Informatyka

Zajrzyj do kategorii Informatyka w księgarni internetowej Ebookpoint. Znajdziesz tutaj bestsellerowe książki, ebooki i kursy video z branży IT. Sięgnij po najlepszą literaturę dla specjalistów i rozwijaj doświadczenie, które już posiadasz, lub rozpocznij swoją przygodę z programowaniem, cyberbezpieczeństwem lub grafiką komputerową. Pogłębiaj swoją wiedzę tak, jak Ci wygodnie - z tradycyjną książką, wygodnym ebookiem lub nowoczesnym videokursem. Sprawdź, jakie tytuły znajdziesz w kategorii Informatyka!

1729
Ładowanie...
EBOOK

Implementing Splunk (Update). A comprehensive guide to help you transform Big Data into valuable business insights with Splunk 6.2

VINCENT BUMGARNER, James D. Miller

If you are a data analyst with basic knowledge of Big Data analysis but no knowledge of Splunk, then this book will help you get started with Splunk. The book assumes that you have access to a copy of Splunk, ideally not in production, and many examples also assume you have administrator rights.

1730
Ładowanie...
EBOOK

Implementing SugarCRM 5.x. Install, configure, and administer a robust Customer Relationship Management system using SugarCRM

Angel Magana

SugarCRM is a popular customer relationship management system. It is an ideal way for small-medium business to try out a CRM system without committing large sums of money. Although SugarCRM is carefully designed for ease of use, attaining measurable business gains requires careful planning and research.This book will give you all the information you need to start using this powerful CRM system. It is the definitive guide to implementing SugarCRM. Whether you are wondering exactly what benefits CRM can bring or you have already learned about CRM systems but have yet to implement one or you're working with SugarCRM already, this book will show you how to get maximum benefit from this exciting product. It demonstrates how to install SugarCRM and also how to get the most out of it by customizing it and integrating CRM into your organization as per your needs.Focused on the needs of the enterprise, this book provides a solution-driven approach for both business and IT specialists to get the most from this powerful and popular Open Source application. It begins with a general discussion about CRM. You will then learn the benefits of such systems, and then explore SugarCRM and its unique value. You will then go through the guidelines for installing and making deployment selections that are set out alongside information for identifying, planning, and applying customizations. Training guidelines and ongoing administrative tasks will be discussed as you progress further into the book. A brief overview of SugarCRM 6.0 is provided at the end of the book.

1731
Ładowanie...
EBOOK

Implementing VMware Horizon 7. Second Edition - Second Edition

Jason Ventresco

VMware Horizon 7 has been a buzz since it was announced. One of the major reasons is the introduction of the new Instant Clones feature. This book will complement the product documentation by providing real-life examples of how it is implemented along with the latest features and components of the platform.We'll explore the latest features of the platform, including those added through product acquisitions such as User Environment Manager and App Volumes. Further on, you will also be introduced to the new capabilities added to the core product such Linked-Clone RDS pools.Upon completion of this book, you will have an understanding of the capabilities and benefits VMware Horizon can provide to your organization, and how each of its components are implemented.

1732
Ładowanie...
EBOOK

Implementing VMware Horizon 7.7. Manage and deploy the end-user computing infrastructure for your organization - Third Edition

Jason Ventresco

This third edition of Implementing VMware Horizon 7.7 has been updated to get you up to speed with VMware Horizon 7.7 by showing you how to use its key features and deploying an end-user computing infrastructure for your own organization.The book begins by guiding you on how to deploy all the core requirements for a VMware Horizon infrastructure. It then moves on to show you how to provision and administer end-user computing resources using VMware Horizon. You’ll not only be able to deploy the core VMware Horizon features, but you’ll also be able to implement new features, such as the Just-in-Time Management Platform (JMP) and the Horizon Console. You’ll also focus on the latest features and components of the Horizon platform and learn when and how they are used.By the end of the book, you will have developed a solid understanding of how your organization can benefit from the capabilities VMware Horizon offers and how each of its components is implemented.

