User interface design is a challenging, multi-disciplinary activity that requires understanding a wide range of concepts and techniques that are often subjective and even conflicting. Imagine how much it would help if there were a single perspective that you could use to simplify these complex issues down to a small set of objective principles. In UI is Communication , Everett McKay explains how to design intuitive user interfaces by focusing on effective human communication. A user interface is ultimately a conversation between users and technology. Well-designed user interfaces use the language of UI to communicate to users efficiently and naturally. They also recognize that there is an emotional human being at the other end of the interaction, so good user interfaces strive to make an emotional connection. Applying what you learn from UI is Communication will remove much of the mystic, subjectiveness, and complexity from user interface design, and help you make better design decisions with confidence. It´s the perfect introduction to user interface design. Approachable, practical communication-based guide to interaction and visual design that you can immediately apply to projects to make solid design decisions quickly and confidently Includes design makeovers so you can see the concepts in practice with real examples Communication-based design process ties everything from interaction to visual design together
Learn to build Rails-based web applications using all the latest features offered in Rails 5.2. Author Stefan Wintermeyer begins by teaching the basics of Ruby 2.5 before proceeding through all aspects of Rails, utilizing clean, succinct examples - rather than a single large application. This book covers topics including Active Storage, Credentials, Active Record, Scaffolding, REST, Routing, Bundler, Forms, Cookies, and Sessions, all of which are vital for modern Rails web applications. To complement these topics you´ll also learn about test-driven development, Action Cable, Active Job, Action Mailer, I18n, Asset Pipeline, and caching. Finally, you´ll see a how-to for a production web server with nginx. This complete set of skills will set you up for a future of efficient and elegant Rails coding. What You Will Learn Use the Ruby on Rails web development framework Install and manage the Rails framework Persist data for your web application with Active Record Work with forms Apply a test-driven development approach to your Rails-based web applications Discover many Rails secrets and tips Who This Book Is For Beginners with at least some prior programming experience. Ruby experience is helpful, but not required.
- Für .NET-Entwickler, vom WCF-Einsteiger bis zum -Profi - Ideal für das Selbststudium, für das Vertiefen und Nachschlagen - Mit zahlreichen, aufeinander aufbauenden Beispiellösungen und wertvollen Tipps - Forum für Fragen unter: www.it-visions.de/leser - Alle Beispiele aus dem Buch unter: EXTRA: E-Book inside Mit diesem durch und durch praxisorientierten Handbuch bekommen Sie einen erstklassigen, didaktisch hervorragenden wie auch konkurrenzlosen Leitfaden an die Hand, um in .NET 4.5 komplexe Geschäftsprozesse planen und entwickeln zu können. Das Themenspektrum ist groß: Sie lernen alle wichtigen .NET-Technologien, Techniken und Konzepte kennen, um in .NET 4.5 verteilte Systeme, Webservices und serviceorientierte Anwendungen zu erstellen. Für die erfolgreiche Implementierung verteilter Systeme sind neben der Windows Communication Foundation bzw. der ASP.NET Web API weitere Frameworks notwendig. Detailliert erfahren Sie, wie Sie - mittels WCF bzw. Web API und SignalR mit Systemen und Geschäftspartnern kommunizieren. - Geschäftsprozesse in Form von Workflows mit Windows Workflow Foundation automatisieren. - Single-Sign-On-Szenarien mit Windows Identity Foundation implementieren. - verschiedene Systeme über Azure Service Bus standortübergreifend integrieren. - mit Entity Framework, RIA- und Data-Services auf Datenbanken zugreifen. AUS DEM INHALT: Servicebasierte Systeme mit WCF umsetzen // REST-Services mit Web API erstellen // Benachrichtigungs-Szenarien mit SignalR // Single-Sign-On mit der Identity Foundation // Datenbasierte Services mit Entity Framework // Geschäftsprozesse mit Workflow Foundation // Systeme verbinden mit Azure Service Bus
Interested in how an efficient search engine works? Want to know what algorithms are used to rank resulting documents in response to user requests? The authors answer these and other key information retrieval design and implementation questions. This book is not yet another high level text. Instead, algorithms are thoroughly described, making this book ideally suited for both computer science students and practitioners who work on search-related applications. As stated in the foreword, this book provides a current, broad, and detailed overview of the field and is the only one that does so. Examples are used throughout to illustrate the algorithms. The authors explain how a query is ranked against a document collection using either a single or a combination of retrieval strategies, and how an assortment of utilities are integrated into the query processing scheme to improve these rankings. Methods for building and compressing text indexes, querying and retrieving documents in multiple languages, and using parallel or distributed processing to expedite the search are likewise described. This edition is a major expansion of the one published in 1998. Besides updating the entire book with current techniques, it includes new sections on language models, cross-language information retrieval, peer-to-peer processing, XML search, mediators, and duplicate document detection.
