top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Creating Infographics with Adobe Illustrator : Learn the Basics and Design Your First Infographic
Creating Infographics with Adobe Illustrator : Learn the Basics and Design Your First Infographic
Autore Harder Jennifer
Edizione [1st ed.]
Pubbl/distr/stampa Berkeley, CA : , : Apress L. P., , 2024
Descrizione fisica 1 online resource (513 pages)
ISBN 979-88-6880-005-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: What Are Infographics? -- A Short History About Infographics -- Ancient History-Pre-1600 AD -- 1601 AD-1800 AD -- 1801 AD-1900 AD -- 1901 AD-2000 AD -- 2001 AD-Present and Modern Infographics -- How Did the Logo Come Along with the Infographic Historically? -- What Is the Difference Between an Infographic and a Logo? -- An Infographic in Its Basic Form -- Summary -- Chapter 2: Preparation for Creating a Logo and Infographics -- Design Considerations -- Color Theory and Harmony Rules with Adobe Color Online -- The Science of Color -- Working with the Adobe Color App -- Color Harmony Definitions -- Base Color Settings and Eyedropper -- Color Modes RGB, HSB, and LAB, HEX Color Codes, and What About CMYK? -- Color Science 2D and 3D visualization -- Adding Your Color Theme -- Other Options: Extract Theme and Extract Gradient -- Accessibility Tools for Contrast and Color Blindness When Dealing with Text and Graphics -- Additional Tips on Color and Fonts -- How Research Plays an Important Role in Your Infographic Creation -- What Topics Are Good for an Infographic? -- Science -- Instructional -- Collecting Your Data -- Working with Your Team and Your Client in Design to Create a Mock-Up Sketch and Mood Board and Keep the Theme -- Other Design Considerations -- Time Frame Considerations: How Long Will Your Infographic Be Relevant to Your Audience? -- How Simple or Complex Should You Make Your Infographic? -- What Kinds of Media Will You Use to Display the Infographic? -- Summary -- Chapter 3: Scanner Basics -- Making Your Sketch into a Digital Format -- Scanner Basics -- Scanning a Sketch -- Scanner Color Modes -- Adjusting Scanned Image -- Saving Scanned Files -- Photocopier or All-in-One Office Printer -- A Digital Camera.
Your Smartphone Camera, an Additional Adobe App, and a Scanner Bin -- Summary -- Chapter 4: Setting Up Your Workspace -- Creating a New Document in Illustrator -- Workspace Options -- Panels and Tools Overview -- Illustrator Panels -- Toolbars -- Control -- Color -- Color Guide -- Swatches -- Brushes -- Symbols -- Stroke -- Gradient -- Transparency -- Appearance -- Graphic Styles -- Layers -- Asset Export -- Artboards -- Comments -- Properties -- Libraries -- Using Your History Panel -- New Contextual Task Bar -- Menus -- Summary -- Chapter 5: Working with Artboards and Saving Files -- Working with Artboards -- Adding Rulers -- Editing the Artboard -- Linking Your Digital Mock-Up Image to the Illustrator File -- Project: Saving Your Illustrator File -- Saving Duplicates of Your File -- Working with Your Infographics Between Photoshop and Illustrator -- Summary -- Chapter 6: A Basic Review of Illustrator's Shape Tools -- Drawing Tools Overview -- Rectangle Tool (M) -- Rounded Rectangle Tool -- Ellipse Tool (L) -- Polygon Tool -- Star Tool -- Line Segment, Arc, and Spiral Tools -- Drawing Tools That Can Be Used to Create Basic Graphs -- Moving and Selecting Your Shapes on the Artboard -- Selection Tool (V) -- Direct Selection Tool (A) -- Group Selection Tool -- Basic Modification to Shapes -- Arranging Shape and Path Order -- Working with the Control, Transform, and Properties Panel -- Summary -- Chapter 7: A Basic Review of Illustrator's Pen Tools -- Drawing Custom Shapes with the Pen Tool -- Pen Tool (P) and Curvature Tool (Shift+~) Basics -- Join Points on an Open Path -- Add Anchor Point Tool (+) Review -- Delete Anchor Point Tool (-) Review -- Anchor Point Tool (Shift +C) Review -- Curvature Tool (Shift +~) Review -- Swapping Fill and Stroke Colors with the Pen Tool -- Control Panel Anchor Point Options and How They Relate to Related Tools.
