Wydawca: K-i-s-publishing
Perry Lea
Industries are embracing IoT technologies to improve operational expenses, product life, and people's well-being. An architectural guide is needed if you want to traverse the spectrum of technologies needed to build a successful IoT system, whether that's a single device or millions of IoT devices.IoT and Edge Computing for Architects, 2E encompasses the entire spectrum of IoT solutions, from IoT sensors to the cloud. It examines modern sensor systems, focusing on their power and functionality. It also looks at communication theory, paying close attention to near-range PAN, including the new Bluetooth® 5.0 specification and mesh networks. Then, the book explores IP-based communication in LAN and WAN, including 802.11ah, 5G LTE cellular, Sigfox, and LoRaWAN. It also explains edge computing, routing and gateways, and their role in fog computing, as well as the messaging protocols of MQTT 5.0 and CoAP.With the data now in internet form, you'll get an understanding of cloud and fog architectures, including the OpenFog standards. The book wraps up the analytics portion with the application of statistical analysis, complex event processing, and deep learning models. The book then concludes by providing a holistic view of IoT security, cryptography, and shell security in addition to software-defined perimeters and blockchains.
Smita Jain, Vasantha Lakshmi
The Fourth Industrial Revolution, or Industry 4.0, is all about digital transformation, manufacturing, and production. The connected world we live in today, including industries, comes with several cybersecurity challenges that need immediate attention. This book takes you through the basics of IoT and OT architecture and helps you understand and mitigate these security challenges.The book begins with an overview of the challenges faced in managing and securing IoT and OT devices in Industry 4.0. You’ll then get to grips with the Purdue model of reference architecture, which will help you explore common cyber attacks in IoT and OT environments. As you progress, you’ll be introduced to Microsoft Defender for IoT and understand its capabilities in securing IoT and OT environments. Finally, you will discover best practices for achieving continuous monitoring and vulnerability management, as well as threat monitoring and hunting, and find out how to align your business model toward zero trust.By the end of this security book, you’ll be equipped with the knowledge and skills to efficiently secure IoT and OT environments using Microsoft Defender for IoT.
Karthikeyan Shanmugam
Are you facing challenges with developing, deploying, monitoring, clustering, storing, securing, and managing Kubernetes in production environments as you're not familiar with infrastructure technologies? MicroK8s - a zero-ops, lightweight, and CNCF-compliant Kubernetes with a small footprint is the apt solution for you.This book gets you up and running with production-grade, highly available (HA) Kubernetes clusters on MicroK8s using best practices and examples based on IoT and edge computing.Beginning with an introduction to Kubernetes, MicroK8s, and IoT and edge computing architectures, this book shows you how to install, deploy sample apps, and enable add-ons (like DNS and dashboard) on the MicroK8s platform. You’ll work with multi-node Kubernetes clusters on Raspberry Pi and networking plugins (such as Calico and Cilium) and implement service mesh, load balancing with MetalLB and Ingress, and AI/ML workloads on MicroK8s. You’ll also understand how to secure containers, monitor infrastructure and apps with Prometheus, Grafana, and the ELK stack, manage storage replication with OpenEBS, resist component failure using a HA cluster, and more, as well as take a sneak peek into future trends.By the end of this book, you’ll be able to use MicroK8 to build and implement scenarios for IoT and edge computing workloads in a production environment.
IoT Penetration Testing Cookbook. Identify vulnerabilities and secure your smart devices
Aaron Guzman, Aditya Gupta
IoT is an upcoming trend in the IT industry today; there are a lot of IoT devices on the market, but there is a minimal understanding of how to safeguard them. If you are a security enthusiast or pentester, this book will help you understand how to exploit and secure IoT devices.This book follows a recipe-based approach, giving you practical experience in securing upcoming smart devices. It starts with practical recipes on how to analyze IoT device architectures and identify vulnerabilities. Then, it focuses on enhancing your pentesting skill set, teaching you how to exploit a vulnerable IoT device, along with identifying vulnerabilities in IoT device firmware. Next, this book teaches you how to secure embedded devices and exploit smart devices with hardware techniques. Moving forward, this book reveals advanced hardware pentesting techniques, along with software-defined, radio-based IoT pentesting with Zigbee and Z-Wave. Finally, this book also covers how to use new and unique pentesting techniques for different IoT devices, along with smart devices connected to the cloud.By the end of this book, you will have a fair understanding of how to use different pentesting techniques to exploit and secure various IoT devices.
