|
|
Books > Computing & IT > Computer software packages > Other software packages > Enterprise software > General
Enterprise resource planning (ERP) is a class of integrated
software that uses software technologies to implement real-time
management of business processes in an organization. ERPs normally
cut across organizations, making them large and complex. Software
researchers have for many years established that complexity affects
software quality negatively and must therefore be controlled with
novel metrics and models of evaluation that can determine when the
software is at acceptable levels of quality and when not. Metrics
and Models for Evaluating the Quality and Effectiveness of ERP
Software is a critical scholarly publication that examines ERP
development, performance, and challenges in business settings to
help improve decision making in organizations that have embraced
ERPs, improve the efficiency and effectiveness of their activities,
and improve their return on investments (ROI). Highlighting a wide
range of topics such as data mining, higher education, and
security, this book is essential for professionals, software
developers, researchers, academicians, and security professionals.
Design and build high-performance, secure, and scalable Salesforce
solutions to meet business demands and gain practical experience
using real-world scenarios by creating engaging end-to-end solution
presentations Key Features Learn common integration, data
migration, and security patterns for designing scalable and
reliable solutions on the Salesforce Lightning platform Build an
end-to-end delivery framework pipeline for delivering successful
projects within specified timelines Gain access to an exclusive
book club of skilled Salesforce professionals, to discuss ideas,
best practices, and share experiences of designing modern solutions
using Salesforce Book DescriptionSalesforce Certified Technical
Architect (CTA) is the ultimate certification to validate your
knowledge and skills when it comes to designing and building
high-performance technical solutions on the Salesforce platform.
The CTA certificate is granted after successfully passing the CTA
review board exam, which tests your platform expertise and soft
skills for communicating your solutions and vision. You'll start
with the core concepts that every architect should master,
including data lifecycle, integration, and security, and build your
aptitude for creating high-level technical solutions. Using
real-world examples, you'll explore essential topics such as
selecting systems or components for your solutions, designing
scalable and secure Salesforce architecture, and planning the
development lifecycle and deployments. Finally, you'll work on two
full mock scenarios that simulate the review board exam, helping
you learn how to identify requirements, create a draft solution,
and combine all the elements together to create an engaging story
to present in front of the board or to a client in real life. By
the end of this Salesforce book, you'll have gained the knowledge
and skills required to pass the review board exam and implement
architectural best practices and strategies in your day-to-day
work. What you will learn Explore data lifecycle management and
apply it effectively in the Salesforce ecosystem Design appropriate
enterprise integration interfaces to build your connected solution
Understand the essential concepts of identity and access management
Develop scalable Salesforce data and system architecture Design the
project environment and release strategy for your solution
Articulate the benefits, limitations, and design considerations
relating to your solution Discover tips, tricks, and strategies to
prepare for the Salesforce CTA review board exam Who this book is
forThis book is for Salesforce architects who want to become
certified technical architects by learning how to design secure and
scalable technical solutions for their organizations. A solid
understanding of the Salesforce platform is required, ideally
combined with 3 to 5 years of practical experience as an
application architect, system architect, enterprise architect, or
solution architect.
Explore a wide range of low-code tools in the Salesforce platform
for building customized CRM applications without writing any code
Key Features Create apps with a rich user experience without paying
for costly developers Leverage Salesforce Lightning Platform's
declarative features to build professional-grade applications
Improve productivity with business process automation using
Workflow, Process Builder, and Flow Book DescriptionLow-code
platforms allow users to focus on business logic to create
solutions without getting trapped in programming complexities.
Thanks to its powerful features for designing, developing, and
deploying apps without having to hand-code, Salesforce is at the
forefront of the low-code development revolution. This book will
guide you in building creative applications for solving your
business problems using the declarative framework provided by
Salesforce. You'll start by learning how to design your business
data model with custom objects, fields, formulas, and validation
rules, all secured by the Salesforce security model. You'll then
explore tools such as Workflow, Process Builder, Lightning Flow,
and Actions that will help you to automate your business processes
with ease. This book also shows you how to use Lightning App
Builder to build personalized UIs for your Salesforce applications,
explains the value of creating community pages for your
organization, and teaches you how to customize them with Experience
Builder. Finally, you'll work with the sandbox model, deploy your
solutions, and deliver an effective release management strategy. By
the end of this Salesforce book, you'll be ready to customize
Salesforce CRM to meet your business requirements by creating
unique solutions without writing a single line of code. What you
will learn Get to grips with the fundamentals of data modeling to
enhance data quality Deliver dynamic configuration capabilities
using custom settings and metadata types Secure your data by
implementing the Salesforce security model Customize Salesforce
applications with Lightning App Builder Create impressive pages for
your community using Experience Builder Use Data Loader to import
and export data without writing any code Embrace the Salesforce
Ohana culture to share knowledge and learn from the global
Salesforce community Who this book is forIf you are a citizen
developer, business analyst, Salesforce administrator, or anyone
interested in developing applications or solutions for business
problems but lack technical knowledge, this book is for you. No
prior programming experience is required.