Combining Shapes with the Pathfinder Panel -- Clipping Masks and Compound Paths -- Summary -- Chapter 8: Working with Illustrator's Layers and Additional Drawing and Type Tools -- Working with Layers -- Working in Outline Mode (Preview) -- Project: Trace over a Linked File -- Additional Ways of Adding Color to an Object's Fill and Stroke -- Eyedropper Tool (I) -- Gradient, Pattern Options, and Transparency (Opacity) Panels -- Live Paint Bucket Tool (K) and Live Selection Tool (Shift+L) -- Color Guide Panel -- Recolor -- Generative Recolor -- Adding Text with the Type Tool -- Type Tool and Vertical Type Tool -- Area Type tool and Vertical Area Type Tool -- Adding Placeholder Text -- Type on a Path Tool and Vertical Type on a Path Tool -- Touch Type Tool (Shift +T) -- Control Panel, Properties Panel, and Related Panels for Type -- Convert to Type Outlines -- Retype (Beta) -- Brush Tools That Can Assist in Creating Infographics -- Paintbrush Tool (B) and Brushes Panel -- Blob Brush (Shift+B) -- Eraser Tool (Shift+E) -- Blend Tool (W) -- Object ➤ Intertwine with Lasso Tool -- Applying Appearance -- Creating Graphic Styles -- Creating Symbols -- Summary -- Chapter 9: Creating Your First Infographic Projects -- Project: Creating Your First Infographic -- Project Idea 1: Infographic Resume (One Page) -- Project Idea 2: Historical Infographic (Mine Map/Mine Shaft) -- Summary -- Index.
Record Nr. UNINA-9910770268503321
Harder Jennifer  
Berkeley, CA : , : Apress L. P., , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Crypto basics : a nontechnical introduction to creating your own money for investors and inventors / / Slava Gomzin
Crypto basics : a nontechnical introduction to creating your own money for investors and inventors / / Slava Gomzin
Autore Gomzin Slava
Edizione [[First edition].]
Pubbl/distr/stampa New York, NY : , : Apress L. P., , [2022]
Descrizione fisica 1 online resource (333 pages)
Disciplina 332.4
Soggetto topico Cryptocurrencies
Electronic funds transfers - Security measures
Blockchains (Databases)
ISBN 1-4842-8321-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- About the Foreword Author -- Acknowledgments -- Foreword -- Preface -- Introduction -- Part I: Understanding Crypto -- Chapter 1: How Cryptography Works -- First Ciphers -- Modern Cryptography -- Hash Function -- SHA-256 -- RIPEMD160 -- Merkle Tree -- Asymmetric (Public Key) Encryption -- Digital Signatures -- Elliptic Curves -- Cryptography and Security -- What's Next? -- Untitled -- Chapter 2: How Bitcoin Works -- Problems Solved by Bitcoin -- Double-Spending Problem -- Distributed Peer-to-Peer Network -- How Bitcoin Blockchain Works -- Cash and Bank Transactions -- Blockchain vs. Bank Transaction Ledger -- Simplified Blockchain Transaction -- Dealing with Fractions -- Transaction Pool -- The Byzantine Generals Problem -- Proof-of-Work and Mining -- Generating a New Block -- Solving the Block -- Temporary Forks and Confirmations -- Mining Rewards -- Wallets and Addresses -- What's Next? -- Chapter 3: How Other Cryptos Work -- Proof of Stake -- Delegated Proof of Stake -- Block Lattice -- How Block Lattice Works -- How Coins Are Transferred in Block Lattice -- Token Platforms -- What's Next? -- Chapter 4: Cryptosecurity -- Inauguration Day -- Plastics or Crypto: No Difference -- The Great Infiltration -- How SQL Injection Works -- Ransomware Attacks -- Attacks on Blockchain Protocols -- 51% Attack -- More Attacks on Blockchain -- What's Next? -- Chapter 5: Crypto Privacy -- Bitcoin Is Pseudonymous! -- Making Your Bitcoin Transactions Private -- Unique Wallet Address per Transaction -- Coin Mixers (Tumblers) -- The Onion Router (TOR) -- VPN (Virtual Private Network) -- What Is VPN? -- How Does VPN work? -- If I Use TOR, Should I Use VPN As Well? -- Besides the Case with the Coin Mixer, Should I Use TOR and VPN? -- Choose the Right Wallet -- Run Your Wallet with TOR.