Die Kryptologie, eine jahrtausendealte ´´Geheimwissenschaft´´, gewinnt zusehends praktische Bedeutung in Verbindung mit dem Schutz von Kommunikationswegen, Datenbanken und Software. Neben ihre Nutzung in rechnergestützten öffentlichen Nachrichtensystemen (´´öffentliche Schlüssel´´) treten mehr und mehr rechnerinterne Anwendungen, wie Zugriffsberechtigungen und der Quellenschutz von Software. Der erste Teil des Buches behandelt in elf Kapiteln die Geheimschriften und ihren Gebrauch - die Kryptographie. Dabei wird auch auf das aktuelle Thema ´´Kryptographie und Grundrechte des Bürgers´´ eingegangen. Im zweiten Teil wird in elf weiteren Kapiteln das Vorgehen zum unbefugten Entziffern einer Geheimschrift - die Kryptanalyse - besprochen, wobei insbesondere Hinweise für die Beurteilung der Sicherheit der Chiffrierverfahren gegeben werden. Mit der vorliegenden dritten Auflage wurde das Werk auf den neuesten Stand gebracht. Das Buch setzt nur elementare mathematische Kenntnisse voraus. Mit einer Fülle spannender, lustiger und bisweilen anzüglicher Geschichten aus der historischen Kryptologie gewürzt, ist es auch für Laien reizvoll zu lesen. ´´... ein wahres Lesevergnügen für jedermann... Wenn´s schwierig wird, hilft die Fülle von ausgiebig behandelten Beispielen.´´ (Thomas von Randow, ´´Die Zeit´´) ´´Wer über elementare mathematische Kenntnisse verfügt, wird auch die fachlicheren Kapitel des Buches mit Gewinn lesen.´´ (Norbert Lossau, ´´Die Welt´´) ´´The best single book on cryptology today´´ (David Kahn, ´´Cryptologia´´)
Publisher´s Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Cutting-edge techniques from leading Oracle security experts This Oracle Press guide demonstrates practical applications of the most compelling methods for developing secure Oracle database and middleware environments. You will find full coverage of the latest and most popular Oracle products, including Oracle Database and Audit Vaults, Oracle Application Express, and secure Business Intelligence applications. Applied Oracle Security demonstrates how to build and assemble the various Oracle technologies required to create the sophisticated applications demanded in today´s IT world. Most technical references only discuss a single product or product suite. As such, there is no roadmap to explain how to get one product, product-family, or suite to work with another. This book fills that void with respect to Oracle Middleware and Database products and the area of security.
Each passing year bears witness to the development of ever more powerful computers, increasingly fast and cheap storage media, and even higher bandwidth data connections. This makes it easy to believe that we can now - at least in principle - solve any problem we are faced with so long as we only have enough data. Yet this is not the case. Although large databases allow us to retrieve many different single pieces of information and to compute simple aggregations, general patterns and regularities often go undetected. Furthermore, it is exactly these patterns, regularities and trends that are often most valuable. To avoid the danger of ´´drowning in information, but starving for knowledge´´ the branch of research known as data analysis has emerged, and a considerable number of methods and software tools have been developed. However, it is not these tools alone but the intelligent application of human intuition in combination with computational power, of sound background knowledge with computer-aided modeling, and of critical reflection with convenient automatic model construction, that results in successful intelligent data analysis projects. Guide to Intelligent Data Analysis provides a hands-on instructional approach to many basic data analysis techniques, and explains how these are used to solve data analysis problems. Topics and features: guides the reader through the process of data analysis, following the interdependent steps of project understanding, data understanding, data preparation, modeling, and deployment and monitoring; equips the reader with the necessary information in order to obtain hands-on experience of the topics under discussion; provides a review of the basics of classical statistics that support and justify many data analysis methods, and a glossary of statistical terms; includes numerous examples using R and KNIME, together with appendices introducing the open source software; integrates illustrations and case-study-style examples to support pedagogical exposition. This practical and systematic textbook/reference for graduate and advanced undergraduate students is also essential reading for all professionals who face data analysis problems. Moreover, it is a book to be used following one´s exploration of it. Dr. Michael R. Berthold is Nycomed-Professor of Bioinformatics and Information Mining at the University of Konstanz, Germany. Dr. Christian Borgelt is Principal Researcher at the Intelligent Data Analysis and Graphical Models Research Unit of the European Centre for Soft Computing, Spain. Dr. Frank Höppner is Professor of Information Systems at Ostfalia University of Applied Sciences, Germany. Dr. Frank Klawonn is a Professor in the Department of Computer Science and Head of the Data Analysis and Pattern Recognition Laboratory at Ostfalia University of Applied Sciences, Germany. He is also Head of the Bioinformatics and Statistics group at the Helmholtz Centre for Infection Research, Braunschweig, Germany.