1733
Ładowanie...
EBOOK

Implementing VMware Horizon 7.7. Manage and deploy the end-user computing infrastructure for your organization - Third Edition

Jason Ventresco

This third edition of Implementing VMware Horizon 7.7 has been updated to get you up to speed with VMware Horizon 7.7 by showing you how to use its key features and deploying an end-user computing infrastructure for your own organization.The book begins by guiding you on how to deploy all the core requirements for a VMware Horizon infrastructure. It then moves on to show you how to provision and administer end-user computing resources using VMware Horizon. You’ll not only be able to deploy the core VMware Horizon features, but you’ll also be able to implement new features, such as the Just-in-Time Management Platform (JMP) and the Horizon Console. You’ll also focus on the latest features and components of the Horizon platform and learn when and how they are used.By the end of the book, you will have developed a solid understanding of how your organization can benefit from the capabilities VMware Horizon offers and how each of its components is implemented.

1734
Ładowanie...
EBOOK

Implementowanie Microsoft Dynamics AX 2012 za pomocą Sure Step 2012

Keith Dunkinson, Andrew Birch

Opanuj AX 2012, poznaj triki i stosuj porady ekspertów, by zapewnić powodzenie projektu Microsoft Dynamics AX jest kompleksowym rozwiązaniem ERP (Enterprise Resource Planning) przeznaczonym dla średnich i większych przedsiębiorstw,  które wspomaga efektywne prowadzenie działalności, zarządzanie zmianami i globalne współzawodnictwo. Microsoft Dynamics Sure Step to metodyka implementacji, zestaw narzędzi i aplikacja, ułatwiająca partnerom pakietu Dynamics (AX, CRM, NAV, GP i SL) prawidłową implementację rozwiązań Dynamics, takich jak Dynamics AX. Książka Implementowanie Microsoft Dynamics AX 2012 za pomocą Sure Step 2012 przeprowadzi nas przez fazy metodyki Sure Step; od instalowania i kon-figuracji Sure Step po diagnostykę i wymagania, od stosowania standardo-wego rozwiązania AX po pełne wykorzystywanie modyfikacji. Dzięki przytoczonym w książce rzeczywistym przykładom i przydatnym wska-zówkom, dotyczącym stosowanych aspektów implementacji AX, możemy przekształcić metodykę w działania praktyczne. Dla kogo przeznaczona jest ta książka Książka doskonale nadaje się dla osób, które są konsultantami Dynamics AX, projektantami, czy też znajdują się w grupie klientów bądź handlowców, którym potrzebna jest wiedza z zakresu rozwiązań biznesowych AX lub chcą dostarczać rozwiązania biznesowe AX, spełniające lub nawet przewyższające oczekiwania organizacji. Wymagana jest podstawowa wiedza na temat produktów Dynamics AX i Sure Step. Na podstawie książki poznamy: - Najważniejsze zasady metodyki Sure Step - Kluczowe wyniki końcowe oczekiwane w każdej fazie implementacji Sure Step i metody ich uzyskiwania - Metody identyfikowania zagrożeń i problemów, które mogą powstawać w trakcie realizacji projektu implementowania AX oraz sposoby ich łagodze-nia - Możliwości wskazywania odpowiednich zasobów dla zespołów oraz okre-ślania, jak i kiedy je wykorzystywać - Techniczne koncepcje potrzebne do efektywnego planowania i zarządzania wdrożeniem produktu AX 2012 - Metody efektywnego zarządzania wewnętrznymi i zewnętrznymi zasobami - Obszary, do których nie dociera czy nie jest propagowana metodyka Sure Step

1735
Ładowanie...
EBOOK

Improving CAD Designs with Autodesk Fusion 360. A project-based guide to modelling effective parametric designs

Kevin Michael Land

Autodesk Fusion 360 has become an indispensable tool for designers, tinkerers, and engineers worldwide thanks to its versatility that allows for large-scale assemblies and smaller, quick 3D prints. If you’ve faced challenges with learning Fusion 360, this book will help you overcome them and build the confidence to design your own projects, explaining step-by-step instructions and the purpose of each tool.In this book, you’ll dive into the design workspace and learn sketching fundamentals such as setting up a component, recognizing when a sketch is fully constrained, and parametrically flexing models. Through trial and error, you’ll work on multiple easy-to-build projects to create simple, useful items that can be quickly 3D printed for use around the house and then advance to much bigger projects that require joint connectivity and large assemblies.By the end of this book, you’ll be able to sketch fully parametric designs, translate them into 3D models, and create your own unique designs.

