Détail de l'éditeur
BPB Publications |
Documents disponibles chez cet éditeur (454)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Edge Computing with Python : End-to-end Edge Applications, Python Tools and Techniques, Edge Architectures, and AI Benefits (English Edition) / Abhinandan BHADAURIA / BPB Publications (2022)
Titre : Edge Computing with Python : End-to-end Edge Applications, Python Tools and Techniques, Edge Architectures, and AI Benefits (English Edition) Type de document : e-book Auteurs : Abhinandan BHADAURIA Editeur : BPB Publications Année de publication : 2022 ISBN/ISSN/EAN : 9789355512000 Note générale : copyrighted Langues : Anglais (eng) Résumé : Deep Dive into Edge Computing and its Implementations Key Features Numerous real-world examples are provided to help readers grasp essential facets of Edge Computing. Apply a wide range of Python libraries, frameworks, and libraries to build intuitive IoT solutions. Exclusive coverage of the working of the Siemens Industrial Edge Computing Platform. Description This book delves into the complexities of business settings. It covers the practical guidelines and requirements your The success of IoT and Industry 4.0 depends on edge computing and better network performance. The book, ‘Edge Computing with Python,’ intends to provide a fully-connected embedded environment in which readers can experience the applications of edge computing and IoT in a professional context. In this book, readers will learn what edge computing is, what its possible applications are, and how advantageous it is. This book provides thorough instructions for using Python to build every potential edge application. The book begins by configuring the programming environment with tools like VS Code, Python, and several popular libraries like SciPy, NumPy, and Pandas. Then, the book explains gaining access to IO devices, data handling, data storage, cloud connectivity, and hosting ready and pre-trained machine learning models step by step. The book delves into sophisticated ideas such as Docker Containers, MQTT, and FIWARE and how one can use them to construct Edge applications. In addition, the book details the Siemens Edge computing platform and how to use it for rapidly developing Edge applications. After reading this book, knowledge of Edge Computing's architecture, its benefits, and drawbacks will give readers a competitive advantage in the market. What you will learn In-depth knowledge of Edge Computing and its strong ties with the Cloud, IoT, and IIoT. Illustrations of numerous Python packages and simulations for device interfaces. Explanation of multiple data gathering methods, including HTTP/REST, Serial Port, and ZeroMQ. Explanation of aspects of AI/ML, including model training, loading, and execution in the context of Edge Computing. Security threats and countermeasures, including SSL/TLS, Nginx, secure code, etc. Building full-fledged Edge applications using Docker, MQTT, FIWARE, and the Siemens Industrial Edge Platform. Who this book is for Readers interested in embedded programming, system programming, edge device programming, electronics hobbyists, Internet of Things (IoT) engineers, microcontroller programming, and networking will find this book boost their career development. Knowledge of Docker, Containers, and REST is an added advantage. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937915 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572824 Effective Crisis Management : A Robust A-Z Guide for Demonstrating Resilience by Utilizing Best Practices, Case Studies, and Experiences (English Edition) / Sarah ARMSTRONG-SMITH / BPB Publications (2022)
Titre : Effective Crisis Management : A Robust A-Z Guide for Demonstrating Resilience by Utilizing Best Practices, Case Studies, and Experiences (English Edition) Type de document : e-book Auteurs : Sarah ARMSTRONG-SMITH Editeur : BPB Publications Année de publication : 2022 ISBN/ISSN/EAN : 9789355512710 Note générale : copyrighted Langues : Anglais (eng) Résumé : Develop crisis plans, practise them, and minimise threats Key Features Understand the reasons why you should expect the unexpected. Learn what it means to put people first. Explain why transparency is always preferable when things go bad. Identify strategies for bolstering credibility and safeguarding the brand. Speed up decision-making and response times in an emergency. Distinguish between fact and fiction to eliminate prejudice. Learn the art to turn a negative into a positive charge. Use your ability to look backward to alter the course of the future. Encourage a contented and efficient workforce. Description Using real-world examples of what may go wrong during a crisis, the author of "Effective Crisis Management" intends to infuse some realism