IoT Projects with Bluetooth Low Energy. Harness the power of connected things
Madhur Bhargava
Bluetooth Low Energy, or Bluetooth Smart, is Wireless Personal Area networking aimed at smart devices and IoT applications. BLE has been increasingly adopted by application developers and IoT enthusiasts to establish connections between smart devices.This book initially covers all the required aspects of BLE, before you start working on IoT projects. In the initial stages of the book, you will learn about the basic aspects of Bluetooth Low Energy—such as discovering devices, services, and characteristics—that will be helpful for advanced-level projects. This book will guide you through building hands-on projects using BLE and IoT. These projects include tracking health data, using a mobile App, and making this data available for health practitioners; Indoor navigation; creating beacons using the Raspberry Pi; and warehouse weather Monitoring. This book also covers aspects of Bluetooth 5 (the latest release) and its effect on each of these projects.By the end of this book, you will have hands-on experience of using Bluetooth Low Energy to integrate with smart devices and IoT projects.
Igor Uduslivii
Designing and selling games on the iOS platform has become a phenomenon ever since the introduction of the App Store. With mobile gaming taking the World by storm, users are indulging in all different types of games. iPhone Game Blueprints is a hands on guide to both inspire and help developers, graphic designers, and game enthusiasts to create their own games for iOS devices.Taking a selection of iPhone game styles we will learn how to set the foundation and essential functionality for each game. Including thorough explanations of popular games such as puzzles, arcades, and adventures, as well as useful theoretical and technical concepts. iPhone Game Blueprints is your complete guide to creating great iPhone games, from a simple gesture game to a classic shoot 'em up.iPhone Game Blueprints guides you through the universe of mobile games, starting with the overall information about game ideas, ergonomic aspects, and much more. Then it switches to a description of each particular game type, presenting ready-to-use ideas and applications.This book will take you through a selection of iPhone game styles and show how to create the foundation and essential functionality for a game of that genre.The examples in this book are only the beginning.Including a deluge of practical tips, focusing on the best approach to game design, not forgetting to mention the pitfalls. iPhone Game Blueprints will give you the blueprints of several mobile game's essentials cores. Whether you're just getting started with gaming, or want to try a whole different genre of game, these blueprints are everything you need.
iPhone User Interface Cookbook. A concise dissection of Apple’s iOS user interface design principles
Cameron Banga
The incredible growth rates for the iPhone, iPod touch, and iPad have pushed consumers to a new “App” economy, with developers racing to the platform. Mobile touch-centric interfaces vary greatly from traditional computing platforms, and programmers as well as designers must learn to adapt to the new form-factor.The iPhone User Interface Cookbook offers a complete breakdown of standard interface design on the iPhone, iPod touch, and iPad. You will learn the tools behind the trade, how to properly utilize standard interface elements, and custom UI tricks that will help your work stand out on the App Store.The book is designed to be a complete overview of interface design on all iOS platforms, offering insight and an inside look into app design. A variety of topics are covered, starting with an overview of tools for the app interface designer, touching upon popular interface components such as the Tab Bar, and offering suggestions for complex game interfaces. Whether you’re new to the platform or a seasoned developer with numerous applications in the App Store, this book strives to teach everyone simple and easy to implement tips for iOS interface design. Regardless of skill level, the iPhone User Interface Cookbook offers a detailed breakdown of all things interface design.
Steve Goodman
With the recent boom in the smartphone market, users are demanding access to the latest consumer technology in the business, and that means you need to be able to integrate Apple's iPhone and iPad into your business in a way you can manage. Microsoft's Exchange Server provides a solution for integrating iPhone into your business and this book will show you exactly how to implement this solution.iPhone with Microsoft Exchange Server 2010: Business Integration and Deployment takes you through the basics of Apple mobile devices, and teaches you how to plan a basic, highly available Exchange environment. You will then be taught how to secure your environment, provision and manage iDevices.Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate email? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure, manageable way.Starting with the basics, you'll learn about what Apple mobile devices have to offer and how they have evolved into devices suitable for business use. If you're new to Exchange Server 2010, you'll learn the basics of Microsoft's world leading messaging suite, before learning how to plan, install and configure a highly available Exchange environment. You will also understand how to configure Office 365 and learn how both can be configured to apply policies to iPhone, iPad and the iPod Touch. You'll also learn how to configure advanced features, like certificate authentication, how to create and deploy configuration profiles for devices and how to manage your devices once they are in the hands of your users.After reading this book, you will be confident about introducing Apple mobile devices into your organization.