CMMI® for Development (CMMI-DEV) describes best practices for the development and maintenance of products and services across their entire lifecycle. By integrating essential bodies of knowledge, CMMI-DEV provides a single, comprehensive framework for organizations to assess their development and maintenance processes, implement improvements, and measure progress. Already widely adopted throughout the world for disciplined, high-quality engineering, CMMI-DEV version 1.3 now accommodates other modern approaches as well, including the use of Agile methods, Lean Six Sigma, and architecture-related development. CMMI® for Development, Third Edition, is the definitive reference for CMMIDEV version 1.3. The authors have revised their tips, hints, and cross-references, which appear in the margins of the book, to help you better understand, apply, and find information about the content of each process area. The book includes new and updated perspectives on CMMI-DEV in which people influential in the model´s creation, development, and transition share brief but valuable insights. It also features four new case studies and six contributed essays with practical advice for adopting and using CMMI-DEV. This book is an essential resource-whether you are new to CMMI-DEV or are familiar with an earlier version-if you need to know about, evaluate, or put the latest version of the model into practice. The book is divided into three parts. Part I offers the broad view of CMMI-DEV, beginning with basic concepts of process improvement. It introduces the process areas, their components, and their relationships to each other. It describes effective paths to the adoption and use of CMMI-DEV for process improvement and benchmarking, all illuminated with fresh case studies and helpful essays. Part II, the bulk of the book, details the generic goals and practices and the twenty-two process areas now comprising CMMI-DEV. The process areas are organized alphabetically by acronym for easy reference. Each process area includes goals, best practices, and examples. Part III contains several useful resources, including CMMI-DEV-related references, acronym definitions, a glossary of terms, and an index. Product Description CMMI® for Development (CMMI-DEV) describes best practices for the development and maintenance of products and services across their lifecycle. By integrating essential bodies of knowledge, CMMI-DEV provides a single, comprehensive framework for organizations to assess their development and maintenance processes and improve performance. Already widely adopted throughout the world for disciplined, high-quality engineering, CMMI-DEV Version 1.3 now accommodates other modern approaches as well, including the use of Agile methods, Lean Six Sigma, and architecture-centric development. CMMI® for Development, Third Edition, is the definitive reference for CMMI-DEV Version 1.3. The authors have revised their tips, hints, and cross-references, which appear in the margins of the book, to help you better understand, apply, and find information about the content of each process area. The book includes new and updated perspectives on CMMI-DEV in which people influential in the model´s creation, development, and transition share brief but valuable insights. It also features four new case studies and five contributed essays with practical advice for adopting and using CMMI-DEV. This book is an essential resource-whether you are new to CMMI-DEV or are familiar with an earlier version-if you need to know about, evaluate, or put the latest version of the model into practice. The book is divided into three parts. Part One offers the broad view of CMMI-DEV, beginning with basic concepts of process improvement. It introduces the process areas, their components, and their relationships to each other. It describes effective paths to the adoption and use of CMMI-DEV for process improvement and benchmarking, all illuminated with fresh case studies and helpful essays. Part Two, the bulk of the book, details the generic goals and practices and the twenty-two process areas now comprising CMMI-DEV. The process areas are organized alphabetically by acronym for easy reference. Each process area includes goals, best practices, and examples. Part Three contains several useful resources, including CMMI-DEV-related references, acronym definitions, a glossary of terms, and an index. List of Perspectives xiii Preface xv Book Acknowledgments xxi Part One: About CMMI for
Succeed with Domain-Driven Design (DDD), today´s best-practice framework and common language for making design decisions that accelerate projects, keeping them on track while smoothly incorporating inevitable change. Vaughn Vernon´s Implementing Domain-Driven Design builds on Eric Evans´ seminal Domain-Driven Design , helping practitioners flatten the DDD learning curve, identify their best opportunities to apply DDD, and overcome common implementation pitfalls. Vernon presents concrete and realistic DDD techniques through examples from familiar domains, such as a Scrum-based project management application that integrates with a collaboration suite and security provider. Each principle is backed up by realistic Java examples, and all content is tied together by a single case study of a company charged with delivering a set of advanced software systems with DDD. Using this book´s techniques, organizations can reduce time-to-market and build better software that is more flexible, more scalable, and better aligned to business goals. For software practitioners who are new to DDD, for those who´ve used DDD but not yet succeeded; and for DDD users who have experienced success and want to become even more effective. Readers will likely include software architects, systems anaysts, application developers, and project managers.