Learn how to extend the capabilities of Power Apps by building code
components using Power Apps Component Framework Key Features
Understand how to extend Power Apps' capabilities Enhance your
skills with the help of practical code components used throughout
the book Overcome common challenges, avoid pitfalls, and improve
your code Book DescriptionPower Apps Component Framework is used by
professional developers to extend the capabilities of model-driven
and canvas apps. Extending Microsoft Power Apps with Power Apps
Component Framework will take you through the basic as well as
advanced topics using practical examples. The book starts by
helping you understand the fundamentals of the framework, its
lifecycle, and the tools that you'll use to build code components
using best practices and file management guidelines. You'll then
learn how to extend Power Apps step by step and apply the
principles and concepts covered in the book to build code
components for field type attributes. The book covers different
ways of debugging code components and guides you through the
process of building code components for datasets. You'll also
explore the functions and methods provided by the framework to
enhance your controls using powerful sets of libraries and
extensions. As you advance, you'll get to grips with creating and
managing authentication profiles, discover different ways of
deploying code components, and configure code components in
model-driven and canvas apps. Finally, you'll learn some of the
important features of the framework and learn modern web
development practices. By the end of this Power Apps book, you'll
be able to build, debug, enrich, and deploy code components
confidently. What you will learn Understand the fundamentals of
Power Apps Component Framework Explore the tools that make it easy
to build code components Build code components for both a field and
a dataset Debug using test harness and Fiddler Implement caching
techniques Find out how to work with the Dataverse Web API Build
code components using React and Fluent UI controls Discover
different deployment strategies Who this book is forThis book is
for developers who are looking to build advanced skills for
extending the capabilities of Power Apps. Basic knowledge of Power
Apps and web development is necessary to get started with this
book.
Secure your container environment against cyberattacks and deliver
robust deployments with this practical guide Key Features Explore a
variety of Kubernetes components that help you to prevent
cyberattacks Perform effective resource management and monitoring
with Prometheus and built-in Kubernetes tools Learn techniques to
prevent attackers from compromising applications and accessing
resources for crypto-coin mining Book DescriptionKubernetes is an
open source orchestration platform for managing containerized
applications. Despite widespread adoption of the technology, DevOps
engineers might be unaware of the pitfalls of containerized
environments. With this comprehensive book, you'll learn how to use
the different security integrations available on the Kubernetes
platform to safeguard your deployments in a variety of scenarios.
Learn Kubernetes Security starts by taking you through the
Kubernetes architecture and the networking model. You'll then learn
about the Kubernetes threat model and get to grips with securing
clusters. Throughout the book, you'll cover various security
aspects such as authentication, authorization, image scanning, and
resource monitoring. As you advance, you'll learn about securing
cluster components (the kube-apiserver, CoreDNS, and kubelet) and
pods (hardening image, security context, and PodSecurityPolicy).
With the help of hands-on examples, you'll also learn how to use
open source tools such as Anchore, Prometheus, OPA, and Falco to
protect your deployments. By the end of this Kubernetes book,
you'll have gained a solid understanding of container security and
be able to protect your clusters from cyberattacks and mitigate
cybersecurity threats. What you will learn Understand the basics of
Kubernetes architecture and networking Gain insights into different
security integrations provided by the Kubernetes platform Delve
into Kubernetes' threat modeling and security domains Explore
different security configurations from a variety of practical
examples Get to grips with using and deploying open source tools to
protect your deployments Discover techniques to mitigate or prevent
known Kubernetes hacks Who this book is forThis book is for
security consultants, cloud administrators, system administrators,
and DevOps engineers interested in securing their container
deployments. If you're looking to secure your Kubernetes clusters
and cloud-based deployments, you'll find this book useful. A basic
understanding of cloud computing and containerization is necessary
to make the most of this book.
Learn the foundations of blockchain technology - its core concepts
and algorithmic solutions across cryptography, peer-to-peer
technology, and game theory. Key Features Learn the core concepts
and foundations of the blockchain and cryptocurrencies Understand
the protocols and algorithms behind decentralized applications
Master how to architect, build, and optimize blockchain
applications Book DescriptionBlockchain technology is a combination
of three popular concepts: cryptography, peer-to-peer networking,
and game theory. This book is for anyone who wants to dive into
blockchain from first principles and learn how decentralized
applications and cryptocurrencies really work. This book begins
with an overview of blockchain technology, including key
definitions, its purposes and characteristics, so you can assess
the full potential of blockchain. All essential aspects of
cryptography are then presented, as the backbone of blockchain. For
readers who want to study the underlying algorithms of blockchain,
you'll see Python implementations throughout. You'll then learn how
blockchain architecture can create decentralized applications.
You'll see how blockchain achieves decentralization through
peer-to-peer networking, and how a simple blockchain can be built
in a P2P network. You'll learn how these elements can implement a
cryptocurrency such as Bitcoin, and the wider applications of
blockchain work through smart contracts. Blockchain optimization
techniques, and blockchain security strategies are then presented.
