internal behavior of processors down to the circuit level and will understand how the hardware executes code developed in high-level languages.
This book will teach you the fundamentals of computer systems including transistors, logic gates, sequential logic, and instruction pipelines. You will learn details of modern processor architectures and instruction sets including x86, x64, ARM, and RISC-V. You will see how to implement a RISC-V processor in a low-cost FPGA board and write a quantum computing program and run it on an actual quantum computer.
This edition has been updated to cover the architecture and design principle ...
Mastering Python, 2nd EditionEven if you find writing Python code easy, writing code that is efficient, maintainable, and reusable is not so straightforward. Many of Python's capabilities are underutilized even by more experienced programmers. Mastering Python, Second Edition, is an authoritative guide to understanding advanced Python programming so you can write the highest quality code. This new edition has been extensively revised and updated with exercises, four new chapters and updates up to Python 3.10.
Revisit important basics, including Pythonic style and syntax and functional programming. Avoid common mistakes made by programmers of all experience levels. Make smart decisions about the best testing and debugging tools to use, optimize your code's performance across multiple machines and Python versions, and deploy often-forgotten Python features to your advantage. Get fully up to speed with asyncio and stretch the language even further by accessing C functions with simple Python calls. Finally, turn yo ...