In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications. What You´ll Learn What the blockchain is Why it is needed and what problem it solves Why there is so much excitement about the blockchain and its potential Major components and their purpose How various components of the blockchain work and interact Limitations, why they exist, and what has been done to overcome them Major application scenarios Who This Book Is For Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder´s footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You´ll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals
Examining the modern origins of artificial intelligence, this book explores issues of what it means to be man or machine and looks at advances in robotics which have blurred the boundaries.
The Definitive Guide to DAX is the most comprehensive and authoritative guide to Microsoft´s DAX language for business intelligence and analytics. While other books cover only the basics, this guide offers expert guidance on everything intermediate-to-advanced Excel users and BI professionals need to know, from the basics to innovative high-performance techniques.
Based on course notes of SIGGRAPH course teaching techniques for real-time rendering of volumetric data and effects; covers both applications in scientific visualization and real-time rendering. Starts with the basics (texture-based ray casting) and then improves and expands the algorithms incrementally. Book includes source code, algorithms, diagrams, and rendered graphics.
Learn the basics of do-it-yourself ZFS storage on Linux. This book delivers explanations of key features and provides best practices for planning, creating and sharing your storage. ZFS as a file system simplifies many aspects of the storage administrator´s day-to-day job and solves a lot of problems that administrators face, but it can be confusing. Introducing ZFS on Linux addresses some of these issues and shows you how to resolve them. This book explains the technical side of ZFS, through planning the hardware list to planning the physical and logical layout of the storage. What You´ll Learn Understand the gains ZFS gives system and storage administrators and utilize its features Install and configure ZFS software Create and maintain ZFS pool Administer ZFS storage, including sharing Who This Book is For This book is ideal for those who already have experience working with Linux systems but want to understand the bare basics of ZFS before moving further.
Beginning Visual Basic 2008 Databases teaches you everything you need to know about relational databases, SQL, and ADO.NET 2.0. It gives you a sound start in developing console and Windows database applications. The book also includes chapters on the new SQL Server XML data type and the forthcoming LINQ enhancements to the next version of Visual Basic. In addition to teaching you such basics as using SQL to communicate with databases, this book provides you with detailed, code-practical techniques to access data in VB 2008 across a range of coding situations.
The book gives readers a practical introduction to reactive programming with Actor Model. The reader is given a brief but detailed background on using the Scala programming language and how to program using Scala and the Akka toolkit. After covering the basics and establishing a foundation, the book takes readers through a series of message-based integration cookbook solutions, including: Messaging Systems, Messaging Channels, Message Construction, Message Routing, Message Transportation, Message Endpoints, and System Management. The book follows the proven method presented in ´´Enterprise Integration Patterns´´ by Gregor Hohpe and Bobby Woolf, but gives solutions based on the use of Scala and Akka.
Today, learning to program and understanding the basics of computation isn´t just indispensable for every science and engineering student: it´s crucial for everyone who wants to understand the world they live in. In Computer Science: An Interdisciplinary Approach, pioneering Princeton computer science professors Robert Sedgewick and Kevin Wayne introduce core Java programming techniques in a scientific context, while also demystifying computation and illuminating its intellectual underpinnings.