Bitcoin TOR Nodes -- What's Next? -- Chapter 6: How Monero Works -- Why Monero Is Important -- CryptoNote -- Untraceability and Unlinkability -- Cryptographic Monero Technologies -- View and Spend Keys -- Stealth Addresses -- Ring Signatures -- Churning -- Pedersen Commitments and Range Proofs -- Key Images -- Learn More About Monero -- What's Next? -- Chapter 7: Crypto Payments -- Why Pay with Crypto? -- Why Crypto Payments Are Difficult -- Custodial Payment Processing -- Non-custodial Payment Processing -- Two-Tier Crypto Networks -- Lightning Network -- How Lightning Works -- Lightning Cons -- Prepaid Cards Loaded with Crypto -- Gift Cards Purchased with Crypto -- What's Next? -- Part II: Using Crypto -- Chapter 8: How to Choose the Wallet -- Custodial Wallets -- Non-custodial Wallets -- Hot vs. Cold Wallets -- Lite (Thin Client) Wallets -- Desktop vs. Mobile Wallets -- Multisig Wallets -- Full Node Wallets -- Hardware Wallets -- Paper Wallets -- CLI Wallets -- Not Sure Yet Where to Start? -- What's Next? -- Chapter 9: Getting Crypto for Free -- Faucets -- Airdrops and Bounties -- Bitcointalk -- How to Find Bounties -- AMA Rewards -- Bitcointalk Signature Campaigns -- Mining -- Mining Monero -- What's Next? -- Chapter 10: How Crypto Exchanges Work -- Types of Crypto Exchanges -- How Centralized Spot Exchanges Work -- How to Become Your Own Exchange -- How Bisq P2P DEX Works -- How Uniswap DEX Works -- What's Next? -- Chapter 11: Crypto Investment and Trading -- Volatility -- Why People Invest in Crypto -- Staking -- Crypto Trading -- Trading Bots -- Cryptohopper -- Trading Strategy and Paper Trading -- Fake Exchange Volumes -- What's Next? -- Part III: Creating Your Own Crypto -- Chapter 12: Creating a Token -- Coins vs. Tokens -- How to Create a Token Without Coding -- Setting Up the Wallet and Getting the Testnet Coins -- Generating ERC-20 Token.
Viewing Your Token in Wallet and Block Explorer -- Token or Coin? -- Doing It the Hard Way -- How to Create NFT with No Coding, for Free -- The NFT Artwork -- Linking a Wallet -- Generating the NFT -- Listing the NFT for Sale -- What's Next? -- Chapter 13: How to Start the Crypto Project -- Finding the Niche -- The Project Steps -- Generating the Idea -- Assembling the Team -- Writing the White Paper -- Creating the Website -- Announcing the Project -- Telegram Channels and Groups -- Incorporating Your Business -- Selecting the Financing Strategy -- Presale -- IXO -- Exchange Listing -- VC Investment -- What's Next? -- Chapter 14: Running a Crypto Project -- Tokenomics -- Listing on Exchanges -- Market Making -- How to Detect Listing Scammers -- Marketing Scammers -- How to List on CoinMarketCap and CoinGecko -- Telegram Trolls -- AMA Sessions -- Development Team -- Relationship with Developers -- Partnerships -- PoC vs. MVP -- Open Source License -- Conclusion -- Index.