and insight into the incident response and crisis management field. Written by an Executive and Board Advisor who has dedicated over 25 years to improving both the strategic and tactical response to crises, this book guides the reader through a series of episodes designed to help individuals grasp the factors at play in directing a successful crisis response. Following the steps outlined in this book, readers can uncover and make the most of the many insights and unrealized possibilities afforded by earlier catastrophic events. The book includes case studies and stories that will give the readers a sense of what it's like to manage a crisis in practice and why it requires more than just following a plan. The book explains how and why you should be ready for the unexpected as part of a "assume failure" mindset. Finally, this book delves deep into a crisis's psychological impact on individuals and explains why focusing on their strength and well-being is crucial to providing effective aid. What you will learn Realize how you respond to a problem matters more than the problem itself. Get to the bottom of the recurring issues highlighted by numerous public inquiries. Find ways to be extra cautious and fair while setting standards. Discover the qualities that help leaders excel in times of crisis. Cultivate a skill set emphasizing kindness, wisdom, seriousness, and sincerity. Establish the methods to determine the causes and circumstances of occurrences. Who this book is for Anyone interested in a career in managing the response to major incidents will find valuable information in this book written for experienced crisis managers and those who aspire to reach that position. To put it another way, it helps people see how they can use every crisis as an opportunity to strengthen their relationships and continue the trust. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937919 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572819 Enterprise Architect’s Handbook : A Blueprint to Design and Outperform Enterprise-level IT Strategy (English Edition) / Dr. Vishwakarma J S / BPB Publications (2022)
Titre : Enterprise Architect’s Handbook : A Blueprint to Design and Outperform Enterprise-level IT Strategy (English Edition) Type de document : e-book Auteurs : Dr. Vishwakarma J S Editeur : BPB Publications Année de publication : 2022 ISBN/ISSN/EAN : 9789355511607 Note générale : copyrighted Langues : Anglais (eng) Résumé : Build Enterprise Systems Right Key Features Access to real-world design and building resources, including tools, templates, and more. Real-world examples and step-by-step instructions on what to avoid as you begin your enterprise architecture journey. Proficiency in all stages of the architecture and design deployment process. Description These days, more than ever, enterprise architects are the driving forces behind digital transformation initiatives and the vital link between IT and business. This book enables the readers to become self-sufficient Enterprise Architects by enabling them to understand the business strategy and design the technology landscape, encompassing systems, data, applications, platforms, and enterprise tools, following that strategy. To comprehend the technology landscape, topics such as Stakeholder Matrix, HeatMaps, Value Stream Mapping, ERDs, Infrastructure, and Network diagrams are discussed in depth in this book. The book also covers numerous approaches for measuring the effectiveness of architecture implementation, including Balanced ScoreCards, OKRs, and Value Drivers – Design Thinking. This book instructs readers on how to create data pillars for complex, interconnected corporate systems. The book teaches you how to implement various architectures, including service-oriented architecture. It describes and illustrates popular tools used by Architectural teams and professionals. The primary objective of this book is to match business requirements with the technical infrastructure that supports the service delivery team, business development team, and IT Integration team. This book ensures that the technologies chosen and how they are applied, satisfy the business goals of organizations and their customers. What you will learn Architecture Strategy and Frameworks like TOGAF. Enterprise Architecture Maturity Assessment. Architecture Design and its Model Development. Selection of tools for Database, Application Design, Security, and Enterprise. Storage, Cloud Computing Infrastructure, and Application Deployment. Proof of Concept, Technology Stack Analysis, and Vendor Selection. Architecture Audit and Compliance, Data Governance. Who this book is for Enterprise Architects, Business Managers, Technology Advisors, Functional Consultants, and Solution Architects who play a critical role in implementing the business plan into action through technology enablement will find a wealth of useful information in this book, whether they are just starting their journey or have years of experience under their belts. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937908 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572786 Enterprise Automation with Python : Automate Excel, Web, Documents, Emails, and Various Workloads with Easy-to-code Python Scripts / Ambuj AGRAWAL / BPB Publications (2022)
