The Software Architect Elevator
As the digital economy changes the rules of the game for enterprises, the role of software and IT architects is also transforming. Rather than focus on technical decisions alone, architects and senior technologists need to combine organizational and technical knowledge to effect change in their company's structure and processes. To accomplish that, they need to connect the IT engine room to the penthouse, where the business strategy is defined.
In this guide, author Gregor Hohpe shares real-world advice and hard-learned lessons from actual IT transformations. His anecdotes help architects, senior developers, and other IT professionals prepare for a more complex but rewarding role in the enterprise.
This book is ideal for: Software architects and senior developers looking to shape the company's technology direction or assist in an organizational transformation; Enterprise architects and senior technologists searching for practical advice on how to navigate technical and organizati ...
PowerShell and Python Together
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.
You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis.
PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate.
Leverage the internals of PowerShell for: digital investigation, incident response, and forensics; Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities; Create combined PowerShell a ...
Building Digital Experience Platforms
Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise platform.
In this book the authors examine various features of DXPs and provide rich insights into building each layer in a digital platform. Proven best practices are presented with examples for designing and building layers. A special focus is provided on security and quality attributes needed for business-critical enterprise applications. The authors cover modern and emerging digital trends such as Blockchain, IoT, containers, chatbots, artificial intelligence, and more.
The book is divided into five parts related to requirements/design, development, security, infrastructure, and case study. The authors employ proven real-world methods, best practices, and security and integration techniques derived from their ...
Achieving Business Agility
Know how to lead and establish business agility in your organization. Benefit from clear, actionable steps based on change management truths that have been long underutilized and have limited the success of agile expansion into your business. This book provides a pragmatic framework for leading your business toward shifting to an agile mindset.
Achieving Business Agility offers strategies and concrete examples to engage business executives and will teach you how to effectively execute these strategies. Whether you are a delivery executive, a change advocate, a consultant, a business leader, or a newcomer to agile, you will learn clear actions from a practical, business-oriented perspective that is vital to effect change and bring agile into your business.
The book is structured in three sections. The first provides you with a deep understanding of each of four strategies. The second section tells the story of a company that applied these strategies through the eyes of several key ...
Version Control with Git and GitHub
Introduction to Git and GitHub begins with setting up and configuring Git on your computer along with creating a repository and using it for exercises throughout the book. With the help of multiple activities, you'll learn concepts that show various stages of a file—from when it is untracked to when it is set for tracking under version control. As you make your way through the chapters, you'll learn to navigate through the history of a repository, fetch and deliver code to GitHub, and undo code changes.
The first half of the book ends with you learning to work with branches, storing and retrieving changes temporarily, and merging the desired changes into a repository.
In the second half, you'll learn about forking as part of a collaborative workflow. You'll also address modularity and duplication through submodules, tracing and rectifying faulty changes, and maintaining repositories.
By the end of this book, you will have learned how to effectively deploy appli ...
GitLab Quick Start Guide
Gitlab is an open source repository management and version control toolkit with an enterprise offering. This book is the ideal guide to GitLab as a version control system (VCS), issue management tool, and a continuous integration platform.
The book starts with an introduction to GitLab, a walkthrough of its features, and explores concepts such as version control systems, continuous integration, and continuous deployment. It then takes you through the process of downloading and installing a local copy of the on-premise version of GitLab in Ubuntu and/or CentOS.
You will look at some common workﬂows associated with GitLab workﬂow and learn about project management in GitLab. You will see tools and techniques for migrating your code base from various version control systems such as GitHub and SVN to GitLab.
By the end of the book, you will be using Gitlab for repository management, and be able to migrate projects from other VCSs to GitLab. ...
Learn the core concepts and techniques you need to know to take better photos, from choosing the best lens for your stylistic goals to selecting the right camera settings for different lighting conditions.
With clear explanations and highly visual examples, Sean T. McHugh takes you from basic concepts like exposure and depth of field to more advanced topics, such as how camera lenses and sensors capture light to produce images. You'll learn not only which camera settings to use in different situations but also the reasons why.
Choose lenses that give greater control over perspective; Minimize image noise by understanding how digital sensors work; Get the exposure you want even in fog, mist, or haze; Improve hand-held shots by mastering shutter speed and autofocus; Use tripods, lens filters, and flash to enhance image capture.
Whether you want to understand digital photography at a deeper level or simply want to take better photos, Understanding Photography will help you get th ...
Microsoft Dynamics 365 For Dummies
It's no secret that running a business involves several complex parts like managing staff, financials, marketing, and operations - just to name a few. That's where Microsoft Dynamics 365, the most profitable business management tool, comes in.
In Microsoft Dynamics 365 For Dummies, you'll learn the aspects of the program and each of its applications from Customer Service to Financial Management. With expert author Renato Bellu's clear instructions and helpful tips, you'll be managing to your fullest advantage before you know it. Let's get started!
Digitally transform your business by connecting CRM and ERP; Use data to make decisions across all business functions; Integrate Dynamics 365 with Office 365 and LinkedIn; Manage financials and operations.
Are you running a dynamic business? This book shows you how! ...
Git Version Control Cookbook, 2nd Edition
Git is one of the most popular tools for versioning. Git Version Control Cookbook builds on the success of the previous edition and provides you with an up-to-date guide to solving problems related to versioning.
You'll start by learning about the Git data model and how it stores files and looks at commits. By using simple commands, you'll learn how to navigate through the database. Once you have accustomed yourself to the basics, you'll explore techniques to configure Git with comprehensive examples and configuration targets. You'll gain insights into improving your understanding of branches and recovery from mistakes - right from committing to a wrong branch to recovering lost commits or files. You'll then move on to discovering the features that Git rebase has to offer and use regular Git merge on other branches. You'll explore Git notes and learn how to utilize the update, list, and search commands. In addition to this, you'll lea ...
Computing the Environment
Computing the Environment presents practical workflows and guidance for designers to get feedback on their design using digital design tools on environmental performance. Starting with an extensive state-of-the-art survey of what top international offices are currently using in their design projects, this book presents detailed descriptions of the tools, algorithms, and workflows used and discusses the theories that underlie these methods. Project examples from Transsolar Klimaengineering, Buro Happold's SMART Group, Behnish Behnisch Architects, Thomas Herzog, Autodesk Research are contextualized with quotes and references to key thinkers in this field such as Eric Winsberg, Andrew Marsh, Michelle Addington and Ali Malkawi. ...
Investigating the Cyber Breach
Today, cybersecurity and networking professionals know they can't possibly prevent every breach, but they can substantially reduce risk by quickly identifying and blocking breaches as they occur. Investigating the Cyber Breach: The Digital Forensics Guide for the Network Engineer is the first comprehensive guide to doing just that.
Writing for working professionals, senior cybersecurity experts Joseph Muniz and Aamir Lakhani present up-to-the-minute techniques for hunting attackers, following their movements within networks, halting exfiltration of data and intellectual property, and collecting evidence for investigation and prosecution. You'll learn how to make the most of today's best open source and Cisco tools for cloning, data analytics, network and endpoint breach detection, case management, monitoring, analysis, and more.
Unlike digital forensics books focused primarily on post-attack evidence gathering, this one offers complete coverage of tracking threats, improving inte ...