Focusing on the service-oriented architecture (SOA), this comprehensive guide delves into Windows Communication Foundation (WCF) and its significance in development. It explores advanced features introduced in .NET 4.0, such as service discovery and simplified configuration. The book provides practical examples to facilitate understanding of concepts like reliable messaging, security, and peer-to-peer programming. Additionally, it offers strategies for transitioning existing .NET remoting and web service applications to WCF, addressing real enterprise challenges effectively.
Nishith Pathak Knihy





A debut short story collection that explores the vulnerability, grit, and complex nature of our humanity from a new, vital queer voice. A yacht races to outrun a tsunami. A young man jailed on a drug charge forms a relationship with his cellmate that is by turns tender and brutal. A family buys a rural slaughterhouse, and tensions with their religious neighbors quickly escalate. A teen raised by his eccentric gay father, a Turkish immigrant, finds his life fractured by violence. A fictionalized Coretta Scott King, surveilled and harassed by the FBI, considers the costs of her life with her husband. Here Is What You Do is a bravura, far-ranging collection, its stories linked by sorrow and latent hope, each one drilling toward its characters’ darkest emotional centers. In muscularly robust prose, with an unfailing eye for human drives and frailties, Chris Dennis captures the raw need, desire, cruelty, and promise that animate our lives.
Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks , celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with ha..
Artificial Intelligence for .NET: Speech, Language, and Search
- 292 stránek
- 11 hodin čtení
1. Getting Started with AI Basics -- 2. Creating an AI-Based Application in Visual Studio -- 3. Building a Conversational User Interface with Microsoft Technologies -- 4. Using Natural Language Understanding -- 5. Exploring a Cognitive Language Model -- 6. Consuming and Applying LUIS -- 7. Interacting with Speech API -- 8. Enhancing Search Capabilities with AI -- 9. Working with Recommendations -- 10. Future of AI
IoT, AI, and Blockchain for .NET
- 332 stránek
- 12 hodin čtení
The Artificial Intelligence 2.0 Revolution 2. Understanding the Internet of Things and Azure IoT Suite 3. Creating Smart IoT Applications 4. Understanding Cognitive APIs 5. Consuming Microsoft Cognitive APIs 6. Building Smarter Applications using Cognitive APIs 7. Understanding Blockchain 8. Implementing Blockchain as a Service 9. Capturing, Analyzing, and Visualizing Real-Time Data 10. Making Predictions with Machine Learning