Titre : Enterprise Automation with Python : Automate Excel, Web, Documents, Emails, and Various Workloads with Easy-to-code Python Scripts Type de document : e-book Auteurs : Ambuj AGRAWAL Editeur : BPB Publications Année de publication : 2022 ISBN/ISSN/EAN : 9789355511379 Note générale : copyrighted Langues : Anglais (eng) Résumé : 500% improvement in productivity by automating tedious choresKey Features? Contains numerous automation projects, including excel sheets, word documents, pdf files, websites, and messenger.? Provides a strong understanding of Automation, its fundamentals, and strategies to implement it across organizations.? Nurtures various techniques to improvise operational efficiency around repetitive business processes.DescriptionWritten by ZappyAI's founder, this book gives real-world examples of how readers can implement automation in their businesses and business-as-usual tasks. Through a series of real-world examples and live demonstrations, this book shows how to automate various tasks using Python scripts.This book gives solutions to everyday automation needs and repetitive tasks at work every day. Readers will be able to discover the most typical business process that can be automated and write simple Python scripts to turn them automated. This book will teach you how to create, read, change, and extract data from Excel documents using Python programming. Readers can extract data from websites, PDF documents, Gmail, Outlook, and WhatsApp chats. Text extraction from photos and scanned documents is also smartly accomplished in this book.The final section will examine techniques for extending your Python scripting skills and constructing complicated end-to-end process automation. Throughout the book, readers will be utterly captivated by how to automate their tedious tasks and enhance their organisations' productivity by 500 percent.What you will learn? Learn to write automation scripts by learning how to use different Python scripts.? Find out how to look at the business process to automate it.? Create, read, edit, and extract data from spreadsheets, documents, and PDFs.? Control mouse and keyboard activities, as well as automate several desktop apps.? Examine strategies for automating the downloading and extraction of data from the Internet and websites.? Organize the real-time transfer and reading of Gmail, Outlook, and WhatsApp messages.Who this book is forSoftware Engineers, Business Analysts, Automation Engineers, QA Engineers, and anyone who wants to simplify and automate their tedious work with simple yet powerful Python scripts. Readers with little or no technical experience can also use the strategies discussed in this book to automate day-to-day tasks.Table of Contents1. Setting up the automation environment2. Fundamentals of Python3. Automation mindset – Python as a tool for automation4. Automating Excel-based tasks5. Automating Web-based tasks6. Automating File-based tasks7. Automating Email, Messenger Applications and Messages8. GUI - Keyboard and Mouse Automation9. Image based Automations10. Creating Time and Event-based Automations11. Writing Complex Automations Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937988 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572874 Ethical Hacker’s Penetration Testing Guide : Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition) / Samir KUMAR RAKSHIT / BPB Publications (2022)
Titre : Ethical Hacker’s Penetration Testing Guide : Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks (English Edition) Type de document : e-book Auteurs : Samir KUMAR RAKSHIT Editeur : BPB Publications Année de publication : 2022 ISBN/ISSN/EAN : 9789355512154 Note générale : copyrighted Langues : Anglais (eng) Résumé : Discover security posture, vulnerabilities, and blind spots ahead of the threat actorKey Features? Includes illustrations and real-world examples of pentesting web applications, REST APIs, thick clients, mobile applications, and wireless networks.? Covers numerous techniques such as Fuzzing (FFuF), Dynamic Scanning, Secure Code Review, and bypass testing.? Practical application of Nmap, Metasploit, SQLmap, OWASP ZAP, Wireshark, and Kali Linux.DescriptionThe 'Ethical Hacker's Penetration Testing Guide' is a hands-on