1736
Ładowanie...
EBOOK

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture

1737
Ładowanie...
EBOOK

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture

1738
Ładowanie...
EBOOK

Inclusive Design for Accessibility. A practical guide to digital accessibility, UX, and inclusive web and app design

Dale Cruse, Denis Boudreau, Glenda Sims

Despite our growing reliance on digital technology, millions of users are still excluded from fully engaging with websites, apps, and digital services because nobody thought to design for them. Inclusive Design for Accessibility challenges you to rethink how you build digital experiences, offering the tools and guidance needed to move beyond compliance and create experiences that work for everyone.With contributions from twelve accessibility leaders—Dale Cruse, Denis Boudreau, Dr. Angela Young, Maya Sellon, Julianna Rowsell, Nandita Gupta, Jennifer Chadwick, Crystal Scott, Chris McMeeking, Dr. Keith Newton, Charlie Triplett, and Kai Wong—this book lays out the fundamentals of inclusive design and its application in advanced and emerging technologies. You'll discover practical strategies and real-world examples that show you how to embed accessibility into projects, from user research and testing to creating accessible websites and mobile apps. You’ll also focus on how AI can enhance accessibility and learn to tackle the challenges posed by VR and AR.For designers, developers, product managers, and business leaders, this book will reshape how you approach inclusive design, helping you move beyond ticking boxes toward building digital products that don't leave anyone behind.*Email sign-up and proof of purchase required

1739
Ładowanie...
EBOOK

Industrial Automation and Robotics. A Comprehensive Guide to Automated Systems and Robotics

Mercury Learning and Information, Jean Riescher Westcott,...

This course offers an introduction to automation and robotics for industrial applications. It begins with essential concepts of hydraulics and pneumatics, explaining their roles in industrial automation. Next, it delves into circuits and their applications in hydraulic, pneumatic, and fluidic design. The latter part focuses on electric and electronic controls, ending with robotics, robotic programming, and their industrial applications. Understanding these concepts is crucial for anyone looking to work in automation, as they provide the foundation for designing and maintaining automated systems. The course covers everything from basic laws and principles to advanced topics like the use of UAVs and AI in industrial automation.Throughout the course, you'll explore real-world applications and see how these principles are applied in industry. This structured approach ensures you gain a comprehensive understanding, from fundamental concepts to advanced automation and robotics techniques, preparing you for a career in this dynamic field.

1740
Ładowanie...
EBOOK

Industrial Cybersecurity. Efficiently secure critical infrastructure systems

Pascal Ackerman

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

1741
Ładowanie...
EBOOK

Industrial Digital Transformation. Accelerate digital transformation with business optimization, AI, and Industry 4.0

Shyam Varan Nath, Ann Dunkin, Mahesh Chowdhary,...

Digital transformation requires the ability to identify opportunities across industries and apply the right technologies and tools to achieve results. This book is divided into two parts with the first covering what digital transformation is and why it is important. The second part focuses on how digital transformation works.After an introduction to digital transformation, you will explore the transformation journey in logical steps and understand how to build business cases and create productivity benefit statements. Next, you’ll delve into advanced topics relating to overcoming various challenges. Later, the book will take you through case studies in both private and public sector organizations. You’ll explore private sector organizations such as industrial and hi-tech manufacturing in detail and get to grips with public sector organizations by learning how transformation can be achieved on a global scale and how the resident experience can be improved. In addition to this, you will understand the role of artificial intelligence, machine learning and deep learning in digital transformation. Finally, you’ll discover how to create a playbook that can ensure success in digital transformation.By the end of this book, you’ll be well-versed with industrial digital transformation and be able to apply your skills in the real world.

1742
Ładowanie...
EBOOK

Industrial Internet Application Development. Simplify IIoT development using public cloud and native cloud services

Alena Traukina, Jayant Thomas, Prashant Tyagi, Veera...