Cyrille Rossant
Intended to anyone interested in numerical computing and data science: students, researchers, teachers, engineers, analysts, hobbyists... Basic knowledge of Python/NumPy is recommended. Some skills in mathematics will help you understand the theory behind the computational methods.
Cyrille Rossant
Python is one of the leading open source platforms for data science and numerical computing. IPython and the associated Jupyter Notebook offer efficient interfaces to Python for data analysis and interactive visualization, and they constitute an ideal gateway to the platform.IPython Interactive Computing and Visualization Cookbook, Second Edition contains many ready-to-use, focused recipes for high-performance scientific computing and data analysis, from the latest IPython/Jupyter features to the most advanced tricks, to help you write better and faster code. You will apply these state-of-the-art methods to various real-world examples, illustrating topics in applied mathematics, scientific modeling, and machine learning.The first part of the book covers programming techniques: code quality and reproducibility, code optimization, high-performance computing through just-in-time compilation, parallel computing, and graphics card programming. The second part tackles data science, statistics, machine learning, signal and image processing, dynamical systems, and pure and applied mathematics.
Shobhit Mehta, Vikas Yadav
For beginners and experienced IT risk professionals alike, acing the ISACA CRISC exam is no mean feat, and the application of this advanced skillset in your daily work poses a challenge. The ISACA Certified in Risk and Information Systems Control (CRISC®) Certification Guide is a comprehensive guide to CRISC certification and beyond that’ll help you to approach these daunting challenges with its step-by-step coverage of all aspects of the exam content and develop a highly sought-after skillset in the process.This book is divided into six sections, with each section equipped with everything you need to get to grips with the domains covered in the exam. There’ll be no surprises on exam day – from GRC to ethical risk management, third-party security concerns to the ins and outs of control design, and IDS/IPS to the SDLC, no stone is left unturned in this book’s systematic design covering all the topics so that you can sit for the exam with confidence. What’s more, there are chapter-end self-assessment questions for you to test all that you’ve learned, as well as two book-end practice quizzes to really give you a leg up.By the end of this CRISC exam study guide, you’ll not just have what it takes to breeze through the certification process, but will also be equipped with an invaluable resource to accompany you on your career path.
IT Governance Publishing, Naeem Sadiq, Asif Hayat...
This book offers a thorough walk-through of the ISO 14001 standard, providing practical guidance on meeting its requirements. It includes clear explanations, examples, and sample procedures to help readers understand and apply environmental management principles. By following this guide, businesses can develop effective environmental policies, measure and monitor environmental performance, and continuously improve their management systems to align with sustainability goals. The book covers everything from emergency preparedness to internal audits and management reviews. It also provides tools such as sample procedures for identifying environmental aspects, ensuring regulatory compliance, and controlling documented information. Each chapter is designed to help organizations not only achieve ISO 14001 certification but also foster a long-term commitment to sustainable environmental practices.
IT Governance Publishing, Alan Calder
This book offers an in-depth exploration of ISO 22301:2019 and its role in business continuity management. It begins by explaining the standards and their importance for building resilience against disruptions. Readers will learn the core principles of ISO 22301, including the PDCA (Plan-Do-Check-Act) cycle, leadership responsibilities, and the integration with other management systems.As the book progresses, readers will delve into key aspects of creating an effective business continuity plan, such as context analysis, identifying stakeholders, conducting risk assessments, and establishing support systems. Practical strategies are provided to help readers optimize business continuity solutions and incorporate them into their operations, ensuring preparedness for unforeseen risks.The book also examines methods for evaluating and continuously improving continuity plans. In the final chapters, readers are guided through the process of ISO 22301 certification, offering a clear path to securing certification and enhancing organizational resilience.
IT Governance Publishing, Bridget Kenyon
This guide offers a comprehensive approach to implementing and auditing ISO 27001 controls, providing clear steps for establishing a robust Information Security Management System (ISMS). It is designed to help organizations navigate the complexities of meeting international security standards while ensuring the protection of sensitive information. The book covers every aspect of ISO/IEC 27001, from the foundational principles to practical applications of organizational, physical, and technological controls.Each chapter is carefully structured to explain the implementation of specific controls, focusing on real-world scenarios and offering actionable advice for security professionals. With detailed instructions and clear examples, readers will gain a deep understanding of the ISO 27001 framework and how to align their organizations with best practices. In addition to control implementation, the book emphasizes ongoing compliance and risk management strategies. It highlights critical areas such as incident management, supplier relationships, and data protection, ensuring readers can address security challenges at all levels. Whether new to ISO 27001 or looking to refine an existing ISMS, this book provides the tools necessary for successful information security management and compliance auditing.