guide that will take you from the fundamentals of pen testing to advanced security testing techniques. This book extensively uses popular pen testing tools such as Nmap, Burp Suite, Metasploit, SQLmap, OWASP ZAP, and Kali Linux.A detailed analysis of pentesting strategies for discovering OWASP top 10 vulnerabilities, such as cross-site scripting (XSS), SQL Injection, XXE, file upload vulnerabilities, etc., are explained. It provides a hands-on demonstration of pentest approaches for thick client applications, mobile applications (Android), network services, and wireless networks. Other techniques such as Fuzzing, Dynamic Scanning (DAST), and so on are also demonstrated. Security logging, harmful activity monitoring, and pentesting for sensitive data are also included in the book. The book also covers web security automation with the help of writing effective python scripts.Through a series of live demonstrations and real-world use cases, you will learn how to break applications to expose security flaws, detect the vulnerability, and exploit it appropriately. Throughout the book, you will learn how to identify security risks, as well as a few modern cybersecurity approaches and popular pentesting tools.What you will learn? Expose the OWASP top ten vulnerabilities, fuzzing, and dynamic scanning.? Get well versed with various pentesting tools for web, mobile, and wireless pentesting.? Investigate hidden vulnerabilities to safeguard critical data and application components.? Implement security logging, application monitoring, and secure coding.? Learn about various protocols, pentesting tools, and ethical hacking methods.Who this book is forThis book is intended for pen testers, ethical hackers, security analysts, cyber professionals, security consultants, and anybody interested in learning about penetration testing, tools, and methodologies. Knowing concepts of penetration testing is preferable but not required.Table of Contents1. Overview of Web and Related Technologies and Understanding the Application2. Web Penetration Testing- Through Code Review3. Web Penetration Testing-Injection Attacks4. Fuzzing, Dynamic scanning of REST API and Web Application5. Web Penetration Testing- Unvalidated Redirects/Forwards, SSRF6. Pentesting for Authentication, Authorization Bypass, and Business Logic Flaws7. Pentesting for Sensitive Data, Vulnerable Components, Security Monitoring8. Exploiting File Upload Functionality and XXE Attack9. Web Penetration Testing: Thick Client10. Introduction to Network Pentesting11. Introduction to Wireless Pentesting12. Penetration Testing-Mobile App13. Security Automation for Web Pentest14. Setting up Pentest Lab Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937968 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572854 Ethically hacking an industrial control system : Analyzing, exploiting, mitigating, and safeguarding industrial processes for an ethical hacker / Sharon FERRONE / BPB Publications (2022)PermalinkExcel 2022 Pro 100 + PivotTables, Charts & Reports : Explore Excel 2022 with Graphs, Animations, Sparklines, Goal Seek, Histograms, Correlations, Dashboards / Isaac GOTTLIEB / BPB Publications (2022)PermalinkExpert Linux Administration Guide : Administer and Control Linux Filesystems, Networking, Web Server, Virtualization, Databases, and Process Control (English Edition) / Vishal RAI / BPB Publications (2022)PermalinkExploring Bitcoin with Blockchain : Adopt Bitcoin to Reinvent Business Scaling with Lower Transaction Costs and Better Fraud Prevention (English Edition) / Vizeet SRIVASTAVA / BPB Publications (2022)PermalinkFinOps : RoadMap to Cloud Efficiency : Mentoring Cloud and Finance Professionals to Drive Cloud Productivity (English Edition) / Navin SABHARWAL / BPB Publications (2022)PermalinkFoundations of Computing : Essential for Computing Studies, Profession And Entrance Examinations Ed. 5 / Pradeep K. SINHA / BPB Publications (2022)PermalinkFull Stack Development with MongoDB : Covers Backend, Frontend, APIs, and Mobile App Development using PHP, NodeJS, ExpressJS, Python and React Native / Manu SHARMA / BPB Publications (2022)PermalinkGame Development with Unreal Engine 5 : Learn the Basics of Game Development in Unreal Engine 5 (English Edition) / Mitchell LYNN / BPB Publications (2022)PermalinkGodot 3D Game Development : 2D Adventure Games, 3D Maths and Physics, Game Mechanics, Animations, and 3D Game Development (English Edition) / Marijo TRKULJA / BPB Publications (2022)PermalinkHands-On Azure Data Platform : Building Scalable Enterprise-Grade Relational and Non-Relational database Systems with Azure Data Services / Sagar LAD / BPB Publications (2022)Permalink
LIBRARY - Campus Rouen
NEOMA Business School
pmb
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26