Creating Infographics with Adobe Illustrator : Learn the Basics and Design Your First Infographic |
Autore | Harder Jennifer |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress L. P., , 2024 |
Descrizione fisica | 1 online resource (513 pages) |
ISBN | 979-88-6880-005-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: What Are Infographics? -- A Short History About Infographics -- Ancient History-Pre-1600 AD -- 1601 AD-1800 AD -- 1801 AD-1900 AD -- 1901 AD-2000 AD -- 2001 AD-Present and Modern Infographics -- How Did the Logo Come Along with the Infographic Historically? -- What Is the Difference Between an Infographic and a Logo? -- An Infographic in Its Basic Form -- Summary -- Chapter 2: Preparation for Creating a Logo and Infographics -- Design Considerations -- Color Theory and Harmony Rules with Adobe Color Online -- The Science of Color -- Working with the Adobe Color App -- Color Harmony Definitions -- Base Color Settings and Eyedropper -- Color Modes RGB, HSB, and LAB, HEX Color Codes, and What About CMYK? -- Color Science 2D and 3D visualization -- Adding Your Color Theme -- Other Options: Extract Theme and Extract Gradient -- Accessibility Tools for Contrast and Color Blindness When Dealing with Text and Graphics -- Additional Tips on Color and Fonts -- How Research Plays an Important Role in Your Infographic Creation -- What Topics Are Good for an Infographic? -- Science -- Instructional -- Collecting Your Data -- Working with Your Team and Your Client in Design to Create a Mock-Up Sketch and Mood Board and Keep the Theme -- Other Design Considerations -- Time Frame Considerations: How Long Will Your Infographic Be Relevant to Your Audience? -- How Simple or Complex Should You Make Your Infographic? -- What Kinds of Media Will You Use to Display the Infographic? -- Summary -- Chapter 3: Scanner Basics -- Making Your Sketch into a Digital Format -- Scanner Basics -- Scanning a Sketch -- Scanner Color Modes -- Adjusting Scanned Image -- Saving Scanned Files -- Photocopier or All-in-One Office Printer -- A Digital Camera.
Your Smartphone Camera, an Additional Adobe App, and a Scanner Bin -- Summary -- Chapter 4: Setting Up Your Workspace -- Creating a New Document in Illustrator -- Workspace Options -- Panels and Tools Overview -- Illustrator Panels -- Toolbars -- Control -- Color -- Color Guide -- Swatches -- Brushes -- Symbols -- Stroke -- Gradient -- Transparency -- Appearance -- Graphic Styles -- Layers -- Asset Export -- Artboards -- Comments -- Properties -- Libraries -- Using Your History Panel -- New Contextual Task Bar -- Menus -- Summary -- Chapter 5: Working with Artboards and Saving Files -- Working with Artboards -- Adding Rulers -- Editing the Artboard -- Linking Your Digital Mock-Up Image to the Illustrator File -- Project: Saving Your Illustrator File -- Saving Duplicates of Your File -- Working with Your Infographics Between Photoshop and Illustrator -- Summary -- Chapter 6: A Basic Review of Illustrator's Shape Tools -- Drawing Tools Overview -- Rectangle Tool (M) -- Rounded Rectangle Tool -- Ellipse Tool (L) -- Polygon Tool -- Star Tool -- Line Segment, Arc, and Spiral Tools -- Drawing Tools That Can Be Used to Create Basic Graphs -- Moving and Selecting Your Shapes on the Artboard -- Selection Tool (V) -- Direct Selection Tool (A) -- Group Selection Tool -- Basic Modification to Shapes -- Arranging Shape and Path Order -- Working with the Control, Transform, and Properties Panel -- Summary -- Chapter 7: A Basic Review of Illustrator's Pen Tools -- Drawing Custom Shapes with the Pen Tool -- Pen Tool (P) and Curvature Tool (Shift+~) Basics -- Join Points on an Open Path -- Add Anchor Point Tool (+) Review -- Delete Anchor Point Tool (-) Review -- Anchor Point Tool (Shift +C) Review -- Curvature Tool (Shift +~) Review -- Swapping Fill and Stroke Colors with the Pen Tool -- Control Panel