Aplikacje biurowe

602
Loading...
EBOOK

Slajd:ologia. Nauka i sztuka tworzenia genialnych prezentacji

Nancy Duarte

Slajd:ologia jest książką równie piękną, jak mądrą — inspirującą, a praktyczną zarazem. Jeśli ją przeczytasz i przyswoisz sobie jej cenne rady, nauczysz się projektować i wygłaszać prezentacje, które odbiorcy zauważą i zapamiętają na długo. Być może uda Ci się nawet stworzyć prezentację, która zmieni cały świat. Garr Reynolds Od publikacji książki Nancy nie ma już wymówki dla długich, nudnych i bezużytecznych prezentacji. Guy Kawasaki Ta książka zapiera dech w piersiach! Nancy napisała od dawna upragniony fachowy przewodnik po sztuce i rzemiośle tworzenia prezentacji. Jeśli traktujesz tę tematykę poważnie, musisz zgłębić tę książkę, aby móc w ogóle marzyć o daniu z siebie wszystkiego. Przestudiuj ją, wykuj na pamięć i podziel się nią z innymi. Seth Godin Tę książkę należy sączyć jak szlachetne wino lub pierwszorzędny jazz. Po bezbolesnym wchłonięciu jej treści staniesz się lepszym prelegentem. Spodziewam się teraz ogólnego polepszenia jakości prezentacji, u którego podstaw legnie właśnie ta książka. Ric Bretschneider, Senior Program Manager, Microsoft Office PowerPoint Naucz się przemawiać obrazami i nie popełniaj slajdobójstwa! Ludzie w większości są wzrokowcami — najsilniej przemawiają do nas obrazy. Wiemy o tym, lecz przygotowując prezentację, zbyt często traktujemy obraz li tylko jako ozdobny dodatek do treści. Tymczasem umiejętność prowadzenia porywającej narracji wizualnej bywa nieodzowna w pracy, szczególnie na niektórych stanowiskach. Dyrektor, menedżer czy trener wiedzą, że od tego, co i jak przekażą słuchaczom, może zależeć ich stan konta, awans, a czasami nawet sytuacja rynkowa firmy, w imieniu której przemawiają! Prezentacje to dziś jedno z podstawowych narzędzi komunikacji biznesowej. Dobrze opracowana i przeprowadzona prezentacja niesie ze sobą nieodparcie atrakcyjną moc przekazu. Z tej książki dowiesz się, jak opracowywać koncepty, przekładać je na język obrazów, przekazywać treści w naturalny, właściwy dla Ciebie sposób. Znajdziesz tu także inspirujące projekty graficzne oraz omówienia przykładów wykorzystania prezentacji przez międzynarodowe firmy. Jak nawiązać kontakt z różnymi grupami odbiorców? Jak zrozumiale zilustrować abstrakcyjne myśli? Jak szkicować, kreślić i wzmacniać przekaz diagramów? Jak tworzyć grafikę, która ułatwi publiczności przyswajanie informacji? Jak wybierać odpowiednie środki do prezentacji danych? Jak przygotowywać prezentacje, które naprawdę inspirują? Jak skutecznie wykorzystywać oprogramowanie do prezentacji?

604
Loading...
EBOOK

Solutions Architect's Interview. Winning strategies and effective tactics for interview success

Saurabh Shrivastava, Neelanjali Srivastav, Dhiraj Thakur, Sanjeet...

The Solutions Architect role sits at the intersection of technology, business strategy, and communication. Excelling in it takes more than technical expertise—it demands architectural thinking, leadership, and problem-solving skills. This book guides you in achieving this balance, walking you through every stage of becoming a Solutions Architect.It begins by unpacking what the role truly involves and then progresses into the nuances of interview preparation across multiple domains. You’ll learn how to structure your responses to scenario-based questions, highlight both your technical proficiency and soft skills, and position yourself as a strategic problem solver. Each chapter offers practical exercises, frameworks, and real interview examples that help you build the confidence and insight to stand out. The final chapter guides you through your first 90 days as a new Solutions Architect, aligning with business goals, understanding organizational architecture, and building credibility.By the end of this book, you’ll have the technical, behavioral, and strategic foundation to ace your interviews and thrive in any Solutions Architect role.