Record Nr. UNINA-9910595036603321
Gomzin Slava  
New York, NY : , : Apress L. P., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data lake analytics on Microsoft Azure : a practitioner's guide to big data engineering / / Harsh Chawla; Pankaj Khattar; Sandeep J. Alur
Data lake analytics on Microsoft Azure : a practitioner's guide to big data engineering / / Harsh Chawla; Pankaj Khattar; Sandeep J. Alur
Autore Chawla Harsh
Edizione [1st ed. 2020.]
Pubbl/distr/stampa New York, New York : , : Apress L. P., , [2020]
Descrizione fisica 1 online resource (XVII, 222 p. 134 illus.)
Disciplina 004.165
Soggetto topico Big data
Microsoft Azure (Computing platform)
Microsoft .NET Framework
ISBN 1-4842-6252-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Data Lake Analytics Concepts -- Chapter 2: Building Blocks of Data Analytics -- Chapter 3: Data Analytics on Public Cloud -- Chapter 4: Data Ingestion -- Chapter 5: Data Storage -- Chapter 6: Data Preparation and Training Part I -- Chapter 7: Data Preparation and Training Part II -- Chapter 8: Model and Serve -- Chapter 9: Summary.
Record Nr. UNINA-9910427051203321
Chawla Harsh  
New York, New York : , : Apress L. P., , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data science revealed : with feature engineering, data visualization, pipeline development, and hyperparameter tuning / / Tshepo Chris Nokeri
Data science revealed : with feature engineering, data visualization, pipeline development, and hyperparameter tuning / / Tshepo Chris Nokeri
Autore Nokeri Tshepo Chris
Edizione [1st ed. 2021.]
Pubbl/distr/stampa California : , : Apress L. P., , [2021]
Descrizione fisica 1 online resource (XX, 252 p. 95 illus.)
Disciplina 943.005
Soggetto topico Data mining
ISBN 1-4842-6870-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: An Introduction to Simple Linear Regression Analysis -- Chapter 2: Advanced Parametric Methods -- Chapter 3: Time Series Analysis -- Chapter 4: High-Quality Time Series Analysis -- Chapter 5: Logistic Regression Analysis -- Chapter 6: Dimension Reduction and Multivariate Analysis Using Linear Discriminant Analysis -- Chapter 7: Finding Hyperplanes Using Support Vectors -- Chapter 8: Classification Using Decision Trees -- Chapter 9: Back to the Classics -- Chapter 10: Cluster Analysis -- Chapter 11: Survival Analysis -- Chapter 12: Neural Networks -- Chapter 13: Machine Learning Using H2O.
Record Nr. UNINA-9910483608103321
Nokeri Tshepo Chris  
California : , : Apress L. P., , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Science Solutions with Python : Fast and Scalable Models Using Keras, Pyspark MLlib, H2O, XGBoost, and Scikit-Learn
Data Science Solutions with Python : Fast and Scalable Models Using Keras, Pyspark MLlib, H2O, XGBoost, and Scikit-Learn
Autore Nokeri Tshepo Chris
Pubbl/distr/stampa Berkeley, CA : , : Apress L. P., , 2021
Descrizione fisica 1 online resource (128 pages)
Disciplina 006.31
Soggetto genere / forma Electronic books.
