Microsoft Blazor, 3rd EditionBuild web applications in C# and Microsoft .NET 6 that run in any modern browser and become a full-stack web developer!. Do all these things using the Microsoft Blazor framework and the techniques shown in this book. New in this edition is coverage of the new and improved Razor syntax, communication with the server using SignalR and/or gRPC, the use of virtualization to load large quantities of data efficiently, deployment and ahead-of-time compilation into WASM, new unit testing features, security using OpenID Connect, and more.
Reading this book helps you learn to build user interfaces and present data to a user for display and modification, capturing the user's changes via data binding. The book shows how to access a rich library of .NET functionality such as a component model for building a composable user interface, including how to develop reusable components that can be used across many pages and websites. Also covered is data exchange with a server using REST, SignalR, and ...
Designing APIs with Swagger and OpenAPIDesigning APIs with Swagger and OpenAPI is a comprehensive guide to designing and describing your first RESTful API using the most widely adopted standards. Following expert instruction from Swagger core contributor Josh Ponelat and API consultant Lukas Rosenstock, you'll spend each chapter progressively expanding the kind of APIs you'll want to build in the real world. You'll utilize OpenAPI and Swagger to help automate your workflow, and free up your time to work on more exciting features. Learn the syntax and structure of OpenAPI definitions, create and iterate on an API design with common tools, and release your API to the public.
Create web APIs that customers and developers will love! Using Swagger, a collection of tools for defining and documenting REST APIs, you will build safe, controlled access to your software. And because Swagger implements the vendor-neutral OpenAPI specification, you'll be building to the same standards adopted by Google, Microsoft, and Amazon.
Desi ...
Introducing Microsoft SQL Server 2016Build your database management knowledge with the technical open book, Introducing SQL Server 2016. Get an overview of the SQL Server 2016 features - from in-memory performance and enhanced security to end-to-end mobile business intelligence and advanced analytics.
Learn about faster queries, improved security, higher availability, and state-of-the-art database engines; Broaden your data access, get deeper insights from business intelligence analytics, and make your reporting more robust; Expand your data warehouse options with SQL Data Warehouse and Azure SQL Database enhancements. ...
Understanding Machine LearningThe subject of this book is automated learning, or, as we will more often call it, Machine Learning (ML). That is, we wish to program computers so that they can "learn" from input available to them. Roughly speaking, learning is the process of converting experience into expertise or knowledge. The input to a learning algorithm is training data, representing experience, and the output is some expertise, which usually takes the form of another computer program that can perform some task. Seeking a formal-mathematical understanding of this concept, we'll have to be more explicit about what we mean by each of the involved terms: What is the training data our programs will access? How can the process of learning be automated? How can we evaluate the success of such a process (namely, the quality of the output of a learning program)? ...
The Definitive Guide to Security in Jakarta EERefer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules, such as Payara Yubikey & OIDC, and OmniFaces JWT-Auth.
The book discusses Jakarta EE Security in relation to SE underpinnings and provides a detailed explanation of how client-cert authentication over HTTPS takes place, how certifications work, and how LDAP-like names are mapped to caller/user names. General (web) security best practices are presented, such as not storing passwords in plaintext, using HTTPS, sanitizing inputs to DB queries, encoding output, and explanations of various (web) attacks and common vulnerabilities are included.
Practical examples of securing applications discuss common needs such as letting users explicitly log in, sign u ...
Design and Deploy Microsoft Azure Virtual DesktopDesign and build the new desktop service from Microsoft. This book offers a modern framework, design methodology, and best practices of design and deployment for virtual apps and desktops.
Microsoft Azure Virtual Desktop (AVD) is a Desktop as a Service (DaaS) which is simple to deploy, accessible from any device, easy to manage, and secure. The book starts with AVD essentials and its critical features, followed by the planning and method of preparing for AVD. You will go through defining the requirements and assessing by setting the AVD application baseline, network requirements, and security requirements. Next, you will learn how to design and deploy the core infrastructure of Microsoft AVD to understand its Access Layer, Control Layer, Resource Layer, Hosting Layer, and User Layer. You will also learn how to design the desktop and Host Pool of AVD. And you will learn the modern way to manage and secure AVD components.
After reading this book, you will have the right blend of kn ...
Introducing Blockchain with JavaCreate your own crypto currency by implementing blockchain technology using Java. This step-by-step guide will teach you how to create a user interface using Java FX and implement SQLite DB using JDBC Driver for the blockchain.
Introducing Blockchain with Java includes numerous exercises and test questions to help you solidify what you have learned as you progress through the book, and provides ideas on expanding the codebase to make it your own. You will have access to a fully-functioning repository with Java code.
Upon completing this book, you will have the knowledge necessary to program your own blockchains with Java and you will have a completed project for your portfolio. ...
A Network Architect's Guide to 5GAs 5G transforms mobile usage and services, network professionals will need to significantly evolve their transport network architectures towards greater sophistication and stronger integration with radio networks, and facilitate transition towards cloud-native 5G mobile core. Until now, however, most 5G guides have foregrounded RF/radio and mobile core innovations, not its implications for data networks. A Network Architects Guide to 5G fills the gap, giving network architects, designers, and engineers essential knowledge for designing and planning their own 5G networks.
Drawing on decades of experience with global service providers and enterprise networks, the authors illuminate new and evolving network technologies necessary for building 5G-capable networks, such as segment routing, network slicing, timing and synchronization, edge computing, distributed data centers, integration with public cloud, and more. They explain how 5G blurs boundaries between mobile core, radio access, ...
Data Engineering with AlteryxAlteryx is a GUI-based development platform for data analytic applications.
Data Engineering with Alteryx will help you leverage Alteryx's code-free aspects which increase development speed while still enabling you to make the most of the code-based skills you have.
This book will teach you the principles of DataOps and how they can be used with the Alteryx software stack. You'll build data pipelines with Alteryx Designer and incorporate the error handling and data validation needed for reliable datasets. Next, you'll take the data pipeline from raw data, transform it into a robust dataset, and publish it to Alteryx Server following a continuous integration process.
By the end of this Alteryx book, you'll be able to build systems for validating datasets, monitoring workflow performance, managing access, and promoting the use of your data sources. ...
Microsoft Azure Virtual Desktop GuideModernize your business to make it more agile using Azure Virtual Desktop (AVD). Azure Virtual Desktop is a cloud desktop virtualization platform that securely delivers virtual desktops and remote apps. This book will help you will help you to understand designing, implementing, configuring, and maintaining an Azure Virtual Desktop environment for enterprise and prepare to take the Microsoft AZ-140 certification exam.
The book starts with an introduction to Azure Virtual Desktop and its design architecture. You will learn designing Azure Virtual desktop including user identities and profiles. Additionally, you will learn how to implement network for Azure Virtual desktop. Creation and configuration of host pools and session hosts is covered with all steps so that you can understand all options and select appropriate configuration for enterprise deployment. You will also go through session host images creation process and managing the image with image gallery and possible automation ...