The Industrial Internet refers to the integration of complex physical machines with networked sensors and software. The growth in the number of sensors used in industrial machinery has led to an exponential increase in data being captured for predictive analytics.Industrial Internet Application Development is a practical guide for developers who want to create applications that leverage the full capabilities of IIoT. You will get started by learning how to develop your first IIoT application and understanding its deployment and security. Once you’re familiar with what IIoT is, you will move on to exploring Edge Development along with the analytics aspect of the IIoT stack. In later chapters, you’ll get to grips with the deployment of IIoT applications on the Predix platform. As you cover these concepts, you’ll be able to identify key elements of the development framework and understand their importance while considering architecture and design for IIoT applications.By the end of this book, you will have the skills you need to deploy IIoT applications on the Predix platform and incorporate best practices for developing fault-tolerant and reliable IIoT systems.

1743
Ładowanie...
EBOOK

Industrializing Financial Services with DevOps. Proven 360° DevOps operating model practices for enabling a multi-speed bank

Spyridon Maniotis

In recent years, large financial services institutions have been embracing the concept of DevOps in the core of their digital transformation strategies. This book is inspired by real enterprise DevOps adoptions in the financial services industry and provides a comprehensive proven practice guide on how large corporate organizations can evolve their DevOps operating model.The book starts by outlining the fundamentals comprising a complete DevOps operating model. It continues with a zoom in on those fundamentals, combining adoption frameworks with real-life examples. You’ll cover the three main themes underpinning the book’s approach that include the concepts of 360°, at relevance, and speeds. You’ll explore how a bank’s corporate and technology strategy links to its enterprise DevOps evolution. The book also provides a rich array of proven practices on how to design and create a harmonious 360° DevOps operating model which should be enabled and adopted at relevance in a multi-speed context. It comes packed with real case studies and examples from the financial services industry that you can adopt in your organization and context.By the end of this book, you will have plenty of inspiration that you can take back to your organization and be able to apply the learning from pitfalls and success stories covered in the book.

1744
Ładowanie...
EBOOK

Infografiki. Praktyczne zastosowanie w biznesie

Mark Smiciklas

Przedmowa autorstwa Guya Kawasakiego! Infografika jest dziś najlepszym sposobem na… wszystko! Dlaczego? Ponieważ infografiki: są wzrokowym środkiem przekazu, w mgnieniu oka ujawniają swoje znaczenie, są intuicyjne, są zabawne, są estetyczne, są uwielbiane przez wszystkich, są skuteczne! Możesz wizualizować: rozbudowane koncepcje, dane liczbowe, procesy, sprawy osobiste. Przy pomocy infografik można: zwiększyć sprzedaż, budować marki, obsługiwać klientów, organizować zespoły, mierzyć ROI (kierownictwo to lubi). Naucz się tworzyć infografiki. To proste, zobaczysz! Mark Smiciklas - twórca ds. strategii Intersection Consulting. Uznany wizualizator i orędownik infografiki (zna się na rzeczy jak nikt). Ponad osiemnaście lat doświadczenia w roli starszego specjalisty ds. marketingu (B2B, B2C i reszta).

1745
Ładowanie...
EBOOK

Information Security Handbook. Develop a threat model and incident response strategy to build a strong information security framework

Darren Death

Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why it’s important.It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, you’ll discover some best practices that can be implemented to make your security framework strong. By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organization’s requirements.

1746
Ładowanie...
EBOOK

Information Security Handbook. Enhance your proficiency in information security program development - Second Edition

Darren Death

Information Security Handbook is a practical guide that’ll empower you to take effective actions in securing your organization’s assets. Whether you are an experienced security professional seeking to refine your skills or someone new to the field looking to build a strong foundation, this book is designed to meet you where you are and guide you toward improving your understanding of information security.Each chapter addresses the key concepts, practical techniques, and best practices to establish a robust and effective information security program. You’ll be offered a holistic perspective on securing information, including risk management, incident response, cloud security, and supply chain considerations. This book has distilled years of experience and expertise of the author, Darren Death, into clear insights that can be applied directly to your organization’s security efforts. Whether you work in a large enterprise, a government agency, or a small business, the principles and strategies presented in this book are adaptable and scalable to suit your specific needs.By the end of this book, you’ll have all the tools and guidance needed to fortify your organization’s defenses and expand your capabilities as an information security practitioner.