ISBN 1-4842-7762-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Exploring Machine Learning -- Exploring Supervised Methods -- Exploring Nonlinear Models -- Exploring Ensemble Methods -- Exploring Unsupervised Methods -- Exploring Cluster Methods -- Exploring Dimension Reduction -- Exploring Deep Learning -- Conclusion -- Chapter 2: Big Data, Machine Learning, and Deep Learning Frameworks -- Big Data -- Big Data Features -- Impact of Big Data on Business and People -- Better Customer Relationships -- Refined Product Development -- Improved Decision-Making -- Big Data Warehousing -- Big Data ETL -- Big Data Frameworks -- Apache Spark -- Resilient Distributed Data Sets -- Spark Configuration -- Spark Frameworks -- SparkSQL -- Spark Streaming -- Spark MLlib -- GraphX -- ML Frameworks -- Scikit-Learn -- H2O -- XGBoost -- DL Frameworks -- Keras -- Chapter 3: Linear Modeling with Scikit-Learn, PySpark, and H2O -- Exploring the Ordinary Least-Squares Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 4: Survival Analysis with PySpark and Lifelines -- Exploring Survival Analysis -- Exploring Cox Proportional Hazards Method -- Lifeline in Action -- Exploring the Accelerated Failure Time Method -- PySpark in Action -- Conclusion -- Chapter 5: Nonlinear Modeling With Scikit-Learn, PySpark, and H2O -- Exploring the Logistic Regression Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 6: Tree Modeling and Gradient Boosting with Scikit-Learn, XGBoost, PySpark, and H2O -- Decision Trees -- Preprocessing Features -- Scikit-Learn in Action -- Gradient Boosting -- XGBoost in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 7: Neural Networks with Scikit-Learn, Keras, and H2O.
Exploring Deep Learning -- Multilayer Perceptron Neural Network -- Preprocessing Features -- Scikit-Learn in Action -- Keras in Action -- Deep Belief Networks -- H2O in Action -- Conclusion -- Chapter 8: Cluster Analysis with Scikit-Learn, PySpark, and H2O -- Exploring the K-Means Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 9: Principal Component Analysis with Scikit-Learn, PySpark, and H2O -- Exploring the Principal Component Method -- Scikit-Learn in Action -- PySpark in Action -- H2O in Action -- Conclusion -- Chapter 10: Automating the Machine Learning Process with H2O -- Exploring Automated Machine Learning -- Preprocessing Features -- H2O AutoML in Action -- Conclusion -- Index.
Record Nr. UNINA-9910506385603321
Nokeri Tshepo Chris  
Berkeley, CA : , : Apress L. P., , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data-Driven Alexa Skills : Voice Access to Rich Data Sources for Enterprise Applications
Data-Driven Alexa Skills : Voice Access to Rich Data Sources for Enterprise Applications
Autore Kingaby Simon A
Pubbl/distr/stampa Berkeley, CA : , : Apress L. P., , 2021
Descrizione fisica 1 online resource (425 pages)
Soggetto genere / forma Electronic books.
ISBN 9781484274491
9781484274484
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510534903321
Kingaby Simon A  
Berkeley, CA : , : Apress L. P., , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The definitive guide to Jakarta faces in Jakarta EE 10 : building Java-based enterprise web applications / / Bauke Scholtz, Arjan Tijms
The definitive guide to Jakarta faces in Jakarta EE 10 : building Java-based enterprise web applications / / Bauke Scholtz, Arjan Tijms
Autore Scholtz Bauke
Edizione [Second edition.]
Pubbl/distr/stampa Berkeley, California : , : Apress L. P., , [2022]
Descrizione fisica 1 online resource (532 pages) : illustrations
Disciplina 005.2762
Soggetto topico Java (Computer program language)
Web site development
Web sites - Design
ISBN 1-4842-7310-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. History 2. From Zero To Hello World 3. Components 4. Form Components 5. Validation and Conversion 6. Output Components 7. Facelets Templating 8. Backing Beans 9. Exception Handling 10. WebSocket Push 11. Custom Components 12. Search Expressions 13. Security 14. Localization 15. Extensions
Record Nr. UNINA-9910552747903321
Scholtz Bauke  
Berkeley, California : , : Apress L. P., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Definitive Guide to Modern Java Clients with JavaFX 17 : Cross-Platform Mobile and Cloud Development
The Definitive Guide to Modern Java Clients with JavaFX 17 : Cross-Platform Mobile and Cloud Development
Autore Chin Stephen
Edizione [2nd ed.]