To complete this foundation, we consider blockchain applications in
the financial and non-financial sectors, and also analyze the
future of blockchain. A study of blockchain use cases includes
supply chains, payment systems, crowdfunding, and DAOs, which
rounds out your foundation in blockchain technology. What you will
learn The core concepts and technical foundations of blockchain The
algorithmic principles and solutions that make up blockchain and
cryptocurrencies Blockchain cryptography explained in detail How to
realize blockchain projects with hands-on Python code How to
architect the blockchain and blockchain applications Decentralized
application development with MultiChain, NEO, and Ethereum
Optimizing and enhancing blockchain performance and security
Classical blockchain use cases and how to implement them Who this
book is forThis book is for anyone who wants to dive into
blockchain technology from first principles and build a
foundational knowledge of blockchain. Familiarity with Python will
be helpful if you want to follow how the blockchain protocols are
implemented. For readers who are blockchain application developers,
most of the applications used in this book can be executed on any
platform.
Effectively implement features and components for any computing
environment Key Features Explore the latest features of VMware
Horizon 7.7 Virtualize your desktop infrastructure using new
features introduced in Horizon Implement App Volumes and User
Environment Manager in your infrastructure Book DescriptionThis
third edition of Implementing VMware Horizon 7.7 has been updated
to get you up to speed with VMware Horizon 7.7 by showing you how
to use its key features and deploying an end-user computing
infrastructure for your own organization. The book begins by
guiding you on how to deploy all the core requirements for a VMware
Horizon infrastructure. It then moves on to show you how to
provision and administer end-user computing resources using VMware
Horizon. You'll not only be able to deploy the core VMware Horizon
features, but you'll also be able to implement new features, such
as the Just-in-Time Management Platform (JMP) and the Horizon
Console. You'll also focus on the latest features and components of
the Horizon platform and learn when and how they are used. By the
end of the book, you will have developed a solid understanding of
how your organization can benefit from the capabilities VMware
Horizon offers and how each of its components is implemented. What
you will learn Work with the different products that make up VMware
Horizon Implement a multi-site VMware Horizon Pod using the Cloud
Pod Architecture feature Deploy and configure VMware Horizon's
optional components Implement and maintain Microsoft RDSH, Horizon
Linux, and Windows Desktop Pools and RDSH Application Pools
Configure and manage Horizon remotely using PowerCLI Learn about
the Microsoft Windows Group Policy templates for Horizon Understand
how to manage the SSL certificates for each of the VMware Horizon
components Who this book is forIf you're a system administrator,
solutions architect, or desktop engineer looking to level up your
skills working with VMware's Horizon ecosystem and want to build a
successful deployment strategy for desktops and applications, this
book is for you.
Explore Kinesis managed services such as Kinesis Data Streams,
Kinesis Data Analytics, Kinesis Data Firehose, and Kinesis Video
Streams with the help of practical use cases Key Features Get well
versed with the capabilities of Amazon Kinesis Explore the
monitoring, scaling, security, and deployment patterns of various
Amazon Kinesis services Learn how other Amazon Web Services and
third-party applications such as Splunk can be used as destinations
for Kinesis data Book DescriptionAmazon Kinesis is a collection of
secure, serverless, durable, and highly available purpose-built
data streaming services. This data streaming service provides APIs
and client SDKs that enable you to produce and consume data at
scale. Scalable Data Streaming with Amazon Kinesis begins with a
quick overview of the core concepts of data streams, along with the
essentials of the AWS Kinesis landscape. You'll then explore the
requirements of the use case shown through the book to help you get
started and cover the key pain points encountered in the data
stream life cycle. As you advance, you'll get to grips with the
architectural components of Kinesis, understand how they are
configured to build data pipelines, and delve into the applications
that connect to them for consumption and processing. You'll also
build a Kinesis data pipeline from scratch and learn how to
implement and apply practical solutions. Moving on, you'll learn
how to configure Kinesis on a cloud platform. Finally, you'll learn
how other AWS services can be integrated into Kinesis. These
services include Redshift, Dynamo Database, AWS S3, Elastic Search,
and third-party applications such as Splunk. By the end of this AWS
book, you'll be able to build and deploy your own Kinesis data
pipelines with Kinesis Data Streams (KDS), Kinesis Data Firehose
(KFH), Kinesis Video Streams (KVS), and Kinesis Data Analytics
(KDA). What you will learn Get to grips with data streams,
decoupled design, and real-time stream processing Understand the
properties of KFH that differentiate it from other Kinesis services
Monitor and scale KDS using CloudWatch metrics Secure KDA with
identity and access management (IAM) Deploy KVS as infrastructure
as code (IaC) Integrate services such as Redshift, Dynamo Database,
and Splunk into Kinesis Who this book is forThis book is for
solutions architects, developers, system administrators, data
engineers, and data scientists looking to evaluate and choose the
most performant, secure, scalable, and cost-effective data
streaming technology to overcome their data ingestion and
processing challenges on AWS. Prior knowledge of cloud
architectures on AWS, data streaming technologies, and
architectures is expected.
|
|