Developing Inclusive Mobile Apps
By failing to consider those with needs different to ourselves, we are telling these people they are not welcome in our app, and therefore that technology as a whole, is not for them. This is not hyperbole - 23% of people in the US with a registered disability aren't online at all, that's three times more likely than the general population. When asked why they're not online, disabled respondents say their disability prevents them or that using the internet is too hard.
To help your apps combat the issue of digital exclusion, this book covers considerations and tools mobile developers, or anyone creating mobile experiences, can use to make mobile work better for those with disabilities - mental or physical - and how to create a better experience for everyone. Software is not made up of cold, unthinking algorithms. Software is a craft in the truest sense of the word, and one of the greatest tools you can have as a craftsperson is empathy for the people who will be using your app. Each ...
MOS Study Guide for Microsoft Access Expert Exam MO-500
Demonstrate your expertise with Microsoft Access. Designed to help you practice and prepare for Microsoft Office Specialist (MOS): Access 2019 certification, this official Study Guide delivers: In-depth preparation for each MOS objective; Detailed procedures to help build the skills measured by the exam; Hands-on tasks to practice what you've learned; Practice files and sample solutions. Sharpen the skills measured by these objectives: Create and manage databases; Build tables; Create queries; Create forms; Create reports. ...
Identity Attack Vectors
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.
As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security. Managing accounts, credentials, roles, certification, and attestation reporting for all resources is now a security and compliance mandate. When identity theft and poor identity management is leveraged as an attack vector, risk and vulnerabilities increase exponentially. As cyber attacks continue to increase in volume and sophistication, it is not a matter of if, but when, your organization will have an incident. Threat actors target accounts, users, and their associated identities, to conduct their malicious activities through priv ...
Developing Accessible iOS Apps
Any developer aiming for a global audience needs to cover a series of requisites for their apps, and one of them is to make them accessible. Just having an app in the App Store is not enough for it to be a global success anymore. More than that, it is arguably our duty as developers to create inclusive apps that anyone can use.
Apple provides us with excellent tools for creating accessible apps. However, many developers just don't know about them or think they're difficult to us. This concise guide offers a focused look at breaking those myths and proving that creating accessible apps is very easy, and that it's just as easy to embed accessibility into the development process of your team.
You'll have a look at the tools iOS provides. Some, like zoom, button shapes, etc., come integrated in the operating system. Others, like VoiceOver, Larger Accessibility Sizes with Dynamic Types, and Smart Inverted Colours will need extra work to support appropriately. Then go from the basics o ...
Cloud Computing Using Oracle Application Express
Get the domain knowledge you need to develop real-world business apps for and in the cloud. You'll see how Oracle APEX has made the life of web developers much easier and how it helps you create web-based data-centric applications easily and instantly without writing screeds of code.
In Cloud Computing Using Oracle Application Express, you will develop a complete general ledger accounting system named the Cloud Accountant which will be accessible through a variety of devices including desktops, laptops, and the latest smartphones.
This new edition also incorporates the new application page creation process, which differs from the previous version. You'll cover other new areas, such as the updated UI elements and properties, and the interactive grid. Besides the development of a full application that you can deploy in your organization, the book teaches many new techniques to further enhance your APEX development skills.
Discover new development techniques for APEX developers; ...
Access 2019 Bible
Access 2019 Bible is your, comprehensive reference to the world's most popular database management tool. With clear guidance toward everything from the basics to the advanced, this go-to reference helps you take advantage of everything Access 2019 has to offer. Whether you're new to Access or getting started with Access 2019, you'll find everything you need to know to create the database solution perfectly tailored to your needs, with expert guidance every step of the way. The companion website features all examples and databases used in the book, plus trial software and a special offer from Database Creations. Start from the beginning for a complete tutorial, or dip in and grab what you need when you need it.
Access enables database novices and programmers to store, organize, view, analyze, and share data, as well as build powerful, integrable, custom database solutions - but databases can be complex, and difficult to navigate. This book helps you ...
Securing the Perimeter
Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it's now easier than ever to build and operate your own IAM stack.
The most common culprit of the largest hacks has been bad personal identification. In terms of bang for your buck, effective access control is the best investment you can make. Financially, it's more valuable to prevent than to detect a security breach. That's why Identity and Access Management (IAM) is a critical component of an organization's security infrastructure. In the past, IAM software has been available only from large enterprise software vendors. Commercial IAM offerings are bundled as "suites" because IAM is not just one component. It's a number of components working together, including web, authentication, authorization, cryptographic, and persistence services.
Access 2019 For Dummies
People who really know how to build, populate, and simplify databases are few and far between. Access 2019 For Dummies is here to help you join the ranks of office heroes who possess these precious skills.
This book offers clear and simple advice on how to build and operate databases as well as create simple forms, import data from outside sources, query databases for information, and share knowledge in reports. In short, it's the book that holds all the secrets behind the mysteries of Access!
Build effective databases from the ground up; Simplify your data entry with forms and tables; Write queries that produce answers to your data questions; Simplify input with forms.
There's no time like the present to get your hands on the insight that database beginners need to become Access gurus. ...
Modern Data Access with Entity Framework Core
C# developers, here's your opportunity to learn the ins-and-outs of Entity Framework Core, Microsoft's recently redesigned object-relational mapper. Benefit from hands-on learning that will teach you how to tackle frustrating database challenges, such as workarounds to missing features in Entity Framework Core, and learn how to optimize the performance of your applications, head-on!
Modern Data Access with Entity Framework Core teaches best practices, guidance, and shortcuts that will significantly reduce the amount of resources you internally dedicate to programming data access code. The proven methods and tools taught in this book, such as how to get better performance, and the ability to select the platform of your choice, will save you valuable time and allow you to create seamless data access. Dive into succinct guidance that covers the gamut - from installing Entity Framework Core, reverse engineering, forward engineering (including schema migrations), and data rea ...
Introductory Relational Database Design for Business
Relational databases represent one of the most enduring and pervasive forms of information technology. Yet most texts covering relational database design assume an extensive, sophisticated computer science background. There are texts on relational database software tools like Microsoft Access that assume less background, but they focus primarily on details of the user interface, with inadequate coverage of the underlying design issues of how to structure databases. Growing out of Professor Jonathan Eckstein's twenty years experience teaching courses on management information systems (MIS) at Rutgers Business School, this book fills this gap in the literature by providing a rigorous introduction to relational databases for readers without prior computer science or programming experience.
Relational Database Design for Business, with Microsoft Access helps readers to quickly develop a thorough, practical understanding of relational database design. It takes a step-by-ste ...
Windows Server 2016 Security, Certificates, and Remote Access Cookbook
Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further.
You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers.
Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network.
When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting t ...