Pubbl/distr/stampa Berkeley, CA : , : Apress L. P., , 2021
Descrizione fisica 1 online resource (627 pages)
Disciplina 005.133
Altri autori (Persone) VosJohan
WeaverJames
AndersonGail
AndersonPaul
BorgesBruno
EppleAnton
GaoWeiqi
GilesJonathan
PeredaJosé
Soggetto genere / forma Electronic books.
ISBN 9781484272688
9781484272671
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910508466703321
Chin Stephen  
Berkeley, CA : , : Apress L. P., , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more / / Arjan Tijms, Teo Bais, Werner Keil
The definitive guide to security in Jakarta EE : securing Java-based enterprise applications with Jakarta security, authorization, authentication and more / / Arjan Tijms, Teo Bais, Werner Keil
Autore Tijms Arjan
Edizione [[First edition].]
Pubbl/distr/stampa New York, New York : , : Apress L. P., , [2022]
Descrizione fisica 1 online resource (652 pages) : color illustrations
Disciplina 005.8
Soggetto topico Java (Computer program language)
Computer security
Cloud computing
Application software - Development
ISBN 1-4842-7945-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Chapter 1: Security History -- The Beginning -- Enter Jakarta EE -- Enter Jakarta Authorization -- Enter Jakarta Authentication -- Foreshadowing Shiro Part I - IL DRBAC -- Enter Spring Security -- Where is Jakarta Authentication? Enter JAuth -- Foreshadowing Shiro Part II - JSecurity -- Jakarta Authentication - Edging closer -- Jakarta Authentication - Finally in Jakarta EE -- Enter OmniSecurity -- Enter Jakarta Security -- Chapter 2: Jakarta EE Foundations -- Physical Security -- Technological Security -- Application Security -- OS Security -- Network Security -- Policies and Procedures -- Key Principles of Security -- Features of a Security Mechanism -- Distributed Multitiered Applications -- Single-Tier vs. Multitiered Applications -- The Jakarta EE Approach -- Security in Jakarta EE -- Simple Application Security Walkthrough -- Looking Ahead -- Authentication -- Something You Know -- Something You Have -- Something You Are -- Latest Trends in Authentication Methods -- Authentication Examples in Practice -- Authenticating Users Programmatically -- Authorization -- Access Control Lists -- Access Control Models -- Discretionary Access Control (DAC) -- Mandatory Access Control (MAC) -- Role-Based Access Control (RBAC) -- RBAC (Role-Based Access Control) -- Benefits of RBAC -- RBAC - Key Principles -- RBAC in Jakarta EE -- Users, Groups, and Roles -- What Is a User? -- What Is a Group? -- What Is a Role? -- Digital Certificates -- What Is a Digital Certificate -- Introduction to TLS -- Who Can Issue Certificates? -- Self-Signing a Certificate -- Certificate Authority -- Looking Ahead -- Authentication Mechanisms -- What Is an Authentication Mechanism? -- What Does an Authentication Mechanism Specify? -- Jakarta EE Authentication Mechanisms -- Basic Authentication.