ISO 27001/ISO 27002. A guide to information security management systems
IT Governance Publishing, Alan Calder
This comprehensive guide demystifies the ISO 27001 and ISO 27002 standards, offering a clear roadmap to understanding, implementing, and managing an Information Security Management System (ISMS). It begins with foundational concepts, a history of ISO 27001, and introduces the ISO 27000 family. The book proceeds to cover the PDCA cycle, Annex SL structure, and the significance of shall vs. should in compliance language.Core chapters walk through ISO 27001’s clauses and requirements, from organizational context and leadership to performance evaluation and continual improvement. Annex A's security controls are explored in detail, linking theory with practical application. ISO 27002 is also thoroughly reviewed to offer guidance on selecting and implementing appropriate controls.By the end of the book, readers gain a strong understanding of ISMS design, certification processes, and control mapping. This resource supports IT managers, compliance officers, and auditors seeking to align with international security standards.
ISO 50001. A strategic guide to establishing an energy management system
IT Governance Publishing, Alan Field
This guide introduces readers to the essential concepts of an Energy Management System (EnMS), with a focus on the internationally recognized ISO 50001 standard. It explains why energy management is a strategic priority, the benefits of adopting an EnMS, and how ISO 50001 plays a pivotal role in reducing energy consumption while enhancing environmental sustainability.The book covers the essential aspects of ISO 50001, from its key definitions and principles to the PDCA (Plan-Do-Check-Act) cycle that underpins its effectiveness. It also provides practical insights on integrating ISO 50001 with ISO 14001, creating a comprehensive management system that aligns with both energy and environmental objectives. Readers will learn about the key differences between the 2011 and 2018 versions of ISO 50001 and how to successfully prepare for third-party assessments to achieve certification.Perfect for energy managers, sustainability professionals, and organizations aiming to improve their energy efficiency, this book offers a detailed roadmap for implementing ISO 50001 and achieving long-term energy savings. It also highlights the strategic advantages of integrating energy management with broader sustainability goals and environmental management practices.
IT Audit Field Manual. Strengthen your cyber defense through proactive IT auditing
Lewis Heuermann
As cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual.Serving as a roadmap for beginners as well as experienced professionals, this manual guides you from foundational concepts and audit planning to in-depth explorations of auditing various IT systems and networks, including Cisco devices, next-generation firewalls, cloud environments, endpoint security, and Linux systems. You’ll develop practical skills in assessing security configurations, conducting risk assessments, and ensuring compliance with privacy regulations. This book also covers data protection, reporting, remediation, advanced auditing techniques, and emerging trends.Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you’ll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application.
IT Governance Publishing, Brian Johnson, Walter Zondervan
This book delves into the evolving role of IT in business transformation, covering key strategies for aligning business objectives with digital tools and technologies. It focuses on the importance of governance, efficiency, and risk management in driving IT success. Readers will discover how to build effective IT strategies, manage service delivery, and improve stakeholder engagement in a rapidly changing digital landscape. With practical frameworks and real-world case studies, it provides a roadmap for managing the complexities of digital service design, contract management, and performance. As the book progresses, it highlights the challenges and opportunities IT presents, from governance issues to innovation drivers. It concludes with actionable insights into digital readiness and transformation, equipping readers with the tools to navigate and lead in the digital age.
IT Governance. An international guide to data security and ISO 27001/ISO 27002
IT Governance Publishing, Alan Calder, Steve G...
In the modern digital landscape, information security has never been more critical. This book introduces readers to the essential components of IT governance, focusing on frameworks like ISO 27001 and strategies for managing risks in today's complex information economy. The content explores key topics like cybersecurity, risk management, information security policies, and compliance with international standards. As you progress, you’ll learn to navigate the challenges of organizing and maintaining a secure IT environment, with insights into compliance regulations, security frameworks, and governance codes. The book provides hands-on guidance on applying security controls, setting up robust information security policies, and evaluating risks. Real-world scenarios and practical applications ensure the knowledge gained is immediately applicable to professional environments.The journey culminates in an understanding of how to integrate IT governance within an organization. You’ll learn to assess vulnerabilities, implement risk management strategies, and ensure that security measures align with both business goals and regulatory requirements. The book equips readers with the tools needed to strengthen IT systems against evolving threats and to stay ahead in the information security landscape.