605
Loading...
EBOOK

Splunk Operational Intelligence Cookbook. Over 80 recipes for transforming your data into business-critical insights using Splunk - Third Edition

Josh Diakun, Paul R. Johnson, Derek Mock

Splunk makes it easy for you to take control of your data, and with Splunk Operational Cookbook, you can be confident that you are taking advantage of the Big Data revolution and driving your business with the cutting edge of operational intelligence and business analytics.With more than 80 recipes that demonstrate all of Splunk’s features, not only will you find quick solutions to common problems, but you’ll also learn a wide range of strategies and uncover new ideas that will make you rethink what operational intelligence means to you and your organization.You’ll discover recipes on data processing, searching and reporting, dashboards, and visualizations to make data shareable, communicable, and most importantly meaningful. You’ll also find step-by-step demonstrations that walk you through building an operational intelligence application containing vital features essential to understanding data and to help you successfully integrate a data-driven way of thinking in your organization.Throughout the book, you’ll dive deeper into Splunk, explore data models and pivots to extend your intelligence capabilities, and perform advanced searching with machine learning to explore your data in even more sophisticated ways. Splunk is changing the business landscape, so make sure you’re taking advantage of it.

606
Loading...
EBOOK

Spring Security. Secure your web applications, RESTful services, and microservice architectures - Third Edition

Mick Knutson, Robert Winch, Peter Mularien

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressured concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to easily secure your Java application with the tried and trusted Spring Security framework, a powerful and highly customizable authentication and access-control framework.The book starts by integrating a variety of authentication mechanisms. It then demonstrates how to properly restrict access to your application. It also covers tips on integrating with some of the more popular web frameworks. An example of how Spring Security defends against session fixation, moves into concurrency control, and how you can utilize session management for administrative functions is also included.It concludes with advanced security scenarios for RESTful webservices and microservices, detailing the issues surrounding stateless authentication, and demonstrates a concise, step-by-step approach to solving those issues. And, by the end of the book, readers can rest assured that integrating version 4.2 of Spring Security will be a seamless endeavor from start to finish.

607
Loading...
EBOOK

Spring Security 3.x Cookbook. Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios

Anjana Mankale

Web applications are exposed to a variety of threats and vulnerabilities at the authentication, authorization, service, and domain object levels. Spring Security can help secure these applications against those threats.Spring Security is a popular application security solution for Java applications. It is widely used to secure standalone web applications, portlets, and increasingly REST applications. It is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications and it is currently used to secure numerous demanding environments including government agencies, military applications, and central banks.Spring Security 3.x Cookbook is a repository of recipes to help you successfully secure web applications against threats and vulnerabilities at the authentication and session level layers using the Spring Security framework. We will not only explore Spring-based web applications, but also Java-based and Grails-based applications that can use Spring Security as their security framework. Apart from conventional web applications, we will also look at securing portlets, RESTful web service applications, and other non-web applications.This book will also take you through how to integrate Spring Security with other popular web frameworks/technologies such as Vaadin, EJB, and GWT. In addition to testing and debugging the implemented security measures, this book will also delve into finer aspects of Spring Security implementation such as how it deals with concurrency, multitenancy, and customization, and we will even show you how to disable it.This book gives you an overview of Spring Security and its implementation with various frameworks. It starts with container-based authentication before taking you on a tour of the main features of Spring Security. It demonstrates security concepts like BASIC, FORM, and DIGEST authentication and shows you how to integrate the Spring Security framework with various frameworks like JSF, struts2, Vaadin, and more.The book also demonstrates how to utilize container managed security without JAAS. Then, we move on to setting up a struts2 application before showing you how to integrate Spring Security with other frameworks like JSF, Groovy, Wicket, GWT, and Vaadin respectively.This book will serve as a highly practical guide and will give you confidence when it comes to applying security to your applications. It's packed with simple examples which show off each concept of Spring Security and which help you learn how it can be integrated with various frameworks.

608
Loading...
EBOOK

Spring Security. Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures - Fourth Edition

Badr Nasslahsen

With experienced hackers constantly targeting apps, properly securing them becomes challenging when you integrate this factor with legacy code, new technologies, and other frameworks. Written by a Lead Cloud and Security Architect as well as CISSP, this book helps you easily secure your Java apps with Spring Security, a trusted and highly customizable authentication and access control framework.The book shows you how to implement different authentication mechanisms and properly restrict access to your app. You’ll learn to integrate Spring Security with popular web frameworks like Thymeleaf and Microservice and Cloud services like Zookeeper and Eureka, along with architecting solutions that leverage its full power while staying loosely coupled. You’ll also see how Spring Security defends against session fixation, moves into concurrency control, and how you can use session management for administrative functions. This fourth edition aligns with Java 17/21 and Spring Security 6, covering advanced security scenarios for RESTful web services and microservices. This ensures you fully understand the issues surrounding stateless authentication and discover a concise approach to solving those issues.By the end of this book, you’ll be able to integrate Spring Security 6 with GraalVM native images seamlessly, from start to finish.