What Is -- How It Works -- How to Configure It -- Form-Based Authentication -- What Is -- How It Works -- How to Configure It -- Digest Authentication -- What Is -- How It Works -- How to Configure It -- Client Authentication -- What Is -- How It Works -- How to Configure It -- Custom Form Authentication -- What Is -- How to Define It -- Identity Stores -- What Is an Identity Store? -- What Is the Purpose of an Identity Store? -- Identity Store and Jakarta EE -- IdentityStore - Theory of Operation -- Validating Credentials -- Retrieving Caller Information -- Declaring Capabilities -- How to Validate a User Credential -- Looking Ahead -- Chapter 3: Jakarta Authentication -- What Is Jakarta Authentication? -- Jakarta Authentication in Jakarta EE -- The Authentication Mechanism -- The Basic Authentication Mechanism -- The Form Authentication Mechanism -- Jakarta Authentication's ServerAuthModule -- Example ServerAuthModule -- Example ServerAuthModule - GlassFish -- Example ServerAuthModule - Tomcat -- Example ServerAuthModule - Basic -- Example ServerAuthModule - Basic with Container Identity Store -- Obtaining Key Stores and Trust Stores -- Semi-auto Register Session -- Creating a Session -- Continuing a Session -- Using a Custom Principal -- Wrapping the Request and Response -- The Message Policy -- The AuthConfigProvider -- Case Study - Implementation-Specific Identity Stores -- Tomcat -- Jetty -- Undertow -- JBoss EAP/WildFly -- Resin -- GlassFish -- Open Liberty -- WebLogic -- Chapter 4: Jakarta Authorization -- What Is Jakarta Authorization? -- Jakarta Authorization in Jakarta EE -- Java SE Types Used -- java.security.CodeSource -- java.security.ProtectionDomain -- java.security.Policy -- java.security.PermissionCollection -- The Authorization Module -- PolicyConfigurationFactory -- PolicyConfiguration -- Collecting and Managing Permissions.
A State Machine That Controls the Life Cycle of This Permission Collector -- Linking Permissions of Multiple Modules and Utilities -- Processing Permissions After Collecting -- Policy -- Transforming Security Constraints to Permissions -- Authorization Queries -- Get All Users Roles -- Has Access -- Role Mapping -- Alternative Mappings -- Groups to Permission Mapping -- Principal to Permission Mapping -- Chapter 5: Jakarta Security -- What Is Jakarta Security? -- Jakarta Security in Jakarta EE -- The HttpAuthenticationMechanism -- Example HttpAuthenticationMechanism -- Example IdentityStore -- Security Flow -- Default Authentication Mechanisms -- The Basic Authentication Mechanism -- The Form Authentication Mechanism -- The Custom Form Authentication Mechanism -- Providing Our Custom Jakarta Faces Code -- Caller-Initiated Authentication -- Default Identity Stores -- The Database Identity Store -- The LDAP Identity Store -- Identity Stores Using Application Services -- Authentication Mechanism Interceptors -- Auto Apply Session -- Remember Me -- Activating Remember-Me Service -- Logging Out -- Custom Principals -- Jakarta Security and Tomcat -- Simplified Custom Authorization Rules -- Dynamically Adding an Interceptor to a Built-in CDI Bean -- Chapter 6: Java SE Underpinnings -- Java Authentication and Authorization Service (JAAS) -- Common Classes -- Subject -- Key Features -- Retrieving a Subject -- Principals -- Retrieving Principals Associated with a Subject -- Credentials -- JAAS Authentication -- LoginContext -- Key Features -- Theory of Operation -- Parameters Explained -- LoginModule -- Key Features -- How to Implement a LoginModule -- initialize() -- login() -- commit() -- CallBackHandler -- Configuration -- Parameters Explained -- How to Run the JAAS Authentication Example -- JAAS Authorization -- JAAS Authorization in Three Steps.
The Policy File -- Runtime Configuration -- Performing Restricted Actions As an Authenticated Subject -- Introduction to Cryptography -- Key Concepts in Cryptography -- Two Basic Encryption Methods -- Symmetric Encryption -- Key Characteristics -- Asymmetric Encryption -- Key Characteristics -- Symmetric vs. Asymmetric Encryption -- X.509 Digital Certificates -- Key Features of an X.509 Certificate -- Common Applications of X.509 -- Key Pairs and Signatures -- Certificate File Name Extensions -- Certificate Chains -- What Is a Certificate Chain? -- How It Works -- Properties -- Anatomy of an X.509 Certificate -- Sample Certificate -- How to Generate, Manage, and Sign X.509 Certificates -- Programmatically -- Keytool As a Certificate Life Cycle Management Tool -- Background for the Code Examples -- Generating Key Pair -- Publishing Your Public Key -- Importing Certificate -- Digital Signature -- Loading Private Key -- Initiating Signature -- Updating the Signature with the Message Bytes -- Saving the Signature into a File -- Verifying a Digital Signature -- JCE Providers -- The Need for JCE Providers -- Available JCE Providers -- Bundled with the JDK -- Write a Custom Provider Yourself -- External JCE Providers -- IAIK-JCE -- Key Features[11] -- Less Popular JCE Providers -- Bouncy Castle -- How to Install a JCE Provider -- How JCE Providers Work -- How to Encrypt with Cipher Class -- Cipher Instantiation -- Cipher Initialization -- Performing Encryption and Decryption -- Asymmetric Encryption -- Bouncy Castle -- Architecture of Bouncy Castle -- Creating a Cipher -- Using the JCE Like -- Using the Lightweight API -- Asymmetric Encryption -- Key Generation and Key Agreement (Public Key Infrastructure (PKI)) and Message Authentication Code -- How PKI Works -- Key Generation -- Generating Symmetric Keys -- Generating Asymmetric Keys.