Anchor Point Options and How They Relate to Related Tools. Combining Shapes with the Pathfinder Panel -- Clipping Masks and Compound Paths -- Summary -- Chapter 8: Working with Illustrator's Layers and Additional Drawing and Type Tools -- Working with Layers -- Working in Outline Mode (Preview) -- Project: Trace over a Linked File -- Additional Ways of Adding Color to an Object's Fill and Stroke -- Eyedropper Tool (I) -- Gradient, Pattern Options, and Transparency (Opacity) Panels -- Live Paint Bucket Tool (K) and Live Selection Tool (Shift+L) -- Color Guide Panel -- Recolor -- Generative Recolor -- Adding Text with the Type Tool -- Type Tool and Vertical Type Tool -- Area Type tool and Vertical Area Type Tool -- Adding Placeholder Text -- Type on a Path Tool and Vertical Type on a Path Tool -- Touch Type Tool (Shift +T) -- Control Panel, Properties Panel, and Related Panels for Type -- Convert to Type Outlines -- Retype (Beta) -- Brush Tools That Can Assist in Creating Infographics -- Paintbrush Tool (B) and Brushes Panel -- Blob Brush (Shift+B) -- Eraser Tool (Shift+E) -- Blend Tool (W) -- Object ➤ Intertwine with Lasso Tool -- Applying Appearance -- Creating Graphic Styles -- Creating Symbols -- Summary -- Chapter 9: Creating Your First Infographic Projects -- Project: Creating Your First Infographic -- Project Idea 1: Infographic Resume (One Page) -- Project Idea 2: Historical Infographic (Mine Map/Mine Shaft) -- Summary -- Index. |
Record Nr. | UNINA-9910770268503321 |
Harder Jennifer | ||
Berkeley, CA : , : Apress L. P., , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Crypto basics : a nontechnical introduction to creating your own money for investors and inventors / / Slava Gomzin |
Autore | Gomzin Slava |
Edizione | [[First edition].] |
Pubbl/distr/stampa | New York, NY : , : Apress L. P., , [2022] |
Descrizione fisica | 1 online resource (333 pages) |
Disciplina | 332.4 |
Soggetto topico |
Cryptocurrencies
Electronic funds transfers - Security measures Blockchains (Databases) |
ISBN | 1-4842-8321-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- About the Foreword Author -- Acknowledgments -- Foreword -- Preface -- Introduction -- Part I: Understanding Crypto -- Chapter 1: How Cryptography Works -- First Ciphers -- Modern Cryptography -- Hash Function -- SHA-256 -- RIPEMD160 -- Merkle Tree -- Asymmetric (Public Key) Encryption -- Digital Signatures -- Elliptic Curves -- Cryptography and Security -- What's Next? -- Untitled -- Chapter 2: How Bitcoin Works -- Problems Solved by Bitcoin -- Double-Spending Problem -- Distributed Peer-to-Peer Network -- How Bitcoin Blockchain Works -- Cash and Bank Transactions -- Blockchain vs. Bank Transaction Ledger -- Simplified Blockchain Transaction -- Dealing with Fractions -- Transaction Pool -- The Byzantine Generals Problem -- Proof-of-Work and Mining -- Generating a New Block -- Solving the Block -- Temporary Forks and Confirmations -- Mining Rewards -- Wallets and Addresses -- What's Next? -- Chapter 3: How Other Cryptos Work -- Proof of Stake -- Delegated Proof of Stake -- Block Lattice -- How Block Lattice Works -- How Coins Are Transferred in Block Lattice -- Token Platforms -- What's Next? -- Chapter 4: Cryptosecurity -- Inauguration Day -- Plastics or Crypto: No Difference -- The Great Infiltration -- How SQL Injection Works -- Ransomware Attacks -- Attacks on Blockchain Protocols -- 51% Attack -- More Attacks on Blockchain -- What's Next? -- Chapter 5: Crypto Privacy -- Bitcoin Is Pseudonymous! -- Making Your Bitcoin Transactions Private -- Unique Wallet Address per Transaction -- Coin Mixers (Tumblers) -- The Onion Router (TOR) -- VPN (Virtual Private Network) -- What Is VPN? -- How Does VPN work? -- If I Use TOR, Should I Use VPN As Well? -- Besides the Case with the Coin Mixer, Should I Use TOR and VPN? -- Choose the Right Wallet -- Run Your Wallet with TOR.
Bitcoin TOR Nodes -- What's Next? -- Chapter 6: How Monero Works -- Why Monero Is Important -- CryptoNote -- Untraceability and Unlinkability -- Cryptographic Monero Technologies -- View and Spend Keys -- Stealth Addresses -- Ring Signatures -- Churning -- Pedersen Commitments and Range Proofs -- Key Images -- Learn More About Monero -- What's Next? -- Chapter 7: Crypto Payments -- Why Pay with Crypto? -- Why Crypto Payments Are Difficult -- Custodial Payment Processing -- Non-custodial Payment Processing -- Two-Tier Crypto Networks -- Lightning Network -- How Lightning Works -- Lightning Cons -- Prepaid Cards Loaded with Crypto -- Gift Cards Purchased with Crypto -- What's Next? -- Part II: Using Crypto -- Chapter 8: How to Choose the Wallet -- Custodial Wallets -- Non-custodial Wallets -- Hot vs. Cold Wallets -- Lite (Thin Client) Wallets -- Desktop vs. Mobile Wallets -- Multisig Wallets -- Full Node Wallets -- Hardware Wallets -- Paper Wallets -- CLI Wallets -- Not Sure Yet Where to Start? -- What's Next? -- Chapter 9: Getting Crypto for Free -- Faucets -- Airdrops and Bounties -- Bitcointalk -- How to Find Bounties -- AMA Rewards -- Bitcointalk Signature Campaigns -- Mining -- Mining Monero -- What's Next? -- Chapter 10: How Crypto Exchanges Work -- Types of Crypto Exchanges -- How Centralized Spot Exchanges Work -- How to Become Your Own Exchange -- How Bisq P2P DEX Works -- How Uniswap DEX Works -- What's Next? -- Chapter 11: Crypto Investment and Trading -- Volatility -- Why People Invest in Crypto -- Staking -- Crypto Trading -- Trading Bots -- Cryptohopper -- Trading Strategy and Paper Trading -- Fake Exchange Volumes -- What's Next? -- Part III: Creating Your Own Crypto -- Chapter 12: Creating a Token -- Coins vs. Tokens -- How to Create a Token Without Coding -- Setting Up the Wallet and Getting the Testnet Coins -- Generating ERC-20 Token. Viewing Your Token in Wallet and Block Explorer -- Token or Coin? -- Doing It the Hard Way -- How to Create NFT with No Coding, for Free -- The NFT Artwork -- Linking a Wallet -- Generating the NFT -- Listing the NFT for Sale -- What's Next? -- Chapter 13: How to Start the Crypto Project -- Finding the Niche -- The Project Steps -- Generating the Idea -- Assembling the Team -- Writing the White Paper -- Creating the Website -- Announcing the Project -- Telegram Channels and Groups -- Incorporating Your Business -- Selecting the Financing Strategy -- Presale -- IXO -- Exchange Listing -- VC Investment -- What's Next? -- Chapter 14: Running a Crypto Project -- Tokenomics -- Listing on Exchanges -- Market Making -- How to Detect Listing Scammers -- Marketing Scammers -- How to List on CoinMarketCap and CoinGecko -- Telegram Trolls -- AMA Sessions -- Development Team -- Relationship with Developers -- Partnerships -- PoC vs. MVP -- Open Source License -- Conclusion -- Index. |
Record Nr. | UNINA-9910595036603321 |
Gomzin Slava | ||
New York, NY : , : Apress L. P., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data lake analytics on Microsoft Azure : a practitioner's guide to big data engineering / / Harsh Chawla; Pankaj Khattar; Sandeep J. Alur |
Autore | Chawla Harsh |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | New York, New York : , : Apress L. P., , [2020] |
Descrizione fisica | 1 online resource (XVII, 222 p. 134 illus.) |
Disciplina | 004.165 |
Soggetto topico |
Big data
Microsoft Azure (Computing platform) Microsoft .NET Framework |
ISBN | 1-4842-6252-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Data Lake Analytics Concepts -- Chapter 2: Building Blocks of Data Analytics -- Chapter 3: Data Analytics on Public Cloud -- Chapter 4: Data Ingestion -- Chapter 5: Data Storage -- Chapter 6: Data Preparation and Training Part I -- Chapter 7: Data Preparation and Training Part II -- Chapter 8: Model and Serve -- Chapter 9: Summary. |
Record Nr. | UNINA-9910427051203321 |
Chawla Harsh | ||
New York, New York : , : Apress L. P., , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data science revealed : with feature engineering, data visualization, pipeline development, and hyperparameter tuning / / Tshepo Chris Nokeri |
Autore | Nokeri Tshepo Chris |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | California : , : Apress L. P., , [2021] |
Descrizione fisica | 1 online resource (XX, 252 p. 95 illus.) |
Disciplina | 943.005 |
Soggetto topico | Data mining |
ISBN | 1-4842-6870-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: An Introduction to Simple Linear Regression Analysis -- Chapter 2: Advanced Parametric Methods -- Chapter 3: Time Series Analysis -- Chapter 4: High-Quality Time Series Analysis -- Chapter 5: Logistic Regression Analysis -- Chapter 6: Dimension Reduction and Multivariate Analysis Using Linear Discriminant Analysis -- Chapter 7: Finding Hyperplanes Using Support Vectors -- Chapter 8: Classification Using Decision Trees -- Chapter 9: Back to the Classics -- Chapter 10: Cluster Analysis -- Chapter 11: Survival Analysis -- Chapter 12: Neural Networks -- Chapter 13: Machine Learning Using H2O. |
Record Nr. | UNINA-9910483608103321 |
Nokeri Tshepo Chris | ||
California : , : Apress L. P., , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science Solutions with Python : Fast and Scalable Models Using Keras, Pyspark MLlib, H2O, XGBoost, and Scikit-Learn |
Autore | Nokeri Tshepo Chris |
Pubbl/distr/stampa | Berkeley, CA : , : Apress L. P., , 2021 |
Descrizione fisica | 1 online resource (128 pages) |
Disciplina | 006.31 |
Soggetto genere / forma | Electronic books. |
ISBN | 1-4842-7762-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Exploring Machine Learning -- Exploring Supervised Methods -- Exploring Nonlinear Models -- Exploring Ensemble Methods -- Exploring Unsupervised Methods -- Exploring Cluster Methods -- Exploring Dimension Reduction -- Exploring Deep Learning -- Conclusion -- Chapter 2: Big Data, Machine Learning, and Deep Learning Frameworks -- Big Data -- Big Data Features -- Impact of Big Data on Business and People -- Better Customer Relationships -- Refined Product Development -- Improved Decision-Making -- Big Data Warehousing -- Big Data ETL -- Big Data Frameworks -- Apache Spark -- Resilient Distributed Data Sets -- Spark Configuration -- Spark Frameworks -- SparkSQL -- Spark Streaming -- Spark MLlib -- GraphX -- ML Frameworks -- Scikit-Learn -- H2O -- XGBoost -- DL Frameworks -- Keras -- Chapter 3: Linear Modeling with Scikit-Learn, PySpark, and H2O -- Exploring the Ordinary Least-Squares Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 4: Survival Analysis with PySpark and Lifelines -- Exploring Survival Analysis -- Exploring Cox Proportional Hazards Method -- Lifeline in Action -- Exploring the Accelerated Failure Time Method -- PySpark in Action -- Conclusion -- Chapter 5: Nonlinear Modeling With Scikit-Learn, PySpark, and H2O -- Exploring the Logistic Regression Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 6: Tree Modeling and Gradient Boosting with Scikit-Learn, XGBoost, PySpark, and H2O -- Decision Trees -- Preprocessing Features -- Scikit-Learn in Action -- Gradient Boosting -- XGBoost in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 7: Neural Networks with Scikit-Learn, Keras, and H2O.
Exploring Deep Learning -- Multilayer Perceptron Neural Network -- Preprocessing Features -- Scikit-Learn in Action -- Keras in Action -- Deep Belief Networks -- H2O in Action -- Conclusion -- Chapter 8: Cluster Analysis with Scikit-Learn, PySpark, and H2O -- Exploring the K-Means Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 9: Principal Component Analysis with Scikit-Learn, PySpark, and H2O -- Exploring the Principal Component Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 10: Automating the Machine Learning Process with H2O -- Exploring Automated Machine Learning -- Preprocessing Features -- H2O AutoML in Action -- Conclusion -- Index. |
Record Nr. | UNINA-9910506385603321 |
Nokeri Tshepo Chris | ||
Berkeley, CA : , : Apress L. P., , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data-Driven Alexa Skills : Voice Access to Rich Data Sources for Enterprise Applications |
Autore | Kingaby Simon A |
Pubbl/distr/stampa | Berkeley, CA : , : Apress L. P., , 2021 |
Descrizione fisica | 1 online resource (425 pages) |
Soggetto genere / forma | Electronic books. |
ISBN |
9781484274491
9781484274484 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510534903321 |
Kingaby Simon A | ||
Berkeley, CA : , : Apress L. P., , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The definitive guide to Jakarta faces in Jakarta EE 10 : building Java-based enterprise web applications / / Bauke Scholtz, Arjan Tijms |
Autore | Scholtz Bauke |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Berkeley, California : , : Apress L. P., , [2022] |
Descrizione fisica | 1 online resource (532 pages) : illustrations |
Disciplina | 005.2762 |
Soggetto topico |
Java (Computer program language)
Web site development Web sites - Design |
ISBN | 1-4842-7310-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. History 2. From Zero To Hello World 3. Components 4. Form Components 5. Validation and Conversion 6. Output Components 7. Facelets Templating 8. Backing Beans 9. Exception Handling 10. WebSocket Push 11. Custom Components 12. Search Expressions 13. Security 14. Localization 15. Extensions |
Record Nr. | UNINA-9910552747903321 |
Scholtz Bauke | ||
Berkeley, California : , : Apress L. P., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The Definitive Guide to Modern Java Clients with JavaFX 17 : Cross-Platform Mobile and Cloud Development |
Autore | Chin Stephen |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress L. P., , 2021 |
Descrizione fisica | 1 online resource (627 pages) |
Disciplina | 005.133 |
Altri autori (Persone) |
VosJohan
WeaverJames AndersonGail AndersonPaul BorgesBruno EppleAnton GaoWeiqi GilesJonathan PeredaJosé |
Soggetto genere / forma | Electronic books. |
ISBN |
9781484272688
9781484272671 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910508466703321 |
Chin Stephen | ||
Berkeley, CA : , : Apress L. P., , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more / / Arjan Tijms, Teo Bais, Werner Keil |
Autore | Tijms Arjan |
Edizione | [[First edition].] |
Pubbl/distr/stampa | New York, New York : , : Apress L. P., , [2022] |
Descrizione fisica | 1 online resource (652 pages) : color illustrations |
Disciplina | 005.8 |
Soggetto topico |
Java (Computer program language)
Computer security Cloud computing Application software - Development |
ISBN | 1-4842-7945-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Security History -- The Beginning -- Enter Jakarta EE -- Enter Jakarta Authorization -- Enter Jakarta Authentication -- Foreshadowing Shiro Part I - IL DRBAC -- Enter Spring Security -- Where is Jakarta Authentication? Enter JAuth -- Foreshadowing Shiro Part II - JSecurity -- Jakarta Authentication - Edging closer -- Jakarta Authentication - Finally in Jakarta EE -- Enter OmniSecurity -- Enter Jakarta Security -- Chapter 2: Jakarta EE Foundations -- Physical Security -- Technological Security -- Application Security -- OS Security -- Network Security -- Policies and Procedures -- Key Principles of Security -- Features of a Security Mechanism -- Distributed Multitiered Applications -- Single-Tier vs. Multitiered Applications -- The Jakarta EE Approach -- Security in Jakarta EE -- Simple Application Security Walkthrough -- Looking Ahead -- Authentication -- Something You Know -- Something You Have -- Something You Are -- Latest Trends in Authentication Methods -- Authentication Examples in Practice -- Authenticating Users Programmatically -- Authorization -- Access Control Lists -- Access Control Models -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- RBAC (Role-Based Access Control) -- Benefits of RBAC -- RBAC - Key Principles -- RBAC in Jakarta EE -- Users, Groups, and Roles -- What Is a User? -- What Is a Group? -- What Is a Role? -- Digital Certificates -- What Is a Digital Certificate -- Introduction to TLS -- Who Can Issue Certificates? -- Self-Signing a Certificate -- Certificate Authority -- Looking Ahead -- Authentication Mechanisms -- What Is an Authentication Mechanism? -- What Does an Authentication Mechanism Specify? -- Jakarta EE Authentication Mechanisms -- Basic Authentication.
What Is -- How It Works -- How to Configure It -- Form-Based Authentication -- What Is -- How It Works -- How to Configure It -- Digest Authentication -- What Is -- How It Works -- How to Configure It -- Client Authentication -- What Is -- How It Works -- How to Configure It -- Custom Form Authentication -- What Is -- How to Define It -- Identity Stores -- What Is an Identity Store? -- What Is the Purpose of an Identity Store? -- Identity Store and Jakarta EE -- IdentityStore - Theory of Operation -- Validating Credentials -- Retrieving Caller Information -- Declaring Capabilities -- How to Validate a User Credential -- Looking Ahead -- Chapter 3: Jakarta Authentication -- What Is Jakarta Authentication? -- Jakarta Authentication in Jakarta EE -- The Authentication Mechanism -- The Basic Authentication Mechanism -- The Form Authentication Mechanism -- Jakarta Authentication's ServerAuthModule -- Example ServerAuthModule -- Example ServerAuthModule - GlassFish -- Example ServerAuthModule - Tomcat -- Example ServerAuthModule - Basic -- Example ServerAuthModule - Basic with Container Identity Store -- Obtaining Key Stores and Trust Stores -- Semi-auto Register Session -- Creating a Session -- Continuing a Session -- Using a Custom Principal -- Wrapping the Request and Response -- The Message Policy -- The AuthConfigProvider -- Case Study - Implementation-Specific Identity Stores -- Tomcat -- Jetty -- Undertow -- JBoss EAP/WildFly -- Resin -- GlassFish -- Open Liberty -- WebLogic -- Chapter 4: Jakarta Authorization -- What Is Jakarta Authorization? -- Jakarta Authorization in Jakarta EE -- Java SE Types Used -- java.security.CodeSource -- java.security.ProtectionDomain -- java.security.Policy -- java.security.PermissionCollection -- The Authorization Module -- PolicyConfigurationFactory -- PolicyConfiguration -- Collecting and Managing Permissions. A State Machine That Controls the Life Cycle of This Permission Collector -- Linking Permissions of Multiple Modules and Utilities -- Processing Permissions After Collecting -- Policy -- Transforming Security Constraints to Permissions -- Authorization Queries -- Get All Users Roles -- Has Access -- Role Mapping -- Alternative Mappings -- Groups to Permission Mapping -- Principal to Permission Mapping -- Chapter 5: Jakarta Security -- What Is Jakarta Security? -- Jakarta Security in Jakarta EE -- The HttpAuthenticationMechanism -- Example HttpAuthenticationMechanism -- Example IdentityStore -- Security Flow -- Default Authentication Mechanisms -- The Basic Authentication Mechanism -- The Form Authentication Mechanism -- The Custom Form Authentication Mechanism -- Providing Our Custom Jakarta Faces Code -- Caller-Initiated Authentication -- Default Identity Stores -- The Database Identity Store -- The LDAP Identity Store -- Identity Stores Using Application Services -- Authentication Mechanism Interceptors -- Auto Apply Session -- Remember Me -- Activating Remember-Me Service -- Logging Out -- Custom Principals -- Jakarta Security and Tomcat -- Simplified Custom Authorization Rules -- Dynamically Adding an Interceptor to a Built-in CDI Bean -- Chapter 6: Java SE Underpinnings -- Java Authentication and Authorization Service (JAAS) -- Common Classes -- Subject -- Key Features -- Retrieving a Subject -- Principals -- Retrieving Principals Associated with a Subject -- Credentials -- JAAS Authentication -- LoginContext -- Key Features -- Theory of Operation -- Parameters Explained -- LoginModule -- Key Features -- How to Implement a LoginModule -- initialize() -- login() -- commit() -- CallBackHandler -- Configuration -- Parameters Explained -- How to Run the JAAS Authentication Example -- JAAS Authorization -- JAAS Authorization in Three Steps. The Policy File -- Runtime Configuration -- Performing Restricted Actions As an Authenticated Subject -- Introduction to Cryptography -- Key Concepts in Cryptography -- Two Basic Encryption Methods -- Symmetric Encryption -- Key Characteristics -- Asymmetric Encryption -- Key Characteristics -- Symmetric vs. Asymmetric Encryption -- X.509 Digital Certificates -- Key Features of an X.509 Certificate -- Common Applications of X.509 -- Key Pairs and Signatures -- Certificate File Name Extensions -- Certificate Chains -- What Is a Certificate Chain? -- How It Works -- Properties -- Anatomy of an X.509 Certificate -- Sample Certificate -- How to Generate, Manage, and Sign X.509 Certificates -- Programmatically -- Keytool As a Certificate Life Cycle Management Tool -- Background for the Code Examples -- Generating Key Pair -- Publishing Your Public Key -- Importing Certificate -- Digital Signature -- Loading Private Key -- Initiating Signature -- Updating the Signature with the Message Bytes -- Saving the Signature into a File -- Verifying a Digital Signature -- JCE Providers -- The Need for JCE Providers -- Available JCE Providers -- Bundled with the JDK -- Write a Custom Provider Yourself -- External JCE Providers -- IAIK-JCE -- Key Features[11] -- Less Popular JCE Providers -- Bouncy Castle -- How to Install a JCE Provider -- How JCE Providers Work -- How to Encrypt with Cipher Class -- Cipher Instantiation -- Cipher Initialization -- Performing Encryption and Decryption -- Asymmetric Encryption -- Bouncy Castle -- Architecture of Bouncy Castle -- Creating a Cipher -- Using the JCE Like -- Using the Lightweight API -- Asymmetric Encryption -- Key Generation and Key Agreement (Public Key Infrastructure (PKI)) and Message Authentication Code -- How PKI Works -- Key Generation -- Generating Symmetric Keys -- Generating Asymmetric Keys. Elliptic Curve Cryptography -- What Is Elliptic Curve Cryptography? -- What Is ECC Used For? -- Advantages -- How Secure Is It? -- How Is ECC Different from RSA? -- What Is an Elliptic Curve Digital Signature? -- Key Agreement -- In Action -- Message Authentication Codes -- MessageDigests and Hash Functions -- How to Compute Secure Hash Functions -- The Need for MACs -- How MAC Works -- Two Types of MAC -- Best Practices on MACs -- PKI Conclusions -- TLS in Java and TLS 1.3 -- What Is TLS -- Why TLS Is Important -- Benefits of TLS 1.3 -- How TLS Works -- Tools and Algorithms That Can Be Used -- TLS Protocol Details -- The Record Protocol -- Handshake -- TLS in Java -- JSSE API -- Obtaining an SSLSocketFactory -- Obtaining an SSLSocket -- In Action -- Takeaways on TLS -- Java SE Underpinnings Outro -- References -- Appendix 1. Commonly Used AuthPermissions in JAAS -- Appendix 2. Supported Algorithms Provided by SunJCE (Bundled JCE Provider) -- Appendix 3. Supported Algorithms by Bouncy Castle -- Chapter 7: Jakarta EE Implementations -- Overview -- Specification Usage -- Contribution Activity -- Implementation Usage -- Implementation Components -- GlassFish -- Authentication -- Passwords -- Master Password and Keystores -- Understanding Master Password Synchronization -- Default Master Password -- Saving the Master Password to a File -- Using the Master Password Creating a Domain -- Administration Password -- Encoded Passwords -- Web Browsers and Password Storage -- Authentication Realms -- Create an Authentication Realm -- List Authentication Realms -- Update an Authentication Realm -- Delete an Authentication Realm -- Exousia -- Configuring Exousia in GlassFish -- Manage Authorization Providers from the Admin Console -- Manage Authorization Providers from the Command Line -- Using Exousia with Tomcat -- Soteria -- A Very Brief History. Authentication Mechanisms. |
Record Nr. | UNINA-9910561299303321 |
Tijms Arjan | ||
New York, New York : , : Apress L. P., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Design and deploy Microsoft Azure virtual desktop : an essential guide for architects and administrators / / Puthiyavan Udayakumar |
Autore | Udayakumar Puthiyavan |
Pubbl/distr/stampa | New York, New York : , : Apress L. P., , [2022] |
Descrizione fisica | 1 online resource (401 pages) |
Disciplina | 005.43 |
Soggetto topico |
Microsoft Azure (Computing platform)
Virtual computer systems |
ISBN | 1-4842-7796-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Microsoft AVD Essentials -- Chapter 2: Planning and preparing for AVD -- Chapter 3: Defining AVD Requirements and Assessment -- Chapter 4: Designing and Deploying AVD Solution -- Chapter 5: Managing and Securing AVD Solution. |
Record Nr. | UNINA-9910522994603321 |
Udayakumar Puthiyavan | ||
New York, New York : , : Apress L. P., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|