Barzan Antal Tony (Euro), Barzan "Tony" Antal,...
OCS Inventory NG is a cross-platform, open-source inventory and asset management solution. It brings more than plentiful features to the table to satisfy the business needs of small-to-large organizations with up to tens of thousands of computers. However, to put this inventory solution to optimum use requires a lot of skill.This book will lead you through the steps of implementing OCS-NG until you master working with it. This book aims at reducing efforts involved in resource management. The solution gives a robust foundation on top of which we can implement other third party applications, plugins, and much more.This book begins with the basics—it explains what IT inventorying needs are to be met in the real-world. Then, it covers a step-by-step approach to everything you need to know to set up and implement OCS-NG as a centralized inventory solution to meet all these requirements. It delves deeper into carrying out inventory tasks with every chapter.You will learn how to choose the best agent type and deployment method. We discuss the process of gathering inventory data and cover techniques for creating and deploying packages. You will also learn how to acquire added benefits with the use of plugins. We discuss best practices on inventorying and troubleshooting agent-related problems. The book presents real-world inventorying scenarios along with their solutions. You will basically learn how to use OCS-NG to get the most out of it.As a conclusion, if you want to learn about a free solution that fulfils inventorying necessities of the real-world, this is the book for you.
IT Governance Publishing, Claire Agutter
This book offers a thorough guide to ITIL® 4’s Create, Deliver, and Support (CDS) module, covering key concepts and practices for IT service management. It begins with foundational aspects of the service value system (SVS), highlighting organizational structures, roles, and collaborative cultures essential for successful service delivery. The early chapters focus on adopting a shift-left approach to resource management, helping teams prioritize efficiency and proactive problem-solving.As the book progresses, it explores the strategic planning and management of resources within the SVS, stressing the importance of continual improvement and leveraging technology to optimize service management. It also provides insight into managing value streams for new services, guiding readers on how to create, manage, and measure service value chains for improved service delivery and innovation.The later chapters address specific ITIL® practices, such as service design, incident management, problem management, and knowledge management. The book concludes with exam preparation for ITIL® 4 CDS, offering practical case studies and real-world scenarios.By the end, readers will be equipped to enhance service management processes and ensure the delivery of high-quality IT services aligned with business objectives.
IT Governance Publishing, Claire Agutter
This book explores ITIL® 4’s approach to digital strategy, starting with key concepts like digital transformation, ITIL® 4 guiding principles, and the role of technology in shaping business models. It introduces the driving forces behind change and how to align digital strategies with business goals for maximum impact.The middle chapters delve into the practical aspects of IT strategy, focusing on areas such as strategy management, governance, and continual improvement. Key topics like digital disruption, organizational viability, and strategic approaches for operational excellence are covered in-depth. The book provides a structured framework for managing risks, handling financial strategies, and fostering innovation in digital organizations.The final chapters guide readers on implementing and assessing digital strategies, from defining clear goals to establishing operational models. Practical tools, case studies, and exam preparation further enhance the reader's understanding. Ideal for IT professionals, business leaders, and strategists, this book equips them with the skills and knowledge to lead digital transformation and succeed in the modern business environment.
IT Governance Publishing, Claire Agutter
This book offers a comprehensive exploration of ITIL® 4 Direct, Plan and Improve (DPI), beginning with key concepts of governance, risk management, continual improvement, and organizational change management. It introduces the essentials of direction, planning, and improvement, guiding readers in aligning strategic goals with actionable steps. The core methods, risks, and controls crucial for effective DPI practices are explored.As you progress, the book delves into governance, risk, and compliance, emphasizing how to align objectives and establish clear decision-making frameworks. You'll learn to craft policies and controls, ensuring a robust and adaptable service management strategy. A strong focus on continual improvement equips you with practical strategies for assessing and enhancing service quality.The book also covers organizational change management (OCM), providing techniques to manage emotional and social aspects of change while aligning with business goals. You’ll gain strategies for stakeholder communication, feedback mechanisms, and values-based change management. Finally, the book discusses measurement, reporting, and optimization, showing how to map value streams, optimize workflows, and measure performance. By the end, you’ll be ready to lead DPI initiatives and drive transformation within your organization.