Elliptic Curve Cryptography -- What Is Elliptic Curve Cryptography? -- What Is ECC Used For? -- Advantages -- How Secure Is It? -- How Is ECC Different from RSA? -- What Is an Elliptic Curve Digital Signature? -- Key Agreement -- In Action -- Message Authentication Codes -- MessageDigests and Hash Functions -- How to Compute Secure Hash Functions -- The Need for MACs -- How MAC Works -- Two Types of MAC -- Best Practices on MACs -- PKI Conclusions -- TLS in Java and TLS 1.3 -- What Is TLS -- Why TLS Is Important -- Benefits of TLS 1.3 -- How TLS Works -- Tools and Algorithms That Can Be Used -- TLS Protocol Details -- The Record Protocol -- Handshake -- TLS in Java -- JSSE API -- Obtaining an SSLSocketFactory -- Obtaining an SSLSocket -- In Action -- Takeaways on TLS -- Java SE Underpinnings Outro -- References -- Appendix 1. Commonly Used AuthPermissions in JAAS -- Appendix 2. Supported Algorithms Provided by SunJCE (Bundled JCE Provider) -- Appendix 3. Supported Algorithms by Bouncy Castle -- Chapter 7: Jakarta EE Implementations -- Overview -- Specification Usage -- Contribution Activity -- Implementation Usage -- Implementation Components -- GlassFish -- Authentication -- Passwords -- Master Password and Keystores -- Understanding Master Password Synchronization -- Default Master Password -- Saving the Master Password to a File -- Using the Master Password Creating a Domain -- Administration Password -- Encoded Passwords -- Web Browsers and Password Storage -- Authentication Realms -- Create an Authentication Realm -- List Authentication Realms -- Update an Authentication Realm -- Delete an Authentication Realm -- Exousia -- Configuring Exousia in GlassFish -- Manage Authorization Providers from the Admin Console -- Manage Authorization Providers from the Command Line -- Using Exousia with Tomcat -- Soteria -- A Very Brief History.
Authentication Mechanisms.
Record Nr. UNINA-9910561299303321
Tijms Arjan  
New York, New York : , : Apress L. P., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Design and deploy Microsoft Azure virtual desktop : an essential guide for architects and administrators / / Puthiyavan Udayakumar
Design and deploy Microsoft Azure virtual desktop : an essential guide for architects and administrators / / Puthiyavan Udayakumar
Autore Udayakumar Puthiyavan
Pubbl/distr/stampa New York, New York : , : Apress L. P., , [2022]
Descrizione fisica 1 online resource (401 pages)
Disciplina 005.43
Soggetto topico Microsoft Azure (Computing platform)
Virtual computer systems
ISBN 1-4842-7796-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Microsoft AVD Essentials -- Chapter 2: Planning and preparing for AVD -- Chapter 3: Defining AVD Requirements and Assessment -- Chapter 4: Designing and Deploying AVD Solution -- Chapter 5: Managing and Securing AVD Solution.
Record Nr. UNINA-9910522994603321
Udayakumar Puthiyavan  
New York, New York : , : Apress L. P., , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui