Enrich, Inspire, Transform
Top
Find it in the catalogue
Measuring the user experience : collecting, analyzing, and presenting UX metrics / Albert, Bill (William)

Measuring the User Experience: Collecting, Analyzing, and Presenting UX Metrics, Third Edition provides the quantitative analysis training that students and professionals need. This book presents an update on the first resource that focused on how to quantify user experience. Now in its third edition, the authors have expanded on the area of behavioural and physiological metrics, splitting that chapter into sections that cover eye-tracking and measuring emotion. The book also contains new research and updated examples, several new case studies, and new examples using the most recent version of Excel.

Find it in the catalogue
Excel cookbook : recipes for mastering Microsoft Excel / Griffiths, Dawn

Filled with tips, tricks, and techniques, this easy-to-use book is the perfect resource for intermediate to advanced users of Excel. You'll find complete recipes for more than a dozen topics covering formulas, PivotTables, charts, Power Query, and more. Each recipe poses a particular problem and outlines a solution that you can put to use right away--without having to comb through tutorial pages. Whether you're a data analyst, project manager, or financial analyst, author Dawn Griffiths directs you straight to the answers you need. Ideal as a quick reference, Excel Cookbook is also perfect for learning how to work in a more efficient way, leading to greater productivity on the job. With this book, you'll jump in and get answers to your questions--fast.

Find it in the catalogue
Engineering secure devices : a practical guide for embedded system architects and developers / Merli, Dominik

As an engineer, you know that countless devices-from industrial components to smart household appliances-rely on embedded computer systems. But how do you balance the need for robust security with performance and innovative product design? Engineering Secure Devices will guide you through crafting secure devices-from protecting crucial assets to the nature of attackers and the risks they pose. You'll explore the technical intricacies and pros and cons of symmetric and asymmetric cryptography and learn how to use and analyze random number generators and cryptographic algorithms. You'll learn how to ensure confidential data storage and secure memory, and devise secure device identity solutions and communication protocols to reinforce system architecture against potential threats. And finally, you'll learn how to properly design secure boot and secure update processes, manage access control, and perform system monitoring to secure IoT devices. Real-world case studies throughout highlight practical applications, solutions, and obstacles, such as firmware updates with SWUpdate, secure communication with MQTT, and advanced access control with AppArmor. Whether you're an IoT developer or an embedded system architect, Engineering Secure Devices equips you with the indispensable knowledge to design, secure, and support the next generation of smart devices-from webcams to four-legged robots.

Find it in the catalogue
CISSP for dummies / Gregory, Peter H.
CISSP
The CISSP certification, held by more than 150,000 security professionals worldwide, is the gold standard of cybersecurity certifications. The CISSP Exam certifies cybersecurity professionals and opens doors for career advancement. Fully updated and revised to reflect the 2024 ISC2 CISSP Exam Outline, CISSP For Dummies is packed with helpful content for all eight security domains. This book includes access to online study tools such as practice questions and digital flashcards, boosting your likelihood of success on the exam. Plus, you'll feel prepared and ready for test day thanks to a 60-day study plan. Boost your security career with this Dummies study guide. Review all the content covered in the latest CISSP Exam. Test with confidence and achieve your certification as a cybersecurity professional. Study smarter, thanks to online practice resources and a 60-day study plan. Enhance your career with the in-demand CISSP certification. Continue advancing your career and the profession through speaking and mentoring opportunities.

Find it in the catalogue
Writing a C compiler : build a real programming language from scratch / Sandler, Nora

"An approachable, hands-on tutorial to writing a C compiler and how programming languages work. Readers are gently led step by step to build a small working compiler that continues to develop throughout the book, creating a final program that translates code written by the programmer into code the computer can understand. Writing a C Compiler offers readers an accessible, practical approach to this complex and often overly theoretical topic"--

Find it in the catalogue
Learn Java fundamentals : a primer for Java development and programming / Friesen, Jeff

Sharpen your Java skills and boost your potential as an IT specialist. This book introduces you to the basic Java features and APIs needed to prepare for a career in programming and development. You'll first receive an introduction to Java and then explore language features ranging from comments though exception/error handling, focusing mainly on language syntax and a few select syntax-related APIs. This constitutes the heart of the book, and you'll use these building blocks to construct simple Java programs, and learn where Java's implementations of expressions (and operators), and statements diverge from other languages. The final few chapters tour some additional APIs such as the Math class, related types, String and StringBuffer, and System. Along the way you'll discover some interesting programs, such as Graph (a sine/cosine wave-plotting application) and WC (a word-counting application). Two appendixes provide quick references to Java's supported reserved words, and to Java's supported operators. Equipped with this knowledge, Learn Java Fundamentals will provide you the pathway to explore additional APIs on your own, and increase your Java awareness. You will: Understand the basics of Java applications and APIs Study language features such as comments, identifiers, variables, types, and literals Explore operators, expressions, statements, and other key features such as classes, objects, class extension, and class abstraction.

Find it in the catalogue
Evasive malware : a field guide to detecting, analyzing, and defeating advanced threats / Cucci, Kyle

We're all aware of Stuxnet, ShadowHammer, Sunburst, and similar attacks that use evasion to remain hidden while defending themselves from detection and analysis. Because advanced threats like these can adapt and, in some cases, self-destruct to evade detection, even the most seasoned investigators can use a little help with analysis now and then. Evasive Malware will introduce you to the evasion techniques used by today's malicious software and show you how to defeat them. Following a crash course on using static and dynamic code analysis to uncover malware's true intentions, you'll learn how malware weaponizes context awareness to detect and skirt virtual machines and sandboxes, plus the various tricks it uses to thwart analysis tools. You'll explore the world of anti-reversing, from anti-disassembly methods and debugging interference to covert code execution and misdirection tactics. You'll also delve into defense evasion, from process injection and rootkits to fileless malware. Finally, you'll dissect encoding, encryption, and the complexities of malware obfuscators and packers to uncover the evil within.

Find it in the catalogue
Defensive security handbook : best practices for securing infrastructure / Berlin, Amanda
Best practices for securing infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with issues such as breaches and disasters, compliance, network infrastructure, password management, vulnerability scanning, penetration testing, and more. Network engineers, system administrators, and security professionals will learn how to use frameworks, tools, and techniques to build and improve their cybersecurity programs.

Find it in the catalogue
Learning Microsoft Power Apps : building business applications with low-code technology / Shrivastava, Arpit
Building business applications with low-code technology
In today's fast-paced world, more and more organizations require rapid application development with reduced development costs and increased productivity. This practical guide shows application developers how to use Power Apps, Microsoft's no-code/low-code application framework that helps developers speed up development, modernize business processes, and solve tough challenges. Author Arpit Shrivastava provides a comprehensive overview of designing and building cost-effective applications with Microsoft Power Apps. You'll learn fundamental concepts behind low-code and no-code development, how to build applications using pre-built and blank templates, how to design an app using Copilot AI and drag and drop PowerPoint-like controls, use Excel-like expressions to write business logic for an app, and integrate apps with external data sources. With this book, you'll: Learn the importance of no-code/low-code application development Design mobile/tablet (canvas apps) applications using pre-built and blank templates Design web applications (model-driven apps) using low-code, no-code, and pro-code components Integrate Power Apps with external applications Learn basic coding concepts like JavaScript, Power Fx, and C# Apply best practices to customize Dynamics 365 CE applications Dive into Azure DevOps and ALM concepts to automate application deployment Citizen developers and professional application developers alike will be able to design robust applications and solve real world business challenges using Power Apps. Arpit Shrivastava is a Microsoft MVP and Power Platform architect at Capgemini, with vast experience working with Microsoft Dynamics 365 and the Power Platform.

Find it in the catalogue
Automating API delivery : APIOps with OpenAPI / Hecht, Melissa Van Der

Automating API Delivery introduces the tools and strategies behind APIOps. You'll discover tools and process improvements that give you important quick wins, including API governance using the Spectral API linter and establishing an efficient CI/CD pipeline with GitHub Actions. You'll even discover how to use the powerful OpenAPI Generator to automatically create client and server code from your API definitions.